Yennun Huang

According to our database1, Yennun Huang
  • authored at least 77 papers between 1987 and 2017.
  • has a "Dijkstra number"2 of four.

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to fault tolerant and failure avoidance software".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Application Execution Time Prediction for Effective CPU Provisioning in Virtualization Environment.
IEEE Trans. Parallel Distrib. Syst., 2017

Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward Fog-Based Event-Driven Services for Internet of Vehicles: Design and Evaluation.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017

The choice between delta and shift operators for low-precision data representation.
Proceedings of the 20th Conference of Open Innovations Association, 2017

K-Aggregation: Improving Accuracy for Differential Privacy Synthetic Dataset by Utilizing K-Anonymity Algorithm.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Scheduling-Aware Data Prefetching for Data Processing Services in Cloud.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Crowdsensing traces visualization in bluetooth beacon-based sensor network using wearable device.
Proceedings of the SIGGRAPH ASIA 2016, Macao, December 5-8, 2016 - Posters, 2016

Crowdsensing route reconstruction using portable bluetooth beacon-based two-way network.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

2015
SFTopk: Secure Functional Top-k Query via Untrusted Data Storage.
IEEE Access, 2015

Network-traffic anomaly detection with incremental majority learning.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Discovery of De-identification Policies Considering Re-identification Risks and Information Loss.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Resistant learning on the envelope bulk for identifying anomalous patterns.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Event Pattern Discovery on IDS Traces of Cloud Services.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
ArtTorchlight: an exploratory way of viewing paintings using handheld projectors and smart phones.
Proceedings of the SIGGRAPH Asia 2013, 2013

Mining Large Network Reconnaissance Data.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Network Forensic Analysis Using Growing Hierarchical SOM.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Dependable Architecture of RFID Middleware on Networked RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Investigating DNS traffic anomalies for malicious activities.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Network traffic anomaly detection based on growing hierarchical SOM.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Design of event-based Intrusion Detection System on OpenFlow Network.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Holography: a behavior-based profiler for malware analysis.
Softw., Pract. Exper., 2012

2011
Malware Profiler Based on Innovative Behavior-Awareness Technique.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

2009
Towards capacity and profit optimization of video-on-demand services in a peer-assisted IPTV platform.
Multimedia Syst., 2009

Holography: A Hardware Virtualization Tool for Malware Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Xprobe2++: Low volume remote network information gathering tool.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Towards Adaptive Covert Communication System.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

2007
Self-Healing Spyware: Detection, and Remediation.
IEEE Trans. Reliability, 2007

Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks.
IEEE Journal on Selected Areas in Communications, 2007

Clicker - An IPTV Remote Control in Your Cell Phone.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
A Scalable Port Forwarding for P2P-Based Wi-Fi Applications.
Proceedings of the Wireless Algorithms, 2006

A Stateful Approach to Spyware Detection and Removal.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

2005
A Multi-Faceted Approach towards Spam-Resistible Mail.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

2004
NT-SwiFT: software implemented fault tolerance on Windows NT.
Journal of Systems and Software, 2004

Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

2001
VORAL: A System for Voice Over IP Routing in Application Layer.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Robustness Testing and Hardening of CORBA ORB Implementations.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Checkpointing Tool for Palm Operating System.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
Issues in the Design of a Reflective Library for Checkpointing C++ Objects.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

Performance and Reliability Evaluation of Passive Replication Schemes in Application Level Fault Tolerance.
Proceedings of the Digest of Papers: FTCS-29, 1999

Winckp: A Transparent Checkpointing and Rollback Recovery Tool for Windows NT Applications.
Proceedings of the Digest of Papers: FTCS-29, 1999

Fault-Injection Experiments for Distributed Objects.
Proceedings of the International Symposium on Distributed Objects and Applications, 1999

A cluster-based checkpointing scheme for mobile computing on wide area network.
Proceedings of the Mobile Networks and Computing, 1999

1998
Checkpoints-on-Demand with Active Replication.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Filterfresh: Hot Replication of Java RMI Server Objects.
Proceedings of the 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 1998

1997
Progressive Retry for Software Failure Recovery in Message-Passing Applications.
IEEE Trans. Computers, 1997

ONE-IP: Techniques for Hosting a Service on a Cluster of Machines.
Computer Networks, 1997

On the Scalability and Mean-Time to Failure of k Resilient Protocols.
Acta Inf., 1997

STL: a tool for on-line software update and rejuvenation (Abstract).
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Xept: a software instrumentation method for exception handling.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Integrating Checkpointing with Transaction Processing.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Developing reliable applications on cluster systems.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

Minimizing Completion Time of a Program by Checkpointing and Rejuvenation.
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1996

1995
Parallel architectures for processing high speed network signaling protocols.
IEEE/ACM Trans. Netw., 1995

Computing Reliability Intervals for k-Resilient Protocols.
IEEE Trans. Computers, 1995

Checkpointing and Its Applications.
Proceedings of the Digest of Papers: FTCS-25, 1995

Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems.
Proceedings of the Digest of Papers: FTCS-25, 1995

Software Rejuvenation: Analysis, Module and Applications.
Proceedings of the Digest of Papers: FTCS-25, 1995

1994
High-Speed Protocol Processing Using Parallel Architectures.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1993
Resource Allocation for Primary-Site Fault-Tolerant Systems.
IEEE Trans. Software Eng., 1993

Two Techniques for Transient Software Error Recovery.
Proceedings of the Hardware and Software Architectures for Fault Tolerance, 1993

Progressive Retry for Software Error Recovery in Distributed Systems.
Proceedings of the Digest of Papers: FTCS-23, 1993

Software Implemented Fault Tolerance Technologies and Experience.
Proceedings of the Digest of Papers: FTCS-23, 1993

1992
Effect of Fault Tolerance on Response Time-Analysis of the Primary Site Approach.
IEEE Trans. Computers, 1992

Computing Threshold Times for k-Resilient Protocols.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

On the Availability of Parallel Protocol-Processing Systems.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

1991
Effective Load and Resource Sharing in Parallel Protocol-Processing Systems.
Proceedings of the International Conference on Parallel Processing, 1991

Resource Allocation for Distributed Systems with Fault Tolerant Nodes.
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991

1989
Analytic Models for the Primary Site Approach to Fault-Tolerance.
Acta Inf., 1989

Availability Analysis of the Primary Site Approach for Fault Tolerance.
Proceedings of the Eigthth Symposium on Reliable Distributed Systems, 1989

1987
Local Area Networks: Software and Related Issues.
IEEE Trans. Software Eng., 1987


  Loading...