


default search action
Journal of Systems and Software (JSS), Volume 58
Volume 58, Number 1, August 2001
- Noritaka Kobayashi, Tatsuhiro Tsuchiya

, Tohru Kikuno:
Minimizing the mean delay of quorum-based mutual exclusion schemes. 1-9 - Hwakyung Rim, Ju-wook Jang, Sun-Chun Kim:

Hiding communication overheads in dynamic load balancing for multicomputers. 11-22 - Ching-Wen Chen, Chung-Ping Chung:

Fault-tolerant gamma interconnection network without backtracking. 23-31 - Mohammed Zaki, Hany M. Harb, Tarek S. Sobh

:
A learning database system to observe malfunctions and to support network planning. 33-46 - Kai-Yuan Cai, Lin Cai, Weidong Wang, Zhou-Yi Yu, David Zhang

:
On the neural network approach in software reliability modeling. 47-62 - Editor's Corner. 63-

- Tsong Yueh Chen

, T. H. Tse
, Yuen-Tak Yu:
Proportional sampling strategy: a compendium and some insights. 65-81
Volume 58, Number 2, September 2001
- Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen:

A new encryption algorithm for image cryptosystems. 83-91 - Shin-Young Lim, Jeong-Ho Ko, Eun-Ah Jun, Gang-Soo Lee:

Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net. 93-106 - Andy Dowling, John G. Keating:

A proxy-based security architecture for Internet applications in an extranet environment. 107-118 - Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:

New nonrepudiable threshold proxy signature scheme with known signers. 119-124 - Yung-Cheng Ma, Chung-Ping Chung:

A dominance relation enhanced branch-and-bound task allocation. 125-134 - Der-Lin Pean, Chao-Chin Wu, Huey-Ting Chua, Cheng Chen:

Design of a scalable multiprocessor architecture and its simulation. 135-152 - Sumit Ghosh:

Understanding complex, real-world systems through asynchronous, distributed decision-making algorithms. 153-167 - Controversy Corner. 169-

- Bashar Nuseibeh, Steve M. Easterbrook

, Alessandra Russo
:
Making inconsistency respectable in software development. 171-180
Volume 58, Number 3, September 2001
- Jyrki Akkanen, Jukka K. Nurminen

:
Case study of the evolution of routing algorithms in a network planning tool. 181-198 - Li Wang, Wanlei Zhou

, Weijia Jia:
The design and implementation of an active replication scheme for distributing services in a cluster of workstations. 199-210 - Jin Hyun Son, Myoung-Ho Kim:

Improving the performance of time-constrained workflow processing. 211-219 - Yin-Fu Huang, Bo-Wei Chao:

A priority-based resource allocation strategy in distributed computing networks. 221-233 - Chia-Tien Dan Lo, Witawas Srisa-an

, J. Morris Chang:
A study of page replacement performance in garbage collection heap. 235-245 - Taehyoun Kim

, Naehyuck Chang, Heonshik Shin:
Joint scheduling of garbage collector and hard real-time tasks for embedded applications. 247-260 - Brian Huston:

The effects of design pattern application on metric scores. 261-269 - Eric Jui-Lin Lu, Ru-Hui Tsai, Shihyu Chou:

An empirical study of XML/EDI. 271-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














