ID |
Domain |
Technology |
Title |
Year |
View |
2 |
NETWORKING |
JAVA |
ENERGY EFFICIENT SCHEDULING OF SERVERS WITH MULTI-SLEEP MODES FOR CLOUD DATA CENTER |
2020 |
View |
3 |
NETWORKING |
JAVA |
ENERGY-AWARE SERVICE SELECTION AND ADAPTATION IN WIRELESS SENSOR NETWORKS WITH QOS GUARANTEE |
2020 |
View |
4 |
NETWORKING |
JAVA |
SECURE KEY AGREEMENT AND KEY PROTECTION FOR MOBILE DEVICE USER AUTHENTICATION |
2019 |
View |
5 |
NETWORKING |
JAVA |
TRANSACTIONAL BEHAVIOR VERIFICATION IN BUSINESS PROCESS AS A SERVICE CONFIGURATION |
2019 |
View |
6 |
NETWORKING |
JAVA |
AN ENERGY-EFFICIENT AND DELAY-AWARE WIRELESS COMPUTING SYSTEM FOR INDUSTRIAL WIRELESS SENSOR NETWORK |
2015 |
View |
7 |
NETWORKING |
JAVA |
A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS |
2014 |
View |
8 |
NETWORKING |
JAVA |
LIGHTWEIGHT PRIVACY-PRESERVING AND SECURE COMMUNICATION PROTOCOL FOR HYBRID AD HOC WIRELESS NETWORKS |
2014 |
View |
9 |
NETWORKING |
JAVA |
FAULT TOLERANCE MANAGEMENT IN CLOUD COMPUTING:A SYSTEM-LEVEL PERSPECTIVE |
2013 |
View |
10 |
NETWORKING |
JAVA |
RELAY SELECTION FOR GEOGRAPHICAL FORWARDING IN SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS |
2013 |
View |
11 |
NETWORKING |
JAVA |
A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING |
2012 |
View |
12 |
NETWORKING |
JAVA |
RCDA: RECOVERABLE CONCEALED DATA AGGREGATION FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS |
2012 |
View |
13 |
NETWORKING |
JAVA |
TOPOLOGY ENHANCEMENTS IN WIRELESS MULTIHOP NETWORKS: A TOP-DOWN APPROACH |
2012 |
View |
14 |
NETWORKING |
JAVA |
SLEEP SCHEDULING FOR CRITICAL EVENT MONITORING IN WIRELESS SENSOR NETWORKS |
2012 |
View |
133 |
NETWORKING |
DOTNET |
REMADD: RESOURCE-EFFICIENT MALICIOUS DOMAINS DETECTOR IN LARGE-SCALE NETWORKS |
2020 |
View |
134 |
NETWORKING |
DOTNET |
SOFTWARE-DEFINED NETWORKING-ENABLED HETEROGENEOUS WIRELESS NETWORKS AND APPLICATIONS CONVERGENCE |
2020 |
View |
135 |
NETWORKING |
DOTNET |
DISTRIBUTED LOCALIZATION IN WIRELESS SENSOR NETWORKS UNDER DENIAL-OF-SERVICE ATTACKS |
2020 |
View |
136 |
NETWORKING |
DOTNET |
INTELLIGENT PROCESSING OF INTRUSION DETECTION DATA |
2020 |
View |
137 |
NETWORKING |
DOTNET |
HIAUTH: HIDDEN AUTHENTICATION FOR PROTECTING SOFTWARE DEFINED NETWORKS |
2019 |
View |
138 |
NETWORKING |
DOTNET |
WORMHOLE: THE HIDDEN VIRUS PROPAGATION POWER OF A SEARCH ENGINE IN SOCIAL NETWORKS |
2019 |
View |
140 |
NETWORKING |
DOTNET |
EFFICIENT MULTI-FACTOR AUTHENTICATED KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS |
2019 |
View |
141 |
NETWORKING |
DOTNET |
NETWORK INFUSION TO INFER INFORMATION SOURCES IN NETWORKS |
2019 |
View |
142 |
NETWORKING |
DOTNET |
DETECTING AND MITIGATING TARGET LINK-FLOODING ATTACKS USING SDN |
2018 |
View |
143 |
NETWORKING |
DOTNET |
FLOW MANAGEMENT AND LOAD BALANCING IN DYNAMIC HETEROGENEOUS LANS |
2018 |
View |
144 |
NETWORKING |
DOTNET |
FUSO: FAST MULTI-PATH LOSS RECOVERY FOR DATA CENTER NETWORKS |
2018 |
View |
145 |
NETWORKING |
DOTNET |
MULTI-CDN: TOWARDS PRIVACY IN CONTENT DELIVERY NETWORKS |
2018 |
View |
146 |
NETWORKING |
DOTNET |
SWEET: SERVING THE WEB BY EXPLOITING EMAIL TUNNELS |
2017 |
View |
147 |
NETWORKING |
DOTNET |
EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS |
2017 |
View |
148 |
NETWORKING |
DOTNET |
CONTENT-AWARE CONCURRENT MULTIPATH TRANSFER FOR HIGH-DEFINITION VIDEO STREAMING OVER HETEROGENEOUS WIRELESS NETWORKS |
2016 |
View |
149 |
NETWORKING |
DOTNET |
SIMULTANEOUSLY GENERATING SECRET AND PRIVATE KEYS IN A COOPERATIVE PAIRWISE-INDEPENDENT NETWORK |
2016 |
View |
150 |
NETWORKING |
DOTNET |
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS |
2015 |
View |
151 |
NETWORKING |
DOTNET |
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS |
2015 |
View |
152 |
NETWORKING |
DOTNET |
DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS |
2014 |
View |
153 |
NETWORKING |
DOTNET |
PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM |
2014 |
View |
154 |
NETWORKING |
DOTNET |
DISTORTION-AWARE SCALABLE VIDEO STREAMING TO MULTINETWORK CLIENTS |
2013 |
View |
155 |
NETWORKING |
DOTNET |
A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS |
2013 |
View |
601 |
NETWORKING |
NS2 |
SECURING VEHICULAR ADHOC NETWORK AGAINST MALICIOUS VEHICLES USING ADVANCED CLUSTERING TECHNIQUE |
2020 |
View |
602 |
NETWORKING |
NS2 |
LINK RELIABILITY-BASED ADAPTIVE ROUTING FOR MULTILEVEL VEHICULAR NETWORKS |
2020 |
View |
603 |
NETWORKING |
NS2 |
VPPCS: VANET-BASED PRIVACY-PRESERVING COMMUNICATION SCHEME |
2020 |
View |
604 |
NETWORKING |
NS2 |
DISTRIBUTED LOCALIZATION IN WIRELESS SENSOR NETWORKS UNDER DENIAL-OF-SERVICE ATTACKS |
2020 |
View |
605 |
NETWORKING |
NS2 |
A MULTI-PATH ROUTING PROTOCOL BASED ON LINK LIFETIME AND ENERGY CONSUMPTION PREDICTION FOR MOBILE EDGE COMPUTING |
2020 |
View |
606 |
NETWORKING |
NS2 |
INTELLIGENT PROCESSING OF INTRUSION DETECTION DATA |
2020 |
View |
607 |
NETWORKING |
NS2 |
SECURE AND ENERGY-AWARE HEURISTIC ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK |
2020 |
View |
608 |
NETWORKING |
NS2 |
ENERGY EFFICIENT AGGREGATION TECHNIQUE-BASED REALISABLE SECURE AWARE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK |
2020 |
View |
609 |
NETWORKING |
NS2 |
COSTA: COMPOSITE TRUST-BASED ASSET-TASK ASSIGNMENT IN MOBILE AD HOC NETWORKS |
2019 |
View |
610 |
NETWORKING |
NS2 |
DISTRIBUTED ROUTING ALGORITHM WITH DYNAMIC CONNECTION PARTITION FOR MOBILE AD HOC NETWORKS |
2019 |
View |
611 |
NETWORKING |
NS2 |
ENERGY AWARE PATH SELECTION BASED EFFICIENT AODV FOR MANETS |
2019 |
View |
613 |
NETWORKING |
NS2 |
A LIGHTWEIGHT PRIVACY-PRESERVING PROTOCOL FOR VANETS BASED ON SECURE OUTSOURCING COMPUTING |
2019 |
View |
614 |
NETWORKING |
NS2 |
AN EFFICIENT AND RELIABLE QOF ROUTING FOR URBAN VANETS WITH BACKBONE NODES |
2019 |
View |
615 |
NETWORKING |
NS2 |
CB-MAC: A NOVEL CLUSTER-BASED MAC PROTOCOL FOR VANETS |
2019 |
View |
616 |
NETWORKING |
NS2 |
ACTIVETRUST: SECURE AND TRUSTABLE ROUTING IN WIRELESS SENSOR NETWORKS |
2016 |
View |
617 |
NETWORKING |
NS2 |
ROBUST COOPERATIVE SPECTRUM SENSING SCHEDULING OPTIMIZATION IN MULTI-CHANNEL DYNAMIC SPECTRUM ACCESS NETWORKS |
2016 |
View |
618 |
NETWORKING |
NS2 |
EFFICIENT AND ANONYMOUS MOBILE USER AUTHENTICATION PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR MULTI-SERVER ARCHITECTURES |
2016 |
View |
619 |
NETWORKING |
NS2 |
TOWARDS DISTRIBUTED OPTIMAL MOVEMENT STRATEGY FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS |
2016 |
View |
620 |
NETWORKING |
NS2 |
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUSWIRELESS SENSOR NETWORKS |
2015 |
View |
621 |
NETWORKING |
NS2 |
DATA COLLECTION IN MULTI-APPLICATION SHARING WIRELESS SENSOR NETWORKS |
2015 |
View |
622 |
NETWORKING |
NS2 |
SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS |
2015 |
View |
623 |
NETWORKING |
NS2 |
SENSOR SCHEDULING FOR MULTI-MODAL CONFIDENT INFORMATION COVERAGE IN SENSOR NETWORKS |
2015 |
View |
624 |
NETWORKING |
NS2 |
COOPERATIVE STEPWISE RELAYING AND COMBINING FOR MULTIHOP VEHICULAR WIRELESS COMMUNICATION |
2015 |
View |
625 |
NETWORKING |
NS2 |
A HIERARCHICAL ACCOUNT-AIDED REPUTATION MANAGEMENT SYSTEM FOR MANETS |
2015 |
View |
626 |
NETWORKING |
NS2 |
COOPERATIVE LOAD BALANCING AND DYNAMIC CHANNEL ALLOCATION FOR CLUSTER-BASEDMOBILE AD HOC NETWORKS |
2015 |
View |