-
1
-
-
1542330110
-
Cost-optimisation of the IPv4 Zeroconf protocol
-
IEEE CS Press
-
Bohnenkamp H., Stok P.v.d., Hermanns H., Vaandrager F. Cost-optimisation of the IPv4 Zeroconf Protocol. Int. Symp. on Dependable Systems and Networks. DSN 2003: 2003;531-540 IEEE CS Press, http://www.cs.kun.nl/ita/publications/papers/fvaan/IPDS03.pdf.
-
(2003)
Int. Symp. on Dependable Systems and Networks, DSN 2003
, pp. 531-540
-
-
Bohnenkamp, H.1
Stok, P.V.D.2
Hermanns, H.3
Vaandrager, F.4
-
4
-
-
84900830868
-
Understanding and using context
-
Dey A.K. Understanding and using context. Personal and Ubiquitous Computing Journal. 5:(1):2001;4-7 http://www.cc.gatech.edu/fce/ctk/pubs/PeTe5-1.pdf.
-
(2001)
Personal and Ubiquitous Computing Journal
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
6
-
-
0042963605
-
-
Website, Internet Research Task Force
-
Delay Tolerant Network, Website, Internet Research Task Force. http://www.dtnrg.org.
-
Delay Tolerant Network
-
-
-
7
-
-
3042721109
-
-
The Free Software Foundation
-
The GNU Privacy Handbook, The Free Software Foundation, 1999. http://www.gnupg.org/gph/en/manual.html.
-
(1999)
The GNU Privacy Handbook
-
-
-
12
-
-
22844453931
-
Performance assessment framework for distributed object architectures
-
September, 13-16, 1999, Lecture Notes in Computer Science, Springer
-
Juric B.M., Welzer T., Rozman I., Hericko M., Brumen B., Domanjko T., Zivkovic A. Performance assessment framework for distributed object architectures. ADBIS'99. September, 13-16, 1999 Lecture Notes in Computer Science. vol. 1691:1999;349-366 Springer, http://lisa.uni-mb.si/~juric/PerfAssessmentFrw.pdf.
-
(1999)
ADBIS'99
, vol.1691
, pp. 349-366
-
-
Juric, B.M.1
Welzer, T.2
Rozman, I.3
Hericko, M.4
Brumen, B.5
Domanjko, T.6
Zivkovic, A.7
-
18
-
-
85016682337
-
Privacy through pseudonymity in user-adaptive systems
-
Kobsa A., Schreck J. Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology. 3:(2):2003;149-183 http://www.ics.uci.edu/~kobsa/papers/2003-TOIT-kobsa.pdf.
-
(2003)
ACM Transactions on Internet Technology
, vol.3
, Issue.2
, pp. 149-183
-
-
Kobsa, A.1
Schreck, J.2
-
20
-
-
0037880329
-
Peer-to-peer computing
-
HPL-2002-57
-
Milojicic D.S., Kalogeraki V., Lukose R., Nagaraja K., Pruyne J., Richard B., Rollins S., Xu Z. Peer-to-peer computing, Hewlett-Packard Technical Report, HPL-2002-57, 2002. http://citeseer.nj.nec.com/milojicic02peertopeer.html.
-
(2002)
Hewlett-Packard Technical Report
-
-
Milojicic, D.S.1
Kalogeraki, V.2
Lukose, R.3
Nagaraja, K.4
Pruyne, J.5
Richard, B.6
Rollins, S.7
Xu, Z.8
-
21
-
-
0034310033
-
Models of the small world: A review
-
Newman M.E.J. Models of the small world: a review. J. Stat. Phys. 101:2000;819-841 http://citeseer.nj.nec.com/487139.html.
-
(2000)
J. Stat. Phys.
, vol.101
, pp. 819-841
-
-
Newman, M.E.J.1
-
27
-
-
3042781459
-
Privacy recovery with disposable email addresses
-
IEEE Security & Privacy. (special issue)
-
Seigneur J.-M., Jensen C.D. Privacy recovery with disposable email addresses. Understanding Privacy. 1 (6):2003;IEEE Security & Privacy. (special issue) http://www.computer.org/security/v1n6/j6sei.htm.
-
(2003)
Understanding Privacy
, vol.1
, Issue.6
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
29
-
-
2442422211
-
Trust enhanced ubiquitous payment without too much privacy loss
-
ACM
-
Seigneur J.-M., Jensen C.D. Trust enhanced ubiquitous payment without too much privacy loss. Proceedings of SAC 2004. 2004;ACM.
-
(2004)
Proceedings of SAC 2004
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
33
-
-
3042675652
-
-
Sun Microsystems
-
Traversat B., Arora A., Abdelaziz M., Duigou M., Haywood C., Hugly J.-C., Pouyoul E., Yeager B. Project JXTA 2.0 Super-Peer Virtual Network, Sun Microsystems, 2003. http://www.jxta.org/project/www/docs/JXTA2.0protocols1.pdf.
-
(2003)
Project JXTA 2.0 Super-Peer Virtual Network
-
-
Traversat, B.1
Arora, A.2
Abdelaziz, M.3
Duigou, M.4
Haywood, C.5
Hugly, J.-C.6
Pouyoul, E.7
Yeager, B.8
|