nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dominance relation enhanced branch-and-bound task allocation
|
Ma, Yung-Cheng |
|
2001 |
58 |
2 |
p. 125-134 10 p. |
artikel |
2 |
A new encryption algorithm for image cryptosystems
|
Chang, Chin-Chen |
|
2001 |
58 |
2 |
p. 83-91 9 p. |
artikel |
3 |
A proxy-based security architecture for Internet applications in an extranet environment
|
Dowling, Andy |
|
2001 |
58 |
2 |
p. 107-118 12 p. |
artikel |
4 |
Controversy Corner
|
|
|
2001 |
58 |
2 |
p. 169- 1 p. |
artikel |
5 |
Design of a scalable multiprocessor architecture and its simulation
|
Pean, Der-Lin |
|
2001 |
58 |
2 |
p. 135-152 18 p. |
artikel |
6 |
Making inconsistency respectable in software development
|
Nuseibeh, Bashar |
|
2001 |
58 |
2 |
p. 171-180 10 p. |
artikel |
7 |
New nonrepudiable threshold proxy signature scheme with known signers
|
Hsu, Chien-Lung |
|
2001 |
58 |
2 |
p. 119-124 6 p. |
artikel |
8 |
Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net
|
Lim, Shin-Young |
|
2001 |
58 |
2 |
p. 93-106 14 p. |
artikel |
9 |
Understanding complex, real-world systems through asynchronous, distributed decision-making algorithms
|
Ghosh, Sumit |
|
2001 |
58 |
2 |
p. 153-167 15 p. |
artikel |