Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 1-10 of 50 total results
Journal of Mobile, Embedded and Distributed Systems ...
Journal of Mobile, Embedded and Distributed Systems.. Home. WorldCat Home About WorldCat Help. Search. Search for Library Items Search for Lists Search for Contacts Search for a Library. Create lists, bibliographies and reviews: or Search WorldCat. Find items in libraries near you ...
Journal of mobile, embedded and distributed systems ...
Journal of mobile, embedded and distributed systems JMEDS: Reviews. User-contributed reviews. Tags. Add tags for "Journal of mobile, embedded and distributed systems.". Be the first. Similar Items. Related Subjects: (6) Mobile communication systems -- Periodicals. Embedded computer systems -- Periodicals. ...
Journal of Mobile, Embedded and Distributed Systems - JMEDS
Refbacks. There are currently no refbacks. Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)
Journal of Mobile, Embedded and Distributed Systems - JMEDS
Journal of Mobile, Embedded and Distributed Systems - JMEDS Article Tools. Print this article
(PDF) Techniques of Program Code Obfuscation for Secure ...
The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely ...
Approaches on Internet of Things Solutions - Wikisource ...
Figure 1. Internet of Things components. A Smart Object contains IoT data and information, also metadata and software agent code resources, such as application software event handler. Samples of Smart Objects are embedded devices such as Rasberry Pi, Arduino, BeagleBone/Ninja Blocks. The data model for broad interoperability is represented by the Smart Object API.
Future Developments in Non-Repudiation in GSM WAP ...
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Page 23 Fig. 2. GSM Mobile Equipment Structure The GSM evolution is based on this infrastructure and the security of the entire system depends on many factors. 2. GSM Voice and Data Security
(PDF) Facial Recognition using OpenCV
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text.
 Facial Recognition using OpenCV - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
1 2 3 4 5
Pages
|