Works matching DE "INTERNET Protocol multimedia subsystem"
1
- International Journal on Software Tools for Technology Transfer, 2008, v. 10, n. 4, p. 359, doi. 10.1007/s10009-008-0078-x
- Article
2
- eLearning & Software for Education, 2014, n. 3, p. 508, doi. 10.12753/2066-026X-14-219
- MAGDIN, Martin;
- KOPRDA, Stefan;
- MUNK, Michal
- Article
3
- Journal of Information & Organizational Sciences, 2010, v. 34, n. 1, p. 27
- Bizonova, Zuzana;
- Pilatova, Katarina
- Article
4
- JMM: The International Journal on Media Management, 2009, v. 11, n. 2, p. 61, doi. 10.1080/14241270902756427
- Article
5
- Multimedia Tools & Applications, 2016, v. 75, n. 11, p. 6283, doi. 10.1007/s11042-015-2572-y
- Khosroshahi, Abdol;
- Yousefi, Saleh;
- Ghaffarpour Rahbar, Akbar
- Article
6
- Bulletin of the Transilvania University of Brasov, Series I: Engineering Sciences, 2012, v. 5, n. 1, p. 19
- SANDU, G.;
- COFARU, C.;
- JELENSCHI, L.
- Article
7
- International Journal of Computer Science & Applications, 2015, v. 12, n. 1, p. 80
- MOHAMMED, ERRAIS;
- MOSTAFA, BELLAFKIH;
- RANC, DANIEL
- Article
8
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 5, p. 1204, doi. 10.1007/s12083-016-0473-0
- Hu, Hao;
- Lu, Rongxing;
- Huang, Cheng;
- Zhang, Zonghua
- Article
9
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 5, p. 1219, doi. 10.1007/s12083-016-0474-z
- Lin, Chuan;
- Bi, Yuanguo;
- Zhao, Hai;
- Cai, Wei
- Article
10
- Journal of Multimedia, 2013, v. 8, n. 4, p. 439, doi. 10.4304/jmm.8.4.439-446
- Article
11
- Journal of Multimedia, 2010, v. 5, n. 5, p. 514, doi. 10.4304/jmm.5.5.514-521
- Article
12
- Journal of Telecommunications & Information Technology, 2008, v. 2008, n. 3, p. 60, doi. 10.26636/jtit.2008.3.888
- Article
13
- Informatica (03505596), 2012, v. 36, n. 1, p. 37
- Shibeshi, Zelalem S.;
- Terzoli, Alfredo;
- Bradshaw, Karen
- Article
14
- Issues in Information Systems, 2016, v. 17, n. 4, p. 237
- Booker, Queen E.;
- Rebman Jr., Carl M.
- Article
15
- Seybold Report: Analyzing Publishing Technologies, 2008, v. 8, n. 12, p. 12
- Article
16
- Television & New Media, 2009, v. 10, n. 6, p. 536, doi. 10.1177/1527476409340908
- Article
17
- International Journal of Information Security, 2013, v. 12, n. 3, p. 201, doi. 10.1007/s10207-012-0187-0
- Vrakas, Nikos;
- Lambrinoudakis, Costas
- Article
18
- Computer Journal, 2010, v. 53, n. 10, p. 1719, doi. 10.1093/comjnl/bxp111
- Liao, Jianxin;
- Qi, Qi;
- Zhu, Xiaomin;
- Cao, Yufei;
- Li, Tonghong
- Article
19
- Wireless Networks (10220038), 2014, v. 20, n. 7, p. 1967, doi. 10.1007/s11276-014-0717-y
- Nazari, Abolfazl;
- Branch, Philip;
- But, Jason;
- Vu, Hai
- Article
20
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1203, doi. 10.1007/s11276-011-0342-y
- Zare, Sajjad;
- Ghaffarpour Rahbar, Akbar;
- Ebrahimnezhad, Hossein
- Article
21
- Wireless Networks (10220038), 2011, v. 17, n. 1, p. 183, doi. 10.1007/s11276-010-0272-0
- Talipov, Elmurod;
- Hyojeong Shin;
- Seungjae Han;
- Hojung Cha
- Article
22
- Symmetry (20738994), 2017, v. 9, n. 12, p. 291, doi. 10.3390/sym9120291
- Cheolhoon Kim;
- SeungGwan Lee;
- Sungwon Lee
- Article
23
- DePaul Journal of Art, Technology & Intellectual Property Law, 2010, v. 21, n. 1, p. 1
- Article
24
- Journal of Network & Systems Management, 2014, v. 22, n. 4, p. 609, doi. 10.1007/s10922-013-9271-7
- Islam, Salekul;
- Grégoire, Jean-Charles
- Article
25
- Journal of Network & Systems Management, 2013, v. 21, n. 1, p. 65, doi. 10.1007/s10922-011-9223-z
- Banerjee, Nilanjan;
- Nagar, Seema;
- Mukherjea, Sougata
- Article
26
- Journal of Network & Systems Management, 2012, v. 20, n. 3, p. 372, doi. 10.1007/s10922-011-9216-y
- Beltran, Victoria;
- Paradells, Josep
- Article
27
- Journal of Network & Systems Management, 2010, v. 18, n. 4, p. 447, doi. 10.1007/s10922-010-9157-x
- Changho Yun;
- Perros, Harry
- Article
28
- Journal of Network & Systems Management, 2008, v. 16, n. 2, p. 129, doi. 10.1007/s10922-008-9098-9
- Good, Richard;
- de Gouveia, Fabricio Carvalho;
- Chen, Shengyao;
- Ventura, Neco;
- Magedanz, Thomas
- Article
29
- Journal of Network & Systems Management, 2008, v. 16, n. 1, p. 63, doi. 10.1007/s10922-007-9094-5
- Blum, Niklas;
- Jacak, Piotr;
- Schreiner, Florian;
- Vingarzan, Dragos;
- Weik, Peter
- Article
30
- 2008
- de Souza, José Neuman;
- Schulze, Bruno;
- Sauvé, Jacques Philippe;
- Madeira, Edmundo;
- Ziviani, Artur
- Conference Paper/Materials
31
- Journal of Network & Systems Management, 2008, v. 16, n. 1, p. 92, doi. 10.1007/s10922-007-9090-9
- Doolin, Kevin;
- Mullins, Robert;
- Abad, Rafael Morónz;
- Moreno, Marta García;
- Mota, Telma;
- Farshchian, Babak A.;
- Gómez, Miguel
- Article
32
- Journal of Network & Systems Management, 2008, v. 16, n. 1, p. 46, doi. 10.1007/s10922-007-9092-7
- Ma, Jun;
- Jianxin Liao;
- Xiaomin Zhu
- Article
33
- Journal of Network & Systems Management, 2008, v. 16, n. 1, p. 14, doi. 10.1007/s10922-007-9096-3
- Rothenberg, Christian Esteve;
- Roos, Andreas
- Article
34
- Journal of Network & Systems Management, 2008, v. 16, n. 1, p. 11, doi. 10.1007/s10922-007-9091-8
- Magedanz, Thomas;
- Madeira, Edmundo;
- Bellavista, Paolo
- Article
35
- ComputerWorld Hong Kong, 2007, v. 24, n. 11, p. 20
- Article
36
- International Review on Computers & Software, 2011, v. 6, n. 6, p. 898
- Errais, M.;
- Raouyane, B.;
- Bellafkih, M.;
- Ramdani, M.
- Article
37
- International Review on Computers & Software, 2010, v. 5, n. 6, p. 706
- Saika, A.;
- El Kouch, R.;
- Himmi, M. M.;
- Raouyane, B.;
- Bellafkih, M.
- Article
38
- International Journal of Computers, Communications & Control, 2012, v. 7, n. 1, p. 123, doi. 10.15837/ijccc.2012.1.1428
- Navarro, Miguel;
- Donoso, Yezid
- Article
39
- IEEE Transactions on Software Engineering, 2009, v. 35, n. 1, p. 46, doi. 10.1109/TSE.2008.51
- Zave, Pamela;
- Cheung, Eric
- Article
40
- Security & Communication Networks, 2015, v. 8, n. 5, p. 769, doi. 10.1002/sec.1033
- Zhang, Hailong;
- Zhou, Yongbin;
- Feng, Dengguo
- Article
41
- Security & Communication Networks, 2015, v. 8, n. 5, p. 740, doi. 10.1002/sec.1021
- Baek, Joonsang;
- Byon, Young-ji;
- Hableel, Eman;
- Al-Qutayri, Mahmoud
- Article
42
- Security & Communication Networks, 2015, v. 8, n. 5, p. 751, doi. 10.1002/sec.1022
- Sairam, Ashok Singh;
- Roy, Sangita;
- Sahay, Rishikesh
- Article
43
- IETE Journal of Research, 2009, v. 55, n. 5, p. 212, doi. 10.4103/0377-2063.57598
- Vaiapury, Karthikeyan;
- Nagarajan, Malmurugan;
- Jain, Sunil Kumar
- Article
44
- International Journal of Interactive Mobile Technologies, 2018, v. 12, n. 4, p. 97, doi. 10.3991/ijim.v12i4.9205
- Yildiz, Ezgi Pelin;
- Tezer, Murat;
- Uzunboylu, Hüseyin
- Article
45
- Communications & Strategies, 2008, n. 69, p. 41
- Reichl, Wolfgang;
- Ruhle, Ernst-Olav
- Article
46
- Communications & Strategies, 2008, n. 69, p. 19
- Marcus, J. Scott;
- Elixmann, Dieter
- Article
47
- VLDB Journal International Journal on Very Large Data Bases, 2011, v. 20, n. 4, p. 541, doi. 10.1007/s00778-010-0213-7
- Mascetti, Sergio;
- Freni, Dario;
- Bettini, Claudio;
- Wang, X.;
- Jajodia, Sushil
- Article
48
- 2015
- Zha, Zheng-Jun;
- Liu, Yan;
- Satoh, Shin'ichi;
- Yu, Xinguo;
- Lienhart, Rainer
- Editorial
49
- Journal of Cloud Computing (2192-113X), 2017, v. 6, n. 1, p. 1, doi. 10.1186/s13677-017-0079-y
- Hani, Qassim;
- Dichter, Julius
- Article
50
- Information Security Journal: A Global Perspective, 2009, v. 18, n. 3, p. 139, doi. 10.1080/19393550902926046
- Khan, Zeeshan Shafi;
- Sher, Muhammad;
- Rashid, Khalid;
- Rahim, Aneel
- Article