Journal: Comput. Syst. Sci. Eng.

Volume 17, Issue 4/5

213 -- 221Jinn-ke Jan, Yu-Yi Chen. A secure anonymous voting protocol with a complete supervision
223 -- 236Oran Sharon, Alexander Vainshtein, Anatoly Likholat. On the relation between the throughput gain with slot reuse and the number of address bits in the dual bus configuration Part 1: Maximum throughput
237 -- 251Oran Sharon, Anatoly Likholat. On the relation between the throughput gain with slot reuse and the number of address bits in the dual bus configuration Part 2: Linear and equal throughputs
253 -- 257Nageswara S. V. Rao, Nachimuthu Manickam. General quickest paths and path-tables
259 -- 267Ahmad R. Sharafat, Mehran S. Fallah. A measure of resilience against denial of service attacks in computer networks
269 -- 280Seung-Joon Seok, Sung-Hyuck Lee, Jinwoo Park, Chul-Hee Kang. Characteristics of assured service and an alternative RIO scheme in differentiated services networks
281 -- 291Der-Chyuan Lou, Te-Lung Yin, Ming-Chang Chang. An efficient steganographic approach
293 -- 302Kun-Lung Wu, Philip S. Yu. Controlled replication for hash routing-based web caching
303 -- 310Sang-Wook Kim, Hee-Sun Won. Bulk-loading of a multidimensional file: algorithm and its performance evaluation