default search action
Journal of Systems and Software, Volume 86
Volume 86, Number 1, January 2013
- Hans van Vliet:
Signs of a thriving journal. 1 - Ilenia Fronza, Alberto Sillitti, Giancarlo Succi, Mikko Terho, Jelena Vlasenko:
Failure prediction based on log files using Random Indexing and Support Vector Machines. 2-11 - Wan-Shiou Yang, San-Yih Hwang:
iTravel: A recommender system in mobile peer-to-peer environment. 12-20 - Masood Uzzafer:
A simulation model for strategic management process of software projects. 21-37 - Chiu-Mei Chen, Chiao-Min Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
Common carotid artery condition recognition technology using waveform features extracted from ultrasound spectrum images. 38-46 - Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha:
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. 47-59 - Younho Lee, Il-Hee Kim, Yongsu Park:
Improved multi-precision squaring for low-end RISC microcontrollers. 60-71 - Ming Ying, James Miller:
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. 72-88 - Konstantinos N. Vavliakis, Theofanis K. Grollios, Pericles A. Mitkas:
RDOTE - Publishing Relational Databases into the Semantic Web. 89-99 - Cai-Sen Chen, Tao Wang, YingZhan Kou, Xiaocen Chen, Xiong Li:
Improvement of trace-driven I-Cache timing attack on the RSA algorithm. 100-107 - Jose M. Lopez-Vega, Javier Povedano-Molina, Gerardo Pardo-Castellote, Juan M. López-Soler:
A content-aware bridging service for publish/subscribe environments. 108-124 - César Jesús Pardo Calvache, Francisco J. Pino, Félix García, Maria Teresa Baldassarre, Mario Piattini:
From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies. 125-143 - Ali Bou Nassif, Danny Ho, Luiz Fernando Capretz:
Towards an early software estimation using log-linear regression and a multilayer perceptron model. 144-160 - Adrian Fernandez, Silvia Abrahão, Emilio Insfrán:
Empirical validation of a usability inspection method for model-driven Web development. 161-186 - Yajun Du, Yufeng Hai:
Semantic ranking of web pages based on formal concept analysis. 187-197 - Wei-Ming Chen, Sheng-Hao Jhang:
Improving Graph Cuts algorithm to transform sequence of stereo image to depth map. 198-210 - Zhijun Wu, Jin Lei, Di Yao, Minghua Wang, Sarhan M. Musa:
Chaos-based detection of LDoS attacks. 211-221 - Guangyong Gao, Guoping Jiang:
A lossless copyright authentication scheme based on Bessel-Fourier moment and extreme learning machine in curvature-feature domain. 222-232 - Faeze Eshragh, Mehdi Kargahi:
Analytical architecture-based performability evaluation of real-time software systems. 233-246
Volume 86, Number 2, February 2013
- Dong Yan, Syed Zubair Ahmad, Dong Yang:
Matthew effect, ABC analysis and project management of scale-free information systems. 247-254 - Xiangyang Wang, Chunpeng Wang, Hong-Ying Yang, Panpan Niu:
A robust blind color image watermarking in quaternion Fourier transform domain. 255-277 - Jose Manuel Redondo, Francisco Ortin:
Efficient support of dynamic inheritance for class- and prototype-based languages. 278-301 - Xiaomin Zhu, Rong Ge, Jinguang Sun, Chuan He:
3E: Energy-efficient elastic scheduling for independent tasks in heterogeneous computing systems. 302-314 - Zhi-Hui Wang, Chin-Feng Lee, Ching-Yun Chang:
Histogram-shifting-imitated reversible data hiding. 315-323 - Che-Wei Lee, Wen-Hsiang Tsai:
A covert communication method via spreadsheets by secret sharing with a self-authentication capability. 324-334 - Hung-Hsu Tsai, Yen-Shou Lai, Shih-Che Lo:
A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. 335-348 - George Kakarontzas, Eleni Constantinou, Apostolos Ampatzoglou, Ioannis Stamelos:
Layer assessment of object-oriented software: A metric facilitating white-box reuse. 349-366 - Yuebin Bai, Yao Ma, Cheng Luo, Duo Lv, Yuanfeng Peng:
A high performance inter-domain communication approach for virtual machines. 367-376 - Shin Hong, Moonzoo Kim:
Effective pattern-driven concurrency bug detection for operating systems. 377-388 - Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. 389-402 - Rômulo Silva de Oliveira, Andreu Carminati, Renan Augusto Starke:
On using adversary simulators to evaluate global fixed-priority and FPZL scheduling of multiprocessors. 403-411 - Kevin Lano, Shekoufeh Kolahdouz Rahimi:
Constraint-based specification of model transformations. 412-436 - Ming-Chin Chuang, Jeng Farn Lee:
SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. 437-448 - Patricia López Martínez, Laura Barros, José M. Drake:
Design of component-based real-time applications. 449-467 - Yin Yang, Zhi-hu Tan, Jiguang Wan, Changsheng Xie, Jie Yu, Jian He:
A reliability optimization method for RAID-structured storage systems based on active data migration. 468-484 - Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev:
Invertible secret image sharing for gray level and dithered cover images. 485-500 - Kutila Gunasekera, Arkady B. Zaslavsky, Shonali Krishnaswamy, Seng Wai Loke:
Building ubiquitous computing applications using the VERSAG adaptive agent framework. 501-519 - Elena del Val Noguera, Miguel Rebollo, Vicente J. Botti:
Promoting cooperation in service-oriented MAS through social plasticity and incentives. 520-537 - Wilson Rosa, Travis Packard, Abishek Krupanand, James W. Bilbro, Max M. Hodal:
COTS integration and estimation for ERP. 538-550 - Philip Langer, Manuel Wimmer, Petra Brosch, Markus Herrmannsdörfer, Martina Seidl, Konrad Wieland, Gerti Kappel:
A posteriori operation detection in evolving software models. 551-566 - Wei-Jen Yang, Kuo-Liang Chung, Hong-Yuan Mark Liao, Wen-Kuang Yu:
Efficient reversible data hiding algorithm based on gradient-based edge direction prediction. 567-580 - Wei-Kuei Chen:
Image sharing method for gray-level images. 581-585
Volume 86, Number 3, March 2013
- Majdi Abdellatief, Abu Bakar Md Sultan, Abdul Azim Abdul Ghani, Marzanah A. Jabar:
A mapping study to investigate component-based software system metrics. 587-603 - Tseng-Jung Lin, Kuo-Liang Chung, Po-Chun Chang, Yong-Huai Huang, Hong-Yuan Mark Liao, Chiung-Yao Fang:
An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. 604-614 - Fatemeh Nori, Mahmood Deypir, Mohammad Hadi Sadreddini:
A sliding window based algorithm for frequent closed itemset mining over data streams. 615-623 - Pasqualina Potena:
Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff. 624-648 - María del Carmen Suárez Torrente, Ana Belén Martínez Prieto, Darío Álvarez Gutiérrez, M. Elena Alva de Sagastegui:
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website. 649-663 - Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. 664-676 - Michael J. Laszlo, Sumitra Mukherjee:
Optimal univariate microaggregation with data suppression. 677-682 - Andrzej Zalewski, Szymon Kijas:
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems. 683-697 - C. C. F. Pereira Geovandro, Mateus A. S. Santos, Bruno Trevizan de Oliveira, Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Cíntia B. Margi, Wilson Vicente Ruggiero:
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission. 698-706 - Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. 707-715 - Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
A reversible data hiding method by histogram shifting in high quality medical images. 716-727 - Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. 728-743 - Yifeng Luo, Siqiang Luo, Jihong Guan, Shuigeng Zhou:
A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation. 744-750 - Jemal H. Abawajy:
SQLIA detection and prevention approach for RFID systems. 751-758 - Ying-Ho Liu, Chun-Sheng Wang:
Constrained frequent pattern mining on univariate uncertain data. 759-778 - Ya-Han Hu, Tony Cheng-Kui Huang, Yu-Hua Kao:
Knowledge discovery of weighted RFM sequential patterns from customer sequence databases. 779-788 - Jenn-Wei Lin, Jian-Yan Zhuang:
A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks. 789-800 - Chung-Yuan Huang, Chun-Liang Lee, Tzai-Hung Wen, Chuen-Tsai Sun:
A computer virus spreading model based on resource limitations and interaction costs. 801-808 - Marc Chaumont, William Puech, Christian Lahanier:
Securing color information of an image by concealing the color palette. 809-825 - Hongjun Liu, Xingyuan Wang:
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. 826-834 - Mohamed Sellami, Olfa Bouchaala, Walid Gaaloul, Samir Tata:
Communities of Web service registries: Construction and management. 835-853 - Yepang Liu, Chang Xu, Shing-Chi Cheung:
AFChecker: Effective model checking for context-aware adaptive applications. 854-867 - Xi Xiao, Xinguang Tian, Qibin Zhai, Shutao Xia:
Corrigendum to "A variable-length model for masquerade detection" [J. Syst. Softw. 85(2012) 2470-2478]. 868
Volume 86, Number 4, April 2013
- Alessandro Garcia:
Software Engineering in Brazil: Retrospective and prospective views. 869-871 - Paulo Anselmo da Mota Silveira Neto, Joás Sousa Gomes, Eduardo Santana de Almeida, Jair Cavalcanti Leite, Thaís Vasconcelos Batista, Larissa Leite:
25 years of software engineering in Brazil: Beyond an insider's view. 872-889 - Carlos José Pereira de Lucena, Ingrid Nunes:
Contributions to the emergence and consolidation of Agent-oriented Software Engineering. 890-904 - Uirá Kulesza, Sérgio Soares, Christina Chavez, Fernando Castor, Paulo Borba, Carlos José Pereira de Lucena, Paulo César Masiero, Cláudio Sant'Anna, Fabiano Cutigi Ferrari, Vander Alves, Roberta Coelho, Eduardo Figueiredo, Paulo F. Pires, Flávia Coimbra Delicato, Eduardo Piveta, Carla T. L. L. Silva, Valter Vieira de Camargo, Rosana T. V. Braga, Julio Leite, Otávio Lemos, Nabor C. Mendonça, Thaís Vasconcelos Batista, Rodrigo Bonifácio, Nélio Cacho, Lyrene Fernandes da Silva, Arndt von Staa, Fábio Fagundes Silveira, Marco Túlio Valente, Fernanda M. R. Alencar, Jaelson Castro, Ricardo Argenton Ramos, Rosângela A. D. Penteado, Cecília M. F. Rubira:
The crosscutting impact of the AOSD Brazilian research community. 905-933 - Vinicius Humberto Serapilha Durelli, Rodrigo Fraxino Araujo, Marco Aurélio Graciotto Silva, Rafael Alves Paes de Oliveira, José Carlos Maldonado, Márcio Eduardo Delamaro:
A scoping study on the 25 years of research into software testing in Brazil and an outlook on the future of the area. 934-950 - Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Marcelo Medeiros Eler, José Carlos Maldonado, Paulo César Masiero:
Evaluation studies of software testing research in Brazil and in the world: A survey of two premier software engineering conferences. 951-969 - Thelma Elita Colanzi, Silvia Regina Vergilio, Wesley Klewerton Guez Assunção, Aurora T. R. Pozo:
Search Based Software Engineering: Review and analysis of the field in Brazil. 970-984 - Elisa Yumi Nakagawa, Pablo Oliveira Antonino, Martin Becker, José Carlos Maldonado, Holger Storf, Karina Villela, H. Dieter Rombach:
Relevance and perspectives of AAL in Brazil. 985-996 - Luciane Telinski Wiedermann Agner, Inali Wisniewski Soares, Paulo Cézar Stadzisz, Jean Marcelo Simão:
A Brazilian survey on UML and model-driven practices for embedded software development. 997-1005 - Gustavo Soares, Rohit Gheyi, Emerson R. Murphy-Hill, Brittany Johnson:
Comparing approaches to analyze refactoring activity on software repositories. 1006-1022 - Marcelo de Almeida Maia, Raquel Fialho de Queiroz Lafetá:
On the impact of trace-based feature location in the performance of software maintainers. 1023-1037 - Leopoldo Teixeira, Paulo Borba, Rohit Gheyi:
Safe composition of configuration knowledge-based software product lines. 1038-1053
- Darja Smite, Claes Wohlin, Aybüke Aurum, Ronald Jabangwe, Emil Numminen:
Offshore insourcing in software development: Structuring the decision-making process. 1054-1067 - Xiaotian Wu, Wei Sun:
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. 1068-1088 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Petri net based techniques for constructing reliable service composition. 1089-1106 - Saad Liaquat Kiani, Ashiq Anjum, Michael Knappmeyer, Nik Bessis, Nikolaos Antonopoulos:
Federated broker system for pervasive context provisioning. 1107-1123 - Christian Raspotnig, Andreas L. Opdahl:
Comparing risk identification techniques for safety and security requirements. 1124-1151
Volume 86, Number 5, May 2013
- Julio Ariel Hurtado Alegria, María Cecilia Bastarrica, Sergio F. Ochoa, Jocelyn Simmonds:
MDE software process lines in small companies. 1153-1171 - Iuri Santos Souza, Gecynalda Soares da Silva Gomes, Paulo Anselmo da Mota Silveira Neto, Ivan do Carmo Machado, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
Evidence of software inspection on feature specification for software product lines. 1172-1190 - Ankur Pachauri, Gursaran Srivastava:
Automated test data generation for branch testing using genetic algorithm: An improved approach using branch ordering, memory and elitism. 1191-1208 - Mohammad Saeed Abou Trab, Michael J. Brockway, Steve Counsell, Robert M. Hierons:
Testing Real-Time Embedded Systems using Timed Automata based approaches. 1209-1223 - Ya-Han Hu, Fan Wu, Yi-Jiun Liao:
An efficient tree-based algorithm for mining sequential patterns with multiple minimum supports. 1224-1238 - Eduardo Martins Guerra, Felipe Alves, Uirá Kulesza, Clovis Torres Fernandes:
A reference architecture for organizing the internal structure of metadata-based frameworks. 1239-1256 - Dingyu Yang, Jian Cao, Jiwen Fu, Jie Wang, Jianmei Guo:
A pattern fusion model for multi-step-ahead CPU load prediction. 1257-1266 - Tzung-Her Chen, Yao-Sheng Lee, Wei-Lun Huang, Justie Su-tzu Juan, Ying-Yu Chen, Ming-Jheng Li:
Quality-adaptive visual secret sharing by random grids. 1267-1274 - Darko Durisic, Martin Nilsson, Miroslaw Staron, Jörgen Hansson:
Measuring the impact of changes to the complexity and coupling properties of automotive software systems. 1275-1293 - Konstantinos Manikas, Klaus Marius Hansen:
Software ecosystems - A systematic literature review. 1294-1306 - Qing Gu, Félix Cuadrado, Patricia Lago, Juan C. Dueñas:
3D architecture viewpoints on service automation. 1307-1322 - Hyung-Ju Cho:
Continuous range k-nearest neighbor queries in vehicular ad hoc networks. 1323-1332 - Maya Daneva, Egbert van der Veen, Chintan Amrit, Smita Ghaisas, Klaas Sikkel, Ramesh Kumar, Nirav Ajmeri, Uday Ramteerthkar, Roel J. Wieringa:
Agile requirements prioritization in large-scale outsourced system projects: An empirical study. 1333-1353 - Vahid Garousi, Junji Zhi:
A survey of software testing practices in Canada. 1354-1376 - Jeanne Chen, Chih-Wei Shiu, Mei-Chen Wu:
An improvement of diamond encoding using characteristic value positioning and modulus function. 1377-1383 - Qiuzhen Lin, Kwok-Wo Wong, Jianyong Chen:
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. 1384-1389 - Henry Edison, Nauman Bin Ali, Richard Torkar:
Towards innovation measurement in the software industry. 1390-1407 - Liang Huai Yang, Jian Zhou, Weihua Gong, Jiakui Zhao, Lijun Chen:
Lifetime and QoS-aware energy-saving buffering schemes. 1408-1425 - Licia Sbattella, Roberto Tedesco:
A novel semantic information retrieval system based on a three-level domain model. 1426-1452 - Jamie Y. T. Chang, Eric T. G. Wang, James J. Jiang, Gary Klein:
Controlling ERP consultants: Client and provider practices. 1453-1461 - Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. 1462-1463
Volume 86, Number 6, June 2013
- Nameer N. El-Emam, Rasheed Abdul Shaheed Al-Zubidy:
New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. 1465-1481 - Santiago A. Vidal, Claudia A. Marcos:
Toward automated refactoring of crosscutting concerns into aspects. 1482-1497 - Edith Tom, Aybüke Aurum, Richard T. Vidgen:
An exploration of technical debt. 1498-1516 - Carlos R. Rivero, Inma Hernández, David Ruiz, Rafael Corchuelo:
MostoDE: A tool to exchange data amongst semantic-web ontologies. 1517-1529 - Azlan B. Ismail, Jun Yan, Jun Shen:
Incremental service level agreements violation handling with time impact analysis. 1530-1544 - Uwe van Heesch, Paris Avgeriou, Antony Tang:
Does decision documentation help junior designers rationalize their decisions? A comparative multiple-case study. 1545-1565 - Georgios Kellaris, Nikos Pelekis, Yannis Theodoridis:
Map-matched trajectory compression. 1566-1579 - Md. Saiful Islam, Chengfei Liu, Rui Zhou:
A framework for query refinement with user feedback. 1580-1595 - Charalabos Skianis:
Introducing automated procedures in 3G network planning and optimization. 1596-1602 - Chun-Sheng Wang, Ying-Ho Liu, Kuo-Chung Chu:
Closed inter-sequence pattern mining. 1603-1612 - Domenico Cotroneo, Roberto Pietrantuono, Stefano Russo:
Testing techniques selection based on ODC fault types and software metrics. 1613-1637 - Baiying Lei, Insu Song, Shah Atiqur Rahman:
Robust and secure watermarking scheme for breath sound. 1638-1649