default search action
Journal of Systems and Software (JSS), Volume 79
Volume 79, Number 1, January 2006
- Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Guy G. Helmer, Vasant G. Honavar, Les Miller, Robyn R. Lutz, Mark Slagell:
Towards the automatic generation of mobile agents for distributed intrusion detection system. 1-14 - Peter Meso, Gregory R. Madey, Marvin D. Troutt, Jens Liegle:
The knowledge management efficacy of matching information systems development methodologies with application characteristics - an experimental study. 15-28 - Chung-Ming Huang, Tz-Heng Hsu, Yi-Wei Lin:
REDUP: a packet loss recovery scheme for real-time audio streaming over wireless IP networks. 29-42 - Seungmin Rho, Eenjun Hwang:
FMF: Query adaptive melody retrieval system. 43-56 - Dennis Edwards, Sharon Simmons, Norman Wilde:
An approach to feature location in distributed systems. 57-68 - Bo Ingvar Sandén, Janusz Zalewski:
Designing state-based systems with entity-life modeling. 69-78 - Anthony J. T. Lee, Wan-chuen Lin, Chun-Sheng Wang:
Mining association rules with multi-dimensional constraints. 79-92 - Jen-Jou Hung, Yungho Leu:
Efficient index caching for data dissemination in mobile computing environments. 93-106 - Paolo Donzelli, Victor R. Basili:
A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project. 107-119
- Henk Koning, Hans van Vliet:
A method for defining IEEE Std 1471 viewpoints. 120-131 - Wen-Li Wang, Dai Pan, Mei-Hwa Chen:
Architecture-based software reliability modeling. 132-146
Volume 79, Number 2, February 2006
- Emerson Farrugia, Robert Simon:
An efficient and secure protocol for sensor network time synchronization. 147-162 - Yueh-Feng Lee, Ruei-Chuan Chang:
Hotswapping Linux kernel modules. 163-175 - Lin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu:
Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes. 176-179 - Young-Ho Park, Kyu-Young Whang, Byung Suk Lee, Wook-Shin Han:
Efficient evaluation of linear path expressions on large-scale heterogeneous XML documents using information retrieval techniques. 180-190 - Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Jung-Im Won:
Shape-based retrieval in time-series databases. 191-203 - Regina Braga, Cláudia Maria Lima Werner, Marta Mattoso:
Odyssey-Search: A multi-agent system for component information search and retrieval. 204-215 - Ge Li, Lu Zhang, Yan Li, Bing Xie, Weizhong Shao:
Shortening retrieval sequences in browsing-based component retrieval using information entropy. 216-230 - Benny Thörnberg, Qubo Hu, Martin Palkovic, Mattias O'Nils, Per Gunnar Kjeldsberg:
Polyhedral space generation and memory estimation from interface and memory models of real-time video systems. 231-245 - Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun:
Assessment of eco-security in the Knowledge Grid e-science environment. 246-252 - Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). 253-258
- Vassileios Tsetsos, Odysseas Sekkas, Ioannis Priggouris, Stathes Hadjiefthymiades:
A scheduling framework for enterprise services. 259-272 - Alistair G. Sutcliffe, George Papamargaritis, Liping Zhao:
Comparing requirements analysis methods for developing reusable component libraries. 273-289
Volume 79, Number 3, March 2006
- Xuemei Zhang, Hoang Pham:
Software field failure rate prediction before software deployment. 291-300 - Ernst Kesseler, Ed G. Knapen:
Towards human-centred design: Two case studies. 301-313 - Lerina Aversano, Thierry Bodhuin, Gerardo Canfora, Maria Tortorella:
Technology-driven business evolution. 314-338 - Lionel C. Briand, Yvan Labiche, Leeshawn O'Sullivan, Michal M. Sówka:
Automated impact analysis of UML models. 339-352 - Juan Jose Cuadrado-Gallego, Miguel-Ángel Sicilia, Miguel Garre, Daniel Rodríguez:
An empirical study of process-related attributes in segmented software cost-estimation relationships. 353-361 - Steven J. Bleistein, Karl Cox, June M. Verner:
Validating strategic alignment of organizational IT requirements using goal modeling and problem diagrams. 362-378 - Giuseppe Della Penna, Benedetto Intrigila, Anna Rita Laurenzi, Sergio Orefice:
An XML environment for scenario based requirements engineering. 379-403 - Panagiotis Sentas, Lefteris Angelis:
Categorical missing data imputation for software cost estimation by multinomial logistic regression. 404-414
- Tamer Rafla, Pierre N. Robillard, Michel C. Desmarais:
Investigating the impact of usability on software architecture through scenarios: A case study on Web systems. 415-426 - Manuel F. Bertoa, José M. Troya, Antonio Vallecillo:
Measuring the usability of software components. 427-439
Volume 79, Number 4, April 2006
- Kam-yiu Lam, Özgür Ulusoy:
Adaptive schemes for location update generation in execution location-dependent continuous queries. 441-453 - Richard Lai, Tony Tsang, Yong-Soo Kim, Dae Hoon Hwang, Chul Soo Lee, Yoon Kyung Han:
A method for analysing multimedia protocol performance. 454-465 - Yan-Xiang Deng, Chao-Jang Hwang, Jiang-Lung Liu:
An object-oriented cryptosystem based on two-level reconfigurable computing architecture. 466-479 - Christos Makris, Yannis Panagis, Evangelos Sakkopoulos, Athanasios K. Tsakalidis:
Efficient and adaptive discovery techniques of Web Services handling large data sets. 480-495 - Qiang Tang, Chris J. Mitchell:
Cryptanalysis of a hybrid authentication protocol for large mobile networks. 496-501 - Wei-Bin Lee, Kuan-Chieh Liao:
Improved self-certified group-oriented cryptosystem without a combiner. 502-506 - Shih-Chien Chou, Yuan-Chien Chen:
Managing role relationships in an information flow control model. 507-522 - Seng Wai Loke:
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog. 523-536
- Michelle Hepner, Rose F. Gamble, Manasi Kelkar, Leigh A. Davis, Daniel Flagg:
Patterns of conflict among software components. 537-551 - Ronny Roeller, Patricia Lago, Hans van Vliet:
Recovering architectural assumptions. 552-573
Volume 79, Number 5, May 2006
- Hans-Dieter Ehrich, Klaus-Dieter Schewe, T. H. Tse:
Editorial. 575-576 - Yuen-Tak Yu, Man Fai Lau:
A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions. 577-590 - Tsong Yueh Chen, Fei-Ching Kuo, Robert G. Merkel:
On the statistical properties of testing effectiveness measures. 591-601 - W. K. Chan, M. Y. Cheng, Shing-Chi Cheung, T. H. Tse:
Automatic goal-oriented classification of failure behaviors for testing XML-based multimedia software applications: An experimental case study. 602-612 - Jane Zhao, Hui Ma:
ASM-based design of data warehouses and on-line analytical processing systems. 613-629 - Stefan Brass, Christian Goldberg:
Semantic errors in SQL queries: A quite complete list. 630-644
- Lieven Eeckhout, Koen De Bosschere:
Yet shorter warmup by combining no-state-loss and MRRL for sampled LRU cache simulation. 645-652 - Chin-Yu Huang, Jung-Hua Lo:
Optimal resource allocation for cost and reliability of modular software systems in the testing phase. 653-664 - Jung-Shian Li, Chu-Fen Li, Cheng-Pong Lo:
Effective fair allocation using smart market label auction with CSLF and CR-CSFQ. 665-673 - KwangJin Park, MoonBae Song, Chong-Sun Hwang:
Adaptive data dissemination schemes for location-aware mobile services. 674-688 - Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matjaz Colnaric, Marjan Hericko:
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL. 689-700 - Sunilkumar S. Manvi, P. Venkataram:
An agent based synchronization scheme for multimedia applications. 701-713 - Weisong Shi, Yonggen Mao:
Performance evaluation of peer-to-peer Web caching systems. 714-726 - Miroslaw Staron, Ludwik Kuzniarz, Claes Wohlin:
Empirical assessment of using stereotypes to improve comprehension of UML models: A set of experiments. 727-742
- Ling Liu, Xue Chen:
Book review: H. Zhuge, The Knowledge Grid, World Scientific Publishing Co., Singapore, 2004. 743-745
Volume 79, Number 6, June 2006
- Ping-Feng Pai, Wei-Chiang Hong:
Software reliability forecasting by support vector machines with simulated annealing algorithms. 747-755 - Silvia Regina Vergilio, José Carlos Maldonado, Mário Jino, Inali Wisniewski Soares:
Constraint based structural testing criteria. 756-771 - King Sing Cheung, T. Y. Cheung, K. O. Chow:
A petri-net-based synthesis methodology for use-case-driven system design. 772-790 - Ganga Bishnu Mund, Rajib Mall:
An efficient interprocedural dynamic slicing method. 791-806 - Liguo Yu, Stephen R. Schach, Kai Chen, Gillian Z. Heller, A. Jefferson Offutt:
Maintainability of the kernels of open-source operating systems: A comparison of Linux with FreeBSD, NetBSD, and OpenBSD. 807-815 - T. H. Tse, Tsong Yueh Chen, Robert L. Glass:
An assessment of systems and software engineering scholars and institutions (2000-2004). 816-819 - Yuen-Tak Yu, Man Fai Lau, Tsong Yueh Chen:
Automatic generation of test cases from Boolean specifications using the MUMCUT strategy. 820-840 - James W. Helms, James D. Arthur, Deborah Hix, H. Rex Hartson:
A field study of the Wheel - a usability engineering process model. 841-858
- Hui Ma, I-Ling Yen, Jia Zhou, Kendra M. L. Cooper:
QoS analysis for component-based embedded software: Model and methodology. 859-870 - Anna Grimán, María A. Pérez, Luis Eduardo Mendoza, Francisca Losavio:
Feature analysis for architectural evaluation methods. 871-888
Volume 79, Number 7, July 2006
- Doo-Hwan Bae:
Guest Editorial. 889-890 - W. Eric Wong, Yu Qi:
Effective program debugging based on execution slices and inter-block data dependency. 891-903 - Pankaj Jalote, Gourav Jain:
Assigning tasks in a 24-h software development model. 904-911 - Muhammad Ali Babar, Barbara A. Kitchenham, Liming Zhu, Ian Gorton, D. Ross Jeffery:
An empirical study of groupware support for distributed software architecture evaluation process. 912-925 - Jintae Kim, Minseong Kim, Sooyong Park:
Goal and scenario based domain requirements analysis environment. 926-938 - Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushita, Katsuro Inoue:
MUDABlue: An automatic categorization system for Open Source repositories. 939-953 - Chanwoo Yoo, Junho Yoon, Byungjeong Lee, Chong-Won Lee, Jinyoung Lee, Seunghun Hyun, Chisu Wu:
A unified model for the implementation of both ISO 9001: 2000 and CMMI by ISO-certified organizations. 954-961 - Karl R. P. H. Leung, Joseph Kee-Yin Ng, Wing Lok Yeung:
Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach. 962-968
- Hai Zhuge, Xiangfeng Luo:
Automatic generation of document semantics for the e-science Knowledge Grid. 969-983 - Eric Jui-Lin Lu, Bo-Chan Wu, Po-Yun Chuang:
An empirical study of XML data management in business information systems. 984-1000 - Lars-Ola Damm, Lars Lundberg:
Results from introducing component-level test automation and Test-Driven Development. 1001-1014 - Ricardo Chalmeta:
Methodology for customer relationship management. 1015-1024 - Philip Beck, James J. Jiang, Gary Klein:
Prototyping mediators to project performance: Learning and interaction. 1025-1035
Volume 79, Number 8, August 2006
- Chung-Ming Huang, Chao-Hsien Lee, Yuan-Tse Yu, Chung-Yi Lai:
Location-aware multimedia proxy handoff over the IPv6 mobile network environment. 1037-1050 - Yusuf Hasan, J. Morris Chang:
A tunable hybrid memory allocator. 1051-1063 - Constandinos X. Mavromoustakis, Helen D. Karatza:
On the efficiency and performance evaluation of the bandwidth clustering scheme for adaptive and reliable resource allocation. 1064-1078 - Katerina Raptopoulou, Michael Vassilakopoulos, Yannis Manolopoulos:
On past-time indexing of moving objects. 1079-1091 - Nicholas A. Kraft, Errol L. Lloyd, Brian A. Malloy, Peter J. Clarke:
The implementation of an extensible system for comparison and visualization of class ordering methodologies. 1092-1109 - Jyh-Horng Wen, Kuo-Ting Huang, Cheng-Ying Yang, Tzu-Chen Tsai:
Timeslot-sharing algorithm with a dynamic grouping for WDM broadcast-and-select star networks. 1110-1119 - Chin-Chen Chang, Tzu-Chuen Lu:
Reversible index-domain information hiding scheme based on side-match vector quantization. 1120-1129 - Ching-Sheng Hsu, Young-Chang Hou:
An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods. 1130-1140 - Martín López Nores, José Juan Pazos-Arias, Jorge García Duque, Yolanda Blanco-Fernández, Manuel Ramos Cabrer, Alberto Gil-Solla, Ana Fernández Vilas, Rebeca P. Díaz Redondo:
Formal specification applied to multiuser distributed services: Experiences in collaborative t-learning. 1141-1155 - Hsien-Wen Tseng, Chin-Chen Chang:
Error resilient locally adaptive data compression. 1156-1160 - Fuh-Gwo Jeng, Chung-Ming Wang:
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. 1161-1167 - Ismail Ababneh:
An efficient free-list submesh allocation scheme for two-dimensional mesh-connected multicomputers. 1168-1179
- Jungwoo Ryoo, Hossein Saiedian:
AVDL: A highly adaptable architecture view description language. 1180-1206 - Rick Kazman, Len Bass, Mark Klein:
The essential components of software architecture design and analysis. 1207-1216
Volume 79, Number 9, September 2006
- Tom Dean, Mark Harman, Rainer Koschke, Michael L. Van de Vanter:
Selected papers from the fourth Source Code Analysis and Manipulation (SCAM 2004) Workshop. 1217-1218 - Magiel Bruntink, Arie van Deursen:
An empirical study into class testability. 1219-1232 - Gregorio Robles, Jesús M. González-Barahona, Juan Julián Merelo Guervós:
Beyond source code: The importance of other artifacts in software development (a case study). 1233-1248 - Jens Krinke:
Effects of context on program slicing. 1249-1260 - Chung-Horng Lung, Xia Xu, Marzia Zaman, Anand Srinivasan:
Program restructuring using clustering techniques. 1261-1279 - Jean Utke, Andrew Lyons, Uwe Naumann:
Efficient reversal of the intraprocedural flow of control in adjoint computations. 1280-1294
- Christina Hansson, Yvonne Dittrich, Björn Gustafsson, Stefan Zarnak:
How agile are industrial software development practices? 1295-1311 - Jung-Hua Lo, Chin-Yu Huang:
An integration of fault detection and correction processes in software reliability analysis. 1312-1323 - Claudio de la Riva, Javier Tuya:
Automatic generation of assumptions for modular verification of software specifications. 1324-1340 - Marjan Hericko, Ivan Rozman, Ales Zivkovic:
A formal representation of functional size measurement methods. 1341-1358
Volume 79, Number 10, October 2006
- Rogério de Lemos, Cristina Gacek, Alexander B. Romanovsky:
Architecting dependable systems. 1359-1360 - Ji Zhang, Betty H. C. Cheng:
Using temporal logic to specify adaptive program semantics. 1361-1369 - Lihua Xu, Hadar Ziv, Thomas A. Alspaugh, Debra J. Richardson:
An architectural pattern for non-functional dependability requirements. 1370-1378 - Henry Muccini, Marcio S. Dias, Debra J. Richardson:
Software architecture-based regression testing. 1379-1396 - Fernando Castor Filho, Patrick Henrique da S. Brito, Cecília M. F. Rubira:
Specification of exception flow in software architectures. 1397-1418 - Ludger Bischofs, Simon Giesecke, Michael Gottschalk, Wilhelm Hasselbring, Timo Warns, Stefan Willer:
Comparative evaluation of dependability characteristics for peer-to-peer architectural styles by simulation. 1419-1432
- Isabella Kotini, George Hassapis:
Verification of rectangular hybrid automata models. 1433-1443 - Stephan Philippi:
Automatic code generation from high-level Petri-Nets for model driven systems engineering. 1444-1455 - Franck Cassez, Olivier H. Roux:
Structural translation from Time Petri Nets to Timed Automata. 1456-1468 - Hai Zhuge:
Semantic component networking: Toward the synergy of static reuse and dynamic clustering of resources in the knowledge grid. 1469-1482
Volume 79, Number 11, November 2006
- Fevzi Belli, Kai-Yuan Cai, Raymond A. DeCarlo, Aditya P. Mathur:
Introduction to the special section on software cybernetics. 1483-1485 - Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur, João W. Cangussu:
A control-theoretic approach to the management of the software system test phase. 1486-1503 - Hong Xu, Peter Sawyer, Ian Sommerville:
Requirement process establishment and improvement from the viewpoint of cybernetics. 1504-1513 - Tiberiu Seceleanu, David Garlan:
Developing adaptive systems with synchronized architectures. 1514-1526 - Yan Liu, Bojan Cukic, Edgar Fuller, Sampath Yerramalla, Srikanth Gururajan:
Monitoring techniques for an online neuro-adaptive controller. 1527-1540
- J. Drew Procaccino, June M. Verner:
Software project managers and project success: An exploratory study. 1541-1551 - Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo:
An intelligent early warning system for software quality improvement and project management. 1552-1564 - José Alberto R. P. Sardinha, Ricardo Choren, Viviane Torres da Silva, Ruy Luiz Milidiú, Carlos José Pereira de Lucena:
A combined specification language and development framework for agent-based application engineering. 1565-1577 - Jing Zhao, Hongwei Liu, Gang Cui, Xiao-Zong Yang:
Software reliability growth model with change-point and environmental function. 1578-1587 - Lu Zhang, Tao Qin, Zhiying Zhou, Dan Hao, Jiasu Sun:
Identifying use cases in source code. 1588-1598 - Alexander Thomasian:
Shortcut method for reliability comparisons in RAID. 1599-1605 - Sira Vegas, Natalia Juristo Juzgado, Victor R. Basili:
Packaging experiences for improving testing technique selection. 1606-1618 - Jie Liu, Hai Zhuge:
A semantic-based P2P resource organization model R-Chord. 1619-1631 - Onaiza Maqbool, Haroon Atique Babri:
Automated software clustering: An insight using cluster labels. 1632-1648 - Xiaoqing Frank Liu, Yan Sun, Chandra Sekhar Veera, Yuji Kyoya, Kunio Noguchi:
Priority assessment of software process requirements from multiple perspectives. 1649-1660
Volume 79, Number 12, December 2006
- Durga Prasad Mohapatra, Rajeev Kumar, Rajib Mall, D. S. Kumar, Mayank Bhasin:
Distributed dynamic slicing of Java programs. 1661-1678 - Antonis Sidiropoulos, Yannis Manolopoulos:
Generalized comparison of graph-based ranking algorithms for publications and authors. 1679-1700 - Jacob Engel, Daniel Lacks, Taskin Koçak:
Modelling and simulation of off-chip communication architectures for high-speed packet processors. 1701-1714 - Alexander Perez-Pons:
Semantic prefetching objects of slower web site pages. 1715-1724 - Suzanne W. Dietrich, Rohini Patil, Amy Sundermier, Susan Darling Urban:
Component adaptation for event-based application integration using active rules. 1725-1734 - Dora Souliou, Aris Pagourtzis, Nikolaos Drosinos, Panayotis Tsanakas:
Computing frequent itemsets in parallel using partial support trees. 1735-1743 - Wan-Chen Lu, Jen-Wei Hsieh, Wei-Kuan Shih, Tei-Wei Kuo:
A faster exact schedulability analysis for fixed-priority scheduling. 1744-1753 - Chin-Chen Chang, Tzu-Chuen Lu:
A difference expansion oriented data hiding scheme for restoring the original host images. 1754-1766 - Sanghyun Yoo, Jin Hyun Son, Myoung-Ho Kim:
An efficient subscription routing algorithm for scalable XML-based publish/subscribe systems. 1767-1781 - Rusty O. Baldwin, Brian S. Peterson, Robert F. Mills:
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks. 1782-1788 - Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. 1789
- Nenad Medvidovic, René L. Krikhaar, Robert L. Nord, Judith A. Stafford:
Understanding the past, improving the present, and mapping out the future of software architecture. 1790-1791 - Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han:
A survey of architecture design rationale. 1792-1804
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.