default search action
International Journal of Computer Science & Applications, Volume 6
Volume 6, Number 1, January 2009
- Rajeev Wankar:
Editorial. - G. Geethakumari, Atul Negi, V. N. Sastry:
A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems. 1-12 - Hashir Karim Kidwai, Tamer F. Rabie, Fadi N. Sibai:
Parallel Video Processing Performance Evaluation on the IBM Cell Broadband Engine Processor. 13-25 - Rakesh Kumar Katare, Narendra S. Chaudhari:
Study of Topological Property of Interconnection Networks and its Mapping to Sparse Matrix Model. 26-39 - Deven Shah, Dhiren R. Patel:
Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA. 40-52 - G. Sudha Sadasivam, V. Viji Rajendran:
An Efficient Approach to Task Scheduling in Computational Grids. 53-69 - Rafael Moreno-Vozmediano:
Application Layer Multicast for Efficient Grid File Transfer. 70-84 - Shilpa Bhalerao, Maya Ingle:
Incorporating Vital Factors in Agile Estimation through Algorithmic Method. 85-97 - Debasish Jana, Amritava Chaudhuri, Bijan Bihari Bhaumik:
Privacy and Anonymity Protection in Computational Grid Services. 98-107 - Rajeev Wankar, Rajendra Akerkar:
Reconfigurable Architectures and Algorithms: A Research Survey. 108-123
Volume 6, Number 2, March 2009
- Jacques Calmet, Pierre Maret:
Editorial. iii-iv - Jacques Calmet, Pierre Maret:
Agent-Based Knowledge Communities. 01-18 - Bert-Jan van Beijnum, Pravin Pawar, C. B. Dulawan, Hermie J. Hermens:
Mobile Virtual Communities for Telemedicine: Research Challenges and Opportunities. 19-37 - Ulrich Hofmann, Armin Veichtlbauer, Ilka Miloucheva:
Dynamic Evacuation Architecture using Context-Aware Policy Management. 38-49 - Adrien Joly, Pierre Maret, Johann Daigremont:
Context-Awareness, The Missing Block of Social Networking. 50-65 - Müller R. P. Gonçalves, Edson dos Santos Moreira, Luciana Andréia Fondazzi Martimiano:
Trust and Privacy: Informal Ways to Assess Risk on Opportunistic Exchanges. 66-85 - Masayuki Ihara, Minoru Kobayashi, Yoshinori Sakai:
A New Paradigm of Designing Human Communication Tools: A Human Affordance Theory. 86-103 - Jörn Altmann, Alireza Abbasi, Junseok Hwang:
The RP-Index and the CP-Index for Evaluating the Productivity of Researchers and their Communities. 104-118
Volume 6, Number 3, May 2009
- Natarajan Meghanathan, Dhinaharan Nagamalai:
Guest Editorial. - Xin Wang, Feng Feng, Xinmei Wang, Qi Wang:
A More Secure MFE Multivariate Public Key Encryption Scheme. 1-9 - Jungwook Song, Sunyoung Han:
Mobile Node Authentication Protocol for Proxy Mobile. 10-19 - Hayoung Oh, Inshil Doh, Kijoon Chae:
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. 20-32 - Boo-Hyung Lee, Jeong-Hyun Park:
Improvement of Carrier Sorting Rate of Letter in Postal Logistic. 33-42 - Hayoung Oh, Inshil Doh, Kijoon Chae:
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network. 43-56 - Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management. 57-74 - Ilkyeun Ra, Tae-Kyou Park:
A Forensic Logging System Based on a Secure OS. 75-91
Volume 6, Number 4, August 2009
- Rajendra Akerkar:
Editorial. - Henry Hexmoor:
A Methodology for Comparing Service Policies Using a Trust Model. 1-15 - Koustubh Kulkarni, Sudip Sanyal, Hameed Al-Qaheri, Sugata Sanyal:
Dynamic Reconfiguration of Wireless Sensor Networks. 16-42 - Mohsen Machhout, Guitouni Zied, Zeghid Medien, Rached Tourki:
Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator. 43-62 - Marcel Fouda Ndjodo, Amougou Ngoumou:
The Feature Oriented Reuse Method with Business Component Semantics. 63-83
Volume 6, Number 5, December 2009
- André Flory, Martine Collard:
Guest Editorial. - Christoph Lofi, Wolf-Tilo Balke:
Efficient skyline refinement using trade-offs respecting don't care attributes. 1-29 - Antonio Muñoz, Antonio Maña, Daniel Serrano:
Protecting agents from malicious hosts using TPM. 30-58 - Vincent Pijpers, Jaap Gordijn, Hans Akkermans:
e3alignment: Exploring inter-organizational alignment in net worked value constellations. 59-88 - Robert Lagerström, Ulrik Franke, Pontus Johnson, Johan Ullberg:
A method for creating entreprise architecture metamodels applied to systems modifiability. 89-120 - Carlos Cares, Xavier Franch:
3MSF: A framework to select mobile office devices. 121-144 - Giovanni Giachetti, Beatriz Marín, Oscar Pastor:
Integration of domain-specific modelling languages and UML through UML profile extension mechanism. 145-174 - Samuel Renault, Oscar Mendez-Bonilla, Xavier Franch, Carme Quer:
A pattern-based method for building requirements documents in call-for-tender processes. 175-202
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.