Browsing byAuthorHoang, D

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 26 to 44 of 44< previous 
Issue DateTitleAuthor(s)
2005-12-01Network support for distributed Web servicesYousef, B; Hoang, D; Thamsakorn, P; Le, H; Chan, J
2009-10-19A new security scheme for E-health systemLi, W; Hoang, D
2016-08-23A novel Hash-Based File Clustering scheme for efficient distributing, storing and retrieving of large scale Health RecordsDang, TD; Hoang, D; Nanda, P
2016-01-01A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health recordsDang, TD; Hoang, D; Nanda, P
2005-12-01An optimised geographically-aware overlay networkLe, H; Hoang, D; Simmonds, A
2006-11-22PARM: A Physically-Aware Reference Model for Overlay InternetworkingLe, H; Hoang, D; Simmonds, A
2008-12-01A pervasive tele-health system for continual and low intrusive monitoring using peer-to-peer networksLe, H; Schiff, N; Plessis, JD; Hoang, D
2002-01-01Practical active network services within content-aware gatewaysSubramanian, S; Wang, P; Durairaj, R; Rasimas, J; Travostino, F; Lavian, T; Hoang, D
2010-12-01Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
2009-12-01Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D
2019-11-29Realisation of congestion-aware energy-aware virtual link embeddingPham, MNT; Chaczko, Z; Hoang, D
2002Resource Allocating for Video-on-Demand with Delayed Multicast ProtocolNguyen, DNC; Hoang, D; Symvonis, A; NA
2008-09-25S-Web: An efficient and self-organizing wireless sensor network modelLe, H; Hoang, D; Poliah, R
2010-07-20Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D
2005-09-12A self-organising model for topology-aware overlay formationLe, H; Hoang, D; Simmonds, A
2020-05Software-Defined Virtual Sensors for Provisioning IoT Services on DemandNguyen, C; Hoang, D
2020Trust-based Scheduling Framework for Big Data Processing with MapReduceDang, D; Hoang, D; Nguyen, D
2013-09-12Visual analytics for intrusion detection in spam emailsZhang, J; Huang, ML; Hoang, D
2007-01-01Wireless technologies and architectures for health monitoring systemsHoang, D