Abstract is missing.
- Modeling Road Traffic Signals Control Using UML and the MARTE ProfileEduardo Augusto Silvestre, Michel dos Santos Soares. 1-15 [doi]
- Analysis of Techniques for Documenting User RequirementsMichel dos Santos Soares, Daniel Souza Cioquetta. 16-28 [doi]
- Predicting Web Service Maintainability via Object-Oriented Metrics: A Statistics-Based ApproachJosé Luis Ordiales Coscia, Marco Crasso, Cristian Mateos, Alejandro Zunino, Sanjay Misra. 29-39 [doi]
- Early Automated Verification of Tool Chain DesignMatthias Biehl. 40-50 [doi]
- Using UML Stereotypes to Support the Requirement Engineering: A Case StudyVitor A. Batista, Daniela Cristina Cascini Peixoto, Wilson Pádua, Clarindo Isaías P. S. Pádua. 51-66 [doi]
- Identifying Business Rules to Legacy Systems Reengineering Based on BPM and SOAGleison Samuel do Nascimento, Cirano Iochpe, Lucinéia Heloisa Thom, André Kalsing, Álvaro F. Moreira. 67-82 [doi]
- Abstraction Analysis and Certified Flow and Context Sensitive Points-to Relation for Distributed ProgramsMohamed A. El-Zawawy. 83-99 [doi]
- An Approach to Measure Understandability of Extended UML Based on MetamodelYan Zhang, Yi Liu, Zhiyi Ma, Xuying Zhao, Xiaokun Zhang, Tian Zhang. 100-115 [doi]
- Dealing with Dependencies among Functional and Non-functional Requirements for Impact Analysis in Web EngineeringJosé Alfonso Aguilar, Irene Garrigós, Jose-Norberto Mazón, Anibal Zaldívar. 116-131 [doi]
- Assessing Maintainability Metrics in Software Architectures Using COSMIC and UMLEudisley Gomes dos Anjos, Ruan Delgado Gomes, Mário Zenha Rela. 132-146 [doi]
- Plagiarism Detection in Software Using Efficient String MatchingKusum Lata Pandey, Suneeta Agarwal, Sanjay Misra, Rajesh Prasad. 147-156 [doi]
- Dynamic Software Maintenance Effort Estimation Modeling Using Neural Network, Rule Engine and Multi-regression ApproachRuchi Shukla, Mukul Shukla, Arun Kumar Misra, T. Marwala, W. A. Clarke. 157-169 [doi]
- New Measures for Maintaining the Quality of DatabasesHendrik Decker. 170-185 [doi]
- A New Way to Determine External Quality of ERP SoftwareAli Orhan Aydin. 186-201 [doi]
- Towards a Catalog of Spreadsheet SmellsJácome Cunha, João Paulo Fernandes, Hugo Ribeiro, João Saraiva. 202-216 [doi]
- Program and Aspect Metrics for MATLABPedro Martins, Paulo Lopes, João Paulo Fernandes, João Saraiva, João M. P. Cardoso. 217-233 [doi]
- A Suite of Cognitive Complexity MetricsSanjay Misra, Murat Koyuncu, Marco Crasso, Cristian Mateos, Alejandro Zunino. 234-247 [doi]
- Complexity Metrics for Cascading Style SheetsAdewole Adewumi, Sanjay Misra, Nicholas Ikhu-Omoregbe. 248-257 [doi]
- A Systematic Review on the Impact of CK Metrics on the Functional Correctness of Object-Oriented ClassesYasser A. Khan, Mahmoud O. Elish, Mohamed El-Attar. 258-273 [doi]
- Pinpointing Malicious Activities through Network and System-Level Malware Execution BehaviorAndré Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino, Rafael Duarte Coelho dos Santos. 274-285 [doi]
- A Malware Detection System Inspired on the Human Immune SystemIsabela Liane de Oliveira, André Ricardo Abed Grégio, Adriano M. Cansian. 286-301 [doi]
- Interactive, Visual-Aided Tools to Analyze Malware BehaviorAndré Ricardo Abed Grégio, Alexandre Or Cansian Baruque, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino, Rafael Duarte Coelho dos Santos. 302-313 [doi]
- Interactive Analysis of Computer Scenarios through Parallel Coordinates GraphicsGabriel D. Cavalcante, Sébastien Tricaud, Cleber P. Souza, Paulo Lício de Geus. 314-325 [doi]
- Methodology for Detection and Restraint of P2P Applications in the NetworkRodrigo M. P. Silva, Ronaldo M. Salles. 326-339 [doi]
- Text Categorization Based on Fuzzy Soft Set TheoryBana Handaga, Mustafa Mat Deris. 340-352 [doi]
- Cluster Size Determination Using JPEG FilesNurul Azma Abdullah, Rosziati Ibrahim, Kamaruddin Malik Mohamad. 353-363 [doi]
- Semantic Web Search Engine Using Ontology, Clustering and Personalization TechniquesNoryusliza Abdullah, Rosziati Ibrahim. 364-378 [doi]
- Granules of Words to Represent Text: An Approach Based on Fuzzy Relations and Spectral ClusteringPatrícia F. Castro, Geraldo Xexéo. 379-391 [doi]
- Multivariate Time Series Classification by Combining Trend-Based and Value-Based ApproximationsBilal Esmael, Arghad Arnaout, Rudolf K. Fruhwirth, Gerhard Thonhauser. 392-403 [doi]
- Impact of pay-as-you-go Cloud Platforms on Software Pricing and Development: A Review and Case StudyFernando Pires Barbosa, Andrea Schwertner Charão. 404-417 [doi]
- Resilience for Collaborative Applications on Clouds - Fault-Tolerance for Distributed HPC ApplicationsToàn Nguyên, Jean-Antoine Désidéri. 418-433 [doi]
- T-DMB Receiver Model for Emergency Alert ServiceSeong Geun Kwon, Suk Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon. 434-443 [doi]
- A Framework for Context-Aware Systems in Mobile DevicesEduardo Jorge, Matheus Farias, Rafael Carmo, Weslley Vieira. 444-456 [doi]
- A Simulation Framework for Scheduling Performance Evaluation on CPU-GPU Heterogeneous SystemFlavio Vella, Igor Neri, Osvaldo Gervasi, Sergio Tasso. 457-469 [doi]
- Influence of Topology on Mobility and Transmission Capacity of Human-Based DTNsDanilo Augusto Moschetto, Douglas O. Freitas, Lourdes P. P. Poma, Ricardo Aparecido Perez de Almeida, Cesar A. C. Marcondes. 470-483 [doi]
- Towards a Computer Assisted Approach for Migrating Legacy Systems to SOAGonzalo Salvatierra, Cristian Mateos, Marco Crasso, Alejandro Zunino. 484-497 [doi]
- 1+1 Protection of Overlay Distributed Computing Systems: Modeling and OptimizationKrzysztof Walkowiak, Jacek Rak. 498-513 [doi]
- Scheduling and Capacity Design in Overlay Computing SystemsKrzysztof Walkowiak, Andrzej Kasprzak, Michal Kosowski, Marek Miziolek. 514-529 [doi]
- GPU Acceleration of the caffa3d.MB ModelPablo Igounet, Pablo Alfaro, Gabriel Usera, Pablo Ezzatti. 530-542 [doi]
- Security-Effective Fast Authentication Mechanism for Network Mobility in Proxy Mobile IPv6 NetworksIllkyun Im, Young Hwa Cho, Jae Young Choi, Jongpil Jeong. 543-559 [doi]
- An Architecture for Service Integration and Unified Communication in Mobile ComputingRicardo Aparecido Perez de Almeida, Hélio Crestana Guardia. 560-575 [doi]
- Task Allocation in Mesh Structure: 2Side LeapFrog Algorithm and Q-Learning Based AlgorithmIwona Pozniak-Koszalka, Wojciech Proma, Leszek Koszalka, Maciej Pol, Andrzej Kasprzak. 576-587 [doi]
- Follow-Us: A Distributed Ubiquitous Healthcare System Simulated by MannaSimMaria Luísa Amarante Ghizoni, Adauto Santos, Linnyer Beatrys Ruiz. 588-601 [doi]
- Adaptive Dynamic Frequency Scaling for Thermal-Aware 3D Multi-core ProcessorsHong Jun Choi, Young-Jin Park, Hsien-Hsin Lee, Cheol Hong Kim. 602-612 [doi]
- A Context-Aware Service Model Based on the OSGi Framework for u-Agricultural EnvironmentsJongsun Choi, Sangjoon Park, Jongchan Lee, Yongyun Cho. 613-621 [doi]
- A Security Framework for Blocking New Types of Internet Worms in Ubiquitous Computing EnvironmentsIksu Kim, Yongyun Cho. 622-631 [doi]
- Quality Factors in Development Best Practices for Mobile ApplicationsEuler Horta Marinho, Rodolfo F. Resende. 632-645 [doi]
- ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack PreventionXiaohui Cui, Wade Gasior, Justin M. Beaver, Jim N. Treadwell. 646-653 [doi]