Journal of Systems and Software, Volume 75 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 75, Number 1-2, 15 February 2005

Pete Knoke, Ana María Moreno, Michael Ryan:
Editorial. 1-2

Alex Baker, Emily Oh Navarro, André van der Hoek:
An experimental card game for teaching software engineering processes. 3-16

Éric Germain, Pierre N. Robillard:
Engineering-based processes and agile methodologies for software development: a comparative case study. 17-27

David A. Carrington, Paul A. Strooper
, Sharron Newby, Terry Stevenson:
An industry/university collaboration to upgrade software engineering knowledge and skills in industry. 29-39

Anthony J. Cowling:
The role of modelling in the software engineering curriculum. 41-53

David Budgen
, James E. Tomayko:
The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education. 55-62

Hung-Min Sun, Bing-Chang Chen, Tzonelih Hwang:
Secure key agreement protocols for three-party against guessing attacks. 63-68

Heyuan Huang, Shen-sheng Zhang, Jian Cao, Yonghong Duan:
A practical pattern recovery approach based on both structural and behavioral analysis. 69-87

Zuhua Shao:
Cryptanalysis of Xia-You group signature scheme. 89-94

Wing-Fai Poon, Kwok-Tung Lo, Jian Feng:
Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems. 95-107

Shih-Chien Chou, An-Feng Liu, Chien-Jung Wu:
Preventing information leakage within workflows that execute among competing organizations. 109-123

Subhashini Raghunathan, Armin R. Mikler, Cliff Cozzolino:
Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework. 125-137

Manuel J. Fernández-Iglesias
, Juan C. Burguillo-Rial
, Francisco J. González-Castaño
, Martín Llamas Nistal
:
Wireless protocol testing and validation supported by formal methods. A hands-on report. 139-154

Yi-Hsuan Lee, Cheng Chen:
A two-level scheduling method: an effective parallelizing technique for uniform nested loops on a DSP multiprocessor. 155-170

Muhammad Kamran Malik, Osama Khan, Tahir Mobashir, S. Mansoor Sarwar:
Migratable sockets in cluster computing. 171-177

Shih-Chien Chou:
An agent-based inter-application information flow control model. 179-187

Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. 189-192

Weibin Zhao, Henning Schulzrinne:
Enhancing Service Location Protocol for efficiency, scalability and advanced discovery. 193-204

Ning Zhang
, Qi Shi
, Madjid Merabti:
Revocation of privacy-enhanced public-key certificates. 205-214

Sherali Zeadally, Junhua Pan:
J2EE support for wireless services. 215-226

Sherman S. M. Chow
, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level. 227-234
Volume 75, Number 3, March 2005

Steven Guan, Richard Lai:
Adaptive multimedia computing. 235-236

Ewa Kusmierek, David Hung-Chang Du:
Streaming video delivery over Internet with adaptive end-to-end QoS. 237-252

Zhijun Lei, Nicolas D. Georganas:
Adaptive video transcoding and streaming over wireless channels. 253-270

Shu-Ching Chen, Mei-Ling Shyu, Irina Gray, Hongli Luo:
An adaptive rate-control streaming mechanism with optimal buffer utilization. 271-282

Ing-Chau Chang, Sheng-Wen Hsieh:
ATF: an Adaptive Three-layer Framework for inter-stream synchronization of SMIL multimedia presentations. 283-303

Sunilkumar S. Manvi, P. Venkataram:
An agent based adaptive bandwidth allocation scheme for multimedia applications. 305-318

Xin Liu, Steve Goddard:
Scheduling legacy multimedia applications. 319-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







