796 results on '"Junzhou Luo"'
Search Results
202. Resource Load Based Stochastic DAGs Scheduling Mechanism for Grid Environment.
203. Cyber Crime Scene Investigations (C²SI) through Cloud Computing.
204. SLA-Based Resource Co-Allocation in Multi-Cluster Grid.
205. MT3-DA: Multicast Optimization Mechanism Based on Transmission Time and Interference Minimization in WMNs.
206. A MapReduceMerge-based Data Cube Construction Method.
207. Efficient multi-QoS attributes negotiation for service composition in dynamically changeable environments.
208. Multi-agent based QoS-aware Service Composition.
209. Interference-aware gateway placement for wireless mesh networks with fault tolerance assurance.
210. Data Aggregation based Adaptive Long term load Prediction mechanism in Grid environment.
211. A Double Interval Centroid-Based Watermark for network flow traceback.
212. An Effective Replica Location Algorithm Based on Routing-Forward in Data Grid.
213. Multi-Agent Coordination for Service Composition.
214. Optimizing data placement in heterogeneous Hadoop clusters.
215. TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
216. Facilitating an ant colony algorithm for multi-objective data-intensive service provision.
217. Discrete Rate Scheduling for Packets With Individual Deadlines in Energy Harvesting Systems.
218. Bio-inspired cost-aware optimization for data-intensive service provision.
219. A novel application classification attack against Tor.
220. Towards optimized scheduling for data-intensive scientific workflow in multiple datacenter environment.
221. Scientific workflow scheduling in non-dedicated heterogeneous multicluster with advance reservations.
222. Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
223. A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees.
224. Stochastic modeling of dynamic right-sizing for energy-efficiency in cloud data centers.
225. De-anonymizing and countermeasures in anonymous communication networks.
226. Offspeeding: Optimal energy-efficient flight speed scheduling for UAV-assisted edge computing.
227. NCPP: A Network Control Programmale Platform of Trustworthy Controllable Network.
228. Formal Specification and Analysis of Intelligent Network Management System by Using Colored Petri Net.
229. A Novel Approximate Algorithm for Admission Control.
230. Pat: A P2P Based Publish/Subscribe System for QoS Information Dissemination of Web Services.
231. Modeling Autonomic QoS Control for Grid Service Using Petri Nets.
232. Control information description model and processing mechanism in the trustworthy and controllable network.
233. An Interval Centroid Based Spread Spectrum Watermark for Tracing Multiple Network Flows.
234. A QoS Information Dissemination Service for SOA-based CSCW Applications.
235. A new cell counter based attack against tor.
236. A novel flow multiplication attack against Tor.
237. Gateway placement optimization for load balancing in wireless mesh networks.
238. Reliability Analysis Approach of Grid Monitoring Architecture.
239. Grid Service Discovery Based on Cross-VO Service Domain Model.
240. A Maximum Entropy Based Multi-dimensional Trust Model.
241. A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments.
242. A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations.
243. SQUARE: A New TCP Variant for Future High Speed and Long Delay Environments.
244. An HMM Approach to Anonymity Analysis of Continuous Mixes.
245. The Self-Adaptive Framework of Learning Object Based on Context.
246. An improved DHT-based Grid Information services architecture.
247. QoS adaption aware algorithm for grid service selection.
248. Agent based automated negotiation for grid.
249. A collaboration scheme for making peer-to-peer anonymous routing resilient.
250. A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.