nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A differential cryptanalysis of Yen–Chen–Wu multimedia cryptography system
|
Li, Chengqing |
|
2010 |
83 |
8 |
p. 1443-1452 10 p. |
artikel |
2 |
A distributed platform for personalized advertising in digital interactive TV environments
|
Athanasiadis, Erast |
|
2010 |
83 |
8 |
p. 1453-1469 17 p. |
artikel |
3 |
A distributed server architecture supporting dynamic resource provisioning for BPM-oriented workflow management systems
|
Tsai, Ching-Hong |
|
2010 |
83 |
8 |
p. 1538-1552 15 p. |
artikel |
4 |
A modeling approach on the TelosB WSN platform power consumption
|
Prayati, A. |
|
2010 |
83 |
8 |
p. 1355-1363 9 p. |
artikel |
5 |
A new approach for component’s port modeling in software architecture
|
Bennouar, D. |
|
2010 |
83 |
8 |
p. 1430-1442 13 p. |
artikel |
6 |
Architecture analysis of enterprise systems modifiability – Models, analysis, and validation
|
Lagerström, Robert |
|
2010 |
83 |
8 |
p. 1387-1403 17 p. |
artikel |
7 |
Communication modeling of multicast in all-port wormhole-routed NoCs
|
Moadeli, Mahmoud |
|
2010 |
83 |
8 |
p. 1327-1336 10 p. |
artikel |
8 |
Design and evaluation of a novel MAC layer handoff protocol for IEEE 802.11 wireless networks
|
Pazzi, Richard W. |
|
2010 |
83 |
8 |
p. 1364-1372 9 p. |
artikel |
9 |
Editorial Board
|
|
|
2010 |
83 |
8 |
p. IFC- 1 p. |
artikel |
10 |
GLBM: A new QoS aware multicast scheme for wireless mesh networks
|
Zhao, Liang |
|
2010 |
83 |
8 |
p. 1318-1326 9 p. |
artikel |
11 |
Handling communications in process algebraic architectural description languages: Modeling, verification, and implementation
|
Bernardo, Marco |
|
2010 |
83 |
8 |
p. 1404-1429 26 p. |
artikel |
12 |
Historical index structure for reducing insertion and search cost in LBS
|
Jung, Young Jin |
|
2010 |
83 |
8 |
p. 1500-1511 12 p. |
artikel |
13 |
Image watermarking method in multiwavelet domain based on support vector machines
|
Peng, Hong |
|
2010 |
83 |
8 |
p. 1470-1477 8 p. |
artikel |
14 |
Improving routing protocol performance in delay tolerant networks using extended information
|
Chen, Xiao |
|
2010 |
83 |
8 |
p. 1301-1309 9 p. |
artikel |
15 |
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
|
Shabtai, Asaf |
|
2010 |
83 |
8 |
p. 1524-1537 14 p. |
artikel |
16 |
On the performance of real-time multi-item request scheduling in data broadcast environments
|
Chen, Jun |
|
2010 |
83 |
8 |
p. 1337-1345 9 p. |
artikel |
17 |
Per-flow optimal service selection for Web services based processes
|
Ardagna, Danilo |
|
2010 |
83 |
8 |
p. 1512-1523 12 p. |
artikel |
18 |
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks
|
Nayebi, Abbas |
|
2010 |
83 |
8 |
p. 1310-1317 8 p. |
artikel |
19 |
Performance evaluation of bag of gangs scheduling in a heterogeneous distributed system
|
Papazachos, Zafeirios C. |
|
2010 |
83 |
8 |
p. 1346-1354 9 p. |
artikel |
20 |
Quality adaptive end-to-end packet scheduling to avoid playout interruptions in Internet video streaming systems
|
Fortuna, Rossella |
|
2010 |
83 |
8 |
p. 1489-1499 11 p. |
artikel |
21 |
Requirement-based approach for groupware environments design
|
Penichet, Victor M.R. |
|
2010 |
83 |
8 |
p. 1478-1488 11 p. |
artikel |
22 |
Signal strength based routing for power saving in mobile ad hoc networks
|
Chen, Ching-Wen |
|
2010 |
83 |
8 |
p. 1373-1386 14 p. |
artikel |
23 |
Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems
|
Al-Dubai, Ahmed Y. |
|
2010 |
83 |
8 |
p. 1299-1300 2 p. |
artikel |