no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Author Index
|
|
|
2003 |
25 |
5 |
p. I-III nvt p. |
article |
2 |
Communication protocol for monitoring a large number of remotely distributed hazardous material detection devices
|
Ozkul, T. |
|
2003 |
25 |
5 |
p. 553-561 9 p. |
article |
3 |
Development of performance model for calculation of communication delay in Profibus token passing protocol
|
Lee, Kyung Chang |
|
2003 |
25 |
5 |
p. 539-552 14 p. |
article |
4 |
Editorial Board
|
|
|
2003 |
25 |
5 |
p. iii- 1 p. |
article |
5 |
Evaluating interrater agreement in SPICE-based assessments
|
Jung, Ho-Won |
|
2003 |
25 |
5 |
p. 477-499 23 p. |
article |
6 |
Paper: a study on the certification of the information security management systems
|
Ren-Wei Fung, Andrew |
|
2003 |
25 |
5 |
p. 447-461 15 p. |
article |
7 |
Ping-pong flow control for ATM ABR traffic
|
Ku, Cheng-Yuan |
|
2003 |
25 |
5 |
p. 515-528 14 p. |
article |
8 |
Public key infrastructure: a micro and macro analysis
|
Lancaster, Sean |
|
2003 |
25 |
5 |
p. 437-446 10 p. |
article |
9 |
Realization of integration and working procedure on digital hospital information system
|
Chang, Zhanjun |
|
2003 |
25 |
5 |
p. 529-537 9 p. |
article |
10 |
Rule-driven processing of tree-structured data using pointed trees
|
Schmidt, Nikita |
|
2003 |
25 |
5 |
p. 463-475 13 p. |
article |
11 |
Security of robust generalized MQV key agreement protocol without using one-way hash functions
|
Shao, Zuhua |
|
2003 |
25 |
5 |
p. 431-436 6 p. |
article |
12 |
Subject Index
|
|
|
2003 |
25 |
5 |
p. V-VI nvt p. |
article |
13 |
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture
|
Chang, Chin-Chen |
|
2003 |
25 |
5 |
p. 501-513 13 p. |
article |
14 |
25 volumes of Computer Standards and Interfaces completed
|
Schumny, Harald |
|
2003 |
25 |
5 |
p. 427-430 4 p. |
article |