Journal of Systems and Software, Volume 73 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 73, Nubmer 1, September 2004

Helen D. Karatza
:
Performance modeling and analysis of computer systems and networks. 1-2

Demetres D. Kouvatsos, Is-Haka Mkwawa:
Broadcasting schemes for hypercubes with background traffic. 3-14

Chatree Sangpachatanaruk, Sherif M. Khattab
, Taieb Znati, Rami G. Melhem, Daniel Mossé:
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks. 15-29

Konstantinos G. Zerfiridis, Helen D. Karatza
:
File distribution using a peer-to-peer network--a simulation study. 31-44

Lieven Eeckhout, Koenraad De Bosschere:
How accurate should early design stage power/performance tools be? A case study with statistical simulation. 45-62

Christopher L. Barrett, Madhav V. Marathe, D. Charles Engelhart, Anand Sivasubramaniam:
Approximating the connectivity between nodes when simulating large-scale mobile ad hoc radio networks. 63-74

Peng Li, Binoy Ravindran:
Proactive QoS negotiation in asynchronous real-time distributed systems. 75-88

Moonju Park, Yookun Cho:
Feasibility analysis of hard real-time periodic tasks. 89-100

Yong-Jin Choi, Jun-Ki Min, Chin-Wan Chung:
A cost model for spatio-temporal queries using the TPR-tree. 101-112

Gulay Ünel, Mehmet Emin Dönderler, Özgür Ulusoy
, Ugur Güdükbay
:
An efficient query optimization strategy for spatio-temporal queries in video databases. 113-131

Cheng-Fa Tsai, Chun-Wei Tsai, Han-Chang Wu, Tzer Yang:
ACODF: a novel data clustering approach for data mining in large databases. 133-145

Jack Lukaszuk, Ratko Orlandic:
On accessing data in high-dimensional spaces: A comparative study of three space partitioning strategies. 147-157

Robert Wing Pong Luk
, Tharam S. Dillon, Vincent T. Y. Ng
:
Supporting metasearch with XSL. 159-168

Jae-Joon Hwang, Kyu-Young Whang, Yang-Sae Moon, Byung Suk Lee:
A top-down approach for density-based clustering using multidimensional indexes. 169-180
Volume 73, Nubmer 2, October 2004

Khaled El Emam, Anita D. Carleton:
Applications of statistics in software engineering. 181-182

James Miller:
Statistical significance testing--a panacea for software technology experiments? . 183-192

Chin-Feng Fan, Yuan-Chang Yu:
BBN-based software project risk management. 193-203

Lionel C. Briand, Bernd G. Freimut, Ferdinand Vollei:
Using multiple adaptive regression splines to support decision making in code inspections. 205-217

Stacy J. Prowell
, Jesse H. Poore:
Computing system reliability using Markov chain usage models. 219-225

Chung-Horng Lung, Marzia Zaman, Amit Nandi:
Applications of clustering techniques to software partitioning, recovery and restructuring. 227-244

Derek L. Nazareth, Marcus A. Rothenberger:
Assessing the cost-effectiveness of software reuse: A model for planned reuse. 245-255

Thomas Thelin, Håkan Petersson, Per Runeson
, Claes Wohlin
:
Applying sampling to improve software inspections. 257-269

Hongchen Li, Yun Yang, Tsong Yueh Chen
:
Resource constraints analysis of workflow specifications. 271-285

Ahmed Seffah, Peter Forbrig, Homa Javahery:
Multi-devices "Multiple" user interfaces: development models and research opportunities. 287-300

Ronald F. Ayres:
A simple and powerful type system for programming languages. 301-311

Soheil Khajenoori, Lorenz Prem, Karen Stevens, Ban Seng Keng, Nader Kameli:
Knowledge centered assessment pattern: an effective tool for assessing safety concerns in software architecture. 313-322

Justin Clark, Chris Clarke, Stefano De Panfilis, Giampiero Granatella, Paolo Predonzani, Alberto Sillitti, Giancarlo Succi
, Tullio Vernazza:
Selecting components in large COTS repositories. 323-331

Ivan Mathias Filho, Toacy Cavalcante de Oliveira
, Carlos José Pereira de Lucena:
A framework instantiation approach based on the Features Model. 333-349

SeDo Sohn, PoongHyun Seong:
Quantitative evaluation of safety critical software testability based on fault tree analysis and entropy. 351-360

Diane Kelly, Terry Shepard:
Task-directed software inspection. 361-368
Volume 73, Number 3, November-December 2004

Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature. 369-373

Duen-Ren Liu, Mei-Yu Wu, Shu-Teng Lee:
Role-based authorizations for workflow systems in support of task-based separation of duty. 375-387

Hai Zhuge:
Fuzzy resource space model and platform. 389-396

Hui-Feng Huang, Chin-Chen Chang:
A new design of efficient partially blind signature scheme. 397-403

Chang-Chou Lin, Wen-Hsiang Tsai:
Secret image sharing with steganography and authentication. 405-414

Shyh-Kwei Chen, Trieu C. Chieu, Shiwa S. Fu, Yew-Huey Liu, Florian Pinel, Jih-Shyr Yih:
A practical experience in workspace separation for developing multiple storefronts on customized commerce engines. 415-424

Shih-Chien Chou:
Providing flexible access control to an information flow control model. 425-439

Namgyu Kim, Songchun Moon, Yonglak Sohn:
Secure one snapshot protocol for concurrency control in real-time stock trading systems. 441-454

Hai Zhuge:
Retrieve images by understanding semantic links and clustering image fragments. 455-466

Evimaria Terzi, Athena Vakali
, Lefteris Angelis:
A simulated annealing approach for multimedia data placement. 467-480

Jun Wook Lee, Ok Hyun Paek, Keun Ho Ryu:
Temporal moving pattern mining for location-based service. 481-490

Jorng-Tzong Horng, Feng-Mao Lin, Li-Cheng Wu, Chia-Hui Chang
:
Performance evaluation of a database of repetitive elements in complete genomes. 491-506

Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang:
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. 507-514

Sheau-Ru Tong, Yuan-Tse Yu, Chung-Ming Huang:
A video caching policy for providing differentiated service grades and maximizing system revenue in hierarchical video servers. 515-531

Seongoun Hwang, Kisong Yoon, Kyung Pyo Jun, Kwang Hyung Lee:
Modeling and implementation of digital rights. 533-549

Jin Hyun Son, Myoung-Ho Kim:
An adaptable vertical partitioning method in distributed systems. 551-561

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






