


default search action
17th SAC 2002: Madrid, Spain
- Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:

Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain. ACM 2002, ISBN 1-58113-445-2
A.I. and computational logic
- Stefano Bistarelli

, Thom W. Frühwirth, Michael Marte:
Soft constraint propagation and solving in CHRs. 1-5 - Grigoris Antoniou, M. Arief:

Executable declarative business rules and their use in electronic commerce. 6-10 - Manuel Alfonseca

, Juan de Lara:
Simulating evolutionary agent communities with OOCSMP. 11-15 - Han-joon Kim, Sang-goo Lee:

An effective document clustering method using user-adaptable distance metrics. 16-20
Agents, interactions, mobility and systems
- Henry Hexmoor, Justin Tyrel Vaughn:

Computational adjustable autonomy for NASA Personal Satellite Assistants. 21-26 - Chang-Hyun Jo, Allen J. Arnold:

The Agent-based Programming Language: APL. 27-31 - Lorenzo Bettini, Rocco De Nicola, Michele Loreti:

Software update via mobile agent based programming. 32-36 - Jorge J. Gómez-Sanz, Juan Pavón, Francisco J. Garijo:

Meta-models for building multi-agent systems. 37-41 - Bengt Carlsson, K. Ingemar Jönsson:

Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions. 42-48 - Susan Weissman Lauzac, Panos K. Chrysanthis

:
Personalizing information gathering for mobile database clients. 49-56 - Iadine Chades, Bruno Scherrer, François Charpillet:

A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem. 57-62 - Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Colin R. Reeves, Peter Smith:

An automated negotiation mechanism based on co-evolution and game theory. 63-67 - Hoang Pham Huy, Simone Sédillot:

Agent-based mobility add-in feature for Object Transaction Service (OTS). 68-75 - Hock Kim Tan, Luc Moreau

:
Certificates for mobile code security. 76-81 - Lucas C. Ferreira, Ricardo Dahab:

Blinded-key signatures: securing private keys embedded in mobile agents. 82-86 - Abhishek Singh, Santosh Pande

:
Compiler optimizations for Java aglets in distributed data intensive applications. 87-92 - Luc Moreau

:
A fault-tolerant directory service for mobile agents based on forwarding pointers. 93-100 - Frances M. T. Brazier, Benno J. Overeinder, Maarten van Steen, Niek J. E. Wijngaards:

Agent factory: generative migration of mobile agents in heterogeneous environments. 101-106 - Laurent Magnin, Viet Thang Pham, Arnaud Dury, Nicolas Besson, Arnaud Thiefaine:

Our guest agents are welcome to your agent platforms. 107-114 - Walter Binder

, Volker Roth:
Secure mobile agent systems using Java: where are we heading?. 115-119
Applications of spatial simulation of discrete entities
- William Maniatty, Boleslaw K. Szymanski:

Editorial message: special track on applications of spatial simulation of discrete entities. 120-121 - Christopher L. Barrett, Madhav V. Marathe, James P. Smith, S. S. Ravi:

A mobility and traffic generation framework for modeling and simulating ad hoc communication networks. 122-126 - Jacki P. Goldman, William J. Gullick, Dennis Bray, Colin G. Johnson

:
Individual-based simulation of the clustering behaviour of epidermal growth factor receptors. 127-131 - György Korniss, Mark A. Novotny, A. K. Kolakowska, Hasan Guclu:

Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations. 132-137 - Stephen G. Eubank:

Scalable, efficient epidemiological simulation. 139-145
Bioinformatics
- Warren T. Jones, Hasan M. Jamil

:
Bioinformatics track. 146 - Guoying Liu, Ann E. Loraine, Ron Shigeta, Melissa S. Cline, Jill Cheng, Stephen A. Chervitz, David Kulp, Michael A. Siani-Rose:

NetAffx: affymetrix probeset annotations. 147-150 - Rhonda Harrison, Charles DeLisi:

A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c.. 151-158 - Mathew J. Palakal, Snehasis Mukhopadhyay, Javed Mostafa:

An intelligent biological information management system. 159-163 - David Sankoff:

Short inversions and conserved gene clusters. 164-167 - Deendayal Dinakarpandian, Vijay Kumar:

BlOMIND-protein property prediction by property proximity profiles. 168-172 - Gianluca Della Vedova

, Todd Wareham:
Optimal algorithms for local vertex quartet cleaning. 173-177
Computational science
- Duy Huynh:

Slide Edge Algorithm. 178-183 - H. Martin Bücker, Arno Rasch:

Efficient derivative computations in neutron scattering via interface contraction. 184-188 - J. Pleite, Emilio Olías, Andrés Barrado, Antonio Lázaro

, J. Váquez:
A procedure to model the frequency response. 189-193
Computer security
- Giampaolo Bella, Ronaldo Menezes, James A. Whittaker:

Editorial Message: special track on computer security. 194-195 - Shouhuai Xu, Ravi S. Sandhu:

Authenticated multicast immune to denial-of-service attack. 196-200 - Christopher Krügel, Thomas Toth, Engin Kirda:

Service specific anomaly detection for network intrusion detection. 201-208 - Alexandr Seleznyov, Oleksiy Mazhelis:

Learning temporal patterns for anomaly intrusion detection. 209-213 - Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel:

Implementation of fast RSA key generation on smart cards. 214-220 - Abhishek Singh, André L. M. dos Santos:

Grammar based off line generation of disposable credit card numbers. 221-228 - Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco:

Checking security of Java bytecode by abstract interpretation. 229-236 - Larry A. Dunning, Sub Ramakrishnan:

Security status display and browser interframe communication. 237-241 - James A. Whittaker, Andres De Vivanco:

Neutralizing windows-based malicious mobile code. 242-246 - Giampaolo Bella:

Interactive simulation of security policies. 247-252 - Jan Steffan, Markus Schumacher:

Collaborative attack modeling. 253-259 - Herbert H. Thompson, James A. Whittaker, Florence E. Mottay:

Software security vulnerability testing in hostile environments. 260-264 - Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest:

Proxy-based security protocols in networked mobile devices. 265-272 - Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch:

A conceptual framework for testing biometric algorithms within operating systems' authentication. 273-280 - Michele Boreale, Maria Grazia Buscemi:

Experimenting with STA, a tool for automatic analysis of security protocols. 281-285
Coordination models, languages and applications
- Andrea Omicini, Sascha Ossowski:

Editorial message: special track on coordination models, languages and applications. 286-287 - Sherief Abdallah

, Nevin M. Darwish, Osman Hegazy:
Monitoring and synchronization for teamwork in GPGP. 288-293 - Paul Davidsson, Fredrik Wernstedt:

A multi-agent system architecture for coordination of just-in-time production and distribution. 294-299 - Elth Ogston, Stamatis Vassiliadis:

Unstructured agent matchmaking: experiments in timing and fuzzy matching. 300-305 - Anthony Karageorgos, Simon G. Thompson, Nikolay Mehandjiev:

Semi-automatic design of agent organisations. 306-313 - Neal Sample, Dorothea Beringer, Gio Wiederhold:

A comprehensive model for arbitrary result extraction. 314-321 - Guangxin Yang:

A uniform meta-model for modeling integrated cooperation. 322-328 - Jinlei Jiang, Guangxin Yang, Yan Wu, Meilin Shi:

CovaTM: a transaction model for cooperative applications. 329-335 - Paolo Ciancarini, Robert Tolksdorf, Franco Zambonelli:

Coordination middleware for XML-centric applications. 336-343 - Philipp Obreiter, Guntram Gräf:

Towards scalability in tuple spaces. 344-350 - Jozef Hooman, Jaco van de Pol:

Formal verification of replication on a distributed data space architecture. 351-358 - Nadia Busi, Gianluigi Zavattaro:

On the serializability of transactions in shared dataspaces with temporary data. 359-366 - Federico Bergenti, Alessandro Ricci

:
Three approaches to the coordination of multiagent systems. 367-372 - Lorenzo Bettini, Michele Loreti, Rosario Pugliese:

An infrastructure language for open nets. 373-377 - José Antonio Pérez, Rafael Corchuelo, David Ruiz

, Miguel Toro:
An enablement detection algorithm for open multiparty interactions. 378-384 - Ludger Fiege, Gero Mühl, Felix C. Gärtner:

A modular approach to build structured event-based systems. 385-392 - F. H. Carvalho, Ricardo Massa Ferreira Lima, Rafael Dueire Lins:

Coordinating functional processes with Haskell#. 393-400
Database and digital library technologies
- Ramzi A. Haraty

, Mohammad Zubair:
Database and digital library technologies: track chairs message. 401 - Kjetil Nørvåg

:
Temporal query operators in XML databases. 402-406 - Albrecht Schmidt, Martin L. Kersten:

Bulkloading and maintaining XML documents. 407-412 - Qiang Ding, Qin Ding, William Perrizo:

Decision tree classification of spatial data streams using Peano Count Trees. 413-417 - Jon Olav Hauglid, Roger Midtstraum:

SESAM: searching supported by analysis of metadata. 418-425 - Qin Ding, Maleq Khan, Amalendu Roy, William Perrizo:

The P-tree algebra. 426-431 - Fernando Ferri, Elaheh Pourabbas, Maurizio Rafanelli:

The syntactic and semantic correctness of pictorial configurations to query geographic databases by PQL. 432-437 - Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Tae-Hoon Kim:

Shape-based retrieval of similar subsequences in time-series databases. 438-445 - Brajendra Panda, Kazi Asharful Haque:

Extended data dependency approach: a robust way of rebuilding database. 446-452 - Maria Cláudia Cavalcanti

, Marta Mattoso, Maria Luiza Machado Campos, François Llirbat, Eric Simon:
Sharing scientific models in environmental applications. 453-457 - Ramzi A. Haraty

, Mazen Hamdoun:
Iterative querying in web-based database applications. 458-462 - Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine:

Elicitation and conversion of hidden objects and restrictions in a database schema. 463-469 - Zaher Aghbari, Kunihiko Kaneko, Akifumi Makinouchi:

Topological mapping: a dimensionality reduction method for efficient video search. 470-475 - M. Mercedes Martínez

, Jean-Claude Derniame, Pablo de la Fuente:
A method for the dynamic generation of virtual versions of evolving documents. 476-482 - Jeffrey T. Clark, Brian M. Slator, Aaron Bergstrom, Francis Larson, Richard Frovarp, James E. Landrum, William Perrizo, William Jockheck:

DANA (Digital Archive Network for Anthropology): a model for digital archiving. 483-487 - Cláudio de Souza Baptista:

A geolibrary for multimedia data sets: design and implementation issues. 488-492 - Kurt Maly, Mohammad Zubair, Srikanth Balusani, A. Mathur, S. Sudeep, W. Wolters:

DL-COTF: an XML based digital library for U. S. Navy's operational test and evaluation force. 493-497
Declarative data mining
- José Luis Álvarez Macías, Jacinto Mata Vázquez

, José Cristóbal Riquelme Santos:
Mining interesting regions using an evolutionary algorithm. 498-502 - Jae-Woo Chang, Du-Seok Jin:

A new cell-based clustering method for large, high-dimensional data in data mining applications. 503-507 - Ingolf Geist:

A framework for data mining and KDD. 508-513 - Hui Wang, Ivo Düntsch

, Günther Gediga, Andrzej Skowron:
Hyperrelations in version space. 514-518
Electronics books for technical learning
- Monica Landoni

, Ignacio Aedo:
Editorial message: special track on electronic books for teaching and learning. 519 - François Bry, Michael Kraus:

Advanced modeling and browsing of technical documents. 520-524 - Ruth Cobos, Xavier Alamán:

From collective knowledge to e-books. 525-529 - Ruth Wilson:

The "look and feel" of an ebook: considerations in interface design. 530-534 - Won-Sung Sohn, Seung-Kyu Ko, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Hyuk Kim, Soon-Bum Lim:

Development of a standard format for eBooks. 535-540
Evolutionary computing and optimization
- Roger L. Wainwright, Günther R. Raidl:

Evolutionary computation and optimization track: SAC 2002. 541 - Sergiy Butenko, Panos M. Pardalos, Ivan Sergienko, Vladimir Shylo, Petro Stetsyuk:

Finding maximum independent sets in graphs arising from coding theory. 542-546 - Bryant A. Julstrom, Günther R. Raidl:

Initialization is robust in evolutionary algorithms that encode spanning trees as sets of edges. 547-552 - Brad Dolin, Forrest H. Bennett III, Eleanor Gilbert Rieffel:

Co-evolving an effective fitness sample: experiments in symbolic regression and distributed robot control. 553-559 - Haibing Li, Andrew Lim:

Local search with annealing-like restarts to solve the vehicle routing problem with time windows. 560-565 - George Nyauma Nyakoe, Makoto Ohki, Suichiro Tabuchi:

Acquisition of modulation pulses for a multi-robot system using genetic algorithm. 568-573 - Steve Hurley, Roger M. Whitaker:

An agent based approach to site selection for wireless networks. 574-577 - Nelishia Pillay:

Using genetic programming for the induction of novice procedural programming solution algorithms. 578-583 - Atila Neves, Osvaldo Brasão, Agostinho C. Rosa:

Learning the risk board game with classifier systems. 585-589 - Jacinto Mata Vázquez

, José Luis Álvarez Macías, José Cristóbal Riquelme Santos:
An evolutionary algorithm to discover numeric association rules. 590-594 - David A. van Veldhuizen, Jesse B. Zydallis, Gary B. Lamont:

Issues in parallelizing multiobjective evolutionary algorithms for real world applications. 595-602 - Konstantinos E. Parsopoulos, Michael N. Vrahatis:

Particle swarm optimization method in multiobjective problems. 603-607 - Fulvio Corno

, Matteo Sonza Reorda
, Giovanni Squillero
:
An evolutionary algorithm for reducing integrated-circuit test application time. 608-612
Information access and retrieval
- Fabio Crestani, Gabriella Pasi

:
Editorial message: special track on information access and retrieval systems. 613-614 - José María Gómez Hidalgo:

Evaluating cost-sensitive Unsolicited Bulk Email categorization. 615-620 - Andreas Becks, Christian Seeling, Ralf Minkenberg:

Benefits of document maps for text access in knowledge management: a comparative study. 621-626 - David L. Chan, Robert W. P. Luk, W. K. Mak, Hong Va Leong

, Edward Kei Shiu Ho, Qin Lu:
Multiple related document summary and navigation using concept hierarchies for mobile clients. 627-632 - Simon O. Sweeney, Fabio Crestani, Anastasios Tombros:

Mobile delivery of news using hierarchical query-biased summaries. 634-639 - Mohand Boughanem, Mohamed Tmar:

Incremental adaptive filtering: profile learning and threshold calibration. 640-644 - Hideo Joho, Claire Coverson

, Mark Sanderson, Micheline Hancock-Beaulieu:
Hierarchical presentation of expansion terms. 645-649 - Peter J. Brown, Gareth J. F. Jones:

Exploiting contextual change in context-aware retrieval. 650-656 - Holger Billhardt

, Daniel Borrajo, Victor Maojo:
Using genetic algorithms to find suboptimal retrieval expert combinations. 657-662 - Evangelos Kotsakis:

Structured information retrieval in XML documents. 663-667 - Seung-Kyu Ko, Yoon-Chul Choy:

A structured documents retrieval method supporting attribute-based structure information. 668-674 - Gloria Bordogna, Gabriella Pasi:

Flexible querying of WEB documents. 675-680 - Satoshi Watanabe, Takao Miura:

Reordering B-tree files. 681-686 - Mario A. Nascimento, Vishal Chitkara:

Color-based image retrieval using binary signatures. 687-692 - Daniela Stan, Ishwar K. Sethi:

Color patterns for pictorial content description. 693-698 - Patrick Ruch:

Information retrieval and spelling correction: an inquiry into lexical disambiguation. 699-703
Inter disciplinary approaches to the design of dependable computer systems
- John E. Dobson, Cliff B. Jones, Rob Procter, Mark Rouncefield, Robin Williams:

Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems. 704-705 - Massimo Felici, Juliana Küster Filipe:

Limits in modelling evolving computer-based systems. 706-710 - Mark-Alexander Sujan, Antonio Rizzo, Alberto Pasquini:

Contradictions and critical issues during system evolution. 711-715 - Corin A. Gurr, Gillian Hardstone:

Modelling organisational practice in user requirements. 716-720 - Neil Pollock, James Cornford:

Fitting standard software to non-standard organisations. 721-725 - Luciana D'Adderio:

Configuring software, reconfiguring memories: the influence of integrated systems on knowledge storage, retrieval and reuse. 726-731 - Denis Besnard, Anthony Thomas Lawrie:

Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse. 732-738 - Shamus P. Smith, Michael D. Harrison:

Augmenting descriptive scenario analysis for improvements in human reliability design. 739-743 - Salem Aljareh, B. Nick Rossiter:

A task-based security model to facilitate collaboration in trusted multi-agency networks. 744-749
Multimedia and visualization
- Chung-Ming Huang, Tz-Heng Hsu, Chi-Kuang Chang:

A proxy-based adaptive flow control scheme for media streaming. 750-754 - Sooyong Kang, Heon Young Yeom:

Smoothed fetching: bridging the data layout and transmission schemes in multimedia servers. 755-760 - Alfred Yu, Wael M. Badawy:

A mesh update requirement for hierarchical adaptive meshes in mesh-based motion tracking. 761-765 - Yongjian Fu, Jui-Che Teng, S. R. Subramanya:

Node splitting algorithms in tree-structured high-dimensional indexes for similarity search. 766-770 - Fernando Naharro-Berrocal, Cristóbal Pareja-Flores, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide:

Approaches to comprehension-preserving graphical reduction of program visualizations. 771-777 - Jess Y. S. Mak, Hong Va Leong

, Alvin T. S. Chan:
Dynamic structuring of web information for access visualization. 778-784 - Andrzej Trembilski, Andreas Broßler:

Transparency for polygon based cloud rendering. 785-790 - José Martinez, Erwan Loisant:

Browsing image databases with Galois' lattices. 791-795 - Mingjun Zhang, Chaman L. Sabharwal:

An efficient implementation of parametric line and polygon clipping algorithm. 796-800
Neuro-fuzzy applications
- Stamatis Karnouskos

, Athanasios V. Vasilakos
:
Active electronic mail. 801-806 - Patrick Bosc, Laurence Duval, Olivier Pivert:

About possibilistic queries against possibilistic databases. 807-811 - Rafael Alcalá, Jorge Casillas, Oscar Cordón, Francisco Herrera, Igor Zwir:

Hybridizing Hierarchical and Weighted Linguistic Rules. 812-816
Parallel and distributed systems and networking
- Indhira Garcés, Daniel Franco:

Analysis of Distributed Routing Balancing behavior. 817-824 - Alireza Shahrabi, Mohamed Ould-Khaoua, Lewis M. Mackenzie:

Communication delay in wormhole-routed torus networks. 825-829 - Jehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua:

Probability vectors: a new fault-tolerant routing algorithm for k-ary n-cubes. 830-834 - Hamid Sarbazi-Azad, Mohamed Ould-Khaoua:

A simple mathematical model of adaptive routing in wormhole k-ary n-cubes. 835-839 - Ahmed Yassin Al-Dubai

, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Towards a scalable broadcast in wormhole-switched mesh networks. 840-844 - Hiroshi Fujimoto, Tadashi Nakano, Kaname Harumoto, Shojiro Nishio:

Response order rearrangement on a caching proxy for reducing WWW latency. 845-851 - Wooi-Ghee Wang, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio:

AODV compatible routing with extensive use of cache information in ad-hoc networks. 852-859 - Jung-Sheng Fu, Gen-Huey Chen:

Cycle embedding in faulty hierarchical cubic networks. 860-864 - Chun-Hsi Huang:

Grid-enabled parallel divide-and-conquer: theory and practice. 865-869 - Eder N. Mathias, Celso Maciel da Costa, Fernando Luís Dotti, Felipe Martins Müller:

DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methods. 870-875 - Georgios I. Goumas, Maria Athanasaki, Nectarios Koziris:

Automatic code generation for executing tiled nested loops onto parallel architectures. 876-881 - Heinz Stockinger

, Andrew Hanushevsky:
HTTP redirection for replica catalogue lookups in data grids. 882-889 - Brian F. Cooper, Neal Sample, Moshe Shadmon:

A parallel index for semistructured data. 890-896 - Franck Morvan, Abdelkader Hameurlain:

Dynamic memory allocation strategies for parallel query execution. 897-901 - Dirk Thißen:

Load balancing for the management of service performance in open service markets: a customer-oriented approach. 902-906 - Juan Touriño

, Jacobo Barro, Ramon Doallo, Víctor M. Gulías:
Performance analysis of MPI-I/O primitives on a PC cluster. 907-912 - Sunghyun Jee, Kannappan Palaniappan:

Performance evaluation for a compressed-VLIW processor. 913-917 - B. Anthony Kadrovach, Gary B. Lamont:

A particle swarm model for swarm-based networked sensor systems. 918-924
Programming languages and object technologies
- Chang-Hyun Jo, Rajeev R. Raje:

Editorial message: special track on the programming languages and object technologies. 925-926 - Robert Tolksdorf, Kai Knubben:

Programming distributed systems with the delegation-based object-oriented language dSelf. 927-931 - Beum-Seuk Lee, Barrett R. Bryant:

Automated conversion from requirements documentation to an object-oriented formal specification language. 932-936 - Ian Nunn, Dwight Deugo:

Automated assembly of software components based on XML-coded instructions. 937-942 - Enis Avdicausevic, Marjan Mernik, Mitja Lenic, Viljem Zumer:

Experimental aspect-oriented language - AspectCOOL. 943-947 - Claudia Leopold:

On optimal temporal locality of stencil codes. SAC 2002: 948-952 - Kameswari V. Garigipati, Cindy Norris:

Evaluating the use of profiling by a region-based register allocator. 953-957 - João Coelho Garcia, Paulo Ferreira:

Concurrency control for distributed cooperative engineering applications. 958-963 - Nael B. Abu-Ghazaleh, Dhananjay S. Phatak:

Verification caching: towards efficient and secure mobile code execution environments. 964-968
Software engineering: theory, application and practice
- David C. Rine, James F. Power, J. Paul Gibson

:
ACM SAC2002 software engineering: theory and applications (SETA) track description. 969-970 - Hisham Haddad, Herbert Tesser:

Reusable subsystems: domain-based approach. 971-975 - Paul Young, Valdis Berzins, Jun Ge, Luqi:

Using an object oriented model for resolving representational differences between heterogeneous systems. 976-983 - Assem El-Ansary:

Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events. 984-991 - Mahmoud O. Elish, David C. Rine, Joel E. Foreman:

Evaluating collaborative software in supporting organizational learning with Bayesian Networks. 992-996 - Fatma Dandashi:

A method for assessing the reusability of object-oriented code using a validated set of automated measurements. 997-1003 - Seok Won Lee:

Proxy Viewpoints Model-based Requirements engineering. 1004-1008 - Jan Jürjens:

A UML statecharts semantics with message-passing. 1009-1013 - Sergiu Dascalu, Peter Hitchcock:

An approach to integrating semi-formal and formal notations in software specification. 1014-1020 - María-del-Mar Gallardo, Jesús Martínez, Pedro Merino, Estefanía Rosales:

Using XML to implement abstraction for Model Checking. 1021-1025 - Jan Jürjens:

Using UMLsec and goal trees for secure systems development. 1026-1030 - Derek Lawson, Gerry Coleman:

Investigating software measures to improve product reliability. 1031-1035 - Rory O'Connor

, Gerry Coleman:
Strategies for personal process improvement a comparison. 1036-1040
Standardization in IT
- Kai Jakobs:

Editorial message: special track on standardisation in IT. 1041-1042 - Luis Martín Díaz, Erik Wüstner, Peter Buxmann:

Inter-organizational document exchange: facing the conversion problem with XML. 1043-1047 - Eva Söderström:

Standardising the business vocabulary of standards. 1048-1052 - Ken Krechmer:

Cathedrals, libraries and bazaars. 1053-1057
Virtual reality, digital media, and computer games
- Daniel Ballin, Ruth Aylett, Marc Cavazza:

Editorial message: special track on virtual reality, digital media, and computer games. 1058-1059 - Taku Komura, Atsushi Kuroda, Yoshihisa Shinagawa:

NiceMeetVR: facing professional baseball pitchers in the virtual batting cage. 1060-1065 - Marco Roccetti, Vittorio Ghini, Paola Salomoni, Alessandro Gambetti, Davide Melandri, Mirko Piaggesi, Daniela Salsi:

The structuring of a wireless internet application for a music-on-demand service on UMST devices. 1066-1073 - Kikuo Asai, Noritaka Osawa, Yuji Y. Sugimoto, Yoshiaki Tanaka:

Viewpoint motion control by body position in immersive projection display. 1074-1079 - Marc Cavazza, Fred Charles, Steven J. Mead:

Emergent situations in interactive storytelling. 1080-1085
Web and e-business application
- Sara Comai, Letizia Tanca:

Editorial message: special track on web and E-business applications. 1086-1087 - Sabrina De Capitani di Vimercati:

An authorization model for temporal XML documents. 1088-1093 - Petri Vuorimaa, Teemu Ropponen, Niklas von Knorring, Mikko Honkala:

A Java based XML browser for consumer devices. 1094-1099 - Ljiljana Stojanovic

, Nenad Stojanovic, Raphael Volz:
Migrating data-intensive web sites into the Semantic Web. 1100-1107 - Valter Crescenzi, Giansalvatore Mecca, Paolo Merialdo:

Wrapping-oriented classification of web pages. 1108-1112 - Uwe Zdun:

Dynamically generating web application fragments from page templates. 1113-1120 - Volker Turau:

A framework for automatic generation of web-based data entry applications based on XML. 1121-1126 - Danilo Ardagna, Chiara Francalanci:

A cost-oriented methodology for the design of web based IT architectures. 1127-1133 - Mon-Yen Luo, Chu-Sing Yang, Chun-Wei Tseng:

Content management on server farm with layer-7 routing. 1134-1139 - Tadashi Nakano, Kaname Harumoto, Shinji Shimojo, Shojiro Nishio:

User adaptive content delivery mechanism on the world wide web. 1140-1146 - Min Wang, Xiaoyang Sean Wang:

Optimizing relational store for e-catalog queries: a data mining approach. 1147-1152 - Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zaslavsky:

Application run time estimation: a quality of service metric for web-based data mining services. 1153-1159 - Victoria Ungureanu:

An agreement centric access control mechanism for business to business e-commerce. 1160-1164

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














