default search action
Journal of Software, Volume 10
Volume 10, Number 1, January 2015
- Jinbo Tan:
An Improved Approach to Term Weighting in Hierarchical Web Page Classification. 1-8 - Xuyang Wei, Zhongliang Li, Tengfei Zhou, Haoran Zhang, Guocai Yang:
IWFPM: Interested Weighted Frequent Pattern Mining with Multiple Supports. 9-19 - Yangyang Wu, Siying Wu, Duansheng Chen:
Chinese-English Bilingual Word Semantic Similarity Based on Chinese WordNet. 20-31 - Saad Masood Butt, Shahid Masood Butt, Azura Onn, Nadra Tabassam, Mazlina Abdul Majid:
Usability Evaluation Techniques for Agile Software Model. 32-41 - Abdullah Alqahtani, Haiyan Lu, Jie Lu:
Sensitivity Level-Based Citizen Personal Information Model for Privacy Protection. 42-55 - Chuanlin Huang, Zhiqiu Huang, Jun Hu, Zhipeng Wu, Siqi Wang:
A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram. 56-70 - Qiuyue Zhao, Wanli Zuo, Zhongsheng Tian, Xin Wang, Ying Wang:
Predicting Trust Relationships in Social Networks Based on WKNN. 71-81 - Chun-Ming Yang, Neng-Yih Shin, Ming-Wei Weng, Chang-Hsien Hsu:
Using a Two-Dimensional Mean Value Matrix (TDMVM) to Improve Users' Satisfaction with Government e-Recruitment Website. 82-93 - Xinquan Chen:
The Shortest Path Algorithms of Hypergraphs Based on Search Strategies. 94-105 - Cheng Wang, Meng Yang, Xuemin Liu, Gang Yang:
Realistic Simulation for Rainy Scene. 106-115
Volume 10, Number 2, February 2015
- Xiaochao Li, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo:
On the Security Analysis of PBKDF2 in OpenOffice. 116-126 - Teng Huang, Zhizhong Ding, Younan Duan, Yin Chen, Lu Ding:
A Simplified and Efficient LTE RRC Conformance Testing Adapter. 127-141 - Xiaowen Chen, Zhonghai Lu, Axel Jantsch, Shuming Chen, Yang Guo, Shenggang Chen, Hu Chen, Man Liao:
Command-Triggered Microcode Execution for Distributed Shared Memory Based Multi-Core Network-on-Chips. 142-161 - Liang Zhu, Quanlong Lei, Guang Liu, Feifei Liu:
Processing Recommender Top-N Queries in Relational Databases. 162-171 - Yongming Wang, Shuai Xia:
Research on the Key Techniques of Rotary Bearing Man-hour Ration Management System. 172-179 - Haiyan Liu, Yanyan Liu, Zenggang Xiong, Zhen Yu, Kun Tian:
Study and Application of Urban Flood Risk Map Information Management System Based on SOA. 180-189 - Changyue Shi, Xiaolin Qin, Li Wang:
Continuous Skyline Queries for Moving Objects in Road Networks. 190-200 - Haibin Zhang, Siliang Lu, Shangbin Zhang, Fanrang Kong:
A Data-Collection and Fault Diagnosis System of Train Bearing Based on the C# and Multi-Wireless-Terminal. 201-212 - Jiaji Wang, Rangding Wang, Dawen Xu, Wei Li:
An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode. 213-221
Volume 10, Number 3, March 2015
- M'hamed Rahmouni, Samir Mbarki:
MDA-Based Modeling and Transformation to Generate N-Tiers Web Models. 222-238 - Khosrow Amirizadeh, Mandava Rajeswari:
Accelerated -Greedy Multi Armed Bandit Algorithm for Online Sequential-Selections Applications. 239-249 - Anshul Verma, K. K. Pattanaik:
Multi-Agent Communication Based Train Control System for Indian Railways: The Structural Design. 250-259 - Feda AlShahwan, Maha Faisal, Mehmet Hakan Karaata, Mazin Alshamrani:
RESTful-Based Bi-level Distribution Framework for Context-Based Mobile Web Service Provision. 260-287 - Marcelo Luiz Monteiro Marinho, Suzana Cândido de Barros Sampaio, Telma Lúcia de Andrade Lima, Hermano Perrelli de Moura:
Uncertainty Management in Software Projects. 288-303 - Wellington Moreira de Oliveira, Jugurta Lisboa Filho, Alcione P. Oliveira, Wagner Dias de Souza, Lucas F. M. Vegi, João Ricardo M. Oliveira:
Building a Thematic Spatial Data Infrastructure and Situation-Aware for Global Events. 304-316 - Fraihat Salam, Qusai Shambour:
A Framework of Semantic Recommender System for e-Learning. 317-330 - Wenhui Zhang, Feng Guo, Zhian Lin, Yanhao Zhang, Jiming Lin, Xinxiang Wei:
Real-Time Visual Animation of Explosions. 331-343 - Christian Eichmann, Carsten Müller:
Team Formation Based on Nature-Inspired Swarm Intelligence. 344-354 - Carsten Mueller, Anton Pohl:
Plugin for Visual Paradigm for Generating and Intelligent Optimization of a Component Diagram Based on Attributes in the Class Diagram. 355-365 - Ana Milena Páez Quintero, Ricardo Llamosa-Villalba, Edgar Sneyder García Morantes:
Integral Architecture for Organizational Systems Arquetipos. 366-373 - Fariha Motherudin, Noor Ezleen Md. Moksen:
A Proposed Model for Code Quality Maturity Model. 374-383
Volume 10, Number 4, April 2015
- Ayoub Oudani, Mohamed Bahaj, Ilias Cherti:
Creating an RDF Graph from a Relational Database Using SPARQL. 384-391 - Changri Luo, Tingting He, Xinhua Zhang, Zibo Zhou:
Learning Forum Posts Topic Discovery and Its Application in Recommendation System. 392-402 - Yi Ouyang, Yun Ling:
A Novel on-Line Tracking Method Based on Superpixels Cliques. 403-415 - Qun Liu, Xiaobing Li:
A New Parallel Item-Based Collaborative Filtering Algorithm Based on Hadoop. 416-426 - Iyad AlAgha, Raed Rasheed:
An Exploratory Study of 3D Interaction Techniques in Augmented Reality Environments. 427-440 - Linda Badri, Mourad Badri, Nicolas Joly:
Towards a Change Impact Analysis Model for Java Programs: An Empirical Evaluation. 441-453 - Abdulrahman Almuhareb, Waleed A. Almutairi, Haya Al-Tuwaijri, Abdulelah Almubarak, Marwa Khan:
Recognition of Modern Arabic Poems. 454-464 - Morteza Ghasemi, Sayed Mehran Sharafi, Ala Arman:
Towards an Analytical Approach to Measure Modularity in Software Architecture Design. 465-479 - Kui Liu, Zhurong Zhou, Qianguo Chen, Xiaoli Yang:
Towards a RBAC Workflow Model for Thesis Management. 480-490 - Xiaohong Yuan, Emmanuel Borkor Nuakoh, Imano Williams, Huiming Yu:
Developing Abuse Cases Based on Threat Modeling and Attack Patterns. 491-498
Volume 10, Number 5, May 2015
- Razib Hayat Khan, Poul E. Heegaard:
Software Performance Evaluation Utilizing UML Specification and SRN Model and Their Formal Representation. 499-523 - Fahad Algarni, Yen Cheung, Vincent C. S. Lee, Azmat Ullah:
Customer Satisfaction: Moderator of e-Business Performance and e-Business Liveability. 524-537 - Dayan Shangguan, Xintong Li:
Chess Game System on Smart Mobile Terminal. 538-550 - Zetao Jiang, Chuan Guo, Yang Yang:
A Coarse-to-Fine Registration Method Based on Geometric Constraints and Parallel Architecture. 551-565 - Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Debugging in Parallel or Sequential: An Empirical Study. 566-576 - Radhi Rafiee Afandi, Waidah Ismail, Azlan Husin, Rosline Hassan:
Leukemia Medical Application with Security Features. 577-598 - Rinky Dwivedi, Daya Gupta:
A Complete Method Configuration Process for Configuring Project-Specific Methods. 599-615 - Yila Su, Huimin Li, Fei Wang:
The Semantic Annotation Based on Mongolian Place Recognition. 616-627 - Asif Qumer Gill, Muhammad Atif Qureshi:
Adaptive Enterprise Architecture Modelling. 628-638 - Emanuel S. Grant:
A Model-Driven Case Study of Developing a Complex Domain-Specific System. 639-649 - Yifan Yuan, Somjai Boonsiri:
Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach. 650-658
Volume 10, Number 6, June 2015
- O. Cyril Mathew, A. M. J. Md. Zubair Rahman:
A Novel Honeycomb Routing Approach for Bandwidth Utilization in MANET. 659-669 - R. Sampath, A. Saradha:
Alzheimer's Disease Image Segmentation with Self-Organizing Map Network. 670-680 - Yehia Ibrahim Alzoubi, Asif Qumer Gill, Ahmed Al-Ani:
Distributed Agile Development Communication: An Agile Architecture Driven Framework. 681-694 - Hongfeng Zhang, Vincent Y. Liu, Yu Zhao:
Biocloud: A Systemic Review and Classification. 695-712 - Chamundeswari Arumugam, Chitra Babu:
Test Size Estimation for Object Oriented Software Based on Analysis Model. 713-729 - A. Siva Sangari, J. Martin Leo Manickam:
Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption. 730-738 - Shunsuke Kanda, Kazuhiro Morita, Masao Fuketa, Jun-Ichi Aoe:
Experimental Observations of Construction Methods for Double Array Structures Using Linear Functions. 739-747 - Tadashi Ogino:
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus. 748-756 - Ezgi Erturk, Ebru Akcapinar Sezer:
Software Fault Inference Based on Expert Opinion. 757-766 - Su-Hong Eom, Ki-Sun Song, Shin-Yoon Kang, Eung-Hyuk Lee:
Development of a Sensor Module for Estimating the Center of Pressure in Low Cost Gait Rehabilitation Robots. 767-774 - Kazuhiro Morita, Masao Fuketa, Jun-ichi Aoe:
A Method of Music Retrieval Using Impression Keywords. 775-783
Volume 10, Number 7, July 2015
- Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:
A Metamodel for Hybrid Access Control Policies. 784-797 - Yinlong Liu, Yong Wang:
A Study on Software Development Month Effort. 798-804 - Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri:
E-Government Portals Maturity Models: A Best Practices' Coverage Perspective. 805-824 - Yanan Li, Zhengyu Zhu:
A Fast Method of Detecting Overlapping Community in Network Based on LFM. 825-834 - Zijie Jiang, Zhongliang Cai, Hui Zhou, Nian Hui:
Design and Implementation of Mobile Electronic Nautical Chart Information System Based on IOS. 835-841 - Marcelo Carvalho Fernandes, Antonio Juarez Alencar, Eber Assis Schmitz, Mônica Ferreira da Silva, Rigel Procópio Fernandes:
Acknowledging the Effect of the Depreciation of Tangible and Intangible Benefits upon the Evaluation of E-Gov Projects. 842-868 - N. R. Ram Mohan, E. Baburaj:
Energy-Aware Load Balanced Scheduler for Cloud Computing to Improve Quality of Service. 869-880 - Sami Ouali, Naoufel Kraïem, Zuhoor Al-Khanjari, Youcef Baghdadi:
Model Driven Software Product Line Process for Service/Component-Based Applications. 881-892 - Hina Saeeda, Fahim Arif, Nasir Mehmood Minhas, Mammona Humayun:
Agile Scalability for Large Scale Projects: Lessons Learned. 893-903 - Onur Özçelik, D. Turgay Altilar:
Test-Driven Approach for Safety-Critical Software Development. 904-911 - Wei-Chieh Chang, Wei-Min Jeng:
Streamlined Workflow for 3D Modeling with Animated Characters. 912-918
Volume 10, Number 8, August 2015
- Nik Thompson, Tanya Jane McGill:
Affective Stack - A Model for Affective Computing Application Development. 919-930 - Ming Xu:
A Modified Chaos-Based Image Encryption Algorithm. 931-938 - Rabeb Mizouni, Sanja Lazarova-Molnar:
Project Schedule Simulation: Incorporating Human Factors' Uncertainty and Features' Priority in Task Modeling. 939-960 - A. Siva Sangari, J. Martin Leo Manickam:
Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption. 961-970 - Anis Zarrad:
A Systematic Review on Regression Testing for Web-Based Applications. 971-990 - Alireza Olyai, Reza Rezaei:
Analysis and Comparison of Software Product Line Frameworks. 991-1001 - Abdollah Kiani, Mohsen Amiri Fakhr, Reza Rezaei:
Architectural Patterns for Context-Aware System. 1002-1013 - Yasemin Gültepe:
Querying Bibliography Data Based on Linked Data. 1014-1020 - Hela Lajmi, Adel M. Alimi, Joseba M. Rodriguez:
Advanced Ethernet Networks' Diagnozer. 1021-1029 - Pallavi Kalyanasundaram, Sunita P. Ugale, Smitha K. P., Priti Ranadive:
Efficient Migration to Windows. 1030-1036 - Amr Tolba, Ahmed Ghoneim:
A Stepwise Self-adaptive Model for Improving Cloud Efficiency Based on Multi-Agent Features. 1037-1044
Volume 10, Number 9, September 2015
- B. Muruganantham, K. Vivekanandan:
Multi Perceptional Optimality Matrix Based Web Service Reliability Model. 1045-1055 - Maximiliano M. de Faria, Eber Assis Schmitz, Antonio Juarez Alencar, Mônica Ferreira da Silva, Petros S. Stefaneas:
Analyzing IT Governance Initiatives with Game Theory: A Systematic literature Review. 1056-1069 - Balika J. Chelliah, K. Vivekanandan:
Aggregated Quantified Response Time Matrix Formulation (ARMF) - A New Quality of Service Paradigm Technique. 1070-1078 - Hui Deng, Hui Liu, Ying Guo, Baofeng Zhang:
Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods. 1079-1085 - A. Murugan, K. Vivekanandan:
XSD DDoS Trace Handler in Web Service Environment. 1086-1095 - Sangita Gupta, Suma V.:
Application and Assessment of Classification Techniques on Programmers' Performance in Software Industry. 1096-1103 - Bato Princess Nina Ann B., Labayo Rhea D. C., Nimfa Bisnan, Jessa T. Pumatong, Iluminada Vivien R. Domingo:
Mobile Daily Diet Guide and Advisor for Filipinos. 1104-1110 - Yingbing Yu:
Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques. 1111-1118 - Supasit Kajkamhaeng, Komwit Surachat, Komkrit Kangrat, Jitpakan Limsakun:
A Prototype Mobile Application for Searching Specialized Medical Facilities in a Chosen Vicinity. 1119-1126
Volume 10, Number 10, October 2015
- Saad M. Darwish, Saleh M. El-Kaffas, Omar A. Abdulateef:
Semantic Database Compression System Based on Augmented Vector Quantization. 1127-1139 - Lily Puspa Dewi, Ibnu Gunawan, Raymond Weily:
Library Information System Auditing: Monitoring and Evaluating the Software in Academic Institution. 1140-1147 - Shin-ya Nishizaki, Kensuke Narita, Tomoyuki Ueda:
Simplification of Abstract Machine for Functional Language and Its Theoretical Investigation. 1148-1159 - Joohyoung Jeon, Minjeong An, Hongchul Lee:
NoSQL Database Modeling for End-of-Life Vehicle Monitoring System. 1160-1169 - Simon Salvador E. Tidon, Benilda Eleonor V. Comendador:
A Configurable Real-Time Auto-locked Software for Electronics Company (RT-ASEC). 1170-1175 - Younan Duan, Zhizhong Ding, Teng Huang, Dingliang Wang:
TTCN-3 Codec Implementation for LTE RRM Conformance Test. 1176-1188 - Alsahli Abdulaziz Abdullah, Hameed Ullah Khan:
FreGsd: A Framework for Global Software Requirement Engineering. 1189-1198 - Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Javed Iqbal, Salmi Md Zahid:
High Perceived-Value Requirements Engineering Practices for Outsourced Software Projects. 1199-1215 - Zahraa Abed Aljasim Muhisn, Mazni Omar, Mazida Ahmad, Sinan Adnan Muhisn:
Team Leader Selection by Using an Analytic Hierarchy Process (AHP) Technique. 1216-1227 - Zhengyu Zhu, Meiyu Zheng, Yihan Wu:
A Web Log Frequent Sequential Pattern Mining Algorithm Linked WAP-Tree. 1228-1234
Volume 10, Number 11, November 2015
- Xianhua Zeng, Yipeng Gao, Suli Hou, Shuwen Peng:
Real-Time Multi-scale Tracking via Online RGB-D Multiple Instance Learning. 1235-1244 - Raoul Vallon, Lukas Wenzel, Martin E. Brüggemann, Thomas Grechenig:
An Agile and Lean Process Model for Mobile App Development: Case Study into Austrian Industry. 1245-1264 - Taweechai Anguranak:
NFC Technology Payment System for Android Operation System. 1265-1273 - Zhengdong Liu:
A Garment Image Segmentation Method Based on Salient Region and JSEG. 1274-1282 - Mohd Hairul Nizam Md. Nasir, Shamsul Sahibuddin, Rodina Binti Ahmad, Shukor Sanim Bin Mohd Fauzi:
How the PMBOK Addresses Critical Success Factors for Software Projects: A Multi-round Delphi Study. 1283-1300 - Qiantu Zhang, Liqing Fang, Sicai Su, Yan Lv:
Parameters Optimization of SVM Based on Improved FOA and Its Application in Fault Diagnosis. 1301-1309 - Chung Yung, Yutang Lin:
Implementing TOAST, a Tool for Agile Software Project Management in Cloud Computing Environments. 1310-1318 - Pei He, Achun Hu, Dongqing Xie, Zhiping Fan:
Component-Based Verification Model of Sequential Programs. 1319-1326 - Sabah Al-Fedaghi:
On Collaboration in Software: Annotation vs. Flow-Based Diagrams. 1327-1335
Volume 10, Number 12, December 2015
- Siwadol Sateanpattanakul:
AOC: An Aspect - Oriented Approach for Comment to Reduce the Redundant Behavior between Source Code and Compilation Code. 1336-1342 - Supachai Vorapojpisut:
A Lightweight Framework of Home Automation Systems Based on the IFTTT Model. 1343-1350 - Anthony Karageorgos, Elli Rapti, Vassilis C. Gerogiannis:
Resource Allocation in Software Projects Using a Bio-inspired Model. 1351-1358 - Ashish Kumar Mishra, Dharmendra Kumar Yadav:
Validation of UML Design Model. 1359-1366 - Anil Utku, Hacer (Uke) Karacan, Oktay Yildiz, M. Ali Akcayol:
Implementation of a New Recommendation System Based on Decision Tree Using Implicit Relevance Feedback. 1367-1374 - Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:
A Method for Efficient Extensibility Improvements in Embedded Software Evolution. 1375-1388 - Zakaria Bousalem, Ilias Cherti:
XMap: A Novel Approach to Store and Retrieve XML Document in Relational Databases. 1389-1401 - Alexandra Nagy, George Sebastian Chis:
Sensitivity Analysis and Patterns Implementation on Load Testing Software Systems. 1402-1411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.