|
Search for Articles |
|
|
|
|
|
|
|
Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET
Ji-Hoon Kim, Kwang-Jo Lee, Taek-Hun Kim, Sung-Bong Yang
JCSE, vol. 5, no. 1, pp.19-31, 2011 |
 |
|
Preface for KOCSEA Special Issue
Kyung Dong Ryu, Kang-Won Lee, Jihie Kim
JCSE, vol. 5, no. 1, pp.32-32, 2011 |
 |
|
Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure
Jungwoo Ryoo, Eun-A Park
JCSE, vol. 5, no. 1, pp.33-50, 2011 |
 |
|
A Secure Credit Card Transaction Method Based on Kerberos
Jung Eun Kim, Yoohwan Kim
JCSE, vol. 5, no. 1, pp.51-70, 2011 |
 |
|
Identifying Unusual Days
Minkyong Kim, David Kotz
JCSE, vol. 5, no. 1, pp.71-84, 2011 |
 |
|
Applying Formal Methods to Modeling and Analysis of Real-time Data Streams
Krasimira Kapitanova, Yuan Wei, Woochul Kang, Sang H. Son
JCSE, vol. 5, no. 1, pp.85-110, 2011 |
 |
|
The Service-Oriented Metaphor Deciphered
Dirk Draheim
JCSE, vol. 4, no. 4, pp.253-275, 2010 |
 |
|
Evaluating Join Performance on Relational Database Systems
Carlos Ordonez, Javier Garcia-Garcia
JCSE, vol. 4, no. 4, pp.276-290, 2010 |
 |
|
Mutational Data Loading Routines for Human Genome Databases: the BRCA1 Case
Matthijs van der Kroon, Ignacio Lereu Ramirez, Ana M. Levin, Oscar Pastor, Sjaak Brinkkemper
JCSE, vol. 4, no. 4, pp.291-312, 2010 |
 |
|
Formal Models and Algorithms for XML Data Interoperability
Thomas Y. Lee, David W. Cheung
JCSE, vol. 4, no. 4, pp.313-349, 2010 |
 |
|
|
|
|
|
|
|
|
|
|
|