2015-08 | A safe-region approach to a moving k-RNN queries in a directed and Dynamic road network | KERBAGA, KAMIL ZEBERGA |
2010-02 | A Secure and Efficient Low-power Bootstrapping and Commissioning Protocol for 6LoWPAN | Chowdhury Md. Aminul Haque |
2014-08 | A SECURE SESSION KEY EXCHANGE SCHEME FOR SMART GRID HOME AREA NETWORKS | Tizazu Gebere Akele |
2016-08 | A Step-Wise Methodology using Semi-Supervised Topic Modelling to Recommend Contextual Relationships for an Ontology Engineer | SAWYER JONATHAN PETER |
2015-08 | A Stepwise Methodology Towards the Adaptization of Legacy Systems using Agent-oriented Software Engineering | WAVRESKY, FRANCOIS |
2021-02 | A Study of Linux Memory Placement on Tiered Memory Systems | 최원교 |
2012-08 | A Two-Step Two-Bit Softened Detection in Cognitive Radio Networks | Paul, Rajib |
2014-08 | A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs | Qamar Arslan |
2012-02 | AB-FTL: 지역성 인식 기법을 사용하는 대체 블록 플래시 변환 계층 | Kwon, Hyuk In |
2016-08 | Active Shape Model을 적용하여 구한 얼굴의 특징 점을 이용한 가보 필터 기반의 정확한 얼굴 주름 검색 | 조현준 |
2011-02 | Adaptive Request Distribution Algorithm for Virtual Machines in the Cloud Computing | Nguyen, Hieu Trung |
2016-02 | An Advanced File Recovery on XFS | Park Yongmin |
2016-08 | An ECC based Light-weight Authentication Mechanism and Capability based Access Control for Internet of Things | EMERSON, SAHAYA SHAMINI BRINTO MOL |
2013-02 | An Effective Threat Detection on ISA100.11a Network Utilizing Multi-Channel Passive Sniffers | Zaidi, Syed Muhammad Asad |
2014-08 | An Efficient Algorithm for Computing Safe Exit Points of Moving Nearest Neighbor Queries in Directed Road Networks | Mengesha Tadesse Merkebu |
2012-08 | An Efficient and Reliable Flash Translation Layer for Chip-Level-Parallel Flash Memory | Kwon, Se Jin |
2010-02 | Analysis of Fragmentation Security Threats and Secure Authentication Scheme in 6LoWPAN | Hassen Redwan Hussen |
2013-08 | Android Malware Detection and Classification through Permission Based Analysis using SVM | Debelo, Bemnet Aberra |
2014-02 | Anomaly Adjudication based Sinkhole Handling in Low Power Lossy Networks | CHEKKA KRISHNA SAI SREE |
2020-02 | APPLICATION OF HEURISTIC LEARNING SPECTRUM SENSING IN COGNITIVE RADIO NETWORK | RUKMAN RINALDY ARDYANSYAH |