Short pages
Jump to navigation
Jump to search
Showing below up to 50 results in range #51 to #100.
- (hist) Mobile social application platform development(1) [1,248 bytes]
- (hist) Indoor localisation based on RF-signal-strength [1,267 bytes]
- (hist) Design and Implementation of a Sandbox Environment on a Mobile Phone [1,278 bytes]
- (hist) Gavel [1,321 bytes]
- (hist) Implementation and Deployment of Phoenix Network Coordinate System [1,324 bytes]
- (hist) Exercises dc [1,325 bytes]
- (hist) Predicting income based on house price [1,333 bytes]
- (hist) Management and Orchestration: Design and Implementation of NFV Management and Orchestration Layer with OpenStack, based on the ESTI NFVI-MANO and OPNFV frameworks. [1,351 bytes]
- (hist) An Analysis of OSN based Sybil Defenses [1,382 bytes]
- (hist) Detail [1,384 bytes]
- (hist) Implementation and Evaluation of Hybrid Overlay Structure [1,408 bytes]
- (hist) Implementation and Evaluation of a Decentralized Authentication System based on Social Groups [1,452 bytes]
- (hist) Activity recognition from RSSI on android mobile phones [1,486 bytes]
- (hist) Computer Networks (Summer 2016) [1,503 bytes]
- (hist) Evaluation of the Routing Performance of various Mobility Solutions [1,504 bytes]
- (hist) VNF components: Implementation of Virtual Network Functions like Proxy Engines, Firewall, IDS and IPS, on top of OpenNetVM, Docker engines using the available open source tools. [1,520 bytes]
- (hist) Robustness analysis and real world deployments [1,537 bytes]
- (hist) Development of a Thunderbird Extension for social connection [1,550 bytes]
- (hist) Development of a Thunderbird Extension for Social Connection [1,550 bytes]
- (hist) Social Interest based Peer-to-peer management and optimization [1,574 bytes]
- (hist) Video Delivery: Implementation and validation of SAID, a congestion control protocol for Multicast (A joint project with CISCO) [1,578 bytes]
- (hist) Migrating Online Social Networks to Home Gateways [1,579 bytes]
- (hist) P2P optimization: evaluation of different trust and reputation metrics [1,589 bytes]
- (hist) NSH Routing: Implementation of Network Service Headers to realize the service chain by steering traffic across the VNFs. [1,595 bytes]
- (hist) More [1,670 bytes]
- (hist) SDN Simulator: Implementation and validation of NS-3 or OMNET++ based SDN Simulator [1,679 bytes]
- (hist) Exploring Academic-Social Influence based on Citation and Collaboration Network Analysis [1,727 bytes]
- (hist) Gemstone: Decentralizing Social Networks [1,738 bytes]
- (hist) Infrastructureless, Delay Tolerant Network in different Context: Internet of Things, Emergency, Mobile Social Networks, Pervasive Computing [1,756 bytes]
- (hist) Multiple machine learning tasks [1,759 bytes]
- (hist) Computer Networks (Summer 2017) [1,811 bytes]
- (hist) Basic onos [1,860 bytes]
- (hist) Exercises pyretic firewall [1,882 bytes]
- (hist) Secure authentication from ambient audio [1,890 bytes]
- (hist) Exercises pyretic debugging [1,916 bytes]
- (hist) Sdn-Geant-mayutan [1,927 bytes]
- (hist) Software-defined Networking (Winder 2017/2018) [1,968 bytes]
- (hist) Evaluation of Human Altruism with DTN based data forwarding [1,975 bytes]
- (hist) Sdn-exercises-mayutan [1,998 bytes]
- (hist) Main Page [2,021 bytes]
- (hist) ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation [2,026 bytes]
- (hist) Introduction to Software-defined Networking (Winter 2014/2015) [2,102 bytes]
- (hist) Securing Phoenix Network Coordinate System [2,174 bytes]
- (hist) Predicting Fine-grained Regional Economic data based on multiple data sources [2,185 bytes]
- (hist) Student projects (Winter 2014/2015) [2,197 bytes]
- (hist) Exercises firewall [2,231 bytes]
- (hist) Computer Networks (Summer 2014) [2,369 bytes]
- (hist) Fake Account Detection in Social Networks with Machine Learning [2,372 bytes]
- (hist) Computer Networks (Summer 2013) [2,374 bytes]
- (hist) Understanding the information propagation process in social networks [2,386 bytes]