


default search action
Journal of Network and Computer Applications, Volume 27
Volume 27, Number 1, January 2004
- Jasmine Banks

, Geoffery Ericksson, Kevin Burrage
, Peter Yellowlees, Sean Ivermee, Jennifer Tichon
:
Constructing the hallucinations of psychosis in Virtual Reality. 1-11 - Wassim Itani, Ayman I. Kayssi:

J2ME application-layer end-to-end security for m-commerce. 13-32 - Duen-Ren Liu, Tzyy-Feng Hwang:

An agent-based approach to flexible commerce in intermediary-centric electronic markets. 33-48 - Asrar U. H. Sheikh, Tao Wan, Zaki Alakhdhar:

A unified approach to analyze multiple access protocols for buffered finite users. 49-76
Volume 27, Number 2, April 2004
- Heng Wang, Jie Fang, Hua Wang, Ya-Min Sun:

TSDLMRA: an efficient multicast routing algorithm based on Tabu search. 77-90 - Christos Bouras, Thrasyvoulos Tsiatsos:

Distributed virtual reality: building a multi-user layer for the EVE Platform. 91-111 - G. Adesola Aderounmu

:
Performance comparison of remote procedure calling and mobile agent approach to control and data transfer in distributed computing environment. 113-129
Volume 27, Number 3, August 2004
- Asrar U. H. Sheikh, Tao Wan, S. Zaki Alakhdhar, Ioannis Lambadaris, Michael Devetsikiotis:

Performance analysis of buffered R-ALOHA systems using tagged user approach. 131-150 - Wen-Lin Yang:

A comparison of two optimal approaches for the MCOP problem. 151-162 - Denis Helic

, Hermann A. Maurer, Nick Scerbakov:
Knowledge transfer processes in a modern WBT system. 163-190
Volume 27, Number 4, November 2004
- Wei-Bin Lee, Kuan-Chieh Liao:

Constructing identity-based cryptosystems for discrete logarithm based cryptosystems. 191-199 - Mohammed Zaki, Tarek S. Sobh

:
A cooperative agent-based model for active security systems. 201-220 - Sergio A. Velastin, Benny Lo

, Jie Sun:
A flexible communications protocol for a distributed surveillance system. 221-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














