Conferences in DBLP
Mahmoud O. Elish , David C. Rine Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:1-8 [Conf ] George Cybenko , Vincent H. Berk , Ian D. Gregorio-De Souza , Chad Behre Practical Autonomic Computing. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:3-14 [Conf ] Kamala Subramaniam , Alan L. Tharp , Arne A. Nilsson Location Updates In Cellular Networks Using Bloom Filters. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:3-9 [Conf ] Kyosuke Yasuda , Takao Miura , Isamu Shioya Distributed Processes on Tree Hash. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:10-13 [Conf ] Lorenz Froihofer , Johannes Osrael , Karl M. Göschka Trading Integrity for Availability by Means of Explicit Runtime Constraints. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:14-17 [Conf ] Stephen S. Yau Future Trends of Software Technology and Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:15- [Conf ] Paul C. Clements Future Trends of Software Technology and Applications: Software Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:16- [Conf ] Warren Harrison Future Trends of Software Technology and Applications: The Phone is the Computer. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:17- [Conf ] Zhou Yanming , Qu Mingbin Mingbin A Run-time Adaptive and Code-size Efficient XML Parser. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:18-21 [Conf ] John C. Knight Future Trends of Software Technology and Applications Model-Based Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:18- [Conf ] Tsau Young Lin Introduction to Panels on E-Security, Granular Computing and Web Intelligence. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:21- [Conf ] Tsau Young Lin Granular Computing, Computer Security andWeb Intelligence. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:22-23 [Conf ] U. Praphamontripong , Swapna S. Gokhale , Aniruddha S. Gokhale , Jeff Gray Performance Analysis of an Asynchronous Web Server. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:22-28 [Conf ] Ning Zhong How to Make "Web Intelligence (WI) meets Brain Informatics (BI)" Successfully? [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:24-25 [Conf ] Shusaku Tsumoto Data Structure and Algorithm in Data Mining: Granular Computing View. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:26-27 [Conf ] João Araújo , Jon Whittle , Ana Moreira Choosing the Right Time to Compose Aspectual Scenarios. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:29-32 [Conf ] Ann Miller , John McLean , O. Sami Saydjari , Jeffrey M. Voas COMPSAC Panel Session on Trustworthy Computing. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:31- [Conf ] John McLean Trustworthy Software: Why we need it, Why we don't have it, How we can get it. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:32-33 [Conf ] Michael E. Shin , Fernando Paniagua Self-Management of COTS Component-Based Systems Using Wrappers. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:33-36 [Conf ] Ann Miller Trustworthy Computing Needs. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:34- [Conf ] Jeffrey M. Voas Reliability and Fault Tolerance in Trust. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:35-36 [Conf ] O. Sami Saydjari Risk: A Good System Security Measure. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:37-38 [Conf ] Andreas S. Andreou , Dimitrios Vogiatzis , George A. Papadopoulos Intelligent Classification and Retrieval of Software Components. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:37-40 [Conf ] Jane Cleland-Huang Just Enough Requirements Traceability. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:41-42 [Conf ] Yao-Dong Feng , Gang Huang , Jie Yang , Hong Mei Mei Traceability between Software Architecture Models. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:41-44 [Conf ] Carl K. Chang Software Engineering Education in the New Millennium - A View from Asia. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:45- [Conf ] Xiaodong Liu , Yankui Feng , Jon M. Kerridge Achieving Dependable Component-Based Systems Through Generative Aspect Oriented Component Adaptation. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:45-48 [Conf ] Dick B. Simmons Software Engineering Education in the New Millennium. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:46-47 [Conf ] Zhao Liu , Gang Huang , Hong Mei The Model and Implementation of Component Array Container. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:49-54 [Conf ] Monica Adya Imparting Global Software Development Experience via an IT Project Management Course: Critical Success Factors. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:51-52 [Conf ] Umesh Bellur An Academic Perspective on Globalization in the Software Industry. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:53-54 [Conf ] Venu Vasudevan Global Software Enterpreneurship. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:55-56 [Conf ] Jihong Zuo , Qianxiang Wang , Hong Mei Preventing Feature Interactions by Constraints. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:55-58 [Conf ] Rajiv Ramnath Global Software Development for the Enterprise. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:57-58 [Conf ] Matt Barrett , Clark D. Thomborson Frameworks Built on the Trusted Platform Module. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:59-62 [Conf ] Sheikh Iqbal Ahamed Model for Global Software Engineering Project Life Cycle and How to Use it in Classroom for Preparing Our Students for the Globalization. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:59-60 [Conf ] Vibhu Saujanya Sharma , Pankaj Jalote , Kishor S. Trivedi A Performance Engineering Tool for Tiered Software Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:63-70 [Conf ] Pierre-Etienne Poirot , Shangping Ren , Jerzy Nogiec , Jeffrey J. P. Tsai Separating Functional and Non-functional Concerns through Coordination: An Application to Reliability. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:63-66 [Conf ] Moushumi Sharmin , Sheikh Iqbal Ahamed , Shameem Ahmed , Haifeng Li SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:67-70 [Conf ] Lin Liu , Eric Yu , John Mylopoulos Security Design Based on Social Modeling. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:71-78 [Conf ] Amandeep S. Sidhu , Tharam S. Dillon , Farookh Khadeer Hussain Accomplishments and Challenges of Protein Ontology. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:71-76 [Conf ] Edward W. Y. Ho , Dickson K. W. Chiu , Patrick C. K. Hung Alert Based Monitoring of Stock Trading Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:77-86 [Conf ] Dianxiang Xu , Vivek Goel , Kendall E. Nygard An Aspect-Oriented Approach to Security Requirements Analysis. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:79-82 [Conf ] Arnab Ray , Rance Cleaveland A Software Architectural Approach to Security by Design. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:83-86 [Conf ] Tae-hyung Kim , Carl K. Chang An Aspect-Oriented Approach to Resource Composition in Petri net-based Software Architectural Models. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:87-94 [Conf ] Gernot Schmoelzer , Christian Kreiner , Zsolt Kovács , Michael Thonhauser Reflective, Model-Based Data Access with the Type-Safe Entity Container. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:87-92 [Conf ] Adenilso da Silva Simão , Rodrigo Fernandes de Mello , Luciano José Senger A Technique to Reduce the Test Case Suites for Regression Testing Based on a Self-Organizing Neural Network Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:93-96 [Conf ] Michel Jaring Engineering Reconfigurable Product Families - Architecting the Variability Infrastructure of a Product Family On-Chip. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:95-102 [Conf ] Sung Kim , Garrett Hoff Realization of Systematic Reliability Analysis of Decomposable Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:97-100 [Conf ] Adnan Ashraf , Aamer Nadeem Automating the Generation of Test Cases from Object-Z Specifications. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:101-104 [Conf ] Paskorn Champrasert , Junichi Suzuki A Biologically-Inspired Autonomic Architecture for Self-Healing Data Centers. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:103-112 [Conf ] Yvan Labiche Planning and Scheduling from a Class Test Order. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:105-108 [Conf ] Feng-Jian Wang , Chia-Lin Hsu , Huin-Jen Hsu Analyzing Inaccurate Artifact Usages in a Workflow Schema. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:109-114 [Conf ] Federico Balaguer , Thuc S. M. Ho , Ralph E. Johnson Detecting Data Races on Framework-Based Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:113-120 [Conf ] Yong Wang , Dick Simmons Modeling Web Accessibility: A Case Study on Texas A&M University People Website. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:115-118 [Conf ] José Antonio de Frutos , Esther Cadiñanos , Juan Ignacio Pérez , Sara García Tool for Analysis and Simulation of TTCAN Communication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:119-122 [Conf ] Qian Zhang , Jian Wu , Hong Zhu Tool Support to Model-based Quality Analysis of Software Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:121-128 [Conf ] R. Krishnan , Margaret Nadworny Moving Software from Expense to Asset. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:123-126 [Conf ] Russell Lock Automated Negotiation for Service Contracts. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:127-134 [Conf ] Rabih Zbib , Ashish Jain , Devasis Bassu , Hiralal Agrawal Generating Domain Specific Graphical Modeling Editors from Meta Models. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:129-138 [Conf ] Li Ruan , Yongji Wang , Qing Wang , Fengdi Shu , Haitao Zeng , Shen Zhang ARIMAmmse: An Improved ARIMA-based. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:135-138 [Conf ] Anduo Wang , Fei He , Ming Gu , Xiaoyu Song Verifying Java Programs By Theorem Prover HOL. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:139-142 [Conf ] Zhenbang Chen , Ji Wang , Wei Dong , Zhichang Qi , Wing Lok Yeung An Interface Theory Based Approach to Verification of Web Services. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:139-144 [Conf ] Kuangnan Chang , David Chenho Kung Model Checking with Induction. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:143-149 [Conf ] Hong Zhu A Framework for Service-Oriented Testing of Web Services. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:145-150 [Conf ] Jimin Gao , Mats Per Erik Heimdahl , David Owen , Tim Menzies On the Distribution of Property Violations in Formal Models: An Initial Study. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:150-160 [Conf ] Hany F. El Yamany , Miriam A. M. Capretz , Luiz Fernando Capretz A Multi-Agent Framework for Testing Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:151-156 [Conf ] Nuo Li , Qin-qin Ma , Ji Wu , Mao-zhong Jin , Chao Liu A Framework of Model-Driven Web Application Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:157-162 [Conf ] Matthias Book , Volker Gruhn Efficient Modeling of Hierarchical Dialog Flows for Multi-ChannelWeb Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:161-168 [Conf ] W. T. Tsai , Jerry Gao , Xiao Wei , Yinong Chen Testability of Software in Service-Oriented Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:163-170 [Conf ] Raoul Praful Jetley , S. Purushothaman Iyer , Paul L. Jones , William Spees A Formal Approach to Pre-Market Review for Medical Device Software. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:169-177 [Conf ] Dima Suliman , Barbara Paech , Lars Borner , Colin Atkinson , Daniel Brenner , Matthias Merdes , Rainer Malaka The MORABIT Approach to Runtime Component Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:171-176 [Conf ] Fariaz Karim , Harish Thanneer Automated Health-Assessment of Software Components using Management Instrumentatio. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:177-182 [Conf ] Shalom N. Rosenfeld , Ioana Rus , Michel Cukier Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:178-188 [Conf ] Valdivino A. Santiago , Ana Silvia Martins do Amaral , N. L. Vijaykumar , Maria de Fátima Mattiello-Francisco , Eliane Martins , Odnei Cuesta Lopes A Practical Approach for Automated Test Case Generation using Statecharts. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:183-188 [Conf ] Pekka Mäki-Asiala , Mari Matinlassi Quality Assurance of Open Source Components: Integrator Point of View. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:189-194 [Conf ] Rivalino Matias , Paulo J. F. Filho An Experimental Study on Software Aging and Rejuvenation in Web Servers. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:189-196 [Conf ] Hyun Seok Kim , Jeong-Hyun Oh , Jin-Young Choi Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:195-202 [Conf ] Tien N. Nguyen A Novel Structure-Oriented Difference Approach for Software Artifacts. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:197-204 [Conf ] Bo Zhou , Qi Shi , Madjid Merabti Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:203-208 [Conf ] Feng Chen , Hongji Yang , Bing Qiao , William Cheng-Chung Chu A Formal Model Driven Approach to Dependable Software Evolution. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:205-214 [Conf ] John Buford , Emré Celebi , Phyllis G. Frankl Property-Based Peer Trust in the Sleeper Service Discovery Protocol. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:209-214 [Conf ] Zhengping Wu , Alfred C. Weaver Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:215-222 [Conf ] Mahmoud O. Elish Do Structural Design Patterns Promote Design Stability? [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:215-220 [Conf ] Márcio Rodrigo Braz , Silvia Regina Vergilio Software Effort Estimation Based on Use Cases. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:221-228 [Conf ] Kai-Yuan Cai , Lei Zhao , Feng Wang A Dynamic Partitioning Approach for GUI Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:223-228 [Conf ] Liu Jing , He Keqing , Ma Yutao , Peng Rong Scale Free in Software Metrics. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:229-235 [Conf ] Mohamad S. Bayan , João W. Cangussu Automatic Stress and Load Testing for Embedded Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:229-233 [Conf ] Q. P. Hu , Y. S. Dai , M. Xie , S. H. Ng Early Software Reliability Prediction with Extended ANN Model. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:234-239 [Conf ] Yaw-Chung Chen , Wen-Yen Chen An Agent-Based Metric for Quality of Services over Wireless Networks. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:236-246 [Conf ] Dianxun Shuai , Bin Zhang , Cunpai Lu A New Generalized Particle Dynamics Model For Software Cybernetics. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:240-245 [Conf ] Dianxun Shuai , Bin Zhang , Cunpai Lu Self-Organizing Software Processes Based on Particle Dynamics Model. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:246-251 [Conf ] Shaya Potter , Jason Nieh Highly Reliable Mobile Desktop Computing in Your Pocket. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:247-254 [Conf ] Qianxiang Wang , Min Li , Na Meng A Visual Constraint Specifying Approach for Adaptive Software. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:252-257 [Conf ] Henry Novianus Palit , Chi-Hung Chi , Lin Liu Proxy-Based Pervasive Multimedia Content Delivery. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:255-264 [Conf ] Jay S. Bayne A Theory of Software-Mediated Enterprise Governance. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:258-264 [Conf ] Sami Beydeda Self-Metamorphic-Testing Components. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:265-272 [Conf ] Xuchang Zou , Raffaella Settimi , Jane Cleland-Huang Phrasing in Dynamic Requirements Trace Retrieva. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:265-272 [Conf ] Matt Ryan , Sule Simsek , Xiaoqing Frank Liu , Bruce M. McMillin , Ying Cheng An Instance-Based Structured Object Oriented Method for Co-analysis/Co-design of Concurrent Embedded Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:273-280 [Conf ] Duygu Çelik , Atilla Elçi Discovery and Scoring of Semantic Web Services based on Client Requirement(s) through a Semantic Search Agent. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:273-278 [Conf ] Ergun Biçici Consensus Ontology Generation in a Socially Interacting MultiAgent System. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:279-284 [Conf ] Yan Sun , Xiaoqing Frank Liu , Bruce M. McMillin A Methodology for Structured Object-Oriented Elicitation and Analysis of Temporal Constraints in Hardware/Software Co-analysis and Co-design of Real-Time Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:281-290 [Conf ] Dianxun Shuai , Cunpai Lu , Bin Zhang Entanglement Partitioning of Quantum Particles for Data Clustering. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:285-290 [Conf ] Jiang Guo A Coordination Framework for Software Component Based Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:291-298 [Conf ] Xian Shen , Xin Jin , Rongfang Bie , Yunchuan Sun MSC: A Semantic Ranking for Hitting Results of Matchmaking of Services. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:291-296 [Conf ] James Kirby Jr. Model-Driven Agile Development of Reactive Multi-Agent Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:297-302 [Conf ] Nearchos Paspallis , George A. Papadopoulos An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:299-306 [Conf ] Deepak Dahiya , Rajinder K. Sachdeva Understanding Requirements: Aspect Oriented Software Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:303-308 [Conf ] Katsunori Oyama , Atsushi Takeuchi , Hiroshi Fujimoto CAPIS Model Based Software Design Method for Sharing Experts' Thought Processes. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:307-316 [Conf ] Darren Xu , Lein Harn , Mayur Narasimhan , Junzhou Luo An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:309-314 [Conf ] Mohamed M. Kouta , Mohammed M. Abou Rizka , Ahmed M. Elmisery Secure e-Payment using Multi-agent Architecture. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:315-320 [Conf ] Dae-Kyoo Kim , Priya Gokhale A Pattern-Based Technique for Developing UML Models of Access Control Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:317-324 [Conf ] Stanislav Ustymenko , Daniel G. Schwartz An Agent-Oriented Logic for Belief and Trust. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:321-326 [Conf ] Mohammad Al-Subaie , Mohammad Zulkernine Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:325-332 [Conf ] Kashif Zafar , Shahzad Badar Qazi , A. Rauf Baig Mine Detection and Route Planning in Military Warfare using Multi Agent System. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:327-332 [Conf ] Yonggang Zhang , Juergen Rilling , Volker Haarslev An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:333-342 [Conf ] Mehmet Tahir Sandikkaya , Bülent Örencik Agent-Based Offline Electronic Voting. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:333-340 [Conf ] Scott D. Miller A Control-Theoretic Aid to Managing the Construction Phase in Incremental Software Development (Extended Abstract). [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:341-343 [Conf ] Ashish Aggarwal , Pankaj Jalote Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:343-350 [Conf ] Ryan Babbitt Information Privacy Management in Smart Home Environments: Modeling, Verification, and Implementation. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:344-346 [Conf ] Xia Wang Intrusion Detection Techniques in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:347-349 [Conf ] Paskorn Champrasert , Junichi Suzuki SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Managing Network Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:350-352 [Conf ] Orest Pilskalns , Daniel Williams , Damir Aracic , Anneliese Amschler Andrews Security Consistency in UML Designs. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:351-358 [Conf ] Hiroshi Wada , Junichi Suzuki A Domain Specific Modeling Framework for Secure Network Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:353-355 [Conf ] Ayman Z. Faza , Sahra Sedigh-Ali A General Purpose Framework for Wireless Sensor Network Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:356-358 [Conf ] Jinchun Xia QoS-Based Service Composition. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:359-361 [Conf ] Hiroshi Wada , Junichi Suzuki , Katsuya Oba A Service-Oriented Design Framework for Secure Network Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:359-368 [Conf ] Hsinyi Jiang Can the Genetic Algorithm Be a Good Tool for Software Engineering Searching Problems? [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:362-366 [Conf ] Nai Yan Zhao , Mi Wan Shum Technical Solution to Automate Smoke Test Using Rational Functional Tester and Virtualization Technology. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:367- [Conf ] K. R. Jayaram Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:368-369 [Conf ] Koichiro Rinsaka , Kazuya Shibata , Tadashi Dohi Proportional Intensity-Based Software Reliability Modeling with Time-Dependent Metrics. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:369-376 [Conf ] Sandro Ronaldo Bezerra Oliveira , Alexandre Marcos Lins de Vasconcelos A Continuous Improvement Model in ImPProS. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:370-371 [Conf ] Tuomas Lindroth , Raicea Lavinia , Tiberiu Seceleanu , Nastooh Avessta , Jukka Teuhola Building a UML Profile for On-Chip Distributed Platforms. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:372-373 [Conf ] James H. Cross II , T. Dean Hendrix , Larry A. Barowski , Jhilmil Jain Dynamic Object Viewers for Java. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:374-375 [Conf ] John R. Koch , Thomas V. Freiberger Autonomous Real-Time Monitoring of Hydrological Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:376-377 [Conf ] João W. Cangussu , Michael Baron Automatic Identification of Change Points for the System Testing Process. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:377-384 [Conf ] Valerio Plessi , Filippo Bastianini , Sahra Sedigh-Ali An Autonomous and AdaptableWireless Device for Flood Monitoring. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:378-379 [Conf ] Jun Yan , Jian Zhang Backtracking Algorithms and Search Heuristics to Generate Test Suites for Combinatorial Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:385-394 [Conf ] Donglin Liang , Kai Xu Testing Scenario Implementation with Behavior Contracts. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:395-402 [Conf ] Man Fai Lau , Ying Liu , Yuen-Tak Yu On Detection Conditions of Double Faults Related to Terms in Boolean Expressions. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:403-410 [Conf ] Dennis Jeffrey , Neelam Gupta Test Case Prioritization Using Relevant Slices. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:411-420 [Conf ] Gabriela Jacques-Silva , Roberto Jung Drebes , Júlio Gerchman , Joana Matos Fonseca da Trindade , Taisy Silva Weber , Ingrid Jansch-Pôrto A Network-Level Distributed Fault Injector for Experimental Validation of Dependable Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:421-428 [Conf ] W. K. Chan , S. C. Cheung , Jeffrey C. F. Ho , T. H. Tse Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:429-438 [Conf ] Jonatan Alava , Tariq M. King , Peter J. Clarke Automatic Validation of Java Page Flows Using Model-Based Coverage Criteria. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:439-446 [Conf ] Bei-Bei Yin , Yan Shi , Chenggang Bai , Kai-Yuan Cai A Case Study for Invalidating the Markovian Property of GUI Software Structural Profile. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:447-454 [Conf ] Jerry Gao , Deepa Gopinathan , Quan Mai , Jingsha He A Systematic Regression Testing Method and Tool For Software Components. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:455-466 [Conf ] Anton Michlmayr , Pascal Fenkam , Schahram Dustdar Architecting a Testing Framework for Publish/Subscribe Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:467-474 [Conf ] Johannes Mayer , Ralph Guderlei An Empirical Study on the Selection of Good Metamorphic Relations. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:475-484 [Conf ] Kwok Ping Chan , Tsong Yueh Chen , Dave Towey Forgetting Test Cases. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:485-494 [Conf ] Swapna S. Gokhale , Jijun Lu Performance and Availability Analysis of an E-Commerce Site. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:495-502 [Conf ] Stephen S. Yau , Haishan Gong , Dazhi Huang , Wei Gao , Luping Zhu Automated Agent Synthesis for Situation Awareness in Service-Based Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:503-512 [Conf ] Zhi Jin , Lin Liu Web Service Retrieval: An Approach Based on Context Ontology. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:513-520 [Conf ] Yi Deng , S. Masoud Sadjadi , Peter J. Clarke , Chi Zhang , Vagelis Hristidis , Raju Rangaswami , Nagarajan Prabakar A Communication Virtual Machine. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:521-531 [Conf ] Chi-Hung Chi , Lin Liu , LuWei Zhang Quantitative Analysis on the Cacheability Factors of Web Objects. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:532-538 [Conf ]