ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 International Conference on Trustworthy Systems and their Applications
Latest Publications
TOTAL DOCUMENTS
25
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By IEEE
9781479965663, 9781479965656
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power Plant
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.13
◽
2014
◽
Cited By ~ 5
Author(s):
Yean-Ru Chen
◽
Sao-Jie Chen
◽
Pao-Ann Hsiung
◽
I-Hsin Chou
Keyword(s):
Risk Assessment
◽
Power Plant
◽
Nuclear Power Plant
◽
Nuclear Power
◽
Safety Risk
Download Full-text
Table of contents
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.4
◽
2014
◽
Download Full-text
Program Committee
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.8
◽
2014
◽
Keyword(s):
Program Committee
Download Full-text
Author index
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.23
◽
2014
◽
Download Full-text
Message from the General Chairs
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.5
◽
2014
◽
Download Full-text
An Interactive Software Used in Conferences or Classes Based on the Service Oriented Architecture
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.22
◽
2014
◽
Author(s):
Liang Wang
◽
Li Yao
Keyword(s):
Service Oriented Architecture
◽
Interactive Software
◽
Service Oriented
Download Full-text
Improving Software Maintenance for Pattern-Based Software Development: A Comment Refactoring Approach
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.21
◽
2014
◽
Cited By ~ 3
Author(s):
Jhe-Jyun Guo
◽
Nien-Lin Hsueh
◽
Wen-Tin Lee
◽
Shi-Chuen Hwang
Keyword(s):
Software Development
◽
Software Maintenance
Download Full-text
The Study of Application and Evaluation with NoSQL Databases in Cloud Computing
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.18
◽
2014
◽
Cited By ~ 1
Author(s):
Tse-Chuan Hsu
◽
Dong-Meau Chang
◽
Hsin-Jan Lee
Keyword(s):
Cloud Computing
◽
Nosql Databases
Download Full-text
Keynote: Authenticatable Visual Secret Sharing by Chin-Chen Chang
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.9
◽
2014
◽
Keyword(s):
Secret Sharing
◽
Visual Secret Sharing
Download Full-text
Message from the Program Chair
2014 International Conference on Trustworthy Systems and their Applications
◽
10.1109/tsa.2014.6
◽
2014
◽
Keyword(s):
Program Chair
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close