Search Results - "AN'AN LUO"
-
1
Quality of protection analysis and performance modeling in IP multimedia subsystem
Published in Computer communications (03-07-2009)“…IP Multimedia Subsystem (IMS) is widely considered as the main solution for the next generation multimedia rich communication. In order to provide multi-level…”
Get full text
Journal Article -
2
Proxy-Based Security Audit System for Remote Desktop Access
Published in 2009 Proceedings of 18th International Conference on Computer Communications and Networks (01-08-2009)“…Remote desktop access is commonly used to remotely access a host in enterprise networks; however it also brings in security problems in supervision and…”
Get full text
Conference Proceeding -
3
TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution
Published in 2011 Third International Conference on Communications and Mobile Computing (01-04-2011)“…Content pollution problem has attracted broad attention due to its impacts on P2P networks' efficiency and availability. Especially for Bit Torrent users,…”
Get full text
Conference Proceeding -
4
An Effective Early Warning Scheme against Pollution Dissemination for BitTorrent
Published in GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference (01-11-2009)“…BitTorrent is one of the most popular P2P file sharing systems. However, chunk-based file sharing mode makes it difficult to detect content pollution and…”
Get full text
Conference Proceeding -
5
Performance modeling and evaluation using Queuing Petri Nets in IMS
Published in 2009 Fourth International Conference on Communications and Networking in China (01-08-2009)“…IP multimedia subsystem (IMS) is considered as the main solution for the next generation multimedia rich communication. The hotspot topic of IMS has motivated…”
Get full text
Conference Proceeding -
6
-
7
A-ADHOC: An adaptive real-time distributed MAC protocol for Vehicular Ad Hoc Networks
Published in 2009 Fourth International Conference on Communications and Networking in China (01-08-2009)“…Vehicular ad hoc networks (VANET) is the foundation of intelligent traffic system (ITS), and many MAC protocols for VANET are proposed, among which a reliable…”
Get full text
Conference Proceeding -
8
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
Published in 2008 The 9th International Conference for Young Computer Scientists (01-11-2008)“…This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution…”
Get full text
Conference Proceeding -
9
A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network
Published in 2010 Second International Conference on Communication Software and Networks (01-02-2010)“…In order to provide the service differentiation for various network applications, and guarantee delay and bandwidth requirement, packet scheduling is…”
Get full text
Conference Proceeding -
10
Privacy-Preserving Trust Management for Social-Based P2P Networks
Published in 2010 International Conference on Internet Technology and Applications (01-08-2010)“…Being a new Internet application, social-based P2P network, which merges P2P file sharing technology and social network, is drawn more and more attention…”
Get full text
Conference Proceeding -
11
TNC-compatible NAC System implemented on Network Processor
Published in 32nd IEEE Conference on Local Computer Networks (LCN 2007) (01-10-2007)“…In this paper, based on the trusted network connect architecture, we designed a novel TNC-compatible network access control system which ensures that network…”
Get full text
Conference Proceeding