Abstract is missing.
- Semantic Image Retrieval Model for Sharing Experiences in Social NetworksAsli Apaydin, Duygu Çelik, Atilla Elçi. 1-6 [doi]
- Ontology-Based QoS Queuing Model for Selection of Web Services ServersDuygu Çelik, Atilla Elçi. 7-12 [doi]
- Modeling Cyber-Physical Systems with Semantic AgentsJing Lin, Sahra Sedigh, Ann Miller. 13-18 [doi]
- Towards Reusing ESB Services in Different ESB ArchitecturesIndika Kumara, Chandana Gamage. 25-30 [doi]
- Negotiating Service Requirements among Strategic ActorsTuoye Xu, Tong Li 0001, Lin Liu 0001, Barrett R. Bryant. 31-36 [doi]
- Aspect-Oriented Development of PHP-Based Web ApplicationsShin Nakajima, Keiji Hokamura, Naoyasu Ubayashi. 37-44 [doi]
- Test Sequence Generation from Combining Property Modeling and Program SlicingHua Li, Yong-guang Peng, Xinming Ye, Jing-yuan Yue. 45-50 [doi]
- Software Fault Prediction Models for Web ApplicationsLe Truong Giang, Dongwon Kang, Doo-Hwan Bae. 51-56 [doi]
- The Level of Decomposition Impact on Component Fault ToleranceAtef Mohamed, Mohammad Zulkernine. 57-62 [doi]
- Applied MDA for Embedded Devices: Software Design and Code Generation for a Low-Cost Mobile PhoneMichael Lettner, Michael Tschernuth. 63-68 [doi]
- The Right Tool for the Right Job: Assessing Model Transformation QualityM. F. van Amstel. 69-74 [doi]
- A Model Expansion Method in Schema-Based Model EvolutionTsung Lee, Jhih-Syan Hou. 75-80 [doi]
- COTS Integrations: Effort Estimation Best PracticesKumar P. Anoop Anoop, Sathia Narayanan, Vijayalakshmi Mallenahalli Siddaiah. 81-86 [doi]
- Optimizing Software Quality AssuranceOmar Alshathry, Helge Janicke. 87-92 [doi]
- The Framework of Medical Simulation Education and Evaluation System for Supporting SaaSJia Shang, Ji-Jiang Yang, Qing Wang, Hui Pan. 93-97 [doi]
- A Study of Improving the Accuracy of Software Effort Estimation Using Linearly Weighted CombinationsChao Jung Hsu, Nancy Urbina Rodas, Chin-Yu Huang, Kuan-Li Peng. 98-103 [doi]
- ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to CloudsLi Zhou, Yong Zhang, Chunxiao Xing. 104-108 [doi]
- WS-Sim: A Web Service Simulation Toolset with Realistic Data SupportWei She, I-Ling Yen, Bhavani M. Thuraisingham. 109-114 [doi]
- Analysis of Two Watermarking Protocols Based on Commutative EncryptionMoesfa Soeheila Mohamad, Geong Sen Poh. 115-120 [doi]
- Service Security Analysis Based on i*: An Approach from the Attacker ViewpointTong Li 0001, Lin Liu 0001, Golnaz Elahi, Eric S. K. Yu, Barrett R. Bryant. 127-133 [doi]
- T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant ChipTakeshi Yashiro, Masahiro Bessho, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura. 134-139 [doi]
- Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography ProtocolsAhmed M. Elmisery, Huaiguo Fu. 140-145 [doi]
- Flexible Prime Number Labeling for Resource Limited ClientsDong Chan An, Seog Park. 146-151 [doi]
- Privacy Preserving Outlier Detection Using Hierarchical Clustering MethodsAjay Challagalla, S. S. Shivaji Dhiraj, Durvasula V. L. N. Somayajulu, Toms Shaji Mathew, Saurav Tiwari, Syed Sharique Ahmad. 152-157 [doi]
- Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on CompensationThoshitha T. Gamage, Bruce M. McMillin, Thomas P. Roth. 158-163 [doi]
- Natural Language Watermarking Based on Syntactic Displacement and Morphological DivisionMi-Young Kim, Osmar R. Zaïane, Randy Goebel. 164-169 [doi]
- Semantic Analysis of UML2.0 Sequence Diagram Based on Model TransformationMeixia Zhu, Hanpin Wang, Wei Jin, Zizhen Wang, Chunxiang Xu. 170-175 [doi]
- Environmental Obfuscation of a Cyber Physical System - Vehicle ExampleJason Madden, Bruce M. McMillin, Anik Sinha. 176-181 [doi]
- Optimizing Requirements Elicitation with an i* and Bayesian Network Integrated Modelling ApproachHaochi Wu, Lin Liu 0001, Wenting Ma. 182-188 [doi]
- Delegation Pattern in Workflow SystemHwai-jung Hsu, Feng-Jian Wang. 189-195 [doi]
- Entropy-Based Measures of Heterogeneity of Software Structural ProfileBei-Bei Yin, Ling-Zan Zhu, Kai-Yuan Cai. 196-201 [doi]
- Feedback Control Based Test Case Instantiation for Firewall TestingTugkan Tuglular, Gurcan Gercek. 202-207 [doi]
- Using Coverage Information to Guide Test Case Selection in Adaptive Random TestingZhi Quan Zhou. 208-213 [doi]
- A Parallel Implementation Strategy of Adaptive TestingHai Hu, Chang-Hai Jiang, Feng Ye, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau. 214-219 [doi]
- Natural Language Processing Based Detection of Duplicate Defect PatternsQian Wu, Qianxiang Wang. 220-225 [doi]
- Modeling and Verification of an Automatic Train Protection SystemXijiao Xiong, Jing Liu, Miaomiao Zhang, Zuohua Ding. 226-231 [doi]
- Toward Cloud-Based Key Management for Outsourced DatabasesNadia Bennani, Ernesto Damiani, Stelvio Cimato. 232-236 [doi]
- A Scenario Based Approach for Service IdentificationSuntae Kim, Minseong Kim, Vijayan Sugumaran, Sooyong Park. 237-238 [doi]
- Analyzing Interoperability Requirements for Adaptive Service-Based Applications: A Goal-Oriented ApproachNauman A. Qureshi, Cu D. Nguyen, Anna Perini. 239-244 [doi]
- Requirements and Tools for Variability ManagementMarco Aiello, Pavel Bulanov, Heerko Groefsema. 245-250 [doi]
- A Requirements Maturity Measurement Approach Based on SKLSEWikiRong Peng, Qiang Ye, Mao Ye. 251-254 [doi]
- Stakeholders-Driven Requirements Semantics Acquisition for Networked Software SystemsBin Wen, Peng Liang, Keqing He. 255-258 [doi]
- Loosely-Coupled SOA Service Access ProvisioningSean Gu. 259-262 [doi]
- Elicitation of Goals in Requirements Engineering Using Agile MethodsA. M. Sen, K. Hemachandran. 263-268 [doi]
- A Framework for the Elicitation and Analysis of Information Technology Service Requirements and Their Alignment with Enterprise Business GoalsDidar Zowghi, Zhi Jin. 269-272 [doi]
- Dynamic Analysis for the Reconstruction of System Behavior ModelsVasileios Koutsoumpas, Kostas Kontogiannis, Peter Matthews. 273-280 [doi]
- Author Identification of Software Source Code with Program Dependence GraphsRong Chen, Lina Hong, Chunyan Lü, Wu Deng. 281-286 [doi]
- XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response DeploymentIgors Svecs, Tanmoy Sarkar, Samik Basu, Johnny S. Wong. 287-292 [doi]
- Middleware Support for Mobile Social EcosystemsAlessandra Toninelli, Animesh Pathak, Amir Seyedi, Roberto Speicys Cardoso, Valérie Issarny. 293-298 [doi]
- A Middleware for Personal Smart SpacesManal Al-Bahlal, Jalal Al-Muhtadi. 299-304 [doi]
- Message Oriented Middleware Support for Mobile Ad Hoc Data SharingHongjun Yu, Rong Chen, Zhenjun Du. 305-310 [doi]
- A Context-Aware Meeting Room: Mobile Interaction and Collaboration Using Android, Java ME and Windows MobileTor-Morten Grønli, Jarle Hansen, Gheorghita Ghinea. 311-316 [doi]
- MiRE4OWL: Mobile Rule Engine for OWLTaehun Kim, Insuk Park, Soon J. Hyun, Dongman Lee. 317-322 [doi]
- Supporting Concern-Based Regression Testing and Prioritization in a Model-Driven EnvironmentRoberto Silveira Silva Filho, Christof J. Budnik, William M. Hasling, Monica McKenna, Rajesh Subramanyan. 323-328 [doi]
- Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order ProblemZhengshan Wang, Bixin Li, Lulu Wang, Meng Wang, Xufang Gong. 329-334 [doi]
- Normalized Adaptive Random Test for Integration TestsSeung-Hun Shin, Seung-Kyu Park, Kyung-Hee Choi, Ki-Hyun Jung. 335-340 [doi]
- Performance Testing: Far from Steady StateRajesh K. Mansharamani, Amol Khanapurkar, Benny Mathew, Rajesh Subramanyan. 341-346 [doi]
- An Approach to Regression Test Selection Based on Hierarchical Slicing TechniqueChuanqi Tao, Bixin Li, Xiaobing Sun, Chongfeng Zhang. 347-352 [doi]
- Approximation of CFL by Regular Languages for Concurrent Program VerificationSukhamay Kundu, Supratik Mukhopadhyay. 353-358 [doi]
- An Optimization Strategy for Evolutionary Testing Based on CataclysmMeng Wang, Bixin Li, Zhengshan Wang, Xiaoyuan Xie. 359-364 [doi]
- LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud InfrastructuresIvona Brandic, Vincent C. Emeakaroha, Michael Maurer, Schahram Dustdar, Sandor Acs, Attila Kertész, Gabor Kecskemeti. 365-370 [doi]
- Permission Management System: Permission as a Service in Cloud ComputingVictor Echeverría, Lorie M. Liebrock, Dongwan Shin. 371-375 [doi]
- An Anomaly Detection Framework for Autonomic Management of Compute Cloud SystemsDerek Smith, Qiang Guan, Song Fu. 376-381 [doi]
- The Case for Content Search of VM CloudsMahadev Satyanarayanan, Wolfgang Richter, Glenn Ammons, Jan Harkes, Adam Goode. 382-387 [doi]
- FalconEye: Data Center Status Extraction via Vision Transformation TechniquesKi-Woong Park, Woomin Hwang, Kyu Ho Park. 388-392 [doi]
- SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing EnvironmentsHassan Takabi, James B. D. Joshi, Gail-Joon Ahn. 393-398 [doi]