nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid channel assignment strategy to QoS support of video-streaming over multi-channel ad hoc networks
|
Ma, Xiaolin |
|
2012 |
85 |
2 |
p. 300-308 9 p. |
artikel |
2 |
An efficient short certificate-based signature scheme
|
Li, Jiguo |
|
2012 |
85 |
2 |
p. 314-322 9 p. |
artikel |
3 |
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system
|
Wei, Xiaopeng |
|
2012 |
85 |
2 |
p. 290-299 10 p. |
artikel |
4 |
Applying and evaluating concern-sensitive design heuristics
|
Figueiredo, Eduardo |
|
2012 |
85 |
2 |
p. 227-243 17 p. |
artikel |
5 |
Automating the product derivation process of multi-agent systems product lines
|
Cirilo, Elder |
|
2012 |
85 |
2 |
p. 258-276 19 p. |
artikel |
6 |
Collision-based flexible image encryption algorithm
|
Zhou, Qing |
|
2012 |
85 |
2 |
p. 400-407 8 p. |
artikel |
7 |
Concept vector for semantic similarity and relatedness based on WordNet structure
|
Liu, Hongzhe |
|
2012 |
85 |
2 |
p. 370-381 12 p. |
artikel |
8 |
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
|
Pozo, S. |
|
2012 |
85 |
2 |
p. 425-457 33 p. |
artikel |
9 |
Design patterns selection: An automatic two-phase method
|
Hasheminejad, Seyed Mohammad Hossein |
|
2012 |
85 |
2 |
p. 408-424 17 p. |
artikel |
10 |
Editorial Board
|
|
|
2012 |
85 |
2 |
p. CO2- 1 p. |
artikel |
11 |
Identifying thresholds for object-oriented software metrics
|
Ferreira, Kecia A.M. |
|
2012 |
85 |
2 |
p. 244-257 14 p. |
artikel |
12 |
Intrusion-resilient identity-based signature: Security definition and construction
|
Yu, Jia |
|
2012 |
85 |
2 |
p. 382-391 10 p. |
artikel |
13 |
Lossless data hiding in JPEG bitstream
|
Qian, Zhenxing |
|
2012 |
85 |
2 |
p. 309-313 5 p. |
artikel |
14 |
Provably secure three-party password authenticated key exchange protocol in the standard model
|
Yang, Jun-Han |
|
2012 |
85 |
2 |
p. 340-350 11 p. |
artikel |
15 |
Reconciling software development models: A quasi-systematic review
|
Magdaleno, Andréa Magalhães |
|
2012 |
85 |
2 |
p. 351-369 19 p. |
artikel |
16 |
Reversible data hiding of high payload using local edge sensing prediction
|
Feng, Guorui |
|
2012 |
85 |
2 |
p. 392-399 8 p. |
artikel |
17 |
Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering
|
Borba, Paulo |
|
2012 |
85 |
2 |
p. 215- 1 p. |
artikel |
18 |
To lock, or not to lock: That is the question
|
Prudêncio, João Gustavo |
|
2012 |
85 |
2 |
p. 277-289 13 p. |
artikel |
19 |
Towards developing consistent misuse case models
|
El-Attar, Mohamed |
|
2012 |
85 |
2 |
p. 323-339 17 p. |
artikel |
20 |
Towards understanding the underlying structure of motivational factors for software engineers to guide the definition of motivational programs
|
da Silva, Fabio Q.B. |
|
2012 |
85 |
2 |
p. 216-226 11 p. |
artikel |