Publication has no abstract
- Network protocol interoperability testing based on contextual signatures and passive testingFatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli. 2-7 [doi]
- Cross-layer cooperation between membership estimation and routingJuan Carlos García, Stefan Beyer, Pablo Galdámez. 8-15 [doi]
- Practical distributed voter-verifiable secret ballot systemEdoardo Biagioni, Yingfei Dong, Wesley Peterson, Kazuo Sugihara. 16-21 [doi]
- Using geo-spatial session tagging for smart multicast session discoveryPiyush Harsh, Richard Newman. 22-27 [doi]
- A holistic mechanism against file pollution in peer-to-peer networksZhuhua Cai, Ruichuan Chen, Jianqiao Feng, Cong Tang, Zhong Chen, Jian-bin Hu. 28-34 [doi]
- Robust scheduler for grid networksDaniel M. Batista, André C. Drummond, Nelson Luis Saldanha da Fonseca. 35-39 [doi]
- NECTAR: a DTN routing protocol based on neighborhood contact historyEtienne C. R. de Oliveira, Célio V. N. de Albuquerque. 40-46 [doi]
- DoSTRACK: a system for defending against DoS attacksUdaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni. 47-53 [doi]
- Secure routing in peer-to-peer distributed hash tablesKeith Needels, Minseok Kwon. 54-58 [doi]
- BPR: a bit-level packet recovery in wireless sensor networksJianping He, Jiahai Yang, Changqing An, Xuenong Li. 59-65 [doi]
- Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambientsVirginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck. 66-73 [doi]
- Quality of service management in GMPLS-based grid OBS networksRafael Esteves, Antonio Abelém, Michael Stanton. 74-78 [doi]
- New content-aware request distribution policies in web clusters providing multiple servicesMei-Ling Chiang, Chun-Hung Wu, Yi-Jiun Liao, Yu-Fen Chen. 79-83 [doi]
- Securing key issuing in peer-to-peer networksCong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen. 84-85 [doi]
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoSAlexandre Passito, Edjair de Souza Mota, Edjard Mota. 86-87 [doi]
- Preservation of ordering in a network of brokersCássio M. M. Pereira, César A. C. Teixeira, Daniel Corrêa Lobato, Maria da Graça Campos Pimentel. 88-89 [doi]
- Towards WYDIWYS for MIMI using concept analysisJie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang Zhang. 91-97 [doi]
- Learners automated evaluation with the ODALA approachFarida Bouarab-Dahmani, Malik Si-Mohammed, Catherine Comparot, Pierre-Jean Charrel. 98-103 [doi]
- Evaluating the affective tactics of an emotional pedagogical agentPatrícia Augustin Jaques, Matheus Lehmann, Sylvie Pesty. 104-109 [doi]
- Expert system for supporting conformity inspections of software application interfaces to the ISO 9241Lorena Lira de Menezes, Mariana Romão do Nascimento, José Eustáquio Rangel de Queiroz, Joseana M. Fechine. 110-115 [doi]
- Developing and evaluating web multimodal interfaces - a case study with usability principlesAmerico Talarico Neto, Thiago J. Bittar, Renata Pontin de Mattos Fortes, Kátia Felizardo. 116-120 [doi]
- A generic library for GUI reasoning and testingJoão Carlos Silva, João Saraiva, José Creissac Campos. 121-128 [doi]
- Using web accessibility patterns for web application developmentSabina Jeschke, Olivier Pfeiffer, Helmut Vieritz. 129-135 [doi]
- A pointing method using two accelerometers for wearable computingYohei Tokoro, Tsutomu Terada, Masahiko Tsukamoto. 136-141 [doi]
- Requirements engineering using appreciative inquiry for an online community of caregivers of children with autismCarol Heins Gonzales, Gondy Leroy, Gianluca De Leo. 142-146 [doi]
- Towards the universal semantic assessment of accessibilityRui Lopes, Konstantinos Votis, Luís Carriço, Dimitrios Tzovaras, Spiridon D. Likothanassis. 147-151 [doi]
- Formalizing motivational patterns based on colors and their cultural meanings for developing web applicationsAna Luiza Dias, Júnia Coutinho Anacleto Silva, Luciana M. Silveira, Rosângela Dellosso Penteado. 152-153 [doi]
- Design and implementation on a pie menu interface for analog joysticksMasakatsu Miyamoto, Tsutomu Terada, Masahiko Tsukamoto. 154-155 [doi]
- Development of a biosignals framework for usability analysisInês Oliveira, Rui Lopes, Nuno Guimarães. 156-157 [doi]
- MATRACA: a tool to provide support for people with impaired vision when using the computer for simple tasksFrancisco Gomes de Oliveira Neto, Joseana M. Fechine, Roberta Ribeiro G. Pereira. 158-159 [doi]
- A lightweight 3D visualization and navigation system on handheld devicesWendel B. Silva, Maria Andréia Formico Rodrigues. 162-166 [doi]
- Seamless access of home theater personal computers for mobile devicesLorena F. Maia, Danilo F. S. Santos, Ricardo S. Souza, Angelo Perkusich, Hyggo Oliveira de Almeida. 167-171 [doi]
- Wireless communication glove apparatus for motion tracking, gesture recognition, data transmission, and reception in extreme environmentsMarion G. Ceruti, Vincent Vinh Dinh, Nghia Xuan Tran, Hoa Van Phan, LorRaine Duffy, Tu-Anh Ton, Guy Leonard, Emily W. Medina, Omar Amezcua, Sunny Fugate, Gary J. Rogers, Robert Luna, Jeffrey Ellen. 172-176 [doi]
- Creating a mobile web application platform: the lively kernel experiencesTommi Mikkonen, Antero Taivalsaari. 177-184 [doi]
- The device service bus: a solution for embedded device integration through web servicesGustavo Medeiros Araújo, Frank Siqueira. 185-189 [doi]
- A destination prediction method using driving contexts and trajectory for car navigation systemsKohei Tanaka, Yasue Kishino, Tsutomu Terada, Shojiro Nishio. 190-195 [doi]
- A mobility management scheme using SCTP-SIP for real-time services across heterogeneous networksHyelim Park, Myungchul Kim, Sooyong Lee, Sungwon Kang, Yongho Kim. 196-200 [doi]
- Mobility aware path maintenance in ad hoc networksSumesh J. Philip, Vishal Anand. 201-206 [doi]
- A passive conformance testing approach for a MANET routing protocolAna R. Cavalli, Stéphane Maag, Edgardo Montes de Oca. 207-211 [doi]
- A flexible QoS-aware routing protocol for infrastructure-less B3G networksNatallia Kokash, Roberto Speicys Cardoso, Pierre-Guillaume Raverdy, Valérie Issarny. 212-216 [doi]
- Scene map on wireless mobile platformJiang Yu Zheng. 217-218 [doi]
- Towards a landmark influence framework to protect location privacyMehrab Monjur, Sheikh Iqbal Ahamed. 219-220 [doi]
- High-level specification of a middleware framework for mobile ad hoc networks: spontaneousware caseVando de Freitas Batista, Nelson Souto Rosa. 221-222 [doi]
- Collaborative modeling of business processes: a comparative case studyPeter Rittgen. 225-230 [doi]
- Towards a maturity model for corporate data quality managementKai M. Hüner, Martin Ofner, Boris Otto. 231-238 [doi]
- Operational control of service processes: modularization as preconditionDiana Heckl, Jürgen Moormann. 239-244 [doi]
- Towards a fast enterprise ontology based method for post merger integrationMartin Op t Land, Hans Zwitzer, Paul Ensink, Quentin Lebel. 245-252 [doi]
- A role-based enterprise architecture frameworkArtur Caetano, António Rito Silva, José M. Tribolet. 253-258 [doi]
- The people, the process or the technology?: Using the ACE framework to make tradeoffs in service delivery improvementJay Ramanathan, Rajiv Ramnath, Randall Glassgow. 259-264 [doi]
- Concern-oriented business architecture engineeringStephan Kurpjuweit, Robert Winter. 265-272 [doi]
- Collaborative workflow assistant for organizational effectivenessJoe Bolinger, Greg Horvath, Jay Ramanathan, Rajiv Ramnath. 273-280 [doi]
- Structuring a process management center of excellenceRafael Paim, Vanessa Tavares Nunes, Bruno Pinho, Flávia Maria Santoro, Claudia Cappelli, Fernanda Araujo Baião. 281-282 [doi]
- Constraint-based modelling and analysis of organisationsViara Popova, Alexei Sharpanskykh. 283-284 [doi]
- Architecture-driven requirements engineeringWilco Engelsman, Maria E. Iacob, Henry M. Franken. 285-286 [doi]
- Impact of function inlining on resource-constrained embedded systemsBongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong. 287-292 [doi]
- Building a self-healing embedded system in a multi-OS environmentTomohiro Katori, Lei Sun, Dennis K. Nilsson, Tatsuo Nakajima. 293-298 [doi]
- DARAW: a new write buffer to improve parallel I/O energy-efficiencyXiaojun Ruan, Adam Manzanares, Kiranmai Bellam, Xiao Qin, Ziliang Zong. 299-304 [doi]
- A real-time message scheduler support for dual-sink mobile ad-hoc sensor networksJunghoon Lee, Gyung-Leen Park, Shafqat-ur Rehman. 305-309 [doi]
- Fast networking with socket-outsourcing in hosted virtual machine environmentsHideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyun Koh, Kazuhiko Kato. 310-317 [doi]
- CPS-SIM: configurable and accurate clock precision solid state drive simulatorJongmin Lee, Eujoon Byun, Hanmook Park, Jongmoo Choi, Donghee Lee, Sam H. Noh. 318-325 [doi]
- Simplifying security policy descriptions for internet servers in secure operating systemsToshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono. 326-333 [doi]
- Response time analysis of software transactional memory-based distributed real-time systemsSherif Fadel Fahmy, Binoy Ravindran, E. Douglas Jensen. 334-338 [doi]
- ::::Arbiter-Recall::::: a new function update scheme by arbitration between a remote call and a dynamic update for wireless sensor networksSangho Yi, Hong Min, Yookun Cho, Yeongkwun Kim, Injoo Jeong. 339-340 [doi]
- RPP: reference pattern based prefetching controllerHyo J. Lee, In Hwan Doh, Sam H. Noh. 341-342 [doi]
- A practical evaluation of large-memory data processing on a reliable remote memory systemHyungsoo Jung, Hyuck Han, Shin Gyu Kim, Heon Young Yeom. 343-344 [doi]
- ::::i::::*-prefer: optimizing requirements elicitation process based on actor preferencesHaihua Xie, Lin Liu, Jingwei Yang. 347-354 [doi]
- Identifying vulnerabilities and critical requirements using criminal court proceedingsTravis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón. 355-359 [doi]
- Eliciting required characteristics for usable requirements engineering approachesKristina Winbladh, Hadar Ziv, Debra J. Richardson. 360-364 [doi]
- LTS semantics for use case modelsDaniel Sinnig, Patrice Chalin, Ferhat Khendek. 365-370 [doi]
- Mapping semantically enriched Formal Tropos to business process modelsKen Decreus, Geert Poels. 371-376 [doi]
- Mapping UML sequence diagram to time petri net for requirement validation of embedded real-time systems with energy constraintsErmeson Carneiro de Andrade, Paulo Romero Martins Maciel, Gustavo Rau de Almeida Callou, Bruno Costa e Silva Nogueira, Carlos Araújo. 377-381 [doi]
- A method for developing UML state machinesChristine Choppy, Gianna Reggio. 382-388 [doi]
- Extending Problem Frames to deal with stakeholder problemsAn Agent, Goal-Oriented Approach. 389-394 [doi]
- Early phase requirements assessment of a teletreatment trialIng Widya, Bert-Jan van Beijnum, Richard Bults, V. M. Jones, Hermie Hermens, L. Sandsjö, L. Schaake, M. H. A. Huis in t Veld. 395-396 [doi]
- Architectural requirements prioritization and analysis applied to software technology evaluationKaren Smiley, Qingfeng He, Elizabeth Kielczewski, Aldo Dagnino. 397-398 [doi]
- A systematic method for generating quality requirements spectrumShunichi Suzuki, Akira Osada, Tomonori Sato, Haruhiko Kaiya, Masaaki Tanigawa, Kenji Kaijiri. 399-400 [doi]
- Requirements modelling and evaluation for digital preservation: a COTS selection method based on controlled experimentationChristoph Becker, Andreas Rauber. 401-402 [doi]
- Executing JML specifications of Java card applications: a case studyNéstor Cataño, Tim Wahls. 404-408 [doi]
- Refining spectrum-based fault localization rankingsRui Abreu, Wolfgang Mayer, Markus Stumptner, Arjan J. C. van Gemund. 409-414 [doi]
- Integration of formal specification, review, and testing for software component quality assuranceShaoying Liu, Tetsuo Tamai, Shin Nakajima. 415-421 [doi]
- Enhanced lattice-based adaptive random testingTsong Yueh Chen, Dehao Huang, Fei-Ching Kuo, Robert G. Merkel, Johannes Mayer. 422-429 [doi]
- Modeling and integrating aspects with UML activity diagramsZhanqi Cui, Linzhang Wang, Xuandong Li, Dianxiang Xu. 430-437 [doi]
- Projecting code changes onto execution traces to support localization of recently introduced bugsJohannes Bohnet, Stefan Voigt, Jürgen Döllner. 438-442 [doi]
- A case study of pattern-based software framework to improve the quality of software developmentChih-Hung Chang, Chih-Wei Lu, William C. Chu, Nien-Lin Hsueh, Chorng-Shiuh Koong. 443-447 [doi]
- Remote software protection by orthogonal client replacementMariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar. 448-455 [doi]
- Using aspects and dynamic composition to provide context-aware adaptation for mobile applicationsFlávia Coimbra Delicato, Isanio L. Araujo Santos, Paulo F. Pires, Ana Liz S. Oliveira, Thais Batista, Luci Pirmez. 456-460 [doi]
- An empirical study of incorporating cost into test suite reduction and prioritizationAdam M. Smith, Gregory M. Kapfhammer. 461-467 [doi]
- Towards a compositional approach to model transformation for software developmentSoichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keisuke Nakano. 468-475 [doi]
- Applying test-driven code search to the reuse of auxiliary functionalityOtávio Augusto Lazzarini Lemos, Sushil Krishna Bajracharya, Joel Ossher, Paulo Cesar Masiero, Cristina Videira Lopes. 476-482 [doi]
- GenQA: automated addition of architectural quality attribute support for Java software?Sarthak Grover, Nigamanth Sridhar. 483-487 [doi]
- Model interfaces for two-way obliviousnessNathan V. Roberts, Eunjee Song, Paul C. Grabow. 488-495 [doi]
- Searching for relevant software change artifacts using semantic networksMikael Lindvall, Raimund L. Feldmann, George Karabatis, Zhiyuan Chen, Vandana Pursnani Janeja. 496-500 [doi]
- Using a product line for creating component systemsTomás Bures, Petr Hnetynka, Michal Malohlava. 501-508 [doi]
- Key processes to start software process improvement in small companiesFrancisco J. Pino, Félix García, Mario Piattini. 509-516 [doi]
- Failure management development for integrated automotive safety-critical software systemsHaklin Kimm, Sung Y. Shin, Ho-sang Ham, Chang Oan Sung. 517-521 [doi]
- A comparative study of techniques to write customizable librariesBaris Aktemur, Sam Kamin. 522-529 [doi]
- Component-based metrics applying the strength of dependency between classesMisook Choi, Injoo J. Kim, Jiman Hong, Jungyeop Kim. 530-536 [doi]
- A consumer/producer approach to risk-driven software reliability and testingNorman F. Schneidewind, Mike Hinchey. 537-538 [doi]
- Designing a distributed AOP runtime composition modelRubén Mondéjar, Pedro García López, Carles Pairot, Pascal Urso, Pascal Molli. 539-540 [doi]
- An approach to detection of UML-based ownership violationHector Miguel Chavez, Wuwei Shen, Shaoying Liu. 541-542 [doi]
- An extensible source-level debuggerZiad Al-Sharif, Clinton Jeffery. 543-544 [doi]
- A property-based verification approach in aspect-oriented modelingEunjee Song, Hanil Kim, Wuliang Sun. 545-546 [doi]
- The visual authoring tool of flash-based component for interactive item templateChorng-Shiuh Koong, Ching-Meng Lee, Deng-Jyi Chen, Chih-Hung Chang, Chihhsiong Shih. 547-548 [doi]
- Abstraction of multiple executions of object-oriented programsChunying Zhao, Kang Zhang, Yu Lei. 549-550 [doi]
- Local reasoning for abstraction and sharingRenato Cherini, Javier O. Blanco. 552-557 [doi]
- An optimized change-driven regression testing selection strategy for binary Java applicationsSheng Huang, Yang Chen, Jun Zhu, Zhong Jie Li, Huafang Tan. 558-565 [doi]
- The synergy of precise and fast abstractions for program verificationNatasha Sharygina, Stefano Tonetta, Aliaksei Tsitovich. 566-573 [doi]
- An approach for component testing and its empirical validationFernando R. C. Silva, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira. 574-581 [doi]
- On the verification of probabilistic I/O automata with unspecified ratesSergio Giro, Pedro R. D Argenio. 582-586 [doi]
- Specifying and checking protocols of multithreaded classesClément Hurlin. 587-592 [doi]
- Enforcement monitoring wrt. the safety-progress classification of propertiesYliès Falcone, Jean-Claude Fernandez, Laurent Mounier. 593-600 [doi]
- Certification of smart-card applications in common criteriaIman Narasamdya, Michaël Périn. 601-608 [doi]
- Extended static checking in JML4: benefits of multiple-prover supportPerry R. James, Patrice Chalin. 609-614 [doi]
- Reasoning about comprehensions with first-order SMT solversK. Rustan M. Leino, Rosemary Monahan. 615-622 [doi]
- Implementing rigorous web services with process algebra: navigation plan for web servicesMauricio Chui Rodrigues, Simon Malkowski, João Eduardo Ferreira. 625-631 [doi]
- Discovering XML keys and foreign keys in queriesMartin Necaský, Irena Mlýnková. 632-638 [doi]
- Towards inference of more realistic XSDsIrena Mlýnková, Martin Necaský. 639-646 [doi]
- Partitioning web applications between the server and the clientJanne Kuuskeri, Tommi Mikkonen. 647-652 [doi]
- Server push with instant messagingMikko Pohja. 653-658 [doi]
- Implicit relevance feedback for context-aware information retrieval in UbiLearning environmentsDiogo S. Martins, Mauro Biajiz, Antônio Francisco do Prado, Wanderley Lopes de Souza. 659-663 [doi]
- An optimistic technique for transactions control using REST architectural styleLuiz Alexandre Hiane da Silva Maciel, Celso Massaki Hirata. 664-669 [doi]
- Socially filtered web search: an approach using social bookmarking tags to personalize web searchKay-Uwe Schmidt, Tobias Sarnow, Ljiljana Stojanovic. 670-674 [doi]
- Semantic web services: from OWL-S via UML to MVC applicationsCássio V. S. Prazeres, César A. C. Teixeira, Ethan V. Munson, Maria da Graça Campos Pimentel. 675-680 [doi]
- Where are your manners?: Sharing best community practices in the web 2.0Angelo Di Iorio, Davide Rossi, Fabio Vitali, Stefano Zacchiroli. 681-687 [doi]
- Designing of a system model for web 3D disabled access GIS on web 2.0Shinobu Izumi, Toshihiro Uchibayashi, Takaichi Yoshida. 688-689 [doi]
- Identifying discourse mistakes in web debates: moderation in the DCCCristiano Maciel, Vinícius Carvalho Pereira, Licinio Roque, Ana Cristina Bicharra Garcia. 690-691 [doi]
- WebFlowAH: an environment for ad-hoc specification and execution of web services-based processesReginaldo Mendes, Paulo F. Pires, Flávia Coimbra Delicato, Thaís Vasconcelos Batista. 692-693 [doi]
- An approach for semantic web services automatic discovery and composition with similarity metricsIvo Calado, Heitor Barros, Ig Ibert Bittencourt. 694-695 [doi]
- Situated process engineering for integrating processes from methodologies to infrastructuresAmbra Molesini, Enrico Denti, Elena Nardini, Andrea Omicini. 699-706 [doi]
- agentTool process editor: supporting the design of tailored agent-based processesJuan C. García-Ojeda, Scott A. DeLoach, Robby. 707-714 [doi]
- A collaborative tool for designing and enacting design processesMassimo Cossentino, Luca Sabatucci, Valeria Seidita. 715-721 [doi]
- SoSAA: a framework for integrating components & agentsMauro Dragone, David Lillis, Rem W. Collier, Gregory M. P. O Hare. 722-728 [doi]
- Extending PASSI to model multi-agent systems product linesIngrid Nunes, Uirá Kulesza, Camila Nunes, Elder Cirilo, Carlos José Pereira de Lucena. 729-730 [doi]
- Automatic product derivation of multi-agent systems product linesElder Cirilo, Ingrid Nunes, Uirá Kulesza, Camila Nunes, Carlos José Pereira de Lucena. 731-732 [doi]
- Multi-agent system adaptation in a peer-to-peer scenarioJordi Campos Miralles, Maite López-Sánchez, Marc Esteva. 735-739 [doi]
- Organising MAS: a formal model based on organisational mechanismsRoberto Centeno, Holger Billhardt, Ramón Hermoso, Sascha Ossowski. 740-746 [doi]
- Market-based coordination for intersection controlMatteo Vasirani, Sascha Ossowski. 747-751 [doi]
- Towards organizational agent-oriented operating systemsJavier Palanca Cámara, Vicente J. Botti, Ana García-Fornes. 752-756 [doi]
- A new probabilistic generative model of parameter inference in biochemical networksPaola Lecca, A. Palmisano, Corrado Priami, G. Sanguinetti. 758-765 [doi]
- HSP-HMMER: a tool for protein domain identification on a large scaleBhanu Rekapalli, Christian Halloy, Igor B. Zhulin. 766-770 [doi]
- Construct anticancer drug-drug correlation networkJiao Li, Pamela Crowell, Jake Yue Chen. 771-775 [doi]
- A new protein motif extraction framework based on constrained co-clusteringFrancesca Cordero, Alessia Visconti, Marco Botta. 776-781 [doi]
- Global-to-local representation and visualization of molecular surfaces using deformable modelsNicolay Postarnakevich, Rahul Singh. 782-787 [doi]
- A novel approach to detect copy number variation using segmentation and genetic algorithmChihyun Park, Youngmi Yoon, Jaegyoon Ahn, Myungjin Moon, Sanghyun Park. 788-792 [doi]
- An improved shrinkage estimator to infer regulatory networks with Gaussian graphical modelsKevin Kontos, Gianluca Bontempi. 793-798 [doi]
- Using dynamic bayesian networks to infer gene regulatory networks from expression profilesAkther Shermin, Mehmet A. Orgun. 799-803 [doi]
- On a discretizable subclass of instances of the molecular distance geometry problemCarlile Lavor, Leo Liberti, Antonio Mucherino, Nelson Maculan. 804-805 [doi]
- Measuring coherence between electronic and manual annotations in biological databasesCatia Pesquita, Daniel Faria, Francisco M. Couto. 806-807 [doi]
- Two lower bounds for self-assemblies at temperature 1Ján Manuch, Ladislav Stacho, Christine Stoll. 808-809 [doi]
- HIVSetSubtype: software for subtype classification of HIV-1 sequencesLuciano Vieira de Araújo, Sabri S. Sanabani, Ester C. Sabino, João Eduardo Ferreira. 811-815 [doi]
- An ontology-based application in heart electrophysiology: representation, reasoning and visualization on the webBernardo Gonçalves, Veruska Zamborlini, Giancarlo Guizzardi, José Gonçalves Pereira Filho. 816-820 [doi]
- Evaluation of VR medical training applications under the focus of professionals of the health areaCléber Gimenez Corrêa, Fátima L. S. Nunes, Adriano Bezerra, Paulo M. Carvalho Jr.. 821-825 [doi]
- Medical volume segmentation using bank of Gabor filtersAdebayo Olowoyeye, Mihran Tuceryan, Shiaofen Fang. 826-829 [doi]
- Task based visualization of 5D brain EIT dataYan Zhang, Peter J. Passmore, Richard H. Bayford. 831-835 [doi]
- Augmented reality environment for life support trainingFabrício Pretto, Isabel Harb Manssour, Maria H. Itaqui Lopes, Emerson Rodrigues da Silva, Márcio Sarroglia Pinho. 836-841 [doi]
- Thin client architecture in support of remote radiology learningFlorian F. Schmitzberger, Justus Roos, Sandy Napel, Geoffrey D. Rubin, David S. Paik. 842-846 [doi]
- A framework of a logic-based question-answering system for the medical domain (LOQAS-Med)Sofia J. Athenikos, Hyoil Han, Ari D. Brooks. 847-851 [doi]
- Facial image classification of mouse embryos for the animal model study of fetal alcohol syndromeShiaofen Fang, Ying Liu, Jeffrey Huang, Sophia Vinci-Booher, Bruce Anthony, Feng Zhou. 852-856 [doi]
- An evaluation of technologies for the pseudonymization of medical dataThomas Neubauer, Andreas Ekelhart. 857-858 [doi]
- Automated device for determination of skin lesion regionsMohamad El Habbal, Maya El Moghrabi, Omar Monajjed, Ayman I. Kayssi. 859-860 [doi]
- A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution modelChang-Keon Ryu, Hyong-Jun Kim, Hwan-Gue Cho. 863-868 [doi]
- Improving classification based off-topic search detection via category relationshipsAlana Platt, Saket S. R. Mengle, Nazli Goharian. 869-874 [doi]
- Incorporating accountability into internet emailWayne Liu, Sudhir Aggarwal, Zhenhai Duan. 875-882 [doi]
- Artificial intelligence applied to computer forensicsBruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese. 883-888 [doi]
- Clustering malware-generated spam emails with a novel fuzzy string matching algorithmChun Wei, Alan Sprague, Gary Warner. 889-890 [doi]
- Revealing common sources of image spam by unsupervised clustering with visual featuresChengcui Zhang, Wei-bang Chen, Xin Chen, Gary Warner. 891-892 [doi]
- Reconstructing strip-shredded documents using color as feature matchingMarlos A. O. Marques, Cinthia O. A. Freitas. 893-894 [doi]
- On the persistence of deleted windows registry data structuresDamir Kahvedzic, Tahar Kechadi. 895-896 [doi]
- From exponential to almost linear decomposability of finite or infinite treesKhalil Djelloul. 897-902 [doi]
- Forensic bite mark identification using image processing methodsGlenn Flora, Mihran Tuceryan, Herb Blitzer. 903-907 [doi]
- On the complexity of hierarchical associative memoriesJana Stanclová. 908-913 [doi]
- A new K-View algorithm for texture image classification using rotation-invariant featureHong Liu, Siguang Dai, Enmin Song, Cihui Yang, Chih-Cheng Hung. 914-921 [doi]
- Heuristic approach for automated shelf space allocationDario Landa Silva, Fathima Marikar, Khoi Le. 922-928 [doi]
- A method to construct knowledge table-base in k-in-a-row gamesChang-ming Xu, Z. M. Ma, Xinhe Xu. 929-933 [doi]
- Super-resolution image reconstruction using the generalized isotropic multi-level logistic modelAna Luísa Dine Martins, Murillo R. P. Homem, Nelson D. A. Mascarenhas. 934-938 [doi]
- An intelligent video system for vehicle localization and tracking in police carsAmirali Jazayeri, Hongyuan Cai, Jiang Yu Zheng, Mihran Tuceryan, Herbert Blitzer. 939-940 [doi]
- A new cross-training approach by using labeled dataDongshan Huang, Enmin Song, Guangzhi Ma, Huirong Zhan, Chih-Cheng Hung. 941-942 [doi]
- Foreground classification using active template in the scene context for visual surveillanceXiaoying Sha, Xiaobai Liu, Jianting Wen. 943-944 [doi]
- Shader space navigator: a turbo for an intuitive and effective shading processJae-Ho Lee, Min-Hee Jang, Du-Yeol Kim, Sang-Wook Kim, Min-Ho Kim, Jin-Sung Choi. 945-946 [doi]
- Workflow management for high volume supernova searchCecilia R. Aragon, Karl J. Runge. 949-955 [doi]
- Uncertainty apportionment for air quality forecast modelsHaiyan Cheng, Adrian Sandu. 956-960 [doi]
- Bulk based preconditioning for quantum dot computationsChristof Vömel, Stanimire Tomov, Osni Marques. 961-965 [doi]
- An efficient and accurate lattice for pricing derivatives under a jump-diffusion processChuan-Ju Wang, Tian-Shyr Dai, Yuh-Dauh Lyuu, Yen-Chun Liu. 966-970 [doi]
- Semi-automatic parallelization of direct and inverse problems for geothermal simulationH. Martin Bücker, Arno Rasch, Volker Rath, Andreas Wolf. 971-975 [doi]
- Vector stream processing for effective application of heterogeneous parallelismJohn C. Linford, Adrian Sandu. 976-980 [doi]
- ::::GTfold::::: a scalable multicore code for RNA secondary structure predictionAmrita Mathuriya, David A. Bader, Christine E. Heitsch, Stephen C. Harvey. 981-988 [doi]
- Interlaced Euler scheme for stiff systems of stochastic differential equationsIoana Cipcigan, Muruhan Rathinam. 989-994 [doi]
- Modular implementation of adaptive decisions in stochastic simulationsPilsung Kang 0002, Yang Cao, Naren Ramakrishnan, Calvin J. Ribbens, Srinidhi Varadarajan. 995-1001 [doi]
- Adaptive finite element methods for nonlinear inverse problemsWolfgang Bangerth, Amit Joshi. 1002-1006 [doi]
- An algorithm for optimal comma free codes with isomorphism rejectionHao Wang, Vladimir D. Tonchev. 1007-1008 [doi]
- Reduced parallel PNN algorithm for PC grid systemsAkiyoshi Wakatani, Takuya Koezuka. 1009-1010 [doi]
- Exhaustion dominated performance: a first attemptNima Namaki, Andreas de Blanche, Stefan Mankefors-Christiernin. 1011-1012 [doi]
- Adaptive optimal checkpoint interval and its impact on system s overall quality in soft real-time applicationsNianen Chen, Shangping Ren. 1015-1020 [doi]
- Dynamic planning and weaving of dependability concerns for self-adaptive ubiquitous servicesRomain Rouvoy, Frank Eliassen, Mikaël Beauvois. 1021-1028 [doi]
- Formalizing the notion of adaptive system behaviorManfred Broy, Christian Leuxner, Wassiou Sitou, Bernd Spanfelner, Sebastian Winter. 1029-1033 [doi]
- A framework for dynamic adaptation of power-aware server clustersVinicius Petrucci, Orlando Loques, Daniel Mossé. 1034-1039 [doi]
- ATM: an automatic trust monitoring algorithm for service softwareMohammad Gias Uddin, Mohammad Zulkernine. 1040-1044 [doi]
- Boosting the performance of computing systems through adaptive configuration tuningHaifeng Chen, Guofei Jiang, Hui Zhang 0002, Kenji Yoshihira. 1045-1049 [doi]
- Adaptive resource management architecture for distributed real-time embedded systemsKe Liang, Xingshe Zhou, Ruiqing Sheng, Kailong Zhang. 1050-1055 [doi]
- Latency-aware leader electionNuno Santos, Martin Hutle, André Schiper. 1056-1061 [doi]
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocolMd. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed. 1062-1066 [doi]
- Efficient maintenance of distributed data in highly dynamic opportunistic gridsRaphael Y. de Camargo, Fernando Castor Filho, Fabio Kon. 1067-1071 [doi]
- An approach to identifying conversation dependency in service oriented system during dynamic evolutionMin Liu, Dianfu Ma, Yongwang Zhao. 1072-1073 [doi]
- A particle swarm optimization based algorithm for fuzzy bilevel decision making with constraints-shared followersYa Gao, Guangquan Zhang, Jie Lu. 1075-1079 [doi]
- A gradient oriented recombination scheme for evolution strategiesHaifeng Chen, Guofei Jiang. 1080-1084 [doi]
- LEGAL-tree: a lexicographic multi-objective genetic algorithm for decision tree inductionMárcio P. Basgalupp, Rodrigo C. Barros, André Carlos Ponce Leon Ferreira de Carvalho, Alex Alves Freitas, Duncan D. Ruiz. 1085-1090 [doi]
- Using artificial life techniques for distributed grid job schedulingAzin Moallem, Simone A. Ludwig. 1091-1097 [doi]
- Planning for remarshaling in an automated container terminal using cooperative coevolutionary algorithmsKiyeok Park, Taejin Park, Kwang Ryel Ryu. 1098-1105 [doi]
- Daily demand forecasting of new products utilizing diffusion models and genetic algorithmsTezuka Masaru, Munakata Satoshi. 1106-1107 [doi]
- Formalizing Desargues theorem in Coq using ranksNicolas Magaud, Julien Narboux, Pascal Schreck. 1110-1115 [doi]
- Infinite bar-joint frameworksJohn C. Owen, Steve C. Power. 1116-1121 [doi]
- Characterizing 1-dof Henneberg-I graphs with efficient configuration spacesHeping Gao, Meera Sitharam. 1122-1126 [doi]
- Body-and-cad geometric constraint systemsKirk Haller, Audrey Lee-St. John, Meera Sitharam, Ileana Streinu, Neil White. 1127-1131 [doi]
- Origami fold as algebraic graph rewritingTetsuo Ida, Hidekazu Takahashi. 1132-1137 [doi]
- The unique solution for ::::P3P:::: problemJianliang Tang, Nengzeng Liu. 1138-1139 [doi]
- Topology determination and isolation for implicit plane curvesJin-San Cheng, Xiao-Shan Gao, Jia Li. 1140-1141 [doi]
- Multivariate root finding with search space decomposition and randomisationMarkus Färber, Beat Brüderlin. 1142-1143 [doi]
- Visual detection of novel terrain via two-class classificationChristopher A. Brooks, Karl Iagnemma. 1145-1150 [doi]
- Attention driven visual processing for an interactive dialog robotThomas Müller, Alois Knoll. 1151-1155 [doi]
- Evaluation of visual attention models under 2D similarity transformationsMilton Roberto Heinen, Paulo Martins Engel. 1156-1160 [doi]
- Evolving morphologies and gaits of physically realistic simulated robotsMilton Roberto Heinen, Fernando Santos Osório. 1161-1165 [doi]
- Visual loop-closing with image profilesHannah Hoersting, Lesia Bilitchenko, Zachary Dodds. 1166-1170 [doi]
- Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenariosStelios Timotheou, Georgios Loukas. 1171-1175 [doi]
- A robust and tractable contact model for dynamic robotic simulationEvan Drumwright, Dylan A. Shell. 1176-1180 [doi]
- Sources of error in a rigid body simulation of rigid parts on a vibrating rigid plateStephen Berard, Binh Nguyen, Jeffrey C. Trinkle. 1181-1185 [doi]
- A nonlinear mobile robot modeling applied to a model predictive controllerAndré Scolari Conceição, A. Paulo Moreira, J. Paulo Costa. 1186-1187 [doi]
- Visual navigation: image profiles for odometry and controlDevin Smith, Zachary Dodds. 1188-1189 [doi]
- Keeping diversity when exploring dynamic environmentsJose Luis Fernandez-Marquez, Josep Lluís Arcos. 1192-1196 [doi]
- Flexible self-healing gradientsJacob Beal. 1197-1201 [doi]
- Self-organized control of knowledge generation in pervasive computing systemsGabriella Castelli, Ronaldo Menezes, Franco Zambonelli. 1202-1208 [doi]
- Prestige-based peer sampling service: interdisciplinary approach to secure gossipGian Paolo Jesi, Edoardo Mollona, Srijith K. Nair, Maarten van Steen. 1209-1213 [doi]
- Geographical data collection in sensor networks with self-organizing transaction cluster-headsNeeraj Rajgure, Eric Platon, Cristian Borcea, Shinichi Honiden. 1214-1218 [doi]
- A real time financial system based on grid and cloud computingFrancesco Aymerich, Gianni Fenu, Simone Surcis. 1219-1220 [doi]
- A biochemical metaphor for developing eternally adaptive service ecosystemsMirko Viroli, Matteo Casadei, Sara Montagna, Franco Zambonelli. 1221-1222 [doi]
- Decentralized coordination of homogeneous and heterogeneous agents by digital infochemicalsHolger Kasinger, Jörg Denzinger, Bernhard Bauer. 1223-1224 [doi]
- Improving folksonomies quality by syntactic tag variations groupingFrancisco Echarte, José Javier Astrain, Alberto Córdoba, Jesús E. Villadangos. 1226-1230 [doi]
- Efficient processing of SPARQL joins in memory by dynamically restricting triple patternsJinghua Groppe, Sven Groppe, Sebastian Ebers, Volker Linnemann. 1231-1238 [doi]
- SWOBE - embedding the semantic web languages RDF, SPARQL and SPARUL into java for guaranteeing type safety, for checking the satisfiability of queries and for the determination of query result typesSven Groppe, Jana Neumann, Volker Linnemann. 1239-1246 [doi]
- Efficient mobile reasoning for pervasive discoveryLuke Steller, Shonali Krishnaswamy. 1247-1251 [doi]
- Applying semantic web technology to feature modelingLamia Abo Zaid, Frederic Kleinermann, Olga De Troyer. 1252-1256 [doi]
- Parallel materialization of large ABoxesSivaramakrishnan Narayanan, Ümit V. Çatalyürek, Tahsin M. Kurç, Joel H. Saltz. 1257-1261 [doi]
- Spam decisions on gray e-mail using personalized ontologiesSeongwook Youn, Dennis McLeod. 1262-1266 [doi]
- Leveraging OWL for GIS interoperability: rewards and pitfallsSerge Boucher, Esteban Zimányi. 1267-1272 [doi]
- Semantic information and sensor networksKrishnaprasad Thirunarayan, Joshua Pschorr. 1273-1274 [doi]
- SemanticQA: web-based ontology-driven question answeringSamir Tartir, Bobby McKnight, I. Budak Arpinar. 1275-1276 [doi]
- iTrustU: a blog recommender system based on multi-faceted trust and collaborative filteringTing-Chun Peng, Seng-cho T. Chou. 1278-1285 [doi]
- A taxonomy and adversarial model for attacks against network log anonymizationJustin King, Kiran Lakkaraju, Adam J. Slagell. 1286-1293 [doi]
- Extending Bayesian trust models regarding context-dependence and user friendly representationSebastian Ries. 1294-1301 [doi]
- A Personalized Framework for Trust AssessmentTrung Dong Huynh. 1302-1307 [doi]
- Defending online reputation systems against collaborative unfair raters through signal modeling and trustYafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang. 1308-1315 [doi]
- Modeling and analyzing review information on the web focusing on credibilityTakuya Kobayashi, Hiroaki Ohshima, Satoshi Oyama, Katsumi Tanaka. 1316-1317 [doi]
- GPU-based computation of distance functions on road networks with applicationsMarta Fort, Joan Antoni Sellarès. 1320-1324 [doi]
- Similarity measures for trajectory of moving objects in cellular spaceHye-Young Kang, Joon-Seok Kim, Ki-Joune Li. 1325-1330 [doi]
- Labeled images verification using Gaussian mixture modelsMicheal Baechler, Jean-Luc Bloechle, Jean Hennebert. 1331-1335 [doi]
- A spatial bitmap-based index for geographical data warehousesThiago Luís Lopes Siqueira, Ricardo Rodrigues Ciferri, Valéria Cesário Times, Cristina Dutra de Aguiar Ciferri. 1336-1342 [doi]
- On-line adaptation of sequential mobile processes running concurrentlyMassimiliano de Leoni, Giuseppe De Giacomo, Yves Lespérance, Massimo Mecella. 1345-1352 [doi]
- A framework for modelling and implementing self-organising coordinationMirko Viroli, Matteo Casadei, Andrea Omicini. 1353-1360 [doi]
- Situated tuple centres in ReSpecTMatteo Casadei, Andrea Omicini. 1361-1368 [doi]
- Decomposing port automataChristian Koehler, Dave Clarke. 1369-1373 [doi]
- Knowledge-based coordination with a reliable semantic subscription mechanismMartin Murth, eva Kühn. 1374-1380 [doi]
- Applying Reo to service coordination in long-running business transactionsNatallia Kokash, Farhad Arbab. 1381-1382 [doi]
- Exploiting weak dependencies in tree-based searchAlejandro Arbelaez, Youssef Hamadi. 1385-1391 [doi]
- Softening Gcc and Regular with preferencesJean-Philippe Métivier, Patrice Boizumault, Samir Loudni. 1392-1396 [doi]
- Length-lex bound consistency for knapsack constraintsJustin Yip, Pascal Van Hentenryck. 1397-1401 [doi]
- LS(graph & tree): a local search framework for constraint optimization on graphs and treesPham Quang Dung, Yves Deville, Pascal Van Hentenryck. 1402-1407 [doi]
- Message-passing and local heuristics as decimation strategies for satisfiabilityLukas Kroc, Ashish Sabharwal, Bart Selman. 1408-1414 [doi]
- An approximate approach to constraint solving in soft sensingTian Yang, Zaifei Liao, Xinjie Lv, Hongan Wang. 1415-1416 [doi]
- The sum-of-increments constraint in the consecutive-ones matrix decomposition problemSebastian Brand. 1417-1418 [doi]
- A recommender system for requirements elicitation in large-scale software projectsCarlos Castro-Herrera, Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher. 1419-1426 [doi]
- A novel distance-based classifier built on pattern rankingDipankar Bachar, Rosa Meo. 1427-1432 [doi]
- Frequent spatio-temporal patterns in trajectory data warehousesL. Leonardi, Salvatore Orlando, Alessandra Raffaetà, Alessandro Roncato, Claudio Silvestri. 1433-1440 [doi]
- Optimal candidate generation in spatial co-location miningZhongshan Lin, SeungJin Lim. 1441-1445 [doi]
- Combining statistics and semantics via ensemble model for document clusteringSamah Jamal Fodeh, William F. Punch, Pang-Ning Tan. 1446-1450 [doi]
- Using minimum description length for process miningToon Calders, Christian W. Günther, Mykola Pechenizkiy, Anne Rozinat. 1451-1455 [doi]
- Applying latent dirichlet allocation to group discovery in large graphsKeith Henderson, Tina Eliassi-Rad. 1456-1461 [doi]
- Improved AdaBoost.M1 of decision trees with confidence-rated predictionsZhipeng Xie. 1462-1466 [doi]
- Capturing truthiness: mining truth tables in binary datasetsClifford Conley Owens III, T. M. Murali, Naren Ramakrishnan. 1467-1474 [doi]
- HTILDE: scaling up relational decision trees for very large databasesCarina Lopes, Gerson Zaverucha. 1475-1479 [doi]
- Automatic discovery of technology trends from patent textYoungho Kim, Yingshi Tian, Yoonjae Jeong, Ryu Jihee, Sung-Hyon Myaeng. 1480-1487 [doi]
- Mining functional associated patterns from biological network dataXuequn Shang, Zhanhuai Li, Wei Li. 1488-1489 [doi]
- Parameterless outlier detection in data streamsAlice Marascu, Florent Masseglia. 1491-1495 [doi]
- Evaluating algorithms that learn from data streamsJoão Gama, Pedro Pereira Rodrigues, Raquel Sebastião. 1496-1500 [doi]
- Online annotation and prediction for regime switching data streamsGordon J. Ross, Dimitris K. Tasoulis, Niall M. Adams. 1501-1505 [doi]
- Link-based event detection in email communication networksXiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniwalla, Jeannette Janssen. 1506-1510 [doi]
- Adaptive burst detection in a stream engineMarcel Karnstedt, Daniel Klan, Christian Pölitz, Kai-Uwe Sattler, Conny Franke. 1511-1515 [doi]
- Real-time scheduling for continuous queries with deadlinesLi Ma, Xin Li, Yongyan Wang, Hongan Wang. 1516-1517 [doi]
- A method for clustering transient data streamsPimwadee Chaovalit, Aryya Gangopadhyay. 1518-1519 [doi]
- Incremental outlier detection in data streams using local correlation integralXinjie Lv, Tian Yang, Zaifei Liao, Manzoor Elahi, Wei Liu, Hongan Wang. 1520-1521 [doi]
- Information retrieval from visual databases using multiple representations and multiple queriesNoureddine Abbadeni. 1523-1527 [doi]
- Privacy protection for RFID dataBenjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu. 1528-1535 [doi]
- Retrieving valid matches for XML keyword searchLingbo Kong, Rémi Gilleron, Aurélien Lemay. 1536-1540 [doi]
- Computing data cubes using exact sub-graph matching: the sequential MCG approachJoubert de Castro Lima, Celso Massaki Hirata. 1541-1548 [doi]
- Exploiting join cardinality for faster hash joinsMichael Henderson, Bryce Cutt, Ramon Lawrence. 1549-1554 [doi]
- Enhancing XML data warehouse query performance by fragmentationHadj Mahboubi, Jérôme Darmont. 1555-1562 [doi]
- Fuzzy data modeling based on XML schemaLi Yan, Z. M. Ma, Jian Liu. 1563-1567 [doi]
- Approximate indexing in road network databasesSang-Chul Lee, Sang-Wook Kim, Junghoon Lee, Jae Soo Yoo. 1568-1572 [doi]
- CPref-SQL: a query language supporting conditional preferencesSandra de Amo, Marcos Roberto Ribeiro. 1573-1577 [doi]
- Learning the ontological theory of an information extraction system in the multi-predicate ILP settingAlain-Pierre Manine. 1578-1582 [doi]
- Consistent and decentralized orchestration of BPEL processesWeihai Yu. 1583-1584 [doi]
- Building an efficient preference XML query processorSungRan Cho, Wolf-Tilo Balke. 1585-1586 [doi]
- Model-based reasoning on the achievement of business goalsSebastian Höhn. 1589-1593 [doi]
- Policy management architecture based on provisioning model and authorization certificatesArlindo L. Marcon Jr., Altair O. Santin, Luiz A. de Paula Lima Jr., Maicon Stihler. 1594-1598 [doi]
- Cross-organizational ERP management: how to create a successful business case?Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van Hillegersberg. 1599-1604 [doi]
- Management of requirements in ERP development: a comparison between proprietary and open source ERPBjörn Johansson, Rogério Atem de Carvalho. 1605-1609 [doi]
- Privacy preserving churn predictionShuting Xu, Shuhua Lai, Manying Qiu. 1610-1614 [doi]
- Constructing process views for service outsourcingRik Eshuis, Alex Norta. 1615-1616 [doi]
- Web-services in the dutch healthcare insurance sector: expected versus achieved benefitsHayley Bakker, Maria E. Iacob. 1617-1618 [doi]
- An adaptive block-set based management for large-scale flash memoryZhanzhan Liu, Lihua Yue, Peng Wei, Peiquan Jin, Xiaoyan Xiang. 1621-1625 [doi]
- Celling SHIM: compiling deterministic concurrency to a heterogeneous multicoreNalini Vasudevan, Stephen A. Edwards. 1626-1631 [doi]
- Improving functional verification of embedded systems using hierarchical composition and set theoryCássio L. Rodrigues, Karina R. G. da Silva, Henrique N. Cunha. 1632-1636 [doi]
- Heterogeneous real-time embedded software optimization considering hardware platformMeikang Qiu, Hao Li, Edwin Hsing-Mean Sha. 1637-1641 [doi]
- The current feasibility of gesture recognition for a smartphone using J2MELuís Tarrataca, André C. Santos, João M. P. Cardoso. 1642-1649 [doi]
- Optimal service level allocation in environmentally powered embedded systemsClemens Moser, Jian-Jia Chen, Lothar Thiele. 1650-1657 [doi]
- Impact of NVRAM write cache for file system metadata on I/O performance in embedded systemsIn Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh. 1658-1663 [doi]
- Storage architecture and software support for SLC/MLC combined flash memorySoojun Im, Dongkun Shin. 1664-1669 [doi]
- RT-replayer: a record-replay architecture for embedded real-time software debuggingJi Chan Maeng, Jung-Il Kwon, Min-Kyu Sin, Minsoo Ryu. 1670-1675 [doi]
- FlashBox: a system for logging non-deterministic events in deployed embedded systemsSiddharth Choudhuri, Tony Givargis. 1676-1682 [doi]
- Method for fast compression of program codes for remote updates in embedded systemsRyozo Kiyohara, Satoshi Mii, Mitsuhiro Matsumoto, Masayuki Numao, Satoshi Kurihara. 1683-1684 [doi]
- On scheduling soft real-time tasks with lock-free synchronization for embedded devicesShouwen Lai, Binoy Ravindran, Hyeonjoong Cho. 1685-1686 [doi]
- ERIKA and open-ZB: an implementation for real-time wireless networkingPaolo Pagano, Mangesh Chitnis, Antonio Romano, Giuseppe Lipari, Ricardo Severino, Mário Alves, Paulo G. Sousa, Eduardo Tovar. 1687-1688 [doi]
- HITS algorithm improvement using anchor-related text extracted by DOM structure analysisYoshinori Hijikata, Bui Quang Hung, Masanori Otsubo, Shogo Nishida. 1691-1698 [doi]
- Bipolar query satisfaction using satisfaction and dissatisfaction degrees: bipolar satisfaction degreesTom Matthé, Guy De Tré. 1699-1703 [doi]
- Heterogeneous bipolar criteria satisfaction handling in geographical decision support systems: an LSP based approachGuy De Tré, Jozo J. Dujmovic, Nico Van de Weghe, Tom Matthé, Niels Charlier. 1704-1708 [doi]
- Diverse peer selection in collaborative web searchLe-Shin Wu, Filippo Menczer. 1709-1713 [doi]
- A class of multistep sparse matrix strategies for concept decomposition matrix approximationChi Shen, Mike Unuakhalu. 1714-1718 [doi]
- Self-organizing collaborative filtering in global-scale massive multi-user virtual environmentsAlexander Höhfeld, Patrick Gratz, Angelo Beck, Jean Botev, Hermann Schloss, Ingo Scholtes. 1719-1723 [doi]
- Fast error-tolerant search on very large textsMarjan Celikik, Holger Bast. 1724-1731 [doi]
- A session based personalized search using an ontological user profileMariam Daoud, Lynda Tamine-Lechani, Mohand Boughanem, Bilal Chebaro. 1732-1736 [doi]
- Alternatives to conjunctive query processing in peer-to-peer file-sharing systemsWai Gen Yee, Linh Thai Nguyen, Ophir Frieder. 1737-1741 [doi]
- A sentence level probabilistic model for evolutionary theme pattern mining from news corporaShizhu Liu, Yuval Merhav, Wai Gen Yee, Nazli Goharian, Ophir Frieder. 1742-1747 [doi]
- Stratified division queries involving ordinal user preferencesPatrick Bosc, Olivier Pivert, Olivier Soufflet. 1748-1749 [doi]
- Music retrieval based on a multi-samples selection strategy for support vector machine active learningTian-Jiang Wang, Gang Chen, Perfecto Herrera. 1750-1751 [doi]
- A light-weight summarizer based on language model with relative entropyChandan Kumar, Prasad Pingali, Vasudeva Varma. 1752-1753 [doi]
- Improved spam filtering by extraction of information from text embedded image e-mailSeongwook Youn, Dennis McLeod. 1754-1755 [doi]
- Incremental board: a grid-based space for visualizing dynamic data setsRoberto Pinho, Maria Cristina Ferreira de Oliveira, Alneu de Andrade Lopes. 1757-1764 [doi]
- A new multimedia synchronous distance learning system: the IVA study caseValter Roesler, Ronaldo Husemann, Carlos Haas Costa. 1765-1770 [doi]
- A recommendation system for browsing digital librariesAntonio d Acierno, Vincenzo Moscato, Antonio Picariello. 1771-1778 [doi]
- A new inter-layer prediction scheme for spatial scalability with different frame ratesJinmi Kang, Gyeongeun Goh, Kidong Chung. 1779-1783 [doi]
- A smart clustering algorithm for photo set obtained from multiple digital camerasChul-Jin Jang, Taijin Yoon, Hwan-Gue Cho. 1784-1791 [doi]
- Term distribution visualizations with Focus+ContextMoses Schwartz, Curtis Hash, Lorie M. Liebrock. 1792-1799 [doi]
- Visualization of clustered directed acyclic graphs with node interleavingPushpa Kumar, Kang Zhang. 1800-1805 [doi]
- Information-theoretic identification of content pages for analyzing user information needs and actions on the multimedia webRahul Singh, Bibek D. Bhhatarai. 1806-1810 [doi]
- An enhanced multi-view video compression using the constrained inter-view predictionSunghwan Chun, Seoyoung Lee, Kwangmu Shin, Kidong Chung. 1811-1815 [doi]
- Discovery of time series in video data through distribution of spatiotemporal gradientsOmar U. Florez, SeungJin Lim. 1816-1820 [doi]
- Variable handling in time-based XML declarative languagesLuiz Fernando Gomes Soares, Rogério Ferreira Rodrigues, Renato Cerqueira, Simone Diniz Junqueira Barbosa. 1821-1828 [doi]
- User-media interaction with interactive TVCésar A. C. Teixeira, Erick L. Melo, Renan G. Cattelan, Maria da Graça Campos Pimentel. 1829-1833 [doi]
- Ubiquitous services in home networks offered through digital TVGiliard Brito de Freitas, Cesar Augusto Camillo Teixeira. 1834-1838 [doi]
- Efficient concept detection by fusing simple visual featuresDuy-Dinh Le, Shin ichi Satoh. 1839-1840 [doi]
- Visualization of information flows in a very large social networkShin Gyu Kim, Hyuck Han, Kyungho Jeon, Hyungsoo Jung, Heon Young Yeom. 1841-1842 [doi]
- Two-dimensional non-photorealistic drawings on mobile devicesDamon Shing-Min Liu, Chi-Hsien Liu, Ching-I Cheng. 1843-1844 [doi]
- Fast mode decision for scalable video coding based on neighboring macroblock analysisGyeongeun Goh, Jinmi Kang, Misook Cho, Kidong Chung. 1845-1846 [doi]
- A framework for text visualization using memory traffic management for mobile devicesJoão Bosco Ferreira Filho, José de S. R. Neto, Cláudio R. F. Lima, Rossana M. C. Andrade. 1847-1848 [doi]
- Matching ::::ThisType:::: to subtypingChieri Saito, Atsushi Igarashi. 1851-1858 [doi]
- Static type inference for RubyMichael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael W. Hicks. 1859-1866 [doi]
- Representing refactoring opportunitiesEduardo Kessler Piveta, Marcelo Soares Pimenta, João Araújo, Ana Moreira, Pedro Guerreiro, Roberto Tom Price. 1867-1872 [doi]
- Symmetric encapsulated multi-methods to abstract over application structureDavid Lievens, William Harrison. 1873-1880 [doi]
- Optimizing techniques for saturated arithmetic with first-order linear recurrenceWeihua Zhang, Lili Liu, Chen Zhang, HongJiang Zhang, Binyu Zang, Chuanqi Zhu. 1883-1889 [doi]
- Algebraic specification techniques for parametric types with logic-based constraintsDavid Briggs, Suad Alagic. 1890-1897 [doi]
- Isomorphisms, hylomorphisms and hereditarily finite data types in HaskellPaul Tarau. 1898-1902 [doi]
- Banzai: a Java framework for the implementation of high-performance serversJulien Cervelle, Rémi Forax, Gautier Loyauté, Gilles Roussel. 1903-1909 [doi]
- Troll, a language for specifying dice-rollsTorben Æ. Mogensen. 1910-1915 [doi]
- A practical solution for scripting language compilersPaul Biggar, Edsko de Vries, David Gregg. 1916-1923 [doi]
- TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsingAkim Demaille, Roland Levillain, Benoît Sigoure. 1924-1929 [doi]
- Points-to analysis for JavaScriptDongseok Jang, Kwang-Moo Choe. 1930-1937 [doi]
- Data parallel dialect of scheme: outline of the formal model, implementation, performancePetr Krajca, Vilém Vychodil. 1938-1939 [doi]
- Kenro: a virtual machine monitor mostly described in HaskellYoshihiro Oyama, Yoshiki Kaneko, Hideya Iwasaki. 1940-1941 [doi]
- An implementation substrate for languages composing modularized crosscutting concernsHans Schippers, Michael Haupt, Robert Hirschfeld. 1944-1951 [doi]
- Building a customizable embedded operating system with fine-grained joinpoints using the AOX programming environmentJiyong Park, Seongsoo Hong. 1952-1956 [doi]
- Aspect-oriented procedural content engineering for game designWalter Cazzola, Diego Colombo, Duncan Harrison. 1957-1962 [doi]
- Flexible features: making feature modules more reusablePeter Ebraert, Jorge Vallejos, Yves Vandewoude. 1963-1970 [doi]
- Resource sharing in behavioral based schedulingLeo Ordínez, David Donari, Rodrigo Santos, Javier Orozco. 1972-1978 [doi]
- Exploiting stack distance to estimate worst-case data cache performanceYu Liu, Wei Zhang. 1979-1983 [doi]
- An implementation of the earliest deadline first algorithm in LinuxDario Faggioli, Michael Trimarchi, Fabio Checconi. 1984-1989 [doi]
- An orthogonal real-time scheduling architecture for responsiveness QoS requirements in SOA environmentsFrancisco José Monaco, M. Nery, Maycon Leone Maciel Peixoto. 1990-1995 [doi]
- Designing reliable real-time concurrent object-oriented software systemsAlfredo Capozucca, Nicolas Guelfi. 1996-1997 [doi]
- Designing a multi-core hard real-time test bed for energy measurement experimentsTongquan Wei, Xiaodao Chen, Piyush Mishra. 1998-1999 [doi]
- Privacy-preserving linear programmingJaideep Vaidya. 2002-2007 [doi]
- On the practical importance of communication complexity for secure multi-party computation protocolsFlorian Kerschbaum, Daniel Dahlmeier, Axel Schröpfer, Debmalya Biswas. 2008-2015 [doi]
- Open source vs. closed source software: towards measuring securityGuido Schryen, Rouven Kadura. 2016-2023 [doi]
- Improving stream correlation attacks on anonymous networksGavin O Gorman, Stephen Blott. 2024-2028 [doi]
- KvmSec: a security extension for Linux kernel virtual machinesFlavio Lombardi, Roberto Di Pietro. 2029-2034 [doi]
- Bayesian bot detection based on DNS traffic similarityRicardo Villamarín-Salomón, José Carlos Brustoloni. 2035-2041 [doi]
- Semi-supervised co-training and active learning based approach for multi-view intrusion detectionChing-Hao Mao, Hahn-Ming Lee, Devi Parikh, Tsuhan Chen, Si-Yu Huang. 2042-2048 [doi]
- Taking total control of voting systems: firmware manipulations on an optical scan voting terminalSeda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent D. Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, Alexander A. Shvartsman. 2049-2053 [doi]
- SQLProb: a proxy-based architecture towards preventing SQL injection attacksAnyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou. 2054-2061 [doi]
- Secure web-based retrieval of documents with usage controlsPeter Djalaliev, José Carlos Brustoloni. 2062-2069 [doi]
- An extensible simulation tool for overlay networks and servicesJordi Pujol Ahulló, Pedro García López, Marc Sánchez Artigas, Marcel Arrufat-Arias. 2072-2076 [doi]
- Simulating human intuitive decisions by Q-learningJason Leezer, Yu Zhang. 2077-2081 [doi]
- Simulation supporting the design of self-organizing ambient intelligent systemsStefania Bandini, Andrea Bonomi, Giuseppe Vizzari. 2082-2086 [doi]
- Composing a high fidelity HLA federation for littoral operationsFawzi Hassaïne, Russ Moulton, Chris Fink. 2087-2092 [doi]
- Simulating antigenic drift and shift in influenza ANuno Fachada, Vitor V. Lopes, Agostinho Rosa. 2093-2100 [doi]
- Simulating business processes with EPML.SIMDavide Rossi, Elisa Turrini, Fabio Vitali. 2101-2102 [doi]
- Using probabilistic model checking and simulation for designing self-organizing systemsMatteo Casadei, Mirko Viroli. 2103-2104 [doi]
- Conceptualization and implementation of a microscopic pedestrian simulation platformEdgar F. Esteves, Rosaldo J. F. Rossetti, Paulo A. F. Ferreira, Eugénio C. Oliveira. 2105-2106 [doi]
- Precise generalized contact point and normal determination for rigid body simulationDylan A. Shell, Evan Drumwright. 2107-2108 [doi]
- CMC-UMC: a framework for the verification of abstract service-oriented propertiesMaurice H. ter Beek, Franco Mazzanti, Stefania Gnesi. 2111-2117 [doi]
- Runtime monitoring of web service choreographies using streaming XMLSylvain Hallé, Roger Villemaire. 2118-2125 [doi]
- PRECISO: a reengineering process and a tool for database modernisation through web servicesRicardo Pérez-Castillo, Ignacio García-Rodríguez, Ismael Caballero. 2126-2133 [doi]
- Load management in model-aware execution of composite web servicesKarolina Zurowska, Ralph Deters. 2134-2139 [doi]
- Using process mining to business process distributionFaramarz Safi Esfahani, Masrah Azrifah Azmi Murad, Md Nasir Sulaiman, Nur Izura Udzir. 2140-2145 [doi]
- Annotating UDDI registries to support the management of composite servicesM. Brian Blake, Michael F. Nowlan, Ajay Bansal, Srividya Kona. 2146-2153 [doi]
- A general service oriented approach for managing virtual machines allocationPaolo Anedda, Massimo Gaggero, Simone Manca. 2154-2161 [doi]
- SimSOA: an approach for agent-based simulation and design-time assessment of SOC-based IT systemsStefan Thanheiser, Lei Liu, Hartmut Schmeck. 2162-2169 [doi]
- Assessing complexity of service-oriented computing using learning classifier systemsLei Liu, Stefan Thanheiser, Hartmut Schmeck. 2170-2171 [doi]
- Sink-oriented dynamic location service for shortest path relay with energy efficient global gridHyeonjae Jeon, KwangJin Park, Hyunseung Choo. 2174-2179 [doi]
- Lightweight monitoring of sensor softwareMustafa Hammad, Jonathan Cook. 2180-2185 [doi]
- Jointly optimizing data acquisition and delivery in traffic monitoring VANETsAntonios Skordylis, Niki Trigoni. 2186-2190 [doi]
- Real-time multi-view vision systems using WSNsPaolo Pagano, Francesco Piga, Yao Liang. 2191-2196 [doi]
- Opportunistic real-time routing in multi-hop wireless sensor networksJunwhan Kim, Binoy Ravindran. 2197-2201 [doi]
- Integrating standardized transaction protocols in service-oriented wireless sensor networksChristoph Reinke, Nils Hoeller, Jana Neumann, Sven Groppe, Volker Linnemann, Martin Lipphardt. 2202-2203 [doi]
- Towards developing a trust-based security solutionSheikh Iqbal Ahamed, Donghyun Kim, Chowdhury S. Hasan, Mohammad Zulkernine. 2204-2205 [doi]