Seeds: Sampling-Enhanced Embeddings | 0 | 0.34 | 2022 |
Rule-based adversarial sample generation for text classification | 0 | 0.34 | 2022 |
Gepc: Global Embeddings With Pid Control | 0 | 0.34 | 2021 |
A Joint Strategy for CUAV-based Traffic Offloading via Deep Reinforcement Learning | 0 | 0.34 | 2021 |
Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme | 2 | 0.37 | 2021 |
A Message Transmission Scheduling Algorithm Based On Time-Domain Interference Alignment In Uwans | 0 | 0.34 | 2021 |
Document Vector Extension for Documents Classification | 0 | 0.34 | 2021 |
Anonymous Data Reporting Strategy With Dynamic Incentive Mechanism For Participatory Sensing | 0 | 0.34 | 2021 |
Evolutionary Selection For Regression Test Cases Based On Diversity | 1 | 0.36 | 2021 |
Generating word and document matrix representations for document classification | 0 | 0.34 | 2020 |
Efficient Data Transfer In Clustered Iot Network With Cooperative Member Nodes | 3 | 0.39 | 2020 |
On the using of Rényi's quadratic entropy for physical layer key generation. | 0 | 0.34 | 2019 |
A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs. | 1 | 0.35 | 2019 |
Efficient key generation leveraging channel reciprocity and balanced gray code. | 0 | 0.34 | 2019 |
Efficient key generation leveraging wireless channel reciprocity for MANETs. | 3 | 0.37 | 2018 |
A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. | 1 | 0.35 | 2018 |
Visual Saliency Detection Based on color Frequency Features under Bayesian framework. | 0 | 0.34 | 2018 |
A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs. | 2 | 0.36 | 2018 |
An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing. | 4 | 0.40 | 2018 |
Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform. | 0 | 0.34 | 2017 |
LIAP: A local identity-based anonymous message authentication protocol in VANETs. | 9 | 0.49 | 2017 |
On the using of discrete wavelet transform for physical layer key generation. | 3 | 0.40 | 2017 |
A novel key generation method for wireless sensor networks based on system of equations. | 5 | 0.46 | 2017 |
Outage Probability of Cognitive Selective DF Relay Networks with Multiple Primary Nodes and Heterogenous Non-Identical Constraints. | 0 | 0.34 | 2017 |
A collusion-resistant dynamic key management scheme for WSNs. | 0 | 0.34 | 2016 |
WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs | 19 | 0.76 | 2016 |
An adaptive routing protocol in underwater sparse acoustic sensor networks | 32 | 1.09 | 2015 |
A reliable data transfer protocol based on twin paths and network coding for underwater acoustic sensor network. | 2 | 0.39 | 2015 |
Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining | 2 | 0.43 | 2015 |
Relative Distance Based Forwarding Protocol For Underwater Wireless Networks | 27 | 1.17 | 2014 |
Research of localization algorithm based on weighted Voronoi diagrams for wireless sensor network. | 6 | 0.45 | 2014 |
Outage Analysis of Cognitive AF Relay Networks with Multiple Primary Users and Heterogeneous Non-identical Parameters | 1 | 0.37 | 2014 |
An enhanced XOR-based scheme for wireless packet retransmission problem | 1 | 0.41 | 2014 |
A Non-partitioning File Assignment Scheme with Approximating Average Waiting Time in Parallel I/O System. | 1 | 0.37 | 2013 |
A network coding based protocol for reliable data transfer in underwater acoustic sensor. | 9 | 0.53 | 2013 |
Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks. | 14 | 0.56 | 2013 |
Study on the data flow balance in NFS server with iSCSI | 0 | 0.34 | 2012 |
Performance Analysis Of Aloha For String Multi-Hop Underwater Acoustic Sensor Networks | 0 | 0.34 | 2012 |
The Node Movement Models Based On Lagrange Motion For 3-D Underwater Acoustic Sensor Network | 0 | 0.34 | 2012 |
Improving aloha via backoff tuning in underwater sensor networks | 1 | 0.35 | 2011 |
A New Method to Protect Software from Cracking | 1 | 0.36 | 2009 |
Modified Improved Alternating Combination Trilateration Algorithm with a Variable m | 1 | 0.37 | 2008 |
A New Method of Performance Test for Network Storage | 0 | 0.34 | 2007 |
Performance Analysis Group-Based Key Management | 0 | 0.34 | 2007 |
Analysis of Local Route Maintenance for Ad Hoc Network | 0 | 0.34 | 2007 |
Optimization of the Switches in Storage Networks | 0 | 0.34 | 2007 |
Group-Based Key Management for Multicast of Ad Hoc Sensor Network | 2 | 0.38 | 2007 |
Internet Accessing for IPv6 MANETs | 0 | 0.34 | 2006 |
MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy | 1 | 0.37 | 2006 |
Multipath passive data acknowledgement on-demand multicast protocol | 4 | 0.45 | 2006 |