-
3081
-
3082
-
3083
Power allocation in wireless network virtualization based on resource sharing
Published 2016-02-01“…Tongxin xuebao…”
Get full text
Article -
3084
Service chain mapping algorithm based on reinforcement learning
Published 2018-01-01“…Tongxin xuebao…”
Get full text
Article -
3085
-
3086
-
3087
-
3088
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01“…Tongxin xuebao…”
Get full text
Article -
3089
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01“…Tongxin xuebao…”
Get full text
Article -
3090
Access mechanism of TMP under mobile network
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
3091
-
3092
Related-key impossible differential attack on a lightweight block cipher MIBS
Published 2014-02-01“…Tongxin xuebao…”
Get full text
Article -
3093
RAW online regrouping method in IEEE 802.11ah protocol for industrial Internet of things
Published 2020-04-01“…Tongxin xuebao…”
Get full text
Article -
3094
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
3095
Two-layer grouped Byzantine fault tolerance algorithm for UAV swarm
Published 2022-01-01“…Tongxin xuebao…”
Get full text
Article -
3096
Feature selection algorithm based on XGBoost
Published 2019-10-01“…Tongxin xuebao…”
Get full text
Article -
3097
-
3098
-
3099
Downlink transmit beamforming in TDD-MIMO systems
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
3100