Abstract is missing.
- Future Trends: Computing as a Core DisciplineBruce M. McMillin. 3-7 [doi]
- Specifying Pointcuts in AspectJYi Wang, Jianjun Zhao. 5-10 [doi]
- Challenges and Experiences in Industry-University Research Collaboration and Technology TransitionDavid Card. 8-9 [doi]
- Middleware for Next-Generation Converged Networks and Services: Myths or Reality? Paolo Bellavista. 10-15 [doi]
- A tool for compiler construction based on aspect-oriented specificationsDamijan Rebernak, Marjan Mernik. 11-16 [doi]
- Ethics in ComputingSahra Sedigh. 16 [doi]
- AOP-based automated unit test classification of large benchmarksCyrille Artho, Zhongwei Chen, Shinichi Honiden. 17-22 [doi]
- Software Process Improvement for Small OrganizationsDoo-Hwan Bae. 17 [doi]
- Plenary Panel Title: Software for the Mobile InterStephen Chen. 18 [doi]
- Test Automation in PracticeRajesh Subramanyan. 19 [doi]
- Aspect-Based Instrumentation for Locating Memory Leaks in Java ProgramsKung Chen, Ju-Bing Chen. 23-28 [doi]
- A Framework for Enhancing Web Services SecurityNavya Sidharth, Jigang Liu. 23-30 [doi]
- A Combined Concept Location Method for Java ProgramsDapeng Liu, Shaochun Xu. 29-42 [doi]
- A Scalable Service Scheme for Secure Group Communication in GridYunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han. 31-38 [doi]
- An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc NetworksXia Wang, Johnny Wong. 39-48 [doi]
- An Instant Messaging Framework for Flexible Interaction with Rich ClientsMatthias Book, Volker Gruhn. 43-48 [doi]
- Understanding 2D-BarCode Technology and Applications in M-Commerce - Design and Implementation of A 2D Barcode Processing SolutionJerry Zeyu Gao, Lekshmi Prakash, Rajini Jagatesan. 49-56 [doi]
- An Omnipresent Formal Trust Model (FTM) for Pervasive Computing EnvironmentMunirul M. Haque, Sheikh Iqbal Ahamed. 49-56 [doi]
- An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing EnvironmentMunirul M. Haque, Sheikh Iqbal Ahamed, Haifeng Li, K. M. Ibrahim Asif. 57-64 [doi]
- An Optimization Method for Real-Time Natural Phenomena Simulation on WinCE PlatformNing Liu, Rong Li, Zhenyu Yang, Hongyang Chao. 57-62 [doi]
- MiniWap: Navigating WAP with MinimoVu Hong Khiem, Kibong Kang, Keung Hae Lee. 63-68 [doi]
- Defining and Detecting Bad Smells of Aspect-Oriented SoftwareKomsan Srivisut, Pornsiri Muenchaisri. 65-70 [doi]
- A One-Dimensional Probabilistic Model of Wireless Multihop Internet AccessChun-Yen Hsu, Jean-Lien C. Wu, Shun-Te Wang. 69-74 [doi]
- Mining User Query Logs to Refine Component DescriptionYan Li, Shaobin Cheng, Lu Zhang, Bing Xie, Jiasu Sun. 71-78 [doi]
- A Distributed Intrusion Detection Scheme for Mobile Ad Hoc NetworksYingfang Fu, Jingsha He, Guorui Li. 75-80 [doi]
- A Machine Learning-Based Reliability Assessment Model for Critical Software SystemsVenkata U. B. Challagulla, Farokh B. Bastani, Raymond A. Paul, Wei-Tek Tsai, Yinong Chen. 79-86 [doi]
- An Aspect Oriented Middleware Architecture for Adaptive Mobile Computing ApplicationsCelso Maciel da Costa, Marcelo da Silva Strzykalski, Guy Bernard. 81-86 [doi]
- A Static Analysis Framework For Detecting SQL Injection VulnerabilitiesXiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, Kai Qian, Lixin Tao. 87-96 [doi]
- A Virtual Machine-Based Programming Environment for Rapid Sensor Application DevelopmentJui-Nan Lin, Jiun-Long Huang. 87-95 [doi]
- Framework for Local Ambient Intelligence Space: The AmI-Space ProjectRui Chen, Yibin Hou, Zhangqin Huang, Zhang Yong, Hui Li. 95-100 [doi]
- A model-driven framework for representing and applying design patternsGhizlane El-Boussaidi, Hafedh Mili. 97-100 [doi]
- Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms RacesTravis C. Service, Daniel R. Tauritz, William Siever. 101-104 [doi]
- A Service Discovery Architecture based on Anycast in Pervasive Computing EnvironmentsLi Zhang, Zhen-lian Shi, Qi Shen. 101-108 [doi]
- Reliable Self-Clustering P2P Overlay NetworksShihui Wang, Yan Zhang, Wei Wang. 105-108 [doi]
- Software Component Re-engineering for their Runtime Structural AdaptationGautier Bastide, Abdelhak Seriai, Mourad Oussalah. 109-114 [doi]
- Vs Golf - Developing Location-based Multi-Player GamesGeorg Treu, Johannes Martens, Matthias Schicker, Marc Breisinger, Axel Küpper. 109-114 [doi]
- Structuring 2-way Branches in Binary ExecutablesTao Wei, Jian Mao, Wei Zou, Yu Chen. 115-118 [doi]
- Speed-Based Mobility Management for Heterogeneous Wireless Networks InterworkingMing-Hsien Yu, Hsing Mei. 115-120 [doi]
- FLEXCM - A Component Model for Adaptive Embedded SystemsSindolfo Miranda Filho, Luiz Eduardo Cunha Leite, Guido Lemos de Souza Filho, Silvio Romero de Lemos Meira. 119-126 [doi]
- A Mobile Database Design Methodology for Mobile Software SolutionsWeider D. Yu, Sunita Sharma. 121-130 [doi]
- Structuring Software Functional Requirements For Automated Design And VerificationSukhamay Kundu. 127-136 [doi]
- Trend Analysis using a TemporalWeb Ontology Language in News DomainsSang-Kyun Kim, Kyu-Chul Lee. 131-136 [doi]
- Understanding and Classifying Requirements for Computer-Aided Healthcare WorkflowsXiping Song, Beatrice Hwong, Gilberto Matos, Arnold Rudorfer. 137-144 [doi]
- Construction of Collaborative Design Environment Based on Multi-AgentXiangzhong Feng. 137-140 [doi]
- Multi-Agent System-based Hierarchy Grid MiddlewareJia Chen, Yue Wu, Ming Li, Bei Hui. 141-146 [doi]
- Deriving Formal Specifications from Informal RequirementsDubravka Ilic. 145-152 [doi]
- OWL-Based Description for Agent InteractionYong-Feng Lin, Jason Jen-Yen Chen. 147-152 [doi]
- A Model-based Object-oriented Approach to Requirement Engineering (MORE)Chih-Wei Lu, William C. Chu, Chih-Hung Chang, Ching-Huey Wang. 153-156 [doi]
- Adaptive Agent Model: an Agent Interaction and Computation ModelLiang Xiao 0002, David Robertson, Madalina Croitoru, Paul H. Lewis, Srinandan Dashmapatra, David Dupplaw, Bo Hu. 153-158 [doi]
- Tool Support to Implementing Business Rules in Database ApplicationsLiwen Lin, Suzanne M. Embury, Brian Warboys. 157-162 [doi]
- Extending the Gaia Methodology for the Design and Development of Agent-based Software SystemsWei Huang, Elia El-Darzi, Li Jin. 159-168 [doi]
- Using UML Activity Diagrams and Event B for Distributed and Parallel ApplicationsAhlem Ben Younes, Leila Jemni Ben Ayed. 163-170 [doi]
- An Ontology-based Semantic Resource Sharing Model in P2P SystemWang Dan, Zhao Rongjuan. 169-176 [doi]
- Integration of Agent-Oriented Conceptual Models and UML Activity Diagrams Using Effect AnnotationsMoshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya Ghose. 171-178 [doi]
- Actor Eco-systems: From High-Level Agent Models to Executable Processes via Semantic AnnotationsAditya Ghose, George Koliadis. 177-184 [doi]
- A Data Mining Approach for Software State DefinitionBei-Bei Yin, Chenggang Bai, Kai-Yuan Cai. 179-188 [doi]
- Intelligent Agents and P2P Semantic WebMehmet A. Orgun. 185 [doi]
- A Distress Call: Needing Tools to Large-Scale Semantic-Aware Agent SystemsAtilla Elçi. 186 [doi]
- Semantic Web and Intelligent Agents Research and Practice Masoud MohammadianMasoud Mohammadian. 187-196 [doi]
- Towards a Multiple Ontology Framework for Requirements Elicitation and ReuseZong-yong Li, Zhi-xue Wang, Ying-ying Yang, Yue Wu, Ying Liu. 189-195 [doi]
- SREM: A Service Requirements Elicitation Mechanism based on OntologyJian Xiang, Lin Liu, Wei Qiao, Jingwei Yang. 196-203 [doi]
- Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case StudyFevzi Belli, Mubariz Eminov, Nida Gökçe. 197-203 [doi]
- Qianxiang WangQianxiang Wang. 204-210 [doi]
- Ontology Learning by Clustering Based on Fuzzy Formal Concept AnalysisWen Zhou, Zongtian Liu, Yan Zhao. 204-210 [doi]
- An Approach to Adaptive Distributed Execution Monitoring for Workflows in Service-based SystemsStephen S. Yau, Dazhi Huang, Luping Zhu. 211-216 [doi]
- A Method of Requirement Inconsistency AnalysisYikun Zhang, Peng Yin, Du-Wu Cui, Hui Xia. 211-214 [doi]
- Analysis of Conflicts among Non-Functional Requirements Using Integrated Analysis of Functional and Non-Functional RequirementsVishal Sadana, Xiaoqing Frank Liu. 215-218 [doi]
- A Family of Software Reliability Growth ModelsHarald A. Stieber. 217-224 [doi]
- A metamodel for the notation of graphical modeling languagesXiao He, Zhiyi Ma, Weizhong Shao, Ge Li. 219-224 [doi]
- A Satisfaction Driven Approach for the Composition of Interactive Web ServicesShuchao Wan, Jun Wei, Jingyu Song, Hua Zhong. 225-232 [doi]
- Social Modeling for System SecurityEric Yu. 225 [doi]
- Towards Controllable Requirements Engineering Processes based on CyberneticsLin Liu, Zhi Jin, Ruqian Lu. 229-232 [doi]
- Knowledge Hiding in Data Mining by Transaction Adding and RemovingXiaoming Zhang. 233-240 [doi]
- Adaptive Web Services TestingXiaoying Bai, Yinong Chen, Zhongkui Shao. 233-236 [doi]
- A Control-Theoretic Approach to QoS Adaptation in Data Stream Management Systems DesignHai Hu, Chang-Hai Jiang, Kai-Yuan Cai, W. Eric Wong. 237-248 [doi]
- Performance Evaluation of Notifications in a Web Services and P2P-Based Network Management OverlayClarissa Cassales Marquezan, Carlos Raniery Paula dos Santos, Ewerton Monteiro Salvador, Maria Janilce Bosquiroli Almeida, Sérgio Luis Cechin, Lisandro Zambenedetti Granville. 241-250 [doi]
- ACIR: An Aspect-Connector for Intrusion ResponseMohammad Gias Uddin, Hossain Shahriar, Mohammad Zulkernine. 249-254 [doi]
- Iterative Planning in the Context of Automated Code SynthesisJicheng Fu, Farokh B. Bastani, I-Ling Yen. 251-259 [doi]
- Test Generation from Security Policies Specified in Or-BACKeqin Li, Laurent Mounier, Roland Groz. 255-260 [doi]
- Automating Dynamic Reconfiguration for Non-Stop Dataflow SystemsWei Li, Zhikun Zhao. 260-267 [doi]
- An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials EnvironmentLiang Xiao 0002, Andrew Peet, Paul H. Lewis, Srinandan Dashmapatra, Carlos Sáez, Madalina Croitoru, Javier Vicente, Horacio González-Vélez, Magí Lluch i Ariet. 261-268 [doi]
- An Architectural Framework for the Design and Analysis of Autonomous Adaptive SystemsKendra Cooper, João W. Cangussu, W. Eric Wong. 268-278 [doi]
- Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing EnvironmentK. M. Ibrahim Asif, Sheikh Iqbal Ahamed, Nilothpal Talukder. 269-274 [doi]
- Conformance Checking of Access Control Policies Specified in XACMLVincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie. 275-280 [doi]
- Flexible Application Software Generation for Heterogeneous Multi-Processor System-on-ChipXavier Guerin, Katalin Popovici, Wassim Youssef, Frédéric Rousseau, Ahmed Amine Jerraya. 279-286 [doi]
- Process Activities Supporting Security PrinciplesKoen Buyens, Riccardo Scandariato, Wouter Joosen. 281-292 [doi]
- A Semantic Anchoring Infrastructure for the Design of Embedded SystemsGraham Hemingway, Hang Su, Kai Chen, T. John Koo. 287-294 [doi]
- Setting and Evaluation of Flexible Points on Software User InterfaceLimin Shen, Wenwen Jiang, Chunyan Gao. 293-298 [doi]
- Concurrency Control Modularization with Aspect-Oriented ProgrammingSérgio Soares, Paulo Borba, Ricardo Massa Ferreira Lima. 295-300 [doi]
- Observing Distributions in Size Metrics: Experience from Analyzing Large Software SystemsRudolf Ramler, Klaus Wolfmaier, Thomas Natschläger. 299-304 [doi]
- Tracking Projects through A Three-Dimensional Software Development ModelJuan Li, Nan Jiang, Mingshu Li, Qing Wang, Yanwu Yang. 301-308 [doi]
- Software Reliability Growth Modelling using aWeighted Laplace Test StatisticYan Luo, Torsten Bergander, A. Ben Hamza. 305-312 [doi]
- Traceability Link Evolution Management with Incremental Latent Semantic IndexingHsinyi Jiang, Tien N. Nguyen, Carl K. Chang, Fei Dong. 309-316 [doi]
- A Collaborative System for Software Engineering EducationHong Zhang, Hongjun Su. 313-318 [doi]
- Identifying Software Decompositions by Applying Transaction Clustering on Source CodeRenuka Sindhgatta, Krishnakumar Pooloth. 317-326 [doi]
- A Tool For Requirements Engineering Process DevelopmentLi Jiang, Armin Eberlein. 319-325 [doi]
- Agents, Case-Based Reasoning and their relation to the Mexican Software Process Model (MoProSoft)Elena Cardenas Vargas, Hanna Oktaba, Silvia Guardati, Ana Lilia Laureano. 326-334 [doi]
- Performance Prediction of Service-Oriented Applications based on an Enterprise Service BusYan Liu, Ian Gorton, Liming Zhu. 327-334 [doi]
- Type-Safe Dynamic Update TransactionShi Zhang, Linpeng Huang. 335-340 [doi]
- An Online Monitoring Approach for Web servicesQianxiang Wang, Yonggang Liu, Min Li, Hong Mei. 335-342 [doi]
- Ontologies, JavaBeans and Relational Databases for enabling semantic programmingIoannis N. Athanasiadis, Ferdinando Villa, Andrea Emilio Rizzoli. 341-346 [doi]
- SQS: A Secure and QoS Guaranteed Solution for Mobile ServiceChao Tong, Xiaopeng Gao, Wei Chen, Xiang Long. 343-352 [doi]
- CGR: a Tool for Programming Using SchemesJ. García, Antonio Gavilanes, A. Gil, Pedro J. Martín. 347-354 [doi]
- An Interaction Instance Oriented Approach for Web Application Integration in PortalsJingyu Song, Jun Wei, Shuchao Wan, Hua Zhong. 353-360 [doi]
- System Modification Case StudiesYulin Ding, Yan Zhang. 355-360 [doi]
- A History-Based Automatic Scheduling Model for Personnel Risk ManagementHsinyi Jiang, Carl K. Chang, Jinchun Xia, Shuxing Cheng. 361-366 [doi]
- QoS-aware Service Composition Based on Tree-Coded Genetic AlgorithmChunming Gao, Meiling Cai, Huowang Chen. 361-367 [doi]
- Managing Policy Interactions in KNX-Based Smart HomesMohamed Shehata, Armin Eberlein, Abraham O. Fapojuwo. 367-378 [doi]
- Dynamic Reconfigurable Testing of Service-Oriented ArchitectureXiaoying Bai, Dezheng Xu, Guilan Dai. 368-378 [doi]
- Validity Checking On Grid Service CompositionJing Zhou, Guosun Zeng. 379-382 [doi]
- Improvement of Object-Oriented System Analysis and Design with AspectsYanhong Guo, Guifa Teng, Yueli Li, Fang Wang, Yang Zhao, Jianbin Ma. 379-384 [doi]
- A Fast Replica Selection Algorithm for Data GridDafei Yin, Bin Chen, Yu Fang. 383-387 [doi]
- Using Aspect Orientation in Understanding Legacy COBOL CodeJianjun Pu, Zhuopeng Zhang, Jian Kang, Yang Xu, Hongji Yang. 385-390 [doi]
- Improving the Accuracy of UML Class Model RecoveryKun Wang, Wuwei Shen. 387-390 [doi]
- A Connector-Centric Approach to Aspect-Oriented Software EvolutionYiming Lau, Wenyun Zhao, Xin Peng, Shan Tang. 391-398 [doi]
- Connectors conveying Software Architecture EvolutionDalila Tamzalit, Nassima Sadou, Mourad Oussalah. 391-396 [doi]
- Piping Classification to Metamorphic Testing: An Empirical Study towards Better Effectiveness for the Identification of Failures in Mesh Simplification ProgramsW. K. Chan, Jeffrey C. F. Ho, T. H. Tse. 397-404 [doi]
- The Empirical Studies on Quality Benefits of Reusing Software ComponentsJingyue Li, Anita Gupta, Jon Arvid Børretzen, Reidar Conradi. 399-402 [doi]
- A product line based aspect-oriented generative unit testing approach to building quality componentsYankui Feng, Xiaodong Liu, Jon M. Kerridge. 403-408 [doi]
- Risk Assessment in Early Software Design Based on the Software Function-Failure Design MethodJayson P. Vucovich, Robert B. Stone, Xiaoqing Frank Liu, Irem Y. Tumer. 405-412 [doi]
- An Automatic Connector Generation Method for Dynamic ArchitectureYiming Yang, Xin Peng, Wenyun Zhao. 409-414 [doi]
- SRAE: An Integrated Framework for Aiding in the Verification and Validation of Legacy Artifacts in NASA Flight Control SystemsAndres S. Orrego, Gregory E. Mundy. 413-422 [doi]
- Four Automated Approaches to Analyze the Quality of UML Sequence DiagramsMarcel van Amstel, Christian F. J. Lange, Michel R. V. Chaudron. 415-424 [doi]
- Architecture-Based Software Reliability: Why Only a Few Parameters Matter?Katerina Goseva-Popstojanova, Margaret Hamill. 423-430 [doi]
- QoS-driven Service Selection Optimization Model and Algorithms for Composite Web ServicesWentao Zhang, Yan Yang, Shengqun Tang, Lina Fang. 425-431 [doi]
- On Identifying Bug Patterns in Aspect-Oriented ProgramsSai Zhang, Jianjun Zhao. 431-438 [doi]
- Verification of Web Service Conversations Specified in WSCLZhifeng Gu, Juan-Zi Li, Jie Tang, Bin Xu, Ruobo Huang. 432-437 [doi]
- Quality Metrics for Internet Applications: Developing New from Old Shikun Zhou, Xiaodong Liu. 438-450 [doi]
- Measuring and Assessing Software Reliability Growth through Simulation-Based ApproachesChu-Ti Lin, Chin-Yu Huang, Chuan-Ching Sue. 439-448 [doi]
- Effective Fault Localization using Code CoverageW. Eric Wong, Yu Qi, Lei Zhao, Kai-Yuan Cai. 449-456 [doi]
- REFS Keynote: Requirements for Services: Does it Make Sense? Al Davis. 451-454 [doi]
- An Intentional Perspective to Service Modeling and DiscoveryColette Rolland, Rim Samia Kaabi. 455-460 [doi]
- A Study of Enhanced MC/DC Coverage Criterion for Software TestingJun-Ru Chang, Chin-Yu Huang. 457-464 [doi]
- Requirements and Evaluation of Protocols and Tools for Transaction Management in Service Centric SystemsChang-ai Sun, Marco Aiello. 461-466 [doi]
- Test Case Prioritization for Black Box TestingBo Qu, Changhai Nie, Baowen Xu, Xiaofang Zhang. 465-474 [doi]
- Requirements for QoS-based Web Service Description and DiscoveryKyriakos Kritikos, Dimitris Plexousakis. 467-472 [doi]
- Towards an Agile Infrastructure to Provision Devices, Applications, and Networks: A Service-oriented ApproachSandy Liu, Bruce Spencer, Yong Liang, Bo Xu, Libo Zhang, Martin Brooks. 473-478 [doi]
- Formal Verification of Protocol Properties of Sequential Java ProgramsYing Jin. 475-482 [doi]
- An Object-Oriented Modular Petri Nets for Modeling Service Oriented ApplicationsChing-Huey Wang, Feng-Jian Wang. 479-486 [doi]
- Unified Property Specification for Hardware/Software Co-VerificationFei Xie, Huaiyu Liu. 483-490 [doi]
- Requirements, Plato s Cave, and Perceptions of RealityAlan M. Davis, Kesav V. Nori. 487-492 [doi]
- Model Checking Aspect-Oriented Design SpecificationDianxiang Xu, Izzat Mahmoud Alsmadi, Weifeng Xu. 491-500 [doi]
- Non-Functional Computing: Towards a More Scientific Treatment to Non-Functional RequirementsKai-Yuan Cai. 493-494 [doi]
- Developing Non-Functional Requirements for a Service-Oriented Software PlatformXiping Song. 495-496 [doi]
- Experiences in Accurately Estimating Electronic Forms Conversion Services with a Spiral Estimate ProcessZhoulin Dai, Gu Yi, Liu Jun, Xu Yi Jie. 497-500 [doi]
- An Adaptive User Requirements Elicitation FrameworkBo Cheng, Xiang-wu Meng, Jun-liang Chen. 501-502 [doi]
- Parameter and Return-value Analysis of Binary ExecutablesJingbo Zhang, Rongcai Zhao, Jianmin Pang. 501-508 [doi]
- Frameworks of Composite Services Execution Engine with Feedback ControlChunming Gao, Huang Tan, Huowang Chen. 503-508 [doi]
- Managing Business Process Risk Using Rich Organizational ModelsMoshiur Bhuiyan, M. M. Zahidul Islam, George Koliadis, Aneesh Krishna, Aditya Ghose. 509-520 [doi]
- Test Case Generation for Collaborative Real-time Editing ToolsLian Yu, Wenping Xiao, Chang Yan Chi, Lin Ma, Hui Su. 509-516 [doi]
- Contract-Based Testing for Web ServicesGuilan Dai, Xiaoying Bai, Yongbo Wang, Fengjun Dai. 517-526 [doi]
- A Composite Design Pattern for Object FrameworksD. Thu Tran, T. B. Tran Huynh. 521-526 [doi]
- Architectural Adaptation Addressing the Criteria of Multiple Quality Attributes in Mission-Critical SystemsXiaofeng Cui, Yanchun Sun, Gang Huang, Hong Mei. 527-530 [doi]
- Extracting High-level Component-Connector View from Detailed UML Models: A Case StudyArvind W. Kiwelekar, Rushikesh K. Joshi. 527-534 [doi]
- A Quality Verification Model for Design PatternNien-Lin Hsueh, Peng-Hua Chu, Jonathan Lee, William C. Chu. 531-534 [doi]
- Dynamic Reconfiguration of Distributed Data Flow SystemsZhikun Zhao, Wei Li. 535-540 [doi]
- Bivariate Software Fault-Detection ModelsTomotaka Ishii, Tadashi Dohi, Hiroyuki Okamura. 535-538 [doi]
- Construction of an Agile Software Product-Enhancement Process by Using an Agile Software Solution Framework (ASSF) and Situational Method EngineeringAsif Qumer, Brian Henderson-Sellers. 539-542 [doi]
- Visualization of Concurrent Program ExecutionsCyrille Artho, Klaus Havelund, Shinichi Honiden. 541-546 [doi]
- Model Oriented Evolutionary RedocumentationFeng Chen, Hongji Yang. 543-548 [doi]
- AOP-based Testability Improvement for Component-based SoftwareChengying Mao. 547-552 [doi]
- State of Modernization Practice in Four Swedish OrganizationsMira Kajko-Mattsson, Mi Ta, Lukas Wilczek. 549-556 [doi]
- Salome platform component model for numerical simulationAndré Ribes, Christian Caremoli. 553-564 [doi]
- ePVM - An Embeddable Process Virtual MachineThomas Weigold, Thorsten Kramp, Peter Buhler. 557-564 [doi]
- The Four Major Challenges of Engineering Adaptive Software ArchitecturesJun Han, Alan W. Colman. 565-572 [doi]
- State-based Process Description Model in Chinese E-government Affair SystemYunxiang Zheng, Lei Li, Hai Wan. 565-568 [doi]
- Analyzing and Re-structuring Product Line DependenciesJuha Savolainen, Ian Oliver, Varvana Myllärniemi, Tomi Männistö. 569-574 [doi]
- A Service-oriented Approach for Flexible Information Resource IntegrationZhuohao Wang, Zhuofeng Zhao, Jun Fang. 573-578 [doi]
- Towards a Design Methodology for Multiprocessor PlatformsDragos Truscan, Tiberiu Seceleanu, Hannu Tenhunen, Johan Lilius. 575-578 [doi]
- Adaptability Evaluation of Software Architectures; A Case StudyPentti Tarvainen. 579-586 [doi]
- Specification, Design and Implementation of a Reuse RepositoryVanilson Arruda Burégio, Eduardo Santana de Almeida, Daniel Lucrédio, Silvio Romero de Lemos Meira. 579-582 [doi]
- DataWarp: Empowering Applications to Make Progress in the Face of Contradictory or Inconsistent DataStephen Crouch, Peter Henderson, Robert John Walters. 583-590 [doi]
- Decision Support for Dynamic Adaptation of Business Systems Based on Feature Binding AnalysisLiwei Shen, Xin Peng, Wenyun Zhao. 587-592 [doi]
- VOEditor: a Visual Environment for Ontology Construction and Collaborative Querying of Semantic Web ResourcesLing Li, Shengqun Tang, Lina Fang, Ruliang Xiao, Xinguo Deng, Youwei Xu, Yang Xu. 591-600 [doi]
- Towards Requirements Engineering for Context Adaptive SystemsWassiou Sitou, Bernd Spanfelner. 593-600 [doi]
- Toward Runtime Self-adaptation Method in Software-Intensive Systems Based on Hidden Markov ModelHua Wang, Jing Ying. 601-606 [doi]
- Mobile Game Development: Object-Orientation or NotWeishan Zhang, Dong Han, Thomas Kunz, Klaus Marius Hansen. 601-608 [doi]
- Machine Learning Prediction andWeb Access ModelingWenying Feng, Karan Vij. 607-612 [doi]
- A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked SystemsMahdi Niamanesh, Rasool Jalili. 609-612 [doi]
- SLA-based Data Integration on Database GridsTiezheng Nie, Guangqi Wang, Derong Shen, Meifang Li, Ge Yu. 613-618 [doi]
- A Study on Distributed Resource Information Service in Grid SystemJiuyuan Huo, Liqun Liu, Li Liu, Yi Yang, Lian Li. 613-618 [doi]
- A Framework for Separation of Concerns in Concurrent ProgrammingRafael Ramirez, Andrew E. Santosa. 619-628 [doi]
- Services Oriented Architecture: integration requirementsAurélie Aurilla Bechina Arntzen. 619-620 [doi]
- Comparing Fault-based Testing Strategies of General Boolean SpecificationsZhenyu Chen, Baowen Xu, Changhai Nie. 621-622 [doi]
- Patterns Topology for Performance EvaluationM. E. Fayad. 623-624 [doi]
- Mining Software Repositories to Understand the Performance of Individual DevelShen Zhang, Yongji Wang, Feng Yuan, Li Ruan. 625-626 [doi]
- Adaptive Performance Tuning for Internet-BasedWorkflowsPaolo Vercesi, Alberto Bartoli. 627-628 [doi]
- Towards Capability Maturity in Software ReviewJun Yu, Bin Xu, Hua Hu. 629-630 [doi]
- Method Based on OSEK/VDX Platform Using Model-based and Autocode Technology for Diesel ECU Software DevelopmentChunyang Mu, Lining Sun, Zhijiang Du. 629-634 [doi]
- Fuxi: An Agile Development Environment for Embedded SystemsZhongbin Wang. 631-632 [doi]
- OCL4X: An Action Semantics Language for UML Model ExecutionKe Jiang, Lei Zhang, Shigeru Miyake. 633-636 [doi]
- A Component Model for the AUTOSAR Virtual Function BusDietmar Schreiner, Karl M. Göschka. 635-641 [doi]
- Towards an Aspect-Oriented Intrusion Detection FrameworkZhi Jian Zhu, Mohammad Zulkernine. 637-638 [doi]
- An InnovativeWorkflow Product StructureHaiping Zha, Lijie Wen, Jianmin Wang. 639-640 [doi]
- Matrix-based Change Impact Analysis for Component-based SoftwareChengying Mao, Jinlong Zhang, Yansheng Lu. 641-642 [doi]
- Repository based Infrastructures for effective Automotive Software Creation - an Experience ReportOlaf Kath, Marc Born, Michael Soden. 642-650 [doi]
- A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc NetworkYa-tao Yang, Zheng Yuan, Yong Fang, Ping Zeng. 643-645 [doi]
- Luv: A Programming Language for Describing Human RelationshipsMichael de la Maza. 645-646 [doi]
- Execution Mechanism of Service Proxy in Web Services Composition Execution EngineChunming Gao, Xiaojuan Yuan, Huowang Chen. 647-648 [doi]
- Study on GML Spatial Interoperability based on Web ServiceShuliang Zhang, Jiayan Gan, LiZhi Miao, Guonian Lv, Jiazhu Huang. 649-656 [doi]
- Component Oriented Design StyleJing-Ying Chen. 651-657 [doi]
- Web System for Electronic Nautical Charts Service Based On ArcIMSFeixiang Zhu, Yingjun Zhang, Berlin Zhu. 657-661 [doi]
- A Framework for Open Distributed System DesignAlexei Iliasov, Alexander Romanovsky, Budi Arief. 658-674 [doi]
- Challenges in Selecting COTS Component GuidelinesWalisa Romsaiyud, Somnuk Kereto. 661-663 [doi]
- Management and Control of Coding and Testing of Component-based SoftwareTatiane Macedo Prudencio Lopes, Clovis Torres Fernandes. 664-666 [doi]
- Functional Specifications of Object Oriented Systems: A Model Driven FrameworkSabnam Sengupta, Swapan Bhattacharya. 667-672 [doi]
- Model Checking of Component ConnectorsMohammad Izadi, Ali Movaghar, Farhad Arbab. 673-675 [doi]
- A Soft Constraint Privacy Model based on IdentifiabilityWeifeng Chen, Zhen Liu, Anton Riabov. 675-980 [doi]
- Towards End User Service CompositionXuanzhe Liu, Gang Huang, Hong Mei. 676-678 [doi]
- Security enhancement of a novel proxy key generation protocolChiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee. 681-688 [doi]
- An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless StAbdul Samiah, Arshad Aziz, Nassar Ikram. 689-694 [doi]
- Towards the Modeling of Personal Privacy in Ubiquitous Computing EnvironmentsRyan Babbitt, Johnny Wong, Carl K. Chang. 695-699 [doi]
- A mutual authentication and key exchange scheme from bilinear pairings for low power computing devicesYuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu. 700-710 [doi]
- Effect of the Delay Time in Fixing a Fault on Software Error ModelsJung-Hua Lo. 711-716 [doi]
- Automated Testing EJB Components Based on Algebraic SpecificationsLiang Kong, Hong Zhu, Bin Zhou. 717-722 [doi]
- Built-in Regression Testing for Component-based Software SystemsChengying Mao. 723-728 [doi]
- Towards Automatic Regression Test Selection for Web ServicesMichael Ruth, Sehun Oh, Adam Loup, Brian Horton, Olin Gallet, Marcel Mata, Shengru Tu. 729-736 [doi]
- Generating User Acceptance Test Plans from Test CasesKarl R. P. H. Leung, Wing Lok Yeung. 737-742 [doi]
- Client based Object-Oriented Cohesion MetricsSami Mäkelä, Ville Leppänen. 743-748 [doi]
- MemScroll: Dynamic Memory Errors Detector in C ProgramsDae Wan Cho, Seunguk Oh, Hyeon Soo Kim. 749-754 [doi]
- Learning Parameterized State Machine Model for Integration TestingMuzammil Shahbaz, Keqin Li, Roland Groz. 755-760 [doi]