default search action
Journal of Software, Volume 3
Volume 3, Number 1, January 2008
- Ramya Ravichandar, James D. Arthur:
Cohesion, Coupling and Abstraction Level: Criteria for Capability Identification. 1-8 - Stefan Böttcher, Sebastian Obermeier:
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants. 9-17 - Georg Treu, Florian Fuchs, Christiane Dargatz:
Implicit Authorization for Social Location Disclosure. 18-26 - Dalia El-Mansy, Ahmed Sameh:
A Collaborative Inter-Data Grid Strong Semantic Model with Hybrid Namespace. 27-40 - Roger L. Goodwin:
An Algorithm for Documenting Relationships in a Set of Reports. 41-48 - Oliver Thomas:
Design and Implementation of a Version Management System for Reference Modeling. 49-62 - Isak Taksa, Amanda Spink, Robert Goldberg:
A Task-oriented Approach to Search Engine Usability Studies. 63-73 - Pedro J. Clemente, Juan Hernández, Fernando Sánchez:
Extending Component Composition Using Model Driven and Aspect-Oriented Techniques. 74-86
Volume 3, Number 2, February 2008
- Mikhail Perepletchikov, Caspar Ryan, Keith Frampton, Heinz W. Schmidt:
Formalising Service-Oriented Design. 1-14 - Mehdi Talbi, Meriam Ben Ghorbel, Mohamed Mejri:
Intrusion Detection Prototype Based on ADM-Logic. 15-22 - Bernhard Riedl, Veronika Grascher, Thomas Neubauer:
A Secure e-Health Architecture based on the Appliance of Pseudonymization. 23-32 - Albert D. Bethke:
Representing Procedural Logic in XML. 33-40 - Nathir A. Rawashdeh, Shaun T. Love, Kevin D. Donohue:
Hierarchical Image Segmentation by Structural Content. 41-51 - Raheleh B. Dilmaghani, Ramesh R. Rao:
Hybrid Wireless Mesh Network with Application to Emergency Scenarios. 52-60 - Nianen Chen, Shangping Ren:
Architecture Support for Behavior-based Adaptive Checkpointing. 61-68 - Marcílio Mendonça, Donald D. Cowan, William Malyk, Toacy Cavalcante de Oliveira:
Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis. 69-82
Volume 3, Number 3, March 2008
- Tieyan Li, Guilin Wang, Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. 1-10 - Bogdan Groza:
Broadcast Authentication with Practically Unbounded One-way Chains. 11-20 - Martijn Warnier, Frances M. T. Brazier, Anja Oskamp:
Security of Distributed Digital Criminal Dossiers. 21-29 - Clinton W. Smullen III, Stephanie A. Smullen:
An Experimental Study of AJAX Application Performance. 30-37 - Gheorghe Tecuci, Mihai Boicu, Dorin Marcu, Marcel Barbulescu, Cristina Boicu, Vu Le, Thomas Hajduk:
Teaching Virtual Experts for Multi-Domain Collaborative Planning. 38-59 - Tien N. Nguyen:
Managing Software Architectural Evolution at Multiple Levels of Abstraction. 60-70 - Marcus Tönnis, Jan-Gregor Fischer, Gudrun Klinker:
From Sensors to Assisted Driving - Bridging the Gap. 71-82 - Kamran Sheikh, Maarten Wegdam, Marten van Sinderen:
Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. 83-93
Volume 3, Number 4, April 2008
- Sajjan G. Shiva, Lubna Abou Shala:
Using Semantic Wikis to Support Software Reuse. 1-8 - Viet Hung Nguyen, Tran Khanh Dang:
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases. 9-16 - Simon Samwel Msanjila, Hamideh Afsarmanesh:
On Architectural Design of TrustMan System Applying HICI Analysis Results - The case of technological perspective in VBEs. 17-30 - Jeffrey A. Livermore:
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology. 31-36 - D'Arcy Walsh, Francis Bordeleau, Bran Selic:
A Constraint-Driven Executable Model of Dynamic System Reconfiguration. 37-50 - Nipan Maniar, Emily Bennett, Steve Hand, George Allan:
The Effect of Mobile Phone Screen Size on Video Based Learning. 51-61 - Michael Eisenberg, Leah Buechley:
Pervasive Fabrication: Making Construction Ubiquitous in Education. 62-68
Volume 3, Number 5, May 2008
- Thomas W. Hall:
Is SOA Superior? Evidence from SaaS Financial Statements. 1-10 - Jehad Al-Dallal, Paul G. Sorenson:
Testing Software Assets of Framework-Based Product Families During Application Engineering Stage. 11-25 - Ali R. Sharafat, Ladan Tahvildari:
Change Prediction in Object-Oriented Software Systems: A Probabilistic Approach. 26-39 - Anders Moen Hagalisletto:
Deciding the Correctness of Attacks on Authentication Protocols. 40-54 - Jimmy McGibney, Dmitri Botvich:
A Trust Based System for Enhanced Spam Filtering. 55-64 - M. J. Basavaraj, K. C. Shet:
Empirical validation of Software development effort multipliers of Intermediate COCOMO Model. 65-71
Volume 3, Number 6, June 2008
- Yoshinobu Tamura, Shigeru Yamada:
Component-oriented Reliability Analysis and Optimal Version-upgrade Problems for Open Source Software. 1-8 - Yu Zhang:
A Role-Based Approach in Dynamic Task Delegation in Agent Teamwork. 9-20 - Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Rajiullah, Prashanta Man Shrestha:
Constraint-based Trend Template for Intrusion Detection. 21-28 - Carlos A. B. Mello, Luciana A. Schuler:
Thresholding Images of Historical Documents Using a Tsallis-Entropy Based Algorithm. 29-36 - Takayuki Tsuchida, Teppei Shimada, Tatsuo Tsuji, Ken Higuchi:
Information Storage and Retrieval Schemes for Recycling Products. 37-45 - Shinsuke Tamura, Kazuya Kouro, Masatoshi Sasatani, Kazi Md. Rokibul Alam, Hazim Anas Haddad:
An Information System Platform for Anonymous Product Recycling. 46-56 - Michel dos Santos Soares, Jos L. M. Vrancken:
Model-Driven User Requirements Specification using SysML. 57-68 - Haibin Zhu, Rob Alkins, Matthew Grenier:
Role-Based Chatting. 69-78
Volume 3, Numbers 7, October 2008
- George J. Sun:
Introducing the New Editor-in-Chief of the Journal of Software. 1 - Ashraf S. Hussein:
Analysis and Visualization of Gene Expressions and Protein Structures. 2-11 - M. J. Basavaraj, K. C. Shet:
Estimating and Prediction of Turn around Time for Incidents in Application Service Maintenance Projects. 12-21 - Jongwook Woo, MinSeok Jang:
The Comparison of WML, cHTML, and XHTML-MP in m-Commerce. 22-29 - Bridget Meehan, Girijesh Prasad, T. Martin McGinnity:
An Application Directed Adaptive Framework for Autonomic Software. 30-41 - Gary Giger, Mahmut T. Kandemir, John E. Dzielski:
Graphical Mission Specification and Partitioning for Unmanned Underwater Vehicles. 42-54
Volume 3, Numbers 8, November 2008
- Jason C. Hung:
Forward. 1-2 - Chuan-Feng Chiu, Steen J. Hsu, Sen-Ren Jan:
An Intelligent Home Environment based on Service Planning over Peer-to-Peer Overlay Network. 3-10 - Xiangfeng Luo, Kai Yan, Xue Chen:
Automatic Discovery of Semantic Relations Based on Association Rule. 11-18 - Pozung Chen, Chu-Hao Sun, Shih-Yang Yang:
Modeling and Analysis the Web Structure Using Stochastic Timed Petri Nets. 19-26 - WenYing Guo:
Reasoning with Semantic Web Technologies in Ubiquitous Computing Environment. 27-33 - Runhe Huang, Kei Nakanishi, Jianhua Ma, Bernady O. Apduhan:
An Object-oriented Design and Push Web Server based Framework for Physical Object Interactions and Services. 34-41 - Han-Bin Chang, Hsuan-Pu Chang, Jason C. Hung:
Interactive Traveling Assistant based on Agent Technologies and Mobile Computing. 42-48 - Chun-Liang Hsu, Wei-Bin Wu:
The Practical Design of Constructing Data Transition Interface with ZigBee WSN and RS-485 Wired Interface - Example with Small-scaled Wind-power Electricity Generator System. 49-56 - Jason C. Hung, Chun-Hong Huang, Yi-Chun Liao, Nick C. Tang, Ta-Jen Chen:
Exemplar-based Image Inpainting base on Structure Construction. 57-64 - Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih:
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments. 65-72 - Wen-Hsing Kao, Jason C. Hung, Victoria Hsu:
Using Data Mining in MURA Graphic Problems. 73-79
Volume 3, Numbers 9, December 2008
- Fei Yu, Chin-Chen Chang, Ben M. Chen, Yongjun Chen, Zhigang Chen:
Editorial. 1-2 - Xiaoming Zhang:
Segmenting Histogram-based Robust Audio Watermarking Approach. 3-11 - Mukun Cao, Yuqiang Feng:
Reasoning Principles for Negotiating Agent. 12-19 - Jun Zhai, Yiduo Liang, Yi Yu, Jiatao Jiang:
Semantic Information Retrieval Based on Fuzzy Ontology for Electronic Commerce. 20-27 - Ling Wang, Xiuting Wang, Jingqi Fu, Lanlan Zhen:
A Novel Probability Binary Particle Swarm Optimization Algorithm and Its Application. 28-35 - Shuying Yan, Jing Wang, Chen Liu, Lei Liu:
An Approach to Discover Dependencies between Service Operations. 36-43 - Han Zhu, Yonggen Gu, Xiaohong Wu:
An Open Approach for the Applied Pi Calculus. 44-51 - Chunhua Yang, Haiyang Wang:
Formal Models for Architecture Aspects and Their Weaving. 52-59 - Tung-Hsiang Chou, Yu-Min Lee:
Integrating E-services with a Telecommunication E-commerce using Service-Oriented Architecture. 60-67 - Solahuddin B. Shamsuddin, Michael E. Woodward:
Applying Knowledge Discovery in Database Techniques in Modeling Packet Header Anomaly Intrusion Detection Systems. 68-76 - Xuejiao Liu, Debao Xiao, Xi Peng:
Towards a Collaborative and Systematic Approach to Alert Verification. 77-84
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.