UM

Browse/Search Results:  1-10 of 17 Help

Selected(0)Clear Items/Page:    Sort:
Co-locating online workload and offline workload in the cloud: An interference analysis Conference paper
Proceedings - 21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
Authors:  Chen,Wenyan;  Ye,Kejiang;  Xu,Cheng Zhong
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2021/03/09
Co-location  Hardware event counter  Interference analysis  
Andrographolide derivative as STAT3 inhibitor that protects acute liver damage in mice Journal article
BIOORGANIC & MEDICINAL CHEMISTRY, 2018,Volume: 26,Issue: 18,Page: 5053-5061
Authors:  Chen, Shao-Ru;  Li, Feng;  Ding, Mo-Yu;  Wang, Decai;  Zhao, Qi;  Wang, Yitao;  Zhou, Guo-Chun;  Wang, Ying
View | Adobe PDF | Favorite |  | TC[WOS]:5 TC[Scopus]:7 | Submit date:2018/10/30
Andrographolide  Stat3 Inhibitor  Acute Liver Damage  Inflammation  
Authentic compound-free strategy for simultaneous determination of primary coumarins in Peucedani Radix using offline high performance liquid chromatography-nuclear magnetic resonance spectroscopy-tandem mass spectrometry Journal article
ACTA PHARMACEUTICA SINICA B, 2018,Volume: 8,Issue: 4,Page: 645-654
Authors:  Liu, Yao;  Song, Qingqing;  Liu, Wenjing;  Li, Peng;  Li, Jun;  Zhao, Yunfang;  Zhang, Liang;  Tu, Pengfei;  Wang, Yitao;  Song, Yuelin
View | Adobe PDF | Favorite |  | TC[WOS]:8 TC[Scopus]:11 | Submit date:2018/10/30
Authentic Compound-independent Quantitation  Offline Lcnmrms/ms  Automated Fraction Collection Module  Quantitative H-1 Nmr  Peucedani Radix  Regio-specific Monitoring  
Crowdsourcing sensing workloads of heterogeneous tasks: A distributed fairness-aware approach Conference paper
Proceedings of the International Conference on Parallel Processing, Beijing, China, 9 1, 2015 - 9 4, 2015
Authors:  Sun, Wei;  Zhu, Yanmin;  Ni, Lionel M.;  Li, Bo
Favorite |  | TC[WOS]:4 TC[Scopus]:7 | Submit date:2018/11/06
A cloud storage synchronization strategy based on CDMI Conference paper
4th International Conference on Innovative Computing Technology, INTECH 2014 and 3rd International Conference on Future Generation Communication Technologies, FGCT 2014
Authors:  Yang W.;  Gu C.;  Wan F.;  Hanyu S.;  Jiping Z.
Favorite |  | TC[WOS]:0 TC[Scopus]:2 | Submit date:2018/12/24
bandwidth  CDMI  cloud storage  synchronization  time delay  
Widespread Mobile Devices in Applications for Real-time Drafting Detection in Triathlons Journal article
Journal of Emerging Technologies in Web Intelligence, 2013,Volume: 5,Issue: 3,Page: 310-321
Authors:  Iztok Fister;  Dusan Fister;  Simon Fong;  Iztok Fister Jr
Favorite |  | TC[WOS]:0 TC[Scopus]:8 | Submit date:2019/02/13
Application Server  Gps  Mobile Devices  Pervasive Computing  Real Problem  Triathlon  Web Services  
Analysis of the M1, M2/G/1 G-queueing system with retrial customers Journal article
Nonlinear analysis: real world applications, 2013,Volume: 14,Issue: 1,Page: 365-382
Authors:  Jinbiao Wu;  Zhaotong Lian
Favorite |  | TC[WOS]:5 TC[Scopus]:6 | Submit date:2019/11/29
Nonlinear System  Retrial Queues  Negative Customers  Embedded Markov Chain  Reliability  
Widespread mobile devices in applications for real-time drafting detection in triathlons Journal article
Journal of Emerging Technologies in Web Intelligence, 2013,Volume: 5,Issue: 3,Page: 310-321
Authors:  Fister,Iztok;  Fister,Dušsan;  Fong,Simon;  Fister,Iztok
Favorite |  | TC[WOS]:0 TC[Scopus]:8 | Submit date:2021/03/09
Application server  GPS  Mobile devices  Pervasive computing  Real problem  Triathlon  Web services  
Key performance indicators for traffic intensive web-enabled business processes Journal article
Business Process Management Journal, 2012,Volume: 18,Issue: 2,Page: 250-283
Authors:  Ka I. Pun;  Yain Whar Si;  Kin Chan Pau
Favorite |  | TC[WOS]:0 TC[Scopus]:2 | Submit date:2019/02/14
Audit Trail Analysis  Key Performance Indicators  Stress Testing  Traffic Intensive Web Application  User Studies  Web Server Log  World Wide Web  
An anonymous wireless authentication protocol based on proxy signature Journal article
Journal of Computational Information Systems, 2012,Volume: 8,Issue: 2,Page: 541-548
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Anonymity  Authentication  Key exchange  Proxy signature