-
2901
Study of performance of UWB transmitted-reference receivers
Published 2005-01-01“…Tongxin xuebao…”
Get full text
Article -
2902
-
2903
Measurement of evidence conflict based on correlation coefficient
Published 2014-05-01“…Tongxin xuebao…”
Get full text
Article -
2904
Runtime verification approach for DoS attack detection in edge servers
Published 2021-09-01“…Tongxin xuebao…”
Get full text
Article -
2905
Analysis for e-commerce protocols based on ProVerif
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
2906
-
2907
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Tongxin xuebao…”
Get full text
Article -
2908
Combine multi-dimension Bloom filter for membership queries
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
2909
Hardware-accelerated real-time IP flow measurement method for multi-core architecture
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
2910
-
2911
Multi-level local differential privacy algorithm recommendation framework
Published 2022-08-01“…Tongxin xuebao…”
Get full text
Article -
2912
Research on selective trust-path search and aggregation in distributed environment
Published 2012-09-01“…Tongxin xuebao…”
Get full text
Article -
2913
-
2914
-
2915
Effective cooperative scheme based on relay selection
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
2916
Approach of detecting LDoS attack based on time window statistic
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
2917
Exploration and practice of data classification and grading based on DSMM
Published 2024-11-01“…Tongxin xuebao…”
Get full text
Article -
2918
Improved sub-band JND model with textural decomposition and its application in perceptual image coding
Published 2014-06-01“…Tongxin xuebao…”
Get full text
Article -
2919
-
2920
QoS preference-aware replica selection strategy in cloud computing
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article