Chi-Yao Hong
Chi-Yao Hong
Verified email at google.com
Title
Cited by
Cited by
Year
Achieving high utilization with software-driven wan
CY Hong, S Kandula, R Mahajan, M Zhang, V Gill, M Nanduri, ...
SIGCOMM, 2013
8972013
Jellyfish: Networking Data Centers, Randomly
A Singla, CY Hong, L Popa, PB Godfrey
NSDI, 2011
4892011
Finishing flows quickly with preemptive scheduling
CY Hong, M Caesar, P Godfrey
SIGCOMM, 2012
4642012
BotGrep: Finding P2P bots with structured graph analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
USENIX Security, 2010
2762010
3-approximation algorithm for joint routing and link scheduling in wireless relay networks
CY Hong, AC Pang
IEEE Transactions on Wireless Communications 8 (2), 856-861, 2009
462009
Survivable and delay-guaranteed backbone wireless mesh network design
CY Hsu, JLC Wu, ST Wang, CY Hong
Journal of Parallel and Distributed Computing 68 (3), 306-320, 2008
352008
B4 and after: managing hierarchy, partitioning, and asymmetry for availability and scale in google's software-defined WAN
CY Hong, S Mandal, M Al-Fares, M Zhu, R Alimi, C Bhagat, S Jain, ...
SIGCOMM, 2018
312018
Link scheduling with QoS guarantee for wireless relay networks
CY Hong, AC Pang
INFOCOM, 2009
202009
Tiresias: Online anomaly detection for hierarchical operational network data
CY Hong, M Caesar, N Duffield, J Wang
ICDCS (International Conference on Distributed Computing Systems), 2012
182012
Clockscalpel: Understanding root causes of Internet clock synchronization inaccuracy
CY Hong, CC Lin, M Caesar
PAM (International Conference on Passive and Active Network Measurement …, 2011
172011
Qos routing and scheduling in tdma based wireless mesh backhaul networks
CY Hong, AC Pang, JLC Wu
IEEE WCNC (Wireless Communications and Networking Conference), 3232-3237, 2007
142007
Populated IP addresses: classification and applications
CY Hong, F Yu, Y Xie
ACM CCS (Conference on Computer and Communications Security), 2012
132012
BotGrep: finding bots with structured graph analysis
S Nagaraja, P Mittal, C Hong, M Caesar, N Borisov
Usenix Security 10, 2010
122010
Determining populated IP addresses
F Yu, Y Xie, CY Hong
US Patent 9,148,434, 2015
102015
SWAN: achieving high utilization in networks
V Gill, CY Hong, S Kandula, R Mahajan, M Nanduri, RP Wattenhofer, ...
US Patent 8,977,756, 2015
92015
Approximation algorithms for a link scheduling problem in wireless relay networks with qos guarantee
CY Hong, AC Pang, PC Hsiu
IEEE Transactions on Mobile Computing 9 (12), 1732-1748, 2010
72010
Software Defined Transport: Flexible and Deployable Flow Rate Control
CY Hong, M Caesar, PB Godfrey
Presented as part of the Open Networking Summit 2014 (ONS 2014)}, 15-27, 2014
32014
Software defined transport
CY Hong
University of Illinois at Urbana-Champaign, 2015
12015
A Time-Efficient Algorithm for Optimal Design of Backbone Wireless Mesh Networks
CY Hsu, CW Jean-lien, C Hong
2006 14th IEEE International Conference on Networks 2, 1-6, 2006
12006
無線中繼網路具服務品質保證之鏈路排程演算法
CY Hong
臺灣大學資訊工程學研究所學位論文, 1-51, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20