


default search action
Computer Standards & Interfaces, Volume 33
Volume 33, Number 1, January 2011
- Barbara Carminati

, Bhavani Thuraisingham:
Introduction to secure Semantic Web. 1 - Palanivel A. Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi

, Tim Finin
:
Enforcing security in semantics driven policy based networks. 2-12 - Anna Cinzia Squicciarini

, Federica Paci
, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. 13-23 - William M. Fitzgerald, Simon N. Foley

:
Aligning Semantic Web applications with network access controls. 24-34 - Ashraful Alam, Latifur Khan

, Bhavani Thuraisingham:
Geospatial Resource Description Framework (GRDF) and security constructs. 35-41 - Ángel García-Crespo, Juan Miguel Gómez-Berbís, Ricardo Colomo-Palacios

, Giner Alor-Hernández
:
SecurOntology: A semantic web access control framework. 42-49
- Chin-Shan Wu, Fei-Fei Cheng

, David C. Yen
, Yu-Wen Huang:
User acceptance of wireless technology in organizations: A comparison of alternative models. 50-58 - Xiangyang Wang, Yong-Jian Yu, Hong-Ying Yang:

An effective image retrieval scheme using color, texture and shape features. 59-68 - Carlos Cares

, Xavier Franch
, Anna Perini, Angelo Susi:
Towards interoperability of i* models using iStarML. 69-79 - Lukasz Cyra, Janusz Górski

:
SCF - A framework supporting achieving and assessing conformity with standards. 80-95 - Peng Liu, Meng Yu:

Damage assessment and repair in attack resilient distributed database systems. 96-107 - Qasem A. Al-Radaideh

, Kamal H. Masri:
Improving mobile multi-tap text entry for Arabic language. 108-113
Volume 33, Number 2, February 2011
- Marcantonio Catelani

, Sergio Rapuano
:
Preface to the special issue on XVI IMEKO TC-4 symposium and XIII international workshop on ADC modelling and testing. 115-116
- Dusan Agrez:

Estimation of parameters of the weakly damped sinusoidal signals in the frequency domain. 117-121 - Jerome J. Blair:

Filtering error estimates and order of accuracy via the Peano Kernel Theorem. 122-127 - Giulia Rabottino, Arianna Mencattini

, Marcello Salmeri, Federica Caselli
, Roberto Lojacono:
Performance evaluation of a region growing procedure for mammographic breast lesion identification. 128-135 - Takao Sugimoto, Akinobu Tohshima:

Estimation method for the consciousness level while driving vehicles. 136-141 - Apostolos P. Psyllos, Christos-Nikolaos Anagnostopoulos

, Eleftherios Kayafas:
Vehicle model recognition from frontal view image measurements. 142-151 - Marcantonio Catelani

, Lorenzo Ciani
, Valeria L. Scarano, Alessandro Bacioccola:
Software automated testing: A solution to maximize the test plan coverage and to increase software reliability and quality in use. 152-158 - Alexandre Bounouh, Henri Camon, Denis Bélières, F. Blard, François Ziade:

MEMS AC voltage reference for miniaturized instrumentation and metrology. 159-164 - Antonio Raffo

, Valeria Vadalà
, Pier Andrea Traverso
, Alberto Santarelli
, Giorgio Vannini
, Fabio Filicori
:
A dual-source nonlinear measurement system oriented to the empirical characterization of low-frequency dispersion in microwave electron devices. 165-175 - Andrea Carta, Nicola Locci, Carlo Muscas, Fabio Pinna, Sara Sulis

:
GPS and IEEE 1588 synchronization for the measurement of synchrophasors in electric power systems. 176-181 - Tomasz Tarasiuk

, Mariusz Szweda:
DSP instrument for transient monitoring. 182-190 - Octavian Adrian Postolache

, Helena Maria Geirinhas Ramos
, A. Lopes Ribeiro
:
Detection and characterization of defects using GMR probes and artificial neural networks. 191-200 - Giovanni Betta

, Domenico Capriglione
, Carlo F. M. Carobbi
, Marco Donald Migliore
:
The accurate calibration of EMC antennas in compact chambers - Measurements and uncertainty evaluations. 201-205
Volume 33, Number 3, March 2011
- Tomás Sánchez López:

RFID and sensor integration standards: State and future prospects. 207-213
- Mohammad Farhan Husain, Tahseen Al-Khateeb, Mohmmad Alam, Latifur Khan

:
Ontology based policy interoperability in geo-spatial domain. 214-219 - Chunlin Li, Layuan Li:

An economics-based negotiation scheme among mobile devices in mobile grid. 220-231 - Ruey-Fong Chang, Chen-Wei Chang, Kuo-Hsiung Tseng, Cheng-Lun Chiang, Wen-Shiow Kao, Wen-Jang Chen:

Structural planning and implementation of a microprocessor-based human-machine interface in a steam-explosion process application. 232-248 - Ricardo de Moraes

, Francisco Borges Carreiro, Paulo Bartolomeu
, Valter Filipe Silva
, José Alberto Fonseca, Francisco Vasques
:
Enforcing the timing behavior of real-time stations in legacy bus-based industrial Ethernet networks. 249-261 - Jengchung V. Chen

, David C. Yen
, T. M. Rajkumar, Nathan A. Tomochko:
The antecedent factors on trust and commitment in supply chain relationships. 262-270 - Min-Xiou Chen, Tze-Chin Tzeng:

Integrating service discovery technologies in OSGi platform. 271-279 - Kuen-Fang Jea, Tsui-Ping Chang, Chia-Wen Cheng:

A generic simulation model for evaluating concurrency control protocols in native XML database systems. 280-291 - Parvathi Chundi, Tai Xin, Indrakshi Ray:

When does a workflow complete? 292-300 - Giorgos Karopoulos, Georgios Kambourakis

, Stefanos Gritzalis
:
PrivaSIP: Ad-hoc identity privacy in SIP. 301-314 - Gergely Hományi, Lóránt Farkas, Kristóf Aczél:

Distributed audio recorder using smart phones and proximity connections. 315-324 - Ahmed Patel, Nikita Schmidt:

Application of structured document parsing to focused web crawling. 325-331 - LinYuan Liu, Haibin Zhu

, Zhiqiu Huang, Dongqing Xie:
Minimal privacy authorization in web services collaboration. 332-343 - Marc Ciurana, Francisco Barceló-Arroyo, Israel Martín-Escalona

:
Comparative performance evaluation of IEEE 802.11v for positioning with time of arrival. 344-349 - David C. Chou, Amy Y. Chou:

Innovation outsourcing: Risks and quality issues. 350-356
Volume 33, Number 4, June 2011
- Dong-Sung Kim

, SeungKi Lee:
Feasibility analysis of hybrid control networks based on common industrial protocol. 357-366 - Shang-Kuan Chen:

A module-based LSB substitution method with lossless secret data compression. 367-371 - Carlos Blanco

, Joaquín Lasheras
, Eduardo Fernández-Medina
, Rafael Valencia-García
, José Ambrosio Toval Álvarez:
Basis for an integrated security ontology according to a systematic review of existing proposals. 372-388 - Lubomir Riha

, Radislav Smid
:
Acceleration of acoustic emission signal processing algorithms using CUDA standard. 389-400 - Kemal Bicakci

, Hakan Gultekin
, Bülent Tavli
, Ibrahim Ethem Bagci
:
Maximizing lifetime of event-unobservable wireless sensor networks. 401-410 - Antonia Stefani

, Michalis Nik Xenos:
Weight-modeling of B2C system quality. 411-421 - Kuanchin Chen

, Jengchung V. Chen
, David C. Yen
:
Dimensions of self-efficacy in the study of smart phone acceptance. 422-431 - Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju:

Threshold signature schemes for ElGamal variants. 432-437
Volume 33, Number 5, September 2011
- Dong Chan An, Seog Park:

Efficient access control labeling scheme for secure XML query processing. 439-447
- Ö. Özgür Tanriöver

, Semih Bilgen:
A framework for reviewing domain specific conceptual models. 448-464 - Stefano Vitturi

, Luca Peretti, Lucia Seno, Mauro Zigliotto
, Claudio Zunino:
Real-time Ethernet networks for motion control. 465-476 - Ching-Chiuan Lin:

An information hiding scheme with minimal image distortion. 477-484 - Serena Coetzee

:
Results from a normative dependency analysis of geographic information standards. 485-493 - Rafael Marín López, Fernando Pereñíguez-Garcia

, Gabriel López, Alejandro Pérez-Méndez:
Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations. 494-504 - Lijie Chen, Zhen-yu Shan, Tao Tang, Hong-jie Liu:

Performance analysis and verification of safety communication protocol in train control system. 505-518
Volume 33, Number 6, November 2011
- Ricardo Pérez-Castillo

, Ignacio García Rodríguez de Guzmán
, Mario Piattini
:
Knowledge Discovery Metamodel-ISO/IEC 19506: A standard to modernize legacy systems. 519-532 - Jianyong Chen, Guihua Wu, Zhen Ji:

Secure interoperation of identity managements among different circles of trust. 533-540 - Yaoyao Fiona Zhao

, Xun Xu
, Tom Kramer, Frederick M. Proctor, John Horst:
Dimensional metrology interoperability and standardization in manufacturing systems. 541-555 - Antonio de la Oliva

, Ignacio Soto
, Albert Banchs, Johannes Lessmann, Christian Niephaus, Telemaco Melia:
IEEE 802.21: Media independence beyond handover. 556-564 - Tokihiro Fukatsu, Takuji Kiura, Masayuki Hirafuji:

A web-based sensor network system with distributed data processing approach via web application. 565-573 - José M. Gutiérrez López, Tahir M. Riaz, Jens Myrup Pedersen

, Ahmed Patel, Ole Brun Madsen:
Analytical model based on green criteria for optical backbone network interconnection. 574-586

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














