October 17, 2014

Learn to Personalized Image Search from the Photo Sharing Websites | FTJ1210

Learn to Personalized Image Search from the Photo Sharing Websites : IEEE 2012 Abstract: Increasingly developed social sharing websites, like Flickr and Youtube, allow users to […]
October 17, 2014

Independent Directed Acyclic Graphs for Resilient Multipath Routing | FTJ1209

Independent Directed Acyclic Graphs for Resilient Multipath Routing : IEEE 2012 Abstract: In order to achieve resilient multipath routing, we in­troduce the concept of independent directed […]
October 17, 2014

Fast Data Collection in Tree-Based Wireless Sensor Networks | FTJ1208

Fast Data Collection in Tree-Based Wireless Sensor Networks : IEEE 2012 Abstract: We investigate the following fundamental question—how fast can information be collected from a wireless […]
October 17, 2014

Detecting Spam Zombies by Monitoring Outgoing Messages | FTJ1207

Detecting Spam Zombies by Monitoring Outgoing Messages : IEEE 2012 Abstract: Compromised machines are one of the key security threats on the Internet; they are often […]
October 17, 2014

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs | FTJ1206

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs : IEEE 2012 Abstract: The multihop routing in wireless sensor networks (WSNs) offers little protection […]