Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 A crisscross checking technique for tamper detection in halftone images Chen, Jeanne
2005
76 3 p. 287-295
9 p.
article
2 A new multi-secret images sharing scheme using Largrange’s interpolation Feng, Jen-Bang
2005
76 3 p. 327-339
13 p.
article
3 Contents Volume 76 2005
76 3 p. 341-342
2 p.
article
4 Cryptanalysis of Huang–Chang partially blind signature scheme Zhang, Fangguo
2005
76 3 p. 323-325
3 p.
article
5 DPE/PAC: decentralized process engine with product access control Chou, Shih-Chien
2005
76 3 p. 207-219
13 p.
article
6 Editorial board 2005
76 3 p. CO2-
1 p.
article
7 Genetic granular classifiers in modeling software quality Pedrycz, Witold
2005
76 3 p. 277-285
9 p.
article
8 Implementation of wireless network environments supporting inter access point protocol and dual packet filtering Hwang, Liang-Yi
2005
76 3 p. 297-309
13 p.
article
9 Multi-disk scheduling for time-constrained requests in RAID-0 devices Lo, Shi-Wu
2005
76 3 p. 237-250
14 p.
article
10 Specifying process and measuring progress in terms of information state Dick, A.J.J.
2005
76 3 p. 311-322
12 p.
article
11 Using an expert panel to validate a requirements process improvement model Beecham, Sarah
2005
76 3 p. 251-275
25 p.
article
12 Workflow analysis for web publishing using a stage-activity process model Cao, Jiannong
2005
76 3 p. 221-235
15 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands