default search action
Computer Standards & Interfaces, Volume 42
Volume 42, November 2015
- Shing-Han Li, David C. Yen, Shih-Chih Chen, Patrick S. Chen, Wen-Hui Lu, Chien-Chuan Cho:
Effects of virtualization on information security. 1-8 - Stefano Rinaldi, Paolo Ferrari, Alessandra Flammini, Mattia Rizzi, Emiliano Sisinni, Angelo Vezzoli:
Performance analysis of power line communication in industrial power distribution network. 9-16 - Shih-I Cheng, Shih-Chih Chen, David C. Yen:
Continuance intention of E-portfolio system: A confirmatory and multigroup invariance analysis of technology acceptance model. 17-23 - Erik Paolo S. Capistrano, Jengchung Victor Chen:
Information privacy policies: The effects of policy characteristics and online experience. 24-31 - Fadillah Purnama Rezha, Oka Danil Saputra, Soo Young Shin:
Extending CAN bus with ISA100.11a wireless network. 32-41 - Jaime Solís Martínez, Jordán Pascual Espada, Natalia Garcia-Menendez, B. Cristina Pelayo García-Bustelo, Juan Manuel Cueva Lovelle:
VGPM: Using business process modeling for videogame modeling and code generation in multiple platforms. 42-52 - David Rodenas-Herraiz, Felipe García-Sánchez, Antonio-Javier García-Sánchez, Joan García-Haro:
On the influence of the hidden and exposed terminal problems on asynchronous IEEE 802.15.5 networks. 53-70 - Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally, Miguel Soriano:
Attribute-based authorization for structured Peer-to-Peer (P2P) networks. 71-83 - Miguel Ehécatl Morales-Trujillo, Hanna Oktaba, Mario Piattini:
The making of an OMG standard. 84-94 - Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Shared RFID ownership transfer protocols. 95-104 - Yuan Dong, Yue Wu:
Adaptive Cascade Deep Convolutional Neural Networks for face alignment. 105-112 - Michael James Scott, Fotios Spyridonis, Gheorghita Ghinea:
Designing for designers: Towards the development of accessible ICT products and services using the VERITAS framework. 113-124 - Arturo González-Ferrer, Mor Peleg:
Understanding requirements of clinical data standards for developing interoperable knowledge-based DSS: A case study. 125-136 - David C. Chou:
Cloud computing risk and audit issues. 137-142 - Orhan Dagdeviren, Kayhan Erciyes, Savio S. H. Tse:
Semi-asynchronous and distributed weighted connected dominating set algorithms for wireless sensor networks. 143-156 - Asanka Wasala, Jim Buckley, Reinhard Schäler, Chris Exton:
An empirical framework for evaluating interoperability of data exchange standards based on their actual usage: A case study on XLIFF. 157-170 - Ivan Cibrario Bertolotti, Luca Durante, Lucia Seno, Adriano Valenzano:
A twofold model for the analysis of access control policies in industrial networked systems. 171-181
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.