Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             23 results found
no title author magazine year volume issue page(s) type
1 Achieving key privacy without losing CCA security in proxy re-encryption Shao, Jun
2012
85 3 p. 655-665
11 p.
article
2 A dynamic layout of sliding window for frequent itemset mining over data streams Deypir, Mahmood
2012
85 3 p. 746-759
14 p.
article
3 A history-based cost-cognizant test case prioritization technique in regression testing Huang, Yu-Chi
2012
85 3 p. 626-637
12 p.
article
4 A lightweight framework for describing software practices Kirk, Diana
2012
85 3 p. 582-595
14 p.
article
5 An efficient RSA-based certificateless signature scheme Zhang, Jianhong
2012
85 3 p. 638-642
5 p.
article
6 A proposal to detect errors in Enterprise Application Integration solutions Frantz, Rafael Z.
2012
85 3 p. 480-497
18 p.
article
7 A reusable structural design for mobile collaborative applications Neyem, Andrés
2012
85 3 p. 511-524
14 p.
article
8 Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches Fabra, J.
2012
85 3 p. 607-625
19 p.
article
9 Bridging the gap between requirements and design: An approach based on Problem Frames and SysML Colombo, Pietro
2012
85 3 p. 717-745
29 p.
article
10 Changing attitudes towards the generation of architectural models Castro, Jaelson
2012
85 3 p. 463-479
17 p.
article
11 Deriving detailed design models from an aspect-oriented ADL using MDD Pinto, Mónica
2012
85 3 p. 525-545
21 p.
article
12 Editorial Board 2012
85 3 p. CO2-
1 p.
article
13 Empirical findings on team size and productivity in software development Rodríguez, D.
2012
85 3 p. 562-570
9 p.
article
14 Enabling correct design and formal analysis of Ambient Assisted Living systems Benghazi, Kawtar
2012
85 3 p. 498-510
13 p.
article
15 Evolution and change management of XML-based systems Nečaský, Martin
2012
85 3 p. 683-707
25 p.
article
16 Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority Zhao, Xingwen
2012
85 3 p. 708-716
9 p.
article
17 Further observation on proxy re-encryption with keyword search Wang, Xu An
2012
85 3 p. 643-654
12 p.
article
18 Gateway-oriented password-authenticated key exchange protocol in the standard model Wei, Fushan
2012
85 3 p. 760-768
9 p.
article
19 Making sense of business process descriptions: An experimental comparison of graphical and textual notations Ottensooser, Avner
2012
85 3 p. 596-606
11 p.
article
20 Novel approaches in the design and implementation of system/software architectures Chung, Lawrence
2012
85 3 p. 459-462
4 p.
article
21 Organizational adoption of open source software Spinellis, Diomidis
2012
85 3 p. 666-682
17 p.
article
22 Towards supporting the software architecture life cycle Weinreich, Rainer
2012
85 3 p. 546-561
16 p.
article
23 Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines Bhattacharjee, Sudipta
2012
85 3 p. 571-581
11 p.
article
                             23 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands