Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-25 of  24,012 نتائج ""exploitation""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Robust Deception Scheme for Secure Interference Exploitation Under PSK Modulations

  • Source: IEEE Transactions on Communications IEEE Trans. Commun. Communications, IEEE Transactions on. 69(8):5425-5440 Aug, 2021

تفاصيل السجل

×
Academic Journal

A Machine-Learning-Based Framework for Productive Locality Exploitation

  • Source: IEEE Transactions on Parallel and Distributed Systems IEEE Trans. Parallel Distrib. Syst. Parallel and Distributed Systems, IEEE Transactions on. 32(6):1409-1424 Jun, 2021

تفاصيل السجل

×
Academic Journal

Maximum Information Exploitation Using Broad Learning System for Large-Scale Chaotic Time-Series Prediction

  • Source: IEEE Transactions on Neural Networks and Learning Systems IEEE Trans. Neural Netw. Learning Syst. Neural Networks and Learning Systems, IEEE Transactions on. 32(6):2320-2329 Jun, 2021

تفاصيل السجل

×
  • 1-25 of  24,012 نتائج ""exploitation""