Skip to main content

previous disabled Page of 3
and
  1. Chapter and Conference Paper

    Traffic Engineering with AIMD in MPLS Networks

    We consider the problem of allocating bandwidth to competing flows in an MPLS network, subject to constraints on fairness, efficiency, and administrative complexity. The aggregate traffic between a source and ...

    Jian** Wang, Stephen Patek, Haiyong Wang in Protocols for High Speed Networks (2002)

  2. Chapter and Conference Paper

    A Pervasive Sensor Node Architecture

    A set of sensor nodes is the basic component of a sensor network. Many researchers are currently engaged in develo** pervasive sensor nodes due to the great promise and potential with applications shown by v...

    Li Cui, Fei Wang, Haiyong Luo, Hailing Ju, and Tianpu Li in Network and Parallel Computing (2004)

  3. No Access

    Chapter and Conference Paper

    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme

    Signcryption denotes a cryptographic method, which can process encryption and digital signature simultaneously. So, adopting such schemes, computational cost of encryption and signature compared to traditional...

    Haiyong Bao, Zhenfu Cao, Haifeng Qian in Cryptology and Network Security (2005)

  4. No Access

    Chapter and Conference Paper

    Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings

    Authenticated key agreement protocols are essential for secure communications in open and distributed environments. In 2004, Ryu et al. proposed an efficient two-party identity-based authenticated key agreemen...

    Shengbao Wang, Zhenfu Cao, Haiyong Bao in Parallel and Distributed Processing and Ap… (2005)

  5. Chapter and Conference Paper

    Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks

    Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if not well addressed may lead I...

    Haiyong **e, Yang Richard Yang in NETWORKING 2008 Ad Hoc and Sensor Networks… (2008)

  6. No Access

    Chapter and Conference Paper

    Human Motion Classification Using ℜ Transform

    This paper presents a new classification method for single person’s motion, which is represented by ℜ transform descriptor and classified by Linear-chain Conditional Random Fields. What it solves is that the g...

    Qing Wei, Hao Zhang, Haiyong Zhao, Zhi**g Liu in Information Computing and Applications (2010)

  7. No Access

    Article

    A hybrid scheme for securing fingerprint templates

    In a fingerprint recognition system, templates are stored in the server database. To avoid the privacy concerns in case the database is compromised, many approaches of securing biometrics templates such as bio...

    Haiyong Chen, Hailiang Chen in International Journal of Information Security (2010)

  8. No Access

    Chapter and Conference Paper

    Recognizing Human Activities Using Non-linear SVM Decision Tree

    This paper presents a new method of human activity recognition, which is based on \(\mathfrak{R}\) transform and non-linear SVM D...

    Haiyong Zhao, Zhi**g Liu, Hao Zhang in Intelligent Computing and Information Science (2011)

  9. Chapter and Conference Paper

    Collaborative Forwarding and Caching in Content Centric Networks

    Content caching plays an important role in content-centric networks. The current design of content-centric networks adopts a limited, en-route hierarchical caching mechanism, and caching and forwarding are lar...

    Shuo Guo, Haiyong **e, Guangyu Shi in NETWORKING 2012 (2012)

  10. No Access

    Book

  11. No Access

    Chapter

    Introduction

    Nowadays distributed hash table (DHT) [1, 2] plays an important role in distributed systems and applications, especially in large-scale distributed environments. In the normal Client/Server model (C/S model) s...

    Hao Zhang, Yonggang Wen, Haiyong **e, Nenghai Yu in Distributed Hash Table (2013)

  12. No Access

    Chapter

    Summary

    In the above chapters, we summarize the theory, platforms and applications of DHT. In theory, there are plenty of variants of DHT, which provide many choices for constructing DHT-based platforms and applicatio...

    Hao Zhang, Yonggang Wen, Haiyong **e, Nenghai Yu in Distributed Hash Table (2013)

  13. No Access

    Chapter

    DHT Theory

    In this chapter, we discuss a set of DHT variants, which widely influence the design and development of distributed systems in recent years. In each section, we first describe the structure of each variant, pr...

    Hao Zhang, Yonggang Wen, Haiyong **e, Nenghai Yu in Distributed Hash Table (2013)

  14. No Access

    Chapter

    DHT Applications

    Like Pythagorean theorem and Newton Law, excellent theories are always simple and graceful. DHT, which performs so graceful that only two basic operations: get data from DHT and put data into DHT, is wildly used ...

    Hao Zhang, Yonggang Wen, Haiyong **e, Nenghai Yu in Distributed Hash Table (2013)

  15. No Access

    Chapter

    DHT Platforms

    Based on the theory of DHT, many researchers develop platforms, that implement different kinds of DHT and provide interfaces and services to applications. DHT translation from theory to platform is not a simpl...

    Hao Zhang, Yonggang Wen, Haiyong **e, Nenghai Yu in Distributed Hash Table (2013)

  16. No Access

    Chapter and Conference Paper

    TACO: A Traceback Algorithm Based on Ant Colony Optimization for Geomagnetic Positioning

    Magnetic field fluctuations in modern buildings can derive from both natural and man-made sources, which typically include steel, reinforced concrete structures, and electric power systems, etc. Since the anom...

    Hui Li, Haiyong Luo, Fang Zhao, **nrong Li in Advances in Wireless Sensor Networks (2015)

  17. No Access

    Chapter and Conference Paper

    An Adaptive Step Detection Algorithm Based on the State Machine

    This paper addresses an adaptive step detection algorithm using inertial sensors commonly found on commodity mobile phone. After analyzing the acceleration data collected by the accelerometer in mobile phone, ...

    Fang Zhao, **nran Li, Jiabao Yin, Haiyong Luo in Advances in Wireless Sensor Networks (2015)

  18. No Access

    Article

    A novel edge detection approach using a fusion model

    Edge detection is a long standing but still challenging problem. Although there are many effective edge detectors, none of them can obtain ideal edges in every situation. To make the results robust for any ima...

    **bin Jia, Haiyong Huang, Yanfeng Sun, Jianming Yuan in Multimedia Tools and Applications (2016)

  19. No Access

    Article

    Asymmetric self-recovery oriented stereo image watermarking method for three dimensional video system

    To authenticate integrity of the stereo image for three dimensional video systems, a new asymmetric self-recovery oriented stereo image watermarking method is proposed by considering inter-correlations betwee...

    Ting Luo, Gangyi Jiang, Mei Yu, Haiyong Xu in Multimedia Systems (2016)

  20. No Access

    Article

    A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance

    To design an efficient and secure data aggregation scheme fitting real applications has been pursued by research communities for a long time. In this paper, we propose a novel secure data aggregation scheme to...

    Haiyong Bao, Rongxing Lu in Peer-to-Peer Networking and Applications (2017)

previous disabled Page of 3