UM

Browse/Search Results:  1-10 of 79 Help

Selected(0)Clear Items/Page:    Sort:
MedChain: Efficient Healthcare Data Sharing via Blockchain Journal article
APPLIED SCIENCES-BASEL, 2019,Volume: 9,Issue: 6
Authors:  Shen, Bingqing;  Guo, Jingzhi;  Yang, Yilong
Favorite  |  View/Download:19/0  |  Submit date:2019/05/16
Blockchain  Data Sharing  Peer-to-peer  Decentralization  Digest Chain  Healthcare Data  Electronic Health Record  Data Stream  Healthcare Information Exchange  
Standing out from the crowd – An investigation of the signal attributes of Airbnb listings Journal article
International Journal of Contemporary Hospitality Management, 2019,Volume: 32
Authors:  Bin Yao;  Richard T.R. Qiu;  Daisy X.F. Fan;  Anyu Liu;  Dimitrios Buhalis
View  |  Adobe PDF(493Kb)  |  Favorite  |  View/Download:90/6  |  Submit date:2019/09/10
Signaling Theory  Big Data  Airbnb  Binomial Logistic Model  Booking Probability  Sequential Bayesian Updating  Sharing Economy  
Genetic and Genomic Consultation: Are We Ready for Direct-to-Consumer Telegenetics ? Journal article
FRONTIERS IN GENETICS, 2018,Volume: 9
Authors:  Du, Li;  Becher, Shmuel I.
Favorite  |  View/Download:8/0  |  Submit date:2019/01/17
telegenetics  telegenomics  direct-to-consumer  genetic services  risks and benefits  privacy  informed consent  
An Efficient Incentive Mechanism for Device-to-Device Multicast Communication in Cellular Networks Journal article
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018,Volume: 17,Issue: 12,Page: 7922-7935
Authors:  Chen, Yichao;  He, Shibo;  Hou, Fen;  Shi, Zhiguo;  Chen, Jiming
Favorite  |  View/Download:6/0  |  Submit date:2019/01/17
Device-to-device communication  D2D multicast communication  contract theory  incentive mechanism  
A memory configuration method for virtual machine based on user preference in distributed cloud Journal article
KSII Transactions on Internet and Information Systems, 2018,Volume: 12,Issue: 11,Page: 5234-5251
Authors:  Liu S.;  Jia W.;  Pan X.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
Configuration method  Resource allocation  User preference  User task requirement  Virtual memory block usability  
A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud Journal article
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018,Volume: 12,Issue: 11,Page: 5234-5251
Authors:  Liu, Shukun;  Jia, Weijia;  Pan, Xianmin
Favorite  |  View/Download:4/0  |  Submit date:2019/01/17
Virtual memory block usability  user preference  configuration method  user task requirement  resource allocation  
Internationalization of Traditional/Complementary Medicine products: market entry as medicine Journal article
CHINESE MEDICINE, 2018,Volume: 13
Authors:  Li, Jiatong;  Zhu, Jianfan;  Hu, Hao;  Harnett, Joanna E.;  Lei, Chi Ieong;  Chau, Ka Yin;  Chan, Ging;  Ung, Carolina Oi Lam
View  |  Adobe PDF(933Kb)  |  Favorite  |  View/Download:347/8  |  Submit date:2018/10/30
Traditional Chinese Medicines  Chinese Patent Medicines  Proprietary Chinese Medicines  Traditional And Complementary Medicine  Registration  Internationalization  Quality  Safety  Efficacy  
Andrographolide derivative as STAT3 inhibitor that protects acute liver damage in mice Journal article
BIOORGANIC & MEDICINAL CHEMISTRY, 2018,Volume: 26,Issue: 18,Page: 5053-5061
Authors:  Chen, Shao-Ru;  Li, Feng;  Ding, Mo-Yu;  Wang, Decai;  Zhao, Qi;  Wang, Yitao;  Zhou, Guo-Chun;  Wang, Ying
View  |  Adobe PDF(2009Kb)  |  Favorite  |  View/Download:827/67  |  Submit date:2018/10/30
Andrographolide  Stat3 Inhibitor  Acute Liver Damage  Inflammation  
Medshare: A Novel Hybrid Cloud for Medical Resource Sharing among Autonomous Healthcare Providers Journal article
IEEE Access, 2018,Volume: 6,Page: 46949-46961
Authors:  Yang Y.;  Li X.;  Qamar N.;  Liu P.;  Ke W.;  Shen B.;  Liu Z.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/14
cloud computing  Electronic health records (EHRs)  health care resource sharing  health information exchange (HIE)  healthcare providers  hybrid cloud  patient privacy  
On the strategy and behavior of bitcoin mining with N-attackers Conference paper
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Authors:  Liu H.;  Du R.;  Ruan N.;  Jia W.
Favorite  |  View/Download:5/0  |  Submit date:2019/04/04
Bitcoin  Mining  N-attackers  Selfish mining