Li Peng

Results: 73



#Item
21Optical communications / Li-Fi / University of Edinburgh / Wireless networking / Indoor positioning system

VLCS Panel ALL VLC SKEPTICS MUST EXIT

Add to Reading List

Source URL: peng.cse.ohio-state.edu

Language: English - Date: 2015-09-16 04:58:17
22

Name Thesis Title Amy Li-Yen Peng

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2012-08-30 18:33:42
    23Software / Computing / Reputation management / Collaboration / Intellectual property law / Peer-to-peer computing / EigenTrust / Distributed data storage / BitTorrent / Peer-to-peer / EMule / Tit for tat

    Robust Incentives via Multi-level Tit-for-tat Qiao Lian‡ , Yu Peng§ , Mao Yang§ , Zheng Zhang† , Yafei Dai§ , and Xiaoming Li§ ‡† Microsoft Research Asia, Beijing, P. R. China §

    Add to Reading List

    Source URL: iptps06.cs.ucsb.edu

    Language: English - Date: 2006-02-15 01:41:07
    24

    Combining Events And Threads For Scalable Network Services Implementation And Evaluation Of Monadic, Application-level Concurrency Primitives Peng Li Steve Zdancewic

    Add to Reading List

    Source URL: fdmanana.files.wordpress.com

    Language: English - Date: 2010-06-08 16:04:04
      25

      2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill

      Add to Reading List

      Source URL: flyer.sis.smu.edu.sg

      Language: English - Date: 2014-12-17 01:40:50
        26

        Mitigating Access-Driven Timing Channels in Clouds using StopWatch Peng Li Debin Gao

        Add to Reading List

        Source URL: flyer.sis.smu.edu.sg

        Language: English - Date: 2014-12-17 01:40:50
          27Li Peng / Ocean University of China / Project 211 / Jiangsu

          list of Participants_final.xls

          Add to Reading List

          Source URL: www.cearac-project.org

          Language: English - Date: 2013-11-14 15:32:00
          28Data / Software engineering / Wireless sensor network / NesC / Model checking / Stack / Collection Tree Protocol / Java Pathfinder / Communications protocol / Software bugs / Computing / TinyOS

          T-Check: Bug Finding for Sensor Networks Peng Li John Regehr School of Computing, University of Utah, USA

          Add to Reading List

          Source URL: www.cs.utah.edu

          Language: English - Date: 2010-02-23 00:15:15
          29Data types / Computer arithmetic / Primitive types / Type theory / Software bugs / Integer overflow / C / Type system / Bitwise operation / Computing / Software engineering / Computer programming

          A Understanding Integer Overflow in C/C++1 WILL DIETZ, University of Illinois at Urbana-Champaign PENG LI and JOHN REGEHR, University of Utah VIKRAM ADVE, University of Illinois at Urbana-Champaign

          Add to Reading List

          Source URL: www.cs.utah.edu

          Language: English - Date: 2015-04-28 14:40:24
          30

          Poster: FlowSitter-Labeling and Tracking Simulated Flows in Cloud-based Network Testbed Jianing Ding, Peng Zhang*, Rong Yang, Qingyun Liu, and Li Guo Institute of Information Engineering Chinese Academy of Science Beijin

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2015-05-11 16:42:25
            UPDATE