Price comparison for PDAs

被引:0
|
作者
不详
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:86 / 86
页数:1
相关论文
共 50 条
  • [31] On using fast exponentiation algorithm in PDAs (or: How secure is the discrete logarithm problem assumption in PDAs?)
    Susilo, W
    Huang, JY
    Seberry, J
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 668 - 674
  • [32] On the sizes of DPDAs, PDAs, LBAs
    Beigel, Richard
    Gasarch, William
    THEORETICAL COMPUTER SCIENCE, 2016, 638 : 63 - 75
  • [33] PDAs pose WLAN concerns
    Peters, M
    COMMUNICATIONS NEWS, 2005, 42 (05): : 6 - 6
  • [34] Using PDAs for data collection
    Guadagno, L
    VandeWeerd, C
    Stevens, D
    Abraham, L
    Paveza, GJ
    Fulmer, T
    APPLIED NURSING RESEARCH, 2004, 17 (04) : 283 - 291
  • [35] Online Price Search: Impact of Price Comparison Sites on Offline Price Evaluations
    Bodur, H. Onur
    Klein, Noreen M.
    Arora, Neeraj
    JOURNAL OF RETAILING, 2015, 91 (01) : 125 - 139
  • [36] Focused Web searching with PDAs
    Buyukkokten, O
    Garcia-Molina, H
    Paepcke, A
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 33 (1-6): : 213 - 230
  • [37] Informal learning with PDAs and smartphones
    Clough, G.
    Jones, A. C.
    McAndrew, P.
    Scanlon, E.
    JOURNAL OF COMPUTER ASSISTED LEARNING, 2008, 24 (05) : 359 - 371
  • [38] PDAs get new look
    Electronics, 1994, 67 (05):
  • [39] A Study of the Performance of SSL on PDAs
    Shin, Youngsang
    Gupta, Minaxi
    Myers, Steven
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 1 - +
  • [40] PDAs: Next hacker threat?
    Perine, K
    FORTUNE, 2002, 144 (10) : 34 - 34