Kuai Xu
Geciteerd door
Geciteerd door
Profiling internet backbone traffic: behavior models and applications
K Xu, ZL Zhang, S Bhattacharyya
Proceedings of ACM SIGCOMM, 2005
A first look at inter-data center traffic characteristics via yahoo! datasets
Y Chen, S Jain, VK Adhikari, ZL Zhang, K Xu
2011 Proceedings IEEE INFOCOM, 1620-1628, 2011
Improving VoIP quality through path switching
S Tao, K Xu, A Estepa, TFL Gao, R Guerin, J Kurose, D Towsley, ...
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and …, 2005
Internet traffic behavior profiling for network security monitoring
K Xu, ZL Zhang, S Bhattacharyya
Networking, IEEE/ACM Transactions on 16 (6), 1241-1252, 2008
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks
F Wang, H Wang, K Xu
IEEE ICDCS Workshop on Peer-to-Peer Computing and Online Social Networking …, 2012
Exploring the performance benefits of end-to-end path switching
S Tao, K Xu, Y Xu, T Fei, L Gao, R Guerin, J Kurose, D Towsley, ZL Zhang
Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE …, 2004
On Positive Influence Dominating Set in Social Networks
F Wang, H Du, E Camacho, K Xu, S Shan
Theoretical Computer Science 412 (3), 265-269, 2011
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model
F Wang, H Wang, K Xu, J Wu, X Jia
IEEE International Conference on Distributed Computing Systems, 307-316, 2013
Fast anomaly detection for large data centers
A Li, L Gu, K Xu
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
Positive influence dominating set in online social networks
F Wang, E Camacho, K Xu
Combinatorial Optimization and Applications, 313-321, 2009
Reducing unwanted traffic in a backbone network
K Xu, ZL Zhang, S Bhattacharyya
USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI …, 2005
On properties of internet exchange points and their impact on as topology and relationship
K Xu, Z Duan, ZL Zhang, J Chandrashekar
NETWORKING 2004. Networking Technologies, Services, and Protocols …, 2004
Network-aware behavior clustering of Internet end hosts
K Xu, F Wang, L Gu
INFOCOM, 2011 Proceedings IEEE, 2078-2086, 2011
Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections
K Xu, F Wang, L Gu
IEEE/ACM Transactions on Networking 22 (3), 931 - 942, 2014
Scalable firewall policy management platform
A Bechtel, J Vijayaraghavan, K Xu, P Hodigere, H Ong
US Patent 8,146,134, 2012
A NDN IoT Content Distribution Model with Network Coding Enhanced Forwarding Strategy for 5G
K Lei, S Zhong, F Zhu, K Xu, H Zhang
IEEE Transactions on Industrial Informatics 14 (6), 2725 - 2735, 2018
A first step toward understanding inter-domain routing dynamics
K Xu, J Chandrashekar, ZL Zhang
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, 207-212, 2005
Positive influence dominating sets in power-law graphs
W Zhang, W Wu, F Wang, K Xu
Social Network Analysis and Mining 2 (1), 31-37, 2012
Securing ICN-Based UAV Ad Hoc Networks with Blockchain
K Lei, Q Zhang, J Lou, B Bai, K Xu
IEEE Communications Magazine 57 (6), 26-32, 2019
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations
H Wang, F Wang, K Xu
arXiv.org, 2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20