


default search action
Computer Standards & Interfaces, Volume 26
Volume 26, Number 1, January 2004
- Vladimír Haasz:

New trends in ADC testing and modelling. 1-2 - A. Cruz Serra, F. Corrêa Alegria

, Raul Carneiro Martins
, Manuel Fonseca da Silva:
Analog-to-digital converter testing - new proposals. 3-13 - Carsten Wegener, Michael Peter Kennedy

:
Testing ADCs for static and dynamic INL - killing two birds with one stone. 15-20 - Vladimír Haasz, Jaroslav Roztocil

, David Slepicka:
Comparative measurements of parameters of systems used for ADC testing. 21-30 - Pasquale Arpaia

, Pasquale Daponte
, Sergio Rapuano
:
A state of the art on ADC modelling. 31-42 - Jerome J. Blair, Thomas E. Linnenbrink:

Corrected rms error and effective number of bits for sine wave ADC tests. 43-49 - Tamás Zoltán Bilau, Tamás Megyeri, Attila Sárhegyi, János Márkus, István Kollár

:
Four-parameter fitting of sine wave testing result: iteration and convergence. 51-56
Volume 26, Number 2, March 2004
- Harald Schumny:

Is the "Far-East" setting the standards for e- and m-commerce? 59-60 - Shiang-Feng Tzeng, Min-Shiang Hwang:

Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem. 61-71 - Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai:

Generalization of proxy signature based on elliptic curves. 73-84 - Shiuh-Jeng Wang:

Remote table-based log-in authentication upon geometric triangle. 85-92 - Shu-Chin Wang, Kuo-Qin Yan, Chien-Fu Cheng

:
Efficient multicasting agreement protocol. 93-111 - Hyun-Sook Chung, Yillbyung Lee:

MCML: motion capture markup language for integration of heterogeneous motion capture data. 113-130 - Stefano Vitturi

:
On the effects of the acyclic traffic on Profibus DP networks. 131-144 - Stefano Vitturi

:
PC-based automation systems: an example of application for the real-time control of blowing machines. 145-155
Volume 26, Number 3, May 2004
- Harald Schumny:

Wireless personal area networks. 157-158 - Hui-Feng Huang, Chin-Chen Chang:

A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. 159-166 - Chien-Lung Hsu:

Security of Chien et al.'s remote user authentication scheme using smart cards. 167-169 - Chu-Hsing Lin, Chia-Yin Lee, Wei Lee:

Comments on the Yang-Chang-Hwang anonymous conference key distribution system. 171-174 - Theodore B. Zahariadis

:
Evolution of the Wireless PAN and LAN standards. 175-185 - Chun-Che Huang, Wen-Yau Liang:

Object-oriented development of the embedded system based on Petri-nets. 187-203 - Tae-Hee Gwak, Byoungju Choi:

A method of MPEG2-TS test stream generation for digital TV software. 205-219 - Her-Kun Chang:

Nonuniform memory reference of multistage interconnection networks. 221-227 - Kyung Chang Lee

, Suk Lee, Hong Hee Lee:
Implementation and PID tuning of network-based control systems via Profibus polling network. 229-240 - Juwon Lee

, Wongeun Jung, IkTae Kang, Youngil Kim, Gunki Lee:
Design of filter to reject motion artifact of pulse oximetry. 241-249 - Jan Holub

, Josef Vedral:
Stochastic testing of ADC - Step-Gauss method. 251-257
Volume 26, Number 4, August 2004
- Harald Schumny:

Quality of service in mobile networks and biometrics for face verification. 259-261 - Andrew Dursch, David C. Yen

, Dong-Her Shih:
Bluetooth technology: an exploratory study of the analysis and implementation frameworks. 263-277 - Dong-Her Shih, Zah-Qiang Lin:

Bandwidth saturation QoS provisioning for adaptive multimedia in wireless/mobile networks. 279-288 - X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongsheng Gao

:
Towards a BioAPI compliant face verification system. 289-299 - Hattab Guesmi, Ridha Djemal, Belgacem Bouallegue, Jean-Philippe Diguet, Rached Tourki:

High performance architecture of integrated protocols for encoded video application. 301-315 - Chi-Chun Lo, Shuenn-Jyi Wang, Lee-Wen Huang:

Video retrieval using successive modular operations on temporal similarity. 317-328 - Ibrahim Özçelik

, Hüseyin Ekiz:
Design, implementation and performance analysis of the PROFIBUS/ATM Local Bridge. 329-342 - Michael McClea, David C. Yen

, Albert H. Huang:
An analytical study towards the development of a standardized IM application. 343-355 - Jeong Ho Shin, Byung Man Kwak:

Optimal Design Markup Language as a new interface standard for design processes. 357-370 - Yuh-Min Tseng:

On the security of an efficient two-pass key agreement protocol. 371-374
Volume 26, Number 5, September 2004
- Harald Schumny:

Nearly a special issue on cryptography. 375-376 - Tzu-Han Kao, Shyan-Ming Yuan

:
Designing an XML-based context-aware transformation framework for mobile execution environments using CC/PP and XSLT. 377-399 - Eric Jui-Lin Lu, Yung-Yuan Cheng:

Design and implementation of a mobile database for Java phones. 401-410 - Hassan A. Artail:

A client-based customization framework for web applications using JNLP. 411-422 - Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang:

Efficient access control and key management schemes for mobile agents. 423-433 - Shu-Chin Wang, Kuo-Qin Yan, H. C. Hsieh:

The new territory of mobile agreement. 435-447 - Zuhua Shao:

Efficient deniable authentication protocol based on generalized ElGamal signature scheme. 449-454 - Shiuh-Jeng Wang:

Direct construction of a secret in generalized group-oriented cryptography. 455-460 - Tzer-Shyong Chen

, Kuo-Hsuan Huang, Yu-Fang Chung
:
A practical authenticated encryption scheme based on the elliptic curve cryptosystem. 461-469 - Chin-Chen Chang, Ya-Fen Chang:

A novel three-party encrypted key exchange protocol. 471-476 - Tzong-Sun Wu, Chien-Lung Hsu:

Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers. 477-481 - Her-Kun Chang:

Modeling the effect of hot spot contention on crossbar multiprocessors. 483-488
Volume 26, Number 6, October 2004
- Gerardo Canfora

, Pasquale Daponte
, Sergio Rapuano:
Remotely accessible laboratory for electronic measurement teaching. 489-499 - Kwo-Jean Farn, Shu-Kuo Lin, Andrew Ren-Wei Fung:

A study on information security management system evaluation - assets, threat and vulnerability. 501-513 - Xu Hong, Wang Jianhua:

An extendable data engine based on OPC specification. 515-525 - Vassilis Kapsalis, Konstantinos J. Charatsis, Manos J. Georgoudakis, Efstratios Nikoloutsos, George D. Papadopoulos:

A SOAP-based system for the provision of e-services. 527-541 - Denis Trcek:

Towards trust management standardization. 543-548 - Monika Kapus-Kolar:

A generalization of the E-LOTOS renaming operator: a convenience for specification of new forms of process composition. 549-563 - Min-Shiang Hwang, Jung-Wen Lo, Shu-Chen Lin:

An efficient user identification scheme based on ID-based cryptosystem. 565-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














