Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Verifiable Rational Multi-secret Sharing Scheme

    In this paper we mainly focus on the cheating problem and the incapability problem existed in rational secret sharing schemes. Based on current schemes and the related knowledge of bit commitment agreement, we...

    Yongquan Cai, Zhanhai Luo, Yi Yang in Information Computing and Applications (2011)

  2. No Access

    Chapter and Conference Paper

    A New Health Indicator Construction Approach and Its Application in Remaining Useful Life Prediction of Bearings

    A good health index (HI) plays an important role in improving the reliability and accuracy of the prediction of remaining useful life (RUL) of rolling bearings. In order to better integrate degradation informa...

    Huiming Jiang, **hai Luo, Yunfei Shao in Neural Computing for Advanced Applications (2021)

  3. No Access

    Chapter and Conference Paper

    A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm

    The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles ...

    Jihai Luo, Chen Dong, Zhenyi Chen, Li Xu in Green, Pervasive, and Cloud Computing (2024)