| nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
| 1 |
An efficient design and implementation for grid advanced information service
|
Lim, Minyeol |
|
|
33 |
1-2 |
p. 53-63 |
artikel |
| 2 |
A new approach for high performance computing systems with various checkpointing schemes
|
Park, Gyung-Leen |
|
|
33 |
1-2 |
p. 65-78 |
artikel |
| 3 |
A new incremental watermarking based on dual-tree complex wavelet transform
|
Lee, Joong-Jae |
|
|
33 |
1-2 |
p. 133-140 |
artikel |
| 4 |
A study upon SNMP MIB II algorithm: For the calculation of the line utilization
|
Ahn, Seongjin |
|
|
33 |
1-2 |
p. 79-91 |
artikel |
| 5 |
Embedded processor validation environment using a cycle-accurate retargetable instruction-set simulator
|
Yang, Hoonmo |
|
|
33 |
1-2 |
p. 19-32 |
artikel |
| 6 |
Guest editorial
|
Mun, Youngsong |
|
|
33 |
1-2 |
p. 5-6 |
artikel |
| 7 |
Intrusion-tolerant server architecture for survivable services
|
Min, Byoung Joon |
|
|
33 |
1-2 |
p. 93-102 |
artikel |
| 8 |
On bandwidth adjusted multicast communications in pipeline router architecture
|
Bang, Young-Cheol |
|
|
33 |
1-2 |
p. 7-18 |
artikel |
| 9 |
Performance analysis of banyan-type multistage interconnection networks under nonuniform traffic pattern
|
Mun, Youngsong |
|
|
33 |
1-2 |
p. 33-52 |
artikel |
| 10 |
PRISM: A preventive and risk-reducing integrated security management model using security label
|
Kim, D. S. |
|
|
33 |
1-2 |
p. 103-121 |
artikel |
| 11 |
Secure mutual authentication for ad hoc wireless networks
|
Byung-Gi, Kim |
|
|
33 |
1-2 |
p. 123-132 |
artikel |