no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A crisscross checking technique for tamper detection in halftone images
|
Chen, Jeanne |
|
2005 |
76 |
3 |
p. 287-295 9 p. |
article |
2 |
A new multi-secret images sharing scheme using Largrange’s interpolation
|
Feng, Jen-Bang |
|
2005 |
76 |
3 |
p. 327-339 13 p. |
article |
3 |
Contents Volume 76
|
|
|
2005 |
76 |
3 |
p. 341-342 2 p. |
article |
4 |
Cryptanalysis of Huang–Chang partially blind signature scheme
|
Zhang, Fangguo |
|
2005 |
76 |
3 |
p. 323-325 3 p. |
article |
5 |
DPE/PAC: decentralized process engine with product access control
|
Chou, Shih-Chien |
|
2005 |
76 |
3 |
p. 207-219 13 p. |
article |
6 |
Editorial board
|
|
|
2005 |
76 |
3 |
p. CO2- 1 p. |
article |
7 |
Genetic granular classifiers in modeling software quality
|
Pedrycz, Witold |
|
2005 |
76 |
3 |
p. 277-285 9 p. |
article |
8 |
Implementation of wireless network environments supporting inter access point protocol and dual packet filtering
|
Hwang, Liang-Yi |
|
2005 |
76 |
3 |
p. 297-309 13 p. |
article |
9 |
Multi-disk scheduling for time-constrained requests in RAID-0 devices
|
Lo, Shi-Wu |
|
2005 |
76 |
3 |
p. 237-250 14 p. |
article |
10 |
Specifying process and measuring progress in terms of information state
|
Dick, A.J.J. |
|
2005 |
76 |
3 |
p. 311-322 12 p. |
article |
11 |
Using an expert panel to validate a requirements process improvement model
|
Beecham, Sarah |
|
2005 |
76 |
3 |
p. 251-275 25 p. |
article |
12 |
Workflow analysis for web publishing using a stage-activity process model
|
Cao, Jiannong |
|
2005 |
76 |
3 |
p. 221-235 15 p. |
article |