UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Detect and prevent SIP flooding attacks in VoLTE by utilizing a two-tier PFilter design Conference paper
IEICE Transactions on Information and Systems
Authors:  Ruan N.;  Wu M.;  Ma S.;  Zhu H.;  Jia W.;  Wu S.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Count  Filter  PFilter  SIP flooding attack  
Stock index trend analysis based on signal decomposition Journal article
IEICE Transactions on Information and Systems, 2014,Volume: E97-D,Issue: 8,Page: 2187-2190
Authors:  Zhang L.;  Zhang D.;  Li W.
Favorite | View/Download:4/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2019/04/04
Adaptive Fourier Decomposition  Rbf Neural Network  Stock Index Trend Forecasting  The Dow Theory  
Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks Journal article
IEICE Transactions on Information and Systems, 2010,Volume: E93-D,Issue: 3,Page: 510-517
Authors:  Peng S.;  Jia W.;  Wang G.;  Wu J.;  Guo M.
Favorite | View/Download:3/0 | TC[WOS]:12 TC[Scopus]:0 | Submit date:2019/02/11
Collaborative filtering  Mobile ad-hoc networks  Multiple constraints  Trust evaluation  Trusted routing  
Optimal multicast tree routing for cluster computing in hypercube interconnection networks Journal article
IEICE Transactions on Information and Systems, 2004,Volume: E87-D,Issue: 7,Page: 1625-1632
Authors:  Weijia JIA;  Bo HAN;  Pui On AU;  Yong HE;  Wanlei ZHOU
Favorite | View/Download:6/0 | TC[WOS]:2 TC[Scopus]:0 | Submit date:2019/02/11
Cluster Computing  Delay  Hypercube  Multicast Routing  Resource Utilization  Routing Delay  Shared Tree  Source Tree