Abstract is missing.
- The future of systematic information protectionBob Hutchinson. 1 [doi]
- Order relations and rigor in computingRamon E. Moore. 2 [doi]
- Editorial message: special track on artificial intelligence, computational logic and image analysisChih-Cheng Hung. 3 [doi]
- Experimenting with a real-size man-hill to optimize pedagogical pathsGrégory Valigiani, Raphael Biojout, Yannick Jamont, Evelyne Lutton, Claire Bourgeois-République, Pierre Collet. 4-8 [doi]
- An hybridization of an ant-based clustering algorithm with growing neural gas networks for classification tasksMarco Antonio Montes de Oca, Leonardo Garrido, José-Luis Aguirre. 9-13 [doi]
- Reinforcement learning agents with primary knowledge designed by analytic hierarchy processKengo Katayama, Takahiro Koshiishi, Hiroyuki Narihisa. 14-21 [doi]
- Estimating manifold dimension by inversion errorShawn Martin, Alex Bäcker. 22-26 [doi]
- Data driven approach to designing minimum hamming distance polychotomizerJie Zhou, Giovanni Pasteris. 27-31 [doi]
- Variable selection and ranking for analyzing automobile traffic accident dataHuanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky. 32-37 [doi]
- Stochastic scheduling of active support vector learning algorithmsGaurav Pandey, Himanshu Gupta, Pabitra Mitra. 38-42 [doi]
- The T-detectors maturation algorithm based on match range modelDongyong Yang, Jungan Chen. 43-44 [doi]
- A comparison on information fusion methods for air target identificationDongseob Jang, Sung Y. Shin, Charlie Y. Shim, C. C. Hung. 45-46 [doi]
- Mobile agents for network management: when and when not!Huy Hoang To, Shonali Krishnaswamy, Bala Srinivasan. 47-53 [doi]
- Agent technology for personalized information filtering: the PIA-systemSahin Albayrak, Stefan Wollny, Nicolas Varone, Andreas Lommatzsch, Dragan Milosevic. 54-59 [doi]
- An agent model for fault-tolerant systemsAvelino F. Zorzo, Felipe Rech Meneguzzi. 60-65 [doi]
- A distributed content-based search engine based on mobile codeVolker Roth, Ulrich Pinsdorf, Jan Peters. 66-73 [doi]
- An empirical evaluation of communication effectiveness in autonomous reactive multiagent systemsDavid Hurt, Paul Tarau. 74-78 [doi]
- A multi-agent approach for solving optimization problems involving expensive resourcesHoong Chuin Lau, Hui Wang. 79-83 [doi]
- Forming resource-sharing coalitions: a distributed resource allocation mechanism for self-interested agents in computational gridsLinli He, Thomas R. Ioerger. 84-91 [doi]
- Reliability analysis of mobile agent-based systemsMosaab Daoud, Qusay H. Mahmoud. 92-93 [doi]
- Fuzzy approach to outsourcing of information technology servicesLudmil Mikhailov, Petco E. Tsvetinov. 94-98 [doi]
- Editorial message: special track on bioinformaticsMathew J. Palakal, Sven Rahmann, Birong Liao. 99 [doi]
- Efficient discovery of unique signatures on whole-genome EST databasesHsiao Ping Lee, Tzu-Fang Sheu, Yin-Te Tsai. 100-104 [doi]
- Grid-based management of biomedical data using an XML-based distributed data management systemShannon Hastings, Stephen Langella, Scott Oster, Tahsin M. Kurç, Tony Pan, Ümit V. Çatalyürek, Dan Janies, Joel H. Saltz. 105-109 [doi]
- A complex biological database querying methodJake Yue Chen, John V. Carlis, Ning Gao. 110-114 [doi]
- PViN: a scalable and flexible system for visualizing pedigree databasesEric A. Wernert, Jagannathan Lakshmipathy. 115-122 [doi]
- Incremental interactive mining of constrained association rules from biological annotation data with nominal featuresImad Rahal, Dongmei Ren, Amal Perera, Hassan Najadat, William Perrizo, Riad Rahhal, Willy Valdivia Granda. 123-127 [doi]
- A framework for result handling in bioinformatics: an application to computer assisted drug designAndrei Oliveira da Silva, Osmar Norberto de Souza. 128-132 [doi]
- Graphical rule-based representation of signal-transduction networksJames R. Faeder, Michael L. Blinov, William S. Hlavacek. 133-140 [doi]
- Generating association graphs of non-cooccurring text objects using transitive methodsNiranjan Jayadevaprakash, Snehasis Mukhopadhyay, Mathew J. Palakal. 141-145 [doi]
- An approximation algorithm for haplotype inference by maximum parsimonyYao-Ting Huang, Kun-Mao Chao, Ting Chen. 146-150 [doi]
- Efficient mass decompositionSebastian Böcker, Zsuzsanna Lipták. 151-157 [doi]
- CAFISS: a complex adaptive framework for immune system simulationJoc Cing Tay, Atul Jhavar. 158-164 [doi]
- Object-oriented wound healing in the liver: a class-structured view of fibrogenesis and a glimpse of its evolutionJacqueline Signorini, Patrick Greussay. 165-171 [doi]
- Volume fractal dimensionality: a useful parameter for measuring the complexity of 3D protein spatial structuresMin Hu, Qunsheng Peng. 172-176 [doi]
- A new approach for gene prediction using comparative sequence analysisRong Chen, Hesham H. Ali. 177-184 [doi]
- Comparing approaches to predict transmembrane domains in protein sequencesPaul Davidsson, Johan Hagelbäck, Kenny Svensson. 185-189 [doi]
- Design and evaluation of CATPA: curation and alignment tool for protein analysisMehmet M. Dalkilic, Arijit Sengupta. 190-194 [doi]
- Optimizing syntax patterns for discovering protein-protein interactionsConrad Plake, Jörg Hakenberg, Ulf Leser. 195-201 [doi]
- EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequencesShu Ju Hsieh, Yun Sheng Chung, Chun-Yuan Lin, Chuan Yi Tang. 202-203 [doi]
- Tree-based clustering for gene expression dataBaoying Wang, William Perrizo. 204-205 [doi]
- Cleaning microarray expression data using Markov random fields based on profile similarityRaymond Wan, Hiroshi Mamitsuka, Kiyoko F. Aoki. 206-207 [doi]
- Prediction of inherited and genetic mutations using the software model checker SPINZubin Balsara, Steve Roach. 208-209 [doi]
- Text-based summarization and visualization of gene clustersPankaj Kankar, Sougata Mukherjea. 210-211 [doi]
- Finding saddle points using stability boundariesChandan K. Reddy, Hsiao-Dong Chiang. 212-213 [doi]
- Health care information systemsValentin Masero. 214-215 [doi]
- An analysis of modeling flaws in HL7 and JAHISEduardo Fernández, Tami Sorgente. 216-223 [doi]
- Protecting sensitive patient data via query modificationDavid J. Power, Mark Slaymaker, Eugenia A. Politou, Andrew C. Simpson. 224-230 [doi]
- An interactive evolutionary algorithm for cochlear implant fitting: first resultsClaire Bourgeois-République, Grégory Valigiani, Pierre Collet. 231-235 [doi]
- Data logistics as a means of integration in healthcare applicationsStefan Jablonski, Rainer Lay, Christian Meiler, Sascha Müller, Wolfgang Hümmer. 236-241 [doi]
- The intensity level reduction in radiation therapyXiaodong Wu, John Abraham. 242-246 [doi]
- Multilure active contoursFrancisco J. Guerrero, Valentin Masero, Juan M. León-Rojas, José Moreno. 247-254 [doi]
- Segmentation and reconstruction of the lung volume in CT imagesMichela Antonelli, Beatrice Lazzerini, Francesco Marcelloni. 255-259 [doi]
- A clustering-based approach for prediction of cardiac resynchronization therapyHeng Huang, Li Shen, Fillia Makedon, Sheng Zhang, Mark Greenberg, Ling Gao, Justin D. Pearlman. 260-266 [doi]
- Temporal analysis of infectious diseases: influenzaKaja Abbas, Armin R. Mikler, Robert Gatti. 267-271 [doi]
- Adaptive and fault tolerant medical vest for life-critical medical monitoringRoozbeh Jafari, Foad Dabiri, Philip Brisk, Majid Sarrafzadeh. 272-279 [doi]
- Computer-aided law and advanced technologiesGiovanni Sartor, Jeremy V. Pitt, Alessandra Villecco. 280-281 [doi]
- Compensating creativity in the digital world: reconciling technology and cultureMindaugas Kiskis, Rimantas Petrauskas. 282-286 [doi]
- A formal logic-based language and an automated verification tool for computer forensic investigationSlim Rekhis, Noureddine Boudriga. 287-291 [doi]
- Sequence modelling for sentence classification in a legal summarisation systemBen Hachey, Claire Grover. 292-296 [doi]
- The employment of XML standards in electronic judicial proceedingsAlessandra Villecco Bettelli. 297-301 [doi]
- Honeynet based distributed adaptive network forensics and active real time investigationWei Ren, Hai Jin. 302-303 [doi]
- Special track on computer securityGiampaolo Bella, Peter Y. A. Ryan. 304-305 [doi]
- SELS: a secure e-mail list serviceHimanshu Khurana, Adam J. Slagell, Rafael Bonilla. 306-313 [doi]
- K-gram based software birthmarksGinger Myles, Christian S. Collberg. 314-318 [doi]
- A ZKP-based identification scheme for base nodes in wireless sensor networksDev Anshul, Suman Roy. 319-323 [doi]
- Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curvesMaurizio Adriano Strangio. 324-331 [doi]
- Formal specification of role-based security policies for clinical information systemsKarsten Sohr, Michael Drouineaud, Gail-Joon Ahn. 332-339 [doi]
- Efficient support for enterprise delegation policiesVictoria Ungureanu. 340-345 [doi]
- Preventing race condition attacks on file-systemsPrem Uppuluri, Uday Joshi, Arnab Ray. 346-353 [doi]
- Mediation security specification and enforcement for heterogeneous databasesLi Yang, Raimund K. Ege, Huiqun Yu. 354-358 [doi]
- An attribute-based access matrix modelXinwen Zhang, Yingjiu Li, Divya Nalla. 359-363 [doi]
- Editorial: special track on constraint solving and programmingStefano Bistarelli, Eric Monfroy, Barry O Sullivan. 364-365 [doi]
- A branch-price-and-propagate approach for optimizing IGP weight setting subject to unique shortest pathsFarid Ajili, Robert Rodosek, Andrew Eremin. 366-370 [doi]
- Breaking value symmetries in matrix models using channeling constraintsYat Chiu Law, Jimmy Ho-Man Lee. 371-376 [doi]
- Controlled propagation in continuous numerical constraint networksFrédéric Goualard, Laurent Granvilliers. 377-382 [doi]
- Hybrid Lagrangian relaxation for bandwidth-constrained routing: knapsack decompositionWided Ouaja, Barry Richards. 383-387 [doi]
- Limited assignments: a new cutoff strategy for incomplete depth-first searchRoman Barták, Hana Rudová. 388-392 [doi]
- On the computational limits of infinite satisfactionStefan S. Dantchev, Frank D. Valencia. 393-397 [doi]
- Solving strategies using a hybridization model for local search and constraint propagationTony Lambert, Eric Monfroy, Frédéric Saubion. 398-403 [doi]
- Timid acquisition of constraint satisfaction problemsSarah O Connell, Barry O Sullivan, Eugene C. Freuder. 404-408 [doi]
- The shortest route cut and fill problem in linear topological structureSongshan Guo, Weixing Li, Andrew Lim, Fan Wang. 409-410 [doi]
- Special track on coordination models, languages and applicationsSascha Ossowski, Ronaldo Menezes. 411-412 [doi]
- LighTS: a lightweight, customizable tuple space supporting context-aware applicationsGian Pietro Picco, Davide Balzarotti, Paolo Costa. 413-419 [doi]
- A timed extension of ReSpecTAlessandro Ricci, Mirko Viroli. 420-427 [doi]
- Formal modeling and quantitative analysis of KLAIM-based mobile systemsRocco De Nicola, Diego Latella, Mieke Massink. 428-435 [doi]
- MoCha-pi, an exogenous coordination calculus based on mobile channelsJuan Guillen Scholten, Farhad Arbab, Frank S. de Boer, Marcello M. Bonsangue. 436-442 [doi]
- Multi-coordination of mobile agents: a model and a component-based architectureGiancarlo Fortino, Wilma Russo. 443-450 [doi]
- A semantic framework for the recursive specification of interaction protocolsJuan Manuel Serrano, Sascha Ossowski. 451-456 [doi]
- Implicit environment-based coordination in pervasive computingAmine Tafat, Michèle Courant, Béat Hirsbrunner. 457-461 [doi]
- Agent coordination for bus fleet managementMaría-Victoria Belmonte, José-Luis Pérez-de-la-Cruz, Francisco Triguero Ruiz, Alberto Fernández. 462-466 [doi]
- Self-organization and computer security: a case study in adaptive coordinationRonaldo Menezes. 467-468 [doi]
- Performance bottleneck in time-series subsequence matchingSang-Wook Kim, Byeong-Soo Jeong. 469-473 [doi]
- DrC4.5: Improving C4.5 by means of prior knowledgeMiriam Baglioni, Barbara Furletti, Franco Turini. 474-481 [doi]
- Mining web content outliers using structure oriented weighting techniques and N-gramsMalik Agyemang, Ken Barker, Reda Alhajj. 482-487 [doi]
- Finding frequent itemsets by transaction mappingMingjun Song, Sanguthevar Rajasekaran. 488-492 [doi]
- LS:::3:::: a Linear Semantic Scan Statistic technique for detecting anomalous windowsVandana Pursnani Janeja, Vijayalakshmi Atluri. 493-497 [doi]
- A Go With the Winners approach to finding frequent patternsTodd Ebert, Darin Goldstein. 498-502 [doi]
- Discovery and regeneration of hidden emailsGiuseppe Carenini, Raymond T. Ng, Xiaodong Zhou, Ed Zwart. 503-510 [doi]
- A hybrid approach for multiresolution modeling of large-scale scientific dataTina Eliassi-Rad, Terence Critchlow. 511-518 [doi]
- Rearranging data objects for efficient and stable clusteringGyesung Lee, Xindong Wu, Jinho Chon. 519-523 [doi]
- Spatial contextual noise removal for post classification smoothing of remotely sensed imagesYu Qian, Kang Zhang, Fang Qiu. 524-528 [doi]
- Distributed approximate mining of frequent patternsClaudio Silvestri, Salvatore Orlando. 529-536 [doi]
- Detection and prediction of distance-based outliersFabrizio Angiulli, Stefano Basta, Clara Pizzuti. 537-542 [doi]
- Optimized transitive association rule: mining significant stopover between eventsYasuhiko Morimoto. 543-544 [doi]
- A model for association rules based on clusteringCarlos Ordonez. 545-546 [doi]
- Circle: design and implementation of a classifier based on circuit minimizationMehmet M. Dalkilic, Arijit Sengupta. 547-548 [doi]
- Mining concept associations for knowledge discovery in large textual databasesXiaowei Xu, Mutlu Mete, Nurcan Yuruk. 549-550 [doi]
- A relatedness-based data-driven approach to determination of interestingness of association rulesRajesh Natarajan, B. Shekar. 551-552 [doi]
- Editorial message: special track on data streamsJesús S. Aguilar-Ruiz, S. Muthukrishnan. 553-554 [doi]
- Integrated resource management for data stream systemsHenrike Berthold, Sven Schmidt, Wolfgang Lehner, Claude-Joachim Hamann. 555-562 [doi]
- Quality-driven evaluation of trigger conditions on streaming time seriesLike Gao, Min Wang, Xiaoyang Sean Wang. 563-567 [doi]
- Incremental rule learning based on example nearness from numerical data streamsFrancisco J. Ferrer-Troyano, Jesús S. Aguilar-Ruiz, José Cristóbal Riquelme Santos. 568-572 [doi]
- Learning decision trees from dynamic data streamsJoão Gama, Pedro Medas, Pedro Pereira Rodrigues. 573-577 [doi]
- Wavelet density estimators over data streamsChristoph Heinz, Bernhard Seeger. 578-579 [doi]
- Editorial message: special track on database theory, technology, and applicationsRamzi A. Haraty, Apostolos N. Papadopoulos, Junping Sun. 580 [doi]
- Optimization of subsequence matching under time warping in time-series databasesMan-Soon Kim, Sang-Wook Kim, Miyoung Shin. 581-586 [doi]
- Identifying topological predicates for vague spatial objectsAlejandro Pauly, Markus Schneider. 587-591 [doi]
- A flexible approach to user-defined symbolic granularities in temporal databasesLavinia Egidi, Paolo Terenziani. 592-597 [doi]
- Hierarchical binary histograms for summarizing multi-dimensional dataFilippo Furfaro, Giuseppe M. Mazzeo, Domenico Saccà, Cristina Sirangelo. 598-603 [doi]
- Image domain formalization for content-based image retrievalCaetano Traina Jr., Josiel Maimoni de Figueiredo, Agma J. M. Traina. 604-609 [doi]
- Distributed evaluation of generalized path queriesDan C. Stefanescu, Alex Thomo, Lida Thomo. 610-616 [doi]
- Accelerating approximate similarity queries using genetic algorithmsRenato Bueno, Agma J. M. Traina, Caetano Traina Jr.. 617-622 [doi]
- Optimizing existential queries in stratifiable deductive databasesAndreas Behrend. 623-628 [doi]
- Jelly view: a technology for arbitrarily advanced queries within RDBMSIgor Wojnicki, Antoni Ligeza. 629-633 [doi]
- Cost-efficient processing of MIN/MAX queries over distributed sensors with uncertaintyZhenyu Liu, Ka Cheung Sia, Junghoo Cho. 634-641 [doi]
- Graph transformation to infer schemata from XML documentsLuciano Baresi, Elisa Quintarelli. 642-646 [doi]
- Finding an optimum edit script between an XML document and a DTDNobutaka Suzuki. 647-653 [doi]
- Automatic wrapper maintenance for semi-structured web sources using results from previous queriesJuan Raposo, Alberto Pan, Manuel Álvarez, Ángel Viña. 654-659 [doi]
- Supporting efficient query processing on compressed XML filesYongjing Lin, Youtao Zhang, Quanzhong Li, Jun Yang. 660-665 [doi]
- ERONTO: a tool for extracting ontologies from extended E/R diagramsSujatha R. Upadhyaya, P. Sreenivasa Kumar. 666-670 [doi]
- User-defined view automation of genomic databasesAndrew J. Robinson, J. Wenny Rahayu, Susanna Herd, Tharam S. Dillon. 671-675 [doi]
- An information theoretic histogram for single dimensional selectivity estimationChris Giannella, Bassem Sayrafi. 676-677 [doi]
- Editorial message: special track on distributed systems and grid computingRobert van Engelen, Nectarios Koziris, Madhusudhan Govindaraju, Kleanthis Psarris. 678-679 [doi]
- The Pegasus portal: web based grid computingGurmeet Singh, Ewa Deelman, Gaurang Mehta, Karan Vahi, Mei-Hui Su, G. Bruce Berriman, John Good, Joseph C. Jacob, Daniel S. Katz, Albert Lazzarini, Kent Blackburn, Scott Koranda. 680-686 [doi]
- Dynamic scheduling of scientific workflow applications on the grid: a case studyRadu Prodan, Thomas Fahringer. 687-694 [doi]
- Replica selection in grid environment: a data-mining approachRashedur M. Rahman, Ken Barker, Reda Alhajj. 695-700 [doi]
- A grid-based architecture for earth observation data accessGiovanni Aloisio, Massimo Cafaro, Sandro Fiore, Gianvito Quarta. 701-705 [doi]
- Realizing the leasing concept in CORBA-based applicationsMarkus Aleksy, Axel Korthaus, Martin Schader. 706-712 [doi]
- On unit task linear-nonlinear two-cluster scheduling problemZhichun Xiao, Wing Ning Li, John Jing-Fu Jenq. 713-717 [doi]
- Reliability in three-tier systems without application server coordination and persistent message queuesFrancesco Quaglia, Paolo Romano. 718-723 [doi]
- Policies translation for integrated management of grids and networksRicardo Neisse, Maria Janilce Bosquiroli Almeida, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 724-729 [doi]
- The necklace-hypercube: a well scalable hypercube-based interconnection network for multiprocessorsM. Monemizadeh, Hamid Sarbazi-Azad. 729-733 [doi]
- The recursive transpose-connected cycles (RTCC) interconnection network for multiprocessorsM. Hoseiny Farahabady, Hamid Sarbazi-Azad. 734-738 [doi]
- A solution for the location problem in arbitrary computer networks using generic dominating setsMarco Aurélio Spohn, J. J. Garcia-Luna-Aceves. 739-743 [doi]
- Node clustering based on link delay in P2P networksWei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon, James Ford. 744-749 [doi]
- Adaptation point analysis for computation migration/checkpointingYanqing Ji, Hai Jiang, Vipin Chaudhary. 750-751 [doi]
- Editorial message: special track on document engineeringRafael Dueire Lins. 752-753 [doi]
- Handwritten character skeletonisation for forensic document analysisVladimir Pervouchine, Graham Leedham, Konstantin Melikhov. 754-758 [doi]
- Performance evaluation for text processing of noisy inputsDaniel P. Lopresti. 759-763 [doi]
- Language identification in web pagesBruno Martins, Mário J. Silva. 764-768 [doi]
- An XForms based solution for adaptable documents editingIstvan Beszteri, Petri Vuorimaa. 769-775 [doi]
- Tool support for plagiarism detection in text documentsStefan Gruner, Stuart Naven. 776-781 [doi]
- Semantic document engineering with WordNet and PageRankPaul Tarau, Rada Mihalcea, Elizabeth Figa. 782-786 [doi]
- Approximate XML document matchingE. Rodney Canfield, Guangming Xing. 787-788 [doi]
- Editorial message: special track on e-commerce technologiesSviatoslav Braynov, Manuel Núñez, Peter R. Wurman. 789-790 [doi]
- SVD-based collaborative filtering with privacyHuseyin Polat, Wenliang Du. 791-795 [doi]
- Implementing private Vickrey auctionsIsmael Rodríguez, Natalia López. 796-800 [doi]
- Scalable security and accounting services for content-based publish/subscribe systemsHimanshu Khurana. 801-807 [doi]
- Effort and accuracy analysis of choice strategies for electronic product catalogsJiyong Zhang, Pearl Pu. 808-814 [doi]
- An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocolGregorio Díaz, Kim Guldstrand Larsen, Juan José Pardo, Fernando Cuartero, Valentin Valero. 815-820 [doi]
- Privacy preserving learning in negotiationSheng Zhang, Fillia Makedon. 821-825 [doi]
- Applying model checking to BPEL4WS business collaborationsJesús Arias-Fisteus, Luis Sánchez Fernández, Carlos Delgado Kloos. 826-830 [doi]
- Supporting e-commerce systems formalization with choreography languagesMario Bravetti, Claudio Guidi, Roberto Lucchi, Gianluigi Zavattaro. 831-835 [doi]
- Editorial message for the special track on embedded systems: applications, solutions, and techniquesAlessio Bechini, François Bodin, Cosimo Antonio Prete. 836-837 [doi]
- Efficient on-line identification of hot data for flash-memory managementJen-Wei Hsieh, Li-Pin Chang, Tei-Wei Kuo. 838-842 [doi]
- A fast start-up technique for flash memory based computing systemsKeun Soo Yim, Jihong Kim, Kern Koh. 843-849 [doi]
- Motion estimation performance of the TM3270 processorJan-Willem van de Waerdt, Gerrit A. Slavenburg, Jean-Paul van Itegem, Stamatis Vassiliadis. 850-856 [doi]
- MSA: a memory-aware utility accrual scheduling algorithmShahrooz Feizabadi, Binoy Ravindran, E. Douglas Jensen. 857-862 [doi]
- A code compression advisory tool for embedded processorsSreejith K. Menon, Priti Shankar. 863-867 [doi]
- On designing a low-power garbage collector for java embedded devices: a case studyPaul Griffin, Witawas Srisa-an, J. Morris Chang. 868-873 [doi]
- Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processorsMourad Debbabi, Azzam Mourad, Nadia Tawbi. 874-878 [doi]
- Automatic generation of application-specific systems based on a micro-programmed Java coreFlavius Gruian, Per Andersson, Krzysztof Kuchcinski, Martin Schoeberl. 879-884 [doi]
- Performance analysis framework for large software-intensive systems with a message passing paradigmChristian Del Rosso. 885-889 [doi]
- Profiling and mapping of parallel workloads on network processorsNing Weng, Tilman Wolf. 890-896 [doi]
- Real-time task scheduling anomaly: observations and preventionYa-Shu Chen, Li-Pin Chang, Tei-Wei Kuo, Aloysius K. Mok. 897-898 [doi]
- Efficient placement and routing in grid-based networksRoozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid Sarrafzadeh. 899-900 [doi]
- Avoiding data conversions in embedded media processorsBen H. H. Juurlink, Asadollah Shahbahrami, Stamatis Vassiliadis. 901-902 [doi]
- Two-level assurance of QoS requirements for distributed real-time and embedded systemsShih-Hsi Liu, Barrett R. Bryant, Jeffrey G. Gray, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston. 903-904 [doi]
- Editorial message: special track on applications of evolutionary computationBryant A. Julstrom. 905-906 [doi]
- Airspace congestion smoothing by multi-objective genetic algorithmDaniel Delahaye, Sofiane Oussedik, Stephane Puechmorel. 907-912 [doi]
- The container loading problemAndrew Lim, Xingwen Zhang. 913-917 [doi]
- An artificial immune system approach to document clusteringNa Tang, V. Rao Vemuri. 918-922 [doi]
- A new variable-length genome genetic algorithm for data clustering in semeioticsIvan De Falco, Ernesto Tarantino, Antonio Della Cioppa, F. Gagliardi. 923-927 [doi]
- A novel grammar-based genetic programming approach to clusteringIvan De Falco, Ernesto Tarantino, Antonio Della Cioppa, F. Gagliardi. 928-932 [doi]
- Heuristic methods for graph coloring problemsAndrew Lim, Yi Zhu, Q. Lou, Brian Rodrigues. 933-939 [doi]
- A tabu search algorithm for the safe transportation of hazardous materialsL. Zhang, Songshan Guo, Yunsong Zhu, Andrew Lim. 940-946 [doi]
- Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithmJeffrey S. Goettl, Alexander W. Brugh, Bryant A. Julstrom. 947-951 [doi]
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA s genetic arms raceHaiyu Hou, Gerry V. Dozier. 952-956 [doi]
- Inductive inference of chaotic series by Genetic Programming: a Solomonoff-based approachIvan De Falco, Ernesto Tarantino, Antonio Della Cioppa, Alessandro Passaro. 957-958 [doi]
- Evolutionary computation for biclustering of gene expressionJesús S. Aguilar-Ruiz, Federico Divina. 959-960 [doi]
- Special track on handheld computingQusay H. Mahmoud, Zakaria Maamar. 961-962 [doi]
- Agent technology and reconfigurable computing for mobile devicesTimothy O Sullivan, Richard Studdert. 963-969 [doi]
- Pocket PC beacons: Wi-Fi based human tracking and followingAnkit Arora, Alexander Ferworn. 970-974 [doi]
- Comparing table views for small devicesCarolyn R. Watters, Rui Zhang, Jack Duffy. 975-980 [doi]
- A generic serializer for mobile devicesMattia Monga, Angelo Scotto. 981-985 [doi]
- Dynamic group communication in mobile peer-to-peer environmentsEiko Yoneki, Jean Bacon. 986-992 [doi]
- Efficiency of prefix and non-prefix codes in string matching over compressed databases on handheld devicesAbdelghani Bellaachia, Iehab Al Rassan. 993-997 [doi]
- An evaluation of Qinna, a component-based QoS architecture for embedded systemsJean-Charles Tournier, Jean-Philippe Babau, Vincent Olive. 998-1002 [doi]
- PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devicesAngela Carrillo Ramos, Jérôme Gensel, Marlène Villanova-Oliver, Hervé Martin. 1003-1008 [doi]
- Editorial message: special track on information access and retrievalFabio Crestani, Gabriella Pasi. 1009-1010 [doi]
- Semantic cores for representing documents in IRMustapha Baziz, Mohand Boughanem, Nathalie Aussenac-Gilles, Claude Chrisment. 1011-1017 [doi]
- An information retrieval model using the fuzzy proximity degree of term occurencesMichel Beigbeder, Annabelle Mercier. 1018-1022 [doi]
- On search in peer-to-peer file sharing systemsWai Gen Yee, Ophir Frieder. 1023-1030 [doi]
- Retrieving lightly annotated images using image similaritiesMasashi Inoue, Naonori Ueda. 1031-1037 [doi]
- Methods for learning classifier combinations: no clear winnerDmitriy Fradkin, Paul B. Kantor. 1038-1043 [doi]
- Text classification based on data partitioning and parameter varying ensemblesYan-Shi Dong, Ke-Song Han. 1044-1048 [doi]
- Rule-based word clustering for document metadata extractionHui Han, Eren Manavoglu, Hongyuan Zha, Kostas Tsioutsiouliklis, C. Lee Giles, Xiangmin Zhang. 1049-1053 [doi]
- Using recursive classification to discover predictive featuresFan Li, Yiming Yang. 1054-1058 [doi]
- The effect of named entities on effectiveness in cross-language information retrieval evaluationThomas Mandl, Christa Womser-Hacker. 1059-1064 [doi]
- A hierarchical naive Bayes mixture model for name disambiguation in author citationsHui Han, Wei Xu, Hongyuan Zha, C. Lee Giles. 1065-1069 [doi]
- Query length impact on misuse detection in information retrieval systemsLing Ma, Nazli Goharian. 1070-1075 [doi]
- Knowledge-based query expansion to support scenario-specific retrieval of medical free textZhenyu Liu, Wesley W. Chu. 1076-1083 [doi]
- InfoFilter: a system for expressive pattern specification and detection over text streamsLaali Elkhalifa, Raman Adaikkalavan, Sharma Chakravarthy. 1084-1088 [doi]
- Topic activation analysis for document streams based on document arrival rate and relevanceChunhua Cui, Hiroyuki Kitagawa. 1089-1095 [doi]
- Incremental profile learning based on a reinforcement methodHamid Tebri, Mohand Boughanem, Claude Chrisment. 1096-1101 [doi]
- Incremental collaborative filtering for mobile devicesRickard Cöster, Martin Svensson. 1102-1106 [doi]
- Extending SQL with customizable soft selection conditionsGloria Bordogna, Giuseppe Psaila. 1107-1111 [doi]
- Depth-first frequent itemset mining in relational databasesXuequn Shang, Kai-Uwe Sattler. 1112-1117 [doi]
- Editorial message: special track on mobile computing and applicationsHong Va Leong, Alvin T. S. Chan. 1118-1119 [doi]
- Location dependent query proxyXing Gao, Ali R. Hurson. 1120-1124 [doi]
- Indexing continuously changing data with mean-variance treeYuni Xia, Sunil Prabhakar, Shan Lei, Reynold Cheng, Rahul Shah. 1125-1132 [doi]
- Transactional agent model for fault-tolerant object systemsTomoaki Kaneda, Youhei Tanaka, Tomoya Enokido, Makoto Takizawa. 1133-1138 [doi]
- Alternative source coding model for mobile text communicationTakehiro Nakayama. 1139-1145 [doi]
- Developing component based adaptive applications in mobile environmentsDjalel Chefrour. 1146-1150 [doi]
- A reflective middleware architecture to support adaptive mobile applicationsCelso Maciel da Costa, Marcelo da Silva Strzykalski, Guy Bernard. 1151-1154 [doi]
- Reflective middleware for wireless sensor networksFlávia Coimbra Delicato, Paulo F. Pires, Luiz F. Rust da Costa Carmo, Luci Pirmez, José Ferreira de Rezende. 1155-1159 [doi]
- An adaptive TDMA slot assignment protocol in ad hoc sensor networksAkimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 1160-1165 [doi]
- Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenariosChristopher L. Barrett, Stephan Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith. 1166-1173 [doi]
- Location management of data items in mobile ad hoc networksTakahiro Hara. 1174-1175 [doi]
- Mobile real-time read-only transaction processing in data broadcast environmentsGuohui Li, Hongya Wang, Yunsheng Liu, Jixiong Chen. 1176-1177 [doi]
- MultiMedia and visualization trackChaman L. Sabharwal. 1178-1179 [doi]
- A pivot-based index structure for combination of feature vectorsBenjamin Bustos, Daniel A. Keim, Tobias Schreck. 1180-1184 [doi]
- Automated terrain generation using LIDAR and waterbody survey dataMaik Flanagin, Aurélien Grenotton, Jay J. Ratcliff, Mahdi Abdelguerfi, Kevin Shaw. 1185-1189 [doi]
- Contour-based partial object recognition using symmetry in image databasesJune-Suh Cho, Joonsoo Choi. 1190-1194 [doi]
- An adaptive distance computation technique for image retrieval systemsNualsawat Hiransakolwong, Kien A. Hua, Soontharee Koompairojn, Khanh Vu, Sheau-Dong Lang. 1195-1199 [doi]
- Visualization of neuronal fiber connections from DT-MRI with global optimizationNathaniel Fout, Jian Huang, Zhaohua Ding. 1200-1206 [doi]
- Interactive 3D visualization of highly connected ecological networks on the WWWIlmi Yoon, Sanghyuk Yoon, Neo Martinez, Rich Williams, Jennifer Dunne. 1207-1212 [doi]
- Similarity measurement for aggregation of spatial objectsByungwoo Kim, Jong P. Yoon. 1213-1217 [doi]
- MAMView: a visual tool for exploring and understanding metric access methodsFabio Jun Takada Chino, Marcos R. Vieira, Agma J. M. Traina, Caetano Traina Jr.. 1218-1223 [doi]
- Time-varying, multivariate volume data reductionNathaniel Fout, Kwan-Liu Ma, James P. Ahrens. 1224-1230 [doi]
- Discovering parametric clusters in social small-world graphsJonathan McPherson, Kwan-Liu Ma, Michael Ogawa. 1231-1238 [doi]
- The role of visualization in effective data cleaningYu Qian, Kang Zhang. 1239-1243 [doi]
- A framework for collaborative control of applicationsJames R. Miller, Serhan Yengulalp, Patrick L. Sterner. 1244-1249 [doi]
- Surface reconstruction using shadow profilometryChristopher P. Walker, Norbert Maerz, Michael G. Hilgers. 1250-1251 [doi]
- Solving linear and one-way constraints for web document layoutHiroshi Hosobe. 1252-1253 [doi]
- Issues in augmenting image databases to improve processing content-based similarity searchesLeonard Brown. 1254-1255 [doi]
- Editorial message: special track on object oriented programming languages and systemsDavide Ancona, Rajeev R. Raje, Mirko Viroli. 1256-1257 [doi]
- Safe and flexible objectsLorenzo Bettini, Viviana Bono, Silvia Likavec. 1258-1263 [doi]
- [a]C#: C# with a customizable code annotation mechanismWalter Cazzola, Antonio Cisternino, Diego Colombo. 1264-1268 [doi]
- Selective method combination in mixin-based compositionTetsuo Kamina, Tetsuo Tamai. 1269-1273 [doi]
- Virtual namespace functions: an alternative to virtual member functions in C++ and advice in AspectC++Christian Heinlein. 1274-1281 [doi]
- RAIL: code instrumentation for .NETBruno Cabral, Paulo Marques, Luís Moura Silva. 1282-1287 [doi]
- Empirical evaluation of OpenCCM for Java-based distributed, real-time, and embedded systemsShruti Gorappa, Raymond Klefstad. 1288-1292 [doi]
- Editorial message: special track on organizational engineeringJosé M. Tribolet, Robert Winter, Artur Caetano. 1293-1294 [doi]
- Method construction - a core approach to organizational engineeringChristian Braun, Felix Wortmann, Martin Hafner, Robert Winter. 1295-1299 [doi]
- Strategic alignment in requirements analysis for organizational IT: an integrated approachSteven J. Bleistein, Karl Cox, June M. Verner. 1300-1307 [doi]
- Using roles and business objects to model and understand business processesArtur Caetano, António Rito Silva, José M. Tribolet. 1308-1313 [doi]
- Knowledge based approach to semantic composition of teams in an organizationSimona Colucci, Tommaso Di Noia, Eugenio Di Sciascio, Francesco M. Donini, Giacomo Piscitelli, Stefano Coppi. 1314-1319 [doi]
- Value-oriented design of service coordination processes: correctness and trustRoel Wieringa, Jaap Gordijn. 1320-1327 [doi]
- A case study of separation of duty properties in the context of the Austrian eLaw processAndreas Schaad, Pascal Spadone, Helmut Weichsel. 1328-1332 [doi]
- Extending the business engineering framework for application integration purposesJoachim Schelp, Alexander Schwinn. 1333-1337 [doi]
- Assessment and impact analysis for aligning business processes and software systemsLerina Aversano, Thierry Bodhuin, Maria Tortorella. 1338-1343 [doi]
- Enterprise architecture: business and IT alignmentCarla Marques Pereira, Pedro Sousa. 1344-1345 [doi]
- AOP for software evolution: a design oriented approachWalter Cazzola, Sonia Pini, Massimo Ancona. 1346-1350 [doi]
- Supporting efficient dynamic aspects through reflection and dynamic compilationFrederic Ogel, Gaël Thomas, Bertil Folliot. 1351-1356 [doi]
- The # model: separation of concerns for reconciling modularity, abstraction and efficiency in distributed parallel programmingFrancisco Heron de Carvalho Junior, Rafael Dueire Lins. 1357-1364 [doi]
- A two-dimensional separation of concerns for compiler constructionXiaoqing Wu, Suman Roychoudhury, Barrett R. Bryant, Jeffrey G. Gray, Marjan Mernik. 1365-1369 [doi]
- Weaving a debugging aspect into domain-specific language grammarsHui Wu, Jeffrey G. Gray, Suman Roychoudhury, Marjan Mernik. 1370-1374 [doi]
- Handling run-time updates in distributed applicationsMarco Milazzo, Giuseppe Pappalardo, Emiliano Tramontana, Giuseppe Ursino. 1375-1380 [doi]
- Metrics for evaluating concern separation and compositionAntonella Di Stefano, Marco Fargetta, Giuseppe Pappalardo, Emiliano Tramontana. 1381-1382 [doi]
- Editorial: programming languages trackChang-Hyun Jo, Marjan Mernik, Barrett R. Bryant. 1383-1384 [doi]
- Compiling regular patterns to sequential machinesBurak Emir. 1385-1389 [doi]
- Understanding access restriction of variant parametric types and Java wildcardsGiovanni Rimassa, Mirko Viroli. 1390-1397 [doi]
- Disentangling the implementation of local-to-global transformations in a rewrite rule transformation systemThomas Cleenewerck, Theo D'Hondt. 1398-1403 [doi]
- Use of correctness assertions in declarative diagnosisLunjin Lu. 1404-1408 [doi]
- Reflection-based implementation of Java extensions: the double-dispatch use-caseRémi Forax, Étienne Duris, Gilles Roussel. 1409-1413 [doi]
- Mode-directed preferences for logic programsHai-Feng Guo, Bharat Jayaraman. 1414-1418 [doi]
- Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approachQian Wang, Gopal Gupta. 1419-1426 [doi]
- Agent oriented logic programming in Jinni 2004Paul Tarau. 1427-1428 [doi]
- Editorial: track reliable computations and their applicationsMartine Ceberio, Vladik Kreinovich, Michel Rueher. 1429-1430 [doi]
- Order relations and rigor in computingRamon E. Moore. 1431-1433 [doi]
- On considering an interval constraint solving algorithm as a free-steering nonlinear Gauss-Seidel procedureFrédéric Goualard. 1434-1438 [doi]
- Box-set consistency for interval-based constraint problemsGilles Chabert, Gilles Trombettoni, Bertrand Neveu. 1439-1443 [doi]
- Enhancing network intrusion detection systems with interval methodsQiang Duan, Chenyi Hu, Han-Chieh Wei. 1444-1448 [doi]
- Computing the cube of an interval matrix is NP-HardOlga Kosheleva, Vladik Kreinovich, Günter Mayer, Hung T. Nguyen. 1449-1453 [doi]
- Editorial message: special track on software engineering: methods, practices, and toolsStefan Gruner, Alessandra Cavarra, Sung Shin. 1454-1455 [doi]
- Using object-level run-time metrics to study coupling between objectsÁine Mitchell, James F. Power. 1456-1462 [doi]
- Adaptive testing of software componentsKai-Yuan Cai, T. Y. Chen, Yong-Chao Li, Wei-Yi Ning, Y. T. Yu. 1463-1469 [doi]
- Use case-driven component specification: a medical applications perspective to product line developmentM. Brian Blake, Kevin Cleary, Sohan Ranjan, Luis Ibáñez, Kevin Gary. 1470-1477 [doi]
- Confirming the influence of educational background in pair-design knowledge through experimentsGerardo Canfora, Aniello Cimitile, Félix García, Mario Piattini, Corrado Aaron Visaggio. 1478-1484 [doi]
- Source code-based software risk assessingW. Eric Wong, Yu Qi, Kendra Cooper. 1485-1490 [doi]
- A case study on building COTS-based system using aspect-oriented programmingAxel Anders Kvale, Jingyue Li, Reidar Conradi. 1491-1498 [doi]
- Towards the prioritization of regression test suites with data flow informationMatthew J. Rummel, Gregory M. Kapfhammer, Andrew Thall. 1499-1504 [doi]
- A strategy for selecting multiple componentsEd Mancebo, Anneliese Amschler Andrews. 1505-1510 [doi]
- NextGen eXtreme porting: structured by automationPradeep Varma, Ashok Anand, Donald P. Pazel, Beth Tibbitts. 1511-1517 [doi]
- High-integrity extreme programmingRichard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson. 1518-1523 [doi]
- A pattern-based development methodology for communication protocolsYoungJoon Byun, Beverly A. Sanders. 1524-1528 [doi]
- Applying agent technology to software process modeling and process-centered software engineering environmentXinpei Zhao, Keith Chan, Mingshu Li. 1529-1533 [doi]
- Plan validation via petri nets in the real-time performers Java frameworkAndrea Trentini, Daniela Micucci. 1534-1538 [doi]
- Organizing and visualizing software repositories using the growing hierarchical self-organizing mapSongsri Tangsripairoj, Mansur H. Samadzadeh. 1539-1545 [doi]
- Verification of behavioural elements of UML models using BNinh-Thuan Truong, Jeanine Souquières. 1546-1552 [doi]
- Marshaling and unmarshaling models using the entity-relationship modelFei Cao, Barrett R. Bryant, Wei Zhao, Carol C. Burt, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston. 1553-1557 [doi]
- Space-efficient page-level incremental checkpointingJunyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin. 1558-1562 [doi]
- Bridging AOP to SMP: turning GCC into a metalanguage preprocessorTiago Stein D Agostini, Antônio Augusto Fröhlich. 1563-1564 [doi]
- Synthesis of C++ software for automated teller from CSPm specificationsStephen Doxsee, William B. Gardner. 1565-1566 [doi]
- Mediation framework modeling and verification by SAMLi Yang, Raimund K. Ege, Huiqun Yu. 1567-1568 [doi]
- Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK)Jean-Marc Seigneur, Christian Damsgaard Jensen. 1569 [doi]
- Strong pseudonymous communication for peer-to-peer reputation systemsMichael Kinateder, Ralf Terdic, Kurt Rothermel. 1570-1576 [doi]
- Simulation of a distributed recommendation system for pervasive networksSeamus Moloney. 1577-1581 [doi]
- Component based trust management in the context of a virtual organizationYanjun Zuo, Brajendra Panda. 1582-1588 [doi]
- A trust-enhanced recommender system application: MoleskiingPaolo Avesani, Paolo Massa, Roberto Tiella. 1589-1593 [doi]
- How to incorporate revocation status information into the trust metrics for public-key certificationKemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum. 1594-1598 [doi]
- Editorial message: special track on ubiquitous computingGeorge Roussos, George Samaras. 1599 [doi]
- From buddyspace to CitiTag: large-scale symbolic presence for community building and spontaneous playYanna Vogiazou, Marc Eisenstadt, Martin Dzbor, Jirí Komzák. 1600-1606 [doi]
- Extending the EPC network: the potential of RFID in anti-counterfeitingThorsten Staake, Frédéric Thiesse, Elgar Fleisch. 1607-1612 [doi]
- Towards system software for physical space applicationsKaori Fujinami, Tatsuo Nakajima. 1613-1620 [doi]
- Intelligent file management in ubiquitous environmentsKartik Vishwanath, Arvind Gautam, Yugyung Lee. 1621-1625 [doi]
- Declarative control of the future home environmentTope Omitola. 1626-1627 [doi]
- Editorial message: special track on web technologies and applicationsCristina Cachero, Sara Comai, Maristella Matera. 1628-1629 [doi]
- An approach to acquire semantic relationships between termsXia Sun, Qinghua Zheng. 1630-1633 [doi]
- Survey of semantic annotation platformsLawrence H. Reeve, Hyoil Han. 1634-1638 [doi]
- Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networksDario Bonino, Fulvio Corno, Federico Pescarmona. 1639-1644 [doi]
- Reactivity on the web: paradigms and applications of the language XChangeFrançois Bry, Paula-Lavinia Patranjan. 1645-1649 [doi]
- Pollock: automatic generation of virtual web services from web sitesYi-Hsuan Lu, Yoojin Hong, Jinesh Varia, Dongwon Lee. 1650-1655 [doi]
- Tuple spaces for self-coordination of web servicesZakaria Maamar, Djamal Benslimane, Chirine Ghedira, Qusay H. Mahmoud, Hamdi Yahyaoui. 1656-1660 [doi]
- An OWL-S based approach to express grid services coordinationLaura Bocchi, Paolo Ciancarini, Rocco Moretti, Valentina Presutti, Davide Rossi. 1661-1667 [doi]
- Context-aware filtering for collaborative web systems: adapting the awareness information to the user s contextManuele Kirsch-Pinheiro, Marlène Villanova-Oliver, Jérôme Gensel, Hervé Martin. 1668-1673 [doi]
- First experiences on constraining consistency and adaptivity of W2000 modelsLuciano Baresi, Sebastiano Colazzo, Luca Mainetti. 1674-1678 [doi]
- Measuring structural complexity for class diagrams: an information theory approachYuming Zhou, Baowen Xu. 1679-1683 [doi]
- Where web engineering tool support ends: building usable websitesRichard Atterer. 1684-1688 [doi]
- A product line architecture for web applicationsLuca Balzerani, Davide Di Ruscio, Alfonso Pierantonio, Guglielmo De Angelis. 1689-1693 [doi]
- TestUml: user-metrics driven web applications testingCarlo Bellettini, Alessandro Marchetto, Andrea Trentini. 1694-1698 [doi]
- Combining queueing networks and web usage mining techniques for web performance analysisGiuliano Casale. 1699-1703 [doi]
- An empirical evaluation of client-side server selection policies for accessing replicated web servicesNabor C. Mendonça, José Airton F. Silva. 1704-1708 [doi]
- SEcS: scalable edge-computing servicesRaffaella Grieco, Delfina Malandrino, Vittorio Scarano. 1709-1713 [doi]
- Making XPath reach for the web-wide linksLule Ahmedi. 1714-1721 [doi]
- Automatic extraction of informative blocks from webpagesSandip Debnath, Prasenjit Mitra, C. Lee Giles. 1722-1726 [doi]
- SmartGate: a smart push-pull approach to support role-based security in web gatewaysRaman Adaikkalavan, Sharma Chakravarthy. 1727-1731 [doi]
- Sanitizing using metadata in MetaXQueryHao Jin, Curtis E. Dyreson. 1732-1736 [doi]
- Learning system to introduce GIS to civil engineersRonaldo Luna, William T. Lawrence, John M. Sullivan, Richard Hall, Michael G. Hilgers, Matt Buechler. 1737-1738 [doi]
- wsBus: a framework for reliable web services interactionsAbdelkarim Erradi, Piyush Maheshwari. 1739-1740 [doi]