|
Search for Articles |
|
|
|
|
|
|
|
PHealth Service Deployment Methodology: A Case Study
Cristiano Paggetti, Alberto Rugnone, Elena Tamburini, Chris Nugent
JCSE, vol. 6, no. 1, pp.60-66, 2012 |
 |
|
CardioSentinal: A 24-hour Heart Care and Monitoring System
Min Gao, Qian Zhang, Lionel Ni, Yunhuai Liu, Xiaoxi Tang
JCSE, vol. 6, no. 1, pp.67-78, 2012 |
 |
|
A Technique for Fast Process Creation Based on Creation Location
Byungjin Kim, Youngho Ahn, Ki-Seok Chung
JCSE, vol. 5, no. 4, pp.283-287, 2011 |
 |
|
Review of Korean Speech Act Classification: Machine Learning Methods
Harksoo Kim, Choong-Nyoung Seon, Jungyun Seo
JCSE, vol. 5, no. 4, pp.288-293, 2011 |
 |
|
Load Shedding for Temporal Queries over Data Streams
Mohammed Al-Kateb, Byung Suk Lee
JCSE, vol. 5, no. 4, pp.294-304, 2011 |
 |
|
Intrusion Detection: Supervised Machine Learning
Ahmed H. Fares, Mohamed I. Sharawy, Hala H. Zayed
JCSE, vol. 5, no. 4, pp.305-313, 2011 |
 |
|
Introduction to the Special Issue: Developing Embedded Software Technology for the Smart Mobile Platform
Jong Kim, Gary Geunbae Lee
JCSE, vol. 5, no. 4, pp.314-315, 2011 |
 |
|
Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services
Daehyeok Kim, Wan-Seon Lim, Young-Joo Suh
JCSE, vol. 5, no. 4, pp.316-323, 2011 |
 |
|
Fast Retransmission Scheme for Overcoming Hidden Node Problem in IEEE 802.11 Networks
Junghwi Jeon, Chulmin Kim, Kiseok Lee, Cheeha Kim
JCSE, vol. 5, no. 4, pp.324-330, 2011 |
 |
|
Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment
Wooram Park, Chanik Park
JCSE, vol. 5, no. 4, pp.331-337, 2011 |
 |
|
|
|
|
|
|
|
|
|
|
|