Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protocole WAP")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 75

  • Page / 3
Export

Selection :

  • and

WirelessHART Field DevicesMULLER, Ivan; CESAR NETTO, Joao; EDUARDO PEREIRA, Carlos et al.IEEE instrumentation & measurement magazine. 2011, Vol 14, Num 6, pp 20-25, issn 1094-6969, 6 p.Article

Evaluation of WAP network configuration supporting enhanced securitySHEORAN, Shailesh; LEUNG, Victor C. M.Interantional conference on consumer electronics. 2002, pp 78-79, isbn 0-7803-7300-6, 2 p.Conference Paper

A passive testing approach based on invariants: application to the WAPBAYSE, Emmanuel; CAVALLI, Ana; NUNEZ, Manuel et al.Computer networks (1999). 2005, Vol 48, Num 2, pp 247-266, issn 1389-1286, 20 p.Article

New families of hyperelliptic curves with efficient gallant -lambert -vanstone methodTAKASHIMA, Katsuyuki.Lecture notes in computer science. 2005, pp 279-295, issn 0302-9743, isbn 3-540-26226-1, 17 p.Conference Paper

WAPS: Web application prototyping systemPAIANO, Roberto; PANDURINO, Andrea.Lecture notes in computer science. 2004, pp 256-260, issn 0302-9743, isbn 3-540-22511-0, 5 p.Conference Paper

Mobile commerce: Its market analysesLING BAI; CHOU, David C; YEN, David C et al.International journal of mobile communications (print). 2005, Vol 3, Num 1, pp 66-81, issn 1470-949X, 16 p.Article

Robot teleoperation environments featuring WAP-based wireless devicesSGOUROS, Nikitas M; GEROGIANNAKIS, Stelios.Journal of network and computer applications. 2003, Vol 26, Num 3, pp 259-271, issn 1084-8045, 13 p.Article

A wap-enabled transaction model for mobile multidatabasesRADHAMANI, G; SIDDIQI, M. U.International journal of computers & applications. 2004, Vol 26, Num 1, pp 48-53, issn 1206-212X, 6 p.Article

Voice enabled request and response for Mobile devices supporting WAP protocol: The constraintsMOHAN, Aditya; MOHAN, Akshay.European conference on universal multiservice networks. 2000, pp 185-194, isbn 0-7803-6419-8Conference Paper

A top-down algorithm for mining web access patterns from web logsGUO, Jian-Kui; RUAN, Bei-Jun; CHENG, Zun-Ping et al.Lecture notes in computer science. 2005, pp 838-843, issn 0302-9743, isbn 3-540-26076-5, 6 p.Conference Paper

Parallel implementation of WAP-tree mining algorithmMING WU; MOON JUNG CHUNG; MOONESINGHE, H. D. K et al.International conference on parallel and distributed simulation. 2004, pp 135-142, isbn 0-7695-2152-5, 1Vol, 8 p.Conference Paper

Wolf Attack Probability : A Theoretical Security Measure in Biometric Authentication Systems : Information and Communication System SecurityUNE, Masashi; OTSUKA, Akira; IMAI, Hideki et al.IEICE transactions on information and systems. 2008, Vol 91, Num 5, pp 1380-1389, issn 0916-8532, 10 p.Article

A two-player game system implemented under WAPWARREN, Andrew; EXCELL, Peter S; WYATT-MILLINGTON, William et al.International journal of mobile communications (print). 2005, Vol 3, Num 1, pp 38-48, issn 1470-949X, 11 p.Article

Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networksBARAKAT, Tamer M; ISMAIL, Ibrahim I; ALI, Ihab A et al.IEEE symposium on computers communications. 2004, isbn 0-7803-8623-X, 2Vol, vol1, 306-311Conference Paper

Searching for self-similarity in GPRSKALDEN, Roger; IBRAHIM, Sami.Lecture notes in computer science. 2004, pp 83-92, issn 0302-9743, isbn 3-540-21492-5, 10 p.Conference Paper

PC cluster based Parallel frequent pattern mining and Parallel web access pattern miningKITSUREGAWA, Masaru; PRAMUDIONO, Iko.Lecture notes in computer science. 2003, pp 172-176, issn 0302-9743, isbn 3-540-20111-4, 5 p.Conference Paper

WAPIOP: A WAP-based inter-ORB protocolROTHKUGEL, Steffen.IEE conference publication. 2003, pp 151-156, issn 0537-9989, isbn 0-85296-753-5, 6 p.Conference Paper

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf AttackINUMA, Manabu; OTSUKA, Akira; IMAI, Hideki et al.IEICE transactions on information and systems. 2013, Vol 96, Num 2, pp 357-364, issn 0916-8532, 8 p.Article

Exploring Image Registration Techniques for Layered SensingMENDOZA-SCHROCK, Olga; PATRICK, James A; GARING, Matthew et al.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7347, issn 0277-786X, isbn 978-0-8194-7613-5 0-8194-7613-7, 1Vol, 73470V.1-73470V.15Conference Paper

Security Analysis of Yeh-Tsai Security Mechanism : Information and Communication System SecurityDAE HYUN YUM; JONG HOON SHIN; PIL JOONG LEE et al.IEICE transactions on information and systems. 2008, Vol 91, Num 5, pp 1477-1480, issn 0916-8532, 4 p.Article

Time Based Patterns in Mobile-Internet SurfingHALVEY, Martin; KEANE, Mark T; SMYTH, Barry et al.CHI Conference. 2006, pp 31-34, isbn 1-59593-178-3, 4 p.Conference Paper

An efficient approach for mining periodic sequential access patternsBAOYAO ZHOU; SIU CHEUNG HUI; CHEUK MING FONG, Alvis et al.Lecture notes in computer science. 2004, pp 485-494, issn 0302-9743, isbn 3-540-22817-9, 10 p.Conference Paper

Modeling and analysis of WAP performance over wireless linksRUTAGEMWA, Humphrey; SHEN, Xuemin.IEEE transactions on mobile computing. 2003, Vol 2, Num 3, pp 221-232, issn 1536-1233, 12 p.Article

Quality of service and performance issues in multiservice networks subject to voice and video trafficsHOUETO, Fabien; PIERRE, Samuel.Computer communications. 2005, Vol 28, Num 4, pp 393-404, issn 0140-3664, 12 p.Article

A platform for secure e-gamblingBLUNDO, Carlo; CIMATO, Stelvio.International conference on information technology. 2004, isbn 0-7695-2108-8, 2Vol, vol2, 768-772Conference Paper

  • Page / 3