Journal: Comput. Syst. Sci. Eng.

Volume 19, Issue 6

0 -- 0David Taniar, Hui Yee Khaw, Haorianto Cokrowijoyo Tjioe, J. Wenny Rahayu. The use of hints in object-relational query optimization
0 -- 0Richard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon. RDCT: A novel reconfigurable dynamic cache size tuner to shorten information retrieval time over the Internet
0 -- 0Min-Jae Lee, Wook-Shin Han, Kyu-Young Whang. Transformation-based spatial partition join
0 -- 0Natalia López, Manuel Núñez, Fernando Rubio. Predicting performance in the presence of stochastic information
0 -- 0Keqiu Li, Hong Shen. Proxy placement problem for coordinated en-route transcoding proxy caching

Volume 19, Issue 5

0 -- 0Abdelkader Hameurlain, Franck Morvan. Parallel query optimization methods and approaches: a survey
0 -- 0Jia-Kang Seng, Jing Yu. Toward a more generic design of XML benchmark workload
0 -- 0Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith. Design and implementation of a consistent time service for fault-tolerant distributed systems
0 -- 0Dmitri D. Perkins, Jinping Yang, Herman D. Hughes, Charles B. Owen. A QoS-aware routing scheme for mobile ad hoc networks

Volume 19, Issue 4

0 -- 0Christopher Kohlhoff, Robert Steele. Evaluating SOAP for high performance applications in capital markets
0 -- 0Der-Rong Din. A simulated annealing algorithm for finding minimal wavelength on a WDM ring
0 -- 0Sooyong Kang, Hyunjoo Kim, Heon Young Yeom. A framework for fault-tolerant peer-to-peer streaming service based on the service migration
0 -- 0Sheila Anand, V. Ramachandran. A generic model for an application based intrusion prevention detection system
0 -- 0Sang-Wook Kim. Concurrency control in main-memory DBMS
0 -- 0Yong-Jin Lee. Minimal cost heuristic algorithm for delay constrained loop network

Volume 19, Issue 3

0 -- 0Robert Tolksdorf, Christian Bizer, Rainer Eckstein, Ralf Heese. Trustable B2C markets on the semantic web
0 -- 0Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati. A comparison of modeling strategies in defining XML-based access control languages
0 -- 0Ling Feng, Willem Jonker. Preparations for encrypted XML metadata querying
0 -- 0Ernesto Damiani. Special issue: Semantics-Aware Techniques for Security
0 -- 0Frédéric Cuppens, Alexandre Miège. AdOrBAC: an administration model for Or-BAC
0 -- 0Giles Hogben. The formation of software agreements between autonomous agents
0 -- 0Paolo Ceravolo. Extracting role hierarchies from authentication data flows
0 -- 0Naren Kodali, Csilla Farkas, Duminda Wijesekera. Specifying multimedia access control using RDF
0 -- 0Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. Trustworthiness and CCCI metrics in P2P communication
0 -- 0Ernesto Damiani. Semantics-aware techniques for security

Volume 19, Issue 2

0 -- 0Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon. HBP: an optimization technique to shorten the control cycle time of the Neural Network Controller that provides dynamic buffer tuning to eliminate overflow at user level
0 -- 0Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. Classification of trust in Peer-to-Peer (P2P) communication
0 -- 0Y. H. Wang, C. M. Chung, C.-J. Lee, C.-C. Chuang. Ad hoc routing protocol based on setup on-demand backup node
0 -- 0David Taniar, J. Wenny Rahayu, Rebecca Boon-Noi Tan. Parallel algorithms for selection query processing involving index in parallel database systems

Volume 19, Issue 1

3 -- 10Joon-Ho Woo, Byung Suk Lee, Min-Jae Lee, Jae-Gil Lee, Kyu-Young Whang. Transformation-based temporal aggregation using order-based buffer replacement strategy
11 -- 25Tarek S. Abdelrahman, Robert Sawaya. Improving the structure of loop nests in scientific programs
27 -- 37Hsi-Cheng Chang, Chiun-Chieh Hsu, Chi-Kai Chan. Automatic document clustering based on keyword clusters using partitions of weighted diagraphs
39 -- 48G. Q. Liu, Min Xie, Y. S. Dai, Kim-Leng Poh. On program and file assignment for distributed systems
49 -- 56Constantine Katsinis. Hot spots on an interconnection network for broadcast communication