The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Computer
2004, volume: 37, number: 7

  1. Bob Colwell
    Travel Stories. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:8-10 [Journal]
  2. Linda Dailey Paulson
    Open Source Databases Move into the Marketplace. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:13-15 [Journal]
  3. George Lawton
    Is MIMO the Future of Wireless Communications? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:20-22 [Journal]
  4. Linda Dailey Paulson
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:24-26 [Journal]
  5. Nancy R. Mead
    Who Is Liable for Insecure Systems? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:27-34 [Journal]
  6. Peder Jungck, Simon S. Y. Shim
    Issues in High-Speed Internet Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:36-42 [Journal]
  7. Doug Burger, Stephen W. Keckler, Kathryn S. McKinley, Michael Dahlin, Lizy Kurian John, Calvin Lin, Charles R. Moore, James H. Burrill, Robert G. McDonald, William Yode
    Scaling to the End of Silicon with EDGE Architectures. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:44-55 [Journal]
  8. Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H. C. Cheng
    Composing Adaptive Software. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:56-64 [Journal]
  9. Michael Kozuch, Mahadev Satyanarayanan, Thomas C. Bressoud, Casey Helfrich, Shafeeq Sinnamohideen
    Seamless Mobile Computing on Fixed Infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:65-72 [Journal]
  10. Rebecca Montanari, Emil Lupu, Cesare Stefanelli
    Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:73-80 [Journal]
  11. Brian Fitzgerald
    A Critical Look at Open Source. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:92-94 [Journal]
  12. Philip Koopman
    Embedded System Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:95-97 [Journal]
  13. W. Neville Holmes
    In Defense of PowerPoint. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:98-99 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002