Search

Your search keyword '"Guangshun, Li."' showing total 168 results

Search Constraints

Start Over You searched for: Author "Guangshun, Li." Remove constraint Author: "Guangshun, Li."
168 results on '"Guangshun, Li."'

Search Results

52. ACCBN: ant-Colony-clustering-based bipartite network method for predicting long non-coding RNA–protein interactions

58. Methods of increasing two-way transmission capacity of wireless ad hoc networks

62. Multi-leader election in dynamic sensor networks

64. NLR family CARD domain containing 5 promotes hypoxia-induced cancer progress and carboplatin resistance by activating PI3K/AKT via carcinoembryonic antigen related cell adhesion molecule 1 in non-small cell lung cancer

69. Time-Aware Cross-Platform IoT Service Recommendation with Privacy Preservation

70. Dimension Reduction Algorithm Based on Adaptive Maximum Linear Neighborhood Selection in Edge Computing

71. Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation

73. PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber–Physical Cloud Systems

78. Time-Aware Missing Healthcare Data Prediction Based on ARIMA Model

79. Blockchain-based mobile edge computing system

80. Noniterative Sparse LS-SVM Based on Globally Representative Point Selection

81. Securing transmissions by friendly jamming scheme in wireless networks

82. Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing

83. Distributed Shortest Link Scheduling Algorithms With Constant Time Complexity in IoT Under Rayleigh Fading

84. A new load balancing strategy by task allocation in edge computing based on intermediary nodes

85. Privacy-aware Traffic Flow Prediction based on Multi-party Sensor Data with Zero Trust in Smart City

86. A New Heuristic Computation Offloading Method Based on Cache-Assisted Model

87. A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing

88. Heuristic Algorithms for One-Slot Link Scheduling in Wireless Sensor Networks under SINR

89. Distributed Link Scheduling Algorithm Based on Successive Interference Cancellation in MIMO Wireless Networks

90. Compressed-Sensing-based Gradient Reconstruction for Ghost Imaging

91. Energy Consumption Optimization With a Delay Threshold in Cloud-Fog Cooperation Computing

92. Dynamic Computation Offloading Based on Graph Partitioning in Mobile Edge Computing

93. RFID Location Algorithm Based on Target Search and Repeat Calibration

94. DV-Hop Localization Algorithm Based on Minimum Mean Square Error in Internet of Things

95. Trajectory Privacy Protection Method Based on Location Service in Fog Computing

96. MicroRNA‑217 inhibits the proliferation and invasion, and promotes apoptosis of non‑small cell lung cancer cells by targeting sirtuin 1

97. On Constructing t-Spanner in IoT under SINR

98. An Edge Trajectory Protection Approach Using Blockchain

99. Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning

100. Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network

Catalog

Books, media, physical & digital resources