Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on quantum channel capacities
Quantum information processing exploits the quantum nature of information. It offers
fundamentally new solutions in the field of computer science and extends the possibilities to …
fundamentally new solutions in the field of computer science and extends the possibilities to …
Network coding theory: A survey
This article surveys all known fields of network coding theory and leads the reader through
the antecedents of the network coding theory to the most recent results, considering also …
the antecedents of the network coding theory to the most recent results, considering also …
[หนังสือ][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
[หนังสือ][B] Network information theory
A El Gamal, YH Kim - 2011 - books.google.com
This comprehensive treatment of network information theory and its applications provides
the first unified coverage of both classical and recent results. With an approach that …
the first unified coverage of both classical and recent results. With an approach that …
Determinants of behavioral intention to mobile banking
JC Gu, SC Lee, YH Suh - Expert Systems with Applications, 2009 - Elsevier
With the improvement of mobile technologies and devices, banking users are able to
conduct banking services at anyplace and at anytime. Recently, many banks in the world …
conduct banking services at anyplace and at anytime. Recently, many banks in the world …
[หนังสือ][B] Information theory and network coding
RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …
2002 when network coding was still at its infancy. The last few years have witnessed the …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Wireless network information flow: A deterministic approach
In a wireless network with a single source and a single destination and an arbitrary number
of relay nodes, what is the maximum rate of information flow achievable? We make progress …
of relay nodes, what is the maximum rate of information flow achievable? We make progress …
Resilient network coding in the presence of byzantine adversaries
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …
information inside the network, a single corrupted packet generated by a malicious node can …
Homomorphic signatures for polynomial functions
We construct the first homomorphic signature scheme that is capable of evaluating
multivariate polynomials on signed data. Given the public key and a signed data set, there is …
multivariate polynomials on signed data. Given the public key and a signed data set, there is …