AAAAAA

   
Results: 1-2 |
Results: 2

Authors: Dowling, A Keating, JG
Citation: A. Dowling et Jg. Keating, A proxy-based security architecture for Internet applications in an extranet environment, J SYST SOFT, 58(2), 2001, pp. 107-118

Authors: Javadpour, Z Keating, JG
Citation: Z. Javadpour et Jg. Keating, Connectionist model of the generalized Hough transform for optical implementation, OPT ENG, 39(6), 2000, pp. 1717-1722
Risultati: 1-2 |