default search action
Journal of Systems and Software (JSS), Volume 73
Volume 73, Nubmer 1, September 2004
- Helen D. Karatza:
Performance modeling and analysis of computer systems and networks. 1-2 - Demetres D. Kouvatsos, Is-Haka Mkwawa:
Broadcasting schemes for hypercubes with background traffic. 3-14 - Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé:
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks. 15-29 - Konstantinos G. Zerfiridis, Helen D. Karatza:
File distribution using a peer-to-peer network--a simulation study. 31-44 - Lieven Eeckhout, Koenraad De Bosschere:
How accurate should early design stage power/performance tools be? A case study with statistical simulation. 45-62 - Christopher L. Barrett, Madhav V. Marathe, D. Charles Engelhart, Anand Sivasubramaniam:
Approximating the connectivity between nodes when simulating large-scale mobile ad hoc radio networks. 63-74 - Peng Li, Binoy Ravindran:
Proactive QoS negotiation in asynchronous real-time distributed systems. 75-88 - Moonju Park, Yookun Cho:
Feasibility analysis of hard real-time periodic tasks. 89-100 - Yong-Jin Choi, Jun-Ki Min, Chin-Wan Chung:
A cost model for spatio-temporal queries using the TPR-tree. 101-112 - Gulay Ünel, Mehmet Emin Dönderler, Özgür Ulusoy, Ugur Güdükbay:
An efficient query optimization strategy for spatio-temporal queries in video databases. 113-131 - Cheng-Fa Tsai, Chun-Wei Tsai, Han-Chang Wu, Tzer Yang:
ACODF: a novel data clustering approach for data mining in large databases. 133-145 - Jack Lukaszuk, Ratko Orlandic:
On accessing data in high-dimensional spaces: A comparative study of three space partitioning strategies. 147-157 - Robert Wing Pong Luk, Tharam S. Dillon, Vincent T. Y. Ng:
Supporting metasearch with XSL. 159-168 - Jae-Joon Hwang, Kyu-Young Whang, Yang-Sae Moon, Byung Suk Lee:
A top-down approach for density-based clustering using multidimensional indexes. 169-180
Volume 73, Nubmer 2, October 2004
- Khaled El Emam, Anita D. Carleton:
Applications of statistics in software engineering. 181-182 - James Miller:
Statistical significance testing--a panacea for software technology experiments? . 183-192 - Chin-Feng Fan, Yuan-Chang Yu:
BBN-based software project risk management. 193-203 - Lionel C. Briand, Bernd G. Freimut, Ferdinand Vollei:
Using multiple adaptive regression splines to support decision making in code inspections. 205-217 - Stacy J. Prowell, Jesse H. Poore:
Computing system reliability using Markov chain usage models. 219-225 - Chung-Horng Lung, Marzia Zaman, Amit Nandi:
Applications of clustering techniques to software partitioning, recovery and restructuring. 227-244 - Derek L. Nazareth, Marcus A. Rothenberger:
Assessing the cost-effectiveness of software reuse: A model for planned reuse. 245-255 - Thomas Thelin, Håkan Petersson, Per Runeson, Claes Wohlin:
Applying sampling to improve software inspections. 257-269 - Hongchen Li, Yun Yang, Tsong Yueh Chen:
Resource constraints analysis of workflow specifications. 271-285 - Ahmed Seffah, Peter Forbrig, Homa Javahery:
Multi-devices "Multiple" user interfaces: development models and research opportunities. 287-300 - Ronald F. Ayres:
A simple and powerful type system for programming languages. 301-311 - Soheil Khajenoori, Lorenz Prem, Karen Stevens, Ban Seng Keng, Nader Kameli:
Knowledge centered assessment pattern: an effective tool for assessing safety concerns in software architecture. 313-322 - Justin Clark, Chris Clarke, Stefano De Panfilis, Giampiero Granatella, Paolo Predonzani, Alberto Sillitti, Giancarlo Succi, Tullio Vernazza:
Selecting components in large COTS repositories. 323-331 - Ivan Mathias Filho, Toacy Cavalcante de Oliveira, Carlos José Pereira de Lucena:
A framework instantiation approach based on the Features Model. 333-349 - SeDo Sohn, PoongHyun Seong:
Quantitative evaluation of safety critical software testability based on fault tree analysis and entropy. 351-360 - Diane Kelly, Terry Shepard:
Task-directed software inspection. 361-368
Volume 73, Number 3, November-December 2004
- Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature. 369-373 - Duen-Ren Liu, Mei-Yu Wu, Shu-Teng Lee:
Role-based authorizations for workflow systems in support of task-based separation of duty. 375-387 - Hai Zhuge:
Fuzzy resource space model and platform. 389-396 - Hui-Feng Huang, Chin-Chen Chang:
A new design of efficient partially blind signature scheme. 397-403 - Chang-Chou Lin, Wen-Hsiang Tsai:
Secret image sharing with steganography and authentication. 405-414 - Shyh-Kwei Chen, Trieu C. Chieu, Shiwa S. Fu, Yew-Huey Liu, Florian Pinel, Jih-Shyr Yih:
A practical experience in workspace separation for developing multiple storefronts on customized commerce engines. 415-424 - Shih-Chien Chou:
Providing flexible access control to an information flow control model. 425-439 - Namgyu Kim, Songchun Moon, Yonglak Sohn:
Secure one snapshot protocol for concurrency control in real-time stock trading systems. 441-454 - Hai Zhuge:
Retrieve images by understanding semantic links and clustering image fragments. 455-466 - Evimaria Terzi, Athena Vakali, Lefteris Angelis:
A simulated annealing approach for multimedia data placement. 467-480 - Jun Wook Lee, Ok Hyun Paek, Keun Ho Ryu:
Temporal moving pattern mining for location-based service. 481-490 - Jorng-Tzong Horng, Feng-Mao Lin, Li-Cheng Wu, Chia-Hui Chang:
Performance evaluation of a database of repetitive elements in complete genomes. 491-506 - Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang:
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. 507-514 - Sheau-Ru Tong, Yuan-Tse Yu, Chung-Ming Huang:
A video caching policy for providing differentiated service grades and maximizing system revenue in hierarchical video servers. 515-531 - Seongoun Hwang, Kisong Yoon, Kyung Pyo Jun, Kwang Hyung Lee:
Modeling and implementation of digital rights. 533-549 - Jin Hyun Son, Myoung-Ho Kim:
An adaptable vertical partitioning method in distributed systems. 551-561
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.