Wenjun Luo

Learn More
— Uncontrolled variable-bit-rate (VBR) coded video yields consistent picture quality, but the traffic stream is very bursty. When sent over ATM networks, cell losses may be incurred due to limited buffer capacity at the switches; this could cause severe picture quality degradation. Source rate control can be implemented to generate a controlled VBR bit(More)
Along with variant advantages, the cloud storage gained great attention from both industry and academics since 2007. However, it also brings new challenges in creating a secure and reliable data storage and access facility over insecure or unreliable service providers. The integrity of data stored in the cloud is one of the challenges to be addressed before(More)
Private-preserving shared dot product protocol is an important protocol of many secure multi-party computation problems. It has been the main building block of various data mining algorithms with privacy concerns, and providing fundamental security guarantee for many privacy-preserving data mining algorithms. In this paper, we construct a privacy-preserving(More)
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supply. These computations could occur between mutually untrusted parties, or even between competitors. Today, to conduct such computations, one entity must usually know(More)
OBJECTIVE To study the expression of hypoxia-inducible factor (HIF)-1α in lung tissues and sera from chronic obstructive pulmonary disease (COPD) patients and smokers with normal lung function and explore its clinical significance. METHODS Lung tissue samples were obtained from 32 patients undergoing surgery for peripheral lung tumors. Lung function test(More)
This paper introduces an adaptive and scalable framework to program multimedia applications that can automatically adapt to a wide variety of resource configurations. In addition applications are able to react to changes in quality requirements. This framework was used to design and implement a video delivery service over wired and wireless ATM networks.(More)
Dynamic searchable encryption enables data owner to store a dynamic collection of encrypted files to the cloud server and generate search tokens of queries over the cloud server. Upon receiving a token, the server can perform the search on the \encrypted data while preserving privacy. Unlike many previous works that focused on a single-user scheme, we(More)