Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Public key encryption with keyword search
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …
[SÁCH][B] Industrial communication technology handbook
R Zurawski - 2014 - books.google.com
Featuring contributions from major technology vendors, industry consortia, and government
and private research establishments, the Industrial Communication Technology Handbook …
and private research establishments, the Industrial Communication Technology Handbook …
People, places, things: Web presence for the real world
T Kindberg, J Barton, J Morgan, G Becker… - Mobile Networks and …, 2002 - Springer
The convergence of Web technology, wireless networks, and portable client devices
provides new design opportunities for computer/communications systems. In the HP …
provides new design opportunities for computer/communications systems. In the HP …
Cloud-based device information storage
N Ganapathy, EE Greeff - US Patent 8,943,551, 2015 - Google Patents
Device information for each of multiple devices associated with a user account is maintained
by a cloud service. The device information can include credential information allow ing the …
by a cloud service. The device information can include credential information allow ing the …
Maintaining real-time conversations over unreliable connections
R Ramanathan, P Samdadiya - US Patent 7,650,384, 2010 - Google Patents
BACKGROUND Users of computing devices (eg, laptops, cellular phones, and personal
digital assistants) often need to communicate in real time. A common form of real-time …
digital assistants) often need to communicate in real time. A common form of real-time …
Public key encryption with searchable keywords based on Jacobi symbols
Public-key encryption schemes with searchable keywords are useful to delegate searching
capabilities on encrypted data to a third party, who does not hold the entire secret key, but …
capabilities on encrypted data to a third party, who does not hold the entire secret key, but …
Autonomous gossi**: A self-organizing epidemic algorithm for selective information dissemination in wireless mobile ad-hoc networks
We introduce autonomous gossi** (A/G), a new genre epidemic algorithm for selective
dissemination of information in contrast to previous usage of epidemic algorithms which …
dissemination of information in contrast to previous usage of epidemic algorithms which …
The design and applications of a context service
Context awareness enables applications to adapt themselves to their computing
environment in order to better suit the needs of the user and the tasks. This paper describes …
environment in order to better suit the needs of the user and the tasks. This paper describes …
Call management for location-aware mobile devices
V Vendrow, V Shmunis - US Patent 8,600,391, 2013 - Google Patents
(57) ABSTRACT A positioning system (eg, GPS) integrated in, or coupled to, a mobile device
determines the position of the mobile device. An availability status manager (ASM) in a …
determines the position of the mobile device. An availability status manager (ASM) in a …
Host mobility using an internet indirection infrastructure
Abstract We propose the Robust Overlay Architecture for Mobility (ROAM) to provide
seamless mobility for Internet hosts. ROAM is built on top of the Internet Indirection …
seamless mobility for Internet hosts. ROAM is built on top of the Internet Indirection …