Short pages

Jump to navigation Jump to search

Showing below up to 50 results in range #51 to #100.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Mobile social application platform development(1) ‎[1,248 bytes]
  2. (hist) ‎Indoor localisation based on RF-signal-strength ‎[1,267 bytes]
  3. (hist) ‎Design and Implementation of a Sandbox Environment on a Mobile Phone ‎[1,278 bytes]
  4. (hist) ‎Gavel ‎[1,321 bytes]
  5. (hist) ‎Implementation and Deployment of Phoenix Network Coordinate System ‎[1,324 bytes]
  6. (hist) ‎Exercises dc ‎[1,325 bytes]
  7. (hist) ‎Predicting income based on house price ‎[1,333 bytes]
  8. (hist) ‎Management and Orchestration: Design and Implementation of NFV Management and Orchestration Layer with OpenStack, based on the ESTI NFVI-MANO and OPNFV frameworks. ‎[1,351 bytes]
  9. (hist) ‎An Analysis of OSN based Sybil Defenses ‎[1,382 bytes]
  10. (hist) ‎Detail ‎[1,384 bytes]
  11. (hist) ‎Implementation and Evaluation of Hybrid Overlay Structure ‎[1,408 bytes]
  12. (hist) ‎Implementation and Evaluation of a Decentralized Authentication System based on Social Groups ‎[1,452 bytes]
  13. (hist) ‎Activity recognition from RSSI on android mobile phones ‎[1,486 bytes]
  14. (hist) ‎Computer Networks (Summer 2016) ‎[1,503 bytes]
  15. (hist) ‎Evaluation of the Routing Performance of various Mobility Solutions ‎[1,504 bytes]
  16. (hist) ‎VNF components: Implementation of Virtual Network Functions like Proxy Engines, Firewall, IDS and IPS, on top of OpenNetVM, Docker engines using the available open source tools. ‎[1,520 bytes]
  17. (hist) ‎Robustness analysis and real world deployments ‎[1,537 bytes]
  18. (hist) ‎Development of a Thunderbird Extension for social connection ‎[1,550 bytes]
  19. (hist) ‎Development of a Thunderbird Extension for Social Connection ‎[1,550 bytes]
  20. (hist) ‎Social Interest based Peer-to-peer management and optimization ‎[1,574 bytes]
  21. (hist) ‎Video Delivery: Implementation and validation of SAID, a congestion control protocol for Multicast (A joint project with CISCO) ‎[1,578 bytes]
  22. (hist) ‎Migrating Online Social Networks to Home Gateways ‎[1,579 bytes]
  23. (hist) ‎P2P optimization: evaluation of different trust and reputation metrics ‎[1,589 bytes]
  24. (hist) ‎NSH Routing: Implementation of Network Service Headers to realize the service chain by steering traffic across the VNFs. ‎[1,595 bytes]
  25. (hist) ‎More ‎[1,670 bytes]
  26. (hist) ‎SDN Simulator: Implementation and validation of NS-3 or OMNET++ based SDN Simulator ‎[1,679 bytes]
  27. (hist) ‎Exploring Academic-Social Influence based on Citation and Collaboration Network Analysis ‎[1,727 bytes]
  28. (hist) ‎Gemstone: Decentralizing Social Networks ‎[1,738 bytes]
  29. (hist) ‎Infrastructureless, Delay Tolerant Network in different Context: Internet of Things, Emergency, Mobile Social Networks, Pervasive Computing ‎[1,756 bytes]
  30. (hist) ‎Multiple machine learning tasks ‎[1,759 bytes]
  31. (hist) ‎Computer Networks (Summer 2017) ‎[1,811 bytes]
  32. (hist) ‎Basic onos ‎[1,860 bytes]
  33. (hist) ‎Exercises pyretic firewall ‎[1,882 bytes]
  34. (hist) ‎Secure authentication from ambient audio ‎[1,890 bytes]
  35. (hist) ‎Exercises pyretic debugging ‎[1,916 bytes]
  36. (hist) ‎Sdn-Geant-mayutan ‎[1,927 bytes]
  37. (hist) ‎Software-defined Networking (Winder 2017/2018) ‎[1,968 bytes]
  38. (hist) ‎Evaluation of Human Altruism with DTN based data forwarding ‎[1,975 bytes]
  39. (hist) ‎Sdn-exercises-mayutan ‎[1,998 bytes]
  40. (hist) ‎Main Page ‎[2,021 bytes]
  41. (hist) ‎ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation ‎[2,026 bytes]
  42. (hist) ‎Introduction to Software-defined Networking (Winter 2014/2015) ‎[2,102 bytes]
  43. (hist) ‎Securing Phoenix Network Coordinate System ‎[2,174 bytes]
  44. (hist) ‎Predicting Fine-grained Regional Economic data based on multiple data sources ‎[2,185 bytes]
  45. (hist) ‎Student projects (Winter 2014/2015) ‎[2,197 bytes]
  46. (hist) ‎Exercises firewall ‎[2,231 bytes]
  47. (hist) ‎Computer Networks (Summer 2014) ‎[2,369 bytes]
  48. (hist) ‎Fake Account Detection in Social Networks with Machine Learning ‎[2,372 bytes]
  49. (hist) ‎Computer Networks (Summer 2013) ‎[2,374 bytes]
  50. (hist) ‎Understanding the information propagation process in social networks ‎[2,386 bytes]

View ( | ) (20 | 50 | 100 | 250 | 500)