Follow
Chun-Ying Huang
Title
Cited by
Cited by
Year
Quantifying skype user satisfaction
KT Chen, CY Huang, P Huang, CL Lei
ACM SIGCOMM Computer Communication Review 36 (4), 399-410, 2006
3752006
GamingAnywhere: An open cloud gaming system
CY Huang, CH Hsu, YC Chang, KT Chen
Proceedings of the 4th ACM multimedia systems conference, 36-47, 2013
3022013
Game traffic analysis: An MMORPG perspective
KT Chen, P Huang, CY Huang, CL Lei
Proceedings of the international workshop on Network and operating systems …, 2005
2842005
Measuring the latency of cloud gaming systems
KT Chen, YC Chang, PH Tseng, CY Huang, CL Lei
Proceedings of the 19th ACM international conference on Multimedia, 1269-1272, 2011
2332011
Fixation prediction for 360 video streaming in head-mounted virtual reality
CL Fan, J Lee, WC Lo, CY Huang, KT Chen, CH Hsu
Proceedings of the 27th Workshop on Network and Operating Systems Support …, 2017
2202017
360 video viewing dataset in head-mounted virtual reality
WC Lo, CL Fan, J Lee, CY Huang, KT Chen, CH Hsu
Proceedings of the 8th ACM on Multimedia Systems Conference, 211-216, 2017
1902017
On the quality of service of cloud gaming systems
KT Chen, YC Chang, HJ Hsu, DY Chen, CY Huang, CH Hsu
IEEE Transactions on Multimedia 16 (2), 480-495, 2013
1812013
GamingAnywhere: The first open source cloud gaming system
CY Huang, KT Chen, DY Chen, HJ Hsu, CH Hsu
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2014
1672014
Performance evaluation on permission-based detection for android malware
CY Huang, YT Tsai, CH Hsu
Advances in intelligent systems and applications-volume 2, 111-120, 2013
1592013
A survey on cloud gaming: Future of computer games
W Cai, R Shea, CY Huang, KT Chen, J Liu, VCM Leung, CH Hsu
IEEE Access 4, 7605-7620, 2016
1412016
Placing virtual machines to optimize cloud gaming experience
HJ Hong, DY Chen, CY Huang, KT Chen, CH Hsu
IEEE Transactions on Cloud Computing 3 (1), 42-53, 2014
1362014
A fuzzy pattern-based filtering algorithm for botnet detection
K Wang, CY Huang, SJ Lin, YD Lin
Computer Networks 55 (15), 3275-3286, 2011
1152011
Using one-time passwords to prevent password phishing attacks
CY Huang, SP Ma, KT Chen
Journal of Network and Computer Applications 34 (4), 1292-1301, 2011
1142011
Fast-flux bot detection in real time
CH Hsu, CY Huang, KT Chen
International Workshop on Recent Advances in Intrusion Detection, 464-483, 2010
1022010
On the sensitivity of online game playing time to network QoS
KT Chen, P Huang, GS Wang, CY Huang, CL Lei
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
802006
Enabling adaptive cloud gaming in an open-source cloud gaming platform
HJ Hong, CF Hsu, TH Tsai, CY Huang, KT Chen, CH Hsu
IEEE Transactions on Circuits and Systems for Video Technology 25 (12), 2078 …, 2015
702015
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger
CC Wu, KT Chen, CY Huang, CL Lei
Proceedings of the 18th international workshop on Network and operating …, 2009
672009
Quantifying user satisfaction in mobile cloud games
CY Huang, CH Hsu, DY Chen, KT Chen
Proceedings of Workshop on Mobile Video Delivery, 1-6, 2014
632014
An empirical evaluation of TCP performance in online games
KT Chen, CY Huang, P Huang, CL Lei
Proceedings of the 2006 ACM SIGCHI international conference on Advances in …, 2006
602006
Secure multicast using proxy encryption
YP Chiu, CL Lei, CY Huang
International Conference on Information and Communications Security, 280-290, 2005
592005
The system can't perform the operation now. Try again later.
Articles 1–20