nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A family of implementation-friendly BN elliptic curves
|
Pereira, Geovandro C.C.F. |
|
2011 |
84 |
8 |
p. 1319-1326 8 p. |
artikel |
2 |
An approach to process continuous location-dependent queries on moving objects with support for location granules
|
Ilarri, Sergio |
|
2011 |
84 |
8 |
p. 1327-1350 24 p. |
artikel |
3 |
An information presentation method based on tree-like super entity component
|
Zhang, Ruijun |
|
2011 |
84 |
8 |
p. 1306-1318 13 p. |
artikel |
4 |
An overview on test generation from functional requirements
|
Escalona, M.J. |
|
2011 |
84 |
8 |
p. 1379-1393 15 p. |
artikel |
5 |
A robust digital audio watermarking scheme using wavelet moment invariance
|
Wang, Xiang-yang |
|
2011 |
84 |
8 |
p. 1408-1421 14 p. |
artikel |
6 |
BSN: An automatic generation algorithm of social network data
|
Han, Lixin |
|
2011 |
84 |
8 |
p. 1261-1269 9 p. |
artikel |
7 |
Deriving business processes with service level agreements from early requirements
|
Frankova, Ganna |
|
2011 |
84 |
8 |
p. 1351-1363 13 p. |
artikel |
8 |
Developing an efficient query system for encrypted XML documents
|
Chang, Tao-Ku |
|
2011 |
84 |
8 |
p. 1292-1305 14 p. |
artikel |
9 |
Editorial Board
|
|
|
2011 |
84 |
8 |
p. CO2- 1 p. |
artikel |
10 |
Framework for evaluation and selection of the software packages: A hybrid knowledge based system approach
|
Jadhav, Anil S. |
|
2011 |
84 |
8 |
p. 1394-1407 14 p. |
artikel |
11 |
On a security model of conjunctive keyword search over encrypted relational database
|
Byun, Jin Wook |
|
2011 |
84 |
8 |
p. 1364-1372 9 p. |
artikel |
12 |
Priority scheduling of requests to web portals
|
Holton, D.R.W. |
|
2011 |
84 |
8 |
p. 1373-1378 6 p. |
artikel |
13 |
The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks
|
Kousiouris, George |
|
2011 |
84 |
8 |
p. 1270-1291 22 p. |
artikel |