Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Multi-GPU Parallel Pipeline Rendering with Splitting Frame

    In order to achieve real-time rendering of cloud gaming, a large amount of computing resources of graphics processing units (GPU) are required. In this paper, we propose a multi-GPU parallel pipeline rendering...

    Haitang Zhang, Junchao Ma, Zixia Qiu, Junmei Yao in Advances in Computer Graphics (2024)

  2. No Access

    Chapter and Conference Paper

    Integrated Planning for Water Pollution Control in Suburban Regions in South-Eastern China

    Water pollution caused by agricultural runoff and domestic sewage discharge is a critical issue for surface water quality and ecosystem health in develo** regions worldwide. This paper focuses on a suburban ...

    Hailan Yu, Huabin Shentu, Shaoyi Wang in Proceedings of The 9th International Confe… (2024)

  3. No Access

    Chapter and Conference Paper

    Packet Replays Prevention Protocol for Secure B5G Networks

    The beyond 5G networks (B5G) are characterized by high throughputs at extremely low latencies and better energy consumptions. This has seen them being deployed as the backbone of numerous Internet of Things (I...

    Vincent Omollo Nyangaresi, Junchao Ma in Proceedings of Seventh International Congr… (2023)

  4. No Access

    Chapter and Conference Paper

    Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure

    The Internet of Things (IoT) devices have been deployed to realize smart environments such as smart cities, smart homes, smart health and smart grids. In these domains, the IoT devices collect and forward high...

    Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar in Internet of Everything (2023)

  5. No Access

    Chapter and Conference Paper

    Evaluation of Topology-Aware All-Reduce Algorithm for Dragonfly Networks

    Dragonfly is a popular topology for current and future high-speed interconnection networks. The concept of gathering topology information to accelerate collective operations is a very hot research field. All-r...

    Junchao Ma, Dezun Dong, Cunlu Li, Ke Wu, Liquan **ao in Network and Parallel Computing (2022)

  6. No Access

    Chapter and Conference Paper

    Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

    To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these...

    Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Junchao Ma in IoT as a Service (2022)

  7. No Access

    Chapter and Conference Paper

    MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

    Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between the operators and these aerial vehicles must be protected a...

    Zaid Ameen Abduljabbar in Future Access Enablers for Ubiquitous and … (2022)

  8. No Access

    Chapter and Conference Paper

    Interference-Aware Gossi** Scheduling in Uncoordinated Duty-Cycled Multi-hop Wireless Networks

    Gossi** is to broadcast the message of every node to all the other nodes in multi-hop wireless networks (MWNs). This operation plays an important role and is widely used in MWNs. Interference-aware gossi**...

    **anlong Jiao, Wei Lou, **aodong Wang in Wireless Algorithms, Systems, and Applicat… (2010)

  9. No Access

    Chapter and Conference Paper

    A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks

    Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employe...

    Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma in Distributed Computing in Sensor Systems (2010)