default search action
Journal of Systems and Software, Volume 85
Volume 85, Number 1, January 2012
- W. Eric Wong, W. K. Chan, T. H. Tse, Fei-Ching Kuo:
Special Issue on Dynamic Analysis and Testing of Embedded Software. 1-2 - Maria de Fátima Mattiello-Francisco, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano:
InRob: An approach for testing interoperability and robustness of real-time embedded software. 3-15 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:
Test coverage optimization for large code problems. 16-27 - Jooyoung Seo, Byoungju Choi, Suengwan Yang:
Lightweight embedded software performance analysis method by kernel hack and its industrial field study. 28-42 - Chorng-Shiuh Koong, Chihhsiong Shih, Pao-Ann Hsiung, Hung-Jui Lai, Chih-Hung Chang, William C. Chu, Nien-Lin Hsueh, Chao-Tung Yang:
Automatic testing environment for multi-core embedded software - ATEMES. 43-60
- Mohamed Alnas, Irfan Awan, D. R. W. Holton:
Erratum to "Performance evaluation of fast handover in mobile IPv6 based on link layer informations" [Journal of Systems and Software 83 (2010) 1644-1650]. 61 - Ching-Wen Chen, Chuan-Chi Weng:
A power efficiency routing and maintenance protocol in wireless multi-hop networks. 62-76 - Antonino Santos, Juan Romero, Francisco Javier Taibo, Carlos Rodríguez, Adrián Carballal:
Self-tuning of disk input-output in operating systems. 77-86 - Xiaoyu Tang, Qingtian Zeng:
Keyword clustering for user interest profiling refinement within paper recommender systems. 87-101 - Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. 102-111 - Genaína Nunes Rodrigues, Vander Alves, Renato Silveira, Luiz A. Laranjeira:
Dependability analysis in the Ambient Assisted Living Domain: An exploratory case study. 112-131 - Lakshitha de Silva, Dharini Balasubramaniam:
Controlling software architecture erosion: A survey. 132-151 - Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-Porisini:
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. 152-166 - Hung-Yi Lin:
Using compressed index structures for processing moving objects in large spatio-temporal databases. 167-177 - Herman Hartmann, Tim Trew, Jan Bosch:
The changing industry structure of software development for consumer electronics and its consequences for software architectures. 178-192 - Moussa Ouedraogo, Djamel Khadraoui, Haralambos Mouratidis, Eric Dubois:
Appraisal and reporting of security assurance at operational systems level. 193-208 - Harendra Singh, Girraj Kumar Verma:
ID-based proxy signature scheme with message recovery. 209-214
Volume 85, Number 2, February 2012
- Paulo Borba:
Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering. 215 - Fabio Q. B. da Silva, A. César C. França:
Towards understanding the underlying structure of motivational factors for software engineers to guide the definition of motivational programs. 216-226 - Eduardo Figueiredo, Cláudio Sant'Anna, Alessandro Garcia, Carlos José Pereira de Lucena:
Applying and evaluating concern-sensitive design heuristics. 227-243 - Kecia Aline M. Ferreira, Mariza Andrade da Silva Bigonha, Roberto da Silva Bigonha, Luiz F. O. Mendes, Heitor C. Almeida:
Identifying thresholds for object-oriented software metrics. 244-257 - Elder Cirilo, Ingrid Nunes, Uirá Kulesza, Carlos José Pereira de Lucena:
Automating the product derivation process of multi-agent systems product lines. 258-276 - João Gustavo Prudêncio, Leonardo Murta, Cláudia M. L. Werner, Rafael da Silva Viterbo de Cepêda:
To lock, or not to lock: That is the question. 277-289
- Xiaopeng Wei, Ling Guo, Qiang Zhang, Jianxin Zhang, Shiguo Lian:
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. 290-299 - Xiaolin Ma, Fangmin Li, Fei Hu, Xinhua Liu:
A hybrid channel assignment strategy to QoS support of video-streaming over multi-channel ad hoc networks. 300-308 - Zhenxing Qian, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream. 309-313 - Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. 314-322 - Mohamed El-Attar:
Towards developing consistent misuse case models. 323-339 - Jun-Han Yang, Tian-Jie Cao:
Provably secure three-party password authenticated key exchange protocol in the standard model. 340-350 - Andréa Magalhães Magdaleno, Cláudia Maria Lima Werner, Renata Mendes de Araujo:
Reconciling software development models: A quasi-systematic review. 351-369 - Hongzhe Liu, Hong Bao, De Xu:
Concept vector for semantic similarity and relatedness based on WordNet structure. 370-381 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. 382-391 - Guorui Feng, Lingyan Fan:
Reversible data hiding of high payload using local edge sensing prediction. 392-399 - Qing Zhou, Xiaofeng Liao:
Collision-based flexible image encryption algorithm. 400-407 - Seyed Mohammad Hossein Hasheminejad, Saeed Jalili:
Design patterns selection: An automatic two-phase method. 408-424 - Sergio Pozo, Rafael M. Gasca, Antonia M. Reina Quintero, Angel Jesus Varela-Vaca:
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. 425-457
Volume 85, Number 3, March 2012
- Lawrence Chung, Manuel Noguera, Nary Subramanian, José Luis Garrido:
Novel approaches in the design and implementation of system/software architectures. 459-462 - Jaelson Castro, Márcia Lucena, Carla T. L. L. Silva, Fernanda M. R. Alencar, Emanuel Santos, João Pimentel:
Changing attitudes towards the generation of architectural models. 463-479 - Rafael Z. Frantz, Rafael Corchuelo, Carlos Molina-Jiménez:
A proposal to detect errors in Enterprise Application Integration solutions. 480-497 - Kawtar Benghazi Akhlaki, María Visitación Hurtado, Miguel J. Hornos, María Luisa Rodríguez, Carlos Rodríguez-Domínguez, Ana Belén Pelegrina Ortiz, María José Rodríguez-Fórtiz:
Enabling correct design and formal analysis of Ambient Assisted Living systems. 498-510 - H. Andrés Neyem, Sergio F. Ochoa, José A. Pino, Rubén Darío Franco:
A reusable structural design for mobile collaborative applications. 511-524 - Mónica Pinto, Lidia Fuentes, Luis Fernández:
Deriving detailed design models from an aspect-oriented ADL using MDD. 525-545 - Rainer Weinreich, Georg Buchgeher:
Towards supporting the software architecture life cycle. 546-561
- Daniel Rodríguez-García, Miguel-Ángel Sicilia, Elena García-Barriocanal, Rachel Harrison:
Empirical findings on team size and productivity in software development. 562-570 - Sudipta Bhattacharjee, Pramit Roy, Soumalya Ghosh, Sudip Misra, Mohammad S. Obaidat:
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines. 571-581 - Diana Kirk, Ewan D. Tempero:
A lightweight framework for describing software practices. 582-595 - Avner Ottensooser, Alan D. Fekete, Hajo A. Reijers, Jan Mendling, Con Menictas:
Making sense of business process descriptions: An experimental comparison of graphical and textual notations. 596-606 - Javier Fabra, Valeria de Castro, Pedro Álvarez, Esperanza Marcos:
Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches. 607-625 - Yu-Chi Huang, Kuan-Li Peng, Chin-Yu Huang:
A history-based cost-cognizant test case prioritization technique in regression testing. 626-637 - Jianhong Zhang, Jane Mao:
An efficient RSA-based certificateless signature scheme. 638-642 - Xu An Wang, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. 643-654 - Jun Shao, Peng Liu, Yuan Zhou:
Achieving key privacy without losing CCA security in proxy re-encryption. 655-665 - Diomidis Spinellis, Vaggelis Giannikas:
Organizational adoption of open source software. 666-682 - Martin Necaský, Jakub Klímek, Jakub Malý, Irena Mlýnková:
Evolution and change management of XML-based systems. 683-707 - Xingwen Zhao, Fangguo Zhang:
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. 708-716 - Pietro Colombo, Ferhat Khendek, Luigi Lavazza:
Bridging the gap between requirements and design: An approach based on Problem Frames and SysML. 717-745 - Mahmood Deypir, Mohammad Hadi Sadreddini:
A dynamic layout of sliding window for frequent itemset mining over data streams. 746-759 - Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Gateway-oriented password-authenticated key exchange protocol in the standard model. 760-768
Volume 85, Number 4, April 2012
- Shichao Zhang:
Decision tree classifiers sensitive to heterogeneous costs. 771-779 - Chuan He, Xiaomin Zhu, Hui Guo, Dishan Qiu, Jianqing Jiang:
Rolling-horizon scheduling for energy constrained distributed real-time embedded systems. 780-794 - Uwe van Heesch, Paris Avgeriou, Rich Hilliard:
A documentation framework for architecture decisions. 795-820 - Andreas Hjertström, Dag Nyström, Mikael Sjödin:
Data management for component-based embedded real-time systems: The database proxy approach. 821-834 - Alfredo Pironti, Davide Pozza, Riccardo Sisto:
Formally based semi-automatic implementation of an open security protocol. 835-849 - Xiao-jun Tong:
The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos. 850-858 - Dror G. Feitelson:
Perpetual development: A model of the Linux kernel life cycle. 859-875 - Woei-Jiunn Tsaur, Jia-Hong Li, Wei-Bin Lee:
An efficient and secure multi-server authentication scheme with key agreement. 876-882 - Muhammad Arsalan, Sana Ambreen Malik, Asifullah Khan:
Intelligent reversible watermarking in integer wavelet domain for medical images. 883-894 - Vishal Midha, Prashant Palvia:
Factors affecting the success of Open Source Software. 895-905 - J. O. Coronel, José E. Simó:
High performance dynamic voltage/frequency scaling algorithm for real-time dynamic load management. 906-919 - Farid Shirazi:
Free and Open Source Software versus Internet content filtering and censorship: A case study. 920-931 - Kostas Kolomvatsos, George Valkanas, Stathes Hadjiefthymiades:
Debugging applications created by a Domain Specific Language: The IPAC case. 932-943 - Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen, Wei-Zhe Sun:
Attribute-based strong designated-verifier signature scheme. 944-959 - Edward Y. Y. Kan, W. K. Chan, T. H. Tse:
EClass: An execution classification approach to improving the energy-efficiency of software via machine learning. 960-973 - Yih-Kai Lin, Shu-Chien Huang, Cheng-Hsing Yang:
A fast algorithm for Huffman decoding based on a recursion Huffman tree. 974-980 - Jinmin Zhong, Xuejia Lai:
Improved preimage attack on one-block MD4. 981-994 - Tommaso Cucinotta, Dario Faggioli:
Handling timing constraints violations in soft real-time applications as exceptions. 995-1011 - Fernanda d'Amorim, Paulo Borba:
Modularity analysis of use case implementations. 1012-1027
Volume 85, Number 5, May 2012
- Gregory Katsaros, George Kousiouris, Spyridon V. Gogouvitis, Dimosthenis Kyriazis, Andreas Menychtas, Theodora A. Varvarigou:
A Self-adaptive hierarchical monitoring mechanism for Clouds. 1029-1041 - Jehad Al-Dallal:
The impact of accounting for special methods in the measurement of object-oriented class cohesion on refactoring and fault prediction activities. 1042-1057 - Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:
DRMFS: A file system layer for transparent access semantics of DRM-protected contents. 1058-1066 - Huawen Liu, Shichao Zhang:
Noisy data elimination using mutual k-nearest neighbor for classification mining. 1067-1074 - Lip Yee Por, KokSheik Wong, Kok Onn Chee:
UniSpaCh: A text-based data hiding method using Unicode space characters. 1075-1082 - Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. 1083-1095 - Shahla Ghobadi, John D'Ambra:
Coopetitive relationships in cross-functional software development teams: How to model and measure? 1096-1104 - Guillaume Godet-Bar, Sophie Dupuy-Chessa, Dominique Rieu:
Sonata: Flexible connections between interaction and business spaces. 1105-1118 - Xiaotian Wu, Wei Sun:
Random grid-based visual secret sharing for general access structures with cheat-preventing ability. 1119-1134 - Xiaoying Wang, Zhihui Du, Yinong Chen:
An adaptive model-free resource and power management approach for multi-tier cloud environments. 1135-1146 - Luca Abeni, Nicola Manica, Luigi Palopoli:
Efficient and robust probabilistic guarantees for real-time tasks. 1147-1156 - Ting-Yi Chang, Cheng-Jung Tsai, Jyun-Hao Lin:
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. 1157-1165 - Wien Hong, Tung-Shou Chen, Chih-Wei Luo:
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. 1166-1175 - Hema Srikanth, Sean Banerjee:
Improving test efficiency through system test prioritization. 1176-1187 - Jan Mendling, Laura Sánchez-González, Félix García, Marcello La Rosa:
Thresholds for error probability measures of business process models. 1188-1197 - Xin-Chang Zhang, Mei-Hong Yang, Xiao-Jing Zhu, Wan-Ming Luo:
A loss recovery approach for reliable application layer multicast. 1198-1204 - Pei-Lun Suei, Yung-Feng Lu, Rong-Jhang Liao, Shi-Wu Lo:
A signature-based Grid index design for main-memory RFID database applications. 1205-1212
Volume 85, Number 6, June 2012
- Torgeir Dingsøyr, Sridhar P. Nerur, Venugopal Balijepally, Nils Brede Moe:
A decade of agile methodologies: Towards explaining agile software development. 1213-1221 - Diane E. Strode, Sid L. Huff, Beverley G. Hope, Sebastian Link:
Coordination in co-located agile software development projects. 1222-1238 - Meghann Drury, Kieran Conboy, Ken Power:
Obstacles to decision making in Agile software development teams. 1239-1254 - Mali Senapathi, Ananth Srinivasan:
Understanding post-adoptive agile usage: An exploratory cross-case analysis. 1255-1268 - Steve Adolph, Philippe Kruchten, Wendy Hall:
Reconciling perspectives: A grounded theory of how people manage the process of software development. 1269-1286 - Xiaofeng Wang, Kieran Conboy, Oisín Cawley:
"Leagile" software development: An experience report analysis of the application of lean approaches in agile software development. 1287-1299
- Bixin Li, Dong Qiu, Hareton Leung, Di Wang:
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. 1300-1324 - Yan-Xiao Liu, Lein Harn, Ching-Nung Yang, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. 1325-1332 - Satchidananda Dehuri, Rahul Roy, Sung-Bae Cho, Ashish Ghosh:
An improved swarm optimized functional link artificial neural network (ISO-FLANN) for classification. 1333-1345 - Chao-Wei Li, Kuen-Fang Jea, Ru-Ping Lin, Ssu-Fan Yen, Chih-Wei Hsu:
Mining frequent patterns from dynamic data streams with data load management. 1346-1362 - Tsai-Hsuan Tsai, Hsien-Tsung Chang, Yi-Ming Chang, Gung-Shiung Huang:
Sharetouch: A system to enrich social network experiences for the elderly. 1363-1369 - Ricardo Pérez-Castillo, José A. Cruz-Lemus, Ignacio García Rodríguez de Guzmán, Mario Piattini:
A family of case studies on business process mining using MARBLE. 1370-1385 - Tongquan Wei, Piyush Mishra, Kaijie Wu, Junlong Zhou:
Quasi-static fault-tolerant scheduling schemes for energy-efficient hard real-time systems. 1386-1399 - Tien Van Do, Csaba Rotter:
Comparison of scheduling schemes for on-demand IaaS requests. 1400-1408 - Raylin Tso, Xinyi Huang, Willy Susilo:
Strongly secure certificateless short signatures. 1409-1417 - Bernd Burgstaller, Bernhard Scholz, Johann Blieberger:
A symbolic analysis framework for static analysis of imperative programming languages. 1418-1439 - Marion Lepmets, Tom McBride, Eric Ras:
Goal alignment in process improvement. 1440-1452
Volume 85, Number 7, July 2012
- Jan Bosch:
Software ecosystems: Taking software development beyond the boundaries of the organization. 1453-1454 - Geir Kjetil Hanssen:
A longitudinal case study of an emerging software ecosystem: Implications for practice and theory. 1455-1466 - Terhi Kilamo, Imed Hammouda, Tommi Mikkonen, Timo Aaltonen:
From proprietary to open source - Growing an open source ecosystem. 1467-1478 - Walt Scacchi, Thomas A. Alspaugh:
Understanding the role of licenses and evolution in open architecture software ecosystems. 1479-1494 - Slinger Jansen, Sjaak Brinkkemper, Jurriaan Souer, Lutzen Luinenburg:
Shades of gray: Opening up a software producing organization with the open software enterprise model. 1495-1510 - Rick Kazman, Michael Gagliardi, William Wood:
Scaling up software architecture analysis. 1511-1519
- Simonetta Balsamo, Peter G. Harrison, Andrea Marin:
Methodological construction of product-form stochastic Petri nets for performance evaluation. 1520-1539 - Javier Palanca Cámara, Martí Navarro, Vicente Julián, Ana García-Fornes:
Distributed goal-oriented computing. 1540-1557 - Bixin Li, Lulu Wang, Hareton Leung, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. 1558-1576 - Dimitris Antoniou, Yannis Plegas, Athanasios K. Tsakalidis, Giannis Tzimas, Emmanouil Viennas:
Dynamic refinement of search engines results utilizing the user intervention. 1577-1587 - Antonella Galizia, Alfonso Quarati:
Job allocation strategies for energy-aware and efficient Grid infrastructures. 1588-1606 - Ana María Moreno, María Isabel Sánchez Segura, Fuensanta Medina-Domínguez, Laura Carvajal:
Balancing software engineering education and industrial needs. 1607-1620 - Francisco Jurado, Miguel A. Redondo, Manuel Ortega:
Blackboard architecture to integrate components and agents in heterogeneous distributed eLearning systems: An application for learning to program. 1621-1636 - Francisco J. Ballesteros, Enrique Soriano, Gorka Guardiola:
Octopus: An Upperware based system for building personal pervasive environments. 1637-1649 - Zhongqiang Chen, Mema Roussopoulos, Zhanyan Liang, Yuan Zhang, Zhongrong Chen, Alex Delis:
Malware characteristics and threats on the internet ecosystem. 1650-1672 - Wanyong Tian, Chun Jason Xue, Minming Li, Enhong Chen:
Loop fusion and reordering for register file optimization on stream processors. 1673-1681 - Isaac Woungang, Felix O. Akinladejo, David W. White, Mohammad S. Obaidat:
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation. 1682-1698
Volume 85, Number 8, August 2012
- Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu:
Improving VRSS-based vulnerability prioritization using analytic hierarchy process. 1699-1708 - Gianpaolo Cugola, Alessandro Margara:
Complex event processing with T-REX. 1709-1728 - Song Han, Kam-yiu Lam, Jiantao Wang, Sang Hyuk Son, Aloysius K. Mok:
Adaptive co-scheduling for periodic application and update transactions in real-time database systems. 1729-1743 - Monika Kapus-Kolar:
On "Exploring alternatives for transition verification". 1744-1748 - Aikun Li, Yi Liang, Di Wu:
Utilizing Layered Taxation to provide incentives in P2P streaming systems. 1749-1756 - Shiao-Li Tsao, Jian Jhen Chen:
SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. 1757-1769 - Ana Magazinius, Sofia Börjesson, Robert Feldt:
Investigating intentional distortions in software cost estimation - An exploratory study. 1770-1781 - Patsy Ann Zimmer, Joanne M. Atlee:
Ordering features by category. 1782-1800 - Guido Salvaneschi, Carlo Ghezzi, Matteo Pradella:
Context-oriented programming: A software engineering perspective. 1801-1817 - Yong Yang, Marlon Dumas, Luciano García-Bañuelos, Artem Polyvyanyy, Liang Zhang:
Generalized aggregate Quality of Service computation for composite services. 1818-1830 - Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
An encoding scheme based on fractional number for querying and updating XML data. 1831-1851 - Xiaotian Wu, Duanhao Ou, Qiming Liang, Wei Sun:
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. 1852-1863 - E. D. Tsougenis, George A. Papakostas, Dimitris E. Koulouriotis, Vassilios D. Tourassis:
Performance evaluation of moment-based watermarking methods: A review. 1864-1884 - Matthias Weidlich, Jan Mendling, Mathias Weske:
Propagating changes between aligned process models. 1885-1898 - Khaled Salah, A. Manea, Sherali Zeadally, José M. Alcaraz Calero:
Mitigating starvation of Linux CPU-bound processes in the presence of network I/O. 1899-1914 - Salamah Salamah, Ann Q. Gates, Vladik Kreinovich:
Validated templates for specification of complex LTL formulas. 1915-1929 - Lili Marziana Abdullah, June M. Verner:
Analysis and application of an outsourcing risk framework. 1930-1952 - Per Närman, Hannes Holm, David Höök, Nicholas Honeth, Pontus Johnson:
Using enterprise architecture and technology adoption models to predict application usage. 1953-1967
Volume 85, Number 9, September 2012
- Patricia Lago, Rich Hilliard:
Special issue: Selected papers from the 9th Working IEEE/IFIP Conference on Software Architecture (WICSA 2011). 1969-1970 - Lars Pareto, Anna Börjesson Sandberg, Peter S. Eriksson, Staffan Ehnebom:
Collaborative prioritization of architectural concerns. 1971-1994 - Eltjo R. Poort, Hans van Vliet:
RCDA: Architecting as a risk- and cost management discipline. 1995-2013 - Olaf Zimmermann, Christoph Miksovic, Jochen Malte Küster:
Reference architecture, metamodel, and modeling principles for architectural knowledge management in information technology services. 2014-2033 - Eoin Woods:
Industrial architectural assessment using TARA. 2034-2047
- Boon-Yaik Ooi, Huah Yong Chan, Yu-N Cheah:
Dynamic service placement and replication framework to enhance service availability using team formation algorithm. 2048-2062 - David Lo, Leonardo Mariani, Mauro Santoro:
Learning extended FSA from software: An empirical assessment. 2063-2076 - Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. 2077-2085 - Viljan Mahnic, Tomaz Hovelja:
On using planning poker for estimating user stories. 2086-2095 - Chong Hee Kim:
Differential fault analysis of ARIA in multi-byte fault models. 2096-2103 - Der-Chen Huang, Kun-Ding Hung, Yung-Kuan Chan:
A computer assisted method for leukocyte nucleus segmentation and recognition in blood smear images. 2104-2118 - Alexis Papadimitriou, Panagiotis Symeonidis, Yannis Manolopoulos:
Fast and accurate link prediction in social networking systems. 2119-2132 - Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith:
Security analysis of image cryptosystems only or partially based on a chaotic permutation. 2133-2144 - Luís Nogueira, Luís Miguel Pinho, Jorge Coelho:
A feedback-based decentralised coordination model for distributed open real-time systems. 2145-2159 - Tim Miller, Sonja Pedell, Leon Sterling, Frank Vetere, Steve Howard:
Understanding socially oriented roles and goals through motivational modelling. 2160-2170 - Carla L. Pacheco, Iván A. García:
A systematic literature review of stakeholder identification methods in requirements elicitation. 2171-2181 - Narasimha Bolloju, Sherry Xiaoyun Sun:
Benefits of supplementing use case narratives with activity diagrams - An exploratory study. 2182-2191
- Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768]. 2192
Volume 85, Number 10, October 2012
- Andrea Capiluppi, Anthony Cleve, Naouel Moha:
Guest editors' introduction to the special issue on automated software evolution. 2193-2194 - Weiyi Shang, Bram Adams, Ahmed E. Hassan:
Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report. 2195-2204 - Patrick Mäder, Orlena Gotel:
Towards automated traceability maintenance. 2205-2227 - Pietro Abate, Roberto Di Cosmo, Ralf Treinen, Stefano Zacchiroli:
Dependency solving: A separate concern in component evolution management. 2228-2240 - Marios Fokaefs, Nikolaos Tsantalis, Eleni Stroulia, Alexander Chatzigeorgiou:
Identification and application of Extract Class refactorings in object-oriented systems. 2241-2260 - Andreas Pleuss, Goetz Botterweck, Deepak Dhungana, Andreas Polzer, Stefan Kowalewski:
Model-driven support for product line evolution on feature level. 2261-2274 - Pamela Bhattacharya, Iulian Neamtiu, Christian R. Shelton:
Automated, highly-accurate, bug assignment using machine learning and tossing graphs. 2275-2292 - Walid M. Ibrahim, Nicolas Bettenburg, Bram Adams, Ahmed E. Hassan:
On the relationship between comment update practices and Software Bugs. 2293-2304 - Kai Yu, Mengxiang Lin, Jin Chen, Xiangyu Zhang:
Towards automated debugging in software evolution: Evaluating delta debugging on real regression bugs from the developers' perspectives. 2305-2317 - Omar Alam, Bram Adams, Ahmed E. Hassan:
Preserving knowledge in software projects. 2318-2330
- Jinkyu Lee, Insik Shin, Arvind Easwaran:
Convex optimization framework for intermediate deadline assignment in soft and hard real-time distributed systems. 2331-2339 - Indika Meedeniya, Aldeida Aleti, Lars Grunske:
Architecture-driven reliability optimization with uncertain model parameters. 2340-2355 - Paul M. Clarke, Rory V. O'Connor:
The influence of SPI on business success in software SMEs: An empirical study. 2356-2367 - Juan Manuel Vara, Esperanza Marcos:
A framework for model-driven development of information systems: Technical decisions and lessons learned. 2368-2384 - Esra Satir, Hakan Isik:
A compression-based text steganography method. 2385-2394 - Yih-Kai Lin:
High capacity reversible data hiding scheme based upon discrete cosine transformation. 2395-2404 - Juri Lelli, Dario Faggioli, Tommaso Cucinotta, Giuseppe Lipari:
An experimental comparison of different real-time schedulers on multicore systems. 2405-2416
- Alfonso Fuggetta:
3 + 1 Challenges for the future of universities. 2417-2424
Volume 85, Number 11, November 2012
- S. R. Kannan, S. Ramathilagam, R. Devi, E. Hines:
Strong fuzzy c-means in medical image data analysis. 2425-2438 - V. Mohanraj, M. Chandrasekaran, J. Senthilkumar, S. Arumugam, Y. Suresh:
Ontology driven bee's foraging approach based self adaptive online recommendation system. 2439-2450 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256. 2451-2458 - Jenhui Chen, Woei-Hwa Tarn, Wu-Hsiao Hsu, Chih-Chieh Wang:
Cross-layer end-to-end label switching protocol for WiMAX-MPLS heterogeneous networks. 2459-2469 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:
A variable-length model for masquerade detection. 2470-2478 - Marco Avvenuti, Cinzia Bernardeschi, Nicoletta De Francesco, Paolo Masci:
JCSI: A tool for checking secure information flow in Java Card applications. 2479-2493 - Magne Jørgensen, Barbara A. Kitchenham:
Interpretation problems related to the use of regression models to decide on economy of scale in software development. 2494-2503 - Pedro Sánchez-Palma, Diego Alonso, José Miguel Morales, Pedro Javier Navarro Lorente:
From Teleo-Reactive specifications to architectural components: A model-driven approach. 2504-2518 - Benjamin Morandi, Sebastian Nanz, Bertrand Meyer:
Performance analysis of SCOOP programs. 2519-2530 - Dunwei Gong, Tian Tian, Xiangjuan Yao:
Grouping target paths for evolutionary generation of test data in parallel. 2531-2540 - Shichao Zhang:
Nearest neighbor selection for iteratively kNN imputation. 2541-2552 - Wei-neng Wang, Fu-sheng Chen, Zhiqiang Wang:
An endurance solution for solid state drives with cache. 2553-2558 - Francesco Palmieri:
Percolation-based routing in the Internet. 2559-2573 - Hongyu Pei Breivold, Ivica Crnkovic, Magnus Larsson:
Software architecture evolution through evolvability analysis. 2574-2592 - Qian Lin, Zhengwei Qi, Jiewei Wu, Yaozu Dong, Haibing Guan:
Optimizing virtual machines using hybrid virtualization. 2593-2603 - Geert Monsieur, Monique Snoeck, Wilfried Lemahieu:
Managing data dependencies in service compositions. 2604-2628 - Tim Verbelen, Pieter Simoens, Filip De Turck, Bart Dhoedt:
AIOLOS: Middleware for improving mobile application performance through cyber foraging. 2629-2639 - Iván S. Razo-Zapata, J. Carlos Mex-Perera, Raúl Monroy Borja:
Masquerade attacks based on user's profile. 2640-2651 - Soon-Kyeong Kim, Toby Myers, Marc-Florian Wendland, Peter A. Lindsay:
Execution of natural language requirements using State Machines synthesised from Behavior Trees. 2652-2664 - Sana Ambreen Malik, Asifullah Khan, Mutawarra Hussain, Khurram Jawad, Rafiullah Chamlawi, Abdul Jalil:
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches. 2665-2673
Volume 85, Number 12, December 2012
- Danny Weyns, Sam Malek, Jesper Andersson, Bradley R. Schmerl:
Introduction to the special issue on state of the art in engineering self-adaptive systems. 2675-2677 - Tharindu Patikirikorala, Alan W. Colman, Jun Han, Liuping Wang:
An evaluation of multi-model self-managing control schemes for adaptive performance management of software systems. 2678-2696 - Yönet A. Eracar, Mieczyslaw M. Kokar:
Self-control of the time complexity of a constraint satisfaction problem solver program. 2697-2706 - Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop. 2707-2719 - Mehdi Amoui, Mahdi Derakhshanmanesh, Jürgen Ebert, Ladan Tahvildari:
Achieving dynamic adaptation via management and interpretation of runtime models. 2720-2737 - Guoquan Wu, Jun Wei, Chunyang Ye, Hua Zhong, Tao Huang, Hong He:
Specification and monitoring of data-centric temporal properties for service-based systems. 2738-2754 - Ermyas Abebe, Caspar Ryan:
Adaptive application offloading using distributed abstract class graphs in mobile environments. 2755-2769 - Narges Khakpour, Saeed Jalili, Marjan Sirjani, Ursula Goltz, Bahareh Abolhasanzadeh:
HPobSAM for modeling and analyzing IT Ecosystems - Through a case study. 2770-2784 - Andrei Pruteanu, Stefan Dulman:
LossEstimate: Distributed failure estimation in wireless networks. 2785-2795 - Diego Perez-Palacin, Raffaela Mirandola, José Merseguer:
QoS and energy management with Petri nets: A self-adaptive framework. 2796-2811 - Chang Xu, Shing-Chi Cheung, Xiaoxing Ma, Chun Cao, Jian Lu:
Adam: Identifying defects in context-aware adaptation. 2812-2828 - Mohammed Salifu, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Analysing monitoring and switching problems for adaptive systems. 2829-2839 - Svein O. Hallsteinsen, Kurt Geihs, Nearchos Paspallis, Frank Eliassen, Geir Horn, Jorge Lorenzo, Alessandro Mamelli, George Angelos Papadopoulos:
A development framework and methodology for self-adapting applications in ubiquitous computing environments. 2840-2859 - Shang-Wen Cheng, David Garlan:
Stitch: A language for architecture-based self-adaptation. 2860-2875
- Jingyu Kim, Sungwon Kang, Jihyun Lee, Bong Wan Choi:
A semantic translation method for data communication protocols. 2876-2898 - Tae Hyun Kim, ChangKyun Kim, IlHwan Park:
Side channel analysis attacks using AM demodulation on commercial smart cards with SEED. 2899-2908 - José Ramón Méndez, Miguel Reboiro-Jato, Fernando Díaz, Eduardo Díaz, Florentino Fdez-Riverola:
Grindstone4Spam: An optimization toolkit for boosting e-mail classification. 2909-2920 - Manlu Liu, Harry Jiannan Wang, J. Leon Zhao:
Technology flexibility as enabler of robust application development in community source: The case of Kuali and Sakai. 2921-2928
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.