Last update:
Mon Jun 12 12:36:31 MDT 2023
C. Boswell and
K. K. Saluja and
K. Kinoshita Design of Programmable Logic Arrays for
Parallel Testing . . . . . . . . . . . . 5--16
Kinji Mori and
Shyoji Miyamoto and
Hirokazu Ihara Autonomous Decentralized Computer System
and Software Structure . . . . . . . . . 17--22
P. Corsini and
C. A. Prete and
L. Simoncini MuTEAM: An experience in the design of
robust multiprocessor systems . . . . . 23--35
C. D. Spyropoulos and
D. J. Evans Performance Analysis of Priority-Driven
Algorithm for Multiprocessor . . . . . . 36--46
Christopher S. Wallace and
David Koch TTL-compatible Multiport Bus . . . . . . 47--52
G. Haring and
H. Schelch Modelling of RPS Disc Systems . . . . . 53--64
Barbara K. Lee Implementing a Quality Circle Programme
for Computer Professionals . . . . . . . 65--67
Sang Hyuk Son and
Ashok K. Agrawala Algorithm for Concurrency Control in
Replicated Databases . . . . . . . . . . 75--81
Milena M. Didic and
Peter Kohlhepp and
Reinhold Oberle Design Considerations for a Distributed
Real-Time Unclear Reactor Safety System 82--92
Jonathan Bowen Design of a Simple Cambridge Ring
Interface Adapter . . . . . . . . . . . 93--98
S. Balsamo and
G. Iazeolla Synthesis of Queueing Networks with
Block and State-Dependent Routing . . . 99--108
G. C. Pentzaropoulos and
G. C. Barney and
W. Swindells Performance Modelling of Serc Prime
Computer System . . . . . . . . . . . . 109--113
K. S. Lew and
T. S. Dillon and
K. E. Forward Model of Error Propagation in Database
Systems . . . . . . . . . . . . . . . . 114--118
R. L. Ennis and
J. H. Griesmer and
S. J. Hong and
M. Karnaugh and
J. K. Kastner and
D. A. Klein and
K. R. Milliken and
M. I. Schor and
H. M. Van Woerkom Automation of MVS Operations; an
Expert-Systems Approach . . . . . . . . 119--124
Kang G. Shin and
C. M. Krishna New Performance Measures for Design and
Evaluation of Real-Time Multiprocessors 179--192
Helen D. Karatza Simulation Study of Multitasking of Open
Computer System Networks . . . . . . . . 193--204
P. Corsini and
G. Frosini Methodology for Complex System
Description via Extended Petri Nets . . 205--212
Yinghua Min and
Zhongcheng Li Pseudo-Exhaustive Testing Strategy for
Large Combinational Circuits . . . . . . 213--220
J. R. Barra and
M. Becker and
E. F. Kouka and
M. Tricot Application of Data Analysis Methods and
of Simulated Annealing for the Automatic
Layout of Circuits . . . . . . . . . . . 3--15
Ahmed K. Elmagarmid Fault-Tolerant Deadlock Detection in
Distributed Database Systems . . . . . . 16--28
Yang-Chang Hong and
Thomas H. Payne Efficient Computation of Dataflow Graphs
in a Hypercube Architecture . . . . . . 29--41
Helen D. Karatza Simulation Study of Multitasking of
Closed Computer System Networks . . . . 42--51
Balakrishna R. Iyer and
Philip S. Yu and
Lorenzo Donatiello Analysis of Fault Tolerant
Multiprocessor Architectures for Lock
Engine Design . . . . . . . . . . . . . 59--75
Sang Hyuk Son On Multiversion Replication Control in
Distributed Systems . . . . . . . . . . 76--84
Herman Hughes and
Ke Ren Chuang and
Parviz Yegani Give-Up-Based Protocol for Token Passing 85--91
Lawrence W. Dowdy and
Karen D. Gordon Performance Sensitivity with Respect to
the Distribution of the Multiprogramming
Level . . . . . . . . . . . . . . . . . 92--98
A. R. Hurson and
L. L. Miller Database Machine Architecture for
Supporting Incomplete Information . . . 107--116
C. Y. Wong and
T. S. Dillon and
K. E. Forward Concurrent, Real-Time Systems: a
Systematic Approach Using Timed Petri
Nets . . . . . . . . . . . . . . . . . . 117--124
Herman Hughes and
Horng Jiang and
Susanne Smith Voice/Data Integrated Transmission on a
Time Division CSMA/CD Network . . . . . 125--130
T. Downs Reliability Problems in Software
Engineering --- a Review . . . . . . . . 131--147
M. A. Bassiouni and
A. Gupta Computing Estimates of Waiting Times in
Ring Local Area Networks with Priority
Classes . . . . . . . . . . . . . . . . 155--160
Y. W. Yak and
T. S. Dillon and
K. E. Forward Modelling the Effect of Transient Faults
in Fault-Tolerant Computer Systems . . . 161--166
V. Varadharajan and
K. D. Baker Net-Based System Design Representation
and Analysis . . . . . . . . . . . . . . 167--178
M. E. C. Hull and
R. G. Roulston and
T. R. S. Gregg Interactive Computing Service Monitoring
System . . . . . . . . . . . . . . . . . 179--185
Jason Gait Synchronizing Multiprocessor Access to
Shared Operating System Data Structures 186--191
Anon Design of I/O Drivers for a
High-Availability Unix . . . . . . . . . 193--196
S. M. Shatz Superprocesses: a Distributed Program
Configuration Concept Supporting . . . . 3--12
Herman Hughes and
Parviz Yegani and
Jih-Shyr Yih CSMA/CD Protocol with Message-Based
Priority Function . . . . . . . . . . . 13--20
Kang G. Shin and
Heungkyu Lee Port Manipulator for the Distributed
Realization of an Integrated
Manufacturing System . . . . . . . . . . 21--31
F. Di Giandomenico and
M. L. Guidotti and
F. Grandoni and
L. Simoncini Gracefully Degradable Algorithm for
Byzantine Agreement . . . . . . . . . . 32--40
R. K. Molnar and
S. C. Bruell Sensitivity of Operational Formulae . . 51--66
Ajoy K. Datta and
Sukumar Ghosh and
Douglas Harms and
Ahmed K. Elmagarmid Deadlock-Avoidance Mechanisms in
Distributed Systems . . . . . . . . . . 67--82
Heiko Schroder Instruction Systolic Array --- Tradeoff
Between Flexibility and Speed . . . . . 83--90
Simin Pakzad and
S. Lakshmivarahan Interconnection Networks and Fault
Tolerance . . . . . . . . . . . . . . . 91--99
Ajoy K. Datta and
Sukumar Ghosh and
Muhundan Gopalan and
Ahmed K. Elmagarmid Pipelining and concurrency in graphics
and image-processing applications . . . 107--116
C. Robach and
S. Guibert Testability measures: a Review . . . . . 117--126
Vernon Rego and
Wojciech Szpankowski Closed-network duals of multiqueues with
application to token-passing systems . . 127--139
E. S. Harrison and
E. J. Schmitt Structure of System/88, a fault-tolerant
computer . . . . . . . . . . . . . . . . 140--162
Luigi Mancini and
Giuseppe Pappalardo Hoare logic of distributed redundant
systems . . . . . . . . . . . . . . . . 171--180
Ratan K. Guha and
Arthur F. Dickinson and
Allan Kikawa Analysis of CMH deadlock-detection
algorithm using transmission delays . . 181--188
Arumalla V. Reddi Secondary memory analysis of a
mini/microcomputer in resource-sharing
distributed information systems . . . . 189--198
S. Bedi File system activity and the
distribution of disc transfers on a
multiaccess system . . . . . . . . . . . 199--200
Balakrishna R. Iyer and
Daniel M. Dias and
Philip S. Yu Performability comparison of
configurable duplex systems . . . . . . 201--215
F. Di Giandomenico and
M. L. Guidotti and
F. Grandoni and
L. Simoncini Evaluating the Efficiency of Byzantine
Agreement Algorithms . . . . . . . . . . 3--11
Jason Gait and
Terry Laskodi and
Rick Krull Interactive Monitor for a Communication
Kernel . . . . . . . . . . . . . . . . . 154--160
Anonymous Editorial . . . . . . . . . . . . . . . 3
G. Ciccarella and
G. Paris and
G. Valent Top-down approach to the design of OCCAM
and transputer-based real-time systems 5--12
Kevin A. Murray and
Andy J. Wellings Wisdom: a distributed operating system
for transputers . . . . . . . . . . . . 13--20
Qingping Guo and
Yakup Paker Concurrent communication and granularity
assessment for a transputer-based
multiprocessor system . . . . . . . . . 21--28
Harald Richter Multiprocessor with dynamically variable
topology . . . . . . . . . . . . . . . . 29--35
X. L. Deng and
T. Dillon and
K. Lew and
J. Rankin and
E. Smith and
D. Suter Optimal topologies of transputers for
different classes of problems . . . . . 36--41
A. G. Chalmers and
J. W. Hearne and
K. J. Cameron and
N. E. Ligeti Implementation and performance
evaluation of an optimization algorithm
on transputers . . . . . . . . . . . . . 42--46
R. K. Cooper and
D. A. Peshkin Parallel alternating direction implicit
method on a network of transputers . . . 47--52
Pradip K. Srimani and
Shivakant Mishra Performance evaluation of distributed
mutual exclusion algorithms for computer
networks . . . . . . . . . . . . . . . . 59--64
M. Becker and
C. Dekoninck and
J. P. Prost and
B. Verrier Stochastic Petri net model for the
FPS/264 . . . . . . . . . . . . . . . . 65--72
M. Seetha Lakshmi and
Philip S. Yu Effectiveness of parallel processing in
database systems . . . . . . . . . . . . 73--81
C. S. Wallace Physically random generator . . . . . . 82--88
David Finkel Modelling dynamic load-sharing in a
distributed computing system . . . . . . 89--94
Edmond F. Kouka and
Jean Luc Patry Algorithms for restructuring WSI arrays
of processors . . . . . . . . . . . . . 95--104
Y. M. Lam and
H. T. Mouftah and
M. Ilyas Performance analysis of CSMA-CD
protocols in local area bus networks . . 105--110
C. P. Ravikumar and
L. M. Patnaik Performance improvement of simulated
annealing algorithms . . . . . . . . . . 111--115
Hong-Fa Ho and
Gen-Heuy Chen and
Te-Son Kuo Branch testing of concurrent programs
using Petri net models . . . . . . . . . 116--125
Sajal K. Das and
Narsingh Deo Parallel Hungarian algorithm . . . . . . 131--136
Paul T. Hulina and
Lee D. Coraor Coprocessor architectures for efficient
address computation and memory accessing 137--146
Jin-Chin Wang and
Michel Dubois Performance comparison of cache
coherence protocols based on the access
burst model . . . . . . . . . . . . . . 147--158
G. M. Megson Complex Eigenproblem solution by a
parallel norm-reducing Jacobi method . . 159--168
B. Beresford-Smith and
H. Schroder Effective reconfiguration algorithms in
fault-tolerant processor arrays . . . . 169--177
Vincenza Carchiolo and
Antonella Di Stefano and
Alberto Faro and
Giuseppe Pappalardo Case study in protocol verification . . 178--186
Milind Mahajan and
V. K. Prasanna Kumar Efficient parallel implementation of
RETE pattern matching . . . . . . . . . 187--192
Reda A. Ammar Algorithmic approach to construct
probabilistic grammatical models of
command streams in interactive software
systems . . . . . . . . . . . . . . . . 195--201
Dilip Sarkar and
Ratan Kumar Guha Mapping a class of algorithms from
binary tree machines to linear arrays 202--204
David P. Stotts Bounding procedure execution times in a
synchronous Petri net computation model 205--214
Hyuk Son Sang Reconstruction of distributed databases 215--222
Tad Hogg and
J. O. Kephart Phase transitions in high-dimensional
pattern classification . . . . . . . . . 223--232
Shih-Chian Yang and
John A. Silvester Fault-tolerant multistage
interconnection networks:
performance/reliability tradeoffs . . . 233--242
Douglas W. Cornell and
Philip S. Yu Integrated approach to buffer management
and query optimization . . . . . . . . . 243--251
C. P. Ravikumar and
Sarma Sastry and
L. M. Patnaik Parallel min-cut placement on reduced
hardware SIMD architecture . . . . . . . 3
Amos R. Omondi Design of a high performance instruction
pipeline . . . . . . . . . . . . . . . . 13--29
D. Crookes and
P. J. Morrow and
P. J. McParland Occam implementation of an algebra-based
language for low-level image processing 30
Helen D. Karatza Simulation of load balancing and
multitasking in a homogeneous
distributed system model . . . . . . . . 37
Daniel M. Dias and
Philip S. Yu and
Brian T. Bennett Analysis of trade-offs between
centralized and geographically
distributed transaction processing
systems . . . . . . . . . . . . . . . . 45
David L. Landis and
Daniel C. Muha Optimal maintenance resource allocation
for multiprocessor systems . . . . . . . 54
Franz Schreiner and
Gerhard Zimmermann Pesa-I: a Parallel and Distributed
Architecture for Production Systems . . 67
Arumalla V. Reddi Memory performance of microcomputers at
large user nodes of distributed systems 85
A. R. Hurson and
L. L. Miller and
S. H. Pakzad and
C. Fan Functional dependencies to enforce
integrity constraints in database
machine environments . . . . . . . . . . 91
Paul V. Shebalin and
Sang H. Son and
Chun-Hyon Chang Software safety analysis in distributed
systems . . . . . . . . . . . . . . . . 102
A. E. Conway and
D. O'Brien Validation of an approximation technique
for queueing network models with
chain-dependent FCFS queues . . . . . . 117
J. C. Muzio and
M. Serra Data compaction for bridging faults . . 131
L. Marinos and
M. P. Papazoglou and
D. Christodoulakis Data integration methodology for an
office environment . . . . . . . . . . . 143
X.-L. Deng and
T. Dillon and
K. Lew Reconfigurable transputer-based
architecture . . . . . . . . . . . . . . 152
Bin Qin and
Reda A. Ammar and
Howard A. Sholl Allocating processing power to minimize
time costs in parallel software systems 159
Pradip K. Srimani Heuristic deadlock avoidance algorithm
in a distributed system . . . . . . . . 170
Peter Richardson and
Dzaharudin Mansor and
T. S. Dillon and
K. E. Forward Fault-tolerant approach to the design of
a Signalling Transfer Point: Part 1 . . 178
Chin-Chen Chang and
Tzong-Chen Wu Broadcasting cryptosystem in computer
networks using interpolating polynomials 185
Jozo J. Dujmovic Clustering, comparison and selection of
standard synthetic benchmark programs 195--210
Dzaharudin Mansor and
Peter Richardson and
Tharam S. Dillon and
Kevin E. Forward Design, implementation and evaluation of
a fault-tolerant signalling network
management system. Part II . . . . . . . 211--226
Chihping Wang and
Victor O. K. Li Precedence-agreement concurrency control
algorithm for distributed database
systems . . . . . . . . . . . . . . . . 227--237
N. Ranganathan and
Amar Mukherjee and
M. Bassiouni VLSI algorithms for data compression . . 238--253
D. F. Ross and
R. H. Davis Comparative study of performance of
concurrency control algorithms in a
centralized database . . . . . . . . . . 3--16
L. L. Miller and
A. R. Hurson and
J. K. Huang and
S. H. Pakzad Comparing database processor
configurations in the database machine
ASLM . . . . . . . . . . . . . . . . . . 17--24
Bruno Ciciani and
Daniel M. Dias and
Philip S. Yu Dynamic and static load sharing in
hybrid distributed-centralized database
systems . . . . . . . . . . . . . . . . 25--41
S. Srinivas and
A. Basu and
K. G. Kumar and
A. Paulraj and
L. M. Patnaik Pipelined ring algorithm for matrix
multiplication on transputer networks.
Performance analysis and estimation . . 42--51
Yann-Hang Lee and
Philip S. Yu Adaptive access path selection for
relational database systems . . . . . . 52--61
Anonymous Editorial . . . . . . . . . . . . . . . 67
H. Lam and
S. Y. W. Su and
V. Ruhela and
S. Pant and
S. M. Ju and
M. Sharma and
N. Prasad GTOOLS: an active GUI toolset for an
object-oriented KBMS . . . . . . . . . . 69--85
Jean-Christophe Burneau and
Odile Thiery Classifying evolving objects in
object-oriented knowledge bases . . . . 86--90
James G. Mullen FBASE: a federated objectbase system . . 91--99
Amelia Choi and
W. S. Luk Using an object-oriented database system
to construct a spatial database kernel
for GIS applications . . . . . . . . . . 100--121
P. L. Tan and
T. S. Dillon Incorporating semantics, relationships
and exceptions into object oriented data
models . . . . . . . . . . . . . . . . . 122--135
Sherman R. Alpert and
Mary Beth Rosson ParCE: an object-oriented approach to
context-free parsing . . . . . . . . . . 136--144
C. P. Ravikumar Parallel $r$-dimensional placement on a
vector minisupercomputer . . . . . . . . 147--151
Walter B. Ligon III and
Aditya P. Mathur Parallel parsing on a transputer network 152--159
J. H. Kim and
S. M. Reddy Easily testable and reconfigurable
two-dimensional systolic arrays . . . . 160--169
Reda A. Ammar and
Matthew J. Krzych Computer aided performance engineering.
A survey . . . . . . . . . . . . . . . . 170--189
Constantine Katsinis Performance modelling of message-based
multiprocessors under heavy traffic . . 190--198
Jie Wu and
Eduardo B. Fernandez Comparison connection assignments for
diagnosis of multiprocessor systems
under a two-fault assumption . . . . . . 199--201
Ahmed Kamel and
Ahmed Nazif and
Ossama El-Dessouki and
Nabil Kamel MCFS: a multiple criteria reasoning
fuzzy expert systems building tool . . . 202--208
Jenshiuh Liu and
Chi-Ming Chiang and
Herman D. Hughes Performance analysis of load-sharing for
multiprocessor systems . . . . . . . . . 210
Adam Kapralski Algorithms for processing NP-complete
and isomorphic complete problems . . . . 218
Xian-He Sun and
Nabil N. Kamel Augmenting multikey searching structure
for general database queries . . . . . . 229
Theodore K. Apostolopoulos Performance of read-only transactions in
a distributed system . . . . . . . . . . 236
A. Dubey and
M. Zubair and
C. E. Grosch Real Fourier transforms on a massively
parallel machine . . . . . . . . . . . . 243
D. Chennapragada and
P. Looges and
S. Olariu Single row routing with indifference
graphs on the Distributed Array
Processor . . . . . . . . . . . . . . . 249
Ramesh Dutt Javagal and
Ajoy Kumar Datta and
Sukumar Ghosh An algorithm for resource deadlock
detection in distributed systems . . . . 257
M. Colajanni and
S. Tucci Equivalence relation between Fork-Join
systems and $N$-stage queueing networks 3--12
Rudy Lauwereins and
Jean Peperstraete Queueing theoretical analysis of
processor utilization in parallel
computers . . . . . . . . . . . . . . . 13--23
Andreas Stafylopatis Performance of parallel computations of
triangular structure . . . . . . . . . . 24--32
Chyan Yang Multigauge computers and their
applications . . . . . . . . . . . . . . 33--39
Avraham Leff and
Philip S. Yu and
Joel L. Wolf Performance issues in object replication
for a remote caching architecture . . . 40--51
Namhyung Kim and
Vinod K. Agarwal Concurrent error detection schemes for
the match function . . . . . . . . . . . 52--56
A. E. Kamal Modelling multibus interconnection
networks using state aggregation . . . . 57--63
Lorrie L. Hoffman Improved performance evaluation of
distributed mutual exclusion algorithms
for computer networks . . . . . . . . . 67--71
A. B. Romanovsky and
I. V. Shturtz Unplanned recovery for non-program
objects . . . . . . . . . . . . . . . . 72--79
N. C. Audsley and
A. Burns and
M. F. Richardson and
A. J. Wellings Incorporating unbounded algorithms into
predictable real-time systems . . . . . 80--89
Bin Qin and
Reda A. Ammar Analytic approach to deriving time costs
of parallel computations . . . . . . . . 90--100
Willi Gunter Design and implementation of the
Attempto fault-tolerant system . . . . . 101--108
Chen Ping and
Cai Xiyao and
Jin Yimin XDRC++: a reflective architecture in the
C++ language . . . . . . . . . . . . . . 109--120
Tzong-Chen Wu and
Yi-Shiung Yeh Cryptosystem for selectively
broadcasting separate secrets . . . . . 121--124
Elizabeth Chang and
T. S. Dillon Two phase methodology for the design of
the human computer interface . . . . . . 131--143
Ling Chen Systematic design of systolic arrays
from affine recurrence techniques . . . 144--153
Alexander Thomasian and
Behzad Nadji State representation tradeoffs in Markov
chains of serialization delays in
computer systems . . . . . . . . . . . . 154--165
P. M. Miller and
A. R. Hurson and
R. H. Hettmansperger Modular scheme for designing associative
memories . . . . . . . . . . . . . . . . 166--181
Jing-Long Wang and
Meng-Hong Shie and
Liang-Teh Lee Asymmetrically-initiated load balancing
policy for distributed systems . . . . . 187--194
C. Ho and
S. A. Mabbs and
K. E. Forward Performance modeling of the MR-1
multiprocessor using extended
deterministic and stochastic Petri nets 195--209
H. T. Liaw and
S. J. Wang and
C. L. Lei Secure dynamic user hierarchy scheme
based on the knapsack problem . . . . . 210--216
Sumit Sur and
Pradip K. Srimani Self-diagnosability properties of
hypercubes and star graphs and diagnosis
algorithms . . . . . . . . . . . . . . . 217--223
Jie Wu and
Eduardo B. Fernandez Fault-tolerant distributed broadcast
algorithm for cube-connected cycles . . 224--233
Andrea Bondavalli and
Felicita Di Giandomenico and
Jie Xu Cost-effective and flexible scheme for
software fault tolerance . . . . . . . . 234--244
Chhping Wang and
Victor O. K. Li and
Arbee L. P. Chen One-shot semi-join execution strategies
for processing distributed join queries 245--253
Yoshiro Tohma Review of fault-tolerant computing for
safely critical applications in Japan 3--10
Hongying Wang and
Douglas M. Blough and
Leon Alkalaj Practical approach to comparison-based
fault diagnosis in multiprocessor
systems . . . . . . . . . . . . . . . . 11--20
Her-Kun Chang and
Shyan-Ming Yuan Efficient algorithm for evaluating the
availability of multidimensional voting 21--24
Yoshiro Tohma and
Yukichi Matsunaga Application of hyper-geometric
distribution model to the hardware
debugging process . . . . . . . . . . . 25--30
H. Ito WSI network design and its evaluation
using yields . . . . . . . . . . . . . . 31--37
Yukiya Miura and
Jung Li and
Wang Li and
Naito Sachio Four-valued logic system and its
application to describing the
specification and design verification of
combinational circuits . . . . . . . . . 38--45
Takashi Nanya Anti-code-disjoint mapping for exception
handling in self-checking systems
hierarchy . . . . . . . . . . . . . . . 46--53
Tomohiro Yoneda and
Toru Egashira and
Yoshihiro Tohma Improving a fault-tolerant clock
synchronization algorithm by
overcorrection . . . . . . . . . . . . . 54--64
Carlson Ho and
Kevin E. Forward Verification and validation of hardware
designs via hardware Petri nets . . . . 65--72
K. H. Kim and
L. F. Bacellar and
J. Goldberg and
K. Masui and
K. Mori and
R. Yoshizawa Modular implementation model for
real-time fault-tolerant LAN systems
based on the DRB scheme with a
configuration supervisor . . . . . . . . 75--82
Shinji Kusumoto and
Ken-ichi Matsumoto and
Tohru Kikuno and
Kazuhiro Tanaka Improvement of the software development
process by using fault tolerant
techniques . . . . . . . . . . . . . . . 83--88
Oliver Theel Meeting the application's needs: a
design study of a highly customized
replication scheme and its
implementation . . . . . . . . . . . . . 89--97
Henning Koch Embedding protocols for scalable
replication management . . . . . . . . . 98--103
Tom Downs Modelling software testing for
reliability prediction . . . . . . . . . 104--111
Hiromi Hiraishi and
Tatsuya Nakae Efficient inverse image computation
algorithm for sequential machine
verification using temporal logics . . . 112--117
Elizabeth Chang and
Tharam S. Dillon Achieving software reliability and fault
tolerance using the object oriented
paradigm . . . . . . . . . . . . . . . . 118--121
Kent C. Clapp and
Ravishankar K. Iyer Large system test data analysis . . . . 122--133
Òystein Torbjòrnsen and
Svein-Olaf Hvasshovd Application of an abstract machine
supporting fault-tolerance in a parallel
database server . . . . . . . . . . . . 134--141
Jörgen Christmansson and
Zbigniew Kalbarczyk and
Jan Torin Dependable Flight Control System Using
Data Diversity with Error Recovery . . . 142--150
A. Pombortsis and
A. Menos Modelling a class of resource sharing
interconnection networks using timed
Petri nets . . . . . . . . . . . . . . . 155--163
Chiun-Chieh Hsu On the allocation of processors to tasks
with precedence constraints and
communication overhead . . . . . . . . . 164--174
D. Bhagavathi and
W. M. Denny and
C. E. Grosch and
P. J. Looges and
S. Olariu Sorting and merging on the DAP . . . . . 175--183
Constantine Katsinis and
Amelie Constant Effect of queue selection and service
time distributions in multiple resource
allocation . . . . . . . . . . . . . . . 184--194
L. L. Miller and
J. Leszczylowski and
S. K. Gadia and
P. Chan Storage model for processing semantic
exceptions . . . . . . . . . . . . . . . 195--204
Constantinos V. Papadopoulos Provably optimal routing algorithms for
signal routing . . . . . . . . . . . . . 211--219
Rasiah Loganantharaj and
Ay-Hwa A. Liou Recent results on parallel link
resolution . . . . . . . . . . . . . . . 220--233
Alexander B. Romanovsky Recovery unification for concurrent
heterogeneous systems . . . . . . . . . 234--239
Patrick M. Lenders and
Heiko Schroder Minimizing data flow in mathematical
morphology architectures . . . . . . . . 240--245
David Finkel and
Xiannong Meng and
Sanjay Parikh Load sharing that supports fault
tolerance in a distributed computing
system . . . . . . . . . . . . . . . . . 246--254
Giuseppina C. Gini and
C. Rogialli CONSTRICTOR: a constraint-based language 255--261
Kian-Lee Tan and
Hongjun Lu Skew handling strategies for pipelined
processing of multi-join queries in
shared-nothing systems . . . . . . . . . 3--18
Ravi Mittal and
Deepak Cherian Self-routing double tree (DOT) network,
its permutation capability and
applications . . . . . . . . . . . . . . 19--27
Wei Wei Constructing reliable neural network
systems using less reliable neuron
network components . . . . . . . . . . . 28--32
M. Ghose and
M. Zubair and
C. E. Grosch Parallel partitioning of sparse matrices 33--40
Son T. Vuong and
George K. Tsiknis Significant event temporal logic: a
method for protocol specification and
verification . . . . . . . . . . . . . . 41--49
Mikal Ziane and
Mohamed Zait and
Hong Hoang Quang Parallelism and query optimization . . . 50--56
Hsiou-Mien Lien and
Shyan-Ming Yuan SGHC: a new class of optimally
fault-tolerant networks . . . . . . . . 57--64
Jonathan Jen-Rong Chen and
Henry Ker-Chang Chang Secure information broadcasting scheme
using embedded locks . . . . . . . . . . 67--74
Ajoy Kumar Datta and
Oscar R. Aguilar and
Mitchell Flatebo and
Sukumar Ghosh Simulating shared memory primitives in
asynchronous message passing systems . . 75--83
A. Kuchlos and
C. P. Ravikumar Two-way partitioning of shuffle-exchange
and DeBruijn graphs . . . . . . . . . . 84--92
Tzong-Chen Wu and
Tzong-Sun Wu and
Wei-Hua He Dynamic access control scheme based on
the Chinese remainder theorem . . . . . 92--99
B. Pradeep and
C. Siva Ram Murthy Sorting on mesh-connected computers with
multiple broadcasting using $ N^{2 / 3}
\times N^{2 / 3} $ processors . . . . . 100--110
Yen-Wen Lin and
Shyan-Ming Yuan and
Deron Liang Design and implementation of Moony: a
fault tolerant distributed shared memory
system . . . . . . . . . . . . . . . . . 111--119
Cui-Qing Yang and
Yaoshuang Qu Reliability analysis for the execution
of remote jobs in a workstation-based
environment . . . . . . . . . . . . . . 120--128
S. Olariu and
J. L. Schwing and
J. Zhang Fast adaptive convex hull algorithm on
two-dimensional processor arrays with a
reconfigurable bus system . . . . . . . 131--137
C. P. Ravikumar Parallel $r$-dimensional placement on a
vector minisupercomputer . . . . . . . . 138--143
L. Lilien and
S. M. Shatz and
S. Damerla Redistribution of hierarchically
structured software in response to
distributed system site crashes . . . . 144--155
C. C. Jong and
G. N. Toh and
L. S. Ng Automatic generation of customized
functional models for rapid
implementation of digital integrated
circuits . . . . . . . . . . . . . . . . 156--163
M. Mohsin and
B. Gupta Fault-tolerance in pyramid tree network
architecture . . . . . . . . . . . . . . 164--172
D. Saha Improved topology for achieving
reliability in high-speed tree LANs . . 173--178
Ch.-zong Lin and
Ch.-Ch. Tseng and
Kw.-H. Chi Design of an efficient data-driven
pipelined computer architecture . . . . 179--186
K.-L. Chung and
Yu-W. Chen Fault-tolerant embedding multiple
complete binary trees into hypercubes 187--191
Mike P. Papazoglou and
Alex Denis and
Bernd J. Krämer Use of middleware facilities in
interoperable databases . . . . . . . . 195--206
Tao Wang and
Wuxu Peng Improving Internet routing information
protocol . . . . . . . . . . . . . . . . 207--213
Suresh K. Damodaran-Kamal and
Niki Pissinou Shared access and communication in
distributed databases using an object
environment . . . . . . . . . . . . . . 214--222
Dinesh Kadamuddi and
Jeffrey J. P. Tsai MDDT constructs for incorporating
early-receives in distributed computing 223--233
W. Melody Moh and
Yu-Jen Chien and
Teng-Sheng Moh and
Charles U. Martel Prioritized conflict resolution on
multiple access broadcast networks:
algorithms and performance . . . . . . . 234--243
W. A. Woods and
H. D. Moser and
O. Frieder and
Paul B. Kantor Simulation evaluation of task scheduling
on reconfigurable multicomputer
architectures . . . . . . . . . . . . . 244--254
Javier Cordova and
Yann-Hang Lee Multicast trees to provide message
ordering in mesh networks . . . . . . . 3--13
R. Lai and
A. Jirachiefpattana Verifying Estelle protocol
specifications using numerical Petri
nets . . . . . . . . . . . . . . . . . . 15--33
Niki Pissinou and
Kanonkluk Vanapipat Active database rules in distributed
database systems: a dynamic approach to
solving structural and semantic
conflicts in distributed database
systems . . . . . . . . . . . . . . . . 35--44
D. Manivannan and
M. Singhal Decentralized token generation scheme
for token-based mutual exclusion
algorithms . . . . . . . . . . . . . . . 45--54
Shyan-Ming Yuan and
Jeng-Dar Wu and
Dong-Lieng Wang SHDS --- an X-Window based
semi-hypermedia document system . . . . 55--64
Sadiq M. Sait and
Khaled M. Elleithy and
Masud-ul Hasan Formal synthesis of VLSI layouts from
algorithmic specifications . . . . . . . 67--81
Tomislav Lovric Detecting hardware faults with
systematic and design diversity:
Experimental results . . . . . . . . . . 83--92
S. K. Dash and
B. Jha Global numerical weather model
integrated on a transputer-based
parallel computer . . . . . . . . . . . 93--98
Yahui Zhu Fast processor allocation and dynamic
scheduling for mesh multiprocessors . . 99--107
A. B. Romanovsky and
I. V. Shturtz Dynamic conversions . . . . . . . . . . 109--116
Jiann-Fu Linn and
Sao-Jie Chen Analysis of multiprocessor task
scheduling . . . . . . . . . . . . . . . 117--120
D. M. Johnson Integrated modular avionics: a scheme
for autonomous dynamic system
reconfiguration . . . . . . . . . . . . 125--133
Marwan Krunz and
Ron Sass and
Herman Hughes Study of VBR MPEG-coded video traffic
and associated multiplexing performance 135--143
Shahram Latifi and
Nader Bagherzadeh On clustered-star graph and its
properties . . . . . . . . . . . . . . . 145--149
Xiaohua Jia and
Kentaro Shimizu and
Mamoru Maekawa Atomic accesses to replicated files in
reliable distributed file systems . . . 151--158
Mark J. Clement and
Michael J. Quinn Architectural scaling and analytical
performance prediction . . . . . . . . . 159--167
Constantine Katsinis and
Pat Hogan Concurrent multitasking applications on
a shared-bus multicomputer system . . . 169--176
Allan K. Y. Wong and
Daniel S. Yeung RHS --- a framework for exploiting
distributed parallelism efficiently . . 177--184
Zahira S. Khan and
Eugene Kwatny Performance comparison of interprocessor
communication schemes for a hashing
technique on the Connection Machine . . 189--194
Naphtali Rishie and
Artyom Shaposhnikov and
Scott Graham Load balancing in a massively parallel
semantic database . . . . . . . . . . . 195--199
A. V. Shafarenko RETRAN: a recurrent paradigm for
data-parallel computing . . . . . . . . 201--209
M. Dal Cin and
H. Hessenauer and
W. Hohl The Modular Expandable Multiprocessor
System, MEMSY . . . . . . . . . . . . . 211--219
Nader Bagherzadeh and
Martin Dowd Problems on routing bounded distance
assignments in hypercubes . . . . . . . 221--226
Sam Lor and
Hong Shen and
Piyush Maheshwari Divide-and-conquer minimal-cut
bisectioning of task graphs . . . . . . 227--234
Sampalli Srinivas and
Nripendra N. Biswas Fast algorithm for data exchange in
reconfigurable tree structures . . . . . 235--243
Gibor Nemeth Scheduling, timing and intractability in
massively parallel systems . . . . . . . 245--254
Habib Youssef and
Sadiq M. Sait and
A. S. Al-Mulhelm and
M. S. T. Benten High-level synthesis from purely
behavioral descriptions . . . . . . . . 259--273
Matti A. Hiltunen and
Richard D. Schlichting Adaptive distributed and fault-tolerant
systems . . . . . . . . . . . . . . . . 275--285
Hamid R. Sharif and
Hamid Vakilzadian and
Sreekanth Nagisetty Design and analysis of a serial link
interconnection network architecture . . 287--299
I. Majzik and
W. Hohl and
A. Pataricza and
V. Sieh Multiprocessor checking using watchdog
processors . . . . . . . . . . . . . . . 301--310
Tzonelih Hwang and
Narn-Yih Lee and
Chuan-Ming Li and
Chin-Chen Chang On the security of Chang and Wu's
broadcasting cryptosystem for computer
networks . . . . . . . . . . . . . . . . 311--314
Jiann-Fu Lin and
Sao-Jie Chen Comment on `Broadcasting cryptosystem in
computer networks using interpolating
polynomials' . . . . . . . . . . . . . . 315--317
Erol Gelenbe and
Xiaowen Mang and
Yutao Feng Diffusion cell loss estimate for ATM
with multiclass bursty traffic . . . . . 325--333
Shuo-Yen Robert Li and
Chu Man Lau Concentrators in ATM switching . . . . . 335--342
Shih T. Liang and
Maria C. Yuang Departure process analysis for
earliest-due-date scheduling discipline
in ATM switches . . . . . . . . . . . . 343--352
Zigmantas Budrikis and
Steven Van Luinen and
Antonio Cantoni and
Vaughan Wittorff Performance evaluation of controlled
cell transfer service in ATM LAN . . . . 353--360
Hongyi Zhang and
Oliver W. Yang and
H. Mouftah Adaptive rate-based congestion control
in ATM switching networks . . . . . . . 361--367
W. Liu and
Erik Dirkx Parallel simulation of ATM switches . . 369--381
Philip W. Tse and
Moshe Zuckerman and
François Le Faucheur Performance and fairness issues related
to the EFCI rate-based flow control for
the ABR service in ATM networks . . . . 383--392
Bart Steyaert and
Herwig Bruneel Delay performance of CBR traffic in an
ATM multiplexer with high-priority
background traffic . . . . . . . . . . . 393--399
Andrzej Krasniewski Coverage of delay faults: single number
can be very misleading . . . . . . . . . 3--12
Yuh-Dauh Lyuu and
Eugen Schenfeld New algorithms for matrix operations
with applications to a reconfigurable
parallel architecture . . . . . . . . . 13--24
Kian-Lee Tan Decoupling load-balancing and
optimization issues: a two-phase query
processing framework for shared-nothing
systems . . . . . . . . . . . . . . . . 25--36
Jonathan J-R Chen and
Ping-Tai Sun New ID-based cryptosystem based on
number theory . . . . . . . . . . . . . 37--41
Shyan-Ming Yuan and
Yu-Kwen Hsu Design and implementation of a
distributed monitor facility . . . . . . 43--51
Chiun-Chieh Hsu and
Chien-Min Wang and
Jeen-Fong Lin Efficient loop allocation based on the
analysis of processor requirement of
loops with equivalent completion times 53--60
Hussein Mouftah and
Mohammed Atiquzzaman Special Issue: ATM Networks . . . . . . ??
Sanjeev Kumar and
Dharma P. Agrawal The shared-buffer direct-access (SBDA)
ATM switch architecture for broadband
networks . . . . . . . . . . . . . . . . 69--79
Simon Fong and
Samar Singh and
Mohammed Atiquzzaman Analytical model and performance
analysis of shared buffer ATM switches
under non-uniform traffic . . . . . . . 81--93
Yanhe Fan and
Nicolas Georganas Performance analysis of ATM switches
with self-similar input traffic . . . . 95--102
Yijun Xiong and
Lorne Mason Performance of multistage ATM switching
networks with multicast capability . . . 103--115
Latha Kant and
William H. Sanders Analysis of the distribution of
consecutive cell losses in an ATM switch
using stochastic activity networks . . . 117--129
H. Jonathan Chao and
Jun S. Hong Design of an ATM shaping multiplexer
with guaranteed output burstiness . . . 131--141
Rose P. Tsang and
David D. C. Hu Efficient interconnections for cascading
multiple ATM switches . . . . . . . . . 143--157
Tony T. Lee and
Philip P. To Non-blocking and self-routing properties
of sort-Clos networks . . . . . . . . . 159--169
Wei-Kuo Chiang and
Rong-Jaye Chen Block-switch networks: a cost-effective
class of interconnection networks . . . 175--185
Vassilios V. Dimakopoulos and
Nikitas J. Dimopoulos Broadcasting in hypercycles . . . . . . 187--192
Xiaohua Jia and
Wilson Cheng Distributed operating systems vs.
distributed system environments . . . . 193--203
Stephan Olariu and
James L. Schwing and
Jingyuan Zhang and
Albert Zomaya A time- and cost-optimal algorithm for
channel assignment . . . . . . . . . . . 205--211
Amitabha Sinha and
Arunava Sinha and
Subrata Choudhury New approach for splitting a class of
real-time algorithms for pipelined
processing . . . . . . . . . . . . . . . 213--220
Jamel M. Tahir and
Satnam S. Dlay and
Raouf N. Gorgui-Naguib and
Oliver R. Hinton Concurrent error detection in fast
Fermat number transform networks . . . . 221--226
Paul P. Ignatius and
C. Siva Ram Murthy On task allocation in heterogeneous
distributed computing systems . . . . . 231--238
Tzong-Chen Wu and
Bor-Ron Hwang On the design of a secure anonymous
conference key distribution system . . . 239--244
Bernd Bieker and
Geert Deconinck and
Erik Maehle and
Johan Vounckx Fault-tolerant routing, reconfiguration
and backward error recovery for parallel
systems . . . . . . . . . . . . . . . . 245--253
Hu-Jun Wang Analysis of prioritized cluster-based
crossbar systems . . . . . . . . . . . . 255--261
Kian-Lee Tan and
Jeffrey X. Yu Framework for scheduling partition-based
joins . . . . . . . . . . . . . . . . . 263--273
C. J. Semple and
V. Lakshmi Narasimhan Design and implementation of a
distributed system utilising task
farming on IBM PC compatible computers
and a Novell network . . . . . . . . . . 275--283
M. Bozyigit and
M. Melhi Load balancing framework for distributed
systems . . . . . . . . . . . . . . . . 287--293
Ajoy Kumar Datta and
Mitchell Flatebo and
Visalakshi Thiagarajan Simulation of self-stabilizing
algorithms . . . . . . . . . . . . . . . 295--306
D. J. V. Evans and
A. M. Goscinski Automatic identification of parallel
units and synchronization points in
programs for parallel execution on a
distributed system . . . . . . . . . . . 307--315
Avigdor Gal and
Opher Etzion Parallel execution model for updating
temporal databases . . . . . . . . . . . 317--327
Alexander Thomasian Approximate analyses for fork/join
synchronization in RAID5 . . . . . . . . 329--337
Anonymous Index to Volume 12, 1997 . . . . . . . . ??
Shyan-Ming Yuan and
Ashok K. Agrawala An efficient communication structure for
decentralized algorithms with fault
tolerance . . . . . . . . . . . . . . . 343--349
T. Srikanthan and
K. Y. Chan and
S. K. Leong Two-layer dynamic load balancing for a
transputer-based vehicle simulator . . . 351--358
Erik Demaine and
Sampalli Srinivas Routing algorithms on static
interconnection networks: a
classification scheme . . . . . . . . . 359--367
Peter K. K. Loh and
Hsu Wen Jing Dynamic load balancing on multiprocessor
networks . . . . . . . . . . . . . . . . 369--372
Fillia Makedon and
Antonis Symvonis Heuristic methods for permutation
routing on meshes and tori . . . . . . . 373--380
J. You and
W. P. Zhu and
E. Pissaloux Parallel image matching on a distributed
system . . . . . . . . . . . . . . . . . 381--385
Hui-Tang Lin and
Herman D. Hughes Performance evaluation of priority
buffer management in ATM switches . . . 387--393
Albert Y. Zomaya Special Issue: Simulation in parallel
and distributed computing environments ??
Michael Jurczyk and
Thomas Schwederski and
Howard Jay Siegel and
Seth Abraham and
Richard Martin Born Strategies for the implementation of
interconnection network simulators on
parallel computers . . . . . . . . . . . 5--16
Henk L. Muller and
Sanjay Raina and
Paul W. A. Stallard and
David H. D. Warren Parallel calibrated emulation as a
technique for evaluating parallel
architectures . . . . . . . . . . . . . 17--25
Celso Hirata and
Jeff Kramer A novel modelling approach for parallel
simulation . . . . . . . . . . . . . . . 27--37
Mostafa Bassiouni and
Ming-Hsing Chiu and
Margaret Loper and
Michael Garnsey Relevance filtering for distributed
interactive simulation . . . . . . . . . 39--47
Gary A. Bundell Modelling of distributed systems with
timed event graphs . . . . . . . . . . . 49--54
Narsingh Deo and
Muralidhar Medidi and
Sushil K. Prasad Load balancing in parallel battlefield
management simulation on local- and
shared-memory architectures . . . . . . 55--65
Ka-Cheong Leung and
Mounir Hamdi Performance assessment of network
protocols and parallel programming tools
for distributed computing systems . . . 67--80
C. Black and
S. M. Shatz and
S. Tu A query language for automated general
analysis of Concurrent Ada programs . . 83--95
Yu-Wei Chen and
Kuo-Liang Chung On fault-tolerant embedding complete
binary trees into hypercubes . . . . . . 97--100
Reinhard Posch Massive parallelism on a chip: VLSI
aspects involving dynamic logic . . . . 101--107
Shin-Jia Hwang and
Chien-Yuang Chen and
Chin-Chen Chang An encryption/multisignature scheme with
specified receiving groups . . . . . . . 109--112
Keqin Li Efficient reliability prediction for
$N$-version software systems with
multiple stages . . . . . . . . . . . . 113--120
Chin-Chen Chang and
Tzong-Chen Wu and
Yi-Shiung Yeh Broadcasting secrets in communication
networks . . . . . . . . . . . . . . . . 121--124
Kuo-Liang Chung and
Yu-Wei Chen Fast pipelined prefix computations on
MIMD hypercubes . . . . . . . . . . . . 125--130
Carsta Petersohn and
Cornelis Huizing and
Jan Peleska and
Willem-Paul de Roever Formal semantics for Ward and Mellor's
transformation schemas and its
application to fault tolerant systems 131--136
Phillip C.-Y. Sheu and
K. H. Kim Special Issue: Real-Time Object-Oriented
Systems . . . . . . . . . . . . . . . . ??
Dieter K. Hammer and
Andrew A. Hanish and
Tharam S. Dillon Modeling behavior and dependability of
object-oriented real-time systems . . . 139--150
Martin Gergeleit and
Michael Mock and
Edgar Nett T-CORBA: Making object-oriented systems
time-aware . . . . . . . . . . . . . . . 151--160
L. Motus and
T. Naks Formal timing analysis of OMT designs
using LIMITS . . . . . . . . . . . . . . 161--170
Jung-Guk Kim and
Jin Pyo Hong and
Byoung-Joon Min and
Moon Hae Kim Modeling of multimedia services using
the TMO model . . . . . . . . . . . . . 171--178
Katsuya Tanaka and
Hiroaki Higaki and
Makoto Takizawa Object-based checkpoints in distributed
systems . . . . . . . . . . . . . . . . 179--185
George A. Papadopoulos A multimedia programming model based on
timed concurrent constraint programming 195--205
Andrea Baiocchi and
Nicola Blefari-Melazzi and
Francesca Cuomo Dimensioning criteria of traffic
contract parameters and connection
admission control rules in an ATM
user-network interface . . . . . . . . . 207--217
Lily Cheng and
Herman Hughes Integrating call admission and cell
scheduling . . . . . . . . . . . . . . . 219--226
Cheng-Huang Yen and
L. L. Miller and
A. Sirjani and
J. Tenner Extending the object-relational
interface to support an extensible view
system for multidatabase integration and
interoperation . . . . . . . . . . . . . 227--240
Gopal Sharma and
Bidyut Gupta Parallel scheduler for a shared memory
(tightly-coupled) multiprocessor system 241--247
Sibelius Lellis Vieira and
Mauricio Ferreira Magalhães Online sporadic task scheduling in hard
real-time systems . . . . . . . . . . . 249--258
Roberto Baldoni and
Ravi Prakash and
Michel Raynal and
Mukesh Singhal Efficient $ \Delta $-causal broadcasting 263--269
Roberto Beraldi and
Paolo Giacomazzi and
Riccardo Melen Efficient topologies for ATM switching
fabrics with shortest path and
deflection routing . . . . . . . . . . . 271--281
C. P. Ravikumar and
S. Chakraverty VLSI implementation of a strongly fault
secure ALU . . . . . . . . . . . . . . . 283--288
Daniel S. Yeung and
Allan K. Y. Wong OORHS: a conceptual framework that
provides easy and reversible distributed
programming . . . . . . . . . . . . . . 289--301
Mehran Dowlatshahi and
S. K. De Performance analysis of ATM switches fed
with periodic and correlated traffic . . 303--310
Daniel S. Yeung and
A. K. Y. Wong An evaluation identifying features of
unified distributed programming . . . . 311--321
Anonymous Index to Volume 13, 1998 . . . . . . . . ??
D. R. Avresky and
S. J. Geoghegan and
P. K. Tapadiya A software-based fault-injection tool
(SOFIT) . . . . . . . . . . . . . . . . 327--337
Andrea Bobbio and
Miklos Telek Non-exponential stochastic Petri nets:
an overview of methods and techniques 339--351
Der-Chyuan Lou and
Chin-Chen Chang A fast modular multiplication method . . 353--358
N. N. Raju and
Ravi Mittal Performance comparison of multicasting
schemes for ATM switches under
heterogeneous traffic . . . . . . . . . 359--368
Alexander B. Romanovsky Predictable toleration of design faults:
Recovery blocks in real time systems . . 369--377
A. A. Andijani Buffer management of a switch for ATM
networks: a multi-objective approach . . 379--386
Sadiq M. Sait and
Habib Youssef and
Khalid Nassar and
Muhammad S. T. Benten Timing driven genetic placement . . . . 3--14
Jin Chin Wang and
Jacqueline Chame and
Michel Dubois Modeling finite cache effects in
write-invalidate snooping protocols . . 15--25
Xiannong Meng Distributed simulations: Issues and
implementations in a cluster of
workstations environment . . . . . . . . 27--37
George A. Papadopoulos Object-oriented term graph rewriting . . 39--50
S. Jayaprakash and
C. R. Muthukrishnan Permission-based fault-tolerant
distributed mutual exclusion algorithm 51--60
Letizia Tanca and
Dan Suciu Special issue: Semantics on the World
Wide Web . . . . . . . . . . . . . . . . ??
Danius Michaelides and
Luc Moreau and
David De Roure Editorial: Uniform approach to
programming the World Wide Web . . . . . 69--81
Laura Bright and
Jean-Robert Gruser and
Louiqa Raschid and
Maria Esther Vidal A wrapper generation toolkit to specify
and construct wrappers for Web
accessible data sources (WebSources) . . 83--97
Ling Liu and
Calton Pu and
Wei Tang and
Wei Han CONQUER: a continual query system for
update monitoring in the WWW . . . . . . 99--112
Myra Spiliopoulou The laborious way from data mining to
Web log mining . . . . . . . . . . . . . 113--125
Keqin Li An analytical model for approximating
performance of partitionable
multiprocessor systems . . . . . . . . . 131--145
Meng Chang Chen and
Jan-Ming Ho and
Ming-Tat Ko and
Shie-Yuan Wang A SCSI disk model for multimedia storage
systems . . . . . . . . . . . . . . . . 147--154
Marleen Adé and
Rudy Lauwereins and
J. A. Peperstraete Buffer memory requirements in DSP
applications . . . . . . . . . . . . . . 155--165
D. R. Avresky and
K. M. Altawil Embedding general spanning trees in
faulty hypercubes . . . . . . . . . . . 167--174
Habib Youssef and
Sadiq M. Sait Timing-driven global routing for
standard-cell VLSI design . . . . . . . 175--185
Dieter K. Hammer and
Tohru Kikuno and
Insup Lee Special issue: Object-Oriented Real-Time
Distributed Computing . . . . . . . . . ??
Alexander Romanovsky and
Jie Xu and
Brian Randell Editorial: Coordination exception
handling in real-time distributed object
systems . . . . . . . . . . . . . . . . 197--207
Andreas Polze and
Miroslaw Malek Responsive services with CORBA . . . . . 209--216
Reino Kurki-Suonio and
Mika Katara Logical layers in specifications with
distributed objects and real time . . . 217--226
Michael Squadrito and
Levon Esibov and
Lisa Cingiser DiPippo and
Victor Fay Wolfe and
Gregory Cooper and
Bhavani Thurasingham and
Peter Krupp and
Michel Milligan and
Russell Johnston and
Ramachandra Bethmangalkar The affected set priority ceiling
protocols for real-time object-oriented
concurrency control . . . . . . . . . . 227--239
K. H. (Kane) Kim and
Chittur Subbaraman Architectural principles for realizing
timeliness-guaranteed operating system
kernels . . . . . . . . . . . . . . . . 241--249
John A. Stankovic and
Sang H. Son An architecture and object model for
distributed object-oriented real-time
databases . . . . . . . . . . . . . . . 251--259
C.-C. Hsu and
S.-S. Lin Path establishment of permutations in a
rearrangeable interconnection network 267
A. Arulambalam and
X. Chen and
N. Ansari Impact of per-VC and single FIFO queuing
on ABR congestion control . . . . . . . 275
M. D. Feng and
C. K. Y. Chen Parallel Lisp with speculation and
subtuplespace on distributed systems . . 283
H. A. Xie and
K. E. Forward and
K. M. Adams A programmable database coprocessor in a
PSQL system . . . . . . . . . . . . . . 299
C.-C. Hsu Embedability and recovery of a
bubblesort star graph interconnection
network . . . . . . . . . . . . . . . . 307
L. Shi and
O. De Vel and
J. Cao A hierarchical and distributed
monitoring system in interprocess
communications . . . . . . . . . . . . . 317
E. A. Rundensteiner and
H. A. Kuno and
Y. Zhou Experimental evaluation of the SMX
strategy for incremental materialized
path view maintenance . . . . . . . . . 331
A. J. H. Simons and
M. Snoeck and
K. S. Y. Hung Using design patterns to reveal the
competence of object-oriented methods in
system-level design . . . . . . . . . . 343
T. Vianna de Araujo Object-oriented hierarchies and their
resulting complex systems . . . . . . . 353
M. Saksena and
R. B. France and
M. M. Larrondo-Petrie A characterization of aggregation . . . 363
M. L. Hines Ontology of object-oriented database
evolution . . . . . . . . . . . . . . . 371
C. Ben Achour and
C. Souveyet and
M. Tawbi Bridging the gap between users and
requirements engineering: the
scenario-based approach . . . . . . . . 379
C. Souveyet and
R. Deneckere Overview of the TOOBIS project: from a
temporal extension of ODMG to a
patterns-based approach extending the OO
model . . . . . . . . . . . . . . . . . 389
R. Jiménez-Peris and
M. Patiño Martínez and
S. Arévalo and
F. J. Ballesteros TransLib: an Ada 95 object oriented
framework for building transactional
applications . . . . . . . . . . . . . . 7
T. Vardanega and
J. Gaisler Lessons learned from the implementation
of on-board tolerance to physical faults
in Ada . . . . . . . . . . . . . . . . . 19
P. Rogers and
A. J. Wellings An incremental recovery cache supporting
software fault tolerance mechanisms . . 33
J. Miranda and
A. Álvarez and
F. Guerra and
S. Arévalo Programming replicated systems in Drago 49
J. Napier and
L. Chen and
J. May and
G. Hughes Fault simulation to validate
fault-tolerance in Ada . . . . . . . . . 61
L. C. Hui A practical algorithm to find longest
common substring in linear time . . . . 73
M. Raynal Non-blocking atomic commitment in
distributed systems: a tutorial based on
a generic protocol . . . . . . . . . . . 77
H. Ashihara and
M. Matsumoto Application of finite projective space
to replicated data management . . . . . 87
P. Buchholz Efficient computation of equivalent and
reduced representations for stochastic
automata . . . . . . . . . . . . . . . . 93
J. J.-R. Chen and
Y. Liu An ID-based digital multisignatures
scheme with time stamp technique . . . . 105
D.-C. Lou and
C.-C. Chen An efficient divide-and-conquer
technique for parallel computation of
modular multi-exponentiation . . . . . . 111
J.-H. Park and
H.-K. Lee and
C.-S. Lee A fault tolerant multistage
interconnection network and its fault
tolerant diagnosis: the ring-banyan
network . . . . . . . . . . . . . . . . 119
C.-M. Chung and
Y.-H. Wang and
T. K. Shih and
H.-C. Keh and
J.-F. Chen The complexity measurement of software
through program decomposition . . . . . 127
M. Abid Prototyping environment for the design
of hardware/software systems . . . . . . 137
A. Romanovsky The domino effect as a deadlock . . . . 147
P. S. Yu and
K.-L. Wu and
A. Dan A dynamic parity grouping for efficient
parity buffering for RAID-5 disk arrays 155
T. Apostolopoulos A time dependent network fault
management model in a TCP/IP environment 165
M. H. Karaata and
K. A. Saleh A distributed self-stabilizing algorithm
for finding maximum matching . . . . . . 175
T. Tsichiya and
T. Kikuno Dependable evaluation of the weighted
voting scheme in the presence of node
and link failures . . . . . . . . . . . 181
C. Ersoy and
A. Levi and
O. Gumrah Artificial intelligence techniques for
discrete link capacity assignment in
prioritized multiservice networks . . . 191
S. Bataineh Response time analysis of repairable
multiprocessor systems . . . . . . . . . 201
W.-B. Lee and
C.-C. Chang User identification and key distribution
maintaining anonymity for distributed
computer networks . . . . . . . . . . . 211
J. Kim and
T. Han and
S. K. Lee VOQL: a Visual Object-oriented database
Query Language for visualizing path
expressions . . . . . . . . . . . . . . 215
S.-J. Yang Efficient algorithms for finding cores
on weighted tree networks . . . . . . . 233
Y. Min and
L. L. Miller and
M. M. Owrang A calculus for handling time in complex
objects . . . . . . . . . . . . . . . . 253
Wil van der Aalst and
Stefan Jablonski Editorial . . . . . . . . . . . . . . . ??
W. M. P. van der Aalst and
S. Jablonski Dealing with workflow change:
identification of issues and solutions ??
P. Grefen and
K. Aberer and
Y. Hoffner and
H. Ludwig CrossFlow: Cross-organizational workflow
management in dynamic virtual
enterprises . . . . . . . . . . . . . . ??
J. Desel and
T. Erwin Hybrid specifications: looking at
workflows from a run-time perspective ??
W. Deiters and
T. Goesmann and
T. Löffeler Flexibility in workflow management:
dimensions and solutions . . . . . . . . ??
A. B. Raposo and
L. P. Magalhães and
I. L. M. Ricarte Petri nets based coordination mechanisms
for multi-workflow environments . . . . ??
G. Joeris Modeling of flexible workflows and their
decentralized enactment in flow.net . . ??
A. Lazcano and
G. Alonso and
H. Schuldt and
C. Schuler The WISE approach to electronic commerce ??
S. Donatelli and
M. Sarini and
C. Simone Negotiating propagation of changes in
inter-organizational workflows . . . . . ??
J.-L. Chu and
R. K. Guha Triangular level quorums for distributed
mutual exclusion . . . . . . . . . . . . ??
D. R. Avresky and
C. Cunningham and
H. Ravichandran Fault-tolerant routing for wormhole
routed two-dimensional meshes . . . . . ??
T. P. Katsaros and
C. Lazos A technique for determining queuing
network simulation length based on
desired accuracy . . . . . . . . . . . . ??
K. H. Jones and
S. Olariu and
L. F. Rowell and
J. L. Schwing and
A. Wilhite A database integrity monitor with
applications to vehicular technology . . ??
S.-W. Kim and
K.-Y. Whang New join processing using a
multidimensional dynamic file
organization . . . . . . . . . . . . . . ??
B. B. Kristensen Subjective behaviour . . . . . . . . . . ??
T.-C. Wu and
C.-C. Chang Cryptographic key assignment scheme for
hierarchical access control . . . . . . ??
J.-L. Wang and
L.-T. Lee Effective bandwidth allocation for ATM
networks . . . . . . . . . . . . . . . . ??
R. Baldoni and
G. Cioffi and
J.-M. Helary and
M. Raynal Direct dependency-based determination of
consistent global checkpoints . . . . . ??
I. De and
B. Gupta Efficient fault tolerant multicasting in
hybrid incomplete hypercube
interconnection networks . . . . . . . . ??
E. D. Jensen The distributed real-time specification
for Java: an initial proposal . . . . . ??
H. Kopetz and
M. Holzmann and
W. Elmenreich A universal smart transducer interface:
TTP/A . . . . . . . . . . . . . . . . . ??
H. Fahmi and
W. G. Aref and
M. Latif and
B. Shafiq and
A. Ghafoor and
P. Liu and
L. Hsu Distributed Web-based framework for
real-time multimedia object
communication . . . . . . . . . . . . . ??
L. B. Becker and
M. Gergeleit and
E. Nett and
C. E. Pereira An integrated environment for the
complete development cycle of an
object-oriented distributed real-time
system . . . . . . . . . . . . . . . . . ??
R. Schantz and
J. Zinky and
J. Megquier and
J. Loyall and
D. Karr and
D. Bakken An object leel gateway supporting
quality of service . . . . . . . . . . . ??
K. H. (Kane) Kim and
J. Liu and
M-H Kim Deadline handling in real-time
distributed objects: issues and basic
approaches . . . . . . . . . . . . . . . ??
R. de Lemos and
A. Romanovsky Exception handling in the software
lifecycle . . . . . . . . . . . . . . . ??
A. Polze and
J. Richling and
J. Schwarz and
M. Malek Towards predictable CORBA-based services ??
M. Pezz\`e and
S. M. Shatz Editorial . . . . . . . . . . . . . . . ??
M. Young Neat models of messy problems: Notes on
the interplay between solution- and
problem-centered disciplines, and more
particularly on the interaction between
Petri net research and software
engineering research . . . . . . . . . . ??
H. Giese and
G. Wirtz The OCoN approach for object-oriented
distributed software systems modeling ??
A. Burns and
A. J. Wellings and
F. Burns and
A. M. Koelmans and
M. Koutny and
A. Romanovsky and
A. Yakovlev Modelling and verification of an atomic
action protocol implemented in Ada . . . ??
M. Ceska and
V. Janousek and
T. Vojnar Generating and using state spaces of
object-oriented Petri nets . . . . . . . ??
D. Dutta and
B. Gupta An efficient time-based checkpoint and
recovery algorithm for distributed
systems involving mobile computers . . . ??
B. Gupta and
K. Ghosh and
D. Dutta and
A. Gupta Broadcasting in complete and incomplete
star interconnection networks . . . . . ??
C. Liu and
M. A. Orgun and
K. Zhang A parallel execution model for Chronolog ??
A. K. Y. Wong and
J. H. C. Wong A convergence algorithm for enhancing
the performance of distributed
applications running on sizeable
networks . . . . . . . . . . . . . . . . ??
A. Romanovsky and
A. Zorzo A distributed coordinated atomic action
scheme . . . . . . . . . . . . . . . . . ??
A. Bondavalli and
M. Nelli and
L. Simoncini and
G. Mongardi Hierarchical modelling of complex
control systems: dependability analysis
of a railway interlocking . . . . . . . ??
A. Bondavalli and
M. Dal Cin and
D. Latella and
I. Majzik and
A. Pataricza and
G. Savoia Dependability analysis in the early
phases of UML-based system design . . . ??
Y. Jiang and
D. Taniar and
C. H. C. Leung High performance distributed parallel
query processing . . . . . . . . . . . . ??
Y.-M. Tseng and
J.-K. Jan Generalized group-oriented cryptosystem
with authenticated sender . . . . . . . ??
W. M. P. van der Aalst How to handle dynamic change and capture
management information? An approach
based on generic workflow models . . . . ??
S. Shigeta and
K. Shimizu and
M. Sowa Access route control by an extended
key/lock scheme . . . . . . . . . . . . ??
T.-C. Wu Digital signature/multisignature schemes
giving public key verification and
message recovery simultaneously . . . . ??
K. Gunavathi and
A. Shanmugam Comparative analysis of new multiple
access protocols for bus LANs . . . . . ??
K.-L. Wu and
P. S. Yu and
J. Z. Teng Thrashing control and avoidance for
concurrent mergesorts using parallel
prefetching . . . . . . . . . . . . . . ??
W. J. Gutjahr A reliability model for nonhomogeneous
redundant software versions with
correlated failures . . . . . . . . . . ??
W.-S. Juang and
C.-L. Lei and
H.-T. Liaw Fair blind threshold signatures based on
discrete logarithm . . . . . . . . . . . ??
Anonymous Book Review . . . . . . . . . . . . . . ??
Anonymous Index to Volume 16, 2001 . . . . . . . . ??
J-H Kim and
S-W Kim and
D-Y Kim and
Y-Y You and
W. Choi Soft real-time scheduling in a general
purpose operating system: scheduling
daemon approach . . . . . . . . . . . . ??
S-J Yang A distributed algorithm of efficient
core discipline on weighted bipartite
networks . . . . . . . . . . . . . . . . ??
D. Taniar and
J. Wenny Rahayu Parallel group-by query processing in a
cluster architecture . . . . . . . . . . ??
P. Chaudhuri An optimal distributed algorithm for
finding a set of fundamental cycles in a
graph . . . . . . . . . . . . . . . . . ??
K. H. (Kane) Kim and
L. Bacellar The distributed real-time conversation
scheme for time-bounded cooperative
recovery . . . . . . . . . . . . . . . . ??
C. E. Pereira and
R. Baldoni Editorial . . . . . . . . . . . . . . . ??
N. Selic The emerging real-time UML standard . . ??
K. H. (Kane) Kim and
J. Q. Liu and
H. Miyazaki and
E. H. Shokri A CORBA service middleware enabling
high-level high-precision real-time
distributed object programming . . . . . ??
W. A. Halang and
C. E. Pereira and
A. H. Frigeri Safe object oriented programming of
distributed real time systems in PEARL ??
R. Friedman and
E. Hadad Client-side enhancements using portable
interceptors . . . . . . . . . . . . . . ??
P. Narasimhan and
L. E. Moser and
P. M. Melliar-Smith Strongly consistent replication and
recovery of fault-tolerant CORBA
applications . . . . . . . . . . . . . . ??
C. O'Ryan and
D. C. Schmidt and
J. R. Noseworthy Patterns and performance of a CORBA
event service for large-scale
distributed interactive simulations . . ??
F. J. Torres-Rojas and
M. Ahamad and
M. Raynal Real-time based strong consistency for
distributed objects . . . . . . . . . . ??
D. Taniar and
J. Wenny Rahayu Parallel sort-merge object-oriented
collection join algorithms . . . . . . . ??
A. Romanovsky On version state recovery and
adjudication in class diversity . . . . ??
X. Xie and
S. M. Shatz Development of class-level and
instance-level design models for
distributed-object software . . . . . . ??
H-T Lin and
H. D. Hughes A hand-off scheme for wireless ATM
networks . . . . . . . . . . . . . . . . ??
R. Friedman and
E. Hadad Client-side enhancements using portable
interceptors . . . . . . . . . . . . . . ??
W. Zhou and
W. Jia A token-based independent update
protocol for managing replicated objects ??
J-K Jan and
Y-Y Chen A secure anonymous voting protocol with
a complete supervision . . . . . . . . . ??
O. Sharon and
A. Vainshtein and
A. Likholat On the relation between the throughput
gain with slot reuse and the number of
address bits in the dual bus
configuration. Part 1: Maximum
throughput . . . . . . . . . . . . . . . ??
O. Sharon and
A. Likholat On the relation between the throughput
gain with slot reuse and the number of
address bits in the dual bus
configuration. Part 2: Linear and equal
throughputs . . . . . . . . . . . . . . ??
N. S. V. Rao and
N. Manickam General quickest paths and path-tables ??
A. R. Sharafat and
M. S. Fallah A measure of resilience against denial
of service attacks in computer networks ??
S-J Seok and
S-H Lee and
J. Park and
C-H Kang Characteristics of assured service and
an alternative RIO scheme in
differentiated services networks . . . . ??
D-C Lou and
T-L Yin and
M-C Chang An efficient steganographic approach . . ??
K-L Wu and
P. S. Yu Controlled replication for hash
routing-based Web caching . . . . . . . ??
S-W Kim and
H-S Won Bulk-loading of a multidimensional file:
algorithm and its performance evaluation ??
Anonymous Book review . . . . . . . . . . . . . . ??
M. Ma and
E. Gunawan Single-code and multi-code DS/CDMA MAC
protocols for video/voice integration ??
D-H Kim and
K. H. (Kane) Kim and
S. Liu and
J-H Kim A TMO-based approach to tolerance of
transmission jitters in tele-audio
services . . . . . . . . . . . . . . . . ??
D. Cotroneo and
N. Mazzocca and
L. Romano and
S. Russo A fault tolerant access to legacy
database systems using CORBA technology ??
J. Mbale and
X. X. Fei and
D. Ursino Acquisition of interoperability using
intelligent binary schema matching
technology . . . . . . . . . . . . . . . ??
Z. Ding and
C. Jiang Temporal Petri nets model of concurrent
systems . . . . . . . . . . . . . . . . ??
M. Raynal Token-based sequential consistency . . . ??
X-X Chen and
M. Minami and
H. Morikawa and
T. Aoyama Service description model and toolkit
for ubiquitous computing . . . . . . . . ??
A. Moga and
M. Dubois Scalability implications of
software-implemented coherence . . . . . ??
T. Newe and
T. Coffey Formal verification logic for hybrid
secutity protocols . . . . . . . . . . . ??
K. Komathy and
P. Vivekanandan and
V. Ramachandran Secure SOAP-based Web services . . . . . ??
D-R Chen and
C-C Hsu Fault-tolerant routing for pyramid
networks using the least level minimal
routing method . . . . . . . . . . . . . ??
L. Feng and
E. Chang and
T. S. Dillon Schemata transformation of
object-oriented conceptual models to XML ??
K. Maly and
S. Olariu and
L. Zhang and
N. Rao Fairness in DQDB revisited: a new
solution . . . . . . . . . . . . . . . . ??
H. Juidette and
N. Idboufker and
A. Berraissoul QoS routing in data networking using
genetic algorithms: a new two-level
approach . . . . . . . . . . . . . . . . ??
J. Al-Sadi and
K. Day and
M. Ould-Khaoua Analysis of fault-tolerant routing
algorithms in $k$-ary n-cube networks ??
K. Lee and
Y. Y. Park and
H. Y. Yeom Pre-emptive but safe interval caching
for real-time multimedia systems . . . . ??
S-W Kim Development of a high-performance index
manager in a main memory DBMS . . . . . ??
H. C. B. Chan and
H. Chen and
J. Zhang An adaptive reservation protocol with a
pre-emptive priority mechanism for
wireless ATM LANs . . . . . . . . . . . ??
S. Sarangi and
P. N. Sireesh and
S. P. Pal A scalable, efficient and general Monte
Carlo scheme for generating synthetic
Web request streams . . . . . . . . . . ??
D. Manivannan and
C. Zhang Performance of communication-induced
checkpointing algorithms . . . . . . . . ??
E. Guntama and
E. Chang and
N. Jayaratna and
L. Pudhota Extension of activity diagrams for
flexible business workflow modeling . . ??
D.-R. Liu and
S.-C. Pan Integrating software agents with
multi-level metadata in support of
heterogeneous product search . . . . . . ??
L.-C. Chen and
D.-R. Chen and
C.-C. Hsu and
H.-R. Lin Fast and efficient allocation for mesh
systems . . . . . . . . . . . . . . . . ??
M. Naghibzadeh and
K. H. (Kane) Kim The yielding-first rate-monotonic
scheduling approach and its efficiency
assessment . . . . . . . . . . . . . . . ??
G. Min and
M. Ould-Khaoua Performance analysis of hypercube
networks under LRD traffic . . . . . . . ??
V. Gorodetski and
I. Kotenko and
O. Karsaev Multi-agent technologies for computer
network security: attack simulation,
intrusion detection and intrusion
detection learning . . . . . . . . . . . ??
J. L. Aguilar and
E. L. Leiss Optimal scheduling of loops with
dependence cycles on parallel platforms ??
J. Chen and
J. Zhou and
S. Yu and
J. Zheng and
C. Zhang and
L. Zhong A framework of scalar quantization
multiwavelet transform for very low bit
rate video coding . . . . . . . . . . . ??
J. Aguilar Heuristic algorithm based on a genetic
algorithm for mapping parallel programs
on hypercube multiprocessors . . . . . . ??
E. Chang and
E. Damiani and
L. Feng Editorial . . . . . . . . . . . . . . . ??
J. X. Yu and
G. Wang and
H. Lu and
G. Yu and
J. Lv and
B. Sun Automata Match: a new XML query
processing approach . . . . . . . . . . ??
H. Zhang and
F. Tompa XQuery rewriting at the relational
algebra level . . . . . . . . . . . . . ??
M. M. Martínez and
P. de la Fuente and
J.-C. Derniame XML as a means to support information
extraction from legal documents . . . . ??
B.-S. Lee and
B. R. Bryant Applying XML technology for
implementation of natural language
specifications . . . . . . . . . . . . . ??
D. G. Synodinos and
P. Avgeriou Leveraging hypermedia engineering for
multi-channel access with the use of XML ??
W. Jonker XML and secure data management in an
ambient world . . . . . . . . . . . . . ??
L. Zhenhua A bus-type software model based on CORBA
and XML . . . . . . . . . . . . . . . . ??
M. Sharifi and
B. Zolfaghari Optimizing the ready queue structure for
dynamic scheduling strategies in
real-time operating systems . . . . . . ??
P. C. Saxena and
J. Rai Communication cost of $k$-coteries . . . ??
S. Goel and
H. Sharda and
D. Taniar Messaging in distributed systems . . . . ??
H. Zhou and
W. Cao and
Z. Lin Formal semantics analysis for VHDL RTL
synthesis . . . . . . . . . . . . . . . ??
J.-L. Wang An effective link arrangement scheme for
distributed systems using Markov-chain
based reliability analysis . . . . . . . ??
Anonymous Index to Volume 18, 2003 . . . . . . . . ??
X.-X. Chen and
M. Minami and
H. Morikawa and
T. Aoyama Service description model and toolkit
for ubiquitous computing . . . . . . . . ??
A. Moga and
M. Dubois Scalability implications of
software-implemented coherence . . . . . ??
T. Newe and
T. Coffey Formal verification logic for hybrid
security protocols . . . . . . . . . . . ??
K. Komathy and
P. Vivekanandan and
V. Ramachandran Secure SOAP-based Web services . . . . . ??
D.-R. Chen and
C.-C. Hsu Fault-tolerant routing for pyramid
networks using the least level minimal
routing method . . . . . . . . . . . . . ??
L. Feng and
E. Chang and
T. S. Dillon Schemata transformation of
object-oriented conceptual models to XML ??
F. K. Hussain and
E. Chang and
T. S. Dillon Classification of trust in Peer-to-Peer
(P2P) communication . . . . . . . . . . ??
Y.-H. Wang and
C. M. Chung and
C.-J. Lee and
C.-C. Chuang Ad hoc routing protocol based on setup
on-demand backup node . . . . . . . . . ??
W. W. K. Lin and
A. K. Y. Wong and
T. S. Dillon HBP: an optimization technique to
shorten the control cycle time of the
Neural Network Controller that provides
dynamic buffer tuning to eliminate
overflow at user level . . . . . . . . . ??
D. Taniar and
J. W. Rahayu and
R. Boon-Noi Tan Parallel algorithms for selection query
processing involving index in parallel
database systems . . . . . . . . . . . . ??
E. Damiani Semantics-aware techniques for security ??
P. Ceravolo Extracting role hierarchies from
authentication data flows . . . . . . . ??
N. Kodali and
C. Farkas and
D. Wijesekera Specifying multimedia access control
using RDF . . . . . . . . . . . . . . . ??
C. Ardagna and
S. De capitani di Vimercati A comparison of modeling strategies in
defining XML-based access control
languages . . . . . . . . . . . . . . . ??
C. F. Cupens and
A. Miége AdOrBAC: an administration model for
Or-BAC . . . . . . . . . . . . . . . . . ??
L. Feng and
W. Jonker Preparations for encrypted XML metadata
querying . . . . . . . . . . . . . . . . ??
F. K. Hussain and
E. Chang and
T. S. Dillon Trustworthiness and CCCI metrics in P2P
communication . . . . . . . . . . . . . ??
G. Hogben The formation of software agreements
between autonomous agents . . . . . . . ??
R. Tolksdorf and
C. Bizer and
R. Eckstein and
R. Heese Trustable B2C markets on the Semantic
Web . . . . . . . . . . . . . . . . . . ??
Yong-Jin Lee Minimal cost heuristic algorithm for
delay constrained loop network . . . . . ??
Sooyong Kang and
Hyunjoo Kim and
Heon Y. Yeom A framework for fault-tolerant
peer-to-peer streaming service based on
the service migration . . . . . . . . . ??
Sheila Anand and
V. Ramachandran A generic model for an application based
intrusion prevention detection system ??
Christopher Kohlhoff and
Robert Steele Evaluating SOAP for high performance
applications in capital markets . . . . ??
Der-Rong Din A simulated annealing algorithm for
finding minimal wavelength on a WDM ring ??
Sang-Wook Kim Concurrency control in main-memory DBMS ??
Abdelkader Hameurlain and
Franck Morvan Parallel query optimization methods and
approaches: a survey . . . . . . . . . . ??
Dmitri D. Perkins and
Jinping Yang and
Herman Hughes and
Charles Owen A QoS-aware routing scheme for mobile ad
hoc networks . . . . . . . . . . . . . . ??
Jia-Kang Seng and
Jing Yu Toward a more generic design of XML
benchmark workload . . . . . . . . . . . ??
W. Zhao and
L. E. Moser and
P. M. Melliar-Smith Design and implementation of a
consistent time service for
fault-tolerant distributed systems . . . ??
Keqiu Li and
Hong Shen Proxy placement problem for coordinated
en-route transcoding proxy caching . . . ??
David Taniar and
Hui Yee Khaw and
Haorianto Cokrowijoyo and
Johanna Wenny Rahayu The use of hints in object-relational
query optimization . . . . . . . . . . . ??
Natalia López and
Manuel Núñez and
Fernando Rubio Predicting performance in the presence
of stochastic information . . . . . . . ??
Min-Jae Lee and
Wook-Shih Han and
Kyu-Young Whang Transformation-based spatial partition
join . . . . . . . . . . . . . . . . . . ??
Richard S. L. Wu and
Allan K. Y. Wong and
Tharam S. Dillon RDCT: a novel reconfigurable dynamic
cache size tuner to shorten information
retrieval time over the Internet . . . . ??
Didar Zowghi and
Vincenzo Gervasi Editorial . . . . . . . . . . . . . . . ??
Martin S. Feather and
Steven L. Cornford and
Kenneth A. Hicks and
Kenneth R. Johnson Applications of tool support for
risk-informed requirements reasoning . . ??
C. Heitmeyer and
M. Archer and
R. Bharadwaj and
R. Jeffords Tools for constructing requirements
specifications: the SCR Toolset at the
age of nine . . . . . . . . . . . . . . ??
Leonid Kof An application of natural language
processing to domain modelling: two case
studies . . . . . . . . . . . . . . . . ??
Stefania Gnesi and
Giuseppe Lami and
Gianluca Trentanni An automatic tool for the analysis of
natural language requirements . . . . . ??
Alfredo Raúl Teyseyre and
Marcelo Campo Early requirements validation with $3$D
worlds . . . . . . . . . . . . . . . . . ??
Abdelkader Hameurlain Editorial . . . . . . . . . . . . . . . ??
Agustinus Borgy Waluyo and
Bala Srinivasan and
David Taniar Research on location-dependent queries
in mobile databases . . . . . . . . . . ??
Artem Katasonov User-centric data querying for
location-based services . . . . . . . . ??
Chin-Wan Chung and
Sunghee Choi and
Yong-Jin Choi Closest pair queries in spatio-temporal
databases . . . . . . . . . . . . . . . ??
Vijay Kumar and
Margaret H. Dunham and
Nitin Prabhu Mobilaction: a mobile transaction
framework supporting spatial replication
and spatial consistency . . . . . . . . ??
Patricia Serrano-Alvarado and
Claudia Roncancio and
Michel Adiba and
Cyril Labbé An adaptable mobile transaction system ??
Luc Bouganim and
François Dang Ngoc and
Philippe Pucharel Tamper-resistant ubiquitous data
management . . . . . . . . . . . . . . . ??
Tharam Dillon and
Mukesh Mohania Special issue: Privacy Data Management ??
Hendrick J. G. Oberholzer and
Martin S. Olivier Privacy contracts incorporated in a
privacy protection framework . . . . . . ??
Omar Khadeer Hussain and
Elizabeth Chang and
Farookh Khadeer Hussain and
Tharam S. Dillon A methodology for risk measurement in
e-transactions . . . . . . . . . . . . . ??
B. Carminati and
E. Ferraru A system for controlled outsourcing of
personal data . . . . . . . . . . . . . ??
Zhiqiang Yang and
Rebecca N. Wright and
Hiranmayee Subramaniam Experimental analysis of a
privacy-preserving scalar product
protocol . . . . . . . . . . . . . . . . ??
Dang Tran Khanh A practical solution to supporting
oblivious basic operations on dynamic
outsourced search trees . . . . . . . . ??
Katharina Grün and
Michael Karlinger and
Michael Schrefl Schema-aware labelling of XML documents
for efficient query and update
processing in SemCrypt . . . . . . . . . ??
Alessandro Garcia and
Carlos Lucena Special issue: Software Engineering for
Multi-Agent Systems . . . . . . . . . . ??
Iyad Rahwan and
Thomas Juan and
Leon Sterling Integrating social modelling and agent
interaction through goal-oriented
analysis . . . . . . . . . . . . . . . . ??
Magid Nikraz and
Giovanni Caire and
Parisa A. Bahri A methodology for the development of
multi-agent systems using the JADE
platform . . . . . . . . . . . . . . . . ??
Quynh-Nhu Numi Tran and
Graham Low and
Ghassan Beydoun A methodological framework for ontology
centric oriented software engineering ??
Antonio Chella and
Massimo Cossentino and
Luca Sabatucci and
Valeria Seidita Agile PASSI: An agile process for
designing agents . . . . . . . . . . . . ??
Fabiano K. T. Tiba and
Miriam A. M. Capretz Agent-oriented architecture for
monitoring and diagnosis in supervisory
systems . . . . . . . . . . . . . . . . ??
K. K. Thyagharajan and
V. Ramachandran Optimal buffering requirement analysis
for jitter-free variable bit rate video
streaming . . . . . . . . . . . . . . . ??
Alexander Thomasian and
Gang Fu Anticipatory disk arm placement to
reduce seek time . . . . . . . . . . . . ??
Christian Guttmann and
Ingrid Zukerman Agents with limited modeling abilities:
Implications on collaborative problem
solving . . . . . . . . . . . . . . . . ??
Franziska Klügl and
Rainer Herrler and
Gustavo Kuhn Andriotti Coupling GIS and multi-agent simulation
towards infrastructure for realistic
simulation . . . . . . . . . . . . . . . ??
T. Murata and
J. Yim and
H. Yin and
O. Wolfson Petri-net model and minimum cycle time
for updating a moving objects database ??
Mihaela Ulieru and
Dan Ionescu Privacy and security shield for health
information systems (e-health) . . . . . ??
J-Y Chung and
G. Feuerlicht and
W. Lamersdorf and
C. Zirpins Special issue: Engineering design and
composition of service-oriented
applications . . . . . . . . . . . . . . ??
S. Bleul and
T. Weise and
K. Geihs An ontology for quality-aware service
discovery . . . . . . . . . . . . . . . ??
A. Colman and
J. Han Adaptive service-oriented systems: an
organisational approach . . . . . . . . ??
L. Aversano and
M. di Penta and
K. Taneja A genetiv programming approach to
support the design of service
compositions . . . . . . . . . . . . . . ??
C-L Huang and
K-M Chao and
C-C Lo and
P. Wang and
J-Y Chung Service discovery through consensus
based preferences . . . . . . . . . . . ??
A. Erradi and
N. Kulkarni and
S. Anand Service design principles: a case study
in modeling services for the securities
trading domain . . . . . . . . . . . . . ??
M. Weiss and
A. Oreshkin and
B. Esfandiari Method for detecting functional feature
of interactions of Web services . . . . ??
Z. Lu and
S. Li and
P. Hyland and
A. Ghose Reliable service composition by adopting
assumptions . . . . . . . . . . . . . . ??
K. Guennoun and
K. Drira Using graph grammars for interaction
style description: applications for
service-oriented architectures . . . . . ??
Ernesto Damiani and
Gabriele Gianini and
Hiroshi Maruyama Special issue: Web service security . . ??
Jason Crampton Applying hierarchical and role-based
access control to XML documents . . . . ??
N. Li and
T. Yu and
A. Antón A semantics based approach to privacy
languages . . . . . . . . . . . . . . . ??
Alban Gabillon A logical formalization of secure XML
database . . . . . . . . . . . . . . . . ??
N. Kodali and
C. Farkas and
D. Wijesekera uSMIL: Towards secure unbreakable
semantics in multimedia Web services . . ??
C. Skalka and
X. Sean Wang Trust but verify: Authorization for Web
services . . . . . . . . . . . . . . . . ??
Jae-Gil Lee and
Kyu-Young Whang and
Wook-Shin Han and
Il-Yeol Song Special issue: Hippocratic XML
databases: a model and an access control
mechanism . . . . . . . . . . . . . . . ??
Behrouz Zolfaghari and
Mohsen Sharifi The impact of skewed associativity on
the replacement traffic in COMA
multiprocessors . . . . . . . . . . . . ??
Maria J. Blesa and
Jordi Petit and
Fatos Xhafa Generic parallel implementations for
Tabu search . . . . . . . . . . . . . . ??
Anonymous Index to Volume 21, 2006 . . . . . . . . ??
K. Salah and
K. Elbadawi Throughput and delay analysis of
interrupt-driven kernels under Poisson
and bursty traffic . . . . . . . . . . . ??
L. Wang and
L. Khan and
B. Thuraisingham A framework for automated image
annotation . . . . . . . . . . . . . . . ??
C.-L. Wu and
D.-C. Lou and
S.-Y. Chen Integer factorization for RSA
cryptosystem under a PVM environment . . ??
S. Park and
S-W Kim and
W. W. Chu SBASS: Segment based approach for
subsequence searches in sequence
databases . . . . . . . . . . . . . . . ??
K. Li and
T. Nanya and
H. Shen and
F. Chin and
W. Zhang An efficient cache replacement algorithm
for multimedia object caching . . . . . ??
Jason C. T. Lo and
Allan K. Y. Wong and
Wilfred W. K. Lin SDITPM: A novel transfer policy model to
facilitate object mobility that shortens
service roundtrip time by load balancing
over the Internet . . . . . . . . . . . ??
Tran Khanh Dang Solving approximate similarity queries ??
John G. Vlachogiannis Automatic construction of a decision
tree for the analysis of traffic load in
computer networks . . . . . . . . . . . ??
Doohyun Kim and
Arif Ghafoor Special issue: Real time software
architecture . . . . . . . . . . . . . . ??
A. Cilardo and
D. Cotroneo and
C. di Flora and
A. Mazzeo and
L. Romano and
S. Russo Design and implementation of a high
performance architecture for providing
digital time stamping services to mobile
devices . . . . . . . . . . . . . . . . ??
Y. Nah and
K. H. (Kane) Kim and
T. Wang and
M. H. Kim A cluster-based TMO-structured scalable
approach for location information
systems . . . . . . . . . . . . . . . . ??
S. Itaya and
M. Takizawa Parallel transmission model for
real-time multi-source streaming of
multimedia data in scalable networks . . ??
M. H. Kim and
E. H. Jo and
D-J Kim and
J-G Kim Time-triggered and message-triggered
object framework and global time-based
synchronization for real-time multimedia
streaming . . . . . . . . . . . . . . . ??
A. Talevski and
E. Chang and
T. S. Dillon A dynamically reconfigurable Voice User
Interface (VUI) framework and platform ??
T. Nakajima and
E. Tokunaga and
H. Ishikawa and
D. Ueno and
K. Fujinami and
M. Sugaya and
S. Oikawa Software infrastructures for building
ubiquitous computing environments . . . ??
W. Sheikh and
B. Shafiq and
S. Baqai and
R. A. Paul and
M. F. Khan and
H. Ghafoor A QoS framework for multimedia
applications in mobile ad hoc networks ??
Haiping Xu and
Yi-Tsung Cheng Model checking bidding behaviors in
Internet concurrent auctions . . . . . . ??
Kinh Nguyen and
Tharam Dillon Obligation nets: a rigorous
object-oriented technique for modeling
the behavioural semantics of information
systems . . . . . . . . . . . . . . . . ??
Rung-Ching Chen and
Cheun-Chieh Liao A genetic algorithm with fuzzy selection
and local search for multicast routing
problem on the QoS constraint . . . . . ??
Garrett Camp and
Mihaela Ulieru InOrder: enhancing Google via stigmergic
query refinement . . . . . . . . . . . . ??
Simone Fischer-Hübner and
Steven Furnell and
Costas Lambrinoudakis Special issue: TrustBus 2006 . . . . . . ??
Jeremy Ward Building the information assurance
community of purpose . . . . . . . . . . ??
V. Poursalidis and
C. Nikolaou Towards a person-centric Identity
Management Infrastructure (IMI) . . . . ??
Christian Schläger and
Thomas Nowey On the effects of authentication and
authorisation infrastructures on
e-commerce activities . . . . . . . . . ??
Mikolaj Morzy Cluster-based analysis and
recommendation of sellers in online
auctions . . . . . . . . . . . . . . . . ??
Muhammad Alam and
Michael Hafner and
Ruth Breu and
Stefan Untherthiner A framework for modelling restricted
delegation of rights in the SECTET . . . ??
Alfonso Rodríguez and
Eduardo Fernández-Medina and
Mario Piattini An MDA approach to develop secure
business processes through a UML 2.0
extension . . . . . . . . . . . . . . . ??
Wenyu Qu and
Masaru Kitsuregawa and
Hai Zhuge and
Hong Shen and
Yinwei Jin A traffic-based routing algorithm by
using mobile agents . . . . . . . . . . ??
R. Obermaisser and
C. El-Salloum and
B. Huber and
H. Kopetz Modeling and verification of distributed
real-time systems using periodic finite
state machines . . . . . . . . . . . . . ??
K. S. Cheung A formal method for synthesising
components of shared resource systems ??
Qingtian Zeng and
Hua Duan Behavior description for complex
flexible manufacturing system based on
decomposition of Petri net . . . . . . . ??
Min-Soo Kim and
Kyu-Young Whang and
Jae-Gil Lee $n$-Gram/2L-approximation: a two-level
$n$-gram inverted index structure for
approximate string matching . . . . . . ??
Anonymous Index to Volume 22, 2007 . . . . . . . . ??
Song Han and
Elizabeth Chang and
Tharam Dillon Pairing-based public-key encryption
schemes with backward-and-forward
security . . . . . . . . . . . . . . . . ??
Jin-Long Wang and
Chen-Hsing Chen Adaptive two-stage QoS provisioning
schemes for CDMA networks . . . . . . . ??
Maja Hadzic and
Elizabeth Chang Onto-agent methodology for design of
ontology-based multi-agent systems . . . ??
Sang-Wook Kim and
Miyoung Shin Subsequence matching under time warping
in time-series databases: observation,
optimization, and performance results ??
Dechang Pi and
Chuhua Xian and
Xiaolin Qin An improved C-means clustering algorithm ??
Abdelkader Hameurlain Special Issue: Data Management in Grid
and P2P Systems: Editorial . . . . . . . ??
C. Comito and
S. Patarin and
D. Talia PARIS: A peer-to-peer architecture for
large-scale semantic data sharing . . . ??
W. He and
L. Fegaras Answering XPath queries with search
predicates in structured P2P networks ??
M. Barhamgi and
D. Benslimane and
A. M. Ouksel PWSMS: A Peer-to-peer Web service
management system for data sharing in
collaborative environments . . . . . . . ??
G. Vargas-Solar and
J-L Zechinelli-Martini and
V. Cuevas-Vicenttín Integrating and querying astronomical
data on the e-GrOV data grid . . . . . . ??
H-S Kim and
C-S Hwang and
S-K Lee and
S-J Choi and
J-M Gil Priority based list scheduling for
sabotage-tolerance with deadline tasks
in desktop grids . . . . . . . . . . . . ??
Wanlei Zhou and
Yang Xiang and
Minyi Guo Special Issue: Network Attacks and
Defense Systems . . . . . . . . . . . . ??
Duc-Liem Vo and
Kwangjo Kim A secure mutual authentication scheme
with key agreement using smart card from
bilinear pairings . . . . . . . . . . . ??
Udaya Kiran Tupakula and
Vijay Varadharajan A hybrid model against TCP SYN and
reflection DDoS attacks . . . . . . . . ??
Zhongwen Li and
Qiong Chen and
Yang Xiang A cross-authentication model and
implementation . . . . . . . . . . . . . ??
Zhuowei Li and
Amitabha Das and
Jianying Zhou and
Jagdish C. Patra Variable-length signatures for intrusion
detection . . . . . . . . . . . . . . . ??
Ruixuan Li and
Zhuo Tang and
Zhengding Lu and
Jinwei Hu Request-driven role mapping framework
for secure interoperation in
multi-domain environments . . . . . . . ??
Shi-Jinn Horng and
Pingzhi Fan and
Ming-Yang Su and
Yuan-Hsin Chen and
Cheng-Ling Lee and
Shao-Wei Lan Anomaly detection for Web server based
on smooth support vector machine . . . . ??
Zhu Hongfeng and
Liu Tianhua and
Liu Jie EV-C2C-PAKE: An improved
client-to-client password-authenticated
key exchange protocol . . . . . . . . . ??
Chua-Ta Li and
Min-Shiang Hwang and
Yen-Ping Chu Improving the security of a secure
anonymous routing protocol with
authenticated key exchange for ad hoc
networks . . . . . . . . . . . . . . . . ??
R. Hooshmand and
M. Ataei Real-coded genetic algorithm applied to
optimal placement of capacitor banks for
unbalanced distribution systems with
meshed/ radial configurations . . . . . ??
Henry Tan and
Fedja Hadzic and
Tharam S. Dillon and
Elizabeth Chang State of the art of data mining of tree
structured information . . . . . . . . . ??
Bent Bruun Kristensen Interaction cases: generalized use cases
in ambient systems . . . . . . . . . . . ??
Joong Hyuk Chang Adaptive selection of tuples over data
streams for efficient load shedding . . ??
R. Obermaisser and
C. El-Salloum and
B. Huber and
H. Kopetz Modeling and verification of distributed
real-time systems using periodic finite
state machines . . . . . . . . . . . . . ??
Song Han and
Elizabeth Chang and
Tharam Dillon Pairing-based public-key encryption
schemes with backward-and-forward
security . . . . . . . . . . . . . . . . ??
Nicolas Guelfi and
Henry Muccini and
Patrizio Pelliccione and
Alexander Romanovsky Special issue: Engineering Fault
Tolerant Systems . . . . . . . . . . . . ??
Francis Tam On the development of standards based
carrier grade platforms . . . . . . . . ??
Michele Banci and
Stefania Gnesi and
Alessandro Fantechi and
Giovanni Lombardi Model driven development of railway
systems using diversity . . . . . . . . ??
Nuno Laranjeiro and
Marco Vieira Deploying fault tolerant Web service
compositions . . . . . . . . . . . . . . ??
Máté Kovács and
Dániel Varró and
László Gönczy Formal analysis of BPEL workflows with
compensation by model checking . . . . . ??
Chien-Lung Hsu Cryptanalysis of elliptic curve
cryptosystem on smart card access
control with threshold scheme . . . . . ??
Ambrosio Toval and
Begoña Moros and
Joaquín Nicolás and
Joaquín Lasheras Eight key issues for an effective
reuse-based requirements process . . . . ??
S. P. Singh and
C. Kistanna and
A. R. Rao Optimal capacitor allocation in
distribution systems using genetic
algorithm . . . . . . . . . . . . . . . ??
William Chung-Kung Yen Restricted independent domination
problems on graphs . . . . . . . . . . . ??
S. Y. Wang and
C. L. Chou On the characteristics of information
dissemination paths in vehicular ad hoc
networks on the move . . . . . . . . . . ??
Wolfgang A. Halang Special issue: Automated control systems
for the safety integrity levels 3 and 4 ??
K. H. (Kane) Kim and
Chansik Im Hybrid approaches for derivation of
tight service time bounds of distributed
embedded computing systems . . . . . . . ??
Peter Tröger and
Andreas Polze Object and process migration in .NET . . ??
Stefan Schemmer and
Edgar Nett Achieving high reliable and timely task
execution in mobile embedded
applications . . . . . . . . . . . . . . ??
Gita Das and
Sid Ray A compact feature representation and
feature re-weighting in content-based
image retrieval . . . . . . . . . . . . ??
Sandeep Kumar and
P. K. Bansal and
Seema Bawa Modified quad tree network with
architectural analysis (M\_QUAD) . . . . ??
Ryan Layfield and
Bhavani Thuraisingham and
Laatifur Khan and
Murat Kantarcioglu Design and implementation of a secure
social network system . . . . . . . . . ??
José Aguilar and
Jorge Chacal and
César Bravo A multiagents system for planning and
management of the production factors . . ??
Giuseppe Lami Analytic effectiveness evaluation of
techniques for natural language software
requirements testability . . . . . . . . ??
Yang-Sae Moon and
Woong-Kee Loh Efficient stream subsequence matching
algorithms for handheld devices on
streaming time-series data . . . . . . . ??
Kequi Li and
Yanming Shen and
Minyi Guo Special issue: Network and Parallel
Computing . . . . . . . . . . . . . . . ??
Tan Yiyu and
Yau Chihang and
Anthony S. Fong and
Yang Xiaojian An instruction folding solution for a
Java processor . . . . . . . . . . . . . ??
Angela L. Chiu and
Gagan Choudhury and
Robert Doverspike and
Guangzhi Li Restoration design in IP over
reconfigurable WDM networks . . . . . . ??
Yang Xiang and
Xiang Fan and
Wen Tao Zhu Propagation of active worms: A survey ??
Liu Weidong and
Lin Chuang and
Wang Jirong A novel data transmission scheme for
mobile sensor network . . . . . . . . . ??
Wenyu Qu and
Masaru Kitsuregawa and
Yanming Shen and
Takashi Nanya An optimal lifetime-adaptive method for
wireless sensor networks . . . . . . . . ??
Chao Peng and
Yasuo Tan and
Naixue Xiong and
Laurence T. Yang and
Hong Zhu Approximation algorithms for inner-node
weighted minimum spanning trees . . . . ??
Siliang Tang and
Jianhua Yang and
Zhaohui Wu A context quality management
infrastructure for complex ubiquitous
environment . . . . . . . . . . . . . . ??
Yanming Shen and
Kequi Li On the design of P2P video streaming
with layered coding . . . . . . . . . . ??
Jackei H. K. Wong and
Allan K. Y. Wong and
Tharam Dillon and
Wilfred W. K. Lin A novel approach to achieve real-time
TCM (traditional Chinese medicine)
telemedicine through the use of ontology
and clinical intelligence discovery . . ??
Gao Shu and
Dingfang Chen Matchmaking framework for visualization
Web services . . . . . . . . . . . . . . ??
Manzur Ashraf and
Syed Mahfuzul Aziz and
M. Lutful Kabir and
Biswajit K. Dey A SIM-based electronic transaction
authentication system . . . . . . . . . ??
Jung-Hoon Lee Low power TLB structure by using dynamic
searching algorithm . . . . . . . . . . ??
Yang-Sae Moon and
Woong-Kee Loh Efficient stream subsequence matching
algorithms for handheld devices on
streaming time-series data . . . . . . . ??
Keqin Li and
Geyong Min Special issue: Advanced Topics on Grid,
Cluster and P2P Computing . . . . . . . ??
Abdullah Kayi and
Edward Kornkven and
Tarek El-Ghazawi and
Samy Al-Bazhra and
Gregory B. Newby Performance analysis and tuning for
clusters with ccNUMA nodes for
scientific computing: a case study . . . ??
Behram Khan and
Matthew Horsnell and
Ian Rogers and
Mikel Luján and
Andrew Dinn and
Ian Watson Exploiting object structure in hardware
transactional memory . . . . . . . . . . ??
Dang Ming Quan and
Jörn Altmann and
Laurence T. Yang Improving the capability of the SLA
workflow broker with parallel processing
technology . . . . . . . . . . . . . . . ??
Wenyu Qu and
Wanlei Zhou and
Masaru Kitsuregawa A parallel information retrieval method
for e-commerce . . . . . . . . . . . . . ??
Yuxin Tang and
Yunquan Zhang and
Hu Chen A parallel shortest path algorithm based
on graph-partitioning and iterative
correcting . . . . . . . . . . . . . . . ??
Hao Yin and
ChangLai Du and
Chao Ren and
Zhijia Chen and
Heyong Min and
Chuang Lin A secure and scalable video conference
system based on peer-assisted content
delivery networks . . . . . . . . . . . ??
John Casey and
Wanlei Zhou Adjacency cache: an efficient P2P Web
cache indexing and lookup system . . . . ??
A. Chatterjee and
M. Goel and
N. Raghuvanshi and
P. Gupta and
S. G. Dhande Facial feature extraction in frontal
views using activeshape models . . . . . ??
Omar Shatnawi Discrete time modelling in software
reliability engineering: a unified
approach . . . . . . . . . . . . . . . . ??
Ioannis Antonellis and
Christos Bouras and
Vassilis Poulopoulos Scalable text classification as a tool
for personalization . . . . . . . . . . ??
Kiarash Mizanian and
Mehdi Vasef and
Morteza Analoui The modified alternating fractal renewal
process for modelling peer to peer
traffic . . . . . . . . . . . . . . . . ??
Yang Ping and
Liao Ningbo Approach on complex neural-genetic
algorithm modeling for isomorphism
identification in conceptual design of
mechanism . . . . . . . . . . . . . . . ??
Luci Pirmez and
Luiz F. R. C. Carmo and
Luiz F. H. Bacellar Enhancing Levenshtein distance algorithm
for assessing behavioral trust . . . . . ??
Pmar Khadeer Hussain and
Tharam Dillon and
Elizabeth Chang and
Farookh Hussain Transactional risk-based decision making
system in e-business interactions . . . ??
Seung-Joon Seok and
Bongsoo You and
Sungwan Youm and
Kyung-Hoe Kim and
Chul-Hee Kang A heuristic multi-path routing scheme
for online traffic in MPLS networks . . ??
H. T. Kung and
S. Y. Wang TCP trunking for bandwidth management of
aggregate traffic . . . . . . . . . . . ??
V. Poursakidis and
C. Nikolaou Towards a person-centric Identity
Management Infrastructure (IMI) . . . . ??
Guillermo L. Taboada and
Juan Touriño and
Ramón Doallo Performance analysis of message-passing
libraries on high-speed clusters . . . . ??
Jiro Iwashige and
Leonard Barolli Electromagnetic Fields Diffracted by Two
Horizontal edges with Arbitrary Angle
for Different and Same Heights . . . . . ??
Hiroshi Maeda Simulation of Soliton Propagation in
Slab Waveguide by Frequency Dependent
FDTD Method . . . . . . . . . . . . . . ??
Makoto Murakami and
Motoi Yamagiwa and
Minoru Uehara Decision Model for a System to Start
Communicating with a Human . . . . . . . ??
Tomoya Enokido and
Makoto Takizawa A Purpose-based Synchronization Protocol
for Secure Information Flow Control . . ??
C. Militello and
V. Conti and
F. Sorbello and
S. Vitabile An embedded IRIS recognizer for portable
and mobile devices . . . . . . . . . . . ??
Alireza Goudarzinemati and
Tomoya Enokido and
Makoto Takizawa Scheduling Algorithms for Concurrently
Streaming Multimedia Objects in P2P
Overlay Networks . . . . . . . . . . . . ??
Antonio Gentile and
Roberto Pirrone and
Giuseppe Russo Knowledge Discovery for the Linguistic
Atlas of Sicily Project . . . . . . . . ??
Motoi Yamagiwa and
Minoru Uehara and
Makoto Murakami A reconstruction method for Ultrasonic
deterioration image by the combination
of Constructive Solid Geometry and
Strongly Typed Genetic Programming . . . ??
David Taniar and
Wenny Rahayu and
Vincent Lee and
Olena Daly Mining Hierarchical Negative Association
Rules . . . . . . . . . . . . . . . . . ??
Frank Morovan and
Abdelkader Hameurlain Special issue: Mobile Data Management:
Models, Methodologies and Services . . . ??
Young-Chang Kim and
Jae-Woo Chang A new distributed grid scheme and $k$-NN
query processing for mobile objects in
spatial networks . . . . . . . . . . . . ??
Geng Zhao and
Kefeng Xuan and
David Taniar and
Bala Srinivasan LookAhead continuous KNN mobile query
processing . . . . . . . . . . . . . . . ??
Bhuvan Bamba and
Ling Liu and
Philip S. Yu A motion-aware safe period-based
framework for spatial alarm processing ??
Michele Ruta and
Floriano Scioscia and
Tommaso Di Noia and
Eugenio Di Sciascio A hybrid ZigBee/Bluetooth approach to
mobile semantic grids . . . . . . . . . ??
Yiwei Cao and
Ralf Klamma and
Matthias Jarke Mobile multimedia management for Virtual
Campfire --- the German excellence
research cluster UMIC . . . . . . . . . ??
Ernesto Damiani and
Luis Barbosa and
Peter T. Breuer and
Claudio A. Ardagna Special issue: Open Source Certification ??
Luis S. Barbosa and
Antonio Cerone and
Alexander K. Petrenko and
Siraj A. Shaikh Certification of open-source software: A
role for formal methods? . . . . . . . . ??
Pedro Luis Mateo Navarro and
Gregorio Martínez Pêrez and
Diego Sevilla Ruiz OpenHMI-tester: an open and
cross-platform architecture for GUI
testing and certification . . . . . . . ??
Etiel Petrinja and
Giancarlo Succi Trustworthiness of the FLOSS development
process . . . . . . . . . . . . . . . . ??
Chiara Francalanci and
Francesco Merlo Empirical analysis of the bug fixing
process in open source projects . . . . ??
Yuh-Dauh Lyuu and
Ming-Luen Wu Group undeniable signatures with
convertibility . . . . . . . . . . . . . ??
V. Lakshmi Praba and
G. Arumugam Message authentication code algorithm
for IP-SEC . . . . . . . . . . . . . . . ??
Rodolfo Sumoza and
Jose Aguilar Castro A cache coherence protocol for
distributed memory platforms . . . . . . ??
Yang-Sae Moon and
Jinho Kim MBR-safe piecewise aggregate
approximation for time-series
subsequence matching . . . . . . . . . . ??
K. Bekiropoulos and
E. Keramopoulos and
O. Beza and
P. Mouratidis A list of features that a graphical XML
query language should support . . . . . ??
Muhammad Sheikh Sadi and
D. G. Myers and
Cesar Ortega Sanchez and
Jan Jurjens Component criticality analysis to
minimize soft errors risk . . . . . . . ??
Kai Lin and
Kequi Li Special issue: Selected topics on
Wireless Sensor Networks . . . . . . . . ??
Song Guo and
An-Ni Shen A compromise-resilient pair-wise
rekeying protocol in hierarchical
wireless sensor networks . . . . . . . . ??
Guangcheng Qin and
Panlong Yang and
Guihai Chen and
Deke Guo Characterizing the scaling capacity for
multiple access wireless sensor networks ??
Zhongwen Guo and
Yuan Feng and
Lu Hong and
Ying Guo and
Meng Yang Efficient and adaptive transmission
algorithms for underwater acoustic
networks . . . . . . . . . . . . . . . . ??
Junfeng Xu and
Kequi Li and
Yanming Shen and
Geyong Min An energy efficient packet aggregation
scheme for wireless sensor networks . . ??
Xiaowu Chen and
Yongtao Ma and
Qinping Zhao Multi-category Web object extraction
based on relation schema . . . . . . . . ??
Baoshu Xu and
Wenyu Qu and
Wanlei Zhou A mobile agent-based routing algorithm
and some theoretical analysis . . . . . ??
Rodolfo Sumoza and
Jose Aguilar Castro A cache coherence protocol for
distributed memory platforms . . . . . . ??
Eun-Sun Cho and
Manpyo Hong A structural view definition for RDF
data . . . . . . . . . . . . . . . . . . ??
Xiangxian Chen and
Hai Huang and
Jiafang Zhang In-car speech enhancement based on
ensemble empirical mode decomposition ??
Ercan Bulus Designing attacks for SMTP servers . . . ??
Prashant M. Dolia and
Ashwin R. Dobariya New approach towards event monitoring
through IP surveillance technology using
4G mobile devices . . . . . . . . . . . ??
Fouzi Harrag and
Aboubekeur Hamdi-Cherif and
Abdul Malik S. Al-Salman and
Eyas El-Qawasmeh Evaluating the effectiveness of VSM
model and topic segmentation in
retrieving Arabic documents . . . . . . ??
Danielle Costa and
Luci Pirmez and
Luiz F. R. C. Carmo and
Luiz F. H. Bacellar Enhancing Levenshtein distance algorithm
for assessing behavioral trust . . . . . ??
Pedram Hayati and
Vidyasagar Potdar and
Alex Talevski and
Kevin Chai Characterisation of Web spambots using
self organising maps . . . . . . . . . . ??
Ali Mirza Mahmood and
Mrithyumjaya Rao Kuppa Increasing generalization accuracy by
using multivariate statistical method ??
Gang Xue and
Tony Chen and
Gang He and
Shaowen Yao Modeling service interaction patterns ??
Eyas El-Qawasmeh Categorizing received email to improve
delivery . . . . . . . . . . . . . . . . ??
Georgia Frantzeskou and
Stephen G. MacDonell and
Efstathios Stamatatos and
Stelios Georgiou and
Stefanos Gritzalis The significance of user-defined
identifiers in Java source code
authorship identification . . . . . . . ??
Kun Yue and
Wei-Yi Liu and
Li-Ping Zhou Automatic keyword extraction from
documents based on multiple
content-based measures . . . . . . . . . ??
Yi Sun and
Lizhe Wang and
Wei Jie and
Cheng Fu Special issue --- Research in e-science:
current status and future direction . . ??
Zheng Xu and
Xiangfeng Luo and
Lizhe Wang Incremental building association link
network . . . . . . . . . . . . . . . . ??
Peng Zhang and
Sabu Emmanuel and
Yanning Zhang and
Cheng Fu Auto-scaled ISL tracking for region
based control infrastructure and
applications in video surveillance . . . ??
Guoli Wang and
Chao Huang Energy-efficient beaconless real-time
routing protocol for wireless sensor
networks . . . . . . . . . . . . . . . . ??
Zhe Tang and
Meng Joo Er and
Fang Qi Dynamic fuzzy neural network for the
intelligent control of a humanoid robot ??
Dan Chen and
Lizhe Wang and
Congcong Bian and
Xuguang Zhang A grid infrastructure for hybrid
simulations . . . . . . . . . . . . . . ??
Jungying Chen and
Dan Chen and
Oliver Lemon A feature-based detection and tracking
system for gaze and smiling behaviours ??
Tianyi Zang and
Radu Calinescu and
Marta Kwiatkowska Metamodel-driven SOA for collaborative
e-science application . . . . . . . . . ??
Sanghyun Yoo and
Ki Yong Lee and
Myoung Ho Kim Fast $k$-NN search using pre-computed
$l$-NN sets . . . . . . . . . . . . . . ??
Yun Shen and
Ling Feng Evaluation of XPath queries with
predicates: an Eulerian cycle theory
based sequencing approach . . . . . . . ??
Görkem Çetyn and
Mehmet Göktürk Assessing usability readiness of
collaborative projects . . . . . . . . . ??
Haengrae Cho Distributed multidimensional clustering
based on spatial correlation in wireless
sensor networks . . . . . . . . . . . . ??
D. Surendran and
T. Purusothaman and
R. A. Baclachandar Performance analysis of a resource
aggregator in a grid of grids
environment . . . . . . . . . . . . . . ??
Helaine Sousa and
Denivaldo Lopes and
Zair Abdelouahab and
Daniela Barreiro Claro and
Slimane Hammoudi An approach for model driven testing:
framework, metamodels and tools . . . . ??
Xin Bai and
Michael B. Smith and
Rathika Rajaravivarma Affordance of ubiquitous learning
through cloud computing . . . . . . . . ??
Xuping Tu and
Hai Jin and
Zhibin Yu and
Jie Chen and
Yabin Hu and
Xie Xia MT-BTRIMER: A master-slave
multi-threaded dynamic binary translator ??
Jijun Cao and
Jinshu Su and
Jing Xie and
Feng Chen DBMISD-D: A distributed algorithm for
constructing and maintaining high
stability application-layer multicast
tree . . . . . . . . . . . . . . . . . . ??
Xiaohui Wei and
Hongliang Li and
Qingnan Guo and
Na Jiang and
Liang Hu LimeVI: A platform for virtual cluster
live migration over WAN . . . . . . . . ??
Likun Liu and
Cheng Chen and
Yongwei Wu and
Guangwen Yang Metadata changes in large file systems:
a metadata querying perspective . . . . ??
Weijiang Liu and
Wenyu Qu and
Zhaobin Liu and
Kequi Li A novel method for estimating flow
length distributions from double-sampled
flow statistics . . . . . . . . . . . . ??
Jing Xiao and
Min Zhu HyperMonitor: A lightweight
multi-platform monitor based on hardware
virtualization . . . . . . . . . . . . . ??
T. Richardson and
A. J. Wellings On the road to real-time OSGi: extending
OSGi with an admission control protocol ??
James Hill and
Hunt Sutherlandy and
Paul Staudingery and
Thomas Silveriaz and
Douglas C. Schmidt and
John Slabyz and
Nikita Visnevskiy OASIS: an architecture for dynamic
instrumentation of enterprise
distributed real-time and embedded
systems . . . . . . . . . . . . . . . . ??
H. Posadas and
E. Villar and
Dominique Ragot and
Marcos Martinez Early, time-approximate modeling of
multi-OS Linux platforms in a systemC
co-simulation environment . . . . . . . ??
Jon Perez and
Roman Obermaisser and
Carlos F. Nicolas and
Iban Ayestaran Modeling time-triggered real-time
control systems using executable
time-triggered model (E-TTM) and
systemC-AMS . . . . . . . . . . . . . . ??
Olivier Gilles and
Jerome Hugues A MDE-based optimisation process for
real-time systems: optimizing systems at
the architecture-level using the real
DSL and library of transformation and
heuristics . . . . . . . . . . . . . . . ??
Albrecht Kadlec and
Raimund Kirner and
Peter Puschner Code transformations to prevent timing
anomalies . . . . . . . . . . . . . . . ??
Julian Wolf and
Mike Gerdes and
Florian Kluge and
Sascha Uhrig and
Jörg Mische and
Stefan Metzlaff and
Christine Rochange and
Hugues Cassé and
Pascal Sainrat and
Theo Ungerer RTOS support for execution of
parallelized hard real-time tasks on the
MERASA multi-core processor . . . . . . ??
Hiromasa Shimada and
Alexandre Courbot and
Yuki Kinebuchi and
Tatsuo Nakajima A software infrastructure for dependable
embedded systems . . . . . . . . . . . . ??
Stefan Henkler and
Simon Oberthür and
Holger Giese and
Andreas Seibel Model-driven runtime resource
predictions for advanced mechatronic
systems with dynamic data structures . . ??
Alexander von Renteln and
Uwe Brinkschulte Implementing and evaluating the AHS
organic middleware . . . . . . . . . . . ??
Joanna Koodziej and
Hiroaki Nishino Preface . . . . . . . . . . . . . . . . ??
Aleksander Byrski and
Roman Debski and
Marek Kisiel-Dorohinicki Agent-based computing in an augmented
cloud environment . . . . . . . . . . . ??
Ejaz Ahmed and
Nik Bessis and
Peter Norrington and
Yong Yue Data integration: the method of data
mapping, matching and loading grid
staging catalogue . . . . . . . . . . . ??
Seiji Okajima and
Yoshihiro Okada Hierarchical visual motion retrieval
system for distributed motion DB and its
user experiments . . . . . . . . . . . . ??
Yutaka Okaie and
Tadashi Nakano Network formation games in
non-cooperative service overlay networks ??
Admir Barolli and
Fatos Xhafa and
Christian Sánchez and
Makoto Takizawa A study on the effect of mutation in
genetic algorithms for mesh router
placement in wireless mesh networks . . ??
Tsuneo Kagawa and
Hiroaki Nishino and
Kouichi Utsumiya Development and evaluation of an
interactive texture design method . . . ??
Toshihiko Wakahara and
Noriyasu Yamamoto and
Hiroki Ochi Image processing of dotted picture in QR
code of cellular phones . . . . . . . . ??
Jun Shen and
Soo Dong Kim and
Nalini Venkatasubramanian Special issue: Service Oriented
Computing and Applications . . . . . . . ??
Farzad Sanati and
Jie Lu An ontology for e-government service
integration . . . . . . . . . . . . . . ??
Neda Alipanah and
Latifur Khan and
Bjavani Thurisingham Optmized ontology-driven query expansion
using map-reduce framework to facilitate
federated queries . . . . . . . . . . . ??
Andreas Schönberger and
Guido Wirtz Configurable analysis of sequential
multi-party choreographies . . . . . . . ??
Hmood Al-Dossari and
Jianhua Shao and
Alun Preece Improving QoS assessment over multiple
attributes with asynchronous data . . . ??
Jae-Suk Lee and
Sung-Bong Yang An improved pathfinding under multiple
exits with SOA in a double-layered MANET ??
Osvaldo Gervasi and
Bernady O. Apduhan and
C. J. Kenneth Tan and
David Taniar Preface . . . . . . . . . . . . . . . . ??
Ilsun You and
Jong-Hyouk Lee and
Kouichi Sakurai DSSH: Digital signature based secure
handover for network-based mobility
management . . . . . . . . . . . . . . . ??
Shinya Kondo and
Akimitsu Kanzaki and
Takahiro Hara and
Shojiro Nishio Integration of traffic reduction and
sleep scheduling in wireless sensor
networks . . . . . . . . . . . . . . . . ??
Mahmudul Hasan and
Marina L. Gavrilova and
Jon G. Rokne Clearance-based homotopic optimal path
computation . . . . . . . . . . . . . . ??
Olivia Fachrunnisa and
Farookh Khadeer Hussain digital enterprise . . . . . . . . . . . ??
Deniz Cokuslu and
Abdelkader Hemeurlain and
Kayhan Erciyes Resource allocation for query processing
in grid systems: a survey . . . . . . . ??
Bory J. Bradel and
Tarek S. Abdelrahman Inlining with traces in Java programs ??
D. Surendran and
T. Purusothaman and
R. A. Balachandar and
G. Kousalya ESGIA: Extensible service based grid
information aggregator . . . . . . . . . ??
Hesham A. Ali and
Mofreh M. Salem and
Ahmed A. Hamza A framework for scalable autonomous P2P
resource discovery for the grid
implementation . . . . . . . . . . . . . ??
Ilsun You and
Leonard Barolli and
Feilong Tang Editorial . . . . . . . . . . . . . . . ??
Fang-Yie Leu and
Fuu-Cheng Jiang and
Chih-Cheng Lien and
Sen-Tarng Lai and
Shiuan-You Chiou A rate-allocation based multi-path
control scheme for event-driven wireless
sensor networks on constant event packet
rates . . . . . . . . . . . . . . . . . ??
Tao Yang and
Tetsuya Oda and
Gjergji Mino and
Leonard Barolli and
Arjan Durresi and
Fatos Xhafa Energy-saving in wireless sensor
networks considering mobile sensor
nodes, single and multi events . . . . . ??
Min-jun Kim and
Yong-suk Jang and
Yong-do Choi and
Sung-ho Kim Differentiated bandwidth allocation and
wavelength assignment method in WDM EPON ??
Yuhoing Li and
Liang Yu and
Tao Li and
Yishan Li and
Yan Shi Utility-based resource allocation in
heterogeneous wireless environments
using game theory . . . . . . . . . . . ??
Feilong Tang and
Ilsun You and
Shui Yu and
Huakang Li and
Cho-Li Wang Grid transaction management and an
efficient development kit . . . . . . . ??
Yu Han and
Naigao Jin and
Guangwei Xu and
Kangbin Yim A new iterative learning control scheme
using the geometric rotation for
discrete time systems . . . . . . . . . ??
Tingting Liu and
Jie Cui and
Bo Wang and
Gang Chen Parallelization of normal mode-WKBZ
computation for ocean acoustic field . . ??
Ilsun You and
JinShu Su Editorial . . . . . . . . . . . . . . . ??
Huachun and
Hongke Zhang and
Fei Song Mobility management analysis of Internet
based on the splitting mechanism . . . . ??
Sun-Ho Lee and
Kangbin Yim and
In-Yeong Lee A secure solution with a password
recovery feature for USB flash drives ??
Hyunwoo Kim and
Mye Sohn and
Hyun Jung Lee Personalized recommendation framework
based on CBR and CSP using ontology in a
ubiquitous computing environment . . . . ??
Hsing-Chung Chen and
Yung-Fa Huang and
Shu-Hong Lee and
Chi-Tung Chen and
Ho-Lung Hung A mobile location-based with
time-constraint RBAC associated database
management model . . . . . . . . . . . . ??
Zhenqian Feng and
Bing Bai and
Baokang Zhao and
Jinshu Su ICTree: discovering the underlying
connections of your rental virtual
machines in the public clouds . . . . . ??
Jongsuk R. Lee and
Don McNickle and
Krzysztof Pawlikowski and
Hae-Duck J. Jeong Self-similar properties of malicious
teletraffic . . . . . . . . . . . . . . ??
Nenad Stefanovic and
Dusan Stefanovic Integrated and interactive software
solution for knowledge-based supply
network design . . . . . . . . . . . . . ??
Xabier Ugarte-Pedrero and
Igor Santos and
Carlos Laorden and
Borja Sanz and
Pablo G. Bringas Collective Classification for Packed
Executable Identification . . . . . . . ??
Mahmoud Khonji and
Andrew Jones and
Youssef Iraqi An Empirical Evaluation for Feature
Selection Methods in Phishing Email
Classification . . . . . . . . . . . . . ??
Jernej Porenta and
Mojca Ciglaric Comparing commercial IP reputation
databases to open-source IP reputation
algorithms . . . . . . . . . . . . . . . ??
Lei Ye and
Henry C. B. Chan B2B magics: a mobile agent-based
Internet commerce system for B2B
e-commerce . . . . . . . . . . . . . . . ??
K. Bekiropoulos and
E. Keramopoulos and
O. Beza and
P. Mouratidis A list of features that a graphical XML
query language should support . . . . . ??
Song Han and
Tharam Dillon and
Vidy Potdar and
Elizabeth Chang RFID mutual authentication protocols for
tags and readers with and without a
server . . . . . . . . . . . . . . . . . ??
Jun-Im Won and
Hyun Back and
Jee-Hee Yoon and
Sanghyun Park and
Sang-Wook Kim One-dimensional spatial join processing
using a DOT-based index structure . . . ??
Alexander Thomasian Improved storage system performance by
disk scheduling . . . . . . . . . . . . ??
Jywe-Fei Fang and
Chien-Hung Huang Algorithmic bipanpath connectivity of
the hypercube . . . . . . . . . . . . . ??
Mohd Yamani Idna Idris and
Moraali Sivalingam and
Emran Mohd Tamil and
Zaidi Razak and
Noorzaily Mohamed Noor Emergency vehicle preemption system
based on global positioning system
(GPS), A-star (A*) algorithm and FPGA ??
Apolinar Gonzalez and
Walter Mata and
Alfons Crespo and
Miguel Masmano and
José Félix and
Alvaro Aburto A hypervisor based platform to support
real-time safety critical embedded Java
applications . . . . . . . . . . . . . . ??
Lei Ye and
Adam S. K. Ho and
Solomon K. S. Leung and
Henry C. B. Chan A business-to-business e-commerce system
using software agents and RFID . . . . . ??
Tarek Helmy Priority-based scheduling for dependent
processes using random selection of
resource holders . . . . . . . . . . . . ??
J. Daniel Garcia and
Jesus Carretero and
Javier Garcia and
Luis Miguel Sanchez and
Felix Garcia by using partial replication . . . . . . ??
P. Prema and
B. Ramadoss and
S. R. Balasundaram An algorithm for merging two
classification trees for test case
generation . . . . . . . . . . . . . . . ??
Vimala S. and
Khanna Nehemiah H. and
Saranya G. and
Kannan A. Analysis and modeling of multivalued
attributes in entity relationship
modeling: an approach for improved
database design . . . . . . . . . . . . ??
Marisol García-Valls and
Alfons Crespo and
Joan Vila Resource management for mobile operating
systems based on the active object model ??
Shinya Kondo and
Akimitsu Kanzaki and
Takahiro Hara and
Shojiro Nishio Integration of traffic reduction and
sleep scheduling for energy-efficient
data gathering in wireless sensor
networks . . . . . . . . . . . . . . . . ??
Mahmoud O. Elish object-oriented software . . . . . . . . ??
Wen-Feng Hsiao and
Te-Min Chang Term expansion on the categorization of
summarized documents . . . . . . . . . . ??
ChaoYong Qin and
Chenhan Liao Session identification based on linked
referrers and Web log indexing . . . . . ??
A. J. Dinusha Rathnayaka and
Vidyasagar M. Potdar and
Tharam Dillon and
Omar Hussain and
Samitha Kuruppu Prosumer recruitment framework for
prosumer community groups in smart-grid ??
Kun Yue and
Wei-Yi Liu and
Wen-Hua Qian and
Xiao-Feng Wang Discovering semantic associations
between Web services based on the
electrostatic force theory . . . . . . . ??
Marisol García-Valls and
Pablo Basanta-Val and
Marga Marcos and
Elisabet Estévez A bi-dimensional QoS model for SOA and
real-time middleware . . . . . . . . . . ??
R. Anitha and
K. Duraiswamy Application of digital image processing
in the determination of mass of the
diamonds . . . . . . . . . . . . . . . . ??
Javier Fernández and
Alejandro Calderón and
Félix García and
Jesús Carretero Enhancing multimedia caching algorithms
for variable-bandwidth streams using
adaptive and smoothing techniques . . . ??
Alois Ferscha and
Siani Pearson Editorial . . . . . . . . . . . . . . . ??
Tomer Gershoni and
Miranda Mowbray and
Siani Pearson Mechanisms for Protecting Sensitive
Information in Cloud Computing . . . . . ??
Volkmar Lotz and
Anderson Santana de Oliveira and
Jakub Sendor Control as a Means towards Accountable
Services in the Cloud . . . . . . . . . ??
D. Davide Lamanna and
Flavio Bertini and
Giorgia Lodi and
Roberto Baldoni How to Act Without being Observed:
Progressive Privacy Architecture in
Desktop-as-a-Service . . . . . . . . . . ??
Massimo Ficco and
Salvatore Venticinque and
Beniamino Di Martino An Advanced Intrusion Detection
Framework for Cloud Computing . . . . . ??
José Simão and
Luís Veiga Adaptability Driven by Quality of
Execution in High Level Virtual Machines
for Shared Cloud Environments . . . . . ??
João Paulo and
Pedro Reis and
José Pereira and
António Sousa Towards an Accurate Evaluation of
Deduplicated Storage Systems . . . . . . ??
Debmalya Biswas and
Krishnamurthy Vidyasankar Secure Cloud Transactions . . . . . . . ??
Vidyasagar Potdar Guest Editor . . . . . . . . . . . . . . ??
Jaya Bhattacharjee and
Anirban Sengupta and
Chandan Mazumdar and
Mridul Sankar Barik A two-phase quantitative methodology for
enterprise information security risk
analysis . . . . . . . . . . . . . . . . ??
Aziz Qaroush and
Mahdi Washaha and
Ismail Khater Efficient spam filtering based on
informative features extracted from the
header fields and the URLs in the
message . . . . . . . . . . . . . . . . ??
James Carmichael Diagnosis of dysarthria subtype via
spectral and waveform analysis . . . . . ??
Pallavi Khatri and
S. Tapaswi and
U. P. Verma Trust evaluation in wireless ad-hoc
networks using fuzzy system . . . . . . ??
Wuyungerile Li and
Shunsuke Saruwatari and
Masaki Bandai and
Takashi Watanabe Discussions on trade-offs in data
aggregation in wireless sensor networks ??
Supriya Chakraborty and
Nabendu Chaki Generic organization of semi-structured
data . . . . . . . . . . . . . . . . . . ??
Ari Raptino H and
Shunsuke Saruwatari and
Masaki Bandai and
Takashi Watanabe Rate and relay diversity in temporal
spectrum sharing . . . . . . . . . . . . ??
Zhixiao Wang and
Yanxiao Liu and
Wenyao Yan and
Wei Wei and
Junhuai Li and
Deyun Zhang and
Omar Alfandi Cheating detection and cheater
identification in $ (t, n) $ secret
sharing scheme . . . . . . . . . . . . . ??
Andrés Mejía and
Reyes Juárez-Ramírez and
Sergio Inzunza and
Rocio Valenzuela Implementing adaptive interfaces: a use
model for the development of usability
in interactive systems . . . . . . . . . ??
M. Suresha and
Ajit Danti and
S. K. Narasimhamurthy Decision trees to multiclass prediction
for analysis of arecanut data . . . . . ??
Atsushi Kato Software industry in Okinawa: is
``domestic offshore outsourcing'' scheme
feasible? . . . . . . . . . . . . . . . ??
Muhamman Ali Ismail and
Shahid H. Mirza and
Talat Altaf `LogN+1' and `LogN' model: a binary tree
based multi-level cache system for
multi-core processors . . . . . . . . . ??
A. M. Kalpana and
K. Tamizarasu and
A. Ebenezer Jeyakumar A fuzzy logic based framework for
assessing the maturity level of Indian
small scale software organizations . . . ??
Yangjie Cao and
Hongyang Sun and
Depei Qian and
Weiguo Wu Scalable hierarchical scheduling for
malleable parallel jobs on
multiprocessor-based systems . . . . . . ??
Shahzad Ali and
Sajjad A. Madani and
Atta ur Rehman Khan and
Imran Ali Khan Routing protocols for mobile sensor
networks: a comparative study . . . . . ??
Marian Zomorodi Moghadam and
Keivan Navi and
Mahmood Kalemati A novel reversible design for double
edge triggered flip-flops and new
designs of reversible sequential
circuits . . . . . . . . . . . . . . . . ??
Carmelo Militello and
Vincenzo Conti and
Filippo Sorbello and
Salvatore Vitabile A fast fusion technique for fingerprint
and iris spatial descriptors in
multimodal biometric systems . . . . . . ??
Hasan Guler and
Fikret Ata Design of a fuzzy-labview-based
mechanical ventilator . . . . . . . . . ??
Lucas Grossi and
Jose A. Calvo-Manzano A systematic review in the decision
analysis of selecting an IT outsourcing
supplier . . . . . . . . . . . . . . . . ??
Rerkchai Fooprateepsiri and
Pichet Mareo A highly robust approach to face
authentication based on trace-fuzzy ART
combination . . . . . . . . . . . . . . ??
Kequi Li and
Heng Qi Special Issue: Multimedia Information
Processing and Retrieval . . . . . . . . ??
Kequi Li and
Heng Qi Preface . . . . . . . . . . . . . . . . ??
Guan-Wen Zhang and
Jien Kato and
Yu Wang and
Kenji Mase Multi-stage deep convolutional learning
for people re-identification . . . . . . ??
Zhiyang Li and
Wenyu Qu and
Yujie Xu and
Junjie Cao and
Zhixun Su Efficient shape representation and
retrieval in large database . . . . . . ??
Cuong Xuan Nguyen and
Hung-Hsuan Huang and
Kyoji Kawagoe Implementation and evaluations of
graphical password using object-based
image ranking . . . . . . . . . . . . . ??
Heng Qi and
Guoyu Lan and
Kequi Li A hierarchical kernel for image
classification based on layered
representation . . . . . . . . . . . . . ??
Wei Jiang and
Cong Wang and
Yong-Qing Zhang Multiple graph regularization
constrained nonnegative matrix
factorization . . . . . . . . . . . . . ??
Marisol García-Valls and
Pablo Basanta-Val and
Marga Marcos and
Elisabet Estévez A bi-dimensional QoS model for SOA and
real-time middleware . . . . . . . . . . ??
Manoj K. Raut and
Arindama Singh A survey on computing prime implicants
and implicates in classical and
non-classical logics . . . . . . . . . . ??
Se Jung Shin and
Won Suk Lee Interactive discovery of association
rules over data streams . . . . . . . . ??
R. Anitha and
K. Duraiswamy Application of digital image processing
in the determination of mass of the
diamonds . . . . . . . . . . . . . . . . ??
Mohammad Osiur Rahman and
Aini Hussain and
Edgar Scavino and
M. A. Hannan and
Hassan Basri DNA computation algorithm for recyclable
waste paper sorting . . . . . . . . . . ??
Jianfeng Guan and
Wei Quan and
Lili Wang and
Changqiao Xu and
Feilong Tang and
Hongke Zhang Modeling and analysis of mobility
stochastic properties in cognitive radio
networks . . . . . . . . . . . . . . . . ??
C. Mala and
B. Nithya Performance evaluation of IEEE 802.11
contention control mechanisms using
polygonal sequences . . . . . . . . . . ??
Wei Kuang Lai and
Yi-Uan Chen and
Tin-Yu Wu and
Ya-Yin Chen Dual migration for mobile cloud service
in 4G/LTE network . . . . . . . . . . . ??
Yong-Hwan Lee and
Bonam Kim and
Youngseop Kim AAM-based emotion recognition using
variance of facial feature points on
mobile video stream . . . . . . . . . . ??
Ho-Seok Kang and
Tran Tin and
Sung-Ryul Kim Design and experiments of new IP
traceback method based on offline
analysis . . . . . . . . . . . . . . . . ??
Joseph Rafferty and
Liming Chen and
Chris Nugent and
Jun Liu Goal lifecycles and ontological models
for intention based assistive living
within smart environments . . . . . . . ??
Laura M. McAvoy and
Liming Chen and
Mark P. Donnelly and
Chris D. Nugent and
Paul J. McCullagh Ontological characterization and
representation of context within smart
environments . . . . . . . . . . . . . . ??
Antonio Coronato and
Giovanni Paragliola An anomalous situation detection system
for cognitive impaired people . . . . . ??
Alberto L. Morán and
Felipe Orihuela-Espina and
Victoria Meza-Kubo and
Ana I. Grimaldo and
Cristina Ramírez-Fernández and
Eloísa García-Canseco and
Juan M. Oropeza-Salas and
Luis E. Sucar Out of context serious games:
Transversal reutilization of games
across healthcare domains . . . . . . . ??
Diego Muñoz and
Francisco J. Gutierrez and
Sergio F. Ochoa and
Nelson Baloian Social connector: a ubiquitous system to
ease the social interaction among family
community members . . . . . . . . . . . ??
Carlos Rodríguez-Domínguez and
Tomás Ruiz-López and
José Luis Garrido and
Manuel Noguera and
Kawtar Benghazi A model-driven approach to service
composition on the basis of the
specification of BPMN choreographies . . ??
Constantin Taivan and
Rui José and
Bruno Silva Web-based applications for open display
networks: developers' perspective . . . ??
David E. Singh and
Florin Isaila and
Félix García and
Jesús Carretero Magio: using mobile agents to enhance
parallel I/O . . . . . . . . . . . . . . ??
Hai Tanh Mai and
Jaeho Kim and
Myoung Ho Kim Integrating outlier removal into
existing histogram construction methods
for geographic data . . . . . . . . . . ??
Rawaa Dawoud Al-Dabbagh and
Saad Mekhilef and
Mohd Sapiyan Baba Parameters' fine tuning of differential
evolution algorithm . . . . . . . . . . ??
ChaoYong Qin and
Chenhan Liao Session identification based on linked
referrers and web log indexing . . . . . ??
Glaucio H. S. Carvalho Optimal WiMax backhauling solutions for
WiFi traffic . . . . . . . . . . . . . . ??
M'hamed Mataoui and
Mohamed Mezghiche A distance based approach for link
analysis in XML information retrieval ??
Hai Tanh Mai and
Ki Yong Lee and
Myoung Ho Kim Dynamic filtering of sensor readings for
approximate query processing in sensor
networks . . . . . . . . . . . . . . . . ??
Jijun Cao and
Jinshu Su Improving application layer multicast
forwarding performance by offloading
multisend operations . . . . . . . . . . ??
Yan Tang Demey and
Gang Zhao SDD-matcher: a semantic-driven data
matching framework . . . . . . . . . . . ??
Chihang Zhao and
Jie He and
Xiaoqin Zhang and
Xingzhi Qi and
Aiwen Chen Recognition of driving postures by
nonsubsampled contourlet transform and
$k$-nearest neighbor classifier . . . . ??
Sergio Arévalo and
Ernesto Jiménez and
Jian Tang and
Rommel Torres Set agreement and the loneliness failure
detector in crash-recovery systems . . . ??
S. Varadhaganapathy and
V. Krishnaveni and
G. Arumugam and
R. R. Rajalaxmi Harmony and bio inspired harmony search
optimization algorithms for feature
selection in classification . . . . . . ??
A. Rebhi and
S. Abid and
F. Fnaiech Fabric defect localization using line
variances of the local homogeneity
images . . . . . . . . . . . . . . . . . ??
Ping Wang and
Kuo-Ming Chao and
Chi-Chun Lo A reputation-based computing approach in
trusted web service provisions . . . . . ??
Mohammad Ali Zare Chahooki and
Nasrollah Moghaddam Charkari Bridging the semantic gap for automatic
image annotation by learning the
manifold space . . . . . . . . . . . . . ??
A. J. Dinusha Rathnayaka and
Vidyasagar M. Potdar and
Tharam Dillon and
Omar Hussain Prosumer recruitment framework for
prosumer community groups in smart-grid ??
Qingyuan Zhou and
Jianjian Luo Artificial neural network based grid
computing of e-governance scheduling for
emergency management . . . . . . . . . . ??
Qingjun Qu and
Yiping Yao A task distribution algorithm compatible
with background control framework for
parallel simulation . . . . . . . . . . ??
Yan Wei and
Shi Songshan and
Liu Zhenggang and
Li Guoxiang Investigation on remote monitoring
system for hybrid electric bulldozer . . ??
Jin Bao-quan and
Bai Qing and
Zhang Hong-juan and
Wang dong and
Gao Yan Design and analysis of communication
scheduling applied in water inrush
perception layer of mine Internet of
Things . . . . . . . . . . . . . . . . . ??
Shengqing Zhang and
Jiakuo Zuo and
Li Zhao and
Cairong Zhu Energy-efficient power allocation for
MIMO two-way cognitive relay networks ??
Shunxiang Zhang and
Kui Lu and
Wenjuan Liu and
Xiaobo Yin and
Guangli Zhu Generating associated knowledge flow in
large-scale web pages based on user
interaction . . . . . . . . . . . . . . ??
Xiang Zhang and
HuaiXiang Zhang and
Yifan Wu and
Guojun Dai A SoPC design of a real-time
high-definition stereo matching
algorithm . . . . . . . . . . . . . . . ??
Zheng Xu and
Haiyan Chen The semantic analysis of knowledge map
for the traffic violations from the
surveillance video big data . . . . . . ??
Jingsheng Lei and
Teng Jiang and
Kui Wu and
Haizhou Du and
Lin Zhu Robust local outlier detection with
statistical parameter for big data . . . ??
Xiao Wei and
Daniel Dajun Zeng and
Wei Wu and
Yeming Dai Building the concept semantic space for
large text database . . . . . . . . . . ??
Weijiang Liu and
Zhiyang Li ICA3PP/U-Science 2014 . . . . . . . . . ??
Xiaohua Jia and
Jinhai Wang and
Chuanhe Huang and
Qin Liu and
Kai He and
Jing Wang and
Peng Li Dynamic resource allocation based on
energy utility maximization using
virtual machines in cloud environment ??
Aiping Zhou and
Guang Cheng and
Xiaojun Guo and
Dinh Tu Truong and
Chengang Zhu Heavy hitter identification based on
adaptive sampling with mapreduce . . . . ??
Xinfeng Ye Security games for service computing
applications . . . . . . . . . . . . . . ??
Yandong Guo and
Min Huang and
Qing Wang Rescheduling rework jobs on
single-machine of original jobs with
release times . . . . . . . . . . . . . ??
Tingting Wang and
Weijiang Liu and
Yujie Xu and
Mianxiong Dong QoS oriented task scheduling based on
generic algorithm in cloud computing . . ??
Yanling Hu and
Anfeng Liu Improving the quality of mobile target
detection through portion of node with
full duty cycle in WSNs . . . . . . . . ??
Mohammad Ali Zare Chahooki and
Nasrollah Moghaddam Charkari Bridging the semantic gap for automatic
image annotation by learning the
manifold space . . . . . . . . . . . . . ??
Shailey Chawla and
Sangeeta Srivastava and
Punam Bedi Goals and scenarios based web
requirements engineering . . . . . . . . ??
Hamid Alishvandi and
Gholam Hosein Gouraki and
Hamid Parvin An enhanced dynamic detection of
possible invariants based on best
permutation of test cases . . . . . . . ??
Guest Editors: Zhiyang Li and
Nei Kato Special issue: BDCloud 2015 and FCST
2015 . . . . . . . . . . . . . . . . . . ??
Wen-Kai Huang and
Chang-Dong Wang and
Shao-Shu Huang and
Zheng Li and
Jian-Huang Lai and
Ling Huang Long-term revenue maximization pricing
scheme for cloud . . . . . . . . . . . . ??
Chen Bo and
Duan Cheng YOng and
Gao Xiue A frequent pattern parallel mining
algorithm based on distributed sliding
window . . . . . . . . . . . . . . . . . ??
Fengjuan Chen and
Wenyu Qu and
Lihai Nie and
Junfeng Wu and
Yuanyuan Li Discovering probabilistic frequent
closed itemsets in uncertain database
with tuple uncertainty . . . . . . . . . ??
Yifan Chen and
Xiang Zhao and
Jiuyang Tang and
Weiming Zhang and
Haichuan Shang Taxi-taking recommendation using
real-time trajectories: an online query
based approach . . . . . . . . . . . . . ??
Xiaowei Zheng and
Jiaxuan Li and
Yong Zhang and
Qingkun Liu An optimization model of Hadoop cluster
performance prediction based on Markov
process . . . . . . . . . . . . . . . . ??
En Wang and
Yongjian Yang and
Wenbin Liu and
Fan Wang Clustering routing method based on
social characteristic in campus DTN . . ??
Shuchih Ernest Chang and
Anne Yenching Liu Information security in practices:
Exploring privacy and trust in computer
and Internet surveillance . . . . . . . ??
Tingting Yang and
Zhonghua Sun and
Zhou Su and
Hailong Feng and
Ruilong Deng Towards risk evaluation algorithm of PSC
ship-selecting system based on
hierarchic analysis and grey integrated
clustering method . . . . . . . . . . . ??
Li Fu and
Zhen Liu Topological separation axioms of soft
rough formal context . . . . . . . . . . ??
Yangyang Xu and
Zhaobin Liu and
Zhonglian Hu Ascending partition method for
differentially private histogram
publication . . . . . . . . . . . . . . ??
Chiraz Soussi Moumen and
Franck Morvan and
Abdelkader Hameurlain Estimation error-aware query
optimization: an overview . . . . . . . ??
Zhe Wei and
Fang Wang and
Le Sun A practical reliable reputation based
data fusion method for ad-hoc wireless
sensor networks . . . . . . . . . . . . ??
Senem Kumova Metin Neighbour unpredictability measure in
multiword expression extraction . . . . ??
Sasa Kresoja and
Milos Rackovic and
Srdjan Skrbic and
Bojana Dimic Surla A Petri Net extension for formal
modelling of information systems . . . . ??
Jun Wu Energy efficient dual execution mode
scheduling for real-time tasks with
shared resources . . . . . . . . . . . . ??
Doohee Song and
Kwangjin Park Adaptive hierarchical bitmap-based index
for wireless broadcast environments in
an emergency . . . . . . . . . . . . . . ??
Md. Sarwar Kamal and
Sonia Farhana Nimmy and
Sazia Parvin Performance evaluation comparison for
detecting DNA structural break through
big data analysis . . . . . . . . . . . ??
Seungdo Jeong and
Sang-Wook Kim and
Byung-Uk Choi Effective indexing and searching with
dimensionality reduction on
high-dimensional space . . . . . . . . . ??
Alessio Angius and
András Horváth and
Sami M Halawani and
Omar Barukab and
Ab Rahman Ahmad and
Gianfranco Balbo Exploiting flow equivalent server in
transient analysis . . . . . . . . . . . ??
Ahmad Abdullah Alqarni and
Eric Pardede XML schema matching using early
dissimilarity detection approaches . . . ??
Alexander Thomasian and
Jun Xu Data allocation in a Heterogeneous Disk
Array (HDA) with multiple RAID levels
for database applications . . . . . . . ??
Petre Anghelescu FPGA implementation of programmable
cellular automata encryption algorithm
for network communications . . . . . . . ??
Giuseppe Della Penna and
Daniele Magazzeni and
Sergio Orefice Extending visual information extraction
to biomedical applications . . . . . . . ??
Guest Editors: Zheng Xu and
Vijayan Sugumaran and
Hui Zhang Special issue: Cyber-Physical
System-related Technologies and
Applications . . . . . . . . . . . . . . ??
Qiu Ling and
Qi Linkai water-related public organizations . . . ??
Quan-Dong Feng and
Miao Xu and
Xin Zhang The scalable vocabulary tree based model
for sub-image retrieval . . . . . . . . ??
Liu Ranran and
Zheng Enxing and
Chang Shan and
Bei Shaoyi and
Zhang Lanchun Hierarchical gradient based parameter
identification for non-uniformly
sampling Wiener systems . . . . . . . . ??
Liu Ranran and
Zheng Enxing and
Chang Shan and
Bei Shaoyi and
Zhang Lanchun Hierarchical stochastic gradient
identification for non-uniformly
sampling Hammerstein systems with
colored noise . . . . . . . . . . . . . ??
Tao Guo and
Xiang Fang and
Mingshou Zhong and
Huayuan Ma and
Yiming Mao Research on the effects of blasting
vibration attenuation by pre-split crack
with HHT method . . . . . . . . . . . . ??
Zheng Enxing and
Liu Ranran and
Jiang Yifeng and
Sun Yuxia and
Ni FuYin Stochastic gradient identification for
Hammerstein systems with non-uniformly
sampling . . . . . . . . . . . . . . . . ??
Tian Run Hu and
Zhang Yan Bin and
Jia Lixin The realization of multi agent based
online trading systems based on J2EE
technology . . . . . . . . . . . . . . . ??
Qingyuan Zhou and
Juan Luo The service quality evaluation of
ecologic economy systems using
simulation computing . . . . . . . . . . ??
Cui-Xia Zhang The state space model of remanufacturing
carbon footprint for low-carbon . . . . ??
Wenshu Bao and
Haiying Zhou and
Wang Lu and
Feng Xie The system of knowledge management using
web based learning and education
technology . . . . . . . . . . . . . . . ??
Yitong Niu and
Mingming Xiong and
Jianyi Guo and
Cunli Mao and
Yantuan Xian and
Zhengtao Yu Using cross ambiguity model improves the
effect of Vietnamese word segmentation ??