Browsing "Department of Computer Engineering" byPublisher : The Graduate School, Ajou University

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 1 to 60 of 436

Issue DateTitleAuthor(s)
2014-083D 점 데이터 그리딩을 위한 고성능 병렬처리 기법이창섭
2016-083P tool: Parallel Point-Cloud Processing Tool with Customized Data Distribution Scheme using Local Binning AlgorithmSAHLE, EYASSU BERHANU
2011-08802.11 무선랜 재밍 환경에서의 측정 기반 채널 도약 기법정승명
2012-02A Bit-wise Partial Encryption Scheme for Flash Memory Based Storage SystemsMamo, Surafel Teshome
2019-02A Collaborative Requirements Elicitation Model For Crowdsourcing PlatformsMUKUNDWA CHANTAL
2021-08A Comprehensive IIoT Security Framework김성진
2020-02A Dynamic Setting for Flash Translation Layer채석주
2016-08A Framework Integrating Problem Frames and Goal Modeling to Support Variability Analysis during Requirements ElicitationMEETUSHI
2014-08A Game Theoretic IDPS for RPL-Networked Low Power Lossy Network with Energy LimitationTing Miao
2015-08A Graph Model Based Approach for Document Novelty DetectionARUL RAYAN NAVINO NIRMAL
2010-02A Hierarchical Cluster Based Fault Tolerant Data Aggregation for Wireless Sensor NetworksBogale, Yihun Alemu
2015-02A High Performance and Secure Flash Storage System for Next Generation DBMSsJIN RIZE
2020-08A Low-Latency Routing Protocol for WAVE/IEEE 802.11p based Wireless Mesh Networks김준형
2010-02A New Opportunistic Forwarding Scheme for Effective Data Transmission in DTN-enabled Vehicular Ad Hoc NetworkYu, Danlei
2013-08A Novel Approach for Digital Archive based on Digital ForensicsSekie, Amanuel Majore
2020-02A Profiling Detection Framework for Unknown Attack손동식
2015-08A Recovery Technique for Flash Memory Using Shadow PagingABDULGHAFUR, ALAHMADI ABDULHADI
2010-02A Resource and Energy Aware Image Compression Scheme for Wireless Multimedia Sensor Networks(WMSNs)Muhammad.lkram
2010-08A ROBUST DEFENCE AGAINST CONTENT-SNIFFING XSS ATTACKSTadesse, Misganaw
2016-02A Safe exit based approach for Reverse Nearest Neighbors in Directed Road NetworksQamar Rizwan
2015-08A safe-region approach to a moving k-RNN queries in a directed and Dynamic road networkKERBAGA, KAMIL ZEBERGA
2010-02A Secure and Efficient Low-power Bootstrapping and Commissioning Protocol for 6LoWPANChowdhury Md. Aminul Haque
2014-08A SECURE SESSION KEY EXCHANGE SCHEME FOR SMART GRID HOME AREA NETWORKSTizazu Gebere Akele
2016-08A Step-Wise Methodology using Semi-Supervised Topic Modelling to Recommend Contextual Relationships for an Ontology EngineerSAWYER JONATHAN PETER
2015-08A Stepwise Methodology Towards the Adaptization of Legacy Systems using Agent-oriented Software EngineeringWAVRESKY, FRANCOIS
2021-02A Study of Linux Memory Placement on Tiered Memory Systems최원교
2012-08A Two-Step Two-Bit Softened Detection in Cognitive Radio NetworksPaul, Rajib
2014-08A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNsQamar Arslan
2012-02AB-FTL: 지역성 인식 기법을 사용하는 대체 블록 플래시 변환 계층Kwon, Hyuk In
2016-08Active Shape Model을 적용하여 구한 얼굴의 특징 점을 이용한 가보 필터 기반의 정확한 얼굴 주름 검색조현준
2011-02Adaptive Request Distribution Algorithm for Virtual Machines in the Cloud ComputingNguyen, Hieu Trung
2016-02An Advanced File Recovery on XFSPark Yongmin
2016-08An ECC based Light-weight Authentication Mechanism and Capability based Access Control for Internet of ThingsEMERSON, SAHAYA SHAMINI BRINTO MOL
2013-02An Effective Threat Detection on ISA100.11a Network Utilizing Multi-Channel Passive SniffersZaidi, Syed Muhammad Asad
2014-08An Efficient Algorithm for Computing Safe Exit Points of Moving Nearest Neighbor Queries in Directed Road NetworksMengesha Tadesse Merkebu
2012-08An Efficient and Reliable Flash Translation Layer for Chip-Level-Parallel Flash MemoryKwon, Se Jin
2010-02Analysis of Fragmentation Security Threats and Secure Authentication Scheme in 6LoWPANHassen Redwan Hussen
2013-08Android Malware Detection and Classification through Permission Based Analysis using SVMDebelo, Bemnet Aberra
2014-02Anomaly Adjudication based Sinkhole Handling in Low Power Lossy NetworksCHEKKA KRISHNA SAI SREE
2020-02APPLICATION OF HEURISTIC LEARNING SPECTRUM SENSING IN COGNITIVE RADIO NETWORKRUKMAN RINALDY ARDYANSYAH
2014-02Application-aware Congestion Avoidance and Control in Content Centric NetworkingAdem Osman Mohammeds
2020-08Applying Transfer Learning on Wireless Interference Identification to Improve Classification AccuracyTHIDA SHWE
2009-08Automatic Generation of Test Cases based on Requirement ModelsOh, Jungsup
2016-08AUTONOMOUS TEXT SUMMARIZATION USING COLLECTIVE INTELLIGENCE BASED ON NATURE-INSPIRED ALGORITHMKALEAB GETANEH TEFRIE
2015-02AUTOSAR 마이그레이션(Migration)을 위한 레거시 ECU 소프트웨어 분석 방법Li Jin Cheng
2020-02Black money usage tracker built on Hyperledger FabricABDUKODIROV FARKHOD
2017-02BLE 기기 방향성과 사용자 위치이력 기반의 실내측위 성능개선 방법이병욱
2020-02Blockchain-Based, Distributed Trust Establishment in Mobile Ad-Hoc NetworkMAY THURA LWIN
2022-02Blockchain-enabled access control with fog nodes for independent IoTsKHAYDARALIEV MUKHAMMADDIYOR
2013-02Broadcast Algorithm utilizing Co-operative communication for minimizing Energy consumption in Two Tiered Wireless Sensor NetworkMehmood, Usman
2012-08Cache-based MIH for Enhancing Handoff Performance in Heterogeneous NetworksIsmail, Atif
2022-02Chain code-based Image Compression and Transfer Schemes for Electronic Shelf Label Systems김영준
2020-08Chaincode-based Access Control System for Multi-Administrative domainsABDURAHMANOV SHERZODBEK MUKUMOVICH
2010-02Cluster-Based TDMA Broadcast MAC Protocol for Mobile Ad-HocPandey Ananta
2019-02CNN-based Intrusion Detection System Using Packet Payload for Industrial Control Systems송주엽
2018-02CoAP 기반 NB-IoT 환경을 위한 향상된 보안 아키텍처 연구우시재
2010-08Coding Artifact Reduction Using Bilateral FilteringZerubabel, Legesse
2014-08Composition of Foreground and Background Images using Optical FlowDawit Gebreyohannes
2016-02Content-Centric Smart Home Networking for Centralized Device ManagementVARTIKA SRIVASTAVA
2014-08Continuous Control Message Exchange in Distributed Cognitive Radio NetworksArega Zerabruk Gebrehiwet
1 2 3 4 5 6 7 8

Browse