Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Liu, Hong Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 5 reviews    
  The yoking-proof-based authentication protocol for cloud-assisted wearable devices
Liu W., Liu H., Wan Y., Kong H., Ning H. Personal and Ubiquitous Computing 20(3): 469-479, 2016.  Type: Article

To understand the problem raised in the paper, we have to clarify two important concepts included in its title. One of the concepts is yoking-proof-based authentication. The idea of a yoking-proof protocol for radio-frequency identific...
...
Aug 16 2016  
  Multidisciplinary approaches to artificial swarm intelligence for heterogeneous computing and cloud scheduling
Wang J., Gong B., Liu H., Li S. Applied Intelligence 43(3): 662-675, 2015.  Type: Article

As business and scientific data have increased dramatically, distributed computing using high-speed networks has become very popular for organizations. From this perspective, this paper is interesting as it presents a security-aware mo...
...
Mar 24 2016  
  The equilibrium state method for hyperbolic conservation laws with stiff reaction terms
Zhang B., Liu H., Chen F., Wang J. Journal of Computational Physics 263151-176, 2014.  Type: Article

Zhang et al. propose a new fractional-step method for the numerical solution of advection equations with stiff source terms. In general, it is too difficult to obtain satisfactory numerical approximate solutions for stiff reaction prob...
...
Oct 29 2014  
  Parameterized complexity of control problems in maximin election
Liu H., Zhu D. Information Processing Letters 110(10): 383-388, 2010.  Type: Article

An active stream of research seeks to understand the computational complexity of election attacks that attempt to influence outcomes. One of the most interesting types of attack is a control attack, in which an actor tries to achieve s...
...
Jul 28 2011  
  Formal verification of AADL behavior models: a feasibility investigation
Liu H., Gluch D.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009.  Type: Proceedings

In light of the ubiquity and ever-increasing complexity of real-time embedded systems, the development of a disciplined approach to engineer these often safety-critical and mission-critical systems has become a necessity. The Society o...
...
Aug 28 2009  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy