You are here

Search results

Searching as anonymous (not verified)

33 items found in collection [showing 1 - 33]
  • CSV Spreadsheet
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Deconstruction and Analysis of Email Messages
Deconstruction and Analysis of Email Messages
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Parallel Similarity Join
Parallel Similarity Join
Sender-Centric Approach to Spam and Phishing Control
Sender-Centric Approach to Spam and Phishing Control
Facets
Facets
Improve the Interconnection Network Architecture for Future Supercomputers
Improve the Interconnection Network Architecture for Future Supercomputers
Tools in Support of Electronic Crime Investigations
Tools in Support of Electronic Crime Investigations
Effective Routing on Fat-Tree Topologies
Effective Routing on Fat-Tree Topologies
Geriatric Suite of Medical Applications for Android Powered Devices
Geriatric Suite of Medical Applications for Android Powered Devices
User-Level I/O Accelerations for High-Performance Deep Learning Applications
User-Level I/O Accelerations for High-Performance Deep Learning Applications
Trust Management in Mobile Wireless Networks
Trust Management in Mobile Wireless Networks
Towards Smart Wireless Sensing
Towards Smart Wireless Sensing
Building an Intelligent Assistant for Digital Forensics
Building an Intelligent Assistant for Digital Forensics
End-to-End Approachesfor Ethernet Switch Level Topology Discovery
End-to-End Approachesfor Ethernet Switch Level Topology Discovery
Interface for Collaborative Digital Forensics
Interface for Collaborative Digital Forensics
Trust Management and Accountability for Internet Security
Trust Management and Accountability for Internet Security
Automation of Email Analysis Using a Database
Automation of Email Analysis Using a Database
Anemone
Anemone
Tags
Tags
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Addressing the Issues in the Winding Number Algorithm Related to the Floating Point Representation
Addressing the Issues in the Winding Number Algorithm Related to the Floating Point Representation
Urban Mobility Models for Vehicular Ad Hoc Networks
Urban Mobility Models for Vehicular Ad Hoc Networks
Secure Communication over Container
Secure Communication over Container
Efficient XML Stream Processing and Searching
Efficient XML Stream Processing and Searching
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Using a Specialized Grammar to Generate Probable Passwords
Using a Specialized Grammar to Generate Probable Passwords
On Lid Allocation and Assignment in Infiniband Networks
On Lid Allocation and Assignment in Infiniband Networks
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Towards Quantum-Secure Blockchain
Towards Quantum-Secure Blockchain