Search results for: Zhi Wang
Lecture Notes in Control and Information Sciences > Intelligent Control and Automation > Intelligent Sensor Networks > 130-137
Lecture Notes in Computer Science > Intelligent Information Technology > Communication Networks > 117-125
Lecture Notes in Computer Science > Applications of Evolutionary Computing > EvoIASP Contributions > 365-370
Lecture Notes in Computer Science > Computer Security – ESORICS 2011 > Forensics, Biometrics and Software Protection > 210-226
Lecture Notes in Computer Science > Information and Communications Security > System Security > 241-253
Lecture Notes in Computer Science > Advances in Intelligent Computing > Applications and Hardware > 453-462
Lecture Notes in Computer Science > Wireless Algorithms, Systems, and Applications > Localization, Security, and Services > 368-377
Lecture Notes in Computer Science > Computational Intelligence and Bioinformatics > Intelligent Computing in Bioinformatics > 433-443
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 1B: Performance Evaluation and Measurements > 66-77
Lecture Notes in Computer Science > Embedded Software and Systems > Track 2 Embedded Systems > 130-136
Lecture Notes in Computer Science > Embedded Software and Systems > Track 6 Transducer Network > 339-346
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Security and Privacy > 296-309
Lecture Notes in Computer Science > Computer Security – ESORICS 2009 > Network Security III > 200-215
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Network and Mobile Security > 207-221
Lecture Notes in Computer Science > Advanced Web and Network Technologies, and Applications > International Workshop on Sensor Networks (IWSN 2006) > 196-205
Lecture Notes in Computer Science > Mobile Ad-Hoc and Sensor Networks > Deployment and Application > 657-671
Lecture Notes in Computer Science > Network and Parallel Computing > Session 6: Network Architecture > 357-365