Author of the publication

HCS: Expanding H-Code RAID 6 without Recalculating Parity Blocks in Big Data Circumstance.

, , , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 65-72. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HCS: Expanding H-Code RAID 6 without Recalculating Parity Blocks in Big Data Circumstance., , , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 65-72. Springer, (2015)Research on Pairwise Key Establishment Model and Algorithm for Sensor Networks., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 883-892. Springer, (2006)An artificial immunity-based proactive defense system., , , , and . ROBIO, page 2239-2243. IEEE, (2007)Improvement for LEACH Algorithm in Wireless Sensor Network., , , and . ICYCSEE (1), volume 623 of Communications in Computer and Information Science, page 287-298. Springer, (2016)A method of intrusion detection based on Attention-LSTM neural network., , , and . ICMLT, page 46-50. ACM, (2020)An Improved Scheme for Proof-of-Stake Based on Block Memory., , and . ICISCAE, page 466-470. IEEE, (2022)