
| index | Title |
| 1 | WAPN: a distributed wormhole attack detection approach for wireless sensor networks Author(s):Fan-rui KONG, Chun-wen LI, Qing-qi... Clicked:9731 Download:4831 Cited:5 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.279-289 DOI:10.1631/jzus.A0820178 |
| 2 | A fast motion estimation algorithm for mobile communications Author(s):Chen Guo-Bin Clicked:5264 Download:2549 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.100 P.13-18 DOI:10.1631/jzus.2006.AS0013 |
| 3 | Modeling deterministic echo state network with loop reservoir Author(s):Xiao-chuan Sun, Hong-yan Cui, Ren-... Clicked:11355 Download:5793 Cited:2 <Full Text> Journal of Zhejiang University Science C 2012 Vol.13 No.9 P.689-701 DOI:10.1631/jzus.C1200069 |
| 4 | Enhancing security of NVM-based main memory with dynamic Feistel network mapping Author(s):Fang-ting Huang, Dan Feng, Wen Xia... Clicked:10160 Download:5036 Cited:0 <Full Text> <PPT> 2791 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.7 P.847-863 DOI:10.1631/FITEE.1601652 |
| 5 | Training large-scale language models with limited GPU memory: a survey Author(s):Yu TANG, Linbo QIAO, Lujia YIN, Pe... Clicked:3652 Download:5453 Cited:0 <Full Text> <PPT> 832 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.309-331 DOI:10.1631/FITEE.2300710 |