


default search action
Journal of Systems and Software (JSS), Volume 83
Volume 83, Number 1, January 2010
- W. Eric Wong:

Editorial for the JSS Top Scholar Special Issue. 1 - Erik Arisholm, Lionel C. Briand, Eivind B. Johannessen:

A systematic and comprehensive investigation of methods to build and evaluate fault prediction models. 2-17 - Zhao Li, Nasser Alaeddine, Jeff Tian:

Multi-faceted quality and defect measurement for web software and source contents. 18-28 - Magne Jørgensen, Torleif Halkjelsvik:

The effects of request formats on judgment-based effort estimation. 29-36 - Barbara A. Kitchenham

:
What's up with software metrics? - A preliminary mapping study. 37-51 - Ioannis Stamelos:

Software project management anti-patterns. 52-59 - Tsong Yueh Chen

, Fei-Ching Kuo, Robert G. Merkel
, T. H. Tse
:
Adaptive Random Testing: The ART of test case diversity. 60-66 - Jan Bosch, Petra Bosch-Sijtsema

:
From integration to composition: On the impact of software product lines, global development and ecosystems. 67-76 - Shih-Chien Chou, Chun-Hao Huang:

An extended XACML model to ensure secure information access for web services. 77-84 - Jihyun Lee, Jeong-Hoon Park, Myung-Jae Park, Chin-Wan Chung, Jun-Ki Min:

An intelligent query processing for distributed ontologies. 85-95 - David W. Binkley, Mark Harman

, Youssef Hassoun, Syed S. Islam, Zheng Li
:
Assessing the impact of global variables on program dependence and dependence clusters. 96-107
- Leijun Huang, Sanjeev Setia, Robert Simon:

McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks. 108-120 - Ya-Shu Chen, Hsin-Liang Tsai, Shi-Wu Lo:

Multi-layer bus minimization for SoC. 121-132 - Henrik Bærbak Christensen, Klaus Marius Hansen:

An empirical investigation of architectural prototyping. 133-142 - Yinglong Ma

, Beihong Jin, Yulin Feng:
Semantic oriented ontology cohesion metrics for ontology-based systems. 143-152 - Yanli Ren, Dawu Gu:

CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles. 153-162 - Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen:

DoS-resistant ID-based password authentication scheme using smart cards. 163-172
Volume 83, Number 2, February 2010
- Xiaoqing (Frank) Liu, Carl K. Chang, Tsang Ming Jiang:

Computer software and applications. 173 - Zhenyu Zhang, Bo Jiang, W. K. Chan

, T. H. Tse
, Xinming Wang:
Fault localization through evaluation sequences. 174-187 - W. Eric Wong, Vidroha Debroy, Byoungju Choi:

A family of code coverage-based heuristics for effective fault localization. 188-208 - Ian Bayley, Hong Zhu:

Formal specification of the variants and behavioural features of design patterns. 209-221 - Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong

:
Measuring behavioral dependency for improving change-proneness prediction in UML-based design models. 222-234 - Juncao Li, Nicholas T. Pilkington, Fei Xie, Qiang Liu:

Embedded architecture description language. 235-252 - Sheikh Iqbal Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, Nilothpal Talukder:

Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. 253-270
- Jun-Ki Min, Chin-Wan Chung:

EDGES: Efficient data gathering in sensor networks using temporal and spatial correlations. 271-282 - Jordi Cabot

, Robert Clarisó
, Esther Guerra
, Juan de Lara
:
Verification and validation of declarative model-to-model transformations through invariants. 283-302 - Emal Nasseri, Steve Counsell, Martin J. Shepperd

:
Class movement and re-location: An empirical study of Java inheritance evolution. 303-315 - Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:

A cocktail protocol with the Authentication and Key Agreement on the UMTS. 316-325 - Jameleddine Hassine

, Juergen Rilling, Rachida Dssouli:
An evaluation of timed scenario notations. 326-350
Volume 83, Number 3, March 2010
- Hans van Vliet:

Reviewers are a sparse and precious resource. 351
- Antony Tang

, Paris Avgeriou
, Anton Jansen, Rafael Capilla
, Muhammad Ali Babar:
A comparative study of architecture knowledge management tools. 352-370 - Pengcheng Zhang, Bixin Li, Lars Grunske

:
Timed Property Sequence Chart. 371-390 - Nikolaos Tsantalis

, Alexander Chatzigeorgiou:
Identification of refactoring opportunities introducing polymorphism. 391-404 - Shichao Zhang, Zhi Jin, Jingli Lu:

Summary queries for frequent itemsets mining. 405-411 - Imen Loulou, Mohamed Jmaiel, Khalil Drira, Ahmed Hadj Kacem:

P/S-CoM: Building correct by design Publish/Subscribe architectural styles with safe reconfiguration. 412-428 - Hyungsoo Jung, Hyuck Han, Heon Young Yeom, Sooyong Kang:

A fast and progressive algorithm for skyline queries with totally- and partially-ordered domains. 429-445 - Bas Boone, Sofie Van Hoecke, Gregory van Seghbroeck

, Niels Joncheere
, Viviane Jonckers
, Filip De Turck
, Chris Develder
, Bart Dhoedt:
SALSA: QoS-aware load balancing for autonomous service brokering. 446-456 - Isaac Woungang, Guangyan Ma, Mieso K. Denko, Sudip Misra, Han-Chieh Chao

, Mohammad S. Obaidat
:
Survivable ATM mesh networks: Techniques and performance evaluation. 457-466 - David Vallejo

, Javier Albusac, J. A. Mateos, Carlos Glez-Morcillo
, Luis Jiménez
:
A modern approach to multiagent development. 467-484 - Ayelet Israeli

, Dror G. Feitelson
:
The Linux kernel as a case study in software evolution. 485-501 - Chang-Ai Sun, Rowan Rossing, Marco Sinnema, Pavel Bulanov, Marco Aiello:

Modeling and managing the variability of Web service-based systems. 502-516 - Chin-Pan Huang, Chaur-Heh Hsieh, Ping Sheng Huang:

Progressive sharing for a secret image. 517-527
Volume 83, Number 4, April 2010
- Damian Cieslicki, Stefan Schäckeler, Thomas Schwarz:

Maintaining and checking parity in highly available Scalable Distributed Data Structures. 529-542 - Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto M. Hakala, Kaisa Nyberg

:
A practical distinguisher for the Shannon cipher. 543-547 - Sumit Narayan, John A. Chandy

:
ATTEST: ATTributes-based Extendable STorage. 548-556 - Antonio Chella

, Massimo Cossentino
, Salvatore Gaglio, Luca Sabatucci
, Valeria Seidita:
Agent-oriented software patterns for rapid and affordable robot programming. 557-573 - Gregor Polancic, Marjan Hericko, Ivan Rozman:

An empirical examination of application frameworks success based on technology acceptance model. 574-584 - Luciano Bertini, Julius C. B. Leite, Daniel Mossé:

Power optimization for dynamic configuration in heterogeneous web server clusters. 585-598 - Jung-Sing Jwo

, Yu Chin Cheng:
Pseudo software: A mediating instrument for modeling software requirements. 599-608 - Jenn-Wei Lin, Huang-Yu Liu:

Redirection based recovery for MPLS network systems. 609-620 - Nikolaos Mittas

, Lefteris Angelis:
Visual comparison of software cost estimation models by regression error characteristic analysis. 621-637 - Wen-Shenq Juang:

RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings. 638-645 - Chin-Yu Huang, Jun-Ru Chang, Yung-Hsin Chang:

Design and analysis of GUI test-case prioritization using weight-based methods. 646-659 - Yuming Zhou, Baowen Xu

, Hareton Leung
:
On the ability of complexity metrics to predict fault-prone classes in object-oriented systems. 660-674 - Farooq Ahmad, Hejiao Huang, Xiaolong Wang:

Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources. 675-688 - Shin Yoo, Mark Harman

:
Using hybrid algorithm for Pareto efficient multi-objective test suite minimisation. 689-701 - Mohsen Shakiba, Mohammad Dakhilalian

, Hamid Mala:
An improved impossible differential cryptanalysis of Zodiac. 702-709 - Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare

, Anura P. Jayasumana:
Corrigendum to "A wireless sensor system for validation of real-time automatic calibration of groundwater transport models" [J. Syst. Software 82 (2009) 1859-1868]. 710
Volume 83, Number 5, May 2010
- Ambra Molesini, Alessandro Garcia, Christina von Flach G. Chavez

, Thaís Vasconcelos Batista
:
Stability assessment of aspect-oriented software architectures: A quantitative study. 711-722 - Pengcheng Zhang, Henry Muccini

, Bixin Li:
A classification and comparison of model checking software architecture techniques. 723-744 - Ageliki Tsioliaridou, Vassilis Tsaoussidis

:
Fast convergence to network fairness. 745-762 - Hyun Sook Rhee, Jong Hwan Park, Willy Susilo

, Dong Hoon Lee:
Trapdoor security in a searchable public-key encryption scheme with a designated tester. 763-771 - Meng Wang, Yi Wang

, Duo Liu, Zhiwei Qin, Zili Shao
:
Compiler-assisted leakage-aware loop scheduling for embedded VLIW DSP processors. 772-785 - Louis-Claude Canon, Olivier Dubuisson, Jens Gustedt

, Emmanuel Jeannot:
Defining and controlling the heterogeneity of a cluster: The Wrekavoc tool. 786-802 - Hongyu Zhang

, Yuan-Fang Li
, Hee Beng Kuan Tan:
Measuring design complexity of semantic web ontologies. 803-814 - Chouki Tibermacine, Régis Fleurquin, Salah Sadou

:
A family of languages for architecture constraint specification. 815-831 - Chin-Feng Lee, Hsing-Ling Chen:

A novel data hiding scheme based on modulus function. 832-843 - Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:

Differential fault analysis on Camellia. 844-851 - Sudip Misra, P. Dias Thomasinous:

A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks. 852-860 - Tzung-Her Chen

, Jyun-Ci Huang:
A novel user-participating authentication scheme. 861-867 - Andre B. de Carvalho, Aurora T. R. Pozo

, Silvia Regina Vergilio:
A symbolic fault-prediction model based on multiobjective particle swarm optimization. 868-882
Volume 83, Number 6, June 2010
- Rami Bahsoon, Licia Capra, Wolfgang Emmerich, Mohamed E. Fayad:

Special Issue on Software Architecture and Mobility. 883-884 - Nenad Medvidovic, George Edwards:

Software architecture and mobility: A roadmap. 885-898 - Michel Wermelinger, Arosha K. Bandara

:
Commentary on 'Software architectures and mobility: A Roadmap'. 899-901 - Judith Bishop, Theo Danzfuss:

Computer supported cooperative work and "Software architectures and mobility: A Roadmap". 902-905 - Michele Sama, David S. Rosenblum, Zhimin Wang, Sebastian G. Elbaum:

Multi-layer faults in the architectures of mobile, context-aware adaptive applications. 906-914 - Andres Fortier, Gustavo Rossi

, Silvia E. Gordillo, Cecilia Challiol
:
Dealing with variability in context-aware mobile software. 915-936 - Nour Ali

, Isidro Ramos, Carlos Solís:
Ambient-PRISMA: Ambients in mobile aspect-oriented software architecture. 937-958 - Carles Garrigues

, Sergi Robles
, Joan Borrell
, Guillermo Navarro-Arribas
:
Promoting the development of secure mobile agent applications. 959-971 - Sam Malek, George Edwards, Yuriy Brun

, Hossein Tajalli, Joshua Garcia, Ivo Krka, Nenad Medvidovic, Marija Mikic-Rakic, Gaurav S. Sukhatme:
An architecture-driven software mobility framework. 972-989
- Xudong Lin, Ning Wang

, De Xu, Xiaoning Zeng:
A novel XML keyword query approach using entity subtree. 990-1003 - Georgios L. Stavrinides

, Helen D. Karatza
:
Scheduling multiple task graphs with end-to-end deadlines in distributed real-time systems utilizing imprecise computations. 1004-1014 - Hung-Hsu Tsai

, H.-C. Tseng, Y.-S. Lai:
Robust lossless image watermarking based on alpha-trimmed mean algorithm and support vector machine. 1015-1028 - Jun Gao, Jiaheng Lu

, Tengjiao Wang, Dongqing Yang:
Efficient evaluation of query rewriting plan over materialized XML view. 1029-1038 - Magne Jørgensen:

Selection of strategies in judgment-based effort estimation. 1039-1050 - Alexandros Bartzas, Miguel Peón-Quirós, Christophe Poucet, Christos Baloukas, Stylianos Mamagkakis, Francky Catthoor, Dimitrios Soudris, Jose Manuel Mendias:

Software metadata: Systematic characterization of the memory behaviour of dynamic applications. 1051-1075
Volume 83, Number 7, July 2010
- Birgit Geppert, Klaus Pohl:

Editorial for the JSS SPLC 2008 Special Issue. 1077 - André L. Santos

, Kai Koskimies, Antónia Lopes
:
Automating the construction of domain-specific modeling languages for object-oriented frameworks. 1078-1093 - Jules White, David Benavides

, Douglas C. Schmidt, Pablo Trinidad
, Brian Dougherty, Antonio Ruiz Cortés
:
Automated diagnosis of feature model configurations. 1094-1107 - Deepak Dhungana

, Paul Grünbacher
, Rick Rabiser
, Thomas Neumayer:
Structuring the modeling space and supporting evolution in software product line engineering. 1108-1122 - Jaejoon Lee

, Dirk Muthig, Matthias Naab:
A feature-oriented approach for developing reusable product line assets of service-based systems. 1123-1136
- Tao Wang, Zhenxing Qin, Zhi Jin, Shichao Zhang:

Handling over-fitting in test cost-sensitive decision tree learning by feature selection, smoothing and pruning. 1137-1147 - Franco Cicirelli, Angelo Furfaro

, Libero Nigro:
A service-based architecture for dynamically reconfigurable workflows. 1148-1164 - Perla Velasco Elizondo

, Kung-Kiu Lau:
A catalogue of component connectors to support development with reuse. 1165-1178 - Vicente García-Díaz

, Héctor Fernández-Fernández, Elías Palacios-González
, B. Cristina Pelayo García-Bustelo
, Oscar Sanjuán Martínez
, Juan Manuel Cueva Lovelle
:
TALISMAN MDE: Mixing MDE principles. 1179-1191 - Can Basaran, Mehmet H. Suzer

, Kyoung-Don Kang, Xue Liu:
Robust fuzzy CPU utilization control for dynamic workloads. 1192-1204 - Eduardo Miranda, Pierre Bourque:

Agile monitoring using the line of balance. 1205-1215 - Jung Soo Kim, David Garlan:

Analyzing architectural styles. 1216-1235 - Der-Chyuan Lou

, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, Chwei-Shyong Tsai:
A novel adaptive steganography based on local complexity and human vision sensitivity. 1236-1248 - Fotis E. Psomopoulos

, Pericles A. Mitkas:
Bioinformatics algorithm development for Grid environments. 1249-1257 - Chris Andrzejczak, Dahai Liu:

The effect of testing location on usability testing performance, participant stress levels, and subjective testing experience. 1258-1266 - Jeong Hee Hwang, Keun Ho Ryu:

A weighted common structure based clustering technique for XML documents. 1267-1274 - Kai Petersen

, Claes Wohlin
:
Software process improvement through the Lean Measurement (SPI-LEAM) method. 1275-1287 - Veronica Montes De Oca, Daniel R. Jeske, Qi Zhang, Carlos Rendón, Mazda Marvasti:

A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance. 1288-1297
Volume 83, Number 8, August 2010
- Ahmed Yassin Al-Dubai

, Geyong Min, Mohamed Ould-Khaoua, Xiaolong Jin, William J. Buchanan
:
Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems. 1299-1300 - Xiao Chen, Jian Shen, Jie Wu:

Improving routing protocol performance in delay tolerant networks using extended information. 1301-1309 - Abbas Nayebi, Hamid Sarbazi-Azad, Gunnar Karlsson

:
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks. 1310-1317 - Liang Zhao

, Ahmed Yassin Al-Dubai
, Geyong Min:
GLBM: A new QoS aware multicast scheme for wireless mesh networks. 1318-1326 - Mahmoud Moadeli, Wim Vanderbauwhede:

Communication modeling of multicast in all-port wormhole-routed NoCs. 1327-1336 - Jun Chen, Victor C. S. Lee

, Kai Liu:
On the performance of real-time multi-item request scheduling in data broadcast environments. 1337-1345 - Zafeirios C. Papazachos, Helen D. Karatza

:
Performance evaluation of bag of gangs scheduling in a heterogeneous distributed system. 1346-1354 - Aggeliki S. Prayati, Christos P. Antonopoulos, Tsenka Stoyanova, Christos Koulamas

, George D. Papadopoulos:
A modeling approach on the TelosB WSN platform power consumption. 1355-1363 - Richard Werner Nelem Pazzi

, Zhenxia Zhang, Azzedine Boukerche:
Design and evaluation of a novel MAC layer handoff protocol for IEEE 802.11 wireless networks. 1364-1372
- Ching-Wen Chen, Chuan-Chi Weng, Yu-Chen Kuo:

Signal strength based routing for power saving in mobile ad hoc networks. 1373-1386 - Robert Lagerström

, Pontus Johnson
, David Höök:
Architecture analysis of enterprise systems modifiability - Models, analysis, and validation. 1387-1403 - Marco Bernardo

, Edoardo Bontà, Alessandro Aldini
:
Handling communications in process algebraic architectural description languages: Modeling, verification, and implementation. 1404-1429 - Djamel Bennouar

, Tahar Khammaci, Abderazzak Henni:
A new approach for component's port modeling in software architecture. 1430-1442 - Chengqing Li

, Shujun Li
, Kwok-Tung Lo, Kyandoghere Kyamakya:
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system. 1443-1452 - Erast Athanasiadis, Sarandis Mitropoulos:

A distributed platform for personalized advertising in digital interactive TV environments. 1453-1469 - Hong Peng, Jun Wang, Weixing Wang:

Image watermarking method in multiwavelet domain based on support vector machines. 1470-1477 - Victor M. Ruiz Penichet

, María Dolores Lozano
, José A. Gallud
, Ricardo Tesoriero
:
Requirement-based approach for groupware environments design. 1478-1488 - Rossella Fortuna, Luigi Alfredo Grieco, Gennaro Boggia, Pietro Camarda:

Quality adaptive end-to-end packet scheduling to avoid playout interruptions in Internet video streaming systems. 1489-1499 - Young Jin Jung, Keun Ho Ryu, Moon Sun Shin, Silvia Nittel:

Historical index structure for reducing insertion and search cost in LBS. 1500-1511 - Danilo Ardagna

, Raffaela Mirandola
:
Per-flow optimal service selection for Web services based processes. 1512-1523 - Asaf Shabtai, Uri Kanonov, Yuval Elovici:

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. 1524-1537 - Ching-Hong Tsai, Kuo-Chan Huang, Feng-Jian Wang, Chun-Hao Chen:

A distributed server architecture supporting dynamic resource provisioning for BPM-oriented workflow management systems. 1538-1552
Volume 83, Number 9, September 2010
- Michael Grottke

, Doo-Hwan Bae, Bjørn Axel Gran:
Introduction to the special issue. 1553-1554 - Kishor S. Trivedi, Sachin Garg:

In Memoriam: Dr. Chandra Kintala. 1555 - Gabriella Carrozza, Domenico Cotroneo, Roberto Natella

, Antonio Pecchia, Stefano Russo
:
Memory leak analysis of mission-critical middleware. 1556-1567 - Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker:

Methods and opportunities for rejuvenation in aging distributed software systems. 1568-1578 - Felix Salfner, Katinka Wolter:

Analysis of service availability for time-triggered rejuvenation policies. 1579-1590 - Hiroyuki Okamura

, Tadashi Dohi
:
Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system. 1591-1604 - Martin Kropik, Monika Jurickova:

Software for protection system of VR-1 training reactor. 1605-1611 - Jang-Soo Lee, Vikash Katta, Eunkyoung Jee, Christian Raspotnig:

Means-ends and whole-part traceability analysis of safety requirements. 1612-1621 - Siv Hilde Houmb, Virginia N. L. Franqueira

, Erlend Agoy Engum:
Quantifying security risk level from CVSS estimates of frequency and impact. 1622-1634
Volume 83, Number 10, October 2010
- Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:

Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. 1635-1643 - Mohamed Alnas, Irfan Awan, Robert Holton:

Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information. 1644-1650 - Hongbing Wang, Zuling Kang, Ning Zhou, Li Li:

A model checker for WS-CDL. 1651-1661 - Francisco J. Pino

, Oscar Pedreira
, Félix García
, Miguel Rodríguez Luaces
, Mario Piattini
:
Using Scrum to guide the execution of software process improvement in small organizations. 1662-1677 - Dexuan Zou, Liqun Gao, Steven Li, Jianhua Wu, Xin Wang:

A novel global harmony search algorithm for task assignment problem. 1678-1688 - Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung:

A novel DRM framework for peer-to-peer music content delivery. 1689-1700 - Vagelis Hristidis

, Shu-Ching Chen, Tao Li, Steven Luis
, Yi Deng:
Survey of data management and analysis in disaster situations. 1701-1714 - Anja Keskinarkaus, Anu Pramila, Tapio Seppänen:

Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks. 1715-1725 - Yuzhu Li

, Kuo-Chung Chang, Houn-Gee Chen, James J. Jiang:
Software development team flexibility antecedents. 1726-1734 - Neil B. Harrison, Paris Avgeriou

:
How do architecture patterns and tactics interact? A model and annotation. 1735-1758 - Jacqueline Floch, Cyril Carrez, Pawel Cieslak, Michal Rój, Richard Torbjørn Sanders, Mazen Malek Shiaa:

A comprehensive engineering framework for guaranteeing component compatibility. 1759-1779 - Neeraj Suri

, Arshad Jhumka, Martin Hiller, András Pataricza
, Shariful Islam, Constantin Sârbu:
A software integration approach for designing and assessing dependable embedded systems. 1780-1800 - Xin Liao

, Qiao-Yan Wen, Ying Sun, Jie Zhang:
Multi-party covert communication with steganography and quantum secret sharing. 1801-1804 - Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu:

Using quad smoothness to efficiently control capacity-distortion of reversible data hiding. 1805-1812 - Aniello Castiglione

, Alfredo De Santis
, Claudio Soriente
:
Security and privacy issues in the Portable Document Format. 1813-1822 - Gyu Sang Choi, Chita R. Das:

A Superscalar software architecture model for Multi-Core Processors (MCPs). 1823-1837 - Wenpin Jiao, Yanchun Sun, Hong Mei:

Automated assembly of Internet-scale software systems involving autonomous agents. 1838-1850 - Shuigeng Zhou, Ming Xu, Jihong Guan:

LESSON: A system for lecture notes searching and sharing over Internet. 1851-1863 - Chin-Feng Lee, Hsing-Ling Chen, Hao-Kuan Tso:

Embedding capacity raising in reversible data hiding based on prediction of difference expansion. 1864-1872 - Kyung-Ah Shim:

An ID-based aggregate signature scheme with constant pairing computations. 1873-1880 - Alberto Avritzer, Daniel J. Paulish, Yuanfang Cai, Kanwarpreet Sethi:

Coordination implications of software architecture in a global software development project. 1881-1895 - Richard Kennard, John Leaney

:
Towards a general purpose architecture for UI generation. 1896-1906 - Evgenia Egorova, Marco Torchiano

, Maurizio Morisio:
Actual vs. perceived effect of software engineering practices in the Italian industry. 1907-1916 - Morteza Nikooghadam

, Ali Zakerolhosseini, Mohsen Ebrahimi Moghaddam:
Efficient utilization of elliptic curve cryptosystem for hierarchical access control. 1917-1929 - Vu Thi Hong Nhan, Namkyu Park, Yang Koo Lee, Yongmi Lee, Jong Yun Lee, Keun Ho Ryu:

Online discovery of Heart Rate Variability patterns in mobile healthcare services. 1930-1940 - Jose L. Salmeron

, Cristina López-Vargas
:
A multicriteria approach for risks assessment in ERP maintenance. 1941-1953 - Bas van der Raadt, Marc Bonnet, Sander Schouten, Hans van Vliet:

The relation between EA effectiveness and stakeholder satisfaction. 1954-1969 - Oscar Díaz

, Felipe M. Villoria:
Generating blogs out of product catalogues: An MDE approach. 1970-1982 - Hai Jin, Yaqin Luo, Li Qi, Jie Dai, Song Wu:

Dependency-aware maintenance for highly available service-oriented grid. 1983-1994 - Gyrd Brændeland, Atle Refsdal, Ketil Stølen:

Modular analysis and modelling of risk scenarios with dependencies. 1995-2013
Volume 83, Number 11, November 2010
- Silvia Abrahão

, Natalia Juristo Juzgado, Effie Lai-Chong Law, Jan Stage:
Interplay between usability and software development. 2015-2018 - Asbjørn Følstad, Kasper Hornbæk

:
Work-domain knowledge in usability evaluation: Experiences with Cooperative Usability Testing. 2019-2030 - Bettina Biel, Thomas Grill, Volker Gruhn:

Exploring the benefits of the combination of a software architecture analysis and a usability evaluation of a mobile application. 2031-2044 - Anirudha N. Joshi

, Nandlal L. Sarda, Sanjay Tripathi:
Measuring effectiveness of HCI integration in software development processes. 2045-2058 - Jeff Winter

, Kari Rönkkö:
SPI success factors within product usability evaluation. 2059-2072
- Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen, Mingchu Li:

An encoding method for both image compression and data lossless information hiding. 2073-2082 - Santi Caballé

, Fatos Xhafa
:
CLPL: Providing software infrastructure for the systematic and effective construction of complex collaborative learning systems. 2083-2097 - Ajit Appari

, Michel Benaroch:
Monetary pricing of software development risks: A method and empirical illustration. 2098-2107 - Nelis Boucké, Danny Weyns

, Tom Holvoet
:
Composition of architectural models: Empirical analysis and language support. 2108-2127 - Sune Dueholm Müller

, Lars Mathiassen, Hans Henrik Balshøj:
Software Process Improvement as organizational change: A metaphorical analysis of the literature. 2128-2146 - Hossein Rahmani, Mohammad Mehdi Faghih

, Mohsen Ebrahimi Moghaddam:
A new real time disk-scheduling method based on GSR algorithm. 2147-2164 - Qinma Kang, Hong He, Hui-Min Song, Rong Deng:

Task allocation for maximizing reliability of distributed computing systems using honeybee mating optimization. 2165-2174 - Jarmo J. Ahonen, Paula Savolainen

:
Software engineering projects may fail before they are started: Post-mortem analysis of five cancelled projects. 2175-2187 - Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat

, Pushkar Gupta, Karan Verma, Prayag Narula:
An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. 2188-2199 - Evangelos Sakkopoulos

, Dimitris Antoniou, Poulia Adamopoulou, Nikos Tsirakis, Athanasios K. Tsakalidis:
A web personalizing technique using adaptive data structures: The case of bursts in web visits. 2200-2210 - Hataichanok Unphon, Yvonne Dittrich

:
Software architecture awareness in long-term software product evolution. 2211-2226 - Fu-Hau Hsu, Cheng-Hsien Huang, Chi-Hsien Hsu, Chih-Wen Ou, Li-Han Chen, Ping-Cheng Chiu:

HSP: A solution against heap sprays. 2227-2236 - Davur S. Clementsen, Zhen He

:
Vertical partitioning for flash and HDD database systems. 2237-2250 - Vahid Garousi

, Tan Varma:
A replicated survey of software testing practices in the Canadian province of Alberta: What has changed from 2004 to 2009? 2251-2262 - Nuo Li, Tao Xie, Maozhong Jin, Chao Liu:

Perturbation-based user-input-validation testing of web applications. 2263-2274 - Michael English, Jim Buckley

, Tony Cahill:
A replicated and refined empirical study of the use of friends in C++ software. 2275-2286 - Kholekile L. Gwebu

, Jing Wang
:
Seeing eye to eye? An exploratory study of free open source software users' perceptions. 2287-2296 - Jianjie Zhao, Dawu Gu:

Provably secure authenticated key exchange protocol under the CDH assumption. 2297-2304 - Mark Keil, ChongWoo Park

:
Bad news reporting on troubled IT projects: Reassessing the mediating role of responsibility in the basic whistleblowing model. 2305-2316 - JunSeong Kim, JongSu Yi:

A pattern-based prediction: An empirical approach to predict end-to-end network latency. 2317-2321 - Mohammed F. M. Ali, Mohammed Issam Younis

, Kamal Zuhairi Zamli, Widad Ismail:
Development of Java based RFID application programmable interface for heterogeneous RFID system. 2322-2331 - Yan-Fu Li

, Min Xie
, Thong Ngee Goh:
Adaptive ridge regression system for software cost estimating on multi-collinear datasets. 2332-2343 - Amir A. Khwaja

, Joseph E. Urban:
A property based specification formalism classification. 2344-2362
- Orit Hazzan, Uri Leron:

Disciplined and free-spirited: 'Time-out behaviour' at the Agile conference. 2363-2365
Volume 83, Number 12, December 2010
- Leonardo Bottaci, Gregory M. Kapfhammer, Neil Walkinshaw

:
TAIC-PART 2009 - Testing: Academic & Industrial Conference - Practice And Research Techniques: Special Section Editorial. 2367-2368 - Daniel Hoffman, Hong-Yi Wang, Mitch Chang, David Ly-Gagnon, Lewis Sobotkiewicz, Paul A. Strooper

:
Two case studies in grammar-based test generation. 2369-2378 - Kiran Lakhotia, Phil McMinn, Mark Harman

:
An empirical investigation into branch coverage for C programs using CUTE and AUSTIN. 2379-2391 - Abel Marrero Pérez, Stefan Kaiser:

Bottom-up reuse for multi-level testing. 2392-2415 - William B. Langdon, Mark Harman

, Yue Jia:
Efficient multi-objective higher order mutation testing with genetic programming. 2416-2430
- Heeyoul Kim, Younho Lee

, Yongsu Park:
A robust and flexible digital rights management system for home networks. 2431-2440 - James A. Miller, Remo Ferrari, Nazim H. Madhavji:

An exploratory study of architectural effects on requirements decisions. 2441-2455 - Thareendhra Wijayasiriwardhane

, Richard Lai:
Component Point: A system-level size measure for Component-Based Software Systems. 2456-2470 - Constantinos Marios Angelopoulos

, Sotiris E. Nikoletseas:
Accelerated collection of sensor data by mobility-enabled topology ranks. 2471-2477 - Jong-Yih Kuo, Fu-Chu Huang:

Code analyzer for an online course management system. 2478-2486 - S. R. Kannan, A. Sathya, S. Ramathilagam, R. Devi:

Novel segmentation algorithm in segmenting medical images. 2487-2495 - Muhammad Irfan Ullah, Günther Ruhe, Vahid Garousi

:
Decision support for moving from a single product to a product portfolio in evolving software systems. 2496-2512 - Sam Malek, Harshini Ramnath Krishnan, Jayalakshmi Srinivasan:

Enhancing middleware support for architecture-based development through compositional weaving of styles. 2513-2527 - Hui-Lung Lee, Chia-Feng Lee, Ling-Hwei Chen:

A perfect maze based steganographic method. 2528-2535 - Lin-Huang Chang, Chun-Hui Sung, Shih-Yi Chiu, Yen-Wen Lin:

Design and realization of ad-hoc VoIP with embedded p-SIP server. 2536-2555 - Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung:

Two robust remote user authentication protocols using smart cards. 2556-2565 - Zijing Tan, Chengfei Liu

, Wei Wang, Baile Shi:
Consistent query answers from virtually integrated XML data. 2566-2578 - Guowei Wu, Zichuan Xu:

Temperature-aware task scheduling algorithm for soft real-time multi-core systems. 2579-2590 - Jesús Pardillo, Cristina Cachero

:
Domain-specific language modelling with UML profiles by decoupling abstract and concrete syntaxes. 2591-2606 - Ammar Masood, Arif Ghafoor, Aditya P. Mathur:

Fault coverage of Constrained Random Test Selection for access control: A formal analysis. 2607-2617 - Arnaud Gotlieb, Matthieu Petit:

A uniform random test data generator for path testing. 2618-2626 - Chun-Hee Lee, Chin-Wan Chung, Seok-Ju Chun:

Effective processing of continuous group-by aggregate queries in sensor networks. 2627-2641 - Wenjun Xu, Zude Zhou, Duc Truong Pham, Chunqian Ji, M. Yang, Quan Liu:

Unreliable transport protocol using congestion control for high-speed networks. 2642-2652 - Wien Hong, Tung-Shou Chen:

A local variance-controlled reversible data hiding method using prediction and histogram-shifting. 2653-2663
- Jang-Soo Lee, Vikash Katta, Eunkyoung Jee, Christian Raspotnig:

Erratum to "Means-ends and whole-part traceability analysis of safety requirements" [J. Syst. Software 83 (2010) 1612-1621]. 2664 - Christos P. Antonopoulos, Aggeliki S. Prayati, Tsenka Stoyanova, Christos Koulamas

, George D. Papadopoulos:
Corrigendum to "A modeling approach on the TelosB WSN platform power consumption" [J. Syst. Software 83 (2010) 1355-1363]. 2665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














