nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A documentation framework for architecture decisions
|
van Heesch, U. |
|
2012 |
85 |
4 |
p. 795-820 26 p. |
artikel |
2 |
A fast algorithm for Huffman decoding based on a recursion Huffman tree
|
Lin, Yih-Kai |
|
2012 |
85 |
4 |
p. 974-980 7 p. |
artikel |
3 |
An efficient and secure multi-server authentication scheme with key agreement
|
Tsaur, Woei-Jiunn |
|
2012 |
85 |
4 |
p. 876-882 7 p. |
artikel |
4 |
Attribute-based strong designated-verifier signature scheme
|
Fan, Chun-I |
|
2012 |
85 |
4 |
p. 944-959 16 p. |
artikel |
5 |
Data management for component-based embedded real-time systems: The database proxy approach
|
Hjertström, Andreas |
|
2012 |
85 |
4 |
p. 821-834 14 p. |
artikel |
6 |
Debugging applications created by a Domain Specific Language: The IPAC case
|
Kolomvatsos, Kostas |
|
2012 |
85 |
4 |
p. 932-943 12 p. |
artikel |
7 |
Decision tree classifiers sensitive to heterogeneous costs
|
Zhang, Shichao |
|
2012 |
85 |
4 |
p. 771-779 9 p. |
artikel |
8 |
EClass: An execution classification approach to improving the energy-efficiency of software via machine learning
|
Kan, Edward Y.Y. |
|
2012 |
85 |
4 |
p. 960-973 14 p. |
artikel |
9 |
Editorial Board
|
|
|
2012 |
85 |
4 |
p. CO2- 1 p. |
artikel |
10 |
Factors affecting the success of Open Source Software
|
Midha, Vishal |
|
2012 |
85 |
4 |
p. 895-905 11 p. |
artikel |
11 |
Formally based semi-automatic implementation of an open security protocol
|
Pironti, Alfredo |
|
2012 |
85 |
4 |
p. 835-849 15 p. |
artikel |
12 |
Free and Open Source Software versus Internet content filtering and censorship: A case study
|
Shirazi, Farid |
|
2012 |
85 |
4 |
p. 920-931 12 p. |
artikel |
13 |
Handling timing constraints violations in soft real-time applications as exceptions
|
Cucinotta, Tommaso |
|
2012 |
85 |
4 |
p. 995-1011 17 p. |
artikel |
14 |
High performance dynamic voltage/frequency scaling algorithm for real-time dynamic load management
|
Coronel, J.O. |
|
2012 |
85 |
4 |
p. 906-919 14 p. |
artikel |
15 |
Improved preimage attack on one-block MD4
|
Zhong, Jinmin |
|
2012 |
85 |
4 |
p. 981-994 14 p. |
artikel |
16 |
Intelligent reversible watermarking in integer wavelet domain for medical images
|
Arsalan, Muhammad |
|
2012 |
85 |
4 |
p. 883-894 12 p. |
artikel |
17 |
Modularity analysis of use case implementations
|
d’Amorim, Fernanda |
|
2012 |
85 |
4 |
p. 1012-1027 16 p. |
artikel |
18 |
Perpetual development: A model of the Linux kernel life cycle
|
Feitelson, Dror G. |
|
2012 |
85 |
4 |
p. 859-875 17 p. |
artikel |
19 |
Rolling-horizon scheduling for energy constrained distributed real-time embedded systems
|
He, Chuan |
|
2012 |
85 |
4 |
p. 780-794 15 p. |
artikel |
20 |
The novel bilateral – Diffusion image encryption algorithm with dynamical compound chaos
|
Tong, Xiao-jun |
|
2012 |
85 |
4 |
p. 850-858 9 p. |
artikel |