Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             17 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 An Approach for Managing Knowledge in Digital Forensics Examinations April L. Tanne
2010
5 p. 451-465
artikel
2 An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP Banshidhar Majhi
2009
5 p. 405-413
artikel
3 A Novel Luby-Rackoff Based Cipher in a NewFeistel-Network Based LPRKES for Smart Cards Ehab Mahmoud Mohamed
2009
5 p. 384-396
artikel
4 A Novel Score-Aware Routing Algorithm In Wireless Sensor Networks Amir Masoud Rahmani
2009
5 p. 397-404
artikel
5 Application of new distance matrix to phylogenetic tree construction P.V.Lakshmi
2008
5 p. 1-25
artikel
6 A Proposed Security Model for Web Enabled Business Process Management System M. S. Kandi
2010
5 p. 436-450
artikel
7 Building a Distributed Secure System on Multi-Agent Platform Depending on the Principles of Software Engineering Life Cycle Dr.Ghossoon M.Waleed Al-Saadoo
2010
5 p. 482-490
artikel
8 DIRECT TRUST ESTIMATED ON DEMAND PROTOCOL FOR SECURED ROUTING IN MOBILE ADHOC NETWORKS N.Bhalaji
2008
5 p. 6-12
artikel
9 Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology H S Guruprasad
2008
5 p. 13-22
artikel
10 IMPLEMENTATION OF ARTIFICIAL NEURAL NETWORK IN CONCURRENCY CONTROL OF COMPUTER INTEGRATED MANUFACTURING(CIM) DATABASE P. Raviram
2008
5 p. 23-25
artikel
11 Key Protection for Private Computing on Public Platforms Thomas H Morris
2009
5 p. 371-383
artikel
12 Mining Spatial Gene Expression Data Using Association Rules M.Anandhavalli
2009
5 p. 351-357
artikel
13 Performance Analysis of Mobile Ad-hoc Network using AODV Protocol Aditya Goel
2009
5 p. 334-343
artikel
14 Performance Improvement and Efficient Approach for Mining Periodic Sequential Acess Patterns D. Vasumathi
2009
5 p. 358-370
artikel
15 Performance Variation of LMS And Its Different Variants Sanjeev Dhull
2010
5 p. 491-196
artikel
16 Securing Image Transmission Using in- Compression Encryption Technique Shaimaa A. El-said
2010
5 p. 466-481
artikel
17 Share Loss Analysis of Internet Traffic Distribution in Computer Networks Arvind Kumar Deshmukh
2009
5 p. 414-427
artikel
                             17 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland