The SCEAS System
Navigation Menu

Conferences in DBLP

(iastedSEA)
2004 (conf/iastedSEA/2004)

  1. Adi-Cristina Mitea
    A proposal for a multiple join index. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:1-6 [Conf]
  2. Sergio Luján-Mora, Juan Trujillo
    Modeling the physical design of data warehouses from a UML specification. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:7-12 [Conf]
  3. Keke Cai, Chun Chen, Huaizhong Lin
    Efficient similarity matching for categorical sequence based on dynamic partition. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:13-18 [Conf]
  4. Adem Karahoca
    Data mining via cellular neural networks in the GSM sector. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:19-24 [Conf]
  5. Emmanuel E. Udoh, David Erbach, Ahmed Mustafa
    Neural network facilitated analysis of stress in a biological species. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:25-29 [Conf]
  6. Emmanuel E. Udoh, David Erbach
    Applying database technology in the integration of engineering software modules. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:30-33 [Conf]
  7. Christian Mancas, Simona Dragomir
    Matbase datalog¬ subsystem meta-catalog conceptual design. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:34-41 [Conf]
  8. Alejandro Botello Castillo, Rubén Peredo Valderrama, Leandro Balladares Ocaña
    Design and implementation of a data repository for a case tool. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:42-46 [Conf]
  9. Ulf Johansson, Cecilia Sönströd, Lars Niklasson
    Why rule extraction matters. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:47-52 [Conf]
  10. Paul Zellweger
    A tool for generating a data-driven database taxonomy. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:53-58 [Conf]
  11. Iryna V. Turchenko, Volodymyr Turchenko, Volodymyr Kochan, Pavlo E. Bykovy, Anatoly Sachenko, George Markowsky
    Database design for CAD system optimising distributed sensor networks for perimeter security. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:59-64 [Conf]
  12. Xuetao Guo, Jie Lu, Guangquan Zhang
    A recommender system by two-level collaborative filtering. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:65-69 [Conf]
  13. Zhiqing Liu
    A model of program execution for security purposes. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:70-76 [Conf]
  14. Adam Duffy, Tom Dowling
    An object oriented approach to an identity based encryption cryptosystem. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:77-83 [Conf]
  15. Andrew Burnett, Tom Dowling
    Rapid prototyping and performance analysis of elliptic curve cryptographic algorithms using Java and Maple. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:84-89 [Conf]
  16. Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa
    Java mobile code security by bytecode behavior analysis. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:90-95 [Conf]
  17. Cinzia Bernardeschi, Luca Martini
    Enforcement of applet boundaries in Java card systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:96-101 [Conf]
  18. Joon S. Park, Pratheep Chandramohan, Joseph Giordano
    Component-abnormality detection and immunization for survivable systems in large distributed environments. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:102-108 [Conf]
  19. Christopher Weber, Sriram Seshadri, Furrukh Khan
    Using emerging open specifications for enhancing XML web services to build a maintainable and secure health care information system. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:109-114 [Conf]
  20. Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
    Modeling and analyzing security protocols in SAM: A case study. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:115-121 [Conf]
  21. George Leeman, Aaron Kershenbaum, Larry Koved, Darrell Reimer
    Detecting unwanted synchronization in Java programs. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:122-132 [Conf]
  22. Levent Ertaul, Suma Venkatesh
    JHide - A tool kit for code obfuscation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:133-138 [Conf]
  23. Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown
    Using the NaSr architectural style to solve the broken hyperlink problem. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:139-143 [Conf]
  24. W. T. Tsai, Dawei Zhang, Yinong Chen, Hai Huang, Raymond A. Paul, Ning Liao
    A software reliability model for web services. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:144-149 [Conf]
  25. Tamer Rafla, Rafiou Oketokoun, Artur Wiklik, Michel Desmarais, Pierre N. Robillard
    Accommodating usability driven changes in existing software architecture. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:150-154 [Conf]
  26. Pablo Bustos, Jaime Navon
    A simple platform-independent web application development process. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:155-160 [Conf]
  27. Janhua Lin
    Distributed architectures for rich-client internet applications. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:161-166 [Conf]
  28. Andreas Günzler, Daniel von Roennebeck
    Towards an automated quality assessment of UML-based software architectures. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:167-172 [Conf]
  29. Thomas Schöbel-Theuer
    Instance orientation: A programming methodology. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:173-179 [Conf]
  30. Weixiang Sun, Zhengfan Dai
    AOSAM: A formal framework for aspect-oriented software architecture specifications. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:180-185 [Conf]
  31. Arif Selçuk Ögrenci, Taner Arsan, Tuncay Saydam
    An open software architecture of neural networks: Neurosoft. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:186-191 [Conf]
  32. Jie Ren, Richard N. Taylor
    Utilizing commercial object libraries within looselycoupled, event-based systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:192-197 [Conf]
  33. Kriste Krstovski, Andrew L. Kun, W. Thomas Miller III
    Distributed components for retrieval of driver's license data using a handheld computer. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:198-203 [Conf]
  34. Errol Hugh Dennis, Ezra Kaahwa Mugisa
    A permissive/restrictive security structure for a reusable software architecture for an accounting information system. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:204-209 [Conf]
  35. Catherine Stringfellow, C. D. Amory, Dileep Potnuri, M. Georg
    Deriving change architectures from RCS history. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:210-215 [Conf]
  36. Yogesh Singh, Bindu Goel, Pravin Chandra
    A model for corrective maintenance time prediction using neural network. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:216-221 [Conf]
  37. Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue
    ARIES: Refactoring support environment based on code clone analysis. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:222-229 [Conf]
  38. Victor Shtern
    On object-oriented approach to program modularization. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:230-235 [Conf]
  39. Michael A. Hoffman
    Inferring class level scenarios from object-oriented source code. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:236-240 [Conf]
  40. Tilman Seifert, Gerd Beneken, Niko Baehr
    Engineering long-lived applications using MDA. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:241-246 [Conf]
  41. Feng-Pu Yang, Chia Hung Kao, Hewijin Christine Jiau
    From principle, product, process to effort. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:247-252 [Conf]
  42. Ho Sin Ban, Ian Chai, Tan Chuie Hong
    An empirical investigation for different sequences of pedagogical framework documentation in RAD. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:253-258 [Conf]
  43. Suzanne Smith, Sara Stoecklin, Judy Mullins
    A practical guide to measuring method coupling in object-oriented systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:259-263 [Conf]
  44. Jianyun Zhou, Tor Stålhane
    A framework for early robustness assessment. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:264-268 [Conf]
  45. Phillip L. Nico, Clark Savage Turner, Kimberly Knowles Nico
    Insecurity by contract. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:269-274 [Conf]
  46. Mao Xiaoguang, John May
    Reliability specification for component-based software. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:275-281 [Conf]
  47. Kazuki Iwamoto, Tadashi Dohi, Naoto Kaio
    A discrete software cost model with periodic rejuvenation for a telecommunication billing application. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:282-287 [Conf]
  48. Peter J. Clarke, Brian A. Malloy
    Using a taxonomy to analyze classes during implementation-based testing. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:288-293 [Conf]
  49. Sami Beydeda
    Integrated generation of specification- and program-based test cases. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:294-299 [Conf]
  50. Shujuan Jiang, Baowen Xu, Liang Shi
    An approach to analyzing exception propagation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:300-305 [Conf]
  51. Yajuan Pan, Mei-Hwa Chen
    Dataflow analysis and testing of software components. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:306-311 [Conf]
  52. Yu Lei, Richard H. Carver
    Reachability testing of monitor-based programs. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:312-317 [Conf]
  53. Huy-Vu Do, Chantal Robach, Michel Delaunay, Jean-Sébastien Cruz
    A testability analysis for data-flow designs of reactive real-time systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:318-323 [Conf]
  54. Linda Badri, Mourad Badri, Velou Stéphane Blé
    Object-oriented integration testing: A method level based approach. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:324-330 [Conf]
  55. Walter Maydl
    Model checking for component-based software development for embedded systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:331-338 [Conf]
  56. John A. Akinyemi, Sylvanus A. Ehikioya
    A predicate logic foundation for financial audit systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:339-344 [Conf]
  57. Junyan Qian, Baowen Xu
    The compositional semantics of timed statecharts. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:345-349 [Conf]
  58. Victor L. Winter, Steve Roach, Fares Fraij
    Higher-order strategic programming: A road to software assurance. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:350-355 [Conf]
  59. Gordan Jezic, Ignac Lovrek
    Using Pi-Calculus for specification of mobile agent communication. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:356-361 [Conf]
  60. Jason O. Hallstrom, Neelam Soundarajan
    Formal specification of design patterns: A case study. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:362-367 [Conf]
  61. Aristides Dasso, Chris George
    Automating software development by cross-utilization of specification tools. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:368-373 [Conf]
  62. Jianwen Xiang, Kokichi Futatsugi, Yanxiang He
    Formal construction model and specification of fault tree. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:374-381 [Conf]
  63. John Noll, Jigar Shah
    Process state inference for support of knowledge intensivework. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:382-387 [Conf]
  64. David Cumberland, Clark Savage Turner
    An ad hoc evaluation of workflow modeling tools. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:388-393 [Conf]
  65. James B. Dabney, Gary Barber, Don Ohi
    Estimating direct return on investment of independent verification and validation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:394-399 [Conf]
  66. Alexander Salbrechter, Heinrich C. Mayr, Christian Kop
    Mapping pre-designed business process models to UML. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:400-405 [Conf]
  67. Yu-Ling Won, Dwen-Ren Tsai, Pi-Ju Tsai
    How far is an ISO 9001-granted organization to capability maturity model integration? [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:406-411 [Conf]
  68. Jeongeun Shin, Shinji Ozawa
    Shape recognition of the human body using the model of a 3D human body. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:412-417 [Conf]
  69. A. R. Dani, Ved Prakash Gulati
    A framework for modeling automated negotiation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:418-423 [Conf]
  70. Christian Reichel, Roy Oberhauser
    XML-based programming language modeling: An approach to software engineering. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:424-429 [Conf]
  71. William J. Ray, Man-tak Shing, Chee Khan Kwok
    Simulation models for optimal object server deployment. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:430-435 [Conf]
  72. Mariele Hagen, Volker Gruhn
    Towards flexible software processes by using process patterns. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:436-441 [Conf]
  73. Kazunori Iwata, Nobuhiro Ito, Itsuki Noda, Naohiro Ishii
    Design and implementation of a simulator for evaluating dial-a-ride systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:442-448 [Conf]
  74. Ingunn Myrtveit, Erik Stensrud
    SW cost estimation: Measuring model performance of arbitrary function approximators. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:449-455 [Conf]
  75. Tak Wah Kwan, Hareton K. N. Leung
    Project perspective of software acquisition practices. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:456-464 [Conf]
  76. Tomasz Müldner, Darcy G. Benoit, Fei Wang
    Generic approach to internationalization of websites. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:465-470 [Conf]
  77. Andrew J. Kornecki, Kimberley Hall
    Approaches to assure safety in fly-by-wire systems: Airbus vs. boeing. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:471-476 [Conf]
  78. Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
    A model for object-based distributed processing using behaviour trees. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:477-482 [Conf]
  79. Franco Cicirelli, Angelo Furfaro, Libero Nigro
    Deployment, configuration and management of mobile actor systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:483-488 [Conf]
  80. Milan Vidakovic, Goran Sladic, Miroslav Zaric
    Metadata harvesting using agent technology. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:489-493 [Conf]
  81. Salaheddin J. Juneidi, George A. Vouros
    Agent role locking (ARL): Theory for agent oriented software engineering. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:494-500 [Conf]
  82. Aldo Dagnino, Karen Smiley, Hema Srikanth, Annie I. Antón, Laurie A. Williams
    Experiences in applying agile software development practices in new product development. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:501-506 [Conf]
  83. Rita Suzana Pitangueira Maciel, Carlos André Guimarães Ferraz, Nelson S. Rosa
    InterDOC: Interoperable services in collaborative writing environments. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:507-512 [Conf]
  84. Hui Zeng, David Rine
    A neural network approach for software defects fix effort estimation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:513-517 [Conf]
  85. John D. Roberts, Ilmi Yoon, Sanghyuk Yoon, Edward Lank
    An interface mark-up language for web3D. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:518-522 [Conf]
  86. Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa
    Generating tutorial system from sequence diagrams in UML. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:523-528 [Conf]
  87. Sadahiro Isoda
    On execution control of UML's use case. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:529-533 [Conf]
  88. Liwu Li, Wenjiang Wang
    Object-oriented programming with dynamic classification in C#. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:534-539 [Conf]
  89. Yukio Ishihara, Makio Ishihara
    An approach to realize click, double-click, and drag in 3D. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:540-545 [Conf]
  90. Yasutaka Kono, Shingo Takada, Norihisa Doi
    A framework for multiple service discovery and robustness. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:546-551 [Conf]
  91. Jean Utke, Uwe Naumann
    Separating language dependent and independent tasks for the semantic transformation of numerical programs. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:552-558 [Conf]
  92. Cinzia Bernardeschi, Luca Martini, Paolo Masci
    Java bytecode verification with dynamic structures. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:559-564 [Conf]
  93. Xiao Hu, Ting Lei, Yuchang Gong, Xuehai Zhou
    Compiling adaptive programs for real-time dynamic scheduling. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:565-570 [Conf]
  94. Serge Midonnet, Hui Xue Zhao
    A standard real-time application development using real-time java specification from theory to practice. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:571-576 [Conf]
  95. Theodorus Eric Setiadi, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa
    Identifying candidate invariant conditions of running program. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:577-582 [Conf]
  96. Yingzhou Zhang, Baowen Xu, Ju Qian
    Modular monadic slicing of concurrent programs. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:583-587 [Conf]
  97. Taolue Chen, Tingting Han, Jian Lu
    Tree logic with recursion and model checking algorithm. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:588-593 [Conf]
  98. Marco Calamita, Piero Lunghi, Riccardo Melioli, Flavio Tonelli
    A supervised multi-agent approach for operations capacity planning through performances-driven analysis. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:594-600 [Conf]
  99. Edward Curry, Desmond Chambers, Gerard Lyons
    Enterprise service facilitation within agent environments. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:601-606 [Conf]
  100. Constantinos Constantinides, Therapon Skotiniotis
    The provision of contracts to enforce system semantics throughout software development. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:607-616 [Conf]
  101. Wang Hongyuan, Zhang Ke, Feng Tie, Che Haiyan, Zheng Yinshi
    Synthesizing statecharts through sequence diagrams analysis. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:617-622 [Conf]
  102. F. Tessier, Mourad Badri, Linda Badri
    An early detection of semantic conflicts between aspects: A model analysis based technique. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:623-628 [Conf]
  103. Sarun Chaiworawitgul, Proadpran Pitsatorn, Boonchai Sowanwanichkul
    Applying object oriented concept to combination logic design. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:629-634 [Conf]
  104. Axel Rauschmayer, Patrick Renner
    Tube: Interactive model-integrated object-oriented programming. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:635-640 [Conf]
  105. Geir A. Bjune, Jack R. Hagemeister
    Hyper-trace: Using hypertext linking for traceability. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:641-646 [Conf]
  106. Jing-Chiou Liou
    PLUS: A release management process for progressive software development model. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:647-652 [Conf]
  107. Jianyun Zhou, Tor Stålhane
    A component-based reference model for web-based systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:653-658 [Conf]
  108. Karim Visram
    Extreme programming: Pair-programmers, team players or future leaders? [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:659-664 [Conf]
  109. Abdallah Mohamed, Günther Ruhe, Armin Eberlein
    Towards a customizable approach for COTS selection. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:665-671 [Conf]
  110. F. Fabbrini, M. Fusani, Stefania Gnesi, Giuseppe Lami
    Automatic clustering of non-functional requirements. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:672-677 [Conf]
  111. Shyh-Kwei Chen, Kun-Lung Wu, Jih-Shyr Yih
    Decoupled common annotations for reusing XML document composition logic. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:678-683 [Conf]
  112. Geoff Coulson, Gordon S. Blair, Paul Grace, Ackbar Joolia, Kevin Lee, Jo Ueyama
    A component model for building systems software. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:684-689 [Conf]
  113. Radmila Juric, Jasna Kuljis, Ray J. Paul
    Contextualising components when addressing database interoperability. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:690-695 [Conf]
  114. Li Liao, Hareton K. N. Leung, Yuzhong Qu
    Automated support of quality improvement. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:696-702 [Conf]
  115. A. Estévez García, J. Padrón Lorenzo, J. L. Roda García
    An MDA-based framework to achieve high productivity in software development. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:703-708 [Conf]
  116. Øystein Haugen, Birger Møller-Pedersen, Jon Oldevik, Arnor Solberg
    An MDA®-based framework for model-driven product derivation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:709-714 [Conf]
  117. Jirí Adámek, Frantisek Plasil
    Erroneous architecture is a relative concept. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:715-720 [Conf]
  118. M. R. Narasimhamurthy, Ramzan Nadaf, Animesh Bhowmick
    Automating VBI-data generation and validation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:721-724 [Conf]
  119. Kuniharu Yamada, Shingo Takada, Norihisa Doi
    Towards use case based software reuse. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:725-730 [Conf]
  120. Rajendra K. Bera
    An algorithm for determining the equivalence of two blocks of assignment statements. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:731-735 [Conf]
  121. Hideo Hasegawa, Shingo Takada, Norihisa Doi
    Supporting the iterative development of sequence diagrams and statecharts. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:736-742 [Conf]
  122. Mark Burgin
    Logical tools for program integration and interoperability. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:743-748 [Conf]
  123. Angela Guercio, Bonita Simoes, Arvind K. Bansal
    Towards large scale voice activated dynamic and interactive internet based animation and modeling. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:749-754 [Conf]
  124. Jinhong Shen, Seiya Miyazaki, Terumasa Aoki, Hiroshi Yasuda
    Personal e-moviemaker design. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:755-760 [Conf]
  125. Kuan Jen Lin, Shih Wen Chen
    On the formulation of software cost for IO devices. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:761-766 [Conf]
  126. Richard A. Pyne, Ezra Kaahwa Mugisa
    Software component self-description: Labeling components in a software supermarket. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:767-772 [Conf]
  127. Hamid Haidarian Shahri, Ahmad Abdollahzadeh Barforoush
    AFFDEF: Adaptive and flexible fuzzy duplicate elimination framework. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:773-780 [Conf]
  128. Mitja Lenic, Petra Povalej, Peter Kokol, Ana Isabel Cardoso
    Using cellular automata to predict reliability of modules. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:781-785 [Conf]
  129. Gregor Stiglic, Peter Kokol
    Bioinformatics approach to data mining of software bases. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:786-789 [Conf]
  130. Matej Mertik, Mitja Lenic, Milan Zorman, Maurizio Pighin
    Mining features of software reliability using multimethod data-mining approach. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:790-794 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002