Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcse/jcse5.bht:"
@article{DBLP:journals/jcse/Al-KatebL11, author = {Mohammed Al{-}Kateb and Byung Suk Lee}, title = {Load Shedding for Temporal Queries over Data Streams}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {294--304}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.294}, doi = {10.5626/JCSE.2011.5.4.294}, timestamp = {Thu, 01 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/Al-KatebL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/FaresSZ11, author = {Ahmed Fares and Mohamed I. Sharawy and Hala Helmy Zayed}, title = {Intrusion Detection: Supervised Machine Learning}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {305--313}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.305}, doi = {10.5626/JCSE.2011.5.4.305}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/FaresSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/GuoVP11, author = {Hongyu Guo and Herna L. Viktor and Eric Paquet}, title = {Privacy Disclosure and Preservation in Learning with Multi-Relational Databases}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {183--196}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.183}, doi = {10.5626/JCSE.2011.5.3.183}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/GuoVP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/GuoYW11, author = {Ling Guo and Xiaowei Ying and Xintao Wu}, title = {Limiting Attribute Disclosure in Randomization Based Microdata Release}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {169--182}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.169}, doi = {10.5626/JCSE.2011.5.3.169}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/GuoYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/HelalBCSDC11, author = {Sumi Helal and Raja Bose and Chao Chen and Andy Smith and Scott de Deugd and Diane J. Cook}, title = {{STEPSTONE:} An Intelligent Integration Architecture for Personal Tele-Health}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {269--281}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.269}, doi = {10.5626/JCSE.2011.5.3.269}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/HelalBCSDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/JeonKLK11, author = {Junghwi Jeon and Chulmin Kim and Ki{-}seok Lee and Cheeha Kim}, title = {Fast Retransmission Scheme for Overcoming Hidden Node Problem in {IEEE} 802.11 Networks}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {324--330}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.324}, doi = {10.5626/JCSE.2011.5.4.324}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/JeonKLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KangSH11, author = {Joon{-}Myung Kang and Sin{-}Seok Seo and James Won{-}Ki Hong}, title = {Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {338--345}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.338}, doi = {10.5626/JCSE.2011.5.4.338}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KangSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KapitanovaWKS11, author = {Krasimira Kapitanova and Yuan Wei and Woochul Kang and Sang Hyuk Son}, title = {Applying Formal Methods to Modeling and Analysis of Real-time Data Streams}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {85--110}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.1.085}, doi = {10.5626/JCSE.2011.5.1.085}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KapitanovaWKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KarakasidisV11, author = {Alexandros Karakasidis and Vassilios S. Verykios}, title = {Secure Blocking + Secure Matching = Secure Record Linkage}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {223--235}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.223}, doi = {10.5626/JCSE.2011.5.3.223}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KarakasidisV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KimAC11, author = {Byungjin Kim and Youngho Ahn and Ki{-}Seok Chung}, title = {A Technique for Fast Process Creation Based on Creation Location}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {283--287}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.283}, doi = {10.5626/JCSE.2011.5.4.283}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KimAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KimK11, author = {Jung Eun Kim and Yoohwan Kim}, title = {A Secure Credit Card Transaction Method Based on Kerberos}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {51--70}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.1.051}, doi = {10.5626/JCSE.2011.5.1.051}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KimK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KimK11a, author = {Minkyong Kim and David Kotz}, title = {Identifying Unusual Days}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {71--84}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.1.071}, doi = {10.5626/JCSE.2011.5.1.071}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KimK11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KimLKY11, author = {Ji{-}Hoon Kim and Kwang{-}Jo Lee and Taek{-}Hun Kim and Sung{-}Bong Yang}, title = {Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in {MANET}}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {19--31}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.1.019}, doi = {10.5626/JCSE.2011.5.1.019}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KimLKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KimLS11, author = {Daehyeok Kim and Wan{-}Seon Lim and Young{-}Joo Suh}, title = {Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {316--323}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.316}, doi = {10.5626/JCSE.2011.5.4.316}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KimLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KimSS11, author = {Harksoo Kim and Choong{-}Nyoung Seon and Jungyun Seo}, title = {Review of Korean Speech Act Classification: Machine Learning Methods}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {288--293}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.288}, doi = {10.5626/JCSE.2011.5.4.288}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KimSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/KoS11, author = {Youngjoong Ko and Jungyun Seo}, title = {Issues and Empirical Results for Improving Text Classification}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {2}, pages = {150--160}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.2.150}, doi = {10.5626/JCSE.2011.5.2.150}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/KoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/LeeH11, author = {Minkyu Lee and Dongsoo Han}, title = {Ubiscript: {A} Script Language for Ubiquitous Environment}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {2}, pages = {141--149}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.2.141}, doi = {10.5626/JCSE.2011.5.2.141}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/LeeH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/LiS11, author = {Yidong Li and Hong Shen}, title = {Anonymizing Graphs Against Weight-based Attacks with Community Preservation}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {197--209}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.197}, doi = {10.5626/JCSE.2011.5.3.197}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/LiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/MilevskiyH11, author = {Igor Milevskiy and Jin{-}Young Ha}, title = {A Fast Algorithm for Korean Text Extraction and Segmentation from Subway Signboard Images Utilizing Smartphone Sensors}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {161--166}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.161}, doi = {10.5626/JCSE.2011.5.3.161}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/MilevskiyH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/NugentGCDMZSP11, author = {Chris D. Nugent and Leo Galway and Liming Chen and Mark P. Donnelly and Sally I. McClean and Shuai Zhang and Bryan W. Scotney and Gerard Parr}, title = {Managing Sensor Data in Ambient Assisted Living}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {237--245}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.237}, doi = {10.5626/JCSE.2011.5.3.237}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/NugentGCDMZSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/OrdonezNG11, author = {Carlos Ordonez and Mario Navas and Carlos Garcia{-}Alvarado}, title = {Parallel Multithreaded Processing for Data Set Summarization on Multicore CPUs}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {2}, pages = {111--120}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.2.111}, doi = {10.5626/JCSE.2011.5.2.111}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/OrdonezNG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/ParkP11, author = {Wooram Park and Chanik Park}, title = {Data Firewall: {A} TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {331--337}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.331}, doi = {10.5626/JCSE.2011.5.4.331}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/ParkP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/PoonLGLZ11, author = {Carmen C. Y. Poon and Qing Liu and Hui Gao and Wan{-}Hua Lin and Yuan{-}Ting Zhang}, title = {Wearable Intelligent Systems for E-Health}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {246--256}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.246}, doi = {10.5626/JCSE.2011.5.3.246}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/PoonLGLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/RohH11, author = {Gook{-}Pil Roh and Seung{-}won Hwang}, title = {Online Clustering Algorithms for Semantic-Rich Network Trajectories}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {4}, pages = {346--353}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.4.346}, doi = {10.5626/JCSE.2011.5.4.346}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/RohH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/RyooP11, author = {Jungwoo Ryoo and Eun{-}A Park}, title = {Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {33--50}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.1.033}, doi = {10.5626/JCSE.2011.5.1.033}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/RyooP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/RyuLK11, author = {Kyung Dong Ryu and Kang{-}Won Lee and Jihie Kim}, title = {Preface for {KOCSEA} Special Issue}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {32}, year = {2011}, url = {http://jcse.kiise.org/PublishedPaper/year\_abstract.asp?idx=83}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/RyuLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/SioutasMKV11, author = {Spyros Sioutas and Emmanouil Magkos and Ioannis Karydis and Vassilios S. Verykios}, title = {Uncertainty for Privacy and 2-Dimensional Range Query Distortion}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {210--222}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.210}, doi = {10.5626/JCSE.2011.5.3.210}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/SioutasMKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/XuY11, author = {Qian Xu and Qiang Yang}, title = {A Survey of Transfer and Multitask Learning in Bioinformatics}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {3}, pages = {257--268}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.3.257}, doi = {10.5626/JCSE.2011.5.3.257}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/XuY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/YanZ11, author = {Jun Yan and Wei Zhang}, title = {Bounding Worst-Case Performance for Multi-Core Processors with Shared {L2} Instruction Caches}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {1}, pages = {1--18}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.1.001}, doi = {10.5626/JCSE.2011.5.1.001}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/YanZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/YanZ11a, author = {Jun Yan and Wei Zhang}, title = {Computing and Reducing Transient Error Propagation in Registers}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {2}, pages = {121--130}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.2.121}, doi = {10.5626/JCSE.2011.5.2.121}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/YanZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/YanZ11b, author = {Jun Yan and Wei Zhang}, title = {An Interference Matrix Based Approach to Bounding Worst-Case Inter-Thread Cache Interferences and {WCET} for Multi-Core Processors}, journal = {J. Comput. Sci. Eng.}, volume = {5}, number = {2}, pages = {131--140}, year = {2011}, url = {https://doi.org/10.5626/JCSE.2011.5.2.131}, doi = {10.5626/JCSE.2011.5.2.131}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/YanZ11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.