nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling
|
Faria, B. |
|
2014 |
36 |
3 |
p. 489-500 12 p. |
artikel |
2 |
A flexible time-triggered service for real-time CORBA
|
Calvo, Isidro |
|
2014 |
36 |
3 |
p. 531-544 14 p. |
artikel |
3 |
An access authentication protocol for trusted handoff in wireless mesh networks
|
Xiao, Peng |
|
2014 |
36 |
3 |
p. 480-488 9 p. |
artikel |
4 |
An integrated data exchange platform for Intelligent Transportation Systems
|
Pan, Hsin-Hung |
|
2014 |
36 |
3 |
p. 657-671 15 p. |
artikel |
5 |
An ontology for ISO software engineering standards: 1) Creating the infrastructure
|
Henderson-Sellers, Brian |
|
2014 |
36 |
3 |
p. 563-576 14 p. |
artikel |
6 |
A proposal to contribute to ITS standardization activity: A valuable network mobility management approach
|
Toledo, Nerea |
|
2014 |
36 |
3 |
p. 465-479 15 p. |
artikel |
7 |
A standard for developing secure mobile applications
|
Dye, Stephen M. |
|
2014 |
36 |
3 |
p. 524-530 7 p. |
artikel |
8 |
Deriving guidelines for cross-vendor reuse of IEC 61131-3 modules based on Normalized Systems theorems
|
van der Linden, Dirk |
|
2014 |
36 |
3 |
p. 598-603 6 p. |
artikel |
9 |
Development of context-aware workflow systems based on Petri Net Markup Language
|
Hsieh, Fu-Shiung |
|
2014 |
36 |
3 |
p. 672-685 14 p. |
artikel |
10 |
Diagnosis mechanism for accurate monitoring in critical infrastructure protection
|
Alcaraz, Cristina |
|
2014 |
36 |
3 |
p. 501-512 12 p. |
artikel |
11 |
Editorial Board
|
|
|
2014 |
36 |
3 |
p. iii- 1 p. |
artikel |
12 |
Efficient communication architecture for the C2C agent
|
Liang, Chih-Chin |
|
2014 |
36 |
3 |
p. 641-647 7 p. |
artikel |
13 |
Evaluation of objective speech transmission quality measurements in packet-based networks
|
Slavata, Oldřich |
|
2014 |
36 |
3 |
p. 626-630 5 p. |
artikel |
14 |
Improved migration for mobile computing in distributed networks
|
Hsu, Chien-Lung |
|
2014 |
36 |
3 |
p. 577-584 8 p. |
artikel |
15 |
MDA-based visual modeling approach for resources link relationships using UML profile
|
Hsu, I-Ching |
|
2014 |
36 |
3 |
p. 648-656 9 p. |
artikel |
16 |
Modeling maintenance projects risk effects on ERP performance
|
López, Cristina |
|
2014 |
36 |
3 |
p. 545-553 9 p. |
artikel |
17 |
Partition-based fuzzy median filter based on adaptive resonance theory
|
Lin, Tzu-Chao |
|
2014 |
36 |
3 |
p. 631-640 10 p. |
artikel |
18 |
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks
|
Gañán, Carlos |
|
2014 |
36 |
3 |
p. 513-523 11 p. |
artikel |
19 |
RankCNN: When learning to rank encounters the pseudo preference feedback
|
Dong, Yuan |
|
2014 |
36 |
3 |
p. 554-562 9 p. |
artikel |
20 |
Secure mobility in future communication systems under standardization
|
Kambourakis, Georgios |
|
2014 |
36 |
3 |
p. 435-437 3 p. |
artikel |
21 |
Standardization in computer-based education
|
Anido-Rifón, Luis E. |
|
2014 |
36 |
3 |
p. 604-625 22 p. |
artikel |
22 |
Towards harmonized data interchange in food consumption data
|
Pakkala, H. |
|
2014 |
36 |
3 |
p. 592-597 6 p. |
artikel |
23 |
Towards the integration of reputation management in OpenID
|
Dólera Tormo, Ginés |
|
2014 |
36 |
3 |
p. 438-453 16 p. |
artikel |
24 |
WNCSbed: A WSAN Based Testbed for Networked Control Systems
|
Aktaş, Faruk |
|
2014 |
36 |
3 |
p. 585-591 7 p. |
artikel |
25 |
XML privacy protection model based on cloud storage
|
Guo, Lihong |
|
2014 |
36 |
3 |
p. 454-464 11 p. |
artikel |