Intruder 发表于 2025-3-28 16:47:12

http://reply.papertrans.cn/103/10290/1028931/1028931_41.png

DEMUR 发表于 2025-3-28 21:27:16

Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Modelenefit from these services, users are enduring the risk of leaking private information. Game theory is a powerful method that is utilized to balance such tradeoff problems. The drawback is that most schemes consider the tradeoff problem from the aspect of the users, while the platform is the party t

NEG 发表于 2025-3-29 01:43:00

Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliancey. The unrestricted collection, processing and unsafe transmission of PII will result in the disclosure of privacy, which cause losses to users. With the advent of laws and regulations about data privacy such as GDPR, the major APP vendors have become more and more cautious about collecting PII. How

不溶解 发表于 2025-3-29 07:08:37

http://reply.papertrans.cn/103/10290/1028931/1028931_44.png

摇摆 发表于 2025-3-29 08:06:26

Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks eployed in harsh environment. In this paper, we introduce . where robust storage nodes are deployed in sensor networks and data redundancy is utilized through coding techniques, in order to improve the reliability of data storage. Taking into account the cost of both data delivery and storage, we pr

Geyser 发表于 2025-3-29 15:16:23

http://reply.papertrans.cn/103/10290/1028931/1028931_46.png

Lignans 发表于 2025-3-29 19:04:15

Spatiotemporal Feature Extraction for Pedestrian Re-identificationdually entered the arena of public security. The system generally involve three important parts: feature extraction, feature aggregation and loss function. Pedestrian feature extraction and aggregation are critical steps in this field. Most of the previous studies concentrate on designing various fe

不透明性 发表于 2025-3-29 22:04:30

http://reply.papertrans.cn/103/10290/1028931/1028931_48.png

联想记忆 发表于 2025-3-30 00:46:47

Online DAG Scheduling with On-Demand Function Configuration in Edge Computinge and more frequent. Edge Computing, deploying relatively small-scale edge servers close to users, is a promising cloud computing paradigm to reduce the network communication delay. Due to the limited capability, each edge server can be configured with only a small amount of functions to run corresp

无能力之人 发表于 2025-3-30 04:20:02

Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transferg (MRC) wireless power transfer (WPT). The usage of relay coils is also of great benefit for power transmission in the WPT system containing multiple transmitters (TXs) each with a coil. In this paper, we study the influence of relay coils and the magnetic beamforming for a MRC-WPT system with multi
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Wireless Algorithms, Systems, and Applications; 14th International C Edoardo S. Biagioni,Yao Zheng,Siyao Cheng Conference proceedings 2019