dblp.uni-trier.dewww.uni-trier.de

Ruoming Pang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
12EERuoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson: binpac: a yacc for writing application protocol parsers. Internet Measurement Conference 2006: 289-300
11EERuoming Pang, Mark Allman, Vern Paxson, Jason Lee: The devil and packet trace anonymization. Computer Communication Review 36(1): 29-38 (2006)
2005
10EERuoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney: A First Look at Modern Enterprise Traffic. Internet Measurment Conference 2005: 15-28
9EEJosé Duato, Olav Lysne, Ruoming Pang, Timothy Mark Pinkston: Part I: A Theory for Deadlock-Free Dynamic Network Reconfiguration. IEEE Trans. Parallel Distrib. Syst. 16(5): 412-427 (2005)
2004
8EERuoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson: Characteristics of internet background radiation. Internet Measurement Conference 2004: 27-40
7EELimin Wang, KyoungSoo Park, Ruoming Pang, Vivek S. Pai, Larry L. Peterson: Reliability and Security in the CoDeeN Content Distribution Network. USENIX Annual Technical Conference, General Track 2004: 171-184
6EEVivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming Pang, Larry L. Peterson: The dark side of the Web: an open proxy's view. Computer Communication Review 34(1): 57-62 (2004)
2003
5EERuoming Pang, Vern Paxson: A high-level programming environment for packet trace anonymization and transformation. SIGCOMM 2003: 339-351
4EETimothy Mark Pinkston, Ruoming Pang, José Duato: Deadlock-Free Dynamic Reconfiguration Schemes for Increased Network Dependability. IEEE Trans. Parallel Distrib. Syst. 14(8): 780-794 (2003)
2002
3EEYuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. Information Hiding 2002: 400-414
2EEXiaohu Qie, Ruoming Pang, Larry L. Peterson: Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. OSDI 2002
2000
1EERuoming Pang, Timothy Mark Pinkston, José Duato: The Double Scheme: Deadlock-Free Dynamic Reconfiguration of Cut-Through Networks. ICPP 2000: 439-448

Coauthor Index

1Mark Allman [10] [11]
2Paul Barford [8]
3Mike Bennett [10]
4Matthew Cary [3]
5Yuqun Chen [3]
6José Duato [1] [4] [9]
7Mariusz H. Jakubowski [3]
8Jason Lee [10] [11]
9Olav Lysne [9]
10Vivek S. Pai [6] [7]
11KyoungSoo Park [6] [7]
12Vern Paxson [5] [8] [10] [11] [12]
13Larry L. Peterson [2] [6] [7] [8] [12]
14Timothy Mark Pinkston [1] [4] [9]
15Xiaohu Qie [2]
16Saurabh Sinha [3]
17Robin Sommer [12]
18Brian Tierney [10]
19Ramarathnam Venkatesan [3]
20Limin Wang [6] [7]
21Vinod Yegneswaran [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)