-
301
Security sharing and associated deleting scheme for multi-replica in cloud
Published 2015-11-01Subjects: Get full text
Article -
302
Trust evaluation optimization mechanism for cloud user behavior based on FANP
Published 2022-04-01Subjects: Get full text
Article -
303
Research on the Networking Strategy in Indoor Visible Light Communication
Published 2014-01-01Subjects: Get full text
Article -
304
-
305
SPRD:fast application repackaging detection approach in Android based on application’s UI and program dependency graph
Published 2018-03-01Subjects: Get full text
Article -
306
-
307
Research on the design and policy of national number portability service plan
Published 2021-11-01Subjects: Get full text
Article -
308
Flexible service resource allocation model based on the maximization of social welfare
Published 2013-06-01Subjects: Get full text
Article -
309
Feedback bit allocation in distributed antenna array systems
Published 2020-11-01Subjects: Get full text
Article -
310
Impact and compensation of sample clock offset in I-CFDMA uplink
Published 2015-10-01Subjects: Get full text
Article -
311
Modeling land use changes using Markov chain model and LCM model
Published 2020-03-01Subjects: “…user changes…”
Get full text
Article -
312
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01Subjects: Get full text
Article -
313
Public Procurement Practices and End User Satisfaction in Rubanda District Local Government.
Published 2024Subjects: Get full text
Thesis -
314
Selected results from a large study of Web searching: the Excite study
Published 2000-01-01Subjects: Get full text
Article -
315
Data-driven optimization for rebalancing shared electric scooters
Published 2024-09-01Subjects: Get full text
Article -
316
From Ontology Design to User Experience. A Methodology to Design Interfaces for Information Seeking Purposes
Published 2024-12-01Subjects: Get full text
Article -
317
Hadoop cloud platform user dynamic access control model
Published 2017-09-01Subjects: Get full text
Article -
318
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
Published 2011-01-01Subjects: “…multi-user wireless sensor network…”
Get full text
Article -
319
Analysis of user behavior and satisfaction under the elderly adaptation mode of an APP based on the fuzzy-IPA model
Published 2025-01-01Subjects: Get full text
Article -
320
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01Subjects: Get full text
Article