Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
41
search results - page 9 / 9
»
The complementarity between calls and messages in mobile tel...
Sort
relevance
views
votes
recent
update
View
thumb
title
96
Voted
JPDC
2006
141
views
more
JPDC 2006
»
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
14 years 10 months ago
Download
arch.ece.gatech.edu
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
claim paper
Read More »
« Prev
« First
page 9 / 9
Last »
Next »