2008
2008
Volume 1, Number 1, 2008 December
-
- Differential Cryptanalysis and Impossible Differential Characteristics of Extended Feistel Networks, Huihui Yap (pp. 1-8).
- Genetic Recommend Generating Method with Real-time Fitness Function Adaption, Minchul Jung, Jehwan Oh, Eunseok Lee (pp. 9-16).
- A Study on Collaboration Informatization Level of Supply Chain Process : Korean Automobile Industry Case, Byoung Gun Kim, Jib Seung Hwang, Seon Do Shin, Jong Hwa Choi, Choon Seong Leem (pp. 17-26).
- Automatic Test Case Generation for BPEL Using Stream X-Machine, Chunyan Ma, Junsheng Wu, Tao Zhang, Yunpeng Zhang, Xiaobin Cai (pp. 27-36).
- Mobile Software Reliability Measurement Using Growth Model in Testing, Haeng-Kon Kim, Eun-Ju Park (pp. 37-46).
- XFlash – A Web Application Design Framework with Model-Driven Methodology, Ronnie Cheung (pp. 47-54).
- Classification of Privacy Management Techniques in Pervasive Computing, Stan Kurkovsky, Oscar Rivera, Jay Bhalodi (pp. 55-72).
- A Multi-Layer Architecture for Intrusion Tolerant Web Services, Zahra Aghajani Kalkhoran, Mohammad Abdollahi Azgomi (pp. 73-80).
- Students… Perspectives on Library Instruction in a Composite Class: a Case Study in TVES of Taiwan, Chyuan Perng, Shiow-Luan Wang, Wen-Chih Chiou, Jen-Teng Tsai (pp. 81-92).
- Effectiveness of Use of KMS between Suppliers and Buyers by Collaboration, Hangbae Chang, Hyukjun Kwon, Changhoon Lee (pp. 93-98).