Browsing "Department of Computer Engineering" byTitle :

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 21 to 40 of 440

Issue DateTitleAuthor(s)
2015-08A safe-region approach to a moving k-RNN queries in a directed and Dynamic road networkKERBAGA, KAMIL ZEBERGA
2010-02A Secure and Efficient Low-power Bootstrapping and Commissioning Protocol for 6LoWPANChowdhury Md. Aminul Haque
2014-08A SECURE SESSION KEY EXCHANGE SCHEME FOR SMART GRID HOME AREA NETWORKSTizazu Gebere Akele
2016-08A Step-Wise Methodology using Semi-Supervised Topic Modelling to Recommend Contextual Relationships for an Ontology EngineerSAWYER JONATHAN PETER
2015-08A Stepwise Methodology Towards the Adaptization of Legacy Systems using Agent-oriented Software EngineeringWAVRESKY, FRANCOIS
2021-02A Study of Linux Memory Placement on Tiered Memory Systems최원교
2012-08A Two-Step Two-Bit Softened Detection in Cognitive Radio NetworksPaul, Rajib
2014-08A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNsQamar Arslan
2012-02AB-FTL: 지역성 인식 기법을 사용하는 대체 블록 플래시 변환 계층Kwon, Hyuk In
2016-08Active Shape Model을 적용하여 구한 얼굴의 특징 점을 이용한 가보 필터 기반의 정확한 얼굴 주름 검색조현준
2011-02Adaptive Request Distribution Algorithm for Virtual Machines in the Cloud ComputingNguyen, Hieu Trung
2016-02An Advanced File Recovery on XFSPark Yongmin
2016-08An ECC based Light-weight Authentication Mechanism and Capability based Access Control for Internet of ThingsEMERSON, SAHAYA SHAMINI BRINTO MOL
2013-02An Effective Threat Detection on ISA100.11a Network Utilizing Multi-Channel Passive SniffersZaidi, Syed Muhammad Asad
2014-08An Efficient Algorithm for Computing Safe Exit Points of Moving Nearest Neighbor Queries in Directed Road NetworksMengesha Tadesse Merkebu
2012-08An Efficient and Reliable Flash Translation Layer for Chip-Level-Parallel Flash MemoryKwon, Se Jin
2010-02Analysis of Fragmentation Security Threats and Secure Authentication Scheme in 6LoWPANHassen Redwan Hussen
2013-08Android Malware Detection and Classification through Permission Based Analysis using SVMDebelo, Bemnet Aberra
2014-02Anomaly Adjudication based Sinkhole Handling in Low Power Lossy NetworksCHEKKA KRISHNA SAI SREE
2020-02APPLICATION OF HEURISTIC LEARNING SPECTRUM SENSING IN COGNITIVE RADIO NETWORKRUKMAN RINALDY ARDYANSYAH
1 2 3 4 5 6 7 8 9 10 11 22

Browse