Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
263 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic C - Computer Systems Organization
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Mapping and Scheduling in Heterogeneous NoC through Population-Based Incremental Learning
Freddy Bolanos
,
Fredy Rivera
,
Nader Bagherzadeh
Part of: Adaptive Methodologies and Designs for Network-on-Chip based Systems
10.3217/jucs-018-07-0901
01-04-2012
Unique: 523 | Total: 690
| Access Period:
901-916
HTML
XML
PDF
Research Article
Adaptive Group Key Management Protocol for Wireless Communications
Saïd Gharout
,
Abdelmadjid Bouabdallah
,
Yacine Challal
,
Mohammed Achemlal
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0874
28-03-2012
Unique: 486 | Total: 609
| Access Period:
874-898
HTML
XML
PDF
Research Article
Countermeasures to Prevent Misbehaviour in VANETs
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0857
28-03-2012
Unique: 549 | Total: 714
| Access Period:
857-873
HTML
XML
PDF
Research Article
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment
Oscar Rebollo
,
Daniel Mellado
,
Eduardo Fernández-Medina
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0798
28-03-2012
Unique: 596 | Total: 785
| Access Period:
798-815
HTML
XML
PDF
Research Article
Decision Strategies for a P2P Computing System
Grzegorz Chmaj
,
Krzysztof Walkowiak
10.3217/jucs-018-05-0599
01-03-2012
Unique: 482 | Total: 654
| Access Period:
599-622
HTML
XML
PDF
Research Article
RESTifying a Legacy Semantic Search System: Experience and Lessons Learned
Guillermo Vega-Gorgojo
,
Eduardo Gómez-Sánchez
,
Miguel Bote-Lorenzo
,
Juan Asensio-Pérez
10.3217/jucs-018-02-0286
28-01-2012
Unique: 557 | Total: 698
| Access Period:
286-311
HTML
XML
PDF
Research Article
Supporting End-User Development through a New Composition Model: An Empirical Study
David Lizcano
,
Fernando Alonso
,
Javier Soriano
,
Genoveva López
10.3217/jucs-018-02-0143
28-01-2012
Unique: 480 | Total: 656
| Access Period:
143-176
HTML
XML
PDF
Research Article
Reconfigurable VBSME Architecture Using RBSAD
Joaquin Olivares
10.3217/jucs-018-02-0264
18-01-2012
Unique: 472 | Total: 647
| Access Period:
264-285
HTML
XML
PDF
Research Article
Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks
Junzhou Luo
,
Wenjia Wu
,
Ming Yang
10.3217/jucs-017-14-2064
01-10-2011
Unique: 350 | Total: 441
| Access Period:
2064-2083
HTML
XML
PDF
Research Article
Web Services Discovery in a Pay-As-You-Go Fashion
Ying Pan
,
Yong Tang
,
Shu Li
10.3217/jucs-017-14-2029
01-10-2011
Unique: 328 | Total: 392
| Access Period:
2029-2047
HTML
XML
PDF
Research Article
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
Khaled Salah
,
Mojeeb-Al-Rhman Al-Khiaty
,
Rashad Ahmed
,
Adnan Mahdi
10.3217/jucs-017-11-1605
01-07-2011
Unique: 398 | Total: 515
| Access Period:
1605-1622
HTML
XML
PDF
Research Article
Time is not Enough: Dealing with Behavior in Real-Time Systems
Leo Ordinez
,
David Donari
,
Rodrigo Santos
,
Javier Orozco
10.3217/jucs-017-11-1572
01-07-2011
Unique: 367 | Total: 452
| Access Period:
1572-1604
HTML
XML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK