|
Journals in DBLP
IEEE Computer 2004, volume: 37, number: 4
Article Summaries. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:4- [Journal]
Letters. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:6-7 [Journal]
- Robert P. Colwell
Brainstorming, Influence, and Icebergs. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:9-12 [Journal]
- George Lawton
Will Network Processor Units Live Up to Their Promise? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:13-15 [Journal]
- Linda Dailey Paulson
News Briefs. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:16-18 [Journal]
- Bo Sanden
Coping with Java Threads. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:20-27 [Journal]
- Carlo Blundo, Stelvio Cimato
A Software Infrastructure for Authenticated Web Metering. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:28-33 [Journal]
- Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko Selmic, S. Sitharama Iyengar
Adaptive Neural Network Clustering of Web Users. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:34-40 [Journal]
- Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi
XML-Based Specification for Web Services Document Security. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:41-49 [Journal]
- Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau
Crime Data Mining: A General Framework and Some Examples. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:50-56 [Journal]
- Nimrod Megiddo, Dharmendra S. Modha
Outperforming LRU with an Adaptive Replacement Cache Algorithm. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:58-65 [Journal]
Computer Society Connection. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:69-70 [Journal]
Call and Calendar. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:71-72 [Journal]
Bookshelf. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:73- [Journal]
Career Opportunities. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:74-75 [Journal]
Products. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:77- [Journal]
- Dipanjan Chakraborty, Hui Lei
Extending the Reach of Business Processes. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:78-80 [Journal]
- Mark H. Overmars
Teaching Computer Science through Game Design. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:81-83 [Journal]
- Roy Want
Enabling Ubiquitous Sensing with RFID. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:84-86 [Journal]
- Bruce Schneier
Hacking the Business Climate for Network Security. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:87-89 [Journal]
- Margaret L. Johnson
Biometrics and the Threat to Civil Liberties. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:90-92 [Journal]
|