Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             24 results found
no title author magazine year volume issue page(s) type
1 A computer virus spreading model based on resource limitations and interaction costs Huang, Chung-Yuan
2013
86 3 p. 801-808
8 p.
article
2 A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks Lin, Jenn-Wei
2013
86 3 p. 789-800
12 p.
article
3 AFChecker: Effective model checking for context-aware adaptive applications Liu, Yepang
2013
86 3 p. 854-867
14 p.
article
4 A mapping study to investigate component-based software system metrics Abdellatief, Majdi
2013
86 3 p. 587-603
17 p.
article
5 An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames Lin, Tseng-Jung
2013
86 3 p. 604-614
11 p.
article
6 A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation Luo, Yifeng
2013
86 3 p. 744-750
7 p.
article
7 A reversible data hiding method by histogram shifting in high quality medical images Huang, Li-Chin
2013
86 3 p. 716-727
12 p.
article
8 A sliding window based algorithm for frequent closed itemset mining over data streams Nori, Fatemeh
2013
86 3 p. 615-623
9 p.
article
9 Beyond ATAM: Early architecture evaluation method for large-scale distributed systems Zalewski, Andrzej
2013
86 3 p. 683-697
15 p.
article
10 BotMosaic: Collaborative network watermark for the detection of IRC-based botnets Houmansadr, Amir
2013
86 3 p. 707-715
9 p.
article
11 Communities of Web service registries: Construction and management Sellami, Mohamed
2013
86 3 p. 835-853
19 p.
article
12 Constrained frequent pattern mining on univariate uncertain data Liu, Ying-Ho
2013
86 3 p. 759-778
20 p.
article
13 Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478] Xiao, Xi
2013
86 3 p. 868-
1 p.
article
14 Editorial Board 2013
86 3 p. CO2-
1 p.
article
15 Efficient Hamming weight-based side-channel cube attacks on PRESENT Zhao, Xinjie
2013
86 3 p. 728-743
16 p.
article
16 Improving feature location using structural similarity and iterative graph mapping Peng, Xin
2013
86 3 p. 664-676
13 p.
article
17 Knowledge discovery of weighted RFM sequential patterns from customer sequence databases Hu, Ya-Han
2013
86 3 p. 779-788
10 p.
article
18 Optimal univariate microaggregation with data suppression Laszlo, Michael
2013
86 3 p. 677-682
6 p.
article
19 Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff Potena, Pasqualina
2013
86 3 p. 624-648
25 p.
article
20 Securing color information of an image by concealing the color palette Chaumont, M.
2013
86 3 p. 809-825
17 p.
article
21 Sirius: A heuristic-based framework for measuring web usability adapted to the type of website Torrente, M. Carmen Suárez
2013
86 3 p. 649-663
15 p.
article
22 SMSCrypto: A lightweight cryptographic framework for secure SMS transmission Pereira, Geovandro C.C.F.
2013
86 3 p. 698-706
9 p.
article
23 SQLIA detection and prevention approach for RFID systems Abawajy, Jemal
2013
86 3 p. 751-758
8 p.
article
24 Triple-image encryption scheme based on one-time key stream generated by chaos and plain images Liu, Hongjun
2013
86 3 p. 826-834
9 p.
article
                             24 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands