Article RDF
pages:- 356
- 357
- 358
- 359
- 360
- 361
- 362
- 363
- 364
- 365
- 366
- 367
- 368
- 369
- 370
- 371
- 372
- 373
- 374
- 375
- 376
- 377
- 378
- 379
- 380
- 381
- 382
- 383
- 384
- 385
- 386
- 387
- 388
- 389
- 390
- 391
- 392
- 393
- 394
- 395
- 396
- more...
- Scrap tyre pyrolysis: Are the effluents valuable products? Academic Article
- Screening for Al2O3 failure in MCrAlY APS coatings using short-term oxidation at high temperature Academic Article
- Scribble-based object segmentation with modified gaussian mixture models Academic Article
- Script Based Migration Toolkit for Cloud Computing Architecture in Building Scalable Investment Platforms. Academic Article
- Scrutinizing News Media Cooperation in Facebook and Twitter Academic Article
- SDN and NFV for Network Cloud Computing: A Universal Operating System for SD Infrastructures Conference Paper
- SDN for Inter Cloud Networking Conference Paper
- SDN-based Overlay Networks for QoS-aware Routing Conference Paper
- SDN-based Trusted Path Control Conference Paper
- SDN-Based Trusted Path in a Multi-domain Network Conference Paper
- Sea surface current retrievals using ASAR WVW acquisitions Conference Paper
- Sealer Penetration and Adaptation in the Dentinal Tubules: A Scanning Electron Microscopic Study Academic Article
- Seam carving modeling for semantic video coding in security applications Academic Article
- Seamless Handoff Solution For Nested Mobile Networks Academic Article
- Seamless Interworking of WLAN and WMAN wireless networks Conference Paper
- Seamless semantic service provisioning mechanism for ambient assisted living Conference Paper
- Seasonality of isoprene emissions and oxidation products above the remote Amazon Academic Article
- SecBus, a Software/Hardware Architecture for Securing External Memories Conference Paper
- Sechage sous vide de granules pharmaceutiques. avantages d'un apport de chaleur par micro-ondes Conference Paper
- Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels Academic Article
- Sector Spillovers in Credit Markets Academic Article
- Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture Academic Article
- Secure communications between multi-capacity devices with authentication support by network operators Conference Paper
- Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes Academic Article
- Secure hosts auto-configuration in mobile ad hoc networks Conference Paper
- Secure IPsec based offload architectures for mobile data Conference Paper
- Secure Knee Prosthesis – Processing of Encrypted Data and User Authentication Conference Paper
- Secure Localization in the Presence of Colluders in WSNs Academic Article
- Secure migration of virtual SDN topologies Conference Paper
- Secure session management with cookies Conference Paper