default search action
CASCON 2007: Richmond Hill, Ontario, Canada
- Bruce Spencer, Margaret-Anne D. Storey, Darlene A. Stewart:
Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada. IBM 2007
Packaging and delivery of web pages and web applications
- Sandy Liu, Yong Liang, Martin Brooks:
Eucalyptus: a web service-enabled e-infrastructure. 1-11 - Andy Y. Mao, James R. Cordy, Thomas R. Dean:
Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection. 12-26 - Thierry Bodhuin, Massimiliano Di Penta, Luigi Troiano:
A search-based approach for dynamically re-packaging downloadable applications. 27-41
Event monitoring
- Yuan Gan, Marsha Chechik, Shiva Nejati, Jon Bennett, Bill O'Farrell, Julie Waterhouse:
Runtime monitoring of web service conversations. 42-57 - Matthew Nichols, David Taylor:
Pattern rewriting for efficient search in partial-order event data. 58-70 - Yu-Tong He, Issam Al-Azzoni, Douglas G. Down:
MARO - MinDrift affinity routing for resource management in heterogeneous computing systems. 71-85
Computer supported collaborative work and human computer interaction
- Klarissa Chang, Kate Ehrlich:
Out of sight but not out of mind?: Informal networks, communication and media use in global software teams. 86-97 - I. Scott MacKenzie, Janet C. Read:
Using paper mockups for evaluating soft keyboard layouts. 98-108 - Rodrigo A. Vivanco, Dean Jin:
Improving predictive models of cognitive complexity using an evolutionary computational approach: a case study. 109-123
Autonomic computing
- Bogdan Solomon, Dan Ionescu, Marin Litoiu, Mircea Mihaescu:
A real-time adaptive control of autonomic computing environments. 124-136 - Raphael M. Bahati, Michael A. Bauer, Elvis M. Vieira:
Policy-driven autonomic management of multi-component systems. 137-151 - Mohammad Ahmad Munawar, Paul A. S. Ward:
A comparative study of pairwise regression techniques for problem determination. 152-166
Privacy, security and database query processing
- Heesun Park, Stan Redford:
Client certificate and IP address based multi-factor authentication for J2EE web applications. 167-174 - Liam Peyton, Chintan Doshi, Pierre Seguin:
An audit trail service to enhance privacy compliance in federated identity management. 175-187 - Kristine Towne, Qiang Zhu, Calisto Zuzarte, Wen-Chi Hou:
Window query processing for joining data streams with relations. 188-202
Software development
- Arjun Singh, Gregor Kiczales:
The scalability of AspectJ. 203-214 - Kamel Ayari, Peyman Meshkinfam, Giuliano Antoniol, Massimiliano Di Penta:
Threats on building models from CVS and Bugzilla repositories: the Mozilla case study. 215-228 - Izzet Safer, Gail C. Murphy:
Comparing episodic and semantic interfaces for task boundary identification. 229-243
Software engineering
- Jorge Aranda, Ramzan Khuwaja, Steve M. Easterbrook:
Discovering the shared understanding dynamics of large software teams. 244-247 - Dennis K. Peters, Mark Lawford, Baltasar Trancón y Widemann:
An IDE for software development using tabular expressions. 248-251 - T. S. E. Maibaum, Zhe (Jessie) Li:
A test framework for integration testing of object-oriented programs. 252-255
Architecture and hardware
- Xavier Teruel, Xavier Martorell, Alejandro Duran, Roger Ferrer, Eduard Ayguadé:
Support for OpenMP tasks in Nanos v4. 256-259 - Christopher Kumar Anand, Wolfram Kahl:
MultiLoop: efficient software pipelining for modern hardware. 260-263 - Vinod Muthusamy, Hans-Arno Jacobsen, Phil Coulthard, Allen Chan, Julie Waterhouse, Elena Litani:
SLA-driven business process management in SOA. 264-267
Databases, documents and files
- Yabin Meng, Paul Bird, Patrick Martin, Wendy Powley:
An approach to managing the execution of large SQL queries. 268-271 - Owen Kaser, Daniel Lemire:
Removing manually generated boilerplate from electronic texts: experiments with project Gutenberg e-books. 272-275 - Mark Sherriff, Sarah Smith Heckman, Mike Lake, Laurie A. Williams:
Identifying fault-prone files using static analysis alerts through singular value decomposition. 276-279
Social computing
- Alvin Chin, Mark H. Chignell:
Identifying active subgroups in online communities. 280-283 - Sandra Jean Sacha Chua:
Using web 2.0 to locate expertise. 284-287 - Bader Ali, Wilfred Villegas, Muthucumaru Maheswaran:
A trust based approach for protecting user data in social networks. 288-293
IBM CAS software and systems engineering symposium 2007 (Dublin, Ireland)
- Jimmy McGibney, Dmitri Botvich:
A service-centric approach to access control and monitoring based on distributed trust. 294-305 - Philippe Dugerdil:
Using trace sampling techniques to identify dynamic clusters of classes. 306-314 - Daren Nestor, Luke O'Malley, Patrick Healy, Aaron J. Quigley, Steffen Thiel:
Visulasation techniques to support derivation tasks in sofware product line development. 315-325 - Sujana Jyothi, Claire McAvinia, John G. Keating:
An interaction visualisation tool for a learning management system. 326-331 - Jason M. Carter, Jesse H. Poore:
Sequence-based specification of feedback control systems in Simulink®. 332-345 - Allen E. Milewski, Marilyn Tremaine, Richard Egan, Suling Zhang, Felix Köbler, Patrick O'Sullivan:
Information "bridging" in a global organization. 346-355
Workshops of CASCON 2007
- Kelly A. Lyons:
Workshops of CASCON 2007. 356-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.