|
A DISTRIBUTED TOPOLOGY CONFIGURATION METHOD FOR WIRELESS SENSOR NETWORKS
Hoseung Lee , Jangkyu Yun , Byeongjik Lee , Jinsuk Pak , Kijun Han
|
|
DESIGN OF A SELF-CONFIGURING TRANSPARENT SERVICE ENABLING SECURE LAYER 3 MERGING OF PRIVATE NETWORKS
Bas Boone , Jelle Nelis , Raf Hens , Jan Hollez , Filip De Turck , Frank Gielen
|
|
AN APPROACH TO MODELLING INFORMAL COMMUNICATION IN BUSINESS NETWORKS
Firmino Oliveira Silva , João José Pinto Ferreira
|
|
THE IDENTIFICATION OF DIFFERENTIALLY EXPRESSED PROTEINS IN 2-DE GEL IMAGES
Jung Eun Shim , Dan Bi Kim , Won Suk Lee
|
|
CLASSIFICATION OF CANCER MICROARRAY DATA USING NEURAL NETWORK
Myungsook Klassen
|
|
A SECURE ADAPTIVE SERVICE ACCESS IN INTENTIONAL NAMING SYSTEM
Wassef Louati , Khaled Masmoudi , Hossam Afifi , Djamal Zeghlache
|
|
AGENT-TO-AGENT REPUTATION-BASED TRUST MANAGEMENT
M.t Nkosi , M.o Adigun , J.o Emuoyibofarhe
|
|
SECURE DISTRIBUTED KEY MANAGEMENT FOR WIRELESS MOBILE AD HOC NETWORKS (WMANETS)
Iman Almomani , Hussein Zedan
|
|
A MULTI-FACTOR SECURITY PROTOCOL FOR WIRELESS PAYMENT- SECURE WEB AUTHENTICATION USING MOBILE DEVICES
Ayu Tiwari , Sudip Sanyal , Ajith Abraham , Svein Johan Knapskog , Sugata Sanyal
|
|
SPECIFICATION-DRIVEN TESTING OF SMART CARD INTERFACE USING A FORMAL MODEL
Ramaswamy Chandramouli , Mark R. Blackburn
|
|
MULTI-SENSOR CONDITION MONITORING USING SPIKING NEURON NETWORKS
Rui G. Silva , Steven Wilcox , António A.m.m. Araújo
|
|
EXTRACTING RULES FROM TRAINED SELF-ORGANIZING MAPS
Christos Pateritsas , Stylianos Modes , Andreas Stafylopatis
|
|
A NOVEL BUFFER CACHE MANAGEMENT SCHEME CONSIDERING THE PLAYBACK PATTERN OF MULTIMEDIA STREAMING SERVICES
Ohhoon Kwon , Kern Koh
|
|
A PLATFORM FOR REGION SPACE ANALYSIS IN BINARY PARTITION TREES
Huihai Lu , John C. Woods , Mohammed Ghanbari
|
|
POWERFUL HARDWARE BOUND CHECKING IN EMBEDDED SYSTEMS VIA A SECURE PROCESSOR ARCHITECTURE AND SECURE BOUND STORAGE
Michael Georg Grasser , Johannes Priebsch , Georg Hofer , Eugen Brenner
|
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
|