Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Multi-GPU Parallel Pipeline Rendering with Splitting Frame

    In order to achieve real-time rendering of cloud gaming, a large amount of computing resources of graphics processing units (GPU) are required. In this paper, we propose a multi-GPU parallel pipeline rendering...

    Haitang Zhang, Junchao Ma, Zixia Qiu, Junmei Yao in Advances in Computer Graphics (2024)

  2. No Access

    Chapter and Conference Paper

    Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure

    The Internet of Things (IoT) devices have been deployed to realize smart environments such as smart cities, smart homes, smart health and smart grids. In these domains, the IoT devices collect and forward high...

    Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar in Internet of Everything (2023)

  3. No Access

    Chapter and Conference Paper

    Evaluation of Topology-Aware All-Reduce Algorithm for Dragonfly Networks

    Dragonfly is a popular topology for current and future high-speed interconnection networks. The concept of gathering topology information to accelerate collective operations is a very hot research field. All-r...

    Junchao Ma, Dezun Dong, Cunlu Li, Ke Wu, Liquan **ao in Network and Parallel Computing (2022)

  4. No Access

    Chapter and Conference Paper

    Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

    To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these...

    Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Junchao Ma in IoT as a Service (2022)

  5. No Access

    Chapter and Conference Paper

    MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

    Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between the operators and these aerial vehicles must be protected a...

    Zaid Ameen Abduljabbar in Future Access Enablers for Ubiquitous and … (2022)

  6. No Access

    Chapter and Conference Paper

    Interference-Aware Gossi** Scheduling in Uncoordinated Duty-Cycled Multi-hop Wireless Networks

    Gossi** is to broadcast the message of every node to all the other nodes in multi-hop wireless networks (MWNs). This operation plays an important role and is widely used in MWNs. Interference-aware gossi**...

    **anlong Jiao, Wei Lou, **aodong Wang in Wireless Algorithms, Systems, and Applicat… (2010)

  7. No Access

    Chapter and Conference Paper

    A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks

    Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employe...

    Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma in Distributed Computing in Sensor Systems (2010)