Abstract is missing.
- Stateflow to Extended Finite Automata TranslationMeng Li, Ratnesh Kumar. 1-6 [doi]
- Adaptive RTP Rate Control MethodUras Tos, Tolga Ayav. 7-12 [doi]
- Fuzzy Control-Based Software Self-Adaptation: A Case Study in Mission Critical SystemsQiliang Yang, Jian Lü, Jianchun Xing, XianPing Tao, Hao Hu, Yang Zou. 13-18 [doi]
- A Sufficient Condition for Parameters Estimation in Dynamic Random TestingJunpeng Lv, Hai Hu, Kai-Yuan Cai. 19-24 [doi]
- A Performance Guarantee Approach for Cloud Applications Based on MonitoringJin Shao, Qianxiang Wang. 25-30 [doi]
- Distributed Monitoring and Adaptation of Multiple QoS in Service-Based SystemsStephen S. Yau, Dazhi Huang. 31-36 [doi]
- Software Fault Localization Based on Centrality MeasuresLing-Zan Zhu, Bei-Bei Yin, Kai-Yuan Cai. 37-42 [doi]
- Future Directions of Software Cybernetics: A Position PaperRon S. Kenett. 43-44 [doi]
- Panel Session: Future Directions of Software CyberneticsStephen S. Yau. 45 [doi]
- Keynote: Mobile Service Evolution und Research Trends in Future InternetKurt Tutschku. 46-47 [doi]
- Policies to Enable Serving Untrusted Services on Alternative (Non-3GPP) and Untrusted Access Networks in EPSRebecca Copeland, Noël Crespi. 48-53 [doi]
- A Framework for the Management of Operator Policies and User Preferences for Service Compositions in the IP Multimedia SubsystemMosiuoa Tsietsi, Alfredo Terzoli, George Wells. 54-61 [doi]
- A Dynamic Host Configuration Protocol Based Service Discovery MechanismStephan Massner, Tom Weber. 62-67 [doi]
- IMS Threat and Attack Surface Analysis Using Common Vulnerability Scoring SystemSami Petäjäsoja, Heikki Kortti, Ari Takanen, Juha-Matti Tirilä. 68-73 [doi]
- End-to-End QoS Model for Mobile WiMAX SystemsSunghyun Cho, Jae-Hyun Kim, Jonghyung Kwun. 74-77 [doi]
- HIVE - Enabling ETSI IMS Plugtests EventsGiulio Maggiore, Julius Mueller, Julien de Chanaud, Andreas Röth. 78-82 [doi]
- IMS/NGN Service Lab: Testbed for Creating Innovative IMS/NGN Service ApplicationsShin-I. ichi Handa, Junnosuke Yamada, Hiroya Minami, Daichi Namikawa, Michio Shimomura. 83-88 [doi]
- Demo: Teleweaver - Next Generation Enabler for Rural Telecentres and Access NodesMosiuoa Tsietsi. 89 [doi]
- Detecting Code Injection Attacks in Internet ExplorerBlake Anderson, Daniel Quist, Terran Lane. 90-95 [doi]
- Test-Driving Static Analysis Tools in Search of C Code VulnerabilitiesGeorge Chatzieleftheriou, Panagiotis Katsaros. 96-103 [doi]
- Injecting Comments to Detect JavaScript Code Injection AttacksHossain Shahriar, Mohammad Zulkernine. 104-109 [doi]
- Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of ConceptJonathan J. Blount, Daniel R. Tauritz, Samuel A. Mulder. 110-115 [doi]
- Impact of Adding Security to Safety-Critical Real-Time Systems: A Case StudyAndrew J. Kornecki, Wendy F. Stevenson. 116-121 [doi]
- Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc EnvironmentsAlexander D. Kent, Lorie M. Liebrock. 122-127 [doi]
- The Security Cost of Content Distribution Network ArchitecturesPaul Giura, Gustavo de los Reyes. 128-135 [doi]
- Dealing with Test Automation Debt at MicrosoftJean Hartmann. 136 [doi]
- Automated Test Case Generation for Web Applications from a Domain Specific ModelArne-Michael Törsel. 137-142 [doi]
- Petri Net Based Verification of Causal Dependencies in Electronic Control Unit Test CasesSebastian Thiel, Frank Derichsweiler. 143-148 [doi]
- Interface-Based Automated Testing for Open Software ArchitectureXiaoying Bai, Hao Lu, Yao Zhang, Renwei Zhang, Linping Hu, Hong Ye. 149-154 [doi]
- Achieving High Branch Coverage with Fewer PathsYu Dong, Mengxiang Lin, Kai Yu, Yi Zhou, Yin-li Chen. 155-160 [doi]
- Error-Based Software Testing and AnalysisWilliam E. Howden. 161-167 [doi]
- Specification and Verification of Time Properties in Distributed Automation Systems during Test Planning PhaseSilvije Jovalekic, Tri Nguyen. 168-173 [doi]
- Towards Rapid Creation of Test Adaptation in On-line Model-Based TestingKim Nylund, Erik Östman, Dragos Truscan, Risto Teittinen. 174-179 [doi]
- Statistical Evaluation of Test Sets Using Mutation AnalysisFevzi Belli, Mutlu Beyazit, Axel Hollmann, Nevin Güler. 180-183 [doi]
- Mutation Analysis of Magento for Evaluating Threat Model-Based Security TestingLijo Thomas, Weifeng Xu, Dianxiang Xu. 184-189 [doi]
- An Improved Technique of Fitness Evaluation for Evolutionary TestingSeon Yeol Lee, Hyun Jae Choi, Yeon Ji Jeong, Tae-Ho Kim, Heung Seok Chae, Carl K. Chang. 190-193 [doi]
- IT Simply Works: Simplicity and Embedded Systems DesignTiziana Margaria, Barry D. Floyd, Bernhard Steffen. 194-199 [doi]
- Towards Automatic Reconfiguration of Aviation Software SystemsStefan Burger, Oliver Hummel. 200-205 [doi]
- Predicting Timing Performance of Advanced Mechatronics Control SystemsJeroen Voeten, T. Hendriks, Bart D. Theelen, J. Schuddemat, W. Tabingh Suermondt, J. Gemei, Kees C. Kotterink, C. van Huët. 206-210 [doi]
- A Case Study on SDF-Based Code Generation for ECU Software DevelopmentGuangxin Li, Rong Zhou, Rongqing Li, Weimin He, Guilin Lv, T. John Koo. 211-217 [doi]
- A Burst-Aware Scheduling Scheme Supporting Quality of Service in WiMAX NetworksYa-Yun Cheng, Yaw-Chung Chen. 218-223 [doi]
- Automatic Synthesis and Adaption of Gray-Box Components for Embedded Systems - Reuse vs. OptimizationEtienne Borde, Jan Carlson. 224-229 [doi]
- Specifying Communication Behaviours between Components with Real-Time rCOS - A Case Study ATPDehui Du, Xijiao Xiong. 230-235 [doi]
- A Prototype of Model-Based Design Tool and Its Application in the Development Process of Electronic Control UnitRongqing Li, Rong Zhou, Guangxin Li, Weimin He, Xiaoqian Zhang, T. John Koo. 236-242 [doi]
- A Model Transformation Approach Based on Homomorphic Mappings between UML Activity Diagrams and BPEL4WS Specifications of Grid Service WorkflowsYousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 243-248 [doi]
- Channel Modeling for Wireless Underground Sensor NetworksXiaoya Hu, Chao Gao, Bingwen Wang, Wei Xiong. 249-254 [doi]
- A Combined Workload Planning Approach for Multi-tenant Business ApplicationsChristof Momm, Wolfgang Theilmann. 255-260 [doi]
- A Framework for Resource Allocation Strategies in Cloud Computing EnvironmentM. Asad Arfeen, Krzysztof Pawlikowski, Andreas Willig. 261-266 [doi]
- Towards a Generic Cloud-Based Virtual Research EnvironmentBastian Roth, Robin Hecht, Bernhard Volz, Stefan Jablonski. 267-272 [doi]
- Overlay Cloud Networking through Meta-CodeDag Johansen, Joseph Hurley. 273-278 [doi]
- An Interactive Web-Based Visualization Tool: Design and Development CyclesBahtijar Vogel. 279-285 [doi]
- Using Web Search Results and Genetic Algorithm to Improve the Accuracy of Chinese Spam Email FiltersKai-Shin Lu, Carl K. Chang. 286-291 [doi]
- An Approach to Explore Mobile Software Engineering Advances in Cloud Computing EnvironmentWeider D. Yu, Hongbin Yuan. 292-297 [doi]
- SLA-Aware Application Deployment and Resource Allocation in CloudsVincent C. Emeakaroha, Ivona Brandic, Michael Maurer, Ivan Breskovic. 298-303 [doi]
- Model-Based Scheduling Analysis for Software ProjectsFrank Padberg, David Weiss. 304-309 [doi]
- Software Reliability Model with Coxian Distribution of Length of Intervals between Errors Detection and Fixing MomentsVladimir P. Bubnov, Anatoly D. Khomonenko, Alexey V. Tyrva. 310-314 [doi]
- An Approach for Evaluating the Effectiveness of Design Patterns in Software EvolutionNien-Lin Hsueh, Lin-Chieh Wen, Der-Hong Ting, William C. Chu, Chih-Hung Chang, Chorng-Shiuh Koong. 315-320 [doi]
- Aspect-Oriented Security and Exception Handling within an Object Oriented SystemRichard Millham, Evans Dogbe. 321-326 [doi]
- Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing TechniquesHaruhiko Kaiya, Kenichiro Hara, Kyotaro Kobayashi, Akira Osada, Kenji Kaijiri. 327-334 [doi]
- A Lightweight Component-Based Development Approach for Enterprise ApplicationsJingang Zhou, Dazhe Zhao, Jiren Liu. 335-340 [doi]
- A Scenario-Based Approach for Requirements Elicitation for Software Systems Complying with the Utilization of Ubiquitous Computing TechnologiesMohammed Alawairdhi, Eisa Aleisa. 341-344 [doi]
- XML-Based Reusable Component Repository for Embedded SoftwareChih-Hung Chang, Chih-Wei Lu, William C. Chu, Chao-Tung Yang, Pao-Ann Hsiung, Nien-Lin Hsueh, Chorng-Shiuh Koong, Kuei-Kai Shao. 345-350 [doi]
- Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive ApplicationsZakwan Jaroucheh, Xiaodong Liu, Sally Smith, Huiqun Zhao. 351-355 [doi]
- Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based SystemsHuanyin Yi, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Aditya P. Mathur. 356-361 [doi]
- Detecting Artifact Anomalies in Temporal Structured Workflow as Reusable AssetsHwai-jung Hsu, Feng-Jian Wang. 362-367 [doi]
- Towards an Engineering Approach to File Carver ConstructionLeon Aronson, Jeroen van den Bos. 368-373 [doi]
- Protection of Intellectual Property in Web Communities by Modular Digital WatermarkingSvetozar Ilchev, Zlatoliliya Ilcheva. 374-379 [doi]
- A Functional Approach to Agent Development: Research AgendaAlex Muscar, Costin Badica. 380-385 [doi]
- Finding Suitable Course Material through a Semantic Search Agent for Learning Management Systems of Distance EducationDuygu Çelik, Atilla Elçi, Eray Elverici. 386-391 [doi]
- Expressiveness Considerations of XML SignaturesMeiko Jensen, Christopher Meyer. 392-397 [doi]
- Business Process as a Service: Chances for Remote AuditingRafael Accorsi. 398-403 [doi]
- A Privacy Preserving Reputation Protocol for Web Service Provider SelectionOmar Hasan, Lionel Brunie, Ernesto Damiani. 404-409 [doi]
- Medical Technology in Smart Homes: Exploring the User's Perspective on Privacy, Intimacy and TrustMartina Ziefle, Carsten Röcker, Andreas Holzinger. 410-415 [doi]
- Formal Approaches to Mode Conversion and Positioning for Vehicle SystemWen Su, Fan Yang, Xiaofeng Wu, Jian Guo, Huibiao Zhu. 416-421 [doi]
- Service Modeling: A Model Based Approach for Business and It AlignmentVedran Hrgovcic, Wilfrid Utz, Dimitris Karagiannis. 422-427 [doi]
- Improving Query Suggestion for Digital LibrariesLemen Chao, Yong Zhang, Chunxiao Xing. 428-434 [doi]
- Interoperable Spatial Information System Architecture Based on Ubiqiutous ID InfrastructureShinsuke Kobayashi, Yukihiko Shigesada, Noboru Koshizuka, Ken Sakamura. 435-440 [doi]
- An Intelligent Information System for Maternal and Child Health CareLei Chen, Ji-Jiang Yang, Qing Wang, Ming-yu Wang. 441-445 [doi]
- Analyzing the Digital Home's Quality of ServiceAntonin Chazalet, Sébastien Bolle, Serge Martin. 446-451 [doi]
- Optimized Service Discovery Using QoS Based Ranking: A Fuzzy Clustering and Particle Swarm Optimization ApproachRajni Mohana, Deepak Dahiya. 452-457 [doi]
- Goal-Driven Adaptation of Service-Based Systems from Runtime Monitoring DataXavier Franch, Paul Grünbacher, Marc Oriol, Benedikt Burgstaller, Deepak Dhungana, Lidia López, Jordi Marco, João Pimentel. 458-463 [doi]
- Reconciling Requirements and Implementation via Reengineering for Context-Aware Service EvolutionJianchu Huang, Hongji Yang, Lei Liu. 464-469 [doi]
- The Influence of Context on Intentional ServiceSalma Najar, Manuele Kirsch-Pinheiro, Carine Souveyet. 470-475 [doi]
- Matching User Requirements with Query Formulations in Intentional Service Oriented ComputingSaïd Assar, Kadan Aljoumaa. 476-481 [doi]
- Considering Technology Representation in Service-Oriented Business ModelsEliel Morales, Xavier Franch, Alicia Martínez, Hugo Estrada. 482-487 [doi]
- Augmenting Cloud Requirements Engineering with Meta-ServicesRainer Schmidt. 488-493 [doi]
- Conceptualisation of Hybrid Service Models: An Open Models ApproachWilfrid Utz, Robert Woitsch, Dimitris Karagiannis. 494-499 [doi]
- Spectrum Analysis for Software Quality Requirements Using Analyses RecordsHaruhiko Kaiya, Shunichi Suzuki, Toru Ogawa, Masaaki Tanigawa, Masahiro Umemura, Kenji Kaijiri. 500-503 [doi]
- Identifying Service Requirements in Solution and Infrastructure Improvement ProjectsXiping Song, Beatrice Hwong. 504-505 [doi]
- On the Consensus-Based Application of Fault Localization TechniquesVidroha Debroy, W. Eric Wong. 506-511 [doi]
- Debugging DebuggingKinsun Tam. 512-515 [doi]
- Tracing Static Fields of Embedded Parallel Java ApplicationsSascha Uhrig. 516-519 [doi]