


Остановите войну!
for scientists:


default search action
Journal of Systems and Software (JSS), Volume 84
Volume 84, Number 1, January 2011
- Muhammad Younas, Irfan Awan, Makoto Takizawa
:
Special issue on the information networking and services. 1 - Waltenegus Dargie
, Rami Mochaourab
, Alexander Schill, Lin Guan
:
A topology control protocol based on eligibility and efficiency metrics. 2-11 - Mahmoud Moadeli, Wim Vanderbauwhede:
An analytical model of broadcast in QoS-aware wormhole-routed NoCs. 12-20 - Satoshi Ohzahata, Konosuke Kawashima:
An experimental study of peer behavior in a pure P2P network. 21-28 - Yan Yang, Samia Souissi, Xavier Défago
, Makoto Takizawa
:
Fault-tolerant flocking for a group of autonomous mobile robots. 29-36 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min:
Performance analysis of an integrated scheduling scheme in the presence of bursty MMPP traffic. 37-44 - Elhadi M. Shakshuki
, Haroon Malik, Tarek R. Sheltami
:
A comparative study on simulation vs. real time deployment in wireless sensor networks. 45-54 - Fatos Xhafa
, Claudi Paniagua, Leonard Barolli, Santi Caballé
:
Using Grid services to parallelize IBM's Generic Log Adapter. 55-62
- Hong-Quang Nguyen, David Taniar
, J. Wenny Rahayu, Kinh Nguyen:
Double-layered schema integration of heterogeneous XML sources. 63-76 - Mubarak Mohammad, Vangalur S. Alagar:
A formal approach for the specification and verification of trustworthy component-based systems. 77-104 - Osamah M. Al-Qershi
, Bee Ee Khoo
:
High capacity data hiding schemes for medical images based on difference expansion. 105-112 - Hui-Feng Huang, Kuo-Ching Liu:
Efficient key management for preserving HIPAA regulations. 113-119 - Qiong Huang, Guomin Yang
, Duncan S. Wong, Willy Susilo
:
Identity-based strong designated verifier signature revisited. 120-129 - Leonidas Akritidis
, Dimitrios Katsaros, Panayiotis Bozanis:
Effective rank aggregation for metasearching. 130-143 - Eugenio Capra, Chiara Francalanci, Francesco Merlo, Cristina Rossi Lamastra:
Firms' involvement in Open Source projects: A trade-off between software structural quality and popularity. 144-161
- W. Eric Wong, T. H. Tse
, Robert L. Glass, Victor R. Basili, Tsong Yueh Chen
:
An assessment of systems and software engineering scholars and institutions (2003-2007 and 2004-2008). 162-168
Volume 84, Number 2, February 2011
- David Isern
, David Sánchez
, Antonio Moreno
:
Organizational structures supported by agent-oriented methodologies. 169-184 - Ning Gui, Vincenzo De Florio
, Hong Sun
, Chris Blondia:
Toward architecture-based context-aware deployment and adaptation. 185-197 - Paulo S. L. M. Barreto, Rafael Misoczki, Marcos A. Simplício Jr.
:
One-time signature scheme from syndrome decoding over generic error-correcting codes. 198-204 - Shengpu Liu, Liang Cheng
:
A context-aware reflective middleware framework for distributed real-time and embedded systems. 205-218 - Xu An Wang
, Jian Weng, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. 219-225 - Christos V. Samaras, Vassilis Tsaoussidis
:
Adjusting transport segmentation policy of DTN Bundle Protocol under synergy with lower layers. 226-237 - Amir Hossein Ghapanchi
, Aybüke Aurum:
Antecedents to IT personnel's intentions to leave: A systematic literature review. 238-249 - Hossain Shahriar
, Mohammad Zulkernine:
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. 250-269 - Mohammad Azzeh
, Daniel Neagu
, Peter I. Cowling
:
Analogy-based software effort estimation using Fuzzy numbers. 270-284 - Rick Rabiser
, Pádraig O'Leary, Ita Richardson
:
Key activities for product derivation in software product lines. 285-300 - Brian Henderson-Sellers:
Bridging metamodels and ontologies in software engineering. 301-313 - Hai Thanh Mai, Yu Won Lee, Ki Yong Lee, Myoung-Ho Kim:
Distributed adaptive top-k monitoring in wireless sensor networks. 314-327 - Michel dos Santos Soares, Jos L. M. Vrancken, Alexander Verbraeck
:
User requirements modeling and analysis of software-intensive systems. 328-339
Volume 84, Number 3, March 2011
- Mustafa Ulutas
, Güzin Ulutas, Vasif V. Nabiyev:
Medical image security and EPR hiding using Shamir's secret sharing scheme. 341-353 - Xiao Liu
, Zhiwei Ni, Dong Yuan
, Yuan-Chun Jiang, Zhangjun Wu, Jinjun Chen, Yun Yang:
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems. 354-376 - Tianle Zhang, Zhihui Du
, Yinong Chen
, Xiang Ji, Xiaoying Wang
:
Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management. 377-387 - Cheng-Hsing Yang, Sheng-Chang Wu, Shu-Chien Huang
, Yih-Kai Lin:
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes. 388-396 - Gabriele Bavota
, Andrea De Lucia
, Rocco Oliveto:
Identifying Extract Class refactoring opportunities using structural and semantic cohesion measures. 397-414 - Lars M. Karg, Michael Grottke
, Arne Beckhaus:
A systematic literature review of software quality cost research. 415-427 - Chien-Chang Chen
, Yao-Hong Tsai:
Adaptive reversible image watermarking scheme. 428-434 - Wei-Wen Wu:
Mining significant factors affecting the adoption of SaaS using the rough set approach. 435-441 - Brett Dawes, Kwan-Wu Chin
:
A comparison of deterministic and probabilistic methods for indoor localization. 442-451 - Shichao Zhang, Zhi Jin, Xiaofeng Zhu
:
Missing data imputation by utilizing information within incomplete instances. 452-459 - Xu Ma, Lingling Xu, Fangguo Zhang:
Oblivious transfer with timed-release receiver's privacy. 460-464 - Konstantinos I. Karaoglanoglou, Helen D. Karatza:
Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. 465-478 - Chung-Yang Chen, P. Pete Chong:
Software engineering education: A study on conducting collaborative senior project development. 479-491 - Xiao Liu
, Zhiwei Ni, Zhangjun Wu, Dong Yuan
, Jinjun Chen, Yun Yang:
A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems. 492-509 - Robert Baird, Noah Jorgenson, Rose F. Gamble:
Self-adapting workflow reconfiguration. 510-524
Volume 84, Number 4, April 2011
- Byoungju Choi, Richard Lai:
Special issue on the best papers of QSIC 2009. 527 - Seunghun Park, Doo-Hwan Bae:
An approach to analyzing the software process change impact using process slicing and simulation. 528-543 - Xiaoyuan Xie, Joshua Wing Kei Ho
, Christian Murphy, Gail E. Kaiser, Baowen Xu
, Tsong Yueh Chen
:
Testing and validating machine learning classifiers by metamorphic testing. 544-558 - Foutse Khomh, Stéphane Vaucher, Yann-Gaël Guéhéneuc, Houari A. Sahraoui:
BDTEX: A GQM-based Bayesian approach for the detection of antipatterns. 559-572 - Rui Abreu
, Peter Zoeteweij, Arjan J. C. van Gemund:
Simultaneous debugging of software faults. 573-586 - Vidroha Debroy, W. Eric Wong:
On the estimation of adequate test set size using fault failure rates. 587-602 - Lijun Mei, W. K. Chan
, T. H. Tse
, Robert G. Merkel
:
XML-manipulating test case prioritization for XML-manipulating services. 603-619
- Claudia P. Ayala, Øyvind Hauge, Reidar Conradi, Xavier Franch
, Jingyue Li:
Selection of third party software in Off-The-Shelf-based software development - An interview study with industrial practitioners. 620-637 - Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
A policy-based publish/subscribe middleware for sense-and-react applications. 638-654 - Cesare Bartolini, Antonia Bertolino
, Sebastian G. Elbaum, Eda Marchetti
:
Bringing white-box testing to Service Oriented Architectures through a Service Oriented Approach. 655-668 - Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. 669-678 - Yu-Li Lin, Chien-Lung Hsu:
Secure key management scheme for dynamic hierarchical access control based on ECC. 679-685 - Siffat Ullah Khan
, Mahmood Niazi
, Rashid Ahmad:
Factors influencing clients in the selection of offshore software outsourcing vendors: An exploratory study using a systematic literature review. 686-699 - Damianos Chatziantoniou, Katerina Pramatari, Yannis Sotiropoulos:
Supporting real-time supply chain decisions based on RFID data streams. 700-710
Volume 84, Number 5, May 2011
- Hui Song, Gang Huang, Franck Chauvel, Yingfei Xiong
, Zhenjiang Hu, Yanchun Sun, Hong Mei:
Supporting runtime software architecture: A bidirectional-transformation-based approach. 711-723 - Saraju P. Mohanty, Elias Kougianos:
Real-time perceptual watermarking architectures for video broadcasting. 724-738 - Witold Pedrycz, Barbara Russo
, Giancarlo Succi
:
A model of job satisfaction for collaborative development processes. 739-752 - Frédérique Robert-Inacio, Alain Trémeau, Mike Fournigault, Yannick Teglia, Pierre-Yvan Liardet:
Shape analysis for power signal cryptanalysis on secure components. 753-762 - Chun-Han Lin
, Huang-Chen Lee
, Chung-Ta King:
Periphery deployment for wireless sensor systems with guaranteed coverage percentage. 763-774 - Francisco Reyes, Narciso Cerpa
, Alfredo Candia-Véjar
, Matthew Bardeen:
The optimization of success probability for software projects using genetic algorithms. 775-785 - Peng Liang
, Anton Jansen, Paris Avgeriou
, Antony Tang
, Lai Xu
:
Advanced quality prediction model for software architectural knowledge sharing. 786-802 - Ziba Eslami, Jamal Zarepour-Ahmadabadi:
Secret image sharing with authentication-chaining and dynamic embedding. 803-809 - Joaquín Entrialgo
, Daniel F. García
, Javier García, Manuel García, Pablo Valledor, Mohammad S. Obaidat
:
Dynamic adaptation of response-time models for QoS management in autonomic systems. 810-820 - Tolga Ovatman
, Thomas Weigert, Feza Buzluca
:
Exploring implicit parallelism in class diagrams. 821-834 - Indika Meedeniya, Barbora Buhnova
, Aldeida Aleti
, Lars Grunske
:
Reliability-driven deployment optimization for embedded systems. 835-846 - Jean-Baptiste Fasquel, Johan Moreau
:
A design pattern coupling role and component concepts: Application to medical software. 847-863 - Yung-Cheng Ma, Chung-Ping Chung, Tien-Fu Chen:
Load and storage balanced posting file partitioning for parallel information retrieval. 864-884
Volume 84, Number 6, June 2011
- Zhenyu Zhang, W. K. Chan
, T. H. Tse
, Yuen-Tak Yu, Peifeng Hu:
Non-parametric statistical fault localization. 885-905 - Kun Peng:
An efficient shuffling based eVoting scheme. 906-922 - Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma:
A novel image watermarking in redistributed invariant wavelet domain. 923-929 - W. K. Chan
, Yuen Yau Chiu, Yuen-Tak Yu:
A web search-centric approach to recommender systems with URLs as minimal user contexts. 930-941 - Alexandre Torres
, Renata de Matos Galante, Marcelo Soares Pimenta:
A synergistic model-driven approach for persistence modeling with UML. 942-957 - Tanja Suomalainen, Outi Salo, Pekka Abrahamsson
, Jouni Similä:
Software product roadmapping in a volatile business environment. 958-975 - T. Edagawa, T. Akaike, Yoshiki Higo, Shinji Kusumoto, Shigeo Hanabusa, T. Shibamoto:
Function point measurement from Web application source code based on screen transitions and database accesses. 976-984 - Qinma Kang, Hong He, Hui-Min Song:
Task assignment in heterogeneous computing systems using an effective iterated greedy algorithm. 985-992 - Chien-Ping Chou, Kuen-Fang Jea, Heng-Hsun Liao:
A syntactic approach to twig-query matching on XML streams. 993-1007 - Pedro Sánchez
, Manuel Jiménez Buendía
, Francisca Rosique
, Bárbara Álvarez
, Andrés Iborra
:
A framework for developing home automation systems: From requirements to code. 1008-1021 - Shih-Lin Wu
, Shu-Chia Chen:
An energy-efficient MAC protocol with downlink traffic scheduling strategy in IEEE 802.11 infrastructure WLANs. 1022-1031 - Pedro J. Clemente
, Juan Hernández Núñez
, José María Conejero, Guadalupe Ortiz
:
Managing crosscutting concerns in component based systems using a model driven development approach. 1032-1053 - Marko Palviainen, Antti Evesti
, Eila Ovaska
:
The reliability estimation, prediction and measuring of component-based software. 1054-1070
Volume 84, Number 7, July 2011
- M. Mustafa Rafique, Ali Raza Butt
, Eli Tilevich
:
Reusable software components for accelerator-based clusters. 1071-1081 - Robert W. P. Luk
:
Scalable, statistical storage allocation for extensible inverted file construction. 1082-1088 - Antonia Bertolino
, Guglielmo De Angelis, Alessio Di Sandro
, Antonino Sabetta:
Is my model right? Let me ask the expert. 1089-1099 - David Hästbacka, Timo Vepsäläinen, Seppo Kuikka
:
Model-driven development of industrial process control applications. 1100-1113 - Komminist Weldemariam, Adolfo Villafiorita
:
Procedural security analysis: A methodological approach. 1114-1129 - Abdulhadi Shoufan
, Tolga Arul
:
A benchmarking environment for performance evaluation of tree-based rekeying algorithms. 1130-1143 - Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro
, Laurent Toutain:
Dynamic deployment of context-aware access control policies for constrained security devices. 1144-1159 - Gang Huang, Weihu Wang, Tiancheng Liu, Hong Mei:
Simulation-based analysis of middleware service impact on system reliability: Experiment on Java application server. 1160-1170 - Wes Masri, Hiba Halabi:
An algorithm for capturing variables dependences in test suites. 1171-1190 - Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. 1191-1196 - Tzung-Her Chen
, Kai-Hsiang Tsao:
Threshold visual secret sharing by random grids. 1197-1208 - Mosa Elbendak, Paul Vickers
, B. Nick Rossiter:
Parsed use case descriptions as a basis for object-oriented class model generation. 1209-1223 - Zhihui Du
, Jingkun Hu, Yinong Chen
, Zhili Cheng, Xiaoying Wang
:
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid. 1224-1232 - Klaus Marius Hansen, Kristjan Jonasson, Helmut Neukirchen:
An empirical study of software architectures' effect on product quality. 1233-1243 - Nikos Kefalakis
, John Soldatos
, Nikolaos Konstantinou
, Neeli R. Prasad:
APDL: A reference XML schema for process-centered definition of RFID solutions. 1244-1259
Volume 84, Number 8, August 2011
- Lixin Han, Hong Yan
:
BSN: An automatic generation algorithm of social network data. 1261-1269 - George Kousiouris
, Tommaso Cucinotta
, Theodora A. Varvarigou:
The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks. 1270-1291 - Tao-Ku Chang
, Gwan-Hwan Hwang:
Developing an efficient query system for encrypted XML documents. 1292-1305 - Ruijun Zhang, Jie Lu
, Guangquan Zhang
:
An information presentation method based on tree-like super entity component. 1306-1318 - C. C. F. Pereira Geovandro, Marcos A. Simplício Jr.
, Michael Naehrig, Paulo S. L. M. Barreto:
A family of implementation-friendly BN elliptic curves. 1319-1326 - Sergio Ilarri
, Carlos Bobed
, Eduardo Mena
:
An approach to process continuous location-dependent queries on moving objects with support for location granules. 1327-1350 - Ganna Frankova, Magali Seguran, Florian Gilcher, Slim Trabelsi, Jörg Dörflinger, Marco Aiello
:
Deriving business processes with service level agreements from early requirements. 1351-1363 - Jin Wook Byun, Dong Hoon Lee:
On a security model of conjunctive keyword search over encrypted relational database. 1364-1372 - D. R. W. Holton, Muhammad Younas, Irfan-Ullah Awan:
Priority scheduling of requests to web portals. 1373-1378 - María José Escalona Cuaresma
, Javier J. Gutiérrez
, Manuel Mejías
, Gustavo Aragón, Isabel M. Ramos
, Jesús Torres Valderrama
, Francisco José Domínguez Mayo:
An overview on test generation from functional requirements. 1379-1393 - Anil S. Jadhav, Rajendra M. Sonar:
Framework for evaluation and selection of the software packages: A hybrid knowledge based system approach. 1394-1407 - Xiangyang Wang, Pan-Pan Niu, Mingyu Lu:
A robust digital audio watermarking scheme using wavelet moment invariance. 1408-1421
Volume 84, Number 9, September 2011
- Flávio Oquendo, Eltjo Poort, Judith A. Stafford:
Guest Editors Introduction to the Special Issue. 1423 - Johan F. Hoorn
, Rik Farenhorst, Patricia Lago, Hans van Vliet:
The lonesome architect. 1424-1435 - Yan Liu, Xin Liang, Lingzhi Xu, Mark Staples, Liming Zhu
:
Composing enterprise mashup components and services using architecture integration patterns. 1436-1446 - Trosky Boris Callo Arias, Pierre America, Paris Avgeriou
:
Defining and documenting execution viewpoints for a large and complex software-intensive system. 1447-1461
- Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. 1462-1470 - Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. 1471-1479 - Ana Sasa, Marjan Krisper:
Enterprise architecture patterns for business process support analysis. 1480-1506 - Ohhoon Kwon, Kern Koh, Jaewoo Lee, Hyokyung Bahn:
FeGC: An efficient garbage collection scheme for flash memory based storage systems. 1507-1523 - Yanchang Zhao
, Jie Cao, Chengqi Zhang
, Shichao Zhang:
Enhancing grid-density based clustering for high dimensional data. 1524-1539 - Björn Lundell, Brian Lings, Anna Syberfeldt
:
Practitioner perceptions of Open Source software in the embedded systems area. 1540-1549 - Soheila Kiani, Mohsen Ebrahimi Moghaddam:
A multi-purpose digital image watermarking using fractal block coding. 1550-1562 - Celia Gutiérrez, Iván García-Magariño
:
Revealing bullying patterns in multi-agent systems. 1563-1575