


Остановите войну!
for scientists:


default search action
Computer Standards & Interfaces, Volume 32
Volume 32, Numbers 1-2, January 2010
- Szilárd Jaskó
, Tibor Dulai, Dániel Muhi, Katalin Tarnay:
Test aspect of requirement specification. 1-9
- Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao:
Energy analysis of multimedia video decoding on mobile handheld devices. 10-17 - Héctor Fernández-Fernández, Elías Palacios-González
, Vicente García-Díaz
, B. Cristina Pelayo García-Bustelo, Oscar Sanjuán Martínez
, Juan Manuel Cueva Lovelle
:
SBPMN - An easier business process modeling notation for business users. 18-28 - Chao-Tung Yang
, Wen-Chung Shih
, Ching-Hsien Hsu:
On utilization of the grid computing technology for video conversion and 3D rendering. 29-37 - S. Venkatesan, Chenniappan Chellappan, P. Dhavachelvan:
Performance analysis of mobile agent failure recovery in e-service applications. 38-43 - Aikaterini-Maria Sourouni, Giorgos Kourlimpinis, Spiros Mouzakitis
, Dimitris Askounis:
Towards the government transformation: An ontology-based government knowledge repository. 44-53 - Shinfeng D. Lin, Shih-Chieh Shie, J. Y. Guo:
Improving the robustness of DCT-based image watermarking against JPEG compression. 54-60 - Ioannis Anagnostopoulos:
A capture-recapture sampling standardization for improving Internet meta-search. 61-70
Volume 32, Number 3, March 2010
- Linus Michaeli, Sergio Rapuano
:
Preface to the special issue on XV IMEKO TC-4 Symposium and XII International Workshop on ADC Modelling and Testing. 71-72 - Florin Sandu
, Iuliu Székely, Dan Robu, Alexandru Balica:
Performance measurement for mobile data streaming. 73-85 - Andrea Cataldo
, Luciano Tarricone
, M. Vallone, Giuseppe Cannazza, M. Cipressa:
TDR moisture measurements in granular materials: From the siliceous sand test case to the applications for agro-food industrial monitoring. 86-95 - Miguel Felizardo
, Raul Carneiro Martins
, T. A. Girard
:
Three dimensional passive acoustic spatial identification of nucleations in superheated droplet detectors. 96-100 - Romeo-Cristian Ciobanu, Radu-Florin Damian, Irinel Casian-Botez
:
Electromagnetic characterization of chiral auxetic metamaterials for EMC applications. 101-109 - Martin Novotný, Milos Sedlacek:
The influence of window sidelobes on DFT-based multifrequency signal measurement. 110-118 - Attilio Di Nisio
, Laura Fabbiano
, Nicola Giaquinto
, Mario Savino:
Maximum likelihood estimation for linearity testing of ADCs stimulated by known constant signals. 119-125 - Niclas Björsell, Magnus Isaksson, Peter Händel
, Daniel Rönnow
:
Kautz-Volterra modelling of analogue-to-digital converters. 126-129 - Septimiu Crisan
, Ioan Gavril Tarnovan, Titus Eduard Crisan:
Radiation optimization and image processing algorithms in the identification of hand vein patterns. 130-140 - Pasquale Arpaia
, Mario Luca Bernardi
, Giuseppe A. Di Lucca
, Vitaliano Inglese, Giovanni Spiezia:
An Aspect-Oriented Programming-based approach to software development for fault detection in measurement systems. 141-152
Volume 32, Number 4, June 2010
- Daniel Mellado, Carlos Blanco
, Luís Enrique Sanchez, Eduardo Fernández-Medina
:
A systematic review of security requirements engineering. 153-165 - Miguel A. Martínez, Joaquín Lasheras, Eduardo Fernández-Medina
, José Ambrosio Toval Álvarez, Mario Piattini
:
A Personal Data Audit Method through Requirements Engineering. 166-178
- K. C. Morris:
A framework for XML schema naming and design rules development tools. 179-184 - Félix Gómez Mármol
, Gregorio Martínez Pérez
:
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. 185-196 - Wesam Darwish, Konstantin Beznosov:
Analysis of ANSI RBAC Support in COM+. 197-214 - Hui-Ching Hsieh, Jenq-Shiou Leu, Wei-Kuan Shih:
A fault-tolerant scheme for an autonomous local wireless sensor network. 215-221 - Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian
:
New impossible differential attacks on reduced-round Crypton. 222-227
Volume 32, Numbers 5-6, October 2010
- Bhavani Thuraisingham, Stefanos Gritzalis
:
Information and communications security, privacy and trust: Standards and regulations. 229 - José Luis Vivas, M. Carmen Fernández Gago, Javier López
, Andrés Benjumea:
A security framework for a workflow-based grid development platform. 230-245 - Seokhee Lee, Antonio Savoldi, Kyoung Soo Lim, Jong Hyuk Park, Sangjin Lee:
A proposal for automating investigations in live forensics. 246-255 - José Luis Salazar, Joan Josep Piles, José Ruíz-Mas, José María Moreno-Jiménez
:
Security approaches in e-cognocracy. 256-265 - Rafael Marín López, Yoshihiro Ohba
, Fernando Pereñíguez-Garcia
, Antonio Fernandez Gómez-Skarmeta
:
Analysis of Handover Key Management schemes under IETF perspective. 266-273 - Jiankun Hu
, Hsiao-Hwa Chen, Ting-Wei Hou:
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. 274-280 - Konstantinos Papapanagiotou, Giannis F. Marias, Panagiotis Georgiadis:
Revising centralized certificate validation standards for mobile and wireless communications. 281-287
- Hassina Meziane
, Salima Benbernou:
A dynamic privacy model for web services. 288-304 - Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim
, Dongho Won:
Towards trustworthy e-voting using paper receipts. 305-311 - Mário de Sousa
:
Proposed corrections to the IEC 61131-3 standard. 312-320 - Ronggong Song:
Advanced smart card based password authentication protocol. 321-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.