SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Wang Chen) ;lar1:(hkr)"

Sökning: WFRF:(Wang Chen) > Högskolan Kristianstad

  • Resultat 1-5 av 5
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Arvidsson, Åke, 1957-, et al. (författare)
  • Web metrics for the next generation performance enhancing proxies
  • 2019
  • Ingår i: 2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM). - : IEEE. - 9789532900880 ; , s. 171-176
  • Konferensbidrag (refereegranskat)abstract
    • The fast growth of Internet traffic, the growing importance of cellular accesses and the escalating competition between content providers and network operators result in a growing interest in improving network performance and user experience. In terms of network transport, different solutions ranging from tuning TCP to installing middleboxes are applied. It turns out, however, that the practical results sometimes are disappointing and we believe that poor testing is one of the reasons for this. Indeed, many cases in the literature limit testing to the simple and rare use case of a single file download, while common and complex use cases like web browsing often are ignored or modelled only by considering smaller files. To facilitate better testing, we present a broader view which includes domain counts, flow counts and different forms of concurrency to better characterise the complexity around web pages, and from which the potential for different optimisation techniques can be estimated. We also derive numerical values of these metrics for a small set of popular web pages and study similarities and differences between pages with the same kind of content (newspapers, e-commerce and video) and between pages designed for the same platform (computer and smartphone).
  •  
2.
  • Arvidsson, Åke, et al. (författare)
  • Web metrics for the next generation performance enhancing proxies
  • 2019
  • Ingår i: 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). - : IEEE. - 9789532900880 - 9781728137117 ; , s. 171-176
  • Konferensbidrag (refereegranskat)abstract
    • The fast growth of Internet traffic, the growingimportance of cellular accesses and the escalating competitionbetween content providers and network operators result in agrowing interest in improving network performance and userexperience. In terms of network transport, different solutionsranging from tuning TCP to installing middleboxes are applied.It turns out, however, that the practical results sometimes aredisappointing and we believe that poor testing is one of thereasons for this. Indeed, many cases in the literature limittesting to the simple and rare use case of a single file download,while common and complex use cases like web browsing oftenare ignored or modelled only by considering smaller files. Tofacilitate better testing, we present a set of metrics by whichthe complexity around web pages can be characterised andthe potential for different optimisations can be estimated. Wealso derive numerical values of these metrics for a small set ofpopular web pages and study similarities and differences betweenpages with the same kind of content (newspapers, e-commerceand video) and between pages designed for the same platform(computer and smartphone).
  •  
3.
  • Berglundh, Tord, 1954, et al. (författare)
  • Peri-implant diseases and conditions: Consensus report of workgroup 4 of the 2017 World Workshop on the Classification of Periodontal and Peri-Implant Diseases and Conditions
  • 2018
  • Ingår i: J Clin Periodontol. - : Wiley. - 0303-6979 .- 1600-051X. ; 45, s. S286-S291
  • Tidskriftsartikel (refereegranskat)abstract
    • A classification for peri-implant diseases and conditions was presented. Focused questions on the characteristics of peri-implant health, peri-implant mucositis, peri-implantitis, and soft- and hard-tissue deficiencies were addressed. Peri-implant health is characterized by the absence of erythema, bleeding on probing, swelling, and suppuration. It is not possible to define a range of probing depths compatible with health; Peri-implant health can exist around implants with reduced bone support. The main clinical characteristic of peri-implant mucositis is bleeding on gentle probing. Erythema, swelling, and/or suppuration may also be present. An increase in probing depth is often observed in the presence of peri-implant mucositis due to swelling or decrease in probing resistance. There is strong evidence from animal and human experimental studies that plaque is the etiological factor for peri-implant mucositis. Peri-implantitis is a plaque-associated pathological condition occurring in tissues around dental implants, characterized by inflammation in the peri-implant mucosa and subsequent progressive loss of supporting bone. Peri-implantitis sites exhibit clinical signs of inflammation, bleeding on probing, and/or suppuration, increased probing depths and/or recession of the mucosal margin in addition to radiographic bone loss. The evidence is equivocal regarding the effect of keratinized mucosa on the long-term health of the peri-implant tissue. It appears, however, that keratinized mucosa may have advantages regarding patient comfort and ease of plaque removal. Case definitions in day-to-day clinical practice and in epidemiological or disease-surveillance studies for peri-implant health, peri-implant mucositis, and peri-implantitis were introduced. The proposed case definitions should be viewed within the context that there is no generic implant and that there are numerous implant designs with different surface characteristics, surgical and loading protocols. It is recommended that the clinician obtain baseline radiographic and probing measurements following the completion of the implant-supported prosthesis.
  •  
4.
  • Huang, Xin, et al. (författare)
  • Human interactive secure key and ID exchange protocols in body sensor networks
  • 2013
  • Ingår i: IET Information Security. - 1751-8709 .- 1751-8717. ; 7:1, s. 30-38
  • Tidskriftsartikel (refereegranskat)abstract
    • A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.
  •  
5.
  • Huang, Xin, et al. (författare)
  • Human interactive secure key and ID exchange protocols in body sensor networks
  • 2013
  • Ingår i: IET Information Security. - : Institution of Engineering and Technology. - 1751-8709 .- 1751-8717. ; 7:1, s. 30-38
  • Tidskriftsartikel (refereegranskat)abstract
    • A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-5 av 5

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy