Abstract is missing.
- An evidential approach in ensemblesYaxin Bi, Werner Dubitzky. 1-6 [doi]
- Solving first-order constraints in the theory of finite or infinite trees: introduction to the decomposable theoriesKhalil Djelloul, Thi-Bich-Hanh Dao. 7-14 [doi]
- A small-world model of the human mindJosé Luís Malaquias, Agostinho Cláudio da Rosa, Carlos Manuel B. A. Correia. 15-22 [doi]
- Facial emotion recognition by adaptive processing of tree structuresJia-Jun Wong, Siu-Yeung Cho. 23-30 [doi]
- Adaptive dynamic run-length coding for image segmentationSara Arasteh, Chih-Cheng Hung, Enmin Song. 31-36 [doi]
- On handling conflicts between rules with numerical featuresTony Lindgren. 37-41 [doi]
- A quantitative analysis of implicational paradoxes in classical mathematical logicYuichi Goto, Jingde Cheng. 42-43 [doi]
- Cooperative active contour model and its application to remote sensingNoriko Matsumoto, Norihiko Yoshida, Shuji Narazaki. 44-45 [doi]
- Dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraphXiao Ming Zhou, Chuan-Heng Ang, Tok Wang Ling. 46-51 [doi]
- TerraCost: a versatile and scalable approach to computing least-cost-path surfaces for massive grid-based terrainsThomas Hazel, Laura Toma, Jan Vahrenhold, Rajiv Wickremesinghe. 52-57 [doi]
- Using Dijkstra s algorithm to incrementally find the k-Nearest Neighbors in spatial network databasesVictor Teixeira de Almeida, Ralf Hartmut Güting. 58-62 [doi]
- An open source and web based framework for geographic and multidimensional processingJoel da Silva, Valéria Cesário Times, Ana Carolina Salgado. 63-67 [doi]
- Efficient processing of past-future spatiotemporal queriesKaterina Raptopoulou, Michael Vassilakopoulos, Yannis Manolopoulos. 68-72 [doi]
- Schemes for SR-Tree packingJayendra Venkateswaran, S. R. Subramanya. 73-77 [doi]
- Continuous spatial queries via wireless data broadcastKwangJin Park, MoonBae Song, Chong-Sun Hwang. 78-82 [doi]
- Geographical information access for non-structured dataJulien Lesbegueries, Mauro Gaio, Pierre Loustau. 83-89 [doi]
- Strong agent mobility for aglets based on the IBM JikesRVMGiacomo Cabri, Luca Ferrari, Letizia Leonardi, Raffaele Quitadamo. 90-95 [doi]
- Implementing rule-based mechanisms for agent-based price negotiationsCostin Badica, Adriana Badita, Maria Ganzha. 96-100 [doi]
- Management of unspecified semi-structured data in multi-agent environmentYosi Ben-Asher, Shlomo Berkovsky, Yaniv Eytani. 101-105 [doi]
- A multi-agent algorithm for vehicle routing problem with time windowHon Wai Leong, Ming Liu. 106-111 [doi]
- A chat interface for human-agent interaction in MASTMarco M. Carvalho, Matteo Rebeschini, James Horsley, Niranjan Suri. 112-118 [doi]
- A distributed stand-in agent based algorithm for opportunistic resource allocationPetr Benda, Pavel Jisl, Michal Pechoucek, Niranjan Suri, Marco M. Carvalho. 119-125 [doi]
- A space aware agent-based modeling process for the study of hierarchical complex systemsThi Minh Luan Nguyen, Christophe Lecerf, Ivan Lavallée. 126-127 [doi]
- From modeling to enactment of distributed workflows: an agent-based approachGiancarlo Fortino, Alfredo Garro, Wilma Russo. 128-129 [doi]
- Editorial message: special track on bioinformaticsMathew J. Palakal, William Perrizo. 130 [doi]
- A constraint logic programming approach to 3D structure determination of large protein complexesAlessandro Dal Palù, Enrico Pontelli, Jing He, Yonggang Lu. 131-136 [doi]
- A time-dependent extension of gillespie algorithm for biochemical stochastic pi-calculusPaola Lecca. 137-144 [doi]
- Two-phase clustering strategy for gene expression data setsDirk Habich, Thomas Wächter, Wolfgang Lehner, Christian Pilarsky. 145-150 [doi]
- Efficient discovery of loosely structured motifs in biological dataFabio Fassetti, Gianluigi Greco, Giorgio Terracina. 151-155 [doi]
- PackageBLAST: an adaptive multi-policy grid service for biological sequence comparisonMarcelo S. Sousa, Alba Cristina Magalhaes Alves de Melo. 156-160 [doi]
- Protein classification using transductive learning on phylogenetic profilesRoger A. Craig, Li Liao. 161-166 [doi]
- MACE: lossless compression and analysis of microarray imagesRobert Bierman, Nidhi Maniyar, Charles Parsons, Rahul Singh. 167-172 [doi]
- An integrated computational proteomics method to extract protein targets for Fanconi Anemia studiesJake Yue Chen, Sarah L. Pinkerton, Changyu Shen, Mu Wang. 173-179 [doi]
- BioChain: lexical chaining methods for biomedical text summarizationLawrence H. Reeve, Hyoil Han, Ari D. Brooks. 180-184 [doi]
- Mining and analyzing the topological structure of protein-protein interaction networksDaniel Duanqing Wu, Xiaohua Hu. 185-189 [doi]
- Innovative computational methods for transcriptomic data analysisMichael A. Langston, Andy D. Perkins, Arnold M. Saxton, Jon A. Scharff, Brynn H. Voy. 190-194 [doi]
- An extension of dead end elimination for protein side-chain conformation using merge-decouplingKet Fah Chong, Hon Wai Leong. 195-199 [doi]
- A Bayesian approach for protein classificationLuiz Merschmann, Alexandre Plastino. 200-201 [doi]
- A novel data mining algorithm for reconstructing gene regulatory networks from microarray dataPatrick C. H. Ma, Keith C. C. Chan. 202-203 [doi]
- MEDIC: MobilE Diagnosis for Improved CareEoin McLoughlin, Dympna O Sullivan, Michela Bertolotto, David C. Wilson. 204-208 [doi]
- On tracker attacks in health gridsAndrew C. Simpson, David J. Power, Mark Slaymaker. 209-216 [doi]
- Digital geometry image analysis for medical diagnosisJiandong Fang, Shiaofen Fang, Jeffrey Huang, Mihran Tuceryan. 217-221 [doi]
- Hardware/software 2D-3D backprojection on a SoPC platformNicolas Gac, Stéphane Mancini, Michel Desvignes. 222-228 [doi]
- Solving the brachytherapy seed localization problem using geometric and linear programming techniquesVikas Singh, Lopamudra Mukherjee, Jinhui Xu, Kenneth R. Hoffmann. 229-234 [doi]
- Approaches to text mining for clinical medical recordsXiaohua Zhou, Hyoil Han, Isaac Chankai, Ann Prestrud, Ari D. Brooks. 235-239 [doi]
- Visualization of unstructured text sequences of nursing narrativesShiaofen Fang, Min Lwin, Patricia Ebright. 240-244 [doi]
- J-Ortho: an open-source orthodontic treatment simulatorMaria Andréia F. Rodrigues, Wendel Bezerra Silva, Rafael G. Barbosa, Isabel M. M. P. Ribeiro, Milton E. Barbosa Neto. 245-249 [doi]
- Effective shape-based retrieval and classification of mammogramsJoaquim Cezar Felipe, Marcela Xavier Ribeiro, Elaine P. M. de Sousa, Agma J. M. Traina, Caetano Traina Jr.. 250-255 [doi]
- Development of a collaborative environment applied to pediatric oncologyAndré Luiz Miranda da Rosa, Ilana de Almeida Souza, Adilson Yuuji Hira, Marcelo Knörich Zuffo. 256-257 [doi]
- A new similarity measure for histograms applied to content-based retrieval of medical imagesJoaquim Cezar Felipe, Agma J. M. Traina, Caetano Traina Jr.. 258-259 [doi]
- Editorial message: computer ethics & human values trackKeith W. Miller. 260 [doi]
- Good/fast/cheap: contexts, relationships and professional responsibility during software developmentMarty J. Wolf, Frances S. Grodzinsky. 261-266 [doi]
- Moral responsibility and IT for human enhancementNoëmi Manders-Huits. 267-271 [doi]
- A dialogue on responsibility, moral agency, and IT systemsDeborah G. Johnson, Keith W. Miller. 272-276 [doi]
- GIS, SINKS, FILL, and disappearing wetlands: unintended consequences in algorithm development and useDavid G. Jenkins, Lisa A. McCauley. 277-282 [doi]
- The advent of trusted computing: implications for digital forensicsMike Burmester, Judie Mulholland. 283-287 [doi]
- Investigating Internet Crimes Against Children (ICAC) cases in the state of FloridaBob Breeden, Judie Mulholland. 288-292 [doi]
- Automated recognition of event scenarios for digital forensicsJonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay. 293-300 [doi]
- Identification of parameters and restoration of motion blurred imagesR. Lokhande, K. V. Arya, P. Gupta. 301-305 [doi]
- Editorial message: special track on computer-aided law and advanced technologiesGiovanni Sartor, Alessandra Villecco. 306-307 [doi]
- A multi-agent system for efficiently managing query answering in an e-government scenarioPasquale De Meo, Giovanni Quattrone, Hind Fadil, Domenico Ursino. 308-312 [doi]
- On the relationship between roles and power: preliminary reportMaria Fasli. 313-318 [doi]
- Deontic relevant logic as the logical basis for legal information systemsJingde Cheng. 319-320 [doi]
- Editorial message: special track on computer securityGiampaolo Bella, Peter Y. A. Ryan. 321-322 [doi]
- An initial analysis and presentation of malware exhibiting swarm-like behaviorFernando C. Colón Osorio, Zachi Klopman. 323-329 [doi]
- Noxes: a client-side solution for mitigating cross-site scripting attacksEngin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic. 330-337 [doi]
- Lost in just the translationRyan Stutsman, Christian Grothoff, Mikhail J. Atallah, Krista Grothoff. 338-345 [doi]
- To infinity and beyond or, avoiding the infinite in security protocol analysisJames Heather, Steve Schneider. 346-353 [doi]
- SF-HME system: a hierarchical mixtures-of-experts classification system for spam filteringPetros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas. 354-360 [doi]
- An anomaly-driven reverse proxy for web applicationsFredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda. 361-368 [doi]
- Bootstrapping multi-party ad-hoc securitySadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao. 369-375 [doi]
- Extending noninterference properties to the timed worldJian Huang, A. W. Roscoe. 376-383 [doi]
- Improving address space randomization with a dynamic offset randomization techniqueHaizhi Xu, Steve J. Chapin. 384-391 [doi]
- Special track editorial: constraint solving and programmingStefano Bistarelli, Eric Monfroy, Barry O Sullivan. 392-393 [doi]
- A new local consistency for weighted CSP dedicated to long domainsMatthias Zytnicki, Christine Gaspin, Thomas Schiex. 394-398 [doi]
- Enforcing path uniqueness in internet routingDaniel Lucraft, Andrew Eremin, Farid Ajili. 399-403 [doi]
- A constraint solver for sequences and its applicationsNikolai Kosmatov. 404-408 [doi]
- Efficient interactive configuration of unbounded modular systemsErik Roland van der Meer, Andrzej Wasowski, Henrik Reif Andersen. 409-414 [doi]
- From satisfiability to consistency through certificates: application to partially defined constraintsArnaud Lallouet, Andrei Legtchenko. 415-416 [doi]
- Editorial message: special track on coordination models, languages and applicationsRonaldo Menezes, Alessandro Ricci. 417-418 [doi]
- A coordination model for the semantic webRobert Tolksdorf, Elena Paslaru Bontas, Lyndon J. B. Nixon. 419-423 [doi]
- Defining coordination in multi-agent systems within an agent oriented software engineering methodologyJorge J. Gómez-Sanz, Juan Pavón. 424-428 [doi]
- BTS: a Byzantine fault-tolerant tuple spaceAlysson Neves Bessani, Joni da Silva Fraga, Lau Cheuk Lung. 429-433 [doi]
- Making tuple spaces physical with RFID tagsMarco Mamei, Renzo Quaglieri, Franco Zambonelli. 434-439 [doi]
- The fading concept in tuple-space systemsRonaldo Menezes, Alan Wood. 440-444 [doi]
- Towards chemical coordination for gridsJean-Pierre Banâtre, Pascal Fradet, Yann Radenac. 445-446 [doi]
- An abstract architecture for semantic service coordination in agent-based intelligent peer-to-peer environmentsCésar Cáceres, Alberto Fernández, Sascha Ossowski, Matteo Vasirani. 447-448 [doi]
- Editorial message: special track on database theory, technology, and applicationsRamzi A. Haraty, Apostolos N. Papadopoulos, Junping Sun. 449 [doi]
- On the transitive closure representation and adjustable compressionYangjun Chen, Donovan Cooke. 450-455 [doi]
- Incorporating fuzziness in XML and mapping fuzzy relational data into fuzzy XMLAbhishek Gaurav, Reda Alhajj. 456-460 [doi]
- Ontology-based integration for relational databasesDejing Dou, Paea LePendu. 461-466 [doi]
- Conceptual modeling of XML dataCarlo Combi, Barbara Oliboni. 467-473 [doi]
- MTree: an XML XPath graph indexP. Mark Pettovello, Farshad Fotouhi. 474-481 [doi]
- Grouping and aggregation in the concept-oriented data modelAlexandr A. Savinov. 482-486 [doi]
- Fingerprinting relational databasesFei Guo, Jianmin Wang, Deyi Li. 487-492 [doi]
- Design and development of a multiversion OLAP applicationJarernsri L. Mitrpanont, Somchart Fugkeaw. 493-497 [doi]
- Query reformulation for an XML-based data integration systemBernadette Farias Lóscio, Thiago Costa, Ana Carolina Salgado. 498-502 [doi]
- An extendible multidimensional array system for MOLAPTatsuo Tsuji, Akihiro Hara, Ken Higuchi. 503-510 [doi]
- A memory subsystem with comparator arrays for main memory database operationsJun Miyazaki. 511-512 [doi]
- Stochastic study of real-time transactions success ratioSamy Semghouni, Bruno Sadeg, Laurent Amanton, Alexandre Berred. 513-514 [doi]
- An accuracy-aware compression technique for multidimensional data cubesAlfredo Cuzzocrea. 515-516 [doi]
- Exploit sequencing to accelerate hot XML query pattern miningJianhua Feng, Qian Qian, Jianyong Wang, Lizhu Zhou. 517-524 [doi]
- Semantic analysis of web site audienceJean-Pierre Norguet, Esteban Zimányi, Ralf Steinberger. 525-529 [doi]
- Associative text categorization exploiting negated wordsElena Baralis, Paolo Garza. 530-535 [doi]
- SMART-TV: a fast and scalable nearest neighbor based classifier for data miningTaufik Abidin, William Perrizo. 536-540 [doi]
- A probability analysis for candidate-based frequent itemset algorithmsNele Dexters, Paul W. Purdom, Dirk Van Gucht. 541-545 [doi]
- Looking for monotonicity properties of a similarity constraint on sequencesIeva Mitasiunaite, Jean-François Boulicaut. 546-552 [doi]
- The impact of sample reduction on PCA-based feature extraction for supervised learningMykola Pechenizkiy, Seppo Puuronen, Alexey Tsymbal. 553-558 [doi]
- A privacy preserving web recommender systemRanieri Baraglia, Claudio Lucchese, Salvatore Orlando, Massimo Serranó, Fabrizio Silvestri. 559-563 [doi]
- Selecting parameters of SVM using meta-learning and kernel matrix-based meta-featuresCarlos Soares, Pavel Brazdil. 564-568 [doi]
- Embedded predictive modeling in a parallel relational databaseA. Dorneich, Ramesh Natarajan, Edwin P. D. Pednault, Fateh Tipu. 569-574 [doi]
- Induction of compact decision trees for personalized recommendationDaniel Nikovski, Veselin Kulev. 575-581 [doi]
- A methodology for comparing classifiers that allow the control of biasAnton Zamolotskikh, Sarah Jane Delany, Padraig Cunningham. 582-587 [doi]
- Towards low-perturbation anonymity preserving pattern discoveryMaurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi. 588-592 [doi]
- Mining sequences with temporal annotationsFosca Giannotti, Mirco Nanni, Dino Pedreschi, Fabio Pinelli. 593-597 [doi]
- Discovery of interesting episodes in sequence dataAmbika Srinivasan, Dhawal Bhatia, Sharma Chakravarthy. 598-602 [doi]
- Privacy-preserving SVM using nonlinear kernels on horizontally partitioned dataHwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya. 603-610 [doi]
- Effective rule induction from labeled graphsTamás Horváth, Susanne Hoche, Stefan Wrobel. 611-616 [doi]
- Towards value disclosure analysis in modeling general databasesXintao Wu, Songtao Guo, Yingjiu Li. 617-621 [doi]
- On the use of spectral filtering for privacy preserving data miningSongtao Guo, Xintao Wu. 622-626 [doi]
- Expanding the taxonomies of bibliographic archives with persistent long-term themesRene Schult, Myra Spiliopoulou. 627-634 [doi]
- Semi-supervised outlier detectionJing Gao, Haibin Cheng, Pang-Ning Tan. 635-636 [doi]
- CLUC: a natural clustering algorithm for categorical datasets based on cohesionAida Nemalhabib, Nematollaah Shiri. 637-638 [doi]
- Bias-free hypothesis evaluation in multirelational domainsChristine Körner, Stefan Wrobel. 639-640 [doi]
- Editorial message: special track on data streamsJesús S. Aguilar-Ruiz, Francisco J. Ferrer-Troyano. 641-642 [doi]
- Evaluating the intrinsic dimension of evolving data streamsElaine P. M. de Sousa, Agma J. M. Traina, Caetano Traina Jr., Christos Faloutsos. 643-648 [doi]
- A framework for resource-aware knowledge discovery in data streams: a holistic approach with its application to clusteringMohamed Medhat Gaber, Philip S. Yu. 649-656 [doi]
- Data streams classification by incremental rule learning with parameterized generalizationFrancisco J. Ferrer-Troyano, Jesús S. Aguilar-Ruiz, José Cristóbal Riquelme Santos. 657-661 [doi]
- Discretization from data streams: applications to histograms and data miningJoão Gama, Carlos Pinto. 662-667 [doi]
- Editorial message: special track on dependable and adaptive distributed systemsKarl M. Göschka, Svein O. Hallsteinsen, Rui Carlos Oliveira, Alexander Romanovsky. 668-669 [doi]
- Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcastsFrançois Bonnet, Paul D. Ezhilchelvan, Einar Vollset. 670-674 [doi]
- Evaluating unstructured peer-to-peer lookup overlaysIdit Keidar, Roie Melamed. 675-679 [doi]
- Verification of coordinated exception handlingFernando Castor Filho, Alexander Romanovsky, Cecília M. F. Rubira. 680-685 [doi]
- Proactive resilience through architectural hybridizationPaulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo. 686-690 [doi]
- Service interface: a new abstraction for implementing and composing protocolsOlivier Rütti, Pawel T. Wojciechowski, André Schiper. 691-696 [doi]
- An adaptive index allocation scheme for reliable data retrieval and provision in peer-to-peer networksAtsushi Ito, Tomoyuki Ohta, Kouichi Mitsukawa, Yoshiaki Kakuda. 697-704 [doi]
- Combining supervised and unsupervised monitoring for fault detection in distributed computing systemsHaifeng Chen, Guofei Jiang, Cristian Ungureanu, Kenji Yoshihira. 705-709 [doi]
- Post-partition reconciliation protocols for maintaining consistencyMikael Asplund, Simin Nadjm-Tehrani. 710-717 [doi]
- Modeling of component-based adaptive distributed applicationsKurt Geihs, Mohammad Ullah Khan, Roland Reichle, Arnor Solberg, Svein O. Hallsteinsen, Simon Merral. 718-722 [doi]
- From spontaneous total order to uniform total order: different degrees of optimistic deliveryLuís Rodrigues, José Mocito, Nuno Carvalho. 723-727 [doi]
- Revisiting 1-copy equivalence in clustered databasesRui Carlos Oliveira, José Pereira, Alfrânio Correia Jr., Edward Archibald. 728-732 [doi]
- Distributed context management in a mobility and adaptation enabling middleware (MADAM)Marius Mikalsen, Nearchos Paspallis, Jacqueline Floch, Erlend Stav, George A. Papadopoulos, Akis Chimaris. 733-734 [doi]
- Analysis of deployment dependencies in software componentsMeriem Belguidoum, Fabien Dagnat. 735-736 [doi]
- A framework for (re)deploying components in distributed real-time and embedded systemsNishanth Shankaran, Jaiganesh Balasubramanian, Douglas C. Schmidt, Gautam Biswas, Patrick J. Lardieri, Ed Mulholland, Thomas Damiano. 737-738 [doi]
- Editorial message: special track on distributed systems and grid computingRobert van Engelen, Madhusudhan Govindaraju, Nectarios Koziris, Kleanthis Psarris. 739-740 [doi]
- Service-oriented grid computation for large-scale parameter estimation in complex environmental modelingKejing He, Shoubin Dong, Li Zheng. 741-745 [doi]
- Building the functional performance model of a processorAlexey L. Lastovetsky, Ravi Reddy, Robert Higgins. 746-753 [doi]
- Grid resource discovery based on semantic P2P communitiesJuan Li, Son T. Vuong. 754-758 [doi]
- ::::FCAN::::: Flash Crowds Alleviation NetworkChenyu Pan, Merdan Atajanov, Mohammad Belayet Hossain, Toshihiko Shimokawa, Norihiko Yoshida. 759-765 [doi]
- xSpace: a tuple space for XML & its application in orchestration of web servicesUmesh Bellur, Siddharth Bondre. 766-772 [doi]
- Design and implementation of a real-time notification service within the context of embedded ORB and the CAN busTarek Guesmi, Houria Rezig. 773-777 [doi]
- J2EE server scalability through EJB replicationSylvain Sicard, Noel De Palma, Daniel Hagimont. 778-785 [doi]
- Planning spatial workflows to optimize grid performanceLuiz A. V. C. Meyer, James Annis, Michael Wilde, Marta Mattoso, Ian T. Foster. 786-790 [doi]
- Improving the performances of proxy cache replacement policies by considering infrequent objectsHon Wai Leong, Bo Guan. 791-796 [doi]
- Implementation of a dynamic adjustment mechanism with efficient replica selection in data grid environmentsChao-Tung Yang, I-Hsien Yang, Chun-Hsiang Chen, Shih-Yu Wang. 797-804 [doi]
- ALTER: first step towards dependable gridsXuanhua Shi, Hai Jin, Weizhong Qiang. 805-806 [doi]
- A black-box approach for web application SLAJeremy Philippe, Noel De Palma, Sara Bouchenak, Fabienne Boyer, Daniel Hagimont. 807-808 [doi]
- Editorial message: special track on document engineeringRafael Dueire Lins. 809-810 [doi]
- High performance XSL-FO rendering for variable data printingFabio Giannetti, Luiz Gustavo Fernandes, Rogerio Timmers, Thiago Nunes, Mateus Raeder, Márcio Bastos Castro. 811-817 [doi]
- Managing duplicates in a web archiveDaniel Gomes, André L. Santos, Mário J. Silva. 818-825 [doi]
- Angular measures for feature selection in text categorizationElías F. Combarro, Elena Montañés, José Ranilla, Irene Díaz. 826-830 [doi]
- Computing edit distances between an XML document and a schema and its application in document classificationGuangming Xing, Chaitanya R. Malla, Zhonghang Xia, Snigdha Dantala Venkata. 831-835 [doi]
- An implicit segmentation-based method for recognition of handwritten strings of charactersPaulo Rodrigo Cavalin, Alceu de Souza Britto Jr., Flávio Bortolozzi, Robert Sabourin, Luiz E. Soares de Oliveira. 836-840 [doi]
- Detection and segmentation of tables and math-zones from document imagesS. Mandal, S. P. Chowdhury, Amit K. Das, Bhabatosh Chanda. 841-846 [doi]
- A new table interpretation methodology with little knowledge base: table interpretation methodologyLuiz Antônio Pereira Neves, João Marques de Carvalho, Jacques Facon, Flávio Bortolozzi. 847-852 [doi]
- Binarizing and filtering historical documents with back-to-front interferenceJoão Marcelo Monte da Silva, Rafael Dueire Lins, Valdemar Cardoso da Rocha. 853-858 [doi]
- Evaluation of a language identification system for mono- and multilingual text documentsOlga Artemenko, Thomas Mandl, Margaryta Shramko, Christa Womser-Hacker. 859-860 [doi]
- Finding optimal linear measures for feature selection in text categorizationElena Montañés, Elías F. Combarro, José Ranilla, Irene Díaz. 861-862 [doi]
- Comparisons of file formats for image transmission through networksRafael Dueire Lins, Charlana Rodrigues. 863-864 [doi]
- Editorial message: special track on e-commerce technologiesSviatoslav Braynov, Manuel Núñez, Fernando Rubio. 865-866 [doi]
- Mining and prediction of temporal navigation patterns for personalized services in e-commerceVincent S. Tseng, Jeng-Chuan Chang, Kawuu Weicheng Lin. 867-871 [doi]
- Privacy-preserving demographic filteringEsma Aïmeur, Gilles Brassard, José Manuel Fernandez, Flavien Serge Mani Onana. 872-878 [doi]
- Analysis of the SET e-commerce protocol using a true concurrency process algebraM. Carmen Ruiz, Diego Cazorla, Fernando Cuartero, Juan José Pardo. 879-886 [doi]
- Dominance and ranking issues applying interval techniques in pre-negotiations for servicesPetco E. Tsvetinov, Alan Underwood, Taizan Chan. 887-888 [doi]
- Editorial message for the special track on embedded systems: applications, solutions, and techniquesAlessio Bechini, François Bodin, Cosimo Antonio Prete. 889-890 [doi]
- Data sharing protocols for SMT processorsShi-Wu Lo. 891-895 [doi]
- Efficient initialization and crash recovery for log-based file systems over flash memoryChin-Hsien Wu, Tei-Wei Kuo, Li-Pin Chang. 896-900 [doi]
- A domain-specific language for task handlers generation, applying discrete controller synthesisGwenaël Delaval, Éric Rutten. 901-905 [doi]
- Selective compilation via fast code analysis and bytecode tracingGiovanni Agosta, Stefano Crespi-Reghizzi, P. Palumbo, Martino Sykora. 906-911 [doi]
- A concurrent reactive Esterel processor based on multi-threadingXin Li, Reinhard von Hanxleden. 912-917 [doi]
- On utility accrual processor scheduling with wait-free synchronization for embedded real-time softwareHyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen. 918-922 [doi]
- QoS support for IEEE-1394 requestsChih-Yuan Huang, Tei-Wei Kuo, Ai-Chun Pang. 923-927 [doi]
- Branchless cycle prediction for embedded processorsKaveh Jokar Deris, Amirali Baniasadi. 928-932 [doi]
- On bounding energy consumption in dynamic, embedded real-time systemsHaisang Wu, Binoy Ravindran, E. Douglas Jensen. 933-934 [doi]
- File system framework for organizing sensor networksBhanu Pisupati, Geoffrey Brown. 935-936 [doi]
- Preliminary performance evaluation of an adaptive dynamic extensible processor for embedded applicationsHamid Noori, Kazuaki Murakami. 937-938 [doi]
- Editorial message: track on applications of evolutionary computationBryant A. Julstrom. 939 [doi]
- Adaptive mutation with fitness and allele distribution correlation for genetic algorithmsShengxiang Yang, Sima Uyar. 940-944 [doi]
- Analysis of an evolutionary algorithm with HyperMacromutation and stop at first constructive mutation heuristic for solving trap functionsVincenzo Cutello, Giuseppe Nicosia, Pietro Simone Oliveto. 945-949 [doi]
- Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operatorVincenzo Cutello, Giuseppe Nicosia, Mario Pavone. 950-954 [doi]
- A-Brain: the multiple problems solverMihai Oltean. 955-959 [doi]
- The effects of two replacement strategies on a genetic algorithm for scheduling jobs on computational gridsBernat Duran, Fatos Xhafa. 960-961 [doi]
- Editorial message: technical track on geometric computing and reasoningXiao-Shan Gao, Dominique Michelucci, Pascal Schreck. 962 [doi]
- NFP-based nesting algorithm for irregular shapesLiu Hu Yao, He Yuan Jun. 963-967 [doi]
- An adjustment model in a geometric constraint solving problemReyes Pavón, Fernando Díaz, M. Victoria Luzón. 968-973 [doi]
- A framework for geometric constraint satisfaction problemJulien Wintz, Pascal Schreck, Pascal Mathis. 974-978 [doi]
- Spatial geometric constraint solving based on k-connected graph decompositionGui-Fang Zhang, Xiao-Shan Gao. 979-983 [doi]
- Editorial message: special track on handheld computingQusay H. Mahmoud, Zakaria Maamar. 984-985 [doi]
- Detecting identifiable areas in mobile environmentsJörg Roth. 986-991 [doi]
- Extending the location API for J2ME to support friend finder servicesDavid Parsons. 992-996 [doi]
- Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guideRonny Kramer, Marko Modsching, Klaus ten Hagen. 997-1001 [doi]
- Interactive Mobile 3D Graphics for on-the-go visualization and walkthroughsMaria Andréia F. Rodrigues, Rafael G. Barbosa, Nabor C. Mendonça. 1002-1007 [doi]
- Personalization and visualization on handheld devicesDongsong Zhang, George Karabatis, Zhiyuan Chen, Boonlit Adipat, Liwei Dai, Zhenxue Zhang, Yu Wang. 1008-1012 [doi]
- Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing)Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed. 1013-1017 [doi]
- Editorial message: special track on information access and retrievalFabio Crestani, Gabriella Pasi. 1018-1019 [doi]
- Tree inclusion algorithm, signatures and evaluation of path-oriented queriesYangjun Chen, Yong Shi, Yibin Chen. 1020-1025 [doi]
- Distributed collaborative filtering for peer-to-peer file sharing systemsJun Wang, Johan A. Pouwelse, Reginald L. Lagendijk, Marcel J. T. Reinders. 1026-1030 [doi]
- Light stemming approaches for the French, Portuguese, German and Hungarian languagesJacques Savoy. 1031-1035 [doi]
- Using the structure of documents to improve the discovery of unexpected informationFrançois Jacquenet, Christine Largeron. 1036-1042 [doi]
- FITE-TRT: a high quality translation technique for OOV wordsAri Pirkola, Jarmo Toivonen, Heikki Keskustalo, Kalervo Järvelin. 1043-1049 [doi]
- Content-based music filtering system with editable user profileYoshinori Hijikata, Kazuhiro Iwahama, Shogo Nishida. 1050-1057 [doi]
- A scalable algorithm for high-quality clustering of web snippetsFilippo Geraci, Marco Pellegrini, Paolo Pisati, Fabrizio Sebastiani. 1058-1062 [doi]
- Graph-based automatic suggestion of relationships among images of illuminated manuscriptsMaristella Agosti, Nicola Ferro, Nicola Orio. 1063-1067 [doi]
- Investigating the use of summarisation for interactive XML retrievalZoltán Szlávik, Anastasios Tombros, Mounia Lalmas. 1068-1072 [doi]
- Email classification for automated service handlingRoss Tailby, Richard Dean, Ben Milner, Dan Smith. 1073-1077 [doi]
- Automatic structured query transformation over distributed digital librariesM. Elena Renda, Umberto Straccia. 1078-1083 [doi]
- Relevance feedback methods for logo and trademark image retrieval on the webEuripides G. M. Petrakis, Klaydios Kontis, Epimenidis Voutsakis, Evangelos E. Milios. 1084-1088 [doi]
- An innovative approach to intelligent information filteringRanda Kassab, Jean-Charles Lamirel. 1089-1093 [doi]
- Template detection for large scale search enginesLiang Chen, Shaozhi Ye, Xing Li. 1094-1098 [doi]
- Undue influence: eliminating the impact of link plagiarism on web search rankingsBaoning Wu, Brian D. Davison. 1099-1104 [doi]
- Exploiting partial decision trees for feature subset selection in e-mail categorizationHelmut Berger, Dieter Merkl, Michael Dittenbach. 1105-1109 [doi]
- An evaluation of resource description quality measuresMark Baillie, Leif Azzopardi, Fabio Crestani. 1110-1111 [doi]
- MonA: an extensible framework for web document monitoringDavid Kensche, Christian Seeling, Andreas Becks. 1112-1113 [doi]
- XML retrieval: what about using contextual relevance?Karen Sauvagnat, Lobna Hlaoua, Mohand Boughanem. 1114-1115 [doi]
- Recommendation-based browsing assistance for corporate knowledge portalsMarkus Zanker, Sergiu Gordea. 1116-1117 [doi]
- Study of the usefulness of known and new implicit indicators and their optimal combination for accurate inference of users interestsBracha Shapira, Meirav Taieb-Maimon, Anny Moskowitz. 1118-1119 [doi]
- Editorial message: special track on mobile computing and applicationsHong Va Leong, Alvin T. S. Chan. 1120-1121 [doi]
- An adaptive energy efficient cache invalidation scheme for mobile databasesAlok Madhukar, Reda Alhajj. 1122-1126 [doi]
- How to reuse exisiting interactive applications in ubiquitous computing environments?Tatsuo Nakajima. 1127-1133 [doi]
- Design and implementation of a context-aware decision algorithm for heterogeneous networksTansir Ahmed, Kyandoghere Kyamakya, Markus Ludwig. 1134-1138 [doi]
- A benchmark on soap s transport protocols performance for mobile applicationsThi Khoi Anh Phan, Zahir Tari, Peter Bertók. 1139-1144 [doi]
- Handheld devices for cooperative educational activitiesMarco de Sá, Luís Carriço. 1145-1149 [doi]
- A spatiotemporal uncertainty model of degree 1.5 for continuously changing data objectsByunggu Yu. 1150-1155 [doi]
- Distributed IPv6 addressing technique for mobile ad-hoc networksDongkeun Lee, Jaepil Yoo, Hyunsik Kang, Keecheon Kim, Kyunglim Kang. 1156-1160 [doi]
- Statistical buffering for streaming media data access in a mobile environmentJian Zhai, Xiang Li, Qing Li. 1161-1165 [doi]
- A content classification and filtering server for the internetMarcos Forte, Wanderley Lopes de Souza, Antônio Francisco do Prado. 1166-1171 [doi]
- Semantically enhanced enforcement of mobile consumer s privacy preferencesMahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri. 1172-1176 [doi]
- Scheduling dependent items in data broadcasting environmentsHao-Ping Hung, Jen-Wei Huang, Jung-Long Huang, Ming-Syan Chen. 1177-1181 [doi]
- Combining speech and pen input for effective interaction in mobile geospatial environmentsJulie Doyle, Michela Bertolotto. 1182-1183 [doi]
- Architectural issues for a location-aware role-based access control systemMaria Luisa Damiani, Elisa Bertino. 1184-1185 [doi]
- Special track on model transformation (MT 2006)Jean Bézivin, Alfonso Pierantonio, Antonio Vallecillo. 1186-1187 [doi]
- On the architectural alignment of ATL and QVTFrédéric Jouault, Ivan Kurtev. 1188-1195 [doi]
- Transforming OCL constraints: a context change approachJordi Cabot, Ernest Teniente. 1196-1201 [doi]
- Evaluation of rule-based modularization in model transformation languages illustrated with ATLIvan Kurtev, Klaas van den Berg, Frédéric Jouault. 1202-1209 [doi]
- Model refactorings through rule-based inconsistency resolutionRagnhild Van Der Straeten, Maja D'Hondt. 1210-1217 [doi]
- Software performance model-driven architectureVittorio Cortellessa, Antinisca Di Marco, Paola Inverardi. 1218-1223 [doi]
- A formal framework to generate XPDL specifications from UML activity diagramsNicolas Guelfi, Amel Mammar. 1224-1231 [doi]
- Model transformations for hypertext modeling on web information systemsPaloma Cáceres, Valeria de Castro, Juan M. Vara, Esperanza Marcos. 1232-1239 [doi]
- Simplifying transformation of software architecture constraintsChouki Tibermacine, Régis Fleurquin, Salah Sadou. 1240-1244 [doi]
- Describing dynamic software architectures using an extended UML modelMohamed Hadj Kacem, Ahmed Hadj Kacem, Mohamed Jmaiel, Khalil Drira. 1245-1249 [doi]
- Application modeling using reverse engineering techniquesT. Katsimpa, Yannis Panagis, Evangelos Sakkopoulos, Giannis Tzimas, Athanasios K. Tsakalidis. 1250-1255 [doi]
- Weaving concerns in model based development of data-intensive web applicationsAntonio Cicchetti, Davide Di Ruscio, Alfonso Pierantonio. 1256-1261 [doi]
- Transformation of yEPC business process models to YAWLJan Mendling, Michael Moser, Gustaf Neumann. 1262-1266 [doi]
- Reconciling diagrams after executing model transformationsMarcus Alanen, Torbjörn Lundkvist, Ivan Porres. 1267-1272 [doi]
- An approach to refactoring of executable UML modelsLukasz Dobrzanski, Ludwik Kuzniarz. 1273-1279 [doi]
- Advanced model transformation language constructs in the VIATRA2 frameworkAndrás Balogh, Dániel Varró. 1280-1287 [doi]
- Compiling model transformations to EJB3-specific transformer pluginsAndrás Balogh, Gergely Varró, Dániel Varró, András Pataricza. 1288-1295 [doi]
- The MT model transformation languageLaurence Tratt. 1296-1303 [doi]
- An action semantics for MOF 2.0Richard F. Paige, Dimitris Kolovos, Fiona A. C. Polack. 1304-1305 [doi]
- Towards a model-driven join point modelWalter Cazzola, Antonio Cicchetti, Alfonso Pierantonio. 1306-1307 [doi]
- xEAI-rules: executable models to simulate enterprise application cooperationRubby Casallas, Milena Vela, Catalina Acero, Nicolás López. 1308-1309 [doi]
- Quad and correctly rounded double precision math functions: portable and optimized for Intel architecturesAlexey Ershov, Andrey Naraikin, Sergey Maidanov. 1310-1317 [doi]
- Assisted verification of elementary functions using GappaFlorent de Dinechin, Christoph Quirin Lauter, Guillaume Melquiond. 1318-1322 [doi]
- Improving the compensated Horner scheme with a fused multiply and addStef Graillat, Philippe Langlois, Nicolas Louvet. 1323-1327 [doi]
- Provably faithful evaluation of polynomialsSylvie Boldo, César Muñoz. 1328-1332 [doi]
- MultiMedia and visualization trackChaman L. Sabharwal, Mingjun Zhang. 1333-1334 [doi]
- Visual exploration of genetic likelihood spaceJuw Won Park, James F. Cremer, Alberto Maria Segre. 1335-1340 [doi]
- A robust watermarking system based on ::::SVD:::: compressionMaria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia. 1341-1347 [doi]
- MPEG-7 in action: end user experiences with COSMOS-7 front end systemsHarry W. Agius, Marios C. Angelides. 1348-1355 [doi]
- Boundary surface extraction and rendering for volume datasetsShiaofen Fang, Pooja Gupta. 1356-1360 [doi]
- An evaluation system for news video streams and blogsDaisuke Kitayama, Kazutoshi Sumiya. 1361-1368 [doi]
- Hierarchical organization of a set of Gaussian mixture speaker models for scaling up indexing and retrieval in audio documentsJ. E. Rougui, Mohammed Rziza, Driss Aboutajdine, Marc Gelgon, José Martinez. 1369-1373 [doi]
- Dynamic context adaptation in multimedia documentsPaola Bertolotti, Ombretta Gaggi, Maria Luisa Sapino. 1374-1379 [doi]
- Dynamic consistency checking for temporal and spatial relations in multimedia presentationsSusan Elias, K. S. Easwarakumar, Richard Chbeir. 1380-1384 [doi]
- Navigating with inheritance in hypermedia presentationsVirginie Sans, Dominique Laurent. 1385-1392 [doi]
- Efficient target search with relevance feedback for large CBIR systemsDanzhou Liu, Kien A. Hua, Khanh Vu, Ning Yu. 1393-1397 [doi]
- Comparing images with distance functions based on attribute interactionJoaquim Cezar Felipe, Paulo M. Azevedo-Marques, André G. R. Balan, Caetano Traina Jr., Agma J. M. Traina. 1398-1399 [doi]
- Video summarization by k-medoid clusteringYoussef Hadi, Fedwa Essannouni, Rachid Oulad Haj Thami. 1400-1401 [doi]
- Editorial message: special track on object oriented programming languages and systemsDavide Ancona, Mirko Viroli. 1402-1403 [doi]
- Decoupling classes with inferred interfacesFriedrich Steimann, Philip Mayer, Andreas Meissner. 1404-1408 [doi]
- The social network of Java classesDiego Puppin, Fabrizio Silvestri. 1409-1413 [doi]
- powerJava: ontologically founded roles in object oriented programming languagesMatteo Baldoni, Guido Boella, Leendert W. N. van der Torre. 1414-1418 [doi]
- Escape analysis for synchronization removalLei Wang, Xikun Sun. 1419-1423 [doi]
- Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous componentsAntoine Beugnard. 1424-1428 [doi]
- Introducing safe unknown types in Java-like languagesGiovanni Lagorio, Elena Zucca. 1429-1434 [doi]
- Union types for object-oriented programmingAtsushi Igarashi, Hideshi Nagira. 1435-1441 [doi]
- Dynamic instantiation-checking componentsNigamanth Sridhar. 1442-1446 [doi]
- On using OO techniques to establish workflow conformanceUmesh Bellur. 1447-1448 [doi]
- Editorial message: special track on operating systems and adaptive applicationsJiman Hong, Tei-Wei Kuo. 1449-1450 [doi]
- A precise schedulability test algorithm for scheduling periodic tasks in real-time systemsWan-Chen Lu, Jen-Wei Hsieh, Wei Kuan Shih. 1451-1455 [doi]
- Towards reliable OSGi framework and applicationsHeejune Ahn, Hyukjun Oh, Chang Oan Sung. 1456-1461 [doi]
- Event-driven scheduling for dynamic workload scaling in uniprocessor embedded systemsLi-Pin Chang. 1462-1466 [doi]
- Operating system multilevel load balancingMônica Corrêa, Avelino Francisco Zorzo, Roque Scheer. 1467-1471 [doi]
- Adaptive page-level incremental checkpointing based on expected recovery timeSangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong. 1472-1476 [doi]
- Design and implementation of a kernel resource protector for robustness of Linux module programmingJongmoo Choi, Seungjae Baek, Sung Y. Shin. 1477-1481 [doi]
- Light-weight service-oriented grid application toolkitSungju Kwon, Jaeyoung Choi, Kumwon Cho. 1482-1486 [doi]
- Contentions-conscious dynamic but deterministic scheduling of computational and communication tasksFarooq Muhammad, Fabrice Muller, Michel Auguin. 1487-1492 [doi]
- The overhead model of word-level and page-level incremental checkpointingJunyoung Heo, Yookun Cho, Gwangil Jeon, Haklin Kimm. 1493-1494 [doi]
- Editorial message: special track on organizational engineering (OE)José M. Tribolet, Robert Winter, Artur Caetano. 1495-1496 [doi]
- A contingency view of organizational infrastructure requirements engineeringKarl Cox, Steven J. Bleistein, Peter Reynolds, Alan Thorogood. 1497-1504 [doi]
- Generating correct EPCs from configured C-EPCsJan Mendling, Jan Recker, Michael Rosemann, Wil M. P. van der Aalst. 1505-1510 [doi]
- Supplier network management: evaluating and rating of strategic supply networksNikolaus Müssigmann, Antonia Albani. 1511-1515 [doi]
- Conceptual process configurations in enterprise knowledge management systemsPeter Bollen. 1516-1523 [doi]
- Towards a reference model management system for business engineeringOliver Thomas, Masahiro Horiuchi, Masao Tanaka. 1524-1531 [doi]
- An evaluation of conceptual business process modelling languagesBeate List, Birgit Korherr. 1532-1539 [doi]
- The user as social actor: a focus on systems development methodology enactmentBruce H. Rowlands. 1540-1545 [doi]
- Evaluation of current architecture frameworksSusanne Leist, Gregor Zellner. 1546-1553 [doi]
- Prioritization of enterprise resource planning (ERP) systems success measures: viewpoints of two organizational stakeholder groupsPrincely Ifinedo, Nazmun Nahar. 1554-1560 [doi]
- Reference modeling and method construction: a design science perspectiveRobert Winter, Joachim Schelp. 1561-1562 [doi]
- Morphogenetic constraint-satisfaction based approach for organizational engineeringDoji Samson Lokku, Kesav V. Nori. 1563-1564 [doi]
- Modeling organizational actors and business processesArtur Caetano, José M. Tribolet. 1565-1566 [doi]
- Evaluation measures for business process modelsElvira Rolón Aguilar, Francisco Ruiz, Félix García, Mario Piattini. 1567-1568 [doi]
- A process for separation of crosscutting grid concernsPaulo Henrique M. Maia, Nabor C. Mendonça, Vasco Furtado, Walfredo Cirne, Katia B. Saikoski. 1569-1574 [doi]
- Aspect-specification based on structural type informationStefan Hanenberg, Mohammed Al-Mansari, Rainer Unland. 1575-1579 [doi]
- Policy-driven reflective enforcement of security policiesIan Welch, Fan Lu. 1580-1584 [doi]
- Separation of concerns in compiler development using aspect-orientationXiaoqing Wu, Barrett R. Bryant, Jeffrey G. Gray, Suman Roychoudhury, Marjan Mernik. 1585-1590 [doi]
- Automatically discovering design patterns and assessing concern separations for applicationsGiuseppe Pappalardo, Emiliano Tramontana. 1591-1596 [doi]
- Graphical modelling for aspect oriented SAJennifer Pérez, Elena Navarro, Patricio Letelier, Isidro Ramos. 1597-1598 [doi]
- A semantic model for safe protocol interactionSebastian Gutierrez-Nolasco, Nalini Venkatasubramanian, Carolyn L. Talcott. 1599-1600 [doi]
- Editorial message: programming languages trackChang-Hyun Jo, Marjan Mernik, Barrett R. Bryant. 1601-1602 [doi]
- Challenges in the compilation of a domain specific language for dynamic programmingRobert Giegerich, Peter Steffen. 1603-1609 [doi]
- Implementing an embedded GPU language by combining translation and generationCalle Lejdfors, Lennart Ohlsson. 1610-1614 [doi]
- KALA: Kernel Aspect language for advanced transactionsJohan Fabry, Theo D Hondt. 1615-1620 [doi]
- Efficient first-class generics on stock Java virtual machinesJames Sasitorn, Robert Cartwright. 1621-1628 [doi]
- Supporting transparent evolution of component interfacesEmanuela P. Lins, Ulrik Pagh Schultz. 1629-1630 [doi]
- A deterministic technique for extracting keyword based grammar rules from programsAlpana Dubey, Pankaj Jalote, Sanjeev Kumar Aggarwal. 1631-1632 [doi]
- Editorial: track reliable computations and their applicationsMartine Ceberio, Vladik Kreinovich, Michel Rueher. 1633-1634 [doi]
- On the numerical solution to linear problems using stochastic arithmeticRené Alt, Jean Luc Lamotte, Svetoslav Markov. 1635-1639 [doi]
- Quantum versions of k-CSP algorithms: a first step towards quantum algorithms for interval-related constraint satisfaction problemsEvgeny Dantsin, Alexander Wolpert, Vladik Kreinovich. 1640-1644 [doi]
- Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chipsMichael Orshansky, Wei-Shen Wang, Martine Ceberio, Gang Xiang. 1645-1649 [doi]
- A branch and prune algorithm for the approximation of non-linear AE-solution setsAlexandre Goldsztejn. 1650-1654 [doi]
- Pseudozero set of interval polynomialsStef Graillat, Philippe Langlois. 1655-1659 [doi]
- Inner approximation of distance constraints with existential quantification of parametersCarlos Grandón, Alexandre Goldsztejn. 1660-1661 [doi]
- Editorial message: semantic-based resource discovery, retrieval and composition trackTommaso Di Noia, Eugenio Di Sciascio, Francesco M. Donini. 1662-1663 [doi]
- Web service selection mechanisms in the Web Service Execution Environment (WSMX)Mick Kerrigan. 1664-1668 [doi]
- Efficient query routing for information retrieval in semantic overlaysHai Jin, Xiaoming Ning, Hanhua Chen, Zuoning Yin. 1669-1673 [doi]
- An approach for identifying attribute correspondences in multilingual schemasHongding Wang, Shiwei Tang, Yunhai Tong, Dongqing Yang. 1674-1678 [doi]
- Trading services in ontology-driven marketsSteffen Lamparter, Björn Schnizler. 1679-1683 [doi]
- Imprecise RDQL: towards generic retrieval in ontologies using similarity joinsAbraham Bernstein, Christoph Kiefer. 1684-1689 [doi]
- X-ARM: an asset representation model for component repository systemsGlêdson Elias da Silveira, Michael Schuenck, Yuri Negócio, Jorge Dias Jr., Sindolfo Miranda Filho. 1690-1694 [doi]
- A dissimilarity measure for ALC concept descriptionsClaudia d Amato, Nicola Fanizzi, Floriana Esposito. 1695-1699 [doi]
- Semantic-based information retrieval of biomedical dataPeng Yan, Yu Jiao, Ali R. Hurson, Thomas E. Potok. 1700-1704 [doi]
- Dynamic service discovery and mediation in the insurance industryJohn Gilman. 1705-1706 [doi]
- Hybrid ontology-based matchmaking for service discoveryDevis Bianchini, Valeria De Antonellis, Michele Melchiori. 1707-1708 [doi]
- A framework for content-based image retrieval fully exploiting the semantics of annotationTommaso Di Noia, Eugenio Di Sciascio, Francesco di Cugno, Eufemia Tinelli, Francesco M. Donini. 1709-1710 [doi]
- Editorial messageStefan Gruner, Sung Shin. 1711-1712 [doi]
- Extracting refactoring trends from open-source software and a possible solution to the related refactoring conundrumDeepak Advani, Youssef Hassoun, Steve Counsell. 1713-1720 [doi]
- Does object coupling really affect the understanding and modifying of OCL expressions?Luis Reynoso, Marcela Genero, Mario Piattini, M. Esperanza Manso. 1721-1727 [doi]
- Applying statistical methodology to optimize and simplify software metric models with missing dataW. Eric Wong, Jin Zhao, Victor K. Y. Chan. 1728-1733 [doi]
- A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architecturesValerio Schiavoni, Vivien Quéma. 1734-1738 [doi]
- Effects of changing requirements: a tracking mechanism for the analysis workflowSubhajit Datta, Robert van Engelen. 1739-1744 [doi]
- SEC: a search engine for component based software developmentSofien Khemakhem, Khalil Drira, Mohamed Jmaiel. 1745-1750 [doi]
- Adapting software components by structure fragmentationGautier Bastide, Abdelhak Seriai, Mourad Oussalah. 1751-1758 [doi]
- Supporting transparent model update in distributed CASE tool integrationPrawee Sriplakich, Xavier Blanc, Marie-Pierre Gervais. 1759-1766 [doi]
- Supporting change request assignment in open source developmentGerardo Canfora, Luigi Cerulo. 1767-1772 [doi]
- Modeling and analyzing applications with domain-specific languages by reflective rewriting: a case studyBow-Yaw Wang. 1773-1778 [doi]
- Automated generation of monitors for pattern contractsBenjamin Tyler, Jason O. Hallstrom, Neelam Soundarajan. 1779-1784 [doi]
- A UML 2-compatible language and tool for formal modeling real-time system architecturesPietro Colombo, Matteo Pradella, Matteo Rossi. 1785-1790 [doi]
- A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequencesKai Chen, Fan Jiang, Chuan-dong Huang. 1791-1797 [doi]
- On contracting different behavioral properties in component-based systemsPhilippe Collet, Alain Ozanne, Nicolas Rivierre. 1798-1799 [doi]
- Verification of a scheduler in B through a timed automata specificationOdile Nasr, Jean-Paul Bodeveix, Mamoun Filali, Miloud Rached Irit. 1800-1801 [doi]
- A security specification verification technique based on the international standard ISO/IEC 15408Shoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng. 1802-1803 [doi]
- A UML model consistency verification approach based on meta-modeling formalizationHugues Malgouyres, Gilles Motet. 1804-1809 [doi]
- Modere: the model-checking engine of RebecaMohammad Mahdi Jaghoori, Ali Movaghar, Marjan Sirjani. 1810-1815 [doi]
- Enhancing program verifications by restricting object typesCong-Cong Xing. 1816-1821 [doi]
- Abstract non-interference in a fragment of Java bytecodeDamiano Zanardini. 1822-1826 [doi]
- Static analysis of time bounded reactive properties of Boolean symbolsGuillaume Capron. 1827-1834 [doi]
- Java bytecode specification and verificationLilian Burdy, Mariela Pavlova. 1835-1839 [doi]
- Transformation of B specifications into UML class diagrams and state machinesHouda Fekih, Leila Jemni Ben Ayed, Stephan Merz. 1840-1844 [doi]
- The meta-object facility typedIman Poernomo. 1845-1849 [doi]
- Symmetry in event structuresJianmin Jiang, Jinzhao Wu, Donghuo Chen. 1850-1851 [doi]
- ARCATS: a scalable compositional analysis tool suiteYung-Pin Cheng, Yu-Ru Cheng, Hong-Yi Wang. 1852-1853 [doi]
- Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK 06)Jean-Marc Seigneur, Christian Damsgaard Jensen. 1854 [doi]
- Improving collaborative filtering with trust-based metricsJianshu Weng, Chunyan Miao, Angela Goh. 1860-1864 [doi]
- Trust-enhanced visibility for personalized document recommendationsClaudia Hess, Klaus Stein, Christoph Schlieder. 1865-1869 [doi]
- STRUDEL: supporting trust in the dynamic establishment of peering coalitionsDaniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, Saleem Bhatti. 1870-1874 [doi]
- Impact of peer incentives on the dissemination of polluted contentFabrício Benevenuto, Cristiano P. Costa, Marisa A. Vasconcelos, Virgilio Almeida, Jussara M. Almeida, Miranda Mowbray. 1875-1879 [doi]
- Information trustworthiness evaluation based on trust combinationYanjun Zuo, Brajendra Panda. 1880-1885 [doi]
- A fuzzy model for reasoning about reputation in web servicesWanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy. 1886-1892 [doi]
- BambooTrust: practical scalable trust management for global public computingEvangelos Kotsovinos, Aled Williams. 1893-1897 [doi]
- Trust-decisions on the base of maximal information of recommended direct-trustUwe Roth, Volker Fusenig. 1898-1901 [doi]
- Editorial message: special track on ubiquitous computingAchilles Kameas, George Roussos. 1900-1901 [doi]
- Ubiquitous presence systemsMatthias Kranz, Paul Holleis, Albrecht Schmidt. 1902-1909 [doi]
- BBQ: group-based querying in a ubiquitous environmentGary Hoi Kit Lam, Hong Va Leong, Stephen Chi-fai Chan. 1910-1914 [doi]
- Domotic house gatewayPaolo Pellegrino, Dario Bonino, Fulvio Corno. 1915-1920 [doi]
- Hiding complexity and heterogeneity of the physical world in smart living environmentsThierry Bodhuin, Gerardo Canfora, Rosa Preziosi, Maria Tortorella. 1921-1927 [doi]
- Methods and guidelines for the design and development of domestic ubiquitous computing applicationsAlbrecht Schmidt, Lucia Terrenghi. 1928-1929 [doi]