The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Systems and Software
2005, volume: 78, number: 1

  1. Ruimin Shen, Yonggang Fu, Hongtao Lu
    A novel image watermarking scheme based on support vector regression. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:1-8 [Journal]
  2. Deok-Hwan Kim, Chin-Wan Chung, Kobus Barnard
    Relevance feedback using adaptive clustering for image similarity retrieval. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:9-23 [Journal]
  3. Ben C. B. Chan, John C. F. Lau, John C. S. Lui
    OPERA: An open-source extensible router architecture for adding new network services and protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:24-36 [Journal]
  4. Yonggoo Choi, Songchun Moon
    Lightweight multigranularity locking for transaction management in XML database systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:37-46 [Journal]
  5. Rodrigo M. Santos, Jorge Santos, Javier Orozco
    A least upper bound on the fault tolerance of real-time systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:47-55 [Journal]
  6. Haiyong Bao, Zhenfu Cao, Shengbao Wang
    Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:56-59 [Journal]
  7. Stelvio Cimato, Alfredo De Santis, Umberto Ferraro Petrillo
    Overcoming the obfuscation of Java programs by identifier renaming. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:60-72 [Journal]
  8. Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
    DDH-based group key agreement in a mobile environment. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:73-83 [Journal]
  9. Shih-Chien Chou, Chin-Yi Chang
    An information flow control model for C applications based on access control lists. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:84-100 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002