You are here

Search results

Searching as anonymous (not verified)

15 items found in collection [showing 1 - 15]
  • CSV Spreadsheet
APECS
APECS
Practical Opportunistic Routing in Wireless Mesh Networks
Practical Opportunistic Routing in Wireless Mesh Networks
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Modeling and Comparison of Large-Scale Interconnect Designs
Modeling and Comparison of Large-Scale Interconnect Designs
Routing Algorithms for the Emerging Topologies in HPC and Data Center Networks
Routing Algorithms for the Emerging Topologies in HPC and Data Center Networks
On Exactitude in Geographic Information Science
On Exactitude in Geographic Information Science
Botnets, a Threat to National Security
Botnets, a Threat to National Security
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control          Layer
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control Layer
Electronic Voting
Electronic Voting
Formal Security Evaluation of Ad Hoc Routing Protocols
Formal Security Evaluation of Ad Hoc Routing Protocols
Topology Aggregation for Networks with Two Additive Metrics
Topology Aggregation for Networks with Two Additive Metrics
Sender-Centric Approach to Spam and Phishing Control
Sender-Centric Approach to Spam and Phishing Control
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Secure Real-Time Conversations
Secure Real-Time Conversations
Latency Reduction Techniques for Remote Memory Access in Anemone
Latency Reduction Techniques for Remote Memory Access in Anemone