


default search action
International Journal of Computer Science & Applications, Volume 6
Volume 6, Number 1, January 2009
- Rajeev Wankar:

Editorial. - G. Geethakumari, Atul Negi, V. N. Sastry:

A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems. 1-12 - Hashir Karim Kidwai, Tamer F. Rabie, Fadi N. Sibai:

Parallel Video Processing Performance Evaluation on the IBM Cell Broadband Engine Processor. 13-25 - Rakesh Kumar Katare, Narendra S. Chaudhari:

Study of Topological Property of Interconnection Networks and its Mapping to Sparse Matrix Model. 26-39 - Deven Shah, Dhiren R. Patel:

Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA. 40-52 - G. Sudha Sadasivam, V. Viji Rajendran:

An Efficient Approach to Task Scheduling in Computational Grids. 53-69 - Rafael Moreno-Vozmediano:

Application Layer Multicast for Efficient Grid File Transfer. 70-84 - Shilpa Bhalerao, Maya Ingle:

Incorporating Vital Factors in Agile Estimation through Algorithmic Method. 85-97 - Debasish Jana, Amritava Chaudhuri, Bijan Bihari Bhaumik:

Privacy and Anonymity Protection in Computational Grid Services. 98-107 - Rajeev Wankar, Rajendra Akerkar:

Reconfigurable Architectures and Algorithms: A Research Survey. 108-123
Volume 6, Number 2, March 2009
- Jacques Calmet, Pierre Maret:

Editorial. iii-iv - Jacques Calmet, Pierre Maret:

Agent-Based Knowledge Communities. 01-18 - Bert-Jan van Beijnum, Pravin Pawar, C. B. Dulawan, Hermie J. Hermens:

Mobile Virtual Communities for Telemedicine: Research Challenges and Opportunities. 19-37 - Ulrich Hofmann, Armin Veichtlbauer, Ilka Miloucheva:

Dynamic Evacuation Architecture using Context-Aware Policy Management. 38-49 - Adrien Joly, Pierre Maret, Johann Daigremont:

Context-Awareness, The Missing Block of Social Networking. 50-65 - Müller R. P. Gonçalves, Edson dos Santos Moreira, Luciana Andréia Fondazzi Martimiano:

Trust and Privacy: Informal Ways to Assess Risk on Opportunistic Exchanges. 66-85 - Masayuki Ihara, Minoru Kobayashi, Yoshinori Sakai:

A New Paradigm of Designing Human Communication Tools: A Human Affordance Theory. 86-103 - Jörn Altmann, Alireza Abbasi, Junseok Hwang:

The RP-Index and the CP-Index for Evaluating the Productivity of Researchers and their Communities. 104-118
Volume 6, Number 3, May 2009
- Natarajan Meghanathan, Dhinaharan Nagamalai:

Guest Editorial. - Xin Wang, Feng Feng, Xinmei Wang, Qi Wang:

A More Secure MFE Multivariate Public Key Encryption Scheme. 1-9 - Jungwook Song, Sunyoung Han:

Mobile Node Authentication Protocol for Proxy Mobile. 10-19 - Hayoung Oh, Inshil Doh, Kijoon Chae:

Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. 20-32 - Boo-Hyung Lee, Jeong-Hyun Park:

Improvement of Carrier Sorting Rate of Letter in Postal Logistic. 33-42 - Hayoung Oh, Inshil Doh, Kijoon Chae:

A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network. 43-56 - Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:

Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management. 57-74 - Ilkyeun Ra, Tae-Kyou Park:

A Forensic Logging System Based on a Secure OS. 75-91
Volume 6, Number 4, August 2009
- Rajendra Akerkar:

Editorial. - Henry Hexmoor:

A Methodology for Comparing Service Policies Using a Trust Model. 1-15 - Koustubh Kulkarni, Sudip Sanyal, Hameed Al-Qaheri, Sugata Sanyal:

Dynamic Reconfiguration of Wireless Sensor Networks. 16-42 - Mohsen Machhout, Guitouni Zied, Zeghid Medien, Rached Tourki:

Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator. 43-62 - Marcel Fouda Ndjodo, Amougou Ngoumou:

The Feature Oriented Reuse Method with Business Component Semantics. 63-83
Volume 6, Number 5, December 2009
- André Flory, Martine Collard:

Guest Editorial. - Christoph Lofi, Wolf-Tilo Balke:

Efficient skyline refinement using trade-offs respecting don't care attributes. 1-29 - Antonio Muñoz, Antonio Maña, Daniel Serrano:

Protecting agents from malicious hosts using TPM. 30-58 - Vincent Pijpers, Jaap Gordijn, Hans Akkermans:

e3alignment: Exploring inter-organizational alignment in net worked value constellations. 59-88 - Robert Lagerström, Ulrik Franke, Pontus Johnson, Johan Ullberg:

A method for creating entreprise architecture metamodels applied to systems modifiability. 89-120 - Carlos Cares, Xavier Franch:

3MSF: A framework to select mobile office devices. 121-144 - Giovanni Giachetti, Beatriz Marín, Oscar Pastor:

Integration of domain-specific modelling languages and UML through UML profile extension mechanism. 145-174 - Samuel Renault, Oscar Mendez-Bonilla, Xavier Franch, Carme Quer:

A pattern-based method for building requirements documents in call-for-tender processes. 175-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














