default search action
Journal of Computers, Volume 1
Volume 1, Number 1, April 2006
- Tuan Phan, Zhijun He, Thu D. Nguyen:
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions. 1-13 - Min Chen, Taekyoung Kwon, Yong Yuan, Victor C. M. Leung:
Mobile Agent Based Wireless Sensor Networks. 14-21 - Luca Sterpone, Massimo Violante:
Hardening FPGA-based Systems Against SEUs: A New Design Methodology. 22-30 - David M. Horan, Richard A. Guinee:
A Novel Pulse Echo Correlation Tool for Transmission Path Testing and Fault Diagnosis. 31-39 - S. Selvakennedy, Sukunesan Sinnappan:
An Energy-Efficient Clustering Algorithm for Multihop Data Gathering in Wireless Sensor Networks. 40-47 - Asma Ben Letaifa, Sami Tabbane, Zièd Choukair:
A Service Oriented Framework for Multimedia Radio Networks. 48-55
Volume 1, Number 2, May 2006
- Sung-eok Jeon:
Concurrent Failures and Redundant Protection Problem in Hierarchical GMPLS Networks. 1-7 - Tarek R. Sheltami:
Gateway Selection Review in Ad hoc Networks. 8-14 - Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic:
Simulated Annealing based Wireless Sensor Network Localization. 15-22 - Attila Takács, Ákos Kovács, István Gódor, Franz Kalleitner, Hermann Brand, Marcus Ek, Tomas Stefansson, Frank Sjöberg:
The Layer-Independent Descriptor Concept. 23-32 - JungHoon Ha, Jianying Zhou, Sang-Jae Moon:
Improved Double Auction Protocol based on a Hybrid Trust Model. 33-41 - Weiliang Zhao, Vijay Varadharajan, George Bryan:
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing. 42-53
Volume 1, Number 3, June 2006
- Mahalingam Ramkumar:
Broadcast Encryption Using Probabilistic Key Distribution and Applications. 1-12 - Yuuichi Teranishi, Junzo Kamahara, Shinji Shimojo:
MapWiki: A Map-based Content Sharing System for Distributed Location-dependent Information. 13-19 - Hidenao Abe, Takahira Yamaguchi:
A Constructive Meta-Level Feature Selection Method based on Method Repositories. 20-26 - Yasutoshi Yajima, Tien-Fang Kuo:
Efficient Formulations for 1-SVM and their Application to Recommendation Tasks. 27-34 - Chuanjun Li, B. Prabhakaran:
Indexing of Motion Capture Data for Efficient and Fast Similarity Search. 35-42 - Yu Meng, Margaret H. Dunham:
Mining Developing Trends of Dynamic Spatiotemporal Data Streams. 43-50 - Yu Hirate, Hayato Yamana:
Generalized Sequential Pattern Mining with Item Intervals. 51-60
Volume 1, Number 4, July 2006
- Jiangling Guo, Sunanda Mitra, Brian Nutter, Tanja Karp:
Backward Coding of Wavelet Trees with Fine-grained Bitrate Control. 1-7 - Abhinav Srivastava, Shamik Sural, Arun K. Majumdar:
Database Intrusion Detection using Weighted Sequence Mining. 8-17 - Karen H. L. Tso, Lars Schmidt-Thieme:
Empirical Analysis of Attribute-Aware Recommender System Algorithms Using Synthetic Data. 18-29 - Sotiris B. Kotsiantis, Dimitris Kanellopoulos, Panayiotis E. Pintelas:
Local Boosting of Decision Stumps for Regression and Classification Problems. 30-37
Volume 1, Number 5, August 2006
- Yi-Chen Chen:
On Maximum-Likelihood Detection for Non-coherent FH/BFSK in Multitone Jamming. 1-8 - Dirceu Cavendish:
Multimedia Home Ethernets. 9-19 - Åke Östmark, Jens Eliasson, Per Lindgren, Aart van Halteren, Lianne Meppelink:
An Infrastructure for Service Oriented Sensor Networks. 20-29 - Yun Zheng, Chee Keong Kwoh:
Cancer Classification With MicroRNA Expression Patterns Found By An Information Theory Approach. 30-39 - Abdelhak Seriai, Gautier Bastide, Mourad Oussalah:
How To Generate Distributed Software Components From Centralized Ones? 40-52 - Bruno Bouchard, Sylvain Giroux, Abdenour Bouzouane:
A Smart Home Agent for Plan Recognition of Cognitively-impaired Patients. 53-62
Volume 1, Number 6, September 2006
- Stephan Rein, Clemens Gühmann, Frank H. P. Fitzek:
Compression of Short Text on Embedded Systems. 1-10 - Chichao Lu, WenYuan Jen, Weiping Chang, Shihchieh Chou:
Cybercrime & Cybercriminals: An Overview of the Taiwan Experience. 11-18 - Christina E. Evangelou, Nikos I. Karacapilidis, Manolis Tzagarakis:
On the Development of Knowledge Management Services for Collaborative Decision Making. 19-28 - Argyris Arnellos, Spyros Vosinakis, Thomas Spyrou, John Darzentas:
The Emergence of Autonomous Representations in Artificial Agents. 29-36 - Dimitris Magos, Ioannis Mourtos, Leonidas S. Pitsoulis:
The Matching Predicate and a Filtering Scheme Based on Matroids. 37-42 - Paul Rubel, Joseph P. Loyall, Richard E. Schantz, Matthew Gillen:
Fault Tolerance in a Multi-Layered DRE System: A Case Study. 43-52
Volume 1, Number 7, October/November 2006
- Muhammad Shoaib B. Sehgal, Iqbal Gondal, Laurence S. Dooley:
CF-GeNe: Fuzzy Framework for Robust Gene Regulatory Network Inference. 1-8 - Brahim Hamid, Mohamed Mosbah:
A Local Enumeration Protocol in Spite of Corrupted Data. 9-20 - Marianne Morris, Russell Greiner, Jörg Sander, Albert Murtha, Mark Schmidt:
Learning a Classification-based Glioma Growth Model Using MRI Data. 21-31 - Ling Zhuang, Honghua Dai:
Parameter Optimization of Kernel-based One-class Classifier on Imbalance Learning. 32-40 - Junyang Zhou, Joseph Kee-Yin Ng:
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network. 41-50 - Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol:
Biometric Gait Authentication Using Accelerometer Sensor. 51-59 - Cristina Satizábal, Rafael Páez, Jordi Forné:
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture. 60-68 - Josef Schiefer, Gerd Saurer, Alexander Schatten:
Testing Event-Driven Business Processes. 69-80 - José Daniel García, Jesús Carretero, Félix García Carballeira, Javier Fernández, David E. Singh, Alejandro Calderón:
Reliable Partial Replication of Contents in Web Clusters: Getting Storage without losing Reliability. 81-88
Volume 1, Number 8, December 2006
- Kilho Shin, Hiroshi Yasuda:
Practical Anonymous Access Control Protocols for Ubiquitous Computing. 1-12 - Judith E. Y. Rossebø, Rolv Bræk:
A Policy-driven Approach to Dynamic Composition of Authentication and Authorization Patterns and Services. 13-26 - Maurizio Adriano Strangio:
Password-authenticated Key Exchange using Efficient MACs. 27-35 - Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji:
A Method of An Anonymous Authentication For Flat-rate Service. 36-42 - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He:
Symmetric Active/Active High Availability for High-Performance Computing System Services. 43-54 - Akiko Orita:
Online Mutual Aid, "RAQ": A Study of Anonymous and Traceable Interactions. 55-60
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.