Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 50)
A Life Cycle Analysis Approach For Making Sustainable Fiber Optic Purchasing Decisions In The Telecommunication Industry
A Life Cycle Analysis Approach For Making Sustainable Fiber Optic Purchasing Decisions In The Telecommunication Industry
An Exploration of the Diffusion Dynamics of Open Source Software (OSS): An Agent-Based Computational Economics (ACE) Approach
An Exploration of the Diffusion Dynamics of Open Source Software (OSS): An Agent-Based Computational Economics (ACE) Approach
An Exploration of the Diffusion Dynamics of Open Source Software (OSS): An Agent-Based Computational Economics (ACE) Approach
Assured Information Sharing for Ad-hoc Collaboration
Assured Information Sharing for Ad-hoc Collaboration
Assured Information Sharing for Ad-hoc Collaboration
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
BULLWHIP EFFECT IN PRICING IN VARYING SUPPLY CHAIN STRUCTURES AND CONTRACTS USING A GAME THEORETICAL FRAMEWORK
BULLWHIP EFFECT IN PRICING IN VARYING SUPPLY CHAIN STRUCTURES AND CONTRACTS USING A GAME THEORETICAL FRAMEWORK
BULLWHIP EFFECT IN PRICING IN VARYING SUPPLY CHAIN STRUCTURES AND CONTRACTS USING A GAME THEORETICAL FRAMEWORK
Clustering and Recommendation Techniques for Access Control Policy Management
Clustering and Recommendation Techniques for Access Control Policy Management
Clustering and Recommendation Techniques for Access Control Policy Management
Development of a multi-layered botmaster based analysis framework
Development of a multi-layered botmaster based analysis framework
Development of a multi-layered botmaster based analysis framework
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS