Abstract is missing.
- A method for identification of moving objects by integrative use of a camera and accelerometersNaoka Maruhashi, Tsutomu Terada, Masahiko Tsukamoto. 1-6 [doi]
- History-independence: a fresh look at the case of R-treesTheodoros Tzouramanis. 7-12 [doi]
- Representation and management of spatiotemporal data in object-relational databasesLuís Matos, José Moreira, Alexandre Carvalho. 13-20 [doi]
- High level adaptive fusion approach: application to land cover change prediction in satellite image databasesWadii Boulila, Karim Saheb Ettabaa, Imed Riadh Farah, Basel Solaiman. 21-22 [doi]
- ST4SQL: a spatio-temporal query language dealing with granularitiesGabriele Pozzani, Carlo Combi. 23-25 [doi]
- Multilayer Fuzzy ARTMAP: fast learning and fast testing for pattern classificationTatt Hee Oong, Nor Ashidi Mat Isa. 27-32 [doi]
- An application of circumscribed circle filter in the Multi-Stencils Fast Marching methodHong Liu, Chih-Cheng Hung, Huaifei Hu, Mali Yu, Enmin Song. 33-38 [doi]
- A novel segmentation method for convex lesions based on dynamic programming with local intra-class varianceMali Yu, Qiliang Huang, Renchao Jin, Enmin Song, Hong Liu, Chih-Cheng Hung. 39-44 [doi]
- Rushes video summarization based on spatio-temporal featuresTiago Oliveira Cunha, Flávio G. H. de Souza, Arnaldo de Albuquerque Araújo, Gisele L. Pappa. 45-50 [doi]
- Texture fuzzy segmentation using adaptive affinity functionsBruno M. Carvalho, Tiago S. Souza, Edgar Garduño. 51-53 [doi]
- Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic AlgorithmZhanghui Chen, Baoyao Zhou, Shan Dong. 54-55 [doi]
- Clustering approach algorithm for image interpolationTania Mezzadri Centeno, Marcio Teruo Akyama. 56-57 [doi]
- On the complexity of temporal controllabilities for workflow schemataCarlo Combi, Roberto Posenato. 60-66 [doi]
- Solving non-linear arithmetic constraints in soft realtime environmentsHendrik Skubch. 67-73 [doi]
- Solution neighbourhoods for constraint-directed local searchJun He, Pierre Flener, Justin Pearson. 74-79 [doi]
- Combinatorial problem solving over relational databases: view synthesis through constraint-based local searchToni Mancini, Pierre Flener, Justin Pearson. 80-87 [doi]
- Partition refinement for bisimilarity in CCPAndrés Aristizábal, Filippo Bonchi, Frank D. Valencia, Luis Fernando Pino. 88-93 [doi]
- Real solution formulas of cubic and quartic equations applied to generate dynamic diagrams with inequality constraintsTing Zhao, Hoon Hong, Dongming Wang, Philippe Aubry. 94-101 [doi]
- Decomposition of geometrical constraint systems with reparameterizationPascal Mathis, Pascal Schreck, Rémi Imbach. 102-108 [doi]
- Yet another algorithm for generalized Voronoï DiagramsIoannis Z. Emiris, Angelos Mantzaflaris, Bernard Mourrain. 109-110 [doi]
- Towards an automatic construction of Contextual Attribute-Value TaxonomiesDino Ienco, Yoann Pitarch, Pascal Poncelet, Maguelonne Teisseire. 113-118 [doi]
- A constraint language for declarative pattern discoveryJean-Philippe Métivier, Patrice Boizumault, Bruno Crémilleux, Mehdi Khiari, Samir Loudni. 119-125 [doi]
- A study of top-k measures for discrimination discoveryDino Pedreschi, Salvatore Ruggieri, Franco Turini. 126-131 [doi]
- A model for mining relevant and non-redundant informationLaura Langohr, Hannu Toivonen. 132-137 [doi]
- Discovering missing links in networks using vertex similarity measuresHung-Hsuan Chen, Liang Gou, Xiaolong (Luke) Zhang, C. Lee Giles. 138-143 [doi]
- Semi-supervised document clustering with dual supervision through seedingYeming Hu, Evangelos E. Milios, James Blustein. 144-151 [doi]
- Mining usage patterns from a repository of scientific workflowsClaudia Diamantini, Domenico Potena, Emanuele Storti. 152-157 [doi]
- Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlationsTim Schlüter, Stefan Conrad. 158-164 [doi]
- Maximum Common Subgraph based locally weighted regressionMadeleine Seeland, Fabian Buchwald, Stefan Kramer, Bernhard Pfahringer. 165-172 [doi]
- Context-aware role mining for mobile service recommendationJian Wang, Cheng Zeng, Chuan He, Liang Hong, Liang Zhou, Raymond K. Wong, Jilei Tian. 173-178 [doi]
- Multi-label classification using boolean matrix decompositionJörg Wicker, Bernhard Pfahringer, Stefan Kramer. 179-186 [doi]
- A people-to-people recommendation system using tensor space modelsSangeetha Kutty, Lin Chen, Richi Nayak. 187-192 [doi]
- CCDR-PAID: more efficient cache-conscious PAID algorithm by data reconstructionYuki Matsubara, Jun Miyazaki, Goshiro Yamamoto, Yuki Uranishi, Sei Ikeda, Hirokazu Kato. 193-198 [doi]
- A new class of constraints for constrained frequent pattern miningCarson Kai-Sang Leung, Lijing Sun. 199-204 [doi]
- Joint sentiment aspect modelNoriaki Kawamae. 205-210 [doi]
- An empirical evaluation of process mining algorithms based on structural and behavioral similaritiesJianmin Wang 0001, Shijie Tan, Lijie Wen, Raymond K. Wong, Qinlong Guo. 211-213 [doi]
- A common neighbour based two-way collaborative recommendation methodLin Chen, Richi Nayak, Yue Xu. 214-215 [doi]
- Hierarchical confidence-based active clusteringBruno M. Nogueira, Alípio Mário Jorge, Solange Oliveira Rezende. 216-219 [doi]
- Introducing intervention targeting into estimation of distribution algorithmsGeoffrey Neumann, David Cairns. 220-225 [doi]
- Boosting the detection of modular community structure with genetic algorithms and local searchClara Pizzuti. 226-231 [doi]
- Stochastic search for global neighbors selection in collaborative filteringAmine M. Boumaza, Armelle Brun. 232-237 [doi]
- Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithmRi Choe, Hui Yuan, Youngjee Yang, Kwang Ryel Ryu. 238-243 [doi]
- Analysis of a triploid genetic algorithm over deceptive landscapesLi Meng, Seamus Hill, Colm O'Riordan. 244-249 [doi]
- A genetic algorithm for Hierarchical Multi-Label ClassificationRicardo Cerri, Rodrigo C. Barros, André Carlos Ponce Leon Ferreira de Carvalho. 250-255 [doi]
- Artificial Immune Systems: Models, Applications, and challengesSamir A. Mohamed Elsayed, Reda A. Ammar, Sanguthevar Rajasekaran. 256-258 [doi]
- A two-level procedure based on genetic algorithms to optimize an aeronautical composite structureLeonardo D. Chiwiacowsky, Paolo Gasbarri, Riccardo Monti, Haroldo F. de Campos Velho, Arthur Tórgo Gómez. 259-260 [doi]
- SageRobotics: open source framework for symbolic computation of robot modelsCristóvão D. Sousa, Rui Cortesão. 262-267 [doi]
- Multi-fingered reactive grasping with active guided camera systemsHeinz Wörn, Stephan Irgenfried, Thomas Haase. 268-273 [doi]
- A two-level approach for multi-robot coordinated exploration of unstructured environmentsP. G. C. N. Senarathne, Danwei Wang. 274-279 [doi]
- Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networksJefferson R. Souza, Gustavo Pessin, Gustavo B. Eboli, Caio César Teodoro Mendes, Fernando Santos Osório, Denis F. Wolf. 280-285 [doi]
- An integrated architecture for autonomous vehicles simulationJosé L. F. Pereira, Rosaldo J. F. Rossetti. 286-292 [doi]
- Philos: a sociable robot for human robot interactions and wireless health monitoringKenneth Hornfeck, Yan Zhang, Kiju Lee. 293-294 [doi]
- Pervasive ecosystems: a coordination model based on semantic chemistryMirko Viroli, Danilo Pianini, Sara Montagna, Graeme Stevenson. 295-302 [doi]
- Using Hierarchical Edge Bundles to visualize complex ontologies in GLOWWalter Hop, Sven de Ridder, Flavius Frasincar, Frederik Hogenboom. 304-311 [doi]
- Sorted hyper-predicate knowledge bases for ontologies and rulesKen Kaneiwa, Philip H. P. Nguyen. 312-319 [doi]
- f-SROIQ(G): an expressive fuzzy Description Logic supporting fuzzy data type groupLi Yan, Fu Zhang, Z. M. Ma. 320-325 [doi]
- Predicting RDF triples in incomplete knowledge bases with tensor factorizationLucas Drumond, Steffen Rendle, Lars Schmidt-Thieme. 326-331 [doi]
- Harnessing geo-tagged resources for Web personalizationMarkus Zanker, Markus Jessenitschnig, Martin Stromberger. 332-339 [doi]
- Compression of RDF dictionariesMiguel A. Martínez-Prieto, Javier D. Fernández, Rodrigo Cánovas. 340-347 [doi]
- A Configuration Management task ontology for semantic integrationRodrigo Fernandes Calhau, Ricardo de Almeida Falbo. 348-353 [doi]
- Extending Open Directory Project to represent user interestsSeulgi So, Jung-Hyun Lee, Daoun Jung, JongWoo Ha, SangKeun Lee. 354-359 [doi]
- A novel Framenet-based resource for the semantic webVolha Bryl, Sara Tonelli, Claudio Giuliano, Luciano Serafini. 360-365 [doi]
- Linked education: interlinking educational resources and the Web of dataStefan Dietze, Hong Qing Yu, Daniela Giordano, Eleni Kaldoudi, Nikolas Dovrolis, Davide Taibi. 366-371 [doi]
- Efficient matching of SPARQL subscriptions using reteHaris Abdullah, Mikko Rinne, Seppo Törmä, Esko Nuutila. 372-377 [doi]
- Learning probabilistic Description logic concepts: under different Assumptions on missing knowledgePasquale Minervini, Claudia d'Amato, Nicola Fanizzi. 378-383 [doi]
- A distributional approach for terminological semantic search on the Linked Data WebAndré Freitas, Edward Curry, Seán O'Riain. 384-391 [doi]
- Social health data integration using semantic WebSoon Ae Chun, Bonnie MacKellar. 392-397 [doi]
- BOwL: exploiting Boolean operators and lesk algorithm for linking ontologiesViviana Mascardi, Angela Locoro. 398-400 [doi]
- Intention based semantic approach for service sourcingIkbel Guidara, Tarak Chaari, Kaouthar Fakhfakh. 401-402 [doi]
- Web 3.0 in action: Vector Space Model for semantic (movie) RecommendationsRoberto Mirizzi, Tommaso Di Noia, Eugenio Di Sciascio, Azzurra Ragone. 403-405 [doi]
- BGP-inspired autonomic service routing for the cloudWassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab. 406-411 [doi]
- Design and implementation of a P2P Cloud systemÖzalp Babaoglu, Moreno Marzolla, Michele Tamburini. 412-417 [doi]
- Context-oriented programming for customizable SaaS applicationsEddy Truyen, Nicolás Cardozo, Stefan Walraven, Jorge Vallejos, Engineer Bainomugisha, Sebastian Günther, Theo D'Hondt, Wouter Joosen. 418-425 [doi]
- Designing data storage tier using Integer ProgramingMichael J. O'Sullivan, Cameron G. Walker, DongJin Lee. 426-433 [doi]
- CloudScale: a novel middleware for building transparently scaling cloud applicationsPhilipp Leitner, Benjamin Satzger, Waldemar Hummer, Christian Inzinger, Schahram Dustdar. 434-440 [doi]
- Private data deduplication protocols in cloud storageWee Keong Ng, Yonggang Wen, Huafei Zhu. 441-446 [doi]
- Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case studyAnirban Basu, Jaideep Vaidya, Theo Dimitrakos, Hiroaki Kikuchi. 447-452 [doi]
- Entity matching for semistructured data in the CloudMarcus Paradies, Susan Malaika, Jérôme Siméon, Shahan Khatchadourian, Kai-Uwe Sattler. 453-458 [doi]
- Towards building large-scale distributed systems for twitter sentiment analysisVinh Ngoc Khuc, Chaitanya Shivade, Rajiv Ramnath, Jay Ramanathan. 459-464 [doi]
- A policy-based decentralized authorization management framework for cloud computingDongwan Shin, Ying Wang, William Claycomb. 465-470 [doi]
- A layered coordination framework for optimizing resource allocation in adapting cloud-based applicationsPatrizia Scandurra, Claudia Raibulet, Pasqualina Potena, Raffaela Mirandola, Rafael Capilla. 471-472 [doi]
- Double dip map-reduce for processing cross validation jobsDanilo Moret, Karin Breitman, Evelin Amorim, Jose Talavera, Ruy Milidiu, José Viterbo Filho. 473-477 [doi]
- Formal verification of Unreliable Failure Detectors in Partially Synchronous SystemsMuhammad Atif, Mohammad Reza Mousavi, A. Osaiweran. 478-485 [doi]
- Using constraint-based optimization and variability to support continuous self-adaptationCarlos Andres Parra, Daniel Romero 0002, Sébastien Mosser, Romain Rouvoy, Laurence Duchien, Lionel Seinturier. 486-491 [doi]
- Timeout-based adaptive consensus: improving performance through adaptationMonica Dixit, Henrique Moniz, Antonio Casimiro. 492-497 [doi]
- DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networksFarzana Rahman, Sheikh Iqbal Ahamed. 498-503 [doi]
- Non-intrusive policy optimization for dependable and adaptive service-oriented systemsChristian Inzinger, Benjamin Satzger, Waldemar Hummer, Philipp Leitner, Schahram Dustdar. 504-510 [doi]
- FTRMI: fault-tolerant transparent RMIDiogo Reis, Hugo M. Miranda. 511-518 [doi]
- Let EcoDrive be your guide: development of a mobile tool to reduce carbon footprint and promote green transportFarzana Rahman, Casey O'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed. 519-524 [doi]
- Framework for building intelligent mobile social applicationsMarcio E. F. Maia, João Bosco Ferreira Filho, Carlos A. B. de Q. Filho, Rute Castro, Rossana M. C. Andrade, Fredrik Toorn. 525-530 [doi]
- Examining the practical challenges of an Augmented Reality cyber-infrastructure frameworkChenjie Wei, Chiu Ni Wang, Rajiv Ramnath, Jay Ramanathan. 531-536 [doi]
- Grid-based cloaking area creation scheme supporting continuous location-based servicesHyunjo Lee, Byeong-Seok Oh, Hyeong-Il Kim, Jae-Woo Chang. 537-543 [doi]
- A sensor network-based multiple acoustic source localization algorithmJunho Ahn, Hojung Cha. 544-549 [doi]
- An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networksChen-Che Huang, Jiun-Long Huang, Jhih-An Yan, Lo-Yao Yeh. 550-555 [doi]
- A distributed intrusion detection scheme for wireless ad hoc networksAnderson Nunes Paiva Morais, Ana R. Cavalli. 556-562 [doi]
- A density-aware routing scheme in delay tolerant networksChih-Lin Hu, Bing-Jung Hsieh. 563-568 [doi]
- Query execution on a mobile database systemAbdel Obaid, Anne Marie Amja, Hafedh Mili, Normand Séguin. 569-571 [doi]
- MobiSpatial: open source for mobile spatial interactionJunjun Yin, James D. Carswell. 572-573 [doi]
- Topological inference through mobile devicesMarco Antero Paiva, Marcelo Petry, Rosaldo J. F. Rossetti. 574-575 [doi]
- Towards optimizing the reliability of real-time transmission in multi-hop wireless LANsJunwhan Kim. 577-582 [doi]
- Explicitly accommodating origin preference for inter-domain traffic engineeringRolf Winter, Iljitsch van Beijnum. 583-587 [doi]
- msocket: multiple stack support for the berkeley socket APIRenzo Davoli, Michael Goldweber. 588-593 [doi]
- Location based routing using smartphones in an infrastructureless environmentAlireza Mahdian, Hansu Gu, Sravan Thokala, Shivakant Mishra. 594-599 [doi]
- Performance of MIMO 802.11n in heterogeneous deploymentsMurad Abusubaih, Mahmoud Rajabi, Mahmood Ajloni, Fadel Shahin. 600-604 [doi]
- A real-time data aggregation method for fault-tolerant wireless sensor networksPeyman Teymoori, Mehdi Kargahi, Nasser Yazdani. 605-612 [doi]
- Automatic creation of VPN backup paths for improved resilience against BGP-attackersMichael Grey, Michael Rossberg, Guenter Schaefer. 613-620 [doi]
- Spatio-temporal decomposition, clustering and identification for alert detection in system logsAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios, Markus Latzel. 621-628 [doi]
- Towards a passive DNS monitoring systemLuca Deri, Lorenzo Luconi Trombacchi, Maurizio Martinelli, Daniele Vannozzi. 629-630 [doi]
- Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov modelPravati Swain, Sandip Chakraborty, Sukumar Nandi, Purandar Bhaduri. 631-633 [doi]
- S2S: a peer to peer protocol for participative sensingPaola Salomoni, Ludovico Antonio Muratori, Giovanni Pau, Marco Magnani. 634-635 [doi]
- An approach to improve code-first web services discoverability at development timeJosé Luis Ordiales Coscia, Marco Crasso, Cristian Mateos, Alejandro Zunino. 638-643 [doi]
- Finding similar items by leveraging social tag cloudsChu-Cheng Hsieh, Junghoo Cho. 644-651 [doi]
- Data binding for standard-based web applicationsMatthias Heinrich, Martin Gaedke. 652-657 [doi]
- Embedding semantic annotations within texts: the FRETTA approachGioele Barabucci, Silvio Peroni, Francesco Poggi, Fabio Vitali. 658-663 [doi]
- Using spring Roo for the test-driven development of Web applicationsTim A. Majchrzak, Andreas Simon. 664-671 [doi]
- Querying and ranking news items in the hermes frameworkArnout Verheij, Allard Kleijn, Flavius Frasincar, Damir Vandic, Frederik Hogenboom. 672-679 [doi]
- Statistical techniques for online personalized advertising: a surveyMaad Shatnawi, Nader Mohamed. 680-687 [doi]
- Extending XForms with server-side functionalityMarkku Laine, Denis Shestakov, Petri Vuorimaa. 688-695 [doi]
- RetriBlog: a framework for creating blog crawlersRafael Ferreira, Rinaldo Lima, Jean Melo, Evandro Costa, Frederico Luiz Gonçalves de Freitas, Henrique Pacca Loureiro Luna. 696-701 [doi]
- Approximately optimal facet selectionSonya Liberman, Ronny Lempel. 702-708 [doi]
- Towards an automatic evaluation of web applicationsLeandro Guarino de Vasconcelos, Laércio Augusto Baldochi Jr.. 709-716 [doi]
- Process-aware continuation management in web applicationsMatthias Book, Volker Gruhn, Marco Buss. 717-724 [doi]
- Evolving and validating annotations in web-based collaborative environments through ontology matchingAngela Locoro, Viviana Mascardi, Anna Marina Scapolla. 725-727 [doi]
- Resolving user identities over social networks through supervised learning and rich similarity featuresAndré Nunes, Pável Calado, Bruno Martins. 728-729 [doi]
- Performance evaluation of user-created open-web gamesNavid Ahmadi, Mehdi Jazayeri, Alexander Repenning. 730-732 [doi]
- Finding similar destinations with flickr geotagsDavide Eynard, Alessandro Inversini, Leonardo Gentile. 733-736 [doi]
- Dependency-based automatic locking for semantic conflict prevention in real-time collaborative programmingHongfei Fan, Chengzheng Sun. 737-742 [doi]
- Testing the reliability of web services transactions in cooperative applicationsRuben Casado, Javier Tuya, Muhammad Younas. 743-748 [doi]
- Mechanism design for decentralized vehicle routing problemMohamed Saleh, Andrei Soeanu, Sujoy Ray, Mourad Debbabi, Jean Berger, Abdeslem Boukhtouta. 749-754 [doi]
- Multi-agent framework for real-time processing of large and dynamic search spacesJohn Korah, Eunice E. Santos, Eugene Santos Jr.. 755-762 [doi]
- Using ontology-based methods for implementing role-based access control in cooperative systemsSatyajeet Raje, Chowdary Davuluri, Michael Freitas, Rajiv Ramnath, Jay Ramanathan. 763-764 [doi]
- An ontological basis for resource representationYves Wautelet, Samedi Heng, Manuel Kolp. 765-766 [doi]
- Restoration of motion blurred document imagesBolan Su, Shijian Lu, Chew Lim Tan. 767-770 [doi]
- Assessing handwitten digit segmentation algorithmsFelipe Ribas, Luiz S. Oliveira, Alceu de Souza Britto Jr., Robert Sabourin. 772-776 [doi]
- Affine invariant shape matching using radon transform and dynamic time warping distanceMakoto Hasegawa, Salvatore Tabbone. 777-781 [doi]
- Multi-document summarization exploiting frequent itemsetsElena Baralis, Luca Cagliero, Saima Jabeen, Alessandro Fiori. 782-786 [doi]
- An information extraction system from patient historical documentsEirini Matthaiou, Ergina Kavallieratou. 787-791 [doi]
- Row manipulation in the heterogeneous tabular forms with a hexadecimal grid graph modelShinji Koka, Koichi Anada, Kenshi Nomaki, Yuki Shindo, Takeo Yaku. 792-793 [doi]
- Very Fast Decision Rules for multi-class problemsPetr Kosina, João Gama. 795-800 [doi]
- Real-time visual analytics for event data streamsFabian Fischer, Florian Mansmann, Daniel A. Keim. 801-806 [doi]
- Discovering global and local bursts in a stream of newsMax Zimmermann, Irene Ntoutsi, Zaigham Faraz Siddiqui, Myra Spiliopoulou, Hans-Peter Kriegel. 807-812 [doi]
- Revisiting formal ordering in data stream queryingLoïc Petit, Cyril Labbé, Claudia Roncancio. 813-818 [doi]
- Discovering activity interactions in a single pass over a video streamOmar U. Florez, Curtis E. Dyreson. 819-826 [doi]
- Trend cluster based interpolation everywhere in a sensor networkPietro Guccione, Anna Ciampi, Annalisa Appice, Donato Malerba, Angelo Muolo. 827-828 [doi]
- Improving the offline clustering stage of data stream algorithms in scenarios with variable number of clustersElaine R. Faria, Rodrigo C. Barros, João Gama, André C. P. L. F. Carvalho. 829-830 [doi]
- To be or not to be real: fractal analysis of data streams from a regional climate change modelSantiago Augusto Nunes, Ana Maria Heuminski de Ávila, Luciana A. S. Romani, Agma J. M. Traina, Priscila P. Coltri, Elaine P. M. de Sousa. 831-832 [doi]
- C-Mapping: a flexible XML-RDB mapping method based on functional and inclusion dependenciesSosuke Ota, Atsuyuki Morishima, Norihide Shinagawa, Toshiyuki Amagasa. 834-839 [doi]
- Attribute implications in similarity-based databases: semantic entailment and nonredundant basesRadim Belohlávek, Vilém Vychodil. 840-846 [doi]
- SART: dynamic P2P query processing in sensor networks with probabilistic guaranteesSpyros Sioutas, Alexandros Panaretos, Ioannis Karydis, Dimitrios Tsoumakos. 847-852 [doi]
- DREAM: a distributed fRamework for customized dEployment of a vAriety of indexing engines over million-node overlaysEvangelos Sakkopoulos, Alexandros Panaretos, Spyros Sioutas, Dimitrios Tsoumakos, George Papaloukopoulos, Anastasia Saltou. 853-858 [doi]
- Reference table based k-anonymous private blockingAlexandros Karakasidis, Vassilios S. Verykios. 859-864 [doi]
- Model Management Systems vs. Model Driven Engineering: a case studyVerónica Andrea Bollati, Paolo Atzeni, Esperanza Marcos, Juan M. Vara. 865-872 [doi]
- GPU accelerated AES-CBC for database applicationsScott Fazackerley, Steven M. McAvoy, Ramon Lawrence. 873-878 [doi]
- Minimum bounding boxes for regular cross-polytopesSalman Shahid, Sakti Pramanik, Charles B. Owen. 879-884 [doi]
- Metrics for approximate query engine evaluationFrancesco Di Tria, Ezio Lefons, Filippo Tangorra. 885-887 [doi]
- An Active XML-based framework for integrating complex dataRashed Salem, Omar Boussaid, Jérôme Darmont. 888-892 [doi]
- Autonomous re-indexingEduardo Terra Morelli, Ana Carolina Almeida, Sérgio Lifschitz, José Maria Monteiro, Javam C. Machado. 893-897 [doi]
- Inverted file-based indexing for efficient multimedia information retrieval in metric spacesDaniel Blank, Andreas Henrich. 900-905 [doi]
- A consistency rule for graph isomorphism problemBadreddine Benreguia, Hamamache Kheddouci. 906-911 [doi]
- Fine-grained topic detection in news search resultsJia Cheng, Jingyu Zhou, Shuang Qiu. 912-917 [doi]
- A pilot study for mood-based classification of TV programmesJana Eggink, Penelope Allen, Denise Bland. 918-922 [doi]
- Towards effective group recommendations for microblogging usersRicardo Lage, Frederico Araujo Durão, Peter Dolog. 923-928 [doi]
- Enhancing semi-supervised document clustering with feature supervisionYeming Hu, Evangelos E. Milios, James Blustein. 929-936 [doi]
- Investigations into user rating information and predictive accuracy in a collaborative filtering domainJosephine Griffith, Colm O'Riordan, Humphrey Sorensen. 937-942 [doi]
- Uprising microblogs: a bayesian network retrieval model for tweet searchLamjed Ben Jabeur, Lynda Tamine, Mohand Boughanem. 943-948 [doi]
- Effective web video clustering using playlist informationMariko Kamie, Takako Hashimoto, Hiroyuki Kitagawa. 949-956 [doi]
- HMM-CARe: Hidden Markov Models for context-aware tag recommendation in folksonomiesChiraz Trabelsi, Bilel Moulahi, Sadok Ben Yahia. 957-961 [doi]
- A comparison of metadata extraction techniques for crowdsourced bibliographic metadata managementMichael Granitzer, Maya Hristakeva, Kris Jack, Robert Knight. 962-964 [doi]
- Corpus-based place metadatabase generation for geocodingYoshihide Hosokawa. 965-967 [doi]
- A compilation technique to increase X3D performance and safetyGiuseppe Maggiore, Fabio Pittarello, Michele Bugliesi, Mohamed Abbadi. 969-974 [doi]
- A multimedia recommender system based on enriched user profilesMarcelo G. Manzato, Rudinei Goularte. 975-980 [doi]
- Towards the visualization of software systems as 3D forests: the CodeTrees environmentUgo Erra, Giuseppe Scanniello. 981-988 [doi]
- MINI: a 3D mobile image browser with multi-dimensional datasetsAi Gomi, Takayuki Itoh. 989-996 [doi]
- Time-aware visualization of document collectionsAretha Barbosa Alencar, Katy Börner, Fernando Vieira Paulovich, Maria Cristina Ferreira de Oliveira. 997-1004 [doi]
- RevGlyph: a technique for reverting anaglyph stereoscopic videosMatheus Ricardo U. Zingarelli, Leonardo Antonio de Andrade, Rudinei Goularte. 1005-1011 [doi]
- Image retrieval employing genetic dissimilarity weighting and feature space transformation functionsLetricia P. S. Avalhais, Sérgio Francisco da Silva, José Fernando Rodrigues Jr., Agma J. M. Traina. 1012-1017 [doi]
- A media-based social interactions analysis procedureAlan Keller Gomes, Maria da Graça Campos Pimentel. 1018-1024 [doi]
- Toward a visual pedometerDawei Liu, Qi Shan, Dan Wu. 1025-1027 [doi]
- Scalable depth map coding for 3D video using contour informationJinmi Kang, Hyejeong Jeong, Kidong Chung. 1028-1029 [doi]
- Evaluating force-directed algorithms with a new frameworkMao Lin Huang, Weidong Huang, Chun-Cheng Lin. 1030-1032 [doi]
- EA-tracer: identifying traceability links between code aspects and early aspectsAlberto Sardinha, Yijun Yu, Nan Niu, Awais Rashid. 1035-1042 [doi]
- A clustering-based approach for discovering flaws in requirements specificationsAlessio Ferrari, Stefania Gnesi, Gabriele Tolomei. 1043-1050 [doi]
- Goal-oriented approach to creating class diagrams with OCL constraintsSombat Chanvilai, Kozo Honda, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga. 1051-1056 [doi]
- Extending SysML to explore non-functional requirements: the case of information system designAnargyros Tsadimas, Mara Nikolaidou, Dimosthenis Anagnostopoulos. 1057-1062 [doi]
- Functional requirements validation by transforming use case models into Abstract State MachinesPatrizia Scandurra, Andrea Arnoldi, Tao Yue, Marco Dolci. 1063-1068 [doi]
- A comparative evaluation of two user feedback techniques for requirements trace retrievalYonghee Shin, Jane Cleland-Huang. 1069-1074 [doi]
- Monitoring strategic goals in data warehouses with awareness requirementsVítor Estêvão Silva Souza, Jose-Norberto Mazón, Irene Garrigós, Juan Trujillo, John Mylopoulos. 1075-1082 [doi]
- A systematic mapping study on creativity in requirements engineeringJoão Lemos, Carina Frota Alves, Leticia Duboc, Genaína Nunes Rodrigues. 1083-1088 [doi]
- Towards a process factory for developing situational requirements engineering processesOmid Jafarinezhad, Raman Ramsin. 1089-1090 [doi]
- Statechart-based use case requirement validation of event-driven systemsSaurabh Tiwari, Atul Gupta. 1091-1093 [doi]
- Integrating event logs into KDM repositoriesRicardo Pérez-Castillo, Ignacio García Rodríguez de Guzmán, Mario Piattini, Barbara Weber. 1095-1102 [doi]
- 2: automated threat analysisAndreas Schaad, Mike Borozdin. 1103-1108 [doi]
- An empirical investigation of perceived reliability of open source Java programsLuigi Lavazza, Sandro Morasca, Davide Taibi, Davide Tosi. 1109-1114 [doi]
- Managing the dynamism of the OSGi Service Platform in real-time Java applicationsJoão Claudio Américo, Walter Rudametkin, Didier Donsez. 1115-1122 [doi]
- On the improvement of a fault classification scheme with implications for white-box testingShimul Kumar Nath, Robert Merkel, Man Fai Lau. 1123-1130 [doi]
- An architecture-centered framework for developing blog crawlersRafael Ferreira, Patrick Henrique da S. Brito, Jean Melo, Evandro Costa, Rinaldo Lima, Frederico Luiz Gonçalves de Freitas. 1131-1136 [doi]
- Ontology-based documentation extraction for semi-automatic migration of Java codeDavide Ancona, Viviana Mascardi, Ombretta Pavarino. 1137-1143 [doi]
- Dynamic reconfiguration in self-adaptive systems considering non-functional propertiesHisayuki Horikoshi, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga. 1144-1150 [doi]
- From relational ClassSheets to UML+OCLJácome Cunha, João Paulo Fernandes, João Saraiva. 1151-1158 [doi]
- DAG3: a tool for design and analysis of applications for multicore architecturesMauro Luigi Drago, Judith Bishop. 1159-1164 [doi]
- RefactoringNG: a flexible Java refactoring toolZdenek Tronícek. 1165-1170 [doi]
- Estimating software reliability via pseudo maximum likelihood methodShinya Ikemoto, Tadashi Dohi, Hiroyuki Okamura. 1171-1176 [doi]
- Investigating framework product linesAndré Luíz de Oliveira, Fabiano Cutigi Ferrari, Rosângela Aparecida Dellosso Penteado, Valter Vieira de Camargo. 1177-1182 [doi]
- Experience report on developing the Front-end client unit under the control of formal methodsJan Friso Groote, Ammar Osaiweran, Jacco H. Wesselius. 1183-1190 [doi]
- Fault class prioritization in Boolean expressionsZiyuan Wang, Zhenyu Chen, Tsong Yueh Chen, Baowen Xu. 1191-1196 [doi]
- A knowledge-based framework for reference architecturesElisa Yumi Nakagawa, Martin Becker 0002, José Carlos Maldonado. 1197-1202 [doi]
- Software testing-resource allocation with operational profileSatoru Ukimoto, Tadashi Dohi, Hiroyuki Okamura. 1203-1208 [doi]
- Predicting software maintenance effort through evolutionary-based decision treesMárcio P. Basgalupp, Rodrigo C. Barros, Duncan D. Ruiz. 1209-1214 [doi]
- A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault predictionFederica Sarro, Sergio Di Martino, Filomena Ferrucci, Carmine Gravino. 1215-1220 [doi]
- Single and Multi Objective Genetic Programming for software development effort estimationFederica Sarro, Filomena Ferrucci, Carmine Gravino. 1221-1226 [doi]
- Comparative stability of cloned and non-cloned code: an empirical studyManishankar Mondal, Chanchal K. Roy, Md. Saidur Rahman 0002, Ripon K. Saha, Jens Krinke, Kevin A. Schneider. 1227-1234 [doi]
- IDE-based real-time focused search for near-miss clonesMinhaz F. Zibran, Chanchal K. Roy. 1235-1242 [doi]
- AODP: refactoring code to provide advanced aspect-oriented modularization of design patternsRosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana. 1243-1250 [doi]
- An analysis of anti-micro-patterns effects on fault-proneness in large Java systemsGiuseppe Destefanis, Roberto Tonelli, Giulio Concas, Michele Marchesi. 1251-1253 [doi]
- A case study in the use of Groovy and GrailsKaren Malone, Josephine Griffith. 1254-1255 [doi]
- Designing architectures from problem descriptions by interactive model transformationAzadeh Alebrahim, Isabelle Côté, Maritta Heisel, Christine Choppy, Denis Hatebur. 1256-1258 [doi]
- Investigating fault prediction capabilities of five prediction models for software qualityDeepak Banthia, Atul Gupta. 1259-1261 [doi]
- Verification conditions for single-assignment programsDaniela Carneiro da Cruz, Maria João Frade, Jorge Sousa Pinto. 1264-1270 [doi]
- Translating B machines to JML specificationsNéstor Cataño, Tim Wahls, Camilo Rueda, Víctor Rivera, Danni Yu. 1271-1277 [doi]
- Verification of a self-configuration protocol for distributed applications in the cloudGwen Salaün, Xavier Etchevers, Noel De Palma, Fabienne Boyer, Thierry Coupaye. 1278-1283 [doi]
- Program slicing enhances a verification technique combining static and dynamic analysisOmar Chebaro, Nikolai Kosmatov, Alain Giorgetti, Jacques Julliand. 1284-1291 [doi]
- Symbolic execution of UML-RT State MachinesKarolina Zurowska, Jürgen Dingel. 1292-1299 [doi]
- Precise shape analysis using field sensitivitySandeep Dasgupta, Amey Karkare. 1300-1307 [doi]
- SAILS: static analysis of information leakage with sampleMatteo Zanioli, Pietro Ferrara, Agostino Cortesi. 1308-1313 [doi]
- Approximate planning and verification for large markov decision processesRichard Lassaigne, Sylvain Peyronnet. 1314-1319 [doi]
- A model checker for BigraphsGian Perrone, Søren Debois, Thomas T. Hildebrandt. 1320-1325 [doi]
- On construction of a library of formally verified low-level arithmetic functionsReynald Affeldt. 1326-1331 [doi]
- Global and local testing from Message Sequence ChartsDelphine Longuet. 1332-1338 [doi]
- Staged symbolic executionJunaid Haroon Siddiqui, Sarfraz Khurshid. 1339-1346 [doi]
- Performance evaluation of medical imaging serviceEduardo Tavares, J. Aleixo, Paulo Romero Martins Maciel, D. Oliveira, E. Heyde, R. Araujo, L. Maia, A. Duarte, M. Novaes. 1349-1354 [doi]
- Analyzing incomplete biological pathways using network motifsMaya El Dayeh, Michael Hahsler. 1355-1360 [doi]
- Parallelizing SuperFineDiogo Telmo Neves, Tandy Warnow, João Luís Sobral, Keshav Pingali. 1361-1367 [doi]
- Sorting genomes using almost-symmetric inversionsZanoni Dias, Ulisses Dias, Lenwood S. Heath, João C. Setubal. 1368-1374 [doi]
- Relationship of reproduction and evolutionary computation to analytical modeling of the ecological genetics of inducible defensesGloria Childress Townsend, Wade N. Hazel, Benjamin Steffen. 1375-1380 [doi]
- Computing gene functional similarity using combined graphsAnurag Nagar, Hisham Al-Mubaid, Saïd Bettayeb. 1381-1386 [doi]
- Molecular docking with opposition-based differential evolutionMohamad Koohi-Moghadam, Adel Torkaman Rahmani. 1387-1392 [doi]
- Probabilistic prediction of protein phosphorylation sites using kernel machinesMark Menor, Guylaine Poisson, Kyungim Baek. 1393-1398 [doi]
- Minimum multiple characterization of biological data using partially defined boolean formulasFabien Chhel, Frédéric Lardeux, Adrien Goëffon, Frédéric Saubion. 1399-1405 [doi]
- A model for drosophila melanogaster development from a single cell to stripe pattern formationSara Montagna, Danilo Pianini, Mirko Viroli. 1406-1412 [doi]
- Approximate matching over biological RDF graphsRoberto De Virgilio, Simona E. Rombo. 1413-1414 [doi]
- Tree-based search for stochastic simulation algorithmVo Hong Thanh, Roberto Zunino. 1415-1416 [doi]
- High-throughput antibody sequence alignment based on GPU computingGuoli Ji, Zhe Xiang, Xiaohui Wu, Shuiyuan Lin, Meishuang Tang, Junfeng Yao. 1417-1418 [doi]
- An empirical analysis of input validation mechanisms in web applications and languagesTheodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda. 1419-1426 [doi]
- A security analysis of amazon's elastic compute cloud serviceMarco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro. 1427-1434 [doi]
- A linux kernel cryptographic framework: decoupling cryptographic keys from applicationsNikos Mavrogiannopoulos, Miloslav Trmac, Bart Preneel. 1435-1442 [doi]
- A visualization tool for evaluating access control policies in facebook-style social network systemsMohd M. Anwar, Philip W. L. Fong. 1443-1450 [doi]
- Collusion-resistant outsourcing of private set intersectionFlorian Kerschbaum. 1451-1456 [doi]
- A framework for static detection of privacy leaks in android applicationsChristopher Mann, Artem Starostin. 1457-1462 [doi]
- Indistinguishable regions in geographic privacyJorge Cuéllar, Martín Ochoa, Ruben Rios. 1463-1469 [doi]
- Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolationJingyu Hua, Kouichi Sakurai. 1470-1477 [doi]
- Constroid: data-centric access control for androidDaniel Schreckling, Joachim Posegga, Daniel Hausknecht. 1478-1485 [doi]
- Integrity of electronic voting systems: fallacious use of cryptographySeda Davtyan, Aggelos Kiayias, Laurent Michel, Alexander Russell, Alexander A. Shvartsman. 1486-1493 [doi]
- An efficient security framework for mobile WiMAXMete Rodoper, Arati Baliga, Edward Jung, Wade Trappe. 1494-1501 [doi]
- Guiding decisions on authorization policies: a participatory approach to decision supportSteffen Bartsch, Martina Angela Sasse. 1502-1507 [doi]
- Dreams: a framework for distributed synchronous coordinationJosé Proença, Dave Clarke, Erik P. de Vink, Farhad Arbab. 1510-1515 [doi]
- Programming urban-area applicationsDries Harnie, Theo D'Hondt, Elisa Gonzalez Boix, Wolfgang De Meuter. 1516-1521 [doi]
- Modeling adaptation with a tuple-based coordination languageEdmond Gjondrekaj, Michele Loreti, Rosario Pugliese, Francesco Tiezzi. 1522-1527 [doi]
- Passive conformance testing of service choreographiesHuu-Nghia Nguyen, Pascal Poizat, Fatiha Zaïdi. 1528-1535 [doi]
- A Büchi automata based model checking framework for reo connectorsSarmen Keshishzadeh, Mohammad Izadi, Ali Movaghar. 1536-1543 [doi]
- Expressing global priorities by best-matchingIgor Cappello, Paola Quaglia. 1544-1550 [doi]
- A secure coordination of agents with nonmonotonic soft Concurrent Constraint ProgrammingStefano Bistarelli, Paola Campli, Francesco Santini. 1551-1553 [doi]
- Instance-aware assemblies of services in pervasive computingLinus Åkesson, Görel Hedin, Sven Gestegård Robertz, Boris Magnusson. 1554-1556 [doi]
- LogOpRonaldo Menezes, Andrea Omicini, Mirko Viroli. 1557-1559 [doi]
- A coordination-based access control model for space-based computingStefan Craß, eva Kühn. 1560-1562 [doi]
- TL-Tree: flash-optimized storage for time-series sensing data on sensor platformsHuan Li, Dong Liang, Lihui Xie, Gong Zhang, Krithi Ramamritham. 1565-1572 [doi]
- On using adversary simulators to obtain tight lower bounds for response timesRômulo Silva de Oliveira, Andreu Carminati, Renan Augusto Starke. 1573-1579 [doi]
- Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip designOns Mbarek, Amani Khecharem, Alain Pegatoquet, Michel Auguin. 1580-1587 [doi]
- Affinity-aware DMA buffer management for reducing off-chip memory accessQi Zhong, Xuetao Guan, Tao Huang, Xu Cheng, Keyi Wang. 1588-1593 [doi]
- A semi-partitioned real-time scheduling approach for periodic task systems on multicore platformsMuhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin. 1594-1601 [doi]
- STM concurrency control for multicore embedded real-time software: time bounds and tradeoffsMohammed El-Shambakey, Binoy Ravindran. 1602-1609 [doi]
- HotDataTrap: a sampling-based hot data identification scheme for flash memoryDongchul Park, Biplob K. Debnath, Youngjin Nam, David H. C. Du, Youngkyun Kim, Youngchul Kim. 1610-1617 [doi]
- Thermal-aware real-time task scheduling for three-dimensional multicore chipTing-Hao Tsai, Ya-Shu Chen. 1618-1624 [doi]
- An animation framework for improving the comprehension of TinyOS programsSravanthi Dandamudi, Sally K. Wahba, Jason O. Hallstrom. 1625-1631 [doi]
- Kernel-level ARINC 653 partitioning for LinuxSanghyun Han, Hyun-Wook Jin. 1632-1637 [doi]
- Using faults for buffer overflow effectsPierre-Alain Fouque, Delphine Leresteux, Frédéric Valette. 1638-1639 [doi]
- Formal security policy models for smart card evaluationsGerd Beuster, Karin Greimel. 1640-1642 [doi]
- PRAM wear-leveling algorithm for hybrid main memory based on data buffering, swapping, and shiftingSung Kyu Park, Hyunchul Seok, Dong-Jae Shin, Kyu Ho Park. 1643-1644 [doi]
- A software development kit to implement integration solutionsRafael Z. Frantz, Rafael Corchuelo. 1647-1652 [doi]
- Enabling personalized visualization of large business processes through parameterizable viewsManfred Reichert, Jens Kolb, Ralph Bobrik, Thomas Bauer. 1653-1660 [doi]
- Extending Enterprise Architecture Modeling Languages: application to telecommunications service creationVanea Chiprianov, Yvon Kermarrec, Siegfried Rouvrais. 1661-1666 [doi]
- Security and safety of assets in business processesGanna Monakova, Achim D. Brucker, Andreas Schaad. 1667-1673 [doi]
- The role of editor in collaborative modelingPeter Rittgen. 1674-1679 [doi]
- Knowledge compilation for automated Team Composition exploiting standard SQLEufemia Tinelli, Simona Colucci, Eugenio Di Sciascio, Francesco M. Donini. 1680-1685 [doi]
- On the support for the assignment of active structure and behavior in enterprise modeling approachesRômulo Henrique Arpini, João Paulo A. Almeida. 1686-1693 [doi]
- Mapping the business model canvas to ArchiMateLucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis, Marten van Sinderen, Henk Jonkers, Dick A. C. Quartel. 1694-1701 [doi]
- Keeping decisions and rationale explicit in business process analysisManoel Sancho da Silva Neto, Renata Mendes de Araujo. 1702-1708 [doi]
- On the exploitation of process mining for security audits: the conformance checking caseRafael Accorsi, Thomas Stocker. 1709-1716 [doi]
- Dynamic guidance enhancement in workflow management systemsChristoph Günther 0002, Stefan Schönig, Stefan Jablonski. 1717-1719 [doi]
- Model transformations for Business-IT alignment: from collaborative business process to SoaML service modelAndrea Delgado, Francisco Ruiz, Ignacio García Rodríguez de Guzmán, Mario Piattini. 1720-1722 [doi]
- Can business process modeling bridge the gap between business and information systems?Liping Zhao, Keletso Letsholo, Erol-Valeriu Chioasca, Sandra de F. Mendes Sampaio, Pedro Sampaio. 1723-1724 [doi]
- Analysis of heuristics to identify crosscutting concerns in business process modelsFabiana Jack Nogueira Santos, Claudia Cappelli, Flávia Maria Santoro, Julio Cesar Sampaio do Prado Leite, Thaís Vasconcelos Batista. 1725-1726 [doi]
- Pattern-based traitsWeiyu Miao, Jeremy G. Siek. 1729-1736 [doi]
- A type system for checking specialization of packages in object-oriented programmingFerruccio Damiani, Arnd Poetzsch-Heffter, Yannick Welsch. 1737-1742 [doi]
- Exploiting regularity of user-defined types to improve precision of program analysesXiaolong Tang, Jaakko Järvi. 1743-1750 [doi]
- Operating system support for dynamic over-provisioning of solid state drivesNikolaus Jeremic, Gero Mühl, Anselm Busse, Jan Richling. 1753-1758 [doi]
- DADS: dynamic and automatic disk schedulingPilar Gonzalez-Ferez, Juan Piernas, Toni Cortes. 1759-1764 [doi]
- Hypervisor-based protection of sensitive files in a compromised systemJunqing Wang, Miao Yu, Bingyu Li, Zhengwei Qi, Haibing Guan. 1765-1770 [doi]
- Implementing distributable real-time threads in the Linux kernel: programming interface and scheduling supportSherif Fadel Fahmy, Binoy Ravindran, E. Douglas Jensen. 1771-1778 [doi]
- Reducing last level cache pollution through OS-level software-controlled region-based partitioningTao Huang, Qi Zhong, Xuetao Guan, Xiaoyin Wang, Xu Cheng, Keyi Wang. 1779-1784 [doi]
- AAGC: an efficient associativity-aware garbage collection scheme for hybrid FTLsBongjae Kim, Minkyu Park, Cheol Jeon, Chang Oan Sung, Yookun Cho, Jiman Hong. 1785-1790 [doi]
- A fast mount mechanism for YAFFS2Jinman Jung, Joonhyouk Jang, Yookun Cho, Hwansoo Han, Gwangil Jeon, Seongje Cho, Minwoo Jang, Jung Y. Kim. 1791-1795 [doi]
- An implementation study of a ghost drive: hidden file store in a filesystemEungyu Lee, Joonwoo Lee, Hyeongseok Kang, Kanghee Kim, Sung-Ryul Kim, Sung Y. Shin. 1796-1798 [doi]
- Real-time flash memory storage with Janus-FTLJongmin Lee, Ahreum Kim, Moonju Park, Jongmoo Choi, Donghee Lee, Sam H. Noh. 1799-1806 [doi]
- Detecting malware signatures in a thin hypervisorYoshihiro Oyama, Tran Truong Duc Giang, Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato. 1807-1814 [doi]
- Off-line (Optimal) multiprocessor scheduling of dependent periodic tasksJulie Baro, Frédéric Boniol, Mikel Cordovilla, Eric Noulard, Claire Pagetti. 1815-1820 [doi]
- HW resource componentizing for smooth migration from single-function ECU to multi-function ECUJong Chan Kim, Kyoung-Soo We, Chang-Gun Lee, Kwei-Jay Lin, Yun Sang Lee. 1821-1828 [doi]
- Hypervisor-based background encryptionYushi Omote, Yosuke Chubachi, Takahiro Shinagawa, Tomohiro Kitamura, Hideki Eiraku, Katsuya Matsubara. 1829-1836 [doi]
- Experiences with client/server interactions in a reservation-based systemLuca Abeni, Tadeus Prastowo. 1837-1839 [doi]
- Reuse of JIT compiled code in JavaScript engineSanghoon Jeon, Jaeyoung Choi. 1840-1842 [doi]
- A genetic scheduler for electric vehicle chargingJunghoon Lee, Hye-Jin Kim, Gyung-Leen Park. 1843-1844 [doi]
- A real-time operating system for manycore systemsChaeseok Im, Minkyu Jeong, Jae Don Lee, SeungWon Lee, Shihwa Lee. 1845-1846 [doi]
- Data sorting in flash memoryChin-Hsien Wu. 1847-1849 [doi]
- Evolution of composition filters to event compositionSomayeh Malakuti, Mehmet Aksit. 1850-1857 [doi]
- Towards a colored reflective Petri-net approach to model self-evolving service-oriented architecturesYing Liu, Walter Cazzola, Bin Zhang. 1858-1865 [doi]
- Superimposing roles for design patterns into application classes by means of aspectsRosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana. 1866-1868 [doi]
- Evaluation of trace inlining heuristics for JavaChristian Häubl, Christian Wimmer, Hanspeter Mössenböck. 1871-1876 [doi]
- Model-Driven Development with eUML-ARCKevin Marth, Shangping Ren. 1877-1882 [doi]
- Programming and deployment of active objects with application-level schedulingBehrooz Nobakht, Frank S. de Boer, Mohammad Mahdi Jaghoori, Rudolf Schlatte. 1883-1888 [doi]
- On computing with typesPaul Tarau, David Haraburda. 1889-1896 [doi]
- Regular corecursion in PrologDavide Ancona. 1897-1902 [doi]
- An imperative language of self-modifying graphs for biological systemsCorrado Priami, Paola Quaglia, Roberto Zunino. 1903-1909 [doi]
- BNF was here: what have we done about the unnecessary diversity of notation for syntactic definitionsVadim Zaytsev. 1910-1915 [doi]
- Copy elimination on data dependence graphsFlorian Brandner, Quentin Colombet. 1916-1918 [doi]
- A comparison of two metacompilation approaches to implementing a complex domain-specific languageDavid Broman, Peter Fritzson, Görel Hedin, Johan Åkesson. 1919-1921 [doi]
- Portable Parallel Programs using architecture-aware librariesFadi A. Zaraket, Mohamad Noureddine, Mohamed Sabra, Ameen Jaber. 1922-1924 [doi]
- Checking the realizability of BPMN 2.0 choreographiesPascal Poizat, Gwen Salaün. 1927-1934 [doi]
- Profile annotation for adaptable Web Service descriptionChiraz El Hog, Raoudha Ben Djemaa, Ikram Amous. 1935-1940 [doi]
- Modelling session types using contractsGiovanni Bernardi, Matthew Hennessy. 1941-1946 [doi]
- An XML-based protocol for improving trust negotiation between Web ServicesYunxi Zhang, Tanko Ishaya. 1947-1954 [doi]
- Specifying and implementing social Web services operation using commitmentsZakaria Maamar, Noura Faci, Michael Luck, Salahdine Hachimi. 1955-1960 [doi]
- Dealing with changes in service orchestrationsLeandro Sales Pinto, Gianpaolo Cugola, Carlo Ghezzi. 1961-1967 [doi]
- Anytime QoS optimization over the PlanGraph for web service compositionYuhong Yan, Min Chen, Yubin Yang. 1968-1975 [doi]
- A flexible approach for service composition using service patternsEmna Fki, Mohamed Jmaiel, Chantal Soulé-Dupuy, Saïd Tazi. 1976-1983 [doi]
- Core BPEL: syntactic simplification of WS-BPEL 2.0Espen Højsgaard, Tim Hallwyl. 1984-1991 [doi]
- A three step based approach for Web Service adaptationYehia Taher, Willem-Jan van den Heuvel, Michael Parkin. 1992-1993 [doi]
- Service-oriented paradigm for analyzing hydrological processesMilan Gocic, Dragan Stojanovic. 1994-1995 [doi]
- Application engineering of service-based software product linesPaulo G. G. Queiroz, Rosana T. V. Braga. 1996-1997 [doi]
- Creating mobile ad hoc workflows with TwitterMartin Treiber, Daniel Schall, Schahram Dustdar, Christian Scherling. 1998-2000 [doi]
- The relation between user intervention and user satisfaction for information recommendationYoshinori Hijikata, Yuki Kai, Shogo Nishida. 2002-2007 [doi]
- Using inferred tag ratings to improve user-based collaborative filteringQi Qi, Zhenyu Chen, Jia Liu, Chengfeng Hui, Qing Wu. 2008-2013 [doi]
- Preference-oriented QoS-based service discovery with dynamic trust and reputation managementZeinab Noorian, Michael Fleming, Stephen Marsh. 2014-2021 [doi]
- An adaptive and Socially-Compliant Trust Management System for virtual communitiesReda Yaich, Olivier Boissier, Philippe Jaillon, Gauthier Picard. 2022-2028 [doi]
- Subjective review-based reputationGianpiero Costantino, Charles Morisset, Marinella Petrocchi. 2029-2034 [doi]
- Analyzing weighting schemes in collaborative filtering: cold start, post cold start and power usersAlan Said, Brijnesh J. Jain, Sahin Albayrak. 2035-2040 [doi]
- Area diversity in computer science collaborationsPramod Divakarmurthy, Ronaldo Menezes. 2041-2042 [doi]
- A provenance approach to assess the quality of geospatial dataJoana G. Malaverri, Claudia Bauzer Medeiros, Rubens Camargo Lamparelli. 2043-2044 [doi]