


default search action
Journal of Systems and Software, Volume 85
Volume 85, Number 1, January 2012
- W. Eric Wong, W. K. Chan
, T. H. Tse, Fei-Ching Kuo:
Special Issue on Dynamic Analysis and Testing of Embedded Software. 1-2 - Maria de Fátima Mattiello-Francisco
, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano:
InRob: An approach for testing interoperability and robustness of real-time embedded software. 3-15 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:
Test coverage optimization for large code problems. 16-27 - Jooyoung Seo, Byoungju Choi, Suengwan Yang:
Lightweight embedded software performance analysis method by kernel hack and its industrial field study. 28-42 - Chorng-Shiuh Koong, Chihhsiong Shih, Pao-Ann Hsiung
, Hung-Jui Lai, Chih-Hung Chang
, William C. Chu, Nien-Lin Hsueh, Chao-Tung Yang
:
Automatic testing environment for multi-core embedded software - ATEMES. 43-60
- Mohamed Alnas, Irfan Awan, D. R. W. Holton:
Erratum to "Performance evaluation of fast handover in mobile IPv6 based on link layer informations" [Journal of Systems and Software 83 (2010) 1644-1650]. 61 - Ching-Wen Chen, Chuan-Chi Weng:
A power efficiency routing and maintenance protocol in wireless multi-hop networks. 62-76 - Antonino Santos
, Juan Romero
, Francisco Javier Taibo
, Carlos Rodríguez, Adrián Carballal
:
Self-tuning of disk input-output in operating systems. 77-86 - Xiaoyu Tang, Qingtian Zeng:
Keyword clustering for user interest profiling refinement within paper recommender systems. 87-101 - Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner
, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. 102-111 - Genaína Nunes Rodrigues
, Vander Alves
, Renato Silveira, Luiz A. Laranjeira:
Dependability analysis in the Ambient Assisted Living Domain: An exploratory case study. 112-131 - Lakshitha de Silva, Dharini Balasubramaniam
:
Controlling software architecture erosion: A survey. 132-151 - Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-Porisini
:
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. 152-166 - Hung-Yi Lin:
Using compressed index structures for processing moving objects in large spatio-temporal databases. 167-177 - Herman Hartmann, Tim Trew, Jan Bosch:
The changing industry structure of software development for consumer electronics and its consequences for software architectures. 178-192 - Moussa Ouedraogo, Djamel Khadraoui, Haralambos Mouratidis
, Eric Dubois
:
Appraisal and reporting of security assurance at operational systems level. 193-208 - Harendra Singh, Girraj Kumar Verma
:
ID-based proxy signature scheme with message recovery. 209-214
Volume 85, Number 2, February 2012
- Paulo Borba
:
Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering. 215 - Fabio Q. B. da Silva
, A. César C. França:
Towards understanding the underlying structure of motivational factors for software engineers to guide the definition of motivational programs. 216-226 - Eduardo Figueiredo, Cláudio Sant'Anna, Alessandro Garcia, Carlos José Pereira de Lucena:
Applying and evaluating concern-sensitive design heuristics. 227-243 - Kecia Aline M. Ferreira, Mariza Andrade da Silva Bigonha
, Roberto da Silva Bigonha, Luiz F. O. Mendes, Heitor C. Almeida:
Identifying thresholds for object-oriented software metrics. 244-257 - Elder Cirilo, Ingrid Nunes
, Uirá Kulesza, Carlos José Pereira de Lucena:
Automating the product derivation process of multi-agent systems product lines. 258-276 - João Gustavo Prudêncio, Leonardo Murta, Cláudia M. L. Werner
, Rafael da Silva Viterbo de Cepêda:
To lock, or not to lock: That is the question. 277-289
- Xiaopeng Wei, Ling Guo, Qiang Zhang
, Jianxin Zhang, Shiguo Lian:
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. 290-299 - Xiaolin Ma, Fangmin Li
, Fei Hu, Xinhua Liu:
A hybrid channel assignment strategy to QoS support of video-streaming over multi-channel ad hoc networks. 300-308 - Zhenxing Qian, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream. 309-313 - Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. 314-322 - Mohamed El-Attar
:
Towards developing consistent misuse case models. 323-339 - Jun-Han Yang, Tian-Jie Cao
:
Provably secure three-party password authenticated key exchange protocol in the standard model. 340-350 - Andréa Magalhães Magdaleno, Cláudia Maria Lima Werner
, Renata Mendes de Araujo
:
Reconciling software development models: A quasi-systematic review. 351-369 - Hongzhe Liu
, Hong Bao
, De Xu:
Concept vector for semantic similarity and relatedness based on WordNet structure. 370-381 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. 382-391 - Guorui Feng, Lingyan Fan:
Reversible data hiding of high payload using local edge sensing prediction. 392-399 - Qing Zhou, Xiaofeng Liao:
Collision-based flexible image encryption algorithm. 400-407 - Seyed Mohammad Hossein Hasheminejad
, Saeed Jalili
:
Design patterns selection: An automatic two-phase method. 408-424 - Sergio Pozo
, Rafael M. Gasca
, Antonia M. Reina Quintero
, Angel Jesus Varela-Vaca
:
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. 425-457
Volume 85, Number 3, March 2012
- Lawrence Chung, Manuel Noguera
, Nary Subramanian, José Luis Garrido
:
Novel approaches in the design and implementation of system/software architectures. 459-462 - Jaelson Castro
, Márcia Lucena
, Carla T. L. L. Silva, Fernanda M. R. Alencar
, Emanuel Santos, João Pimentel:
Changing attitudes towards the generation of architectural models. 463-479 - Rafael Z. Frantz
, Rafael Corchuelo
, Carlos Molina-Jiménez:
A proposal to detect errors in Enterprise Application Integration solutions. 480-497 - Kawtar Benghazi Akhlaki
, María Visitación Hurtado
, Miguel J. Hornos
, María Luisa Rodríguez
, Carlos Rodríguez-Domínguez
, Ana Belén Pelegrina Ortiz, María José Rodríguez-Fórtiz:
Enabling correct design and formal analysis of Ambient Assisted Living systems. 498-510 - H. Andrés Neyem, Sergio F. Ochoa, José A. Pino, Rubén Darío Franco:
A reusable structural design for mobile collaborative applications. 511-524 - Mónica Pinto
, Lidia Fuentes
, Luis Fernández:
Deriving detailed design models from an aspect-oriented ADL using MDD. 525-545 - Rainer Weinreich
, Georg Buchgeher:
Towards supporting the software architecture life cycle. 546-561
- Daniel Rodríguez-García
, Miguel-Ángel Sicilia
, Elena García-Barriocanal, Rachel Harrison:
Empirical findings on team size and productivity in software development. 562-570 - Sudipta Bhattacharjee, Pramit Roy, Soumalya Ghosh, Sudip Misra, Mohammad S. Obaidat
:
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines. 571-581 - Diana Kirk, Ewan D. Tempero
:
A lightweight framework for describing software practices. 582-595 - Avner Ottensooser, Alan D. Fekete, Hajo A. Reijers, Jan Mendling
, Con Menictas:
Making sense of business process descriptions: An experimental comparison of graphical and textual notations. 596-606 - Javier Fabra, Valeria de Castro
, Pedro Álvarez, Esperanza Marcos
:
Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches. 607-625 - Yu-Chi Huang, Kuan-Li Peng, Chin-Yu Huang:
A history-based cost-cognizant test case prioritization technique in regression testing. 626-637 - Jianhong Zhang, Jane Mao:
An efficient RSA-based certificateless signature scheme. 638-642 - Xu An Wang
, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. 643-654 - Jun Shao, Peng Liu, Yuan Zhou:
Achieving key privacy without losing CCA security in proxy re-encryption. 655-665 - Diomidis Spinellis
, Vaggelis Giannikas
:
Organizational adoption of open source software. 666-682 - Martin Necaský
, Jakub Klímek
, Jakub Malý, Irena Mlýnková
:
Evolution and change management of XML-based systems. 683-707 - Xingwen Zhao, Fangguo Zhang
:
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. 708-716 - Pietro Colombo
, Ferhat Khendek
, Luigi Lavazza
:
Bridging the gap between requirements and design: An approach based on Problem Frames and SysML. 717-745 - Mahmood Deypir, Mohammad Hadi Sadreddini:
A dynamic layout of sliding window for frequent itemset mining over data streams. 746-759 - Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Gateway-oriented password-authenticated key exchange protocol in the standard model. 760-768
Volume 85, Number 4, April 2012
- Shichao Zhang:
Decision tree classifiers sensitive to heterogeneous costs. 771-779 - Chuan He, Xiaomin Zhu, Hui Guo, Dishan Qiu, Jianqing Jiang:
Rolling-horizon scheduling for energy constrained distributed real-time embedded systems. 780-794 - Uwe van Heesch, Paris Avgeriou
, Rich Hilliard:
A documentation framework for architecture decisions. 795-820 - Andreas Hjertström, Dag Nyström, Mikael Sjödin:
Data management for component-based embedded real-time systems: The database proxy approach. 821-834 - Alfredo Pironti, Davide Pozza
, Riccardo Sisto
:
Formally based semi-automatic implementation of an open security protocol. 835-849 - Xiao-jun Tong:
The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos. 850-858 - Dror G. Feitelson
:
Perpetual development: A model of the Linux kernel life cycle. 859-875 - Woei-Jiunn Tsaur, Jia-Hong Li, Wei-Bin Lee:
An efficient and secure multi-server authentication scheme with key agreement. 876-882 - Muhammad Arsalan, Sana Ambreen Malik, Asifullah Khan
:
Intelligent reversible watermarking in integer wavelet domain for medical images. 883-894 - Vishal Midha, Prashant Palvia:
Factors affecting the success of Open Source Software. 895-905 - J. O. Coronel, José E. Simó:
High performance dynamic voltage/frequency scaling algorithm for real-time dynamic load management. 906-919 - Farid Shirazi
:
Free and Open Source Software versus Internet content filtering and censorship: A case study. 920-931 - Kostas Kolomvatsos, George Valkanas, Stathes Hadjiefthymiades
:
Debugging applications created by a Domain Specific Language: The IPAC case. 932-943 - Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen, Wei-Zhe Sun:
Attribute-based strong designated-verifier signature scheme. 944-959 - Edward Y. Y. Kan, W. K. Chan
, T. H. Tse
:
EClass: An execution classification approach to improving the energy-efficiency of software via machine learning. 960-973 - Yih-Kai Lin, Shu-Chien Huang
, Cheng-Hsing Yang:
A fast algorithm for Huffman decoding based on a recursion Huffman tree. 974-980 - Jinmin Zhong, Xuejia Lai:
Improved preimage attack on one-block MD4. 981-994 - Tommaso Cucinotta
, Dario Faggioli:
Handling timing constraints violations in soft real-time applications as exceptions. 995-1011 - Fernanda d'Amorim, Paulo Borba
:
Modularity analysis of use case implementations. 1012-1027
Volume 85, Number 5, May 2012
- Gregory Katsaros, George Kousiouris
, Spyridon V. Gogouvitis
, Dimosthenis Kyriazis
, Andreas Menychtas
, Theodora A. Varvarigou:
A Self-adaptive hierarchical monitoring mechanism for Clouds. 1029-1041 - Jehad Al-Dallal
:
The impact of accounting for special methods in the measurement of object-oriented class cohesion on refactoring and fault prediction activities. 1042-1057 - Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:
DRMFS: A file system layer for transparent access semantics of DRM-protected contents. 1058-1066 - Huawen Liu, Shichao Zhang:
Noisy data elimination using mutual k-nearest neighbor for classification mining. 1067-1074 - Lip Yee Por
, KokSheik Wong
, Kok Onn Chee
:
UniSpaCh: A text-based data hiding method using Unicode space characters. 1075-1082 - Yan Zhu
, Hongxin Hu, Gail-Joon Ahn
, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. 1083-1095 - Shahla Ghobadi, John D'Ambra
:
Coopetitive relationships in cross-functional software development teams: How to model and measure? 1096-1104 - Guillaume Godet-Bar, Sophie Dupuy-Chessa, Dominique Rieu:
Sonata: Flexible connections between interaction and business spaces. 1105-1118 - Xiaotian Wu, Wei Sun:
Random grid-based visual secret sharing for general access structures with cheat-preventing ability. 1119-1134 - Xiaoying Wang
, Zhihui Du
, Yinong Chen
:
An adaptive model-free resource and power management approach for multi-tier cloud environments. 1135-1146 - Luca Abeni
, Nicola Manica, Luigi Palopoli:
Efficient and robust probabilistic guarantees for real-time tasks. 1147-1156 - Ting-Yi Chang, Cheng-Jung Tsai, Jyun-Hao Lin:
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. 1157-1165 - Wien Hong, Tung-Shou Chen, Chih-Wei Luo:
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. 1166-1175 - Hema Srikanth, Sean Banerjee:
Improving test efficiency through system test prioritization. 1176-1187 - Jan Mendling
, Laura Sánchez-González, Félix García
, Marcello La Rosa
:
Thresholds for error probability measures of business process models. 1188-1197 - Xin-Chang Zhang, Mei-Hong Yang, Xiao-Jing Zhu, Wan-Ming Luo:
A loss recovery approach for reliable application layer multicast. 1198-1204 - Pei-Lun Suei, Yung-Feng Lu, Rong-Jhang Liao, Shi-Wu Lo:
A signature-based Grid index design for main-memory RFID database applications. 1205-1212
Volume 85, Number 6, June 2012
- Torgeir Dingsøyr
, Sridhar P. Nerur, Venugopal Balijepally, Nils Brede Moe
:
A decade of agile methodologies: Towards explaining agile software development. 1213-1221 - Diane E. Strode
, Sid L. Huff, Beverley G. Hope, Sebastian Link
:
Coordination in co-located agile software development projects. 1222-1238 - Meghann Drury, Kieran Conboy
, Ken Power
:
Obstacles to decision making in Agile software development teams. 1239-1254 - Mali Senapathi
, Ananth Srinivasan:
Understanding post-adoptive agile usage: An exploratory cross-case analysis. 1255-1268 - Steve Adolph, Philippe Kruchten
, Wendy Hall
:
Reconciling perspectives: A grounded theory of how people manage the process of software development. 1269-1286 - Xiaofeng Wang
, Kieran Conboy
, Oisín Cawley
:
"Leagile" software development: An experience report analysis of the application of lean approaches in agile software development. 1287-1299
- Bixin Li, Dong Qiu, Hareton Leung
, Di Wang:
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. 1300-1324 - Yan-Xiao Liu, Lein Harn, Ching-Nung Yang
, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. 1325-1332 - Satchidananda Dehuri
, Rahul Roy, Sung-Bae Cho, Ashish Ghosh
:
An improved swarm optimized functional link artificial neural network (ISO-FLANN) for classification. 1333-1345 - Chao-Wei Li, Kuen-Fang Jea, Ru-Ping Lin, Ssu-Fan Yen, Chih-Wei Hsu:
Mining frequent patterns from dynamic data streams with data load management. 1346-1362 - Tsai-Hsuan Tsai, Hsien-Tsung Chang
, Yi-Ming Chang, Gung-Shiung Huang:
Sharetouch: A system to enrich social network experiences for the elderly. 1363-1369 - Ricardo Pérez-Castillo
, José A. Cruz-Lemus
, Ignacio García Rodríguez de Guzmán
, Mario Piattini
:
A family of case studies on business process mining using MARBLE. 1370-1385 - Tongquan Wei, Piyush Mishra, Kaijie Wu, Junlong Zhou:
Quasi-static fault-tolerant scheduling schemes for energy-efficient hard real-time systems. 1386-1399 - Tien Van Do, Csaba Rotter
:
Comparison of scheduling schemes for on-demand IaaS requests. 1400-1408 - Raylin Tso
, Xinyi Huang, Willy Susilo
:
Strongly secure certificateless short signatures. 1409-1417 - Bernd Burgstaller, Bernhard Scholz, Johann Blieberger:
A symbolic analysis framework for static analysis of imperative programming languages. 1418-1439 - Marion Lepmets, Tom McBride, Eric Ras
:
Goal alignment in process improvement. 1440-1452
Volume 85, Number 7, July 2012
- Jan Bosch:
Software ecosystems: Taking software development beyond the boundaries of the organization. 1453-1454 - Geir Kjetil Hanssen
:
A longitudinal case study of an emerging software ecosystem: Implications for practice and theory. 1455-1466 - Terhi Kilamo, Imed Hammouda, Tommi Mikkonen, Timo Aaltonen:
From proprietary to open source - Growing an open source ecosystem. 1467-1478 - Walt Scacchi, Thomas A. Alspaugh:
Understanding the role of licenses and evolution in open architecture software ecosystems. 1479-1494 - Slinger Jansen
, Sjaak Brinkkemper, Jurriaan Souer, Lutzen Luinenburg:
Shades of gray: Opening up a software producing organization with the open software enterprise model. 1495-1510 - Rick Kazman, Michael Gagliardi, William Wood:
Scaling up software architecture analysis. 1511-1519
- Simonetta Balsamo, Peter G. Harrison
, Andrea Marin:
Methodological construction of product-form stochastic Petri nets for performance evaluation. 1520-1539 - Javier Palanca Cámara
, Martí Navarro, Vicente Julián
, Ana García-Fornes
:
Distributed goal-oriented computing. 1540-1557 - Bixin Li, Lulu Wang, Hareton Leung
, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. 1558-1576 - Dimitris Antoniou, Yannis Plegas, Athanasios K. Tsakalidis, Giannis Tzimas
, Emmanouil Viennas:
Dynamic refinement of search engines results utilizing the user intervention. 1577-1587 - Antonella Galizia
, Alfonso Quarati
:
Job allocation strategies for energy-aware and efficient Grid infrastructures. 1588-1606 - Ana María Moreno, María Isabel Sánchez Segura
, Fuensanta Medina-Domínguez
, Laura Carvajal:
Balancing software engineering education and industrial needs. 1607-1620 - Francisco Jurado
, Miguel A. Redondo
, Manuel Ortega
:
Blackboard architecture to integrate components and agents in heterogeneous distributed eLearning systems: An application for learning to program. 1621-1636 - Francisco J. Ballesteros, Enrique Soriano
, Gorka Guardiola
:
Octopus: An Upperware based system for building personal pervasive environments. 1637-1649 - Zhongqiang Chen, Mema Roussopoulos, Zhanyan Liang, Yuan Zhang, Zhongrong Chen, Alex Delis:
Malware characteristics and threats on the internet ecosystem. 1650-1672 - Wanyong Tian, Chun Jason Xue
, Minming Li
, Enhong Chen:
Loop fusion and reordering for register file optimization on stream processors. 1673-1681 - Isaac Woungang, Felix O. Akinladejo, David W. White
, Mohammad S. Obaidat
:
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation. 1682-1698
Volume 85, Number 8, August 2012
- Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu:
Improving VRSS-based vulnerability prioritization using analytic hierarchy process. 1699-1708 - Gianpaolo Cugola, Alessandro Margara:
Complex event processing with T-REX. 1709-1728 - Song Han, Kam-yiu Lam
, Jiantao Wang, Sang Hyuk Son, Aloysius K. Mok:
Adaptive co-scheduling for periodic application and update transactions in real-time database systems. 1729-1743 - Monika Kapus-Kolar:
On "Exploring alternatives for transition verification". 1744-1748 - Aikun Li, Yi Liang, Di Wu:
Utilizing Layered Taxation to provide incentives in P2P streaming systems. 1749-1756 - Shiao-Li Tsao, Jian Jhen Chen:
SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. 1757-1769 - Ana Magazinius, Sofia Börjesson, Robert Feldt
:
Investigating intentional distortions in software cost estimation - An exploratory study. 1770-1781 - Patsy Ann Zimmer, Joanne M. Atlee:
Ordering features by category. 1782-1800 - Guido Salvaneschi
, Carlo Ghezzi, Matteo Pradella
:
Context-oriented programming: A software engineering perspective. 1801-1817 - Yong Yang, Marlon Dumas
, Luciano García-Bañuelos
, Artem Polyvyanyy
, Liang Zhang:
Generalized aggregate Quality of Service computation for composite services. 1818-1830 - Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
An encoding scheme based on fractional number for querying and updating XML data. 1831-1851 - Xiaotian Wu, Duanhao Ou, Qiming Liang, Wei Sun:
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. 1852-1863 - E. D. Tsougenis, George A. Papakostas
, Dimitris E. Koulouriotis
, Vassilios D. Tourassis:
Performance evaluation of moment-based watermarking methods: A review. 1864-1884 - Matthias Weidlich
, Jan Mendling
, Mathias Weske:
Propagating changes between aligned process models. 1885-1898 - Khaled Salah
, A. Manea, Sherali Zeadally, José M. Alcaraz Calero
:
Mitigating starvation of Linux CPU-bound processes in the presence of network I/O. 1899-1914 - Salamah Salamah, Ann Q. Gates, Vladik Kreinovich:
Validated templates for specification of complex LTL formulas. 1915-1929 - Lili Marziana Abdullah, June M. Verner:
Analysis and application of an outsourcing risk framework. 1930-1952 - Per Närman, Hannes Holm
, David Höök, Nicholas Honeth
, Pontus Johnson
:
Using enterprise architecture and technology adoption models to predict application usage. 1953-1967
Volume 85, Number 9, September 2012
- Patricia Lago, Rich Hilliard:
Special issue: Selected papers from the 9th Working IEEE/IFIP Conference on Software Architecture (WICSA 2011). 1969-1970 - Lars Pareto, Anna Börjesson Sandberg, Peter S. Eriksson, Staffan Ehnebom:
Collaborative prioritization of architectural concerns. 1971-1994 - Eltjo R. Poort, Hans van Vliet:
RCDA: Architecting as a risk- and cost management discipline. 1995-2013 - Olaf Zimmermann, Christoph Miksovic, Jochen Malte Küster:
Reference architecture, metamodel, and modeling principles for architectural knowledge management in information technology services. 2014-2033 - Eoin Woods
:
Industrial architectural assessment using TARA. 2034-2047
- Boon-Yaik Ooi, Huah Yong Chan
, Yu-N Cheah
:
Dynamic service placement and replication framework to enhance service availability using team formation algorithm. 2048-2062 - David Lo
, Leonardo Mariani
, Mauro Santoro:
Learning extended FSA from software: An empirical assessment. 2063-2076 - Leo Yu Zhang
, Chengqing Li
, Kwok-Wo Wong, Shi Shu, Guanrong Chen
:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. 2077-2085 - Viljan Mahnic
, Tomaz Hovelja:
On using planning poker for estimating user stories. 2086-2095 - Chong Hee Kim:
Differential fault analysis of ARIA in multi-byte fault models. 2096-2103 - Der-Chen Huang, Kun-Ding Hung, Yung-Kuan Chan
:
A computer assisted method for leukocyte nucleus segmentation and recognition in blood smear images. 2104-2118 - Alexis Papadimitriou, Panagiotis Symeonidis
, Yannis Manolopoulos:
Fast and accurate link prediction in social networking systems. 2119-2132 - Houcemeddine Hermassi
, Rhouma Rhouma
, Safya Belghith
:
Security analysis of image cryptosystems only or partially based on a chaotic permutation. 2133-2144 - Luís Nogueira
, Luís Miguel Pinho
, Jorge Coelho
:
A feedback-based decentralised coordination model for distributed open real-time systems. 2145-2159 - Tim Miller
, Sonja Pedell, Leon Sterling, Frank Vetere
, Steve Howard:
Understanding socially oriented roles and goals through motivational modelling. 2160-2170 - Carla L. Pacheco, Iván A. García:
A systematic literature review of stakeholder identification methods in requirements elicitation. 2171-2181 - Narasimha Bolloju, Sherry Xiaoyun Sun:
Benefits of supplementing use case narratives with activity diagrams - An exploratory study. 2182-2191
- Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768]. 2192
Volume 85, Number 10, October 2012
- Andrea Capiluppi
, Anthony Cleve, Naouel Moha:
Guest editors' introduction to the special issue on automated software evolution. 2193-2194 - Weiyi Shang, Bram Adams
, Ahmed E. Hassan:
Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report. 2195-2204 - Patrick Mäder, Orlena Gotel:
Towards automated traceability maintenance. 2205-2227 - Pietro Abate, Roberto Di Cosmo, Ralf Treinen, Stefano Zacchiroli
:
Dependency solving: A separate concern in component evolution management. 2228-2240 - Marios Fokaefs, Nikolaos Tsantalis
, Eleni Stroulia
, Alexander Chatzigeorgiou:
Identification and application of Extract Class refactorings in object-oriented systems. 2241-2260 - Andreas Pleuss, Goetz Botterweck
, Deepak Dhungana
, Andreas Polzer, Stefan Kowalewski:
Model-driven support for product line evolution on feature level. 2261-2274 - Pamela Bhattacharya, Iulian Neamtiu, Christian R. Shelton
:
Automated, highly-accurate, bug assignment using machine learning and tossing graphs. 2275-2292 - Walid M. Ibrahim, Nicolas Bettenburg, Bram Adams
, Ahmed E. Hassan:
On the relationship between comment update practices and Software Bugs. 2293-2304 - Kai Yu, Mengxiang Lin, Jin Chen, Xiangyu Zhang:
Towards automated debugging in software evolution: Evaluating delta debugging on real regression bugs from the developers' perspectives. 2305-2317 - Omar Alam, Bram Adams
, Ahmed E. Hassan:
Preserving knowledge in software projects. 2318-2330
- Jinkyu Lee, Insik Shin, Arvind Easwaran
:
Convex optimization framework for intermediate deadline assignment in soft and hard real-time distributed systems. 2331-2339 - Indika Meedeniya, Aldeida Aleti
, Lars Grunske
:
Architecture-driven reliability optimization with uncertain model parameters. 2340-2355 - Paul M. Clarke
, Rory V. O'Connor
:
The influence of SPI on business success in software SMEs: An empirical study. 2356-2367 - Juan Manuel Vara
, Esperanza Marcos
:
A framework for model-driven development of information systems: Technical decisions and lessons learned. 2368-2384 - Esra Satir
, Hakan Isik
:
A compression-based text steganography method. 2385-2394 - Yih-Kai Lin:
High capacity reversible data hiding scheme based upon discrete cosine transformation. 2395-2404 - Juri Lelli, Dario Faggioli, Tommaso Cucinotta
, Giuseppe Lipari
:
An experimental comparison of different real-time schedulers on multicore systems. 2405-2416
- Alfonso Fuggetta:
3 + 1 Challenges for the future of universities. 2417-2424
Volume 85, Number 11, November 2012
- S. R. Kannan, S. Ramathilagam, R. Devi, E. Hines:
Strong fuzzy c-means in medical image data analysis. 2425-2438 - V. Mohanraj
, M. Chandrasekaran, J. Senthilkumar
, S. Arumugam, Y. Suresh
:
Ontology driven bee's foraging approach based self adaptive online recommendation system. 2439-2450 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256. 2451-2458 - Jenhui Chen
, Woei-Hwa Tarn, Wu-Hsiao Hsu, Chih-Chieh Wang:
Cross-layer end-to-end label switching protocol for WiMAX-MPLS heterogeneous networks. 2459-2469 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:
A variable-length model for masquerade detection. 2470-2478 - Marco Avvenuti
, Cinzia Bernardeschi
, Nicoletta De Francesco, Paolo Masci
:
JCSI: A tool for checking secure information flow in Java Card applications. 2479-2493 - Magne Jørgensen, Barbara A. Kitchenham
:
Interpretation problems related to the use of regression models to decide on economy of scale in software development. 2494-2503 - Pedro Sánchez-Palma
, Diego Alonso
, José Miguel Morales
, Pedro Javier Navarro Lorente
:
From Teleo-Reactive specifications to architectural components: A model-driven approach. 2504-2518 - Benjamin Morandi, Sebastian Nanz, Bertrand Meyer
:
Performance analysis of SCOOP programs. 2519-2530 - Dunwei Gong, Tian Tian, Xiangjuan Yao:
Grouping target paths for evolutionary generation of test data in parallel. 2531-2540 - Shichao Zhang:
Nearest neighbor selection for iteratively kNN imputation. 2541-2552 - Wei-neng Wang, Fu-sheng Chen, Zhiqiang Wang:
An endurance solution for solid state drives with cache. 2553-2558 - Francesco Palmieri
:
Percolation-based routing in the Internet. 2559-2573 - Hongyu Pei Breivold, Ivica Crnkovic
, Magnus Larsson
:
Software architecture evolution through evolvability analysis. 2574-2592 - Qian Lin, Zhengwei Qi, Jiewei Wu, Yaozu Dong, Haibing Guan:
Optimizing virtual machines using hybrid virtualization. 2593-2603 - Geert Monsieur, Monique Snoeck
, Wilfried Lemahieu:
Managing data dependencies in service compositions. 2604-2628 - Tim Verbelen
, Pieter Simoens
, Filip De Turck
, Bart Dhoedt:
AIOLOS: Middleware for improving mobile application performance through cyber foraging. 2629-2639 - Iván S. Razo-Zapata
, J. Carlos Mex-Perera
, Raúl Monroy Borja
:
Masquerade attacks based on user's profile. 2640-2651 - Soon-Kyeong Kim, Toby Myers, Marc-Florian Wendland, Peter A. Lindsay
:
Execution of natural language requirements using State Machines synthesised from Behavior Trees. 2652-2664 - Sana Ambreen Malik, Asifullah Khan
, Mutawarra Hussain, Khurram Jawad
, Rafiullah Chamlawi
, Abdul Jalil:
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches. 2665-2673
Volume 85, Number 12, December 2012
- Danny Weyns
, Sam Malek, Jesper Andersson, Bradley R. Schmerl:
Introduction to the special issue on state of the art in engineering self-adaptive systems. 2675-2677 - Tharindu Patikirikorala, Alan W. Colman
, Jun Han, Liuping Wang
:
An evaluation of multi-model self-managing control schemes for adaptive performance management of software systems. 2678-2696 - Yönet A. Eracar, Mieczyslaw M. Kokar:
Self-control of the time complexity of a constraint satisfaction problem solver program. 2697-2706 - Xin Peng, Bihuan Chen, Yijun Yu
, Wenyun Zhao:
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop. 2707-2719 - Mehdi Amoui, Mahdi Derakhshanmanesh, Jürgen Ebert, Ladan Tahvildari:
Achieving dynamic adaptation via management and interpretation of runtime models. 2720-2737 - Guoquan Wu, Jun Wei, Chunyang Ye, Hua Zhong, Tao Huang, Hong He:
Specification and monitoring of data-centric temporal properties for service-based systems. 2738-2754 - Ermyas Abebe, Caspar Ryan
:
Adaptive application offloading using distributed abstract class graphs in mobile environments. 2755-2769 - Narges Khakpour
, Saeed Jalili
, Marjan Sirjani, Ursula Goltz, Bahareh Abolhasanzadeh:
HPobSAM for modeling and analyzing IT Ecosystems - Through a case study. 2770-2784 - Andrei Pruteanu, Stefan Dulman:
LossEstimate: Distributed failure estimation in wireless networks. 2785-2795 - Diego Perez-Palacin, Raffaela Mirandola
, José Merseguer
:
QoS and energy management with Petri nets: A self-adaptive framework. 2796-2811 - Chang Xu, Shing-Chi Cheung
, Xiaoxing Ma
, Chun Cao, Jian Lu:
Adam: Identifying defects in context-aware adaptation. 2812-2828 - Mohammed Salifu, Yijun Yu
, Arosha K. Bandara
, Bashar Nuseibeh
:
Analysing monitoring and switching problems for adaptive systems. 2829-2839 - Svein O. Hallsteinsen, Kurt Geihs
, Nearchos Paspallis
, Frank Eliassen, Geir Horn
, Jorge Lorenzo, Alessandro Mamelli, George Angelos Papadopoulos
:
A development framework and methodology for self-adapting applications in ubiquitous computing environments. 2840-2859 - Shang-Wen Cheng, David Garlan:
Stitch: A language for architecture-based self-adaptation. 2860-2875
- Jingyu Kim, Sungwon Kang, Jihyun Lee, Bong Wan Choi:
A semantic translation method for data communication protocols. 2876-2898 - Tae Hyun Kim, ChangKyun Kim, IlHwan Park:
Side channel analysis attacks using AM demodulation on commercial smart cards with SEED. 2899-2908 - José Ramón Méndez
, Miguel Reboiro-Jato
, Fernando Díaz
, Eduardo Díaz, Florentino Fdez-Riverola
:
Grindstone4Spam: An optimization toolkit for boosting e-mail classification. 2909-2920 - Manlu Liu, Harry Jiannan Wang, J. Leon Zhao:
Technology flexibility as enabler of robust application development in community source: The case of Kuali and Sakai. 2921-2928

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.