default search action
Journal of Systems and Software (JSS), Volume 55
Volume 55, Number 1, November 2000
- Robert L. Glass:
Talk About a Software Crisis - Not! 1-2 - Julie A. McCann, Paul Howlett, J. S. Crane:
Kendra: adaptive Internet system. 3-17 - Ayal Itzkovitz, Nitzan Niv, Assaf Schuster:
Dynamic adaptation of sharing granularity in DSM systems. 19-32 - Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang:
Hierarchical loop scheduling for clustered NUMA machines. 33-44 - Sumit Ghosh, Tony S. Lee, Seong-Soon Joo:
A frame of reference for the performance evaluation of asynchronous, distributed decision-making algorithms. 45-56 - Victor C. S. Lee, Kwok-Wa Lam:
Conflict free transaction scheduling using serialization graph for real-time databases. 57-65 - Yousif Mustafa, Olugbenga Mejabi:
Changing class behaviors at run-time in MRP systems. 67-71 - Tyng-Yeu Liang, Jyh-Chang Ueng, Ce-Kuen Shieh, Deh-Yuan Chuang, Jun-Qi Lee:
Distinguishing sharing types to minimize communication in software distributed shared memory systems. 73-85 - Ewan D. Tempero, Robert Biddle:
Simulating multiple inheritance in Java. 87-100
Volume 55, Number 2, December 2000
- Robert L. Glass:
A good-bye of sorts. 101- - Abdel Elah Al-Ayyoub, Fawaz Ahmed Masoud:
Heuristic search revisited. 103-113 - Athena Vakali, Yannis Manolopoulos:
Data placement schemes in replicated mirrored disk systems. 115-128 - Dong Ho Kim, Keun Ho Ryu, Hong Soo Kim:
A spatiotemporal database model and query language. 129-149 - Sanjay Kumar Madria, S. N. Maheshwari, B. Chandra, Bharat K. Bhargava:
An open and safe nested transaction model: concurrency and recovery. 151-165 - Shivakant Mishra, Sudha M. Kuntur:
Newsmonger: a technique to improve the performance of atomic broadcast protocols. 167-183 - Hasan Çam:
List ranking on processor arrays. 185-192 - Wing Lok Yeung:
Automated translation of JSD into CSP - a case study in methods integration. 193-202 - Danny Chiang Choon Poo, Teck-Kang Toh, Christopher S. G. Khoo:
Enhancing online catalog searches with an electronic referencer. 203-219
Volume 55, Number 3, January 2001
- Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li:
A simple micro-payment scheme. 221-229 - Hai Zhuge, To-Yat Cheung, Hung Keng Pung:
A timed workflow process model. 231-243 - Karl R. P. H. Leung, Lucas Chi Kwong Hui:
Handling signature purposes in workflow systems. 245-259 - Phen-Lan Lin:
Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. 261-271 - Guy G. Helmer, Johnny S. Wong, Subhasri Madaka:
Anomalous intrusion detection system for hostile Java applets. 273-286 - Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
A modified remote login authentication scheme based on geometric approach. 287-290 - Po-Whei Huang, Phen-Lan Lin, H. Y. Lin:
Optimizing storage utilization in R-tree dynamic index structure for spatial databases. 291-299 - Khaled El Emam, Saïda Benlarbi, Nishith Goel, Shesh N. Rai:
Comparing case-based reasoning classifiers for predicting high risk software components. 301-320 - Tzong-Chen Wu, Chih-Chan Huang, D.-J. Guan:
Delegated multisignature scheme with document decomposition. 321-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.