


default search action
Journal of Systems and Software (JSS), Volume 55
Volume 55, Number 1, November 2000
- Robert L. Glass:

Talk About a Software Crisis - Not! 1-2 - Julie A. McCann, Paul Howlett, J. S. Crane:

Kendra: adaptive Internet system. 3-17 - Ayal Itzkovitz, Nitzan Niv, Assaf Schuster:

Dynamic adaptation of sharing granularity in DSM systems. 19-32 - Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang:

Hierarchical loop scheduling for clustered NUMA machines. 33-44 - Sumit Ghosh, Tony S. Lee, Seong-Soon Joo

:
A frame of reference for the performance evaluation of asynchronous, distributed decision-making algorithms. 45-56 - Victor C. S. Lee

, Kwok-Wa Lam:
Conflict free transaction scheduling using serialization graph for real-time databases. 57-65 - Yousif Mustafa, Olugbenga Mejabi:

Changing class behaviors at run-time in MRP systems. 67-71 - Tyng-Yeu Liang, Jyh-Chang Ueng, Ce-Kuen Shieh, Deh-Yuan Chuang, Jun-Qi Lee:

Distinguishing sharing types to minimize communication in software distributed shared memory systems. 73-85 - Ewan D. Tempero

, Robert Biddle:
Simulating multiple inheritance in Java. 87-100
Volume 55, Number 2, December 2000
- Robert L. Glass:

A good-bye of sorts. 101- - Abdel Elah Al-Ayyoub, Fawaz Ahmed Masoud:

Heuristic search revisited. 103-113 - Athena Vakali

, Yannis Manolopoulos:
Data placement schemes in replicated mirrored disk systems. 115-128 - Dong Ho Kim, Keun Ho Ryu, Hong Soo Kim:

A spatiotemporal database model and query language. 129-149 - Sanjay Kumar Madria, S. N. Maheshwari, B. Chandra, Bharat K. Bhargava:

An open and safe nested transaction model: concurrency and recovery. 151-165 - Shivakant Mishra, Sudha M. Kuntur:

Newsmonger: a technique to improve the performance of atomic broadcast protocols. 167-183 - Hasan Çam:

List ranking on processor arrays. 185-192 - Wing Lok Yeung

:
Automated translation of JSD into CSP - a case study in methods integration. 193-202 - Danny Chiang Choon Poo, Teck-Kang Toh, Christopher S. G. Khoo:

Enhancing online catalog searches with an electronic referencer. 203-219
Volume 55, Number 3, January 2001
- Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li:

A simple micro-payment scheme. 221-229 - Hai Zhuge, To-Yat Cheung, Hung Keng Pung:

A timed workflow process model. 231-243 - Karl R. P. H. Leung, Lucas Chi Kwong Hui:

Handling signature purposes in workflow systems. 245-259 - Phen-Lan Lin:

Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. 261-271 - Guy G. Helmer, Johnny S. Wong, Subhasri Madaka:

Anomalous intrusion detection system for hostile Java applets. 273-286 - Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:

A modified remote login authentication scheme based on geometric approach. 287-290 - Po-Whei Huang, Phen-Lan Lin, H. Y. Lin:

Optimizing storage utilization in R-tree dynamic index structure for spatial databases. 291-299 - Khaled El Emam, Saïda Benlarbi, Nishith Goel, Shesh N. Rai:

Comparing case-based reasoning classifiers for predicting high risk software components. 301-320 - Tzong-Chen Wu, Chih-Chan Huang, D.-J. Guan:

Delegated multisignature scheme with document decomposition. 321-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














