1
Published 2005
Table of Contents: ... Signature Verification -- A Secure On-Demand Routing with Distributed Authentication for Trust-Based Ad Hoc...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...
View full text
Electronic eBook
3
Published 2013
Table of Contents: ... Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... -- The Robustness of Resource Allocations in Parallel and Distributed Computing Systems -- Pervasive Computing...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... -- Information Privacy and Security -- Practical and Secure E-Mail System (PractiSES) -- A Preprocessor Adding...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... and Multicasting in Static Wireless Ad Hoc Networks -- An Algorithm for Nonconvex Lower Semicontinuous Optimization...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... -- Distributed and Parallel Algorithms -- On the Abstraction of Message-Passing Communications Using Algorithmic...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks -- A Heuristic Algorithm...
View full text
Electronic eBook
10
Published 2011
Table of Contents: ... Recognition System -- Study on Architecture and Performances of Dual Track SAW Device -- Adaptive Function...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ...Dynamic Clustering Based Hybrid Routing Protocol for Mobile Ad Hoc Networks -- Design of Hybrid MAC...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ...Image and Template Security for Palmprint -- Extending Network Lifetime by Time Constrained Data...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ...-Biology -- Speedup Analysis for Parallel Implementation of Model of Response Accuracy and Response Time...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... Image Feature Tag Adding Functions -- The Impact of the Malfunction of a Sector in Supply Chain...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Normalization Tool Using Mathematica -- Symbolic Manipulation of Bspline Basis Functions with Mathematica...
View full text
Electronic eBook
19
Published 2013
Table of Contents: ...Customized Opinion Mining using Intelligent Algorithms -- Information Security Measurement Roles...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... Graphic Reference Implementation for Embedded System -- Scheduling and Non Functional Properties -- A QoS...
View full text
Electronic eBook