Search results for: Yong Tang
Temporal Information Processing Technology and Its Application > Temporal Models and Calculation Methods > 3-19
Lecture Notes in Computer Science > Autonomic and Trusted Computing > Worm Detection and Data Security > 478-488
Lecture Notes in Computer Science > Grid and Cooperative Computing - GCC 2004 Workshops > Workshop 3: International Workshop on Information Security and Survivability for Grid (GISS’2004) > 546-553