Abstract is missing.
- Mobile Adventure - Towards 4Generation Mobile SystemHendrik Berndt. 2-2 [doi]
- Component-Based Real-Time Design: Mapping HRT-HOOD to UMLTullio Vardanega, Marco Di Natale, Silvia Mazzini, Massimo D Alessandro. 6-13 [doi]
- Integrating Real-time Analysis in a Component Model for Embedded SystemsManuel Díaz, Daniel Garrido, Luis Llopis, Francisco Rus, José M. Troya. 14-21 [doi]
- Analysis and Prediction of Performance for Evolving ArchitecturesEvgeni M. Eskenazi, Alexandre V. Fioukov, Dieter K. Hammer, J. Henk Obbink, Ben J. Pronk. 22-31 [doi]
- A Systematic Approach for Identifying Operational Relationships in Embedded Computer Control SystemsDe-Jiu Chen, Martin Törngren. 32-39 [doi]
- Predicting Real-Time Properties of Component Assemblies: A Scenario-Simulation ApproachEgor Bondarev, Johan Muskens, Peter H. N. de With, Michel R. V. Chaudron, Johan Lukkien. 40-47 [doi]
- Logical-Time Contracts for Reactive Embedded ComponentsFlorence Maraninchi, Lionel Morel. 48-55 [doi]
- Evaluation of Component Technologies with Respect to Industrial RequirementsAnders Möller, Mikael Åkerholm, Johan Fredriksson, Mikael Nolin. 56-63 [doi]
- Whole-Part based Composition Approach: A Case StudyNicolas Belloir, Fabien Romeo, Jean-Michel Bruel. 66-73 [doi]
- Compositional Structured Component Model: Handling Selective Functional CompositionHamdan Msheik, Alain Abran, Eric Lefebvre. 74-81 [doi]
- Runtime Management of Quality Specification for QoS-Aware ComponentsMiguel A. de Miguel, M. Teresa Higuera-Toledano. 84-91 [doi]
- Runtime Verification of Timing and Probabilistic Properties using WMI and .NETJane Jayaputera, Iman Poernomo, Heinz W. Schmidt. 100-106 [doi]
- A Business Perspective on Component Trading: Criteria, Immaturities, and Critical Success FactorsSven Overhage, Peter Thomas. 108-117 [doi]
- DesCOTS: A Software System for Selecting COTS ComponentsGemma Grau, Juan Pablo Carvallo, Xavier Franch, Carme Quer. 118-126 [doi]
- Querying Reflexive Component-Based ArchitecturesMourad Alia, Romain Lenglet, Thierry Coupaye, Alexandre Lefebvre. 127-134 [doi]
- Impact of Statechart Implementation Techniques on the Effectiveness of Fault Detection MechanismsGergely Pintér, István Majzik. 136-143 [doi]
- Middleware Support for the Deployment of Resource-Aware Parallel Java Components on Heterogeneous Distributed PlatformsYves Mahéo, Frédéric Guidec, Luc Courtrai. 144-151 [doi]
- A Survey on Software Components Search and RetrievalDaniel Lucrédio, Antônio Francisco do Prado, Eduardo Santana de Almeida. 152-159 [doi]
- A Service Model for Component-Based DevelopmentJohn Hutchinson, Gerald Kotonya, Ian Sommerville, Steve Hall. 162-169 [doi]
- Model-Driven Development of Recursive CORBA Component AssembliesGernot Schmoelzer, Egon Teiniker, Stefan Mitterdorfer, Christian Kreiner, Zsolt Kovács, Reinhold Weiss. 170-175 [doi]
- Model-Based Generation of Business Component ArchitecturesHugo Vidal Teixeira, Regina M. M. Braga, Cláudia Maria Lima Werner. 176-183 [doi]
- Provisioning Expedited Forwarding DiffServ Channels using Multimedia AggregatesEnrique Hernández-Orallo, Joan Vila i Carbó, Sergio Saez, Silvia Terrasa. 188-195 [doi]
- Implications of Traffic Characteristics on Quality of Service in Broadband Multi Service NetworksGerhard Haßlinger. 196-204 [doi]
- Handover in Mobile Communication Networks: Who is in Control Anyway?Frank A. Zdarsky, Jens B. Schmitt. 205-212 [doi]
- An Experimental Framework for Testing Web Prefetching TechniquesJosep Domènech, Ana Pont, Julio Sahuquillo, José A. Gil. 214-221 [doi]
- Melisa - A Distributed Multimedia System for Multi-Platform Interactive Sports Content BroadcastingEmmanuel Papaioannou, Vasilis Karagianis, Kostas Karpouzis, Hervé Guillemot, Athanasios M. Demiris, Philippe de Cuetos, Nikolaos Ioannidis. 222-229 [doi]
- Priority-Driven Scheduling and Bandwidth Allocation for MPEG-2 DecodingJinhwan Kim, Bonggyou Lee, Yong Ho Song. 232-239 [doi]
- P2P Streaming using Multiple Description Coded VideoMichael Zink, Andreas Mauthe. 240-247 [doi]
- Reconfiguration-based QoS Management in Multimedia Streaming ApplicationsOussama Layaida, Slim Ben Atallah, Daniel Hagimont. 248-255 [doi]
- A Web Services Based Framework for Voice over IPMarkus Hillenbrand, Ge Zhang. 258-264 [doi]
- Implementing SIP and H.323 Signalling as Web ServicesGe Zhang, Markus Hillenbrand. 265-271 [doi]
- Enhanced SIP Communication Services by Context SharingManuel Görtz, Ralf Ackermann, Ralf Steinmetz. 272-279 [doi]
- Multi-Homing Tunnel BrokerMarcelo Bagnulo, Juan Fco. Rodríguez-Hervella, Alberto García-Martínez, Arturo Azcorra. 282-289 [doi]
- A Framework for Protecting Web Sevices with IPsecCássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero. 290-297 [doi]
- DANCE: Dynamic Application Oriented Network ServicesBernd Reuther, Dirk Henrici, Markus Hillenbrand. 298-305 [doi]
- Improving Software Process in Agile Software Development Projects: Results from Two XP Case StudiesOuti Salo. 310-317 [doi]
- Evaluating the XP Customer Model and Design by ContractRalph-Johan Back, Piia Hirkman, Luka Milovanov. 318-325 [doi]
- Analyses of an Agile Methodology ImplementationSylvia Ilieva, Penko Ivanov, Eliza Stefanova. 326-333 [doi]
- Introducing Agile Methods: Three Years of ExperienceGrigori Melnik, Frank Maurer. 334-341 [doi]
- Improving Requirements Management in Extreme Programming with Tool Support - An Improvement Attempt that FailedJukka Kääriäinen, Juha Koskela, Pekka Abrahamsson, Juha Takalo. 342-351 [doi]
- Using Academic Courses for Empirical Validation of Software Development ProcessesMarcus Ciolkowski, Dirk Muthig, Jörg Rech. 354-361 [doi]
- Investigating the Effect of Expert Ranking of Use Cases for Design InspectionDietmar Winkler, Michael Halling, Stefan Biffl. 362-371 [doi]
- Investigations in Applying Metrics to Multi-View Architecture ModelsJohan Muskens, Michel R. V. Chaudron, Christian Lange. 372-379 [doi]
- Study to Secure Reliability of Measurement Data through Application of Game TheorySang-Pok Ko, Hak-Kyung Sung, Kyung-Whan Lee. 380-386 [doi]
- Handling Backtracking in Web ApplicationsBettina Biel, Matthias Book, Volker Gruhn, Dirk Peters, Clemens Schäfer. 388-395 [doi]
- Context-based Personalization of Web Services Composition and ProvisioningZakaria Maamar, Ghazi AlKhatib, Soraya Kouadri Mostéfaoui, Mohammed Lahkim, Wathiq Mansoor. 396-403 [doi]
- Web Services for Enterprise Collaboration: A Framework and a PrototypeAnanth Srinivasan, David Sundaram. 404-411 [doi]
- GridSphere: An Advanced Portal FrameworkJason Novotny, Michael Russell, Oliver Wehrens. 412-419 [doi]
- Distribution Patterns of Effort EstimationsDrazen Milicic, Claes Wohlin. 422-429 [doi]
- On the Expected Synergies between Component-Based Software Engineering and Best Practices in Product IntegrationStig Larsson, Ivica Crnkovic, Fredrik Ekdahl. 430-436 [doi]
- Towards an Event-Driven Workplace for Knowledge IntegrationAlexander Schatten, Stefan Biffl. 437-446 [doi]
- Introduction from Session Chairs: New Challenges in Media SecurityJana Dittmann, Claus Vielhauer. 448-448 [doi]
- A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM FormatsDavid Megías, Jordi Herrera-Joancomartí, Julià Minguillón. 449-452 [doi]
- Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of ImagesDanny Hesse, Jana Dittmann, Andreas Lang. 453-456 [doi]
- A High-Capacity Block Based Video WatermarkStefan Thiemert, Thomas Vogel, Jana Dittmann, Martin Steinebach. 457-460 [doi]
- A Video-Spam Detection Approach for Unprotected Multimedia Flows based on Active NetworksAndreas Hess, Jirka Klaue. 461-465 [doi]
- Introduction from the Session Chair: Advances in Web ComputingKonrad Klöckner. 468-468 [doi]
- Formally Designing Web Services for Mobile Team CollaborationSchahram Dustdar, Pascal Fenkam. 469-476 [doi]
- GEMLCA: Grid Execution Management for Legacy Code Architecture DesignThierry Delaitre, Ariel Goyeneche, Péter Kacsuk, Tamás Kiss, Gábor Terstyánszky, Stephen C. Winter. 477-483 [doi]
- Situation-based Message Rating in Information Logistics and its Applicability in Collaboration ScenariosUlrich Meissen, Stefan Pfennigschmidt, Tjark Wahnfried, Kurt Sandkuhl. 484-491 [doi]
- Session Introduction: Wireless Sensor NetworksUtz Roedig. 494-494 [doi]
- A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular NetworksMatthias Hollick, Ivan Martinovic, Tronje Krop, Ivica Rimac. 495-502 [doi]
- Determination of Aggregation Points in Wireless Sensor NetworksUtz Roedig, André M. Barroso, Cormac J. Sreenan. 503-510 [doi]
- Introduction by Session Chair: Different Aspects of SecuritySonja Hof. 512-513 [doi]
- Securing Ad hoc Routing ProtocolsFrank Kargl, Stefan Schlott, Andreas Klenk, Alfred Geiss, Michael Weber. 514-519 [doi]
- Intrusion Detection in Virtual Machine EnvironmentsMarcos Laureano, Carlos Maziero, Edgard Jamhour. 520-525 [doi]
- The Need for Declarative Security MechanismsStefan Probst, Josef Küng. 526-531 [doi]
- Will IPv6 Bring Better Security?Szabolcs Szigeti, Peter Risztics. 532-537 [doi]
- Attitudes and Perceptions Related to Information Security - Case: RotuaariTiina Havana, Juha Röning. 538-543 [doi]
- Security Concern of Legally Sensitive Web PortalsHannakaisa Isomäki, Sonja Hof. 544-550 [doi]
- Voluntariness of Permissions Required for Security MeasuresMichael Sonntag. 551-557 [doi]
- Balanced Integration of Information Security into Business ManagementJuhani Anttila, Jorma Kajava, Rauno Varonen. 558-564 [doi]
- Introduction from Session Chair: Component Models for Dependable SystemsMichel R. V. Chaudron, Johan Muskens. 566-566 [doi]
- A Framework for Interactive Visualization of Component-Based SoftwareAlexandru Telea, Lucian Voinea. 567-574 [doi]
- Structuring Exception Handling for Dependable Component-Based Software SystemsPaulo Asterio de Castro Guerra, Fernando Castor Filho, Vinicius Asta Pagano, Cecília M. F. Rubira. 575-582 [doi]
- Detection of Heap Management Flaws in Component-Based SoftwareHeikki Verta, Titos Saridakis. 583-590 [doi]
- CoBFIT: A Component-Based Framework for Intrusion ToleranceHariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders. 591-600 [doi]
- Towards Predicting Real-Time Properties of a Component AssemblyEgor Bondarev, Peter H. N. de With, Michel R. V. Chaudron. 601-610 [doi]
- Integrity Management in Component Based SystemsJohan Muskens, Michel R. V. Chaudron. 611-619 [doi]
- A Compositional Claim-based Component Certification ProcedureHailiang Mei, Johan J. Lukkien, Johan Muskens. 620-626 [doi]
- SaveCCM - A Component Model for Safety-Critical Real-Time SystemsHans Hansson, Mikael Åkerholm, Ivica Crnkovic, Martin Törngren. 627-635 [doi]