82 results on '"Niu, Wenjia"'
Search Results
2. Structural Analysis of IWA Social Network
3. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm
4. A DBN-Based Classifying Approach to Discover the Internet Water Army
5. An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance
6. Frequency-Adaptive Cluster Head Election in Wireless Sensor Network
7. Hierarchical Workflow Management in Wireless Sensor Network
8. Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network
9. A Reference Model for Virtual Resource Description and Discovery in Virtual Networks
10. Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition
11. Multi-agent and Workflow-Based Web Service Management Model
12. Similarity Based Semantic Web Service Match
13. Semantic Filtering for DDL-Based Service Composition
14. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud
15. Structural Analysis of IWA Social Network
16. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm
17. A Reference Model for Virtual Resource Description and Discovery in Virtual Networks
18. Frequency-Adaptive Cluster Head Election in Wireless Sensor Network
19. Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network
20. Multi-agent and Workflow-Based Web Service Management Model
21. Similarity Based Semantic Web Service Match
22. Semantic Filtering for DDL-Based Service Composition
23. A Data Recovery Method for NTFS Files System
24. Design and Implementation of Aircraft Pan-Tilt Control System Based on Mobile Terminal
25. The Design and Implementation of Data Security Management and Control Platform
26. Leakage Prevention Method for Unstructured Data Based on Classification
27. The Method and System Implementation of Unstructured Data Tracking and Forensics
28. Decryption and Forensic System for Encrypted iPhone Backup Files Based on Parallel Random Search
29. A Novel NB-SVM-Based Sentiment Analysis Algorithm in Cross-Cultural Communication
30. MIRD: Trigram-Based Malicious URL Detection Implanted with Random Domain Name Recognition
31. Time-Varying Impulsive Anticontrol of Discrete-Time System
32. RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching
33. Bayesian Reliability Assessment Method for Single NC Machine Tool Under Zero Failures
34. Modeling of Mobile Communication Systems by Electromagnetic Theory in the Direct and Single Reflected Propagation Scenario
35. A Clustering Approach for Detecting Auto-generated Botnet Domains
36. Trust Prediction Based on Interactive Relations Strength
37. A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing
38. OpenStack Vulnerability Detection and Analysis
39. Analysis and Exploit of Directory Traversal Vulnerability on VMware
40. Quantitative Evaluation Method of Cloud Security
41. Trust Prediction with Trust Antecedent Framework Regularization
42. Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data
43. A Differentially Private Method for Reward-Based Spatial Crowdsourcing
44. Discover Abnormal Behaviors Using HTTP Header Fields Measurement
45. Color Image Encryption in CIE L*a*b* Space
46. An Overview of Ad Hoc Network Security
47. Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis
48. A Lightweight Code-Based Authentication Protocol for RFID Systems
49. Public Key Timed-Release Attribute-Based Encryption
50. An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.