Search Result
Save to File
Your search for
13999
returns
3841
document(s)
State of IT security 2006, page 26
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Capitalize on dimensionality increasing techniques for improving face recognition grand challenge performance, page 725
Author: C. Liu | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Resilient Security for False Event detection withous Loss of Legitimate Events in Wireless Sensor Networks (454-470)
Author: Yuichi Sei Shinichi Honiden; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Broadband fixed wireless travels the last mile, page 18
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
A long-term view of short-range wireless, page 39
Author: David G. Leeper | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Location awareness in ad hoc wireless mobile networks, page 46
Author: Yu-Chee Tseng | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Profiting from value-added wireless services, page 87
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Wireless beyond 3G: managing services and network resources, page 80
Author: Panagiotis D. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
End-to-end internet: IETF looks at wireless, page 80
Author: Linda W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next