Volume 79,
Number 1,
January 2006
- Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Guy G. Helmer, Vasant Honavar, Les Miller, Robyn R. Lutz, Mark Slagell:
Towards the automatic generation of mobile agents for distributed intrusion detection system.
1-14
- Peter Meso, Gregory R. Madey, Marvin D. Troutt, Jens Liegle:
The knowledge management efficacy of matching information systems development methodologies with application characteristics - an experimental study.
15-28
- Chung-Ming Huang, Tz-Heng Hsu, Yi-Wei Lin:
REDUP: a packet loss recovery scheme for real-time audio streaming over wireless IP networks.
29-42
- Seungmin Rho, Eenjun Hwang:
FMF: Query adaptive melody retrieval system.
43-56
- Dennis Edwards, Sharon Simmons, Norman Wilde:
An approach to feature location in distributed systems.
57-68
- Bo Sandén, Janusz Zalewski:
Designing state-based systems with entity-life modeling.
69-78
- Anthony J. T. Lee, Wan-chuen Lin, Chun-sheng Wang:
Mining association rules with multi-dimensional constraints.
79-92
- Jen-Jou Hung, Yungho Leu:
Efficient index caching for data dissemination in mobile computing environments.
93-106
- Paolo Donzelli, Victor R. Basili:
A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project.
107-119
Special section on Software Architecture
Volume 79,
Number 2,
February 2006
- Emerson Farrugia, Robert Simon:
An efficient and secure protocol for sensor network time synchronization.
147-162
- Yueh-Feng Lee, Ruei-Chuan Chang:
Hotswapping Linux kernel modules.
163-175
- Lin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu:
Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.
176-179
- Young-Ho Park, Kyu-Young Whang, Byung Suk Lee, Wook-Shin Han:
Efficient evaluation of linear path expressions on large-scale heterogeneous XML documents using information retrieval techniques.
180-190
- Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Jung-Im Won:
Shape-based retrieval in time-series databases.
191-203
- Regina M. M. Braga, Cláudia Maria Lima Werner, Marta Mattoso:
Odyssey-Search: A multi-agent system for component information search and retrieval.
204-215
- Ge Li, Lu Zhang, Yan Li, Bing Xie, Weizhong Shao:
Shortening retrieval sequences in browsing-based component retrieval using information entropy.
216-230
- Benny Thörnberg, Qubo Hu, Martin Palkovic, Mattias O'Nils, Per Gunnar Kjeldsberg:
Polyhedral space generation and memory estimation from interface and memory models of real-time video systems.
231-245
- Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun:
Assessment of eco-security in the Knowledge Grid e-science environment.
246-252
- Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
253-258
Special section on Software Architecture
Volume 79,
Number 3,
March 2006
- Xuemei Zhang, Hoang Pham:
Software field failure rate prediction before software deployment.
291-300
- Ernst Kesseler, Ed G. Knapen:
Towards human-centred design: Two case studies.
301-313
- Lerina Aversano, Thierry Bodhuin, Gerardo Canfora, Maria Tortorella:
Technology-driven business evolution.
314-338
- Lionel C. Briand, Yvan Labiche, L. O'Sullivan, Michal M. Sówka:
Automated impact analysis of UML models.
339-352
- Juan Jose Cuadrado-Gallego, Miguel-Ángel Sicilia, Miguel Garre, Daniel Rodríguez:
An empirical study of process-related attributes in segmented software cost-estimation relationships.
353-361
- Steven J. Bleistein, Karl Cox, June M. Verner:
Validating strategic alignment of organizational IT requirements using goal modeling and problem diagrams.
362-378
- Giuseppe Della Penna, Benedetto Intrigila, Anna Rita Laurenzi, Sergio Orefice:
An XML environment for scenario based requirements engineering.
379-403
- Panagiotis Sentas, Lefteris Angelis:
Categorical missing data imputation for software cost estimation by multinomial logistic regression.
404-414
Special section on Software Architecture
Volume 79,
Number 4,
April 2006
- Kam-yiu Lam, Özgür Ulusoy:
Adaptive schemes for location update generation in execution location-dependent continuous queries.
441-453
- Richard Lai, Tony Tsang, Yong-Soo Kim, Dae Hoon Hwang, Chul Soo Lee, Yoon Kyung Han:
A method for analysing multimedia protocol performance.
454-465
- Yan-Xiang Deng, Chao-Jang Hwang, Jiang-Lung Liu:
An object-oriented cryptosystem based on two-level reconfigurable computing architecture.
466-479
- Christos Makris, Yannis Panagis, Evangelos Sakkopoulos, Athanasios K. Tsakalidis:
Efficient and adaptive discovery techniques of Web Services handling large data sets.
480-495
- Qiang Tang, Chris J. Mitchell:
Cryptanalysis of a hybrid authentication protocol for large mobile networks.
496-501
- Wei-Bin Lee, Kuan-Chieh Liao:
Improved self-certified group-oriented cryptosystem without a combiner.
502-506
- Shih-Chien Chou, Yuan-Chien Chen:
Managing role relationships in an information flow control model.
507-522
- Seng Wai Loke:
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog.
523-536
Special section on Software Architecture
Volume 79,
Number 5,
May 2006
Special section on Quality Software
- Hans-Dieter Ehrich, Klaus-Dieter Schewe, T. H. Tse:
Editorial.
575-576
- Yuen-Tak Yu, Man Fai Lau:
A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions.
577-590
- Tsong Yueh Chen, Fei-Ching Kuo, Robert G. Merkel:
On the statistical properties of testing effectiveness measures.
591-601
- W. K. Chan, M. Y. Cheng, S. C. Cheung, T. H. Tse:
Automatic goal-oriented classification of failure behaviors for testing XML-based multimedia software applications: An experimental case study.
602-612
- Jane Zhao, Hui Ma:
ASM-based design of data warehouses and on-line analytical processing systems.
613-629
- Stefan Brass, Christian Goldberg:
Semantic errors in SQL queries: A quite complete list.
630-644
Regular papers
- Lieven Eeckhout, Koen De Bosschere:
Yet shorter warmup by combining no-state-loss and MRRL for sampled LRU cache simulation.
645-652
- Chin-Yu Huang, Jung-Hua Lo:
Optimal resource allocation for cost and reliability of modular software systems in the testing phase.
653-664
- Jung-Shian Li, Chu-Fen Li, Cheng-Pong Lo:
Effective fair allocation using smart market label auction with CSLF and CR-CSFQ.
665-673
- KwangJin Park, MoonBae Song, Chong-Sun Hwang:
Adaptive data dissemination schemes for location-aware mobile services.
674-688
- Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matjaz Colnaric, Marjan Hericko:
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL.
689-700
- Sunilkumar S. Manvi, P. Venkataram:
An agent based synchronization scheme for multimedia applications.
701-713
- Weisong Shi, Yonggen Mao:
Performance evaluation of peer-to-peer Web caching systems.
714-726
- Miroslaw Staron, Ludwik Kuzniarz, Claes Wohlin:
Empirical assessment of using stereotypes to improve comprehension of UML models: A set of experiments.
727-742
Book review
- Ling Liu, Xue Chen:
Book review: H. Zhuge, The Knowledge Grid, World Scientific Publishing Co., Singapore, 2004.
743-745
Volume 79,
Number 6,
June 2006
- Ping-Feng Pai, Wei-Chiang Hong:
Software reliability forecasting by support vector machines with simulated annealing algorithms.
747-755
- Silvia Regina Vergilio, José Carlos Maldonado, Mario Jino, Inali Wisniewski Soares:
Constraint based structural testing criteria.
756-771
- K. S. Cheung, T. Y. Cheung, K. O. Chow:
A petri-net-based synthesis methodology for use-case-driven system design.
772-790
- G. B. Mund, Rajib Mall:
An efficient interprocedural dynamic slicing method.
791-806
- Liguo Yu, Stephen R. Schach, Kai Chen, Gillian Z. Heller, A. Jefferson Offutt:
Maintainability of the kernels of open-source operating systems: A comparison of Linux with FreeBSD, NetBSD, and OpenBSD.
807-815
- T. H. Tse, Tsong Yueh Chen, Robert L. Glass:
An assessment of systems and software engineering scholars and institutions (2000-2004).
816-819
- Yuen-Tak Yu, Man Fai Lau, Tsong Yueh Chen:
Automatic generation of test cases from Boolean specifications using the MUMCUT strategy.
820-840
- James W. Helms, James D. Arthur, Deborah Hix, H. Rex Hartson:
A field study of the Wheel - a usability engineering process model.
841-858
Special Section on Software Architecture
Volume 79,
Number 7,
July 2006
Selected papers from the 11th Asia Pacific Software Engineering Conference (APSEC2004)
- Doo-Hwan Bae:
Guest Editorial.
889-890
- W. Eric Wong, Yu Qi:
Effective program debugging based on execution slices and inter-block data dependency.
891-903
- Pankaj Jalote, Gourav Jain:
Assigning tasks in a 24-h software development model.
904-911
- Muhammad Ali Babar, Barbara A. Kitchenham, Liming Zhu, Ian Gorton, D. Ross Jeffery:
An empirical study of groupware support for distributed software architecture evaluation process.
912-925
- Jintae Kim, Minseong Kim, Sooyong Park:
Goal and scenario based domain requirements analysis environment.
926-938
- Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushita, Katsuro Inoue:
MUDABlue: An automatic categorization system for Open Source repositories.
939-953
- Chanwoo Yoo, Junho Yoon, Byungjeong Lee, Chong-Won Lee, Jinyoung Lee, Seunghun Hyun, Chisu Wu:
A unified model for the implementation of both ISO 9001: 2000 and CMMI by ISO-certified organizations.
954-961
- Karl R. P. H. Leung, Joseph Kee-Yin Ng, Wing Lok Yeung:
Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach.
962-968
Regular papers
Volume 79,
Number 8,
August 2006
- Chung-Ming Huang, Chao-Hsien Lee, Yuan-Tse Yu, Chung-Yi Lai:
Location-aware multimedia proxy handoff over the IPv6 mobile network environment.
1037-1050
- Yusuf Hasan, J. Morris Chang:
A tunable hybrid memory allocator.
1051-1063
- Constandinos X. Mavromoustakis, Helen D. Karatza:
On the efficiency and performance evaluation of the bandwidth clustering scheme for adaptive and reliable resource allocation.
1064-1078
- Katerina Raptopoulou, Michael Vassilakopoulos, Yannis Manolopoulos:
On past-time indexing of moving objects.
1079-1091
- Nicholas A. Kraft, Errol L. Lloyd, Brian A. Malloy, Peter J. Clarke:
The implementation of an extensible system for comparison and visualization of class ordering methodologies.
1092-1109
- Jyh-Horng Wen, Kuo-Ting Huang, Cheng-Ying Yang, Tzu-Chen Tsai:
Timeslot-sharing algorithm with a dynamic grouping for WDM broadcast-and-select star networks.
1110-1119
- Chin-Chen Chang, Tzu-Chuen Lu:
Reversible index-domain information hiding scheme based on side-match vector quantization.
1120-1129
- Ching-Sheng Hsu, Young-Chang Hou:
An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods.
1130-1140
- Martín López Nores, José J. Pazos Arias, Jorge García Duque, Yolanda Blanco-Fernández, Manuel Ramos Cabrer, Alberto Gil-Solla, Ana Fernández Vilas, Rebeca P. Díaz Redondo:
Formal specification applied to multiuser distributed services: Experiences in collaborative t-learning.
1141-1155
- Hsien-Wen Tseng, Chin-Chen Chang:
Error resilient locally adaptive data compression.
1156-1160
- Fuh-Gwo Jeng, Chung-Ming Wang:
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem.
1161-1167
- Ismail Ababneh:
An efficient free-list submesh allocation scheme for two-dimensional mesh-connected multicomputers.
1168-1179
Special Section on Software Architecture
Volume 79,
Number 9,
September 2006
Selected papers from the fourth Source Code Analysis and Manipulation (SCAM 2004) Workshop
- Tom Dean, Mark Harman, Rainer Koschke, Michael L. Van De Vanter:
Selected papers from the fourth Source Code Analysis and Manipulation (SCAM 2004) Workshop.
1217-1218
- Magiel Bruntink, Arie van Deursen:
An empirical study into class testability.
1219-1232
- Gregorio Robles, Jesús M. González-Barahona, Juan Julián Merelo Guervós:
Beyond source code: The importance of other artifacts in software development (a case study).
1233-1248
- Jens Krinke:
Effects of context on program slicing.
1249-1260
- Chung-Horng Lung, Xia Xu, Marzia Zaman, Anand Srinivasan:
Program restructuring using clustering techniques.
1261-1279
- Jean Utke, Andrew Lyons, Uwe Naumann:
Efficient reversal of the intraprocedural flow of control in adjoint computations.
1280-1294
Regular papers
Volume 79,
Number 10,
October 2006
Architecting Dependable Systems
- Rogério de Lemos, Cristina Gacek, Alexander Romanovsky:
Architecting dependable systems.
1359-1360
- Ji Zhang, Betty H. C. Cheng:
Using temporal logic to specify adaptive program semantics.
1361-1369
- Lihua Xu, Hadar Ziv, Thomas A. Alspaugh, Debra J. Richardson:
An architectural pattern for non-functional dependability requirements.
1370-1378
- Henry Muccini, Marcio S. Dias, Debra J. Richardson:
Software architecture-based regression testing.
1379-1396
- Fernando Castor Filho, Patrick Henrique da S. Brito, Cecília M. F. Rubira:
Specification of exception flow in software architectures.
1397-1418
- Ludger Bischofs, Simon Giesecke, Michael Gottschalk, Wilhelm Hasselbring, Timo Warns, Stefan Willer:
Comparative evaluation of dependability characteristics for peer-to-peer architectural styles by simulation.
1419-1432
Regular papers
- Isabella Kotini, George Hassapis:
Verification of rectangular hybrid automata models.
1433-1443
- Stephan Philippi:
Automatic code generation from high-level Petri-Nets for model driven systems engineering.
1444-1455
- Franck Cassez, Olivier H. Roux:
Structural translation from Time Petri Nets to Timed Automata.
1456-1468
- Hai Zhuge:
Semantic component networking: Toward the synergy of static reuse and dynamic clustering of resources in the knowledge grid.
1469-1482
Volume 79,
Number 11,
November 2006
Software Cybernetics
- Fevzi Belli, Kai-Yuan Cai, Raymond A. DeCarlo, Aditya P. Mathur:
Introduction to the special section on software cybernetics.
1483-1485
- Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur, João W. Cangussu:
A control-theoretic approach to the management of the software system test phase.
1486-1503
- Hong Xu, Peter Sawyer, Ian Sommerville:
Requirement process establishment and improvement from the viewpoint of cybernetics.
1504-1513
- Tiberiu Seceleanu, David Garlan:
Developing adaptive systems with synchronized architectures.
1514-1526
- Yan Liu, Bojan Cukic, Edgar Fuller, Sampath Yerramalla, Srikanth Gururajan:
Monitoring techniques for an online neuro-adaptive controller.
1527-1540
Regular papers
- J. Drew Procaccino, June M. Verner:
Software project managers and project success: An exploratory study.
1541-1551
- Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo:
An intelligent early warning system for software quality improvement and project management.
1552-1564
- José Alberto R. P. Sardinha, Ricardo Choren, Viviane Torres da Silva, Ruy Luiz Milidiú, Carlos José Pereira de Lucena:
A combined specification language and development framework for agent-based application engineering.
1565-1577
- Jing Zhao, Hongwei Liu, Gang Cui, Xiao-Zong Yang:
Software reliability growth model with change-point and environmental function.
1578-1587
- Lu Zhang, Tao Qin, Zhiying Zhou, Dan Hao, Jiasu Sun:
Identifying use cases in source code.
1588-1598
- Alexander Thomasian:
Shortcut method for reliability comparisons in RAID.
1599-1605
- Sira Vegas, Natalia Juristo Juzgado, Victor R. Basili:
Packaging experiences for improving testing technique selection.
1606-1618
- Jie Liu, Hai Zhuge:
A semantic-based P2P resource organization model R-Chord.
1619-1631
- Onaiza Maqbool, Haroon A. Babri:
Automated software clustering: An insight using cluster labels.
1632-1648
- Xiaoqing Frank Liu, Yan Sun, Chandra Sekhar Veera, Yuji Kyoya, Kunio Noguchi:
Priority assessment of software process requirements from multiple perspectives.
1649-1660
Volume 79,
Number 12,
December 2006
- Durga Prasad Mohapatra, Rajeev Kumar, Rajib Mall, D. S. Kumar, Mayank Bhasin:
Distributed dynamic slicing of Java programs.
1661-1678
- Antonis Sidiropoulos, Yannis Manolopoulos:
Generalized comparison of graph-based ranking algorithms for publications and authors.
1679-1700
- Jacob Engel, Daniel Lacks, Taskin Koçak:
Modelling and simulation of off-chip communication architectures for high-speed packet processors.
1701-1714
- Alexander P. Pons:
Semantic prefetching objects of slower web site pages.
1715-1724
- Suzanne W. Dietrich, Rohini Patil, Amy Sundermier, Susan Darling Urban:
Component adaptation for event-based application integration using active rules.
1725-1734
- Dora Souliou, Aris Pagourtzis, Nikolaos Drosinos, Panayotis Tsanakas:
Computing frequent itemsets in parallel using partial support trees.
1735-1743
- Wan-Chen Lu, Jen-Wei Hsieh, Wei Kuan Shih, Tei-Wei Kuo:
A faster exact schedulability analysis for fixed-priority scheduling.
1744-1753
- Chin-Chen Chang, Tzu-Chuen Lu:
A difference expansion oriented data hiding scheme for restoring the original host images.
1754-1766
- Sanghyun Yoo, Jin Hyun Son, Myoung-Ho Kim:
An efficient subscription routing algorithm for scalable XML-based publish/subscribe systems.
1767-1781
- Rusty O. Baldwin, Brian S. Peterson, Robert F. Mills:
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks.
1782-1788
- Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
1789
Special Section on Software Architecture
Copyright © Fri Mar 12 17:30:36 2010
by Michael Ley (ley@uni-trier.de)