Institution
Xidian University
Education•Xi'an, China•
About: Xidian University is a education organization based out in Xi'an, China. It is known for research contribution in the topics: Antenna (radio) & Computer science. The organization has 32099 authors who have published 38961 publications receiving 431820 citations. The organization is also known as: University of Electronic Science and Technology at Xi'an & Xīān Diànzǐ Kējì Dàxué.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The empirical results suggest that managers have to pay attention to some contingent factors while they commit to knowledge sharing, and adds to the understanding of the effects of knowledge shares on performance, and gives implications to the practice of knowledge sharing.
Abstract: This paper explores the quantitative relationship between knowledge sharing and performance, with contextual factors in consideration. First, we argue that both knowledge sharing and its contextual factors should be associated with performance. Then, we analyze the multi-dimensional characteristics of knowledge sharing and propose six measures for it. Next, we model the relationship between knowledge sharing and performance, integrating various contingent factors with the model framework, some of which have significant influences on the relationship between knowledge sharing and performance. After that, we propose four alternative models and corresponding propositions for knowledge sharing-contingent variables relationship, and present a quantitative formulation of the relationship between knowledge sharing and performance. Finally, we conduct a survey of 249 organizations in Xi’an, China, and show the empirical results. Our propositions about the knowledge sharing-performance relationship and contingent factors are supported by the survey. The empirical results suggest that managers have to pay attention to some contingent factors while they commit to knowledge sharing. This study adds to the understanding of the effects of knowledge sharing on performance, and gives implications to the practice of knowledge sharing.
166 citations
••
08 Jul 2013TL;DR: This paper introduces a security-mediator (SEM), which is able to generate verification metadata (i.e., signatures) on outsourced data for data owners, and decouples the anonymity protection mechanism from the PDP.
Abstract: Nowadays, many organizations outsource data storage to the cloud such that a member (owner) of an organization can easily share data with other members (users). Due to the existence of security concerns in the cloud, both owners and users are suggested to verify the integrity of cloud data with Provable Data Possession (PDP) before further utilization on data. However, previous methods either unnecessarily reveal the identity of a data owner to the untrusted cloud or any public verifiers, or introduce significant overheads on verification metadata to preserve anonymity. In this paper, we propose a simple and efficient publicly verifiable approach to ensure cloud data integrity without sacrificing the anonymity of data owners nor requiring significant verification metadata. Specifically, we introduce a security-mediator (SEM), which is able to generate verification metadata (i.e., signatures) on outsourced data for data owners. Our approach decouples the anonymity protection mechanism from the PDP. Thus, an organization can employ its own anonymous authentication mechanism, and the cloud is oblivious to that since it only deals with typical PDP-metadata, Consequently, there is no extra storage overhead when compared with existing non-anonymous PDP solutions. The distinctive features of our scheme also include data privacy, such that the SEM does not learn anything about the data to be uploaded to the cloud at all, which is able to minimize the requirement of trust on the SEM. In addition, we can also extend our scheme to work with the multi-SEM model, which can avoid the potential single point of failure existing in the single-SEM scenario. Security analyses prove our scheme is secure, and experiment results demonstrate our scheme is efficient.
166 citations
••
TL;DR: Core-shell gold nanorod@MIL-88(Fe) nanostars are successfully constructed as triple-modality imaging nanoprobes that show low cytotoxicity, high contrast, high penetration depth, and high spatial resolution for accurate and noninvasive imaging and diagnosis of gliomas.
Abstract: One of the most significant challenges in the diagnosis of brain cancer is efficient in vivo imaging using nontoxic nanoprobes. Core-shell gold nanorod@MIL-88(Fe) nanostars are successfully constructed as triple-modality imaging (computed tomography/magnetic-resonance imaging/photoacoustic imaging) nanoprobes that show low cytotoxicity, high contrast, high penetration depth, and high spatial resolution for accurate and noninvasive imaging and diagnosis of gliomas.
166 citations
••
TL;DR: It is proved that two proposed event-triggered algorithms are exponentially convergent if the design parameters are chosen properly and the network topology is strongly connected and weight-balanced.
166 citations
••
TL;DR: Simulation results show that the proposed protocol CPB outperforms the existing schemes in terms of information coverage, average message delay and packet delivery ratio.
166 citations
Authors
Showing all 32362 results
Name | H-index | Papers | Citations |
---|---|---|---|
Zhong Lin Wang | 245 | 2529 | 259003 |
Jie Zhang | 178 | 4857 | 221720 |
Bin Wang | 126 | 2226 | 74364 |
Huijun Gao | 121 | 685 | 44399 |
Hong Wang | 110 | 1633 | 51811 |
Jian Zhang | 107 | 3064 | 69715 |
Guozhong Cao | 104 | 694 | 41625 |
Lajos Hanzo | 101 | 2040 | 54380 |
Witold Pedrycz | 101 | 1766 | 58203 |
Lei Liu | 98 | 2041 | 51163 |
Qi Tian | 96 | 1030 | 41010 |
Wei Liu | 96 | 1538 | 42459 |
MengChu Zhou | 96 | 1124 | 36969 |
Chunying Chen | 94 | 508 | 30110 |
Daniel W. C. Ho | 85 | 360 | 21429 |