Browsing by Author Hoang, D

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 17 to 36 of 39< previous   next >
Issue DateTitleAuthor(s)
1-Jan-2015Health data in cloud environmentsHoang, D; Dat, DT
1-Jan-2014A hybrid domain enhanced framework for video retargeting with spatial-temporal importance and 3D grid optimizationWang, J; Xu, M; He, X; Lu, H; Hoang, D
20-Nov-2017Initial trust establishment for personal space IoT systemsNguyen, T; Hoang, D; Nguyen, D; Seneviratne, A
13-Jan-2017An intent-based network virtualization platform for SDNHan, Y; Li, J; Hoang, D; Yoo, JH; Hong, JWK
27-Sep-2004Introducing feedback congestion control to a network with IEEE 802.11 wireless LANZhou, H; Hoang, D; Nhan, P; Mirchandani, V
2-May-2018MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc networkVo, TT; Luong, NT; Hoang, D
12-Nov-2009Network security considerations for a new generation protocol UDTBernardo, DV; Hoang, D
1-Dec-2005Network support for distributed Web servicesYousef, B; Hoang, D; Thamsakorn, P; Le, H; Chan, J
19-Oct-2009A new security scheme for E-health systemLi, W; Hoang, D
23-Aug-2016A novel Hash-Based File Clustering scheme for efficient distributing, storing and retrieving of large scale Health RecordsDang, TD; Hoang, D; Nanda, P
1-Jan-2016A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health recordsDang, TD; Hoang, D; Nanda, P
1-Dec-2005An optimised geographically-aware overlay networkLe, H; Hoang, D; Simmonds, A
22-Nov-2006PARM: A Physically-Aware Reference Model for Overlay InternetworkingLe, H; Hoang, D; Simmonds, A
1-Dec-2008A pervasive tele-health system for continual and low intrusive monitoring using peer-to-peer networksLe, H; Schiff, N; Plessis, JD; Hoang, D
1-Jan-2002Practical active network services within content-aware gatewaysSubramanian, S; Wang, P; Durairaj, R; Rasimas, J; Travostino, F; Lavian, T; Hoang, D
1-Dec-2010Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
1-Dec-2009Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D
2002Resource Allocating for Video-on-Demand with Delayed Multicast ProtocolNguyen, DNC; Hoang, D; Symvonis, A; NA
25-Sep-2008S-Web: An efficient and self-organizing wireless sensor network modelLe, H; Hoang, D; Poliah, R
20-Jul-2010Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D