Search Results - "Qijin Ji"
-
1
How Much Delay Has to Be Tolerated in a Mobile Social Network?
Published in International journal of distributed sensor networks (01-01-2013)“…Message delivery in a mobile social network (MSN) is difficult due to the fact that the topology of such network is sparse and unstable. Various routing…”
Get full text
Journal Article -
2
Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption
Published in 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS) (01-05-2017)“…Attribute based encryption(ABE) is an efficient technique that exploits attributes and access policies to achieve fine grained access control in cloud…”
Get full text
Conference Proceeding -
3
Path planning for rendezvous of multiple AUVs operating in a variable ocean
Published in The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent (01-06-2014)“…This paper presents a path planner for rendezvous of multiple autonomous underwater vehicles (AUVs) in turbulent, cluttered, and uncertain environments. The…”
Get full text
Conference Proceeding -
4
A Push/Pull scheduling algorithm in P2P VoD
Published in Proceedings of 2012 2nd International Conference on Computer Science and Network Technology (01-12-2012)“…Video-on-Demand (VoD), which is an important application in peer-to-peer (P2P) networks, attracts a lot of researchers' interest at present. Data scheduling is…”
Get full text
Conference Proceeding -
5
Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system
Published in 2013 International Conference on Machine Learning and Cybernetics (01-07-2013)“…Online social networks and peer-to-peer (P2P) data swarming are a natural match, but a significant distinction between a traditional P2P swarming system and…”
Get full text
Conference Proceeding -
6
Admission Control Strategy of Serving Peers in P2P VoD Systems
Published in 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (01-08-2012)“…Data request task scheduling is one of the important issues for P2P VoD systems. However the existing data scheduling strategies in P2P VoD system is not fair…”
Get full text
Conference Proceeding -
7
An Omnibus Identification of BitTorrent Traffic in a Stub Network
Published in 2010 3rd International Symposium on Parallel Architectures, Algorithms and Programming (01-12-2010)“…Accurate, real time identification of P2P traffic is especially important for network management, because they seriously affect QoS of normal network services…”
Get full text
Conference Proceeding -
8
Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing
“…Multi-authority attribute-based encryption (MA-ABE) is regarded as a promising cryptographic technique to handle the problem of access control for data…”
Get full text
Conference Proceeding -
9
Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing
Published in 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC) (01-12-2017)“…Multi-authority attribute-based encryption (ABE) is regarded as one of the most promising techniques to handle the problem of the access control of shared data…”
Get full text
Conference Proceeding