default search action
Journal of Systems and Software (JSS), Volume 83
Volume 83, Number 1, January 2010
- W. Eric Wong:
Editorial for the JSS Top Scholar Special Issue. 1 - Erik Arisholm, Lionel C. Briand, Eivind B. Johannessen:
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models. 2-17 - Zhao Li, Nasser Alaeddine, Jeff Tian:
Multi-faceted quality and defect measurement for web software and source contents. 18-28 - Magne Jørgensen, Torleif Halkjelsvik:
The effects of request formats on judgment-based effort estimation. 29-36 - Barbara A. Kitchenham:
What's up with software metrics? - A preliminary mapping study. 37-51 - Ioannis Stamelos:
Software project management anti-patterns. 52-59 - Tsong Yueh Chen, Fei-Ching Kuo, Robert G. Merkel, T. H. Tse:
Adaptive Random Testing: The ART of test case diversity. 60-66 - Jan Bosch, Petra Bosch-Sijtsema:
From integration to composition: On the impact of software product lines, global development and ecosystems. 67-76 - Shih-Chien Chou, Chun-Hao Huang:
An extended XACML model to ensure secure information access for web services. 77-84 - Jihyun Lee, Jeong-Hoon Park, Myung-Jae Park, Chin-Wan Chung, Jun-Ki Min:
An intelligent query processing for distributed ontologies. 85-95 - David W. Binkley, Mark Harman, Youssef Hassoun, Syed S. Islam, Zheng Li:
Assessing the impact of global variables on program dependence and dependence clusters. 96-107
- Leijun Huang, Sanjeev Setia, Robert Simon:
McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks. 108-120 - Ya-Shu Chen, Hsin-Liang Tsai, Shi-Wu Lo:
Multi-layer bus minimization for SoC. 121-132 - Henrik Bærbak Christensen, Klaus Marius Hansen:
An empirical investigation of architectural prototyping. 133-142 - Yinglong Ma, Beihong Jin, Yulin Feng:
Semantic oriented ontology cohesion metrics for ontology-based systems. 143-152 - Yanli Ren, Dawu Gu:
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles. 153-162 - Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen:
DoS-resistant ID-based password authentication scheme using smart cards. 163-172
Volume 83, Number 2, February 2010
- Xiaoqing (Frank) Liu, Carl K. Chang, Tsang Ming Jiang:
Computer software and applications. 173 - Zhenyu Zhang, Bo Jiang, W. K. Chan, T. H. Tse, Xinming Wang:
Fault localization through evaluation sequences. 174-187 - W. Eric Wong, Vidroha Debroy, Byoungju Choi:
A family of code coverage-based heuristics for effective fault localization. 188-208 - Ian Bayley, Hong Zhu:
Formal specification of the variants and behavioural features of design patterns. 209-221 - Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong:
Measuring behavioral dependency for improving change-proneness prediction in UML-based design models. 222-234 - Juncao Li, Nicholas T. Pilkington, Fei Xie, Qiang Liu:
Embedded architecture description language. 235-252 - Sheikh Iqbal Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, Nilothpal Talukder:
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. 253-270
- Jun-Ki Min, Chin-Wan Chung:
EDGES: Efficient data gathering in sensor networks using temporal and spatial correlations. 271-282 - Jordi Cabot, Robert Clarisó, Esther Guerra, Juan de Lara:
Verification and validation of declarative model-to-model transformations through invariants. 283-302 - Emal Nasseri, Steve Counsell, Martin J. Shepperd:
Class movement and re-location: An empirical study of Java inheritance evolution. 303-315 - Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A cocktail protocol with the Authentication and Key Agreement on the UMTS. 316-325 - Jameleddine Hassine, Juergen Rilling, Rachida Dssouli:
An evaluation of timed scenario notations. 326-350
Volume 83, Number 3, March 2010
- Hans van Vliet:
Reviewers are a sparse and precious resource. 351
- Antony Tang, Paris Avgeriou, Anton Jansen, Rafael Capilla, Muhammad Ali Babar:
A comparative study of architecture knowledge management tools. 352-370 - Pengcheng Zhang, Bixin Li, Lars Grunske:
Timed Property Sequence Chart. 371-390 - Nikolaos Tsantalis, Alexander Chatzigeorgiou:
Identification of refactoring opportunities introducing polymorphism. 391-404 - Shichao Zhang, Zhi Jin, Jingli Lu:
Summary queries for frequent itemsets mining. 405-411 - Imen Loulou, Mohamed Jmaiel, Khalil Drira, Ahmed Hadj Kacem:
P/S-CoM: Building correct by design Publish/Subscribe architectural styles with safe reconfiguration. 412-428 - Hyungsoo Jung, Hyuck Han, Heon Young Yeom, Sooyong Kang:
A fast and progressive algorithm for skyline queries with totally- and partially-ordered domains. 429-445 - Bas Boone, Sofie Van Hoecke, Gregory van Seghbroeck, Niels Joncheere, Viviane Jonckers, Filip De Turck, Chris Develder, Bart Dhoedt:
SALSA: QoS-aware load balancing for autonomous service brokering. 446-456 - Isaac Woungang, Guangyan Ma, Mieso K. Denko, Sudip Misra, Han-Chieh Chao, Mohammad S. Obaidat:
Survivable ATM mesh networks: Techniques and performance evaluation. 457-466 - David Vallejo, Javier Albusac, J. A. Mateos, Carlos Glez-Morcillo, Luis Jiménez:
A modern approach to multiagent development. 467-484 - Ayelet Israeli, Dror G. Feitelson:
The Linux kernel as a case study in software evolution. 485-501 - Chang-Ai Sun, Rowan Rossing, Marco Sinnema, Pavel Bulanov, Marco Aiello:
Modeling and managing the variability of Web service-based systems. 502-516 - Chin-Pan Huang, Chaur-Heh Hsieh, Ping Sheng Huang:
Progressive sharing for a secret image. 517-527
Volume 83, Number 4, April 2010
- Damian Cieslicki, Stefan Schäckeler, Thomas Schwarz:
Maintaining and checking parity in highly available Scalable Distributed Data Structures. 529-542 - Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto M. Hakala, Kaisa Nyberg:
A practical distinguisher for the Shannon cipher. 543-547 - Sumit Narayan, John A. Chandy:
ATTEST: ATTributes-based Extendable STorage. 548-556 - Antonio Chella, Massimo Cossentino, Salvatore Gaglio, Luca Sabatucci, Valeria Seidita:
Agent-oriented software patterns for rapid and affordable robot programming. 557-573 - Gregor Polancic, Marjan Hericko, Ivan Rozman:
An empirical examination of application frameworks success based on technology acceptance model. 574-584 - Luciano Bertini, Julius C. B. Leite, Daniel Mossé:
Power optimization for dynamic configuration in heterogeneous web server clusters. 585-598 - Jung-Sing Jwo, Yu Chin Cheng:
Pseudo software: A mediating instrument for modeling software requirements. 599-608 - Jenn-Wei Lin, Huang-Yu Liu:
Redirection based recovery for MPLS network systems. 609-620 - Nikolaos Mittas, Lefteris Angelis:
Visual comparison of software cost estimation models by regression error characteristic analysis. 621-637 - Wen-Shenq Juang:
RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings. 638-645 - Chin-Yu Huang, Jun-Ru Chang, Yung-Hsin Chang:
Design and analysis of GUI test-case prioritization using weight-based methods. 646-659 - Yuming Zhou, Baowen Xu, Hareton Leung:
On the ability of complexity metrics to predict fault-prone classes in object-oriented systems. 660-674 - Farooq Ahmad, Hejiao Huang, Xiaolong Wang:
Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources. 675-688 - Shin Yoo, Mark Harman:
Using hybrid algorithm for Pareto efficient multi-objective test suite minimisation. 689-701 - Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala:
An improved impossible differential cryptanalysis of Zodiac. 702-709 - Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare, Anura P. Jayasumana:
Corrigendum to "A wireless sensor system for validation of real-time automatic calibration of groundwater transport models" [J. Syst. Software 82 (2009) 1859-1868]. 710
Volume 83, Number 5, May 2010
- Ambra Molesini, Alessandro Garcia, Christina von Flach G. Chavez, Thaís Vasconcelos Batista:
Stability assessment of aspect-oriented software architectures: A quantitative study. 711-722 - Pengcheng Zhang, Henry Muccini, Bixin Li:
A classification and comparison of model checking software architecture techniques. 723-744 - Ageliki Tsioliaridou, Vassilis Tsaoussidis:
Fast convergence to network fairness. 745-762 - Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Trapdoor security in a searchable public-key encryption scheme with a designated tester. 763-771 - Meng Wang, Yi Wang, Duo Liu, Zhiwei Qin, Zili Shao:
Compiler-assisted leakage-aware loop scheduling for embedded VLIW DSP processors. 772-785 - Louis-Claude Canon, Olivier Dubuisson, Jens Gustedt, Emmanuel Jeannot:
Defining and controlling the heterogeneity of a cluster: The Wrekavoc tool. 786-802 - Hongyu Zhang, Yuan-Fang Li, Hee Beng Kuan Tan:
Measuring design complexity of semantic web ontologies. 803-814 - Chouki Tibermacine, Régis Fleurquin, Salah Sadou:
A family of languages for architecture constraint specification. 815-831 - Chin-Feng Lee, Hsing-Ling Chen:
A novel data hiding scheme based on modulus function. 832-843 - Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:
Differential fault analysis on Camellia. 844-851 - Sudip Misra, P. Dias Thomasinous:
A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks. 852-860 - Tzung-Her Chen, Jyun-Ci Huang:
A novel user-participating authentication scheme. 861-867 - Andre B. de Carvalho, Aurora T. R. Pozo, Silvia Regina Vergilio:
A symbolic fault-prediction model based on multiobjective particle swarm optimization. 868-882
Volume 83, Number 6, June 2010
- Rami Bahsoon, Licia Capra, Wolfgang Emmerich, Mohamed E. Fayad:
Special Issue on Software Architecture and Mobility. 883-884 - Nenad Medvidovic, George Edwards:
Software architecture and mobility: A roadmap. 885-898 - Michel Wermelinger, Arosha K. Bandara:
Commentary on 'Software architectures and mobility: A Roadmap'. 899-901 - Judith Bishop, Theo Danzfuss:
Computer supported cooperative work and "Software architectures and mobility: A Roadmap". 902-905 - Michele Sama, David S. Rosenblum, Zhimin Wang, Sebastian G. Elbaum:
Multi-layer faults in the architectures of mobile, context-aware adaptive applications. 906-914 - Andres Fortier, Gustavo Rossi, Silvia E. Gordillo, Cecilia Challiol:
Dealing with variability in context-aware mobile software. 915-936 - Nour Ali, Isidro Ramos, Carlos Solís:
Ambient-PRISMA: Ambients in mobile aspect-oriented software architecture. 937-958 - Carles Garrigues, Sergi Robles, Joan Borrell, Guillermo Navarro-Arribas:
Promoting the development of secure mobile agent applications. 959-971 - Sam Malek, George Edwards, Yuriy Brun, Hossein Tajalli, Joshua Garcia, Ivo Krka, Nenad Medvidovic, Marija Mikic-Rakic, Gaurav S. Sukhatme:
An architecture-driven software mobility framework. 972-989
- Xudong Lin, Ning Wang, De Xu, Xiaoning Zeng:
A novel XML keyword query approach using entity subtree. 990-1003 - Georgios L. Stavrinides, Helen D. Karatza:
Scheduling multiple task graphs with end-to-end deadlines in distributed real-time systems utilizing imprecise computations. 1004-1014 - Hung-Hsu Tsai, H.-C. Tseng, Y.-S. Lai:
Robust lossless image watermarking based on alpha-trimmed mean algorithm and support vector machine. 1015-1028 - Jun Gao, Jiaheng Lu, Tengjiao Wang, Dongqing Yang:
Efficient evaluation of query rewriting plan over materialized XML view. 1029-1038 - Magne Jørgensen:
Selection of strategies in judgment-based effort estimation. 1039-1050 - Alexandros Bartzas, Miguel Peón Quirós, Christophe Poucet, Christos Baloukas, Stylianos Mamagkakis, Francky Catthoor, Dimitrios Soudris, Jose Manuel Mendias:
Software metadata: Systematic characterization of the memory behaviour of dynamic applications. 1051-1075
Volume 83, Number 7, July 2010
- Birgit Geppert, Klaus Pohl:
Editorial for the JSS SPLC 2008 Special Issue. 1077 - André L. Santos, Kai Koskimies, Antónia Lopes:
Automating the construction of domain-specific modeling languages for object-oriented frameworks. 1078-1093 - Jules White, David Benavides, Douglas C. Schmidt, Pablo Trinidad, Brian Dougherty, Antonio Ruiz Cortés:
Automated diagnosis of feature model configurations. 1094-1107 - Deepak Dhungana, Paul Grünbacher, Rick Rabiser, Thomas Neumayer:
Structuring the modeling space and supporting evolution in software product line engineering. 1108-1122 - Jaejoon Lee, Dirk Muthig, Matthias Naab:
A feature-oriented approach for developing reusable product line assets of service-based systems. 1123-1136
- Tao Wang, Zhenxing Qin, Zhi Jin, Shichao Zhang:
Handling over-fitting in test cost-sensitive decision tree learning by feature selection, smoothing and pruning. 1137-1147 - Franco Cicirelli, Angelo Furfaro, Libero Nigro:
A service-based architecture for dynamically reconfigurable workflows. 1148-1164 - Perla Velasco Elizondo, Kung-Kiu Lau:
A catalogue of component connectors to support development with reuse. 1165-1178 - Vicente García-Díaz, Héctor Fernández-Fernández, Elías Palacios-González, B. Cristina Pelayo García-Bustelo, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle:
TALISMAN MDE: Mixing MDE principles. 1179-1191 - Can Basaran, Mehmet H. Suzer, Kyoung-Don Kang, Xue Liu:
Robust fuzzy CPU utilization control for dynamic workloads. 1192-1204 - Eduardo Miranda, Pierre Bourque:
Agile monitoring using the line of balance. 1205-1215 - Jung Soo Kim, David Garlan:
Analyzing architectural styles. 1216-1235 - Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, Chwei-Shyong Tsai:
A novel adaptive steganography based on local complexity and human vision sensitivity. 1236-1248 - Fotis E. Psomopoulos, Pericles A. Mitkas:
Bioinformatics algorithm development for Grid environments. 1249-1257 - Chris Andrzejczak, Dahai Liu:
The effect of testing location on usability testing performance, participant stress levels, and subjective testing experience. 1258-1266 - Jeong Hee Hwang, Keun Ho Ryu:
A weighted common structure based clustering technique for XML documents. 1267-1274 - Kai Petersen, Claes Wohlin:
Software process improvement through the Lean Measurement (SPI-LEAM) method. 1275-1287 - Veronica Montes De Oca, Daniel R. Jeske, Qi Zhang, Carlos Rendón, Mazda Marvasti:
A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance. 1288-1297
Volume 83, Number 8, August 2010
- Ahmed Yassin Al-Dubai, Geyong Min, Mohamed Ould-Khaoua, Xiaolong Jin, William J. Buchanan:
Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems. 1299-1300 - Xiao Chen, Jian Shen, Jie Wu:
Improving routing protocol performance in delay tolerant networks using extended information. 1301-1309 - Abbas Nayebi, Hamid Sarbazi-Azad, Gunnar Karlsson:
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks. 1310-1317 - Liang Zhao, Ahmed Yassin Al-Dubai, Geyong Min:
GLBM: A new QoS aware multicast scheme for wireless mesh networks. 1318-1326 - Mahmoud Moadeli, Wim Vanderbauwhede:
Communication modeling of multicast in all-port wormhole-routed NoCs. 1327-1336 - Jun Chen, Victor C. S. Lee, Kai Liu:
On the performance of real-time multi-item request scheduling in data broadcast environments. 1337-1345 - Zafeirios C. Papazachos, Helen D. Karatza:
Performance evaluation of bag of gangs scheduling in a heterogeneous distributed system. 1346-1354 - Aggeliki S. Prayati, Christos P. Antonopoulos, Tsenka Stoyanova, Christos Koulamas, George D. Papadopoulos:
A modeling approach on the TelosB WSN platform power consumption. 1355-1363 - Richard Werner Nelem Pazzi, Zhenxia Zhang, Azzedine Boukerche:
Design and evaluation of a novel MAC layer handoff protocol for IEEE 802.11 wireless networks. 1364-1372
- Ching-Wen Chen, Chuan-Chi Weng, Yu-Chen Kuo:
Signal strength based routing for power saving in mobile ad hoc networks. 1373-1386 - Robert Lagerström, Pontus Johnson, David Höök:
Architecture analysis of enterprise systems modifiability - Models, analysis, and validation. 1387-1403 - Marco Bernardo, Edoardo Bontà, Alessandro Aldini:
Handling communications in process algebraic architectural description languages: Modeling, verification, and implementation. 1404-1429 - Djamel Bennouar, Tahar Khammaci, Abderazzak Henni:
A new approach for component's port modeling in software architecture. 1430-1442 - Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system. 1443-1452