Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Dinh Thuc Nguyen"'
This volume brings together many contributions from leading research scientists, engineers and practitioners in computer science. Selected by program committee members, the topics describe innovative research and new technologies in the following are
Autor:
Dinh Thuc Nguyen
Publikováno v:
ICICDT
A highly current-efficient, low noise and fast transient response capacitor-free low-dropout regulator (LDO) for System-on-Chip (SoC) applications is presented. The proposed circuit is based on differential transconductance and push-pull amplifiers.
Publikováno v:
Advanced Computational Methods for Knowledge Engineering ISBN: 9783319179957
ICCSAMA
ICCSAMA
With the development of database-as-a-service (DaS), data in cloud is more interesting for researchers in both academia and commercial societies. Despite DaS’s convenience, there exist many considerable problems which concern end users about data l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f435c16e732ce77ecff47e77795b0c3
https://doi.org/10.1007/978-3-319-17996-4_17
https://doi.org/10.1007/978-3-319-17996-4_17
Autor:
Quoc-Binh Nguyen, Minh-Triet Tran, Isao Echizen, Hoang-Quoc Nguyen-Son, Dinh-Thuc Nguyen, Hiroshi Yoshiura
Publikováno v:
ARES
One approach to overcoming the problem of too much information about a user being disclosed on social networking services (by the user or by the user's friends) through natural language texts (blogs, comments, status updates, etc.) is to anonymize th
Autor:
Dinh-Thuc Nguyen, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Isao Echizen, Quoc-Binh Nguyen, Hiroshi Yoshiura
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789400745155
Users often share same text information for friends in different level groups on social networking services (SNSs). Moreover, it does not identify a person who has revealed the text. Some approaches overcome this problem by using anonymity text, but
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa0c5a74fbc5525ef8998663f083e89f
https://doi.org/10.1007/978-94-007-4516-2_77
https://doi.org/10.1007/978-94-007-4516-2_77
Publikováno v:
Mobile & Wireless Networks Security - Proceedings of the Mwns 2008 Workshop; 2008, p67-77, 11p, 3 Color Photographs, 1 Diagram, 2 Charts
Publikováno v:
Mobile and Wireless Networks Security.
Wireless local area networks (WLAN) have come into more popular, the security over wireless network is becoming a significant issue. Together with its higher and higher popularity, the internet has also shown more and more weakness of wireless protoc
Publikováno v:
Ictacs 2006 - Proceedings of the First International Conference on Theories & Applications of Computer Science 2006; 2006, p25-39, 15p
Publikováno v:
ICTACS 2006.
Publikováno v:
ICTACS 2006.