|
Back Issues |
|
|
|
JCSE, Volume 5, Number 4, December, 2011
|
|
|
A Technique for Fast Process Creation Based on Creation Location
Byungjin Kim, Youngho Ahn, Ki-Seok Chung
JCSE, vol. 5, no. 4, pp.283-287, December, 2011 |
|
|
|
Review of Korean Speech Act Classification: Machine Learning Methods
Harksoo Kim, Choong-Nyoung Seon, Jungyun Seo
JCSE, vol. 5, no. 4, pp.288-293, December, 2011 |
|
|
|
Load Shedding for Temporal Queries over Data Streams
Mohammed Al-Kateb, Byung Suk Lee
JCSE, vol. 5, no. 4, pp.294-304, December, 2011 |
|
|
|
Intrusion Detection: Supervised Machine Learning
Ahmed H. Fares, Mohamed I. Sharawy, Hala H. Zayed
JCSE, vol. 5, no. 4, pp.305-313, December, 2011 |
|
|
|
Introduction to the Special Issue: Developing Embedded Software Technology for the Smart Mobile Platform
Jong Kim, Gary Geunbae Lee
JCSE, vol. 5, no. 4, pp.314-315, December, 2011 |
|
|
|
Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services
Daehyeok Kim, Wan-Seon Lim, Young-Joo Suh
JCSE, vol. 5, no. 4, pp.316-323, December, 2011 |
|
|
|
Fast Retransmission Scheme for Overcoming Hidden Node Problem in IEEE 802.11 Networks
Junghwi Jeon, Chulmin Kim, Kiseok Lee, Cheeha Kim
JCSE, vol. 5, no. 4, pp.324-330, December, 2011 |
|
|
|
Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment
Wooram Park, Chanik Park
JCSE, vol. 5, no. 4, pp.331-337, December, 2011 |
|
|
|
Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns
Joon-Myung Kang, Sin-seok Seo, James Won-Ki Hong
JCSE, vol. 5, no. 4, pp.338-345, December, 2011 |
|
|
|
Online Clustering Algorithms for Semantic-Rich Network Trajectories
Gook-Pil Roh, Seung-won Hwang
JCSE, vol. 5, no. 4, pp.346-353, December, 2011 |
|
|
|
|
|
|
|
|
|
|
|