Your selections:
Reputation and user requirement based price modeling for dynamic spectrum access
- Hassan, Md Rakib, Karmakar, Gour, Kamruzzaman, Joarder
Maximizing the concurrent transmissions in cognitive radio ad hoc networks
- Hassan, Md Rakib, Karmakar, Gour, Kamruzzaman, Joarder
A new convergence rate estimation of general artificial immune algorithm
- Hong, Lu, Kamruzzaman, Joarder
A modified immune network optimization algorithm
- Hong, Lu, Kamruzzaman, Joarder
Convergence of elitist clonal selection algorithm based on martingale theory
- Hong, Lu, Kamruzzaman, Joarder
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
Content exchange among mobile tourists using users' interest and place-centric activities
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
Content sharing among visitors with irregular movement patterns in visiting hotspots
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
Wireless security and privacy issues
Dynamic content distribution for decentralized sharing in tourist spots using demand and supply
- Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Kaisar, Shahriar
Security and privacy issues in RFID systems
- Kamruzzaman, Joarder, Azad, Arman, Karmakar, Nemai, Karmakar, Gour, Srinivasan, Bala
Object analysis with visual sensors and RFID
- Karmakar, Gour, Karmakar, Nemai, Dooley, Laurence, Kamruzzaman, Joarder
Object analysis with visual sensors and RFID
- Karmakar, Gour, Dooley, Laurence, Karmakar, Nemai, Kamruzzaman, Joarder
IoT Sensor Numerical Data Trust Model Using Temporal Correlation
- Karmakar, Gour, Das, Rajkumar, Kamruzzaman, Joarder
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
An efficient data delivery mechanism for AUV-based Ad hoc UASNs
- Karmakar, Gour, Kamruzzaman, Joarder, Nowsheen, Nusrat
Assessing trust level of a driverless car using deep learning
- Karmakar, Gour, Chowdhury, Abdullahi, Das, Rajkumar, Kamruzzaman, Joarder, Islam, Syed
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Karmakar, Gour, Petty, Mark, Ahmed, Hassan, Das, Rajkumar, Kamruzzaman, Joarder
Welcome message from the dependsys 2015 program chairs
- Khan, Latifur, Kamruzzaman, Joarder, Pathan, Al Sakib Khan
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
Are you sure you would like to clear your session, including search history and login status?