Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Weikong Qi"'
Publikováno v:
World Wide Web. 24:941-954
With the rapid development of electronic and information technology, Internet of Things (IoT) devices have become extensively utilised in various fields. Increasing attention has been paid to the performance and security analysis of IoT-based service
Publikováno v:
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783030503987
IMIS
IMIS
With the rapid development of electronic and information technology, IoT devices have become widely used in various fields. Increasing attention has been paid to the performance and security analysis of IoT devices. Dynamic instrumentation is a commo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a4a3e08757179dbcf0da6d0c5031c55
https://doi.org/10.1007/978-3-030-50399-4_29
https://doi.org/10.1007/978-3-030-50399-4_29
Publikováno v:
Future Generation Computer Systems. 67:276-285
Cloud computing consists of processing big data and provides convenient, on-demand network access to a shared pool of configurable computing resources. Cloud data center costs have become a hot topic in recent years. To minimize bandwidth costs, a be
Publikováno v:
IWCMC
Modern vehicles incorporate dozens of sensors to provide vital sensor data to the system, where GNSS (global satellite navigation system) gives the localization, navigation, and time synchronization that can improve the safety factor of the vehicles.
Autor:
WeiDong Yu, WeiKong Qi
Publikováno v:
Science China Information Sciences. 54:884-897
A novel operation mode for spaceborne polarimetric SAR, named polarization space-division adding polarization code-division (PSD-PCD) operation mode, is proposed in this paper through combining polarimetric SAR with elevation digital beam-forming (DB
Publikováno v:
BWCCA
With the development of Internet technology, more and more unknown programs appears in the network environment, the detection and classification technology is increasingly becoming an important technology in the field of information security. This pa