Glutinous
发表于 2025-3-28 15:08:06
http://reply.papertrans.cn/25/2423/242216/242216_41.png
Pantry
发表于 2025-3-28 18:49:45
http://reply.papertrans.cn/25/2423/242216/242216_42.png
Congruous
发表于 2025-3-28 23:12:46
A Knowledge Graph for UAV Mission Planning Systems practical UAV application scenarios, UAV mission planning systems (UMPSs) highly rely on efficient mission planning and resource scheduling strategies in order to meet the requirement of UAV missions. However, the dynamic and complex mission environment poses challenges to mission planning in UMPSs
Asseverate
发表于 2025-3-29 03:09:21
Dynamic Resource Allocation for Network Slicing in LEO Satellite Networksconnectivity. Satellite network slicing is a technology that enables the partitioning of different resources and capabilities to different service requirements and customers in LEO satellite communication networks. It can guarantee different QoS requirements according to the application scenarios an
初学者
发表于 2025-3-29 10:44:15
Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodese blockchain-based access control architecture and a reliable access control consensus algorithm. Firstly, a two-layer blockchain network architecture is constructed, which is composed of a higher-layer main cluster and lower-layer sub-clusters. A cost optimal-based clustering algorithm is proposed
Digest
发表于 2025-3-29 13:41:32
Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANETET, trust management mechanism is implemented to defend against internal attacks in VANET. However, attacks targeting trust management mechanism, such as on-off attack, compromise trust management accuracy. In this paper, we propose the Anti-Attack Trust Evaluation Algorithm (AATEA) based on Bayesia
伪证
发表于 2025-3-29 19:12:12
A Dummy Query-Based User Privacy Protection Scheme in Named Data Networkingristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protect
A简洁的
发表于 2025-3-29 21:12:46
http://reply.papertrans.cn/25/2423/242216/242216_48.png
细查
发表于 2025-3-30 01:15:19
http://reply.papertrans.cn/25/2423/242216/242216_49.png
臆断
发表于 2025-3-30 07:46:41
http://reply.papertrans.cn/25/2423/242216/242216_50.png