|
Search for Articles |
|
|
|
|
|
|
|
Back Matter (Instructions for Authors, Back Cover)
.
JCSE, vol. 7, no. 1, pp.81-81, 2013 |
 |
|
Design and Implementation of a Framework for Context-Aware Preference Queries
Patrick Roocks, Markus Endres, Alfons Huhn, Werner KieBling, Stefan Mandl
JCSE, vol. 6, no. 4, pp.243-256, 2012 |
 |
|
Design Methodologies for Reliable Clock Networks
Deokjin Joo, Minseok Kang, Taewhan Kim
JCSE, vol. 6, no. 4, pp.257-266, 2012 |
 |
|
Static Timing Analysis of Shared Caches for Multicore Processors
Wei Zhang, Jun Yan
JCSE, vol. 6, no. 4, pp.267-278, 2012 |
 |
|
Preface to KOCSEA Special Issue
Jungwoo Ryoo, Yoohwan Kim, Yoonsuck Choe, Bongjun Ko, Taek Jin Kwon
JCSE, vol. 6, no. 4, pp.279-279, 2012 |
 |
|
High Performance Computing: Infrastructure, Application, and Operation
Byung-Hoon Park, Youngjae Kim, Byoung-Do Kim, Taeyoung Hong, Sungjun Kim, John K. Lee
JCSE, vol. 6, no. 4, pp.280-286, 2012 |
 |
|
A Comparative Performance Study for Compute Node Sharing
Jeho Park, Shui F. Lam
JCSE, vol. 6, no. 4, pp.287-293, 2012 |
 |
|
Computational Methods for On-Node Performance Optimization and Inter-Node Scalability of HPC Applications
Byoung-Do Kim, Carlos Rosales-Fernandez, Sungho Kim
JCSE, vol. 6, no. 4, pp.294-309, 2012 |
 |
|
Algorithm for Improving the Computing Power of Next Generation Wireless Receivers
Syed S. Rizvi
JCSE, vol. 6, no. 4, pp.310-319, 2012 |
 |
|
Protecting the iTrust Information Retrieval Network against Malicious Attacks
Yung-Ting Chuang, P. Michael Melliar-Smith, Louise E. Moser, Isai Michel Lombera
JCSE, vol. 6, no. 3, pp.179-192, 2012 |
 |
|
|
|
|
|
|
|
|
|
|
|