-
2
-
-
0033272747
-
-
November-December
-
Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November-December. 1999:741-757.
-
(1999)
Network Structure in Virtual Organizations, Organization Science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations
, pp. 741-757
-
-
Ahuja, M.K.1
Carley, K.N.2
-
4
-
-
77955290890
-
CH Cap, Overview of spontaneous networking-evolving concepts and technologies
-
Rostock: Fachbereich Informatik der Universit
-
Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte, Volume 24. Rostock: Fachbereich Informatik der Universit; 2000:113-123.
-
(2000)
Rostocker Informatik-Berichte
, vol.24
, pp. 113-123
-
-
Preuß, S.1
-
5
-
-
0035363950
-
Spontaneous networking: An application-oriented approach to ad hoc networking
-
DOI 10.1109/35.925687
-
Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. (Pubitemid 32583325)
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.6
, pp. 176-181
-
-
Feeney, L.M.1
Ahlgren, B.2
Westerlund, A.3
-
6
-
-
3142734903
-
A communication architecture for spontaneous systems
-
Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42.
-
(2004)
IEEE Wirel Commun
, vol.11
, Issue.3
, pp. 36-42
-
-
Latvakoski, J.1
Pakkala, D.2
Pääkkönen, P.3
-
8
-
-
17144414857
-
Implicit merging of overlapping spontaneous networks
-
2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security
-
Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. In Proceedings of Vehicular Technology Conference, Volume 4. 2004:3050-3054. (Pubitemid 40513371)
-
(2004)
IEEE Vehicular Technology Conference
, vol.60
, Issue.4
, pp. 3050-3054
-
-
Legendre, F.1
De Amorim, M.D.2
Fdida, S.3
-
14
-
-
21844474554
-
Self-organization in spontaneous networks: The approach of DHT-based routing protocols
-
DOI 10.1016/j.adhoc.2004.08.006, PII S1570870504000678, Data Communication and Topology Control in Ad Hoc Networks
-
Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3 (5) 589-606. (Pubitemid 40952624)
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.5
, pp. 589-606
-
-
Viana, A.C.1
De Amorim, M.D.2
Fdida, S.3
De Rezende, J.F.4
-
18
-
-
0039705705
-
Social network therapies and society: An overview
-
Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3 (4) 316-320.
-
(1985)
Contemp Fam Therapy
, vol.3
, Issue.4
, pp. 316-320
-
-
Foulks, E.F.1
-
19
-
-
84872875280
-
-
IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanet.
-
(2012)
-
-
-
22
-
-
84856491567
-
Pervasive socio-technical fabric
-
Ferscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7:88-91
-
(2011)
Procedia Computer Science
, vol.7
, pp. 88-91
-
-
Ferscha, A.1
Davies, N.2
Schmidt, A.3
Streitz, N.4
-
25
-
-
77953013070
-
Two-way trust evaluation based on feedback
-
Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3:1910-1914.
-
(2010)
Conference on Logistics Systems and Intelligent Management
, vol.3
, pp. 1910-1914
-
-
Jimin, L.1
Junbao, L.2
Aiguo, A.3
Zhenpeng, L.4
-
27
-
-
84855998039
-
A trust negotiation based security framework for service provisioning in load-balancing clusters
-
Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31 (1) 4-25.
-
(2012)
Comput Secur
, vol.31
, Issue.1
, pp. 4-25
-
-
Maña, A.1
Koshutanski, H.2
Pérez, E.J.3
-
28
-
-
84947251443
-
The resurrecting duckling security issues for adhoc wireless networks
-
Stajano F, Anderson R: The resurrecting duckling security issues for adhoc wireless networks. In Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296. 1999:172-194.
-
(1999)
Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, LNCS 1296
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
29
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA
-
Balfanz D, Smetters DK, Stewart P, Chi Wong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS'02). San Diego, CA: 2002.
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS'02)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
31
-
-
4644258433
-
Privacy, trust, and disclosure: Exploring barriers to electronic commerce
-
Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9 (4). http://jcmc.indiana. edu/vol9/issue4/metzger.html.
-
(2004)
J Comput-Mediat Commun
, vol.9
, Issue.4
-
-
Metzger, M.J.1
|