Abstract is missing.
- Reasoning about Safety during Software Architecture DesignTacksoo Im, Soujanya Vullam, John D. McGregor. 1-8
- A Change Impact Analysis Process for Distributed Software Architecture EvolutionLaurent Deruelle, Mohamed Oussama Hassan, Henri Basson. 9-14
- Locating Defects in Software Architectures Through DebuggingKyungsoo Im, John D. McGregor. 15-20
- An Optimum Selection of Enterprise Service Bus for DODAF Based Defense SystemsAbdullah S. Alghamdi. 21-26
- Toward the Definition of a Many-to-Many Service Discovery ApproachAnthony A. Hock-koon, Mourad Oussalah. 27-32
- Metamodeling User Interfaces and Services for Composition ConsiderationsAudrey Occello, Cédric Joffroy, Anne-Marie Pinna-Dery, Philippe Renevier, Michel Riveill. 33-38
- Managing API Evolution for Open Software PlatformsHyun Cho, Eunyoung Kim, Jeffrey G. Gray. 39-44
- Maximizing GUI Test Coverage Through Particle Swarm OptimizationAbdul Rauf, Naveed Kazim, Sajid Anwar, Shafiq-Ur Rehman, Arshad Ali Shahid. 51-56
- On Software Test Estimate and Requirement TrackingJing-Chiou Liou. 57-62
- An Object Oriented Programming Platform for Ontology Based KMSBaisakhi Chakraborty, Ranjan Kumar Maji, D. Ghosh. 63-68
- A New Approach on Priority Queue based Scheduling with Handoff Management for Mobile NetworksP. K. Guha Thakurta, Souvik Sonar, Biswajit Bhowmik, Swapan Bhattacharya, Subhansu Bandyopadhyay. 69-74
- A Framework of Network Forensics System Based on IXP2850Jin Zhang, Roger Lee. 75-80
- Towards Integrating Role Playing Game Constructs in Real-Time Strategy GamesBrad Towle, Monica N. Nicolescu, Sergiu Dascalu. 81-88
- Favorite Goal in Agent Based Modeling and SimulationSharad Sharma. 89-93
- Automating Web Data Model: Conceptual Design to Logical RepresentationAbhijit Sanyal, Anirban Sarkar, Sankhayan Choudhury, P. K. Guha Thakurta. 94-99
- CBR Applications in Service OrganizationBaisakhi Chakraborty, D. Ghosh. 100-104
- Algorithmic Design and Implementation for Constructing Graphs of Circuits with Minimal Crossing NumbersMatthew Wolfe, Bryan McCauley, Joyati C. Debnath. 105-110
- The iPhone Teaching Companion: A Smartphone Application for EducationTsvetan A. Komarov, Sergiu Dascalu. 111-116
- Including Non-functional Requirements in the Invocation of Applications from the Workflow Engine using Web ServicesNarayan C. Debnath, Paola Martellotto, Marcela Daniele, Daniel Riesco, German Montejano. 117-120
- A Nonfunctional Requirement Tradeoff Analysis Approach for Reusable SPLE ArtifactsLirong Dai. 121-126
- Knowledge Maps - Fundamentally Modular Approach to Software Architecture, Design, Development and DeploymentMohamed E. Fayad, Huáscar A. áanchez, Shivanshu K. Singh. 127-133
- Reusing Evolution Practices onto Object-Oriented Designs: an Experiment with Evolution StylesOlivier Le Goaer, Mourad Oussalah, Dalila Tamzalit. 134-139
- Reliability Analysis of Climate Change Data Portals for NevadaDavid J. Walker, Shahram Latifi. 140-145
- Context-aware Framework for Rural Living LabsOlfa Mabrouki, Yacine Amirat, Abdelghani Chibani, Monica V. Fernandez, Mariano N. de la Cruz. 146-151
- Designing Services and Systems for Safety of Elderly People at Home: An Ongoing Empirical StudyJukka Ojasalo, Rob Moonen, Niko Suomalainen, Heikki Seppälä. 152-158
- Helping Students Learn Expert Software Design StrategiesDavid R. Wright. 159-164
- The Arabic Tutor - An Intelligent web based Language Tutoring System for Teaching ArabicDina Salah, Amir Zeid. 165-169
- A Replication Study of SPI Success Factors for Small to Medium Sized Web CompaniesMuhammad Sulayman, Emilia Mendes. 170-175
- Maintainability Prediction for Database-driven Software Applications - Preliminary Results from Interviews with Software ProfessionalsMehwish Riaz, Emilia Mendes, Ewan D. Tempero. 176-181
- Planning Techniques for Re-Engineering the Legacy System with ComponentsJeong Ah Kim. 182-185
- Measuring the Size of Business Sector and Business SoftwareAlen Jakupovic, Mile Pavlic, Damir Simunovic. 186-189
- Specifying Components with Compositional Patterns, LOTOS and Design By ContractAbdelhafid Zitouni, Mahmoud Boufaïda, Lionel Seinturier. 190-195
- Towards a Model for Dealing with Aspect Interactions at Requirement PhaseAmel Boubendir, Allaoua Chaoui. 196-202
- Applying Enhanced Graph Clustering to Software Dependency AnalysisTolga Ovatman, Feza Buzluca, Thomas Weigert. 210-216
- Using Delta-Federations for On-Demand Crisis Situation ResponseRobert Baird, Rose F. Gamble. 217-223
- Achieving Self-Optimization via Utility FunctionsDebzani Deb. 224-229
- Security Controls Applied to Web Service ArchitecturesRobert Baird, Rose F. Gamble. 230-236
- BigCube: A Metamodel for Managing Multidimensional DataGanesh Viswanathan, Markus Schneider. 237-242
- Top-Down Approach on Concurrent Access to the B-Link TreeEdward T. Hammerand, Hung-Chi Su. 243-248
- Methods on Identifying Data Anomalies in a Normalized DatabaseTennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi, Sean Shuangquan Liu, Jon Cirella. 249-254
- Comparison of SQL Injection Detection and Prevention Tools based on Attack Type and Deployment RequirementsAtefeh Tajpour, Maslin Masrom, Mohammad JorJor Zadeh Shooshtari, Hossein Rouhani Zeidanloo. 255-260
- Unsupervised Identity Application Fraud Detection using Rule-based Decision TreeAmany Abdelhalim, Issa Traoré. 261-268
- Using Metrics to Quantify Similarity in Source Code: An Empirical Study Using VOCSJeremy Iverson, James Schnepf, Imad Rahal. 269-274
- A Web-based Interactive Data Visualization System for Outlier Subspace AnalysisDong Liu, Qigang Gao, Hai H. Wang, Ji Zhang. 275-280
- Mining Redundant Industrial Alarm Occurrences with Association Rules Extraction and Complex Networks ModelingLeandro Pfleger de Aguiar, Virgílio A. F. Almeida, Wagner Meira Jr.. 281-288
- Improving Start Codon Prediction Accuracy Using Naive Bayesian ClassificationSean R. Landman, Imad Rahal. 289-294
- A Novel Combinatorial Score for Feature Selection with P-Tree in DNA Microarray Data AnalysisYan Wang, Tingda Lu, William Perrizo. 295-300
- A Case Study in Clinical Data Management for Cancer ProteomicsKetaki Shirke, John A. Springer, Erik S. Gough, Ali Roumani, Catherine P. Riley, Charles R. Buck. 301-306
- Metadata Services for Distributed Event Stream Processing AgentsMahesh B. Chaudhari, Suzanne W. Dietrich. 307-312
- Ontology-based Intelligent Network-Forensics InvestigationSherif Saad, Issa Traoré. 313-319
- A Recycle-Based Strategy to Modernize Data-Intensive Enterprise Applications for Multi-TenancyOliver Schiller, Alexander Moosbrugger, Bernhard Mitschang. 320-325
- Exploiting Schema Information for Efficient Streaming QueriesDónall McCann, Paolo Cappellari, Mark Roantree. 326-331
- Spectral Information Guided Complexity Evaluation for Video Codec DesignJigisha N. Patel, Suparva S. Patnaik, Vaibhavi P. Lineswala. 332-336
- A Novel Approaoch based on Optical Flor for Moving Object DetectionAmisha J. Shah, Suprava Patnaik, Jigisha N. Patel. 337-342
- A Hierarchical Case-Based Computer-Assisted Process-Planning SystemChi-Chun Hsu, Huan-Yu Lin, Jun-Ming Su, Shian-Shyong Tseng, Chung-Chao Ku, Jui-Pin Tsai, Fengming M. Chang. 343-348
- Lab Norm: Automated Clinical Lab Data NormalizationRob Wynden, Donna L. Hudson. 349-354
- Predicting Human Hepatic Clearance Using Hypernet Neural NetworksShahab Sheikh-Bahaei, Kamran A. Ali, Sabina R. Bera, C. Anthony Hunt. 355-359
- A Comparison of Classification Methods for Predicting OsteoporosisKarla Lindquist, Mark D. Danese. 360-365
- Hadoop and MapReduce for Storage and Processing of Physiological DataAndrew V. Nguyen, Donna L. Hudson, Maurice E. Cohen. 366-369
- An Agent-based System Model to Support Cardiac Tissue Engineering: Preliminary ResultsLaura Gaetano, Giacomo Di Benedetto, Umberto Morbiducci, Franco M. Montevecchi, C. Anthony Hunt. 370-374