Skip to main content
Kent Academic Repository

Browse by Journal

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: B | L | M | P
Number of items: 5.

B

Bordbar, Behzad, Derrick, John, Waters, A. Gill (2002) Using UML to specify QoS constraints in ODP. Computer Networks, 40 (2). pp. 279-304. ISSN 1389-1286. (doi:10.1016/S1389-1286(02)00255-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13721)

Boiten, Eerke Albert, Bowman, Howard, Derrick, John, Linington, Peter F., Steen, Maarten (2000) Viewpoint Consistency in ODP. Computer Networks, 34 (3). pp. 503-537. ISSN 1389-1286. (doi:10.1016/s1389-1286(00)00114-6) (KAR id:21992)
Format: PDF

L

Li, L., Goethals, F., Baesens, B., Snoeck, M. (2016) Predicting Software Revision Outcomes on Github Using Structural Holes Theory. Computer Networks, 114 . pp. 114-124. ISSN 1389-1286. (doi:10.1016/j.comnet.2016.08.024) (KAR id:70960)
Format: PDF

M

Marshall, Ian W., Roadknight, Chris (2001) Provision of quality of service for active services. Computer Networks, 36 (1). pp. 75-87. ISSN 1389-1286. (doi:10.1016/S1389-1286(01)00156-6) (KAR id:13606)
Format: PDF

P

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31945)
Format: PDF

This list was generated on Fri May 10 22:29:40 2024 BST.