Abstract is missing.
- Mining Sequential Patterns Using Graph Search TechniquesYin-Fu Huang, Shao-Yuan Lin. 4-9 [doi]
- A Middleware Service for Secure Group Communication in Mobile Ad Hoc NetworksStephen S. Yau, Xinyu Zhang. 10-15 [doi]
- Device State Recovery in Non-volatile Main Memory SystemsRen Ohmura, Nobuyuki Yamasaki, Yuichiro Anzai. 16 [doi]
- Homeland Security s Cyber Component: A Survey of Legal IssuesJames Bret Michael, Thomas C. Wingfield, Steven E. Roberts. 24 [doi]
- BINTEST - Binary Search-based Test Case GenerationSami Beydeda, Volker Gruhn. 28-33 [doi]
- Automated Metamorphic TestingArnaud Gotlieb, Bernard Botella. 34-40 [doi]
- Smart Debugging Software Architectural Design in SDLW. Eric Wong, Tatiana Sugeta, Yu Qi, José Carlos Maldonado. 41 [doi]
- Lessons Learned from Software Engineering Multi-Agent SystemsDavid Chenho Kung, Hitesh Bhambhani, Sheila Nwokoro, Wesam Okasha, Ravindra Kambalakatta, Praveen Sankuratri. 50-55 [doi]
- Application of Tightly Coupled Engineering Team for Development of Test Automation Software - A Real World ExperienceAjay Pandey, Nader Kameli, Abraham Eapen, Corey Miklos, Francoise Boudigou, Imelda Sutedjo, Manoj Paul, Vivek Vijay, Wesley Mcdermott. 56-63 [doi]
- A Cooperative Framework for Inter-Organizational Workflow SystemShung-Bin Yan, Feng-Jian Wang. 64 [doi]
- Context Aware Deployment for Mobile UsersChantal Taconet, Erik Putrycz, Guy Bernard. 74-81 [doi]
- Policy-based Separation of Concerns for Dynamic Code Mobility ManagementRebecca Montanari, Gianluca Tonti, Cesare Stefanelli. 82-90 [doi]
- Semantic-based Approach to Streaming XML Contents using XstreamEugene Y. C. Wong, Alvin T. S. Chan, Hong Va Leong. 91 [doi]
- Automating Checking of Models Built Using a Graphically Based Formal Modelling LanguageRobert John Walters. 98-104 [doi]
- Techniques and Tools for Automated Safety Analysis & Decision Support for Redundancy Allocation in Automotive SystemsYiannis Papadopoulos, Christian Grante. 105-110 [doi]
- Design and Implementation of a Cache-Conscious Index Manager for the Tachyon, a Main Memory DBMSKyung-Tae Lee, Inbum Jung, Changyeol Choi, Wan Choi, Sang-Wook Kim. 111 [doi]
- Towards Dynamic Process with Variable Structure by ReflectionShaohua Liu, Jun Wei, Wei Xu. 120-125 [doi]
- Current Trends in the Adoption of the CMMI® Product SuiteDave Zubrow. 126-129 [doi]
- A CC-based Security Engineering Process Evaluation ModelJongsook Lee, Jieun Lee, Seunghee Lee, Byoungju Choi. 130 [doi]
- An Object-Passing Model for Parallel ProgrammingJameela Al-Jaroodi, Nader Mohamed. 138-143 [doi]
- Conceptual Modelling of Mobile Object Systems: Language Constructs for Distinguishing Between Mobile and Stationary SubsystemsPeter Ahlbrecht, Silke Eckstein, Karl Neumann. 144-150 [doi]
- Data Placement and Query Processing Based on RPE ParallelismsYaxin Yu, Guoren Wang, Ge Yu, Gang Wu, Junan Hu, Nan Tang. 151 [doi]
- A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program AttacksAdrian Spalka, Marcel Winandy. 158-163 [doi]
- A Security Characterisation Framework for Trustworthy Component Based Software SystemsKhaled M. Khan, Jun Han. 164-169 [doi]
- Exploiting Self-Modification Mechanism for Program ProtectionYuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto. 170 [doi]
- Tolerance of Control-Flow Testing CriteriaSergiy A. Vilkomir, Kalpesh Kapoor, Jonathan P. Bowen. 182-187 [doi]
- Data-Flow-Based Unit Testing of Aspect-Oriented ProgramsJianjun Zhao. 188-197 [doi]
- A Strategy for Selecting Synchronization Sequences to Test Concurrent Object-Oriented SoftwareHuo Yan Chen, Yu Xia Sun, T. H. Tse. 198 [doi]
- Challenges and Recent Advances in Developing Trustworthy Software-Based SystemsStephen S. Yau, Carl E. Landwehr, Jeffrey M. Voas, Thomas J. Weigert. 208 [doi]
- A Multi-Agent Software Environment for Testing Web-based ApplicationsQingning Huo, Hong Zhu, Sue Greenwood. 210-215 [doi]
- Mediating Electronic MeetingsJia Zhang, Carl K. Chang, Jen-Yao Chung. 216-221 [doi]
- Scalable Multilateral Communication Technique for Large-Scale Information SystemsKhaled Ragab, Naohiro Kaji, Koichi Moriyama, Kinji Mori. 222 [doi]
- Runtime Software Architecture Based Software Online EvolutionQianxiang Wang, Gang Huang, Junrong Shen, Hong Mei, Fuqing Yang. 230-235 [doi]
- The XIS Generative Programming TechniquesAlberto Rodrigues da Silva, Gonçalo Lemos, Tiago Matias, Marco Costa. 236-241 [doi]
- Proactive Views on Concrete Aspects: A Pattern Documentation Approach for Software EvolutionTsz Hin Ng, Shing-Chi Cheung. 242 [doi]
- A Feature Oriented Approach to Modeling and Reusing Requirements of Software Product LinesHong Mei, Wei Zhang, Fang Gu. 250-256 [doi]
- A Synergistic Interweaving of Formal and Informal MethodsWing Lok Yeung, Karl R. P. H. Leung. 257-262 [doi]
- Mockup-driven Fast-prototyping Methodology for Web Requirements EngineeringJia Zhang, Carl K. Chang, Jen-Yao Chung. 263 [doi]
- Integrating Heterogeneous Web Services with WebXcriptDickson K. W. Chiu, Danny Kok, Alex K. C. Lee, Shing-Chi Cheung. 272-277 [doi]
- A Probabilistic Model for Intelligent Web CrawlersKe Hu, Wing Shing Wong. 278-282 [doi]
- Autonomous Decentralized Database System Reconstruction Technology through Mobile Agent Monitoring and CoordinationCarlos Perez Leguizamo, Dake Wang, Kinji Mori. 283 [doi]
- Incremental Transformation of Procedural Systems to Object Oriented PlatformsYing Zou, Kostas Kontogiannis. 290-295 [doi]
- Migrating Web Frameworks Using Water TransformationsAhmed E. Hassan, Richard C. Holt. 296-303 [doi]
- Bridging Legacy Systems to Model Driven ArchitectureBing Qiao, Hongji Yang, William C. Chu, Baowen Xu. 304 [doi]
- Transforming quantities into qualities in assessment of software systemsGerardo Canfora, Luigi Cerulo, Luigi Troiano. 312-319 [doi]
- Information Quality Assessment of a Yellow-Pages Location-Based ServiceArtem Katasonov, Markku Sakkinen. 320-326 [doi]
- VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their DevelopmentHisayuki Suzumori, Haruhiko Kaiya, Kenji Kaijiri. 327 [doi]
- A Reengineering Process for Migrating from an Object-oriented Legacy System to a Component-based SystemEunjoo Lee, Byungjeong Lee, Woochang Shin, Chisu Wu. 336-341 [doi]
- Determining Granularity of Independent Tasks for Reengineering a Legacy System into an OO SystemRichard Millham, Martin P. Ward, Hongji Yang. 342-347 [doi]
- Recovering a Business Object Model from Web ApplicationsGiuseppe A. Di Lucca, Anna Rita Fasolino, Porfirio Tramontana, Ugo de Carlini. 348 [doi]
- Testing the Suitability of Markov Chains as Web Usage ModelsZhao Li, Jeff Tian. 356-361 [doi]
- Integrating Practical Software Measurement and the Balanced ScorecardDavid N. Card. 362-367 [doi]
- A Cut-Based Algorithm for Reliability Analysis of Terminal-Pair Network Using OBDDYung-Ruei Chang, Hung-Yau Lin, Ing-Yi Chen, Sy-Yen Kuo. 368 [doi]
- IBHIS: Integration Broker for Heterogeneous Information SourcesIoannis A. Kotsiopoulos, John Keane, Mark Turner, Paul J. Layzell, Fujun Zhu. 378-384 [doi]
- Protecting Distributed Software Upgrades that Involve Message-Passing Interface ChangesAnn T. Tai, Kam S. Tso, William H. Sanders. 385-390 [doi]
- Implementation of Nonstop Software Update for Client-Server ApplicationsWen-Kang Wei, Kuo-Feng Ssu, Hewijin Christine Jiau. 391 [doi]
- A Test-Driven Component Development Framework based on the CORBA Component ModelEgon Teiniker, Stefan Mitterdorfer, Leif Morgan Johnson, Christian Kreiner, Zsolt Kovács, Reinhold Weiss. 400-405 [doi]
- Information use in CBSE designStephen Owen, David Budgen, Pearl Brereton. 406-412 [doi]
- Variable Strength Interaction Testing of ComponentsMyra B. Cohen, Peter B. Gibbons, Warwick B. Mugridge, Charles J. Colbourn, James S. Collofello. 413 [doi]
- An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc NetworksLiza Lai-Yee Shek, Yu-Kwong Kwok. 420-425 [doi]
- Distributed Garbage Collection by Timeouts and Backward InquirySung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman. 426-432 [doi]
- Facilitating Secure Ad hoc Service Discovery in Public EnvironmentsFeng Zhu, Matt W. Mutka, Lionel M. Ni. 433 [doi]
- Precise Specification to Compound Patterns with ExLePUSJeffrey Ka-Hing Mak, Clifford Sze-Tsan Choy, Daniel Pak-Kong Lun. 440-445 [doi]
- Scenario Architecture - A Methodology to Build a Global View of OO Software SystemYiausyu Earl Tsai, Hewijin Christine Jiau, Kuo-Feng Ssu. 446-451 [doi]
- A Role-Based Metamodeling Approach to Specifying Design PatternsDae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eunjee Song. 452 [doi]
- A Toolkit for Developing Web-based Information Systems: Case StudiesThierry Bodhuin, Maria Tortorella. 460-465 [doi]
- Rapid Verification of Embedded Systems Using PatternsWei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul. 466-471 [doi]
- Software Documentation-Driven ManufacturinLuqi, Xianzhong Liang, Lynn Zhang, Valdis Berzins. 472 [doi]
- Meta Model Approach for MediationMasataro Shiroiwa, Takao Miura, Isamu Shioya. 480-485 [doi]
- A Flexible Framework for Replication in Distributed SystemsEul-Gyu Im, B. Clifford Neuman. 486-491 [doi]
- A Graph Grammar Approach to Software Architecture Verification and TransformationJun Kong, Kang Zhang, Jing Dong, Guang-Lei Song. 492 [doi]
- Sensitivity Analysis of Software Reliability for Component-Based Software ApplicationsJung-Hua Lo, Chin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu. 500-505 [doi]
- Effects of Introducing Survival Behaviours into Automated NegotiatorsPeter Henderson, Stephen Crouch, Robert John Walters, Qinglai Ni. 506-512 [doi]
- An Architecture of Wireless Web and Dialogue System Convergence for Multimodal Service Interaction Over Converged NetworksFeng Liu, J. Jenny Li, Xueshan Shan, Wu Chou. 513 [doi]
- Integrating Runtime Assertions with Dynamic Types: Structuring a Derivation from an Incomputable SpecificationPaul A. Bailes, Colin J. M. Kemp. 520-526 [doi]
- Deductive Schedulability Verification Methodology of Real-Time Software using both Refinement Verification and Hybrid AutomataSatoshi Yamane. 527-533 [doi]
- An Efficient Defect Estimation Method for Software Defect CurvesChenggang Bai, Kai-Yuan Cai, T. Y. Chen. 534 [doi]
- Workshop on Architectures for Complex Application Integration (WACAI 2003)Piyush Maheshwari, Ian Gorton, Anna Liu. 542-543 [doi]
- Just What Could Possibly Go Wrong In B2B Integration?Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jang, Doug Palmer. 544-549 [doi]
- An Experience of Applying Architecture-based Approach to Build a Component-based Requirements Management ToolsetMuhammad Ali Babar. 550-556 [doi]
- Enterprise Application Integration using a Component-based ArchitecturePiyush Maheshwari. 557-562 [doi]
- Flexible Fault Tolerance in Configurable Middleware for Embedded SystemsKevin E. Dorow. 563-569 [doi]
- Ad Hoc Software Interfacing: Enterprise Application Integration (EAI) when Middleware is OverkilArthur Alexander Reyes, José R. Espino, Vijai Mohan, Monica Nadkar. 570-575 [doi]
- Next Generation Application Integration: Challenges and New ApproachesIan Gorton, Dave Thurman, Judi Thomson. 576 [doi]
- Intelligent Web Topics Search Using Early Detection and Data AnalysisChing-Cheng Lee, Yixin Yang. 584-589 [doi]
- Discovering Cyber Communities from the WWWXiaohua Hu, Jianchao Han, Nick Cercone. 590-594 [doi]
- Internet-based Decision Support: Towards E-HospitalShusaku Tsumoto, Shoji Hirano, Eisuke Hanada. 595-600 [doi]
- A Framework for Web-based Research Support SystemsYiyu Yao. 601-606 [doi]
- Intelligent Mobile Agents for Efficient and Inexpensive e-ShoppingLin Lu, Yan-Qing Zhang. 607-609 [doi]
- Managing Security Policy in a Large Distributed Web Services EnvironmentSymon Chang, Qiming Chen, Meichun Hsu. 610-615 [doi]
- Information Flows in E-GovernmentTsau Young Lin. 616-620 [doi]
- Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive SystemJames Bret Michael, Thomas C. Wingfield, Duminda Wijesekera. 621-626 [doi]
- A Methodology for Hiding Knowledge in XML Document CollectionsTom Johnsten, Robert B. Sweeney, Vijay V. Raghavan. 627-631 [doi]
- Security Issues for the Semantic WebBhavani M. Thuraisingham. 632-637 [doi]
- Situation-Aware Personalized Information Retrieval for Mobile InternetStephen S. Yau, Huan Liu, Dazhi Huang, Yisheng Yao. 638 [doi]
- A Multiple-Tier Model Manipulation Architecture for Enterprise Decision MakingZhihong Liang, Shaoyun Li, H. Liao, Hongwei Kang, Qing Duan, Hua Zhou, Hongji Yang. 646-651 [doi]
- Regression Testing for Web Applications Based on SlicingLei Xu, Baowen Xu, Zhenqiang Chen, Jixiang Jiang, Huowang Chen. 652-656 [doi]
- A Supervised Visual Wrapper Generator for Web-Data ExtractionXiaofeng Meng, Haiyan Wang, Dongdong Hu, Chen Li. 657-662 [doi]
- A Dynamic Information Retrieval System for the WebXiangzhu Gao, San Murugesan, Bruce W. N. Lo. 663-667 [doi]
- A Pattern Language Model for Framework DevelopmentLiu Wu-dong, He Ke-qing, Yingshi, Hui Xu, Jing Yi-xin. 669-673 [doi]
- Some Domain Patterns in Web Application FrameworkLiu Chao, He Keqing, Liu Jie, Ying Shi. 674-677 [doi]
- Web-Based Support for Managing Large Collections of Software ArtefactCornelia Boldyreff, James Brittle, Chris Korhonen, Phyo Kyaw, Janet Lavery, David Nutter, Stephen Rank. 678-683 [doi]
- MDA-based Development of E-Learning SystemHong Wang, Dong Zhang. 684-689 [doi]
- PeAgent - A Mobile Agent System to Support Secure Internet and Web ApplicationsQingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Yen. 690-695 [doi]
- Toward an Easy Programming Environment for Implementing Mobile Applications: A Fleet Application Case Study using SyD MiddlewareSushil K. Prasad, Michael Weeks, Yanqing Zhang, Alexander Zelikovsky, Saeid Belkasim, Raj Sunderraman, Vijay K. Madisetti. 696-701 [doi]
- A Hierarchical Strategy for Testing Web-Based Applications and Ensuring Their ReliabilityJeff Tian, Li Ma, Zhao Li, Akif Günes Koru. 702 [doi]