Chapter RDF
pages:- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- Revisiting Sacks' work on greetings: the 'first position' for greetings. pp. 118-129.
- Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks
- Revocation Schemes for Delegation Licences
- RFID applications and related research issues
- RFID-based Distributed Memory for Mobile Applications
- RFID-based Distributed Shared Memory for Pervasive Games
- Robust 3D Face Tracking on Unknown Users with Dynamical Active Models
- Robust and Efficient Routing in Wireless Mesh Networks with Unreliable Nodes
- Robust routing in communication networks
- Role of Non-metallic Inclusions and Twins on the Variability in Fatigue Life in Alloy 718 Nickel Base Superalloy
- Rooted in Transitory Places of Gathering
- RPL Border Router Redundancy in the Internet of Things
- RSE et numérique
- Runtime Function Instrumentation with EZTrace
- Réinterroger les sciences sociales à l’heure du numérique sociabilité, vie privée et digital labor
- SAACCESS: Secured Ad hoc ACCess framework
- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows
- Scalability Issues in Designing and Implementing Semantic Provenance Management Systems
- Scalable RFID Privacy Protecting Schemes
- ScalOMP: Analyzing the Scalability of OpenMP Applications
- ScanTalk: 3D Talking Heads from Unregistered Scans
- Scene Change Detection with Temporally Constrained Clustering
- Schémas de mise en veille des stations de base dans les réseaux mobiles : présentation et évaluation
- SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems
- Searching Aligned Groups of Objects with Fuzzy Criteria
- Secure Public Cloud Platform for Medical Images Sharing
- Secure Teleassistance towards endless medical litigations: Identification of liabilities through a protocol using Joint Watermarking-Encryption Evidences
- Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks
- Security and Privacy in the TeSLA Architecture
- Security in Ad Hoc Networks