Abstract is missing.
- Composition of Cyber-Physical SystemsJanos Sztipanovits. 3-6 [doi]
- Generation of Related Performance Simulation Models at an Early Stage in the Design CycleAndreas W. Liehr, Klaus Buchenrieder. 7-14 [doi]
- Formal Architecture Transformation Using HeuristicsCameron Maxwell, Tim O Neill, John Leaney. 15-24 [doi]
- A Case Study: Applying Lyra in Modeling S60 Camera FunctionalityJukka Honkola, Sari Leppänen, Pasi Rinne-Rahkola, Martti Soderlund, Markku Turunen, Kimmo Varpaaniemi. 25-36 [doi]
- Application of Bayesian Networks to Architectural OptimisationArtem Parakhine, Tim O Neill, John Leaney. 37-44 [doi]
- Expanding the View on Complexity within the Architecture Trade-off Analysis MethodDavid Colquitt, John Leaney. 45-54 [doi]
- An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath MitigationJianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. Rozenblit. 55-62 [doi]
- Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--IErnest Cachia, Mark Vella. 63-70 [doi]
- Design and Description of a Classification System Framework for Easier ReuseSérgio Lopes, Adriano Tavares, João L. Monteiro, Carlos A. Silva. 71-82 [doi]
- Patterns for Integrating and Exploiting Some Non-Functional Properties in Hierarchical Software ComponentsHervé Chang, Philippe Collet. 83-92 [doi]
- Component-Based System Integration via (Meta)Model CompositionKrishnakumar Balasubramanian, Douglas C. Schmidt, Zoltan Molnar, Ákos Lédeczi. 93-102 [doi]
- COTS Selection: Past, Present, and FutureAbdallah Mohamed, Günther Ruhe, Armin Eberlein. 103-114 [doi]
- Modern Distributed Data Acquisition and Control Systems Based on OPC TechniquesVu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi. 115-122 [doi]
- Node-Oriented Modeling and Simulation of IP NetworksNanjun Li. 123-132 [doi]
- Transformation of Existing Programs into Autonomic and Self-healing EntitiesM. Muztaba Fuad, Michael J. Oudshoorn. 133-144 [doi]
- Methods of Sensors Localization in Wireless Sensor NetworksZenon Chaczko, Ryszard Klempous, Jan Nikodem, Michal Nikodem. 145-152 [doi]
- Adaptive Misbehavior Detection in Wireless Sensors Network Based on Local Community AgreementRyszard Klempous, Jan Nikodem, Lukasz Radosz, Norbert Raus. 153-160 [doi]
- Design of a Wireless Sensor Network Based Automatic Light Controller in Theater ArtsChuan Feng, Lizhi Yang, Jerzy W. Rozenblit, Peter Beudert. 161-170 [doi]
- Dynamic Scheduling of Skippable Periodic Tasks in Weakly-Hard Real-Time SystemsMaryline Silly-Chetto, Audrey Marchand. 171-177 [doi]
- Time- and Space-Efficient Evaluation of Sparse Boolean Functions in Embedded SoftwareVaclav Dvorak. 178-185 [doi]
- End-User DevelopmentFramework for Embedded System ApplicationsMiroslav Svéda. 186-194 [doi]
- Agile Development Methodology for Embedded Systems: A Platform-Based Design ApproachLucas Cordeiro, Raimundo S. Barreto, Rafael Barcelos, Meuse N. Oliveira Jr., Vicente Lucena, Paulo Romero Martins Maciel. 195-202 [doi]
- Embedded System Modeling Based on Resource-Oriented ModelJin Hyun Kim, Jin-Young Choi. 203-212 [doi]
- Diagnosis of Embedded Software Using Program SpectraPeter Zoeteweij, Rui Abreu, Rob Golsteijn, Arjan J. C. van Gemund. 213-220 [doi]
- Integrating Security Modeling into Embedded System DesignMatthew Eby, Jan Werner, Gabor Karsai, Ákos Lédeczi. 221-228 [doi]
- A Practical Approach for Process Family Engineering of Embedded Control SoftwareCord Giese, Arnd Schnieders, Jens Weiland. 229-240 [doi]
- A Look at Typical Difficulties in Practical Software Development from the Developer Perspective - A Field Study and a First Solution Proposal with UPEXIvonne Erfurth, Wilhelm Rossak. 241-248 [doi]
- Ontological Traceability over the Unified ProcessRodrigo Perozzo Noll, Marcelo Blois Ribeiro. 249-255 [doi]
- A Service-Oriented Extension of the V-Modell XTMichael Meisinger, Ingolf Krüger. 256-268 [doi]
- Selecting Requirements Engineering Techniques Based on Project Attributes--A Case StudyLi Jiang, Armin Eberlein. 269-278 [doi]
- Supporting UML Sequence Diagrams Using a Processor Net ModelTony Spiteri Staines. 279-286 [doi]
- Reconciling Synthesis and Decomposition: A Composite Approach to Capability IdentificationRamya Ravichandar, James D. Arthur, Robert P. Broadwater. 287-298 [doi]
- Model-Based Data Processing with Transient Model ExtensionsMichael Thonhauser, Gernot Schmoelzer, Christian Kreiner. 299-306 [doi]
- Model-Driven Engineering for Development-Time QoS Validation of Component-Based Software SystemsJames H. Hill, Sumant Tambe, Aniruddha S. Gokhale. 307-316 [doi]
- A Partitioning Analysis of the .NET Common Language RuntimeJoshua R. Dick, Kenneth B. Kent, Joseph C. Libby. 317-326 [doi]
- Dimensionality Reduction for the Control of Powered Upper Limb ProsthesesKlaus Buchenrieder. 327-333 [doi]
- Computer Based Psychotherapy for Treatment of Depression andAnxietyByron Purves, David Purves. 334-338 [doi]
- A Hybrid View in a Laparoscopic Surgery Training SystemChuan Feng, Jerzy W. Rozenblit, Allan J. Hamilton. 339-348 [doi]
- Modeling the Functionality of Multi-Functional Software SystemsAlexander Gruler, Alexander Harhurin, Judith Hartmann. 349-358 [doi]
- A Theory for Model-Based Transformation Applied to Computer-Supported Preservation in Digital ArchivesThomas Triebsees, Uwe M. Borghoff. 359-370 [doi]
- DP-Miner: Design Pattern Discovery Using MatrixJing Dong, Dushyant S. Lad, Yajing Zhao. 371-380 [doi]
- Introducing Impact Analysis for Architectural DecisionsMatthias Riebisch, Sven Wohlfarth. 381-392 [doi]
- Reengineering a Legacy Tool for Software EvolutionChia-Chu Chiang. 393-396 [doi]
- I-Navigate: Intelligent, Self-adapting Navigation MapsHerwig Mayr. 397-404 [doi]
- Model-Based Cyber SecurityGalen Rasche, Erin Allwein, Michael S. Moore, Ben Abbott. 405-412 [doi]
- Secure Communication Trees in Ad Hoc NetworksJan Nikodem, Maciej Nikodem. 413-421 [doi]
- A Multi-Tier, Multi-Role Security Framework for E-Commerce SystemsErnest Cachia, Mark Micallef. 422-432 [doi]
- Alert Fusion for a Computer Host Based Intrusion Detection SystemChuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. Rozenblit. 433-440 [doi]
- Behavior Analysis-Based Learning Framework for Host Level Intrusion DetectionHaiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit. 441-447 [doi]
- Engineering Vertical Orchestration: From Biometric Trace Events to Incident ReportingPatricia O Hagan, Edward Hanna, Roy Sterritt, Paul McKay. 448-458 [doi]
- Validation of Component-Based Software with a Customer Centric Domain Level ApproachOliver Skroch. 459-466 [doi]
- Model-Based Empirical Performance Evaluation Based on Relational TracesMarko Boskovic. 467-474 [doi]
- The Strategic Impact of Service Oriented ArchitecturesPhilipp Liegl. 475-484 [doi]
- A Statistical Approach to Model-Based Robustness TestingMiroslav Popovic, Jelena Kovacevic. 485-494 [doi]
- Towards Model-Based Testing with Architecture ModelsStephan Schulz, Jukka Honkola, Antti Huima. 495-502 [doi]
- Testing Time Goal-Driven Requirements with Model Checking TechniquesGregorio Díaz, Elena Navarro, María-Emilia Cambronero, Valentin Valero, Fernando Cuartero. 503-514 [doi]
- Automatic Verification and Performance Analysis of Time-Constrained SysML Activity DiagramsYosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi Hassaïne. 515-522 [doi]
- System Level Performance Assessment of SOC Processors with SystemCClaudio Talarico, Min-Sung Koh, Esteban Rodriguez-Marek. 523-530 [doi]
- Exploring Clause Symmetry in a Distributed Bounded Model Checking AlgorithmHugo Barros, Sérgio Vale Aguiar Campos, Mark A. J. Song, Luis E. Zárate. 531-538 [doi]
- Reasoning about Cryptographic Protocols in Observational TheoriesImen Zaabar, Narjes Berregeb. 539-548 [doi]
- IPOG: A General Strategy for T-Way Software TestingYu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence. 549-556 [doi]
- Model Checking of Computer-Based SystemsJinzhao Wu, Wei Yan. 557-568 [doi]
- Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML ApproachAndrea Schauerhuber, Manuel Wimmer, Wieland Schwinger, Elisabeth Kapsammer, Werner Retschitzegger. 569-576 [doi]
- Evaluating the Quality of Models Extracted from Embedded Real-Time SoftwareJoel Huselius, Johan Kraft, Hans Hansson, Sasikumar Punnekkat. 577-585 [doi]
- Visualisation of Domain-Specific Modelling Languages Using UMLBas Graaf, Arie van Deursen. 586-595 [doi]
- State-Based Modeling to Support the Evolution and Maintenance of Safety-Critical Software Product LinesJing Liu, Josh Dehlinger, Hongyu Sun, Robyn R. Lutz. 596-608 [doi]
- Motion Planning System for Minimally Invasive SurgeryHanees Haniffa, Jerzy W. Rozenblit, Jianfeng Peng, Allan Hamilton, Mohamad Salkini. 609-610 [doi]
- A Process Module to Pre-Process Requirements for ArchitectingMatthias Galster, Armin Eberlein, Mahmood Moussavi. 611-612 [doi]