Found: 30
Select item for more details and to access through your institution.
Damaged backup data recovery method for Windows mobile.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 875, doi. 10.1007/s11227-013-0919-6
- By:
- Publication type:
- Article
A uplink radio resource allocation scheme for localized SC-FDMA transmission in LTE network.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 670, doi. 10.1007/s11227-012-0849-8
- By:
- Publication type:
- Article
Design and implementation of privacy preserving billing protocol for smart grid.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 841, doi. 10.1007/s11227-013-0905-z
- By:
- Publication type:
- Article
Social network and high performance in smart communications.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Secure and robust multipath routings for advanced metering infrastructure.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1071, doi. 10.1007/s11227-013-1009-5
- By:
- Publication type:
- Article
Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 783, doi. 10.1007/s11227-013-0890-2
- By:
- Publication type:
- Article
An energy-efficient clustered distributed coding for large-scale wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 649, doi. 10.1007/s11227-012-0848-9
- By:
- Publication type:
- Article
Reordering computation sequences for memory-efficient binary field multiplication.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 936, doi. 10.1007/s11227-013-0930-y
- By:
- Publication type:
- Article
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 863, doi. 10.1007/s11227-013-0917-8
- By:
- Publication type:
- Article
An anonymous distributed routing protocol in mobile ad-hoc networks.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 888, doi. 10.1007/s11227-013-0920-0
- By:
- Publication type:
- Article
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 989, doi. 10.1007/s11227-013-0965-0
- By:
- Publication type:
- Article
MODM: multi-objective diffusion model for dynamic social networks using evolutionary algorithm.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 738, doi. 10.1007/s11227-013-0947-2
- By:
- Publication type:
- Article
Analysis and effects of smart home dataset characteristics for daily life activity recognition.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 760, doi. 10.1007/s11227-013-0978-8
- By:
- Publication type:
- Article
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 907, doi. 10.1007/s11227-013-0926-7
- By:
- Publication type:
- Article
Dynamic FOAF management method for social networks in the social web environment.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 633, doi. 10.1007/s11227-012-0847-x
- By:
- Publication type:
- Article
Editorial of special section on hybrid information security technologies-part I.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
A disk bandwidth allocation mechanism with priority.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 686, doi. 10.1007/s11227-012-0857-8
- By:
- Publication type:
- Article
The QoS-based MCDM system for SaaS ERP applications with Social Network.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 614, doi. 10.1007/s11227-012-0832-4
- By:
- Publication type:
- Article
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 918, doi. 10.1007/s11227-013-0928-5
- By:
- Publication type:
- Article
Efficient algorithms for team formation with a leader in social networks.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 721, doi. 10.1007/s11227-013-0907-x
- By:
- Publication type:
- Article
Visible watermarking images in high quality of data hiding.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1033, doi. 10.1007/s11227-013-0969-9
- By:
- Publication type:
- Article
Cryptanalysis of block cipher Piccolo suitable for cloud computing.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 829, doi. 10.1007/s11227-013-0902-2
- By:
- Publication type:
- Article
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 812, doi. 10.1007/s11227-013-0896-9
- By:
- Publication type:
- Article
Privacy aware image template matching in clouds using ambient data.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1049, doi. 10.1007/s11227-013-0976-x
- By:
- Publication type:
- Article
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 700, doi. 10.1007/s11227-012-0858-7
- By:
- Publication type:
- Article
Two ID-based authenticated schemes with key agreement for mobile environments.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 973, doi. 10.1007/s11227-013-0962-3
- By:
- Publication type:
- Article
Information delivery scheme of micro UAVs having limited communication range during tracking the moving target.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 950, doi. 10.1007/s11227-013-0931-x
- By:
- Publication type:
- Article
Towards secure and efficient user authentication scheme using smart card for multi-server environments.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1008, doi. 10.1007/s11227-013-0966-z
- By:
- Publication type:
- Article
Contract RBAC in cloud computing.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1111, doi. 10.1007/s11227-013-1017-5
- By:
- Publication type:
- Article
Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1093, doi. 10.1007/s11227-013-1016-6
- By:
- Publication type:
- Article