-
301
Superposition based direct downlink channel state information feedback method
Published 2009-01-01Get full text
Article -
302
Research on the scalability of parallel community detection algorithms
Published 2018-04-01Get full text
Article -
303
Step-by-step classification detection algorithm of SPPM based on K-means clustering
Published 2022-01-01Get full text
Article -
304
Sliding ferroelectric memories and synapses based on rhombohedral-stacked bilayer MoS2
Published 2024-12-01Get full text
Article -
305
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01Get full text
Article -
306
Energy efficiency analysis of broadcast and communication converged network
Published 2014-05-01Get full text
Article -
307
WLAN indoor positioning algorithm based on skewness-kurtosis testing
Published 2012-05-01Get full text
Article -
308
Life cycle constrained backoff algorithm for ad hoc network
Published 2012-11-01Get full text
Article -
309
Topology optimization and forwarding strategy design for blockchain network
Published 2022-12-01Get full text
Article -
310
Deployment method for vEPC virtualized network function via Q-learning
Published 2017-08-01Get full text
Article -
311
User interest-aware content replica optimized placement algorithm
Published 2014-12-01Get full text
Article -
312
Optimized algorithm for value iteration based on topological sequence backups
Published 2014-08-01Get full text
Article -
313
Energy-efficient resource allocation algorithm for massive MIMO OFDMA downlink system
Published 2015-07-01Get full text
Article -
314
-
315
Data sharing scheme supporting secure outsourced computation in wireless body area network
Published 2017-04-01Get full text
Article -
316
Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy
Published 2015-10-01Get full text
Article -
317
Efficient attack detection and data aggregation algorithm
Published 2012-09-01Get full text
Article -
318
Human personality privacy analysis based on visual features
Published 2016-11-01Get full text
Article -
319
-
320
Data leakage prevention system based on transparent encryption for mobile terminal equipment
Published 2016-10-01Get full text
Article