You are here


Export 674 results:
Filters: First Letter Of Title is M  [Clear All Filters]
M. Seify and Bijani, S., A Methodology for Mobile Network Security Risk Management, Sixth International Conference on Information Technology: New Generations (ITNG '09). IEEE Computer Society, 2009.
L. De Ferrari, Aitken, S., van Hemert, J., and Goryanin, I., A model of social collaboration in Molecular Biology knowledge bases, in Proceedings of the 6th Conference of the European Social Simulation Association (ESSA'09), 2009.
K. Karasavvas, Baldock, R., and Burger, A., Managing Transparency in Distributed Bioinformatics Systems, in European Media Lab Workshop on Management and Integration of Biochemical Data, 2000.
Z. cen, Gao, C., S, C., and Han, L., Measurement and analysis of IP network traffic, in In Proceedings of the 3th International Asia-Pacific Web Conference, xi'an China , 2000, p. 46~50.
J. I. van Hemert and Eiben, A. E., Mondriaan Art by Evolution, in Proceedings of the Eleventh Belgium/Netherlands Conference on Artificial Intelligence (BNAIC'99), 1999, p. 291--292.