|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Network architectures
Telecommunications
Network security
Data transmission
Computer security
Data communications
Mathematical optimization