357 | -- | 366 | Dong-Sung Kim, SeungKi Lee. Feasibility analysis of hybrid control networks based on common industrial protocol |
367 | -- | 371 | Shang-Kuan Chen. A module-based LSB substitution method with lossless secret data compression |
372 | -- | 388 | Carlos Blanco, Joaquín Lasheras, Eduardo Fernández-Medina, Rafael Valencia-García, José Ambrosio Toval Álvarez. Basis for an integrated security ontology according to a systematic review of existing proposals |
389 | -- | 400 | Lubomir Riha, Radislav Smid. Acceleration of acoustic emission signal processing algorithms using CUDA standard |
401 | -- | 410 | Kemal Bicakci, Hakan Gultekin, Bulent Tavli, Ibrahim Ethem Bagci. Maximizing lifetime of event-unobservable wireless sensor networks |
411 | -- | 421 | Antonia Stefani, Michalis Nik Xenos. Weight-modeling of B2C system quality |
422 | -- | 431 | Kuanchin Chen, Jengchung V. Chen, David C. Yen. Dimensions of self-efficacy in the study of smart phone acceptance |
432 | -- | 437 | Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju. Threshold signature schemes for ElGamal variants |