From post

Special Issue: Performance evaluation of communications in distributed systems and Web based service architectures.

, и . Concurr. Comput. Pract. Exp., 25 (5): 605-607 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Special Issue: Performance evaluation of communications in distributed systems and Web based service architectures., и . Concurr. Comput. Pract. Exp., 25 (5): 605-607 (2013)Guest Editorial: Distributed Simulation, Virtual Environments and Real-time Applications., и . Concurr. Comput. Pract. Exp., 21 (11): 1419-1421 (2009)Biological Inspired Based Intrusion Detection Models for Mobile Telecommunication Systems., , , и . Handbook of Bioinspired Algorithms and Applications, Chapman and Hall/CRC, (2005)Formal design of a telecommunications networks management system., , , , и . ISCC, стр. 146-150. IEEE Computer Society, (1997)A Hybrid Artificial Immune and Mobile Agent Intrusion Detection Based Model for Computer Network Operations., , , , и . IPDPS, IEEE Computer Society, (2005)Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II., , , и . IPDPS, стр. 146. IEEE Computer Society, (2003)Behavior-Based Intrusion Detection in Mobile Phone Systems., и . J. Parallel Distributed Comput., 62 (9): 1476-1490 (2002)Special issue: mobility management in wireless and mobile networks., и . Wirel. Commun. Mob. Comput., 4 (6): 593-594 (2004)Neural Fraud Detection in Mobile Phone Operations., и . IPDPS Workshops, том 1800 из Lecture Notes in Computer Science, стр. 636-644. Springer, (2000)Security management against cloned cellular telephones., , , и . ICON, стр. 356-363. IEEE, (1999)