His scientific interests lie mostly in Computer network, Wireless network, Wireless, Operating system and Code. His is involved in several facets of Wireless network study, as is seen by his studies on Wireless WAN and Wi-Fi array. His Wireless WAN research is multidisciplinary, incorporating elements of Distributed computing, Service set, Wireless ad hoc network and Wireless mesh network, Switched mesh.
His Hybrid Wireless Mesh Protocol study in the realm of Wireless mesh network interacts with subjects such as Network interface. His studies in Wireless integrate themes in fields like Testbed, Node and Handover. His Wireless lan research integrates issues from Access network and Throughput.
His primary areas of study are Computer network, Operating system, Distributed computing, Embedded system and Quality of service. The Computer network study combines topics in areas such as Wireless network, Wi-Fi array and The Internet. His study in Wireless WAN and Wireless mesh network falls within the category of Wireless network.
His studies link Service set with Wireless mesh network. His study in Distributed computing is interdisciplinary in nature, drawing from both Scheduling, Overhead, Scalability and Resource allocation. His Network packet research incorporates themes from Buffer overflow and Router.
Tzi-cker Chiueh mainly investigates Operating system, Virtual machine, Virtualization, Hypervisor and Embedded system. His biological study spans a wide range of topics, including Reference counting and Garbage collection. His Virtual machine research is multidisciplinary, relying on both False positive paradox, Access control, Intrusion detection system, Full virtualization and Malware.
Tzi-cker Chiueh combines subjects such as Workspace, Overhead, Distributed computing and Commit with his study of Virtualization. In his study, Web server, The Internet, Redundancy, Unix and Synchronization is strongly linked to Fault tolerance, which falls under the umbrella field of Embedded system. His Server study introduces a deeper knowledge of Computer network.
His main research concerns Operating system, Virtual machine, Incremental backup, Virtualization and Parallel computing. His research integrates issues of Intrusion detection system, Full virtualization and Malware in his study of Virtual machine. His research in Virtualization intersects with topics in False positive paradox, Software, Microsoft Windows, Commit and Workspace.
His work deals with themes such as File system, Block and Erasure, which intersect with Parallel computing. To a larger extent, Tzi-cker Chiueh studies Computer network with the aim of understanding Node. His specific area of interest is Computer network, where Tzi-cker Chiueh studies Network architecture.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network
A. Raniwala;Tzi-cker Chiueh.
international conference on computer communications (2005)
Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks
Ashish Raniwala;Kartik Gopalan;Tzi-cker Chiueh.
Mobile Computing and Communications Review (2004)
RAD: a compile-time solution to buffer overflow attacks
Tzi-Cker Chiueh;Fu-Hau Hsu.
international conference on distributed computing systems (2001)
Large-scale malware indexing using function-call graphs
Xin Hu;Tzi-cker Chiueh;Kang G. Shin.
computer and communications security (2009)
Automatic Generation of String Signatures for Malware Detection
Kent Griffin;Scott Schneider;Xin Hu;Tzi-Cker Chiueh.
recent advances in intrusion detection (2009)
A Study of the Packer Problem and Its Solutions
Fanglu Guo;Peter Ferrie;Tzi-Cker Chiueh.
recent advances in intrusion detection (2008)
A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks.
Manish Prasad;Tzi-cker Chiueh.
usenix annual technical conference (2003)
Content-Based Image Indexing
Tzi-cker Chiueh.
very large data bases (1994)
Sequence number-based MAC address spoof detection
Fanglu Guo;Tzi-Cker Chiueh.
recent advances in intrusion detection (2005)
Viking: a multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks
S. Sharma;K. Gopalan;S. Nanda;T. Chiueh.
international conference on computer communications (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
National University of Singapore
Stony Brook University
University of California, Berkeley
Harvard University
Stony Brook University
University of Virginia
Stony Brook University
Renmin University of China
Carnegie Mellon University
University of Michigan–Ann Arbor
University of Potsdam
University of California, Berkeley
Chung Yuan Christian University
Politehnica University of Bucharest
University of Cambridge
United States Naval Research Laboratory
Hiroshima University
University of California, San Diego
ETH Zurich
University of California, Irvine
Scottish Association For Marine Science
University of Lausanne
Stanford University
Charité - University Medicine Berlin
University of Oviedo
National Institute for Astrophysics