Found 728 results
Filters: First Letter Of Last Name is H [Clear All Filters]
Comprehensive Study of Flooding Attack Consequences and Countermeasures in Session Initiation Protocol (SIP). Security and Communications Networks (SCN).
.
2015. Detection of Violation Causes in Relexion Models. 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2015)22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2015).
.
2015. Differential Privacy in Metric Spaces: Numerical, Categorical and Functional Data under the One Roof. Information Sciences. 305
.
2015. Dynamic Variability Meets Robotics. Computer. 48:94-97.
.
2015. Editorial. Formal Aspects of Computing. 27:473–473.
.
2015. EMULSIoN: Environment Mitigation on mULtimedia StreamIng Networks. 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
.
2015. Engineering Requirements for Autonomy Features. Software Engineering for Collective Autonomic Systems: Results of the ASCENS ProjectSoftware Engineering for Collective Autonomic Systems: Results of the ASCENS Project.
.
2015. Experience of Developing an Openflow SDN Prototype for Managing IPTV Networks. IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
.
2015. .
2015. Exploring The Factors That Influence The Diffusion Of Open Data Services: An Interpretive Case Study. ECIS 2015ECIS 2015.
.
2015. Extended No Reference Objective Quality Metric for Stereoscopic 3D Video. IEEE International Conf. on Communications Workshop (ICCW).
.
2015. Feature-Oriented Reflexion Modelling. 2nd Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon 2015)..
.
2015. Hybrid Real-time Quality Assessment Model for Voice over IP. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB)IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (IEEE BMSB).
.
2015. Identifying Transitivity Threats in Social Networks. TELERISE: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity.
.
2015. Increasing User Perceived Quality by Selective Load Balancing of Video Traffic in Wireless Networks. IEEE Trans. on Broadcasting. vol. 61, 2015 - Impact Factor: 2.652
.
2015. The ins and outs of Autonomy Requirements Engineering. The Engineers Journal (EngineersJournal.ie).
.
2015. The KnowLang Approach to Self-adaptation. Software, Services, and Systems,Lecture Notes in Computer ScienceSoftware, Services, and Systems,Lecture Notes in Computer Science. 8950
.
2015. KnowLang: Knowledge Representation for Self-Adaptive Systems. IEEE Computer. 48(2)
.
2015. Knowledge Representation for Adaptive and Self-aware Systems. Software Engineering for Collective Autonomic Systems, Lecture Notes in Computer ScienceSoftware Engineering for Collective Autonomic Systems, Lecture Notes in Computer Science. 8998
.
2015. An LLVM Backend for LEON Processors. In: Proceedings of the 2015 DAta Systems in Aerospace. DASIA 2015DASIA 2015.
.
2015. Manually Locating Features in Industrial Source Code: The Search Actions of Software Nomads. ICPCICPC.
.
2015. MaxSAT-based encodings for Group MaxSAT. AI Communications.
.
2015. Modeling Swarm Robotics with KnowLang. Nature of Computation and CommunicationNature of Computation and Communication.
.
2015. Modelling MAC-Layer Communications. Logical Methods in Computer Science. 11(1)
.
2015. Modelling MAC-Layer Communications in Wireless Systems. Electronic Proceedings of Theoretical Computer Science. 11
.
2015.