-
8361
Trusted network connect control based on terminal behavior
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
8362
Nonlinear scale-space based boundary localization for nonideal iris
Published 2014-03-01“…Tongxin xuebao…”
Get full text
Article -
8363
-
8364
-
8365
-
8366
Algorithm design on energy efficiency maximization for UAV-assisted edge computing
Published 2020-10-01“…Tongxin xuebao…”
Get full text
Article -
8367
Coordinated UAV-UGV trajectory planning based on load balancing in IoT data collection
Published 2024-01-01“…Tongxin xuebao…”
Get full text
Article -
8368
Key-controlled Rijndael algorithm with multiple S-boxes
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
8369
Temporal filtering for target detection algorithm based on static background elimination
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
8370
-
8371
Intelligent forecasting and monitoring of air index based on big data and internet of things
Published 2017-11-01“…Tongxin xuebao…”
Get full text
Article -
8372
-
8373
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01“…Tongxin xuebao…”
Get full text
Article -
8374
-
8375
Two-step ranging based on energy detection for IR-UWB sensor networks
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
8376
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Published 2024-11-01“…Tongxin xuebao…”
Get full text
Article -
8377
-
8378
Mobile sink-based data collection scheme for wireless sensor networks
Published 2012-09-01“…Tongxin xuebao…”
Get full text
Article -
8379
Fusing subjective and objective factors:a dynamic approach to evaluating reputation for IoT search
Published 2015-12-01“…Tongxin xuebao…”
Get full text
Article -
8380
Research on the chaotic group secret communication of the distributed ,large-scale and multi-signal system
Published 2017-03-01“…Tongxin xuebao…”
Get full text
Article