Search Results

There are 17406 results for: content related to: Context-aware usage control for web of things

  1. Web-of-things framework for cyber–physical systems

    Concurrency and Computation: Practice and Experience

    Volume 23, Issue 9, 25 June 2011, Pages: 905–923, Tharam S. Dillon, Hai Zhuge, Chen Wu, Jaipal Singh and Elizabeth Chang

    Version of Record online : 7 JUL 2010, DOI: 10.1002/cpe.1629

  2. Pros and Cons: Americanism against Islamism in the ‘War on Terror’

    The Muslim World

    Volume 97, Issue 1, January 2007, Pages: 33–78, Sayres S. Rudy

    Version of Record online : 5 JAN 2007, DOI: 10.1111/j.1478-1913.2007.00158.x

  3. Heteroglossia in text-messaging: Performing identity and negotiating relationships in a digital space

    Journal of Sociolinguistics

    Volume 20, Issue 1, February 2016, Pages: 59–85, Caroline Tagg

    Version of Record online : 15 MAR 2016, DOI: 10.1111/josl.12170

  4. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1384–1397, Zuowen Tan

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1424

  5. Muslim Families’ Understanding of, and Reaction to, ‘The War on Terror’

    American Journal of Orthopsychiatry

    Volume 80, Issue 4, October 2010, Pages: 601–609, Cecile Rousseau and Uzma Jamil

    Version of Record online : 15 OCT 2010, DOI: 10.1111/j.1939-0025.2010.01065.x

  6. Pejoratives and Ways of Thinking

    Analytic Philosophy

    Adam Sennet and David Copp

    Version of Record online : 14 AUG 2017, DOI: 10.1111/phib.12100

  7. Glucagon-like peptide-1 decreases endogenous amyloid-β peptide (Aβ) levels and protects hippocampal neurons from death induced by Aβ and iron

    Journal of Neuroscience Research

    Volume 72, Issue 5, 1 June 2003, Pages: 603–612, TracyAnn Perry, Debomoy K. Lahiri, Kumar Sambamurti, Demao Chen, Mark P. Mattson, Josephine M. Egan and Nigel H. Greig

    Version of Record online : 21 APR 2003, DOI: 10.1002/jnr.10611

  8. Taxonomic notes on the genus Holepyris (Hymenoptera: Bethylidae) from Korea with descriptions of six new species

    Entomological Science

    Volume 13, Issue 3, September 2010, Pages: 334–344, Jongok LIM, Mamoru TERAYAMA, Sangchul SHIN and Seunghwan LEE

    Version of Record online : 26 SEP 2010, DOI: 10.1111/j.1479-8298.2010.00388.x

  9. Subject Positioning, Fear, and Insecurity in South Asian Muslim Communities in the War on Terror Context

    Canadian Review of Sociology/Revue canadienne de sociologie

    Volume 49, Issue 4, November 2012, Pages: 370–388, Uzma Jamil and Cécile Rousseau

    Version of Record online : 5 NOV 2012, DOI: 10.1111/j.1755-618X.2012.01299.x

  10. Social Science Discourse and the Biopolitics of Terrorism

    Sociology Compass

    Volume 9, Issue 3, March 2015, Pages: 161–179, Michael Blain

    Version of Record online : 5 MAR 2015, DOI: 10.1111/soc4.12246

  11. Detecting SYN flooding attacks based on traffic prediction

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1131–1140, Shangguang Wang, Qibo Sun, Hua Zou and Fangchun Yang

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.428

  12. Exterior Vehicle Noise Development: Assessment and Control

    Standard Article

    Encyclopedia of Automotive Engineering

    Ismael Fernández, Juan J. García-Bonito and Javier Iturbe

    Published Online : 22 APR 2014, DOI: 10.1002/9781118354179.auto245

  13. An experimental comparison between LPG and engine exhaust gas as energy source for an absorption refrigeration system

    International Journal of Energy Research

    Volume 36, Issue 6, May 2012, Pages: 820–828, André Aleixo Manzela, Sérgio de Morais Hanriot, Luben Cabezas-Gómez, Cristiana Brasil Maia and José Ricardo Sodré

    Version of Record online : 11 MAR 2011, DOI: 10.1002/er.1842

  14. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 248–261, Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.544

  15. Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1169–1180, Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou and Qin Zhang

    Version of Record online : 29 MAR 2012, DOI: 10.1002/sec.423

  16. An enhanced user authentication solution for mobile payment systems using wearables

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4639–4649, Kok-Seng Wong and Myung Ho Kim

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1654

  17. Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1112–1120, Shangguang Wang, Hua Zou, Qibo Sun and Fangchun Yang

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.426

  18. Treatment planning for a TCPC test case: A numerical investigation under rigid and moving wall assumptions

    International Journal for Numerical Methods in Biomedical Engineering

    Volume 29, Issue 2, February 2013, Pages: 197–216, Lucia Mirabella, Christopher M. Haggerty, Tiziano Passerini, Marina Piccinelli, Andrew J. Powell, Pedro J. Del Nido, Alessandro Veneziani and Ajit P. Yoganathan

    Version of Record online : 29 SEP 2012, DOI: 10.1002/cnm.2517

  19. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1121–1130, Y. H. Zhang, X. F. Chen, H. Li and J. Cao

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.421

  20. Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1363–1374, Qiuhua Wang, Huifang Chen, Lei Xie and Kuang Wang

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.429