Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             24 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A covert communication method via spreadsheets by secret sharing with a self-authentication capability Lee, Che-Wei
2013
86 2 p. 324-334
11 p.
artikel
2 A high performance inter-domain communication approach for virtual machines Bai, Yuebin
2013
86 2 p. 367-376
10 p.
artikel
3 A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies Chang, Chin-Chen
2013
86 2 p. 389-402
14 p.
artikel
4 A posteriori operation detection in evolving software models Langer, Philip
2013
86 2 p. 551-566
16 p.
artikel
5 A reliability optimization method for RAID-structured storage systems based on active data migration Yang, Yin
2013
86 2 p. 468-484
17 p.
artikel
6 A robust blind color image watermarking in quaternion Fourier transform domain Wang, Xiang-yang
2013
86 2 p. 255-277
23 p.
artikel
7 A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection Tsai, Hung-Hsu
2013
86 2 p. 335-348
14 p.
artikel
8 Building ubiquitous computing applications using the VERSAG adaptive agent framework Gunasekera, Kutila
2013
86 2 p. 501-519
19 p.
artikel
9 Constraint-based specification of model transformations Lano, K.
2013
86 2 p. 412-436
25 p.
artikel
10 COTS integration and estimation for ERP Rosa, Wilson
2013
86 2 p. 538-550
13 p.
artikel
11 Design of component-based real-time applications López Martínez, Patricia
2013
86 2 p. 449-467
19 p.
artikel
12 Editorial Board 2013
86 2 p. CO2-
1 p.
artikel
13 3E: Energy-efficient elastic scheduling for independent tasks in heterogeneous computing systems Zhu, Xiaomin
2013
86 2 p. 302-314
13 p.
artikel
14 Effective pattern-driven concurrency bug detection for operating systems Hong, Shin
2013
86 2 p. 377-388
12 p.
artikel
15 Efficient reversible data hiding algorithm based on gradient-based edge direction prediction Yang, Wei-Jen
2013
86 2 p. 567-580
14 p.
artikel
16 Efficient support of dynamic inheritance for class- and prototype-based languages Redondo, Jose Manuel
2013
86 2 p. 278-301
24 p.
artikel
17 Histogram-shifting-imitated reversible data hiding Wang, Zhi-Hui
2013
86 2 p. 315-323
9 p.
artikel
18 Image sharing method for gray-level images Chen, Wei-Kuei
2013
86 2 p. 581-585
5 p.
artikel
19 Invertible secret image sharing for gray level and dithered cover images Ulutas, Mustafa
2013
86 2 p. 485-500
16 p.
artikel
20 Layer assessment of object-oriented software: A metric facilitating white-box reuse Kakarontzas, George
2013
86 2 p. 349-366
18 p.
artikel
21 Matthew effect, ABC analysis and project management of scale-free information systems Yan, Dong
2013
86 2 p. 247-254
8 p.
artikel
22 On using adversary simulators to evaluate global fixed-priority and FPZL scheduling of multiprocessors de Oliveira, Romulo Silva
2013
86 2 p. 403-411
9 p.
artikel
23 Promoting cooperation in service-oriented MAS through social plasticity and incentives del Val, E.
2013
86 2 p. 520-537
18 p.
artikel
24 SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks Chuang, Ming-Chin
2013
86 2 p. 437-448
12 p.
artikel
                             24 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland