default search action
Journal of Systems and Software (JSS), Volume 75
Volume 75, Number 1-2, 15 February 2005
- Pete Knoke, Ana María Moreno, Michael Ryan:
Editorial. 1-2 - Alex Baker, Emily Oh Navarro, André van der Hoek:
An experimental card game for teaching software engineering processes. 3-16 - Éric Germain, Pierre N. Robillard:
Engineering-based processes and agile methodologies for software development: a comparative case study. 17-27 - David A. Carrington, Paul A. Strooper, Sharron Newby, Terry Stevenson:
An industry/university collaboration to upgrade software engineering knowledge and skills in industry. 29-39 - Anthony J. Cowling:
The role of modelling in the software engineering curriculum. 41-53 - David Budgen, James E. Tomayko:
The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education. 55-62 - Hung-Min Sun, Bing-Chang Chen, Tzonelih Hwang:
Secure key agreement protocols for three-party against guessing attacks. 63-68 - Heyuan Huang, Shen-sheng Zhang, Jian Cao, Yonghong Duan:
A practical pattern recovery approach based on both structural and behavioral analysis. 69-87 - Zuhua Shao:
Cryptanalysis of Xia-You group signature scheme. 89-94 - Wing-Fai Poon, Kwok-Tung Lo, Jian Feng:
Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems. 95-107 - Shih-Chien Chou, An-Feng Liu, Chien-Jung Wu:
Preventing information leakage within workflows that execute among competing organizations. 109-123 - Subhashini Raghunathan, Armin R. Mikler, Cliff Cozzolino:
Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework. 125-137 - Manuel J. Fernández-Iglesias, Juan C. Burguillo-Rial, Francisco J. González-Castaño, Martín Llamas Nistal:
Wireless protocol testing and validation supported by formal methods. A hands-on report. 139-154 - Yi-Hsuan Lee, Cheng Chen:
A two-level scheduling method: an effective parallelizing technique for uniform nested loops on a DSP multiprocessor. 155-170 - Muhammad Kamran Malik, Osama Khan, Tahir Mobashir, S. Mansoor Sarwar:
Migratable sockets in cluster computing. 171-177 - Shih-Chien Chou:
An agent-based inter-application information flow control model. 179-187 - Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. 189-192 - Weibin Zhao, Henning Schulzrinne:
Enhancing Service Location Protocol for efficiency, scalability and advanced discovery. 193-204 - Ning Zhang, Qi Shi, Madjid Merabti:
Revocation of privacy-enhanced public-key certificates. 205-214 - Sherali Zeadally, Junhua Pan:
J2EE support for wireless services. 215-226 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level. 227-234
Volume 75, Number 3, March 2005
- Steven Guan, Richard Lai:
Adaptive multimedia computing. 235-236 - Ewa Kusmierek, David Hung-Chang Du:
Streaming video delivery over Internet with adaptive end-to-end QoS. 237-252 - Zhijun Lei, Nicolas D. Georganas:
Adaptive video transcoding and streaming over wireless channels. 253-270 - Shu-Ching Chen, Mei-Ling Shyu, Irina Gray, Hongli Luo:
An adaptive rate-control streaming mechanism with optimal buffer utilization. 271-282 - Ing-Chau Chang, Sheng-Wen Hsieh:
ATF: an Adaptive Three-layer Framework for inter-stream synchronization of SMIL multimedia presentations. 283-303 - Sunilkumar S. Manvi, P. Venkataram:
An agent based adaptive bandwidth allocation scheme for multimedia applications. 305-318 - Xin Liu, Steve Goddard:
Scheduling legacy multimedia applications. 319-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.