209 results on '"Campbell, R.H."'
Search Results
2. Adam Smith
3. Using dynamic configuration to manage a scalable multimedia distribution system
4. THE VIRTUAL ORCHESTRA: TECHNICAL AND CREATIVE ISSUES
5. PRACTICAL FAULT TOLERANT SOFTWARE FOR ASYNCHRONOUS SYSTEMS
6. Scottish Society: 1500-1800
7. Zimbabwe invests in coal power
8. Stair's Scotland: the social and economic background.
9. Aeromagnetic Map with Geology of the Los Angeles 30 x 60 Minute Quadrangle, Southern California
10. A first step towards call survivability in cellular networks
11. Plethora: a framework for converting generic applications to run in a ubiquitous environment
12. Feline necrotising sialometaplasia: A report of two cases
13. Reasoning about uncertain contexts in pervasive computing environments
14. Hamilton, Henry (1896–1964)
15. Attack-resilient compliance monitoring for large distributed infrastructure systems.
16. A security policy framework for eEnabled fleets and airports.
17. Play It Again, SimMR!
18. DARE: Adaptive Data Replication for Efficient Cluster Scheduling.
19. NetODESSA: Dynamic Policy Enforcement in Cloud Networks.
20. Real-time parallel remote rendering for mobile devices using graphics processing units.
21. Breaking the MapReduce Stage Barrier.
22. Scaling eCGA model building via data-intensive computing.
23. Build your world and play in it: Interacting with surface particles on complex objects.
24. Using Generalized Query Tree to Cope with the Capture Effect in RFID Singulation.
25. Simulation Framework and Performance Analysis of Multimedia Broadcasting Service over Wireless Networks.
26. Sh@re: Negotiated audit in social networks.
27. MITHRA: Multiple data independent tasks on a heterogeneous resource architecture.
28. A statistical study on the impact of wireless signals' behavior on location estimation accuracy in 802.11 fingerprinting systems.
29. Scaling Genetic Algorithms Using MapReduce.
30. Provably Correct Pervasive Computing Environments.
31. Cloaker: Hardware Supported Rootkit Concealment.
32. Automatic security assessment of critical cyber-infrastructures.
33. iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support.
34. Building a Self-Healing Operating System.
35. Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall.
36. A middleware infrastructure for active spaces
37. ConChat: a context-aware chat program
38. Towards a pervasive computing benchmark.
39. Olympus: A High-Level Programming Model for Pervasive Computing Environments.
40. Learning Automation Policies for Pervasive Computing Environments.
41. Routing with confidence: supporting discretionary routing requirements in policy based networks.
42. Autonomic pervasive computing based on planning.
43. Dynamic application composition: customizing the behavior of an active space.
44. A context-aware data management system for ubiquitous computing applications.
45. Christopher A. Whatley, Scottish Society 1707-1830. Beyond Jacobitism to industrialisation
46. R.A. Houston, Madness and Society in Eighteenth-Century Scotland
47. Access control for Active Spaces.
48. Security as services in active networks.
49. Developing dynamic security policies.
50. Seraphim: dynamic interoperable security architecture for active networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.