nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A covert communication method via spreadsheets by secret sharing with a self-authentication capability
|
Lee, Che-Wei |
|
2013 |
86 |
2 |
p. 324-334 11 p. |
artikel |
2 |
A high performance inter-domain communication approach for virtual machines
|
Bai, Yuebin |
|
2013 |
86 |
2 |
p. 367-376 10 p. |
artikel |
3 |
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies
|
Chang, Chin-Chen |
|
2013 |
86 |
2 |
p. 389-402 14 p. |
artikel |
4 |
A posteriori operation detection in evolving software models
|
Langer, Philip |
|
2013 |
86 |
2 |
p. 551-566 16 p. |
artikel |
5 |
A reliability optimization method for RAID-structured storage systems based on active data migration
|
Yang, Yin |
|
2013 |
86 |
2 |
p. 468-484 17 p. |
artikel |
6 |
A robust blind color image watermarking in quaternion Fourier transform domain
|
Wang, Xiang-yang |
|
2013 |
86 |
2 |
p. 255-277 23 p. |
artikel |
7 |
A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection
|
Tsai, Hung-Hsu |
|
2013 |
86 |
2 |
p. 335-348 14 p. |
artikel |
8 |
Building ubiquitous computing applications using the VERSAG adaptive agent framework
|
Gunasekera, Kutila |
|
2013 |
86 |
2 |
p. 501-519 19 p. |
artikel |
9 |
Constraint-based specification of model transformations
|
Lano, K. |
|
2013 |
86 |
2 |
p. 412-436 25 p. |
artikel |
10 |
COTS integration and estimation for ERP
|
Rosa, Wilson |
|
2013 |
86 |
2 |
p. 538-550 13 p. |
artikel |
11 |
Design of component-based real-time applications
|
López Martínez, Patricia |
|
2013 |
86 |
2 |
p. 449-467 19 p. |
artikel |
12 |
Editorial Board
|
|
|
2013 |
86 |
2 |
p. CO2- 1 p. |
artikel |
13 |
3E: Energy-efficient elastic scheduling for independent tasks in heterogeneous computing systems
|
Zhu, Xiaomin |
|
2013 |
86 |
2 |
p. 302-314 13 p. |
artikel |
14 |
Effective pattern-driven concurrency bug detection for operating systems
|
Hong, Shin |
|
2013 |
86 |
2 |
p. 377-388 12 p. |
artikel |
15 |
Efficient reversible data hiding algorithm based on gradient-based edge direction prediction
|
Yang, Wei-Jen |
|
2013 |
86 |
2 |
p. 567-580 14 p. |
artikel |
16 |
Efficient support of dynamic inheritance for class- and prototype-based languages
|
Redondo, Jose Manuel |
|
2013 |
86 |
2 |
p. 278-301 24 p. |
artikel |
17 |
Histogram-shifting-imitated reversible data hiding
|
Wang, Zhi-Hui |
|
2013 |
86 |
2 |
p. 315-323 9 p. |
artikel |
18 |
Image sharing method for gray-level images
|
Chen, Wei-Kuei |
|
2013 |
86 |
2 |
p. 581-585 5 p. |
artikel |
19 |
Invertible secret image sharing for gray level and dithered cover images
|
Ulutas, Mustafa |
|
2013 |
86 |
2 |
p. 485-500 16 p. |
artikel |
20 |
Layer assessment of object-oriented software: A metric facilitating white-box reuse
|
Kakarontzas, George |
|
2013 |
86 |
2 |
p. 349-366 18 p. |
artikel |
21 |
Matthew effect, ABC analysis and project management of scale-free information systems
|
Yan, Dong |
|
2013 |
86 |
2 |
p. 247-254 8 p. |
artikel |
22 |
On using adversary simulators to evaluate global fixed-priority and FPZL scheduling of multiprocessors
|
de Oliveira, Romulo Silva |
|
2013 |
86 |
2 |
p. 403-411 9 p. |
artikel |
23 |
Promoting cooperation in service-oriented MAS through social plasticity and incentives
|
del Val, E. |
|
2013 |
86 |
2 |
p. 520-537 18 p. |
artikel |
24 |
SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks
|
Chuang, Ming-Chin |
|
2013 |
86 |
2 |
p. 437-448 12 p. |
artikel |