-
1061
-
1062
-
1063
Dual-granularity lightweight model for vulnerability code slicing method assessment
Published 2021-11-01“…Tongxin xuebao…”
Get full text
Article -
1064
Handover trigger time selection algorithm in heterogeneous wireless networks environment
Published 2011-11-01“…Tongxin xuebao…”
Get full text
Article -
1065
-
1066
-
1067
-
1068
Text steganography method based on automatic selection coding and dynamic word selection strategy
Published 2022-09-01“…Tongxin xuebao…”
Get full text
Article -
1069
-
1070
-
1071
Analysis of user interactive social behavior between microblog and BBS in a university
Published 2013-09-01“…Tongxin xuebao…”
Get full text
Article -
1072
-
1073
-
1074
Dynamic P2P trust model based on context factors
Published 2016-08-01“…Tongxin xuebao…”
Get full text
Article -
1075
-
1076
Sum-rate maximization in MIMO NOMA system with imperfect CSI
Published 2019-11-01“…Tongxin xuebao…”
Get full text
Article -
1077
Cloud-edge-device fusion architecture oriented to spectrum cognition and decision in low altitude intelligence network
Published 2023-11-01“…Tongxin xuebao…”
Get full text
Article -
1078
Performance Analysis of Slotted Multichannel ALOHA Systems with Capture in Microcellular Environments
Published 1995-01-01“…Tongxin xuebao…”
Get full text
Article -
1079
-
1080
Design of polling access control protocol in WSN based on FPGA
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article