nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive engineering framework for guaranteeing component compatibility
|
Floch, J. |
|
2010 |
83 |
10 |
p. 1759-1779 21 p. |
artikel |
2 |
Actual vs. perceived effect of software engineering practices in the Italian industry
|
Egorova, Evgenia |
|
2010 |
83 |
10 |
p. 1907-1916 10 p. |
artikel |
3 |
A model checker for WS-CDL
|
Wang, Hongbing |
|
2010 |
83 |
10 |
p. 1651-1661 11 p. |
artikel |
4 |
A multicriteria approach for risks assessment in ERP maintenance
|
Salmeron, Jose L. |
|
2010 |
83 |
10 |
p. 1941-1953 13 p. |
artikel |
5 |
An ID-based aggregate signature scheme with constant pairing computations
|
Shim, Kyung-Ah |
|
2010 |
83 |
10 |
p. 1873-1880 8 p. |
artikel |
6 |
A novel DRM framework for peer-to-peer music content delivery
|
Li, Jung-Shian |
|
2010 |
83 |
10 |
p. 1689-1700 12 p. |
artikel |
7 |
A novel global harmony search algorithm for task assignment problem
|
Zou, Dexuan |
|
2010 |
83 |
10 |
p. 1678-1688 11 p. |
artikel |
8 |
A software integration approach for designing and assessing dependable embedded systems
|
Suri, Neeraj |
|
2010 |
83 |
10 |
p. 1780-1800 21 p. |
artikel |
9 |
A Superscalar software architecture model for Multi-Core Processors (MCPs)
|
Choi, Gyu Sang |
|
2010 |
83 |
10 |
p. 1823-1837 15 p. |
artikel |
10 |
Automated assembly of Internet-scale software systems involving autonomous agents
|
Jiao, Wenpin |
|
2010 |
83 |
10 |
p. 1838-1850 13 p. |
artikel |
11 |
Coordination implications of software architecture in a global software development project
|
Avritzer, Alberto |
|
2010 |
83 |
10 |
p. 1881-1895 15 p. |
artikel |
12 |
Dependency-aware maintenance for highly available service-oriented grid
|
Jin, Hai |
|
2010 |
83 |
10 |
p. 1983-1994 12 p. |
artikel |
13 |
Editorial Board
|
|
|
2010 |
83 |
10 |
p. CO2- 1 p. |
artikel |
14 |
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
|
Nikooghadam, Morteza |
|
2010 |
83 |
10 |
p. 1917-1929 13 p. |
artikel |
15 |
Embedding capacity raising in reversible data hiding based on prediction of difference expansion
|
Lee, Chin-Feng |
|
2010 |
83 |
10 |
p. 1864-1872 9 p. |
artikel |
16 |
Generating blogs out of product catalogues: An MDE approach
|
Diaz, Oscar |
|
2010 |
83 |
10 |
p. 1970-1982 13 p. |
artikel |
17 |
How do architecture patterns and tactics interact? A model and annotation
|
Harrison, Neil B. |
|
2010 |
83 |
10 |
p. 1735-1758 24 p. |
artikel |
18 |
Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks
|
Keskinarkaus, A. |
|
2010 |
83 |
10 |
p. 1715-1725 11 p. |
artikel |
19 |
LESSON: A system for lecture notes searching and sharing over Internet
|
Zhou, Shuigeng |
|
2010 |
83 |
10 |
p. 1851-1863 13 p. |
artikel |
20 |
Modular analysis and modelling of risk scenarios with dependencies
|
Brændeland, Gyrd |
|
2010 |
83 |
10 |
p. 1995-2013 19 p. |
artikel |
21 |
Multi-party covert communication with steganography and quantum secret sharing
|
Liao, Xin |
|
2010 |
83 |
10 |
p. 1801-1804 4 p. |
artikel |
22 |
Online discovery of Heart Rate Variability patterns in mobile healthcare services
|
Vu, Thi Hong Nhan |
|
2010 |
83 |
10 |
p. 1930-1940 11 p. |
artikel |
23 |
Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information
|
Alnas, Mohamed |
|
2010 |
83 |
10 |
p. 1644-1650 7 p. |
artikel |
24 |
Security and privacy issues in the Portable Document Format
|
Castiglione, Aniello |
|
2010 |
83 |
10 |
p. 1813-1822 10 p. |
artikel |
25 |
Software development team flexibility antecedents
|
Li, Yuzhu |
|
2010 |
83 |
10 |
p. 1726-1734 9 p. |
artikel |
26 |
Survey of data management and analysis in disaster situations
|
Hristidis, Vagelis |
|
2010 |
83 |
10 |
p. 1701-1714 14 p. |
artikel |
27 |
The relation between EA effectiveness and stakeholder satisfaction
|
van der Raadt, Bas |
|
2010 |
83 |
10 |
p. 1954-1969 16 p. |
artikel |
28 |
Towards a general purpose architecture for UI generation
|
Kennard, Richard |
|
2010 |
83 |
10 |
p. 1896-1906 11 p. |
artikel |
29 |
Using quad smoothness to efficiently control capacity–distortion of reversible data hiding
|
Lin, Chi-Nan |
|
2010 |
83 |
10 |
p. 1805-1812 8 p. |
artikel |
30 |
Using Scrum to guide the execution of software process improvement in small organizations
|
Pino, Francisco J. |
|
2010 |
83 |
10 |
p. 1662-1677 16 p. |
artikel |
31 |
Varied PVD+LSB evading detection programs to spatial domain in data embedding systems
|
Yang, Cheng-Hsing |
|
2010 |
83 |
10 |
p. 1635-1643 9 p. |
artikel |