Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Science and Technology
1000-9000
2007 Issue 3
an anti-counterfeiting rfid privacy protection protocol
Xiaolan Zhang~1 Brian King~2 1 Department of Electrical and Computer Engineering;University of Illinois;U.S.A. 2 Department of Electrical and Computer Engineering;Indiana University Purdue University Indianapolis;U.S.A.
..............page:438-448
cryptanalysis of achterbahn-version 1 and-version 2
Xiao-Li Huang~ Chuan-Kun Wu~1 1 The State Key Laboratory of Information Security;Institute of Software; Chinese Academy of Sciences Beijing 100080;China 2 Graduate University of Chinese Academy of Sciences;Beijing 100039;China
..............page:469-475
impossible differential cryptanalysis of reduced-round aria and camellia
Wen-Ling Wu~1 Wen-Tao Zhang~2 Deng-Guo Feng~1 1 State Key Laboratory of Information Security;Institute of Software;Chinese Academy of Sciences;Beijing 100080;China 2 State Key Laboratory of Information Security;Graduate University of Chinese Academy of Sciences;Beijing 100080;China
..............page:449-456
a three-layer model for business processes-process logic,case semantics and workflow management
Chong-Yi Yuan Wen Zhao Shi-Kun Zhang Yu Huang School of Electronics Engineering and Computer Science;Peking University;Beijing 100871;China
..............page:410-425
improving software quality prediction by noise filtering techniques
Taghi M.Khoshgoftaar Pierre Rebours Empirical Software Engineering Laboratory;Department of Computer Science and Engineering;Florida Atlantic University Boca Raton;FL;U.S.A.
..............page:387-396
software project effort estimation based on multiple parametric models generated through data clustering
Juan J.Cuadrado Gallego~1 Daniel Rodríguez~1 Miguel ■ngel Sicilia~1 Miguel Garre Rubio~1 Angel García Crespo~2 1 Department of Computer Science;The University of Alcalá;Alcalé;Spain 2 Department of Computer Science;CarlosⅢUniversity;Madrid;Spain
..............page:371-378
id-based fair off-line electronic cash system with multiple banks
Chang-Ji Wang~ Yong Tang~1 Qing Li~1 1 Department of Computer Science;Sun Yat-Sen University;Guangzhou 510275;China 2 Guangdong Province Information Security Key Laboratory;Guangzhou 510275;China 3 The State Key Laboratory of Information Security;Graduate University of Chinese Academy of Sciences;Beijing 100049 China
..............page:487-493
smart proactive caching scheme for fast authenticated handoff in wireless lan
Sin-Kyu Kim~1 Jae-Woo Choi~2 Dae-Hun Nyang~2 Gene-Beck Hahn~3 Joo-Seok Song~4 1 Electronics Telecommunications Research Institute;Daejeon;Korea 2 Graduate School of Information Technology and Telecommunications;Inha University;Incheon;Korea 3 Mobile Communication Technology Research Lab;LG Electronics;Anyang;Korea 4 Department of Computer Science;Yonsei University;Seoul;Korea
..............page:476-480
edge-oriented spatial interpolation for error concealment of consecutive blocks
Wei Fu~ Guang-Zhong Xing~2 1 Department of Electronic Engineering;Yanshan University;Qinhuangdao 066004;China 2 Department of Material Science;Yanshan University;Qinhuangdao 066004;China
..............page:494-497
targeted local immunization in scale-free peer-to-peer networks
Xin-Li Huang~1 Fu-Tai Zou~2 Fan-Yuan Ma~1 1 Department of Computer Science and Engineering;Shanghai Jiao Tong University;Shanghai 200030;China 2 School of Information Security Engineering;Shanghai Jiao Tong University;Shanghai 200030;China
..............page:457-468
garbage collector verification for proof-carrying code
Chun-Xiao Lin Yi-Yun Chen Long Li Bei Hua Department of Computer Science and Technology;University of Science and Technology of China;Hefei 230027;China
..............page:426-437
some notes on prime-square sequences
En-Jian Bai~ Xiao-Juan Liu~3 1 School of Information Science and Technology;Donghua University;Shanghai 201620;China 2 State Key Laboratory of Information Security;Graduate University of Chinese Academy of Sciences Beijing 100039;China 3 Department of Information and Computing Science;Shanghai University of Electric Power;Shanghai 200090;China
..............page:481-486
developing project duration models in software engineering
Pierre Bourque~1 Serge Oligny~2 Alain Abran~1 Bertrand Fournier~3 1 ■cole de Technologie Supérieure; Montréal; Québec; Canada 2 Bell Canada; Montréal; Québec; Canada 3 Universitédu QuébecàMontréal; Montréal; Québec; Canada
..............page:348-357
on the estimation of the functional size of software from requirements specifications
Nelly Condori-Fernández Silvia Abrah■o Oscar Pastor Department of Information Systems and Computation;Valencia University of Technology;Camino de Vera s/n;46020 Valencia;Spain
..............page:358-370
component dependency in object-oriented software
Li-Guo Yu~1 Srini Ramaswamy~2 1 Computer Science and Informatics;Indiana University South Bend;South Bend;IN 46615;U.S.A. 2 Department of Computer Science;University of Arkansas at Little Rock;Little Rock;AR 72204;U.S.A.
..............page:379-386
improving fault detection in modified code-a study from the telecommunication industry
Piotr Tomaszewski Lars Lundberg Hakan Grahn School of Engineering;Blekinge Institute of Technology;SE-372 25 Ronneby;Sweden
..............page:397-409
preface
..............page:337
an empirical study on the impact of automation on the requirements analysis process
Giuseppe Lami~1 Robert W.Ferguson~2 1 Istituto di Scienza e Tecnologie dell'Informazione"Alessandro Faedo"; I-56124 Pisa; Italy 2 Software Engineering Institute; Carnegie Mellon University; 15213 Pittsburgh; PA; U.S.A.
..............page:338-347