Author of the publication

Large-scale P2PVOD system: Focusing on clients.

, , , , and . SCIENCE CHINA Information Sciences, 54 (8): 1677-1690 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual Simulation of Anti-Terrorism Emergency Response Based on Unity3D., and . ICNSC, page 132-137. IEEE, (2019)IoT Based Door Lock Surveillance System Using Cryptographic Algorithms., , and . ICNSC, page 448-453. IEEE, (2019)ParaModel: a visual modeling and code skeleton generation system for programming parallel applications., , , , , and . ACM SIGPLAN Notices, 43 (4): 4-10 (2008)Cooperative multi-agent reinforcement learning based on online heuristic extraction., , , and . ICNC, page 1299-1303. IEEE, (2011)An Auditory-Based Feature Extraction Algorithm for Robust Speaker Identification Under Mismatched Conditions., and . IEEE Trans. Audio, Speech & Language Processing, 19 (6): 1791-1801 (2011)The Cut-and-Choose Game and Its Application to Cryptographic Protocols., , , and . USENIX Security Symposium, page 1085-1100. USENIX Association, (2016)Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?, , and . NDSS, The Internet Society, (2012)Dynamic Workflow Management Using Performance Data., , , and . CCGRID, page 154-157. IEEE Computer Society, (2006)Low Cost Region Detection from Distributed Sensor Observations., and . Mobile Data Management, page 11-20. IEEE Computer Society, (2010)A factor graph based dynamic spectrum allocation approach for cognitive network., , and . WCNC, page 850-855. IEEE, (2011)