A Novel Sentiment Polarity Detection Framework for Chinese | 0 | 0.34 | 2022 |
A Self-Play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario | 0 | 0.34 | 2022 |
Bus-based WSMP Dissemination Protocol for Vehicular Network. | 0 | 0.34 | 2021 |
LGIEM: Global and local node influence based community detection. | 7 | 0.45 | 2020 |
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection | 0 | 0.34 | 2020 |
Natural disaster topic extraction in Sina microblogging based on graph analysis. | 2 | 0.37 | 2019 |
PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices. | 0 | 0.34 | 2019 |
A privacy preserving location service for cloud-of-things system. | 1 | 0.35 | 2019 |
A new method of privacy protection: random k-anonymous | 0 | 0.34 | 2019 |
Deep rolling: A novel emotion prediction model for a multi-participant communication context. | 2 | 0.36 | 2019 |
Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm. | 3 | 0.38 | 2018 |
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. | 0 | 0.34 | 2018 |
An Improved Web Cache Replacement Algorithm Based on Weighting and Cost. | 1 | 0.36 | 2018 |
Improving Vehicular Authentication in VANET Using. | 0 | 0.34 | 2018 |
A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks. | 2 | 0.35 | 2018 |
Protection of location privacy for moving kNN queries in social networks. | 0 | 0.34 | 2018 |
Phase-Preserving Approach In Denoising Computed Tomography Medical Images | 1 | 0.35 | 2017 |
A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems. | 5 | 0.43 | 2017 |
Detect structural-connected communities based on BSCHEF in C-DBLP. | 0 | 0.34 | 2016 |
LED: A fast overlapping communities detection algorithm based on structural clustering. | 41 | 1.05 | 2016 |
An efficient and scalable density-based clustering algorithm for datasets with complex structures. | 25 | 0.75 | 2016 |
A Collaborative Filtering Recommendation Algorithm Based On Hierarchical Structure And Time Awareness | 2 | 0.40 | 2016 |
A Secure Service Provisioning Framework for Cyber Physical Cloud Computing Systems | 0 | 0.34 | 2016 |
Secure multi-owner-based cloud computing scheme for big data. | 0 | 0.34 | 2016 |
Weighted curvature-preserving PDE image filtering method | 2 | 0.38 | 2015 |
Marker Hiding Methods: Applications in Augmented Reality | 0 | 0.34 | 2015 |
Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS) | 1 | 0.36 | 2015 |
An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization. | 6 | 0.44 | 2015 |
Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks. | 8 | 0.46 | 2015 |
Collaborative Bibliographic System for Review/Survey Articles. | 0 | 0.34 | 2015 |
Social Network And Tag Sources Based Augmenting Collaborative Recommender System | 153 | 3.33 | 2015 |
Evaluation of Current Documents Image Denoising Techniques: A Comparative Study | 1 | 0.36 | 2014 |
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration | 1 | 0.39 | 2014 |
Intelligent fuzzy approach for fast fractal image compression. | 3 | 0.39 | 2014 |
Threat-based evaluation for context-aware multimedia surveillance system | 0 | 0.34 | 2014 |
Distributed Energy-Efficient Approaches For Connected Dominating Set Construction In Wireless Sensor Networks | 1 | 0.36 | 2014 |
Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks | 1 | 0.36 | 2013 |
An Efficient Biometric Authentication Protocol For Wireless Sensor Networks | 6 | 0.44 | 2013 |
Connected dominating set algorithms for wireless sensor networks | 5 | 0.47 | 2013 |
Two Connected Dominating Set Algorithms For Wireless Sensor Networks | 1 | 0.36 | 2012 |
Biometric access control for wireless nodes | 0 | 0.34 | 2012 |
Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring. | 2 | 0.42 | 2011 |
A cooperative intrusion detection scheme for clustered mobile ad hoc networks | 0 | 0.34 | 2011 |
Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs | 17 | 0.82 | 2011 |
A Model-Based Approach for Outlier Detection in Sensor Networks. | 1 | 0.35 | 2011 |
Efficient Expanding Ring Search for MANETs | 0 | 0.34 | 2010 |
Efficient Route Discovery Algorithm for MANETs | 1 | 0.35 | 2010 |
Traffic Locality Oriented Route Discovery Algorithm with Delay | 1 | 0.37 | 2009 |
On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay | 1 | 0.37 | 2009 |
Traffic Locality Oriented Route Discovery Algorithm with Chase Packets for Mobile Ad Hoc Networks | 2 | 0.41 | 2009 |