


default search action
Journal of Software, Volume 3
Volume 3, Number 1, January 2008
- Ramya Ravichandar, James D. Arthur:

Cohesion, Coupling and Abstraction Level: Criteria for Capability Identification. 1-8 - Stefan Böttcher, Sebastian Obermeier:

Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants. 9-17 - Georg Treu, Florian Fuchs, Christiane Dargatz:

Implicit Authorization for Social Location Disclosure. 18-26 - Dalia El-Mansy, Ahmed Sameh:

A Collaborative Inter-Data Grid Strong Semantic Model with Hybrid Namespace. 27-40 - Roger L. Goodwin:

An Algorithm for Documenting Relationships in a Set of Reports. 41-48 - Oliver Thomas:

Design and Implementation of a Version Management System for Reference Modeling. 49-62 - Isak Taksa, Amanda Spink, Robert Goldberg:

A Task-oriented Approach to Search Engine Usability Studies. 63-73 - Pedro J. Clemente, Juan Hernández, Fernando Sánchez:

Extending Component Composition Using Model Driven and Aspect-Oriented Techniques. 74-86
Volume 3, Number 2, February 2008
- Mikhail Perepletchikov

, Caspar Ryan
, Keith Frampton, Heinz W. Schmidt:
Formalising Service-Oriented Design. 1-14 - Mehdi Talbi, Meriam Ben Ghorbel, Mohamed Mejri:

Intrusion Detection Prototype Based on ADM-Logic. 15-22 - Bernhard Riedl, Veronika Grascher, Thomas Neubauer:

A Secure e-Health Architecture based on the Appliance of Pseudonymization. 23-32 - Albert D. Bethke:

Representing Procedural Logic in XML. 33-40 - Nathir A. Rawashdeh, Shaun T. Love, Kevin D. Donohue:

Hierarchical Image Segmentation by Structural Content. 41-51 - Raheleh B. Dilmaghani, Ramesh R. Rao:

Hybrid Wireless Mesh Network with Application to Emergency Scenarios. 52-60 - Nianen Chen, Shangping Ren:

Architecture Support for Behavior-based Adaptive Checkpointing. 61-68 - Marcílio Mendonça, Donald D. Cowan, William Malyk, Toacy Cavalcante de Oliveira:

Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis. 69-82
Volume 3, Number 3, March 2008
- Tieyan Li, Guilin Wang, Robert H. Deng:

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. 1-10 - Bogdan Groza:

Broadcast Authentication with Practically Unbounded One-way Chains. 11-20 - Martijn Warnier

, Frances M. T. Brazier, Anja Oskamp:
Security of Distributed Digital Criminal Dossiers. 21-29 - Clinton W. Smullen III, Stephanie A. Smullen:

An Experimental Study of AJAX Application Performance. 30-37 - Gheorghe Tecuci, Mihai Boicu, Dorin Marcu, Marcel Barbulescu, Cristina Boicu, Vu Le, Thomas Hajduk:

Teaching Virtual Experts for Multi-Domain Collaborative Planning. 38-59 - Tien N. Nguyen:

Managing Software Architectural Evolution at Multiple Levels of Abstraction. 60-70 - Marcus Tönnis, Jan-Gregor Fischer, Gudrun Klinker:

From Sensors to Assisted Driving - Bridging the Gap. 71-82 - Kamran Sheikh, Maarten Wegdam, Marten van Sinderen:

Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. 83-93
Volume 3, Number 4, April 2008
- Sajjan G. Shiva, Lubna Abou Shala:

Using Semantic Wikis to Support Software Reuse. 1-8 - Viet Hung Nguyen, Tran Khanh Dang

:
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases. 9-16 - Simon Samwel Msanjila, Hamideh Afsarmanesh

:
On Architectural Design of TrustMan System Applying HICI Analysis Results - The case of technological perspective in VBEs. 17-30 - Jeffrey A. Livermore:

Factors that Significantly Impact the Implementation of an Agile Software Development Methodology. 31-36 - D'Arcy Walsh, Francis Bordeleau, Bran Selic:

A Constraint-Driven Executable Model of Dynamic System Reconfiguration. 37-50 - Nipan Maniar, Emily Bennett, Steve Hand, George Allan:

The Effect of Mobile Phone Screen Size on Video Based Learning. 51-61 - Michael Eisenberg, Leah Buechley:

Pervasive Fabrication: Making Construction Ubiquitous in Education. 62-68
Volume 3, Number 5, May 2008
- Thomas W. Hall:

Is SOA Superior? Evidence from SaaS Financial Statements. 1-10 - Jehad Al-Dallal, Paul G. Sorenson:

Testing Software Assets of Framework-Based Product Families During Application Engineering Stage. 11-25 - Ali R. Sharafat, Ladan Tahvildari:

Change Prediction in Object-Oriented Software Systems: A Probabilistic Approach. 26-39 - Anders Moen Hagalisletto:

Deciding the Correctness of Attacks on Authentication Protocols. 40-54 - Jimmy McGibney, Dmitri Botvich:

A Trust Based System for Enhanced Spam Filtering. 55-64 - M. J. Basavaraj, K. C. Shet:

Empirical validation of Software development effort multipliers of Intermediate COCOMO Model. 65-71
Volume 3, Number 6, June 2008
- Yoshinobu Tamura, Shigeru Yamada:

Component-oriented Reliability Analysis and Optimal Version-upgrade Problems for Open Source Software. 1-8 - Yu Zhang:

A Role-Based Approach in Dynamic Task Delegation in Agent Teamwork. 9-20 - Md. Ahsan Habib

, Krisna Prasad Pawdel, Mohammad Rajiullah, Prashanta Man Shrestha:
Constraint-based Trend Template for Intrusion Detection. 21-28 - Carlos A. B. Mello

, Luciana A. Schuler:
Thresholding Images of Historical Documents Using a Tsallis-Entropy Based Algorithm. 29-36 - Takayuki Tsuchida, Teppei Shimada, Tatsuo Tsuji, Ken Higuchi:

Information Storage and Retrieval Schemes for Recycling Products. 37-45 - Shinsuke Tamura, Kazuya Kouro, Masatoshi Sasatani, Kazi Md. Rokibul Alam, Hazim Anas Haddad:

An Information System Platform for Anonymous Product Recycling. 46-56 - Michel dos Santos Soares, Jos L. M. Vrancken:

Model-Driven User Requirements Specification using SysML. 57-68 - Haibin Zhu

, Rob Alkins, Matthew Grenier:
Role-Based Chatting. 69-78
Volume 3, Numbers 7, October 2008
- George J. Sun:

Introducing the New Editor-in-Chief of the Journal of Software. 1 - Ashraf S. Hussein:

Analysis and Visualization of Gene Expressions and Protein Structures. 2-11 - M. J. Basavaraj, K. C. Shet:

Estimating and Prediction of Turn around Time for Incidents in Application Service Maintenance Projects. 12-21 - Jongwook Woo, MinSeok Jang:

The Comparison of WML, cHTML, and XHTML-MP in m-Commerce. 22-29 - Bridget Meehan, Girijesh Prasad

, T. Martin McGinnity
:
An Application Directed Adaptive Framework for Autonomic Software. 30-41 - Gary Giger, Mahmut T. Kandemir, John E. Dzielski:

Graphical Mission Specification and Partitioning for Unmanned Underwater Vehicles. 42-54
Volume 3, Numbers 8, November 2008
- Jason C. Hung:

Forward. 1-2 - Chuan-Feng Chiu, Steen J. Hsu, Sen-Ren Jan:

An Intelligent Home Environment based on Service Planning over Peer-to-Peer Overlay Network. 3-10 - Xiangfeng Luo, Kai Yan, Xue Chen:

Automatic Discovery of Semantic Relations Based on Association Rule. 11-18 - Pozung Chen, Chu-Hao Sun, Shih-Yang Yang:

Modeling and Analysis the Web Structure Using Stochastic Timed Petri Nets. 19-26 - WenYing Guo:

Reasoning with Semantic Web Technologies in Ubiquitous Computing Environment. 27-33 - Runhe Huang, Kei Nakanishi, Jianhua Ma, Bernady O. Apduhan:

An Object-oriented Design and Push Web Server based Framework for Physical Object Interactions and Services. 34-41 - Han-Bin Chang, Hsuan-Pu Chang, Jason C. Hung:

Interactive Traveling Assistant based on Agent Technologies and Mobile Computing. 42-48 - Chun-Liang Hsu, Wei-Bin Wu:

The Practical Design of Constructing Data Transition Interface with ZigBee WSN and RS-485 Wired Interface - Example with Small-scaled Wind-power Electricity Generator System. 49-56 - Jason C. Hung, Chun-Hong Huang, Yi-Chun Liao, Nick C. Tang, Ta-Jen Chen:

Exemplar-based Image Inpainting base on Structure Construction. 57-64 - Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih:

Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments. 65-72 - Wen-Hsing Kao, Jason C. Hung, Victoria Hsu:

Using Data Mining in MURA Graphic Problems. 73-79
Volume 3, Numbers 9, December 2008
- Fei Yu, Chin-Chen Chang, Ben M. Chen, Yongjun Chen, Zhigang Chen:

Editorial. 1-2 - Xiaoming Zhang:

Segmenting Histogram-based Robust Audio Watermarking Approach. 3-11 - Mukun Cao, Yuqiang Feng:

Reasoning Principles for Negotiating Agent. 12-19 - Jun Zhai, Yiduo Liang, Yi Yu, Jiatao Jiang:

Semantic Information Retrieval Based on Fuzzy Ontology for Electronic Commerce. 20-27 - Ling Wang, Xiuting Wang, Jingqi Fu, Lanlan Zhen:

A Novel Probability Binary Particle Swarm Optimization Algorithm and Its Application. 28-35 - Shuying Yan, Jing Wang, Chen Liu, Lei Liu:

An Approach to Discover Dependencies between Service Operations. 36-43 - Han Zhu, Yonggen Gu, Xiaohong Wu:

An Open Approach for the Applied Pi Calculus. 44-51 - Chunhua Yang, Haiyang Wang:

Formal Models for Architecture Aspects and Their Weaving. 52-59 - Tung-Hsiang Chou, Yu-Min Lee:

Integrating E-services with a Telecommunication E-commerce using Service-Oriented Architecture. 60-67 - Solahuddin B. Shamsuddin, Michael E. Woodward:

Applying Knowledge Discovery in Database Techniques in Modeling Packet Header Anomaly Intrusion Detection Systems. 68-76 - Xuejiao Liu, Debao Xiao, Xi Peng:

Towards a Collaborative and Systematic Approach to Alert Verification. 77-84

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














