Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
20638
search results - page 30 / 4128
»
Network Computing
Sort
relevance
views
votes
recent
update
View
thumb
title
27
click to vote
PERCOM
2010
ACM
146
views
Computer Networks
»
more
PERCOM 2010
»
When Eco-IT meets security: Concealed network coding for multicast traffic
13 years 6 months ago
Download
www.wsan4cip.eu
Alban Hessler, Takahiro Kakumaru, Dirk Westhoff
claim paper
Read More »
17
click to vote
PERCOM
2010
ACM
106
views
Computer Networks
»
more
PERCOM 2010
»
Supporting multi-fidelity-aware concurrent applications in dynamic sensor networks
13 years 6 months ago
Download
mpc.ece.utexas.edu
Nirmalya Roy, Vasanth Rajamani, Christine Julien
claim paper
Read More »
18
click to vote
NECO
2011
193
views
Computer Networks
»
more
NECO 2011
»
Broken Symmetries in a Location-Invariant Word Recognition Network
13 years 3 months ago
Download
www.lscp.net
Thomas Hannagan, Frédéric Dandurand,...
claim paper
Read More »
25
click to vote
PPNA
2011
194
views
Computer Networks
»
more
PPNA 2011
»
Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
13 years 3 months ago
Download
www.cs.umbc.edu
Kamalika Das, Kanishka Bhaduri, Hillol Kargupta
claim paper
Read More »
41
click to vote
HICSS
2003
IEEE
164
views
Biometrics
»
more
HICSS 2003
»
From Computer Networks to Agent Networks
14 years 1 months ago
Download
www.hicss.hawaii.edu
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
claim paper
Read More »
« Prev
« First
page 30 / 4128
Last »
Next »