The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Computer
2004, volume: 37, number: 4


  1. Article Summaries. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:4- [Journal]

  2. Letters. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:6-7 [Journal]
  3. Robert P. Colwell
    Brainstorming, Influence, and Icebergs. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:9-12 [Journal]
  4. George Lawton
    Will Network Processor Units Live Up to Their Promise? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:13-15 [Journal]
  5. Linda Dailey Paulson
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:16-18 [Journal]
  6. Bo Sanden
    Coping with Java Threads. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:20-27 [Journal]
  7. Carlo Blundo, Stelvio Cimato
    A Software Infrastructure for Authenticated Web Metering. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:28-33 [Journal]
  8. Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko Selmic, S. Sitharama Iyengar
    Adaptive Neural Network Clustering of Web Users. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:34-40 [Journal]
  9. Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi
    XML-Based Specification for Web Services Document Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:41-49 [Journal]
  10. Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau
    Crime Data Mining: A General Framework and Some Examples. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:50-56 [Journal]
  11. Nimrod Megiddo, Dharmendra S. Modha
    Outperforming LRU with an Adaptive Replacement Cache Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:58-65 [Journal]

  12. Computer Society Connection. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:69-70 [Journal]

  13. Call and Calendar. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:71-72 [Journal]

  14. Bookshelf. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:73- [Journal]

  15. Career Opportunities. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:74-75 [Journal]

  16. Products. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:77- [Journal]
  17. Dipanjan Chakraborty, Hui Lei
    Extending the Reach of Business Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:78-80 [Journal]
  18. Mark H. Overmars
    Teaching Computer Science through Game Design. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:81-83 [Journal]
  19. Roy Want
    Enabling Ubiquitous Sensing with RFID. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:84-86 [Journal]
  20. Bruce Schneier
    Hacking the Business Climate for Network Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:87-89 [Journal]
  21. Margaret L. Johnson
    Biometrics and the Threat to Civil Liberties. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:90-92 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002