RECOMMENDER SYSTEM ON STRUCTURED DATA
暂无分享,去创建一个
[1] Dik Lun Lee,et al. Document Ranking and the Vector-Space Model , 1997, IEEE Softw..
[2] Deepak Puthal,et al. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .
[3] Juan Enrique Ramos,et al. Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .
[4] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[5] Susan T. Dumais,et al. Using Linear Algebra for Intelligent Information Retrieval , 1995, SIAM Rev..
[6] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[7] Jinjun Chen,et al. A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.
[8] Deepak Puthal,et al. Effective Machine to Machine Communications in Smart Grid Networks , 2012 .
[9] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[10] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[11] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[12] YED,et al. SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .
[13] Jinjun Chen,et al. DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[14] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[15] Fazlullah Khan,et al. An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .
[16] Xiangjian He,et al. Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.
[17] Fazlullah Khan,et al. Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[18] Mian Ahmad Jan,et al. Energy-efficient routing and secure communication in wireless sensor networks , 2016 .
[19] Kenji Nakagawa,et al. B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .
[20] Syed Roohullah Jan,et al. Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .
[21] Mian Ahmad Jan,et al. A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .
[22] Hashim Ali,et al. Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .
[23] Farman Ullah,et al. Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .
[24] Abdelkrim Haqiq,et al. Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .
[25] Xiangjian He,et al. Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..
[26] Xiangjian He,et al. Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[27] Shahzad Khan,et al. Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[28] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[29] Farman Ullah,et al. A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.
[30] Anna-Lan Huang,et al. Similarity Measures for Text Document Clustering , 2008 .
[31] Jinjun Chen,et al. A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..
[32] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).