default search action
Journal of Systems and Software (JSS), Volume 84
Volume 84, Number 1, January 2011
- Muhammad Younas, Irfan Awan, Makoto Takizawa:
Special issue on the information networking and services. 1 - Waltenegus Dargie, Rami Mochaourab, Alexander Schill, Lin Guan:
A topology control protocol based on eligibility and efficiency metrics. 2-11 - Mahmoud Moadeli, Wim Vanderbauwhede:
An analytical model of broadcast in QoS-aware wormhole-routed NoCs. 12-20 - Satoshi Ohzahata, Konosuke Kawashima:
An experimental study of peer behavior in a pure P2P network. 21-28 - Yan Yang, Samia Souissi, Xavier Défago, Makoto Takizawa:
Fault-tolerant flocking for a group of autonomous mobile robots. 29-36 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min:
Performance analysis of an integrated scheduling scheme in the presence of bursty MMPP traffic. 37-44 - Elhadi M. Shakshuki, Haroon Malik, Tarek R. Sheltami:
A comparative study on simulation vs. real time deployment in wireless sensor networks. 45-54 - Fatos Xhafa, Claudi Paniagua, Leonard Barolli, Santi Caballé:
Using Grid services to parallelize IBM's Generic Log Adapter. 55-62
- Hong-Quang Nguyen, David Taniar, J. Wenny Rahayu, Kinh Nguyen:
Double-layered schema integration of heterogeneous XML sources. 63-76 - Mubarak Mohammad, Vangalur S. Alagar:
A formal approach for the specification and verification of trustworthy component-based systems. 77-104 - Osamah M. Al-Qershi, Bee Ee Khoo:
High capacity data hiding schemes for medical images based on difference expansion. 105-112 - Hui-Feng Huang, Kuo-Ching Liu:
Efficient key management for preserving HIPAA regulations. 113-119 - Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Identity-based strong designated verifier signature revisited. 120-129 - Leonidas Akritidis, Dimitrios Katsaros, Panayiotis Bozanis:
Effective rank aggregation for metasearching. 130-143 - Eugenio Capra, Chiara Francalanci, Francesco Merlo, Cristina Rossi Lamastra:
Firms' involvement in Open Source projects: A trade-off between software structural quality and popularity. 144-161
- W. Eric Wong, T. H. Tse, Robert L. Glass, Victor R. Basili, Tsong Yueh Chen:
An assessment of systems and software engineering scholars and institutions (2003-2007 and 2004-2008). 162-168
Volume 84, Number 2, February 2011
- David Isern, David Sánchez, Antonio Moreno:
Organizational structures supported by agent-oriented methodologies. 169-184 - Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blondia:
Toward architecture-based context-aware deployment and adaptation. 185-197 - Paulo S. L. M. Barreto, Rafael Misoczki, Marcos A. Simplício Jr.:
One-time signature scheme from syndrome decoding over generic error-correcting codes. 198-204 - Shengpu Liu, Liang Cheng:
A context-aware reflective middleware framework for distributed real-time and embedded systems. 205-218 - Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. 219-225 - Christos V. Samaras, Vassilis Tsaoussidis:
Adjusting transport segmentation policy of DTN Bundle Protocol under synergy with lower layers. 226-237 - Amir Hossein Ghapanchi, Aybüke Aurum:
Antecedents to IT personnel's intentions to leave: A systematic literature review. 238-249 - Hossain Shahriar, Mohammad Zulkernine:
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. 250-269 - Mohammad Azzeh, Daniel Neagu, Peter I. Cowling:
Analogy-based software effort estimation using Fuzzy numbers. 270-284 - Rick Rabiser, Pádraig O'Leary, Ita Richardson:
Key activities for product derivation in software product lines. 285-300 - Brian Henderson-Sellers:
Bridging metamodels and ontologies in software engineering. 301-313 - Hai Thanh Mai, Yu Won Lee, Ki Yong Lee, Myoung-Ho Kim:
Distributed adaptive top-k monitoring in wireless sensor networks. 314-327 - Michel dos Santos Soares, Jos L. M. Vrancken, Alexander Verbraeck:
User requirements modeling and analysis of software-intensive systems. 328-339
Volume 84, Number 3, March 2011
- Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev:
Medical image security and EPR hiding using Shamir's secret sharing scheme. 341-353 - Xiao Liu, Zhiwei Ni, Dong Yuan, Yuan-Chun Jiang, Zhangjun Wu, Jinjun Chen, Yun Yang:
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems. 354-376 - Tianle Zhang, Zhihui Du, Yinong Chen, Xiang Ji, Xiaoying Wang:
Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management. 377-387 - Cheng-Hsing Yang, Sheng-Chang Wu, Shu-Chien Huang, Yih-Kai Lin:
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes. 388-396 - Gabriele Bavota, Andrea De Lucia, Rocco Oliveto:
Identifying Extract Class refactoring opportunities using structural and semantic cohesion measures. 397-414 - Lars M. Karg, Michael Grottke, Arne Beckhaus:
A systematic literature review of software quality cost research. 415-427 - Chien-Chang Chen, Yao-Hong Tsai:
Adaptive reversible image watermarking scheme. 428-434 - Wei-Wen Wu:
Mining significant factors affecting the adoption of SaaS using the rough set approach. 435-441 - Brett Dawes, Kwan-Wu Chin:
A comparison of deterministic and probabilistic methods for indoor localization. 442-451 - Shichao Zhang, Zhi Jin, Xiaofeng Zhu:
Missing data imputation by utilizing information within incomplete instances. 452-459 - Xu Ma, Lingling Xu, Fangguo Zhang:
Oblivious transfer with timed-release receiver's privacy. 460-464 - Konstantinos I. Karaoglanoglou, Helen D. Karatza:
Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. 465-478 - Chung-Yang Chen, P. Pete Chong:
Software engineering education: A study on conducting collaborative senior project development. 479-491 - Xiao Liu, Zhiwei Ni, Zhangjun Wu, Dong Yuan, Jinjun Chen, Yun Yang:
A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems. 492-509 - Robert Baird, Noah Jorgenson, Rose F. Gamble:
Self-adapting workflow reconfiguration. 510-524
Volume 84, Number 4, April 2011
- Byoungju Choi, Richard Lai:
Special issue on the best papers of QSIC 2009. 527 - Seunghun Park, Doo-Hwan Bae:
An approach to analyzing the software process change impact using process slicing and simulation. 528-543 - Xiaoyuan Xie, Joshua Wing Kei Ho, Christian Murphy, Gail E. Kaiser, Baowen Xu, Tsong Yueh Chen:
Testing and validating machine learning classifiers by metamorphic testing. 544-558 - Foutse Khomh, Stéphane Vaucher, Yann-Gaël Guéhéneuc, Houari A. Sahraoui:
BDTEX: A GQM-based Bayesian approach for the detection of antipatterns. 559-572 - Rui Abreu, Peter Zoeteweij, Arjan J. C. van Gemund:
Simultaneous debugging of software faults. 573-586 - Vidroha Debroy, W. Eric Wong:
On the estimation of adequate test set size using fault failure rates. 587-602 - Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel:
XML-manipulating test case prioritization for XML-manipulating services. 603-619
- Claudia P. Ayala, Øyvind Hauge, Reidar Conradi, Xavier Franch, Jingyue Li:
Selection of third party software in Off-The-Shelf-based software development - An interview study with industrial practitioners. 620-637 - Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
A policy-based publish/subscribe middleware for sense-and-react applications. 638-654 - Cesare Bartolini, Antonia Bertolino, Sebastian G. Elbaum, Eda Marchetti:
Bringing white-box testing to Service Oriented Architectures through a Service Oriented Approach. 655-668 - Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. 669-678 - Yu-Li Lin, Chien-Lung Hsu:
Secure key management scheme for dynamic hierarchical access control based on ECC. 679-685 - Siffat Ullah Khan, Mahmood Niazi, Rashid Ahmad:
Factors influencing clients in the selection of offshore software outsourcing vendors: An exploratory study using a systematic literature review. 686-699 - Damianos Chatziantoniou, Katerina Pramatari, Yannis Sotiropoulos:
Supporting real-time supply chain decisions based on RFID data streams. 700-710
Volume 84, Number 5, May 2011
- Hui Song, Gang Huang, Franck Chauvel, Yingfei Xiong, Zhenjiang Hu, Yanchun Sun, Hong Mei:
Supporting runtime software architecture: A bidirectional-transformation-based approach. 711-723 - Saraju P. Mohanty, Elias Kougianos:
Real-time perceptual watermarking architectures for video broadcasting. 724-738 - Witold Pedrycz, Barbara Russo, Giancarlo Succi:
A model of job satisfaction for collaborative development processes. 739-752 - Frédérique Robert-Inacio, Alain Trémeau, Mike Fournigault, Yannick Teglia, Pierre-Yvan Liardet:
Shape analysis for power signal cryptanalysis on secure components. 753-762 - Chun-Han Lin, Huang-Chen Lee, Chung-Ta King:
Periphery deployment for wireless sensor systems with guaranteed coverage percentage. 763-774 - Francisco Reyes, Narciso Cerpa, Alfredo Candia-Véjar, Matthew Bardeen:
The optimization of success probability for software projects using genetic algorithms. 775-785 - Peng Liang, Anton Jansen, Paris Avgeriou, Antony Tang, Lai Xu:
Advanced quality prediction model for software architectural knowledge sharing. 786-802 - Ziba Eslami, Jamal Zarepour-Ahmadabadi:
Secret image sharing with authentication-chaining and dynamic embedding. 803-809 - Joaquín Entrialgo, Daniel F. García, Javier García, Manuel García, Pablo Valledor, Mohammad S. Obaidat:
Dynamic adaptation of response-time models for QoS management in autonomic systems. 810-820 - Tolga Ovatman, Thomas Weigert, Feza Buzluca:
Exploring implicit parallelism in class diagrams. 821-834 - Indika Meedeniya, Barbora Buhnova, Aldeida Aleti, Lars Grunske:
Reliability-driven deployment optimization for embedded systems. 835-846 - Jean-Baptiste Fasquel, Johan Moreau:
A design pattern coupling role and component concepts: Application to medical software. 847-863 - Yung-Cheng Ma, Chung-Ping Chung, Tien-Fu Chen:
Load and storage balanced posting file partitioning for parallel information retrieval. 864-884
Volume 84, Number 6, June 2011
- Zhenyu Zhang, W. K. Chan, T. H. Tse, Yuen-Tak Yu, Peifeng Hu:
Non-parametric statistical fault localization. 885-905 - Kun Peng:
An efficient shuffling based eVoting scheme. 906-922 - Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma:
A novel image watermarking in redistributed invariant wavelet domain. 923-929 - W. K. Chan, Yuen Yau Chiu, Yuen-Tak Yu:
A web search-centric approach to recommender systems with URLs as minimal user contexts. 930-941 - Alexandre Torres, Renata de Matos Galante, Marcelo Soares Pimenta:
A synergistic model-driven approach for persistence modeling with UML. 942-957 - Tanja Suomalainen, Outi Salo, Pekka Abrahamsson, Jouni Similä:
Software product roadmapping in a volatile business environment. 958-975 - T. Edagawa, T. Akaike, Yoshiki Higo, Shinji Kusumoto, Shigeo Hanabusa, T. Shibamoto:
Function point measurement from Web application source code based on screen transitions and database accesses. 976-984 - Qinma Kang, Hong He, Hui-Min Song:
Task assignment in heterogeneous computing systems using an effective iterated greedy algorithm. 985-992 - Chien-Ping Chou, Kuen-Fang Jea, Heng-Hsun Liao:
A syntactic approach to twig-query matching on XML streams. 993-1007 - Pedro Sánchez, Manuel Jiménez Buendía, Francisca Rosique, Bárbara Álvarez, Andrés Iborra:
A framework for developing home automation systems: From requirements to code. 1008-1021 - Shih-Lin Wu, Shu-Chia Chen:
An energy-efficient MAC protocol with downlink traffic scheduling strategy in IEEE 802.11 infrastructure WLANs. 1022-1031 - Pedro J. Clemente, Juan Hernández Núñez, José María Conejero, Guadalupe Ortiz:
Managing crosscutting concerns in component based systems using a model driven development approach. 1032-1053 - Marko Palviainen, Antti Evesti, Eila Ovaska:
The reliability estimation, prediction and measuring of component-based software. 1054-1070
Volume 84, Number 7, July 2011
- M. Mustafa Rafique, Ali Raza Butt, Eli Tilevich:
Reusable software components for accelerator-based clusters. 1071-1081 - Robert W. P. Luk:
Scalable, statistical storage allocation for extensible inverted file construction. 1082-1088 - Antonia Bertolino, Guglielmo De Angelis, Alessio Di Sandro, Antonino Sabetta:
Is my model right? Let me ask the expert. 1089-1099 - David Hästbacka, Timo Vepsäläinen, Seppo Kuikka:
Model-driven development of industrial process control applications. 1100-1113 - Komminist Weldemariam, Adolfo Villafiorita:
Procedural security analysis: A methodological approach. 1114-1129 - Abdulhadi Shoufan, Tolga Arul:
A benchmarking environment for performance evaluation of tree-based rekeying algorithms. 1130-1143 - Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain:
Dynamic deployment of context-aware access control policies for constrained security devices. 1144-1159 - Gang Huang, Weihu Wang, Tiancheng Liu, Hong Mei:
Simulation-based analysis of middleware service impact on system reliability: Experiment on Java application server. 1160-1170 - Wes Masri, Hiba Halabi:
An algorithm for capturing variables dependences in test suites. 1171-1190 - Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. 1191-1196 - Tzung-Her Chen, Kai-Hsiang Tsao:
Threshold visual secret sharing by random grids. 1197-1208 - Mosa Elbendak, Paul Vickers, B. Nick Rossiter:
Parsed use case descriptions as a basis for object-oriented class model generation. 1209-1223 - Zhihui Du, Jingkun Hu, Yinong Chen, Zhili Cheng, Xiaoying Wang:
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid. 1224-1232 - Klaus Marius Hansen, Kristjan Jonasson, Helmut Neukirchen:
An empirical study of software architectures' effect on product quality. 1233-1243 - Nikos Kefalakis, John Soldatos, Nikolaos Konstantinou, Neeli R. Prasad:
APDL: A reference XML schema for process-centered definition of RFID solutions. 1244-1259
Volume 84, Number 8, August 2011
- Lixin Han, Hong Yan:
BSN: An automatic generation algorithm of social network data. 1261-1269 - George Kousiouris, Tommaso Cucinotta, Theodora A. Varvarigou:
The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks. 1270-1291 - Tao-Ku Chang, Gwan-Hwan Hwang:
Developing an efficient query system for encrypted XML documents. 1292-1305 - Ruijun Zhang, Jie Lu, Guangquan Zhang:
An information presentation method based on tree-like super entity component. 1306-1318 - C. C. F. Pereira Geovandro, Marcos A. Simplício Jr., Michael Naehrig, Paulo S. L. M. Barreto:
A family of implementation-friendly BN elliptic curves. 1319-1326 - Sergio Ilarri, Carlos Bobed, Eduardo Mena:
An approach to process continuous location-dependent queries on moving objects with support for location granules. 1327-1350 - Ganna Frankova, Magali Seguran, Florian Gilcher, Slim Trabelsi, Jörg Dörflinger, Marco Aiello:
Deriving business processes with service level agreements from early requirements. 1351-1363 - Jin Wook Byun, Dong Hoon Lee:
On a security model of conjunctive keyword search over encrypted relational database. 1364-1372 - D. R. W. Holton, Muhammad Younas, Irfan-Ullah Awan:
Priority scheduling of requests to web portals. 1373-1378 - María José Escalona Cuaresma, Javier J. Gutiérrez, Manuel Mejías, Gustavo Aragón, Isabel M. Ramos, Jesús Torres Valderrama, Francisco José Domínguez Mayo:
An overview on test generation from functional requirements. 1379-1393 - Anil S. Jadhav, Rajendra M. Sonar:
Framework for evaluation and selection of the software packages: A hybrid knowledge based system approach. 1394-1407 - Xiangyang Wang, Pan-Pan Niu, Mingyu Lu:
A robust digital audio watermarking scheme using wavelet moment invariance. 1408-1421
Volume 84, Number 9, September 2011
- Flávio Oquendo, Eltjo R. Poort, Judith A. Stafford:
Guest Editors Introduction to the Special Issue. 1423 - Johan F. Hoorn, Rik Farenhorst, Patricia Lago, Hans van Vliet:
The lonesome architect. 1424-1435 - Yan Liu, Xin Liang, Lingzhi Xu, Mark Staples, Liming Zhu:
Composing enterprise mashup components and services using architecture integration patterns. 1436-1446 - Trosky Boris Callo Arias, Pierre America, Paris Avgeriou:
Defining and documenting execution viewpoints for a large and complex software-intensive system. 1447-1461
- Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. 1462-1470 - Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. 1471-1479 - Ana Sasa, Marjan Krisper:
Enterprise architecture patterns for business process support analysis. 1480-1506 - Ohhoon Kwon, Kern Koh, Jaewoo Lee, Hyokyung Bahn:
FeGC: An efficient garbage collection scheme for flash memory based storage systems. 1507-1523 - Yanchang Zhao, Jie Cao, Chengqi Zhang, Shichao Zhang:
Enhancing grid-density based clustering for high dimensional data. 1524-1539 - Björn Lundell, Brian Lings, Anna Syberfeldt:
Practitioner perceptions of Open Source software in the embedded systems area. 1540-1549 - Soheila Kiani, Mohsen Ebrahimi Moghaddam:
A multi-purpose digital image watermarking using fractal block coding. 1550-1562 - Celia Gutiérrez, Iván García-Magariño:
Revealing bullying patterns in multi-agent systems. 1563-1575
Volume 84, Number 10, October 2011
- Gustavo Weber Denardin, Carlos Henrique Barriquello, Alexandre Campos, Ricardo Nederson do Prado:
A geographic routing hybrid approach for void resolution in wireless sensor networks. 1577-1590 - Faramarz Safi Esfahani, Masrah Azrifah Azmi Murad, Md. Nasir bin Sulaiman, Nur Izura Udzir:
Adaptable Decentralized Service Oriented Architecture. 1591-1617 - Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal analysis of an electronic voting system: An experience report. 1618-1637 - Shih-Sheng Chen, Tony Cheng-Kui Huang, Zhe-Min Lin:
New and efficient knowledge discovery of partial periodic patterns with multiple minimum supports. 1638-1651 - Shin-Jia Hwang, Yun-Hao Sung:
Confidential deniable authentication using promised signcryption. 1652-1659 - Sung-Kyoung Kim, Tae Hyun Kim, Dong-Guk Han, Seokhie Hong:
An efficient CRT-RSA algorithm secure against power and fault attacks. 1660-1669 - Elisa Yumi Nakagawa, Fabiano Cutigi Ferrari, Mariela M. F. Sasaki, José Carlos Maldonado:
An aspect-oriented reference architecture for Software Engineering Environments. 1670-1684 - Xuehai Tang, Bing Sun, Ruilin Li, Chao Li, Juhua Yin:
A meet-in-the-middle attack on reduced-round ARIA. 1685-1692 - Doina Bucur, Marta Z. Kwiatkowska:
On software verification for sensor nodes. 1693-1707 - Xiaomin Zhu, Chuan He, Rong Ge, Peizhong Lu:
Boosting adaptivity of fault-tolerant scheduling for real-time tasks with service requirements on clusters. 1708-1716 - Tian-Fu Lee, Tzonelih Hwang:
Provably secure and efficient authentication techniques for the global mobility network. 1717-1725 - Ching-Nung Yang, Yu-Ying Chu:
A general (k, n) scalable secret image sharing scheme with the smooth scalability. 1726-1733 - Arnau Erola, Jordi Castellà-Roca, Alexandre Viejo, Josep Maria Mateo-Sanz:
Exploiting social networks to provide privacy in personalized web search. 1734-1745 - Jenn-Wei Lin, Shih-Chieh Tang:
A grid-based coverage approach for target tracking in hybrid sensor networks. 1746-1756 - Nikolaos Tsantalis, Alexander Chatzigeorgiou:
Identification of extract method refactoring opportunities for the decomposition of methods. 1757-1782 - Fuchun Guo, Yi Mu, Willy Susilo:
Improving security of q-SDH based digital signatures. 1783-1790 - Amir Talaei-Khoei, Terje Solvoll, Pradeep Ray, Nandan Parameswaran:
Policy-based Awareness Management (PAM): Case study of a wireless communication system at a hospital. 1791-1805 - Fabio Paternò, Carmen Santoro, Lucio Davide Spano:
Engineering the authoring of usable service front ends. 1806-1822
Volume 84, Number 11, November 2011
- Damianos Gavalas, Paolo Bellavista, Jiannong Cao, Valérie Issarny:
Mobile applications: Status and trends. 1823-1826 - Vittorio Ghini, Stefano Ferretti, Fabio Panzieri:
The "Always Best Packet Switching" architecture for SIP-based mobile multimedia services. 1827-1851 - Byoungjip Kim, Sang Jeong Lee, Youngki Lee, Inseok Hwang, Yunseok Rhee, Junehwa Song:
Mobiiscape: Middleware support for scalable mobility pattern monitoring of moving objects in a large-scale city. 1852-1870 - Tim Verbelen, Tim Stevens, Pieter Simoens, Filip De Turck, Bart Dhoedt:
Dynamic deployment and quality adaptation for mobile augmented reality applications. 1871-1882 - Sergio Martín, Gabriel Díaz, Inmaculada Plaza, Elena Ruiz Larrocha, Manuel Castro, Juan Peire:
State of the art of frameworks and middleware for facilitating mobile and ubiquitous learning development. 1883-1891 - SK Hafizul Islam, G. P. Biswas:
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. 1892-1898 - María-Dolores Cano, Ginés Doménech-Asensi:
A secure energy-efficient m-banking application for mobile devices. 1899-1909 - Igor Bilogrevic, Murtuza Jadliwala, Praveen Kumar, Sudeep Singh Walia, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Meetings through the cloud: Privacy-preserving scheduling on mobile devices. 1910-1927 - Delphine Christin, Andreas Reinhardt, Salil S. Kanhere, Matthias Hollick:
A survey on privacy in mobile participatory sensing applications. 1928-1946 - Markus Tschersich, Christian Kahl, Stephan Heim, Stephen Crane, Katja Böttcher, Ioannis Krontiris, Kai Rannenberg:
Towards privacy-enhanced mobile communities - Architecture, concepts and user trials. 1947-1960 - Claudio Alvarez, Rosa Alarcón, Miguel Nussbaum:
Implementing collaborative learning activities in the classroom supported by one-to-one mobile computing: A design-based process. 1961-1976 - Inmaculada Plaza, Lourdes Martín, Sergio Martín, Carlos Medrano:
Mobile applications in an aging society: Status and trends. 1977-1988 - Ioannis Chatzigiannakis, Georgios Mylonas, Panagiotis C. Kokkinos, Orestis Akribopoulos, Marios Logaras, Irene Mavrommati:
Implementing multiplayer pervasive installations based on mobile sensing devices: Field experience and user evaluation from a public showcase. 1989-2004 - Shu-Chiung Hu, You-Chiun Wang, Chiuan-Yu Huang, Yu-Chee Tseng:
Measuring air quality in city areas by vehicular wireless sensor networks. 2005-2012 - Javier Guerra Casanova, Carmen Sánchez Ávila, Alberto de Santos Sierra, Gonzalo Bailador del Pozo:
Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures. 2013-2021 - Chang Liu, Qing Zhu, Kenneth A. Holroyd, Elizabeth K. Seng:
Status and trends of mobile-health applications for iOS devices: A developer's perspective. 2022-2033
Volume 84, Number 12, December 2011
- Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Suntae Kim, Sooyong Park:
A feature-based approach for modeling role-based access control systems. 2035-2052 - Heung Seok Chae, Gyun Woo, Tae Yeon Kim, Jung Ho Bae, Won-Young Kim:
An automated approach to reducing test suites for testing retargeted C compilers for embedded systems. 2053-2064 - Princely Ifinedo:
Examining the influences of external expertise and in-house computer/IT knowledge on ERP system success. 2065-2078 - Richard Kennard, John Leaney:
Is there convergence in the field of UI generation? 2079-2087 - Fabrizio Milo, Massimo Bernaschi, Mauro Bisson:
A fast, GPU based, dictionary attack to OpenPGP secret keyrings. 2088-2096 - Yulei Wu, Geyong Min, Mohamed Ould-Khaoua, Hao Yin:
Modelling and analysis of pipelined circuit switching in interconnection networks with bursty traffic and hot-spot destinations. 2097-2106 - Bo Wang, Chuanhe Huang, Layuan Li, Wenzhong Yang:
Trust-based minimum cost opportunistic routing for Ad hoc networks. 2107-2122 - Wei Li:
Evaluating the impacts of dynamic reconfiguration on the QoS of running systems. 2123-2138 - Daewook Lee, Joonho Kwon, Sangjun Lee, Seog Park, Bonghee Hong:
Scalable and efficient web services composition based on a relational database. 2139-2155 - Saad Bani-Mohammad, Ismail Ababneh, Mazen Hamdan:
Performance evaluation of noncontiguous allocation algorithms for 2D mesh interconnection networks. 2156-2170 - Bestoun S. Ahmed, Kamal Zuhairi Zamli:
A variable strength interaction test suites generation strategy using Particle Swarm Optimization. 2171-2185 - Mikel Larrea, Cristian Martín, Iratxe Soraluze Arriola:
Communication-efficient leader election in crash-recovery systems. 2186-2195 - Chia-Chun Wu, Shang-Juh Kao, Min-Shiang Hwang:
A high quality image sharing with steganography and adaptive authentication scheme. 2196-2207 - Jianmei Guo, Jules White, Guangxin Wang, Jian Li, Yinglin Wang:
A genetic algorithm for optimized feature selection with resource constraints in software product lines. 2208-2221 - Dunwei Gong, Wanqiu Zhang, Xiangjuan Yao:
Evolutionary generation of test data for many paths coverage based on grouping. 2222-2233 - Toacy Cavalcante de Oliveira, Paulo S. C. Alencar, Donald D. Cowan:
ReuseTool - An extensible tool support for object-oriented framework reuse. 2234-2252 - Hongyu Zhang, Hee Beng Kuan Tan, Lu Zhang, Xi Lin, Xiaoyin Wang, Chun Zhang, Hong Mei:
Checking enforcement of integrity constraints in database applications based on code patterns. 2253-2264 - Apostolos Ampatzoglou, Apostolos Kritikos, George Kakarontzas, Ioannis Stamelos:
An empirical investigation on the reusability of design patterns and software packages. 2265-2283 - Yamin Wen, Fangguo Zhang:
Delegatable secret handshake scheme. 2284-2292 - Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Interactive conditional proxy re-encryption with fine grain policy. 2293-2302 - Yanan Qiao, Yong Qi, Di Hou:
Tensor Field Model for higher-order information retrieval. 2303-2313 - Jose Martinez-Llario, M. Gonzalez-Alcaide:
Design of a Java spatial extension for relational databases. 2314-2323 - Jinkyu Lee, Arvind Easwaran, Insik Shin, Insup Lee:
Zero-laxity based real-time multiprocessor scheduling. 2324-2333 - Francesca Arcelli Fontana, Stefano Maggioni, Claudia Raibulet:
Understanding the relevance of micro-structures for design patterns detection. 2334-2347 - Chong Zhang, Weidong Xiao, Daquan Tang, Jiuyang Tang:
P2P-based multidimensional indexing methods: A survey. 2348-2362 - Ghassan Beydoun, Antonio A. Lopez-Lorca, Francisco García-Sánchez, Rodrigo Martínez-Béjar:
How do we measure and improve the quality of a hierarchical ontology? 2363-2373 - Avichai Meged, Roy Gelbard:
Adjusting Fuzzy Similarity Functions for use with standard data mining tools. 2374-2383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.