Exploiting mobile code for user-transparent distribution of application-level protocols

Sorry, there's nothing here.

Cite this paper

@article{Agetsuma2005ExploitingMC, title={Exploiting mobile code for user-transparent distribution of application-level protocols}, author={Masakuni Agetsuma and Kenji Kono and Hideya Iwasaki and Takashi Masuda}, journal={Systems and Computers in Japan}, year={2005}, volume={36}, pages={44-57} }