222 results on '"Xiaolin Chang"'
Search Results
2. Modeling of both tensional-shear and compressive-shear fractures by a unified phase-field model
3. Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach
4. A fast-setting and eco-friendly superhydrophobic high belite sulphoaluminate cement mortar
5. Design of Proof-of-Stake PBFT Algorithm for IoT Environments
6. Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model
7. Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT
8. Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization
9. Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment
10. Revisiting FAW attack in an imperfect PoW blockchain system
11. A high performance two-layer consensus architecture for blockchain-based IoT systems
12. DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics
13. Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach
14. Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack
15. Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective
16. Job Completion Time Under Migration-Based Dynamic Platform Technique
17. Scalable Self-Sovereign Identity Architecture
18. Review of studies on the stick-slip behavior of granular fault gouge
19. Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT
20. Elastic geopolymer based on nanotechnology: Synthesis, characterization, properties, and applications
21. Availability and Reliability of Service Function Chain: A Quantitative Evaluation View
22. Exploring best-matched embedding model and classifier for charging-pile fault diagnosis
23. Understanding MEC empowered vehicle task offloading performance in 6G networks
24. Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm
25. Reducing the number of transaction messages in bitcoin
26. An adaptive phase-field model based on bilinear elements for tensile-compressive-shear fracture
27. Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks
28. Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment
29. Trust and Rewards in a Two-Tier Consensus Architecture
30. Impact of rumination on sleep quality among patients with non‑alcoholic fatty liver disease: a moderated mediation model of anxiety symptoms and resilience
31. Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting
32. Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain
33. Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL Approach
34. An efficient adaptive length scale insensitive phase-field model for three-dimensional fracture of solids using trilinear multi-node elements
35. High-flexural-strength of geopolymer composites with self-assembled nanofiber networks
36. IWA: Integrated gradient‐based white‐box attacks for fooling deep neural networks
37. On Selfholding Attack Impact on Imperfect PoW Blockchain Networks
38. Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks
39. Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles
40. Resilience-Driven Quantitative Analysis of Vehicle Platooning Service
41. Identifying strain-dependent structural defects in granular materials from the hidden structure-plasticity relationship
42. NURBS-enhanced line integration BEM for thermo-elastic problems considering the gravity load
43. Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach
44. Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning
45. Dual-UAV Aided Secure Dynamic G2U Communication
46. LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X
47. Cost-effective migration-based dynamic platform defense technique: a CTMDP approach
48. BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System
49. Adapting PBFT for Use With Blockchain-Enabled IoT Systems
50. Performance analysis of heterogeneous cloud-edge services: A modeling approach
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.