
Journal of Systems and Software, Volume 85
Volume 85, Number 1, January 2012
- W. Eric Wong, W. K. Chan
, T. H. Tse, Fei-Ching Kuo:
Special Issue on Dynamic Analysis and Testing of Embedded Software. 1-2 - Maria de Fátima Mattiello-Francisco, Eliane Martins, Ana R. Cavalli, Edgar Toshiro Yano:
InRob: An approach for testing interoperability and robustness of real-time embedded software. 3-15 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:
Test coverage optimization for large code problems. 16-27 - Jooyoung Seo, Byoungju Choi, Suengwan Yang:
Lightweight embedded software performance analysis method by kernel hack and its industrial field study. 28-42 - Chorng-Shiuh Koong, Chihhsiong Shih, Pao-Ann Hsiung, Hung-Jui Lai, Chih-Hung Chang
, William C. Chu, Nien-Lin Hsueh, Chao-Tung Yang
:
Automatic testing environment for multi-core embedded software - ATEMES. 43-60
- Mohamed Alnas, Irfan Awan, D. R. W. Holton:
Erratum to "Performance evaluation of fast handover in mobile IPv6 based on link layer informations" [Journal of Systems and Software 83 (2010) 1644-1650]. 61 - Ching-Wen Chen, Chuan-Chi Weng:
A power efficiency routing and maintenance protocol in wireless multi-hop networks. 62-76 - Antonino Santos
, Juan Romero
, Francisco Javier Taibo, Carlos Rodríguez, Adrián Carballal
:
Self-tuning of disk input-output in operating systems. 77-86 - Xiaoyu Tang, Qingtian Zeng:
Keyword clustering for user interest profiling refinement within paper recommender systems. 87-101 - Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. 102-111 - Genaína Nunes Rodrigues
, Vander Alves
, Renato Silveira, Luiz A. Laranjeira:
Dependability analysis in the Ambient Assisted Living Domain: An exploratory case study. 112-131 - Lakshitha de Silva, Dharini Balasubramaniam
:
Controlling software architecture erosion: A survey. 132-151 - Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-Porisini
:
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. 152-166 - Hung-Yi Lin:
Using compressed index structures for processing moving objects in large spatio-temporal databases. 167-177 - Herman Hartmann, Tim Trew, Jan Bosch:
The changing industry structure of software development for consumer electronics and its consequences for software architectures. 178-192 - Moussa Ouedraogo, Djamel Khadraoui, Haralambos Mouratidis
, Eric Dubois:
Appraisal and reporting of security assurance at operational systems level. 193-208 - Harendra Singh, Girraj Kumar Verma
:
ID-based proxy signature scheme with message recovery. 209-214
Volume 85, Number 2, February 2012
- Paulo Borba
:
Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering. 215 - Fabio Q. B. da Silva
, A. César C. França:
Towards understanding the underlying structure of motivational factors for software engineers to guide the definition of motivational programs. 216-226 - Eduardo Figueiredo, Cláudio Sant'Anna, Alessandro Garcia, Carlos José Pereira de Lucena:
Applying and evaluating concern-sensitive design heuristics. 227-243 - Kecia Aline M. Ferreira, Mariza Andrade da Silva Bigonha, Roberto da Silva Bigonha, Luiz F. O. Mendes, Heitor C. Almeida:
Identifying thresholds for object-oriented software metrics. 244-257 - Elder Cirilo, Ingrid Nunes
, Uirá Kulesza, Carlos José Pereira de Lucena:
Automating the product derivation process of multi-agent systems product lines. 258-276 - João Gustavo Prudêncio, Leonardo Murta, Cláudia Werner
, Rafael da Silva Viterbo de Cepêda:
To lock, or not to lock: That is the question. 277-289
- Xiaopeng Wei, Ling Guo, Qiang Zhang, Jianxin Zhang, Shiguo Lian:
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. 290-299 - Xiaolin Ma, Fangmin Li
, Fei Hu, Xinhua Liu:
A hybrid channel assignment strategy to QoS support of video-streaming over multi-channel ad hoc networks. 300-308 - Zhenxing Qian, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream. 309-313 - Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. 314-322 - Mohamed El-Attar
:
Towards developing consistent misuse case models. 323-339 - Jun-Han Yang, Tian-Jie Cao
:
Provably secure three-party password authenticated key exchange protocol in the standard model. 340-350 - Andréa Magalhães Magdaleno, Cláudia Maria Lima Werner
, Renata Mendes de Araujo
:
Reconciling software development models: A quasi-systematic review. 351-369 - Hongzhe Liu
, Hong Bao
, De Xu:
Concept vector for semantic similarity and relatedness based on WordNet structure. 370-381 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. 382-391 - Guorui Feng, Lingyan Fan:
Reversible data hiding of high payload using local edge sensing prediction. 392-399 - Qing Zhou, Xiaofeng Liao:
Collision-based flexible image encryption algorithm. 400-407 - Seyed Mohammad Hossein Hasheminejad, Saeed Jalili
:
Design patterns selection: An automatic two-phase method. 408-424 - Sergio Pozo
, Rafael M. Gasca
, Antonia M. Reina Quintero
, Angel Jesus Varela-Vaca
:
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. 425-457
Volume 85, Number 3, March 2012
- Lawrence Chung, Manuel Noguera
, Nary Subramanian, José Luis Garrido
:
Novel approaches in the design and implementation of system/software architectures. 459-462 - Jaelson Castro, Márcia Lucena
, Carla T. L. L. Silva, Fernanda M. R. Alencar
, Emanuel Santos, João Pimentel:
Changing attitudes towards the generation of architectural models. 463-479 - Rafael Z. Frantz
, Rafael Corchuelo
, Carlos Molina-Jiménez:
A proposal to detect errors in Enterprise Application Integration solutions. 480-497 - Kawtar Benghazi Akhlaki
, María Visitación Hurtado, Miguel J. Hornos
, María Luisa Rodríguez
, Carlos Rodríguez-Domínguez
, Ana Belén Pelegrina Ortiz, María José Rodríguez-Fórtiz:
Enabling correct design and formal analysis of Ambient Assisted Living systems. 498-510 - H. Andrés Neyem, Sergio F. Ochoa, José A. Pino, Rubén Darío Franco:
A reusable structural design for mobile collaborative applications. 511-524 - Mónica Pinto
, Lidia Fuentes
, Luis Fernández:
Deriving detailed design models from an aspect-oriented ADL using MDD. 525-545 - Rainer Weinreich, Georg Buchgeher:
Towards supporting the software architecture life cycle. 546-561
- Daniel Rodríguez-García
, Miguel-Ángel Sicilia, Elena García Barriocanal, Rachel Harrison:
Empirical findings on team size and productivity in software development. 562-570 - Sudipta Bhattacharjee, Pramit Roy, Soumalya Ghosh, Sudip Misra, Mohammad S. Obaidat
:
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines. 571-581 - Diana Kirk, Ewan D. Tempero
:
A lightweight framework for describing software practices. 582-595 - Avner Ottensooser, Alan D. Fekete, Hajo A. Reijers, Jan Mendling
, Con Menictas:
Making sense of business process descriptions: An experimental comparison of graphical and textual notations. 596-606 - Javier Fabra, Valeria de Castro
, Pedro Álvarez, Esperanza Marcos:
Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches. 607-625 - Yu-Chi Huang, Kuan-Li Peng, Chin-Yu Huang:
A history-based cost-cognizant test case prioritization technique in regression testing. 626-637 - Jianhong Zhang, Jane Mao:
An efficient RSA-based certificateless signature scheme. 638-642 - Xu An Wang
, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. 643-654 - Jun Shao, Peng Liu, Yuan Zhou:
Achieving key privacy without losing CCA security in proxy re-encryption. 655-665 - Diomidis Spinellis
, Vaggelis Giannikas
:
Organizational adoption of open source software. 666-682 - Martin Necaský
, Jakub Klímek
, Jakub Malý, Irena Mlýnková
:
Evolution and change management of XML-based systems. 683-707 - Xingwen Zhao, Fangguo Zhang:
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. 708-716 - Pietro Colombo
, Ferhat Khendek
, Luigi Lavazza
:
Bridging the gap between requirements and design: An approach based on Problem Frames and SysML. 717-745 - Mahmood Deypir, Mohammad Hadi Sadreddini:
A dynamic layout of sliding window for frequent itemset mining over data streams. 746-759 - Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Gateway-oriented password-authenticated key exchange protocol in the standard model. 760-768
Volume 85, Number 4, April 2012
- Shichao Zhang:
Decision tree classifiers sensitive to heterogeneous costs. 771-779 - Chuan He, Xiaomin Zhu, Hui Guo, Dishan Qiu, Jianqing Jiang:
Rolling-horizon scheduling for energy constrained distributed real-time embedded systems. 780-794 - Uwe van Heesch, Paris Avgeriou
, Rich Hilliard:
A documentation framework for architecture decisions. 795-820 - Andreas Hjertström, Dag Nyström, Mikael Sjödin:
Data management for component-based embedded real-time systems: The database proxy approach. 821-834 - Alfredo Pironti, Davide Pozza, Riccardo Sisto
:
Formally based semi-automatic implementation of an open security protocol. 835-849 - Xiao-jun Tong:
The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos. 850-858 - Dror G. Feitelson
:
Perpetual development: A model of the Linux kernel life cycle. 859-875 - Woei-Jiunn Tsaur, Jia-Hong Li, Wei-Bin Lee:
An efficient and secure multi-server authentication scheme with key agreement. 876-882 - Muhammad Arsalan, Sana Ambreen Malik, Asifullah Khan:
Intelligent reversible watermarking in integer wavelet domain for medical images. 883-894 - Vishal Midha, Prashant Palvia:
Factors affecting the success of Open Source Software. 895-905 - J. O. Coronel, José E. Simó:
High performance dynamic voltage/frequency scaling algorithm for real-time dynamic load management. 906-919 - Farid Shirazi:
Free and Open Source Software versus Internet content filtering and censorship: A case study. 920-931 - Kostas Kolomvatsos, George Valkanas, Stathes Hadjiefthymiades
:
Debugging applications created by a Domain Specific Language: The IPAC case. 932-943 - Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen, Wei-Zhe Sun:
Attribute-based strong designated-verifier signature scheme. 944-959 - Edward Y. Y. Kan, W. K. Chan
, T. H. Tse
:
EClass: An execution classification approach to improving the energy-efficiency of software via machine learning. 960-973 - Yih-Kai Lin, Shu-Chien Huang
, Cheng-Hsing Yang:
A fast algorithm for Huffman decoding based on a recursion Huffman tree. 974-980 - Jinmin Zhong, Xuejia Lai:
Improved preimage attack on one-block MD4. 981-994 - Tommaso Cucinotta
, Dario Faggioli:
Handling timing constraints violations in soft real-time applications as exceptions. 995-1011 - Fernanda d'Amorim, Paulo Borba
:
Modularity analysis of use case implementations. 1012-1027
Volume 85, Number 5, May 2012
- Gregory Katsaros, George Kousiouris, Spyridon V. Gogouvitis
, Dimosthenis Kyriazis
, Andreas Menychtas
, Theodora A. Varvarigou:
A Self-adaptive hierarchical monitoring mechanism for Clouds. 1029-1041 - Jehad Al-Dallal:
The impact of accounting for special methods in the measurement of object-oriented class cohesion on refactoring and fault prediction activities. 1042-1057 - Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:
DRMFS: A file system layer for transparent access semantics of DRM-protected contents. 1058-1066 - Huawen Liu, Shichao Zhang:
Noisy data elimination using mutual k-nearest neighbor for classification mining. 1067-1074 - Lip Yee Por
, KokSheik Wong
, Kok Onn Chee
:
UniSpaCh: A text-based data hiding method using Unicode space characters. 1075-1082 - Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. 1083-1095 - Shahla Ghobadi, John D'Ambra
:
Coopetitive relationships in cross-functional software development teams: How to model and measure? 1096-1104 - Guillaume Godet-Bar, Sophie Dupuy-Chessa, Dominique Rieu:
Sonata: Flexible connections between interaction and business spaces. 1105-1118 - Xiaotian Wu, Wei Sun:
Random grid-based visual secret sharing for general access structures with cheat-preventing ability. 1119-1134 - Xiaoying Wang
, Zhihui Du
, Yinong Chen
:
An adaptive model-free resource and power management approach for multi-tier cloud environments. 1135-1146 - Luca Abeni
, Nicola Manica, Luigi Palopoli:
Efficient and robust probabilistic guarantees for real-time tasks. 1147-1156 - Ting-Yi Chang, Cheng-Jung Tsai, Jyun-Hao Lin:
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. 1157-1165 - Wien Hong, Tung-Shou Chen, Chih-Wei Luo:
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. 1166-1175 - Hema Srikanth, Sean Banerjee:
Improving test efficiency through system test prioritization. 1176-1187 - Jan Mendling
, Laura Sánchez-González, Félix García
, Marcello La Rosa
:
Thresholds for error probability measures of business process models. 1188-1197 - Xin-Chang Zhang, Mei-Hong Yang, Xiao-Jing Zhu, Wan-Ming Luo:
A loss recovery approach for reliable application layer multicast. 1198-1204 - Pei-Lun Suei, Yung-Feng Lu, Rong-Jhang Liao, Shi-Wu Lo:
A signature-based Grid index design for main-memory RFID database applications. 1205-1212
Volume 85, Number 6, June 2012
- Torgeir Dingsøyr
, Sridhar P. Nerur, Venugopal Balijepally, Nils Brede Moe
:
A decade of agile methodologies: Towards explaining agile software development. 1213-1221 - Diane E. Strode
, Sid L. Huff, Beverley G. Hope, Sebastian Link
:
Coordination in co-located agile software development projects. 1222-1238 - Meghann Drury, Kieran Conboy
, Ken Power:
Obstacles to decision making in Agile software development teams. 1239-1254 - Mali Senapathi
, Ananth Srinivasan:
Understanding post-adoptive agile usage: An exploratory cross-case analysis. 1255-1268 - Steve Adolph, Philippe Kruchten
, Wendy Hall
:
Reconciling perspectives: A grounded theory of how people manage the process of software development. 1269-1286 - Xiaofeng Wang
, Kieran Conboy
, Oisín Cawley:
"Leagile" software development: An experience report analysis of the application of lean approaches in agile software development. 1287-1299
- Bixin Li, Dong Qiu, Hareton Leung
, Di Wang:
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. 1300-1324 - Yan-Xiao Liu, Lein Harn, Ching-Nung Yang
, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. 1325-1332 - Satchidananda Dehuri, Rahul Roy, Sung-Bae Cho, Ashish Ghosh
:
An improved swarm optimized functional link artificial neural network (ISO-FLANN) for classification. 1333-1345 - Chao-Wei Li, Kuen-Fang Jea, Ru-Ping Lin, Ssu-Fan Yen, Chih-Wei Hsu:
Mining frequent patterns from dynamic data streams with data load management. 1346-1362 - Tsai-Hsuan Tsai, Hsien-Tsung Chang
, Yi-Ming Chang, Gung-Shiung Huang:
Sharetouch: A system to enrich social network experiences for the elderly. 1363-1369 - Ricardo Pérez-Castillo
, José A. Cruz-Lemus
, Ignacio García Rodríguez de Guzmán
, Mario Piattini
:
A family of case studies on business process mining using MARBLE. 1370-1385 - Tongquan Wei, Piyush Mishra, Kaijie Wu, Junlong Zhou:
Quasi-static fault-tolerant scheduling schemes for energy-efficient hard real-time systems. 1386-1399 - Tien Van Do, Csaba Rotter
:
Comparison of scheduling schemes for on-demand IaaS requests. 1400-1408 - Raylin Tso
, Xinyi Huang, Willy Susilo:
Strongly secure certificateless short signatures. 1409-1417 - Bernd Burgstaller, Bernhard Scholz, Johann Blieberger:
A symbolic analysis framework for static analysis of imperative programming languages. 1418-1439 - Marion Lepmets, Tom McBride, Eric Ras
:
Goal alignment in process improvement. 1440-1452
Volume 85, Number 7, July 2012
- Jan Bosch:
Software ecosystems: Taking software development beyond the boundaries of the organization. 1453-1454 - Geir Kjetil Hanssen
:
A longitudinal case study of an emerging software ecosystem: Implications for practice and theory. 1455-1466 - Terhi Kilamo, Imed Hammouda, Tommi Mikkonen, Timo Aaltonen:
From proprietary to open source - Growing an open source ecosystem. 1467-1478 - Walt Scacchi, Thomas A. Alspaugh:
Understanding the role of licenses and evolution in open architecture software ecosystems. 1479-1494 - Slinger Jansen, Sjaak Brinkkemper, Jurriaan Souer, Lutzen Luinenburg:
Shades of gray: Opening up a software producing organization with the open software enterprise model. 1495-1510 - Rick Kazman, Michael Gagliardi, William Wood:
Scaling up software architecture analysis. 1511-1519
- Simonetta Balsamo, Peter G. Harrison
, Andrea Marin:
Methodological construction of product-form stochastic Petri nets for performance evaluation. 1520-1539 - Javier Palanca Cámara
, Martí Navarro, Vicente Julián
, Ana García-Fornes
:
Distributed goal-oriented computing. 1540-1557 - Bixin Li, Lulu Wang, Hareton Leung
, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. 1558-1576 - Dimitris Antoniou, Yannis Plegas, Athanasios K. Tsakalidis, Giannis Tzimas
, Emmanouil Viennas:
Dynamic refinement of search engines results utilizing the user intervention. 1577-1587 - Antonella Galizia
, Alfonso Quarati
:
Job allocation strategies for energy-aware and efficient Grid infrastructures. 1588-1606 - Ana María Moreno, Maria Isabel Sánchez Segura, Fuensanta Medina-Domínguez, Laura Carvajal:
Balancing software engineering education and industrial needs. 1607-1620 - Francisco Jurado
, Miguel A. Redondo
, Manuel Ortega
:
Blackboard architecture to integrate components and agents in heterogeneous distributed eLearning systems: An application for learning to program. 1621-1636 - Francisco J. Ballesteros, Enrique Soriano, Gorka Guardiola:
Octopus: An Upperware based system for building personal pervasive environments. 1637-1649 - Zhongqiang Chen, Mema Roussopoulos, Zhanyan Liang, Yuan Zhang, Zhongrong Chen, Alex Delis:
Malware characteristics and threats on the internet ecosystem. 1650-1672 - Wanyong Tian, Chun Jason Xue
, Minming Li
, Enhong Chen:
Loop fusion and reordering for register file optimization on stream processors. 1673-1681