Sign in

Using the Host Identity Protocol with Legacy Applications.

Thomas R. HendersonPekka NikanderMiika Komu
Published in: RFC (2008)
Keyphrases
  • databases
  • reverse engineering
  • multimedia
  • management system
  • legacy systems
  • artificial intelligence
  • decision making
  • case study
  • high level
  • multiresolution
  • rough sets
  • legacy software