Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             31 results found
no title author magazine year volume issue page(s) type
1 A comprehensive engineering framework for guaranteeing component compatibility Floch, J.
2010
83 10 p. 1759-1779
21 p.
article
2 Actual vs. perceived effect of software engineering practices in the Italian industry Egorova, Evgenia
2010
83 10 p. 1907-1916
10 p.
article
3 A model checker for WS-CDL Wang, Hongbing
2010
83 10 p. 1651-1661
11 p.
article
4 A multicriteria approach for risks assessment in ERP maintenance Salmeron, Jose L.
2010
83 10 p. 1941-1953
13 p.
article
5 An ID-based aggregate signature scheme with constant pairing computations Shim, Kyung-Ah
2010
83 10 p. 1873-1880
8 p.
article
6 A novel DRM framework for peer-to-peer music content delivery Li, Jung-Shian
2010
83 10 p. 1689-1700
12 p.
article
7 A novel global harmony search algorithm for task assignment problem Zou, Dexuan
2010
83 10 p. 1678-1688
11 p.
article
8 A software integration approach for designing and assessing dependable embedded systems Suri, Neeraj
2010
83 10 p. 1780-1800
21 p.
article
9 A Superscalar software architecture model for Multi-Core Processors (MCPs) Choi, Gyu Sang
2010
83 10 p. 1823-1837
15 p.
article
10 Automated assembly of Internet-scale software systems involving autonomous agents Jiao, Wenpin
2010
83 10 p. 1838-1850
13 p.
article
11 Coordination implications of software architecture in a global software development project Avritzer, Alberto
2010
83 10 p. 1881-1895
15 p.
article
12 Dependency-aware maintenance for highly available service-oriented grid Jin, Hai
2010
83 10 p. 1983-1994
12 p.
article
13 Editorial Board 2010
83 10 p. CO2-
1 p.
article
14 Efficient utilization of elliptic curve cryptosystem for hierarchical access control Nikooghadam, Morteza
2010
83 10 p. 1917-1929
13 p.
article
15 Embedding capacity raising in reversible data hiding based on prediction of difference expansion Lee, Chin-Feng
2010
83 10 p. 1864-1872
9 p.
article
16 Generating blogs out of product catalogues: An MDE approach Diaz, Oscar
2010
83 10 p. 1970-1982
13 p.
article
17 How do architecture patterns and tactics interact? A model and annotation Harrison, Neil B.
2010
83 10 p. 1735-1758
24 p.
article
18 Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks Keskinarkaus, A.
2010
83 10 p. 1715-1725
11 p.
article
19 LESSON: A system for lecture notes searching and sharing over Internet Zhou, Shuigeng
2010
83 10 p. 1851-1863
13 p.
article
20 Modular analysis and modelling of risk scenarios with dependencies Brændeland, Gyrd
2010
83 10 p. 1995-2013
19 p.
article
21 Multi-party covert communication with steganography and quantum secret sharing Liao, Xin
2010
83 10 p. 1801-1804
4 p.
article
22 Online discovery of Heart Rate Variability patterns in mobile healthcare services Vu, Thi Hong Nhan
2010
83 10 p. 1930-1940
11 p.
article
23 Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information Alnas, Mohamed
2010
83 10 p. 1644-1650
7 p.
article
24 Security and privacy issues in the Portable Document Format Castiglione, Aniello
2010
83 10 p. 1813-1822
10 p.
article
25 Software development team flexibility antecedents Li, Yuzhu
2010
83 10 p. 1726-1734
9 p.
article
26 Survey of data management and analysis in disaster situations Hristidis, Vagelis
2010
83 10 p. 1701-1714
14 p.
article
27 The relation between EA effectiveness and stakeholder satisfaction van der Raadt, Bas
2010
83 10 p. 1954-1969
16 p.
article
28 Towards a general purpose architecture for UI generation Kennard, Richard
2010
83 10 p. 1896-1906
11 p.
article
29 Using quad smoothness to efficiently control capacity–distortion of reversible data hiding Lin, Chi-Nan
2010
83 10 p. 1805-1812
8 p.
article
30 Using Scrum to guide the execution of software process improvement in small organizations Pino, Francisco J.
2010
83 10 p. 1662-1677
16 p.
article
31 Varied PVD+LSB evading detection programs to spatial domain in data embedding systems Yang, Cheng-Hsing
2010
83 10 p. 1635-1643
9 p.
article
                             31 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands