


default search action
Journal of Computing Science and Engineering, Volume 5
Volume 5, Number 1, March 2011
- Jun Yan, Wei Zhang

:
Bounding Worst-Case Performance for Multi-Core Processors with Shared L2 Instruction Caches. 1-18 - Ji-Hoon Kim, Kwang-Jo Lee, Taek-Hun Kim, Sung-Bong Yang:

Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET. 19-31 - Kyung Dong Ryu, Kang-Won Lee, Jihie Kim:

Preface for KOCSEA Special Issue. 32 - Jungwoo Ryoo, Eun-A Park:

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure. 33-50 - Jung Eun Kim, Yoohwan Kim:

A Secure Credit Card Transaction Method Based on Kerberos. 51-70 - Minkyong Kim, David Kotz:

Identifying Unusual Days. 71-84 - Krasimira Kapitanova, Yuan Wei, Woochul Kang, Sang Hyuk Son:

Applying Formal Methods to Modeling and Analysis of Real-time Data Streams. 85-110
Volume 5, Number 2, June 2011
- Carlos Ordonez, Mario Navas, Carlos Garcia-Alvarado:

Parallel Multithreaded Processing for Data Set Summarization on Multicore CPUs. 111-120 - Jun Yan, Wei Zhang:

Computing and Reducing Transient Error Propagation in Registers. 121-130 - Jun Yan, Wei Zhang

:
An Interference Matrix Based Approach to Bounding Worst-Case Inter-Thread Cache Interferences and WCET for Multi-Core Processors. 131-140 - Minkyu Lee, Dongsoo Han:

Ubiscript: A Script Language for Ubiquitous Environment. 141-149 - Youngjoong Ko, Jungyun Seo:

Issues and Empirical Results for Improving Text Classification. 150-160
Volume 5, Number 3, September 2011
- Igor Milevskiy, Jin-Young Ha:

A Fast Algorithm for Korean Text Extraction and Segmentation from Subway Signboard Images Utilizing Smartphone Sensors. 161-166 - Ling Guo, Xiaowei Ying, Xintao Wu:

Limiting Attribute Disclosure in Randomization Based Microdata Release. 169-182 - Hongyu Guo, Herna L. Viktor, Eric Paquet:

Privacy Disclosure and Preservation in Learning with Multi-Relational Databases. 183-196 - Yidong Li, Hong Shen:

Anonymizing Graphs Against Weight-based Attacks with Community Preservation. 197-209 - Spyros Sioutas, Emmanouil Magkos, Ioannis Karydis, Vassilios S. Verykios:

Uncertainty for Privacy and 2-Dimensional Range Query Distortion. 210-222 - Alexandros Karakasidis, Vassilios S. Verykios:

Secure Blocking + Secure Matching = Secure Record Linkage. 223-235 - Chris D. Nugent

, Leo Galway, Liming Chen, Mark P. Donnelly, Sally I. McClean, Shuai Zhang, Bryan W. Scotney, Gerard Parr:
Managing Sensor Data in Ambient Assisted Living. 237-245 - Carmen C. Y. Poon, Qing Liu, Hui Gao, Wan-Hua Lin, Yuan-Ting Zhang:

Wearable Intelligent Systems for E-Health. 246-256 - Qian Xu, Qiang Yang:

A Survey of Transfer and Multitask Learning in Bioinformatics. 257-268 - Sumi Helal, Raja Bose, Chao Chen, Andy Smith, Scott de Deugd, Diane J. Cook:

STEPSTONE: An Intelligent Integration Architecture for Personal Tele-Health. 269-281
Volume 5, Number 4, December 2011
- Byungjin Kim, Youngho Ahn, Ki-Seok Chung:

A Technique for Fast Process Creation Based on Creation Location. 283-287 - Harksoo Kim, Choong-Nyoung Seon, Jungyun Seo:

Review of Korean Speech Act Classification: Machine Learning Methods. 288-293 - Mohammed Al-Kateb, Byung Suk Lee:

Load Shedding for Temporal Queries over Data Streams. 294-304 - Ahmed Fares

, Mohamed I. Sharawy, Hala Helmy Zayed:
Intrusion Detection: Supervised Machine Learning. 305-313
- Daehyeok Kim

, Wan-Seon Lim, Young-Joo Suh:
Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services. 316-323 - Junghwi Jeon, Chulmin Kim, Ki-seok Lee, Cheeha Kim:

Fast Retransmission Scheme for Overcoming Hidden Node Problem in IEEE 802.11 Networks. 324-330 - Wooram Park, Chanik Park:

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment. 331-337 - Joon-Myung Kang, Sin-Seok Seo, James Won-Ki Hong:

Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns. 338-345 - Gook-Pil Roh, Seung-won Hwang:

Online Clustering Algorithms for Semantic-Rich Network Trajectories. 346-353

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














