Journals in DBLP
Min-Shiang Hwang , Iuon-Chang Lin , Li-Hua Li A simple micro-payment scheme. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:221-229 [Journal ] Hai Zhuge , To-Yat Cheung , Hung-keng Pung A timed workflow process model. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:231-243 [Journal ] Karl R. P. H. Leung , Lucas Chi Kwong Hui Handling signature purposes in workflow systems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:245-259 [Journal ] Phen-Lan Lin Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:261-271 [Journal ] Guy G. Helmer , Johnny S. Wong , Subhasri Madaka Anomalous intrusion detection system for hostile Java applets. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:273-286 [Journal ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng A modified remote login authentication scheme based on geometric approach. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:287-290 [Journal ] Po-Whei Huang , Phen-Lan Lin , H. Y. Lin Optimizing storage utilization in R-tree dynamic index structure for spatial databases. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:291-299 [Journal ] Khaled El Emam , Saïda Benlarbi , Nishith Goel , Shesh N. Rai Comparing case-based reasoning classifiers for predicting high risk software components. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:301-320 [Journal ] Tzong-Chen Wu , Chih-Chan Huang , D.-J. Guan Delegated multisignature scheme with document decomposition. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:321-328 [Journal ]