Glutinous 发表于 2025-3-28 15:08:06
http://reply.papertrans.cn/25/2423/242216/242216_41.pngPantry 发表于 2025-3-28 18:49:45
http://reply.papertrans.cn/25/2423/242216/242216_42.pngCongruous 发表于 2025-3-28 23:12:46
A Knowledge Graph for UAV Mission Planning Systems practical UAV application scenarios, UAV mission planning systems (UMPSs) highly rely on efficient mission planning and resource scheduling strategies in order to meet the requirement of UAV missions. However, the dynamic and complex mission environment poses challenges to mission planning in UMPSsAsseverate 发表于 2025-3-29 03:09:21
Dynamic Resource Allocation for Network Slicing in LEO Satellite Networksconnectivity. Satellite network slicing is a technology that enables the partitioning of different resources and capabilities to different service requirements and customers in LEO satellite communication networks. It can guarantee different QoS requirements according to the application scenarios an初学者 发表于 2025-3-29 10:44:15
Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodese blockchain-based access control architecture and a reliable access control consensus algorithm. Firstly, a two-layer blockchain network architecture is constructed, which is composed of a higher-layer main cluster and lower-layer sub-clusters. A cost optimal-based clustering algorithm is proposedDigest 发表于 2025-3-29 13:41:32
Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANETET, trust management mechanism is implemented to defend against internal attacks in VANET. However, attacks targeting trust management mechanism, such as on-off attack, compromise trust management accuracy. In this paper, we propose the Anti-Attack Trust Evaluation Algorithm (AATEA) based on Bayesia伪证 发表于 2025-3-29 19:12:12
A Dummy Query-Based User Privacy Protection Scheme in Named Data Networkingristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protectA简洁的 发表于 2025-3-29 21:12:46
http://reply.papertrans.cn/25/2423/242216/242216_48.png细查 发表于 2025-3-30 01:15:19
http://reply.papertrans.cn/25/2423/242216/242216_49.png臆断 发表于 2025-3-30 07:46:41
http://reply.papertrans.cn/25/2423/242216/242216_50.png