-
1
Maximising the wrench capability of mobile manipulators with experiments on a UVMS
Published 2025-01-01Subjects: Get full text
Article -
2
Research on the high-performance transmission control protocol under lossy networks
Published 2014-07-01Subjects: Get full text
Article -
3
Steganalysis for stegotext based on text redundancy
Published 2009-01-01Subjects: Get full text
Article -
4
Mixed Redundancy Strategy for Modular Multilevel Converters in High-Power Applications
Published 2024-01-01Subjects: Get full text
Article -
5
Negative feedback scheduling algorithm based on historical information in SDN
Published 2018-06-01Subjects: “…dynamic heterogeneous redundancy…”
Get full text
Article -
6
An Embedding-Based Semantic Analysis Approach: A Preliminary Study on Redundancy Detection in Psychological Concepts Operationalized by Scales
Published 2025-01-01Subjects: “…redundancy detection…”
Get full text
Article -
7
LRST: searching tree anti-collision algorithm with low-redundancy
Published 2014-06-01Subjects: Get full text
Article -
8
Heterogeneous executor scheduling algorithm for mimic cloud service
Published 2020-03-01Subjects: “…dynamic heterogeneous redundancy…”
Get full text
Article -
9
Mimic defense authentication method for physical access control
Published 2020-06-01Subjects: Get full text
Article -
10
Research and implement on the intrusion tolerant system
Published 2006-01-01Subjects: Get full text
Article -
11
Coding redundancy controlled data forwarding mechanism in opportunistic networks
Published 2015-03-01Subjects: Get full text
Article -
12
Application of Redundancy and Standby Technology for BRAS in the Metropolitan Area Network
Published 2013-09-01Subjects: Get full text
Article -
13
A Babel suspeita de Nelson de Oliveira
Published 2011-01-01Subjects: “…redundancy…”
Get full text
Article -
14
A low functional redundancy-based network slimming method for accelerating deep neural networks
Published 2025-04-01Subjects: Get full text
Article -
15
Network function heterogeneous redundancy deployment method based on immune algorithm
Published 2021-02-01Subjects: Get full text
Article -
16
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01Subjects: “…dynamic heterogeneous redundancy…”
Get full text
Article -
17
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01Subjects: Get full text
Article -
18
Power supply reliability models of oil production facilities
Published 2021-06-01Subjects: Get full text
Article -
19
WATER RESOURCES MANAGEMENT — TOWARDS PERFORMANCE BASED APPROACH
Published 2021-04-01Subjects:Article -
20