1,105 results on '"Cheng, Xiuzhen"'
Search Results
202. Enhancing Macrocell Downlink Performance through Femtocell User Cooperation
203. Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks
204. Toward maintenance of hypercores in large-scale dynamic hypergraphs
205. A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification
206. Decentralized Wireless Federated Learning With Differential Privacy
207. Curb: Trusted and Scalable Software-Defined Network Control Plane for Edge Computing
208. Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs
209. Attacks and Countermeasures in Sensor Networks: A Survey
210. Topology Inference in Wireless Mesh Networks
211. Connected Dominating Set : 2003; Cheng, Huang, Li, Wu, Du 2003; Cheng, Huang, Li, Wu, Du
212. TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons
213. A Bitcoin Based Incentive Mechanism for Distributed P2P Applications
214. An Ensemble Method of Discovering Sample Classes Using Gene Expression Profiling
215. New advances in data, information, and knowledge in the Internet of Things
216. Energy-Efficient MAC Layer protocols in Ad Hoc Networks
217. DIAR: A Dynamic Interference Aware Routing Protocol for IEEE 802.11-Based Mobile Ad Hoc Networks
218. SeGrid: A Secure Grid Infrastructure for Sensor Networks
219. TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons
220. Connected Dominating Set in Sensor Networks and MANETs
221. Optimal Rectangular Partitions
222. Steiner Trees in Industry
223. Online auction-based relay selection for cooperative communication in CR networks
224. Achievable transmission capacity of cognitive radio networks with cooperative relaying
225. Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks
226. Enabling smartphone-based HD video chats by cooperative transmissions in CRNs
227. Secure friend discovery based on encounter history in mobile social networks
228. A novel verification method for payment card systems
229. Energy-Constrained D2D Assisted Federated Learning in Edge Computing
230. Core-GAE: Toward Generation of IoT Networks
231. Learning Graph Structures With Transformer for Multivariate Time-Series Anomaly Detection in IoT
232. PPAR: A Privacy-Preserving Adaptive Ranking Algorithm for Multi-Armed-Bandit Crowdsourcing
233. Fault-Tolerant Consensus with NOMA in Mobile Networks
234. Fast Core Maintenance in Dynamic Graphs
235. MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary
236. AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
237. Low-Power and Low-Delay WLAN Using Wake-Up Receivers
238. A New Heuristic for the Minimum Connected Dominating Set Problem on Ad Hoc Wireless Networks
239. On the Construction of Virtual Backbone for Ad Hoc Wireless Network
240. Guillotine Cut in Approximation Algorithms
241. A Simple Implementation of the Stochastic Discrimination for Pattern Recognition
242. Verifiable multi-secret sharing based on LFSR sequences
243. Towards Unconstrained Vocabulary Eavesdropping With Mmwave Radar Using GAN
244. CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems
245. Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services
246. Extending On-chain Trust to Off-chain -- Trustworthy Blockchain Data Collection using Trusted Execution Environment (TEE)
247. CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA
248. Exploring Truss Maintenance in Fully Dynamic Graphs: A Mixed Structure-Based Approach
249. Influence-based community partition for social networks
250. ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.