Abstract is missing.
- Plenary Panel Description: Challenges and Future Directions of Software TechnologyStephen S. Yau. 1 [doi]
- Software Development Productivity: Challenges and Future TrendsVladimir Getov. 2-7 [doi]
- Challenges and Future Directions of Software Technology: The Need for Explicit Programming EnvironmentsJohn L. Gustafson. 8-9 [doi]
- Challenges and Future Directions of Cyber-Physical System SoftwareK. H. (Kane) Kim. 10-13 [doi]
- Internetware: Challenges and Future Direction of Software Paradigm for Internet as a ComputerHong Mei. 14-16 [doi]
- Challenges and Future Directions of Software Technology: Secure Software DevelopmentBhavani M. Thuraisingham, Kevin W. Hamlen. 17-20 [doi]
- Panel Description: Joint COMPSAC/SAINT Panel: Future of the InternetEiji Kawai, Elisa Bertino, Sue Moon. 21 [doi]
- Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: What Can We Do to Support Super-Broadband Traffic in the Future Network?Kohei Shiomoto. 22 [doi]
- Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: Activity Status of New-Generation Network DesignHiroaki Harai. 23 [doi]
- Panel Description: Joint COMPSAC/SAINT Panel: Green IT - From Devices to ApplicationsTohru Asami, Sahra Sedigh. 24 [doi]
- Panel Description: Are We Headed towards Smart Solutions?Rajesh Subramanyan. 25 [doi]
- Panel Description: Towards New Roles and System Architecture Supporting the Full Life Cycle of Smart SpacesSumi Helal. 26 [doi]
- Towards Secure Virtual Directories: A Risk Analysis FrameworkWilliam Claycomb, Dongwan Shin. 27-36 [doi]
- Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual MachinesTsutomu Nomoto, Yoshihiro Oyama, Hideki Eiraku, Takahiro Shinagawa, Kazuhiko Kato. 37-46 [doi]
- A New Concurrent Checkpoint Mechanism for Real-Time and Interactive ProcessesJianwei Liao, Yutaka Ishikawa. 47-52 [doi]
- An Analysis of Tool-Based Research in Software EngineeringJonas Helming, Maximilian Koegel, Hoda Naguib, Miriam Schmidberger, Florian Schneider, Bernd Brügge. 53-61 [doi]
- A Task-Oriented Navigation Approach to Enhance Architectural Description ComprehensionWenhui Zhu, Yang Tao, Gang Huang, Yanchun Sun, Hong Mei. 62-71 [doi]
- Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive FrameworkXu Zhang, Chung-Horng Lung. 72-81 [doi]
- An Approach for Ensuring Robust Safeguard against Location Privacy ViolationChowdhury Sharif Hasan, Sheikh Iqbal Ahamed. 82-91 [doi]
- Design and Implementation of a Middleware for Development and Provision of Stream-Based ServicesSeungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil Park, Su Myeon Kim, Junehwa Song. 92-100 [doi]
- geoXmart - A Marketplace for Geofence-Based Mobile ServicesUlrich Bareth, Axel Küpper, Peter Ruppel. 101-106 [doi]
- Applying Particle Swarm Optimization to Pairwise TestingXiang Chen, Qing Gu, Jingxian Qi, Daoxu Chen. 107-116 [doi]
- Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise SystemHaroon Malik, Bram Adams, Ahmed E. Hassan, Parminder Flora, Gilbert Hamann. 117-126 [doi]
- GenRed: A Tool for Generating and Reducing Object-Oriented Test CasesHojun Jaygarl, Kai-Shin Lu, Carl K. Chang. 127-136 [doi]
- Representing and Reasoning about Web Access Control PoliciesGail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong Meng. 137-146 [doi]
- A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password TokenFred Cheng. 147-154 [doi]
- IPTV Micropayment System Based on Hash Chain Using RFID-USB ModuleYoon-Su Jeong, Ning Sun, Sang Ho Lee. 155-160 [doi]
- Security in Context: Analysis and Refinement of Software ArchitecturesThomas Heyman, Riccardo Scandariato, Wouter Joosen. 161-170 [doi]
- Key Roles of Session State: Not against REST Architectural StyleTakeru Inoue, Hiroshi Asakura, Hiroshi Sato, Noriyuki Takahashi. 171-178 [doi]
- An Adaptation Approach for Component-Based Software ArchitectureDerdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-zine, Adel Alti. 179-187 [doi]
- Team Factors and Failure Processing Efficiency: An Exploratory Study of Closed and Open Source Software DevelopmentMichael Grottke, Lars M. Karg, Arne Beckhaus. 188-197 [doi]
- Target Setting for Technical Requirements in Time-Stamped Software Quality FunctionXiaoqing Frank Liu, Praveen Inuganti, Kunio Noguchi, Yuji Kyoya. 198-207 [doi]
- Towards a General Framework for Evaluating Software Development MethodologiesShokoofeh Hesari, Hoda Mashayekhi, Raman Ramsin. 208-217 [doi]
- Effective Software Bug Localization Using Spectral Frequency Weighting FunctionHua Jie Lee, Lee Naish, Kotagiri Ramamohanarao. 218-227 [doi]
- Detect Related Bugs from Source Code Using Bug InformationDeqing Wang, Mengxiang Lin, Hui Zhang, Hongping Hu. 228-237 [doi]
- Model of Reliability of the Software with Coxian Distribution of Length of Intervals between the Moments of Detection of ErrorsVladimir P. Bubnov, Alexey V. Tyrva, Anatoly D. Khomonenko. 238-243 [doi]
- Efficient Color Image Compression Using DemosaicingEvgeny Gershikov, Moshe Porat. 244-245 [doi]
- Using Semantics-Enabled Information Retrieval in Requirements Tracing: An Ongoing Experimental InvestigationAnas Mahmoud, Nan Niu. 246-247 [doi]
- An Empirical Comparison of Fault-Prone Module Detection Approaches: Complexity Metrics and Text Feature MetricsOsamu Mizuno, Hideaki Hata. 248-249 [doi]
- Green Computing Methodology for Next Generation Computing ScientistsChia-Tien Dan Lo, Kai Qian. 250-251 [doi]
- A Consistency Model for Identity Information in Distributed SystemsThorsten Höllrigl, Jochen Dinger, Hannes Hartenstein. 252-261 [doi]
- AntiBot: Clustering Common Semantic Patterns for Bot DetectionYoung Hee Park, Qinghua Zhang, Douglas S. Reeves, Vikram Mulukutla. 262-272 [doi]
- A Weaker Knowledge Connectivity Condition Sufficient for Fault-Tolerant Consensus with Unknown ParticipantsJichiang Tsai, Che-Cheng Chang. 273-278 [doi]
- Metamodel Recovery from Multi-tiered Domains Using Extended MARSQichao Liu, Barrett R. Bryant, Marjan Mernik. 279-288 [doi]
- Reasoning about Human Intention Change for Individualized Runtime Software Service EvolutionHua Ming, Carl K. Chang, Katsunori Oyama, Hen-I Yang. 289-296 [doi]
- An Interactive Change Impact Analysis Based on an Architectural Reflexion Model ApproachTae Hyung Kim, Kimun Kim, Woomok Kim. 297-302 [doi]
- ucR Based Interoperable Spatial Information Model for Realizing Ubiquitous Spatial InfrastructureYukihiko Shigesada, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura. 303-310 [doi]
- A Personalized Navigation Guide Using a Social-Spatial OntologyHyunho Park, Gonzalo Huerta Cánepa, Dongman Lee, Ho NamKoong, Byoungoh Kim, Soon J. Hyun. 311-316 [doi]
- A Usability-Pattern-Based Requirements-Analysis Method to Bridge the Gap between User Tasks and Application FeaturesSang Hyun Lee, In-Young Ko, Sungwon Kang, Danhyung Lee. 317-326 [doi]
- Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use CasesMassila Kamalrudin, John C. Grundy, John G. Hosking. 327-336 [doi]
- Variability Modeling for Product Line Viewpoints IntegrationNan Niu, Juha Savolainen, Yijun Yu. 337-346 [doi]
- Human Desire Inference Process Based on Affective ComputingJeyoun Dong, Hen-I Yang, Katsunori Oyama, Carl K. Chang. 347-350 [doi]
- PAAKL: Password Authentication Using Behavioral MetricsAnestis A. Toptsis, Joshua Majonis. 351-356 [doi]
- Behavior Monitoring in Self-Healing Service-Oriented SystemsHarald Psaier, Florian Skopik, Daniel Schall, Schahram Dustdar. 357-366 [doi]
- A Petri Net-Based Algorithm for RFID Event DetectionChunxiang Xu, Yu Huang, Wanling Qu, Hanpin Wang, Xiaojuan Ban. 367-372
- Change Impact Analysis Based on a Taxonomy of Change TypesXiaobing Sun, Bixin Li, Chuanqi Tao, Wanzhi Wen, Sai Zhang. 373-382 [doi]
- An Ontology-Based Approach to Reengineering Enterprise Software for Cloud ComputingHong Zhou, Hongji Yang, Andrew Hugill. 383-388 [doi]
- Synchronized Architecture Evolution in Software Product Line Using Bidirectional TransformationLiwei Shen, Xin Peng, Jiayi Zhu, Wenyun Zhao. 389-394 [doi]
- An Optimized Checkpointing Based Learning Algorithm for Single Event UpsetsS. Sharanyan, Arvind Kumar. 395-400 [doi]
- A Scalable and Efficient Path Management Scheme for Internet-Based Sensor Data Delivery InfrastructureKyungmin Cho, Younghyun Ju, SungJae Jo, Yunseok Rhee, Junehwa Song. 401-406 [doi]
- Exploring Query Optimization in Programming Codes by Reducing Run-Time ExecutionVenkata Krishna Suhas Nerella, Swetha Surapaneni, Sanjay Kumar Madria, Thomas Weigert. 407-412 [doi]
- Design and Analysis of Cost-Cognizant Test Case Prioritization Using Genetic Algorithm with Test HistoryYu-Chi Huang, Chin-Yu Huang, Jun-Ru Chang, Tsan-Yuan Chen. 413-418 [doi]
- Minimising the Preparation Cost of Runtime Testing Based on Testability MetricsAlberto González-Sanchez, Éric Piel, Hans-Gerhard Groß, Arjan J. C. van Gemund. 419-424 [doi]
- Specifying Time-Sensitive Systems with TLA+Hehua Zhang, Ming Gu, Xiaoyu Song. 425-430 [doi]
- Transformation Rules for Synthesis of UML Activity Diagram from Scenario-Based SpecificationSungwon Kang, Hyunho Kim, Jongmoon Baik, Ho-Jin Choi, ChangSup Keum. 431-436 [doi]
- A Game Perspective of Refinement of Component ModelsZizhen Wang, Hanpin Wang, Yongzhi Cao, Wanling Qu, Wei Jin, Meixia Zhu. 437-442 [doi]
- An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining DeterminismXiaowei Zhang, Donggang Cao, Yunpeng Gao, Xiangqun Chen, Hong Mei. 443-452 [doi]
- SAT: Switchable Address Translation for Flash Memory StoragesYeonseung Ryu. 453-461 [doi]
- Supporting Design Enhancement by Pattern-Based TransformationNien-Lin Hsueh, Peng-Hua Chu, Pao-Ann Hsiung, Min-Ju Chuang, William C. Chu, Chih-Hung Chang, Chorng-Shiuh Koong, Chihhsiong Shih. 462-467 [doi]
- A Petri Net-Based Method for Data Validation of Web Services CompositionChunxiang Xu, Wanling Qu, Hanpin Wang, Zizhen Wang, Xiaojuan Ban. 468-476 [doi]
- Process Patterns for Web EngineeringReza Babanezhad, Yusef Mehrdad Bibalan, Raman Ramsin. 477-486 [doi]
- Modeling BPEL and BPEL4People with a Timed Interruptable pi-CalculusWei Jin, Hanpin Wang, Yongzhi Cao, Zizhen Wang, Xiaojuan Ban. 487-492 [doi]
- QoS-Based Dynamic Web Service Composition with Ant Colony OptimizationWei Zhang, Carl K. Chang, Taiming Feng, Hsinyi Jiang. 493-502 [doi]
- Filtering of Inconsistent Software Project Data for Analogy-Based Effort EstimationTuan Khanh Le-Do, Kyung-A Yoon, Yeong-Seok Seo, Doo-Hwan Bae. 503-508 [doi]
- An Efficient Source Allocation Approach for QoS Support in P2PTV SystemsYaw-Chung Chen, Shang-Shu Li, Kuan-Teng Chen. 509-514 [doi]
- Timing Analyzing for Systems with Task Execution DependenciesYue Lu, Thomas Nolte, Iain Bate, Christer Norström. 515-524 [doi]
- Systematic Composition and Verification of Abstract ComponentsYunja Choi. 525-530 [doi]
- A Study on the Applicability of Modified Genetic Algorithms for the Parameter Estimation of Software Reliability ModelingChao Jung Hsu, Chin-Yu Huang. 531-540 [doi]
- A Model-Based Design Tool of Automotive Software ArchitectureJeong-Si Kim, Chaedeok Lim, Tae-Man Han. 541-542 [doi]
- A Method for Detecting Defects in Source Codes Using Model Checking TechniquesYoshitaka Aoki, Saeko Matsuura. 543-544 [doi]
- Reconnection of the Pre-assigning Peers in the Seamless Video StreamingIlhom Karimov, Nuriddin Rayimov, Jing Liu, Jungwook Song, Sungchol Cho, Sunyoung Han, Chinchol Kim. 545-546 [doi]
- A Know-How Recommendation System for a Software Engineering Project Course by Using the Content Filtering TechniqueRika Kawai, Atsuo Hazeyama. 547-548 [doi]