Works matching IS 15094553 AND DT 2012 AND VI 2012 AND IP 3
Results: 12
Optimal Pump Scheduling for Large Scale Water Transmission System by Linear Programming.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 91, doi. 10.26636/jtit.2012.3.1283
- By:
- Publication type:
- Article
On the Influence of Network Impairments on YouTube Video Streaming.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 83, doi. 10.26636/jtit.2012.3.1282
- By:
- Publication type:
- Article
Improvement of the Performance of Database Access Operations in Cellular Networks.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 73, doi. 10.26636/jtit.2012.3.1281
- By:
- Publication type:
- Article
A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 64, doi. 10.26636/jtit.2012.3.1280
- By:
- Publication type:
- Article
Drive Encryption and Secure Login to a Secure Workstation for Special Applications.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 58, doi. 10.26636/jtit.2012.3.1279
- By:
- Publication type:
- Article
BSBI -- a Simple Protocol for Remote Verification of Identity.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 50
- By:
- Publication type:
- Article
Secured Workstation to Process the Data of Different Classification Levels.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 5, doi. 10.26636/jtit.2012.3.1273
- By:
- Publication type:
- Article
Secure Biometric Verification Station Based on Iris Recognition.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 40, doi. 10.26636/jtit.2012.3.1277
- By:
- Publication type:
- Article
A Hybrid CPU/GPU Cluster for Encryption and Decryption of Large Amounts of Data.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 32, doi. 10.26636/jtit.2012.3.1276
- By:
- Publication type:
- Article
Cryptographic Protection of Removable Media with a USB Interface for Secure Workstation for Special Applications.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 22, doi. 10.26636/jtit.2012.3.1275
- By:
- Publication type:
- Article
Model of User Access Control to Virtual Machines Based on RT-Family Trust Management Language with Temporal Validity Constraints -- Practical Application.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 13, doi. 10.26636/jtit.2012.3.1274
- By:
- Publication type:
- Article
Preface.
- Published in:
- Journal of Telecommunications & Information Technology, 2012, v. 2012, n. 3, p. 13
- By:
- Publication type:
- Article