Search alternatives:
name a » name _ (Expand Search), named ah (Expand Search)
same a » same _ (Expand Search)
node » nodes (Expand Search), mode (Expand Search), code (Expand Search)
review » reviewed (Expand Search)
name a » name _ (Expand Search), named ah (Expand Search)
same a » same _ (Expand Search)
node » nodes (Expand Search), mode (Expand Search), code (Expand Search)
review » reviewed (Expand Search)
-
1
-
2
A proxy signature-based handover authentication scheme for LTE wireless networks
Published 2017Get full text
Get full text
Journal Article -
3
Further studies of extreme learning machine and compressed signal detection
Published 2013“…The main contributions of the proposed WNN comparing with traditional ones are using composite functions at the hidden nodes and applying ELM algorithm to WNN as a learning algorithm. …”
Get full text
Thesis -
4
-
5
Modélisation des interactions en Italie du Nord au premier âge du Fer: de la circulation de parures aux réseaux d’influences culturelles
Published 2024“…Starting from this point of view, the comparative study of clothing item types and styles has allowed us to explore more deeply their interactions, clarifying, by the same way, the impact of their dissemination in a medium scale: Northern Italy. …”
Journal article -
6
Spectral variation of normalised laplacian for various network models
Published 2024Get full text
Article -
7