Dynamic network reconfiguration support for mobile computers
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Possibilities of using protocol converters for NIR system construction
ACM SIGCOMM Computer Communication Review
Communications of the ACM
FMSP '00 Proceedings of the third workshop on Formal methods in software practice
Automated Software Engineering
Fighting the spam wars: A remailer approach with restrictive aliasing
ACM Transactions on Internet Technology (TOIT)
Central System Administration in a Heterogeneous Unix Environment: GeNUAdmin
LISA '94 Proceedings of the 8th USENIX conference on System administration
SENDS, a Tool for Managing Domain Naming and Electronic Mail in a Large Organization
LISA '94 Proceedings of the 8th USENIX conference on System administration
How to Get There From Here: Scaling the Enterprise-Wide Mail Infrastructure
LISA '96 Proceedings of the 10th USENIX conference on System administration
ssmail: Opportunistic Encryption in sendmail
LISA '99 Proceedings of the 13th USENIX conference on System administration
The state of the email address
ACM SIGCOMM Computer Communication Review
Adversarial contention resolution for simple channels
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Extending internet services Via LDAP
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Sendmail evolution: 8.10 and beyond
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
The absent participant: more patterns for group awareness
Proceedings of the 2006 conference on Pattern languages of programs
Evolution of the MTA architecture: the impact of security
Software—Practice & Experience
Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks
Expert Systems with Applications: An International Journal
Predicting feature interactions by using inconsistency models
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: TCP/IP security threats and attack methods
Computer Communications
Hi-index | 0.02 |