Secretary and Head Office

[1]  Victor R. Kebande,et al.  A Cloud Forensic Readiness Model Using a Botnet as a Service , 2014 .

[2]  Lidija Pulevska-Ivanovska,et al.  Implementation of e-Supply Chain Management , 2013 .

[3]  Jyri Rajamäki,et al.  Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement , 2013, 2013 European Intelligence and Security Informatics Conference.

[4]  Gerhard Fettweis,et al.  Towards complexity-reduced Soft-Input Soft-Output Sphere Detection , 2013 .

[5]  Seokho Yoon,et al.  On Frequency Offset Estimation for OFDM , 2013, IEEE Transactions on Wireless Communications.

[6]  Hein S. Venter,et al.  The architecture of a digital forensic readiness management system , 2013, Comput. Secur..

[7]  Jing Xu,et al.  Kalman interpolation filter for channel estimation of LTE downlink in high-mobility environments , 2012, EURASIP J. Wirel. Commun. Netw..

[8]  Mark Vinkovits Towards requirements for trust management , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[9]  M. Fotuhi-Firuzabad,et al.  Reliability Study of HV Substations Equipped With the Fault Current Limiter , 2012, IEEE Transactions on Power Delivery.

[10]  Shengzhi Du,et al.  High accuracy Hough transform based on butterfly symmetry , 2012 .

[11]  Fabiola Baltar,et al.  Social research 2.0: virtual snowball sampling method using Facebook , 2012, Internet Res..

[12]  Charles J. Mozina Impact of smart grid and green power generation on distribution systems , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[13]  T. Afullo,et al.  THREE - PARAMETER RAINDROP SIZE DISTRIBUTION MODELING FOR MICROWAVE PROPAGATION IN SOUTH AFRICA , 2012 .

[14]  T. Afullo,et al.  Seasonal Analysis and Prediction of Rainfall Effects in Eastern South Africa at Microwave Frequencies , 2012 .

[15]  Christoph Meinel,et al.  Towards Context-Aware Service-Oriented Semantic Reputation Framework , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[16]  B. T. Maharaj,et al.  Turbo STFC decoding with the Zero Forcing decoder , 2011, IEEE Africon '11.

[17]  Hamid Jafarkhani,et al.  Secure space-time block coding via artificial noise alignment , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[18]  Min Jee Kim,et al.  The application of fault current limiter at Icheon substation in Korea , 2011, 2011 1st International Conference on Electric Power Equipment - Switching Technology.

[19]  Mark Woodman,et al.  Success Dimensions in Selecting Cloud Software Services , 2011, 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications.

[20]  Neil A. M. Maiden,et al.  What are the day-to-day factors that are preventing business analysts from effective business analysis? , 2011, 2011 IEEE 19th International Requirements Engineering Conference.

[21]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[22]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[23]  Ana Benarroch,et al.  Propagation in the Ka Band: Experimental Characterization for Satellite Applications , 2011, IEEE Antennas and Propagation Magazine.

[24]  Eoghan Casey,et al.  Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .

[25]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[26]  Shijun Liu,et al.  A Well-designed SaaS Application Platform Based on Model-driven Approach , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.

[27]  Maryse Marpsat,et al.  Survey Methods for Hard-to-Reach Populations: Introduction to the Special Issue , 2010 .

[28]  Mihaela Ulieru,et al.  The State of the Art in Trust and Reputation Systems: A Framework for Comparison , 2010, J. Theor. Appl. Electron. Commer. Res..

[29]  Ismael Ripoll,et al.  Partitioned Embedded Architecture Based on Hypervisor: The XtratuM Approach , 2010, 2010 European Dependable Computing Conference.

[30]  Johann E. W. Holm,et al.  Systems Engineering Training in Engineering Education , 2010, 2010 IEEE Transforming Engineering Education: Creating Interdisciplinary Skills for Complex Global Environments.

[31]  Tatsuo Nakajima,et al.  SIGMA System: A Multi-OS Environment for Embedded Systems , 2010, J. Signal Process. Syst..

[32]  J. S. Bhullar,et al.  A Huffman Codes Based Approach to Achieve Minimum Redundancy , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[33]  E.F. El-Saadany,et al.  Optimal Renewable Resources Mix for Distribution System Energy Loss Minimization , 2010, IEEE Transactions on Power Systems.

[34]  M. Lehtonen,et al.  Determining wave propagation characteristics of MV XLPE power cable using time domain reflectometry technique , 2009, 2009 International Conference on Electrical and Electronics Engineering - ELECO 2009.

[35]  J. Garcia-Frías,et al.  Non-linear graph-based codes for source coding , 2009, 2009 IEEE Information Theory Workshop.

[36]  Cheng Huiping An Integration Framework of ERM, SCM, CRM , 2009, 2009 International Conference on Management and Service Science.

[37]  Kumbesan Sandrasegaran,et al.  Modeling and simulation of packet scheduling in the downlink long term evolution system , 2009, 2009 15th Asia-Pacific Conference on Communications.

[38]  J. Barros,et al.  Joint compression and data protection , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[39]  Carl Johan Wallnerström,et al.  Risk management applied to electrical distribution systems , 2009 .

[40]  Midori Sugaya,et al.  Constructing a Multi-OS Platform with Minimal Engineering Cost , 2009, IESS.

[41]  Hancheng Liao Design of SaaS-Based Software Architecture , 2009, 2009 International Conference on New Trends in Information and Service Science.

[42]  F. G. Marmol,et al.  TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[43]  Jacob Ziv,et al.  The Universal LZ77 Compression Algorithm Is Essentially Optimal for Individual Finite-Length $N$-Blocks , 2009, IEEE Transactions on Information Theory.

[44]  W. Randeu,et al.  Diurnal Variation of Rain Attenuation Obtained From Measurement of Raindrop Size Distribution in Equatorial Indonesia , 2009, IEEE Transactions on Antennas and Propagation.

[45]  Trung Dong Huynh,et al.  A personalized framework for trust assessment , 2009, SAC '09.

[46]  L. Luini,et al.  A New Prediction Model of Rain Attenuation That Separately Accounts for Stratiform and Convective Rain , 2009, IEEE Transactions on Antennas and Propagation.

[47]  Riccardo Zecchina,et al.  Efficient LDPC codes over GF(q) for lossy data compression , 2009, 2009 IEEE International Symposium on Information Theory.

[48]  Betty H. C. Cheng,et al.  Current and Future Research Directions in Requirements Engineering , 2009 .

[49]  Arturo Molina,et al.  Application Development over Software-as-a-Service Platforms , 2008, 2008 The Third International Conference on Software Engineering Advances.

[50]  Bodhaswar T. Maharaj,et al.  Decremental Redundancy Compression with Fountain Codes , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[51]  K. Manivannan,et al.  Performance analysis of fast handoff algorithms using local averaging technique in cellular networks , 2008, 2008 First International Conference on Distributed Framework and Applications.

[52]  Khaled El Emam,et al.  A Replicated Survey of IT Software Project Failures , 2008, IEEE Software.

[53]  I.S. Oh,et al.  Practical Application Issues of Superconducting Fault Current Limiters for Electric Power Systems , 2008, IEEE Transactions on Applied Superconductivity.

[54]  Helmut Bölcskei,et al.  Soft-output sphere decoding: algorithms and VLSI implementation , 2008, IEEE Journal on Selected Areas in Communications.

[55]  U. Wallrabe,et al.  Solenoidal micro coils manufactured with a wire bonder , 2008, 2008 IEEE 21st International Conference on Micro Electro Mechanical Systems.

[56]  Rodney McKemmish,et al.  When is Digital Evidence Forensically Sound? , 2008, IFIP Int. Conf. Digital Forensics.

[57]  Nicholas Berente,et al.  Requirements in the 21st Century: Current Practice and Emerging Trends , 2008, Perspectives Workshop: Science of Design: High-Impact Requirements for Software-Intensive Systems.

[58]  Preben E. Mogensen,et al.  Performance Analysis of Handover Measurements and Layer 3 Filtering for Utran LTE , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[59]  Tetsuo Tamai,et al.  How Does Requirements Quality Relate to Project Success or Failure? , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).

[60]  Preben E. Mogensen,et al.  Performance Evaluation of Received Signal Strength Based Hard Handover for UTRAN LTE , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[61]  Manfred Broy,et al.  Engineering Automotive Software , 2007, Proceedings of the IEEE.

[62]  Radivoje Popovic,et al.  Microfabricated solenoids and Helmholtz coils for NMR spectroscopy of mammalian cells. , 2007, Lab on a chip.

[63]  Xiang-Gen Xia,et al.  High-Rate Full-Diversity Space–Time–Frequency Codes for Broadband MIMO Block-Fading Channels , 2007, IEEE Transactions on Communications.

[64]  Radu Jurca,et al.  TRUTHFUL REPUTATION MECHANISMS FOR ONLINE SYSTEMS , 2007 .

[65]  Sangyeun Cho,et al.  Managing Distributed, Shared L2 Caches through OS-Level Page Allocation , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).

[66]  H. Edin,et al.  On-line time domain reflectometry measurements of temperature variations of an XLPE power cable , 2006, 2006 IEEE Conference on Electrical Insulation and Dielectric Phenomena.

[67]  Masato Edahiro,et al.  VIRTUS: a new processor virtualization architecture for security-oriented next-generation mobile terminals , 2006, 2006 43rd ACM/IEEE Design Automation Conference.

[68]  Barry Boehm,et al.  A view of 20th and 21st century software engineering , 2006, ICSE.

[69]  Georgios B. Giannakis,et al.  Approaching MIMO channel capacity with soft detection based on hard sphere decoding , 2006, IEEE Transactions on Communications.

[70]  Nicolas Dütsch Code optimisation for lossless compression of binary memoryless sources based on FEC codes , 2006, Eur. Trans. Telecommun..

[71]  P. Owolawi,et al.  RAINFALL RATE MODELING FOR LOS RADIO SYSTEMS IN SOUTH AFRICA , 2006 .

[72]  Weisong Shi,et al.  Performance evaluation of rating aggregation algorithms in reputation systems , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[73]  Didar Zowghi,et al.  Requirements Elicitation: A Survey of Techniques, Approaches, and Tools , 2005 .

[74]  Holger Claussen,et al.  Efficient modelling of channel maps with correlated shadow fading in mobile radio systems , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[75]  G. Matz,et al.  On non-WSSUS wireless fading channels , 2005, IEEE Transactions on Wireless Communications.

[76]  Deepak Gupta,et al.  The Network Monitoring Tool - PickPacket , 2005, ICITA.

[77]  Regina Gonzales Developing the Requirements Discipline: Software vs. Systems , 2005, IEEE Softw..

[78]  Christian Denger,et al.  Quality Assurance in Requirements Engineering , 2005 .

[79]  Claes Wohlin,et al.  Requirements Engineering: Setting the Context , 2005 .

[80]  Barbara Paech,et al.  An Analysis of Empirical Requirements Engineering Survey Data , 2005 .

[81]  J Jeroen Veen,et al.  On-line signal analysis of partial discharges in medium-voltage power cables , 2005 .

[82]  G.M. Uchenick,et al.  Multiple independent levels of safety and security: high assurance architecture for MSLS/MLS , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[83]  Stéphane Perrin,et al.  Multisensor fusion in the frame of evidence theory for landmines detection , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[84]  S. Kim,et al.  Fair cache sharing and partitioning in a chip multiprocessor architecture , 2004, Proceedings. 13th International Conference on Parallel Architecture and Compilation Techniques, 2004. PACT 2004..

[85]  Luigi Carro,et al.  Strategies for the integration of hardware and software IP components in embedded systems-on-chip , 2004, Integr..

[86]  L. Lundheim,et al.  Evaluation of methods for ground bounce removal in GPR utility mapping , 2004, Proceedings of the Tenth International Conference on Grounds Penetrating Radar, 2004. GPR 2004..

[87]  Alan M. Davis,et al.  A Unified Model of Requirements Elicitation , 2004, J. Manag. Inf. Syst..

[88]  A. Bryman,et al.  Business Research Methods , 2004 .

[89]  Carol Tenopir,et al.  Communication Patterns of Engineers , 2004 .

[90]  Jim Alves-Foss,et al.  A multi-layered approach to security in high assurance systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[91]  Robert Rowlingson,et al.  A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..

[92]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[93]  Stefan Biffl,et al.  Software Reviews: The State of the Practice , 2003, IEEE Softw..

[94]  Colin J. Neill,et al.  Requirements Engineering: The State of the Practice , 2003, IEEE Softw..

[95]  Shlomo Shamai,et al.  A new data compression algorithm for sources with memory based on error correcting codes , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[96]  J. Sitzia,et al.  Good practice in the conduct and reporting of survey research. , 2003, International journal for quality in health care : journal of the International Society for Quality in Health Care.

[97]  Gamantyo Hendrantoro,et al.  Derivation of parameters of Y-Z power-law relation from raindrop size distribution measurements and its application in the calculation of rain attenuation from radar reflectivity factor measurements , 2003 .

[98]  Alan M. Davis,et al.  Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[99]  Jörg Schäuffele,et al.  Automotive Software Engineering , 2003 .

[100]  Giuseppe Caire Universal data compression with LDPC codes , 2003 .

[101]  Shlomo Shamai,et al.  Fountain codes for lossless data compression , 2003, Algebraic Coding Theory and Information Theory.

[102]  マイケル, ジー. ルビー,,et al.  Multistage code generator and decoder for communication systems , 2002 .

[103]  Ying Zhao,et al.  Compression of binary memoryless sources using punctured turbo codes , 2002, IEEE Communications Letters.

[104]  Jin Teong Ong,et al.  Raindrop size distribution using method of moments for terrestrial and satellite communication applications in Singapore , 2002 .

[105]  Winfried Lamersdorf,et al.  Transactional Security for a Distributed Reputation Management System , 2002, EC-Web.

[106]  E. L. Nichols,et al.  Supply Chain Redesign: Transforming Supply Chains into Integrated Value Systems , 2002 .

[107]  Patrick Mitran,et al.  Turbo source coding: a noise-robust approach to data compression , 2002, Proceedings DCC 2002. Data Compression Conference.

[108]  O. Fiser The role of particular rain drop size classes on specific rain attenuation at various frequencies with Czech data example , 2002 .

[109]  Barry W. Boehm,et al.  Get Ready for Agile Methods, with Care , 2002, Computer.

[110]  Suzanne Robertson,et al.  Requirements trawling: techniques for discovering requirements , 2001, Int. J. Hum. Comput. Stud..

[111]  Seokho Yoon,et al.  An efficient frequency offset estimator for OFDM systems and its performance characteristics , 2001, IEEE Trans. Veh. Technol..

[112]  Barbara A. Kitchenham,et al.  Using Card Sorts to Elicit Web Page Quality Attributes , 2001, IEEE Softw..

[113]  Franz Lehner,et al.  Requirements Engineering as a Success Factor in Software Projects , 2001, IEEE Softw..

[114]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[115]  Umberto Mengali,et al.  Feedback frequency synchronization for OFDM applications , 2001, IEEE Communications Letters.

[116]  Douglas C. Schmidt,et al.  Middleware for Distributed Systems Evolving the Common Structure for Network-centric Applications , 2001 .

[117]  Kristin A. Farry,et al.  Customer Centered Products: Creating Successful Products Through Smart Requirements Management (Продукты для клиента: создание успешных продуктов с помощью грамотного управления требованиями) , 2000 .

[118]  Frank Houdek,et al.  Analyzing requirements engineering processes: a case study , 2000, Proceedings 11th International Workshop on Database and Expert Systems Applications.

[119]  Axel van Lamsweerde,et al.  Requirements engineering in the year 00: a research perspective , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[120]  Cumulative distributions of rainfall rate and microwave attenuation in Singapore's tropical region , 2000 .

[121]  Bashar Nuseibeh,et al.  Requirements engineering: a roadmap , 2000, ICSE '00.

[122]  Roy Fielding,et al.  Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .

[123]  Suzanne Robertson,et al.  Mastering the Requirements Process , 1999 .

[124]  Tom Rodden,et al.  Human factors in requirements engineering: A survey of human sciences literature relevant to the improvement of dependable systems development processes , 1999, Interact. Comput..

[125]  Opas Chutatape,et al.  Influence of discretization in image space on Hough transform , 1999, Pattern Recognit..

[126]  Umberto Mengali,et al.  An improved frequency offset estimator for OFDM applications , 1999, IEEE Communications Letters.

[127]  Siavash M. Alamouti,et al.  A simple transmit diversity technique for wireless communications , 1998, IEEE J. Sel. Areas Commun..

[128]  Ian Sommerville,et al.  Requirements Engineering: Processes and Techniques , 1998 .

[129]  David Veshosky,et al.  MANAGING INNOVATION INFORMATION IN ENGINEERING AND CONSTRUCTION FIRMS , 1998 .

[130]  Per Ola Börjesson,et al.  ML estimation of time and frequency offset in OFDM systems , 1997, IEEE Trans. Signal Process..

[131]  S. Y. Yuen,et al.  An investigation of the nature of parametrization for the Hough transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[132]  Timothy C. Bell,et al.  A corpus for the evaluation of lossless compression algorithms , 1997, Proceedings DCC '97. Data Compression Conference.

[133]  Leon A. Kappelman,et al.  A Comprehensive Model for Assessing the Quality and Productivity of the Information Systems Function: Toward a Theory for Information Systems Assessment , 1997 .

[134]  Alain Glavieux,et al.  Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .

[135]  Nature Team,et al.  Defining Visions in Context: Models, Processes and Tools for Requirements Engineering , 1996, Inf. Syst..

[136]  Ming Zhang On the discretization of parameter domain in Hough transformation , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[137]  A. Walden,et al.  Spectral analysis for physical applications : multitaper and conventional univariate techniques , 1996 .

[138]  Neil A. M. Maiden,et al.  ACRE: selecting methods for requirements acquisition , 1996, Softw. Eng. J..

[139]  Linda A. Macaulay Requirements for requirements engineering techniques , 1996, Proceedings of the Second International Conference on Requirements Engineering.

[140]  Capers Jones Software Change Management , 1996, Computer.

[141]  I. Adimula,et al.  Variations in raindrop size distribution and specific attenuation due to rain in Nigeria , 1996 .

[142]  Stephen B. Vardeman,et al.  Statistics for Engineering Problem Solving. , 1996 .

[143]  P C Lauterbur,et al.  Design and analysis of microcoils for NMR microscopy. , 1995, Journal of magnetic resonance. Series B.

[144]  Khaled El Emam,et al.  A field study of requirements engineering practices in information systems development , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).

[145]  Jack M. Holtzman,et al.  Adaptive averaging methodology for handoffs in cellular systems , 1995 .

[146]  Marc Moeneclaey,et al.  BER sensitivity of OFDM systems to carrier frequency offset and Wiener phase noise , 1995, IEEE Trans. Commun..

[147]  Paul H. Moose,et al.  A technique for orthogonal frequency division multiplexing frequency offset correction , 1994, IEEE Trans. Commun..

[148]  Klaus Pohl,et al.  The three dimensions of requirements engineering: a framework and its applications , 1994, Inf. Syst..

[149]  H. W. Ng,et al.  A novel concept for URD cable fault location , 1994 .

[150]  David Chenho Kung,et al.  Status report: requirements engineering , 1993, IEEE Software.

[151]  F. Kreuger,et al.  Partial discharge. XVIII. Errors in the location of partial discharges in high voltage solid dielectric cables , 1993, IEEE Electrical Insulation Magazine.

[152]  W. L. Weeks,et al.  Estimating the location of partial discharges in cables , 1992 .

[153]  Richard A. Parker,et al.  Designing and Conducting Survey Research: A Comprehensive Guide , 1992 .

[154]  Albert L. Lederer,et al.  Nine management guidelines for better cost estimating , 1992, CACM.

[155]  M. Gudmundson Correlation Model for Shadow Fading in Mobile Radio Systems , 1991 .

[156]  G. Tanimoto,et al.  Temperature dependence of tan delta in polyethylene , 1991, [1991] Proceedings of the 3rd International Conference on Properties and Applications of Dielectric Materials.

[157]  Barry W. Boehm,et al.  Understanding and Controlling Software Costs , 1988, IEEE Trans. Software Eng..

[158]  Barry W. Boehm,et al.  A spiral model of software development and enhancement , 1986, Computer.

[159]  Frederick P. Brooks,et al.  No Silver Bullet: Essence and Accidents of Software Engineering , 1987 .

[160]  Peter Elias,et al.  Interval and recency rank source coding: Two on-line adaptive variable-length schemes , 1987, IEEE Trans. Inf. Theory.

[161]  G. Olalere Ajayi,et al.  Modeling of a tropical raindrop size distribution for microwave and millimeter wave applications , 1985 .

[162]  Barry W. Boehm,et al.  Verifying and Validating Software Requirements and Design Specifications , 1989, IEEE Software.

[163]  F. Moupfouma Improvement of a rain attenuation prediction method for terrestrial microwave links , 1984 .

[164]  Z. Kam,et al.  Absorption and Scattering of Light by Small Particles , 1998 .

[165]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[166]  S. A. Boggs,et al.  Propagation of partial discharge pulses in shielded power cable , 1982, Conference on Electrical Insulation & Dielectric Phenomena - Annual Report 1982.

[167]  D. Thomson,et al.  Spectrum estimation and harmonic analysis , 1982, Proceedings of the IEEE.

[168]  John M. Rushby,et al.  Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.

[169]  P. Biernacki,et al.  Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .

[170]  Donald R. Cooper,et al.  Business Research Methods , 1980 .

[171]  Hirofumi Suzwi,et al.  A Statistical Model for Urban Radio Propagation , 1977 .

[172]  Thomas E. Bell,et al.  Software requirements: Are they really a problem? , 1976, ICSE '76.

[173]  Teofilo C. Ancheta Syndrome-source-coding and its universal generalization , 1976, IEEE Trans. Inf. Theory.

[174]  David A. Patterson,et al.  Computer Architecture: A Quantitative Approach , 1969 .

[175]  Nils J. Nilsson,et al.  A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..

[176]  J. Marshall,et al.  THE DISTRIBUTION OF RAINDROPS WITH SIZE , 1948 .