Skip to main content

previous disabled Page of 2
and
Your search also matched 432 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission

Include preview-only content
  1. Article

    Coordination of networking and computing: toward new information infrastructure and new services mode

    **aoyun Wang 王晓云, Tao Sun 孙滔, Yong Cui 崔勇 in Frontiers of Information Technology & Elec… (2024)

  2. Article

    Open Access

    A novel trusted hardware-based scalable security framework for IoT edge devices

    The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT devices has given rise to smart cities, smart factories, sma...

    Mohd Khan, Mohsen Hatami, Wenfeng Zhao, Yu Chen in Discover Internet of Things (2024)

  3. Article

    Erratum to: A visual analysis approach for data imputation via multi-party tabular data correlation strategies

    Haiyang Zhu, Dongming Han, Jiacheng Pan in Frontiers of Information Technology & Elec… (2024)

  4. Article

    Erratum to: Soft-HGRNs: soft hierarchical graph recurrent networks for multi-agent partially observable environments

    Unfortunately the funding information was incorrect. It should be the National Key R&D Program of China (No. 2018AAA0102302).

    Yixiang Ren, Zhenhui Ye, Yining Chen in Frontiers of Information Technology & Elec… (2023)

  5. Article

    China in the eyes of news media: a case study under COVID-19 epidemic

    As one of the early COVID-19 epidemic outbreak areas, China attracted the global news media’s attention at the beginning of 2020. During the epidemic period, Chinese people united and actively fought against t...

    Hong Huang 黄宏, Zhexue Chen 陈哲学 in Frontiers of Information Technology & Elec… (2021)

  6. Article

    Open Access

    Drones as internet of video things front-end sensors: challenges and opportunities

    Internet of Video Things (IoVT) has become an emerging class of IoT systems that are equipped with visual sensors at the front end. Most of such visual sensors are fixed one whereas the drones are considered f...

    Chang Wen Chen in Discover Internet of Things (2021)

  7. Article

    Distributed filtering and control of complex networks and systems

    Guanrong Chen, Sergej Čelikovský, Lei Guo in Frontiers of Information Technology & Elec… (2021)

  8. Article

    Complex system and intelligent control: theories and applications

    Jie Chen, Ben M. Chen, Jian Sun in Frontiers of Information Technology & Elec… (2019)

  9. Article

    Post-exascale supercomputing: research opportunities abound

    Zuo-Ning Chen, Jack Dongarra, Zhi-Wei Xu in Frontiers of Information Technology & Elec… (2018)

  10. Article

    A surrogate-based optimization algorithm for network design problems

    Network design problems (NDPs) have long been regarded as one of the most challenging problems in the field of transportation planning due to the intrinsic non-convexity of their bi-level programming form. Fur...

    Meng Li, ** Lin in Frontiers of Information Technology & Electronic Engineering (2017)

  11. Article

    Principles and applications of high-speed single-pixel imaging technology

    Single-pixel imaging (SPI) technology has garnered great interest within the last decade because of its ability to record high-resolution images using a single-pixel detector. It has been applied to diverse fi...

    Qiang Guo, Yu-xi Wang, Hong-wei Chen in Frontiers of Information Technology & Elec… (2017)

  12. Article

    Computational methods in super-resolution microscopy

    The broad applicability of super-resolution microscopy has been widely demonstrated in various areas and disciplines. The optimization and improvement of algorithms used in super-resolution microscopy are of g...

    Zhi-** Zeng, Hao **e, Long Chen in Frontiers of Information Technology & Elec… (2017)

  13. Article

    Ergodic secrecy capacity of MRC/SC in single-input multiple-output wiretap systems with imperfect channel state information

    This paper investigates the secrecy performance of maximal ratio combining (MRC) and selection combining (SC) with imperfect channel state information (CSI) in the physical layer. In a single-input multipleout...

    Hui Zhao, You-yu Tan, Gao-feng Pan in Frontiers of Information Technology & Elec… (2017)

  14. Article

    Hybrid-augmented intelligence: collaboration and cognition

    The long-term goal of artificial intelligence (AI) is to make machines learn and think like human beings. Due to the high levels of uncertainty and vulnerability in human life and the open-ended nature of prob...

    Nan-ning Zheng, Zi-yi Liu, Peng-ju Ren in Frontiers of Information Technology & Elec… (2017)

  15. Article

    Towards human-like and transhuman perception in AI 2.0: a review

    Perception is the interaction interface between an intelligent system and the real world. Without sophisticated and flexible perceptual capabilities, it is impossible to create advanced artificial intelligence...

    Yong-hong Tian, **-lin Chen, Hong-kai **ong in Frontiers of Information Technology & Elec… (2017)

  16. Article

    Crowd intelligence in AI 2.0 era

    The Internet based cyber-physical world has profoundly changed the information environment for the development of artificial intelligence (AI), bringing a new wave of AI research and promoting it into the new ...

    Wei Li, Wen-jun Wu, Huai-min Wang in Frontiers of Information Technology & Elec… (2017)

  17. Article

    Challenges and opportunities: from big data to knowledge in AI 2.0

    In this paper, we review recent emerging theoretical and technological advances of artificial intelligence (AI) in the big data settings. We conclude that integrating data-driven machine learning with human kn...

    Yue-ting Zhuang, Fei Wu, Chun Chen in Frontiers of Information Technology & Elec… (2017)

  18. Article

    Erratum to: Optimization of the resonant frequency servo loop technique in the resonator micro optic gyro

    Yang Ren, Zhong-he **, Yan Chen, Hui-lian Ma in Journal of Zhejiang University SCIENCE C (2012)

  19. Chapter and Conference Paper

    End-to-End Asymmetric Link Capacity Estimation

    Knowledge of link capacity is important for network design, management, and utilization. With the increasing popularity of asymmetric link technologies (such as DSL, 1xRTT, and satellite links), it is desirabl...

    Ling-Jyh Chen, Tony Sun, Guang Yang in NETWORKING 2005. Networking Technologies, … (2005)

  20. Chapter and Conference Paper

    Restricted Dynamic Programming for Broadcast Scheduling

    Data broadcast has become a promising solution for information dissemination in the wireless environment due to the limited bandwidth of the channels and the power constraints of the portable devices. In this ...

    Shuoi Wang, Hsing-Lung Chen in Network Control and Engineering for QoS, S… (2005)

previous disabled Page of 2