Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
About the Journal
Login
Register
Current
Archives
Calls for Papers
Order journal
Search
Register
Login
Home
/
Archives
/
Vol. 34 No. 2 (2010)
Vol. 34 No. 2 (2010)
Full Issue
PDF
Regular papers
Improving Morphosyntactic Tagging of Slovene Language through Meta-tagging
J. Rupnik, M. Grčar, T. Erjavec
PDF
A Study of Analysing IT Digital Coping Strategies
Y.-M. Chu, L.-L. Hsu, J.-T. Yang
PDF
Piecemeal Journey to 'HALCYON' World of Computing: From Past Progress to Future Challenges
R. Seth, R. Kapoor, H. Al-Qaheri, S. Sanyal
PDF
Separating Interleaved HTTP Sessions Using a Stochastic Model
M. Poženel, V. Mahnič, M. Kukar
PDF
A Simulation Study on the Impact of Mobility Models on the Network Connectivity, Hop Count and Lifetime of Routes for Ad hoc Networks
N. Meghanathan
PDF
Enhanced Relevance-Based Approach for Network Controls
A. Rahim, F. bin Muhaya, Z.S. Khan, M.A. Ansari, M. Sher
PDF
PDF
Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems
L. You, J. Zeng
PDF
PDF
On the Security of Two Group Signature Schemes with Forward Security
K. Kim, I. Yie, D. Nyang
PDF
PDF
A Web-Mining Approach to Disambiguate Biomedical Acronym Expansions
M. Roche, V. Prince
PDF
A Risk Management System to Oppose Cyber Bullying in High School: Warning System with Leaflets and Emergency Staffs
H. Yasuda
PDF
Text Mining for Discovering Implicit Relationships in Biomedical Literature
I. Petrič
PDF
Parsing with Intraclausal Coordination and Clause Detection
D. Marinčič
PDF
Special issue papers
Editor's Introduction to the Special Issue on Quantitative Risk Analysis Techniques for Security Applications
C. Kiekintveld, J. Marecki, P. Paruchuri, K. Sycara
PDF
A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
M.E. Taylor, C. Kiekintveld, C. Western, M. Tambe
PDF
Application of Microsimulation to the Modelling of Epidemics and Terrorist Attacks
I. Piper, D. Keep, T. Green, I. Zhang
PDF
Strategic Modeling of Information Sharing among Data Privacy Attackers
Q. Duong, K. LeFevre, M.P. Wellman
PDF
Planning to Discover and Counteract Attacks
T. Kichkaylo, T. Ryutov, M.D. Orosz, R. Neches
PDF
Information
For Readers
For Authors
For Librarians
SUPPORT & INDEXING
Make a Submission
Make a Submission
Current Issue
Browse