-
4361
-
4362
Grey evaluation model and algorithm of network attack effectiveness
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
4363
-
4364
Leftover bandwidth-aware peer selection algorithm for inter-datacenter content distribution
Published 2013-07-01“…Tongxin xuebao…”
Get full text
Article -
4365
Business process mining based insider threat detection system
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article -
4366
Study on optical fiber multi-parameter sensor
Published 2020-02-01“…Tongxin xuebao…”
Get full text
Article -
4367
-
4368
Blind recognition of primitive BCH code based on average cosine conformity
Published 2020-01-01“…Tongxin xuebao…”
Get full text
Article -
4369
-
4370
Privacy level evaluation of differential privacy for time series based on filtering theory
Published 2017-05-01“…Tongxin xuebao…”
Get full text
Article -
4371
Method to calculate the diameter of undirected double-loop networks G(N;±1,±s)
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
4372
Provable secure trusted protocol for network storage
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
4373
Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems
Published 2021-12-01“…Tongxin xuebao…”
Get full text
Article -
4374
CATPE protocol with capture effect for RFID tag anti-collision
Published 2014-07-01“…Tongxin xuebao…”
Get full text
Article -
4375
Secure network coding scheme for scalable video streaming
Published 2013-05-01“…Tongxin xuebao…”
Get full text
Article -
4376
Survey on cooperative fusion technologies with perception, communication and control coupled in industrial Internet
Published 2021-10-01“…Tongxin xuebao…”
Get full text
Article -
4377
Low-complexity FTN receivers based on frequency domain iterative decision feedback equalization
Published 2017-04-01“…Tongxin xuebao…”
Get full text
Article -
4378
-
4379
End hopping based on message tampering
Published 2013-12-01“…Tongxin xuebao…”
Get full text
Article -
4380