Timo T Hämäläinen
Cited by
Cited by
Ensuring the QoS requirements in 802.16 scheduling
A Sayenko, O Alanen, J Karhula, T Hämäläinen
Proceedings of the 9th ACM international symposium on Modeling analysis and …, 2006
Scheduling solution for the IEEE 802.16 base station
A Sayenko, O Alanen, T Hämäläinen
Computer Networks 52 (1), 96-115, 2008
Factors affecting Nigerian teacher educators’ technology integration: Considering characteristics, knowledge constructs, ICT practices and beliefs
E Ifinedo, J Rikala, T Hämäläinen
Computers & education 146, 103760, 2020
Online anomaly detection using dimensionality reduction techniques for HTTP log analysis
A Juvonen, T Sipola, T Hämäläinen
Computer Networks 91, 46-56, 2015
An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach
F Hosseinpour, P Vahdani Amoli, J Plosila, T Hämäläinen, H Tenhunen
International Journal of Digital Content Technology and its Applications 10 (5), 2016
Analysis of HTTP requests for anomaly detection of web attacks
M Zolotukhin, T Hämäläinen, T Kokkonen, J Siltanen
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure …, 2014
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic
M Zolotukhin, T Hämäläinen, T Kokkonen, J Siltanen
2016 23rd International conference on telecommunications (ICT), 1-6, 2016
Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals
P Hämäläinen, M Hännikäinen, T Hämäläinen, J Saarinen
2000 10th European Signal Processing Conference, 1-4, 2000
Complexity analysis of next-generation HEVC decoder
M Viitanen, J Vanne, TD Hämäläinen, M Gabbouj, J Lainema
2012 IEEE International Symposium on Circuits and Systems (ISCAS), 882-885, 2012
Methods and arrangements for realising betting with off-line terminals
T Hämäläinen, R Rautee, M Hännikäinen, J Rekonius
US Patent 7,543,152, 2009
Detection of zero-day malware based on the analysis of opcode sequences
M Zolotukhin, T Hämäläinen
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 386-391, 2014
Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach
F Hosseinpour, PV Amoli, F Farahnakian, J Plosila, T Hämäläinen
International Journal of Digital Content Technology and its Applications 8 …, 2014
Wireless sensor prototype platform
M Kohvakka, M Hannikainen, TD Hamalainen
IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society …, 2003
Machine learning classification model for network based intrusion detection system
S Kumar, A Viinikainen, T Hamalainen
2016 11th international conference for internet technology and secured …, 2016
Efficient hardware implementation of security processing for IEEE 802.15. 4 wireless networks
P Hamalainen, M Hannikainen, TD Hamalainen
48th Midwest Symposium on Circuits and Systems, 2005., 484-487, 2005
Value iteration and adaptive optimal output regulation with assured convergence rate
Y Jiang, W Gao, J Na, D Zhang, TT Hämäläinen, V Stojanovic, FL Lewis
Control Engineering Practice 121, 105042, 2022
MARTE profile extension for modeling dynamic power management of embedded systems
T Arpinen, E Salminen, TD Hämäläinen, M Hännikäinen
Journal of Systems Architecture 58 (5), 209-219, 2012
Performance model for IEEE 802.11 s wireless mesh network deployment design
T Vanhatupa, M Hännikäinen, TD Hämäläinen
Journal of Parallel and Distributed Computing 68 (3), 291-305, 2008
HIBI-based multiprocessor SoC on FPGA
E Salminen, A Kulmala, TD Hamalainen
2005 IEEE International Symposium on Circuits and Systems, 3351-3354, 2005
Rapid design and evaluation framework for wireless sensor networks
M Kuorilehto, M Hännikäinen, TD Hämäläinen
Ad Hoc Networks 6 (6), 909-935, 2008
The system can't perform the operation now. Try again later.
Articles 1–20