Your selections:
Blockchain leveraged task migration in body area sensor networks
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Can a robot hear the shape and dimensions of a room?
- Nguyen, Linh, Miro, Jaime Valls, Qiu, Xiaojun
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Kulkarni, Pradnya, Stranieri, Andrew, Jelinek, Herbert
Cybersecurity indexes for eHealth
- Burke, Wendy, Oseni, Taiwo, Jolfaei, Alireza, Gondal, Iqbal
Designing security intelligent agent for petrol theft prevention
- Bakkar, Mahmoud, Alazab, Ammar
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
Development of a risk-based maintenance (RBM) strategy for sewerage pumping station network
- Masud, M., Chattopadhyay, Gopi, Gunawan, Indra
Diabetic retinopathy detection : methods and challenges
- Patil, Shivani, Kulkarni, Pradnya
Differentially private streaming to untrusted edge servers in intelligent transportation system
- Ezabadi, Soheila, Jolfaei, Alireza, Kulik, Lars, Ramamohanarao, Kotagiri
- Ruan, Chunyang, Ma, Jiangang, Wang, Ye, Zhang, Yanchun, Yang, Yun
Disease gene prediction based on heterogeneous probabilistic hypergraph ranking
- Ding, Feng, Kong, Xiangjie, Zhao, Zhehuan, Xia, Feng, Liu, Anfu, Bai, Chenxu, Xu, Bo, Liu, Xiaoxia, Sang, Shengtian, Lin, Hongfei, Yang, Zhihao, Wang, Jian
- Hossain, Md Tahmid, Teng, Shyh Wei, Zhang, Dengsheng, Lim, Suryani, Lu, Guojun
Enhancing branch predictors using genetic algorithm
- Haque, Md Sarwar, Hassan, Md Rafiul, Sulaiman, Muhammad, Onoruoiza, Salami, Kamruzzaman, Joarder, Arifuzzaman, Md
Evolved similarity techniques in malware analysis
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Gaussian mixture marginal distributions for modelling remaining metallic pipe wall thickness
- Nguyen, Linh, Miro, Jaime Valls, Shi, Lei, Vidal-Calleja, Teresa
Generating linked data repositories using UML artifacts
Generative malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
- Song-Turner, Helen, Moyeen, Abdul
Are you sure you would like to clear your session, including search history and login status?