Jiang Lan

Learn More
While the current generation of peer-to-peer networks share predominantly static files, future peer-to-peer networks will support sharing of files that are modified frequently by their users. In this paper, we present techniques to maintain temporal consistency of replicated files in a peer-to-peer network. We consider the Gnutella P2P network and present(More)
Cell therapies based on focal delivery of the inhibitory neuromodulator adenosine were previously shown to provide potent seizure suppression in animal models of epilepsy. However, hitherto used therapeutic cells were derived from rodents and thus not suitable for clinical applications. Autologous patient-derived adenosine-releasing cell implants would(More)
To evaluate accurately the drilling status that affect safety of oil well drilling and reduce the occurrence rate of drilling accidents, this paper firstly analyzes the factors which affect the safety of drilling to determine the drilling safety evaluation indexes. Then it adopts analytic hierarchy process to construct a drilling safety evaluation model,(More)
Wireless body area network (WBAN) is a body-centric near field wireless communication network. It is a promising new technology for continuously telemedicine monitoring systems. Furthermore, ultra-wideband (UWB) is a promising air interface for near field communication matching the requirements of WBAN. Multipath effect caused by body scattering extremely(More)
—The joule balance, an approach for precisely measuring the Planck constant at the National Institute of Metrology (NIM), China, is currently limited by the self-heating of the coil when the measuring current flows. To solve this heating problem, a superconducting coil has been built to replace the existing fixed coil wound with enameled copper wire. The(More)
To protect data users stored on cloud platform, a new access control method that combines Oakley algorithm and a hierarchical scheme by privilege was proposed. CP-ABE algorithm, Oakley protocol and hierarchical management by privilege were integrated creatively to a new effective and secure access control model (OHB-model). The proposed scheme supported(More)