Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ct.\*:("Operation, maintenance, reliability of teleprocessing networks")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 844

  • Page / 34
Export

Selection :

  • and

Modeling Information Dissemination in Generalized Social NetworksCHOU, Yu-Feng; HUANG, Hsin-Heng; CHENG, Ray-Guang et al.IEEE communications letters. 2013, Vol 17, Num 7, pp 1356-1359, issn 1089-7798, 4 p.Article

SplitScreen: Enabling Efficient, Distributed Malware DetectionSANG KIL CHA; MORARU, Iulian; JIYONG JANG et al.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 2, pp 187-200, issn 1229-2370, 14 p.Article

The professionalisation paths of hackers in IT security : The sociology of a divided identity : La sécurité dans un monde numériqueAURAY, Nicolas; KAMINSKY, Danielle.Annales des télécommunications. 2007, Vol 62, Num 11-12, pp 1312-1326, issn 0003-4347, 15 p.Article

INVUS : Intelligent VUInerability scannerAKYUZ, Turker; SOGUKPINAR, Ibrahim.Lecture notes in computer science. 2005, pp 264-265, issn 0302-9743, isbn 3-540-28791-4, 2 p.Conference Paper

Perceptually tuned packet scheduler for video streaming for DAB based access GRIDKIM, Seong-Whan; SUTHAHARAN, Shan.Lecture notes in computer science. 2004, pp 967-970, issn 0302-9743, isbn 3-540-23564-7, 4 p.Conference Paper

GBF: a grammar based filter for internet applicationsZAKI, M; DARWISH, M. G; OSMAN, G et al.Journal of network and computer applications. 2003, Vol 26, Num 3, pp 229-257, issn 1084-8045, 29 p.Article

Canaux cachés = Hidden channelsRAYNAL, Frédéric.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num H5860, pp H5860.1-H5860.10Article

Sécurité informatique pour la gestion des risques = Computer security for risk managementVALLEE, Frédérique.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num SE2500, pp SE2500.1-SE2500.20Article

Reserved delivery subnetwork configuration algorithm with the maximum sharing shortest path treeQIU, Ruibiao.SPIE proceedings series. 2003, pp 86-93, isbn 0-8194-5127-4, 8 p.Conference Paper

A secure web-based global Management system for firewall/VPN devicesCHOI, Mi-Jung; HONG, James Won-Ki.Journal of communication and networks. 2002, Vol 4, Num 1, pp 71-78, issn 1229-2370Article

ISPs and denial of service attacksNARAYANASWAMY, K.Information systems security. 2002, Vol 11, Num 2, pp 38-46, issn 1065-898XArticle

The case for privacyCORBY, Michael J.Information systems security. 2002, Vol 11, Num 2, pp 9-14, issn 1065-898XArticle

HIT: A new approach for Hiding multimedia information in TextEL-KWAE, Essam A; LI CHENG.SPIE proceedings series. 2002, pp 132-140, isbn 0-8194-4415-4Conference Paper

Performance analysis of error handling methods applied to a broadband PLC access networkHRASNICA, Halid; LEHNERT, Ralf.SPIE proceedings series. 2002, pp 166-177, isbn 0-8194-4644-0, 12 p.Conference Paper

A genetic algorithm for Steiner tree optimization with multiple constraints using Prüfer numberHAGHIGHAT, A. T; FAEZ, K; DEHGHAN, M et al.Lecture notes in computer science. 2002, pp 272-280, issn 0302-9743, isbn 3-540-00028-3, 9 p.Conference Paper

Differentiated bandwidth allocation and power saving for wireless personal area networksLEE, Tae-Jin; KIM, Yongsuk.Lecture notes in computer science. 2002, pp 778-785, issn 0302-9743, isbn 3-540-00028-3, 8 p.Conference Paper

Modeling and simulation for detecting a distributed denial of service attackSUK, Seo Hee; HO, Cho Tae.Lecture notes in computer science. 2002, pp 179-190, issn 0302-9743, isbn 3-540-00197-2, 12 p.Conference Paper

Measuring performance of dynamic Web Service Migration using LAMSMIFSUD, Trent; STANSKI, Peter.SoftCOM 2002 : international conference on software, telecommunications and computer networksSoftCOM 2002 : international conference on software, telecommunications and computer networks. 2002, pp 214-218, isbn 953-6114-52-6, 5 p.Conference Paper

Automatic repairing of Web wrappers by combining redundant viewsCHIDLOVSKII, Boris.Proceedings - International Conference on Tools with Artificial Intelligence, TAI. 2002, pp 399-406, issn 1082-3409, isbn 0-7695-1849-4, 8 p.Conference Paper

User profiling for intrusion detection using dynamic and static behavioral modelsYEUNG, Dit-Yan; YUXIN DING.Lecture notes in computer science. 2002, pp 494-505, issn 0302-9743, isbn 3-540-43704-5Conference Paper

An open architecture for transparently embedding advanced traffic control functionality in ATM switchesKORMENTZAS, Georgios; KONTOVASILIS, Kimon.Journal of communication and networks. 2001, Vol 3, Num 1, pp 64-77, issn 1229-2370Article

UPM: Unified policy-based network managementLAW, K. L; SAXENA, Achint.SPIE proceedings series. 2001, pp 326-337, isbn 0-8194-4247-XConference Paper

The i-OpenDiosa drives to integrate a mission critical system for Internet business based on J2EE : Middleware products and technologiesOHNO, Shuji; AONO, Hidechika; OHKURA, Takahiro et al.NEC research & development. 2000, Vol 41, Num 4, pp 301-306, issn 0547-051XArticle

QDMR : An efficient QoS dependent multicast routing algorithmMATTA, I; GUO, L.Journal of communication and networks. 2000, Vol 2, Num 2, pp 168-176, issn 1229-2370Article

A comparative study of contention resolution policies in optical burst switched WDM networksYOO, Myungsik; CHUNMING QIAO; DIXIT, Sudhir et al.SPIE proceedings series. 2000, pp 124-135, isbn 0-8194-3878-2Conference Paper

  • Page / 34