-
441
Wireless Catching and Transferring System of Next Generation Network
Published 2014-04-01Subjects: Get full text
Article -
442
Pavement Potholes Quantification: A Study Based on 3D Point Cloud Analysis
Published 2025-01-01Subjects: “…three-dimensional point cloud…”
Get full text
Article -
443
Impact of cloud cover on local remote sensing – Piaśnica River case study
Published 2022-11-01Subjects: Get full text
Article -
444
Open source development in the cloud services era
Published 2020-11-01Subjects: “…cloud service…”
Get full text
Article -
445
Inc-DLOM: Incremental Direct LiDAR Odometry and Mapping
Published 2025-01-01Subjects: Get full text
Article -
446
A segmentation method for LiDAR point clouds of aerial slender targets
Published 2025-01-01Subjects: Get full text
Article -
447
Verification on policies for network functions in SDN/NFV-based environment
Published 2021-06-01Subjects: Get full text
Article -
448
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
449
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01Subjects: “…cloud storage…”
Get full text
Article -
450
Hyperactive Behavior Screening and Its Influencing Factors in Preschool Children Based on a Computer Cloud Platform
Published 2024-02-01Subjects: Get full text
Article -
451
Volume-hiding encrypted multi-map scheme based on hierarchical structure
Published 2024-01-01Subjects: “…cloud storage…”
Get full text
Article -
452
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01Subjects: “…vehicular cloud…”
Get full text
Article -
453
AI engineering technology solutions in network intelligence
Published 2022-02-01Subjects: Get full text
Article -
454
System Architecture and Technology Evolutions in Cloud Radio Access Networks
Published 2014-03-01Subjects: “…cloud radio access network…”
Get full text
Article -
455
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: “…cloud computing…”
Get full text
Article -
456
Cloud storage scheme based on closed-box encryption
Published 2017-07-01Subjects: “…cloud storage…”
Get full text
Article -
457
Investigation on Typical Cases of the Ground Information Port Based on Cloud Service
Published 2021-09-01Subjects: Get full text
Article -
458
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: “…cloud security…”
Get full text
Article -
459
Core idea、technical architecture and strategic significance of “5G<sup>+</sup>” system
Published 2020-07-01Subjects: Get full text
Article -
460
Identity-based anonymous cloud auditing scheme with compact tags
Published 2022-12-01Subjects: “…cloud auditing…”
Get full text
Article