
| index | Title |
| 1 | WAPN: a distributed wormhole attack detection approach for wireless sensor networks Author(s):Fan-rui KONG, Chun-wen LI, Qing-qi... Clicked:9714 Download:4824 Cited:5 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.279-289 DOI:10.1631/jzus.A0820178 |
| 2 | A fast motion estimation algorithm for mobile communications Author(s):Chen Guo-Bin Clicked:5252 Download:2545 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.100 P.13-18 DOI:10.1631/jzus.2006.AS0013 |
| 3 | Modeling deterministic echo state network with loop reservoir Author(s):Xiao-chuan Sun, Hong-yan Cui, Ren-... Clicked:11330 Download:5788 Cited:2 <Full Text> Journal of Zhejiang University Science C 2012 Vol.13 No.9 P.689-701 DOI:10.1631/jzus.C1200069 |
| 4 | Enhancing security of NVM-based main memory with dynamic Feistel network mapping Author(s):Fang-ting Huang, Dan Feng, Wen Xia... Clicked:10138 Download:4987 Cited:0 <Full Text> <PPT> 2772 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.7 P.847-863 DOI:10.1631/FITEE.1601652 |
| 5 | Training large-scale language models with limited GPU memory: a survey Author(s):Yu TANG, Linbo QIAO, Lujia YIN, Pe... Clicked:3608 Download:5327 Cited:0 <Full Text> <PPT> 819 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.309-331 DOI:10.1631/FITEE.2300710 |