Rocky K. C. Chang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

25EEXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang: TCP covert timing channels: Design and detection. DSN 2008: 420-429
24EEYajuan Tang, Xiapu Luo, Rocky K. C. Chang: Protecting Internet Services from Low-Rate DoS Attacks. Critical Infrastructure Protection 2007: 251-265
23EEXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang: Cloak: A Ten-Fold Way for Reliable Covert Communications. ESORICS 2007: 283-298
22EESamantha Lo, Rocky K. C. Chang, Lorenzo Colitti: An active approach to measuring routing dynamics induced by autonomous systems. Experimental Computer Science 2007: 20
21EEXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang: Crafting Web Counters into Covert Channels. SEC 2007: 337-348
20EEYi Xie, Rocky K. C. Chang: Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints. GLOBECOM 2006
19EEXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang: Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. NOMS 2006: 507-518
18EEYi Xie, Rocky K. C. Chang: Stability-constrained optimization for energy efficiency in polling-based wireless networks. VALUETOOLS 2006: 23
17EESum Lam, Rocky K. C. Chang, Yi Xie: Relative stability analysis of multiple queues. VALUETOOLS 2006: 65
16EEXiapu Luo, Rocky K. C. Chang: Optimizing the Pulsing Denial-of-Service Attacks. DSN 2005: 582-591
15EEGuangmin Hu, Rocky K. C. Chang: Forwarding State Scalability-Aware Multicast Routing. ISCC 2005: 395-400
14EEXiapu Luo, Rocky K. C. Chang: Novel Approaches to End-to-End Packet Reordering Measurement. Internet Measurment Conference 2005: 227-238
13EEXiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan: Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. MASCOTS 2005: 97-104
12EEXiapu Luo, Rocky K. C. Chang: On a New Class of Pulsing Denial-of-Service Attacks and the Defense. NDSS 2005
11EERocky K. C. Chang: Teaching computer networking with the help of personal computer networks. ITiCSE 2004: 208-212
10EERocky K. C. Chang, Michael Lo: Inbound traffic engineering for multi-homed ASes using AS path prepending. NOMS (1) 2004: 89-102
9EERocky K. C. Chang: A Multicast-On-Large-Demand Approach to the Flash Crowd Problem. WWW (Posters) 2003
8EESum Lam, Rocky K. C. Chang: Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks. SIGMETRICS Performance Evaluation Review 31(2): 20-22 (2003)
7EERocky K. C. Chang, King P. Fung: Transport layer proxy for stateful UDP packet filtering. ISCC 2002: 595-600
6EEFai Siu, Rocky K. C. Chang: Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies. Computer Networks 38(1): 61-74 (2002)
5EERocky K. C. Chang, Hong Y. Wang: Routing Properties of a Recursive Interconnection Network. J. Parallel Distrib. Comput. 61(6): 838-849 (2001)
4EESum Lam, Rocky K. C. Chang: Stability comparison in single-server-multiple-queue systems. SIGMETRICS Performance Evaluation Review 29(3): 32-34 (2001)
3EEFilli Y. Y. Cheng, Rocky K. C. Chang: A Tree Switching Protocol for Multicast State Reduction. ISCC 2000: 672-677
2EEKing P. Fung, Rocky K. C. Chang: A Transport-Level Proxy for Secure Multimedia Streams. IEEE Internet Computing 4(6): 57-67 (2000)
1 Rocky K. C. Chang, Sum Lam: A novel approach to queue stability analysis of polling models. Perform. Eval. 40(1-3): 27-46 (2000)

Coauthor Index

1Edmond W. W. Chan [13] [19] [21] [23] [25]
2Filli Y. Y. Cheng [3]
3Lorenzo Colitti [22]
4King P. Fung [2] [7]
5Guangmin Hu [15]
6Sum Lam [1] [4] [8] [17]
7Michael Lo [10]
8Samantha Lo [22]
9Xiapu Luo [12] [13] [14] [16] [19] [21] [23] [24] [25]
10Fai Siu [6]
11Yajuan Tang [24]
12Hong Y. Wang [5]
13Yi Xie [17] [18] [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)