Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications in Communications
On Suitability of Euclidean Embedding of Internet Hosts
Performance Evaluation Review
Hardware
Computer Networks
Software
Architecture
Communications
Process Algebra and Non-Interference
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
DataExchange: High Performance Communications in Distributed Laboratories
Parallel Computing
Computer Graphics
Computer Networks
Hardware
Communications
Computer-Aided Design
Architecture
Theoretical Computer Science
Artificial Intelligence
Software
GridSphere: A Portal Framework for Building Collaborations
Concurrency Computation Practice and Experience
Computer Networks
Communications
Computer Science Applications
Computational Theory
Mathematics
Theoretical Computer Science
Software
An Efficient Compression Scheme for Data Communication Which Uses a New Family of Self-Organizing Binary Search Trees
International Journal of Communication Systems
Electronic Engineering
Communications
Electrical
Computer Networks
Bringing Skeletons Out of the Closet: A Pragmatic Manifesto for Skeletal Parallel Programming
Parallel Computing
Computer Graphics
Computer Networks
Hardware
Communications
Computer-Aided Design
Architecture
Theoretical Computer Science
Artificial Intelligence
Software
Parity-Based Inference Control for Multi-Dimensional Range Sum Queries
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Improving WSN Base Station Survivability With Rejuvenation Technology
International Journal of Distributed Sensor Networks
Computer Networks
Engineering
Communications
Leak-Free Mediated Group Signatures1
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Key-Dependent Message Security Under Active Attacks – BRSIM/UC-soundness of Dolev–Yao-Style Encryption With Key Cycles
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
‹
888
889
890
891
892
893
894
›