default search action
Journal of Systems and Software, Volume 86
Volume 86, Number 1, January 2013
- Hans van Vliet:
Signs of a thriving journal. 1 - Ilenia Fronza, Alberto Sillitti, Giancarlo Succi, Mikko Terho, Jelena Vlasenko:
Failure prediction based on log files using Random Indexing and Support Vector Machines. 2-11 - Wan-Shiou Yang, San-Yih Hwang:
iTravel: A recommender system in mobile peer-to-peer environment. 12-20 - Masood Uzzafer:
A simulation model for strategic management process of software projects. 21-37 - Chiu-Mei Chen, Chiao-Min Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images. 38-46 - Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha:
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. 47-59 - Younho Lee, Il-Hee Kim, Yongsu Park:
Improved multi-precision squaring for low-end RISC microcontrollers. 60-71 - Ming Ying, James Miller:
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. 72-88 - Konstantinos N. Vavliakis, Theofanis K. Grollios, Pericles A. Mitkas:
RDOTE - Publishing Relational Databases into the Semantic Web. 89-99 - Cai-Sen Chen, Tao Wang, YingZhan Kou, Xiaocen Chen, Xiong Li:
Improvement of trace-driven I-Cache timing attack on the RSA algorithm. 100-107 - Jose M. Lopez-Vega, Javier Povedano-Molina, Gerardo Pardo-Castellote, Juan M. López-Soler:
A content-aware bridging service for publish/subscribe environments. 108-124 - César Jesús Pardo Calvache, Francisco J. Pino, Félix García, Maria Teresa Baldassarre, Mario Piattini:
From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies. 125-143 - Ali Bou Nassif, Danny Ho, Luiz Fernando Capretz:
Towards an early software estimation using log-linear regression and a multilayer perceptron model. 144-160 - Adrian Fernandez, Silvia Abrahão, Emilio Insfrán:
Empirical validation of a usability inspection method for model-driven Web development. 161-186 - Yajun Du, Yufeng Hai:
Semantic ranking of web pages based on formal concept analysis. 187-197 - Wei-Ming Chen, Sheng-Hao Jhang:
Improving Graph Cuts algorithm to transform sequence of stereo image to depth map. 198-210 - Zhijun Wu, Jin Lei, Di Yao, Minghua Wang, Sarhan M. Musa:
Chaos-based detection of LDoS attacks. 211-221 - Guangyong Gao, Guoping Jiang:
A lossless copyright authentication scheme based on Bessel-Fourier moment and extreme learning machine in curvature-feature domain. 222-232 - Faeze Eshragh, Mehdi Kargahi:
Analytical architecture-based performability evaluation of real-time software systems. 233-246
Volume 86, Number 2, February 2013
- Dong Yan, Syed Zubair Ahmad, Dong Yang:
Matthew effect, ABC analysis and project management of scale-free information systems. 247-254 - Xiangyang Wang, Chunpeng Wang, Hong-Ying Yang, Panpan Niu:
A robust blind color image watermarking in quaternion Fourier transform domain. 255-277 - Jose Manuel Redondo, Francisco Ortin:
Efficient support of dynamic inheritance for class- and prototype-based languages. 278-301 - Xiaomin Zhu, Rong Ge, Jinguang Sun, Chuan He:
3E: Energy-efficient elastic scheduling for independent tasks in heterogeneous computing systems. 302-314 - Zhi-Hui Wang, Chin-Feng Lee, Ching-Yun Chang:
Histogram-shifting-imitated reversible data hiding. 315-323 - Che-Wei Lee, Wen-Hsiang Tsai:
A covert communication method via spreadsheets by secret sharing with a self-authentication capability. 324-334 - Hung-Hsu Tsai, Yen-Shou Lai, Shih-Che Lo:
A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. 335-348 - George Kakarontzas, Eleni Constantinou, Apostolos Ampatzoglou, Ioannis Stamelos:
Layer assessment of object-oriented software: A metric facilitating white-box reuse. 349-366 - Yuebin Bai, Yao Ma, Cheng Luo, Duo Lv, Yuanfeng Peng:
A high performance inter-domain communication approach for virtual machines. 367-376 - Shin Hong, Moonzoo Kim:
Effective pattern-driven concurrency bug detection for operating systems. 377-388 - Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. 389-402 - Rômulo Silva de Oliveira, Andreu Carminati, Renan Augusto Starke:
On using adversary simulators to evaluate global fixed-priority and FPZL scheduling of multiprocessors. 403-411 - Kevin Lano, Shekoufeh Kolahdouz Rahimi:
Constraint-based specification of model transformations. 412-436 - Ming-Chin Chuang, Jeng Farn Lee:
SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. 437-448 - Patricia López Martínez, Laura Barros, José M. Drake:
Design of component-based real-time applications. 449-467 - Yin Yang, Zhi-hu Tan, Jiguang Wan, Changsheng Xie, Jie Yu, Jian He:
A reliability optimization method for RAID-structured storage systems based on active data migration. 468-484 - Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev:
Invertible secret image sharing for gray level and dithered cover images. 485-500 - Kutila Gunasekera, Arkady B. Zaslavsky, Shonali Krishnaswamy, Seng Wai Loke:
Building ubiquitous computing applications using the VERSAG adaptive agent framework. 501-519 - Elena del Val Noguera, Miguel Rebollo, Vicente J. Botti:
Promoting cooperation in service-oriented MAS through social plasticity and incentives. 520-537 - Wilson Rosa, Travis Packard, Abishek Krupanand, James W. Bilbro, Max M. Hodal:
COTS integration and estimation for ERP. 538-550 - Philip Langer, Manuel Wimmer, Petra Brosch, Markus Herrmannsdörfer, Martina Seidl, Konrad Wieland, Gerti Kappel:
A posteriori operation detection in evolving software models. 551-566 - Wei-Jen Yang, Kuo-Liang Chung, Hong-Yuan Mark Liao, Wen-Kuang Yu:
Efficient reversible data hiding algorithm based on gradient-based edge direction prediction. 567-580 - Wei-Kuei Chen:
Image sharing method for gray-level images. 581-585
Volume 86, Number 3, March 2013
- Majdi Abdellatief, Abu Bakar Md Sultan, Abdul Azim Abdul Ghani, Marzanah A. Jabar:
A mapping study to investigate component-based software system metrics. 587-603 - Tseng-Jung Lin, Kuo-Liang Chung, Po-Chun Chang, Yong-Huai Huang, Hong-Yuan Mark Liao, Chiung-Yao Fang:
An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. 604-614 - Fatemeh Nori, Mahmood Deypir, Mohammad Hadi Sadreddini:
A sliding window based algorithm for frequent closed itemset mining over data streams. 615-623 - Pasqualina Potena:
Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff. 624-648 - María del Carmen Suárez Torrente, Ana Belén Martínez Prieto, Darío Álvarez Gutiérrez, M. Elena Alva de Sagastegui:
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website. 649-663 - Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. 664-676 - Michael J. Laszlo, Sumitra Mukherjee:
Optimal univariate microaggregation with data suppression. 677-682 - Andrzej Zalewski, Szymon Kijas:
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems. 683-697 - C. C. F. Pereira Geovandro, Mateus A. S. Santos, Bruno Trevizan de Oliveira, Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Cíntia B. Margi, Wilson Vicente Ruggiero:
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission. 698-706 - Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. 707-715 - Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
A reversible data hiding method by histogram shifting in high quality medical images. 716-727 - Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. 728-743 - Yifeng Luo, Siqiang Luo, Jihong Guan, Shuigeng Zhou:
A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation. 744-750 - Jemal H. Abawajy:
SQLIA detection and prevention approach for RFID systems. 751-758 - Ying-Ho Liu, Chun-Sheng Wang:
Constrained frequent pattern mining on univariate uncertain data. 759-778 - Ya-Han Hu, Tony Cheng-Kui Huang, Yu-Hua Kao:
Knowledge discovery of weighted RFM sequential patterns from customer sequence databases. 779-788 - Jenn-Wei Lin, Jian-Yan Zhuang:
A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks. 789-800 - Chung-Yuan Huang, Chun-Liang Lee, Tzai-Hung Wen, Chuen-Tsai Sun:
A computer virus spreading model based on resource limitations and interaction costs. 801-808 - Marc Chaumont, William Puech, Christian Lahanier:
Securing color information of an image by concealing the color palette. 809-825 - Hongjun Liu, Xingyuan Wang:
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. 826-834 - Mohamed Sellami, Olfa Bouchaala, Walid Gaaloul, Samir Tata:
Communities of Web service registries: Construction and management. 835-853 - Yepang Liu, Chang Xu, Shing-Chi Cheung:
AFChecker: Effective model checking for context-aware adaptive applications. 854-867 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:
Corrigendum to "A variable-length model for masquerade detection" [J. Syst. Softw. 85(2012) 2470-2478]. 868
Volume 86, Number 4, April 2013
- Alessandro Garcia:
Software Engineering in Brazil: Retrospective and prospective views. 869-871 - Paulo Anselmo da Mota Silveira Neto, Joás Sousa Gomes, Eduardo Santana de Almeida, Jair Cavalcanti Leite, Thaís Vasconcelos Batista, Larissa Leite:
25 years of software engineering in Brazil: Beyond an insider's view. 872-889 - Carlos José Pereira de Lucena, Ingrid Nunes:
Contributions to the emergence and consolidation of Agent-oriented Software Engineering. 890-904 - Uirá Kulesza, Sérgio Soares, Christina Chavez, Fernando Castor, Paulo Borba, Carlos José Pereira de Lucena, Paulo César Masiero, Cláudio Sant'Anna, Fabiano Cutigi Ferrari, Vander Alves, Roberta Coelho, Eduardo Figueiredo, Paulo F. Pires, Flávia Coimbra Delicato, Eduardo Piveta, Carla T. L. L. Silva, Valter Vieira de Camargo, Rosana T. V. Braga, Julio Leite, Otávio Lemos, Nabor C. Mendonça, Thaís Vasconcelos Batista, Rodrigo Bonifácio, Nélio Cacho, Lyrene Fernandes da Silva, Arndt von Staa, Fábio Fagundes Silveira, Marco Túlio Valente, Fernanda M. R. Alencar, Jaelson Castro, Ricardo Argenton Ramos, Rosângela A. D. Penteado, Cecília M. F. Rubira:
The crosscutting impact of the AOSD Brazilian research community. 905-933 - Vinicius Humberto Serapilha Durelli, Rodrigo Fraxino Araujo, Marco Aurélio Graciotto Silva, Rafael Alves Paes de Oliveira, José Carlos Maldonado, Márcio Eduardo Delamaro:
A scoping study on the 25 years of research into software testing in Brazil and an outlook on the future of the area. 934-950 - Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Marcelo Medeiros Eler, José Carlos Maldonado, Paulo César Masiero:
Evaluation studies of software testing research in Brazil and in the world: A survey of two premier software engineering conferences. 951-969 - Thelma Elita Colanzi, Silvia Regina Vergilio, Wesley Klewerton Guez Assunção, Aurora T. R. Pozo:
Search Based Software Engineering: Review and analysis of the field in Brazil. 970-984 - Elisa Yumi Nakagawa, Pablo Oliveira Antonino, Martin Becker, José Carlos Maldonado, Holger Storf, Karina Villela, H. Dieter Rombach:
Relevance and perspectives of AAL in Brazil. 985-996 - Luciane Telinski Wiedermann Agner, Inali Wisniewski Soares, Paulo Cézar Stadzisz, Jean Marcelo Simão:
A Brazilian survey on UML and model-driven practices for embedded software development. 997-1005 - Gustavo Soares, Rohit Gheyi, Emerson R. Murphy-Hill, Brittany Johnson:
Comparing approaches to analyze refactoring activity on software repositories. 1006-1022 - Marcelo de Almeida Maia, Raquel Fialho de Queiroz Lafetá:
On the impact of trace-based feature location in the performance of software maintainers. 1023-1037 - Leopoldo Teixeira, Paulo Borba, Rohit Gheyi:
Safe composition of configuration knowledge-based software product lines. 1038-1053
- Darja Smite, Claes Wohlin, Aybüke Aurum, Ronald Jabangwe, Emil Numminen:
Offshore insourcing in software development: Structuring the decision-making process. 1054-1067 - Xiaotian Wu, Wei Sun:
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. 1068-1088 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Petri net based techniques for constructing reliable service composition. 1089-1106 - Saad Liaquat Kiani, Ashiq Anjum, Michael Knappmeyer, Nik Bessis, Nikolaos Antonopoulos:
Federated broker system for pervasive context provisioning. 1107-1123 - Christian Raspotnig, Andreas L. Opdahl:
Comparing risk identification techniques for safety and security requirements. 1124-1151
Volume 86, Number 5, May 2013
- Julio Ariel Hurtado Alegria, María Cecilia Bastarrica, Sergio F. Ochoa, Jocelyn Simmonds:
MDE software process lines in small companies. 1153-1171 - Iuri Santos Souza, Gecynalda Soares da Silva Gomes, Paulo Anselmo da Mota Silveira Neto, Ivan do Carmo Machado, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
Evidence of software inspection on feature specification for software product lines. 1172-1190 - Ankur Pachauri, Gursaran Srivastava:
Automated test data generation for branch testing using genetic algorithm: An improved approach using branch ordering, memory and elitism. 1191-1208 - Mohammad Saeed Abou Trab, Michael J. Brockway, Steve Counsell, Robert M. Hierons:
Testing Real-Time Embedded Systems using Timed Automata based approaches. 1209-1223 - Ya-Han Hu, Fan Wu, Yi-Jiun Liao:
An efficient tree-based algorithm for mining sequential patterns with multiple minimum supports. 1224-1238 - Eduardo Martins Guerra, Felipe Alves, Uirá Kulesza, Clovis Torres Fernandes:
A reference architecture for organizing the internal structure of metadata-based frameworks. 1239-1256 - Dingyu Yang, Jian Cao, Jiwen Fu, Jie Wang, Jianmei Guo:
A pattern fusion model for multi-step-ahead CPU load prediction. 1257-1266 - Tzung-Her Chen, Yao-Sheng Lee, Wei-Lun Huang, Justie Su-tzu Juan, Ying-Yu Chen, Ming-Jheng Li:
Quality-adaptive visual secret sharing by random grids. 1267-1274 - Darko Durisic, Martin Nilsson, Miroslaw Staron, Jörgen Hansson:
Measuring the impact of changes to the complexity and coupling properties of automotive software systems. 1275-1293 - Konstantinos Manikas, Klaus Marius Hansen:
Software ecosystems - A systematic literature review. 1294-1306 - Qing Gu, Félix Cuadrado, Patricia Lago, Juan C. Dueñas:
3D architecture viewpoints on service automation. 1307-1322 - Hyung-Ju Cho:
Continuous range k-nearest neighbor queries in vehicular ad hoc networks. 1323-1332 - Maya Daneva, Egbert van der Veen, Chintan Amrit, Smita Ghaisas, Klaas Sikkel, Ramesh Kumar, Nirav Ajmeri, Uday Ramteerthkar, Roel J. Wieringa:
Agile requirements prioritization in large-scale outsourced system projects: An empirical study. 1333-1353 - Vahid Garousi, Junji Zhi:
A survey of software testing practices in Canada. 1354-1376 - Jeanne Chen, Chih-Wei Shiu, Mei-Chen Wu:
An improvement of diamond encoding using characteristic value positioning and modulus function. 1377-1383 - Qiuzhen Lin, Kwok-Wo Wong, Jianyong Chen:
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. 1384-1389 - Henry Edison, Nauman Bin Ali, Richard Torkar:
Towards innovation measurement in the software industry. 1390-1407 - Liang Huai Yang, Jian Zhou, Weihua Gong, Jiakui Zhao, Lijun Chen:
Lifetime and QoS-aware energy-saving buffering schemes. 1408-1425 - Licia Sbattella, Roberto Tedesco:
A novel semantic information retrieval system based on a three-level domain model. 1426-1452 - Jamie Y. T. Chang, Eric T. G. Wang, James J. Jiang, Gary Klein:
Controlling ERP consultants: Client and provider practices. 1453-1461 - Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. 1462-1463
Volume 86, Number 6, June 2013
- Nameer N. El-Emam, Rasheed Abdul Shaheed Al-Zubidy:
New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. 1465-1481 - Santiago A. Vidal, Claudia A. Marcos:
Toward automated refactoring of crosscutting concerns into aspects. 1482-1497 - Edith Tom, Aybüke Aurum, Richard T. Vidgen:
An exploration of technical debt. 1498-1516 - Carlos R. Rivero, Inma Hernández, David Ruiz, Rafael Corchuelo:
MostoDE: A tool to exchange data amongst semantic-web ontologies. 1517-1529 - Azlan B. Ismail, Jun Yan, Jun Shen:
Incremental service level agreements violation handling with time impact analysis. 1530-1544 - Uwe van Heesch, Paris Avgeriou, Antony Tang:
Does decision documentation help junior designers rationalize their decisions? A comparative multiple-case study. 1545-1565 - Georgios Kellaris, Nikos Pelekis, Yannis Theodoridis:
Map-matched trajectory compression. 1566-1579 - Md. Saiful Islam, Chengfei Liu, Rui Zhou:
A framework for query refinement with user feedback. 1580-1595 - Charalabos Skianis:
Introducing automated procedures in 3G network planning and optimization. 1596-1602 - Chun-Sheng Wang, Ying-Ho Liu, Kuo-Chung Chu:
Closed inter-sequence pattern mining. 1603-1612 - Domenico Cotroneo, Roberto Pietrantuono, Stefano Russo:
Testing techniques selection based on ODC fault types and software metrics. 1613-1637 - Baiying Lei, Insu Song, Shah Atiqur Rahman:
Robust and secure watermarking scheme for breath sound. 1638-1649 - Jaime Chen, Manuel Díaz, Bartolomé Rubio, José M. Troya:
PS-QUASAR: A publish/subscribe QoS aware middleware for Wireless Sensor and Actor Networks. 1650-1662 - Dragan Stankovic, Vesna Nikolic, Miodrag Djordjevic, Dac-Buu Cao:
A survey study of critical success factors in agile software projects in former Yugoslavia IT companies. 1663-1678 - Fangda Wang, Hongzhi Wang, Jianzhong Li, Hong Gao:
Graph-based reference table construction to facilitate entity matching. 1679-1688 - Ejike Ofuonye, James Miller:
Securing web-clients with instrumented code and dynamic runtime monitoring. 1689-1711 - Guy Martin Tchamgoue, Kyong Hoon Kim, Yong-Kee Jun, Wan Yeon Lee:
Compositional real-time scheduling framework for periodic reward-based task model. 1712-1724
Volume 86, Number 7, July 2013
- Jianming Yong, Weiming Shen, Anne E. James:
Collaborative computing technologies and systems. 1725-1726 - Lu Xiao:
The effects of a shared free form rationale space in collaborative learning activities. 1727-1737 - Mamoun Nawahdah, Tomoo Inoue:
Setting the best view of a virtual teacher in a mixed reality physical-task learning support system. 1738-1750 - José A. Rodrigues Nt., Luiz Fernando Cardoso Tomaz, Jano Moreira de Souza, Geraldo Xexéo:
Bringing knowledge into recommender systems. 1751-1758 - Crescencio Bravo, Rafael Duque, Jesús Gallardo:
A groupware system to support collaborative programming: Design and experiences. 1759-1771 - Ana I. Molina, Jesús Gallardo, Miguel A. Redondo, Manuel Ortega, William J. Giraldo:
Metamodel-driven definition of a visual modeling language for specifying interactive groupware applications: An empirical study. 1772-1789 - Zhe Sun, Jun Shen:
A high performance peer to cloud and peer model augmented with hierarchical secure communications. 1790-1796 - Charles V. Trappey, Amy J. C. Trappey, Gilbert Y. P. Lin, Wang-Tsang Lee, Ta-Hui Yang:
SETZ logistics models and system framework for manufacturing and exporting large engineering assets. 1797-1805 - Jinghui Zhang, Junzhou Luo, Fang Dong:
Scheduling of scientific workflow in non-dedicated heterogeneous multicluster platform. 1806-1818 - Victor Ströele A. Menezes, Geraldo Zimbrão, Jano M. Souza:
Group and link analysis of multi-relational scientific social networks. 1819-1830
- Anil Kumar Thurimella, Bernd Brügge:
A mixed-method approach for the empirical evaluation of the issue-based variability modeling. 1831-1849 - Yufei Ren, Tan Li, Dantong Yu, Shudong Jin, Thomas G. Robertazzi:
Design and testbed evaluation of RDMA-based middleware for high-performance data transfer applications. 1850-1863 - Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. 1864-1878 - Ekrem Kocaguneli, Tim Menzies:
Software effort models should be assessed via leave-one-out validation. 1879-1890 - Wenpin Jiao, Yanchun Sun:
Supporting adaptation of decentralized software based on application scenarios. 1891-1906 - José Luis González, Jesús Carretero Pérez, Victor Sosa-Sosa, Juan F. Rodriguez Cardoso, Ricardo Marcelín-Jiménez:
An approach for constructing private storage services as a unified fault-tolerant system. 1907-1922 - Ayman A. Amin, Lars Grunske, Alan Colman:
An approach to software reliability prediction based on time series modeling. 1923-1932 - Jong-Yih Kuo, Fu-Chu Huang, Shang-Pin Ma, Yong-Yi Fanjiang:
Applying hybrid learning approach to RoboCup's strategy. 1933-1944 - Apostolos Ampatzoglou, Sofia Charalampidou, Ioannis Stamelos:
Research state of the art on GoF design patterns: A mapping study. 1945-1964 - Kan Wang, Zhe-Ming Lu, Yongjian Hu:
A high capacity lossless data hiding scheme for JPEG images. 1965-1975
Volume 86, Number 8, August 2013
- Antonia Bertolino, Howard Foster, J. Jenny Li, Hong Zhu:
Special section on automation of software test. 1977 - Saswat Anand, Edmund K. Burke, Tsong Yueh Chen, John A. Clark, Myra B. Cohen, Wolfgang Grieskamp, Mark Harman, Mary Jean Harrold, Phil McMinn:
An orchestrated survey of methodologies for automated software test case generation. 1978-2001 - Gary Kaminski, Paul Ammann, Jeff Offutt:
Improving logic-based testing. 2002-2012 - Giuseppe Di Guglielmo, Luigi Di Guglielmo, Andreas Foltinek, Masahiro Fujita, Franco Fummi, Cristina Marconcini, Graziano Pravadelli:
On the integration of model-driven design and dynamic assertion-based verification for embedded software. 2013-2033
- Jian Du, Jing Lu, Dong Wu, Huiping Li, Jie Li:
User acceptance of software as a service: Evidence from customers of China's leading e-commerce company, Alibaba. 2034-2044 - Rashid Naseem, Onaiza Maqbool, Siraj Muhammad:
Cooperative clustering for software modularization. 2045-2062 - Roberto Gallo, Henrique Kawakami, Ricardo Dahab:
FORTUNA - A framework for the design and development of hardware-based secure systems. 2063-2076 - Yixin Bian, Günes Koru, Xiaohong Su, Peijun Ma:
SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones. 2077-2093 - Teng Guo, Feng Liu, Chuan Kun Wu:
Threshold visual secret sharing by random grids with improved contrast. 2094-2109 - Marco Torchiano, Federico Tomassetti, Filippo Ricca, Alessandro Tiso, Gianna Reggio:
Relevance, benefits, and problems of software modelling and model driven techniques - A survey in the Italian industry. 2110-2126 - G. G. Md. Nawaz Ali, Edward Chan, Wenzhong Li:
Supporting real-time multiple data items query in multi-RSU vehicular ad hoc networks (VANETs). 2127-2142 - Yuan-Hsin Tung, Shian-Shyong Tseng:
A novel approach to collaborative testing in a crowdsourcing environment. 2143-2153 - Seonah Lee, Sungwon Kang:
Clustering navigation sequences to create contexts for guiding code navigation. 2154-2165 - Yongjian Hu, Kan Wang, Zhe-Ming Lu:
An improved VLC-based lossless data hiding scheme for JPEG images. 2166-2173 - Yunxia Liu, Zhitang Li, Xiaojing Ma, Jian Liu:
A robust data hiding algorithm for H.264/AVC video streams. 2174-2183 - Nergiz Ercil Cagiltay, Gül Tokdemir, Özkan Kiliç, Damla Topalli:
Performing and analyzing non-formal inspections of entity relationship diagram (ERD). 2184-2195 - Huan-Jyh Shyur, Chichang Jou, Keng Chang:
A data mining approach to discovering reliable sequential patterns. 2196-2203 - Hon Yin Leung, Lee-Ming Cheng, Fang Liu, Q. K. Fu:
Adaptive reversible data hiding based on block median preservation and modification of prediction errors. 2204-2219
Volume 86, Number 9, September 2013
- Rami Bahsoon, Ivan Mistrík, Nour Ali, T. S. Mohan, Nenad Medvidovic:
The future of software engineering IN and FOR the cloud. 2221-2224 - Mark Harman, Kiran Lakhotia, Jeremy Singer, David Robert White, Shin Yoo:
Cloud engineering is Search Based Software Engineering too. 2225-2241 - Lawrence Chung, Tom Hill, Owolabi Legunsen, Zhenzhou Sun, Adip Dsouza, Sam Supakkul:
A goal-oriented simulation approach for obtaining good private cloud-based system architectures. 2242-2262 - Mark Dermot Ryan:
Cloud computing security: The scientific challenge, and a survey of solutions. 2263-2268 - Moustafa Noureddine, Rabih Bashroush:
An authentication model towards cloud federation in the enterprise. 2269-2275 - Haralambos Mouratidis, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis:
A framework to support selection of cloud providers based on security and privacy requirements. 2276-2293 - Joaquín Guillén, Javier Miranda, Juan Manuel Murillo, Carlos Canal:
A service-oriented framework for developing cross cloud migratable software. 2294-2308 - Luís A. Bastião Silva, Carlos Costa, José Luís Oliveira:
A common API for delivering services over multi-vendor cloud resources. 2309-2317 - Tommi Mikkonen, Antero Taivalsaari:
Cloud computing and its impact on mobile software development: Two roads diverged. 2318-2320 - José Luis Vázquez-Poletti, Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo, Ignacio Martín Llorente:
Solidifying the foundations of the cloud for the next generation Software Engineering. 2321-2326 - Judith Bishop:
Industry's role in data and software curation in the cloud. 2327-2329 - Ian Sommerville:
Teaching cloud computing: A software engineering perspective. 2330-2332
- Alberto Costa Neto, Rodrigo Bonifácio, Márcio Ribeiro, Carlos Eduardo Pontual, Paulo Borba, Fernando Castor:
A design rule language for aspect-oriented programming. 2333-2356 - Matteo Golfarelli, Stefano Rizzi, Elisa Turricchia:
Multi-sprint planning and smooth replanning: An optimization model. 2357-2370 - Zheng Li, He Zhang, Liam O'Brien, Rainbow Cai, Shayne Flint:
On evaluating commercial Cloud services: A systematic review. 2371-2393 - María Gómez, Jorge Cervantes:
User Interface Transition Diagrams for customer-developer communication improvement in software development projects. 2394-2410 - Dejan Baca, Kai Petersen:
Countermeasure graphs for software security risk assessment: An action research. 2411-2428 - Sohrab Behnia, Amir Akhavan, Afshin Akhshani, Azman Samsudin:
Image encryption based on the Jacobian elliptic maps. 2429-2438 - Carlo Blundo, Angelo De Caro, Clemente Galdi, Giuseppe Persiano:
Certified Information Access. 2439-2450 - Marjan Mernik:
An object-oriented approach to language compositions for software language engineering. 2451-2464
Volume 86, Number 10, October 2013
- Lars Grunske, Aldeida Aleti:
Quality optimisation of software architectures and design specifications. 2465-2466 - Martin Walker, Mark-Oliver Reiser, Sara Tucci Piergiovanni, Yiannis Papadopoulos, Henrik Lönn, Chokri Mraidha, David Parker, De-Jiu Chen, David Servat:
Automatic optimisation of system architectures using EAST-ADL. 2467-2487 - Simon Struck, Matthias Güdemann, Frank Ortmeier:
Efficient optimization of large probabilistic models. 2488-2501 - Arjan J. de Roo, Hasan Sözer, Lodewijk Bergmans, Mehmet Aksit:
MOO: An architectural framework for runtime optimization of multiple system objectives in embedded control software. 2502-2519 - Turgay Çelik, Bedir Tekinerdogan:
S-IDE: A tool framework for optimizing deployment architecture of High Level Architecture based simulation systems. 2520-2541 - Anne Koziolek, Danilo Ardagna, Raffaela Mirandola:
Hybrid multi-attribute QoS optimization in component based software systems. 2542-2558 - Ramin Etemaadi, Kenneth Lind, Rogardt Heldal, Michel R. V. Chaudron:
Quality-driven optimization of system architecture: Industrial case study on an automotive sub-system. 2559-2573
- Akram Hakiri, Pascal Berthou, Aniruddha S. Gokhale, Douglas C. Schmidt, Thierry Gayraud:
Supporting end-to-end quality of service properties in OMG data distribution service publish/subscribe middleware over wide area networks. 2574-2593 - Claes Wohlin, Per Runeson, Paulo Anselmo da Mota Silveira Neto, Emelie Engström, Ivan do Carmo Machado, Eduardo Santana de Almeida:
On the reliability of mapping studies in software engineering. 2594-2610 - Yiwen Zhang, Rui-feng Guo:
Power-aware scheduling algorithms for sporadic tasks in real-time systems. 2611-2619 - Xianyi Chen, Xingming Sun, Huiyu Sun, Zhili Zhou, Jianjun Zhang:
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. 2620-2626 - Sujesha Sudevalayam, Purushottam Kulkarni:
Affinity-aware modeling of CPU usage with communicating virtual machines. 2627-2638 - Aiko Yamashita, Steve Counsell:
Code smells as system-level indicators of maintainability: An empirical study. 2639-2653 - Dima Alhadidi, Azzam Mourad, Hakim Idrissi Kaitouni, Mourad Debbabi:
Common weaving approach in mainstream languages for software security hardening. 2654-2674 - Christiane Gresse von Wangenheim, Rafael Savi, Adriano Ferreti Borgatto:
SCRUMIA - An educational game for teaching SCRUM in computing courses. 2675-2687 - Shih-Lin Wu, Jen-Jee Chen, Wen-Chiang Chou:
Cell-related location area planning for 4G PCS networks with variable-order Markov model. 2688-2699 - Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Reversible data hiding based on PDE predictor. 2700-2709
Volume 86, Number 11, November 2013
- Ibrahim S. Abdullah, Daniel A. Menascé:
The Meta-Protocol framework. 2711-2724 - Diana Borrego, María Teresa Gómez-López, Rafael M. Gasca:
Minimizing test-point allocation to improve diagnosability in business process models. 2725-2741 - Khurram Jawad, Asifullah Khan:
Genetic algorithm and difference expansion based reversible watermarking for relational databases. 2742-2753 - Tolga Ovatman, Feza Buzluca:
Model-based cache-aware dispatching of object-oriented software for multicore systems. 2754-2770 - Zhi-Hui Wang, Hai-Rui Yang, Ting-Fang Cheng, Chin-Chen Chang:
A high-performance reversible data-hiding scheme for LZW codes. 2771-2778 - André Felipe Almeida Monteiro, Marcus Vinicius Azevedo, Alexandre Sztajnberg:
Virtualized Web server cluster self-configuration to optimize resource and power use. 2779-2796 - Joakim Pernstål, Robert Feldt, Tony Gorschek:
The lean gap: A review of lean approaches to large-scale software systems development. 2797-2821 - Chien-Cheng Huang, Feng-Yu Lin, Frank Yeong-Sung Lin, Yeali S. Sun:
A novel approach to evaluate software vulnerability prioritization. 2822-2840 - Qingqi Pei, Xiang Wang, Yuan Li, Hui Li:
Adaptive reversible watermarking with improved embedding capacity. 2841-2848 - Manjula Peiris, James H. Hill:
Adapting system execution traces to support analysis of software system performance properties. 2849-2862 - Zhibin Pan, Xiaoxiao Ma, Xiaoman Deng, Sen Hu:
Low bit-rate information hiding method based on search-order-coding technique. 2863-2869 - Kuang-Shyr Wu, Jen-Chun Lee, Tsung-Ming Lo, Ko-Chin Chang, Chien-Ping Chang:
A secure palm vein recognition system. 2870-2876 - Abbas Tahir, Davide Tosi, Sandro Morasca:
A systematic review on the functional testing of semantic web services. 2877-2889 - José Ramón Hoyos, Jesús García Molina, Juan A. Botía:
A domain-specific language for context modeling in context-aware systems. 2890-2905 - Víctor M. Prieto, Manuel Álvarez, Fidel Cacheda:
SAAD, a content based Web Spam Analyzer and Detector. 2906-2918 - Surafel Lemma Abebe, Anita Alicante, Anna Corazza, Paolo Tonella:
Supporting concept location through identifier parsing and ontology extraction. 2919-2938 - Raffaele Conforti, Marcello La Rosa, Giancarlo Fortino, Arthur H. M. ter Hofstede, Jan Recker, Michael Adams:
Real-time risk monitoring in business processes: A sensor-based approach. 2939-2965
Volume 86, Number 12, December 2013
- Marco Brambilla, Cinzia Cappiello, Irene Garrigós, Jose-Norberto Mazón, Santiago Meliá:
Introduction to the JSS special issue of Web 2.0 engineering: New practices and emerging Challenges. 2967-2969 - Carlos Guerrero, Isaac Lera, Carlos Juiz:
Performance improvement of web caching in Web 2.0 via knowledge discovery. 2970-2980 - José María Conejero, Roberto Rodríguez-Echeverría, Fernando Sánchez-Figueroa, Marino Linaje Trigueros, Juan Carlos Preciado, Pedro J. Clemente:
Re-engineering legacy Web applications into RIAs by aligning modernization requirements, patterns and RIA features. 2981-2994 - Marios Belk, Efi Papatheocharous, Panagiotis Germanakos, George Samaras:
Modeling users on the World Wide Web based on cognitive factors, navigation behavior and clustering techniques. 2995-3012 - José Luis Herrero Agustín, Pablo Carmona del Barco:
A model-driven approach to develop high performance web applications. 3013-3023 - M. José Escalona, Matias Urbieta, Gustavo Rossi, J. A. García-García, Esteban Robles Luna:
Detecting Web requirements conflicts and inconsistencies under a model-based perspective. 3024-3038 - Tihomir Orehovacki, Andrina Granic, Dragutin Kermek:
Evaluating the perceived and estimated quality in use of Web 2.0 applications. 3039-3059
- Zheng Li, Li Wang, Shuhui Li, Shangping Ren, Gang Quan:
Reliability guaranteed energy-aware frame-based task set execution strategy for hard real-time systems. 3060-3070 - Andrey Maglyas, Uolevi Nikula, Kari Smolander:
What are the roles of software product managers? An empirical investigation. 3071-3090 - Çigdem Gencel, Kai Petersen, Aftab Ahmad Mughal, Muhammad Imran Iqbal:
A decision support framework for metrics selection in goal-based measurement programs: GQM-DSFMS. 3091-3108 - Laura M. Castro, Miguel A. Francisco:
A language-independent approach to black-box testing using Erlang as test specification language. 3109-3122 - Matheus Carvalho Viana, Rosângela Aparecida Dellosso Penteado, Antônio Francisco do Prado:
Domain-Specific Modeling Languages to improve framework instantiation. 3123-3139 - Neeraj Parolia, James J. Jiang, Gary Klein:
The presence and development of competency in IT programs. 3140-3150 - David Ruano-Ordás, Jorge Fdez-Glez, Florentino Fdez-Riverola, José Ramón Méndez:
Effective scheduling strategies for boosting performance on rule-based spam filtering frameworks. 3151-3161 - Tosin Daniel Oyetoyan, Daniela S. Cruzes, Reidar Conradi:
A study of cyclic dependencies on defect profile of software components. 3162-3182 - Oi-Yan Lui, Kwok-Wo Wong:
Chaos-based selective encryption for H.264/AVC. 3183-3192 - Jooyoung Seo, Byoungju Choi, Sihyun Lee:
Software generated device exception for more intensive device-related software testing: An industrial field study. 3193-3212
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.