|
Search for Articles |
|
|
|
|
|
|
|
Experimental Evaluation of Unmanned Aerial Vehicle System Software Based on the TMO Model
Hansol Park, Doo-Hyun Kim, Chun-Hyon Chang Jung-Guk Kim
JCSE, vol. 2, no. 4, pp.357-374, 2008 |
|
|
Practical and Verifiable C++ Dynamic Cast for Hard Real-Time Systems
Damian Dechev, Rabi Mahapatra, Bjarne Stroustrup
JCSE, vol. 2, no. 4, pp.375-393, 2008 |
|
|
New Control System Aspects for Supporting Complex Data and High Performance System
Dae-Seung Yoo, Vu Van Tan, Myeong-Jae Yi
JCSE, vol. 2, no. 4, pp.394-411, 2008 |
|
|
IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location-Awareness Services
Baek-Gyu Kim, Soon-Ju Kang
JCSE, vol. 2, no. 4, pp.412-427, 2008 |
|
|
A Semiotics Framework for Analyzing Data Provenance Research
Sudha Ram, Jun Liu
JCSE, vol. 2, no. 3, pp.221-248, 2008 |
|
|
DIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols
Jin Sun, Byung K. Choi Kwang-Mo Jung
JCSE, vol. 2, no. 3, pp.249-273, 2008 |
|
|
An Empirical Evaluation of Test Data Generation Techniques
Seung-Hee Han Yong-Rae Kwon
JCSE, vol. 2, no. 3, pp.274-300, 2008 |
|
|
A Practical Improvement to the Partial Redundancy Elimination in SSA Form
Jongsoo Park Jaejin Lee
JCSE, vol. 2, no. 3, pp.301-320, 2008 |
|
|
Biomedical Ontologies and Text Mining for Biomedicine and Healthcare: A Survey
Illhoi Yoo Min Song
JCSE, vol. 2, no. 2, pp.109-136, 2008 |
|
|
Semantics-aware Obfuscation for Location Privacy
Maria Luisa Damiani, Claudio Silvestri Elisa Bertino
JCSE, vol. 2, no. 2, pp.137-160, 2008 |
|
|
|
|
|
|
|
|
|
|
|
|