Digital Library
Search: "[ keyword: GRA ]" (82)
-
Eun-Sun Cho, Sumi Helal
Vol. 8, No. 2, pp. 279-300, Jun. 2012
10.3745/JIPS.2012.8.2.279
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations -
Sangpil Lee, Deokho Kim, Jaeyoung Yi, Won Woo Ro
Vol. 8, No. 1, pp. 159-174, Mar. 2012
10.3745/JIPS.2012.8.1.159
Keywords: General-Purpose Computation on a Graphics Processing Unit, SEED Block Cipher, Parallelism, Multi-Core Processors -
Praveen Ranjan Srivastava
Vol. 8, No. 1, pp. 21-54, Mar. 2012
10.3745/JIPS.2012.8.1.021
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM) -
Witold Pedrycz
Vol. 7, No. 3, pp. 397-412, Sep. 2011
10.3745/JIPS.2011.7.3.397
Keywords: Information Granularity, Principle of Justifiable Granularity, Knowledge management, Optimal Granularity Allocation -
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan, Rajkumar Buyya
Vol. 7, No. 2, pp. 299-320, Jun. 2011
10.3745/JIPS.2011.7.2.299
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time -
Mouhamed Abdulla, Yousef R. Shayan
Vol. 7, No. 1, pp. 43-52, Mar. 2011
10.3745/JIPS.2011.7.1.043
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation -
Jiehui Chen, Mariam B.Salim, Mitsuji Matsumoto
Vol. 7, No. 1, pp. 17-28, Mar. 2011
10.3745/JIPS.2011.7.1.017
Keywords: Mobile Target Tracking, Sensor Network, Clustering, Voronoi Diagram -
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai
Vol. 6, No. 4, pp. 435-452, Dec. 2010
10.3745/JIPS.2010.6.4.435
Keywords: Data Hiding, Steganography, Vector Quantization -
Mooseop Kim, Youngsae Kim, Hyunsook Cho
Vol. 5, No. 4, pp. 187-196, Dec. 2009
10.3745/JIPS.2009.5.4.187
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing -
Thanh Le Dinh
Vol. 5, No. 3, pp. 145-150, Sep. 2009
10.3745/JIPS.2009.5.3.145
Keywords: Wireless Sensor Network, Hole, Boundary detection, 2-neighbor graph