default search action
J.UCS, Volume 15
Volume 15, Number 1, 2009
- Klaus-Dieter Schewe:
Logic, Abstract State Machines and Databases. 1-2 - Egon Börger, Ove Sörensen, Bernhard Thalheim:
On Defining the Behavior of OR-joins in Business Process Models. 3-32 - Andrea Calì, Diego Calvanese, Davide Martinenghi:
Dynamic Query Optimization under Access Limitations and Dependencies. 33-62 - M. J. Cresswell:
Non-Denumerable Infinitary Modal Logic. 63-71 - Lindsay Groves:
Reasoning about Nonblocking Concurrency. 72-111 - Sven Hartmann, Sebastian Link:
Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner. 112-156 - Markus Kirchberg:
Using Abstract State Machines to Model ARIES-based Transaction Processing. 157-194 - Henning Köhler:
Global Database Design based on Storage Space and Update Time Minimization. 195-240 - Scott Uk-Jin Lee, Gillian Dobbie, Jing Sun, Lindsay Groves:
Formal Verification of Semistructured Data Models in PVS. 241-272 - Hans-Joachim Lenz, Bernhard Thalheim:
A Formal Framework of Aggregation for the OLAP-OLTP Model. 273-303 - Attila Sali, Klaus-Dieter Schewe:
A Characterisation of Coincidence Ideals for Complex Values. 304-354 - Jane Zhao, Klaus-Dieter Schewe, Henning Köhler:
Dynamic Data Warehouse Design with Abstract State Machines. 355-397
Volume 15, Number 2, 2009
- Shiguo Lian, Yan Zhang, Stefanos Gritzalis, Yu Chen:
Multimedia Security in Communication (MUSIC). 398-400 - Andreas U. Schmidt:
On the Superdistribution of Digital Goods. 401-425 - Jianwei Wang, Jianmin Lü, Shiguo Lian, Guangjie Liu:
On the Design of Secure Multimedia Authentication. 426-443 - Dimitrios Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks. 444-464 - Mahdi Amine Abdelouahab, Abdelmadjid Bouabdallah, Mohammed Achemlal, Sylvie Laniepce:
The Topology Change Attack: Threat and Impact. 465-487 - Chin-Ling Chen:
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test. 488-504
Volume 15, Number 3, 2009
- Hermann A. Maurer:
Managing Editor's Column. 505 - Mufutau Akinwande:
Advances in Homomorphic Cryptosystems. 506-522 - Alkiviadis G. Akritas:
Linear and Quadratic Complexity Bounds on the Values of the Positive Roots of Polynomials. 523-537 - Jörg R. Mühlbacher, Christian Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control. 538-554 - Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta:
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing. 555-583 - María José Suárez Cabal, Javier Tuya:
Structural Coverage Criteria for Testing SQL Queries. 584-619 - Éric Tanter, Johan Fabry:
Supporting Composition of Structural Aspects in an AOP Kernel. 620-647 - Sergio L. Toral Marín, M. Rocío Martínez-Torres, Federico Barrero:
Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux. 648-664 - Andreas Schmeil, Martin J. Eppler:
Knowledge Sharing and Collaborative Learning in Second Life: A Classification of Virtual 3D Group Interaction Scripts. 665-677 - Martin Memmel, Michael Kockler, Rafael Schirru:
Providing Multi Source Tag Recommendations in a Social Resource Sharing Platform. 678-691 - Niels Bjørn-Andersen, Leif Bloch Rasmussen, Soley Rasmussen:
Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models? 692-703
Volume 15, Number 4, 2009
- Ngoc Thanh Nguyen, De-Shuang Huang:
Knowledge Management for Autonomous Systems and Computational Intelligence. 704 - Jeen-Shing Wang, Jen-Chieh Chiang:
An Efficient Data Preprocessing Procedure for Support Vector Clustering. 705-721 - Xuesong Wang, Minglin Hao, Yuhu Cheng, Ruhai Lei:
PDE-PEDA: A New Pareto-Based Multi-objective Optimization Algorithm. 722-741 - Sing-Wu Liou, Chia-Ming Wang, Yin-Fu Huang:
Integrative Discovery of Multifaceted Sequence Patterns by Frame-Relayed Search and Hybrid PSO-ANN. 742-764 - Qun Niu, Taijin Zhou, Shiwei Ma:
A Quantum-Inspired Immune Algorithm for Hybrid Flow Shop with Makespan Criterion. 765-785 - Andrey Vavilin, Kang-Hyun Jo:
Graph-based Approach for Robust Road Guidance Sign Recognition from Differently Exposed Images. 786-804 - Vincenzo Di Lecce, Marco Calabrese, Domenico Soldo:
Fingerprinting Lexical Contexts over the Web. 805-825 - Vitoantonio Bevilacqua, Giuseppe Mastronardi, Filippo Menolascina, Paolo Pannarale, Giuseppe Romanazzi:
Bayesian Gene Regulatory Network Inference Optimization by means of Genetic Algorithms. 826-839 - Jun Zhang, Kwok-Wing Chau:
Multilayer Ensemble Pruning via Novel Multi-sub-swarm Particle Swarm Optimization. 840-858 - Ho Quoc Phuong Nguyen, Hee-Jun Kang, Young Soo Suh, Young Shick Ro:
A DCM Based Orientation Estimation Algorithm with an Inertial Measurement Unit and a Magnetic Compass. 859-876 - Trong Hai Duong, GeunSik Jo, Jason J. Jung, Ngoc Thanh Nguyen:
Complexity Analysis of Ontology Integration Methodologies: A Comparative Study. 877-897 - Igor Cavrak, Armin Stranjak, Mario Zagar:
SDLMAS: A Scenario Modeling Framework for Multi-Agent Systems. 898-925 - Shohel Ahmed, Sungjoon Park, Jason J. Jung, Sanggil Kang:
A Personalized URL Re-ranking Method using Psychological User Browsing Characteristics. 926-940 - Dariusz Król, Aleksander Lupa:
Agent Migration: Framework for Analysis. 941-966
Volume 15, Number 5, 2009
- Byoung-Soo Koh, Mieso K. Denko, Stefanos Gritzalis, Ching-Hsien Hsu:
Data Security and Privacy Protection in Pervasive Computing Environments. 967-969 - Pablo Najera, Francisco Moyano, Javier López:
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. 970-991 - Peter Pecho, Frantisek Zboril Jr., Martin Drahanský, Petr Hanácek:
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. 992-1006 - Changhoon Lee, Jongsung Kim, Seokhie Hong, Yangsun Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments. 1007-1022 - Shiguo Lian, Yan Zhang:
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks. 1023-1041 - Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model. 1042-1064 - Jong Hyuk Park:
USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework. 1065-1080 - Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. 1081-1089 - Yao Hua Ho, Ai Hua Ho, Kien A. Hua, Fei Xie:
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network. 1090-1118 - Naixue Xiong, Jing He, Jong Hyuk Park, Donald H. Cooley, Yingshu Li:
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security. 1119-1142
Volume 15, Number 6, 2009
- Vasco Brattka, Pieter Collins, Robert Rettinger:
Computability and Complexity in Analysis. 1143-1144 - Volker Bosserhoff:
On the Effective Existence of Schauder Bases. 1145-1161 - Pieter Collins, Daniel Silva Graça:
Effective Computability of Solutions of Differential Inclusions The Ten Thousand Monkeys Approach. 1162-1185 - Christine Gaßner:
Oracles and Relativizations of the P =? NP Question for Several Structures. 1186-1205 - Zvonko Iljazovic:
Chainable and Circularly Chainable Co-r.e. Sets in Computable Metric Spaces. 1206-1235 - Davorin Lesnik:
Constructive Urysohn Universal Metric Space. 1236-1263 - Takakazu Mori, Mariko Yasugi, Yoshiki Tsujii:
Fine-computable Functions on the Unit Square and their Integral. 1264-1279 - Arno Pauly:
Representing Measurement Results. 1280-1300 - Robert Rettinger, Klaus Weihrauch, Ning Zhong:
Topological Complexity of Blowup Problems. 1301-1316 - Matthias Schröder:
An Effective Tietze-Urysohn Theorem for QCB-Spaces. 1317-1336 - Svetlana Selivanova, Victor L. Selivanov:
Computing the Solution Operators of Symmetric Hyperbolic Systems of PDE. 1337-1364 - Hideki Tsuiki, Shuji Yamada:
On Finite-time Computability Preserving Conversions. 1365-1380 - Klaus Weihrauch, Tanja Grubba:
Elementary Computable Topology. 1381-1422
Volume 15, Number 7, 2009
- J. Ángel Velázquez-Iturbide, Francisco José García-Peñalvo:
Computers in Education: Advances in Software Technology. 1423-1426 - Claudio Dondi:
Innovation and Quality in e-Learning: a European Perspective. 1427-1439 - Paloma Díaz, Esther Guerra, Telmo Zarraonandia, Ignacio Aedo, Carmen L. Padrón:
A Meta-modeling based Approach for the Multi-Disciplinary Design of Web Educational Systems. 1440-1454 - Patrícia Castanheira Dinis Duarte Silva, Alberto Rodrigues da Silva:
Application Scenarios for the Learning Objects Pool. 1455-1471 - Francisco Jurado, Ana I. Molina, Miguel A. Redondo, Manuel Ortega, Adam Giemza, Lars Bollen, Heinz Ulrich Hoppe:
Learning to Program with COALA, a Distributed Computer Assisted Environment. 1472-1485 - Fernando A. Mikic, Juan C. Burguillo-Rial, Martín Llamas Nistal:
TQ-Bot: An AIML-based Tutor and Evaluator Bot. 1486-1495 - Lucila Maria Costi Santarosa, Lourenço de Oliveira Basso:
Eduquito: Virtual Environment for Digital Inclusion of People with Special Educational Needs. 1496-1507 - Rosa Silva, António Andrade:
Development of a Web Application for Management of Learning Styles. 1508-1525 - Diego Alonso Gómez Aguilar, Roberto Therón, Francisco José García-Peñalvo:
Semantic Spiral Timelines Used as Support for e-Learning. 1526-1545 - Francisco J. Almeida-Martínez, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide:
Visualization of Syntax Trees for Language Processing Courses. 1546-1561
Volume 15, Number 8, 2009
- Hermann A. Maurer:
Managing Editor's Column. 1562 - Joaquín Entrialgo, Javier García, José Luis Díaz, Daniel F. García:
Tools and Stochastic Metrics for Debugging Temporal Behaviour of Real-Time Systems. 1563-1588 - Junseok Hwang, Youngjin Lee, Seung-Hyun Kim:
Modelling Weblog Success: Case of Korea. 1589-1606 - Emilio Soler, Juan Trujillo, Carlos Blanco, Eduardo Fernández-Medina:
Designing Secure Data Warehouses by Using MDA and QVT. 1607-1641 - Matti Tedre:
Computing as Engineering. 1642-1658 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-based Signatures Revisited. 1659-1684 - Dengya Zhu, Heinz Dreher:
Discovering Semantic Aspects of Socially Constructed Knowledge Hierarchy to Boost the Relevance of Web Searching. 1685-1710 - Lutz Maicher, Benjamin Bock:
ActiveTM - The Factory for Domain-customised Portal Engines. 1711-1721 - Steffen Lohmann, Jörg Niesenhaus, Philipp Heim, Jürgen Ziegler:
Fostering Knowledge Flow and Community Engagement in the Development of Interactive Entertainment. 1722-1734 - Ulrica Pettersson:
Success and Failure Factors for KM: The Utilization of Knowledge in the Swedish Armed Forces. 1735-1743
Volume 15, Number 9, 2009
- Jianming Yong, Weiming Shen, José A. Pino:
CSCWD Technologies, Applications and Challenges. 1744-1745 - Sven Tackenberg, Bernhard Kausch, Sönke Duckwitz, Christopher M. Schlick, Selvinaz Karahancer:
Organizational Simulation of Complex Process Engineering Projects in the Chemical Industry. 1746-1765 - Yunjiao Xue, Chun Wang, Hamada H. Ghenniwa, Weiming Shen:
A Tree Similarity Measuring Method and its Application to Ontology Comparison. 1766-1781 - Lili Sun, Hua Wang, Jianming Yong:
Authorization Algorithms for Permission-Role Assignments. 1782-1798 - Junzhou Luo, Xiaogang Wang, Ming Yang:
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme. 1797-1811 - Sergio F. Ochoa, José A. Pino, Fabian Poblete:
Estimating Software Projects Based On Negotiation. 1812-1832 - Nelson Baloian, Gustavo Zurita:
MC-Supporter: Flexible Mobile Computing Supporting Learning though Social Interactions. 1833-1851 - Kelvin Leong, Junco Li, Stephen Chi-fai Chan, Vincent T. Y. Ng:
An Application of the Dynamic Pattern Analysis Framework to the Analysis of Spatial-Temporal Crime Relationships. 1852-1870 - Nazaraf Shah, Rahat Iqbal, Kashif Iqbal, Anne E. James:
A QoS Perspective on Exception Diagnosis in Service-Oriented Computing. 1871-1885 - Claudia C. P. Cruz, Cláudia Lage Rebello da Motta, Flávia Maria Santoro, Marcos Elia:
Applying Reputation Mechanisms in Communities of Practice: A Case Study. 1886-1906 - Weidong Li, Liang Gao, Xinyu Li:
Application of Intelligent Strategies for Cooperative Manufacturing Planning. 1907-1923 - Yong Xiang, Shaohua Zhang, Yuzhu Shen, Meilin Shi:
Pattern-Oriented Workflow Generation and Optimization. 1924-1944 - Rita Suzana Pitangueira Maciel, José Maria N. David, Michel Ridwan Oei, Adriano Augusto de Oliveira Bastos, Leandro de Oliveira Menezes:
Supporting Awareness in Groupware through an Aspect-Oriented Middleware Service. 1945-1969 - Po-Huan Chiu, Chi-Chun Lo, Kuo-Ming Chao:
Integrating Semantic Web and Object-Oriented Programming for Cooperative Design. 1970-1990 - Emerson Cabrera Paraiso, Cesar Augusto Tacla:
Using Embodied Conversational Assistants to Interface Users with Multi-Agent Based CSCW Applications: The WebAnima Agent. 1991-2010 - Ting Peng, Qinghua Zheng, Yinli Jin:
Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming. 2011-2025
Volume 15, Number 10, 2009
- Gabriele Kotsis, David Taniar, Ismail Khalil, Eric Pardede:
Information Integration on Web-based Applications and Services. 2026-2027 - Klaus-Dieter Schewe, Bernhard Thalheim, Qing Wang:
Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States. 2028-2057 - Eric Pardede, J. Wenny Rahayu, Ramanpreet Kaur Aujla, David Taniar:
SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System. 2058-2077 - Elhadi M. Shakshuki, Richard Halliday:
An Agent for Web-based Structured Hypermedia Algorithm Explanation System. 2078-2108 - Sohei Ikeda, Takakazu Nagamine, Tomio Kamada:
Application Framework with Demand-Driven Mashup for Selective Browsing. 2109-2137
Volume 15, Number 11, 2009
- Cládia Werner, Flávio Oquendo:
Software Components, Architectures and Reuse. 2138-2141 - Ricardo Perrone, Raimundo José de Araújo Macêdo, George Lima, Veronica Lima:
An Approach for Estimating Execution Time Probability Distributions of Component-based Real-Time Systems. 2142-2165 - Ronan Barrett, Claus Pahl:
Distribution Pattern-driven Development of Service Architectures. 2166-2195 - Paulo E. S. Barbosa, Franklin Ramalho, Jorge C. A. de Figueiredo, Antonio D. dos S. Junior, Anikó Costa, Luís Gomes:
Checking Semantics Equivalence of MDA Transformations in Concurrent Systems. 2196-2224 - Kleinner S. F. Oliveira, Karin Koogan Breitman, Toacy Cavalcante de Oliveira:
A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap. 2225-2253 - Camila Nunes, Uirá Kulesza, Cláudio Sant'Anna, Ingrid Nunes, Alessandro F. Garcia, Carlos José Pereira de Lucena:
Assessment of the Design Modularity and Stability of Multi-Agent System Product Lines. 2254-2283
Volume 15, Number 12, 2009
- Tai-Hoon Kim, Andrew Kusiak, David Taniar, Daqing Zhang:
Intelligent Environments and Services. 2284-2286 - Oje Kwon, Ki-Joune Li:
Causality Join Query Processing for Data Streams via a Spatiotemporal Sliding Window. 2287-2310 - Zhiyong Yu, Zhiwen Yu, Xingshe Zhou, Daqing Zhang, Yuichi Nakamura:
Meeting Warming-up: Detecting Common Interests and Conflicts among Participants before a Meeting. 2311-2329 - Choonsung Shin, Woontack Woo:
Service Conflict Management Framework for Multi-user Inhabited Smart Home. 2330-2352 - Ioannis G. Nikolakopoulos, Charalampos Z. Patrikakis, Antonio Cimmino, Martin Bauer, Henning Olesen:
On the Personalization of Personal Networks - Service Provision Based on User Profiles. 2353-2372 - Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang:
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. 2373-2386 - Linkai Weng, Yaoxue Zhang, Yue-Zhi Zhou, Laurence Tianruo Yang, Pengwei Tian, Ming Zhong:
A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph. 2387-2408 - Ratchadaporn Amornchewin, Worapoj Kreesuradej:
Mining Dynamic Databases using Probability-Based Incremental Association Rule Discovery Algorithm. 2409-2428 - Chun Ruan, Sang-Soo Yeo:
Modeling of an Intelligent e-Consent System in a Healthcare Domain. 2429-2444
Volume 15, Number 13, 2009
- Kang-Hyun Jo, Ngoc Thanh Nguyen, Edward Szczerbicki:
Knowledge Management for Intelligent Systems. 2445 - Dunwei Gong, Xin Yao, Jie Yuan:
Interactive Genetic Algorithms with Individual Fitness Not Assigned by Human. 2446-2462 - Dong-Wook Seo, Hyun-Uk Chae, Byeong-Woo Kim, Won-Ho Choi, Kang-Hyun Jo:
Human Tracking based on Multiple View Homography. 2463-2484 - Vu Van Tan, Dae-Seung Yoo, Jun-Chol Shin, Myeong-Jae Yi:
A Multiagent System for Hierarchical Control and Monitoring. 2485-2505 - Chenn-Jung Huang, I-Fan Chen, Kai-Wen Hu, Hung-Yen Shen, You-Jia Chen, Dian-Xiu Yang:
A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks. 2506-2527 - Yifei Chen, Feng Liu, Bram Vanschoenwinkel, Bernard Manderick:
Splice Site Prediction using Support Vector Machines with Context-Sensitive Kernel Functions. 2528-2546 - Yi-Chung Chen, Jeen-Shing Wang:
A Hammerstein-Wiener Recurrent Neural Network with Frequency-Domain Eigensystem Realization Algorithm for Unknown System Identification. 2547-2565 - Tao Jiang, Yucai Feng, Bing Zhang:
Online Detecting and Predicting Special Patterns over Financial Data Streams. 2566-2585 - Jih-Gau Juang, Chia-Lin Lee:
Applications of Cerebellar Model Articulation Controllers to Intelligent Landing System. 2586-2607 - Vitoantonio Bevilacqua, Lucia Cariello, Marco Giannini, Giuseppe Mastronardi, Vito Santarcangelo, Rocco Scaramuzzi, Antonella Troccoli:
A Comparison Between a Geometrical and an ANN Based Method for Retinal Bifurcation Points Extraction. 2608-2621 - Ngoc Thanh Nguyen:
Rough Classification - New Approach and Applications. 2622-2628 - Lacramioara Astefanoaei, Mehdi Dastani, John-Jules Ch. Meyer, Frank S. de Boer:
On the Semantics and Verification of Normative Multi-Agent Systems. 2629-2652 - Duy Hoang Pham, Guido Governatori, Subhasis Thakur:
Extended Defeasible Reasoning for Common Goals in n-Person Argumentation Games. 2653-2675 - Guido Boella, Leon van der Torre, Serena Villata:
Analyzing Cooperation in Iterative Social Network Design. 2676-2700 - Thanh-Quang Chu, Alexis Drogoul, Alain Boucher, Jean-Daniel Zucker:
Interactive Learning of Independent Experts' Criteria for Rescue Simulations. 2701-2725 - Dongxiao Niu, Yongli Wang, Chunming Duan, Mian Xing:
A New Short-term Power Load Forecasting Model Based on Chaotic Time Series and SVM. 2726-2745
Volume 15, Number 14, 2009
- Hermann A. Maurer:
Managing Editor's Column. 2746 - Carlos Aguirre, Ramón Huerta, Lev S. Tsimring:
Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms. 2747-2764 - Leendert Botha, Lynette van Zijl, McElory Hoffmann:
Realtime LEGO Brick Image Retrieval with Cellular Automata. 2765-2785 - Emilio J. Castellano, Luis Martínez:
A Web-Decision Support System based on Collaborative Filtering for Academic Orientation. Case Study of the Spanish Secondary School. 2786-2807 - Jürgen Dassow, Sherzod Turaev:
Petri Net Controlled Grammars: the Case of Special Petri Nets. 2808-2835 - Alberto de la Encina, Luis Llana, Fernando Rubio:
A Debugging System Based on Natural Semantics. 2836-2880 - Javier Herranz:
Ideal Homogeneous Access Structures Constructed from Graphs. 2881-2893 - Gabriel Rodríguez, María J. Martín, Patricia González, Juan Touriño:
A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes. 2894-2911
Volume 15, Number 15, 2009
- Eduardo Fernández-Medina, Alfonso Rodríguez:
Security in Information Systems: New Advances and Tendencies. 2912-2915 - Michael Hafner, Mukhtiar Memon, Ruth Breu:
SeAAS - A Reference Architecture for Security Services in SOA. 2916-2936 - Basel Alomair, Radha Poovendran:
Information Theoretically Secure Encryption with Almost Free Authentication. 2937-2956 - Óscar Sánchez Ramón, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez:
ModelSec: A Generative Architecture for Model-Driven Security. 2957-2980 - Pino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya:
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers. 2981-2998 - William R. Claycomb, Dongwan Shin:
A User Controlled Approach for Securing Sensitive Information in Directory Services. 2999-3018 - Axel Schröpfer, Florian Kerschbaum, Christoph G. Schütz, Richard Pibernik:
Optimizations for Risk-Aware Secure Supply Chain Master Planning. 3019-3037 - Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Mario Piattini:
Managing Security and its Maturity in Small and Medium-sized Enterprises. 3038-3058 - Corrado Aaron Visaggio, Francesca de Rosa:
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases. 3059-3078
Volume 15, Number 16, 2009
- Pedro Antunes, Robert O. Briggs:
Collaborative Technology and Environments. 3079-3080 - Eduardo Gasca, Jesús Favela, Monica Tentori:
Assisting Support Groups of Patients with Chronic Diseases through Persuasive Computing. 3081-3100 - Till Schümmer, Stephan G. Lukosch:
Understanding Tools and Practices for Distributed Pair Programming. 3101-3125 - Gwendolyn L. Kolfschoten, Mamadou D. Seck, Gert-Jan de Vreede:
How Interactive Whiteboards Can be Used to Support Collaborative Modeling. 3126-3138 - Torsten Holmer, Stephan G. Lukosch, Verena Kunz:
Diminishing Chat Confusion by Multiple Visualizations. 3139-3157
Volume 15, Number 17, 2009
- Hermann A. Maurer:
Managing Editor's Column. 3158-3159 - Josef Berger, Douglas S. Bridges:
Rearranging Series Constructively. 3160-3168 - Ismael Navas-Delgado, José Francisco Aldana Montes:
Extending SD-Core for Ontology-based Data Integration. 3201-3230 - Achraf Jabeur Telmoudi, Lotfi Nabli, Radhi M'hiri:
Modeling of Robustness Margins of the Control of a Predictive Control-Supervisory Architecture. 3231-3245 - Yannick Pencolé, Audine Subias:
A Chronicle-based Diagnosability Approach for Discrete Timed-event Systems: Application to Web-Services. 3246-3272 - Louis-Marie Traonouez, Didier Lime, Olivier H. Roux:
Parametric Model-Checking of Stopwatch Petri Nets. 3273-3304
Volume 15, Number 18, 2009
- Rafael Dueire Lins:
Processing Camera-Based Documents. 3158 - Szilárd Vajda, Thomas Plötz, Gernot A. Fink:
Layout Analysis for Camera-Based Whiteboard Notes. 3307-3324 - Shyama Prosad Chowdhury, Soumyadeep Dhar, Karen Rafferty, Amit Kumar Das, Bhabatosh Chanda:
Robust Extraction of Text from Camera Images using Colour and Spatial Information Simultaneously. 3325-3342 - Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breuel:
Adaptive Binarization of Unconstrained Hand-Held Camera-Captured Document Images. 3343-3363 - Gabriel Pereira e Silva, Marcelo Thielo, Rafael Dueire Lins, Brenno Miro, Steven J. Simske:
Automatically Deciding if a Document was Scanned or Photographed. 3364-3375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.