Conference Paper RDF
pages:- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- more...
- Science Hackathons for Cyberphysical System Security Research
- Science hackathons for cyberphysical system security research: putting CPS tesdbed platforms to good use
- Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use
- Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use
- Sciences de la Matière et Sciences de la Vie. Bioinspiration, mécanique, biodynamique
- SCLS: A stream-controlled link scheduling algorithm for MIMO wireless mesh networks
- SCOPE- service classified overlay for P2P environment, a service platform for P2P services over ad-hoc networks
- SCOPE: A prototype for spontaneous P2P social networking
- SCORE@F : French Field Operational Test for Cooperative Systems
- SDN and NFV for Network Cloud Computing: A Universal Operating System for SD Infrastructures
- SDN for Inter Cloud Networking
- SDN-based Overlay Networks for QoS-aware Routing
- SDN-based Trusted Path Control
- SDN-Based Trusted Path in a Multi-domain Network
- Sea surface current retrievals using ASAR WVW acquisitions
- Seamless Interworking of WLAN and WMAN wireless networks
- Seamless semantic service provisioning mechanism for ambient assisted living
- SecBus, a Software/Hardware Architecture for Securing External Memories
- Sechage sous vide de granules pharmaceutiques. avantages d'un apport de chaleur par micro-ondes
- Secure communications between multi-capacity devices with authentication support by network operators
- Secure hosts auto-configuration in mobile ad hoc networks
- Secure IPsec based offload architectures for mobile data
- Secure Knee Prosthesis – Processing of Encrypted Data and User Authentication
- Secure migration of virtual SDN topologies
- Secure session management with cookies
- Secure Transmission in NOMA Systems: An Efficient Resource Allocation Strategy Using Deep Learning
- Secured and Trusted Service Provision in Pervasive Environment
- Security assurance of local data stored by HTML5 web application
- Security enhancement of HTML5 Local Data Storage
- Security establishment for IoT environments in 5G: Direct MTC-UE communications