Search

Showing total 29 results
29 results

Search Results

1. Rational fairness exchange protocols based on maximum entropy principle.

2. Electronic cash system with multiple banks based on TPM for cloud computing.

3. Application of data model for guidance system in deploying guide signs.

4. Spread model and application of shortage of supplies for emergency logistics network.

5. Research on space-time accessibility considering direction of travel.

6. Supernetwork-based method on division of community structure in complex network.

7. Global comparatively optimum static task scheduling algorithm.

8. Pseudoinverse solution to construction of cubic splines.

9. Safety transition system and its application.

10. Multi-authority attribute based signature scheme suitable for distributed system.

11. Malware detection by monitoring host's activities.

12. New secure cetificateless signcryption scheme without pairing.

13. IACO resources search algorithm in unstructured P2P network.

14. Improvement of Chord search algorithm research in P2P network.

15. High-accuracy phase estimation of single-tone based on restricted phase unwrapping.

16. Wireless broadcasting retransmission scheme based on Fourier matrix.

17. Uplink CSI based adaptive predicted repeat GBN-HARQ scheme.

18. Research on sociality routing algorithms in mobile social networks.

19. Research of event-based continuous data protection system.

20. Adaptive fault detection method for reliable cloud computing.

21. Research on PageRank algorithm optimization based on MapReduce.

22. Description of domain requirement based on limited language.

23. e-Learning resource ontology matching algorithm based on subgraph approximate isomorphic.

24. Data replication and scheduling algorithm in data grids.

25. Finite-domain representations of conformant planning tasks based on single logic program.

26. Collaborative filtering recommendation algorithm based on user characteristics and item attributes.

27. Community discovery in multi-layered social network based on edge clustering.

28. 3D model steganalysis based on geometry characteristics.

29. Analysis and improvement of a certificateless proxy blind signature.