Works (4)

Updated: July 5th, 2023 15:57

2016 conference paper

A behavior-based evaluation of product quality

International conference on acoustics speech and signal processing, 1916–1920.

By: W. Liang n, H. Wang n & H. Krirn

TL;DR: A general framework for the swarm motion analysis of multiple mosquitos based on 2D videos is proposed and the effectiveness and robustness of the algorithm are verified by multiple2D videos capturing mosquitos behavior in different experimental conditions. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

A new solution branch for the Blasius equation-A shrinking sheet problem

COMPUTERS & MATHEMATICS WITH APPLICATIONS, 56(12), 3088–3095.

By: T. Fang n, W. Liang* & C. Lee*

Contributors: T. Fang n, W. Liang* & C. Lee*

author keywords: Similarity solution; Moving flat plate; Blasius equation; Shrinking plate; Stretching plate
TL;DR: In this work, a similarity equation of the momentum boundary layer is studied for a moving flat plate with mass transfer in a stationary fluid and the solution is applicable to the practical problem of a shrinking sheet with a constant sheet velocity. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2005 journal article

Integration of authentication and mobility management in third generation and WLAN data networks

WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 5(6), 665–678.

By: W. Wang n, W. Liang n & A. Agarwal n

author keywords: authentication; mobility management; 3G systems; wireless local area networks (WLANs)
TL;DR: This work introduces a new authentication architecture for fast authentication during inter-networking handoff and large-scale heterogeneous networks based on IP infrastructure and shows that the new architecture can reduce authentication latency significantly and be adaptive to user mobility and traffic. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2005 journal article

On performance analysis of challenge/response based authentication in wireless networks

COMPUTER NETWORKS, 48(2), 267–288.

By: W. Liang n & W. Wang n

author keywords: wireless networks; challenge/response authentication; security association; performance analysis
TL;DR: The impact of authentication on the security and quality of service (QoS) through the authentication in wireless networks is analyzed quantitatively and the concept of security levels is proposed to describe the protection of communications with regard to the nature of security. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.