nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A class-based scheme for E-commerce web servers: Formal specification and performance evaluation
|
Holton, D.R.W. |
|
2009 |
32 |
2 |
p. 455-460 6 p. |
artikel |
2 |
A new system architecture for crowd simulation
|
Lozano, M. |
|
2009 |
32 |
2 |
p. 474-482 9 p. |
artikel |
3 |
An innovative analyser for multi-classifier e-mail classification based on grey list analysis
|
Islam, Md Rafiqul |
|
2009 |
32 |
2 |
p. 357-366 10 p. |
artikel |
4 |
A novel fault-tolerant execution model by using of mobile agents
|
Qu, Wenyu |
|
2009 |
32 |
2 |
p. 423-432 10 p. |
artikel |
5 |
A policy-based authorization model for workflow-enabled dynamic process management
|
Cao, Jian |
|
2009 |
32 |
2 |
p. 412-422 11 p. |
artikel |
6 |
A user-centric federated single sign-on system
|
Suriadi, Suriadi |
|
2009 |
32 |
2 |
p. 388-401 14 p. |
artikel |
7 |
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment
|
Zou, Deqing |
|
2009 |
32 |
2 |
p. 402-411 10 p. |
artikel |
8 |
Editorial board
|
|
|
2009 |
32 |
2 |
p. IFC- 1 p. |
artikel |
9 |
Enhanced cross-layer based middleware for mobile ad hoc networks
|
Denko, Mieso K. |
|
2009 |
32 |
2 |
p. 490-499 10 p. |
artikel |
10 |
Fast autonomous system traceback
|
Durresi, Arjan |
|
2009 |
32 |
2 |
p. 448-454 7 p. |
artikel |
11 |
Mobile service oriented architectures for NN-queries
|
Waluyo, Agustinus Borgy |
|
2009 |
32 |
2 |
p. 434-447 14 p. |
artikel |
12 |
Network and system security
|
Zhou, Wanlei |
|
2009 |
32 |
2 |
p. 345-346 2 p. |
artikel |
13 |
One-way queuing delay measurement and its application on detecting DDoS attack
|
Lu, Wei-Zhou |
|
2009 |
32 |
2 |
p. 367-376 10 p. |
artikel |
14 |
Profit-aware overload protection in E-commerce Web sites
|
Yue, Chuan |
|
2009 |
32 |
2 |
p. 347-356 10 p. |
artikel |
15 |
Quantitative analysis of location management and QoS in wireless networks
|
Zhang, Yan |
|
2009 |
32 |
2 |
p. 483-489 7 p. |
artikel |
16 |
Special issue on service oriented computing and advanced network applications
|
Younas, Muhammad |
|
2009 |
32 |
2 |
p. 433- 1 p. |
artikel |
17 |
Towards automating overlay network management
|
Al-Oqily, I. |
|
2009 |
32 |
2 |
p. 461-473 13 p. |
artikel |
18 |
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
|
Li, Bai |
|
2009 |
32 |
2 |
p. 377-387 11 p. |
artikel |