Search Results - "Qijin Ji"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    How Much Delay Has to Be Tolerated in a Mobile Social Network? by Zhu, Yanqin, Zhang, Haojun, Ji, Qijin

    “…Message delivery in a mobile social network (MSN) is difficult due to the fact that the topology of such network is sparse and unstable. Various routing…”
    Get full text
    Journal Article
  2. 2

    Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption by Jiaye Shao, Yanqin Zhu, Qijin Ji

    “…Attribute based encryption(ABE) is an efficient technique that exploits attributes and access policies to achieve fine grained access control in cloud…”
    Get full text
    Conference Proceeding
  3. 3

    Path planning for rendezvous of multiple AUVs operating in a variable ocean by Zheng Zeng, Lammas, Andrew, Sammut, Karl, Fangpo He, Youhong Tang, Qijin Ji

    “…This paper presents a path planner for rendezvous of multiple autonomous underwater vehicles (AUVs) in turbulent, cluttered, and uncertain environments. The…”
    Get full text
    Conference Proceeding
  4. 4

    A Push/Pull scheduling algorithm in P2P VoD by Yanqin Zhu, Jianjun Bian, Qijin Ji

    “…Video-on-Demand (VoD), which is an important application in peer-to-peer (P2P) networks, attracts a lot of researchers' interest at present. Data scheduling is…”
    Get full text
    Conference Proceeding
  5. 5

    Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system by Guilin Wang, Haojun Zhang, Yanqin Zhu, Qijin Ji, Haifeng Shen

    “…Online social networks and peer-to-peer (P2P) data swarming are a natural match, but a significant distinction between a traditional P2P swarming system and…”
    Get full text
    Conference Proceeding
  6. 6

    Admission Control Strategy of Serving Peers in P2P VoD Systems by Yanqin Zhu, Jianjun Bian, Qijin Ji, Haojun Zhang

    “…Data request task scheduling is one of the important issues for P2P VoD systems. However the existing data scheduling strategies in P2P VoD system is not fair…”
    Get full text
    Conference Proceeding
  7. 7

    An Omnibus Identification of BitTorrent Traffic in a Stub Network by Zhe Yang, Lingzhi Li, Qijin Ji, Yanqin Zhu

    “…Accurate, real time identification of P2P traffic is especially important for network management, because they seriously affect QoS of normal network services…”
    Get full text
    Conference Proceeding
  8. 8
  9. 9

    Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing by Shao, Jiaye, Zhu, Yanqin, Ji, Qijin

    “…Multi-authority attribute-based encryption (ABE) is regarded as one of the most promising techniques to handle the problem of the access control of shared data…”
    Get full text
    Conference Proceeding