Search
Now showing items 1-10 of 20
Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)]
Publisher: IET
Year: 2014
A deep learning approach to document image quality assessment
Publisher: IEEE
Year: 2014
Impact of Packet Size and Node Mobility Pause Time on Average End to End Delay and Jitter in MANET's
Publisher: IEEE
Year: 2014
Pose graph for improved monocular visual odometry
Publisher: IEEE
Year: 2014
Real-time traffic monitoring using wireless beacons with the Cell Transmission Model
Publisher: IEEE
Year: 2014
Microstrip broadband filters based on the multimode resonator
Publisher: IEEE
Year: 2014
One parallel UAN architecture for monitoring free span of deep-water subsea pipelines
Publisher: IEEE
Year: 2014
A tale of two clouds: Computing on data encrypted under multiple keys
Publisher: IEEE
Year: 2014
Towards verifiable file search on the cloud
Publisher: IEEE
Year: 2014
Dextran-based hydrogels for in-situ delivery of gallium-containing bioactive glasses
Publisher: IEEE
Year: 2014