Impedance control network resonant dc-dc converter for wide-range high-efficiency operation – M.TECH IN NS2 SIMULATION |
On efficient protection design for dynamic multipath provisioning in elastic optical networks– M.TECH IN NS2 SIMULATION |
Dynamic Shapley value for repeated network games with shock– M.TECH IN NS2 SIMULATION |
Optimized Distributed Inter-Cell Interference Coordination (ICIC) Scheme Using Projected Subgradient and Network Flow Optimization– M.TECH IN NS2 SIMULATION |
A Closed-Loop State Estimation Tool for MV Network Monitoring and Operation– M.TECH IN NS2 SIMULATION |
A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information– M.TECH IN NS2 SIMULATION |
Special session 12B: Panel: IOT – Reliable? Secure? Or death by a billion cuts?– M.TECH IN NS2 SIMULATION |
IoT-academia architecture: A profound approach– M.TECH IN NS2 SIMULATION |
Social network monitoring application for parents with children under thirteen– M.TECH IN NS2 SIMULATION |
Multivariate embedding based causaltiy detection with short time series– M.TECH IN NS2 SIMULATION |
Segmentation-Based Image Copy-Move Forgery Detection Scheme– M.TECH IN NS2 SIMULATION |
SPINN: Suspicion prediction in nuclear networks– M.TECH IN NS2 SIMULATION |
Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks– M.TECH IN NS2 SIMULATION |
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels– M.TECH IN NS2 SIMULATION |
On the impossibility of efficient self-stabilization in virtual overlays with churn– M.TECH IN NS2 SIMULATION |
The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink– M.TECH IN NS2 SIMULATION |
Multi-level VM replication based survivability for mission-critical cloud computing– M.TECH IN NS2 SIMULATION |
Federated identity in real-life applications– M.TECH IN NS2 SIMULATION |
Bank note authentication using decision tree rules and machine learning techniques– M.TECH IN NS2 SIMULATION |
System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments– M.TECH IN NS2 SIMULATION |
Quantum secured Gigabit Passive Optical Networks– M.TECH IN NS2 SIMULATION |
A New Quaternion-Based Encryption Method for Dicom Images– M.TECH IN NS2 SIMULATION |
The Electronic Voting in the Presence of Rational Voters– M.TECH IN NS2 SIMULATION |
An Access Control Model for Online Social Networks Using User-to-User Relationships– M.TECH IN NS2 SIMULATION |
Combating Friend Spam Using Social Rejections– M.TECH IN NS2 SIMULATION |
2015 IEEE M.TECH IN NS2 SIMULATION |