


default search action
Computer Standards & Interfaces, Volume 36
Volume 36, Number 1, November 2013
- Ricardo Colomo-Palacios

, Richard Messnarz
, Miklós Biró
:
Systems, software and services process improvement. 1-2 - Gilbert Regan

, Fergal McCaffery
, Kevin McDaid, Derek Flood:
Medical device standards' requirements for traceability during the software development lifecycle and implementation of a traceability assessment model. 3-9 - Luigi Buglione, Christiane Gresse von Wangenheim

, Fergal McCaffery, Jean Carlo Rossa Hauck:
The LEGO strategy: Guidelines for a profitable deployment. 10-20 - Fritz Stallinger

, Robert Neumann:
Enhancing ISO/IEC 15288 with reuse and product management: An add-on process reference model. 21-32 - Javier García Guzmán, Alvaro Fernández del Carpio, Antonio de Amescua Seco

, Manuel Velasco
:
A process reference model for managing living labs for ICT innovation: A proposal based on ISO/IEC 15504. 33-41 - Magdalena Arcilla, José A. Calvo-Manzano

, Tomás San Feliu Gilabert
:
Building an IT service catalog in a small company as the main input for the IT financial management. 42-53 - Andressa Ianzen, Everson Carlos Mauda, Marco Antônio Paludo, Sheila S. Reinehr

, Andreia Malucelli:
Software process improvement in a financial organization: An action research approach. 54-65
- Xiaonan Wang, Huanyan Qian:

Mobility management solution for IPv6-based vehicular networks. 66-75 - Tapio Levä, Henna Suomi:

Techno-economic feasibility analysis of Internet protocols: Framework and tools. 76-88 - Chih-Hsuan Wang, Chih-Wen Shih

:
Integrating conjoint analysis with quality function deployment to carry out customer-driven concept development for ultrabooks. 89-96 - Darren Clowes, Ray Dawson, Steve G. Probets:

Extending document models to incorporate semantic information for complex standards. 97-109 - Jose M. Lopez-Vega, Gonzalo Camarillo, Javier Povedano-Molina, Juan M. López-Soler

:
RELOAD extension for data discovery and transfer in data-centric publish-subscribe environments. 110-121 - Lain-Chyr Hwang:

M-GREEN: An active queue management mechanism for multi-QoS classes. 122-131 - Sibel Tariyan Özyer, Bülent Tavli

, Kayhan Dursun, Murat Koyuncu
:
Systematic investigation of the effects of unidirectional links on the lifetime of wireless sensor networks. 132-142 - Peter Pocta

, Jan Holub
:
Effect of speech activity parameter on PESQ's predictions in presence of independent and dependent losses. 143-153 - K. Jayashree

, Sheila Anand:
Web Service Diagnoser Model for managing faults in web services. 154-164 - Salvatore Cavalieri

, Ferdinando Chiacchio:
Analysis of OPC UA performances. 165-177 - Ángel del Blanco, Eugenio J. Marchiori, Javier Torrente, Iván Martínez-Ortiz, Baltasar Fernández-Manjón

:
Using e-learning standards in educational video games. 178-187 - Carolina Tripp Barba, Luis Urquiza-Aguiar

, Mónica Aguilar-Igartua
, Javier Parra-Arnau, David Rebollo-Monedero
, Jordi Forné
, Esteve Pallarès
:
A collaborative protocol for anonymous reporting in vehicular ad hoc networks. 188-197 - Javier Matanza

, Sadot Alexandres, Carlos Rodríguez-Morcillo
:
Performance evaluation of two narrowband PLC systems: PRIME and G3. 198-208 - Chien-Cheng Lin, Chen-Liang Fang, Deron Liang:

A portable interceptor mechanism for SOAP frameworks. 209-218 - Xinxin Liu, Shaohua Tang, Qiong Huang, Zhiwen Yu:

An ontology-based approach to automated trust negotiation. 219-230 - Zivadin Micic, Milos Micic

, Marija D. Blagojevic
:
ICT innovations at the platform of standardisation for knowledge quality in PDCA. 231-243
- Pedro Tomás

, M. José Escalona
, Manuel Mejías
:
Open source tools for measuring the Internal Quality of Java software products. A survey. 244-255 - Sandi Pohorec, Milan Zorman, Peter Kokol

:
Analysis of approaches to structured data on the web. 256-262
Volume 36, Number 2, February 2014
- Aqeel-ur Rehman, Abu Zafar Abbasi, Noman Islam

, Zubair Ahmed Shaikh:
A review of wireless sensors and networks' applications in agriculture. 263-270 - Kuanglin Chao, Moon S. Kim, Diane E. Chan:

Control interface and tracking control system for automated poultry inspection. 271-277 - Zhen Li, Ning Wang, Aaron Franzen, Peyman Taher, Chad Godsey, Hailin Zhang

, Xiaolin Li:
Practical deployment of an in-field soil property wireless sensor network. 278-287 - Young-Duk Kim, Yeon-Mo Yang

, Won-Seok Kang
, Dongkyun Kim:
On the design of beacon based wireless sensor network for agricultural emergency monitoring systems. 288-299 - Federico Barrero

, Jean A. Guevara
, Enrique A. Vargas Cabral
, Sergio L. Toral Marín
, Manuel Vargas
:
Networked transducers in intelligent transportation systems based on the IEEE 1451 standard. 300-311 - Jun-Ming Su, Chih-Fang Huang:

An easy-to-use 3D visualization system for planning context-aware applications in smart buildings. 312-326 - Wei Chen, Zhibo Tang, Xiaorong Jiang, Qichong Tian, Jing Gao, Tongfeng Sun, Renke Sun, Ming Zhao:

Design and implementation of monitoring and management system based on wireless sensor network hop estimation with the moving target Kalman prediction and Greedy-Vip. 327-334
- Àngels Rius, Jordi Conesa

, Elena García-Barriocanal, Miguel-Ángel Sicilia
:
Automating educational processes implementation by means of an ontological framework. 335-348 - Hwanyong Lee

, Nakhoon Baek
:
Simultaneously accelerating OpenVG and SVG tiny with multimedia hardware. 349-353 - Patricia Miravet, Francisco Ortin

, Ignacio Marín, Abel Rionda:
Using standards to build the DIMAG connected mobile applications framework. 354-367 - Min-Xiou Chen, Bing-Yang Lin:

Location service and session mobility for streaming media applications in home networks. 368-379 - Manuel Caeiro

, Martín Llamas Nistal
, Luis E. Anido-Rifón
:
PoEML: Modeling learning units through perspectives. 380-396 - Hsiu-lien Yeh, Tien-Ho Chen, Wei-Kuan Shih:

Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography. 397-402 - Brijesh Kumar Chaurasia

, Shekhar Verma
:
Secure pay while on move toll collection using VANET. 403-411 - Chae Sub Lee, Gyu Myoung Lee, Woo-Seop Rhee:

Smart Ubiquitous Networks for future telecommunication environments. 412-422 - Zivadin Micic, Marija D. Blagojevic

, Milos Micic
:
Innovation and knowledge trends through standardisation of IT applications. 423-434
Volume 36, Number 3, March 2014
- Georgios Kambourakis

, Fernando Pereñíguez-Garcia
, Peter Mueller, Tom Karygiannis:
Secure mobility in future communication systems under standardization. 435-437 - Ginés Dólera Tormo, Félix Gómez Mármol

, Gregorio Martínez Pérez:
Towards the integration of reputation management in OpenID. 438-453 - Lihong Guo, Jian Wang, He Du:

XML privacy protection model based on cloud storage. 454-464 - Nerea Toledo

, Marivi Higuero
, Maider Huarte, Jon Matías, Eduardo Jacob
, Juan José Unzilla
:
A proposal to contribute to ITS standardization activity: A valuable network mobility management approach. 465-479 - Peng Xiao, Jingsha He

, Yingfang Fu:
An access authentication protocol for trusted handoff in wireless mesh networks. 480-488 - Bruno Faria, Jouni Korhonen, Eduardo Souto:

A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling. 489-500 - Cristina Alcaraz

, Javier López
:
Diagnosis mechanism for accurate monitoring in critical infrastructure protection. 501-512 - Carlos Gañán

, Jose L. Muñoz
, Oscar Esparza
, Jorge Mata-Díaz, Juanjo Alins:
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks. 513-523 - Stephen M. Dye, Karen Scarfone

:
A standard for developing secure mobile applications. 524-530
- Isidro Calvo

, Luís Almeida
, Adrián Noguero, Federico Pérez
, Marga Marcos
:
A flexible time-triggered service for real-time CORBA. 531-544 - Cristina López-Vargas

, Jose L. Salmeron
:
Modeling maintenance projects risk effects on ERP performance. 545-553 - Yuan Dong, Chong Huang, Wei Liu:

RankCNN: When learning to rank encounters the pseudo preference feedback. 554-562 - Brian Henderson-Sellers, Cesar Gonzalez-Perez

, Tom McBride, Graham Low:
An ontology for ISO software engineering standards: 1) Creating the infrastructure. 563-576 - Chien-Lung Hsu, Yu-Li Lin:

Improved migration for mobile computing in distributed networks. 577-584 - Faruk Aktas

, Celal Çeken
, Kadir Erkan
:
WNCSbed: A WSAN Based Testbed for Networked Control Systems. 585-591 - Heikki Pakkala

, Tue Christensen
, Karl Presser, I. Martínez de Victoria:
Towards harmonized data interchange in food consumption data. 592-597 - Dirk van der Linden, Peter De Bruyn, Wolfgang Kastner

, Herwig Mannaert:
Deriving guidelines for cross-vendor reuse of IEC 61131-3 modules based on Normalized Systems theorems. 598-603 - Luis E. Anido-Rifón

, Manuel J. Fernández-Iglesias
, Manuel Caeiro-Rodríguez
, Juan M. Santos-Gago
, Martín Llamas Nistal
, Luis Álvarez Sabucedo
, Rubén Míguez Pérez:
Standardization in computer-based education. 604-625 - Oldrich Slavata, Jan Holub

:
Evaluation of objective speech transmission quality measurements in packet-based networks. 626-630 - Tzu-Chao Lin, Chao-Ming Lin, Mu-Kun Liu, Chien-Ting Yeh:

Partition-based fuzzy median filter based on adaptive resonance theory. 631-640 - Chih-Chin Liang, Wen-Yau Liang:

Efficient communication architecture for the C2C agent. 641-647 - I-Ching Hsu, Der-Hong Ting, Nien-Lin Hsueh:

MDA-based visual modeling approach for resources link relationships using UML profile. 648-656 - Hsin-Hung Pan

, Shu-Ching Wang, Kuo-Qin Yan:
An integrated data exchange platform for Intelligent Transportation Systems. 657-671 - Fu-Shiung Hsieh, Jim-Bon Lin:

Development of context-aware workflow systems based on Petri Net Markup Language. 672-685
Volume 36, Number 4, June 2014
- Carlos Blanco

, David Garcia Rosado
, Luis Enrique Sánchez
, Jan Jürjens:
Security in information systems: Advances and new challenges. 687-688 - Michael Beiter, Marco Casassa Mont

, Liqun Chen
, Siani Pearson
:
End-to-end policy based encryption techniques for multi-party data management. 689-703 - Cándido Caballero-Gil

, Pino Caballero-Gil
, Jezabel Molina-Gil
:
Mutual authentication in self-organized VANETs. 704-710 - Daniel Mellado, Haralambos Mouratidis

, Eduardo Fernández-Medina
:
Secure Tropos framework for software product lines requirements engineering. 711-722 - Naved Ahmed, Raimundas Matulevicius

:
Securing business processes using security risk-oriented patterns. 723-733 - Anton V. Uzunov, Eduardo B. Fernández

:
An extensible pattern-based library and taxonomy of security threats for distributed systems. 734-747 - Santiago Moral-García, Santiago Moral-Rubio, Eduardo B. Fernández, Eduardo Fernández-Medina

:
Enterprise security pattern: A model-driven architecture instance. 748-758 - Christos Kalloniatis, Haralambos Mouratidis

, Vassilis Manousakis, Shareeful Islam, Stefanos Gritzalis
, Evangelia Kavakli:
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. 759-775 - Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa

:
Specifying model changes with UMLchange to support security verification of potential evolution. 776-791 - M. Carmen Fernández Gago

, Isaac Agudo
, Javier López
:
Building trust from context similarity measures. 792-800
Volume 36, Number 5, September 2014
- Natalia Iglesias

, Pilar Bulacio, Elizabeth Tapia
:
Enabling powerful GUIs in ISOBUS networks by transparent data compression. 801-807 - Ali Darejeh

, Dalbir Singh:
An investigation on Ribbon interface design guidelines for people with less computer literacy. 808-820 - Shu-Ching Wang, Kuo-Qin Yan, Chin-Ling Ho, Shun-Sheng Wang:

The optimal generalized Byzantine Agreement in Cluster-based Wireless Sensor Networks. 821-830 - Alejandro Maté

, Juan Trujillo
:
Tracing conceptual models' evolution in data warehouses by using the model driven architecture. 831-843 - Ahmed Patel, Rosdiadee Nordin

, Ahmed Al-Haiqi
:
Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy. 844-854 - Yih-Kai Lin:

A data hiding scheme based upon DCT coefficient modification. 855-862 - Javier Troya

, Antonio Vallecillo
:
Specification and simulation of queuing network models using Domain-Specific Languages. 863-879 - Shuhui Chen, Rongxing Lu:

A regular expression matching engine with hybrid memories. 880-888
Volume 36, Number 6, November 2014
- Wonkeun Youn, Baeck-jun Yi:

Software and hardware certification of safety-critical avionic systems: A comparison study. 889-898
- Yildiray Yalman

:
Histogram based perceptual quality assessment method for color images. 899-908 - Jinsongdi Yu, Peter Baumann

, Dimitar Misev, Piero Campalani, Mirko Albani, Fulvio Marelli, David Giaretta, Shirley Y. Crompton:
Point of view: Long-Term access to Earth Archives across Multiple Disciplines. 909-917 - Xiaonan Wang, Yuan Yang, Yufeng Yao, Hongbin Cheng:

An address configuration protocol for 6LoWPAN wireless sensor networks based on PDAD. 918-927 - Alejandro Fernández-Montes

, Juan Antonio Ortega-Ramírez
, J. I. Sánchez-Venzalá, Luis González Abril
:
Software reference architecture for smart environments: Perception. 928-940 - Iván García-Magariño

:
Towards the integration of the agent-oriented modeling diversity with a powertype-based language. 941-952 - Mohamed Mazouzi, Oussama Kallel, Ihsen Ben Mbarek

, Salem Hasnaoui, Mohamed Abid:
SCPN modeling and comparative performance evaluation of bussed and crossbar-based switched fabric CAN. 953-962
- Jin Tan, Xiaolian Duan, Daidi Zhong

, Michael J. Kirwan:
How do we define the "general purpose"? 963-965

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














