Johnny Wong
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
60 | EE | Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong: Intrusion response cost assessment methodology. ASIACCS 2009: 388-391 |
2008 | ||
59 | Sumi Helal, Simanta Mitra, Johnny S. Wong, Carl K. Chang, Mounir Mokhtari: Smart Homes and Health Telematics, 6th International Conference, ICOST 2008, Ames, IA, USA, June 28-July 2, 2008, Proceedings Springer 2008 | |
58 | EE | José M. Reyes Álamo, Johnny Wong, Ryan Babbitt, Carl K. Chang: MISS: Medicine Information Support System in the Smart Home Environment. ICOST 2008: 185-199 |
57 | EE | Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong: On Evaluation of Response Cost for Intrusion Response Systems. RAID 2008: 390-391 |
56 | EE | Benjamin Uphoff, Johnny S. Wong: An agent-based framework for intrusion detection alert verification and event correlation. IJSN 3(3): 193-200 (2008) |
55 | EE | Aditya Mathur, Johnny Wong: Message from the guest editors. Journal of Systems and Software 81(10): 1623-1624 (2008) |
54 | EE | Mu Zhang, Johnny Wong, Wallapak Tavanapong, Jung-Hwan Oh, Piet C. de Groen: Deadline-constrained media uploading systems. Multimedia Tools Appl. 38(1): 51-74 (2008) |
2007 | ||
53 | EE | Natalia Stakhanova, Samik Basu, Johnny Wong: A Cost-Sensitive Model for Preemptive Intrusion Response Systems. AINA 2007: 428-435 |
52 | EE | Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong: Specification Synthesis for Monitoring and Analysis of MANET Protocols. AINA Workshops (1) 2007: 183-187 |
51 | EE | Xia Wang, Johnny Wong: An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks. COMPSAC (1) 2007: 39-48 |
50 | EE | Ryan Babbitt, Johnny Wong, Carl K. Chang: Towards the Modeling of Personal Privacy in Ubiquitous Computing Environments. COMPSAC (2) 2007: 695-699 |
49 | EE | Sae Hwang, Jung-Hwan Oh, Wallapak Tavanapong, Johnny Wong, Piet C. de Groen: Polyp Detection in Colonoscopy Video using Elliptical Shape Feature. ICIP (2) 2007: 465-468 |
48 | EE | Danyu Liu, Yu Cao, Kihwan Kim, Sean Stanek, Bancha Doungratanaex-Chai, Kungen Lin, Wallapak Tavanapong, Johnny S. Wong, Jung-Hwan Oh, Piet C. de Groen: Arthemis: Annotation software in an integrated capturing and analysis system for colonoscopy. Computer Methods and Programs in Biomedicine 88(2): 152-163 (2007) |
47 | EE | Ying Cai, Ashwin Natarajan, Johnny Wong: On scheduling of peer-to-peer video services. IEEE Journal on Selected Areas in Communications 25(1): 140-145 (2007) |
2006 | ||
46 | EE | Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong: Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. DASC 2006: 333-340 |
45 | EE | Chanjun Yang, Jianming Zhou, Wensheng Zhang, Johnny Wong: Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based. Infoscale 2006: 27 |
44 | EE | Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Guy G. Helmer, Vasant Honavar, Les Miller, Robyn R. Lutz, Mark Slagell: Towards the automatic generation of mobile agents for distributed intrusion detection system. Journal of Systems and Software 79(1): 1-14 (2006) |
2005 | ||
43 | EE | Sae Hwang, Jung-Hwan Oh, JeongKyu Lee, Yu Cao, Wallapak Tavanapong, Danyu Liu, Johnny Wong, Piet C. de Groen: Automatic measurement of quality metrics for colonoscopy videos. ACM Multimedia 2005: 912-921 |
42 | EE | Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov: Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. ICDCS Workshops 2005: 203-209 |
2004 | ||
41 | EE | Yu Cao, Dalei Li, Wallapak Tavanapong, Jung-Hwan Oh, Johnny Wong, Piet C. de Groen: Parsing and browsing tools for colonoscopy videos. ACM Multimedia 2004: 844-851 |
40 | EE | Yu Cao, Wallapak Tavanapong, Dalei Li, Jung-Hwan Oh, Piet C. de Groen, Johnny S. Wong: A Visual Model Approach for Parsing Colonoscopy Videos. CIVR 2004: 160-169 |
39 | EE | Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri: Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. ICDCIT 2004: 468 |
38 | Yu Cao, Wallapak Tavanapong, Kihwan Kim, Johnny Wong, Jung-Hwan Oh, Piet C. de Groen: A framework for parsing colonoscopy videos for semantic units. ICME 2004: 1879-1882 | |
37 | Ying Cai, Zhan Chen, Wallapak Tavanapong, Johnny Wong: Providing scalable on-demand video services for heterogeneous receivers. ICME 2004: 643-646 | |
36 | Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong, Ying Cai: A Reputation-based Trust Management in Peer-to-Peer Network Systems. ISCA PDCS 2004: 510-515 | |
35 | EE | Wanida Putthividhya, Minh Tran, Wallapak Tavanapong, Johnny S. Wong: Core selection with end-to-end QoS support. SAC 2004: 328-333 |
34 | EE | Minh Tran, Wanida Putthividhya, Wallapak Tavanapong, Johnny S. Wong: A Case for a Generalized Periodic Broadcast Server: Design, Analysis, and Implementation. SAINT 2004: 127-134 |
33 | EE | Ying Cai, Zhan Chen, Johnny S. Wong: Leveraging Broadband Access for True On-Demand Delivery of Internet Videos. SAINT 2004: 171-177 |
2003 | ||
32 | EE | Zhan Chen, Jing Ding, Mu Zhang, Wallapak Tavanapong, Johnny S. Wong: Hierarchical Clustering-Merging for Multidimensional Index Structures. CIVR 2003: 81-90 |
31 | EE | Shawn P. Laird, Johnny S. Wong, William J. Schaller, Bradley James Erickson, Piet C. de Groen: Design and implementation of an Internet-based medical image viewing system. Journal of Systems and Software 66(2): 167-181 (2003) |
30 | EE | Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller, Yanxin Wang: Lightweight agents for intrusion detection. Journal of Systems and Software 67(2): 109-122 (2003) |
2002 | ||
29 | EE | Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller: Automated discovery of concise predictive rules for intrusion detection. Journal of Systems and Software 60(3): 165-175 (2002) |
28 | EE | Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn R. Lutz: A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Requir. Eng. 7(4): 207-220 (2002) |
2001 | ||
27 | EE | Guy G. Helmer, Johnny S. Wong, Subhasri Madaka: Anomalous intrusion detection system for hostile Java applets. Journal of Systems and Software 55(3): 273-286 (2001) |
26 | EE | Johnny Wong, Guy G. Helmer, Venkatraman Naganathan, Sriniwas Polavarapu, Vasant Honavar, Les Miller: SMART mobile agent facility. Journal of Systems and Software 56(1): 9-22 (2001) |
25 | EE | Armin R. Mikler, Vasant Honavar, Johnny S. Wong: Autonomous agents for coordinated distributed parameterized heuristic routing in large dynamic communication networks. Journal of Systems and Software 56(3): 231-246 (2001) |
2000 | ||
24 | Prashant Pai, Leslie L. Miller, Vasant Honavar, Johnny Wong, Sree Nilakanta: Supporting organizational knowledge management with agents. IRMA Conference 2000: 325-329 | |
23 | EE | Manjula Kommareddy, Johnny Wong: Non-blocking distributed transaction processing system. Journal of Systems and Software 54(1): 65-76 (2000) |
1999 | ||
22 | Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller: Feature Selection Using a Genetic Algorithm for Intrusion Detection. GECCO 1999: 1781 | |
1997 | ||
21 | Armin R. Mikler, Johnny S. Wong, Vasant Honavar: Quo Vadis - A Framework for Intelligent Routing in Large Communication Networks. Journal of Systems and Software 37(1): 61-73 (1997) | |
20 | Johnny Wong, Satish Rao, Naveen Ramaiah: A Multimedia Presentation Toolkit for the World Wide Web. Softw., Pract. Exper. 27(4): 425-446 (1997) | |
1996 | ||
19 | Armin R. Mikler, Vasant Honavar, Johnny S. Wong: Analysis of Utility-Theoretic Heuristics for Intelligent Adaptive Network Routing. AAAI/IAAI, Vol. 1 1996: 96-101 | |
18 | Johnny Wong, Sriram Kini, Kishore Doobagunta: Synchronization in Specification-based Multimedia Presentations. Softw., Pract. Exper. 26(1): 71-81 (1996) | |
17 | Johnny Wong, Deepa S. Parthasarathy: Remote Access to Multimedia Databases: An Object Oriented Approach. Softw., Pract. Exper. 26(6): 677-704 (1996) | |
1995 | ||
16 | EE | Priyamvadha Thambu, Johnny S. Wong: An efficient token-based mutual exclusion algorithm in a distributed system. Journal of Systems and Software 28(3): 267-276 (1995) |
15 | EE | Johnny Wong, Priyamvadha Thambu, Rick Stoen: A fault-tolerant algorithm for mutual exclusion in a distributed system. Journal of Systems and Software 29(2): 121-134 (1995) |
14 | Sunil Magavi, Johnny Wong, Prakash Bodla: Design and Implementation of Heterogeneous Distributed Multimedia System using Mosaic GSQL. Softw., Pract. Exper. 25(11): 1223-1241 (1995) | |
1994 | ||
13 | EE | Pinaki Shah, Johnny Wong: Transaction management in an object-oriented data base system. Journal of Systems and Software 24(2): 115-124 (1994) |
12 | EE | Waqar Hague, Johnny S. Wong: Distributed real-time nested transactions. Journal of Systems and Software 27(2): 85-95 (1994) |
11 | Johnny Wong, William Marshall, Robert Goodman: Remote Database Access in the Distributed Computing Environment. Softw., Pract. Exper. 24(4): 421-434 (1994) | |
1993 | ||
10 | EE | Muruganandan Kumar, Johnny Wong: Transaction management in design databases. Journal of Systems and Software 22(1): 3-15 (1993) |
1992 | ||
9 | EE | Linda M. Null, Johnny S. Wong: The DIAMOND Security Policy for Object-Oriented Databases. ACM Conference on Computer Science 1992: 49-56 |
8 | EE | Tony T. Y. Suen, Johnny S. Wong: Efficient Task Migration Algorithm for Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 3(4): 488-499 (1992) |
7 | EE | Robyn R. Lutz, Johnny S. Wong: Detecting Unsafe Error Recovery Schedules. IEEE Trans. Software Eng. 18(8): 749-760 (1992) |
1991 | ||
6 | EE | Muruganandan Kumar, Johnny Wong: A Data Model for Design Objects. DASFAA 1991: 274-282 |
5 | EE | Muruganandan Kumar, Johnny Wong: Transaction models for design environments. Journal of Systems and Software 16(3): 219-228 (1991) |
1990 | ||
4 | EE | Linda M. Null, Johnny S. Wong: Data Security for Object-Oriented Programming Systems Based on Inference Engines (Abstract). ACM Conference on Computer Science 1990: 411 |
1989 | ||
3 | EE | Johnny S. Wong, Linda M. Null: Intelligent interfaces for secure multilevel database systems. IEA/AIE (2) 1989: 977-981 |
2 | EE | Linda M. Null, Johnny Wong: A unified approach for multilevel database security based on inference engines. SIGCSE 1989: 108-111 |
1986 | ||
1 | Johnny Wong, H. R. Hwa: Q Queueing Model for Evaluating 95 Percentile of s-Delay in ISDN. ICCC 1986: 606-611 |