2006 |
12 | EE | Ruoming Pang,
Vern Paxson,
Robin Sommer,
Larry L. Peterson:
binpac: a yacc for writing application protocol parsers.
Internet Measurement Conference 2006: 289-300 |
11 | EE | Ruoming Pang,
Mark Allman,
Vern Paxson,
Jason Lee:
The devil and packet trace anonymization.
Computer Communication Review 36(1): 29-38 (2006) |
2005 |
10 | EE | Ruoming Pang,
Mark Allman,
Mike Bennett,
Jason Lee,
Vern Paxson,
Brian Tierney:
A First Look at Modern Enterprise Traffic.
Internet Measurment Conference 2005: 15-28 |
9 | EE | José Duato,
Olav Lysne,
Ruoming Pang,
Timothy Mark Pinkston:
Part I: A Theory for Deadlock-Free Dynamic Network Reconfiguration.
IEEE Trans. Parallel Distrib. Syst. 16(5): 412-427 (2005) |
2004 |
8 | EE | Ruoming Pang,
Vinod Yegneswaran,
Paul Barford,
Vern Paxson,
Larry L. Peterson:
Characteristics of internet background radiation.
Internet Measurement Conference 2004: 27-40 |
7 | EE | Limin Wang,
KyoungSoo Park,
Ruoming Pang,
Vivek S. Pai,
Larry L. Peterson:
Reliability and Security in the CoDeeN Content Distribution Network.
USENIX Annual Technical Conference, General Track 2004: 171-184 |
6 | EE | Vivek S. Pai,
Limin Wang,
KyoungSoo Park,
Ruoming Pang,
Larry L. Peterson:
The dark side of the Web: an open proxy's view.
Computer Communication Review 34(1): 57-62 (2004) |
2003 |
5 | EE | Ruoming Pang,
Vern Paxson:
A high-level programming environment for packet trace anonymization and transformation.
SIGCOMM 2003: 339-351 |
4 | EE | Timothy Mark Pinkston,
Ruoming Pang,
José Duato:
Deadlock-Free Dynamic Reconfiguration Schemes for Increased Network Dependability.
IEEE Trans. Parallel Distrib. Syst. 14(8): 780-794 (2003) |
2002 |
3 | EE | Yuqun Chen,
Ramarathnam Venkatesan,
Matthew Cary,
Ruoming Pang,
Saurabh Sinha,
Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Information Hiding 2002: 400-414 |
2 | EE | Xiaohu Qie,
Ruoming Pang,
Larry L. Peterson:
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software.
OSDI 2002 |
2000 |
1 | EE | Ruoming Pang,
Timothy Mark Pinkston,
José Duato:
The Double Scheme: Deadlock-Free Dynamic Reconfiguration of Cut-Through Networks.
ICPP 2000: 439-448 |