|
Lest You Miss!
June 2012
-
By Ranaweera, C., Wong, E., Lim, C., Nirmalathas, A.,
IEEE Network,,
vol.26 , no. 2, pp. 22-27, 2012.
-
By Guinaldo, M., Farias, G.,
IEEE Network, ,
vol. 26 , no. 3, pp. 14-20, 2012.
-
By Schmidt, A., Pfleging, B., Alt, F.
IEEE Pervasive Computing,
vol. 11 , no. 1, pp. 22-31, 2012.
-
By Sadiku, M.N.O., Olasupo, K., Nelatury, S.R.,
IEEE Potentials,
vol. 31 ,no. 3, pp. 10-11, 2012.
-
By Balfanz, Dirk, Chow, Richard, Eisen, Ori, Jakobsson, Markus,
IEEE Security & Privacy,,
vol. 10 , no. 1, pp. 22-27, 2012.
-
Lesk, M.,
IEEE Security & Privacy,
vol. 10, no. 1,pp. 88-90, 2012 .
-
Kumar, S.; Surisetty, S.,
IEEE Security & Privacy,
vol. 10, no. 2, pp. 60-64, 2012 .
-
Buschmann, F.,
IEEE Software,,
vol. 29, no. 1, pp. 23-25, 2012 .
-
Stevenson, R.,
IEEE Spectrum,
vol. 49, no. 1, pp. 39-40, 2012 .
-
Courtland, R.,
IEEE Spectrum,
vol. 49, no. 1,pp. 42-44, 2012 .
-
Plumb, M.,
IEEE Spectrum,
vol. 49, no. 1,pp. 51-53, 2012 .
-
Oberg, J.,
IEEE Spectrum,
vol. 49, no. 1, pp. 54-55, 2012 .
-
Wallich, P.,
IEEE Spectrum,
vol. 49, no. 1,pp. 63-64, 2012 .
-
Harris, M.,
IEEE Spectrum,
vol. 49, no. 3, pp. 30-58, 2012 .
-
Weir, B.,
IEEE Spectrum,
vol. 49, no. 3, pp. 42-47, 2012 .
-
Courtland, R.,
IEEE Spectrum,
vol. 49, no. 5,pp. 34-39, 2012.
-
Focusing on everything,
Harris, M.,
IEEE Spectrum,
vol. 49, no. 5,pp. 44-50, 2012 .
-
Surowiecki, J.,
IEEE Spectrum,,
vol. 49, no. 6, pp. 44-79, 2012 .
-
Courtland, R.,
IEEE Spectrum,
vol. 49, no. 6,pp. 52-53, 2012 .
-
Ross, P.E.,
IEEE Spectrum,,
vol. 49, no. 6,pp. 60-63, 2012 .
-
By William Gropp.,,
Communications of the ACM,
vol. 55, no. 5, p. 100, May 2012.
| Home
| About Us
| Resources
| Online Resources |
| Online Catalogues
| RC Services
| Current Awareness Services |
|