![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Standards & Interfaces, Volume 42
Volume 42, November 2015
- Shing-Han Li, David C. Yen
, Shih-Chih Chen
, Patrick S. Chen, Wen-Hui Lu, Chien-Chuan Cho:
Effects of virtualization on information security. 1-8 - Stefano Rinaldi
, Paolo Ferrari, Alessandra Flammini
, Mattia Rizzi
, Emiliano Sisinni
, Angelo Vezzoli:
Performance analysis of power line communication in industrial power distribution network. 9-16 - Shih-I Cheng, Shih-Chih Chen, David C. Yen
:
Continuance intention of E-portfolio system: A confirmatory and multigroup invariance analysis of technology acceptance model. 17-23 - Erik Paolo S. Capistrano
, Jengchung Victor Chen
:
Information privacy policies: The effects of policy characteristics and online experience. 24-31 - Fadillah Purnama Rezha, Oka Danil Saputra, Soo Young Shin
:
Extending CAN bus with ISA100.11a wireless network. 32-41 - Jaime Solís Martínez, Jordán Pascual Espada
, Natalia Garcia-Menendez, B. Cristina Pelayo García-Bustelo
, Juan Manuel Cueva Lovelle:
VGPM: Using business process modeling for videogame modeling and code generation in multiple platforms. 42-52 - David Rodenas-Herraiz, Felipe García-Sánchez, Antonio-Javier García-Sánchez
, Joan García-Haro:
On the influence of the hidden and exposed terminal problems on asynchronous IEEE 802.15.5 networks. 53-70 - Diego Suarez Touceda
, José María Sierra Camara, Sherali Zeadally, Miguel Soriano
:
Attribute-based authorization for structured Peer-to-Peer (P2P) networks. 71-83 - Miguel Ehécatl Morales-Trujillo, Hanna Oktaba
, Mario Piattini
:
The making of an OMG standard. 84-94 - Nan Li
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Shared RFID ownership transfer protocols. 95-104 - Yuan Dong, Yue Wu:
Adaptive Cascade Deep Convolutional Neural Networks for face alignment. 105-112 - Michael James Scott
, Fotios Spyridonis
, Gheorghita Ghinea
:
Designing for designers: Towards the development of accessible ICT products and services using the VERITAS framework. 113-124 - Arturo González-Ferrer
, Mor Peleg
:
Understanding requirements of clinical data standards for developing interoperable knowledge-based DSS: A case study. 125-136 - David C. Chou:
Cloud computing risk and audit issues. 137-142 - Orhan Dagdeviren
, Kayhan Erciyes, Savio S. H. Tse:
Semi-asynchronous and distributed weighted connected dominating set algorithms for wireless sensor networks. 143-156 - Asanka Wasala, Jim Buckley
, Reinhard Schäler, Chris Exton:
An empirical framework for evaluating interoperability of data exchange standards based on their actual usage: A case study on XLIFF. 157-170 - Ivan Cibrario Bertolotti, Luca Durante
, Lucia Seno, Adriano Valenzano:
A twofold model for the analysis of access control policies in industrial networked systems. 171-181
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.