Journal: J. UCS

Volume 12, Issue 9

1085 -- 1086Attila Pethõ, Dezsö Sima. Informatics in Higher Education
1087 -- 1103Ágnes Achs. Creation and Evaluation of Fuzzy Knowledge-base
1104 -- 1117Attila Adamkó. UML-Based Modeling of Data-oriented WEB Applications
1118 -- 1127Peter Antal, Norbert Bátfai, Istvá Fazekas, Péter Jeszenszky. The mobiDÁIK Educational Portal
1128 -- 1138Balázs Benyó, Miklós F. Hatwágner, Tamás Heckenast, Katalin Kovács, Ágnes Varga, Norbert Varjasi. Design and Implementation of Enum-Based Services
1139 -- 1153Tamás Bréczes, János Sztrik. Performance Modeling of Proxy Cache Servers
1154 -- 1164József Berke, Zsolt Polgár, Zoltán Horváth, Tamás Nagy. Developing on Exact Quality and Classification System for Plant Improvement
1165 -- 1176Antal Buza. Extension of CQL over Dynamic Databases
1177 -- 1189Miklós Espák. Japlo: Rule-based Programming on Java
1190 -- 1195Maria Fazekas. Analysing Data of Childhood Acute Lymphoid Leukaemia by Seasonal Time Series Methods
1196 -- 1207Nándor Fodor. 4M - Software for Modelling and Analysing Cropping Systems
1208 -- 1214Pawel Gocek, Michael Hartmann, Heinz Schleusener. Modern Technologies in Client-Server Architecture for Geo-based Interactive Web Portals
1215 -- 1228János Gonda. The Number of the Modulo n Roots of the Polynomial x:::v::: - x:::v::: and the RSA
1229 -- 1239András Hajdu, János Kormos, Zsolt Lencse, Lajos Trón, Miklós Emri. The MEDIP-Platform Independent Software System for Medical Image Processing Project
1240 -- 1253András Hajdu, János Kormos, Tamás Tóth, Kristian Vereb. Applications of Neighborhood Sequence in Image Processing and Database Retrieval
1254 -- 1266László Horváth, Imre J. Rudas. Course Modeling for Student Profile Based Flexible Higher Education on the Internet
1267 -- 1277István Koós. Mathematical Models of Endocrine Systems
1278 -- 1291Ildikó László, Ferenc Schipp, Samuel P. Kozaitis. Construction of Wavelets and Applications
1292 -- 1311Tamás Lukovszki, Christian Schindelhauer, Klaus Volbert. Resource Efficient Maintenance of Wireless Network Topologies
1312 -- 1331Benedek Nagy, László Szegedi. Membrane Computing and Graphical Operating Systems
1332 -- 1344Ferenc Nagy. Parameter Estimation of the Cauchy Distribution in Information Theory Approach
1345 -- 1357Péter Nagy, Istvan Pintér, Mihály Bagány. Phasetransition-like Changes in Human Visual Information Processing
1358 -- 1372Robert Sinka. Primary School Teachers in the Information Society
1373 -- 1384Péter Takács. The Additional Examination of the Kudo-Mathuria Time-Release Protocol
1385 -- 1392József Tick, Zoltán Kovacs, Ferenc Friedler. Synthesis of Optimal Workflow Structure
1393 -- 1404T. Tóth, Ferenc Erdélyi. Systems Engineering: A New Approach to Complex IT-based Technological Systems in Engineering Education
1405 -- 1410Katalin Pásztor-Varga, Magda Várterész. Computer Science, Logic, Informatics Education

Volume 12, Issue 8

980 -- 0Hermann A. Maurer. Managing Editor's Column
981 -- 1006Wan Fokkink, Jun Pang. Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
1007 -- 1019Angela French, José Nelson Amaral. Eliminating Redundant Join-Set Computations in Static Single Assignment
1020 -- 1049Manuel A. Martins. Behavioral Institutions and Refinements in Generalized Hidden Logics
1050 -- 1084Hermann A. Maurer, Frank Kappe, Bilal Zaka. Plagiarism - A Survey

Volume 12, Issue 7

762 -- 762Mariza Andrade da Silva Bigonha, Alex de Vasconcellos Garcia. Selected Papers from SBLP 2006: The 10th Brazilian Symposium on Programming Languages
764 -- 787Anderson Faustino da Silva, Vítor Santos Costa. The Design of the YAP Compiler: An Optimizing Compiler for Logic Programming Languages
788 -- 810Anderson Faustino da Silva, Vítor Santos Costa. Our Experiences with Optimizations in Sun's Java Just-In-Time Compilers
811 -- 827Eduardo Kessler Piveta, Marcelo Hecht, Marcelo Soares Pimenta, Roberto Tom Price. Detecting Bad Smells in AspectJ
828 -- 848Nuno F. Rodrigues, Luís Soares Barbosa. Program Slicing by Calculation
849 -- 867Markus Schordan. The Language of the Visitor Design Pattern
868 -- 884André Rauber Du Bois, Philip W. Trinder, Hans-Wolfgang Loidl. Strong Mobility in Mobile Haskell
885 -- 902Alcides Calsavara, Aaron Borges, Leonardo Nunes, Diogo Variani, Carlos Kolb. An Object Model for Interoperable Systems
903 -- 921Martin A. Musicante, Edinardo Potrich. Expressing Workflow Patterns for Web Services: The Case of PEWS
922 -- 937Paula R. Ribeiro, Marco Antonio Barbosa, Luís Soares Barbosa. Generic Process Algebra: A Programming Challenge
938 -- 957Rodrigo Machado, Alvaro Freitas Moreira, Renata de Matos Galante, Mirella Moura Moro. Type-safe Versioned Object Query Language
958 -- 979Júlio Henrique Araújo Pereira Machado, Paulo Blauth Menezes. Defining Atomic Composition in UML Behavioral Diagrams

Volume 12, Issue 6

579 -- 580Jörg Rothe, Hiroki Arimura. Computational Challenges of Massive Data Sets and Randomness in Computation (J.UCS Special Issue on the First and Second Japanese-German Frontiers of Science Symposia)
581 -- 607Benjamin Blankertz, Guido Dornhege, Steven Lemm, Matthias Krauledat, Gabriel Curio, Klaus-Robert Müller. The Berlin Brain-Computer Interface: Machine Learning Based Detection of User Specific Brain States
608 -- 626Kazuyuki Nakamura, Tomoyuki Higuchi, Naoki Hirose. Sequential Data Assimilation: Information Fusion of a Numerical Simulation and Large Scale Observation Data
627 -- 653Einoshin Suzuki. Data Mining Methods for Discovering Interesting Exceptions from an Unsupervised Table
654 -- 671Johannes Blömer. Randomness and Secrecy - A Brief Introduction
672 -- 690Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, Takuji Nishimura. Pseudorandom Number Generation: Impossibility and Compromise
691 -- 709Akinori Kawachi, Takeshi Koshiba. Progress in Quantum Computational Cryptography
710 -- 724Beate Bollig. Testing Membership in Formal Languages Implicitly Represented by Boolean Functions
725 -- 745Tobias Riege, Jörg Rothe. Improving Deterministic and Randomized Exponential-Time Algorithms for the Satisfiability, the Colorability, and the Domatic Number Problem
746 -- 761Harald Hempel. Randomized Algorithms and Complexity Theory

Volume 12, Issue 5

481 -- 0Hermann A. Maurer. Managing Editor's Column
482 -- 498Doron Drusinsky. On-line Monitoring of Metric Temporal Logic with Time-Series Constraints Using Alternating Finite Automata
499 -- 511Luis Antonio Brasil Kowada, Renato Portugal, Celina M. Herrera de Figueiredo. Reversible Karatsuba's Algorithm
512 -- 550Maurice Margenstern. About an Algorithmic Approach to Tilings {p, q} of the Hyperbolic Plane
551 -- 578Tobias Riege, Jörg Rothe. Completeness in the Boolean Hierarchy: Exact-Four-Colorability, Minimal Graph Uncolorability, and Exact Domatic Number Problems - a Survey

Volume 12, Issue 4

367 -- 369Nadia Nedjah, Luiza de Macedo Mourelle. Evolvable Hardware
370 -- 394Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi. A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip
395 -- 407Nadia Nedjah, Luiza de Macedo Mourelle. Pareto-Optimal Hardware for Substitution Boxes
408 -- 431Ajith Abraham, Crina Grosan. Automatic Programming Methodologies for Electronic Hardware Fault Monitoring
432 -- 449Tonio Biondi, Angelo Ciccazzo, Vincenzo Cutello, Santo D Antona, Giuseppe Nicosia, Salvatore Spinella. Multi-Objective Evolutionary Algorithms and Pattern Search Methods for Circuit Design Problems
450 -- 480Fernando Ciriaco, Taufik Abrão, Paul Jean Etienne Jeszensky. DS/CDMA Multiuser Detection with Evolutionary Algorithms

Volume 12, Issue 3

233 -- 235José Bravo, Xavier Alamán, Teresa Riesgo. Ubiquitous Computing and Ambient Intelligence: New Challenges for Computing
236 -- 251Lidia Fuentes, Daniel Jiménez, Mónica Pinto. Development of Ambient Intelligence Applications using Components and Aspects
252 -- 269Monica Tentori, Jesús Favela, Víctor M. González. Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications
270 -- 283José Bravo, Ramón Hervás, Inocente Sánchez, Gabriel Chavira, Salvador W. Nava. Visualization Services in a Conference Context: An Approach by RFID Technology
284 -- 296Pablo A. Haya, Germán Montoro, Abraham Esquivel, Manuel García-Herranz, Xavier Alamán. A Mechanism for Solving Conflicts in Ambient Intelligent Environments
297 -- 314Diego López-de-Ipiña, Juan Ignacio Vázquez, Daniel García, Javier Fernández, Iván García, David Sainz, Aitor Almeida. EMI:::2:::lets: A Reflective Framework for Enabling AmI
315 -- 317Felix Jesús Villanueva, David Villa, Francisco Moya, Jesús Barba, Fernando Rincón, Juan Carlos López. Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments
328 -- 339Jorge Portilla, Angel de Castro, Eduardo de la Torre, Teresa Riesgo. A Modular Architecture for Nodes in Wireless Sensor Networks
340 -- 0Celeste Campo, Florina Almenárez Mendoza, Daniel Díaz Sánchez, Carlos García-Rubio, Andrés Marín López. Secure Service Discovery based on Trust Management for ad-hoc Networks
357 -- 366Ignacio Nieto-Carvajal, Juan A. Botía Blaya, Antonio F. Gómez-Skarmeta. Information and Hybrid Architecture Model of the OCP Contextual Information Management System

Volume 12, Issue 2

126 -- 0Hermann A. Maurer. Managing Editor s Column
127 -- 139A. Almonayyes. Multiple Explanations Driven Naïve Bayes Classifier
140 -- 159Pranay Chaudhuri, Thomas Edward. An O(vn) Distributed Mutual Exclusion Algorithm Using Queue Migration
160 -- 186Ping-Yu Hsu, Ping-Ho Ting. POCA : A User Distributions Algorithm in Enterprise Systems with Clustering
187 -- 213Josef Kolbitsch, Hermann A. Maurer. The Transformation of the Web: How Emerging Communities Shape the Information we Consume
214 -- 232Belhassen Zouari. A Structure Causality Relation for Liveness Characterisation in Petri Nets

Volume 12, Issue 12

1700 -- 0Hermann A. Maurer. Managing Editor's Column
1701 -- 1730César Domínguez, Julio Rubio, Francis Sergeraert. Modeling Inheritance as Coercion in the Kenzo System
1731 -- 1740Narayanan Kulathuramaiyer, Wolf-Tilo Balke. Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
1741 -- 1782Pascal Poizat, Jean-Claude Royer. A Formal Architectural Description Language based on Symbolic Transition Systems and Temporal Logic
1783 -- 1796Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza. Persian/Arabic Baffletext CAPTCHA

Volume 12, Issue 11

1464 -- 1465Francisco Javier López-Fraguas. Programming and Languages
1466 -- 1499Antonio J. Fernández, Patricia M. Hill. An Interval Constraint Branching Scheme for Lattice Domains
1500 -- 1520Maryam Bavarian, Verónica Dahl. Constraint Based Methods for Biological Sequence Analysis
1521 -- 1550David de Frutos-Escrig, Carlos Gregorio-Rodríguez. Process Equivalences as Global Bisimulations
1551 -- 1573María Alpuente, María-del-Mar Gallardo, Ernesto Pimentel, Alicia Villanueva. Verifying Real-Time Properties of tccp Programs
1574 -- 1593Jaime Sánchez-Hernández. Constructive Failure in Functional-Logic Programming: From Theory to Implementation
1594 -- 1617José Miguel Cleva, Isabel Pita. Verification of CRWL Programs with Rewriting Logic
1618 -- 1650Manuel Clavel, Miguel Palomino, Adrián Riesco. Introducing the ITP Tool: a Tutorial
1651 -- 1678Jesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Francisco J. Enciso-Baños. Magic Sets for the XPath Language
1679 -- 1699Pascual Julián, Ginés Moreno, Jaime Penabad. Operational/Interpretive Unfolding of Multi-adjoint Logic Programs

Volume 12, Issue 10

1411 -- 1412Hermann A. Maurer. Managing Editor's Column
1413 -- 1425Narjes Berregeb. Proving Properties for Behavioural Specifications with Term Observation
1426 -- 1438Li-min Liu, Tian-Shyr Dai. Ridge Orientation Estimation and Verification Algorithm for Fingerprint Enhancement
1439 -- 1454Rajasvaran Logeswaran. Fault Tolerant Neural Predictors for Compression of Sensor Telemetry Data
1455 -- 1463Remco Loos. Time-varying H Systems Revisited

Volume 12, Issue 1

1 -- 5Juan Carlos Augusto, Norman D. Black, H. Gerry McAllister, Paul J. McCullagh, Chris D. Nugent. Pervasive Health Management: New Challenges for Health Informatics
6 -- 14Jean Roberts. Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues
15 -- 29Diane J. Cook. Health Monitoring and Assistance to Support Aging in Place
30 -- 44Haiying Zhou, Kun Mean Hou, Laurent Gineste, Christophe De Vaulx, Jean Ponsonnaille. A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring
45 -- 58Timothy O Sullivan, John O Donoghue, John Herbert, Richard Studdert. CAMMD: Context-Aware Mobile Medical Devices
59 -- 79Anthony P. Glascock, David M. Kutzik. The Impact of Behavioral Monitoring Technology on the Provision of Health Care in the Home
80 -- 98Adel Taweel, Alan L. Rector, Jeremy Rogers. A Collaborative Biomedical Research System
99 -- 114Zhenjiang Miao, Baozong Yuan, Mengsun Yu. A Pervasive Multimodal Tele-Home Healthcare System
115 -- 125Chi-Chan Chang, Chuen-Sheng Cheng, Yeu-Shiang Huang. A Web-Based Decision Support System for Chronic Diseases