Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Systems and Software (JSS), Volume 84
Volume 84, Number 1, January 2011
- Muhammad Younas, Irfan Awan, Makoto Takizawa:
Special issue on the information networking and services. 1 - Waltenegus Dargie, Rami Mochaourab, Alexander Schill, Lin Guan:
A topology control protocol based on eligibility and efficiency metrics. 2-11 - Mahmoud Moadeli, Wim Vanderbauwhede:
An analytical model of broadcast in QoS-aware wormhole-routed NoCs. 12-20 - Satoshi Ohzahata, Konosuke Kawashima:
An experimental study of peer behavior in a pure P2P network. 21-28 - Yan Yang, Samia Souissi, Xavier Défago, Makoto Takizawa:
Fault-tolerant flocking for a group of autonomous mobile robots. 29-36 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min:
Performance analysis of an integrated scheduling scheme in the presence of bursty MMPP traffic. 37-44 - Elhadi M. Shakshuki, Haroon Malik, Tarek R. Sheltami:
A comparative study on simulation vs. real time deployment in wireless sensor networks. 45-54 - Fatos Xhafa, Claudi Paniagua, Leonard Barolli, Santi Caballé:
Using Grid services to parallelize IBM's Generic Log Adapter. 55-62
- Hong-Quang Nguyen, David Taniar, J. Wenny Rahayu, Kinh Nguyen:
Double-layered schema integration of heterogeneous XML sources. 63-76 - Mubarak Mohammad, Vangalur S. Alagar:
A formal approach for the specification and verification of trustworthy component-based systems. 77-104 - Osamah M. Al-Qershi, Bee Ee Khoo:
High capacity data hiding schemes for medical images based on difference expansion. 105-112 - Hui-Feng Huang, Kuo-Ching Liu:
Efficient key management for preserving HIPAA regulations. 113-119 - Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Identity-based strong designated verifier signature revisited. 120-129 - Leonidas Akritidis, Dimitrios Katsaros, Panayiotis Bozanis:
Effective rank aggregation for metasearching. 130-143 - Eugenio Capra, Chiara Francalanci, Francesco Merlo, Cristina Rossi Lamastra:
Firms' involvement in Open Source projects: A trade-off between software structural quality and popularity. 144-161
- W. Eric Wong, T. H. Tse, Robert L. Glass, Victor R. Basili, Tsong Yueh Chen:
An assessment of systems and software engineering scholars and institutions (2003-2007 and 2004-2008). 162-168
Volume 84, Number 2, February 2011
- David Isern, David Sánchez, Antonio Moreno:
Organizational structures supported by agent-oriented methodologies. 169-184 - Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blondia:
Toward architecture-based context-aware deployment and adaptation. 185-197 - Paulo S. L. M. Barreto, Rafael Misoczki, Marcos A. Simplício Jr.:
One-time signature scheme from syndrome decoding over generic error-correcting codes. 198-204 - Shengpu Liu, Liang Cheng:
A context-aware reflective middleware framework for distributed real-time and embedded systems. 205-218 - Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. 219-225 - Christos V. Samaras, Vassilis Tsaoussidis:
Adjusting transport segmentation policy of DTN Bundle Protocol under synergy with lower layers. 226-237 - Amir Hossein Ghapanchi, Aybüke Aurum:
Antecedents to IT personnel's intentions to leave: A systematic literature review. 238-249 - Hossain Shahriar, Mohammad Zulkernine:
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. 250-269 - Mohammad Azzeh, Daniel Neagu, Peter I. Cowling:
Analogy-based software effort estimation using Fuzzy numbers. 270-284 - Rick Rabiser, Pádraig O'Leary, Ita Richardson:
Key activities for product derivation in software product lines. 285-300 - Brian Henderson-Sellers:
Bridging metamodels and ontologies in software engineering. 301-313 - Hai Thanh Mai, Yu Won Lee, Ki Yong Lee, Myoung-Ho Kim:
Distributed adaptive top-k monitoring in wireless sensor networks. 314-327 - Michel dos Santos Soares, Jos L. M. Vrancken, Alexander Verbraeck:
User requirements modeling and analysis of software-intensive systems. 328-339
Volume 84, Number 3, March 2011
- Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev:
Medical image security and EPR hiding using Shamir's secret sharing scheme. 341-353 - Xiao Liu, Zhiwei Ni, Dong Yuan, Yuan-Chun Jiang, Zhangjun Wu, Jinjun Chen, Yun Yang:
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems. 354-376 - Tianle Zhang, Zhihui Du, Yinong Chen, Xiang Ji, Xiaoying Wang:
Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management. 377-387 - Cheng-Hsing Yang, Sheng-Chang Wu, Shu-Chien Huang, Yih-Kai Lin:
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes. 388-396 - Gabriele Bavota, Andrea De Lucia, Rocco Oliveto:
Identifying Extract Class refactoring opportunities using structural and semantic cohesion measures. 397-414 - Lars M. Karg, Michael Grottke, Arne Beckhaus:
A systematic literature review of software quality cost research. 415-427 - Chien-Chang Chen, Yao-Hong Tsai:
Adaptive reversible image watermarking scheme. 428-434 - Wei-Wen Wu:
Mining significant factors affecting the adoption of SaaS using the rough set approach. 435-441 - Brett Dawes, Kwan-Wu Chin:
A comparison of deterministic and probabilistic methods for indoor localization. 442-451 - Shichao Zhang, Zhi Jin, Xiaofeng Zhu:
Missing data imputation by utilizing information within incomplete instances. 452-459 - Xu Ma, Lingling Xu, Fangguo Zhang:
Oblivious transfer with timed-release receiver's privacy. 460-464 - Konstantinos I. Karaoglanoglou, Helen D. Karatza:
Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. 465-478 - Chung-Yang Chen, P. Pete Chong:
Software engineering education: A study on conducting collaborative senior project development. 479-491 - Xiao Liu, Zhiwei Ni, Zhangjun Wu, Dong Yuan, Jinjun Chen, Yun Yang:
A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems. 492-509 - Robert Baird, Noah Jorgenson, Rose F. Gamble:
Self-adapting workflow reconfiguration. 510-524
Volume 84, Number 4, April 2011
- Byoungju Choi, Richard Lai:
Special issue on the best papers of QSIC 2009. 527 - Seunghun Park, Doo-Hwan Bae:
An approach to analyzing the software process change impact using process slicing and simulation. 528-543 - Xiaoyuan Xie, Joshua Wing Kei Ho, Christian Murphy, Gail E. Kaiser, Baowen Xu, Tsong Yueh Chen:
Testing and validating machine learning classifiers by metamorphic testing. 544-558 - Foutse Khomh, Stéphane Vaucher, Yann-Gaël Guéhéneuc, Houari A. Sahraoui:
BDTEX: A GQM-based Bayesian approach for the detection of antipatterns. 559-572 - Rui Abreu, Peter Zoeteweij, Arjan J. C. van Gemund:
Simultaneous debugging of software faults. 573-586 - Vidroha Debroy, W. Eric Wong:
On the estimation of adequate test set size using fault failure rates. 587-602 - Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel:
XML-manipulating test case prioritization for XML-manipulating services. 603-619
- Claudia P. Ayala, Øyvind Hauge, Reidar Conradi, Xavier Franch, Jingyue Li:
Selection of third party software in Off-The-Shelf-based software development - An interview study with industrial practitioners. 620-637 - Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
A policy-based publish/subscribe middleware for sense-and-react applications. 638-654 - Cesare Bartolini, Antonia Bertolino, Sebastian G. Elbaum, Eda Marchetti:
Bringing white-box testing to Service Oriented Architectures through a Service Oriented Approach. 655-668 - Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. 669-678 - Yu-Li Lin, Chien-Lung Hsu:
Secure key management scheme for dynamic hierarchical access control based on ECC. 679-685 - Siffat Ullah Khan, Mahmood Niazi, Rashid Ahmad:
Factors influencing clients in the selection of offshore software outsourcing vendors: An exploratory study using a systematic literature review. 686-699 - Damianos Chatziantoniou, Katerina Pramatari, Yannis Sotiropoulos:
Supporting real-time supply chain decisions based on RFID data streams. 700-710
Volume 84, Number 5, May 2011
- Hui Song, Gang Huang, Franck Chauvel, Yingfei Xiong, Zhenjiang Hu, Yanchun Sun, Hong Mei:
Supporting runtime software architecture: A bidirectional-transformation-based approach. 711-723 - Saraju P. Mohanty, Elias Kougianos:
Real-time perceptual watermarking architectures for video broadcasting. 724-738 - Witold Pedrycz, Barbara Russo, Giancarlo Succi:
A model of job satisfaction for collaborative development processes. 739-752 - Frédérique Robert-Inacio, Alain Trémeau, Mike Fournigault, Yannick Teglia, Pierre-Yvan Liardet:
Shape analysis for power signal cryptanalysis on secure components. 753-762 - Chun-Han Lin, Huang-Chen Lee, Chung-Ta King:
Periphery deployment for wireless sensor systems with guaranteed coverage percentage. 763-774 - Francisco Reyes, Narciso Cerpa, Alfredo Candia-Véjar, Matthew Bardeen:
The optimization of success probability for software projects using genetic algorithms. 775-785 - Peng Liang, Anton Jansen, Paris Avgeriou, Antony Tang, Lai Xu:
Advanced quality prediction model for software architectural knowledge sharing. 786-802 - Ziba Eslami, Jamal Zarepour-Ahmadabadi:
Secret image sharing with authentication-chaining and dynamic embedding. 803-809 - Joaquín Entrialgo, Daniel F. García, Javier García, Manuel García, Pablo Valledor, Mohammad S. Obaidat:
Dynamic adaptation of response-time models for QoS management in autonomic systems. 810-820 - Tolga Ovatman, Thomas Weigert, Feza Buzluca:
Exploring implicit parallelism in class diagrams. 821-834 - Indika Meedeniya, Barbora Buhnova, Aldeida Aleti, Lars Grunske:
Reliability-driven deployment optimization for embedded systems. 835-846 - Jean-Baptiste Fasquel, Johan Moreau:
A design pattern coupling role and component concepts: Application to medical software. 847-863 - Yung-Cheng Ma, Chung-Ping Chung, Tien-Fu Chen:
Load and storage balanced posting file partitioning for parallel information retrieval. 864-884
Volume 84, Number 6, June 2011
- Zhenyu Zhang, W. K. Chan, T. H. Tse, Yuen-Tak Yu, Peifeng Hu:
Non-parametric statistical fault localization. 885-905 - Kun Peng:
An efficient shuffling based eVoting scheme. 906-922 - Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma:
A novel image watermarking in redistributed invariant wavelet domain. 923-929 - W. K. Chan, Yuen Yau Chiu, Yuen-Tak Yu:
A web search-centric approach to recommender systems with URLs as minimal user contexts. 930-941 - Alexandre Torres, Renata de Matos Galante, Marcelo Soares Pimenta:
A synergistic model-driven approach for persistence modeling with UML. 942-957 - Tanja Suomalainen, Outi Salo, Pekka Abrahamsson, Jouni Similä:
Software product roadmapping in a volatile business environment. 958-975 - T. Edagawa, T. Akaike, Yoshiki Higo, Shinji Kusumoto, Shigeo Hanabusa, T. Shibamoto:
Function point measurement from Web application source code based on screen transitions and database accesses. 976-984 - Qinma Kang, Hong He, Hui-Min Song:
Task assignment in heterogeneous computing systems using an effective iterated greedy algorithm. 985-992 - Chien-Ping Chou, Kuen-Fang Jea, Heng-Hsun Liao:
A syntactic approach to twig-query matching on XML streams. 993-1007 - Pedro Sánchez, Manuel Jiménez Buendía, Francisca Rosique, Bárbara Álvarez, Andrés Iborra:
A framework for developing home automation systems: From requirements to code. 1008-1021 - Shih-Lin Wu, Shu-Chia Chen:
An energy-efficient MAC protocol with downlink traffic scheduling strategy in IEEE 802.11 infrastructure WLANs. 1022-1031 - Pedro J. Clemente, Juan Hernández Núñez, José María Conejero, Guadalupe Ortiz:
Managing crosscutting concerns in component based systems using a model driven development approach. 1032-1053 - Marko Palviainen, Antti Evesti, Eila Ovaska:
The reliability estimation, prediction and measuring of component-based software. 1054-1070
Volume 84, Number 7, July 2011
- M. Mustafa Rafique, Ali Raza Butt, Eli Tilevich:
Reusable software components for accelerator-based clusters. 1071-1081 - Robert W. P. Luk:
Scalable, statistical storage allocation for extensible inverted file construction. 1082-1088 - Antonia Bertolino, Guglielmo De Angelis, Alessio Di Sandro, Antonino Sabetta:
Is my model right? Let me ask the expert. 1089-1099 - David Hästbacka, Timo Vepsäläinen, Seppo Kuikka:
Model-driven development of industrial process control applications. 1100-1113 - Komminist Weldemariam, Adolfo Villafiorita:
Procedural security analysis: A methodological approach. 1114-1129 - Abdulhadi Shoufan, Tolga Arul:
A benchmarking environment for performance evaluation of tree-based rekeying algorithms. 1130-1143 - Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain:
Dynamic deployment of context-aware access control policies for constrained security devices. 1144-1159 - Gang Huang, Weihu Wang, Tiancheng Liu, Hong Mei:
Simulation-based analysis of middleware service impact on system reliability: Experiment on Java application server. 1160-1170 - Wes Masri, Hiba Halabi:
An algorithm for capturing variables dependences in test suites. 1171-1190 - Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. 1191-1196 - Tzung-Her Chen, Kai-Hsiang Tsao:
Threshold visual secret sharing by random grids. 1197-1208 - Mosa Elbendak, Paul Vickers, B. Nick Rossiter:
Parsed use case descriptions as a basis for object-oriented class model generation. 1209-1223 - Zhihui Du, Jingkun Hu, Yinong Chen, Zhili Cheng, Xiaoying Wang:
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid. 1224-1232 - Klaus Marius Hansen, Kristjan Jonasson, Helmut Neukirchen:
An empirical study of software architectures' effect on product quality. 1233-1243 - Nikos Kefalakis, John Soldatos, Nikolaos Konstantinou, Neeli R. Prasad:
APDL: A reference XML schema for process-centered definition of RFID solutions. 1244-1259
Volume 84, Number 8, August 2011
- Lixin Han, Hong Yan:
BSN: An automatic generation algorithm of social network data. 1261-1269 - George Kousiouris, Tommaso Cucinotta, Theodora A. Varvarigou:
The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks. 1270-1291 - Tao-Ku Chang, Gwan-Hwan Hwang:
Developing an efficient query system for encrypted XML documents. 1292-1305 - Ruijun Zhang, Jie Lu, Guangquan Zhang:
An information presentation method based on tree-like super entity component. 1306-1318 - C. C. F. Pereira Geovandro, Marcos A. Simplício Jr., Michael Naehrig, Paulo S. L. M. Barreto:
A family of implementation-friendly BN elliptic curves. 1319-1326 - Sergio Ilarri, Carlos Bobed, Eduardo Mena:
An approach to process continuous location-dependent queries on moving objects with support for location granules. 1327-1350 - Ganna Frankova, Magali Seguran, Florian Gilcher, Slim Trabelsi, Jörg Dörflinger, Marco Aiello:
Deriving business processes with service level agreements from early requirements. 1351-1363 - Jin Wook Byun, Dong Hoon Lee:
On a security model of conjunctive keyword search over encrypted relational database. 1364-1372 - D. R. W. Holton, Muhammad Younas, Irfan-Ullah Awan:
Priority scheduling of requests to web portals. 1373-1378 - María José Escalona Cuaresma, Javier J. Gutiérrez, Manuel Mejías, Gustavo Aragón, Isabel M. Ramos, Jesús Torres Valderrama, Francisco José Domínguez Mayo:
An overview on test generation from functional requirements. 1379-1393 - Anil S. Jadhav, Rajendra M. Sonar:
Framework for evaluation and selection of the software packages: A hybrid knowledge based system approach. 1394-1407 - Xiangyang Wang, Pan-Pan Niu, Mingyu Lu:
A robust digital audio watermarking scheme using wavelet moment invariance. 1408-1421
Volume 84, Number 9, September 2011
- Flávio Oquendo, Eltjo R. Poort, Judith A. Stafford:
Guest Editors Introduction to the Special Issue. 1423 - Johan F. Hoorn, Rik Farenhorst, Patricia Lago, Hans van Vliet:
The lonesome architect. 1424-1435 - Yan Liu, Xin Liang, Lingzhi Xu, Mark Staples, Liming Zhu:
Composing enterprise mashup components and services using architecture integration patterns. 1436-1446 - Trosky Boris Callo Arias, Pierre America, Paris Avgeriou:
Defining and documenting execution viewpoints for a large and complex software-intensive system. 1447-1461
- Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. 1462-1470 - Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. 1471-1479 - Ana Sasa, Marjan Krisper:
Enterprise architecture patterns for business process support analysis. 1480-1506 - Ohhoon Kwon, Kern Koh, Jaewoo Lee, Hyokyung Bahn:
FeGC: An efficient garbage collection scheme for flash memory based storage systems. 1507-1523 - Yanchang Zhao, Jie Cao, Chengqi Zhang, Shichao Zhang:
Enhancing grid-density based clustering for high dimensional data. 1524-1539 - Björn Lundell, Brian Lings, Anna Syberfeldt:
Practitioner perceptions of Open Source software in the embedded systems area. 1540-1549 - Soheila Kiani, Mohsen Ebrahimi Moghaddam:
A multi-purpose digital image watermarking using fractal block coding. 1550-1562