Browse by Journal
Number of items: 5.
Li, L., Goethals, F., Baesens, B., Snoeck, M. (2016) Predicting Software Revision Outcomes on Github Using Structural Holes Theory. Computer Networks, 114 . pp. 114-124. ISSN 1389-1286. (doi:10.1016/j.comnet.2016.08.024) (KAR id:70960) |
Marshall, Ian W., Roadknight, Chris (2001) Provision of quality of service for active services. Computer Networks, 36 (1). pp. 75-87. ISSN 1389-1286. (doi:10.1016/S1389-1286(01)00156-6) (KAR id:13606) |
Bordbar, Behzad, Derrick, John, Waters, A. Gill (2002) Using UML to specify QoS constraints in ODP. Computer Networks, 40 (2). pp. 279-304. ISSN 1389-1286. (doi:10.1016/S1389-1286(02)00255-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13721) |
Boiten, Eerke Albert, Bowman, Howard, Derrick, John, Linington, Peter F., Steen, Maarten (2000) Viewpoint Consistency in ODP. Computer Networks, 34 (3). pp. 503-537. ISSN 1389-1286. (doi:10.1016/s1389-1286(00)00114-6) (KAR id:21992) |
Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31945) |