


default search action
Computer Standards & Interfaces, Volume 32
Volume 32, Numbers 1-2, January 2010
- Szilárd Jaskó

, Tibor Dulai, Dániel Muhi, Katalin Tarnay:
Test aspect of requirement specification. 1-9
- Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao:

Energy analysis of multimedia video decoding on mobile handheld devices. 10-17 - Héctor Fernández-Fernández, Elías Palacios-González

, Vicente García-Díaz
, B. Cristina Pelayo García-Bustelo
, Oscar Sanjuán Martínez
, Juan Manuel Cueva Lovelle
:
SBPMN - An easier business process modeling notation for business users. 18-28 - Chao-Tung Yang

, Wen-Chung Shih
, Ching-Hsien Hsu:
On utilization of the grid computing technology for video conversion and 3D rendering. 29-37 - S. Venkatesan, Chenniappan Chellappan, P. Dhavachelvan:

Performance analysis of mobile agent failure recovery in e-service applications. 38-43 - Aikaterini-Maria Sourouni, Giorgos Kourlimpinis, Spiros Mouzakitis

, Dimitris Askounis:
Towards the government transformation: An ontology-based government knowledge repository. 44-53 - Shinfeng D. Lin, Shih-Chieh Shie, J. Y. Guo:

Improving the robustness of DCT-based image watermarking against JPEG compression. 54-60 - Ioannis Anagnostopoulos:

A capture-recapture sampling standardization for improving Internet meta-search. 61-70
Volume 32, Number 3, March 2010
- Linus Michaeli, Sergio Rapuano

:
Preface to the special issue on XV IMEKO TC-4 Symposium and XII International Workshop on ADC Modelling and Testing. 71-72 - Florin Sandu

, Iuliu Székely, Dan Robu, Alexandru Balica:
Performance measurement for mobile data streaming. 73-85 - Andrea Cataldo

, Luciano Tarricone
, M. Vallone, Giuseppe Cannazza, M. Cipressa:
TDR moisture measurements in granular materials: From the siliceous sand test case to the applications for agro-food industrial monitoring. 86-95 - Miguel Felizardo

, Raul Carneiro Martins
, T. A. Girard
:
Three dimensional passive acoustic spatial identification of nucleations in superheated droplet detectors. 96-100 - Romeo-Cristian Ciobanu, Radu-Florin Damian, Irinel Casian-Botez

:
Electromagnetic characterization of chiral auxetic metamaterials for EMC applications. 101-109 - Martin Novotný, Milos Sedlacek:

The influence of window sidelobes on DFT-based multifrequency signal measurement. 110-118 - Attilio Di Nisio

, Laura Fabbiano
, Nicola Giaquinto
, Mario Savino:
Maximum likelihood estimation for linearity testing of ADCs stimulated by known constant signals. 119-125 - Niclas Björsell, Magnus Isaksson

, Peter Händel
, Daniel Rönnow
:
Kautz-Volterra modelling of analogue-to-digital converters. 126-129 - Septimiu Crisan

, Ioan Gavril Tarnovan, Titus Eduard Crisan:
Radiation optimization and image processing algorithms in the identification of hand vein patterns. 130-140 - Pasquale Arpaia

, Mario Luca Bernardi
, Giuseppe A. Di Lucca
, Vitaliano Inglese, Giovanni Spiezia:
An Aspect-Oriented Programming-based approach to software development for fault detection in measurement systems. 141-152
Volume 32, Number 4, June 2010
- Daniel Mellado, Carlos Blanco

, Luis Enrique Sánchez
, Eduardo Fernández-Medina
:
A systematic review of security requirements engineering. 153-165 - Miguel A. Martínez, Joaquín Lasheras

, Eduardo Fernández-Medina
, José Ambrosio Toval Álvarez, Mario Piattini
:
A Personal Data Audit Method through Requirements Engineering. 166-178
- K. C. Morris:

A framework for XML schema naming and design rules development tools. 179-184 - Félix Gómez Mármol

, Gregorio Martínez Pérez
:
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. 185-196 - Wesam Darwish, Konstantin Beznosov:

Analysis of ANSI RBAC Support in COM+. 197-214 - Hui-Ching Hsieh, Jenq-Shiou Leu, Wei-Kuan Shih:

A fault-tolerant scheme for an autonomous local wireless sensor network. 215-221 - Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian

:
New impossible differential attacks on reduced-round Crypton. 222-227
Volume 32, Numbers 5-6, October 2010
- Bhavani Thuraisingham, Stefanos Gritzalis

:
Information and communications security, privacy and trust: Standards and regulations. 229 - José Luis Vivas, M. Carmen Fernández Gago

, Javier López
, Andrés Benjumea:
A security framework for a workflow-based grid development platform. 230-245 - Seokhee Lee, Antonio Savoldi, Kyoung Soo Lim, Jong Hyuk Park, Sangjin Lee:

A proposal for automating investigations in live forensics. 246-255 - José Luis Salazar, Joan Josep Piles, José Ruíz-Mas

, José María Moreno-Jiménez
:
Security approaches in e-cognocracy. 256-265 - Rafael Marín López, Yoshihiro Ohba

, Fernando Pereñíguez-Garcia
, Antonio Fernandez Gómez-Skarmeta
:
Analysis of Handover Key Management schemes under IETF perspective. 266-273 - Jiankun Hu

, Hsiao-Hwa Chen, Ting-Wei Hou:
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. 274-280 - Konstantinos Papapanagiotou, Giannis F. Marias, Panagiotis Georgiadis:

Revising centralized certificate validation standards for mobile and wireless communications. 281-287
- Hassina Meziane

, Salima Benbernou:
A dynamic privacy model for web services. 288-304 - Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim

, Dongho Won:
Towards trustworthy e-voting using paper receipts. 305-311 - Mário de Sousa

:
Proposed corrections to the IEC 61131-3 standard. 312-320 - Ronggong Song:

Advanced smart card based password authentication protocol. 321-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














