Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             19 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptable Decentralized Service Oriented Architecture Safi Esfahani, Faramarz
2011
84 10 p. 1591-1617
27 p.
artikel
2 A general (k, n) scalable secret image sharing scheme with the smooth scalability Yang, Ching-Nung
2011
84 10 p. 1726-1733
8 p.
artikel
3 A geographic routing hybrid approach for void resolution in wireless sensor networks Denardin, Gustavo Weber
2011
84 10 p. 1577-1590
14 p.
artikel
4 A grid-based coverage approach for target tracking in hybrid sensor networks Lin, Jenn-Wei
2011
84 10 p. 1746-1756
11 p.
artikel
5 A meet-in-the-middle attack on reduced-round ARIA Tang, Xuehai
2011
84 10 p. 1685-1692
8 p.
artikel
6 An aspect-oriented reference architecture for Software Engineering Environments Nakagawa, Elisa Y.
2011
84 10 p. 1670-1684
15 p.
artikel
7 An efficient CRT-RSA algorithm secure against power and fault attacks Kim, Sung-Kyoung
2011
84 10 p. 1660-1669
10 p.
artikel
8 Boosting adaptivity of fault-tolerant scheduling for real-time tasks with service requirements on clusters Zhu, Xiaomin
2011
84 10 p. 1708-1716
9 p.
artikel
9 Confidential deniable authentication using promised signcryption Hwang, Shin-Jia
2011
84 10 p. 1652-1659
8 p.
artikel
10 Editorial Board 2011
84 10 p. CO2-
1 p.
artikel
11 Engineering the authoring of usable service front ends PaternĂ², Fabio
2011
84 10 p. 1806-1822
17 p.
artikel
12 Exploiting social networks to provide privacy in personalized web search Erola, Arnau
2011
84 10 p. 1734-1745
12 p.
artikel
13 Formal analysis of an electronic voting system: An experience report Weldemariam, Komminist
2011
84 10 p. 1618-1637
20 p.
artikel
14 Identification of extract method refactoring opportunities for the decomposition of methods Tsantalis, Nikolaos
2011
84 10 p. 1757-1782
26 p.
artikel
15 Improving security of q-SDH based digital signatures Guo, Fuchun
2011
84 10 p. 1783-1790
8 p.
artikel
16 New and efficient knowledge discovery of partial periodic patterns with multiple minimum supports Chen, Shih-Sheng
2011
84 10 p. 1638-1651
14 p.
artikel
17 On software verification for sensor nodes Bucur, Doina
2011
84 10 p. 1693-1707
15 p.
artikel
18 Policy-based Awareness Management (PAM): Case study of a wireless communication system at a hospital Talaei-Khoei, Amir
2011
84 10 p. 1791-1805
15 p.
artikel
19 Provably secure and efficient authentication techniques for the global mobility network Lee, Tian-Fu
2011
84 10 p. 1717-1725
9 p.
artikel
                             19 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland