Secretary and Head Office
暂无分享,去创建一个
B. Dwolatzky | M. Delimar | Laurette Pretorius | F. Rattay | D. Foty | B. M. Lacquet | Saurabh Sinha | S. Maharaj | O. Holland | F. Takawira | E. Golovins | M. Weststrate | A. van der Merwe | E. Barnard | B. Yuksel | T. van Niekerk | R. Geschke | B. Jokanović | B. Bonham | W. Boeck | G. De Jager | B. Downing | W. Drury | O. Flower | A. Petroianu | F. Rattay | D. Foty | F. Takawira | L. Pretorius | B. Dwolatzky | M. Delimar | E. Golovins | B. Lacquet | A. V. D. Merwe | B. Jokanović | S. Sinha | S. Maharaj | O. Holland | M. Weststrate | E. Barnard | B. Yuksel | T. V. Niekerk | R. Geschke | B. Bonham | W. Boeck | G. Jager | B. Downing | W. Drury | O. Flower | A. Petroianu | A. Merwe
[1] Victor R. Kebande,et al. A Cloud Forensic Readiness Model Using a Botnet as a Service , 2014 .
[2] Lidija Pulevska-Ivanovska,et al. Implementation of e-Supply Chain Management , 2013 .
[3] Jyri Rajamäki,et al. Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement , 2013, 2013 European Intelligence and Security Informatics Conference.
[4] Gerhard Fettweis,et al. Towards complexity-reduced Soft-Input Soft-Output Sphere Detection , 2013 .
[5] Seokho Yoon,et al. On Frequency Offset Estimation for OFDM , 2013, IEEE Transactions on Wireless Communications.
[6] Hein S. Venter,et al. The architecture of a digital forensic readiness management system , 2013, Comput. Secur..
[7] Jing Xu,et al. Kalman interpolation filter for channel estimation of LTE downlink in high-mobility environments , 2012, EURASIP J. Wirel. Commun. Netw..
[8] Mark Vinkovits. Towards requirements for trust management , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[9] M. Fotuhi-Firuzabad,et al. Reliability Study of HV Substations Equipped With the Fault Current Limiter , 2012, IEEE Transactions on Power Delivery.
[10] Shengzhi Du,et al. High accuracy Hough transform based on butterfly symmetry , 2012 .
[11] Fabiola Baltar,et al. Social research 2.0: virtual snowball sampling method using Facebook , 2012, Internet Res..
[12] Charles J. Mozina. Impact of smart grid and green power generation on distribution systems , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[13] T. Afullo,et al. THREE - PARAMETER RAINDROP SIZE DISTRIBUTION MODELING FOR MICROWAVE PROPAGATION IN SOUTH AFRICA , 2012 .
[14] T. Afullo,et al. Seasonal Analysis and Prediction of Rainfall Effects in Eastern South Africa at Microwave Frequencies , 2012 .
[15] Christoph Meinel,et al. Towards Context-Aware Service-Oriented Semantic Reputation Framework , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[16] B. T. Maharaj,et al. Turbo STFC decoding with the Zero Forcing decoder , 2011, IEEE Africon '11.
[17] Hamid Jafarkhani,et al. Secure space-time block coding via artificial noise alignment , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[18] Min Jee Kim,et al. The application of fault current limiter at Icheon substation in Korea , 2011, 2011 1st International Conference on Electric Power Equipment - Switching Technology.
[19] Mark Woodman,et al. Success Dimensions in Selecting Cloud Software Services , 2011, 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications.
[20] Neil A. M. Maiden,et al. What are the day-to-day factors that are preventing business analysts from effective business analysis? , 2011, 2011 IEEE 19th International Requirements Engineering Conference.
[21] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[22] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[23] Ana Benarroch,et al. Propagation in the Ka Band: Experimental Characterization for Satellite Applications , 2011, IEEE Antennas and Propagation Magazine.
[24] Eoghan Casey,et al. Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .
[25] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[26] Shijun Liu,et al. A Well-designed SaaS Application Platform Based on Model-driven Approach , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[27] Maryse Marpsat,et al. Survey Methods for Hard-to-Reach Populations: Introduction to the Special Issue , 2010 .
[28] Mihaela Ulieru,et al. The State of the Art in Trust and Reputation Systems: A Framework for Comparison , 2010, J. Theor. Appl. Electron. Commer. Res..
[29] Ismael Ripoll,et al. Partitioned Embedded Architecture Based on Hypervisor: The XtratuM Approach , 2010, 2010 European Dependable Computing Conference.
[30] Johann E. W. Holm,et al. Systems Engineering Training in Engineering Education , 2010, 2010 IEEE Transforming Engineering Education: Creating Interdisciplinary Skills for Complex Global Environments.
[31] Tatsuo Nakajima,et al. SIGMA System: A Multi-OS Environment for Embedded Systems , 2010, J. Signal Process. Syst..
[32] J. S. Bhullar,et al. A Huffman Codes Based Approach to Achieve Minimum Redundancy , 2010, 2010 Second International Conference on Computer Modeling and Simulation.
[33] E.F. El-Saadany,et al. Optimal Renewable Resources Mix for Distribution System Energy Loss Minimization , 2010, IEEE Transactions on Power Systems.
[34] M. Lehtonen,et al. Determining wave propagation characteristics of MV XLPE power cable using time domain reflectometry technique , 2009, 2009 International Conference on Electrical and Electronics Engineering - ELECO 2009.
[35] J. Garcia-Frías,et al. Non-linear graph-based codes for source coding , 2009, 2009 IEEE Information Theory Workshop.
[36] Cheng Huiping. An Integration Framework of ERM, SCM, CRM , 2009, 2009 International Conference on Management and Service Science.
[37] Kumbesan Sandrasegaran,et al. Modeling and simulation of packet scheduling in the downlink long term evolution system , 2009, 2009 15th Asia-Pacific Conference on Communications.
[38] J. Barros,et al. Joint compression and data protection , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[39] Carl Johan Wallnerström,et al. Risk management applied to electrical distribution systems , 2009 .
[40] Midori Sugaya,et al. Constructing a Multi-OS Platform with Minimal Engineering Cost , 2009, IESS.
[41] Hancheng Liao. Design of SaaS-Based Software Architecture , 2009, 2009 International Conference on New Trends in Information and Service Science.
[42] F. G. Marmol,et al. TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[43] Jacob Ziv,et al. The Universal LZ77 Compression Algorithm Is Essentially Optimal for Individual Finite-Length $N$-Blocks , 2009, IEEE Transactions on Information Theory.
[44] W. Randeu,et al. Diurnal Variation of Rain Attenuation Obtained From Measurement of Raindrop Size Distribution in Equatorial Indonesia , 2009, IEEE Transactions on Antennas and Propagation.
[45] Trung Dong Huynh,et al. A personalized framework for trust assessment , 2009, SAC '09.
[46] L. Luini,et al. A New Prediction Model of Rain Attenuation That Separately Accounts for Stratiform and Convective Rain , 2009, IEEE Transactions on Antennas and Propagation.
[47] Riccardo Zecchina,et al. Efficient LDPC codes over GF(q) for lossy data compression , 2009, 2009 IEEE International Symposium on Information Theory.
[48] Betty H. C. Cheng,et al. Current and Future Research Directions in Requirements Engineering , 2009 .
[49] Arturo Molina,et al. Application Development over Software-as-a-Service Platforms , 2008, 2008 The Third International Conference on Software Engineering Advances.
[50] Bodhaswar T. Maharaj,et al. Decremental Redundancy Compression with Fountain Codes , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[51] K. Manivannan,et al. Performance analysis of fast handoff algorithms using local averaging technique in cellular networks , 2008, 2008 First International Conference on Distributed Framework and Applications.
[52] Khaled El Emam,et al. A Replicated Survey of IT Software Project Failures , 2008, IEEE Software.
[53] I.S. Oh,et al. Practical Application Issues of Superconducting Fault Current Limiters for Electric Power Systems , 2008, IEEE Transactions on Applied Superconductivity.
[54] Helmut Bölcskei,et al. Soft-output sphere decoding: algorithms and VLSI implementation , 2008, IEEE Journal on Selected Areas in Communications.
[55] U. Wallrabe,et al. Solenoidal micro coils manufactured with a wire bonder , 2008, 2008 IEEE 21st International Conference on Micro Electro Mechanical Systems.
[56] Rodney McKemmish,et al. When is Digital Evidence Forensically Sound? , 2008, IFIP Int. Conf. Digital Forensics.
[57] Nicholas Berente,et al. Requirements in the 21st Century: Current Practice and Emerging Trends , 2008, Perspectives Workshop: Science of Design: High-Impact Requirements for Software-Intensive Systems.
[58] Preben E. Mogensen,et al. Performance Analysis of Handover Measurements and Layer 3 Filtering for Utran LTE , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[59] Tetsuo Tamai,et al. How Does Requirements Quality Relate to Project Success or Failure? , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).
[60] Preben E. Mogensen,et al. Performance Evaluation of Received Signal Strength Based Hard Handover for UTRAN LTE , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[61] Manfred Broy,et al. Engineering Automotive Software , 2007, Proceedings of the IEEE.
[62] Radivoje Popovic,et al. Microfabricated solenoids and Helmholtz coils for NMR spectroscopy of mammalian cells. , 2007, Lab on a chip.
[63] Xiang-Gen Xia,et al. High-Rate Full-Diversity Space–Time–Frequency Codes for Broadband MIMO Block-Fading Channels , 2007, IEEE Transactions on Communications.
[64] Radu Jurca,et al. TRUTHFUL REPUTATION MECHANISMS FOR ONLINE SYSTEMS , 2007 .
[65] Sangyeun Cho,et al. Managing Distributed, Shared L2 Caches through OS-Level Page Allocation , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[66] H. Edin,et al. On-line time domain reflectometry measurements of temperature variations of an XLPE power cable , 2006, 2006 IEEE Conference on Electrical Insulation and Dielectric Phenomena.
[67] Masato Edahiro,et al. VIRTUS: a new processor virtualization architecture for security-oriented next-generation mobile terminals , 2006, 2006 43rd ACM/IEEE Design Automation Conference.
[68] Barry Boehm,et al. A view of 20th and 21st century software engineering , 2006, ICSE.
[69] Georgios B. Giannakis,et al. Approaching MIMO channel capacity with soft detection based on hard sphere decoding , 2006, IEEE Transactions on Communications.
[70] Nicolas Dütsch. Code optimisation for lossless compression of binary memoryless sources based on FEC codes , 2006, Eur. Trans. Telecommun..
[71] P. Owolawi,et al. RAINFALL RATE MODELING FOR LOS RADIO SYSTEMS IN SOUTH AFRICA , 2006 .
[72] Weisong Shi,et al. Performance evaluation of rating aggregation algorithms in reputation systems , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[73] Didar Zowghi,et al. Requirements Elicitation: A Survey of Techniques, Approaches, and Tools , 2005 .
[74] Holger Claussen,et al. Efficient modelling of channel maps with correlated shadow fading in mobile radio systems , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[75] G. Matz,et al. On non-WSSUS wireless fading channels , 2005, IEEE Transactions on Wireless Communications.
[76] Deepak Gupta,et al. The Network Monitoring Tool - PickPacket , 2005, ICITA.
[77] Regina Gonzales. Developing the Requirements Discipline: Software vs. Systems , 2005, IEEE Softw..
[78] Christian Denger,et al. Quality Assurance in Requirements Engineering , 2005 .
[79] Claes Wohlin,et al. Requirements Engineering: Setting the Context , 2005 .
[80] Barbara Paech,et al. An Analysis of Empirical Requirements Engineering Survey Data , 2005 .
[81] J Jeroen Veen,et al. On-line signal analysis of partial discharges in medium-voltage power cables , 2005 .
[82] G.M. Uchenick,et al. Multiple independent levels of safety and security: high assurance architecture for MSLS/MLS , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[83] Stéphane Perrin,et al. Multisensor fusion in the frame of evidence theory for landmines detection , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[84] S. Kim,et al. Fair cache sharing and partitioning in a chip multiprocessor architecture , 2004, Proceedings. 13th International Conference on Parallel Architecture and Compilation Techniques, 2004. PACT 2004..
[85] Luigi Carro,et al. Strategies for the integration of hardware and software IP components in embedded systems-on-chip , 2004, Integr..
[86] L. Lundheim,et al. Evaluation of methods for ground bounce removal in GPR utility mapping , 2004, Proceedings of the Tenth International Conference on Grounds Penetrating Radar, 2004. GPR 2004..
[87] Alan M. Davis,et al. A Unified Model of Requirements Elicitation , 2004, J. Manag. Inf. Syst..
[88] A. Bryman,et al. Business Research Methods , 2004 .
[89] Carol Tenopir,et al. Communication Patterns of Engineers , 2004 .
[90] Jim Alves-Foss,et al. A multi-layered approach to security in high assurance systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[91] Robert Rowlingson,et al. A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..
[92] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[93] Stefan Biffl,et al. Software Reviews: The State of the Practice , 2003, IEEE Softw..
[94] Colin J. Neill,et al. Requirements Engineering: The State of the Practice , 2003, IEEE Softw..
[95] Shlomo Shamai,et al. A new data compression algorithm for sources with memory based on error correcting codes , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[96] J. Sitzia,et al. Good practice in the conduct and reporting of survey research. , 2003, International journal for quality in health care : journal of the International Society for Quality in Health Care.
[97] Gamantyo Hendrantoro,et al. Derivation of parameters of Y-Z power-law relation from raindrop size distribution measurements and its application in the calculation of rain attenuation from radar reflectivity factor measurements , 2003 .
[98] Alan M. Davis,et al. Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[99] Jörg Schäuffele,et al. Automotive Software Engineering , 2003 .
[100] Giuseppe Caire. Universal data compression with LDPC codes , 2003 .
[101] Shlomo Shamai,et al. Fountain codes for lossless data compression , 2003, Algebraic Coding Theory and Information Theory.
[102] マイケル, ジー. ルビー,,et al. Multistage code generator and decoder for communication systems , 2002 .
[103] Ying Zhao,et al. Compression of binary memoryless sources using punctured turbo codes , 2002, IEEE Communications Letters.
[104] Jin Teong Ong,et al. Raindrop size distribution using method of moments for terrestrial and satellite communication applications in Singapore , 2002 .
[105] Winfried Lamersdorf,et al. Transactional Security for a Distributed Reputation Management System , 2002, EC-Web.
[106] E. L. Nichols,et al. Supply Chain Redesign: Transforming Supply Chains into Integrated Value Systems , 2002 .
[107] Patrick Mitran,et al. Turbo source coding: a noise-robust approach to data compression , 2002, Proceedings DCC 2002. Data Compression Conference.
[108] O. Fiser. The role of particular rain drop size classes on specific rain attenuation at various frequencies with Czech data example , 2002 .
[109] Barry W. Boehm,et al. Get Ready for Agile Methods, with Care , 2002, Computer.
[110] Suzanne Robertson,et al. Requirements trawling: techniques for discovering requirements , 2001, Int. J. Hum. Comput. Stud..
[111] Seokho Yoon,et al. An efficient frequency offset estimator for OFDM systems and its performance characteristics , 2001, IEEE Trans. Veh. Technol..
[112] Barbara A. Kitchenham,et al. Using Card Sorts to Elicit Web Page Quality Attributes , 2001, IEEE Softw..
[113] Franz Lehner,et al. Requirements Engineering as a Success Factor in Software Projects , 2001, IEEE Softw..
[114] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[115] Umberto Mengali,et al. Feedback frequency synchronization for OFDM applications , 2001, IEEE Communications Letters.
[116] Douglas C. Schmidt,et al. Middleware for Distributed Systems Evolving the Common Structure for Network-centric Applications , 2001 .
[117] Kristin A. Farry,et al. Customer Centered Products: Creating Successful Products Through Smart Requirements Management (Продукты для клиента: создание успешных продуктов с помощью грамотного управления требованиями) , 2000 .
[118] Frank Houdek,et al. Analyzing requirements engineering processes: a case study , 2000, Proceedings 11th International Workshop on Database and Expert Systems Applications.
[119] Axel van Lamsweerde,et al. Requirements engineering in the year 00: a research perspective , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[120] Cumulative distributions of rainfall rate and microwave attenuation in Singapore's tropical region , 2000 .
[121] Bashar Nuseibeh,et al. Requirements engineering: a roadmap , 2000, ICSE '00.
[122] Roy Fielding,et al. Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .
[123] Suzanne Robertson,et al. Mastering the Requirements Process , 1999 .
[124] Tom Rodden,et al. Human factors in requirements engineering: A survey of human sciences literature relevant to the improvement of dependable systems development processes , 1999, Interact. Comput..
[125] Opas Chutatape,et al. Influence of discretization in image space on Hough transform , 1999, Pattern Recognit..
[126] Umberto Mengali,et al. An improved frequency offset estimator for OFDM applications , 1999, IEEE Communications Letters.
[127] Siavash M. Alamouti,et al. A simple transmit diversity technique for wireless communications , 1998, IEEE J. Sel. Areas Commun..
[128] Ian Sommerville,et al. Requirements Engineering: Processes and Techniques , 1998 .
[129] David Veshosky,et al. MANAGING INNOVATION INFORMATION IN ENGINEERING AND CONSTRUCTION FIRMS , 1998 .
[130] Per Ola Börjesson,et al. ML estimation of time and frequency offset in OFDM systems , 1997, IEEE Trans. Signal Process..
[131] S. Y. Yuen,et al. An investigation of the nature of parametrization for the Hough transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[132] Timothy C. Bell,et al. A corpus for the evaluation of lossless compression algorithms , 1997, Proceedings DCC '97. Data Compression Conference.
[133] Leon A. Kappelman,et al. A Comprehensive Model for Assessing the Quality and Productivity of the Information Systems Function: Toward a Theory for Information Systems Assessment , 1997 .
[134] Alain Glavieux,et al. Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .
[135] Nature Team,et al. Defining Visions in Context: Models, Processes and Tools for Requirements Engineering , 1996, Inf. Syst..
[136] Ming Zhang. On the discretization of parameter domain in Hough transformation , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[137] A. Walden,et al. Spectral analysis for physical applications : multitaper and conventional univariate techniques , 1996 .
[138] Neil A. M. Maiden,et al. ACRE: selecting methods for requirements acquisition , 1996, Softw. Eng. J..
[139] Linda A. Macaulay. Requirements for requirements engineering techniques , 1996, Proceedings of the Second International Conference on Requirements Engineering.
[140] Capers Jones. Software Change Management , 1996, Computer.
[141] I. Adimula,et al. Variations in raindrop size distribution and specific attenuation due to rain in Nigeria , 1996 .
[142] Stephen B. Vardeman,et al. Statistics for Engineering Problem Solving. , 1996 .
[143] P C Lauterbur,et al. Design and analysis of microcoils for NMR microscopy. , 1995, Journal of magnetic resonance. Series B.
[144] Khaled El Emam,et al. A field study of requirements engineering practices in information systems development , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).
[145] Jack M. Holtzman,et al. Adaptive averaging methodology for handoffs in cellular systems , 1995 .
[146] Marc Moeneclaey,et al. BER sensitivity of OFDM systems to carrier frequency offset and Wiener phase noise , 1995, IEEE Trans. Commun..
[147] Paul H. Moose,et al. A technique for orthogonal frequency division multiplexing frequency offset correction , 1994, IEEE Trans. Commun..
[148] Klaus Pohl,et al. The three dimensions of requirements engineering: a framework and its applications , 1994, Inf. Syst..
[149] H. W. Ng,et al. A novel concept for URD cable fault location , 1994 .
[150] David Chenho Kung,et al. Status report: requirements engineering , 1993, IEEE Software.
[151] F. Kreuger,et al. Partial discharge. XVIII. Errors in the location of partial discharges in high voltage solid dielectric cables , 1993, IEEE Electrical Insulation Magazine.
[152] W. L. Weeks,et al. Estimating the location of partial discharges in cables , 1992 .
[153] Richard A. Parker,et al. Designing and Conducting Survey Research: A Comprehensive Guide , 1992 .
[154] Albert L. Lederer,et al. Nine management guidelines for better cost estimating , 1992, CACM.
[155] M. Gudmundson. Correlation Model for Shadow Fading in Mobile Radio Systems , 1991 .
[156] G. Tanimoto,et al. Temperature dependence of tan delta in polyethylene , 1991, [1991] Proceedings of the 3rd International Conference on Properties and Applications of Dielectric Materials.
[157] Barry W. Boehm,et al. Understanding and Controlling Software Costs , 1988, IEEE Trans. Software Eng..
[158] Barry W. Boehm,et al. A spiral model of software development and enhancement , 1986, Computer.
[159] Frederick P. Brooks,et al. No Silver Bullet: Essence and Accidents of Software Engineering , 1987 .
[160] Peter Elias,et al. Interval and recency rank source coding: Two on-line adaptive variable-length schemes , 1987, IEEE Trans. Inf. Theory.
[161] G. Olalere Ajayi,et al. Modeling of a tropical raindrop size distribution for microwave and millimeter wave applications , 1985 .
[162] Barry W. Boehm,et al. Verifying and Validating Software Requirements and Design Specifications , 1989, IEEE Software.
[163] F. Moupfouma. Improvement of a rain attenuation prediction method for terrestrial microwave links , 1984 .
[164] Z. Kam,et al. Absorption and Scattering of Light by Small Particles , 1998 .
[165] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[166] S. A. Boggs,et al. Propagation of partial discharge pulses in shielded power cable , 1982, Conference on Electrical Insulation & Dielectric Phenomena - Annual Report 1982.
[167] D. Thomson,et al. Spectrum estimation and harmonic analysis , 1982, Proceedings of the IEEE.
[168] John M. Rushby,et al. Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.
[169] P. Biernacki,et al. Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .
[170] Donald R. Cooper,et al. Business Research Methods , 1980 .
[171] Hirofumi Suzwi,et al. A Statistical Model for Urban Radio Propagation , 1977 .
[172] Thomas E. Bell,et al. Software requirements: Are they really a problem? , 1976, ICSE '76.
[173] Teofilo C. Ancheta. Syndrome-source-coding and its universal generalization , 1976, IEEE Trans. Inf. Theory.
[174] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[175] Nils J. Nilsson,et al. A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..
[176] J. Marshall,et al. THE DISTRIBUTION OF RAINDROPS WITH SIZE , 1948 .