nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A client-based customization framework for web applications using JNLP
|
Artail, Hassan A. |
|
2004 |
|
5 |
p. 411-422 12 p. |
artikel |
2 |
A compression-gathering technique for improving the performance of ISO 11898 networks
|
Cena, Gianluca |
|
2000 |
|
5 |
p. 323-335 13 p. |
artikel |
3 |
A data hiding scheme based upon DCT coefficient modification
|
Lin, Yih-Kai |
|
2014 |
|
5 |
p. 855-862 8 p. |
artikel |
4 |
ADC transfer curve types — A review
|
Corrêa Alegria, F. |
|
2006 |
|
5 |
p. 553-559 7 p. |
artikel |
5 |
Advanced steps with standardized languages in the re-engineering process
|
Medve, Anna |
|
2008 |
|
5 |
p. 315-322 8 p. |
artikel |
6 |
A formal model for pricing information systems insurance contracts
|
Lambrinoudakis, Costas |
|
2005 |
|
5 |
p. 521-532 12 p. |
artikel |
7 |
A formal semantics of SMIL: a web standard to describe multimedia documents
|
Jourdan, Muriel |
|
2001 |
|
5 |
p. 439-455 17 p. |
artikel |
8 |
A framework for reviewing domain specific conceptual models
|
Tanrıöver, Ö. Özgür |
|
2011 |
|
5 |
p. 448-464 17 p. |
artikel |
9 |
A generalization of the E-LOTOS trapping operator: towards reconciliation with LOTOS
|
Kapus-Kolar, M. |
|
2002 |
|
5 |
p. 389-393 5 p. |
artikel |
10 |
A legal information flow (LIF) scheduler based on role-based access control model
|
Enokido, Tomoya |
|
2009 |
|
5 |
p. 906-912 7 p. |
artikel |
11 |
A majority-voting based watermarking scheme for color image tamper detection and recovery
|
Wang, Ming-Shi |
|
2007 |
|
5 |
p. 561-570 10 p. |
artikel |
12 |
An approach to a Z toolkit for the Reference Model of Open Distributed Processing 1 The original version of this paper was presented at the Workshop on Foundations of Component-Based Systems. The workshop was held as part of the joint Sixth European Software Engineering Conference/Fifth ACM SIGSOFT Symposium on the Foundations of Software Engineering in Zurich, September 22–26, 1997. 1
|
Johnson, D.Randolph |
|
1999 |
|
5 |
p. 393-402 10 p. |
artikel |
13 |
An architecture for flexible scheduling in Profibus networks
|
Silvestre, J. |
|
2007 |
|
5 |
p. 546-560 15 p. |
artikel |
14 |
A new evidential trust model for open communities
|
Wang, Jin |
|
2009 |
|
5 |
p. 994-1001 8 p. |
artikel |
15 |
A new robust reference watermarking scheme based on DWT-SVD
|
Bhatnagar, Gaurav |
|
2009 |
|
5 |
p. 1002-1013 12 p. |
artikel |
16 |
An extended JADE-S based framework for developing secure Multi-Agent Systems
|
Vitabile, Salvatore |
|
2009 |
|
5 |
p. 913-930 18 p. |
artikel |
17 |
An information hiding scheme with minimal image distortion
|
Lin, Ching-Chiuan |
|
2011 |
|
5 |
p. 477-484 8 p. |
artikel |
18 |
An intelligent embedded system for malicious email filtering
|
Shih, Dong-Her |
|
2013 |
|
5 |
p. 557-565 9 p. |
artikel |
19 |
An interoperability standard for certified mail systems
|
Tauber, Arne |
|
2012 |
|
5 |
p. 452-466 15 p. |
artikel |
20 |
An investigation on Ribbon interface design guidelines for people with less computer literacy
|
Darejeh, Ali |
|
2014 |
|
5 |
p. 808-820 13 p. |
artikel |
21 |
An objective definition of open standards
|
Tiemann, Michael |
|
2006 |
|
5 |
p. 495-507 13 p. |
artikel |
22 |
A novel approach to incorporate customer preference and perception into product configuration: A case study on smart pads
|
Wang, Chih-Hsuan |
|
2013 |
|
5 |
p. 549-556 8 p. |
artikel |
23 |
A novel three-party encrypted key exchange protocol
|
Chang, Chin-Chen |
|
2004 |
|
5 |
p. 471-476 6 p. |
artikel |
24 |
A practical authenticated encryption scheme based on the elliptic curve cryptosystem
|
Chen, Tzer-Shyong |
|
2004 |
|
5 |
p. 461-469 9 p. |
artikel |
25 |
A Programmer's Introduction to Windows DNA
|
Schrepf, Heike |
|
2000 |
|
5 |
p. 353-354 2 p. |
artikel |
26 |
A regular expression matching engine with hybrid memories
|
Chen, Shuhui |
|
2014 |
|
5 |
p. 880-888 9 p. |
artikel |
27 |
A relation metadata extension for SCORM Content Aggregation Model
|
Lu, Eric Jui-Lin |
|
2009 |
|
5 |
p. 1028-1035 8 p. |
artikel |
28 |
A scheme for managing resource locations in broadband networks
|
Saxena, P.C. |
|
2001 |
|
5 |
p. 399-427 29 p. |
artikel |
29 |
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
|
Lu, Rongxing |
|
2007 |
|
5 |
p. 521-527 7 p. |
artikel |
30 |
A service-centric model for intrusion detection in next-generation networks
|
McGibney, Jimmy |
|
2005 |
|
5 |
p. 513-520 8 p. |
artikel |
31 |
A structured operational semantic modelling of the Dolev–Yao threat environment and its composition with cryptographic protocols
|
Mao, Wenbo |
|
2005 |
|
5 |
p. 479-488 10 p. |
artikel |
32 |
A tutorial on the ISO reference model of data management
|
Olle, T.William |
|
1993 |
|
5 |
p. 413-430 18 p. |
artikel |
33 |
A UML package for specifying real-time objects
|
DiPippo, Lisa Cingiser |
|
2000 |
|
5 |
p. 307-321 15 p. |
artikel |
34 |
A UML 2.0 profile to define security requirements for Data Warehouses
|
Trujillo, Juan |
|
2009 |
|
5 |
p. 969-983 15 p. |
artikel |
35 |
A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks
|
Wang, Shu-Ching |
|
2008 |
|
5 |
p. 329-338 10 p. |
artikel |
36 |
A unified reference model for CGM/CGI and its implementation
|
Baek, N.H. |
|
1997 |
|
5 |
p. 451-467 17 p. |
artikel |
37 |
Authentication protocols for the broadband ISDN billing system
|
Lo, Chi-Chun |
|
1999 |
|
5 |
p. 417-428 12 p. |
artikel |
38 |
Author Index
|
|
|
2002 |
|
5 |
p. I-II nvt p. |
artikel |
39 |
Author Index
|
|
|
2003 |
|
5 |
p. I-III nvt p. |
artikel |
40 |
Author Index
|
|
|
2001 |
|
5 |
p. 469-470 2 p. |
artikel |
41 |
Awareness of Green IT and its value model
|
Chou, David C. |
|
2012 |
|
5 |
p. 447-451 5 p. |
artikel |
42 |
Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy
|
Patel, Ahmed |
|
2014 |
|
5 |
p. 844-854 11 p. |
artikel |
43 |
Calendar
|
|
|
1993 |
|
5 |
p. 463-464 2 p. |
artikel |
44 |
Changes, changes: All about us, changes
|
Berg, John L. |
|
1997 |
|
5 |
p. 381-382 2 p. |
artikel |
45 |
Choice of the acquisition parameters for frequency estimation of a sine wave by interpolated DFT method
|
Belega, Daniel |
|
2009 |
|
5 |
p. 962-968 7 p. |
artikel |
46 |
Coding schemes variation and its impact on string hashing
|
Mustafa, Suleiman H. |
|
2002 |
|
5 |
p. 473-481 9 p. |
artikel |
47 |
Comments on ISO 14102: the standard for CASE-tool evaluation
|
Lundell, Björn |
|
2002 |
|
5 |
p. 381-388 8 p. |
artikel |
48 |
CommMgr: A new inter-process communication management software
|
Ri, Qu |
|
2006 |
|
5 |
p. 572-584 13 p. |
artikel |
49 |
Communication protocol for monitoring a large number of remotely distributed hazardous material detection devices
|
Ozkul, T. |
|
2003 |
|
5 |
p. 553-561 9 p. |
artikel |
50 |
Content adaptive watermarking for multimedia fingerprinting
|
Lin, Yu-Tzu |
|
2008 |
|
5 |
p. 271-287 17 p. |
artikel |
51 |
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
|
Wang, Xiao-Min |
|
2007 |
|
5 |
p. 507-512 6 p. |
artikel |
52 |
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers
|
Wu, Tzong-Sun |
|
2004 |
|
5 |
p. 477-481 5 p. |
artikel |
53 |
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
|
Bicakci, Kemal |
|
2009 |
|
5 |
p. 931-941 11 p. |
artikel |
54 |
Design and implementation of a mobile database for Java phones
|
Lu, Eric Jui-Lin |
|
2004 |
|
5 |
p. 401-410 10 p. |
artikel |
55 |
Designing an XML-based context-aware transformation framework for mobile execution environments using CC/PP and XSLT
|
Kao, Tzu-Han |
|
2004 |
|
5 |
p. 377-399 23 p. |
artikel |
56 |
Design of a flexible, integrated testing system for STEP and OMG standards
|
Morris, KC |
|
2000 |
|
5 |
p. 297-305 9 p. |
artikel |
57 |
Developing a multistack ISO-SR/Z39.50 application gateway
|
Andreadis, Dimitrios |
|
1997 |
|
5 |
p. 397-415 19 p. |
artikel |
58 |
Development of performance model for calculation of communication delay in Profibus token passing protocol
|
Lee, Kyung Chang |
|
2003 |
|
5 |
p. 539-552 14 p. |
artikel |
59 |
Development of remote control and monitoring of web-based distributed OPC system
|
Şahin, Cihan |
|
2009 |
|
5 |
p. 984-993 10 p. |
artikel |
60 |
Development of virtual data acquisition systems based on multimedia internetworking 1 A preliminary version of this paper was presented at the IEEE Instrumentation and Measurement Technology Conference (IMTC/99), Venice, May 1999, Vol. 3, pp. 1863–1867. 1
|
Fortino, Giancarlo |
|
1999 |
|
5 |
p. 429-440 12 p. |
artikel |
61 |
Direct construction of a secret in generalized group-oriented cryptography
|
Wang, Shiuh-Jeng |
|
2004 |
|
5 |
p. 455-460 6 p. |
artikel |
62 |
Distributed measurement systems: An object-oriented architecture and a case study
|
Daponte, Pasquale |
|
1997 |
|
5 |
p. 383-395 13 p. |
artikel |
63 |
Editorial
|
|
|
1999 |
|
5 |
p. 389-391 3 p. |
artikel |
64 |
Editorial Board
|
|
|
2014 |
|
5 |
p. iii- 1 p. |
artikel |
65 |
Editorial Board
|
|
|
2013 |
|
5 |
p. iii- 1 p. |
artikel |
66 |
Editorial Board
|
|
|
2009 |
|
5 |
p. iii- 1 p. |
artikel |
67 |
Editorial Board
|
|
|
2002 |
|
5 |
p. iii- 1 p. |
artikel |
68 |
Editorial Board
|
|
|
2008 |
|
5 |
p. iii- 1 p. |
artikel |
69 |
Editorial Board
|
|
|
2006 |
|
5 |
p. iii- 1 p. |
artikel |
70 |
Editorial Board
|
|
|
2004 |
|
5 |
p. iii- 1 p. |
artikel |
71 |
Editorial Board
|
|
|
2005 |
|
5 |
p. iii- 1 p. |
artikel |
72 |
Editorial Board
|
|
|
2007 |
|
5 |
p. iii- 1 p. |
artikel |
73 |
Editorial Board
|
|
|
2003 |
|
5 |
p. iii- 1 p. |
artikel |
74 |
Editorial Board
|
|
|
2011 |
|
5 |
p. iii- 1 p. |
artikel |
75 |
Editorial Board
|
|
|
2012 |
|
5 |
p. iii- 1 p. |
artikel |
76 |
Efficient access control and key management schemes for mobile agents
|
Lin, Iuon-Chang |
|
2004 |
|
5 |
p. 423-433 11 p. |
artikel |
77 |
Efficient access control labeling scheme for secure XML query processing
|
An, Dongchan |
|
2011 |
|
5 |
p. 439-447 9 p. |
artikel |
78 |
Efficient and provably secure password-based group key agreement protocol
|
Zheng, Ming-Hui |
|
2009 |
|
5 |
p. 948-953 6 p. |
artikel |
79 |
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
|
Shao, Zuhua |
|
2004 |
|
5 |
p. 449-454 6 p. |
artikel |
80 |
Efficient verifier-based password-authenticated key exchange in the three-party setting
|
Kwon, Jeong Ok |
|
2007 |
|
5 |
p. 513-520 8 p. |
artikel |
81 |
Enabling powerful GUIs in ISOBUS networks by transparent data compression
|
Iglesias, Natalia |
|
2014 |
|
5 |
p. 801-807 7 p. |
artikel |
82 |
Evaluating interrater agreement in SPICE-based assessments
|
Jung, Ho-Won |
|
2003 |
|
5 |
p. 477-499 23 p. |
artikel |
83 |
Evaluating real-time software specification languages
|
Lee, Dong-Tsan |
|
2002 |
|
5 |
p. 395-409 15 p. |
artikel |
84 |
Evidence processing and privacy issues in evidence-based reputation systems
|
Cvrček, Daniel |
|
2005 |
|
5 |
p. 533-545 13 p. |
artikel |
85 |
Examining the relevance of paradigms to base OSI standardisation
|
Egyedi, Tineke M. |
|
1997 |
|
5 |
p. 431-450 20 p. |
artikel |
86 |
Extracting logical structures from HTML tables
|
Kim, Yeon-Seok |
|
2008 |
|
5 |
p. 296-308 13 p. |
artikel |
87 |
Formal methods, techniques and tools for secure and reliable applications
|
Patel, Ahmed |
|
2005 |
|
5 |
p. 439-443 5 p. |
artikel |
88 |
Future directions for Computer Standards & Interfaces
|
Berg, John L |
|
1993 |
|
5 |
p. 411- 1 p. |
artikel |
89 |
How to make a natural language interface to query databases accessible to everyone: An example
|
Llopis, Miguel |
|
2013 |
|
5 |
p. 470-481 12 p. |
artikel |
90 |
Identity-based universal designated multi-verifiers signature schemes
|
Seo, Seung-Hyun |
|
2008 |
|
5 |
p. 288-295 8 p. |
artikel |
91 |
Impedance measurement using multiharmonic least-squares waveform fitting algorithm
|
Ramos, Pedro M. |
|
2008 |
|
5 |
p. 323-328 6 p. |
artikel |
92 |
Implementation of experimental communication protocol for health monitoring of patients
|
Al-Ali, A.R. |
|
2006 |
|
5 |
p. 523-530 8 p. |
artikel |
93 |
Improving network congestion: A RED-based FuzzyPID approach
|
Chen, Jengchung V. |
|
2012 |
|
5 |
p. 426-438 13 p. |
artikel |
94 |
Improving the novel three-party encrypted key exchange protocol
|
Yoon, Eun-Jun |
|
2008 |
|
5 |
p. 309-314 6 p. |
artikel |
95 |
Information systems outsourcing life cycle and risks analysis
|
Chou, David C. |
|
2009 |
|
5 |
p. 1036-1043 8 p. |
artikel |
96 |
Integrating SET and EDI for secure healthcare commerce
|
Liu, Duen-Ren |
|
2001 |
|
5 |
p. 367-381 15 p. |
artikel |
97 |
Inter-working between SIMPLE and IMPS
|
Zhang, Yu-Ting |
|
2007 |
|
5 |
p. 584-600 17 p. |
artikel |
98 |
Issues in the definition of a project support environment reference model
|
Brown, A.W |
|
1993 |
|
5 |
p. 431-443 13 p. |
artikel |
99 |
Jxta-Overlay: An interface for efficient peer selection in P2P JXTA-based systems
|
Xhafa, Fatos |
|
2009 |
|
5 |
p. 886-893 8 p. |
artikel |
100 |
Key reduction of a Chinese phonetic input method by minimizing message ambiguity
|
Tung, Cheng-Huang |
|
2007 |
|
5 |
p. 571-579 9 p. |
artikel |
101 |
Mike and Phani's Essential C++ Techniques
|
Schrepf, Heike |
|
2000 |
|
5 |
p. 355-356 2 p. |
artikel |
102 |
Modeling the effect of hot spot contention on crossbar multiprocessors
|
Chang, Her-Kun |
|
2004 |
|
5 |
p. 483-488 6 p. |
artikel |
103 |
Modular natural language interfaces to logic-based policy frameworks
|
Perry, Jason |
|
2013 |
|
5 |
p. 417-427 11 p. |
artikel |
104 |
Multimedia home networks: standards and interfaces
|
Zahariadis, Th. |
|
2002 |
|
5 |
p. 425-435 11 p. |
artikel |
105 |
Multimodal interaction for information retrieval using natural language
|
Revuelta-Martínez, Alejandro |
|
2013 |
|
5 |
p. 428-441 14 p. |
artikel |
106 |
Named Entity Recognition: Fallacies, challenges and opportunities
|
Marrero, Mónica |
|
2013 |
|
5 |
p. 482-489 8 p. |
artikel |
107 |
NATURAL LANGUAGE PROCESSING and Human–Computer Interaction
|
Valencia-García, Rafael |
|
2013 |
|
5 |
p. 415-416 2 p. |
artikel |
108 |
Nearly a special issue on cryptography
|
Schumny, Harald |
|
2004 |
|
5 |
p. 375-376 2 p. |
artikel |
109 |
On a family of run length limited, block decodable codes to prevent payload-induced jitter in Controller Area Networks
|
Cena, Gianluca |
|
2013 |
|
5 |
p. 536-548 13 p. |
artikel |
110 |
On a formal framework for security properties
|
Gürgens, Sigrid |
|
2005 |
|
5 |
p. 457-466 10 p. |
artikel |
111 |
Ontology tailoring in the Semantic Grid
|
Flahive, Andrew |
|
2009 |
|
5 |
p. 870-885 16 p. |
artikel |
112 |
OPC-SMS: a wireless gateway to OPC-based data sources
|
Kapsalis, Vassilis |
|
2002 |
|
5 |
p. 437-451 15 p. |
artikel |
113 |
OpinionMining-ML
|
Robaldo, Livio |
|
2013 |
|
5 |
p. 454-469 16 p. |
artikel |
114 |
Paper: a study on the certification of the information security management systems
|
Ren-Wei Fung, Andrew |
|
2003 |
|
5 |
p. 447-461 15 p. |
artikel |
115 |
Performance analysis and verification of safety communication protocol in train control system
|
Chen, Li-jie |
|
2011 |
|
5 |
p. 505-518 14 p. |
artikel |
116 |
Performance evaluation of switched Ethernet for real-time industrial communications
|
Lee, Kyung Chang |
|
2002 |
|
5 |
p. 411-423 13 p. |
artikel |
117 |
Ping-pong flow control for ATM ABR traffic
|
Ku, Cheng-Yuan |
|
2003 |
|
5 |
p. 515-528 14 p. |
artikel |
118 |
Plain base32 ASCII-compatible encoding and 8-bit dual-mode transformation format of ISO 10646
|
Wu, Pei-Chi |
|
2001 |
|
5 |
p. 457-466 10 p. |
artikel |
119 |
Potential weaknesses of AuthA password-authenticated key agreement protocols
|
Shim, Kyung-Ah |
|
2007 |
|
5 |
p. 580-583 4 p. |
artikel |
120 |
Proposal and evaluation of dynamic assignment of priorities in CAN
|
Cavalieri, Salvatore |
|
2006 |
|
5 |
p. 531-552 22 p. |
artikel |
121 |
Protecting mobile-agent data collection against blocking attacks
|
Shao, Min-Hua |
|
2006 |
|
5 |
p. 600-611 12 p. |
artikel |
122 |
Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
|
Marín-López, Rafael |
|
2011 |
|
5 |
p. 494-504 11 p. |
artikel |
123 |
Providing standard-oriented data models and interfaces to eGovernment services
|
Álvarez Sabucedo, Luis M. |
|
2009 |
|
5 |
p. 1014-1027 14 p. |
artikel |
124 |
Public key infrastructure: a micro and macro analysis
|
Lancaster, Sean |
|
2003 |
|
5 |
p. 437-446 10 p. |
artikel |
125 |
Quantities, units and computing
|
Foster, Marcus P. |
|
2013 |
|
5 |
p. 529-535 7 p. |
artikel |
126 |
Realization of integration and working procedure on digital hospital information system
|
Chang, Zhanjun |
|
2003 |
|
5 |
p. 529-537 9 p. |
artikel |
127 |
Real-time Ethernet networks for motion control
|
Vitturi, S. |
|
2011 |
|
5 |
p. 465-476 12 p. |
artikel |
128 |
Reducing the exhaustive key search of the Data Encryption Standard (DES)
|
Phan, Raphael C.-W. |
|
2007 |
|
5 |
p. 528-530 3 p. |
artikel |
129 |
Results from a normative dependency analysis of geographic information standards
|
Coetzee, Serena |
|
2011 |
|
5 |
p. 485-493 9 p. |
artikel |
130 |
Reversible enhanced event structures: Towards reversible E-LOTOS
|
Kapus-Kolar, M. |
|
2009 |
|
5 |
p. 942-947 6 p. |
artikel |
131 |
Rule-driven processing of tree-structured data using pointed trees
|
Schmidt, Nikita |
|
2003 |
|
5 |
p. 463-475 13 p. |
artikel |
132 |
Scalability and QoS guarantee for streams with (m,k)-firm deadline
|
Chen, Jiming |
|
2006 |
|
5 |
p. 560-571 12 p. |
artikel |
133 |
Secure electronic data interchange
|
Schumny, Harald |
|
2001 |
|
5 |
p. 363-365 3 p. |
artikel |
134 |
Security-enabled code deployment for heterogeneous networks
|
Karnouskos, Stamatis |
|
2005 |
|
5 |
p. 547-560 14 p. |
artikel |
135 |
Security of robust generalized MQV key agreement protocol without using one-way hash functions
|
Shao, Zuhua |
|
2003 |
|
5 |
p. 431-436 6 p. |
artikel |
136 |
Security protocols analysis: A SDL-based approach
|
Lopez, Javier |
|
2005 |
|
5 |
p. 489-499 11 p. |
artikel |
137 |
Semantic tagging of video ASR transcripts using the web as a source of knowledge
|
Perea-Ortega, José M. |
|
2013 |
|
5 |
p. 519-528 10 p. |
artikel |
138 |
Sentiment analysis via dependency parsing
|
Di Caro, Luigi |
|
2013 |
|
5 |
p. 442-453 12 p. |
artikel |
139 |
Simulation integrated management layer for real-time embedded DCN
|
Mahalik, N.P. |
|
2006 |
|
5 |
p. 508-522 15 p. |
artikel |
140 |
Software defined QCIF simple profile MPEG-4 for portable devices using dynamically reconfigurable DSP
|
Chase, J.Geoffrey |
|
2002 |
|
5 |
p. 453-472 20 p. |
artikel |
141 |
Special Issue Call for Papers
|
|
|
2004 |
|
5 |
p. I- 1 p. |
artikel |
142 |
Specification and design of advanced authentication and authorization services
|
Lopez, Javier |
|
2005 |
|
5 |
p. 467-478 12 p. |
artikel |
143 |
Specification and simulation of queuing network models using Domain-Specific Languages
|
Troya, Javier |
|
2014 |
|
5 |
p. 863-879 17 p. |
artikel |
144 |
Specification, standards and information management for distributed systems
|
Awan, Irfan |
|
2009 |
|
5 |
p. 869- 1 p. |
artikel |
145 |
Specifying Privacy-Preserving Protocols in Typed MSR
|
Balopoulos, Theodoros |
|
2005 |
|
5 |
p. 501-512 12 p. |
artikel |
146 |
SSIP: Split a SIP session over multiple devices
|
Chen, Min-Xiou |
|
2007 |
|
5 |
p. 531-545 15 p. |
artikel |
147 |
Standardised system for automatic remote evaluation of biometric algorithms
|
Sanchez-Reillo, Raul |
|
2012 |
|
5 |
p. 413-425 13 p. |
artikel |
148 |
Standardization activities
|
|
|
1993 |
|
5 |
p. 445-461 17 p. |
artikel |
149 |
Standardizing Romanization of Korean Hangeul and Hanmal
|
Kim, Kyongsok |
|
1999 |
|
5 |
p. 441-459 19 p. |
artikel |
150 |
Standards developed ahead of technology
|
Schumny, Harald |
|
2002 |
|
5 |
p. 363-367 5 p. |
artikel |
151 |
Standards support for portability and plug-and-play
|
Schumny, Harald |
|
2000 |
|
5 |
p. 293-295 3 p. |
artikel |
152 |
Statistical speech translation system based on voice recognition optimization using multimodal sources of knowledge and characteristics vectors
|
Canovas, Alejandro |
|
2013 |
|
5 |
p. 490-506 17 p. |
artikel |
153 |
Subject Index
|
|
|
2002 |
|
5 |
p. III-IV nvt p. |
artikel |
154 |
Subject Index
|
|
|
2001 |
|
5 |
p. 467-468 2 p. |
artikel |
155 |
Subject Index
|
|
|
2003 |
|
5 |
p. V-VI nvt p. |
artikel |
156 |
Tackling redundancy in text summarization through different levels of language analysis
|
Lloret, Elena |
|
2013 |
|
5 |
p. 507-518 12 p. |
artikel |
157 |
TCP flow control technique for an interworking interface: hardware implementation
|
Ouni, Ridha |
|
2001 |
|
5 |
p. 383-397 15 p. |
artikel |
158 |
Testable embedded system firmware development: the out–in methodology
|
Subramanian, Narayanan |
|
2000 |
|
5 |
p. 337-352 16 p. |
artikel |
159 |
The diffusion of anticipatory standards with particular reference to the ISO/IEC information resource dictionary system framework standard
|
Byrne, Bernadette M. |
|
2002 |
|
5 |
p. 369-379 11 p. |
artikel |
160 |
The evaluation of intelligent agent performance — An example of B2C e-commerce negotiation
|
Liang, Wen-Yau |
|
2012 |
|
5 |
p. 439-446 8 p. |
artikel |
161 |
The new territory of mobile agreement
|
Wang, S.C. |
|
2004 |
|
5 |
p. 435-447 13 p. |
artikel |
162 |
The Oea framework for class-based object-oriented style JavaScript for web programming
|
Sagar, Musbah Sh. |
|
2009 |
|
5 |
p. 894-905 12 p. |
artikel |
163 |
The optimal generalized Byzantine Agreement in Cluster-based Wireless Sensor Networks
|
Wang, Shu-Ching |
|
2014 |
|
5 |
p. 821-830 10 p. |
artikel |
164 |
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture
|
Chang, Chin-Chen |
|
2003 |
|
5 |
p. 501-513 13 p. |
artikel |
165 |
Tools for cryptographic protocols analysis: A technical and experimental comparison
|
Cheminod, Manuel |
|
2009 |
|
5 |
p. 954-961 8 p. |
artikel |
166 |
Tracing conceptual models' evolution in data warehouses by using the model driven architecture
|
Maté, Alejandro |
|
2014 |
|
5 |
p. 831-843 13 p. |
artikel |
167 |
Translating an OMT schema to an ODMG-93 schema
|
Davis, Karen C. |
|
1997 |
|
5 |
p. 417-429 13 p. |
artikel |
168 |
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
|
Massacci, Fabio |
|
2005 |
|
5 |
p. 445-455 11 p. |
artikel |
169 |
Video segmentation using a histogram-based fuzzy c-means clustering algorithm
|
Lo, Chi-Chun |
|
2001 |
|
5 |
p. 429-438 10 p. |
artikel |
170 |
25 volumes of Computer Standards and Interfaces completed
|
Schumny, Harald |
|
2003 |
|
5 |
p. 427-430 4 p. |
artikel |
171 |
Workflow automation based on OSI job transfer and manipulation
|
van Sinderen, Marten J. |
|
1999 |
|
5 |
p. 403-415 13 p. |
artikel |
172 |
XML-based e-business frameworks and standardization
|
Nurmilaakso, Juha-Miikka |
|
2006 |
|
5 |
p. 585-599 15 p. |
artikel |