nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive schemes for location update generation in execution location-dependent continuous queries
|
Lam, Kam-Yiu |
|
2006 |
79 |
4 |
p. 441-453 13 p. |
artikel |
2 |
A method for analysing multimedia protocol performance
|
Lai, Richard |
|
2006 |
79 |
4 |
p. 454-465 12 p. |
artikel |
3 |
An object-oriented cryptosystem based on two-level reconfigurable computing architecture
|
Deng, Yan-Xiang |
|
2006 |
79 |
4 |
p. 466-479 14 p. |
artikel |
4 |
Cryptanalysis of a hybrid authentication protocol for large mobile networks
|
Tang, Qiang |
|
2006 |
79 |
4 |
p. 496-501 6 p. |
artikel |
5 |
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
|
Loke, Seng W. |
|
2006 |
79 |
4 |
p. 523-536 14 p. |
artikel |
6 |
Editorial Board
|
|
|
2006 |
79 |
4 |
p. iii-iv nvt p. |
artikel |
7 |
Efficient and adaptive discovery techniques of Web Services handling large data sets
|
Makris, Christos |
|
2006 |
79 |
4 |
p. 480-495 16 p. |
artikel |
8 |
Improved self-certified group-oriented cryptosystem without a combiner
|
Lee, Wei-Bin |
|
2006 |
79 |
4 |
p. 502-506 5 p. |
artikel |
9 |
Managing role relationships in an information flow control model
|
Chou, Shih-Chien |
|
2006 |
79 |
4 |
p. 507-522 16 p. |
artikel |
10 |
Patterns of conflict among software components
|
Hepner, M. |
|
2006 |
79 |
4 |
p. 537-551 15 p. |
artikel |
11 |
Recovering architectural assumptions
|
Roeller, Ronny |
|
2006 |
79 |
4 |
p. 552-573 22 p. |
artikel |