Journal of Software, Volume 10 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

- > Home > Journals > Journal of Software
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 10, Number 1, January 2015

Jinbo Tan:
An Improved Approach to Term Weighting in Hierarchical Web Page Classification. 1-8

Xuyang Wei, Zhongliang Li, Tengfei Zhou, Haoran Zhang, Guocai Yang:
IWFPM: Interested Weighted Frequent Pattern Mining with Multiple Supports. 9-19

Yangyang Wu, Siying Wu, Duansheng Chen:
Chinese-English Bilingual Word Semantic Similarity Based on Chinese WordNet. 20-31

Saad Masood Butt, Shahid Masood Butt, Azura Onn, Nadra Tabassam, Mazlina Abdul Majid:
Usability Evaluation Techniques for Agile Software Model. 32-41

Abdullah Alqahtani, Haiyan Lu, Jie Lu:
Sensitivity Level-Based Citizen Personal Information Model for Privacy Protection. 42-55

Chuanlin Huang, Zhiqiu Huang, Jun Hu, Zhipeng Wu, Siqi Wang:
A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram. 56-70

Qiuyue Zhao, Wanli Zuo, Zhongsheng Tian, Xin Wang, Ying Wang:
Predicting Trust Relationships in Social Networks Based on WKNN. 71-81

Chun-Ming Yang, Neng-Yih Shin, Ming-Wei Weng, Chang-Hsien Hsu:
Using a Two-Dimensional Mean Value Matrix (TDMVM) to Improve Users' Satisfaction with Government e-Recruitment Website. 82-93

Xinquan Chen:
The Shortest Path Algorithms of Hypergraphs Based on Search Strategies. 94-105

Cheng Wang, Meng Yang, Xuemin Liu, Gang Yang:
Realistic Simulation for Rainy Scene. 106-115
Volume 10, Number 2, February 2015

Xiaochao Li, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo:
On the Security Analysis of PBKDF2 in OpenOffice. 116-126

Teng Huang, Zhizhong Ding, Younan Duan, Yin Chen, Lu Ding:
A Simplified and Efficient LTE RRC Conformance Testing Adapter. 127-141

Xiaowen Chen, Zhonghai Lu, Axel Jantsch, Shuming Chen, Yang Guo, Shenggang Chen, Hu Chen, Man Liao:
Command-Triggered Microcode Execution for Distributed Shared Memory Based Multi-Core Network-on-Chips. 142-161

Liang Zhu, Quanlong Lei, Guang Liu, Feifei Liu:
Processing Recommender Top-N Queries in Relational Databases. 162-171

Yongming Wang, Shuai Xia:
Research on the Key Techniques of Rotary Bearing Man-hour Ration Management System. 172-179

Haiyan Liu, Yanyan Liu, Zenggang Xiong, Zhen Yu, Kun Tian:
Study and Application of Urban Flood Risk Map Information Management System Based on SOA. 180-189

Changyue Shi, Xiaolin Qin, Li Wang:
Continuous Skyline Queries for Moving Objects in Road Networks. 190-200

Haibin Zhang, Siliang Lu, Shangbin Zhang, Fanrang Kong:
A Data-Collection and Fault Diagnosis System of Train Bearing Based on the C# and Multi-Wireless-Terminal. 201-212

Jiaji Wang, Rangding Wang, Dawen Xu, Wei Li:
An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode. 213-221
Volume 10, Number 3, March 2015

M'hamed Rahmouni
, Samir Mbarki:
MDA-Based Modeling and Transformation to Generate N-Tiers Web Models. 222-238

Khosrow Amirizadeh
, Mandava Rajeswari:
Accelerated -Greedy Multi Armed Bandit Algorithm for Online Sequential-Selections Applications. 239-249

Anshul Verma
, K. K. Pattanaik:
Multi-Agent Communication Based Train Control System for Indian Railways: The Structural Design. 250-259

Feda AlShahwan, Maha Faisal, Mehmet Hakan Karaata, Mazin Alshamrani:
RESTful-Based Bi-level Distribution Framework for Context-Based Mobile Web Service Provision. 260-287

Marcelo Luiz Monteiro Marinho
, Suzana Cândido de Barros Sampaio, Telma Lúcia de Andrade Lima, Hermano Perrelli de Moura:
Uncertainty Management in Software Projects. 288-303

Wellington Moreira de Oliveira, Jugurta Lisboa Filho, Alcione P. Oliveira, Wagner Dias de Souza, Lucas F. M. Vegi, João Ricardo M. Oliveira:
Building a Thematic Spatial Data Infrastructure and Situation-Aware for Global Events. 304-316

Fraihat Salam, Qusai Shambour:
A Framework of Semantic Recommender System for e-Learning. 317-330

Wenhui Zhang, Feng Guo, Zhian Lin, Yanhao Zhang, Jiming Lin, Xinxiang Wei:
Real-Time Visual Animation of Explosions. 331-343

Christian Eichmann, Carsten Müller:
Team Formation Based on Nature-Inspired Swarm Intelligence. 344-354

Carsten Mueller, Anton Pohl:
Plugin for Visual Paradigm for Generating and Intelligent Optimization of a Component Diagram Based on Attributes in the Class Diagram. 355-365

Ana Milena Páez Quintero, Ricardo Llamosa-Villalba, Edgar Sneyder García Morantes:
Integral Architecture for Organizational Systems Arquetipos. 366-373

Fariha Motherudin, Noor Ezleen Md. Moksen:
A Proposed Model for Code Quality Maturity Model. 374-383
Volume 10, Number 4, April 2015

Ayoub Oudani, Mohamed Bahaj, Ilias Cherti:
Creating an RDF Graph from a Relational Database Using SPARQL. 384-391

Changri Luo, Tingting He, Xinhua Zhang, Zibo Zhou:
Learning Forum Posts Topic Discovery and Its Application in Recommendation System. 392-402

Qun Liu, Xiaobing Li:
A New Parallel Item-Based Collaborative Filtering Algorithm Based on Hadoop. 416-426

Iyad AlAgha, Raed Rasheed:
An Exploratory Study of 3D Interaction Techniques in Augmented Reality Environments. 427-440

Linda Badri, Mourad Badri, Nicolas Joly:
Towards a Change Impact Analysis Model for Java Programs: An Empirical Evaluation. 441-453

Abdulrahman Almuhareb, Waleed A. Almutairi, Haya Al-Tuwaijri, Abdulelah Almubarak, Marwa Khan:
Recognition of Modern Arabic Poems. 454-464

Morteza Ghasemi, Sayed Mehran Sharafi, Ala Arman:
Towards an Analytical Approach to Measure Modularity in Software Architecture Design. 465-479

Kui Liu, Zhurong Zhou, Qianguo Chen, Xiaoli Yang:
Towards a RBAC Workflow Model for Thesis Management. 480-490

Xiaohong Yuan, Emmanuel Borkor Nuakoh, Imano Williams, Huiming Yu:
Developing Abuse Cases Based on Threat Modeling and Attack Patterns. 491-498
Volume 10, Number 5, May 2015

Razib Hayat Khan
, Poul E. Heegaard:
Software Performance Evaluation Utilizing UML Specification and SRN Model and Their Formal Representation. 499-523

Fahad Algarni, Yen Cheung, Vincent C. S. Lee, Azmat Ullah:
Customer Satisfaction: Moderator of e-Business Performance and e-Business Liveability. 524-537

Dayan Shangguan, Xintong Li:
Chess Game System on Smart Mobile Terminal. 538-550

Zetao Jiang, Chuan Guo, Yang Yang:
A Coarse-to-Fine Registration Method Based on Geometric Constraints and Parallel Architecture. 551-565

Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Debugging in Parallel or Sequential: An Empirical Study. 566-576

Radhi Rafiee Afandi, Waidah Ismail, Azlan Husin
, Rosline Hassan
:
Leukemia Medical Application with Security Features. 577-598

Rinky Dwivedi, Daya Gupta:
A Complete Method Configuration Process for Configuring Project-Specific Methods. 599-615

Asif Qumer Gill
, Muhammad Atif Qureshi:
Adaptive Enterprise Architecture Modelling. 628-638

Emanuel S. Grant:
A Model-Driven Case Study of Developing a Complex Domain-Specific System. 639-649

Yifan Yuan, Somjai Boonsiri:
Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach. 650-658
Volume 10, Number 6, June 2015

O. Cyril Mathew, A. M. J. Md. Zubair Rahman:
A Novel Honeycomb Routing Approach for Bandwidth Utilization in MANET. 659-669

R. Sampath, A. Saradha:
Alzheimer's Disease Image Segmentation with Self-Organizing Map Network. 670-680

Yehia Ibrahim Alzoubi, Asif Qumer Gill
, Ahmed Al-Ani:
Distributed Agile Development Communication: An Agile Architecture Driven Framework. 681-694

Hongfeng Zhang, Vincent Y. Liu, Yu Zhao:
Biocloud: A Systemic Review and Classification. 695-712

Chamundeswari Arumugam, Chitra Babu:
Test Size Estimation for Object Oriented Software Based on Analysis Model. 713-729

A. Siva Sangari, J. Martin Leo Manickam:
Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption. 730-738

Shunsuke Kanda, Kazuhiro Morita, Masao Fuketa, Jun-Ichi Aoe:
Experimental Observations of Construction Methods for Double Array Structures Using Linear Functions. 739-747

Tadashi Ogino:
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus. 748-756

Ezgi Erturk, Ebru Akcapinar Sezer:
Software Fault Inference Based on Expert Opinion. 757-766

Su-Hong Eom, Ki-Sun Song, Shin-Yoon Kang, Eung-Hyuk Lee:
Development of a Sensor Module for Estimating the Center of Pressure in Low Cost Gait Rehabilitation Robots. 767-774

Kazuhiro Morita, Masao Fuketa, Jun-ichi Aoe:
A Method of Music Retrieval Using Impression Keywords. 775-783
Volume 10, Number 7, July 2015

Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:
A Metamodel for Hybrid Access Control Policies. 784-797

Yinlong Liu, Yong Wang:
A Study on Software Development Month Effort. 798-804

Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri:
E-Government Portals Maturity Models: A Best Practices' Coverage Perspective. 805-824

Yanan Li, Zhengyu Zhu:
A Fast Method of Detecting Overlapping Community in Network Based on LFM. 825-834

Zijie Jiang, Zhongliang Cai, Hui Zhou, Nian Hui
:
Design and Implementation of Mobile Electronic Nautical Chart Information System Based on IOS. 835-841

Marcelo Carvalho Fernandes, Antonio Juarez Alencar, Eber Assis Schmitz, Mônica Ferreira da Silva
, Rigel Procópio Fernandes
:
Acknowledging the Effect of the Depreciation of Tangible and Intangible Benefits upon the Evaluation of E-Gov Projects. 842-868

N. R. Ram Mohan
, E. Baburaj:
Energy-Aware Load Balanced Scheduler for Cloud Computing to Improve Quality of Service. 869-880

Sami Ouali
, Naoufel Kraïem, Zuhoor Al-Khanjari, Youcef Baghdadi:
Model Driven Software Product Line Process for Service/Component-Based Applications. 881-892

Hina Saeeda, Fahim Arif, Nasir Mehmood Minhas
, Mammona Humayun:
Agile Scalability for Large Scale Projects: Lessons Learned. 893-903

Onur Özçelik, D. Turgay Altilar:
Test-Driven Approach for Safety-Critical Software Development. 904-911

Wei-Chieh Chang, Wei-Min Jeng:
Streamlined Workflow for 3D Modeling with Animated Characters. 912-918
Volume 10, Number 8, August 2015

Nik Thompson, Tanya Jane McGill
:
Affective Stack - A Model for Affective Computing Application Development. 919-930

Ming Xu:
A Modified Chaos-Based Image Encryption Algorithm. 931-938

Rabeb Mizouni, Sanja Lazarova-Molnar
:
Project Schedule Simulation: Incorporating Human Factors' Uncertainty and Features' Priority in Task Modeling. 939-960

A. Siva Sangari, J. Martin Leo Manickam:
Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption. 961-970

Anis Zarrad:
A Systematic Review on Regression Testing for Web-Based Applications. 971-990

Alireza Olyai, Reza Rezaei:
Analysis and Comparison of Software Product Line Frameworks. 991-1001

Abdollah Kiani, Mohsen Amiri Fakhr, Reza Rezaei:
Architectural Patterns for Context-Aware System. 1002-1013

Yasemin Gültepe:
Querying Bibliography Data Based on Linked Data. 1014-1020

Hela Lajmi, Adel M. Alimi, Joseba M. Rodriguez:
Advanced Ethernet Networks' Diagnozer. 1021-1029

Pallavi Kalyanasundaram, Sunita P. Ugale, Smitha K. P., Priti Ranadive:
Efficient Migration to Windows. 1030-1036

Amr Tolba
, Ahmed Ghoneim
:
A Stepwise Self-adaptive Model for Improving Cloud Efficiency Based on Multi-Agent Features. 1037-1044
Volume 10, Number 9, September 2015

B. Muruganantham, K. Vivekanandan:
Multi Perceptional Optimality Matrix Based Web Service Reliability Model. 1045-1055

Maximiliano M. de Faria, Eber Assis Schmitz, Antonio Juarez Alencar, Mônica Ferreira da Silva
, Petros S. Stefaneas:
Analyzing IT Governance Initiatives with Game Theory: A Systematic literature Review. 1056-1069

Balika J. Chelliah, K. Vivekanandan:
Aggregated Quantified Response Time Matrix Formulation (ARMF) - A New Quality of Service Paradigm Technique. 1070-1078

Hui Deng, Hui Liu, Ying Guo, Baofeng Zhang:
Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods. 1079-1085

A. Murugan, K. Vivekanandan:
XSD DDoS Trace Handler in Web Service Environment. 1086-1095

Sangita Gupta, Suma V.:
Application and Assessment of Classification Techniques on Programmers' Performance in Software Industry. 1096-1103

Bato Princess Nina Ann B., Labayo Rhea D. C., Nimfa Bisnan, Jessa T. Pumatong, Iluminada Vivien R. Domingo:
Mobile Daily Diet Guide and Advisor for Filipinos. 1104-1110

Yingbing Yu:
Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques. 1111-1118

Supasit Kajkamhaeng, Komwit Surachat, Komkrit Kangrat, Jitpakan Limsakun:
A Prototype Mobile Application for Searching Specialized Medical Facilities in a Chosen Vicinity. 1119-1126
Volume 10, Number 10, October 2015

Saad M. Darwish, Saleh M. El-Kaffas, Omar A. Abdulateef:
Semantic Database Compression System Based on Augmented Vector Quantization. 1127-1139

Lily Puspa Dewi, Ibnu Gunawan, Raymond Weily:
Library Information System Auditing: Monitoring and Evaluating the Software in Academic Institution. 1140-1147

Shin-ya Nishizaki, Kensuke Narita, Tomoyuki Ueda:
Simplification of Abstract Machine for Functional Language and Its Theoretical Investigation. 1148-1159

Joohyoung Jeon, Minjeong An, Hongchul Lee:
NoSQL Database Modeling for End-of-Life Vehicle Monitoring System. 1160-1169

Simon Salvador E. Tidon, Benilda Eleonor V. Comendador:
A Configurable Real-Time Auto-locked Software for Electronics Company (RT-ASEC). 1170-1175

Younan Duan, Zhizhong Ding, Teng Huang, Dingliang Wang:
TTCN-3 Codec Implementation for LTE RRM Conformance Test. 1176-1188

Alsahli Abdulaziz Abdullah, Hameed Ullah Khan:
FreGsd: A Framework for Global Software Requirement Engineering. 1189-1198

Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Javed Iqbal
, Salmi Md Zahid:
High Perceived-Value Requirements Engineering Practices for Outsourced Software Projects. 1199-1215

Zahraa Abed Aljasim Muhisn, Mazni Omar, Mazida Ahmad, Sinan Adnan Muhisn:
Team Leader Selection by Using an Analytic Hierarchy Process (AHP) Technique. 1216-1227

Zhengyu Zhu, Meiyu Zheng, Yihan Wu:
A Web Log Frequent Sequential Pattern Mining Algorithm Linked WAP-Tree. 1228-1234
Volume 10, Number 11, November 2015

Xianhua Zeng, Yipeng Gao, Suli Hou, Shuwen Peng:
Real-Time Multi-scale Tracking via Online RGB-D Multiple Instance Learning. 1235-1244

Raoul Vallon, Lukas Wenzel, Martin E. Brüggemann, Thomas Grechenig:
An Agile and Lean Process Model for Mobile App Development: Case Study into Austrian Industry. 1245-1264

Taweechai Anguranak:
NFC Technology Payment System for Android Operation System. 1265-1273

Zhengdong Liu:
A Garment Image Segmentation Method Based on Salient Region and JSEG. 1274-1282

Mohd Hairul Nizam Md. Nasir, Shamsul Sahibuddin, Rodina Binti Ahmad, Shukor Sanim Bin Mohd Fauzi:
How the PMBOK Addresses Critical Success Factors for Software Projects: A Multi-round Delphi Study. 1283-1300

Qiantu Zhang, Liqing Fang, Sicai Su, Yan Lv:
Parameters Optimization of SVM Based on Improved FOA and Its Application in Fault Diagnosis. 1301-1309

Chung Yung, Yutang Lin:
Implementing TOAST, a Tool for Agile Software Project Management in Cloud Computing Environments. 1310-1318

Pei He, Achun Hu, Dongqing Xie, Zhiping Fan:
Component-Based Verification Model of Sequential Programs. 1319-1326

Sabah Al-Fedaghi:
On Collaboration in Software: Annotation vs. Flow-Based Diagrams. 1327-1335
Volume 10, Number 12, December 2015

Siwadol Sateanpattanakul:
AOC: An Aspect - Oriented Approach for Comment to Reduce the Redundant Behavior between Source Code and Compilation Code. 1336-1342

Supachai Vorapojpisut:
A Lightweight Framework of Home Automation Systems Based on the IFTTT Model. 1343-1350

Anthony Karageorgos, Elli Rapti, Vassilis C. Gerogiannis
:
Resource Allocation in Software Projects Using a Bio-inspired Model. 1351-1358

Ashish Kumar Mishra, Dharmendra Kumar Yadav:
Validation of UML Design Model. 1359-1366

Anil Utku, Hacer (Uke) Karacan, Oktay Yildiz, M. Ali Akcayol:
Implementation of a New Recommendation System Based on Decision Tree Using Implicit Relevance Feedback. 1367-1374

Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:
A Method for Efficient Extensibility Improvements in Embedded Software Evolution. 1375-1388

Zakaria Bousalem
, Ilias Cherti:
XMap: A Novel Approach to Store and Retrieve XML Document in Relational Databases. 1389-1401

Alexandra Nagy, George Sebastian Chis
:
Sensitivity Analysis and Patterns Implementation on Load Testing Software Systems. 1402-1411

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






