Long pages
Showing below up to 50 results in range #151 to #200.
- (hist) Telematics (Summer 2010) [3,329 bytes]
- (hist) Computer Networks (Winter 2013/2014) [3,294 bytes]
- (hist) AI-Empowered Networking and Mobile Communications(Summer 2024) [3,279 bytes]
- (hist) Advanced Computer Networks (Summer 2014) [3,226 bytes]
- (hist) Practical Course Networking Lab (Winter 2014/2015) [3,120 bytes]
- (hist) Advanced Computer Networks (Summer 2015) [3,111 bytes]
- (hist) Advanced Computer Networks (Summer 2024) [3,075 bytes]
- (hist) Advanced Software-defined Networking (Winter 2014/2015) [3,043 bytes]
- (hist) Practical Course Networking Lab (Summer 2009) [3,043 bytes]
- (hist) Advanced Computer Networks (Summer 2022) [3,003 bytes]
- (hist) Advanced Computer Networks (Summer 2013) [2,971 bytes]
- (hist) Computer Networks (Winter 2017/2018) [2,954 bytes]
- (hist) Advanced Computer Networks (Summer 2018) [2,950 bytes]
- (hist) Practical Course Networking Lab (Winter 2012/2013) [2,936 bytes]
- (hist) Advanced Computer Networks (Summer 2021) [2,931 bytes]
- (hist) Computer Networks (Summer 2015) [2,915 bytes]
- (hist) Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community [2,810 bytes]
- (hist) Advanced Topics in Computer Networking (Winter 2009/2010) [2,805 bytes]
- (hist) Advanced Computer Networks (Summer2020) [2,737 bytes]
- (hist) Advanced Computer Networks(Summer 2024) [2,736 bytes]
- (hist) Advanced Computer Networks (Winter 2023/2024) [2,736 bytes]
- (hist) Advanced Computer Networks (Summer 2023) [2,736 bytes]
- (hist) Advanced Topics in Mobile Communications (AToMIC) (Winter 2019/2020) [2,592 bytes]
- (hist) Computer Networks (Summer 2011) [2,492 bytes]
- (hist) Designing and Implementing hundreds of cool mobility-related features for User Profiling [2,490 bytes]
- (hist) Advances in Mobile Applications and Mobile Cloud Computing(Summer 2014) [2,481 bytes]
- (hist) Advanced Topics in Mobile Communications (AToMIC) (Summer 2016) [2,449 bytes]
- (hist) Computer Networks (Summer 2012) [2,448 bytes]
- (hist) Understanding the information propagation process in social networks [2,386 bytes]
- (hist) Computer Networks (Summer 2013) [2,374 bytes]
- (hist) Fake Account Detection in Social Networks with Machine Learning [2,372 bytes]
- (hist) Computer Networks (Summer 2014) [2,369 bytes]
- (hist) Exercises firewall [2,231 bytes]
- (hist) Student projects (Winter 2014/2015) [2,197 bytes]
- (hist) Predicting Fine-grained Regional Economic data based on multiple data sources [2,185 bytes]
- (hist) Securing Phoenix Network Coordinate System [2,174 bytes]
- (hist) Introduction to Software-defined Networking (Winter 2014/2015) [2,102 bytes]
- (hist) ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation [2,026 bytes]
- (hist) Main Page [2,021 bytes]
- (hist) Sdn-exercises-mayutan [1,998 bytes]
- (hist) Evaluation of Human Altruism with DTN based data forwarding [1,975 bytes]
- (hist) Software-defined Networking (Winder 2017/2018) [1,968 bytes]
- (hist) Sdn-Geant-mayutan [1,927 bytes]
- (hist) Exercises pyretic debugging [1,916 bytes]
- (hist) Secure authentication from ambient audio [1,890 bytes]
- (hist) Exercises pyretic firewall [1,882 bytes]
- (hist) Basic onos [1,860 bytes]
- (hist) Computer Networks (Summer 2017) [1,811 bytes]
- (hist) Multiple machine learning tasks [1,759 bytes]
- (hist) Infrastructureless, Delay Tolerant Network in different Context: Internet of Things, Emergency, Mobile Social Networks, Pervasive Computing [1,756 bytes]