Abstract is missing.
- Eucalyptus: a web service-enabled e-infrastructureSandy Liu, Yong Liang, Martin Brooks. 1-11 [doi]
- Automated conversion of table-based websites to structured stylesheets using table recognition and clone detectionAndy Y. Mao, James R. Cordy, Thomas R. Dean. 12-26 [doi]
- A search-based approach for dynamically re-packaging downloadable applicationsThierry Bodhuin, Massimiliano Di Penta, Luigi Troiano. 27-41 [doi]
- Runtime monitoring of web service conversationsYuan Gan, Marsha Chechik, Shiva Nejati, Jon Bennett, Bill O Farrell, Julie Waterhouse. 42-57 [doi]
- Pattern rewriting for efficient search in partial-order event dataMatthew Nichols, David Taylor. 58-70 [doi]
- MARO - MinDrift affinity routing for resource management in heterogeneous computing systemsYu-Tong He, Issam Al-Azzoni, Douglas G. Down. 71-85 [doi]
- Out of sight but not out of mind?: Informal networks, communication and media use in global software teamsKlarissa Chang, Kate Ehrlich. 86-97 [doi]
- Using paper mockups for evaluating soft keyboard layoutsI. Scott MacKenzie, Janet C. Read. 98-108 [doi]
- Improving predictive models of cognitive complexity using an evolutionary computational approach: a case studyRodrigo A. Vivanco, Dean Jin. 109-123 [doi]
- A real-time adaptive control of autonomic computing environmentsBogdan Solomon, Dan Ionescu, Marin Litoiu, Mircea Mihaescu. 124-136 [doi]
- Policy-driven autonomic management of multi-component systemsRaphael M. Bahati, Michael A. Bauer, Elvis M. Vieira. 137-151 [doi]
- A comparative study of pairwise regression techniques for problem determinationMohammad Ahmad Munawar, Paul A. S. Ward. 152-166 [doi]
- Client certificate and IP address based multi-factor authentication for J2EE web applicationsHeesun Park, Stan Redford. 167-174 [doi]
- An audit trail service to enhance privacy compliance in federated identity managementLiam Peyton, Chintan Doshi, Pierre Seguin. 175-187 [doi]
- Window query processing for joining data streams with relationsKristine Towne, Qiang Zhu, Calisto Zuzarte, Wen-Chi Hou. 188-202 [doi]
- The scalability of AspectJArjun Singh, Gregor Kiczales. 203-214 [doi]
- Threats on building models from CVS and Bugzilla repositories: the Mozilla case studyKamel Ayari, Peyman Meshkinfam, Giuliano Antoniol, Massimiliano Di Penta. 215-228 [doi]
- Comparing episodic and semantic interfaces for task boundary identificationIzzet Safer, Gail C. Murphy. 229-243 [doi]
- Discovering the shared understanding dynamics of large software teamsJorge Aranda, Ramzan Khuwaja, Steve M. Easterbrook. 244-247 [doi]
- An IDE for software development using tabular expressionsDennis K. Peters, Mark Lawford, Baltasar Trancón-y-Widemann. 248-251 [doi]
- A test framework for integration testing of object-oriented programsT. S. E. Maibaum, Zhe (Jessie) Li. 252-255 [doi]
- Support for OpenMP tasks in Nanos v4Xavier Teruel, Xavier Martorell, Alejandro Duran, Roger Ferrer, Eduard Ayguadé. 256-259 [doi]
- MultiLoop: efficient software pipelining for modern hardwareChristopher Kumar Anand, Wolfram Kahl. 260-263 [doi]
- SLA-driven business process management in SOAVinod Muthusamy, Hans-Arno Jacobsen, Phil Coulthard, Allen Chan, Julie Waterhouse, Elena Litani. 264-267 [doi]
- An approach to managing the execution of large SQL queriesYabin Meng, Paul Bird, Patrick Martin, Wendy Powley. 268-271 [doi]
- Removing manually generated boilerplate from electronic texts: experiments with project Gutenberg e-booksOwen Kaser, Daniel Lemire. 272-275 [doi]
- Identifying fault-prone files using static analysis alerts through singular value decompositionMark Sherriff, Sarah Smith Heckman, Mike Lake, Laurie A. Williams. 276-279 [doi]
- Identifying active subgroups in online communitiesAlvin Chin, Mark H. Chignell. 280-283 [doi]
- Using web 2.0 to locate expertiseSandra Jean Sacha Chua. 284-287 [doi]
- A trust based approach for protecting user data in social networksBader Ali, Wilfred Villegas, Muthucumaru Maheswaran. 288-293 [doi]
- A service-centric approach to access control and monitoring based on distributed trustJimmy McGibney, Dmitri Botvich. 294-305 [doi]
- Using trace sampling techniques to identify dynamic clusters of classesPhilippe Dugerdil. 306-314 [doi]
- Visulasation techniques to support derivation tasks in sofware product line developmentDaren Nestor, Luke O Malley, Patrick Healy, Aaron J. Quigley, Steffen Thiel. 315-325 [doi]
- An interaction visualisation tool for a learning management systemSujana Jyothi, Claire McAvinia, John G. Keating. 326-331 [doi]
- Sequence-based specification of feedback control systems in Simulink®Jason M. Carter, Jesse H. Poore. 332-345 [doi]
- Information bridging in a global organizationAllen E. Milewski, Marilyn Tremaine, Richard Egan, Suling Zhang, Felix Köbler, Patrick O Sullivan. 346-355 [doi]
- Workshops of CASCON 2007Kelly A. Lyons. 356-365 [doi]