Sciweavers

JSS
2006
76views more  JSS 2006»
13 years 11 months ago
Performance evaluation of peer-to-peer Web caching systems
Peer-to-peer Web caching has attracted a great attention from the research community recently, and is one of the potential peer-topeer applications. In this paper, we systematical...
Weisong Shi, Yonggen Mao
JSS
2006
77views more  JSS 2006»
13 years 11 months ago
Recovering architectural assumptions
During the creation of a software architecture, the architects and stakeholders take a lot of decisions. Many of these decisions can be directly related to functional or quality r...
Ronny Roeller, Patricia Lago, Hans van Vliet
JSS
2006
132views more  JSS 2006»
13 years 11 months ago
FMF: Query adaptive melody retrieval system
Recent progress of computer and network technologies makes it possible to store and retrieve a large volume of multimedia data in many applications. In such applications, efficien...
Seungmin Rho, Eenjun Hwang
JSS
2006
134views more  JSS 2006»
13 years 11 months ago
An agent based synchronization scheme for multimedia applications
Synchronization of multimedia streams is one of the important issue in multimedia communications. In this paper, we propose an adaptive synchronization agency for synchronization ...
Sunilkumar S. Manvi, P. Venkataram
JSS
2006
111views more  JSS 2006»
13 years 11 months ago
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
Web and peer-to-peer systems have emerged as popular areas in distributed computing, and their integrated usage permits the benefits of both to be exploited. While much work in th...
Seng Wai Loke
JSS
2006
66views more  JSS 2006»
13 years 11 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
JSS
2006
62views more  JSS 2006»
13 years 11 months ago
A method for defining IEEE Std 1471 viewpoints
With the growing impact of information technology the proper understanding of IT-architecture designs is becoming ever more important. Much debate has been going on about how to d...
Henk Koning, Hans van Vliet
JSS
2006
169views more  JSS 2006»
13 years 11 months ago
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
This article analyses two most commonly used distributed models in Java: Web services and RMI (Remote Method Invocation). The paper focuses on regular (unsecured) as well as on se...
Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matj...
JSS
2006
65views more  JSS 2006»
13 years 11 months ago
Patterns of conflict among software components
Integrating a system of disparate components to form a single application is still a daunting, high risk task, especially for components with heterogeneous communication expectati...
Michelle Hepner, Rose F. Gamble, Manasi Kelkar, Le...
JSS
2006
122views more  JSS 2006»
13 years 11 months ago
Efficient index caching for data dissemination in mobile computing environments
Due to the limited power supply of mobile devices, much research has been done on reducing the power consumption of mobile devices in mobile computing environments. Since supporti...
Jen-Jou Hung, Yungho Leu