Shijie Jia

Learn More
INTRODUCTION Acute kidney injury (AKI) is one of the major complications in adult postcardiotomy patients on extracorporeal membrane oxygenation (ECMO) support. The RIFLE (the Risk of renal failure, Injury to the kidney, Failure of kidney function, Loss of kidney function and End-Stage Kidney Disease) classification and the Acute Kidney Injury Network(More)
—Highly efficient distribution and management of media resources and fast content discovery are key determinants for mobile peer-to-peer video-on-demand solutions, especially in wireless mobile networks. Virtual communities making use of users' common characteristics such as interest and interaction to describe the boundary of sharing content and objects(More)
PURPOSE To analyse risk factors for early acute cerebrovascular accidents following off-pump coronary artery bypass grafting (OPCAB) in patients with stroke history, and to propose preventive measures to reduce the incidence of these events. METHODS A total of 468 patients with a history of stroke underwent OPCAB surgery in Beijing Anzhen Hospital of(More)
—Leveraging the development of mobile communication technologies and increased capabilities of mobile devices, mobile multimedia services have set new trends. In order to support high-quality Video-on-Demand (VoD) in mobile wireless networks, using virtual communities-based approaches to balance the efficiency of content sharing and maintenance cost of the(More)
Information-Centric Networking (ICN) is a cleanslate networking architecture that puts information in focus instead of addressed hosts. Construction of content retrieval model to estimate the delivery performance is challenging in this ICN-based Mobile Ad hoc Networks (MANETs). In this paper, we propose a novel content retrieval model (PRCRM) for(More)
Securely removing data from modern computing systems is challenging, as past existence of the deleted data may leave artifacts in the layout at all layers of a computing system, which can be utilized by the adversary to infer information about the deleted data. Conventional overwriting-based and encryption-based solutions are not sufficient, as they cannot(More)