


default search action
Computer Standards & Interfaces, Volume 42
Volume 42, November 2015
- Shing-Han Li, David C. Yen

, Shih-Chih Chen
, Patrick S. Chen, Wen-Hui Lu, Chien-Chuan Cho:
Effects of virtualization on information security. 1-8 - Stefano Rinaldi

, Paolo Ferrari, Alessandra Flammini
, Mattia Rizzi
, Emiliano Sisinni
, Angelo Vezzoli:
Performance analysis of power line communication in industrial power distribution network. 9-16 - Shih-I Cheng, Shih-Chih Chen, David C. Yen

:
Continuance intention of E-portfolio system: A confirmatory and multigroup invariance analysis of technology acceptance model. 17-23 - Erik Paolo S. Capistrano

, Jengchung Victor Chen
:
Information privacy policies: The effects of policy characteristics and online experience. 24-31 - Fadillah Purnama Rezha, Oka Danil Saputra, Soo Young Shin

:
Extending CAN bus with ISA100.11a wireless network. 32-41 - Jaime Solís Martínez, Jordán Pascual Espada

, Natalia Garcia-Menendez, B. Cristina Pelayo García-Bustelo
, Juan Manuel Cueva Lovelle:
VGPM: Using business process modeling for videogame modeling and code generation in multiple platforms. 42-52 - David Rodenas-Herraiz, Felipe García-Sánchez, Antonio-Javier García-Sánchez

, Joan García-Haro:
On the influence of the hidden and exposed terminal problems on asynchronous IEEE 802.15.5 networks. 53-70 - Diego Suarez Touceda

, José María Sierra Camara
, Sherali Zeadally, Miguel Soriano
:
Attribute-based authorization for structured Peer-to-Peer (P2P) networks. 71-83 - Miguel Ehécatl Morales-Trujillo, Hanna Oktaba

, Mario Piattini
:
The making of an OMG standard. 84-94 - Nan Li

, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Shared RFID ownership transfer protocols. 95-104 - Yuan Dong, Yue Wu:

Adaptive Cascade Deep Convolutional Neural Networks for face alignment. 105-112 - Michael James Scott

, Fotios Spyridonis
, Gheorghita Ghinea
:
Designing for designers: Towards the development of accessible ICT products and services using the VERITAS framework. 113-124 - Arturo González-Ferrer

, Mor Peleg
:
Understanding requirements of clinical data standards for developing interoperable knowledge-based DSS: A case study. 125-136 - David C. Chou:

Cloud computing risk and audit issues. 137-142 - Orhan Dagdeviren

, Kayhan Erciyes, Savio S. H. Tse:
Semi-asynchronous and distributed weighted connected dominating set algorithms for wireless sensor networks. 143-156 - Asanka Wasala, Jim Buckley

, Reinhard Schäler, Chris Exton:
An empirical framework for evaluating interoperability of data exchange standards based on their actual usage: A case study on XLIFF. 157-170 - Ivan Cibrario Bertolotti, Luca Durante

, Lucia Seno, Adriano Valenzano:
A twofold model for the analysis of access control policies in industrial networked systems. 171-181

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














