Search Results - "AN'AN LUO"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Quality of protection analysis and performance modeling in IP multimedia subsystem by Luo, An’an, Lin, Chuang, Wang, Kai, Lei, Lei, Liu, Chanfang

    Published in Computer communications (03-07-2009)
    “…IP Multimedia Subsystem (IMS) is widely considered as the main solution for the next generation multimedia rich communication. In order to provide multi-level…”
    Get full text
    Journal Article
  2. 2

    Proxy-Based Security Audit System for Remote Desktop Access by Shi-hai Huang, Chuang Lin, An'an Luo, Zhen Chen, Xin Jiang, Kai Wang, Hui Zhang, Xue-hai Peng

    “…Remote desktop access is commonly used to remotely access a host in enterprise networks; however it also brings in security problems in supervision and…”
    Get full text
    Conference Proceeding
  3. 3

    TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution by Lingyun Ruan, An'an Luo, Zhen Chen

    “…Content pollution problem has attracted broad attention due to its impacts on P2P networks' efficiency and availability. Especially for Bit Torrent users,…”
    Get full text
    Conference Proceeding
  4. 4

    An Effective Early Warning Scheme against Pollution Dissemination for BitTorrent by An'an Luo, Chuang Lin, Yixin Jiang, Xiaowen Chu, Hongkun Yang

    “…BitTorrent is one of the most popular P2P file sharing systems. However, chunk-based file sharing mode makes it difficult to detect content pollution and…”
    Get full text
    Conference Proceeding
  5. 5

    Performance modeling and evaluation using Queuing Petri Nets in IMS by An'an Luo, Chuang Lin, Kai Wang, Fengyuan Ren, Limin Miao

    “…IP multimedia subsystem (IMS) is considered as the main solution for the next generation multimedia rich communication. The hotspot topic of IMS has motivated…”
    Get full text
    Conference Proceeding
  6. 6
  7. 7

    A-ADHOC: An adaptive real-time distributed MAC protocol for Vehicular Ad Hoc Networks by Limin Miao, Fengyuan Ren, Chuang Lin, Anan Luo

    “…Vehicular ad hoc networks (VANET) is the foundation of intelligent traffic system (ITS), and many MAC protocols for VANET are proposed, among which a reliable…”
    Get full text
    Conference Proceeding
  8. 8

    TNC-UTM: A Holistic Solution to Secure Enterprise Networks by Fachao Deng, Anan Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng

    “…This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution…”
    Get full text
    Conference Proceeding
  9. 9

    A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network by Guodong Li, Zhen Chen, Anan Luo, Yibo Xue, Jun Li, Chuang Lin

    “…In order to provide the service differentiation for various network applications, and guarantee delay and bandwidth requirement, packet scheduling is…”
    Get full text
    Conference Proceeding
  10. 10

    Privacy-Preserving Trust Management for Social-Based P2P Networks by An'an Luo, Liqin Tian, Chuang Lin

    “…Being a new Internet application, social-based P2P network, which merges P2P file sharing technology and social network, is drawn more and more attention…”
    Get full text
    Conference Proceeding
  11. 11

    TNC-compatible NAC System implemented on Network Processor by An'an Luo, Chuang Lin, Zhen Chen, Xuehai Peng, Ungsunan, P.D.

    “…In this paper, based on the trusted network connect architecture, we designed a novel TNC-compatible network access control system which ensures that network…”
    Get full text
    Conference Proceeding