Search Results
32. Mining and indexing graph databases
Open Access
35. Self-healing Wireless Networks under Insider Jamming Attacks
Open Access
36. Automating The Placement Of Authorization Hooks in Programs
Open Access
38. Pitfalls in the Automated Strengthening of Passwords
Open Access
39. Advanced Path Queries in Road Networks
Open Access
40. The Effect of Heterogeneous Agents in Socio-cognitive Networks
Open Access