Showing 1 - 6 results of 6 for search 'Xin-sheng JI' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Up-to-Date Database
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Xin-sheng JI
Showing 1 - 6 results of 6 for search 'Xin-sheng JI', query time: 0.01s Refine Results
  1. 1
    Secure D2D underlaying cellular communication based on artificial noise assisted

    Secure D2D underlaying cellular communication based on artificial noise assisted by Xiao-lei KANG, Xin-sheng JI, Kai-zhi HUANG

    Published 2015-10-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Research on dynamic migration of critical virtual machines for multi-tenancy

    Research on dynamic migration of critical virtual machines for multi-tenancy by Shuo ZHAO, Xin-sheng JI, Guo-zhen CHENG, Yu-xing MAO

    Published 2017-08-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Full duplex secret transmission scheme based on user cooperation

    Full duplex secret transmission scheme based on user cooperation by Xiao-lei KANG, Xin-sheng JI, Lu XIA, Kai-zhi HUANG

    Published 2017-01-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks

    Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks by Ya-jun CHEN, Xin-sheng JI, Kai-zhi HUANG, Xiao-lei KANG

    Published 2016-08-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    Research on dynamic migration of virtual machine based on security level

    Research on dynamic migration of virtual machine based on security level by Shuo ZHAO, Xin-sheng JI, Yu-xing MAO, Guo-zhen CHENG, Hong-chao HU

    Published 2017-07-01
    Get full text
    Article
    Save to List
    Saved in:
  6. 6
    Secure deployment strategy of virtual machines based on operating system diversity

    Secure deployment strategy of virtual machines based on operating system diversity by Miao ZHANG, Xin-sheng JI, Jian-jian AI, Wen-yan LIU, Hong-chao HU, Shu-min HUO

    Published 2017-10-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs