|
Back Issues |
|
|
|
JCSE, Volume 5, Number 1, March, 2011
|
|
|
Bounding Worst-Case Performance for Multi-Core Processors with Shared L2 Instruction Caches
Jun Yan, Wei Zhang
JCSE, vol. 5, no. 1, pp.1-18, March, 2011 |
|
|
|
Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET
Ji-Hoon Kim, Kwang-Jo Lee, Taek-Hun Kim, Sung-Bong Yang
JCSE, vol. 5, no. 1, pp.19-31, March, 2011 |
|
|
|
Preface for KOCSEA Special Issue
Kyung Dong Ryu, Kang-Won Lee, Jihie Kim
JCSE, vol. 5, no. 1, pp.32-32, March, 2011 |
|
|
|
Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure
Jungwoo Ryoo, Eun-A Park
JCSE, vol. 5, no. 1, pp.33-50, March, 2011 |
|
|
|
A Secure Credit Card Transaction Method Based on Kerberos
Jung Eun Kim, Yoohwan Kim
JCSE, vol. 5, no. 1, pp.51-70, March, 2011 |
|
|
|
Identifying Unusual Days
Minkyong Kim, David Kotz
JCSE, vol. 5, no. 1, pp.71-84, March, 2011 |
|
|
|
Applying Formal Methods to Modeling and Analysis of Real-time Data Streams
Krasimira Kapitanova, Yuan Wei, Woochul Kang, Sang H. Son
JCSE, vol. 5, no. 1, pp.85-110, March, 2011 |
|
|
|
|
|
|
|
|
|
|
|