-
361
-
362
-
363
Improved ant colony algorithm based on natural selection strategy for solving TSP problem
Published 2013-04-01Get full text
Article -
364
Efficent-cutting packet classification algorithm based on the statistical decision tree
Published 2014-10-01Get full text
Article -
365
Multi-path transmission strategy and congestion control scheme for multimedia sensor networks
Published 2010-01-01Get full text
Article -
366
Multi-cell multi-user downlink beam forming design considering transceiver impairment
Published 2013-12-01Get full text
Article -
367
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Published 2016-10-01Get full text
Article -
368
New key management scheme of wireless sensor networks based on key relation table
Published 2006-01-01Get full text
Article -
369
Failure recovery algorithm for LRT and transaction property analysis
Published 2012-04-01Get full text
Article -
370
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01Get full text
Article -
371
Modified kernels-alternated error diffusion multipurpose watermarking algorithm for halftone images
Published 2008-01-01Get full text
Article -
372
-
373
-
374
Distance-assistant node coverage identification model for wireless sensor networks
Published 2010-01-01Get full text
Article -
375
-
376
PhishingAgent: an agentic workflow method for advanced phishing email detection
Published 2024-11-01Get full text
Article -
377
Survey of industrial Internet traffic analysis technology
Published 2024-08-01Get full text
Article -
378
Balanced multiple controllers placement with latency and capacity bound in software-defined network
Published 2016-11-01Get full text
Article -
379
Phishing attacks discovery based on HTML layout similarity
Published 2016-10-01Get full text
Article -
380
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Get full text
Article