435 results on '"Kee Chaing Chua"'
Search Results
2. Physically secure mutual authentication for IoT.
3. A Light-Weight Mutual Authentication Protocol for IoT Systems.
4. Secure Data Provenance for the Internet of Things.
5. Low Power Data Integrity in IoT Systems.
6. Distributed Scalable Autonomous Market-Based Demand Response via Residential Plug-In Electric Vehicles in Smart Grids.
7. Detecting data tampering attacks in synchrophasor networks using time hopping.
8. Position Paper: Physical Unclonable Functions for IoT Security.
9. Mutual Authentication in IoT Systems Using Physical Unclonable Functions.
10. Application Scheduling, Placement, and Routing for Power Efficiency in Cloud Data Centers.
11. Joint shaping and altering the demand profile by residential plug-in electric vehicles for forward and spot markets in smart grids.
12. A Statistical modelling and analysis of residential electric vehicles' charging demand in smart grids.
13. Power-Efficient and Predictable Data Centers with Sliding Scheduled Tenant Requests.
14. Time-Aware VM-Placement and Routing with Bandwidth Guarantees in Green Cloud Data Centers.
15. Secrecy wireless information and power transfer with MISO beamforming.
16. Wireless information transfer with opportunistic energy harvesting.
17. A new approach to weighted sum-rate maximization for the K-user Gaussian interference channel.
18. Time-Aware VMFlow Placement, Routing, and Migration for Power Efficiency in Data Centers.
19. Power-efficient resource-guaranteed VM placement and routing for time-aware data center applications.
20. Sector-Based Routing with Destination Location Prediction for Underwater Mobile Networks.
21. Handling Double-Link Failures in Metro Ethernet Networks Using Fast Spanning Tree Reconnection.
22. Fast Spanning Tree Reconnection for Resilient Metro Ethernet Networks.
23. Connectivity Aware Protected Working Lightpath Envelope.
24. MU-Sync: a time synchronization protocol for underwater mobile networks.
25. Lightpath-Protecting p-Cycle Selection for Protected Working Lightpath Envelope.
26. MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors.
27. Trade-offs between mobility and density for coverage in wireless sensor networks.
28. Energy-efficient coverage for target detection in wireless sensor networks.
29. Aloha-Based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks.
30. Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks.
31. A Unified Network Control and Management System for an Integrated EPON and Metro Optical Network Testbed.
32. Protected Working Lightpath Envelope: a New Paradigm for Dynamic Survivable Routing.
33. Investigating network architectures for body sensor networks.
34. Finding an Optimum Maximum Congestion Window for TCP Reno over 802.11 Based Ad Hoc Networks.
35. Offline Route Optimization Considering Streamline Effect in Optical Burst Switching Networks.
36. Adaptive Proportional Flow Routing in Optical Burst Switching Networks.
37. Coverage for target localization in wireless sensor networks.
38. The Study of False Route Breakage in IEEE 802.11 based Ad Hoc Networks.
39. Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs.
40. Two-Level Fractional Guard Channels for Priority Access in Cellular Systems.
41. System Capacity of a Multi-Time-Hopping PPM UWB System Supporting Variable Bit Rate Multiclass Services with Rake Receivers.
42. Residual Admission Capacity in Optical Burst Switching Networks and its Application in Routing Loss-Guaranteed Flows.
43. Sensor Density for Complete Information Coverage in Wireless Sensor Networks.
44. Scheduling sensor activity for point information coverage in wireless sensor networks.
45. Capacity Region of a Multi-Code DS-UWB System with Rayleigh Monocycles Supporting Variable Bit Rate Multiclass Services.
46. The Streamline effect in OBS networks and its application in load balancing.
47. Using mobile relays to prolong the lifetime of wireless sensor networks.
48. Capacity region of a multi-code DS-UWB system supporting variable bit rate multiclass services.
49. Multi-level Dynamic Guard Channels for Priority Access in Cellular Systems.
50. Worst and Best Information Exposure Paths in Wireless Sensor Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.