Lui

Results: 1305



#Item
301Finite fields / Information theory / Information / Computing / Mathematics / Network coding / Cryptographic hash function / Hash function / One-way function / Hashing / Cryptography / Coding theory

On the Practical and Security Issues of Batch Content Distribution Via Network Coding Qiming Li Dah-Ming Chiu John C.S. Lui Computer & Information Science Dept

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-08-26 01:38:18
302File sharing networks / Peer-to-peer computing / Distributed data storage / Internet television / Streaming / Peer-to-peer / Replication / Video on demand / Cache / Computing / Concurrent computing / Distributed computing

This paper was presented as part of the main technical program at IEEE INFOCOMExploring the Optimal Replication Strategy in P2P-VoD Systems: Characterization and Evaluation Weijie Wu John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-15 04:02:03
303Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
304Mathematics / Cybernetics / Network science / Degree distribution / Connectivity / B-tree / Generalized scale-free model / Graph theory / Network theory / Networks

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract. Hosts (or nodes)

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:31:18
305Software / System software / Artificial neuron / Scalability / File sharing / Incentive / ANts P2P / Computing / Peer-to-peer / Neural networks

1 A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks Bridge Qiao Zhao, John C.S. Lui, Fellow, ACM/IEEE, Dah-Ming Chiu, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 20:48:38
306

Detecting Cheaters for Multiplayer Games: Theory, Design and Implementation[1] S.F. Yeung John C.S. Lui Department of Computer Science & Engineering

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-12-14 03:04:44
    307Distributed computing / Intellectual property law / Peer-to-peer computing / BitTorrent / Peer-to-peer / Cache / Social peer-to-peer processes / EigenTrust / File sharing / Computing / Concurrent computing / File sharing networks

    NetEcon 2012 Workshop -- Part of INFOCOMOn Incentivizing Caching for P2P-VoD Systems Weijie Wu , Richard T.B. Ma§+ and John C.S. Lui The Chinese University of Hong Kong § National University of Singapore

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2012-05-09 20:41:45
    308Data analysis / Data mining / Geostatistics / Machine learning / Markov chain / Peer-to-peer / Connection / Statistics / Multivariate statistics / Cluster analysis

    On Modeling Clustering Indexes of BT-like Systems Q.H. Li John C.S. Lui The Chinese University of Hong Kong Abstract—In this paper, we explore the “clustering” phenomenon in BT-like systems. A high clustering impli

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2008-12-29 20:25:20
    309Telecommunications engineering / Information / Finite fields / Network coding / Wireless sensor network / Throughput / Spectral efficiency / Coding gain / Huffman coding / Network performance / Information theory / Coding theory

    How Many Packets Can We Encode? — An Analysis of Practical Wireless Network Coding Jilin Le, John C.S. Lui

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2008-06-28 23:20:51
    310Rekeying / Public-key cryptography / B-tree / Cryptography / Cryptographic protocols / Locksmithing

    SEAL: A Secure Communication Library for Building Dynamic Group Key Agreement Applications ? Patrick P. C. Lee a John C. S. Lui b David K. Y. Yau c a Department of Computer Science, Columbia University, New York, NY 100

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2006-04-23 21:23:04
    UPDATE