Search

Your search keyword '"Xiaolin Chang"' showing total 44 results

Search Constraints

Start Over You searched for: Author "Xiaolin Chang" Remove constraint Author: "Xiaolin Chang" Topic computer networks and communications Remove constraint Topic: computer networks and communications
44 results on '"Xiaolin Chang"'

Search Results

1. Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach

10. Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach

13. Job Completion Time Under Migration-Based Dynamic Platform Technique

14. Scalable Self-Sovereign Identity Architecture

15. Exploring best-matched embedding model and classifier for charging-pile fault diagnosis

20. On Selfholding Attack Impact on Imperfect PoW Blockchain Networks

21. Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks

22. Resilience-Driven Quantitative Analysis of Vehicle Platooning Service

23. Cost-effective migration-based dynamic platform defense technique: a CTMDP approach

24. Adapting PBFT for Use With Blockchain-Enabled IoT Systems

25. Performance analysis of heterogeneous cloud-edge services: A modeling approach

26. Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks

27. Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing

28. Performance analysis of Hyperledger Fabric platform: A hierarchical model approach

32. BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services

33. Performance Modeling of Linux Network System with Open vSwitch

34. LSGAN-AT: enhancing malware detector robustness against adversarial examples

35. On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

36. Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload

37. Review of macro- and mesoscopic analysis on rockfill materials in high dams

38. LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X

39. Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue

40. Model-based sensitivity analysis of IaaS cloud availability

41. OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines

42. A stable queue-based adaptive controller for improving AQM performance

43. The effects of AQM on the performance of Assured Forwarding Service

44. On improving bandwidth assurance in AF-based DiffServ networks using a control theoretic approach

Catalog

Books, media, physical & digital resources