Content
New articles – 5/2024
pp. 1029–1052, doi: 10.31577/cai_2024_5_1029
pp. 1053–1083, doi: 10.31577/cai_2024_5_1053
Secure and Efficient Blockchain Scheme for Resource Optimization in Internet of Things (IoT) Systems
pp. 1084–1110, doi: 10.31577/cai_2024_5_1084
pp. 1111–1136, doi: 10.31577/cai_2024_5_1111
pp. 1137–1160, doi: 10.31577/cai_2024_5_1137
pp. 1161–1184, doi: 10.31577/cai_2024_5_1161
pp. 1185–1218, doi: 10.31577/cai_2024_5_1185
pp. 1219–1233, doi: 10.31577/cai_2024_5_1219
Exploring the Impact of Security-Based Non-Functional Requirements on Early Software Size Estimation
pp. 1234–1255, doi: 10.31577/cai_2024_5_1234
pp. 1256–1284, doi: 10.31577/cai_2024_5_1256
New articles – full versions – 5/2024
Full articles are available after 1 year.
pp. 1029–1052, doi: 10.31577/cai_2024_5_1029
pp. 1053–1083, doi: 10.31577/cai_2024_5_1053
Secure and Efficient Blockchain Scheme for Resource Optimization in Internet of Things (IoT) Systems
pp. 1084–1110, doi: 10.31577/cai_2024_5_1084
pp. 1111–1136, doi: 10.31577/cai_2024_5_1111
pp. 1137–1160, doi: 10.31577/cai_2024_5_1137
pp. 1161–1184, doi: 10.31577/cai_2024_5_1161
pp. 1185–1218, doi: 10.31577/cai_2024_5_1185
pp. 1219–1233, doi: 10.31577/cai_2024_5_1219
Exploring the Impact of Security-Based Non-Functional Requirements on Early Software Size Estimation
pp. 1234–1255, doi: 10.31577/cai_2024_5_1234
pp. 1256–1284, doi: 10.31577/cai_2024_5_1256