Search

Showing total 8 results
8 results

Search Results

1. Orienteering Problem with Functional Profits for multi-source dynamic path construction.

2. Identifying influential nodes based on network representation learning in complex networks.

3. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

4. Protein subnuclear localization based on a new effective representation and intelligent kernel linear discriminant analysis by dichotomous greedy genetic algorithm.

5. Testing the event witnessing status of micro-bloggers from evidence in their micro-blogs.

6. A multi-domain trust management model for supporting RFID applications of IoT.

7. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks.

8. A Multi-Objective Compounded Local Mobile Cloud Architecture Using Priority Queues to Process Multiple Jobs.