Last update: Mon Jun 12 12:36:31 MDT 2023
Volume 1, Number 1, October, 1985C. Boswell and K. K. Saluja and K. Kinoshita Design of Programmable Logic Arrays for Parallel Testing . . . . . . . . . . . . 5--16 Kinji Mori and Shyoji Miyamoto and Hirokazu Ihara Autonomous Decentralized Computer System and Software Structure . . . . . . . . . 17--22 P. Corsini and C. A. Prete and L. Simoncini MuTEAM: An experience in the design of robust multiprocessor systems . . . . . 23--35 C. D. Spyropoulos and D. J. Evans Performance Analysis of Priority-Driven Algorithm for Multiprocessor . . . . . . 36--46 Christopher S. Wallace and David Koch TTL-compatible Multiport Bus . . . . . . 47--52 G. Haring and H. Schelch Modelling of RPS Disc Systems . . . . . 53--64 Barbara K. Lee Implementing a Quality Circle Programme for Computer Professionals . . . . . . . 65--67
Sang Hyuk Son and Ashok K. Agrawala Algorithm for Concurrency Control in Replicated Databases . . . . . . . . . . 75--81 Milena M. Didic and Peter Kohlhepp and Reinhold Oberle Design Considerations for a Distributed Real-Time Unclear Reactor Safety System 82--92 Jonathan Bowen Design of a Simple Cambridge Ring Interface Adapter . . . . . . . . . . . 93--98 S. Balsamo and G. Iazeolla Synthesis of Queueing Networks with Block and State-Dependent Routing . . . 99--108 G. C. Pentzaropoulos and G. C. Barney and W. Swindells Performance Modelling of Serc Prime Computer System . . . . . . . . . . . . 109--113 K. S. Lew and T. S. Dillon and K. E. Forward Model of Error Propagation in Database Systems . . . . . . . . . . . . . . . . 114--118 R. L. Ennis and J. H. Griesmer and S. J. Hong and M. Karnaugh and J. K. Kastner and D. A. Klein and K. R. Milliken and M. I. Schor and H. M. Van Woerkom Automation of MVS Operations; an Expert-Systems Approach . . . . . . . . 119--124
Kang G. Shin and C. M. Krishna New Performance Measures for Design and Evaluation of Real-Time Multiprocessors 179--192 Helen D. Karatza Simulation Study of Multitasking of Open Computer System Networks . . . . . . . . 193--204 P. Corsini and G. Frosini Methodology for Complex System Description via Extended Petri Nets . . 205--212 Yinghua Min and Zhongcheng Li Pseudo-Exhaustive Testing Strategy for Large Combinational Circuits . . . . . . 213--220
J. R. Barra and M. Becker and E. F. Kouka and M. Tricot Application of Data Analysis Methods and of Simulated Annealing for the Automatic Layout of Circuits . . . . . . . . . . . 3--15 Ahmed K. Elmagarmid Fault-Tolerant Deadlock Detection in Distributed Database Systems . . . . . . 16--28 Yang-Chang Hong and Thomas H. Payne Efficient Computation of Dataflow Graphs in a Hypercube Architecture . . . . . . 29--41 Helen D. Karatza Simulation Study of Multitasking of Closed Computer System Networks . . . . 42--51
Balakrishna R. Iyer and Philip S. Yu and Lorenzo Donatiello Analysis of Fault Tolerant Multiprocessor Architectures for Lock Engine Design . . . . . . . . . . . . . 59--75 Sang Hyuk Son On Multiversion Replication Control in Distributed Systems . . . . . . . . . . 76--84 Herman Hughes and Ke Ren Chuang and Parviz Yegani Give-Up-Based Protocol for Token Passing 85--91 Lawrence W. Dowdy and Karen D. Gordon Performance Sensitivity with Respect to the Distribution of the Multiprogramming Level . . . . . . . . . . . . . . . . . 92--98
A. R. Hurson and L. L. Miller Database Machine Architecture for Supporting Incomplete Information . . . 107--116 C. Y. Wong and T. S. Dillon and K. E. Forward Concurrent, Real-Time Systems: a Systematic Approach Using Timed Petri Nets . . . . . . . . . . . . . . . . . . 117--124 Herman Hughes and Horng Jiang and Susanne Smith Voice/Data Integrated Transmission on a Time Division CSMA/CD Network . . . . . 125--130 T. Downs Reliability Problems in Software Engineering --- a Review . . . . . . . . 131--147
M. A. Bassiouni and A. Gupta Computing Estimates of Waiting Times in Ring Local Area Networks with Priority Classes . . . . . . . . . . . . . . . . 155--160 Y. W. Yak and T. S. Dillon and K. E. Forward Modelling the Effect of Transient Faults in Fault-Tolerant Computer Systems . . . 161--166 V. Varadharajan and K. D. Baker Net-Based System Design Representation and Analysis . . . . . . . . . . . . . . 167--178 M. E. C. Hull and R. G. Roulston and T. R. S. Gregg Interactive Computing Service Monitoring System . . . . . . . . . . . . . . . . . 179--185 Jason Gait Synchronizing Multiprocessor Access to Shared Operating System Data Structures 186--191 Anon Design of I/O Drivers for a High-Availability Unix . . . . . . . . . 193--196
S. M. Shatz Superprocesses: a Distributed Program Configuration Concept Supporting . . . . 3--12 Herman Hughes and Parviz Yegani and Jih-Shyr Yih CSMA/CD Protocol with Message-Based Priority Function . . . . . . . . . . . 13--20 Kang G. Shin and Heungkyu Lee Port Manipulator for the Distributed Realization of an Integrated Manufacturing System . . . . . . . . . . 21--31 F. Di Giandomenico and M. L. Guidotti and F. Grandoni and L. Simoncini Gracefully Degradable Algorithm for Byzantine Agreement . . . . . . . . . . 32--40
R. K. Molnar and S. C. Bruell Sensitivity of Operational Formulae . . 51--66 Ajoy K. Datta and Sukumar Ghosh and Douglas Harms and Ahmed K. Elmagarmid Deadlock-Avoidance Mechanisms in Distributed Systems . . . . . . . . . . 67--82 Heiko Schroder Instruction Systolic Array --- Tradeoff Between Flexibility and Speed . . . . . 83--90 Simin Pakzad and S. Lakshmivarahan Interconnection Networks and Fault Tolerance . . . . . . . . . . . . . . . 91--99
Ajoy K. Datta and Sukumar Ghosh and Muhundan Gopalan and Ahmed K. Elmagarmid Pipelining and concurrency in graphics and image-processing applications . . . 107--116 C. Robach and S. Guibert Testability measures: a Review . . . . . 117--126 Vernon Rego and Wojciech Szpankowski Closed-network duals of multiqueues with application to token-passing systems . . 127--139 E. S. Harrison and E. J. Schmitt Structure of System/88, a fault-tolerant computer . . . . . . . . . . . . . . . . 140--162
Luigi Mancini and Giuseppe Pappalardo Hoare logic of distributed redundant systems . . . . . . . . . . . . . . . . 171--180 Ratan K. Guha and Arthur F. Dickinson and Allan Kikawa Analysis of CMH deadlock-detection algorithm using transmission delays . . 181--188 Arumalla V. Reddi Secondary memory analysis of a mini/microcomputer in resource-sharing distributed information systems . . . . 189--198 S. Bedi File system activity and the distribution of disc transfers on a multiaccess system . . . . . . . . . . . 199--200 Balakrishna R. Iyer and Daniel M. Dias and Philip S. Yu Performability comparison of configurable duplex systems . . . . . . 201--215
F. Di Giandomenico and M. L. Guidotti and F. Grandoni and L. Simoncini Evaluating the Efficiency of Byzantine Agreement Algorithms . . . . . . . . . . 3--11
Jason Gait and Terry Laskodi and Rick Krull Interactive Monitor for a Communication Kernel . . . . . . . . . . . . . . . . . 154--160
Anonymous Editorial . . . . . . . . . . . . . . . 3 G. Ciccarella and G. Paris and G. Valent Top-down approach to the design of OCCAM and transputer-based real-time systems 5--12 Kevin A. Murray and Andy J. Wellings Wisdom: a distributed operating system for transputers . . . . . . . . . . . . 13--20 Qingping Guo and Yakup Paker Concurrent communication and granularity assessment for a transputer-based multiprocessor system . . . . . . . . . 21--28 Harald Richter Multiprocessor with dynamically variable topology . . . . . . . . . . . . . . . . 29--35 X. L. Deng and T. Dillon and K. Lew and J. Rankin and E. Smith and D. Suter Optimal topologies of transputers for different classes of problems . . . . . 36--41 A. G. Chalmers and J. W. Hearne and K. J. Cameron and N. E. Ligeti Implementation and performance evaluation of an optimization algorithm on transputers . . . . . . . . . . . . . 42--46 R. K. Cooper and D. A. Peshkin Parallel alternating direction implicit method on a network of transputers . . . 47--52
Pradip K. Srimani and Shivakant Mishra Performance evaluation of distributed mutual exclusion algorithms for computer networks . . . . . . . . . . . . . . . . 59--64 M. Becker and C. Dekoninck and J. P. Prost and B. Verrier Stochastic Petri net model for the FPS/264 . . . . . . . . . . . . . . . . 65--72 M. Seetha Lakshmi and Philip S. Yu Effectiveness of parallel processing in database systems . . . . . . . . . . . . 73--81 C. S. Wallace Physically random generator . . . . . . 82--88 David Finkel Modelling dynamic load-sharing in a distributed computing system . . . . . . 89--94 Edmond F. Kouka and Jean Luc Patry Algorithms for restructuring WSI arrays of processors . . . . . . . . . . . . . 95--104 Y. M. Lam and H. T. Mouftah and M. Ilyas Performance analysis of CSMA-CD protocols in local area bus networks . . 105--110 C. P. Ravikumar and L. M. Patnaik Performance improvement of simulated annealing algorithms . . . . . . . . . . 111--115 Hong-Fa Ho and Gen-Heuy Chen and Te-Son Kuo Branch testing of concurrent programs using Petri net models . . . . . . . . . 116--125
Sajal K. Das and Narsingh Deo Parallel Hungarian algorithm . . . . . . 131--136 Paul T. Hulina and Lee D. Coraor Coprocessor architectures for efficient address computation and memory accessing 137--146 Jin-Chin Wang and Michel Dubois Performance comparison of cache coherence protocols based on the access burst model . . . . . . . . . . . . . . 147--158 G. M. Megson Complex Eigenproblem solution by a parallel norm-reducing Jacobi method . . 159--168 B. Beresford-Smith and H. Schroder Effective reconfiguration algorithms in fault-tolerant processor arrays . . . . 169--177 Vincenza Carchiolo and Antonella Di Stefano and Alberto Faro and Giuseppe Pappalardo Case study in protocol verification . . 178--186 Milind Mahajan and V. K. Prasanna Kumar Efficient parallel implementation of RETE pattern matching . . . . . . . . . 187--192
Reda A. Ammar Algorithmic approach to construct probabilistic grammatical models of command streams in interactive software systems . . . . . . . . . . . . . . . . 195--201 Dilip Sarkar and Ratan Kumar Guha Mapping a class of algorithms from binary tree machines to linear arrays 202--204 David P. Stotts Bounding procedure execution times in a synchronous Petri net computation model 205--214 Hyuk Son Sang Reconstruction of distributed databases 215--222 Tad Hogg and J. O. Kephart Phase transitions in high-dimensional pattern classification . . . . . . . . . 223--232 Shih-Chian Yang and John A. Silvester Fault-tolerant multistage interconnection networks: performance/reliability tradeoffs . . . 233--242 Douglas W. Cornell and Philip S. Yu Integrated approach to buffer management and query optimization . . . . . . . . . 243--251
C. P. Ravikumar and Sarma Sastry and L. M. Patnaik Parallel min-cut placement on reduced hardware SIMD architecture . . . . . . . 3 Amos R. Omondi Design of a high performance instruction pipeline . . . . . . . . . . . . . . . . 13--29 D. Crookes and P. J. Morrow and P. J. McParland Occam implementation of an algebra-based language for low-level image processing 30 Helen D. Karatza Simulation of load balancing and multitasking in a homogeneous distributed system model . . . . . . . . 37 Daniel M. Dias and Philip S. Yu and Brian T. Bennett Analysis of trade-offs between centralized and geographically distributed transaction processing systems . . . . . . . . . . . . . . . . 45 David L. Landis and Daniel C. Muha Optimal maintenance resource allocation for multiprocessor systems . . . . . . . 54
Franz Schreiner and Gerhard Zimmermann Pesa-I: a Parallel and Distributed Architecture for Production Systems . . 67 Arumalla V. Reddi Memory performance of microcomputers at large user nodes of distributed systems 85 A. R. Hurson and L. L. Miller and S. H. Pakzad and C. Fan Functional dependencies to enforce integrity constraints in database machine environments . . . . . . . . . . 91 Paul V. Shebalin and Sang H. Son and Chun-Hyon Chang Software safety analysis in distributed systems . . . . . . . . . . . . . . . . 102 A. E. Conway and D. O'Brien Validation of an approximation technique for queueing network models with chain-dependent FCFS queues . . . . . . 117
J. C. Muzio and M. Serra Data compaction for bridging faults . . 131 L. Marinos and M. P. Papazoglou and D. Christodoulakis Data integration methodology for an office environment . . . . . . . . . . . 143 X.-L. Deng and T. Dillon and K. Lew Reconfigurable transputer-based architecture . . . . . . . . . . . . . . 152 Bin Qin and Reda A. Ammar and Howard A. Sholl Allocating processing power to minimize time costs in parallel software systems 159 Pradip K. Srimani Heuristic deadlock avoidance algorithm in a distributed system . . . . . . . . 170 Peter Richardson and Dzaharudin Mansor and T. S. Dillon and K. E. Forward Fault-tolerant approach to the design of a Signalling Transfer Point: Part 1 . . 178 Chin-Chen Chang and Tzong-Chen Wu Broadcasting cryptosystem in computer networks using interpolating polynomials 185
Jozo J. Dujmovic Clustering, comparison and selection of standard synthetic benchmark programs 195--210 Dzaharudin Mansor and Peter Richardson and Tharam S. Dillon and Kevin E. Forward Design, implementation and evaluation of a fault-tolerant signalling network management system. Part II . . . . . . . 211--226 Chihping Wang and Victor O. K. Li Precedence-agreement concurrency control algorithm for distributed database systems . . . . . . . . . . . . . . . . 227--237 N. Ranganathan and Amar Mukherjee and M. Bassiouni VLSI algorithms for data compression . . 238--253
D. F. Ross and R. H. Davis Comparative study of performance of concurrency control algorithms in a centralized database . . . . . . . . . . 3--16 L. L. Miller and A. R. Hurson and J. K. Huang and S. H. Pakzad Comparing database processor configurations in the database machine ASLM . . . . . . . . . . . . . . . . . . 17--24 Bruno Ciciani and Daniel M. Dias and Philip S. Yu Dynamic and static load sharing in hybrid distributed-centralized database systems . . . . . . . . . . . . . . . . 25--41 S. Srinivas and A. Basu and K. G. Kumar and A. Paulraj and L. M. Patnaik Pipelined ring algorithm for matrix multiplication on transputer networks. Performance analysis and estimation . . 42--51 Yann-Hang Lee and Philip S. Yu Adaptive access path selection for relational database systems . . . . . . 52--61
Anonymous Editorial . . . . . . . . . . . . . . . 67 H. Lam and S. Y. W. Su and V. Ruhela and S. Pant and S. M. Ju and M. Sharma and N. Prasad GTOOLS: an active GUI toolset for an object-oriented KBMS . . . . . . . . . . 69--85 Jean-Christophe Burneau and Odile Thiery Classifying evolving objects in object-oriented knowledge bases . . . . 86--90 James G. Mullen FBASE: a federated objectbase system . . 91--99 Amelia Choi and W. S. Luk Using an object-oriented database system to construct a spatial database kernel for GIS applications . . . . . . . . . . 100--121 P. L. Tan and T. S. Dillon Incorporating semantics, relationships and exceptions into object oriented data models . . . . . . . . . . . . . . . . . 122--135 Sherman R. Alpert and Mary Beth Rosson ParCE: an object-oriented approach to context-free parsing . . . . . . . . . . 136--144
C. P. Ravikumar Parallel $r$-dimensional placement on a vector minisupercomputer . . . . . . . . 147--151 Walter B. Ligon III and Aditya P. Mathur Parallel parsing on a transputer network 152--159 J. H. Kim and S. M. Reddy Easily testable and reconfigurable two-dimensional systolic arrays . . . . 160--169 Reda A. Ammar and Matthew J. Krzych Computer aided performance engineering. A survey . . . . . . . . . . . . . . . . 170--189 Constantine Katsinis Performance modelling of message-based multiprocessors under heavy traffic . . 190--198 Jie Wu and Eduardo B. Fernandez Comparison connection assignments for diagnosis of multiprocessor systems under a two-fault assumption . . . . . . 199--201 Ahmed Kamel and Ahmed Nazif and Ossama El-Dessouki and Nabil Kamel MCFS: a multiple criteria reasoning fuzzy expert systems building tool . . . 202--208
Jenshiuh Liu and Chi-Ming Chiang and Herman D. Hughes Performance analysis of load-sharing for multiprocessor systems . . . . . . . . . 210 Adam Kapralski Algorithms for processing NP-complete and isomorphic complete problems . . . . 218 Xian-He Sun and Nabil N. Kamel Augmenting multikey searching structure for general database queries . . . . . . 229 Theodore K. Apostolopoulos Performance of read-only transactions in a distributed system . . . . . . . . . . 236 A. Dubey and M. Zubair and C. E. Grosch Real Fourier transforms on a massively parallel machine . . . . . . . . . . . . 243 D. Chennapragada and P. Looges and S. Olariu Single row routing with indifference graphs on the Distributed Array Processor . . . . . . . . . . . . . . . 249 Ramesh Dutt Javagal and Ajoy Kumar Datta and Sukumar Ghosh An algorithm for resource deadlock detection in distributed systems . . . . 257
M. Colajanni and S. Tucci Equivalence relation between Fork-Join systems and $N$-stage queueing networks 3--12 Rudy Lauwereins and Jean Peperstraete Queueing theoretical analysis of processor utilization in parallel computers . . . . . . . . . . . . . . . 13--23 Andreas Stafylopatis Performance of parallel computations of triangular structure . . . . . . . . . . 24--32 Chyan Yang Multigauge computers and their applications . . . . . . . . . . . . . . 33--39 Avraham Leff and Philip S. Yu and Joel L. Wolf Performance issues in object replication for a remote caching architecture . . . 40--51 Namhyung Kim and Vinod K. Agarwal Concurrent error detection schemes for the match function . . . . . . . . . . . 52--56 A. E. Kamal Modelling multibus interconnection networks using state aggregation . . . . 57--63
Lorrie L. Hoffman Improved performance evaluation of distributed mutual exclusion algorithms for computer networks . . . . . . . . . 67--71 A. B. Romanovsky and I. V. Shturtz Unplanned recovery for non-program objects . . . . . . . . . . . . . . . . 72--79 N. C. Audsley and A. Burns and M. F. Richardson and A. J. Wellings Incorporating unbounded algorithms into predictable real-time systems . . . . . 80--89 Bin Qin and Reda A. Ammar Analytic approach to deriving time costs of parallel computations . . . . . . . . 90--100 Willi Gunter Design and implementation of the Attempto fault-tolerant system . . . . . 101--108 Chen Ping and Cai Xiyao and Jin Yimin XDRC++: a reflective architecture in the C++ language . . . . . . . . . . . . . . 109--120 Tzong-Chen Wu and Yi-Shiung Yeh Cryptosystem for selectively broadcasting separate secrets . . . . . 121--124
Elizabeth Chang and T. S. Dillon Two phase methodology for the design of the human computer interface . . . . . . 131--143 Ling Chen Systematic design of systolic arrays from affine recurrence techniques . . . 144--153 Alexander Thomasian and Behzad Nadji State representation tradeoffs in Markov chains of serialization delays in computer systems . . . . . . . . . . . . 154--165 P. M. Miller and A. R. Hurson and R. H. Hettmansperger Modular scheme for designing associative memories . . . . . . . . . . . . . . . . 166--181
Jing-Long Wang and Meng-Hong Shie and Liang-Teh Lee Asymmetrically-initiated load balancing policy for distributed systems . . . . . 187--194 C. Ho and S. A. Mabbs and K. E. Forward Performance modeling of the MR-1 multiprocessor using extended deterministic and stochastic Petri nets 195--209 H. T. Liaw and S. J. Wang and C. L. Lei Secure dynamic user hierarchy scheme based on the knapsack problem . . . . . 210--216 Sumit Sur and Pradip K. Srimani Self-diagnosability properties of hypercubes and star graphs and diagnosis algorithms . . . . . . . . . . . . . . . 217--223 Jie Wu and Eduardo B. Fernandez Fault-tolerant distributed broadcast algorithm for cube-connected cycles . . 224--233 Andrea Bondavalli and Felicita Di Giandomenico and Jie Xu Cost-effective and flexible scheme for software fault tolerance . . . . . . . . 234--244 Chhping Wang and Victor O. K. Li and Arbee L. P. Chen One-shot semi-join execution strategies for processing distributed join queries 245--253
Yoshiro Tohma Review of fault-tolerant computing for safely critical applications in Japan 3--10 Hongying Wang and Douglas M. Blough and Leon Alkalaj Practical approach to comparison-based fault diagnosis in multiprocessor systems . . . . . . . . . . . . . . . . 11--20 Her-Kun Chang and Shyan-Ming Yuan Efficient algorithm for evaluating the availability of multidimensional voting 21--24 Yoshiro Tohma and Yukichi Matsunaga Application of hyper-geometric distribution model to the hardware debugging process . . . . . . . . . . . 25--30 H. Ito WSI network design and its evaluation using yields . . . . . . . . . . . . . . 31--37 Yukiya Miura and Jung Li and Wang Li and Naito Sachio Four-valued logic system and its application to describing the specification and design verification of combinational circuits . . . . . . . . . 38--45 Takashi Nanya Anti-code-disjoint mapping for exception handling in self-checking systems hierarchy . . . . . . . . . . . . . . . 46--53 Tomohiro Yoneda and Toru Egashira and Yoshihiro Tohma Improving a fault-tolerant clock synchronization algorithm by overcorrection . . . . . . . . . . . . . 54--64 Carlson Ho and Kevin E. Forward Verification and validation of hardware designs via hardware Petri nets . . . . 65--72
K. H. Kim and L. F. Bacellar and J. Goldberg and K. Masui and K. Mori and R. Yoshizawa Modular implementation model for real-time fault-tolerant LAN systems based on the DRB scheme with a configuration supervisor . . . . . . . . 75--82 Shinji Kusumoto and Ken-ichi Matsumoto and Tohru Kikuno and Kazuhiro Tanaka Improvement of the software development process by using fault tolerant techniques . . . . . . . . . . . . . . . 83--88 Oliver Theel Meeting the application's needs: a design study of a highly customized replication scheme and its implementation . . . . . . . . . . . . . 89--97 Henning Koch Embedding protocols for scalable replication management . . . . . . . . . 98--103 Tom Downs Modelling software testing for reliability prediction . . . . . . . . . 104--111 Hiromi Hiraishi and Tatsuya Nakae Efficient inverse image computation algorithm for sequential machine verification using temporal logics . . . 112--117 Elizabeth Chang and Tharam S. Dillon Achieving software reliability and fault tolerance using the object oriented paradigm . . . . . . . . . . . . . . . . 118--121 Kent C. Clapp and Ravishankar K. Iyer Large system test data analysis . . . . 122--133 Òystein Torbjòrnsen and Svein-Olaf Hvasshovd Application of an abstract machine supporting fault-tolerance in a parallel database server . . . . . . . . . . . . 134--141 Jörgen Christmansson and Zbigniew Kalbarczyk and Jan Torin Dependable Flight Control System Using Data Diversity with Error Recovery . . . 142--150
A. Pombortsis and A. Menos Modelling a class of resource sharing interconnection networks using timed Petri nets . . . . . . . . . . . . . . . 155--163 Chiun-Chieh Hsu On the allocation of processors to tasks with precedence constraints and communication overhead . . . . . . . . . 164--174 D. Bhagavathi and W. M. Denny and C. E. Grosch and P. J. Looges and S. Olariu Sorting and merging on the DAP . . . . . 175--183 Constantine Katsinis and Amelie Constant Effect of queue selection and service time distributions in multiple resource allocation . . . . . . . . . . . . . . . 184--194 L. L. Miller and J. Leszczylowski and S. K. Gadia and P. Chan Storage model for processing semantic exceptions . . . . . . . . . . . . . . . 195--204
Constantinos V. Papadopoulos Provably optimal routing algorithms for signal routing . . . . . . . . . . . . . 211--219 Rasiah Loganantharaj and Ay-Hwa A. Liou Recent results on parallel link resolution . . . . . . . . . . . . . . . 220--233 Alexander B. Romanovsky Recovery unification for concurrent heterogeneous systems . . . . . . . . . 234--239 Patrick M. Lenders and Heiko Schroder Minimizing data flow in mathematical morphology architectures . . . . . . . . 240--245 David Finkel and Xiannong Meng and Sanjay Parikh Load sharing that supports fault tolerance in a distributed computing system . . . . . . . . . . . . . . . . . 246--254 Giuseppina C. Gini and C. Rogialli CONSTRICTOR: a constraint-based language 255--261
Kian-Lee Tan and Hongjun Lu Skew handling strategies for pipelined processing of multi-join queries in shared-nothing systems . . . . . . . . . 3--18 Ravi Mittal and Deepak Cherian Self-routing double tree (DOT) network, its permutation capability and applications . . . . . . . . . . . . . . 19--27 Wei Wei Constructing reliable neural network systems using less reliable neuron network components . . . . . . . . . . . 28--32 M. Ghose and M. Zubair and C. E. Grosch Parallel partitioning of sparse matrices 33--40 Son T. Vuong and George K. Tsiknis Significant event temporal logic: a method for protocol specification and verification . . . . . . . . . . . . . . 41--49 Mikal Ziane and Mohamed Zait and Hong Hoang Quang Parallelism and query optimization . . . 50--56 Hsiou-Mien Lien and Shyan-Ming Yuan SGHC: a new class of optimally fault-tolerant networks . . . . . . . . 57--64
Jonathan Jen-Rong Chen and Henry Ker-Chang Chang Secure information broadcasting scheme using embedded locks . . . . . . . . . . 67--74 Ajoy Kumar Datta and Oscar R. Aguilar and Mitchell Flatebo and Sukumar Ghosh Simulating shared memory primitives in asynchronous message passing systems . . 75--83 A. Kuchlos and C. P. Ravikumar Two-way partitioning of shuffle-exchange and DeBruijn graphs . . . . . . . . . . 84--92 Tzong-Chen Wu and Tzong-Sun Wu and Wei-Hua He Dynamic access control scheme based on the Chinese remainder theorem . . . . . 92--99 B. Pradeep and C. Siva Ram Murthy Sorting on mesh-connected computers with multiple broadcasting using $ N^{2 / 3} \times N^{2 / 3} $ processors . . . . . 100--110 Yen-Wen Lin and Shyan-Ming Yuan and Deron Liang Design and implementation of Moony: a fault tolerant distributed shared memory system . . . . . . . . . . . . . . . . . 111--119 Cui-Qing Yang and Yaoshuang Qu Reliability analysis for the execution of remote jobs in a workstation-based environment . . . . . . . . . . . . . . 120--128
S. Olariu and J. L. Schwing and J. Zhang Fast adaptive convex hull algorithm on two-dimensional processor arrays with a reconfigurable bus system . . . . . . . 131--137 C. P. Ravikumar Parallel $r$-dimensional placement on a vector minisupercomputer . . . . . . . . 138--143 L. Lilien and S. M. Shatz and S. Damerla Redistribution of hierarchically structured software in response to distributed system site crashes . . . . 144--155 C. C. Jong and G. N. Toh and L. S. Ng Automatic generation of customized functional models for rapid implementation of digital integrated circuits . . . . . . . . . . . . . . . . 156--163 M. Mohsin and B. Gupta Fault-tolerance in pyramid tree network architecture . . . . . . . . . . . . . . 164--172 D. Saha Improved topology for achieving reliability in high-speed tree LANs . . 173--178 Ch.-zong Lin and Ch.-Ch. Tseng and Kw.-H. Chi Design of an efficient data-driven pipelined computer architecture . . . . 179--186 K.-L. Chung and Yu-W. Chen Fault-tolerant embedding multiple complete binary trees into hypercubes 187--191
Mike P. Papazoglou and Alex Denis and Bernd J. Krämer Use of middleware facilities in interoperable databases . . . . . . . . 195--206 Tao Wang and Wuxu Peng Improving Internet routing information protocol . . . . . . . . . . . . . . . . 207--213 Suresh K. Damodaran-Kamal and Niki Pissinou Shared access and communication in distributed databases using an object environment . . . . . . . . . . . . . . 214--222 Dinesh Kadamuddi and Jeffrey J. P. Tsai MDDT constructs for incorporating early-receives in distributed computing 223--233 W. Melody Moh and Yu-Jen Chien and Teng-Sheng Moh and Charles U. Martel Prioritized conflict resolution on multiple access broadcast networks: algorithms and performance . . . . . . . 234--243 W. A. Woods and H. D. Moser and O. Frieder and Paul B. Kantor Simulation evaluation of task scheduling on reconfigurable multicomputer architectures . . . . . . . . . . . . . 244--254
Javier Cordova and Yann-Hang Lee Multicast trees to provide message ordering in mesh networks . . . . . . . 3--13 R. Lai and A. Jirachiefpattana Verifying Estelle protocol specifications using numerical Petri nets . . . . . . . . . . . . . . . . . . 15--33 Niki Pissinou and Kanonkluk Vanapipat Active database rules in distributed database systems: a dynamic approach to solving structural and semantic conflicts in distributed database systems . . . . . . . . . . . . . . . . 35--44 D. Manivannan and M. Singhal Decentralized token generation scheme for token-based mutual exclusion algorithms . . . . . . . . . . . . . . . 45--54 Shyan-Ming Yuan and Jeng-Dar Wu and Dong-Lieng Wang SHDS --- an X-Window based semi-hypermedia document system . . . . 55--64
Sadiq M. Sait and Khaled M. Elleithy and Masud-ul Hasan Formal synthesis of VLSI layouts from algorithmic specifications . . . . . . . 67--81 Tomislav Lovric Detecting hardware faults with systematic and design diversity: Experimental results . . . . . . . . . . 83--92 S. K. Dash and B. Jha Global numerical weather model integrated on a transputer-based parallel computer . . . . . . . . . . . 93--98 Yahui Zhu Fast processor allocation and dynamic scheduling for mesh multiprocessors . . 99--107 A. B. Romanovsky and I. V. Shturtz Dynamic conversions . . . . . . . . . . 109--116 Jiann-Fu Linn and Sao-Jie Chen Analysis of multiprocessor task scheduling . . . . . . . . . . . . . . . 117--120
D. M. Johnson Integrated modular avionics: a scheme for autonomous dynamic system reconfiguration . . . . . . . . . . . . 125--133 Marwan Krunz and Ron Sass and Herman Hughes Study of VBR MPEG-coded video traffic and associated multiplexing performance 135--143 Shahram Latifi and Nader Bagherzadeh On clustered-star graph and its properties . . . . . . . . . . . . . . . 145--149 Xiaohua Jia and Kentaro Shimizu and Mamoru Maekawa Atomic accesses to replicated files in reliable distributed file systems . . . 151--158 Mark J. Clement and Michael J. Quinn Architectural scaling and analytical performance prediction . . . . . . . . . 159--167 Constantine Katsinis and Pat Hogan Concurrent multitasking applications on a shared-bus multicomputer system . . . 169--176 Allan K. Y. Wong and Daniel S. Yeung RHS --- a framework for exploiting distributed parallelism efficiently . . 177--184
Zahira S. Khan and Eugene Kwatny Performance comparison of interprocessor communication schemes for a hashing technique on the Connection Machine . . 189--194 Naphtali Rishie and Artyom Shaposhnikov and Scott Graham Load balancing in a massively parallel semantic database . . . . . . . . . . . 195--199 A. V. Shafarenko RETRAN: a recurrent paradigm for data-parallel computing . . . . . . . . 201--209 M. Dal Cin and H. Hessenauer and W. Hohl The Modular Expandable Multiprocessor System, MEMSY . . . . . . . . . . . . . 211--219 Nader Bagherzadeh and Martin Dowd Problems on routing bounded distance assignments in hypercubes . . . . . . . 221--226 Sam Lor and Hong Shen and Piyush Maheshwari Divide-and-conquer minimal-cut bisectioning of task graphs . . . . . . 227--234 Sampalli Srinivas and Nripendra N. Biswas Fast algorithm for data exchange in reconfigurable tree structures . . . . . 235--243 Gibor Nemeth Scheduling, timing and intractability in massively parallel systems . . . . . . . 245--254
Habib Youssef and Sadiq M. Sait and A. S. Al-Mulhelm and M. S. T. Benten High-level synthesis from purely behavioral descriptions . . . . . . . . 259--273 Matti A. Hiltunen and Richard D. Schlichting Adaptive distributed and fault-tolerant systems . . . . . . . . . . . . . . . . 275--285 Hamid R. Sharif and Hamid Vakilzadian and Sreekanth Nagisetty Design and analysis of a serial link interconnection network architecture . . 287--299 I. Majzik and W. Hohl and A. Pataricza and V. Sieh Multiprocessor checking using watchdog processors . . . . . . . . . . . . . . . 301--310 Tzonelih Hwang and Narn-Yih Lee and Chuan-Ming Li and Chin-Chen Chang On the security of Chang and Wu's broadcasting cryptosystem for computer networks . . . . . . . . . . . . . . . . 311--314 Jiann-Fu Lin and Sao-Jie Chen Comment on `Broadcasting cryptosystem in computer networks using interpolating polynomials' . . . . . . . . . . . . . . 315--317
Erol Gelenbe and Xiaowen Mang and Yutao Feng Diffusion cell loss estimate for ATM with multiclass bursty traffic . . . . . 325--333 Shuo-Yen Robert Li and Chu Man Lau Concentrators in ATM switching . . . . . 335--342 Shih T. Liang and Maria C. Yuang Departure process analysis for earliest-due-date scheduling discipline in ATM switches . . . . . . . . . . . . 343--352 Zigmantas Budrikis and Steven Van Luinen and Antonio Cantoni and Vaughan Wittorff Performance evaluation of controlled cell transfer service in ATM LAN . . . . 353--360 Hongyi Zhang and Oliver W. Yang and H. Mouftah Adaptive rate-based congestion control in ATM switching networks . . . . . . . 361--367 W. Liu and Erik Dirkx Parallel simulation of ATM switches . . 369--381 Philip W. Tse and Moshe Zuckerman and François Le Faucheur Performance and fairness issues related to the EFCI rate-based flow control for the ABR service in ATM networks . . . . 383--392 Bart Steyaert and Herwig Bruneel Delay performance of CBR traffic in an ATM multiplexer with high-priority background traffic . . . . . . . . . . . 393--399
Andrzej Krasniewski Coverage of delay faults: single number can be very misleading . . . . . . . . . 3--12 Yuh-Dauh Lyuu and Eugen Schenfeld New algorithms for matrix operations with applications to a reconfigurable parallel architecture . . . . . . . . . 13--24 Kian-Lee Tan Decoupling load-balancing and optimization issues: a two-phase query processing framework for shared-nothing systems . . . . . . . . . . . . . . . . 25--36 Jonathan J-R Chen and Ping-Tai Sun New ID-based cryptosystem based on number theory . . . . . . . . . . . . . 37--41 Shyan-Ming Yuan and Yu-Kwen Hsu Design and implementation of a distributed monitor facility . . . . . . 43--51 Chiun-Chieh Hsu and Chien-Min Wang and Jeen-Fong Lin Efficient loop allocation based on the analysis of processor requirement of loops with equivalent completion times 53--60
Hussein Mouftah and Mohammed Atiquzzaman Special Issue: ATM Networks . . . . . . ?? Sanjeev Kumar and Dharma P. Agrawal The shared-buffer direct-access (SBDA) ATM switch architecture for broadband networks . . . . . . . . . . . . . . . . 69--79 Simon Fong and Samar Singh and Mohammed Atiquzzaman Analytical model and performance analysis of shared buffer ATM switches under non-uniform traffic . . . . . . . 81--93 Yanhe Fan and Nicolas Georganas Performance analysis of ATM switches with self-similar input traffic . . . . 95--102 Yijun Xiong and Lorne Mason Performance of multistage ATM switching networks with multicast capability . . . 103--115 Latha Kant and William H. Sanders Analysis of the distribution of consecutive cell losses in an ATM switch using stochastic activity networks . . . 117--129 H. Jonathan Chao and Jun S. Hong Design of an ATM shaping multiplexer with guaranteed output burstiness . . . 131--141 Rose P. Tsang and David D. C. Hu Efficient interconnections for cascading multiple ATM switches . . . . . . . . . 143--157 Tony T. Lee and Philip P. To Non-blocking and self-routing properties of sort-Clos networks . . . . . . . . . 159--169
Wei-Kuo Chiang and Rong-Jaye Chen Block-switch networks: a cost-effective class of interconnection networks . . . 175--185 Vassilios V. Dimakopoulos and Nikitas J. Dimopoulos Broadcasting in hypercycles . . . . . . 187--192 Xiaohua Jia and Wilson Cheng Distributed operating systems vs. distributed system environments . . . . 193--203 Stephan Olariu and James L. Schwing and Jingyuan Zhang and Albert Zomaya A time- and cost-optimal algorithm for channel assignment . . . . . . . . . . . 205--211 Amitabha Sinha and Arunava Sinha and Subrata Choudhury New approach for splitting a class of real-time algorithms for pipelined processing . . . . . . . . . . . . . . . 213--220 Jamel M. Tahir and Satnam S. Dlay and Raouf N. Gorgui-Naguib and Oliver R. Hinton Concurrent error detection in fast Fermat number transform networks . . . . 221--226
Paul P. Ignatius and C. Siva Ram Murthy On task allocation in heterogeneous distributed computing systems . . . . . 231--238 Tzong-Chen Wu and Bor-Ron Hwang On the design of a secure anonymous conference key distribution system . . . 239--244 Bernd Bieker and Geert Deconinck and Erik Maehle and Johan Vounckx Fault-tolerant routing, reconfiguration and backward error recovery for parallel systems . . . . . . . . . . . . . . . . 245--253 Hu-Jun Wang Analysis of prioritized cluster-based crossbar systems . . . . . . . . . . . . 255--261 Kian-Lee Tan and Jeffrey X. Yu Framework for scheduling partition-based joins . . . . . . . . . . . . . . . . . 263--273 C. J. Semple and V. Lakshmi Narasimhan Design and implementation of a distributed system utilising task farming on IBM PC compatible computers and a Novell network . . . . . . . . . . 275--283
M. Bozyigit and M. Melhi Load balancing framework for distributed systems . . . . . . . . . . . . . . . . 287--293 Ajoy Kumar Datta and Mitchell Flatebo and Visalakshi Thiagarajan Simulation of self-stabilizing algorithms . . . . . . . . . . . . . . . 295--306 D. J. V. Evans and A. M. Goscinski Automatic identification of parallel units and synchronization points in programs for parallel execution on a distributed system . . . . . . . . . . . 307--315 Avigdor Gal and Opher Etzion Parallel execution model for updating temporal databases . . . . . . . . . . . 317--327 Alexander Thomasian Approximate analyses for fork/join synchronization in RAID5 . . . . . . . . 329--337
Anonymous Index to Volume 12, 1997 . . . . . . . . ?? Shyan-Ming Yuan and Ashok K. Agrawala An efficient communication structure for decentralized algorithms with fault tolerance . . . . . . . . . . . . . . . 343--349 T. Srikanthan and K. Y. Chan and S. K. Leong Two-layer dynamic load balancing for a transputer-based vehicle simulator . . . 351--358 Erik Demaine and Sampalli Srinivas Routing algorithms on static interconnection networks: a classification scheme . . . . . . . . . 359--367 Peter K. K. Loh and Hsu Wen Jing Dynamic load balancing on multiprocessor networks . . . . . . . . . . . . . . . . 369--372 Fillia Makedon and Antonis Symvonis Heuristic methods for permutation routing on meshes and tori . . . . . . . 373--380 J. You and W. P. Zhu and E. Pissaloux Parallel image matching on a distributed system . . . . . . . . . . . . . . . . . 381--385 Hui-Tang Lin and Herman D. Hughes Performance evaluation of priority buffer management in ATM switches . . . 387--393
Albert Y. Zomaya Special Issue: Simulation in parallel and distributed computing environments ?? Michael Jurczyk and Thomas Schwederski and Howard Jay Siegel and Seth Abraham and Richard Martin Born Strategies for the implementation of interconnection network simulators on parallel computers . . . . . . . . . . . 5--16 Henk L. Muller and Sanjay Raina and Paul W. A. Stallard and David H. D. Warren Parallel calibrated emulation as a technique for evaluating parallel architectures . . . . . . . . . . . . . 17--25 Celso Hirata and Jeff Kramer A novel modelling approach for parallel simulation . . . . . . . . . . . . . . . 27--37 Mostafa Bassiouni and Ming-Hsing Chiu and Margaret Loper and Michael Garnsey Relevance filtering for distributed interactive simulation . . . . . . . . . 39--47 Gary A. Bundell Modelling of distributed systems with timed event graphs . . . . . . . . . . . 49--54 Narsingh Deo and Muralidhar Medidi and Sushil K. Prasad Load balancing in parallel battlefield management simulation on local- and shared-memory architectures . . . . . . 55--65 Ka-Cheong Leung and Mounir Hamdi Performance assessment of network protocols and parallel programming tools for distributed computing systems . . . 67--80
C. Black and S. M. Shatz and S. Tu A query language for automated general analysis of Concurrent Ada programs . . 83--95 Yu-Wei Chen and Kuo-Liang Chung On fault-tolerant embedding complete binary trees into hypercubes . . . . . . 97--100 Reinhard Posch Massive parallelism on a chip: VLSI aspects involving dynamic logic . . . . 101--107 Shin-Jia Hwang and Chien-Yuang Chen and Chin-Chen Chang An encryption/multisignature scheme with specified receiving groups . . . . . . . 109--112 Keqin Li Efficient reliability prediction for $N$-version software systems with multiple stages . . . . . . . . . . . . 113--120 Chin-Chen Chang and Tzong-Chen Wu and Yi-Shiung Yeh Broadcasting secrets in communication networks . . . . . . . . . . . . . . . . 121--124 Kuo-Liang Chung and Yu-Wei Chen Fast pipelined prefix computations on MIMD hypercubes . . . . . . . . . . . . 125--130 Carsta Petersohn and Cornelis Huizing and Jan Peleska and Willem-Paul de Roever Formal semantics for Ward and Mellor's transformation schemas and its application to fault tolerant systems 131--136
Phillip C.-Y. Sheu and K. H. Kim Special Issue: Real-Time Object-Oriented Systems . . . . . . . . . . . . . . . . ?? Dieter K. Hammer and Andrew A. Hanish and Tharam S. Dillon Modeling behavior and dependability of object-oriented real-time systems . . . 139--150 Martin Gergeleit and Michael Mock and Edgar Nett T-CORBA: Making object-oriented systems time-aware . . . . . . . . . . . . . . . 151--160 L. Motus and T. Naks Formal timing analysis of OMT designs using LIMITS . . . . . . . . . . . . . . 161--170 Jung-Guk Kim and Jin Pyo Hong and Byoung-Joon Min and Moon Hae Kim Modeling of multimedia services using the TMO model . . . . . . . . . . . . . 171--178 Katsuya Tanaka and Hiroaki Higaki and Makoto Takizawa Object-based checkpoints in distributed systems . . . . . . . . . . . . . . . . 179--185
George A. Papadopoulos A multimedia programming model based on timed concurrent constraint programming 195--205 Andrea Baiocchi and Nicola Blefari-Melazzi and Francesca Cuomo Dimensioning criteria of traffic contract parameters and connection admission control rules in an ATM user-network interface . . . . . . . . . 207--217 Lily Cheng and Herman Hughes Integrating call admission and cell scheduling . . . . . . . . . . . . . . . 219--226 Cheng-Huang Yen and L. L. Miller and A. Sirjani and J. Tenner Extending the object-relational interface to support an extensible view system for multidatabase integration and interoperation . . . . . . . . . . . . . 227--240 Gopal Sharma and Bidyut Gupta Parallel scheduler for a shared memory (tightly-coupled) multiprocessor system 241--247 Sibelius Lellis Vieira and Mauricio Ferreira Magalhães Online sporadic task scheduling in hard real-time systems . . . . . . . . . . . 249--258
Roberto Baldoni and Ravi Prakash and Michel Raynal and Mukesh Singhal Efficient $ \Delta $-causal broadcasting 263--269 Roberto Beraldi and Paolo Giacomazzi and Riccardo Melen Efficient topologies for ATM switching fabrics with shortest path and deflection routing . . . . . . . . . . . 271--281 C. P. Ravikumar and S. Chakraverty VLSI implementation of a strongly fault secure ALU . . . . . . . . . . . . . . . 283--288 Daniel S. Yeung and Allan K. Y. Wong OORHS: a conceptual framework that provides easy and reversible distributed programming . . . . . . . . . . . . . . 289--301 Mehran Dowlatshahi and S. K. De Performance analysis of ATM switches fed with periodic and correlated traffic . . 303--310 Daniel S. Yeung and A. K. Y. Wong An evaluation identifying features of unified distributed programming . . . . 311--321
Anonymous Index to Volume 13, 1998 . . . . . . . . ?? D. R. Avresky and S. J. Geoghegan and P. K. Tapadiya A software-based fault-injection tool (SOFIT) . . . . . . . . . . . . . . . . 327--337 Andrea Bobbio and Miklos Telek Non-exponential stochastic Petri nets: an overview of methods and techniques 339--351 Der-Chyuan Lou and Chin-Chen Chang A fast modular multiplication method . . 353--358 N. N. Raju and Ravi Mittal Performance comparison of multicasting schemes for ATM switches under heterogeneous traffic . . . . . . . . . 359--368 Alexander B. Romanovsky Predictable toleration of design faults: Recovery blocks in real time systems . . 369--377 A. A. Andijani Buffer management of a switch for ATM networks: a multi-objective approach . . 379--386
Sadiq M. Sait and Habib Youssef and Khalid Nassar and Muhammad S. T. Benten Timing driven genetic placement . . . . 3--14 Jin Chin Wang and Jacqueline Chame and Michel Dubois Modeling finite cache effects in write-invalidate snooping protocols . . 15--25 Xiannong Meng Distributed simulations: Issues and implementations in a cluster of workstations environment . . . . . . . . 27--37 George A. Papadopoulos Object-oriented term graph rewriting . . 39--50 S. Jayaprakash and C. R. Muthukrishnan Permission-based fault-tolerant distributed mutual exclusion algorithm 51--60
Letizia Tanca and Dan Suciu Special issue: Semantics on the World Wide Web . . . . . . . . . . . . . . . . ?? Danius Michaelides and Luc Moreau and David De Roure Editorial: Uniform approach to programming the World Wide Web . . . . . 69--81 Laura Bright and Jean-Robert Gruser and Louiqa Raschid and Maria Esther Vidal A wrapper generation toolkit to specify and construct wrappers for Web accessible data sources (WebSources) . . 83--97 Ling Liu and Calton Pu and Wei Tang and Wei Han CONQUER: a continual query system for update monitoring in the WWW . . . . . . 99--112 Myra Spiliopoulou The laborious way from data mining to Web log mining . . . . . . . . . . . . . 113--125
Keqin Li An analytical model for approximating performance of partitionable multiprocessor systems . . . . . . . . . 131--145 Meng Chang Chen and Jan-Ming Ho and Ming-Tat Ko and Shie-Yuan Wang A SCSI disk model for multimedia storage systems . . . . . . . . . . . . . . . . 147--154 Marleen Adé and Rudy Lauwereins and J. A. Peperstraete Buffer memory requirements in DSP applications . . . . . . . . . . . . . . 155--165 D. R. Avresky and K. M. Altawil Embedding general spanning trees in faulty hypercubes . . . . . . . . . . . 167--174 Habib Youssef and Sadiq M. Sait Timing-driven global routing for standard-cell VLSI design . . . . . . . 175--185
Dieter K. Hammer and Tohru Kikuno and Insup Lee Special issue: Object-Oriented Real-Time Distributed Computing . . . . . . . . . ?? Alexander Romanovsky and Jie Xu and Brian Randell Editorial: Coordination exception handling in real-time distributed object systems . . . . . . . . . . . . . . . . 197--207 Andreas Polze and Miroslaw Malek Responsive services with CORBA . . . . . 209--216 Reino Kurki-Suonio and Mika Katara Logical layers in specifications with distributed objects and real time . . . 217--226 Michael Squadrito and Levon Esibov and Lisa Cingiser DiPippo and Victor Fay Wolfe and Gregory Cooper and Bhavani Thurasingham and Peter Krupp and Michel Milligan and Russell Johnston and Ramachandra Bethmangalkar The affected set priority ceiling protocols for real-time object-oriented concurrency control . . . . . . . . . . 227--239 K. H. (Kane) Kim and Chittur Subbaraman Architectural principles for realizing timeliness-guaranteed operating system kernels . . . . . . . . . . . . . . . . 241--249 John A. Stankovic and Sang H. Son An architecture and object model for distributed object-oriented real-time databases . . . . . . . . . . . . . . . 251--259
C.-C. Hsu and S.-S. Lin Path establishment of permutations in a rearrangeable interconnection network 267 A. Arulambalam and X. Chen and N. Ansari Impact of per-VC and single FIFO queuing on ABR congestion control . . . . . . . 275 M. D. Feng and C. K. Y. Chen Parallel Lisp with speculation and subtuplespace on distributed systems . . 283 H. A. Xie and K. E. Forward and K. M. Adams A programmable database coprocessor in a PSQL system . . . . . . . . . . . . . . 299 C.-C. Hsu Embedability and recovery of a bubblesort star graph interconnection network . . . . . . . . . . . . . . . . 307 L. Shi and O. De Vel and J. Cao A hierarchical and distributed monitoring system in interprocess communications . . . . . . . . . . . . . 317
E. A. Rundensteiner and H. A. Kuno and Y. Zhou Experimental evaluation of the SMX strategy for incremental materialized path view maintenance . . . . . . . . . 331 A. J. H. Simons and M. Snoeck and K. S. Y. Hung Using design patterns to reveal the competence of object-oriented methods in system-level design . . . . . . . . . . 343 T. Vianna de Araujo Object-oriented hierarchies and their resulting complex systems . . . . . . . 353 M. Saksena and R. B. France and M. M. Larrondo-Petrie A characterization of aggregation . . . 363 M. L. Hines Ontology of object-oriented database evolution . . . . . . . . . . . . . . . 371 C. Ben Achour and C. Souveyet and M. Tawbi Bridging the gap between users and requirements engineering: the scenario-based approach . . . . . . . . 379 C. Souveyet and R. Deneckere Overview of the TOOBIS project: from a temporal extension of ODMG to a patterns-based approach extending the OO model . . . . . . . . . . . . . . . . . 389
R. Jiménez-Peris and M. Patiño Martínez and S. Arévalo and F. J. Ballesteros TransLib: an Ada 95 object oriented framework for building transactional applications . . . . . . . . . . . . . . 7 T. Vardanega and J. Gaisler Lessons learned from the implementation of on-board tolerance to physical faults in Ada . . . . . . . . . . . . . . . . . 19 P. Rogers and A. J. Wellings An incremental recovery cache supporting software fault tolerance mechanisms . . 33 J. Miranda and A. Álvarez and F. Guerra and S. Arévalo Programming replicated systems in Drago 49 J. Napier and L. Chen and J. May and G. Hughes Fault simulation to validate fault-tolerance in Ada . . . . . . . . . 61
L. C. Hui A practical algorithm to find longest common substring in linear time . . . . 73 M. Raynal Non-blocking atomic commitment in distributed systems: a tutorial based on a generic protocol . . . . . . . . . . . 77 H. Ashihara and M. Matsumoto Application of finite projective space to replicated data management . . . . . 87 P. Buchholz Efficient computation of equivalent and reduced representations for stochastic automata . . . . . . . . . . . . . . . . 93 J. J.-R. Chen and Y. Liu An ID-based digital multisignatures scheme with time stamp technique . . . . 105 D.-C. Lou and C.-C. Chen An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation . . . . . . 111 J.-H. Park and H.-K. Lee and C.-S. Lee A fault tolerant multistage interconnection network and its fault tolerant diagnosis: the ring-banyan network . . . . . . . . . . . . . . . . 119 C.-M. Chung and Y.-H. Wang and T. K. Shih and H.-C. Keh and J.-F. Chen The complexity measurement of software through program decomposition . . . . . 127
M. Abid Prototyping environment for the design of hardware/software systems . . . . . . 137 A. Romanovsky The domino effect as a deadlock . . . . 147 P. S. Yu and K.-L. Wu and A. Dan A dynamic parity grouping for efficient parity buffering for RAID-5 disk arrays 155 T. Apostolopoulos A time dependent network fault management model in a TCP/IP environment 165 M. H. Karaata and K. A. Saleh A distributed self-stabilizing algorithm for finding maximum matching . . . . . . 175 T. Tsichiya and T. Kikuno Dependable evaluation of the weighted voting scheme in the presence of node and link failures . . . . . . . . . . . 181 C. Ersoy and A. Levi and O. Gumrah Artificial intelligence techniques for discrete link capacity assignment in prioritized multiservice networks . . . 191
S. Bataineh Response time analysis of repairable multiprocessor systems . . . . . . . . . 201 W.-B. Lee and C.-C. Chang User identification and key distribution maintaining anonymity for distributed computer networks . . . . . . . . . . . 211 J. Kim and T. Han and S. K. Lee VOQL: a Visual Object-oriented database Query Language for visualizing path expressions . . . . . . . . . . . . . . 215 S.-J. Yang Efficient algorithms for finding cores on weighted tree networks . . . . . . . 233 Y. Min and L. L. Miller and M. M. Owrang A calculus for handling time in complex objects . . . . . . . . . . . . . . . . 253
Wil van der Aalst and Stefan Jablonski Editorial . . . . . . . . . . . . . . . ?? W. M. P. van der Aalst and S. Jablonski Dealing with workflow change: identification of issues and solutions ?? P. Grefen and K. Aberer and Y. Hoffner and H. Ludwig CrossFlow: Cross-organizational workflow management in dynamic virtual enterprises . . . . . . . . . . . . . . ?? J. Desel and T. Erwin Hybrid specifications: looking at workflows from a run-time perspective ?? W. Deiters and T. Goesmann and T. Löffeler Flexibility in workflow management: dimensions and solutions . . . . . . . . ?? A. B. Raposo and L. P. Magalhães and I. L. M. Ricarte Petri nets based coordination mechanisms for multi-workflow environments . . . . ?? G. Joeris Modeling of flexible workflows and their decentralized enactment in flow.net . . ?? A. Lazcano and G. Alonso and H. Schuldt and C. Schuler The WISE approach to electronic commerce ?? S. Donatelli and M. Sarini and C. Simone Negotiating propagation of changes in inter-organizational workflows . . . . . ??
J.-L. Chu and R. K. Guha Triangular level quorums for distributed mutual exclusion . . . . . . . . . . . . ?? D. R. Avresky and C. Cunningham and H. Ravichandran Fault-tolerant routing for wormhole routed two-dimensional meshes . . . . . ?? T. P. Katsaros and C. Lazos A technique for determining queuing network simulation length based on desired accuracy . . . . . . . . . . . . ?? K. H. Jones and S. Olariu and L. F. Rowell and J. L. Schwing and A. Wilhite A database integrity monitor with applications to vehicular technology . . ??
S.-W. Kim and K.-Y. Whang New join processing using a multidimensional dynamic file organization . . . . . . . . . . . . . . ?? B. B. Kristensen Subjective behaviour . . . . . . . . . . ?? T.-C. Wu and C.-C. Chang Cryptographic key assignment scheme for hierarchical access control . . . . . . ?? J.-L. Wang and L.-T. Lee Effective bandwidth allocation for ATM networks . . . . . . . . . . . . . . . . ?? R. Baldoni and G. Cioffi and J.-M. Helary and M. Raynal Direct dependency-based determination of consistent global checkpoints . . . . . ?? I. De and B. Gupta Efficient fault tolerant multicasting in hybrid incomplete hypercube interconnection networks . . . . . . . . ??
E. D. Jensen The distributed real-time specification for Java: an initial proposal . . . . . ?? H. Kopetz and M. Holzmann and W. Elmenreich A universal smart transducer interface: TTP/A . . . . . . . . . . . . . . . . . ?? H. Fahmi and W. G. Aref and M. Latif and B. Shafiq and A. Ghafoor and P. Liu and L. Hsu Distributed Web-based framework for real-time multimedia object communication . . . . . . . . . . . . . ?? L. B. Becker and M. Gergeleit and E. Nett and C. E. Pereira An integrated environment for the complete development cycle of an object-oriented distributed real-time system . . . . . . . . . . . . . . . . . ?? R. Schantz and J. Zinky and J. Megquier and J. Loyall and D. Karr and D. Bakken An object leel gateway supporting quality of service . . . . . . . . . . . ?? K. H. (Kane) Kim and J. Liu and M-H Kim Deadline handling in real-time distributed objects: issues and basic approaches . . . . . . . . . . . . . . . ?? R. de Lemos and A. Romanovsky Exception handling in the software lifecycle . . . . . . . . . . . . . . . ?? A. Polze and J. Richling and J. Schwarz and M. Malek Towards predictable CORBA-based services ??
M. Pezz\`e and S. M. Shatz Editorial . . . . . . . . . . . . . . . ?? M. Young Neat models of messy problems: Notes on the interplay between solution- and problem-centered disciplines, and more particularly on the interaction between Petri net research and software engineering research . . . . . . . . . . ?? H. Giese and G. Wirtz The OCoN approach for object-oriented distributed software systems modeling ?? A. Burns and A. J. Wellings and F. Burns and A. M. Koelmans and M. Koutny and A. Romanovsky and A. Yakovlev Modelling and verification of an atomic action protocol implemented in Ada . . . ?? M. Ceska and V. Janousek and T. Vojnar Generating and using state spaces of object-oriented Petri nets . . . . . . . ??
D. Dutta and B. Gupta An efficient time-based checkpoint and recovery algorithm for distributed systems involving mobile computers . . . ?? B. Gupta and K. Ghosh and D. Dutta and A. Gupta Broadcasting in complete and incomplete star interconnection networks . . . . . ?? C. Liu and M. A. Orgun and K. Zhang A parallel execution model for Chronolog ?? A. K. Y. Wong and J. H. C. Wong A convergence algorithm for enhancing the performance of distributed applications running on sizeable networks . . . . . . . . . . . . . . . . ?? A. Romanovsky and A. Zorzo A distributed coordinated atomic action scheme . . . . . . . . . . . . . . . . . ?? A. Bondavalli and M. Nelli and L. Simoncini and G. Mongardi Hierarchical modelling of complex control systems: dependability analysis of a railway interlocking . . . . . . . ??
A. Bondavalli and M. Dal Cin and D. Latella and I. Majzik and A. Pataricza and G. Savoia Dependability analysis in the early phases of UML-based system design . . . ?? Y. Jiang and D. Taniar and C. H. C. Leung High performance distributed parallel query processing . . . . . . . . . . . . ?? Y.-M. Tseng and J.-K. Jan Generalized group-oriented cryptosystem with authenticated sender . . . . . . . ?? W. M. P. van der Aalst How to handle dynamic change and capture management information? An approach based on generic workflow models . . . . ?? S. Shigeta and K. Shimizu and M. Sowa Access route control by an extended key/lock scheme . . . . . . . . . . . . ??
T.-C. Wu Digital signature/multisignature schemes giving public key verification and message recovery simultaneously . . . . ?? K. Gunavathi and A. Shanmugam Comparative analysis of new multiple access protocols for bus LANs . . . . . ?? K.-L. Wu and P. S. Yu and J. Z. Teng Thrashing control and avoidance for concurrent mergesorts using parallel prefetching . . . . . . . . . . . . . . ?? W. J. Gutjahr A reliability model for nonhomogeneous redundant software versions with correlated failures . . . . . . . . . . ?? W.-S. Juang and C.-L. Lei and H.-T. Liaw Fair blind threshold signatures based on discrete logarithm . . . . . . . . . . . ?? Anonymous Book Review . . . . . . . . . . . . . . ?? Anonymous Index to Volume 16, 2001 . . . . . . . . ??
J-H Kim and S-W Kim and D-Y Kim and Y-Y You and W. Choi Soft real-time scheduling in a general purpose operating system: scheduling daemon approach . . . . . . . . . . . . ?? S-J Yang A distributed algorithm of efficient core discipline on weighted bipartite networks . . . . . . . . . . . . . . . . ?? D. Taniar and J. Wenny Rahayu Parallel group-by query processing in a cluster architecture . . . . . . . . . . ?? P. Chaudhuri An optimal distributed algorithm for finding a set of fundamental cycles in a graph . . . . . . . . . . . . . . . . . ?? K. H. (Kane) Kim and L. Bacellar The distributed real-time conversation scheme for time-bounded cooperative recovery . . . . . . . . . . . . . . . . ??
C. E. Pereira and R. Baldoni Editorial . . . . . . . . . . . . . . . ?? N. Selic The emerging real-time UML standard . . ?? K. H. (Kane) Kim and J. Q. Liu and H. Miyazaki and E. H. Shokri A CORBA service middleware enabling high-level high-precision real-time distributed object programming . . . . . ?? W. A. Halang and C. E. Pereira and A. H. Frigeri Safe object oriented programming of distributed real time systems in PEARL ?? R. Friedman and E. Hadad Client-side enhancements using portable interceptors . . . . . . . . . . . . . . ?? P. Narasimhan and L. E. Moser and P. M. Melliar-Smith Strongly consistent replication and recovery of fault-tolerant CORBA applications . . . . . . . . . . . . . . ?? C. O'Ryan and D. C. Schmidt and J. R. Noseworthy Patterns and performance of a CORBA event service for large-scale distributed interactive simulations . . ?? F. J. Torres-Rojas and M. Ahamad and M. Raynal Real-time based strong consistency for distributed objects . . . . . . . . . . ??
D. Taniar and J. Wenny Rahayu Parallel sort-merge object-oriented collection join algorithms . . . . . . . ?? A. Romanovsky On version state recovery and adjudication in class diversity . . . . ?? X. Xie and S. M. Shatz Development of class-level and instance-level design models for distributed-object software . . . . . . ?? H-T Lin and H. D. Hughes A hand-off scheme for wireless ATM networks . . . . . . . . . . . . . . . . ?? R. Friedman and E. Hadad Client-side enhancements using portable interceptors . . . . . . . . . . . . . . ?? W. Zhou and W. Jia A token-based independent update protocol for managing replicated objects ??
J-K Jan and Y-Y Chen A secure anonymous voting protocol with a complete supervision . . . . . . . . . ?? O. Sharon and A. Vainshtein and A. Likholat On the relation between the throughput gain with slot reuse and the number of address bits in the dual bus configuration. Part 1: Maximum throughput . . . . . . . . . . . . . . . ?? O. Sharon and A. Likholat On the relation between the throughput gain with slot reuse and the number of address bits in the dual bus configuration. Part 2: Linear and equal throughputs . . . . . . . . . . . . . . ?? N. S. V. Rao and N. Manickam General quickest paths and path-tables ?? A. R. Sharafat and M. S. Fallah A measure of resilience against denial of service attacks in computer networks ?? S-J Seok and S-H Lee and J. Park and C-H Kang Characteristics of assured service and an alternative RIO scheme in differentiated services networks . . . . ?? D-C Lou and T-L Yin and M-C Chang An efficient steganographic approach . . ?? K-L Wu and P. S. Yu Controlled replication for hash routing-based Web caching . . . . . . . ?? S-W Kim and H-S Won Bulk-loading of a multidimensional file: algorithm and its performance evaluation ?? Anonymous Book review . . . . . . . . . . . . . . ??
M. Ma and E. Gunawan Single-code and multi-code DS/CDMA MAC protocols for video/voice integration ?? D-H Kim and K. H. (Kane) Kim and S. Liu and J-H Kim A TMO-based approach to tolerance of transmission jitters in tele-audio services . . . . . . . . . . . . . . . . ?? D. Cotroneo and N. Mazzocca and L. Romano and S. Russo A fault tolerant access to legacy database systems using CORBA technology ?? J. Mbale and X. X. Fei and D. Ursino Acquisition of interoperability using intelligent binary schema matching technology . . . . . . . . . . . . . . . ?? Z. Ding and C. Jiang Temporal Petri nets model of concurrent systems . . . . . . . . . . . . . . . . ?? M. Raynal Token-based sequential consistency . . . ??
X-X Chen and M. Minami and H. Morikawa and T. Aoyama Service description model and toolkit for ubiquitous computing . . . . . . . . ?? A. Moga and M. Dubois Scalability implications of software-implemented coherence . . . . . ?? T. Newe and T. Coffey Formal verification logic for hybrid secutity protocols . . . . . . . . . . . ?? K. Komathy and P. Vivekanandan and V. Ramachandran Secure SOAP-based Web services . . . . . ?? D-R Chen and C-C Hsu Fault-tolerant routing for pyramid networks using the least level minimal routing method . . . . . . . . . . . . . ?? L. Feng and E. Chang and T. S. Dillon Schemata transformation of object-oriented conceptual models to XML ??
K. Maly and S. Olariu and L. Zhang and N. Rao Fairness in DQDB revisited: a new solution . . . . . . . . . . . . . . . . ?? H. Juidette and N. Idboufker and A. Berraissoul QoS routing in data networking using genetic algorithms: a new two-level approach . . . . . . . . . . . . . . . . ?? J. Al-Sadi and K. Day and M. Ould-Khaoua Analysis of fault-tolerant routing algorithms in $k$-ary n-cube networks ?? K. Lee and Y. Y. Park and H. Y. Yeom Pre-emptive but safe interval caching for real-time multimedia systems . . . . ?? S-W Kim Development of a high-performance index manager in a main memory DBMS . . . . . ?? H. C. B. Chan and H. Chen and J. Zhang An adaptive reservation protocol with a pre-emptive priority mechanism for wireless ATM LANs . . . . . . . . . . . ??
S. Sarangi and P. N. Sireesh and S. P. Pal A scalable, efficient and general Monte Carlo scheme for generating synthetic Web request streams . . . . . . . . . . ?? D. Manivannan and C. Zhang Performance of communication-induced checkpointing algorithms . . . . . . . . ?? E. Guntama and E. Chang and N. Jayaratna and L. Pudhota Extension of activity diagrams for flexible business workflow modeling . . ?? D.-R. Liu and S.-C. Pan Integrating software agents with multi-level metadata in support of heterogeneous product search . . . . . . ?? L.-C. Chen and D.-R. Chen and C.-C. Hsu and H.-R. Lin Fast and efficient allocation for mesh systems . . . . . . . . . . . . . . . . ?? M. Naghibzadeh and K. H. (Kane) Kim The yielding-first rate-monotonic scheduling approach and its efficiency assessment . . . . . . . . . . . . . . . ??
G. Min and M. Ould-Khaoua Performance analysis of hypercube networks under LRD traffic . . . . . . . ?? V. Gorodetski and I. Kotenko and O. Karsaev Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning . . . . . . . . . . . ?? J. L. Aguilar and E. L. Leiss Optimal scheduling of loops with dependence cycles on parallel platforms ?? J. Chen and J. Zhou and S. Yu and J. Zheng and C. Zhang and L. Zhong A framework of scalar quantization multiwavelet transform for very low bit rate video coding . . . . . . . . . . . ?? J. Aguilar Heuristic algorithm based on a genetic algorithm for mapping parallel programs on hypercube multiprocessors . . . . . . ??
E. Chang and E. Damiani and L. Feng Editorial . . . . . . . . . . . . . . . ?? J. X. Yu and G. Wang and H. Lu and G. Yu and J. Lv and B. Sun Automata Match: a new XML query processing approach . . . . . . . . . . ?? H. Zhang and F. Tompa XQuery rewriting at the relational algebra level . . . . . . . . . . . . . ?? M. M. Martínez and P. de la Fuente and J.-C. Derniame XML as a means to support information extraction from legal documents . . . . ?? B.-S. Lee and B. R. Bryant Applying XML technology for implementation of natural language specifications . . . . . . . . . . . . . ?? D. G. Synodinos and P. Avgeriou Leveraging hypermedia engineering for multi-channel access with the use of XML ?? W. Jonker XML and secure data management in an ambient world . . . . . . . . . . . . . ??
L. Zhenhua A bus-type software model based on CORBA and XML . . . . . . . . . . . . . . . . ?? M. Sharifi and B. Zolfaghari Optimizing the ready queue structure for dynamic scheduling strategies in real-time operating systems . . . . . . ?? P. C. Saxena and J. Rai Communication cost of $k$-coteries . . . ?? S. Goel and H. Sharda and D. Taniar Messaging in distributed systems . . . . ?? H. Zhou and W. Cao and Z. Lin Formal semantics analysis for VHDL RTL synthesis . . . . . . . . . . . . . . . ?? J.-L. Wang An effective link arrangement scheme for distributed systems using Markov-chain based reliability analysis . . . . . . . ?? Anonymous Index to Volume 18, 2003 . . . . . . . . ??
X.-X. Chen and M. Minami and H. Morikawa and T. Aoyama Service description model and toolkit for ubiquitous computing . . . . . . . . ?? A. Moga and M. Dubois Scalability implications of software-implemented coherence . . . . . ?? T. Newe and T. Coffey Formal verification logic for hybrid security protocols . . . . . . . . . . . ?? K. Komathy and P. Vivekanandan and V. Ramachandran Secure SOAP-based Web services . . . . . ?? D.-R. Chen and C.-C. Hsu Fault-tolerant routing for pyramid networks using the least level minimal routing method . . . . . . . . . . . . . ?? L. Feng and E. Chang and T. S. Dillon Schemata transformation of object-oriented conceptual models to XML ??
F. K. Hussain and E. Chang and T. S. Dillon Classification of trust in Peer-to-Peer (P2P) communication . . . . . . . . . . ?? Y.-H. Wang and C. M. Chung and C.-J. Lee and C.-C. Chuang Ad hoc routing protocol based on setup on-demand backup node . . . . . . . . . ?? W. W. K. Lin and A. K. Y. Wong and T. S. Dillon HBP: an optimization technique to shorten the control cycle time of the Neural Network Controller that provides dynamic buffer tuning to eliminate overflow at user level . . . . . . . . . ?? D. Taniar and J. W. Rahayu and R. Boon-Noi Tan Parallel algorithms for selection query processing involving index in parallel database systems . . . . . . . . . . . . ??
E. Damiani Semantics-aware techniques for security ?? P. Ceravolo Extracting role hierarchies from authentication data flows . . . . . . . ?? N. Kodali and C. Farkas and D. Wijesekera Specifying multimedia access control using RDF . . . . . . . . . . . . . . . ?? C. Ardagna and S. De capitani di Vimercati A comparison of modeling strategies in defining XML-based access control languages . . . . . . . . . . . . . . . ?? C. F. Cupens and A. Miége AdOrBAC: an administration model for Or-BAC . . . . . . . . . . . . . . . . . ?? L. Feng and W. Jonker Preparations for encrypted XML metadata querying . . . . . . . . . . . . . . . . ?? F. K. Hussain and E. Chang and T. S. Dillon Trustworthiness and CCCI metrics in P2P communication . . . . . . . . . . . . . ?? G. Hogben The formation of software agreements between autonomous agents . . . . . . . ?? R. Tolksdorf and C. Bizer and R. Eckstein and R. Heese Trustable B2C markets on the Semantic Web . . . . . . . . . . . . . . . . . . ??
Yong-Jin Lee Minimal cost heuristic algorithm for delay constrained loop network . . . . . ?? Sooyong Kang and Hyunjoo Kim and Heon Y. Yeom A framework for fault-tolerant peer-to-peer streaming service based on the service migration . . . . . . . . . ?? Sheila Anand and V. Ramachandran A generic model for an application based intrusion prevention detection system ?? Christopher Kohlhoff and Robert Steele Evaluating SOAP for high performance applications in capital markets . . . . ?? Der-Rong Din A simulated annealing algorithm for finding minimal wavelength on a WDM ring ?? Sang-Wook Kim Concurrency control in main-memory DBMS ??
Abdelkader Hameurlain and Franck Morvan Parallel query optimization methods and approaches: a survey . . . . . . . . . . ?? Dmitri D. Perkins and Jinping Yang and Herman Hughes and Charles Owen A QoS-aware routing scheme for mobile ad hoc networks . . . . . . . . . . . . . . ?? Jia-Kang Seng and Jing Yu Toward a more generic design of XML benchmark workload . . . . . . . . . . . ?? W. Zhao and L. E. Moser and P. M. Melliar-Smith Design and implementation of a consistent time service for fault-tolerant distributed systems . . . ??
Keqiu Li and Hong Shen Proxy placement problem for coordinated en-route transcoding proxy caching . . . ?? David Taniar and Hui Yee Khaw and Haorianto Cokrowijoyo and Johanna Wenny Rahayu The use of hints in object-relational query optimization . . . . . . . . . . . ?? Natalia López and Manuel Núñez and Fernando Rubio Predicting performance in the presence of stochastic information . . . . . . . ?? Min-Jae Lee and Wook-Shih Han and Kyu-Young Whang Transformation-based spatial partition join . . . . . . . . . . . . . . . . . . ?? Richard S. L. Wu and Allan K. Y. Wong and Tharam S. Dillon RDCT: a novel reconfigurable dynamic cache size tuner to shorten information retrieval time over the Internet . . . . ??
Didar Zowghi and Vincenzo Gervasi Editorial . . . . . . . . . . . . . . . ?? Martin S. Feather and Steven L. Cornford and Kenneth A. Hicks and Kenneth R. Johnson Applications of tool support for risk-informed requirements reasoning . . ?? C. Heitmeyer and M. Archer and R. Bharadwaj and R. Jeffords Tools for constructing requirements specifications: the SCR Toolset at the age of nine . . . . . . . . . . . . . . ?? Leonid Kof An application of natural language processing to domain modelling: two case studies . . . . . . . . . . . . . . . . ?? Stefania Gnesi and Giuseppe Lami and Gianluca Trentanni An automatic tool for the analysis of natural language requirements . . . . . ?? Alfredo Raúl Teyseyre and Marcelo Campo Early requirements validation with $3$D worlds . . . . . . . . . . . . . . . . . ??
Abdelkader Hameurlain Editorial . . . . . . . . . . . . . . . ?? Agustinus Borgy Waluyo and Bala Srinivasan and David Taniar Research on location-dependent queries in mobile databases . . . . . . . . . . ?? Artem Katasonov User-centric data querying for location-based services . . . . . . . . ?? Chin-Wan Chung and Sunghee Choi and Yong-Jin Choi Closest pair queries in spatio-temporal databases . . . . . . . . . . . . . . . ?? Vijay Kumar and Margaret H. Dunham and Nitin Prabhu Mobilaction: a mobile transaction framework supporting spatial replication and spatial consistency . . . . . . . . ?? Patricia Serrano-Alvarado and Claudia Roncancio and Michel Adiba and Cyril Labbé An adaptable mobile transaction system ?? Luc Bouganim and François Dang Ngoc and Philippe Pucharel Tamper-resistant ubiquitous data management . . . . . . . . . . . . . . . ??
Tharam Dillon and Mukesh Mohania Special issue: Privacy Data Management ?? Hendrick J. G. Oberholzer and Martin S. Olivier Privacy contracts incorporated in a privacy protection framework . . . . . . ?? Omar Khadeer Hussain and Elizabeth Chang and Farookh Khadeer Hussain and Tharam S. Dillon A methodology for risk measurement in e-transactions . . . . . . . . . . . . . ?? B. Carminati and E. Ferraru A system for controlled outsourcing of personal data . . . . . . . . . . . . . ?? Zhiqiang Yang and Rebecca N. Wright and Hiranmayee Subramaniam Experimental analysis of a privacy-preserving scalar product protocol . . . . . . . . . . . . . . . . ?? Dang Tran Khanh A practical solution to supporting oblivious basic operations on dynamic outsourced search trees . . . . . . . . ?? Katharina Grün and Michael Karlinger and Michael Schrefl Schema-aware labelling of XML documents for efficient query and update processing in SemCrypt . . . . . . . . . ??
Alessandro Garcia and Carlos Lucena Special issue: Software Engineering for Multi-Agent Systems . . . . . . . . . . ?? Iyad Rahwan and Thomas Juan and Leon Sterling Integrating social modelling and agent interaction through goal-oriented analysis . . . . . . . . . . . . . . . . ?? Magid Nikraz and Giovanni Caire and Parisa A. Bahri A methodology for the development of multi-agent systems using the JADE platform . . . . . . . . . . . . . . . . ?? Quynh-Nhu Numi Tran and Graham Low and Ghassan Beydoun A methodological framework for ontology centric oriented software engineering ?? Antonio Chella and Massimo Cossentino and Luca Sabatucci and Valeria Seidita Agile PASSI: An agile process for designing agents . . . . . . . . . . . . ?? Fabiano K. T. Tiba and Miriam A. M. Capretz Agent-oriented architecture for monitoring and diagnosis in supervisory systems . . . . . . . . . . . . . . . . ??
K. K. Thyagharajan and V. Ramachandran Optimal buffering requirement analysis for jitter-free variable bit rate video streaming . . . . . . . . . . . . . . . ?? Alexander Thomasian and Gang Fu Anticipatory disk arm placement to reduce seek time . . . . . . . . . . . . ?? Christian Guttmann and Ingrid Zukerman Agents with limited modeling abilities: Implications on collaborative problem solving . . . . . . . . . . . . . . . . ?? Franziska Klügl and Rainer Herrler and Gustavo Kuhn Andriotti Coupling GIS and multi-agent simulation towards infrastructure for realistic simulation . . . . . . . . . . . . . . . ?? T. Murata and J. Yim and H. Yin and O. Wolfson Petri-net model and minimum cycle time for updating a moving objects database ?? Mihaela Ulieru and Dan Ionescu Privacy and security shield for health information systems (e-health) . . . . . ??
J-Y Chung and G. Feuerlicht and W. Lamersdorf and C. Zirpins Special issue: Engineering design and composition of service-oriented applications . . . . . . . . . . . . . . ?? S. Bleul and T. Weise and K. Geihs An ontology for quality-aware service discovery . . . . . . . . . . . . . . . ?? A. Colman and J. Han Adaptive service-oriented systems: an organisational approach . . . . . . . . ?? L. Aversano and M. di Penta and K. Taneja A genetiv programming approach to support the design of service compositions . . . . . . . . . . . . . . ?? C-L Huang and K-M Chao and C-C Lo and P. Wang and J-Y Chung Service discovery through consensus based preferences . . . . . . . . . . . ?? A. Erradi and N. Kulkarni and S. Anand Service design principles: a case study in modeling services for the securities trading domain . . . . . . . . . . . . . ?? M. Weiss and A. Oreshkin and B. Esfandiari Method for detecting functional feature of interactions of Web services . . . . ?? Z. Lu and S. Li and P. Hyland and A. Ghose Reliable service composition by adopting assumptions . . . . . . . . . . . . . . ?? K. Guennoun and K. Drira Using graph grammars for interaction style description: applications for service-oriented architectures . . . . . ??
Ernesto Damiani and Gabriele Gianini and Hiroshi Maruyama Special issue: Web service security . . ?? Jason Crampton Applying hierarchical and role-based access control to XML documents . . . . ?? N. Li and T. Yu and A. Antón A semantics based approach to privacy languages . . . . . . . . . . . . . . . ?? Alban Gabillon A logical formalization of secure XML database . . . . . . . . . . . . . . . . ?? N. Kodali and C. Farkas and D. Wijesekera uSMIL: Towards secure unbreakable semantics in multimedia Web services . . ?? C. Skalka and X. Sean Wang Trust but verify: Authorization for Web services . . . . . . . . . . . . . . . . ??
Jae-Gil Lee and Kyu-Young Whang and Wook-Shin Han and Il-Yeol Song Special issue: Hippocratic XML databases: a model and an access control mechanism . . . . . . . . . . . . . . . ?? Behrouz Zolfaghari and Mohsen Sharifi The impact of skewed associativity on the replacement traffic in COMA multiprocessors . . . . . . . . . . . . ?? Maria J. Blesa and Jordi Petit and Fatos Xhafa Generic parallel implementations for Tabu search . . . . . . . . . . . . . . ?? Anonymous Index to Volume 21, 2006 . . . . . . . . ??
K. Salah and K. Elbadawi Throughput and delay analysis of interrupt-driven kernels under Poisson and bursty traffic . . . . . . . . . . . ?? L. Wang and L. Khan and B. Thuraisingham A framework for automated image annotation . . . . . . . . . . . . . . . ?? C.-L. Wu and D.-C. Lou and S.-Y. Chen Integer factorization for RSA cryptosystem under a PVM environment . . ?? S. Park and S-W Kim and W. W. Chu SBASS: Segment based approach for subsequence searches in sequence databases . . . . . . . . . . . . . . . ?? K. Li and T. Nanya and H. Shen and F. Chin and W. Zhang An efficient cache replacement algorithm for multimedia object caching . . . . . ?? Jason C. T. Lo and Allan K. Y. Wong and Wilfred W. K. Lin SDITPM: A novel transfer policy model to facilitate object mobility that shortens service roundtrip time by load balancing over the Internet . . . . . . . . . . . ?? Tran Khanh Dang Solving approximate similarity queries ?? John G. Vlachogiannis Automatic construction of a decision tree for the analysis of traffic load in computer networks . . . . . . . . . . . ??
Doohyun Kim and Arif Ghafoor Special issue: Real time software architecture . . . . . . . . . . . . . . ?? A. Cilardo and D. Cotroneo and C. di Flora and A. Mazzeo and L. Romano and S. Russo Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices . . . . . . . . . . . . . . . . ?? Y. Nah and K. H. (Kane) Kim and T. Wang and M. H. Kim A cluster-based TMO-structured scalable approach for location information systems . . . . . . . . . . . . . . . . ?? S. Itaya and M. Takizawa Parallel transmission model for real-time multi-source streaming of multimedia data in scalable networks . . ?? M. H. Kim and E. H. Jo and D-J Kim and J-G Kim Time-triggered and message-triggered object framework and global time-based synchronization for real-time multimedia streaming . . . . . . . . . . . . . . . ?? A. Talevski and E. Chang and T. S. Dillon A dynamically reconfigurable Voice User Interface (VUI) framework and platform ?? T. Nakajima and E. Tokunaga and H. Ishikawa and D. Ueno and K. Fujinami and M. Sugaya and S. Oikawa Software infrastructures for building ubiquitous computing environments . . . ?? W. Sheikh and B. Shafiq and S. Baqai and R. A. Paul and M. F. Khan and H. Ghafoor A QoS framework for multimedia applications in mobile ad hoc networks ??
Haiping Xu and Yi-Tsung Cheng Model checking bidding behaviors in Internet concurrent auctions . . . . . . ?? Kinh Nguyen and Tharam Dillon Obligation nets: a rigorous object-oriented technique for modeling the behavioural semantics of information systems . . . . . . . . . . . . . . . . ?? Rung-Ching Chen and Cheun-Chieh Liao A genetic algorithm with fuzzy selection and local search for multicast routing problem on the QoS constraint . . . . . ?? Garrett Camp and Mihaela Ulieru InOrder: enhancing Google via stigmergic query refinement . . . . . . . . . . . . ??
Simone Fischer-Hübner and Steven Furnell and Costas Lambrinoudakis Special issue: TrustBus 2006 . . . . . . ?? Jeremy Ward Building the information assurance community of purpose . . . . . . . . . . ?? V. Poursalidis and C. Nikolaou Towards a person-centric Identity Management Infrastructure (IMI) . . . . ?? Christian Schläger and Thomas Nowey On the effects of authentication and authorisation infrastructures on e-commerce activities . . . . . . . . . ?? Mikolaj Morzy Cluster-based analysis and recommendation of sellers in online auctions . . . . . . . . . . . . . . . . ?? Muhammad Alam and Michael Hafner and Ruth Breu and Stefan Untherthiner A framework for modelling restricted delegation of rights in the SECTET . . . ?? Alfonso Rodríguez and Eduardo Fernández-Medina and Mario Piattini An MDA approach to develop secure business processes through a UML 2.0 extension . . . . . . . . . . . . . . . ??
Wenyu Qu and Masaru Kitsuregawa and Hai Zhuge and Hong Shen and Yinwei Jin A traffic-based routing algorithm by using mobile agents . . . . . . . . . . ?? R. Obermaisser and C. El-Salloum and B. Huber and H. Kopetz Modeling and verification of distributed real-time systems using periodic finite state machines . . . . . . . . . . . . . ?? K. S. Cheung A formal method for synthesising components of shared resource systems ?? Qingtian Zeng and Hua Duan Behavior description for complex flexible manufacturing system based on decomposition of Petri net . . . . . . . ?? Min-Soo Kim and Kyu-Young Whang and Jae-Gil Lee $n$-Gram/2L-approximation: a two-level $n$-gram inverted index structure for approximate string matching . . . . . . ?? Anonymous Index to Volume 22, 2007 . . . . . . . . ??
Song Han and Elizabeth Chang and Tharam Dillon Pairing-based public-key encryption schemes with backward-and-forward security . . . . . . . . . . . . . . . . ?? Jin-Long Wang and Chen-Hsing Chen Adaptive two-stage QoS provisioning schemes for CDMA networks . . . . . . . ?? Maja Hadzic and Elizabeth Chang Onto-agent methodology for design of ontology-based multi-agent systems . . . ?? Sang-Wook Kim and Miyoung Shin Subsequence matching under time warping in time-series databases: observation, optimization, and performance results ?? Dechang Pi and Chuhua Xian and Xiaolin Qin An improved C-means clustering algorithm ??
Abdelkader Hameurlain Special Issue: Data Management in Grid and P2P Systems: Editorial . . . . . . . ?? C. Comito and S. Patarin and D. Talia PARIS: A peer-to-peer architecture for large-scale semantic data sharing . . . ?? W. He and L. Fegaras Answering XPath queries with search predicates in structured P2P networks ?? M. Barhamgi and D. Benslimane and A. M. Ouksel PWSMS: A Peer-to-peer Web service management system for data sharing in collaborative environments . . . . . . . ?? G. Vargas-Solar and J-L Zechinelli-Martini and V. Cuevas-Vicenttín Integrating and querying astronomical data on the e-GrOV data grid . . . . . . ?? H-S Kim and C-S Hwang and S-K Lee and S-J Choi and J-M Gil Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids . . . . . . . . . . . . ??
Wanlei Zhou and Yang Xiang and Minyi Guo Special Issue: Network Attacks and Defense Systems . . . . . . . . . . . . ?? Duc-Liem Vo and Kwangjo Kim A secure mutual authentication scheme with key agreement using smart card from bilinear pairings . . . . . . . . . . . ?? Udaya Kiran Tupakula and Vijay Varadharajan A hybrid model against TCP SYN and reflection DDoS attacks . . . . . . . . ?? Zhongwen Li and Qiong Chen and Yang Xiang A cross-authentication model and implementation . . . . . . . . . . . . . ?? Zhuowei Li and Amitabha Das and Jianying Zhou and Jagdish C. Patra Variable-length signatures for intrusion detection . . . . . . . . . . . . . . . ?? Ruixuan Li and Zhuo Tang and Zhengding Lu and Jinwei Hu Request-driven role mapping framework for secure interoperation in multi-domain environments . . . . . . . ?? Shi-Jinn Horng and Pingzhi Fan and Ming-Yang Su and Yuan-Hsin Chen and Cheng-Ling Lee and Shao-Wei Lan Anomaly detection for Web server based on smooth support vector machine . . . . ?? Zhu Hongfeng and Liu Tianhua and Liu Jie EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol . . . . . . . . . ?? Chua-Ta Li and Min-Shiang Hwang and Yen-Ping Chu Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks . . . . . . . . . . . . . . . . ??
R. Hooshmand and M. Ataei Real-coded genetic algorithm applied to optimal placement of capacitor banks for unbalanced distribution systems with meshed/ radial configurations . . . . . ?? Henry Tan and Fedja Hadzic and Tharam S. Dillon and Elizabeth Chang State of the art of data mining of tree structured information . . . . . . . . . ?? Bent Bruun Kristensen Interaction cases: generalized use cases in ambient systems . . . . . . . . . . . ?? Joong Hyuk Chang Adaptive selection of tuples over data streams for efficient load shedding . . ?? R. Obermaisser and C. El-Salloum and B. Huber and H. Kopetz Modeling and verification of distributed real-time systems using periodic finite state machines . . . . . . . . . . . . . ?? Song Han and Elizabeth Chang and Tharam Dillon Pairing-based public-key encryption schemes with backward-and-forward security . . . . . . . . . . . . . . . . ??
Nicolas Guelfi and Henry Muccini and Patrizio Pelliccione and Alexander Romanovsky Special issue: Engineering Fault Tolerant Systems . . . . . . . . . . . . ?? Francis Tam On the development of standards based carrier grade platforms . . . . . . . . ?? Michele Banci and Stefania Gnesi and Alessandro Fantechi and Giovanni Lombardi Model driven development of railway systems using diversity . . . . . . . . ?? Nuno Laranjeiro and Marco Vieira Deploying fault tolerant Web service compositions . . . . . . . . . . . . . . ?? Máté Kovács and Dániel Varró and László Gönczy Formal analysis of BPEL workflows with compensation by model checking . . . . . ??
Chien-Lung Hsu Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme . . . . . ?? Ambrosio Toval and Begoña Moros and Joaquín Nicolás and Joaquín Lasheras Eight key issues for an effective reuse-based requirements process . . . . ?? S. P. Singh and C. Kistanna and A. R. Rao Optimal capacitor allocation in distribution systems using genetic algorithm . . . . . . . . . . . . . . . ?? William Chung-Kung Yen Restricted independent domination problems on graphs . . . . . . . . . . . ?? S. Y. Wang and C. L. Chou On the characteristics of information dissemination paths in vehicular ad hoc networks on the move . . . . . . . . . . ??
Wolfgang A. Halang Special issue: Automated control systems for the safety integrity levels 3 and 4 ?? K. H. (Kane) Kim and Chansik Im Hybrid approaches for derivation of tight service time bounds of distributed embedded computing systems . . . . . . . ?? Peter Tröger and Andreas Polze Object and process migration in .NET . . ?? Stefan Schemmer and Edgar Nett Achieving high reliable and timely task execution in mobile embedded applications . . . . . . . . . . . . . . ??
Gita Das and Sid Ray A compact feature representation and feature re-weighting in content-based image retrieval . . . . . . . . . . . . ?? Sandeep Kumar and P. K. Bansal and Seema Bawa Modified quad tree network with architectural analysis (M\_QUAD) . . . . ?? Ryan Layfield and Bhavani Thuraisingham and Laatifur Khan and Murat Kantarcioglu Design and implementation of a secure social network system . . . . . . . . . ?? José Aguilar and Jorge Chacal and César Bravo A multiagents system for planning and management of the production factors . . ?? Giuseppe Lami Analytic effectiveness evaluation of techniques for natural language software requirements testability . . . . . . . . ?? Yang-Sae Moon and Woong-Kee Loh Efficient stream subsequence matching algorithms for handheld devices on streaming time-series data . . . . . . . ??
Kequi Li and Yanming Shen and Minyi Guo Special issue: Network and Parallel Computing . . . . . . . . . . . . . . . ?? Tan Yiyu and Yau Chihang and Anthony S. Fong and Yang Xiaojian An instruction folding solution for a Java processor . . . . . . . . . . . . . ?? Angela L. Chiu and Gagan Choudhury and Robert Doverspike and Guangzhi Li Restoration design in IP over reconfigurable WDM networks . . . . . . ?? Yang Xiang and Xiang Fan and Wen Tao Zhu Propagation of active worms: A survey ?? Liu Weidong and Lin Chuang and Wang Jirong A novel data transmission scheme for mobile sensor network . . . . . . . . . ?? Wenyu Qu and Masaru Kitsuregawa and Yanming Shen and Takashi Nanya An optimal lifetime-adaptive method for wireless sensor networks . . . . . . . . ?? Chao Peng and Yasuo Tan and Naixue Xiong and Laurence T. Yang and Hong Zhu Approximation algorithms for inner-node weighted minimum spanning trees . . . . ?? Siliang Tang and Jianhua Yang and Zhaohui Wu A context quality management infrastructure for complex ubiquitous environment . . . . . . . . . . . . . . ?? Yanming Shen and Kequi Li On the design of P2P video streaming with layered coding . . . . . . . . . . ??
Jackei H. K. Wong and Allan K. Y. Wong and Tharam Dillon and Wilfred W. K. Lin A novel approach to achieve real-time TCM (traditional Chinese medicine) telemedicine through the use of ontology and clinical intelligence discovery . . ?? Gao Shu and Dingfang Chen Matchmaking framework for visualization Web services . . . . . . . . . . . . . . ?? Manzur Ashraf and Syed Mahfuzul Aziz and M. Lutful Kabir and Biswajit K. Dey A SIM-based electronic transaction authentication system . . . . . . . . . ?? Jung-Hoon Lee Low power TLB structure by using dynamic searching algorithm . . . . . . . . . . ?? Yang-Sae Moon and Woong-Kee Loh Efficient stream subsequence matching algorithms for handheld devices on streaming time-series data . . . . . . . ??
Keqin Li and Geyong Min Special issue: Advanced Topics on Grid, Cluster and P2P Computing . . . . . . . ?? Abdullah Kayi and Edward Kornkven and Tarek El-Ghazawi and Samy Al-Bazhra and Gregory B. Newby Performance analysis and tuning for clusters with ccNUMA nodes for scientific computing: a case study . . . ?? Behram Khan and Matthew Horsnell and Ian Rogers and Mikel Luján and Andrew Dinn and Ian Watson Exploiting object structure in hardware transactional memory . . . . . . . . . . ?? Dang Ming Quan and Jörn Altmann and Laurence T. Yang Improving the capability of the SLA workflow broker with parallel processing technology . . . . . . . . . . . . . . . ?? Wenyu Qu and Wanlei Zhou and Masaru Kitsuregawa A parallel information retrieval method for e-commerce . . . . . . . . . . . . . ?? Yuxin Tang and Yunquan Zhang and Hu Chen A parallel shortest path algorithm based on graph-partitioning and iterative correcting . . . . . . . . . . . . . . . ?? Hao Yin and ChangLai Du and Chao Ren and Zhijia Chen and Heyong Min and Chuang Lin A secure and scalable video conference system based on peer-assisted content delivery networks . . . . . . . . . . . ?? John Casey and Wanlei Zhou Adjacency cache: an efficient P2P Web cache indexing and lookup system . . . . ??
A. Chatterjee and M. Goel and N. Raghuvanshi and P. Gupta and S. G. Dhande Facial feature extraction in frontal views using activeshape models . . . . . ?? Omar Shatnawi Discrete time modelling in software reliability engineering: a unified approach . . . . . . . . . . . . . . . . ?? Ioannis Antonellis and Christos Bouras and Vassilis Poulopoulos Scalable text classification as a tool for personalization . . . . . . . . . . ?? Kiarash Mizanian and Mehdi Vasef and Morteza Analoui The modified alternating fractal renewal process for modelling peer to peer traffic . . . . . . . . . . . . . . . . ?? Yang Ping and Liao Ningbo Approach on complex neural-genetic algorithm modeling for isomorphism identification in conceptual design of mechanism . . . . . . . . . . . . . . . ??
Luci Pirmez and Luiz F. R. C. Carmo and Luiz F. H. Bacellar Enhancing Levenshtein distance algorithm for assessing behavioral trust . . . . . ?? Pmar Khadeer Hussain and Tharam Dillon and Elizabeth Chang and Farookh Hussain Transactional risk-based decision making system in e-business interactions . . . ?? Seung-Joon Seok and Bongsoo You and Sungwan Youm and Kyung-Hoe Kim and Chul-Hee Kang A heuristic multi-path routing scheme for online traffic in MPLS networks . . ?? H. T. Kung and S. Y. Wang TCP trunking for bandwidth management of aggregate traffic . . . . . . . . . . . ?? V. Poursakidis and C. Nikolaou Towards a person-centric Identity Management Infrastructure (IMI) . . . . ?? Guillermo L. Taboada and Juan Touriño and Ramón Doallo Performance analysis of message-passing libraries on high-speed clusters . . . . ??
Jiro Iwashige and Leonard Barolli Electromagnetic Fields Diffracted by Two Horizontal edges with Arbitrary Angle for Different and Same Heights . . . . . ?? Hiroshi Maeda Simulation of Soliton Propagation in Slab Waveguide by Frequency Dependent FDTD Method . . . . . . . . . . . . . . ?? Makoto Murakami and Motoi Yamagiwa and Minoru Uehara Decision Model for a System to Start Communicating with a Human . . . . . . . ?? Tomoya Enokido and Makoto Takizawa A Purpose-based Synchronization Protocol for Secure Information Flow Control . . ?? C. Militello and V. Conti and F. Sorbello and S. Vitabile An embedded IRIS recognizer for portable and mobile devices . . . . . . . . . . . ?? Alireza Goudarzinemati and Tomoya Enokido and Makoto Takizawa Scheduling Algorithms for Concurrently Streaming Multimedia Objects in P2P Overlay Networks . . . . . . . . . . . . ?? Antonio Gentile and Roberto Pirrone and Giuseppe Russo Knowledge Discovery for the Linguistic Atlas of Sicily Project . . . . . . . . ?? Motoi Yamagiwa and Minoru Uehara and Makoto Murakami A reconstruction method for Ultrasonic deterioration image by the combination of Constructive Solid Geometry and Strongly Typed Genetic Programming . . . ?? David Taniar and Wenny Rahayu and Vincent Lee and Olena Daly Mining Hierarchical Negative Association Rules . . . . . . . . . . . . . . . . . ??
Frank Morovan and Abdelkader Hameurlain Special issue: Mobile Data Management: Models, Methodologies and Services . . . ?? Young-Chang Kim and Jae-Woo Chang A new distributed grid scheme and $k$-NN query processing for mobile objects in spatial networks . . . . . . . . . . . . ?? Geng Zhao and Kefeng Xuan and David Taniar and Bala Srinivasan LookAhead continuous KNN mobile query processing . . . . . . . . . . . . . . . ?? Bhuvan Bamba and Ling Liu and Philip S. Yu A motion-aware safe period-based framework for spatial alarm processing ?? Michele Ruta and Floriano Scioscia and Tommaso Di Noia and Eugenio Di Sciascio A hybrid ZigBee/Bluetooth approach to mobile semantic grids . . . . . . . . . ?? Yiwei Cao and Ralf Klamma and Matthias Jarke Mobile multimedia management for Virtual Campfire --- the German excellence research cluster UMIC . . . . . . . . . ??
Ernesto Damiani and Luis Barbosa and Peter T. Breuer and Claudio A. Ardagna Special issue: Open Source Certification ?? Luis S. Barbosa and Antonio Cerone and Alexander K. Petrenko and Siraj A. Shaikh Certification of open-source software: A role for formal methods? . . . . . . . . ?? Pedro Luis Mateo Navarro and Gregorio Martínez Pêrez and Diego Sevilla Ruiz OpenHMI-tester: an open and cross-platform architecture for GUI testing and certification . . . . . . . ?? Etiel Petrinja and Giancarlo Succi Trustworthiness of the FLOSS development process . . . . . . . . . . . . . . . . ?? Chiara Francalanci and Francesco Merlo Empirical analysis of the bug fixing process in open source projects . . . . ??
Yuh-Dauh Lyuu and Ming-Luen Wu Group undeniable signatures with convertibility . . . . . . . . . . . . . ?? V. Lakshmi Praba and G. Arumugam Message authentication code algorithm for IP-SEC . . . . . . . . . . . . . . . ?? Rodolfo Sumoza and Jose Aguilar Castro A cache coherence protocol for distributed memory platforms . . . . . . ?? Yang-Sae Moon and Jinho Kim MBR-safe piecewise aggregate approximation for time-series subsequence matching . . . . . . . . . . ?? K. Bekiropoulos and E. Keramopoulos and O. Beza and P. Mouratidis A list of features that a graphical XML query language should support . . . . . ?? Muhammad Sheikh Sadi and D. G. Myers and Cesar Ortega Sanchez and Jan Jurjens Component criticality analysis to minimize soft errors risk . . . . . . . ??
Kai Lin and Kequi Li Special issue: Selected topics on Wireless Sensor Networks . . . . . . . . ?? Song Guo and An-Ni Shen A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks . . . . . . . . ?? Guangcheng Qin and Panlong Yang and Guihai Chen and Deke Guo Characterizing the scaling capacity for multiple access wireless sensor networks ?? Zhongwen Guo and Yuan Feng and Lu Hong and Ying Guo and Meng Yang Efficient and adaptive transmission algorithms for underwater acoustic networks . . . . . . . . . . . . . . . . ?? Junfeng Xu and Kequi Li and Yanming Shen and Geyong Min An energy efficient packet aggregation scheme for wireless sensor networks . . ?? Xiaowu Chen and Yongtao Ma and Qinping Zhao Multi-category Web object extraction based on relation schema . . . . . . . . ??
Baoshu Xu and Wenyu Qu and Wanlei Zhou A mobile agent-based routing algorithm and some theoretical analysis . . . . . ?? Rodolfo Sumoza and Jose Aguilar Castro A cache coherence protocol for distributed memory platforms . . . . . . ?? Eun-Sun Cho and Manpyo Hong A structural view definition for RDF data . . . . . . . . . . . . . . . . . . ?? Xiangxian Chen and Hai Huang and Jiafang Zhang In-car speech enhancement based on ensemble empirical mode decomposition ?? Ercan Bulus Designing attacks for SMTP servers . . . ?? Prashant M. Dolia and Ashwin R. Dobariya New approach towards event monitoring through IP surveillance technology using 4G mobile devices . . . . . . . . . . . ?? Fouzi Harrag and Aboubekeur Hamdi-Cherif and Abdul Malik S. Al-Salman and Eyas El-Qawasmeh Evaluating the effectiveness of VSM model and topic segmentation in retrieving Arabic documents . . . . . . ??
Danielle Costa and Luci Pirmez and Luiz F. R. C. Carmo and Luiz F. H. Bacellar Enhancing Levenshtein distance algorithm for assessing behavioral trust . . . . . ?? Pedram Hayati and Vidyasagar Potdar and Alex Talevski and Kevin Chai Characterisation of Web spambots using self organising maps . . . . . . . . . . ?? Ali Mirza Mahmood and Mrithyumjaya Rao Kuppa Increasing generalization accuracy by using multivariate statistical method ?? Gang Xue and Tony Chen and Gang He and Shaowen Yao Modeling service interaction patterns ?? Eyas El-Qawasmeh Categorizing received email to improve delivery . . . . . . . . . . . . . . . . ?? Georgia Frantzeskou and Stephen G. MacDonell and Efstathios Stamatatos and Stelios Georgiou and Stefanos Gritzalis The significance of user-defined identifiers in Java source code authorship identification . . . . . . . ?? Kun Yue and Wei-Yi Liu and Li-Ping Zhou Automatic keyword extraction from documents based on multiple content-based measures . . . . . . . . . ??
Yi Sun and Lizhe Wang and Wei Jie and Cheng Fu Special issue --- Research in e-science: current status and future direction . . ?? Zheng Xu and Xiangfeng Luo and Lizhe Wang Incremental building association link network . . . . . . . . . . . . . . . . ?? Peng Zhang and Sabu Emmanuel and Yanning Zhang and Cheng Fu Auto-scaled ISL tracking for region based control infrastructure and applications in video surveillance . . . ?? Guoli Wang and Chao Huang Energy-efficient beaconless real-time routing protocol for wireless sensor networks . . . . . . . . . . . . . . . . ?? Zhe Tang and Meng Joo Er and Fang Qi Dynamic fuzzy neural network for the intelligent control of a humanoid robot ?? Dan Chen and Lizhe Wang and Congcong Bian and Xuguang Zhang A grid infrastructure for hybrid simulations . . . . . . . . . . . . . . ?? Jungying Chen and Dan Chen and Oliver Lemon A feature-based detection and tracking system for gaze and smiling behaviours ?? Tianyi Zang and Radu Calinescu and Marta Kwiatkowska Metamodel-driven SOA for collaborative e-science application . . . . . . . . . ??
Sanghyun Yoo and Ki Yong Lee and Myoung Ho Kim Fast $k$-NN search using pre-computed $l$-NN sets . . . . . . . . . . . . . . ?? Yun Shen and Ling Feng Evaluation of XPath queries with predicates: an Eulerian cycle theory based sequencing approach . . . . . . . ?? Görkem Çetyn and Mehmet Göktürk Assessing usability readiness of collaborative projects . . . . . . . . . ?? Haengrae Cho Distributed multidimensional clustering based on spatial correlation in wireless sensor networks . . . . . . . . . . . . ?? D. Surendran and T. Purusothaman and R. A. Baclachandar Performance analysis of a resource aggregator in a grid of grids environment . . . . . . . . . . . . . . ?? Helaine Sousa and Denivaldo Lopes and Zair Abdelouahab and Daniela Barreiro Claro and Slimane Hammoudi An approach for model driven testing: framework, metamodels and tools . . . . ??
Xin Bai and Michael B. Smith and Rathika Rajaravivarma Affordance of ubiquitous learning through cloud computing . . . . . . . . ?? Xuping Tu and Hai Jin and Zhibin Yu and Jie Chen and Yabin Hu and Xie Xia MT-BTRIMER: A master-slave multi-threaded dynamic binary translator ?? Jijun Cao and Jinshu Su and Jing Xie and Feng Chen DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree . . . . . . . . . . . . . . . . . . ?? Xiaohui Wei and Hongliang Li and Qingnan Guo and Na Jiang and Liang Hu LimeVI: A platform for virtual cluster live migration over WAN . . . . . . . . ?? Likun Liu and Cheng Chen and Yongwei Wu and Guangwen Yang Metadata changes in large file systems: a metadata querying perspective . . . . ?? Weijiang Liu and Wenyu Qu and Zhaobin Liu and Kequi Li A novel method for estimating flow length distributions from double-sampled flow statistics . . . . . . . . . . . . ?? Jing Xiao and Min Zhu HyperMonitor: A lightweight multi-platform monitor based on hardware virtualization . . . . . . . . . . . . . ??
T. Richardson and A. J. Wellings On the road to real-time OSGi: extending OSGi with an admission control protocol ?? James Hill and Hunt Sutherlandy and Paul Staudingery and Thomas Silveriaz and Douglas C. Schmidt and John Slabyz and Nikita Visnevskiy OASIS: an architecture for dynamic instrumentation of enterprise distributed real-time and embedded systems . . . . . . . . . . . . . . . . ?? H. Posadas and E. Villar and Dominique Ragot and Marcos Martinez Early, time-approximate modeling of multi-OS Linux platforms in a systemC co-simulation environment . . . . . . . ?? Jon Perez and Roman Obermaisser and Carlos F. Nicolas and Iban Ayestaran Modeling time-triggered real-time control systems using executable time-triggered model (E-TTM) and systemC-AMS . . . . . . . . . . . . . . ?? Olivier Gilles and Jerome Hugues A MDE-based optimisation process for real-time systems: optimizing systems at the architecture-level using the real DSL and library of transformation and heuristics . . . . . . . . . . . . . . . ?? Albrecht Kadlec and Raimund Kirner and Peter Puschner Code transformations to prevent timing anomalies . . . . . . . . . . . . . . . ?? Julian Wolf and Mike Gerdes and Florian Kluge and Sascha Uhrig and Jörg Mische and Stefan Metzlaff and Christine Rochange and Hugues Cassé and Pascal Sainrat and Theo Ungerer RTOS support for execution of parallelized hard real-time tasks on the MERASA multi-core processor . . . . . . ?? Hiromasa Shimada and Alexandre Courbot and Yuki Kinebuchi and Tatsuo Nakajima A software infrastructure for dependable embedded systems . . . . . . . . . . . . ?? Stefan Henkler and Simon Oberthür and Holger Giese and Andreas Seibel Model-driven runtime resource predictions for advanced mechatronic systems with dynamic data structures . . ?? Alexander von Renteln and Uwe Brinkschulte Implementing and evaluating the AHS organic middleware . . . . . . . . . . . ??
Joanna Koodziej and Hiroaki Nishino Preface . . . . . . . . . . . . . . . . ?? Aleksander Byrski and Roman Debski and Marek Kisiel-Dorohinicki Agent-based computing in an augmented cloud environment . . . . . . . . . . . ?? Ejaz Ahmed and Nik Bessis and Peter Norrington and Yong Yue Data integration: the method of data mapping, matching and loading grid staging catalogue . . . . . . . . . . . ?? Seiji Okajima and Yoshihiro Okada Hierarchical visual motion retrieval system for distributed motion DB and its user experiments . . . . . . . . . . . . ?? Yutaka Okaie and Tadashi Nakano Network formation games in non-cooperative service overlay networks ?? Admir Barolli and Fatos Xhafa and Christian Sánchez and Makoto Takizawa A study on the effect of mutation in genetic algorithms for mesh router placement in wireless mesh networks . . ?? Tsuneo Kagawa and Hiroaki Nishino and Kouichi Utsumiya Development and evaluation of an interactive texture design method . . . ?? Toshihiko Wakahara and Noriyasu Yamamoto and Hiroki Ochi Image processing of dotted picture in QR code of cellular phones . . . . . . . . ??
Jun Shen and Soo Dong Kim and Nalini Venkatasubramanian Special issue: Service Oriented Computing and Applications . . . . . . . ?? Farzad Sanati and Jie Lu An ontology for e-government service integration . . . . . . . . . . . . . . ?? Neda Alipanah and Latifur Khan and Bjavani Thurisingham Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries . . . . . . . . . . . ?? Andreas Schönberger and Guido Wirtz Configurable analysis of sequential multi-party choreographies . . . . . . . ?? Hmood Al-Dossari and Jianhua Shao and Alun Preece Improving QoS assessment over multiple attributes with asynchronous data . . . ?? Jae-Suk Lee and Sung-Bong Yang An improved pathfinding under multiple exits with SOA in a double-layered MANET ??
Osvaldo Gervasi and Bernady O. Apduhan and C. J. Kenneth Tan and David Taniar Preface . . . . . . . . . . . . . . . . ?? Ilsun You and Jong-Hyouk Lee and Kouichi Sakurai DSSH: Digital signature based secure handover for network-based mobility management . . . . . . . . . . . . . . . ?? Shinya Kondo and Akimitsu Kanzaki and Takahiro Hara and Shojiro Nishio Integration of traffic reduction and sleep scheduling in wireless sensor networks . . . . . . . . . . . . . . . . ?? Mahmudul Hasan and Marina L. Gavrilova and Jon G. Rokne Clearance-based homotopic optimal path computation . . . . . . . . . . . . . . ?? Olivia Fachrunnisa and Farookh Khadeer Hussain digital enterprise . . . . . . . . . . . ??
Deniz Cokuslu and Abdelkader Hemeurlain and Kayhan Erciyes Resource allocation for query processing in grid systems: a survey . . . . . . . ?? Bory J. Bradel and Tarek S. Abdelrahman Inlining with traces in Java programs ?? D. Surendran and T. Purusothaman and R. A. Balachandar and G. Kousalya ESGIA: Extensible service based grid information aggregator . . . . . . . . . ?? Hesham A. Ali and Mofreh M. Salem and Ahmed A. Hamza A framework for scalable autonomous P2P resource discovery for the grid implementation . . . . . . . . . . . . . ??
Ilsun You and Leonard Barolli and Feilong Tang Editorial . . . . . . . . . . . . . . . ?? Fang-Yie Leu and Fuu-Cheng Jiang and Chih-Cheng Lien and Sen-Tarng Lai and Shiuan-You Chiou A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates . . . . . . . . . . . . . . . . . ?? Tao Yang and Tetsuya Oda and Gjergji Mino and Leonard Barolli and Arjan Durresi and Fatos Xhafa Energy-saving in wireless sensor networks considering mobile sensor nodes, single and multi events . . . . . ?? Min-jun Kim and Yong-suk Jang and Yong-do Choi and Sung-ho Kim Differentiated bandwidth allocation and wavelength assignment method in WDM EPON ?? Yuhoing Li and Liang Yu and Tao Li and Yishan Li and Yan Shi Utility-based resource allocation in heterogeneous wireless environments using game theory . . . . . . . . . . . ?? Feilong Tang and Ilsun You and Shui Yu and Huakang Li and Cho-Li Wang Grid transaction management and an efficient development kit . . . . . . . ?? Yu Han and Naigao Jin and Guangwei Xu and Kangbin Yim A new iterative learning control scheme using the geometric rotation for discrete time systems . . . . . . . . . ?? Tingting Liu and Jie Cui and Bo Wang and Gang Chen Parallelization of normal mode-WKBZ computation for ocean acoustic field . . ??
Ilsun You and JinShu Su Editorial . . . . . . . . . . . . . . . ?? Huachun and Hongke Zhang and Fei Song Mobility management analysis of Internet based on the splitting mechanism . . . . ?? Sun-Ho Lee and Kangbin Yim and In-Yeong Lee A secure solution with a password recovery feature for USB flash drives ?? Hyunwoo Kim and Mye Sohn and Hyun Jung Lee Personalized recommendation framework based on CBR and CSP using ontology in a ubiquitous computing environment . . . . ?? Hsing-Chung Chen and Yung-Fa Huang and Shu-Hong Lee and Chi-Tung Chen and Ho-Lung Hung A mobile location-based with time-constraint RBAC associated database management model . . . . . . . . . . . . ?? Zhenqian Feng and Bing Bai and Baokang Zhao and Jinshu Su ICTree: discovering the underlying connections of your rental virtual machines in the public clouds . . . . . ?? Jongsuk R. Lee and Don McNickle and Krzysztof Pawlikowski and Hae-Duck J. Jeong Self-similar properties of malicious teletraffic . . . . . . . . . . . . . . ??
Nenad Stefanovic and Dusan Stefanovic Integrated and interactive software solution for knowledge-based supply network design . . . . . . . . . . . . . ?? Xabier Ugarte-Pedrero and Igor Santos and Carlos Laorden and Borja Sanz and Pablo G. Bringas Collective Classification for Packed Executable Identification . . . . . . . ?? Mahmoud Khonji and Andrew Jones and Youssef Iraqi An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification . . . . . . . . . . . . . ?? Jernej Porenta and Mojca Ciglaric Comparing commercial IP reputation databases to open-source IP reputation algorithms . . . . . . . . . . . . . . . ??
Lei Ye and Henry C. B. Chan B2B magics: a mobile agent-based Internet commerce system for B2B e-commerce . . . . . . . . . . . . . . . ?? K. Bekiropoulos and E. Keramopoulos and O. Beza and P. Mouratidis A list of features that a graphical XML query language should support . . . . . ?? Song Han and Tharam Dillon and Vidy Potdar and Elizabeth Chang RFID mutual authentication protocols for tags and readers with and without a server . . . . . . . . . . . . . . . . . ?? Jun-Im Won and Hyun Back and Jee-Hee Yoon and Sanghyun Park and Sang-Wook Kim One-dimensional spatial join processing using a DOT-based index structure . . . ?? Alexander Thomasian Improved storage system performance by disk scheduling . . . . . . . . . . . . ??
Jywe-Fei Fang and Chien-Hung Huang Algorithmic bipanpath connectivity of the hypercube . . . . . . . . . . . . . ?? Mohd Yamani Idna Idris and Moraali Sivalingam and Emran Mohd Tamil and Zaidi Razak and Noorzaily Mohamed Noor Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA ?? Apolinar Gonzalez and Walter Mata and Alfons Crespo and Miguel Masmano and José Félix and Alvaro Aburto A hypervisor based platform to support real-time safety critical embedded Java applications . . . . . . . . . . . . . . ?? Lei Ye and Adam S. K. Ho and Solomon K. S. Leung and Henry C. B. Chan A business-to-business e-commerce system using software agents and RFID . . . . . ?? Tarek Helmy Priority-based scheduling for dependent processes using random selection of resource holders . . . . . . . . . . . . ?? J. Daniel Garcia and Jesus Carretero and Javier Garcia and Luis Miguel Sanchez and Felix Garcia by using partial replication . . . . . . ??
P. Prema and B. Ramadoss and S. R. Balasundaram An algorithm for merging two classification trees for test case generation . . . . . . . . . . . . . . . ?? Vimala S. and Khanna Nehemiah H. and Saranya G. and Kannan A. Analysis and modeling of multivalued attributes in entity relationship modeling: an approach for improved database design . . . . . . . . . . . . ?? Marisol García-Valls and Alfons Crespo and Joan Vila Resource management for mobile operating systems based on the active object model ?? Shinya Kondo and Akimitsu Kanzaki and Takahiro Hara and Shojiro Nishio Integration of traffic reduction and sleep scheduling for energy-efficient data gathering in wireless sensor networks . . . . . . . . . . . . . . . . ?? Mahmoud O. Elish object-oriented software . . . . . . . . ?? Wen-Feng Hsiao and Te-Min Chang Term expansion on the categorization of summarized documents . . . . . . . . . . ??
ChaoYong Qin and Chenhan Liao Session identification based on linked referrers and Web log indexing . . . . . ?? A. J. Dinusha Rathnayaka and Vidyasagar M. Potdar and Tharam Dillon and Omar Hussain and Samitha Kuruppu Prosumer recruitment framework for prosumer community groups in smart-grid ?? Kun Yue and Wei-Yi Liu and Wen-Hua Qian and Xiao-Feng Wang Discovering semantic associations between Web services based on the electrostatic force theory . . . . . . . ?? Marisol García-Valls and Pablo Basanta-Val and Marga Marcos and Elisabet Estévez A bi-dimensional QoS model for SOA and real-time middleware . . . . . . . . . . ?? R. Anitha and K. Duraiswamy Application of digital image processing in the determination of mass of the diamonds . . . . . . . . . . . . . . . . ?? Javier Fernández and Alejandro Calderón and Félix García and Jesús Carretero Enhancing multimedia caching algorithms for variable-bandwidth streams using adaptive and smoothing techniques . . . ??
Alois Ferscha and Siani Pearson Editorial . . . . . . . . . . . . . . . ?? Tomer Gershoni and Miranda Mowbray and Siani Pearson Mechanisms for Protecting Sensitive Information in Cloud Computing . . . . . ?? Volkmar Lotz and Anderson Santana de Oliveira and Jakub Sendor Control as a Means towards Accountable Services in the Cloud . . . . . . . . . ?? D. Davide Lamanna and Flavio Bertini and Giorgia Lodi and Roberto Baldoni How to Act Without being Observed: Progressive Privacy Architecture in Desktop-as-a-Service . . . . . . . . . . ?? Massimo Ficco and Salvatore Venticinque and Beniamino Di Martino An Advanced Intrusion Detection Framework for Cloud Computing . . . . . ?? José Simão and Luís Veiga Adaptability Driven by Quality of Execution in High Level Virtual Machines for Shared Cloud Environments . . . . . ?? João Paulo and Pedro Reis and José Pereira and António Sousa Towards an Accurate Evaluation of Deduplicated Storage Systems . . . . . . ?? Debmalya Biswas and Krishnamurthy Vidyasankar Secure Cloud Transactions . . . . . . . ??
Vidyasagar Potdar Guest Editor . . . . . . . . . . . . . . ?? Jaya Bhattacharjee and Anirban Sengupta and Chandan Mazumdar and Mridul Sankar Barik A two-phase quantitative methodology for enterprise information security risk analysis . . . . . . . . . . . . . . . . ?? Aziz Qaroush and Mahdi Washaha and Ismail Khater Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message . . . . . . . . . . . . . . . . ?? James Carmichael Diagnosis of dysarthria subtype via spectral and waveform analysis . . . . . ?? Pallavi Khatri and S. Tapaswi and U. P. Verma Trust evaluation in wireless ad-hoc networks using fuzzy system . . . . . . ?? Wuyungerile Li and Shunsuke Saruwatari and Masaki Bandai and Takashi Watanabe Discussions on trade-offs in data aggregation in wireless sensor networks ?? Supriya Chakraborty and Nabendu Chaki Generic organization of semi-structured data . . . . . . . . . . . . . . . . . . ?? Ari Raptino H and Shunsuke Saruwatari and Masaki Bandai and Takashi Watanabe Rate and relay diversity in temporal spectrum sharing . . . . . . . . . . . . ?? Zhixiao Wang and Yanxiao Liu and Wenyao Yan and Wei Wei and Junhuai Li and Deyun Zhang and Omar Alfandi Cheating detection and cheater identification in $ (t, n) $ secret sharing scheme . . . . . . . . . . . . . ?? Andrés Mejía and Reyes Juárez-Ramírez and Sergio Inzunza and Rocio Valenzuela Implementing adaptive interfaces: a use model for the development of usability in interactive systems . . . . . . . . . ?? M. Suresha and Ajit Danti and S. K. Narasimhamurthy Decision trees to multiclass prediction for analysis of arecanut data . . . . . ?? Atsushi Kato Software industry in Okinawa: is ``domestic offshore outsourcing'' scheme feasible? . . . . . . . . . . . . . . . ??
Muhamman Ali Ismail and Shahid H. Mirza and Talat Altaf `LogN+1' and `LogN' model: a binary tree based multi-level cache system for multi-core processors . . . . . . . . . ?? A. M. Kalpana and K. Tamizarasu and A. Ebenezer Jeyakumar A fuzzy logic based framework for assessing the maturity level of Indian small scale software organizations . . . ?? Yangjie Cao and Hongyang Sun and Depei Qian and Weiguo Wu Scalable hierarchical scheduling for malleable parallel jobs on multiprocessor-based systems . . . . . . ?? Shahzad Ali and Sajjad A. Madani and Atta ur Rehman Khan and Imran Ali Khan Routing protocols for mobile sensor networks: a comparative study . . . . . ??
Marian Zomorodi Moghadam and Keivan Navi and Mahmood Kalemati A novel reversible design for double edge triggered flip-flops and new designs of reversible sequential circuits . . . . . . . . . . . . . . . . ?? Carmelo Militello and Vincenzo Conti and Filippo Sorbello and Salvatore Vitabile A fast fusion technique for fingerprint and iris spatial descriptors in multimodal biometric systems . . . . . . ?? Hasan Guler and Fikret Ata Design of a fuzzy-labview-based mechanical ventilator . . . . . . . . . ?? Lucas Grossi and Jose A. Calvo-Manzano A systematic review in the decision analysis of selecting an IT outsourcing supplier . . . . . . . . . . . . . . . . ?? Rerkchai Fooprateepsiri and Pichet Mareo A highly robust approach to face authentication based on trace-fuzzy ART combination . . . . . . . . . . . . . . ??
Kequi Li and Heng Qi Special Issue: Multimedia Information Processing and Retrieval . . . . . . . . ?? Kequi Li and Heng Qi Preface . . . . . . . . . . . . . . . . ?? Guan-Wen Zhang and Jien Kato and Yu Wang and Kenji Mase Multi-stage deep convolutional learning for people re-identification . . . . . . ?? Zhiyang Li and Wenyu Qu and Yujie Xu and Junjie Cao and Zhixun Su Efficient shape representation and retrieval in large database . . . . . . ?? Cuong Xuan Nguyen and Hung-Hsuan Huang and Kyoji Kawagoe Implementation and evaluations of graphical password using object-based image ranking . . . . . . . . . . . . . ?? Heng Qi and Guoyu Lan and Kequi Li A hierarchical kernel for image classification based on layered representation . . . . . . . . . . . . . ?? Wei Jiang and Cong Wang and Yong-Qing Zhang Multiple graph regularization constrained nonnegative matrix factorization . . . . . . . . . . . . . ??
Marisol García-Valls and Pablo Basanta-Val and Marga Marcos and Elisabet Estévez A bi-dimensional QoS model for SOA and real-time middleware . . . . . . . . . . ?? Manoj K. Raut and Arindama Singh A survey on computing prime implicants and implicates in classical and non-classical logics . . . . . . . . . . ?? Se Jung Shin and Won Suk Lee Interactive discovery of association rules over data streams . . . . . . . . ?? R. Anitha and K. Duraiswamy Application of digital image processing in the determination of mass of the diamonds . . . . . . . . . . . . . . . . ?? Mohammad Osiur Rahman and Aini Hussain and Edgar Scavino and M. A. Hannan and Hassan Basri DNA computation algorithm for recyclable waste paper sorting . . . . . . . . . . ??
Jianfeng Guan and Wei Quan and Lili Wang and Changqiao Xu and Feilong Tang and Hongke Zhang Modeling and analysis of mobility stochastic properties in cognitive radio networks . . . . . . . . . . . . . . . . ?? C. Mala and B. Nithya Performance evaluation of IEEE 802.11 contention control mechanisms using polygonal sequences . . . . . . . . . . ?? Wei Kuang Lai and Yi-Uan Chen and Tin-Yu Wu and Ya-Yin Chen Dual migration for mobile cloud service in 4G/LTE network . . . . . . . . . . . ?? Yong-Hwan Lee and Bonam Kim and Youngseop Kim AAM-based emotion recognition using variance of facial feature points on mobile video stream . . . . . . . . . . ?? Ho-Seok Kang and Tran Tin and Sung-Ryul Kim Design and experiments of new IP traceback method based on offline analysis . . . . . . . . . . . . . . . . ??
Joseph Rafferty and Liming Chen and Chris Nugent and Jun Liu Goal lifecycles and ontological models for intention based assistive living within smart environments . . . . . . . ?? Laura M. McAvoy and Liming Chen and Mark P. Donnelly and Chris D. Nugent and Paul J. McCullagh Ontological characterization and representation of context within smart environments . . . . . . . . . . . . . . ?? Antonio Coronato and Giovanni Paragliola An anomalous situation detection system for cognitive impaired people . . . . . ?? Alberto L. Morán and Felipe Orihuela-Espina and Victoria Meza-Kubo and Ana I. Grimaldo and Cristina Ramírez-Fernández and Eloísa García-Canseco and Juan M. Oropeza-Salas and Luis E. Sucar Out of context serious games: Transversal reutilization of games across healthcare domains . . . . . . . ?? Diego Muñoz and Francisco J. Gutierrez and Sergio F. Ochoa and Nelson Baloian Social connector: a ubiquitous system to ease the social interaction among family community members . . . . . . . . . . . ?? Carlos Rodríguez-Domínguez and Tomás Ruiz-López and José Luis Garrido and Manuel Noguera and Kawtar Benghazi A model-driven approach to service composition on the basis of the specification of BPMN choreographies . . ?? Constantin Taivan and Rui José and Bruno Silva Web-based applications for open display networks: developers' perspective . . . ??
David E. Singh and Florin Isaila and Félix García and Jesús Carretero Magio: using mobile agents to enhance parallel I/O . . . . . . . . . . . . . . ?? Hai Tanh Mai and Jaeho Kim and Myoung Ho Kim Integrating outlier removal into existing histogram construction methods for geographic data . . . . . . . . . . ?? Rawaa Dawoud Al-Dabbagh and Saad Mekhilef and Mohd Sapiyan Baba Parameters' fine tuning of differential evolution algorithm . . . . . . . . . . ?? ChaoYong Qin and Chenhan Liao Session identification based on linked referrers and web log indexing . . . . . ?? Glaucio H. S. Carvalho Optimal WiMax backhauling solutions for WiFi traffic . . . . . . . . . . . . . . ??
M'hamed Mataoui and Mohamed Mezghiche A distance based approach for link analysis in XML information retrieval ?? Hai Tanh Mai and Ki Yong Lee and Myoung Ho Kim Dynamic filtering of sensor readings for approximate query processing in sensor networks . . . . . . . . . . . . . . . . ?? Jijun Cao and Jinshu Su Improving application layer multicast forwarding performance by offloading multisend operations . . . . . . . . . . ?? Yan Tang Demey and Gang Zhao SDD-matcher: a semantic-driven data matching framework . . . . . . . . . . . ?? Chihang Zhao and Jie He and Xiaoqin Zhang and Xingzhi Qi and Aiwen Chen Recognition of driving postures by nonsubsampled contourlet transform and $k$-nearest neighbor classifier . . . . ?? Sergio Arévalo and Ernesto Jiménez and Jian Tang and Rommel Torres Set agreement and the loneliness failure detector in crash-recovery systems . . . ??
S. Varadhaganapathy and V. Krishnaveni and G. Arumugam and R. R. Rajalaxmi Harmony and bio inspired harmony search optimization algorithms for feature selection in classification . . . . . . ?? A. Rebhi and S. Abid and F. Fnaiech Fabric defect localization using line variances of the local homogeneity images . . . . . . . . . . . . . . . . . ?? Ping Wang and Kuo-Ming Chao and Chi-Chun Lo A reputation-based computing approach in trusted web service provisions . . . . . ?? Mohammad Ali Zare Chahooki and Nasrollah Moghaddam Charkari Bridging the semantic gap for automatic image annotation by learning the manifold space . . . . . . . . . . . . . ?? A. J. Dinusha Rathnayaka and Vidyasagar M. Potdar and Tharam Dillon and Omar Hussain Prosumer recruitment framework for prosumer community groups in smart-grid ??
Qingyuan Zhou and Jianjian Luo Artificial neural network based grid computing of e-governance scheduling for emergency management . . . . . . . . . . ?? Qingjun Qu and Yiping Yao A task distribution algorithm compatible with background control framework for parallel simulation . . . . . . . . . . ?? Yan Wei and Shi Songshan and Liu Zhenggang and Li Guoxiang Investigation on remote monitoring system for hybrid electric bulldozer . . ?? Jin Bao-quan and Bai Qing and Zhang Hong-juan and Wang dong and Gao Yan Design and analysis of communication scheduling applied in water inrush perception layer of mine Internet of Things . . . . . . . . . . . . . . . . . ?? Shengqing Zhang and Jiakuo Zuo and Li Zhao and Cairong Zhu Energy-efficient power allocation for MIMO two-way cognitive relay networks ?? Shunxiang Zhang and Kui Lu and Wenjuan Liu and Xiaobo Yin and Guangli Zhu Generating associated knowledge flow in large-scale web pages based on user interaction . . . . . . . . . . . . . . ?? Xiang Zhang and HuaiXiang Zhang and Yifan Wu and Guojun Dai A SoPC design of a real-time high-definition stereo matching algorithm . . . . . . . . . . . . . . . ?? Zheng Xu and Haiyan Chen The semantic analysis of knowledge map for the traffic violations from the surveillance video big data . . . . . . ?? Jingsheng Lei and Teng Jiang and Kui Wu and Haizhou Du and Lin Zhu Robust local outlier detection with statistical parameter for big data . . . ?? Xiao Wei and Daniel Dajun Zeng and Wei Wu and Yeming Dai Building the concept semantic space for large text database . . . . . . . . . . ??
Weijiang Liu and Zhiyang Li ICA3PP/U-Science 2014 . . . . . . . . . ?? Xiaohua Jia and Jinhai Wang and Chuanhe Huang and Qin Liu and Kai He and Jing Wang and Peng Li Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment ?? Aiping Zhou and Guang Cheng and Xiaojun Guo and Dinh Tu Truong and Chengang Zhu Heavy hitter identification based on adaptive sampling with mapreduce . . . . ?? Xinfeng Ye Security games for service computing applications . . . . . . . . . . . . . . ?? Yandong Guo and Min Huang and Qing Wang Rescheduling rework jobs on single-machine of original jobs with release times . . . . . . . . . . . . . ?? Tingting Wang and Weijiang Liu and Yujie Xu and Mianxiong Dong QoS oriented task scheduling based on generic algorithm in cloud computing . . ??
Yanling Hu and Anfeng Liu Improving the quality of mobile target detection through portion of node with full duty cycle in WSNs . . . . . . . . ?? Mohammad Ali Zare Chahooki and Nasrollah Moghaddam Charkari Bridging the semantic gap for automatic image annotation by learning the manifold space . . . . . . . . . . . . . ?? Shailey Chawla and Sangeeta Srivastava and Punam Bedi Goals and scenarios based web requirements engineering . . . . . . . . ?? Hamid Alishvandi and Gholam Hosein Gouraki and Hamid Parvin An enhanced dynamic detection of possible invariants based on best permutation of test cases . . . . . . . ??
Guest Editors: Zhiyang Li and Nei Kato Special issue: BDCloud 2015 and FCST 2015 . . . . . . . . . . . . . . . . . . ?? Wen-Kai Huang and Chang-Dong Wang and Shao-Shu Huang and Zheng Li and Jian-Huang Lai and Ling Huang Long-term revenue maximization pricing scheme for cloud . . . . . . . . . . . . ?? Chen Bo and Duan Cheng YOng and Gao Xiue A frequent pattern parallel mining algorithm based on distributed sliding window . . . . . . . . . . . . . . . . . ?? Fengjuan Chen and Wenyu Qu and Lihai Nie and Junfeng Wu and Yuanyuan Li Discovering probabilistic frequent closed itemsets in uncertain database with tuple uncertainty . . . . . . . . . ?? Yifan Chen and Xiang Zhao and Jiuyang Tang and Weiming Zhang and Haichuan Shang Taxi-taking recommendation using real-time trajectories: an online query based approach . . . . . . . . . . . . . ?? Xiaowei Zheng and Jiaxuan Li and Yong Zhang and Qingkun Liu An optimization model of Hadoop cluster performance prediction based on Markov process . . . . . . . . . . . . . . . . ?? En Wang and Yongjian Yang and Wenbin Liu and Fan Wang Clustering routing method based on social characteristic in campus DTN . . ?? Shuchih Ernest Chang and Anne Yenching Liu Information security in practices: Exploring privacy and trust in computer and Internet surveillance . . . . . . . ?? Tingting Yang and Zhonghua Sun and Zhou Su and Hailong Feng and Ruilong Deng Towards risk evaluation algorithm of PSC ship-selecting system based on hierarchic analysis and grey integrated clustering method . . . . . . . . . . . ?? Li Fu and Zhen Liu Topological separation axioms of soft rough formal context . . . . . . . . . . ?? Yangyang Xu and Zhaobin Liu and Zhonglian Hu Ascending partition method for differentially private histogram publication . . . . . . . . . . . . . . ??
Chiraz Soussi Moumen and Franck Morvan and Abdelkader Hameurlain Estimation error-aware query optimization: an overview . . . . . . . ?? Zhe Wei and Fang Wang and Le Sun A practical reliable reputation based data fusion method for ad-hoc wireless sensor networks . . . . . . . . . . . . ?? Senem Kumova Metin Neighbour unpredictability measure in multiword expression extraction . . . . ?? Sasa Kresoja and Milos Rackovic and Srdjan Skrbic and Bojana Dimic Surla A Petri Net extension for formal modelling of information systems . . . . ?? Jun Wu Energy efficient dual execution mode scheduling for real-time tasks with shared resources . . . . . . . . . . . . ??
Doohee Song and Kwangjin Park Adaptive hierarchical bitmap-based index for wireless broadcast environments in an emergency . . . . . . . . . . . . . . ?? Md. Sarwar Kamal and Sonia Farhana Nimmy and Sazia Parvin Performance evaluation comparison for detecting DNA structural break through big data analysis . . . . . . . . . . . ?? Seungdo Jeong and Sang-Wook Kim and Byung-Uk Choi Effective indexing and searching with dimensionality reduction on high-dimensional space . . . . . . . . . ?? Alessio Angius and András Horváth and Sami M Halawani and Omar Barukab and Ab Rahman Ahmad and Gianfranco Balbo Exploiting flow equivalent server in transient analysis . . . . . . . . . . . ??
Ahmad Abdullah Alqarni and Eric Pardede XML schema matching using early dissimilarity detection approaches . . . ?? Alexander Thomasian and Jun Xu Data allocation in a Heterogeneous Disk Array (HDA) with multiple RAID levels for database applications . . . . . . . ?? Petre Anghelescu FPGA implementation of programmable cellular automata encryption algorithm for network communications . . . . . . . ?? Giuseppe Della Penna and Daniele Magazzeni and Sergio Orefice Extending visual information extraction to biomedical applications . . . . . . . ??
Guest Editors: Zheng Xu and Vijayan Sugumaran and Hui Zhang Special issue: Cyber-Physical System-related Technologies and Applications . . . . . . . . . . . . . . ?? Qiu Ling and Qi Linkai water-related public organizations . . . ?? Quan-Dong Feng and Miao Xu and Xin Zhang The scalable vocabulary tree based model for sub-image retrieval . . . . . . . . ?? Liu Ranran and Zheng Enxing and Chang Shan and Bei Shaoyi and Zhang Lanchun Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems . . . . . . . . ?? Liu Ranran and Zheng Enxing and Chang Shan and Bei Shaoyi and Zhang Lanchun Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise . . . . . . . . . . . . . ?? Tao Guo and Xiang Fang and Mingshou Zhong and Huayuan Ma and Yiming Mao Research on the effects of blasting vibration attenuation by pre-split crack with HHT method . . . . . . . . . . . . ?? Zheng Enxing and Liu Ranran and Jiang Yifeng and Sun Yuxia and Ni FuYin Stochastic gradient identification for Hammerstein systems with non-uniformly sampling . . . . . . . . . . . . . . . . ?? Tian Run Hu and Zhang Yan Bin and Jia Lixin The realization of multi agent based online trading systems based on J2EE technology . . . . . . . . . . . . . . . ?? Qingyuan Zhou and Juan Luo The service quality evaluation of ecologic economy systems using simulation computing . . . . . . . . . . ?? Cui-Xia Zhang The state space model of remanufacturing carbon footprint for low-carbon . . . . ?? Wenshu Bao and Haiying Zhou and Wang Lu and Feng Xie The system of knowledge management using web based learning and education technology . . . . . . . . . . . . . . . ?? Yitong Niu and Mingming Xiong and Jianyi Guo and Cunli Mao and Yantuan Xian and Zhengtao Yu Using cross ambiguity model improves the effect of Vietnamese word segmentation ??