


default search action
Computer Standards & Interfaces, Volume 44
Volume 44, February 2016
- Zivadin Micic, Marija D. Blagojevic

:
Knowledge acquisition in information technology and software engineering towards excellence of information systems based on the standardisation platform. 1-17 - Xiao-Long Liu

, Ruey-Kai Sheu, Shyan-Ming Yuan
, Yu-Ning Wang:
A file-deduplicated private cloud storage service with CDMI standard. 18-27 - Pedro Paulo F. Barcelos

, Cássio Chaves Reginato, Maxwell E. Monteiro, Anilton S. Garcia:
On the importance of truly ontological distinctions for standardizations: A case study in the domain of telecommunications. 28-41 - Victor R. L. Shen, Yu-Ying Wang, Li-Ya Yu:

A novel blood pressure verification system for home care. 42-53 - Ali Seyfi, Ahmed Patel, Joaquim Celestino Júnior:

Empirical evaluation of the link and content-based focused Treasure-Crawler. 54-62 - Pejman Salehi

, Abdelwahab Hamou-Lhadj
, Maria Toeroe, Ferhat Khendek
:
A UML-based domain specific modeling language for service availability management: Design and experience. 63-83
- Hsing-Chung Chen

, Ilsun You, Chien-Erh Weng, Chia-Hsin Cheng, Yung-Fa Huang
:
A security gateway application for End-to-End M2M communications. 85-93 - Xin Liu, Yao Wang, Dehai Zhao, Weishan Zhang

, Leyi Shi:
Patching by automatically tending to hub nodes based on social trust. 94-101 - Nan Shen, Jun Yang, Ke Yuan, Chuan Fu, Chunfu Jia:

An efficient and privacy-preserving location sharing mechanism. 102-109 - Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaofeng Chen:

Design and analysis of secure mechanisms based on tripartite credibility for RFID systems. 110-116 - Yijun Mao, Jin Li, Min-Rong Chen, Jia-Nan Liu

, Congge Xie, Yiju Zhan:
Fully secure fuzzy identity-based encryption for secure IoT communications. 117-121 - Jorge Miguel

, Santi Caballé
, Fatos Xhafa, Josep Prieto
, Leonard Barolli:
A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning. 122-136 - Kyungroul Lee, Hyeungjun Yeuk, Jaein Kim, Hyungjoon Park, Kangbin Yim:

An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers. 137-143 - Chien-Erh Weng, Hsing-Chung Chen:

The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs. 144-149 - Admir Barolli, Vincenzo Loia, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa

:
Interface and results visualization of WMN-GA simulation system: Evaluation for Exponential and Weibull distributions considering different transmission rates. 150-158 - Alba Amato

, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque
:
Design and evaluation of P2P overlays for energy negotiation in smart micro-grid. 159-168 - Jung Hoon Park, Jin Bae Park:

A novel approach to the low cost real time eye mouse. 169-176
- David Martín, Carlos Lamsfus, Aurkene Alzua-Sorzabal

:
A cloud-based platform to develop context-aware mobile applications by domain experts. 177-184 - María del Carmen Rodríguez-Hernández

, Sergio Ilarri
:
Pull-based recommendations in mobile environments. 185-204 - Gebremariam Mesfin

, Tor-Morten Grønli
, Dida Midekso, Gheorghita Ghinea
:
Towards end-user development of REST client applications on smartphones. 205-219 - Mehdi Bentounsi, Salima Benbernou, Mikhail J. Atallah:

Security-aware Business Process as a Service by hiding provenance. 220-233 - Pedro Rodríguez, Álvaro Alonso

, Joaquín Salvachúa
, Javier Cerviño:
Materialising a new architecture for a distributed MCU in the Cloud. 234-242 - Kais Mekki, William Derigent, Ahmed Zouinkhi

, Eric Rondeau, André Thomas, Mohamed Naceur Abdelkrim
:
Non-localized and localized data storage in large-scale communicating materials: Probabilistic and hop-counter approaches. 243-257 - Pinar Kirci, Hakima Chaouchi:

Recursive and ad hoc routing based localization in wireless sensor networks. 258-263 - Akli Abbas

, Malik Loudini, Emmanuel Grolleau, Driss Mehdi, Walid-Khaled Hidouci:
A real-time feedback scheduler for environmental energy with discrete voltage/frequency modes. 264-273 - Pablo Adasme

, Janny Leung
, Abdel Lisser
:
Resource allocation in uplink wireless multi-cell OFDMA networks. 274-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














