default search action
Computer Standards & Interfaces, Volume 37
Volume 37, January 2015
- Brenton Borgman, Sameera Mubarak, Kim-Kwang Raymond Choo:
Cyber security readiness in the South Australian Government. 1-8
- S. Zafar Nasir, Tariq Mahmood, Muhammad Shahid Shaikh, Zubair Ahmed Shaikh:
Fault-tolerant context development and requirement validation in ERP systems. 9-19 - Handityo Aulia Putra, Dong-Seong Kim:
Node discovery scheme of DDS for combat management system. 20-28 - Ö. Özgür Tanriöver, Onur Demirörs:
A process capability based assessment model for software workforce in emergent software organizations. 29-40 - Ivan Cibrario Bertolotti, Tingting Hu:
Modular design of an open-source, networked embedded system. 41-52 - Kenan Kalajdzic, Samaher Hussein Ali, Ahmed Patel:
Rapid lossless compression of short text messages. 53-59 - Norfaradilla Wahid, Eric Pardede:
XSDyM: An XML graphical conceptual model for static and dynamic constraints. 60-72 - Tran Nhon, Dong-Seong Kim:
Real-time message scheduling for ISA100.11a networks. 73-79 - Antoni Lluís Mesquida, Antònia Mas Picahaco:
Integrating IT service management requirements into the organizational management system. 80-91
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.