nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cybersecurity model in cloud computing environments
|
Rabai, Latifa Ben Arfa |
|
2013 |
25 |
1 |
p. 63-75 13 p. |
artikel |
2 |
A high abstraction level approach for detecting feature interactions between telecommunication services
|
Chentouf, Zohair |
|
2013 |
25 |
1 |
p. 99-115 17 p. |
artikel |
3 |
Analysis of accounting models for the detection of duplicate requests in web services
|
Venkatesan, S. |
|
2013 |
25 |
1 |
p. 7-24 18 p. |
artikel |
4 |
An approach to products placement in supermarkets using PrefixSpan algorithm
|
Aloysius, George |
|
2013 |
25 |
1 |
p. 77-87 11 p. |
artikel |
5 |
A smart card based framework for securing e-business transactions in distributed systems
|
Fourar-Laidi, Hakim |
|
2013 |
25 |
1 |
p. 1-5 5 p. |
artikel |
6 |
Assessment of dysarthric speech through rhythm metrics
|
Dahmani, H. |
|
2013 |
25 |
1 |
p. 43-49 7 p. |
artikel |
7 |
Dynamic congestion detection and control routing in ad hoc networks
|
Senthilkumaran, T. |
|
2013 |
25 |
1 |
p. 25-34 10 p. |
artikel |
8 |
Efficient priority schemes for the provision of end-to-end quality of service for multimedia traffic over MPLS VPN networks
|
Rikli, Nasser-Eddine |
|
2013 |
25 |
1 |
p. 89-98 10 p. |
artikel |
9 |
Feasibility of SNMP OID compression
|
Narayanan, Hari T.S. |
|
2013 |
25 |
1 |
p. 35-42 8 p. |
artikel |
10 |
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
|
Hafizul Islam, SK |
|
2013 |
25 |
1 |
p. 51-61 11 p. |
artikel |