共 50 条
- [41] Heuristics for a Distributed Parallel Machine Assembly Scheduling Problem with Eligibility Constraints 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND SYSTEMS MANAGEMENT (IESM), 2015, : 145 - 153
- [42] Checking integrity constraints - How it differs in centralized, distributed and parallel databases SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 563 - 568
- [45] Quantization for Distributed Binary Detection under Secrecy Constraints 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
- [46] A Distributed and Privacy-Preserving Method for Network Intrusion Detection ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II, 2010, 6427 : 861 - +
- [48] A Novel Privacy-preserving Distributed Anomaly Detection Method 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 463 - 468
- [50] Distributed Data Privacy Protection via Collaborative Anomaly Detection ELECTRONICS, 2025, 14 (02):