Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             117 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Advances in automotive digital communications Cena, G.
2005
6 p. 665-678
14 p.
artikel
2 A fair Non-repudiation service in a web services peer-to-peer environment Agreiter, Berthold
2008
6 p. 372-378
7 p.
artikel
3 A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment Kim, Hakjae
2009
6 p. 1098-1107
10 p.
artikel
4 A framework for QoS computation in web service and technology selection Syed Muhammad Ahsan,
2006
6 p. 714-720
7 p.
artikel
5 A general approach to securely querying XML Damiani, Ernesto
2008
6 p. 379-389
11 p.
artikel
6 A generalization of the E-LOTOS renaming operator: a convenience for specification of new forms of process composition Kapus-Kolar, M.
2004
6 p. 549-563
15 p.
artikel
7 A maturity model for the Spanish software industry based on ISO standards Garzás, Javier
2013
6 p. 616-628
13 p.
artikel
8 A modified UTF-8 transformation format of ISO 10646 for storage optimization Tung, Cheng-Huang
2006
6 p. 650-659
10 p.
artikel
9 An address configuration protocol for 6LoWPAN wireless sensor networks based on PDAD Wang, Xiaonan
2014
6 p. 918-927
10 p.
artikel
10 Analytical model based on green criteria for optical backbone network interconnection Gutierrez, Jose
2011
6 p. 574-586
13 p.
artikel
11 An efficient and provable secure identity-based ring signcryption scheme Zhu, ZhenChao
2009
6 p. 1092-1097
6 p.
artikel
12 An efficient implementation algorithm for generating de Bruijn sequences Zhang, Weiguo
2009
6 p. 1190-1191
2 p.
artikel
13 An efficient user identification scheme based on ID-based cryptosystem Hwang, Min-Shiang
2004
6 p. 565-569
5 p.
artikel
14 An enhanced authenticated key agreement protocol for wireless mobile communication Lu, Rongxing
2007
6 p. 647-652
6 p.
artikel
15 A new algorithm for encryption/decryption for field applications Ramasamy, Rajaram
2009
6 p. 1069-1072
4 p.
artikel
16 An extendable data engine based on OPC specification Hong, Xu
2004
6 p. 515-525
11 p.
artikel
17 An international analysis of the extensions to the IEEE LOMv1.0 metadata standard Castro-García, Lorena
2013
6 p. 567-581
15 p.
artikel
18 An ontological approach to describe the SQL:2003 object-relational features Calero, C.
2006
6 p. 695-713
19 p.
artikel
19 An open source forensic tool to visualize digital evidence Vlastos, Emmanouil
2007
6 p. 614-625
12 p.
artikel
20 A novel formal verification approach for RTL hardware IP cores Djemal, Ridha
2005
6 p. 637-651
15 p.
artikel
21 Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems Choi, Eun Young
2009
6 p. 1124-1130
7 p.
artikel
22 Application Portability Profile (APP)—The US government's Open System Environment profile OSE/1 version 2.0 Systems and Software Technology Division Computer Systems Laboratory,
1993
6 p. 539-591
53 p.
artikel
23 Applying genetic algorithm for the development of the components-based embedded system Tseng, Tzu-Laing (Bill)
2005
6 p. 621-635
15 p.
artikel
24 A privacy aware and efficient security infrastructure for vehicular ad hoc networks Plößl, Klaus
2008
6 p. 390-397
8 p.
artikel
25 A proposal for extending the eduroam infrastructure with authorization mechanisms López, Gabriel
2008
6 p. 418-423
6 p.
artikel
26 Architectural impact of the SVG-based graphical components in web applications Moreno, Edward David
2009
6 p. 1150-1157
8 p.
artikel
27 A reputation system for electronic negotiations Tafreschi, Omid
2008
6 p. 351-360
10 p.
artikel
28 A SOAP-based system for the provision of e-services Kapsalis, Vassilis
2004
6 p. 527-541
15 p.
artikel
29 A socket interface for CAN devices Cena, Gianluca
2007
6 p. 662-673
12 p.
artikel
30 A standard for real-time smart transducer interface Elmenreich, Wilfried
2006
6 p. 613-624
12 p.
artikel
31 A study on information security management system evaluation—assets, threat and vulnerability Farn, Kwo-Jean
2004
6 p. 501-513
13 p.
artikel
32 A three-layered model to implement data privacy policies Canfora, Gerardo
2008
6 p. 398-409
12 p.
artikel
33 A traffic-class burst-polling based delta DBA scheme for QoS in distributed EPONs Yang, Yeon-Mo
2006
6 p. 721-736
16 p.
artikel
34 Author Index 2006
6 p. I-III
nvt p.
artikel
35 Author Index 2005
6 p. I-III
nvt p.
artikel
36 Author Index 2004
6 p. I-III
nvt p.
artikel
37 Author index to volume 15 (1993) 1993
6 p. 593-594
2 p.
artikel
38 A web-based sensor network system with distributed data processing approach via web application Fukatsu, Tokihiro
2011
6 p. 565-573
9 p.
artikel
39 Building a secure star schema in data warehouses by an extension of the relational package from CWM Soler, Emilio
2008
6 p. 341-350
10 p.
artikel
40 Business to business interoperability: A current review of XML data integration standards Lampathaki, Fenareti
2009
6 p. 1045-1055
11 p.
artikel
41 Business-to-government application integration framework: A case study of the high technology industry in Taiwan Li, Shing-Han
2013
6 p. 582-595
14 p.
artikel
42 Calendar 1993
6 p. 597-598
2 p.
artikel
43 Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan Hung, Shin-Yuan
2007
6 p. 626-634
9 p.
artikel
44 Cryptanalysis of two three-party encrypted key exchange protocols Lo, N.W.
2009
6 p. 1167-1174
8 p.
artikel
45 Data hiding based on compressed VQ indices of images Shie, Shih-Chieh
2009
6 p. 1143-1149
7 p.
artikel
46 Decision-cache based XACML authorisation and anonymisation for XML documents Ulltveit-Moe, Nils
2012
6 p. 527-534
8 p.
artikel
47 Designing distributed software with RT-CORBA and SDL Díaz, Manuel
2009
6 p. 1073-1091
19 p.
artikel
48 Dimensional metrology interoperability and standardization in manufacturing systems Zhao, Yaoyao
2011
6 p. 541-555
15 p.
artikel
49 DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network Xia, ZhengYou
2006
6 p. 660-669
10 p.
artikel
50 Earth Observation application development based on the Grid oriented ESIP satellite image processing platform Gorgan, Dorian
2012
6 p. 541-548
8 p.
artikel
51 Editorial Board 2014
6 p. iii-
1 p.
artikel
52 Editorial Board 2013
6 p. iii-
1 p.
artikel
53 Editorial Board 2009
6 p. iii-
1 p.
artikel
54 Editorial Board 2008
6 p. iii-
1 p.
artikel
55 Editorial Board 2006
6 p. iii-
1 p.
artikel
56 Editorial Board 2005
6 p. iii-
1 p.
artikel
57 Editorial Board 2004
6 p. iii-
1 p.
artikel
58 Editorial Board 2007
6 p. iii-
1 p.
artikel
59 Editorial Board 2012
6 p. iii-
1 p.
artikel
60 Editorial Board 2011
6 p. iii-
1 p.
artikel
61 Efficient key management for cryptographically enforced access control Zych, Anna
2008
6 p. 410-417
8 p.
artikel
62 Efficient migration access control for mobile agents Chung, Yu-Fang
2009
6 p. 1061-1068
8 p.
artikel
63 Efficient object tracking by condentional and cascaded image sensing Rätsch, Matthias
2012
6 p. 549-557
9 p.
artikel
64 e-Infrastructure for Remote Instrumentation Cheptsov, Alexey
2012
6 p. 476-484
9 p.
artikel
65 Executive Information System implementation in organisations in South Africa and Spain: A comparative analysis Averweg, Udo Richard
2006
6 p. 625-634
10 p.
artikel
66 Experiences in building a Grid-based platform to serve Earth observation training activities Petcu, Dana
2012
6 p. 493-508
16 p.
artikel
67 Exploiting an antivirus interface Hamlen, Kevin W.
2009
6 p. 1182-1189
8 p.
artikel
68 From Interfaces for Application Portability (IAP) to Open System Environment profiles (OSE) Bertuzzi, Luigi
1993
6 p. 515-521
7 p.
artikel
69 Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T) Waters, Jeff
2009
6 p. 1158-1166
9 p.
artikel
70 Histogram based perceptual quality assessment method for color images Yalman, Yildiray
2014
6 p. 899-908
10 p.
artikel
71 How do we define the “general purpose”? Tan, Jin
2014
6 p. 963-965
3 p.
artikel
72 ID-based digital signature scheme on the elliptic curve cryptosystem Chung, Yu Fang
2007
6 p. 601-604
4 p.
artikel
73 IEEE 802.21: Media independence beyond handover la Oliva, Antonio de
2011
6 p. 556-564
9 p.
artikel
74 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Hsiang, Han-Cheng
2009
6 p. 1118-1123
6 p.
artikel
75 Improving simulation of wireless networked control systems based on WirelessHART Ferrari, P.
2013
6 p. 605-615
11 p.
artikel
76 Intelligent DAQ's, advanced computing and interfacing systems Grimaldi, Domenico
2012
6 p. 467-
1 p.
artikel
77 Interoperability: the user goal Berg, John L
1993
6 p. 465-
1 p.
artikel
78 Introduction to JTC1/TSG-1 report Lawler, Mary Anne
1993
6 p. 467-468
2 p.
artikel
79 Knowledge Discovery Metamodel-ISO/IEC 19506: A standard to modernize legacy systems Pérez-Castillo, Ricardo
2011
6 p. 519-532
14 p.
artikel
80 Mapping standards for home networking van de Kaa, Geerten
2009
6 p. 1175-1181
7 p.
artikel
81 Methods of assessing the time efficiency in the virtual measurement systems Bilski, Piotr
2012
6 p. 485-492
8 p.
artikel
82 Multi-Sine Fitting Algorithm enhancement for sinusoidal signal characterization Carní, Domenico Luca
2012
6 p. 535-540
6 p.
artikel
83 Performance evaluation of the parallel processing producer–distributor–consumer network architecture Polaków, Grzegorz
2013
6 p. 596-604
9 p.
artikel
84 Performance of intelligent Mobile IPv6 Saxena, P.C.
2006
6 p. 737-751
15 p.
artikel
85 Point of view: Long-Term access to Earth Archives across Multiple Disciplines Yu, Jinsongdi
2014
6 p. 909-917
9 p.
artikel
86 Policy support for call control Turner, Kenneth J.
2006
6 p. 635-649
15 p.
artikel
87 Privacy provision in e-learning standardized systems: status and improvements Jerman-Blažič, Borka
2005
6 p. 561-578
18 p.
artikel
88 Redesigning remote system administration paradigms for enhanced security and flexibility Prandini, Marco
2008
6 p. 424-432
9 p.
artikel
89 Remotely accessible laboratory for electronic measurement teaching Canfora, G.
2004
6 p. 489-499
11 p.
artikel
90 SCPN modeling and comparative performance evaluation of bussed and crossbar-based switched fabric CAN Mazouzi, Mohamed
2014
6 p. 953-962
10 p.
artikel
91 Search marketing traffic and performance models Fiorini, Pierre M.
2012
6 p. 517-526
10 p.
artikel
92 Secure interoperation of identity managements among different circles of trust Chen, Jianyong
2011
6 p. 533-540
8 p.
artikel
93 Security network interface for alarm systems Bykovyy, Pavlo
2012
6 p. 468-475
8 p.
artikel
94 Semantic annotations for web services discovery and composition Talantikite, Hassina Nacer
2009
6 p. 1108-1117
10 p.
artikel
95 Software and hardware certification of safety-critical avionic systems: A comparison study Youn, Wonkeun
2014
6 p. 889-898
10 p.
artikel
96 Software–hardware method of serial interface controller implementation Maykiv, I.
2012
6 p. 509-516
8 p.
artikel
97 Software reference architecture for smart environments: Perception Fernández-Montes, A.
2014
6 p. 928-940
13 p.
artikel
98 Standard-compliant, but incompatible?! Egyedi, Tineke M.
2007
6 p. 605-613
9 p.
artikel
99 Standards necessary to define Interfaces for Application Portability (IAP)—Final report, April 1991 1993
6 p. 469-514
46 p.
artikel
100 State of standards in the information systems security area Fernández-Medina, Eduardo
2008
6 p. 339-340
2 p.
artikel
101 Subject Index 2006
6 p. IV-VI
nvt p.
artikel
102 Subject Index 2005
6 p. IV-VI
nvt p.
artikel
103 Subject Index 2004
6 p. V-VII
nvt p.
artikel
104 Subject index to volume 15 (1993) 1993
6 p. 595-596
2 p.
artikel
105 The Federated Forums based Integrated Biological Data Mining Broker Ho, Min-Huang
2005
6 p. 579-596
18 p.
artikel
106 The SSI story What it is, and how it was stalled and eliminated in the International Standardization arena Takahashi, Sigeru
1993
6 p. 523-538
16 p.
artikel
107 Timed verification of hierarchical communicating real-time state machines Furfaro, Angelo
2007
6 p. 635-646
12 p.
artikel
108 Towards security requirements management for software product lines: A security domain requirements engineering process Mellado, Daniel
2008
6 p. 361-371
11 p.
artikel
109 Towards the integration of the agent-oriented modeling diversity with a powertype-based language García-Magariño, Iván
2014
6 p. 941-952
12 p.
artikel
110 Towards trust management standardization Trček, Denis
2004
6 p. 543-548
6 p.
artikel
111 Two improved two-party identity-based authenticated key agreement protocols Hölbl, Marko
2009
6 p. 1056-1060
5 p.
artikel
112 Understanding and using the IEC 61850: a case for meta-modelling Kostic, Tatjana
2005
6 p. 679-695
17 p.
artikel
113 Using Maude to write and execute ODP information viewpoint specifications Durán, Francisco
2005
6 p. 597-620
24 p.
artikel
114 Utility-based scheduling for grid computing under constraints of energy budget and deadline Li, Chunlin
2009
6 p. 1131-1142
12 p.
artikel
115 Validating the external quality subcharacteristics of software products according to ISO/IEC 9126 Jung, Ho-Won
2007
6 p. 653-661
9 p.
artikel
116 Virtual instrument for measurement, processing data, and visualization of vibration patterns of piezoelectric devices Jiménez, F.J.
2005
6 p. 653-663
11 p.
artikel
117 Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art Sobh, Tarek S.
2006
6 p. 670-694
25 p.
artikel
                             117 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland