Posts

old
Development and Usability Study of Multimedia Courseware for Slow Learners: ‘Komputer Saya’

Development and Usability Study of Multimedia Coursewar...

Development and Usability Study of Multimedia Courseware for Slow Learners: ‘Kom...

old
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Detection and Localization of Multiple Spoofing Attacke...

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

old
One Size Does Not Fit All: Towards User- and  Query-Dependent Ranking For Web Databases

One Size Does Not Fit All: Towards User- and Query-Dep...

One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Da...

old
Leveraging Smartphone Cameras for Collaborative Road Advisories

Leveraging Smartphone Cameras for Collaborative Road Ad...

Leveraging Smartphone Cameras for Collaborative Road Advisories

old
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

Compressed-Sensing-Enabled Video Streaming for Wireless...

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

old
Uncoordinated Cooperative Communications in Highly Dynamic Wireless Networks

Uncoordinated Cooperative Communications in Highly Dyna...

Uncoordinated Cooperative Communications in Highly Dynamic Wireless Networks

old
Load-Balancing Multipath Switching System with Flow Slice

Load-Balancing Multipath Switching System with Flow Slice

Load-Balancing Multipath Switching System with Flow Slice

old
Continuous Detour Queries in Spatial Networks

Continuous Detour Queries in Spatial Networks

Continuous Detour Queries in Spatial Networks

old
Automatic Reconfiguration for Large-Scale Reliable Storage Systems

Automatic Reconfiguration for Large-Scale Reliable Stor...

Automatic Reconfiguration for Large-Scale Reliable Storage Systems

old
Exploring Context and Content Links in Social Media: A Latent Space Method

Exploring Context and Content Links in Social Media: A ...

Exploring Context and Content Links in Social Media: A Latent Space Method

old
AUTOMATIC DETECTION OF UNSAFE DYNAMIC COMPONENT LOADINGS

AUTOMATIC DETECTION OF UNSAFE DYNAMIC COMPONENT LOADINGS

AUTOMATIC DETECTION OF UNSAFE DYNAMIC COMPONENT LOADINGS

old
Controlled Mobility Sensor Networks for Target Tracking Using Ant Colony Optimization

Controlled Mobility Sensor Networks for Target Tracking...

Controlled Mobility Sensor Networks for Target Tracking Using Ant Colony Optimiz...

old
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING A...

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIV...

old
Scalable Coding of Encrypted Images

Scalable Coding of Encrypted Images

Scalable Coding of Encrypted Images

old
Risk-Aware Mitigation for MANET Routing Attacks

Risk-Aware Mitigation for MANET Routing Attacks

Risk-Aware Mitigation for MANET Routing Attacks

old
AN EFFICIENT ADAPTIVE DEADLOCK-FREE ROUTING ALGORITHM FOR TORUS NETWORKS

AN EFFICIENT ADAPTIVE DEADLOCK-FREE ROUTING ALGORITHM F...

AN EFFICIENT ADAPTIVE DEADLOCK-FREE ROUTING ALGORITHM FOR TORUS NETWORKS