The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for firewalls with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (15) 1997-1998 (18) 1999 (17) 2000 (18) 2001 (26) 2002 (39) 2003 (51) 2004 (68) 2005 (69) 2006 (76) 2007 (86) 2008 (70) 2009 (39) 2010 (24) 2011-2012 (26) 2013-2014 (29) 2015 (17) 2016 (18) 2017-2018 (20) 2019 (16) 2020 (16) 2021 (16) 2022-2023 (28) 2024 (1)
Publication types (Num. hits)
article(172) book(9) incollection(14) inproceedings(605) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 741 occurrences of 469 keywords

Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9Fábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach. Search on Bibsonomy DSOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Gergely Sipos, Péter Kacsuk Connecting Condor Pools into Computational Grids by Jini. Search on Bibsonomy European Across Grids Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Guillem Bernat, Ian Broster, Alan Burns 0001 Rewriting History to Exploit Gain Time. Search on Bibsonomy RTSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Karl-André Skevik, Vera Goebel, Thomas Plagemann Design of a Hybrid CDN. Search on Bibsonomy MIPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Manhee Lee, Eun Jung Kim 0001, Cheol Won Lee A Source Identification Scheme against DDoS Attacks in Cluster Interconnects. Search on Bibsonomy ICPP Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Valentina Salapura, Christos J. Georgiou, Indira Nair An efficient system-on-a-chip design methodology for networking applications. Search on Bibsonomy CASES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network processor, system-on-a-chip
9Aditya Ganjam, Hui Zhang 0001 Connectivity restrictions in overlay multicast. Search on Bibsonomy NOSSDAV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF peer-to-peer systems, firewall, overlay multicast, network address translator
9Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini Incorporating Security Issues in the Information Systems Design. Search on Bibsonomy ENC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Mark Adkins, John Kruse, Robert Younger A Language Technology Toolset for Development of a Large Group Augmented Facilitation System. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Makoto Shizuka, Jianhua Ma 0002, Jeneung Lee, Yoichiro Miyoshi, Katsuhiro Takata A P2P Ubiquitous System for Testing Network Programs. Search on Bibsonomy EUC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Karl Solchenbach From Science to Enterprise - Intel's Grid Activities. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Todd S. Sproull, John W. Lockwood Distributed Instrusion Prevention in Active and Extensible Networks. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Ram Dantu, João W. Cangussu, Arun Yelimeli Dynamic Control of Worm Propagation. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Tim Schattkowsky, Christoph Loeser, Wolfgang Müller 0003 Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Sébastien Lacour, Christian Pérez, Thierry Priol A Network Topology Description Model for Grid Application Deployment. Search on Bibsonomy GRID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Gordon W. Romney, Brady R. Stevenson An isolated, multi-platform network sandbox for teaching IT security system engineers. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula
9Charles Higby, Michael Bailey Wireless security patch management system. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, wireless, configuration, update, worm, patch, virus, administration
9Antoinette Leung, Zhuang Yan, Simon Fong 0001 On Designing a Flexible E-Payment System with Fraud Detection Capability. Search on Bibsonomy CEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Luciano Paschoal Gaspary, Cristina Melchiors, Fábio Elias Locatelli, Fabiane Dillenburg Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Deepa Srinivasan, Wu-chang Feng Performance Analysis of Multi-dimensional Packet Classification on Programmable Network Processors. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Joel Sommers, Vinod Yegneswaran, Paul Barford A framework for malicious workload generation. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traffic generation, network intrusions
9Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer Packet trace manipulation rramework for test labs. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF evaluation, network, measurement, network intrusion detection, trace generation
9DongWoo Lee, SeongHoon Lee, Chong-Sun Hwang Application of Active Database Abstraction in B2B E-Commerce. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Joohan Lee, Steve J. Chapin, Stephen Taylor Reliable heterogeneous applications. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Ian F. Akyildiz, Eylem Ekici, Gaofeng Yue A Distributed Multicast Routing Scheme for Multi-Layered Satellite IP Networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion response, cooperative detection, mobile ad-hoc networks, intrusion detection, anomaly detection
9Grzegorz J. Nalepa, Antoni Ligeza Designing Reliable Web Security Systems Using Rule-Based Systems Approach. Search on Bibsonomy AWIC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Gísli Hjálmtýsson, Björn Brynjúlfsson, Ólafur Ragnar Helgason Overcoming Last-Hop/First-Hop Problems in IP Multicast. Search on Bibsonomy Networked Group Communication The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Chunyan Li, Wei Lin, Yongtian Yang Packet Filtering Using a Decision Tree Classifier. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller Covert channels and anonymizing networks. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, information theory, covert channel, MIX
9T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay Irregular Reconfigurable CAM Structures for Firewall Applications. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Tim Chown IPv6 Initiatives Within the European National Research and Education Networks (NRENs). Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Andreas Hess 0003, Michael Jung, Günter Schäfer FIDRAN: A Flexible Intrusion Detection and Response Framework for Active Networks. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng 0001 Dynamic and risk-aware network access management. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF risk awareness, network management, role, risk, dynamic access control
9Si Choon Noh, Dong Chun Lee, Kuinam J. Kim Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Xinzhou Qin, Wenke Lee Statistical Causality Analysis of INFOSEC Alert Data. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack scenario analysis, Intrusion detection, time series analysis, alert correlation
9David P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop Addressing Software Security and Mitigations in the Life Cycle. Search on Bibsonomy SEW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Gabor Gombás, Zoltán Balaton A Flexible Multi-level Grid Monitoring Architecture. Search on Bibsonomy European Across Grids Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Oleg Lodygensky, Gilles Fedak, Franck Cappello, Vincent Néri, Miron Livny, Douglas Thain XtremWeb & Condor sharing resources between Internet connected Condor pools. Search on Bibsonomy CCGRID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Gonzalo Álvarez, Slobodan Petrovic A Taxonomy of Web Attacks. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Clint Kreitner The Development and Proliferation of Consensus Security Configuration Benchmarks for Systems Connected to the Interne. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Mason McDaniel, Mohammad Hossain Heydari Content Based File Type Detection Algorithms. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Bernd Podey, Thomas Kessler, Hans-Dietrich Melzer Network Packet Filter Design and Performance. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Kenneth L. Calvert, Jim Griffioen, Najati Imam, Jiangbo Li Challenges in Implementing an ESP Service. Search on Bibsonomy IWAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Tim Chart, Stefan Schmid 0002, Manolis Sifalakis, Andrew Scott 0001 Active Routers in Action: Evaluation of the LARA++ Active Router Architecture in a Real-Life Network. Search on Bibsonomy IWAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Mikkel Thorup Space efficient dynamic stabbing with fast queries. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF IP packet classification, dynamic stabbing, object oriented method look-up
9Mikito Nakamura, Jianhua Ma 0002, Katsuhiro Chiba, Makoto Shizuka, Yoichiro Miyoshi Design and Implementation of a P2P Shared Web Browser Using JXTA. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF shared browser, P2P, awareness, JXTA, group management, Peer, pipe
9Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith Design and Implementation of Virtual Private Services. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Jianhua Ma 0002, Makoto Shizuka, Jeneung Lee, Runhe Huang A P2P Groupware System with Decentralized Topology for Supporting Synchronous Collaborations. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith The STRONGMAN Architecture. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Shambhu J. Upadhyaya Real-Time Intrusion Detection with Emphasis on Insider Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9George Lawton Open Source Security: Opportunity or Oxymoron? Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multivariate statistical analysis, chi-square test and Hotelling's rm T^2 test, intrusion detection, Computer security
9Danai Patiyoot Migration / Evolution of security towards wireless ATM. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9John Pikoulas, William J. Buchanan, Mike Mannion, Kostas Triantafyllopoulos An Intelligent Agent Security Intrusion System. Search on Bibsonomy ECBS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Christopher Krügel, Thomas Toth, Engin Kirda Service specific anomaly detection for network intrusion detection. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly eetection, intrusion eetection, network security
9Neil C. Rowe, Jim Coffman, Yilmaz Degirmenci, Scott Hall, Shong Lee, Clifton Williams Automatic removal of advertising from web-page display. Search on Bibsonomy JCDL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF information retrieval, World Wide Web, images, information filtering, advertising
9Marcel-Catalin Rosu, Daniela Rosu 0001 An evaluation of TCP splice benefits in web proxy servers. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF TCP splice, web proxy
9Simon M. Lucas Web-Based Evaluation and Deployment of Pattern Recognizers. Search on Bibsonomy ICPR (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Young H. Cho, Shiva Navab, William H. Mangione-Smith Specialized Hardware for Deep Network Packet Filtering. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Jon Allen, Jeff Wilson Securing a wireless network. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x
9Mary Micco, Hart Rossman Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates. Search on Bibsonomy SIGCSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Yunpeng Zhao, Thomas Baudel, Jie Zhou Objets graphiques transactionnels: une méthode ouverte pour la création d'applications interactives distribuées synchrones. Search on Bibsonomy IHM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF transactional graphic objects, XML, XML, CSCW, groupware, HTML, direct manipulation, distributed graphics
9Stefania Castellani, François Pacull XFolders: A Flexible Workflow System Based on Electronic Circulation Folders. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Phillip A. Porras, Martin W. Fong, Alfonso Valdes A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion report correlation, alert management, alert prioritization, Network security
9Harald Rölle A Hot-Failover State Machine for Gateway Services and Its Application to a Linux Firewall. Search on Bibsonomy DSOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Ellen Stokes Cool to Critical: Managing Web Services Now. Search on Bibsonomy DSOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Robert van Engelen, Kyle A. Gallivan The gSOAP Toolkit for Web Services and Peer-to-Peer Computing Networks. Search on Bibsonomy CCGRID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Jonghwan Lee, Yongho Kim, Kyongsok Kim Development of Internet Home Server to Control Information Appliances Remotely. Search on Bibsonomy ICOIN (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn Security Policy Deployment in IPsec. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Theodosis Dimitrakos, Ivan Djordjevic, Brian Matthews, Juan Bicarregui, Chris I. Phillips 0001 Policy-Driven Access Control over a Distributed Firewall Architecture. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Thomas L. Wolfe, Yih-Chiao Joseph Liu, Hsin-Ping Pat Chang Maintaining Remote Services and Resources Over the Internet and Other Networks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Adam Wierzbicki, Robert Strzelecki, Daniel Swierczewski, Mariusz Znojek Rhubarb: A Tool for Developing Scalable and Secure Peer-to-Peer Applications. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Pankaj K. Garg, Kave Eshghi, Thomas Gschwind, Boudewijn R. Haverkort, Katinka Wolter Enabling Network Caching of Dynamic Web Objects. Search on Bibsonomy Computer Performance Evaluation / TOOLS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Hai Jin 0001, Feng Xian, Zongfen Han, Shengli Li 0002 A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Ronald W. Ritchey, Brian O'Berry, Steven Noel Representing TCP/IP Connectivity For Topological Analysis of Network Security. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9John Haggerty, Qi Shi 0001, Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Lidong Zhou, Robbert van Renesse, Michael A. Marsh Implementing IPv6 as a Peer-to-Peer Overlay Network. Search on Bibsonomy SRDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Keesook J. Han, Ahmed H. Tewfik Scalable cryptographic scheme for networked multimedia applications. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Qiming Chen, Meichun Hsu Inter-Enterprise Collaborative Business Process Management. Search on Bibsonomy ICDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Raymond Sinnappan, Scott Hazelhurst A Reconfigurable Approach to Packet Filtering. Search on Bibsonomy FPL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Florin Baboescu, George Varghese Scalable packet classification. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Internet
9Lili Qiu, George Varghese, Subhash Suri Fast firewall implementations for software-based and hardware-based routers. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Mohamed G. Gouda, Chin-Tser Huang, Anish Arora On the Security and Vulnerability of PING. Search on Bibsonomy WSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid Autonomic Response to Distributed Denial of Service Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman The Ponder Policy Specification Language. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9David Barkai Technologies for Sharing and Collaborating on the Net. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9John W. Lockwood Evolvable Internet Hardware Platforms. Search on Bibsonomy Evolvable Hardware The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Ronald Mraz Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Ross J. Anderson Why Information Security is Hard-An Economic Perspective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong Java Security Extensions for a Java Server in a Hostile Environment. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9King P. Fung, Rocky K. C. Chang A Transport-Level Proxy for Secure Multimedia Streams. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
9Mauro César Bernardes, Edson dos Santos Moreira Implementation of an Intrusion Detection System Based on Mobile Agents. Search on Bibsonomy PDSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
9Jun Xu 0014, Mukesh Singhal Design of a High-Performance ATM Firewall. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF asynchronous transfer mode, TCP/IP, firewall, packet filtering, switch architecture
9Luca Cardelli Wide Area Computation. Search on Bibsonomy ICALP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
9Venkatachary Srinivasan, Subhash Suri, George Varghese Packet Classification Using Tuple Space Search. Search on Bibsonomy SIGCOMM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
9Craig Linn A Multi-Agent System for Cooperative Document Indexing and Querying in Distributed Networked Environments. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF agent, distributed, index, network computing
9Susan Hinrichs Policy-Based Management: Bridging the Gap. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
9Yariv Aridor, Mitsuru Oshima Infrastructure for Mobile Agents: Requirements and Design. Search on Bibsonomy Mobile Agents The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
9Kelly Djahandari, Daniel F. Sterne An MBone Proxy for an Application Gateway Firewall. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 803 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license