Facet browsing currently unavailable
Page 10 of 14384 results
Sort by: relevance publication year
New group key computation technique for secure group communication PROCEEDINGS ARTICLE published September 2008 in 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications |
Access Control Framework for Secure Network Computing Environment PROCEEDINGS ARTICLE published 2008 in 2008 32nd Annual IEEE International Computer Software and Applications Conference |
A 2-tier architecture to support real-time communication in CSMA-based networks PROCEEDINGS ARTICLE published 2008 in NOMS 2008 - 2008 IEEE Network Operations and Management Symposium |
IEEE copyright form PROCEEDINGS ARTICLE published October 2008 in 2008 4th Workshop on Secure Network Protocols |
IEEE copyright form PROCEEDINGS ARTICLE published October 2008 in 2008 4th Workshop on Secure Network Protocols |
IEEE copyright form PROCEEDINGS ARTICLE published October 2008 in 2008 4th Workshop on Secure Network Protocols |
IEEE copyright form PROCEEDINGS ARTICLE published October 2008 in 2008 4th Workshop on Secure Network Protocols |
Multilateral servo control for haptic communication PROCEEDINGS ARTICLE published April 2008 in 2008 IEEE International Conference on Industrial Technology |
IEEE copyright form PROCEEDINGS ARTICLE published October 2008 in 2008 4th Workshop on Secure Network Protocols |
Exact solutions of simple variational fractional equations on a finite time interval PROCEEDINGS ARTICLE published May 2008 in MELECON 2008 - The 14th IEEE Mediterranean Electrotechnical Conference |
Control of path constrained systems using feasible equilibrium paths; a robotics application PROCEEDINGS ARTICLE published 2008 in 2008 IEEE International Conference on Control Applications |
Opportunistic multi-antenna downlink transmission with finite-rate feedback PROCEEDINGS ARTICLE published September 2008 in 2008 46th Annual Allerton Conference on Communication, Control, and Computing |
IEEE ISPCS 2009 PROCEEDINGS ARTICLE published 2008 in 2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication |
Topology reconstruction via path recording in secure MANET PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
An economical, deployable and secure vehicular ad hoc network PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model PROCEEDINGS ARTICLE published December 2008 in 2008 IEEE Asia-Pacific Services Computing Conference |
Application of weighted finite-state transducers to improve recognition accuracy for dysarthric speech PROCEEDINGS ARTICLE published 22 September 2008 in Interspeech 2008 |
Robust delay-dependent stability and stabilization of polytopic systems with time-delay and its application to flight control PROCEEDINGS ARTICLE published June 2008 in 2008 American Control Conference |
Experimental Research about the Impact of IEEE 802.1P on Real-Time Behavior of Switched Industrial Ethernet PROCEEDINGS ARTICLE published 2008 in 2008 ISECS International Colloquium on Computing, Communication, Control, and Management |
Secure remote control model for information appliances PROCEEDINGS ARTICLE published June 2008 in 2008 IEEE International Conference on Intelligence and Security Informatics |