skip to main content
Mostrar Somente
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Secure Obfuscation of a Two-Step Oblivious Signature
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Secure Obfuscation of a Two-Step Oblivious Signature

Li, Chao ; Yuan, Zheng ; Mao, Ming

Network Computing and Information Security, p.680-688 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

2
Requirement Uncertainty Analysis for Service-Oriented Self-Adaptation Software
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Requirement Uncertainty Analysis for Service-Oriented Self-Adaptation Software

Liu, Wei ; Feng, Zaiwen

Network Computing and Information Security, p.156-163 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

3
Scaling Algebraic Multigrid Solvers: On the Road to Exascale
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Scaling Algebraic Multigrid Solvers: On the Road to Exascale

Baker, Allison H. ; Falgout, Robert D. ; Gamblin, Todd ; Kolev, Tzanio V. ; Schulz, Martin ; Yang, Ulrike Meier

Competence in High Performance Computing 2010, 2011, p.215-226

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

4
Peer-to-Peer Query Processing over Multidimensional Data
Material Type:
Livro
Adicionar ao Meu Espaço

Peer-to-Peer Query Processing over Multidimensional Data

Vlachou, Akrivi ; Doulkeridis, Christos ; Kotidis, Yannis ; Nørvåg, Kjetil

New York, NY: Springer-Verlag 2012

Texto completo disponível

5
ISAMAP: instruction mapping driven by dynamic binary translation
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

ISAMAP: instruction mapping driven by dynamic binary translation

Souza, Maxwell ; Nic$#225;cio, Daniel ; Araújo, Guido Varbanescu, Ana Lucia ; Nieuwpoort, Rob ; Molnos, Anca

Computer Architecture, 2012, p.117-138 [Periódico revisado por pares]

Berlin, Heidelberg: Springer-Verlag

Texto completo disponível

6
Intrusion Tolerance of Stealth DoS Attacks to Web Services
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Intrusion Tolerance of Stealth DoS Attacks to Web Services

Ficco, Massimo ; Rak, Massimiliano

IFIP Advances in Information and Communication Technology, 2012, Vol.AICT-376, p.579-584

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

7
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

Cai, Shaoying ; Li, Yingjiu ; Zhao, Yunlei

IFIP Advances in Information and Communication Technology, 2012, Vol.AICT-376, p.501-512

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (3)

Buscando em bases de dados remotas. Favor aguardar.