×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [5]
THE STATE KEY LA... [2]
Faculty of Busin... [1]
Faculty of Healt... [1]
CHEONG KUN LUN C... [1]
Faculty of Socia... [1]
More...
Authors
FONG SIMON JAMES [2]
YUAN ZHEN [1]
CHEN CHUN LUNG P... [1]
PUN CHI MAN [1]
WU MAN SZE ANISE [1]
FEN HOU [1]
More...
Document Type
Journal article [7]
Conference paper [3]
Book chapter [1]
Date Issued
2023 [2]
2022 [1]
2020 [1]
2015 [1]
2012 [3]
2011 [1]
More...
Language
英語English [11]
Source Publication
Computer Network... [1]
Healthcare Parad... [1]
IEEE TRANSACTION... [1]
IEEE Transaction... [1]
International Jo... [1]
International Jo... [1]
More...
Indexed By
SCIE [4]
SSCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 11
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Enabling Fully-Decoupled Radio Access with Elastic Resource Allocation
Journal article
Qian Bo, Ma Ting, Xu Yunting, Zhao Jiwei, Yu Kai, Wu Yuan, Zhou Haibo. Enabling Fully-Decoupled Radio Access with Elastic Resource Allocation[J]. IEEE Transactions on Cognitive Communications and Networking, 2023, 9(4), 1025-1040.
Authors:
Qian Bo
;
Ma Ting
;
Xu Yunting
;
Zhao Jiwei
;
Yu Kai
; et al.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
5
IF:
7.4
/
6.9
|
Submit date:2023/08/03
6g
Fully-decoupled Radio Access Network
Elastic Resource Allocation
Power Control
Many-to-many Matching Model
On the Mathematical Modeling and Optimization for the Energy Efficiency Performance of CSMA-NOMA Random Access Networks with Channel Inversion
Journal article
Cao, Shengbin, Hou, Fen. On the Mathematical Modeling and Optimization for the Energy Efficiency Performance of CSMA-NOMA Random Access Networks with Channel Inversion[J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22(4), 2867-2884.
Authors:
Cao, Shengbin
;
Hou, Fen
Favorite
|
TC[WOS]:
1
TC[Scopus]:
4
|
Submit date:2022/12/31
Non-orthogonal Multiple Access (Noma)
Decoding
Mathematical Models
Wireless Communication
Optimization
Power Control
Multiaccess Communication
Energy Efficiency
Csma
Ca
Difference Of Convex Programming (Dcp)
Random Access
Performance Analysis
Complementary Geometric Programming (Cgp)
The Application of the Intolerance of Uncertainty Model to Gambling Urge and Involvement
Journal article
Hui Zhou, Eva P. W. Hung, Li Xie, Zhen Yuan, Anise M. S. Wu. The Application of the Intolerance of Uncertainty Model to Gambling Urge and Involvement[J]. International Journal of Environmental Research and Public Health, 2022, 19(22), 14738.
Authors:
Hui Zhou
;
Eva P. W. Hung
;
Li Xie
;
Zhen Yuan
;
Anise M. S. Wu
Favorite
|
TC[WOS]:
3
TC[Scopus]:
4
|
Submit date:2022/12/01
Intolerance Of Uncertainty
Impulse Control
Limited Access To Emotion Regulation Strategies
Gambling Urge
Gambling Involvement
Chinese
Gamblers
Chapter 4 - The role of Internet of Things for adaptive traffic prioritization in wireless body area networks
Book chapter
出自: Healthcare Paradigms in the Internet of Things Ecosystem:Elsevier, 2020, 页码:63-82
Authors:
Fasee Ullah
;
Chi-Man Pun
Favorite
|
TC[Scopus]:
6
|
Submit date:2022/08/24
Biomedical Sensor
Carrier-sense Multiple Access/collision Avoidance
Contention Access Period
Contention-free Period
Guaranteed Time Slot
Internet Of Things
Medium Access Control
Specific Absorption Rate
Traffic Prioritization
Wireless Body Area Network
Wireless Sensor Networks
Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau
Journal article
Brenda Wing Han Chan, Chi Tong Lei. Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau[J]. Nang Yan Business Journal, 2015, 4(1), 23-43.
Authors:
Brenda Wing Han Chan
;
Chi Tong Lei
Favorite
|
TC[Scopus]:
0
|
Submit date:2019/10/24
Security Access Control System (Sacs)
Security Door Access Control System (Sdacs)
Result-oriented Management (Rom)
Project Management
Internet of things' authentication and access control
Journal article
Liu J., Xiao Y., Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241.
Authors:
Liu J.
;
Xiao Y.
;
Chen C.L.P.
Favorite
|
TC[Scopus]:
32
|
Submit date:2019/02/11
Access Control
Authentication
Iot
Rfid
Security
Authentication and access control in the Internet of things
Conference paper
Liu J., Xiao Y., Chen C.L.P.. Authentication and access control in the Internet of things[C], 2012, 588-592.
Authors:
Liu J.
;
Xiao Y.
;
Chen C.L.P.
Favorite
|
TC[Scopus]:
235
|
Submit date:2019/02/11
Access Control
Authentication
Internet Of Things
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks
Journal article
Huang, C., Lea, C., Wong, A.. A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks[J]. Computer Networks, 2012, 3261-3273.
Authors:
Huang, C.
;
Lea, C.
;
Wong, A.
Favorite
|
TC[WOS]:
16
TC[Scopus]:
20
IF:
4.4
/
4.4
|
Submit date:2022/06/27
Hidden Terminal Problem
Exposed Terminal Problem
Csma/ca
Multihop
Medium Access Control (Mac)
Ad Hoc Networks
Information Sharing over Collaborative Social Networks using XACML
Conference paper
Cheng Man Ma, Yan Zhuang, Simon Fong. Information Sharing over Collaborative Social Networks using XACML[C]:IEEE, 2011, 161-167.
Authors:
Cheng Man Ma
;
Yan Zhuang
;
Simon Fong
Favorite
|
TC[Scopus]:
4
|
Submit date:2019/02/13
Active Information Sharing
Attribute Base Access Control (Abac)
Extendable Mark Up Language (Xacml)
Information Sharing Propagation
Informative Social Network
Passive Information Sharing
A Logical Model for Detecting Irregular Actions in Physical Access Environment
Conference paper
António Leong, Simon Fong, Zhuang Yan. A Logical Model for Detecting Irregular Actions in Physical Access Environment[C]:IEEE COMPUTER SOC, 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2007, 560-564.
Authors:
António Leong
;
Simon Fong
;
Zhuang Yan
Favorite
|
TC[WOS]:
0
TC[Scopus]:
2
|
Submit date:2019/02/13
Access Control
Intrusion Detection
Smart-card