Abstract is missing.
- Requirements Engineering Needs in a Solution and Infrastructure Improvement ProjectXiping Song, William Sherman, Beatrice Hwong, Brian Berenbach, Gilberto Matos. 1-2 [doi]
- A Privacy Enhancing Approach for Identity Inference Protection in Location-Based ServicesChowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Mohammad Tanviruzzaman. 1-10 [doi]
- Rediscovering Zachman Framework Using Ontology from a Requirement Engineering PerspectiveZhuozhi Chen, Rob Pooley. 3-8 [doi]
- A Scenario-Based Architecture Evaluation Framework for Network Enabled CapabilityColin C. Venters, Duncan Russell, Lu Liu, Zongyang Luo, David Webster, Jie Xu. 9-12 [doi]
- ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy SystemsMehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan. 11-20 [doi]
- Decomposition and Traceability in Software DesignHung-Fu Chang, Stephen C. Y. Lu. 13-18 [doi]
- Panel on Requirements Engineering for ServicesColette Rolland. 19-24 [doi]
- Improvements for 802.11-Based Location Fingerprinting SystemsHendrik Lemelson, Stephan Kopf, Thomas King, Wolfgang Effelsberg. 21-28 [doi]
- Variable Support Based Association Rule MiningRajul Anand, Ravi Agrawal, Joydip Dhar. 25-30 [doi]
- Enhancing the Scalability of IMS-Based Presence Service for LBS ApplicationsPaolo Bellavista, Antonio Corradi, Luca Foschini. 29-36 [doi]
- Social Graph Generation & Forecasting Using Social Network MiningMarjaneh Safaei, Merve Sahan, Mustafa Ilkan. 31-35 [doi]
- Mobile-Agent Approach for Mobile Code Localization in Ad hoc NetworksYoucef Zafoune, Aïcha Mokhtari, Rushed Kanawati. 36-39 [doi]
- Indoor Navigation on Distributed Stationary Display SystemsPeter Ruppel, Florian Gschwandtner, Corina Kim Schindhelm, Claudia Linnhoff-Popien. 37-44 [doi]
- Implementing an Mobile Agent Platform for M-CommerceXining Li, Guillaume Autran. 40-45 [doi]
- Aspectual Separation of Feature Dependencies for Flexible Feature CompositionKwanwoo Lee, Goetz Botterweck, Steffen Thiel. 45-52 [doi]
- Semantic Web Enabled Composition of Semantic Web ServicesDuygu Çelik, Atilla Elçi. 46-51 [doi]
- An Architecture for Verification of Access Control Policies with Multi Agent System OntologiesFatih Tekbacak, Tugkan Tuglular, Oguz Dikenelli. 52-55 [doi]
- Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down PracticeDong Li, Carl K. Chang. 53-60 [doi]
- OWL Manipulation toward Building Semantic Applications and AgentsPooyan Balouchian, Amin Almassian, Atilla Elçi. 56-61 [doi]
- Transforming a Software Product Company into a Service Business: Case Study at F-SecureMarko Komssi, Marjo Kauppinen, Juho Heiskari, Matti Ropponen. 61-66 [doi]
- Agent-Oriented Middleware for Mobile eLearning ServicesStanimir Stojanov, Veselina Valkanova, Ivan Ganchev, Mairtin O Droma, H. Zedan. 62-66 [doi]
- Viewpoint-Oriented Variability ModelingMike Mannion, Juha Savolainen, Timo Asikainen. 67-72 [doi]
- Real-Time Guarantees in Flexible Advance ReservationsKleopatra Konstanteli, Dimosthenis Kyriazis, Theodora A. Varvarigou, Tommaso Cucinotta, Gaetano Anastasi. 67-72 [doi]
- 3D Support for Business Process SimulationDaniel Eichhorn, Agnes Koschmider, Yu Li, Peter Stürzel, Andreas Oberweis, Ralf Trunko. 73-80 [doi]
- Respecting Temporal Constraints in Virtualised ServicesTommaso Cucinotta, Gaetano Anastasi, Luca Abeni. 73-78 [doi]
- Building an Enterprise Service Bus for Real-Time SOA: A Messaging Middleware StackLuis Garcés-Erice. 79-84 [doi]
- An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web ServicesLijun Mei, W. K. Chan, T. H. Tse, Fei-Ching Kuo. 81-88 [doi]
- A Service Broker Providing Real-Time Telecommunications Services for 3rd Party ServicesNiklas Blum, I. Boldea, Thomas Magedanz, U. Staiger, Horst Stein. 85-91 [doi]
- A Study of Applying Extended PIE Technique to Software Testability AnalysisTsung-Han Tsai, Chin-Yu Huang, Jun-Ru Chang. 89-98 [doi]
- A Complex Event Routing Infrastructure for Distributed SystemsGabe Wishnie, Hossein Saiedian. 92-95 [doi]
- Universal and Extensible Service-Oriented Platform Feasibility and Experience: The Service Abstract MachineJacky Estublier, Eric Simon. 96-103 [doi]
- How Well Do Test Case Prioritization Techniques Support Statistical Fault LocalizationBo Jiang, Zhenyu Zhang, T. H. Tse, Tsong Yueh Chen. 99-106 [doi]
- A Survey of Physiological Monitoring Data Models to Support the Service of Critical CareCarolyn McGregor, Kathleen P. Smith. 104-109 [doi]
- Automatic Discovery of Web Services Based on Dynamic Black-Box TestingYoungki Park, Woosung Jung, Byungjeong Lee, Chisu Wu. 107-114 [doi]
- Microcontroller-Based AWGNG for Security Enhancement of Embedded Real-Time Web ServicesBehnam Rahnama, Atilla Elçi, Ramin Bakhshi, Alirad Malek, Arjang Ahmadi. 110-115 [doi]
- An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing TechniqueSiripol Noikajana, Taratip Suwannasart. 115-123 [doi]
- Clustering Versus Shared Nothing: A Case StudyJonathan Lifflancer, Adam McDonald, Orest Pilskalns. 116-121 [doi]
- Toward a Smart Cyber-Physical Space: A Context-Sensitive Resource-Explicit Service ModelJian Huang, Farokh B. Bastani, I-Ling Yen, Jun-Jang Jeng. 122-127 [doi]
- An Economical Approach to Usability TestingCarl J. Mueller, Dan E. Tamir, Oleg V. Komogortsev, Liam Feldman. 124-129 [doi]
- Towards Self-Manageable Cloud ServicesIvona Brandic. 128-133 [doi]
- A Sentence Generation Algorithm for Testing GrammarsLixiao Zheng, Duanyi Wu. 130-135 [doi]
- Dynamic Service and Data Migration in the CloudsWei Hao, I-Ling Yen, Bhavani M. Thuraisingham. 134-139 [doi]
- Software Input Space Modeling with Constraints among ParametersSergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poore. 136-141 [doi]
- An OSGi Based In-vehicle Gateway Platform Architecture for Improved Sensor Extensibility and InteroperabilityPyungsun Park, Hongbin Yim, Heeseok Moon, Jaeil Jung. 140-147 [doi]
- HEAT: An Integrated Static and Dynamic Approach for Thread Escape AnalysisQichang Chen, Liqiang Wang, Zijiang Yang. 142-147 [doi]
- Performance Impact Analysis of Two Generic Group Communication APIsLeandro Sales, Henrique Teofilo, Jonathan D Orleans, Nabor C. Mendonça, Rafael G. Barbosa, Fernando Trinta. 148-153 [doi]
- Practical Extensions of a Randomized Testing ToolHojun Jaygarl, Carl K. Chang, Sunghun Kim. 148-153 [doi]
- Middleware for RFID Systems: An OverviewJameela Al-Jaroodi, Junaid Aziz, Nader Mohamed. 154-159 [doi]
- Asynchronous Input-Output Conformance TestingMartin Weiglhofer, Franz Wotawa. 154-159 [doi]
- Ubá: A Software Product Line Architecture for Grid-Oriented MiddlewareDavi Oliveira, Nelson Rosa. 160-165 [doi]
- Towards a Theory for Testing Non-terminating ProgramsArnaud Gotlieb, Matthieu Petit. 160-165 [doi]
- Design of MIDA, a Web-Based Diagnostic Application for Hydroelectric GeneratorsLuc Vouligny, Claude Hudon, Duc Ngoc Nguyen. 166-171 [doi]
- Towards Call for Testing: An Application to User Acceptance Testing of Web ApplicationsLian Yu, Wei Zhao, Xiaofeng Di, Changzhu Kong, Wenbo Zhao, Qianxiang Wang, Jun Zhu. 166-171 [doi]
- An Algorithm for Mining Frequent Items on Data Stream Using Fading FactorLing Chen, Shan Zhang, Li Tu. 172-177 [doi]
- Towards Improving OCL-Based Descriptions of Software MetricsTae Yeon Kim, Yun Kyu Kim, Heung Seok Chae. 172-179 [doi]
- Impacts Separation Framework for Performance Prediction of Middleware-Based SystemsXiang Huang, Wenbo Zhang, Bo Zhang, Jun Wei. 178-187 [doi]
- Modeling and Predicting Software Failure CostsMichael Grottke, Christian A. Graf. 180-189 [doi]
- Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc NetworksRajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens. 188-193 [doi]
- A Service Discovery System Analyzed with a Queueing Theory ModelBeihong Jin, Haibin Weng, Yunfeng Wen, Faen Zhang. 190-198 [doi]
- A Contextual Guidance Approach to Software SecurityPhilipp Schügerl, David Walsh, Juergen Rilling, Philippe Charland. 194-199 [doi]
- A Hierarchical Reliability Model of Service-Based Software SystemLijun Wang, Xiaoying Bai, Lizhu Zhou, Yinong Chen. 199-208 [doi]
- AlertMe: A Semantics-Based Context-Aware Notification SystemAsterios Leonidis, George Baryannis, Xenofon Fafoutis, Maria Korozi, Niki Gazoni, Michail Dimitriou, Maria Koutsogiannaki, Aikaterini Boutsika, Myron Papadakis, Haridimos Papagiannakis, George Tesseris, Emmanouil Voskakis, Antonis Bikakis, Grigoris Antoniou. 200-205 [doi]
- A Quality-Aware Context Middleware Specification for Context-Aware ComputingYuanping Li, Ling Feng. 206-211 [doi]
- Applicability of Software Reliability Growth Modeling in the Quality Assurance Phase of a Large Business Software VendorArne Beckhaus, Lars M. Karg, Gerrit Hanselmann. 209-215 [doi]
- Context Analysis of Intensional LanguagesWeichang Du, Khaled Ben Hamed. 212-217 [doi]
- Towards Transaction-Based Reliable Service CompositionsChang-ai Sun. 216-221 [doi]
- Distributed Eductive Execution of Hybrid Intensional ProgramsJoey Paquet. 218-224 [doi]
- Toward Middleware-Based Online Application MigrationFang Deng, Qianxiang Wang, Jin Shao. 222-227 [doi]
- Relaxed Objects - Object Model for Context-Aware ApplicationsMichal Kopecky, Michal Zemlicka. 225-230 [doi]
- Tool Support for Design Pattern Recognition at Model LevelHong Zhu, Ian Bayley, Lijun Shan, Richard Amphlett. 228-233 [doi]
- Cartesian Programming: The TransLucid Programming LanguageJohn Plaice, Blanca Mancilla. 231-236 [doi]
- Predicting Change Impact in Object-Oriented Applications with Bayesian NetworksM. K. Abdi, Hakim Lounis, Houari A. Sahraoui. 234-239 [doi]
- Declarative Multithreaded ProgrammingBlanca Mancilla, John Plaice. 237-242 [doi]
- Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation SystemsXiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong. 240-245 [doi]
- Formal Analysis of Services CompatibilityXueqiang Gong, Jing Liu, Miaomiao Zhang, Jueliang Hu. 243-248 [doi]
- Computing Reputation for Collaborative Private NetworksJordi Nin, Barbara Carminati, Elena Ferrari, Vicenç Torra. 246-253 [doi]
- A Perspective on Middleware-Oriented Context-Aware Pervasive SystemsZakwan Jaroucheh, Xiaodong Liu, Sally Smith. 249-254 [doi]
- Towards the Operational Semantics of User-Centric Communication ModelsYingbo Wang, Yali Wu, Andrew A. Allen, Barbara Espinoza, Peter J. Clarke, Yi Deng. 254-262 [doi]
- Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and DesignJerry Overton, Jon G. Hall, Lucia Rapanotti, Yijun Yu. 255-260 [doi]
- A Model-Driven Multicore Software Development Environment for Embedded SystemChihhsiong Shih, Chien-Ting Wu, Cheng-Yao Lin, Pao-Ann Hsiung, Nien-Lin Hsueh, Chih-Hung Chang, Chorng-Shiuh Koong, William C. Chu. 261-268 [doi]
- Software Outsourcing Subcontracting and Its Impacts: An Exploratory InvestigationYi Wang, Huihui Shi. 263-270 [doi]
- Photon: A Domain-Specific Language for Testing Converged ApplicationsAnne Miller, Balaji Kumar, Anukul Singhal. 269-274 [doi]
- Leveraging Social Contacts for Message Confidentiality in Delay Tolerant NetworksKarim M. El Defrawy, John Solis, Gene Tsudik. 271-279 [doi]
- Using Artifact Flow Diagrams to Model Artifact Usage AnomaliesHwai-jung Hsu, Feng-Jian Wang. 275-280 [doi]
- Hot Set Identification for Social Network ApplicationsClaudia Canali, Michele Colajanni, Riccardo Lancellotti. 280-285 [doi]
- Dual-Container: Extending the EJB2.x Container to Support EJB3.0Ziyou Wang, Minghui Zhou, Donggang Cao, Haiyan Zhao. 281-286 [doi]
- An Agent-Based Framework Supporting Trust Evaluation for Service SelectionManling Zhu, Zhi Jin. 286-291 [doi]
- Best Principles in the Design of Shared SoftwareDino Konstantopoulos, John Marien, Mike Pinkerton, Eric Braude. 287-292 [doi]
- A Framework for Enabling User-Controlled Persona in Online Social NetworksDongwan Shin, Rodrigo Lopes, William Claycomb, Gail-Joon Ahn. 292-297 [doi]
- Domain Analysis in the Reengineering Process of a COBOL SystemRichard Millham, Hongji Yang. 293-299 [doi]
- ACaMES: A Novel Design Methodology on Multicore Embedded SystemYoungsam Shin, SeungWon Lee. 298-304 [doi]
- A Business-Logic Based Framework for Evolving Software SystemsMohammed Alawairdhi, Hongji Yang. 300-305 [doi]
- ESIDE: An Integrated Development Environment for Component-Based Embedded SystemsNicholas T. Pilkington, Juncao Li, Fei Xie. 305-314 [doi]
- A Constraint Based Bug Checking Approach for PythonLin Chen, Baowen Xu, Tianlin Zhou, Xiaoyu Zhou. 306-311 [doi]
- Agent Protection Based on the Use of Cryptographic HardwareAntonio Muñoz, Antonio Maña, Rajesh Harjani, Marioli Montenegro. 312-317 [doi]
- Formalization and Verification of PLC Timers in CoqHai Wan, Gang Chen, Xiaoyu Song, Ming Gu. 315-323 [doi]
- Towards Usable Solutions to Graphical Password Hotspot ProblemKemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Hakan Gurbaslar, Burak Erdeniz. 318-323 [doi]
- System Safety Requirements as Control StructuresZhe Chen, Gilles Motet. 324-331 [doi]
- On Information Flow Forensics in Business Application ScenariosClaus Wonnemann, Rafael Accorsi, Günter Müller. 324-328 [doi]
- An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based SystemsZhengping Wu, Lifeng Wang. 329-334 [doi]
- Improving E-Government through Benefit Analysis and Value ModelingGustaf Juell-Skielse, Erik Perjons. 332-339 [doi]
- A Model for Privacy Policy VisualizationKambiz Ghazinour, Maryam Majedi, Ken Barker. 335-340 [doi]
- Traceability ReARMedJörn David, Maximilian Koegel, Helmut Naughton, Jonas Helming. 340-348 [doi]
- The Security Implication of Multiple Observers in a Distributed SystemDerek P. Ditch, Bruce M. McMillin. 341-346 [doi]
- Defending Battery Exhaustion Attacks on Mobile SystemsSungyong Shin, Taek Lee, Hoh Peter In. 347-352 [doi]
- Towards a Design Method Supporting the Alignment between Business and Software ServicesSophie Ramel, Eric Grandry, Eric Dubois. 349-354 [doi]
- On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure SoftwareMuhammad Umair Ahmed Khan, Mohammad Zulkernine. 353-358 [doi]
- A Framework for Cost Sensitive Assessment of Intrusion Response SelectionChris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong. 355-360 [doi]
- A Cooperative Framework of Service Chain for Digital LibraryHuang Meng-xing, Xing Chun-Xiao, Yang Ji-jiang. 359-364 [doi]
- Applying PageRank Algorithm in Requirement Concern Impact AnalysisYing Jin, Jing Zhang, Pengfei Ma, Weiping Hao, Shutong Luo, Zepeng Li. 361-366 [doi]
- A Specialized Meta-scheduler for Business and Applications Constraints ManagementJérémie Chevalier, Stéphane Mouton. 365-370 [doi]
- Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat MessagesDongmei Xu, Jun Kurogi, Yoshihide Ohgame, Atsuo Hazeyama. 367-372 [doi]
- Towards Industry-Strength SLA Optimization Capabilities for Service ChainsYang Li. 371-375 [doi]
- Analyzing Semantics of Documents by Using a Program Analysis MethodHiroyuki Sato. 373-382 [doi]
- Matchmaking Using Natural Language Descriptions: Linking Customers with Enterprise Service DescriptionsJoe Geldart, William Song, Yang Li. 376-379 [doi]
- An Investigation of the Role of Service Level Agreements in Classified Advertisement WebsitesAijaz Soomro, William Song, Yang Li. 380-385 [doi]
- Tamper Resistance for Software Defined Radio SoftwareShucai Xiao, Jung Min Park, Yanzhu Ye. 383-391 [doi]
- Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical ImagesFred Cohen. 386-391 [doi]
- PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified WormsZhenyun Zhuang, Ying Li, Zesheng Chen. 392-399 [doi]
- A Method for Historical Ext3 Inode to Filename Translation on HoneypotsKevin D. Fairbanks, Ying H. Xia, Henry L. Owen III. 392-397 [doi]
- Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?Rafael Accorsi. 398-403 [doi]
- A Multiple Secret Sharing Scheme based on Matrix ProjectionKai Wang, Xukai Zou, Yan Sui. 400-405 [doi]
- Acer Aspire One Netbooks: A Forensic ChallengeAmrit Pal Singh, Michael Lavine, Benjamin Turnbull, Trupti Shiralkar. 404-409 [doi]
- Exploring Security in PROFINET IOJohan Åkerberg, Mats Björkman. 406-412 [doi]
- Penetration Testing for Spam FiltersYugesh Madhavan, João W. Cangussu, Ram Dantu. 410-415 [doi]
- A Static Java Birthmark Based on Control Flow EdgesHyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han. 413-420 [doi]
- Policy Composition Based on Petri NetsHejiao Huang, hélène-kirchner. 416-421 [doi]
- A Secure and Flexible Electronic-Ticket SystemM. Fahim Ferdous Khan, Yashiro Takeshi, Ito So, Masahiro Bessho, Ken Sakamura. 421-426 [doi]
- Verification of Access Control Policies for REA Business ProcessesVahid R. Karimi, Donald D. Cowan. 422-427 [doi]
- Towards a Well Structured and Dynamic Application ServerChao You, Minghui Zhou, Zan Xiao, Hong Mei. 427-434 [doi]
- Towards the Verification of Services CollaborationYue Xie, Dehui Du, Jing Liu, Zuohua Ding. 428-433 [doi]
- Towards Validating Security Protocol Deployment in the WildLuca Compagna, Ulrich Flegel, Volkmar Lotz. 434-438 [doi]
- ProtoTalk: A Generative Software Engineering Framework for Prototyping Protocols in SmalltalkAli Razavi, Kostas Kontogiannis. 435-442 [doi]
- On a Classification Approach for SOA VulnerabilitiesLutz Lowis, Rafael Accorsi. 439-444 [doi]
- Usage History-Based Architectural SchedulingDongsun Kim, Seokhwan Kim, Sooyong Park. 443-451 [doi]
- SN2K Attacks and Honest ServicesAshish Kundu. 445-450 [doi]
- PhishCatch - A Phishing Detection ToolWeider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani. 451-456 [doi]
- Software Methodologies for the Engineering of Service-Oriented Industrial Automation: The Continuum ProjectJ. Marco Mendes, Axel Bepperling, João Pinto, Paulo Leitão, Francisco Restivo, Armando W. Colombo. 452-459 [doi]
- Adaptive Control Framework for Software Components: Case-Based Reasoning ApproachMykola V. Tkachuk, Sergii Polkovnikov, Sergiy Bronin. 457-461 [doi]
- Towards a Next-Generation Matrix Library for JavaHolger Arndt, Markus Bundschus, Andreas Naegele. 460-467 [doi]
- Modeling Simulink Diagrams Using Input/Output Extended Finite AutomataChangyan Zhou, Ratnesh Kumar. 462-467 [doi]
- Towards Dynamic Component Updating: A Flexible and Lightweight ApproachZan Xiao, Donggang Cao, Chao You, Minghui Zhou, Hong Mei. 468-473 [doi]
- T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber SecurityGregory S. Thomas, Bill Nickless, David R. Thiede, Ian Gorton, Bill J. Pitre, Jason E. Christy, Liz Faultersack, Jeffery A. Mauth. 468-472 [doi]
- A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS)Chang Liu, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau. 473-478 [doi]
- Design of Service Component Layer in SOA Reference ArchitectureLiang-Jie Zhang, Jia Zhang. 474-479 [doi]
- Prevention of Sequential Message Loss in CAN SystemsShengbing Jiang, Ratnesh Kumar. 479-484 [doi]
- The Design and Implementation of a Bare PC Email ServerGeorge H. Ford Jr., Ramesh K. Karne, Alexander L. Wijesinha, Patrick Appiah-Kubi. 480-485 [doi]
- Risk-Based Adaptive Group Testing of Semantic Web ServicesXiaoying Bai, Ron S. Kenett. 485-490 [doi]
- Service Identification via Ontology MappingFeng Chen, Zhuopeng Zhang, Jianzhi Li, Jian Kang, Hongji Yang. 486-491 [doi]
- Optimizing Component-Based Embedded SoftwareOlivier Lobry, Juan Navas, Jean-Philippe Babau. 491-496 [doi]
- Towards Passive RFID EventWei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang. 492-499 [doi]
- Towards a Unified Behavioral Model for Component-Based and Service-Oriented SystemsAida Causevic, Aneta Vulgarakis. 497-503 [doi]
- Estimating Rate of Queue Usage to Differentiate Cause of Packet Loss in Multi-hop Wireless NetworksMi-Young Park, Sang-Hwa Chung, Prasanthi Sreekumari. 500-508 [doi]
- Testing with Large Parameter Sets for the Development of Embedded Systems in the Automation DomainFlorian Kantz, Thomas Ruschival, Philipp Nenninger, Detlef Streitferdt. 504-509 [doi]
- Deployment of Services Applications in Services Execution EnvironmentsAntonin Chazalet, Philippe Lalanda. 509-516 [doi]
- Transformational Specification of Complex Legacy Real-Time Systems via Semantic AnchoringYue Lu, Antonio Cicchetti, Stefan Bygde, Johan Kraft, Christer Norström. 510-515 [doi]
- An Integrative Approach for Embedded Software Design with UML and SimulinkTibor Farkas, Carsten Neumann, Andreas Hinnerichs. 516-521 [doi]
- An Overlay-Based Resource Monitoring Scheme for Social Applications in MANETKyungman Kwak, Gonzalo Huerta Cánepa, Yangwoo Ko, Dongman Lee, Soon J. Hyun. 517-524 [doi]
- State of the Art in Using Agile Methods for Embedded Systems DevelopmentJayakanth Srinivasan, Radu Dobrin, Kristina Lundqvist. 522-527 [doi]
- More Tales of Clouds: Software Engineering Research Issues from the Cloud Application PerspectiveLijun Mei, Zhenyu Zhang, W. K. Chan. 525-530 [doi]
- Test Case Mutation in Hybrid State Space for Reduction of No-Fault-Found Test Results in the Industrial Automation DomainThomas Ruschival, Philipp Nenninger, Florian Kantz, Detlef Streitferdt. 528-533 [doi]
- Shift Hashing for Memory-Constrained ApplicationsSushamna Deodhar, Alan L. Tharp. 531-536 [doi]
- Transaction Level Control for Application Execution on the SegBus PlatformTiberiu Seceleanu, Ivica Crnkovic, Cristina Cerschi Seceleanu. 537-542 [doi]
- GUI-Based Testing of Boundary Overflow VulnerabilityTugkan Tuglular, Can A. Muftuoglu, Ozgur Kaya, Fevzi Belli, Michael Linschulte. 539-544 [doi]
- A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFIDJiaqi Zhu, Yu Huang, Hanpin Wang. 543-552 [doi]
- Test Selection Prioritization StrategyRajesh Subramanyan, Christof J. Budnik. 545-549 [doi]
- Automatic Testing of Program Security VulnerabilitiesHossain Shahriar, Mohammad Zulkernine. 550-555 [doi]
- Translation-Based Model Checking for PLC ProgramsMin Zhou, Fei He, Ming Gu, Xiaoyu Song. 553-562 [doi]
- A New Mutation Analysis Method for Testing Java Exception HandlingChangbin Ji, Zhenyu Chen, Baowen Xu, Ziyuan Wang. 556-561 [doi]
- Modular Certification of Low-Level Intermediate Representation ProgramsYuan Dong, Shengyuan Wang, Liwei Zhang, Ping Yang. 563-570 [doi]
- Integrating System Modeling with Project Management - A Case StudyJonas Helming, Jörn David, Maximilian Koegel, Helmut Naughton. 571-578 [doi]
- Efficient Temporal Blocking for Stencil Computations by Multicore-Aware Wavefront ParallelizationGerhard Wellein, Georg Hager, Thomas Zeiser, Markus Wittmann, Holger Fehske. 579-586 [doi]
- Extensions for Integrated Queries on Heterogeneous Semantic Web ResourcesCheng-Zen Yang, Ing-Xiang Chen, Jia-Da Ye. 587-592 [doi]
- Swarm Intelligence in the Fine-Tuning of Software Development Cost Estimation ModelsTad Gonsalves, Kei Yamagishi, Kiyoshi Itoh. 593-598
- Temporally Robust Software Features for Authorship AttributionSteven Burrows, Alexandra L. Uitdenbogerd, Andrew Turpin. 599-606 [doi]
- An Augmented Social Interactive Learning Approach through Web2.0Li Jin, Zhigang Wen. 607-611 [doi]
- RHE: A Lightweight JVM Instructional ToolShaoshan Liu, Chengrui Deng, Xiao-Feng Li, Jean-Luc Gaudiot. 612-619 [doi]
- The Java Data Mining Package - A Data Processing Library for JavaHolger Arndt. 620-621 [doi]
- Toward the Design of Robotic Software with Verifiable SafetyChih-Hong Cheng, Markus Rickert, Christian Buckl, Edward A. Lee, Alois Knoll. 622-623 [doi]
- A Systematic Robot Fault-Tolerance ApproachBingu Shim, Beomho Baek, Sooyong Park. 624-625 [doi]
- Generation of Pairwise Test Sets Using a Genetic AlgorithmJames D. McCaffrey. 626-631 [doi]
- An Ontology-Based Approach for GUI TestingHan Li, Feng Chen, Hongji Yang, He Guo, William Cheng-Chung Chu, Yuansheng Yang. 632-633 [doi]
- A Fine-Grained Privacy Structure for Service-Oriented ArchitectureDavid S. Allison, Hany F. El Yamany, Miriam A. M. Capretz. 634-635 [doi]
- A Multi-model Process Improvement Methodology Driven by Capability ProfilesClenio F. Salviano. 636-637 [doi]
- On Model Transformation ReuseXiao He, Zhiyi Ma, Yan Zhang, Weizhong Shao. 638-639 [doi]
- Requirement Risk Assessment Focused-On Stakeholder Risk AnalysisXiaohong Li, Qiang Liu. 640-641 [doi]
- Industrial Opinion on the Effectiveness of Risk Management MethodsMira Kajko-Mattsson, Jan Lundholm, Jonas Norrby. 642-643 [doi]
- A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering WorkNancy R. Mead, Antonio Drommi, Daniel Shoemaker, Jeffrey A. Ingalsbe. 644-645 [doi]
- Industrial Report: Data Reengineering of COBOL Sequential Legacy SystemsRichard Millham, Hongji Yang. 646-647 [doi]
- Dihomotopic Reduction Used in Deadlock DetectionDavid A. Cape, Bruce M. McMillin. 648-651 [doi]
- Towards a Resource-Aware Component Model for Embedded SystemsAneta Vulgarakis. 652-655 [doi]
- Efficient Management of Consistent Backups in a Distributed File SystemJan Stender. 656-659 [doi]
- Model-Checking BNDC Properties in Cyber-Physical SystemsRavi Akella, Bruce M. McMillin. 660-663 [doi]
- On Expressing Different Concurrency Paradigms on Virtual Execution SystemsCristian Dittamo. 664-667 [doi]
- A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral ResearchJing Lin, Sahra Sedigh, Ann Miller. 668-671 [doi]
- Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral ResearchAyman Z. Faza, Sahra Sedigh, Bruce M. McMillin. 672-675 [doi]
- An Integrated Framework for Checking Concurrency-Related Programming ErrorsQichang Chen, Liqiang Wang. 676-679 [doi]