Works matching IS 18200214 AND DT 2014 AND VI 11 AND IP 3
Results: 16
An Approach for Selecting Candidates in Soft-handover Procedure Using Multi-Generating Procedure and Second Grey Relational Analysis.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1173, doi. 10.2298/CSIS130930071S
- By:
- Publication type:
- Article
Weibo Clustering: A New Approach Utilizing Users' Reposting Data in Social Networking Services.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1157, doi. 10.2298/CSIS130927070Z
- By:
- Publication type:
- Article
The Performance Analysis of Direct/Cooperative Transmission to Support QoS in WLANs.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1143, doi. 10.2298/CSIS130925069W
- By:
- Publication type:
- Article
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1127, doi. 10.2298/CSIS130921068W
- By:
- Publication type:
- Article
Study on Network Architecture of Big Data Center for the Efficient Control of Huge Data Traffic.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1113, doi. 10.2298/CSIS130916067P
- By:
- Publication type:
- Article
A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1091, doi. 10.2298/CSIS130924066C
- By:
- Publication type:
- Article
Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1071, doi. 10.2298/CSIS130922065D
- By:
- Publication type:
- Article
A New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1055, doi. 10.2298/CSIS130918064H
- By:
- Publication type:
- Article
The Efficient Implementation of Distributed Indexing with Hadoop for Digital Investigations on Big Data.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1037, doi. 10.2298/CSIS130920063L
- By:
- Publication type:
- Article
A New Hybrid Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1017, doi. 10.2298/CSIS130926062C
- By:
- Publication type:
- Article
A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1001, doi. 10.2298/CSIS130915061J
- By:
- Publication type:
- Article
PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 975, doi. 10.2298/CSIS130917060G
- By:
- Publication type:
- Article
A True Random-Number Encryption Method Employing Block Cipher and PRNG.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 905, doi. 10.2298/CSIS130921056H
- By:
- Publication type:
- Article
Long Distance Face Recognition for Enhanced Performance of Internet of Things Service Interface.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 961, doi. 10.2298/CSIS130926059M
- By:
- Publication type:
- Article
A NEMO-HWSN Solution to Support 6LoWPAN Network Mobility in Hospital Wireless Sensor Network.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 943, doi. 10.2298/CSIS130917058S
- By:
- Publication type:
- Article
A Secure Mobile DRM System Based on Cloud Architecture.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 925, doi. 10.2298/CSIS130919057C
- By:
- Publication type:
- Article