Two completely independent spanning trees of claw-free graphs | 0 | 0.34 | 2022 |
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness | 0 | 0.34 | 2022 |
Resource Allocation Scheduling Algorithm Based On Incomplete Information Dynamic Game For Edge Computing | 0 | 0.34 | 2021 |
A Stochastic Bilevel Model For Facility Location-Protection Problem With The Most Likely Interdiction Strategy | 1 | 0.37 | 2021 |
Personalized and Quality-Aware Task Recommendation in Collaborative Crowdsourcing | 0 | 0.34 | 2021 |
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption | 7 | 0.42 | 2020 |
Text Data Truth Discovery Using Self-confidence of Sources | 1 | 0.35 | 2020 |
Variational Channel Estimation with Tempering: An Artificial Intelligence Algorithm for Wireless Intelligent Networks. | 0 | 0.34 | 2020 |
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving | 0 | 0.34 | 2020 |
Cognitive radio assisted WSN with interference aware AODV routing protocol | 2 | 0.37 | 2019 |
A Novel Crowd-sourcing Inference Method | 0 | 0.34 | 2019 |
An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain | 0 | 0.34 | 2019 |
RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks. | 1 | 0.34 | 2019 |
Hybrid Directional CR-MAC based on Q-Learning with Directional Power Control. | 1 | 0.35 | 2018 |
A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise. | 0 | 0.34 | 2018 |
Spanning 3-ended trees in quasi-claw-free graphs. | 0 | 0.34 | 2018 |
Construction of compressed sensing matrices for signal processing. | 0 | 0.34 | 2018 |
Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems. | 0 | 0.34 | 2018 |
Online task scheduling for edge computing based on repeated stackelberg game. | 5 | 0.39 | 2018 |
A novel proactive secret image sharing scheme based on LISS. | 1 | 0.35 | 2018 |
Optimally Protecting Elections with Uncertainty about Voter Preferences. | 0 | 0.34 | 2018 |
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping. | 0 | 0.34 | 2018 |
Multi-Reciprocity Policies Co-Evolution Based Incentive Evaluating Framework for Mobile P2P Systems. | 0 | 0.34 | 2017 |
Attribute-Based Partner Updating Boosts Cooperation in Social P2P Systems. | 0 | 0.34 | 2017 |
GroupTrust: Dependable Trust Management | 0 | 0.34 | 2017 |
Optimal Patrol Strategies Against Attacker'S Persistent Attack With Multiple Resources | 0 | 0.34 | 2017 |
A hierarchical combinatorial testing method for smart phone software in wearable IoT systems. | 4 | 0.46 | 2017 |
Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV. | 1 | 0.36 | 2017 |
(t, n) Threshold secret image sharing scheme with adversary structure. | 3 | 0.39 | 2017 |
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference. | 1 | 0.35 | 2017 |
Classification-Based Reputation Mechanism for Master-Worker Computing System. | 0 | 0.34 | 2017 |
A novel green software evaluation model for cloud robotics. | 2 | 0.38 | 2017 |
Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism. | 3 | 0.40 | 2017 |
Effective hybrid load scheduling of online and offline clusters for e-health service. | 1 | 0.36 | 2017 |
A dynamic reward-based incentive mechanism: Reducing the cost of P2P systems. | 5 | 0.43 | 2016 |
A region-adaptive semi-fragile dual watermarking scheme. | 5 | 0.43 | 2016 |
A Cyber-Physical System for Girder Hoisting Monitoring Based on Smartphones. | 4 | 0.49 | 2016 |
A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems | 0 | 0.34 | 2016 |
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach | 0 | 0.34 | 2016 |
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem | 9 | 0.48 | 2016 |
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement | 0 | 0.34 | 2016 |
Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling | 1 | 0.36 | 2015 |
Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective | 6 | 0.43 | 2015 |
Reversible data hiding exploiting high-correlation regulation for high-quality images. | 1 | 0.35 | 2015 |
Identity-Based Broadcast Encryption Schemes for Open Networks | 0 | 0.34 | 2015 |
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage | 1 | 0.36 | 2015 |
A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders | 0 | 0.34 | 2014 |
Impact of Duty Cycle and Radio Range Irregularity on Localization Algorithms for Wireless Sensor Networks. | 1 | 0.36 | 2014 |
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters. | 0 | 0.34 | 2014 |
ServiceTrust: Trust Management in Service Provision Networks | 5 | 0.41 | 2013 |