Abstract is missing.
- Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusionsJason S. Alexander, Thomas R. Dean, Scott Knight. 1-14 [doi]
- Towards a requirements-driven framework for detecting malicious behavior against software systemsHamzeh Zawawy, Kostas Kontogiannis, John Mylopoulos, Serge Mankovski. 15-29 [doi]
- An adaptive scheduling algorithm for dynamic heterogeneous Hadoop systemsAysan Rasooli Oskooei, Douglas G. Down. 30-44 [doi]
- Privacy leakage in multi-relational learning via unwanted classification modelsHongyu Guo, Herna L. Viktor, Eric Paquet. 45-59 [doi]
- A materialized-view based technique to optimize progressive queries via dependency analysisChao Zhu, Qiang Zhu, Calisto Zuzarte, Wenbin Ma. 60-73 [doi]
- ChuQL: processing XML with XQuery using HadoopShahan Khatchadourian, Mariano P. Consens, Jérôme Siméon. 74-83 [doi]
- Programmer-assisted automatic parallelizationDiego Huang, J. Gregory Steffan. 84-98 [doi]
- Parallel data cubes on multi-core processors with multiple disksFrank Dehne, Hamidreza Zaboli. 99-106 [doi]
- Task scheduling for GPU accelerated OLAP systemsLubomir Riha, Colin Shea, Maria Malik, Tarek A. El-Ghazawi. 107-119 [doi]
- Enabling automated integration testing of cloud application services in virtualized environmentsTariq M. King, Annaji Sharma Ganti, David Froslie. 120-132 [doi]
- Enhancing application robustness in cloud data centersMadalin Mihailescu, Andres Rodriguez, Cristiana Amza, Dmitrijs Palcikovs, Gabriel Iszlai, Andrew Trossman, Joanna Ng. 133-147 [doi]
- YaKit: a locality based messaging system using iCon overlayRonald J. Desmarais, Przemek Lach, Hausi A. Müller. 148-159 [doi]
- Assisting failure diagnosis through filesystem instrumentationLiang Huang, Kenny Wong. 160-174 [doi]
- Detecting model refactoring opportunities using heuristic searchAdnane Ghannem, Marouane Kessentini, Ghizlane El-Boussaidi. 175-187 [doi]
- Deriving high-level abstractions from legacy software using example-driven clusteringMartin Faunes, Marouane Kessentini, Houari A. Sahraoui. 188-199 [doi]
- A dynamic context management infrastructure for supporting user-driven web integration in the personal webNorha M. Villegas, Hausi A. Müller, Juan C. Muñoz, Alex Lau, Joanna Ng, Chris Brealey. 200-214 [doi]
- Object-relational event middleware for web applicationsPeng Li, Eric Wohlstadter. 215-228 [doi]
- Towards a framework for migrating web applications to web servicesAsil A. Almonaies, Manar H. Alalfi, James R. Cordy, Thomas R. Dean. 229-241 [doi]
- Complexity analysis: a quantitative approach to usability engineeringRick Sobiesiak, Tim O'Keefe. 242-256 [doi]
- Towards the profiling of scientific software for accuracyNicholas Jie Meng, Diane Kelly, Thomas R. Dean. 257-271 [doi]
- A QoS-aware decision model for web service development: server-site data services or client-site task servicesMehran Najafi, Kamran Sartipi, Norman Archer. 272-286 [doi]
- Bringing semantics to feature models with SAFMDLEbrahim Bagheri, Mohsen Asadi, Faezeh Ensan, Dragan Gasevic, Bardia Mohabbati. 287-300 [doi]
- Email classification with co-trainingSvetlana Kiritchenko, Stan Matwin. 301-312 [doi]
- NSERC business intelligence network: selected topicsRenée Miller, Frank Wm. Tompa, Sheila A. McIlraith, Jacob Slonim, Eric Yu. 313-315 [doi]
- Next-generation, scalable network visualization and analysisAmira Djebbari, Igor Jurisica. 316-317 [doi]
- Business analytics trends and opportunitiesCraig Statchuk. 318-320 [doi]
- Workshop on information management for situational analyticsGregory Richards, Bijan Raahemi. 321-322 [doi]
- An introduction to data mining and predictive analyticsTim Daciuk, Stephan Jou. 323-324 [doi]
- Using Kerberos to provide secure authentication for DB2Greg Stager. 325-326 [doi]
- ONTORULE: from business knowledge to ontology- and rules-based applicationsEmilio Rubiera, Christian de Sainte Marie. 327-329 [doi]
- DB2 performance measurement and tuning hands on exercisesAngela Yang, Calisto Zuzarte. 330-331 [doi]
- Security tools: TSIEM and AppScan source for securityYu-Ping Ding, Greg Stager. 332-333 [doi]
- Crunching big data in the cloud with Hadoop and BigInsightsLeons Petrazickis, Bradley Steinfeld. 334-335 [doi]
- DB2 security features: label based access control and trusted contextsWalid Rjaibi, Igal Ziskind, Mihai Iacob. 336-337 [doi]
- DB2 LUW optimizer: beginner to intermediate guideAnthony Reina, Zoran Kulina. 338-339 [doi]
- rd Workshop on Automatic Service CompositionYing Zou, Bipin Upadhyaya, Alex Lau, Joanna Ng. 340-341 [doi]
- nd Workshop on Leveraging REST in Enterprise Service SystemsMichael Athanasopoulos, Kostas Kontogiannis, Chris Brealey. 342-344 [doi]
- Privacy and security of smart grid communicationShahram Heydari, Walid Rjaibi, Khalil El-Khatib, Julie Thorpe. 345-346 [doi]
- Challenges for parallel computingKit Barton, Amy Wang, Steven Perron, Priya Unnikrishnan. 347-348 [doi]
- Introduction to bitcoins: a pseudo-anonymous electronic currency systemSérgio Martins, Yang Yang. 349-350 [doi]
- rd Annual Workshop on Interoperability and Smart Interactions in Healthcare (ISIH)Craig E. Kuziemsky, Liam Peyton, Jens H. Weber, Thodoros Topaloglou, Karim Keshavjee. 351-352 [doi]
- Second Symposium on the Personal WebMark H. Chignell, James R. Cordy, Joanna W. Ng, Yelena Yesha. 353-354 [doi]
- Smarter commerce: innovative customer scenarios powered by the combined impact of innovative technologiesJoanna W. Ng, Hausi A. Müller, Leho Nigul. 355-359 [doi]
- Software modeling for embedded and mobile sensor systemRamiro Liscano, Jürgen Dingel, Dorina C. Petriu, Faisal Qureshi. 360-362 [doi]
- Hands-on OSGi tools in a dayPeter Moogk, Andrew Mak, Zina Mostafia. 363-365 [doi]
- An introduction to Java development kit 7Daryl Maier, Nikola Grcevski, Vijay Sundaresan. 366-367 [doi]
- Portlet development with spring portlet MVC and WebSphere portal V7Siamack Jabbarzadeh Farshi. 368-370 [doi]
- 10th Workshop on Compiler-Driven PerformanceClark Verbrugge, José Nelson Amaral, Mark G. Stoodley, David Grove, Kit Barton. 371-372 [doi]
- Using IBM rational application developer to develop enterprise applications with Java EE, Dojo server faces and interconnecting them using SOAAdrian Padilla-Duarte, Victor Adrian Sosa Herrera, Roberto Sánchez-Herrera, Gloria Yadira Torrealba Melendez. 373-374 [doi]
- nd Software Certification Consortium Workshop: Theoretical Basis for System and Software Engineering Practices and CertificationTom Maibaum, Paul Joannou. 375-376 [doi]
- rd International Workshop Software Testing in the Cloud (STITC 2011)Scott R. Tilley. 377-379 [doi]
- th International Workshop on Cloud ComputingMarin Litoiu, Gabriel Iszlai, Bradley Simmons. 380 [doi]
- Smart applications on virtual infrastructureMike Smit, Joanna Ng, Marin Litoiu, Gabriel Iszlai, Alberto Leon-Garcia. 381 [doi]
- nd Workshop on Smart Surveillance System ApplicationsIosif Viorel (Vio) Onut, Don Aldridge, Marcellus Mindel, Stephen Perelgut. 382-384 [doi]
- Introduction to the IBM Netezza warehouse applianceMalcolm Singh, Ben Leonhardi. 385-386 [doi]