- UHRA Home
- Browsing by Author
Browsing by Author "Xiao, Hannan"
Now showing items 1-20 of 22
-
An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks
Maw, Htoo Aung; Xiao, Hannan; Christianson, B. (ACM Press, 2012-10)Wireless Sensor Networks (WSNs) have attracted a lot of interest in the research community because of their wide range of applications. Due to the distributed nature of WSNs and their deployment in remote areas, these ... -
Analyzing the Connectivity of CERNET Backbone
Xiao, Hannan; Zan, Jian Qiao; Wang, Yan (Xi'An Jiaotong Univeristy Press, China, 1997) -
BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks
Maw, Htoo; Xiao, Hannan; Christianson, Bruce; Malcolm, James (2016-05-03)Wireless sensor networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. An emerging application for WSNs involves their use in healthcare where they are ... -
Campus Network Firewall System Based on Cisco Routers
Zan, Jian Qiao; Liu, Bin; Xiao, Hannan (Xi'An Jiaotong Univeristy Press, China, 1997) -
Can Multi-sensory Feedback Improve the Usability of the Virtual Assembly Environment?
Zhang, Ying; Travis, Adrian; Xiao, Hannan (Institute of Electrical and Electronics Engineers (IEEE), 2006-09)Usability is an important aspect of Virtual assembly environment (VAE). This paper presents the evaluation of the usability of our developed multi-sensory VAE. The usability evaluation is in terms of its three attributes: ... -
Connecting Multi-Protocol Network to ATM---MPOA
Zhao, Xin; Feng, Bo; Xiao, Hannan (Huazhong University of Science & Technology Press, China, 1996) -
The Development of the ATM Campus Network in Huazhong University of Science & Technology
Xiao, Hannan; Shi, Bin Xin (Huazhong University of Science & Technology Press, China, 1996) -
A Dynamic Reputation Management System for Mobile Ad Hoc Networks
Chiejina, Eric; Xiao, Hannan; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2014-11-20)Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, ... -
Energy Consumption in Mobile Ad Hoc Networks
Xiao, Hannan; Ibrahim, Dashti; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2014-04)Mobile Ad hoc Networks (MANETs) are composed of moving mobile nodes that are battery operated. This paper proposes a set of performance metrics in evaluating energy efficiency in MANETs, and studies the energy consumption ... -
File Message Circling Queue: : Communication between UNIX and Windows
Xiao, Hannan; Liu, Qi Wen; Shi, Bin Xin (1995) -
A Flexible quality of service model for mobile Ad-hoc networks
Xiao, Hannan; Seah, Winston K.G.; Lo, Anthony; Chua, Kee Chaing (Institute of Electrical and Electronics Engineers (IEEE), 2000)Quality of service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. Most of the proposals in the literature only address certain aspects of the QoS support, e.g., QoS routing, QoS medium access control ... -
Graphical and text based challenge questions for secure and usable authentication in online examinations
Ullah, A.; Xiao, Hannan; Barker, T.; Lilley, M. (Institute of Electrical and Electronics Engineers (IEEE), 2014-12)In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors ... -
Improving the usability of a virtual assembly environment with the integration of multi-sensory feedback
Zhang, Y.; Travis, A.; Fernando, T.; Xiao, Hannan (Institute of Electrical and Electronics Engineers (IEEE), 2006)Virtual assembly environment (VAE) technology has the great potential for benefiting the manufacturing applications in industry. Usability is an important aspect of VAE. This paper presents the evaluation of the usability ... -
Modelling and Analysis of TCP Performance in Wireless Multihop Networks
Xiao, Hannan; Zhang, Ying; Malcolm, James; Christianson, B.; Chua, Kee Chaing (2010-07)Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this ... -
Multimodal security enforcement framework for wireless ad hoc networks
Yan, L.; Abouzakhar, N.; Xiao, Hannan (ACM Press, 2009)Securing wireless ad hoc networks in an untrustworthy open environment is always a challenging problem. Lack of central auditing on security and weak incentive for cooperation among nodes in an open network scenario demand ... -
On Service Differentiation in Multihop Wireless Networks
Xiao, Hannan; Seah, Winston; Lo, Anthony; Chua, Kee Chaing (2000) -
On Service Prioritization in Mobile Ad-hoc Networks
Xiao, Hannan; Chua, Kee Chaing; Seah, Winston; Lo, Anthony (Institute of Electrical and Electronics Engineers (IEEE), 2001)The aim of service prioritization is to give resource priority to certain traffic types. For example, the voice service can have higher priority than the data service, Web surfing can have higher priority than FTP and ... -
Quality of service models for ad hoc wireless networks
Xiao, Hannan; Chua, Kee Chaing; Seah, Winston (CRC Press, 2002-12) -
A Quantitative Analysis of TCP performance over Wireless Multihop Networks
Xiao, Hannan; Chua, Kee Chaing; Seah, Winston; Lo, Anthony (Institute of Electrical and Electronics Engineers (IEEE), 2001)An analytical model of a single TCP session based on a string topology in wireless multihop networks is presented. The model for the communication process also considers buffering, propagation delay and channel access ... -
Trustworthiness and Authentication in Ubiquitous Computing
Xiao, Hannan; Malcolm, James; Christianson, B.; Zhang, Y. (ACM Press, 2012-10)In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what ...