Research on the application of data encryption technology in communication security | 0 | 0.34 | 2021 |
RSS-Based Localization of Low-Power IoT Devices Exploiting AoA and Range Information. | 0 | 0.34 | 2020 |
Detection and Tracking of Multipath Channel Parameters Using Belief Propagation. | 0 | 0.34 | 2020 |
A baseline regularization scheme for transfer learning with convolutional neural networks. | 4 | 0.41 | 2020 |
Transfer Learning in Computer Vision Tasks: Remember Where You Come From | 2 | 0.67 | 2020 |
A positive-negative delayer for slotted OBS networks to enhance two-way signaling scheme. | 0 | 0.34 | 2019 |
A constrained-lower-indexed-block spectrum assignment policy in elastic optical networks | 2 | 0.37 | 2019 |
A routing and spectrum assignment algorithm in elastic optical network based on minimizing contiguity reduction | 0 | 0.34 | 2019 |
Design and Simulation of a Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on Three-Particle Asymmetric Entangled State. | 0 | 0.34 | 2019 |
Farsighted Spectrum Resource Assignment Method for Advance Reservation Requests in Elastic Optical Networks | 1 | 0.37 | 2019 |
A Simple Weight Recall for Semantic Segmentation: Application to Urban Scenes. | 0 | 0.34 | 2018 |
Explicit Inductive Bias for Transfer Learning with Convolutional Networks. | 7 | 0.41 | 2018 |
A partial-success-rate-based resource reservation scheme for slotted OBS networks. | 0 | 0.34 | 2018 |
An irregularly slotted ring scheme for contention-free optical burst switching. | 1 | 0.37 | 2014 |
Exploring trust region method for the solution of logit-based stochastic user equilibrium problem. | 1 | 0.36 | 2014 |
User Equilibrium with Length Constrained Users | 0 | 0.34 | 2012 |
Automatic Document Analysis and Understanding System | 0 | 0.34 | 1999 |
Managing Knowledge for an Intelligent Document Processing System | 0 | 0.34 | 1999 |
A document classification and extraction system with learning ability | 10 | 0.90 | 1999 |