Glutinous 发表于 2025-3-28 15:08:06

http://reply.papertrans.cn/25/2423/242216/242216_41.png

Pantry 发表于 2025-3-28 18:49:45

http://reply.papertrans.cn/25/2423/242216/242216_42.png

Congruous 发表于 2025-3-28 23:12:46

A Knowledge Graph for UAV Mission Planning Systems practical UAV application scenarios, UAV mission planning systems (UMPSs) highly rely on efficient mission planning and resource scheduling strategies in order to meet the requirement of UAV missions. However, the dynamic and complex mission environment poses challenges to mission planning in UMPSs

Asseverate 发表于 2025-3-29 03:09:21

Dynamic Resource Allocation for Network Slicing in LEO Satellite Networksconnectivity. Satellite network slicing is a technology that enables the partitioning of different resources and capabilities to different service requirements and customers in LEO satellite communication networks. It can guarantee different QoS requirements according to the application scenarios an

初学者 发表于 2025-3-29 10:44:15

Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodese blockchain-based access control architecture and a reliable access control consensus algorithm. Firstly, a two-layer blockchain network architecture is constructed, which is composed of a higher-layer main cluster and lower-layer sub-clusters. A cost optimal-based clustering algorithm is proposed

Digest 发表于 2025-3-29 13:41:32

Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANETET, trust management mechanism is implemented to defend against internal attacks in VANET. However, attacks targeting trust management mechanism, such as on-off attack, compromise trust management accuracy. In this paper, we propose the Anti-Attack Trust Evaluation Algorithm (AATEA) based on Bayesia

伪证 发表于 2025-3-29 19:12:12

A Dummy Query-Based User Privacy Protection Scheme in Named Data Networkingristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protect

A简洁的 发表于 2025-3-29 21:12:46

http://reply.papertrans.cn/25/2423/242216/242216_48.png

细查 发表于 2025-3-30 01:15:19

http://reply.papertrans.cn/25/2423/242216/242216_49.png

臆断 发表于 2025-3-30 07:46:41

http://reply.papertrans.cn/25/2423/242216/242216_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Communications and Networking; 18th EAI Internation Feifei Gao,Jun Wu,Shangguang Wang Conference proceedings 2024 ICST Institute for Comput