nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Cascade Deep Convolutional Neural Networks for face alignment
|
Dong, Yuan |
|
2015 |
42 |
C |
p. 105-112 8 p. |
artikel |
2 |
An empirical framework for evaluating interoperability of data exchange standards based on their actual usage: A case study on XLIFF
|
Wasala, Asanka |
|
2015 |
42 |
C |
p. 157-170 14 p. |
artikel |
3 |
Attribute-based authorization for structured Peer-to-Peer (P2P) networks
|
Touceda, Diego Suárez |
|
2015 |
42 |
C |
p. 71-83 13 p. |
artikel |
4 |
A twofold model for the analysis of access control policies in industrial networked systems
|
Cibrario Bertolotti, Ivan |
|
2015 |
42 |
C |
p. 171-181 11 p. |
artikel |
5 |
Cloud computing risk and audit issues
|
Chou, David C. |
|
2015 |
42 |
C |
p. 137-142 6 p. |
artikel |
6 |
Continuance intention of E-portfolio system: A confirmatory and multigroup invariance analysis of technology acceptance model
|
Cheng, Shih-I |
|
2015 |
42 |
C |
p. 17-23 7 p. |
artikel |
7 |
Designing for designers: Towards the development of accessible ICT products and services using the VERITAS framework
|
Scott, Michael James |
|
2015 |
42 |
C |
p. 113-124 12 p. |
artikel |
8 |
Editorial Board
|
|
|
2015 |
42 |
C |
p. iii- 1 p. |
artikel |
9 |
Effects of virtualization on information security
|
Li, Shing-Han |
|
2015 |
42 |
C |
p. 1-8 8 p. |
artikel |
10 |
Extending CAN bus with ISA100.11a wireless network
|
Rezha, Fadillah Purnama |
|
2015 |
42 |
C |
p. 32-41 10 p. |
artikel |
11 |
Information privacy policies: The effects of policy characteristics and online experience
|
Capistrano, Erik Paolo S. |
|
2015 |
42 |
C |
p. 24-31 8 p. |
artikel |
12 |
On the influence of the hidden and exposed terminal problems on asynchronous IEEE 802.15.5 networks
|
Rodenas-Herraiz, David |
|
2015 |
42 |
C |
p. 53-70 18 p. |
artikel |
13 |
Performance analysis of power line communication in industrial power distribution network
|
Rinaldi, Stefano |
|
2015 |
42 |
C |
p. 9-16 8 p. |
artikel |
14 |
Semi-asynchronous and distributed weighted connected dominating set algorithms for wireless sensor networks
|
Dagdeviren, Orhan |
|
2015 |
42 |
C |
p. 143-156 14 p. |
artikel |
15 |
Shared RFID ownership transfer protocols
|
Li, Nan |
|
2015 |
42 |
C |
p. 95-104 10 p. |
artikel |
16 |
The making of an OMG standard
|
Morales-Trujillo, Miguel Ehécatl |
|
2015 |
42 |
C |
p. 84-94 11 p. |
artikel |
17 |
Understanding requirements of clinical data standards for developing interoperable knowledge-based DSS: A case study
|
González-Ferrer, Arturo |
|
2015 |
42 |
C |
p. 125-136 12 p. |
artikel |
18 |
VGPM: Using business process modeling for videogame modeling and code generation in multiple platforms
|
Solís-Martínez, Jaime |
|
2015 |
42 |
C |
p. 42-52 11 p. |
artikel |