Остановите войну!
for scientists:
default search action
Geoffrey G. Xie
- > Home > Persons > Geoffrey G. Xie
Publications
- 2020
- [i2]Alexis Peppas, Geoffrey G. Xie, Charles Prince:
ferify: A Virtual Machine File Protection System against Zero-Day Attacks. CoRR abs/2004.08992 (2020) - 2019
- [j20]Albert G. Greenberg, David A. Maltz, Jennifer Rexford, Geoffrey G. Xie, Jibin Zhan, Hui Zhang:
Reflections on a clean slate 4D approach to network control and management. Comput. Commun. Rev. 49(5): 90-91 (2019) - 2017
- [j17]Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure:
Safe Update of Hybrid SDN Networks. IEEE/ACM Trans. Netw. 25(3): 1649-1662 (2017) - 2016
- [j16]Xin Sun, Geoffrey G. Xie:
An Integrated Systematic Approach to Designing Enterprise Access Control. IEEE/ACM Trans. Netw. 24(6): 3508-3522 (2016) - [c43]Chris X. Cai, Franck Le, Xin Sun, Geoffrey G. Xie, Hani Jamjoom, Roy H. Campbell:
CRONets: Cloud-Routed Overlay Networks. ICDCS 2016: 67-77 - 2015
- [c41]Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever:
On the co-existence of distributed and centralized routing control-planes. INFOCOM 2015: 469-477 - 2014
- [c40]Umit Tellioglu, Geoffrey G. Xie, Justin P. Rohrer, Charles Prince:
Whale of a crowd: Quantifying the effectiveness of crowd-sourced serious games. CGAMES 2014: 1-7 - [c38]Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure:
Safe routing reconfigurations with route redistribution. INFOCOM 2014: 199-207 - [c37]Lance Alt, Justin P. Rohrer, Geoffrey G. Xie:
Demo: application-transparent deployment of DTN via SmartNet. CHANTS@MobiCom 2014: 93-96 - [c36]Guillermo Baltra, Robert Beverly, Geoffrey G. Xie:
Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping. PAM 2014: 56-66 - [c35]Dennis M. Volpano, Xin Sun, Geoffrey G. Xie:
Towards systematic detection and resolution of network control conflicts. HotSDN 2014: 67-72 - 2013
- [c34]Xin Sun, Geoffrey G. Xie:
Minimizing network complexity through integrated top-down design. CoNEXT 2013: 259-270 - [c31]Justin P. Rohrer, Geoffrey G. Xie:
DTN hybrid networks for vehicular communications. ICCVE 2013: 114-120 - [e2]Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie:
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]. Springer 2013, ISBN 978-3-319-01432-6 [contents] - 2012
- [c29]Xin Sun, Sanjay G. Rao, Geoffrey G. Xie:
Modeling complexity of enterprise routing design. CoNEXT 2012: 85-96 - 2011
- [j11]Yu-Wei Eric Sung, Xin Sun, Sanjay G. Rao, Geoffrey G. Xie, David A. Maltz:
Towards systematic design of enterprise networks. IEEE/ACM Trans. Netw. 19(3): 695-708 (2011) - [c25]Franck Le, Geoffrey G. Xie, Hui Zhang:
On route aggregation. CoNEXT 2011: 6 - [c24]Scott Huchton, Geoffrey G. Xie, Robert Beverly:
Building and evaluating a k-resilient mobile distributed file system resistant to device compromise. MILCOM 2011: 1315-1320 - [c23]Narseo Vallina-Rodriguez, Christos Efstratiou, Geoffrey G. Xie, Jon Crowcroft:
Enabling opportunistic resources sharing on mobile operating systems: benefits and challenges. S3@MobiCom 2011: 29-32 - [c22]Xin Sun, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie:
A software toolkit for visualizing enterprise routing design. SafeConfig 2011 - 2010
- [c21]Robert Beverly, Arthur W. Berger, Geoffrey G. Xie:
Primitives for active internet topology mapping: toward high-frequency characterization. Internet Measurement Conference 2010: 165-171 - [c20]Franck Le, Geoffrey G. Xie, Hui Zhang:
Theory and new primitives for safely connecting routing protocol instances. SIGCOMM 2010: 219-230 - [e1]Geoffrey G. Xie, Robert Beverly, Robert Tappan Morris, Bruce Davie:
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20 - 21, 2010. ACM 2010, ISBN 978-1-4503-0409-2 [contents] - 2009
- [j10]Ehab Al-Shaer, Albert G. Greenberg, Charles R. Kalmanek, David A. Maltz, T. S. Eugene Ng, Geoffrey G. Xie:
New frontiers in internet network management. Comput. Commun. Rev. 39(5): 37-39 (2009) - [j9]Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie:
Guest editorial network infrastructure configuration. IEEE J. Sel. Areas Commun. 27(3): 249-252 (2009) - [j8]David A. Maltz, Jibin Zhan, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford, Geoffrey G. Xie, Hui Zhang:
Structure preserving anonymization of router configuration data. IEEE J. Sel. Areas Commun. 27(3): 349-358 (2009) - 2008
- [c16]Franck Le, Geoffrey G. Xie, Hui Zhang:
Instability free routing: beyond one protocol instance. CoNEXT 2008: 9 - [c15]Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie, David A. Maltz:
Towards systematic design of enterprise networks. CoNEXT 2008: 22 - [c14]Franck Le, Geoffrey G. Xie, Dan Pei, Jia Wang, Hui Zhang:
Shedding light on the glue logic of the internet routing architecture. SIGCOMM 2008: 39-50 - 2007
- [c12]Franck Le, Geoffrey G. Xie, Hui Zhang:
Understanding Route Redistribution. ICNP 2007: 81-92 - [c11]Franck Le, Geoffrey G. Xie:
On guidelines for safe route redistributions. INM@SIGCOMM 2007: 274-279 - 2005
- [j7]Albert G. Greenberg, Gísli Hjálmtýsson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey G. Xie, Hong Yan, Jibin Zhan, Hui Zhang:
A clean slate 4D approach to network control and management. Comput. Commun. Rev. 35(5): 41-54 (2005) - [c10]Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford:
On static reachability analysis of IP networks. INFOCOM 2005: 2170-2183 - 2004
- [c9]David A. Maltz, Jibin Zhan, Geoffrey G. Xie, Hui Zhang, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford:
Structure preserving anonymization of router configuration data. Internet Measurement Conference 2004: 239-244 - [c8]Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson:
Routing design in operational networks: a look from the inside. SIGCOMM 2004: 27-40 - 2002
- [c7]Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Levin:
Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. ICDCS Workshops 2002: 35-42 - 1998
- [j5]Geoffrey G. Xie, Simon S. Lam:
Real-time block transfer under a link-sharing hierarchy. IEEE/ACM Trans. Netw. 6(1): 30-41 (1998) - 1997
- [j4]Geoffrey G. Xie, Simon S. Lam:
An efficient network architecture motivated by application-level QoS. J. High Speed Networks 6(3): 163-179 (1997) - [j3]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling Networks. Perform. Evaluation 31(1-2): 133-157 (1997) - [j2]Simon S. Lam, Geoffrey G. Xie:
Group priority scheduling. IEEE/ACM Trans. Netw. 5(2): 205-218 (1997) - [c6]Geoffrey G. Xie, Simon S. Lam:
Admission Control and Loss Management for an Application-Level Statistical Service. ICNP 1997: 142-151 - [c5]Geoffrey G. Xie, Simon S. Lam:
Real-Time Block Transfer under a Link Sharing Hierarchy. INFOCOM 1997: 388-397 - 1996
- [c4]Geoffrey G. Xie, Simon S. Lam:
An Efficient Adaptive Search Algorithm for Scheduling Real-Time Traffic. ICNP 1996: 14-22 - [c3]Simon S. Lam, Geoffrey G. Xie:
Group Priority Scheduling. INFOCOM 1996: 1346-1356 - 1995
- [j1]Geoffrey G. Xie, Simon S. Lam:
Delay guarantee of virtual clock server. IEEE/ACM Trans. Netw. 3(6): 683-689 (1995) - [c2]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling: Architecture and Algorithm for Switching Packet Video. INFOCOM 1995: 940-950 - [c1]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling Networks: Flow Specification and Performance Guarantees. NOSSDAV 1995: 289-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-01 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint