default search action
CITS 2020: Hangzhou, China
- Mohammad S. Obaidat, Kuei-Fang Hsiao, Petros Nicopolitidis, Daniel Cascado Caballero:
International Conference on Computer, Information and Telecommunication Systems, CITS 2020, Hangzhou, China, October 5-7, 2020. IEEE 2020, ISBN 978-1-7281-6544-8 - Tao Zheng, Jian Wan, Jilin Zhang, Congfeng Jiang, Gangyong Jia:
A Survey of Computation Offloading in Edge Computing. 1-6 - Ruisong Liu, Shaojie Liu, Ning Wang:
Optimization Scheduling of Cloud Service Resources Based on Beetle Antennae Search Algorithm. 1-5 - Xinyong Zhang:
Effects of Different Representation Styles on User Attention in MOOC. 1-5 - Wenxuan Liu:
The Planning Model of Transmission Line Using Bidirectional Particle Swarm Optimization Based on Time Series. 1-5 - Ping Zhu, Dongmei Luo, Xuhui Chen:
Fault-tolerant and power-aware scheduling in embedded real-time systems. 1-5 - Min Tian, Hongtao Deng, Mengying Xu:
Immune Parallel Artificial Bee Colony Algorithm For Spectrum Allocation In Cognitive Radio Sensor Networks. 1-4 - Ahmed El Emine Sejad, Khadidiatou Wane Keita, Khaly Tall, Idy Diop:
Proposal of a DH optimization model. 1-5 - Arpit Shukla, Nirav Paid, Sudeep Tanwar, Balqies Sadoun, Mohammad S. Obaidat:
BDoTs: Blockchain-based Evaluation Scheme for Online Teaching under COVID-19 Environment. 1-5 - Jiaqi Li, Xiaodong Yang:
A Cyclical Learning Rate Method in Deep Learning Training. 1-5 - Yinghui Zhao, Ru An, Dongyang Ou, Congfeng Jiang:
An InterPlanetary File System Based Picture Archiving and Communication System. 1-5 - Guoyi Jiang, Linhua Su, Haibo Liu, Yang Cao, Rui Sun, Fengxin Diao:
Constructing the Power Knowledge graph by Multi-source Electricity Data. 1-5 - Omar Mohamed Gouda, Dina J. Hejji, Mohammad S. Obaidat:
Privacy Assessment of Fitness Tracker Devices. 1-8 - Abdullah Yaqot, Lutz Rauchhaupt:
Efficient Resource Allocation Paradigm for MIMO Industrial Cognitive Networks. 1-5 - Liwei Liu, Maozhi Xu:
Improvements to the Descent Step in the Number Field Sieve for Discrete Logarithms. 1-6 - Faiez Altamimi, Waqar Asif, Muttukrishnan Rajarajan:
DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store. 1-8 - Ping Wang, Qifan Zhao, Yingliang Huang, Juan Nie, Xuemin Mao, Zhao Mingxue:
Comprehensive Evaluation of Road Risk in Earthquake Disaster Area Based on Normalization Method. 1-5 - Shuaifeng Jiang, Yuyuan Chang, Kazuhiko Fukawa:
Distributed Inter-cell Interference Coordination for Small Cell Wireless Communications: A Multi-Agent Deep Q-Learning Approach. 1-5 - Janis Nötzel:
Entanglement-Enabled Communication. 1-6 - Yingliang Huang, Pengfei Yin, Gang Zhou, Pengcheng Liu, Yuyang Tang, Wenbo Li:
Construction of public safety knowledge graphs. 1-4 - Chandrashekhar Meshram, Mohammad S. Obaidat, Akshaykumar Meshram:
New Efficient QERPKC based on Partial Discrete Logarithm Problem. 1-5 - Tao Zhang, Zhihui Shang, Hao Wu, Yu Zhang, Xiaoqiang Qiao:
Secure Transmission in Cognitive MIMO Networks Using Cooperative Jammer With Outdated CSI. 1-5 - Janis Nötzel, Stephen Diadamo:
Entanglement-Enabled Communication for the Internet of Things. 1-6 - Georgios L. Stavrinides, Helen D. Karatza:
Multi-Criteria Scheduling of Complex Workloads on Distributed Resources. 1-5 - Haibo Pang, Qi Xuan, Meiqin Xie, Chengming Liu, Zhanbo Li:
Target Tracking Based on Siamese Convolution Neural Networks. 1-5 - Yang Gao, Aoran Xu, Baoliang Liu, Cailian Gu, Xuemin Leng, Xinlei Shu:
Research on Wind Power Prediction of Acoustic Radar Based on Wireless Technology. 1-5 - Xuan Cai, Yifan Wang, Xiaoqing Sun, Wentao Liu, Yuyang Tang, Wenbo Li:
Comparing the performance of ResNets on COVID-19 diagnosis using CT scans. 1-4 - Haizhou Hu, Congfeng Jiang:
Edge Intelligence: Challenges and Opportunities. 1-5 - A. Xanthopoulos, Anastasios Valkanis, Georgia A. Beletsioti, Georgios I. Papadimitriou, Petros Nicopolitidis:
On the Use of Backoff Algorithms in Slotted ALOHA LoRaWAN Networks. 1-4 - Waleed Obaid, Mohammad S. Obaidat:
Automatic Spine Bone Segmentation and Feature Extraction in Computed Tomography Images for Biometric Recognition. 1-5 - Monika Prakash, Atef Abdrabou:
Performance Insights on Using Multipath TCP for Wireless Multihomed IoT Gateways. 1-5 - Mingxue Zhao, Ping Wang, Qifan Zhao, Xuemin Mao, Juan Nie, Yingliang Huang:
Research on the route selection of emergency rescue materials based on fairness and timeliness in the early post earthquake period. 1-4 - Xiaoyong Zhao, Jingwei Wang:
Pathogenic virus detection method based on multi-model fusion. 1-4 - Yinghui Zhao, Ru An, Dongyang Ou, Congfeng Jiang:
A Video Capturing and Processing Platform Based on Mobile Edge Computing. 1-6 - Haibo Liu, Guoyi Jiang, Linhua Su, Yang Cao, Fengxin Diao, Lipeng Mi:
Construction of power projects knowledge graph based on graph database Neo4j. 1-4 - Linlin Xu, Xuemin Mao, Minmin Sun, Wentao Liu, Yifan Wang, Yuyang Tang:
Lung lesions detection from CT images based on the modified Faster R-CNN. 1-5 - Yifan Wang, Zhongxu Li, Xuecheng Yang, Ning Luo, Yu Zhao, Gang Zhou:
Insulator Defect Recognition Based on Faster R-CNN. 1-4 - Dongyang Ou, Congfeng Jiang:
An empirical study on correlation clustering characteristics of interests based on big data. 1-6 - Bingwu Fang, Qiao Li, Hao Hu, Huagang Xiong:
Token Regulated Credit Based Shaper for Time Sensitive Networks. 1-6 - Chandrashekhar Meshram, Mohammad S. Obaidat, Akshaykumar Meshram:
An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps. 1-6 - Min Lei, Miao Jin, Tianfu Huang, Zhiwei Guo, Quan Wang, Zhiwu Wu, Zhuo Chen, Xiwen Chen, Jun Zhang:
Ultra-wideband Fingerprinting Positioning Based on Convolutional Neural Network. 1-5 - Rifaqat Ali, Preeti Chandrakar, Mohammad S. Obaidat, Kuei-Fang Hsiao, Arup Kumar Pal, SK Hafizul Islam:
A Secure Authentication Mechanism for Wireless Sensor Networks. 1-8 - Konstantinos F. Kantelis, Anastasios Valkanis, Petros Nikopolitidis, Georgios Papadimitriou, Dimitrios Kallergis, Christos Douligeris, Panagiotis D. Bamidis:
Adaptive Protocol with Weights for Fair Distribution of Resources in Healthcare-Oriented PONs. 1-6 - JunLin Guan, GongCai Shi, Xin Zhi:
Research and application of Web network attack protection and block chain log storage based on software definition. 1-5 - Bingjie Zhao, Ziyang Li, Tao Zhang:
The Heterogeneous Deployment Tool for Hardware and Software Co-design. 1-5 - Yuan Yu:
Research on coordinating optimization strategy of integrated energy system based on multi-agent consistency theory. 1-5 - Rajesh Gupta, Urvish Thakker, Sudeep Tanwar, Mohammad S. Obaidat, Kuei-Fang Hsiao:
BITS: A Blockchain-driven Intelligent Scheme for Telesurgery System. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.