Works matching IS 10897801 AND DT 2008 AND VI 12 AND IP 1


Results: 22
    1

    Security Boundaries.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 93, doi. 10.1109/MIC.2008.19
    By:
    • Farrell, Stephen
    Publication type:
    Article
    2
    3

    Serendipitous Reuse.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 84, doi. 10.1109/MIC.2008.20
    By:
    • Vinoski, Steve
    Publication type:
    Article
    4

    Graph Farming.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 80, doi. 10.1109/MIC.2008.13
    By:
    • Ayers, Danny
    Publication type:
    Article
    5
    6
    7
    8
    9
    10

    Pervasive Software Environments for Supporting Disaster Responses.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 26, doi. 10.1109/MIC.2008.18
    By:
    • Catarci, Tiziana;
    • De Leoni, Massimiliano;
    • Marrella, Andrea;
    • Mecella, Massimo;
    • Salvatore, Berardino;
    • Vetere, Guido;
    • Dustdar, Schahram;
    • Juszczyk, Lukasz;
    • Manzoor, Atif;
    • Truong, Hong-Linh
    Publication type:
    Article
    11
    12
    13

    Distributed Coordination of First Responders.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 45, doi. 10.1109/MIC.2008.9
    By:
    • Kopena, Joseph B.;
    • Sultanik, Evan A.;
    • Lass, Robert N.;
    • Nguyen, Duc N.;
    • Dugan, Christopher J.;
    • Modi, Pragnesh J.;
    • Regli, William C.
    Publication type:
    Article
    14
    15
    16
    17
    18

    Crisis Management.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 14, doi. 10.1109/MIC.2008.7
    By:
    • Mehrotra, Sharad;
    • Znati, Taieb;
    • Thompson, Craig W.
    Publication type:
    Article
    19
    20

    News in Brief.

    Published in:
    IEEE Internet Computing, 2008, v. 12, n. 1, p. 8
    Publication type:
    Article
    21
    22