nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AIOLOS: Middleware for improving mobile application performance through cyber foraging
|
Verbelen, Tim |
|
2012 |
85 |
11 |
p. 2629-2639 11 p. |
artikel |
2 |
An endurance solution for solid state drives with cache
|
Wang, Wei-neng |
|
2012 |
85 |
11 |
p. 2553-2558 6 p. |
artikel |
3 |
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches
|
Malik, Sana Ambreen |
|
2012 |
85 |
11 |
p. 2665-2673 9 p. |
artikel |
4 |
A variable-length model for masquerade detection
|
Xiao, Xi |
|
2012 |
85 |
11 |
p. 2470-2478 9 p. |
artikel |
5 |
Cross-layer end-to-end label switching protocol for WiMAX–MPLS heterogeneous networks
|
Chen, Jenhui |
|
2012 |
85 |
11 |
p. 2459-2469 11 p. |
artikel |
6 |
Editorial Board
|
|
|
2012 |
85 |
11 |
p. CO2- 1 p. |
artikel |
7 |
Execution of natural language requirements using State Machines synthesised from Behavior Trees
|
Kim, Soon-Kyeong |
|
2012 |
85 |
11 |
p. 2652-2664 13 p. |
artikel |
8 |
From Teleo-Reactive specifications to architectural components: A model-driven approach
|
Sánchez, Pedro |
|
2012 |
85 |
11 |
p. 2504-2518 15 p. |
artikel |
9 |
Grouping target paths for evolutionary generation of test data in parallel
|
Gong, Dunwei |
|
2012 |
85 |
11 |
p. 2531-2540 10 p. |
artikel |
10 |
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
|
Liu, Ya |
|
2012 |
85 |
11 |
p. 2451-2458 8 p. |
artikel |
11 |
Interpretation problems related to the use of regression models to decide on economy of scale in software development
|
Jørgensen, Magne |
|
2012 |
85 |
11 |
p. 2494-2503 10 p. |
artikel |
12 |
JCSI: A tool for checking secure information flow in Java Card applications
|
Avvenuti, Marco |
|
2012 |
85 |
11 |
p. 2479-2493 15 p. |
artikel |
13 |
Managing data dependencies in service compositions
|
Monsieur, Geert |
|
2012 |
85 |
11 |
p. 2604-2628 25 p. |
artikel |
14 |
Masquerade attacks based on user's profile
|
Razo-Zapata, Iván S. |
|
2012 |
85 |
11 |
p. 2640-2651 12 p. |
artikel |
15 |
Nearest neighbor selection for iteratively kNN imputation
|
Zhang, Shichao |
|
2012 |
85 |
11 |
p. 2541-2552 12 p. |
artikel |
16 |
Ontology driven bee's foraging approach based self adaptive online recommendation system
|
Mohanraj, V. |
|
2012 |
85 |
11 |
p. 2439-2450 12 p. |
artikel |
17 |
Optimizing virtual machines using hybrid virtualization
|
Lin, Qian |
|
2012 |
85 |
11 |
p. 2593-2603 11 p. |
artikel |
18 |
Percolation-based routing in the Internet
|
Palmieri, Francesco |
|
2012 |
85 |
11 |
p. 2559-2573 15 p. |
artikel |
19 |
Performance analysis of SCOOP programs
|
Morandi, Benjamin |
|
2012 |
85 |
11 |
p. 2519-2530 12 p. |
artikel |
20 |
Software architecture evolution through evolvability analysis
|
Breivold, Hongyu Pei |
|
2012 |
85 |
11 |
p. 2574-2592 19 p. |
artikel |
21 |
Strong fuzzy c-means in medical image data analysis
|
Kannan, S.R. |
|
2012 |
85 |
11 |
p. 2425-2438 14 p. |
artikel |