Kang Li
TitoloCitata daAnno
New methods for passive estimation of TCP round-trip times
B Veal, K Li, D Lowenthal
International workshop on passive and active network measurement, 121-134, 2005
Approximate caches for packet classification
F Chang, W Feng, K Li
IEEE INFOCOM 4, 2196-2207, 2004
The case for streaming multimedia with TCP
C Krasic, K Li, J Walpole
International Workshop on Interactive Distributed Multimedia Systems and …, 2001
Large online social footprints--an emerging threat
D Irani, S Webb, K Li, C Pu
2009 International Conference on Computational Science and Engineering 3 …, 2009
When HTTPS meets CDN: A case of authentication in delegated service
J Liang, J Jiang, H Duan, K Li, T Wan, J Wu
2014 IEEE Symposium on Security and Privacy, 67-82, 2014
Modeling unintended personal-information leakage from multiple online social networks
D Irani, S Webb, K Li, C Pu
IEEE Internet Computing 15 (3), 13-19, 2011
Study of trend-stuffing on twitter through text classification
D Irani, S Webb, C Pu, K Li
Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010
Fast statistical spam filter by approximate classifications
K Li, Z Zhong
ACM SIGMETRICS Performance Evaluation Review 34 (1), 347-358, 2006
Privacy-aware collaborative spam filtering
K Li, Z Zhong, L Ramaswamy
IEEE Transactions on Parallel and Distributed systems 20 (5), 725-739, 2008
Supporting low latency TCP-based media streams
A Goel, C Krasic, K Li, J Walpole
IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No …, 2002
Clickminer: Towards forensic reconstruction of user-browser interactions from network traces
C Neasbitt, R Perdisci, K Li, T Nelms
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
South China Sea surface water evolution over the last 12 Myr: A south‐north comparison from Ocean Drilling Program Sites 1143 and 1146
B Li, J Wang, B Huang, Q Li, Z Jian, Q Zhao, X Su, P Wang
Paleoceanography 19 (1), 2004
Peerrush: Mining for unwanted p2p traffic
B Rahbarinia, R Perdisci, A Lanzi, K Li
International Conference on Detection of Intrusions and Malware, and …, 2013
Human motion capture data compression by model-based indexing: A power aware approach
S Chattopadhyay, SM Bhandarkar, K Li
IEEE transactions on visualization and computer graphics 13 (1), 5-14, 2006
Client-centered, energy-efficient wireless communication on IEEE 802.11 b networks
H Yan, SA Watterson, DK Lowenthal, K Li, R Krishnan, LL Peterson
IEEE Transactions on Mobile Computing 5 (11), 1575-1590, 2006
Architectures for packet classification caching
K Li, F Chang, D Berger, W Feng
The 11th IEEE International Conference on Networks, 2003. ICON2003., 111-117, 2003
Measuring and detecting malware downloads in live network traffic
P Vadrevu, B Rahbarinia, R Perdisci, K Li, M Antonakakis
European Symposium on Research in Computer Security, 556-573, 2013
Resisting SPAM Delivery by TCP Damping.
K Li, C Pu, M Ahamad
CEAS, 2004
On meeting P2P streaming bandwidth demand with limited supplies
C Wu, B Li
Multimedia Computing and Networking 2008 6818, 68180C, 2008
β-carboxyl catalytic effect of N-phosphoryl aspartic acid
YM Li, D Zhang, H Zhang, GJ Ji, Y Zhao
Bioorganic Chemistry 20 (4), 285-295, 1992
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20