


default search action
Journal of Systems and Software (JSS), Volume 82
Volume 82, Number 1, January 2009
- Vittorio Cortellessa, Sebastián Uchitel

, Daniel Yankelevich:
Guest editorial. 1-2 - Steffen Becker, Heiko Koziolek, Ralf H. Reussner

:
The Palladio component model for model-driven performance prediction. 3-22 - Umar Farooq, Shikharesh Majumdar, Eric W. Parsons:

Achieving efficiency, quality of service and robustness in multi-organizational Grids. 23-38 - Vipul Mathur, Varsha Apte:

An overhead and resource contention aware analytical model for overloaded Web servers. 39-55 - C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:

Performance analysis of security aspects by weaving scenarios extracted from UML models. 56-74 - Lukas Pustina, Simon Schwarzer, Michael Gerharz, Peter Martini, Volker Deichmann:

A practical approach for performance-driven UML modelling of handheld devices - A case study. 75-88 - Daniel Lacks, Taskin Koçak

:
Developing reusable simulation core code for networking: The grid resource discovery example. 89-100 - David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:

A security policy language for wireless sensor networks. 101-111 - Mohamed Feredj, Frédéric Boulanger, Aimé Mokhoo Mbobi:

A model of domain-polymorph component for heterogeneous system design. 112-120 - Swapna S. Gokhale:

Model-based performance analysis using block coverage measurements. 121-130 - Navid Aghdaie, Yuval Tamir:

CoRAL: A transparent fault-tolerant web service. 131-143 - Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo

, Aloysius K. Mok:
An anomaly prevention approach for real-time task scheduling. 144-154 - Yong Joon Lee, Jun Wook Lee, Duckjin Chai, Buhyun Hwang, Keun Ho Ryu:

Mining temporal interval relational rules from temporal data. 155-167 - Patricia Lago, Henry Muccini

, Hans van Vliet:
A scoped approach to traceability management. 168-182
Volume 82, Number 2, February 2009
- Pierfrancesco Bellini

, Paolo Nesi
, Davide Rogai:
Expressing and organizing real-time specification patterns via temporal logics. 183-196 - Carles Garrigues

, Nikos Migas, William J. Buchanan
, Sergi Robles
, Joan Borrell
:
Protecting mobile agents from external replay attacks. 197-206 - Alfredo Capozucca

, Nicolas Guelfi, Patrizio Pelliccione
, Alexander B. Romanovsky
, Avelino Francisco Zorzo
:
Frameworks for designing and implementing dependable systems using Coordinated Atomic Actions: A comparative study. 207-228 - Sharon Ryan, Rory O'Connor

:
Development of a team measure for tacit knowledge in software development teams. 229-240 - Yan-Fu Li

, Min Xie
, T. N. Goh:
A study of project selection and feature weighting for analogy based software cost estimation. 241-252 - Silvia Abrahão

, Geert Poels
:
A family of experiments to evaluate a functional size measurement procedure for Web applications. 253-269 - Baoyuan Kang

, Colin Boyd, Ed Dawson
:
A novel identity-based strong designated verifier signature scheme. 270-273 - Konstantinos Tsakalozos, Vassilis Stoumpos, Kostas Saidis, Alex Delis:

Adaptive disk scheduling with workload-dependent anticipation intervals. 274-291 - Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:

Specifying behavioral semantics of UML diagrams through graph transformations. 292-306 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:

Comparative evaluation of contiguous allocation strategies on 3D mesh multicomputers. 307-318 - Jie Yang, Gang Huang, Wenhui Zhu, Xiaofeng Cui, Hong Mei:

Quality attribute tradeoff through adaptive architectures at runtime. 319-332 - Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, I-Lang Wu:

Exception handling refactorings: Directed by goals and driven by bug fixing. 333-345 - Wei Li, Dawu Gu, Yi Wang:

Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin. 346-354 - Damianos Gavalas

, George E. Tsekouras
, Christos Anagnostopoulos:
A mobile agent platform for distributed network and systems management. 355-371
Volume 82, Number 3, March 2009
- Marvin V. Zelkowitz:

An update to experimental models for validating computer technology. 373-376 - Xingwei Wang, Lei Guo, Xuetao Wei, Lan Pang, Tengfei Wu, Juan Du, Xuekui Wang:

A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks. 377-381 - Shi-Ming Huang, Chih-Fong Tsai, Po-Chun Huang:

Component-based software version management based on a Component-Interface Dependency Matrix. 382-399 - Hua Duan, Qingtian Zeng, Huaiqing Wang, Sherry X. Sun, Dongming Xu:

Classification and evaluation of timed running schemas for workflow based on process mining. 400-410 - Yung-Kuan Chan

, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method. 411-421 - Wing Kwong Chan

, Shing-Chi Cheung
, Jeffrey C. F. Ho
, T. H. Tse
:
PAT: A pattern classification approach to automatic reference oracles for the testing of mesh simplification programs. 422-434 - Magnus Eriksson, Jürgen Börstler

, Kjell Borg:
Managing requirements specifications for product lines - An approach and industry case study. 435-447 - Amjad Umar, Adalberto Zordan:

Reengineering for service oriented architectures: A strategic decision model for integration versus migration. 448-462 - Liguo Yu, Srini Ramaswamy:

An empirical approach to evaluating dependency locality in hierarchically structured software systems. 463-472 - Jason Liu

, Yue Li, Nathanael Van Vorst, Scott Mann, Keith Hellman:
A real-time network simulation infrastructure based on OpenVPN. 473-485 - Ramon Nou

, Samuel Kounev, Ferran Julià, Jordi Torres
:
Autonomic QoS control in enterprise Grid environments using online simulation. 486-502 - Jun-Ki Min, Jihyun Lee, Chin-Wan Chung:

An efficient XML encoding and labeling method for query processing and updating on dynamic XML data. 503-515 - Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh:

Search-order coding method with indicator-elimination property. 516-525 - Gregorio Bernabé

, José M. García, José González:
A lossy 3D wavelet transform for high-quality compression of medical video. 526-534 - Koji Ohishi, Hiroyuki Okamura

, Tadashi Dohi
:
Gompertz software reliability model: Estimation algorithm and empirical validation. 535-543
- Remco C. de Boer

, Hans van Vliet:
On the similarity between requirements and architecture. 544-550
Volume 82, Number 4, April 2009
- Hossein Saiedian

:
Software engineering challenges of the "Net" generation. 551-552 - Eric Ras

, Jörg Rech:
Using Wikis to support the Net Generation in improving knowledge acquisition in capstone projects. 553-562 - David S. Janzen, Jungwoo Ryoo

:
Engaging the net generation with evidence-based software engineering through a community-driven web database. 563-570 - Nancy R. Mead

:
Software engineering education: How far we've come and how far we have to go. 571-575 - Nenad Stankovic:

Single development project. 576-582 - Robert Wesley McGrew, Rayford B. Vaughn:

Discovering vulnerabilities in control system human-machine interface software. 583-589
- Christos Baloukas, José Luis Risco-Martín

, David Atienza
, Christophe Poucet, Lazaros Papadopoulos, Stylianos Mamagkakis, Dimitrios Soudris, José Ignacio Hidalgo, Francky Catthoor, Juan Lanchares:
Optimization methodology of dynamic data structures based on genetic algorithms for multimedia embedded systems. 590-602 - Anthony J. T. Lee, Ying-Ho Liu, Hsin-Mu Tsai

, Hsiu-Hui Lin, Huei-Wen Wu:
Mining frequent patterns in image databases with 9D-SPA representation. 603-618 - Myungryun Yoo:

Real-time task scheduling by multiobjective genetic algorithm. 619-628 - Rodrigo B. de Paes, Carlos José Pereira de Lucena, Gustavo R. de Carvalho, Donald D. Cowan:

An event-driven high level model for the specification of laws in open multi-agent systems. 629-642 - Feng Cao, Zhenfu Cao

:
An identity based universal designated verifier signature scheme secure in the standard model. 643-649 - Houn-Gee Chen, James J. Jiang, Gary Klein, Jengchung V. Chen

:
Reducing software requirement perception gaps through coordination mechanisms. 650-655 - Shuenn-Jyi Wang, Dah-Lih Jeng, Meng-Tsai Tsai:

Early fire detection method in video for vessels. 656-667 - Bram Adams

, Kris De Schutter, Andy Zaidman
, Serge Demeyer
, Herman Tromp, Wolfgang De Meuter:
Using aspect orientation in legacy environments for reverse engineering using dynamic analysis - An industrial experience report. 668-684 - Peng-Yeng Yin, Chin-Wen Liu:

A new relevance feedback technique for iconic image retrieval based on spatial relationships. 685-696 - Vincent S. Tseng, Eric Hsueh-Chan Lu

:
Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns. 697-706 - Ebrahim Bagheri

, Ali A. Ghorbani:
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models. 707-729 - Gerard Horgan, Souheil Khaddaj:

Use of an adaptable quality model approach in a production support environment. 730-738
Volume 82, Number 5, May 2009
- Karl Beecher, Andrea Capiluppi

, Cornelia Boldyreff:
Identifying exogenous drivers and evolutionary stages in FLOSS projects. 739-750 - Yan Li, Lu Zhang, Bing Xie, Jiasu Sun:

Refining component description by leveraging user query logs. 751-758 - Giuseppe Di Modica

, Orazio Tomarchio
, Lorenzo Vita:
Dynamic SLAs management in service oriented environments. 759-771 - Eleftherios Tiakas

, Apostolos Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic
, Slobodanka Djordjevic-Kajan:
Searching for similar trajectories in spatial networks. 772-788 - Lein Harn, Jian Ren, Changlu Lin:

Design of DL-based certificateless digital signatures. 789-793 - Zuhua Shao:

Improvement of identity-based proxy multi-signature scheme. 794-800 - James J. Jiang, Gary Klein, Shelly P. J. Wu, Ting-Peng Liang:

The relation of requirements uncertainty and stakeholder perception gaps to project management performance. 801-808 - Spyros Sioutas, Evangelos Sakkopoulos

, Christos Makris
, Bill Vassiliadis
, Athanasios K. Tsakalidis, Peter Triantafillou:
Dynamic Web Service discovery architecture based on a novel peer based overlay network. 809-824 - Siwoo Byun, Moonhaeng Huh:

An index management using CHC-cluster for flash memory databases. 825-835 - Patrik Berander, Mikael Svahnberg:

Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting. 836-850 - Diane Kelly:

Determining factors that affect long-term evolution in scientific application software. 851-861 - Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han:

A static API birthmark for Windows binary executables. 862-873 - Fernando Castor Filho

, Alexander B. Romanovsky
, Cecília M. F. Rubira
:
Improving reliability of cooperative concurrent systems with exception flow analysis. 874-890 - Vasileios Baousis

, Stathes Hadjiefthymiades
, George Alyfantis, Lazaros F. Merakos
:
Autonomous mobile agent routing for efficient server resource allocation. 891-906 - Ahmet Özmen

:
An entropy-based algorithm for data elimination in time-driven software instrumentation. 907-913
Volume 82, Number 6, June 2009
- W. Dai, H. Dominic Covvey, Paulo S. C. Alencar, Donald D. Cowan:

Lightweight query-based analysis of workflow process dependencies. 915-931 - Salah Sadou

, Hafedh Mili:
A delegation-based approach for the unanticipated dynamic evolution of distributed objects. 932-946 - Nikitas N. Karanikolas, Maria Nitsiou, Emmanuel J. Yannakoudakis, Christos Skourlas:

CUDL language semantics: Updating FDB data. 947-962 - Young Il Ko, Chang-Sup Park, In Chul Song, Myoung-Ho Kim:

An efficient void resolution method for geographic routing in wireless sensor networks. 963-973 - Tzong-Sun Wu, Han-Yu Lin:

Efficient self-certified proxy CAE scheme and its variants. 974-980 - Jie-Cherng Chen, Sun-Jen Huang:

An empirical analysis of the impact of software development problem factors on software maintainability. 981-992 - Teade Punter, René L. Krikhaar, Reinder J. Bril

:
Software engineering technology innovation - Turning research results into industrial success. 993-1003 - Wenbing Zhao:

Design and implementation of a Byzantine fault tolerance framework for Web services. 1004-1015 - Zhe-Ming Lu, Jun-Xiang Wang, Bei-Bei Liu:

An improved lossless data hiding scheme based on image VQ-index residual value coding. 1016-1024 - Su-Cheng Haw

, Chien-Sing Lee
:
Extending path summary and region encoding for efficient structural query processing in native XML databases. 1025-1035 - Matthew Chang, Chung Keung Poon

:
Using phrases as features in email classification. 1036-1045 - Jung-Yu Lai, Wei-Heng Chen:

Measuring e-business dependability: The employee perspective. 1046-1055
Volume 82, Number 7, July 2009
- Andrew R. Dalton, Jason O. Hallstrom:

nAIT: A source analysis and instrumentation framework for nesC. 1057-1072 - Joo Hyuk Jeon, Ki Yong Lee, Jae Soo Yoo, Myoung-Ho Kim:

HIPaG: An energy-efficient in-network join for distributed condition tables in sensor networks. 1073-1086 - Hyoung-Gon Lee, Namkyu Park, Han-Il Jeong, Jinwoo Park:

Grid enabled MRP process improvement under distributed database environment. 1087-1097 - Patricia Balbastre

, Ismael Ripoll
, Alfons Crespo
:
Period sensitivity analysis and D-P domain feasibility region in dynamic priority systems. 1098-1111 - P. Venkata Krishna

, Sudip Misra, Mohammad S. Obaidat
, Vankadara Saritha:
An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks. 1112-1124 - Laurent Thiry

, Bernard Thirion:
Functional metamodels for systems and software. 1125-1136 - Nathan DeBardeleben, Ron Sass, Daniel C. Stanzione Jr., Walter B. Ligon III:

Building problem-solving environments with the Arches framework. 1137-1151 - Sanghyun Yoo, Jin Hyun Son, Myoung-Ho Kim:

A scalable publish/subscribe system for large mobile ad hoc networks. 1152-1162 - Sangho Lee, Jong Kim, Sung Je Hong:

Security weakness of Tseng's fault-tolerant conference-key agreement protocol. 1163-1167 - Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:

Fair anonymous rewarding based on electronic cash. 1168-1176 - Andrea De Lucia

, Vincenzo Deufemia
, Carmine Gravino
, Michele Risi:
Design pattern recovery through visual language parsing and source code analysis. 1177-1193
Volume 82, Number 8, August 2009
- Muhammad Ali Babar, Patricia Lago:

Design decisions and design rationale in software architecture. 1195-1197 - Claudia A. López

, Pablo Inostroza, Luiz Marcio Cysneiros, Hernán Astudillo
:
Visualization and comparison of architecture rationale with semantic web technologies. 1198-1210 - Suntae Kim, Dae-Kyoo Kim

, Lunjin Lu, Sooyong Park:
Quality-driven architecture development using architectural tactics. 1211-1231 - Anton Jansen, Paris Avgeriou

, Jan Salvador van der Ven:
Enriching software architecture documentation. 1232-1248 - Olaf Zimmermann, Jana Koehler, Frank Leymann

, Ronny Polley, Nelly Schuster:
Managing architectural decision models with dependency relations, integrity constraints, and production rules. 1249-1267
- Jules White, Brian Dougherty, Douglas C. Schmidt:

Selecting highly optimal architectural feature sets with Filtered Cartesian Flattening. 1268-1284 - Georgia M. Kapitsaki

, George N. Prezerakos, Nikolaos D. Tselikas
, Iakovos S. Venieris:
Context-aware service engineering: A survey. 1285-1297 - Hyoungmin Park, Kyuseok Shim:

FAST: Flash-aware external sorting for mobile database systems. 1298-1312 - Wen-Chen Sun, Yi-Ming Chen:

On the design of an global intrusion tolerance network architecture against the internet catastrophes. 1313-1325 - Matjaz B. Juric, Ana Sasa, Bostjan Brumen

, Ivan Rozman:
WSDL and UDDI extensions for version support in web services. 1326-1343 - Yunpeng Chai, Zhihui Du

, Yinong Chen
:
A stepwise optimization algorithm of clustered streaming media servers. 1344-1361 - Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin

, Mingchu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation. 1362-1369
- W. Eric Wong, T. H. Tse

, Robert L. Glass, Victor R. Basili, Tsong Yueh Chen
:
An assessment of systems and software engineering scholars and institutions (2002-2006). 1370-1373
Volume 82, Number 9, September 2009
- W. Eric Wong, Aditya P. Mathur:

Editorial. 1375 - Zhenyu Zhang, Wing Kwong Chan

, T. H. Tse
, Heng Lu, Lijun Mei:
Resource prioritization of code optimization techniques for program synthesis of wireless sensor network applications. 1376-1387 - Lihua Duan, Jessica Chen:

Exploring alternatives for transition verification. 1388-1402 - Gordon Fraser, Franz Wotawa

, Paul Ammann:
Issues in using model checkers for test case generation. 1403-1418 - Tsong Yueh Chen

, Fei-Ching Kuo, Huai Liu
:
Adaptive random testing based on distribution metrics. 1419-1433
- Jenn-Wei Lin, Ming-Feng Yang:

Fault-tolerant design for wide-area Mobile IPv6 networks. 1434-1446 - Ki Yong Lee, Hyojun Kim, Kyoung-Gu Woo, Yon Dohn Chung, Myoung-Ho Kim:

Design and implementation of MLC NAND flash-based DBMS for mobile devices. 1447-1458 - Jordi Cabot

, Ernest Teniente:
Incremental integrity checking of UML/OCL conceptual schemas. 1459-1478 - Kai Petersen

, Claes Wohlin
:
A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case. 1479-1490 - Xingchang Liu, Xiaofan Yang, Min Xiang:

One-step t-fault diagnosis for hypermesh optical interconnection multiprocessor systems. 1491-1496 - Jen-Ho Yang, Chin-Chen Chang:

An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. 1497-1502 - Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng:

Trading decryption for speeding encryption in Rebalanced-RSA. 1503-1512 - Joan Arnedo-Moreno, Jordi Herrera-Joancomartí

:
A survey on security in JXTA applications. 1513-1525 - Chung-Ming Huang, Jianwei Li, I-Ting Tseng:

Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks. 1526-1539 - Steven D. Sheetz, David Henderson, Linda G. Wallace:

Understanding developer and manager perceptions of function points and source lines of code. 1540-1549 - Faith-Michael E. Uzoka, Tshepo Ndzinge:

Empirical analysis of biometric technology adoption and acceptance in Botswana. 1550-1564
Volume 82, Number 10, October 2009
- Carl K. Chang:

Introduction. 1565-1567 - Susan Ferreira, James S. Collofello, Dan L. Shunk, Gerald T. Mackulak:

Understanding the effects of requirements volatility in software engineering by using analytical modeling and software process simulation. 1568-1577 - Jeffrey J. P. Tsai, Alan Liu

:
Experience on knowledge-based software engineering: A logic-based requirements language and its industrial applications. 1578-1587 - Youngmann Kim, E. K. Park, Sungwoo Tak:

Dynamically reconfigurable hardware-software architecture for partitioning networking functions on the SoC platform. 1588-1599 - Ching-Huey Wang, Feng-Jian Wang:

Detecting artifact anomalies in business process specifications with a formal model. 1600-1619 - Yaw-Chung Chen, Wen-Kang Jia:

Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet. 1620-1626 - Pao-Ann Hsiung

, Shang-Wei Lin
, Yean-Ru Chen, Chun-Hsian Huang, Chihhsiong Shih, William C. Chu:
Modeling and verification of real-time embedded systems with urgency. 1627-1641 - Tegegne Marew, Joon-Sang Lee, Doo-Hwan Bae:

Tactics based approach for integrating non-functional requirements in object-oriented analysis and design. 1642-1656 - Sheikh Iqbal Ahamed, Haifeng Li, Nilothpal Talukder, Mehrab Monjur, Chowdhury Sharif Hasan:

Design and implementation of S-MARKS: A secure middleware for pervasive computing applications. 1657-1677
- Libor Waszniowski, Jan Krakora, Zdenek Hanzálek

:
Case study on distributed and fault tolerant system modeling based on timed automata. 1678-1694 - Sang-Uk Jeon, Jang-Eui Hong

, In-Gwon Song, Doo-Hwan Bae:
Developing platform specific model for MPSoC architecture from UML-based embedded software models. 1695-1708 - Jiexin Lian, Sol M. Shatz, Xudong He:

Flexible coordinator design for modeling resource sharing in multi-agent systems. 1709-1729 - Charlotte Hug, Agnès Front, Dominique Rieu, Brian Henderson-Sellers:

A method to build information systems engineering process metamodels. 1730-1742 - The Duc Kieu, Chin-Chen Chang:

A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. 1743-1752
Volume 82, Number 11, November 2009
- Mark Harman

, Zheng Li
, Phil McMinn, Jeff Offutt, John A. Clark:
TAIC PART 2007 and Mutation 2007 special issue editorial. 1753-1754 - Florence Charreteur, Bernard Botella, Arnaud Gotlieb:

Modelling dynamic memory management in constraint-based testing. 1755-1766 - Stefan Wappler, Joachim Wegener, André Baresel:

Evolutionary testing of software with function-assigned flags. 1767-1779 - Rui Abreu

, Peter Zoeteweij, Rob Golsteijn, Arjan J. C. van Gemund:
A practical evaluation of spectrum-based fault localization. 1780-1792 - David W. Binkley, Henry Feild, Dawn J. Lawrie

, Maurizio Pighin
:
Increasing diversity: Natural language measures for software fault prediction. 1793-1803 - Robert M. Hierons

, Mercedes G. Merayo:
Mutation testing from probabilistic and stochastic finite state machines. 1804-1818 - Ben H. Smith, Laurie A. Williams:

Should software testers use mutation analysis to augment a test set? 1819-1832
- Wien Hong, Tung-Shou Chen, Chih-Wei Shiu

:
Reversible data hiding for high quality images using modification of prediction errors. 1833-1842 - Seung Min Kim, Suk I. Yoo:

DOM tree browsing of a very large XML document: Design and implementation. 1843-1858 - Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare

, Anura P. Jayasumana:
A wireless sensor system for validation of real-time automatic calibration of groundwater transport models. 1859-1868 - Subhas Chandra Misra, Vinod Kumar, Uma Kumar

:
Identifying some important success factors in adopting agile software development practices. 1869-1890 - Santonu Sarkar

, Girish Maskeri Rama, Shubha Ramachandran:
Discovery of architectural layers and measurement of layering violations in source code. 1891-1905 - Chuan-Yu Chang, Hung-Jen Wang, Sheng-Wen Pan:

A robust DWT-based copyright verification scheme with Fuzzy ART. 1906-1915 - Jenq-Shiou Leu, Cheng-Wei Tsai:

Practical design of a proxy agent to facilitate adaptive video streaming service across wired/wireless networks. 1916-1925
Volume 82, Number 12, December 2009
- Jordi Cucurull-Juan, Ramon Martí

, Guillermo Navarro-Arribas
, Sergi Robles
, Joan Borrell
:
Full mobile agent interoperability in an IEEE-FIPA context. 1927-1940 - Mohammad S. Obaidat

, Mukund Sundararajan:
New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation. 1941-1949 - Kam Hay Fung, Graham Cedric Low:

Methodology evaluation framework for dynamic evolution in composition-based distributed applications. 1950-1965 - Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:

A high capacity reversible data hiding scheme with edge prediction and difference expansion. 1966-1973 - Wei Wang, Xiangliang Zhang, Sylvain Gombault:

Constructing attribute weights from computer audit data for effective intrusion detection. 1974-1981 - Mahvish Khurum, Tony Gorschek:

A systematic review of domain analysis solutions for product lines. 1982-2003 - Juan Wang, Dan Feng, Fang Wang, Chengtao Lu:

MHS: A distributed metadata management strategy. 2004-2011 - Sunggeun Park, Sungwon Jung

:
An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments. 2012-2022 - Chin-Hui Lai, Duen-Ren Liu:

Integrating knowledge flow mining and collaborative filtering to support document recommendation. 2023-2037 - Asil Oztekin, Alexander Nikov, Selim Zaim:

UWIS: An assessment methodology for usability of web-based information systems. 2038-2050 - Chung-Yang Chen

, Pei-Chi Chen:
A holistic approach to managing software change impact. 2051-2067 - Frank Alexander Kraemer, Vidar Slåtten, Peter Herrmann

:
Tool support for the rapid composition, analysis and implementation of reactive services. 2068-2080 - Yu-Fang Chung

, Zhen Yu Wu:
Approach to designing bribery-free and coercion-free electronic voting scheme. 2081-2090 - C. Okan Özogul, E. Ertugrul Karsak

, Ethem Tolga:
A real options approach for evaluation and justification of a hospital information system. 2091-2102 - Stylianos Zikos, Helen D. Karatza

:
Communication cost effective scheduling policies of nonclairvoyant jobs with load balancing in a grid. 2103-2116 - Shuichi Shimizu, Raju Rangaswami

, Hector A. Duran-Limon, Manuel Corona-Perez:
Platform-independent modeling and prediction of application resource usage characteristics. 2117-2127

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














