Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 A documentation framework for architecture decisions van Heesch, U.
2012
85 4 p. 795-820
26 p.
article
2 A fast algorithm for Huffman decoding based on a recursion Huffman tree Lin, Yih-Kai
2012
85 4 p. 974-980
7 p.
article
3 An efficient and secure multi-server authentication scheme with key agreement Tsaur, Woei-Jiunn
2012
85 4 p. 876-882
7 p.
article
4 Attribute-based strong designated-verifier signature scheme Fan, Chun-I
2012
85 4 p. 944-959
16 p.
article
5 Data management for component-based embedded real-time systems: The database proxy approach Hjertström, Andreas
2012
85 4 p. 821-834
14 p.
article
6 Debugging applications created by a Domain Specific Language: The IPAC case Kolomvatsos, Kostas
2012
85 4 p. 932-943
12 p.
article
7 Decision tree classifiers sensitive to heterogeneous costs Zhang, Shichao
2012
85 4 p. 771-779
9 p.
article
8 EClass: An execution classification approach to improving the energy-efficiency of software via machine learning Kan, Edward Y.Y.
2012
85 4 p. 960-973
14 p.
article
9 Editorial Board 2012
85 4 p. CO2-
1 p.
article
10 Factors affecting the success of Open Source Software Midha, Vishal
2012
85 4 p. 895-905
11 p.
article
11 Formally based semi-automatic implementation of an open security protocol Pironti, Alfredo
2012
85 4 p. 835-849
15 p.
article
12 Free and Open Source Software versus Internet content filtering and censorship: A case study Shirazi, Farid
2012
85 4 p. 920-931
12 p.
article
13 Handling timing constraints violations in soft real-time applications as exceptions Cucinotta, Tommaso
2012
85 4 p. 995-1011
17 p.
article
14 High performance dynamic voltage/frequency scaling algorithm for real-time dynamic load management Coronel, J.O.
2012
85 4 p. 906-919
14 p.
article
15 Improved preimage attack on one-block MD4 Zhong, Jinmin
2012
85 4 p. 981-994
14 p.
article
16 Intelligent reversible watermarking in integer wavelet domain for medical images Arsalan, Muhammad
2012
85 4 p. 883-894
12 p.
article
17 Modularity analysis of use case implementations d’Amorim, Fernanda
2012
85 4 p. 1012-1027
16 p.
article
18 Perpetual development: A model of the Linux kernel life cycle Feitelson, Dror G.
2012
85 4 p. 859-875
17 p.
article
19 Rolling-horizon scheduling for energy constrained distributed real-time embedded systems He, Chuan
2012
85 4 p. 780-794
15 p.
article
20 The novel bilateral – Diffusion image encryption algorithm with dynamical compound chaos Tong, Xiao-jun
2012
85 4 p. 850-858
9 p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands