callback( { "result":{ "query":":facetid:toc:\"db/conf/compsac/compsac1999.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"216.46" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"92", "@dc":"92", "@oc":"92", "@id":"43373448", "text":":facetid:toc:db/conf/compsac/compsac1999.bht" } }, "hits":{ "@total":"92", "@computed":"92", "@sent":"92", "@first":"0", "hit":[{ "@score":"1", "@id":"6516931", "info":{"authors":{"author":[{"@pid":"90/5445","text":"Akira Abeta"},{"@pid":"57/2779","text":"Ken'ichi Kakizaki"}]},"title":"Implementation and Evaluation of an Automatic Personal Workflow Extraction Method.","venue":"COMPSAC","pages":"206-212","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AbetaK99","doi":"10.1109/CMPSAC.1999.812702","ee":"https://doi.org/10.1109/CMPSAC.1999.812702","url":"https://dblp.org/rec/conf/compsac/AbetaK99"}, "url":"URL#6516931" }, { "@score":"1", "@id":"6516932", "info":{"authors":{"author":[{"@pid":"75/529","text":"Rakesh Agarwal"},{"@pid":"35/3500","text":"Giorgio Bruno"},{"@pid":"63/2259","text":"Marco Torchiano"}]},"title":"Object-Oriented Architectural Support for Developing Complex Systems.","venue":"COMPSAC","pages":"259-264","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AgarwalBT99","doi":"10.1109/CMPSAC.1999.812713","ee":"https://doi.org/10.1109/CMPSAC.1999.812713","url":"https://dblp.org/rec/conf/compsac/AgarwalBT99"}, "url":"URL#6516932" }, { "@score":"1", "@id":"6516933", "info":{"authors":{"author":[{"@pid":"a/PauloSCAlencar","text":"Paulo S. C. Alencar"},{"@pid":"c/DonaldDCowan","text":"Donald D. Cowan"},{"@pid":"85/1692-5","text":"Jing Dong 0005"},{"@pid":"l/CarlosJosePereiradeLucena","text":"Carlos José Pereira de Lucena"}]},"title":"A Pattern-Based Approach to Structural Design Composition.","venue":"COMPSAC","pages":"160-165","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AlencarCDL99","doi":"10.1109/CMPSAC.1999.812694","ee":"https://doi.org/10.1109/CMPSAC.1999.812694","url":"https://dblp.org/rec/conf/compsac/AlencarCDL99"}, "url":"URL#6516933" }, { "@score":"1", "@id":"6516934", "info":{"authors":{"author":{"@pid":"07/5779","text":"Donald J. Bagert"}},"title":"Licensing Software Engineers: The Computer Society Must Continue to Lead.","venue":"COMPSAC","pages":"200-201","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Bagert99","doi":"10.1109/CMPSAC.1999.812700","ee":"https://doi.org/10.1109/CMPSAC.1999.812700","url":"https://dblp.org/rec/conf/compsac/Bagert99"}, "url":"URL#6516934" }, { "@score":"1", "@id":"6516935", "info":{"authors":{"author":{"@pid":"b/ElisaBertino","text":"Elisa Bertino"}},"title":"Protecting Information in the Web - Position Paper.","venue":"COMPSAC","pages":"50-51","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Bertino99","doi":"10.1109/CMPSAC.1999.812675","ee":"https://doi.org/10.1109/CMPSAC.1999.812675","url":"https://dblp.org/rec/conf/compsac/Bertino99"}, "url":"URL#6516935" }, { "@score":"1", "@id":"6516936", "info":{"authors":{"author":[{"@pid":"69/3637","text":"Sourav Bhattacharya"},{"@pid":"57/181","text":"Srihari Palangala"},{"@pid":"61/4674","text":"Tolety Siva Perraju"}]},"title":"Multimedia Tools and Applications in the Development of a Large Complex Network System.","venue":"COMPSAC","pages":"226-231","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BhattacharyaPT99","doi":"10.1109/CMPSAC.1999.812705","ee":"https://doi.org/10.1109/CMPSAC.1999.812705","url":"https://dblp.org/rec/conf/compsac/BhattacharyaPT99"}, "url":"URL#6516936" }, { "@score":"1", "@id":"6516937", "info":{"authors":{"author":[{"@pid":"19/1796","text":"Maha Boughdadi"},{"@pid":"15/2911","text":"Robert Busser"}]},"title":"An Industrial Application of an Integrated UML and SDL Modeling Technique.","venue":"COMPSAC","pages":"54-60","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BoughdadiB99","doi":"10.1109/CMPSAC.1999.812676","ee":"https://doi.org/10.1109/CMPSAC.1999.812676","url":"https://dblp.org/rec/conf/compsac/BoughdadiB99"}, "url":"URL#6516937" }, { "@score":"1", "@id":"6516938", "info":{"authors":{"author":[{"@pid":"07/3777","text":"Hakki C. Cankaya"},{"@pid":"66/2170","text":"David W. Matula"},{"@pid":"34/5197","text":"Mihaela Iridon"}]},"title":"Performance Analysis of a Graph Model for Channel Assignment in a Cellular Network.","venue":"COMPSAC","pages":"239-240","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CankayaMI99","doi":"10.1109/CMPSAC.1999.812707","ee":"https://doi.org/10.1109/CMPSAC.1999.812707","url":"https://dblp.org/rec/conf/compsac/CankayaMI99"}, "url":"URL#6516938" }, { "@score":"1", "@id":"6516939", "info":{"authors":{"author":{"@pid":"73/1719","text":"Joseph P. Cavano"}},"title":"Computers as Partners: A Technology Forecast for Decision-Making in the 21st Century.","venue":"COMPSAC","pages":"384-385","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Cavano99","doi":"10.1109/CMPSAC.1999.814312","ee":"https://doi.org/10.1109/CMPSAC.1999.814312","url":"https://dblp.org/rec/conf/compsac/Cavano99"}, "url":"URL#6516939" }, { "@score":"1", "@id":"6516940", "info":{"authors":{"author":[{"@pid":"50/2518","text":"Marion G. Ceruti"},{"@pid":"13/1717","text":"Ray C. Trout"},{"@pid":"01/4533","text":"Tse Lee"}]},"title":"Effect of Complementary Processing on Navy Command and Control Software.","venue":"COMPSAC","pages":"336-337","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CerutiTL99","doi":"10.1109/CMPSAC.1999.812735","ee":"https://doi.org/10.1109/CMPSAC.1999.812735","url":"https://dblp.org/rec/conf/compsac/CerutiTL99"}, "url":"URL#6516940" }, { "@score":"1", "@id":"6516941", "info":{"authors":{"author":[{"@pid":"c/CarlKChang","text":"Carl K. Chang"},{"@pid":"70/263","text":"Seongwoon Kim"}]},"title":"I3: A Petri-Net Based Specification Method for Architectural Components.","venue":"COMPSAC","pages":"396-402","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChangK99","doi":"10.1109/CMPSAC.1999.814317","ee":"https://doi.org/10.1109/CMPSAC.1999.814317","url":"https://dblp.org/rec/conf/compsac/ChangK99"}, "url":"URL#6516941" }, { "@score":"1", "@id":"6516942", "info":{"authors":{"author":[{"@pid":"46/3100","text":"Kuangnan Chang"},{"@pid":"k/DavidChenhoKung","text":"David Chenho Kung"},{"@pid":"13/2435","text":"Pei Hsia"}]},"title":"OBL: A Formal Deduction Method for Object-Oriented Systems.","venue":"COMPSAC","pages":"450-455","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChangKH99","doi":"10.1109/CMPSAC.1999.814325","ee":"https://doi.org/10.1109/CMPSAC.1999.814325","url":"https://dblp.org/rec/conf/compsac/ChangKH99"}, "url":"URL#6516942" }, { "@score":"1", "@id":"6516943", "info":{"authors":{"author":[{"@pid":"32/6638","text":"Hanxiong Chen"},{"@pid":"49/6088","text":"Toshiro Ohno"},{"@pid":"79/1829","text":"Nobuo Ohbo"}]},"title":"Processing Queries with Expensive Predicates by Filtering.","venue":"COMPSAC","pages":"350-356","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenOO99","doi":"10.1109/CMPSAC.1999.812738","ee":"https://doi.org/10.1109/CMPSAC.1999.812738","url":"https://dblp.org/rec/conf/compsac/ChenOO99"}, "url":"URL#6516943" }, { "@score":"1", "@id":"6516944", "info":{"authors":{"author":[{"@pid":"c/IngRayChen","text":"Ing-Ray Chen"},{"@pid":"51/1783","text":"Ding-Chau Wang"},{"@pid":"99/5296","text":"Chih-Ping Chu"}]},"title":"Response Time Behavior of Voting Schemes for Managing Replicated Data.","venue":"COMPSAC","pages":"139-144","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenWC99","doi":"10.1109/CMPSAC.1999.812691","ee":"https://doi.org/10.1109/CMPSAC.1999.812691","url":"https://dblp.org/rec/conf/compsac/ChenWC99"}, "url":"URL#6516944" }, { "@score":"1", "@id":"6516945", "info":{"authors":{"author":[{"@pid":"09/3459","text":"Chia-Chu Chiang"},{"@pid":"u/JosephEUrban","text":"Joseph E. Urban"}]},"title":"Validating Software Specifications against User Claims.","venue":"COMPSAC","pages":"104-109","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChiangU99","doi":"10.1109/CMPSAC.1999.812686","ee":"https://doi.org/10.1109/CMPSAC.1999.812686","url":"https://dblp.org/rec/conf/compsac/ChiangU99"}, "url":"URL#6516945" }, { "@score":"1", "@id":"6516946", "info":{"authors":{"author":[{"@pid":"63/5613","text":"Yong S. Choi"},{"@pid":"32/3382","text":"Suk I. Yoo"},{"@pid":"78/6080","text":"Jaeho Lee"}]},"title":"Hierarchically Organized Neural Net Agents for Distributed Web Information Retrieval.","venue":"COMPSAC","pages":"192-197","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChoiYL99","doi":"10.1109/CMPSAC.1999.812699","ee":"https://doi.org/10.1109/CMPSAC.1999.812699","url":"https://dblp.org/rec/conf/compsac/ChoiYL99"}, "url":"URL#6516946" }, { "@score":"1", "@id":"6516947", "info":{"authors":{"author":[{"@pid":"90/2390","text":"Antonio Corradi"},{"@pid":"38/5309","text":"Rebecca Montanari"},{"@pid":"19/4945","text":"Cesare Stefanelli"}]},"title":"Mobile Agents Protection in the Internet Environment.","venue":"COMPSAC","pages":"80-85","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CorradiMS99","doi":"10.1109/CMPSAC.1999.812680","ee":"https://doi.org/10.1109/CMPSAC.1999.812680","url":"https://dblp.org/rec/conf/compsac/CorradiMS99"}, "url":"URL#6516947" }, { "@score":"1", "@id":"6516948", "info":{"authors":{"author":[{"@pid":"17/702","text":"E. Coupey"},{"@pid":"37/4153","text":"Pamplin Hall"}]},"title":"Developing Dynamic Decision Support: Opportunities, Issues and Approaches.","venue":"COMPSAC","pages":"386-387","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CoupeyH99","doi":"10.1109/CMPSAC.1999.814313","ee":"https://doi.org/10.1109/CMPSAC.1999.814313","url":"https://dblp.org/rec/conf/compsac/CoupeyH99"}, "url":"URL#6516948" }, { "@score":"1", "@id":"6516949", "info":{"authors":{"author":[{"@pid":"49/2261","text":"James B. Crigler"},{"@pid":"25/5076","text":"Ali Orooji"}]},"title":"ORR: Object-Relational Rapprochement.","venue":"COMPSAC","pages":"42-48","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CriglerO99","doi":"10.1109/CMPSAC.1999.812674","ee":"https://doi.org/10.1109/CMPSAC.1999.812674","url":"https://dblp.org/rec/conf/compsac/CriglerO99"}, "url":"URL#6516949" }, { "@score":"1", "@id":"6516950", "info":{"authors":{"author":[{"@pid":"64/2416","text":"Stephanie D. Crouch"},{"@pid":"s/DickBSimmons","text":"Dick B. Simmons"}]},"title":"The Unique Reference NCSLOC Metric.","venue":"COMPSAC","pages":"316-317","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CrouchS99","doi":"10.1109/CMPSAC.1999.812726","ee":"https://doi.org/10.1109/CMPSAC.1999.812726","url":"https://dblp.org/rec/conf/compsac/CrouchS99"}, "url":"URL#6516950" }, { "@score":"1", "@id":"6516951", "info":{"authors":{"author":{"@pid":"50/6366","text":"John C. Dean"}},"title":"Ensuring the Capability of COTS Products.","venue":"COMPSAC","pages":"96-97","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Dean99","doi":"10.1109/CMPSAC.1999.812683","ee":"https://doi.org/10.1109/CMPSAC.1999.812683","url":"https://dblp.org/rec/conf/compsac/Dean99"}, "url":"URL#6516951" }, { "@score":"1", "@id":"6516952", "info":{"authors":{"author":{"@pid":"80/3825","text":"Michael Duell"}},"title":"Looking Beyond Software to Understand Software Design Patterns.","venue":"COMPSAC","pages":"312-313","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Duell99","doi":"10.1109/CMPSAC.1999.812724","ee":"https://doi.org/10.1109/CMPSAC.1999.812724","url":"https://dblp.org/rec/conf/compsac/Duell99"}, "url":"URL#6516952" }, { "@score":"1", "@id":"6516953", "info":{"authors":{"author":{"@pid":"89/4694","text":"Helen M. Edwards"}},"title":"Software Engineering Education from a UK Academic's Perspective.","venue":"COMPSAC","pages":"243-244","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Edwards99","doi":"10.1109/CMPSAC.1999.812709","ee":"https://doi.org/10.1109/CMPSAC.1999.812709","url":"https://dblp.org/rec/conf/compsac/Edwards99"}, "url":"URL#6516953" }, { "@score":"1", "@id":"6516954", "info":{"authors":{"author":[{"@pid":"89/4694","text":"Helen M. Edwards"},{"@pid":"32/6041","text":"Gillian Margaret Mallalieu"},{"@pid":"48/6443","text":"J. Barrie Thompson"}]},"title":"Some Insights into the Maintenance of Legacy Systems within Small Manufacturing and Distribution Organizations in the UK.","venue":"COMPSAC","pages":"13-20","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/EdwardsMT99","doi":"10.1109/CMPSAC.1999.812508","ee":"https://doi.org/10.1109/CMPSAC.1999.812508","url":"https://dblp.org/rec/conf/compsac/EdwardsMT99"}, "url":"URL#6516954" }, { "@score":"1", "@id":"6516955", "info":{"authors":{"author":{"@pid":"95/4010","text":"Raimund K. Ege"}},"title":"Object-Oriented Database Access via Reflection.","venue":"COMPSAC","pages":"36-41","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Ege99","doi":"10.1109/CMPSAC.1999.812673","ee":"https://doi.org/10.1109/CMPSAC.1999.812673","url":"https://dblp.org/rec/conf/compsac/Ege99"}, "url":"URL#6516955" }, { "@score":"1", "@id":"6516956", "info":{"authors":{"author":[{"@pid":"63/1235","text":"Giovanni Felici"},{"@pid":"79/3256","text":"Fushing Sun"},{"@pid":"81/2166","text":"Klaus Truemper"}]},"title":"A Method for Controlling Errors in Two-Class Classification.","venue":"COMPSAC","pages":"186-191","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/FeliciST99","doi":"10.1109/CMPSAC.1999.812698","ee":"https://doi.org/10.1109/CMPSAC.1999.812698","url":"https://dblp.org/rec/conf/compsac/FeliciST99"}, "url":"URL#6516956" }, { "@score":"1", "@id":"6516957", "info":{"authors":{"author":{"@pid":"82/6853","text":"Wu-chun Feng"}},"title":"Dynamic Client-Side Scheduling in a Real-Time CORBA System.","venue":"COMPSAC","pages":"332-333","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Feng99","doi":"10.1109/CMPSAC.1999.812733","ee":"https://doi.org/10.1109/CMPSAC.1999.812733","url":"https://dblp.org/rec/conf/compsac/Feng99"}, "url":"URL#6516957" }, { "@score":"1", "@id":"6516958", "info":{"authors":{"author":{"@pid":"60/5104","text":"Antonio Mendes da Silva Filho"}},"title":"Toward More Reliable Telecom Systems.","venue":"COMPSAC","pages":"151-156","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Filho99","doi":"10.1109/CMPSAC.1999.812693","ee":"https://doi.org/10.1109/CMPSAC.1999.812693","url":"https://dblp.org/rec/conf/compsac/Filho99"}, "url":"URL#6516958" }, { "@score":"1", "@id":"6516959", "info":{"authors":{"author":[{"@pid":"38/255","text":"Kevin A. Gary"},{"@pid":"l/TELindquist","text":"Timothy E. Lindquist"}]},"title":"Cooperating Process Components.","venue":"COMPSAC","pages":"218-223","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GaryL99","doi":"10.1109/CMPSAC.1999.812704","ee":"https://doi.org/10.1109/CMPSAC.1999.812704","url":"https://dblp.org/rec/conf/compsac/GaryL99"}, "url":"URL#6516959" }, { "@score":"1", "@id":"6516960", "info":{"authors":{"author":{"@pid":"13/5741","text":"Garfield Hamilton"}},"title":"CataLogger: A Framework for Building Asset Management Solutions.","venue":"COMPSAC","pages":"328-329","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Hamilton99","doi":"10.1109/CMPSAC.1999.812731","ee":"https://doi.org/10.1109/CMPSAC.1999.812731","url":"https://dblp.org/rec/conf/compsac/Hamilton99"}, "url":"URL#6516960" }, { "@score":"1", "@id":"6516961", "info":{"authors":{"author":[{"@pid":"43/1142","text":"Colin J. Hardy"},{"@pid":"89/4694","text":"Helen M. Edwards"},{"@pid":"48/6443","text":"J. Barrie Thompson"}]},"title":"The MEA Framework: A New Perspective for the Development of Situation-Specific Methods.","venue":"COMPSAC","pages":"330-331","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HardyET99","doi":"10.1109/CMPSAC.1999.812732","ee":"https://doi.org/10.1109/CMPSAC.1999.812732","url":"https://dblp.org/rec/conf/compsac/HardyET99"}, "url":"URL#6516961" }, { "@score":"1", "@id":"6516962", "info":{"authors":{"author":[{"@pid":"h/XudongHe","text":"Xudong He"},{"@pid":"c/WilliamCChu","text":"William C. Chu"},{"@pid":"78/4510","text":"Hongji Yang"},{"@pid":"23/85","text":"Stephen J. H. Yang"}]},"title":"A New Approach to Verify Rule-Based Systems Using Petri Nets.","venue":"COMPSAC","pages":"462-467","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HeCYY99","doi":"10.1109/CMPSAC.1999.814327","ee":"https://doi.org/10.1109/CMPSAC.1999.814327","url":"https://dblp.org/rec/conf/compsac/HeCYY99"}, "url":"URL#6516962" }, { "@score":"1", "@id":"6516963", "info":{"authors":{"author":{"@pid":"44/1292","text":"Peter S. Heck"}},"title":"Steps Toward a Theory of Coordination for Intelligent Agent Societies.","venue":"COMPSAC","pages":"299-300","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Heck99","doi":"10.1109/CMPSAC.1999.812720","ee":"https://doi.org/10.1109/CMPSAC.1999.812720","url":"https://dblp.org/rec/conf/compsac/Heck99"}, "url":"URL#6516963" }, { "@score":"1", "@id":"6516964", "info":{"authors":{"author":[{"@pid":"55/6314","text":"Hideaki Hirayama"},{"@pid":"36/539","text":"Hiroki Honda"},{"@pid":"15/379","text":"Toshitsugu Yuba"}]},"title":"Distributed Shared Memory with Log Based Consistency for Scalable Data Mining.","venue":"COMPSAC","pages":"305-308","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HirayamaHY99","doi":"10.1109/CMPSAC.1999.812722","ee":"https://doi.org/10.1109/CMPSAC.1999.812722","url":"https://dblp.org/rec/conf/compsac/HirayamaHY99"}, "url":"URL#6516964" }, { "@score":"1", "@id":"6516965", "info":{"authors":{"author":[{"@pid":"13/2435","text":"Pei Hsia"},{"@pid":"24/741","text":"Chih-Tung Hsu"},{"@pid":"k/DavidChenhoKung","text":"David Chenho Kung"}]},"title":"Brooks' Law Revisited: A System Dynamics Approach.","venue":"COMPSAC","pages":"370-375","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HsiaHK99","doi":"10.1109/CMPSAC.1999.814310","ee":"https://doi.org/10.1109/CMPSAC.1999.814310","url":"https://dblp.org/rec/conf/compsac/HsiaHK99"}, "url":"URL#6516965" }, { "@score":"1", "@id":"6516966", "info":{"authors":{"author":[{"@pid":"49/4191","text":"Chin-Yu Huang"},{"@pid":"57/264","text":"Sy-Yen Kuo"},{"@pid":"l/MichaelRLyu","text":"Michael R. Lyu"}]},"title":"Optimal Software Release Policy Based on Cost and Reliability with Testing Efficiency.","venue":"COMPSAC","pages":"468-473","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HuangKKL99","doi":"10.1109/CMPSAC.1999.814328","ee":"https://doi.org/10.1109/CMPSAC.1999.814328","url":"https://dblp.org/rec/conf/compsac/HuangKKL99"}, "url":"URL#6516966" }, { "@score":"1", "@id":"6516967", "info":{"authors":{"author":[{"@pid":"i/HohPeterIn","text":"Hoh In"},{"@pid":"08/4224","text":"Ana Erendira Flores-Mendoza"}]},"title":"Initial Design of the "Plug-n-Analyze" Framework for Architecture Tradeoff Analysis.","venue":"COMPSAC","pages":"318-319","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/InF99","doi":"10.1109/CMPSAC.1999.812727","ee":"https://doi.org/10.1109/CMPSAC.1999.812727","url":"https://dblp.org/rec/conf/compsac/InF99"}, "url":"URL#6516967" }, { "@score":"1", "@id":"6516968", "info":{"authors":{"author":[{"@pid":"90/5566","text":"Xiaoping Jia"},{"@pid":"70/3043","text":"Sotiris Skevoulis"}]},"title":"A Generic Approach of Static Analysis for Detecting Runtime Errors in Java Programs.","venue":"COMPSAC","pages":"67-72","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JiaS99","doi":"10.1109/CMPSAC.1999.812678","ee":"https://doi.org/10.1109/CMPSAC.1999.812678","url":"https://dblp.org/rec/conf/compsac/JiaS99"}, "url":"URL#6516968" }, { "@score":"1", "@id":"6516969", "info":{"authors":{"author":[{"@pid":"90/5566","text":"Xiaoping Jia"},{"@pid":"28/4132","text":"Sushant Sawant"},{"@pid":"59/661","text":"Jiangyu Zhou"},{"@pid":"70/3043","text":"Sotiris Skevoulis"}]},"title":"Detecting Null Pointer Violations in Java Programs.","venue":"COMPSAC","pages":"456-461","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JiaSZS99","doi":"10.1109/CMPSAC.1999.814326","ee":"https://doi.org/10.1109/CMPSAC.1999.814326","url":"https://dblp.org/rec/conf/compsac/JiaSZS99"}, "url":"URL#6516969" }, { "@score":"1", "@id":"6516970", "info":{"authors":{"author":[{"@pid":"98/5830","text":"Hewijin Christine Jiau"},{"@pid":"12/5564","text":"Kuo-Feng Ssu"},{"@pid":"87/6681","text":"Jim-Min Lin"},{"@pid":"50/990","text":"Yu-Ping Ko"}]},"title":"Reusing CAD Tools in Object Oriented Based Framework.","venue":"COMPSAC","pages":"357-362","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JiauSLK99","doi":"10.1109/CMPSAC.1999.812739","ee":"https://doi.org/10.1109/CMPSAC.1999.812739","url":"https://dblp.org/rec/conf/compsac/JiauSLK99"}, "url":"URL#6516970" }, { "@score":"1", "@id":"6516971", "info":{"authors":{"author":{"@pid":"02/4587","text":"Anil Khatri"}},"title":"Validation of a Patient Headache Care Education System (PHCES) Developed from a Unified Modeling Language (UML) Domain Model.","venue":"COMPSAC","pages":"296-298","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Khatri99","doi":"10.1109/CMPSAC.1999.812719","ee":"https://doi.org/10.1109/CMPSAC.1999.812719","url":"https://dblp.org/rec/conf/compsac/Khatri99"}, "url":"URL#6516971" }, { "@score":"1", "@id":"6516972", "info":{"authors":{"author":[{"@pid":"78/4921","text":"Joo-Yong Kim"},{"@pid":"93/792","text":"Kyoungwoon Cho"},{"@pid":"94/6868","text":"Kern Koh"}]},"title":"A Proxy Server Structure and its Cache Consistency Mechanism at the Network Bottleneck.","venue":"COMPSAC","pages":"278-283","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimCK99","doi":"10.1109/CMPSAC.1999.812716","ee":"https://doi.org/10.1109/CMPSAC.1999.812716","url":"https://dblp.org/rec/conf/compsac/KimCK99"}, "url":"URL#6516972" }, { "@score":"1", "@id":"6516973", "info":{"authors":{"author":[{"@pid":"75/6990","text":"Han-joon Kim"},{"@pid":"67/5511","text":"Sang-goo Lee"}]},"title":"A New Flash Memory Management for Flash Storage System.","venue":"COMPSAC","pages":"284-289","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimL99","doi":"10.1109/CMPSAC.1999.812717","ee":"https://doi.org/10.1109/CMPSAC.1999.812717","url":"https://dblp.org/rec/conf/compsac/KimL99"}, "url":"URL#6516973" }, { "@score":"1", "@id":"6516974", "info":{"authors":{"author":[{"@pid":"k/KHKim","text":"K. H. Kim"},{"@pid":"00/5236","text":"Juqiang Liu"},{"@pid":"48/4846","text":"Masaki Ishida"},{"@pid":"18/4048","text":"Inho Kim"}]},"title":"Distributed Object-Oriented Real-Time Simulation of Ground Transportation Networks with the TMO Structuring Scheme.","venue":"COMPSAC","pages":"130-138","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimLIK99","doi":"10.1109/CMPSAC.1999.812690","ee":"https://doi.org/10.1109/CMPSAC.1999.812690","url":"https://dblp.org/rec/conf/compsac/KimLIK99"}, "url":"URL#6516974" }, { "@score":"1", "@id":"6516975", "info":{"authors":{"author":[{"@pid":"17/4306-1","text":"Tae-Hoon Kim 0001"},{"@pid":"15/4884","text":"Yeong-Gil Shin"}]},"title":"Role-based Decomposition for Improving Concurrency in Distributed Object-Oriented Software Development Environments.","venue":"COMPSAC","pages":"410-415","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimS99","doi":"10.1109/CMPSAC.1999.814319","ee":"https://doi.org/10.1109/CMPSAC.1999.814319","url":"https://dblp.org/rec/conf/compsac/KimS99"}, "url":"URL#6516975" }, { "@score":"1", "@id":"6516976", "info":{"authors":{"author":[{"@pid":"70/6258","text":"Taeho Kim"},{"@pid":"11/1185","text":"Yeong-Tae Song"},{"@pid":"37/4841","text":"Lawrence Chung"},{"@pid":"39/5128","text":"Dung T. Huynh"}]},"title":"Dynamic Software Architecture Slicing.","venue":"COMPSAC","pages":"61-66","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimSCH99","doi":"10.1109/CMPSAC.1999.812677","ee":"https://doi.org/10.1109/CMPSAC.1999.812677","url":"https://dblp.org/rec/conf/compsac/KimSCH99"}, "url":"URL#6516976" }, { "@score":"1", "@id":"6516977", "info":{"authors":{"author":[{"@pid":"19/4812","text":"Keith Knauber"},{"@pid":"98/449","text":"Biao Chen"}]},"title":"Supporting Preemption in Wormhole Networks.","venue":"COMPSAC","pages":"232-238","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KnauberC99","doi":"10.1109/CMPSAC.1999.812706","ee":"https://doi.org/10.1109/CMPSAC.1999.812706","url":"https://dblp.org/rec/conf/compsac/KnauberC99"}, "url":"URL#6516977" }, { "@score":"1", "@id":"6516978", "info":{"authors":{"author":{"@pid":"60/4615","text":"Ronald J. Kohl"}},"title":"Establishing Guidelines for Suitability of COTS for a Mission Critical Application.","venue":"COMPSAC","pages":"98-99","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Kohl99","doi":"10.1109/CMPSAC.1999.812684","ee":"https://doi.org/10.1109/CMPSAC.1999.812684","url":"https://dblp.org/rec/conf/compsac/Kohl99"}, "url":"URL#6516978" }, { "@score":"1", "@id":"6516979", "info":{"authors":{"author":[{"@pid":"87/1192","text":"Kimio Kuramitsu"},{"@pid":"60/4410","text":"Ken Sakamura"}]},"title":"Digiket: Decentralized Architecture for Worldwide Electronic Market.","venue":"COMPSAC","pages":"430-435","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KuramitsuS99","doi":"10.1109/CMPSAC.1999.814322","ee":"https://doi.org/10.1109/CMPSAC.1999.814322","url":"https://dblp.org/rec/conf/compsac/KuramitsuS99"}, "url":"URL#6516979" }, { "@score":"1", "@id":"6516980", "info":{"authors":{"author":[{"@pid":"23/5291","text":"Karl R. P. H. Leung"},{"@pid":"h/LucasChiKwongHui","text":"Lucas Chi Kwong Hui"}]},"title":"Signature Management in Workflow Systems.","venue":"COMPSAC","pages":"424-429","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LeungH99","doi":"10.1109/CMPSAC.1999.814321","ee":"https://doi.org/10.1109/CMPSAC.1999.814321","url":"https://dblp.org/rec/conf/compsac/LeungH99"}, "url":"URL#6516980" }, { "@score":"1", "@id":"6516981", "info":{"authors":{"author":{"@pid":"l/ElizabethDLiddy","text":"Elizabeth D. Liddy"}},"title":"NLP-Supported Decision-Making.","venue":"COMPSAC","pages":"390-391","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Liddy99","doi":"10.1109/CMPSAC.1999.814315","ee":"https://doi.org/10.1109/CMPSAC.1999.814315","url":"https://dblp.org/rec/conf/compsac/Liddy99"}, "url":"URL#6516981" }, { "@score":"1", "@id":"6516982", "info":{"authors":{"author":[{"@pid":"27/3260","text":"Chung-Shyan Liu"},{"@pid":"19/6703","text":"Wei Kuo"},{"@pid":"87/6807","text":"Lan-Yang Ch'ang"},{"@pid":"88/3911","text":"Wen-Chang Lin"}]},"title":"The Design of Agent-Based Tools for Bio-Informatics.","venue":"COMPSAC","pages":"294-295","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiuKCL99","doi":"10.1109/CMPSAC.1999.812718","ee":"https://doi.org/10.1109/CMPSAC.1999.812718","url":"https://dblp.org/rec/conf/compsac/LiuKCL99"}, "url":"URL#6516982" }, { "@score":"1", "@id":"6516983", "info":{"authors":{"author":[{"@pid":"92/309-1","text":"Huan Liu 0001"},{"@pid":"l/HongjunLu","text":"Hongjun Lu"}]},"title":"Mining Weak Rules.","venue":"COMPSAC","pages":"309-310","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiuL99","doi":"10.1109/CMPSAC.1999.812723","ee":"https://doi.org/10.1109/CMPSAC.1999.812723","url":"https://dblp.org/rec/conf/compsac/LiuL99"}, "url":"URL#6516983" }, { "@score":"1", "@id":"6516984", "info":{"authors":{"author":[{"@pid":"02/1986","text":"Xiaoqing Liu"},{"@pid":"58/6411","text":"Ravi Viswanathan"}]},"title":"A WWW Based Software Metrics Environment for Software Process Management and Software Product Quality Improvement.","venue":"COMPSAC","pages":"301-304","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiuV99","doi":"10.1109/CMPSAC.1999.812721","ee":"https://doi.org/10.1109/CMPSAC.1999.812721","url":"https://dblp.org/rec/conf/compsac/LiuV99"}, "url":"URL#6516984" }, { "@score":"1", "@id":"6516985", "info":{"authors":{"author":{"@pid":"03/4683","text":"Serge Lubenec"}},"title":"Venice - a Toolkit/Framework for Integration and Component-Based Computing.","venue":"COMPSAC","pages":"326-327","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Lubenec99","doi":"10.1109/CMPSAC.1999.812730","ee":"https://doi.org/10.1109/CMPSAC.1999.812730","url":"https://dblp.org/rec/conf/compsac/Lubenec99"}, "url":"URL#6516985" }, { "@score":"1", "@id":"6516986", "info":{"authors":{"author":[{"@pid":"a/AnnelieseAmschlerAndrews","text":"Anneliese von Mayrhauser"},{"@pid":"64/1740","text":"Michael Scheetz"},{"@pid":"75/3786","text":"Eric Dahlman"}]},"title":"Generating Goal-Oriented Test Cases.","venue":"COMPSAC","pages":"110-115","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MayrhauserSD99","doi":"10.1109/CMPSAC.1999.812687","ee":"https://doi.org/10.1109/CMPSAC.1999.812687","url":"https://dblp.org/rec/conf/compsac/MayrhauserSD99"}, "url":"URL#6516986" }, { "@score":"1", "@id":"6516987", "info":{"authors":{"author":[{"@pid":"82/5799","text":"Alok Mehta"},{"@pid":"41/5390","text":"George T. Heineman"}]},"title":"Architectural Evolution of Legacy Systems.","venue":"COMPSAC","pages":"4-12","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MehtaH99","doi":"10.1109/CMPSAC.1999.812507","ee":"https://doi.org/10.1109/CMPSAC.1999.812507","url":"https://dblp.org/rec/conf/compsac/MehtaH99"}, "url":"URL#6516987" }, { "@score":"1", "@id":"6516988", "info":{"authors":{"author":{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"}},"title":"A Design Pattern for Autonomous Vehicle Software Control Architectures.","venue":"COMPSAC","pages":"172-177","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Nelson99","doi":"10.1109/CMPSAC.1999.812696","ee":"https://doi.org/10.1109/CMPSAC.1999.812696","url":"https://dblp.org/rec/conf/compsac/Nelson99"}, "url":"URL#6516988" }, { "@score":"1", "@id":"6516989", "info":{"authors":{"author":[{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"},{"@pid":"87/4334","text":"Guillermo Flores Jr."}]},"title":"Failure Planning in STESCA.","venue":"COMPSAC","pages":"334-335","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/NelsonF99","doi":"10.1109/CMPSAC.1999.812734","ee":"https://doi.org/10.1109/CMPSAC.1999.812734","url":"https://dblp.org/rec/conf/compsac/NelsonF99"}, "url":"URL#6516989" }, { "@score":"1", "@id":"6516990", "info":{"authors":{"author":[{"@pid":"54/2911","text":"David C. Ni"},{"@pid":"32/5955","text":"J. Martinez"},{"@pid":"03/59","text":"J. Wang"}]},"title":"System Scaling for Large-scale Internet-Based Online Services.","venue":"COMPSAC","pages":"180-185","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/NiMW99","doi":"10.1109/CMPSAC.1999.812697","ee":"https://doi.org/10.1109/CMPSAC.1999.812697","url":"https://dblp.org/rec/conf/compsac/NiMW99"}, "url":"URL#6516990" }, { "@score":"1", "@id":"6516991", "info":{"authors":{"author":{"@pid":"18/5664","text":"Bart J. Nigro"}},"title":"Here, There and Everywhere: The Future of Software Engineering Education: Corporate View.","venue":"COMPSAC","pages":"245","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Nigro99","doi":"10.1109/CMPSAC.1999.812710","ee":"https://doi.org/10.1109/CMPSAC.1999.812710","url":"https://dblp.org/rec/conf/compsac/Nigro99"}, "url":"URL#6516991" }, { "@score":"1", "@id":"6516992", "info":{"authors":{"author":{"@pid":"13/366","text":"John de Oliveira"}},"title":"Talking with Computers about the Future We Shall Share.","venue":"COMPSAC","pages":"388-389","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Oliveira99","doi":"10.1109/CMPSAC.1999.814314","ee":"https://doi.org/10.1109/CMPSAC.1999.814314","url":"https://dblp.org/rec/conf/compsac/Oliveira99"}, "url":"URL#6516992" }, { "@score":"1", "@id":"6516993", "info":{"authors":{"author":{"@pid":"29/5693","text":"Linda Rising"}},"title":"Patterns in Postmortems.","venue":"COMPSAC","pages":"314-315","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Rising99","doi":"10.1109/CMPSAC.1999.812725","ee":"https://doi.org/10.1109/CMPSAC.1999.812725","url":"https://dblp.org/rec/conf/compsac/Rising99"}, "url":"URL#6516993" }, { "@score":"1", "@id":"6516994", "info":{"authors":{"author":{"@pid":"r/DanielaRus","text":"Daniela Rus"}},"title":"Mobile Information Agents for Processing under Information Overload: A Position Statement.","venue":"COMPSAC","pages":"392-393","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Rus99","doi":"10.1109/CMPSAC.1999.814316","ee":"https://doi.org/10.1109/CMPSAC.1999.814316","url":"https://dblp.org/rec/conf/compsac/Rus99"}, "url":"URL#6516994" }, { "@score":"1", "@id":"6516995", "info":{"authors":{"author":[{"@pid":"97/1892","text":"Ioana Rus"},{"@pid":"24/326","text":"James S. Collofello"}]},"title":"A Decision Support System for Software Reliability Engineering Strategy Selection.","venue":"COMPSAC","pages":"376-381","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/RusC99","doi":"10.1109/CMPSAC.1999.814311","ee":"https://doi.org/10.1109/CMPSAC.1999.814311","url":"https://dblp.org/rec/conf/compsac/RusC99"}, "url":"URL#6516995" }, { "@score":"1", "@id":"6516996", "info":{"authors":{"author":[{"@pid":"46/865","text":"Ly Danielle Sauer"},{"@pid":"l/TELindquist","text":"Timothy E. Lindquist"},{"@pid":"78/788","text":"Jeremy Cairney"}]},"title":"Tracking Personal Processes in Group Projects.","venue":"COMPSAC","pages":"364-369","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SauerLC99","doi":"10.1109/CMPSAC.1999.812740","ee":"https://doi.org/10.1109/CMPSAC.1999.812740","url":"https://dblp.org/rec/conf/compsac/SauerLC99"}, "url":"URL#6516996" }, { "@score":"1", "@id":"6516997", "info":{"authors":{"author":{"@pid":"64/3016","text":"Norman F. Schneidewind"}},"title":"Cost Framework for COTS Evaluation.","venue":"COMPSAC","pages":"100-101","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Schneidewind99","doi":"10.1109/CMPSAC.1999.812685","ee":"https://doi.org/10.1109/CMPSAC.1999.812685","url":"https://dblp.org/rec/conf/compsac/Schneidewind99"}, "url":"URL#6516997" }, { "@score":"1", "@id":"6516998", "info":{"authors":{"author":[{"@pid":"29/6344","text":"Robert N. Smith"},{"@pid":"69/3637","text":"Sourav Bhattacharya"}]},"title":"A Protocol and Simulation for Distributed Communicating Firewalls.","venue":"COMPSAC","pages":"74-79","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SmithB99","doi":"10.1109/CMPSAC.1999.812679","ee":"https://doi.org/10.1109/CMPSAC.1999.812679","url":"https://dblp.org/rec/conf/compsac/SmithB99"}, "url":"URL#6516998" }, { "@score":"1", "@id":"6516999", "info":{"authors":{"author":[{"@pid":"55/157","text":"Hwan Wook Sohn"},{"@pid":"k/DavidChenhoKung","text":"David Chenho Kung"},{"@pid":"13/2435","text":"Pei Hsia"}]},"title":"CORBA Components Testing with Perception-Based State Behavior.","venue":"COMPSAC","pages":"116-121","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SohnKH99","doi":"10.1109/CMPSAC.1999.812688","ee":"https://doi.org/10.1109/CMPSAC.1999.812688","url":"https://dblp.org/rec/conf/compsac/SohnKH99"}, "url":"URL#6516999" }, { "@score":"1", "@id":"6517000", "info":{"authors":{"author":[{"@pid":"37/4491","text":"B. Sonah"},{"@pid":"04/5309","text":"Mabo Robert Ito"}]},"title":"Merging Interval Caching with Adaptive Viewers' Bias Based Caching Strategy.","venue":"COMPSAC","pages":"272-277","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SonahI99","doi":"10.1109/CMPSAC.1999.812715","ee":"https://doi.org/10.1109/CMPSAC.1999.812715","url":"https://dblp.org/rec/conf/compsac/SonahI99"}, "url":"URL#6517000" }, { "@score":"1", "@id":"6517001", "info":{"authors":{"author":[{"@pid":"67/4145","text":"Ju-Won Song"},{"@pid":"w/KyuYoungWhang","text":"Kyu-Young Whang"},{"@pid":"53/1318","text":"Young-Koo Lee"},{"@pid":"64/5810","text":"Sang-Wook Kim"}]},"title":"The clustering Property of Corner Transformation for Spatial Database Applications.","venue":"COMPSAC","pages":"28-35","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SongWLK99","doi":"10.1109/CMPSAC.1999.812672","ee":"https://doi.org/10.1109/CMPSAC.1999.812672","url":"https://dblp.org/rec/conf/compsac/SongWLK99"}, "url":"URL#6517001" }, { "@score":"1", "@id":"6517002", "info":{"authors":{"author":{"@pid":"26/3184","text":"Teresa G. Sparkman"}},"title":"Lessons Learned Applying Software Engineering Principles to Visual Programming Language Application Development.","venue":"COMPSAC","pages":"416-421","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Sparkman99","doi":"10.1109/CMPSAC.1999.814320","ee":"https://doi.org/10.1109/CMPSAC.1999.814320","url":"https://dblp.org/rec/conf/compsac/Sparkman99"}, "url":"URL#6517002" }, { "@score":"1", "@id":"6517003", "info":{"authors":{"author":[{"@pid":"s/AmySundermier","text":"Amy Sundermier"},{"@pid":"d/SWDietrich","text":"Suzanne W. Dietrich"},{"@pid":"18/1264","text":"Vandana Shah"}]},"title":"An Active Database Approach to Integrating Black-Box Software Components.","venue":"COMPSAC","pages":"403-409","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SundermierDS99","doi":"10.1109/CMPSAC.1999.814318","ee":"https://doi.org/10.1109/CMPSAC.1999.814318","url":"https://dblp.org/rec/conf/compsac/SundermierDS99"}, "url":"URL#6517003" }, { "@score":"1", "@id":"6517004", "info":{"authors":{"author":[{"@pid":"38/3561","text":"Douglas M. Sycamore"},{"@pid":"24/326","text":"James S. Collofello"}]},"title":"Using System Dynamics Modeling to Manage Projects.","venue":"COMPSAC","pages":"213-217","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SycamoreC99","doi":"10.1109/CMPSAC.1999.812703","ee":"https://doi.org/10.1109/CMPSAC.1999.812703","url":"https://dblp.org/rec/conf/compsac/SycamoreC99"}, "url":"URL#6517004" }, { "@score":"1", "@id":"6517005", "info":{"authors":{"author":[{"@pid":"76/6758","text":"Yongdong Tan"},{"@pid":"43/5052","text":"Isao Kaji"},{"@pid":"45/7042","text":"Kinji Mori"}]},"title":"Autonomous Coordination for Atomicity of Transaction in Heterogeneous Systems.","venue":"COMPSAC","pages":"145-150","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TanKM99","doi":"10.1109/CMPSAC.1999.812692","ee":"https://doi.org/10.1109/CMPSAC.1999.812692","url":"https://dblp.org/rec/conf/compsac/TanKM99"}, "url":"URL#6517005" }, { "@score":"1", "@id":"6517006", "info":{"authors":{"author":[{"@pid":"33/5488","text":"Hee Beng Kuan Tan"},{"@pid":"30/6103","text":"Hua Koon Tan"}]},"title":"Software Reuse through a Novel Representation that Supports Factorization.","venue":"COMPSAC","pages":"344-349","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TanT99","doi":"10.1109/CMPSAC.1999.812737","ee":"https://doi.org/10.1109/CMPSAC.1999.812737","url":"https://dblp.org/rec/conf/compsac/TanT99"}, "url":"URL#6517006" }, { "@score":"1", "@id":"6517007", "info":{"authors":{"author":{"@pid":"48/6443","text":"J. Barrie Thompson"}},"title":"It's Different on the Other Side of the Pond. But Should It Be That Way?","venue":"COMPSAC","pages":"202-203","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Thompson99","doi":"10.1109/CMPSAC.1999.812701","ee":"https://doi.org/10.1109/CMPSAC.1999.812701","url":"https://dblp.org/rec/conf/compsac/Thompson99"}, "url":"URL#6517007" }, { "@score":"1", "@id":"6517008", "info":{"authors":{"author":{"@pid":"48/6443","text":"J. Barrie Thompson"}},"title":"Here, There and Everywhere: The Future of Software Engineering Education.","venue":"COMPSAC","pages":"242","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Thompson99a","doi":"10.1109/CMPSAC.1999.812708","ee":"https://doi.org/10.1109/CMPSAC.1999.812708","url":"https://dblp.org/rec/conf/compsac/Thompson99a"}, "url":"URL#6517008" }, { "@score":"1", "@id":"6517009", "info":{"authors":{"author":[{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"94/1823","text":"Yongzhong Tu"},{"@pid":"09/980","text":"Weiguang Shao"},{"@pid":"21/4011","text":"Ezra Ebner"}]},"title":"Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates.","venue":"COMPSAC","pages":"166-171","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TsaiTSE99","doi":"10.1109/CMPSAC.1999.812695","ee":"https://doi.org/10.1109/CMPSAC.1999.812695","url":"https://dblp.org/rec/conf/compsac/TsaiTSE99"}, "url":"URL#6517009" }, { "@score":"1", "@id":"6517010", "info":{"authors":{"author":{"@pid":"t/THTse","text":"T. H. Tse"}},"title":"One System, Two Ideologies: Integrating the Two Worlds of Software Engineering Education.","venue":"COMPSAC","pages":"246-247","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Tse99","doi":"10.1109/CMPSAC.1999.812711","ee":"https://doi.org/10.1109/CMPSAC.1999.812711","url":"https://dblp.org/rec/conf/compsac/Tse99"}, "url":"URL#6517010" }, { "@score":"1", "@id":"6517011", "info":{"authors":{"author":{"@pid":"27/5522","text":"Jeffrey M. Voas"}},"title":"Can Generic Software Be Assured?","venue":"COMPSAC","pages":"94-95","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Voas99","doi":"10.1109/CMPSAC.1999.812682","ee":"https://doi.org/10.1109/CMPSAC.1999.812682","url":"https://dblp.org/rec/conf/compsac/Voas99"}, "url":"URL#6517011" }, { "@score":"1", "@id":"6517012", "info":{"authors":{"author":[{"@pid":"90/6810","text":"Jiacun Wang"},{"@pid":"34/2628","text":"Chun Jin"},{"@pid":"d/YiDeng","text":"Yi Deng 0001"}]},"title":"Performance Analysis of Traffic Control System Based on Stochastic Timed Petri Net Models.","venue":"COMPSAC","pages":"436-441","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangJD99","doi":"10.1109/CMPSAC.1999.814323","ee":"https://doi.org/10.1109/CMPSAC.1999.814323","url":"https://dblp.org/rec/conf/compsac/WangJD99"}, "url":"URL#6517012" }, { "@score":"1", "@id":"6517013", "info":{"authors":{"author":[{"@pid":"91/5047","text":"Wen-Li Wang"},{"@pid":"15/1401","text":"Mei-Huei Tang"},{"@pid":"86/1936","text":"Mei-Hwa Chen"}]},"title":"Software Architecture Analysis-A Case Study.","venue":"COMPSAC","pages":"265-270","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangTC99","doi":"10.1109/CMPSAC.1999.812714","ee":"https://doi.org/10.1109/CMPSAC.1999.812714","url":"https://dblp.org/rec/conf/compsac/WangTC99"}, "url":"URL#6517013" }, { "@score":"1", "@id":"6517014", "info":{"authors":{"author":[{"@pid":"46/3521","text":"Kent Wreder"},{"@pid":"d/YiDeng","text":"Yi Deng 0001"}]},"title":"Architecture-Centered Enterprise System Development and Integration Based on Distributed Object Technology Standard.","venue":"COMPSAC","pages":"250-258","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WrederD99","doi":"10.1109/CMPSAC.1999.812712","ee":"https://doi.org/10.1109/CMPSAC.1999.812712","url":"https://dblp.org/rec/conf/compsac/WrederD99"}, "url":"URL#6517014" }, { "@score":"1", "@id":"6517015", "info":{"authors":{"author":[{"@pid":"49/1921","text":"Tsuneo Yamaura"},{"@pid":"86/2145","text":"Tohru Kikuno"}]},"title":"A Framework for Top-Down Cost Estimation of Software Development.","venue":"COMPSAC","pages":"322-323","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YamauraK99","doi":"10.1109/CMPSAC.1999.812729","ee":"https://doi.org/10.1109/CMPSAC.1999.812729","url":"https://dblp.org/rec/conf/compsac/YamauraK99"}, "url":"URL#6517015" }, { "@score":"1", "@id":"6517016", "info":{"authors":{"author":[{"@pid":"78/4510","text":"Hongji Yang"},{"@pid":"64/2289","text":"Zhan Cui"},{"@pid":"234/4455","text":"Paul O'Brien 0001"}]},"title":"Extracting Ontologies from Legacy Systems for Understanding and Re-Engineering.","venue":"COMPSAC","pages":"21-26","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YangCO99","doi":"10.1109/CMPSAC.1999.812512","ee":"https://doi.org/10.1109/CMPSAC.1999.812512","url":"https://dblp.org/rec/conf/compsac/YangCO99"}, "url":"URL#6517016" }, { "@score":"1", "@id":"6517017", "info":{"authors":{"author":[{"@pid":"91/728","text":"Ji-Tzay Yang"},{"@pid":"52/2437","text":"Jiun-Long Huang"},{"@pid":"65/6289","text":"Feng-Jian Wang"},{"@pid":"c/WilliamCChu","text":"William C. Chu"}]},"title":"An Object-Oriented Architecture Supporting Web Application Testing.","venue":"COMPSAC","pages":"122-127","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YangHWC99","doi":"10.1109/CMPSAC.1999.812689","ee":"https://doi.org/10.1109/CMPSAC.1999.812689","url":"https://dblp.org/rec/conf/compsac/YangHWC99"}, "url":"URL#6517017" }, { "@score":"1", "@id":"6517018", "info":{"authors":{"author":{"@pid":"51/247","text":"Stephen S. Yau"}},"title":"Supply and Demands of Information Technology Workers.","venue":"COMPSAC","pages":"342-","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Yau99","doi":"10.1109/CMPSAC.1999.812736","ee":"https://doi.org/10.1109/CMPSAC.1999.812736","url":"https://dblp.org/rec/conf/compsac/Yau99"}, "url":"URL#6517018" }, { "@score":"1", "@id":"6517019", "info":{"authors":{"author":[{"@pid":"51/247","text":"Stephen S. Yau"},{"@pid":"58/4582","text":"Xinyu Zhang"}]},"title":"Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation.","venue":"COMPSAC","pages":"86-91","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YauZ99","doi":"10.1109/CMPSAC.1999.812681","ee":"https://doi.org/10.1109/CMPSAC.1999.812681","url":"https://dblp.org/rec/conf/compsac/YauZ99"}, "url":"URL#6517019" }, { "@score":"1", "@id":"6517020", "info":{"authors":{"author":{"@pid":"z/NengFaZhou","text":"Neng-Fa Zhou"}},"title":"Building Java Applets by Using DJ - A Java-based Constraint Language.","venue":"COMPSAC","pages":"442-447","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Zhou99","doi":"10.1109/CMPSAC.1999.814324","ee":"https://doi.org/10.1109/CMPSAC.1999.814324","url":"https://dblp.org/rec/conf/compsac/Zhou99"}, "url":"URL#6517020" }, { "@score":"1", "@id":"6517021", "info":{"authors":{"author":[{"@pid":"61/334","text":"Shikun Zhou"},{"@pid":"78/4510","text":"Hongji Yang"},{"@pid":"33/6442","text":"Paul Luker"},{"@pid":"h/XudongHe","text":"Xudong He"}]},"title":"A Useful Approach to Developing Reverse Engineering Metrics.","venue":"COMPSAC","pages":"320-321","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZhouYLH99","doi":"10.1109/CMPSAC.1999.812728","ee":"https://doi.org/10.1109/CMPSAC.1999.812728","url":"https://dblp.org/rec/conf/compsac/ZhouYLH99"}, "url":"URL#6517021" }, { "@score":"1", "@id":"6550485", "info":{"title":"23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA","venue":"COMPSAC","publisher":"IEEE Computer Society","year":"1999","type":"Editorship","key":"conf/compsac/1999","ee":"https://ieeexplore.ieee.org/xpl/conhome/6591/proceeding","url":"https://dblp.org/rec/conf/compsac/1999"}, "url":"URL#6550485" } ] } } } )