Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             22 results found
no title author magazine year volume issue page(s) type
1 A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment Lee, Namho
2011
14 3 p. 653-668
article
2 Advanced secure multimedia services for digital homes Roman, Rodrigo
2010
14 3 p. 527-540
article
3 Agile test framework for business-to-business interoperability Woo, Jungyub
2011
14 3 p. 789-808
article
4 Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost Li, Yung-Ming
2010
14 3 p. 633-645
article
5 A role-involved purpose-based access control model Kabir, Md. Enamul
2011
14 3 p. 809-822
article
6 Automatic and fast temporal segmentation for personalized news consuming Dong, Yuan
2010
14 3 p. 517-526
article
7 CASE-mediated organizational and deutero learning at NASA Templeton, Gary F.
2011
14 3 p. 741-764
article
8 Collaboration among mobile agents for efficient energy allocation in mobile grid Li, Chunlin
2011
14 3 p. 711-723
article
9 Effective distributed service architecture for ubiquitous video surveillance Chang, Ray-I
2010
14 3 p. 499-515
article
10 Efficient category-based service discovery on multi-agent platform Han, Seungwok
2010
14 3 p. 601-616
article
11 Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows Demirkan, Haluk
2011
14 3 p. 765-788
article
12 Intelligent forest fire monitoring system Stula, Maja
2011
14 3 p. 725-739
article
13 MILC: A secure and privacy-preserving mobile instant locator with chatting Loukas, Athanasios
2010
14 3 p. 481-497
article
14 Modeling the influence of network delay on the user experience in distributed home-automation networks Umberger, Mark
2010
14 3 p. 571-584
article
15 Resource management activities in healthcare information systems: A process perspective Teoh, Say Yen
2010
14 3 p. 585-600
article
16 Secure XML querying based on authorization graphs Chebotko, Artem
2010
14 3 p. 617-632
article
17 Security model for emergency real-time communications in autonomous networks Panaousis, Emmanouil A.
2010
14 3 p. 541-553
article
18 Special issue on ubiquitous multimedia services Lian, Shiguo
2010
14 3 p. 477-479
article
19 Study of the digital divide evaluation model for government agencies–a Taiwanese local government’s perspective Chang, She-I
2011
14 3 p. 693-709
article
20 Technological research plan for active ageing Afsarmanesh, Hamideh
2011
14 3 p. 669-692
article
21 Third party application control on quality of service in IP based multimedia networks Pencheva, Evelina
2010
14 3 p. 555-569
article
22 Vulnerabilities of RFID protocols proposed in ISF Piramuthu, Selwyn
2010
14 3 p. 647-651
article
                             22 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands