Works matching Client/server computing
1
- Information Systems Management, 1996, v. 13, n. 4, p. 7, doi. 10.1080/10580539608907011
- Article
2
- Financial Executive, 1992, v. 8, n. 3, p. 41
- Article
3
- Serials Librarian, 1994, v. 25, n. 3-4, p. 11
- Robison, David F.W.;
- MacLennan, Birdie
- Article
4
- Internal Auditor, 1995, v. 52, n. 1, p. 18
- Article
5
- Information Systems Management, 1994, v. 11, n. 3, p. 86, doi. 10.1080/07399019408964660
- Article
6
- Information Systems Management, 1994, v. 11, n. 3, p. 71, doi. 10.1080/07399019408964656
- Article
7
- Journal of Property Management, 1994, v. 59, n. 3, p. 57
- Cole, Ivan;
- Funaro, Julius
- Article
8
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 327
- S, Kalaivanan;
- A., Joemoan Tom;
- S., Karthikeyan
- Article
9
- Internal Auditor, 1999, v. 56, n. 5, p. 56
- Cerullo, M. Virginia;
- Cerullo, Michael J.
- Article
10
- Brookings Papers on Economic Activity, 1996, p. 79
- Brownstone, David;
- Flamm, Ken
- Article
11
- Brookings Papers on Economic Activity, 1996, p. 1, doi. 10.2307/2534746
- Bresnahan, Timothy;
- Greenstein, Shane
- Article
12
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 4, p. 557, doi. 10.1007/s12083-014-0256-4
- Article
13
- BMC Bioinformatics, 2008, v. 9, p. 1, doi. 10.1186/1471-2105-9-S7-P20
- Yeasin, Mohammed;
- Vanteru, Bhanu C.;
- Shaik, Jahangheer S.;
- Ahmed, Faruk
- Article
14
- Information Systems Management, 1996, v. 13, n. 4, p. 19, doi. 10.1080/10580539608907012
- Article
15
- Information Systems Management, 1995, v. 12, n. 1, p. 77, doi. 10.1080/07399019508962960
- Article
16
- Information Systems Management, 1994, v. 11, n. 3, p. 79, doi. 10.1080/07399019408964658
- Article
17
- Information Systems Management, 1994, v. 11, n. 3, p. 23, doi. 10.1080/07399019408964649
- Article
18
- Information Systems Management, 1994, v. 11, n. 3, p. 15, doi. 10.1080/07399019408964648
- Levis, John;
- von Schilling, Peter
- Article
19
- Information Systems Management, 1994, v. 11, n. 3, p. 7, doi. 10.1080/07399019408964647
- Article
20
- Information Systems Management, 1993, v. 10, n. 2, p. 62, doi. 10.1080/10580539308906930
- Article
21
- International Review on Computers & Software, 2014, v. 9, n. 6, p. 1043
- Ali, U. Mehraj;
- Kumar, A. John Sanjeev;
- Kumar, E. Vinoth
- Article
22
- International Review on Computers & Software, 2013, v. 8, n. 7, p. 1564
- Sheela, D.;
- Mahadevan, G.;
- Parvathi, R. M. S.
- Article
23
- Security & Communication Networks, 2011, v. 4, n. 5, p. 487, doi. 10.1002/sec.225
- Xi, Kai;
- Ahmad, Tohari;
- Han, Fengling;
- Hu, Jiankun
- Article
24
- Industrial & Corporate Change, 2008, v. 17, n. 6, p. 1205, doi. 10.1093/icc/dtn043
- Article
25
- Wireless Personal Communications, 2016, v. 89, n. 4, p. 1165, doi. 10.1007/s11277-016-3310-0
- Lohani, Divya;
- Varma, Shirshu
- Article
26
- Telecommunication Systems, 2016, v. 62, n. 1, p. 93, doi. 10.1007/s11235-015-9985-9
- Wang, Junfeng;
- Zhang, Yin;
- Cheng, Zhuanli;
- Zhu, Xuan
- Article
27
- IT Professional, 2009, v. 11, n. 3, p. 7, doi. 10.1109/MITP.2009.64
- Castro-Leon, Enrique;
- He, Jackson
- Article
28
- Financial Executive, 1996, v. 12, n. 6, p. 7
- Article
29
- Financial Executive, 1995, v. 11, n. 2, p. 43
- Article
30
- Serials Librarian, 1995, v. 25, n. 3-4, p. 11, doi. 10.1300/J123v25n03_03
- Robison, David F.W.;
- MacLennan, Birdie
- Article
31
- International Journal of Computer Mathematics, 2011, v. 88, n. 11, p. 2429, doi. 10.1080/00207160.2010.541453
- Tasić, MilanB.;
- Stanimirović, PredragS.;
- Pepić, SelverH.
- Article
32
- International Journal of Reliability, Quality & Safety Engineering, 2009, v. 16, n. 4, p. 371, doi. 10.1142/S0218539309003459
- TAMURA, YOSHINOBU;
- YAMADA, SHIGERU
- Article
33
- International Journal of Information Security, 2015, v. 14, n. 1, p. 15, doi. 10.1007/s10207-014-0248-7
- Nappa, Antonio;
- Rafique, M.;
- Caballero, Juan
- Article
34
- Journal of Supercomputing, 2016, v. 72, n. 4, p. 1623, doi. 10.1007/s11227-016-1688-9
- Irshad, Azeem;
- Sher, Muhammad;
- Chaudhary, Shehzad;
- Naqvi, Husnain;
- Farash, Mohammad
- Article
35
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1199, doi. 10.1002/sec.825
- Ferraro Petrillo, Umberto;
- Mastroianni, Giovanni;
- Visconti, Ivan
- Article
36
- EMedia, 2000, v. 13, n. 1, p. 46
- Article
37
- Journal of Information Science & Engineering, 2017, v. 33, n. 2, p. 385
- TIEN-KHOI PHAN;
- HARIM JUNG;
- HEE YONG YOUN;
- UNG-MO KIM
- Article
38
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 165
- Article
39
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1365
- Article
40
- Journal of Information Science & Engineering, 2014, v. 30, n. 1, p. 85
- HONGCHAN ROH;
- SUNGHO KIM;
- DAEWOOK LEE;
- SANGHYUN PARK
- Article
41
- Journal of Information Science & Engineering, 2013, v. 29, n. 6, p. 1121
- Article
42
- Journal of Information Science & Engineering, 2013, v. 29, n. 3, p. 557
- HARIM JUNG;
- YONG SUNG KIM;
- YON DOHN CHUNG
- Article
43
- Journal of Information Science & Engineering, 2012, v. 28, n. 6, p. 1073
- JIAN-JIA CHEN;
- KAI HUANG;
- THIELE, LOTHAR
- Article
44
- Journal of Information Science & Engineering, 2012, v. 28, n. 6, p. 1045
- JAESOO LEE;
- JONGHUN YOO;
- YONGSEOK PARK;
- SEONGSOO HONG
- Article
45
- Journal of Information Science & Engineering, 2012, v. 28, n. 5, p. 911
- Hong-Geun Kim;
- Dongjin Kim;
- Seong-Je Cho;
- Moonju Park;
- Minkyu Park
- Article
46
- Journal of Information Science & Engineering, 2012, v. 28, n. 3, p. 555
- Ling-Ling Xu;
- Fang-Guo Zhang
- Article
47
- Journal of Information Science & Engineering, 2011, v. 27, n. 4, p. 1487
- Article
48
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 261
- HSUNG-PIN CHANG;
- YU-CHIEH LIN;
- DA-WEI CHANG
- Article
49
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 19
- SUNWOOK KIM;
- SEONGWOON KIM;
- KYOUNG PARK;
- YONGWHA CHUNG
- Article
50
- Journal of Information Science & Engineering, 2010, v. 26, n. 4, p. 1345
- KUANG-HUI CHI;
- CHIEN-CHAO TSENG;
- YA-HSUAN TSAI
- Article