default search action
Computer Systems: Science & Engineering, Volume 23
Volume 23, Number 1, January 2008
- Song Han, Elizabeth Chang, Tharam S. Dillon:
Pairing-based public-key encryption schemes with backward-and-forward security. Comput. Syst. Sci. Eng. 23(1) (2008) - Jin-Long Wang, Chen-Hsing Chen:
Adaptive two-stage QoS. provisioning schemes for CDMA networks. Comput. Syst. Sci. Eng. 23(1) (2008) - Maja Hadzic, Elizabeth Chang:
Onto-agent methodology for design of ontology-based multi-agent systems. Comput. Syst. Sci. Eng. 23(1) (2008) - Sang-Wook Kim, Miyoung Shin:
Subsequence matching under time warping in time-series databases: observation, optimization, and performance results. Comput. Syst. Sci. Eng. 23(1) (2008) - Dechang Pi, Chuhua Xian, Xiaolin Qin:
An improved C-means clustering algorithm. Comput. Syst. Sci. Eng. 23(1) (2008)
Volume 23, Number 2, March 2008
- Abdelkader Hameurlain:
Editorial. Comput. Syst. Sci. Eng. 23(2) (2008) - Carmela Comito, Simon Patarin, Domenico Talia:
PARIS: A peer-to-peer architecture for large-scale semantic data sharing. Comput. Syst. Sci. Eng. 23(2) (2008) - Weimin He, Leonidas Fegaras:
Answering XPath queries with search predicates in structured P2P networks. Comput. Syst. Sci. Eng. 23(2) (2008) - Mahmoud Barhamgi, Djamal Benslimane, Aris M. Ouksel:
PWSMS: A Peer-to-peer web service management system for data sharing in collaborative environments. Comput. Syst. Sci. Eng. 23(2) (2008) - Genoveva Vargas-Solar, José-Luis Zechinelli-Martini, Víctor Cuevas-Vicenttín:
Integrating and querying astronomical data on the e-GrOV data grid. Comput. Syst. Sci. Eng. 23(2) (2008) - HongSoo Kim, Chong-Sun Hwang, SangKeun Lee, SungJin Choi, Joon-Min Gil:
Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids. Comput. Syst. Sci. Eng. 23(2) (2008)
Volume 23, Number 3, May 2008
- Wanlei Zhou, Yang Xiang, Minyi Guo:
Special Issue: Network Attacks and Defense Systems. Comput. Syst. Sci. Eng. 23(3) (2008) - Duc-Liem Vo, Kwangjo Kim:
A secure mutual authentication scheme with key agreement using smart card from bilinear pairings. Comput. Syst. Sci. Eng. 23(3) (2008) - Udaya Kiran Tupakula, Vijay Varadharajan:
A hybrid model against TCP. SYN and reflection DDoS attacks. Comput. Syst. Sci. Eng. 23(3) (2008) - Zhongwen Li, Qiong Chen, Yang Xiang:
A cross-authentication model and implementation. Comput. Syst. Sci. Eng. 23(3) (2008) - Zhuowei Li, Amitabha Das, Jianying Zhou, Jagdish Chandra Patra:
Variable-length signatures for intrusion detection. Comput. Syst. Sci. Eng. 23(3) (2008) - Ruixuan Li, Zhuo Tang, Zhengding Lu, Jinwei Hu:
Request-driven role mapping framework for secure interoperation in multi-domain environments. Comput. Syst. Sci. Eng. 23(3) (2008) - Shi-Jinn Horng, Pingzhi Fan, Ming-Yang Su, Yuan-Hsin Chen, Cheng-Ling Lee, Shao-Wei Lan:
Anomaly detection for web server based on smooth support vector machine. Comput. Syst. Sci. Eng. 23(3) (2008) - Hongfeng Zhu, Tianhua Liu, Jie Liu:
EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol. Comput. Syst. Sci. Eng. 23(3) (2008) - Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Syst. Sci. Eng. 23(3) (2008)
Volume 23, Number 4, July 2008
- Rahmat-Allah Hooshmand, Mohammad Ataei:
Real-coded genetic algorithm applied to optimal placement of capacitor banks for unbalanced distribution systems with meshed/ radial configurations. Comput. Syst. Sci. Eng. 23(4) (2008) - Henry Tan, Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
State of the art of data mining of tree structured information. Comput. Syst. Sci. Eng. 23(4) (2008) - Bent Bruun Kristensen:
Interaction cases: generalized use cases in ambient systems. Comput. Syst. Sci. Eng. 23(4) (2008) - Joong Hyuk Chang:
Adaptive selection of tuples over data streams for efficient load shedding. Comput. Syst. Sci. Eng. 23(4) (2008) - Roman Obermaisser, Christian El Salloum, Bernhard Huber, Hermann Kopetz:
Modeling and verification of distributed real-time systems using periodic finite state machines. Comput. Syst. Sci. Eng. 23(4) (2008) - Song Han, Elizabeth Chang, Tharam S. Dillon:
Pairing-based public-key encryption schemes with backward-and-forward security. Comput. Syst. Sci. Eng. 23(4) (2008)
Volume 23, Number 5, September 2008
- Nicolas Guelfi, Henry Muccini, Patrizio Pelliccione, Alexander B. Romanovsky:
Special issue: Engineering Fault Tolerant Systems. Comput. Syst. Sci. Eng. 23(5) (2008) - Francis Tam:
On the development of standards based carrier grade platforms. Comput. Syst. Sci. Eng. 23(5) (2008) - Michele Banci, Stefania Gnesi, Alessandro Fantechi, Giovanni Lombardi:
Model driven development of railway systems using diversity. Comput. Syst. Sci. Eng. 23(5) (2008) - Nuno Laranjeiro, Marco Vieira:
Deploying fault tolerant web service compositions. Comput. Syst. Sci. Eng. 23(5) (2008) - Máté Kovács, Dániel Varró, László Gönczy:
Formal analysis of BPEL. workflows with compensation by model checking. Comput. Syst. Sci. Eng. 23(5) (2008)
Volume 23, Number 6, November 2008
- Chien-Lung Hsu:
Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme. Comput. Syst. Sci. Eng. 23(6) (2008) - Ambrosio Toval, Begoña Moros, Joaquín Nicolás, Joaquín Lasheras:
Eight key issues for an effective reuse-based requirements process. Comput. Syst. Sci. Eng. 23(6) (2008) - S. P. Singh, C. Kistanna, A. R. Rao:
Optimal capacitor allocation in distribution systems using genetic algorithm. Comput. Syst. Sci. Eng. 23(6) (2008) - William Chung-Kung Yen:
Restricted independent domination problems on graphs. Comput. Syst. Sci. Eng. 23(6) (2008) - Shie-Yuan Wang, Chih-Liang Chou:
On the characteristics of information dissemination paths in vehicular ad hoc networks on the move. Comput. Syst. Sci. Eng. 23(6) (2008)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.