Volume 82,
Number 1,
January 2009
- Vittorio Cortellessa, Sebastián Uchitel, Daniel Yankelevich:
Guest editorial.
1-2
- Steffen Becker, Heiko Koziolek, Ralf Reussner:
The Palladio component model for model-driven performance prediction.
3-22
- Umar Farooq, Shikharesh Majumdar, Eric W. Parsons:
Achieving efficiency, quality of service and robustness in multi-organizational Grids.
23-38
- Vipul Mathur, Varsha Apte:
An overhead and resource contention aware analytical model for overloaded Web servers.
39-55
- C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models.
56-74
- Lukas Pustina, Simon Schwarzer, Michael Gerharz, Peter Martini, Volker Deichmann:
A practical approach for performance-driven UML modelling of handheld devices - A case study.
75-88
- Daniel Lacks, Taskin Koçak:
Developing reusable simulation core code for networking: The grid resource discovery example.
89-100
- David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks.
101-111
- Mohamed Feredj, Frédéric Boulanger, Aimé Mokhoo Mbobi:
A model of domain-polymorph component for heterogeneous system design.
112-120
- Swapna S. Gokhale:
Model-based performance analysis using block coverage measurements.
121-130
- Navid Aghdaie, Yuval Tamir:
CoRAL: A transparent fault-tolerant web service.
131-143
- Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo, Aloysius K. Mok:
An anomaly prevention approach for real-time task scheduling.
144-154
- Yong Joon Lee, Jun Wook Lee, Duckjin Chai, Buhyun Hwang, Keun Ho Ryu:
Mining temporal interval relational rules from temporal data.
155-167
- Patricia Lago, Henry Muccini, Hans van Vliet:
A scoped approach to traceability management.
168-182
Volume 82,
Number 2,
February 2009
- Pierfrancesco Bellini, Paolo Nesi, Davide Rogai:
Expressing and organizing real-time specification patterns via temporal logics.
183-196
- Carles Garrigues, Nikos Migas, William J. Buchanan, Sergi Robles, Joan Borrell:
Protecting mobile agents from external replay attacks.
197-206
- Alfredo Capozucca, Nicolas Guelfi, Patrizio Pelliccione, Alexander Romanovsky, Avelino Francisco Zorzo:
Frameworks for designing and implementing dependable systems using Coordinated Atomic Actions: A comparative study.
207-228
- Sharon Ryan, Rory O'Connor:
Development of a team measure for tacit knowledge in software development teams.
229-240
- Y. F. Li, M. Xie, T. N. Goh:
A study of project selection and feature weighting for analogy based software cost estimation.
241-252
- Silvia Abrahão, Geert Poels:
A family of experiments to evaluate a functional size measurement procedure for Web applications.
253-269
- Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel identity-based strong designated verifier signature scheme.
270-273
- Konstantinos Tsakalozos, Vassilis Stoumpos, Kostas Saidis, Alex Delis:
Adaptive disk scheduling with workload-dependent anticipation intervals.
274-291
- Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:
Specifying behavioral semantics of UML diagrams through graph transformations.
292-306
- Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:
Comparative evaluation of contiguous allocation strategies on 3D mesh multicomputers.
307-318
- Jie Yang, Gang Huang, Wenhui Zhu, Xiaofeng Cui, Hong Mei:
Quality attribute tradeoff through adaptive architectures at runtime.
319-332
- Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, I-Lang Wu:
Exception handling refactorings: Directed by goals and driven by bug fixing.
333-345
- Wei Li, Dawu Gu, Yi Wang:
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
346-354
- Damianos Gavalas, George E. Tsekouras, Christos Anagnostopoulos:
A mobile agent platform for distributed network and systems management.
355-371
Volume 82,
Number 3,
March 2009
- Marvin V. Zelkowitz:
An update to experimental models for validating computer technology.
373-376
- Xingwei Wang, Lei Guo, Xuetao Wei, Lan Pang, Tengfei Wu, Juan Du, Xuekui Wang:
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks.
377-381
- Shi-Ming Huang, Chih-Fong Tsai, Po-Chun Huang:
Component-based software version management based on a Component-Interface Dependency Matrix.
382-399
- Hua Duan, Qingtian Zeng, Huaiqing Wang, Sherry X. Sun, Dongming Xu:
Classification and evaluation of timed running schemas for workflow based on process mining.
400-410
- Yung-Kuan Chan, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method.
411-421
- Wing Kwong Chan, Shing-Chi Cheung, Jeffrey C. F. Ho, T. H. Tse:
PAT: A pattern classification approach to automatic reference oracles for the testing of mesh simplification programs.
422-434
- Magnus Eriksson, Jürgen Börstler, Kjell Borg:
Managing requirements specifications for product lines - An approach and industry case study.
435-447
- Amjad Umar, Adalberto Zordan:
Reengineering for service oriented architectures: A strategic decision model for integration versus migration.
448-462
- Liguo Yu, Srini Ramaswamy:
An empirical approach to evaluating dependency locality in hierarchically structured software systems.
463-472
- Jason Liu, Yue Li, Nathanael Van Vorst, Scott Mann, Keith Hellman:
A real-time network simulation infrastructure based on OpenVPN.
473-485
- Ramon Nou, Samuel Kounev, Ferran Julià, Jordi Torres:
Autonomic QoS control in enterprise Grid environments using online simulation.
486-502
- Jun-Ki Min, Jihyun Lee, Chin-Wan Chung:
An efficient XML encoding and labeling method for query processing and updating on dynamic XML data.
503-515
- Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh:
Search-order coding method with indicator-elimination property.
516-525
- Gregorio Bernabé, José M. García, José González:
A lossy 3D wavelet transform for high-quality compression of medical video.
526-534
- Koji Ohishi, Hiroyuki Okamura, Tadashi Dohi:
Gompertz software reliability model: Estimation algorithm and empirical validation.
535-543
Controversy Corner
Volume 82,
Number 4,
April 2009
Selected papers from the 2008 IEEE Conference on Software Engineering Education and Training (CSEET08)
- Hossein Saiedian:
Software engineering challenges of the "Net" generation.
551-552
- Eric Ras, Jörg Rech:
Using Wikis to support the Net Generation in improving knowledge acquisition in capstone projects.
553-562
- David S. Janzen, Jungwoo Ryoo:
Engaging the net generation with evidence-based software engineering through a community-driven web database.
563-570
- Nancy R. Mead:
Software engineering education: How far we've come and how far we have to go.
571-575
- Nenad Stankovic:
Single development project.
576-582
- Robert Wesley McGrew, Rayford B. Vaughn:
Discovering vulnerabilities in control system human-machine interface software.
583-589
Regular papers
- Christos Baloukas, José Luis Risco-Martín, David Atienza, Christophe Poucet, Lazaros Papadopoulos, Stylianos Mamagkakis, Dimitrios Soudris, José Ignacio Hidalgo, Francky Catthoor, Juan Lanchares:
Optimization methodology of dynamic data structures based on genetic algorithms for multimedia embedded systems.
590-602
- Anthony J. T. Lee, Ying-Ho Liu, Hsin-Mu Tsai, Hsiu-Hui Lin, Huei-Wen Wu:
Mining frequent patterns in image databases with 9D-SPA representation.
603-618
- Myungryun Yoo:
Real-time task scheduling by multiobjective genetic algorithm.
619-628
- Rodrigo B. de Paes, Carlos José Pereira de Lucena, Gustavo R. de Carvalho, Donald D. Cowan:
An event-driven high level model for the specification of laws in open multi-agent systems.
629-642
- Feng Cao, Zhenfu Cao:
An identity based universal designated verifier signature scheme secure in the standard model.
643-649
- Houn-Gee Chen, James J. Jiang, Gary Klein, Jengchung V. Chen:
Reducing software requirement perception gaps through coordination mechanisms.
650-655
- Shuenn-Jyi Wang, Dah-Lih Jeng, Meng-Tsai Tsai:
Early fire detection method in video for vessels.
656-667
- Bram Adams, Kris De Schutter, Andy Zaidman, Serge Demeyer, Herman Tromp, Wolfgang De Meuter:
Using aspect orientation in legacy environments for reverse engineering using dynamic analysis - An industrial experience report.
668-684
- Peng-Yeng Yin, Chin-Wen Liu:
A new relevance feedback technique for iconic image retrieval based on spatial relationships.
685-696
- Vincent S. Tseng, Eric Hsueh-Chan Lu:
Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns.
697-706
- Ebrahim Bagheri, Ali A. Ghorbani:
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models.
707-729
- Gerard Horgan, Souheil Khaddaj:
Use of an adaptable quality model approach in a production support environment.
730-738
Volume 82,
Number 5,
May 2009
- Karl Beecher, Andrea Capiluppi, Cornelia Boldyreff:
Identifying exogenous drivers and evolutionary stages in FLOSS projects.
739-750
- Yan Li, Lu Zhang, Bing Xie, Jiasu Sun:
Refining component description by leveraging user query logs.
751-758
- Giuseppe Di Modica, Orazio Tomarchio, Lorenzo Vita:
Dynamic SLAs management in service oriented environments.
759-771
- Eleftherios Tiakas, Apostolos Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic, Slobodanka Djordjevic-Kajan:
Searching for similar trajectories in spatial networks.
772-788
- Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures.
789-793
- Zuhua Shao:
Improvement of identity-based proxy multi-signature scheme.
794-800
- James J. Jiang, Gary Klein, Shelly P. J. Wu, T. P. Liang:
The relation of requirements uncertainty and stakeholder perception gaps to project management performance.
801-808
- Spyros Sioutas, Evangelos Sakkopoulos, Christos Makris, Bill Vassiliadis, Athanasios K. Tsakalidis, Peter Triantafillou:
Dynamic Web Service discovery architecture based on a novel peer based overlay network.
809-824
- Siwoo Byun, Moonhaeng Huh:
An index management using CHC-cluster for flash memory databases.
825-835
- Patrik Berander, Mikael Svahnberg:
Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting.
836-850
- Diane Kelly:
Determining factors that affect long-term evolution in scientific application software.
851-861
- Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han:
A static API birthmark for Windows binary executables.
862-873
- Fernando Castor Filho, Alexander Romanovsky, Cecília M. F. Rubira:
Improving reliability of cooperative concurrent systems with exception flow analysis.
874-890
- Vasileios Baousis, Stathes Hadjiefthymiades, George Alyfantis, Lazaros F. Merakos:
Autonomous mobile agent routing for efficient server resource allocation.
891-906
- Ahmet Özmen:
An entropy-based algorithm for data elimination in time-driven software instrumentation.
907-913
Volume 82,
Number 6,
June 2009
- W. Dai, H. Dominic Covvey, Paulo S. C. Alencar, Donald D. Cowan:
Lightweight query-based analysis of workflow process dependencies.
915-931
- Salah Sadou, Hafedh Mili:
A delegation-based approach for the unanticipated dynamic evolution of distributed objects.
932-946
- Nikitas N. Karanikolas, Maria Nitsiou, Emmanuel J. Yannakoudakis, Christos Skourlas:
CUDL language semantics: Updating FDB data.
947-962
- Young Il Ko, Chang-Sup Park, In Chul Song, Myoung-Ho Kim:
An efficient void resolution method for geographic routing in wireless sensor networks.
963-973
- Tzong-Sun Wu, Han-Yu Lin:
Efficient self-certified proxy CAE scheme and its variants.
974-980
- Jie-Cherng Chen, Sun-Jen Huang:
An empirical analysis of the impact of software development problem factors on software maintainability.
981-992
- Teade Punter, René L. Krikhaar, Reinder J. Bril:
Software engineering technology innovation - Turning research results into industrial success.
993-1003
- Wenbing Zhao:
Design and implementation of a Byzantine fault tolerance framework for Web services.
1004-1015
- Zhe-Ming Lu, Jun-Xiang Wang, Bei-Bei Liu:
An improved lossless data hiding scheme based on image VQ-index residual value coding.
1016-1024
- Su-Cheng Haw, Chien-Sing Lee:
Extending path summary and region encoding for efficient structural query processing in native XML databases.
1025-1035
- Matthew Chang, Chung Keung Poon:
Using phrases as features in email classification.
1036-1045
- Jung-Yu Lai, Wei-Heng Chen:
Measuring e-business dependability: The employee perspective.
1046-1055
Volume 82,
Number 7,
July 2009
- Andrew R. Dalton, Jason O. Hallstrom:
nAIT: A source analysis and instrumentation framework for nesC.
1057-1072
- Joo Hyuk Jeon, Ki Yong Lee, Jae Soo Yoo, Myoung-Ho Kim:
HIPaG: An energy-efficient in-network join for distributed condition tables in sensor networks.
1073-1086
- Hyoung-Gon Lee, Namkyu Park, Han-Il Jeong, Jinwoo Park:
Grid enabled MRP process improvement under distributed database environment.
1087-1097
- Patricia Balbastre, Ismael Ripoll, Alfons Crespo:
Period sensitivity analysis and D-P domain feasibility region in dynamic priority systems.
1098-1111
- P. Venkata Krishna, Sudip Misra, Mohammad S. Obaidat, V. Saritha:
An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks.
1112-1124
- Laurent Thiry, Bernard Thirion:
Functional metamodels for systems and software.
1125-1136
- Nathan DeBardeleben, Ron Sass, Daniel C. Stanzione Jr., Walter B. Ligon III:
Building problem-solving environments with the Arches framework.
1137-1151
- Sanghyun Yoo, Jin Hyun Son, Myoung-Ho Kim:
A scalable publish/subscribe system for large mobile ad hoc networks.
1152-1162
- Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol.
1163-1167
- Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:
Fair anonymous rewarding based on electronic cash.
1168-1176
- Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino, Michele Risi:
Design pattern recovery through visual language parsing and source code analysis.
1177-1193
Volume 82,
Number 8,
August 2009
Architectural Decisions and Rationale
- Muhammad Ali Babar, Patricia Lago:
Design decisions and design rationale in software architecture.
1195-1197
- Claudia López, Pablo Inostroza, Luiz Marcio Cysneiros, Hernán Astudillo:
Visualization and comparison of architecture rationale with semantic web technologies.
1198-1210
- Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park:
Quality-driven architecture development using architectural tactics.
1211-1231
- Anton Jansen, Paris Avgeriou, Jan Salvador van der Ven:
Enriching software architecture documentation.
1232-1248
- Olaf Zimmermann, Jana Koehler, Frank Leymann, Ronny Polley, Nelly Schuster:
Managing architectural decision models with dependency relations, integrity constraints, and production rules.
1249-1267
Regular Papers
- Jules White, Brian Dougherty, Douglas C. Schmidt:
Selecting highly optimal architectural feature sets with Filtered Cartesian Flattening.
1268-1284
- Georgia M. Kapitsaki, George N. Prezerakos, Nikolaos D. Tselikas, Iakovos S. Venieris:
Context-aware service engineering: A survey.
1285-1297
- Hyoungmin Park, Kyuseok Shim:
FAST: Flash-aware external sorting for mobile database systems.
1298-1312
- Wen-Chen Sun, Yi-Ming Chen:
On the design of an global intrusion tolerance network architecture against the internet catastrophes.
1313-1325
- Matjaz B. Juric, Ana Sasa, Bostjan Brumen, Ivan Rozman:
WSDL and UDDI extensions for version support in web services.
1326-1343
- Yunpeng Chai, Zhihui Du, Yinong Chen:
A stepwise optimization algorithm of clustered streaming media servers.
1344-1361
- Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin, Ming-Chu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation.
1362-1369
Controversy Corner
Volume 82,
Number 9,
September 2009
QSIC 2007
- W. Eric Wong, Aditya P. Mathur:
Editorial.
1375
- Zhenyu Zhang, Wing Kwong Chan, T. H. Tse, Heng Lu, Lijun Mei:
Resource prioritization of code optimization techniques for program synthesis of wireless sensor network applications.
1376-1387
- Lihua Duan, Jessica Chen:
Exploring alternatives for transition verification.
1388-1402
- Gordon Fraser, Franz Wotawa, Paul Ammann:
Issues in using model checkers for test case generation.
1403-1418
- Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu:
Adaptive random testing based on distribution metrics.
1419-1433
Regular Paper
- Jenn-Wei Lin, Ming-Feng Yang:
Fault-tolerant design for wide-area Mobile IPv6 networks.
1434-1446
- Ki Yong Lee, Hyojun Kim, Kyoung-Gu Woo, Yon Dohn Chung, Myoung-Ho Kim:
Design and implementation of MLC NAND flash-based DBMS for mobile devices.
1447-1458
- Jordi Cabot, Ernest Teniente:
Incremental integrity checking of UML/OCL conceptual schemas.
1459-1478
- Kai Petersen, Claes Wohlin:
A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case.
1479-1490
- Xingchang Liu, Xiaofan Yang, Min Xiang:
One-step t-fault diagnosis for hypermesh optical interconnection multiprocessor systems.
1491-1496
- Jen-Ho Yang, Chin-Chen Chang:
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
1497-1502
- Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng:
Trading decryption for speeding encryption in Rebalanced-RSA.
1503-1512
- Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
A survey on security in JXTA applications.
1513-1525
- Chung-Ming Huang, Jian-Wei Li, I-Ting Tseng:
Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks.
1526-1539
- Steven D. Sheetz, David Henderson, Linda Wallace:
Understanding developer and manager perceptions of function points and source lines of code.
1540-1549
- Faith-Michael E. Uzoka, Tshepo Ndzinge:
Empirical analysis of biometric technology adoption and acceptance in Botswana.
1550-1564
Volume 82,
Number 10,
October 2009
YAU
- Carl K. Chang:
Introduction.
1565-1567
- Susan Ferreira, James S. Collofello, Dan L. Shunk, Gerald T. Mackulak:
Understanding the effects of requirements volatility in software engineering by using analytical modeling and software process simulation.
1568-1577
- Jeffrey J. P. Tsai, Alan Liu:
Experience on knowledge-based software engineering: A logic-based requirements language and its industrial applications.
1578-1587
- Youngmann Kim, E. K. Park, Sungwoo Tak:
Dynamically reconfigurable hardware-software architecture for partitioning networking functions on the SoC platform.
1588-1599
- Ching-Huey Wang, Feng-Jian Wang:
Detecting artifact anomalies in business process specifications with a formal model.
1600-1619
- Yaw-Chung Chen, Wen-Kang Jia:
Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet.
1620-1626
- Pao-Ann Hsiung, Shang-Wei Lin, Yean-Ru Chen, Chun-Hsian Huang, Chihhsiong Shih, William C. Chu:
Modeling and verification of real-time embedded systems with urgency.
1627-1641
- Tegegne Marew, Joon-Sang Lee, Doo-Hwan Bae:
Tactics based approach for integrating non-functional requirements in object-oriented analysis and design.
1642-1656
- Sheikh Iqbal Ahamed, Haifeng Li, Nilothpal Talukder, Mehrab Monjur, Chowdhury Sharif Hasan:
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications.
1657-1677
Regular Papers
- Libor Waszniowski, Jan Krakora, Zdenek Hanzálek:
Case study on distributed and fault tolerant system modeling based on timed automata.
1678-1694
- Sang-Uk Jeon, Jang-Eui Hong, In-Gwon Song, Doo-Hwan Bae:
Developing platform specific model for MPSoC architecture from UML-based embedded software models.
1695-1708
- Jiexin Lian, Sol M. Shatz, Xudong He:
Flexible coordinator design for modeling resource sharing in multi-agent systems.
1709-1729
- Charlotte Hug, Agnès Front, Dominique Rieu, Brian Henderson-Sellers:
A method to build information systems engineering process metamodels.
1730-1742
- The Duc Kieu, Chin-Chen Chang:
A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy.
1743-1752
Volume 82,
Number 11,
November 2009
TAIC PART 2007 and MUTATION 2007
- Mark Harman, Zheng Li, Phil McMinn, Jeff Offutt, John A. Clark:
TAIC PART 2007 and Mutation 2007 special issue editorial.
1753-1754
- Florence Charreteur, Bernard Botella, Arnaud Gotlieb:
Modelling dynamic memory management in constraint-based testing.
1755-1766
- Stefan Wappler, Joachim Wegener, André Baresel:
Evolutionary testing of software with function-assigned flags.
1767-1779
- Rui Abreu, Peter Zoeteweij, Rob Golsteijn, Arjan J. C. van Gemund:
A practical evaluation of spectrum-based fault localization.
1780-1792
- David Binkley, Henry Feild, Dawn J. Lawrie, Maurizio Pighin:
Increasing diversity: Natural language measures for software fault prediction.
1793-1803
- Robert M. Hierons, Mercedes G. Merayo:
Mutation testing from probabilistic and stochastic finite state machines.
1804-1818
- Ben H. Smith, Laurie Williams:
Should software testers use mutation analysis to augment a test set?
1819-1832
Regular Papers
- Wien Hong, Tung-Shou Chen, Chih-Wei Shiu:
Reversible data hiding for high quality images using modification of prediction errors.
1833-1842
- Seung Min Kim, Suk I. Yoo:
DOM tree browsing of a very large XML document: Design and implementation.
1843-1858
- Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare, Anura P. Jayasumana:
A wireless sensor system for validation of real-time automatic calibration of groundwater transport models.
1859-1868
- Subhas Chandra Misra, Vinod Kumar, Uma Kumar:
Identifying some important success factors in adopting agile software development practices.
1869-1890
- Santonu Sarkar, Girish Maskeri Rama, Shubha Ramachandran:
Discovery of architectural layers and measurement of layering violations in source code.
1891-1905
- Chuan-Yu Chang, Hung-Jen Wang, Sheng-Wen Pan:
A robust DWT-based copyright verification scheme with Fuzzy ART.
1906-1915
- Jenq-Shiou Leu, Cheng-Wei Tsai:
Practical design of a proxy agent to facilitate adaptive video streaming service across wired/wireless networks.
1916-1925
Volume 82,
Number 12,
December 2009
Regular Papers
- Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, Joan Borrell:
Full mobile agent interoperability in an IEEE-FIPA context.
1927-1940
- Mohammad S. Obaidat, Mukund Sundararajan:
New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation.
1941-1949
- Kam Hay Fung, Graham Cedric Low:
Methodology evaluation framework for dynamic evolution in composition-based distributed applications.
1950-1965
- Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:
A high capacity reversible data hiding scheme with edge prediction and difference expansion.
1966-1973
- Wei Wang, Xiangliang Zhang, Sylvain Gombault:
Constructing attribute weights from computer audit data for effective intrusion detection.
1974-1981
- Mahvish Khurum, Tony Gorschek:
A systematic review of domain analysis solutions for product lines.
1982-2003
- Juan Wang, Dan Feng, Fang Wang, Chengtao Lu:
MHS: A distributed metadata management strategy.
2004-2011
- Sunggeun Park, Sungwon Jung:
An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments.
2012-2022
- Chin-Hui Lai, Duen-Ren Liu:
Integrating knowledge flow mining and collaborative filtering to support document recommendation.
2023-2037
- Asil Oztekin, Alexander Nikov, Selim Zaim:
UWIS: An assessment methodology for usability of web-based information systems.
2038-2050
- Chung-Yang Chen, Pei-Chi Chen:
A holistic approach to managing software change impact.
2051-2067
- Frank Alexander Kraemer, Vidar Slåtten, Peter Herrmann:
Tool support for the rapid composition, analysis and implementation of reactive services.
2068-2080
- Yu-Fang Chung, Zhen Yu Wu:
Approach to designing bribery-free and coercion-free electronic voting scheme.
2081-2090
- C. Okan Özogul, E. Ertugrul Karsak, Ethem Tolga:
A real options approach for evaluation and justification of a hospital information system.
2091-2102
- Stylianos Zikos, Helen D. Karatza:
Communication cost effective scheduling policies of nonclairvoyant jobs with load balancing in a grid.
2103-2116
- Shuichi Shimizu, Raju Rangaswami, Hector A. Duran-Limon, Manuel Corona-Perez:
Platform-independent modeling and prediction of application resource usage characteristics.
2117-2127
Copyright © Fri Mar 12 17:30:37 2010
by Michael Ley (ley@uni-trier.de)