nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An effective and efficient code generation algorithm for uniform loops on non-orthogonal DSP architecture
|
Lee, Yi-Hsuan |
|
2007 |
80 |
3 |
p. 410-428 19 p. |
artikel |
2 |
A novel data hiding scheme for color images using a BSP tree
|
Tsai, Yuan-Yu |
|
2007 |
80 |
3 |
p. 429-437 9 p. |
artikel |
3 |
Eliciting Web application requirements – an industrial case study
|
Al-Salem, Lana S. |
|
2007 |
80 |
3 |
p. 294-313 20 p. |
artikel |
4 |
FBCM: Strategy modeling method for the validation of software requirements
|
Kokune, Atsushi |
|
2007 |
80 |
3 |
p. 314-327 14 p. |
artikel |
5 |
Managing requirements for a US$1bn IT-based business transformation: New approaches and challenges
|
Reynolds, Peter |
|
2007 |
80 |
3 |
p. 285-293 9 p. |
artikel |
6 |
Opportunistic prioritised clustering framework for improving OODBMS performance
|
He, Zhen |
|
2007 |
80 |
3 |
p. 371-387 17 p. |
artikel |
7 |
REBNITA’05—1st International Workshop on Requirements Engineering for Business Need and IT Alignment
|
Cox, Karl A. |
|
2007 |
80 |
3 |
p. 283-284 2 p. |
artikel |
8 |
Requirements change: Fears dictate the must haves; desires the won’t haves
|
Hoorn, Johan F. |
|
2007 |
80 |
3 |
p. 328-355 28 p. |
artikel |
9 |
SEAL: A secure communication library for building dynamic group key agreement applications
|
Lee, Patrick P.C. |
|
2007 |
80 |
3 |
p. 356-370 15 p. |
artikel |
10 |
Self-certified signature scheme from pairings
|
Shao, Zuhua |
|
2007 |
80 |
3 |
p. 388-395 8 p. |
artikel |
11 |
The design and evaluation of path matching schemes on compressed control flow traces
|
Lin, Yongjing |
|
2007 |
80 |
3 |
p. 396-409 14 p. |
artikel |