![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Computer Standards & Interfaces, Volume 37
Volume 37, January 2015
- Brenton Borgman, Sameera Mubarak
, Kim-Kwang Raymond Choo
:
Cyber security readiness in the South Australian Government. 1-8
- S. Zafar Nasir, Tariq Mahmood, Muhammad Shahid Shaikh, Zubair Ahmed Shaikh:
Fault-tolerant context development and requirement validation in ERP systems. 9-19 - Handityo Aulia Putra, Dong-Seong Kim:
Node discovery scheme of DDS for combat management system. 20-28 - Ö. Özgür Tanriöver
, Onur Demirörs
:
A process capability based assessment model for software workforce in emergent software organizations. 29-40 - Ivan Cibrario Bertolotti, Tingting Hu:
Modular design of an open-source, networked embedded system. 41-52 - Kenan Kalajdzic, Samaher Hussein Ali, Ahmed Patel:
Rapid lossless compression of short text messages. 53-59 - Norfaradilla Wahid, Eric Pardede
:
XSDyM: An XML graphical conceptual model for static and dynamic constraints. 60-72 - Tran Nhon, Dong-Seong Kim:
Real-time message scheduling for ISA100.11a networks. 73-79 - Antoni Lluís Mesquida
, Antònia Mas Picahaco
:
Integrating IT service management requirements into the organizational management system. 80-91
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.