Abstract is missing.
- Distributed Component-Based Software Development: An Incremental ApproachEduardo Santana de Almeida, Alexandre Alvaro, Daniel Lucrédio, Antônio Francisco do Prado, Luís Carlos Trevelin. 4-9 [doi]
- Model Oriented Software ArchitectureHassan Reza, Emanuel S. Grant. 4-5 [doi]
- A Grid Service-Based Engineering Computation ArchitectureChangqin Huang, Deren Chen, Hualiang Hu. 6-7 [doi]
- A Generic OO Architecture Language for Semantics Analysis of OO SpecificationFranck Xia. 8-9 [doi]
- An XML-Based Framework for Language Neutral Program Representation and Generic AnalysisRaihan Al-Ekram, Kostas Kontogiannis. 10-11 [doi]
- TiViPE - Tino s Visual Programming EnvironmentTino Lourens. 10-15 [doi]
- Adaptive Time-Critical Resource Management Using Time/Utility Functions: Past, Present, and FuturePeng Li, Binoy Ravindran, E. Douglas Jensen. 12-13 [doi]
- Addressing: The Root of all Programming EvilsConrad Mueller. 14-15 [doi]
- Codifying a Service Architectural StyleDavid Budgen, Pearl Brereton, Mark Turner. 16-22 [doi]
- Towards Optimization of the Coverage Testing of Interactive SystemsFevzi Belli, Christof J. Budnik. 18-19 [doi]
- Estimation of Software Defects Fix Effort Using Neural NetworksHui Zeng, David Rine. 20-21 [doi]
- A Change Impact Dependency Measure for Predicting the Maintainability of Source CodeFranck Xia, Praveen Srikanth. 22-23 [doi]
- Formal Support for Development of JavaBeans? Component SystemsBhim Prasad Upadhyaya, Zhiming Liu. 23-28 [doi]
- Optimizing the Planning and Executing of Software Independent Verification and Validation (IV&V) in Mature OrganizationsChristopher P. Fuhrman, Edgardo Palza, Kim Loan Do. 24-25 [doi]
- A View-Based Control Flow MetricStefan Gossens, Mario Dal Cin. 26-27 [doi]
- Using FMEA for Early Robustness Analysis of Web-Based SystemsJianyun Zhou, Tor Stålhane. 28-29 [doi]
- Assuring Assessment SuccessKevin McKeever, Jonathan Morrison, Eric Peterson. 30-37 [doi]
- eXtreme Programming (XP) as a ?Minimum? Software Process: A Grounded TheoryGerry Coleman. 30-31 [doi]
- eXtreme Programming Support Tool in Distributed EnvironmentSatoshi Atsuta, Saeko Matsuura. 32-33 [doi]
- Towards an Authentication Middleware to Support Ubiquitous Web AccessNing Zhang, Jay Chin, Alan L. Rector, Carole A. Goble, Y. Li. 36-38 [doi]
- Enacting Conformance Assessment of Business Processes - An ebXML Based Approach in E-ADOMEZhe Shan, Qing Li, Kamalakar Karlapalem. 38-43 [doi]
- An Efficient Distributed Intrusion Detection SchemeThomas Holz. 39-40 [doi]
- N-Gram-Based Detection of New Malicious CodeTony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan. 41-42 [doi]
- A Decision-Making Model for Intelligent Agent with Internal StateShan-li Hu, Hai-yan Wu. 43-44 [doi]
- Continuous Productivity Assessment and Effort Prediction Based on Bayesian AnalysisSeok Jun Yun, Dick B. Simmons. 44-49 [doi]
- Goal Autonomous Agent ArchitectureZhiqi Shen, Robert K. L. Gay, Yuan Miao, Chunyan Miao. 45-46 [doi]
- An Intelligent Component Retrieval System Using Conversational CBRMingyang Gu, Xin Tong. 47-48 [doi]
- Excalibur: A Personalized Meta Search EngineLeo Yuen, Matthew Chang, Ying Kit Lai, Chung Keung Poon. 49-50 [doi]
- Introducing Agility: A Case Study of Situational Method Engineering Using the OPEN Process FrameworkM. K. Serour, Brian Henderson-Sellers. 50 [doi]
- Rich Media Retrieval in an Object XML Framework: A Case Study with Flash Movies Using Structural Join Index HierarchyEdmund Hon Chung Mak, Chi-Wai Fung, Qing Li. 51-52 [doi]
- A New E-Shopping System Using High Performance Custom ComputersYuk Ying Chung, Yong Sun, PengHao Wang, Xiaoming Chen. 54-55 [doi]
- Development of a Hybrid Automotive Wireless HarnessKiumi Akingbehin, Nilesh V. Patel. 56-57 [doi]
- Lesions Learned from the Practice of Mobile Health Application DevelopmentPing Yu, Hui Yu. 58-59 [doi]
- An Edge Marking Technique for Dynamic Slicing of Object-Oriented ProgramsDurga Prasad Mohapatra, Rajib Mall, Rajeev Kumar. 60-65 [doi]
- Compressing an Inverted File with LCSFang-Yie Leu, Yao-Chung Fan. 60-61 [doi]
- An Imprecise Computation Model in Reducing Power Consumption of Flash Memory for Portable DevicesLi-Ping Tung, Jia-Ming Chen, Wei-Fen Hsu, Wei Kuan Shih. 62-63 [doi]
- Robustness Study of an Embedded Operating System for Industrial ApplicationsJuan Pardo, José Carlos Campelo, Juan José Serrano. 64-65 [doi]
- Modular Monadic Program SlicingYingzhou Zhang, Baowen Xu, Liang Shi, Bixin Li, Hongji Yang. 66-71 [doi]
- A New Approach to Representing Continuously Moving RegionsPeiquan Jin, Lihua Yue, Yuchang Gong. 70-73 [doi]
- Using Artificial Life Techniques to Generate Test Cases for Combinatorial TestingToshiaki Shiba, Tatsuhiro Tsuchiya, Tohru Kikuno. 72-77 [doi]
- Evaluating GML Support for Spatial DatabasesLakshmi N. Sripada, Chang-Tien Lu, Weili Wu. 74-77 [doi]
- A Spatial SQL Extension for Continuous Field QueryingRobert Laurini, Luca Paolino, Monica Sebillo, Genoveffa Tortora, Giuliana Vitiello. 78-81 [doi]
- A Revisit of Adaptive Random Testing by RestrictioKwok Ping Chan, Tsong Yueh Chen, Fei-Ching Kuo, Dave Towey. 78-85 [doi]
- Spatial Data Query Support in Peer-to-Peer SystemsRoger Zimmermann, Wei-Shinn Ku, Haojun Wang. 82-85 [doi]
- Protein Functional Motion Query and VisualizationXiong Liu, Hassan A. Karimi, Lee-Wei Yang, Ivet Bahar. 86-89 [doi]
- Risk Management of Corporate Confidential Information in Digital FormLucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan. 88-89 [doi]
- Self-Adaptive Software: Cybernetic Perspective and an Application Server Supported FrameworkJunrong Shen, Qianxiang Wang, Hong Mei. 92-95 [doi]
- Implementing Hierarchical Features in a Graphically Based Formal Modelling LanguagePeter Henderson, Robert John Walters, Stephen Crouch. 92-98 [doi]
- Adaptive Random Testing with CG ConstraintF. T. Chan, K. P. Chan, T. Y. Chen, Siu-Ming Yiu. 96-99 [doi]
- Situated Modelling of ScenariosFrancisco A. C. Pinheiro. 99-107 [doi]
- Adaptive Control Software: Can We Guarantee Safety?Yan Liu, Sampath Yerramalla, Edgar Fuller, Bojan Cukic, Srikanth Gururajan. 100-103 [doi]
- Web Application Bypass TestingJeff Offutt, Ye Wu, Xiaochen Du, Hong Huang. 106-109 [doi]
- PFGASAT- A Genetic SAT Solver Combining Partitioning and Fuzzy StrategieJianzhou Zhao, Jinian Bian, Weimin Wu. 108-113 [doi]
- Cooperative Agent Approach to Quality Assurance and Testing Web SoftwareHong Zhu. 110-113 [doi]
- Data Flow Analysis and Testing of Java Server PagesChien-Hung Liu. 114-119 [doi]
- Consistency Check in Modelling Multi-Agent SystemsLijun Shan, Hong Zhu. 114-119 [doi]
- WS-FIT: A Tool for Dependability Analysis of Web ServicesNik Looker, Malcolm Munro, Jie Xu. 120-123 [doi]
- Stream Composition for Highly Adaptive and Reconfigurable Mobile MiddlewareYongjie Zheng, Alvin T. S. Chan. 122-127 [doi]
- On the Complexity of Finding Emerging PatternsLusheng Wang, Hao Zhao, Guozhu Dong, Jianping Li. 126-129 [doi]
- SOWAC: A Service-Oriented Workflow Access Control ModelWei Xu, Jun Wei, Yu Liu, Jing Li. 128-134 [doi]
- Web Service and Geographical Information IntegrationYingwei Luo, Xinpeng Liu, Wenjun Wang, Xiaolin Wang, Zhuoqun Xu. 130-133 [doi]
- A Method Based on Improved Bayesian Inference Network Model and Hidden Markov Model for Prediction of Protein Secondary StructureGuohui Yang, Chunguang Zhou, Chengquan Hu, Zhezhou Yu, Hongji Yang. 134-137 [doi]
- Towards Autonomic Computing Middleware via ReflectionGang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng, Zhao Liu, Gang Fan. 135-140 [doi]
- Spatiotemporal Helixes for Modeling Environmental DataKristin Eickhorst, Arie Croitoru, Peggy Agouris, Anthony Stefanidis. 138-141 [doi]
- A Semantic-Aware Publish/Subscribe System with RDF PatternsJinling Wang, Beihong Jin, Jing Li, Danhua Shao. 141-14 [doi]
- Mining Complex Relationships in the SDSS SkyServer Spatial DatabaseBavani Arunasalam, Sanjay Chawla, Pei Sun, Robert Munro. 142-145 [doi]
- Mining Dynamic Interdimension Association Rules for Local-Scale Weather PredictionZhongnan Zhang, Weili Wu, Yaochun Huang. 146-149 [doi]
- Worst-Case Response Time Analysis for OSEK/VDX Compliant Real-Time Distributed Control SystemsLei Wang, Zhaohui Wu, Mingde Zhao. 148-153 [doi]
- Linking Software Process Modeling with Markov Decision TheoryFrank Padberg. 152-155 [doi]
- Dynamic Real-Time Scheduling for Multi-Processor Tasks Using Genetic AlgorithmShu-Chen Cheng, Yueh-Min Huang. 154-160 [doi]
- Modeling and Control of the Incremental Software Test ProcessScott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur. 156-159 [doi]
- Software Test Process Control: Status and Future DirectionsGhaffari Abu, Leeny Chacko, João W. Cangussu. 160-163 [doi]
- Real-Time Strategy and Practice in Service GridHai Jin, Hanhua Chen, Jian Chen, Ping Kuang, Li Qi, Deqing Zou. 161-166 [doi]
- Online Testing of Web-Based ApplicationsQianxiang Wang, Lining Quan, Fuchen Ying. 166-169 [doi]
- A New Scheduling Algorithm and a Compensation Strategy for Imprecise ComputationAlbert Mo Kim Cheng, Rong Wang. 167-172 [doi]
- Cooperative and Group Testing in Verification of Dynamic Composite Web ServicesWei-Tek Tsai, Yinong Chen, Raymond A. Paul, Ning Liao, Hai Huang. 170-173 [doi]
- Computing Curricula Software Engineering: Position PaperDavid Budgen. 174-175 [doi]
- Agent-Based Framework for Testing Web ApplicationsDavid Chenho Kung. 174-177 [doi]
- Computing Curriculum - Software Engineering: Its Impact on Professional Software Engineering EducationT. H. Tse. 176-177 [doi]
- Code-Coverage Guided Prioritized Test GenerationJ. Jenny Li, Howell Yee. 178-181 [doi]
- Application of Maximum Entropy Principle to Software Failure PredictionJi Wu, Hai-yan Yang, Xiao-xia Jia, Chang Liu, Chao Liu, Mao-zhong Jin. 180-185 [doi]
- Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time LagsChin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. Lyu, Chuan-Ching Sue. 186-191 [doi]
- The Effects of Fault Counting Methods on Fault Model QualityAllen P. Nikora, John C. Munson. 192-201 [doi]
- Portable Faultloads Based on Operator Faults for DBMS Dependability BenchmarkingMarco Vieira, Henrique Madeira. 202-209 [doi]
- A Multi-Class SLIPPER System for Intrusion DetectionZhenwei Yu, Jeffrey J. P. Tsai. 212-217 [doi]
- A Secure Mobile Agent System Model Based on Extended Elementary Object SystemLu Ma, Jeffrey J. P. Tsai, Tadao Murata. 218-223 [doi]
- A Secure and Fully Private Borda Voting Protocol with Universal VerifiabilityChangjie Wang, Ho-Fung Leung. 224-229 [doi]
- Enhanced Security Models for Operating Systems: A Cryptographic ApproachChristian Payne. 230-235 [doi]
- Research Directions in Software Process ImprovementDavid N. Card. 238 [doi]
- State of the Art and Future of Research in Software Process ImprovementMiguel A. Serrano. 239 [doi]
- Dependable Computing: Concepts, Challenges, DirectionsJean-Claude Laprie. 242 [doi]
- Intelligent Component SelectionValerie Maxville, Jocelyn Armarego, Chiou Peng Lam. 244-249 [doi]
- Component-Wise Mapping of Media-Needs to a Distributed Presentation EnvironmentLoe M. G. Feijs, Jun Hu. 250-257 [doi]
- Component Failure Mitigation According to Failure TypeFan Ye, Tim Kelly. 258-264 [doi]
- Modular Design of Reactive SystemsCristina Cerschi Seceleanu, Tiberiu Seceleanu. 265-271 [doi]
- Software Effort Prediction Models Using Maximum Likelihood Methods Require Multivariate Normality of the Software Metrics Data Sample: Can Such a Sample Be Made Multivariate Normal?Victor K. Y. Chan. 274-279 [doi]
- POP beyond SODA, Reaching the New Horizon of Service CooperationShaohua Liu, Dan Ye, Jun Wei, Gang Xu, Yonglin Xia, Yu Liu. 280-285 [doi]
- FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System RevisionKazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri. 286-292 [doi]
- A Complete Textual Merging Algorithm for Software Configuration Management SystemsHaifeng Shen, Chengzheng Sun. 293-298 [doi]
- Test Criteria for Context-Free GrammarsHu Li, Mao-zhong Jin, Chao Liu, Zhongyi Gao. 300-305 [doi]
- Mutation-Based Testing Criteria for TimelinessRobert Nilsson, Jeff Offutt, Sten F. Andler. 306-311 [doi]
- Reachability Testing of Semaphore-Based ProgramsYu Lei, Richard H. Carver. 312-317 [doi]
- On the Testing of Particular Input ConditionsEric Ying Kwong Chan, Pak-Lok Poon, Yuen-Tak Yu. 318-325 [doi]
- Computer Supported Cooperative Work in Software EngineeringJ. Jenny Li, Tangqiu Li, Zongkai Lin, Aditya P. Mathur, Karama Kanoun. 328 [doi]
- Towards a Model Logic for p-CalculusTaolue Chen, Tingting Han, Jian Lu. 330-335 [doi]
- Generating Regression Tests via Model CheckingLihua Xu, Marcio S. Dias, Debra J. Richardson. 336-341 [doi]
- Automated Consistency and Completeness Checking of Testing Models for Interactive SystemsAmit M. Paradkar, Tim Klinger. 342-348 [doi]
- Design of a CIL Connector to SPINLi Yongjian, Xue Rui. 349-354 [doi]
- A Taxonomy and Hierarchy of Variability Dependencies in Software Product Family EngineeringMichel Jaring, Jan Bosch. 356-361 [doi]
- A Development Framework for Rapid Meta-Heuristics HybridizationHoong Chuin Lau, Wee Chong Wan, Min Kwang Lim, Steven Halim. 362-367 [doi]
- Safety Tactics for Software Architecture DesignWeihang Wu, Tim Kelly. 368-375 [doi]
- A Uniform Meta-Model for Mediating Formal Electronic ConferencesJia Zhang, Carl K. Chang, Jeffrey M. Voas. 376-383 [doi]
- Publicly Verifiable Auctions with Minimal LeakageQianhong Wu, Changjie Wang, Xiaofeng Chen, YuMin Wang. 384-389 [doi]
- A Hybrid Security Framework of Mobile CodeLong Qin, Si Duanfeng, Han Xinhui, Zou Wei. 390-395 [doi]
- A Novel Key Management Scheme for Dynamic Access Control in a User HierarchyTzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian. 396-397 [doi]
- Active Surroundings: A Group-Aware Middleware for Embedded Application SystemDongman Lee. 404-405 [doi]
- Embedded Software in Real-Time Pervasive Computing EnvironmentsStephen S. Yau. 406-407 [doi]
- Priority Assessment of Software Requirements from Multiple PerspectivesXiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun, Kunio Noguchi, Yuji Kyoya. 410-415 [doi]
- An Approach to Feature Based Modelling by Dependency Alignment for the Maintenance of the Trustworthy SystemJungyoon Kim, Doo-Hwan Bae. 416-423 [doi]
- Hiding Sensitive Patterns in Association Rules MiningGuanling Lee, Chien-Yu Chang, Arbee L. P. Chen. 424-429 [doi]
- Efficient Partial Multiple Periodic Patterns Mining without Redundant RulesWenpo Yang, Guanling Lee. 430-435 [doi]
- Materializing Ubiquitous Computing EnvironmentsKimio Kuramitsu, Hideyuki Tokuda. 438-443 [doi]
- Context-Based Access Control for Ubiquitous Service ProvisioningAntonio Corradi, Rebecca Montanari, Daniela Tibaldi. 444-451 [doi]
- Development and Runtime Support for Situation-Aware Application Software in Ubiquitous Computing EnvironmentsStephen S. Yau, Dazhi Huang, Haishan Gong, Siddharth Seth. 452-457 [doi]
- Testing Context-Sensitive Middleware-Based Software ApplicationsT. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Tsong Yueh Chen. 458-466 [doi]
- AdapTIVE: An Intelligent Virtual Environment and Its Application in E-CommerceCássia Trojahn dos Santos, Fernando Santos Osório. 468-473 [doi]
- Identifying and Breaking Necessary Constraints to Web-Based MetacomputingWei Li, W. K. Daniel Pun, Minjie Zhang. 474-479 [doi]
- Multi-Dimension BrowseTsung-Yuan Liu, Yuh-Jzer Joung. 480-485 [doi]
- Coordinating Web Services Using Channel Based CommunicationTheophilos A. Limniotes, George A. Papadopoulos, Farhad Arbab. 486-491 [doi]
- Supporting Concept Assignment in the Comprehension of Web ApplicationsGiuseppe A. Di Lucca, Anna Rita Fasolino, Porfirio Tramontana, Ugo de Carlini. 492-497 [doi]
- Formal Methods for Trustworthy Mobile ComputingHuimin Lin. 500 [doi]
- JART: Grammar-Based Approach to RefactoringTomaz Kosar, Marjan Mernik, Viljem Zumer. 502-507 [doi]
- Extraction and Visualization of Architectural Structure Based on Cross References among Object FilesQiming Teng, Xiangqun Chen, Xia Zhao, Wei Zhu, Lu Zhang. 508-513 [doi]
- Agentification for Web ServicesFeng Chen, Hongji Yang, He Guo, Baowen Xu. 514-519 [doi]
- Software Quality and Agile MethodMing Huo, June M. Verner, Liming Zhu, Muhammad Ali Babar. 520-525 [doi]
- Proof-Guided Testing: An Experimental StudyGuillaume Lussier, Hélène Waeselynck, Karim Guennoun. 528-533 [doi]
- An Approach for Software Reliability Model SelectionCh. Ali Asad, Muhammad Irfan Ullah, Muhammad Jaffar-Ur Rehman. 534-539 [doi]
- An Integrated Software Development Environment with XML Internal RepresentationChih-Hung Chang, William C. Chu, Chih-Wei Lu, Don-Lin Yang. 540-545 [doi]
- An Approach to Generate the Thin-Threads from the UML DiagramsXiaoqing Bai, Chiou Peng Lam, Huaizhong Li. 546-552 [doi]
- Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed ComputingWei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin Cao, Hai Huang. 554-559 [doi]
- A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth DistributionKon Papazis, Naveen K. Chilamkurti, Ben Soh. 560-565 [doi]
- Study on Performance of IP-SWAN Based on Distributed NS-RAIDBaojiang Cui, Jun Liu, Gang Wang, Jing Liu. 566-571 [doi]
- A Reliable OS Kernel for Smart SensorsZhaohui Wu, Lei Wang, Kougen Zheng. 572-577 [doi]