Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name cker Chiueh, Tzi
add a person with the name cker Chiueh, Tzi
 

Other publications of authors with the same name

Virtual keyboard for head mounted display-based wearable devices., , and . ICPADS, page 225-232. IEEE Computer Society, (2014)Accurate and Automated System Call Policy-Based Intrusion Prevention., , and . DSN, page 413-424. IEEE Computer Society, (2006)RAD: A Compile-Time Solution to Buffer Overflow Attacks., and . ICDCS, page 409-417. IEEE Computer Society, (2001)Suez: A Cluster-based Scalable Real-Time Packet Router., and . ICDCS, page 136-143. IEEE Computer Society, (2000)Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device., , , and . IEEE Symposium on Mass Storage Systems, page 89-104. (2000)City Eyes: An Unified Computational Framework for Intelligent Video Surveillance in Cloud Environment., , , , , and . iThings/GreenCom/CPSCom, page 324-327. IEEE Computer Society, (2014)Evaluation of a Server-Grade Software-Only ARM Hypervisor., , , , , and . IEEE CLOUD, page 855-862. IEEE, (2013)Spout: a transparent proxy for safe execution of Java applets., , and . IEEE Journal on Selected Areas in Communications, 20 (7): 1426-1433 (2002)Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN., and . INFOCOM, page 2366-2370. IEEE, (2007)TBBT: Scalable and Accurate Trace Replay for File Server Evaluation., , and . FAST, USENIX, (2005)