Towards a next-generation matrix library for Java (English)
- New search for: Arndt, H.
- New search for: Bundschus, M.
- New search for: Naegele, A.
- New search for: Arndt, H.
- New search for: Bundschus, M.
- New search for: Naegele, A.
In:
COMPSAC, Annual IEEE International Computer Software and Applications Conference, 33
;
460-467
;
2009
-
ISBN:
- Conference paper / Print
-
Title:Towards a next-generation matrix library for Java
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE Operations Center
-
Place of publication:Piscataway
-
Publication date:2009
-
Size:8 Seiten, 21 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based ServicesHasan, Chowdhury S. / Ahamed, Sheikh I. / Tanviruzzaman, Mohammad et al. | 2009
- 1
-
Requirements Engineering Needs in a Solution and Infrastructure Improvement ProjectSong, Xiping / Sherman, William / Hwong, Beatrice / Berenbach, Brian / Matos, Gilberto et al. | 2009
- 3
-
Rediscovering Zachman Framework Using Ontology from a Requirement Engineering PerspectiveChen, Zhuozhi / Pooley, Rob et al. | 2009
- 9
-
A Scenario-Based Architecture Evaluation Framework for Network Enabled CapabilityVenters, Colin C. / Russell, Duncan J. / Liu, Lu / Luo, Zongyang / Webster, David E. / Xu, Jie et al. | 2009
- 11
-
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy SystemsNonjur, Mehrab / Ahamed, Sheikh I. / Hasan, Chowdhury S. et al. | 2009
- 13
-
Decomposition and Traceability in Software DesignChang, Hung-Fu / Lu, Stephen C-Y. et al. | 2009
- 19
-
Panel on Requirements Engineering for ServicesRolland, Colette et al. | 2009
- 21
-
Improvements for 802.11-Based Location Fingerprinting SystemsLemelson, Hendrik / Kopf, Stephan / King, Thomas / Effelsberg, Wolfgang et al. | 2009
- 25
-
Variable Support Based Association Rule MiningAnand, Rajul / Agrawal, Ravi / Dhar, Joydip et al. | 2009
- 29
-
Enhancing the Scalability of IMS-Based Presence Service for LBS ApplicationsBellavista, Paolo / Corradi, Antonio / Foschini, Luca et al. | 2009
- 31
-
Social Graph Generation & Forecasting Using Social Network MiningSafaei, Marjaneh / Sahan, Merve / Ilkan, Mustafa et al. | 2009
- 36
-
Mobile-Agent Approach for Mobile Code Localization in Ad hoc NetworksZafoune, Youcef / Mokhtari, Aicha / Kanawati, Rushed et al. | 2009
- 37
-
Indoor Navigation on Distributed Stationary Display SystemsRuppel, Peter / Gschwandtner, Florian / Schindhelm, Corina Kim / Linnhoff-Popien, Claudia et al. | 2009
- 40
-
Implementing an Mobile Agent Platform for M-CommerceLi, Xining / Autran, Guillaume et al. | 2009
- 45
-
Aspectual Separation of Feature Dependencies for Flexible Feature CompositionLee, Kwanwoo / Botterweck, Goetz / Thiel, Steffen et al. | 2009
- 46
-
Semantic Web Enabled Composition of Semantic Web ServicesCelik, Duygu / Elci, Atilla et al. | 2009
- 52
-
An Architecture for Verification of Access Control Policies with Multi Agent System OntologiesTekbacak, Fatih / Tuglular, Tugkan / Dikenelli, Oguz et al. | 2009
- 53
-
Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down PracticeLi, Dong / Chang, Carl K. et al. | 2009
- 56
-
OWL Manipulation toward Building Semantic Applications and AgentsBalouchian, Pooyan / Almassian, Amin / Elci, Atilla et al. | 2009
- 61
-
Transforming a Software Product Company into a Service Business: Case Study at F-SecureKomssi, Marko / Kauppinen, Marjo / Heiskari, Juho / Ropponen, Matti et al. | 2009
- 62
-
Agent-Oriented Middleware for Mobile eLearning ServicesStoyanov, S. / Valkanova, V. / Ganchev, I. / O'Droma, M. / Zedan, H. et al. | 2009
- 67
-
Real-Time Guarantees in Flexible Advance ReservationsKonstanteli, Kleopatra / Kyriazis, Dimosthenis / Varvarigou, Theodora / Cucinotta, Tommaso / Anastasi, Gaetano et al. | 2009
- 67
-
Viewpoint-Oriented Variability ModelingMannion, Mike / Savolainen, Juha / Asikainen, Timo et al. | 2009
- 73
-
Respecting Temporal Constraints in Virtualised ServicesCucinotta, Tommaso / Anastasi, Gaetano / Abeni, Luca et al. | 2009
- 73
-
3D Support for Business Process SimulationEichhorn, Daniel / Koschmider, Agnes / Li, Yu / Sturzel, Peter / Oberweis, Andreas / Trunko, Ralf et al. | 2009
- 79
-
Building an Enterprise Service Bus for Real-Time SOA: A Messaging Middleware StackGarces-Erice, Luis et al. | 2009
- 81
-
An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web ServicesMei, Lijun / Chan, W. K. / Tse, T. H. / Kuo, Fei-Ching et al. | 2009
- 85
-
A Service Broker Providing Real-Time Telecommunications Services for 3rd Party ServicesBlum, N. / Boldea, I. / Magedanz, T. / Staiger, U. / Stein, H. et al. | 2009
- 89
-
A Study of Applying Extended PIE Technique to Software Testability AnalysisTsai, Tsung-Han / Huang, Chin-Yu / Chang, Jun-Ru et al. | 2009
- 92
-
A Complex Event Routing Infrastructure for Distributed SystemsWishnie, Gabe / Saiedian, Hossein et al. | 2009
- 96
-
Universal and Extensible Service-Oriented Platform Feasibility and Experience: The Service Abstract MachineEstublier, Jacky / Simon, Eric et al. | 2009
- 99
-
How Well Do Test Case Prioritization Techniques Support Statistical Fault LocalizationJiang, Bo / Zhang, Zhenyu / Tse, T. H. / Chen, T. Y. et al. | 2009
- 104
-
A Survey of Physiological Monitoring Data Models to Support the Service of Critical CareMcGregor, Carolyn / Smith, Kathleen P. et al. | 2009
- 107
-
Automatic Discovery of Web Services Based on Dynamic Black-Box TestingPark, Youngki / Jung, Woosung / Lee, Byungjeong / Wu, Chisu et al. | 2009
- 110
-
Microcontroller-Based AWGNG for Security Enhancement of Embedded Real-Time Web ServicesRahnama, Behnam / Elci, Atilla / Bakhshi, Ramin / Malek, Alirad / Ahmadi, Arjang et al. | 2009
- 115
-
An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing TechniqueNoikajana, Siripol / Suwannasart, Taratip et al. | 2009
- 116
-
Clustering Versus Shared Nothing: A Case StudyLifflancer, Jonathan / McDonald, Adam / Pilskalns, Orest et al. | 2009
- 122
-
Toward a Smart Cyber-Physical Space: A Context-Sensitive Resource-Explicit Service ModelHuang, Jian / Bastani, Farokh / Yen, I-Ling / Jeng, Jun-Jang et al. | 2009
- 124
-
An Economical Approach to Usability TestingMueller, Carl J. / Tamir, Dan / Komogortsev, Oleg V. / Feldman, Liam et al. | 2009
- 128
-
Towards Self-Manageable Cloud ServicesBrandic, Ivona et al. | 2009
- 130
-
A Sentence Generation Algorithm for Testing GrammarsZheng, Lixiao / Wu, Duanyi et al. | 2009
- 134
-
Dynamic Service and Data Migration in the CloudsHao, Wei / Yen, I-Ling / Thuraisingham, Bhavani et al. | 2009
- 136
-
Software Input Space Modeling with Constraints among ParametersVilkomir, Sergiy A. / Swain, W. Thomas / Poore, Jesse H. et al. | 2009
- 140
-
An OSGi Based In-vehicle Gateway Platform Architecture for Improved Sensor Extensibility and InteroperabilityPark, Pyungsun / Yim, Hongbin / Moon, Heeseok / Jung, Jaeil et al. | 2009
- 142
-
HEAT: An Integrated Static and Dynamic Approach for Thread Escape AnalysisChen, Qichang / Wang, Liqiang / Yang, Zijiang et al. | 2009
- 148
-
Practical Extensions of a Randomized Testing ToolJaygarl, Hojun / Chang, Carl K. / Kim, Sunghun et al. | 2009
- 148
-
Performance Impact Analysis of Two Generic Group Communication APIsSales, Leandro / Teofilo, Henrique / D'Orleans, Jonathan / Mendonca, Nabor C. / Barbosa, Rafael / Trinta, Fernando et al. | 2009
- 154
-
Asynchronous Input-Output Conformance TestingWeiglhofer, Martin / Wotawa, Franz et al. | 2009
- 154
-
Middleware for RFID Systems: An OverviewAl-Jaroodi, Jameela / Aziz, Junaid / Mohamed, Nader et al. | 2009
- 160
-
Ubá: A Software Product Line Architecture for Grid-Oriented MiddlewareOliveira, Davi / Rosa, Nelson et al. | 2009
- 160
-
Towards a Theory for Testing Non-terminating ProgramsGotlieb, Arnaud / Petit, Matthieu et al. | 2009
- 166
-
Towards Call for Testing: An Application to User Acceptance Testing of Web ApplicationsYu, Lian / Zhao, Wei / Di, Xiaofeng / Kong, Changzhu / Zhao, Wenbo / Wang, Qianxiang / Zhu, Jun et al. | 2009
- 166
-
Design of MIDA, a Web-Based Diagnostic Application for Hydroelectric GeneratorsVouligny, Luc / Hudon, Claude / Nguyen, Duc Ngoc et al. | 2009
- 172
-
An Algorithm for Mining Frequent Items on Data Stream Using Fading FactorChen, Ling / Zhang, Shan / Tu, Li et al. | 2009
- 172
-
Towards Improving OCL-Based Descriptions of Software MetricsKim, Tae Yeon / Kim, Yun Kyu / Chae, Heung Seok et al. | 2009
- 178
-
Impacts Separation Framework for Performance Prediction of Middleware-Based SystemsHuang, Xiang / Zhang, Wenbo / Zhang, Bo / Wei, Jun et al. | 2009
- 180
-
Modeling and Predicting Software Failure CostsGrottke, Michael / Graf, Christian et al. | 2009
- 188
-
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc NetworksShankaran, R. / Varadharajan, V. / Orgun, M. A. / Hitchens, M. et al. | 2009
- 190
-
A Service Discovery System Analyzed with a Queueing Theory ModelJin, Beihong / Weng, Haibin / Wen, Yunfeng / Zhang, Faen et al. | 2009
- 194
-
A Contextual Guidance Approach to Software SecuritySchugerl, Philipp / Walsh, David / Rilling, Juergen / Charland, Philippe et al. | 2009
- 199
-
A Hierarchical Reliability Model of Service-Based Software SystemWang, Lijun / Bai, Xiaoying / Zhou, Lizhu / Chen, Yinong et al. | 2009
- 200
-
AlertMe: A Semantics-Based Context-Aware Notification SystemLeonidis, Asterios / Baryannis, George / Fafoutis, Xenofon / Korozi, Maria / Gazoni, Niki / Dimitriou, Michail / Koutsogiannaki, Maria / Boutsika, Aikaterini / Papadakis, Myron / Papagiannakis, Haridimos et al. | 2009
- 206
-
A Quality-Aware Context Middleware Specification for Context-Aware ComputingLi, Yuanping / Feng, Ling et al. | 2009
- 209
-
Applicability of Software Reliability Growth Modeling in the Quality Assurance Phase of a Large Business Software VendorBeckhaus, Arne / Karg, Lars M. / Hanselmann, Gerrit et al. | 2009
- 212
-
Context Analysis of Intensional LanguagesDu, Weichang / Hamed, Khaled Ben et al. | 2009
- 216
-
Towards Transaction-Based Reliable Service CompositionsSun, Chang-ai et al. | 2009
- 218
-
Distributed Eductive Execution of Hybrid Intensional ProgramsPaquet, Joey et al. | 2009
- 222
-
Toward Middleware-Based Online Application MigrationDeng, Fang / Wang, Qianxiang / Shao, Jin et al. | 2009
- 225
-
Relaxed Objects - Object Model for Context-Aware ApplicationsKopecky, Michal et al. | 2009
- 228
-
Tool Support for Design Pattern Recognition at Model LevelZhu, Hong / Bayley, Ian / Shan, Lijun / Amphlett, Richard et al. | 2009
- 231
-
Cartesian Programming: The TransLucid Programming LanguagePlaice, John / Mancilla, Blanca et al. | 2009
- 234
-
Predicting Change Impact in Object-Oriented Applications with Bayesian NetworksAbdi, M. K. / Lounis, H. / Sahraoui, H. et al. | 2009
- 237
-
Declarative Multithreaded ProgrammingMancilla, Blanca / Plaice, John et al. | 2009
- 240
-
Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation SystemsDu, Xiaozhi / Qi, Yong / Hou, Di / Chen, Ying / Zhong, Xiao et al. | 2009
- 243
-
Formal Analysis of Services CompatibilityGong, Xueqiang / Liu, Jing / Zhang, Miaomiao / Hu, Jueliang et al. | 2009
- 246
-
Computing Reputation for Collaborative Private NetworksNin, Jordi / Carminati, Barbara / Ferrari, Elena / Torra, Vicenç et al. | 2009
- 249
-
A Perspective on Middleware-Oriented Context-Aware Pervasive SystemsJaroucheh, Zakwan / Liu, Xiaodong / Smith, Sally et al. | 2009
- 254
-
Towards the Operational Semantics of User-Centric Communication ModelsWang, Yingbo / Wu, Yali / Allen, Andrew / Espinoza, Barbara / Clarke, Peter J. / Deng, Yi et al. | 2009
- 255
-
Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and DesignOverton, Jerry / Hall, Jon G. / Rapanotti, Lucia / Yu, Yijun et al. | 2009
- 261
-
A Model-Driven Multicore Software Development Environment for Embedded SystemShih, Chihhsiong / Wu, Chien-Ting / Lin, Cheng-Yao / Hsiung, Pao-Ann / Hsueh, Nien-Lin / Chang, Chih-Hung / Koong, Chorng-Shiuh / Chu, William C. et al. | 2009
- 263
-
Software Outsourcing Subcontracting and Its Impacts: An Exploratory InvestigationWang, Yi / Shi, Huihui et al. | 2009
- 269
-
Photon: A Domain-Specific Language for Testing Converged ApplicationsMiller, Anne / Kumar, Balaji / Singhal, Anukul et al. | 2009
- 271
-
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant NetworksDefrawy, Karim El / Solis, John / Tsudik, Gene et al. | 2009
- 275
-
Using Artifact Flow Diagrams to Model Artifact Usage AnomaliesHsu, Hwai-Jung / Wang, Feng-Jian et al. | 2009
- 280
-
Hot Set Identification for Social Network ApplicationsCanali, Claudia / Colajanni, Michele / Lancellotti, Riccardo et al. | 2009
- 281
-
Dual-Container: Extending the EJB2.x Container to Support EJB3.0Wang, Ziyou / Zhou, Minghui / Cao, Donggang / Zhao, Haiyan et al. | 2009
- 286
-
An Agent-Based Framework Supporting Trust Evaluation for Service SelectionZhu, Manling / Jin, Zhi et al. | 2009
- 287
-
Best Principles in the Design of Shared SoftwareKonstantopoulos, Dino / Marien, John / Pinkerton, Mike / Braude, Eric et al. | 2009
- 292
-
A Framework for Enabling User-Controlled Persona in Online Social NetworksShin, Dongwan / Lopes, Rodrigo / Claycomb, William / Ahn, Gail-Joon et al. | 2009
- 293
-
Domain Analysis in the Reengineering Process of a COBOL SystemMillham, Richard / Yang, Hongji et al. | 2009
- 298
-
ACaMES: A Novel Design Methodology on Multicore Embedded SystemShin, Youngsam / Lee, Seungwon et al. | 2009
- 300
-
A Business-Logic Based Framework for Evolving Software SystemsAlawairdhi, Mohammed / Yang, Hongji et al. | 2009
- 305
-
ESIDE: An Integrated Development Environment for Component-Based Embedded SystemsPilkington, Nicholas T. / Li, Juncao / Xie, Fei et al. | 2009
- 306
-
A Constraint Based Bug Checking Approach for PythonChen, Lin / Xu, Baowen / Zhou, Tianlin / Zhou, Xiaoyu et al. | 2009
- 312
-
Agent Protection Based on the Use of Cryptographic HardwareMunoz, Antonio / Mana, Antonio / Harjani, Rajesh / Montenegro, Marioli et al. | 2009
- 315
-
Formalization and Verification of PLC Timers in CoqWan, Hai / Chen, Gang / Song, Xiaoyu / Gu, Ming et al. | 2009
- 318
-
Towards Usable Solutions to Graphical Password Hotspot ProblemBicakci, Kemal / Atalay, Nart Bedin / Yuceel, Mustafa / Gurbaslar, Hakan / Erdeniz, Burak et al. | 2009
- 324
-
On Information Flow Forensics in Business Application ScenariosWonnemann, Claus / Accorsi, Rafael / Muller, Günter et al. | 2009
- 324
-
System Safety Requirements as Control StructuresChen, Zhe / Motet, Gilles et al. | 2009
- 329
-
An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based SystemsWu, Zhengping / Wang, Lifeng et al. | 2009
- 332
-
Improving E-Government through Benefit Analysis and Value ModelingJuell-Skielse, Gustaf / Perjons, Erik et al. | 2009
- 335
-
A Model for Privacy Policy VisualizationGhazinour, Kambiz / Majedi, Maryam / Barker, Ken et al. | 2009
- 340
-
Traceability ReARMedDavid, Joern / Koegel, Maximilian / Naughton, Helmut / Helming, Jonas et al. | 2009
- 341
-
The Security Implication of Multiple Observers in a Distributed SystemDitch, Derek P. / McMillin, Bruce M. et al. | 2009
- 347
-
Defending Battery Exhaustion Attacks on Mobile SystemsShin, Sungyong / Lee, Taek / In, Hoh Peter et al. | 2009
- 349
-
Towards a Design Method Supporting the Alignment between Business and Software ServicesRamel, Sophie / Grandry, Eric / Dubois, Eric et al. | 2009
- 353
-
On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure SoftwareKhan, Muhammad Umair Ahmed / Zulkernine, Mohammed et al. | 2009
- 355
-
A Framework for Cost Sensitive Assessment of Intrusion Response SelectionStrasburg, Chris / Stakhanova, Natalia / Basu, Samik / Wong, Johnny S. et al. | 2009
- 359
-
A Cooperative Framework of Service Chain for Digital LibraryHuang, Meng-xing / Xing, Chun-xiao / Yang, Ji-jiang et al. | 2009
- 361
-
Applying PageRank Algorithm in Requirement Concern Impact AnalysisJin, Ying / Zhang, Jing / Ma, Pengfei / Hao, Weiping / Luo, Shutong / Li, Zepeng et al. | 2009
- 365
-
A Specialized Meta-scheduler for Business and Applications Constraints ManagementChevalier, Jérémie / Mouton, Stéphane et al. | 2009
- 367
-
Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat MessagesXu, Dongmei / Kurogi, Jun / Ohgame, Yoshihide / Hazeyama, Atsuo et al. | 2009
- 371
-
Towards Industry-Strength SLA Optimization Capabilities for Service ChainsLi, Yang et al. | 2009
- 373
-
Analyzing Semantics of Documents by Using a Program Analysis MethodSato, Hiroyuki et al. | 2009
- 376
-
Matchmaking Using Natural Language Descriptions: Linking Customers with Enterprise Service DescriptionsGeldart, Joe / Song, William / Li, Yang et al. | 2009
- 380
-
An Investigation of the Role of Service Level Agreements in Classified Advertisement WebsitesSoomro, Aijaz / Song, William / Li, Yang et al. | 2009
- 383
-
Tamper Resistance for Software Defined Radio SoftwareXiao, Shucai / Park, Jung-Min "Jerry" / Ye, Yanzhu et al. | 2009
- 386
-
Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical ImagesCohen, Fred et al. | 2009
- 392
-
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified WormsZhuang, Zhenyun / Li, Ying / Chen, Zesheng et al. | 2009
- 392
-
A Method for Historical Ext3 Inode to Filename Translation on HoneypotsFairbanks, Kevin D. / Xia, Ying H. / Owen III, Henry L. et al. | 2009
- 398
-
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?Accorsi, Rafael et al. | 2009
- 400
-
A Multiple Secret Sharing Scheme based on Matrix ProjectionWang, Kai / Zou, Xukai / Sui, Yan et al. | 2009
- 404
-
Acer Aspire One Netbooks: A Forensic ChallengeSingh, Amrit Pal / Lavine, Michael / Turnbull, Benjamin / Shiralkar, Trupti et al. | 2009
- 406
-
Exploring Security in PROFINET IOAkerberg, Johan / Bjorkman, Mats et al. | 2009
- 410
-
Penetration Testing for Spam FiltersMadhavan, Yugesh / Cangussu, João W. / Dantu, Ram et al. | 2009
- 413
-
A Static Java Birthmark Based on Control Flow EdgesLim, Hyun-il / Park, Heewan / Choi, Seokwoo / Han, Taisook et al. | 2009
- 416
-
Policy Composition Based on Petri NetsHuang, Hejiao / Kirchner, Hélène et al. | 2009
- 421
-
A Secure and Flexible Electronic-Ticket SystemKhan, M. Fahim Ferdous / Takeshi, Yashiro / So, Ito / Bessho, Masahiro / Sakamura, Ken et al. | 2009
- 422
-
Verification of Access Control Policies for REA Business ProcessesKarimi, Vahid R. / Cowan, Donald D. et al. | 2009
- 427
-
Towards a Well Structured and Dynamic Application ServerYou, Chao / Zhou, Minghui / Xiao, Zan / Mei, Hong et al. | 2009
- 428
-
Towards the Verification of Services CollaborationXie, Yue / Du, Dehui / Liu, Jing / Ding, Zuohua et al. | 2009
- 434
-
Towards Validating Security Protocol Deployment in the WildCompagna, Luca / Flegel, Ulrich / Lotz, Volkmar et al. | 2009
- 435
-
ProtoTalk: A Generative Software Engineering Framework for Prototyping Protocols in SmalltalkRazavi, Ali / Kontogiannis, Kostas et al. | 2009
- 439
-
On a Classification Approach for SOA VulnerabilitiesLowis, Lutz / Accorsi, Rafael et al. | 2009
- 443
-
Usage History-Based Architectural SchedulingKim, Dongsun / Kim, Seokhwan / Park, Sooyong et al. | 2009
- 445
-
SN2K Attacks and Honest ServicesKundu, Ashish et al. | 2009
- 451
-
PhishCatch - A Phishing Detection ToolYu, Weider D. / Nargundkar, Shruti / Tiruthani, Nagapriya et al. | 2009
- 452
-
Software Methodologies for the Engineering of Service-Oriented Industrial Automation: The Continuum ProjectMendes, J. Marco / Bepperling, Axel / Pinto, João / Leitao, Paulo / Restivo, Francisco / Colombo, Armando W. et al. | 2009
- 457
-
Adaptive Control Framework for Software Components: Case-Based Reasoning ApproachTkachuk, Mykóla / Polkovnikov, Sergii / Bronin, Sergiy et al. | 2009
- 460
-
Towards a Next-Generation Matrix Library for JavaArndt, Holger / Bundschus, Markus / Naegele, Andreas et al. | 2009
- 462
-
Modeling Simulink Diagrams Using Input/Output Extended Finite AutomataZhou, Changyan / Kumar, Ratnesh et al. | 2009
- 468
-
T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber SecurityThomas, Gregory S. / Nickless, Bill / Thiede, David R. / Gorton, Ian / Pitre, Bill J. / Christy, Jason E. / Faultersack, Liz / Mauth, Jeffery A. et al. | 2009
- 468
-
Towards Dynamic Component Updating: A Flexible and Lightweight ApproachXiao, Zan / Cao, Donggang / You, Chao / Zhou, Minghui / Mei, Hong et al. | 2009
- 473
-
A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS)Liu, Chang / Jiang, Changhai / Hu, Hai / Cai, Kai-Yuan / Huang, Dazhi / Yau, Stephen S. et al. | 2009
- 474
-
Design of Service Component Layer in SOA Reference ArchitectureZhang, Liang-Jie / Zhang, Jia et al. | 2009
- 479
-
Prevention of Sequential Message Loss in CAN SystemsJiang, Shengbing / Kumar, Ratnesh et al. | 2009
- 480
-
The Design and Implementation of a Bare PC Email ServerFord Jr., George H. / Karne, Ramesh K. / Wijesinha, Alexander L. / Appiah-Kubi, Patrick et al. | 2009
- 485
-
Risk-Based Adaptive Group Testing of Semantic Web ServicesBai, Xiaoying / Kenett, Ron S. et al. | 2009
- 486
-
Service Identification via Ontology MappingChen, Feng / Zhang, Zhuopeng / Li, Jianzhi / Kang, Jian / Yang, Hongji et al. | 2009
- 491
-
Optimizing Component-Based Embedded SoftwareLobry, Olivier / Navas, Juan / Babau, Jean-Philippe et al. | 2009
- 492
-
Towards Passive RFID EventYe, Wei / Zhao, Wen / Huang, Yu / Hu, Wenhui / Zhang, Shikun / Wang, Lifu et al. | 2009
- 497
-
Towards a Unified Behavioral Model for Component-Based and Service-Oriented SystemsCausevic, Aida / Vulgarakis, Aneta et al. | 2009
- 500
-
Estimating Rate of Queue Usage to Differentiate Cause of Packet Loss in Multi-hop Wireless NetworksPark, Mi-Young / Chung, Sang-Hwa / Sreekumari, Prasanthi et al. | 2009
- 504
-
Testing with Large Parameter Sets for the Development of Embedded Systems in the Automation DomainKantz, Florian / Ruschival, Thomas / Nenninger, Philipp / Streitferdt, Detlef et al. | 2009
- 509
-
Deployment of Services Applications in Services Execution EnvironmentsChazalet, Antonin / Lalanda, Philippe et al. | 2009
- 510
-
Transformational Specification of Complex Legacy Real-Time Systems via Semantic AnchoringLu, Yue / Cicchetti, Antonio / Bygde, Stefan / Kraft, Johan / Nolte, Thomas / Norstrom, Christer et al. | 2009
- 516
-
An Integrative Approach for Embedded Software Design with UML and SimulinkFarkas, Tibor / Neumann, Carsten / Hinnerichs, Andreas et al. | 2009
- 517
-
An Overlay-Based Resource Monitoring Scheme for Social Applications in MANETKwak, Kyungman / Huerta-Canepa, Gonzalo / Ko, Yangwoo / Lee, Dongman / Hyun, Soon J. et al. | 2009
- 522
-
'State of the Art' in Using Agile Methods for Embedded Systems DevelopmentSrinivasan, Jayakanth / Dobrin, Radu / Lundqvist, Kristina et al. | 2009
- 525
-
More Tales of Clouds: Software Engineering Research Issues from the Cloud Application PerspectiveMei, Lijun / Zhang, Zhenyu / Chan, W. K. et al. | 2009
- 528
-
Test Case Mutation in Hybrid State Space for Reduction of No-Fault-Found Test Results in the Industrial Automation DomainRuschival, Thomas / Nenninger, Philipp / Kantz, Florian / Streitferdt, Detlef et al. | 2009
- 531
-
Shift Hashing for Memory-Constrained ApplicationsDeodhar, Sushamna / Tharp, Alan L. et al. | 2009
- 534
-
Implementing an Effective Test Automation FrameworkKim, Eun Ha / Na, Jong Chae / Ryoo, Seok Moon et al. | 2009
- 537
-
Transaction Level Control for Application Execution on the SegBus PlatformSeceleanu, Tiberiu / Crnkovic, Ivica / Seceleanu, Cristina et al. | 2009
- 539
-
GUI-Based Testing of Boundary Overflow VulnerabilityTuglular, T. / Muftuoglu, C. A. / Kaya, O. / Belli, F. / Linschulte, M. et al. | 2009
- 543
-
A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFIDZhu, Jiaqi / Huang, Yu / Wang, Hanpin et al. | 2009
- 545
-
Test Selection Prioritization StrategySubramanyan, Rajesh / Budnik, Christof J. et al. | 2009
- 550
-
Automatic Testing of Program Security VulnerabilitiesShahriar, Hossain / Zulkernine, Mohammad et al. | 2009
- 553
-
Translation-Based Model Checking for PLC ProgramsZhou, Min / He, Fei / Gu, Ming / Song, Xiaoyu et al. | 2009
- 556
-
A New Mutation Analysis Method for Testing Java Exception HandlingJi, Changbing / Chen, Zhenyu / Xu, Baowen / Wang, Ziyuan et al. | 2009
- 563
-
Modular Certification of Low-Level Intermediate Representation ProgramsDong, Yuan / Wang, Shengyuan / Zhang, Liwei / Yang, Ping et al. | 2009
- 563
-
Author Index - Workshops| 2009
- 568
-
Publisher's Information - Workshops| 2009
- 571
-
Integrating System Modeling with Project Management - A Case StudyHelming, Jonas / David, Jörn / Koegel, Maximilian / Naughton, Helmut et al. | 2009
- 579
-
Efficient Temporal Blocking for Stencil Computations by Multicore-Aware Wavefront ParallelizationWellein, Gerhard / Hager, Georg / Zeiser, Thomas / Wittmann, Markus / Fehske, Holger et al. | 2009
- 587
-
Extensions for Integrated Queries on Heterogeneous Semantic Web ResourcesYang, Cheng-Zen / Chen, Ing-Xiang / Ye, Jia-Da et al. | 2009
- 599
-
Temporally Robust Software Features for Authorship AttributionBurrows, Steven / Uitdenbogerd, Alexandra L. / Turpin, Andrew et al. | 2009
- 607
-
An Augmented Social Interactive Learning Approach through Web2.0Jin, Li / Wen, Zhigang et al. | 2009
- 612
-
RHE: A Lightweight JVM Instructional ToolLiu, Shaoshan / Deng, Chengrui / Li, Xiao-Feng / Gaudiot, Jean-Luc et al. | 2009
- 620
-
The Java Data Mining Package - A Data Processing Library for JavaArndt, Holger et al. | 2009
- 622
-
Toward the Design of Robotic Software with Verifiable SafetyCheng, Chih-Hong / Rickert, Markus / Buckl, Christian / Lee, Edward A. / Knoll, Alois et al. | 2009
- 624
-
A Systematic Robot Fault-Tolerance ApproachShim, Bingu / Baek, Beomho / Park, Sooyong et al. | 2009
- 626
-
Generation of Pairwise Test Sets Using a Genetic AlgorithmMcCaffrey, James D. et al. | 2009
- 632
-
An Ontology-Based Approach for GUI TestingLi, Han / Chen, Feng / Yang, Hongji / Guo, He / Chu, William Cheng-Chung / Yang, Yuansheng et al. | 2009
- 634
-
A Fine-Grained Privacy Structure for Service-Oriented ArchitectureAllison, David S. / Yamany, Hany F. El / Capretz, Miriam A. M. et al. | 2009
- 636
-
A Multi-model Process Improvement Methodology Driven by Capability ProfilesSalviano, Clenio F. et al. | 2009
- 638
-
On Model Transformation ReuseHe, Xiao / Ma, Zhiyi / Zhang, Yan / Shao, Weizhong et al. | 2009
- 640
-
Requirement Risk Assessment Focused-On Stakeholder Risk AnalysisLi, Xiaohong / Liu, Qiang et al. | 2009
- 642
-
Industrial Opinion on the Effectiveness of Risk Management MethodsKajko-Mattsson, Mira / Lundholm, Jan / Norrby, Jonas et al. | 2009
- 644
-
A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering WorkMead, Nancy R. / Drommi, Antonio / Shoemaker, Dan / Ingalsbe, Jeff et al. | 2009
- 646
-
Industrial Report: Data Reengineering of COBOL Sequential Legacy SystemsMillham, Richard / Yang, Hongji et al. | 2009
- 648
-
Dihomotopic Reduction Used in Deadlock DetectionCape, David A. / McMillin, Bruce M. et al. | 2009
- 652
-
Towards a Resource-Aware Component Model for Embedded SystemsVulgarakis, Aneta et al. | 2009
- 656
-
Efficient Management of Consistent Backups in a Distributed File SystemStender, Jan et al. | 2009
- 660
-
Model-Checking BNDC Properties in Cyber-Physical SystemsAkella, Ravi / McMillin, Bruce M. et al. | 2009
- 664
-
On Expressing Different Concurrency Paradigms on Virtual Execution SystemsDittamo, Cristian et al. | 2009
- 668
-
A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral ResearchLin, Jing / Sedigh, Sahra / Miller, Ann et al. | 2009
- 672
-
Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral ResearchFaza, Ayman Z. / Sedigh, Sahra / McMillin, Bruce M. et al. | 2009
- 676
-
An Integrated Framework for Checking Concurrency-Related Programming ErrorsChen, Qichang / Wang, Liqiang et al. | 2009
- 681
-
Author Index - Main Conference| 2009
- 686
-
Publisher's Information - Main Conference| 2009
- C1
-
Cover Art| 2009
- i
-
Title Page i - Main Conference| 2009
- i
-
Title Page i - Workshops| 2009
- iii
-
Title Page iii - Main Conference| 2009
- iii
-
Title Page iii - Workshops| 2009
- iv
-
Copyright Page - Workshops| 2009
- iv
-
Copyright Page - Main Conference| 2009
- l
-
Panel Description: Evolution of Services Computing Curriculum and Services University| 2009
- lii
-
Panel Description: New Paradigms in Software Testing - Towards Solutions| 2009
- liv
-
Position Statement: Conventional Wisdom Works in Conventional Circumstances: Towards New Solutions to New Paradigms That Challenge Software Testing| 2009
- lvi
-
Special Roundtable Discussion: 70 Years Electronic Digital Computing That Changed The World| 2009
- v
-
Table of Contents - Workshops| 2009
- v
-
Table of Contents - Main Conference| 2009
- xiii
-
REFS 2009 Message| 2009
- xiv
-
Message from the Standing Committee Chair| 2009
- xiv
-
ESAS 2009 Message| 2009
- xix
-
ME 2009 Message| 2009
- xl
-
Joint Panel Description Emerging Pervasive Systems - Research Challenges and Proposed Solutions| 2009
- xlii
-
Panel Description: Interoperable Identity Services| 2009
- xliv
-
Position Statement: Interoperable Identity Services - “Challenges of Interoperable Identity Services for Software Services”| 2009
- xlvii
-
Position Statement: Interoperable Identity Services| 2009
- xv
-
Greetings from the General Chair| 2009
- xvi
-
Welcome from the Program Chairs| 2009
- xvii
-
Message from the Workshop Chair| 2009
- xviii
-
Conference Organization| 2009
- xviii
-
RTSOAA 2009 Message| 2009
- xx
-
SECASA 2009 Message| 2009
- xxi
-
QUORS 2009 Message| 2009
- xxii
-
STPSA 2009 Message| 2009
- xxii
-
Program Committee| 2009
- xxiii
-
BINDIS 2009 Message| 2009
- xxiv
-
CFSE 2009 Message| 2009
- xxix
-
STA 2009 Message| 2009
- xxv
-
SAPSE 2009 Message| 2009
- xxvi
-
IWSC 2009 Message| 2009
- xxvii
-
CORCS 2009 Message| 2009
- xxvii
-
Reviewers| 2009
- xxviii
-
IEESD 2009 Message| 2009
- xxxiii
-
Keynotes| 2009
- xxxix
-
2009 IEEE/IPSJ COMPSAC/SAINT Joint Concluding Plenary Panel| 2009