×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [9]
北京大学 [7]
清华大学 [3]
深圳先进技术研究院 [3]
计算技术研究所 [3]
兰州理工大学 [2]
更多...
内容类型
期刊论文 [18]
会议论文 [9]
其他 [4]
专利 [1]
学位论文 [1]
发表日期
2021 [1]
2019 [1]
2018 [3]
2017 [2]
2016 [2]
2015 [1]
更多...
学科主题
mathematic... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共33条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
LOPE: A Low-Overhead Payment Verification Method for Blockchains
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2021, 卷号: 30, 期号: 2, 页码: 349-358
作者:
Ying Zhang
;
Zhengyuan He
;
Linpeng Jia
;
Donghui Ding
;
Hanwen Zhang
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/12/01
Blockchain
Light client
Low‐
overhead
Payment verification
VaSe-MRP: Velocity-aware and stability-estimation–based multi-path routing protocol in flying ad hoc network
期刊论文
International Journal of Distributed Sensor Networks, 2019, 卷号: 15, 期号: 11
作者:
Ma, Zhongyu
;
Guo, Qun
;
Ma, Ji
;
Zhang, Zhe
;
Ma, Hongfeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Flight paths
Internet protocols
Multipath propagation
Network routing
Routing protocols
Stability criteria
Velocity
Convergence time
Extensive simulations
Long distance communication
Multipath routing protocols
Network throughput
Node deployment
Routing discovery
Routing overheads
SAR: A Social-Aware Route Recommendation System for IntelligentTransportation
期刊论文
Computer Journal, 2018
作者:
Jiaqi Wang
;
Yunyao Lu
;
Xiaojie Wang
;
Jing Dong
;
Xiping Hu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/01/31
Reducing the Southbound Interface Overhead for OpenFlow Based on the Flow Volume Characteristics
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 卷号: 55, 页码: 346-357
作者:
Zheng, Peng
;
Hu, Chengchen
;
Li, Hao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/19
Communication overheads
Flow optimization
Openflow
Software defined networking (SDN)
Table-Miss
Partitioning and offloading in smart mobile devices for mobile cloud computing: State of the art and future directions
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 卷号: 119, 页码: 83-96
作者:
Gu, Fei
;
Niu, Jianwei
;
Qi, Zhiping
;
Atiquzzaman, Mohammed
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Mobile cloud computing
Partitioning
Offloading
Computation and communication overheads
Energy consumption
TIME SYNCHRONIZATION ERROR COMPENSATION METHOD FOR PTP-BASED MULTI-HOP WIRELESS BACKHAUL NETWORKS
专利
专利类型: 发明, 专利号: WO2017107261A1, 申请日期: 2017-06-29,
作者:
Li ZB(李志博)
;
Zeng P(曾鹏)
;
Wang ZW(王照伟)
;
Wang JT(王金涛)
;
Li D(李栋)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2018/01/04
A Light-Weight Opportunistic Forwarding Protocol with Optimized Preamble Length for Low-Duty-Cycle Wireless Sensor Networks
期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 卷号: 32, 期号: 1, 页码: 168-180
作者:
Chen, Hai-Ming
;
Cui, Li
;
Zhou, Gang
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/12/12
wireless sensor network
low duty cycle
low power listening
opportunistic forwarding
A semi-supervised online sequential extreme learning machine method
期刊论文
NEUROCOMPUTING, 2016, 卷号: 174, 页码: 168-178
作者:
Jia, Xibin
;
Wang, Runyuan
;
Liu, Junfa
;
Powers, David M. W.
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/12/13
Online Sequential ELM (OS-ELM)
Semi-supervised ELM (SS-ELM)
Semi-supervised online sequential ELM (SOS-ELM)
HSKAS: A novel hierarchical shared key authentication scheme in wireless sensor networks
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: [db:dc_citation_issue], 页码: 105-116
作者:
Sun, Zeyu
;
Ji, Xiaohui
;
Li, Yuanbo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Authentication scheme
Communication overheads
Communication radius
Influence of environments
Shared key
Shared key authentication
Trusted third parties
Wireless sensor network (WSNs)
Secure data aggregation with privacy-protection in smart grid
会议论文
Shanghai, China, December 27, 2014 - December 28, 2014
作者:
Liu, Xueyan
;
Zhang, Qiang
;
Li, Zhanming
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2020/11/15
Cryptography
Data privacy
Electric power transmission networks
Energy resources
Fault detection
Home networks
Communication cost
Computation overheads
Fault-detection mechanisms
Ho-momorphic encryptions
Parameter analysis
Privacy preserving
Privacy protection
Secure data aggregations
©版权所有 ©2017 CSpace - Powered by
CSpace