Journal: J. UCS

Volume 15, Issue 9

1744 -- 1745Jianming Yong, Weiming Shen, José A. Pino. CSCWD Technologies, Applications and Challenges
1746 -- 1765Sven Tackenberg, Bernhard Kausch, Sönke Duckwitz, Christopher M. Schlick, Selvinaz Karahancer. Organizational Simulation of Complex Process Engineering Projects in the Chemical Industry
1766 -- 1781Yunjiao Xue, Chun Wang, Hamada Ghenniwa, Weiming Shen. A Tree Similarity Measuring Method and its Application to Ontology Comparison
1782 -- 1798Lili Sun, Hua Wang, Jianming Yong. Authorization Algorithms for Permission-Role Assignments
1797 -- 1811Junzhou Luo, Xiaogang Wang, Ming Yang. A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme
1812 -- 1832Sergio F. Ochoa, José A. Pino, Fabian Poblete. Estimating Software Projects Based On Negotiation
1833 -- 1851Nelson Baloian, Gustavo Zurita. MC-Supporter: Flexible Mobile Computing Supporting Learning though Social Interactions
1852 -- 1870Kelvin Leong, Junco Li, Stephen Chi-fai Chan, Vincent T. Y. Ng. An Application of the Dynamic Pattern Analysis Framework to the Analysis of Spatial-Temporal Crime Relationships
1871 -- 1885Nazaraf Shah, Rahat Iqbal, Kashif Iqbal, Anne E. James. A QoS Perspective on Exception Diagnosis in Service-Oriented Computing
1886 -- 1906Claudia C. P. Cruz, Claudia Lage Rebello da Motta, Flávia Maria Santoro, Marcos Elia. Applying Reputation Mechanisms in Communities of Practice: A Case Study
1907 -- 1923Weidong Li, Liang Gao, Xinyu Li. Application of Intelligent Strategies for Cooperative Manufacturing Planning
1924 -- 1944Yong Xiang, Shaohua Zhang, Yuzhu Shen, Meilin Shi. Pattern-Oriented Workflow Generation and Optimization
1945 -- 1969Rita Suzana Pitangueira Maciel, José Maria N. David, Michel Ridwan Oei, Adriano Augusto de Oliveira Bastos, Leandro de Oliveira Menezes. Supporting Awareness in Groupware through an Aspect-Oriented Middleware Service
1970 -- 1990Po-Huan Chiu, Chi-Chun Lo, Kuo-Ming Chao. Integrating Semantic Web and Object-Oriented Programming for Cooperative Design
1991 -- 2010Emerson Cabrera Paraiso, Cesar Augusto Tacla. Using Embodied Conversational Assistants to Interface Users with Multi-Agent Based CSCW Applications: The WebAnima Agent
2011 -- 2025Ting Peng, Qinghua Zheng, Yinli Jin. Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming

Volume 15, Issue 8

1562 -- 0Hermann A. Maurer. Managing Editor s Column
1563 -- 1588Joaquín Entrialgo, Javier García, José Luis Díaz, Daniel F. García. Tools and Stochastic Metrics for Debugging Temporal Behaviour of Real-Time Systems
1589 -- 1606Junseok Hwang, Youngjin Lee, Seung-Hyun Kim. Modelling Weblog Success: Case of Korea
1607 -- 1641Emilio Soler, Juan Trujillo, Carlos Blanco, Eduardo Fernández-Medina. Designing Secure Data Warehouses by Using MDA and QVT
1642 -- 1658Matti Tedre. Computing as Engineering
1659 -- 1684Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang. Certificate-based Signatures Revisited
1685 -- 1710Dengya Zhu, Heinz Dreher. Discovering Semantic Aspects of Socially Constructed Knowledge Hierarchy to Boost the Relevance of Web Searching
1711 -- 1721Lutz Maicher, Benjamin Bock. ActiveTM - The Factory for Domain-customised Portal Engines
1722 -- 1734Steffen Lohmann, Jörg Niesenhaus, Philipp Heim, Jürgen Ziegler. Fostering Knowledge Flow and Community Engagement in the Development of Interactive Entertainment
1735 -- 1743Ulrica Pettersson. Success and Failure Factors for KM: The Utilization of Knowledge in the Swedish Armed Forces

Volume 15, Issue 7

1423 -- 1426J. Ángel Velázquez-Iturbide, Francisco José García Peñalvo. Computers in Education: Advances in Software Technology
1427 -- 1439Claudio Dondi. Innovation and Quality in e-Learning: a European Perspective
1440 -- 1454Paloma Díaz, Esther Guerra, Telmo Zarraonandia, Ignacio Aedo, Carmen Luisa Padrón. A Meta-modeling based Approach for the Multi-Disciplinary Design of Web Educational Systems
1455 -- 1471Patrícia Castanheira Dinis Duarte Silva, Alberto Rodrigues da Silva. Application Scenarios for the Learning Objects Pool
1472 -- 1485Francisco Jurado, Ana I. Molina, Miguel A. Redondo, Manuel Ortega, Adam Giemza, Lars Bollen, Heinz Ulrich Hoppe. Learning to Program with COALA, a Distributed Computer Assisted Environment
1486 -- 1495Fernando A. Mikic, Juan C. Burguillo-Rial, Martín Llamas Nistal. TQ-Bot: An AIML-based Tutor and Evaluator Bot
1496 -- 1507Lucila M. Costi Santarosa, Lourenço de Oliveira Basso. Eduquito: Virtual Environment for Digital Inclusion of People with Special Educational Needs
1508 -- 1525Rosa Silva, António Andrade. Development of a Web Application for Management of Learning Styles
1526 -- 1545Diego Alonso Gómez Aguilar, Roberto Therón, Francisco José García Peñalvo. Semantic Spiral Timelines Used as Support for e-Learning
1546 -- 1561Francisco J. Almeida-Martínez, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide. Visualization of Syntax Trees for Language Processing Courses

Volume 15, Issue 6

1143 -- 1144Vasco Brattka, Pieter Collins, Robert Rettinger. Computability and Complexity in Analysis
1145 -- 1161Volker Bosserhoff. On the Effective Existence of Schauder Bases
1162 -- 1185Pieter Collins, Daniel S. Graça. Effective Computability of Solutions of Differential Inclusions The Ten Thousand Monkeys Approach
1186 -- 1205Christine Gaßner. Oracles and Relativizations of the P =? NP Question for Several Structures
1206 -- 1235Zvonko Iljazovic. Chainable and Circularly Chainable Co-r.e. Sets in Computable Metric Spaces
1236 -- 1263Davorin Lesnik. Constructive Urysohn Universal Metric Space
1264 -- 1279Takakazu Mori, Mariko Yasugi, Yoshiki Tsujii. Fine-computable Functions on the Unit Square and their Integral
1280 -- 1300Arno Pauly. Representing Measurement Results
1301 -- 1316Robert Rettinger, Klaus Weihrauch, Ning Zhong 0002. Topological Complexity of Blowup Problems
1317 -- 1336Matthias Schröder. An Effective Tietze-Urysohn Theorem for QCB-Spaces
1337 -- 1364Svetlana Selivanova, Victor L. Selivanov. Computing the Solution Operators of Symmetric Hyperbolic Systems of PDE
1365 -- 1380Hideki Tsuiki, Shuji Yamada. On Finite-time Computability Preserving Conversions
1381 -- 1422Klaus Weihrauch, Tanja Grubba. Elementary Computable Topology

Volume 15, Issue 5

967 -- 969Byoung-Soo Koh, Mieso K. Denko, Stefanos Gritzalis, Ching-Hsien Hsu. Data Security and Privacy Protection in Pervasive Computing Environments
970 -- 991Pablo Najera, Francisco Moyano, Javier Lopez. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
992 -- 1006Peter Pecho, Frantisek Zboril Jr., Martin Drahanský, Petr Hanácek. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
1007 -- 1022Changhoon Lee, Jongsung Kim, Seokhie Hong, Yang-Sun Lee. Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
1023 -- 1041Shiguo Lian, Yan Zhang. Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks
1042 -- 1064Jeong Ok Kwon, Ik Rae Jeong, Dong-Hoon Lee. Light-Weight Key Exchange with Different Passwords in the Standard Model
1065 -- 1080Jong Hyuk Park. USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework
1081 -- 1089Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay. Vascular Pattern Analysis towards Pervasive Palm Vein Authentication
1090 -- 1118Yao Hua Ho, Ai Hua Ho, Kien A. Hua, Fei Xie. Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network
1119 -- 1142Naixue Xiong, Jing He, Jong Hyuk Park, Donald H. Cooley, Yingshu Li. A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security

Volume 15, Issue 4

704 -- 0Ngoc Thanh Nguyen, De-Shuang Huang. Knowledge Management for Autonomous Systems and Computational Intelligence
705 -- 721Jeen-Shing Wang, Jen-Chieh Chiang. An Efficient Data Preprocessing Procedure for Support Vector Clustering
722 -- 741Xuesong Wang, Minglin Hao, Yuhu Cheng, Ruhai Lei. PDE-PEDA: A New Pareto-Based Multi-objective Optimization Algorithm
742 -- 764Sing-Wu Liou, Chia-Ming Wang, Yin-Fu Huang. Integrative Discovery of Multifaceted Sequence Patterns by Frame-Relayed Search and Hybrid PSO-ANN
765 -- 785Qun Niu, Taijin Zhou, Shiwei Ma. A Quantum-Inspired Immune Algorithm for Hybrid Flow Shop with Makespan Criterion
786 -- 804Andrey Vavilin, Kang-Hyun Jo. Graph-based Approach for Robust Road Guidance Sign Recognition from Differently Exposed Images
805 -- 825Vincenzo Di Lecce, Marco Calabrese, Domenico Soldo. Fingerprinting Lexical Contexts over the Web
826 -- 839Vitoantonio Bevilacqua, Giuseppe Mastronardi, Filippo Menolascina, Paolo Pannarale, Giuseppe Romanazzi. Bayesian Gene Regulatory Network Inference Optimization by means of Genetic Algorithms
840 -- 858Jun Zhang, Kwok-Wing Chau. Multilayer Ensemble Pruning via Novel Multi-sub-swarm Particle Swarm Optimization
859 -- 876Ho Quoc Phuong Nguyen, Hee-Jun Kang, Young Soo Suh, Young Shick Ro. A DCM Based Orientation Estimation Algorithm with an Inertial Measurement Unit and a Magnetic Compass
877 -- 897Trong Hai Duong, GeunSik Jo, Jason J. Jung, Ngoc Thanh Nguyen. Complexity Analysis of Ontology Integration Methodologies: A Comparative Study
898 -- 925Igor Cavrak, Armin Stranjak, Mario Zagar. SDLMAS: A Scenario Modeling Framework for Multi-Agent Systems
926 -- 940Shohel Ahmed, Sungjoon Park, Jason J. Jung, Sanggil Kang. A Personalized URL Re-ranking Method using Psychological User Browsing Characteristics
941 -- 966Dariusz Król, Aleksander Lupa. Agent Migration: Framework for Analysis

Volume 15, Issue 3

505 -- 0Hermann A. Maurer. Managing Editor s Column
506 -- 522Mufutau Akinwande. Advances in Homomorphic Cryptosystems
523 -- 537Alkiviadis G. Akritas. Linear and Quadratic Complexity Bounds on the Values of the Positive Roots of Polynomials
538 -- 554Jörg R. Mühlbacher, Christian Praher. DS RBAC - Dynamic Sessions in Role Based Access Control
555 -- 583Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio F. Gómez-Skarmeta. A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
584 -- 619María José Suárez Cabal, Javier Tuya. Structural Coverage Criteria for Testing SQL Queries
620 -- 647Éric Tanter, Johan Fabry. Supporting Composition of Structural Aspects in an AOP Kernel
648 -- 664Sergio L. Toral Marín, M. Rocío Martínez-Torres, Federico Barrero. Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux
665 -- 677Andreas Schmeil, Martin J. Eppler. Knowledge Sharing and Collaborative Learning in Second Life: A Classification of Virtual 3D Group Interaction Scripts
678 -- 691Martin Memmel, Michael Kockler, Rafael Schirru. Providing Multi Source Tag Recommendations in a Social Resource Sharing Platform
692 -- 703Niels Bjørn-Andersen, Leif Bloch Rasmussen, Soley Rasmussen. Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models?

Volume 15, Issue 2

398 -- 400Shiguo Lian, Yan Zhang, Stefanos Gritzalis, Yu Chen. Multimedia Security in Communication (MUSIC)
401 -- 425Andreas U. Schmidt. On the Superdistribution of Digital Goods
426 -- 443Jianwei Wang, Jianmin Lü, Shiguo Lian, Guangjie Liu. On the Design of Secure Multimedia Authentication
444 -- 464Dimitrios Koukopoulos. Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
465 -- 487Mahdi Amine Abdelouahab, Abdelmadjid Bouabdallah, Mohammed Achemlal, Sylvie Laniepce. The Topology Change Attack: Threat and Impact
488 -- 504Chin-Ling Chen. A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test

Volume 15, Issue 18

3158 -- 0Rafael Dueire Lins. Processing Camera-Based Documents
3307 -- 3324Szilárd Vajda, Thomas Plötz, Gernot A. Fink. Layout Analysis for Camera-Based Whiteboard Notes
3325 -- 3342Shyama Prosad Chowdhury, Soumyadeep Dhar, Karen Rafferty, Amit Kumar Das, Bhabatosh Chanda. Robust Extraction of Text from Camera Images using Colour and Spatial Information Simultaneously
3343 -- 3363Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breuel. Adaptive Binarization of Unconstrained Hand-Held Camera-Captured Document Images
3364 -- 3375Gabriel Pereira e Silva, Marcelo Thielo, Rafael Dueire Lins, Brenno Miro, Steven J. Simske. Automatically Deciding if a Document was Scanned or Photographed

Volume 15, Issue 17

3158 -- 3159Hermann A. Maurer. Managing Editor s Column
3160 -- 3168Josef Berger, Douglas S. Bridges. Rearranging Series Constructively
3169 -- 3200Antonio Navarro. A SWEBOK-based Viewpoint of the Web Engineering Discipline
3201 -- 3230Ismael Navas Delgado, José Francisco Aldana Montes. Extending SD-Core for Ontology-based Data Integration
3231 -- 3245Achraf Jabeur Telmoudi, Lotfi Nabli, Radhi M hiri. Modeling of Robustness Margins of the Control of a Predictive Control-Supervisory Architecture
3246 -- 3272Yannick Pencolé, Audine Subias. A Chronicle-based Diagnosability Approach for Discrete Timed-event Systems: Application to Web-Services
3273 -- 3304Louis-Marie Traonouez, Didier Lime, Olivier H. Roux. Parametric Model-Checking of Stopwatch Petri Nets

Volume 15, Issue 16

3079 -- 3080Pedro Antunes, Robert O. Briggs. Collaborative Technology and Environments
3081 -- 3100Eduardo Gasca, Jesús Favela, Monica Tentori. Assisting Support Groups of Patients with Chronic Diseases through Persuasive Computing
3101 -- 3125Till Schümmer, Stephan Lukosch. Understanding Tools and Practices for Distributed Pair Programming
3126 -- 3138Gwendolyn L. Kolfschoten, Mamadou Seck, Gert-Jan de Vreede. How Interactive Whiteboards Can be Used to Support Collaborative Modeling
3139 -- 3157Torsten Holmer, Stephan Lukosch, Verena Kunz. Diminishing Chat Confusion by Multiple Visualizations

Volume 15, Issue 15

2912 -- 2915Eduardo Fernández-Medina, Alfonso Rodríguez. Security in Information Systems: New Advances and Tendencies
2916 -- 2936Michael Hafner, Mukhtiar Memon, Ruth Breu. SeAAS - A Reference Architecture for Security Services in SOA
2937 -- 2956Basel Alomair, Radha Poovendran. Information Theoretically Secure Encryption with Almost Free Authentication
2957 -- 2980Óscar Sánchez, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez. ModelSec: A Generative Architecture for Model-Driven Security
2981 -- 2998Pino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya. Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
2999 -- 3018William Claycomb, Dongwan Shin. A User Controlled Approach for Securing Sensitive Information in Directory Services
3019 -- 3037Axel Schröpfer, Florian Kerschbaum, Christoph Schütz, Richard Pibernik. Optimizations for Risk-Aware Secure Supply Chain Master Planning
3038 -- 3058Luís Enrique Sanchez, Antonio Santos-Olmo Parra, David G. Rosado, Mario Piattini. Managing Security and its Maturity in Small and Medium-sized Enterprises
3059 -- 3078Corrado Aaron Visaggio, Francesca de Rosa. A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases

Volume 15, Issue 14

2746 -- 2746Hermann A. Maurer. Managing Editor s Column
2747 -- 2764Carlos Aguirre, Ramón Huerta, Lev S. Tsimring. Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms
2765 -- 2785Leendert Botha, Lynette van Zijl, McElory Hoffmann. Realtime LEGO Brick Image Retrieval with Cellular Automata
2786 -- 2807Emilio J. Castellano, Luis Martínez. A Web-Decision Support System based on Collaborative Filtering for Academic Orientation. Case Study of the Spanish Secondary School
2808 -- 2835Jürgen Dassow, Sherzod Turaev. Petri Net Controlled Grammars: the Case of Special Petri Nets
2836 -- 2880Alberto de la Encina, Luis Llana, Fernando Rubio. A Debugging System Based on Natural Semantics
2881 -- 2893Javier Herranz. Ideal Homogeneous Access Structures Constructed from Graphs
2894 -- 2911Gabriel Rodríguez, María J. Martín, Patricia González, Juan Touriño. A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes

Volume 15, Issue 13

2445 -- 0Kang-Hyun Jo, Ngoc Thanh Nguyen, Edward Szczerbicki. Knowledge Management for Intelligent Systems
2446 -- 2462Dunwei Gong, Xin Yao, Jie Yuan. Interactive Genetic Algorithms with Individual Fitness Not Assigned by Human
2463 -- 2484Dong-Wook Seo, Hyun-Uk Chae, Byeong-Woo Kim, Won Ho Choi, Kang-Hyun Jo. Human Tracking based on Multiple View Homography
2485 -- 2505Vu Van Tan, Dae-Seung Yoo, Jun-Chol Shin, Myeong-Jae Yi. A Multiagent System for Hierarchical Control and Monitoring
2506 -- 2527Chenn-Jung Huang, I-Fan Chen, Kai-Wen Hu, Hung-Yen Shen, You-Jia Chen, Dian-Xiu Yang. A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks
2528 -- 2546Yifei Chen, Feng Liu, Bram Vanschoenwinkel, Bernard Manderick. Splice Site Prediction using Support Vector Machines with Context-Sensitive Kernel Functions
2547 -- 2565Yi-Chung Chen, Jeen-Shing Wang. A Hammerstein-Wiener Recurrent Neural Network with Frequency-Domain Eigensystem Realization Algorithm for Unknown System Identification
2566 -- 2585Tao Jiang, Yucai Feng, Bing Zhang. Online Detecting and Predicting Special Patterns over Financial Data Streams
2586 -- 2607Jih-Gau Juang, Chia-Lin Lee. Applications of Cerebellar Model Articulation Controllers to Intelligent Landing System
2608 -- 2621Vitoantonio Bevilacqua, Lucia Cariello, Marco Giannini, Giuseppe Mastronardi, Vito Santarcangelo, Rocco Scaramuzzi, Antonella Troccoli. A Comparison Between a Geometrical and an ANN Based Method for Retinal Bifurcation Points Extraction
2622 -- 2628Ngoc Thanh Nguyen. Rough Classification - New Approach and Applications
2629 -- 2652Lacramioara Astefanoaei, Mehdi Dastani, John-Jules Ch. Meyer, Frank S. de Boer. On the Semantics and Verification of Normative Multi-Agent Systems
2653 -- 2675Duy Hoang Pham, Guido Governatori, Subhasis Thakur. Extended Defeasible Reasoning for Common Goals in n-Person Argumentation Games
2676 -- 2700Guido Boella, Leon van der Torre, Serena Villata. Analyzing Cooperation in Iterative Social Network Design
2701 -- 2725Thanh-Quang Chu, Alexis Drogoul, Alain Boucher, Jean-Daniel Zucker. Interactive Learning of Independent Experts Criteria for Rescue Simulations
2726 -- 2745Dongxiao Niu, Yongli Wang, Chunming Duan, Mian Xing. A New Short-term Power Load Forecasting Model Based on Chaotic Time Series and SVM

Volume 15, Issue 12

2284 -- 2286Tai-Hoon Kim, Andrew Kusiak, David Taniar, Daqing Zhang. Intelligent Environments and Services
2287 -- 2310Oje Kwon, Ki-Joune Li. Causality Join Query Processing for Data Streams via a Spatiotemporal Sliding Window
2311 -- 2329Zhiyong Yu, Zhiwen Yu, Xingshe Zhou, Daqing Zhang, Yuichi Nakamura. Meeting Warming-up: Detecting Common Interests and Conflicts among Participants before a Meeting
2330 -- 2352Choonsung Shin, Woontack Woo. Service Conflict Management Framework for Multi-user Inhabited Smart Home
2353 -- 2372Ioannis G. Nikolakopoulos, Charalampos Z. Patrikakis, Antonio Cimmino, Martin Bauer, Henning Olesen. On the Personalization of Personal Networks - Service Provision Based on User Profiles
2373 -- 2386Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang. Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears
2387 -- 2408Linkai Weng, Yaoxue Zhang, Yue-Zhi Zhou, Laurence Tianruo Yang, Pengwei Tian, Ming Zhong. A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph
2409 -- 2428Ratchadaporn Amornchewin, Worapoj Kreesuradej. Mining Dynamic Databases using Probability-Based Incremental Association Rule Discovery Algorithm
2429 -- 2444Chun Ruan, Sang-Soo Yeo. Modeling of an Intelligent e-Consent System in a Healthcare Domain

Volume 15, Issue 11

2138 -- 2141Cládia Werner, Flávio Oquendo. Software Components, Architectures and Reuse
2142 -- 2165Ricardo Perrone, Raimndo Macedo, George Lima, Veronica Lima. An Approach for Estimating Execution Time Probability Distributions of Component-based Real-Time Systems
2166 -- 2195Ronan Barrett, Claus Pahl. Distribution Pattern-driven Development of Service Architectures
2196 -- 2224Paulo E. S. Barbosa, Franklin Ramalho, Jorge C. A. de Figueiredo, Antonio D. dos S. Junior, Anikó Costa, Luís Gomes. Checking Semantics Equivalence of MDA Transformations in Concurrent Systems
2225 -- 2253Kleinner S. F. Oliveira, Karin Koogan Breitman, Toacy Cavalcante de Oliveira. A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap
2254 -- 2283Camila Nunes, Uirá Kulesza, Cláudio Sant Anna, Ingrid Nunes, Alessandro F. Garcia, Carlos José Pereira de Lucena. Assessment of the Design Modularity and Stability of Multi-Agent System Product Lines

Volume 15, Issue 10

2026 -- 2027Gabriele Kotsis, David Taniar, Ismail Khalil Ibrahim, Eric Pardede. Information Integration on Web-based Applications and Services
2028 -- 2057Klaus-Dieter Schewe, Bernhard Thalheim, Qing Wang. Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States
2058 -- 2077Eric Pardede, J. Wenny Rahayu, Ramanpreet Kaur Aujla, David Taniar. SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System
2078 -- 2108Elhadi Shakshuki, Richard Halliday. An Agent for Web-based Structured Hypermedia Algorithm Explanation System
2109 -- 2137Sohei Ikeda, Takakazu Nagamine, Tomio Kamada. Application Framework with Demand-Driven Mashup for Selective Browsing

Volume 15, Issue 1

1 -- 2Klaus-Dieter Schewe. Logic, Abstract State Machines and Databases
3 -- 32Egon Börger, Ole Sörensen, Bernhard Thalheim. On Defining the Behavior of OR-joins in Business Process Models
33 -- 62Andrea Calì, Diego Calvanese, Davide Martinenghi. Dynamic Query Optimization under Access Limitations and Dependencies
63 -- 71M. J. Cresswell. Non-Denumerable Infinitary Modal Logic
72 -- 111Lindsay Groves. Reasoning about Nonblocking Concurrency
112 -- 156Sven Hartmann, Sebastian Link. Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner
157 -- 194Markus Kirchberg. Using Abstract State Machines to Model ARIES-based Transaction Processing
195 -- 240Henning Köhler. Global Database Design based on Storage Space and Update Time Minimization
241 -- 272Scott Uk-Jin Lee, Gillian Dobbie, Jing Sun, Lindsay Groves. Formal Verification of Semistructured Data Models in PVS
273 -- 303Hans-Joachim Lenz, Bernhard Thalheim. A Formal Framework of Aggregation for the OLAP-OLTP Model
304 -- 354Attila Sali, Klaus-Dieter Schewe. A Characterisation of Coincidence Ideals for Complex Values
355 -- 397Jane Zhao, Klaus-Dieter Schewe, Henning Köhler. Dynamic Data Warehouse Design with Abstract State Machines