default search action
Journal of Systems and Software (JSS), Volume 58
Volume 58, Number 1, August 2001
- Noritaka Kobayashi, Tatsuhiro Tsuchiya, Tohru Kikuno:
Minimizing the mean delay of quorum-based mutual exclusion schemes. 1-9 - Hwakyung Rim, Ju-wook Jang, Sun-Chun Kim:
Hiding communication overheads in dynamic load balancing for multicomputers. 11-22 - Ching-Wen Chen, Chung-Ping Chung:
Fault-tolerant gamma interconnection network without backtracking. 23-31 - Mohammed Zaki, Hany M. Harb, Tarek S. Sobh:
A learning database system to observe malfunctions and to support network planning. 33-46 - Kai-Yuan Cai, Lin Cai, Weidong Wang, Zhou-Yi Yu, David Zhang:
On the neural network approach in software reliability modeling. 47-62 - Editor's Corner. 63-
- Tsong Yueh Chen, T. H. Tse, Yuen-Tak Yu:
Proportional sampling strategy: a compendium and some insights. 65-81
Volume 58, Number 2, September 2001
- Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen:
A new encryption algorithm for image cryptosystems. 83-91 - Shin-Young Lim, Jeong-Ho Ko, Eun-Ah Jun, Gang-Soo Lee:
Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net. 93-106 - Andy Dowling, John G. Keating:
A proxy-based security architecture for Internet applications in an extranet environment. 107-118 - Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
New nonrepudiable threshold proxy signature scheme with known signers. 119-124 - Yung-Cheng Ma, Chung-Ping Chung:
A dominance relation enhanced branch-and-bound task allocation. 125-134 - Der-Lin Pean, Chao-Chin Wu, Huey-Ting Chua, Cheng Chen:
Design of a scalable multiprocessor architecture and its simulation. 135-152 - Sumit Ghosh:
Understanding complex, real-world systems through asynchronous, distributed decision-making algorithms. 153-167 - Controversy Corner. 169-
- Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo:
Making inconsistency respectable in software development. 171-180
Volume 58, Number 3, September 2001
- Jyrki Akkanen, Jukka K. Nurminen:
Case study of the evolution of routing algorithms in a network planning tool. 181-198 - Li Wang, Wanlei Zhou, Weijia Jia:
The design and implementation of an active replication scheme for distributing services in a cluster of workstations. 199-210 - Jin Hyun Son, Myoung-Ho Kim:
Improving the performance of time-constrained workflow processing. 211-219 - Yin-Fu Huang, Bo-Wei Chao:
A priority-based resource allocation strategy in distributed computing networks. 221-233 - Chia-Tien Dan Lo, Witawas Srisa-an, J. Morris Chang:
A study of page replacement performance in garbage collection heap. 235-245 - Taehyoun Kim, Naehyuck Chang, Heonshik Shin:
Joint scheduling of garbage collector and hard real-time tasks for embedded applications. 247-260 - Brian Huston:
The effects of design pattern application on metric scores. 261-269 - Eric Jui-Lin Lu, Ru-Hui Tsai, Shihyu Chou:
An empirical study of XML/EDI. 271-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.