


default search action
IEE Proceedings - Software, Volume 153
Volume 153, Number 1, February 2006
- Keith H. Bennett, Michael Rigby, David Budgen

:
Editorial: Role based access control - a solution with its own challenges. 1-3 - Lindsay F. Marshall

:
Role-based access control in TOBIAS and NESS. 4-6 - Jim J. Longstaff, Mike A. Lockyer, A. Howitt:

Functionality and implementation issues for complex authorisation models. 7-15 - David M. Eyers

, Jean Bacon, Ken Moody:
OASIS role-based access control for electronic health records. 16-23 - Mark Turner, Pearl Brereton, David Budgen

:
Service-enabled access control for distributed data. 24-30 - Vladimir Stantchev

, Miroslaw Malek:
Architectural translucency in service-oriented architectures. 31-37 - Sunilkumar S. Manvi, Pallapa Venkataram:

Agent-based subsystem for multimedia communications. 38-48
Volume 153, Number 2, April 2006
- Alda Lopes Gançarski, Anne Doucet, Pedro Rangel Henriques

:
Attribute grammar-based interactive system to retrieve information from XML documents. 51-60 - Stan Jarzabek, Bo Yang

, S. Yoeun:
Addressing quality attributes in domain analysis for product lines. 61-73 - Arijit Mukhopadhyay, Sunandan Chakraborty, Monojit Choudhury, Anirban Lahiri, Soumyajit Dey, Anupam Basu:

Shruti: an embedded text-to-speech system for Indian languages. 75-79 - Ting-Wei Hou, Hsiang-Yang Chen, Ming-Hsiu Tsai:

Three control flow obfuscation methods for Java software. 80-86
Volume 153, Number 3, June 2006
- Oddur Benediktsson, Darren Dalcher

, Helgi Thorbergsson
:
Comparison of software development life cycles: a multiproject experiment. 87-101 - Jing Sun

, Jin Song Dong, Stan Jarzabek, Hai H. Wang:
Computer-aided dispatch system family architecture and verification: an integrated formal approach. 102-112 - Amnon H. Eden, Tom Mens

:
Measuring software flexibility. 113-125 - Toufik Taibi:

Formalising design patterns composition. 127-136
Volume 153, Number 4, August 2006
- Stephen Cook, Rachel Harrison, Paul Wernick:

Information system evolvability, feedback and pattern languages. 137-148 - Trevor Parsons, Adrian Mos

, John Murphy:
Non-intrusive end-to-end runtime path tracing for J2EE systems. 149-161 - Amnon H. Eden, Yoram Hirshfeld, Rick Kazman:

Abstraction classes in software design. 163-182
Volume 153, Number 5, October 2006
- Lucia Rapanotti, Jon G. Hall

, Zhi Li:
Deriving specifications from requirements through problem reduction. 183-198 - Yajuan Li, Chuang Lin, Quan-Lin Li, Zhiguang Shan:

Block-structured stochastic process algebra and its applications to queueing systems. 199-210
Volume 153, Number 6, December 2006
- Andrew Stone, Peter Sawyer:

Identifying tacit knowledge-based requirements. 211-218 - Hesham El-Sayed, M. Ahmed, Muhammad Jaseemuddin, Dorina C. Petriu

:
Framework for performance engineering of OSPF software. 219-229 - Joon-Sang Lee, Heung Seok Chae:

Domain-specific language approach to modelling UI architecture of mobile telephony systems. 231-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














