Journal: Computer Standards & Interfaces

Volume 33, Issue 6

519 -- 532Ricardo Pérez-Castillo, Ignacio García Rodríguez de Guzmán, Mario Piattini. Knowledge Discovery Metamodel-ISO/IEC 19506: A standard to modernize legacy systems
533 -- 540Jianyong Chen, Guihua Wu, Zhen Ji. Secure interoperation of identity managements among different circles of trust
541 -- 555Yaoyao Fiona Zhao, Xun Xu, Tom Kramer, Frederick M. Proctor, John Horst. Dimensional metrology interoperability and standardization in manufacturing systems
556 -- 564Antonio de la Oliva, Ignacio Soto, Albert Banchs, Johannes Lessmann, Christian Niephaus, Telemaco Melia. IEEE 802.21: Media independence beyond handover
565 -- 573Tokihiro Fukatsu, Takuji Kiura, Masayuki Hirafuji. A web-based sensor network system with distributed data processing approach via web application
574 -- 586Jose Gutierrez, Tahir M. Riaz, Jens Myrup Pedersen, Ahmed Patel, Ole Brun Madsen. Analytical model based on green criteria for optical backbone network interconnection

Volume 33, Issue 5

439 -- 447Dong Chan An, Seog Park. Efficient access control labeling scheme for secure XML query processing
448 -- 464Ö. Özgür Tanriöver, Semih Bilgen. A framework for reviewing domain specific conceptual models
465 -- 476Stefano Vitturi, L. Peretti, Lucia Seno, M. Zigliotto, Claudio Zunino. Real-time Ethernet networks for motion control
477 -- 484Ching-Chiuan Lin. An information hiding scheme with minimal image distortion
485 -- 493Serena Coetzee. Results from a normative dependency analysis of geographic information standards
494 -- 504Rafael Marín López, Fernando Pereñiguez-Garcia, Gabriel López, Alejandro Pérez-Méndez. Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
505 -- 518Li-jie Chen, Zhen-yu Shan, Tao Tang, Hong-jie Liu. Performance analysis and verification of safety communication protocol in train control system

Volume 33, Issue 4

357 -- 366Dong-Sung Kim, SeungKi Lee. Feasibility analysis of hybrid control networks based on common industrial protocol
367 -- 371Shang-Kuan Chen. A module-based LSB substitution method with lossless secret data compression
372 -- 388Carlos Blanco, Joaquín Lasheras, Eduardo Fernández-Medina, Rafael Valencia-García, José Ambrosio Toval Álvarez. Basis for an integrated security ontology according to a systematic review of existing proposals
389 -- 400Lubomir Riha, Radislav Smid. Acceleration of acoustic emission signal processing algorithms using CUDA standard
401 -- 410Kemal Bicakci, Hakan Gultekin, Bulent Tavli, Ibrahim Ethem Bagci. Maximizing lifetime of event-unobservable wireless sensor networks
411 -- 421Antonia Stefani, Michalis Nik Xenos. Weight-modeling of B2C system quality
422 -- 431Kuanchin Chen, Jengchung V. Chen, David C. Yen. Dimensions of self-efficacy in the study of smart phone acceptance
432 -- 437Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju. Threshold signature schemes for ElGamal variants

Volume 33, Issue 3

207 -- 213Tomás Sánchez López. RFID and sensor integration standards: State and future prospects
214 -- 219Mohammad Farhan Husain, Tahseen Al-Khateeb, Mohmmad Alam, Latifur Khan. Ontology based policy interoperability in geo-spatial domain
220 -- 231ChunLin Li, Layuan Li. An economics-based negotiation scheme among mobile devices in mobile grid
232 -- 248Ruey-Fong Chang, Chen-Wei Chang, Kuo-Hsiung Tseng, Cheng-Lun Chiang, Wen-Shiow Kao, Wen-Jang Chen. Structural planning and implementation of a microprocessor-based human-machine interface in a steam-explosion process application
249 -- 261Ricardo Moraes, Francisco Borges Carreiro, Paulo Bartolomeu, Valter Filipe Silva, José Alberto Fonseca, Francisco Vasques. Enforcing the timing behavior of real-time stations in legacy bus-based industrial Ethernet networks
262 -- 270Jengchung V. Chen, David C. Yen, T. M. Rajkumar, Nathan A. Tomochko. The antecedent factors on trust and commitment in supply chain relationships
271 -- 279Min-Xiou Chen, Tze-Chin Tzeng. Integrating service discovery technologies in OSGi platform
280 -- 291Kuen-Fang Jea, Tsui-Ping Chang, Chia-Wen Cheng. A generic simulation model for evaluating concurrency control protocols in native XML database systems
292 -- 300Parvathi Chundi, Tai Xin, Indrakshi Ray. When does a workflow complete?
301 -- 314Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis. PrivaSIP: Ad-hoc identity privacy in SIP
315 -- 324Gergely Hományi, Lóránt Farkas, Kristóf Aczél. Distributed audio recorder using smart phones and proximity connections
325 -- 331Ahmed Patel, Nikita Schmidt. Application of structured document parsing to focused web crawling
332 -- 343LinYuan Liu, Haibin Zhu, Zhiqiu Huang, Dongqing Xie. Minimal privacy authorization in web services collaboration
344 -- 349Marc Ciurana, Francisco Barceló-Arroyo, Israel Martín-Escalona. Comparative performance evaluation of IEEE 802.11v for positioning with time of arrival
350 -- 356David C. Chou, Amy Y. Chou. Innovation outsourcing: Risks and quality issues

Volume 33, Issue 2

115 -- 116M. Catelani, S. Rapuano. Preface to the special issue on XVI IMEKO TC-4 symposium and XIII international workshop on ADC modelling and testing
117 -- 121Dusan Agrez. Estimation of parameters of the weakly damped sinusoidal signals in the frequency domain
128 -- 135Giulia Rabottino, Arianna Mencattini, Marcello Salmeri, Federica Caselli, Roberto Lojacono. Performance evaluation of a region growing procedure for mammographic breast lesion identification
136 -- 141T. Sugimoto, A. Tohshima. Estimation method for the consciousness level while driving vehicles
142 -- 151Apostolos P. Psyllos, Christos-Nikolaos Anagnostopoulos, Eleftherios Kayafas. Vehicle model recognition from frontal view image measurements
152 -- 158Marcantonio Catelani, Lorenzo Ciani, Valeria L. Scarano, Alessandro Bacioccola. Software automated testing: A solution to maximize the test plan coverage and to increase software reliability and quality in use
159 -- 164A. Bounouh, H. Camon, D. Bélières, F. Blard, F. Ziadé. MEMS AC voltage reference for miniaturized instrumentation and metrology
165 -- 175Antonio Raffo, Valeria Vadalà, Pier Andrea Traverso, Alberto Santarelli, Giorgio Vannini, Fabio Filicori. A dual-source nonlinear measurement system oriented to the empirical characterization of low-frequency dispersion in microwave electron devices
176 -- 181Andrea Carta, Nicola Locci, Carlo Muscas, Fabio Pinna, Sara Sulis. GPS and IEEE 1588 synchronization for the measurement of synchrophasors in electric power systems
182 -- 190Tomasz Tarasiuk, Mariusz Szweda. DSP instrument for transient monitoring
191 -- 200Octavian Adrian Postolache, Helena Maria Geirinhas Ramos, A. Lopes Ribeiro. Detection and characterization of defects using GMR probes and artificial neural networks
201 -- 205Giovanni Betta, Domenico Capriglione, Carlo F. M. Carobbi, M. D. Migliore. The accurate calibration of EMC antennas in compact chambers - Measurements and uncertainty evaluations

Volume 33, Issue 1

1 -- 0Barbara Carminati, Bhavani M. Thuraisingham. Introduction to secure Semantic Web
2 -- 12Palanivel Balaji Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi, Tim Finin. Enforcing security in semantics driven policy based networks
13 -- 23Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino. Trust establishment in the formation of Virtual Organizations
24 -- 34William M. Fitzgerald, Simon N. Foley. Aligning Semantic Web applications with network access controls
35 -- 41Ashraful Alam, Latifur Khan, Bhavani M. Thuraisingham. Geospatial Resource Description Framework (GRDF) and security constructs
42 -- 49Ángel García-Crespo, Juan Miguel Gómez Berbís, Ricardo Colomo Palacios, Giner Alor-Hernández. SecurOntology: A semantic web access control framework
50 -- 58Chin-Shan Wu, Fei-Fei Cheng, David C. Yen, Yu-Wen Huang. User acceptance of wireless technology in organizations: A comparison of alternative models
59 -- 68Xiangyang Wang, Yong-Jian Yu, Hong-Ying Yang. An effective image retrieval scheme using color, texture and shape features
69 -- 79Carlos Cares, Xavier Franch, Anna Perini, Angelo Susi. Towards interoperability of i* models using iStarML
80 -- 95Lukasz Cyra, Janusz Górski. SCF - A framework supporting achieving and assessing conformity with standards
96 -- 107Peng Liu, Meng Yu. Damage assessment and repair in attack resilient distributed database systems
108 -- 113Qasem A. Al-Radaideh, Kamal H. Masri. Improving mobile multi-tap text entry for Arabic language