nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
|
Shoufan, Abdulhadi |
|
2011 |
84 |
7 |
p. 1130-1143 14 p. |
artikel |
2 |
An algorithm for capturing variables dependences in test suites
|
Masri, Wes |
|
2011 |
84 |
7 |
p. 1171-1190 20 p. |
artikel |
3 |
An empirical study of software architectures’ effect on product quality
|
Hansen, Klaus Marius |
|
2011 |
84 |
7 |
p. 1233-1243 11 p. |
artikel |
4 |
APDL: A reference XML schema for process-centered definition of RFID solutions
|
Kefalakis, Nikos |
|
2011 |
84 |
7 |
p. 1244-1259 16 p. |
artikel |
5 |
Dynamic deployment of context-aware access control policies for constrained security devices
|
Preda, Stere |
|
2011 |
84 |
7 |
p. 1144-1159 16 p. |
artikel |
6 |
Editorial Board
|
|
|
2011 |
84 |
7 |
p. CO2- 1 p. |
artikel |
7 |
Impossible differential cryptanalysis of 13-round CLEFIA-128
|
Tang, Xuehai |
|
2011 |
84 |
7 |
p. 1191-1196 6 p. |
artikel |
8 |
Is my model right? Let me ask the expert
|
Bertolino, Antonia |
|
2011 |
84 |
7 |
p. 1089-1099 11 p. |
artikel |
9 |
Model-driven development of industrial process control applications
|
Hästbacka, David |
|
2011 |
84 |
7 |
p. 1100-1113 14 p. |
artikel |
10 |
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid
|
Du, Zhihui |
|
2011 |
84 |
7 |
p. 1224-1232 9 p. |
artikel |
11 |
Parsed use case descriptions as a basis for object-oriented class model generation
|
Elbendak, Mosa |
|
2011 |
84 |
7 |
p. 1209-1223 15 p. |
artikel |
12 |
Procedural security analysis: A methodological approach
|
Weldemariam, Komminist |
|
2011 |
84 |
7 |
p. 1114-1129 16 p. |
artikel |
13 |
Reusable software components for accelerator-based clusters
|
Rafique, M. Mustafa |
|
2011 |
84 |
7 |
p. 1071-1081 11 p. |
artikel |
14 |
Scalable, statistical storage allocation for extensible inverted file construction
|
Luk, Robert W.P. |
|
2011 |
84 |
7 |
p. 1082-1088 7 p. |
artikel |
15 |
Simulation-based analysis of middleware service impact on system reliability: Experiment on Java application server
|
Huang, Gang |
|
2011 |
84 |
7 |
p. 1160-1170 11 p. |
artikel |
16 |
Threshold visual secret sharing by random grids
|
Chen, Tzung-Her |
|
2011 |
84 |
7 |
p. 1197-1208 12 p. |
artikel |