


default search action
Journal of Systems and Software, Volume 85
Volume 85, Number 1, January 2012
- W. Eric Wong, W. K. Chan

, T. H. Tse
, Fei-Ching Kuo:
Special Issue on Dynamic Analysis and Testing of Embedded Software. 1-2 - Maria de Fátima Mattiello-Francisco

, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano:
InRob: An approach for testing interoperability and robustness of real-time embedded software. 3-15 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:

Test coverage optimization for large code problems. 16-27 - Jooyoung Seo, Byoungju Choi, Suengwan Yang:

Lightweight embedded software performance analysis method by kernel hack and its industrial field study. 28-42 - Chorng-Shiuh Koong, Chihhsiong Shih, Pao-Ann Hsiung

, Hung-Jui Lai, Chih-Hung Chang
, William C. Chu, Nien-Lin Hsueh, Chao-Tung Yang
:
Automatic testing environment for multi-core embedded software - ATEMES. 43-60
- Mohamed Alnas, Irfan Awan, D. R. W. Holton:

Erratum to "Performance evaluation of fast handover in mobile IPv6 based on link layer informations" [Journal of Systems and Software 83 (2010) 1644-1650]. 61 - Ching-Wen Chen, Chuan-Chi Weng:

A power efficiency routing and maintenance protocol in wireless multi-hop networks. 62-76 - Antonino Santos

, Juan Romero
, Francisco Javier Taibo
, Carlos Rodríguez, Adrián Carballal
:
Self-tuning of disk input-output in operating systems. 77-86 - Xiaoyu Tang, Qingtian Zeng:

Keyword clustering for user interest profiling refinement within paper recommender systems. 87-101 - Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner

, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. 102-111 - Genaína Nunes Rodrigues

, Vander Alves
, Renato Silveira, Luiz A. Laranjeira:
Dependability analysis in the Ambient Assisted Living Domain: An exploratory case study. 112-131 - Lakshitha de Silva, Dharini Balasubramaniam

:
Controlling software architecture erosion: A survey. 132-151 - Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-Porisini

:
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. 152-166 - Hung-Yi Lin:

Using compressed index structures for processing moving objects in large spatio-temporal databases. 167-177 - Herman Hartmann, Tim Trew, Jan Bosch:

The changing industry structure of software development for consumer electronics and its consequences for software architectures. 178-192 - Moussa Ouedraogo, Djamel Khadraoui, Haralambos Mouratidis

, Eric Dubois
:
Appraisal and reporting of security assurance at operational systems level. 193-208 - Harendra Singh, Girraj Kumar Verma

:
ID-based proxy signature scheme with message recovery. 209-214
Volume 85, Number 2, February 2012
- Paulo Borba

:
Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering. 215 - Fabio Q. B. da Silva

, A. César C. França:
Towards understanding the underlying structure of motivational factors for software engineers to guide the definition of motivational programs. 216-226 - Eduardo Figueiredo

, Cláudio Sant'Anna, Alessandro Garcia, Carlos José Pereira de Lucena:
Applying and evaluating concern-sensitive design heuristics. 227-243 - Kecia Aline M. Ferreira, Mariza Andrade da Silva Bigonha

, Roberto da Silva Bigonha, Luiz F. O. Mendes, Heitor C. Almeida:
Identifying thresholds for object-oriented software metrics. 244-257 - Elder Cirilo, Ingrid Nunes

, Uirá Kulesza, Carlos José Pereira de Lucena:
Automating the product derivation process of multi-agent systems product lines. 258-276 - João Gustavo Prudêncio, Leonardo Murta, Cláudia M. L. Werner

, Rafael da Silva Viterbo de Cepêda:
To lock, or not to lock: That is the question. 277-289
- Xiaopeng Wei, Ling Guo, Qiang Zhang

, Jianxin Zhang, Shiguo Lian:
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. 290-299 - Xiaolin Ma, Fangmin Li

, Fei Hu, Xinhua Liu:
A hybrid channel assignment strategy to QoS support of video-streaming over multi-channel ad hoc networks. 300-308 - Zhenxing Qian

, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream. 309-313 - Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:

An efficient short certificate-based signature scheme. 314-322 - Mohamed El-Attar

:
Towards developing consistent misuse case models. 323-339 - Jun-Han Yang, Tian-Jie Cao

:
Provably secure three-party password authenticated key exchange protocol in the standard model. 340-350 - Andréa Magalhães Magdaleno, Cláudia Maria Lima Werner

, Renata Mendes de Araujo
:
Reconciling software development models: A quasi-systematic review. 351-369 - Hongzhe Liu

, Hong Bao
, De Xu:
Concept vector for semantic similarity and relatedness based on WordNet structure. 370-381 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:

Intrusion-resilient identity-based signature: Security definition and construction. 382-391 - Guorui Feng, Lingyan Fan:

Reversible data hiding of high payload using local edge sensing prediction. 392-399 - Qing Zhou, Xiaofeng Liao:

Collision-based flexible image encryption algorithm. 400-407 - Seyed Mohammad Hossein Hasheminejad

, Saeed Jalili
:
Design patterns selection: An automatic two-phase method. 408-424 - Sergio Pozo

, Rafael M. Gasca
, Antonia M. Reina Quintero
, Angel Jesus Varela-Vaca
:
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. 425-457
Volume 85, Number 3, March 2012
- Lawrence Chung, Manuel Noguera

, Nary Subramanian, José Luis Garrido
:
Novel approaches in the design and implementation of system/software architectures. 459-462 - Jaelson Castro

, Márcia Lucena
, Carla T. L. L. Silva, Fernanda M. R. Alencar
, Emanuel Santos, João Pimentel:
Changing attitudes towards the generation of architectural models. 463-479 - Rafael Z. Frantz

, Rafael Corchuelo
, Carlos Molina-Jiménez:
A proposal to detect errors in Enterprise Application Integration solutions. 480-497 - Kawtar Benghazi Akhlaki

, María Visitación Hurtado
, Miguel J. Hornos
, María Luisa Rodríguez
, Carlos Rodríguez-Domínguez
, Ana Belén Pelegrina Ortiz, María José Rodríguez-Fórtiz:
Enabling correct design and formal analysis of Ambient Assisted Living systems. 498-510 - H. Andrés Neyem, Sergio F. Ochoa, José A. Pino, Rubén Darío Franco:

A reusable structural design for mobile collaborative applications. 511-524 - Mónica Pinto

, Lidia Fuentes
, Luis Fernández:
Deriving detailed design models from an aspect-oriented ADL using MDD. 525-545 - Rainer Weinreich

, Georg Buchgeher:
Towards supporting the software architecture life cycle. 546-561
- Daniel Rodríguez-García

, Miguel-Ángel Sicilia
, Elena García-Barriocanal, Rachel Harrison:
Empirical findings on team size and productivity in software development. 562-570 - Sudipta Bhattacharjee, Pramit Roy, Soumalya Ghosh, Sudip Misra, Mohammad S. Obaidat

:
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines. 571-581 - Diana Kirk, Ewan D. Tempero

:
A lightweight framework for describing software practices. 582-595 - Avner Ottensooser, Alan D. Fekete, Hajo A. Reijers, Jan Mendling

, Con Menictas:
Making sense of business process descriptions: An experimental comparison of graphical and textual notations. 596-606 - Javier Fabra, Valeria de Castro

, Pedro Álvarez, Esperanza Marcos
:
Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches. 607-625 - Yu-Chi Huang, Kuan-Li Peng, Chin-Yu Huang:

A history-based cost-cognizant test case prioritization technique in regression testing. 626-637 - Jianhong Zhang, Jane Mao:

An efficient RSA-based certificateless signature scheme. 638-642 - Xu An Wang

, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. 643-654 - Jun Shao, Peng Liu, Yuan Zhou:

Achieving key privacy without losing CCA security in proxy re-encryption. 655-665 - Diomidis Spinellis

, Vaggelis Giannikas
:
Organizational adoption of open source software. 666-682 - Martin Necaský

, Jakub Klímek
, Jakub Malý, Irena Mlýnková
:
Evolution and change management of XML-based systems. 683-707 - Xingwen Zhao, Fangguo Zhang

:
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. 708-716 - Pietro Colombo

, Ferhat Khendek
, Luigi Lavazza
:
Bridging the gap between requirements and design: An approach based on Problem Frames and SysML. 717-745 - Mahmood Deypir, Mohammad Hadi Sadreddini:

A dynamic layout of sliding window for frequent itemset mining over data streams. 746-759 - Fushan Wei, Zhenfeng Zhang, Chuangui Ma:

Gateway-oriented password-authenticated key exchange protocol in the standard model. 760-768
Volume 85, Number 4, April 2012
- Shichao Zhang:

Decision tree classifiers sensitive to heterogeneous costs. 771-779 - Chuan He, Xiaomin Zhu, Hui Guo, Dishan Qiu, Jianqing Jiang:

Rolling-horizon scheduling for energy constrained distributed real-time embedded systems. 780-794 - Uwe van Heesch, Paris Avgeriou

, Rich Hilliard:
A documentation framework for architecture decisions. 795-820 - Andreas Hjertström, Dag Nyström, Mikael Sjödin:

Data management for component-based embedded real-time systems: The database proxy approach. 821-834 - Alfredo Pironti, Davide Pozza

, Riccardo Sisto
:
Formally based semi-automatic implementation of an open security protocol. 835-849 - Xiao-jun Tong:

The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos. 850-858 - Dror G. Feitelson

:
Perpetual development: A model of the Linux kernel life cycle. 859-875 - Woei-Jiunn Tsaur, Jia-Hong Li, Wei-Bin Lee:

An efficient and secure multi-server authentication scheme with key agreement. 876-882 - Muhammad Arsalan, Sana Ambreen Malik, Asifullah Khan

:
Intelligent reversible watermarking in integer wavelet domain for medical images. 883-894 - Vishal Midha, Prashant Palvia:

Factors affecting the success of Open Source Software. 895-905 - J. O. Coronel, José E. Simó:

High performance dynamic voltage/frequency scaling algorithm for real-time dynamic load management. 906-919 - Farid Shirazi

:
Free and Open Source Software versus Internet content filtering and censorship: A case study. 920-931 - Kostas Kolomvatsos, George Valkanas, Stathes Hadjiefthymiades

:
Debugging applications created by a Domain Specific Language: The IPAC case. 932-943 - Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen, Wei-Zhe Sun:

Attribute-based strong designated-verifier signature scheme. 944-959 - Edward Y. Y. Kan, W. K. Chan

, T. H. Tse
:
EClass: An execution classification approach to improving the energy-efficiency of software via machine learning. 960-973 - Yih-Kai Lin, Shu-Chien Huang

, Cheng-Hsing Yang:
A fast algorithm for Huffman decoding based on a recursion Huffman tree. 974-980 - Jinmin Zhong, Xuejia Lai:

Improved preimage attack on one-block MD4. 981-994 - Tommaso Cucinotta

, Dario Faggioli:
Handling timing constraints violations in soft real-time applications as exceptions. 995-1011 - Fernanda d'Amorim, Paulo Borba

:
Modularity analysis of use case implementations. 1012-1027
Volume 85, Number 5, May 2012
- Gregory Katsaros, George Kousiouris

, Spyridon V. Gogouvitis
, Dimosthenis Kyriazis
, Andreas Menychtas
, Theodora A. Varvarigou:
A Self-adaptive hierarchical monitoring mechanism for Clouds. 1029-1041 - Jehad Al-Dallal

:
The impact of accounting for special methods in the measurement of object-oriented class cohesion on refactoring and fault prediction activities. 1042-1057 - Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:

DRMFS: A file system layer for transparent access semantics of DRM-protected contents. 1058-1066 - Huawen Liu, Shichao Zhang:

Noisy data elimination using mutual k-nearest neighbor for classification mining. 1067-1074 - Lip Yee Por

, KokSheik Wong
, Kok Onn Chee
:
UniSpaCh: A text-based data hiding method using Unicode space characters. 1075-1082 - Yan Zhu

, Hongxin Hu, Gail-Joon Ahn
, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. 1083-1095 - Shahla Ghobadi, John D'Ambra

:
Coopetitive relationships in cross-functional software development teams: How to model and measure? 1096-1104 - Guillaume Godet-Bar, Sophie Dupuy-Chessa, Dominique Rieu:

Sonata: Flexible connections between interaction and business spaces. 1105-1118 - Xiaotian Wu, Wei Sun:

Random grid-based visual secret sharing for general access structures with cheat-preventing ability. 1119-1134 - Xiaoying Wang

, Zhihui Du
, Yinong Chen
:
An adaptive model-free resource and power management approach for multi-tier cloud environments. 1135-1146 - Luca Abeni

, Nicola Manica, Luigi Palopoli:
Efficient and robust probabilistic guarantees for real-time tasks. 1147-1156 - Ting-Yi Chang, Cheng-Jung Tsai, Jyun-Hao Lin:

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. 1157-1165 - Wien Hong, Tung-Shou Chen, Chih-Wei Luo:

Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. 1166-1175 - Hema Srikanth, Sean Banerjee:

Improving test efficiency through system test prioritization. 1176-1187 - Jan Mendling

, Laura Sánchez-González, Félix García
, Marcello La Rosa
:
Thresholds for error probability measures of business process models. 1188-1197 - Xin-Chang Zhang, Mei-Hong Yang, Xiao-Jing Zhu, Wan-Ming Luo:

A loss recovery approach for reliable application layer multicast. 1198-1204 - Pei-Lun Suei, Yung-Feng Lu, Rong-Jhang Liao, Shi-Wu Lo:

A signature-based Grid index design for main-memory RFID database applications. 1205-1212
Volume 85, Number 6, June 2012
- Torgeir Dingsøyr

, Sridhar P. Nerur, Venugopal Balijepally, Nils Brede Moe
:
A decade of agile methodologies: Towards explaining agile software development. 1213-1221 - Diane E. Strode

, Sid L. Huff, Beverley G. Hope, Sebastian Link
:
Coordination in co-located agile software development projects. 1222-1238 - Meghann Drury, Kieran Conboy

, Ken Power
:
Obstacles to decision making in Agile software development teams. 1239-1254 - Mali Senapathi

, Ananth Srinivasan:
Understanding post-adoptive agile usage: An exploratory cross-case analysis. 1255-1268 - Steve Adolph, Philippe Kruchten

, Wendy Hall
:
Reconciling perspectives: A grounded theory of how people manage the process of software development. 1269-1286 - Xiaofeng Wang

, Kieran Conboy
, Oisín Cawley
:
"Leagile" software development: An experience report analysis of the application of lean approaches in agile software development. 1287-1299
- Bixin Li, Dong Qiu, Hareton Leung

, Di Wang:
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. 1300-1324 - Yan-Xiao Liu, Lein Harn, Ching-Nung Yang

, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. 1325-1332 - Satchidananda Dehuri

, Rahul Roy, Sung-Bae Cho, Ashish Ghosh
:
An improved swarm optimized functional link artificial neural network (ISO-FLANN) for classification. 1333-1345 - Chao-Wei Li, Kuen-Fang Jea, Ru-Ping Lin, Ssu-Fan Yen, Chih-Wei Hsu:

Mining frequent patterns from dynamic data streams with data load management. 1346-1362 - Tsai-Hsuan Tsai, Hsien-Tsung Chang

, Yi-Ming Chang, Gung-Shiung Huang:
Sharetouch: A system to enrich social network experiences for the elderly. 1363-1369 - Ricardo Pérez-Castillo

, José A. Cruz-Lemus
, Ignacio García Rodríguez de Guzmán
, Mario Piattini
:
A family of case studies on business process mining using MARBLE. 1370-1385 - Tongquan Wei, Piyush Mishra, Kaijie Wu, Junlong Zhou:

Quasi-static fault-tolerant scheduling schemes for energy-efficient hard real-time systems. 1386-1399 - Tien Van Do

, Csaba Rotter
:
Comparison of scheduling schemes for on-demand IaaS requests. 1400-1408 - Raylin Tso

, Xinyi Huang, Willy Susilo
:
Strongly secure certificateless short signatures. 1409-1417 - Bernd Burgstaller, Bernhard Scholz, Johann Blieberger:

A symbolic analysis framework for static analysis of imperative programming languages. 1418-1439 - Marion Lepmets, Tom McBride, Eric Ras

:
Goal alignment in process improvement. 1440-1452
Volume 85, Number 7, July 2012
- Jan Bosch:

Software ecosystems: Taking software development beyond the boundaries of the organization. 1453-1454 - Geir Kjetil Hanssen

:
A longitudinal case study of an emerging software ecosystem: Implications for practice and theory. 1455-1466 - Terhi Kilamo, Imed Hammouda, Tommi Mikkonen, Timo Aaltonen:

From proprietary to open source - Growing an open source ecosystem. 1467-1478 - Walt Scacchi, Thomas A. Alspaugh:

Understanding the role of licenses and evolution in open architecture software ecosystems. 1479-1494 - Slinger Jansen

, Sjaak Brinkkemper, Jurriaan Souer, Lutzen Luinenburg:
Shades of gray: Opening up a software producing organization with the open software enterprise model. 1495-1510 - Rick Kazman, Michael Gagliardi, William Wood:

Scaling up software architecture analysis. 1511-1519
- Simonetta Balsamo, Peter G. Harrison

, Andrea Marin:
Methodological construction of product-form stochastic Petri nets for performance evaluation. 1520-1539 - Javier Palanca Cámara

, Martí Navarro, Vicente Julián
, Ana García-Fornes
:
Distributed goal-oriented computing. 1540-1557 - Bixin Li, Lulu Wang, Hareton Leung

, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. 1558-1576 - Dimitris Antoniou, Yannis Plegas, Athanasios K. Tsakalidis, Giannis Tzimas

, Emmanouil Viennas:
Dynamic refinement of search engines results utilizing the user intervention. 1577-1587 - Antonella Galizia

, Alfonso Quarati
:
Job allocation strategies for energy-aware and efficient Grid infrastructures. 1588-1606 - Ana María Moreno, María Isabel Sánchez Segura

, Fuensanta Medina-Domínguez
, Laura Carvajal:
Balancing software engineering education and industrial needs. 1607-1620 - Francisco Jurado

, Miguel A. Redondo
, Manuel Ortega
:
Blackboard architecture to integrate components and agents in heterogeneous distributed eLearning systems: An application for learning to program. 1621-1636 - Francisco J. Ballesteros, Enrique Soriano

, Gorka Guardiola
:
Octopus: An Upperware based system for building personal pervasive environments. 1637-1649 - Zhongqiang Chen, Mema Roussopoulos, Zhanyan Liang, Yuan Zhang, Zhongrong Chen, Alex Delis:

Malware characteristics and threats on the internet ecosystem. 1650-1672 - Wanyong Tian, Chun Jason Xue

, Minming Li
, Enhong Chen:
Loop fusion and reordering for register file optimization on stream processors. 1673-1681 - Isaac Woungang, Felix O. Akinladejo, David W. White

, Mohammad S. Obaidat
:
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation. 1682-1698
Volume 85, Number 8, August 2012
- Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu:

Improving VRSS-based vulnerability prioritization using analytic hierarchy process. 1699-1708 - Gianpaolo Cugola, Alessandro Margara:

Complex event processing with T-REX. 1709-1728 - Song Han, Kam-yiu Lam

, Jiantao Wang, Sang Hyuk Son, Aloysius K. Mok:
Adaptive co-scheduling for periodic application and update transactions in real-time database systems. 1729-1743 - Monika Kapus-Kolar:

On "Exploring alternatives for transition verification". 1744-1748 - Aikun Li, Yi Liang, Di Wu:

Utilizing Layered Taxation to provide incentives in P2P streaming systems. 1749-1756 - Shiao-Li Tsao, Jian Jhen Chen:

SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. 1757-1769 - Ana Magazinius, Sofia Börjesson, Robert Feldt

:
Investigating intentional distortions in software cost estimation - An exploratory study. 1770-1781 - Patsy Ann Zimmer, Joanne M. Atlee:

Ordering features by category. 1782-1800 - Guido Salvaneschi

, Carlo Ghezzi, Matteo Pradella
:
Context-oriented programming: A software engineering perspective. 1801-1817 - Yong Yang, Marlon Dumas

, Luciano García-Bañuelos
, Artem Polyvyanyy
, Liang Zhang:
Generalized aggregate Quality of Service computation for composite services. 1818-1830 - Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:

An encoding scheme based on fractional number for querying and updating XML data. 1831-1851 - Xiaotian Wu, Duanhao Ou, Qiming Liang, Wei Sun:

A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. 1852-1863 - E. D. Tsougenis, George A. Papakostas

, Dimitris E. Koulouriotis
, Vassilios D. Tourassis:
Performance evaluation of moment-based watermarking methods: A review. 1864-1884 - Matthias Weidlich

, Jan Mendling
, Mathias Weske:
Propagating changes between aligned process models. 1885-1898 - Khaled Salah

, A. Manea, Sherali Zeadally, José M. Alcaraz Calero
:
Mitigating starvation of Linux CPU-bound processes in the presence of network I/O. 1899-1914 - Salamah Salamah, Ann Q. Gates, Vladik Kreinovich:

Validated templates for specification of complex LTL formulas. 1915-1929 - Lili Marziana Abdullah

, June M. Verner:
Analysis and application of an outsourcing risk framework. 1930-1952 - Per Närman, Hannes Holm

, David Höök, Nicholas Honeth
, Pontus Johnson
:
Using enterprise architecture and technology adoption models to predict application usage. 1953-1967
Volume 85, Number 9, September 2012
- Patricia Lago, Rich Hilliard:

Special issue: Selected papers from the 9th Working IEEE/IFIP Conference on Software Architecture (WICSA 2011). 1969-1970 - Lars Pareto, Anna Börjesson Sandberg, Peter S. Eriksson, Staffan Ehnebom:

Collaborative prioritization of architectural concerns. 1971-1994 - Eltjo R. Poort, Hans van Vliet:

RCDA: Architecting as a risk- and cost management discipline. 1995-2013 - Olaf Zimmermann, Christoph Miksovic, Jochen Malte Küster:

Reference architecture, metamodel, and modeling principles for architectural knowledge management in information technology services. 2014-2033 - Eoin Woods

:
Industrial architectural assessment using TARA. 2034-2047
- Boon-Yaik Ooi, Huah Yong Chan

, Yu-N Cheah
:
Dynamic service placement and replication framework to enhance service availability using team formation algorithm. 2048-2062 - David Lo

, Leonardo Mariani
, Mauro Santoro:
Learning extended FSA from software: An empirical assessment. 2063-2076 - Leo Yu Zhang

, Chengqing Li
, Kwok-Wo Wong, Shi Shu, Guanrong Chen
:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. 2077-2085 - Viljan Mahnic

, Tomaz Hovelja:
On using planning poker for estimating user stories. 2086-2095 - Chong Hee Kim:

Differential fault analysis of ARIA in multi-byte fault models. 2096-2103 - Der-Chen Huang, Kun-Ding Hung, Yung-Kuan Chan

:
A computer assisted method for leukocyte nucleus segmentation and recognition in blood smear images. 2104-2118 - Alexis Papadimitriou, Panagiotis Symeonidis

, Yannis Manolopoulos:
Fast and accurate link prediction in social networking systems. 2119-2132 - Houcemeddine Hermassi

, Rhouma Rhouma
, Safya Belghith
:
Security analysis of image cryptosystems only or partially based on a chaotic permutation. 2133-2144 - Luís Nogueira

, Luís Miguel Pinho
, Jorge Coelho
:
A feedback-based decentralised coordination model for distributed open real-time systems. 2145-2159 - Tim Miller

, Sonja Pedell, Leon Sterling, Frank Vetere
, Steve Howard:
Understanding socially oriented roles and goals through motivational modelling. 2160-2170 - Carla L. Pacheco, Iván A. García:

A systematic literature review of stakeholder identification methods in requirements elicitation. 2171-2181 - Narasimha Bolloju, Sherry Xiaoyun Sun:

Benefits of supplementing use case narratives with activity diagrams - An exploratory study. 2182-2191
- Fushan Wei, Zhenfeng Zhang, Chuangui Ma:

Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768]. 2192
Volume 85, Number 10, October 2012
- Andrea Capiluppi

, Anthony Cleve, Naouel Moha:
Guest editors' introduction to the special issue on automated software evolution. 2193-2194 - Weiyi Shang, Bram Adams

, Ahmed E. Hassan:
Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report. 2195-2204 - Patrick Mäder, Orlena Gotel:

Towards automated traceability maintenance. 2205-2227 - Pietro Abate, Roberto Di Cosmo, Ralf Treinen, Stefano Zacchiroli

:
Dependency solving: A separate concern in component evolution management. 2228-2240 - Marios Fokaefs, Nikolaos Tsantalis

, Eleni Stroulia
, Alexander Chatzigeorgiou:
Identification and application of Extract Class refactorings in object-oriented systems. 2241-2260 - Andreas Pleuss, Goetz Botterweck

, Deepak Dhungana
, Andreas Polzer, Stefan Kowalewski:
Model-driven support for product line evolution on feature level. 2261-2274 - Pamela Bhattacharya, Iulian Neamtiu, Christian R. Shelton

:
Automated, highly-accurate, bug assignment using machine learning and tossing graphs. 2275-2292 - Walid M. Ibrahim, Nicolas Bettenburg, Bram Adams

, Ahmed E. Hassan:
On the relationship between comment update practices and Software Bugs. 2293-2304 - Kai Yu, Mengxiang Lin, Jin Chen, Xiangyu Zhang:

Towards automated debugging in software evolution: Evaluating delta debugging on real regression bugs from the developers' perspectives. 2305-2317 - Omar Alam, Bram Adams

, Ahmed E. Hassan:
Preserving knowledge in software projects. 2318-2330
- Jinkyu Lee, Insik Shin, Arvind Easwaran

:
Convex optimization framework for intermediate deadline assignment in soft and hard real-time distributed systems. 2331-2339 - Indika Meedeniya, Aldeida Aleti

, Lars Grunske
:
Architecture-driven reliability optimization with uncertain model parameters. 2340-2355 - Paul M. Clarke

, Rory V. O'Connor
:
The influence of SPI on business success in software SMEs: An empirical study. 2356-2367 - Juan Manuel Vara

, Esperanza Marcos
:
A framework for model-driven development of information systems: Technical decisions and lessons learned. 2368-2384 - Esra Satir

, Hakan Isik
:
A compression-based text steganography method. 2385-2394 - Yih-Kai Lin:

High capacity reversible data hiding scheme based upon discrete cosine transformation. 2395-2404 - Juri Lelli, Dario Faggioli, Tommaso Cucinotta

, Giuseppe Lipari
:
An experimental comparison of different real-time schedulers on multicore systems. 2405-2416
- Alfonso Fuggetta:

3 + 1 Challenges for the future of universities. 2417-2424
Volume 85, Number 11, November 2012
- S. R. Kannan, S. Ramathilagam, R. Devi, E. Hines:

Strong fuzzy c-means in medical image data analysis. 2425-2438 - V. Mohanraj

, M. Chandrasekaran, J. Senthilkumar
, S. Arumugam, Y. Suresh
:
Ontology driven bee's foraging approach based self adaptive online recommendation system. 2439-2450 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:

Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256. 2451-2458 - Jenhui Chen

, Woei-Hwa Tarn, Wu-Hsiao Hsu, Chih-Chieh Wang:
Cross-layer end-to-end label switching protocol for WiMAX-MPLS heterogeneous networks. 2459-2469 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:

A variable-length model for masquerade detection. 2470-2478 - Marco Avvenuti

, Cinzia Bernardeschi
, Nicoletta De Francesco, Paolo Masci
:
JCSI: A tool for checking secure information flow in Java Card applications. 2479-2493 - Magne Jørgensen, Barbara A. Kitchenham

:
Interpretation problems related to the use of regression models to decide on economy of scale in software development. 2494-2503 - Pedro Sánchez-Palma

, Diego Alonso
, José Miguel Morales
, Pedro Javier Navarro Lorente
:
From Teleo-Reactive specifications to architectural components: A model-driven approach. 2504-2518 - Benjamin Morandi, Sebastian Nanz, Bertrand Meyer

:
Performance analysis of SCOOP programs. 2519-2530 - Dunwei Gong, Tian Tian, Xiangjuan Yao:

Grouping target paths for evolutionary generation of test data in parallel. 2531-2540 - Shichao Zhang:

Nearest neighbor selection for iteratively kNN imputation. 2541-2552 - Wei-neng Wang, Fu-sheng Chen, Zhiqiang Wang:

An endurance solution for solid state drives with cache. 2553-2558 - Francesco Palmieri

:
Percolation-based routing in the Internet. 2559-2573 - Hongyu Pei Breivold, Ivica Crnkovic

, Magnus Larsson
:
Software architecture evolution through evolvability analysis. 2574-2592 - Qian Lin, Zhengwei Qi, Jiewei Wu, Yaozu Dong, Haibing Guan:

Optimizing virtual machines using hybrid virtualization. 2593-2603 - Geert Monsieur, Monique Snoeck

, Wilfried Lemahieu:
Managing data dependencies in service compositions. 2604-2628 - Tim Verbelen

, Pieter Simoens
, Filip De Turck
, Bart Dhoedt:
AIOLOS: Middleware for improving mobile application performance through cyber foraging. 2629-2639 - Iván S. Razo-Zapata

, J. Carlos Mex-Perera
, Raúl Monroy Borja
:
Masquerade attacks based on user's profile. 2640-2651 - Soon-Kyeong Kim, Toby Myers, Marc-Florian Wendland, Peter A. Lindsay

:
Execution of natural language requirements using State Machines synthesised from Behavior Trees. 2652-2664 - Sana Ambreen Malik, Asifullah Khan

, Mutawarra Hussain, Khurram Jawad
, Rafiullah Chamlawi
, Abdul Jalil:
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches. 2665-2673
Volume 85, Number 12, December 2012
- Danny Weyns

, Sam Malek, Jesper Andersson, Bradley R. Schmerl:
Introduction to the special issue on state of the art in engineering self-adaptive systems. 2675-2677 - Tharindu Patikirikorala, Alan W. Colman

, Jun Han, Liuping Wang
:
An evaluation of multi-model self-managing control schemes for adaptive performance management of software systems. 2678-2696 - Yönet A. Eracar, Mieczyslaw M. Kokar:

Self-control of the time complexity of a constraint satisfaction problem solver program. 2697-2706 - Xin Peng, Bihuan Chen, Yijun Yu

, Wenyun Zhao:
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop. 2707-2719 - Mehdi Amoui, Mahdi Derakhshanmanesh, Jürgen Ebert, Ladan Tahvildari:

Achieving dynamic adaptation via management and interpretation of runtime models. 2720-2737 - Guoquan Wu, Jun Wei, Chunyang Ye, Hua Zhong, Tao Huang, Hong He:

Specification and monitoring of data-centric temporal properties for service-based systems. 2738-2754 - Ermyas Abebe, Caspar Ryan

:
Adaptive application offloading using distributed abstract class graphs in mobile environments. 2755-2769 - Narges Khakpour

, Saeed Jalili
, Marjan Sirjani, Ursula Goltz, Bahareh Abolhasanzadeh:
HPobSAM for modeling and analyzing IT Ecosystems - Through a case study. 2770-2784 - Andrei Pruteanu, Stefan Dulman:

LossEstimate: Distributed failure estimation in wireless networks. 2785-2795 - Diego Perez-Palacin, Raffaela Mirandola

, José Merseguer
:
QoS and energy management with Petri nets: A self-adaptive framework. 2796-2811 - Chang Xu, Shing-Chi Cheung

, Xiaoxing Ma
, Chun Cao, Jian Lu:
Adam: Identifying defects in context-aware adaptation. 2812-2828 - Mohammed Salifu, Yijun Yu

, Arosha K. Bandara
, Bashar Nuseibeh
:
Analysing monitoring and switching problems for adaptive systems. 2829-2839 - Svein O. Hallsteinsen, Kurt Geihs

, Nearchos Paspallis
, Frank Eliassen, Geir Horn
, Jorge Lorenzo, Alessandro Mamelli, George Angelos Papadopoulos
:
A development framework and methodology for self-adapting applications in ubiquitous computing environments. 2840-2859 - Shang-Wen Cheng, David Garlan:

Stitch: A language for architecture-based self-adaptation. 2860-2875
- Jingyu Kim, Sungwon Kang, Jihyun Lee, Bong Wan Choi:

A semantic translation method for data communication protocols. 2876-2898 - Tae Hyun Kim, ChangKyun Kim, IlHwan Park:

Side channel analysis attacks using AM demodulation on commercial smart cards with SEED. 2899-2908 - José Ramón Méndez

, Miguel Reboiro-Jato
, Fernando Díaz
, Eduardo Díaz, Florentino Fdez-Riverola
:
Grindstone4Spam: An optimization toolkit for boosting e-mail classification. 2909-2920 - Manlu Liu, Harry Jiannan Wang, J. Leon Zhao:

Technology flexibility as enabler of robust application development in community source: The case of Kuali and Sakai. 2921-2928

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














