The SCEAS System
Navigation Menu

Conferences in DBLP

International Computer Software and Applications Conference (COMPSAC) (compsac)
2006 (conf/compsac/2006)

  1. Mahmoud O. Elish, David C. Rine
    Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:1-8 [Conf]
  2. George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre
    Practical Autonomic Computing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:3-14 [Conf]
  3. Kamala Subramaniam, Alan L. Tharp, Arne A. Nilsson
    Location Updates In Cellular Networks Using Bloom Filters. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:3-9 [Conf]
  4. Kyosuke Yasuda, Takao Miura, Isamu Shioya
    Distributed Processes on Tree Hash. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:10-13 [Conf]
  5. Lorenz Froihofer, Johannes Osrael, Karl M. Göschka
    Trading Integrity for Availability by Means of Explicit Runtime Constraints. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:14-17 [Conf]
  6. Stephen S. Yau
    Future Trends of Software Technology and Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:15- [Conf]
  7. Paul C. Clements
    Future Trends of Software Technology and Applications: Software Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:16- [Conf]
  8. Warren Harrison
    Future Trends of Software Technology and Applications: The Phone is the Computer. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:17- [Conf]
  9. Zhou Yanming, Qu Mingbin Mingbin
    A Run-time Adaptive and Code-size Efficient XML Parser. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:18-21 [Conf]
  10. John C. Knight
    Future Trends of Software Technology and Applications Model-Based Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:18- [Conf]
  11. Tsau Young Lin
    Introduction to Panels on E-Security, Granular Computing and Web Intelligence. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:21- [Conf]
  12. Tsau Young Lin
    Granular Computing, Computer Security andWeb Intelligence. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:22-23 [Conf]
  13. U. Praphamontripong, Swapna S. Gokhale, Aniruddha S. Gokhale, Jeff Gray
    Performance Analysis of an Asynchronous Web Server. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:22-28 [Conf]
  14. Ning Zhong
    How to Make "Web Intelligence (WI) meets Brain Informatics (BI)" Successfully? [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:24-25 [Conf]
  15. Shusaku Tsumoto
    Data Structure and Algorithm in Data Mining: Granular Computing View. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:26-27 [Conf]
  16. João Araújo, Jon Whittle, Ana Moreira
    Choosing the Right Time to Compose Aspectual Scenarios. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:29-32 [Conf]
  17. Ann Miller, John McLean, O. Sami Saydjari, Jeffrey M. Voas
    COMPSAC Panel Session on Trustworthy Computing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:31- [Conf]
  18. John McLean
    Trustworthy Software: Why we need it, Why we don't have it, How we can get it. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:32-33 [Conf]
  19. Michael E. Shin, Fernando Paniagua
    Self-Management of COTS Component-Based Systems Using Wrappers. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:33-36 [Conf]
  20. Ann Miller
    Trustworthy Computing Needs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:34- [Conf]
  21. Jeffrey M. Voas
    Reliability and Fault Tolerance in Trust. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:35-36 [Conf]
  22. O. Sami Saydjari
    Risk: A Good System Security Measure. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:37-38 [Conf]
  23. Andreas S. Andreou, Dimitrios Vogiatzis, George A. Papadopoulos
    Intelligent Classification and Retrieval of Software Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:37-40 [Conf]
  24. Jane Cleland-Huang
    Just Enough Requirements Traceability. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:41-42 [Conf]
  25. Yao-Dong Feng, Gang Huang, Jie Yang, Hong Mei Mei
    Traceability between Software Architecture Models. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:41-44 [Conf]
  26. Carl K. Chang
    Software Engineering Education in the New Millennium - A View from Asia. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:45- [Conf]
  27. Xiaodong Liu, Yankui Feng, Jon M. Kerridge
    Achieving Dependable Component-Based Systems Through Generative Aspect Oriented Component Adaptation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:45-48 [Conf]
  28. Dick B. Simmons
    Software Engineering Education in the New Millennium. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:46-47 [Conf]
  29. Zhao Liu, Gang Huang, Hong Mei
    The Model and Implementation of Component Array Container. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:49-54 [Conf]
  30. Monica Adya
    Imparting Global Software Development Experience via an IT Project Management Course: Critical Success Factors. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:51-52 [Conf]
  31. Umesh Bellur
    An Academic Perspective on Globalization in the Software Industry. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:53-54 [Conf]
  32. Venu Vasudevan
    Global Software Enterpreneurship. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:55-56 [Conf]
  33. Jihong Zuo, Qianxiang Wang, Hong Mei
    Preventing Feature Interactions by Constraints. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:55-58 [Conf]
  34. Rajiv Ramnath
    Global Software Development for the Enterprise. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:57-58 [Conf]
  35. Matt Barrett, Clark D. Thomborson
    Frameworks Built on the Trusted Platform Module. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:59-62 [Conf]
  36. Sheikh Iqbal Ahamed
    Model for Global Software Engineering Project Life Cycle and How to Use it in Classroom for Preparing Our Students for the Globalization. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:59-60 [Conf]
  37. Vibhu Saujanya Sharma, Pankaj Jalote, Kishor S. Trivedi
    A Performance Engineering Tool for Tiered Software Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:63-70 [Conf]
  38. Pierre-Etienne Poirot, Shangping Ren, Jerzy Nogiec, Jeffrey J. P. Tsai
    Separating Functional and Non-functional Concerns through Coordination: An Application to Reliability. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:63-66 [Conf]
  39. Moushumi Sharmin, Sheikh Iqbal Ahamed, Shameem Ahmed, Haifeng Li
    SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:67-70 [Conf]
  40. Lin Liu, Eric Yu, John Mylopoulos
    Security Design Based on Social Modeling. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:71-78 [Conf]
  41. Amandeep S. Sidhu, Tharam S. Dillon, Farookh Khadeer Hussain
    Accomplishments and Challenges of Protein Ontology. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:71-76 [Conf]
  42. Edward W. Y. Ho, Dickson K. W. Chiu, Patrick C. K. Hung
    Alert Based Monitoring of Stock Trading Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:77-86 [Conf]
  43. Dianxiang Xu, Vivek Goel, Kendall E. Nygard
    An Aspect-Oriented Approach to Security Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:79-82 [Conf]
  44. Arnab Ray, Rance Cleaveland
    A Software Architectural Approach to Security by Design. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:83-86 [Conf]
  45. Tae-hyung Kim, Carl K. Chang
    An Aspect-Oriented Approach to Resource Composition in Petri net-based Software Architectural Models. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:87-94 [Conf]
  46. Gernot Schmoelzer, Christian Kreiner, Zsolt Kovács, Michael Thonhauser
    Reflective, Model-Based Data Access with the Type-Safe Entity Container. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:87-92 [Conf]
  47. Adenilso da Silva Simão, Rodrigo Fernandes de Mello, Luciano José Senger
    A Technique to Reduce the Test Case Suites for Regression Testing Based on a Self-Organizing Neural Network Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:93-96 [Conf]
  48. Michel Jaring
    Engineering Reconfigurable Product Families - Architecting the Variability Infrastructure of a Product Family On-Chip. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:95-102 [Conf]
  49. Sung Kim, Garrett Hoff
    Realization of Systematic Reliability Analysis of Decomposable Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:97-100 [Conf]
  50. Adnan Ashraf, Aamer Nadeem
    Automating the Generation of Test Cases from Object-Z Specifications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:101-104 [Conf]
  51. Paskorn Champrasert, Junichi Suzuki
    A Biologically-Inspired Autonomic Architecture for Self-Healing Data Centers. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:103-112 [Conf]
  52. Yvan Labiche
    Planning and Scheduling from a Class Test Order. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:105-108 [Conf]
  53. Feng-Jian Wang, Chia-Lin Hsu, Huin-Jen Hsu
    Analyzing Inaccurate Artifact Usages in a Workflow Schema. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:109-114 [Conf]
  54. Federico Balaguer, Thuc S. M. Ho, Ralph E. Johnson
    Detecting Data Races on Framework-Based Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:113-120 [Conf]
  55. Yong Wang, Dick Simmons
    Modeling Web Accessibility: A Case Study on Texas A&M University People Website. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:115-118 [Conf]
  56. José Antonio de Frutos, Esther Cadiñanos, Juan Ignacio Pérez, Sara García
    Tool for Analysis and Simulation of TTCAN Communication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:119-122 [Conf]
  57. Qian Zhang, Jian Wu, Hong Zhu
    Tool Support to Model-based Quality Analysis of Software Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:121-128 [Conf]
  58. R. Krishnan, Margaret Nadworny
    Moving Software from Expense to Asset. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:123-126 [Conf]
  59. Russell Lock
    Automated Negotiation for Service Contracts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:127-134 [Conf]
  60. Rabih Zbib, Ashish Jain, Devasis Bassu, Hiralal Agrawal
    Generating Domain Specific Graphical Modeling Editors from Meta Models. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:129-138 [Conf]
  61. Li Ruan, Yongji Wang, Qing Wang, Fengdi Shu, Haitao Zeng, Shen Zhang
    ARIMAmmse: An Improved ARIMA-based. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:135-138 [Conf]
  62. Anduo Wang, Fei He, Ming Gu, Xiaoyu Song
    Verifying Java Programs By Theorem Prover HOL. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:139-142 [Conf]
  63. Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi, Wing Lok Yeung
    An Interface Theory Based Approach to Verification of Web Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:139-144 [Conf]
  64. Kuangnan Chang, David Chenho Kung
    Model Checking with Induction. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:143-149 [Conf]
  65. Hong Zhu
    A Framework for Service-Oriented Testing of Web Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:145-150 [Conf]
  66. Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim Menzies
    On the Distribution of Property Violations in Formal Models: An Initial Study. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:150-160 [Conf]
  67. Hany F. El Yamany, Miriam A. M. Capretz, Luiz Fernando Capretz
    A Multi-Agent Framework for Testing Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:151-156 [Conf]
  68. Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu
    A Framework of Model-Driven Web Application Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:157-162 [Conf]
  69. Matthias Book, Volker Gruhn
    Efficient Modeling of Hierarchical Dialog Flows for Multi-ChannelWeb Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:161-168 [Conf]
  70. W. T. Tsai, Jerry Gao, Xiao Wei, Yinong Chen
    Testability of Software in Service-Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:163-170 [Conf]
  71. Raoul Praful Jetley, S. Purushothaman Iyer, Paul L. Jones, William Spees
    A Formal Approach to Pre-Market Review for Medical Device Software. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:169-177 [Conf]
  72. Dima Suliman, Barbara Paech, Lars Borner, Colin Atkinson, Daniel Brenner, Matthias Merdes, Rainer Malaka
    The MORABIT Approach to Runtime Component Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:171-176 [Conf]
  73. Fariaz Karim, Harish Thanneer
    Automated Health-Assessment of Software Components using Management Instrumentatio. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:177-182 [Conf]
  74. Shalom N. Rosenfeld, Ioana Rus, Michel Cukier
    Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:178-188 [Conf]
  75. Valdivino A. Santiago, Ana Silvia Martins do Amaral, N. L. Vijaykumar, Maria de Fátima Mattiello-Francisco, Eliane Martins, Odnei Cuesta Lopes
    A Practical Approach for Automated Test Case Generation using Statecharts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:183-188 [Conf]
  76. Pekka Mäki-Asiala, Mari Matinlassi
    Quality Assurance of Open Source Components: Integrator Point of View. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:189-194 [Conf]
  77. Rivalino Matias, Paulo J. F. Filho
    An Experimental Study on Software Aging and Rejuvenation in Web Servers. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:189-196 [Conf]
  78. Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi
    Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:195-202 [Conf]
  79. Tien N. Nguyen
    A Novel Structure-Oriented Difference Approach for Software Artifacts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:197-204 [Conf]
  80. Bo Zhou, Qi Shi, Madjid Merabti
    Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:203-208 [Conf]
  81. Feng Chen, Hongji Yang, Bing Qiao, William Cheng-Chung Chu
    A Formal Model Driven Approach to Dependable Software Evolution. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:205-214 [Conf]
  82. John Buford, Emré Celebi, Phyllis G. Frankl
    Property-Based Peer Trust in the Sleeper Service Discovery Protocol. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:209-214 [Conf]
  83. Zhengping Wu, Alfred C. Weaver
    Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:215-222 [Conf]
  84. Mahmoud O. Elish
    Do Structural Design Patterns Promote Design Stability? [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:215-220 [Conf]
  85. Márcio Rodrigo Braz, Silvia Regina Vergilio
    Software Effort Estimation Based on Use Cases. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:221-228 [Conf]
  86. Kai-Yuan Cai, Lei Zhao, Feng Wang
    A Dynamic Partitioning Approach for GUI Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:223-228 [Conf]
  87. Liu Jing, He Keqing, Ma Yutao, Peng Rong
    Scale Free in Software Metrics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:229-235 [Conf]
  88. Mohamad S. Bayan, João W. Cangussu
    Automatic Stress and Load Testing for Embedded Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:229-233 [Conf]
  89. Q. P. Hu, Y. S. Dai, M. Xie, S. H. Ng
    Early Software Reliability Prediction with Extended ANN Model. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:234-239 [Conf]
  90. Yaw-Chung Chen, Wen-Yen Chen
    An Agent-Based Metric for Quality of Services over Wireless Networks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:236-246 [Conf]
  91. Dianxun Shuai, Bin Zhang, Cunpai Lu
    A New Generalized Particle Dynamics Model For Software Cybernetics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:240-245 [Conf]
  92. Dianxun Shuai, Bin Zhang, Cunpai Lu
    Self-Organizing Software Processes Based on Particle Dynamics Model. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:246-251 [Conf]
  93. Shaya Potter, Jason Nieh
    Highly Reliable Mobile Desktop Computing in Your Pocket. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:247-254 [Conf]
  94. Qianxiang Wang, Min Li, Na Meng
    A Visual Constraint Specifying Approach for Adaptive Software. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:252-257 [Conf]
  95. Henry Novianus Palit, Chi-Hung Chi, Lin Liu
    Proxy-Based Pervasive Multimedia Content Delivery. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:255-264 [Conf]
  96. Jay S. Bayne
    A Theory of Software-Mediated Enterprise Governance. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:258-264 [Conf]
  97. Sami Beydeda
    Self-Metamorphic-Testing Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:265-272 [Conf]
  98. Xuchang Zou, Raffaella Settimi, Jane Cleland-Huang
    Phrasing in Dynamic Requirements Trace Retrieva. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:265-272 [Conf]
  99. Matt Ryan, Sule Simsek, Xiaoqing Frank Liu, Bruce M. McMillin, Ying Cheng
    An Instance-Based Structured Object Oriented Method for Co-analysis/Co-design of Concurrent Embedded Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:273-280 [Conf]
  100. Duygu Çelik, Atilla Elçi
    Discovery and Scoring of Semantic Web Services based on Client Requirement(s) through a Semantic Search Agent. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:273-278 [Conf]
  101. Ergun Biçici
    Consensus Ontology Generation in a Socially Interacting MultiAgent System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:279-284 [Conf]
  102. Yan Sun, Xiaoqing Frank Liu, Bruce M. McMillin
    A Methodology for Structured Object-Oriented Elicitation and Analysis of Temporal Constraints in Hardware/Software Co-analysis and Co-design of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:281-290 [Conf]
  103. Dianxun Shuai, Cunpai Lu, Bin Zhang
    Entanglement Partitioning of Quantum Particles for Data Clustering. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:285-290 [Conf]
  104. Jiang Guo
    A Coordination Framework for Software Component Based Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:291-298 [Conf]
  105. Xian Shen, Xin Jin, Rongfang Bie, Yunchuan Sun
    MSC: A Semantic Ranking for Hitting Results of Matchmaking of Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:291-296 [Conf]
  106. James Kirby Jr.
    Model-Driven Agile Development of Reactive Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:297-302 [Conf]
  107. Nearchos Paspallis, George A. Papadopoulos
    An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:299-306 [Conf]
  108. Deepak Dahiya, Rajinder K. Sachdeva
    Understanding Requirements: Aspect Oriented Software Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:303-308 [Conf]
  109. Katsunori Oyama, Atsushi Takeuchi, Hiroshi Fujimoto
    CAPIS Model Based Software Design Method for Sharing Experts' Thought Processes. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:307-316 [Conf]
  110. Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo
    An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:309-314 [Conf]
  111. Mohamed M. Kouta, Mohammed M. Abou Rizka, Ahmed M. Elmisery
    Secure e-Payment using Multi-agent Architecture. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:315-320 [Conf]
  112. Dae-Kyoo Kim, Priya Gokhale
    A Pattern-Based Technique for Developing UML Models of Access Control Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:317-324 [Conf]
  113. Stanislav Ustymenko, Daniel G. Schwartz
    An Agent-Oriented Logic for Belief and Trust. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:321-326 [Conf]
  114. Mohammad Al-Subaie, Mohammad Zulkernine
    Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:325-332 [Conf]
  115. Kashif Zafar, Shahzad Badar Qazi, A. Rauf Baig
    Mine Detection and Route Planning in Military Warfare using Multi Agent System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:327-332 [Conf]
  116. Yonggang Zhang, Juergen Rilling, Volker Haarslev
    An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:333-342 [Conf]
  117. Mehmet Tahir Sandikkaya, Bülent Örencik
    Agent-Based Offline Electronic Voting. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:333-340 [Conf]
  118. Scott D. Miller
    A Control-Theoretic Aid to Managing the Construction Phase in Incremental Software Development (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:341-343 [Conf]
  119. Ashish Aggarwal, Pankaj Jalote
    Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:343-350 [Conf]
  120. Ryan Babbitt
    Information Privacy Management in Smart Home Environments: Modeling, Verification, and Implementation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:344-346 [Conf]
  121. Xia Wang
    Intrusion Detection Techniques in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:347-349 [Conf]
  122. Paskorn Champrasert, Junichi Suzuki
    SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Managing Network Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:350-352 [Conf]
  123. Orest Pilskalns, Daniel Williams, Damir Aracic, Anneliese Amschler Andrews
    Security Consistency in UML Designs. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:351-358 [Conf]
  124. Hiroshi Wada, Junichi Suzuki
    A Domain Specific Modeling Framework for Secure Network Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:353-355 [Conf]
  125. Ayman Z. Faza, Sahra Sedigh-Ali
    A General Purpose Framework for Wireless Sensor Network Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:356-358 [Conf]
  126. Jinchun Xia
    QoS-Based Service Composition. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:359-361 [Conf]
  127. Hiroshi Wada, Junichi Suzuki, Katsuya Oba
    A Service-Oriented Design Framework for Secure Network Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:359-368 [Conf]
  128. Hsinyi Jiang
    Can the Genetic Algorithm Be a Good Tool for Software Engineering Searching Problems? [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:362-366 [Conf]
  129. Nai Yan Zhao, Mi Wan Shum
    Technical Solution to Automate Smoke Test Using Rational Functional Tester and Virtualization Technology. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:367- [Conf]
  130. K. R. Jayaram
    Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:368-369 [Conf]
  131. Koichiro Rinsaka, Kazuya Shibata, Tadashi Dohi
    Proportional Intensity-Based Software Reliability Modeling with Time-Dependent Metrics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:369-376 [Conf]
  132. Sandro Ronaldo Bezerra Oliveira, Alexandre Marcos Lins de Vasconcelos
    A Continuous Improvement Model in ImPProS. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:370-371 [Conf]
  133. Tuomas Lindroth, Raicea Lavinia, Tiberiu Seceleanu, Nastooh Avessta, Jukka Teuhola
    Building a UML Profile for On-Chip Distributed Platforms. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:372-373 [Conf]
  134. James H. Cross II, T. Dean Hendrix, Larry A. Barowski, Jhilmil Jain
    Dynamic Object Viewers for Java. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:374-375 [Conf]
  135. John R. Koch, Thomas V. Freiberger
    Autonomous Real-Time Monitoring of Hydrological Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:376-377 [Conf]
  136. João W. Cangussu, Michael Baron
    Automatic Identification of Change Points for the System Testing Process. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:377-384 [Conf]
  137. Valerio Plessi, Filippo Bastianini, Sahra Sedigh-Ali
    An Autonomous and AdaptableWireless Device for Flood Monitoring. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:378-379 [Conf]
  138. Jun Yan, Jian Zhang
    Backtracking Algorithms and Search Heuristics to Generate Test Suites for Combinatorial Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:385-394 [Conf]
  139. Donglin Liang, Kai Xu
    Testing Scenario Implementation with Behavior Contracts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:395-402 [Conf]
  140. Man Fai Lau, Ying Liu, Yuen-Tak Yu
    On Detection Conditions of Double Faults Related to Terms in Boolean Expressions. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:403-410 [Conf]
  141. Dennis Jeffrey, Neelam Gupta
    Test Case Prioritization Using Relevant Slices. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:411-420 [Conf]
  142. Gabriela Jacques-Silva, Roberto Jung Drebes, Júlio Gerchman, Joana Matos Fonseca da Trindade, Taisy Silva Weber, Ingrid Jansch-Pôrto
    A Network-Level Distributed Fault Injector for Experimental Validation of Dependable Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:421-428 [Conf]
  143. W. K. Chan, S. C. Cheung, Jeffrey C. F. Ho, T. H. Tse
    Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:429-438 [Conf]
  144. Jonatan Alava, Tariq M. King, Peter J. Clarke
    Automatic Validation of Java Page Flows Using Model-Based Coverage Criteria. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:439-446 [Conf]
  145. Bei-Bei Yin, Yan Shi, Chenggang Bai, Kai-Yuan Cai
    A Case Study for Invalidating the Markovian Property of GUI Software Structural Profile. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:447-454 [Conf]
  146. Jerry Gao, Deepa Gopinathan, Quan Mai, Jingsha He
    A Systematic Regression Testing Method and Tool For Software Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:455-466 [Conf]
  147. Anton Michlmayr, Pascal Fenkam, Schahram Dustdar
    Architecting a Testing Framework for Publish/Subscribe Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:467-474 [Conf]
  148. Johannes Mayer, Ralph Guderlei
    An Empirical Study on the Selection of Good Metamorphic Relations. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:475-484 [Conf]
  149. Kwok Ping Chan, Tsong Yueh Chen, Dave Towey
    Forgetting Test Cases. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:485-494 [Conf]
  150. Swapna S. Gokhale, Jijun Lu
    Performance and Availability Analysis of an E-Commerce Site. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:495-502 [Conf]
  151. Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao, Luping Zhu
    Automated Agent Synthesis for Situation Awareness in Service-Based Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:503-512 [Conf]
  152. Zhi Jin, Lin Liu
    Web Service Retrieval: An Approach Based on Context Ontology. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:513-520 [Conf]
  153. Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang, Vagelis Hristidis, Raju Rangaswami, Nagarajan Prabakar
    A Communication Virtual Machine. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:521-531 [Conf]
  154. Chi-Hung Chi, Lin Liu, LuWei Zhang
    Quantitative Analysis on the Cacheability Factors of Web Objects. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:532-538 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002