default search action
Journal of Software, Volume 2
Volume 2, Number 1, February 2007
- Claudio Guidi, Roberto Lucchi:
Formalizing Mobility in Service Oriented Computing. 1-13 - Louise E. Moser, P. Michael Melliar-Smith, Wenbing Zhao:
Building Dependable and Secure Web Services. 14-26 - Torsten Priebe, Wolfgang Dobmeier, Christian Schläger, Nora Kamprath:
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies. 27-38 - Calin Ciufudean, Adrian Graur, Constantin Filote, Cornel Turcu:
A New Formalism for Failure Diagnosis: Ant Colony Decision Petri Nets. 39-46 - Muhammad Alam, Ruth Breu, Michael Hafner:
Model-Driven Security Engineering for Trust Management in SECTET. 47-59 - Carine G. Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, Alexandre M. Ribeiro:
Towards Secure e-Learning Applications: a Multiagent Platform. 60-69
Volume 2, Number 2, August 2007
- José Ignacio Garzón, Eduardo Huedo, Rubén S. Montero, Ignacio Martín Llorente, Pablo Chacón:
Adaptation of a Multi-Resolution Docking Bioinformatics Application to the Grid. 1-10 - Andrés Ortiz, Julio Ortega, Antonio F. Díaz, Alberto Prieto:
Modeling Network Behaviour By Full-System Simulation. 11-18 - Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie:
Security Patterns for Voice over IP Networks. 19-29 - Piotr Karwaczynski, Jaka Mocnik:
IP-based Clustering for Peer-to-Peer Overlays. 30-37 - Eduardo Santana de Almeida, Alexandre Alvaro, Vinicius Cardoso Garcia, Leandro Marques Nascimento, Silvio Romero de Lemos Meira, Daniel Lucrédio:
A Systematic Approach to Design Domain-Specific Software Architectures. 38-51 - Hervé Chang, Philippe Collet:
Compositional Patterns of Non-Functional Properties for Contract Negotiation. 52-63 - Tony Spiteri Staines:
Supporting UML Sequence Diagrams with a Processor Net Approach. 64-73 - Michael Thonhauser, Gernot Schmoelzer, Christian Kreiner:
Implementing Model-Based Data Structures using Transient Model Extensions. 74-83 - Selim Ciraci, Pim van den Broek, Mehmet Aksit:
A Taxonomy for a Constructive Approach to Software Evolution. 84-97
Volume 2, Number 3, September 2007
- Piërre van de Laar, Rob Golsteijn:
User-Controlled Reflection on Join Points. 1-8 - James H. Hill, Aniruddha S. Gokhale:
Model-driven Engineering for Early QoS Validation of Component-based Software Systems. 9-18 - Thomas Triebsees:
Constraint-based Model Transformation: Tracing the Preservation of Semantic Properties. 19-29 - Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Extended Influence Diagrams for System Quality Analysis. 30-42 - Seongwook Youn, Dennis McLeod:
Spam Email Classification using an Adaptive Ontology. 43-55 - YoungJoon Byun:
A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams and Patterns. 56-63 - Yongyan Zheng, Jiong Zhou, Paul Krause:
An Automatic Test Case Generation Framework for Web Services. 64-77 - Linh Ngo, Amy W. Apon:
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System. 78-86 - Pierre-Loïc Garoche, Marc Pantel, Xavier Thirioux:
Abstract Interpretation-based Static Safety for Actors. 87-98
Volume 2, Number 4, October 2007
- Mikel Larrea, Alberto Lafuente, Iratxe Soraluze Arriola, Roberto Cortiñas, Joachim Wieland:
Designing Efficient Algorithms for the Eventually Perfect Failure Detector Class. 1-11 - João Cordeiro, Gaël Dias, Pavel Brazdil:
New Functions for Unsupervised Asymmetrical Paraphrase Detection. 12-23 - Kornelije Rabuzin, Miroslav Baca, Mirko Malekovic:
A Multimodal Biometric System Implemented within an Active Database Management System. 24-31 - David Saint-Voirin, Christophe Lang, Hervé Guyennet, Noureddine Zerhouni:
Scoop Methodology: Modeling, Simulation And Analysis For Cooperative Systems. 32-42 - Bastian Florentz, Michaela Huhn:
Architecture Potential Analysis: A Closer Look inside Architecture Evaluation. 43-56 - Sérgio F. Lopes, Adriano Tavares, João Monteiro, Carlos A. Silva:
Instantiation of a Classification System Framework that Facilitates Reuse. 57-69 - Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi:
A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems. 70-79 - Narongrit Waraporn:
Real Time Simulation of Medical Diagnosis with Confidence Levels on Distributed Knowledge Nodes. 80-87 - Kazuo Hiekata, Hiroyuki Yamato, Piroon Rojanakamolsan, Wataru Oishi:
A Framework for Design Engineering Education with Workflow-based e-Learning System. 88-95
Volume 2, Number 5, November 2007
- Giusy Di Lorenzo, Nicola Mazzocca, Francesco Moscato, Valeria Vittorini:
Towards Semantics Driven Generation of Executable Web Services Compositions. 1-15 - Lukás Hejtmánek, Ludek Matyska:
Nonblocking Distributed Replication of Versioned Files. 16-23 - Anabel Fraga, Juan Lloréns:
The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology. 24-28 - Paskorn Champrasert, Junichi Suzuki:
Building Self-Configuring Data Centers with Cross Layer Coevolution. 29-43 - Maryline Silly-Chetto, Audrey Marchand:
Dynamic Scheduling of Skippable Periodic Tasks: Issues and Proposals. 44-51 - Vaclav Dvorak:
Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware. 52-63 - Oliver Skroch, Klaus Turowski:
Reducing Domain Level Scenarios to Test Component-based Software. 64-73 - Oussama Kassem Zein, Yvon Kermarrec:
Description and Composition of E-Learning Services. 74-83
Volume 2, Number 6, December 2007
- Wei Li, Zhikun Zhao:
Influence Control for Dynamic Reconfiguration of Data Flow Systems. 1-13 - Surekha Mariam Varghese, K. Poulose Jacob:
Anomaly Detection Using System Call Sequence Sets. 14-21 - Dil Muhammad Akbar Hussain:
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model. 22-29 - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Mirko Minardi, Pierpaolo Catalano, Vito Dicensi, Gianfranco Tarricone:
A Decision Support System base line Flexible Architecture to Intrusion Detection. 30-41 - Veselina G. Jecheva, Evgeniya P. Nikolova:
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems. 42-52 - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:
Using Aspect Programming to Secure Web Applications. 53-63 - Joon S. Park, Ganesh Devarajan:
Fine-Grained and Scalable Message Protection in Sensitive Organizations. 64-75 - Sabina Jeschke, Harald Scheel, Thomas Richter, Christian Thomsen:
On Remote and Virtual Experiments in eLearning. 76-85 - Alexander Höhfeld:
In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games. 86-92
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.