default search action
Journal of Systems and Software (JSS), Volume 83
Volume 83, Number 1, January 2010
- W. Eric Wong:
Editorial for the JSS Top Scholar Special Issue. 1 - Erik Arisholm, Lionel C. Briand, Eivind B. Johannessen:
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models. 2-17 - Zhao Li, Nasser Alaeddine, Jeff Tian:
Multi-faceted quality and defect measurement for web software and source contents. 18-28 - Magne Jørgensen, Torleif Halkjelsvik:
The effects of request formats on judgment-based effort estimation. 29-36 - Barbara A. Kitchenham:
What's up with software metrics? - A preliminary mapping study. 37-51 - Ioannis Stamelos:
Software project management anti-patterns. 52-59 - Tsong Yueh Chen, Fei-Ching Kuo, Robert G. Merkel, T. H. Tse:
Adaptive Random Testing: The ART of test case diversity. 60-66 - Jan Bosch, Petra Bosch-Sijtsema:
From integration to composition: On the impact of software product lines, global development and ecosystems. 67-76 - Shih-Chien Chou, Chun-Hao Huang:
An extended XACML model to ensure secure information access for web services. 77-84 - Jihyun Lee, Jeong-Hoon Park, Myung-Jae Park, Chin-Wan Chung, Jun-Ki Min:
An intelligent query processing for distributed ontologies. 85-95 - David W. Binkley, Mark Harman, Youssef Hassoun, Syed S. Islam, Zheng Li:
Assessing the impact of global variables on program dependence and dependence clusters. 96-107
- Leijun Huang, Sanjeev Setia, Robert Simon:
McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks. 108-120 - Ya-Shu Chen, Hsin-Liang Tsai, Shi-Wu Lo:
Multi-layer bus minimization for SoC. 121-132 - Henrik Bærbak Christensen, Klaus Marius Hansen:
An empirical investigation of architectural prototyping. 133-142 - Yinglong Ma, Beihong Jin, Yulin Feng:
Semantic oriented ontology cohesion metrics for ontology-based systems. 143-152 - Yanli Ren, Dawu Gu:
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles. 153-162 - Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen:
DoS-resistant ID-based password authentication scheme using smart cards. 163-172
Volume 83, Number 2, February 2010
- Xiaoqing (Frank) Liu, Carl K. Chang, Tsang Ming Jiang:
Computer software and applications. 173 - Zhenyu Zhang, Bo Jiang, W. K. Chan, T. H. Tse, Xinming Wang:
Fault localization through evaluation sequences. 174-187 - W. Eric Wong, Vidroha Debroy, Byoungju Choi:
A family of code coverage-based heuristics for effective fault localization. 188-208 - Ian Bayley, Hong Zhu:
Formal specification of the variants and behavioural features of design patterns. 209-221 - Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong:
Measuring behavioral dependency for improving change-proneness prediction in UML-based design models. 222-234 - Juncao Li, Nicholas T. Pilkington, Fei Xie, Qiang Liu:
Embedded architecture description language. 235-252 - Sheikh Iqbal Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, Nilothpal Talukder:
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. 253-270
- Jun-Ki Min, Chin-Wan Chung:
EDGES: Efficient data gathering in sensor networks using temporal and spatial correlations. 271-282 - Jordi Cabot, Robert Clarisó, Esther Guerra, Juan de Lara:
Verification and validation of declarative model-to-model transformations through invariants. 283-302 - Emal Nasseri, Steve Counsell, Martin J. Shepperd:
Class movement and re-location: An empirical study of Java inheritance evolution. 303-315 - Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A cocktail protocol with the Authentication and Key Agreement on the UMTS. 316-325 - Jameleddine Hassine, Juergen Rilling, Rachida Dssouli:
An evaluation of timed scenario notations. 326-350
Volume 83, Number 3, March 2010
- Hans van Vliet:
Reviewers are a sparse and precious resource. 351
- Antony Tang, Paris Avgeriou, Anton Jansen, Rafael Capilla, Muhammad Ali Babar:
A comparative study of architecture knowledge management tools. 352-370 - Pengcheng Zhang, Bixin Li, Lars Grunske:
Timed Property Sequence Chart. 371-390 - Nikolaos Tsantalis, Alexander Chatzigeorgiou:
Identification of refactoring opportunities introducing polymorphism. 391-404 - Shichao Zhang, Zhi Jin, Jingli Lu:
Summary queries for frequent itemsets mining. 405-411 - Imen Loulou, Mohamed Jmaiel, Khalil Drira, Ahmed Hadj Kacem:
P/S-CoM: Building correct by design Publish/Subscribe architectural styles with safe reconfiguration. 412-428 - Hyungsoo Jung, Hyuck Han, Heon Young Yeom, Sooyong Kang:
A fast and progressive algorithm for skyline queries with totally- and partially-ordered domains. 429-445 - Bas Boone, Sofie Van Hoecke, Gregory van Seghbroeck, Niels Joncheere, Viviane Jonckers, Filip De Turck, Chris Develder, Bart Dhoedt:
SALSA: QoS-aware load balancing for autonomous service brokering. 446-456 - Isaac Woungang, Guangyan Ma, Mieso K. Denko, Sudip Misra, Han-Chieh Chao, Mohammad S. Obaidat:
Survivable ATM mesh networks: Techniques and performance evaluation. 457-466 - David Vallejo, Javier Albusac, J. A. Mateos, Carlos Glez-Morcillo, Luis Jiménez:
A modern approach to multiagent development. 467-484 - Ayelet Israeli, Dror G. Feitelson:
The Linux kernel as a case study in software evolution. 485-501 - Chang-Ai Sun, Rowan Rossing, Marco Sinnema, Pavel Bulanov, Marco Aiello:
Modeling and managing the variability of Web service-based systems. 502-516 - Chin-Pan Huang, Chaur-Heh Hsieh, Ping Sheng Huang:
Progressive sharing for a secret image. 517-527
Volume 83, Number 4, April 2010
- Damian Cieslicki, Stefan Schäckeler, Thomas Schwarz:
Maintaining and checking parity in highly available Scalable Distributed Data Structures. 529-542 - Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto M. Hakala, Kaisa Nyberg:
A practical distinguisher for the Shannon cipher. 543-547 - Sumit Narayan, John A. Chandy:
ATTEST: ATTributes-based Extendable STorage. 548-556 - Antonio Chella, Massimo Cossentino, Salvatore Gaglio, Luca Sabatucci, Valeria Seidita:
Agent-oriented software patterns for rapid and affordable robot programming. 557-573 - Gregor Polancic, Marjan Hericko, Ivan Rozman:
An empirical examination of application frameworks success based on technology acceptance model. 574-584 - Luciano Bertini, Julius C. B. Leite, Daniel Mossé:
Power optimization for dynamic configuration in heterogeneous web server clusters. 585-598 - Jung-Sing Jwo, Yu Chin Cheng:
Pseudo software: A mediating instrument for modeling software requirements. 599-608 - Jenn-Wei Lin, Huang-Yu Liu:
Redirection based recovery for MPLS network systems. 609-620 - Nikolaos Mittas, Lefteris Angelis:
Visual comparison of software cost estimation models by regression error characteristic analysis. 621-637 - Wen-Shenq Juang:
RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings. 638-645 - Chin-Yu Huang, Jun-Ru Chang, Yung-Hsin Chang:
Design and analysis of GUI test-case prioritization using weight-based methods. 646-659 - Yuming Zhou, Baowen Xu, Hareton Leung:
On the ability of complexity metrics to predict fault-prone classes in object-oriented systems. 660-674 - Farooq Ahmad, Hejiao Huang, Xiaolong Wang:
Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources. 675-688 - Shin Yoo, Mark Harman:
Using hybrid algorithm for Pareto efficient multi-objective test suite minimisation. 689-701 - Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala:
An improved impossible differential cryptanalysis of Zodiac. 702-709 - Philip Loden, Qi Han, Lisa Porta, Tissa H. Illangasekare, Anura P. Jayasumana:
Corrigendum to "A wireless sensor system for validation of real-time automatic calibration of groundwater transport models" [J. Syst. Software 82 (2009) 1859-1868]. 710
Volume 83, Number 5, May 2010
- Ambra Molesini, Alessandro Garcia, Christina von Flach G. Chavez, Thaís Vasconcelos Batista:
Stability assessment of aspect-oriented software architectures: A quantitative study. 711-722 - Pengcheng Zhang, Henry Muccini, Bixin Li:
A classification and comparison of model checking software architecture techniques. 723-744 - Ageliki Tsioliaridou, Vassilis Tsaoussidis:
Fast convergence to network fairness. 745-762 - Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Trapdoor security in a searchable public-key encryption scheme with a designated tester. 763-771 - Meng Wang, Yi Wang, Duo Liu, Zhiwei Qin, Zili Shao:
Compiler-assisted leakage-aware loop scheduling for embedded VLIW DSP processors. 772-785 - Louis-Claude Canon, Olivier Dubuisson, Jens Gustedt, Emmanuel Jeannot:
Defining and controlling the heterogeneity of a cluster: The Wrekavoc tool. 786-802 - Hongyu Zhang, Yuan-Fang Li, Hee Beng Kuan Tan:
Measuring design complexity of semantic web ontologies. 803-814 - Chouki Tibermacine, Régis Fleurquin, Salah Sadou:
A family of languages for architecture constraint specification. 815-831 - Chin-Feng Lee, Hsing-Ling Chen:
A novel data hiding scheme based on modulus function. 832-843 - Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:
Differential fault analysis on Camellia. 844-851 - Sudip Misra, P. Dias Thomasinous:
A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks. 852-860 - Tzung-Her Chen, Jyun-Ci Huang:
A novel user-participating authentication scheme. 861-867 - Andre B. de Carvalho, Aurora T. R. Pozo, Silvia Regina Vergilio:
A symbolic fault-prediction model based on multiobjective particle swarm optimization. 868-882
Volume 83, Number 6, June 2010
- Rami Bahsoon, Licia Capra, Wolfgang Emmerich, Mohamed E. Fayad:
Special Issue on Software Architecture and Mobility. 883-884 - Nenad Medvidovic, George Edwards:
Software architecture and mobility: A roadmap. 885-898 - Michel Wermelinger, Arosha K. Bandara:
Commentary on 'Software architectures and mobility: A Roadmap'. 899-901 - Judith Bishop, Theo Danzfuss:
Computer supported cooperative work and "Software architectures and mobility: A Roadmap". 902-905 - Michele Sama, David S. Rosenblum, Zhimin Wang, Sebastian G. Elbaum:
Multi-layer faults in the architectures of mobile, context-aware adaptive applications. 906-914 - Andres Fortier, Gustavo Rossi, Silvia E. Gordillo, Cecilia Challiol:
Dealing with variability in context-aware mobile software. 915-936 - Nour Ali, Isidro Ramos, Carlos Solís:
Ambient-PRISMA: Ambients in mobile aspect-oriented software architecture. 937-958 - Carles Garrigues, Sergi Robles, Joan Borrell, Guillermo Navarro-Arribas:
Promoting the development of secure mobile agent applications. 959-971 - Sam Malek, George Edwards, Yuriy Brun, Hossein Tajalli, Joshua Garcia, Ivo Krka, Nenad Medvidovic, Marija Mikic-Rakic, Gaurav S. Sukhatme:
An architecture-driven software mobility framework. 972-989
- Xudong Lin, Ning Wang, De Xu, Xiaoning Zeng:
A novel XML keyword query approach using entity subtree. 990-1003 - Georgios L. Stavrinides, Helen D. Karatza:
Scheduling multiple task graphs with end-to-end deadlines in distributed real-time systems utilizing imprecise computations. 1004-1014 - Hung-Hsu Tsai, H.-C. Tseng, Y.-S. Lai:
Robust lossless image watermarking based on alpha-trimmed mean algorithm and support vector machine. 1015-1028 - Jun Gao, Jiaheng Lu, Tengjiao Wang, Dongqing Yang:
Efficient evaluation of query rewriting plan over materialized XML view. 1029-1038 - Magne Jørgensen:
Selection of strategies in judgment-based effort estimation. 1039-1050 - Alexandros Bartzas, Miguel Peón Quirós, Christophe Poucet, Christos Baloukas, Stylianos Mamagkakis, Francky Catthoor, Dimitrios Soudris, Jose Manuel Mendias:
Software metadata: Systematic characterization of the memory behaviour of dynamic applications. 1051-1075
Volume 83, Number 7, July 2010
- Birgit Geppert, Klaus Pohl:
Editorial for the JSS SPLC 2008 Special Issue. 1077 - André L. Santos, Kai Koskimies, Antónia Lopes:
Automating the construction of domain-specific modeling languages for object-oriented frameworks. 1078-1093 - Jules White, David Benavides, Douglas C. Schmidt, Pablo Trinidad, Brian Dougherty, Antonio Ruiz Cortés:
Automated diagnosis of feature model configurations. 1094-1107 - Deepak Dhungana, Paul Grünbacher, Rick Rabiser, Thomas Neumayer:
Structuring the modeling space and supporting evolution in software product line engineering. 1108-1122 - Jaejoon Lee, Dirk Muthig, Matthias Naab:
A feature-oriented approach for developing reusable product line assets of service-based systems. 1123-1136
- Tao Wang, Zhenxing Qin, Zhi Jin, Shichao Zhang:
Handling over-fitting in test cost-sensitive decision tree learning by feature selection, smoothing and pruning. 1137-1147 - Franco Cicirelli, Angelo Furfaro, Libero Nigro:
A service-based architecture for dynamically reconfigurable workflows. 1148-1164 - Perla Velasco Elizondo, Kung-Kiu Lau:
A catalogue of component connectors to support development with reuse. 1165-1178 - Vicente García-Díaz, Héctor Fernández-Fernández, Elías Palacios-González, B. Cristina Pelayo García-Bustelo, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle:
TALISMAN MDE: Mixing MDE principles. 1179-1191 - Can Basaran, Mehmet H. Suzer, Kyoung-Don Kang, Xue Liu:
Robust fuzzy CPU utilization control for dynamic workloads. 1192-1204 - Eduardo Miranda, Pierre Bourque:
Agile monitoring using the line of balance. 1205-1215 - Jung Soo Kim, David Garlan:
Analyzing architectural styles. 1216-1235 - Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, Chwei-Shyong Tsai:
A novel adaptive steganography based on local complexity and human vision sensitivity. 1236-1248 - Fotis E. Psomopoulos, Pericles A. Mitkas:
Bioinformatics algorithm development for Grid environments. 1249-1257 - Chris Andrzejczak, Dahai Liu:
The effect of testing location on usability testing performance, participant stress levels, and subjective testing experience. 1258-1266 - Jeong Hee Hwang, Keun Ho Ryu:
A weighted common structure based clustering technique for XML documents. 1267-1274 - Kai Petersen, Claes Wohlin:
Software process improvement through the Lean Measurement (SPI-LEAM) method. 1275-1287 - Veronica Montes De Oca, Daniel R. Jeske, Qi Zhang, Carlos Rendón, Mazda Marvasti:
A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance. 1288-1297
Volume 83, Number 8, August 2010
- Ahmed Yassin Al-Dubai, Geyong Min, Mohamed Ould-Khaoua, Xiaolong Jin, William J. Buchanan:
Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems. 1299-1300 - Xiao Chen, Jian Shen, Jie Wu:
Improving routing protocol performance in delay tolerant networks using extended information. 1301-1309 - Abbas Nayebi, Hamid Sarbazi-Azad, Gunnar Karlsson:
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks. 1310-1317 - Liang Zhao, Ahmed Yassin Al-Dubai, Geyong Min:
GLBM: A new QoS aware multicast scheme for wireless mesh networks. 1318-1326 - Mahmoud Moadeli, Wim Vanderbauwhede:
Communication modeling of multicast in all-port wormhole-routed NoCs. 1327-1336 - Jun Chen, Victor C. S. Lee, Kai Liu:
On the performance of real-time multi-item request scheduling in data broadcast environments. 1337-1345 - Zafeirios C. Papazachos, Helen D. Karatza:
Performance evaluation of bag of gangs scheduling in a heterogeneous distributed system. 1346-1354 - Aggeliki S. Prayati, Christos P. Antonopoulos, Tsenka Stoyanova, Christos Koulamas, George D. Papadopoulos:
A modeling approach on the TelosB WSN platform power consumption. 1355-1363 - Richard Werner Nelem Pazzi, Zhenxia Zhang, Azzedine Boukerche:
Design and evaluation of a novel MAC layer handoff protocol for IEEE 802.11 wireless networks. 1364-1372
- Ching-Wen Chen, Chuan-Chi Weng, Yu-Chen Kuo:
Signal strength based routing for power saving in mobile ad hoc networks. 1373-1386 - Robert Lagerström, Pontus Johnson, David Höök:
Architecture analysis of enterprise systems modifiability - Models, analysis, and validation. 1387-1403 - Marco Bernardo, Edoardo Bontà, Alessandro Aldini:
Handling communications in process algebraic architectural description languages: Modeling, verification, and implementation. 1404-1429 - Djamel Bennouar, Tahar Khammaci, Abderazzak Henni:
A new approach for component's port modeling in software architecture. 1430-1442 - Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system. 1443-1452 - Erast Athanasiadis, Sarandis Mitropoulos:
A distributed platform for personalized advertising in digital interactive TV environments. 1453-1469 - Hong Peng, Jun Wang, Weixing Wang:
Image watermarking method in multiwavelet domain based on support vector machines. 1470-1477 - Victor M. Ruiz Penichet, María Dolores Lozano, José A. Gallud, Ricardo Tesoriero:
Requirement-based approach for groupware environments design. 1478-1488 - Rossella Fortuna, Luigi Alfredo Grieco, Gennaro Boggia, Pietro Camarda:
Quality adaptive end-to-end packet scheduling to avoid playout interruptions in Internet video streaming systems. 1489-1499 - Young Jin Jung, Keun Ho Ryu, Moon Sun Shin, Silvia Nittel:
Historical index structure for reducing insertion and search cost in LBS. 1500-1511 - Danilo Ardagna, Raffaela Mirandola:
Per-flow optimal service selection for Web services based processes. 1512-1523 - Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. 1524-1537 - Ching-Hong Tsai, Kuo-Chan Huang, Feng-Jian Wang, Chun-Hao Chen:
A distributed server architecture supporting dynamic resource provisioning for BPM-oriented workflow management systems. 1538-1552
Volume 83, Number 9, September 2010
- Michael Grottke, Doo-Hwan Bae, Bjørn Axel Gran:
Introduction to the special issue. 1553-1554 - Kishor S. Trivedi, Sachin Garg:
In Memoriam: Dr. Chandra Kintala. 1555 - Gabriella Carrozza, Domenico Cotroneo, Roberto Natella, Antonio Pecchia, Stefano Russo:
Memory leak analysis of mission-critical middleware. 1556-1567 - Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker:
Methods and opportunities for rejuvenation in aging distributed software systems. 1568-1578 - Felix Salfner, Katinka Wolter:
Analysis of service availability for time-triggered rejuvenation policies. 1579-1590 - Hiroyuki Okamura, Tadashi Dohi:
Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system. 1591-1604 - Martin Kropik, Monika Jurickova:
Software for protection system of VR-1 training reactor. 1605-1611 - Jang-Soo Lee, Vikash Katta, Eunkyoung Jee, Christian Raspotnig:
Means-ends and whole-part traceability analysis of safety requirements. 1612-1621 - Siv Hilde Houmb, Virginia N. L. Franqueira, Erlend Agoy Engum:
Quantifying security risk level from CVSS estimates of frequency and impact. 1622-1634
Volume 83, Number 10, October 2010
- Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. 1635-1643 - Mohamed Alnas, Irfan Awan, Robert Holton:
Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information. 1644-1650 - Hongbing Wang, Zuling Kang, Ning Zhou, Li Li:
A model checker for WS-CDL. 1651-1661 - Francisco J. Pino, Oscar Pedreira, Félix García, Miguel Rodríguez Luaces, Mario Piattini:
Using Scrum to guide the execution of software process improvement in small organizations. 1662-1677 - Dexuan Zou, Liqun Gao, Steven Li, Jianhua Wu, Xin Wang:
A novel global harmony search algorithm for task assignment problem. 1678-1688 - Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung:
A novel DRM framework for peer-to-peer music content delivery. 1689-1700 - Vagelis Hristidis, Shu-Ching Chen, Tao Li, Steven Luis, Yi Deng:
Survey of data management and analysis in disaster situations. 1701-1714 - Anja Keskinarkaus, Anu Pramila, Tapio Seppänen:
Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks. 1715-1725 - Yuzhu Li, Kuo-Chung Chang, Houn-Gee Chen, James J. Jiang:
Software development team flexibility antecedents. 1726-1734 - Neil B. Harrison, Paris Avgeriou:
How do architecture patterns and tactics interact? A model and annotation. 1735-1758 - Jacqueline Floch, Cyril Carrez, Pawel Cieslak, Michal Rój, Richard Torbjørn Sanders, Mazen Malek Shiaa:
A comprehensive engineering framework for guaranteeing component compatibility. 1759-1779 - Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islam, Constantin Sârbu:
A software integration approach for designing and assessing dependable embedded systems. 1780-1800 - Xin Liao, Qiao-Yan Wen, Ying Sun, Jie Zhang:
Multi-party covert communication with steganography and quantum secret sharing. 1801-1804 - Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu:
Using quad smoothness to efficiently control capacity-distortion of reversible data hiding. 1805-1812 - Aniello Castiglione, Alfredo De Santis, Claudio Soriente:
Security and privacy issues in the Portable Document Format. 1813-1822 - Gyu Sang Choi, Chita R. Das:
A Superscalar software architecture model for Multi-Core Processors (MCPs). 1823-1837 - Wenpin Jiao, Yanchun Sun, Hong Mei:
Automated assembly of Internet-scale software systems involving autonomous agents. 1838-1850 - Shuigeng Zhou, Ming Xu, Jihong Guan:
LESSON: A system for lecture notes searching and sharing over Internet. 1851-1863 - Chin-Feng Lee, Hsing-Ling Chen, Hao-Kuan Tso:
Embedding capacity raising in reversible data hiding based on prediction of difference expansion. 1864-1872 - Kyung-Ah Shim:
An ID-based aggregate signature scheme with constant pairing computations. 1873-1880 - Alberto Avritzer, Daniel J. Paulish, Yuanfang Cai, Kanwarpreet Sethi:
Coordination implications of software architecture in a global software development project. 1881-1895 - Richard Kennard, John Leaney:
Towards a general purpose architecture for UI generation. 1896-1906 - Evgenia Egorova, Marco Torchiano, Maurizio Morisio:
Actual vs. perceived effect of software engineering practices in the Italian industry. 1907-1916 - Morteza Nikooghadam, Ali Zakerolhosseini, Mohsen Ebrahimi Moghaddam:
Efficient utilization of elliptic curve cryptosystem for hierarchical access control. 1917-1929 - Vu Thi Hong Nhan, Namkyu Park, Yang Koo Lee, Yongmi Lee, Jong Yun Lee, Keun Ho Ryu:
Online discovery of Heart Rate Variability patterns in mobile healthcare services. 1930-1940 - Jose L. Salmeron, Cristina López-Vargas:
A multicriteria approach for risks assessment in ERP maintenance. 1941-1953 - Bas van der Raadt, Marc Bonnet, Sander Schouten, Hans van Vliet:
The relation between EA effectiveness and stakeholder satisfaction. 1954-1969 - Oscar Díaz, Felipe M. Villoria:
Generating blogs out of product catalogues: An MDE approach. 1970-1982 - Hai Jin, Yaqin Luo, Li Qi, Jie Dai, Song Wu:
Dependency-aware maintenance for highly available service-oriented grid. 1983-1994 - Gyrd Brændeland, Atle Refsdal, Ketil Stølen:
Modular analysis and modelling of risk scenarios with dependencies. 1995-2013
Volume 83, Number 11, November 2010
- Silvia Abrahão, Natalia Juristo Juzgado, Effie Lai-Chong Law, Jan Stage:
Interplay between usability and software development. 2015-2018 - Asbjørn Følstad, Kasper Hornbæk:
Work-domain knowledge in usability evaluation: Experiences with Cooperative Usability Testing. 2019-2030 - Bettina Biel, Thomas Grill, Volker Gruhn:
Exploring the benefits of the combination of a software architecture analysis and a usability evaluation of a mobile application. 2031-2044 - Anirudha N. Joshi, Nandlal L. Sarda, Sanjay Tripathi:
Measuring effectiveness of HCI integration in software development processes. 2045-2058 - Jeff Winter, Kari Rönkkö:
SPI success factors within product usability evaluation. 2059-2072
- Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen, Mingchu Li:
An encoding method for both image compression and data lossless information hiding. 2073-2082 - Santi Caballé, Fatos Xhafa:
CLPL: Providing software infrastructure for the systematic and effective construction of complex collaborative learning systems. 2083-2097 - Ajit Appari, Michel Benaroch:
Monetary pricing of software development risks: A method and empirical illustration. 2098-2107 - Nelis Boucké, Danny Weyns, Tom Holvoet:
Composition of architectural models: Empirical analysis and language support. 2108-2127 - Sune Dueholm Müller, Lars Mathiassen, Hans Henrik Balshøj:
Software Process Improvement as organizational change: A metaphorical analysis of the literature. 2128-2146 - Hossein Rahmani, Mohammad Mehdi Faghih, Mohsen Ebrahimi Moghaddam:
A new real time disk-scheduling method based on GSR algorithm. 2147-2164 - Qinma Kang, Hong He, Hui-Min Song, Rong Deng:
Task allocation for maximizing reliability of distributed computing systems using honeybee mating optimization. 2165-2174 - Jarmo J. Ahonen, Paula Savolainen:
Software engineering projects may fail before they are started: Post-mortem analysis of five cancelled projects. 2175-2187 - Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Pushkar Gupta, Karan Verma, Prayag Narula:
An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. 2188-2199 - Evangelos Sakkopoulos, Dimitris Antoniou, Poulia Adamopoulou, Nikos Tsirakis, Athanasios K. Tsakalidis:
A web personalizing technique using adaptive data structures: The case of bursts in web visits. 2200-2210 - Hataichanok Unphon, Yvonne Dittrich:
Software architecture awareness in long-term software product evolution. 2211-2226 - Fu-Hau Hsu, Cheng-Hsien Huang, Chi-Hsien Hsu, Chih-Wen Ou, Li-Han Chen, Ping-Cheng Chiu:
HSP: A solution against heap sprays. 2227-2236 - Davur S. Clementsen, Zhen He:
Vertical partitioning for flash and HDD database systems. 2237-2250 - Vahid Garousi, Tan Varma:
A replicated survey of software testing practices in the Canadian province of Alberta: What has changed from 2004 to 2009? 2251-2262 - Nuo Li, Tao Xie, Maozhong Jin, Chao Liu:
Perturbation-based user-input-validation testing of web applications. 2263-2274 - Michael English, Jim Buckley, Tony Cahill:
A replicated and refined empirical study of the use of friends in C++ software. 2275-2286 - Kholekile L. Gwebu, Jing Wang:
Seeing eye to eye? An exploratory study of free open source software users' perceptions. 2287-2296 - Jianjie Zhao, Dawu Gu:
Provably secure authenticated key exchange protocol under the CDH assumption. 2297-2304 - Mark Keil, ChongWoo Park:
Bad news reporting on troubled IT projects: Reassessing the mediating role of responsibility in the basic whistleblowing model. 2305-2316 - JunSeong Kim, JongSu Yi:
A pattern-based prediction: An empirical approach to predict end-to-end network latency. 2317-2321 - Mohammed F. M. Ali, Mohammed Issam Younis, Kamal Zuhairi Zamli, Widad Ismail:
Development of Java based RFID application programmable interface for heterogeneous RFID system. 2322-2331 - Yan-Fu Li, Min Xie, Thong Ngee Goh:
Adaptive ridge regression system for software cost estimating on multi-collinear datasets. 2332-2343 - Amir A. Khwaja, Joseph E. Urban:
A property based specification formalism classification. 2344-2362
- Orit Hazzan, Uri Leron:
Disciplined and free-spirited: 'Time-out behaviour' at the Agile conference. 2363-2365
Volume 83, Number 12, December 2010
- Leonardo Bottaci, Gregory M. Kapfhammer, Neil Walkinshaw:
TAIC-PART 2009 - Testing: Academic & Industrial Conference - Practice And Research Techniques: Special Section Editorial. 2367-2368 - Daniel Hoffman, Hong-Yi Wang, Mitch Chang, David Ly-Gagnon, Lewis Sobotkiewicz, Paul A. Strooper:
Two case studies in grammar-based test generation. 2369-2378 - Kiran Lakhotia, Phil McMinn, Mark Harman:
An empirical investigation into branch coverage for C programs using CUTE and AUSTIN. 2379-2391 - Abel Marrero Pérez, Stefan Kaiser:
Bottom-up reuse for multi-level testing. 2392-2415 - William B. Langdon, Mark Harman, Yue Jia:
Efficient multi-objective higher order mutation testing with genetic programming. 2416-2430
- Heeyoul Kim, Younho Lee, Yongsu Park:
A robust and flexible digital rights management system for home networks. 2431-2440 - James A. Miller, Remo Ferrari, Nazim H. Madhavji:
An exploratory study of architectural effects on requirements decisions. 2441-2455 - Thareendhra Wijayasiriwardhane, Richard Lai:
Component Point: A system-level size measure for Component-Based Software Systems. 2456-2470 - Constantinos Marios Angelopoulos, Sotiris E. Nikoletseas:
Accelerated collection of sensor data by mobility-enabled topology ranks. 2471-2477 - Jong-Yih Kuo, Fu-Chu Huang:
Code analyzer for an online course management system. 2478-2486 - S. R. Kannan, A. Sathya, S. Ramathilagam, R. Devi:
Novel segmentation algorithm in segmenting medical images. 2487-2495 - Muhammad Irfan Ullah, Günther Ruhe, Vahid Garousi:
Decision support for moving from a single product to a product portfolio in evolving software systems. 2496-2512 - Sam Malek, Harshini Ramnath Krishnan, Jayalakshmi Srinivasan:
Enhancing middleware support for architecture-based development through compositional weaving of styles. 2513-2527 - Hui-Lung Lee, Chia-Feng Lee, Ling-Hwei Chen:
A perfect maze based steganographic method. 2528-2535 - Lin-Huang Chang, Chun-Hui Sung, Shih-Yi Chiu, Yen-Wen Lin:
Design and realization of ad-hoc VoIP with embedded p-SIP server. 2536-2555 - Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung:
Two robust remote user authentication protocols using smart cards. 2556-2565 - Zijing Tan, Chengfei Liu, Wei Wang, Baile Shi:
Consistent query answers from virtually integrated XML data. 2566-2578 - Guowei Wu, Zichuan Xu:
Temperature-aware task scheduling algorithm for soft real-time multi-core systems. 2579-2590 - Jesús Pardillo, Cristina Cachero:
Domain-specific language modelling with UML profiles by decoupling abstract and concrete syntaxes. 2591-2606 - Ammar Masood, Arif Ghafoor, Aditya P. Mathur:
Fault coverage of Constrained Random Test Selection for access control: A formal analysis. 2607-2617 - Arnaud Gotlieb, Matthieu Petit:
A uniform random test data generator for path testing. 2618-2626 - Chun-Hee Lee, Chin-Wan Chung, Seok-Ju Chun:
Effective processing of continuous group-by aggregate queries in sensor networks. 2627-2641 - Wenjun Xu, Zude Zhou, Duc Truong Pham, Chunqian Ji, M. Yang, Quan Liu:
Unreliable transport protocol using congestion control for high-speed networks. 2642-2652 - Wien Hong, Tung-Shou Chen:
A local variance-controlled reversible data hiding method using prediction and histogram-shifting. 2653-2663
- Jang-Soo Lee, Vikash Katta, Eunkyoung Jee, Christian Raspotnig:
Erratum to "Means-ends and whole-part traceability analysis of safety requirements" [J. Syst. Software 83 (2010) 1612-1621]. 2664 - Christos P. Antonopoulos, Aggeliki S. Prayati, Tsenka Stoyanova, Christos Koulamas, George D. Papadopoulos:
Corrigendum to "A modeling approach on the TelosB WSN platform power consumption" [J. Syst. Software 83 (2010) 1355-1363]. 2665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.