You are here

Search results

Searching as anonymous (not verified)

17 items found in collection [showing 1 - 17]
  • CSV Spreadsheet
Sparse Representations for Recognition
Sparse Representations for Recognition
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Path Planning Algorithms for Autonomous Vehicles
Path Planning Algorithms for Autonomous Vehicles
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
PPDA
PPDA
Using Gaussian Process to Predict Five Personality Traits and Facets Using Data Collected from Smartphones
Using Gaussian Process to Predict Five Personality Traits and Facets Using Data Collected from Smartphones
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Reliability and Security in Mobile Ad Hoc Networks
Reliability and Security in Mobile Ad Hoc Networks
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Case-Based Framework for Meta Intrusion Detection
Case-Based Framework for Meta Intrusion Detection
Scrambled Quasirandom Sequences and Their Applications
Scrambled Quasirandom Sequences and Their Applications
Geographic Ad Hoc Routing with Anonymous Properties
Geographic Ad Hoc Routing with Anonymous Properties
Modernized Version of Visual Cryptography
Modernized Version of Visual Cryptography
Information Hiding
Information Hiding
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Mobile Agent Protection with Data Encapsulation and Execution Tracing