Showing
1 - 11
results of
11
for search '
Ahmed, Tarem
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Ahmed, Tarem
Showing
1 - 11
results of
11
for search '
Ahmed, Tarem
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by
Pathan, Al-Sakib Khan
,
Ahmed
,
Tarem
Published 2014
Get full text
Get full text
Get full text
Book Chapter
Save to List
Saved in:
2
Adaptive algorithms for automated intruder detection in surveillance networks
by
Ahmed
,
Tarem
,
Pathan, Al-Sakib Khan
,
Ahmed, Supriyo
Published 2014
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
3
Automated surveillance in distributed, wireless visual networks: a comparative study
by
Ahmed
,
Tarem
,
Ahmed, Supriyo
,
Pathan, Al-Sakib Khan
Published 2013
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
4
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by
Ahmed
,
Tarem
,
Ahmed, Supriyo
,
Pathan, Al-Sakib Khan
Published 2014
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
5
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by
Wei, Xianglin
,
Ahmed
,
Tarem
,
Chen, Ming
,
Pathan, Al-Sakib Khan
Published 2012
Get full text
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
6
PMDA: A malicious peer detection algorithm for P2P systems
by
Wei, Xianglin
,
Ahmed
,
Tarem
,
Chen, Ming
,
Pathan, Al-Sakib Khan
Published 2011
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
7
Automated intruder detection from image sequences using minimum volume sets
by
Ahmed
,
Tarem
,
Wei, Xianglin
,
Ahmed, Supriyo
,
Pathan, Al-Sakib Khan
Published 2012
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
8
Efficient and effective automated surveillance agents using kernel tricks
by
Ahmed
,
Tarem
,
Wei, Xianglin
,
Ahmed, Supriyo
,
Pathan, Al-Sakib Khan
Published 2012
Get full text
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
9
Automated visual surveillance using kernel tricks
by
Ahmed
,
Tarem
,
Wei, Xianglin
,
Ahmed, Supriyo
,
Pathan, Al-Sakib Khan
Published 2013
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
10
Intruder detection in camera networks using the one-class neighbor machine
by
Ahmed
,
Tarem
Ozair
,
Wei, Xianglin
,
Ahmed, Supriyo
,
Pathan, Al-Sakib Khan
Published 2011
Get full text
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
11
SMART: a subspace based malicious peers detection algorithm for P2P systems
by
Wei, Xianglin
,
Fan, Jianhua
,
Chen, Ming
,
Ahmed
,
Tarem
,
Pathan, Al-Sakib Khan
Published 2013
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...