Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks Wang, Fei
2011
64 3 p. 744-761
artikel
2 A holistic approach examining RFID design for security and privacy Good, Tim
2010
64 3 p. 664-684
artikel
3 An energy-aware online task mapping algorithm in NoC-based system Xie, Bin
2011
64 3 p. 1021-1037
artikel
4 An intelligent scheduling system using fuzzy logic controller for management of services in WiMAX networks Sadri, Yasser
2010
64 3 p. 849-861
artikel
5 A scalable encryption scheme for multi-privileged group communications Wang, Guojun
2011
64 3 p. 1075-1091
artikel
6 A suitable server placement for peer-to-peer live streaming Yuan, Xiaoqun
2011
64 3 p. 1092-1107
artikel
7 Cloud service: automatic construction and evolution of software process problem-solving resource space Liu, Jin
2010
64 3 p. 1108-1132
artikel
8 Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks Wang, Honggang
2010
64 3 p. 883-897
artikel
9 Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents Prathapani, Anoosha
2011
64 3 p. 777-804
artikel
10 Dynamic camouflage event based malicious node detection architecture Pongaliur, Kanthakumar
2010
64 3 p. 717-743
artikel
11 Efficient implementation of a multi-dimensional index structure over flash memory storage systems Li, Guohui
2011
64 3 p. 1055-1074
artikel
12 Enabling workflows in GridSolve: request sequencing and service trading Li, Yinan
2011
64 3 p. 1133-1152
artikel
13 HAT: history-based auto-tuning MapReduce in heterogeneous environments Chen, Quan
2011
64 3 p. 1038-1054
artikel
14 High performance networked computing in media, services and information management Kou, Gang
2013
64 3 p. 830-834
artikel
15 Linear combination of multiple case-based reasoning with optimized weight for software effort estimation Wu, Dengsheng
2010
64 3 p. 898-918
artikel
16 Mandi: a market exchange for trading utility and cloud computing services Garg, Saurabh Kumar
2011
64 3 p. 1153-1174
artikel
17 Parallel data mining techniques on Graphics Processing Unit with Compute Unified Device Architecture (CUDA) Jian, Liheng
2011
64 3 p. 942-967
artikel
18 QoS-aware placement of stream processing service You, Kun
2011
64 3 p. 919-941
artikel
19 Requirements and design for neutral trust management framework in unstructured networks Li, Ruidong
2010
64 3 p. 702-716
artikel
20 Research challenges and perspectives on Wisdom Web of Things (W2T) Zhong, Ning
2010
64 3 p. 862-882
artikel
21 ROIN: reputation-oriented inverted indexing for the P2P network Song, Guanghua
2013
64 3 p. 968-986
artikel
22 Scalable SIMD-parallel memory allocation for many-core machines Huang, Xiaohuang
2011
64 3 p. 1008-1020
artikel
23 Secure localization and location verification in wireless sensor networks: a survey Zeng, Yingpei
2010
64 3 p. 685-701
artikel
24 The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment Ergu, Daji
2011
64 3 p. 835-848
artikel
25 Three-dimensional Petersen-torus network: a fixed-degree network for massively parallel computers Seo, Jung-hyun
2011
64 3 p. 987-1007
artikel
26 Trust, security and privacy for pervasive applications Wang, Guojun
2013
64 3 p. 661-663
artikel
27 User requirements-aware security ranking in SSL protocol Qi, Fang
2011
64 3 p. 762-776
artikel
28 VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks Zhao, Huanyu
2011
64 3 p. 805-829
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland