


default search action
J.UCS, Volume 12
Volume 12, Number 1, 2006
- Juan Carlos Augusto, Norman D. Black, H. Gerry McAllister, Paul J. McCullagh, Chris D. Nugent:

Pervasive Health Management: New Challenges for Health Informatics. 1-5 - Jean Roberts:

Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues. 6-14 - Diane J. Cook:

Health Monitoring and Assistance to Support Aging in Place. 15-29 - Haiying Zhou, Kun Mean Hou, Laurent Gineste, Christophe de Vaulx

, Jean Ponsonnaille:
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring. 30-44 - Timothy O'Sullivan, John O'Donoghue, John Herbert, Richard Studdert:

CAMMD: Context-Aware Mobile Medical Devices. 45-58 - Anthony P. Glascock, David M. Kutzik:

The Impact of Behavioral Monitoring Technology on the Provision of Health Care in the Home. 59-79 - Adel Taweel, Alan L. Rector, Jeremy Rogers:

A Collaborative Biomedical Research System. 80-98 - Zhenjiang Miao, Baozong Yuan, Mengsun Yu:

A Pervasive Multimodal Tele-Home Healthcare System. 99-114 - Chi-Chang Chang, Chuen-Sheng Cheng, Yeu-Shiang Huang:

A Web-Based Decision Support System for Chronic Diseases. 115-125
Volume 12, Number 2, 2006
- Hermann A. Maurer:

Managing Editor's Column. 126- - Ahmad Almonayyes:

Multiple Explanations Driven Naïve Bayes Classifier. 127-139 - Pranay Chaudhuri, Thomas Edward:

An O(vn) Distributed Mutual Exclusion Algorithm Using Queue Migration. 140-159 - Ping-Yu Hsu, Ping-Ho Ting:

POCA : A User Distributions Algorithm in Enterprise Systems with Clustering. 160-186 - Josef Kolbitsch, Hermann A. Maurer:

The Transformation of the Web: How Emerging Communities Shape the Information we Consume. 187-213 - Belhassen Zouari:

A Structure Causality Relation for Liveness Characterisation in Petri Nets. 214-232
Volume 12, Number 3, 2006
- José Bravo, Xavier Alamán, Teresa Riesgo:

Ubiquitous Computing and Ambient Intelligence: New Challenges for Computing. 233-235 - Lidia Fuentes, Daniel Jiménez, Mónica Pinto:

Development of Ambient Intelligence Applications using Components and Aspects. 236-251 - Monica Tentori, Jesús Favela, Víctor M. González:

Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications. 252-269 - José Bravo, Ramón Hervás, Inocente Sánchez, Gabriel Chavira, Salvador W. Nava:

Visualization Services in a Conference Context: An Approach by RFID Technology. 270-283 - Pablo A. Haya, Germán Montoro, Abraham Esquivel, Manuel García-Herranz, Xavier Alamán:

A Mechanism for Solving Conflicts in Ambient Intelligent Environments. 284-296 - Diego López de Ipiña, Juan Ignacio Vázquez, Daniel García, Javier Fernández, Iván García, David Sainz, Aitor Almeida:

EMI2lets: A Reflective Framework for Enabling AmI. 297-314 - Felix Jesús Villanueva, David Villa, Francisco Moya, Jesús Barba, Fernando Rincón, Juan Carlos López:

Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments. 315-317 - Jorge Portilla, Angel de Castro, Eduardo de la Torre, Teresa Riesgo:

A Modular Architecture for Nodes in Wireless Sensor Networks. 328-339 - Celeste Campo, Florina Almenárez, Daniel Díaz Sánchez, Carlos García-Rubio, Andrés Marín López:

Secure Service Discovery based on Trust Management for ad-hoc Networks. 340 - Ignacio Nieto-Carvajal, Juan A. Botía Blaya, Antonio Fernandez Gómez-Skarmeta:

Information and Hybrid Architecture Model of the OCP Contextual Information Management System. 357-366
Volume 12, Number 4, 2006
- Nadia Nedjah, Luiza de Macedo Mourelle:

Evolvable Hardware. 367-369 - Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi:

A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip. 370-394 - Nadia Nedjah, Luiza de Macedo Mourelle:

Pareto-Optimal Hardware for Substitution Boxes. 395-407 - Ajith Abraham, Crina Grosan:

Automatic Programming Methodologies for Electronic Hardware Fault Monitoring. 408-431 - Tonio Biondi, Angelo Ciccazzo, Vincenzo Cutello, Santo D'Antona, Giuseppe Nicosia, Salvatore Spinella:

Multi-Objective Evolutionary Algorithms and Pattern Search Methods for Circuit Design Problems. 432-449 - Fernando Ciriaco, Taufik Abrão, Paul Jean Etienne Jeszensky:

DS/CDMA Multiuser Detection with Evolutionary Algorithms. 450-480
Volume 12, Number 5, 2006
- Hermann A. Maurer:

Managing Editor's Column. 481 - Doron Drusinsky:

On-line Monitoring of Metric Temporal Logic with Time-Series Constraints Using Alternating Finite Automata. 482-498 - Luis Antonio Brasil Kowada, Renato Portugal, Celina M. H. de Figueiredo:

Reversible Karatsuba's Algorithm. 499-511 - Maurice Margenstern:

About an Algorithmic Approach to Tilings {p, q} of the Hyperbolic Plane. 512-550 - Tobias Riege, Jörg Rothe:

Completeness in the Boolean Hierarchy: Exact-Four-Colorability, Minimal Graph Uncolorability, and Exact Domatic Number Problems - a Survey. 551-578
Volume 12, Number 6, 2006
- Jörg Rothe, Hiroki Arimura:

Computational Challenges of Massive Data Sets and Randomness in Computation (J.UCS Special Issue on the First and Second Japanese-German Frontiers of Science Symposia). 579-580 - Benjamin Blankertz

, Guido Dornhege, Steven Lemm, Matthias Krauledat, Gabriel Curio, Klaus-Robert Müller
:
The Berlin Brain-Computer Interface: Machine Learning Based Detection of User Specific Brain States. 581-607 - Kazuyuki Nakamura, Tomoyuki Higuchi, Naoki Hirose:

Sequential Data Assimilation: Information Fusion of a Numerical Simulation and Large Scale Observation Data. 608-626 - Einoshin Suzuki:

Data Mining Methods for Discovering Interesting Exceptions from an Unsupervised Table. 627-653 - Johannes Blömer:

Randomness and Secrecy - A Brief Introduction. 654-671 - Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, Takuji Nishimura:

Pseudorandom Number Generation: Impossibility and Compromise. 672-690 - Akinori Kawachi, Takeshi Koshiba:

Progress in Quantum Computational Cryptography. 691-709 - Beate Bollig:

Testing Membership in Formal Languages Implicitly Represented by Boolean Functions. 710-724 - Tobias Riege, Jörg Rothe:

Improving Deterministic and Randomized Exponential-Time Algorithms for the Satisfiability, the Colorability, and the Domatic Number Problem. 725-745 - Harald Hempel:

Randomized Algorithms and Complexity Theory. 746-761
Volume 12, Number 7, 2006
- Mariza Andrade da Silva Bigonha, Alex de Vasconcellos Garcia:

Selected Papers from SBLP 2006: The 10th Brazilian Symposium on Programming Languages. 762 - Anderson Faustino da Silva, Vítor Santos Costa:

The Design of the YAP Compiler: An Optimizing Compiler for Logic Programming Languages. 764-787 - Anderson Faustino da Silva, Vítor Santos Costa:

Our Experiences with Optimizations in Sun's Java Just-In-Time Compilers. 788-810 - Eduardo Kessler Piveta, Marcelo Victora Hecht, Marcelo Soares Pimenta, Roberto Tom Price:

Detecting Bad Smells in AspectJ. 811-827 - Nuno F. Rodrigues, Luís Soares Barbosa:

Program Slicing by Calculation. 828-848 - Markus Schordan:

The Language of the Visitor Design Pattern. 849-867 - André Rauber Du Bois, Philip W. Trinder, Hans-Wolfgang Loidl:

Strong Mobility in Mobile Haskell. 868-884 - Alcides Calsavara, Aaron Borges, Leonardo Nunes

, Diogo Variani, Carlos Kolb:
An Object Model for Interoperable Systems. 885-902 - Martin A. Musicante, Edinardo Potrich:

Expressing Workflow Patterns for Web Services: The Case of PEWS. 903-921 - Paula R. Ribeiro, Marco Antonio Barbosa, Luís Soares Barbosa:

Generic Process Algebra: A Programming Challenge. 922-937 - Rodrigo Machado, Álvaro Freitas Moreira, Renata de Matos Galante, Mirella Moura Moro:

Type-safe Versioned Object Query Language. 938-957 - Júlio Henrique Araújo Pereira Machado, Paulo Blauth Menezes:

Defining Atomic Composition in UML Behavioral Diagrams. 958-979
Volume 12, Number 8, 2006
- Hermann A. Maurer:

Managing Editor's Column. 980 - Wan J. Fokkink, Jun Pang:

Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM. 981-1006 - Angela French, José Nelson Amaral:

Eliminating Redundant Join-Set Computations in Static Single Assignment. 1007-1019 - Manuel A. Martins:

Behavioral Institutions and Refinements in Generalized Hidden Logics. 1020-1049 - Hermann A. Maurer, Frank Kappe, Bilal Zaka:

Plagiarism - A Survey. 1050-1084
Volume 12, Number 9, 2006
- Attila Pethö, Dezsö Sima:

Informatics in Higher Education. 1085-1086 - Ágnes Achs:

Creation and Evaluation of Fuzzy Knowledge-base. 1087-1103 - Attila Adamkó:

UML-Based Modeling of Data-oriented WEB Applications. 1104-1117 - Peter Antal, Norbert Bátfai, István Fazekas, Péter Jeszenszky:

The mobiDÁIK Educational Portal. 1118-1127 - Balázs Benyó, Miklós F. Hatwágner, Tamás Heckenast, Katalin Kovács, Ágnes Varga, Norbert Varjasi:

Design and Implementation of Enum-Based Services. 1128-1138 - Tamás Bérczes, János Sztrik:

Performance Modeling of Proxy Cache Servers. 1139-1153 - József Berke, Zsolt Polgár, Zoltán Horváth, Tamás Nagy:

Developing on Exact Quality and Classification System for Plant Improvement. 1154-1164 - Antal Buza:

Extension of CQL over Dynamic Databases. 1165-1176 - Miklós Espák:

Japlo: Rule-based Programming on Java. 1177-1189 - Maria Fazekas:

Analysing Data of Childhood Acute Lymphoid Leukaemia by Seasonal Time Series Methods. 1190-1195 - Nándor Fodor:

4M - Software for Modelling and Analysing Cropping Systems. 1196-1207 - Pawel Gocek, Michael Hartmann, Heinz Schleusener:

Modern Technologies in Client-Server Architecture for Geo-based Interactive Web Portals. 1208-1214 - János Gonda:

The Number of the Modulo n Roots of the Polynomial xv - xv and the RSA. 1215-1228 - András Hajdu, János Kormos, Zsolt Lencse, Lajos Trón, Miklós Emri:

The "MEDIP-Platform Independent Software System for Medical Image Processing" Project. 1229-1239 - András Hajdu, János Kormos, Tamás Tóth, Kristian Vereb:

Applications of Neighborhood Sequence in Image Processing and Database Retrieval. 1240-1253 - László Horváth, Imre J. Rudas:

Course Modeling for Student Profile Based Flexible Higher Education on the Internet. 1254-1266 - István Koós:

Mathematical Models of Endocrine Systems. 1267-1277 - Ildikó László, Ferenc Schipp, Samuel P. Kozaitis:

Construction of Wavelets and Applications. 1278-1291 - Tamás Lukovszki, Christian Schindelhauer, Klaus Volbert:

Resource Efficient Maintenance of Wireless Network Topologies. 1292-1311 - Benedek Nagy, László Szegedi:

Membrane Computing and Graphical Operating Systems. 1312-1331 - Ferenc Nagy:

Parameter Estimation of the Cauchy Distribution in Information Theory Approach. 1332-1344 - Péter Nagy, Istvan Pintér, Mihály Bagány:

Phasetransition-like Changes in Human Visual Information Processing. 1345-1357 - Robert Sinka:

Primary School Teachers in the Information Society. 1358-1372 - Péter Takács:

The Additional Examination of the Kudo-Mathuria Time-Release Protocol. 1373-1384 - József Tick, Zoltán Kovács, Ferenc Friedler:

Synthesis of Optimal Workflow Structure. 1385-1392 - Tibor Tóth, Ferenc Erdélyi:

Systems Engineering: A New Approach to Complex IT-based Technological Systems in Engineering Education. 1393-1404 - Katalin Pásztor-Varga, Magda Várterész:

Computer Science, Logic, Informatics Education. 1405-1410
Volume 12, Number 10, 2006
- Hermann A. Maurer:

Managing Editor's Column. 1411-1412 - Narjes Berregeb:

Proving Properties for Behavioural Specifications with Term Observation. 1413-1425 - Li-min Liu, Tian-Shyr Dai:

Ridge Orientation Estimation and Verification Algorithm for Fingerprint Enhancement. 1426-1438 - Rajasvaran Logeswaran:

Fault Tolerant Neural Predictors for Compression of Sensor Telemetry Data. 1439-1454 - Remco Loos:

Time-varying H Systems Revisited. 1455-1463
Volume 12, Number 11, 2006
- Francisco Javier López-Fraguas:

Programming and Languages. 1464-1465 - Antonio J. Fernández

, Patricia M. Hill:
An Interval Constraint Branching Scheme for Lattice Domains. 1466-1499 - Maryam Bavarian, Verónica Dahl:

Constraint Based Methods for Biological Sequence Analysis. 1500-1520 - David de Frutos-Escrig, Carlos Gregorio-Rodríguez

:
Process Equivalences as Global Bisimulations. 1521-1550 - María Alpuente

, María-del-Mar Gallardo, Ernesto Pimentel, Alicia Villanueva:
Verifying Real-Time Properties of tccp Programs. 1551-1573 - Jaime Sánchez-Hernández:

Constructive Failure in Functional-Logic Programming: From Theory to Implementation. 1574-1593 - José Miguel Cleva, Isabel Pita:

Verification of CRWL Programs with Rewriting Logic. 1594-1617 - Manuel Clavel, Miguel Palomino, Adrián Riesco:

Introducing the ITP Tool: a Tutorial. 1618-1650 - Jesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Francisco J. Enciso-Baños:

Magic Sets for the XPath Language. 1651-1678 - Pascual Julián, Ginés Moreno, Jaime Penabad:

Operational/Interpretive Unfolding of Multi-adjoint Logic Programs. 1679-1699
Volume 12, Number 12, 2006
- Hermann A. Maurer:

Managing Editor's Column. 1700 - César Domínguez, Julio Rubio, Francis Sergeraert:

Modeling Inheritance as Coercion in the Kenzo System. 1701-1730 - Narayanan Kulathuramaiyer, Wolf-Tilo Balke:

Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly. 1731-1740 - Pascal Poizat, Jean-Claude Royer:

A Formal Architectural Description Language based on Symbolic Transition Systems and Temporal Logic. 1741-1782 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:

Persian/Arabic Baffletext CAPTCHA. 1783-1796

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














