Software Engineering and Data Engineering 2010 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


19. SEDE 2010: San Francisco, CA, USA

jump to

SPARQL queries 
⚠
Please note that none of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries won't return any results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Imad Rahal, Rym Zalila-Wenkstern:
ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010, Hilton Fisherman's Wharf, San Francisco, CA, USA. ISCA 2010, ISBN 978-1-880843-77-2
Software Architecture and Design

Tacksoo Im, Soujanya Vullam, John D. McGregor:
Reasoning about Safety during Software Architecture Design. SEDE 2010: 1-8

Laurent Deruelle, Mohamed Oussama Hassan, Henri Basson:
A Change Impact Analysis Process for Distributed Software Architecture Evolution. SEDE 2010: 9-14

Kyungsoo Im, John D. McGregor:
Locating Defects in Software Architectures Through Debugging. SEDE 2010: 15-20

Abdullah S. Alghamdi:
An Optimum Selection of Enterprise Service Bus for DODAF Based Defense Systems. SEDE 2010: 21-26
Services and Open Platforms

Anthony Hock-koon, Mourad Oussalah:
Toward the Definition of a Many-to-Many Service Discovery Approach. SEDE 2010: 27-32

Audrey Occello, Cédric Joffroy, Anne-Marie Pinna-Dery, Philippe Renevier, Michel Riveill:
Metamodeling User Interfaces and Services for Composition Considerations. SEDE 2010: 33-38

Hyun Cho, Eunyoung Kim, Jeff Gray:
Managing API Evolution for Open Software Platforms. SEDE 2010: 39-44

Christina N. Meyers:
ARIS Software: Envision Architecture Expansion Case Study. SEDE 2010: 45-50
Software Testing

Abdul Rauf, Naveed Kazim, Sajid Anwar, Shafiq-Ur Rehman, Arshad Ali Shahid:
Maximizing GUI Test Coverage Through Particle Swarm Optimization. SEDE 2010: 51-56

Jing-Chiou Liou:
On Software Test Estimate and Requirement Tracking. SEDE 2010: 57-62
Applications in Software Engineering and Data Engineering

Baisakhi Chakraborty, Ranjan Kumar Maji, Debidas Ghosh:
An Object Oriented Programming Platform for Ontology Based KMS. SEDE 2010: 63-68

P. K. Guha Thakurta, Souvik Sonar, Biswajit Bhowmik, Swapan Bhattacharya, Subhansu Bandyopadhyay:
A New Approach on Priority Queue based Scheduling with Handoff Management for Mobile Networks. SEDE 2010: 69-74

Jin Zhang, Roger Y. Lee:
A Framework of Network Forensics System Based on IXP2850. SEDE 2010: 75-80

Bradford A. Towle, Monica N. Nicolescu, Sergiu Dascalu:
Towards Integrating Role Playing Game Constructs in Real-Time Strategy Games. SEDE 2010: 81-88

Sharad Sharma:
Favorite Goal in Agent Based Modeling and Simulation. SEDE 2010: 89-93

Abhijit Sanyal, Anirban Sarkar, Sankhayan Choudhury, P. K. Guha Thakurta:
Automating Web Data Model: Conceptual Design to Logical Representation. SEDE 2010: 94-99

Baisakhi Chakraborty, Debidas Ghosh:
CBR Applications in Service Organization. SEDE 2010: 100-104

Matthew Wolfe, Bryan McCauley, Joyati C. Debnath:
Algorithmic Design and Implementation for Constructing Graphs of Circuits with Minimal Crossing Numbers. SEDE 2010: 105-110

Tsvetan A. Komarov, Sergiu Dascalu:
The iPhone Teaching Companion: A Smartphone Application for Education. SEDE 2010: 111-116

Narayan C. Debnath, Paola Martellotto, Marcela Daniele, Daniel Riesco, German Montejano:
Including Non-functional Requirements in the Invocation of Applications from the Workflow Engine using Web Services. SEDE 2010: 117-120
Modularization and Re-Use in Software Architecture

Lirong Dai:
A Nonfunctional Requirement Tradeoff Analysis Approach for Reusable SPLE Artifacts. SEDE 2010: 121-126

Mohamed E. Fayad, Huáscar A. Sánchez, Shivanshu K. Singh:
Knowledge Maps - Fundamentally Modular Approach to Software Architecture, Design, Development and Deployment. SEDE 2010: 127-133

Olivier Le Goaër, Mourad Oussalah, Dalila Tamzalit:
Reusing Evolution Practices onto Object-Oriented Designs: an Experiment with Evolution Styles. SEDE 2010: 134-139
Software Engineering Applications and Tools

David J. Walker, Shahram Latifi:
Reliability Analysis of Climate Change Data Portals for Nevada. SEDE 2010: 140-145

Olfa Mabrouki, Yacine Amirat, Abdelghani Chibani, Monica Valenzuela Fernandez, Mariano Navarro de la Cruz:
Context-aware Framework for Rural Living Labs. SEDE 2010: 146-151

Jukka Ojasalo, Rob Moonen, Niko Suomalainen, Heikki Seppälä:
Designing Services and Systems for Safety of Elderly People at Home: An Ongoing Empirical Study. SEDE 2010: 152-158

David R. Wright:
Helping Students Learn Expert Software Design Strategies. SEDE 2010: 159-164

Dina Salah, Amir Zeid:
The Arabic Tutor - An Intelligent web based Language Tutoring System for Teaching Arabic. SEDE 2010: 165-169
Software Processes and Software Project Management

Muhammad Sulayman, Emilia Mendes:
A Replication Study of SPI Success Factors for Small to Medium Sized Web Companies. SEDE 2010: 170-175

Mehwish Riaz, Emilia Mendes, Ewan D. Tempero:
Maintainability Prediction for Database-driven Software Applications - Preliminary Results from Interviews with Software Professionals. SEDE 2010: 176-181

Jeong Ah Kim:
Planning Techniques for Re-Engineering the Legacy System with Components. SEDE 2010: 182-185

Alen Jakupovic, Mile Pavlic, Damir Simunovic:
Measuring the Size of Business Sector and Business Software. SEDE 2010: 186-189
Software Requirements

Abdelhafid Zitouni, Mahmoud Boufaïda, Lionel Seinturier:
Specifying Components with Compositional Patterns, LOTOS and Design By Contract. SEDE 2010: 190-195

Amel Boubendir, Allaoua Chaoui:
Towards a Model for Dealing with Aspect Interactions at Requirement Phase. SEDE 2010: 196-202

Virallikattur Subramanian Dhenesh:
Lessons from a Pilot Study for Developing a Tool-kit that Contingently Supports Teamwork. SEDE 2010: 203-209
Software Implementation and Web Development

Tolga Ovatman, Feza Buzluca, Thomas Weigert:
Applying Enhanced Graph Clustering to Software Dependency Analysis. SEDE 2010: 210-216

Robert Baird, Rose F. Gamble:
Using Delta-Federations for On-Demand Crisis Situation Response. SEDE 2010: 217-223

Debzani Deb:
Achieving Self-Optimization via Utility Functions. SEDE 2010: 224-229

Robert Baird, Rose F. Gamble:
Security Controls Applied to Web Service Architectures. SEDE 2010: 230-236
Databases and Data Warehouses

Ganesh Viswanathan, Markus Schneider:
BigCube: A Metamodel for Managing Multidimensional Data. SEDE 2010: 237-242

Edward T. Hammerand, Hung-Chi Su:
Top-Down Approach on Concurrent Access to the B-Link Tree. SEDE 2010: 243-248

Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi, Sean Shuangquan Liu, Jon Cirella:
Methods on Identifying Data Anomalies in a Normalized Database. SEDE 2010: 249-254

Atefeh Tajpour, Maslin Masrom, Mohammad JorJor Zadeh Shooshtari, Hossein Rouhani Zeidanloo:
Comparison of SQL Injection Detection and Prevention Tools based on Attack Type and Deployment Requirements. SEDE 2010: 255-260
Data Mining and Applications

Amany Abdelhalim, Issa Traoré:
Unsupervised Identity Application Fraud Detection using Rule-based Decision Tree. SEDE 2010: 261-268

Jeremy Iverson, James Schnepf, Imad Rahal:
Using Metrics to Quantify Similarity in Source Code: An Empirical Study Using VOCS. SEDE 2010: 269-274

Dong Liu, Qigang Gao, Hai H. Wang, Ji Zhang:
A Web-based Interactive Data Visualization System for Outlier Subspace Analysis. SEDE 2010: 275-280

Leandro Pfleger de Aguiar, Virgílio A. F. Almeida, Wagner Meira Jr.:
Mining Redundant Industrial Alarm Occurrences with Association Rules Extraction and Complex Networks Modeling. SEDE 2010: 281-288
Bioinformatics

Sean R. Landman, Imad Rahal:
Improving Start Codon Prediction Accuracy Using Naive Bayesian Classification. SEDE 2010: 289-294

Yan Wang, Tingda Lu, William Perrizo:
A Novel Combinatorial Score for Feature Selection with P-Tree in DNA Microarray Data Analysis. SEDE 2010: 295-300

Ketaki Shirke, John A. Springer, Erik S. Gough, Ali Roumani, Catherine P. Riley, Charles R. Buck:
A Case Study in Clinical Data Management for Cancer Proteomics. SEDE 2010: 301-306
Data Engineering Applications

Mahesh B. Chaudhari, Suzanne W. Dietrich:
Metadata Services for Distributed Event Stream Processing Agents. SEDE 2010: 307-312

Sherif Saad, Issa Traoré:
Ontology-based Intelligent Network-Forensics Investigation. SEDE 2010: 313-319

Oliver Schiller, Alexander Moosbrugger, Bernhard Mitschang:
A Recycle-Based Strategy to Modernize Data-Intensive Enterprise Applications for Multi-Tenancy. SEDE 2010: 320-325

Dónall McCann, Paolo Cappellari, Mark Roantree:
Exploiting Schema Information for Efficient Streaming Queries. SEDE 2010: 326-331

Jigisha N. Patel, Suparva S. Patnaik, Vaibhavi P. Lineswala:
Spectral Information Guided Complexity Evaluation for Video Codec Design. SEDE 2010: 332-336

Amisha J. Shah, Suprava Patnaik, Jigisha N. Patel:
A Novel Approaoch based on Optical Flor for Moving Object Detection. SEDE 2010: 337-342

Chi-Chun Hsu, Huan-Yu Lin, Jun-Ming Su, Shian-Shyong Tseng, Chung-Chao Ku, Jui-Pin Tsai, Fengming M. Chang:
A Hierarchical Case-Based Computer-Assisted Process-Planning System. SEDE 2010: 343-348
Technologies for Biomedical Applications

Rob Wynden, Donna L. Hudson:
Lab Norm: Automated Clinical Lab Data Normalization. SEDE 2010: 349-354

Shahab Sheikh-Bahaei, Kamran A. Ali, Sabina R. Bera, C. Anthony Hunt:
Predicting Human Hepatic Clearance Using Hypernet Neural Networks. SEDE 2010: 355-359

Karla Lindquist, Mark D. Danese:
A Comparison of Classification Methods for Predicting Osteoporosis. SEDE 2010: 360-365

Andrew V. Nguyen, Donna L. Hudson, Maurice E. Cohen:
Hadoop and MapReduce for Storage and Processing of Physiological Data. SEDE 2010: 366-369

Laura Gaetano, Giacomo Di Benedetto, Umberto Morbiducci, Franco M. Montevecchi, C. Anthony Hunt:
An Agent-based System Model to Support Cardiac Tissue Engineering: Preliminary Results. SEDE 2010: 370-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






