
Education background
Bachelor of Computer Science & Technology, Tsinghua University, Beijing, China, 1977;
Master of Computer Science & Technology, Chinese Academy of Sciences, Beijing, China, 1981;
Ph.D. in Computer Science & Technology, Tsinghua University, Beijing, China, 1994.
Social service
Department of Computer Science & Technology: Dean (2003-2007);
International Petri Net Community: Steering Committee Member (2008-);
IFIP TC6 (Communication Systems): Chinese Delegate (2004-);
IEEE Senior Member (2004-);
China Computer Federation: Chair of Petri Net Technical committee (2005-);
ACM SIGCOMM Asia Workshop 2005: General Chair (2005);
IWQoS 2010: General Chair (2010).
Areas of Research Interests/ Research Projects
Quality of Service (QoS) and Security Control of Computer Networks
Modeling, Simulation and Performance Analysis of Computer Systems
Theory and Applications of Stochastic Petri Nets
Parallel and Distributed Computing
National Basic Research Program of China (The 973 Program): Control and Measurement of Quality of Service in Information Service (2010-2014);
National Natural Science Foundation of China: Research on Security Properties in Wireless Ad hoc Networks (2010-2013);
National Natural Science Foundation of China: Modeling and Analysis of Network Survivability based on Stochastic Petri Nets (2004-2007);
National Natural Science Foundation of China: A Petri Net Approach to Modeling and Reasoning of Interval Temporal Logic (2002-2004);
National Natural Science Foundation of China: Modeling and Analysis of Resource Management and Task Scheduling Schemes based on Stochastic Petri Nets (1999-2001);
National Natural Science Foundation of China: Complexity Reduction of Performance Evaluation Models of Stochastic Petri Nets (1995-1997);
National Natural Science Foundation of China: Reasoning in Artificial Intelligence using Petri Nets (1992-1994).
Research Status
My research focuses on modeling and performance evaluation of computer networks and other computer systems. The methodology is based on Petri Nets and stochastic models. The purpose of performance evaluation is mainly threefold: selection, improvement and design. The bottleneck of system performance can be traced out through evaluation and thereby improved to guarantee the QoS. My interests also include stochastic modeling of dependability, and frameworks and mechanisms of trustworthy networks. My group quantifies the dependability and survivability of systems, and improves them using fault tolerance mechanisms. In addition, I am also interested in the research of parallel and distributed computing involved with computer networks. The focal point of my research is how to enhance QoS of information systems.
On the basis of conventional Petri Nets, I propose a kind of high-level stochastic Petri Nets which uses simplified stochastic models to evaluate the performance of homogeneous systems. This method reduces state spaces of original system models so as to simplify computation complexities. Besides, I combine the idea of Petri Nets and game theory to propose a new methodology-Game Nets. Given its definition and properties, it can be used to analyze the attack and defense activities in networks. I also propose the concept of trustworthy networks, which has become the hotspot of current network studies. We use probability theory and stochastic process to quantify the metrics of dependability. In addition, some dependable network frameworks and mechanisms have been researched.
As high-level stochastic Petri Net has become the simplified models of more and more complex control systems, it has effectively directed the management and execution of computer systems. Performance evaluation based on high level stochastic Petri Nets are widely accepted by academia. Accordingly, my group has developed simulation tools of High level Petri Nets and Fluid Petri Nets.
Honors And Awards
Science and Technology Progress Award by City of Beijing, Second Class-QoS Evaluation and Control of Computer Networks (2007);
Natural Science Award by Ministry of Education, First Class-Stochastic Model and Performance Evaluation of Computer Systems (2005);
China Computer Federation Innovation Award, Second Class-Stochastic Petri Net Model and QoS of Computer Networks (2005);
Beijing Outstanding Education Achievements Award, Second Class-Performance Evaluation of Computer Networks and Computer Systems (2004);
Annual Scientific Research Achievement Award by Chinese State Information Center, Second Class-Performance Analysis and Modeling of Information Systems (1990).
Academic Achievement
[1] Yuanzhuo Wang, Chuang Lin, Peter D. Ungsunan. Modeling and Survivability Analysis of Service Composition Using Stochastic Petri Nets. Journal of Super Computing, doi: 10.1007/s11227-009-0343-0, 2009.
[2] Xiao-Wen Chu, Yi-Xin Jiang, Chuang Lin, Hao Yin, and Bo Li. Providing Key Recovery Capability for Mobile Communications. Security and Communication Networks, doi: 10.1002/sec.156, 2009.
[3] Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin Shen, and Chuang Lin. An Efficient Dynamic-Identity based Signature Scheme for Secure Network Coding,Computer Networks, doi:10.1016/j.comnet.2009.08.006, 2009.
[4] Zhi-Jia Chen, Hao Yin, Chuang Lin, Chen Yang, M. Feng. Towards a Universal Friendly P2P Media Streaming Application: Metrics, Analysis and Explorations. IET Communications (formerly IEE proceeding communication), 3(12):1919-1933, 2009.
[5] Zhijia Chen, Chuang Lin, Xiaogang Wei. Enabling on-demand Internet video streaming services to multi-terminal users in large scale, IEEE Transactions on Consumer Electronics, 55(4): 1988-1996, November 2009.
[6] An'an Luo, Chuang Lin, Kai Wang, and Lei Lei, Chanfang Liu. Quality of Protection Analysis and Performance Modeling in IP Multimedia Subsystem. Computer Communication, 32(11):1336-1345, 2009.
[7] Yixin Jiang, Yanfei Fan, Sherman Shen, and Chuang Lin. A Self-adaptive Probabilistic Packet Filtering Scheme against Entropy Attacks in Network Coding, Computer Networks, 53(2009):3089-3101, November 2009.
[8] Jia Liu, Chuang Lin, and Fengyuan Ren. General Gap-Utilizing Strategy for Non-Persistent Traffic in Wireless Networks, IEEE Communications Letters, 13(10): 740-742, October 2009
[9] Yuanzhuo Wang, Chuang Lin and Kun Meng, Junjie Lv. Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model, Journal of Computers, 4(6):461-467, August 2009.
[10] Ran Yang, Chuang Lin, Fujun Feng. A Time and Mutable Attribute-Based Access Control Model, Journal of Computers, Vol. 4, No. 6, June 2009.
[11] Chuang Lin, Xin Jiang, Hao Yin, Yuanzhuo Wang, Yada Hu, and Binbin Xiong. Optimizing Availability and QoS of Heterogeneous Distributed System Based on Residual Lifetime in Uncertain Environment, Journal of Supercomputing,(Springer Netherlands), 48(3):243-263, June 2009.
[12] Zhijia Chen, Yang Zhao, Chuang Lin, Qingbo Wang. Accelerating Larg-scale Data Distribution in Booming Internet: Effectiveness, Bottlenecks and Practices, IEEE Transactions on Consumer Electronics, 55(2): 518-526, May 2009
[13] Hao Wen, Chuang Lin, Zhijia Chen, Hao Yin, Tao He, Eryk Dutkiewicz. An Improved Markov Model for IEEE 802.15.4 slotted CSMA/CA Mechanism. Journal of Computer Science and Technology, 24(3): 495-504 May 2009.
[14] Yixin Jiang, Minghui Shi, Xuemin Shen, and Chuang Lin. BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree, IEEE Transactions on Wireless Communications, 8(4):1974-1983, April 2009
[15] Lei Lei, Chaung Lin, Sherman Shen, and Jun Cai. Performance Analysis of Wireless Opportunistic Schedulers using Stochastic Petri Nets, IEEE Transactions on Wireless Communications, 8(4):2076-2087, April 2009
[16] Weidong Liu, Chuang Lin, and Jirong Wang. A Novel Data Transmission Scheme for Mobile Sensor Network. International Journal of Computer Systems Science and Engineering, 24(3): 173-180, 2009.
[17] Lei Lei, Chaung Lin, Jun Cai, and Sherman Shen. Flow-level Performance of Opportunistic OFDM-TDMA and OFDMA Networks, IEEE Transactions on Wireless Communications, 2008, 7(12): 5461-5472
[18] Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, and Dapeng Wu. TrustStream: A Secure and Scalable Architecture for Large-scale Internet Media Streaming, IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(12): 1692-1702.
[19] Zhijia Chen, Chuang Lin, Yang Chen, Vaibhav Nivargi, and Pei Cao. An Analytical and Experimental Study of Super- seeding in BitTorrent-like P2P networks, IEICE Transaction on Communication, Special Issue on Peer to Peer Networking Technology, Vol.E91-B, No.12, pp.3842~3850, Dec. 2008.
[20] Yajuan Li, Chaung Lin, and Quan-Lin Li. A Simplified Framework for Stochastic Workflow Networks. Computers and Mathematics with Applications 56(2008) 2700-2715.
[21] F.Y. Ren, C. Lin, and F. Liu, Self-Correcting Time Synchronization Using Reference Broadcast in Wireless Sensor Network. IEEE Wireless Communications, 15(4):79~85, Aug. 2008.
[22] Feng-Yuan Ren, Xiao-Meng Huang, Fang-Qin Liu, and Chuang Lin. Improving TCP Throughput Over HSDPA Networks, IEEE Trans. Wireless Communication, 7(6):1993~1999, June, 2008.
[23] Liu Bin, Lin Chuang, Qiao Jian, He Jianping, and Peter Ungsunan. A NetFlow Based Flow Analysis and Monitoring System in Enterprise Networks, Computer Networks, 52 (2008) 1074-1092
[24] Yixin Jiang, Chuang Lin, Hao Yin, and Zhen Chen. "A Mutual Authentication and Privacy Mechanism for WLAN Security." Wireless Communications and Mobile Computing, Wiley, 8(1):101-112, 2008.
[25] Minghui Shi, Yixin Jiang, Sherman Shen, and Chuang Lin. Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks, IEEE Wireless Communications, Special Issue on "Security in Wireless Mobile Ad Hoc and Sensor Networks", 14(5): 38-46, 2007.
[26] Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin (Sherman) Shen and Xiaowen Chu. A DoS and Fault Tolerant Authentication Protocol for Group Communications in Ad Hoc Networks, Computer Communications 30 (2007) 2428-2441.
[27] Yang Wang, Chuang Lin, Quan-Lin Li, and Yuguang Fang. A Queueing Analysis for the Denial of Service (DoS) Attacks in Computer Networks, Computer Networks 51 (August 2007) Issue 12: 3564-3573.
[28] Xiaomeng Huang, Chuang Lin, Fengyuan Ren. A Novel High Speed Transport protocol based on Explicit Virtual Load Feedback. May 2007, Computer Networks 51 (2007) 1800-1814.
[29] Yixin Jiang, Chuang Lin, Xuemin Shen, and Minghui Shi. Self-healing Group Key Distribution with Time-Limited Node Revocation for Wireless Sensor Networks, Ad Hoc Networks (Elsevier), January 2007, 5(1): 14-23.
[30] Jianer Chen, Gaocai Wang, Chuang Lin, Tao Wang, Guojun Wang. Probabilistic Analysis on Mesh Network Fault Tolerance. Journal of Parallel and Distributed Computing, January 2007, 67(1): 100-110.
[31] Yaya Wei, Chuang Lin, Xiaowen Chu, and Thiemo Voigt. Fuzzy Control for Guaranteeing Absolute Delays in Web Servers. International Journal of High Performance Computing and Networking, Vol. 4, Nos. 5/6, pp. 338-346, 2006.
[32] Quan-Lin Li, and Chuang Lin. Continuous-Time QBD Processes with Continuous Phase Variable. Computers & Mathematics with Applications, 52 (2006) 1483-1510, December 2006.
[33] Fengyuan Ren, Xunhe Yin, Xiaomeng Huang, and Chuang Lin. Designing a Binary Controller to Enhance End-to-End Congestion Control, IEEE Communication Letters, 10(12):858-860, December 2006.
[34] Yixin Jiang, Chuang Lin, Minghui Shi,and Xuemin Shen. A Self-Encryption Authentication Protocol for Teleconference Services, International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp. 198-205, 2006.
[35] Yixin Jiang, Chuang Lin, Hao Yin, and Zhen Chen. A Mutual Authentication and Privacy Mechanism for WLAN Security. Wireless Communications and Mobile Computing. 2006, 8(1): 101-112.
[36] Yao Yue, Chuang Lin, Zhangxi Tan. Analyzing the performance and fairness of BitTorrent-like networks using a general fluid model. Elsevier Computer Communications, Nov 2006, 29(18): 3946-3956.
[37] Yajuan Li, Chuang Lin, Quanlin Li, and Zhiguang Shan. Block-Structured Stochastic Process Algebra and its Applications to Queueing Systems, IEE Proceedings Software, vol. 153, no. 5, pp. 199-210, October 2006.
[38] Hao Yin, Chuang Lin, Geyong Min, and Xiaowen Chu. Effective Congestion Control for QoS Enhancement of Self-Similar Multimedia Traffic, IEE Proc. Communications, October 2006, 153(5): 675-682
[39] Hao Yin, Feng Qiu, Chuang Lin, Geyong Min, and Xiaowen Chu. A Novel Key-Embedded Scheme for Secure Video Multicast Systems, International Journal of Computers & Electrical Engineering (Elsevier), October 2006, 32 (2006) 376-393
[40] Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. IEEE Transactions on Wireless Communications, Sep. 2006, Vol. 5, No. 9.
[41] Yixin Jiang, Chuang Lin, Xue Shen, Minghui Shi. Multiple key Sharing and Distribution Scheme with (n, t) Threshold Mechanism for NEMO Group Communications. IEEE Journal on Selected Areas in Communications, September 2006, 24(9):1738-1747.
[42] Quan-Lin Li, and Chuang Lin. The M/G/1 Processor-Sharing Queue with Disasters. Computers & Mathematics with Applications, (Elsevier), May 2006, 51(2006): 987-998.
[43] Hao Yin, Zhangxi Tan, Chuang Lin, Geyong Min, Yanfei Fan. "A Context-Based Simulation Tool for Design and Evaluation of Network Processors." Simulation Modelling Practice and Theory April 2006, 14(2006):263-278.
[44] Hao Yin, Chuang Lin, Feng Qiu, Jiangchuan Liu, Geyong Min, and Bo Li. CASM: A Content-Aware Protocol for Secure Video Multicast. IEEE Transactions on Multimedia, April 2006, 8(2):270-277.
[45]Yao Yue, Chuang Lin, and Zhangxi Tan. NPCryptBench: a cryptographic benchmark suite for network processors. ACM SIGARCH Computer Architecture News Volume 34 , Issue 1 Pages: 49 - 56, March 2006
[46] Xiaomeng Huang, Chuang Lin, and Fengyuan Ren. Generalized Modeling and Stability Analysis of High Speed TCP and Scalable TCP. IEICE Transactions on Communication, E89-B (2): 605-608, February 2006.
[47] Yaya Wei, Chuang Lin, Xin Jin, Raad Raad, and Fenyuan Ren. Dynamic Channel Allocation for Mobile Cellular Systems Using a Control Theoretical Approach. IEICE Trans. on Communications, E89-B (2): 621-624, February 2006.
[48] Liqin Tian,Fuming Chen, and Chuang Lin. A kind of packet classification algorithm based on compress, partition and index. Georgian Electronic Scientific Journal (GESJ): Computer Sciences and Telecommunications, Nov. 2005, No. 3(7):22-32.
[49] Fengyuan Ren, Chuang Lin, Wei Bo. A Nonlinear Control Theoretic Analysis to TCP-RED System. Computer Networks, October 2005, 49 (2005): 580-592
[50] Fengyuan Ren, Chuang Lin, and Xiaomeng Huang. An Explicit Stability Criterion of Adaptive Virtual Queue Algorithm. IEICE Trans. on Communications, September 2005, E88-B (9):3768-3771.
[51] Chuang Lin, Zhiguang Shan, Ting Liu, Yang Qu, and Fenyuan Ren. Modeling and Inference of Extended Interval Temporal Logic for Nondeterministic Intervals. IEEE Transactions on Systems, Man, and Cybernetics, Part A. Sept. 2005, 35(5): 682-696.
[52] Qionghai Dai, Xinjian Chen, and Chuang Lin. Fast Algorithms for Multidimensional DCT-to-DCT Computation between a Block and Its Associated Subblocks. IEEE Transactions on Signal Processing, August 2005, 53(8): 3219-3225.
[53] Liansheng Tan, Yan Yang, Chuang Lin, and Naixue Xiong. PID-RPR: A High Performance Bandwidth Allocation Approach for RPR Networks. IEICE Trans. on Communications, July 2005, E88-B (7):2872-2878.
[54] Fengyuan Ren, Chuang Lin, Xunhe Yin. Design a Congestion Controller based on Sliding Mode Variable Structure Control. Computer Communications, June 2005, 28(9):1050-1061.
[55] Hao Yin, Chuang Lin, Berton Sebastien, Bo Li and Geyong Min. Network Traffic Prediction Based on a New Time Series Model. International Journal of Communication Systems, May 2005, 18(8): 711-729.
[56] Fengyuan Ren, Chuang Lin, Xiaomeng Huang. TCC: A Two-Category Classifier for AQM Routers Supporting TCP Flows. IEEE Communications Letters, May 2005, 9(5): 471- 473.
[57] Hao Yin, Chuang Lin, Jin-jun Zhuang, Bo Li, and Qiang Ni. Effective Video Multicast over Wireless Internet: Rate Allocation and End-System Based Adaptation. IEICE Trans. on Communications, April 2005, E88-B (4): 1395-1402.
[58] Fengyuan Ren, Chuang Lin. A Novel Packet Dropping Mechanism for Active Queue Management. IEICE Trans. on Communications, April 2005, E88-B (4): 1432-1439.
[59] Ren Fengyuan, Lin Chuang, and Bo Wei. A Robust Active Queue Management Algorithm in Large Delay networks. Computer Communications, March 2005, 28(5): 485-493.
[60] Liansheng Tan, Yan Yang, Chuang Lin, Naixue Xiong and Moshe Zukerman. Scalable Parameter Tuning for AVQ. IEEE Communications Letters, January 2005, 9(1): 90-92.
[61] Fengyuan Ren, Chuang Lin, and Bo Wei. Modeling and Stability Analysis of Binary ABR Flow Control in ATM Network. IEICE Trans. on Communications, January 2005, E88-B (1): 210-218.
[62] Yu Cheng, Hai Jiang, Weihua Zhuang, Zhisheng Niu, and Chuang Lin. Efficient Resource Allocation for China's 3G/4G Wireless Networks. IEEE Communications Magazine, January 2005,43(1): 76-83
[63] Zhangxi Tan, Chuang Lin, Hao Yin, and Bo Li. Optimization and Benchmark of Cryptographic Algorithms on Network Processors. Special Issue: Network Processors for Future High-Systems and Applications, September-October 2004, IEEE Micro, pp. 55-69
[64] Qionghai Dai, Xinjian Chen, and Chuang Lin. A Novel VLSI Architecture for Multidimensional Discrete Wavelet Transform. IEEE Transactions on Circuits and Systems for Video Technology, August 2004, 14(8):1105-1110.
[65] Chuang Lin, and Yang Qu. Temporal Inference of Workflow Systems Based on Time Petri Nets. International Journal of Intelligent Systems, John Wiley & Sons, May 2004, 19(5): 417-442.
[66] Yaya Wei, Chuang Lin, Fengyuan Ren, Raad Raad, and Eryk Dutkiewicz. Dynamic handoff Scheme in Differentiated QoS Wireless Multimedia Networks. Special issue on Protocol Engineering for Wired and Wireless Networks, Computer Communications, May 2004, 27(10): 1001-1011.
[67] Lin C, Xu M, Marinescu D C, Ren F Y, and Shan Z G. Stability analysis of buffer priority scheduling policies using Petri nets. IEEE Transactions on Automatic Control. July 2003, 48(7): 1235-1238.
[68] Ren Fengyuan, Lin Chuang. Speed up the Responsibility of Active Queue Management System. Special on Internet technology III, IEICE Trans. on Communications, February 2003, E86-B (2): 630-636.
[69] Lin C, Jiang Y, and Zhou W. Integrated performance evaluation criteria for network traffic control. IEICE Trans. on Communications, November 2002, E85-B (11): 2447-2456.
[70] Shan Z, Lin C, Marinescu D C, and Yang Y. QoS-aware load balancing in Web-server clusters: performance modeling and approximate analysis. Computer Networks Journal, September 2002, 40(2): 235-256.
[71] Lin C and Sheng L. Integration of scheduling real-time traffic and cell loss control for ATM networks. IEICE Trans. on Communications, April 2002, E85-B(4):778-795.
[72] Li B, Lin C and Chanson S T. Analysis of a hybrid cutoff priority scheme for multiple classes of traffic in multimedia wireless networks. ACM Journal of Wireless Networks, August 1998, 4(4): 279-290.
[73] Lin C and Chanson S T. Logical inference of clauses based on Petri net models. International Journal of Intelligent Systems, John Wiley & Sons, August, 1998, Vol.13, 821-840.
[74] Lin C and Wu Y.T. A Petri Net Model for Probabilistic Logic. International Journal of Intelligent Systems, John Wiley & Sons, Vol. 11, 1996, pp. 1099-1114.
[75] Muppala J K, and Lin C. A Petri net approach for logical inference of clauses, Journal of the Institution of Electronics and Telecommunication Engineers (IETE) May-Jun 1996, 42(3): 141-147.
[76] Lin C and Murata T. A Petri net model for nonmonotonic reasoning based on annotated logic programs. (invited paper) IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E77-A, No. 10, October 1994, pp. 1579-1587.
[77] Lin C , Chaudhury A, Whinston A B and Marinescu D C. Logical inference of Horn clauses in Petri net models. IEEE Trans. on Knowledge and Data Engineering, Vol. 5, No. 4, June 1993, pp. 416-425.
[78] Lin C and Marinescu D C. On the analysis of stochastic high-level Petri net models. (Invited paper) International Journal of Microelectronics and Reliability, 1991, 31(4):747-767.
[79] Lin C and Marinescu D C. Stochastic high-level Petri nets and applications. IEEE Trans. on Computers, 1988, 37(7): 815-825.
[80] Lin C and Lu W. Knowledge representation by Petri nets. Advances in Chinese Computer Science, World Scientific, Vol. 3, 1991.
[81] Hongkun Yang, Fengyuan Ren, Chuang Lin, Jiao Zhang. Frequency-Domain Packet Scheduling for 3GPP LTE Uplink. IEEE INFOCOM 2010.
[82] Peng Zhang, Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen. "P-Coding: Secure Network Coding against Eavesdropping Attacks". Proc. of IEEE INFOCOM 2010.
[83] Hao Yin, Wen Hui, Quan Miao, Zheng Li, Chuang Lin. IVForensic: A Digital Forensics Service Platform for Internet Videos, In Proc. of the 17th ACM International Conference on Multimedia (ACM MM 2009), Page(s): 1015-1016, October 19-24, 2009. Beijing, China.
[84] H. Yin, X. Liu, T. Zhan, V. Sekar, F. Qiu, C. Lin, H. Zhang, B. Li, "Design and Deployment of a Hybrid CDN-P2P System for Live Video Streaming: Experiences with LiveSky". In Proceedings of the 17th ACM International Conference on Multimedia (ACM MM), Page(s) 25-34, October 19-23, 2009, Beijing, China. (Best Paper Award Candidate)
[85] Bo Li, Yang Qu, Gabriel Keung, Susu Xie, Chuang Lin, Jiangchuan Liu and Xinyan Zhang. Inside the New Coolstreaming: Principles, Measurements and Performance Implications, In the Proc. of the 27th IEEE Conference on Computer Communications (Infocom 2008), pp. 1031~1039, April 2008. Phoenix, AZ, USA.
[86] Xiaomeng Huang, Chuang Lin, Fengyuan Ren, Guanwen Yang, Peter D. Ungsunan, and Yuanzhuo Wang. Improving the Convergence and Stability of Congestion Control Algorithm, in the Proceedings of the 2007 International Conference on Network Protocols (ICNP 20007), October 16-19, 2007, Beijing, China, Page(s):206-215.
[87] Lin C. Stochastic Petri nets and performance evaluation. Tsinghua University Press, January 2000. (In Chinese)
[88] Lin C. Performance evaluation of computer networks and computer systems. Tsinghua University Press, April 2001. (In Chinese)
[89] Lin C, Shan Z G, and Ren F Y. Quality of service of computer networks (QoS). Tsinghua University Press, April 2004. (In Chinese)
[90] Lin C (ed). Web Database: Design and Application. Central Radio & TV University Press, July 2004. (In Chinese)
[91] Lin C, Jiang Y X, and Yin H. Control Mechanisms for Network Security. Tsinghua University Press, December 2008. (In Chinese)