schliessen

Filtern

 

Bibliotheken

6.

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
by Zhihua Xia

IEEE Transactions on Parallel and Distributed Systems, 01 February 2016, Vol.27(2), pp.340-352

8.

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
by Xiang, Lingyun

IEICE - Transactions on Information and Systems, February 1, 2017, Vol.E100.D(2), pp.313-322

12.

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
by Zhihua Xia

IEEE Transactions on Information Forensics and Security, November 2016, Vol.11(11), pp.2594-2608

16.

Speeding up the Dreyfus–Wagner algorithm for minimum Steiner trees
by Fuchs, Bernhard

Mathematical Methods of Operations Research, 2007, Vol.66(1), pp.117-125

17.

Reactive Power Aspects in Reliability Assessment of Power Systems
by Wenping Qin

IEEE Transactions on Power Systems, February 2011, Vol.26(1), pp.85-92

20.

The application of nonlinear programming for multiuser detection in CDMA
by Liu Hongwei

IEEE Transactions on Wireless Communications, January 2004, Vol.3(1), pp.8-11

Recommended databases

Find more Articles matching your search terms in these recommended databases.

Filter electronic articles 171 Hits

Remove Filters