nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A computer virus spreading model based on resource limitations and interaction costs
|
Huang, Chung-Yuan |
|
2013 |
86 |
3 |
p. 801-808 8 p. |
artikel |
2 |
A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks
|
Lin, Jenn-Wei |
|
2013 |
86 |
3 |
p. 789-800 12 p. |
artikel |
3 |
AFChecker: Effective model checking for context-aware adaptive applications
|
Liu, Yepang |
|
2013 |
86 |
3 |
p. 854-867 14 p. |
artikel |
4 |
A mapping study to investigate component-based software system metrics
|
Abdellatief, Majdi |
|
2013 |
86 |
3 |
p. 587-603 17 p. |
artikel |
5 |
An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames
|
Lin, Tseng-Jung |
|
2013 |
86 |
3 |
p. 604-614 11 p. |
artikel |
6 |
A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation
|
Luo, Yifeng |
|
2013 |
86 |
3 |
p. 744-750 7 p. |
artikel |
7 |
A reversible data hiding method by histogram shifting in high quality medical images
|
Huang, Li-Chin |
|
2013 |
86 |
3 |
p. 716-727 12 p. |
artikel |
8 |
A sliding window based algorithm for frequent closed itemset mining over data streams
|
Nori, Fatemeh |
|
2013 |
86 |
3 |
p. 615-623 9 p. |
artikel |
9 |
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems
|
Zalewski, Andrzej |
|
2013 |
86 |
3 |
p. 683-697 15 p. |
artikel |
10 |
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
|
Houmansadr, Amir |
|
2013 |
86 |
3 |
p. 707-715 9 p. |
artikel |
11 |
Communities of Web service registries: Construction and management
|
Sellami, Mohamed |
|
2013 |
86 |
3 |
p. 835-853 19 p. |
artikel |
12 |
Constrained frequent pattern mining on univariate uncertain data
|
Liu, Ying-Ho |
|
2013 |
86 |
3 |
p. 759-778 20 p. |
artikel |
13 |
Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478]
|
Xiao, Xi |
|
2013 |
86 |
3 |
p. 868- 1 p. |
artikel |
14 |
Editorial Board
|
|
|
2013 |
86 |
3 |
p. CO2- 1 p. |
artikel |
15 |
Efficient Hamming weight-based side-channel cube attacks on PRESENT
|
Zhao, Xinjie |
|
2013 |
86 |
3 |
p. 728-743 16 p. |
artikel |
16 |
Improving feature location using structural similarity and iterative graph mapping
|
Peng, Xin |
|
2013 |
86 |
3 |
p. 664-676 13 p. |
artikel |
17 |
Knowledge discovery of weighted RFM sequential patterns from customer sequence databases
|
Hu, Ya-Han |
|
2013 |
86 |
3 |
p. 779-788 10 p. |
artikel |
18 |
Optimal univariate microaggregation with data suppression
|
Laszlo, Michael |
|
2013 |
86 |
3 |
p. 677-682 6 p. |
artikel |
19 |
Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff
|
Potena, Pasqualina |
|
2013 |
86 |
3 |
p. 624-648 25 p. |
artikel |
20 |
Securing color information of an image by concealing the color palette
|
Chaumont, M. |
|
2013 |
86 |
3 |
p. 809-825 17 p. |
artikel |
21 |
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website
|
Torrente, M. Carmen Suárez |
|
2013 |
86 |
3 |
p. 649-663 15 p. |
artikel |
22 |
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission
|
Pereira, Geovandro C.C.F. |
|
2013 |
86 |
3 |
p. 698-706 9 p. |
artikel |
23 |
SQLIA detection and prevention approach for RFID systems
|
Abawajy, Jemal |
|
2013 |
86 |
3 |
p. 751-758 8 p. |
artikel |
24 |
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images
|
Liu, Hongjun |
|
2013 |
86 |
3 |
p. 826-834 9 p. |
artikel |