Search results
Lecture Notes in Computer Science > Information Security Applications > Efficient HW Implementation > 232-242
Mathematical Programming Studies > Netflow at Pisa > 249-251
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming – CP 2011 > Application Track Papers > 42-53
Multimedia Systems and Applications > Advanced Wired and Wireless Networks > Advanced Issues in Ad-Hoc Networking > 1-18
Lecture Notes in Computer Science > Human Interface and the Management of Information. Interacting with Information > Security and Privacy > 366-373
Lecture Notes in Computer Science > Automata, Languages and Programming > Session C4: Distributed Computation > 613-624
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 854-863
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > System Development > 1439-1449
Lecture Notes in Computer Science > NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications > Optical Networks > 277-288
Lecture Notes in Computer Science > Wired/Wireless Internet Communications > Cognitive Multihop Networks-I > 133-145
Lecture Notes in Computer Science > Wireless Algorithms, Systems, and Applications > Routing, Querying, and Data Collection > 224-233
Lecture Notes in Computer Science > Computational Science - ICCS 2004 > Workshop on QoS Routing > 1233-1240