


default search action
Journal of Software, Volume 2
Volume 2, Number 1, February 2007
- Claudio Guidi, Roberto Lucchi:

Formalizing Mobility in Service Oriented Computing. 1-13 - Louise E. Moser, P. Michael Melliar-Smith, Wenbing Zhao:

Building Dependable and Secure Web Services. 14-26 - Torsten Priebe

, Wolfgang Dobmeier, Christian Schläger, Nora Kamprath:
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies. 27-38 - Calin Ciufudean

, Adrian Graur, Constantin Filote
, Cornel Turcu:
A New Formalism for Failure Diagnosis: Ant Colony Decision Petri Nets. 39-46 - Muhammad Alam, Ruth Breu, Michael Hafner:

Model-Driven Security Engineering for Trust Management in SECTET. 47-59 - Carine G. Webber

, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro:
Towards Secure e-Learning Applications: a Multiagent Platform. 60-69
Volume 2, Number 2, August 2007
- José Ignacio Garzón, Eduardo Huedo, Rubén S. Montero, Ignacio Martín Llorente, Pablo Chacón:

Adaptation of a Multi-Resolution Docking Bioinformatics Application to the Grid. 1-10 - Andrés Ortiz

, Julio Ortega, Antonio F. Díaz
, Alberto Prieto:
Modeling Network Behaviour By Full-System Simulation. 11-18 - Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie

:
Security Patterns for Voice over IP Networks. 19-29 - Piotr Karwaczynski, Jaka Mocnik:

IP-based Clustering for Peer-to-Peer Overlays. 30-37 - Eduardo Santana de Almeida, Alexandre Alvaro, Vinicius Cardoso Garcia, Leandro Marques Nascimento, Silvio Romero de Lemos Meira, Daniel Lucrédio:

A Systematic Approach to Design Domain-Specific Software Architectures. 38-51 - Hervé Chang, Philippe Collet:

Compositional Patterns of Non-Functional Properties for Contract Negotiation. 52-63 - Tony Spiteri Staines:

Supporting UML Sequence Diagrams with a Processor Net Approach. 64-73 - Michael Thonhauser, Gernot Schmoelzer, Christian Kreiner:

Implementing Model-Based Data Structures using Transient Model Extensions. 74-83 - Selim Ciraci, Pim van den Broek, Mehmet Aksit:

A Taxonomy for a Constructive Approach to Software Evolution. 84-97
Volume 2, Number 3, September 2007
- Piërre van de Laar, Rob Golsteijn:

User-Controlled Reflection on Join Points. 1-8 - James H. Hill, Aniruddha S. Gokhale

:
Model-driven Engineering for Early QoS Validation of Component-based Software Systems. 9-18 - Thomas Triebsees:

Constraint-based Model Transformation: Tracing the Preservation of Semantic Properties. 19-29 - Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:

Extended Influence Diagrams for System Quality Analysis. 30-42 - Seongwook Youn, Dennis McLeod:

Spam Email Classification using an Adaptive Ontology. 43-55 - YoungJoon Byun:

A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams and Patterns. 56-63 - Yongyan Zheng, Jiong Zhou, Paul Krause:

An Automatic Test Case Generation Framework for Web Services. 64-77 - Linh Ngo, Amy W. Apon:

Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System. 78-86 - Pierre-Loïc Garoche, Marc Pantel, Xavier Thirioux:

Abstract Interpretation-based Static Safety for Actors. 87-98
Volume 2, Number 4, October 2007
- Mikel Larrea, Alberto Lafuente, Iratxe Soraluze Arriola, Roberto Cortiñas, Joachim Wieland:

Designing Efficient Algorithms for the Eventually Perfect Failure Detector Class. 1-11 - João Cordeiro, Gaël Dias, Pavel Brazdil

:
New Functions for Unsupervised Asymmetrical Paraphrase Detection. 12-23 - Kornelije Rabuzin, Miroslav Baca, Mirko Malekovic:

A Multimodal Biometric System Implemented within an Active Database Management System. 24-31 - David Saint-Voirin, Christophe Lang, Hervé Guyennet, Noureddine Zerhouni:

Scoop Methodology: Modeling, Simulation And Analysis For Cooperative Systems. 32-42 - Bastian Florentz, Michaela Huhn:

Architecture Potential Analysis: A Closer Look inside Architecture Evaluation. 43-56 - Sérgio F. Lopes, Adriano Tavares, João Monteiro, Carlos A. Silva:

Instantiation of a Classification System Framework that Facilitates Reuse. 57-69 - Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi:

A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems. 70-79 - Narongrit Waraporn:

Real Time Simulation of Medical Diagnosis with Confidence Levels on Distributed Knowledge Nodes. 80-87 - Kazuo Hiekata

, Hiroyuki Yamato, Piroon Rojanakamolsan, Wataru Oishi:
A Framework for Design Engineering Education with Workflow-based e-Learning System. 88-95
Volume 2, Number 5, November 2007
- Giusy Di Lorenzo, Nicola Mazzocca, Francesco Moscato, Valeria Vittorini:

Towards Semantics Driven Generation of Executable Web Services Compositions. 1-15 - Lukás Hejtmánek, Ludek Matyska:

Nonblocking Distributed Replication of Versioned Files. 16-23 - Anabel Fraga, Juan Lloréns:

The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology. 24-28 - Paskorn Champrasert, Junichi Suzuki:

Building Self-Configuring Data Centers with Cross Layer Coevolution. 29-43 - Maryline Silly-Chetto

, Audrey Marchand:
Dynamic Scheduling of Skippable Periodic Tasks: Issues and Proposals. 44-51 - Vaclav Dvorak:

Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware. 52-63 - Oliver Skroch, Klaus Turowski:

Reducing Domain Level Scenarios to Test Component-based Software. 64-73 - Oussama Kassem Zein, Yvon Kermarrec:

Description and Composition of E-Learning Services. 74-83
Volume 2, Number 6, December 2007
- Wei Li, Zhikun Zhao:

Influence Control for Dynamic Reconfiguration of Data Flow Systems. 1-13 - Surekha Mariam Varghese, K. Poulose Jacob:

Anomaly Detection Using System Call Sequence Sets. 14-21 - Dil Muhammad Akbar Hussain:

Destabilization of Terrorist Networks through Argument Driven Hypothesis Model. 22-29 - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Mirko Minardi, Pierpaolo Catalano, Vito Dicensi, Gianfranco Tarricone:

A Decision Support System base line Flexible Architecture to Intrusion Detection. 30-41 - Veselina G. Jecheva

, Evgeniya P. Nikolova:
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems. 42-52 - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:

Using Aspect Programming to Secure Web Applications. 53-63 - Joon S. Park, Ganesh Devarajan:

Fine-Grained and Scalable Message Protection in Sensitive Organizations. 64-75 - Sabina Jeschke, Harald Scheel, Thomas Richter, Christian Thomsen:

On Remote and Virtual Experiments in eLearning. 76-85 - Alexander Höhfeld:

In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games. 86-92

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














