callback( { "result":{ "query":":facetid:toc:\"db/journals/jsa/jsa55.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.98" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"45", "@dc":"45", "@oc":"45", "@id":"43458591", "text":":facetid:toc:db/journals/jsa/jsa55.bht" } }, "hits":{ "@total":"45", "@computed":"45", "@sent":"45", "@first":"0", "hit":[{ "@score":"1", "@id":"5062126", "info":{"authors":{"author":[{"@pid":"62/575","text":"Claudio Agostino Ardagna"},{"@pid":"21/5205","text":"Marco Cremonini"},{"@pid":"62/2977","text":"Gabriele Gianini"}]},"title":"Landscape-aware location-privacy protection in location-based services.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"243-254","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/ArdagnaCG09","doi":"10.1016/J.SYSARC.2009.01.003","ee":"https://doi.org/10.1016/j.sysarc.2009.01.003","url":"https://dblp.org/rec/journals/jsa/ArdagnaCG09"}, "url":"URL#5062126" }, { "@score":"1", "@id":"5062127", "info":{"authors":{"author":{"@pid":"80/1209","text":"Ismail Assayad"}},"title":"A platform-based design framework for joint SW/HW multiprocessor systems design.","venue":"J. Syst. Archit.","volume":"55","number":"7-9","pages":"409-420","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/Assayad09","doi":"10.1016/J.SYSARC.2009.08.001","ee":"https://doi.org/10.1016/j.sysarc.2009.08.001","url":"https://dblp.org/rec/journals/jsa/Assayad09"}, "url":"URL#5062127" }, { "@score":"1", "@id":"5062128", "info":{"authors":{"author":{"@pid":"32/1024","text":"Mohamed Bakhouya"}},"title":"Evaluating the energy consumption and the silicon area of on-chip interconnect architectures.","venue":"J. Syst. Archit.","volume":"55","number":"7-9","pages":"387-395","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/Bakhouya09","doi":"10.1016/J.SYSARC.2009.07.002","ee":"https://doi.org/10.1016/j.sysarc.2009.07.002","url":"https://dblp.org/rec/journals/jsa/Bakhouya09"}, "url":"URL#5062128" }, { "@score":"1", "@id":"5062129", "info":{"authors":{"author":[{"@pid":"18/7355","text":"Federico Baronti"},{"@pid":"17/2614","text":"Andrea Lazzeri"},{"@pid":"19/5281","text":"Roberto Roncella"},{"@pid":"39/6162","text":"Roberto Saletti"}]},"title":"FPGA/DSP-based implementation of a high-performance multi-channel counter.","venue":"J. Syst. Archit.","volume":"55","number":"5-6","pages":"310-316","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/BarontiLRS09","doi":"10.1016/J.SYSARC.2009.03.002","ee":"https://doi.org/10.1016/j.sysarc.2009.03.002","url":"https://dblp.org/rec/journals/jsa/BarontiLRS09"}, "url":"URL#5062129" }, { "@score":"1", "@id":"5062130", "info":{"authors":{"author":[{"@pid":"27/4444","text":"Sara Blanc"},{"@pid":"29/3998","text":"Alberto Bonastre"},{"@pid":"85/3580","text":"Pedro J. Gil"}]},"title":"Dependability assessment of by-wire control systems using fault injection.","venue":"J. Syst. Archit.","volume":"55","number":"2","pages":"102-113","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/BlancBG09","doi":"10.1016/J.SYSARC.2008.09.003","ee":"https://doi.org/10.1016/j.sysarc.2008.09.003","url":"https://dblp.org/rec/journals/jsa/BlancBG09"}, "url":"URL#5062130" }, { "@score":"1", "@id":"5062131", "info":{"authors":{"author":[{"@pid":"00/386","text":"Bechara al Bouna"},{"@pid":"c/RichardChbeir","text":"Richard Chbeir"},{"@pid":"14/4797","text":"Stefania Marrara"}]},"title":"Enforcing role based access control model with multimedia signatures.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"264-274","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/BounaCM09","doi":"10.1016/J.SYSARC.2008.10.003","ee":"https://doi.org/10.1016/j.sysarc.2008.10.003","url":"https://dblp.org/rec/journals/jsa/BounaCM09"}, "url":"URL#5062131" }, { "@score":"1", "@id":"5062132", "info":{"authors":{"author":[{"@pid":"12/3044","text":"Kostas Bousias"},{"@pid":"19/0","text":"Liang Guang"},{"@pid":"98/2020","text":"Chris R. Jesshope"},{"@pid":"72/6027","text":"Mike Lankamp"}]},"title":"Implementation and evaluation of a microthread architecture.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"149-161","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/BousiasGJL09","doi":"10.1016/J.SYSARC.2008.07.001","ee":"https://doi.org/10.1016/j.sysarc.2008.07.001","url":"https://dblp.org/rec/journals/jsa/BousiasGJL09"}, "url":"URL#5062132" }, { "@score":"1", "@id":"5062133", "info":{"authors":{"author":[{"@pid":"96/7053","text":"Jose M. Alcaraz Calero"},{"@pid":"m/GabrielLopezMillan","text":"Gabriel López Millán"},{"@pid":"p/GregorioMartinezPerez","text":"Gregorio Martínez Pérez"},{"@pid":"g/AFGomezSkarmeta","text":"Antonio Fernandez Gómez-Skarmeta"}]},"title":"Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"289-297","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/CaleroMPG09","doi":"10.1016/J.SYSARC.2008.10.004","ee":"https://doi.org/10.1016/j.sysarc.2008.10.004","url":"https://dblp.org/rec/journals/jsa/CaleroMPG09"}, "url":"URL#5062133" }, { "@score":"1", "@id":"5062134", "info":{"authors":{"author":[{"@pid":"46/4601","text":"Fernando Castro"},{"@pid":"72/5019","text":"Daniel Chaver"},{"@pid":"49/1967","text":"Luis Piñuel"},{"@pid":"p/ManuelPrietoMatias","text":"Manuel Prieto 0001"},{"@pid":"00/3600","text":"Francisco Tirado"}]},"title":"Using age registers for a simple load-store queue filtering.","venue":"J. Syst. Archit.","volume":"55","number":"2","pages":"79-89","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/CastroCPPT09","doi":"10.1016/J.SYSARC.2008.09.005","ee":"https://doi.org/10.1016/j.sysarc.2008.09.005","url":"https://dblp.org/rec/journals/jsa/CastroCPPT09"}, "url":"URL#5062134" }, { "@score":"1", "@id":"5062135", "info":{"authors":{"author":[{"@pid":"98/5395","text":"Yi-Jung Chen"},{"@pid":"03/711","text":"Chia-Lin Yang"},{"@pid":"68/104","text":"Yen-Sheng Chang"}]},"title":"An architectural co-synthesis algorithm for energy-aware Network-on-Chip design.","venue":"J. Syst. Archit.","volume":"55","number":"5-6","pages":"299-309","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/ChenYC09","doi":"10.1016/J.SYSARC.2009.02.002","ee":"https://doi.org/10.1016/j.sysarc.2009.02.002","url":"https://dblp.org/rec/journals/jsa/ChenYC09"}, "url":"URL#5062135" }, { "@score":"1", "@id":"5062136", "info":{"authors":{"author":[{"@pid":"29/4919","text":"Chun-Mok Chung"},{"@pid":"74/2683","text":"Jihong Kim 0001"}]},"title":"Broadcast filtering: Snoop energy reduction in shared bus-based low-power MPSoCs.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"196-208","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/ChungK09","doi":"10.1016/J.SYSARC.2009.01.001","ee":"https://doi.org/10.1016/j.sysarc.2009.01.001","url":"https://dblp.org/rec/journals/jsa/ChungK09"}, "url":"URL#5062136" }, { "@score":"1", "@id":"5062137", "info":{"authors":{"author":[{"@pid":"38/4232","text":"Tae-Sun Chung"},{"@pid":"82/464","text":"Dong-Joo Park"},{"@pid":"77/5522","text":"Sangwon Park"},{"@pid":"69/3962","text":"Dong-Ho Lee"},{"@pid":"l/SangWonLee","text":"Sang-Won Lee 0001"},{"@pid":"67/124","text":"Ha-Joo Song"}]},"title":"A survey of Flash Translation Layer.","venue":"J. Syst. Archit.","volume":"55","number":"5-6","pages":"332-343","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/ChungPPLLS09","doi":"10.1016/J.SYSARC.2009.03.005","ee":"https://doi.org/10.1016/j.sysarc.2009.03.005","url":"https://dblp.org/rec/journals/jsa/ChungPPLLS09"}, "url":"URL#5062137" }, { "@score":"1", "@id":"5062138", "info":{"authors":{"author":[{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"24/811","text":"Seth Proctor"}]},"title":"Editorial.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"209-210","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/DamianiP09","doi":"10.1016/J.SYSARC.2009.03.001","ee":"https://doi.org/10.1016/j.sysarc.2009.03.001","url":"https://dblp.org/rec/journals/jsa/DamianiP09"}, "url":"URL#5062138" }, { "@score":"1", "@id":"5062139", "info":{"authors":{"author":[{"@pid":"30/7053","text":"Onur Derin"},{"@pid":"25/4649","text":"Alberto Ferrante"},{"@pid":"70/3421","text":"Antonio Vincenzo Taddeo"}]},"title":"Coordinated management of hardware and software self-adaptivity.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"170-179","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/DerinFT09","doi":"10.1016/J.SYSARC.2008.07.002","ee":"https://doi.org/10.1016/j.sysarc.2008.07.002","url":"https://dblp.org/rec/journals/jsa/DerinFT09"}, "url":"URL#5062139" }, { "@score":"1", "@id":"5062140", "info":{"authors":{"author":[{"@pid":"62/6086","text":"Arpad Gellert"},{"@pid":"55/779","text":"Adrian Florea"},{"@pid":"53/2811","text":"Lucian N. Vintan"}]},"title":"Exploiting selective instruction reuse and value prediction in a superscalar architecture.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"188-195","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/GellertFV09","doi":"10.1016/J.SYSARC.2008.11.002","ee":"https://doi.org/10.1016/j.sysarc.2008.11.002","url":"https://dblp.org/rec/journals/jsa/GellertFV09"}, "url":"URL#5062140" }, { "@score":"1", "@id":"5062141", "info":{"authors":{"author":[{"@pid":"31/3077","text":"Ruirui Guo"},{"@pid":"97/790","text":"José G. Delgado-Frias"}]},"title":"IP Routing table compaction and sampling schemes to enhance TCAM cache performance.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"61-69","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/GuoD09","doi":"10.1016/J.SYSARC.2008.08.001","ee":"https://doi.org/10.1016/j.sysarc.2008.08.001","url":"https://dblp.org/rec/journals/jsa/GuoD09"}, "url":"URL#5062141" }, { "@score":"1", "@id":"5062142", "info":{"authors":{"author":[{"@pid":"80/806-4","text":"Song Han 0004"},{"@pid":"25/4706","text":"Tharam S. Dillon"},{"@pid":"c/ElizabethChang","text":"Elizabeth Chang 0001"},{"@pid":"77/5573","text":"Biming Tian"}]},"title":"Secure web services using two-way authentication and three-party key establishment for service delivery.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"233-242","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/HanDCT09","doi":"10.1016/J.SYSARC.2009.01.004","ee":"https://doi.org/10.1016/j.sysarc.2009.01.004","url":"https://dblp.org/rec/journals/jsa/HanDCT09"}, "url":"URL#5062142" }, { "@score":"1", "@id":"5062143", "info":{"authors":{"author":[{"@pid":"94/938","text":"Guo-Huang Hsu"},{"@pid":"04/2262","text":"Chieh-Feng Chiang"},{"@pid":"83/1527","text":"Lun-Min Shih"},{"@pid":"22/1324","text":"Lih-Hsing Hsu"},{"@pid":"09/5903","text":"Jimmy J. M. Tan"}]},"title":"Conditional diagnosability of hypercubes under the comparison diagnosis model.","venue":"J. Syst. Archit.","volume":"55","number":"2","pages":"140-146","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/HsuCSHT09","doi":"10.1016/J.SYSARC.2008.10.005","ee":"https://doi.org/10.1016/j.sysarc.2008.10.005","url":"https://dblp.org/rec/journals/jsa/HsuCSHT09"}, "url":"URL#5062143" }, { "@score":"1", "@id":"5062144", "info":{"authors":{"author":[{"@pid":"01/2255","text":"Tzu-Chi Huang"},{"@pid":"26/6833","text":"Ce-Kuen Shieh"},{"@pid":"66/5200","text":"Yu-Ben Miao"}]},"title":"Dual-Mode Execution Environment for active network.","venue":"J. Syst. Archit.","volume":"55","number":"5-6","pages":"317-331","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/HuangSM09","doi":"10.1016/J.SYSARC.2009.03.003","ee":"https://doi.org/10.1016/j.sysarc.2009.03.003","url":"https://dblp.org/rec/journals/jsa/HuangSM09"}, "url":"URL#5062144" }, { "@score":"1", "@id":"5062145", "info":{"authors":{"author":[{"@pid":"26/5304","text":"Florian Kerschbaum"},{"@pid":"67/4536","text":"Philip Robinson"}]},"title":"Security architecture for virtual organizations of business web services.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"224-232","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/KerschbaumR09","doi":"10.1016/J.SYSARC.2008.10.001","ee":"https://doi.org/10.1016/j.sysarc.2008.10.001","url":"https://dblp.org/rec/journals/jsa/KerschbaumR09"}, "url":"URL#5062145" }, { "@score":"1", "@id":"5062146", "info":{"authors":{"author":[{"@pid":"82/2571","text":"Hyunhee Kim"},{"@pid":"49/5633","text":"Sungjune Youn"},{"@pid":"74/2683","text":"Jihong Kim 0001"}]},"title":"Reusability-aware cache memory sharing for chip multiprocessors with private L2 caches.","venue":"J. Syst. Archit.","volume":"55","number":"10-12","pages":"446-456","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/KimYK09","doi":"10.1016/J.SYSARC.2009.09.003","ee":"https://doi.org/10.1016/j.sysarc.2009.09.003","url":"https://dblp.org/rec/journals/jsa/KimYK09"}, "url":"URL#5062146" }, { "@score":"1", "@id":"5062147", "info":{"authors":{"author":[{"@pid":"84/7053","text":"Damjan Kovac"},{"@pid":"91/5008","text":"Denis Trcek"}]},"title":"Qualitative trust modeling in SOA.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"255-263","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/KovacT09","doi":"10.1016/J.SYSARC.2009.01.002","ee":"https://doi.org/10.1016/j.sysarc.2009.01.002","url":"https://dblp.org/rec/journals/jsa/KovacT09"}, "url":"URL#5062147" }, { "@score":"1", "@id":"5062148", "info":{"authors":{"author":[{"@pid":"74/1907","text":"Siew Kei Lam"},{"@pid":"23/1694","text":"Thambipillai Srikanthan"}]},"title":"Rapid design of area-efficient custom instructions for reconfigurable embedded processing.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"1-14","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/LamS09","doi":"10.1016/J.SYSARC.2008.06.003","ee":"https://doi.org/10.1016/j.sysarc.2008.06.003","url":"https://dblp.org/rec/journals/jsa/LamS09"}, "url":"URL#5062148" }, { "@score":"1", "@id":"5062149", "info":{"authors":{"author":[{"@pid":"63/6036","text":"Gyungho Lee"},{"@pid":"31/6520","text":"Yixin Shi"}]},"title":"Access region cache with register guided memory reference partitioning.","venue":"J. Syst. Archit.","volume":"55","number":"10-12","pages":"434-445","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/LeeS09","doi":"10.1016/J.SYSARC.2009.09.002","ee":"https://doi.org/10.1016/j.sysarc.2009.09.002","url":"https://dblp.org/rec/journals/jsa/LeeS09"}, "url":"URL#5062149" }, { "@score":"1", "@id":"5062150", "info":{"authors":{"author":[{"@pid":"89/6764-8","text":"Bin Li 0008"},{"@pid":"16/6199-1","text":"Lu Peng 0001"},{"@pid":"41/2228","text":"Balachandran Ramadass"}]},"title":"Accurate and efficient processor performance prediction via regression tree based modeling.","venue":"J. Syst. Archit.","volume":"55","number":"10-12","pages":"457-467","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/LiPR09","doi":"10.1016/J.SYSARC.2009.09.004","ee":"https://doi.org/10.1016/j.sysarc.2009.09.004","url":"https://dblp.org/rec/journals/jsa/LiPR09"}, "url":"URL#5062150" }, { "@score":"1", "@id":"5062151", "info":{"authors":{"author":[{"@pid":"96/3249","text":"Joseph C. Libby"},{"@pid":"k/KennethBKent","text":"Kenneth B. Kent"}]},"title":"An embedded implementation of the Common Language Infrastructure.","venue":"J. Syst. Archit.","volume":"55","number":"2","pages":"114-126","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/LibbyK09","doi":"10.1016/J.SYSARC.2008.09.004","ee":"https://doi.org/10.1016/j.sysarc.2008.09.004","url":"https://dblp.org/rec/journals/jsa/LibbyK09"}, "url":"URL#5062151" }, { "@score":"1", "@id":"5062152", "info":{"authors":{"author":[{"@pid":"19/7718","text":"Daesung Lim"},{"@pid":"78/2096","text":"Nam Su Chang"},{"@pid":"52/2252","text":"Sung Yeon Ji"},{"@pid":"03/660","text":"Chang Han Kim"},{"@pid":"98/4041-2","text":"Sangjin Lee 0002"},{"@pid":"83/5601-1","text":"Young-Ho Park 0001"}]},"title":"An efficient signed digit montgomery multiplication for RSA.","venue":"J. Syst. Archit.","volume":"55","number":"7-9","pages":"355-362","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/LimCJKLP09","doi":"10.1016/J.SYSARC.2009.04.001","ee":"https://doi.org/10.1016/j.sysarc.2009.04.001","url":"https://dblp.org/rec/journals/jsa/LimCJKLP09"}, "url":"URL#5062152" }, { "@score":"1", "@id":"5062153", "info":{"authors":{"author":[{"@pid":"47/1375","text":"Adrian Moga"},{"@pid":"80/1836-1","text":"Michel Dubois 0001"}]},"title":"A comparative evaluation of hybrid distributed shared-memory systems.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"43-52","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/MogaD09","doi":"10.1016/J.SYSARC.2008.07.003","ee":"https://doi.org/10.1016/j.sysarc.2008.07.003","url":"https://dblp.org/rec/journals/jsa/MogaD09"}, "url":"URL#5062153" }, { "@score":"1", "@id":"5062154", "info":{"authors":{"author":{"@pid":"99/4567","text":"Saraju P. Mohanty"}},"title":"A secure digital camera architecture for integrated real-time digital rights management.","venue":"J. Syst. Archit.","volume":"55","number":"10-12","pages":"468-480","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/Mohanty09","doi":"10.1016/J.SYSARC.2009.09.005","ee":"https://doi.org/10.1016/j.sysarc.2009.09.005","url":"https://dblp.org/rec/journals/jsa/Mohanty09"}, "url":"URL#5062154" }, { "@score":"1", "@id":"5062155", "info":{"authors":{"author":[{"@pid":"39/7055","text":"Mouaaz Nahas"},{"@pid":"93/4227","text":"Michael J. Pont"},{"@pid":"11/1450","text":"Michael Short 0001"}]},"title":"Reducing message-length variations in resource-constrained embedded systems implemented using the Controller Area Network (CAN) protocol.","venue":"J. Syst. Archit.","volume":"55","number":"5-6","pages":"344-354","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/NahasPS09","doi":"10.1016/J.SYSARC.2009.03.004","ee":"https://doi.org/10.1016/j.sysarc.2009.03.004","url":"https://dblp.org/rec/journals/jsa/NahasPS09"}, "url":"URL#5062155" }, { "@score":"1", "@id":"5062156", "info":{"authors":{"author":[{"@pid":"31/1885","text":"Andrés Ortiz 0001"},{"@pid":"70/2480","text":"Julio Ortega Lopera"},{"@pid":"86/755","text":"Antonio F. Díaz"},{"@pid":"05/3698","text":"Pablo Cascón"},{"@pid":"18/4462","text":"Alberto Prieto"}]},"title":"Protocol offload analysis by simulation.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"25-42","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/OrtizODCP09","doi":"10.1016/J.SYSARC.2008.07.005","ee":"https://doi.org/10.1016/j.sysarc.2008.07.005","url":"https://dblp.org/rec/journals/jsa/OrtizODCP09"}, "url":"URL#5062156" }, { "@score":"1", "@id":"5062157", "info":{"authors":{"author":[{"@pid":"50/6793","text":"Ramaswamy Ramaswamy"},{"@pid":"24/3415","text":"Ning Weng"},{"@pid":"10/5241","text":"Tilman Wolf"}]},"title":"Analysis of network processing workloads.","venue":"J. Syst. Archit.","volume":"55","number":"10-12","pages":"421-433","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/RamaswamyWW09","doi":"10.1016/J.SYSARC.2009.09.001","ee":"https://doi.org/10.1016/j.sysarc.2009.09.001","url":"https://dblp.org/rec/journals/jsa/RamaswamyWW09"}, "url":"URL#5062157" }, { "@score":"1", "@id":"5062158", "info":{"authors":{"author":[{"@pid":"20/7718","text":"Mostafa E. Salehi"},{"@pid":"f/SeidMehdiFakhraie","text":"Sied Mehdi Fakhraie"}]},"title":"Quantitative analysis of packet-processing applications regarding architectural guidelines for network-processing-engine development.","venue":"J. Syst. Archit.","volume":"55","number":"7-9","pages":"373-386","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/SalehiF09","doi":"10.1016/J.SYSARC.2009.07.001","ee":"https://doi.org/10.1016/j.sysarc.2009.07.001","url":"https://dblp.org/rec/journals/jsa/SalehiF09"}, "url":"URL#5062158" }, { "@score":"1", "@id":"5062159", "info":{"authors":{"author":{"@pid":"06/1101","text":"Mariagiovanna Sami"}},"title":"Guest Editor's introduction.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"147-148","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/Sami09","doi":"10.1016/J.SYSARC.2009.02.001","ee":"https://doi.org/10.1016/j.sysarc.2009.02.001","url":"https://dblp.org/rec/journals/jsa/Sami09"}, "url":"URL#5062159" }, { "@score":"1", "@id":"5062160", "info":{"authors":{"author":[{"@pid":"51/1350","text":"Marcos Sánchez-Élez"},{"@pid":"27/6919","text":"Nader Bagherzadeh"},{"@pid":"17/3310","text":"Román Hermida"}]},"title":"A framework for low energy data management in reconfigurable multi-context architectures.","venue":"J. Syst. Archit.","volume":"55","number":"2","pages":"127-139","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/Sanchez-ElezBH09","doi":"10.1016/J.SYSARC.2008.10.006","ee":"https://doi.org/10.1016/j.sysarc.2008.10.006","url":"https://dblp.org/rec/journals/jsa/Sanchez-ElezBH09"}, "url":"URL#5062160" }, { "@score":"1", "@id":"5062161", "info":{"authors":{"author":[{"@pid":"42/5556","text":"Rodrigo M. Santos"},{"@pid":"49/3905-2","text":"Jorge Santos 0002"},{"@pid":"79/4776","text":"Javier Orozco"}]},"title":"Power saving and fault-tolerance in real-time critical embedded systems.","venue":"J. Syst. Archit.","volume":"55","number":"2","pages":"90-101","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/SantosSO09","doi":"10.1016/J.SYSARC.2008.09.001","ee":"https://doi.org/10.1016/j.sysarc.2008.09.001","url":"https://dblp.org/rec/journals/jsa/SantosSO09"}, "url":"URL#5062161" }, { "@score":"1", "@id":"5062162", "info":{"authors":{"author":[{"@pid":"79/7054","text":"Abbas Shahini Shamsabadi"},{"@pid":"69/1695","text":"Behrouz Shahgholi Ghahfarokhi"},{"@pid":"63/426","text":"Kamran Zamanifar"},{"@pid":"92/2889","text":"Naser Movahhedinia"}]},"title":"Applying inherent capabilities of quantum-dot cellular automata to design: D flip-flop case study.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"180-187","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/ShamsabadiGZM09","doi":"10.1016/J.SYSARC.2008.11.001","ee":"https://doi.org/10.1016/j.sysarc.2008.11.001","url":"https://dblp.org/rec/journals/jsa/ShamsabadiGZM09"}, "url":"URL#5062162" }, { "@score":"1", "@id":"5062163", "info":{"authors":{"author":{"@pid":"39/4885","text":"Haifeng Shen"}},"title":"Maintaining constraints of UML models in distributed collaborative environments.","venue":"J. Syst. Archit.","volume":"55","number":"7-9","pages":"396-408","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/Shen09","doi":"10.1016/J.SYSARC.2009.07.003","ee":"https://doi.org/10.1016/j.sysarc.2009.07.003","url":"https://dblp.org/rec/journals/jsa/Shen09"}, "url":"URL#5062163" }, { "@score":"1", "@id":"5062164", "info":{"authors":{"author":[{"@pid":"11/7054","text":"Layth Sliman"},{"@pid":"69/1513","text":"Frédérique Biennier"},{"@pid":"93/521","text":"Youakim Badr"}]},"title":"A security policy framework for context-aware and user preferences in e-services.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"275-288","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/SlimanBB09","doi":"10.1016/J.SYSARC.2008.12.001","ee":"https://doi.org/10.1016/j.sysarc.2008.12.001","url":"https://dblp.org/rec/journals/jsa/SlimanBB09"}, "url":"URL#5062164" }, { "@score":"1", "@id":"5062165", "info":{"authors":{"author":[{"@pid":"25/3072","text":"Hyungkeun Song"},{"@pid":"11/645","text":"Sukwon Choi"},{"@pid":"46/4787","text":"Hojung Cha"},{"@pid":"49/712","text":"Rhan Ha"}]},"title":"Improving energy efficiency for flash memory based embedded applications.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"15-24","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/SongCCH09","doi":"10.1016/J.SYSARC.2008.07.004","ee":"https://doi.org/10.1016/j.sysarc.2008.07.004","url":"https://dblp.org/rec/journals/jsa/SongCCH09"}, "url":"URL#5062165" }, { "@score":"1", "@id":"5062166", "info":{"authors":{"author":[{"@pid":"50/8414","text":"Michiel W. van Tol"},{"@pid":"98/2020","text":"Chris R. Jesshope"},{"@pid":"72/6027","text":"Mike Lankamp"},{"@pid":"72/1762","text":"Simon Polstra"}]},"title":"An implementation of the SANE Virtual Processor using POSIX threads.","venue":"J. Syst. Archit.","volume":"55","number":"3","pages":"162-169","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/TolJLP09","doi":"10.1016/J.SYSARC.2008.09.006","ee":"https://doi.org/10.1016/j.sysarc.2008.09.006","url":"https://dblp.org/rec/journals/jsa/TolJLP09"}, "url":"URL#5062166" }, { "@score":"1", "@id":"5062167", "info":{"authors":{"author":[{"@pid":"w/NengChungWang","text":"Neng-Chung Wang"},{"@pid":"21/1331","text":"Yi-Ping Hung"}]},"title":"Multicast communication in wormhole-routed 2D torus networks with hamiltonian cycle model.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"70-78","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/WangH09","doi":"10.1016/J.SYSARC.2008.09.002","ee":"https://doi.org/10.1016/j.sysarc.2008.09.002","url":"https://dblp.org/rec/journals/jsa/WangH09"}, "url":"URL#5062167" }, { "@score":"1", "@id":"5062168", "info":{"authors":{"author":[{"@pid":"55/5833","text":"Hai-Chen Wang"},{"@pid":"62/6631","text":"Chung-Kwong Yuen"}]},"title":"Exploiting an abstract-machine-based framework in the design of a Java ILP processor.","venue":"J. Syst. Archit.","volume":"55","number":"1","pages":"53-60","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/WangY09","doi":"10.1016/J.SYSARC.2008.07.006","ee":"https://doi.org/10.1016/j.sysarc.2008.07.006","url":"https://dblp.org/rec/journals/jsa/WangY09"}, "url":"URL#5062168" }, { "@score":"1", "@id":"5062169", "info":{"authors":{"author":[{"@pid":"76/6120","text":"Christian Wolter"},{"@pid":"84/5432-1","text":"Michael Menzel 0001"},{"@pid":"79/4385","text":"Andreas Schaad"},{"@pid":"72/5150","text":"Philip Miseldine"},{"@pid":"m/CMeinel","text":"Christoph Meinel"}]},"title":"Model-driven business process security requirement specification.","venue":"J. Syst. Archit.","volume":"55","number":"4","pages":"211-223","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/WolterMSMM09","doi":"10.1016/J.SYSARC.2008.10.002","ee":"https://doi.org/10.1016/j.sysarc.2008.10.002","url":"https://dblp.org/rec/journals/jsa/WolterMSMM09"}, "url":"URL#5062169" }, { "@score":"1", "@id":"5062170", "info":{"authors":{"author":[{"@pid":"89/1978","text":"Jan-Jan Wu"},{"@pid":"95/3438","text":"En-Jan Chou"},{"@pid":"07/5712","text":"Pangfeng Liu"}]},"title":"Computation and communication schedule optimization for data-sharing tasks on uniprocessor.","venue":"J. Syst. Archit.","volume":"55","number":"7-9","pages":"363-372","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jsa/WuCL09","doi":"10.1016/J.SYSARC.2009.05.001","ee":"https://doi.org/10.1016/j.sysarc.2009.05.001","url":"https://dblp.org/rec/journals/jsa/WuCL09"}, "url":"URL#5062170" } ] } } } )