|
Search for Articles |
|
|
|
|
|
|
|
An Interference Matrix Based Approach to Bounding Worst-Case Inter-Thread Cache Interferences and WCET for Multi-Core Processors
Jun Yan, Wei Zhang
JCSE, vol. 5, no. 2, pp.131-140, 2011 |
|
|
Ubiscript: A Script Language for Ubiquitous Environment
Minkyu Lee, Dongsoo Han
JCSE, vol. 5, no. 2, pp.141-149, 2011 |
|
|
Issues and Empirical Results for Improving Text Classification
Youngjoong Ko, Jungyun Seo
JCSE, vol. 5, no. 2, pp.150-160, 2011 |
|
|
Bounding Worst-Case Performance for Multi-Core Processors with Shared L2 Instruction Caches
Jun Yan, Wei Zhang
JCSE, vol. 5, no. 1, pp.1-18, 2011 |
|
|
Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET
Ji-Hoon Kim, Kwang-Jo Lee, Taek-Hun Kim, Sung-Bong Yang
JCSE, vol. 5, no. 1, pp.19-31, 2011 |
|
|
Preface for KOCSEA Special Issue
Kyung Dong Ryu, Kang-Won Lee, Jihie Kim
JCSE, vol. 5, no. 1, pp.32-32, 2011 |
|
|
Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure
Jungwoo Ryoo, Eun-A Park
JCSE, vol. 5, no. 1, pp.33-50, 2011 |
|
|
A Secure Credit Card Transaction Method Based on Kerberos
Jung Eun Kim, Yoohwan Kim
JCSE, vol. 5, no. 1, pp.51-70, 2011 |
|
|
Identifying Unusual Days
Minkyong Kim, David Kotz
JCSE, vol. 5, no. 1, pp.71-84, 2011 |
|
|
Applying Formal Methods to Modeling and Analysis of Real-time Data Streams
Krasimira Kapitanova, Yuan Wei, Woochul Kang, Sang H. Son
JCSE, vol. 5, no. 1, pp.85-110, 2011 |
|
|
|
|
|
|
|
|
|
|
|
|