Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             172 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A client-based customization framework for web applications using JNLP Artail, Hassan A.
2004
5 p. 411-422
12 p.
artikel
2 A compression-gathering technique for improving the performance of ISO 11898 networks Cena, Gianluca
2000
5 p. 323-335
13 p.
artikel
3 A data hiding scheme based upon DCT coefficient modification Lin, Yih-Kai
2014
5 p. 855-862
8 p.
artikel
4 ADC transfer curve types — A review Corrêa Alegria, F.
2006
5 p. 553-559
7 p.
artikel
5 Advanced steps with standardized languages in the re-engineering process Medve, Anna
2008
5 p. 315-322
8 p.
artikel
6 A formal model for pricing information systems insurance contracts Lambrinoudakis, Costas
2005
5 p. 521-532
12 p.
artikel
7 A formal semantics of SMIL: a web standard to describe multimedia documents Jourdan, Muriel
2001
5 p. 439-455
17 p.
artikel
8 A framework for reviewing domain specific conceptual models Tanrıöver, Ö. Özgür
2011
5 p. 448-464
17 p.
artikel
9 A generalization of the E-LOTOS trapping operator: towards reconciliation with LOTOS Kapus-Kolar, M.
2002
5 p. 389-393
5 p.
artikel
10 A legal information flow (LIF) scheduler based on role-based access control model Enokido, Tomoya
2009
5 p. 906-912
7 p.
artikel
11 A majority-voting based watermarking scheme for color image tamper detection and recovery Wang, Ming-Shi
2007
5 p. 561-570
10 p.
artikel
12 An approach to a Z toolkit for the Reference Model of Open Distributed Processing 1 The original version of this paper was presented at the Workshop on Foundations of Component-Based Systems. The workshop was held as part of the joint Sixth European Software Engineering Conference/Fifth ACM SIGSOFT Symposium on the Foundations of Software Engineering in Zurich, September 22–26, 1997. 1 Johnson, D.Randolph
1999
5 p. 393-402
10 p.
artikel
13 An architecture for flexible scheduling in Profibus networks Silvestre, J.
2007
5 p. 546-560
15 p.
artikel
14 A new evidential trust model for open communities Wang, Jin
2009
5 p. 994-1001
8 p.
artikel
15 A new robust reference watermarking scheme based on DWT-SVD Bhatnagar, Gaurav
2009
5 p. 1002-1013
12 p.
artikel
16 An extended JADE-S based framework for developing secure Multi-Agent Systems Vitabile, Salvatore
2009
5 p. 913-930
18 p.
artikel
17 An information hiding scheme with minimal image distortion Lin, Ching-Chiuan
2011
5 p. 477-484
8 p.
artikel
18 An intelligent embedded system for malicious email filtering Shih, Dong-Her
2013
5 p. 557-565
9 p.
artikel
19 An interoperability standard for certified mail systems Tauber, Arne
2012
5 p. 452-466
15 p.
artikel
20 An investigation on Ribbon interface design guidelines for people with less computer literacy Darejeh, Ali
2014
5 p. 808-820
13 p.
artikel
21 An objective definition of open standards Tiemann, Michael
2006
5 p. 495-507
13 p.
artikel
22 A novel approach to incorporate customer preference and perception into product configuration: A case study on smart pads Wang, Chih-Hsuan
2013
5 p. 549-556
8 p.
artikel
23 A novel three-party encrypted key exchange protocol Chang, Chin-Chen
2004
5 p. 471-476
6 p.
artikel
24 A practical authenticated encryption scheme based on the elliptic curve cryptosystem Chen, Tzer-Shyong
2004
5 p. 461-469
9 p.
artikel
25 A Programmer's Introduction to Windows DNA Schrepf, Heike
2000
5 p. 353-354
2 p.
artikel
26 A regular expression matching engine with hybrid memories Chen, Shuhui
2014
5 p. 880-888
9 p.
artikel
27 A relation metadata extension for SCORM Content Aggregation Model Lu, Eric Jui-Lin
2009
5 p. 1028-1035
8 p.
artikel
28 A scheme for managing resource locations in broadband networks Saxena, P.C.
2001
5 p. 399-427
29 p.
artikel
29 A secure anonymous routing protocol with authenticated key exchange for ad hoc networks Lu, Rongxing
2007
5 p. 521-527
7 p.
artikel
30 A service-centric model for intrusion detection in next-generation networks McGibney, Jimmy
2005
5 p. 513-520
8 p.
artikel
31 A structured operational semantic modelling of the Dolev–Yao threat environment and its composition with cryptographic protocols Mao, Wenbo
2005
5 p. 479-488
10 p.
artikel
32 A tutorial on the ISO reference model of data management Olle, T.William
1993
5 p. 413-430
18 p.
artikel
33 A UML package for specifying real-time objects DiPippo, Lisa Cingiser
2000
5 p. 307-321
15 p.
artikel
34 A UML 2.0 profile to define security requirements for Data Warehouses Trujillo, Juan
2009
5 p. 969-983
15 p.
artikel
35 A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks Wang, Shu-Ching
2008
5 p. 329-338
10 p.
artikel
36 A unified reference model for CGM/CGI and its implementation Baek, N.H.
1997
5 p. 451-467
17 p.
artikel
37 Authentication protocols for the broadband ISDN billing system Lo, Chi-Chun
1999
5 p. 417-428
12 p.
artikel
38 Author Index 2002
5 p. I-II
nvt p.
artikel
39 Author Index 2003
5 p. I-III
nvt p.
artikel
40 Author Index 2001
5 p. 469-470
2 p.
artikel
41 Awareness of Green IT and its value model Chou, David C.
2012
5 p. 447-451
5 p.
artikel
42 Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy Patel, Ahmed
2014
5 p. 844-854
11 p.
artikel
43 Calendar 1993
5 p. 463-464
2 p.
artikel
44 Changes, changes: All about us, changes Berg, John L.
1997
5 p. 381-382
2 p.
artikel
45 Choice of the acquisition parameters for frequency estimation of a sine wave by interpolated DFT method Belega, Daniel
2009
5 p. 962-968
7 p.
artikel
46 Coding schemes variation and its impact on string hashing Mustafa, Suleiman H.
2002
5 p. 473-481
9 p.
artikel
47 Comments on ISO 14102: the standard for CASE-tool evaluation Lundell, Björn
2002
5 p. 381-388
8 p.
artikel
48 CommMgr: A new inter-process communication management software Ri, Qu
2006
5 p. 572-584
13 p.
artikel
49 Communication protocol for monitoring a large number of remotely distributed hazardous material detection devices Ozkul, T.
2003
5 p. 553-561
9 p.
artikel
50 Content adaptive watermarking for multimedia fingerprinting Lin, Yu-Tzu
2008
5 p. 271-287
17 p.
artikel
51 Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards Wang, Xiao-Min
2007
5 p. 507-512
6 p.
artikel
52 Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers Wu, Tzong-Sun
2004
5 p. 477-481
5 p.
artikel
53 Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks Bicakci, Kemal
2009
5 p. 931-941
11 p.
artikel
54 Design and implementation of a mobile database for Java phones Lu, Eric Jui-Lin
2004
5 p. 401-410
10 p.
artikel
55 Designing an XML-based context-aware transformation framework for mobile execution environments using CC/PP and XSLT Kao, Tzu-Han
2004
5 p. 377-399
23 p.
artikel
56 Design of a flexible, integrated testing system for STEP and OMG standards Morris, KC
2000
5 p. 297-305
9 p.
artikel
57 Developing a multistack ISO-SR/Z39.50 application gateway Andreadis, Dimitrios
1997
5 p. 397-415
19 p.
artikel
58 Development of performance model for calculation of communication delay in Profibus token passing protocol Lee, Kyung Chang
2003
5 p. 539-552
14 p.
artikel
59 Development of remote control and monitoring of web-based distributed OPC system Şahin, Cihan
2009
5 p. 984-993
10 p.
artikel
60 Development of virtual data acquisition systems based on multimedia internetworking 1 A preliminary version of this paper was presented at the IEEE Instrumentation and Measurement Technology Conference (IMTC/99), Venice, May 1999, Vol. 3, pp. 1863–1867. 1 Fortino, Giancarlo
1999
5 p. 429-440
12 p.
artikel
61 Direct construction of a secret in generalized group-oriented cryptography Wang, Shiuh-Jeng
2004
5 p. 455-460
6 p.
artikel
62 Distributed measurement systems: An object-oriented architecture and a case study Daponte, Pasquale
1997
5 p. 383-395
13 p.
artikel
63 Editorial 1999
5 p. 389-391
3 p.
artikel
64 Editorial Board 2014
5 p. iii-
1 p.
artikel
65 Editorial Board 2013
5 p. iii-
1 p.
artikel
66 Editorial Board 2009
5 p. iii-
1 p.
artikel
67 Editorial Board 2002
5 p. iii-
1 p.
artikel
68 Editorial Board 2008
5 p. iii-
1 p.
artikel
69 Editorial Board 2006
5 p. iii-
1 p.
artikel
70 Editorial Board 2004
5 p. iii-
1 p.
artikel
71 Editorial Board 2005
5 p. iii-
1 p.
artikel
72 Editorial Board 2007
5 p. iii-
1 p.
artikel
73 Editorial Board 2003
5 p. iii-
1 p.
artikel
74 Editorial Board 2011
5 p. iii-
1 p.
artikel
75 Editorial Board 2012
5 p. iii-
1 p.
artikel
76 Efficient access control and key management schemes for mobile agents Lin, Iuon-Chang
2004
5 p. 423-433
11 p.
artikel
77 Efficient access control labeling scheme for secure XML query processing An, Dongchan
2011
5 p. 439-447
9 p.
artikel
78 Efficient and provably secure password-based group key agreement protocol Zheng, Ming-Hui
2009
5 p. 948-953
6 p.
artikel
79 Efficient deniable authentication protocol based on generalized ElGamal signature scheme Shao, Zuhua
2004
5 p. 449-454
6 p.
artikel
80 Efficient verifier-based password-authenticated key exchange in the three-party setting Kwon, Jeong Ok
2007
5 p. 513-520
8 p.
artikel
81 Enabling powerful GUIs in ISOBUS networks by transparent data compression Iglesias, Natalia
2014
5 p. 801-807
7 p.
artikel
82 Evaluating interrater agreement in SPICE-based assessments Jung, Ho-Won
2003
5 p. 477-499
23 p.
artikel
83 Evaluating real-time software specification languages Lee, Dong-Tsan
2002
5 p. 395-409
15 p.
artikel
84 Evidence processing and privacy issues in evidence-based reputation systems Cvrček, Daniel
2005
5 p. 533-545
13 p.
artikel
85 Examining the relevance of paradigms to base OSI standardisation Egyedi, Tineke M.
1997
5 p. 431-450
20 p.
artikel
86 Extracting logical structures from HTML tables Kim, Yeon-Seok
2008
5 p. 296-308
13 p.
artikel
87 Formal methods, techniques and tools for secure and reliable applications Patel, Ahmed
2005
5 p. 439-443
5 p.
artikel
88 Future directions for Computer Standards & Interfaces Berg, John L
1993
5 p. 411-
1 p.
artikel
89 How to make a natural language interface to query databases accessible to everyone: An example Llopis, Miguel
2013
5 p. 470-481
12 p.
artikel
90 Identity-based universal designated multi-verifiers signature schemes Seo, Seung-Hyun
2008
5 p. 288-295
8 p.
artikel
91 Impedance measurement using multiharmonic least-squares waveform fitting algorithm Ramos, Pedro M.
2008
5 p. 323-328
6 p.
artikel
92 Implementation of experimental communication protocol for health monitoring of patients Al-Ali, A.R.
2006
5 p. 523-530
8 p.
artikel
93 Improving network congestion: A RED-based FuzzyPID approach Chen, Jengchung V.
2012
5 p. 426-438
13 p.
artikel
94 Improving the novel three-party encrypted key exchange protocol Yoon, Eun-Jun
2008
5 p. 309-314
6 p.
artikel
95 Information systems outsourcing life cycle and risks analysis Chou, David C.
2009
5 p. 1036-1043
8 p.
artikel
96 Integrating SET and EDI for secure healthcare commerce Liu, Duen-Ren
2001
5 p. 367-381
15 p.
artikel
97 Inter-working between SIMPLE and IMPS Zhang, Yu-Ting
2007
5 p. 584-600
17 p.
artikel
98 Issues in the definition of a project support environment reference model Brown, A.W
1993
5 p. 431-443
13 p.
artikel
99 Jxta-Overlay: An interface for efficient peer selection in P2P JXTA-based systems Xhafa, Fatos
2009
5 p. 886-893
8 p.
artikel
100 Key reduction of a Chinese phonetic input method by minimizing message ambiguity Tung, Cheng-Huang
2007
5 p. 571-579
9 p.
artikel
101 Mike and Phani's Essential C++ Techniques Schrepf, Heike
2000
5 p. 355-356
2 p.
artikel
102 Modeling the effect of hot spot contention on crossbar multiprocessors Chang, Her-Kun
2004
5 p. 483-488
6 p.
artikel
103 Modular natural language interfaces to logic-based policy frameworks Perry, Jason
2013
5 p. 417-427
11 p.
artikel
104 Multimedia home networks: standards and interfaces Zahariadis, Th.
2002
5 p. 425-435
11 p.
artikel
105 Multimodal interaction for information retrieval using natural language Revuelta-Martínez, Alejandro
2013
5 p. 428-441
14 p.
artikel
106 Named Entity Recognition: Fallacies, challenges and opportunities Marrero, Mónica
2013
5 p. 482-489
8 p.
artikel
107 NATURAL LANGUAGE PROCESSING and Human–Computer Interaction Valencia-García, Rafael
2013
5 p. 415-416
2 p.
artikel
108 Nearly a special issue on cryptography Schumny, Harald
2004
5 p. 375-376
2 p.
artikel
109 On a family of run length limited, block decodable codes to prevent payload-induced jitter in Controller Area Networks Cena, Gianluca
2013
5 p. 536-548
13 p.
artikel
110 On a formal framework for security properties Gürgens, Sigrid
2005
5 p. 457-466
10 p.
artikel
111 Ontology tailoring in the Semantic Grid Flahive, Andrew
2009
5 p. 870-885
16 p.
artikel
112 OPC-SMS: a wireless gateway to OPC-based data sources Kapsalis, Vassilis
2002
5 p. 437-451
15 p.
artikel
113 OpinionMining-ML Robaldo, Livio
2013
5 p. 454-469
16 p.
artikel
114 Paper: a study on the certification of the information security management systems Ren-Wei Fung, Andrew
2003
5 p. 447-461
15 p.
artikel
115 Performance analysis and verification of safety communication protocol in train control system Chen, Li-jie
2011
5 p. 505-518
14 p.
artikel
116 Performance evaluation of switched Ethernet for real-time industrial communications Lee, Kyung Chang
2002
5 p. 411-423
13 p.
artikel
117 Ping-pong flow control for ATM ABR traffic Ku, Cheng-Yuan
2003
5 p. 515-528
14 p.
artikel
118 Plain base32 ASCII-compatible encoding and 8-bit dual-mode transformation format of ISO 10646 Wu, Pei-Chi
2001
5 p. 457-466
10 p.
artikel
119 Potential weaknesses of AuthA password-authenticated key agreement protocols Shim, Kyung-Ah
2007
5 p. 580-583
4 p.
artikel
120 Proposal and evaluation of dynamic assignment of priorities in CAN Cavalieri, Salvatore
2006
5 p. 531-552
22 p.
artikel
121 Protecting mobile-agent data collection against blocking attacks Shao, Min-Hua
2006
5 p. 600-611
12 p.
artikel
122 Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations Marín-López, Rafael
2011
5 p. 494-504
11 p.
artikel
123 Providing standard-oriented data models and interfaces to eGovernment services Álvarez Sabucedo, Luis M.
2009
5 p. 1014-1027
14 p.
artikel
124 Public key infrastructure: a micro and macro analysis Lancaster, Sean
2003
5 p. 437-446
10 p.
artikel
125 Quantities, units and computing Foster, Marcus P.
2013
5 p. 529-535
7 p.
artikel
126 Realization of integration and working procedure on digital hospital information system Chang, Zhanjun
2003
5 p. 529-537
9 p.
artikel
127 Real-time Ethernet networks for motion control Vitturi, S.
2011
5 p. 465-476
12 p.
artikel
128 Reducing the exhaustive key search of the Data Encryption Standard (DES) Phan, Raphael C.-W.
2007
5 p. 528-530
3 p.
artikel
129 Results from a normative dependency analysis of geographic information standards Coetzee, Serena
2011
5 p. 485-493
9 p.
artikel
130 Reversible enhanced event structures: Towards reversible E-LOTOS Kapus-Kolar, M.
2009
5 p. 942-947
6 p.
artikel
131 Rule-driven processing of tree-structured data using pointed trees Schmidt, Nikita
2003
5 p. 463-475
13 p.
artikel
132 Scalability and QoS guarantee for streams with (m,k)-firm deadline Chen, Jiming
2006
5 p. 560-571
12 p.
artikel
133 Secure electronic data interchange Schumny, Harald
2001
5 p. 363-365
3 p.
artikel
134 Security-enabled code deployment for heterogeneous networks Karnouskos, Stamatis
2005
5 p. 547-560
14 p.
artikel
135 Security of robust generalized MQV key agreement protocol without using one-way hash functions Shao, Zuhua
2003
5 p. 431-436
6 p.
artikel
136 Security protocols analysis: A SDL-based approach Lopez, Javier
2005
5 p. 489-499
11 p.
artikel
137 Semantic tagging of video ASR transcripts using the web as a source of knowledge Perea-Ortega, José M.
2013
5 p. 519-528
10 p.
artikel
138 Sentiment analysis via dependency parsing Di Caro, Luigi
2013
5 p. 442-453
12 p.
artikel
139 Simulation integrated management layer for real-time embedded DCN Mahalik, N.P.
2006
5 p. 508-522
15 p.
artikel
140 Software defined QCIF simple profile MPEG-4 for portable devices using dynamically reconfigurable DSP Chase, J.Geoffrey
2002
5 p. 453-472
20 p.
artikel
141 Special Issue Call for Papers 2004
5 p. I-
1 p.
artikel
142 Specification and design of advanced authentication and authorization services Lopez, Javier
2005
5 p. 467-478
12 p.
artikel
143 Specification and simulation of queuing network models using Domain-Specific Languages Troya, Javier
2014
5 p. 863-879
17 p.
artikel
144 Specification, standards and information management for distributed systems Awan, Irfan
2009
5 p. 869-
1 p.
artikel
145 Specifying Privacy-Preserving Protocols in Typed MSR Balopoulos, Theodoros
2005
5 p. 501-512
12 p.
artikel
146 SSIP: Split a SIP session over multiple devices Chen, Min-Xiou
2007
5 p. 531-545
15 p.
artikel
147 Standardised system for automatic remote evaluation of biometric algorithms Sanchez-Reillo, Raul
2012
5 p. 413-425
13 p.
artikel
148 Standardization activities 1993
5 p. 445-461
17 p.
artikel
149 Standardizing Romanization of Korean Hangeul and Hanmal Kim, Kyongsok
1999
5 p. 441-459
19 p.
artikel
150 Standards developed ahead of technology Schumny, Harald
2002
5 p. 363-367
5 p.
artikel
151 Standards support for portability and plug-and-play Schumny, Harald
2000
5 p. 293-295
3 p.
artikel
152 Statistical speech translation system based on voice recognition optimization using multimodal sources of knowledge and characteristics vectors Canovas, Alejandro
2013
5 p. 490-506
17 p.
artikel
153 Subject Index 2002
5 p. III-IV
nvt p.
artikel
154 Subject Index 2001
5 p. 467-468
2 p.
artikel
155 Subject Index 2003
5 p. V-VI
nvt p.
artikel
156 Tackling redundancy in text summarization through different levels of language analysis Lloret, Elena
2013
5 p. 507-518
12 p.
artikel
157 TCP flow control technique for an interworking interface: hardware implementation Ouni, Ridha
2001
5 p. 383-397
15 p.
artikel
158 Testable embedded system firmware development: the out–in methodology Subramanian, Narayanan
2000
5 p. 337-352
16 p.
artikel
159 The diffusion of anticipatory standards with particular reference to the ISO/IEC information resource dictionary system framework standard Byrne, Bernadette M.
2002
5 p. 369-379
11 p.
artikel
160 The evaluation of intelligent agent performance — An example of B2C e-commerce negotiation Liang, Wen-Yau
2012
5 p. 439-446
8 p.
artikel
161 The new territory of mobile agreement Wang, S.C.
2004
5 p. 435-447
13 p.
artikel
162 The Oea framework for class-based object-oriented style JavaScript for web programming Sagar, Musbah Sh.
2009
5 p. 894-905
12 p.
artikel
163 The optimal generalized Byzantine Agreement in Cluster-based Wireless Sensor Networks Wang, Shu-Ching
2014
5 p. 821-830
10 p.
artikel
164 The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture Chang, Chin-Chen
2003
5 p. 501-513
13 p.
artikel
165 Tools for cryptographic protocols analysis: A technical and experimental comparison Cheminod, Manuel
2009
5 p. 954-961
8 p.
artikel
166 Tracing conceptual models' evolution in data warehouses by using the model driven architecture Maté, Alejandro
2014
5 p. 831-843
13 p.
artikel
167 Translating an OMT schema to an ODMG-93 schema Davis, Karen C.
1997
5 p. 417-429
13 p.
artikel
168 Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation Massacci, Fabio
2005
5 p. 445-455
11 p.
artikel
169 Video segmentation using a histogram-based fuzzy c-means clustering algorithm Lo, Chi-Chun
2001
5 p. 429-438
10 p.
artikel
170 25 volumes of Computer Standards and Interfaces completed Schumny, Harald
2003
5 p. 427-430
4 p.
artikel
171 Workflow automation based on OSI job transfer and manipulation van Sinderen, Marten J.
1999
5 p. 403-415
13 p.
artikel
172 XML-based e-business frameworks and standardization Nurmilaakso, Juha-Miikka
2006
5 p. 585-599
15 p.
artikel
                             172 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland