Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics in asp.net java and php for mca and engineering students
#1

1. Shifting Inference Control to User Side: Architecture and Protocol
2. NCTUns Network Simulator for Advanced Wireless Vehicular Network Researches
3. How Developers Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes A Series of Four Experiments
4. Efficient and secure content processing and distribution by corporate intermediaries
5. A Video Coding Scheme Based on Joint Spatiotemporal and Adaptive Prediction
6. Controlled WiFi Sharing in Cities A Decentralized Approach Relying on Indirect Reciprocity
7. Improved Dot Diffusion by Diffused Matrix and Class Matrix CoOptimization
8. Recognition of Complex Settings by Aggregating Atomic Scenes
9. Hybrid BinaryTernary Number System for Elliptic Curve Cryptosystems
10. A Multiagent System for Coordinating Ambulances for Emergency Medical Services
11. CHARMY: A Framework for Designing and Verifying Architectural Specifications
12. Efficient and Strategy proof Spectrum Allocations in Multichannel Wireless Networks
13. Geometric FeaturesBased Filtering for Suppression of Impulse Noise in Color Images
14. Multipath Dissemination in Regular Mesh Topologies
15. PowerPack: Energy Profiling and Analysis of HighPerformance Systems and Applications
16. PrivacyPreserving Updates to Anonymous and Confidential Databases
17. IEE Transactions Papers
18. A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
19. Invariances, LaplacianLike Wavelet Bases, and the Whitening of Fractal Processes
20. Active Mask Segmentation of Fluorescence Microscope Images
21. SAR Image Regularization with Fast Approximate Discrete Minimization
22. Security Requirements Engineering:A Framework for Representation and Analysis
23. A Robust Hidden Markov Gauss Mixture Vector Quantizer for a Noisy Source
24. Natural Language Processing and the Web Mobile WiMAX Network: A Survey
25. IT Strategies for Increased Rail Employee Satisfaction
26. Text from Corners: A Novel Approach to Detect Text and Caption in Videos
27. Software Reliability and Testing Time Allocation An ArchitectureBased Approach
28. Engineering a Sound Assertion Semantics for the Verifying Compiler
29. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
30. Secure DistanceBased Localization in the Presence of Cheating Beacon Nodes
31. Decentralized QoSAware Checkpointing Arrangement in Mobile Grid Computing
32. Snoogle A Search Engine for Pervasive Environments
33. Hierarchical Ensemble of Global and Local Classifiers for Face Recognition
34. PLR: A Software Approach to Transient Fault Tolerance for Multicore Architectures
35. Maximizing the Lifetime of a Barrier of Wireless Sensors
36. Regression Testing Techniques for Object Oriented Software
37. Recording Process Documentation for Provenance
38. Distortion Estimators for Bitplane Image Coding
39. Dynamic Multicast in Overlay Networks with Linear Capacity Constraints
40. Resource Bundles Using Aggregation for Statistical LargeScale Resource Discovery and Management
41. Security Solution for Mobile Ad Hoc Network of Networks MANoN
42. DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks
43. Recomputing Coverage Information to Assist Regression Testing
44. Verification and TradeOff Analysis of Security Properties in UML System Models
45. ReputationBased Resource Allocation in PP Systems of Rational Users
46. Dynamics of Malware Spread in Decentralized PeertoPeer Networks
47. Anomaly Detection in Network Traffic Based on Statistical Inference and alphaStable Modeling
48. QoSAware FaultTolerant Scheduling for RealTime Tasks on Heterogeneous Clusters
49. Effects of Personality on Pair Programming
50. On the Thermal Attack in Instruction Caches
51. Uncertainty Modeling and Reduction in MANETs
52. Generating Event SequenceBased Test Cases Using GUI Runtime State Feedback
53. Layered Approach Using Conditional Random Fields for Intrusion Detection
54. CASTLE: Continuously Anonymizing Data Streams Determining the Diagnosability of ,Matching Composition Networks and Its Applications
55. Efficient and Scalable HardwareBased Multicast in FatTree Networks
56. Guest Editors Introduction: Agents and Data Mining
57. A Case Study of Networks Simulation Tools for Wireless Networks
58. Maturing Software Engineering Knowledge through Classifications: A Case Study on Unit Testing Techniques
59. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments
60. Distributed Generation Interface to the CERTS Micro grid
61. Shifting Inference Control to User Side Architecture and Protocol
62. Dealing with Transient Faults in the Interconnection Network of CMPs at the Cache Coherence Level
63. Synthesis of Partial Behavior Models from Properties and Scenarios
64. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
65. Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
66. Graph Cuts for Curvature Based Image Denoising Invariances, LaplacianLike Wavelet Bases, and the Whitening of Fractal Processes
67. FPGABased Channel Simulator for a Wireless Network Emulator
68. Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams
69. Dictionary Learning for Stereo Image Representation
70. MABS Multicast Authentication Based on Batch Signature
71. Conformance Testing of Temporal RoleBased Access Control Systems
72. Enhanced Modeling and Solution of Layered Queueing Networks
73. A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code
74. HAIRIS: A Method for Automatic Image Registration through HistogramBased Image Segmentation
75. Mitigation of Control Channel Jamming under Node Capture Attacks
76. Sequential pattern mining using Intelligent tutoring Agent
77. The Emerging Field of Semantic Scientific Knowledge Integration
78. Efficient Algorithms for Global Snapshots in Large Distributed Systems
79. Efficient Uplink Bandwidth Request with Delay Regulation for RealTime Service in Mobile WiMAX Networks
80. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
81. Identification of Move Method Refactoring Opportunities
82. AgentEnriched Data Mining: A Case Study in Brain Informatics
83. StateDensity Functions over DBM Domains in the Analysis of NonMarkovian Models
84. On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking
85. Securing Structured Overlays against Identity Attacks
86. A Collaborative Multiagent System for Mining Transcriptional Regulatory Elements
87. ZMAC : A Hybrid MAC for Wireless Sensor Networks
88. Channel Assignment for Multihop Cellular Networks: Minimum Delay
89. A GenBased RFID Authentication Protocol for Security and Privacy
90. Multiprefix Trie: A New Data Structure for Designing Dynamic RouterTables
91. SAMAC A CrossLayer Communication Protocol for Sensor Networks with Sectored Antennas
92. Detecting Application DenialofService Attacks A GroupTestingBased Approach
93. CoMoM: Efficient ClassOriented Evaluation of Multiclass Performance Models
94. ContextBased Operational Transformation in Distributed Collaborative Editing Systems
95. On the Phase Transition Width of KConnectivity in Wireless Multihop Networks
96. GoalOriented Rectification of CameraBased Document Images
97. SocioNet: A SocialBased Multimedia Access System for Unstructured PP Networks
98. FTPA: Supporting FaultTolerant Parallel Computing through Parallel Recomputing
99. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
100. Bayesian Inference on Multiscale Models for Poisson Intensity Estimation
101. Atomicity Analysis of Service Composition across Organizations
102. HERO: Online RealTime Vehicle Tracking
103. Data Mining Approach for Detecting HigherLevel Clones in Software
104. MAC Protocol for Opportunistic Cognitive Radio Networks with Soft Guarantees
105. On EventBased Middleware for LocationAware Mobile Applications
106. Mining the Web to Create Specialized Glossaries
107. LowEnergy Symmetric Key Distribution in Wireless Sensor Networks
108. Complexity of Data Collection, Aggregation, and Selection for Wireless Sensor Networks
109. On the Relevance of Node Isolation to the KConnectivity of Wireless Optical Sensor Networks
110. Reducing Soft Errors through Operand Width Aware Policies
111. Scaling Up WideAreaSearchMunition Teams
112. The Design of a Generic IntrusionTolerant Architecture for Web Servers
113. Design of Fair Scheduling Schemes for the QoSOriented Wireless LAN
114. Localized Multicast: Efficient and Distributed Replica Detection in LargeScale Sensor Networks
115. A Novel Probability Binary Particle Swarm Optimization Algorithm and Its Application
116. SelfHealing Control Flow Protection in Sensor Applications
117. A Theoretical and Empirical Study of SearchBased Testing Local, Global, and Hybrid Search
118. Dynamic Verification of Memory Consistency in CacheCoherent Multithreaded Computer Architectures
119. Semi concurrent Online Testing of Transition Faults through Output Response Comparison of Identical Circuits
120. Image Quality Assessment Based on Multiscale Geometric Analysis
121. An MRFBased DeInterlacing Algorithm with ExemplarBased Refinement
122. Information Content Weighting for Perceptual Image Quality Assessment
123. A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
124. A Scalable and EnergyEfficient Context Monitoring Framework for Mobile Personal Sensor Networks
125. Stabilizing Distributed RTrees for PeertoPeer Content Routing
126. Improving Video Streaming over IEE Mesh Networks through a CrossLayer Design Technique
127. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
128. Meshbased Data Delivery over Multiple TreeShaped Routes in PP Overlay Network
129. Building SmallWorld PeertoPeer Networks Based on Hierarchical Structures
130. VEBEK Virtual EnergyBased Encryption and Keying for Wireless Sensor Networks
131. On Complexity and Approximability of Optimal DoS Attacks on MultipleTree PP Streaming Topologies
132. Collaborative Spam filtering
133. Optimal Radio Resource Partition for Joint Contention and ConnectionOriented Multichannel Access in OFDMA Systems
134. ApplicationLevel Diagnostic and Membership Protocols for Generic TimeTriggered Systems
135. Discovering Services during ServiceBased System Design Using UML
136. An Analytical Approach to Optimizing Parallel Image RegistrationRetrieval
137. Towards Formal Verification of RoleBased Access Control Policies
138. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
139. ClusteringBased Denoising With Locally Learned Dictionaries
140. On the Security of Route Discovery in MANETs
141. Secure Data Objects Replication in Data Grid
142. A ConnectivityBased Method for Defining RegionsofInterest in fMRI Data
143. Recovery Device for RealTime DualRedundant Computer Systems
144. Fast Architectures for the eta_T Pairing over SmallCharacteristic Super singular Elliptic Curves
145. Predicting Project Velocity in XP Using a Learning Dynamic Bayesian Network Model
146. On the Performance Bounds of Practical Wireless Network Coding
147. Hierarchical Replication Techniques to Ensure Checkpoint Storage Reliability in Grid Environment
148. SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments
149. Improving Reliability for ApplicationLayer Multicast Overlays
150. ELMO: Energy Aware Local Monitoring in Sensor Networks
151. LogootUndo Distributed Collaborative Editing System on PP Networks
152. SAMAC: A CrossLayer Communication Protocol for Sensor Networks with Sectored Antennas
153. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
154. Efficient BlockBased Frequency Domain Wavelet Transform Implementations
155. CouplingBased Internal Clock Synchronization for LargeScale Dynamic Distributed Systems
156. A Synchronous Scheduling Service for Distributed RealTime Java
157. A Cryptographic Approach to Securely Share and Query Genomic Sequences
158. Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic
159. Route Stability in MANETs under the Random Direction Mobility Model
160. ServiceLevel Agreements for Electronic Services
161. Exploiting Heterogeneity in PP Video Streaming
162. A HighCapacity Steganography Scheme for JPEG Baseline System
163. Continuous Stereo SelfCalibration by Camera Parameter Tracking
164. Routing in DelayTolerant Networks Comprising Heterogeneous Node Populations
165. Using Backpropagation Neural Networks for Functional Software Testing
166. KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
167. Joint Task Migration and Power Management in Wireless Computing
168. Endtoend network simulator for conversational quality measurements
169. Fuzzy Random Impulse Noise Removal from Color Image Sequences
170. DualQuorum: A Highly Available and Consistent Replication System for Edge Services
171. Automated Trace Analysis of DiscreteEvent System Models
172. Replica Placement for Route Diversity in TreeBased Routing Distributed Hash Tables
173. Signature Tree Generation for Polymorphic Worms
174. A Parameterized Approach to SpamResilient Link Analysis of the Web
175. Cryptanalysis of a Generalized Ring Signature Scheme
176. InDepth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
177. Prime: Byzantine Replication under Attack
178. Adaptive FaultTolerant QoS Control Algorithms for Maximizing System Lifetime of QueryBased Wireless Sensor Networks
179. Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
180. Providing Architectural Languages and Tools Interoperability through Model Transformation Technologies
181. Implementation Architecture of Proxy Mobile IPv Protocol for NS Simulator Software
182. A Cautionary View of Mobility and Connectivity Modeling in Vehicular AdHoc Networks
183. Cost Minimization Planning for Greenfield PON Network
184. Dynamic Multiple Fault Diagnosis: Mathematical Formulations and Solution Techniques
185. Program Behavior Discovery and Verification A Graph Grammar Approach
186. VEBEK: Virtual EnergyBased Encryption and Keying for Wireless Sensor Networks
187. Efficient and Reliable LockFree Memory Reclamation Based on Reference Counting
188. Internet Host Geolocation Using Maximum Likelihood Estimation Technique
189. Adaptive Multiagent System for Network Traffic Monitoring
190. Opportunistic scheduling with reliability guarantees in cognitive radio
191. An Advanced Hybrid PeertoPeer Botnet
192. FullInformation Lookups for PeertoPeer Overlays
193. CONVEX: SimilarityBased Algorithms for Forecasting Group Behavior
194. FaultTolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
195. An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence Search on a Massively Parallel System
196. Highly Available IntrusionTolerant Services with ProactiveReactive Recovery
197. PrivacyAware Collaborative Spam Filtering
198. Transaction based QoS web service
199. Directed Explicit StateSpace Search in the Generation of Counterexamples for Stochastic Model Checking
200. Linking Documents to Encyclopedic Knowledge
201. Improving the Behavior of Intelligent Tutoring Agents with Data Mining
202. Efficient Fault Detection and Diagnosis in Complex Software Systems with Information Theoretic Monitoring
203. Architectural Risk Analysis of Software Systems Based on Security Patterns
204. EnergyEfficient RealTime Multicast Routing in Mobile Ad Hoc Networks
205. The Topology of Gaussian and EisensteinJacobi Interconnection Networks
206. Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred ThreeDimensional Face Models
207. PowerLaw Distributions of Component Size in General Software Systems
208. Performing Arithmetic Operations on RoundtoNearest Representations
209. Understanding Exception Handling Viewpoints of Novices and Experts
210. Automatic Extraction of Heap Reference Properties in ObjectOriented Programs
211. MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
212. SigFree: A SignatureFree Buffer Overflow Attack Blocker
213. Bayesian Approaches to Matching Architectural Diagrams
214. CorrelationBased Traffic Analysis Attacks on Anonymity Networks
215. Better Debugging via Output Tracing and CallstackSensitive Slicing
216. Optimal Resource Placement in Structured PeertoPeer Networks
217. ISRABased Grouping: A Disk Reorganization Approach for Disk Energy Conservation and Disk Performance Enhancement
218. Gait Feature Subset Selection by Mutual Information
219. On the Security of an Efficient TimeBound Hierarchical Key Management Scheme
220. An EdgeWeighted Centroidal Voronoi Tessellation Model for Image Segmentation
221. Adaptive Workload Prediction of Grid Performance in Confidence Windows
222. Nonparametric Model Comparison and Uncertainty Evaluation for Signal Strength Indoor Location
223. A Computationally Sound Mechanized Prover for Security Protocols
224. Target Association Rules: A New Behavioral Patterns for Point of Coverage Wireless Sensor Networks
225. On Fairness, Optimizing Replica Selection in Data Grids
226. Model Checking Probabilistic and Stochastic Extensions of the ;Calculus
227. The Beacon Movement Detection Problem in Wireless Sensor Networks for Localization Applications
228. Carving and Replaying Differential Unit Test Cases from System Test Cases
229. EnergyEfficient Reprogramming of a Swarm of Mobile Sensors
230. Theory and Techniques for Automatic Generation of VulnerabilityBased Signatures
231. A Framework for Programming Robust ContextAware Applications
232. Dynamic Multiresolution Data Dissemination in Wireless Sensor Networks
233. Nonlinear Symbolic Analysis for Advanced Program Parallelization
234. Exploring Alternative Software Architecture Designs: A Planning Perspective
235. TACLC: TimingAware Cache Leakage Control for Hard RealTime Systems
236. Weight based DSR for Mobile Ad Hoc Networks
237. Stabilization of Parametric Active Contours Using a Tangential Redistribution Term
238. PrivacyConscious LocationBased Queries in Mobile Environments
239. Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees
240. Multipath Key Establishment for Wireless Sensor Networks Using JustEnough Redundancy Transmission
241. Online Periodic SelfTest Scheduling for RealTime ProcessorBased Systems Dependability Enhancement
242. Prefetching with Helper Threads for Loosely Coupled Multiprocessor Systems
243. Localized Multicast Efficient and Distributed Replica Detection in LargeScale Sensor Networks
244. A PuzzleBased Defense Strategy Against Flooding Attacks Using Game Theory
245. Modeling Soft Errors at the Device and Logic Levels for Combinational Circuits
246. MessageEfficient Location Prediction for Mobile Objects in Wireless Sensor Networks Using a Maximum Likelihood Technique
247. Scheduling Multisource Divisible Loads on Arbitrary Networks
248. Salient Motion Features for Video Quality Assessment
249. The Impact of LessonsLearned Sessions on Effort Estimation and Uncertainty Assessments
250. Weighing Stars: Aggregating Online Product Reviews for Intelligent Ecommerce Applications
251. Cost collision mining forwarding schemes in wireless sensor network design experimental validation
252. Geometric Video Approximation Using Weighted Matching Pursuit
253. Combined AuthenticationBased Multilevel Access Control in Mobile Application for DailyLifeService
254. Secure Synchronization of Periodic Updates in Ad Hoc Networks
255. Providing Service Guarantees in e EDCA WLANs with Legacy Stations
256. ReplicationBased Fault Tolerance for MPI Applications
257. Multipoint Relay
258. A Quantitative Investigation of the Acceptable Risk Levels of ObjectOriented Metrics in OpenSource Systems
259. Nymble: Blocking Misbehaving Users in Anonymizing Networks
260. Visual Network Simulator VNS: A GUI to QoS simulation for the ns simulator
261. On the Benefits of Cooperative Proxy Caching for PeertoPeer Traffic
262. Enforcing MinimumCost Multicast Routing against Selfish Information Flows
263. An Orientation Inference Framework for Surface Reconstruction from Unorganized Point Clouds
264. AVA: AdjectiveVerbAdverb Combinations for Sentiment Analysis
265. AgentBased Approach to FreeFlight Planning, Control, and Simulation
266. Securing Topology Maintenance Protocols for Sensor Networks
267. Semantic technology for communication with in an organization
268. Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks
269. Achieving Guaranteed Anonymity in GPS Traces via UncertaintyAware Path Cloaking
270. CAR : Contextaware Adaptive Routing for Delay Tolerant Mobile Networks
271. Using WebReferral Architectures to Mitigate DenialofService Threats
272. Beyond Output Voting: Detecting Compromised Replicas Using HMMBased Behavioral Distance
273. Spatial SparsityInduced Prediction SIP for Images and Video: A Simple Way to Reject Structured Interference
274. A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions
275. Using a Benchmark in CaseBased MultipleCriteria Ranking
276. Cost and CollisionMinimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis and Experimental Validation
277. Hierarchical Multiple Markov Chain Model for Unsupervised Texture Segmentation
278. On Game Theoretic Peer Selection for Resilient PeertoPeer Media Streaming
279. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route
280. Exception Handling for Repair in ServiceBased Processes
281. Computation of Efficient Multicast Key Distribution
282. Optimized Resource Allocation for Software Release Planning
283. Incremental Test Generation for Software Product Lines
284. Configurable Middleware for Distributed RealTime Systems with Aperiodic and Periodic Tasks
285. HighLevel SideChannel Attack Modeling and Simulation for SecurityCritical Systems on Chips
286. Reliable and EnergyEfficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links
287. RandomCast: An EnergyEfficient Communication Scheme for Mobile Ad Hoc Networks
288. Interactive Streaming of Stored Multi view Video Using Redundant Frame Structures
289. SIPBased IMS Signaling Analysis for WiMaxG Interworking Architectures
290. MABS: Multicast Authentication Based on Batch Signature
291. Designing and Implementing an IEE Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms
292. A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
293. DECOR A Method for the Specification and Detection of Code and Design Smells
294. SORD: A FaultResilient Service Overlay for MediaPort Resource Discovery
295. Robust and Efficient Stream Delivery for Application Layer Multicasting in Heterogeneous Networks
296. A Coverage Inference Protocol for Wireless Sensor Networks
297. Evaluating Elastic Buffer and Wormhole Flow Control
298. WindowLevel Rate Control for Smooth Picture Quality and Smooth Buffer Occupancy
299. Instruction Based Online Periodic SelfTesting of Microprocessors with FloatingPoint Units
300. A Queuing Model for Evaluating the Transfer Latency of PeertoPeer Systems
301. Exception Handling Patterns for Process Modeling
302. Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
303. A CrossLayer ApproachBased Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks
304. Dominant Local Binary Patterns for Texture Classification
305. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
306. A Hybrid Approach to Detect and Localize Texts in Natural Scene Images
307. An Efficient and Scalable Approach to Correct Class Model Refinement
308. A New Diskless Check pointing Approach for Multiple Processor Failures
309. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
310. Error Detection and Fault Tolerance in ECSM Using Input Randomization
311. An Artificial EmergencyLogisticsPlanning System for Severe Disasters
312. Super Resolution With Probabilistic Motion Estimation
313. Optimal Accounting Policies for AA Systems in Mobile Telecommunications Networks
314. Learning Communicating Automata from MSCs
315. Improving Air Traffic Management with a Learning Multiagent System
316. A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs
317. Applications to PhotonLimited Image Denoising
318. Image Denoising Using Mixtures of Projected Gaussian Scale Mixtures
319. Greedy Routing with AntiVoid Traversal for Wireless Sensor Networks
320. Runtime Defense against Code Injection Attacks Using Replicated Execution
321. Vulnerability Discovery with Attack Injection
322. The Effects of Stitching Orders in PatchandStitch WSN Localization Algorithms
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.