default search action
C. Edward Chow
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1302-1318 (2023) - 2022
- [j8]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency. Comput. Networks 219: 109436 (2022) - 2021
- [j7]Ahmed Al Guqhaiman, Oluwatobi Akanbi, Amer Aljaedi, Adel R. Alharbi, C. Edward Chow:
DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks. Sensors 21(15): 5229 (2021) - [c40]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, Xiaobo Zhou, C. Edward Chow, Sang-Yoon Chang:
Robust P2P Connectivity Estimation for Permissionless Bitcoin Network. IWQoS 2021: 1-6 - 2020
- [c39]David William Honorio Araujo da Silva, Marcelo A. Xavier, Philip N. Brown, C. Edward Chow, Carlos Paz de Araujo:
Homomorphic Data Concealment Powered by Clifford Geometric Algebra. CGI 2020: 513-525 - [c38]Hsiang-Jen Hong, Wenjun Fan, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing. Networking 2020: 524-528 - [c37]David William Honorio Araujo da Silva, Marcelo A. Xavier, C. Edward Chow, Carlos Paz de Araujo:
Experiments with Clifford Geometric Algebra Applied to Cryptography. SCIS/ISIS 2020: 1-8
2010 – 2019
- 2019
- [c36]David William Honorio Araujo da Silva, Hanes Barbosa Marques de Oliveira, C. Edward Chow, Bryan Sosa Barillas, Carlos Paz de Araujo:
Homomorphic Image Processing Over Geometric Product Spaces and Finite P-Adic Arithmetic. CloudCom 2019: 27-36 - [c35]David William Honorio Araujo da Silva, Carlos Paz de Araujo, C. Edward Chow:
Fully Homomorphic Key Update and Key Exchange Over Exterior Product Spaces For Cloud Computing Applications. PRDC 2019: 25-26 - [c34]David William Honorio Araujo da Silva, Carlos Paz de Araujo, C. Edward Chow, Bryan Sosa Barillas:
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra. UEMCON 2019: 241-249 - 2018
- [c33]Abdullah Aljuhni, C. Edward Chow, Amer Aljaedi, Shaji Yusuf, Francisco Torres-Reyes:
Towards understanding application performance and system behavior with the full dynticks feature. CCWC 2018: 394-401 - [c32]Amer Aljaedi, C. Edward Chow, Ehab Ashary, Francisco Torres-Reyes:
OTMEN: Offloading Traffic Monitoring to Edge Nodes in Software-Defined Datacenter Networks. DSC 2018: 1-8 - [c31]Naif Alamri, C. Edward Chow, Amer Aljaedi, Abdelhamid Elgzil:
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks. Wireless Days 2018: 1-8 - 2017
- [c30]Joshua A. Alcorn, Scott Melton, C. Edward Chow:
SDN On-The-Go (OTG) physical testbed. DSC 2017: 202-208 - [c29]Joshua A. Alcorn, Scott Melton, C. Edward Chow:
SDN data path confidence analysis. DSC 2017: 209-216 - [c28]Ehab Ashary, C. Edward Chow, Ashish Korpe, Donovan Thorpe:
R2D2: Right place, right path data delivery. DSC 2017: 273-279 - [c27]Abdelhamid Elgzil, C. Edward Chow, Amer Aljaedi, Naif Alamri:
Cyber anonymity based on software-defined networking and Onion Routing (SOR). DSC 2017: 358-365 - [c26]Joshua A. Alcorn, Scott Melton, C. Edward Chow:
Portable SDN Testbed Prototype. DSN Workshops 2017: 109-110 - [c25]Joshua A. Alcorn, Scott Melton, C. Edward Chow:
A Framework for SDN Network Evaluation. DSN Workshops 2017: 111-112 - [i2]Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult:
Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters. CoRR abs/1703.02248 (2017) - 2016
- [c24]Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult:
Automated big security text pruning and classification. IEEE BigData 2016: 3629-3637 - [c23]Amer Aljaedi, C. Edward Chow:
Pathseer: a centralized tracer of packet trajectories in software-defined datacenter networks. IPTComm 2016: 1-9 - [c22]Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated big text security classification. ISI 2016: 103-108 - [i1]Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated Big Text Security Classification. CoRR abs/1610.06856 (2016) - 2014
- [c21]Joshua A. Alcorn, C. Edward Chow:
A framework for large-scale modeling and simulation of attacks on an OpenFlow network. ICCCN 2014: 1-6 - 2013
- [c20]Fahad Alsolami, C. Edward Chow:
N-Cloud: Improving performance and security in cloud storage. HPSR 2013: 221-222 - 2010
- [c19]Bradley Baker, C. Edward Chow:
HTEE: An HMAC based Tamper Evident Encryption. SECRYPT 2010: 196-205 - [c18]Murthy S. Andukuri, C. Edward Chow:
Efficient Asymmetric IPSec for Secure iSCSI. SECRYPT 2010: 314-317
2000 – 2009
- 2006
- [j6]Xiaobo Zhou, Yu Cai, C. Edward Chow:
An integrated approach with feedback control for robust Web QoS design. Comput. Commun. 29(16): 3158-3169 (2006) - 2005
- [c17]Ganesh Godavari, C. Edward Chow:
Secure Information Sharing Using Attribute Certificates and Role Based Access Control. Security and Management 2005: 269-276 - [c16]Xiaobo Zhou, Yu Cai, C. Edward Chow, Marijke F. Augusteijn:
Two-Tier Resource Allocation for Slowdown Differentiation on Server Clusters. ICPP 2005: 31-38 - 2004
- [c15]C. Edward Chow, Paul J. Fong, Ganesh Godavari:
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET). AINA (2) 2004: 436-440 - [c14]C. Edward Chow, Yu Cai, David Wilkinson, Ganesh Godavari:
Secure collective defense system. GLOBECOM 2004: 2245-2249 - [c13]Xiaobo Zhou, Yu Cai, Ganesh Godavari, C. Edward Chow:
An Adaptive Process Allocation Strategy for Proportional Responsiveness Differentiation on Web Servers. ICWS 2004: 142-149 - 2003
- [c12]C. Edward Chow, Ganesh Godavari, Yu Cai:
LSWS: A Linux-based Secure Web Switch. Applied Informatics 2003: 507-512 - [c11]C. Edward Chow, Chandra Prakash:
Enhance Features and Performance of a Linux-based Content Switch. Applied Informatics 2003: 513-518 - [c10]Angela Cearns, C. Edward Chow:
Design of an Autonomous Anti-DDoS (A2D2) Network. Applied Informatics 2003: 1007-1012 - 2001
- [c9]Jingsha He, C. Edward Chow, Jihui Yang, Takafumi Chujo:
An Algorithm for Available Bandwidth Measurement. ICN (1) 2001: 753-761
1990 – 1999
- 1998
- [c8]Heikki Julkunen, C. Edward Chow:
Enhance Network Security with Dynamic Packet Filter. ICCCN 1998: 268-275 - 1995
- [j5]C. Edward Chow:
Resource allocation for multiparty connections. J. Syst. Softw. 28(3): 253-266 (1995) - 1992
- [c7]Minfa Huang, Ivan T. Frisch, Ching-Hua Chow, Howard E. Bussey:
Two Multiparty Connection Establishment Procedures For Broadband ISDN. NOMS 1992: 373-382 - [c6]C. Edward Chow:
Resource Allocation Protocol for Multiparty Connections in Broadband Networks. Protocols for High-Speed Networks 1992: 121-136 - 1991
- [c5]Ching-Hua Chow:
On Multicast Path Finding Algorithms. INFOCOM 1991: 1274-1283 - 1990
- [j4]Ching-Hua Chow, Motomitsu Adachi:
Achieving Multimedia Communications on a Heterogeneous Network. IEEE J. Sel. Areas Commun. 8(3): 348-359 (1990)
1980 – 1989
- 1988
- [j3]Ching-Hua Chow, Simon S. Lam:
PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols. IEEE Trans. Software Eng. 14(3): 327-338 (1988) - 1987
- [c4]Robert W. Root, Ching-Hua Chow:
Multimode Interaction in a Telecommunications Testbed: The Case of Memory Dialing. HCI (2) 1987: 399-406 - 1985
- [j2]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
A Discipline for Constructing Multiphase Communication Protocols. ACM Trans. Comput. Syst. 3(4): 315-343 (1985) - 1984
- [j1]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
An exercise in constructing multi-phase communication protocols. Comput. Commun. Rev. 14(2): 42-49 (1984) - [c3]Mohamed G. Gouda, Ching-Hua Chow, Simon S. Lam:
On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. PSTV 1984: 47-56 - [c2]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
On Constructing Multi-Phase Communication Protocols. PSTV 1984: 57-68 - 1981
- [c1]Joan M. Morrissey, Ching-Hua Chow, Ronald C. Devries, C. Megivern:
An Approach to Memory Testing, Diagnostics and Analysis. ITC 1981: 56-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 00:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint