Adaptive Grouping Block Sparse Bayesian Learning Method for Accurate and Robust Reconstruction in Bioluminescence Tomography | 0 | 0.34 | 2021 |
A High Reliable Computing Offloading Strategy Using Deep Reinforcement Learning For Iovs In Edge Computing | 1 | 0.34 | 2021 |
Sequential Weakly Labeled Multiactivity Localization and Recognition on Wearable Sensors Using Recurrent Attention Networks | 3 | 0.38 | 2021 |
Quantification of Unextendible Entanglement and Its Applications in Entanglement Distillation | 0 | 0.34 | 2020 |
A Characteristic-Featured Shock Wave Indicator for Conservation Laws Based on Training an Artificial Neuron. | 0 | 0.34 | 2020 |
A Risk Assessment Method based on Software Behavior | 0 | 0.34 | 2019 |
A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption. | 0 | 0.34 | 2018 |
A Novel Low-Complexity Precoding Algorithm for MIMO Cognitive Radio Systems. | 0 | 0.34 | 2017 |
Grover walks on a line with absorbing boundaries. | 1 | 0.41 | 2016 |
Hybrid Carrier Modulation System with Partial FFT Demodulation Over Doubly Selective Channels in Presence of Carrier Frequency Offset | 2 | 0.38 | 2014 |
Bioluminescence Tomography by an Iterative Reweighted ${\bm {l_{2}}}$-Norm Optimization. | 6 | 0.58 | 2014 |
Improving virtualization in the presence of software managed translation lookaside buffers | 11 | 0.54 | 2013 |
Asymmetric-access aware optimization for STT-RAM caches with process variations | 4 | 0.44 | 2013 |
SLNR-Based Transmit Beamforming for MIMO Wiretap Channel | 1 | 0.36 | 2013 |
Finding δ-Closure Property of BitTorrent System and Applications Based on This Property | 0 | 0.34 | 2012 |
A New Two-Layer Topology for Data Center Network | 0 | 0.34 | 2012 |
Coordinated Linear Precoding in Downlink Multicell MIMO-OFDMA Networks | 15 | 0.75 | 2012 |
A hyperbolic tree based interface for exploring massive files | 0 | 0.34 | 2011 |
Simultaneous localization and map building based on improved particle filter in grid map | 2 | 0.41 | 2011 |
SpamWatcher: a streaming social network analytic on the IBM wire-speed processor | 1 | 0.34 | 2011 |
Blind adaptive affine projection algorithm-based multiuser detector over a multipath fading channel | 4 | 0.41 | 2010 |
Fast Access Control Algorithm in Wireless Network | 0 | 0.34 | 2008 |
SIISAM: A Model for Secure Inhomogeneous Information Systems | 0 | 0.34 | 2008 |
The relationship within and between the extrinsic and intrinsic systems indicated by resting state correlational patterns of sensory cortices. | 7 | 1.50 | 2007 |
rHALB: a new load-balanced routing algorithm for k-ary n-cube networks | 1 | 0.37 | 2007 |
Improving the Accuracy of UML Class Model Recovery | 0 | 0.34 | 2007 |
Runtime Checking of UML Association-Related Constraints | 3 | 0.42 | 2007 |
Discriminative analysis of early Alzheimer's disease based on two intrinsically anti-correlated networks with resting-state fMRI. | 15 | 1.93 | 2006 |
A Mathematical Approach to Disaster Recovery Planning | 1 | 0.35 | 2005 |
Experiment on Embedding Interception Service into Java RMI | 1 | 0.35 | 2003 |