Search
Now showing items 1-10 of 40
FES applications: Successful! Or not? What we learned might show the way to go
Publisher: IEEE
Year: 2014
Mismatched side information in wireless network compression via overhearing helpers
Publisher: IEEE
Year: 2014
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine
Year: 2018
Abstract:
DNS tunneling is amethod used bymalicious userswho intend to bypass the firewall to send or receive commands and data.This has a significant impact on revealing or releasing classified information. Several researchers have ...
Conflict identification in conceptual design: Algorithm and case study
Publisher: IEEE
Year: 2014
Performance analysis of random neural networks in LTE-UL of a cognitive radio system
Publisher: IEEE
Year: 2014
Simple turbo MIMO scheme using arithmetic extended mapping and repetition codes
Publisher: IEEE
Year: 2014
Collision detection algorithm based on AABB for Minimally Invasive Surgery
Publisher: IEEE
Year: 2014
Improved form navigation on mobile devices
Publisher: IEEE
Year: 2014
Author's index
Publisher: IEEE
Year: 2014
Security of audio secret sharing scheme encrypting audio secrets with bounded shares
Publisher: IEEE
Year: 2014