Conferences in DBLP
2nd International Workshop on Software Cybernetics (IWSC'05). [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] 2nd International Workshop on Quality Assurance and Testing of Web-Based Applications (QATWBA'05). [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Message from the COMPSAC 2005 Fast Abstract Co-Chairs. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Reviewers. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:- [Conf ] Committees. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:- [Conf ] Message from the Program Co-Chairs. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:- [Conf ] Message from the General Chair. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:- [Conf ] Message from the Standing Committee Chair. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:- [Conf ] COMPSAC 2005 Fast Abstracts. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Message from the QATWBA'05 Program Co-Chairs. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Message from the IWSC'05 Workshop Organizers. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Message from the TQACBS 2005 Program Co-Chairs. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] 2nd International Workshop on Languages, Methods, and Tools for Model-Driven Agile Development (MAD'05). [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] 1st International Workshop on Testing and Quality Assurance of Component-Based Software (TQACBS 2005). [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Message from the MAD'05 Workshop Chairs. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:- [Conf ] Thomas J. Ostrand , Elaine J. Weyuker , Robert M. Bell , Rachel C. W. Ostrand A Different View of Fault Prediction. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:3-4 [Conf ] Graham Spittle Industry Trends and Software Assurance. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:3- [Conf ] Hiroshi Ishikawa 0003 A Specification Construction Unit-Based Editor for Z. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:5-6 [Conf ] Yvan Labiche Incremental Class Testing from a Class Test Order. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:7-12 [Conf ] Wei Dong , Ji Wang Contract-Based Formal Specification of Safety Critical Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:7-8 [Conf ] Alexei Lisitsa , Andrei P. Nemytykh Towards Verification via Supercompilation. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:9-10 [Conf ] Ramesh Bharadwaj What Is SINS? [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:11-12 [Conf ] Shuhao Li , Ji Wang , Xin Wang , Zhi-Chang Qi Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:13-18 [Conf ] Xiaoyuan Xie , Baowen Xu , Changhai Nie , Liang Shi , Lei Xu Configuration Strategies for Evolutionary Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:13-14 [Conf ] Shameem Ahmed , Moushumi Sharmin , Sheikh Iqbal Ahamed PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:17-18 [Conf ] Peng Wu 0002 Iterative Metamorphic Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:19-24 [Conf ] Andreas Holzinger , Klaus Schwaberger , Matthias Weitlaner Ubiquitous Computing for Hospital Applications: RFID-Applications to Enable Research in Real-Life Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:19-20 [Conf ] Michel Jaring Product Families On-Chip - Combining the Software Product Family Paradigm with Run-Time Reprogrammable Hardware Technology. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:21-22 [Conf ] Qiming Teng , Hua Wang , Xiangqun Chen A HAL for Component-Based Embedded Operating Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:23-24 [Conf ] William E. Howden Software Test Selection Patterns and Elusive Bugs. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:25-32 [Conf ] Yun-Sam Kim , Eun-Sun Cho Preventing Illegal Usage of Mobile Phone Software. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:25-26 [Conf ] Nader Mohamed , Haitham S. Hamza Toward Stable Software Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:27-28 [Conf ] Atorn Nuntiyagul , Nick Cercone , Kanlaya Naruedomkul Recovering "Lack of Words" in Text Categorization for Item Banks. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:31-32 [Conf ] Detlef Streitferdt , Christian Heller , Ilka Philippow Searching Design Patterns in Source Code. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:33-34 [Conf ] Scott D. Miller , Aditya P. Mathur , Raymond A. DeCarlo DIG: A Tool for Software Process Data Extraction and Grooming. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:35-40 [Conf ] Tony Abou-Assaleh , Nick Cercone , Vlado Keselj A Probabilistic Evaluation Function for Relaxed Unification. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:35-36 [Conf ] Sujaa Rani Mohan , E. K. Park , Yijie Han Association Rule-Based Data Mining Agents for Personalized Web Caching. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:37-38 [Conf ] Ruey-Shun Chen , Ruey-Chyi Wu , J. Y. Chen Data Mining Application in Customer Relationship Management of Credit Card Business. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:39-40 [Conf ] Ching-Pao Chang , Jia-Lyn Lv , Chih-Ping Chu A Defect Estimation Approach for Sequential Inspection Using a Modified Capture-Recapture Model. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:41-46 [Conf ] Chaur-Chin Chen , Hsueh-Ting Chu Similarity Measurement Between Images. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:41-42 [Conf ] Yu Qi , David Chenho Kung , W. Eric Wong An Agent-Based Testing Approach for Web Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:45-50 [Conf ] G. Lorenzo Thione , Dewayne E. Perry Parallel Changes: Detecting Semantic Interferences. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:47-56 [Conf ] Hai Huang , Wei-Tek Tsai , Yinong Chen Autonomous Hot Patching for Web-Based Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:51-56 [Conf ] Maria Cláudia Figueiredo Pereira Emer , Silvia Regina Vergilio , Mario Jino A Testing Approach for XML Schemas. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:57-62 [Conf ] Jody L. Sharpe , João W. Cangussu A Productivity Metric Based on Statistical Pattern Recognition. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:59-64 [Conf ] Giuseppe A. Di Lucca Keynote Speech: Testing Web Applications: The State of Art and the Future Trends. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:65- [Conf ] Victor K. Y. Chan , W. Eric Wong Optimizing and Simplifying Software Metric Models Constructed Using Maximum Likelihood Methods. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:65-70 [Conf ] Nik Looker , Malcolm Munro , Jie Xu Increasing Web Service Dependability Through Consensus Voting. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:66-69 [Conf ] Ernest Cachia , Mark Micallef Measuring the Functionality of Online Stores. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:70-73 [Conf ] Tingting Han , Taolue Chen , Jian Lu Structure Analysis for Dynamic Software Architecture Based on Spatial Logic. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:71-76 [Conf ] Swapna S. Gokhale , Sherif Yacoub Performability Analysis of a Pipeline Software Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:77-82 [Conf ] J. Douglas Birdwell , J. N. Chiasson , Chaouki T. Abdallah , Majeed M. Hayat , Z. Tang , J. White Keynote Speech: The Information Age: Challenges and Opportunities for Control and Engineering. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:77-82 [Conf ] Christopher Griffin , Bharat B. Madan , Kishor S. Trivedi State Space Approach to Security Quantification. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:83-88 [Conf ] Jose C. Lacal High-Assurance Software Design for Mobile Tele-Health Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:85- [Conf ] Robert S. H. Istepanian Wireless Security for Personalized and Mobile Healthcare Services. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:86- [Conf ] Hong Xu , Peter Sawyer , Ian Sommerville Requirement Process Establishment and Improvement: From the Viewpoint of Cybernetics. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:89-92 [Conf ] Ying Pan , Lei Wang , Lu Zhang , Bing Xie , Fuqing Yang An Extended Approach to Improving the Semantic Interoperation Among Reuse Repositories. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:89-94 [Conf ] James H. Graham FMECA Control for Software Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:93-96 [Conf ] Dowming Yeh , Pei-Chen Sun , William Cheng-Chung Chu , Chien-Lung Lin , Hongji Yang An Empirical Study of a Reverse Engineering Method for Aggregation Relationship Based on Operation Propagation. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:95-100 [Conf ] Ugo Buy , Houshang Darabi , Mihai Lehene , Vikram Venepally Supervisory Control of Time Petri Nets Using Net Unfolding. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:97-100 [Conf ] Wei-Tek Tsai , Yinong Chen , Raymond A. Paul , Hai Huang , Xinyu Zhou , Xiao Wei Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:101-106 [Conf ] Scott D. Miller , Raymond A. DeCarlo , Aditya P. Mathur A Software Cybernetic Approach to Control of the Software System Test Phase. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:103-108 [Conf ] Stephen S. Yau , Dazhi Huang , Haishan Gong , Hasan Davulcu Situation-Awareness for Adaptive Coordination in Service-Based Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:107-112 [Conf ] Sami Beydeda Self-Testability in Unit Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:109-112 [Conf ] Kai-Yuan Cai , Tao Jing , Chenggang Bai Partition Testing with Dynamic Partitioning. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:113-116 [Conf ] Nader Mohamed Self-Configuring Communication Middleware Model for Multiple Network Interfaces. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:115-120 [Conf ] Yan Liu , Bojan Cukic , Edgar Fuller , Srikanth Gururajan , Sampath Yerramalla Novelty Detection for a Neural Network-Based Online Adaptive System. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:117-122 [Conf ] Arnor Solberg , Devon Simmonds , Raghu Reddy , Sudipto Ghosh , Robert B. France Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:121-126 [Conf ] João W. Cangussu , Richard M. Karcich A Control Approach for Agile Processes. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:123-126 [Conf ] Ji Wang , Rui Shen , Hong Zhu Agent Oriented Programming Based on SLABS. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:127-132 [Conf ] Frank Padberg On the Potential of Process Simulation in Software Project Schedule Optimization. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:127-130 [Conf ] Shung-Bin Yan , Zu-Nien Lin , Hsun-Jen Hsu , Feng-Jian Wang Intention Scheduling for BDI Agent Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:133-140 [Conf ] Atilla Elçi , Behnam Rahnama Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:133-138 [Conf ] Qianxiang Wang Constraint Violation Detection: A Fundamental Part of Software Cybernetics. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:139-142 [Conf ] Chee-Wei Tan , Dah-Ming Chiu , John C. S. Lui , David K. Y. Yau Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback Control. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:143-145 [Conf ] Mohammad Feroz Raihan , Mohammad Zulkernine Detecting Intrusions Specified in a Software Specification Language. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:143-148 [Conf ] Tiberiu Seceleanu , David Garlan Synchronized Architectures for Adaptive Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:146-151 [Conf ] Hiroyasu Nishiyama SecureC: Control-Flow Protection Against General Buffer Overflow Attack. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:149-155 [Conf ] Nimal Nissanke Component Security - Issues and an Approach. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:152-155 [Conf ] David Llewellyn-Jones , Madjid Merabti , Qi Shi , Bob Askwith Buffer Overrun Prevention Through Component Composition Analysis. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:156-163 [Conf ] Stephen S. Yau Keynote Speech: Model-Driven Agile Development (MAD) for Situation-Aware Software in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:159- [Conf ] Bin Xu Extreme Programming for Distributed Legacy System Reengineering. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:160-165 [Conf ] Ammar Masood , Sahra Sedigh-Ali , Arif Ghafoor Efficiently Managing Security Concerns in Component Based System Design. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:164-169 [Conf ] Andreas Holzinger , Maximilian Errath , Gig Searle , Bettina Thurnher , Wolfgang Slany From Extreme Programming and Usability Engineering to Extreme Usability in Software Engineering Education (XP+UE->XU). [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:169-172 [Conf ] Matthias Book , Volker Gruhn Experiences with a Dialog-Driven Process Model for Web Application Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:173-178 [Conf ] J. Barrie Thompson Industry and Academia: Can They Agree on Best Practice Within Software Engineering?. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:173- [Conf ] Stephen Chen Best Practices in Software Engineering: Does Anybody in Industry or Academia Care? [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:174- [Conf ] Pierre Bourque Principles Should Underlie Standards and Best Practices. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:175- [Conf ] Mechelle Gittens , Yong Kim , David Godwin The Vital Few Versus the Trivial Many: Examining the Pareto Principle for Software. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:179-185 [Conf ] Regina L. O. Moraes , Eliane Martins , Naaliel Vicente Mendes Fault Injection Approach Based on Dependence Analysis. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:181-188 [Conf ] Juha Savolainen , Ian Oliver , Mike Mannion , Hailang Zuo Transitioning from Product Line Requirements to Product Line Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:186-195 [Conf ] Henry Muccini , Marcio S. Dias , Debra J. Richardson Reasoning About Software Architecture-Based Regression Testing Through a Case Study. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:189-195 [Conf ] Cristina Cerschi Seceleanu Designing Controllers for Reachability. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:196-203 [Conf ] Oliver Hummel , Colin Atkinson Automated Harvesting of Test Oracles for Reliability Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:196-202 [Conf ] Yukiteru Yoshihara , Takao Miura Melody Classification Using EM Algorithm. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:204-210 [Conf ] Fevzi Belli , Christof J. Budnik Towards Self-Testing of Component-Based Software. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:205-210 [Conf ] Jerry Gao , Ming-Chih Shih A Component Testability Model for Verification and Measurement. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:211-218 [Conf ] Sukhamay Kundu , Nigel Gwee A Formal Approach to Designing a Class-Subclass Structure Using a Partial-Order on the Functions. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:213-220 [Conf ] Egon Valentini , Gerhard Fliess , Edmund Haselwanter A Framework for Efficient Contract-Based Testing of Software Components. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:219-222 [Conf ] Yanhui Li , Baowen Xu , Jianjiang Lu , Dazhou Kang , Peng Wang A Family of Extended Fuzzy Description Logics. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:221-226 [Conf ] Weijia Deng , Huimin Lin Extended Symbolic Transition Graphs with Assignment. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:227-232 [Conf ] Martin P. Ward , Hussein Zedan MetaWSL and Meta-Transformations in the FermaT Transformation System. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:233-238 [Conf ] Mark Grechanik , Dewayne E. Perry , Don S. Batory Using AOP to Monitor and Administer Software for Grid Computing Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:241-248 [Conf ] Ryosuke Miyoshi , Takao Miura , Isamu Shioya Nearest Neighbor Queries on Extensible Grid Files Using Dimensionality Reduction. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:249-255 [Conf ] Austin Armbruster , Michael R. Gosnell , Bruce M. McMillin , M. L. Crow Power Transmission Control Using Distributed Max Flow. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:256-263 [Conf ] Stephen S. Yau Security and Privacy in Collaborative Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:267- [Conf ] Piero A. Bonatti Rule Languages for Security and Privacy in Cooperative Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:268-269 [Conf ] Dengguo Feng , Ji Xiang Experiences on Intrusion Tolerance Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:270-271 [Conf ] John Bailey , Elizabeth Burd Tree-Map Visualization for Web Accessibility. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:275-280 [Conf ] Yuh-Jzer Joung , Cheng Yen , Chung-Tang Huang , Yi-Jhan Huang On Personal Data License Design and Negotiation. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:281-286 [Conf ] Michael Ruth , Feng Lin , Shengru Tu Adapting Single-Request/Multiple-Response Messaging to Web Services. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:287-292 [Conf ] I-Chen Wu , Jui-Yuan Su , Loon-Been Chen A Web Data Extraction Description Language and Its Implementation. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:293-298 [Conf ] Yu Lei , David Chenho Kung , Qizhi Ye A Blocking-Based Approach to Protocol Validation. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:301-306 [Conf ] Jinchun Xia , Yujia Ge , Carl K. Chang An Empirical Performance Study for Validating a Performance Analysis Approach: PSIM. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:307-312 [Conf ] Yanlong Zhang , Hong Zhu , Sue Greenwood Empirical Validation of Website Timeliness Measures. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:313-318 [Conf ] Puntip Pattaraintakorn , Nick Cercone , Kanlaya Naruedomkul Hybrid Intelligent Systems: Selecting Attributes for Soft-Computing Analysis. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:319-325 [Conf ] Aditya P. Mathur Model-Based Software Testing and Verification. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:329- [Conf ] Mats Per Erik Heimdahl Model-Based Testing: Challenges Ahead. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:330- [Conf ] Ashish Jain Model-Based Testing for Enterprise Software Solutions. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:331- [Conf ] T. H. Tse Research Directions on Model-Based Metamorphic Testing and Verification. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:332- [Conf ] Geoff A. W. West , Stewart Greenhill , Svetha Venkatesh A Probabilistic Approach to the Anxious Home for Activity Monitoring. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:335-340 [Conf ] Alexei Iliasov , Alexander B. Romanovsky Exception Handling in Coordination-Based Mobile Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:341-350 [Conf ] Jon Davis , Andrew Tierney , Elizabeth Chang A User-Adaptable User Interface Model to Support Ubiquitous User Access to EIS Style Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:351-358 [Conf ] Insuk Park , Dongman Lee , Soon J. Hyun A Dynamic Context-Conflict Management Scheme for Group-Aware Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:359-364 [Conf ] Dick B. Simmons Twenty-First Century Software Production Paradigms. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:367- [Conf ] Chris Nelson SSI, Academia and Industry Collaboration. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:368- [Conf ] Victoria Livschitz Conquering the Crisis in Software Engineering. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:369- [Conf ] James H. Cross II 21st-Century Global Software Development and Education Position Statement. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:370- [Conf ] Xiaoqing Frank Liu Collaborative Global Software Development and Education. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:371- [Conf ] Fumiko Nagoya , Shaoying Liu , Yuting Chen A Tool and Case Study for Specification-Based Program Review. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:375-380 [Conf ] Mitchell Loeb , Alan L. Tharp Tridirectional Computed Chaining: An Efficient Hashing Algorithm for Limited Space Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:381-387 [Conf ] Vicky Nassis , Rajagopal Rajugan , Tharam S. Dillon , J. Wenny Rahayu A Requirement Engineering Approach for Designing XML-View Driven, XML Document Warehouses. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:388-395 [Conf ] Matt Ryan , Sojan Markose , Xiaoqing Frank Liu , Ying Cheng Structured Object-Oriented Co-Analysis/Co-Design of Hardware/Software for the FACTS Power System. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:396-402 [Conf ] Koji Ohishi , Hiroyuki Okamura , Tadashi Dohi Gompertz Software Reliability Model and Its Application. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:405-410 [Conf ] Jing Zhao , Hongwei Liu , Gang Cui , Xiao-Zong Yang Software Reliability Growth Model Considering Testing Profile and Operation Profile. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:411-416 [Conf ] Engelbert Hubbers , Bart Jacobs , Wolter Pieters RIES - Internet Voting in Action. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:417-424 [Conf ] Tim Storer , Ishbel Duncan Two Variations to the mCESG Pollsterless E-Voting Scheme. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:425-430 [Conf ] Jeena Srinivas , Stephen Chen Towards a Model of Seamless Mobility - User Value and Security in Computing, Content, and Communications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:433-434 [Conf ] Tafline Murnane , Richard Hall , Karl Reed Towards Describing Black-Box Testing Methods as Atomic Rules. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:437-442 [Conf ] Jian Bing Li , James Miller Testing the Semantics of W3C XML Schema. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:443-448 [Conf ] Arnaud Gotlieb , Tristan Denmat , Bernard Botella Goal-Oriented Test Data Generation for Programs with Pointer Variables. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:449-454 [Conf ] George Devaraj , Mats Per Erik Heimdahl , Donglin Liang Coverage-Directed Test Generation with Model Checkers: Challenges and Opportunities. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:455-462 [Conf ] Jerry Gao , Raquel Espinoza , Jingsha He Testing Coverage Analysis for Software Component Validation. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:463-470 [Conf ] Sergiy A. Vilkomir , David Lorge Parnas , Veena B. Mendiratta , Eamonn Murphy Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:473-478 [Conf ] Nik Looker , Malcolm Munro , Jie Xu A Comparison of Network Level Fault Injection with Code Insertion. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:479-484 [Conf ] Tiancheng Liu , Gang Huang , Gang Fan , Hong Mei The Coordinated Recovery of Data Service and Transaction Service in J2EE. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:485-490 [Conf ] Guohui Li , LihChyun Shu A Low-Latency Checkpointing Scheme for Mobile Computing Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:491-496 [Conf ] Stuart Anderson , Massimo Felici How Democratic Will E-Democracy Be? [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:499- [Conf ] Ian Brown Who Is Enfranchised by Remote Voting? [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:500- [Conf ] Peter Ryan Prospects for E-Voting. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:501- [Conf ] Jacques Bus How Democratic Will E-Democracy Be? [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:502- [Conf ] Michael Maaser , Peter Langendörfer Automated Negotiation of Privacy Contracts. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:505-510 [Conf ] En Tzu Wang , Guanling Lee , Yu Tzu Lin A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:511-516 [Conf ] Engin Kirda , Christopher Krügel Protecting Users Against Phishing Attacks with AntiPhish. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:517-524 [Conf ] Fang-Yie Leu , Jia-Chun Lin , Ming-Chang Li , Chao-Tung Yang A Performance-Based Grid Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:525-530 [Conf ] Hung-Chang Hsiao , Chung-Ta King Scoped Broadcast in Dynamic Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:533-538 [Conf ] K. S. Bae , K. K. Kim , Y. G. Chung , W. P. Yu Character Recognition System for Cellular Phone with Camera. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:539-544 [Conf ] Egon Teiniker , Robert Lechner , Gernot Schmoelzer , Christian Kreiner , Zsolt Kovács , Reinhold Weiss Towards a Contract Aware CORBA Component Container. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:545-550 [Conf ] Hidenori Umeno , Masato Kiyama , Takafumi Fukunaga , Takashige Kubo New Method for Dispatching Waiting Logical Processors in Virtual Machine Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:551-560 [Conf ] Bhavani M. Thuraisingham Trust Management in a Distributed Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:561-562 [Conf ]