nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A generic anti-spyware solution by access control list at kernel level
|
Chow, Sherman S.M. |
|
2005 |
75 |
1-2 |
p. 227-234 8 p. |
artikel |
2 |
An agent-based inter-application information flow control model
|
Chou, Shih-Chien |
|
2005 |
75 |
1-2 |
p. 179-187 9 p. |
artikel |
3 |
An experimental card game for teaching software engineering processes
|
Baker, Alex |
|
2005 |
75 |
1-2 |
p. 3-16 14 p. |
artikel |
4 |
An industry/university collaboration to upgrade software engineering knowledge and skills in industry
|
Carrington, David |
|
2005 |
75 |
1-2 |
p. 29-39 11 p. |
artikel |
5 |
A practical pattern recovery approach based on both structural and behavioral analysis
|
Huang, Heyuan |
|
2005 |
75 |
1-2 |
p. 69-87 19 p. |
artikel |
6 |
A two-level scheduling method: an effective parallelizing technique for uniform nested loops on a DSP multiprocessor
|
Lee, Yi-Hsuan |
|
2005 |
75 |
1-2 |
p. 155-170 16 p. |
artikel |
7 |
Contents
|
|
|
2005 |
75 |
1-2 |
p. iv- 1 p. |
artikel |
8 |
Cryptanalysis of Hwang–Yang scheme for controlling access in large partially ordered hierarchies
|
Wang, Shyh-Yih |
|
2005 |
75 |
1-2 |
p. 189-192 4 p. |
artikel |
9 |
Cryptanalysis of Xia–You group signature scheme
|
Shao, Zuhua |
|
2005 |
75 |
1-2 |
p. 89-94 6 p. |
artikel |
10 |
Editorial
|
Knoke, Pete |
|
2005 |
75 |
1-2 |
p. 1-2 2 p. |
artikel |
11 |
Editorial board
|
|
|
2005 |
75 |
1-2 |
p. IFC- 1 p. |
artikel |
12 |
Engineering-based processes and agile methodologies for software development: a comparative case study
|
Germain, Éric |
|
2005 |
75 |
1-2 |
p. 17-27 11 p. |
artikel |
13 |
Enhancing Service Location Protocol for efficiency, scalability and advanced discovery
|
Zhao, Weibin |
|
2005 |
75 |
1-2 |
p. 193-204 12 p. |
artikel |
14 |
J2EE support for wireless services
|
Zeadally, Sherali |
|
2005 |
75 |
1-2 |
p. 215-226 12 p. |
artikel |
15 |
Migratable sockets in cluster computing
|
Malik, Kamran |
|
2005 |
75 |
1-2 |
p. 171-177 7 p. |
artikel |
16 |
Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems
|
Poon, Wing-Fai |
|
2005 |
75 |
1-2 |
p. 95-107 13 p. |
artikel |
17 |
Preventing information leakage within workflows that execute among competing organizations
|
Chou, Shih-Chien |
|
2005 |
75 |
1-2 |
p. 109-123 15 p. |
artikel |
18 |
Revocation of privacy-enhanced public-key certificates
|
Zhang, N. |
|
2005 |
75 |
1-2 |
p. 205-214 10 p. |
artikel |
19 |
Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework
|
Raghunathan, Subhashini |
|
2005 |
75 |
1-2 |
p. 125-137 13 p. |
artikel |
20 |
Secure key agreement protocols for three-party against guessing attacks
|
Sun, Hung-Min |
|
2005 |
75 |
1-2 |
p. 63-68 6 p. |
artikel |
21 |
The role of modelling in the software engineering curriculum
|
Cowling, A.J. |
|
2005 |
75 |
1-2 |
p. 41-53 13 p. |
artikel |
22 |
The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education
|
Budgen, David |
|
2005 |
75 |
1-2 |
p. 55-62 8 p. |
artikel |
23 |
Wireless protocol testing and validation supported by formal methods. A hands-on report
|
Fernández-Iglesias, Manuel J. |
|
2005 |
75 |
1-2 |
p. 139-154 16 p. |
artikel |