Performance and Cost Analysis of Sia, a Blockchain-Based Storage Platform | 0 | 0.34 | 2021 |
CoviReader: Using IOTA and QR Code Technology to Control Epidemic Diseases across the US | 0 | 0.34 | 2021 |
A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over Blockchain | 0 | 0.34 | 2020 |
Secure IoT Data Management in a Private Ethereum Blockchain | 1 | 0.43 | 2020 |
UAS-based object tracking via Deep Learning | 0 | 0.34 | 2019 |
Survey of Data Locality in Apache Hadoop | 0 | 0.34 | 2019 |
Aging-Aware Design Verification Methods Under Real Product Operating Conditions | 0 | 0.34 | 2019 |
Hadoop Performance Analysis Model With Deep Data Locality | 0 | 0.34 | 2019 |
AutoEncoded Domains with Mean Activation for DGA Botnet Detection | 0 | 0.34 | 2019 |
Implementation of a Blockchain-Based Event Reselling System | 0 | 0.34 | 2019 |
Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication Systems | 0 | 0.34 | 2019 |
Investigation of BTI characteristics and its behavior on 10 nm SRAM with high-k/metal gate FinFET technology having multi-VT gate stack. | 0 | 0.34 | 2018 |
Dynamically Adjusting The Mining Capacity In Cryptocurrency With Binary Blockchain | 0 | 0.34 | 2018 |
A survey on IoT communication and computation frameworks: An industrial perspective | 13 | 0.82 | 2017 |
Text mining for security threat detection discovering hidden information in unstructured log messages | 0 | 0.34 | 2016 |
Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data. | 2 | 0.38 | 2016 |
Performance Improvement of MapReduce Process by Promoting Deep Data Locality | 1 | 0.38 | 2016 |
Vertebrae Detection Algorithm in CT Scout Images. | 0 | 0.34 | 2016 |
Vulnerability Analysis of Iframe Attacks on Websites. | 1 | 0.37 | 2016 |
Utilizing NFC to secure identification | 0 | 0.34 | 2015 |
Method for secure RESTful web service | 3 | 0.41 | 2015 |
Restful Web Service And Web-Based Data Visualization For Environmental Monitoring | 2 | 0.41 | 2015 |
A Framework for Environmental Monitoring with Arduino-Based Sensors Using Restful Web Service | 5 | 0.50 | 2014 |
Mindmetrics: Identifying users without their login IDs | 1 | 0.37 | 2014 |
Performance testing of web-based data visualization | 4 | 0.48 | 2014 |
New power saving algorithm considering associated STAs and consecutive traffics in WLAN AP | 0 | 0.34 | 2013 |
The energy saving strategy using the network coding in the wireless mesh network | 1 | 0.35 | 2012 |
Preface to KOCSEA Special Issue. | 0 | 0.34 | 2012 |
A Secure Credit Card Transaction Method Based on Kerberos. | 0 | 0.34 | 2011 |
Anomaly detection in multiple scale for insider threat analysis | 0 | 0.34 | 2011 |
SignatureCheck: a protocol to detect man-in-the-middle attack in SSL | 4 | 0.51 | 2011 |
Coverage and connectivity problems under border effects in wireless sensor networks | 0 | 0.34 | 2010 |
EECCR: An energy-efficient m-Coverage and n-Connectivity routing algorithm under border effects in heterogeneous sensor networks | 17 | 0.75 | 2009 |
HTSMA: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme in Heterogeneous Wireless Mesh Networks | 1 | 0.35 | 2009 |
Energy Efficient Non-uniform Clustering Division Scheme in Wireless Sensor Networks | 6 | 0.51 | 2008 |
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks | 17 | 0.70 | 2008 |
EEMC: An energy-efficient multi-tier clustering algorithm for large-scale wireless sensor networks | 47 | 1.33 | 2008 |
EECCP: an energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks | 3 | 0.40 | 2008 |
Baseline Profile Stability for Network Anomaly Detection | 9 | 0.56 | 2008 |
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks | 0 | 0.34 | 2007 |
An Improved Multi-Layered Architecture and its Rotational Scheme for Large-Scale Wireless Sensor Networks | 4 | 0.48 | 2007 |
Performance Analysis of Error Control Codes for Wireless Sensor Networks | 38 | 1.99 | 2007 |
PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks | 60 | 2.42 | 2006 |
An Efficient Defense against Distributed Denial-of-Service Attacks using Congestion Path Marking | 1 | 0.37 | 2006 |
A Hybrid Evolutionary Analogue Module Placement Algorithm For Integrated Circuit Layout Designs | 6 | 0.51 | 2005 |
Coordinated robust routing by dual cluster heads in layered wireless sensor networks | 6 | 0.49 | 2005 |
Macro-cell placement for analog physical designs using a hybrid genetic algorithm with simulated annealing | 2 | 0.43 | 2005 |
Hash-Based Internet Traffic Load Balancing | 1 | 0.35 | 2004 |
Packetscore: statistics-based overload control against distributed denial-of-service attacks | 57 | 2.94 | 2004 |
Transient performance of PacketScore for blocking DDoS attacks | 6 | 0.61 | 2004 |