Abstract is missing.
- Medical Robotics and Computer-Integrated SurgeryRussell H. Taylor. 1 [doi]
- Generation Y: Understanding the Trend and Planning for the ImpactJean Holley. 2 [doi]
- Position Statement: How Well Technology Supports Software EvolutionRajesh Subramanyan. 3 [doi]
- Panel Description: Software Testing for Large Globally Distributed ProjectsRajesh Subramanyan. 4 [doi]
- Oil-Field Services Data Acquisition System - A Globally Distributed DevelopmentDi Cao. 5 [doi]
- Position Statement: The Impact of Software Assurance on Computing EducationNancy R. Mead. 6 [doi]
- Panel Description: 40 Years of Software EngineeringFevzi Belli, Cristina Cerschi Seceleanu. 7 [doi]
- Position Statement: How Far Have We Come?Brian Randell. 8 [doi]
- Position Statement: Advances and Challenges of Software EngineeringStephen S. Yau. 9 [doi]
- Position Statement: On the Evolution of Adversary Models in Computer Systems and NetworksVirgil D. Gligor. 10 [doi]
- Position Statement: Ceaselessly-Analyzing Development Environments, One Direction for the Next 40 Years of Software EngineeringK. Rustan M. Leino. 11 [doi]
- A Probabilistic Attacker Model for Quantitative Verification of DoS Security ThreatsStylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou. 12-19 [doi]
- Embedding Rule-Based Security Monitors into Java ProgramsTomi Karlstedt, Ville Leppänen, Sanna Tuohimaa. 20-27 [doi]
- A UML-Based Framework for Design and Analysis of Dependable SoftwareJun Kong, Dianxiang Xu. 28-31 [doi]
- An Algorithmic Approach to Authorization Rules Conflict Resolution in Software SecurityWeider D. Yu, Ellora Nayak. 32-35 [doi]
- Embedded Architecture Description LanguageJuncao Li, Nicholas T. Pilkington, Fei Xie, Qiang Liu. 36-43 [doi]
- An Open Framework for Highly Concurrent Real-Time Hardware-in-the-Loop SimulationRyan C. Underwood, Bruce M. McMillin, M. L. Crow. 44-51 [doi]
- Parallel Table Lookup for Next Generation InternetLi-Che Hung, Yaw-Chung Chen. 52-59 [doi]
- A Proxy Design for Nearest-Neighbor Query Processing in Mobile EnvironmentsHsin-Han Huang, Ching-Huey Wang, Jiun-Long Huang, Feng-Jian Wang. 60-63 [doi]
- Executable Semantics for Hybrid Systems - The Hybrid Low-Level FrameworkStefan Bisanz, Ulrich Hannemann, Jan Peleska. 64-67 [doi]
- A Zone-Based Distributed Key Management Scheme for Wireless Mesh NetworksYingfang Fu, Jingsha He, Liangyu Luan, Rong Wang, Guorui Li. 68-71 [doi]
- Virtual Reality for 2.5 G Wireless Communication Modem Software DevelopmentAlain Pegatoquet, Filip Thoen, Denis Paterson. 72-75 [doi]
- Behavioral Dependency Measurement for Change-Proneness Prediction in UML 2.0 Design ModelsAh-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong. 76-83 [doi]
- Collaborative Web Services Monitoring with Active Service BrokerXiaoying Bai, Shufang Lee, Wei-Tek Tsai, Yinong Chen. 84-91 [doi]
- Ontology Model-Based Static Analysis on Java ProgramsLian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang. 92-99 [doi]
- Modeling and Checking for Non-functional Attributes in Extended UML Class DiagramYan Zhang, Yi Liu, Le Zhang, Zhiyi Ma, Hong Mei. 100-107 [doi]
- Pattern and Policy Driven Log Analysis for Software MonitoringAli Razavi, Kostas Kontogiannis. 108-111 [doi]
- A PSC-Based Approach to Monitor the Timed Properties in Web Service CompositionsPengcheng Zhang, Bixin Li, Mingjie Sun, Xufang Gong. 112-115 [doi]
- Quantifying Trust Based on Service Level Agreement for Software as a ServiceLin Tan, Chi-Hung Chi, Jianming Deng. 116-119 [doi]
- A Systematic Approach for Integrating Fault Trees into System StatechartsOmar el Ariss, Dianxiang Xu, W. Eric Wong, Yuting Chen, Yann-Hang Lee. 120-123 [doi]
- An Input Adjustable Tree Algorithm for Evolutionary TestingHsinyi Jiang, Katsunori Oyama, Carl K. Chang. 124-127 [doi]
- Debugging through Evaluation Sequences: A Controlled Experimental StudyZhenyu Zhang, Bo Jiang, W. K. Chan, T. H. Tse. 128-135 [doi]
- Implicit Social Network Model for Predicting and Tracking the Location of FaultsIng-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun Jaygarl. 136-143 [doi]
- Superfit Combinational Elusive Bug DetectionR. Barzin, S. Fukushima, William E. Howden, S. Sharifi. 144-151 [doi]
- Avoiding Program Failures Through Safe Execution PerturbationsSriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Zhang. 152-159 [doi]
- A Transformation-Based Approach to Generating Scenario-Oriented Test Cases from UML Activity Diagrams for Concurrent ApplicationsChang-ai Sun. 160-167 [doi]
- Constraint Reasoning in Path-Oriented Random TestingArnaud Gotlieb, Matthieu Petit. 168-171 [doi]
- QA/Testing Bi-directional Languages Software: Issues and ChallengesSameer Abufardeh, Kenneth Magel. 172-175 [doi]
- Refactoring Steps, Java Refactorings and Empirical EvidenceSteve Counsell, Stephen Swift. 176-179 [doi]
- Fault Propagation in Tabular Expression-Based SpecificationsXin Feng, David Lorge Parnas, T. H. Tse. 180-183 [doi]
- On the Use of Fuzzy Logic in a Seller Bargaining GameKostas Kolomvatsos, Christos Anagnostopoulos, Stathes Hadjiefthymiades. 184-191 [doi]
- Rule Discovery and Matching in Stock DatabasesYou-min Ha, Sanghyun Park, Sang-Wook Kim, Jung-Im Won, Jeehee Yoon. 192-198 [doi]
- Hybrid Strategies for Attribute Relation Learning from CandidatesKui Fu, Guihua Nie, Huimin Wang. 199-202 [doi]
- Specifying Behavioural Features of Design Patterns in First Order LogicIan Bayley, Hong Zhu. 203-210 [doi]
- Live and Fair Constraint Automata and Their Linear Temporal Logic of StepsSara NavidPour, Mohammad Izadi, Ali Movaghar. 211-218 [doi]
- Model Checking C Programs with Dynamic Memory AllocationMaría-del-Mar Gallardo, Pedro Merino, David Sanán. 219-226 [doi]
- A Formal Approach to Developing Reliable Event-Driven Service-Oriented SystemsRamesh Bharadwaj, Supratik Mukhopadhyay. 227-230 [doi]
- A Maximum Weight Heuristic Method for Abstract State ComputationLi Li, Xiaoyu Song, Ming Gu, Jianmin Wang. 231-234 [doi]
- A New Temporal Logic CTL[k-QDDC] and Its VerificationJiaqi Zhu, Hanpin Wang, Zhongyuan Xu. 235-238 [doi]
- Modelling Requirements Patterns with a Goal and PF Integrated Analysis ApproachJingwei Yang, Lin Liu. 239-246 [doi]
- MV - TMM: A Multi View Traceability Management MethodHamid Elghazi. 247-254 [doi]
- So/M: A Requirements Definition Tool Using Characteristics of Existing Similar SystemsNaoyuki Kitazawa, Akira Osada, Kazuyuki Kamijo, Haruhiko Kaiya, Kenji Kaijiri. 255-262 [doi]
- Two-Level Variability Analysis for Business Process with Reusability and ExtensibilityMikyeong Moon, Minwoo Hong, Keunhyuk Yeom. 263-270 [doi]
- Software Engineering Interpretation of Information Processing RegulationsSabah S. Al-Fedaghi. 271-274 [doi]
- A Concurrency Control Mechanism for Composite Service Supporting User-Defined Relaxed AtomicityZongtao Zhao, Jun Wei, Li Lin, Xiaoning Ding. 275-278 [doi]
- Towards Context Modeling for Algorithm AnimationXiaocong Zhou, Wenjun Li, Han-jun Xian, Taizong Lai, Hui Liang. 279-286 [doi]
- A Human-Machine Dimensional Inference Ontology that Weaves Human Intentions and Requirements of Context Awareness SystemsKatsunori Oyama, Hojun Jaygarl, Jinchun Xia, Carl K. Chang, Atsushi Takeuchi, Hiroshi Fujimoto. 287-294 [doi]
- Facilitating Software Traceability Understanding with ENVISIONXin Zhou, Zhenzhong Huo, Yaowen Huang, Jian Xu. 295-302 [doi]
- Transformation of Legacy Software into Client/Server Applications through Pattern-Based RearchitecturingSascha Hunold, Matthias Korch, Björn Krellner, Thomas Rauber, Thomas Reichel, Gudula Rünger. 303-310 [doi]
- Evolution Shelf: Reusing Evolution Expertise within Component-Based Software ArchitecturesOlivier Le Goaer, Dalila Tamzalit, Mourad Oussalah, Abdelhak Seriai. 311-318 [doi]
- Searching for Opportunities of Refactoring Sequences: Reducing the Search SpaceEduardo Kessler Piveta, João Araújo, Marcelo Soares Pimenta, Ana Moreira, Pedro Guerreiro, Roberto Tom Price. 319-326 [doi]
- Analyzing Software EvolvabilityHongyu Pei Breivold, Ivica Crnkovic, Peter J. Eriksson. 327-330 [doi]
- Modeling by Form Transformation for End-User Initiative DevelopmentTakeshi Chusho, Noriyuki Yagi. 331-334 [doi]
- WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive EnvironmentSheikh Iqbal Ahamed, Nilothpal Talukder, Mehrab Monjur. 335-338 [doi]
- Ensuring Architecture Conventions in Multi-site DevelopmentJakub Rudzki, Imed Hammouda, Tommi Mikkonen. 339-346 [doi]
- XQPE: A Partial Evaluation System for XQueryHang Su, Husheng Liao. 347-354 [doi]
- Logical Partitioning without Architectural SupportsTaku Shimosawa, Hiroya Matsuba, Yutaka Ishikawa. 355-364 [doi]
- An Architecture Description Language for Verification in Component-Based SoftwareAhcene Bouzoualegh, Dominique Marcadet, Frédéric Boulanger, Christophe Jacquet. 365-368 [doi]
- An Adaptive Software Architecture Model Based on Component-Mismatches Detection and EliminationShan Tang, Xin Peng, Yiming Lau, Wenyun Zhao, Zhixiong Jiang. 369-372 [doi]
- Analyzing BPEL Compositionality Based on Petri NetsGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 373-376 [doi]
- On the Performance of Transactional Remote Invocations over Commonly Used TransportsIvan Silva Neto, Francisco Reverbel. 377-384 [doi]
- Dealing with the Crosscutting Structure of Software Architectural StylesSam Malek. 385-392 [doi]
- Extending Team Automata to Evaluate Software Architectural DesignSayed Mehran Sharafi. 393-400 [doi]
- Advanced Grid Programming with Components: A Biometric Identification Case StudyThomas Weigold, Peter Buhler, Jeyarajan Thiyagalingam, Artie Basukoski, Vladimir Getov. 401-408 [doi]
- A Cost-Effective Guarantee of Security and Scalability on HVEM DataGrid with Active DiskIm Young Jung, In Soon Cho, Heon Young Yeom. 409-416 [doi]
- Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic RobotsAtilla Elçi, Behnam Rahnama, Saman Kamran. 417-423 [doi]
- Reflective Design for Component-Based Distributed Systems with Timing ConstraintsJing Huang, Wei Zhang, Yansheng Lu, Qin Yang. 424-427 [doi]
- The Application of Distributed Virtual Machines for Enterprise Computer Management: A Two-Tier Network File System for Image Provisioning and ManagementCésar S. Aguiar, Daniel I. Cruz, Roberta Spolon Ulson, Marcos Antonio Cavenaghi. 428-431 [doi]
- FPCS: A Formal Approach for Privacy-Aware Context-Based ServicesNilothpal Talukder, Sheikh Iqbal Ahamed. 432-439 [doi]
- Teaching Team Software Process in Graduate Courses to Increase Productivity and Improve Software QualitySussy Bayona Oré, Jose Antonio Calvo-Manzano, Gonzalo Cuevas Agustín, Tomás San Feliu Gilabert. 440-446 [doi]
- Advancing Industry-Related Elements: The Meat on the Curricula BonesJ. Barrie Thompson, Helen M. Edwards. 447-454 [doi]
- An Immersion Program to Help Students Understand the Impact of Cross Cultural Differences in Software Engineering WorkNancy R. Mead, Daniel Shoemaker, Antonio Drommi, Jeffrey A. Ingalsbe. 455-459 [doi]
- IP2 Model - Content Recommendation in Web-Based Educational Systems Using User s Interests and Preferences and Resources PopularityReginaldo A. Gotardo, César A. C. Teixeira, Sérgio Donizetti Zorzo. 460-463 [doi]
- Automated Code Generation for Industrial-Strength SystemsThomas Weigert, Frank Weil, Aswin van den Berg, Paul Dietz, Kevin Marth. 464-472 [doi]
- Editable Replay of IDE-Based Repetitive TasksYing Zhang, Gang Huang, Nuyun Zhang, Hong Mei. 473-480 [doi]
- Contraindications, Precautions, Overdoses, and Adverse Reactions: What Software Engineering Can Learn from PharmaceuticalsAlan M. Davis. 481-487 [doi]
- Utilising Located Functions to Model and Optimise Distributed ComputationsStephen Crouch, Peter Henderson, Robert John Walters. 488-489 [doi]
- Automating Software FMEA via Formal Analysis of Dependence RelationsWei Dong, Ji Wang, Changzhi Zhao, Xian Zhang, Jie Tian. 490-491 [doi]
- Scenario-Based Automatic Prototype GenerationShinpei Ogata, Saeko Matsuura. 492-493 [doi]
- AIDDES - Distributed Intelligent Pair-Software Development EnvironmentEustáquio São José de Faria, Keiji Yamanaka, Josimeire do Amaral Tavares, Geraldo Henrique Lacerda Pinto, Lowghan Henrique Sudário de Melo. 494-495 [doi]
- Small Steps Approach to Tackling Software Quality in a Commercial SettingJakub Rudzki, Tarja Systä. 496-498 [doi]
- An Optimised Runtime Reconfiguration of Component-Based Software SystemsJasminka Matevska. 499-501 [doi]
- Message from the ESAS 2008 Workshop OrganizersAtilla Elçi, Mamadou Tadiou Kone, Mehmet A. Orgun. 502 [doi]
- ESAS 2008 Workshop OrganizationAtilla Elçi, Mamadou Tadiou Kone, Mehmet A. Orgun. 503-504 [doi]
- Facilitator Agent Design Pattern of Procurement Business SystemsFaiz M. Al-Shrouf. 505-510 [doi]
- A Contract Net Model Based on Agent Active PerceptionMeisheng Wang, Qingshan Li, Chenguang Zhao, Yingqiang Wang. 511-516 [doi]
- Intelligent Software Agents Mediating the Pair Participation in a Distributed Intelligent Pair-Software Development EnvironmentEustáquio São José de Faria, Keiji Yamanaka, Josimeire do Amaral Tavares, Geraldo Henrique Lacerda Pinto, Lowghan Henrique Sudário de Melo. 517-520 [doi]
- VERSAG: Context-Aware Adaptive Mobile Agents for the Semantic WebKutila Gunasekera, Arkady B. Zaslavsky, Shonali Krishnaswamy, Seng Wai Loke. 521-522 [doi]
- Keynote: Towards An Ontological Foundation for Evolving Agent CommunitiesPieter De Leenheer. 523-528 [doi]
- OTAGen: A Tunable Ontology Generator for Benchmarking Ontology-Based Agent CollaborationFemke Ongenae, Stijn Verstichel, Filip De Turck, Tom Dhaene, Bart Dhoedt, Piet Demeester. 529-530 [doi]
- An Ontology to Support Adaptive Agents for Complex Manufacturing SystemsLars Mönch, Jens Zimmermann. 531-536 [doi]
- Fabrication of Ontology for Security in Health Care SystemsJ. Indumathi, G. V. Uma. 537-538 [doi]
- An Ontology of Environments, Events, and HappeningsVadim Ermolayev, Natalya Keberle, Wolf-Ekkehard Matzke. 539-546 [doi]
- Towards Engineering Ontologies for Cognitive Profiling of Agents on the Semantic WebAmna Basharat, Gabriella Spinelli. 547-552 [doi]
- SDISSASA: A Multiagent-Based Web Mining via Semantic Access to Web Resources in Enterprise ArchitectureKiavash Bahreini, Atilla Elçi. 553-558 [doi]
- The Challenges along the Road to the Realisation of a Factory Automation LifecycleF. Ubis, Tom Kirkham, Brian Matthews, Jose L. Martinez Lastra, R. Harrison, V. Villaseñor Herrera, A. Chowdrey. 559-562 [doi]
- A Multi-agent Architecture for NATO Network Enabled Capabilities: Enabling Semantic Interoperability in Dynamic Environments (NC3A RD-2376)Brenda Powers. 563-564 [doi]
- Design of Multiagent System ArchitectureJuan Carlos González Moreno, Luis Vázquez López. 565-568 [doi]
- Shared Storage in J2ME: A Multi-agent System ApproachMuhammad Ainan Sadiq, Syed Muhammad Ali Shah. 569-574 [doi]
- Multi-agent Approach to Electrical Distribution Networks ControlSébastien Rumley, Elvira Kägi, Hugh Rudnick, Alain Germond. 575-580 [doi]
- From AUML Protocol Diagrams to Event B for the Specification and the Verification of Interaction Protocols in Multi-agent SystemsLeila Jemni Ben Ayed, Fatma Siala. 581-584 [doi]
- The Similarity Computing of Documents Based on VSMQinglin Guo. 585-586 [doi]
- Swarm Intelligence in the Optimization of Software Development Project ScheduleTad Gonsalves, Atsushi Ito, Ryo Kawabata, Kiyoshi Itoh. 587-592 [doi]
- A Knowledge Management Framework for Software Configuration ManagementNikiforos Ploskas, Michael Berger, Jiang Zhang, Gert-Joachim Wintterle. 593-598 [doi]
- Message from the REFS 2008 Workshop OrganizersColette Rolland, Eric S. K. Yu, Jian Yang, Lin Liu. 599 [doi]
- REFS 2008 Workshop OrganizationColette Rolland, Eric S. K. Yu, Jian Yang, Lin Liu. 600 [doi]
- Using the Friction between Business Processes and Use Cases in SOA RequirementsEric Knauss, Daniel Lübke. 601-606 [doi]
- Service-Oriented Modeling: An Extensive Reuse MethodBudan Wu, Zhi Jin. 607-612 [doi]
- Intentional Services Specification Enhancement with Scenario-Based Techniques to Analyze Security ThreatsMénel Lassoued. 613-618 [doi]
- A New Methodology Based on Kano Model for the Evaluation of a New Product Acceptability during the Front-End PhasesHelmi Ben Rejeb, Vincent Boly, Laure Morel-Guimaraes. 619-624 [doi]
- Requirements Analysis Using Feedback from Context Awareness SystemsKatsunori Oyama, Hojun Jaygarl, Jinchun Xia, Carl K. Chang, Atsushi Takeuchi, Hiroshi Fujimoto. 625-630 [doi]
- The Role of Service Abstraction and Service Variability and Its Impact on Requirements Engineering for Service-Oriented SystemsSébastian Adam, Jörg Dörr. 631-634 [doi]
- Requirements Change: What’s the Alternative?Alan M. Davis, Nur Nurmuliani, Sooyong Park, Didar Zowghi. 635-638 [doi]
- SCCM: Service-Oriented Community Coordinated Multimedia ArchitectureJiehan Zhou, Mika Rautiainen, Mika Ylianttila. 639-642 [doi]
- From UML Activity Diagrams to Event B for the Specification and the Verification of Workflow ApplicationsAhlem Ben Younes, Leila Jemni Ben Ayed. 643-648 [doi]
- Synthesis of Actor Dependency and Business Motivation for Service Requirements EngineeringSoo Ling Lim, Eric Platon, Karl Cox. 649-652 [doi]
- Message from the STPSA 2008 Workshop OrganizersSheikh Iqbal Ahamed, Mohammad Zulkernine. 653 [doi]
- STPSA 2008 Workshop OrganizationSheikh Iqbal Ahamed, Mohammad Zulkernine. 654 [doi]
- Access Control Framework for Secure Network Computing EnvironmentManpreet Singh, Manjeet S. Patterh. 655-660 [doi]
- Trade-off Analysis of Identity Management Systems with an Untrusted Identity ProviderGolnaz Elahi, Zeev Lieber, Eric S. K. Yu. 661-666 [doi]
- Using Responsibilities for Early Identification of Hot Spots Reused in Frameworks ModelingSimone Nasser Matos, Clovis Torres Fernandes. 667-672 [doi]
- A Lightweight Protocol for Dynamic RFID IdentificationStelvio Cimato. 673-678 [doi]
- RED-Transaction and Goal-Model Based Analysis of Layered Security of Physical SpacesRajiv Ramnath, Vasudha Gupta, Jay Ramanathan. 679-685 [doi]
- An Improved Calculus for Secure Dynamic Services CompositionDong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen. 686-691 [doi]
- Preserving Privacy in E-health Systems Using Hippocratic DatabasesYuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli. 692-697 [doi]
- Measuring Network Security Using Bayesian Network-Based Attack GraphsMarcel Frigault, Lingyu Wang. 698-703 [doi]
- A Naive Bayes Approach for Detecting Coordinated AttacksSalem Benferhat, Tayeb Kenaza, Aïcha Mokhtari. 704-709 [doi]
- Message from the QUORS 2008 Workshop OrganizersXiaodong Liu, Hongji Yang. 710 [doi]
- QUORS 2008 Workshop OrganizationXiaodong Liu, Hongji Yang. 711 [doi]
- A Requirement Tool to Support Model-Based Requirement EngineeringChih-Wei Lu, Chih-Hung Chang, William C. Chu, Ya-Wen Cheng, Hsin-Chien Chang. 712-717 [doi]
- Combining MDE and UML to Reverse Engineer Web-Based Legacy SystemsJianjun Pu, Hongji Yang, Baowen Xu, Lei Xu, William Cheng-Chung Chu. 718-725 [doi]
- A Taxonomy of Interactions Introduced by AspectsMario Luca Bernardi, Giuseppe A. Di Lucca. 726-731 [doi]
- RUP Extension For the Software PerformanceCarlos Eduardo de Barros Paes, Celso Massaki Hirata. 732-738 [doi]
- A Product Line Perspective for Quality Reuse of Development Frameworks for Distributed Transactional ApplicationsBarbara Gallina, Nicolas Guelfi. 739-744 [doi]
- Software Reuse in Design and Development of AspectsDeepak Dahiya, Sudha Dahiya. 745-750 [doi]
- Semantics-Based Component Repository: Current State of Arts and a Calculation Rating Factor-Based FrameworkChengpu Li, Xiaodong Liu, Jessie B. Kennedy. 751-756 [doi]
- Framework for Computer-Aided Evolution of Object-Oriented DesignsSelim Ciraci, Pim van den Broek, Mehmet Aksit. 757-764 [doi]
- Business Intelligence Recovery from Legacy CodeJian Kang, Jianjun Pu, Jianchu Huang, Zihou Zhou, Hongji Yang. 765-770 [doi]
- Delay Front and Skip Interval - Assessing Open Source Software Maintenance of System Vendors and Computer CentersHiroyuki Sato. 771-776 [doi]
- Message from the BINDIS 2008 Workshop OrganizersYang Li, Xiaodong Liu. 777 [doi]
- BINDIS 2008 Workshop OrganizationYang Li, Xiaodong Liu. 778 [doi]
- Object Oriented Design Based on Role and RuleQing Wang, Yong Zhang, Chunxiao Xing. 779-784 [doi]
- Reengineering Legacy Systems with RESTful Web ServiceYan Liu, Qingling Wang, Mingguang Zhuang, Yunyun Zhu. 785-790 [doi]
- Challenges of Building High Performing On-Demand SoftwareAshutosh Shinde. 791-794 [doi]
- Entropy-Based Age Estimation of Blog AuthorsMasataka Izumi, Takao Miura, Isamu Shioya. 795-800 [doi]
- Semantic-Oriented Ubiquitous Learning Object Management System SULOMSLili Su, Shenggang Yang, YuShun Li, Xiaochun Cheng, Ronghuai Huang. 801-806 [doi]
- Service Productivity Improvement and Software Technology SupportYang Li. 807-812 [doi]
- Message from the IWSC 2008 Workshop OrganizersStephen S. Yau, João W. Cangussu, Aditya P. Mathur, Fevzi Belli, Kai-Yuan Cai. 813 [doi]
- IWSC 2008 Workshop OrganizationStephen S. Yau, João W. Cangussu, Aditya P. Mathur, Fevzi Belli, Kai-Yuan Cai. 814-815 [doi]
- Keynote: Hierarchical Fault Detection in Embedded Control SoftwareChangyan Zhou, Ratnesh Kumar, S. Jiang. 816-823 [doi]
- An Intelligent Control Architecture for Adaptive Service-Based Software Systems with Workflow PatternsChang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau. 824-829 [doi]
- Quantitative Modeling for Incremental Software Process ControlScott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur. 830-835 [doi]
- Decision Support for User Interface Design: Usability Diagnosis by Time Analysis of the User ActivityAvi Harel, Ron Kenett, Fabrizio Ruggeri. 836-840 [doi]
- Performance Analysis of Concurrent Programs Using Ordinary Differential EquationsZuohua Ding, Kao Zhang. 841-846 [doi]
- Testing Optimization for Mission-Critical, Complex, Distributed SystemsMarek G. Stochel, Radek Sztando. 847-852 [doi]
- Adaptive Software Testing in the Context of an Improved Controlled Markov Chain ModelHai Hu, Chang-Hai Jiang, Kai-Yuan Cai. 853-858 [doi]
- Message from the EOCS-MCP 2008 Workshop OrganizersLongbing Cao, Ruwei Dai, Vladimir I. Gorodetski. 859 [doi]
- EOCS-MCP 2008 Workshop OrganizationLongbing Cao, Ruwei Dai, Vladimir I. Gorodetski. 860-861 [doi]
- Paradigms of Meta-synthetic ComputingYaodong Li, Xia Cui, Ruwei Dai. 862-867 [doi]
- Meta-synthetic Computing Formula of Situation Assessment in Social InteractionsXia Cui, Ruwei Dai. 868-872 [doi]
- Towards Four-Layer Framework of Combinatorial ProblemsMark Sh. Levin. 873-878 [doi]
- Design More Usable and Reliable Large-Scale Software Systems: A New Approach Based on P2P, SOA and Web 2.0Jinlei Jiang, Johann H. Schlichter, Guangwen Yang. 879-884 [doi]
- An Effective Communication Platform Based on XMPP for HWMEGang Cheng, Ruwei Dai, Mingchang Zhao, Yaodong Li. 885-889 [doi]
- A Dynamic Model and Simulation of Industrial ClustersJijun Zhao, Ferenc Szidarovszky. 890-895 [doi]
- Metasynthetic Computing for Solving Open Complex ProblemsLongbing Cao. 896-901 [doi]
- A New Software Architecture for J2EE Enterprise Environments via Semantic Access to Web Sources for Web Mining by Distributed Intelligent Software AgentsKiavash Bahreini, Atilla Elçi. 902-907 [doi]
- Modern Distance Education: A Special Open Complex Giant SystemHui Li, Zhen Li, Xia Cui. 908-912 [doi]
- An Opinions Expression and Induction System of Experts in Hall for Workshop of Meta-synthetic EngineeringYanyan Chai, Lei Fan, Yaodong Li, Mingchang Zhao. 913-917 [doi]
- A Novel Scheme Producing and Evaluation System in HWMEMinhua Li, Ruwei Dai, Yaodong Li. 918-922 [doi]
- News Analysis Based on Meta-synthesis ApproachWei Wang, Xia Cui, Ai Wang. 923-928 [doi]
- Extracting Social Network among Various Entities from Chinese News Stories by Content AnalysisWeijie Yang, Ruwei Dai, Xia Cui. 929-934 [doi]
- Message from the IWSSE 2008 Workshop OrganizersMichael Jiang, James Joshi. 935 [doi]
- IWSSE 2008 Workshop OrganizationMichael Jiang, James Joshi. 936 [doi]
- On the Adequacy of Statecharts as a Source of Tests for Cryptographic ProtocolsK. R. Jayaram, Aditya P. Mathur. 937-942 [doi]
- A QoS and Security Adaptation Model for Autonomic Pervasive SystemsMourad Alia, Marc Lacoste. 943-948 [doi]
- Incorporating Security Requirements Engineering into the Dynamic Systems Development MethodNancy R. Mead, Venkatesh Viswanathan, Deepa Padmanabhan. 949-954 [doi]
- Quantifying Security in Secure Software Development PhasesMuhammad Umair Ahmed Khan, Mohammad Zulkernine. 955-960 [doi]
- A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End FilterGerardo Canfora, Corrado Aaron Visaggio. 961-966 [doi]
- Botnet Research SurveyZhaosheng Zhu, Guohan Lu, Yan Chen, Zhi (Judy) Fu, Phil Roberts, Keesook Han. 967-972 [doi]
- Information Security of Remote File Transfers with Mobile DevicesSami Noponen, Kaarina Karppinen. 973-978 [doi]
- Mutation-Based Testing of Buffer Overflow VulnerabilitiesHossain Shahriar, Mohammad Zulkernine. 979-984 [doi]
- Message from the SemBPM 2008 Workshop OrganizersWitold Abramowicz, Leszek A. Maciaszek. 985 [doi]
- SemBPM 2008 Workshop OrganizationWitold Abramowicz, Leszek A. Maciaszek. 986 [doi]
- Semantic Enterprise Description for the Needs of Business Process AutomationAgata Filipowska, Monika Kaczmarek, Monika Starzecka, Piotr Stolarski, Adam Walczak. 987-992 [doi]
- Semantic QoS Model for Extended IOPE Matching and Composition of Web ServicesDuygu Çelik, Atilla Elçi. 993-998 [doi]
- A Temporal Semantics for Workflow Control PatternsDenis Gagné, André Trudel. 999-1004 [doi]
- Putting Business into Business Process ModelsKen Decreus, Geert Poels. 1005-1010 [doi]
- A Meta Modeling Framework for Domain Specific Process ManagementStefan Jablonski, Bernhard Volz, Sebastian Dornstauder. 1011-1016 [doi]
- An Approach for Matching Functional Business Requirements to Standard Application Software Packages via OntologyRolf Kluge, Thomas Hering, Roman Belter, Bogdan Franczyk. 1017-1022 [doi]
- How to Enhance UDDI with Dependability CapabilitiesAnatoliy Gorbenko, Alexander Romanovsky, Vyacheslav S. Kharchenko. 1023-1028 [doi]
- Towards Distributed Management of Service-Oriented Computing InfrastructuresRoman Belter, Rolf Kluge. 1029-1034 [doi]
- Message from the SECAD 2008 Workshop OrganizersFabrizio Fabbrini, Mario Fusani, Giuseppe Lami. 1035 [doi]
- SECAD 2008 Workshop OrganizationFabrizio Fabbrini, Mario Fusani, Giuseppe Lami. 1036 [doi]
- The Role of Process Standards in Automotive Systems DevelopmentAlec Dorling. 1037-1038 [doi]
- Software Engineering in the European Automotive Industry: Achievements and ChallengesFabrizio Fabbrini, Mario Fusani, Giuseppe Lami, Edoardo Sivera. 1039-1044 [doi]
- From CMMI to SPICE - Experiences on How to Survive a SPICE Assessment Having Already Implemented CMMIBhaskar Vanamali, Fabio Bella, Klaus Hörmann. 1045-1052 [doi]
- Safety in Automotive Software: An Overview of Current PracticesPaolo Panaroni, Giovanni Sartori, Fabrizio Fabbrini, Mario Fusani, Giuseppe Lami. 1053-1058 [doi]
- Service-Oriented Modelling of Automotive SystemsLaura Bocchi, José Luiz Fiadeiro, Antónia Lopes. 1059-1064 [doi]
- Configuration and Change Management of the Outcomes of an Automotive Engine Control Model Based Software Design ProcessStefano Monti, Walter Nesci, Serino Angellotti, Claudio Schellino, Massimo Seminara, Rainer Wuesthenagen. 1065-1069 [doi]
- Visual Configuration in Automotive Software Product LinesGoetz Botterweck, Steffen Thiel, Ciarán Cawley, Daren Nestor, André Preußner. 1070-1075 [doi]
- Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented ProgrammingPhu H. Phung, David Sands. 1076-1082 [doi]
- Control IP s Sharing: From Configurable Mechatronic Control to Autosar SW-C Package. A New Model Business Scenario across Automotive OEMs and Component Supplier and the New Roles of SW IP s Supplier and SW IP s IntegratorSerino Angellotti, Stefano Monti, Walter Nesci, Alessandro Peciarolo, Giovanni Prodi, Claudio Schellino, Massimo Seminara, Rainer Wuestenhagen. 1083-1088 [doi]
- Message from the MDDS 2008 Workshop OrganizersJohn Strassner, Sven van der Meer, Jing Zhang. 1089 [doi]
- MDDAS 2008 Workshop OrganizationJohn Strassner, Sven van der Meer, Jing Zhang. 1090 [doi]
- Metamodeling Autonomic System Management Policies - Ongoing WorksBenoît Combemale, Laurent Broto, Alain Tchana, Daniel Hagimont. 1091-1096 [doi]
- A Context-Aware Policy Model to Support Autonomic NetworkingJohn Strassner, Yan Liu, Jing Zhang. 1097-1102 [doi]
- Semantic Integration of User Data - Models and Processes Enabling Seamless MobilityRay Carroll, Sven van der Meer. 1103-1109 [doi]
- Model-Driven Engineering for Autonomic Provisioned SystemsBogdan Solomon, Dan Ionescu, Marin Litoiu, Mircea Mihaescu. 1110-1115 [doi]
- Enabling Dynamic Co-evolution of Models and Runtime ApplicationsPrawee Sriplakich, Guillaume Waignier, Anne-Françoise Le Meur. 1116-1121 [doi]
- Design Methodology for a Modular Component Based Software ArchitectureMichael Caragiozidis, Nikos Mouratidis, Christoforos D. Kavadias, Michael Loupis, Michael Berger. 1122-1127 [doi]
- An Enhanced Autonomic Multiclass Multithreaded Web Server: A Performance Model ApproachAli Doostmohammadi. 1128-1133 [doi]
- Message from the RTSOAA 2008 Workshop OrganizersJen-Yao Chung, Jun-Jang Jeng, Josef Schiefer. 1134 [doi]
- RTSOAA 2008 workshop OrganizationJen-Yao Chung, Jun-Jang Jeng, Josef Schiefer. 1135 [doi]
- Predicting Performance on a Loosely Controlled Event SystemSean Rooney, Luis Garcés-Erice. 1136-1142 [doi]
- Towards Real-Time Data Transformation Services over GridsAlfredo Cuzzocrea. 1143-1149 [doi]
- A Functional Data Service Framework for Integrating Heterogeneous Data SourcesZhan Cui, Nick Godwin, Kuo-Ming Chao, Jen-Yao Chung, Chen-Fang Tsai. 1150-1155 [doi]
- Matching Service Requirements to Empirical Capability Models in Service-Oriented ArchitecturesJuha Savolainen, Anssi Karhinen. 1156-1161 [doi]
- Application Generation Framework for Real-Time Complex Event ProcessingYonit Magid, Asaf Adi, Maya Barnea, David Botzer, Ella Rabinovich. 1162-1167 [doi]
- Event-Driven Modeling and Testing of Web ServicesFevzi Belli, Michael Linschulte. 1168-1173 [doi]
- Service Composition for Real-Time AssuranceTong Gao, Hachem Moussa, I-Ling Yen, Farokh B. Bastani, Jun-Jang Jeng. 1174-1179 [doi]
- WS-TemporalPolicy: A WS-Policy Extension for Describing Service Properties with Time ConstraintsMarkus Mathes, Steffen Heinzl, Bernd Freisleben. 1180-1186 [doi]
- A Verification Method for Temporal Consistency of Service FlowRujuan Liu, Guilan Dai, Changjun Hu, Chongchong Zhao. 1187-1192 [doi]
- A Model-Based Approach to Implementing Real-Time Mobile ServicesMichael Jiang, Zhihui Yang, Anant Athale. 1193-1198 [doi]
- Real-Time Service-Oriented Architectures to Support Remote Critical Care: Trends and ChallengesCarolyn McGregor, J. Mikael Eklund. 1199-1204 [doi]
- PACTS: A Service Oriented Architecture for Real-Time Peer-Assisted Content Delivery ServiceZhenghua Fu, Chai Wah Wu, Jun-Jang Jeng, Hui Lei. 1205-1210 [doi]
- Message from the QACOS 2008 Workshop OrganizersMuhammad Ali Babar, Mari Tainlassi, Björn Lundell. 1211 [doi]
- QACOS 2008 Workshop OrganizationMuhammad Ali Babar, Mari Tainlassi, Björn Lundell. 1212 [doi]
- Towards a Process Maturity Model for Open Source SoftwareMarcus Ciolkowski, Martín Soto. 1213-1214 [doi]
- A Model of Open Source Software-Based Product Line DevelopmentFaheem Ahmed, Luiz Fernando Capretz, Muhammad Ali Babar. 1215-1220 [doi]
- Managing Libre Software Distributions under a Product Line ApproachIsrael Herraiz, Gregorio Robles, Rafael Capilla, Jesús M. González-Barahona. 1221-1225 [doi]
- Architectural Issues in Opening Up the Advantages of Open Source in Product Development CompaniesChristian Lennerholt, Brian Lings, Björn Lundell. 1226-1227 [doi]
- OntoArch Approach for Reliability-Aware Software Architecture DevelopmentJiehan Zhou, Eila Niemelä, Antti Evesti, Anne Immonen, Pekka Savolainen. 1228-1233 [doi]
- Software Architecture Relevance in Open Source Software Evolution: A Case StudyElisa Yumi Nakagawa, Elaine P. M. de Sousa, Kiyoshi de Brito Murata, Gabriel de Faria Andery, Leonardo Bitencourt Morelli, José Carlos Maldonado. 1234-1239 [doi]
- Improving the Quality of GNU/Linux DistributionsJaap Boender, Roberto Di Cosmo, Jérôme Vouillon, Berke Durak, Fabio Mancinelli. 1240-1246 [doi]
- Applied Quality Assurance Methods under the Open Source Development ModelTobias Otte, Robert Moreton, Heinz D. Knoell. 1247-1252 [doi]
- SECASA 2008 Workshop OrganizationWeichang Du, John Plaice, Panagiotis Rondogiannis. 1253 [doi]
- uNavi : Implementation and Deployment of a Place-Based Pedestrian Navigation SystemMasahiro Bessho, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura. 1254-1259 [doi]
- Designing Simulated Context-Aware Telephone in Pervasive SpacesQi Yong, Zhang Qingsheng, He Hui, Niu Yujie. 1260-1265 [doi]
- Sequential Demand-Driven Evaluation of Eager TransLucidJohn Plaice, Blanca Mancilla, Gabriel Ditu, William W. Wadge. 1266-1271 [doi]
- A Multithreaded Implementation for TransLucidToby Rahilly, John Plaice. 1272-1277 [doi]
- Design and Implementation of Context Calculus in the GIPSY EnvironmentJoey Paquet, Serguei A. Mokhov, Xin Tong 0002. 1278-1283 [doi]
- Synchronous CommunitiesJohn Plaice, Blanca Mancilla. 1284-1287 [doi]
- Towards Syntax and Semantics of Hierarchical Contexts in Multimedia Processing Applications Using MARFLSerguei A. Mokhov. 1288-1294 [doi]
- Message from the CORCS 2008 Workshop OrganizersCristina Cerschi Seceleanu, Paul Pettersson, Hans Hansson. 1295 [doi]
- CORCS 2008 Workshop OrganizationCristina Cerschi Seceleanu, Paul Pettersson, Hans Hansson. 1296 [doi]
- Valentine: A Dynamic and Adaptive Operating System for Wireless Sensor NetworksNatacha Hoang, Nicolas Belloir, Cong-Duc Pham, Séverine Sentilles. 1297-1302 [doi]
- A Component-Based Model and Language for Wireless Sensor Network ApplicationsAlan Dearle, Dharini Balasubramaniam, Jonathan Lewis, Ronald Morrison. 1303-1308 [doi]
- Error Modeling in Dependable Component-Based SystemsHüseyin Aysan, Sasikumar Punnekkat, Radu Dobrin. 1309-1314 [doi]
- A (Re)Configuration Mechanism for Resource-Constrained Embedded SystemsYu Guo, Krzysztof Sierszecki, Christo Angelov. 1315-1320 [doi]
- Embedded Systems Resources: Views on Modeling and AnalysisAneta Vulgarakis, Cristina Cerschi Seceleanu. 1321-1328 [doi]
- A Resource-Oriented Static Analysis Approach to Adaptable Java ApplicationsMarco Autili, Paolo Di Benedetto, Paola Inverardi, Fabio Mancinelli. 1329-1334 [doi]
- Validation of Temporal Simulation Models of Complex Real-Time SystemsFarhang Nemati, Johan Kraft, Christer Norström. 1335-1340 [doi]
- Joint SW/HW Modelling and Design Exploration Using P-WareIsmail Assayad. 1341-1346 [doi]
- An Overrun Method to Support Composition of Semi-independent Real-Time ComponentsMoris Behnam, Insik Shin, Thomas Nolte, Mikael Nolin. 1347-1352 [doi]
- Message from the IEESD 2008 Workshop OrganizersTiberiu Seceleanu, Detlef Streitferdt. 1353 [doi]
- IEESD 2008 Workshop OrganizationTiberiu Seceleanu, Detlef Streitferdt. 1354 [doi]
- Simulation of Process Control with WirelessHART Networks Subject to Clock DriftMauro De Biasi, Carlo Snickars, Krister Landernäs, Alf Isaksson. 1355-1360 [doi]
- Dynamically Optimized Production Planning Ssing Cross-Layer SOADomnic Savio, Stamatis Karnouskos, Daniel Wuwer, Thomas Bangemann. 1361-1365 [doi]
- The On-Board Control Procedures Subsystem for the Herschel and Planck SatellitesMassimo Ferraguto, Tim Wittrock, Mark Barrenscheen, Matti Paakko, Ville Sipinen. 1366-1371 [doi]
- Model Driven Development Challenges in the Automation DomainDetlef Streitferdt, Georg Wendt, Philipp Nenninger, Alexander Nyßen, Horst Lichter. 1372-1375 [doi]
- MeDUSA - A Model-Based Construction Method for Embedded and Real-Time SoftwareAlexander Nyßen, Horst Lichter, Detlef Streitferdt, Philipp Nenninger. 1376-1382 [doi]
- Implementing Program Model with Agile Principles in a Large Software Development OrganizationMaarit Laanti. 1383-1391 [doi]