callback( { "result":{ "query":":facetid:toc:\"db/journals/jss/jss80.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"69.39" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"160", "@dc":"160", "@oc":"160", "@id":"43472078", "text":":facetid:toc:db/journals/jss/jss80.bht" } }, "hits":{ "@total":"160", "@computed":"160", "@sent":"160", "@first":"0", "hit":[{ "@score":"1", "@id":"5484239", "info":{"authors":{"author":[{"@pid":"42/2612","text":"Marwan Abi-Antoun"},{"@pid":"67/6837","text":"Jonathan Aldrich"},{"@pid":"24/1456","text":"Wesley Coelho"}]},"title":"A case study in re-engineering to enforce architectural control flow and data sharing.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"240-264","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Abi-AntounAC07","doi":"10.1016/J.JSS.2006.10.036","ee":"https://doi.org/10.1016/j.jss.2006.10.036","url":"https://dblp.org/rec/journals/jss/Abi-AntounAC07"}, "url":"URL#5484239" }, { "@score":"1", "@id":"5484240", "info":{"authors":{"author":[{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"45/1198","text":"Mohammad Zulkernine"},{"@pid":"30/1317","text":"Steven T. Wolfe"}]},"title":"A software-based trust framework for distributed industrial management systems.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1621-1630","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AhamedZW07","doi":"10.1016/J.JSS.2007.01.043","ee":"https://doi.org/10.1016/j.jss.2007.01.043","url":"https://dblp.org/rec/journals/jss/AhamedZW07"}, "url":"URL#5484240" }, { "@score":"1", "@id":"5484241", "info":{"authors":{"author":[{"@pid":"51/331","text":"Faheem Ahmed"},{"@pid":"c/LuizFernandoCapretz","text":"Luiz Fernando Capretz"},{"@pid":"93/1135","text":"Shahbaz Ali Sheikh"}]},"title":"Institutionalization of software product line: An empirical investigation of key organizational factors.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"836-849","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AhmedCS07","doi":"10.1016/J.JSS.2006.09.010","ee":"https://doi.org/10.1016/j.jss.2006.09.010","url":"https://dblp.org/rec/journals/jss/AhmedCS07"}, "url":"URL#5484241" }, { "@score":"1", "@id":"5484242", "info":{"authors":{"author":[{"@pid":"55/3416","text":"Samuel Ajila"},{"@pid":"80/6389","text":"Razvan T. Dumitrescu"}]},"title":"Experimental use of code delta, code churn, and rate of change to understand software product line evolution.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"74-91","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AjilaD07","doi":"10.1016/J.JSS.2006.05.034","ee":"https://doi.org/10.1016/j.jss.2006.05.034","url":"https://dblp.org/rec/journals/jss/AjilaD07"}, "url":"URL#5484242" }, { "@score":"1", "@id":"5484243", "info":{"authors":{"author":[{"@pid":"55/3416","text":"Samuel Ajila"},{"@pid":"52/328","text":"Di Wu"}]},"title":"Empirical study of the effects of open source adoption on software development economics.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1517-1529","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AjilaW07","doi":"10.1016/J.JSS.2007.01.011","ee":"https://doi.org/10.1016/j.jss.2007.01.011","url":"https://dblp.org/rec/journals/jss/AjilaW07"}, "url":"URL#5484243" }, { "@score":"1", "@id":"5484244", "info":{"authors":{"author":[{"@pid":"90/3070","text":"Mikael Åkerholm"},{"@pid":"21/588","text":"Jan Carlson"},{"@pid":"51/2450","text":"Johan Fredriksson"},{"@pid":"65/1154","text":"Hans Hansson"},{"@pid":"09/6977","text":"John Håkansson"},{"@pid":"00/8134","text":"Anders Möller"},{"@pid":"77/4503","text":"Paul Pettersson"},{"@pid":"t/MassimoTivoli","text":"Massimo Tivoli"}]},"title":"The SAVE approach to component-based development of vehicular systems.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"655-667","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AkerholmCFHHMPT07","doi":"10.1016/J.JSS.2006.08.016","ee":"https://doi.org/10.1016/j.jss.2006.08.016","url":"https://dblp.org/rec/journals/jss/AkerholmCFHHMPT07"}, "url":"URL#5484244" }, { "@score":"1", "@id":"5484245", "info":{"authors":{"author":[{"@pid":"55/4452","text":"Lana S. Al-Salem"},{"@pid":"42/2868","text":"Ala Abu-Samaha"}]},"title":"Eliciting Web application requirements - an industrial case study.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"294-313","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Al-SalemA07","doi":"10.1016/J.JSS.2006.05.005","ee":"https://doi.org/10.1016/j.jss.2006.05.005","url":"https://dblp.org/rec/journals/jss/Al-SalemA07"}, "url":"URL#5484245" }, { "@score":"1", "@id":"5484246", "info":{"authors":{"author":[{"@pid":"07/5736","text":"Christos Anagnostopoulos"},{"@pid":"19/1500","text":"Y. Ntarladimas"},{"@pid":"39/3808","text":"Stathes Hadjiefthymiades"}]},"title":"Situational computing: An innovative architecture with imprecise reasoning.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"1993-2014","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AnagnostopoulosNH07","doi":"10.1016/J.JSS.2007.03.003","ee":"https://doi.org/10.1016/j.jss.2007.03.003","url":"https://dblp.org/rec/journals/jss/AnagnostopoulosNH07"}, "url":"URL#5484246" }, { "@score":"1", "@id":"5484247", "info":{"authors":{"author":[{"@pid":"99/5728","text":"Alberto Avritzer"},{"@pid":"70/299","text":"Andre B. Bondi"},{"@pid":"55/1672","text":"Elaine J. Weyuker"}]},"title":"Ensuring system performance for cluster and single server systems.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"441-454","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/AvritzerBW07","doi":"10.1016/J.JSS.2006.07.020","ee":"https://doi.org/10.1016/j.jss.2006.07.020","url":"https://dblp.org/rec/journals/jss/AvritzerBW07"}, "url":"URL#5484247" }, { "@score":"1", "@id":"5484248", "info":{"authors":{"author":[{"@pid":"03/1909","text":"Muhammad Ali Babar 0001"},{"@pid":"v/JuneMVerner","text":"June M. Verner"},{"@pid":"34/12","text":"Phong Thanh Nguyen"}]},"title":"Establishing and maintaining trust in software outsourcing relationships: An empirical investigation.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1438-1449","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/BabarVN07","doi":"10.1016/J.JSS.2006.10.038","ee":"https://doi.org/10.1016/j.jss.2006.10.038","url":"https://dblp.org/rec/journals/jss/BabarVN07"}, "url":"URL#5484248" }, { "@score":"1", "@id":"5484249", "info":{"authors":{"author":[{"@pid":"42/4775","text":"Simona Bernardi 0001"},{"@pid":"96/1916","text":"José Merseguer"}]},"title":"Performance evaluation of UML design with Stochastic Well-formed Nets.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1843-1865","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/BernardiM07","doi":"10.1016/J.JSS.2007.02.029","ee":"https://doi.org/10.1016/j.jss.2007.02.029","url":"https://dblp.org/rec/journals/jss/BernardiM07"}, "url":"URL#5484249" }, { "@score":"1", "@id":"5484250", "info":{"authors":{"author":[{"@pid":"21/4595","text":"Pearl Brereton"},{"@pid":"k/BarbaraAKitchenham","text":"Barbara A. Kitchenham"},{"@pid":"01/338","text":"David Budgen"},{"@pid":"46/2999-1","text":"Mark Turner 0001"},{"@pid":"45/2489","text":"Mohamed Khalil"}]},"title":"Lessons from applying the systematic literature review process within the software engineering domain.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"571-583","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/BreretonKBTK07","doi":"10.1016/J.JSS.2006.07.009","ee":"https://doi.org/10.1016/j.jss.2006.07.009","url":"https://dblp.org/rec/journals/jss/BreretonKBTK07"}, "url":"URL#5484250" }, { "@score":"1", "@id":"5484251", "info":{"authors":{"author":[{"@pid":"71/5252","text":"Kai-Yuan Cai"},{"@pid":"02/213","text":"Bo Gu"},{"@pid":"99/5658","text":"Hai Hu"},{"@pid":"88/6351","text":"Yong-Chao Li"}]},"title":"Adaptive software testing with fixed-memory feedback.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1328-1348","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CaiGHL07","doi":"10.1016/J.JSS.2006.11.008","ee":"https://doi.org/10.1016/j.jss.2006.11.008","url":"https://dblp.org/rec/journals/jss/CaiGHL07"}, "url":"URL#5484251" }, { "@score":"1", "@id":"5484252", "info":{"authors":{"author":[{"@pid":"63/4434","text":"Gerardo Canfora"},{"@pid":"51/933","text":"Aniello Cimitile"},{"@pid":"18/8313-1","text":"Félix García 0001"},{"@pid":"p/MPiattini","text":"Mario Piattini"},{"@pid":"38/2506","text":"Corrado Aaron Visaggio"}]},"title":"Evaluating performances of pair designing in industry.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1317-1327","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CanforaCCPV07","doi":"10.1016/J.JSS.2006.11.004","ee":"https://doi.org/10.1016/j.jss.2006.11.004","url":"https://dblp.org/rec/journals/jss/CanforaCCPV07"}, "url":"URL#5484252" }, { "@score":"1", "@id":"5484253", "info":{"authors":{"author":[{"@pid":"c/MauroCaporuscio","text":"Mauro Caporuscio"},{"@pid":"m/AntiniscaDiMarco","text":"Antinisca Di Marco"},{"@pid":"i/PaolaInverardi","text":"Paola Inverardi"}]},"title":"Model-based system reconfiguration for dynamic performance management.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"455-473","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CaporuscioMI07","doi":"10.1016/J.JSS.2006.07.039","ee":"https://doi.org/10.1016/j.jss.2006.07.039","url":"https://dblp.org/rec/journals/jss/CaporuscioMI07"}, "url":"URL#5484253" }, { "@score":"1", "@id":"5484254", "info":{"authors":{"author":[{"@pid":"46/295","text":"Aniello Castiglione"},{"@pid":"19/4614","text":"Alfredo De Santis"},{"@pid":"57/1338","text":"Claudio Soriente"}]},"title":"Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"750-764","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CastiglioneSS07","doi":"10.1016/J.JSS.2006.07.006","ee":"https://doi.org/10.1016/j.jss.2006.07.006","url":"https://dblp.org/rec/journals/jss/CastiglioneSS07"}, "url":"URL#5484254" }, { "@score":"1", "@id":"5484255", "info":{"authors":{"author":[{"@pid":"c/CCavanaugh","text":"Charles Cavanaugh"},{"@pid":"61/4638","text":"Frank Drews"},{"@pid":"42/2483","text":"Lonnie R. Welch"}]},"title":"Guest Editor's introduction.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"935-937","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CavanaughDW07","doi":"10.1016/J.JSS.2006.09.032","ee":"https://doi.org/10.1016/j.jss.2006.09.032","url":"https://dblp.org/rec/journals/jss/CavanaughDW07"}, "url":"URL#5484255" }, { "@score":"1", "@id":"5484256", "info":{"authors":{"author":[{"@pid":"38/388","text":"Davide Cerri"},{"@pid":"62/2392","text":"Alfonso Fuggetta"}]},"title":"Open standards, open formats, and open source.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1930-1937","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CerriF07","doi":"10.1016/J.JSS.2007.01.048","ee":"https://doi.org/10.1016/j.jss.2007.01.048","url":"https://dblp.org/rec/journals/jss/CerriF07"}, "url":"URL#5484256" }, { "@score":"1", "@id":"5484257", "info":{"authors":{"author":[{"@pid":"65/4341","text":"Tarak Chaari"},{"@pid":"80/4901","text":"Dejene Ejigu"},{"@pid":"05/1259","text":"Frédérique Laforest"},{"@pid":"17/3003","text":"Vasile-Marian Scuturici"}]},"title":"A comprehensive approach to model and use context for adapting applications in pervasive environments.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"1973-1992","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChaariELS07","doi":"10.1016/J.JSS.2007.03.010","ee":"https://doi.org/10.1016/j.jss.2007.03.010","url":"https://dblp.org/rec/journals/jss/ChaariELS07"}, "url":"URL#5484257" }, { "@score":"1", "@id":"5484258", "info":{"authors":{"author":[{"@pid":"13/685","text":"Ching-Pao Chang"},{"@pid":"99/5296","text":"Chih-Ping Chu"}]},"title":"Defect prevention in software processes: An action-based approach.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"559-570","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChangC07","doi":"10.1016/J.JSS.2006.09.009","ee":"https://doi.org/10.1016/j.jss.2006.09.009","url":"https://dblp.org/rec/journals/jss/ChangC07"}, "url":"URL#5484258" }, { "@score":"1", "@id":"5484259", "info":{"authors":{"author":[{"@pid":"33/3869","text":"Hsung-Pin Chang"},{"@pid":"c/RayIChang","text":"Ray-I Chang"},{"@pid":"16/5006","text":"Wei-Kuan Shih"},{"@pid":"43/374","text":"Ruei-Chuan Chang"}]},"title":"GSR: A global seek-optimizing real-time disk-scheduling algorithm.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"198-215","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChangCSC07","doi":"10.1016/J.JSS.2006.03.045","ee":"https://doi.org/10.1016/j.jss.2006.03.045","url":"https://dblp.org/rec/journals/jss/ChangCSC07"}, "url":"URL#5484259" }, { "@score":"1", "@id":"5484260", "info":{"authors":{"author":[{"@pid":"20/804","text":"Tao-Ku Chang"},{"@pid":"09/4039","text":"Gwan-Hwan Hwang"}]},"title":"The design and implementation of an application program interface for securing XML documents.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1362-1374","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChangH07","doi":"10.1016/J.JSS.2006.10.051","ee":"https://doi.org/10.1016/j.jss.2006.10.051","url":"https://dblp.org/rec/journals/jss/ChangH07"}, "url":"URL#5484260" }, { "@score":"1", "@id":"5484261", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"39/3024","text":"Yu-Chiang Li"},{"@pid":"48/4907","text":"Wen-Hung Huang"}]},"title":"TFRP: An efficient microaggregation algorithm for statistical disclosure control.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1866-1878","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChangLH07","doi":"10.1016/J.JSS.2007.02.014","ee":"https://doi.org/10.1016/j.jss.2007.02.014","url":"https://dblp.org/rec/journals/jss/ChangLH07"}, "url":"URL#5484261" }, { "@score":"1", "@id":"5484262", "info":{"authors":{"author":[{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"52/2421","text":"Fangguo Zhang"},{"@pid":"22/2080-1","text":"Shengli Liu 0001"}]},"title":"ID-based restrictive partially blind signatures and applications.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"164-171","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChenZL07","doi":"10.1016/J.JSS.2006.02.046","ee":"https://doi.org/10.1016/j.jss.2006.02.046","url":"https://dblp.org/rec/journals/jss/ChenZL07"}, "url":"URL#5484262" }, { "@score":"1", "@id":"5484263", "info":{"authors":{"author":[{"@pid":"78/1490","text":"Tsung-Hsi Chiang"},{"@pid":"60/2363","text":"Lan-Rong Dung"}]},"title":"Verification method of dataflow algorithms in high-level synthesis.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1256-1270","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChiangD07","doi":"10.1016/J.JSS.2006.12.547","ee":"https://doi.org/10.1016/j.jss.2006.12.547","url":"https://dblp.org/rec/journals/jss/ChiangD07"}, "url":"URL#5484263" }, { "@score":"1", "@id":"5484264", "info":{"authors":{"author":[{"@pid":"05/1609","text":"Nan-Hsing Chiu"},{"@pid":"73/6873","text":"Sun-Jen Huang"}]},"title":"The adjusted analogy-based software effort estimation based on similarity distances.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"628-640","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ChiuH07","doi":"10.1016/J.JSS.2006.06.006","ee":"https://doi.org/10.1016/j.jss.2006.06.006","url":"https://dblp.org/rec/journals/jss/ChiuH07"}, "url":"URL#5484264" }, { "@score":"1", "@id":"5484265", "info":{"authors":{"author":[{"@pid":"44/4467","text":"Franco Cicirelli"},{"@pid":"94/6215","text":"Angelo Furfaro"},{"@pid":"85/5567","text":"Libero Nigro"}]},"title":"Exploiting agents for modelling and simulation of coverage control protocols in large sensor networks.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1817-1832","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CicirelliFN07","doi":"10.1016/J.JSS.2007.02.015","ee":"https://doi.org/10.1016/j.jss.2007.02.015","url":"https://dblp.org/rec/journals/jss/CicirelliFN07"}, "url":"URL#5484265" }, { "@score":"1", "@id":"5484266", "info":{"authors":{"author":[{"@pid":"22/4401","text":"Richard D. Corbin"},{"@pid":"41/957","text":"Christopher B. Dunbar"},{"@pid":"69/1405","text":"Qiuming Zhu"}]},"title":"A three-tier knowledge management scheme for software engineering support and innovation.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1494-1505","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CorbinDZ07","doi":"10.1016/J.JSS.2007.01.013","ee":"https://doi.org/10.1016/j.jss.2007.01.013","url":"https://dblp.org/rec/journals/jss/CorbinDZ07"}, "url":"URL#5484266" }, { "@score":"1", "@id":"5484267", "info":{"authors":{"author":[{"@pid":"64/2768-1","text":"Miguel Correia 0001"},{"@pid":"24/4061","text":"Nuno Ferreira Neves"},{"@pid":"65/85","text":"Lau Cheuk Lung"},{"@pid":"v/PauloVerissimo","text":"Paulo Veríssimo"}]},"title":"Worm-IT - A wormhole-based intrusion-tolerant group communication system.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"178-197","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CorreiaNLV07","doi":"10.1016/J.JSS.2006.03.034","ee":"https://doi.org/10.1016/j.jss.2006.03.034","url":"https://dblp.org/rec/journals/jss/CorreiaNLV07"}, "url":"URL#5484267" }, { "@score":"1", "@id":"5484268", "info":{"authors":{"author":[{"@pid":"26/3865","text":"Hélio R. Costa"},{"@pid":"36/2479","text":"Márcio de Oliveira Barros"},{"@pid":"t/GuilhermeTravassos","text":"Guilherme Horta Travassos"}]},"title":"Evaluating software project portfolio risks.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"16-31","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CostaBT07","doi":"10.1016/J.JSS.2006.03.038","ee":"https://doi.org/10.1016/j.jss.2006.03.038","url":"https://dblp.org/rec/journals/jss/CostaBT07"}, "url":"URL#5484268" }, { "@score":"1", "@id":"5484269", "info":{"authors":{"author":[{"@pid":"23/5600","text":"Karl Cox"},{"@pid":"78/2956","text":"Steven J. Bleistein"},{"@pid":"v/JuneMVerner","text":"June M. Verner"},{"@pid":"43/266","text":"Alan M. Davis"}]},"title":"REBNITA'05 - 1st International Workshop on Requirements Engineering for Business Need and IT Alignment.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"283-284","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CoxBVD07","doi":"10.1016/J.JSS.2006.05.004","ee":"https://doi.org/10.1016/j.jss.2006.05.004","url":"https://dblp.org/rec/journals/jss/CoxBVD07"}, "url":"URL#5484269" }, { "@score":"1", "@id":"5484270", "info":{"authors":{"author":[{"@pid":"23/5600","text":"Karl Cox"},{"@pid":"91/2558","text":"Keith Phalp"}]},"title":"Practical experience of eliciting classes from use case descriptions.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1286-1304","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CoxP07","doi":"10.1016/J.JSS.2006.12.485","ee":"https://doi.org/10.1016/j.jss.2006.12.485","url":"https://dblp.org/rec/journals/jss/CoxP07"}, "url":"URL#5484270" }, { "@score":"1", "@id":"5484271", "info":{"authors":{"author":[{"@pid":"c/IvicaCrnkovic","text":"Ivica Crnkovic"},{"@pid":"41/5390","text":"George T. Heineman"},{"@pid":"s/HeinzWSchmidt","text":"Heinz W. Schmidt"},{"@pid":"s/JudithAStafford","text":"Judith A. Stafford"},{"@pid":"96/2207","text":"Kurt C. Wallnau"}]},"title":"Guest Editorial.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"641-642","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/CrnkovicHSSW07","doi":"10.1016/J.JSS.2006.10.001","ee":"https://doi.org/10.1016/j.jss.2006.10.001","url":"https://dblp.org/rec/journals/jss/CrnkovicHSSW07"}, "url":"URL#5484271" }, { "@score":"1", "@id":"5484272", "info":{"authors":{"author":[{"@pid":"55/2614","text":"Christopher Dabrowski"},{"@pid":"m/KevinMills","text":"Kevin Mills"},{"@pid":"62/5685","text":"Stephen Quirolgico"}]},"title":"Understanding failure response in service discovery systems.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"896-917","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/DabrowskiMQ07","doi":"10.1016/J.JSS.2006.11.017","ee":"https://doi.org/10.1016/j.jss.2006.11.017","url":"https://dblp.org/rec/journals/jss/DabrowskiMQ07"}, "url":"URL#5484272" }, { "@score":"1", "@id":"5484273", "info":{"authors":{"author":[{"@pid":"72/5050","text":"Balakrishnan Dasarathy"},{"@pid":"89/6619","text":"Shrirang Gadgil"},{"@pid":"83/2083","text":"Ravichander Vaidyanathan"},{"@pid":"50/1098","text":"Arnie Neidhardt"},{"@pid":"78/6878","text":"Brian A. Coan"},{"@pid":"49/6003","text":"Kirthika Parmeswaran"},{"@pid":"89/2051","text":"Allen A. McIntosh"},{"@pid":"85/1620","text":"Frederick Porter"}]},"title":"Adaptive network QoS in layer-3/layer-2 networks as a middleware service for mission-critical applications.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"972-983","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/DasarathyGVNCPMP07","doi":"10.1016/J.JSS.2006.09.030","ee":"https://doi.org/10.1016/j.jss.2006.09.030","url":"https://dblp.org/rec/journals/jss/DasarathyGVNCPMP07"}, "url":"URL#5484273" }, { "@score":"1", "@id":"5484274", "info":{"authors":{"author":[{"@pid":"90/6067","text":"Paloma Díaz 0001"},{"@pid":"a/IgnacioAedo","text":"Ignacio Aedo"}]},"title":"Towards efficient web engineering approaches through flexible process models.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1375-1389","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/DiazA07","doi":"10.1016/J.JSS.2006.10.042","ee":"https://doi.org/10.1016/j.jss.2006.10.042","url":"https://dblp.org/rec/journals/jss/DiazA07"}, "url":"URL#5484274" }, { "@score":"1", "@id":"5484275", "info":{"authors":{"author":[{"@pid":"85/1692-5","text":"Jing Dong 0005"},{"@pid":"a/PauloSCAlencar","text":"Paulo S. C. Alencar"},{"@pid":"c/DonaldDCowan","text":"Donald D. Cowan"},{"@pid":"69/4104-2","text":"Sheng Yang 0002"}]},"title":"Composing pattern-based components and verifying correctness.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1755-1769","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/DongACY07","doi":"10.1016/J.JSS.2007.03.005","ee":"https://doi.org/10.1016/j.jss.2007.03.005","url":"https://dblp.org/rec/journals/jss/DongACY07"}, "url":"URL#5484275" }, { "@score":"1", "@id":"5484276", "info":{"authors":{"author":[{"@pid":"38/1139","text":"Stylianos Drakatos"},{"@pid":"p/NPissinou","text":"Niki Pissinou"},{"@pid":"40/3724","text":"Kia Makki"},{"@pid":"89/4888","text":"Christos Douligeris"}]},"title":"A context-aware cache structure for mobile computing environments.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1102-1119","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/DrakatosPMD07","doi":"10.1016/J.JSS.2006.10.027","ee":"https://doi.org/10.1016/j.jss.2006.10.027","url":"https://dblp.org/rec/journals/jss/DrakatosPMD07"}, "url":"URL#5484276" }, { "@score":"1", "@id":"5484277", "info":{"authors":{"author":{"@pid":"37/695","text":"Christof Ebert"}},"title":"The impacts of software product management.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"850-861","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Ebert07","doi":"10.1016/J.JSS.2006.09.017","ee":"https://doi.org/10.1016/j.jss.2006.09.017","url":"https://dblp.org/rec/journals/jss/Ebert07"}, "url":"URL#5484277" }, { "@score":"1", "@id":"5484278", "info":{"authors":{"author":[{"@pid":"13/1404","text":"Avner Engel"},{"@pid":"84/2603","text":"Mark Last"}]},"title":"Modeling software testing costs and risks using fuzzy logic paradigm.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"817-835","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/EngelL07","doi":"10.1016/J.JSS.2006.09.013","ee":"https://doi.org/10.1016/j.jss.2006.09.013","url":"https://dblp.org/rec/journals/jss/EngelL07"}, "url":"URL#5484278" }, { "@score":"1", "@id":"5484279", "info":{"authors":{"author":{"@pid":"40/870","text":"Richard E. Fairley"}},"title":"The influence of COCOMO on software engineering education and training.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1201-1208","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Fairley07","doi":"10.1016/J.JSS.2006.09.044","ee":"https://doi.org/10.1016/j.jss.2006.09.044","url":"https://dblp.org/rec/journals/jss/Fairley07"}, "url":"URL#5484279" }, { "@score":"1", "@id":"5484280", "info":{"authors":{"author":[{"@pid":"f/DGFeitelson","text":"Dror G. Feitelson"},{"@pid":"25/3918","text":"Tokunbo O. S. Adeshiyan"},{"@pid":"42/5805","text":"Daniel Balasubramanian"},{"@pid":"89/6105","text":"Yoav Etsion"},{"@pid":"01/6483","text":"Gabor Madl"},{"@pid":"81/2223","text":"Esteban Osses"},{"@pid":"13/3568-1","text":"Sameer Singh 0001"},{"@pid":"56/6866","text":"Karlkim Suwanmongkol"},{"@pid":"06/5769","text":"Minhui Xie"},{"@pid":"s/StephenRSchach","text":"Stephen R. Schach"}]},"title":"Fine-grain analysis of common coupling and its application to a Linux case study.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1239-1255","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/FeitelsonABEMOSSXS07","doi":"10.1016/J.JSS.2006.12.550","ee":"https://doi.org/10.1016/j.jss.2006.12.550","url":"https://dblp.org/rec/journals/jss/FeitelsonABEMOSSXS07"}, "url":"URL#5484280" }, { "@score":"1", "@id":"5484281", "info":{"authors":{"author":[{"@pid":"29/5769","text":"Robert J. Fornaro"},{"@pid":"84/6036","text":"Margaret R. Heil"},{"@pid":"49/3406","text":"Alan L. Tharp"}]},"title":"Reflections on 10 years of sponsored senior design projects: Students win-clients win!","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1209-1216","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/FornaroHT07","doi":"10.1016/J.JSS.2006.09.052","ee":"https://doi.org/10.1016/j.jss.2006.09.052","url":"https://dblp.org/rec/journals/jss/FornaroHT07"}, "url":"URL#5484281" }, { "@score":"1", "@id":"5484282", "info":{"authors":{"author":{"@pid":"71/18","text":"Dennis J. Frailey"}},"title":"Experience teaching Barry Boehm's techniques in industrial and academic settings.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1217-1221","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Frailey07","doi":"10.1016/J.JSS.2006.09.050","ee":"https://doi.org/10.1016/j.jss.2006.09.050","url":"https://dblp.org/rec/journals/jss/Frailey07"}, "url":"URL#5484282" }, { "@score":"1", "@id":"5484283", "info":{"authors":{"author":[{"@pid":"96/1516","text":"Cesar Gonzalez-Perez"},{"@pid":"45/5440","text":"Brian Henderson-Sellers"}]},"title":"Modelling software development methodologies: A conceptual foundation.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1778-1796","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Gonzalez-PerezH07","doi":"10.1016/J.JSS.2007.02.048","ee":"https://doi.org/10.1016/j.jss.2007.02.048","url":"https://dblp.org/rec/journals/jss/Gonzalez-PerezH07"}, "url":"URL#5484283" }, { "@score":"1", "@id":"5484284", "info":{"authors":{"author":[{"@pid":"18/7037","text":"Vincenzo Grassi"},{"@pid":"80/191","text":"Raffaela Mirandola"},{"@pid":"05/4081","text":"Antonino Sabetta"}]},"title":"Filling the gap between design and performance/reliability models of component-based systems: A model-driven approach.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"528-558","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/GrassiMS07","doi":"10.1016/J.JSS.2006.07.023","ee":"https://doi.org/10.1016/j.jss.2006.07.023","url":"https://dblp.org/rec/journals/jss/GrassiMS07"}, "url":"URL#5484284" }, { "@score":"1", "@id":"5484285", "info":{"authors":{"author":[{"@pid":"83/3718","text":"Stein Grimstad"},{"@pid":"26/5690","text":"Magne Jørgensen"}]},"title":"Inconsistency of expert judgment-based estimates of software development effort.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1770-1777","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/GrimstadJ07","doi":"10.1016/J.JSS.2007.03.001","ee":"https://doi.org/10.1016/j.jss.2007.03.001","url":"https://dblp.org/rec/journals/jss/GrimstadJ07"}, "url":"URL#5484285" }, { "@score":"1", "@id":"5484286", "info":{"authors":{"author":[{"@pid":"g/PGrunbacher","text":"Paul Grünbacher"},{"@pid":"47/4243","text":"Norbert Seyff"},{"@pid":"51/3898","text":"Robert O. Briggs"},{"@pid":"i/HohPeterIn","text":"Hoh Peter In"},{"@pid":"66/6329","text":"Hasan Kitapci"},{"@pid":"p/DanielPort","text":"Daniel Port"}]},"title":"Making every student a winner: The WinWin approach in software engineering education.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1191-1200","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/GrunbacherSBIKP07","doi":"10.1016/J.JSS.2006.09.049","ee":"https://doi.org/10.1016/j.jss.2006.09.049","url":"https://dblp.org/rec/journals/jss/GrunbacherSBIKP07"}, "url":"URL#5484286" }, { "@score":"1", "@id":"5484287", "info":{"authors":{"author":{"@pid":"55/4092","text":"Lars Grunske"}},"title":"Early quality prediction of component-based systems - A generic framework.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"678-686","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Grunske07","doi":"10.1016/J.JSS.2006.08.014","ee":"https://doi.org/10.1016/j.jss.2006.08.014","url":"https://dblp.org/rec/journals/jss/Grunske07"}, "url":"URL#5484287" }, { "@score":"1", "@id":"5484288", "info":{"authors":{"author":[{"@pid":"46/4320","text":"Dazhang Gu"},{"@pid":"42/2483","text":"Lonnie R. Welch"},{"@pid":"61/4638","text":"Frank Drews"},{"@pid":"e/KHEcker","text":"Klaus Ecker"}]},"title":"Characterizing robustness in dynamic real-time systems.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1005-1014","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/GuWDE07","doi":"10.1016/J.JSS.2006.09.028","ee":"https://doi.org/10.1016/j.jss.2006.09.028","url":"https://dblp.org/rec/journals/jss/GuWDE07"}, "url":"URL#5484288" }, { "@score":"1", "@id":"5484289", "info":{"authors":{"author":[{"@pid":"07/52","text":"Lin Guan"},{"@pid":"a/IrfanUllahAwan","text":"Irfan-Ullah Awan"},{"@pid":"08/6549","text":"Michael E. Woodward"},{"@pid":"55/402","text":"Xingang Wang 0002"}]},"title":"Discrete-time performance analysis of a congestion control mechanism based on RED under multi-class bursty and correlated traffic.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1716-1725","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/GuanAWW07","doi":"10.1016/J.JSS.2006.12.549","ee":"https://doi.org/10.1016/j.jss.2006.12.549","url":"https://dblp.org/rec/journals/jss/GuanAWW07"}, "url":"URL#5484289" }, { "@score":"1", "@id":"5484290", "info":{"authors":{"author":[{"@pid":"29/1633","text":"Gui Gui"},{"@pid":"76/6514","text":"Paul D. Scott"}]},"title":"Ranking reusability of software components using coupling metrics.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1450-1459","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/GuiS07","doi":"10.1016/J.JSS.2006.09.048","ee":"https://doi.org/10.1016/j.jss.2006.09.048","url":"https://dblp.org/rec/journals/jss/GuiS07"}, "url":"URL#5484290" }, { "@score":"1", "@id":"5484291", "info":{"authors":{"author":[{"@pid":"89/6201","text":"Phuong Hoai Ha"},{"@pid":"p/MPapatriantafilou","text":"Marina Papatriantafilou"},{"@pid":"t/PhilippasTsigas","text":"Philippas Tsigas"}]},"title":"Efficient self-tuning spin-locks using competitive analysis.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1077-1090","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HaPT07","doi":"10.1016/J.JSS.2006.11.016","ee":"https://doi.org/10.1016/j.jss.2006.11.016","url":"https://dblp.org/rec/journals/jss/HaPT07"}, "url":"URL#5484291" }, { "@score":"1", "@id":"5484292", "info":{"authors":{"author":[{"@pid":"65/3334","text":"Wen-Ming Han"},{"@pid":"73/6873","text":"Sun-Jen Huang"}]},"title":"An empirical analysis of risk components and performance on software projects.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"42-50","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HanH07","doi":"10.1016/J.JSS.2006.04.030","ee":"https://doi.org/10.1016/j.jss.2006.04.030","url":"https://dblp.org/rec/journals/jss/HanH07"}, "url":"URL#5484292" }, { "@score":"1", "@id":"5484293", "info":{"authors":{"author":[{"@pid":"h/GunterHaring","text":"Günter Haring"},{"@pid":"81/2443","text":"Carlos Juiz"},{"@pid":"46/4207","text":"Dorina C. Petriu"}]},"title":"Editorial.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"439-440","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HaringJP07","doi":"10.1016/J.JSS.2006.07.018","ee":"https://doi.org/10.1016/j.jss.2006.07.018","url":"https://dblp.org/rec/journals/jss/HaringJP07"}, "url":"URL#5484293" }, { "@score":"1", "@id":"5484294", "info":{"authors":{"author":[{"@pid":"44/4618","text":"Zhen He"},{"@pid":"l/RichardLai-1","text":"Richard Lai 0001"},{"@pid":"75/4088","text":"Alonso Marquez"},{"@pid":"b/StephenMBlackburn","text":"Stephen M. Blackburn"}]},"title":"Opportunistic prioritised clustering framework for improving OODBMS performance.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"371-387","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HeLMB07","doi":"10.1016/J.JSS.2006.04.017","ee":"https://doi.org/10.1016/j.jss.2006.04.017","url":"https://dblp.org/rec/journals/jss/HeLMB07"}, "url":"URL#5484294" }, { "@score":"1", "@id":"5484295", "info":{"authors":{"author":[{"@pid":"h/TianHe","text":"Tian He 0001"},{"@pid":"s/JohnAStankovic","text":"John A. Stankovic"},{"@pid":"65/1284","text":"Michael Marley"},{"@pid":"88/683","text":"Chenyang Lu 0001"},{"@pid":"l/YingLu0002","text":"Ying Lu 0002"},{"@pid":"a/TarekFAbdelzaher","text":"Tarek F. Abdelzaher"},{"@pid":"s/SangHyukSon","text":"Sang Hyuk Son"},{"@pid":"01/6383","text":"Gang Tao"}]},"title":"Feedback control-based dynamic resource management in distributed real-time systems.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"997-1004","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HeSML0AST07","doi":"10.1016/J.JSS.2006.09.029","ee":"https://doi.org/10.1016/j.jss.2006.09.029","url":"https://dblp.org/rec/journals/jss/HeSML0AST07"}, "url":"URL#5484295" }, { "@score":"1", "@id":"5484296", "info":{"authors":{"author":[{"@pid":"h/ChristineHofmeister","text":"Christine Hofmeister"},{"@pid":"k/PhilippeKruchten","text":"Philippe Kruchten"},{"@pid":"40/3241","text":"Robert L. Nord"},{"@pid":"40/1544","text":"J. Henk Obbink"},{"@pid":"93/2105","text":"Alexander Ran"},{"@pid":"12/2188","text":"Pierre America"}]},"title":"A general model of software architecture design derived from five industrial approaches.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"106-126","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HofmeisterKNORA07","doi":"10.1016/J.JSS.2006.05.024","ee":"https://doi.org/10.1016/j.jss.2006.05.024","url":"https://dblp.org/rec/journals/jss/HofmeisterKNORA07"}, "url":"URL#5484296" }, { "@score":"1", "@id":"5484297", "info":{"authors":{"author":[{"@pid":"h/JohanFHoorn","text":"Johan F. Hoorn"},{"@pid":"19/3388","text":"Elly A. Konijn"},{"@pid":"v/HansvanVliet","text":"Hans van Vliet"},{"@pid":"07/6816","text":"Gerrit C. van der Veer"}]},"title":"Requirements change: Fears dictate the must haves; desires the won't haves.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"328-355","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HoornKVV07","doi":"10.1016/J.JSS.2006.02.064","ee":"https://doi.org/10.1016/j.jss.2006.02.064","url":"https://dblp.org/rec/journals/jss/HoornKVV07"}, "url":"URL#5484297" }, { "@score":"1", "@id":"5484298", "info":{"authors":{"author":[{"@pid":"95/2518","text":"Mohammed Hussein"},{"@pid":"45/1198","text":"Mohammad Zulkernine"}]},"title":"Intrusion detection aware component-based systems: A specification-based framework.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"700-710","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/HusseinZ07","doi":"10.1016/J.JSS.2006.08.017","ee":"https://doi.org/10.1016/j.jss.2006.08.017","url":"https://dblp.org/rec/journals/jss/HusseinZ07"}, "url":"URL#5484298" }, { "@score":"1", "@id":"5484299", "info":{"authors":{"author":[{"@pid":"68/228","text":"Tauseef A. Israr"},{"@pid":"w/CMurrayWoodside","text":"C. Murray Woodside"},{"@pid":"51/25","text":"Greg Franks"}]},"title":"Interaction tree algorithms to extract effective architecture and layered performance models from traces.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"474-492","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/IsrarWF07","doi":"10.1016/J.JSS.2006.07.019","ee":"https://doi.org/10.1016/j.jss.2006.07.019","url":"https://dblp.org/rec/journals/jss/IsrarWF07"}, "url":"URL#5484299" }, { "@score":"1", "@id":"5484300", "info":{"authors":{"author":[{"@pid":"j/PankajJalote","text":"Pankaj Jalote"},{"@pid":"81/2246","text":"Rajesh Munshi"},{"@pid":"p/TAProebsting","text":"Todd A. Proebsting"}]},"title":"The When-Who-How analysis of defects for improving the quality control process.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"584-589","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/JaloteMP07","doi":"10.1016/J.JSS.2006.07.025","ee":"https://doi.org/10.1016/j.jss.2006.07.025","url":"https://dblp.org/rec/journals/jss/JaloteMP07"}, "url":"URL#5484300" }, { "@score":"1", "@id":"5484301", "info":{"authors":{"author":[{"@pid":"63/2950","text":"Glenn T. Jayaputera"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"},{"@pid":"l/SengWaiLoke","text":"Seng Wai Loke"}]},"title":"Enabling run-time composition and support for heterogeneous pervasive multi-agent systems.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"2039-2062","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/JayaputeraZL07","doi":"10.1016/J.JSS.2007.03.013","ee":"https://doi.org/10.1016/j.jss.2007.03.013","url":"https://dblp.org/rec/journals/jss/JayaputeraZL07"}, "url":"URL#5484301" }, { "@score":"1", "@id":"5484302", "info":{"authors":{"author":[{"@pid":"36/6399","text":"Daniel R. Jeske"},{"@pid":"52/323","text":"Qi Zhang"}]},"title":"Assessing the validity of one-part software reliability models using likelihood ratio and early detection tests.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"805-816","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/JeskeZ07","doi":"10.1016/J.JSS.2006.10.016","ee":"https://doi.org/10.1016/j.jss.2006.10.016","url":"https://dblp.org/rec/journals/jss/JeskeZ07"}, "url":"URL#5484302" }, { "@score":"1", "@id":"5484303", "info":{"authors":{"author":[{"@pid":"34/6167","text":"Letian Jiang"},{"@pid":"73/6677","text":"Guozhi Xu"}]},"title":"Modeling and analysis of software aging and software failure.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"590-595","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/JiangX07","doi":"10.1016/J.JSS.2006.06.029","ee":"https://doi.org/10.1016/j.jss.2006.06.029","url":"https://dblp.org/rec/journals/jss/JiangX07"}, "url":"URL#5484303" }, { "@score":"1", "@id":"5484304", "info":{"authors":{"author":[{"@pid":"26/5690","text":"Magne Jørgensen"},{"@pid":"55/4890","text":"Bjørn Faugli"},{"@pid":"01/5877","text":"Tanja Gruschke"}]},"title":"Characteristics of software engineers with optimistic predictions.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1472-1482","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/JorgensenFG07","doi":"10.1016/J.JSS.2006.09.047","ee":"https://doi.org/10.1016/j.jss.2006.09.047","url":"https://dblp.org/rec/journals/jss/JorgensenFG07"}, "url":"URL#5484304" }, { "@score":"1", "@id":"5484305", "info":{"authors":{"author":[{"@pid":"35/4144","text":"Natalia Juristo Juzgado"},{"@pid":"67/1778","text":"Ana María Moreno 0001"},{"@pid":"s/MISSegura","text":"María Isabel Sánchez Segura"}]},"title":"Analysing the impact of usability on software design.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1506-1516","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/JuzgadoMS07","doi":"10.1016/J.JSS.2007.01.006","ee":"https://doi.org/10.1016/j.jss.2007.01.006","url":"https://dblp.org/rec/journals/jss/JuzgadoMS07"}, "url":"URL#5484305" }, { "@score":"1", "@id":"5484306", "info":{"authors":{"author":[{"@pid":"57/5167","text":"Dariusz Kania"},{"@pid":"06/1739","text":"Józef Kulisz"}]},"title":"Logic synthesis for PAL-based CPLD-s based on two-stage decomposition.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1129-1141","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KaniaK07","doi":"10.1016/J.JSS.2006.10.013","ee":"https://doi.org/10.1016/j.jss.2006.10.013","url":"https://dblp.org/rec/journals/jss/KaniaK07"}, "url":"URL#5484306" }, { "@score":"1", "@id":"5484307", "info":{"authors":{"author":[{"@pid":"31/6736","text":"Amela Karahasanovic"},{"@pid":"38/3244","text":"Annette Kristin Levine"},{"@pid":"48/3373","text":"Richard C. Thomas"}]},"title":"Comprehension strategies and difficulties in maintaining object-oriented systems: An explorative study.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1541-1559","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KarahasanovicLT07","doi":"10.1016/J.JSS.2006.10.041","ee":"https://doi.org/10.1016/j.jss.2006.10.041","url":"https://dblp.org/rec/journals/jss/KarahasanovicLT07"}, "url":"URL#5484307" }, { "@score":"1", "@id":"5484308", "info":{"authors":{"author":[{"@pid":"21/5472","text":"Hiroyuki Kasai"},{"@pid":"58/1439","text":"Wataru Uchida"},{"@pid":"98/180","text":"Shoji Kurakake"}]},"title":"A service provisioning system for distributed personalization with private data protection.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"2025-2038","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KasaiUK07","doi":"10.1016/J.JSS.2007.03.011","ee":"https://doi.org/10.1016/j.jss.2007.03.011","url":"https://dblp.org/rec/journals/jss/KasaiUK07"}, "url":"URL#5484308" }, { "@score":"1", "@id":"5484309", "info":{"authors":{"author":{"@pid":"91/4713","text":"Sangkyun Kim"}},"title":"Methodology of security engineering for industrial security management systems.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1589","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Kim07","doi":"10.1016/J.JSS.2007.01.019","ee":"https://doi.org/10.1016/j.jss.2007.01.019","url":"https://dblp.org/rec/journals/jss/Kim07"}, "url":"URL#5484309" }, { "@score":"1", "@id":"5484310", "info":{"authors":{"author":{"@pid":"91/4713","text":"Sangkyun Kim"}},"title":"IT compliance of industrial information systems: Technology management and industrial engineering perspective.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1590-1593","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Kim07a","doi":"10.1016/J.JSS.2007.01.016","ee":"https://doi.org/10.1016/j.jss.2007.01.016","url":"https://dblp.org/rec/journals/jss/Kim07a"}, "url":"URL#5484310" }, { "@score":"1", "@id":"5484311", "info":{"authors":{"author":[{"@pid":"27/6058","text":"In-Gyu Kim"},{"@pid":"32/5432","text":"Doo-Hwan Bae"},{"@pid":"h/JangEuiHong","text":"Jang-Eui Hong"}]},"title":"A component composition model providing dynamic, flexible, and hierarchical composition of components for supporting software evolution.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1797-1816","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KimBH07","doi":"10.1016/J.JSS.2007.02.047","ee":"https://doi.org/10.1016/j.jss.2007.02.047","url":"https://dblp.org/rec/journals/jss/KimBH07"}, "url":"URL#5484311" }, { "@score":"1", "@id":"5484312", "info":{"authors":{"author":[{"@pid":"48/5544","text":"Chulyun Kim"},{"@pid":"05/3766","text":"Jong-Hwa Lim"},{"@pid":"n/RTNg","text":"Raymond T. Ng"},{"@pid":"s/KyuseokShim","text":"Kyuseok Shim"}]},"title":"SQUIRE: Sequential pattern mining with quantities.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1726-1745","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KimLNS07","doi":"10.1016/J.JSS.2006.12.562","ee":"https://doi.org/10.1016/j.jss.2006.12.562","url":"https://dblp.org/rec/journals/jss/KimLNS07"}, "url":"URL#5484312" }, { "@score":"1", "@id":"5484313", "info":{"authors":{"author":[{"@pid":"k/BarbaraAKitchenham","text":"Barbara A. Kitchenham"},{"@pid":"21/4595","text":"Pearl Brereton"}]},"title":"Introduction to special section on Evaluation and Assessment in Software Engineering EASE06.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1423-1424","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KitchenhamB07","doi":"10.1016/J.JSS.2006.10.031","ee":"https://doi.org/10.1016/j.jss.2006.10.031","url":"https://dblp.org/rec/journals/jss/KitchenhamB07"}, "url":"URL#5484313" }, { "@score":"1", "@id":"5484314", "info":{"authors":{"author":[{"@pid":"33/5130","text":"Ahmet Baki Kocaballi"},{"@pid":"70/3380","text":"Altan Koçyigit"}]},"title":"Granular best match algorithm for context-aware computing systems.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"2015-2024","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KocaballiK07","doi":"10.1016/J.JSS.2007.03.006","ee":"https://doi.org/10.1016/j.jss.2007.03.006","url":"https://dblp.org/rec/journals/jss/KocaballiK07"}, "url":"URL#5484314" }, { "@score":"1", "@id":"5484315", "info":{"authors":{"author":[{"@pid":"70/5362","text":"Atsushi Kokune"},{"@pid":"02/2514","text":"Masuhiro Mizuno"},{"@pid":"41/2283","text":"Kyoichi Kadoya"},{"@pid":"24/7037","text":"Shuichiro Yamamoto"}]},"title":"FBCM: Strategy modeling method for the validation of software requirements.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"314-327","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KokuneMKY07","doi":"10.1016/J.JSS.2006.04.035","ee":"https://doi.org/10.1016/j.jss.2006.04.035","url":"https://dblp.org/rec/journals/jss/KokuneMKY07"}, "url":"URL#5484315" }, { "@score":"1", "@id":"5484316", "info":{"authors":{"author":[{"@pid":"41/5540","text":"Akif Günes Koru"},{"@pid":"92/2407","text":"Hongfang Liu"}]},"title":"Identifying and characterizing change-prone classes in two large-scale open-source products.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"63-73","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KoruL07","doi":"10.1016/J.JSS.2006.05.017","ee":"https://doi.org/10.1016/j.jss.2006.05.017","url":"https://dblp.org/rec/journals/jss/KoruL07"}, "url":"URL#5484316" }, { "@score":"1", "@id":"5484317", "info":{"authors":{"author":[{"@pid":"04/3146","text":"Dionysios Kostoulas"},{"@pid":"19/3490","text":"Dimitrios Psaltoulis"},{"@pid":"02/6135","text":"Indranil Gupta"},{"@pid":"b/KPBirman","text":"Kenneth P. Birman"},{"@pid":"03/5860","text":"Alan J. Demers"}]},"title":"Active and passive techniques for group size estimation in large-scale and dynamic distributed systems.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1639-1658","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KostoulasPGBD07","doi":"10.1016/J.JSS.2007.01.014","ee":"https://doi.org/10.1016/j.jss.2007.01.014","url":"https://dblp.org/rec/journals/jss/KostoulasPGBD07"}, "url":"URL#5484317" }, { "@score":"1", "@id":"5484318", "info":{"authors":{"author":[{"@pid":"05/4260","text":"Susan Kurian"},{"@pid":"93/4227","text":"Michael J. Pont"}]},"title":"The maintenance and evolution of resource-constrained embedded systems created using design patterns.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"32-41","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KurianP07","doi":"10.1016/J.JSS.2006.04.007","ee":"https://doi.org/10.1016/j.jss.2006.04.007","url":"https://dblp.org/rec/journals/jss/KurianP07"}, "url":"URL#5484318" }, { "@score":"1", "@id":"5484319", "info":{"authors":{"author":[{"@pid":"28/6197","text":"Ihor Kuz"},{"@pid":"150/4295-1","text":"Yan Liu 0001"},{"@pid":"74/3329","text":"Ian Gorton"},{"@pid":"h/GernotHeiser","text":"Gernot Heiser"}]},"title":"CAmkES: A component model for secure microkernel-based embedded systems.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"687-699","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KuzLGH07","doi":"10.1016/J.JSS.2006.08.039","ee":"https://doi.org/10.1016/j.jss.2006.08.039","url":"https://dblp.org/rec/journals/jss/KuzLGH07"}, "url":"URL#5484319" }, { "@score":"1", "@id":"5484320", "info":{"authors":{"author":[{"@pid":"21/4473","text":"Sungho Kwon"},{"@pid":"62/6297","text":"Sangsoo Jang"},{"@pid":"90/2159","text":"Jaeill Lee"},{"@pid":"91/4713","text":"Sangkyun Kim"}]},"title":"Common defects in information security management system of Korean companies.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1631-1638","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/KwonJLK07","doi":"10.1016/J.JSS.2007.01.015","ee":"https://doi.org/10.1016/j.jss.2007.01.015","url":"https://dblp.org/rec/journals/jss/KwonJLK07"}, "url":"URL#5484320" }, { "@score":"1", "@id":"5484321", "info":{"authors":{"author":[{"@pid":"l/RichardLai-1","text":"Richard Lai 0001"},{"@pid":"59/5138","text":"Tony Tsang"}]},"title":"Timed verification of the reliable adaptive multicast protocol.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"224-239","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LaiT07","doi":"10.1016/J.JSS.2006.04.003","ee":"https://doi.org/10.1016/j.jss.2006.04.003","url":"https://dblp.org/rec/journals/jss/LaiT07"}, "url":"URL#5484321" }, { "@score":"1", "@id":"5484322", "info":{"authors":{"author":[{"@pid":"36/4835","text":"Patrick J. Lardieri"},{"@pid":"70/4439","text":"Jaiganesh Balasubramanian"},{"@pid":"s/DouglasCSchmidt","text":"Douglas C. Schmidt"},{"@pid":"81/3486","text":"Gautam H. Thaker"},{"@pid":"83/287","text":"Aniruddha S. Gokhale"},{"@pid":"94/3356","text":"Thomas Damiano"}]},"title":"A multi-layered resource management framework for dynamic resource management in enterprise DRE systems.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"984-996","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LardieriBSTGD07","doi":"10.1016/J.JSS.2006.09.042","ee":"https://doi.org/10.1016/j.jss.2006.09.042","url":"https://dblp.org/rec/journals/jss/LardieriBSTGD07"}, "url":"URL#5484322" }, { "@score":"1", "@id":"5484323", "info":{"authors":{"author":{"@pid":"83/3212","text":"Gun Ho Lee"}},"title":"Efficient approach for restructuring multiple inheritance hierarchies.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1560-1568","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Lee07","doi":"10.1016/J.JSS.2006.09.007","ee":"https://doi.org/10.1016/j.jss.2006.09.007","url":"https://dblp.org/rec/journals/jss/Lee07"}, "url":"URL#5484323" }, { "@score":"1", "@id":"5484324", "info":{"authors":{"author":[{"@pid":"42/6463","text":"Yi-Hsuan Lee"},{"@pid":"10/217","text":"Cheng Chen"}]},"title":"An effective and efficient code generation algorithm for uniform loops on non-orthogonal DSP architecture.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"410-428","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LeeC07","doi":"10.1016/J.JSS.2006.06.002","ee":"https://doi.org/10.1016/j.jss.2006.06.002","url":"https://dblp.org/rec/journals/jss/LeeC07"}, "url":"URL#5484324" }, { "@score":"1", "@id":"5484325", "info":{"authors":{"author":[{"@pid":"25/4018","text":"Patrick P. C. Lee"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"},{"@pid":"47/5905","text":"David K. Y. Yau"}]},"title":"SEAL: A secure communication library for building dynamic group key agreement applications.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"356-370","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LeeLY07","doi":"10.1016/J.JSS.2006.04.016","ee":"https://doi.org/10.1016/j.jss.2006.04.016","url":"https://dblp.org/rec/journals/jss/LeeLY07"}, "url":"URL#5484325" }, { "@score":"1", "@id":"5484326", "info":{"authors":{"author":[{"@pid":"48/6065","text":"Ken C. K. Lee"},{"@pid":"17/6358","text":"Josh Schiffman"},{"@pid":"93/4303","text":"Baihua Zheng"},{"@pid":"14/716","text":"Wang-Chien Lee"},{"@pid":"l/HongVaLeong","text":"Hong Va Leong"}]},"title":"Round-Eye: A system for tracking nearest surrounders in moving object environments.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"2063-2076","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LeeSZLL07","doi":"10.1016/J.JSS.2007.03.007","ee":"https://doi.org/10.1016/j.jss.2007.03.007","url":"https://dblp.org/rec/journals/jss/LeeSZLL07"}, "url":"URL#5484326" }, { "@score":"1", "@id":"5484327", "info":{"authors":{"author":[{"@pid":"03/4160","text":"Laurent Lefèvre"},{"@pid":"08/2911","text":"Jean-Marc Pierson"}]},"title":"Special issue: International Conference on Pervasive Services (ICPS 2006).","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"1939-1940","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LefevreP07","doi":"10.1016/J.JSS.2007.03.008","ee":"https://doi.org/10.1016/j.jss.2007.03.008","url":"https://dblp.org/rec/journals/jss/LefevreP07"}, "url":"URL#5484327" }, { "@score":"1", "@id":"5484328", "info":{"authors":{"author":[{"@pid":"80/3784","text":"Otávio Augusto Lazzarini Lemos"},{"@pid":"05/4141","text":"Auri Marcelo Rizzo Vincenzi"},{"@pid":"28/2292","text":"José Carlos Maldonado"},{"@pid":"79/216","text":"Paulo César Masiero"}]},"title":"Control and data flow structural testing criteria for aspect-oriented programs.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"862-882","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LemosVMM07","doi":"10.1016/J.JSS.2006.08.022","ee":"https://doi.org/10.1016/j.jss.2006.08.022","url":"https://dblp.org/rec/journals/jss/LemosVMM07"}, "url":"URL#5484328" }, { "@score":"1", "@id":"5484329", "info":{"authors":{"author":[{"@pid":"09/6954","text":"Shujun Li"},{"@pid":"97/16","text":"Kwok-Tung Lo"}]},"title":"Security problems with improper implementations of improved FEA-M.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"791-794","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LiL07","doi":"10.1016/J.JSS.2006.05.002","ee":"https://doi.org/10.1016/j.jss.2006.05.002","url":"https://dblp.org/rec/journals/jss/LiL07"}, "url":"URL#5484329" }, { "@score":"1", "@id":"5484330", "info":{"authors":{"author":[{"@pid":"55/2893-1","text":"Huan Li 0001"},{"@pid":"r/KrithiRamamritham","text":"Krithi Ramamritham"},{"@pid":"s/PrashantJShenoy","text":"Prashant J. Shenoy"},{"@pid":"g/RodericAGrupen","text":"Roderic A. Grupen"},{"@pid":"71/6203","text":"John Sweeney"}]},"title":"Resource management for real-time tasks in mobile robotics.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"962-971","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LiRSGS07","doi":"10.1016/J.JSS.2006.09.035","ee":"https://doi.org/10.1016/j.jss.2006.09.035","url":"https://dblp.org/rec/journals/jss/LiRSGS07"}, "url":"URL#5484330" }, { "@score":"1", "@id":"5484331", "info":{"authors":{"author":[{"@pid":"64/6025-14","text":"Wei Li 0014"},{"@pid":"99/3586","text":"Raed Shatnawi"}]},"title":"An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1120-1128","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LiS07","doi":"10.1016/J.JSS.2006.10.018","ee":"https://doi.org/10.1016/j.jss.2006.10.018","url":"https://dblp.org/rec/journals/jss/LiS07"}, "url":"URL#5484331" }, { "@score":"1", "@id":"5484332", "info":{"authors":{"author":[{"@pid":"60/4951","text":"Jianxin Liao"},{"@pid":"09/4144-2","text":"Xiaomin Zhu 0002"}]},"title":"Grigoris Antoniou and Frank Van Harmelen, Comments on "A Semantic Web Primer", The MIT Press, Cambridge, Massachusetts, London, England (2004).","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1586-1587","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LiaoZ07","doi":"10.1016/J.JSS.2007.02.031","ee":"https://doi.org/10.1016/j.jss.2007.02.031","url":"https://dblp.org/rec/journals/jss/LiaoZ07"}, "url":"URL#5484332" }, { "@score":"1", "@id":"5484333", "info":{"authors":{"author":{"@pid":"23/622","text":"Jenn-Wei Lin"}},"title":"Providing fault-tolerant authentication and authorization in wireless mobile IP networks.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"149-163","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Lin07","doi":"10.1016/J.JSS.2006.02.052","ee":"https://doi.org/10.1016/j.jss.2006.02.052","url":"https://dblp.org/rec/journals/jss/Lin07"}, "url":"URL#5484333" }, { "@score":"1", "@id":"5484334", "info":{"authors":{"author":[{"@pid":"34/190","text":"Yi-Neng Lin"},{"@pid":"93/2994","text":"Yao-Chung Chang"},{"@pid":"l/YingDarLin","text":"Ying-Dar Lin"},{"@pid":"12/2250","text":"Yuan-Cheng Lai"}]},"title":"Resource allocation in network processors for network intrusion prevention systems.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1030-1036","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LinCLL07","doi":"10.1016/J.JSS.2007.01.032","ee":"https://doi.org/10.1016/j.jss.2007.01.032","url":"https://dblp.org/rec/journals/jss/LinCLL07"}, "url":"URL#5484334" }, { "@score":"1", "@id":"5484335", "info":{"authors":{"author":[{"@pid":"41/572","text":"Yongjing Lin"},{"@pid":"z/YoutaoZhang","text":"Youtao Zhang"},{"@pid":"g/RajivGupta","text":"Rajiv Gupta 0001"}]},"title":"The design and evaluation of path matching schemes on compressed control flow traces.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"396-409","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LinZG07","doi":"10.1016/J.JSS.2006.06.007","ee":"https://doi.org/10.1016/j.jss.2006.06.007","url":"https://dblp.org/rec/journals/jss/LinZG07"}, "url":"URL#5484335" }, { "@score":"1", "@id":"5484336", "info":{"authors":{"author":[{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"30/6100","text":"Josh Dehlinger"},{"@pid":"49/3478","text":"Robyn R. Lutz"}]},"title":"Safety analysis of software product lines using state-based modeling.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1879-1892","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LiuDL07","doi":"10.1016/J.JSS.2007.01.047","ee":"https://doi.org/10.1016/j.jss.2007.01.047","url":"https://dblp.org/rec/journals/jss/LiuDL07"}, "url":"URL#5484336" }, { "@score":"1", "@id":"5484337", "info":{"authors":{"author":[{"@pid":"99/4667","text":"Shaoying Liu"},{"@pid":"181/2812","text":"Hao Wang"}]},"title":"An automated approach to specification animation for validation.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1271-1285","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/LiuW07","doi":"10.1016/J.JSS.2006.12.540","ee":"https://doi.org/10.1016/j.jss.2006.12.540","url":"https://dblp.org/rec/journals/jss/LiuW07"}, "url":"URL#5484337" }, { "@score":"1", "@id":"5484338", "info":{"authors":{"author":[{"@pid":"95/2106","text":"Li Ma"},{"@pid":"t/JeffTian","text":"Jeff Tian"}]},"title":"Web error classification and analysis for reliability improvement.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"795-804","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/MaT07","doi":"10.1016/J.JSS.2006.10.017","ee":"https://doi.org/10.1016/j.jss.2006.10.017","url":"https://dblp.org/rec/journals/jss/MaT07"}, "url":"URL#5484338" }, { "@score":"1", "@id":"5484339", "info":{"authors":{"author":[{"@pid":"b/SoniaBenMokhtar","text":"Sonia Ben Mokhtar"},{"@pid":"41/2362","text":"Nikolaos Georgantas"},{"@pid":"i/ValerieIssarny","text":"Valérie Issarny"}]},"title":"COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"1941-1955","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/MokhtarGI07","doi":"10.1016/J.JSS.2007.03.002","ee":"https://doi.org/10.1016/j.jss.2007.03.002","url":"https://dblp.org/rec/journals/jss/MokhtarGI07"}, "url":"URL#5484339" }, { "@score":"1", "@id":"5484340", "info":{"authors":{"author":{"@pid":"42/2098","text":"Matthias M. Müller"}},"title":"Do programmer pairs make different mistakes than solo programmers?","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1460-1471","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Muller07","doi":"10.1016/J.JSS.2006.10.032","ee":"https://doi.org/10.1016/j.jss.2006.10.032","url":"https://dblp.org/rec/journals/jss/Muller07"}, "url":"URL#5484340" }, { "@score":"1", "@id":"5484341", "info":{"authors":{"author":[{"@pid":"00/3776","text":"Kwan-Sik Na"},{"@pid":"68/2142","text":"James T. Simpson"},{"@pid":"35/4953","text":"Xiaotong Li"},{"@pid":"20/6709","text":"Tushar Singh"},{"@pid":"99/2527","text":"Ki-Yoon Kim"}]},"title":"Software development risk and project performance measurement: Evidence in Korea.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"596-605","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/NaSLSK07","doi":"10.1016/J.JSS.2006.06.018","ee":"https://doi.org/10.1016/j.jss.2006.06.018","url":"https://dblp.org/rec/journals/jss/NaSLSK07"}, "url":"URL#5484341" }, { "@score":"1", "@id":"5484342", "info":{"authors":{"author":[{"@pid":"50/1950","text":"Donald M. Needham"},{"@pid":"43/1739","text":"S. A. Jones"}]},"title":"A software fault tree key node metric.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1530-1540","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/NeedhamJ07","doi":"10.1016/J.JSS.2007.01.042","ee":"https://doi.org/10.1016/j.jss.2007.01.042","url":"https://dblp.org/rec/journals/jss/NeedhamJ07"}, "url":"URL#5484342" }, { "@score":"1", "@id":"5484343", "info":{"authors":{"author":[{"@pid":"o/ToacyCavalcantedeOliveira","text":"Toacy Cavalcante de Oliveira"},{"@pid":"a/PauloSCAlencar","text":"Paulo S. C. Alencar"},{"@pid":"l/CarlosJosePereiradeLucena","text":"Carlos José Pereira de Lucena"},{"@pid":"c/DonaldDCowan","text":"Donald D. Cowan"}]},"title":"RDL: A language for framework instantiation representation.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1902-1929","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/OliveiraALC07","doi":"10.1016/J.JSS.2007.01.005","ee":"https://doi.org/10.1016/j.jss.2007.01.005","url":"https://dblp.org/rec/journals/jss/OliveiraALC07"}, "url":"URL#5484343" }, { "@score":"1", "@id":"5484344", "info":{"authors":{"author":[{"@pid":"17/940","text":"Tariq Omari"},{"@pid":"51/25","text":"Greg Franks"},{"@pid":"w/CMurrayWoodside","text":"C. Murray Woodside"},{"@pid":"00/6275","text":"Amy Pan"}]},"title":"Efficient performance models for layered server systems with replicated servers and parallel behaviour.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"510-527","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/OmariFWP07","doi":"10.1016/J.JSS.2006.07.022","ee":"https://doi.org/10.1016/j.jss.2006.07.022","url":"https://dblp.org/rec/journals/jss/OmariFWP07"}, "url":"URL#5484344" }, { "@score":"1", "@id":"5484345", "info":{"authors":{"author":[{"@pid":"58/2865","text":"Yi Peng"},{"@pid":"37/4556","text":"Fu Li"},{"@pid":"m/AliMili","text":"Ali Mili 0001"}]},"title":"Modeling the evolution of operating systems: An empirical study.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"1-15","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/PengLM07","doi":"10.1016/J.JSS.2006.03.049","ee":"https://doi.org/10.1016/j.jss.2006.03.049","url":"https://dblp.org/rec/journals/jss/PengLM07"}, "url":"URL#5484345" }, { "@score":"1", "@id":"5484346", "info":{"authors":{"author":[{"@pid":"72/800","text":"Stephan Philippi"},{"@pid":"71/5852","text":"Hermann Josef Hill"}]},"title":"Communication support for systems engineering - process modelling and animation with APRIL.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1305-1316","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/PhilippiH07","doi":"10.1016/J.JSS.2006.11.015","ee":"https://doi.org/10.1016/j.jss.2006.11.015","url":"https://dblp.org/rec/journals/jss/PhilippiH07"}, "url":"URL#5484346" }, { "@score":"1", "@id":"5484347", "info":{"authors":{"author":[{"@pid":"18/4631","text":"Mirja Pulkkinen"},{"@pid":"46/1945","text":"Anton Naumenko"},{"@pid":"58/4694","text":"Kari Luostarinen"}]},"title":"Managing information security in a business network of machinery maintenance services business - Enterprise architecture as a coordination tool.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1607-1620","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/PulkkinenNL07","doi":"10.1016/J.JSS.2007.01.044","ee":"https://doi.org/10.1016/j.jss.2007.01.044","url":"https://dblp.org/rec/journals/jss/PulkkinenNL07"}, "url":"URL#5484347" }, { "@score":"1", "@id":"5484348", "info":{"authors":{"author":{"@pid":"77/6366","text":"Peter Reynolds"}},"title":"Managing requirements for a US$1bn IT-based business transformation: New approaches and challenges.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"285-293","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Reynolds07","doi":"10.1016/J.JSS.2006.04.036","ee":"https://doi.org/10.1016/j.jss.2006.04.036","url":"https://dblp.org/rec/journals/jss/Reynolds07"}, "url":"URL#5484348" }, { "@score":"1", "@id":"5484349", "info":{"authors":{"author":[{"@pid":"53/3712","text":"Oriana Riva"},{"@pid":"81/3971","text":"Santtu Toivonen"}]},"title":"The DYNAMOS approach to support context-aware service provisioning in mobile environments.","venue":"J. Syst. Softw.","volume":"80","number":"12","pages":"1956-1972","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/RivaT07","doi":"10.1016/J.JSS.2007.03.009","ee":"https://doi.org/10.1016/j.jss.2007.03.009","url":"https://dblp.org/rec/journals/jss/RivaT07"}, "url":"URL#5484349" }, { "@score":"1", "@id":"5484350", "info":{"authors":{"author":[{"@pid":"32/1860","text":"Shalom N. Rosenfeld"},{"@pid":"97/1892","text":"Ioana Rus"},{"@pid":"c/MichelCukier","text":"Michel Cukier"}]},"title":"Archetypal behavior in computer security.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1594-1606","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/RosenfeldRC07","doi":"10.1016/J.JSS.2007.01.046","ee":"https://doi.org/10.1016/j.jss.2007.01.046","url":"https://dblp.org/rec/journals/jss/RosenfeldRC07"}, "url":"URL#5484350" }, { "@score":"1", "@id":"5484351", "info":{"authors":{"author":[{"@pid":"05/2964","text":"Terence P. Rout"},{"@pid":"25/575","text":"Khaled El Emam"},{"@pid":"40/5616","text":"Mario Fusani"},{"@pid":"66/5315","text":"Dennis R. Goldenson"},{"@pid":"68/2931","text":"Ho-Won Jung"}]},"title":"SPICE in retrospect: Developing a standard for process assessment.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1483-1493","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/RoutEFGJ07","doi":"10.1016/J.JSS.2007.01.045","ee":"https://doi.org/10.1016/j.jss.2007.01.045","url":"https://dblp.org/rec/journals/jss/RoutEFGJ07"}, "url":"URL#5484351" }, { "@score":"1", "@id":"5484352", "info":{"authors":{"author":{"@pid":"s/HosseinSaiedian","text":"Hossein Saiedian"}},"title":"Reflections on the influences of the COCOMO, spiral and the Win-Win models on software project and risk management.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1183-1184","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Saiedian07","doi":"10.1016/J.JSS.2006.09.043","ee":"https://doi.org/10.1016/j.jss.2006.09.043","url":"https://dblp.org/rec/journals/jss/Saiedian07"}, "url":"URL#5484352" }, { "@score":"1", "@id":"5484353", "info":{"authors":{"author":[{"@pid":"19/4614","text":"Alfredo De Santis"},{"@pid":"39/5874","text":"Barbara Masucci"}]},"title":"New results on non-perfect sharing of multiple secrets.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"216-223","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SantisM07","doi":"10.1016/J.JSS.2006.03.046","ee":"https://doi.org/10.1016/j.jss.2006.03.046","url":"https://dblp.org/rec/journals/jss/SantisM07"}, "url":"URL#5484353" }, { "@score":"1", "@id":"5484354", "info":{"authors":{"author":[{"@pid":"45/4911","text":"Ahmed Seffah"},{"@pid":"84/2727","text":"Ashraf Gaffar"}]},"title":"Model-based user interface engineering with design patterns.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1408-1422","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SeffahG07","doi":"10.1016/J.JSS.2006.10.037","ee":"https://doi.org/10.1016/j.jss.2006.10.037","url":"https://dblp.org/rec/journals/jss/SeffahG07"}, "url":"URL#5484354" }, { "@score":"1", "@id":"5484355", "info":{"authors":{"author":[{"@pid":"23/4124","text":"Hermes Senger"},{"@pid":"31/4579","text":"Eduardo R. Hruschka"},{"@pid":"22/9778","text":"Fabrício Alves Barbosa da Silva"},{"@pid":"94/109","text":"Liria Matsumoto Sato"},{"@pid":"223/4725","text":"Calebe De Paula Bianchini"},{"@pid":"01/6770","text":"Bruno F. Jerosch"}]},"title":"Exploiting idle cycles to execute data mining applications on clusters of PCs.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"778-790","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SengerHSSBJ07","doi":"10.1016/J.JSS.2006.05.035","ee":"https://doi.org/10.1016/j.jss.2006.05.035","url":"https://dblp.org/rec/journals/jss/SengerHSSBJ07"}, "url":"URL#5484355" }, { "@score":"1", "@id":"5484356", "info":{"authors":{"author":{"@pid":"06/5882","text":"Zuhua Shao"}},"title":"Self-certified signature scheme from pairings.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"388-395","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Shao07","doi":"10.1016/J.JSS.2006.05.033","ee":"https://doi.org/10.1016/j.jss.2006.05.033","url":"https://dblp.org/rec/journals/jss/Shao07"}, "url":"URL#5484356" }, { "@score":"1", "@id":"5484357", "info":{"authors":{"author":[{"@pid":"09/5442-1","text":"Jun Shao 0001"},{"@pid":"49/1185","text":"Zhenfu Cao"},{"@pid":"88/3562","text":"Rongxing Lu"}]},"title":"Improvement of Yang et al.'s threshold proxy signature scheme.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"172-177","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ShaoCL07","doi":"10.1016/J.JSS.2006.02.047","ee":"https://doi.org/10.1016/j.jss.2006.02.047","url":"https://dblp.org/rec/journals/jss/ShaoCL07"}, "url":"URL#5484357" }, { "@score":"1", "@id":"5484358", "info":{"authors":{"author":[{"@pid":"69/3337","text":"Vibhu Saujanya Sharma"},{"@pid":"t/KishorSTrivedi","text":"Kishor S. Trivedi"}]},"title":"Quantifying software performance, reliability and security: An architecture-based approach.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"493-509","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SharmaT07","doi":"10.1016/J.JSS.2006.07.021","ee":"https://doi.org/10.1016/j.jss.2006.07.021","url":"https://dblp.org/rec/journals/jss/SharmaT07"}, "url":"URL#5484358" }, { "@score":"1", "@id":"5484359", "info":{"authors":{"author":[{"@pid":"76/1964","text":"Jun-Hong Shen"},{"@pid":"69/3053","text":"Ye-In Chang"}]},"title":"A skewed distributed indexing for skewed access patterns on the wireless broadcast.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"711-723","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ShenC07","doi":"10.1016/J.JSS.2006.09.014","ee":"https://doi.org/10.1016/j.jss.2006.09.014","url":"https://dblp.org/rec/journals/jss/ShenC07"}, "url":"URL#5484359" }, { "@score":"1", "@id":"5484360", "info":{"authors":{"author":[{"@pid":"77/2567","text":"Charalabos Skianis"},{"@pid":"k/GeorgeKormentzas","text":"George Kormentzas"},{"@pid":"64/4039","text":"Kimon P. Kontovasilis"},{"@pid":"332/1144","text":"Giordana Lisa"}]},"title":"Efficiency study of the information flow mechanism enabling interworking of heterogeneous wireless systems.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1746-1753","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SkianisKKL07","doi":"10.1016/J.JSS.2006.10.020","ee":"https://doi.org/10.1016/j.jss.2006.10.020","url":"https://dblp.org/rec/journals/jss/SkianisKKL07"}, "url":"URL#5484360" }, { "@score":"1", "@id":"5484361", "info":{"authors":{"author":[{"@pid":"07/5709","text":"Sunil Soman"},{"@pid":"87/1311","text":"Chandra Krintz"}]},"title":"Application-specific garbage collection.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1037-1056","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SomanK07","doi":"10.1016/J.JSS.2006.12.566","ee":"https://doi.org/10.1016/j.jss.2006.12.566","url":"https://dblp.org/rec/journals/jss/SomanK07"}, "url":"URL#5484361" }, { "@score":"1", "@id":"5484362", "info":{"authors":{"author":[{"@pid":"56/1795","text":"Qinbao Song"},{"@pid":"08/3451","text":"Martin J. Shepperd"}]},"title":"A new imputation method for small software project data sets.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"51-62","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SongS07","doi":"10.1016/J.JSS.2006.05.003","ee":"https://doi.org/10.1016/j.jss.2006.05.003","url":"https://dblp.org/rec/journals/jss/SongS07"}, "url":"URL#5484362" }, { "@score":"1", "@id":"5484363", "info":{"authors":{"author":[{"@pid":"s/DiomidisSpinellis","text":"Diomidis Spinellis"},{"@pid":"63/5819","text":"Panagiotis Louridas"}]},"title":"A framework for the static verification of api calls.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1156-1168","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SpinellisL07","doi":"10.1016/J.JSS.2006.09.040","ee":"https://doi.org/10.1016/j.jss.2006.09.040","url":"https://dblp.org/rec/journals/jss/SpinellisL07"}, "url":"URL#5484363" }, { "@score":"1", "@id":"5484364", "info":{"authors":{"author":{"@pid":"26/2108","text":"Nigamanth Sridhar"}},"title":"Serfs: Dynamically-bound parameterized components.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"736-749","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Sridhar07","doi":"10.1016/J.JSS.2006.07.024","ee":"https://doi.org/10.1016/j.jss.2006.07.024","url":"https://dblp.org/rec/journals/jss/Sridhar07"}, "url":"URL#5484364" }, { "@score":"1", "@id":"5484365", "info":{"authors":{"author":[{"@pid":"s/MarkStaples","text":"Mark Staples"},{"@pid":"07/2817","text":"Mahmood Niazi"}]},"title":"Experiences using systematic review guidelines.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1425-1437","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/StaplesN07","doi":"10.1016/J.JSS.2006.09.046","ee":"https://doi.org/10.1016/j.jss.2006.09.046","url":"https://dblp.org/rec/journals/jss/StaplesN07"}, "url":"URL#5484365" }, { "@score":"1", "@id":"5484366", "info":{"authors":{"author":[{"@pid":"s/MarkStaples","text":"Mark Staples"},{"@pid":"07/2817","text":"Mahmood Niazi"},{"@pid":"99/2957","text":"D. Ross Jeffery"},{"@pid":"54/3671","text":"Alan Abrahams"},{"@pid":"71/1322","text":"Paul Byatt"},{"@pid":"69/2542","text":"Russell Murphy"}]},"title":"An exploratory study of why organizations do not adopt CMMI.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"883-895","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/StaplesNJABM07","doi":"10.1016/J.JSS.2006.09.008","ee":"https://doi.org/10.1016/j.jss.2006.09.008","url":"https://dblp.org/rec/journals/jss/StaplesNJABM07"}, "url":"URL#5484366" }, { "@score":"1", "@id":"5484367", "info":{"authors":{"author":[{"@pid":"34/37","text":"Peter van der Stok"},{"@pid":"27/4962","text":"Dmitri Jarnikov"},{"@pid":"88/4101","text":"Sergei Kozlov"},{"@pid":"57/758","text":"Michael van Hartskamp"},{"@pid":"l/JJLukkien","text":"Johan J. Lukkien"}]},"title":"Hierarchical resource allocation for robust in-home video streaming.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"951-961","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/StokJKHL07","doi":"10.1016/J.JSS.2006.09.026","ee":"https://doi.org/10.1016/j.jss.2006.09.026","url":"https://dblp.org/rec/journals/jss/StokJKHL07"}, "url":"URL#5484367" }, { "@score":"1", "@id":"5484368", "info":{"authors":{"author":[{"@pid":"57/6430","text":"Yu-Shen Su"},{"@pid":"49/4191","text":"Chin-Yu Huang"}]},"title":"Neural-network-based approaches for software reliability estimation using dynamic weighted combinational models.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"606-615","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SuH07","doi":"10.1016/J.JSS.2006.06.017","ee":"https://doi.org/10.1016/j.jss.2006.06.017","url":"https://dblp.org/rec/journals/jss/SuH07"}, "url":"URL#5484368" }, { "@score":"1", "@id":"5484369", "info":{"authors":{"author":[{"@pid":"32/6297","text":"Girish H. Subramanian"},{"@pid":"49/4743","text":"James J. Jiang"},{"@pid":"54/4607-1","text":"Gary Klein 0001"}]},"title":"Software quality and IS project performance improvements from software development process maturity and IS implementation strategies.","venue":"J. Syst. Softw.","volume":"80","number":"4","pages":"616-627","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SubramanianJK07","doi":"10.1016/J.JSS.2006.06.014","ee":"https://doi.org/10.1016/j.jss.2006.06.014","url":"https://dblp.org/rec/journals/jss/SubramanianJK07"}, "url":"URL#5484369" }, { "@score":"1", "@id":"5484370", "info":{"authors":{"author":[{"@pid":"53/2694","text":"Venkita Subramonian"},{"@pid":"85/4804","text":"Gan Deng"},{"@pid":"51/3192","text":"Christopher D. Gill"},{"@pid":"70/4439","text":"Jaiganesh Balasubramanian"},{"@pid":"00/1796","text":"Liang-Jui Shen"},{"@pid":"35/5286","text":"William Otte"},{"@pid":"s/DouglasCSchmidt","text":"Douglas C. Schmidt"},{"@pid":"83/287","text":"Aniruddha S. Gokhale"},{"@pid":"22/829","text":"Nanbor Wang"}]},"title":"The design and performance of component middleware for QoS-enabled deployment and configuration of DRE systems.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"668-677","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SubramonianDGBSOSGW07","doi":"10.1016/J.JSS.2006.08.023","ee":"https://doi.org/10.1016/j.jss.2006.08.023","url":"https://dblp.org/rec/journals/jss/SubramonianDGBSOSGW07"}, "url":"URL#5484370" }, { "@score":"1", "@id":"5484371", "info":{"authors":{"author":[{"@pid":"81/5477","text":"Mikael Svahnberg"},{"@pid":"89/1630","text":"Frans Mårtensson"}]},"title":"Six years of evaluating software architectures in student projects.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1893-1901","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/SvahnbergM07","doi":"10.1016/J.JSS.2007.01.050","ee":"https://doi.org/10.1016/j.jss.2007.01.050","url":"https://dblp.org/rec/journals/jss/SvahnbergM07"}, "url":"URL#5484371" }, { "@score":"1", "@id":"5484372", "info":{"authors":{"author":[{"@pid":"00/3791","text":"Zhenyu Tan"},{"@pid":"13/5355","text":"William Leal"},{"@pid":"42/2483","text":"Lonnie R. Welch"}]},"title":"Verification of instrumentation techniques for resource management of real-time systems.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1015-1022","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TanLW07","doi":"10.1016/J.JSS.2006.09.033","ee":"https://doi.org/10.1016/j.jss.2006.09.033","url":"https://dblp.org/rec/journals/jss/TanLW07"}, "url":"URL#5484372" }, { "@score":"1", "@id":"5484373", "info":{"authors":{"author":[{"@pid":"97/2801","text":"Antony Tang"},{"@pid":"76/289","text":"Yan Jin"},{"@pid":"02/3721-4","text":"Jun Han 0004"}]},"title":"A rationale-based architecture model for design traceability and reasoning.","venue":"J. Syst. Softw.","volume":"80","number":"6","pages":"918-934","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TangJH07","doi":"10.1016/J.JSS.2006.08.040","ee":"https://doi.org/10.1016/j.jss.2006.08.040","url":"https://dblp.org/rec/journals/jss/TangJH07"}, "url":"URL#5484373" }, { "@score":"1", "@id":"5484374", "info":{"authors":{"author":[{"@pid":"97/2801","text":"Antony Tang"},{"@pid":"n/AnnENicholson","text":"Ann E. Nicholson"},{"@pid":"76/289","text":"Yan Jin"},{"@pid":"02/3721-4","text":"Jun Han 0004"}]},"title":"Using Bayesian belief networks for change impact analysis in architecture design.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"127-148","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TangNJH07","doi":"10.1016/J.JSS.2006.04.004","ee":"https://doi.org/10.1016/j.jss.2006.04.004","url":"https://dblp.org/rec/journals/jss/TangNJH07"}, "url":"URL#5484374" }, { "@score":"1", "@id":"5484375", "info":{"authors":{"author":[{"@pid":"75/5273","text":"Piotr Tomaszewski"},{"@pid":"73/4693","text":"Jim Håkansson"},{"@pid":"88/4207","text":"Håkan Grahn"},{"@pid":"58/356","text":"Lars Lundberg"}]},"title":"Statistical models vs. expert estimation for fault prediction in modified code - an industrial case study.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1227-1238","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TomaszewskiHGL07","doi":"10.1016/J.JSS.2006.12.548","ee":"https://doi.org/10.1016/j.jss.2006.12.548","url":"https://dblp.org/rec/journals/jss/TomaszewskiHGL07"}, "url":"URL#5484375" }, { "@score":"1", "@id":"5484376", "info":{"authors":{"author":[{"@pid":"45/4549","text":"Yuan-Yu Tsai"},{"@pid":"33/589","text":"Chung-Ming Wang"}]},"title":"A novel data hiding scheme for color images using a BSP tree.","venue":"J. Syst. Softw.","volume":"80","number":"3","pages":"429-437","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TsaiW07","doi":"10.1016/J.JSS.2006.06.016","ee":"https://doi.org/10.1016/j.jss.2006.06.016","url":"https://dblp.org/rec/journals/jss/TsaiW07"}, "url":"URL#5484376" }, { "@score":"1", "@id":"5484377", "info":{"authors":{"author":[{"@pid":"40/4773","text":"Nikolaos D. Tselikas"},{"@pid":"42/1383","text":"Nikolaos L. Dellas"},{"@pid":"86/4706","text":"Eleftherios Koutsoloukas"},{"@pid":"48/3043","text":"Sofia Kapellaki"},{"@pid":"03/279","text":"George N. Prezerakos"},{"@pid":"10/4275","text":"Iakovos S. Venieris"}]},"title":"Distributed service provision using open APIs-based middleware: "OSA/Parlay vs. JAIN" performance evaluation study.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"765-777","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TselikasDKKPV07","doi":"10.1016/J.JSS.2006.06.035","ee":"https://doi.org/10.1016/j.jss.2006.06.035","url":"https://dblp.org/rec/journals/jss/TselikasDKKPV07"}, "url":"URL#5484377" }, { "@score":"1", "@id":"5484378", "info":{"authors":{"author":[{"@pid":"22/6409","text":"Christos Tselikis"},{"@pid":"17/2718","text":"Sarandis Mitropoulos"},{"@pid":"89/4888","text":"Christos Douligeris"}]},"title":"An evaluation of the middleware's impact on the performance of object oriented distributed systems.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1169-1181","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TselikisMD07","doi":"10.1016/J.JSS.2006.09.038","ee":"https://doi.org/10.1016/j.jss.2006.09.038","url":"https://dblp.org/rec/journals/jss/TselikisMD07"}, "url":"URL#5484378" }, { "@score":"1", "@id":"5484379", "info":{"authors":{"author":{"@pid":"87/1521","text":"Yuh-Min Tseng"}},"title":"A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1091-1101","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Tseng07","doi":"10.1016/J.JSS.2006.10.053","ee":"https://doi.org/10.1016/j.jss.2006.10.053","url":"https://dblp.org/rec/journals/jss/Tseng07"}, "url":"URL#5484379" }, { "@score":"1", "@id":"5484380", "info":{"authors":{"author":[{"@pid":"t/VincentSMTseng","text":"Vincent S. Tseng"},{"@pid":"66/5895","text":"Kawuu Weicheng Lin"}]},"title":"Energy efficient strategies for object tracking in sensor networks: A data mining approach.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1678-1698","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/TsengL07","doi":"10.1016/J.JSS.2006.12.561","ee":"https://doi.org/10.1016/j.jss.2006.12.561","url":"https://dblp.org/rec/journals/jss/TsengL07"}, "url":"URL#5484380" }, { "@score":"1", "@id":"5484381", "info":{"authors":{"author":[{"@pid":"o/MarcoTuliodeOliveiraValente","text":"Marco Túlio de Oliveira Valente"},{"@pid":"11/1966","text":"Rodrigo Palhares Silva"}]},"title":"Collocation optimizations in an aspect-oriented middleware system.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1659-1666","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ValenteS07","doi":"10.1016/J.JSS.2007.01.033","ee":"https://doi.org/10.1016/j.jss.2007.01.033","url":"https://dblp.org/rec/journals/jss/ValenteS07"}, "url":"URL#5484381" }, { "@score":"1", "@id":"5484382", "info":{"authors":{"author":[{"@pid":"41/470","text":"Ricardo Valerdi"},{"@pid":"11/2670","text":"Raymond J. Madachy"}]},"title":"Impact and contributions of MBASE on software engineering graduate courses.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1185-1190","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ValerdiM07","doi":"10.1016/J.JSS.2006.09.051","ee":"https://doi.org/10.1016/j.jss.2006.09.051","url":"https://dblp.org/rec/journals/jss/ValerdiM07"}, "url":"URL#5484382" }, { "@score":"1", "@id":"5484383", "info":{"authors":{"author":{"@pid":"32/3582","text":"Rayford B. Vaughn"}},"title":"Leadership by example: A perspective on the influence of Barry Boehm.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1222-1226","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/Vaughn07","doi":"10.1016/J.JSS.2006.09.045","ee":"https://doi.org/10.1016/j.jss.2006.09.045","url":"https://dblp.org/rec/journals/jss/Vaughn07"}, "url":"URL#5484383" }, { "@score":"1", "@id":"5484384", "info":{"authors":{"author":[{"@pid":"35/1647","text":"Qin Wang"},{"@pid":"49/1185","text":"Zhenfu Cao"}]},"title":"Identity based proxy multi-signature.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1023-1029","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/WangC07","doi":"10.1016/J.JSS.2006.12.565","ee":"https://doi.org/10.1016/j.jss.2006.12.565","url":"https://dblp.org/rec/journals/jss/WangC07"}, "url":"URL#5484384" }, { "@score":"1", "@id":"5484385", "info":{"authors":{"author":[{"@pid":"18/5637","text":"Xiaorui Wang"},{"@pid":"34/4132","text":"Yingming Chen"},{"@pid":"88/683","text":"Chenyang Lu 0001"},{"@pid":"11/5453","text":"Xenofon D. Koutsoukos"}]},"title":"FC-ORB: A robust distributed real-time embedded middleware with end-to-end utilization control.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"938-950","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/WangCLK07","doi":"10.1016/J.JSS.2006.09.031","ee":"https://doi.org/10.1016/j.jss.2006.09.031","url":"https://dblp.org/rec/journals/jss/WangCLK07"}, "url":"URL#5484385" }, { "@score":"1", "@id":"5484386", "info":{"authors":{"author":[{"@pid":"w/NengChungWang","text":"Nen-Chung Wang"},{"@pid":"11/3503","text":"Shian-Zhang Fang"}]},"title":"A hierarchical key management scheme for secure group communications in mobile ad hoc networks.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1667-1677","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/WangF07","doi":"10.1016/J.JSS.2006.12.564","ee":"https://doi.org/10.1016/j.jss.2006.12.564","url":"https://dblp.org/rec/journals/jss/WangF07"}, "url":"URL#5484386" }, { "@score":"1", "@id":"5484387", "info":{"authors":{"author":[{"@pid":"49/5431","text":"M. N. Wicks"},{"@pid":"62/2902","text":"R. G. Dewar"}]},"title":"A new research agenda for tool integration.","venue":"J. Syst. Softw.","volume":"80","number":"9","pages":"1569-1585","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/WicksD07","doi":"10.1016/J.JSS.2007.03.089","ee":"https://doi.org/10.1016/j.jss.2007.03.089","url":"https://dblp.org/rec/journals/jss/WicksD07"}, "url":"URL#5484387" }, { "@score":"1", "@id":"5484388", "info":{"authors":{"author":[{"@pid":"96/6312","text":"Ming-Ni Wu"},{"@pid":"61/295","text":"Chia-Chen Lin 0001"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"}]},"title":"Novel image copy detection with rotating tolerance.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1057-1069","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/WuLC07","doi":"10.1016/J.JSS.2006.12.001","ee":"https://doi.org/10.1016/j.jss.2006.12.001","url":"https://dblp.org/rec/journals/jss/WuLC07"}, "url":"URL#5484388" }, { "@score":"1", "@id":"5484389", "info":{"authors":{"author":[{"@pid":"72/195","text":"Lih-Chyau Wuu"},{"@pid":"85/1101","text":"Chi-Hsiang Hung"},{"@pid":"91/386","text":"Sout-Fong Chen"}]},"title":"Building intrusion pattern miner for Snort network intrusion detection system.","venue":"J. Syst. Softw.","volume":"80","number":"10","pages":"1699-1715","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/WuuHC07","doi":"10.1016/J.JSS.2006.12.546","ee":"https://doi.org/10.1016/j.jss.2006.12.546","url":"https://dblp.org/rec/journals/jss/WuuHC07"}, "url":"URL#5484389" }, { "@score":"1", "@id":"5484390", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"38/4538","text":"Guowu Yang"},{"@pid":"58/3449","text":"Xiaoyu Song"}]},"title":"Component-based hardware/software co-verification for building trustworthy embedded systems.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"643-654","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/XieYS07","doi":"10.1016/J.JSS.2006.08.015","ee":"https://doi.org/10.1016/j.jss.2006.08.015","url":"https://dblp.org/rec/journals/jss/XieYS07"}, "url":"URL#5484390" }, { "@score":"1", "@id":"5484391", "info":{"authors":{"author":[{"@pid":"x/JinglingXue","text":"Jingling Xue"},{"@pid":"64/2940","text":"Phung Hua Nguyen"},{"@pid":"08/6873","text":"John Potter"}]},"title":"Interprocedural side-effect analysis for incomplete object-oriented software modules.","venue":"J. Syst. Softw.","volume":"80","number":"1","pages":"92-105","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/XueNP07","doi":"10.1016/J.JSS.2006.06.015","ee":"https://doi.org/10.1016/j.jss.2006.06.015","url":"https://dblp.org/rec/journals/jss/XueNP07"}, "url":"URL#5484391" }, { "@score":"1", "@id":"5484392", "info":{"authors":{"author":[{"@pid":"21/1931","text":"Ching-Nung Yang"},{"@pid":"21/1164","text":"Tse-Shih Chen"},{"@pid":"50/4022","text":"Kun-Hsuan Yu"},{"@pid":"51/5061","text":"Chung-Chun Wang"}]},"title":"Improvements of image sharing with steganography and authentication.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1070-1076","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/YangCYW07","doi":"10.1016/J.JSS.2006.11.022","ee":"https://doi.org/10.1016/j.jss.2006.11.022","url":"https://dblp.org/rec/journals/jss/YangCYW07"}, "url":"URL#5484392" }, { "@score":"1", "@id":"5484393", "info":{"authors":{"author":[{"@pid":"32/6164","text":"Chun-Chuan Yang"},{"@pid":"93/1905","text":"Yung-Chi Wang"},{"@pid":"57/4165","text":"Chih-Wen Tien"}]},"title":"Synchronization modeling and its application for SMIL2.0 presentations.","venue":"J. Syst. Softw.","volume":"80","number":"7","pages":"1142-1155","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/YangWT07","doi":"10.1016/J.JSS.2006.09.041","ee":"https://doi.org/10.1016/j.jss.2006.09.041","url":"https://dblp.org/rec/journals/jss/YangWT07"}, "url":"URL#5484393" }, { "@score":"1", "@id":"5484394", "info":{"authors":{"author":[{"@pid":"50/5864","text":"Peng-Yeng Yin"},{"@pid":"92/3139","text":"Shiuh-Sheng Yu"},{"@pid":"57/4244","text":"Pei-Pei Wang"},{"@pid":"07/2430","text":"Yi-Te Wang"}]},"title":"Task allocation for maximizing reliability of a distributed system using hybrid particle swarm optimization.","venue":"J. Syst. Softw.","volume":"80","number":"5","pages":"724-735","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/YinYWW07","doi":"10.1016/J.JSS.2006.08.005","ee":"https://doi.org/10.1016/j.jss.2006.08.005","url":"https://dblp.org/rec/journals/jss/YinYWW07"}, "url":"URL#5484394" }, { "@score":"1", "@id":"5484395", "info":{"authors":{"author":[{"@pid":"06/3406","text":"Yuming Zhou"},{"@pid":"l/HaretonKNLeung","text":"Hareton Leung"}]},"title":"Predicting object-oriented software maintainability using multivariate adaptive regression splines.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1349-1361","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ZhouL07","doi":"10.1016/J.JSS.2006.10.049","ee":"https://doi.org/10.1016/j.jss.2006.10.049","url":"https://dblp.org/rec/journals/jss/ZhouL07"}, "url":"URL#5484395" }, { "@score":"1", "@id":"5484396", "info":{"authors":{"author":[{"@pid":"52/4318-1","text":"Liming Zhu 0001"},{"@pid":"16/6054","text":"Ngoc Bao Bui"},{"@pid":"150/4295-1","text":"Yan Liu 0001"},{"@pid":"74/3329","text":"Ian Gorton"}]},"title":"MDABench: Customized benchmark generation using MDA.","venue":"J. Syst. Softw.","volume":"80","number":"2","pages":"265-282","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ZhuBLG07","doi":"10.1016/J.JSS.2006.10.052","ee":"https://doi.org/10.1016/j.jss.2006.10.052","url":"https://dblp.org/rec/journals/jss/ZhuBLG07"}, "url":"URL#5484396" }, { "@score":"1", "@id":"5484397", "info":{"authors":{"author":[{"@pid":"37/1027","text":"Nianping Zhu"},{"@pid":"g/JohnCGrundy","text":"John C. Grundy"},{"@pid":"h/JohnGHosking","text":"John G. Hosking"},{"@pid":"82/385-1","text":"Na Liu 0001"},{"@pid":"97/2364","text":"Shuping Cao"},{"@pid":"29/445","text":"Akhil Mehra"}]},"title":"Pounamu: A meta-tool for exploratory domain-specific visual language tool development.","venue":"J. Syst. Softw.","volume":"80","number":"8","pages":"1390-1407","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ZhuGHLCM07","doi":"10.1016/J.JSS.2006.10.028","ee":"https://doi.org/10.1016/j.jss.2006.10.028","url":"https://dblp.org/rec/journals/jss/ZhuGHLCM07"}, "url":"URL#5484397" }, { "@score":"1", "@id":"5484398", "info":{"authors":{"author":[{"@pid":"z/HaiZhuge","text":"Hai Zhuge"},{"@pid":"93/1549","text":"Weiyu Guo"}]},"title":"Virtual knowledge service market - For effective knowledge flow within knowledge grid.","venue":"J. Syst. Softw.","volume":"80","number":"11","pages":"1833-1842","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jss/ZhugeG07","doi":"10.1016/J.JSS.2007.02.028","ee":"https://doi.org/10.1016/j.jss.2007.02.028","url":"https://dblp.org/rec/journals/jss/ZhugeG07"}, "url":"URL#5484398" } ] } } } )