callback( { "result":{ "query":":facetid:toc:\"db/journals/ercim/ercim2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"209.44" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"124", "@dc":"124", "@oc":"124", "@id":"43346131", "text":":facetid:toc:db/journals/ercim/ercim2012.bht" } }, "hits":{ "@total":"124", "@computed":"124", "@sent":"124", "@first":"0", "hit":[{ "@score":"1", "@id":"4507007", "info":{"authors":{"author":[{"@pid":"a/SilviaMaraAbrahao","text":"Silvia Abrahão"},{"@pid":"98/8522","text":"Javier Gonzalez-Huerta"},{"@pid":"i/EmilioInsfran","text":"Emilio Insfrán"},{"@pid":"97/3810","text":"Isidro Ramos"}]},"title":"Software Evolution in Model-Driven Product Line Engineering.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AbrahaoGIR12","ee":"http://ercim-news.ercim.eu/en88/special/software-evolution-in-model-driven-product-line-engineering","url":"https://dblp.org/rec/journals/ercim/AbrahaoGIR12"}, "url":"URL#4507007" }, { "@score":"1", "@id":"4507008", "info":{"authors":{"author":[{"@pid":"09/9384","text":"Aakash Ahmad"},{"@pid":"48/4069","text":"Claus Pahl"}]},"title":"Pat-Evol: Pattern-Driven Reuse in Architecture-Based Evolution for Service Software.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AhmadP12","ee":"http://ercim-news.ercim.eu/en88/special/pat-evol-pattern-driven-reuse-in-architecture-based-evolution-for-service-software","url":"https://dblp.org/rec/journals/ercim/AhmadP12"}, "url":"URL#4507008" }, { "@score":"1", "@id":"4507009", "info":{"authors":{"author":[{"@pid":"00/1107","text":"Nicolas Anciaux"},{"@pid":"69/6924","text":"Benjamin Nguyen"},{"@pid":"v/MVazirgiannis","text":"Michalis Vazirgiannis"}]},"title":"The Minimum Exposure Project: Limiting Data Collection in Online Forms.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AnciauxNV12","ee":"http://ercim-news.ercim.eu/en90/special/the-minimum-exposure-project-limiting-data-collection-in-online-forms","url":"https://dblp.org/rec/journals/ercim/AnciauxNV12"}, "url":"URL#4507009" }, { "@score":"1", "@id":"4507010", "info":{"authors":{"author":[{"@pid":"00/1107","text":"Nicolas Anciaux"},{"@pid":"p/JMPetit","text":"Jean-Marc Petit"},{"@pid":"p/PPucheral","text":"Philippe Pucheral"},{"@pid":"z/KarineZeitouni","text":"Karine Zeitouni"}]},"title":"Personal Data Server: Keeping Sensitive Data under the Individual's Control.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AnciauxPPZ12","ee":"http://ercim-news.ercim.eu/en90/special/personal-data-server-keeping-sensitive-data-under-the-individuals-control","url":"https://dblp.org/rec/journals/ercim/AnciauxPPZ12"}, "url":"URL#4507010" }, { "@score":"1", "@id":"4507011", "info":{"authors":{"author":[{"@pid":"117/1993","text":"Radoniaina Andriatsimandefitra"},{"@pid":"44/1997","text":"Valérie Viet Triem Tong"},{"@pid":"11/6852","text":"Ludovic Mé"}]},"title":"User Data on Androïd Smartphone Must be Protected.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AndriatsimandefitraTM12","ee":"http://ercim-news.ercim.eu/en90/special/user-data-on-android-smartphone-must-be-protected","url":"https://dblp.org/rec/journals/ercim/AndriatsimandefitraTM12"}, "url":"URL#4507011" }, { "@score":"1", "@id":"4507012", "info":{"authors":{"author":[{"@pid":"119/6044","text":"Claudio Angione"},{"@pid":"l/PietroLio","text":"Pietro Liò"},{"@pid":"28/6928","text":"Giuseppe Nicosia"}]},"title":"How to Compute with Metabolism in Bacteria?","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AngioneLN12","ee":"http://ercim-news.ercim.eu/en91/special/how-to-compute-with-metabolism-in-bacteria","url":"https://dblp.org/rec/journals/ercim/AngioneLN12"}, "url":"URL#4507012" }, { "@score":"1", "@id":"4507013", "info":{"authors":{"author":[{"@pid":"a/GabrielAntoniu","text":"Gabriel Antoniu"},{"@pid":"81/2916","text":"Alexandru Costan"},{"@pid":"56/2201","text":"Benoit Da Mota"},{"@pid":"62/2019","text":"Bertrand Thirion"},{"@pid":"56/2735","text":"Radu Tudoran"}]},"title":"A-Brain: Using the Cloud to Understand the Impact of Genetic Variability on the Brain.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AntoniuCMTT12","ee":"http://ercim-news.ercim.eu/en89/special/a-brain-using-the-cloud-to-understand-the-impact-of-genetic-variability-on-the-brain","url":"https://dblp.org/rec/journals/ercim/AntoniuCMTT12"}, "url":"URL#4507013" }, { "@score":"1", "@id":"4507014", "info":{"authors":{"author":[{"@pid":"25/3518","text":"Farhad Arbab"},{"@pid":"91/8340","text":"Sung-Shik Jongmans"}]},"title":"Software Engineering for Multi-core Platforms.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ArbabJ12","ee":"http://ercim-news.ercim.eu/en91/ri/software-engineering-for-multi-core-platforms","url":"https://dblp.org/rec/journals/ercim/ArbabJ12"}, "url":"URL#4507014" }, { "@score":"1", "@id":"4507015", "info":{"authors":{"author":[{"@pid":"36/4623","text":"Francesca Arcelli"},{"@pid":"50/10714","text":"Andrea Caracciolo"},{"@pid":"80/8755","text":"Marco Zanoni"}]},"title":"A Benchmark for Design Pattern Detection Tools: a Community Driven Approach.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ArcelliCZ12","ee":"http://ercim-news.ercim.eu/en88/special/a-benchmark-for-design-pattern-detection-tools-a-community-driven-approach","url":"https://dblp.org/rec/journals/ercim/ArcelliCZ12"}, "url":"URL#4507015" }, { "@score":"1", "@id":"4507016", "info":{"authors":{"author":[{"@pid":"75/8882","text":"Salvatore Aronica"},{"@pid":"23/5803","text":"Massimo Cossentino"},{"@pid":"41/4762","text":"Carmelo Lodato"},{"@pid":"61/7039","text":"Salvatore Lopes"},{"@pid":"91/1627","text":"Umberto Maniscalco"}]},"title":"Computer-aided Maritime Search and Rescue Operations.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/AronicaCLLM12","ee":"http://ercim-news.ercim.eu/en89/ri/computer-aided-maritime-search-and-rescue-operations","url":"https://dblp.org/rec/journals/ercim/AronicaCLLM12"}, "url":"URL#4507016" }, { "@score":"1", "@id":"4507017", "info":{"authors":{"author":{"@pid":"29/5357","text":"Daniel E. Atkins"}},"title":"Data Stewardship in the Age of Big Data.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Atkins12","ee":"http://ercim-news.ercim.eu/en89/special/data-stewardship-in-the-age-of-big-data","url":"https://dblp.org/rec/journals/ercim/Atkins12"}, "url":"URL#4507017" }, { "@score":"1", "@id":"4507018", "info":{"authors":{"author":{"@pid":"50/6797","text":"Jakob Axelsson"}},"title":"Evolutionary Architecting of Software-Intensive Systems.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Axelsson12","ee":"http://ercim-news.ercim.eu/en88/special/evolutionary-architecting-of-software-intensive-systems","url":"https://dblp.org/rec/journals/ercim/Axelsson12"}, "url":"URL#4507018" }, { "@score":"1", "@id":"4507019", "info":{"authors":{"author":[{"@pid":"02/6571","text":"Michael Baentsch"},{"@pid":"66/6057","text":"Paolo Scotton"},{"@pid":"83/2798","text":"Thomas Gschwind"}]},"title":"Secure Enterprise Desktop.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BaentschSG12","ee":"http://ercim-news.ercim.eu/en90/special/secure-enterprise-desktop","url":"https://dblp.org/rec/journals/ercim/BaentschSG12"}, "url":"URL#4507019" }, { "@score":"1", "@id":"4507020", "info":{"authors":{"author":[{"@pid":"b/JCMBaeten","text":"Jos C. M. Baeten"},{"@pid":"l/BasLuttik","text":"Bas Luttik"},{"@pid":"50/147","text":"Paul van Tilburg"}]},"title":"When Turing Meets Milner.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BaetenLT12","ee":"http://ercim-news.ercim.eu/en91/special/when-turing-meets-milner","url":"https://dblp.org/rec/journals/ercim/BaetenLT12"}, "url":"URL#4507020" }, { "@score":"1", "@id":"4507021", "info":{"authors":{"author":[{"@pid":"75/2019","text":"Paolo Barsocchi"},{"@pid":"28/10714","text":"Maria Girardi"}]},"title":"The "SHOWN" Platform - Safeguarding Architectural Heritage Using Wireless Networks.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BarsocchiG12","ee":"http://ercim-news.ercim.eu/en90/ri/the-shown-platform-safeguarding-architectural-heritage-using-wireless-networks","url":"https://dblp.org/rec/journals/ercim/BarsocchiG12"}, "url":"URL#4507021" }, { "@score":"1", "@id":"4507022", "info":{"authors":{"author":[{"@pid":"b/MHterBeek","text":"Maurice H. ter Beek"},{"@pid":"m/HenryMuccini","text":"Henry Muccini"},{"@pid":"p/PatrizioPelliccione","text":"Patrizio Pelliccione"}]},"title":"Guaranteeing Correct Evolution of Software Product Lines.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BeekMP12","ee":"http://ercim-news.ercim.eu/en88/special/guaranteeing-correct-evolution-of-software-product-lines","url":"https://dblp.org/rec/journals/ercim/BeekMP12"}, "url":"URL#4507022" }, { "@score":"1", "@id":"4507023", "info":{"authors":{"author":[{"@pid":"48/2068","text":"Amel Bennaceur"},{"@pid":"i/PaolaInverardi","text":"Paola Inverardi"},{"@pid":"i/ValerieIssarny","text":"Valérie Issarny"},{"@pid":"87/6586","text":"Romina Spalazzese"}]},"title":"Automated Synthesis of CONNECTors to support Software Evolution.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BennaceurIIS12","ee":"http://ercim-news.ercim.eu/en88/special/automated-synthesis-of-connectors-to-support-software-evolution","url":"https://dblp.org/rec/journals/ercim/BennaceurIIS12"}, "url":"URL#4507023" }, { "@score":"1", "@id":"4507024", "info":{"authors":{"author":[{"@pid":"11/3349","text":"Tobias Berka"},{"@pid":"02/3897","text":"Marián Vajtersic"}]},"title":"The Parallel Heartbeat of Statistical Text Analysis.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BerkaV12","ee":"http://ercim-news.ercim.eu/en91/ri/the-parallel-heartbeat-of-statistical-text-analysis","url":"https://dblp.org/rec/journals/ercim/BerkaV12"}, "url":"URL#4507024" }, { "@score":"1", "@id":"4507025", "info":{"authors":{"author":[{"@pid":"03/3919","text":"Antonia Bertolino"},{"@pid":"93/7522","text":"Antonello Calabrò"},{"@pid":"30/2677","text":"Maik Merten"},{"@pid":"s/BernhardSteffen","text":"Bernhard Steffen"}]},"title":"Never-stop Learning: Continuous Validation of Learned Models for Evolving Systems through Monitoring.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BertolinoCMS12","ee":"http://ercim-news.ercim.eu/en88/special/never-stop-learning-continuous-validation-of-learned-models-for-evolving-systems-through-monitoring","url":"https://dblp.org/rec/journals/ercim/BertolinoCMS12"}, "url":"URL#4507025" }, { "@score":"1", "@id":"4507026", "info":{"authors":{"author":[{"@pid":"74/4164","text":"Muhammad Usman Bhatti"},{"@pid":"21/1959","text":"Nicolas Anquetil"},{"@pid":"d/SDucasse","text":"Stéphane Ducasse"}]},"title":"An Environment for Dedicated Software Analysis Tools.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BhattiAD12","ee":"http://ercim-news.ercim.eu/en88/special/an-environment-for-dedicated-software-analysis-tools","url":"https://dblp.org/rec/journals/ercim/BhattiAD12"}, "url":"URL#4507026" }, { "@score":"1", "@id":"4507027", "info":{"authors":{"author":[{"@pid":"09/5071","text":"Alex Biryukov"},{"@pid":"47/8436","text":"Ivan Pustogarov"},{"@pid":"38/2259","text":"Ralf-Philipp Weinmann"}]},"title":"TorScan: Deanonymizing Connections Using Topology Leaks.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BiryukovPW12","ee":"http://ercim-news.ercim.eu/en90/special/torscan-deanonymizing-connections-using-topology-leaks","url":"https://dblp.org/rec/journals/ercim/BiryukovPW12"}, "url":"URL#4507027" }, { "@score":"1", "@id":"4507028", "info":{"authors":{"author":[{"@pid":"37/3159-1","text":"Xavier Blanc 0001"},{"@pid":"39/1255","text":"Jean-Rémy Falleri"}]},"title":"Internet Software Evolution with VPraxis.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BlancF12","ee":"http://ercim-news.ercim.eu/en88/special/internet-software-evolution-with-vpraxis","url":"https://dblp.org/rec/journals/ercim/BlancF12"}, "url":"URL#4507028" }, { "@score":"1", "@id":"4507029", "info":{"authors":{"author":[{"@pid":"47/11237","text":"Giulia Bonelli"},{"@pid":"37/3843","text":"Mario Paolucci"},{"@pid":"53/3352","text":"Rosaria Conte"}]},"title":"Crime and Corruption Observatory: Big Questions behind Big Data.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BonelliPC12","ee":"http://ercim-news.ercim.eu/en89/special/crime-and-corruption-observatory-big-questions-behind-big-data","url":"https://dblp.org/rec/journals/ercim/BonelliPC12"}, "url":"URL#4507029" }, { "@score":"1", "@id":"4507030", "info":{"authors":{"author":[{"@pid":"95/3084","text":"Jeroen van den Bos"},{"@pid":"92/6962","text":"Tijs van der Storm"}]},"title":"Domain-Specific Languages for Better Forensic Software.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BosS12","ee":"http://ercim-news.ercim.eu/en90/special/domain-specific-languages-for-better-forensic-software","url":"https://dblp.org/rec/journals/ercim/BosS12"}, "url":"URL#4507030" }, { "@score":"1", "@id":"4507031", "info":{"authors":{"author":[{"@pid":"36/4388","text":"Eric Bouwers"},{"@pid":"d/ArievanDeursen","text":"Arie van Deursen"}]},"title":"Continuous Architecture Evaluation.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BouwersD12","ee":"http://ercim-news.ercim.eu/en88/special/continuous-architecture-evaluation","url":"https://dblp.org/rec/journals/ercim/BouwersD12"}, "url":"URL#4507031" }, { "@score":"1", "@id":"4507032", "info":{"authors":{"author":{"@pid":"65/5718","text":"Per Brand"}},"title":"Computational Storage in Vision Cloud.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Brand12","ee":"http://ercim-news.ercim.eu/en89/special/computational-storage-in-vision-cloud","url":"https://dblp.org/rec/journals/ercim/Brand12"}, "url":"URL#4507032" }, { "@score":"1", "@id":"4507033", "info":{"authors":{"author":[{"@pid":"v/MarkvandenBrand","text":"Mark G. J. van den Brand"},{"@pid":"g/JanFrisoGroote","text":"Jan Friso Groote"}]},"title":"Advances in Model Driven Software Engineering.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BrandG12","ee":"http://ercim-news.ercim.eu/en91/ri/advances-in-model-driven-software-engineering","url":"https://dblp.org/rec/journals/ercim/BrandG12"}, "url":"URL#4507033" }, { "@score":"1", "@id":"4507034", "info":{"authors":{"author":[{"@pid":"50/1751","text":"Hugo Bruneliere"},{"@pid":"18/948","text":"Jordi Cabot"},{"@pid":"13/9729","text":"Grégoire Dupé"}]},"title":"How to Deal with your IT Legacy: What is Coming up in MoDisco?.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BruneliereCD12","ee":"http://ercim-news.ercim.eu/en88/special/how-to-deal-with-your-it-legacy-what-is-coming-up-in-modisco","url":"https://dblp.org/rec/journals/ercim/BruneliereCD12"}, "url":"URL#4507034" }, { "@score":"1", "@id":"4507035", "info":{"authors":{"author":[{"@pid":"10/3261","text":"Martin Burkhart"},{"@pid":"88/3080","text":"Xenofontas A. Dimitropoulos"}]},"title":"How to Protect Data Privacy in Collaborative Network Security.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/BurkhartD12","ee":"http://ercim-news.ercim.eu/en90/special/how-to-protect-data-privacy-in-collaborative-network-security","url":"https://dblp.org/rec/journals/ercim/BurkhartD12"}, "url":"URL#4507035" }, { "@score":"1", "@id":"4507036", "info":{"authors":{"author":{"@pid":"35/3587","text":"Juan Caballero"}},"title":"Understanding the Role of Malware in Cybercrime.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Caballero12","ee":"http://ercim-news.ercim.eu/en90/special/understanding-the-role-of-malware-in-cybercrime","url":"https://dblp.org/rec/journals/ercim/Caballero12"}, "url":"URL#4507036" }, { "@score":"1", "@id":"4507037", "info":{"authors":{"author":[{"@pid":"25/5513","text":"Leonardo Candela"},{"@pid":"23/3970","text":"Donatella Castelli"},{"@pid":"99/834","text":"Pasquale Pagano"}]},"title":"Managing Big Data through Hybrid Data Infrastructures.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/CandelaCP12","ee":"http://ercim-news.ercim.eu/en89/special/managing-big-data-through-hybrid-data-infrastructures","url":"https://dblp.org/rec/journals/ercim/CandelaCP12"}, "url":"URL#4507037" }, { "@score":"1", "@id":"4507038", "info":{"authors":{"author":[{"@pid":"83/5436","text":"Javier Cano"},{"@pid":"49/1022","text":"Christophe Joubert"},{"@pid":"39/10714","text":"Miguel Llácer"},{"@pid":"36/10714","text":"Miguel Montesinos"}]},"title":"Open-Source Formative Evaluation Process in Remote Software Maintenance.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/CanoJLM12","ee":"http://ercim-news.ercim.eu/en88/special/open-source-formative-evaluation-process-in-remote-software-maintenance","url":"https://dblp.org/rec/journals/ercim/CanoJLM12"}, "url":"URL#4507038" }, { "@score":"1", "@id":"4507039", "info":{"authors":{"author":[{"@pid":"91/8450","text":"Oleg Chertov"},{"@pid":"48/8450","text":"Dan Tavrov"}]},"title":"Providing Online Group Anonymity.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ChertovT12","ee":"http://ercim-news.ercim.eu/en90/special/providing-online-group-anonymity","url":"https://dblp.org/rec/journals/ercim/ChertovT12"}, "url":"URL#4507039" }, { "@score":"1", "@id":"4507040", "info":{"authors":{"author":[{"@pid":"21/6586","text":"Catherine E. Chronaki"},{"@pid":"45/11136","text":"Vasilis Kontogiannis"},{"@pid":"67/10714","text":"Panayiotis Argyropaidas"},{"@pid":"01/10714","text":"Dimitris Vourvahakis"}]},"title":"Innovation in Disaster Management: Report from Exercise EU POSEIDON 2011.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ChronakiKAV12","ee":"http://ercim-news.ercim.eu/en88/ri/innovation-in-disaster-management-report-from-exercise-eu-poseidon-2011","url":"https://dblp.org/rec/journals/ercim/ChronakiKAV12"}, "url":"URL#4507040" }, { "@score":"1", "@id":"4507041", "info":{"authors":{"author":[{"@pid":"00/3375","text":"Carlos E. Cuesta"},{"@pid":"93/6305","text":"María del Pilar Romay"},{"@pid":"52/5696","text":"Elena Navarro 0001"}]},"title":"Architectural Evolution with Adaptive Services: the Meta-Service Approach.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/CuestaRN12","ee":"http://ercim-news.ercim.eu/en88/special/architectural-evolution-with-adaptive-services-the-meta-service-approach","url":"https://dblp.org/rec/journals/ercim/CuestaRN12"}, "url":"URL#4507041" }, { "@score":"1", "@id":"4507042", "info":{"authors":{"author":[{"@pid":"01/11238","text":"Mario D'Acunto"},{"@pid":"36/1979","text":"Antonio Benassi"},{"@pid":"s/OvidioSalvetti","text":"Ovidio Salvetti"}]},"title":"NanoICT: A New Challenge for ICT.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/DAcuntoBS12","ee":"http://ercim-news.ercim.eu/en89/ri/nanoict-a-new-challenge-for-ict","url":"https://dblp.org/rec/journals/ercim/DAcuntoBS12"}, "url":"URL#4507042" }, { "@score":"1", "@id":"4507043", "info":{"authors":{"author":[{"@pid":"d/SDemeyer","text":"Serge Demeyer"},{"@pid":"33/8127","text":"Ahmed Lamkanfi"},{"@pid":"92/9383","text":"Quinten David Soetens"}]},"title":""in vivo" Research in Software Evolution.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/DemeyerLS12","ee":"http://ercim-news.ercim.eu/en88/special/qin-vivoq-research-in-software-evolution","url":"https://dblp.org/rec/journals/ercim/DemeyerLS12"}, "url":"URL#4507043" }, { "@score":"1", "@id":"4507044", "info":{"authors":{"author":[{"@pid":"50/4956","text":"Gilles Dowek"},{"@pid":"a/SamsonAbramsky","text":"Samson Abramsky"}]},"title":"What Makes Alan Turing a Great Scientist? - Introduction to the Special Theme.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/DowekA12","ee":"http://ercim-news.ercim.eu/en91/special/what-makes-alan-turing-a-great-scientist-introduction-to-the-special-theme","url":"https://dblp.org/rec/journals/ercim/DowekA12"}, "url":"URL#4507044" }, { "@score":"1", "@id":"4507045", "info":{"authors":{"author":[{"@pid":"45/10714","text":"Nadia Elouali"},{"@pid":"37/10714","text":"Daniel Liabeuf"},{"@pid":"50/6119","text":"Xavier Le Pallec"},{"@pid":"63/2164","text":"José Rouillard"},{"@pid":"22/5602","text":"Jean-Claude Tarby"}]},"title":"Model-driven Evolution for Multimodal Mobile Geographic Information Systems.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/EloualiLPRT12","ee":"http://ercim-news.ercim.eu/en88/special/model-driven-evolution-for-multimodal-mobile-geographic-information-systems","url":"https://dblp.org/rec/journals/ercim/EloualiLPRT12"}, "url":"URL#4507045" }, { "@score":"1", "@id":"4507046", "info":{"authors":{"author":[{"@pid":"73/3172","text":"Sebastian Engell"},{"@pid":"47/7036","text":"Françoise Lamnabhi-Lagarrigue"}]},"title":"Recommending Systems and Control as a Priority for the European Commission's Work Programme.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/EngellL12","ee":"http://ercim-news.ercim.eu/en89/ri/recommending-systems-and-control-as-a-priority-for-the-european-commissions-work-programme","url":"https://dblp.org/rec/journals/ercim/EngellL12"}, "url":"URL#4507046" }, { "@score":"1", "@id":"4507047", "info":{"authors":{"author":[{"@pid":"08/10714","text":"Pamela Farries"},{"@pid":"33/3526","text":"Ajitha Rajan"}]},"title":"PINCETTE - Validating Changes and Upgrades in Networked Software.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/FarriesR12","ee":"http://ercim-news.ercim.eu/en88/special/pincette--validating-changes-and-upgrades-in-networked-software","url":"https://dblp.org/rec/journals/ercim/FarriesR12"}, "url":"URL#4507047" }, { "@score":"1", "@id":"4507048", "info":{"authors":{"author":[{"@pid":"f/AnjaFeldmann","text":"Anja Feldmann"},{"@pid":"49/2275","text":"Gregor Schaffrath"},{"@pid":"58/3289-1","text":"Stefan Schmid 0001"}]},"title":"CloudNets: Combining Clouds with Networking.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/FeldmannSS12","ee":"http://ercim-news.ercim.eu/en88/ri/cloudnets-combining-clouds-with-networking","url":"https://dblp.org/rec/journals/ercim/FeldmannSS12"}, "url":"URL#4507048" }, { "@score":"1", "@id":"4507049", "info":{"authors":{"author":[{"@pid":"47/4207","text":"Javier D. Fernández"},{"@pid":"84/3901","text":"Miguel A. Martínez-Prieto"},{"@pid":"80/3087","text":"Mario Arias"}]},"title":"Scalable Management of Compressed Semantic Big Data.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/FernandezMA12","ee":"http://ercim-news.ercim.eu/en89/special/scalable-management-of-compressed-semantic-big-data","url":"https://dblp.org/rec/journals/ercim/FernandezMA12"}, "url":"URL#4507049" }, { "@score":"1", "@id":"4507050", "info":{"authors":{"author":{"@pid":"87/3408","text":"Diogo R. Ferreira"}},"title":"Performance Analysis of Healthcare Processes through Process Mining.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Ferreira12","ee":"http://ercim-news.ercim.eu/en89/special/performance-analysis-of-healthcare-processes-through-process-mining","url":"https://dblp.org/rec/journals/ercim/Ferreira12"}, "url":"URL#4507050" }, { "@score":"1", "@id":"4507051", "info":{"authors":{"author":[{"@pid":"36/4623","text":"Francesca Arcelli Fontana"},{"@pid":"80/8755","text":"Marco Zanoni"},{"@pid":"94/5258","text":"Bartosz Walter"},{"@pid":"05/10621","text":"Pawel Martenka"}]},"title":"Code Smells, Micro Patterns and their Relations.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/FontanaZWM12","ee":"http://ercim-news.ercim.eu/en88/special/code-smells-micro-patterns-and-their-relations","url":"https://dblp.org/rec/journals/ercim/FontanaZWM12"}, "url":"URL#4507051" }, { "@score":"1", "@id":"4507052", "info":{"authors":{"author":[{"@pid":"98/885","text":"Anna Gambin"},{"@pid":"24/9470","text":"Anna K. Marciniak-Czochra"},{"@pid":"n/DamianNiwinski","text":"Damian Niwinski"}]},"title":"Alan Turing and Systems Biology.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/GambinMN12","ee":"http://ercim-news.ercim.eu/en91/special/alan-turing-and-systems-biology","url":"https://dblp.org/rec/journals/ercim/GambinMN12"}, "url":"URL#4507052" }, { "@score":"1", "@id":"4507053", "info":{"authors":{"author":[{"@pid":"117/1991","text":"Jan Gassen"},{"@pid":"61/2236","text":"Elmar Gerhards-Padilla"}]},"title":"A Scalable Approach for a Distributed Network of Attack Sensors.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/GassenG12","ee":"http://ercim-news.ercim.eu/en90/special/a-scalable-approach-for-a-distributed-network-of-attack-sensors","url":"https://dblp.org/rec/journals/ercim/GassenG12"}, "url":"URL#4507053" }, { "@score":"1", "@id":"4507054", "info":{"authors":{"author":{"@pid":"43/4758","text":"Solange Ghernaouti-Helie"}},"title":"The Cybercrime Ecosystem & Privacy Issues - Main Challenges and Perspectives from a Societal Perspective.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Ghernaouti-Helie12","ee":"http://ercim-news.ercim.eu/en90/special/main-challenges-and-perspectives-from-a-societal-perspective","url":"https://dblp.org/rec/journals/ercim/Ghernaouti-Helie12"}, "url":"URL#4507054" }, { "@score":"1", "@id":"4507055", "info":{"authors":{"author":[{"@pid":"43/4758","text":"Solange Ghernaouti-Helie"},{"@pid":"03/4193","text":"Jens Tölle"},{"@pid":"q/JJQuisquater","text":"Jean-Jacques Quisquater"}]},"title":"Cybercrime and Privacy Issues - Introduction to the Special Theme.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Ghernaouti-HelieTQ12","ee":"http://ercim-news.ercim.eu/en90/special/cybercrime-and-privacy-issues-introduction-to-the-special-theme","url":"https://dblp.org/rec/journals/ercim/Ghernaouti-HelieTQ12"}, "url":"URL#4507055" }, { "@score":"1", "@id":"4507056", "info":{"authors":{"author":[{"@pid":"42/1409","text":"Paul Grace"},{"@pid":"b/GordonSBlair","text":"Gordon S. Blair"},{"@pid":"i/ValerieIssarny","text":"Valérie Issarny"}]},"title":"Emergent Middleware.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/GraceBI12","ee":"http://ercim-news.ercim.eu/en88/special/emergent-middleware","url":"https://dblp.org/rec/journals/ercim/GraceBI12"}, "url":"URL#4507056" }, { "@score":"1", "@id":"4507057", "info":{"authors":{"author":{"@pid":"28/2414","text":"Benjamin Grégoire"}},"title":"Recent Advances in the Formal Verification of Cryptographic Systems: Turing's Legacy","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Gregoire12","ee":"http://ercim-news.ercim.eu/en91/special/recent-advances-in-the-formal-verification-of-cryptographic-systems-turings-legacy","url":"https://dblp.org/rec/journals/ercim/Gregoire12"}, "url":"URL#4507057" }, { "@score":"1", "@id":"4507058", "info":{"authors":{"author":[{"@pid":"13/8330","text":"Vincenzo Gulisano"},{"@pid":"40/4806","text":"Ricardo Jiménez-Peris"},{"@pid":"97/3041","text":"Marta Patiño-Martínez"},{"@pid":"57/1338","text":"Claudio Soriente"},{"@pid":"v/PatrickValduriez","text":"Patrick Valduriez"}]},"title":"A Big Data Platform for Large Scale Event Processing.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/GulisanoJPSV12","ee":"http://ercim-news.ercim.eu/en89/special/a-big-data-platform-for-large-scale-event-processing","url":"https://dblp.org/rec/journals/ercim/GulisanoJPSV12"}, "url":"URL#4507058" }, { "@score":"1", "@id":"4507059", "info":{"authors":{"author":[{"@pid":"57/5769","text":"Michal Haindl"},{"@pid":"33/4643","text":"Jirí Filip"},{"@pid":"117/1996","text":"Radomír Vávra"}]},"title":"Digital Material Appearance: The Curse of Tera-Bytes.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/HaindlFV12","ee":"http://ercim-news.ercim.eu/en90/ri/digital-material-appearance-the-curse-of-tera-bytes","url":"https://dblp.org/rec/journals/ercim/HaindlFV12"}, "url":"URL#4507059" }, { "@score":"1", "@id":"4507060", "info":{"authors":{"author":[{"@pid":"73/790","text":"Philip D. Healy"},{"@pid":"56/3725","text":"John P. Morrison"},{"@pid":"03/2506","text":"Ray Walshe"}]},"title":"ElasticSSI: Self-optimizing Metacomputing through Process Migration and Elastic Scaling.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/HealyMW12","ee":"http://ercim-news.ercim.eu/en90/ri/elasticssi-self-optimizing-metacomputing-through-process-migration-and-elastic-scaling","url":"https://dblp.org/rec/journals/ercim/HealyMW12"}, "url":"URL#4507060" }, { "@score":"1", "@id":"4507061", "info":{"authors":{"author":{"@pid":"119/7115","text":"Kersti Hedman"}},"title":"Math Strengthens the Swedish Olympic Cross-country Team.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Hedman12","ee":"http://ercim-news.ercim.eu/en91/ri/0-math-strengthens-the-swedish-olympic-cross-country-team","url":"https://dblp.org/rec/journals/ercim/Hedman12"}, "url":"URL#4507061" }, { "@score":"1", "@id":"4507062", "info":{"authors":{"author":[{"@pid":"19/3140","text":"Djoerd Hiemstra"},{"@pid":"73/906","text":"Claudia Hauff"}]},"title":"Brute Force Information Retrieval Experiments using MapReduce.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/HiemstraH12","ee":"http://ercim-news.ercim.eu/en89/special/brute-force-information-retrieval-experiments-using-mapreduce","url":"https://dblp.org/rec/journals/ercim/HiemstraH12"}, "url":"URL#4507062" }, { "@score":"1", "@id":"4507063", "info":{"authors":{"author":[{"@pid":"85/3777-1","text":"Mark Hills 0001"},{"@pid":"k/PaulKlint","text":"Paul Klint"},{"@pid":"92/6962","text":"Tijs van der Storm"},{"@pid":"55/5625","text":"Jurgen J. Vinju"}]},"title":"A One-Stop-Shop for Software Evolution Tool Construction.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/HillsKSV12","ee":"http://ercim-news.ercim.eu/en88/special/a-one-stop-shop-for-software-evolution-tool-construction","url":"https://dblp.org/rec/journals/ercim/HillsKSV12"}, "url":"URL#4507063" }, { "@score":"1", "@id":"4507064", "info":{"authors":{"author":{"@pid":"84/4673","text":"Markus Huber"}},"title":"Social Snapshot Framework: Crime Investigation on Online Social Networks.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Huber12","ee":"http://ercim-news.ercim.eu/en90/special/social-snapshot-framework-crime-investigation-on-online-social-networks","url":"https://dblp.org/rec/journals/ercim/Huber12"}, "url":"URL#4507064" }, { "@score":"1", "@id":"4507065", "info":{"authors":{"author":[{"@pid":"117/1995","text":"Christopher Humphries"},{"@pid":"37/2288","text":"Nicolas Prigent"},{"@pid":"b/CBidan","text":"Christophe Bidan"}]},"title":"Visualization for Monitoring Network Security Events.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/HumphriesPB12","ee":"http://ercim-news.ercim.eu/en90/special/visualization-for-monitoring-network-security-events","url":"https://dblp.org/rec/journals/ercim/HumphriesPB12"}, "url":"URL#4507065" }, { "@score":"1", "@id":"4507066", "info":{"authors":{"author":[{"@pid":"00/4484","text":"Urs Hunkeler"},{"@pid":"06/6949","text":"Clemens Lombriser"},{"@pid":"48/6098-2","text":"Hong Linh Truong 0002"}]},"title":"A Wireless Sensor Network that is Manageable and Really Scales.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/HunkelerLT12","ee":"http://ercim-news.ercim.eu/en88/ri/a-wireless-sensor-network-that-is-manageable-and-really-scales","url":"https://dblp.org/rec/journals/ercim/HunkelerLT12"}, "url":"URL#4507066" }, { "@score":"1", "@id":"4507067", "info":{"authors":{"author":{"@pid":"i/StratosIdreos","text":"Stratos Idreos"}},"title":"Cracking Big Data.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Idreos12","ee":"http://ercim-news.ercim.eu/en89/special/cracking-big-data","url":"https://dblp.org/rec/journals/ercim/Idreos12"}, "url":"URL#4507067" }, { "@score":"1", "@id":"4507068", "info":{"authors":{"author":[{"@pid":"99/5545","text":"Kris Jack"},{"@pid":"117/1990","text":"Maurizio Sambati"},{"@pid":"s/FabrizioSilvestri","text":"Fabrizio Silvestri"},{"@pid":"117/1999","text":"Salvatore Trani"},{"@pid":"44/5068","text":"Rossano Venturini"}]},"title":"Cite-as-you-write.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/JackSSTV12","ee":"http://ercim-news.ercim.eu/en90/ri/cite-as-you-write","url":"https://dblp.org/rec/journals/ercim/JackSSTV12"}, "url":"URL#4507068" }, { "@score":"1", "@id":"4507069", "info":{"authors":{"author":[{"@pid":"40/4806","text":"Ricardo Jiménez-Peris"},{"@pid":"97/3041","text":"Marta Patiño-Martínez"},{"@pid":"99/3621","text":"Kostas Magoutis"},{"@pid":"96/4578","text":"Angelos Bilas"},{"@pid":"11/11238","text":"Ivan Brondino"}]},"title":"CumuloNimbo: A Highly-Scalable Transaction Processing Platform as a Service.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Jimenez-PerisPMBB12","ee":"http://ercim-news.ercim.eu/en89/special/cumulonimbo-a-highly-scalable-transaction-processing-platform-as-a-service","url":"https://dblp.org/rec/journals/ercim/Jimenez-PerisPMBB12"}, "url":"URL#4507069" }, { "@score":"1", "@id":"4507070", "info":{"authors":{"author":{"@pid":"27/2076","text":"Koray Kayabol"}},"title":"Region-based Unsupervised Classification of SAR Images.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Kayabol12","ee":"http://ercim-news.ercim.eu/en89/ri/region-based-unsupervised-classification-of-sar-images","url":"https://dblp.org/rec/journals/ercim/Kayabol12"}, "url":"URL#4507070" }, { "@score":"1", "@id":"4507071", "info":{"authors":{"author":[{"@pid":"54/520","text":"Zsolt Kemény"},{"@pid":"57/4671","text":"Elisabeth Ilie Zudor"}]},"title":"Tackling IT Challenges in Multi-Participant Hub-and-Spoke Logistics Networks.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KemenyZ12","ee":"http://ercim-news.ercim.eu/en90/ri/tackling-it-challenges-in-multi-participant-hub-and-spoke-logistics-networks","url":"https://dblp.org/rec/journals/ercim/KemenyZ12"}, "url":"URL#4507071" }, { "@score":"1", "@id":"4507072", "info":{"authors":{"author":[{"@pid":"117/1998","text":"Jane Kernan"},{"@pid":"70/1613","text":"Heather J. Ruskin"}]},"title":"Microarrays - Innovative Standards in a Changing World: the Case for Cloud.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KernanR12","ee":"http://ercim-news.ercim.eu/en90/ri/microarrays","url":"https://dblp.org/rec/journals/ercim/KernanR12"}, "url":"URL#4507072" }, { "@score":"1", "@id":"4507073", "info":{"authors":{"author":[{"@pid":"k/MartinLKersten","text":"Martin L. Kersten"},{"@pid":"m/StefanManegold","text":"Stefan Manegold"}]},"title":"Revolutionary Database Technology for Data Intensive Research.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KerstenM12","ee":"http://ercim-news.ercim.eu/en89/special/revolutionary-database-technology-for-data-intensive-research","url":"https://dblp.org/rec/journals/ercim/KerstenM12"}, "url":"URL#4507073" }, { "@score":"1", "@id":"4507074", "info":{"authors":{"author":[{"@pid":"k/AttilaKertesz","text":"Attila Kertész"},{"@pid":"117/1994","text":"Szilvia Varadi"}]},"title":"Legal Issues Associated with Data Management in European Clouds.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KerteszV12","ee":"http://ercim-news.ercim.eu/en90/special/legal-issues-associated-with-data-management-in-european-clouds","url":"https://dblp.org/rec/journals/ercim/KerteszV12"}, "url":"URL#4507074" }, { "@score":"1", "@id":"4507075", "info":{"authors":{"author":[{"@pid":"27/505","text":"Stephan Kiefer"},{"@pid":"181/2756","text":"Michael Wilson"}]},"title":"Ensuring Profitability of Commercial Long Term Digital Preservation.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KieferW12","ee":"http://ercim-news.ercim.eu/en91/ri/ensuring-profitability-of-commercial-long-term-digital-preservation","url":"https://dblp.org/rec/journals/ercim/KieferW12"}, "url":"URL#4507075" }, { "@score":"1", "@id":"4507076", "info":{"authors":{"author":[{"@pid":"19/5747","text":"Ross King"},{"@pid":"50/6445-3","text":"Rainer Schmidt 0003"},{"@pid":"22/479-1","text":"Christoph Becker 0001"},{"@pid":"21/10910","text":"Sven Schlarb"}]},"title":"SCAPE: Big Data Meets Digital Preservation.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KingSBS12","ee":"http://ercim-news.ercim.eu/en89/special/scape-big-data-meets-digital-preservation","url":"https://dblp.org/rec/journals/ercim/KingSBS12"}, "url":"URL#4507076" }, { "@score":"1", "@id":"4507077", "info":{"authors":{"author":[{"@pid":"k/YiannisKompatsiaris","text":"Yiannis Kompatsiaris"},{"@pid":"40/3806","text":"Spiros Nikolopoulos"},{"@pid":"17/352","text":"Thomas Lidy"},{"@pid":"r/AndreasRauber","text":"Andreas Rauber"}]},"title":"Media Search Cluster White Paper on "Search Computing".","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KompatsiarisNLR12","ee":"http://ercim-news.ercim.eu/en88/ri/media-search-cluster-white-paper-on-qsearch-computingq","url":"https://dblp.org/rec/journals/ercim/KompatsiarisNLR12"}, "url":"URL#4507077" }, { "@score":"1", "@id":"4507078", "info":{"authors":{"author":[{"@pid":"26/2790","text":"Christos Koulamas"},{"@pid":"119/7080","text":"Petros Pistofidis"},{"@pid":"07/7354","text":"Christos Emmanouilidis"}]},"title":"Engineering Asset Lifecycle Optimal Management: WelCOM Approach to E-Maintenance.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KoulamasPE12","ee":"http://ercim-news.ercim.eu/en91/ri/engineering-asset-lifecycle-optimal-management-welcom-approach-to-e-maintenance","url":"https://dblp.org/rec/journals/ercim/KoulamasPE12"}, "url":"URL#4507078" }, { "@score":"1", "@id":"4507079", "info":{"authors":{"author":{"@pid":"74/6897","text":"György Kovács"}},"title":"LUDUS: Serious Gaming Initiatives in South East Europe.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Kovacs12","ee":"http://ercim-news.ercim.eu/en91/ri/ludus-serious-gaming-initiatives-in-south-east-europe","url":"https://dblp.org/rec/journals/ercim/Kovacs12"}, "url":"URL#4507079" }, { "@score":"1", "@id":"4507080", "info":{"authors":{"author":[{"@pid":"74/6897","text":"György Kovács"},{"@pid":"79/11459","text":"Imre Paniti"}]},"title":"A New Robotic Laboratory at SZTAKI.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KovacsP12","ee":"http://ercim-news.ercim.eu/en91/ri/a-new-robotic-laboratory-at-sztaki","url":"https://dblp.org/rec/journals/ercim/KovacsP12"}, "url":"URL#4507080" }, { "@score":"1", "@id":"4507081", "info":{"authors":{"author":[{"@pid":"63/1615","text":"Marek Kumpost"},{"@pid":"97/3759","text":"Vashek Matyás"}]},"title":"The Real Value of Private Information - Two Experimental Studies.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/KumpostM12","ee":"http://ercim-news.ercim.eu/en90/special/the-real-value-of-private-information-two-experimental-studies","url":"https://dblp.org/rec/journals/ercim/KumpostM12"}, "url":"URL#4507081" }, { "@score":"1", "@id":"4507082", "info":{"authors":{"author":{"@pid":"53/6708","text":"Michele Lanza"}},"title":"Holistic Software Evolution.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Lanza12","ee":"http://ercim-news.ercim.eu/en88/special/holistic-software-evolution","url":"https://dblp.org/rec/journals/ercim/Lanza12"}, "url":"URL#4507082" }, { "@score":"1", "@id":"4507083", "info":{"authors":{"author":[{"@pid":"18/1675","text":"Arnaud Legout"},{"@pid":"66/5037","text":"Walid Dabbous"}]},"title":"Linking a Social Identity to an IP Address.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/LegoutD12","ee":"http://ercim-news.ercim.eu/en90/special/linking-a-social-identity-to-an-ip-address","url":"https://dblp.org/rec/journals/ercim/LegoutD12"}, "url":"URL#4507083" }, { "@score":"1", "@id":"4507084", "info":{"authors":{"author":{"@pid":"117/1989","text":"Michael Levi"}},"title":"Measuring the Cost of Cybercrimes.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Levi12","ee":"http://ercim-news.ercim.eu/en90/special/measuring-the-cost-of-cybercrimes","url":"https://dblp.org/rec/journals/ercim/Levi12"}, "url":"URL#4507084" }, { "@score":"1", "@id":"4507085", "info":{"authors":{"author":{"@pid":"97/4445-1","text":"Bruno Lévy 0001"}},"title":"GoodShape: Towards Flexible Mesh Generation.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Levy12","ee":"http://ercim-news.ercim.eu/en91/ri/goodshape-towards-flexible-mesh-generation","url":"https://dblp.org/rec/journals/ercim/Levy12"}, "url":"URL#4507085" }, { "@score":"1", "@id":"4507086", "info":{"authors":{"author":[{"@pid":"81/188","text":"Mircea Lungu"},{"@pid":"n/ONierstrasz","text":"Oscar Nierstrasz"}]},"title":"Recovering Software Architecture with Softwarenaut.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/LunguN12","ee":"http://ercim-news.ercim.eu/en88/special/recovering-software-architecture-with-softwarenaut","url":"https://dblp.org/rec/journals/ercim/LunguN12"}, "url":"URL#4507086" }, { "@score":"1", "@id":"4507087", "info":{"authors":{"author":[{"@pid":"81/188","text":"Mircea Lungu"},{"@pid":"n/ONierstrasz","text":"Oscar Nierstrasz"},{"@pid":"10/9840","text":"Niko Schwarz"}]},"title":"Big Software Data Analysis.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/LunguNS12","ee":"http://ercim-news.ercim.eu/en89/special/big-software-data-analysis","url":"https://dblp.org/rec/journals/ercim/LunguNS12"}, "url":"URL#4507087" }, { "@score":"1", "@id":"4507088", "info":{"authors":{"author":{"@pid":"m/JeanYvesMarion","text":"Jean-Yves Marion"}},"title":"Viruses in Turing's Garden.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Marion12","ee":"http://ercim-news.ercim.eu/en91/special/viruses-in-turings-garden","url":"https://dblp.org/rec/journals/ercim/Marion12"}, "url":"URL#4507088" }, { "@score":"1", "@id":"4507089", "info":{"authors":{"author":[{"@pid":"m/EvangelosPMarkatos","text":"Evangelos P. Markatos"},{"@pid":"91/800","text":"Herbert Bos"}]},"title":"SysSec: Managing Threats and Vulnerabilities in the Future Internet.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/MarkatosB12","ee":"http://ercim-news.ercim.eu/en90/special/syssec-managing-threats-and-vulnerabilities-in-the-future-internet","url":"https://dblp.org/rec/journals/ercim/MarkatosB12"}, "url":"URL#4507089" }, { "@score":"1", "@id":"4507090", "info":{"authors":{"author":[{"@pid":"34/9378","text":"Fabrizio Marozzo"},{"@pid":"44/5373","text":"Domenico Talia"},{"@pid":"t/PaoloTrunfio","text":"Paolo Trunfio"}]},"title":"Large-Scale Data Analysis on Cloud Systems.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/MarozzoTT12","ee":"http://ercim-news.ercim.eu/en89/special/large-scale-data-analysis-on-cloud-systems","url":"https://dblp.org/rec/journals/ercim/MarozzoTT12"}, "url":"URL#4507090" }, { "@score":"1", "@id":"4507091", "info":{"authors":{"author":[{"@pid":"117/1997","text":"Srdjan Matic"},{"@pid":"87/8262","text":"Aristide Fattori"},{"@pid":"14/3451","text":"Danilo Bruschi"},{"@pid":"95/5162","text":"Lorenzo Cavallaro"}]},"title":"Peering into the Muddy Waters of Pastebin.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/MaticFBC12","ee":"http://ercim-news.ercim.eu/en90/special/peering-into-the-muddy-waters-of-pastebin","url":"https://dblp.org/rec/journals/ercim/MaticFBC12"}, "url":"URL#4507091" }, { "@score":"1", "@id":"4507092", "info":{"authors":{"author":[{"@pid":"m/TomMens","text":"Tom Mens"},{"@pid":"k/JacquesKlein","text":"Jacques Klein"}]},"title":"Evolving Software - Introduction to the Special Theme.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/MensK12","ee":"http://ercim-news.ercim.eu/en88/special/evolving-software-introduction-to-the-special-theme","url":"https://dblp.org/rec/journals/ercim/MensK12"}, "url":"URL#4507092" }, { "@score":"1", "@id":"4507093", "info":{"authors":{"author":[{"@pid":"06/10714","text":"Alexandre Métrailler"},{"@pid":"76/3603","text":"Thibault Estier"}]},"title":"EVOLIS: A Framework for Evaluating Evolution of Information Systems.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/MetraillerE12","ee":"http://ercim-news.ercim.eu/en88/special/evolis-a-framework-for-evaluating-evolution-of-information-systems","url":"https://dblp.org/rec/journals/ercim/MetraillerE12"}, "url":"URL#4507093" }, { "@score":"1", "@id":"4507094", "info":{"authors":{"author":{"@pid":"60/5205","text":"Luca Mottola"}},"title":"Wireless Sensor Networks and the Tower that Breathes.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Mottola12","ee":"http://ercim-news.ercim.eu/en88/ri/wireless-sensor-networks-and-the-tower-that-breathes","url":"https://dblp.org/rec/journals/ercim/Mottola12"}, "url":"URL#4507094" }, { "@score":"1", "@id":"4507095", "info":{"authors":{"author":{"@pid":"19/583","text":"Martin Nilsson 0001"}},"title":"The Computer and the Brain, Synergies and Robots.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Nilsson12","ee":"http://ercim-news.ercim.eu/en91/ri/the-computer-and-the-brain-synergies-and-robots","url":"https://dblp.org/rec/journals/ercim/Nilsson12"}, "url":"URL#4507095" }, { "@score":"1", "@id":"4507096", "info":{"authors":{"author":[{"@pid":"17/6512","text":"Carlos Noguera"},{"@pid":"40/24","text":"Andy Kellens"},{"@pid":"d/TheoDHondt","text":"Theo D'Hondt"}]},"title":"Fostering Collaboration in the Modelling, Verification and Evolution Research Communities in Belgium.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/NogueraKD12","ee":"http://ercim-news.ercim.eu/en88/special/fostering-collaboration-in-the-modelling-verification-and-evolution-research-communities-in-belgium","url":"https://dblp.org/rec/journals/ercim/NogueraKD12"}, "url":"URL#4507096" }, { "@score":"1", "@id":"4507097", "info":{"authors":{"author":[{"@pid":"54/3765","text":"Esther Pacitti"},{"@pid":"v/PatrickValduriez","text":"Patrick Valduriez"}]},"title":"Zenith: Scientific Data Management on a Large Scale.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/PacittiV12","ee":"http://ercim-news.ercim.eu/en89/special/zenith-scientific-data-management-at-a-large-scale","url":"https://dblp.org/rec/journals/ercim/PacittiV12"}, "url":"URL#4507097" }, { "@score":"1", "@id":"4507098", "info":{"authors":{"author":[{"@pid":"39/6177","text":"Carlos Parra 0002"},{"@pid":"00/9990","text":"Clément Quinton"},{"@pid":"d/LaurenceDuchien","text":"Laurence Duchien"}]},"title":"CAPucine: Context-Aware Service-Oriented Product Line for Mobile Apps.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ParraQD12","ee":"http://ercim-news.ercim.eu/en88/special/capucine-context-aware-service-oriented-product-line-for-mobile-apps","url":"https://dblp.org/rec/journals/ercim/ParraQD12"}, "url":"URL#4507098" }, { "@score":"1", "@id":"4507099", "info":{"authors":{"author":[{"@pid":"73/5656","text":"Máté Pataki"},{"@pid":"33/11237","text":"Miklós Vajna"},{"@pid":"05/2854","text":"Csaba Attila Marosi"}]},"title":"Wikipedia as Text.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/PatakiVM12","ee":"http://ercim-news.ercim.eu/en89/ri/wikipedia-as-text","url":"https://dblp.org/rec/journals/ercim/PatakiVM12"}, "url":"URL#4507099" }, { "@score":"1", "@id":"4507100", "info":{"authors":{"author":[{"@pid":"05/6915","text":"Fabio Paternò"},{"@pid":"92/8283","text":"Christian Sisti"},{"@pid":"92/4946","text":"Lucio Davide Spano"}]},"title":"Cross Modality Adaptation of Service Front Ends.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/PaternoSS12","ee":"http://ercim-news.ercim.eu/en88/special/cross-modality-adaptation-of-service-front-ends","url":"https://dblp.org/rec/journals/ercim/PaternoSS12"}, "url":"URL#4507100" }, { "@score":"1", "@id":"4507101", "info":{"authors":{"author":[{"@pid":"25/11237","text":"John Pendlebury"},{"@pid":"51/1732","text":"Mark Humphrys"},{"@pid":"03/2506","text":"Ray Walshe"}]},"title":"Massively Multi-Author Hybrid Artificial Intelligence.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/PendleburyHW12","ee":"http://ercim-news.ercim.eu/en89/ri/massively-multi-author-hybrid-artificial-intelligence","url":"https://dblp.org/rec/journals/ercim/PendleburyHW12"}, "url":"URL#4507101" }, { "@score":"1", "@id":"4507102", "info":{"authors":{"author":{"@pid":"p/NadiaPisanti","text":"Nadia Pisanti"}},"title":"From Discrete to Continuous: Turing's Morphogenesis.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Pisanti12","ee":"http://ercim-news.ercim.eu/en91/special/from-discrete-to-continuous-turings-morphogenesis","url":"https://dblp.org/rec/journals/ercim/Pisanti12"}, "url":"URL#4507102" }, { "@score":"1", "@id":"4507103", "info":{"authors":{"author":[{"@pid":"117/1992","text":"Daniel Plohmann"},{"@pid":"61/2236","text":"Elmar Gerhards-Padilla"}]},"title":"Malware and Botnet Analysis Methodology.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/PlohmannG12","ee":"http://ercim-news.ercim.eu/en90/special/malware-and-botnet-analysis-methodology","url":"https://dblp.org/rec/journals/ercim/PlohmannG12"}, "url":"URL#4507103" }, { "@score":"1", "@id":"4507104", "info":{"authors":{"author":[{"@pid":"59/187","text":"Dirk Reith"},{"@pid":"50/6927","text":"Karl N. Kirschner"}]},"title":"Mathematics Meets Chemistry - Workflow-guided Evolving Software for Molecular Modelling.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ReithK12","ee":"http://ercim-news.ercim.eu/en88/special/mathematics-meets-chemistry-workflow-guided-evolving-software-for-molecular-modelling","url":"https://dblp.org/rec/journals/ercim/ReithK12"}, "url":"URL#4507104" }, { "@score":"1", "@id":"4507105", "info":{"authors":{"author":[{"@pid":"07/3055","text":"Eric Rivals"},{"@pid":"79/9779","text":"Nicolas Philippe"},{"@pid":"81/7651","text":"Mikaël Salson"},{"@pid":"66/6590","text":"Martine Léonard"},{"@pid":"09/9780","text":"Therese Commes"},{"@pid":"l/ThierryLecroq","text":"Thierry Lecroq"}]},"title":"A Scalable Indexing Solution to Mine Huge Genomic Sequence Collections.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/RivalsPSLCL12","ee":"http://ercim-news.ercim.eu/en89/special/a-scalable-indexing-solution-to-mine-huge-genomic-sequence-collections","url":"https://dblp.org/rec/journals/ercim/RivalsPSLCL12"}, "url":"URL#4507105" }, { "@score":"1", "@id":"4507106", "info":{"authors":{"author":{"@pid":"21/4228","text":"Laurent Romary"}},"title":"Data Management in the Humanities.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Romary12","ee":"http://ercim-news.ercim.eu/en89/special/data-management-in-the-humanities","url":"https://dblp.org/rec/journals/ercim/Romary12"}, "url":"URL#4507106" }, { "@score":"1", "@id":"4507107", "info":{"authors":{"author":[{"@pid":"14/8656","text":"Jaldert O. Rombouts"},{"@pid":"09/1286","text":"Pieter R. Roelfsema"},{"@pid":"15/5737","text":"Sander M. Bohté"}]},"title":"Learning to Recall.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/RomboutsRB12","ee":"http://ercim-news.ercim.eu/en91/ri/learning-to-recall","url":"https://dblp.org/rec/journals/ercim/RomboutsRB12"}, "url":"URL#4507107" }, { "@score":"1", "@id":"4507108", "info":{"authors":{"author":[{"@pid":"245/2839","text":"Patrick W. Ruch"},{"@pid":"19/7934","text":"Thomas Brunschwiler"},{"@pid":"90/10496","text":"Werner Escher"},{"@pid":"43/7933","text":"Stephan Paredes"},{"@pid":"89/6243","text":"Bruno Michel"}]},"title":"Bionic Packaging: A Promising Paradigm for Future Computing.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/RuchBEPM12","ee":"http://ercim-news.ercim.eu/en89/ri/bionic-packaging-a-promising-paradigm-for-future-computing","url":"https://dblp.org/rec/journals/ercim/RuchBEPM12"}, "url":"URL#4507108" }, { "@score":"1", "@id":"4507109", "info":{"authors":{"author":[{"@pid":"01/3401","text":"Massimo Ruffolo"},{"@pid":"59/917","text":"Ermelinda Oro"}]},"title":"Information Extraction from Presentation-Oriented Documents.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/RuffoloO12","ee":"http://ercim-news.ercim.eu/en89/ri/information-extraction-from-presentation-oriented-documents","url":"https://dblp.org/rec/journals/ercim/RuffoloO12"}, "url":"URL#4507109" }, { "@score":"1", "@id":"4507110", "info":{"authors":{"author":[{"@pid":"r/DavideDiRuscio","text":"Davide Di Ruscio"},{"@pid":"p/PatrizioPelliccione","text":"Patrizio Pelliccione"},{"@pid":"p/AlfonsoPierantonio","text":"Alfonso Pierantonio"}]},"title":"Managing the Evolution of FOSS Systems.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/RuscioPP12","ee":"http://ercim-news.ercim.eu/en88/special/managing-the-evolution-of-foss-systems","url":"https://dblp.org/rec/journals/ercim/RuscioPP12"}, "url":"URL#4507110" }, { "@score":"1", "@id":"4507111", "info":{"authors":{"author":[{"@pid":"s/InaSchieferdecker","text":"Ina Schieferdecker"},{"@pid":"42/6082","text":"Axel Rennoch"},{"@pid":"00/6938","text":"Jürgen Großmann"}]},"title":"DIAMONDS do IT with MODELS: Innovative Security Testing Approaches.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SchieferdeckerRG12","ee":"http://ercim-news.ercim.eu/en88/ri/diamonds-do-it-with-models-innovative-security-testing-approaches","url":"https://dblp.org/rec/journals/ercim/SchieferdeckerRG12"}, "url":"URL#4507111" }, { "@score":"1", "@id":"4507112", "info":{"authors":{"author":[{"@pid":"25/4224","text":"Thorsten Schütt"},{"@pid":"63/6649","text":"Guillaume Pierre"}]},"title":"ConPaaS, an Integrated Cloud Environment for Big Data.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SchuettP12","ee":"http://ercim-news.ercim.eu/en89/special/conpaas-an-integrated-cloud-environment-for-big-data","url":"https://dblp.org/rec/journals/ercim/SchuettP12"}, "url":"URL#4507112" }, { "@score":"1", "@id":"4507113", "info":{"authors":{"author":[{"@pid":"s/AlexanderSerebrenik","text":"Alexander Serebrenik"},{"@pid":"v/MarkvandenBrand","text":"Mark van den Brand"},{"@pid":"43/10504","text":"Bogdan Vasilescu"}]},"title":"Seeing the Forest for the Trees with New Econometric Aggregation Techniques.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SerebrenikBV12","ee":"http://ercim-news.ercim.eu/en88/special/seeing-the-forest-for-the-trees-with-new-econometric-aggregation-techniques","url":"https://dblp.org/rec/journals/ercim/SerebrenikBV12"}, "url":"URL#4507113" }, { "@score":"1", "@id":"4507114", "info":{"authors":{"author":[{"@pid":"s/AlexanderSerebrenik","text":"Alexander Serebrenik"},{"@pid":"08/9385","text":"Wouter Poncin"},{"@pid":"v/MarkvandenBrand","text":"Mark van den Brand"}]},"title":"Process Mining Software Repositories: Do Developers Work as Expected?.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SerebrenikPB12","ee":"http://ercim-news.ercim.eu/en88/special/process-mining-software-repositories-do-developers-work-as-expected","url":"https://dblp.org/rec/journals/ercim/SerebrenikPB12"}, "url":"URL#4507114" }, { "@score":"1", "@id":"4507115", "info":{"authors":{"author":[{"@pid":"29/3125","text":"Florian Skopik"},{"@pid":"65/10434","text":"Thomas Bleier"}]},"title":"Cybercrime and the Security of Critical Infrastructures.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SkopikB12","ee":"http://ercim-news.ercim.eu/en91/ri/cybercrime-and-the-security-of-critical-infrastructures","url":"https://dblp.org/rec/journals/ercim/SkopikB12"}, "url":"URL#4507115" }, { "@score":"1", "@id":"4507116", "info":{"authors":{"author":[{"@pid":"53/3187","text":"Dominik Slezak"},{"@pid":"s/KrzysztofStencel","text":"Krzysztof Stencel"},{"@pid":"31/5210","text":"Hung Son Nguyen"}]},"title":"(No)SQL Platform for Scalable Semantic Processing of Fast Growing Document Repositories.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SlezakSN12","ee":"http://ercim-news.ercim.eu/en90/ri/nosql-platform-for-scalable-semantic-processing-of-fast-growing-document-repositories","url":"https://dblp.org/rec/journals/ercim/SlezakSN12"}, "url":"URL#4507116" }, { "@score":"1", "@id":"4507117", "info":{"authors":{"author":[{"@pid":"s/MarcSpaniol","text":"Marc Spaniol"},{"@pid":"66/5525","text":"András A. Benczúr"},{"@pid":"07/11238","text":"Zsolt Viharos"},{"@pid":"w/GerhardWeikum","text":"Gerhard Weikum"}]},"title":"Big Web Analytics: Toward a Virtual Web Observatory.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/SpaniolBVW12","ee":"http://ercim-news.ercim.eu/en89/special/big-web-analytics-toward-a-virtual-web-observatory","url":"https://dblp.org/rec/journals/ercim/SpaniolBVW12"}, "url":"URL#4507117" }, { "@score":"1", "@id":"4507118", "info":{"authors":{"author":{"@pid":"15/4413","text":"Marc Stevens 0001"}},"title":"Advances in Hash Function Cryptanalysis.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Stevens12","ee":"http://ercim-news.ercim.eu/en90/special/advances-in-hash-function-cryptanalysis","url":"https://dblp.org/rec/journals/ercim/Stevens12"}, "url":"URL#4507118" }, { "@score":"1", "@id":"4507119", "info":{"authors":{"author":{"@pid":"s/MichaelStonebraker","text":"Michael Stonebraker"}},"title":"SciDB: An Open-Source DBMS for Scientific Data.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Stonebraker12","ee":"http://ercim-news.ercim.eu/en89/special/scidb-an-open-source-dbms-for-scientific-data","url":"https://dblp.org/rec/journals/ercim/Stonebraker12"}, "url":"URL#4507119" }, { "@score":"1", "@id":"4507120", "info":{"authors":{"author":[{"@pid":"119/7076","text":"Zaza Tabagari"},{"@pid":"119/7105","text":"Zaza Sanikidze"},{"@pid":"119/7052","text":"George Giorgobiani"}]},"title":"VoterBallot - A New Application for ICT in Elections.","venue":"ERCIM News","volume":"2012","number":"91","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/TabagariSG12","ee":"http://ercim-news.ercim.eu/en91/ri/voterballot-a-new-application-for-ict-in-elections","url":"https://dblp.org/rec/journals/ercim/TabagariSG12"}, "url":"URL#4507120" }, { "@score":"1", "@id":"4507121", "info":{"authors":{"author":[{"@pid":"89/2480","text":"Costantino Thanos"},{"@pid":"m/StefanManegold","text":"Stefan Manegold"},{"@pid":"k/MartinLKersten","text":"Martin L. Kersten"}]},"title":"Big Data - Introduction to the special theme.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ThanosMK12","ee":"http://ercim-news.ercim.eu/en89/special/big-data-introduction-to-the-special-theme","url":"https://dblp.org/rec/journals/ercim/ThanosMK12"}, "url":"URL#4507121" }, { "@score":"1", "@id":"4507122", "info":{"authors":{"author":[{"@pid":"t/VicencTorra","text":"Vicenç Torra"},{"@pid":"05/7215","text":"Klara Stokes"}]},"title":"Reidentification for Measuring Disclosure Risk.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/TorraS12","ee":"http://ercim-news.ercim.eu/en90/special/reidentification-for-measuring-disclosure-risk","url":"https://dblp.org/rec/journals/ercim/TorraS12"}, "url":"URL#4507122" }, { "@score":"1", "@id":"4507123", "info":{"authors":{"author":{"@pid":"35/4166","text":"Zdenek Tronícek"}},"title":"Automatic Upgrade of Java Libraries.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Tronicek12","ee":"http://ercim-news.ercim.eu/en88/special/automatic-upgrade-of-java-libraries","url":"https://dblp.org/rec/journals/ercim/Tronicek12"}, "url":"URL#4507123" }, { "@score":"1", "@id":"4507124", "info":{"authors":{"author":{"@pid":"92/10714","text":"Stella Melina Vasilaki"}},"title":"Genset: Gender Equality for Science Innovation and Excellence.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Vasilaki12","ee":"http://ercim-news.ercim.eu/en89/ri/genset-gender-equality-for-science-innovation-and-excellence","url":"https://dblp.org/rec/journals/ercim/Vasilaki12"}, "url":"URL#4507124" }, { "@score":"1", "@id":"4507125", "info":{"authors":{"author":[{"@pid":"86/6897","text":"Julien Wintz"},{"@pid":"23/10714","text":"Thibaud Kloczko"},{"@pid":"74/6062","text":"Nicolas Niclausse"},{"@pid":"30/850","text":"David Rey"}]},"title":"dtk - A Metaplatform for Scientific Software Development.","venue":"ERCIM News","volume":"2012","number":"88","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/WintzKNR12","ee":"http://ercim-news.ercim.eu/en88/ri/dtk-a-metaplatform-for-scientific-software-development","url":"https://dblp.org/rec/journals/ercim/WintzKNR12"}, "url":"URL#4507125" }, { "@score":"1", "@id":"4507126", "info":{"authors":{"author":[{"@pid":"07/1817","text":"Shaun De Witt"},{"@pid":"46/9175","text":"Richard Sinclair"},{"@pid":"05/11238","text":"Andrew Sansum"},{"@pid":"181/2756","text":"Michael Wilson"}]},"title":"Managing Large Data Volumes from Scientific Facilities.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/WittSSW12","ee":"http://ercim-news.ercim.eu/en89/special/managing-large-data-volumes-from-scientific-facilities","url":"https://dblp.org/rec/journals/ercim/WittSSW12"}, "url":"URL#4507126" }, { "@score":"1", "@id":"4507127", "info":{"authors":{"author":{"@pid":"09/2378","text":"Sébastien Gambs"}},"title":"Inference Attacks on Geolocated Data.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/X12","ee":"http://ercim-news.ercim.eu/en90/special/inference-attacks-on-geolocated-data","url":"https://dblp.org/rec/journals/ercim/X12"}, "url":"URL#4507127" }, { "@score":"1", "@id":"4507128", "info":{"authors":{"author":[{"@pid":"02/3544","text":"Rafael Accorsi"},{"@pid":"78/10259","text":"Keyun Ruan"}]},"title":"Challenges of Cloud Forensics: A Survey of the Missing Capabilities.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/X12a","ee":"http://ercim-news.ercim.eu/en90/special/challenges-of-cloud-forensics-a-survey-of-the-missing-capabilities","url":"https://dblp.org/rec/journals/ercim/X12a"}, "url":"URL#4507128" }, { "@score":"1", "@id":"4507129", "info":{"authors":{"author":[{"@pid":"z/StefanoZanero","text":"Stefano Zanero"},{"@pid":"33/2939","text":"Sotiris Ioannidis"},{"@pid":"m/EvangelosPMarkatos","text":"Evangelos P. Markatos"}]},"title":"i-Code: Real-Time Malicious Code Identification.","venue":"ERCIM News","volume":"2012","number":"90","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/ZaneroIM12","ee":"http://ercim-news.ercim.eu/en90/special/i-code-real-time-malicious-code-identification","url":"https://dblp.org/rec/journals/ercim/ZaneroIM12"}, "url":"URL#4507129" }, { "@score":"1", "@id":"4507130", "info":{"authors":{"author":{"@pid":"67/3681","text":"Peter Zinterhof"}},"title":"Computer-Aided Diagnostics.","venue":"ERCIM News","volume":"2012","number":"89","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/ercim/Zinterhof12","ee":"http://ercim-news.ercim.eu/en89/ri/computer-aided-diagnostics","url":"https://dblp.org/rec/journals/ercim/Zinterhof12"}, "url":"URL#4507130" } ] } } } )