


default search action
J.UCS, Volume 15
Volume 15, Number 1, 2009
- Klaus-Dieter Schewe:

Logic, Abstract State Machines and Databases. 1-2 - Egon Börger, Ove Sörensen, Bernhard Thalheim:

On Defining the Behavior of OR-joins in Business Process Models. 3-32 - Andrea Calì, Diego Calvanese, Davide Martinenghi:

Dynamic Query Optimization under Access Limitations and Dependencies. 33-62 - M. J. Cresswell:

Non-Denumerable Infinitary Modal Logic. 63-71 - Lindsay Groves:

Reasoning about Nonblocking Concurrency. 72-111 - Sven Hartmann, Sebastian Link:

Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner. 112-156 - Markus Kirchberg:

Using Abstract State Machines to Model ARIES-based Transaction Processing. 157-194 - Henning Köhler:

Global Database Design based on Storage Space and Update Time Minimization. 195-240 - Scott Uk-Jin Lee, Gillian Dobbie, Jing Sun, Lindsay Groves:

Formal Verification of Semistructured Data Models in PVS. 241-272 - Hans-Joachim Lenz, Bernhard Thalheim:

A Formal Framework of Aggregation for the OLAP-OLTP Model. 273-303 - Attila Sali, Klaus-Dieter Schewe:

A Characterisation of Coincidence Ideals for Complex Values. 304-354 - Jane Zhao, Klaus-Dieter Schewe, Henning Köhler:

Dynamic Data Warehouse Design with Abstract State Machines. 355-397
Volume 15, Number 2, 2009
- Shiguo Lian, Yan Zhang, Stefanos Gritzalis, Yu Chen:

Multimedia Security in Communication (MUSIC). 398-400 - Andreas U. Schmidt:

On the Superdistribution of Digital Goods. 401-425 - Jianwei Wang, Jianmin Lü, Shiguo Lian, Guangjie Liu:

On the Design of Secure Multimedia Authentication. 426-443 - Dimitrios Koukopoulos:

Stability in Heterogeneous Multimedia Networks under Adversarial Attacks. 444-464 - Mahdi Amine Abdelouahab, Abdelmadjid Bouabdallah, Mohammed Achemlal, Sylvie Laniepce:

The Topology Change Attack: Threat and Impact. 465-487 - Chin-Ling Chen:

A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test. 488-504
Volume 15, Number 3, 2009
- Hermann A. Maurer:

Managing Editor's Column. 505 - Mufutau Akinwande:

Advances in Homomorphic Cryptosystems. 506-522 - Alkiviadis G. Akritas:

Linear and Quadratic Complexity Bounds on the Values of the Positive Roots of Polynomials. 523-537 - Jörg R. Mühlbacher, Christian Praher:

DS RBAC - Dynamic Sessions in Role Based Access Control. 538-554 - Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta:

A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing. 555-583 - María José Suárez-Cabal, Javier Tuya:

Structural Coverage Criteria for Testing SQL Queries. 584-619 - Éric Tanter, Johan Fabry:

Supporting Composition of Structural Aspects in an AOP Kernel. 620-647 - Sergio L. Toral Marín, M. Rocío Martínez-Torres

, Federico Barrero:
Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux. 648-664 - Andreas Schmeil, Martin J. Eppler:

Knowledge Sharing and Collaborative Learning in Second Life: A Classification of Virtual 3D Group Interaction Scripts. 665-677 - Martin Memmel, Michael Kockler, Rafael Schirru:

Providing Multi Source Tag Recommendations in a Social Resource Sharing Platform. 678-691 - Niels Bjørn-Andersen, Leif Bloch Rasmussen, Soley Rasmussen:

Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models? 692-703
Volume 15, Number 4, 2009
- Ngoc Thanh Nguyen, De-Shuang Huang:

Knowledge Management for Autonomous Systems and Computational Intelligence. 704 - Jeen-Shing Wang, Jen-Chieh Chiang:

An Efficient Data Preprocessing Procedure for Support Vector Clustering. 705-721 - Xuesong Wang, Minglin Hao, Yuhu Cheng, Ruhai Lei:

PDE-PEDA: A New Pareto-Based Multi-objective Optimization Algorithm. 722-741 - Sing-Wu Liou, Chia-Ming Wang, Yin-Fu Huang:

Integrative Discovery of Multifaceted Sequence Patterns by Frame-Relayed Search and Hybrid PSO-ANN. 742-764 - Qun Niu, Taijin Zhou, Shiwei Ma:

A Quantum-Inspired Immune Algorithm for Hybrid Flow Shop with Makespan Criterion. 765-785 - Andrey Vavilin, Kang-Hyun Jo:

Graph-based Approach for Robust Road Guidance Sign Recognition from Differently Exposed Images. 786-804 - Vincenzo Di Lecce, Marco Calabrese, Domenico Soldo:

Fingerprinting Lexical Contexts over the Web. 805-825 - Vitoantonio Bevilacqua, Giuseppe Mastronardi, Filippo Menolascina, Paolo Pannarale, Giuseppe Romanazzi:

Bayesian Gene Regulatory Network Inference Optimization by means of Genetic Algorithms. 826-839 - Jun Zhang, Kwok-Wing Chau:

Multilayer Ensemble Pruning via Novel Multi-sub-swarm Particle Swarm Optimization. 840-858 - Ho Quoc Phuong Nguyen, Hee-Jun Kang, Young Soo Suh, Young Shick Ro:

A DCM Based Orientation Estimation Algorithm with an Inertial Measurement Unit and a Magnetic Compass. 859-876 - Trong Hai Duong, GeunSik Jo, Jason J. Jung, Ngoc Thanh Nguyen:

Complexity Analysis of Ontology Integration Methodologies: A Comparative Study. 877-897 - Igor Cavrak, Armin Stranjak, Mario Zagar:

SDLMAS: A Scenario Modeling Framework for Multi-Agent Systems. 898-925 - Shohel Ahmed

, Sungjoon Park, Jason J. Jung, Sanggil Kang:
A Personalized URL Re-ranking Method using Psychological User Browsing Characteristics. 926-940 - Dariusz Król, Aleksander Lupa:

Agent Migration: Framework for Analysis. 941-966
Volume 15, Number 5, 2009
- Byoung-Soo Koh, Mieso K. Denko, Stefanos Gritzalis, Ching-Hsien Hsu:

Data Security and Privacy Protection in Pervasive Computing Environments. 967-969 - Pablo Najera, Francisco Moyano, Javier López:

Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. 970-991 - Peter Pecho, Frantisek Zboril Jr., Martin Drahanský, Petr Hanácek:

Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. 992-1006 - Changhoon Lee, Jongsung Kim, Seokhie Hong, Yangsun Lee:

Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments. 1007-1022 - Shiguo Lian, Yan Zhang:

Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks. 1023-1041 - Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:

Light-Weight Key Exchange with Different Passwords in the Standard Model. 1042-1064 - Jong Hyuk Park:

USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework. 1065-1080 - Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:

Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. 1081-1089 - Yao Hua Ho, Ai Hua Ho, Kien A. Hua, Fei Xie:

Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network. 1090-1118 - Naixue Xiong, Jing He, Jong Hyuk Park, Donald H. Cooley, Yingshu Li

:
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security. 1119-1142
Volume 15, Number 6, 2009
- Vasco Brattka, Pieter Collins, Robert Rettinger:

Computability and Complexity in Analysis. 1143-1144 - Volker Bosserhoff:

On the Effective Existence of Schauder Bases. 1145-1161 - Pieter Collins, Daniel Silva Graça:

Effective Computability of Solutions of Differential Inclusions The Ten Thousand Monkeys Approach. 1162-1185 - Christine Gaßner

:
Oracles and Relativizations of the P =? NP Question for Several Structures. 1186-1205 - Zvonko Iljazovic:

Chainable and Circularly Chainable Co-r.e. Sets in Computable Metric Spaces. 1206-1235 - Davorin Lesnik:

Constructive Urysohn Universal Metric Space. 1236-1263 - Takakazu Mori, Mariko Yasugi, Yoshiki Tsujii:

Fine-computable Functions on the Unit Square and their Integral. 1264-1279 - Arno Pauly:

Representing Measurement Results. 1280-1300 - Robert Rettinger, Klaus Weihrauch, Ning Zhong:

Topological Complexity of Blowup Problems. 1301-1316 - Matthias Schröder:

An Effective Tietze-Urysohn Theorem for QCB-Spaces. 1317-1336 - Svetlana Selivanova, Victor L. Selivanov:

Computing the Solution Operators of Symmetric Hyperbolic Systems of PDE. 1337-1364 - Hideki Tsuiki, Shuji Yamada:

On Finite-time Computability Preserving Conversions. 1365-1380 - Klaus Weihrauch, Tanja Grubba:

Elementary Computable Topology. 1381-1422
Volume 15, Number 7, 2009
- J. Ángel Velázquez-Iturbide, Francisco José García-Peñalvo:

Computers in Education: Advances in Software Technology. 1423-1426 - Claudio Dondi:

Innovation and Quality in e-Learning: a European Perspective. 1427-1439 - Paloma Díaz, Esther Guerra, Telmo Zarraonandia, Ignacio Aedo, Carmen L. Padrón:

A Meta-modeling based Approach for the Multi-Disciplinary Design of Web Educational Systems. 1440-1454 - Patrícia Castanheira Dinis Duarte Silva, Alberto Rodrigues da Silva:

Application Scenarios for the Learning Objects Pool. 1455-1471 - Francisco Jurado

, Ana I. Molina, Miguel A. Redondo, Manuel Ortega, Adam Giemza, Lars Bollen, Heinz Ulrich Hoppe:
Learning to Program with COALA, a Distributed Computer Assisted Environment. 1472-1485 - Fernando A. Mikic, Juan C. Burguillo-Rial, Martín Llamas Nistal:

TQ-Bot: An AIML-based Tutor and Evaluator Bot. 1486-1495 - Lucila Maria Costi Santarosa, Lourenço de Oliveira Basso:

Eduquito: Virtual Environment for Digital Inclusion of People with Special Educational Needs. 1496-1507 - Rosa Silva, António Andrade:

Development of a Web Application for Management of Learning Styles. 1508-1525 - Diego Alonso Gómez Aguilar

, Roberto Therón
, Francisco José García-Peñalvo:
Semantic Spiral Timelines Used as Support for e-Learning. 1526-1545 - Francisco J. Almeida-Martínez, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide:

Visualization of Syntax Trees for Language Processing Courses. 1546-1561
Volume 15, Number 8, 2009
- Hermann A. Maurer:

Managing Editor's Column. 1562 - Joaquín Entrialgo, Javier García, José Luis Díaz, Daniel F. García:

Tools and Stochastic Metrics for Debugging Temporal Behaviour of Real-Time Systems. 1563-1588 - Junseok Hwang, Youngjin Lee, Seung-Hyun Kim:

Modelling Weblog Success: Case of Korea. 1589-1606 - Emilio Soler, Juan Trujillo, Carlos Blanco

, Eduardo Fernández-Medina:
Designing Secure Data Warehouses by Using MDA and QVT. 1607-1641 - Matti Tedre:

Computing as Engineering. 1642-1658 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:

Certificate-based Signatures Revisited. 1659-1684 - Dengya Zhu, Heinz Dreher:

Discovering Semantic Aspects of Socially Constructed Knowledge Hierarchy to Boost the Relevance of Web Searching. 1685-1710 - Lutz Maicher, Benjamin Bock:

ActiveTM - The Factory for Domain-customised Portal Engines. 1711-1721 - Steffen Lohmann, Jörg Niesenhaus, Philipp Heim, Jürgen Ziegler:

Fostering Knowledge Flow and Community Engagement in the Development of Interactive Entertainment. 1722-1734 - Ulrica Pettersson:

Success and Failure Factors for KM: The Utilization of Knowledge in the Swedish Armed Forces. 1735-1743
Volume 15, Number 9, 2009
- Jianming Yong, Weiming Shen, José A. Pino:

CSCWD Technologies, Applications and Challenges. 1744-1745 - Sven Tackenberg, Bernhard Kausch, Sönke Duckwitz, Christopher M. Schlick, Selvinaz Karahancer:

Organizational Simulation of Complex Process Engineering Projects in the Chemical Industry. 1746-1765 - Yunjiao Xue, Chun Wang, Hamada H. Ghenniwa, Weiming Shen:

A Tree Similarity Measuring Method and its Application to Ontology Comparison. 1766-1781 - Lili Sun, Hua Wang, Jianming Yong:

Authorization Algorithms for Permission-Role Assignments. 1782-1798 - Junzhou Luo, Xiaogang Wang, Ming Yang:

A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme. 1797-1811 - Sergio F. Ochoa, José A. Pino, Fabian Poblete:

Estimating Software Projects Based On Negotiation. 1812-1832 - Nelson Baloian, Gustavo Zurita:

MC-Supporter: Flexible Mobile Computing Supporting Learning though Social Interactions. 1833-1851 - Kelvin Leong, Junco Li, Stephen Chi-fai Chan, Vincent T. Y. Ng:

An Application of the Dynamic Pattern Analysis Framework to the Analysis of Spatial-Temporal Crime Relationships. 1852-1870 - Nazaraf Shah

, Rahat Iqbal
, Kashif Iqbal, Anne E. James
:
A QoS Perspective on Exception Diagnosis in Service-Oriented Computing. 1871-1885 - Claudia C. P. Cruz, Cláudia Lage Rebello da Motta, Flávia Maria Santoro, Marcos Elia:

Applying Reputation Mechanisms in Communities of Practice: A Case Study. 1886-1906 - Weidong Li, Liang Gao, Xinyu Li:

Application of Intelligent Strategies for Cooperative Manufacturing Planning. 1907-1923 - Yong Xiang, Shaohua Zhang, Yuzhu Shen, Meilin Shi:

Pattern-Oriented Workflow Generation and Optimization. 1924-1944 - Rita Suzana Pitangueira Maciel, José Maria N. David, Michel Ridwan Oei, Adriano Augusto de Oliveira Bastos, Leandro de Oliveira Menezes:

Supporting Awareness in Groupware through an Aspect-Oriented Middleware Service. 1945-1969 - Po-Huan Chiu, Chi-Chun Lo, Kuo-Ming Chao:

Integrating Semantic Web and Object-Oriented Programming for Cooperative Design. 1970-1990 - Emerson Cabrera Paraiso, Cesar Augusto Tacla:

Using Embodied Conversational Assistants to Interface Users with Multi-Agent Based CSCW Applications: The WebAnima Agent. 1991-2010 - Ting Peng, Qinghua Zheng, Yinli Jin:

Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming. 2011-2025
Volume 15, Number 10, 2009
- Gabriele Kotsis, David Taniar, Ismail Khalil, Eric Pardede:

Information Integration on Web-based Applications and Services. 2026-2027 - Klaus-Dieter Schewe, Bernhard Thalheim, Qing Wang:

Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States. 2028-2057 - Eric Pardede, J. Wenny Rahayu, Ramanpreet Kaur Aujla, David Taniar:

SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System. 2058-2077 - Elhadi M. Shakshuki, Richard Halliday:

An Agent for Web-based Structured Hypermedia Algorithm Explanation System. 2078-2108 - Sohei Ikeda, Takakazu Nagamine, Tomio Kamada:

Application Framework with Demand-Driven Mashup for Selective Browsing. 2109-2137
Volume 15, Number 11, 2009
- Cládia Werner, Flávio Oquendo:

Software Components, Architectures and Reuse. 2138-2141 - Ricardo Perrone, Raimundo José de Araújo Macêdo, George Lima

, Veronica Lima:
An Approach for Estimating Execution Time Probability Distributions of Component-based Real-Time Systems. 2142-2165 - Ronan Barrett, Claus Pahl:

Distribution Pattern-driven Development of Service Architectures. 2166-2195 - Paulo E. S. Barbosa, Franklin Ramalho, Jorge C. A. de Figueiredo, Antonio D. dos S. Junior, Anikó Costa

, Luís Gomes:
Checking Semantics Equivalence of MDA Transformations in Concurrent Systems. 2196-2224 - Kleinner S. F. Oliveira, Karin Koogan Breitman, Toacy Cavalcante de Oliveira:

A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap. 2225-2253 - Camila Nunes, Uirá Kulesza, Cláudio Sant'Anna, Ingrid Nunes, Alessandro F. Garcia, Carlos José Pereira de Lucena:

Assessment of the Design Modularity and Stability of Multi-Agent System Product Lines. 2254-2283
Volume 15, Number 12, 2009
- Tai-Hoon Kim, Andrew Kusiak, David Taniar, Daqing Zhang:

Intelligent Environments and Services. 2284-2286 - Oje Kwon, Ki-Joune Li:

Causality Join Query Processing for Data Streams via a Spatiotemporal Sliding Window. 2287-2310 - Zhiyong Yu, Zhiwen Yu, Xingshe Zhou, Daqing Zhang, Yuichi Nakamura:

Meeting Warming-up: Detecting Common Interests and Conflicts among Participants before a Meeting. 2311-2329 - Choonsung Shin, Woontack Woo:

Service Conflict Management Framework for Multi-user Inhabited Smart Home. 2330-2352 - Ioannis G. Nikolakopoulos, Charalampos Z. Patrikakis, Antonio Cimmino, Martin Bauer, Henning Olesen:

On the Personalization of Personal Networks - Service Provision Based on User Profiles. 2353-2372 - Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang:

Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. 2373-2386 - Linkai Weng, Yaoxue Zhang, Yue-Zhi Zhou, Laurence Tianruo Yang, Pengwei Tian, Ming Zhong:

A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph. 2387-2408 - Ratchadaporn Amornchewin, Worapoj Kreesuradej:

Mining Dynamic Databases using Probability-Based Incremental Association Rule Discovery Algorithm. 2409-2428 - Chun Ruan, Sang-Soo Yeo:

Modeling of an Intelligent e-Consent System in a Healthcare Domain. 2429-2444
Volume 15, Number 13, 2009
- Kang-Hyun Jo, Ngoc Thanh Nguyen, Edward Szczerbicki:

Knowledge Management for Intelligent Systems. 2445 - Dunwei Gong, Xin Yao, Jie Yuan:

Interactive Genetic Algorithms with Individual Fitness Not Assigned by Human. 2446-2462 - Dong-Wook Seo, Hyun-Uk Chae, Byeong-Woo Kim, Won-Ho Choi, Kang-Hyun Jo:

Human Tracking based on Multiple View Homography. 2463-2484 - Vu Van Tan, Dae-Seung Yoo, Jun-Chol Shin, Myeong-Jae Yi:

A Multiagent System for Hierarchical Control and Monitoring. 2485-2505 - Chenn-Jung Huang, I-Fan Chen, Kai-Wen Hu, Hung-Yen Shen, You-Jia Chen, Dian-Xiu Yang:

A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks. 2506-2527 - Yifei Chen, Feng Liu, Bram Vanschoenwinkel, Bernard Manderick:

Splice Site Prediction using Support Vector Machines with Context-Sensitive Kernel Functions. 2528-2546 - Yi-Chung Chen

, Jeen-Shing Wang:
A Hammerstein-Wiener Recurrent Neural Network with Frequency-Domain Eigensystem Realization Algorithm for Unknown System Identification. 2547-2565 - Tao Jiang, Yucai Feng, Bing Zhang:

Online Detecting and Predicting Special Patterns over Financial Data Streams. 2566-2585 - Jih-Gau Juang, Chia-Lin Lee:

Applications of Cerebellar Model Articulation Controllers to Intelligent Landing System. 2586-2607 - Vitoantonio Bevilacqua, Lucia Cariello, Marco Giannini, Giuseppe Mastronardi, Vito Santarcangelo, Rocco Scaramuzzi, Antonella Troccoli:

A Comparison Between a Geometrical and an ANN Based Method for Retinal Bifurcation Points Extraction. 2608-2621 - Ngoc Thanh Nguyen:

Rough Classification - New Approach and Applications. 2622-2628 - Lacramioara Astefanoaei, Mehdi Dastani, John-Jules Ch. Meyer, Frank S. de Boer:

On the Semantics and Verification of Normative Multi-Agent Systems. 2629-2652 - Duy Hoang Pham, Guido Governatori, Subhasis Thakur:

Extended Defeasible Reasoning for Common Goals in n-Person Argumentation Games. 2653-2675 - Guido Boella, Leon van der Torre, Serena Villata:

Analyzing Cooperation in Iterative Social Network Design. 2676-2700 - Thanh-Quang Chu, Alexis Drogoul, Alain Boucher, Jean-Daniel Zucker:

Interactive Learning of Independent Experts' Criteria for Rescue Simulations. 2701-2725 - Dongxiao Niu, Yongli Wang, Chunming Duan, Mian Xing:

A New Short-term Power Load Forecasting Model Based on Chaotic Time Series and SVM. 2726-2745
Volume 15, Number 14, 2009
- Hermann A. Maurer:

Managing Editor's Column. 2746 - Carlos Aguirre, Ramón Huerta, Lev S. Tsimring:

Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms. 2747-2764 - Leendert Botha, Lynette van Zijl, McElory Hoffmann:

Realtime LEGO Brick Image Retrieval with Cellular Automata. 2765-2785 - Emilio J. Castellano, Luis Martínez:

A Web-Decision Support System based on Collaborative Filtering for Academic Orientation. Case Study of the Spanish Secondary School. 2786-2807 - Jürgen Dassow, Sherzod Turaev:

Petri Net Controlled Grammars: the Case of Special Petri Nets. 2808-2835 - Alberto de la Encina

, Luis Llana, Fernando Rubio:
A Debugging System Based on Natural Semantics. 2836-2880 - Javier Herranz:

Ideal Homogeneous Access Structures Constructed from Graphs. 2881-2893 - Gabriel Rodríguez, María J. Martín, Patricia González, Juan Touriño:

A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes. 2894-2911
Volume 15, Number 15, 2009
- Eduardo Fernández-Medina, Alfonso Rodríguez:

Security in Information Systems: New Advances and Tendencies. 2912-2915 - Michael Hafner, Mukhtiar Memon, Ruth Breu:

SeAAS - A Reference Architecture for Security Services in SOA. 2916-2936 - Basel Alomair, Radha Poovendran:

Information Theoretically Secure Encryption with Almost Free Authentication. 2937-2956 - Óscar Sánchez Ramón, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez:

ModelSec: A Generative Architecture for Model-Driven Security. 2957-2980 - Pino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya:

Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers. 2981-2998 - William R. Claycomb, Dongwan Shin:

A User Controlled Approach for Securing Sensitive Information in Directory Services. 2999-3018 - Axel Schröpfer, Florian Kerschbaum, Christoph G. Schütz, Richard Pibernik:

Optimizations for Risk-Aware Secure Supply Chain Master Planning. 3019-3037 - Luis Enrique Sánchez

, Antonio Santos-Olmo, David Garcia Rosado
, Mario Piattini:
Managing Security and its Maturity in Small and Medium-sized Enterprises. 3038-3058 - Corrado Aaron Visaggio

, Francesca de Rosa:
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases. 3059-3078
Volume 15, Number 16, 2009
- Pedro Antunes, Robert O. Briggs:

Collaborative Technology and Environments. 3079-3080 - Eduardo Gasca, Jesús Favela, Monica Tentori:

Assisting Support Groups of Patients with Chronic Diseases through Persuasive Computing. 3081-3100 - Till Schümmer, Stephan G. Lukosch:

Understanding Tools and Practices for Distributed Pair Programming. 3101-3125 - Gwendolyn L. Kolfschoten, Mamadou D. Seck, Gert-Jan de Vreede:

How Interactive Whiteboards Can be Used to Support Collaborative Modeling. 3126-3138 - Torsten Holmer, Stephan G. Lukosch, Verena Kunz:

Diminishing Chat Confusion by Multiple Visualizations. 3139-3157
Volume 15, Number 17, 2009
- Hermann A. Maurer:

Managing Editor's Column. 3158-3159 - Josef Berger, Douglas S. Bridges:

Rearranging Series Constructively. 3160-3168 - Ismael Navas-Delgado, José Francisco Aldana-Montes:

Extending SD-Core for Ontology-based Data Integration. 3201-3230 - Achraf Jabeur Telmoudi, Lotfi Nabli, Radhi M'hiri:

Modeling of Robustness Margins of the Control of a Predictive Control-Supervisory Architecture. 3231-3245 - Yannick Pencolé, Audine Subias:

A Chronicle-based Diagnosability Approach for Discrete Timed-event Systems: Application to Web-Services. 3246-3272 - Louis-Marie Traonouez, Didier Lime, Olivier H. Roux

:
Parametric Model-Checking of Stopwatch Petri Nets. 3273-3304
Volume 15, Number 18, 2009
- Rafael Dueire Lins:

Processing Camera-Based Documents. 3158 - Szilárd Vajda, Thomas Plötz, Gernot A. Fink

:
Layout Analysis for Camera-Based Whiteboard Notes. 3307-3324 - Shyama Prosad Chowdhury, Soumyadeep Dhar, Karen Rafferty

, Amit Kumar Das, Bhabatosh Chanda:
Robust Extraction of Text from Camera Images using Colour and Spatial Information Simultaneously. 3325-3342 - Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breuel:

Adaptive Binarization of Unconstrained Hand-Held Camera-Captured Document Images. 3343-3363 - Gabriel Pereira e Silva, Marcelo Thielo, Rafael Dueire Lins, Brenno Miro, Steven J. Simske:

Automatically Deciding if a Document was Scanned or Photographed. 3364-3375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














