Filter your results
- 3
- 3
- 3
- 3
- 3
- 2
- 1
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
A Network-Driven Multi-Access-Point Load-Balancing Algorithm for Large-Scale Public Hotspots9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.30-42, ⟨10.1007/978-3-319-20034-7_3⟩
Conference papers
hal-01410140v1
|
||
|
Extracting and Modeling Design Defects Using Gradual Rules and UML Profile5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.574-583, ⟨10.1007/978-3-319-19578-0_47⟩
Conference papers
hal-01789946v1
|
||
|
Towards a Fluid Cloud: An Extension of the Cloud into the Local Network9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.61-65, ⟨10.1007/978-3-319-20034-7_7⟩
Conference papers
hal-01410148v1
|