214 results on '"Mário M. Freire"'
Search Results
52. Performance Analysis of Degree Four Topologies for the Optical Core of IP-over-WDM Networks.
53. Management of Security in TCP/IP Hosts Using Dedicated Monitoring Applications.
54. Performance assessment of wavelength routed optical networks with shortest path routing over degree three topologies.
55. Performance Assessment of WDM Degree-four Chordal Ring Networks.
56. Optical Backbones with Low Connectivity for IP-over-WDM Networks.
57. Performance Comparison of Wavelength Routing Optical Networks with Chordal Ring and Mesh-Torus Topologies.
58. Influence of Chord Length on the Blocking Performance of Wavelength-Routed Chordal Ring Networks.
59. Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems
60. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space
61. Performance assessment of high density wavelength division multiplexing systems with dispersion supported transmission at 10 Gbit/s.
62. Secure user authentication in cloud computing management interfaces.
63. A tool for estimating the hurst parameter and for generating self-similar sequences.
64. A Preliminary Evaluation of the SRE and SBPG Components of the IoT-HarPSecA Framework
65. Session details: Theme: Distributed systems: NET - Networking track
66. Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance
67. Approaches for optimizing virtual machine placement and migration in cloud environments: A survey
68. A User Trust System for Online Games—Part II: A Subjective Logic Approach for Trust Inference
69. Gland segmentation of breast ultrasound exams.
70. Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework
71. Track on Computer Networks: editorial message.
72. A decentralized blockchain oriented framework for automated bug assignment
73. A User Trust System for Online Games—Part I: An Activity Theory Approach for Trust Representation
74. IS 2007 PC Co-chairs' Message.
75. Performance of Optical Burst Switched Networks for Grid Applications.
76. On the Performance of Shortest Path Routing Algorithms for Modeling and Simulation of Static Source Routed Networks -- an Extension to the Dijkstra Algorithm.
77. Advanced Querying Architecture for DICOM Systems.
78. Self-Similarity Analysis Applied to 2D Breast Cancer Imaging.
79. IS 2006 PC Co-chairs' Message.
80. A New Architecture for Optical Burst Switched Networks Based on a Common Control Channel.
81. SWedt: A Semantic Web Editor Integrating Ontologies and Semantic Annotations with Resource Description Framework.
82. IoT-HarPSecA
83. Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments.
84. High Performance Optical Backbones for Next Generation Internet.
85. Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
86. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
87. A Tutorial Introduction to IoT Design and Prototyping with Examples
88. A Quick Perspective on the Current State of IoT Security
89. CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness
90. Session details: NET - networking track
91. Security Challenges of the Internet of Things
92. Classification of Breast Masses on Contrast-Enhanced Magnetic Resonance Images Through Log Detrended Fluctuation Cumulant-Based Multifractal Analysis
93. 3D Lacunarity in Multifractal Analysis of Breast Tumor Lesions in Dynamic Contrast-Enhanced Magnetic Resonance Imaging
94. Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties
95. Security issues in cloud environments: a survey
96. Detection and classification of peer-to-peer traffic
97. Preface to the Special Issue 'Engineering for Society' – International Conference on Engineering (ICEUBI 2015)
98. Fast synthesis of persistent fractional Brownian motion
99. Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
100. The design and evaluation of the Simple Self-Similar Sequences Generator
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.