Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tsa/tsa2014.bht:"
@inproceedings{DBLP:conf/tsa/AddoAC14, author = {Ivor D. Addo and Sheikh Iqbal Ahamed and William Cheng{-}Chung Chu}, title = {A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {14--21}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.12}, doi = {10.1109/TSA.2014.12}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/tsa/AddoAC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/ChenCHC14, author = {Yean{-}Ru Chen and Sao{-}Jie Chen and Pao{-}Ann Hsiung and I{-}Hsin Chou}, title = {Unified Security and Safety Risk Assessment - {A} Case Study on Nuclear Power Plant}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {22--28}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.13}, doi = {10.1109/TSA.2014.13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/ChenCHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/ChenLL14, author = {Chia{-}Mei Chen and Je{-}Ming Lin and Gu Hsin Lai}, title = {Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.10}, doi = {10.1109/TSA.2014.10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/ChenLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/ChiangCTY14, author = {Chuan{-}Yen Chiang and Yen{-}Lin Chen and Pei{-}Shiun Tsai and Shyan{-}Ming Yuan}, title = {A Video Conferencing System Based on WebRTC for Seniors}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {51--56}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.17}, doi = {10.1109/TSA.2014.17}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/ChiangCTY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/ChuYLCHHH14, author = {William Cheng{-}Chung Chu and Chao{-}Tung Yang and Chih{-}Wei Lu and Chih{-}Hung Chang and Nien{-}Lin Hsueh and Tse{-}Chuan Hsu and Stephen Hung}, title = {An Approach of Quality of Service Assurance for Enterprise Cloud Computing (QoSAECC)}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {7--13}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.11}, doi = {10.1109/TSA.2014.11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsa/ChuYLCHHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/GuoHLH14, author = {Jhe{-}Jyun Guo and Nien{-}Lin Hsueh and Wen{-}Tin Lee and Shi{-}Chuen Hwang}, title = {Improving Software Maintenance for Pattern-Based Software Development: {A} Comment Refactoring Approach}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {75--79}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.21}, doi = {10.1109/TSA.2014.21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/GuoHLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/HsuCL14, author = {Tse{-}Chuan Hsu and Dong{-}Meau Chang and Hsin{-}Jan Lee}, title = {The Study of Application and Evaluation with NoSQL Databases in Cloud Computing}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {57--62}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.18}, doi = {10.1109/TSA.2014.18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/HsuCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/LakkarajuX14, author = {Sandeep Lakkaraju and Dianxiang Xu}, title = {Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {36--43}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.15}, doi = {10.1109/TSA.2014.15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/LakkarajuX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/LeeWG14, author = {Shou{-}Yu Lee and W. Eric Wong and Ruizhi Gao}, title = {Software Safety Standards: Evolution and Lessons Learned}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {44--50}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.16}, doi = {10.1109/TSA.2014.16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/LeeWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/TsaiHW14, author = {Yao{-}Hong Tsai and Hsiao{-}Ping Huang and Hui Rong Wu}, title = {Security Management of Authentication System Based on Dynamic Biometric Features}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {63--68}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.19}, doi = {10.1109/TSA.2014.19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/TsaiHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/WangY14, author = {Liang Wang and Li Yao}, title = {An Interactive Software Used in Conferences or Classes Based on the Service Oriented Architecture}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {80--83}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.22}, doi = {10.1109/TSA.2014.22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/WangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/WuHC14, author = {Geng{-}Hao Wu and Nien{-}Lin Hsueh and Chih{-}Hung Chang}, title = {A Framework for Questionnaire-Based Healthcare Application Development}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {29--35}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.14}, doi = {10.1109/TSA.2014.14}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsa/WuHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsa/YangHWC14, author = {Chyuan{-}Huei Thomas Yang and Yen Ting Hsu and Chien{-}Cheng Wu and Jun{-}Wei Chang}, title = {Reversible Data Hiding Method Based on Exclusive-Or with Two Host Images}, booktitle = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, pages = {69--74}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/TSA.2014.20}, doi = {10.1109/TSA.2014.20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/YangHWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tsa/2014, title = {2014 International Conference on Trustworthy Systems and their Applications, {TSA} 2014, Taichung, Taiwan, June 9-10, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6955702/proceeding}, isbn = {978-1-4799-6565-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsa/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.