共 50 条
- [21] Classification analysis of SAGE data using maximum entropy model [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 1037 - 1040
- [22] Mobile Cloud Computing Security Using Cryptographic Hash Function Algorithm [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 403 - 407
- [23] Intrusion detection method based on support vector machine and information gain for mobile cloud computing [J]. Zhang, Qiu-Yu (zhangqylz@163.com), 1600, Femto Technique Co., Ltd. (22): : 231 - 241
- [26] Security monitoring method for ICS based on information gain ratio and maximum entropy model [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 2272 - 2277
- [27] Solving TSP Problem in Cloud Computing using Improved Cultural Algorithm [J]. 2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,
- [28] Scheduling Using Improved Genetic Algorithm in Cloud Computing for Independent Tasks [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 137 - 142
- [29] Computing Offloading Strategy Using Improved Genetic Algorithm in Mobile Edge Computing System [J]. Journal of Grid Computing, 2021, 19