Journal of Systems and Software, Volume 82 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 82, Number 1, January 2009

Vittorio Cortellessa, Sebastián Uchitel
, Daniel Yankelevich:
Guest editorial. 1-2

Steffen Becker, Heiko Koziolek, Ralf H. Reussner
:
The Palladio component model for model-driven performance prediction. 3-22

Umar Farooq, Shikharesh Majumdar, Eric W. Parsons:
Achieving efficiency, quality of service and robustness in multi-organizational Grids. 23-38

Vipul Mathur, Varsha Apte:
An overhead and resource contention aware analytical model for overloaded Web servers. 39-55

C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models. 56-74

Lukas Pustina, Simon Schwarzer, Michael Gerharz, Peter Martini, Volker Deichmann:
A practical approach for performance-driven UML modelling of handheld devices - A case study. 75-88

Daniel Lacks, Taskin Koçak
:
Developing reusable simulation core code for networking: The grid resource discovery example. 89-100

David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. 101-111

Mohamed Feredj, Frédéric Boulanger, Aimé Mokhoo Mbobi:
A model of domain-polymorph component for heterogeneous system design. 112-120

Swapna S. Gokhale:
Model-based performance analysis using block coverage measurements. 121-130

Navid Aghdaie, Yuval Tamir:
CoRAL: A transparent fault-tolerant web service. 131-143

Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo
, Aloysius K. Mok:
An anomaly prevention approach for real-time task scheduling. 144-154

Yong Joon Lee, Jun Wook Lee, Duckjin Chai, Buhyun Hwang, Keun Ho Ryu:
Mining temporal interval relational rules from temporal data. 155-167

Patricia Lago, Henry Muccini
, Hans van Vliet:
A scoped approach to traceability management. 168-182
Volume 82, Number 2, February 2009

Pierfrancesco Bellini
, Paolo Nesi
, Davide Rogai:
Expressing and organizing real-time specification patterns via temporal logics. 183-196

Carles Garrigues
, Nikos Migas, William J. Buchanan
, Sergi Robles
, Joan Borrell
:
Protecting mobile agents from external replay attacks. 197-206

Alfredo Capozucca
, Nicolas Guelfi, Patrizio Pelliccione
, Alexander B. Romanovsky
, Avelino Francisco Zorzo
:
Frameworks for designing and implementing dependable systems using Coordinated Atomic Actions: A comparative study. 207-228

Sharon Ryan, Rory O'Connor
:
Development of a team measure for tacit knowledge in software development teams. 229-240

Silvia Abrahão
, Geert Poels
:
A family of experiments to evaluate a functional size measurement procedure for Web applications. 253-269

Baoyuan Kang
, Colin Boyd, Ed Dawson
:
A novel identity-based strong designated verifier signature scheme. 270-273

Konstantinos Tsakalozos, Vassilis Stoumpos, Kostas Saidis, Alex Delis:
Adaptive disk scheduling with workload-dependent anticipation intervals. 274-291

Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:
Specifying behavioral semantics of UML diagrams through graph transformations. 292-306

Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:
Comparative evaluation of contiguous allocation strategies on 3D mesh multicomputers. 307-318

Jie Yang, Gang Huang, Wenhui Zhu, Xiaofeng Cui, Hong Mei:
Quality attribute tradeoff through adaptive architectures at runtime. 319-332

Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, I-Lang Wu:
Exception handling refactorings: Directed by goals and driven by bug fixing. 333-345

Damianos Gavalas
, George E. Tsekouras
, Christos Anagnostopoulos:
A mobile agent platform for distributed network and systems management. 355-371
Volume 82, Number 3, March 2009

Marvin V. Zelkowitz:
An update to experimental models for validating computer technology. 373-376

Xingwei Wang, Lei Guo, Xuetao Wei, Lan Pang, Tengfei Wu, Juan Du, Xuekui Wang:
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks. 377-381

Shi-Ming Huang, Chih-Fong Tsai, Po-Chun Huang:
Component-based software version management based on a Component-Interface Dependency Matrix. 382-399

Hua Duan, Qingtian Zeng, Huaiqing Wang, Sherry X. Sun, Dongming Xu:
Classification and evaluation of timed running schemas for workflow based on process mining. 400-410

Yung-Kuan Chan
, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method. 411-421

Wing Kwong Chan
, Shing-Chi Cheung
, Jeffrey C. F. Ho
, T. H. Tse
:
PAT: A pattern classification approach to automatic reference oracles for the testing of mesh simplification programs. 422-434

Magnus Eriksson, Jürgen Börstler
, Kjell Borg:
Managing requirements specifications for product lines - An approach and industry case study. 435-447

Amjad Umar, Adalberto Zordan:
Reengineering for service oriented architectures: A strategic decision model for integration versus migration. 448-462

Liguo Yu, Srini Ramaswamy:
An empirical approach to evaluating dependency locality in hierarchically structured software systems. 463-472

Jason Liu
, Yue Li, Nathanael Van Vorst, Scott Mann, Keith Hellman:
A real-time network simulation infrastructure based on OpenVPN. 473-485

Ramon Nou
, Samuel Kounev, Ferran Julià, Jordi Torres
:
Autonomic QoS control in enterprise Grid environments using online simulation. 486-502

Jun-Ki Min, Jihyun Lee, Chin-Wan Chung:
An efficient XML encoding and labeling method for query processing and updating on dynamic XML data. 503-515

Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh:
Search-order coding method with indicator-elimination property. 516-525

Gregorio Bernabé
, José M. García, José González:
A lossy 3D wavelet transform for high-quality compression of medical video. 526-534

Koji Ohishi, Hiroyuki Okamura
, Tadashi Dohi
:
Gompertz software reliability model: Estimation algorithm and empirical validation. 535-543
Controversy Corner

Remco C. de Boer
, Hans van Vliet:
On the similarity between requirements and architecture. 544-550
Volume 82, Number 4, April 2009
Selected papers from the 2008 IEEE Conference on Software Engineering Education and Training (CSEET08)

Hossein Saiedian
:
Software engineering challenges of the "Net" generation. 551-552

David S. Janzen, Jungwoo Ryoo
:
Engaging the net generation with evidence-based software engineering through a community-driven web database. 563-570

Nancy R. Mead
:
Software engineering education: How far we've come and how far we have to go. 571-575

Nenad Stankovic:
Single development project. 576-582

Robert Wesley McGrew, Rayford B. Vaughn:
Discovering vulnerabilities in control system human-machine interface software. 583-589
Regular papers

Christos Baloukas, José Luis Risco-Martín
, David Atienza
, Christophe Poucet, Lazaros Papadopoulos, Stylianos Mamagkakis, Dimitrios Soudris, José Ignacio Hidalgo, Francky Catthoor, Juan Lanchares:
Optimization methodology of dynamic data structures based on genetic algorithms for multimedia embedded systems. 590-602

Anthony J. T. Lee, Ying-Ho Liu, Hsin-Mu Tsai
, Hsiu-Hui Lin, Huei-Wen Wu:
Mining frequent patterns in image databases with 9D-SPA representation. 603-618

Myungryun Yoo:
Real-time task scheduling by multiobjective genetic algorithm. 619-628

Rodrigo B. de Paes, Carlos José Pereira de Lucena, Gustavo R. de Carvalho, Donald D. Cowan
:
An event-driven high level model for the specification of laws in open multi-agent systems. 629-642

Feng Cao, Zhenfu Cao
:
An identity based universal designated verifier signature scheme secure in the standard model. 643-649

Houn-Gee Chen, James J. Jiang, Gary Klein, Jengchung V. Chen
:
Reducing software requirement perception gaps through coordination mechanisms. 650-655

Shuenn-Jyi Wang, Dah-Lih Jeng, Meng-Tsai Tsai:
Early fire detection method in video for vessels. 656-667

Bram Adams
, Kris De Schutter, Andy Zaidman
, Serge Demeyer
, Herman Tromp, Wolfgang De Meuter:
Using aspect orientation in legacy environments for reverse engineering using dynamic analysis - An industrial experience report. 668-684

Peng-Yeng Yin, Chin-Wen Liu:
A new relevance feedback technique for iconic image retrieval based on spatial relationships. 685-696

Vincent S. Tseng, Eric Hsueh-Chan Lu
:
Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns. 697-706

Ebrahim Bagheri
, Ali A. Ghorbani:
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models. 707-729

Gerard Horgan, Souheil Khaddaj:
Use of an adaptable quality model approach in a production support environment. 730-738
Volume 82, Number 5, May 2009

Karl Beecher, Andrea Capiluppi
, Cornelia Boldyreff:
Identifying exogenous drivers and evolutionary stages in FLOSS projects. 739-750

Giuseppe Di Modica
, Orazio Tomarchio
, Lorenzo Vita:
Dynamic SLAs management in service oriented environments. 759-771

Eleftherios Tiakas
, Apostolos Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic
, Slobodanka Djordjevic-Kajan:
Searching for similar trajectories in spatial networks. 772-788

Lein Harn, Jian Ren
, Changlu Lin:
Design of DL-based certificateless digital signatures. 789-793

Zuhua Shao:
Improvement of identity-based proxy multi-signature scheme. 794-800

James J. Jiang, Gary Klein, Shelly P. J. Wu, Ting-Peng Liang:
The relation of requirements uncertainty and stakeholder perception gaps to project management performance. 801-808

Spyros Sioutas, Evangelos Sakkopoulos
, Christos Makris
, Bill Vassiliadis
, Athanasios K. Tsakalidis, Peter Triantafillou:
Dynamic Web Service discovery architecture based on a novel peer based overlay network. 809-824

Siwoo Byun, Moonhaeng Huh:
An index management using CHC-cluster for flash memory databases. 825-835

Patrik Berander, Mikael Svahnberg:
Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting. 836-850

Diane Kelly:
Determining factors that affect long-term evolution in scientific application software. 851-861

Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han:
A static API birthmark for Windows binary executables. 862-873

Fernando Castor Filho
, Alexander B. Romanovsky
, Cecília M. F. Rubira
:
Improving reliability of cooperative concurrent systems with exception flow analysis. 874-890

Vasileios Baousis
, Stathes Hadjiefthymiades
, George Alyfantis, Lazaros F. Merakos
:
Autonomous mobile agent routing for efficient server resource allocation. 891-906

Ahmet Özmen
:
An entropy-based algorithm for data elimination in time-driven software instrumentation. 907-913
Volume 82, Number 6, June 2009

W. Dai, H. Dominic Covvey, Paulo S. C. Alencar, Donald D. Cowan
:
Lightweight query-based analysis of workflow process dependencies. 915-931

Salah Sadou
, Hafedh Mili:
A delegation-based approach for the unanticipated dynamic evolution of distributed objects. 932-946

Nikitas N. Karanikolas, Maria Nitsiou, Emmanuel J. Yannakoudakis, Christos Skourlas
:
CUDL language semantics: Updating FDB data. 947-962

Young Il Ko, Chang-Sup Park, In Chul Song, Myoung-Ho Kim:
An efficient void resolution method for geographic routing in wireless sensor networks. 963-973

Tzong-Sun Wu, Han-Yu Lin:
Efficient self-certified proxy CAE scheme and its variants. 974-980

Jie-Cherng Chen, Sun-Jen Huang:
An empirical analysis of the impact of software development problem factors on software maintainability. 981-992

Teade Punter, René L. Krikhaar, Reinder J. Bril
:
Software engineering technology innovation - Turning research results into industrial success. 993-1003

Wenbing Zhao:
Design and implementation of a Byzantine fault tolerance framework for Web services. 1004-1015

Zhe-Ming Lu, Jun-Xiang Wang, Bei-Bei Liu:
An improved lossless data hiding scheme based on image VQ-index residual value coding. 1016-1024

Su-Cheng Haw
, Chien-Sing Lee
:
Extending path summary and region encoding for efficient structural query processing in native XML databases. 1025-1035

Matthew Chang, Chung Keung Poon
:
Using phrases as features in email classification. 1036-1045

Jung-Yu Lai, Wei-Heng Chen:
Measuring e-business dependability: The employee perspective. 1046-1055
Volume 82, Number 7, July 2009

Andrew R. Dalton, Jason O. Hallstrom:
nAIT: A source analysis and instrumentation framework for nesC. 1057-1072

Joo Hyuk Jeon, Ki Yong Lee, Jae Soo Yoo, Myoung-Ho Kim:
HIPaG: An energy-efficient in-network join for distributed condition tables in sensor networks. 1073-1086

Hyoung-Gon Lee, Namkyu Park, Han-Il Jeong, Jinwoo Park:
Grid enabled MRP process improvement under distributed database environment. 1087-1097

Patricia Balbastre
, Ismael Ripoll
, Alfons Crespo
:
Period sensitivity analysis and D-P domain feasibility region in dynamic priority systems. 1098-1111

P. Venkata Krishna
, Sudip Misra, Mohammad S. Obaidat
, Vankadara Saritha:
An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks. 1112-1124

Laurent Thiry
, Bernard Thirion:
Functional metamodels for systems and software. 1125-1136

Nathan DeBardeleben, Ron Sass, Daniel C. Stanzione Jr., Walter B. Ligon III:
Building problem-solving environments with the Arches framework. 1137-1151

Sanghyun Yoo, Jin Hyun Son, Myoung-Ho Kim:
A scalable publish/subscribe system for large mobile ad hoc networks. 1152-1162

Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol. 1163-1167

Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:
Fair anonymous rewarding based on electronic cash. 1168-1176

Andrea De Lucia
, Vincenzo Deufemia
, Carmine Gravino
, Michele Risi:
Design pattern recovery through visual language parsing and source code analysis. 1177-1193
Volume 82, Number 8, August 2009
Architectural Decisions and Rationale

Muhammad Ali Babar, Patricia Lago:
Design decisions and design rationale in software architecture. 1195-1197

Claudia A. López
, Pablo Inostroza, Luiz Marcio Cysneiros, Hernán Astudillo
:
Visualization and comparison of architecture rationale with semantic web technologies. 1198-1210

Suntae Kim, Dae-Kyoo Kim
, Lunjin Lu, Sooyong Park:
Quality-driven architecture development using architectural tactics. 1211-1231

Anton Jansen, Paris Avgeriou
, Jan Salvador van der Ven:
Enriching software architecture documentation. 1232-1248

Olaf Zimmermann, Jana Koehler, Frank Leymann
, Ronny Polley, Nelly Schuster:
Managing architectural decision models with dependency relations, integrity constraints, and production rules. 1249-1267
Regular Papers

Jules White, Brian Dougherty, Douglas C. Schmidt:
Selecting highly optimal architectural feature sets with Filtered Cartesian Flattening. 1268-1284

Georgia M. Kapitsaki
, George N. Prezerakos, Nikolaos D. Tselikas
, Iakovos S. Venieris:
Context-aware service engineering: A survey. 1285-1297

Hyoungmin Park, Kyuseok Shim:
FAST: Flash-aware external sorting for mobile database systems. 1298-1312

Wen-Chen Sun, Yi-Ming Chen:
On the design of an global intrusion tolerance network architecture against the internet catastrophes. 1313-1325

Matjaz B. Juric, Ana Sasa, Bostjan Brumen
, Ivan Rozman:
WSDL and UDDI extensions for version support in web services. 1326-1343

Yunpeng Chai, Zhihui Du
, Yinong Chen
:
A stepwise optimization algorithm of clustered streaming media servers. 1344-1361

Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin
, Mingchu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation. 1362-1369
Controversy Corner
Volume 82, Number 9, September 2009
QSIC 2007

W. Eric Wong, Aditya P. Mathur:
Editorial. 1375

Zhenyu Zhang, Wing Kwong Chan
, T. H. Tse
, Heng Lu, Lijun Mei:
Resource prioritization of code optimization techniques for program synthesis of wireless sensor network applications. 1376-1387

Lihua Duan, Jessica Chen:
Exploring alternatives for transition verification. 1388-1402

Gordon Fraser, Franz Wotawa
, Paul Ammann:
Issues in using model checkers for test case generation. 1403-1418

Tsong Yueh Chen
, Fei-Ching Kuo, Huai Liu
:
Adaptive random testing based on distribution metrics. 1419-1433
Regular Paper

Jenn-Wei Lin
, Ming-Feng Yang:
Fault-tolerant design for wide-area Mobile IPv6 networks. 1434-1446

Ki Yong Lee, Hyojun Kim, Kyoung-Gu Woo, Yon Dohn Chung, Myoung-Ho Kim:
Design and implementation of MLC NAND flash-based DBMS for mobile devices. 1447-1458

Jordi Cabot
, Ernest Teniente:
Incremental integrity checking of UML/OCL conceptual schemas. 1459-1478

Kai Petersen
, Claes Wohlin
:
A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case. 1479-1490

Xingchang Liu, Xiaofan Yang, Min Xiang:
One-step t-fault diagnosis for hypermesh optical interconnection multiprocessor systems. 1491-1496

Jen-Ho Yang, Chin-Chen Chang:
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. 1497-1502

Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng:
Trading decryption for speeding encryption in Rebalanced-RSA. 1503-1512

Joan Arnedo-Moreno, Jordi Herrera-Joancomartí
:
A survey on security in JXTA applications. 1513-1525

Chung-Ming Huang, Jianwei Li, I-Ting Tseng:
Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks. 1526-1539

Steven D. Sheetz, David Henderson, Linda G. Wallace:
Understanding developer and manager perceptions of function points and source lines of code. 1540-1549

Faith-Michael E. Uzoka, Tshepo Ndzinge:
Empirical analysis of biometric technology adoption and acceptance in Botswana. 1550-1564
Volume 82, Number 10, October 2009
YAU

Carl K. Chang:
Introduction. 1565-1567

Susan Ferreira, James S. Collofello, Dan L. Shunk, Gerald T. Mackulak:
Understanding the effects of requirements volatility in software engineering by using analytical modeling and software process simulation. 1568-1577

Jeffrey J. P. Tsai, Alan Liu
:
Experience on knowledge-based software engineering: A logic-based requirements language and its industrial applications. 1578-1587

Youngmann Kim, E. K. Park, Sungwoo Tak:
Dynamically reconfigurable hardware-software architecture for partitioning networking functions on the SoC platform. 1588-1599

Ching-Huey Wang, Feng-Jian Wang:
Detecting artifact anomalies in business process specifications with a formal model. 1600-1619

Yaw-Chung Chen, Wen-Kang Jia:
Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet. 1620-1626

Pao-Ann Hsiung
, Shang-Wei Lin
, Yean-Ru Chen, Chun-Hsian Huang, Chihhsiong Shih, William C. Chu:
Modeling and verification of real-time embedded systems with urgency. 1627-1641

Tegegne Marew, Joon-Sang Lee, Doo-Hwan Bae:
Tactics based approach for integrating non-functional requirements in object-oriented analysis and design. 1642-1656

Sheikh Iqbal Ahamed, Haifeng Li, Nilothpal Talukder, Mehrab Monjur, Chowdhury Sharif Hasan:
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications. 1657-1677
Regular Papers

Libor Waszniowski, Jan Krakora, Zdenek Hanzálek
:
Case study on distributed and fault tolerant system modeling based on timed automata. 1678-1694

Sang-Uk Jeon, Jang-Eui Hong
, In-Gwon Song, Doo-Hwan Bae:
Developing platform specific model for MPSoC architecture from UML-based embedded software models. 1695-1708

Jiexin Lian, Sol M. Shatz, Xudong He:
Flexible coordinator design for modeling resource sharing in multi-agent systems. 1709-1729

Charlotte Hug, Agnès Front, Dominique Rieu, Brian Henderson-Sellers:
A method to build information systems engineering process metamodels. 1730-1742

The Duc Kieu, Chin-Chen Chang:
A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. 1743-1752
Volume 82, Number 11, November 2009
TAIC PART 2007 and MUTATION 2007

Mark Harman
, Zheng Li
, Phil McMinn, Jeff Offutt, John A. Clark:
TAIC PART 2007 and Mutation 2007 special issue editorial. 1753-1754

Florence Charreteur, Bernard Botella, Arnaud Gotlieb:
Modelling dynamic memory management in constraint-based testing. 1755-1766

Stefan Wappler, Joachim Wegener, André Baresel:
Evolutionary testing of software with function-assigned flags. 1767-1779

Rui Abreu
, Peter Zoeteweij, Rob Golsteijn, Arjan J. C. van Gemund:
A practical evaluation of spectrum-based fault localization. 1780-1792

David W. Binkley, Henry Feild, Dawn J. Lawrie
, Maurizio Pighin
:
Increasing diversity: Natural language measures for software fault prediction. 1793-1803

Robert M. Hierons
, Mercedes G. Merayo:
Mutation testing from probabilistic and stochastic finite state machines. 1804-1818

Ben H. Smith, Laurie A. Williams:
Should software testers use mutation analysis to augment a test set? 1819-1832
Regular Papers

Wien Hong, Tung-Shou Chen, Chih-Wei Shiu
:
Reversible data hiding for high quality images using modification of prediction errors. 1833-1842

Seung Min Kim, Suk I. Yoo:
DOM tree browsing of a very large XML document: Design and implementation. 1843-1858

Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare
, Anura P. Jayasumana:
A wireless sensor system for validation of real-time automatic calibration of groundwater transport models. 1859-1868

Subhas Chandra Misra, Vinod Kumar, Uma Kumar
:
Identifying some important success factors in adopting agile software development practices. 1869-1890

Santonu Sarkar
, Girish Maskeri Rama, Shubha Ramachandran:
Discovery of architectural layers and measurement of layering violations in source code. 1891-1905

Chuan-Yu Chang, Hung-Jen Wang, Sheng-Wen Pan:
A robust DWT-based copyright verification scheme with Fuzzy ART. 1906-1915

Jenq-Shiou Leu, Cheng-Wei Tsai:
Practical design of a proxy agent to facilitate adaptive video streaming service across wired/wireless networks. 1916-1925
Volume 82, Number 12, December 2009
Regular Papers

Jordi Cucurull-Juan, Ramon Martí
, Guillermo Navarro-Arribas
, Sergi Robles
, Joan Borrell
:
Full mobile agent interoperability in an IEEE-FIPA context. 1927-1940

Mohammad S. Obaidat
, Mukund Sundararajan:
New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation. 1941-1949

Kam Hay Fung, Graham Cedric Low:
Methodology evaluation framework for dynamic evolution in composition-based distributed applications. 1950-1965

Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:
A high capacity reversible data hiding scheme with edge prediction and difference expansion. 1966-1973

Wei Wang, Xiangliang Zhang, Sylvain Gombault:
Constructing attribute weights from computer audit data for effective intrusion detection. 1974-1981

Mahvish Khurum, Tony Gorschek:
A systematic review of domain analysis solutions for product lines. 1982-2003

Juan Wang, Dan Feng, Fang Wang, Chengtao Lu:
MHS: A distributed metadata management strategy. 2004-2011

Sunggeun Park, Sungwon Jung
:
An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments. 2012-2022

Chin-Hui Lai, Duen-Ren Liu:
Integrating knowledge flow mining and collaborative filtering to support document recommendation. 2023-2037

Asil Oztekin, Alexander Nikov, Selim Zaim:
UWIS: An assessment methodology for usability of web-based information systems. 2038-2050

Chung-Yang Chen
, Pei-Chi Chen:
A holistic approach to managing software change impact. 2051-2067

Frank Alexander Kraemer, Vidar Slåtten, Peter Herrmann
:
Tool support for the rapid composition, analysis and implementation of reactive services. 2068-2080

Yu-Fang Chung
, Zhen Yu Wu:
Approach to designing bribery-free and coercion-free electronic voting scheme. 2081-2090

C. Okan Özogul, E. Ertugrul Karsak
, Ethem Tolga:
A real options approach for evaluation and justification of a hospital information system. 2091-2102

Stylianos Zikos, Helen D. Karatza
:
Communication cost effective scheduling policies of nonclairvoyant jobs with load balancing in a grid. 2103-2116

Shuichi Shimizu, Raju Rangaswami
, Hector A. Duran-Limon, Manuel Corona-Perez:
Platform-independent modeling and prediction of application resource usage characteristics. 2117-2127

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






