Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network

    Green edge-assisted unmanned aerial vehicle (eUAV) network is an emerging network architecture enhanced with the energy efficiency technology that provides an ubiquitous communication for air and ground. It is...

    Qixu Wang, Peng **ao, **ang Li, Yunxiang Qiu in Peer-to-Peer Networking and Applications (2024)

  2. Article

    Open Access

    Two-dimensional materials for future information technology: status and prospects

    Over the past 70 years, the semiconductor industry has undergone transformative changes, largely driven by the miniaturization of devices and the integration of innovative structures and materials. Two-dimensi...

    Hao Qiu, Zhihao Yu, Tiange Zhao, Qi Zhang in Science China Information Sciences (2024)

  3. No Access

    Article

    Supervised graph contrastive learning for cancer subtype identification through multi-omics data integration

    Cancer is one of the most deadly diseases in the world. Accurate cancer subtype classification is critical for patient diagnosis, treatment, and prognosis. Ever-increasing multi-omics data describes the charac...

    Fangxu Chen, Wei Peng, Wei Dai, Shoulin Wei in Health Information Science and Systems (2024)

  4. No Access

    Article

    Two-dimensional materials-based integrated hardware

    In recent years, two-dimensional (2D) materials-based fundamental preparing process such as high-quality wafer-level single crystal thin film synthesis technology and high-performance electrode preparing techn...

    Zhuiri Peng, Runfeng Lin, Zheng Li, Langlang Xu in Science China Information Sciences (2023)

  5. No Access

    Article

    A two-stage segmentation of sublingual veins based on compact fully convolutional networks for Traditional Chinese Medicine images

    As one of the key methods of Traditional Chinese Medicine inspection, tongue diagnosis manifests the advantages of simplicity and directness. Sublingual veins can provide essential information about human heal...

    Hua Xu, **aofei Chen, Peng Qian, Fufeng Li in Health Information Science and Systems (2023)

  6. No Access

    Article

    Time window-based online task assignment in mobile crowdsensing: Problems and algorithms

    Mobile crowdsensing (MCS) has been an effective sensing paradigm by exploiting the pervasive sensor-rich mobile devices for sensor data collection. Online task assignment is an important issue for mobile crowd...

    Shuo Peng, Kun Liu, Shiji Wang, Yangxia **ang in Peer-to-Peer Networking and Applications (2023)

  7. Article

    Open Access

    Research on outpatient capacity planning combining lean thinking and integer linear programming

    The size and cost of outpatient capacity directly affect the operational efficiency of a whole hospital. Many scholars have faced the study of outpatient capacity planning from an operations management perspec...

    Li hua, Mu Dongmei, Yang **nyu, Zhang **nyue in BMC Medical Informatics and Decision Making (2023)

  8. No Access

    Article

    Advances in wide-tuning and narrow-linewidth external-cavity diode lasers

    The external-cavity diode laser is advantageous in terms of low noise, high side-mode suppression ratio, high temperature stability, simple structure, and low cost, which has been the preferred scheme to reali...

    Qiang Cui, Yuxin Lei, Yongyi Chen, Cheng Qiu, Ye Wang in Science China Information Sciences (2022)

  9. No Access

    Article

    A donation tracing blockchain model using improved DPoS consensus algorithm

    During the donation process, the source and flow of donated goods are not disclosed to the public in time. In this paper, we propose the donation tracing blockchain model (DTBM) to render the donation process ...

    Wei Liu, Yang Li, **ujun Wang, Yufei Peng in Peer-to-Peer Networking and Applications (2021)

  10. No Access

    Article

    On the convergence and improvement of stochastic normalized gradient descent

    Non-convex models, like deep neural networks, have been widely used in machine learning applications. Training non-convex models is a difficult task owing to the saddle points of models. Recently, stochastic n...

    Shen-Yi Zhao, Yin-Peng **e, Wu-Jun Li in Science China Information Sciences (2021)

  11. No Access

    Article

    Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles

    The advancement of hardware and software technology makes multiple cooperative unmanned surface vehicles (USVs) utilized in maritime escorting with low cost and high efficiency. USVs can work as edge computing...

    Jiajia **e, Jun Luo, Yan Peng, Shaorong **e in Peer-to-Peer Networking and Applications (2020)

  12. No Access

    Article

    A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles

    Data aggregation can effectively improve resource utilization in Internet of Vehicles (IoV), and has attracted broad attention recently. However, because of the particularity of nodes in IoV, data aggregation ...

    Peng Hu, Yongli Wang, Bei Gong, Yongjian Wang in Peer-to-Peer Networking and Applications (2020)

  13. No Access

    Article

    Advances in narrow linewidth diode lasers

    The smart travel era has come and requirement for high precision lidar detection technology is higher and higher. The new solid-state lidars can meet the requirements of intelligent cars in the future, with th...

    **ngkai Lang, Peng Jia, Yongyi Chen, Li Qin in Science China Information Sciences (2019)

  14. No Access

    Article

    An optimized protocol for QoS and energy efficiency on wireless body area networks

    Body area networks (BAN) are at the forefront of technologies for long-term monitoring of personal healthcare, which is intended be an effective strategy to address the aging population worldwide. The transcei...

    Tong Bai, **zhao Lin, Guoquan Li, Huiqian Wang in Peer-to-Peer Networking and Applications (2019)

  15. No Access

    Article

    General Theory of security and a study of hacker’s behavior in big data era

    Big data brings great value as well as a lot of network security problems, which makes the hacker possess more and more attack strategies. This paper precisely describes the static form of hackers, and propose...

    Yixian Yang, **nxin Niu, Lixiang Li in Peer-to-Peer Networking and Applications (2018)

  16. No Access

    Article

    Energy-efficient content distribution via mobile users cooperations in cellular networks

    Exploiting cooperation of mobile stations (MSs) for content distribution has been considered as a promising approach to offload the rapidly growing traffic demand in cellular networks. This paper proposes a fr...

    Jiachao Chen, Yuan Wu, Li ** Qian, Hong Peng in Peer-to-Peer Networking and Applications (2017)

  17. No Access

    Article

    OPNET-based modeling and simulation of mobile Zigbee sensor networks

    Modeling and simulation can help to validate and evaluate the performance of wireless sensor networks (WSNs) within specific applications. In order to resolve the issue of the restriction on node mobility in e...

    **aolong Li, Mei** Peng, Jun Cai, Changyan Yi in Peer-to-Peer Networking and Applications (2016)

  18. No Access

    Article

    A secure and efficient mutual authentication scheme for session initiation protocol

    The Session Initiation Protocol (SIP) as the core signaling protocol for multimedia services is receiving much attention. Authentication is becoming increasingly crucial issue when a user asks to use SIP servi...

    Yanrong Lu, Lixiang Li, Haipeng Peng in Peer-to-Peer Networking and Applications (2016)

  19. No Access

    Article

    HeMatch: A redundancy layout placement scheme for erasure-coded storages in practical heterogeneous failure patterns

    Erasure codes are widely used in storage systems for providing data reliability due to the advantage of high storage efficiency, while the access efficiency becomes the main shortcoming because of the extra da...

    **g Zhang, ShanShan Li, **angKe Liao, ShaoLiang Peng in Science China Information Sciences (2015)

  20. No Access

    Article

    Global core, and galaxy structure of networks

    We propose a novel approach, namely local reduction of networks, to extract the global core (GC, for short) from a complex network. The algorithm is built based on the small community phenomenon of networks. The ...

    Wei Zhang, YiCheng Pan, Pan Peng, JianKou Li in Science China Information Sciences (2014)

previous disabled Page of 2