Release Time:2022-10-09 Hits:
Date of Publication: 2022-10-05
Journal: International Conference on Networks Security, Wireless Communications and Trusted Computing
Institution: 电子信息与电气工程学部
Volume: 1
Page Number: 732-734
Prev One:A nonparametric multivariate method for performance analysis of virtual machines in cloud computing systems
Next One:Blind recognition of binary BCH codes based on Euclidean algorithm