Results 301 to 307 of about 19,943 (307)
Some of the next articles are maybe not open access.
Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges
IEEE Communications Surveys and Tutorials, 2018Lei Shu, Mithun Mukherjee, Ye Liu
exaly
ABS vulnerable to unauthorized computer access
Computer Fraud & Security Bulletin, 1993openaire +2 more sources
Quantum Chemistry in the Age of Quantum Computing
Chemical Reviews, 2019Matthias Degroote+2 more
exaly
Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges
IEEE Communications Surveys and Tutorials, 2014Abdullah Gani+2 more
exaly
Vulnerability of Converging Technologies. The Example of Ubiquitous Computing
2007openaire +2 more sources