Digital Library
Search: "[ author: S ]" (666)
-
Ash Mohammad Abbas
Vol. 7, No. 2, pp. 341-354, Jun. 2011
10.3745/JIPS.2011.7.2.341
Keywords: information systems, Quality of Research, Impact factor, h-index, g-index -
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan, Rajkumar Buyya
Vol. 7, No. 2, pp. 299-320, Jun. 2011
10.3745/JIPS.2011.7.2.299
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time -
Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim, Seung Soo Park
Vol. 7, No. 2, pp. 287-298, Jun. 2011
10.3745/JIPS.2011.7.2.287
Keywords: Quality model, Quality Metric, Dynamic Service Composition, U-service (Ubiquitous-Service) Ontology, U-service Description Specification -
Yamin Li, Shietung Peng, Wanming Chu
Vol. 7, No. 2, pp. 271-286, Jun. 2011
10.3745/JIPS.2011.7.2.271
Keywords: Interconnection Networks, Algorithm, Parallel Prefix Computation, Sorting -
Mohammad S. Obaidat, Sanjay K. Dhur, her, Khushboo Diwakar
Vol. 7, No. 2, pp. 241-260, Jun. 2011
10.3745/JIPS.2011.7.2.241
Keywords: routing, Multimedia Networks, Congestion-aware Selection, MANET, CASPER, Performance Evaluation -
Gaetan Martens, Ruben Verborgh, Chris Poppe, Rik Van de Walle
Vol. 7, No. 1, pp. 199-208, Mar. 2011
10.3745/JIPS.2011.7.1.199
Keywords: Multimedia, Metadata Annotation, Semantic Web Technologies -
Jae-Jung Kim, Seng-Phil Hong
Vol. 7, No. 1, pp. 187-198, Mar. 2011
10.3745/JIPS.2011.7.1.187
Keywords: Multi-Factor Authentication, PKI, User Authentication, Biometric Authentication -
Mengsong Zou, Lansheng Han, Ming Liu, Qiwen Liu
Vol. 7, No. 1, pp. 173-186, Mar. 2011
10.3745/JIPS.2011.7.1.173
Keywords: computer virus, Behavior-Based Detection, Dynamic Link Library, Behavior Resource Tree -
Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref
Vol. 7, No. 1, pp. 151-158, Mar. 2011
10.3745/JIPS.2011.7.1.151
Keywords: Bivium, Guess and Determine Attack, Stream Ciphers, Linear Approximations, Entropy -
HyoJin Kim, Ramach, ra Bhargav Chitti, JooSeok Song
Vol. 7, No. 1, pp. 137-150, Mar. 2011
10.3745/JIPS.2011.7.1.137
Keywords: Collaborative Attack, Malicious Flooding Attack, Wireless Ad Hoc Network