nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving reliable system performance by fast recovery of branch miss prediction
|
Choi, Min |
|
2012 |
35 |
3 |
p. 982-991 10 p. |
artikel |
2 |
A model-driven development method for collaborative modeling tools
|
Gallardo, Jesús |
|
2012 |
35 |
3 |
p. 1086-1105 20 p. |
artikel |
3 |
An efficient continuous tracking system in real-time surveillance application
|
Lee, Chao-Yang |
|
2012 |
35 |
3 |
p. 1067-1073 7 p. |
artikel |
4 |
An incentive mechanism to reinforce truthful reports in reputation systems
|
Zhao, Huanyu |
|
2012 |
35 |
3 |
p. 951-961 11 p. |
artikel |
5 |
A peer-to-peer collaboration framework for multi-sensor data fusion
|
Lee, Panho |
|
2012 |
35 |
3 |
p. 1052-1066 15 p. |
artikel |
6 |
A standards-based interoperable single sign-on framework in ARC Grid middleware
|
Qiang, Weizhong |
|
2012 |
35 |
3 |
p. 892-904 13 p. |
artikel |
7 |
Comparison of recovery schemes to maximize restorable throughput in multicast networks
|
Suraprasert, S. |
|
2012 |
35 |
3 |
p. 1106-1115 10 p. |
artikel |
8 |
Detecting node replication attacks in wireless sensor networks: A survey
|
Zhu, Wen Tao |
|
2012 |
35 |
3 |
p. 1022-1034 13 p. |
artikel |
9 |
Editorial board
|
|
|
2012 |
35 |
3 |
p. IFC- 1 p. |
artikel |
10 |
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
|
Baadache, Abderrahmane |
|
2012 |
35 |
3 |
p. 1130-1139 10 p. |
artikel |
11 |
Flexible service selection with user-specific QoS support in service-oriented architecture
|
Zhao, Laiping |
|
2012 |
35 |
3 |
p. 962-973 12 p. |
artikel |
12 |
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration
|
Yin, Jihao |
|
2012 |
35 |
3 |
p. 1035-1051 17 p. |
artikel |
13 |
Generating regular expression signatures for network traffic classification in trusted network management
|
Wang, Yu |
|
2012 |
35 |
3 |
p. 992-1000 9 p. |
artikel |
14 |
Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams
|
Keshavamurthy, Bettahally N. |
|
2012 |
35 |
3 |
p. 1116-1129 14 p. |
artikel |
15 |
Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges
|
Batistatos, M.C. |
|
2012 |
35 |
3 |
p. 1140-1150 11 p. |
artikel |
16 |
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
|
Cho, Jin-Hee |
|
2012 |
35 |
3 |
p. 1001-1012 12 p. |
artikel |
17 |
Multi-agent systems for protecting critical infrastructures: A survey
|
Baig, Zubair A. |
|
2012 |
35 |
3 |
p. 1151-1161 11 p. |
artikel |
18 |
Neighbor supported reliable multipath multicast routing in MANETs
|
Biradar, Rajashekhar C. |
|
2012 |
35 |
3 |
p. 1074-1085 12 p. |
artikel |
19 |
On-demand multicast routing protocol with efficient route discovery
|
Kharraz, Mohammad-Amin |
|
2012 |
35 |
3 |
p. 942-950 9 p. |
artikel |
20 |
Performance improvements for network-wide broadcast with instantaneous network information
|
Banerjee, Abhik |
|
2012 |
35 |
3 |
p. 1162-1174 13 p. |
artikel |
21 |
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
|
Jia, Zhongtian |
|
2012 |
35 |
3 |
p. 905-913 9 p. |
artikel |
22 |
Real-time data management on wireless sensor networks: A survey
|
Diallo, Ousmane |
|
2012 |
35 |
3 |
p. 1013-1021 9 p. |
artikel |
23 |
Reputation rating modeling for open environment lack of communication by using online social cognition
|
Jiang, Lei |
|
2012 |
35 |
3 |
p. 881-891 11 p. |
artikel |
24 |
Secure and privacy preserving keyword searching for cloud storage services
|
Liu, Qin |
|
2012 |
35 |
3 |
p. 927-933 7 p. |
artikel |
25 |
Security model oriented attestation on dynamically reconfigurable component-based systems
|
Gu, Liang |
|
2012 |
35 |
3 |
p. 974-981 8 p. |
artikel |
26 |
SONR: A reliable reputation system of self-organized network
|
Wang, Fei |
|
2012 |
35 |
3 |
p. 914-926 13 p. |
artikel |
27 |
Special issue on trusted computing and communications
|
Yang, Laurence T. |
|
2012 |
35 |
3 |
p. 865-866 2 p. |
artikel |
28 |
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
|
Gómez Mármol, Félix |
|
2012 |
35 |
3 |
p. 934-941 8 p. |
artikel |
29 |
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
|
Yu, Yanli |
|
2012 |
35 |
3 |
p. 867-880 14 p. |
artikel |