Export 31 results:
Filters: Keyword is Security  [Clear All Filters]
2013
K. Hole. "Management of hidden risks." IEEE Computer 46, no. 1 (2013): 65-70.
2007
B. Briscoe. "Flow Rate Fairness: Dismantling a Religion." ACM SIGCOMM Computer Communication Review 37, no. 2 (2007): 63-74.
2004
B. Briscoe. "The Implications of Pervasive Computing on Network Design." BT Technology Journal 22, no. 3 (2004): 170-190.

Pages