Viet Hung Nguyen
According to our database1, Viet Hung Nguyen authored at least 48 papers between 2000 and 2019.
Legend:Book In proceedings Article PhD thesis Other
An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners.
Selfish Mining in Proof-of-Work Blockchain with Multiple Miners: An Empirical Evaluation.
Proceedings of the PRIMA 2019: Principles and Practice of Multi-Agent Systems, 2019
Proceedings of the Computational Linguistics, 2019
Improved linearized models for graph partitioning problem under capacity constraints.
Optimization Methods and Software, 2017
Improved compact formulations for a wide class of graph partitioning problems in sparse graphs.
Discret. Optim., 2017
Proceedings of the Combinatorial Optimization and Applications, 2017
Optim. Lett., 2016
Empirical Software Engineering, 2016
Electron. Notes Discret. Math., 2016
Fault severity estimation using nonlinear Kalman filter for induction motors under inter-turn fault.
Proceedings of the IECON 2016, 2016
Proceedings of the IEEE International Conference on Industrial Technology, 2016
Discrete Math., Alg. and Appl., 2015
A closed-form solution to fault parameter estimation and faulty phase identification of stator winding inter-turn fault in induction machines.
Proceedings of the IECON 2015, 2015
Proceedings of the 11th International Conference on Natural Computation, 2015
IEEE Trans. Software Eng., 2014
Proceedings of the Advanced Computational Methods for Knowledge Engineering, 2014
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014
Proceedings of the International Conference on Control, 2014
J. Comb. Optim., 2013
A Systematically Empirical Evaluation of Vulnerability Discovery Models: a Study on Browsers' Vulnerabilities.
Proceedings of the 2013 IEEE RIVF International Conference on Computing and Communication Technologies, 2013
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Combinatorial Optimization - Second International Symposium, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Proceedings of the 2012 European Solid-State Device Research Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Network Performance Engineering, 2011
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Metropolitan optical packet bus-based networks: Packet bursting and emulation of TDM services.
Comput. Commun., 2010
Proceedings of the Combinatorial Optimization and Applications, 2010
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the Combinatorial Optimization and Applications, 2009
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases.
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008
RAIRO - Operations Research, 2007
Proceedings of the The Second International Conference on Availability, 2007
Dynamic Intelligent MAC Protocol for Metropolitan Optical Packet Switching Ring Networks.
Proceedings of IEEE International Conference on Communications, 2006
Dynamic Resource Allocation Algorithm for Metropolitan Optical Packet-Switched Ring Networks.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005
Performance Evaluation of Circuit Emulation Service in a Metropolitan Optical Ring Architecture.
Proceedings of the Telecommunications and Networking, 2004
Electron. Notes Discret. Math., 2000