Showing 1 - 20 results of 31 for search 'Ru-chuan Wang', query time: 0.04s
Refine Results
-
1
-
2
Worm propagation modeling in cloud security by Wei ZHANG, Ru-chuan WANG, Peng LI
Published 2012-04-01
Article -
3
Location publishing technology based on differential privacy-preserving for big data services by Lin ZHANG, Yan LIU, Ru-chuan WANG
Published 2016-09-01
Article -
4
Worm propagation modeling in cloud security by Wei ZHANG, Ru-chuan WANG, Peng LI
Published 2012-04-01
Article -
5
Location publishing technology based on differential privacy-preserving for big data services by Lin ZHANG, Yan LIU, Ru-chuan WANG
Published 2016-09-01
Article -
6
Dynamic trust evaluation model based on evaluation credibility in cloud computing by Lin ZHANG, Kai-li RAO, Ru-chuan WANG
Published 2013-08-01
Article -
7
A Type of Node Deployment Strategy Based on Variable Acceleration Motion for Wireless Sensor Networks by Chao Sha, Ru-chuan Wang, Hai-ping Huang
Published 2013-10-01
Article -
8
Dynamic trust evaluation model based on evaluation credibility in cloud computing by Lin ZHANG, Kai-li RAO, Ru-chuan WANG
Published 2013-08-01
Article -
9
A Multicast Algorithm for Wireless Sensor Networks Based on Network Coding by Zhi-jie Han, Ru-chuan Wang, Fu Xiao
Published 2014-01-01
Article -
10
Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking by Zhi-yuan LI, Ru-long CHEN, Ru-chuan WANG
Published 2016-04-01
Article -
11
Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking by Zhi-yuan LI, Ru-long CHEN, Ru-chuan WANG
Published 2016-04-01
Article -
12
Dynamic trust model based on recommendation chain classification in complex network environment by Lin ZHANG, Huan XING, Ru-chuan WANG, Chao-jie WU
Published 2015-09-01
Article -
13
Dynamic trust model based on recommendation chain classification in complex network environment by Lin ZHANG, Huan XING, Ru-chuan WANG, Chao-jie WU
Published 2015-09-01
Article -
14
-
15
Trust evaluation model based on improved D-S evidence theory by Lin ZHANG, Jing-wen LIU, Ru-chuan WANG, Hai-yan WANG
Published 2013-07-01
Article -
16
Trust evaluation model based on improved D-S evidence theory by Lin ZHANG, Jing-wen LIU, Ru-chuan WANG, Hai-yan WANG
Published 2013-07-01
Article -
17
Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks by Zhi-qiang Zou, Ze-ting Li, Shu Shen, Ru-chuan Wang
Published 2016-02-01
Article -
18
-
19
-
20
New construction of secure range query on encrypted data in cloud computing by Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, Ru-chuan WANG
Published 2015-02-01
Article