Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             24 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A computer virus spreading model based on resource limitations and interaction costs Huang, Chung-Yuan
2013
86 3 p. 801-808
8 p.
artikel
2 A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks Lin, Jenn-Wei
2013
86 3 p. 789-800
12 p.
artikel
3 AFChecker: Effective model checking for context-aware adaptive applications Liu, Yepang
2013
86 3 p. 854-867
14 p.
artikel
4 A mapping study to investigate component-based software system metrics Abdellatief, Majdi
2013
86 3 p. 587-603
17 p.
artikel
5 An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames Lin, Tseng-Jung
2013
86 3 p. 604-614
11 p.
artikel
6 A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation Luo, Yifeng
2013
86 3 p. 744-750
7 p.
artikel
7 A reversible data hiding method by histogram shifting in high quality medical images Huang, Li-Chin
2013
86 3 p. 716-727
12 p.
artikel
8 A sliding window based algorithm for frequent closed itemset mining over data streams Nori, Fatemeh
2013
86 3 p. 615-623
9 p.
artikel
9 Beyond ATAM: Early architecture evaluation method for large-scale distributed systems Zalewski, Andrzej
2013
86 3 p. 683-697
15 p.
artikel
10 BotMosaic: Collaborative network watermark for the detection of IRC-based botnets Houmansadr, Amir
2013
86 3 p. 707-715
9 p.
artikel
11 Communities of Web service registries: Construction and management Sellami, Mohamed
2013
86 3 p. 835-853
19 p.
artikel
12 Constrained frequent pattern mining on univariate uncertain data Liu, Ying-Ho
2013
86 3 p. 759-778
20 p.
artikel
13 Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478] Xiao, Xi
2013
86 3 p. 868-
1 p.
artikel
14 Editorial Board 2013
86 3 p. CO2-
1 p.
artikel
15 Efficient Hamming weight-based side-channel cube attacks on PRESENT Zhao, Xinjie
2013
86 3 p. 728-743
16 p.
artikel
16 Improving feature location using structural similarity and iterative graph mapping Peng, Xin
2013
86 3 p. 664-676
13 p.
artikel
17 Knowledge discovery of weighted RFM sequential patterns from customer sequence databases Hu, Ya-Han
2013
86 3 p. 779-788
10 p.
artikel
18 Optimal univariate microaggregation with data suppression Laszlo, Michael
2013
86 3 p. 677-682
6 p.
artikel
19 Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff Potena, Pasqualina
2013
86 3 p. 624-648
25 p.
artikel
20 Securing color information of an image by concealing the color palette Chaumont, M.
2013
86 3 p. 809-825
17 p.
artikel
21 Sirius: A heuristic-based framework for measuring web usability adapted to the type of website Torrente, M. Carmen Suárez
2013
86 3 p. 649-663
15 p.
artikel
22 SMSCrypto: A lightweight cryptographic framework for secure SMS transmission Pereira, Geovandro C.C.F.
2013
86 3 p. 698-706
9 p.
artikel
23 SQLIA detection and prevention approach for RFID systems Abawajy, Jemal
2013
86 3 p. 751-758
8 p.
artikel
24 Triple-image encryption scheme based on one-time key stream generated by chaos and plain images Liu, Hongjun
2013
86 3 p. 826-834
9 p.
artikel
                             24 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland