


default search action
ACM Computing Surveys, Volume 39
Volume 39, Number 1, April 2007
- Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald:
A survey on peer-to-peer key management for mobile ad hoc networks. 1 - Tao Peng, Christopher Leckie
, Kotagiri Ramamohanarao
:
Survey of network-based defense mechanisms countering the DoS and DDoS problems. 3
Volume 39, Number 2, July 2007
- Simon J. Puglisi, William F. Smyth, Andrew Turpin:
A taxonomy of suffix array construction algorithms. 4 - Dong Zheng, Yan Liu, Jiying Zhao, Abdulmotaleb El-Saddik
:
A survey of RST invariant image watermarking algorithms. 5 - Dagmar Bruß, Gábor Erdélyi, Tim Meyer, Tobias Riege, Jörg Rothe:
Quantum cryptography: A survey. 6
Volume 39, Number 3, September 2007
- Suleyman Uludag
, King-Shan Lui, Klara Nahrstedt, Gregory B. Brewster:
Analysis of Topology Aggregation techniques for QoS routing. 7 - Mark Truran, James Goulding, Helen Ashman:
Autonomous authoring tools for hypertext. 8 - Eduardo Freire Nakamura
, Antonio Alfredo Ferreira Loureiro, Alejandro César Frery:
Information fusion for wireless sensor networks: Methods, models, and classifications. 9
Volume 39, Number 4, 2007
- Akrivi Katifori
, Constantin Halatsis, George Lepouras, Costas Vassilakis
, Eugenia G. Giannopoulou:
Ontology visualization methods - a survey. 10 - David B. Thomas, Wayne Luk, Philip Heng Wai Leong
, John D. Villasenor:
Gaussian random number generators. 11 - Konstantinos Morfonios, Stratis Konakas, Yannis E. Ioannidis, Nikolaos Kotsis:
ROLAP implementations of the data cube. 12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.