Search

Showing total 8 results
8 results

Search Results

1. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

2. Correction of failure in linear antenna arrays with greedy sparseness constrained optimization technique.

3. A novel Gravity-FREAK feature extraction and Gravity-KLT tracking registration algorithm based on iPhone MEMS mobile sensor in mobile environment.

4. A multi-domain trust management model for supporting RFID applications of IoT.

5. Comparison of two SVD-based color image compression schemes.

6. Evolutionary Algorithm for RNA Secondary Structure Prediction Based on Simulated SHAPE Data.

7. Enhancing the Flexibility of TCP in Heterogeneous Network.

8. Spectral X-Ray CT Image Reconstruction with a Combination of Energy-Integrating and Photon-Counting Detectors.