Cited By
View all- Lee G(2005)Duplex method for mobile communication systemsProceedings of the First international conference on Mobile Ad-hoc and Sensor Networks10.1007/11599463_112(1125-1132)Online publication date: 13-Dec-2005
- Bowen TSegal M(2000)Remediation of Application-Specific Security Vulnerabilities at RuntimeIEEE Software10.1109/52.87786717:5(59-67)Online publication date: 1-Sep-2000
- Plank JLi KPuening M(1998)Diskless CheckpointingIEEE Transactions on Parallel and Distributed Systems10.1109/71.7305279:10(972-986)Online publication date: 1-Oct-1998
- Show More Cited By