2009 |
20 | EE | Zhen Chen,
Dong Xiang,
Boxue Yin:
A power-effective scan architecture using scan flip-flops clustering and post-generation filling.
ACM Great Lakes Symposium on VLSI 2009: 517-522 |
19 | EE | Boxue Yin,
Dong Xiang,
Zhen Chen:
New Techniques for Accelerating Small Delay ATPG and Generating Compact Test Sets.
VLSI Design 2009: 221-226 |
2008 |
18 | EE | Dong Xiang,
Yi Pan,
Qi Wang,
Zhen Chen:
Deadlock-Free Fully Adaptive Routing in 2-Dimensional Tori Based on New Virtual Network Partitioning Scheme.
ICDCS 2008: 454-461 |
17 | EE | Dongsheng Peng,
Weidong Liu,
Chuang Lin,
Zhen Chen,
Xuehai Peng:
Enhancing Tit-for-Tat Strategy to Cope with Free-Riding in Unreliable P2P Networks.
ICIW 2008: 336-341 |
16 | EE | Fachao Deng,
An'an Luo,
Yaokun Zhang,
Zhen Chen,
Xuehai Peng,
Xin Jiang,
Dongsheng Peng:
TNC-UTM: A Holistic Solution to Secure Enterprise Networks.
ICYCS 2008: 2240-2245 |
15 | EE | Dongsheng Peng,
Weidong Liu,
Chuang Lin,
Zhen Chen,
Jiaxing Song:
A loosely synchronized gossip-based algorithm for aggregate information computation.
LCN 2008: 451-455 |
14 | EE | Yixin Jiang,
Chuang Lin,
Hao Yin,
Zhen Chen:
A mutual authentication and privacy mechanism for WLAN security.
Wireless Communications and Mobile Computing 8(1): 101-112 (2008) |
2007 |
13 | EE | Hui Zhang,
Li Tang,
Zhen Chen,
Jun Li:
Empirical Study on Multi-Path Benefits on Interactive Video.
ICME 2007: 2154-2157 |
12 | EE | Li Tang,
Zhijie Sun,
Zhen Chen,
Jun Li:
On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing.
ICNS 2007: 95 |
11 | EE | Jia Ni,
Chuang Lin,
Zhen Chen,
Peter D. Ungsunan:
A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor.
ICPP 2007: 16 |
10 | EE | An'an Luo,
Chuang Lin,
Zhen Chen,
Xuchai Peng,
Peter D. Ungsunan:
TNC-compatible NAC System implemented on Network Processor.
LCN 2007: 1069-1075 |
2006 |
9 | EE | Chengchen Hu,
Zhen Liu,
Zhen Chen,
Bin Liu:
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System.
FSKD 2006: 743-752 |
8 | EE | Huanying Zou,
Chuang Lin,
Hao Yin,
Zhen Chen,
Feng Qiu,
Xuening Liu:
Optimal Priority Packetization with Multi-layer UEP for Video Streaming over Wireless Network.
PCM 2006: 442-449 |
7 | EE | Zhen Chen,
Pei Yu:
Double-Hopf bifurcation in an oscillator with External Forcing and Time-Delayed Feedback Control.
I. J. Bifurcation and Chaos 16(12): 3523-3537 (2006) |
2005 |
6 | EE | Zhen Chen,
Chuang Lin,
Jia Ni,
Dong-Hua Ruan,
Bo Zheng,
Yixin Jiang:
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN.
LCN 2005: 748-755 |
2004 |
5 | | Yixin Jiang,
Chuang Lin,
Zhen Chen,
Hao Yin:
Using Petri Nets to Verify Security Policies in Mandatory Access Control Model.
IRI 2004: 271-276 |
4 | | Yixin Jiang,
Chuang Lin,
Zhiguang Shan,
Zhen Chen:
Modeling and Performance Analysis of Network-Based Intrusion Detection Cluster.
ISCA PDCS 2004: 530-535 |
2003 |
3 | EE | Zhen Chen,
Zengji Liu,
Zhiliang Qiu:
Isomorphism of Cyclic Cubes and Bidi Shufflenet.
AINA 2003: 248-251 |
2 | EE | Zhen Chen,
Zengji Liu,
Zhiliang Qiu:
A Deadlock-Free Wormhole Routing Scheme in the Pan-Mesh.
AINA 2003: 825-829 |
1997 |
1 | | Raman Kannan,
Zhen Chen,
William Schroeder,
Bo Cao,
Rajesh Rao,
Joe Occoner,
Veenatejaswini Sanjivi,
Kavitha Challapalli,
Nanditha Gade,
Bandish Chitre:
Disha: A Direction Toward Software Engineering on the Net.
WebNet 1997 |