Journal: Comput. Syst. Sci. Eng.

Volume 29, Issue 6

0 -- 0Ho Seok Kang, Tran Tin, Sung-Ryul Kim. Design and experiments of new IP traceback method based on offline analysis
0 -- 0C. Mala, B. Nithya. Performance evaluation of IEEE 802.11 contention control mechanisms using polygonal sequences
0 -- 0Wei Kuang Lai, Yi-Uan Chen, Tin Yu Wu, Ya-Yin Chen. Dual migration for mobile cloud service in 4G/LTE network
0 -- 0Jianfeng Guan, Wei Quan, Lili Wang, Changqiao Xu, Feilong Tang, Hongke Zhang. Modeling and analysis of mobility stochastic properties in cognitive radio networks
0 -- 0Ilsun You, Fang-Yie Leu, Leonard Barolli. Special Issue: Mobile Internet Technologies and Services - Editorial
0 -- 0Yong-Hwan Lee, Bonam Kim, YoungSeop Kim. AAM-based emotion recognition using variance of facial feature points on mobile video stream
0 -- 0Ying Rao, Huachun Zhou, Deyun Gao, Hongbin Luo, Ying Liu. PCNDN: Proactive caching for efficient mobility support in NDN

Volume 29, Issue 5

0 -- 0Marisol García-Valls, Pablo Basanta-Val, Marga Marcos, Elisabet Estévez-Estévez. A bi-dimensional QoS model for SOA and real-time middleware
0 -- 0R. Anitha, K. Duraiswamy. Application of digital image processing in the determination of mass of the diamonds
0 -- 0Manoj K. Raut, Arindama Singh. A survey on computing prime implicants and implicates in classical and non-classical logics
0 -- 0Se Jung Shin, Won Suk Lee. Interactive discovery of association rules over data streams
0 -- 0Mohammad Osiur Rahman, Aini Hussain, Edgar Scavino, M. A. Hannan, Hassan Basri. DNA computation algorithm for recyclable waste paper sorting

Volume 29, Issue 4

0 -- 0Heng Qi, Guoyu Lan, Kequi Li. A hierarchical kernel for image classification based on layered representation
0 -- 0Kequi Li, Heng Qi. Preface
0 -- 0Guanwen Zhang, Jien Kato, Yu Wang, Kenji Mase. Multi-stage deep convolutional learning for people re-identification
0 -- 0Cuong Xuan Nguyen, Hung-Hsuan Huang, Kyoji Kawagoe. Implementation and evaluations of graphical password using object-based image ranking
0 -- 0Wei Jiang, Cong Wang, Yong-Qing Zhang. Multiple graph regularization constrained nonnegative matrix factorization
0 -- 0Zhiyang Li, Wenyu Qu, Yujie Xu, Junjie Cao, Zhixun Su. Efficient shape representation and retrieval in large database

Volume 29, Issue 3

0 -- 0Rerkchai Fooprateepsiri, Pichet Mareo. A highly robust approach to face authentication based on trace-fuzzy ART combination
0 -- 0Hasan Guler, Fikret Ata. Design of a fuzzy-labview-based mechanical ventilator
0 -- 0Carmelo Militello, Vincenzo Conti, Filippo Sorbello, Salvatore Vitabile. A fast fusion technique for fingerprint and iris spatial descriptors in multimodal biometric systems
0 -- 0Marian Zomorodi Moghadam, Keivan Navi, Mahmood Kalemati. A novel reversible design for double edge triggered flip-flops and new designs of reversible sequential circuits
0 -- 0Lucas Grossi, Jose A. Calvo-Manzano. A systematic review in the decision analysis of selecting an IT outsourcing supplier

Volume 29, Issue 2

0 -- 0Muhammad Ali Ismail, Shahid H. Mirza, Talat Altaf. "LogN+1" and "LogN" model: a binary tree based multi-level cache system for multi-core processors
0 -- 0Yangjie Cao, Hongyang Sun, Depei Qian, Weiguo Wu. Scalable hierarchical scheduling for malleable parallel jobs on multiprocessor-based systems
0 -- 0A. M. Kalpana, K. Tamizarasu, A. Ebenezer Jeyakumar. A fuzzy logic based framework for assessing the maturity level of Indian small scale software organizations
0 -- 0Shahzad Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Imran Ali Khan. Routing protocols for mobile sensor networks: a comparative study

Volume 29, Issue 1

0 -- 0Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma. Trust evaluation in wireless ad-hoc networks using fuzzy system
0 -- 0H. Ari Raptino, Shunsuke Saruwatari, Masaki Bandai, Takashi Watanabe. Rate and relay diversity in temporal spectrum sharing
0 -- 0Zhixiao Wang, Yanxiao Liu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang, Omar Alfandi. Cheating detection and cheater identification in (t, n) secret sharing scheme
0 -- 0Andres Mejia, Reyes Juárez-Ramírez, Sergio Inzunza, Rocio Valenzuela. Implementing adaptive interfaces: a use model for the development of usability in interactive systems
0 -- 0M. Suresha, Ajit Danti, S. K. Narasimhamurthy. Decision trees to multiclass prediction for analysis of arecanut data
0 -- 0Atsushi Kato. Software industry in Okinawa: is 'domestic offshore outsourcing' scheme feasible?
0 -- 0Wuyungerile Li, Shunsuke Saruwatari, Masaki Bandai, Takashi Watanabe. Discussions on trade-offs in data aggregation in wireless sensor networks
0 -- 0Supriya Chakraborty, Nabendu Chaki. Generic organization of semi-structured data
0 -- 0James Carmichael. Diagnosis of dysarthria subtype via spectral and waveform analysis
0 -- 0Aziz Qaroush, Mahdi Washaha, Ismail M. Khater. Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message
0 -- 0Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik. A two-phase quantitative methodology for enterprise information security risk analysis