


default search action
Journal of Software, Volume 10
Volume 10, Number 1, January 2015
- Jinbo Tan:

An Improved Approach to Term Weighting in Hierarchical Web Page Classification. 1-8 - Xuyang Wei, Zhongliang Li, Tengfei Zhou, Haoran Zhang, Guocai Yang:

IWFPM: Interested Weighted Frequent Pattern Mining with Multiple Supports. 9-19 - Yangyang Wu, Siying Wu, Duansheng Chen:

Chinese-English Bilingual Word Semantic Similarity Based on Chinese WordNet. 20-31 - Saad Masood Butt, Shahid Masood Butt, Azura Onn, Nadra Tabassam, Mazlina Abdul Majid:

Usability Evaluation Techniques for Agile Software Model. 32-41 - Abdullah Alqahtani, Haiyan Lu, Jie Lu:

Sensitivity Level-Based Citizen Personal Information Model for Privacy Protection. 42-55 - Chuanlin Huang, Zhiqiu Huang, Jun Hu, Zhipeng Wu, Siqi Wang:

A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram. 56-70 - Qiuyue Zhao, Wanli Zuo, Zhongsheng Tian, Xin Wang, Ying Wang:

Predicting Trust Relationships in Social Networks Based on WKNN. 71-81 - Chun-Ming Yang, Neng-Yih Shin, Ming-Wei Weng, Chang-Hsien Hsu:

Using a Two-Dimensional Mean Value Matrix (TDMVM) to Improve Users' Satisfaction with Government e-Recruitment Website. 82-93 - Xinquan Chen:

The Shortest Path Algorithms of Hypergraphs Based on Search Strategies. 94-105 - Cheng Wang, Meng Yang, Xuemin Liu, Gang Yang:

Realistic Simulation for Rainy Scene. 106-115
Volume 10, Number 2, February 2015
- Xiaochao Li, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo:

On the Security Analysis of PBKDF2 in OpenOffice. 116-126 - Teng Huang, Zhizhong Ding, Younan Duan, Yin Chen, Lu Ding:

A Simplified and Efficient LTE RRC Conformance Testing Adapter. 127-141 - Xiaowen Chen, Zhonghai Lu, Axel Jantsch, Shuming Chen, Yang Guo, Shenggang Chen, Hu Chen, Man Liao:

Command-Triggered Microcode Execution for Distributed Shared Memory Based Multi-Core Network-on-Chips. 142-161 - Liang Zhu, Quanlong Lei, Guang Liu, Feifei Liu:

Processing Recommender Top-N Queries in Relational Databases. 162-171 - Yongming Wang, Shuai Xia:

Research on the Key Techniques of Rotary Bearing Man-hour Ration Management System. 172-179 - Haiyan Liu, Yanyan Liu, Zenggang Xiong, Zhen Yu, Kun Tian:

Study and Application of Urban Flood Risk Map Information Management System Based on SOA. 180-189 - Changyue Shi, Xiaolin Qin, Li Wang:

Continuous Skyline Queries for Moving Objects in Road Networks. 190-200 - Haibin Zhang, Siliang Lu, Shangbin Zhang, Fanrang Kong:

A Data-Collection and Fault Diagnosis System of Train Bearing Based on the C# and Multi-Wireless-Terminal. 201-212 - Jiaji Wang, Rangding Wang, Dawen Xu, Wei Li:

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode. 213-221
Volume 10, Number 3, March 2015
- M'hamed Rahmouni

, Samir Mbarki:
MDA-Based Modeling and Transformation to Generate N-Tiers Web Models. 222-238 - Khosrow Amirizadeh

, Mandava Rajeswari:
Accelerated -Greedy Multi Armed Bandit Algorithm for Online Sequential-Selections Applications. 239-249 - Anshul Verma

, K. K. Pattanaik:
Multi-Agent Communication Based Train Control System for Indian Railways: The Structural Design. 250-259 - Feda AlShahwan, Maha Faisal, Mehmet Hakan Karaata, Mazin Alshamrani:

RESTful-Based Bi-level Distribution Framework for Context-Based Mobile Web Service Provision. 260-287 - Marcelo Luiz Monteiro Marinho

, Suzana Cândido de Barros Sampaio, Telma Lúcia de Andrade Lima, Hermano Perrelli de Moura:
Uncertainty Management in Software Projects. 288-303 - Wellington Moreira de Oliveira, Jugurta Lisboa Filho, Alcione P. Oliveira, Wagner Dias de Souza, Lucas F. M. Vegi, João Ricardo M. Oliveira:

Building a Thematic Spatial Data Infrastructure and Situation-Aware for Global Events. 304-316 - Fraihat Salam, Qusai Shambour:

A Framework of Semantic Recommender System for e-Learning. 317-330 - Wenhui Zhang, Feng Guo, Zhian Lin, Yanhao Zhang, Jiming Lin, Xinxiang Wei:

Real-Time Visual Animation of Explosions. 331-343 - Christian Eichmann, Carsten Müller:

Team Formation Based on Nature-Inspired Swarm Intelligence. 344-354 - Carsten Mueller, Anton Pohl:

Plugin for Visual Paradigm for Generating and Intelligent Optimization of a Component Diagram Based on Attributes in the Class Diagram. 355-365 - Ana Milena Páez Quintero, Ricardo Llamosa-Villalba, Edgar Sneyder García Morantes:

Integral Architecture for Organizational Systems Arquetipos. 366-373 - Fariha Motherudin, Noor Ezleen Md. Moksen:

A Proposed Model for Code Quality Maturity Model. 374-383
Volume 10, Number 4, April 2015
- Ayoub Oudani, Mohamed Bahaj, Ilias Cherti:

Creating an RDF Graph from a Relational Database Using SPARQL. 384-391 - Changri Luo, Tingting He, Xinhua Zhang, Zibo Zhou:

Learning Forum Posts Topic Discovery and Its Application in Recommendation System. 392-402 - Yi Ouyang, Yun Ling:

A Novel on-Line Tracking Method Based on Superpixels Cliques. 403-415 - Qun Liu, Xiaobing Li:

A New Parallel Item-Based Collaborative Filtering Algorithm Based on Hadoop. 416-426 - Iyad AlAgha, Raed Rasheed:

An Exploratory Study of 3D Interaction Techniques in Augmented Reality Environments. 427-440 - Linda Badri, Mourad Badri, Nicolas Joly:

Towards a Change Impact Analysis Model for Java Programs: An Empirical Evaluation. 441-453 - Abdulrahman Almuhareb, Waleed A. Almutairi, Haya Al-Tuwaijri, Abdulelah Almubarak, Marwa Khan:

Recognition of Modern Arabic Poems. 454-464 - Morteza Ghasemi, Sayed Mehran Sharafi, Ala Arman:

Towards an Analytical Approach to Measure Modularity in Software Architecture Design. 465-479 - Kui Liu, Zhurong Zhou, Qianguo Chen, Xiaoli Yang:

Towards a RBAC Workflow Model for Thesis Management. 480-490 - Xiaohong Yuan, Emmanuel Borkor Nuakoh, Imano Williams, Huiming Yu:

Developing Abuse Cases Based on Threat Modeling and Attack Patterns. 491-498
Volume 10, Number 5, May 2015
- Razib Hayat Khan

, Poul E. Heegaard:
Software Performance Evaluation Utilizing UML Specification and SRN Model and Their Formal Representation. 499-523 - Fahad Algarni, Yen Cheung, Vincent C. S. Lee, Azmat Ullah:

Customer Satisfaction: Moderator of e-Business Performance and e-Business Liveability. 524-537 - Dayan Shangguan, Xintong Li:

Chess Game System on Smart Mobile Terminal. 538-550 - Zetao Jiang, Chuan Guo, Yang Yang:

A Coarse-to-Fine Registration Method Based on Geometric Constraints and Parallel Architecture. 551-565 - Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:

Debugging in Parallel or Sequential: An Empirical Study. 566-576 - Radhi Rafiee Afandi, Waidah Ismail, Azlan Husin

, Rosline Hassan
:
Leukemia Medical Application with Security Features. 577-598 - Rinky Dwivedi, Daya Gupta:

A Complete Method Configuration Process for Configuring Project-Specific Methods. 599-615 - Yila Su, Huimin Li, Fei Wang:

The Semantic Annotation Based on Mongolian Place Recognition. 616-627 - Asif Qumer Gill

, Muhammad Atif Qureshi:
Adaptive Enterprise Architecture Modelling. 628-638 - Emanuel S. Grant:

A Model-Driven Case Study of Developing a Complex Domain-Specific System. 639-649 - Yifan Yuan, Somjai Boonsiri:

Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach. 650-658
Volume 10, Number 6, June 2015
- O. Cyril Mathew, A. M. J. Md. Zubair Rahman:

A Novel Honeycomb Routing Approach for Bandwidth Utilization in MANET. 659-669 - R. Sampath, A. Saradha:

Alzheimer's Disease Image Segmentation with Self-Organizing Map Network. 670-680 - Yehia Ibrahim Alzoubi, Asif Qumer Gill

, Ahmed Al-Ani:
Distributed Agile Development Communication: An Agile Architecture Driven Framework. 681-694 - Hongfeng Zhang, Vincent Y. Liu, Yu Zhao:

Biocloud: A Systemic Review and Classification. 695-712 - Chamundeswari Arumugam, Chitra Babu:

Test Size Estimation for Object Oriented Software Based on Analysis Model. 713-729 - A. Siva Sangari, J. Martin Leo Manickam:

Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption. 730-738 - Shunsuke Kanda, Kazuhiro Morita, Masao Fuketa, Jun-Ichi Aoe:

Experimental Observations of Construction Methods for Double Array Structures Using Linear Functions. 739-747 - Tadashi Ogino:

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus. 748-756 - Ezgi Erturk, Ebru Akcapinar Sezer:

Software Fault Inference Based on Expert Opinion. 757-766 - Su-Hong Eom, Ki-Sun Song, Shin-Yoon Kang, Eung-Hyuk Lee:

Development of a Sensor Module for Estimating the Center of Pressure in Low Cost Gait Rehabilitation Robots. 767-774 - Kazuhiro Morita, Masao Fuketa, Jun-ichi Aoe:

A Method of Music Retrieval Using Impression Keywords. 775-783
Volume 10, Number 7, July 2015
- Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:

A Metamodel for Hybrid Access Control Policies. 784-797 - Yinlong Liu, Yong Wang:

A Study on Software Development Month Effort. 798-804 - Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri:

E-Government Portals Maturity Models: A Best Practices' Coverage Perspective. 805-824 - Yanan Li, Zhengyu Zhu:

A Fast Method of Detecting Overlapping Community in Network Based on LFM. 825-834 - Zijie Jiang, Zhongliang Cai, Hui Zhou, Nian Hui

:
Design and Implementation of Mobile Electronic Nautical Chart Information System Based on IOS. 835-841 - Marcelo Carvalho Fernandes, Antonio Juarez Alencar, Eber Assis Schmitz, Mônica Ferreira da Silva

, Rigel Procópio Fernandes
:
Acknowledging the Effect of the Depreciation of Tangible and Intangible Benefits upon the Evaluation of E-Gov Projects. 842-868 - N. R. Ram Mohan

, E. Baburaj:
Energy-Aware Load Balanced Scheduler for Cloud Computing to Improve Quality of Service. 869-880 - Sami Ouali

, Naoufel Kraïem, Zuhoor Al-Khanjari, Youcef Baghdadi:
Model Driven Software Product Line Process for Service/Component-Based Applications. 881-892 - Hina Saeeda, Fahim Arif, Nasir Mehmood Minhas

, Mammona Humayun:
Agile Scalability for Large Scale Projects: Lessons Learned. 893-903 - Onur Özçelik, D. Turgay Altilar:

Test-Driven Approach for Safety-Critical Software Development. 904-911 - Wei-Chieh Chang, Wei-Min Jeng:

Streamlined Workflow for 3D Modeling with Animated Characters. 912-918
Volume 10, Number 8, August 2015
- Nik Thompson, Tanya Jane McGill

:
Affective Stack - A Model for Affective Computing Application Development. 919-930 - Ming Xu:

A Modified Chaos-Based Image Encryption Algorithm. 931-938 - Rabeb Mizouni, Sanja Lazarova-Molnar

:
Project Schedule Simulation: Incorporating Human Factors' Uncertainty and Features' Priority in Task Modeling. 939-960 - A. Siva Sangari, J. Martin Leo Manickam:

Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption. 961-970 - Anis Zarrad:

A Systematic Review on Regression Testing for Web-Based Applications. 971-990 - Alireza Olyai, Reza Rezaei:

Analysis and Comparison of Software Product Line Frameworks. 991-1001 - Abdollah Kiani, Mohsen Amiri Fakhr, Reza Rezaei:

Architectural Patterns for Context-Aware System. 1002-1013 - Yasemin Gültepe:

Querying Bibliography Data Based on Linked Data. 1014-1020 - Hela Lajmi, Adel M. Alimi, Joseba M. Rodriguez:

Advanced Ethernet Networks' Diagnozer. 1021-1029 - Pallavi Kalyanasundaram, Sunita P. Ugale, Smitha K. P., Priti Ranadive:

Efficient Migration to Windows. 1030-1036 - Amr Tolba

, Ahmed Ghoneim
:
A Stepwise Self-adaptive Model for Improving Cloud Efficiency Based on Multi-Agent Features. 1037-1044
Volume 10, Number 9, September 2015
- B. Muruganantham, K. Vivekanandan:

Multi Perceptional Optimality Matrix Based Web Service Reliability Model. 1045-1055 - Maximiliano M. de Faria, Eber Assis Schmitz, Antonio Juarez Alencar, Mônica Ferreira da Silva

, Petros S. Stefaneas:
Analyzing IT Governance Initiatives with Game Theory: A Systematic literature Review. 1056-1069 - Balika J. Chelliah, K. Vivekanandan:

Aggregated Quantified Response Time Matrix Formulation (ARMF) - A New Quality of Service Paradigm Technique. 1070-1078 - Hui Deng, Hui Liu, Ying Guo, Baofeng Zhang:

Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods. 1079-1085 - A. Murugan, K. Vivekanandan:

XSD DDoS Trace Handler in Web Service Environment. 1086-1095 - Sangita Gupta, Suma V.:

Application and Assessment of Classification Techniques on Programmers' Performance in Software Industry. 1096-1103 - Bato Princess Nina Ann B., Labayo Rhea D. C., Nimfa Bisnan, Jessa T. Pumatong, Iluminada Vivien R. Domingo:

Mobile Daily Diet Guide and Advisor for Filipinos. 1104-1110 - Yingbing Yu:

Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques. 1111-1118 - Supasit Kajkamhaeng, Komwit Surachat, Komkrit Kangrat, Jitpakan Limsakun:

A Prototype Mobile Application for Searching Specialized Medical Facilities in a Chosen Vicinity. 1119-1126
Volume 10, Number 10, October 2015
- Saad M. Darwish, Saleh M. El-Kaffas, Omar A. Abdulateef:

Semantic Database Compression System Based on Augmented Vector Quantization. 1127-1139 - Lily Puspa Dewi, Ibnu Gunawan, Raymond Weily:

Library Information System Auditing: Monitoring and Evaluating the Software in Academic Institution. 1140-1147 - Shin-ya Nishizaki, Kensuke Narita, Tomoyuki Ueda:

Simplification of Abstract Machine for Functional Language and Its Theoretical Investigation. 1148-1159 - Joohyoung Jeon, Minjeong An, Hongchul Lee:

NoSQL Database Modeling for End-of-Life Vehicle Monitoring System. 1160-1169 - Simon Salvador E. Tidon, Benilda Eleonor V. Comendador:

A Configurable Real-Time Auto-locked Software for Electronics Company (RT-ASEC). 1170-1175 - Younan Duan, Zhizhong Ding, Teng Huang, Dingliang Wang:

TTCN-3 Codec Implementation for LTE RRM Conformance Test. 1176-1188 - Alsahli Abdulaziz Abdullah, Hameed Ullah Khan:

FreGsd: A Framework for Global Software Requirement Engineering. 1189-1198 - Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Javed Iqbal

, Salmi Md Zahid:
High Perceived-Value Requirements Engineering Practices for Outsourced Software Projects. 1199-1215 - Zahraa Abed Aljasim Muhisn, Mazni Omar, Mazida Ahmad, Sinan Adnan Muhisn:

Team Leader Selection by Using an Analytic Hierarchy Process (AHP) Technique. 1216-1227 - Zhengyu Zhu, Meiyu Zheng, Yihan Wu:

A Web Log Frequent Sequential Pattern Mining Algorithm Linked WAP-Tree. 1228-1234
Volume 10, Number 11, November 2015
- Xianhua Zeng, Yipeng Gao, Suli Hou, Shuwen Peng:

Real-Time Multi-scale Tracking via Online RGB-D Multiple Instance Learning. 1235-1244 - Raoul Vallon, Lukas Wenzel, Martin E. Brüggemann, Thomas Grechenig:

An Agile and Lean Process Model for Mobile App Development: Case Study into Austrian Industry. 1245-1264 - Taweechai Anguranak:

NFC Technology Payment System for Android Operation System. 1265-1273 - Zhengdong Liu:

A Garment Image Segmentation Method Based on Salient Region and JSEG. 1274-1282 - Mohd Hairul Nizam Md. Nasir, Shamsul Sahibuddin, Rodina Binti Ahmad, Shukor Sanim Bin Mohd Fauzi:

How the PMBOK Addresses Critical Success Factors for Software Projects: A Multi-round Delphi Study. 1283-1300 - Qiantu Zhang, Liqing Fang, Sicai Su, Yan Lv:

Parameters Optimization of SVM Based on Improved FOA and Its Application in Fault Diagnosis. 1301-1309 - Chung Yung, Yutang Lin:

Implementing TOAST, a Tool for Agile Software Project Management in Cloud Computing Environments. 1310-1318 - Pei He, Achun Hu, Dongqing Xie, Zhiping Fan:

Component-Based Verification Model of Sequential Programs. 1319-1326 - Sabah Al-Fedaghi:

On Collaboration in Software: Annotation vs. Flow-Based Diagrams. 1327-1335
Volume 10, Number 12, December 2015
- Siwadol Sateanpattanakul:

AOC: An Aspect - Oriented Approach for Comment to Reduce the Redundant Behavior between Source Code and Compilation Code. 1336-1342 - Supachai Vorapojpisut:

A Lightweight Framework of Home Automation Systems Based on the IFTTT Model. 1343-1350 - Anthony Karageorgos, Elli Rapti, Vassilis C. Gerogiannis

:
Resource Allocation in Software Projects Using a Bio-inspired Model. 1351-1358 - Ashish Kumar Mishra, Dharmendra Kumar Yadav:

Validation of UML Design Model. 1359-1366 - Anil Utku, Hacer (Uke) Karacan, Oktay Yildiz, M. Ali Akcayol:

Implementation of a New Recommendation System Based on Decision Tree Using Implicit Relevance Feedback. 1367-1374 - Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:

A Method for Efficient Extensibility Improvements in Embedded Software Evolution. 1375-1388 - Zakaria Bousalem

, Ilias Cherti:
XMap: A Novel Approach to Store and Retrieve XML Document in Relational Databases. 1389-1401 - Alexandra Nagy, George Sebastian Chis:

Sensitivity Analysis and Patterns Implementation on Load Testing Software Systems. 1402-1411

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














