共 50 条
[22]
Cyber-Attack Detection in Socio-Technical Transportation Systems Exploiting Redundancies Between Physical and Social Data
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2024, 54 (03)
:1477-1488
[23]
Two-Channel Passive Detection Exploiting Cyclostationarity
[J].
2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO),
2019,
[25]
Exploiting k-constraints to reduce memory overhead in continuous queries over data streams
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
2004, 29 (03)
:545-580
[26]
Exploiting Data Source Distribution to Enhance NVM Reliability
[J].
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON MEMORY SYSTEMS, MEMSYS 2022,
2022,
[27]
Exploiting Context and Quality for Linked Data Source Selection
[J].
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING,
2019,
:2251-2258
[29]
Web-based Arabic/English Duplicate Record Detection with Nested Blocking Technique
[J].
2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES),
2013,
:313-318
[30]
CONFLICT DETECTION TRADEOFFS FOR REPLICATED DATA
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1991, 16 (04)
:703-746