default search action
2. ICSECS 2011: Kuantan, Pahang, Malaysia
- Jasni Mohamad Zain, Wan Maseri Binti Wan Mohd, Eyas El-Qawasmeh:
Software Engineering and Computer Systems - Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part III. Communications in Computer and Information Science 181, Springer 2011, ISBN 978-3-642-22202-3
Software Design/Testing
- Kamal Zuhairi Zamli, Rozmie Razif Othman, Mohammed Issam Younis, Mohd Hazli Mohamed Zabil:
Practical Adoptions of T-Way Strategies for Interaction Testing. 1-14 - Michael Hartwig:
On the Relationship between Proof Writing and Programming: Some Conclusions for Teaching Future Software Developers. 15-24 - Ahmed Al-Herz, Moataz A. Ahmed:
Model-Based Web Components Testing: A Prioritization Approach. 25-40 - Asma Md Ali, Joan Richardson:
Web Interactive Multimedia Technology: State of the Art. 41-53 - Mohamed Elammari, Tarek F. Alteap:
Health Architecture Based on SOA and Mobile Agents. 54-65 - Fazal-e-Amin, Ahmad Kamil Bin Mahmood, Alan Oxley:
Metrics Based Variability Assessment of Code Assets. 66-75 - Ionut Dinca, Alin Stefanescu, Florentin Ipate, Raluca Lefticaru, Cristina Tudose:
Test Data Generation for Event-B Models Using Genetic Algorithms. 76-90 - Mohammad F. J. Klaib, Sangeetha Muthuraman, Ahmad Noraziah:
A Parallel Tree Based Strategy for T-Way Combinatorial Interaction Testing. 91-98 - Sabira Khatun, Khandakar Fazley Rabbi, Che Yahaya Yaakub, Mohammad F. J. Klaib, Mohammad Masroor Ahmed:
PS2Way: An Efficient Pairwise Search Approach for Test Data Generation. 99-108 - Roslina Mohd Sidek, Ahmad Noraziah, Mohd Helmy Abd Wahab:
The Preferable Test Documentation Using IEEE 829. 109-118 - Yun-Kwan Kim, Doo-Hyun Kim, Tae Wan Kim, Chun-Hyon Chang:
Automatic Analysis of Static Execution Time for Complex Loop Contained External Input. 119-129 - Heru Agus Santoso, Su-Cheng Haw, Chien-Sing Lee:
Software Reuse: MDA-Based Ontology Development to Support Data Access over Legacy Applications. 130-142 - Rabia Sammi, Iram Masood, Shunaila Jabeen:
A Framework to Assure the Quality of Sanity Check Process. 143-150 - Boon Wee Low, Boon Yaik Ooi, Chee Siang Wong:
Scalability of Database Bulk Insertion with Multi-threading. 151-162 - Ben Sadeh, Kjetil Ørbekk, Magnus M. Eide, Njaal C. A. Gjerde, Trygve A. Tønnesland, Sundar Gopalakrishnan:
Towards Unit Testing of User Interface Code for Android Mobile Applications. 163-175 - Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan:
Security Modeling of SOA System Using Security Intent DSL. 176-190 - Mobashar Rehman, Ahmad Kamil Mahmood, Rohani Salleh, Aamir Amin:
Understanding Motivators and De-motivators for Software Engineers - A Case of Malaysian Software Engineering Industry. 205-214 - Muhazam Mustapha, Nik Ghazali Nik Daud:
UML Diagram for Design Patterns. 215-230 - Mahmood Ashraf, Masitah Ghazali:
Towards Natural Interaction with Wheelchair Using Nintendo Wiimote Controller. 231-245 - Mohd Z. M. Zaki, Mohd Adham Isa, Dayang N. A. Jawawi:
Meta-model Validation of Integrated MARTE and Component-Based Methodology Component Model for Embedded Real-Time Software. 246-256 - Siti Hafizah Ab Hamid, Mohd Sapiyan Baba, Abdullah Gani:
Abstract Formal Framework for Method Overriding. 257-265 - Won Shin, Tae Wan Kim, Doo-Hyun Kim, Chun-Hyon Chang:
Parametric Software Metric. 266-273
E- Technology
- Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor:
Automatic Recognition of Document Structure from PDF Files. 274-282 - Radziah Mohamad, Furkh Zeshan:
Comparative Evaluation of Semantic Web Service Composition Approaches. 283-290 - Siti Noradlina Mat Using, Rohiza Ahmad, Shakirah Mohd Taib:
Ontology Development for Programming Related Materials. 291-305 - Syarifah Bahiyah Rahayu, Shahrul Azman Noah, Andrianto Arfan Wardhana:
User-Centered Evaluation for IR: Ranking Annotated Document Algorithms. 306-312
Ad Hoc Networks
- Ronny Yongho Kim:
Efficient Wireless Communications Schemes for Machine to Machine Communications. 313-323 - Radhika Saini, Manju Khari:
An Algorithm to Detect Attacks in Mobile Ad Hoc Network. 336-341 - Md. Mahedi Hassan, Poo Kuan Hoong:
Integrated Solution Scheme with One-Time Key Diameter Message Authentication Framework for Proxy Mobile IPv6. 342-352 - Bilal Munir Mughal, Asif Ali Wagan, Halabi Hasbullah:
Impact of Safety Beacons on the Performance of Vehicular Ad Hoc Networks. 368-383 - Mojtaba Asgari, Kasmiran Jumari, Mahamod Ismail:
Analysis of Routing Protocols in Vehicular Ad Hoc Network Applications. 384-397 - Khuzairi Mohd Zaini, Adib M. Monzer Habbal, Fazli Azzali, Mohamad Rizal Abdul Rejab:
Comparative Study on the Performance of TFRC over AODV and DSDV Routing Protocols. 398-407 - Kamarularifin Abd. Jalil, Zaid Ahmad, Jamalul-lail Ab Manan:
An Enhanced Route Discovery Mechanism for AODV Routing Protocol. 408-418 - Radhwan M. Abduallah, Nor Asilah Wati Abdul Hamid, Shamala K. Subramaniam, Azizol Abdullah:
Fast Handover Technique for Efficient IPv6 Mobility Support in Heterogeneous Networks. 419-428 - Maha S. Abdelhaq, Rosilah Hassan, Raed A. Alsaqour:
Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET. 429-442
Social Networks
- Ahmed El Toukhy, Maytham Safar, Khaled Mahdi:
Modeling, Analysis, and Characterization of Dubai Financial Market as a Social Network. 443-454
Software Process Modeling
- Alaa M. Al-Obaidi, Sai Peck Lee:
A Concurrent Coloured Petri Nets Model for Solving Binary Search Problem on a Multicore Architecture. 463-477 - Pornchai Lerthathairat, Nakornthip Prompoon:
An Approach for Source Code Classification Using Software Metrics and Fuzzy Logic to Improve Code Quality with Refactoring Techniques. 478-492 - Hamzah Asyrani Sulaiman, Abdullah Bade:
Balanced Hierarchical Method of Collision Detection in Virtual Environment. 493-501 - Rachit Mohan Garg, Deepak Dahiya:
An Aspect Oriented Component Based Model Driven Development. 502-517 - Sabrina Ahmad, Noor Azilah Muda:
An Experimental Design to Exercise Negotiation in Requirements Engineering. 542-556 - Affandy, Nanna Suryana Herman, Sazilah Binti Salam, Edi Noersasongko:
A Study of Tracing and Writing Performance of Novice Students in Introductory Programming. 557-570 - Rehan Akbar, Mohd Fadzil Hassan, Azrai Abdullah:
A Review of Prominent Work on Agile Processes Software Process Improvement and Process Tailoring Practices. 571-585 - Anas Bassam Al-Badareen, Mohd Hasan Selamat, Marzanah A. Jabar, Jamilah Din, Sherzod Turaev:
An Evaluation Model for Software Reuse Processes. 586-599 - Fares Anwar, Rozilawati Razali, Kamsuriah Ahmad:
Achieving Effective Communication during Requirements Elicitation - A Conceptual Framework. 600-610 - Hamdi A. Al-Jamimi, Mohammad R. Alshayeb, Mahmoud O. Elish:
Investigating the Effect of Aspect-Oriented Refactoring on Software Maintainability. 611-623 - José Sergio Magdaleno-Palencia, José Mario García Valdez, Manuel Castañón-Puga, Luis Alfonso Gaxiola-Vega:
On the Modelling of Adaptive Hypermedia Systems Using Agents for Courses with the Competency Approach. 624-630 - Mahdi Fahmideh, Fereidoon Shams, Pooyan Jamshidi:
Toward a Methodological Knowledge for Service-Oriented Development Based on OPEN Meta-Model. 631-643
Miscellaneous Topics in Software Engineering and Computer Systems
- Barjesh Kochar, Rajender Singh Chhillar:
Mining Optimal Utility Incorporated Sequential Pattern from RFID Data Warehouse Using Genetic Algorithm. 659-676 - Syed Nasir Mehmood Shah, Ahmad Kamil Bin Mahmood, Alan Oxley:
SYEDWSIM: A Web Based Simulator for Grid Workload Analysis. 677-692 - Eviyanti Saari, Aman Jantan:
F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics. 693-701 - Kiyoshi Akama, Ekawit Nantajeewarawat, Hidekatsu Koike:
Deterministic-Rule Programs on Specialization Systems: Clause-Model Semantics. 702-716 - Mohammed Madi, Yuhanis Yusof, Suhaidi Hassan, Omar Almomani:
A Novel Replica Replacement Strategy for Data Grid Environment. 717-727 - Nasim Ahmed, Syed Alwee Aljunid, R. Badlishah Ahmad, Hilal Adnan Fadhil, Mohd Abdur Rashid:
Investigate Spectrum-Sliced WDM System for FTTH Network. 728-734 - Mohammed Wajahat Kamal, Moataz A. Ahmed, Mohamed El-Attar:
Use Case-Based Effort Estimation Approaches: A Comparison Criteria. 735-754 - Sadia Afsar, Abdul Mateen, Fahim Arif:
An Agent-Based Autonomous Controller for Traffic Management. 755-763 - Mohd Adham Isa, Dayang N. A. Jawawi:
Comparative Evaluation of Performance Assessment and Modeling Method for Software Architecture. 764-776 - Ghassan Ahmed Ali, Aman Jantan:
A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm. 777-792 - Mohammadmehdi Bozorgi, Mohd Aizaini Maarof, Zhi-Sam Lee:
Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification. 793-802 - Noraini Che Pa, Abdullah Mohd Zin:
Managing Communications Challenges in Requirement Elicitation. 803-811 - Norhamreeza Abdul Hamid, Nazri Mohd Nawi, Rozaida Ghazali, Mohd Najib B. Mohd Salleh:
Learning Efficiency Improvement of Back Propagation Algorithm by Adaptively Changing Gain Parameter together with Momentum and Learning Rate. 812-824
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.