


default search action
Journal of Information Security and Applications, Volume 31
Volume 31, December 2016
- Ning Wang, Zhe Xia, Jianwen Xiang:

Editorial: Special issue on security and dependability of internet of things. 1-2 - Xing Liu, Haiying Zhou, Shengwu Xiong

, Kun Mean Hou, Christophe de Vaulx
, Hongling Shi:
Research of a resource-efficient, real-time and fault-tolerant wireless sensor network system. 3-13 - Pengfei Duan, Shengwu Xiong

, Chunhui Yang, Haohao Zhang, Mianfang Liu:
Personalized route planning system based on Wardrop Equilibrium model for pedestrian-vehicle mixed evacuation in campus. 14-22 - Kazuhiro Ogata

, Thapana Chaimanont, Min Zhang
:
Formal modeling and analysis of time- and resource-sensitive simple business processes. 23-40 - Min Zhang

, Toshiaki Aoki
, Yueying He:
A spiral process of formalization and verification: A case study on verification of the scheduling mechanism of OSEK/VDX. 41-53 - Xiaohan Yu

, Shengwu Xiong
, Ying He, W. Eric Wong, Yang Zhao
:
Research on campus traffic congestion detection using BP neural network and Markov model. 54-60 - Weiqiang Kong, Gang Hou, Xiangpei Hu, Takahiro Ando, Kenji Hisazumi

, Akira Fukuda:
Garakabu2: an SMT-based bounded model checker for HSTM designs in ZIPC. 61-74 - Yanchao Yang, Junwei Zhou

, Feipeng Duan, Fang Liu, Lee-Ming Cheng
:
Wave atom transform based image hashing using distributed source coding. 75-82

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














