The SCEAS System
Navigation Menu

Conferences in DBLP

International Computer Software and Applications Conference (COMPSAC) (compsac)
2009 (conf/compsac/2009)


  1. A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. [Citation Graph (, )][DBLP]


  2. Requirements Engineering Needs in a Solution and Infrastructure Improvement Project. [Citation Graph (, )][DBLP]


  3. Rediscovering Zachman Framework Using Ontology from a Requirement Engineering Perspective. [Citation Graph (, )][DBLP]


  4. A Scenario-Based Architecture Evaluation Framework for Network Enabled Capability. [Citation Graph (, )][DBLP]


  5. ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. [Citation Graph (, )][DBLP]


  6. Decomposition and Traceability in Software Design. [Citation Graph (, )][DBLP]


  7. Panel on Requirements Engineering for Services. [Citation Graph (, )][DBLP]


  8. Improvements for 802.11-Based Location Fingerprinting Systems. [Citation Graph (, )][DBLP]


  9. Variable Support Based Association Rule Mining. [Citation Graph (, )][DBLP]


  10. Enhancing the Scalability of IMS-Based Presence Service for LBS Applications. [Citation Graph (, )][DBLP]


  11. Social Graph Generation & Forecasting Using Social Network Mining. [Citation Graph (, )][DBLP]


  12. Mobile-Agent Approach for Mobile Code Localization in Ad hoc Networks. [Citation Graph (, )][DBLP]


  13. Indoor Navigation on Distributed Stationary Display Systems. [Citation Graph (, )][DBLP]


  14. Implementing an Mobile Agent Platform for M-Commerce. [Citation Graph (, )][DBLP]


  15. Aspectual Separation of Feature Dependencies for Flexible Feature Composition. [Citation Graph (, )][DBLP]


  16. Semantic Web Enabled Composition of Semantic Web Services. [Citation Graph (, )][DBLP]


  17. An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies. [Citation Graph (, )][DBLP]


  18. Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down Practice. [Citation Graph (, )][DBLP]


  19. OWL Manipulation toward Building Semantic Applications and Agents. [Citation Graph (, )][DBLP]


  20. Transforming a Software Product Company into a Service Business: Case Study at F-Secure. [Citation Graph (, )][DBLP]


  21. Agent-Oriented Middleware for Mobile eLearning Services. [Citation Graph (, )][DBLP]


  22. Viewpoint-Oriented Variability Modeling. [Citation Graph (, )][DBLP]


  23. Real-Time Guarantees in Flexible Advance Reservations. [Citation Graph (, )][DBLP]


  24. Respecting Temporal Constraints in Virtualised Services. [Citation Graph (, )][DBLP]


  25. 3D Support for Business Process Simulation. [Citation Graph (, )][DBLP]


  26. Building an Enterprise Service Bus for Real-Time SOA: A Messaging Middleware Stack. [Citation Graph (, )][DBLP]


  27. An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services. [Citation Graph (, )][DBLP]


  28. A Service Broker Providing Real-Time Telecommunications Services for 3rd Party Services. [Citation Graph (, )][DBLP]


  29. A Study of Applying Extended PIE Technique to Software Testability Analysis. [Citation Graph (, )][DBLP]


  30. A Complex Event Routing Infrastructure for Distributed Systems. [Citation Graph (, )][DBLP]


  31. Universal and Extensible Service-Oriented Platform Feasibility and Experience: The Service Abstract Machine. [Citation Graph (, )][DBLP]


  32. How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization. [Citation Graph (, )][DBLP]


  33. A Survey of Physiological Monitoring Data Models to Support the Service of Critical Care. [Citation Graph (, )][DBLP]


  34. Automatic Discovery of Web Services Based on Dynamic Black-Box Testing. [Citation Graph (, )][DBLP]


  35. Microcontroller-Based AWGNG for Security Enhancement of Embedded Real-Time Web Services. [Citation Graph (, )][DBLP]


  36. An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing Technique. [Citation Graph (, )][DBLP]


  37. Clustering Versus Shared Nothing: A Case Study. [Citation Graph (, )][DBLP]


  38. Toward a Smart Cyber-Physical Space: A Context-Sensitive Resource-Explicit Service Model. [Citation Graph (, )][DBLP]


  39. An Economical Approach to Usability Testing. [Citation Graph (, )][DBLP]


  40. Towards Self-Manageable Cloud Services. [Citation Graph (, )][DBLP]


  41. A Sentence Generation Algorithm for Testing Grammars. [Citation Graph (, )][DBLP]


  42. Dynamic Service and Data Migration in the Clouds. [Citation Graph (, )][DBLP]


  43. Software Input Space Modeling with Constraints among Parameters. [Citation Graph (, )][DBLP]


  44. An OSGi Based In-vehicle Gateway Platform Architecture for Improved Sensor Extensibility and Interoperability. [Citation Graph (, )][DBLP]


  45. HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis. [Citation Graph (, )][DBLP]


  46. Performance Impact Analysis of Two Generic Group Communication APIs. [Citation Graph (, )][DBLP]


  47. Practical Extensions of a Randomized Testing Tool. [Citation Graph (, )][DBLP]


  48. Middleware for RFID Systems: An Overview. [Citation Graph (, )][DBLP]


  49. Asynchronous Input-Output Conformance Testing. [Citation Graph (, )][DBLP]


  50. Towards a Theory for Testing Non-terminating Programs. [Citation Graph (, )][DBLP]


  51. Ubá: A Software Product Line Architecture for Grid-Oriented Middleware. [Citation Graph (, )][DBLP]


  52. Towards Call for Testing: An Application to User Acceptance Testing of Web Applications. [Citation Graph (, )][DBLP]


  53. Design of MIDA, a Web-Based Diagnostic Application for Hydroelectric Generators. [Citation Graph (, )][DBLP]


  54. An Algorithm for Mining Frequent Items on Data Stream Using Fading Factor. [Citation Graph (, )][DBLP]


  55. Towards Improving OCL-Based Descriptions of Software Metrics. [Citation Graph (, )][DBLP]


  56. Impacts Separation Framework for Performance Prediction of Middleware-Based Systems. [Citation Graph (, )][DBLP]


  57. Modeling and Predicting Software Failure Costs. [Citation Graph (, )][DBLP]


  58. Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  59. A Service Discovery System Analyzed with a Queueing Theory Model. [Citation Graph (, )][DBLP]


  60. A Contextual Guidance Approach to Software Security. [Citation Graph (, )][DBLP]


  61. A Hierarchical Reliability Model of Service-Based Software System. [Citation Graph (, )][DBLP]


  62. AlertMe: A Semantics-Based Context-Aware Notification System. [Citation Graph (, )][DBLP]


  63. A Quality-Aware Context Middleware Specification for Context-Aware Computing. [Citation Graph (, )][DBLP]


  64. Applicability of Software Reliability Growth Modeling in the Quality Assurance Phase of a Large Business Software Vendor. [Citation Graph (, )][DBLP]


  65. Context Analysis of Intensional Languages. [Citation Graph (, )][DBLP]


  66. Towards Transaction-Based Reliable Service Compositions. [Citation Graph (, )][DBLP]


  67. Distributed Eductive Execution of Hybrid Intensional Programs. [Citation Graph (, )][DBLP]


  68. Toward Middleware-Based Online Application Migration. [Citation Graph (, )][DBLP]


  69. Relaxed Objects - Object Model for Context-Aware Applications. [Citation Graph (, )][DBLP]


  70. Tool Support for Design Pattern Recognition at Model Level. [Citation Graph (, )][DBLP]


  71. Cartesian Programming: The TransLucid Programming Language. [Citation Graph (, )][DBLP]


  72. Predicting Change Impact in Object-Oriented Applications with Bayesian Networks. [Citation Graph (, )][DBLP]


  73. Declarative Multithreaded Programming. [Citation Graph (, )][DBLP]


  74. Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. [Citation Graph (, )][DBLP]


  75. Formal Analysis of Services Compatibility. [Citation Graph (, )][DBLP]


  76. Computing Reputation for Collaborative Private Networks. [Citation Graph (, )][DBLP]


  77. A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. [Citation Graph (, )][DBLP]


  78. Towards the Operational Semantics of User-Centric Communication Models. [Citation Graph (, )][DBLP]


  79. Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design. [Citation Graph (, )][DBLP]


  80. A Model-Driven Multicore Software Development Environment for Embedded System. [Citation Graph (, )][DBLP]


  81. Software Outsourcing Subcontracting and Its Impacts: An Exploratory Investigation. [Citation Graph (, )][DBLP]


  82. Photon: A Domain-Specific Language for Testing Converged Applications. [Citation Graph (, )][DBLP]


  83. Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  84. Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. [Citation Graph (, )][DBLP]


  85. Hot Set Identification for Social Network Applications. [Citation Graph (, )][DBLP]


  86. Dual-Container: Extending the EJB2.x Container to Support EJB3.0. [Citation Graph (, )][DBLP]


  87. An Agent-Based Framework Supporting Trust Evaluation for Service Selection. [Citation Graph (, )][DBLP]


  88. Best Principles in the Design of Shared Software. [Citation Graph (, )][DBLP]


  89. A Framework for Enabling User-Controlled Persona in Online Social Networks. [Citation Graph (, )][DBLP]


  90. Domain Analysis in the Reengineering Process of a COBOL System. [Citation Graph (, )][DBLP]


  91. ACaMES: A Novel Design Methodology on Multicore Embedded System. [Citation Graph (, )][DBLP]


  92. A Business-Logic Based Framework for Evolving Software Systems. [Citation Graph (, )][DBLP]


  93. ESIDE: An Integrated Development Environment for Component-Based Embedded Systems. [Citation Graph (, )][DBLP]


  94. A Constraint Based Bug Checking Approach for Python. [Citation Graph (, )][DBLP]


  95. Agent Protection Based on the Use of Cryptographic Hardware. [Citation Graph (, )][DBLP]


  96. Formalization and Verification of PLC Timers in Coq. [Citation Graph (, )][DBLP]


  97. Towards Usable Solutions to Graphical Password Hotspot Problem. [Citation Graph (, )][DBLP]


  98. System Safety Requirements as Control Structures. [Citation Graph (, )][DBLP]


  99. On Information Flow Forensics in Business Application Scenarios. [Citation Graph (, )][DBLP]


  100. An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. [Citation Graph (, )][DBLP]


  101. Improving E-Government through Benefit Analysis and Value Modeling. [Citation Graph (, )][DBLP]


  102. A Model for Privacy Policy Visualization. [Citation Graph (, )][DBLP]


  103. Traceability ReARMed. [Citation Graph (, )][DBLP]


  104. The Security Implication of Multiple Observers in a Distributed System. [Citation Graph (, )][DBLP]


  105. Defending Battery Exhaustion Attacks on Mobile Systems. [Citation Graph (, )][DBLP]


  106. Towards a Design Method Supporting the Alignment between Business and Software Services. [Citation Graph (, )][DBLP]


  107. On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software. [Citation Graph (, )][DBLP]


  108. A Framework for Cost Sensitive Assessment of Intrusion Response Selection. [Citation Graph (, )][DBLP]


  109. A Cooperative Framework of Service Chain for Digital Library. [Citation Graph (, )][DBLP]


  110. Applying PageRank Algorithm in Requirement Concern Impact Analysis. [Citation Graph (, )][DBLP]


  111. A Specialized Meta-scheduler for Business and Applications Constraints Management. [Citation Graph (, )][DBLP]


  112. Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat Messages. [Citation Graph (, )][DBLP]


  113. Towards Industry-Strength SLA Optimization Capabilities for Service Chains. [Citation Graph (, )][DBLP]


  114. Analyzing Semantics of Documents by Using a Program Analysis Method. [Citation Graph (, )][DBLP]


  115. Matchmaking Using Natural Language Descriptions: Linking Customers with Enterprise Service Descriptions. [Citation Graph (, )][DBLP]


  116. An Investigation of the Role of Service Level Agreements in Classified Advertisement Websites. [Citation Graph (, )][DBLP]


  117. Tamper Resistance for Software Defined Radio Software. [Citation Graph (, )][DBLP]


  118. Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images. [Citation Graph (, )][DBLP]


  119. PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. [Citation Graph (, )][DBLP]


  120. A Method for Historical Ext3 Inode to Filename Translation on Honeypots. [Citation Graph (, )][DBLP]


  121. Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer? [Citation Graph (, )][DBLP]


  122. A Multiple Secret Sharing Scheme based on Matrix Projection. [Citation Graph (, )][DBLP]


  123. Acer Aspire One Netbooks: A Forensic Challenge. [Citation Graph (, )][DBLP]


  124. Exploring Security in PROFINET IO. [Citation Graph (, )][DBLP]


  125. Penetration Testing for Spam Filters. [Citation Graph (, )][DBLP]


  126. A Static Java Birthmark Based on Control Flow Edges. [Citation Graph (, )][DBLP]


  127. Policy Composition Based on Petri Nets. [Citation Graph (, )][DBLP]


  128. A Secure and Flexible Electronic-Ticket System. [Citation Graph (, )][DBLP]


  129. Verification of Access Control Policies for REA Business Processes. [Citation Graph (, )][DBLP]


  130. Towards a Well Structured and Dynamic Application Server. [Citation Graph (, )][DBLP]


  131. Towards the Verification of Services Collaboration. [Citation Graph (, )][DBLP]


  132. Towards Validating Security Protocol Deployment in the Wild. [Citation Graph (, )][DBLP]


  133. ProtoTalk: A Generative Software Engineering Framework for Prototyping Protocols in Smalltalk. [Citation Graph (, )][DBLP]


  134. On a Classification Approach for SOA Vulnerabilities. [Citation Graph (, )][DBLP]


  135. Usage History-Based Architectural Scheduling. [Citation Graph (, )][DBLP]


  136. SN2K Attacks and Honest Services. [Citation Graph (, )][DBLP]


  137. PhishCatch - A Phishing Detection Tool. [Citation Graph (, )][DBLP]


  138. Software Methodologies for the Engineering of Service-Oriented Industrial Automation: The Continuum Project. [Citation Graph (, )][DBLP]


  139. Adaptive Control Framework for Software Components: Case-Based Reasoning Approach. [Citation Graph (, )][DBLP]


  140. Towards a Next-Generation Matrix Library for Java. [Citation Graph (, )][DBLP]


  141. Modeling Simulink Diagrams Using Input/Output Extended Finite Automata. [Citation Graph (, )][DBLP]


  142. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security. [Citation Graph (, )][DBLP]


  143. Towards Dynamic Component Updating: A Flexible and Lightweight Approach. [Citation Graph (, )][DBLP]


  144. A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS). [Citation Graph (, )][DBLP]


  145. Design of Service Component Layer in SOA Reference Architecture. [Citation Graph (, )][DBLP]


  146. Prevention of Sequential Message Loss in CAN Systems. [Citation Graph (, )][DBLP]


  147. The Design and Implementation of a Bare PC Email Server. [Citation Graph (, )][DBLP]


  148. Risk-Based Adaptive Group Testing of Semantic Web Services. [Citation Graph (, )][DBLP]


  149. Service Identification via Ontology Mapping. [Citation Graph (, )][DBLP]


  150. Optimizing Component-Based Embedded Software. [Citation Graph (, )][DBLP]


  151. Towards Passive RFID Event. [Citation Graph (, )][DBLP]


  152. Towards a Unified Behavioral Model for Component-Based and Service-Oriented Systems. [Citation Graph (, )][DBLP]


  153. Estimating Rate of Queue Usage to Differentiate Cause of Packet Loss in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  154. Testing with Large Parameter Sets for the Development of Embedded Systems in the Automation Domain. [Citation Graph (, )][DBLP]


  155. Deployment of Services Applications in Services Execution Environments. [Citation Graph (, )][DBLP]


  156. Transformational Specification of Complex Legacy Real-Time Systems via Semantic Anchoring. [Citation Graph (, )][DBLP]


  157. An Integrative Approach for Embedded Software Design with UML and Simulink. [Citation Graph (, )][DBLP]


  158. An Overlay-Based Resource Monitoring Scheme for Social Applications in MANET. [Citation Graph (, )][DBLP]


  159. 'State of the Art' in Using Agile Methods for Embedded Systems Development. [Citation Graph (, )][DBLP]


  160. More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective. [Citation Graph (, )][DBLP]


  161. Test Case Mutation in Hybrid State Space for Reduction of No-Fault-Found Test Results in the Industrial Automation Domain. [Citation Graph (, )][DBLP]


  162. Shift Hashing for Memory-Constrained Applications. [Citation Graph (, )][DBLP]


  163. Implementing an Effective Test Automation Framework. [Citation Graph (, )][DBLP]


  164. Transaction Level Control for Application Execution on the SegBus Platform. [Citation Graph (, )][DBLP]


  165. GUI-Based Testing of Boundary Overflow Vulnerability. [Citation Graph (, )][DBLP]


  166. A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFID. [Citation Graph (, )][DBLP]


  167. Test Selection Prioritization Strategy. [Citation Graph (, )][DBLP]


  168. Automatic Testing of Program Security Vulnerabilities. [Citation Graph (, )][DBLP]


  169. Translation-Based Model Checking for PLC Programs. [Citation Graph (, )][DBLP]


  170. A New Mutation Analysis Method for Testing Java Exception Handling. [Citation Graph (, )][DBLP]


  171. Modular Certification of Low-Level Intermediate Representation Programs. [Citation Graph (, )][DBLP]


  172. Integrating System Modeling with Project Management - A Case Study. [Citation Graph (, )][DBLP]


  173. Efficient Temporal Blocking for Stencil Computations by Multicore-Aware Wavefront Parallelization. [Citation Graph (, )][DBLP]


  174. Extensions for Integrated Queries on Heterogeneous Semantic Web Resources. [Citation Graph (, )][DBLP]


  175. Swarm Intelligence in the Fine-Tuning of Software Development Cost Estimation Models. [Citation Graph (, )][DBLP]


  176. Temporally Robust Software Features for Authorship Attribution. [Citation Graph (, )][DBLP]


  177. An Augmented Social Interactive Learning Approach through Web2.0. [Citation Graph (, )][DBLP]


  178. RHE: A Lightweight JVM Instructional Tool. [Citation Graph (, )][DBLP]


  179. The Java Data Mining Package - A Data Processing Library for Java. [Citation Graph (, )][DBLP]


  180. Toward the Design of Robotic Software with Verifiable Safety. [Citation Graph (, )][DBLP]


  181. A Systematic Robot Fault-Tolerance Approach. [Citation Graph (, )][DBLP]


  182. Generation of Pairwise Test Sets Using a Genetic Algorithm. [Citation Graph (, )][DBLP]


  183. An Ontology-Based Approach for GUI Testing. [Citation Graph (, )][DBLP]


  184. A Fine-Grained Privacy Structure for Service-Oriented Architecture. [Citation Graph (, )][DBLP]


  185. A Multi-model Process Improvement Methodology Driven by Capability Profiles. [Citation Graph (, )][DBLP]


  186. On Model Transformation Reuse. [Citation Graph (, )][DBLP]


  187. Requirement Risk Assessment Focused-On Stakeholder Risk Analysis. [Citation Graph (, )][DBLP]


  188. Industrial Opinion on the Effectiveness of Risk Management Methods. [Citation Graph (, )][DBLP]


  189. A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work. [Citation Graph (, )][DBLP]


  190. Industrial Report: Data Reengineering of COBOL Sequential Legacy Systems. [Citation Graph (, )][DBLP]


  191. Dihomotopic Reduction Used in Deadlock Detection. [Citation Graph (, )][DBLP]


  192. Towards a Resource-Aware Component Model for Embedded Systems. [Citation Graph (, )][DBLP]


  193. Efficient Management of Consistent Backups in a Distributed File System. [Citation Graph (, )][DBLP]


  194. Model-Checking BNDC Properties in Cyber-Physical Systems. [Citation Graph (, )][DBLP]


  195. On Expressing Different Concurrency Paradigms on Virtual Execution Systems. [Citation Graph (, )][DBLP]


  196. A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral Research. [Citation Graph (, )][DBLP]


  197. Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research. [Citation Graph (, )][DBLP]


  198. An Integrated Framework for Checking Concurrency-Related Programming Errors. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002