101 | Add to Reading ListSource URL: peerj.comLanguage: English - Date: 2015-05-26 09:15:24
|
---|
102 | Add to Reading ListSource URL: web.ccsenet.orgLanguage: English - Date: 2014-03-05 10:39:49
|
---|
103 | Add to Reading ListSource URL: www.imagine-optic.comLanguage: English - Date: 2014-09-09 07:45:42
|
---|
104 | Add to Reading ListSource URL: hera.polytechnique.frLanguage: English - Date: 2011-05-26 06:03:33
|
---|
105 | Add to Reading ListSource URL: web.ccsenet.orgLanguage: English - Date: 2014-03-05 10:39:49
|
---|
106 | Add to Reading ListSource URL: www.stm-assoc.orgLanguage: English |
---|
107 | |
---|
108 | Why OpenURL? Ann Apps and Ross MacIntyre MIMAS, Manchester Computing, The University of Manchester, UK {ann.apps, ross.macintyre}@manchester.ac.uk AbstractAdd to Reading ListSource URL: eprints.rclis.orgLanguage: English - Date: 2012-12-14 16:08:35
|
---|
109 | Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an applicationAdd to Reading ListSource URL: www.usenix.orgLanguage: English - Date: 2008-07-15 18:26:11
|
---|
110 | Data citation and digital identifiers for time series data / environmental research infrastructures Huber, R; Asmi, A.; Buck, J.; de Luca, J.M.; Diepenbroek, D.; Michelini, A. and partiAdd to Reading ListSource URL: www.bodc.ac.ukLanguage: English - Date: 2015-01-09 07:17:20
|
---|