|
Journals in DBLP
IEEE Computer 2005, volume: 38, number: 4
- David Geer
Will Binary XML Speed Network Traffic? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:16-18 [Journal]
- Neal Leavitt
Mobile Phones: The Next Frontier for Hackers? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:20-23 [Journal]
- Hai Zhuge
The Future Interconnection Environment. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:27-33 [Journal]
- Thomas E. Anderson, Larry L. Peterson, Scott Shenker, Jonathan S. Turner
Overcoming the Internet Impasse through Virtualization. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:34-41 [Journal]
- Mark Baker, Amy W. Apon, Clayton Ferner, Jeff Brown
Emerging Grid Standards. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:43-50 [Journal]
- Christoph L. Schuba, Jason Goldschmidt, Michael F. Speer, Mohamed Hefeeda
Scaling Network Services Using Programmable Network Devices. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:52-60 [Journal]
- P. Oscar Boykin, Vwani P. Roychowdhury
Leveraging Social Networks to Fight Spam. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:61-68 [Journal]
- Jeffrey Jacobson, Michael Lewis
Game Engine Virtual Reality with CaveUT. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:79-82 [Journal]
- Ian Smith
Social-Mobile Applications. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:84-85 [Journal]
- W. Neville Holmes
In Defense of Spam. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:4, pp:86-88 [Journal]
|