The SCEAS System
Navigation Menu

Conferences in DBLP

International Computer Software and Applications Conference (COMPSAC) (compsac)
2005 (conf/compsac/2005)


  1. 2nd International Workshop on Software Cybernetics (IWSC'05). [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  2. 2nd International Workshop on Quality Assurance and Testing of Web-Based Applications (QATWBA'05). [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  3. Message from the COMPSAC 2005 Fast Abstract Co-Chairs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  4. Reviewers. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:- [Conf]

  5. Committees. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:- [Conf]

  6. Message from the Program Co-Chairs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:- [Conf]

  7. Message from the General Chair. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:- [Conf]

  8. Message from the Standing Committee Chair. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:- [Conf]

  9. COMPSAC 2005 Fast Abstracts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  10. Message from the QATWBA'05 Program Co-Chairs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  11. Message from the IWSC'05 Workshop Organizers. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  12. Message from the TQACBS 2005 Program Co-Chairs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  13. 2nd International Workshop on Languages, Methods, and Tools for Model-Driven Agile Development (MAD'05). [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  14. 1st International Workshop on Testing and Quality Assurance of Component-Based Software (TQACBS 2005). [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]

  15. Message from the MAD'05 Workshop Chairs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:- [Conf]
  16. Thomas J. Ostrand, Elaine J. Weyuker, Robert M. Bell, Rachel C. W. Ostrand
    A Different View of Fault Prediction. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:3-4 [Conf]
  17. Graham Spittle
    Industry Trends and Software Assurance. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:3- [Conf]
  18. Hiroshi Ishikawa 0003
    A Specification Construction Unit-Based Editor for Z. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:5-6 [Conf]
  19. Yvan Labiche
    Incremental Class Testing from a Class Test Order. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:7-12 [Conf]
  20. Wei Dong, Ji Wang
    Contract-Based Formal Specification of Safety Critical Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:7-8 [Conf]
  21. Alexei Lisitsa, Andrei P. Nemytykh
    Towards Verification via Supercompilation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:9-10 [Conf]
  22. Ramesh Bharadwaj
    What Is SINS? [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:11-12 [Conf]
  23. Shuhao Li, Ji Wang, Xin Wang, Zhi-Chang Qi
    Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:13-18 [Conf]
  24. Xiaoyuan Xie, Baowen Xu, Changhai Nie, Liang Shi, Lei Xu
    Configuration Strategies for Evolutionary Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:13-14 [Conf]
  25. Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed
    PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:17-18 [Conf]
  26. Peng Wu 0002
    Iterative Metamorphic Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:19-24 [Conf]
  27. Andreas Holzinger, Klaus Schwaberger, Matthias Weitlaner
    Ubiquitous Computing for Hospital Applications: RFID-Applications to Enable Research in Real-Life Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:19-20 [Conf]
  28. Michel Jaring
    Product Families On-Chip - Combining the Software Product Family Paradigm with Run-Time Reprogrammable Hardware Technology. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:21-22 [Conf]
  29. Qiming Teng, Hua Wang, Xiangqun Chen
    A HAL for Component-Based Embedded Operating Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:23-24 [Conf]
  30. William E. Howden
    Software Test Selection Patterns and Elusive Bugs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:25-32 [Conf]
  31. Yun-Sam Kim, Eun-Sun Cho
    Preventing Illegal Usage of Mobile Phone Software. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:25-26 [Conf]
  32. Nader Mohamed, Haitham S. Hamza
    Toward Stable Software Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:27-28 [Conf]
  33. Atorn Nuntiyagul, Nick Cercone, Kanlaya Naruedomkul
    Recovering "Lack of Words" in Text Categorization for Item Banks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:31-32 [Conf]
  34. Detlef Streitferdt, Christian Heller, Ilka Philippow
    Searching Design Patterns in Source Code. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:33-34 [Conf]
  35. Scott D. Miller, Aditya P. Mathur, Raymond A. DeCarlo
    DIG: A Tool for Software Process Data Extraction and Grooming. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:35-40 [Conf]
  36. Tony Abou-Assaleh, Nick Cercone, Vlado Keselj
    A Probabilistic Evaluation Function for Relaxed Unification. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:35-36 [Conf]
  37. Sujaa Rani Mohan, E. K. Park, Yijie Han
    Association Rule-Based Data Mining Agents for Personalized Web Caching. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:37-38 [Conf]
  38. Ruey-Shun Chen, Ruey-Chyi Wu, J. Y. Chen
    Data Mining Application in Customer Relationship Management of Credit Card Business. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:39-40 [Conf]
  39. Ching-Pao Chang, Jia-Lyn Lv, Chih-Ping Chu
    A Defect Estimation Approach for Sequential Inspection Using a Modified Capture-Recapture Model. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:41-46 [Conf]
  40. Chaur-Chin Chen, Hsueh-Ting Chu
    Similarity Measurement Between Images. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:41-42 [Conf]
  41. Yu Qi, David Chenho Kung, W. Eric Wong
    An Agent-Based Testing Approach for Web Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:45-50 [Conf]
  42. G. Lorenzo Thione, Dewayne E. Perry
    Parallel Changes: Detecting Semantic Interferences. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:47-56 [Conf]
  43. Hai Huang, Wei-Tek Tsai, Yinong Chen
    Autonomous Hot Patching for Web-Based Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:51-56 [Conf]
  44. Maria Cláudia Figueiredo Pereira Emer, Silvia Regina Vergilio, Mario Jino
    A Testing Approach for XML Schemas. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:57-62 [Conf]
  45. Jody L. Sharpe, João W. Cangussu
    A Productivity Metric Based on Statistical Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:59-64 [Conf]
  46. Giuseppe A. Di Lucca
    Keynote Speech: Testing Web Applications: The State of Art and the Future Trends. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:65- [Conf]
  47. Victor K. Y. Chan, W. Eric Wong
    Optimizing and Simplifying Software Metric Models Constructed Using Maximum Likelihood Methods. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:65-70 [Conf]
  48. Nik Looker, Malcolm Munro, Jie Xu
    Increasing Web Service Dependability Through Consensus Voting. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:66-69 [Conf]
  49. Ernest Cachia, Mark Micallef
    Measuring the Functionality of Online Stores. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:70-73 [Conf]
  50. Tingting Han, Taolue Chen, Jian Lu
    Structure Analysis for Dynamic Software Architecture Based on Spatial Logic. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:71-76 [Conf]
  51. Swapna S. Gokhale, Sherif Yacoub
    Performability Analysis of a Pipeline Software Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:77-82 [Conf]
  52. J. Douglas Birdwell, J. N. Chiasson, Chaouki T. Abdallah, Majeed M. Hayat, Z. Tang, J. White
    Keynote Speech: The Information Age: Challenges and Opportunities for Control and Engineering. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:77-82 [Conf]
  53. Christopher Griffin, Bharat B. Madan, Kishor S. Trivedi
    State Space Approach to Security Quantification. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:83-88 [Conf]
  54. Jose C. Lacal
    High-Assurance Software Design for Mobile Tele-Health Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:85- [Conf]
  55. Robert S. H. Istepanian
    Wireless Security for Personalized and Mobile Healthcare Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:86- [Conf]
  56. Hong Xu, Peter Sawyer, Ian Sommerville
    Requirement Process Establishment and Improvement: From the Viewpoint of Cybernetics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:89-92 [Conf]
  57. Ying Pan, Lei Wang, Lu Zhang, Bing Xie, Fuqing Yang
    An Extended Approach to Improving the Semantic Interoperation Among Reuse Repositories. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:89-94 [Conf]
  58. James H. Graham
    FMECA Control for Software Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:93-96 [Conf]
  59. Dowming Yeh, Pei-Chen Sun, William Cheng-Chung Chu, Chien-Lung Lin, Hongji Yang
    An Empirical Study of a Reverse Engineering Method for Aggregation Relationship Based on Operation Propagation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:95-100 [Conf]
  60. Ugo Buy, Houshang Darabi, Mihai Lehene, Vikram Venepally
    Supervisory Control of Time Petri Nets Using Net Unfolding. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:97-100 [Conf]
  61. Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Hai Huang, Xinyu Zhou, Xiao Wei
    Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:101-106 [Conf]
  62. Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur
    A Software Cybernetic Approach to Control of the Software System Test Phase. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:103-108 [Conf]
  63. Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan Davulcu
    Situation-Awareness for Adaptive Coordination in Service-Based Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:107-112 [Conf]
  64. Sami Beydeda
    Self-Testability in Unit Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:109-112 [Conf]
  65. Kai-Yuan Cai, Tao Jing, Chenggang Bai
    Partition Testing with Dynamic Partitioning. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:113-116 [Conf]
  66. Nader Mohamed
    Self-Configuring Communication Middleware Model for Multiple Network Interfaces. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:115-120 [Conf]
  67. Yan Liu, Bojan Cukic, Edgar Fuller, Srikanth Gururajan, Sampath Yerramalla
    Novelty Detection for a Neural Network-Based Online Adaptive System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:117-122 [Conf]
  68. Arnor Solberg, Devon Simmonds, Raghu Reddy, Sudipto Ghosh, Robert B. France
    Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:121-126 [Conf]
  69. João W. Cangussu, Richard M. Karcich
    A Control Approach for Agile Processes. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:123-126 [Conf]
  70. Ji Wang, Rui Shen, Hong Zhu
    Agent Oriented Programming Based on SLABS. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:127-132 [Conf]
  71. Frank Padberg
    On the Potential of Process Simulation in Software Project Schedule Optimization. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:127-130 [Conf]
  72. Shung-Bin Yan, Zu-Nien Lin, Hsun-Jen Hsu, Feng-Jian Wang
    Intention Scheduling for BDI Agent Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:133-140 [Conf]
  73. Atilla Elçi, Behnam Rahnama
    Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:133-138 [Conf]
  74. Qianxiang Wang
    Constraint Violation Detection: A Fundamental Part of Software Cybernetics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:139-142 [Conf]
  75. Chee-Wei Tan, Dah-Ming Chiu, John C. S. Lui, David K. Y. Yau
    Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback Control. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:143-145 [Conf]
  76. Mohammad Feroz Raihan, Mohammad Zulkernine
    Detecting Intrusions Specified in a Software Specification Language. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:143-148 [Conf]
  77. Tiberiu Seceleanu, David Garlan
    Synchronized Architectures for Adaptive Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:146-151 [Conf]
  78. Hiroyasu Nishiyama
    SecureC: Control-Flow Protection Against General Buffer Overflow Attack. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:149-155 [Conf]
  79. Nimal Nissanke
    Component Security - Issues and an Approach. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:152-155 [Conf]
  80. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
    Buffer Overrun Prevention Through Component Composition Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:156-163 [Conf]
  81. Stephen S. Yau
    Keynote Speech: Model-Driven Agile Development (MAD) for Situation-Aware Software in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:159- [Conf]
  82. Bin Xu
    Extreme Programming for Distributed Legacy System Reengineering. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:160-165 [Conf]
  83. Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
    Efficiently Managing Security Concerns in Component Based System Design. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:164-169 [Conf]
  84. Andreas Holzinger, Maximilian Errath, Gig Searle, Bettina Thurnher, Wolfgang Slany
    From Extreme Programming and Usability Engineering to Extreme Usability in Software Engineering Education (XP+UE->XU). [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:169-172 [Conf]
  85. Matthias Book, Volker Gruhn
    Experiences with a Dialog-Driven Process Model for Web Application Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:173-178 [Conf]
  86. J. Barrie Thompson
    Industry and Academia: Can They Agree on Best Practice Within Software Engineering?. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:173- [Conf]
  87. Stephen Chen
    Best Practices in Software Engineering: Does Anybody in Industry or Academia Care? [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:174- [Conf]
  88. Pierre Bourque
    Principles Should Underlie Standards and Best Practices. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:175- [Conf]
  89. Mechelle Gittens, Yong Kim, David Godwin
    The Vital Few Versus the Trivial Many: Examining the Pareto Principle for Software. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:179-185 [Conf]
  90. Regina L. O. Moraes, Eliane Martins, Naaliel Vicente Mendes
    Fault Injection Approach Based on Dependence Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:181-188 [Conf]
  91. Juha Savolainen, Ian Oliver, Mike Mannion, Hailang Zuo
    Transitioning from Product Line Requirements to Product Line Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:186-195 [Conf]
  92. Henry Muccini, Marcio S. Dias, Debra J. Richardson
    Reasoning About Software Architecture-Based Regression Testing Through a Case Study. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:189-195 [Conf]
  93. Cristina Cerschi Seceleanu
    Designing Controllers for Reachability. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:196-203 [Conf]
  94. Oliver Hummel, Colin Atkinson
    Automated Harvesting of Test Oracles for Reliability Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:196-202 [Conf]
  95. Yukiteru Yoshihara, Takao Miura
    Melody Classification Using EM Algorithm. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:204-210 [Conf]
  96. Fevzi Belli, Christof J. Budnik
    Towards Self-Testing of Component-Based Software. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:205-210 [Conf]
  97. Jerry Gao, Ming-Chih Shih
    A Component Testability Model for Verification and Measurement. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:211-218 [Conf]
  98. Sukhamay Kundu, Nigel Gwee
    A Formal Approach to Designing a Class-Subclass Structure Using a Partial-Order on the Functions. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:213-220 [Conf]
  99. Egon Valentini, Gerhard Fliess, Edmund Haselwanter
    A Framework for Efficient Contract-Based Testing of Software Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:219-222 [Conf]
  100. Yanhui Li, Baowen Xu, Jianjiang Lu, Dazhou Kang, Peng Wang
    A Family of Extended Fuzzy Description Logics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:221-226 [Conf]
  101. Weijia Deng, Huimin Lin
    Extended Symbolic Transition Graphs with Assignment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:227-232 [Conf]
  102. Martin P. Ward, Hussein Zedan
    MetaWSL and Meta-Transformations in the FermaT Transformation System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:233-238 [Conf]
  103. Mark Grechanik, Dewayne E. Perry, Don S. Batory
    Using AOP to Monitor and Administer Software for Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:241-248 [Conf]
  104. Ryosuke Miyoshi, Takao Miura, Isamu Shioya
    Nearest Neighbor Queries on Extensible Grid Files Using Dimensionality Reduction. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:249-255 [Conf]
  105. Austin Armbruster, Michael R. Gosnell, Bruce M. McMillin, M. L. Crow
    Power Transmission Control Using Distributed Max Flow. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:256-263 [Conf]
  106. Stephen S. Yau
    Security and Privacy in Collaborative Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:267- [Conf]
  107. Piero A. Bonatti
    Rule Languages for Security and Privacy in Cooperative Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:268-269 [Conf]
  108. Dengguo Feng, Ji Xiang
    Experiences on Intrusion Tolerance Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:270-271 [Conf]
  109. John Bailey, Elizabeth Burd
    Tree-Map Visualization for Web Accessibility. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:275-280 [Conf]
  110. Yuh-Jzer Joung, Cheng Yen, Chung-Tang Huang, Yi-Jhan Huang
    On Personal Data License Design and Negotiation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:281-286 [Conf]
  111. Michael Ruth, Feng Lin, Shengru Tu
    Adapting Single-Request/Multiple-Response Messaging to Web Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:287-292 [Conf]
  112. I-Chen Wu, Jui-Yuan Su, Loon-Been Chen
    A Web Data Extraction Description Language and Its Implementation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:293-298 [Conf]
  113. Yu Lei, David Chenho Kung, Qizhi Ye
    A Blocking-Based Approach to Protocol Validation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:301-306 [Conf]
  114. Jinchun Xia, Yujia Ge, Carl K. Chang
    An Empirical Performance Study for Validating a Performance Analysis Approach: PSIM. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:307-312 [Conf]
  115. Yanlong Zhang, Hong Zhu, Sue Greenwood
    Empirical Validation of Website Timeliness Measures. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:313-318 [Conf]
  116. Puntip Pattaraintakorn, Nick Cercone, Kanlaya Naruedomkul
    Hybrid Intelligent Systems: Selecting Attributes for Soft-Computing Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:319-325 [Conf]
  117. Aditya P. Mathur
    Model-Based Software Testing and Verification. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:329- [Conf]
  118. Mats Per Erik Heimdahl
    Model-Based Testing: Challenges Ahead. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:330- [Conf]
  119. Ashish Jain
    Model-Based Testing for Enterprise Software Solutions. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:331- [Conf]
  120. T. H. Tse
    Research Directions on Model-Based Metamorphic Testing and Verification. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:332- [Conf]
  121. Geoff A. W. West, Stewart Greenhill, Svetha Venkatesh
    A Probabilistic Approach to the Anxious Home for Activity Monitoring. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:335-340 [Conf]
  122. Alexei Iliasov, Alexander B. Romanovsky
    Exception Handling in Coordination-Based Mobile Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:341-350 [Conf]
  123. Jon Davis, Andrew Tierney, Elizabeth Chang
    A User-Adaptable User Interface Model to Support Ubiquitous User Access to EIS Style Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:351-358 [Conf]
  124. Insuk Park, Dongman Lee, Soon J. Hyun
    A Dynamic Context-Conflict Management Scheme for Group-Aware Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:359-364 [Conf]
  125. Dick B. Simmons
    Twenty-First Century Software Production Paradigms. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:367- [Conf]
  126. Chris Nelson
    SSI, Academia and Industry Collaboration. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:368- [Conf]
  127. Victoria Livschitz
    Conquering the Crisis in Software Engineering. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:369- [Conf]
  128. James H. Cross II
    21st-Century Global Software Development and Education Position Statement. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:370- [Conf]
  129. Xiaoqing Frank Liu
    Collaborative Global Software Development and Education. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:371- [Conf]
  130. Fumiko Nagoya, Shaoying Liu, Yuting Chen
    A Tool and Case Study for Specification-Based Program Review. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:375-380 [Conf]
  131. Mitchell Loeb, Alan L. Tharp
    Tridirectional Computed Chaining: An Efficient Hashing Algorithm for Limited Space Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:381-387 [Conf]
  132. Vicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu
    A Requirement Engineering Approach for Designing XML-View Driven, XML Document Warehouses. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:388-395 [Conf]
  133. Matt Ryan, Sojan Markose, Xiaoqing Frank Liu, Ying Cheng
    Structured Object-Oriented Co-Analysis/Co-Design of Hardware/Software for the FACTS Power System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:396-402 [Conf]
  134. Koji Ohishi, Hiroyuki Okamura, Tadashi Dohi
    Gompertz Software Reliability Model and Its Application. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:405-410 [Conf]
  135. Jing Zhao, Hongwei Liu, Gang Cui, Xiao-Zong Yang
    Software Reliability Growth Model Considering Testing Profile and Operation Profile. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:411-416 [Conf]
  136. Engelbert Hubbers, Bart Jacobs, Wolter Pieters
    RIES - Internet Voting in Action. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:417-424 [Conf]
  137. Tim Storer, Ishbel Duncan
    Two Variations to the mCESG Pollsterless E-Voting Scheme. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:425-430 [Conf]
  138. Jeena Srinivas, Stephen Chen
    Towards a Model of Seamless Mobility - User Value and Security in Computing, Content, and Communications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:433-434 [Conf]
  139. Tafline Murnane, Richard Hall, Karl Reed
    Towards Describing Black-Box Testing Methods as Atomic Rules. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:437-442 [Conf]
  140. Jian Bing Li, James Miller
    Testing the Semantics of W3C XML Schema. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:443-448 [Conf]
  141. Arnaud Gotlieb, Tristan Denmat, Bernard Botella
    Goal-Oriented Test Data Generation for Programs with Pointer Variables. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:449-454 [Conf]
  142. George Devaraj, Mats Per Erik Heimdahl, Donglin Liang
    Coverage-Directed Test Generation with Model Checkers: Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:455-462 [Conf]
  143. Jerry Gao, Raquel Espinoza, Jingsha He
    Testing Coverage Analysis for Software Component Validation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:463-470 [Conf]
  144. Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy
    Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:473-478 [Conf]
  145. Nik Looker, Malcolm Munro, Jie Xu
    A Comparison of Network Level Fault Injection with Code Insertion. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:479-484 [Conf]
  146. Tiancheng Liu, Gang Huang, Gang Fan, Hong Mei
    The Coordinated Recovery of Data Service and Transaction Service in J2EE. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:485-490 [Conf]
  147. Guohui Li, LihChyun Shu
    A Low-Latency Checkpointing Scheme for Mobile Computing Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:491-496 [Conf]
  148. Stuart Anderson, Massimo Felici
    How Democratic Will E-Democracy Be? [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:499- [Conf]
  149. Ian Brown
    Who Is Enfranchised by Remote Voting? [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:500- [Conf]
  150. Peter Ryan
    Prospects for E-Voting. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:501- [Conf]
  151. Jacques Bus
    How Democratic Will E-Democracy Be? [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:502- [Conf]
  152. Michael Maaser, Peter Langendörfer
    Automated Negotiation of Privacy Contracts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:505-510 [Conf]
  153. En Tzu Wang, Guanling Lee, Yu Tzu Lin
    A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:511-516 [Conf]
  154. Engin Kirda, Christopher Krügel
    Protecting Users Against Phishing Attacks with AntiPhish. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:517-524 [Conf]
  155. Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang
    A Performance-Based Grid Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:525-530 [Conf]
  156. Hung-Chang Hsiao, Chung-Ta King
    Scoped Broadcast in Dynamic Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:533-538 [Conf]
  157. K. S. Bae, K. K. Kim, Y. G. Chung, W. P. Yu
    Character Recognition System for Cellular Phone with Camera. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:539-544 [Conf]
  158. Egon Teiniker, Robert Lechner, Gernot Schmoelzer, Christian Kreiner, Zsolt Kovács, Reinhold Weiss
    Towards a Contract Aware CORBA Component Container. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:545-550 [Conf]
  159. Hidenori Umeno, Masato Kiyama, Takafumi Fukunaga, Takashige Kubo
    New Method for Dispatching Waiting Logical Processors in Virtual Machine Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:551-560 [Conf]
  160. Bhavani M. Thuraisingham
    Trust Management in a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:561-562 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002