


default search action
Journal of Systems and Software (JSS), Volume 84
Volume 84, Number 1, January 2011
- Muhammad Younas, Irfan Awan, Makoto Takizawa
:
Special issue on the information networking and services. 1 - Waltenegus Dargie
, Rami Mochaourab
, Alexander Schill, Lin Guan
:
A topology control protocol based on eligibility and efficiency metrics. 2-11 - Mahmoud Moadeli, Wim Vanderbauwhede:
An analytical model of broadcast in QoS-aware wormhole-routed NoCs. 12-20 - Satoshi Ohzahata, Konosuke Kawashima:
An experimental study of peer behavior in a pure P2P network. 21-28 - Yan Yang, Samia Souissi, Xavier Défago
, Makoto Takizawa
:
Fault-tolerant flocking for a group of autonomous mobile robots. 29-36 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min:
Performance analysis of an integrated scheduling scheme in the presence of bursty MMPP traffic. 37-44 - Elhadi M. Shakshuki
, Haroon Malik, Tarek R. Sheltami
:
A comparative study on simulation vs. real time deployment in wireless sensor networks. 45-54 - Fatos Xhafa
, Claudi Paniagua, Leonard Barolli, Santi Caballé
:
Using Grid services to parallelize IBM's Generic Log Adapter. 55-62
- Hong-Quang Nguyen, David Taniar
, J. Wenny Rahayu, Kinh Nguyen:
Double-layered schema integration of heterogeneous XML sources. 63-76 - Mubarak Mohammad, Vangalur S. Alagar:
A formal approach for the specification and verification of trustworthy component-based systems. 77-104 - Osamah M. Al-Qershi
, Bee Ee Khoo
:
High capacity data hiding schemes for medical images based on difference expansion. 105-112 - Hui-Feng Huang, Kuo-Ching Liu:
Efficient key management for preserving HIPAA regulations. 113-119 - Qiong Huang, Guomin Yang
, Duncan S. Wong, Willy Susilo
:
Identity-based strong designated verifier signature revisited. 120-129 - Leonidas Akritidis
, Dimitrios Katsaros, Panayiotis Bozanis:
Effective rank aggregation for metasearching. 130-143 - Eugenio Capra, Chiara Francalanci, Francesco Merlo, Cristina Rossi Lamastra:
Firms' involvement in Open Source projects: A trade-off between software structural quality and popularity. 144-161
- W. Eric Wong, T. H. Tse
, Robert L. Glass, Victor R. Basili, Tsong Yueh Chen
:
An assessment of systems and software engineering scholars and institutions (2003-2007 and 2004-2008). 162-168
Volume 84, Number 2, February 2011
- David Isern
, David Sánchez
, Antonio Moreno
:
Organizational structures supported by agent-oriented methodologies. 169-184 - Ning Gui, Vincenzo De Florio
, Hong Sun
, Chris Blondia:
Toward architecture-based context-aware deployment and adaptation. 185-197 - Paulo S. L. M. Barreto, Rafael Misoczki, Marcos A. Simplício Jr.
:
One-time signature scheme from syndrome decoding over generic error-correcting codes. 198-204 - Shengpu Liu, Liang Cheng
:
A context-aware reflective middleware framework for distributed real-time and embedded systems. 205-218 - Xu An Wang
, Jian Weng
, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. 219-225 - Christos V. Samaras, Vassilis Tsaoussidis
:
Adjusting transport segmentation policy of DTN Bundle Protocol under synergy with lower layers. 226-237 - Amir Hossein Ghapanchi
, Aybüke Aurum:
Antecedents to IT personnel's intentions to leave: A systematic literature review. 238-249 - Hossain Shahriar
, Mohammad Zulkernine:
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. 250-269 - Mohammad Azzeh
, Daniel Neagu
, Peter I. Cowling
:
Analogy-based software effort estimation using Fuzzy numbers. 270-284 - Rick Rabiser
, Pádraig O'Leary, Ita Richardson
:
Key activities for product derivation in software product lines. 285-300 - Brian Henderson-Sellers:
Bridging metamodels and ontologies in software engineering. 301-313 - Hai Thanh Mai, Yu Won Lee, Ki Yong Lee, Myoung-Ho Kim:
Distributed adaptive top-k monitoring in wireless sensor networks. 314-327 - Michel dos Santos Soares, Jos L. M. Vrancken, Alexander Verbraeck
:
User requirements modeling and analysis of software-intensive systems. 328-339
Volume 84, Number 3, March 2011
- Mustafa Ulutas
, Güzin Ulutas, Vasif V. Nabiyev:
Medical image security and EPR hiding using Shamir's secret sharing scheme. 341-353 - Xiao Liu
, Zhiwei Ni, Dong Yuan
, Yuan-Chun Jiang, Zhangjun Wu
, Jinjun Chen, Yun Yang:
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems. 354-376 - Tianle Zhang, Zhihui Du
, Yinong Chen
, Xiang Ji, Xiaoying Wang
:
Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management. 377-387 - Cheng-Hsing Yang, Sheng-Chang Wu, Shu-Chien Huang
, Yih-Kai Lin:
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes. 388-396 - Gabriele Bavota
, Andrea De Lucia
, Rocco Oliveto:
Identifying Extract Class refactoring opportunities using structural and semantic cohesion measures. 397-414 - Lars M. Karg, Michael Grottke
, Arne Beckhaus:
A systematic literature review of software quality cost research. 415-427 - Chien-Chang Chen
, Yao-Hong Tsai:
Adaptive reversible image watermarking scheme. 428-434 - Wei-Wen Wu:
Mining significant factors affecting the adoption of SaaS using the rough set approach. 435-441 - Brett Dawes, Kwan-Wu Chin
:
A comparison of deterministic and probabilistic methods for indoor localization. 442-451 - Shichao Zhang, Zhi Jin, Xiaofeng Zhu
:
Missing data imputation by utilizing information within incomplete instances. 452-459 - Xu Ma, Lingling Xu, Fangguo Zhang
:
Oblivious transfer with timed-release receiver's privacy. 460-464 - Konstantinos I. Karaoglanoglou, Helen D. Karatza
:
Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. 465-478 - Chung-Yang Chen
, P. Pete Chong:
Software engineering education: A study on conducting collaborative senior project development. 479-491 - Xiao Liu
, Zhiwei Ni, Zhangjun Wu
, Dong Yuan
, Jinjun Chen, Yun Yang:
A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems. 492-509 - Robert Baird, Noah Jorgenson, Rose F. Gamble:
Self-adapting workflow reconfiguration. 510-524
Volume 84, Number 4, April 2011
- Byoungju Choi, Richard Lai:
Special issue on the best papers of QSIC 2009. 527 - Seunghun Park, Doo-Hwan Bae:
An approach to analyzing the software process change impact using process slicing and simulation. 528-543 - Xiaoyuan Xie, Joshua Wing Kei Ho
, Christian Murphy, Gail E. Kaiser
, Baowen Xu
, Tsong Yueh Chen
:
Testing and validating machine learning classifiers by metamorphic testing. 544-558 - Foutse Khomh, Stéphane Vaucher, Yann-Gaël Guéhéneuc, Houari A. Sahraoui:
BDTEX: A GQM-based Bayesian approach for the detection of antipatterns. 559-572 - Rui Abreu
, Peter Zoeteweij, Arjan J. C. van Gemund:
Simultaneous debugging of software faults. 573-586 - Vidroha Debroy, W. Eric Wong:
On the estimation of adequate test set size using fault failure rates. 587-602 - Lijun Mei, W. K. Chan
, T. H. Tse
, Robert G. Merkel
:
XML-manipulating test case prioritization for XML-manipulating services. 603-619
- Claudia P. Ayala, Øyvind Hauge, Reidar Conradi, Xavier Franch
, Jingyue Li:
Selection of third party software in Off-The-Shelf-based software development - An interview study with industrial practitioners. 620-637 - Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
A policy-based publish/subscribe middleware for sense-and-react applications. 638-654 - Cesare Bartolini, Antonia Bertolino
, Sebastian G. Elbaum, Eda Marchetti
:
Bringing white-box testing to Service Oriented Architectures through a Service Oriented Approach. 655-668 - Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. 669-678 - Yu-Li Lin, Chien-Lung Hsu:
Secure key management scheme for dynamic hierarchical access control based on ECC. 679-685 - Siffat Ullah Khan
, Mahmood Niazi
, Rashid Ahmad:
Factors influencing clients in the selection of offshore software outsourcing vendors: An exploratory study using a systematic literature review. 686-699 - Damianos Chatziantoniou, Katerina Pramatari, Yannis Sotiropoulos:
Supporting real-time supply chain decisions based on RFID data streams. 700-710
Volume 84, Number 5, May 2011
- Hui Song, Gang Huang, Franck Chauvel, Yingfei Xiong
, Zhenjiang Hu, Yanchun Sun, Hong Mei:
Supporting runtime software architecture: A bidirectional-transformation-based approach. 711-723 - Saraju P. Mohanty, Elias Kougianos:
Real-time perceptual watermarking architectures for video broadcasting. 724-738 - Witold Pedrycz, Barbara Russo
, Giancarlo Succi
:
A model of job satisfaction for collaborative development processes. 739-752 - Frédérique Robert-Inacio, Alain Trémeau, Mike Fournigault, Yannick Teglia, Pierre-Yvan Liardet:
Shape analysis for power signal cryptanalysis on secure components. 753-762 - Chun-Han Lin
, Huang-Chen Lee
, Chung-Ta King:
Periphery deployment for wireless sensor systems with guaranteed coverage percentage. 763-774 - Francisco Reyes, Narciso Cerpa
, Alfredo Candia-Véjar
, Matthew Bardeen:
The optimization of success probability for software projects using genetic algorithms. 775-785 - Peng Liang
, Anton Jansen, Paris Avgeriou
, Antony Tang
, Lai Xu
:
Advanced quality prediction model for software architectural knowledge sharing. 786-802 - Ziba Eslami, Jamal Zarepour-Ahmadabadi:
Secret image sharing with authentication-chaining and dynamic embedding. 803-809 - Joaquín Entrialgo
, Daniel F. García
, Javier García, Manuel García, Pablo Valledor, Mohammad S. Obaidat
:
Dynamic adaptation of response-time models for QoS management in autonomic systems. 810-820 - Tolga Ovatman
, Thomas Weigert, Feza Buzluca
:
Exploring implicit parallelism in class diagrams. 821-834 - Indika Meedeniya, Barbora Buhnova
, Aldeida Aleti
, Lars Grunske
:
Reliability-driven deployment optimization for embedded systems. 835-846 - Jean-Baptiste Fasquel, Johan Moreau
:
A design pattern coupling role and component concepts: Application to medical software. 847-863 - Yung-Cheng Ma, Chung-Ping Chung, Tien-Fu Chen:
Load and storage balanced posting file partitioning for parallel information retrieval. 864-884
Volume 84, Number 6, June 2011
- Zhenyu Zhang, W. K. Chan
, T. H. Tse
, Yuen-Tak Yu, Peifeng Hu:
Non-parametric statistical fault localization. 885-905 - Kun Peng:
An efficient shuffling based eVoting scheme. 906-922 - Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma:
A novel image watermarking in redistributed invariant wavelet domain. 923-929 - W. K. Chan
, Yuen Yau Chiu, Yuen-Tak Yu:
A web search-centric approach to recommender systems with URLs as minimal user contexts. 930-941 - Alexandre Torres
, Renata de Matos Galante, Marcelo Soares Pimenta:
A synergistic model-driven approach for persistence modeling with UML. 942-957 - Tanja Suomalainen, Outi Salo, Pekka Abrahamsson
, Jouni Similä:
Software product roadmapping in a volatile business environment. 958-975 - T. Edagawa, T. Akaike, Yoshiki Higo, Shinji Kusumoto, Shigeo Hanabusa, T. Shibamoto:
Function point measurement from Web application source code based on screen transitions and database accesses. 976-984 - Qinma Kang, Hong He, Hui-Min Song:
Task assignment in heterogeneous computing systems using an effective iterated greedy algorithm. 985-992 - Chien-Ping Chou, Kuen-Fang Jea, Heng-Hsun Liao:
A syntactic approach to twig-query matching on XML streams. 993-1007 - Pedro Sánchez
, Manuel Jiménez Buendía
, Francisca Rosique
, Bárbara Álvarez
, Andrés Iborra
:
A framework for developing home automation systems: From requirements to code. 1008-1021 - Shih-Lin Wu
, Shu-Chia Chen:
An energy-efficient MAC protocol with downlink traffic scheduling strategy in IEEE 802.11 infrastructure WLANs. 1022-1031 - Pedro J. Clemente
, Juan Hernández Núñez
, José María Conejero, Guadalupe Ortiz
:
Managing crosscutting concerns in component based systems using a model driven development approach. 1032-1053 - Marko Palviainen, Antti Evesti
, Eila Ovaska
:
The reliability estimation, prediction and measuring of component-based software. 1054-1070
Volume 84, Number 7, July 2011
- M. Mustafa Rafique, Ali Raza Butt
, Eli Tilevich
:
Reusable software components for accelerator-based clusters. 1071-1081 - Robert W. P. Luk
:
Scalable, statistical storage allocation for extensible inverted file construction. 1082-1088 - Antonia Bertolino
, Guglielmo De Angelis, Alessio Di Sandro
, Antonino Sabetta:
Is my model right? Let me ask the expert. 1089-1099 - David Hästbacka, Timo Vepsäläinen, Seppo Kuikka
:
Model-driven development of industrial process control applications. 1100-1113 - Komminist Weldemariam, Adolfo Villafiorita
:
Procedural security analysis: A methodological approach. 1114-1129 - Abdulhadi Shoufan
, Tolga Arul
:
A benchmarking environment for performance evaluation of tree-based rekeying algorithms. 1130-1143 - Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro
, Laurent Toutain:
Dynamic deployment of context-aware access control policies for constrained security devices. 1144-1159 - Gang Huang, Weihu Wang, Tiancheng Liu, Hong Mei:
Simulation-based analysis of middleware service impact on system reliability: Experiment on Java application server. 1160-1170 - Wes Masri, Hiba Halabi:
An algorithm for capturing variables dependences in test suites. 1171-1190 - Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. 1191-1196 - Tzung-Her Chen
, Kai-Hsiang Tsao:
Threshold visual secret sharing by random grids. 1197-1208 - Mosa Elbendak, Paul Vickers
, B. Nick Rossiter:
Parsed use case descriptions as a basis for object-oriented class model generation. 1209-1223 - Zhihui Du
, Jingkun Hu, Yinong Chen
, Zhili Cheng, Xiaoying Wang
:
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid. 1224-1232 - Klaus Marius Hansen, Kristjan Jonasson, Helmut Neukirchen:
An empirical study of software architectures' effect on product quality. 1233-1243 - Nikos Kefalakis
, John Soldatos
, Nikolaos Konstantinou
, Neeli R. Prasad:
APDL: A reference XML schema for process-centered definition of RFID solutions. 1244-1259
Volume 84, Number 8, August 2011
- Lixin Han, Hong Yan
:
BSN: An automatic generation algorithm of social network data. 1261-1269 - George Kousiouris
, Tommaso Cucinotta
, Theodora A. Varvarigou:
The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks. 1270-1291 - Tao-Ku Chang
, Gwan-Hwan Hwang:
Developing an efficient query system for encrypted XML documents. 1292-1305 - Ruijun Zhang, Jie Lu
, Guangquan Zhang
:
An information presentation method based on tree-like super entity component. 1306-1318 - C. C. F. Pereira Geovandro, Marcos A. Simplício Jr.
, Michael Naehrig, Paulo S. L. M. Barreto:
A family of implementation-friendly BN elliptic curves. 1319-1326 - Sergio Ilarri
, Carlos Bobed
, Eduardo Mena
:
An approach to process continuous location-dependent queries on moving objects with support for location granules. 1327-1350 - Ganna Frankova, Magali Seguran, Florian Gilcher
, Slim Trabelsi, Jörg Dörflinger, Marco Aiello
:
Deriving business processes with service level agreements from early requirements. 1351-1363 - Jin Wook Byun, Dong Hoon Lee:
On a security model of conjunctive keyword search over encrypted relational database. 1364-1372 - D. R. W. Holton, Muhammad Younas, Irfan-Ullah Awan:
Priority scheduling of requests to web portals. 1373-1378 - María José Escalona Cuaresma
, Javier J. Gutiérrez
, Manuel Mejías
, Gustavo Aragón, Isabel M. Ramos
, Jesús Torres Valderrama
, Francisco José Domínguez Mayo:
An overview on test generation from functional requirements. 1379-1393 - Anil S. Jadhav, Rajendra M. Sonar:
Framework for evaluation and selection of the software packages: A hybrid knowledge based system approach. 1394-1407 - Xiangyang Wang, Pan-Pan Niu, Mingyu Lu:
A robust digital audio watermarking scheme using wavelet moment invariance. 1408-1421
Volume 84, Number 9, September 2011
- Flávio Oquendo, Eltjo R. Poort, Judith A. Stafford:
Guest Editors Introduction to the Special Issue. 1423 - Johan F. Hoorn
, Rik Farenhorst, Patricia Lago, Hans van Vliet:
The lonesome architect. 1424-1435 - Yan Liu, Xin Liang, Lingzhi Xu, Mark Staples, Liming Zhu
:
Composing enterprise mashup components and services using architecture integration patterns. 1436-1446 - Trosky Boris Callo Arias, Pierre America, Paris Avgeriou
:
Defining and documenting execution viewpoints for a large and complex software-intensive system. 1447-1461
- Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. 1462-1470 - Ying Sun, Chunxiang Xu, Yong Yu
, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. 1471-1479 - Ana Sasa, Marjan Krisper:
Enterprise architecture patterns for business process support analysis. 1480-1506 - Ohhoon Kwon, Kern Koh, Jaewoo Lee, Hyokyung Bahn:
FeGC: An efficient garbage collection scheme for flash memory based storage systems. 1507-1523 - Yanchang Zhao
, Jie Cao, Chengqi Zhang
, Shichao Zhang:
Enhancing grid-density based clustering for high dimensional data. 1524-1539 - Björn Lundell, Brian Lings, Anna Syberfeldt
:
Practitioner perceptions of Open Source software in the embedded systems area. 1540-1549 - Soheila Kiani, Mohsen Ebrahimi Moghaddam:
A multi-purpose digital image watermarking using fractal block coding. 1550-1562 - Celia Gutiérrez, Iván García-Magariño
:
Revealing bullying patterns in multi-agent systems. 1563-1575
Volume 84, Number 10, October 2011
- Gustavo Weber Denardin
, Carlos Henrique Barriquello
, Alexandre Campos
, Ricardo Nederson do Prado
:
A geographic routing hybrid approach for void resolution in wireless sensor networks. 1577-1590 - Faramarz Safi Esfahani
, Masrah Azrifah Azmi Murad
, Md. Nasir bin Sulaiman, Nur Izura Udzir:
Adaptable Decentralized Service Oriented Architecture. 1591-1617 - Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
:
Formal analysis of an electronic voting system: An experience report. 1618-1637 - Shih-Sheng Chen, Tony Cheng-Kui Huang, Zhe-Min Lin:
New and efficient knowledge discovery of partial periodic patterns with multiple minimum supports. 1638-1651 - Shin-Jia Hwang, Yun-Hao Sung:
Confidential deniable authentication using promised signcryption. 1652-1659 - Sung-Kyoung Kim, Tae Hyun Kim, Dong-Guk Han, Seokhie Hong:
An efficient CRT-RSA algorithm secure against power and fault attacks. 1660-1669 - Elisa Yumi Nakagawa
, Fabiano Cutigi Ferrari
, Mariela M. F. Sasaki, José Carlos Maldonado:
An aspect-oriented reference architecture for Software Engineering Environments. 1670-1684 - Xuehai Tang, Bing Sun, Ruilin Li, Chao Li, Juhua Yin:
A meet-in-the-middle attack on reduced-round ARIA. 1685-1692 - Doina Bucur
, Marta Z. Kwiatkowska:
On software verification for sensor nodes. 1693-1707 - Xiaomin Zhu, Chuan He, Rong Ge, Peizhong Lu:
Boosting adaptivity of fault-tolerant scheduling for real-time tasks with service requirements on clusters. 1708-1716 - Tian-Fu Lee, Tzonelih Hwang:
Provably secure and efficient authentication techniques for the global mobility network. 1717-1725 - Ching-Nung Yang
, Yu-Ying Chu:
A general (k, n) scalable secret image sharing scheme with the smooth scalability. 1726-1733 - Arnau Erola, Jordi Castellà-Roca
, Alexandre Viejo
, Josep Maria Mateo-Sanz
:
Exploiting social networks to provide privacy in personalized web search. 1734-1745 - Jenn-Wei Lin, Shih-Chieh Tang:
A grid-based coverage approach for target tracking in hybrid sensor networks. 1746-1756 - Nikolaos Tsantalis
, Alexander Chatzigeorgiou:
Identification of extract method refactoring opportunities for the decomposition of methods. 1757-1782 - Fuchun Guo
, Yi Mu, Willy Susilo
:
Improving security of q-SDH based digital signatures. 1783-1790 - Amir Talaei-Khoei, Terje Solvoll, Pradeep Ray
, Nandan Parameswaran:
Policy-based Awareness Management (PAM): Case study of a wireless communication system at a hospital. 1791-1805 - Fabio Paternò, Carmen Santoro
, Lucio Davide Spano
:
Engineering the authoring of usable service front ends. 1806-1822
Volume 84, Number 11, November 2011
- Damianos Gavalas
, Paolo Bellavista
, Jiannong Cao
, Valérie Issarny:
Mobile applications: Status and trends. 1823-1826 - Vittorio Ghini, Stefano Ferretti
, Fabio Panzieri:
The "Always Best Packet Switching" architecture for SIP-based mobile multimedia services. 1827-1851 - Byoungjip Kim
, Sang Jeong Lee, Youngki Lee, Inseok Hwang, Yunseok Rhee, Junehwa Song:
Mobiiscape: Middleware support for scalable mobility pattern monitoring of moving objects in a large-scale city. 1852-1870 - Tim Verbelen
, Tim Stevens, Pieter Simoens
, Filip De Turck
, Bart Dhoedt:
Dynamic deployment and quality adaptation for mobile augmented reality applications. 1871-1882 - Sergio Martín
, Gabriel Díaz, Inmaculada Plaza, Elena Ruiz Larrocha, Manuel Castro, Juan Peire:
State of the art of frameworks and middleware for facilitating mobile and ubiquitous learning development. 1883-1891 - SK Hafizul Islam
, G. P. Biswas:
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. 1892-1898 - María-Dolores Cano
, Ginés Doménech-Asensi:
A secure energy-efficient m-banking application for mobile devices. 1899-1909 - Igor Bilogrevic, Murtuza Jadliwala, Praveen Kumar, Sudeep Singh Walia, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Meetings through the cloud: Privacy-preserving scheduling on mobile devices. 1910-1927 - Delphine Christin
, Andreas Reinhardt, Salil S. Kanhere
, Matthias Hollick:
A survey on privacy in mobile participatory sensing applications. 1928-1946 - Markus Tschersich, Christian Kahl, Stephan Heim, Stephen Crane, Katja Böttcher, Ioannis Krontiris, Kai Rannenberg:
Towards privacy-enhanced mobile communities - Architecture, concepts and user trials. 1947-1960 - Claudio Alvarez, Rosa Alarcón, Miguel Nussbaum
:
Implementing collaborative learning activities in the classroom supported by one-to-one mobile computing: A design-based process. 1961-1976 - Inmaculada Plaza, Lourdes Martín, Sergio Martín
, Carlos Medrano
:
Mobile applications in an aging society: Status and trends. 1977-1988 - Ioannis Chatzigiannakis
, Georgios Mylonas
, Panagiotis C. Kokkinos, Orestis Akribopoulos, Marios Logaras, Irene Mavrommati:
Implementing multiplayer pervasive installations based on mobile sensing devices: Field experience and user evaluation from a public showcase. 1989-2004 - Shu-Chiung Hu, You-Chiun Wang, Chiuan-Yu Huang, Yu-Chee Tseng:
Measuring air quality in city areas by vehicular wireless sensor networks. 2005-2012 - Javier Guerra Casanova, Carmen Sánchez Ávila
, Alberto de Santos Sierra, Gonzalo Bailador del Pozo:
Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures. 2013-2021 - Chang Liu, Qing Zhu, Kenneth A. Holroyd, Elizabeth K. Seng:
Status and trends of mobile-health applications for iOS devices: A developer's perspective. 2022-2033
Volume 84, Number 12, December 2011
- Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Suntae Kim, Sooyong Park:
A feature-based approach for modeling role-based access control systems. 2035-2052 - Heung Seok Chae, Gyun Woo, Tae Yeon Kim, Jung Ho Bae, Won-Young Kim:
An automated approach to reducing test suites for testing retargeted C compilers for embedded systems. 2053-2064 - Princely Ifinedo:
Examining the influences of external expertise and in-house computer/IT knowledge on ERP system success. 2065-2078 - Richard Kennard, John Leaney
:
Is there convergence in the field of UI generation? 2079-2087 - Fabrizio Milo, Massimo Bernaschi, Mauro Bisson:
A fast, GPU based, dictionary attack to OpenPGP secret keyrings. 2088-2096 - Yulei Wu, Geyong Min, Mohamed Ould-Khaoua, Hao Yin:
Modelling and analysis of pipelined circuit switching in interconnection networks with bursty traffic and hot-spot destinations. 2097-2106 - Bo Wang, Chuanhe Huang, Layuan Li, Wenzhong Yang:
Trust-based minimum cost opportunistic routing for Ad hoc networks. 2107-2122 - Wei Li:
Evaluating the impacts of dynamic reconfiguration on the QoS of running systems. 2123-2138 - Daewook Lee, Joonho Kwon, Sangjun Lee, Seog Park, Bonghee Hong:
Scalable and efficient web services composition based on a relational database. 2139-2155 - Saad Bani-Mohammad, Ismail Ababneh, Mazen Hamdan:
Performance evaluation of noncontiguous allocation algorithms for 2D mesh interconnection networks. 2156-2170 - Bestoun S. Ahmed
, Kamal Zuhairi Zamli:
A variable strength interaction test suites generation strategy using Particle Swarm Optimization. 2171-2185 - Mikel Larrea
, Cristian Martín, Iratxe Soraluze Arriola
:
Communication-efficient leader election in crash-recovery systems. 2186-2195 - Chia-Chun Wu
, Shang-Juh Kao, Min-Shiang Hwang:
A high quality image sharing with steganography and adaptive authentication scheme. 2196-2207 - Jianmei Guo, Jules White, Guangxin Wang, Jian Li, Yinglin Wang:
A genetic algorithm for optimized feature selection with resource constraints in software product lines. 2208-2221 - Dunwei Gong, Wanqiu Zhang, Xiangjuan Yao:
Evolutionary generation of test data for many paths coverage based on grouping. 2222-2233 - Toacy Cavalcante de Oliveira
, Paulo S. C. Alencar, Donald D. Cowan:
ReuseTool - An extensible tool support for object-oriented framework reuse. 2234-2252 - Hongyu Zhang
, Hee Beng Kuan Tan, Lu Zhang, Xi Lin, Xiaoyin Wang, Chun Zhang, Hong Mei:
Checking enforcement of integrity constraints in database applications based on code patterns. 2253-2264 - Apostolos Ampatzoglou, Apostolos Kritikos
, George Kakarontzas
, Ioannis Stamelos:
An empirical investigation on the reusability of design patterns and software packages. 2265-2283 - Yamin Wen, Fangguo Zhang
:
Delegatable secret handshake scheme. 2284-2292 - Liming Fang, Willy Susilo
, Chunpeng Ge, Jiandong Wang:
Interactive conditional proxy re-encryption with fine grain policy. 2293-2302 - Yanan Qiao, Yong Qi, Di Hou:
Tensor Field Model for higher-order information retrieval. 2303-2313 - Jose Martinez-Llario
, M. Gonzalez-Alcaide:
Design of a Java spatial extension for relational databases. 2314-2323 - Jinkyu Lee, Arvind Easwaran
, Insik Shin, Insup Lee:
Zero-laxity based real-time multiprocessor scheduling. 2324-2333 - Francesca Arcelli Fontana, Stefano Maggioni, Claudia Raibulet
:
Understanding the relevance of micro-structures for design patterns detection. 2334-2347 - Chong Zhang, Weidong Xiao, Daquan Tang, Jiuyang Tang:
P2P-based multidimensional indexing methods: A survey. 2348-2362 - Ghassan Beydoun
, Antonio A. Lopez-Lorca, Francisco García-Sánchez
, Rodrigo Martínez-Béjar
:
How do we measure and improve the quality of a hierarchical ontology? 2363-2373 - Avichai Meged, Roy Gelbard
:
Adjusting Fuzzy Similarity Functions for use with standard data mining tools. 2374-2383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.