Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Red informática")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1512

  • Page / 61
Export

Selection :

  • and

ICOIN 2005 : information networking : convergence in broadband and mobile networking (Jeju Island, 31 January - 2 February 2005)Kim, Cheeha.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24467-0, XVII, 936 p, isbn 3-540-24467-0Conference Proceedings

RECENT ADVANCES IN TESTBED DRIVEN NETWORKING RESEARCHMAGEDANZ, Thomas; MAO, Shiwen; MIDKIFF, Scott F et al.International journal of communication networks and distributed systems (Print). 2010, Vol 5, Num 1-2, issn 1754-3916, 212 p.Conference Proceedings

NOTER ConferenceAnnales des télécommunications. 2006, Vol 61, Num 11-12, pp 1229-1402, issn 0003-4347, 173 p.Conference Paper

Erol Gelenbe's career and contributionsCAGLAYAN, Professor Ufuk.Lecture notes in computer science. 2005, pp 966-970, issn 0302-9743, isbn 3-540-29414-7, 1Vol, 5 p.Conference Paper

A universal trust framework for pervasive computingRUI HE; MAN YUAN; HONG ZHANG et al.SPIE proceedings series. 2004, pp 7-13, isbn 0-8194-5178-9, 7 p.Conference Paper

Computational Social SystemsSANTOS, Eunice E.Proceedings of the IEEE. 2012, Vol 100, pp 1271-1272, issn 0018-9219, 2 p., NSArticle

Networking issues in entertainment computingWOLF, Lars; NAKATSU, Ryohei; SCHELL, Jesse et al.Computer networks (1999). 2005, Vol 49, Num 1, issn 1389-1286, 121 p.Serial Issue

Administration de réseaux informatiques : protocole SNMP = Computer network administration: SNMP protocolWILLM, Olivier.Techniques de l'ingénieur. Informatique. 2003, Vol HB3, Num H2840, pp H2840.1-H2840.20, issn 0245-9612Article

Next Generation Wireless Communications and Mobile Computing/Networking TechnologiesTABEB, Tarik; LOPEZ, Javier.Wireless communications and mobile computing (Print). 2009, Vol 9, Num 4, issn 1530-8669, 147 p.Serial Issue

European Wireless 2006ANTON-HARO, Carles; KLEIN, Anja; LUISE, Marco et al.European transactions on telecommunications. 2007, Vol 18, Num 6, issn 1124-318X, 115 p.Conference Proceedings

A NEW PRIME p FOR WHICH THE LEAST PRIMITIVE ROOT (mod p) AND THE LEAST PRIMITIVE ROOT (mod p2) ARE NOT EQUALPASZKIEWICZ, A.Mathematics of computation. 2009, Vol 78, Num 266, pp 1193-1195, issn 0025-5718, 3 p.Article

Management in peer-to-peer systemsBOUTABA, Raouf; MARSHALL, Alan.Computer networks (1999). 2006, Vol 50, Num 4, issn 1389-1286, 130 p.Serial Issue

Selected papers from the European Wireless 2004 ConferenceWALKE, Bernhard; LENZINI, Luciano; JABBARI, Bijan et al.Computer networks (1999). 2005, Vol 49, Num 3, issn 1389-1286, 172 p.Conference Proceedings

Network Virtualization Technology to Support Cloud Services : Networking Technologies for Cloud ServicesKITAZUME, Hideo; KOYAMA, Takaaki; KISHI, Toshiharu et al.IEICE transactions on communications. 2012, Vol 95, Num 8, pp 2530-2537, issn 0916-8516, 8 p.Article

To Call or To Be Called Behind NATs is Sensitive in Solving the Direct Connection ProblemHO, Cheng-Yuan; TSENG, Chien-Chao; WANG, Fu-Yu et al.IEEE communications letters. 2011, Vol 15, Num 1, pp 94-96, issn 1089-7798, 3 p.Article

Applications, Services and Infrastructure for Wireless and Mobile ComputingNG, Joseph K; BAROLLI, Leonard; JIANHUA MA et al.International journal of wireless and mobile computing (Print). 2008, Vol 3, Num 1-2, issn 1741-1084, 112 p.Serial Issue

Performance of network coding based multicastCHI, K; YANG, C; WANG, X et al.IEE proceedings. Communications. 2006, Vol 153, Num 3, pp 399-404, issn 1350-2425, 6 p.Article

Wireless network securitySHEN, Xuemin (Sherman); LIN, Chuang; SUN, Yan (Lindsay) et al.Wireless communications and mobile computing (Print). 2006, Vol 6, Num 3, issn 1530-8669, 124 p.Serial Issue

Secure and efficient web metering schemeLEE, N.-Y; LEE, M.-F.IEE proceedings. Communications. 2005, Vol 152, Num 3, pp 262-264, issn 1350-2425, 3 p.Article

On the forward secrecy of Chikazawa-Yamagishi ID-based key sharing schemeBAE EUN JUNG.IEEE communications letters. 2004, Vol 8, Num 2, pp 114-115, issn 1089-7798, 2 p.Article

Partitioning techniques for reducing computational effort of routing in large networks : Superhighways technology and broadband VPNWOODWARD, M. E; AL-FAWAZ, M. M. M.IEE proceedings. Communications. 2004, Vol 151, Num 1, pp 95-100, issn 1350-2425, 6 p.Article

A model of conversation exchange dynamics for detection of epidemic-style network attacksMYLAVARAPU, S; ZACHARY, J; ETTLICH, D et al.MWSCAS : Midwest symposium on circuits and systems. 2004, isbn 0-7803-8346-X, 3Vol, Vol III, 231-234Conference Paper

A security framework for executables in a ubiquitous computing environmentLLEWELLYN-JONES, D; MERABTI, M; SHI, Q et al.IEEE Global Telecommunications Conference. 2004, pp 2158-2163, isbn 0-7803-8794-5, 6 p.Conference Paper

SIoT: Giving a Social Structure to the Internet of ThingsATZORI, Luigi; IERA, Antonio; MORABITO, Giacomo et al.IEEE communications letters. 2011, Vol 15, Num 11, pp 1193-1195, issn 1089-7798, 3 p.Article

General Composition and Universal Composability in Secure Multiparty ComputationLINDELL, Yehuda.Journal of cryptology. 2009, Vol 22, Num 3, pp 395-428, issn 0933-2790, 34 p.Article

  • Page / 61