Showing 1 - 6 results of 6 for search 'LUO Jun-zhou' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Up-to-Date Database
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • LUO Jun-zhou
Showing 1 - 6 results of 6 for search 'LUO Jun-zhou', query time: 0.03s Refine Results
  1. 1
    Analysis of correspondence property for security protocols

    Analysis of correspondence property for security protocols by YANG Ming, LUO Jun-zhou

    Published 2006-01-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Extended-CSP based analysis of non-repudiation protocols

    Extended-CSP based analysis of non-repudiation protocols by HAN Zhi-geng, LUO Jun-zhou, WANG Liang-min

    Published 2008-01-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Adaptive delay scheduling algorithm based on data center load analysis

    Adaptive delay scheduling algorithm based on data center load analysis by JIN Jia-hui, LUO Jun-zhou, SONG Ai-bo, DONG Fang

    Published 2011-01-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Resource control conflict detection mechanism in trustworthy and controllable network

    Resource control conflict detection mechanism in trustworthy and controllable network by QU Yan-sheng, LUO Jun-zhou, LI Wei, WANG Peng, TAN Jing

    Published 2010-01-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    QoS preference-aware replica selection strategy in cloud computing

    QoS preference-aware replica selection strategy in cloud computing by XIONG Run-qun, LUO Jun-zhou, SONG Ai-bo, JIN Jia-hui

    Published 2011-01-01
    Get full text
    Article
    Save to List
    Saved in:
  6. 6
    Information exchange model of multi control nodes in trustworthy and controllable network

    Information exchange model of multi control nodes in trustworthy and controllable network by WANG Peng, LUO Jun-zhou, LI Wei, ZHENG Xiao, QU Yan-sheng

    Published 2010-01-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs