Search

Your search keyword '"Huan X"' showing total 1,340 results

Search Constraints

Start Over You searched for: Author "Huan X" Remove constraint Author: "Huan X"
1,340 results on '"Huan X"'

Search Results

1. Digital Twin for O-RAN Towards 6G

2. Structural Assessment Based on Vibration Measurement Test Combined with an Artificial Neural Network for the Steel Truss Bridge

3. On the Cooperative Relaying Strategies for Multi-Core Wireless Network-on-Chip

4. Dynamic Priority Based Reliable Real-Time Communications for Infrastructure-Less Networks

5. Disaster Management Using D2D Communication With Power Transfer and Clustering Techniques

6. A Stackelberg-Game Approach for Disaster-Recovery Communications Utilizing Cooperative D2D

7. Differential spatial modulation for high-rate transmission systems

8. Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks

9. Transitivity Demolition and the Fall of Social Networks

11. Robust Approximation Algorithms for Non-monotone $k$-Submodular Maximization under a Knapsack Constraint

12. Influence Maximization with Priority in Online Social Networks

14. Competitive Influence Maximization within Time and Budget Constraints in Online Social Networks: An Algorithmic Approach

15. Study on the Model to Determine Riverbed Scour and the Influence of Bridge Construction on Riverbed Deformation

16. Efficient ARQ Retransmission Schemes for Two-Way Relay Networks

17. Double Intelligent Reflecting Surface-assisted Multi-User MIMO mmWave Systems with Hybrid Precoding

19. Variational system identification of the partial differential equations governing microstructure evolution in materials: Inference over sparse and spatially unrelated data

21. Entropy-based closure for probabilistic learning on manifolds

22. Secure Wireless Powered and Cooperative Jamming D2D Communications

25. Resource Allocation Strategies for Secure WPCN Multiantenna Multicasting Systems

26. Robust Chance-Constrained Optimization for Power-Efficient and Secure SWIPT Systems

27. Robust Sum Secrecy Rate Optimization for MIMO Two-way Full Duplex Systems

28. Transitivity Demolition and the Falls of Social Networks

29. CATS: Cluster-Aided Two-Step Approach for Anomaly Detection in Smart Manufacturing

35. On-ramp mixed traffic flow merging model with connected and autonomous vehicles.

39. Location-Based Competitive Influence Maximization in Social Networks

46. Targeted Misinformation Blocking on Online Social Networks

Catalog

Books, media, physical & digital resources