The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Systems and Software
2005, volume: 75, number: 1-2

  1. Pete Knoke, Ana María Moreno, Michael Ryan
    Editorial. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:1-2 [Journal]
  2. Alex Baker, Emily Oh Navarro, André van der Hoek
    An experimental card game for teaching software engineering processes. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:3-16 [Journal]
  3. Éric Germain, Pierre N. Robillard
    Engineering-based processes and agile methodologies for software development: a comparative case study. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:17-27 [Journal]
  4. David A. Carrington, Paul A. Strooper, Sharron Newby, Terry Stevenson
    An industry/university collaboration to upgrade software engineering knowledge and skills in industry. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:29-39 [Journal]
  5. Anthony J. Cowling
    The role of modelling in the software engineering curriculum. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:41-53 [Journal]
  6. David Budgen, James E. Tomayko
    The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:55-62 [Journal]
  7. Hung-Min Sun, Bing-Chang Chen, Tzonelih Hwang
    Secure key agreement protocols for three-party against guessing attacks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:63-68 [Journal]
  8. Heyuan Huang, Shen-sheng Zhang, Jian Cao, Yonghong Duan
    A practical pattern recovery approach based on both structural and behavioral analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:69-87 [Journal]
  9. Zuhua Shao
    Cryptanalysis of Xia-You group signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:89-94 [Journal]
  10. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:95-107 [Journal]
  11. Shih-Chien Chou, An-Feng Liu, Chien-Jung Wu
    Preventing information leakage within workflows that execute among competing organizations. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:109-123 [Journal]
  12. Subhashini Raghunathan, Armin R. Mikler, Cliff Cozzolino
    Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:125-137 [Journal]
  13. Manuel J. Fernández Iglesias, Juan C. Burguillo-Rial, Francisco J. González-Castaño, Martín Llamas Nistal
    Wireless protocol testing and validation supported by formal methods. A hands-on report. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:139-154 [Journal]
  14. Yi-Hsuan Lee, Cheng Chen
    A two-level scheduling method: an effective parallelizing technique for uniform nested loops on a DSP multiprocessor. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:155-170 [Journal]
  15. Kamran Malik, Osama Khan, Tahir Mobashir, S. Mansoor Sarwar
    Migratable sockets in cluster computing. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:171-177 [Journal]
  16. Shih-Chien Chou
    An agent-based inter-application information flow control model. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:179-187 [Journal]
  17. Shyh-Yih Wang, Chi-Sung Laih
    Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:189-192 [Journal]
  18. Weibin Zhao, Henning Schulzrinne
    Enhancing Service Location Protocol for efficiency, scalability and advanced discovery. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:193-204 [Journal]
  19. Ning Zhang, Qi Shi, Madjid Merabti
    Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal]
  20. Sherali Zeadally, Junhua Pan
    J2EE support for wireless services. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:215-226 [Journal]
  21. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui
    A generic anti-spyware solution by access control list at kernel level. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:227-234 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002