nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A crisscross checking technique for tamper detection in halftone images
|
Chen, Jeanne |
|
2005 |
76 |
3 |
p. 287-295 9 p. |
artikel |
2 |
A new multi-secret images sharing scheme using Largrange’s interpolation
|
Feng, Jen-Bang |
|
2005 |
76 |
3 |
p. 327-339 13 p. |
artikel |
3 |
Contents Volume 76
|
|
|
2005 |
76 |
3 |
p. 341-342 2 p. |
artikel |
4 |
Cryptanalysis of Huang–Chang partially blind signature scheme
|
Zhang, Fangguo |
|
2005 |
76 |
3 |
p. 323-325 3 p. |
artikel |
5 |
DPE/PAC: decentralized process engine with product access control
|
Chou, Shih-Chien |
|
2005 |
76 |
3 |
p. 207-219 13 p. |
artikel |
6 |
Editorial board
|
|
|
2005 |
76 |
3 |
p. CO2- 1 p. |
artikel |
7 |
Genetic granular classifiers in modeling software quality
|
Pedrycz, Witold |
|
2005 |
76 |
3 |
p. 277-285 9 p. |
artikel |
8 |
Implementation of wireless network environments supporting inter access point protocol and dual packet filtering
|
Hwang, Liang-Yi |
|
2005 |
76 |
3 |
p. 297-309 13 p. |
artikel |
9 |
Multi-disk scheduling for time-constrained requests in RAID-0 devices
|
Lo, Shi-Wu |
|
2005 |
76 |
3 |
p. 237-250 14 p. |
artikel |
10 |
Specifying process and measuring progress in terms of information state
|
Dick, A.J.J. |
|
2005 |
76 |
3 |
p. 311-322 12 p. |
artikel |
11 |
Using an expert panel to validate a requirements process improvement model
|
Beecham, Sarah |
|
2005 |
76 |
3 |
p. 251-275 25 p. |
artikel |
12 |
Workflow analysis for web publishing using a stage-activity process model
|
Cao, Jiannong |
|
2005 |
76 |
3 |
p. 221-235 15 p. |
artikel |