Search
Now showing items 1-10 of 14
Additional reviewers
Publisher: IEEE
Year: 2014
CETAD: Detecting evil twin access point attacks in wireless hotspots
Publisher: IEEE
Year: 2014
Representation methods for recognizing and grasping object of robots
Publisher: IEEE
Year: 2014
A capacity self-adaption information hiding algorithm based on RS code
Publisher: IEEE
Year: 2014
A GA-ACO hybrid algorithm for the multi-UAV mission planning problem
Publisher: IEEE
Year: 2014
Outcome based approach for teaching analog electronic circuits for undergraduate students
Publisher: IEEE
Year: 2014
Arduino as a learning tool
Publisher: IEEE
Year: 2014
Secure the control system against DoS attacks: A JDL data fusion method
Publisher: IEEE
Year: 2014
Experiences with remote labs in electrical drive
Publisher: IEEE
Year: 2014
Design of an efficient uplink time alignment module for Long Term Evolution
Publisher: IEEE
Year: 2014