Search
for Author
All Reviews
Liu, Hong
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
5
reviews
The yoking-proof-based authentication protocol for cloud-assisted wearable devices
Liu W., Liu H., Wan Y., Kong H., Ning H. Personal and Ubiquitous Computing 20(3): 469-479, 2016. Type: Article
To understand the problem raised in the paper, we have to clarify two important concepts included in its title. One of the concepts is yoking-proof-based authentication. The idea of a yoking-proof protocol for radio-frequency identific...
...
Aug 16 2016
Multidisciplinary approaches to artificial swarm intelligence for heterogeneous computing and cloud scheduling
Wang J., Gong B., Liu H., Li S. Applied Intelligence 43(3): 662-675, 2015. Type: Article
As business and scientific data have increased dramatically, distributed computing using high-speed networks has become very popular for organizations. From this perspective, this paper is interesting as it presents a security-aware mo...
...
Mar 24 2016
The equilibrium state method for hyperbolic conservation laws with stiff reaction terms
Zhang B., Liu H., Chen F., Wang J. Journal of Computational Physics 263151-176, 2014. Type: Article
Zhang et al. propose a new fractional-step method for the numerical solution of advection equations with stiff source terms. In general, it is too difficult to obtain satisfactory numerical approximate solutions for stiff reaction prob...
...
Oct 29 2014
Parameterized complexity of control problems in maximin election
Liu H., Zhu D. Information Processing Letters 110(10): 383-388, 2010. Type: Article
An active stream of research seeks to understand the computational complexity of election attacks that attempt to influence outcomes. One of the most interesting types of attack is a control attack, in which an actor tries to achieve s...
...
Jul 28 2011
Formal verification of AADL behavior models: a feasibility investigation
Liu H., Gluch D. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009. Type: Proceedings
In light of the ubiquity and ever-increasing complexity of real-time embedded systems, the development of a disciplined approach to engineer these often safety-critical and mission-critical systems has become a necessity. The Society o...
...
Aug 28 2009
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy