nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A high capacity reversible data hiding scheme with edge prediction and difference expansion
|
Wu, Hsien-Chu |
|
2009 |
82 |
12 |
p. 1966-1973 8 p. |
artikel |
2 |
A holistic approach to managing software change impact
|
Chen, Chung-Yang |
|
2009 |
82 |
12 |
p. 2051-2067 17 p. |
artikel |
3 |
An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments
|
Park, Sunggeun |
|
2009 |
82 |
12 |
p. 2012-2022 11 p. |
artikel |
4 |
Approach to designing bribery-free and coercion-free electronic voting scheme
|
Chung, Yu-Fang |
|
2009 |
82 |
12 |
p. 2081-2090 10 p. |
artikel |
5 |
A real options approach for evaluation and justification of a hospital information system
|
Özogul, C. Okan |
|
2009 |
82 |
12 |
p. 2091-2102 12 p. |
artikel |
6 |
A systematic review of domain analysis solutions for product lines
|
Khurum, Mahvish |
|
2009 |
82 |
12 |
p. 1982-2003 22 p. |
artikel |
7 |
Communication cost effective scheduling policies of nonclairvoyant jobs with load balancing in a grid
|
Zikos, Stylianos |
|
2009 |
82 |
12 |
p. 2103-2116 14 p. |
artikel |
8 |
Constructing attribute weights from computer audit data for effective intrusion detection
|
Wang, Wei |
|
2009 |
82 |
12 |
p. 1974-1981 8 p. |
artikel |
9 |
Full mobile agent interoperability in an IEEE-FIPA context
|
Cucurull, J. |
|
2009 |
82 |
12 |
p. 1927-1940 14 p. |
artikel |
10 |
IFC: Editorial Board
|
|
|
2009 |
82 |
12 |
p. IFC- 1 p. |
artikel |
11 |
Integrating knowledge flow mining and collaborative filtering to support document recommendation
|
Lai, Chin-Hui |
|
2009 |
82 |
12 |
p. 2023-2037 15 p. |
artikel |
12 |
Methodology evaluation framework for dynamic evolution in composition-based distributed applications
|
Fung, Kam Hay |
|
2009 |
82 |
12 |
p. 1950-1965 16 p. |
artikel |
13 |
MHS: A distributed metadata management strategy
|
Wang, Juan |
|
2009 |
82 |
12 |
p. 2004-2011 8 p. |
artikel |
14 |
New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation
|
Obaidat, Mohammad S. |
|
2009 |
82 |
12 |
p. 1941-1949 9 p. |
artikel |
15 |
Platform-independent modeling and prediction of application resource usage characteristics
|
Shimizu, Shuichi |
|
2009 |
82 |
12 |
p. 2117-2127 11 p. |
artikel |
16 |
Tool support for the rapid composition, analysis and implementation of reactive services
|
Kraemer, Frank Alexander |
|
2009 |
82 |
12 |
p. 2068-2080 13 p. |
artikel |
17 |
UWIS: An assessment methodology for usability of web-based information systems
|
Oztekin, Asil |
|
2009 |
82 |
12 |
p. 2038-2050 13 p. |
artikel |