Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             23 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A generic anti-spyware solution by access control list at kernel level Chow, Sherman S.M.
2005
75 1-2 p. 227-234
8 p.
artikel
2 An agent-based inter-application information flow control model Chou, Shih-Chien
2005
75 1-2 p. 179-187
9 p.
artikel
3 An experimental card game for teaching software engineering processes Baker, Alex
2005
75 1-2 p. 3-16
14 p.
artikel
4 An industry/university collaboration to upgrade software engineering knowledge and skills in industry Carrington, David
2005
75 1-2 p. 29-39
11 p.
artikel
5 A practical pattern recovery approach based on both structural and behavioral analysis Huang, Heyuan
2005
75 1-2 p. 69-87
19 p.
artikel
6 A two-level scheduling method: an effective parallelizing technique for uniform nested loops on a DSP multiprocessor Lee, Yi-Hsuan
2005
75 1-2 p. 155-170
16 p.
artikel
7 Contents 2005
75 1-2 p. iv-
1 p.
artikel
8 Cryptanalysis of Hwang–Yang scheme for controlling access in large partially ordered hierarchies Wang, Shyh-Yih
2005
75 1-2 p. 189-192
4 p.
artikel
9 Cryptanalysis of Xia–You group signature scheme Shao, Zuhua
2005
75 1-2 p. 89-94
6 p.
artikel
10 Editorial Knoke, Pete
2005
75 1-2 p. 1-2
2 p.
artikel
11 Editorial board 2005
75 1-2 p. IFC-
1 p.
artikel
12 Engineering-based processes and agile methodologies for software development: a comparative case study Germain, Éric
2005
75 1-2 p. 17-27
11 p.
artikel
13 Enhancing Service Location Protocol for efficiency, scalability and advanced discovery Zhao, Weibin
2005
75 1-2 p. 193-204
12 p.
artikel
14 J2EE support for wireless services Zeadally, Sherali
2005
75 1-2 p. 215-226
12 p.
artikel
15 Migratable sockets in cluster computing Malik, Kamran
2005
75 1-2 p. 171-177
7 p.
artikel
16 Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems Poon, Wing-Fai
2005
75 1-2 p. 95-107
13 p.
artikel
17 Preventing information leakage within workflows that execute among competing organizations Chou, Shih-Chien
2005
75 1-2 p. 109-123
15 p.
artikel
18 Revocation of privacy-enhanced public-key certificates Zhang, N.
2005
75 1-2 p. 205-214
10 p.
artikel
19 Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework Raghunathan, Subhashini
2005
75 1-2 p. 125-137
13 p.
artikel
20 Secure key agreement protocols for three-party against guessing attacks Sun, Hung-Min
2005
75 1-2 p. 63-68
6 p.
artikel
21 The role of modelling in the software engineering curriculum Cowling, A.J.
2005
75 1-2 p. 41-53
13 p.
artikel
22 The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education Budgen, David
2005
75 1-2 p. 55-62
8 p.
artikel
23 Wireless protocol testing and validation supported by formal methods. A hands-on report Fernández-Iglesias, Manuel J.
2005
75 1-2 p. 139-154
16 p.
artikel
                             23 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland