


Остановите войну!
for scientists:


default search action
Journal of Systems and Software, Volume 86
Volume 86, Number 1, January 2013
- Hans van Vliet:
Signs of a thriving journal. 1 - Ilenia Fronza
, Alberto Sillitti, Giancarlo Succi
, Mikko Terho, Jelena Vlasenko:
Failure prediction based on log files using Random Indexing and Support Vector Machines. 2-11 - Wan-Shiou Yang, San-Yih Hwang:
iTravel: A recommender system in mobile peer-to-peer environment. 12-20 - Masood Uzzafer:
A simulation model for strategic management process of software projects. 21-37 - Chiu-Mei Chen, Chiao-Min Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images. 38-46 - Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha
:
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. 47-59 - Younho Lee, Il-Hee Kim, Yongsu Park:
Improved multi-precision squaring for low-end RISC microcontrollers. 60-71 - Ming Ying, James Miller:
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. 72-88 - Konstantinos N. Vavliakis, Theofanis K. Grollios, Pericles A. Mitkas:
RDOTE - Publishing Relational Databases into the Semantic Web. 89-99 - Cai-Sen Chen, Tao Wang, YingZhan Kou, XiaoCen Chen, Xiong Li
:
Improvement of trace-driven I-Cache timing attack on the RSA algorithm. 100-107 - Jose M. Lopez-Vega, Javier Povedano-Molina, Gerardo Pardo-Castellote, Juan M. López-Soler
:
A content-aware bridging service for publish/subscribe environments. 108-124 - César Jesús Pardo Calvache
, Francisco J. Pino
, Félix García
, Maria Teresa Baldassarre
, Mario Piattini
:
From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies. 125-143 - Ali Bou Nassif
, Danny Ho, Luiz Fernando Capretz:
Towards an early software estimation using log-linear regression and a multilayer perceptron model. 144-160 - Adrian Fernandez, Silvia Abrahão
, Emilio Insfrán
:
Empirical validation of a usability inspection method for model-driven Web development. 161-186 - Yajun Du, Yufeng Hai:
Semantic ranking of web pages based on formal concept analysis. 187-197 - Wei-Ming Chen, Sheng-Hao Jhang:
Improving Graph Cuts algorithm to transform sequence of stereo image to depth map. 198-210 - Zhijun Wu, Jin Lei, Di Yao, Minghua Wang, Sarhan M. Musa:
Chaos-based detection of LDoS attacks. 211-221 - Guangyong Gao, Guoping Jiang:
A lossless copyright authentication scheme based on Bessel-Fourier moment and extreme learning machine in curvature-feature domain. 222-232 - Faeze Eshragh, Mehdi Kargahi:
Analytical architecture-based performability evaluation of real-time software systems. 233-246
Volume 86, Number 2, February 2013
- Dong Yan, Syed Zubair Ahmad, Dong Yang:
Matthew effect, ABC analysis and project management of scale-free information systems. 247-254 - Xiangyang Wang, Chunpeng Wang, Hong-Ying Yang, Panpan Niu:
A robust blind color image watermarking in quaternion Fourier transform domain. 255-277 - Jose Manuel Redondo
, Francisco Ortin
:
Efficient support of dynamic inheritance for class- and prototype-based languages. 278-301 - Xiaomin Zhu, Rong Ge, Jinguang Sun, Chuan He:
3E: Energy-efficient elastic scheduling for independent tasks in heterogeneous computing systems. 302-314 - Zhi-Hui Wang, Chin-Feng Lee, Ching-Yun Chang:
Histogram-shifting-imitated reversible data hiding. 315-323 - Che-Wei Lee, Wen-Hsiang Tsai:
A covert communication method via spreadsheets by secret sharing with a self-authentication capability. 324-334 - Hung-Hsu Tsai
, Yen-Shou Lai, Shih-Che Lo
:
A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. 335-348 - George Kakarontzas
, Eleni Constantinou, Apostolos Ampatzoglou, Ioannis Stamelos:
Layer assessment of object-oriented software: A metric facilitating white-box reuse. 349-366 - Yuebin Bai, Yao Ma, Cheng Luo, Duo Lv, Yuanfeng Peng:
A high performance inter-domain communication approach for virtual machines. 367-376 - Shin Hong, Moonzoo Kim:
Effective pattern-driven concurrency bug detection for operating systems. 377-388 - Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. 389-402 - Rômulo Silva de Oliveira
, Andreu Carminati
, Renan Augusto Starke:
On using adversary simulators to evaluate global fixed-priority and FPZL scheduling of multiprocessors. 403-411 - Kevin Lano, Shekoufeh Kolahdouz Rahimi:
Constraint-based specification of model transformations. 412-436 - Ming-Chin Chuang, Jeng Farn Lee:
SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. 437-448 - Patricia López Martínez, Laura Barros, José M. Drake:
Design of component-based real-time applications. 449-467 - Yin Yang, Zhi-hu Tan, Jiguang Wan, Changsheng Xie, Jie Yu, Jian He:
A reliability optimization method for RAID-structured storage systems based on active data migration. 468-484 - Mustafa Ulutas
, Güzin Ulutas, Vasif V. Nabiyev:
Invertible secret image sharing for gray level and dithered cover images. 485-500 - Kutila Gunasekera, Arkady B. Zaslavsky, Shonali Krishnaswamy, Seng Wai Loke:
Building ubiquitous computing applications using the VERSAG adaptive agent framework. 501-519 - Elena del Val Noguera
, Miguel Rebollo
, Vicente J. Botti
:
Promoting cooperation in service-oriented MAS through social plasticity and incentives. 520-537 - Wilson Rosa, Travis Packard, Abishek Krupanand, James W. Bilbro, Max M. Hodal:
COTS integration and estimation for ERP. 538-550 - Philip Langer, Manuel Wimmer, Petra Brosch, Markus Herrmannsdörfer, Martina Seidl, Konrad Wieland, Gerti Kappel:
A posteriori operation detection in evolving software models. 551-566 - Wei-Jen Yang, Kuo-Liang Chung, Hong-Yuan Mark Liao, Wen-Kuang Yu:
Efficient reversible data hiding algorithm based on gradient-based edge direction prediction. 567-580 - Wei-Kuei Chen:
Image sharing method for gray-level images. 581-585
Volume 86, Number 3, March 2013
- Majdi Abdellatief
, Abu Bakar Md Sultan
, Abdul Azim Abdul Ghani, Marzanah A. Jabar
:
A mapping study to investigate component-based software system metrics. 587-603 - Tseng-Jung Lin, Kuo-Liang Chung, Po-Chun Chang, Yong-Huai Huang, Hong-Yuan Mark Liao, Chiung-Yao Fang
:
An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. 604-614 - Fatemeh Nori, Mahmood Deypir, Mohammad Hadi Sadreddini:
A sliding window based algorithm for frequent closed itemset mining over data streams. 615-623 - Pasqualina Potena:
Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff. 624-648 - María del Carmen Suárez Torrente
, Ana Belén Martínez Prieto, Darío Álvarez Gutiérrez, M. Elena Alva de Sagastegui:
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website. 649-663 - Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu
, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. 664-676 - Michael J. Laszlo, Sumitra Mukherjee:
Optimal univariate microaggregation with data suppression. 677-682 - Andrzej Zalewski
, Szymon Kijas:
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems. 683-697 - C. C. F. Pereira Geovandro, Mateus A. S. Santos, Bruno Trevizan de Oliveira, Marcos A. Simplício Jr.
, Paulo S. L. M. Barreto, Cíntia B. Margi
, Wilson Vicente Ruggiero
:
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission. 698-706 - Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. 707-715 - Li-Chin Huang, Lin-Yu Tseng
, Min-Shiang Hwang:
A reversible data hiding method by histogram shifting in high quality medical images. 716-727 - Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. 728-743 - Yifeng Luo, Siqiang Luo
, Jihong Guan, Shuigeng Zhou:
A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation. 744-750 - Jemal H. Abawajy:
SQLIA detection and prevention approach for RFID systems. 751-758 - Ying-Ho Liu, Chun-Sheng Wang:
Constrained frequent pattern mining on univariate uncertain data. 759-778 - Ya-Han Hu
, Tony Cheng-Kui Huang, Yu-Hua Kao:
Knowledge discovery of weighted RFM sequential patterns from customer sequence databases. 779-788 - Jenn-Wei Lin, Jian-Yan Zhuang:
A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks. 789-800 - Chung-Yuan Huang, Chun-Liang Lee, Tzai-Hung Wen
, Chuen-Tsai Sun:
A computer virus spreading model based on resource limitations and interaction costs. 801-808 - Marc Chaumont
, William Puech
, Christian Lahanier:
Securing color information of an image by concealing the color palette. 809-825 - Hongjun Liu
, Xingyuan Wang:
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. 826-834 - Mohamed Sellami
, Olfa Bouchaala, Walid Gaaloul
, Samir Tata:
Communities of Web service registries: Construction and management. 835-853 - Yepang Liu
, Chang Xu, S. C. Cheung
:
AFChecker: Effective model checking for context-aware adaptive applications. 854-867 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:
Corrigendum to "A variable-length model for masquerade detection" [J. Syst. Softw. 85(2012) 2470-2478]. 868
Volume 86, Number 4, April 2013
- Alessandro Garcia:
Software Engineering in Brazil: Retrospective and prospective views. 869-871 - Paulo Anselmo da Mota Silveira Neto, Joás Sousa Gomes, Eduardo Santana de Almeida, Jair Cavalcanti Leite, Thaís Vasconcelos Batista
, Larissa Leite:
25 years of software engineering in Brazil: Beyond an insider's view. 872-889 - Carlos José Pereira de Lucena, Ingrid Nunes
:
Contributions to the emergence and consolidation of Agent-oriented Software Engineering. 890-904 - Uirá Kulesza, Sérgio Soares
, Christina Chavez
, Fernando Castor
, Paulo Borba
, Carlos José Pereira de Lucena, Paulo César Masiero, Cláudio Sant'Anna, Fabiano Cutigi Ferrari, Vander Alves
, Roberta Coelho, Eduardo Figueiredo, Paulo F. Pires
, Flávia Coimbra Delicato, Eduardo Piveta
, Carla T. L. L. Silva, Valter Vieira de Camargo, Rosana T. V. Braga
, Julio Leite, Otávio Lemos
, Nabor C. Mendonça
, Thaís Vasconcelos Batista
, Rodrigo Bonifácio
, Nélio Cacho
, Lyrene Fernandes da Silva
, Arndt von Staa, Fábio Fagundes Silveira, Marco Túlio Valente
, Fernanda M. R. Alencar
, Jaelson Castro, Ricardo Argenton Ramos
, Rosângela A. D. Penteado, Cecília M. F. Rubira
:
The crosscutting impact of the AOSD Brazilian research community. 905-933 - Vinicius Humberto Serapilha Durelli, Rodrigo Fraxino Araujo, Marco Aurélio Graciotto Silva
, Rafael Alves Paes de Oliveira, José Carlos Maldonado, Márcio Eduardo Delamaro:
A scoping study on the 25 years of research into software testing in Brazil and an outlook on the future of the area. 934-950 - Otávio Augusto Lazzarini Lemos
, Fabiano Cutigi Ferrari, Marcelo Medeiros Eler
, José Carlos Maldonado, Paulo César Masiero:
Evaluation studies of software testing research in Brazil and in the world: A survey of two premier software engineering conferences. 951-969 - Thelma Elita Colanzi, Silvia Regina Vergilio, Wesley Klewerton Guez Assunção
, Aurora T. R. Pozo
:
Search Based Software Engineering: Review and analysis of the field in Brazil. 970-984 - Elisa Yumi Nakagawa
, Pablo Oliveira Antonino, Martin Becker, José Carlos Maldonado, Holger Storf, Karina Villela, H. Dieter Rombach:
Relevance and perspectives of AAL in Brazil. 985-996 - Luciane Telinski Wiedermann Agner, Inali Wisniewski Soares, Paulo Cézar Stadzisz, Jean Marcelo Simão
:
A Brazilian survey on UML and model-driven practices for embedded software development. 997-1005 - Gustavo Soares, Rohit Gheyi
, Emerson R. Murphy-Hill, Brittany Johnson:
Comparing approaches to analyze refactoring activity on software repositories. 1006-1022 - Marcelo de Almeida Maia, Raquel Fialho de Queiroz Lafetá:
On the impact of trace-based feature location in the performance of software maintainers. 1023-1037 - Leopoldo Teixeira, Paulo Borba
, Rohit Gheyi
:
Safe composition of configuration knowledge-based software product lines. 1038-1053
- Darja Smite, Claes Wohlin
, Aybüke Aurum, Ronald Jabangwe, Emil Numminen:
Offshore insourcing in software development: Structuring the decision-making process. 1054-1067 - Xiaotian Wu, Wei Sun:
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. 1068-1088 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Petri net based techniques for constructing reliable service composition. 1089-1106 - Saad Liaquat Kiani, Ashiq Anjum
, Michael Knappmeyer, Nik Bessis
, Nikolaos Antonopoulos:
Federated broker system for pervasive context provisioning. 1107-1123 - Christian Raspotnig, Andreas L. Opdahl
:
Comparing risk identification techniques for safety and security requirements. 1124-1151
Volume 86, Number 5, May 2013
- Julio Ariel Hurtado Alegria
, María Cecilia Bastarrica, Sergio F. Ochoa, Jocelyn Simmonds
:
MDE software process lines in small companies. 1153-1171 - Iuri Santos Souza, Gecynalda Soares da Silva Gomes, Paulo Anselmo da Mota Silveira Neto, Ivan do Carmo Machado, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
Evidence of software inspection on feature specification for software product lines. 1172-1190 - Ankur Pachauri, Gursaran Srivastava:
Automated test data generation for branch testing using genetic algorithm: An improved approach using branch ordering, memory and elitism. 1191-1208 - Mohammad Saeed Abou Trab
, Michael J. Brockway, Steve Counsell, Robert M. Hierons
:
Testing Real-Time Embedded Systems using Timed Automata based approaches. 1209-1223 - Ya-Han Hu
, Fan Wu, Yi-Jiun Liao:
An efficient tree-based algorithm for mining sequential patterns with multiple minimum supports. 1224-1238 - Eduardo Martins Guerra
, Felipe Alves
, Uirá Kulesza, Clovis Torres Fernandes:
A reference architecture for organizing the internal structure of metadata-based frameworks. 1239-1256 - Dingyu Yang, Jian Cao, Jiwen Fu, Jie Wang, Jianmei Guo:
A pattern fusion model for multi-step-ahead CPU load prediction. 1257-1266 - Tzung-Her Chen
, Yao-Sheng Lee, Wei-Lun Huang, Justie Su-tzu Juan
, Ying-Yu Chen, Ming-Jheng Li:
Quality-adaptive visual secret sharing by random grids. 1267-1274 - Darko Durisic
, Martin Nilsson, Miroslaw Staron, Jörgen Hansson:
Measuring the impact of changes to the complexity and coupling properties of automotive software systems. 1275-1293 - Konstantinos Manikas
, Klaus Marius Hansen:
Software ecosystems - A systematic literature review. 1294-1306 - Qing Gu, Félix Cuadrado
, Patricia Lago, Juan C. Dueñas:
3D architecture viewpoints on service automation. 1307-1322 - Hyung-Ju Cho:
Continuous range k-nearest neighbor queries in vehicular ad hoc networks. 1323-1332 - Maya Daneva
, Egbert van der Veen, Chintan Amrit
, Smita Ghaisas, Klaas Sikkel, Ramesh Kumar, Nirav Ajmeri
, Uday Ramteerthkar, Roel J. Wieringa:
Agile requirements prioritization in large-scale outsourced system projects: An empirical study. 1333-1353 - Vahid Garousi
, Junji Zhi:
A survey of software testing practices in Canada. 1354-1376 - Jeanne Chen, Chih-Wei Shiu
, Mei-Chen Wu:
An improvement of diamond encoding using characteristic value positioning and modulus function. 1377-1383 - Qiuzhen Lin
, Kwok-Wo Wong, Jianyong Chen:
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. 1384-1389 - Henry Edison
, Nauman Bin Ali
, Richard Torkar:
Towards innovation measurement in the software industry. 1390-1407 - Liang Huai Yang
, Jian Zhou, Weihua Gong, Jiakui Zhao, Lijun Chen:
Lifetime and QoS-aware energy-saving buffering schemes. 1408-1425 - Licia Sbattella, Roberto Tedesco
:
A novel semantic information retrieval system based on a three-level domain model. 1426-1452 - Jamie Y. T. Chang, Eric T. G. Wang, James J. Jiang, Gary Klein:
Controlling ERP consultants: Client and provider practices. 1453-1461 - Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. 1462-1463
Volume 86, Number 6, June 2013
- Nameer N. El-Emam
, Rasheed Abdul Shaheed Al-Zubidy:
New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. 1465-1481 - Santiago A. Vidal
, Claudia A. Marcos:
Toward automated refactoring of crosscutting concerns into aspects. 1482-1497 - Edith Tom, Aybüke Aurum, Richard T. Vidgen
:
An exploration of technical debt. 1498-1516 - Carlos R. Rivero
, Inma Hernández
, David Ruiz
, Rafael Corchuelo
:
MostoDE: A tool to exchange data amongst semantic-web ontologies. 1517-1529 - Azlan B. Ismail
, Jun Yan
, Jun Shen
:
Incremental service level agreements violation handling with time impact analysis. 1530-1544 - Uwe van Heesch, Paris Avgeriou
, Antony Tang
:
Does decision documentation help junior designers rationalize their decisions? A comparative multiple-case study. 1545-1565 - Georgios Kellaris
, Nikos Pelekis, Yannis Theodoridis
:
Map-matched trajectory compression. 1566-1579 - Md. Saiful Islam
, Chengfei Liu
, Rui Zhou
:
A framework for query refinement with user feedback. 1580-1595 - Charalabos Skianis
:
Introducing automated procedures in 3G network planning and optimization. 1596-1602 - Chun-Sheng Wang, Ying-Ho Liu, Kuo-Chung Chu
:
Closed inter-sequence pattern mining. 1603-1612 - Domenico Cotroneo, Roberto Pietrantuono
, Stefano Russo
:
Testing techniques selection based on ODC fault types and software metrics. 1613-1637 - Baiying Lei
, Insu Song, Shah Atiqur Rahman:
Robust and secure watermarking scheme for breath sound. 1638-1649 - Jaime Chen, Manuel Díaz
, Bartolomé Rubio
, José M. Troya:
PS-QUASAR: A publish/subscribe QoS aware middleware for Wireless Sensor and Actor Networks. 1650-1662 - Dragan Stankovic, Vesna Nikolic, Miodrag Djordjevic
, Dac-Buu Cao:
A survey study of critical success factors in agile software projects in former Yugoslavia IT companies. 1663-1678 - Fangda Wang, Hongzhi Wang
, Jianzhong Li, Hong Gao:
Graph-based reference table construction to facilitate entity matching. 1679-1688 - Ejike Ofuonye, James Miller:
Securing web-clients with instrumented code and dynamic runtime monitoring. 1689-1711