Search

Your search keyword '"Wuxiong Zhang"' showing total 224 results

Search Constraints

Start Over You searched for: Author "Wuxiong Zhang" Remove constraint Author: "Wuxiong Zhang"
224 results on '"Wuxiong Zhang"'

Search Results

1. Status-Byte-Assisted RDMA Transmission Mechanism for Optimizing Multi-Task Video Streaming in Edge Computing

2. Dynamic Analysis and Field-Programmable Gate Array Implementation of a 5D Fractional-Order Memristive Hyperchaotic System with Multiple Coexisting Attractors

3. AI-Enabled Trust in Distributed Networks

4. Trust Evaluation and Decision Based on D-S Evidence Theory: Early Models and Future Perspectives

5. A frequency offset compensation method based on all phase FFT amplitude

6. Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks

7. 2D-Unitary ESPRIT Based Multi-Target Joint Range and Velocity Estimation Algorithm for FMCW Radar

8. MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks

9. Digital signature scheme for information non-repudiation in blockchain: a state of the art review

10. Enhanced Root-MUSIC Algorithm Based on Matrix Reconstruction for Frequency Estimation

11. An Improved CZT Algorithm for High-Precision Frequency Estimation

12. Dynamic Analysis and FPGA Implementation of a New, Simple 5D Memristive Hyperchaotic Sprott-C System

13. FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things

14. Non-Data Aided Rician Parameters Estimation in Temporal Fading Channel With 3 DoFs Gaussian Mixture Model

15. Game-Based Trust in Complex Networks: Past, Present, and Future

16. Accurate Sinusoidal Frequency Estimation Algorithm for Internet of Things Based on Phase Angle Interpolation Using Frequency Shift

17. IoT sensing technology based on acoustic phase

18. A Mobile Cloud Based Scheduling Strategy for Industrial Internet of Things

19. Comparison of traffic flow prediction based on AR model and BP model

20. Wireless Single Cellular Coverage Boundary Models

21. Towards Security Joint Trust and Game Theory for Maximizing Utility: Challenges and Countermeasures

26. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

Catalog

Books, media, physical & digital resources