nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case
|
Petersen, Kai |
|
2009 |
82 |
9 |
p. 1479-1490 12 p. |
artikel |
2 |
Adaptive random testing based on distribution metrics
|
Chen, Tsong Yueh |
|
2009 |
82 |
9 |
p. 1419-1433 15 p. |
artikel |
3 |
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
|
Yang, Jen-Ho |
|
2009 |
82 |
9 |
p. 1497-1502 6 p. |
artikel |
4 |
A survey on security in JXTA applications
|
Arnedo-Moreno, Joan |
|
2009 |
82 |
9 |
p. 1513-1525 13 p. |
artikel |
5 |
Design and implementation of MLC NAND flash-based DBMS for mobile devices
|
Lee, Ki Yong |
|
2009 |
82 |
9 |
p. 1447-1458 12 p. |
artikel |
6 |
Editorial
|
Eric Wong, W. |
|
2009 |
82 |
9 |
p. 1375- 1 p. |
artikel |
7 |
Empirical analysis of biometric technology adoption and acceptance in Botswana
|
Uzoka, Faith-Michael E. |
|
2009 |
82 |
9 |
p. 1550-1564 15 p. |
artikel |
8 |
Exploring alternatives for transition verification
|
Duan, Lihua |
|
2009 |
82 |
9 |
p. 1388-1402 15 p. |
artikel |
9 |
Fault-tolerant design for wide-area Mobile IPv6 networks
|
Lin, Jenn-Wei |
|
2009 |
82 |
9 |
p. 1434-1446 13 p. |
artikel |
10 |
IFC:Editorial Board
|
|
|
2009 |
82 |
9 |
p. IFC- 1 p. |
artikel |
11 |
Incremental integrity checking of UML/OCL conceptual schemas
|
Cabot, Jordi |
|
2009 |
82 |
9 |
p. 1459-1478 20 p. |
artikel |
12 |
Issues in using model checkers for test case generation
|
Fraser, Gordon |
|
2009 |
82 |
9 |
p. 1403-1418 16 p. |
artikel |
13 |
Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks
|
Huang, Chung-Ming |
|
2009 |
82 |
9 |
p. 1526-1539 14 p. |
artikel |
14 |
One-step t-fault diagnosis for hypermesh optical interconnection multiprocessor systems
|
Liu, Xingchang |
|
2009 |
82 |
9 |
p. 1491-1496 6 p. |
artikel |
15 |
Resource prioritization of code optimization techniques for program synthesis of wireless sensor network applications
|
Zhang, Zhenyu |
|
2009 |
82 |
9 |
p. 1376-1387 12 p. |
artikel |
16 |
Trading decryption for speeding encryption in Rebalanced-RSA
|
Sun, Hung-Min |
|
2009 |
82 |
9 |
p. 1503-1512 10 p. |
artikel |
17 |
Understanding developer and manager perceptions of function points and source lines of code
|
Sheetz, Steven D. |
|
2009 |
82 |
9 |
p. 1540-1549 10 p. |
artikel |