default search action
Journal of Systems and Software (JSS), Volume 82
Volume 82, Number 1, January 2009
- Vittorio Cortellessa, Sebastián Uchitel, Daniel Yankelevich:
Guest editorial. 1-2 - Steffen Becker, Heiko Koziolek, Ralf H. Reussner:
The Palladio component model for model-driven performance prediction. 3-22 - Umar Farooq, Shikharesh Majumdar, Eric W. Parsons:
Achieving efficiency, quality of service and robustness in multi-organizational Grids. 23-38 - Vipul Mathur, Varsha Apte:
An overhead and resource contention aware analytical model for overloaded Web servers. 39-55 - C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models. 56-74 - Lukas Pustina, Simon Schwarzer, Michael Gerharz, Peter Martini, Volker Deichmann:
A practical approach for performance-driven UML modelling of handheld devices - A case study. 75-88 - Daniel Lacks, Taskin Koçak:
Developing reusable simulation core code for networking: The grid resource discovery example. 89-100 - David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. 101-111 - Mohamed Feredj, Frédéric Boulanger, Aimé Mokhoo Mbobi:
A model of domain-polymorph component for heterogeneous system design. 112-120 - Swapna S. Gokhale:
Model-based performance analysis using block coverage measurements. 121-130 - Navid Aghdaie, Yuval Tamir:
CoRAL: A transparent fault-tolerant web service. 131-143 - Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo, Aloysius K. Mok:
An anomaly prevention approach for real-time task scheduling. 144-154 - Yong Joon Lee, Jun Wook Lee, Duckjin Chai, Buhyun Hwang, Keun Ho Ryu:
Mining temporal interval relational rules from temporal data. 155-167 - Patricia Lago, Henry Muccini, Hans van Vliet:
A scoped approach to traceability management. 168-182
Volume 82, Number 2, February 2009
- Pierfrancesco Bellini, Paolo Nesi, Davide Rogai:
Expressing and organizing real-time specification patterns via temporal logics. 183-196 - Carles Garrigues, Nikos Migas, William J. Buchanan, Sergi Robles, Joan Borrell:
Protecting mobile agents from external replay attacks. 197-206 - Alfredo Capozucca, Nicolas Guelfi, Patrizio Pelliccione, Alexander B. Romanovsky, Avelino Francisco Zorzo:
Frameworks for designing and implementing dependable systems using Coordinated Atomic Actions: A comparative study. 207-228 - Sharon Ryan, Rory O'Connor:
Development of a team measure for tacit knowledge in software development teams. 229-240 - Yan-Fu Li, Min Xie, T. N. Goh:
A study of project selection and feature weighting for analogy based software cost estimation. 241-252 - Silvia Abrahão, Geert Poels:
A family of experiments to evaluate a functional size measurement procedure for Web applications. 253-269 - Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel identity-based strong designated verifier signature scheme. 270-273 - Konstantinos Tsakalozos, Vassilis Stoumpos, Kostas Saidis, Alex Delis:
Adaptive disk scheduling with workload-dependent anticipation intervals. 274-291 - Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:
Specifying behavioral semantics of UML diagrams through graph transformations. 292-306 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:
Comparative evaluation of contiguous allocation strategies on 3D mesh multicomputers. 307-318 - Jie Yang, Gang Huang, Wenhui Zhu, Xiaofeng Cui, Hong Mei:
Quality attribute tradeoff through adaptive architectures at runtime. 319-332 - Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, I-Lang Wu:
Exception handling refactorings: Directed by goals and driven by bug fixing. 333-345 - Wei Li, Dawu Gu, Yi Wang:
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin. 346-354 - Damianos Gavalas, George E. Tsekouras, Christos Anagnostopoulos:
A mobile agent platform for distributed network and systems management. 355-371
Volume 82, Number 3, March 2009
- Marvin V. Zelkowitz:
An update to experimental models for validating computer technology. 373-376 - Xingwei Wang, Lei Guo, Xuetao Wei, Lan Pang, Tengfei Wu, Juan Du, Xuekui Wang:
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks. 377-381 - Shi-Ming Huang, Chih-Fong Tsai, Po-Chun Huang:
Component-based software version management based on a Component-Interface Dependency Matrix. 382-399 - Hua Duan, Qingtian Zeng, Huaiqing Wang, Sherry X. Sun, Dongming Xu:
Classification and evaluation of timed running schemas for workflow based on process mining. 400-410 - Yung-Kuan Chan, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method. 411-421 - Wing Kwong Chan, Shing-Chi Cheung, Jeffrey C. F. Ho, T. H. Tse:
PAT: A pattern classification approach to automatic reference oracles for the testing of mesh simplification programs. 422-434 - Magnus Eriksson, Jürgen Börstler, Kjell Borg:
Managing requirements specifications for product lines - An approach and industry case study. 435-447 - Amjad Umar, Adalberto Zordan:
Reengineering for service oriented architectures: A strategic decision model for integration versus migration. 448-462 - Liguo Yu, Srini Ramaswamy:
An empirical approach to evaluating dependency locality in hierarchically structured software systems. 463-472 - Jason Liu, Yue Li, Nathanael Van Vorst, Scott Mann, Keith Hellman:
A real-time network simulation infrastructure based on OpenVPN. 473-485 - Ramon Nou, Samuel Kounev, Ferran Julià, Jordi Torres:
Autonomic QoS control in enterprise Grid environments using online simulation. 486-502 - Jun-Ki Min, Jihyun Lee, Chin-Wan Chung:
An efficient XML encoding and labeling method for query processing and updating on dynamic XML data. 503-515 - Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh:
Search-order coding method with indicator-elimination property. 516-525 - Gregorio Bernabé, José M. García, José González:
A lossy 3D wavelet transform for high-quality compression of medical video. 526-534 - Koji Ohishi, Hiroyuki Okamura, Tadashi Dohi:
Gompertz software reliability model: Estimation algorithm and empirical validation. 535-543
- Remco C. de Boer, Hans van Vliet:
On the similarity between requirements and architecture. 544-550
Volume 82, Number 4, April 2009
- Hossein Saiedian:
Software engineering challenges of the "Net" generation. 551-552 - Eric Ras, Jörg Rech:
Using Wikis to support the Net Generation in improving knowledge acquisition in capstone projects. 553-562 - David S. Janzen, Jungwoo Ryoo:
Engaging the net generation with evidence-based software engineering through a community-driven web database. 563-570 - Nancy R. Mead:
Software engineering education: How far we've come and how far we have to go. 571-575 - Nenad Stankovic:
Single development project. 576-582 - Robert Wesley McGrew, Rayford B. Vaughn:
Discovering vulnerabilities in control system human-machine interface software. 583-589
- Christos Baloukas, José Luis Risco-Martín, David Atienza, Christophe Poucet, Lazaros Papadopoulos, Stylianos Mamagkakis, Dimitrios Soudris, José Ignacio Hidalgo, Francky Catthoor, Juan Lanchares:
Optimization methodology of dynamic data structures based on genetic algorithms for multimedia embedded systems. 590-602 - Anthony J. T. Lee, Ying-Ho Liu, Hsin-Mu Tsai, Hsiu-Hui Lin, Huei-Wen Wu:
Mining frequent patterns in image databases with 9D-SPA representation. 603-618 - Myungryun Yoo:
Real-time task scheduling by multiobjective genetic algorithm. 619-628 - Rodrigo B. de Paes, Carlos José Pereira de Lucena, Gustavo R. de Carvalho, Donald D. Cowan:
An event-driven high level model for the specification of laws in open multi-agent systems. 629-642 - Feng Cao, Zhenfu Cao:
An identity based universal designated verifier signature scheme secure in the standard model. 643-649 - Houn-Gee Chen, James J. Jiang, Gary Klein, Jengchung V. Chen:
Reducing software requirement perception gaps through coordination mechanisms. 650-655 - Shuenn-Jyi Wang, Dah-Lih Jeng, Meng-Tsai Tsai:
Early fire detection method in video for vessels. 656-667 - Bram Adams, Kris De Schutter, Andy Zaidman, Serge Demeyer, Herman Tromp, Wolfgang De Meuter:
Using aspect orientation in legacy environments for reverse engineering using dynamic analysis - An industrial experience report. 668-684 - Peng-Yeng Yin, Chin-Wen Liu:
A new relevance feedback technique for iconic image retrieval based on spatial relationships. 685-696 - Vincent S. Tseng, Eric Hsueh-Chan Lu:
Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns. 697-706 - Ebrahim Bagheri, Ali A. Ghorbani:
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models. 707-729 - Gerard Horgan, Souheil Khaddaj:
Use of an adaptable quality model approach in a production support environment. 730-738
Volume 82, Number 5, May 2009
- Karl Beecher, Andrea Capiluppi, Cornelia Boldyreff:
Identifying exogenous drivers and evolutionary stages in FLOSS projects. 739-750 - Yan Li, Lu Zhang, Bing Xie, Jiasu Sun:
Refining component description by leveraging user query logs. 751-758 - Giuseppe Di Modica, Orazio Tomarchio, Lorenzo Vita:
Dynamic SLAs management in service oriented environments. 759-771 - Eleftherios Tiakas, Apostolos Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic, Slobodanka Djordjevic-Kajan:
Searching for similar trajectories in spatial networks. 772-788 - Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures. 789-793 - Zuhua Shao:
Improvement of identity-based proxy multi-signature scheme. 794-800 - James J. Jiang, Gary Klein, Shelly P. J. Wu, Ting-Peng Liang:
The relation of requirements uncertainty and stakeholder perception gaps to project management performance. 801-808 - Spyros Sioutas, Evangelos Sakkopoulos, Christos Makris, Bill Vassiliadis, Athanasios K. Tsakalidis, Peter Triantafillou:
Dynamic Web Service discovery architecture based on a novel peer based overlay network. 809-824 - Siwoo Byun, Moonhaeng Huh:
An index management using CHC-cluster for flash memory databases. 825-835 - Patrik Berander, Mikael Svahnberg:
Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting. 836-850 - Diane Kelly:
Determining factors that affect long-term evolution in scientific application software. 851-861 - Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han:
A static API birthmark for Windows binary executables. 862-873 - Fernando Castor Filho, Alexander B. Romanovsky, Cecília M. F. Rubira:
Improving reliability of cooperative concurrent systems with exception flow analysis. 874-890 - Vasileios Baousis, Stathes Hadjiefthymiades, George Alyfantis, Lazaros F. Merakos:
Autonomous mobile agent routing for efficient server resource allocation. 891-906 - Ahmet Özmen:
An entropy-based algorithm for data elimination in time-driven software instrumentation. 907-913
Volume 82, Number 6, June 2009
- W. Dai, H. Dominic Covvey, Paulo S. C. Alencar, Donald D. Cowan:
Lightweight query-based analysis of workflow process dependencies. 915-931 - Salah Sadou, Hafedh Mili:
A delegation-based approach for the unanticipated dynamic evolution of distributed objects. 932-946 - Nikitas N. Karanikolas, Maria Nitsiou, Emmanuel J. Yannakoudakis, Christos Skourlas:
CUDL language semantics: Updating FDB data. 947-962 - Young Il Ko, Chang-Sup Park, In Chul Song, Myoung-Ho Kim:
An efficient void resolution method for geographic routing in wireless sensor networks. 963-973 - Tzong-Sun Wu, Han-Yu Lin:
Efficient self-certified proxy CAE scheme and its variants. 974-980 - Jie-Cherng Chen, Sun-Jen Huang:
An empirical analysis of the impact of software development problem factors on software maintainability. 981-992 - Teade Punter, René L. Krikhaar, Reinder J. Bril:
Software engineering technology innovation - Turning research results into industrial success. 993-1003 - Wenbing Zhao:
Design and implementation of a Byzantine fault tolerance framework for Web services. 1004-1015 - Zhe-Ming Lu, Jun-Xiang Wang, Bei-Bei Liu:
An improved lossless data hiding scheme based on image VQ-index residual value coding. 1016-1024 - Su-Cheng Haw, Chien-Sing Lee:
Extending path summary and region encoding for efficient structural query processing in native XML databases. 1025-1035 - Matthew Chang, Chung Keung Poon:
Using phrases as features in email classification. 1036-1045 - Jung-Yu Lai, Wei-Heng Chen:
Measuring e-business dependability: The employee perspective. 1046-1055
Volume 82, Number 7, July 2009
- Andrew R. Dalton, Jason O. Hallstrom:
nAIT: A source analysis and instrumentation framework for nesC. 1057-1072 - Joo Hyuk Jeon, Ki Yong Lee, Jae Soo Yoo, Myoung-Ho Kim:
HIPaG: An energy-efficient in-network join for distributed condition tables in sensor networks. 1073-1086 - Hyoung-Gon Lee, Namkyu Park, Han-Il Jeong, Jinwoo Park:
Grid enabled MRP process improvement under distributed database environment. 1087-1097 - Patricia Balbastre, Ismael Ripoll, Alfons Crespo:
Period sensitivity analysis and D-P domain feasibility region in dynamic priority systems. 1098-1111 - P. Venkata Krishna, Sudip Misra, Mohammad S. Obaidat, Vankadara Saritha:
An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks. 1112-1124 - Laurent Thiry, Bernard Thirion:
Functional metamodels for systems and software. 1125-1136 - Nathan DeBardeleben, Ron Sass, Daniel C. Stanzione Jr., Walter B. Ligon III:
Building problem-solving environments with the Arches framework. 1137-1151 - Sanghyun Yoo, Jin Hyun Son, Myoung-Ho Kim:
A scalable publish/subscribe system for large mobile ad hoc networks. 1152-1162 - Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol. 1163-1167 - Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:
Fair anonymous rewarding based on electronic cash. 1168-1176 - Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino, Michele Risi:
Design pattern recovery through visual language parsing and source code analysis. 1177-1193
Volume 82, Number 8, August 2009
- Muhammad Ali Babar, Patricia Lago:
Design decisions and design rationale in software architecture. 1195-1197 - Claudia A. López, Pablo Inostroza, Luiz Marcio Cysneiros, Hernán Astudillo:
Visualization and comparison of architecture rationale with semantic web technologies. 1198-1210 - Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park:
Quality-driven architecture development using architectural tactics. 1211-1231 - Anton Jansen, Paris Avgeriou, Jan Salvador van der Ven:
Enriching software architecture documentation. 1232-1248 - Olaf Zimmermann, Jana Koehler, Frank Leymann, Ronny Polley, Nelly Schuster:
Managing architectural decision models with dependency relations, integrity constraints, and production rules. 1249-1267
- Jules White, Brian Dougherty, Douglas C. Schmidt:
Selecting highly optimal architectural feature sets with Filtered Cartesian Flattening. 1268-1284 - Georgia M. Kapitsaki, George N. Prezerakos, Nikolaos D. Tselikas, Iakovos S. Venieris:
Context-aware service engineering: A survey. 1285-1297 - Hyoungmin Park, Kyuseok Shim:
FAST: Flash-aware external sorting for mobile database systems. 1298-1312 - Wen-Chen Sun, Yi-Ming Chen:
On the design of an global intrusion tolerance network architecture against the internet catastrophes. 1313-1325 - Matjaz B. Juric, Ana Sasa, Bostjan Brumen, Ivan Rozman:
WSDL and UDDI extensions for version support in web services. 1326-1343 - Yunpeng Chai, Zhihui Du, Yinong Chen:
A stepwise optimization algorithm of clustered streaming media servers. 1344-1361 - Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin, Mingchu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation. 1362-1369
- W. Eric Wong, T. H. Tse, Robert L. Glass, Victor R. Basili, Tsong Yueh Chen:
An assessment of systems and software engineering scholars and institutions (2002-2006). 1370-1373
Volume 82, Number 9, September 2009
- W. Eric Wong, Aditya P. Mathur:
Editorial. 1375 - Zhenyu Zhang, Wing Kwong Chan, T. H. Tse, Heng Lu, Lijun Mei:
Resource prioritization of code optimization techniques for program synthesis of wireless sensor network applications. 1376-1387 - Lihua Duan, Jessica Chen:
Exploring alternatives for transition verification. 1388-1402 - Gordon Fraser, Franz Wotawa, Paul Ammann:
Issues in using model checkers for test case generation. 1403-1418 - Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu:
Adaptive random testing based on distribution metrics. 1419-1433
- Jenn-Wei Lin, Ming-Feng Yang:
Fault-tolerant design for wide-area Mobile IPv6 networks. 1434-1446 - Ki Yong Lee, Hyojun Kim, Kyoung-Gu Woo, Yon Dohn Chung, Myoung-Ho Kim:
Design and implementation of MLC NAND flash-based DBMS for mobile devices. 1447-1458 - Jordi Cabot, Ernest Teniente:
Incremental integrity checking of UML/OCL conceptual schemas. 1459-1478 - Kai Petersen, Claes Wohlin:
A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case. 1479-1490 - Xingchang Liu, Xiaofan Yang, Min Xiang:
One-step t-fault diagnosis for hypermesh optical interconnection multiprocessor systems. 1491-1496 - Jen-Ho Yang, Chin-Chen Chang:
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. 1497-1502 - Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng:
Trading decryption for speeding encryption in Rebalanced-RSA. 1503-1512 - Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
A survey on security in JXTA applications. 1513-1525 - Chung-Ming Huang, Jian-Wei Li, I-Ting Tseng:
Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks. 1526-1539 - Steven D. Sheetz, David Henderson, Linda G. Wallace:
Understanding developer and manager perceptions of function points and source lines of code. 1540-1549 - Faith-Michael E. Uzoka, Tshepo Ndzinge:
Empirical analysis of biometric technology adoption and acceptance in Botswana. 1550-1564
Volume 82, Number 10, October 2009
- Carl K. Chang:
Introduction. 1565-1567 - Susan Ferreira, James S. Collofello, Dan L. Shunk, Gerald T. Mackulak:
Understanding the effects of requirements volatility in software engineering by using analytical modeling and software process simulation. 1568-1577 - Jeffrey J. P. Tsai, Alan Liu:
Experience on knowledge-based software engineering: A logic-based requirements language and its industrial applications. 1578-1587 - Youngmann Kim, E. K. Park, Sungwoo Tak:
Dynamically reconfigurable hardware-software architecture for partitioning networking functions on the SoC platform. 1588-1599 - Ching-Huey Wang, Feng-Jian Wang:
Detecting artifact anomalies in business process specifications with a formal model. 1600-1619 - Yaw-Chung Chen, Wen-Kang Jia:
Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet. 1620-1626 - Pao-Ann Hsiung, Shang-Wei Lin, Yean-Ru Chen, Chun-Hsian Huang, Chihhsiong Shih, William C. Chu:
Modeling and verification of real-time embedded systems with urgency. 1627-1641 - Tegegne Marew, Joon-Sang Lee, Doo-Hwan Bae:
Tactics based approach for integrating non-functional requirements in object-oriented analysis and design. 1642-1656 - Sheikh Iqbal Ahamed, Haifeng Li, Nilothpal Talukder, Mehrab Monjur, Chowdhury Sharif Hasan:
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications. 1657-1677
- Libor Waszniowski, Jan Krakora, Zdenek Hanzálek:
Case study on distributed and fault tolerant system modeling based on timed automata. 1678-1694 - Sang-Uk Jeon, Jang-Eui Hong, In-Gwon Song, Doo-Hwan Bae:
Developing platform specific model for MPSoC architecture from UML-based embedded software models. 1695-1708 - Jiexin Lian, Sol M. Shatz, Xudong He:
Flexible coordinator design for modeling resource sharing in multi-agent systems. 1709-1729 - Charlotte Hug, Agnès Front, Dominique Rieu, Brian Henderson-Sellers:
A method to build information systems engineering process metamodels. 1730-1742 - The Duc Kieu, Chin-Chen Chang:
A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. 1743-1752
Volume 82, Number 11, November 2009
- Mark Harman, Zheng Li, Phil McMinn, Jeff Offutt, John A. Clark:
TAIC PART 2007 and Mutation 2007 special issue editorial. 1753-1754 - Florence Charreteur, Bernard Botella, Arnaud Gotlieb:
Modelling dynamic memory management in constraint-based testing. 1755-1766 - Stefan Wappler, Joachim Wegener, André Baresel:
Evolutionary testing of software with function-assigned flags. 1767-1779 - Rui Abreu, Peter Zoeteweij, Rob Golsteijn, Arjan J. C. van Gemund:
A practical evaluation of spectrum-based fault localization. 1780-1792 - David W. Binkley, Henry Feild, Dawn J. Lawrie, Maurizio Pighin:
Increasing diversity: Natural language measures for software fault prediction. 1793-1803 - Robert M. Hierons, Mercedes G. Merayo:
Mutation testing from probabilistic and stochastic finite state machines. 1804-1818 - Ben H. Smith, Laurie A. Williams:
Should software testers use mutation analysis to augment a test set? 1819-1832
- Wien Hong, Tung-Shou Chen, Chih-Wei Shiu:
Reversible data hiding for high quality images using modification of prediction errors. 1833-1842 - Seung Min Kim, Suk I. Yoo:
DOM tree browsing of a very large XML document: Design and implementation. 1843-1858 - Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare, Anura P. Jayasumana:
A wireless sensor system for validation of real-time automatic calibration of groundwater transport models. 1859-1868 - Subhas Chandra Misra, Vinod Kumar, Uma Kumar:
Identifying some important success factors in adopting agile software development practices. 1869-1890 - Santonu Sarkar, Girish Maskeri Rama, Shubha Ramachandran:
Discovery of architectural layers and measurement of layering violations in source code. 1891-1905 - Chuan-Yu Chang, Hung-Jen Wang, Sheng-Wen Pan:
A robust DWT-based copyright verification scheme with Fuzzy ART. 1906-1915 - Jenq-Shiou Leu, Cheng-Wei Tsai:
Practical design of a proxy agent to facilitate adaptive video streaming service across wired/wireless networks. 1916-1925
Volume 82, Number 12, December 2009
- Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, Joan Borrell:
Full mobile agent interoperability in an IEEE-FIPA context. 1927-1940 - Mohammad S. Obaidat, Mukund Sundararajan:
New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation. 1941-1949 - Kam Hay Fung, Graham Cedric Low:
Methodology evaluation framework for dynamic evolution in composition-based distributed applications. 1950-1965 - Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:
A high capacity reversible data hiding scheme with edge prediction and difference expansion. 1966-1973 - Wei Wang, Xiangliang Zhang, Sylvain Gombault:
Constructing attribute weights from computer audit data for effective intrusion detection. 1974-1981 - Mahvish Khurum, Tony Gorschek:
A systematic review of domain analysis solutions for product lines. 1982-2003 - Juan Wang, Dan Feng, Fang Wang, Chengtao Lu:
MHS: A distributed metadata management strategy. 2004-2011 - Sunggeun Park, Sungwon Jung:
An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments. 2012-2022 - Chin-Hui Lai, Duen-Ren Liu:
Integrating knowledge flow mining and collaborative filtering to support document recommendation. 2023-2037 - Asil Oztekin, Alexander Nikov, Selim Zaim:
UWIS: An assessment methodology for usability of web-based information systems. 2038-2050 - Chung-Yang Chen, Pei-Chi Chen:
A holistic approach to managing software change impact. 2051-2067 - Frank Alexander Kraemer, Vidar Slåtten, Peter Herrmann:
Tool support for the rapid composition, analysis and implementation of reactive services. 2068-2080 - Yu-Fang Chung, Zhen Yu Wu:
Approach to designing bribery-free and coercion-free electronic voting scheme. 2081-2090 - C. Okan Özogul, E. Ertugrul Karsak, Ethem Tolga:
A real options approach for evaluation and justification of a hospital information system. 2091-2102 - Stylianos Zikos, Helen D. Karatza:
Communication cost effective scheduling policies of nonclairvoyant jobs with load balancing in a grid. 2103-2116 - Shuichi Shimizu, Raju Rangaswami, Hector A. Duran-Limon, Manuel Corona-Perez:
Platform-independent modeling and prediction of application resource usage characteristics. 2117-2127
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.