UM

Browse/Search Results:  1-10 of 11 Help

Selected(0)Clear Items/Page:    Sort:
Enabling Fully-Decoupled Radio Access with Elastic Resource Allocation Journal article
Qian Bo, Ma Ting, Xu Yunting, Zhao Jiwei, Yu Kai, Wu Yuan, Zhou Haibo. Enabling Fully-Decoupled Radio Access with Elastic Resource Allocation[J]. IEEE Transactions on Cognitive Communications and Networking, 2023, 9(4), 1025-1040.
Authors:  Qian Bo;  Ma Ting;  Xu Yunting;  Zhao Jiwei;  Yu Kai; et al.
Favorite | TC[WOS]:2 TC[Scopus]:5  IF:7.4/6.9 | Submit date:2023/08/03
6g  Fully-decoupled Radio Access Network  Elastic Resource Allocation  Power Control  Many-to-many Matching Model  
On the Mathematical Modeling and Optimization for the Energy Efficiency Performance of CSMA-NOMA Random Access Networks with Channel Inversion Journal article
Cao, Shengbin, Hou, Fen. On the Mathematical Modeling and Optimization for the Energy Efficiency Performance of CSMA-NOMA Random Access Networks with Channel Inversion[J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22(4), 2867-2884.
Authors:  Cao, Shengbin;  Hou, Fen
Favorite | TC[WOS]:1 TC[Scopus]:4 | Submit date:2022/12/31
Non-orthogonal Multiple Access (Noma)  Decoding  Mathematical Models  Wireless Communication  Optimization  Power Control  Multiaccess Communication  Energy Efficiency  Csma  Ca  Difference Of Convex Programming (Dcp)  Random Access  Performance Analysis  Complementary Geometric Programming (Cgp)  
The Application of the Intolerance of Uncertainty Model to Gambling Urge and Involvement Journal article
Hui Zhou, Eva P. W. Hung, Li Xie, Zhen Yuan, Anise M. S. Wu. The Application of the Intolerance of Uncertainty Model to Gambling Urge and Involvement[J]. International Journal of Environmental Research and Public Health, 2022, 19(22), 14738.
Authors:  Hui Zhou;  Eva P. W. Hung;  Li Xie;  Zhen Yuan;  Anise M. S. Wu
Favorite | TC[WOS]:3 TC[Scopus]:4 | Submit date:2022/12/01
Intolerance Of Uncertainty  Impulse Control  Limited Access To Emotion Regulation Strategies  Gambling Urge  Gambling Involvement  Chinese  Gamblers  
Chapter 4 - The role of Internet of Things for adaptive traffic prioritization in wireless body area networks Book chapter
出自: Healthcare Paradigms in the Internet of Things Ecosystem:Elsevier, 2020, 页码:63-82
Authors:  Fasee Ullah;  Chi-Man Pun
Favorite | TC[Scopus]:6 | Submit date:2022/08/24
Biomedical Sensor  Carrier-sense Multiple Access/collision Avoidance  Contention Access Period  Contention-free Period  Guaranteed Time Slot  Internet Of Things  Medium Access Control  Specific Absorption Rate  Traffic Prioritization  Wireless Body Area Network  Wireless Sensor Networks  
Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau Journal article
Brenda Wing Han Chan, Chi Tong Lei. Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau[J]. Nang Yan Business Journal, 2015, 4(1), 23-43.
Authors:  Brenda Wing Han Chan;  Chi Tong Lei
Favorite | TC[Scopus]:0 | Submit date:2019/10/24
Security Access Control System (Sacs)  Security Door Access Control System (Sdacs)  Result-oriented Management (Rom)  Project Management  
Internet of things' authentication and access control Journal article
Liu J., Xiao Y., Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241.
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite | TC[Scopus]:32 | Submit date:2019/02/11
Access Control  Authentication  Iot  Rfid  Security  
Authentication and access control in the Internet of things Conference paper
Liu J., Xiao Y., Chen C.L.P.. Authentication and access control in the Internet of things[C], 2012, 588-592.
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite | TC[Scopus]:235 | Submit date:2019/02/11
Access Control  Authentication  Internet Of Things  
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks Journal article
Huang, C., Lea, C., Wong, A.. A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks[J]. Computer Networks, 2012, 3261-3273.
Authors:  Huang, C.;  Lea, C.;  Wong, A.
Favorite | TC[WOS]:16 TC[Scopus]:20  IF:4.4/4.4 | Submit date:2022/06/27
Hidden Terminal Problem  Exposed Terminal Problem  Csma/ca  Multihop  Medium Access Control (Mac)  Ad Hoc Networks  
Information Sharing over Collaborative Social Networks using XACML Conference paper
Cheng Man Ma, Yan Zhuang, Simon Fong. Information Sharing over Collaborative Social Networks using XACML[C]:IEEE, 2011, 161-167.
Authors:  Cheng Man Ma;  Yan Zhuang;  Simon Fong
Favorite | TC[Scopus]:4 | Submit date:2019/02/13
Active Information Sharing  Attribute Base Access Control (Abac)  Extendable Mark Up Language (Xacml)  Information Sharing Propagation  Informative Social Network  Passive Information Sharing  
A Logical Model for Detecting Irregular Actions in Physical Access Environment Conference paper
António Leong, Simon Fong, Zhuang Yan. A Logical Model for Detecting Irregular Actions in Physical Access Environment[C]:IEEE COMPUTER SOC, 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2007, 560-564.
Authors:  António Leong;  Simon Fong;  Zhuang Yan
Favorite | TC[WOS]:0 TC[Scopus]:2 | Submit date:2019/02/13
Access Control  Intrusion Detection  Smart-card