-
4981
Research on relevance between k-core and clustering coefficient in complex network
Published 2015-01-01“…Tongxin xuebao…”
Get full text
Article -
4982
Botnet detecting method based on group-signature filter
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
4983
Continuous location privacy protection mechanism based on differential privacy
Published 2021-08-01“…Tongxin xuebao…”
Get full text
Article -
4984
VM migration across subnets in future internet architecture—XIA
Published 2016-03-01“…Tongxin xuebao…”
Get full text
Article -
4985
Privacy protection method on time-series data publication
Published 2015-11-01“…Tongxin xuebao…”
Get full text
Article -
4986
-
4987
-
4988
Research category and future development trend of data elements circulation and security
Published 2024-05-01“…Tongxin xuebao…”
Get full text
Article -
4989
-
4990
-
4991
-
4992
-
4993
-
4994
Effect on the linearity improvement of TWTA by combining RF predistortion linearizer and digital predistortion algorithm
Published 2012-07-01“…Tongxin xuebao…”
Get full text
Article -
4995
Performance of multiple amplitudes differential space-time block coding scheme concatenated with channel coding
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
4996
Program state optimal method based on variable symbolic relation analysis
Published 2018-06-01“…Tongxin xuebao…”
Get full text
Article -
4997
-
4998
-
4999
A self-adapting scalable model for distributed network management
Published 2002-01-01“…Tongxin xuebao…”
Get full text
Article -
5000