Quantifying skype user satisfaction KT Chen, CY Huang, P Huang, CL Lei ACM SIGCOMM Computer Communication Review 36 (4), 399-410, 2006 | 375 | 2006 |
GamingAnywhere: An open cloud gaming system CY Huang, CH Hsu, YC Chang, KT Chen Proceedings of the 4th ACM multimedia systems conference, 36-47, 2013 | 299 | 2013 |
Game traffic analysis: An MMORPG perspective KT Chen, P Huang, CL Lei Computer Networks 50 (16), 3002-3023, 2006 | 284 | 2006 |
Measuring the latency of cloud gaming systems KT Chen, YC Chang, PH Tseng, CY Huang, CL Lei Proceedings of the 19th ACM international conference on Multimedia, 1269-1272, 2011 | 230 | 2011 |
Fixation prediction for 360 video streaming in head-mounted virtual reality CL Fan, J Lee, WC Lo, CY Huang, KT Chen, CH Hsu Proceedings of the 27th Workshop on Network and Operating Systems Support …, 2017 | 220 | 2017 |
360 video viewing dataset in head-mounted virtual reality WC Lo, CL Fan, J Lee, CY Huang, KT Chen, CH Hsu Proceedings of the 8th ACM on Multimedia Systems Conference, 211-216, 2017 | 189 | 2017 |
On the quality of service of cloud gaming systems KT Chen, YC Chang, HJ Hsu, DY Chen, CY Huang, CH Hsu IEEE Transactions on Multimedia 16 (2), 480-495, 2013 | 179 | 2013 |
GamingAnywhere: The first open source cloud gaming system CY Huang, KT Chen, DY Chen, HJ Hsu, CH Hsu ACM Transactions on Multimedia Computing, Communications, and Applications …, 2014 | 164 | 2014 |
Performance evaluation on permission-based detection for android malware CY Huang, YT Tsai, CH Hsu Advances in intelligent systems and applications-volume 2, 111-120, 2013 | 159 | 2013 |
A survey on cloud gaming: Future of computer games W Cai, R Shea, CY Huang, KT Chen, J Liu, VCM Leung, CH Hsu IEEE Access 4, 7605-7620, 2016 | 134 | 2016 |
Placing virtual machines to optimize cloud gaming experience HJ Hong, DY Chen, CY Huang, KT Chen, CH Hsu IEEE Transactions on Cloud Computing 3 (1), 42-53, 2014 | 134 | 2014 |
A fuzzy pattern-based filtering algorithm for botnet detection K Wang, CY Huang, SJ Lin, YD Lin Computer Networks 55 (15), 3275-3286, 2011 | 114 | 2011 |
Using one-time passwords to prevent password phishing attacks CY Huang, SP Ma, KT Chen Journal of Network and Computer Applications 34 (4), 1292-1301, 2011 | 114 | 2011 |
Fast-flux bot detection in real time CH Hsu, CY Huang, KT Chen International Workshop on Recent Advances in Intrusion Detection, 464-483, 2010 | 102 | 2010 |
On the sensitivity of online game playing time to network QoS KT Chen, P Huang, GS Wang, CY Huang, CL Lei Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 80 | 2006 |
Enabling adaptive cloud gaming in an open-source cloud gaming platform HJ Hong, CF Hsu, TH Tsai, CY Huang, KT Chen, CH Hsu IEEE Transactions on Circuits and Systems for Video Technology 25 (12), 2078 …, 2015 | 67 | 2015 |
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger CC Wu, KT Chen, CY Huang, CL Lei Proceedings of the 18th international workshop on Network and operating …, 2009 | 67 | 2009 |
Quantifying user satisfaction in mobile cloud games CY Huang, CH Hsu, DY Chen, KT Chen Proceedings of Workshop on Mobile Video Delivery, 1-6, 2014 | 61 | 2014 |
An empirical evaluation of TCP performance in online games KT Chen, CY Huang, P Huang, CL Lei Proceedings of the 2006 ACM SIGCHI international conference on Advances in …, 2006 | 59 | 2006 |
Secure multicast using proxy encryption YP Chiu, CL Lei, CY Huang International Conference on Information and Communications Security, 280-290, 2005 | 59 | 2005 |