Guha et al.
1998
Approximation algorithms for connected dominating sets
EP4362595A4
(en )
2024-11-27
WIRELESS COMMUNICATIONS METHOD WITH COMMON TXOP AND WIRELESS COMMUNICATIONS TERMINAL USING THE SAME
DE1437278U
(https= )
CN103546803B
(zh )
2016-09-21
一种图像处理的方法、客户端和图像处理的系统
CN105162625A
(zh )
2015-12-16
用于在便携式终端中建立网络连接的装置和方法
Lubotzky et al.
2020
Non p-norm approximated groups
Costantino et al.
2012
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
Xu et al.
2016
BATS code with unequal error protection
D'Angelo et al.
2022
Budgeted out-tree maximization with submodular prizes
Laishram et al.
2017
Predicted max degree sampling: Sampling in directed networks to maximize node coverage through crawling
Sharma et al.
2020
Tree-based ant colony optimization algorithm for effective multicast routing in mobile adhoc network
CN104796601B
(zh )
2018-01-12
信息取得装置及信息取得方法
Rêgo et al.
2022
Transmitter identification using frame reconstruction in rolling shutter based systems
CN105516607B
(zh )
2019-05-21
拍摄参数的推荐方法、装置及系统
DE1389686U
(https= )
CN116582486B
(zh )
2025-09-09
一种针对可变长地址的路由查找方法及装置
CN104318220A
(zh )
2015-01-28
一种信息处理方法和电子设备
Giri et al.
2018
An approach of secure image transmission using low density parity check codes
DE1320113U
(https= )
Choudhury et al.
2025
Domain Extension for BA with Honest Majority and Statistical Security
DE1323874U
(https= )
Thomas et al.
2008
Pseudo-node reduction on multi-access networks for algorithmic simplification
DE1366297U
(https= )
DE1335510U
(https= )
Johnson et al.
2021
Achieving metric dimension one by weighting the edges of a connected network