Abstract is missing.
- Soft constraint propagation and solving in CHRsStefano Bistarelli, Thom W. Frühwirth, Michael Marte. 1-5 [doi]
- Executable declarative business rules and their use in electronic commerceGrigoris Antoniou, M. Arief. 6-10 [doi]
- Simulating evolutionary agent communities with OOCSMPManuel Alfonseca, Juan de Lara. 11-15 [doi]
- An effective document clustering method using user-adaptable distance metricsHan-joon Kim, Sang-goo Lee. 16-20 [doi]
- Computational adjustable autonomy for NASA Personal Satellite AssistantsHenry Hexmoor, Justin Tyrel Vaughn. 21-26 [doi]
- The Agent-based Programming Language: APLChang-Hyun Jo, Allen J. Arnold. 27-31 [doi]
- Software update via mobile agent based programmingLorenzo Bettini, Rocco De Nicola, Michele Loreti. 32-36 [doi]
- Meta-models for building multi-agent systemsJorge J. Gómez-Sanz, Juan Pavón, Francisco J. Garijo. 37-41 [doi]
- Differences between the iterated prisoner s dilemma and the chicken game under noisy conditionsBengt Carlsson, K. Ingemar Jönsson. 42-48 [doi]
- Personalizing information gathering for mobile database clientsSusan Weissman Lauzac, Panos K. Chrysanthis. 49-56 [doi]
- A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problemIadine Chades, Bruno Scherrer, François Charpillet. 57-62 [doi]
- An automated negotiation mechanism based on co-evolution and game theoryJen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Colin R. Reeves, Peter Smith. 63-67 [doi]
- Agent-based mobility add-in feature for Object Transaction Service (OTS)Hoang Pham Huy, Simone Sédillot. 68-75 [doi]
- Certificates for mobile code securityHock Kim Tan, Luc Moreau. 76-81 [doi]
- Blinded-key signatures: securing private keys embedded in mobile agentsLucas C. Ferreira, Ricardo Dahab. 82-86 [doi]
- Compiler optimizations for Java aglets in distributed data intensive applicationsAbhishek Singh, Santosh Pande. 87-92 [doi]
- A fault-tolerant directory service for mobile agents based on forwarding pointersLuc Moreau. 93-100 [doi]
- Agent factory: generative migration of mobile agents in heterogeneous environmentsFrances M. T. Brazier, Benno J. Overeinder, Maarten van Steen, Niek J. E. Wijngaards. 101-106 [doi]
- Our guest agents are welcome to your agent platformsLaurent Magnin, Viet Thang Pham, Arnaud Dury, Nicolas Besson, Arnaud Thiefaine. 107-114 [doi]
- Secure mobile agent systems using Java: where are we heading?Walter Binder, Volker Roth. 115-119 [doi]
- Editorial message: special track on applications of spatial simulation of discrete entitiesWilliam Maniatty, Boleslaw K. Szymanski. 120-121 [doi]
- A mobility and traffic generation framework for modeling and simulating ad hoc communication networksChristopher L. Barrett, Madhav V. Marathe, James P. Smith, S. S. Ravi. 122-126 [doi]
- Individual-based simulation of the clustering behaviour of epidermal growth factor receptorsJacki P. Goldman, William J. Gullick, Dennis Bray, Colin G. Johnson. 127-131 [doi]
- Statistical properties of the simulated time horizon in conservative parallel discrete-event simulationsG. Korniss, M. A. Novotny, A. K. Kolakowska, H. Guclu. 132-137 [doi]
- Scalable, efficient epidemiological simulationStephen Eubank. 139-145 [doi]
- Bioinformatics trackWarren T. Jones, Hasan M. Jamil. 146 [doi]
- NetAffx: affymetrix probeset annotationsGuoying Liu, Ann E. Loraine, Ron Shigeta, Melissa S. Cline, Jill Cheng, Stephen A. Chervi, David Kulp, Michael A. Siani-Rose. 147-150 [doi]
- A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c.Rhonda Harrison, Charles DeLisi. 151-158 [doi]
- An intelligent biological information management systemMathew J. Palakal, Snehasis Mukhopadhyay, Javed Mostafa. 159-163 [doi]
- Short inversions and conserved gene clustersDavid Sankoff. 164-167 [doi]
- BlOMIND-protein property prediction by property proximity profilesDeendayal Dinakarpandian, Vijay Kumar. 168-172 [doi]
- Optimal algorithms for local vertex quartet cleaningGianluca Della Vedova, Todd Wareham. 173-177 [doi]
- Slide Edge AlgorithmDuy Huynh. 178-183 [doi]
- Efficient derivative computations in neutron scattering via interface contractionH. Martin Bücker, Arno Rasch. 184-188 [doi]
- A procedure to model the frequency responseJ. Pleite, Emilio Olías, A. Barrado, A. Lázaro, J. Váquez. 189-193 [doi]
- Editorial Message: special track on computer securityGiampaolo Bella, Ronaldo Menezes, James A. Whittaker. 194-195 [doi]
- Authenticated multicast immune to denial-of-service attackShouhuai Xu, Ravi S. Sandhu. 196-200 [doi]
- Service specific anomaly detection for network intrusion detectionChristopher Krügel, Thomas Toth, Engin Kirda. 201-208 [doi]
- Learning temporal patterns for anomaly intrusion detectionAlexandr Seleznyov, Oleksiy Mazhelis. 209-213 [doi]
- Implementation of fast RSA key generation on smart cardsChenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel. 214-220 [doi]
- Grammar based off line generation of disposable credit card numbersAbhishek Singh, André L. M. dos Santos. 221-228 [doi]
- Checking security of Java bytecode by abstract interpretationRoberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco. 229-236 [doi]
- Security status display and browser interframe communicationLarry A. Dunning, Sub Ramakrishnan. 237-241 [doi]
- Neutralizing windows-based malicious mobile codeJames A. Whittaker, Andres De Vivanco. 242-246 [doi]
- Interactive simulation of security policiesGiampaolo Bella. 247-252 [doi]
- Collaborative attack modelingJan Steffan, Markus Schumacher. 253-259 [doi]
- Software security vulnerability testing in hostile environmentsHerbert H. Thompson, James A. Whittaker, Florence E. Mottay. 260-264 [doi]
- Proxy-based security protocols in networked mobile devicesMatt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest. 265-272 [doi]
- A conceptual framework for testing biometric algorithms within operating systems authenticationArslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch. 273-280 [doi]
- Experimenting with STA, a tool for automatic analysis of security protocolsMichele Boreale, Maria Grazia Buscemi. 281-285 [doi]
- Editorial message: special track on coordination models, languages and applicationsAndrea Omicini, Sascha Ossowski. 286-287 [doi]
- Monitoring and synchronization for teamwork in GPGPSherief Abdallah, Nevin M. Darwish, Osman Hegazy. 288-293 [doi]
- A multi-agent system architecture for coordination of just-in-time production and distributionPaul Davidsson, Fredrik Wernstedt. 294-299 [doi]
- Unstructured agent matchmaking: experiments in timing and fuzzy matchingElth Ogston, Stamatis Vassiliadis. 300-305 [doi]
- Semi-automatic design of agent organisationsAnthony Karageorgos, Simon G. Thompson, Nikolay Mehandjiev. 306-313 [doi]
- A comprehensive model for arbitrary result extractionNeal Sample, Dorothea Beringer, Gio Wiederhold. 314-321 [doi]
- A uniform meta-model for modeling integrated cooperationGuangxin Yang. 322-328 [doi]
- CovaTM: a transaction model for cooperative applicationsJinlei Jiang, Guangxin Yang, Yan Wu, Meilin Shi. 329-335 [doi]
- Coordination middleware for XML-centric applicationsPaolo Ciancarini, Robert Tolksdorf, Franco Zambonelli. 336-343 [doi]
- Towards scalability in tuple spacesPhilipp Obreiter, Guntram Gräf. 344-350 [doi]
- Formal verification of replication on a distributed data space architectureJozef Hooman, Jaco van de Pol. 351-358 [doi]
- On the serializability of transactions in shared dataspaces with temporary dataNadia Busi, Gianluigi Zavattaro. 359-366 [doi]
- Three approaches to the coordination of multiagent systemsFederico Bergenti, Alessandro Ricci. 367-372 [doi]
- An infrastructure language for open netsLorenzo Bettini, Michele Loreti, Rosario Pugliese. 373-377 [doi]
- An enablement detection algorithm for open multiparty interactionsJosé Antonio Pérez, Rafael Corchuelo, David Ruiz, Miguel Toro. 378-384 [doi]
- A modular approach to build structured event-based systemsLudger Fiege, Gero Mühl, Felix C. Gärtner. 385-392 [doi]
- Coordinating functional processes with Haskell::#::F. H. Carvalho, Ricardo Massa Ferreira Lima, Rafael Dueire Lins. 393-400 [doi]
- Database and digital library technologies: track chairs messageRamzi A. Haraty, Mohammad Zubair. 401 [doi]
- Temporal query operators in XML databasesKjetil Nørvåg. 402-406 [doi]
- Bulkloading and maintaining XML documentsAlbrecht Schmidt 0002, Martin L. Kersten. 407-412 [doi]
- Decision tree classification of spatial data streams using Peano Count TreesQiang Ding, Qin Ding, William Perrizo. 413-417 [doi]
- SESAM: searching supported by analysis of metadataJon Olav Hauglid, Roger Midtstraum. 418-425 [doi]
- The P-tree algebraQin Ding, Maleq Khan, Amalendu Roy, William Perrizo. 426-431 [doi]
- The syntactic and semantic correctness of pictorial configurations to query geographic databases by PQLFernando Ferri, Elaheh Pourabbas, Maurizio Rafanelli. 432-437 [doi]
- Shape-based retrieval of similar subsequences in time-series databasesSang-Wook Kim, Jeehee Yoon, Sanghyun Park, Tae Hoon Kim. 438-445 [doi]
- Extended data dependency approach: a robust way of rebuilding databaseBrajendra Panda, Kazi Asharful Haque. 446-452 [doi]
- Sharing scientific models in environmental applicationsMaria Cláudia Cavalcanti, Marta Mattoso, Maria Luiza Machado Campos, François Llirbat, Eric Simon. 453-457 [doi]
- Iterative querying in web-based database applicationsRamzi A. Haraty, Mazen Hamdoun. 458-462 [doi]
- Elicitation and conversion of hidden objects and restrictions in a database schemaLaura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine. 463-469 [doi]
- Topological mapping: a dimensionality reduction method for efficient video searchZaher Aghbari, Kunihiko Kaneko, Akifumi Makinouchi. 470-475 [doi]
- A method for the dynamic generation of virtual versions of evolving documentsM. Mercedes Martínez, Jean-Claude Derniame, Pablo de la Fuente. 476-482 [doi]
- DANA (Digital Archive Network for Anthropology): a model for digital archivingJeffrey T. Clark, Brian M. Slator, Aaron Bergstrom, Francis Larson, Richard Frovarp, James E. Landrum, William Perrizo, William Jockheck. 483-487 [doi]
- A geolibrary for multimedia data sets: design and implementation issuesCláudio de Souza Baptista. 488-492 [doi]
- DL-COTF: an XML based digital library for U. S. Navy s operational test and evaluation forceKurt Maly, Mohammad Zubair, S. Balusani, A. Mathur, S. Sudeep, W. Wolters. 493-497 [doi]
- Mining interesting regions using an evolutionary algorithmJosé Luis Álvarez Macías, Jacinto Mata Vázquez, José Cristóbal Riquelme Santos. 498-502 [doi]
- A new cell-based clustering method for large, high-dimensional data in data mining applicationsJae-Woo Chang, Du-Seok Jin. 503-507 [doi]
- A framework for data mining and KDDIngolf Geist. 508-513 [doi]
- Hyperrelations in version spaceHui Wang, Ivo Düntsch, Günther Gediga, Andrzej Skowron. 514-518 [doi]
- Editorial message: special track on electronic books for teaching and learningMonica Landoni, Ignacio Aedo. 519 [doi]
- Advanced modeling and browsing of technical documentsFrançois Bry, Michael Kraus. 520-524 [doi]
- From collective knowledge to e-booksRuth Cobos, Xavier Alamán. 525-529 [doi]
- The look and feel of an ebook: considerations in interface designRuth Wilson. 530-534 [doi]
- Development of a standard format for eBooksWon-Sung Sohn, Seung-Kyu Ko, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Hyuk Kim, Soon-Bum Lim. 535-540 [doi]
- Evolutionary computation and optimization track: SAC 2002Roger L. Wainwright, Günther R. Raidl. 541 [doi]
- Finding maximum independent sets in graphs arising from coding theorySergiy Butenko, Panos M. Pardalos, Ivan Sergienko, Vladimir Shylo, Petro Stetsyuk. 542-546 [doi]
- Initialization is robust in evolutionary algorithms that encode spanning trees as sets of edgesBryant A. Julstrom, Günther R. Raidl. 547-552 [doi]
- Co-evolving an effective fitness sample: experiments in symbolic regression and distributed robot controlBrad Dolin, Forrest H. Bennett III, Eleanor G. Rieffel. 553-559 [doi]
- Local search with annealing-like restarts to solve the vehicle routing problem with time windowsHaibing Li, Andrew Lim. 560-565 [doi]
- Acquisition of modulation pulses for a multi-robot system using genetic algorithmGeorge Nyauma Nyakoe, Makoto Ohki, Suichiro Tabuchi. 568-573 [doi]
- An agent based approach to site selection for wireless networksSteve Hurley, Roger M. Whitaker. 574-577 [doi]
- Using genetic programming for the induction of novice procedural programming solution algorithmsNelishia Pillay. 578-583 [doi]
- Learning the risk board game with classifier systemsAtila Neves, Osvaldo Brasão, Agostinho C. Rosa. 585-589 [doi]
- An evolutionary algorithm to discover numeric association rulesJacinto Mata Vázquez, José Luis Álvarez Macías, José Cristóbal Riquelme Santos. 590-594 [doi]
- Issues in parallelizing multiobjective evolutionary algorithms for real world applicationsDavid A. van Veldhuizen, Jesse B. Zydallis, Gary B. Lamont. 595-602 [doi]
- Particle swarm optimization method in multiobjective problemsKonstantinos E. Parsopoulos, Michael N. Vrahatis. 603-607 [doi]
- An evolutionary algorithm for reducing integrated-circuit test application timeFulvio Corno, Matteo Sonza Reorda, Giovanni Squillero. 608-612 [doi]
- Editorial message: special track on information access and retrieval systemsFabio Crestani, Gabriella Pasi. 613-614 [doi]
- Evaluating cost-sensitive Unsolicited Bulk Email categorizationJosé María Gómez Hidalgo. 615-620 [doi]
- Benefits of document maps for text access in knowledge management: a comparative studyAndreas Becks, Christian Seeling, Ralf Minkenberg. 621-626 [doi]
- Multiple related document summary and navigation using concept hierarchies for mobile clientsD. L. Chan, Robert W. P. Luk, W. K. Mak, Hong Va Leong, Edward Kei Shiu Ho, Qin Lu. 627-632 [doi]
- Mobile delivery of news using hierarchical query-biased summariesSimon O. Sweeney, Fabio Crestani, Anastasios Tombros. 634-639 [doi]
- Incremental adaptive filtering: profile learning and threshold calibrationMohand Boughanem, Mohamed Tmar. 640-644 [doi]
- Hierarchical presentation of expansion termsHideo Joho, Claire Coverson, Mark Sanderson, Micheline Hancock-Beaulieu. 645-649 [doi]
- Exploiting contextual change in context-aware retrievalPeter J. Brown, Gareth J. F. Jones. 650-656 [doi]
- Using genetic algorithms to find suboptimal retrieval expert combinationsHolger Billhardt, Daniel Borrajo, Victor Maojo. 657-662 [doi]
- Structured information retrieval in XML documentsEvangelos Kotsakis. 663-667 [doi]
- A structured documents retrieval method supporting attribute-based structure informationSeung-Kyu Ko, Yoon-Chul Choy. 668-674 [doi]
- Flexible querying of WEB documentsGloria Bordogna, Gabriella Pasi. 675-680 [doi]
- Reordering B-tree filesSatoshi Watanabe, Takao Miura. 681-686 [doi]
- Color-based image retrieval using binary signaturesMario A. Nascimento, Vishal Chitkara. 687-692 [doi]
- Color patterns for pictorial content descriptionDaniela Stan, Ishwar K. Sethi. 693-698 [doi]
- Information retrieval and spelling correction: an inquiry into lexical disambiguationPatrick Ruch. 699-703 [doi]
- Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systemsJohn E. Dobson, Cliff B. Jones, Rob Procter, Mark Rouncefield, Robin Williams. 704-705 [doi]
- Limits in modelling evolving computer-based systemsMassimo Felici, Juliana Küster Filipe. 706-710 [doi]
- Contradictions and critical issues during system evolutionMark-Alexander Sujan, Antonio Rizzo, Alberto Pasquini. 711-715 [doi]
- Modelling organisational practice in user requirementsCorin A. Gurr, Gillian Hardstone. 716-720 [doi]
- Fitting standard software to non-standard organisationsNeil Pollock, James Cornford. 721-725 [doi]
- Configuring software, reconfiguring memories: the influence of integrated systems on knowledge storage, retrieval and reuseLuciana D Adderio. 726-731 [doi]
- Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuseDenis Besnard, Anthony T. Lawrie. 732-738 [doi]
- Augmenting descriptive scenario analysis for improvements in human reliability designShamus P. Smith, Michael D. Harrison. 739-743 [doi]
- A task-based security model to facilitate collaboration in trusted multi-agency networksSalem Aljareh, B. Nick Rossiter. 744-749 [doi]
- A proxy-based adaptive flow control scheme for media streamingChung-Ming Huang, Tz-Heng Hsu, Chi-Kuang Chang. 750-754 [doi]
- Smoothed fetching: bridging the data layout and transmission schemes in multimedia serversSooyong Kang, Heon Young Yeom. 755-760 [doi]
- A mesh update requirement for hierarchical adaptive meshes in mesh-based motion trackingAlfred Yu, Wael M. Badawy. 761-765 [doi]
- Node splitting algorithms in tree-structured high-dimensional indexes for similarity searchYongjian Fu, Jui-Che Teng, S. R. Subramanya. 766-770 [doi]
- Approaches to comprehension-preserving graphical reduction of program visualizationsFernando Naharro-Berrocal, Cristóbal Pareja-Flores, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide. 771-777 [doi]
- Dynamic structuring of web information for access visualizationJess Y. S. Mak, Hong Va Leong, Alvin T. S. Chan. 778-784 [doi]
- Transparency for polygon based cloud renderingAndrzej Trembilski, Andreas Broßler. 785-790 [doi]
- Browsing image databases with Galois latticesJosé Martinez, Erwan Loisant. 791-795 [doi]
- An efficient implementation of parametric line and polygon clipping algorithmMingjun Zhang, Chaman L. Sabharwal. 796-800 [doi]
- Active electronic mailStamatis Karnouskos, Athanasios V. Vasilakos. 801-806 [doi]
- About possibilistic queries against possibilistic databasesPatrick Bosc, Laurence Duval, Olivier Pivert. 807-811 [doi]
- Hybridizing Hierarchical and Weighted Linguistic RulesRafael Alcalá, Jorge Casillas, Oscar Cordón, Francisco Herrera, Igor Zwir. 812-816 [doi]
- Analysis of Distributed Routing Balancing behaviorI. Garcés, D. Franco. 817-824 [doi]
- Communication delay in wormhole-routed torus networksAlireza Shahrabi, Mohamed Ould-Khaoua, Lewis M. Mackenzie. 825-829 [doi]
- Probability vectors: a new fault-tolerant routing algorithm for k-ary n-cubesJehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua. 830-834 [doi]
- A simple mathematical model of adaptive routing in wormhole k-ary n-cubesHamid Sarbazi-Azad, Mohamed Ould-Khaoua. 835-839 [doi]
- Towards a scalable broadcast in wormhole-switched mesh networksAhmed Yassin Al-Dubai, Mohamed Ould-Khaoua, Lewis M. Mackenzie. 840-844 [doi]
- Response order rearrangement on a caching proxy for reducing WWW latencyHiroshi Fujimoto, Tadashi Nakano, Kaname Harumoto, Shojiro Nishio. 845-851 [doi]
- AODV compatible routing with extensive use of cache information in ad-hoc networksWooi-Ghee Wang, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio. 852-859 [doi]
- Cycle embedding in faulty hierarchical cubic networksJung-Sheng Fu, Gen-Huey Chen. 860-864 [doi]
- Grid-enabled parallel divide-and-conquer: theory and practiceChun-Hsi Huang. 865-869 [doi]
- DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methodsEder N. Mathias, Celso M. da Costa, Fernando Luís Dotti, Felipe Martins Müller. 870-875 [doi]
- Automatic code generation for executing tiled nested loops onto parallel architecturesGeorgios I. Goumas, Maria Athanasaki, Nectarios Koziris. 876-881 [doi]
- HTTP redirection for replica catalogue lookups in data gridsHeinz Stockinger, Andrew Hanushevsky. 882-889 [doi]
- A parallel index for semistructured dataBrian F. Cooper, Neal Sample, Moshe Shadmon. 890-896 [doi]
- Dynamic memory allocation strategies for parallel query executionFranck Morvan, Abdelkader Hameurlain. 897-901 [doi]
- Load balancing for the management of service performance in open service markets: a customer-oriented approachDirk Thißen. 902-906 [doi]
- Performance analysis of MPI-I/O primitives on a PC clusterJuan Touriño, Jacobo Barro, Ramon Doallo, Víctor M. Gulías. 907-912 [doi]
- Performance evaluation for a compressed-VLIW processorSunghyun Jee, Kannappan Palaniappan. 913-917 [doi]
- A particle swarm model for swarm-based networked sensor systemsB. Anthony Kadrovach, Gary B. Lamont. 918-924 [doi]
- Editorial message: special track on the programming languages and object technologiesChang-Hyun Jo, Rajeev R. Raje. 925-926 [doi]
- Programming distributed systems with the delegation-based object-oriented language dSelfRobert Tolksdorf, Kai Knubben. 927-931 [doi]
- Automated conversion from requirements documentation to an object-oriented formal specification languageBeum-Seuk Lee, Barrett R. Bryant. 932-936 [doi]
- Automated assembly of software components based on XML-coded instructionsIan Nunn, Dwight Deugo. 937-942 [doi]
- Experimental aspect-oriented language - AspectCOOLEnis Avdicausevic, Marjan Mernik, Mitja Lenic, Viljem Zumer. 943-947 [doi]
- On optimal temporal locality of stencil codesClaudia Leopold. 948-952
- Evaluating the use of profiling by a region-based register allocatorKameswari V. Garigipati, Cindy Norris. 953-957 [doi]
- Concurrency control for distributed cooperative engineering applicationsJoão Coelho Garcia, Paulo Ferreira. 958-963 [doi]
- Verification caching: towards efficient and secure mobile code execution environmentsNael B. Abu-Ghazaleh, Dhananjay S. Phatak. 964-968 [doi]
- ACM SAC2002 software engineering: theory and applications (SETA) track descriptionDavid C. Rine, James F. Power, J. Paul Gibson. 969-970 [doi]
- Reusable subsystems: domain-based approachHisham Haddad, Herbert Tesser. 971-975 [doi]
- Using an object oriented model for resolving representational differences between heterogeneous systemsPaul Young, Valdis Berzins, Jun Ge, Luqi. 976-983 [doi]
- Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and eventsAssem El-Ansary. 984-991 [doi]
- Evaluating collaborative software in supporting organizational learning with Bayesian NetworksMahmoud O. Elish, David C. Rine, Joel E. Foreman. 992-996 [doi]
- A method for assessing the reusability of object-oriented code using a validated set of automated measurementsFatma Dandashi. 997-1003 [doi]
- Proxy Viewpoints Model-based Requirements engineeringSeok-Won Lee. 1004-1008 [doi]
- A UML statecharts semantics with message-passingJan Jürjens. 1009-1013 [doi]
- An approach to integrating semi-formal and formal notations in software specificationSergiu Dascalu, Peter Hitchcock. 1014-1020 [doi]
- Using XML to implement abstraction for Model CheckingMaría-del-Mar Gallardo, Jesús Martínez, Pedro Merino, Estefanía Rosales. 1021-1025 [doi]
- Using UMLsec and goal trees for secure systems developmentJan Jürjens. 1026-1030 [doi]
- Investigating software measures to improve product reliabilityDerek Lawson, Gerry Coleman. 1031-1035 [doi]
- Strategies for personal process improvement a comparisonRory O Connor, Gerry Coleman. 1036-1040 [doi]
- Editorial message: special track on standardisation in ITKai Jakobs. 1041-1042 [doi]
- Inter-organizational document exchange: facing the conversion problem with XMLLuis Martín Díaz, Erik Wüstner, Peter Buxmann. 1043-1047 [doi]
- Standardising the business vocabulary of standardsEva Söderström. 1048-1052 [doi]
- Cathedrals, libraries and bazaarsKen Krechmer. 1053-1057 [doi]
- Editorial message: special track on virtual reality, digital media, and computer gamesDaniel Ballin, Ruth Aylett, Marc Cavazza. 1058-1059 [doi]
- NiceMeetVR: facing professional baseball pitchers in the virtual batting cageTaku Komura, Atsushi Kuroda, Yoshihisa Shinagawa. 1060-1065 [doi]
- The structuring of a wireless internet application for a music-on-demand service on UMST devicesMarco Roccetti, Vittorio Ghini, Paola Salomoni, Alessandro Gambetti, Davide Melandri, Mirko Piaggesi, Daniela Salsi. 1066-1073 [doi]
- Viewpoint motion control by body position in immersive projection displayKikuo Asai, Noritaka Osawa, Yuji Y. Sugimoto, Yoshiaki Tanaka. 1074-1079 [doi]
- Emergent situations in interactive storytellingMarc Cavazza, Fred Charles, Steven J. Mead. 1080-1085 [doi]
- Editorial message: special track on web and E-business applicationsSara Comai, Letizia Tanca. 1086-1087 [doi]
- An authorization model for temporal XML documentsSabrina De Capitani di Vimercati. 1088-1093 [doi]
- A Java based XML browser for consumer devicesPetri Vuorimaa, Teemu Ropponen, Niklas von Knorring, Mikko Honkala. 1094-1099 [doi]
- Migrating data-intensive web sites into the Semantic WebLjiljana Stojanovic, Nenad Stojanovic, Raphael Volz. 1100-1107 [doi]
- Wrapping-oriented classification of web pagesValter Crescenzi, Giansalvatore Mecca, Paolo Merialdo. 1108-1112 [doi]
- Dynamically generating web application fragments from page templatesUwe Zdun. 1113-1120 [doi]
- A framework for automatic generation of web-based data entry applications based on XMLVolker Turau. 1121-1126 [doi]
- A cost-oriented methodology for the design of web based IT architecturesDanilo Ardagna, Chiara Francalanci. 1127-1133 [doi]
- Content management on server farm with layer-7 routingMon-Yen Luo, Chu-Sing Yang, Chun-Wei Tseng. 1134-1139 [doi]
- User adaptive content delivery mechanism on the world wide webTadashi Nakano, Kaname Harumoto, Shinji Shimojo, Shojiro Nishio. 1140-1146 [doi]
- Optimizing relational store for e-catalog queries: a data mining approachMin Wang, Xiaoyang Sean Wang. 1147-1152 [doi]
- Application run time estimation: a quality of service metric for web-based data mining servicesShonali Krishnaswamy, Seng Wai Loke, Arkady B. Zaslavsky. 1153-1159 [doi]
- An agreement centric access control mechanism for business to business e-commerceVictoria Ungureanu. 1160-1164 [doi]