Login / Signup
Using the Host Identity Protocol with Legacy Applications.
Thomas R. Henderson
Pekka Nikander
Miika Komu
Published in:
RFC (2008)
Keyphrases
</>
databases
reverse engineering
multimedia
management system
legacy systems
artificial intelligence
decision making
case study
high level
multiresolution
rough sets
legacy software