M.TECH IN NS2 SIMULATION


M.TECH IN NS2 SIMULATION
Impedance control network resonant dc-dc converter for wide-range high-efficiency operation – M.TECH IN NS2 SIMULATION
On efficient protection design for dynamic multipath provisioning in elastic optical networks– M.TECH IN NS2 SIMULATION
Dynamic Shapley value for repeated network games with shock– M.TECH IN NS2 SIMULATION
Optimized Distributed Inter-Cell Interference Coordination (ICIC) Scheme Using Projected Subgradient and Network Flow Optimization– M.TECH IN NS2 SIMULATION
A Closed-Loop State Estimation Tool for MV Network Monitoring and Operation– M.TECH IN NS2 SIMULATION
A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information– M.TECH IN NS2 SIMULATION
Special session 12B: Panel: IOT – Reliable? Secure? Or death by a billion cuts?– M.TECH IN NS2 SIMULATION
IoT-academia architecture: A profound approach– M.TECH IN NS2 SIMULATION
Social network monitoring application for parents with children under thirteen– M.TECH IN NS2 SIMULATION
Multivariate embedding based causaltiy detection with short time series– M.TECH IN NS2 SIMULATION
Segmentation-Based Image Copy-Move Forgery Detection Scheme– M.TECH IN NS2 SIMULATION
SPINN: Suspicion prediction in nuclear networks– M.TECH IN NS2 SIMULATION
Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks– M.TECH IN NS2 SIMULATION
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels– M.TECH IN NS2 SIMULATION
On the impossibility of efficient self-stabilization in virtual overlays with churn– M.TECH IN NS2 SIMULATION
The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink– M.TECH IN NS2 SIMULATION
Multi-level VM replication based survivability for mission-critical cloud computing– M.TECH IN NS2 SIMULATION
Federated identity in real-life applications– M.TECH IN NS2 SIMULATION
Bank note authentication using decision tree rules and machine learning techniques– M.TECH IN NS2 SIMULATION
System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments– M.TECH IN NS2 SIMULATION
Quantum secured Gigabit Passive Optical Networks– M.TECH IN NS2 SIMULATION
A New Quaternion-Based Encryption Method for Dicom Images– M.TECH IN NS2 SIMULATION
The Electronic Voting in the Presence of Rational Voters– M.TECH IN NS2 SIMULATION
An Access Control Model for Online Social Networks Using User-to-User Relationships– M.TECH IN NS2 SIMULATION
Combating Friend Spam Using Social Rejections– M.TECH IN NS2 SIMULATION
2015 IEEE M.TECH IN NS2 SIMULATION