Abstract is missing.
- A proposal for a multiple join indexAdi-Cristina Mitea. 1-6
- Modeling the physical design of data warehouses from a UML specificationSergio Luján-Mora, Juan Trujillo. 7-12
- Efficient similarity matching for categorical sequence based on dynamic partitionKeke Cai, Chun Chen, Huaizhong Lin. 13-18
- Data mining via cellular neural networks in the GSM sectorAdem Karahoca. 19-24
- Neural network facilitated analysis of stress in a biological speciesEmmanuel E. Udoh, David Erbach, Ahmed Mustafa. 25-29
- Applying database technology in the integration of engineering software modulesEmmanuel E. Udoh, David Erbach. 30-33
- Matbase datalog¬ subsystem meta-catalog conceptual designChristian Mancas, Simona Dragomir. 34-41
- Design and implementation of a data repository for a case toolAlejandro Botello Castillo, Rubén Peredo Valderrama, Leandro Balladares Ocaña. 42-46
- Why rule extraction mattersUlf Johansson, Cecilia Sönströd, Lars Niklasson. 47-52
- A tool for generating a data-driven database taxonomyPaul Zellweger. 53-58
- Database design for CAD system optimising distributed sensor networks for perimeter securityIryna V. Turchenko, Volodymyr Turchenko, Volodymyr Kochan, Pavlo E. Bykovy, Anatoly Sachenko, George Markowsky. 59-64
- A recommender system by two-level collaborative filteringXuetao Guo, Jie Lu, Guangquan Zhang. 65-69
- A model of program execution for security purposesZhiqing Liu. 70-76
- An object oriented approach to an identity based encryption cryptosystemAdam Duffy, Tom Dowling. 77-83
- Rapid prototyping and performance analysis of elliptic curve cryptographic algorithms using Java and MapleAndrew Burnett, Tom Dowling. 84-89
- Java mobile code security by bytecode behavior analysisGaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa. 90-95
- Enforcement of applet boundaries in Java card systemsCinzia Bernardeschi, Luca Martini. 96-101
- Component-abnormality detection and immunization for survivable systems in large distributed environmentsJoon S. Park, Pratheep Chandramohan, Joseph Giordano. 102-108
- Using emerging open specifications for enhancing XML web services to build a maintainable and secure health care information systemChristopher Weber, Sriram Seshadri, Furrukh Khan. 109-114
- Modeling and analyzing security protocols in SAM: A case studyZhengfan Dai, Xudong He, Junhua Ding, Shu Gao. 115-121
- Detecting unwanted synchronization in Java programsGeorge Leeman, Aaron Kershenbaum, Larry Koved, Darrell Reimer. 122-132
- JHide - A tool kit for code obfuscationLevent Ertaul, Suma Venkatesh. 133-138
- Using the NaSr architectural style to solve the broken hyperlink problemRabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown. 139-143
- A software reliability model for web servicesWei-Tek Tsai, Dawei Zhang, Yinong Chen, Hai Huang, Raymond A. Paul, Ning Liao. 144-149
- Accommodating usability driven changes in existing software architectureTamer Rafla, Rafiou Oketokoun, Artur Wiklik, Michel Desmarais, Pierre N. Robillard. 150-154
- A simple platform-independent web application development processPablo Bustos, Jaime Navon. 155-160
- Distributed architectures for rich-client internet applicationsJanhua Lin. 161-166
- Towards an automated quality assessment of UML-based software architecturesAndreas Günzler, Daniel von Roennebeck. 167-172
- Instance orientation: A programming methodologyThomas Schöbel-Theuer. 173-179
- AOSAM: A formal framework for aspect-oriented software architecture specificationsWeixiang Sun, Zhengfan Dai. 180-185
- An open software architecture of neural networks: NeurosoftArif Selçuk Ögrenci, Taner Arsan, Tuncay Saydam. 186-191
- Utilizing commercial object libraries within looselycoupled, event-based systemsJie Ren, Richard N. Taylor. 192-197
- Distributed components for retrieval of driver s license data using a handheld computerKriste Krstovski, Andrew L. Kun, W. Thomas Miller III. 198-203
- A permissive/restrictive security structure for a reusable software architecture for an accounting information systemErrol Hugh Dennis, Ezra Kaahwa Mugisa. 204-209
- Deriving change architectures from RCS historyCatherine Stringfellow, C. D. Amory, Dileep Potnuri, M. Georg. 210-215
- A model for corrective maintenance time prediction using neural networkYogesh Singh, Bindu Goel, Pravin Chandra. 216-221
- ARIES: Refactoring support environment based on code clone analysisYoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue. 222-229
- On object-oriented approach to program modularizationVictor Shtern. 230-235
- Inferring class level scenarios from object-oriented source codeMichael A. Hoffman. 236-240
- Engineering long-lived applications using MDATilman Seifert, Gerd Beneken, Niko Baehr. 241-246
- From principle, product, process to effortFeng-Pu Yang, Chia Hung Kao, Hewijin Christine Jiau. 247-252
- An empirical investigation for different sequences of pedagogical framework documentation in RADSin Ban Ho, Ian Chai, Chuie Hong Tan. 253-258
- A practical guide to measuring method coupling in object-oriented systemsSuzanne Smith, Sara Stoecklin, Judy Mullins. 259-263
- A framework for early robustness assessmentJianyun Zhou, Tor Stålhane. 264-268
- Insecurity by contractPhillip L. Nico, Clark Savage Turner, Kimberly Knowles Nico. 269-274
- Reliability specification for component-based softwareMao Xiaoguang, John May. 275-281
- A discrete software cost model with periodic rejuvenation for a telecommunication billing applicationKazuki Iwamoto, Tadashi Dohi, Naoto Kaio. 282-287
- Using a taxonomy to analyze classes during implementation-based testingPeter J. Clarke, Brian A. Malloy. 288-293
- Integrated generation of specification- and program-based test casesSami Beydeda. 294-299
- An approach to analyzing exception propagationShujuan Jiang, Baowen Xu, Liang Shi. 300-305
- Dataflow analysis and testing of software componentsYajuan Pan, Mei-Hwa Chen. 306-311
- Reachability testing of monitor-based programsYu Lei, Richard H. Carver. 312-317
- A testability analysis for data-flow designs of reactive real-time systemsHuy-Vu Do, Chantal Robach, Michel Delaunay, Jean-Sébastien Cruz. 318-323
- Object-oriented integration testing: A method level based approachLinda Badri, Mourad Badri, Velou Stéphane Blé. 324-330
- Model checking for component-based software development for embedded systemsWalter Maydl. 331-338
- A predicate logic foundation for financial audit systemsJohn A. Akinyemi, Sylvanus A. Ehikioya. 339-344
- The compositional semantics of timed statechartsJunyan Qian, Baowen Xu. 345-349
- Higher-order strategic programming: A road to software assuranceVictor L. Winter, Steve Roach, Fares Fraij. 350-355
- Using Pi-Calculus for specification of mobile agent communicationGordan Jezic, Ignac Lovrek. 356-361
- Formal specification of design patterns: A case studyJason O. Hallstrom, Neelam Soundarajan. 362-367
- Automating software development by cross-utilization of specification toolsAristides Dasso, Chris George. 368-373
- Formal construction model and specification of fault treeJianwen Xiang, Kokichi Futatsugi, Yanxiang He. 374-381
- Process state inference for support of knowledge intensiveworkJohn Noll, Jigar Shah. 382-387
- An ad hoc evaluation of workflow modeling toolsDavid Cumberland, Clark Savage Turner. 388-393
- Estimating direct return on investment of independent verification and validationJames B. Dabney, Gary Barber, Don Ohi. 394-399
- Mapping pre-designed business process models to UMLAlexander Salbrechter, Heinrich C. Mayr, Christian Kop. 400-405
- How far is an ISO 9001-granted organization to capability maturity model integration?Yu-Ling Won, Dwen-Ren Tsai, Pi-Ju Tsai. 406-411
- Shape recognition of the human body using the model of a 3D human bodyJeongeun Shin, Shinji Ozawa. 412-417
- A framework for modeling automated negotiationA. R. Dani, Ved Prakash Gulati. 418-423
- XML-based programming language modeling: An approach to software engineeringChristian Reichel, Roy Oberhauser. 424-429
- Simulation models for optimal object server deploymentWilliam J. Ray, Man-tak Shing, Chee Khan Kwok. 430-435
- Towards flexible software processes by using process patternsMariele Hagen, Volker Gruhn. 436-441
- Design and implementation of a simulator for evaluating dial-a-ride systemsKazunori Iwata, Nobuhiro Ito, Itsuki Noda, Naohiro Ishii. 442-448
- SW cost estimation: Measuring model performance of arbitrary function approximatorsIngunn Myrtveit, Erik Stensrud. 449-455
- Project perspective of software acquisition practicesTak Wah Kwan, Hareton K. N. Leung. 456-464
- Generic approach to internationalization of websitesTomasz Müldner, Darcy G. Benoit, Fei Wang. 465-470
- Approaches to assure safety in fly-by-wire systems: Airbus vs. boeingAndrew J. Kornecki, Kimberley Hall. 471-476
- A model for object-based distributed processing using behaviour treesElankayer Sithirasenan, Vallipuram Muthukkumarasamy. 477-482
- Deployment, configuration and management of mobile actor systemsFranco Cicirelli, Angelo Furfaro, Libero Nigro. 483-488
- Metadata harvesting using agent technologyMilan Vidakovic, Goran Sladic, Miroslav Zaric. 489-493
- Agent role locking (ARL): Theory for agent oriented software engineeringSalaheddin J. Juneidi, George A. Vouros. 494-500
- Experiences in applying agile software development practices in new product developmentAldo Dagnino, Karen Smiley, Hema Srikanth, Annie I. Antón, Laurie A. Williams. 501-506
- InterDOC: Interoperable services in collaborative writing environmentsRita Suzana Pitangueira Maciel, Carlos André Guimarães Ferraz, Nelson S. Rosa. 507-512
- A neural network approach for software defects fix effort estimationHui Zeng, David Rine. 513-517
- An interface mark-up language for web3DJohn D. Roberts, Ilmi Yoon, Sanghyuk Yoon, Edward Lank. 518-522
- Generating tutorial system from sequence diagrams in UMLHajime Iwata, Junko Shirogane, Yoshiaki Fukazawa. 523-528
- On execution control of UML s use caseSadahiro Isoda. 529-533
- Object-oriented programming with dynamic classification in C#Liwu Li, Wenjiang Wang. 534-539
- An approach to realize click, double-click, and drag in 3DYukio Ishihara, Makio Ishihara. 540-545
- A framework for multiple service discovery and robustnessYasutaka Kono, Shingo Takada, Norihisa Doi. 546-551
- Separating language dependent and independent tasks for the semantic transformation of numerical programsJean Utke, Uwe Naumann. 552-558
- Java bytecode verification with dynamic structuresCinzia Bernardeschi, Luca Martini, Paolo Masci. 559-564
- Compiling adaptive programs for real-time dynamic schedulingXiao Hu, Ting Lei, Yuchang Gong, Xuehai Zhou. 565-570
- A standard real-time application development using real-time java specification from theory to practiceSerge Midonnet, Hui Xue Zhao. 571-576
- Identifying candidate invariant conditions of running programTheodorus Eric Setiadi, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa. 577-582
- Modular monadic slicing of concurrent programsYingzhou Zhang, Baowen Xu, Ju Qian. 583-587
- Tree logic with recursion and model checking algorithmTaolue Chen, Tingting Han, Jian Lu. 588-593
- A supervised multi-agent approach for operations capacity planning through performances-driven analysisMarco Calamita, Piero Lunghi, Riccardo Melioli, Flavio Tonelli. 594-600
- Enterprise service facilitation within agent environmentsEdward Curry, Desmond Chambers, Gerard Lyons. 601-606
- The provision of contracts to enforce system semantics throughout software developmentConstantinos Constantinides, Therapon Skotiniotis. 607-616
- Synthesizing statecharts through sequence diagrams analysisWang Hongyuan, Zhang Ke, Feng Tie, Che Haiyan, Zheng Yinshi. 617-622
- An early detection of semantic conflicts between aspects: A model analysis based techniqueF. Tessier, Mourad Badri, Linda Badri. 623-628
- Applying object oriented concept to combination logic designSarun Chaiworawitgul, Proadpran Pitsatorn, Boonchai Sowanwanichkul. 629-634
- Tube: Interactive model-integrated object-oriented programmingAxel Rauschmayer, Patrick Renner. 635-640
- Hyper-trace: Using hypertext linking for traceabilityGeir A. Bjune, Jack R. Hagemeister. 641-646
- PLUS: A release management process for progressive software development modelJing-Chiou Liou. 647-652
- A component-based reference model for web-based systemsJianyun Zhou, Tor Stålhane. 653-658
- Extreme programming: Pair-programmers, team players or future leaders?Karim Visram. 659-664
- Towards a customizable approach for COTS selectionAbdallah Mohamed, Günther Ruhe, Armin Eberlein. 665-671
- Automatic clustering of non-functional requirementsFabrizio Fabbrini, Mario Fusani, Stefania Gnesi, Giuseppe Lami. 672-677
- Decoupled common annotations for reusing XML document composition logicShyh-Kwei Chen, Kun-Lung Wu, Jih-Shyr Yih. 678-683
- A component model for building systems softwareGeoff Coulson, Gordon S. Blair, Paul Grace, Ackbar Joolia, Kevin Lee, Jo Ueyama. 684-689
- Contextualising components when addressing database interoperabilityRadmila Juric, Jasna Kuljis, Ray J. Paul. 690-695
- Automated support of quality improvementLi Liao, Hareton K. N. Leung, Yuzhong Qu. 696-702
- An MDA-based framework to achieve high productivity in software developmentA. Estévez García, J. Padrón Lorenzo, J. L. Roda García. 703-708
- An MDA®-based framework for model-driven product derivationØystein Haugen, Birger Møller-Pedersen, Jon Oldevik, Arnor Solberg. 709-714
- Erroneous architecture is a relative conceptJirí Adámek, Frantisek Plasil. 715-720
- Automating VBI-data generation and validationM. R. Narasimhamurthy, Ramzan Nadaf, Animesh Bhowmick. 721-724
- Towards use case based software reuseKuniharu Yamada, Shingo Takada, Norihisa Doi. 725-730
- An algorithm for determining the equivalence of two blocks of assignment statementsRajendra K. Bera. 731-735
- Supporting the iterative development of sequence diagrams and statechartsHideo Hasegawa, Shingo Takada, Norihisa Doi. 736-742
- Logical tools for program integration and interoperabilityMark Burgin. 743-748
- Towards large scale voice activated dynamic and interactive internet based animation and modelingAngela Guercio, Bonita Simoes, Arvind K. Bansal. 749-754
- Personal e-moviemaker designJinhong Shen, Seiya Miyazaki, Terumasa Aoki, Hiroshi Yasuda. 755-760
- On the formulation of software cost for IO devicesKuan Jen Lin, Shih Wen Chen. 761-766
- Software component self-description: Labeling components in a software supermarketRichard A. Pyne, Ezra Kaahwa Mugisa. 767-772
- AFFDEF: Adaptive and flexible fuzzy duplicate elimination frameworkHamid Haidarian Shahri, Ahmad Abdollahzadeh Barforoush. 773-780
- Using cellular automata to predict reliability of modulesMitja Lenic, Petra Povalej, Peter Kokol, Ana Isabel Cardoso. 781-785
- Bioinformatics approach to data mining of software basesGregor Stiglic, Peter Kokol. 786-789
- Mining features of software reliability using multimethod data-mining approachMatej Mertik, Mitja Lenic, Milan Zorman, Maurizio Pighin. 790-794