Xiaohua Jia - Böcker
Visar alla böcker från författaren Xiaohua Jia. Handla med fri frakt och snabb leverans.
7 produkter
7 produkter
1 577 kr
Skickas inom 10-15 vardagar
Along with the explosive growth of network traffic, multiwavelength optical networks are believed to be the technology that will support the ever-increasing bandwidth demands and will be the backbone for the next generation of the Internet. This title systematically studies the major research issues in WDM (Wavelength Division Multiplexing) optical networks, such as routing and wavelength assignment, QoS multicast routing, design of logical topologies, and placement of wavelength converters. The book consists of two parts. The first part studies the fundamental concepts and principles of WDM networks. The second part discusses advanced and research issues of WDM networks.
1 577 kr
Skickas inom 10-15 vardagar
Multiwavelength Optical Networks systematically studies the major research issues in WDM (Wavelength Division Multiplexing) optical networks, such as routing and wavelength assignment, QoS multicast routing, design of logical topologies, and placement of wavelength converters. The book consists of two parts. The first part studies the fundamental concepts and principles of WDM networks. The second part discusses advanced and research issues of WDM networks. The authors of the book have many years of working experience in the areas of computer networks and network optimization. The book discusses many difficult issues of WDM networks in a very comprehensive way. For each problem, there is a background discussion, and then the mathematical formulation, followed by the solutions.
442 kr
Skickas inom 10-15 vardagar
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.
1 485 kr
Skickas inom 10-15 vardagar
This book systematically studies blockchain adaptability and scalability, combining theoretical analysis with practical implementation. Chapter 3 presents AdaptPoW, which enhances PoW blockchain adaptability and scalability through dynamic structure adjustment and efficient transaction processing.
Mobile Ad-hoc and Sensor Networks
First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
Häftad, Engelska, 2005
1 590 kr
Skickas inom 10-15 vardagar
MSN 2005, the First International Conference on Mobile Ad-hoc and Sensor Networks, was held during 13-15 December 2005, in Wuhan, China. The conference provided a forum for researchers and practitioners to exchange research results and share development experiences. MSN 2005 attracted 512 submissions (including the submissions to the Modeling and Security in Next Generation Mobile Information Systems (MSNG) workshop), among which 100 papers were accepted for the conf- ence and 12 papers were accepted for the workshop. We would like to thank the International Program Committee for their valuable time and effort in reviewing the papers. Special thanks go to the conference PC Vi- chairs, Ivan Stojmenovic, Jang-Ping Sheu and Jianzhong Li for their help in ass- bling the International PC and coordinating the review process. We would also like to thank the Workshop Chair, Dongchun Lee, for organizing the workshop. We would like to express our gratitude to the invited speakers, Laxmi Bhuya, Lionel Ni and Taieb Znati, for their insightful speeches. Finally, we would like to thank the Local Organization Chair, Chuanhe Huang, for making all the local - rangements for the conference.December 2005 Xiaohua Jia Jie Wu Yanxiang He Organization Steering Co-chairs Lionel Ni, Hong Kong University of Science and Technology, HKSAR Jinnan Liu, Wuhan University, PRC General Co-chairs Taieb Znati, University of Pittsburgh, USA Yanxiang He, Wuhan University, PRC Program Co-chairs Jie Wu, Florida Atlantic University, USA Xiaohua Jia, City University of Hong Kong, HKSAR Program Vice Chairs
Mobile Ad-hoc and Sensor Networks
Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings
Häftad, Engelska, 2006
1 073 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong Kong, China in December 2006. The 73 revised full papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, security, energy efficiency, data processing, and deployment.
Wireless Algorithms, Systems, and Applications
8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings
Häftad, Engelska, 2013
556 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 8th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.