nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving key privacy without losing CCA security in proxy re-encryption
|
Shao, Jun |
|
2012 |
85 |
3 |
p. 655-665 11 p. |
artikel |
2 |
A dynamic layout of sliding window for frequent itemset mining over data streams
|
Deypir, Mahmood |
|
2012 |
85 |
3 |
p. 746-759 14 p. |
artikel |
3 |
A history-based cost-cognizant test case prioritization technique in regression testing
|
Huang, Yu-Chi |
|
2012 |
85 |
3 |
p. 626-637 12 p. |
artikel |
4 |
A lightweight framework for describing software practices
|
Kirk, Diana |
|
2012 |
85 |
3 |
p. 582-595 14 p. |
artikel |
5 |
An efficient RSA-based certificateless signature scheme
|
Zhang, Jianhong |
|
2012 |
85 |
3 |
p. 638-642 5 p. |
artikel |
6 |
A proposal to detect errors in Enterprise Application Integration solutions
|
Frantz, Rafael Z. |
|
2012 |
85 |
3 |
p. 480-497 18 p. |
artikel |
7 |
A reusable structural design for mobile collaborative applications
|
Neyem, Andrés |
|
2012 |
85 |
3 |
p. 511-524 14 p. |
artikel |
8 |
Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches
|
Fabra, J. |
|
2012 |
85 |
3 |
p. 607-625 19 p. |
artikel |
9 |
Bridging the gap between requirements and design: An approach based on Problem Frames and SysML
|
Colombo, Pietro |
|
2012 |
85 |
3 |
p. 717-745 29 p. |
artikel |
10 |
Changing attitudes towards the generation of architectural models
|
Castro, Jaelson |
|
2012 |
85 |
3 |
p. 463-479 17 p. |
artikel |
11 |
Deriving detailed design models from an aspect-oriented ADL using MDD
|
Pinto, Mónica |
|
2012 |
85 |
3 |
p. 525-545 21 p. |
artikel |
12 |
Editorial Board
|
|
|
2012 |
85 |
3 |
p. CO2- 1 p. |
artikel |
13 |
Empirical findings on team size and productivity in software development
|
Rodríguez, D. |
|
2012 |
85 |
3 |
p. 562-570 9 p. |
artikel |
14 |
Enabling correct design and formal analysis of Ambient Assisted Living systems
|
Benghazi, Kawtar |
|
2012 |
85 |
3 |
p. 498-510 13 p. |
artikel |
15 |
Evolution and change management of XML-based systems
|
Nečaský, Martin |
|
2012 |
85 |
3 |
p. 683-707 25 p. |
artikel |
16 |
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
|
Zhao, Xingwen |
|
2012 |
85 |
3 |
p. 708-716 9 p. |
artikel |
17 |
Further observation on proxy re-encryption with keyword search
|
Wang, Xu An |
|
2012 |
85 |
3 |
p. 643-654 12 p. |
artikel |
18 |
Gateway-oriented password-authenticated key exchange protocol in the standard model
|
Wei, Fushan |
|
2012 |
85 |
3 |
p. 760-768 9 p. |
artikel |
19 |
Making sense of business process descriptions: An experimental comparison of graphical and textual notations
|
Ottensooser, Avner |
|
2012 |
85 |
3 |
p. 596-606 11 p. |
artikel |
20 |
Novel approaches in the design and implementation of system/software architectures
|
Chung, Lawrence |
|
2012 |
85 |
3 |
p. 459-462 4 p. |
artikel |
21 |
Organizational adoption of open source software
|
Spinellis, Diomidis |
|
2012 |
85 |
3 |
p. 666-682 17 p. |
artikel |
22 |
Towards supporting the software architecture life cycle
|
Weinreich, Rainer |
|
2012 |
85 |
3 |
p. 546-561 16 p. |
artikel |
23 |
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines
|
Bhattacharjee, Sudipta |
|
2012 |
85 |
3 |
p. 571-581 11 p. |
artikel |