×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [2]
CHEONG KUN LUN C... [1]
STANLEY HO EAST ... [1]
Authors
YIBO BOB ZHANG [1]
HUANG CAISHI [1]
Document Type
Journal article [6]
Conference paper [3]
Date Issued
2018 [1]
2015 [1]
2013 [1]
2012 [3]
2005 [2]
2001 [1]
More...
Language
英語English [9]
Source Publication
Computer Network... [4]
COMPUTER NETWORK... [1]
NETWORKING 2005:... [1]
Proceedings - 17... [1]
Proceedings - Co... [1]
Proceedings - In... [1]
More...
Indexed By
SCIE [3]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-9 of 9
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Enforcing network policy in heterogeneous network function box environment
Journal article
Cui, Lin, Tso, Fung Po, Jia, Weijia. Enforcing network policy in heterogeneous network function box environment[J]. COMPUTER NETWORKS, 2018, 138, 108-118.
Authors:
Cui, Lin
;
Tso, Fung Po
;
Jia, Weijia
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
4.4
/
4.4
|
Submit date:2018/10/30
Data Center
Network Policy Management
Middleboxes
Network Function Virtualization (Nfv)
Sdn Switches
Network Service Chaining
Diabetes Mellitus detection based on facial block texture features using the Gabor filter
Conference paper
Ting S., Zhang B.. Diabetes Mellitus detection based on facial block texture features using the Gabor filter[C], 2015, 1-6.
Authors:
Ting S.
;
Zhang B.
Favorite
|
TC[WOS]:
12
TC[Scopus]:
13
|
Submit date:2019/04/04
Diabetes Mellitus
Facial Block Texture Features
Gabor Filter
K-nearest Neighbors
Support Vector Machine
Protocol-level attacks against Tor
Journal article
Ling Z., Luo J., Yu W., Fu X., Jia W., Zhao W.. Protocol-level attacks against Tor[J]. Computer Networks, 2013, 57(4), 869-886.
Authors:
Ling Z.
;
Luo J.
;
Yu W.
;
Fu X.
;
Jia W.
; et al.
Favorite
|
TC[WOS]:
19
TC[Scopus]:
30
IF:
4.4
/
4.4
|
Submit date:2019/02/11
Anonymity
Mix Networks
Protocol-level Attacks
Tor
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks
Journal article
Huang, Caishi, Lea, Chin-Tau, Wong, Albert Kai-Sun. A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks[J]. Computer Networks, 2012, 56(14), 3261-3273.
Authors:
Huang, Caishi
;
Lea, Chin-Tau
;
Wong, Albert Kai-Sun
Favorite
|
TC[WOS]:
16
TC[Scopus]:
20
|
Submit date:2018/11/06
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks
Journal article
Huang, C., Lea, C., Wong, A.. A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks[J]. Computer Networks, 2012, 3261-3273.
Authors:
Huang, C.
;
Lea, C.
;
Wong, A.
Favorite
|
TC[WOS]:
16
TC[Scopus]:
20
IF:
4.4
/
4.4
|
Submit date:2022/06/27
Hidden Terminal Problem
Exposed Terminal Problem
Csma/ca
Multihop
Medium Access Control (Mac)
Ad Hoc Networks
A context-aware scheme for privacy-preserving location-based services
Journal article
Pingley A., Yu W., Zhang N., Fu X., Zhao W.. A context-aware scheme for privacy-preserving location-based services[J]. Computer Networks, 2012, 56(11), 2551.
Authors:
Pingley A.
;
Yu W.
;
Zhang N.
;
Fu X.
;
Zhao W.
Favorite
|
TC[WOS]:
19
TC[Scopus]:
40
|
Submit date:2018/10/30
Locality-preserving
Location-based Service
Vhc-mapping
An end host multicast protocol for peer-to-peer networks
Conference paper
Tu W., Jia W.. An end host multicast protocol for peer-to-peer networks[C], 2005, 392-399.
Authors:
Tu W.
;
Jia W.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
3
|
Submit date:2019/02/11
A rule-based approach for proportional delay differentiation
Conference paper
Wei, JB, Xu, CZ. A rule-based approach for proportional delay differentiation[C], 2005, 1388-1392.
Authors:
Wei, JB
;
Xu, CZ
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/05/09
Improving degradation and fairness for mobile adaptive multimedia wireless networks
Journal article
Xiao Y., Chen C.L.P.. Improving degradation and fairness for mobile adaptive multimedia wireless networks[J]. Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2001, 2001-January, 598-601.
Authors:
Xiao Y.
;
Chen C.L.P.
Favorite
|
TC[WOS]:
17
TC[Scopus]:
22
|
Submit date:2019/02/11
Adaptive Systems
Bandwidth
Call Admission Control
Computer Science
Degradation
Fluctuations
Frequency
Mobile Computing
Quality Of Service
Wireless Networks