


default search action
Journal of Systems and Software, Volume 86
Volume 86, Number 1, January 2013
- Hans van Vliet:
Signs of a thriving journal. 1 - Ilenia Fronza
, Alberto Sillitti, Giancarlo Succi
, Mikko Terho, Jelena Vlasenko:
Failure prediction based on log files using Random Indexing and Support Vector Machines. 2-11 - Wan-Shiou Yang, San-Yih Hwang:
iTravel: A recommender system in mobile peer-to-peer environment. 12-20 - Masood Uzzafer:
A simulation model for strategic management process of software projects. 21-37 - Chiu-Mei Chen, Chiao-Min Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images. 38-46 - Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha
:
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. 47-59 - Younho Lee
, Il-Hee Kim, Yongsu Park:
Improved multi-precision squaring for low-end RISC microcontrollers. 60-71 - Ming Ying, James Miller:
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. 72-88 - Konstantinos N. Vavliakis, Theofanis K. Grollios, Pericles A. Mitkas:
RDOTE - Publishing Relational Databases into the Semantic Web. 89-99 - Cai-Sen Chen, Tao Wang, YingZhan Kou, Xiaocen Chen, Xiong Li
:
Improvement of trace-driven I-Cache timing attack on the RSA algorithm. 100-107 - Jose M. Lopez-Vega, Javier Povedano-Molina, Gerardo Pardo-Castellote, Juan M. López-Soler
:
A content-aware bridging service for publish/subscribe environments. 108-124 - César Jesús Pardo Calvache
, Francisco J. Pino
, Félix García
, Maria Teresa Baldassarre
, Mario Piattini
:
From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies. 125-143 - Ali Bou Nassif
, Danny Ho, Luiz Fernando Capretz:
Towards an early software estimation using log-linear regression and a multilayer perceptron model. 144-160 - Adrian Fernandez, Silvia Abrahão
, Emilio Insfrán
:
Empirical validation of a usability inspection method for model-driven Web development. 161-186 - Yajun Du, Yufeng Hai:
Semantic ranking of web pages based on formal concept analysis. 187-197 - Wei-Ming Chen, Sheng-Hao Jhang:
Improving Graph Cuts algorithm to transform sequence of stereo image to depth map. 198-210 - Zhijun Wu, Jin Lei, Di Yao, Minghua Wang, Sarhan M. Musa:
Chaos-based detection of LDoS attacks. 211-221 - Guangyong Gao, Guoping Jiang:
A lossless copyright authentication scheme based on Bessel-Fourier moment and extreme learning machine in curvature-feature domain. 222-232 - Faeze Eshragh, Mehdi Kargahi:
Analytical architecture-based performability evaluation of real-time software systems. 233-246
Volume 86, Number 2, February 2013
- Dong Yan, Syed Zubair Ahmad, Dong Yang:
Matthew effect, ABC analysis and project management of scale-free information systems. 247-254 - Xiangyang Wang, Chunpeng Wang, Hong-Ying Yang, Panpan Niu:
A robust blind color image watermarking in quaternion Fourier transform domain. 255-277 - Jose Manuel Redondo
, Francisco Ortin
:
Efficient support of dynamic inheritance for class- and prototype-based languages. 278-301 - Xiaomin Zhu, Rong Ge, Jinguang Sun, Chuan He:
3E: Energy-efficient elastic scheduling for independent tasks in heterogeneous computing systems. 302-314 - Zhi-Hui Wang, Chin-Feng Lee, Ching-Yun Chang:
Histogram-shifting-imitated reversible data hiding. 315-323 - Che-Wei Lee, Wen-Hsiang Tsai:
A covert communication method via spreadsheets by secret sharing with a self-authentication capability. 324-334 - Hung-Hsu Tsai
, Yen-Shou Lai, Shih-Che Lo
:
A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. 335-348 - George Kakarontzas
, Eleni Constantinou
, Apostolos Ampatzoglou, Ioannis Stamelos:
Layer assessment of object-oriented software: A metric facilitating white-box reuse. 349-366 - Yuebin Bai, Yao Ma, Cheng Luo, Duo Lv, Yuanfeng Peng:
A high performance inter-domain communication approach for virtual machines. 367-376 - Shin Hong, Moonzoo Kim:
Effective pattern-driven concurrency bug detection for operating systems. 377-388 - Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. 389-402 - Rômulo Silva de Oliveira
, Andreu Carminati
, Renan Augusto Starke:
On using adversary simulators to evaluate global fixed-priority and FPZL scheduling of multiprocessors. 403-411 - Kevin Lano, Shekoufeh Kolahdouz Rahimi:
Constraint-based specification of model transformations. 412-436 - Ming-Chin Chuang, Jeng Farn Lee:
SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. 437-448 - Patricia López Martínez, Laura Barros, José M. Drake:
Design of component-based real-time applications. 449-467 - Yin Yang, Zhi-hu Tan, Jiguang Wan, Changsheng Xie, Jie Yu, Jian He:
A reliability optimization method for RAID-structured storage systems based on active data migration. 468-484 - Mustafa Ulutas
, Güzin Ulutas, Vasif V. Nabiyev:
Invertible secret image sharing for gray level and dithered cover images. 485-500 - Kutila Gunasekera, Arkady B. Zaslavsky, Shonali Krishnaswamy, Seng Wai Loke:
Building ubiquitous computing applications using the VERSAG adaptive agent framework. 501-519 - Elena del Val Noguera
, Miguel Rebollo
, Vicente J. Botti
:
Promoting cooperation in service-oriented MAS through social plasticity and incentives. 520-537 - Wilson Rosa, Travis Packard, Abishek Krupanand, James W. Bilbro, Max M. Hodal:
COTS integration and estimation for ERP. 538-550 - Philip Langer, Manuel Wimmer, Petra Brosch, Markus Herrmannsdörfer, Martina Seidl, Konrad Wieland, Gerti Kappel:
A posteriori operation detection in evolving software models. 551-566 - Wei-Jen Yang, Kuo-Liang Chung, Hong-Yuan Mark Liao, Wen-Kuang Yu:
Efficient reversible data hiding algorithm based on gradient-based edge direction prediction. 567-580 - Wei-Kuei Chen:
Image sharing method for gray-level images. 581-585
Volume 86, Number 3, March 2013
- Majdi Abdellatief
, Abu Bakar Md Sultan
, Abdul Azim Abdul Ghani, Marzanah A. Jabar
:
A mapping study to investigate component-based software system metrics. 587-603 - Tseng-Jung Lin, Kuo-Liang Chung, Po-Chun Chang, Yong-Huai Huang, Hong-Yuan Mark Liao, Chiung-Yao Fang
:
An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. 604-614 - Fatemeh Nori, Mahmood Deypir, Mohammad Hadi Sadreddini:
A sliding window based algorithm for frequent closed itemset mining over data streams. 615-623 - Pasqualina Potena:
Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff. 624-648 - María del Carmen Suárez Torrente
, Ana Belén Martínez Prieto, Darío Álvarez Gutiérrez, M. Elena Alva de Sagastegui:
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website. 649-663 - Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu
, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. 664-676 - Michael J. Laszlo, Sumitra Mukherjee:
Optimal univariate microaggregation with data suppression. 677-682 - Andrzej Zalewski
, Szymon Kijas:
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems. 683-697 - C. C. F. Pereira Geovandro, Mateus A. S. Santos, Bruno Trevizan de Oliveira, Marcos A. Simplício Jr.
, Paulo S. L. M. Barreto, Cíntia B. Margi
, Wilson Vicente Ruggiero
:
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission. 698-706 - Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. 707-715 - Li-Chin Huang, Lin-Yu Tseng
, Min-Shiang Hwang:
A reversible data hiding method by histogram shifting in high quality medical images. 716-727 - Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. 728-743 - Yifeng Luo, Siqiang Luo
, Jihong Guan, Shuigeng Zhou:
A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation. 744-750 - Jemal H. Abawajy:
SQLIA detection and prevention approach for RFID systems. 751-758 - Ying-Ho Liu, Chun-Sheng Wang:
Constrained frequent pattern mining on univariate uncertain data. 759-778 - Ya-Han Hu
, Tony Cheng-Kui Huang, Yu-Hua Kao:
Knowledge discovery of weighted RFM sequential patterns from customer sequence databases. 779-788 - Jenn-Wei Lin, Jian-Yan Zhuang:
A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks. 789-800 - Chung-Yuan Huang, Chun-Liang Lee, Tzai-Hung Wen
, Chuen-Tsai Sun:
A computer virus spreading model based on resource limitations and interaction costs. 801-808 - Marc Chaumont
, William Puech
, Christian Lahanier:
Securing color information of an image by concealing the color palette. 809-825 - Hongjun Liu
, Xingyuan Wang:
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. 826-834 - Mohamed Sellami
, Olfa Bouchaala, Walid Gaaloul
, Samir Tata:
Communities of Web service registries: Construction and management. 835-853 - Yepang Liu
, Chang Xu, Shing-Chi Cheung
:
AFChecker: Effective model checking for context-aware adaptive applications. 854-867 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:
Corrigendum to "A variable-length model for masquerade detection" [J. Syst. Softw. 85(2012) 2470-2478]. 868
Volume 86, Number 4, April 2013
- Alessandro Garcia:
Software Engineering in Brazil: Retrospective and prospective views. 869-871 - Paulo Anselmo da Mota Silveira Neto, Joás Sousa Gomes, Eduardo Santana de Almeida, Jair Cavalcanti Leite, Thaís Vasconcelos Batista
, Larissa Leite:
25 years of software engineering in Brazil: Beyond an insider's view. 872-889 - Carlos José Pereira de Lucena, Ingrid Nunes
:
Contributions to the emergence and consolidation of Agent-oriented Software Engineering. 890-904 - Uirá Kulesza, Sérgio Soares
, Christina Chavez
, Fernando Castor
, Paulo Borba
, Carlos José Pereira de Lucena, Paulo César Masiero, Cláudio Sant'Anna, Fabiano Cutigi Ferrari
, Vander Alves
, Roberta Coelho, Eduardo Figueiredo, Paulo F. Pires
, Flávia Coimbra Delicato, Eduardo Piveta
, Carla T. L. L. Silva, Valter Vieira de Camargo, Rosana T. V. Braga
, Julio Leite, Otávio Lemos
, Nabor C. Mendonça
, Thaís Vasconcelos Batista
, Rodrigo Bonifácio
, Nélio Cacho
, Lyrene Fernandes da Silva
, Arndt von Staa, Fábio Fagundes Silveira, Marco Túlio Valente
, Fernanda M. R. Alencar
, Jaelson Castro, Ricardo Argenton Ramos
, Rosângela A. D. Penteado, Cecília M. F. Rubira
:
The crosscutting impact of the AOSD Brazilian research community. 905-933 - Vinicius Humberto Serapilha Durelli, Rodrigo Fraxino Araujo, Marco Aurélio Graciotto Silva
, Rafael Alves Paes de Oliveira, José Carlos Maldonado, Márcio Eduardo Delamaro:
A scoping study on the 25 years of research into software testing in Brazil and an outlook on the future of the area. 934-950 - Otávio Augusto Lazzarini Lemos
, Fabiano Cutigi Ferrari
, Marcelo Medeiros Eler
, José Carlos Maldonado, Paulo César Masiero:
Evaluation studies of software testing research in Brazil and in the world: A survey of two premier software engineering conferences. 951-969 - Thelma Elita Colanzi, Silvia Regina Vergilio, Wesley Klewerton Guez Assunção
, Aurora T. R. Pozo
:
Search Based Software Engineering: Review and analysis of the field in Brazil. 970-984 - Elisa Yumi Nakagawa
, Pablo Oliveira Antonino, Martin Becker, José Carlos Maldonado, Holger Storf, Karina Villela, H. Dieter Rombach:
Relevance and perspectives of AAL in Brazil. 985-996 - Luciane Telinski Wiedermann Agner, Inali Wisniewski Soares, Paulo Cézar Stadzisz, Jean Marcelo Simão
:
A Brazilian survey on UML and model-driven practices for embedded software development. 997-1005 - Gustavo Soares, Rohit Gheyi
, Emerson R. Murphy-Hill, Brittany Johnson:
Comparing approaches to analyze refactoring activity on software repositories. 1006-1022 - Marcelo de Almeida Maia, Raquel Fialho de Queiroz Lafetá:
On the impact of trace-based feature location in the performance of software maintainers. 1023-1037 - Leopoldo Teixeira, Paulo Borba
, Rohit Gheyi
:
Safe composition of configuration knowledge-based software product lines. 1038-1053
- Darja Smite, Claes Wohlin
, Aybüke Aurum, Ronald Jabangwe, Emil Numminen:
Offshore insourcing in software development: Structuring the decision-making process. 1054-1067 - Xiaotian Wu, Wei Sun:
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. 1068-1088 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Petri net based techniques for constructing reliable service composition. 1089-1106 - Saad Liaquat Kiani, Ashiq Anjum
, Michael Knappmeyer, Nik Bessis
, Nikolaos Antonopoulos:
Federated broker system for pervasive context provisioning. 1107-1123 - Christian Raspotnig, Andreas L. Opdahl
:
Comparing risk identification techniques for safety and security requirements. 1124-1151
Volume 86, Number 5, May 2013
- Julio Ariel Hurtado Alegria
, María Cecilia Bastarrica, Sergio F. Ochoa, Jocelyn Simmonds
:
MDE software process lines in small companies. 1153-1171 - Iuri Santos Souza, Gecynalda Soares da Silva Gomes, Paulo Anselmo da Mota Silveira Neto, Ivan do Carmo Machado, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
Evidence of software inspection on feature specification for software product lines. 1172-1190 - Ankur Pachauri, Gursaran Srivastava:
Automated test data generation for branch testing using genetic algorithm: An improved approach using branch ordering, memory and elitism. 1191-1208 - Mohammad Saeed Abou Trab
, Michael J. Brockway, Steve Counsell, Robert M. Hierons
:
Testing Real-Time Embedded Systems using Timed Automata based approaches. 1209-1223 - Ya-Han Hu
, Fan Wu, Yi-Jiun Liao:
An efficient tree-based algorithm for mining sequential patterns with multiple minimum supports. 1224-1238 - Eduardo Martins Guerra
, Felipe Alves
, Uirá Kulesza, Clovis Torres Fernandes:
A reference architecture for organizing the internal structure of metadata-based frameworks. 1239-1256 - Dingyu Yang, Jian Cao, Jiwen Fu, Jie Wang, Jianmei Guo:
A pattern fusion model for multi-step-ahead CPU load prediction. 1257-1266 - Tzung-Her Chen
, Yao-Sheng Lee, Wei-Lun Huang, Justie Su-tzu Juan
, Ying-Yu Chen, Ming-Jheng Li:
Quality-adaptive visual secret sharing by random grids. 1267-1274 - Darko Durisic
, Martin Nilsson, Miroslaw Staron, Jörgen Hansson:
Measuring the impact of changes to the complexity and coupling properties of automotive software systems. 1275-1293 - Konstantinos Manikas
, Klaus Marius Hansen:
Software ecosystems - A systematic literature review. 1294-1306 - Qing Gu, Félix Cuadrado
, Patricia Lago, Juan C. Dueñas:
3D architecture viewpoints on service automation. 1307-1322 - Hyung-Ju Cho:
Continuous range k-nearest neighbor queries in vehicular ad hoc networks. 1323-1332 - Maya Daneva
, Egbert van der Veen, Chintan Amrit
, Smita Ghaisas, Klaas Sikkel, Ramesh Kumar, Nirav Ajmeri
, Uday Ramteerthkar, Roel J. Wieringa:
Agile requirements prioritization in large-scale outsourced system projects: An empirical study. 1333-1353 - Vahid Garousi
, Junji Zhi:
A survey of software testing practices in Canada. 1354-1376 - Jeanne Chen, Chih-Wei Shiu
, Mei-Chen Wu:
An improvement of diamond encoding using characteristic value positioning and modulus function. 1377-1383 - Qiuzhen Lin
, Kwok-Wo Wong, Jianyong Chen:
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. 1384-1389 - Henry Edison
, Nauman Bin Ali
, Richard Torkar:
Towards innovation measurement in the software industry. 1390-1407 - Liang Huai Yang
, Jian Zhou, Weihua Gong, Jiakui Zhao, Lijun Chen:
Lifetime and QoS-aware energy-saving buffering schemes. 1408-1425 - Licia Sbattella, Roberto Tedesco
:
A novel semantic information retrieval system based on a three-level domain model. 1426-1452 - Jamie Y. T. Chang, Eric T. G. Wang, James J. Jiang, Gary Klein:
Controlling ERP consultants: Client and provider practices. 1453-1461 - Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. 1462-1463
Volume 86, Number 6, June 2013
- Nameer N. El-Emam
, Rasheed Abdul Shaheed Al-Zubidy:
New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. 1465-1481 - Santiago A. Vidal
, Claudia A. Marcos:
Toward automated refactoring of crosscutting concerns into aspects. 1482-1497 - Edith Tom, Aybüke Aurum, Richard T. Vidgen
:
An exploration of technical debt. 1498-1516 - Carlos R. Rivero
, Inma Hernández
, David Ruiz
, Rafael Corchuelo
:
MostoDE: A tool to exchange data amongst semantic-web ontologies. 1517-1529 - Azlan B. Ismail
, Jun Yan
, Jun Shen
:
Incremental service level agreements violation handling with time impact analysis. 1530-1544 - Uwe van Heesch, Paris Avgeriou
, Antony Tang
:
Does decision documentation help junior designers rationalize their decisions? A comparative multiple-case study. 1545-1565 - Georgios Kellaris
, Nikos Pelekis, Yannis Theodoridis
:
Map-matched trajectory compression. 1566-1579 - Md. Saiful Islam
, Chengfei Liu
, Rui Zhou
:
A framework for query refinement with user feedback. 1580-1595 - Charalabos Skianis
:
Introducing automated procedures in 3G network planning and optimization. 1596-1602 - Chun-Sheng Wang, Ying-Ho Liu, Kuo-Chung Chu
:
Closed inter-sequence pattern mining. 1603-1612 - Domenico Cotroneo, Roberto Pietrantuono
, Stefano Russo
:
Testing techniques selection based on ODC fault types and software metrics. 1613-1637 - Baiying Lei
, Insu Song, Shah Atiqur Rahman:
Robust and secure watermarking scheme for breath sound. 1638-1649 - Jaime Chen, Manuel Díaz
, Bartolomé Rubio
, José M. Troya:
PS-QUASAR: A publish/subscribe QoS aware middleware for Wireless Sensor and Actor Networks. 1650-1662 - Dragan Stankovic, Vesna Nikolic
, Miodrag Djordjevic
, Dac-Buu Cao:
A survey study of critical success factors in agile software projects in former Yugoslavia IT companies. 1663-1678 - Fangda Wang, Hongzhi Wang
, Jianzhong Li, Hong Gao:
Graph-based reference table construction to facilitate entity matching. 1679-1688 - Ejike Ofuonye, James Miller:
Securing web-clients with instrumented code and dynamic runtime monitoring. 1689-1711 - Guy Martin Tchamgoue
, Kyong Hoon Kim, Yong-Kee Jun, Wan Yeon Lee:
Compositional real-time scheduling framework for periodic reward-based task model. 1712-1724
Volume 86, Number 7, July 2013
- Jianming Yong
, Weiming Shen
, Anne E. James
:
Collaborative computing technologies and systems. 1725-1726 - Lu Xiao
:
The effects of a shared free form rationale space in collaborative learning activities. 1727-1737 - Mamoun Nawahdah, Tomoo Inoue:
Setting the best view of a virtual teacher in a mixed reality physical-task learning support system. 1738-1750 - José A. Rodrigues Nt., Luiz Fernando Cardoso Tomaz, Jano Moreira de Souza, Geraldo Xexéo
:
Bringing knowledge into recommender systems. 1751-1758 - Crescencio Bravo
, Rafael Duque
, Jesús Gallardo
:
A groupware system to support collaborative programming: Design and experiences. 1759-1771 - Ana I. Molina
, Jesús Gallardo
, Miguel A. Redondo
, Manuel Ortega
, William J. Giraldo:
Metamodel-driven definition of a visual modeling language for specifying interactive groupware applications: An empirical study. 1772-1789 - Zhe Sun, Jun Shen
:
A high performance peer to cloud and peer model augmented with hierarchical secure communications. 1790-1796 - Charles V. Trappey
, Amy J. C. Trappey, Gilbert Y. P. Lin, Wang-Tsang Lee, Ta-Hui Yang:
SETZ logistics models and system framework for manufacturing and exporting large engineering assets. 1797-1805 - Jinghui Zhang, Junzhou Luo, Fang Dong:
Scheduling of scientific workflow in non-dedicated heterogeneous multicluster platform. 1806-1818 - Victor Ströele A. Menezes
, Geraldo Zimbrão, Jano M. Souza:
Group and link analysis of multi-relational scientific social networks. 1819-1830
- Anil Kumar Thurimella, Bernd Brügge:
A mixed-method approach for the empirical evaluation of the issue-based variability modeling. 1831-1849 - Yufei Ren, Tan Li, Dantong Yu, Shudong Jin, Thomas G. Robertazzi:
Design and testbed evaluation of RDMA-based middleware for high-performance data transfer applications. 1850-1863 - Alessandro Barenghi
, Guido Marco Bertoni
, Luca Breveglieri, Gerardo Pelosi
:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. 1864-1878 - Ekrem Kocaguneli, Tim Menzies
:
Software effort models should be assessed via leave-one-out validation. 1879-1890 - Wenpin Jiao, Yanchun Sun:
Supporting adaptation of decentralized software based on application scenarios. 1891-1906 - José Luis González
, Jesús Carretero Pérez
, Victor Sosa-Sosa
, Juan F. Rodriguez Cardoso, Ricardo Marcelín-Jiménez:
An approach for constructing private storage services as a unified fault-tolerant system. 1907-1922 - Ayman A. Amin
, Lars Grunske
, Alan Colman
:
An approach to software reliability prediction based on time series modeling. 1923-1932 - Jong-Yih Kuo, Fu-Chu Huang, Shang-Pin Ma
, Yong-Yi Fanjiang:
Applying hybrid learning approach to RoboCup's strategy. 1933-1944 - Apostolos Ampatzoglou, Sofia Charalampidou, Ioannis Stamelos:
Research state of the art on GoF design patterns: A mapping study. 1945-1964 - Kan Wang, Zhe-Ming Lu, Yongjian Hu:
A high capacity lossless data hiding scheme for JPEG images. 1965-1975
Volume 86, Number 8, August 2013
- Antonia Bertolino
, Howard Foster, J. Jenny Li, Hong Zhu:
Special section on automation of software test. 1977 - Saswat Anand, Edmund K. Burke
, Tsong Yueh Chen
, John A. Clark, Myra B. Cohen, Wolfgang Grieskamp, Mark Harman
, Mary Jean Harrold, Phil McMinn:
An orchestrated survey of methodologies for automated software test case generation. 1978-2001 - Gary Kaminski, Paul Ammann, Jeff Offutt:
Improving logic-based testing. 2002-2012 - Giuseppe Di Guglielmo, Luigi Di Guglielmo, Andreas Foltinek, Masahiro Fujita, Franco Fummi, Cristina Marconcini, Graziano Pravadelli
:
On the integration of model-driven design and dynamic assertion-based verification for embedded software. 2013-2033
- Jian Du, Jing Lu, Dong Wu
, Huiping Li, Jie Li:
User acceptance of software as a service: Evidence from customers of China's leading e-commerce company, Alibaba. 2034-2044 - Rashid Naseem
, Onaiza Maqbool, Siraj Muhammad:
Cooperative clustering for software modularization. 2045-2062 - Roberto Gallo, Henrique Kawakami, Ricardo Dahab
:
FORTUNA - A framework for the design and development of hardware-based secure systems. 2063-2076 - Yixin Bian, Günes Koru, Xiaohong Su, Peijun Ma:
SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones. 2077-2093 - Teng Guo, Feng Liu, Chuan Kun Wu:
Threshold visual secret sharing by random grids with improved contrast. 2094-2109 - Marco Torchiano
, Federico Tomassetti
, Filippo Ricca, Alessandro Tiso, Gianna Reggio:
Relevance, benefits, and problems of software modelling and model driven techniques - A survey in the Italian industry. 2110-2126 - G. G. Md. Nawaz Ali, Edward Chan, Wenzhong Li:
Supporting real-time multiple data items query in multi-RSU vehicular ad hoc networks (VANETs). 2127-2142 - Yuan-Hsin Tung, Shian-Shyong Tseng:
A novel approach to collaborative testing in a crowdsourcing environment. 2143-2153 - Seonah Lee
, Sungwon Kang:
Clustering navigation sequences to create contexts for guiding code navigation. 2154-2165 - Yongjian Hu, Kan Wang, Zhe-Ming Lu:
An improved VLC-based lossless data hiding scheme for JPEG images. 2166-2173 - Yunxia Liu, Zhitang Li, Xiaojing Ma, Jian Liu:
A robust data hiding algorithm for H.264/AVC video streams. 2174-2183 - Nergiz Ercil Cagiltay
, Gül Tokdemir, Özkan Kiliç, Damla Topalli:
Performing and analyzing non-formal inspections of entity relationship diagram (ERD). 2184-2195 - Huan-Jyh Shyur, Chichang Jou, Keng Chang:
A data mining approach to discovering reliable sequential patterns. 2196-2203 - Hon Yin Leung, Lee-Ming Cheng
, Fang Liu, Q. K. Fu:
Adaptive reversible data hiding based on block median preservation and modification of prediction errors. 2204-2219
Volume 86, Number 9, September 2013
- Rami Bahsoon, Ivan Mistrík, Nour Ali, T. S. Mohan, Nenad Medvidovic:
The future of software engineering IN and FOR the cloud. 2221-2224 - Mark Harman
, Kiran Lakhotia, Jeremy Singer
, David Robert White, Shin Yoo:
Cloud engineering is Search Based Software Engineering too. 2225-2241 - Lawrence Chung, Tom Hill, Owolabi Legunsen, Zhenzhou Sun, Adip Dsouza, Sam Supakkul:
A goal-oriented simulation approach for obtaining good private cloud-based system architectures. 2242-2262 - Mark Dermot Ryan
:
Cloud computing security: The scientific challenge, and a survey of solutions. 2263-2268 - Moustafa Noureddine, Rabih Bashroush:
An authentication model towards cloud federation in the enterprise. 2269-2275 - Haralambos Mouratidis
, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis
:
A framework to support selection of cloud providers based on security and privacy requirements. 2276-2293 - Joaquín Guillén, Javier Miranda, Juan Manuel Murillo
, Carlos Canal
:
A service-oriented framework for developing cross cloud migratable software. 2294-2308 - Luís A. Bastião Silva
, Carlos Costa
, José Luís Oliveira
:
A common API for delivering services over multi-vendor cloud resources. 2309-2317 - Tommi Mikkonen, Antero Taivalsaari
:
Cloud computing and its impact on mobile software development: Two roads diverged. 2318-2320 - José Luis Vázquez-Poletti, Rafael Moreno-Vozmediano
, Rubén S. Montero
, Eduardo Huedo
, Ignacio Martín Llorente
:
Solidifying the foundations of the cloud for the next generation Software Engineering. 2321-2326 - Judith Bishop:
Industry's role in data and software curation in the cloud. 2327-2329 - Ian Sommerville:
Teaching cloud computing: A software engineering perspective. 2330-2332
- Alberto Costa Neto, Rodrigo Bonifácio
, Márcio Ribeiro
, Carlos Eduardo Pontual, Paulo Borba
, Fernando Castor
:
A design rule language for aspect-oriented programming. 2333-2356 - Matteo Golfarelli, Stefano Rizzi
, Elisa Turricchia:
Multi-sprint planning and smooth replanning: An optimization model. 2357-2370 - Zheng Li
, He Zhang, Liam O'Brien, Rainbow Cai, Shayne Flint:
On evaluating commercial Cloud services: A systematic review. 2371-2393 - María Gómez
, Jorge Cervantes:
User Interface Transition Diagrams for customer-developer communication improvement in software development projects. 2394-2410 - Dejan Baca, Kai Petersen
:
Countermeasure graphs for software security risk assessment: An action research. 2411-2428 - Sohrab Behnia
, Amir Akhavan
, Afshin Akhshani
, Azman Samsudin
:
Image encryption based on the Jacobian elliptic maps. 2429-2438 - Carlo Blundo
, Angelo De Caro, Clemente Galdi
, Giuseppe Persiano:
Certified Information Access. 2439-2450 - Marjan Mernik:
An object-oriented approach to language compositions for software language engineering. 2451-2464
Volume 86, Number 10, October 2013
- Lars Grunske
, Aldeida Aleti
:
Quality optimisation of software architectures and design specifications. 2465-2466 - Martin Walker
, Mark-Oliver Reiser, Sara Tucci Piergiovanni
, Yiannis Papadopoulos
, Henrik Lönn, Chokri Mraidha
, David Parker, De-Jiu Chen
, David Servat:
Automatic optimisation of system architectures using EAST-ADL. 2467-2487 - Simon Struck, Matthias Güdemann
, Frank Ortmeier:
Efficient optimization of large probabilistic models. 2488-2501 - Arjan J. de Roo, Hasan Sözer
, Lodewijk Bergmans, Mehmet Aksit:
MOO: An architectural framework for runtime optimization of multiple system objectives in embedded control software. 2502-2519 - Turgay Çelik
, Bedir Tekinerdogan
:
S-IDE: A tool framework for optimizing deployment architecture of High Level Architecture based simulation systems. 2520-2541 - Anne Koziolek
, Danilo Ardagna
, Raffaela Mirandola
:
Hybrid multi-attribute QoS optimization in component based software systems. 2542-2558 - Ramin Etemaadi, Kenneth Lind, Rogardt Heldal, Michel R. V. Chaudron
:
Quality-driven optimization of system architecture: Industrial case study on an automotive sub-system. 2559-2573
- Akram Hakiri
, Pascal Berthou, Aniruddha S. Gokhale
, Douglas C. Schmidt, Thierry Gayraud:
Supporting end-to-end quality of service properties in OMG data distribution service publish/subscribe middleware over wide area networks. 2574-2593 - Claes Wohlin
, Per Runeson
, Paulo Anselmo da Mota Silveira Neto, Emelie Engström
, Ivan do Carmo Machado, Eduardo Santana de Almeida:
On the reliability of mapping studies in software engineering. 2594-2610 - Yiwen Zhang, Rui-feng Guo:
Power-aware scheduling algorithms for sporadic tasks in real-time systems. 2611-2619 - Xianyi Chen, Xingming Sun, Huiyu Sun, Zhili Zhou, Jianjun Zhang:
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. 2620-2626 - Sujesha Sudevalayam, Purushottam Kulkarni:
Affinity-aware modeling of CPU usage with communicating virtual machines. 2627-2638 - Aiko Yamashita, Steve Counsell:
Code smells as system-level indicators of maintainability: An empirical study. 2639-2653 - Dima Alhadidi, Azzam Mourad
, Hakim Idrissi Kaitouni, Mourad Debbabi
:
Common weaving approach in mainstream languages for software security hardening. 2654-2674 - Christiane Gresse von Wangenheim
, Rafael Savi, Adriano Ferreti Borgatto:
SCRUMIA - An educational game for teaching SCRUM in computing courses. 2675-2687 - Shih-Lin Wu
, Jen-Jee Chen, Wen-Chiang Chou:
Cell-related location area planning for 4G PCS networks with variable-order Markov model. 2688-2699 - Bo Ou
, Xiaolong Li, Yao Zhao, Rongrong Ni:
Reversible data hiding based on PDE predictor. 2700-2709
Volume 86, Number 11, November 2013
- Ibrahim S. Abdullah, Daniel A. Menascé:
The Meta-Protocol framework. 2711-2724 - Diana Borrego
, María Teresa Gómez-López
, Rafael M. Gasca
:
Minimizing test-point allocation to improve diagnosability in business process models. 2725-2741 - Khurram Jawad
, Asifullah Khan
:
Genetic algorithm and difference expansion based reversible watermarking for relational databases. 2742-2753 - Tolga Ovatman
, Feza Buzluca
:
Model-based cache-aware dispatching of object-oriented software for multicore systems. 2754-2770 - Zhi-Hui Wang, Hai-Rui Yang, Ting-Fang Cheng, Chin-Chen Chang:
A high-performance reversible data-hiding scheme for LZW codes. 2771-2778 - André Felipe Almeida Monteiro, Marcus Vinicius Azevedo, Alexandre Sztajnberg
:
Virtualized Web server cluster self-configuration to optimize resource and power use. 2779-2796 - Joakim Pernstål, Robert Feldt, Tony Gorschek:
The lean gap: A review of lean approaches to large-scale software systems development. 2797-2821 - Chien-Cheng Huang, Feng-Yu Lin, Frank Yeong-Sung Lin, Yeali S. Sun:
A novel approach to evaluate software vulnerability prioritization. 2822-2840 - Qingqi Pei, Xiang Wang, Yuan Li, Hui Li:
Adaptive reversible watermarking with improved embedding capacity. 2841-2848 - Manjula Peiris, James H. Hill:
Adapting system execution traces to support analysis of software system performance properties. 2849-2862 - Zhibin Pan, Xiaoxiao Ma, Xiaoman Deng, Sen Hu:
Low bit-rate information hiding method based on search-order-coding technique. 2863-2869 - Kuang-Shyr Wu, Jen-Chun Lee, Tsung-Ming Lo, Ko-Chin Chang, Chien-Ping Chang:
A secure palm vein recognition system. 2870-2876 - Abbas Tahir, Davide Tosi
, Sandro Morasca
:
A systematic review on the functional testing of semantic web services. 2877-2889 - José Ramón Hoyos
, Jesús García Molina, Juan A. Botía
:
A domain-specific language for context modeling in context-aware systems. 2890-2905 - Víctor M. Prieto, Manuel Álvarez
, Fidel Cacheda
:
SAAD, a content based Web Spam Analyzer and Detector. 2906-2918 - Surafel Lemma Abebe
, Anita Alicante
, Anna Corazza
, Paolo Tonella
:
Supporting concept location through identifier parsing and ontology extraction. 2919-2938 - Raffaele Conforti
, Marcello La Rosa
, Giancarlo Fortino
, Arthur H. M. ter Hofstede
, Jan Recker
, Michael Adams:
Real-time risk monitoring in business processes: A sensor-based approach. 2939-2965
Volume 86, Number 12, December 2013
- Marco Brambilla, Cinzia Cappiello
, Irene Garrigós
, Jose-Norberto Mazón
, Santiago Meliá
:
Introduction to the JSS special issue of Web 2.0 engineering: New practices and emerging Challenges. 2967-2969 - Carlos Guerrero
, Isaac Lera
, Carlos Juiz
:
Performance improvement of web caching in Web 2.0 via knowledge discovery. 2970-2980 - José María Conejero, Roberto Rodríguez-Echeverría
, Fernando Sánchez-Figueroa
, Marino Linaje Trigueros
, Juan Carlos Preciado
, Pedro J. Clemente
:
Re-engineering legacy Web applications into RIAs by aligning modernization requirements, patterns and RIA features. 2981-2994 - Marios Belk, Efi Papatheocharous
, Panagiotis Germanakos, George Samaras:
Modeling users on the World Wide Web based on cognitive factors, navigation behavior and clustering techniques. 2995-3012 - José Luis Herrero Agustín, Pablo Carmona del Barco
:
A model-driven approach to develop high performance web applications. 3013-3023 - M. José Escalona
, Matias Urbieta, Gustavo Rossi
, J. A. García-García
, Esteban Robles Luna:
Detecting Web requirements conflicts and inconsistencies under a model-based perspective. 3024-3038 - Tihomir Orehovacki
, Andrina Granic
, Dragutin Kermek:
Evaluating the perceived and estimated quality in use of Web 2.0 applications. 3039-3059
- Zheng Li, Li Wang, Shuhui Li, Shangping Ren, Gang Quan
:
Reliability guaranteed energy-aware frame-based task set execution strategy for hard real-time systems. 3060-3070 - Andrey Maglyas, Uolevi Nikula, Kari Smolander
:
What are the roles of software product managers? An empirical investigation. 3071-3090 - Çigdem Gencel
, Kai Petersen
, Aftab Ahmad Mughal, Muhammad Imran Iqbal:
A decision support framework for metrics selection in goal-based measurement programs: GQM-DSFMS. 3091-3108 - Laura M. Castro
, Miguel A. Francisco:
A language-independent approach to black-box testing using Erlang as test specification language. 3109-3122 - Matheus Carvalho Viana, Rosângela Aparecida Dellosso Penteado, Antônio Francisco do Prado:
Domain-Specific Modeling Languages to improve framework instantiation. 3123-3139 - Neeraj Parolia, James J. Jiang, Gary Klein:
The presence and development of competency in IT programs. 3140-3150 - David Ruano-Ordás
, Jorge Fdez-Glez, Florentino Fdez-Riverola
, José Ramón Méndez
:
Effective scheduling strategies for boosting performance on rule-based spam filtering frameworks. 3151-3161 - Tosin Daniel Oyetoyan, Daniela S. Cruzes, Reidar Conradi:
A study of cyclic dependencies on defect profile of software components. 3162-3182 - Oi-Yan Lui, Kwok-Wo Wong:
Chaos-based selective encryption for H.264/AVC. 3183-3192 - Jooyoung Seo, Byoungju Choi, Sihyun Lee:
Software generated device exception for more intensive device-related software testing: An industrial field study. 3193-3212

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.