default search action
Yennun Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Chiu-Han Hsiao, Frank Yeong-Sung Lin, Tzu-Lung Sun, Yen-Yen Liao, Chih-Horng Wu, Yu-Chun Lai, Hung-Pei Wu, Pin-Ruei Liu, Bo-Ren Xiao, Chien-Hung Chen, Yennun Huang:
Precision and Robust Models on Healthcare Institution Federated Learning for Predicting HCC on Portal Venous CT Images. IEEE J. Biomed. Health Informatics 28(8): 4674-4687 (2024) - [c88]Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yi-Chun Liao, Yennun Huang:
IPMES: A Tool for Incremental TTP Detection Over the System Audit Event Stream. DSN 2024: 265-273 - [c87]Lu-Ching Wang, Yen-Cheng Chu, Yennun Huang, Feng-Li Lian:
Enhancement on Target-Gripper Alignment: A Tomato Harvesting Robot with Dual-Camera Image-Based Visual Servoing. ICRA 2024: 13611-13617 - 2023
- [j29]Bo-Chen Tai, Yao-Tung Tsou, Szu-Chuang Li, Yennun Huang, Pei-Yuan Tsai, Yu-Cheng Tsai:
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy. IEEE Trans. Serv. Comput. 16(5): 3812-3826 (2023) - [c86]Jhan-Yu Liao, Shang-Chih Lin, Shun-Feng Su, Yennun Huang:
Prediction of Workpiece Film Thickness via Multi-Region Segmented Model of Painting Process Parameters. IEEM 2023: 1022-1026 - 2022
- [j28]Chiu-Han Hsiao, Ping-Cherng Lin, Li-An Chung, Frank Yeong-Sung Lin, Feng-Jung Yang, Shao-Yu Yang, Chih-Horng Wu, Yennun Huang, Tzu-Lung Sun:
A deep learning-based precision and automatic kidney segmentation system using efficient feature pyramid networks in computed tomography images. Comput. Methods Programs Biomed. 221: 106854 (2022) - [j27]Chiu-Han Hsiao, Tzu-Lung Sun, Ping-Cherng Lin, Tsung-Yu Peng, Yu-Hsin Chen, Chieh-Yun Cheng, Feng-Jung Yang, Shao-Yu Yang, Chih-Horng Wu, Frank Yeong-Sung Lin, Yennun Huang:
A deep learning-based precision volume calculation approach for kidney and tumor segmentation on computed tomography images. Comput. Methods Programs Biomed. 221: 106861 (2022) - [j26]Hong-Wei Li, Yu-Sung Wu, Yennun Huang:
On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events. J. Netw. Syst. Manag. 30(2): 28 (2022) - [j25]Chiu-Han Hsiao, Yean-Fu Wen, Frank Yeong-Sung Lin, Yu-Fang Chen, Yennun Huang, Yang-Che Su, Ya-Syuan Wu:
An Optimization-Based Orchestrator for Resource Access and Operation Management in Sliced 5G Core Networks. Sensors 22(1): 100 (2022) - [j24]Trang-Thi Ho, Khoa-Dang Tran, Yennun Huang:
FedSGDCOVID: Federated SGD COVID-19 Detection under Local Differential Privacy Using Chest X-ray Images and Symptom Information. Sensors 22(10): 3728 (2022) - [c85]Chiu-Han Hsiao, Po-Chun Yu, Chia-Ying Hsieh, Bing-Zi Zhong, Yu-Ling Tsai, Hao-Min Cheng, Wei-Lun Chang, Frank Yeong-Sung Lin, Yennun Huang:
A Machine Learning-Based Model for Predicting the Risk of Cardiovascular Disease. AINA (1) 2022: 364-374 - [c84]Chiu-Han Hsiao, Tsung-Yu Peng, Wei-Chieh Huang, Hsin-I Teng, Tse-Min Lu, Frank Yeong-Sung Lin, Yennun Huang:
A Federated Learning-Based Precision Prediction Model for External Elastic Membrane and Lumen Boundary Segmentation in Intravascular Ultrasound Images. AINA (1) 2022: 375-386 - [c83]Chieh-Ming Chang, Shang-Chih Lin, Yennun Huang:
Dynamic Scheduling Based on Self-Organizing Wireless Sensing System for Work in Process of Production Line. ICCE-TW 2022: 177-178 - [c82]Shang-Chih Lin, Lu-Yo Kuo, Chieh-Ming Chang, Yennun Huang:
A Smart Wearable Device for Abnormal Event Handling of Multiple Machines in Modern Factories. ICCE-TW 2022: 179-180 - [c81]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Pang-Chieh Wang:
Examining the Utility of Differentially Private Synthetic Data Generated using Variational Autoencoder with TensorFlow Privacy. PRDC 2022: 236-241 - 2021
- [j23]Chiu-Han Hsiao, Frank Yeong-Sung Lin, Evana Szu-Han Fang, Yu-Fang Chen, Yean-Fu Wen, Yennun Huang, Yang-Che Su, Ya-Syuan Wu, Hsin-Yi Kuo:
Optimization-Based Resource Management Algorithms with Considerations of Client Satisfaction and High Availability in Elastic 5G Network Slices. Sensors 21(5): 1882 (2021) - [j22]Chiu-Han Hsiao, Frank Yeong-Sung Lin, Hao-Jyun Yang, Yennun Huang, Yu-Fang Chen, Ching-Wen Tu, Si-Yao Zhang:
Optimization-Based Approaches for Minimizing Deployment Costs for Wireless Sensor Networks with Bounded Estimation Errors. Sensors 21(21): 7121 (2021) - [j21]Trang-Thi Ho, Yennun Huang:
Stock Price Movement Prediction Using Sentiment Analysis and CandleStick Chart Representation. Sensors 21(23): 7957 (2021) - [j20]Yao-Tung Tsou, Mansour Naser Alraja, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, Pei-Yuan Tsai:
(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy. Serv. Oriented Comput. Appl. 15(3): 175-185 (2021) - [c80]Chiu-Han Hsiao, Ming-Chi Tsai, Frank Yeong-Sung Lin, Ping-Cherng Lin, Feng-Jung Yang, Shao-Yu Yang, Sung-Yi Wang, Pin-Ruei Liu, Yennun Huang:
Automatic Kidney Volume Estimation System Using Transfer Learning Techniques. AINA (2) 2021: 370-381 - [c79]Shang-Chih Lin, Shun-Feng Su, Yennun Huang:
Smart Machine Box with Early Failure Detection for Automatic Tool Changer Subsystem of CNC Machine Tool in the Production Line. IECON 2021: 1-8 - [c78]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang:
A VAE Conversion Method for Private Data Linkage. PRDC 2021: 161-164 - [i1]Trang-Thi Ho, Yennun Huang:
DPCOVID: Privacy-Preserving Federated Covid-19 Detection. CoRR abs/2110.13760 (2021) - 2020
- [j19]Yao-Tung Tsou, Hao Zhen, Xiyu Jiang, Yennun Huang, Sy-Yen Kuo:
DPARM: Differentially Private Association Rules Mining. IEEE Access 8: 142131-142147 (2020) - [c77]Hung-Chung Li, Pei-Li Sun, Yennun Huang:
A Mesopic Lighting Evaluation Model Based on 1D Convolutional Neural Networks. ICCE-TW 2020: 1-2 - [c76]Hung-Chung Li, Pei-Li Sun, Wei-Chih Su, Hung-Shing Chen, Chia-Pin Chueh, Yennun Huang:
Machine Learning Models to Predict Visual Color Difference of Fluorescent Objects under Various Illumination Conditions. ICCE-TW 2020: 1-2 - [c75]Shang-Chih Lin, Chia-Wei Jen, Shun-Feng Su, Yennun Huang:
A Signal Fusion-based ANN Algorithm for Fault Diagnosis of Rotating Machinery. ICSSE 2020: 1-6 - [c74]Shan-Ling Chen, Shang-Chih Lin, Yennun Huang, Chia-Wei Jen, Zheng-Long Lin, Shun-Feng Su:
A Vision-based Dual-axis Positioning System with YOLOv4 and Improved Genetic Algorithms. IRC 2020: 127-134 - [c73]Alberto Avritzer, Domenico Cotroneo, Yennun Huang, Kishor S. Trivedi:
Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract. ISSRE Workshops 2020: 319-320 - [p1]Alberto Avritzer, Domenico Cotroneo, Yennun Huang, Kishor S. Trivedi:
Software Aging and Rejuvenation: A Genesis. Handbook of Software Aging and Rejuvenation 2020: 3-19 - [e1]Yennun Huang, Irwin King, Tie-Yan Liu, Maarten van Steen:
WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020. ACM / IW3C2 2020, ISBN 978-1-4503-7023-3 [contents]
2010 – 2019
- 2019
- [j18]Chien-Hung Chen, Ting-Yuan Hsia, Yennun Huang, Sy-Yen Kuo:
Data Prefetching and Eviction Mechanisms of In-Memory Storage Systems Based on Scheduling for Big Data Processing. IEEE Trans. Parallel Distributed Syst. 30(8): 1738-1752 (2019) - [c72]Szu-Chuang Li, Bo-Chen Tai, Yennun Huang:
Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular Data. PRDC 2019: 198-206 - [c71]Zheng-Wei Wu, Shang-Chih Lin, Po-Chun Hu, Shun-Feng Su, Yennun Huang:
Metalworking Industry: Quality Management via Edge Computing-Based Cloud Monitoring System. SOCA 2019: 133-138 - 2018
- [c70]Rua-Huan Tsaih, Shin-Ying Huang, Mao-Ci Lian, Yennun Huang:
ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment. DSC 2018: 1-6 - [c69]Yu-Hsin Hung, Hong-Wei Li, Yu-Sung Wu, Bing-Jhong Jheng, Yennun Huang:
HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and Replay. DSN Workshops 2018: 75-76 - [c68]Shang-Chih Lin, Yu Tsao, Shun-Feng Su, Yennun Huang:
An Industrial IoT Analysis System Based on Machining Data of Metal Materials. iFUZZY 2018: 225-230 - [c67]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Neeraj Suri, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. PRDC 2018: 25-33 - [c66]Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri:
InfoLeak: Scheduling-Based Information Leakage. PRDC 2018: 44-53 - [c65]Bo-Cheng Lin, Shang-Hong Wu, Yao-Tung Tsou, Yennun Huang:
PPDCA: Privacy-preserving crowdsensing data collection and analysis with randomized response. WCNC 2018: 1-6 - 2017
- [j17]Hong-Wei Li, Yu-Sung Wu, Yi-Yung Chen, Chieh-Min Wang, Yennun Huang:
Application Execution Time Prediction for Effective CPU Provisioning in Virtualization Environment. IEEE Trans. Parallel Distributed Syst. 28(11): 3074-3088 (2017) - [c64]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang:
K-Aggregation: Improving Accuracy for Differential Privacy Synthetic Dataset by Utilizing K-Anonymity Algorithm. AINA 2017: 772-779 - [c63]Chien-Hung Chen, Ting-Yuan Hsia, Yennun Huang, Sy-Yen Kuo:
Scheduling-Aware Data Prefetching for Data Processing Services in Cloud. AINA 2017: 835-842 - [c62]Kang-Cheng Chen, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yao-Tung Tsou, Yennun Huang, Chia-Ming Lin:
Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release. AINA 2017: 1130-1137 - [c61]Denis N. Butusov, Timur I. Karimov, Dmitry I. Kaplun, Artur I. Karimov, Yennun Huang, Szu-Chuang Li:
The choice between delta and shift operators for low-precision data representation. FRUCT 2017: 46-52 - [c60]Yao-Tung Tsou, Hung-Li Chen, Jia-Yang Chen, Yennun Huang, Pang-Chieh Wang:
Differential privacy-based data de-identification protection and risk evaluation system. ICTC 2017: 416-421 - [c59]Yung-Li Hu, Chu-Yu Wang, Ching-Kai Kao, Shao-Yu Chang, David S. L. Wei, Yennun Huang, Ing-Yi Chen, Sy-Yen Kuo:
Toward Fog-Based Event-Driven Services for Internet of Vehicles: Design and Evaluation. IOV 2017: 201-212 - [c58]Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. PRDC 2017: 339-347 - [c57]Szu-Chuang Li, Yennun Huang, Bo-Chen Tai, Chi-Ta Lin:
Using Data Mining Methods to Detect Simulated Intrusions on a Modbus Network. SC² 2017: 143-148 - 2016
- [c56]Chieh-Ming Chang, Szu-Chuang Li, Yennun Huang:
Crowdsensing route reconstruction using portable bluetooth beacon-based two-way network. UbiComp Adjunct 2016: 265-268 - [c55]Yennun Huang, Szu-Chuang Li:
Overview of research center for information technology innovation in Taiwan Academia Sinica. IWBIS 2016: 1-12 - [c54]Chieh-Ming Chang, Szu-Chuang Li, Yennun Huang:
Crowdsensing traces visualization in bluetooth beacon-based sensor network using wearable device. SIGGRAPH Asia Posters 2016: 5 - 2015
- [j16]Yao-Tung Tsou, Yung-Li Hu, Yennun Huang, Sy-Yen Kuo:
SFTopk: Secure Functional Top-k Query via Untrusted Data Storage. IEEE Access 3: 2875-2890 (2015) - [c53]He-Ming Ruan, Ming-Hwa Tsai, Yennun Huang, Yen-Hua Liao, Chin-Laung Lei:
Discovery of De-identification Policies Considering Re-identification Risks and Information Loss. AsiaJCIS 2015: 69-76 - [c52]Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S. L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo:
A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications. ICA3PP (3) 2015: 771-784 - [c51]Shin-Ying Huang, Fang Yu, Rua-Huan Tsaih, Yennun Huang:
Network-traffic anomaly detection with incremental majority learning. IJCNN 2015: 1-8 - 2014
- [c50]Shin-Ying Huang, Yennun Huang, Neeraj Suri:
Event Pattern Discovery on IDS Traces of Cloud Services. BDCloud 2014: 25-32 - [c49]Shin-Ying Huang, Fang Yu, Rua-Huan Tsaih, Yennun Huang:
Resistant learning on the envelope bulk for identifying anomalous patterns. IJCNN 2014: 3303-3310 - [c48]Yao-Tung Tsou, Yung-Li Hu, Yennun Huang, Sy-Yen Kuo:
PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks. SRDS 2014: 191-200 - 2013
- [c47]Yung-Li Hu, Wei-Bing Su, Li-ying Wu, Yennun Huang, Sy-Yen Kuo:
Design of event-based Intrusion Detection System on OpenFlow Network. DSN 2013: 1-2 - [c46]Shin-Ying Huang, Yennun Huang:
Network traffic anomaly detection based on growing hierarchical SOM. DSN 2013: 1-2 - [c45]Fyodor Yarochkin, Vladimir Kropotov, Yennun Huang, Guo-Kai Ni, Sy-Yen Kuo, Ing-Yi Chen:
Investigating DNS traffic anomalies for malicious activities. DSN Workshops 2013: 1-7 - [c44]Yung-Li Hu, Wei-Bing Su, Yennun Huang, Ing-Yi Chen, Sy-Yen Kuo:
Dependable Architecture of RFID Middleware on Networked RFID Systems. GreenCom/iThings/CPScom 2013: 1881-1884 - [c43]Shin-Ying Huang, Yennun Huang:
Network Forensic Analysis Using Growing Hierarchical SOM. ICDM Workshops 2013: 536-543 - [c42]Fyodor Yarochkin, Yennun Huang, Yung-Li Hu, Sy-Yen Kuo:
Mining Large Network Reconnaissance Data. PRDC 2013: 183-187 - [c41]Chieh-Ming Chang, Yennun Huang:
ArtTorchlight: an exploratory way of viewing paintings using handheld projectors and smart phones. SIGGRAPH ASIA Posters 2013: 36 - 2012
- [j15]Shih-Yao Dai, Fyodor Yarochkin, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo:
Holography: a behavior-based profiler for malware analysis. Softw. Pract. Exp. 42(9): 1107-1136 (2012) - 2011
- [c40]Shih-Yao Dai, Fyodor Yarochkin, Sy-Yen Kuo, Ming-Wei Wu, Yennun Huang:
Malware Profiler Based on Innovative Behavior-Awareness Technique. PRDC 2011: 314-319
2000 – 2009
- 2009
- [j14]Yih-Farn Chen, Yennun Huang, Rittwik Jana, Hongbo Jiang, Michael Rabinovich, Jeremy Rahe, Bin Wei, Zhen Xiao:
Towards capacity and profit optimization of video-on-demand services in a peer-assisted IPTV platform. Multim. Syst. 15(1): 19-32 (2009) - [c39]Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo:
Xprobe2++: Low volume remote network information gathering tool. DSN 2009: 205-210 - [c38]Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo:
Holography: A Hardware Virtualization Tool for Malware Analysis. PRDC 2009: 263-268 - 2008
- [c37]Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo:
Towards Adaptive Covert Communication System. PRDC 2008: 153-159 - 2007
- [j13]Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo Jiang, Michael Rabinovich, Amy R. Reibman, Bin Wei, Zhen Xiao:
Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks. IEEE J. Sel. Areas Commun. 25(1): 131-139 (2007) - [j12]Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang:
Self-Healing Spyware: Detection, and Remediation. IEEE Trans. Reliab. 56(4): 588-596 (2007) - [c36]Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yennun Huang, Serban Jora, John Murray, Bin Wei:
Clicker - An IPTV Remote Control in Your Cell Phone. ICME 2007: 1055-1058 - 2006
- [c35]Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo:
A Stateful Approach to Spyware Detection and Removal. PRDC 2006: 173-182 - [c34]Ming-Wei Wu, Yennun Huang, Ing-Yi Chen, Shyue-Kung Lu, Sy-Yen Kuo:
A Scalable Port Forwarding for P2P-Based Wi-Fi Applications. WASA 2006: 26-37 - 2005
- [c33]Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. PRDC 2005: 133-139 - [c32]Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo:
A Multi-Faceted Approach towards Spam-Resistible Mail. PRDC 2005: 208-218 - 2004
- [j11]Deron Liang, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Woei-Jyh Lee, Timothy K. Tsai, Chung-Yih Wang:
NT-SwiFT: software implemented fault tolerance on Windows NT. J. Syst. Softw. 71(1-2): 127-141 (2004) - [c31]Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46 - 2001
- [c30]Chi-Yi Lin, Sy-Yen Kuo, Yennun Huang:
A Checkpointing Tool for Palm Operating System. DSN 2001: 71-76 - [c29]Jiantao Pan, Philip Koopman, Daniel P. Siewiorek, Yennun Huang, Robert Gruber, Mimi Ling Jiang:
Robustness Testing and Hardening of CORBA ORB Implementations. DSN 2001: 141-150 - [c28]Chungyih-Yih Wang, Ching-Chi Hsu, Yennun Huang:
VORAL: A System for Voice Over IP Routing in Application Layer. IEEE Real Time Technology and Applications Symposium 2001: 165-170 - 2000
- [c27]Chi-Yi Lin, Jichiang Tsai, Sy-Yen Kuo, Yennun Huang:
Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom. ICDCS Workshop on Distributed Real-Time Systems 2000: B7-B13
1990 – 1999
- 1999
- [c26]Jeng-Ping Lin, Sy-Yen Kuo, Yennun Huang:
A cluster-based checkpointing scheme for mobile computing on wide area network. Mobile Networks and Computing 1999: 177-193 - [c25]P. Emerald Chung, Woei-Jyh Lee, Joanne Shih, Shalini Yajnik, Yennun Huang:
Fault-Injection Experiments for Distributed Objects. DOA 1999: 88-97 - [c24]P. Emerald Chung, Woei-Jyh Lee, Yennun Huang, Deron Liang, Chung-Yih Wang:
Winckp: A Transparent Checkpointing and Rollback Recovery Tool for Windows NT Applications. FTCS 1999: 220-223 - [c23]Sachin Garg, Yennun Huang, Chandra M. R. Kintala, Kishor S. Trivedi, Shalini Yajnik:
Performance and Reliability Evaluation of Passive Replication Schemes in Application Level Fault Tolerance. FTCS 1999: 322-329 - [c22]Chuan-Ching Sue, Wen-Yu Tseng, Sy-Yen Kuo, Yennun Huang:
An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks. ISCC 1999: 209-215 - [c21]Shih-Chang Wang, Hung-Yau Lin, Sy-Yen Kuo, Yennun Huang:
A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes. PRDC 1999: 210-217 - [c20]Mangesh Kasbekar, Chita R. Das, Shalini Yajnik, Reinhard Klemm, Yennun Huang:
Issues in the Design of a Reflective Library for Checkpointing C++ Objects. SRDS 1999: 224-233 - 1998
- [c19]Arash Baratloo, P. Emerald Chung, Yennun Huang, Sampath Rangarajan, Shalini Yajnik:
Filterfresh: Hot Replication of Java RMI Server Objects. COOTS 1998: 65-78 - [c18]Sampath Rangarajan, Sachin Garg, Yennun Huang:
Checkpoints-on-Demand with Active Replication. SRDS 1998: 75-83 - 1997
- [j10]Sampath Rangarajan, Yennun Huang, Satish K. Tripathi:
On the Scalability and Mean-Time to Failure of k Resilient Protocols. Acta Informatica 34(7): 543-556 (1997) - [j9]Om P. Damani, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Yi-Min Wang:
ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. Comput. Networks 29(8-13): 1019-1027 (1997) - [j8]Yi-Min Wang, Yennun Huang, W. Kent Fuchs, Chandra M. R. Kintala, Gaurav Suri:
Progressive Retry for Software Failure Recovery in Message-Passing Applications. IEEE Trans. Computers 46(10): 1137-1141 (1997) - [c17]Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy:
Integrating Checkpointing with Transaction Processing. FTCS 1997: 304-308 - [c16]Kiem-Phong Vo, Yi-Min Wang, P. Emerald Chung, Yennun Huang:
Xept: a software instrumentation method for exception handling. ISSRE 1997: 60-69 - [c15]Shalini Yajnik, Yennun Huang:
STL: a tool for on-line software update and rejuvenation (Abstract). ISSRE 1997: 258 - 1996
- [j7]Yennun Huang, Chandra M. R. Kintala, Lawrence Bernstein, Yi-Min Wang:
Components for software fault tolerance and rejuvenation. AT&T Tech. J. 75(2): 29-37 (1996) - [c14]Sachin Garg, Yennun Huang, Chandra M. R. Kintala, Kishor S. Trivedi:
Minimizing Completion Time of a Program by Checkpointing and Rejuvenation. SIGMETRICS 1996: 252-261 - [c13]Yennun Huang:
Developing reliable applications on cluster systems. SRDS 1996: 165-166 - 1995
- [j6]Sampath Rangarajan, Yennun Huang, Satish K. Tripathi:
Computing Reliability Intervals for k-Resilient Protocols. IEEE Trans. Computers 44(3): 462-466 (1995) - [j5]Dipak Ghosal, T. V. Lakshman, Yennun Huang:
Parallel architectures for processing high speed network signaling protocols. IEEE/ACM Trans. Netw. 3(6): 716-728 (1995) - [c12]Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pi-Yu Chung, Chandra M. R. Kintala:
Checkpointing and Its Applications. FTCS 1995: 22-31 - [c11]Yennun Huang, Chandra M. R. Kintala, Nick Kolettis, N. Dudley Fulton:
Software Rejuvenation: Analysis, Module and Applications. FTCS 1995: 381-390 - [c10]Yennun Huang, Yi-Min Wang:
Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. FTCS 1995: 459-463 - 1994
- [c9]Dipak Ghosal, T. V. Lakshman, Yennun Huang:
High-Speed Protocol Processing Using Parallel Architectures. INFOCOM 1994: 159-166 - 1993
- [j4]Yennun Huang, Satish K. Tripathi:
Resource Allocation for Primary-Site Fault-Tolerant Systems. IEEE Trans. Software Eng. 19(2): 108-119 (1993) - [c8]Yennun Huang, Chandra M. R. Kintala:
Software Implemented Fault Tolerance Technologies and Experience. FTCS 1993: 2-9 - [c7]Yi-Min Wang, Yennun Huang, W. Kent Fuchs:
Progressive Retry for Software Error Recovery in Distributed Systems. FTCS 1993: 138-144 - [c6]Yennun Huang, Chandra M. R. Kintala, Pankaj Jalote:
Two Techniques for Transient Software Error Recovery. Hardware and Software Architectures for Fault Tolerance 1993: 159-170 - 1992
- [j3]Yennun Huang, Pankaj Jalote:
Effect of Fault Tolerance on Response Time-Analysis of the Primary Site Approach. IEEE Trans. Computers 41(4): 420-428 (1992) - [c5]Sampath Rangarajan, Yennun Huang, Satish K. Tripathi:
Computing Threshold Times for k-Resilient Protocols. ICPP (2) 1992: 24-27 - [c4]Yennun Huang, T. V. Lakshman, Dipak Ghosal:
On the Availability of Parallel Protocol-Processing Systems. ICPP (3) 1992: 351-354 - 1991
- [c3]Yennun Huang, Satish K. Tripathi:
Resource Allocation for Distributed Systems with Fault Tolerant Nodes. Fault-Tolerant Computing Systems 1991: 241-252 - [c2]T. V. Lakshman, Dipak Ghosal, Yennun Huang, Satish K. Tripathi:
Effective Load and Resource Sharing in Parallel Protocol-Processing Systems. ICPP (1) 1991: 382-390
1980 – 1989
- 1989
- [j2]Yennun Huang, Pankaj Jalote:
Analytic Models for the Primary Site Approach to Fault-Tolerance. Acta Informatica 26(6): 543-557 (1989) - [c1]Yennun Huang, Pankaj Jalote:
Availability Analysis of the Primary Site Approach for Fault Tolerance. SRDS 1989: 130-136 - 1987
- [j1]Satish K. Tripathi, Yennun Huang, Sushil Jajodia:
Local Area Networks: Software and Related Issues. IEEE Trans. Software Eng. 13(8): 872-879 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint