Browsing by Subject "Alternative solutions"
Now showing items 1-2 of 2
-
Conference Object
Explore and exploit in wireless ad hoc emergency response networks
(IEEE Computer Society, 2014)This work is concerned with the problem of efficient and intelligent message forwarding in wireless networks. This problem arises in many diverse scenarios within ad-hoc networks and especially networks formed during and ...
-
Article
Open source license violation check for SPDX files
(2014)The Open Source Software development model has gained a lot of momentum in the latest years providing organizations and software engineers with a variety of software, components and libraries that can be exploited in the ...