Browsing by Author Hoang, D

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 29 to 40 of 40< previous 
Issue DateTitleAuthor(s)
22-Nov-2006PARM: A Physically-Aware Reference Model for Overlay InternetworkingLe, H; Hoang, D; Simmonds, A
1-Dec-2008A pervasive tele-health system for continual and low intrusive monitoring using peer-to-peer networksLe, H; Schiff, N; Plessis, JD; Hoang, D
1-Jan-2002Practical active network services within content-aware gatewaysSubramanian, S; Wang, P; Durairaj, R; Rasimas, J; Travostino, F; Lavian, T; Hoang, D
1-Dec-2010Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
1-Dec-2009Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D
2002Resource Allocating for Video-on-Demand with Delayed Multicast ProtocolNguyen, DNC; Hoang, D; Symvonis, A; NA
25-Sep-2008S-Web: An efficient and self-organizing wireless sensor network modelLe, H; Hoang, D; Poliah, R
20-Jul-2010Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D
12-Sep-2005A self-organising model for topology-aware overlay formationLe, H; Hoang, D; Simmonds, A
9-Sep-2019Trust-based Scheduling Framework for Big Data Processing with MapReduceDang, D; Hoang, D; Nguyen, D
12-Sep-2013Visual analytics for intrusion detection in spam emailsZhang, J; Huang, ML; Hoang, D
1-Jan-2007Wireless technologies and architectures for health monitoring systemsHoang, D