Conferences in DBLP
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. [Citation Graph (, )][DBLP ] Requirements Engineering Needs in a Solution and Infrastructure Improvement Project. [Citation Graph (, )][DBLP ] Rediscovering Zachman Framework Using Ontology from a Requirement Engineering Perspective. [Citation Graph (, )][DBLP ] A Scenario-Based Architecture Evaluation Framework for Network Enabled Capability. [Citation Graph (, )][DBLP ] ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. [Citation Graph (, )][DBLP ] Decomposition and Traceability in Software Design. [Citation Graph (, )][DBLP ] Panel on Requirements Engineering for Services. [Citation Graph (, )][DBLP ] Improvements for 802.11-Based Location Fingerprinting Systems. [Citation Graph (, )][DBLP ] Variable Support Based Association Rule Mining. [Citation Graph (, )][DBLP ] Enhancing the Scalability of IMS-Based Presence Service for LBS Applications. [Citation Graph (, )][DBLP ] Social Graph Generation & Forecasting Using Social Network Mining. [Citation Graph (, )][DBLP ] Mobile-Agent Approach for Mobile Code Localization in Ad hoc Networks. [Citation Graph (, )][DBLP ] Indoor Navigation on Distributed Stationary Display Systems. [Citation Graph (, )][DBLP ] Implementing an Mobile Agent Platform for M-Commerce. [Citation Graph (, )][DBLP ] Aspectual Separation of Feature Dependencies for Flexible Feature Composition. [Citation Graph (, )][DBLP ] Semantic Web Enabled Composition of Semantic Web Services. [Citation Graph (, )][DBLP ] An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies. [Citation Graph (, )][DBLP ] Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down Practice. [Citation Graph (, )][DBLP ] OWL Manipulation toward Building Semantic Applications and Agents. [Citation Graph (, )][DBLP ] Transforming a Software Product Company into a Service Business: Case Study at F-Secure. [Citation Graph (, )][DBLP ] Agent-Oriented Middleware for Mobile eLearning Services. [Citation Graph (, )][DBLP ] Viewpoint-Oriented Variability Modeling. [Citation Graph (, )][DBLP ] Real-Time Guarantees in Flexible Advance Reservations. [Citation Graph (, )][DBLP ] Respecting Temporal Constraints in Virtualised Services. [Citation Graph (, )][DBLP ] 3D Support for Business Process Simulation. [Citation Graph (, )][DBLP ] Building an Enterprise Service Bus for Real-Time SOA: A Messaging Middleware Stack. [Citation Graph (, )][DBLP ] An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services. [Citation Graph (, )][DBLP ] A Service Broker Providing Real-Time Telecommunications Services for 3rd Party Services. [Citation Graph (, )][DBLP ] A Study of Applying Extended PIE Technique to Software Testability Analysis. [Citation Graph (, )][DBLP ] A Complex Event Routing Infrastructure for Distributed Systems. [Citation Graph (, )][DBLP ] Universal and Extensible Service-Oriented Platform Feasibility and Experience: The Service Abstract Machine. [Citation Graph (, )][DBLP ] How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization. [Citation Graph (, )][DBLP ] A Survey of Physiological Monitoring Data Models to Support the Service of Critical Care. [Citation Graph (, )][DBLP ] Automatic Discovery of Web Services Based on Dynamic Black-Box Testing. [Citation Graph (, )][DBLP ] Microcontroller-Based AWGNG for Security Enhancement of Embedded Real-Time Web Services. [Citation Graph (, )][DBLP ] An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing Technique. [Citation Graph (, )][DBLP ] Clustering Versus Shared Nothing: A Case Study. [Citation Graph (, )][DBLP ] Toward a Smart Cyber-Physical Space: A Context-Sensitive Resource-Explicit Service Model. [Citation Graph (, )][DBLP ] An Economical Approach to Usability Testing. [Citation Graph (, )][DBLP ] Towards Self-Manageable Cloud Services. [Citation Graph (, )][DBLP ] A Sentence Generation Algorithm for Testing Grammars. [Citation Graph (, )][DBLP ] Dynamic Service and Data Migration in the Clouds. [Citation Graph (, )][DBLP ] Software Input Space Modeling with Constraints among Parameters. [Citation Graph (, )][DBLP ] An OSGi Based In-vehicle Gateway Platform Architecture for Improved Sensor Extensibility and Interoperability. [Citation Graph (, )][DBLP ] HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis. [Citation Graph (, )][DBLP ] Performance Impact Analysis of Two Generic Group Communication APIs. [Citation Graph (, )][DBLP ] Practical Extensions of a Randomized Testing Tool. [Citation Graph (, )][DBLP ] Middleware for RFID Systems: An Overview. [Citation Graph (, )][DBLP ] Asynchronous Input-Output Conformance Testing. [Citation Graph (, )][DBLP ] Towards a Theory for Testing Non-terminating Programs. [Citation Graph (, )][DBLP ] Ubá: A Software Product Line Architecture for Grid-Oriented Middleware. [Citation Graph (, )][DBLP ] Towards Call for Testing: An Application to User Acceptance Testing of Web Applications. [Citation Graph (, )][DBLP ] Design of MIDA, a Web-Based Diagnostic Application for Hydroelectric Generators. [Citation Graph (, )][DBLP ] An Algorithm for Mining Frequent Items on Data Stream Using Fading Factor. [Citation Graph (, )][DBLP ] Towards Improving OCL-Based Descriptions of Software Metrics. [Citation Graph (, )][DBLP ] Impacts Separation Framework for Performance Prediction of Middleware-Based Systems. [Citation Graph (, )][DBLP ] Modeling and Predicting Software Failure Costs. [Citation Graph (, )][DBLP ] Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP ] A Service Discovery System Analyzed with a Queueing Theory Model. [Citation Graph (, )][DBLP ] A Contextual Guidance Approach to Software Security. [Citation Graph (, )][DBLP ] A Hierarchical Reliability Model of Service-Based Software System. [Citation Graph (, )][DBLP ] AlertMe: A Semantics-Based Context-Aware Notification System. [Citation Graph (, )][DBLP ] A Quality-Aware Context Middleware Specification for Context-Aware Computing. [Citation Graph (, )][DBLP ] Applicability of Software Reliability Growth Modeling in the Quality Assurance Phase of a Large Business Software Vendor. [Citation Graph (, )][DBLP ] Context Analysis of Intensional Languages. [Citation Graph (, )][DBLP ] Towards Transaction-Based Reliable Service Compositions. [Citation Graph (, )][DBLP ] Distributed Eductive Execution of Hybrid Intensional Programs. [Citation Graph (, )][DBLP ] Toward Middleware-Based Online Application Migration. [Citation Graph (, )][DBLP ] Relaxed Objects - Object Model for Context-Aware Applications. [Citation Graph (, )][DBLP ] Tool Support for Design Pattern Recognition at Model Level. [Citation Graph (, )][DBLP ] Cartesian Programming: The TransLucid Programming Language. [Citation Graph (, )][DBLP ] Predicting Change Impact in Object-Oriented Applications with Bayesian Networks. [Citation Graph (, )][DBLP ] Declarative Multithreaded Programming. [Citation Graph (, )][DBLP ] Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. [Citation Graph (, )][DBLP ] Formal Analysis of Services Compatibility. [Citation Graph (, )][DBLP ] Computing Reputation for Collaborative Private Networks. [Citation Graph (, )][DBLP ] A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. [Citation Graph (, )][DBLP ] Towards the Operational Semantics of User-Centric Communication Models. [Citation Graph (, )][DBLP ] Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design. [Citation Graph (, )][DBLP ] A Model-Driven Multicore Software Development Environment for Embedded System. [Citation Graph (, )][DBLP ] Software Outsourcing Subcontracting and Its Impacts: An Exploratory Investigation. [Citation Graph (, )][DBLP ] Photon: A Domain-Specific Language for Testing Converged Applications. [Citation Graph (, )][DBLP ] Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. [Citation Graph (, )][DBLP ] Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. [Citation Graph (, )][DBLP ] Hot Set Identification for Social Network Applications. [Citation Graph (, )][DBLP ] Dual-Container: Extending the EJB2.x Container to Support EJB3.0. [Citation Graph (, )][DBLP ] An Agent-Based Framework Supporting Trust Evaluation for Service Selection. [Citation Graph (, )][DBLP ] Best Principles in the Design of Shared Software. [Citation Graph (, )][DBLP ] A Framework for Enabling User-Controlled Persona in Online Social Networks. [Citation Graph (, )][DBLP ] Domain Analysis in the Reengineering Process of a COBOL System. [Citation Graph (, )][DBLP ] ACaMES: A Novel Design Methodology on Multicore Embedded System. [Citation Graph (, )][DBLP ] A Business-Logic Based Framework for Evolving Software Systems. [Citation Graph (, )][DBLP ] ESIDE: An Integrated Development Environment for Component-Based Embedded Systems. [Citation Graph (, )][DBLP ] A Constraint Based Bug Checking Approach for Python. [Citation Graph (, )][DBLP ] Agent Protection Based on the Use of Cryptographic Hardware. [Citation Graph (, )][DBLP ] Formalization and Verification of PLC Timers in Coq. [Citation Graph (, )][DBLP ] Towards Usable Solutions to Graphical Password Hotspot Problem. [Citation Graph (, )][DBLP ] System Safety Requirements as Control Structures. [Citation Graph (, )][DBLP ] On Information Flow Forensics in Business Application Scenarios. [Citation Graph (, )][DBLP ] An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. [Citation Graph (, )][DBLP ] Improving E-Government through Benefit Analysis and Value Modeling. [Citation Graph (, )][DBLP ] A Model for Privacy Policy Visualization. [Citation Graph (, )][DBLP ] Traceability ReARMed. [Citation Graph (, )][DBLP ] The Security Implication of Multiple Observers in a Distributed System. [Citation Graph (, )][DBLP ] Defending Battery Exhaustion Attacks on Mobile Systems. [Citation Graph (, )][DBLP ] Towards a Design Method Supporting the Alignment between Business and Software Services. [Citation Graph (, )][DBLP ] On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software. [Citation Graph (, )][DBLP ] A Framework for Cost Sensitive Assessment of Intrusion Response Selection. [Citation Graph (, )][DBLP ] A Cooperative Framework of Service Chain for Digital Library. [Citation Graph (, )][DBLP ] Applying PageRank Algorithm in Requirement Concern Impact Analysis. [Citation Graph (, )][DBLP ] A Specialized Meta-scheduler for Business and Applications Constraints Management. [Citation Graph (, )][DBLP ] Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat Messages. [Citation Graph (, )][DBLP ] Towards Industry-Strength SLA Optimization Capabilities for Service Chains. [Citation Graph (, )][DBLP ] Analyzing Semantics of Documents by Using a Program Analysis Method. [Citation Graph (, )][DBLP ] Matchmaking Using Natural Language Descriptions: Linking Customers with Enterprise Service Descriptions. [Citation Graph (, )][DBLP ] An Investigation of the Role of Service Level Agreements in Classified Advertisement Websites. [Citation Graph (, )][DBLP ] Tamper Resistance for Software Defined Radio Software. [Citation Graph (, )][DBLP ] Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images. [Citation Graph (, )][DBLP ] PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. [Citation Graph (, )][DBLP ] A Method for Historical Ext3 Inode to Filename Translation on Honeypots. [Citation Graph (, )][DBLP ] Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer? [Citation Graph (, )][DBLP ] A Multiple Secret Sharing Scheme based on Matrix Projection. [Citation Graph (, )][DBLP ] Acer Aspire One Netbooks: A Forensic Challenge. [Citation Graph (, )][DBLP ] Exploring Security in PROFINET IO. [Citation Graph (, )][DBLP ] Penetration Testing for Spam Filters. [Citation Graph (, )][DBLP ] A Static Java Birthmark Based on Control Flow Edges. [Citation Graph (, )][DBLP ] Policy Composition Based on Petri Nets. [Citation Graph (, )][DBLP ] A Secure and Flexible Electronic-Ticket System. [Citation Graph (, )][DBLP ] Verification of Access Control Policies for REA Business Processes. [Citation Graph (, )][DBLP ] Towards a Well Structured and Dynamic Application Server. [Citation Graph (, )][DBLP ] Towards the Verification of Services Collaboration. [Citation Graph (, )][DBLP ] Towards Validating Security Protocol Deployment in the Wild. [Citation Graph (, )][DBLP ] ProtoTalk: A Generative Software Engineering Framework for Prototyping Protocols in Smalltalk. [Citation Graph (, )][DBLP ] On a Classification Approach for SOA Vulnerabilities. [Citation Graph (, )][DBLP ] Usage History-Based Architectural Scheduling. [Citation Graph (, )][DBLP ] SN2K Attacks and Honest Services. [Citation Graph (, )][DBLP ] PhishCatch - A Phishing Detection Tool. [Citation Graph (, )][DBLP ] Software Methodologies for the Engineering of Service-Oriented Industrial Automation: The Continuum Project. [Citation Graph (, )][DBLP ] Adaptive Control Framework for Software Components: Case-Based Reasoning Approach. [Citation Graph (, )][DBLP ] Towards a Next-Generation Matrix Library for Java. [Citation Graph (, )][DBLP ] Modeling Simulink Diagrams Using Input/Output Extended Finite Automata. [Citation Graph (, )][DBLP ] T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security. [Citation Graph (, )][DBLP ] Towards Dynamic Component Updating: A Flexible and Lightweight Approach. [Citation Graph (, )][DBLP ] A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS). [Citation Graph (, )][DBLP ] Design of Service Component Layer in SOA Reference Architecture. [Citation Graph (, )][DBLP ] Prevention of Sequential Message Loss in CAN Systems. [Citation Graph (, )][DBLP ] The Design and Implementation of a Bare PC Email Server. [Citation Graph (, )][DBLP ] Risk-Based Adaptive Group Testing of Semantic Web Services. [Citation Graph (, )][DBLP ] Service Identification via Ontology Mapping. [Citation Graph (, )][DBLP ] Optimizing Component-Based Embedded Software. [Citation Graph (, )][DBLP ] Towards Passive RFID Event. [Citation Graph (, )][DBLP ] Towards a Unified Behavioral Model for Component-Based and Service-Oriented Systems. [Citation Graph (, )][DBLP ] Estimating Rate of Queue Usage to Differentiate Cause of Packet Loss in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP ] Testing with Large Parameter Sets for the Development of Embedded Systems in the Automation Domain. [Citation Graph (, )][DBLP ] Deployment of Services Applications in Services Execution Environments. [Citation Graph (, )][DBLP ] Transformational Specification of Complex Legacy Real-Time Systems via Semantic Anchoring. [Citation Graph (, )][DBLP ] An Integrative Approach for Embedded Software Design with UML and Simulink. [Citation Graph (, )][DBLP ] An Overlay-Based Resource Monitoring Scheme for Social Applications in MANET. [Citation Graph (, )][DBLP ] 'State of the Art' in Using Agile Methods for Embedded Systems Development. [Citation Graph (, )][DBLP ] More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective. [Citation Graph (, )][DBLP ] Test Case Mutation in Hybrid State Space for Reduction of No-Fault-Found Test Results in the Industrial Automation Domain. [Citation Graph (, )][DBLP ] Shift Hashing for Memory-Constrained Applications. [Citation Graph (, )][DBLP ] Implementing an Effective Test Automation Framework. [Citation Graph (, )][DBLP ] Transaction Level Control for Application Execution on the SegBus Platform. [Citation Graph (, )][DBLP ] GUI-Based Testing of Boundary Overflow Vulnerability. [Citation Graph (, )][DBLP ] A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFID. [Citation Graph (, )][DBLP ] Test Selection Prioritization Strategy. [Citation Graph (, )][DBLP ] Automatic Testing of Program Security Vulnerabilities. [Citation Graph (, )][DBLP ] Translation-Based Model Checking for PLC Programs. [Citation Graph (, )][DBLP ] A New Mutation Analysis Method for Testing Java Exception Handling. [Citation Graph (, )][DBLP ] Modular Certification of Low-Level Intermediate Representation Programs. [Citation Graph (, )][DBLP ] Integrating System Modeling with Project Management - A Case Study. [Citation Graph (, )][DBLP ] Efficient Temporal Blocking for Stencil Computations by Multicore-Aware Wavefront Parallelization. [Citation Graph (, )][DBLP ] Extensions for Integrated Queries on Heterogeneous Semantic Web Resources. [Citation Graph (, )][DBLP ] Swarm Intelligence in the Fine-Tuning of Software Development Cost Estimation Models. [Citation Graph (, )][DBLP ] Temporally Robust Software Features for Authorship Attribution. [Citation Graph (, )][DBLP ] An Augmented Social Interactive Learning Approach through Web2.0. [Citation Graph (, )][DBLP ] RHE: A Lightweight JVM Instructional Tool. [Citation Graph (, )][DBLP ] The Java Data Mining Package - A Data Processing Library for Java. [Citation Graph (, )][DBLP ] Toward the Design of Robotic Software with Verifiable Safety. [Citation Graph (, )][DBLP ] A Systematic Robot Fault-Tolerance Approach. [Citation Graph (, )][DBLP ] Generation of Pairwise Test Sets Using a Genetic Algorithm. [Citation Graph (, )][DBLP ] An Ontology-Based Approach for GUI Testing. [Citation Graph (, )][DBLP ] A Fine-Grained Privacy Structure for Service-Oriented Architecture. [Citation Graph (, )][DBLP ] A Multi-model Process Improvement Methodology Driven by Capability Profiles. [Citation Graph (, )][DBLP ] On Model Transformation Reuse. [Citation Graph (, )][DBLP ] Requirement Risk Assessment Focused-On Stakeholder Risk Analysis. [Citation Graph (, )][DBLP ] Industrial Opinion on the Effectiveness of Risk Management Methods. [Citation Graph (, )][DBLP ] A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work. [Citation Graph (, )][DBLP ] Industrial Report: Data Reengineering of COBOL Sequential Legacy Systems. [Citation Graph (, )][DBLP ] Dihomotopic Reduction Used in Deadlock Detection. [Citation Graph (, )][DBLP ] Towards a Resource-Aware Component Model for Embedded Systems. [Citation Graph (, )][DBLP ] Efficient Management of Consistent Backups in a Distributed File System. [Citation Graph (, )][DBLP ] Model-Checking BNDC Properties in Cyber-Physical Systems. [Citation Graph (, )][DBLP ] On Expressing Different Concurrency Paradigms on Virtual Execution Systems. [Citation Graph (, )][DBLP ] A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral Research. [Citation Graph (, )][DBLP ] Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research. [Citation Graph (, )][DBLP ] An Integrated Framework for Checking Concurrency-Related Programming Errors. [Citation Graph (, )][DBLP ]