The SCEAS System
Navigation Menu

Conferences in DBLP

(icsoft)
2006 (conf/icsoft/2006)

  1. Dimitris Karagiannis, Peter Höfferer
    Metamodels in action: An overview. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:- [Conf]
  2. Marten van Sinderen
    Architectural styles in service oriented design. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:- [Conf]
  3. Brian Henderson-Sellers
    Engineering object and agent methodologies. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:- [Conf]
  4. Tom Gilb
    How to quantify quality: Finding scales of measure. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:- [Conf]
  5. Juan Carlos Augusto
    Ambient intelligence: Basic concepts and applications. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:- [Conf]
  6. Leszek A. Maciaszek
    Adaptive integration of enterprise and B2B applications. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:- [Conf]
  7. Bryon K. Ehlmann
    Adding more support for associations to the ODMG object model. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:5-12 [Conf]
  8. Ferruccio Damiani, Elena Giachino, Paola Giannini, Emanuele Cazzola
    On state classes and their dynamic semantics. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:5-12 [Conf]
  9. Marius Cornea, Cristina Anderson, Charles Tsen
    Software implementation of the IEEE 754R decimal floating-point arithmetic. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:12-20 [Conf]
  10. Dean Williams, Alexandra Poulovassilis
    Combining information extraction and data integration in the estest system. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:13-21 [Conf]
  11. Franz Puntigam
    From static to dynamic process types. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:21-28 [Conf]
  12. Georgios Voulalas, Georgios Evangelidis
    A framework for the development and deployment of evolving applications. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:22-29 [Conf]
  13. Alexandre Bergel, Robert Hirschfeld, Siobhán Clarke, Pascal Costanza
    Aspectboxes - controlling the visibility of aspects. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:29-35 [Conf]
  14. Xufeng (Danny) Liang, Athula Ginige
    Smart business object a new approach to model business objects for web applications. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:30-39 [Conf]
  15. Hiroshi Masuyama, Tetsuo Ichimori, Toshihiko Sasama
    On ability of orthogonal genetic algorithms for the mixed chinese postman problem. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:39-46 [Conf]
  16. Philippe Larvet, Bruno Bonnin
    Discovery and auto-composition of semantic web services. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:40-45 [Conf]
  17. Paulo Zenida, Manuel Menezes de Sequeira, Diogo Henriques, Carlos Serrão
    Zás - aspect-oriented authorization services. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:46-54 [Conf]
  18. Smriti Sharma, Veena Bansal
    Measuring effectiveness of computing facilities in academic institutes a new solution for a difficult problem. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:46-51 [Conf]
  19. Bent Bruun Kristensen
    Associative programming and modeling: Abstractions over collaboration. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:54-63 [Conf]
  20. Luminita State, Catalina Cocianu, Vlamos Panayiotis, Viorica Stefanescu
    PCA-based data mining probabilistic and fuzzy approaches with applications in pattern recognition. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:55-60 [Conf]
  21. Cristina Wanzeller, Orlando Belo
    Clickstream data mining assistance a case-based reasoning task model. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:61-66 [Conf]
  22. Pierre Kelsen
    A declarative executable model for object-based systems based on functional decomposition. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:63-71 [Conf]
  23. Nhien-An Le-Khac, M. Tahar Kechadi, Joe Carthy
    Admire framework: Distributed data mining on data grid platforms. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:67-72 [Conf]
  24. David J. Greaves
    Avoiding two-level systems: Using a textual environment to address cross-cutting concerns. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:71-76 [Conf]
  25. Mikhail Petrovskiy
    A data mining approach to learning probabilistic user behavior models from database access log. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:73-78 [Conf]
  26. Yangjun Chen
    On the evaluation of tree pattern queries. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:79-85 [Conf]
  27. Fergal McCaffery, Rory O'Connor, Gerry Coleman
    Developing a configuration management model for use in the medical device industry. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:81-88 [Conf]
  28. Suad Alagic, Mark Royer, David Briggs
    Program verification techniques for xml schema-based technologies. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:86-93 [Conf]
  29. Jan Newmarch
    Bridging between middleware systems: Optimisations using downloadable code. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:89-97 [Conf]
  30. Thomas B. Puzak, Chun-Hsi Huang
    An analysis of the effects of spatial locality on the cache performance of binary search trees. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:94-101 [Conf]
  31. Hans Albrecht Schmid, Marco Pfeifer
    Engineering a component language: COMPJAVA. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:98-106 [Conf]
  32. Rodrigo Filev Maia, Jorge Rady de Almeida Jr.
    Virtual museum - an implementation of a multimedia object-oriented database. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:102-107 [Conf]
  33. Davide Falessi, Giovanni Cantone
    Exploring feasibility of software defects orthogonal classification. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:107-117 [Conf]
  34. Hagen Höpfner
    On context aware predicate sequence queries. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:108-114 [Conf]
  35. Ozgul Unal, Hamideh Afsarmanesh
    Using linguistic techniques for schema matching. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:115-120 [Conf]
  36. Jose Manuel Perez, Francisco Ruiz, Mario Piattini
    MDE for BPM a systematic review. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:118-124 [Conf]
  37. Asif Qumer, Brian Henderson-Sellers
    Crystallization of agility back to basics. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:121-126 [Conf]
  38. Vassilis C. Gerogiannis, George Kakarontzas, Ioannis Stamelos
    A unified approach for software process representation and analysis. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:127-132 [Conf]
  39. Sven Apel, Martin Kuhlemann, Thomas Leich
    Generic feature modules: Two-staged program customization. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:127-132 [Conf]
  40. Christophe Choquet, Sébastien Iksal
    Usage tracking language: a meta language for modelling tracks in tel systems. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:133-138 [Conf]
  41. I. Martínez-Marchena, Llanos Mora López, Mariano Sidrach de Cardona
    A framework for the development of monitoring systems software. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:133-138 [Conf]
  42. Nadia Yaacoubi Ayadi, Mohamed Ben Ahmed, Yann Pollet
    Formal framework for semantic interoperability. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:139-144 [Conf]
  43. Andrew Stone, Peter Sawyer
    Using pre-requirements tracing to investigate requirements based on tactic knowledge. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:139-144 [Conf]
  44. Carlos Videira, David Ferreira, Alberto Rodrigues da Silva
    Using linguistic patterns for improving requirements specification. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:145-150 [Conf]
  45. Angelica Caro, Coral Calero, Houari A. Sahraoui, Ghazwa Malak, Mario Piattini
    A bayesian network to structure a data quality model for web portals. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:147-152 [Conf]
  46. Robert B. K. Brown, Peter Hyland, Ian C. Piper
    An application of the 5-S activity theoretic requirements method. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:151-158 [Conf]
  47. Florin Leon, Gabriela M. Atanasiu
    Data mining methods for gis analysis of seismic vulnerability. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:153-156 [Conf]
  48. Jelena Pavicevic, Ivan Lukovic, Pavle Mogin, Miro Govedarica
    Information system design and prototyping using form types. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:157-160 [Conf]
  49. Wing Kum, Amy Law
    Learning effective test driven development Software Development Projects in an Energy Company. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:159-164 [Conf]
  50. Masahiro Yamamoto
    Software synthesis of the web-based questionnarie system. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:161-164 [Conf]
  51. Satoshi Tsuji, Yoshitmo Ikkai, Masanori Akiyoshi
    A detection method of stagnation symptoms by using project progress models generated from project reports. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:165-169 [Conf]
  52. Carlos López, Raúl Marticorena Sánchez, Yania Crespo, Francisco Javier Pérez
    Towards a language independent refactoring framework. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:165-170 [Conf]
  53. Havva H. Basak, Serdar Ayan
    Effectiveness of web based PBL using course management technologies: A case study. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:170-176 [Conf]
  54. Paolo Falcarin, Marco Torchiano
    A dynamic analysis tool for extracting UML 2 sequence diagrams. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:171-176 [Conf]
  55. Paria Parsamanesh, Amir Abdollahi Foumani, Constantinos Constantinides
    Mining anomalies in object-oriented implementations through execution traces. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:177-189 [Conf]
  56. Roberto Paiano, Anna Lisa Guido, Leonardo Mangia
    Web information system: A four level architecture. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:177-182 [Conf]
  57. Alejandro García López, Rafael Berlanga Llavori, Roxana Dánger
    Mining of complex objects via description clustering. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:187-194 [Conf]
  58. Sachiko Kawada, Masayuki Shimokura, Tadashi Ohta
    A detection method of feature interactions for Telecommunication services using new execution model. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:190-195 [Conf]
  59. Ruixin Yang, John Tan, Menas Kafatos
    A pattern selection algorithm in kernel PCA applications. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:195-202 [Conf]
  60. Emil Vassev, Heng Kuang, Olga Ormandjieva, Joey Paquet
    Reactive, distributed and autonomic computing aspects of AS-TRM. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:196-202 [Conf]
  61. George Athanasopoulos, Aphrodite Tsalgatidou, Michael Pantazoglou
    Unified description and discovery of P2P services. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:203-209 [Conf]
  62. Amel Borgi
    Approximate reasoning to learn classification rules. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:203-210 [Conf]
  63. Sergiu Gordea, Markus Zanker
    Building maintenance charts and early warning about scheduling problems in software projects. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:210-217 [Conf]
  64. Miguel A. González, María R. Sierra, Camino R. Vela, Ramiro Varela, Jorge Puente
    Combining metaheuristics for the job shop scheduling problem with sequence dependent setup times. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:211-218 [Conf]
  65. Guido Pennella, Christian Di Biagio, Gianfranco Pesce, Giovanni Cantone
    Advances on testing safety-critical software goal-driven approach, prototype-tool and comparative evaluation. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:218-223 [Conf]
  66. Masanori Akiyoshi, Mayu Gen, Masaki Samejima, Norihisa Komoda
    An extraction method of time-series numerical data from enterprise press releases. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:221-225 [Conf]
  67. Oswaldo Gómez, Hanna Oktaba, Mario Piattini, Félix García
    A systematic review measurement in software engineering: State-of-the-art in Measures. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:224-231 [Conf]
  68. Arno Scharl
    Geospatial publishing creating and managing geo-tagged knowledge repositories. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:226-231 [Conf]
  69. Long Zhang, Xiaoyan Chen
    Partner assessment using madm and ontology for telecom operators. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:232-237 [Conf]
  70. Bernhard Daubner, Bernhard Westfechtel, Andreas Henrich
    Towards anchoring software measures on elements of the process model. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:232-237 [Conf]
  71. Julián Ruiz, Coral Calero, Mario Piattini
    Web metrics selection through a practitioners' survey. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:238-244 [Conf]
  72. Yohei Sakurai, Soichiro Miyazaki, Masanori Akiyoshi
    A retrieval method of similar question articles from web bulletin board. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:238-243 [Conf]
  73. Frédéric Boulanger, Guy Vidal-Naquet
    A primitive execution model for heterogeneous modeling. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:247-252 [Conf]
  74. Kenfack Clauvice
    A model multi-agents for sharing and exchanging knowledge in community of practices. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:247-252 [Conf]
  75. Sandro Ronaldo Bezerra Oliveira, Alexandre Marcos Lins de Vasconcelos, Albérico Lima de Pena Júnior, Lúcio Câmara e Silva
    An acquisition knowledge process for software development knowledge acquisition for a software process implementation environment. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:253-256 [Conf]
  76. Christian Di Biagio, Guido Pennella, Anna Lomartire, Giovanni Cantone
    Introduction to characterization of monitors for testing safety-critical software. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:253-256 [Conf]
  77. Hee-jin Lee, In-Gwon Song, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong
    Modelling the unexpected behaviours of embedded software using uml sequence diagrams. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:257-262 [Conf]
  78. Andreas Hanemann, David Schmitz, Patricia Marcu, Martin Sailer
    Specification of dependencies for it service fault management. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:257-260 [Conf]
  79. Cristina De Castro, Paolo Toppan
    ROA modular LDAP-based approach to industrial software revision control. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:261-265 [Conf]
  80. Walter Cazzola, Ahmed Ghoneim, Gunter Saake
    Viewpoint for maintaining uml models against application changes. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:263-268 [Conf]
  81. Violaine Prince
    Modelling and managing knowledge through dialogue: a model of communication-based knowledge management. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:266-271 [Conf]
  82. Haroon Tarawneh
    Sysml-based web engineering a successful way to design web applications. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:269-272 [Conf]
  83. Boris Melnikov, Alexey Radionov, Andrey Moseev, Elena Melnikova
    Some specific heuristics for situation clustering problems. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:272-279 [Conf]
  84. Costas Vassilakis, George Lepouras, Akrivi Katifori
    Reverse engineering electronic services from e-forms to knowledge. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:273-278 [Conf]
  85. Masayuki Makino, Atsushi Ohnishi
    A scenario generation method using a differential scenario. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:279-282 [Conf]
  86. Ioannis M. Dokas, Alexandre Alapetite
    A view on the web engineering nature of web based expert systems. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:280-283 [Conf]
  87. Javier J. Gutiérrez, María José Escalona Cuaresma, Manuel Mejías, Jesús Torres
    System test cases from use cases. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:283-286 [Conf]
  88. Anne Etien, Colette Rolland, Camille Salinesi
    A meta-modelling approach to express change requirements. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:287-293 [Conf]
  89. Michael Poldner, Herbert Kuchen
    Algorithmic skeletons for branch & bound. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:291-300 [Conf]
  90. Sandro Ronaldo Bezerra Oliveira, Alexandre Marcos Lins de Vasconcelos, José Francisco Pereira, Igor Cavalcanti Ramos
    A process meta-model in a gradual software process implementation environment process meta-model for a software process definition and improvement. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:294-301 [Conf]
  91. M. Al Hajj Hassan, M. Bamha
    Parallel processing of "group-by join" queries on shared nothing machines. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:301-307 [Conf]
  92. Jan Pettersen Nytun
    A Generic model for connecting models in a multilevel modelling framework. [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:302-311 [Conf]
  93. Satoshi Yamada, Shigeru Kusakabe, Hideo Taniguchi
    Impact of wrapped system call mechanism on commodity processors. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:308-315 [Conf]
  94. Carsten Bock, Detlef Zuehlke
    Model-driven hmi development - can meta-case tools relieve the pain? [Citation Graph (0, 0)][DBLP]
    ICSOFT (2), 2006, pp:312-319 [Conf]
  95. Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Antonio M. Guirado-Puerta
    A hybrid topology architecture for p2p file sharing systems. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:319-324 [Conf]
  96. Joaquim Reis
    An approach to multi-agent cooperative sheduling in the supply-chain, with examples. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:325-332 [Conf]
  97. Maria Ángeles Moraga, Coral Calero, Mario Piattini, David Walker
    Towards a quality model for grid portals. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:333-338 [Conf]
  98. Pablo Giambiagi, Olaf Owe, Gerardo Schneider, Anders P. Ravn
    Language-based support for service oriented architectures: Future directions. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:339-344 [Conf]
  99. Wahid Nasri, Sonia Mahjoub, Slim Bouguerra
    A methodology for adaptive resolution of numerical problems on heterogeneous hierarchical clusters. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:345-350 [Conf]
  100. Binka Gwynne, Jie Xu
    Developing a fault ontology engine for evaluation of service-oriented architecture using a case study system. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:353-356 [Conf]
  101. Joaquim Reis
    An approach to multi-agent visual composition with mixed styles. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:357-362 [Conf]
  102. Uros Jovanovic, Bostjan Slivnik
    A peer-to-peer search in data grids based on ant colony optimization. [Citation Graph (0, 0)][DBLP]
    ICSOFT (1), 2006, pp:363-366 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002