A Secure Identification and Key agreement protocol with user Anonymity (SIKA) Fulltext Access 6 Pages 2006
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem Fulltext Access 6 Pages 2006
A two-dimensional circumplex approach to the development of a hacker taxonomy Fulltext Access 6 Pages 2006
An efficient Matlab script to calculate heterogeneous anisotropically elastic wave propagation in three dimensions Fulltext Access 6 Pages 2006
Monitoring soil moisture and water table height with a low-cost data logger Fulltext Access 6 Pages 2006
GEOISO-A Windows⢠program to calculate and plot mass balances and volume changes occurring in a wide variety of geologic processes Fulltext Access 6 Pages 2006
Measures of international collaboration in scientific literature: Part II Fulltext Access 6 Pages 2006
A distribution of impact factors of journals in the area of software: An empirical study Fulltext Access 6 Pages 2006
An analysis of image retrieval behavior for metadata type image database Fulltext Access 6 Pages 2006
Piloting a web-based continuing professional development program for asthma education Fulltext Access 6 Pages 2006
Medical guidelines presentation and comparing with Electronic Health Record Fulltext Access 6 Pages 2006
Improving access of associated states to advanced concepts in medical telematics-A day before the accession to EU Fulltext Access 6 Pages 2006
AMROEBA: Computational astrophysics modeling enabled by dynamic lambda switching Fulltext Access 6 Pages 2006
Computer forensics and electronic discovery: The new management challenge Fulltext Access 6 Pages 2006
Security considerations for incremental hash functions based on pair block chaining Fulltext Access 6 Pages 2006
High-definition multimedia for multiparty low-latency interactive communication Fulltext Access 6 Pages 2006
A differential approach to solve the inverse eigenvalue problem derived from a neural network Fulltext Access 6 Pages 2006
An automated scoring algorithm for computerized clinical vignettes: Evaluating physician performance against explicit quality criteria Fulltext Access 7 Pages 2006
Distributed and collaborative visualization of large data sets using high-speed networks Fulltext Access 7 Pages 2006
Problem-based learning in medical informatics for undergraduate medical students: An experiment in two medical schools Fulltext Access 7 Pages 2006
A software tool to aid long-term care budget planning at local authority level Fulltext Access 7 Pages 2006
Large-scale multimedia content delivery over optical networks for interactive TV services Fulltext Access 7 Pages 2006
Learning outcomes in medical informatics: Comparison of a WebCT course with ordinary web site learning material Fulltext Access 7 Pages 2006
Scientific collaboration of new 10 EU countries in the field of social sciences Fulltext Access 7 Pages 2006
From a paper-based transmission of discharge summaries to electronic communication in health care regions Fulltext Access 7 Pages 2006
Quality of service provision assessment in the healthcare information and telecommunications infrastructures Fulltext Access 7 Pages 2006
Using zero configuration technology for IP addressing in optical networks Fulltext Access 7 Pages 2006
Looking for answers, constructing reliability: An exploration into how Dutch patients check web-based medical information Fulltext Access 7 Pages 2006
The relative influence of management control and user–IS personnel interaction on project performance Fulltext Access 7 Pages 2006
SWAN: A distributed knowledge infrastructure for Alzheimer disease research Fulltext Access 7 Pages 2006
Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach Fulltext Access 7 Pages 2006
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data Fulltext Access 7 Pages 2006
Application of temporal and spatial role based access control in 802.11 wireless networks Fulltext Access 7 Pages 2006
A cyber forensics ontology: Creating a new approach to studying cyber forensics Fulltext Access 7 Pages 2006
Identifying almost identical files using context triggered piecewise hashing Fulltext Access 7 Pages 2006
Preparing Information Security for legal and regulatory compliance (Sarbanes–Oxley and Basel II) Fulltext Access 7 Pages 2006
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem Fulltext Access 7 Pages 2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks Fulltext Access 7 Pages 2006
An identity management protocol for Internet applications over 3G mobile networks Fulltext Access 7 Pages 2006
A revision of the FORTRAN codes GRAVW to compute deformation produced by a point magma intrusion in elastic-gravitational layered earth models Fulltext Access 7 Pages 2006
Incorporating nonlinear rules in a web-based interactive landform simulation model (WILSIM) Fulltext Access 7 Pages 2006
Improved resolution of the multiple inverse method by eliminating erroneous solutions Fulltext Access 7 Pages 2006