Items where Year is Not Specified

Up a level
Export as [feed] Atom [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: Article | Report
Number of items: 13.

Article

Al-Haj, Ali and Aziz, Benjamin A Framework for Policy Enforcement Management in Database-Defined Networking (DDN).

Aziz, Benjamin, Bhargava, Bharat, Bodden, Eric, van den Brand, Mark, Fitzgerald, Brian and Jaatun, Martin Gilje Workshop Program Committee ASSD 2015.

Aziz, Benjamin, Brucker, Achim, Carlsson, Bengt, Hoursanov, Andrey, Jaatun, Martin, Eichler, Joern, Khan, Khaled, ben Othmane, Lotfi, Röning, Juha, Quirchmayr, Gerald and others ASSD 2016.

Aziz, Benjamin and Hamilton, Geoff Options for Establishing Trust in a Complex Grid Operating System.

Beligiannis, Grigorios N, Lee, Gyu Myoung, Priyambodo, Tri Kuntoro, Liu, Ren-Shiou, Mansour, Christopher, Mathew, Alex, Ciuonzo, Domenico, KhunNitti, ANharin, Kai, Tee Yee, Kanellopoulos, Dimitris and others CNIOT 2022.

Georg, Laura, Aziz, Benjamin, Blasi, Lorenzo, Chabanne, Herve, Charoy, Fran\cois, Cukier, Michel, Godart, Claude, Hayes, Darren, Jensen, Jens, Kanoun, Wael and others CTS 2016.

Goubault-Larrecq, J, Roger, M, Verma, KN, Evans, N, Schneider, S, Aziz, Benjamin, Hamilton, G and Gray, D M. Backes 157 Contract signing, optimism, and advantage R. Chadha, JC Mitchell, A. Scedrov and V. Shmatikov 189 Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically.

Matteucci, Ilaria, Mori, Paolo, Petrocchi, Marinella, Antòn, Annie, Aziz, Benjamin, Di Cerbo, Francesco, Dionysiou, Ioanna, Gonzalez, Marina Egea, Esayas, Samson Yoseph, Gago, Carmen Fernandez and others TELERISE 2015.

Mituca, Andrei, Moin, Amir H, Prehofer, Christian, Fremantle, Paul, Aziz, Benjamin, Kopeckỳ, Jacek and Scott, Philip SIoT 2014.

Swart, Garret, Aziz, Benjamin, Foley, Simon and Herbert, John Automatic Configuration of Services for Security, Bandwidth, Throughput, and Availability.

Tajer, Jean, Adda, Mo and Aziz, Benjamin INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DETECTION OF FLOODING ATTACKS ON MOBILE AGENTS USING SKETCH TECHNIQUE AND DIVERGENCE MEASURES.

Zomaya, Albert Y, Hu, Jia, Min, Geyong, Seelam, Seetharami, Wu, Yulei, Choudhary, Alok N, Calvo, Ramon Aguero, Adda, Mo, Aziz, Benjamin, Barnaghi, Payam and others CIT 2015 Organizing and Program Committees.

Report

Latham, J, Miller, H, Mountford, E.P., Kirby, K.J. and Ioras, Florin COST Action E27: Protected Forest Areas in Europe – Analysis and Harmonisation (PROFOR). [Report]

This list was generated on Thu Mar 28 04:01:43 2024 GMT.