


default search action
Journal of Systems and Software (JSS), Volume 80
Volume 80, Number 1, January 2007
- Yi Peng, Fu Li, Ali Mili:

Modeling the evolution of operating systems: An empirical study. 1-15 - Hélio R. Costa, Márcio de Oliveira Barros, Guilherme Horta Travassos

:
Evaluating software project portfolio risks. 16-31 - Susan Kurian, Michael J. Pont:

The maintenance and evolution of resource-constrained embedded systems created using design patterns. 32-41 - Wen-Ming Han, Sun-Jen Huang:

An empirical analysis of risk components and performance on software projects. 42-50 - Qinbao Song, Martin J. Shepperd

:
A new imputation method for small software project data sets. 51-62 - Akif Günes Koru, Hongfang Liu:

Identifying and characterizing change-prone classes in two large-scale open-source products. 63-73 - Samuel Ajila

, Razvan T. Dumitrescu:
Experimental use of code delta, code churn, and rate of change to understand software product line evolution. 74-91 - Jingling Xue

, Phung Hua Nguyen, John Potter:
Interprocedural side-effect analysis for incomplete object-oriented software modules. 92-105
- Christine Hofmeister, Philippe Kruchten

, Robert L. Nord
, J. Henk Obbink, Alexander Ran, Pierre America:
A general model of software architecture design derived from five industrial approaches. 106-126 - Antony Tang

, Ann E. Nicholson
, Yan Jin, Jun Han:
Using Bayesian belief networks for change impact analysis in architecture design. 127-148
Volume 80, Number 2, February 2007
- Jenn-Wei Lin:

Providing fault-tolerant authentication and authorization in wireless mobile IP networks. 149-163 - Xiaofeng Chen, Fangguo Zhang

, Shengli Liu:
ID-based restrictive partially blind signatures and applications. 164-171 - Jun Shao, Zhenfu Cao

, Rongxing Lu:
Improvement of Yang et al.'s threshold proxy signature scheme. 172-177 - Miguel Correia

, Nuno Ferreira Neves
, Lau Cheuk Lung, Paulo Veríssimo
:
Worm-IT - A wormhole-based intrusion-tolerant group communication system. 178-197 - Hsung-Pin Chang

, Ray-I Chang
, Wei-Kuan Shih, Ruei-Chuan Chang:
GSR: A global seek-optimizing real-time disk-scheduling algorithm. 198-215 - Alfredo De Santis

, Barbara Masucci
:
New results on non-perfect sharing of multiple secrets. 216-223 - Richard Lai, Tony Tsang:

Timed verification of the reliable adaptive multicast protocol. 224-239
- Marwan Abi-Antoun, Jonathan Aldrich

, Wesley Coelho:
A case study in re-engineering to enforce architectural control flow and data sharing. 240-264 - Liming Zhu

, Ngoc Bao Bui, Yan Liu, Ian Gorton:
MDABench: Customized benchmark generation using MDA. 265-282
Volume 80, Number 3, March 2007
- Karl Cox, Steven J. Bleistein, June M. Verner, Alan M. Davis:

REBNITA'05 - 1st International Workshop on Requirements Engineering for Business Need and IT Alignment. 283-284 - Peter Reynolds:

Managing requirements for a US$1bn IT-based business transformation: New approaches and challenges. 285-293 - Lana S. Al-Salem, Ala Abu-Samaha

:
Eliciting Web application requirements - an industrial case study. 294-313 - Atsushi Kokune, Masuhiro Mizuno, Kyoichi Kadoya, Shuichiro Yamamoto:

FBCM: Strategy modeling method for the validation of software requirements. 314-327 - Johan F. Hoorn

, Elly A. Konijn
, Hans van Vliet, Gerrit C. van der Veer
:
Requirements change: Fears dictate the must haves; desires the won't haves. 328-355
- Patrick P. C. Lee

, John C. S. Lui, David K. Y. Yau:
SEAL: A secure communication library for building dynamic group key agreement applications. 356-370 - Zhen He

, Richard Lai, Alonso Marquez, Stephen M. Blackburn
:
Opportunistic prioritised clustering framework for improving OODBMS performance. 371-387 - Zuhua Shao:

Self-certified signature scheme from pairings. 388-395 - Yongjing Lin, Youtao Zhang, Rajiv Gupta

:
The design and evaluation of path matching schemes on compressed control flow traces. 396-409 - Yi-Hsuan Lee, Cheng Chen:

An effective and efficient code generation algorithm for uniform loops on non-orthogonal DSP architecture. 410-428 - Yuan-Yu Tsai, Chung-Ming Wang:

A novel data hiding scheme for color images using a BSP tree. 429-437
Volume 80, Number 4, April 2007
- Günter Haring, Carlos Juiz

, Dorina C. Petriu
:
Editorial. 439-440 - Alberto Avritzer, Andre B. Bondi, Elaine J. Weyuker:

Ensuring system performance for cluster and single server systems. 441-454 - Mauro Caporuscio

, Antinisca Di Marco
, Paola Inverardi:
Model-based system reconfiguration for dynamic performance management. 455-473 - Tauseef A. Israr, C. Murray Woodside, Greg Franks:

Interaction tree algorithms to extract effective architecture and layered performance models from traces. 474-492 - Vibhu Saujanya Sharma

, Kishor S. Trivedi:
Quantifying software performance, reliability and security: An architecture-based approach. 493-509 - Tariq Omari, Greg Franks, C. Murray Woodside, Amy Pan:

Efficient performance models for layered server systems with replicated servers and parallel behaviour. 510-527 - Vincenzo Grassi, Raffaela Mirandola

, Antonino Sabetta:
Filling the gap between design and performance/reliability models of component-based systems: A model-driven approach. 528-558
- Ching-Pao Chang, Chih-Ping Chu:

Defect prevention in software processes: An action-based approach. 559-570 - Pearl Brereton, Barbara A. Kitchenham

, David Budgen
, Mark Turner, Mohamed Khalil:
Lessons from applying the systematic literature review process within the software engineering domain. 571-583 - Pankaj Jalote, Rajesh Munshi, Todd A. Proebsting:

The When-Who-How analysis of defects for improving the quality control process. 584-589 - Letian Jiang, Guozhi Xu:

Modeling and analysis of software aging and software failure. 590-595 - Kwan-Sik Na, James T. Simpson, Xiaotong Li, Tushar Singh, Ki-Yoon Kim:

Software development risk and project performance measurement: Evidence in Korea. 596-605 - Yu-Shen Su, Chin-Yu Huang:

Neural-network-based approaches for software reliability estimation using dynamic weighted combinational models. 606-615 - Girish H. Subramanian, James J. Jiang, Gary Klein:

Software quality and IS project performance improvements from software development process maturity and IS implementation strategies. 616-627 - Nan-Hsing Chiu, Sun-Jen Huang:

The adjusted analogy-based software effort estimation based on similarity distances. 628-640
Volume 80, Number 5, May 2007
- Ivica Crnkovic

, George T. Heineman, Heinz W. Schmidt, Judith A. Stafford, Kurt C. Wallnau:
Guest Editorial. 641-642 - Fei Xie, Guowu Yang, Xiaoyu Song:

Component-based hardware/software co-verification for building trustworthy embedded systems. 643-654 - Mikael Åkerholm, Jan Carlson

, Johan Fredriksson, Hans Hansson
, John Håkansson, Anders Möller, Paul Pettersson
, Massimo Tivoli
:
The SAVE approach to component-based development of vehicular systems. 655-667 - Venkita Subramonian, Gan Deng, Christopher D. Gill, Jaiganesh Balasubramanian, Liang-Jui Shen, William Otte, Douglas C. Schmidt, Aniruddha S. Gokhale

, Nanbor Wang:
The design and performance of component middleware for QoS-enabled deployment and configuration of DRE systems. 668-677 - Lars Grunske

:
Early quality prediction of component-based systems - A generic framework. 678-686 - Ihor Kuz, Yan Liu, Ian Gorton, Gernot Heiser:

CAmkES: A component model for secure microkernel-based embedded systems. 687-699 - Mohammed Hussein, Mohammad Zulkernine:

Intrusion detection aware component-based systems: A specification-based framework. 700-710
- Jun-Hong Shen, Ye-In Chang:

A skewed distributed indexing for skewed access patterns on the wireless broadcast. 711-723 - Peng-Yeng Yin, Shiuh-Sheng Yu, Pei-Pei Wang, Yi-Te Wang:

Task allocation for maximizing reliability of a distributed system using hybrid particle swarm optimization. 724-735 - Nigamanth Sridhar:

Serfs: Dynamically-bound parameterized components. 736-749 - Aniello Castiglione

, Alfredo De Santis
, Claudio Soriente
:
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata. 750-764 - Nikolaos D. Tselikas

, Nikolaos L. Dellas, Eleftherios Koutsoloukas, Sofia Kapellaki, George N. Prezerakos, Iakovos S. Venieris:
Distributed service provision using open APIs-based middleware: "OSA/Parlay vs. JAIN" performance evaluation study. 765-777 - Hermes Senger

, Eduardo R. Hruschka
, Fabrício Alves Barbosa da Silva
, Liria Matsumoto Sato
, Calebe De Paula Bianchini
, Bruno F. Jerosch:
Exploiting idle cycles to execute data mining applications on clusters of PCs. 778-790 - Shujun Li

, Kwok-Tung Lo:
Security problems with improper implementations of improved FEA-M. 791-794
Volume 80, Number 6, June 2007
- Li Ma, Jeff Tian:

Web error classification and analysis for reliability improvement. 795-804 - Daniel R. Jeske, Qi Zhang:

Assessing the validity of one-part software reliability models using likelihood ratio and early detection tests. 805-816 - Avner Engel, Mark Last:

Modeling software testing costs and risks using fuzzy logic paradigm. 817-835 - Faheem Ahmed, Luiz Fernando Capretz, Shahbaz Ali Sheikh:

Institutionalization of software product line: An empirical investigation of key organizational factors. 836-849 - Christof Ebert:

The impacts of software product management. 850-861 - Otávio Augusto Lazzarini Lemos

, Auri Marcelo Rizzo Vincenzi
, José Carlos Maldonado, Paulo César Masiero:
Control and data flow structural testing criteria for aspect-oriented programs. 862-882 - Mark Staples, Mahmood Niazi

, D. Ross Jeffery, Alan Abrahams, Paul Byatt, Russell Murphy:
An exploratory study of why organizations do not adopt CMMI. 883-895
- Christopher Dabrowski, Kevin Mills, Stephen Quirolgico:

Understanding failure response in service discovery systems. 896-917 - Antony Tang

, Yan Jin, Jun Han:
A rationale-based architecture model for design traceability and reasoning. 918-934
Volume 80, Number 7, July 2007
- Charles Cavanaugh, Frank Drews, Lonnie R. Welch:

Guest Editor's introduction. 935-937 - Xiaorui Wang, Yingming Chen, Chenyang Lu, Xenofon D. Koutsoukos:

FC-ORB: A robust distributed real-time embedded middleware with end-to-end utilization control. 938-950 - Peter van der Stok, Dmitri Jarnikov, Sergei Kozlov, Michael van Hartskamp

, Johan J. Lukkien:
Hierarchical resource allocation for robust in-home video streaming. 951-961 - Huan Li, Krithi Ramamritham, Prashant J. Shenoy

, Roderic A. Grupen, John Sweeney:
Resource management for real-time tasks in mobile robotics. 962-971 - Balakrishnan Dasarathy, Shrirang Gadgil, Ravichander Vaidyanathan, Arnie Neidhardt, Brian A. Coan, Kirthika Parmeswaran, Allen A. McIntosh, Frederick Porter:

Adaptive network QoS in layer-3/layer-2 networks as a middleware service for mission-critical applications. 972-983 - Patrick J. Lardieri, Jaiganesh Balasubramanian, Douglas C. Schmidt, Gautam H. Thaker, Aniruddha S. Gokhale

, Thomas Damiano:
A multi-layered resource management framework for dynamic resource management in enterprise DRE systems. 984-996 - Tian He, John A. Stankovic, Michael Marley, Chenyang Lu, Ying Lu, Tarek F. Abdelzaher, Sang Hyuk Son, Gang Tao:

Feedback control-based dynamic resource management in distributed real-time systems. 997-1004 - Dazhang Gu, Lonnie R. Welch, Frank Drews, Klaus Ecker:

Characterizing robustness in dynamic real-time systems. 1005-1014 - Zhenyu Tan, William Leal, Lonnie R. Welch:

Verification of instrumentation techniques for resource management of real-time systems. 1015-1022
- Qin Wang, Zhenfu Cao

:
Identity based proxy multi-signature. 1023-1029 - Yi-Neng Lin, Yao-Chung Chang, Ying-Dar Lin, Yuan-Cheng Lai:

Resource allocation in network processors for network intrusion prevention systems. 1030-1036 - Sunil Soman, Chandra Krintz:

Application-specific garbage collection. 1037-1056 - Ming-Ni Wu, Chia-Chen Lin

, Chin-Chen Chang:
Novel image copy detection with rotating tolerance. 1057-1069 - Ching-Nung Yang

, Tse-Shih Chen, Kun-Hsuan Yu, Chung-Chun Wang:
Improvements of image sharing with steganography and authentication. 1070-1076 - Phuong Hoai Ha

, Marina Papatriantafilou
, Philippas Tsigas
:
Efficient self-tuning spin-locks using competitive analysis. 1077-1090 - Yuh-Min Tseng:

A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. 1091-1101 - Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:

A context-aware cache structure for mobile computing environments. 1102-1119 - Wei Li, Raed Shatnawi

:
An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. 1120-1128 - Dariusz Kania

, Józef Kulisz
:
Logic synthesis for PAL-based CPLD-s based on two-stage decomposition. 1129-1141 - Chun-Chuan Yang, Yung-Chi Wang, Chih-Wen Tien:

Synchronization modeling and its application for SMIL2.0 presentations. 1142-1155 - Diomidis Spinellis

, Panagiotis Louridas:
A framework for the static verification of api calls. 1156-1168 - Christos Tselikis, Sarandis Mitropoulos, Christos Douligeris:

An evaluation of the middleware's impact on the performance of object oriented distributed systems. 1169-1181
Volume 80, Number 8, August 2007
- Hossein Saiedian

:
Reflections on the influences of the COCOMO, spiral and the Win-Win models on software project and risk management. 1183-1184 - Ricardo Valerdi

, Raymond J. Madachy:
Impact and contributions of MBASE on software engineering graduate courses. 1185-1190 - Paul Grünbacher

, Norbert Seyff, Robert O. Briggs
, Hoh Peter In, Hasan Kitapci, Daniel Port:
Making every student a winner: The WinWin approach in software engineering education. 1191-1200 - Richard E. Fairley:

The influence of COCOMO on software engineering education and training. 1201-1208 - Robert J. Fornaro, Margaret R. Heil

, Alan L. Tharp:
Reflections on 10 years of sponsored senior design projects: Students win-clients win! 1209-1216 - Dennis J. Frailey:

Experience teaching Barry Boehm's techniques in industrial and academic settings. 1217-1221 - Rayford B. Vaughn:

Leadership by example: A perspective on the influence of Barry Boehm. 1222-1226
- Piotr Tomaszewski

, Jim Håkansson, Håkan Grahn
, Lars Lundberg:
Statistical models vs. expert estimation for fault prediction in modified code - an industrial case study. 1227-1238 - Dror G. Feitelson, Tokunbo O. S. Adeshiyan, Daniel Balasubramanian, Yoav Etsion, Gabor Madl, Esteban Osses, Sameer Singh, Karlkim Suwanmongkol, Minhui Xie, Stephen R. Schach:

Fine-grain analysis of common coupling and its application to a Linux case study. 1239-1255 - Tsung-Hsi Chiang, Lan-Rong Dung:

Verification method of dataflow algorithms in high-level synthesis. 1256-1270 - Shaoying Liu, Hao Wang:

An automated approach to specification animation for validation. 1271-1285 - Karl Cox, Keith Phalp:

Practical experience of eliciting classes from use case descriptions. 1286-1304 - Stephan Philippi, Hermann Josef Hill:

Communication support for systems engineering - process modelling and animation with APRIL. 1305-1316 - Gerardo Canfora

, Aniello Cimitile, Félix García
, Mario Piattini
, Corrado Aaron Visaggio
:
Evaluating performances of pair designing in industry. 1317-1327 - Kai-Yuan Cai, Bo Gu, Hai Hu, Yong-Chao Li:

Adaptive software testing with fixed-memory feedback. 1328-1348 - Yuming Zhou, Hareton Leung

:
Predicting object-oriented software maintainability using multivariate adaptive regression splines. 1349-1361 - Tao-Ku Chang

, Gwan-Hwan Hwang:
The design and implementation of an application program interface for securing XML documents. 1362-1374 - Paloma Díaz

, Ignacio Aedo
:
Towards efficient web engineering approaches through flexible process models. 1375-1389 - Nianping Zhu, John C. Grundy

, John G. Hosking
, Na Liu, Shuping Cao, Akhil Mehra:
Pounamu: A meta-tool for exploratory domain-specific visual language tool development. 1390-1407 - Ahmed Seffah, Ashraf Gaffar:

Model-based user interface engineering with design patterns. 1408-1422
Volume 80, Number 9, September 2007
- Barbara A. Kitchenham

, Pearl Brereton:
Introduction to special section on Evaluation and Assessment in Software Engineering EASE06. 1423-1424 - Mark Staples, Mahmood Niazi

:
Experiences using systematic review guidelines. 1425-1437 - Muhammad Ali Babar, June M. Verner, Phong Thanh Nguyen:

Establishing and maintaining trust in software outsourcing relationships: An empirical investigation. 1438-1449 - Gui Gui

, Paul D. Scott:
Ranking reusability of software components using coupling metrics. 1450-1459 - Matthias M. Müller:

Do programmer pairs make different mistakes than solo programmers? 1460-1471 - Magne Jørgensen, Bjørn Faugli, Tanja Gruschke:

Characteristics of software engineers with optimistic predictions. 1472-1482
- Terence P. Rout, Khaled El Emam, Mario Fusani, Dennis R. Goldenson, Ho-Won Jung:

SPICE in retrospect: Developing a standard for process assessment. 1483-1493 - Richard D. Corbin, Christopher B. Dunbar, Qiuming Zhu:

A three-tier knowledge management scheme for software engineering support and innovation. 1494-1505 - Natalia Juristo Juzgado, Ana María Moreno

, María Isabel Sánchez Segura
:
Analysing the impact of usability on software design. 1506-1516 - Samuel Ajila

, Di Wu:
Empirical study of the effects of open source adoption on software development economics. 1517-1529 - Donald M. Needham, S. A. Jones:

A software fault tree key node metric. 1530-1540 - Amela Karahasanovic, Annette Kristin Levine, Richard C. Thomas:

Comprehension strategies and difficulties in maintaining object-oriented systems: An explorative study. 1541-1559 - Gun Ho Lee:

Efficient approach for restructuring multiple inheritance hierarchies. 1560-1568
- M. N. Wicks, R. G. Dewar:

A new research agenda for tool integration. 1569-1585
- Jianxin Liao, Xiaomin Zhu:

Grigoris Antoniou and Frank Van Harmelen, Comments on "A Semantic Web Primer", The MIT Press, Cambridge, Massachusetts, London, England (2004). 1586-1587
Volume 80, Number 10, October 2007
- Sangkyun Kim:

Methodology of security engineering for industrial security management systems. 1589 - Sangkyun Kim:

IT compliance of industrial information systems: Technology management and industrial engineering perspective. 1590-1593 - Shalom N. Rosenfeld, Ioana Rus, Michel Cukier:

Archetypal behavior in computer security. 1594-1606 - Mirja Pulkkinen

, Anton Naumenko, Kari Luostarinen:
Managing information security in a business network of machinery maintenance services business - Enterprise architecture as a coordination tool. 1607-1620 - Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steven T. Wolfe:

A software-based trust framework for distributed industrial management systems. 1621-1630 - Sungho Kwon, Sangsoo Jang, Jaeill Lee, Sangkyun Kim:

Common defects in information security management system of Korean companies. 1631-1638
- Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Kenneth P. Birman

, Alan J. Demers:
Active and passive techniques for group size estimation in large-scale and dynamic distributed systems. 1639-1658 - Marco Túlio de Oliveira Valente

, Rodrigo Palhares Silva:
Collocation optimizations in an aspect-oriented middleware system. 1659-1666 - Nen-Chung Wang

, Shian-Zhang Fang:
A hierarchical key management scheme for secure group communications in mobile ad hoc networks. 1667-1677 - Vincent S. Tseng, Kawuu Weicheng Lin:

Energy efficient strategies for object tracking in sensor networks: A data mining approach. 1678-1698 - Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen:

Building intrusion pattern miner for Snort network intrusion detection system. 1699-1715 - Lin Guan

, Irfan-Ullah Awan, Michael E. Woodward, Xingang Wang
:
Discrete-time performance analysis of a congestion control mechanism based on RED under multi-class bursty and correlated traffic. 1716-1725 - Chulyun Kim, Jong-Hwa Lim, Raymond T. Ng, Kyuseok Shim:

SQUIRE: Sequential pattern mining with quantities. 1726-1745 - Charalabos Skianis, George Kormentzas, Kimon P. Kontovasilis, Giordana Lisa:

Efficiency study of the information flow mechanism enabling interworking of heterogeneous wireless systems. 1746-1753
Volume 80, Number 11, November 2007
- Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, Sheng Yang:

Composing pattern-based components and verifying correctness. 1755-1769 - Stein Grimstad, Magne Jørgensen:

Inconsistency of expert judgment-based estimates of software development effort. 1770-1777 - Cesar Gonzalez-Perez

, Brian Henderson-Sellers:
Modelling software development methodologies: A conceptual foundation. 1778-1796 - In-Gyu Kim, Doo-Hwan Bae, Jang-Eui Hong

:
A component composition model providing dynamic, flexible, and hierarchical composition of components for supporting software evolution. 1797-1816 - Franco Cicirelli

, Angelo Furfaro
, Libero Nigro:
Exploiting agents for modelling and simulation of coverage control protocols in large sensor networks. 1817-1832 - Hai Zhuge, Weiyu Guo:

Virtual knowledge service market - For effective knowledge flow within knowledge grid. 1833-1842 - Simona Bernardi

, José Merseguer
:
Performance evaluation of UML design with Stochastic Well-formed Nets. 1843-1865 - Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang:

TFRP: An efficient microaggregation algorithm for statistical disclosure control. 1866-1878 - Jing Liu, Josh Dehlinger, Robyn R. Lutz

:
Safety analysis of software product lines using state-based modeling. 1879-1892
- Mikael Svahnberg, Frans Mårtensson:

Six years of evaluating software architectures in student projects. 1893-1901 - Toacy Cavalcante de Oliveira

, Paulo S. C. Alencar, Carlos José Pereira de Lucena, Donald D. Cowan:
RDL: A language for framework instantiation representation. 1902-1929
- Davide Cerri, Alfonso Fuggetta:

Open standards, open formats, and open source. 1930-1937
Volume 80, Number 12, December 2007
- Laurent Lefèvre, Jean-Marc Pierson

:
Special issue: International Conference on Pervasive Services (ICPS 2006). 1939-1940 - Sonia Ben Mokhtar

, Nikolaos Georgantas, Valérie Issarny:
COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support. 1941-1955 - Oriana Riva, Santtu Toivonen:

The DYNAMOS approach to support context-aware service provisioning in mobile environments. 1956-1972 - Tarak Chaari, Dejene Ejigu, Frédérique Laforest, Vasile-Marian Scuturici:

A comprehensive approach to model and use context for adapting applications in pervasive environments. 1973-1992 - Christos Anagnostopoulos

, Y. Ntarladimas, Stathes Hadjiefthymiades
:
Situational computing: An innovative architecture with imprecise reasoning. 1993-2014 - Ahmet Baki Kocaballi

, Altan Koçyigit
:
Granular best match algorithm for context-aware computing systems. 2015-2024 - Hiroyuki Kasai, Wataru Uchida, Shoji Kurakake:

A service provisioning system for distributed personalization with private data protection. 2025-2038 - Glenn T. Jayaputera, Arkady B. Zaslavsky, Seng Wai Loke:

Enabling run-time composition and support for heterogeneous pervasive multi-agent systems. 2039-2062 - Ken C. K. Lee, Josh Schiffman, Baihua Zheng

, Wang-Chien Lee, Hong Va Leong
:
Round-Eye: A system for tracking nearest surrounders in moving object environments. 2063-2076

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














