


default search action
30th EUROMICRO 2004: Rennes, France
- 30th EUROMICRO Conference 2004, 31 August - 3 September 2004, Rennes, France. IEEE Computer Society 2004, ISBN 0-7695-2199-1

Keynote
- Hendrik Berndt:

Mobile Adventure - Towards 4Generation Mobile System. 2
Component Based Software Engineering
Session: Components for Real-Time and Embedded Systems
- Tullio Vardanega

, Marco Di Natale, Silvia Mazzini, Massimo D'Alessandro:
Component-Based Real-Time Design: Mapping HRT-HOOD to UML. 6-13 - Manuel Díaz, Daniel Garrido

, Luis Llopis
, Francisco Rus, José M. Troya:
Integrating Real-time Analysis in a Component Model for Embedded Systems. 14-21 - Evgeni M. Eskenazi, Alexandre V. Fioukov, Dieter K. Hammer, J. Henk Obbink, Ben J. Pronk:

Analysis and Prediction of Performance for Evolving Architectures. 22-31 - De-Jiu Chen, Martin Törngren:

A Systematic Approach for Identifying Operational Relationships in Embedded Computer Control Systems. 32-39 - Egor Bondarev, Johan Muskens, Peter H. N. de With, Michel R. V. Chaudron, Johan Lukkien:

Predicting Real-Time Properties of Component Assemblies: A Scenario-Simulation Approach. 40-47 - Florence Maraninchi, Lionel Morel:

Logical-Time Contracts for Reactive Embedded Components. 48-55 - Anders Möller, Mikael Åkerholm, Johan Fredriksson, Mikael Nolin:

Evaluation of Component Technologies with Respect to Industrial Requirements. 56-63
Session: Component Compositions
- Nicolas Belloir

, Fabien Romeo, Jean-Michel Bruel:
Whole-Part based Composition Approach: A Case Study. 66-73 - Hamdan Msheik, Alain Abran, Eric Lefebvre:

Compositional Structured Component Model: Handling Selective Functional Composition. 74-81
Session: Components and Quality Attributes
- Miguel A. de Miguel

, M. Teresa Higuera-Toledano:
Runtime Management of Quality Specification for QoS-Aware Components. 84-91 - Steffen Zschaler:

Towards a Semantic Framework for Non-functional Specifications of Component-Based Systems. 92-99 - Jane Jayaputera, Iman Poernomo, Heinz W. Schmidt:

Runtime Verification of Timing and Probabilistic Properties using WMI and .NET. 100-106
Session: COTS Components
- Sven Overhage, Peter Thomas:

A Business Perspective on Component Trading: Criteria, Immaturities, and Critical Success Factors. 108-117 - Gemma Grau, Juan Pablo Carvallo, Xavier Franch

, Carme Quer:
DesCOTS: A Software System for Selecting COTS Components. 118-126 - Mourad Alia, Romain Lenglet, Thierry Coupaye, Alexandre Lefebvre:

Querying Reflexive Component-Based Architectures. 127-134
Session: Development Environment and Tools
- Gergely Pintér, István Majzik

:
Impact of Statechart Implementation Techniques on the Effectiveness of Fault Detection Mechanisms. 136-143 - Yves Mahéo, Frédéric Guidec, Luc Courtrai:

Middleware Support for the Deployment of Resource-Aware Parallel Java Components on Heterogeneous Distributed Platforms. 144-151 - Daniel Lucrédio, Antônio Francisco do Prado, Eduardo Santana de Almeida:

A Survey on Software Components Search and Retrieval. 152-159
Session: CBSE Processes and Modeling
- John Edward Hutchinson, Gerald Kotonya, Ian Sommerville, Steve Hall:

A Service Model for Component-Based Development. 162-169 - Gernot Schmoelzer, Egon Teiniker, Stefan Mitterdorfer, Christian Kreiner, Zsolt Kovács, Reinhold Weiss:

Model-Driven Development of Recursive CORBA Component Assemblies. 170-175 - Hugo Vidal Teixeira, Regina M. M. Braga, Cláudia Maria Lima Werner:

Model-Based Generation of Business Component Architectures. 176-183
Multimedia and Telecommunications
Session: Quality of Service
- Enrique Hernández-Orallo, Joan Vila i Carbó, Sergio Sáez

, Silvia Terrasa:
Provisioning Expedited Forwarding DiffServ Channels using Multimedia Aggregates. 188-195 - Gerhard Haßlinger:

Implications of Traffic Characteristics on Quality of Service in Broadband Multi Service Networks. 196-204 - Frank A. Zdarsky, Jens B. Schmitt:

Handover in Mobile Communication Networks: Who is in Control Anyway?. 205-212
Session: Content Distribution
- Josep Domenech

, Ana Pont, Julio Sahuquillo, José A. Gil:
An Experimental Framework for Testing Web Prefetching Techniques. 214-221 - Emmanuel Papaioannou, Vasilis Karagianis, Kostas Karpouzis, Hervé Guillemot, Athanasios M. Demiris, Philippe de Cuetos, Nikolaos Ioannidis:

Melisa - A Distributed Multimedia System for Multi-Platform Interactive Sports Content Broadcasting. 222-229
Session: Streaming
- Jinhwan Kim, Bonggyou Lee, Yong Ho Song:

Priority-Driven Scheduling and Bandwidth Allocation for MPEG-2 Decoding. 232-239 - Michael Zink

, Andreas Mauthe:
P2P Streaming using Multiple Description Coded Video. 240-247 - Oussama Layaida, Slim Ben Atallah, Daniel Hagimont:

Reconfiguration-based QoS Management in Multimedia Streaming Applications. 248-255
Session: IP Telephony
- Markus Hillenbrand, Ge Zhang:

A Web Services Based Framework for Voice over IP. 258-264 - Ge Zhang, Markus Hillenbrand:

Implementing SIP and H.323 Signalling as Web Services. 265-271 - Manuel Görtz, Ralf Ackermann, Ralf Steinmetz

:
Enhanced SIP Communication Services by Context Sharing. 272-279
Session: Service Oriented Architecture
- Marcelo Bagnulo

, Juan Fco. Rodríguez-Hervella, Alberto García-Martínez
, Arturo Azcorra:
Multi-Homing Tunnel Broker. 282-289 - Cássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero:

A Framework for Protecting Web Sevices with IPsec. 290-297 - Bernd Reuther, Dirk Henrici

, Markus Hillenbrand:
DANCE: Dynamic Application Oriented Network Services. 298-305
Software Process and Product Improvement
Session: Agile Methods
- Outi Salo:

Improving Software Process in Agile Software Development Projects: Results from Two XP Case Studies. 310-317 - Ralph-Johan Back, Piia Hirkman, Luka Milovanov:

Evaluating the XP Customer Model and Design by Contract. 318-325 - Sylvia Ilieva

, Penko Ivanov
, Eliza Stefanova
:
Analyses of an Agile Methodology Implementation. 326-333 - Grigori Melnik, Frank Maurer:

Introducing Agile Methods: Three Years of Experience. 334-341 - Jukka Kääriäinen

, Juha Koskela, Pekka Abrahamsson, Juha Takalo:
Improving Requirements Management in Extreme Programming with Tool Support - An Improvement Attempt that Failed. 342-351
Session: Measurement and Empirical Software Engineering
- Marcus Ciolkowski, Dirk Muthig, Jörg Rech:

Using Academic Courses for Empirical Validation of Software Development Processes. 354-361 - Dietmar Winkler, Michael Halling, Stefan Biffl:

Investigating the Effect of Expert Ranking of Use Cases for Design Inspection. 362-371 - Johan Muskens, Michel R. V. Chaudron, Christian Lange:

Investigations in Applying Metrics to Multi-View Architecture Models. 372-379 - Sang-Pok Ko, Hak-Kyung Sung, Kyung-Whan Lee:

Study to Secure Reliability of Measurement Data through Application of Game Theory. 380-386
Session: Web Engineering
- Bettina Biel, Matthias Book, Volker Gruhn, Dirk Peters, Clemens Schäfer:

Handling Backtracking in Web Applications. 388-395 - Zakaria Maamar, Ghazi AlKhatib

, Soraya Kouadri Mostéfaoui, Mohammed Lahkim, Wathiq Mansoor:
Context-based Personalization of Web Services Composition and Provisioning. 396-403 - Ananth Srinivasan, David Sundaram:

Web Services for Enterprise Collaboration: A Framework and a Prototype. 404-411 - Jason Novotny, Michael Russell, Oliver Wehrens:

GridSphere: An Advanced Portal Framework. 412-419
Session: SPPI Single Papers
- Drazen Milicic, Claes Wohlin:

Distribution Patterns of Effort Estimations. 422-429 - Stig Larsson, Ivica Crnkovic

, Fredrik Ekdahl:
On the Expected Synergies between Component-Based Software Engineering and Best Practices in Product Integration. 430-436 - Alexander Schatten, Stefan Biffl:

Towards an Event-Driven Workplace for Knowledge Integration. 437-446
Special Session: New Challenges in Media Security
- Jana Dittmann, Claus Vielhauer:

Introduction from Session Chairs: New Challenges in Media Security. 448-448 - David Megías, Jordi Herrera-Joancomartí

, Julià Minguillón
:
A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM Formats. 449-452 - Danny Hesse, Jana Dittmann, Andreas Lang:

Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. 453-456 - Stefan Thiemert, Thomas Vogel, Jana Dittmann, Martin Steinebach:

A High-Capacity Block Based Video Watermark. 457-460 - Andreas Hess, Jirka Klaue:

A Video-Spam Detection Approach for Unprotected Multimedia Flows based on Active Networks. 461-465
Special Session: Advances in Web Computing
- Konrad Klöckner:

Introduction from the Session Chair: Advances in Web Computing. 468-468 - Schahram Dustdar

, Pascal Fenkam:
Formally Designing Web Services for Mobile Team Collaboration. 469-476 - Thierry Delaitre, Ariel Goyeneche, Péter Kacsuk, Tamás Kiss

, Gábor Terstyánszky, Stephen C. Winter:
GEMLCA: Grid Execution Management for Legacy Code Architecture Design. 477-483 - Ulrich Meissen, Stefan Pfennigschmidt, Tjark Wahnfried, Kurt Sandkuhl

:
Situation-based Message Rating in Information Logistics and its Applicability in Collaboration Scenarios. 484-491
Special Session: Wireless Sensor Networks
- Utz Roedig:

Session Introduction: Wireless Sensor Networks. 494-494 - Matthias Hollick

, Ivan Martinovic, Tronje Krop, Ivica Rimac:
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks. 495-502 - Utz Roedig, André M. Barroso, Cormac J. Sreenan:

Determination of Aggregation Points in Wireless Sensor Networks. 503-510
Special Session: Different Aspects of Security
- Sonja Hof:

Introduction by Session Chair: Different Aspects of Security. 512-513 - Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred Geiss, Michael Weber:

Securing Ad hoc Routing Protocols. 514-519 - Marcos Laureano, Carlos Maziero, Edgard Jamhour:

Intrusion Detection in Virtual Machine Environments. 520-525 - Stefan Probst, Josef Küng:

The Need for Declarative Security Mechanisms. 526-531 - Szabolcs Szigeti, Peter Risztics:

Will IPv6 Bring Better Security? 532-537 - Tiina Havana, Juha Röning

:
Attitudes and Perceptions Related to Information Security - Case: Rotuaari. 538-543 - Hannakaisa Isomäki, Sonja Hof:

Security Concern of Legally Sensitive Web Portals. 544-550 - Michael Sonntag:

Voluntariness of Permissions Required for Security Measures. 551-557 - Juhani Anttila, Jorma Kajava, Rauno Varonen:

Balanced Integration of Information Security into Business Management. 558-564
Special Session: Component Models for Dependable Systems
- Michel R. V. Chaudron

, Johan Muskens:
Introduction from Session Chair: Component Models for Dependable Systems. 566-566 - Alexandru C. Telea, Lucian Voinea:

A Framework for Interactive Visualization of Component-Based Software. 567-574 - Paulo Asterio de Castro Guerra, Fernando Castor Filho

, Vinicius Asta Pagano, Cecília M. F. Rubira:
Structuring Exception Handling for Dependable Component-Based Software Systems. 575-582 - Heikki Verta, Titos Saridakis:

Detection of Heap Management Flaws in Component-Based Software. 583-590 - HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:

CoBFIT: A Component-Based Framework for Intrusion Tolerance. 591-600 - Egor Bondarev, Peter H. N. de With, Michel R. V. Chaudron:

Towards Predicting Real-Time Properties of a Component Assembly. 601-610 - Johan Muskens, Michel R. V. Chaudron:

Integrity Management in Component Based Systems. 611-619 - Hailiang Mei, Johan J. Lukkien, Johan Muskens:

A Compositional Claim-based Component Certification Procedure. 620-626 - Hans Hansson, Mikael Åkerholm, Ivica Crnkovic

, Martin Törngren
:
SaveCCM - A Component Model for Safety-Critical Real-Time Systems. 627-635

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














