Showing results 38 to 57 of 74
< previous
next >
Issue Date | Title | Author(s) |
2022-12-01 | Identifying effective agricultural management practices for climate change adaptation and mitigation: A win-win strategy in South-Eastern Australia | He, Q; Liu, DL; Wang, B; Li, L; Cowie, A; Simmons, A; Zhou, H; Tian, Q; Li, S; Li, Y; Liu, K; Yan, H; Harrison, MT; Feng, P; Waters, C; Li, GD; de Voil, P; Yu, Q |
2021-08-15 | Improved the specificity of peroxidase-like carbonized polydopamine nanotubes with high nitrogen doping for glutathione detection | Zhang, T; Li, H; Liu, M; Zhou, H; Zhang, Z; Yu, C; Wang, C; Wang, G |
2022-10-10 | In-N-Out Generative Learning for Dense Unsupervised Video Segmentation | Pan, X; Li, P; Yang, Z; Zhou, H; Zhou, C; Yang, H; Zhou, J; Yang, Y |
2004-09-27 | Introducing feedback congestion control to a network with IEEE 802.11 wireless LAN | Zhou, H; Hoang, D; Nhan, P; Mirchandani, V |
2017-05-01 | Invisible hand: A privacy preserving mobile crowd sensing framework based on economic models | Liu, B; Zhou, W; Zhu, T; Zhou, H; Lin, X |
2007-05-15 | The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers | Shi, C; Zhou, H; Lu, J; Zhang, G; Zhang, Z |
2017-10-01 | Locator/Identifier Split Networking: A Promising Future Internet Architecture | Feng, B; Zhang, H; Zhou, H; Yu, S |
2018-02-01 | Loop-Oriented pointer analysis for automatic SIMD vectorization | Sui, Y; Fan, X; Zhou, H; Xue, J |
2016-12-01 | A magnetically actuated anchoring system for a wireless endoscopic capsule | Zhou, H; Alici, G; Munoz, F |
2018-11-01 | Malware propagations in wireless Ad Hoc networks | Liu, B; Zhou, W; Gao, L; Zhou, H; Luan, TH; Wen, S |
2022-01-01 | Manipulating Structural Graph Clustering | Li, W; Gao, M; Wen, D; Zhou, H; Ke, C; Qin, L |
2018-12-04 | MTF: Mitigating link flooding attacks in delay tolerant networks | Wang, Z; Zhou, H; Feng, B; Quan, W; Yu, S |
2018-04-01 | Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks | Shen, S; Huang, L; Zhou, H; Yu, S; Fan, E; Cao, Q |
2019-12-01 | Nonrigid Point Set Registration With Robust Transformation Learning Under Manifold Regularization | Ma, J; Wu, J; Zhao, J; Jiang, J; Zhou, H; Sheng, QZ |
2017-12-01 | Nurse–physician communication – An integrated review | Tan, TC; Zhou, H; Kelly, M |
2023-09-01 | Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems | Shen, S; Wu, X; Sun, P; Zhou, H; Wu, Z; Yu, S |
2016-05-01 | Practical Asynchronous Neighbor Discovery in Ad Hoc Networks with Directional Antennas | Tian, F; Liu, B; Cai, H; Zhou, H; Gui, L |
2019-12 | Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions | Liu, B; Zhu, T; Zhou, W; Wang, K; Zhou, H; Ding, M |
2016-03-31 | Pure-state tomography with the expectation value of Pauli operators | Ma, X; Jackson, T; Zhou, H; Chen, J; Lu, D; Mazurek, MD; Fisher, KAG; Peng, X; Kribs, D; Resch, KJ; Ji, Z; Zeng, B; Laflamme, R |
2017-08-01 | QoS-Driven Efficient Client Association in High-Density Software-Defined WLAN | Chen, J; Liu, B; Zhou, H; Yu, Q; Gui, L; Shen, XS |