標(biāo)題: Titlebook: Wireless Internet; 15th EAI Internation Zygmunt J. Haas,Ravi Prakash,Weili Wu Conference proceedings 2023 ICST Institute for Computer Scien [打印本頁] 作者: Suture 時(shí)間: 2025-3-21 19:12
書目名稱Wireless Internet影響因子(影響力)
書目名稱Wireless Internet影響因子(影響力)學(xué)科排名
書目名稱Wireless Internet網(wǎng)絡(luò)公開度
書目名稱Wireless Internet網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Wireless Internet被引頻次
書目名稱Wireless Internet被引頻次學(xué)科排名
書目名稱Wireless Internet年度引用
書目名稱Wireless Internet年度引用學(xué)科排名
書目名稱Wireless Internet讀者反饋
書目名稱Wireless Internet讀者反饋學(xué)科排名
作者: 拋射物 時(shí)間: 2025-3-21 22:36 作者: Corporeal 時(shí)間: 2025-3-22 04:26 作者: 減去 時(shí)間: 2025-3-22 07:31 作者: Frenetic 時(shí)間: 2025-3-22 12:04
Trust-Based Communities for?Smart Grid Security and?Privacy. We show that the proposed system can meet the key security objectives with a detailed analysis. Also, experiments demonstrated that the proposed system is efficient and can provide satisfactory user experience, and the trust value design can easily distinguish benign users and bad actors.作者: 你不公正 時(shí)間: 2025-3-22 14:16 作者: 滑稽 時(shí)間: 2025-3-22 20:14
A Framework for?a?Blockchain-Based Decentralized Data Marketplace with greater confidence. The system employs a novel approach to enforcing honesty in data exchange among anonymous individuals by requiring a security deposit. The system has a time frame before the transaction is considered complete.作者: Nonflammable 時(shí)間: 2025-3-23 00:50 作者: GUILE 時(shí)間: 2025-3-23 02:48
Preventing Adversarial Attacks on?Autonomous Driving Modelse and respond with skilled human drivers’ skills. The pervasiveness of computing technologies has also resulted in serious threats to the security and safety of autonomous driving systems. Adversarial attacks are among one the most serious threats to autonomous driving models (ADMs). The purpose of 作者: Kernel 時(shí)間: 2025-3-23 09:34
Implementation Aspects of?Supersingular Isogeny-Based Cryptographic Hash Functiones. Based on the traversal in a supersingular isogeny graph (expander graph), Charles, Goren, and Lauter proposed a cryptographic hash function also known as CGL hash. In this paper, we present our study on the implementation-related aspects of the compact variation of the standard CGL hash function作者: Aggregate 時(shí)間: 2025-3-23 12:01 作者: 發(fā)展 時(shí)間: 2025-3-23 15:42 作者: sorbitol 時(shí)間: 2025-3-23 21:25
A Framework for?a?Blockchain-Based Decentralized Data Marketplaceta marketplace users, on the other hand, must share and trade data in a secure and trusted environment while maintaining their privacy. The paper’s first major contribution is to identify enabling technologies and challenges to the development of decentralized data marketplaces. The second major con作者: conformity 時(shí)間: 2025-3-24 01:47
Formulate Full View Camera Sensor Coverage by?Using Group Set Coverageon selection, and moving-directional target coverage. In this paper, we study them step by step, from one issue, two issue, to three issues. In each step, we formulate a group set cover- age problem, and study its computational complexity and approximation solutions. Especially, we employ a new type作者: bile648 時(shí)間: 2025-3-24 05:18
Delay-Aware Hash Tree for?Blockchain on?Vehicular Delay Tolerant Networksd in Vehicular Ad-hoc Networks (VANETs). Due to the high mobility of VANETs, frequent changes of the network topology occur and the network connection can be lost. These cause a high delay and network partitioning. Therefore, a new research paradigm called Vehicular Delay Tolerant Networks (VDTNs) i作者: Vsd168 時(shí)間: 2025-3-24 07:32
Learning the?Propagation of?Worms in?Wireless Sensor Networkse to the distinct strategies of worms propagation, the dynamic behavior varies depending on the different features of the sensors. Modeling the spread of worms can help us understand the worm attack behaviors and analyze the propagation procedure. In this paper, we design a communication model under作者: 藐視 時(shí)間: 2025-3-24 11:17
5G Channel Forecasting and?Power Allocation Based on?LSTM Network and?Cooperative Communicationt disappearance in the Recurrent Neural Network (RNN) specialized in dealing with time series problems. Then, the designed arithmetic is performed and the performances are compared with the real channel, and small Root Mean Square Error (RMSE) is obtained, which shows the high accuracy of the predic作者: 形狀 時(shí)間: 2025-3-24 17:03 作者: GRE 時(shí)間: 2025-3-24 21:33 作者: 厚顏無恥 時(shí)間: 2025-3-25 00:46 作者: 腐蝕 時(shí)間: 2025-3-25 05:13
Equilibrium Strategies and?Social Welfare in?Cognitive Radio Networks with?Imperfect Spectrum Sensinnst harmful interference. By extending the perfect spectrum sensing in the literature to more realistic situations, a new random sensing error framework of secondary users (SUs) is proposed to study the SUs’ behavior so as to make the best benefit for the CR system in this paper. A novel queueing-ga作者: 真 時(shí)間: 2025-3-25 07:37 作者: 大雨 時(shí)間: 2025-3-25 14:10 作者: GEST 時(shí)間: 2025-3-25 17:57
Conference proceedings 2023er 2022. Due to COVID-19 pandemic the conference was held virtually.. The 16 full papers were selected from 45 submissions and are grouped into the following topics: Security and privacy; blockchain and wireless networks; Resource management, routing, and internet computing; social networks and lear作者: 發(fā)酵劑 時(shí)間: 2025-3-25 22:02
Formulate Full View Camera Sensor Coverage by?Using Group Set Coveragetep, we formulate a group set cover- age problem, and study its computational complexity and approximation solutions. Especially, we employ a new type of approximations, the global approximation of local optimality for nonsubmodular optimization.作者: 相符 時(shí)間: 2025-3-26 03:22
1867-8211 nto the following topics: Security and privacy; blockchain and wireless networks; Resource management, routing, and internet computing; social networks and learning..978-3-031-27040-6978-3-031-27041-3Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 無辜 時(shí)間: 2025-3-26 06:55 作者: Perineum 時(shí)間: 2025-3-26 12:18
https://doi.org/10.1007/978-3-031-27041-3artificial intelligence; bandwidth; communication; communication systems; computer hardware; computer net作者: 辯論的終結(jié) 時(shí)間: 2025-3-26 16:17
Conference proceedings 2023er 2022. Due to COVID-19 pandemic the conference was held virtually.. The 16 full papers were selected from 45 submissions and are grouped into the following topics: Security and privacy; blockchain and wireless networks; Resource management, routing, and internet computing; social networks and learning..作者: 絆住 時(shí)間: 2025-3-26 17:59 作者: CROAK 時(shí)間: 2025-3-27 00:39 作者: Morphine 時(shí)間: 2025-3-27 04:53 作者: 影響帶來 時(shí)間: 2025-3-27 06:01 作者: minaret 時(shí)間: 2025-3-27 10:49 作者: 統(tǒng)治人類 時(shí)間: 2025-3-27 13:49 作者: bourgeois 時(shí)間: 2025-3-27 18:36
Preventing Adversarial Attacks on?Autonomous Driving Modelssarial attacks and identify the most resilient defense mechanism against all types of attacks. Support Vector Machine and neural regression were the two machine learning models that were utilized to categorize the challenges for the model’s training. The results show that we have achieved 95% accura作者: Congregate 時(shí)間: 2025-3-28 00:59
Delay-Aware Hash Tree for?Blockchain on?Vehicular Delay Tolerant Networkssh tree. In this paper, we describe this problem and propose new greedy algorithms to construct a hash tree that considers the network connection time on VDTNs. In such a hash tree, the inconsistency between the hash tree and the data gathering tree can be resolved by constructing the data gathering作者: 六個(gè)才偏離 時(shí)間: 2025-3-28 05:59 作者: 使殘廢 時(shí)間: 2025-3-28 07:23 作者: 發(fā)誓放棄 時(shí)間: 2025-3-28 12:32
Equilibrium Strategies and?Social Welfare in?Cognitive Radio Networks with?Imperfect Spectrum Sensin joining SUs can be non-monotone in their effective arrival rate; (ii) multiple equilibrium joining strategies of SUs can always exist; and (iii) the spectrum sensing error does not necessarily worsen the CS system’s social welfare, i.e., some sensing error in the system may possibly lead to more ef作者: 生命 時(shí)間: 2025-3-28 15:49
Spatial Temporal Graph Convolutional Network Model for?Rumor Source Detection Under Multiple Observaiple batches of multiple snapshots to capture the feature of nodes’ connectivity in STAPPNP, we develop an input algorithm to generate a 4-dimensional input matrix from the multiple batches of multiple snapshots to feed the proposed model. Nonetheless, for deep learning models, such input of multipl作者: Duodenitis 時(shí)間: 2025-3-28 20:50
Addressing Class Imbalance in?Federated Learning via?Collaborative GAN-Based Up-Sampling for each device. In addition, some advanced designs of FED-CGU are proposed, including dynamically determining the number of augmented data in each device and selecting complementary devices that can better help each other. We test FED-CGU with benchmark datasets including Fashion-MNIST and CIFAR-1作者: 被詛咒的人 時(shí)間: 2025-3-29 00:07
ir duals and on continuous linear operators acting between them. Applications are given to best approximation in asymmetric normed spaces. As important examples one considers asymmetric norms on normed lattices and spaces of semi-Lipschitz functions on quasi-metric spaces. Asymmetric locally convex 作者: dithiolethione 時(shí)間: 2025-3-29 03:21
Junaid Sajid,Bareera Anam,Hasan Ali Khattak,Asad Waqar Malik,Assad Abbas,Samee U. Khantial multiple component separation, controlled release membranes, antifouling membranes, self-cleaning membranes, and membranes for biomedical devices. Such unconventional membranes are generally referred to as “stimuli-responsive” or in some case “environment-responsive” or “smart” membranes. This 作者: 天然熱噴泉 時(shí)間: 2025-3-29 08:56 作者: SIT 時(shí)間: 2025-3-29 13:30 作者: reception 時(shí)間: 2025-3-29 16:31 作者: languor 時(shí)間: 2025-3-29 21:41
Hongwei Du,Zhao Zhang,Zhenhua Duan,Cong Tian,Ding-Zhu Duby organizing questions as a list of predicates; the Real Estate Broker project shows you how to use chains of comparators to filter and sort homes according to customer priorities; the Dave‘s Part Inventory project shows you how to query and write reports from an inventory database using stream ope作者: 無能性 時(shí)間: 2025-3-30 01:59 作者: 食料 時(shí)間: 2025-3-30 04:53 作者: 跟隨 時(shí)間: 2025-3-30 10:46 作者: GEAR 時(shí)間: 2025-3-30 12:57
Zahid Khan,Hasan Ali Khattak,Assad Abbas,Samee U. Khanl role of the interacting proteins. Functional information can be derived by mapping changes in the interactome in response to specific stimuli or by comparing the interactome of related proteins with overlapping and different biological functions. As paradigms for these experimental approaches and 作者: 拔出 時(shí)間: 2025-3-30 16:57
Yen-Heng Lin,Sun-Yuan Hsiehth oxovanadium(V) compounds to give ligand coupling products. Bio-inspired and environmentally harmonic vanadium-catalyzed halogenation is attained in the presence of halide anion and Lewis or Br?nsted acid under molecular oxygen to give halogenated compounds.