Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Xue, Yibo
add a person with the name Xue, Yibo
 

Other publications of authors with the same name

Proximity-Aware cache Replication., , , , and . ASP-DAC, page 481-486. IEEE, (2012)Utilization-Aware Allocation for Multi-Tenant Datacenters., , and . ICDCS Workshops, page 82-87. IEEE Computer Society, (2013)YACA: Yet Another Cluster-Based Architecture for Network Intrusion Prevention., , , and . GLOBECOM, page 1-5. IEEE, (2010)Optimizing multi-thread string matching for network processor based intrusion management system., , and . Communication, Network, and Information Security, page 199-204. IASTED/ACTA Press, (2006)Emilie: Enhance the power of traffic identification., , , , and . ICNC, page 31-35. IEEE, (2014)DBS: A Bit-level Heuristic Packet Classification Algorithm for High Speed Network., , , and . ICPADS, page 260-267. IEEE Computer Society, (2009)Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor., , , , and . ICPADS, page 220-227. IEEE Computer Society, (2009)A Novel Optimization Method to Improve De-duplication Storage System Performance., , , and . ICPADS, page 228-235. IEEE Computer Society, (2009)BCBPI: A noval behavior chain based protocol identification method., , and . CCIS, page 651-656. IEEE, (2012)DroidChain: A novel Android malware detection method based on behavior chains., , , , and . Pervasive and Mobile Computing, (2016)