nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advances in automotive digital communications
|
Cena, G. |
|
2005 |
|
6 |
p. 665-678 14 p. |
artikel |
2 |
A fair Non-repudiation service in a web services peer-to-peer environment
|
Agreiter, Berthold |
|
2008 |
|
6 |
p. 372-378 7 p. |
artikel |
3 |
A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment
|
Kim, Hakjae |
|
2009 |
|
6 |
p. 1098-1107 10 p. |
artikel |
4 |
A framework for QoS computation in web service and technology selection
|
Syed Muhammad Ahsan, |
|
2006 |
|
6 |
p. 714-720 7 p. |
artikel |
5 |
A general approach to securely querying XML
|
Damiani, Ernesto |
|
2008 |
|
6 |
p. 379-389 11 p. |
artikel |
6 |
A generalization of the E-LOTOS renaming operator: a convenience for specification of new forms of process composition
|
Kapus-Kolar, M. |
|
2004 |
|
6 |
p. 549-563 15 p. |
artikel |
7 |
A maturity model for the Spanish software industry based on ISO standards
|
Garzás, Javier |
|
2013 |
|
6 |
p. 616-628 13 p. |
artikel |
8 |
A modified UTF-8 transformation format of ISO 10646 for storage optimization
|
Tung, Cheng-Huang |
|
2006 |
|
6 |
p. 650-659 10 p. |
artikel |
9 |
An address configuration protocol for 6LoWPAN wireless sensor networks based on PDAD
|
Wang, Xiaonan |
|
2014 |
|
6 |
p. 918-927 10 p. |
artikel |
10 |
Analytical model based on green criteria for optical backbone network interconnection
|
Gutierrez, Jose |
|
2011 |
|
6 |
p. 574-586 13 p. |
artikel |
11 |
An efficient and provable secure identity-based ring signcryption scheme
|
Zhu, ZhenChao |
|
2009 |
|
6 |
p. 1092-1097 6 p. |
artikel |
12 |
An efficient implementation algorithm for generating de Bruijn sequences
|
Zhang, Weiguo |
|
2009 |
|
6 |
p. 1190-1191 2 p. |
artikel |
13 |
An efficient user identification scheme based on ID-based cryptosystem
|
Hwang, Min-Shiang |
|
2004 |
|
6 |
p. 565-569 5 p. |
artikel |
14 |
An enhanced authenticated key agreement protocol for wireless mobile communication
|
Lu, Rongxing |
|
2007 |
|
6 |
p. 647-652 6 p. |
artikel |
15 |
A new algorithm for encryption/decryption for field applications
|
Ramasamy, Rajaram |
|
2009 |
|
6 |
p. 1069-1072 4 p. |
artikel |
16 |
An extendable data engine based on OPC specification
|
Hong, Xu |
|
2004 |
|
6 |
p. 515-525 11 p. |
artikel |
17 |
An international analysis of the extensions to the IEEE LOMv1.0 metadata standard
|
Castro-García, Lorena |
|
2013 |
|
6 |
p. 567-581 15 p. |
artikel |
18 |
An ontological approach to describe the SQL:2003 object-relational features
|
Calero, C. |
|
2006 |
|
6 |
p. 695-713 19 p. |
artikel |
19 |
An open source forensic tool to visualize digital evidence
|
Vlastos, Emmanouil |
|
2007 |
|
6 |
p. 614-625 12 p. |
artikel |
20 |
A novel formal verification approach for RTL hardware IP cores
|
Djemal, Ridha |
|
2005 |
|
6 |
p. 637-651 15 p. |
artikel |
21 |
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
|
Choi, Eun Young |
|
2009 |
|
6 |
p. 1124-1130 7 p. |
artikel |
22 |
Application Portability Profile (APP)—The US government's Open System Environment profile OSE/1 version 2.0
|
Systems and Software Technology Division Computer Systems Laboratory, |
|
1993 |
|
6 |
p. 539-591 53 p. |
artikel |
23 |
Applying genetic algorithm for the development of the components-based embedded system
|
Tseng, Tzu-Laing (Bill) |
|
2005 |
|
6 |
p. 621-635 15 p. |
artikel |
24 |
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
|
Plößl, Klaus |
|
2008 |
|
6 |
p. 390-397 8 p. |
artikel |
25 |
A proposal for extending the eduroam infrastructure with authorization mechanisms
|
López, Gabriel |
|
2008 |
|
6 |
p. 418-423 6 p. |
artikel |
26 |
Architectural impact of the SVG-based graphical components in web applications
|
Moreno, Edward David |
|
2009 |
|
6 |
p. 1150-1157 8 p. |
artikel |
27 |
A reputation system for electronic negotiations
|
Tafreschi, Omid |
|
2008 |
|
6 |
p. 351-360 10 p. |
artikel |
28 |
A SOAP-based system for the provision of e-services
|
Kapsalis, Vassilis |
|
2004 |
|
6 |
p. 527-541 15 p. |
artikel |
29 |
A socket interface for CAN devices
|
Cena, Gianluca |
|
2007 |
|
6 |
p. 662-673 12 p. |
artikel |
30 |
A standard for real-time smart transducer interface
|
Elmenreich, Wilfried |
|
2006 |
|
6 |
p. 613-624 12 p. |
artikel |
31 |
A study on information security management system evaluation—assets, threat and vulnerability
|
Farn, Kwo-Jean |
|
2004 |
|
6 |
p. 501-513 13 p. |
artikel |
32 |
A three-layered model to implement data privacy policies
|
Canfora, Gerardo |
|
2008 |
|
6 |
p. 398-409 12 p. |
artikel |
33 |
A traffic-class burst-polling based delta DBA scheme for QoS in distributed EPONs
|
Yang, Yeon-Mo |
|
2006 |
|
6 |
p. 721-736 16 p. |
artikel |
34 |
Author Index
|
|
|
2006 |
|
6 |
p. I-III nvt p. |
artikel |
35 |
Author Index
|
|
|
2005 |
|
6 |
p. I-III nvt p. |
artikel |
36 |
Author Index
|
|
|
2004 |
|
6 |
p. I-III nvt p. |
artikel |
37 |
Author index to volume 15 (1993)
|
|
|
1993 |
|
6 |
p. 593-594 2 p. |
artikel |
38 |
A web-based sensor network system with distributed data processing approach via web application
|
Fukatsu, Tokihiro |
|
2011 |
|
6 |
p. 565-573 9 p. |
artikel |
39 |
Building a secure star schema in data warehouses by an extension of the relational package from CWM
|
Soler, Emilio |
|
2008 |
|
6 |
p. 341-350 10 p. |
artikel |
40 |
Business to business interoperability: A current review of XML data integration standards
|
Lampathaki, Fenareti |
|
2009 |
|
6 |
p. 1045-1055 11 p. |
artikel |
41 |
Business-to-government application integration framework: A case study of the high technology industry in Taiwan
|
Li, Shing-Han |
|
2013 |
|
6 |
p. 582-595 14 p. |
artikel |
42 |
Calendar
|
|
|
1993 |
|
6 |
p. 597-598 2 p. |
artikel |
43 |
Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan
|
Hung, Shin-Yuan |
|
2007 |
|
6 |
p. 626-634 9 p. |
artikel |
44 |
Cryptanalysis of two three-party encrypted key exchange protocols
|
Lo, N.W. |
|
2009 |
|
6 |
p. 1167-1174 8 p. |
artikel |
45 |
Data hiding based on compressed VQ indices of images
|
Shie, Shih-Chieh |
|
2009 |
|
6 |
p. 1143-1149 7 p. |
artikel |
46 |
Decision-cache based XACML authorisation and anonymisation for XML documents
|
Ulltveit-Moe, Nils |
|
2012 |
|
6 |
p. 527-534 8 p. |
artikel |
47 |
Designing distributed software with RT-CORBA and SDL
|
Díaz, Manuel |
|
2009 |
|
6 |
p. 1073-1091 19 p. |
artikel |
48 |
Dimensional metrology interoperability and standardization in manufacturing systems
|
Zhao, Yaoyao |
|
2011 |
|
6 |
p. 541-555 15 p. |
artikel |
49 |
DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network
|
Xia, ZhengYou |
|
2006 |
|
6 |
p. 660-669 10 p. |
artikel |
50 |
Earth Observation application development based on the Grid oriented ESIP satellite image processing platform
|
Gorgan, Dorian |
|
2012 |
|
6 |
p. 541-548 8 p. |
artikel |
51 |
Editorial Board
|
|
|
2014 |
|
6 |
p. iii- 1 p. |
artikel |
52 |
Editorial Board
|
|
|
2013 |
|
6 |
p. iii- 1 p. |
artikel |
53 |
Editorial Board
|
|
|
2009 |
|
6 |
p. iii- 1 p. |
artikel |
54 |
Editorial Board
|
|
|
2008 |
|
6 |
p. iii- 1 p. |
artikel |
55 |
Editorial Board
|
|
|
2006 |
|
6 |
p. iii- 1 p. |
artikel |
56 |
Editorial Board
|
|
|
2005 |
|
6 |
p. iii- 1 p. |
artikel |
57 |
Editorial Board
|
|
|
2004 |
|
6 |
p. iii- 1 p. |
artikel |
58 |
Editorial Board
|
|
|
2007 |
|
6 |
p. iii- 1 p. |
artikel |
59 |
Editorial Board
|
|
|
2012 |
|
6 |
p. iii- 1 p. |
artikel |
60 |
Editorial Board
|
|
|
2011 |
|
6 |
p. iii- 1 p. |
artikel |
61 |
Efficient key management for cryptographically enforced access control
|
Zych, Anna |
|
2008 |
|
6 |
p. 410-417 8 p. |
artikel |
62 |
Efficient migration access control for mobile agents
|
Chung, Yu-Fang |
|
2009 |
|
6 |
p. 1061-1068 8 p. |
artikel |
63 |
Efficient object tracking by condentional and cascaded image sensing
|
Rätsch, Matthias |
|
2012 |
|
6 |
p. 549-557 9 p. |
artikel |
64 |
e-Infrastructure for Remote Instrumentation
|
Cheptsov, Alexey |
|
2012 |
|
6 |
p. 476-484 9 p. |
artikel |
65 |
Executive Information System implementation in organisations in South Africa and Spain: A comparative analysis
|
Averweg, Udo Richard |
|
2006 |
|
6 |
p. 625-634 10 p. |
artikel |
66 |
Experiences in building a Grid-based platform to serve Earth observation training activities
|
Petcu, Dana |
|
2012 |
|
6 |
p. 493-508 16 p. |
artikel |
67 |
Exploiting an antivirus interface
|
Hamlen, Kevin W. |
|
2009 |
|
6 |
p. 1182-1189 8 p. |
artikel |
68 |
From Interfaces for Application Portability (IAP) to Open System Environment profiles (OSE)
|
Bertuzzi, Luigi |
|
1993 |
|
6 |
p. 515-521 7 p. |
artikel |
69 |
Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T)
|
Waters, Jeff |
|
2009 |
|
6 |
p. 1158-1166 9 p. |
artikel |
70 |
Histogram based perceptual quality assessment method for color images
|
Yalman, Yildiray |
|
2014 |
|
6 |
p. 899-908 10 p. |
artikel |
71 |
How do we define the “general purpose”?
|
Tan, Jin |
|
2014 |
|
6 |
p. 963-965 3 p. |
artikel |
72 |
ID-based digital signature scheme on the elliptic curve cryptosystem
|
Chung, Yu Fang |
|
2007 |
|
6 |
p. 601-604 4 p. |
artikel |
73 |
IEEE 802.21: Media independence beyond handover
|
la Oliva, Antonio de |
|
2011 |
|
6 |
p. 556-564 9 p. |
artikel |
74 |
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
|
Hsiang, Han-Cheng |
|
2009 |
|
6 |
p. 1118-1123 6 p. |
artikel |
75 |
Improving simulation of wireless networked control systems based on WirelessHART
|
Ferrari, P. |
|
2013 |
|
6 |
p. 605-615 11 p. |
artikel |
76 |
Intelligent DAQ's, advanced computing and interfacing systems
|
Grimaldi, Domenico |
|
2012 |
|
6 |
p. 467- 1 p. |
artikel |
77 |
Interoperability: the user goal
|
Berg, John L |
|
1993 |
|
6 |
p. 465- 1 p. |
artikel |
78 |
Introduction to JTC1/TSG-1 report
|
Lawler, Mary Anne |
|
1993 |
|
6 |
p. 467-468 2 p. |
artikel |
79 |
Knowledge Discovery Metamodel-ISO/IEC 19506: A standard to modernize legacy systems
|
Pérez-Castillo, Ricardo |
|
2011 |
|
6 |
p. 519-532 14 p. |
artikel |
80 |
Mapping standards for home networking
|
van de Kaa, Geerten |
|
2009 |
|
6 |
p. 1175-1181 7 p. |
artikel |
81 |
Methods of assessing the time efficiency in the virtual measurement systems
|
Bilski, Piotr |
|
2012 |
|
6 |
p. 485-492 8 p. |
artikel |
82 |
Multi-Sine Fitting Algorithm enhancement for sinusoidal signal characterization
|
Carní, Domenico Luca |
|
2012 |
|
6 |
p. 535-540 6 p. |
artikel |
83 |
Performance evaluation of the parallel processing producer–distributor–consumer network architecture
|
Polaków, Grzegorz |
|
2013 |
|
6 |
p. 596-604 9 p. |
artikel |
84 |
Performance of intelligent Mobile IPv6
|
Saxena, P.C. |
|
2006 |
|
6 |
p. 737-751 15 p. |
artikel |
85 |
Point of view: Long-Term access to Earth Archives across Multiple Disciplines
|
Yu, Jinsongdi |
|
2014 |
|
6 |
p. 909-917 9 p. |
artikel |
86 |
Policy support for call control
|
Turner, Kenneth J. |
|
2006 |
|
6 |
p. 635-649 15 p. |
artikel |
87 |
Privacy provision in e-learning standardized systems: status and improvements
|
Jerman-Blažič, Borka |
|
2005 |
|
6 |
p. 561-578 18 p. |
artikel |
88 |
Redesigning remote system administration paradigms for enhanced security and flexibility
|
Prandini, Marco |
|
2008 |
|
6 |
p. 424-432 9 p. |
artikel |
89 |
Remotely accessible laboratory for electronic measurement teaching
|
Canfora, G. |
|
2004 |
|
6 |
p. 489-499 11 p. |
artikel |
90 |
SCPN modeling and comparative performance evaluation of bussed and crossbar-based switched fabric CAN
|
Mazouzi, Mohamed |
|
2014 |
|
6 |
p. 953-962 10 p. |
artikel |
91 |
Search marketing traffic and performance models
|
Fiorini, Pierre M. |
|
2012 |
|
6 |
p. 517-526 10 p. |
artikel |
92 |
Secure interoperation of identity managements among different circles of trust
|
Chen, Jianyong |
|
2011 |
|
6 |
p. 533-540 8 p. |
artikel |
93 |
Security network interface for alarm systems
|
Bykovyy, Pavlo |
|
2012 |
|
6 |
p. 468-475 8 p. |
artikel |
94 |
Semantic annotations for web services discovery and composition
|
Talantikite, Hassina Nacer |
|
2009 |
|
6 |
p. 1108-1117 10 p. |
artikel |
95 |
Software and hardware certification of safety-critical avionic systems: A comparison study
|
Youn, Wonkeun |
|
2014 |
|
6 |
p. 889-898 10 p. |
artikel |
96 |
Software–hardware method of serial interface controller implementation
|
Maykiv, I. |
|
2012 |
|
6 |
p. 509-516 8 p. |
artikel |
97 |
Software reference architecture for smart environments: Perception
|
Fernández-Montes, A. |
|
2014 |
|
6 |
p. 928-940 13 p. |
artikel |
98 |
Standard-compliant, but incompatible?!
|
Egyedi, Tineke M. |
|
2007 |
|
6 |
p. 605-613 9 p. |
artikel |
99 |
Standards necessary to define Interfaces for Application Portability (IAP)—Final report, April 1991
|
|
|
1993 |
|
6 |
p. 469-514 46 p. |
artikel |
100 |
State of standards in the information systems security area
|
Fernández-Medina, Eduardo |
|
2008 |
|
6 |
p. 339-340 2 p. |
artikel |
101 |
Subject Index
|
|
|
2006 |
|
6 |
p. IV-VI nvt p. |
artikel |
102 |
Subject Index
|
|
|
2005 |
|
6 |
p. IV-VI nvt p. |
artikel |
103 |
Subject Index
|
|
|
2004 |
|
6 |
p. V-VII nvt p. |
artikel |
104 |
Subject index to volume 15 (1993)
|
|
|
1993 |
|
6 |
p. 595-596 2 p. |
artikel |
105 |
The Federated Forums based Integrated Biological Data Mining Broker
|
Ho, Min-Huang |
|
2005 |
|
6 |
p. 579-596 18 p. |
artikel |
106 |
The SSI story What it is, and how it was stalled and eliminated in the International Standardization arena
|
Takahashi, Sigeru |
|
1993 |
|
6 |
p. 523-538 16 p. |
artikel |
107 |
Timed verification of hierarchical communicating real-time state machines
|
Furfaro, Angelo |
|
2007 |
|
6 |
p. 635-646 12 p. |
artikel |
108 |
Towards security requirements management for software product lines: A security domain requirements engineering process
|
Mellado, Daniel |
|
2008 |
|
6 |
p. 361-371 11 p. |
artikel |
109 |
Towards the integration of the agent-oriented modeling diversity with a powertype-based language
|
García-Magariño, Iván |
|
2014 |
|
6 |
p. 941-952 12 p. |
artikel |
110 |
Towards trust management standardization
|
Trček, Denis |
|
2004 |
|
6 |
p. 543-548 6 p. |
artikel |
111 |
Two improved two-party identity-based authenticated key agreement protocols
|
Hölbl, Marko |
|
2009 |
|
6 |
p. 1056-1060 5 p. |
artikel |
112 |
Understanding and using the IEC 61850: a case for meta-modelling
|
Kostic, Tatjana |
|
2005 |
|
6 |
p. 679-695 17 p. |
artikel |
113 |
Using Maude to write and execute ODP information viewpoint specifications
|
Durán, Francisco |
|
2005 |
|
6 |
p. 597-620 24 p. |
artikel |
114 |
Utility-based scheduling for grid computing under constraints of energy budget and deadline
|
Li, Chunlin |
|
2009 |
|
6 |
p. 1131-1142 12 p. |
artikel |
115 |
Validating the external quality subcharacteristics of software products according to ISO/IEC 9126
|
Jung, Ho-Won |
|
2007 |
|
6 |
p. 653-661 9 p. |
artikel |
116 |
Virtual instrument for measurement, processing data, and visualization of vibration patterns of piezoelectric devices
|
Jiménez, F.J. |
|
2005 |
|
6 |
p. 653-663 11 p. |
artikel |
117 |
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
|
Sobh, Tarek S. |
|
2006 |
|
6 |
p. 670-694 25 p. |
artikel |