-
2781
Optimal service selection approach considering both atomic transaction and end-to-end QoS constraints
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
2782
Software reliability prediction with an improved Elman network model
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
2783
Heuristic Sarsa algorithm based on value function transfer
Published 2018-08-01“…Tongxin xuebao…”
Get full text
Article -
2784
-
2785
-
2786
Worm detection and signature extraction based on communication characteristics
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
2787
Social network bursty topic discovery based on RNN and topic model
Published 2018-04-01“…Tongxin xuebao…”
Get full text
Article -
2788
Warehouse mobile access network security associate pre-anticipated notification scheme based on AAA authentication
Published 2012-09-01“…Tongxin xuebao…”
Get full text
Article -
2789
MEC enabled satellite-terrestrial network:architecture,key technique and challenge
Published 2020-04-01“…Tongxin xuebao…”
Get full text
Article -
2790
-
2791
-
2792
ATM Connection Admission Control with Potential Fuzzy Clustering Algorithm
Published 1997-01-01“…Tongxin xuebao…”
Get full text
Article -
2793
Linear discriminant analysis in network traffic modeling
Published 2005-01-01“…Tongxin xuebao…”
Get full text
Article -
2794
-
2795
-
2796
-
2797
Mobile malware traffic detection approach based on value-derivative GRU
Published 2020-01-01“…Tongxin xuebao…”
Get full text
Article -
2798
Extending locked range of digital phase-locked loop by prediction estimation of states
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
2799
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…Tongxin xuebao…”
Get full text
Article -
2800
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01“…Tongxin xuebao…”
Get full text
Article