-
3761
-
3762
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…Tongxin xuebao…”
Get full text
Article -
3763
Investigation of traffic adaptation based interference alignment for cognitive radio networks
Published 2014-04-01“…Tongxin xuebao…”
Get full text
Article -
3764
Robust uplink power control algorithm for multimedia CDMA cellular systems
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
3765
-
3766
Keyword-aware optimal route planning method for large-scale graph data
Published 2023-09-01“…Tongxin xuebao…”
Get full text
Article -
3767
Method of constructing smartflow application based on Web services
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
3768
-
3769
-
3770
-
3771
-
3772
-
3773
-
3774
Study on choosing the parameter ε in differential privacy
Published 2015-12-01“…Tongxin xuebao…”
Get full text
Article -
3775
Image tampering localization model for intensive post-processing scenarios
Published 2024-04-01“…Tongxin xuebao…”
Get full text
Article -
3776
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…Tongxin xuebao…”
Get full text
Article -
3777
Infrared image segmentation algorithm based on distribution information intuitionistic fuzzy c-means clustering
Published 2020-05-01“…Tongxin xuebao…”
Get full text
Article -
3778
-
3779
-
3780
Comparison of error control schemes in wireless sensor networks
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article