Displaying works 181 - 189 of 189 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 journal article
Measuring Capacity Bandwidth of Targeted Path Segments
IEEE-ACM TRANSACTIONS ON NETWORKING, 17(1), 80–92.
2009 article
Denial of service attacks and defenses in decentralized trust management
Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101.
2009 journal article
Burst lost probabilities in a queuing network with simultaneous resource possession: a single-node decomposition approach
IET Communications, 3(3), 441–453.
2009 journal article
Particle Swarm Optimization for Sorted Adapted Gaussian Mixture Models
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 17(2), 344–353.
2009 journal article
On automated prepared statement generation to remove SQL injection vulnerabilities
INFORMATION AND SOFTWARE TECHNOLOGY, 51(3), 589–598.
2009 journal article
Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation
NUCLEIC ACIDS RESEARCH, 37(2), 591–601.
2009 journal article
Evaluation of call blocking probabilities in LEO satellite networks
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 27(2), 103–115.
2009 journal article
The deep evolution of metazoan microRNAs
EVOLUTION & DEVELOPMENT, 11(1), 50–68.
2009 journal article
A distributed requirements management framework for legal compliance and accountability
COMPUTERS & SECURITY, 28(1-2), 8–17.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.