UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Enforcing network policy in heterogeneous network function box environment Journal article
Cui, Lin, Tso, Fung Po, Jia, Weijia. Enforcing network policy in heterogeneous network function box environment[J]. COMPUTER NETWORKS, 2018, 138, 108-118.
Authors:  Cui, Lin;  Tso, Fung Po;  Jia, Weijia
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:4.4/4.4 | Submit date:2018/10/30
Data Center  Network Policy Management  Middleboxes  Network Function Virtualization (Nfv)  Sdn Switches  Network Service Chaining  
Diabetes Mellitus detection based on facial block texture features using the Gabor filter Conference paper
Ting S., Zhang B.. Diabetes Mellitus detection based on facial block texture features using the Gabor filter[C], 2015, 1-6.
Authors:  Ting S.;  Zhang B.
Favorite | TC[WOS]:12 TC[Scopus]:13 | Submit date:2019/04/04
Diabetes Mellitus  Facial Block Texture Features  Gabor Filter  K-nearest Neighbors  Support Vector Machine  
Protocol-level attacks against Tor Journal article
Ling Z., Luo J., Yu W., Fu X., Jia W., Zhao W.. Protocol-level attacks against Tor[J]. Computer Networks, 2013, 57(4), 869-886.
Authors:  Ling Z.;  Luo J.;  Yu W.;  Fu X.;  Jia W.; et al.
Favorite | TC[WOS]:19 TC[Scopus]:30  IF:4.4/4.4 | Submit date:2019/02/11
Anonymity  Mix Networks  Protocol-level Attacks  Tor  
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks Journal article
Huang, Caishi, Lea, Chin-Tau, Wong, Albert Kai-Sun. A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks[J]. Computer Networks, 2012, 56(14), 3261-3273.
Authors:  Huang, Caishi;  Lea, Chin-Tau;  Wong, Albert Kai-Sun
Favorite | TC[WOS]:16 TC[Scopus]:20 | Submit date:2018/11/06
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks Journal article
Huang, C., Lea, C., Wong, A.. A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks[J]. Computer Networks, 2012, 3261-3273.
Authors:  Huang, C.;  Lea, C.;  Wong, A.
Favorite | TC[WOS]:16 TC[Scopus]:20  IF:4.4/4.4 | Submit date:2022/06/27
Hidden Terminal Problem  Exposed Terminal Problem  Csma/ca  Multihop  Medium Access Control (Mac)  Ad Hoc Networks  
A context-aware scheme for privacy-preserving location-based services Journal article
Pingley A., Yu W., Zhang N., Fu X., Zhao W.. A context-aware scheme for privacy-preserving location-based services[J]. Computer Networks, 2012, 56(11), 2551.
Authors:  Pingley A.;  Yu W.;  Zhang N.;  Fu X.;  Zhao W.
Favorite | TC[WOS]:19 TC[Scopus]:40 | Submit date:2018/10/30
Locality-preserving  Location-based Service  Vhc-mapping  
An end host multicast protocol for peer-to-peer networks Conference paper
Tu W., Jia W.. An end host multicast protocol for peer-to-peer networks[C], 2005, 392-399.
Authors:  Tu W.;  Jia W.
Favorite | TC[WOS]:0 TC[Scopus]:3 | Submit date:2019/02/11
A rule-based approach for proportional delay differentiation Conference paper
Wei, JB, Xu, CZ. A rule-based approach for proportional delay differentiation[C], 2005, 1388-1392.
Authors:  Wei, JB;  Xu, CZ
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/05/09
Improving degradation and fairness for mobile adaptive multimedia wireless networks Journal article
Xiao Y., Chen C.L.P.. Improving degradation and fairness for mobile adaptive multimedia wireless networks[J]. Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2001, 2001-January, 598-601.
Authors:  Xiao Y.;  Chen C.L.P.
Favorite | TC[WOS]:17 TC[Scopus]:22 | Submit date:2019/02/11
Adaptive Systems  Bandwidth  Call Admission Control  Computer Science  Degradation  Fluctuations  Frequency  Mobile Computing  Quality Of Service  Wireless Networks