Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jsw/jsw2.bht:"
@article{DBLP:journals/jsw/AlamBH07, author = {Muhammad Alam and Ruth Breu and Michael Hafner}, title = {Model-Driven Security Engineering for Trust Management in {SECTET}}, journal = {J. Softw.}, volume = {2}, number = {1}, pages = {47--59}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.1.47-59}, doi = {10.4304/JSW.2.1.47-59}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/AlamBH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/AlmeidaAGNML07, author = {Eduardo Santana de Almeida and Alexandre Alvaro and Vinicius Cardoso Garcia and Leandro Marques Nascimento and Silvio Romero de Lemos Meira and Daniel Lucr{\'{e}}dio}, title = {A Systematic Approach to Design Domain-Specific Software Architectures}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {38--51}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.38-51}, doi = {10.4304/JSW.2.2.38-51}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/AlmeidaAGNML07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Byun07, author = {YoungJoon Byun}, title = {A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams and Patterns}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {56--63}, year = {2007}, url = {http://www.academypublisher.com/jsw/vol02/no03/jsw02035663.html}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Byun07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/CastellanoMAMCDT07, author = {Marcello Castellano and Giuseppe Mastronardi and Angela Aprile and Mirko Minardi and Pierpaolo Catalano and Vito Dicensi and Gianfranco Tarricone}, title = {A Decision Support System base line Flexible Architecture to Intrusion Detection}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {30--41}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.30-41}, doi = {10.4304/JSW.2.6.30-41}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/CastellanoMAMCDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ChamprasertS07, author = {Paskorn Champrasert and Junichi Suzuki}, title = {Building Self-Configuring Data Centers with Cross Layer Coevolution}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {29--43}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.29-43}, doi = {10.4304/JSW.2.5.29-43}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ChamprasertS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ChangC07, author = {Herv{\'{e}} Chang and Philippe Collet}, title = {Compositional Patterns of Non-Functional Properties for Contract Negotiation}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {52--63}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.52-63}, doi = {10.4304/JSW.2.2.52-63}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ChangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/CiraciBA07, author = {Selim Ciraci and Pim van den Broek and Mehmet Aksit}, title = {A Taxonomy for a Constructive Approach to Software Evolution}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {84--97}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.84-97}, doi = {10.4304/JSW.2.2.84-97}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/CiraciBA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/CiufudeanGFT07, author = {Calin Ciufudean and Adrian Graur and Constantin Filote and Cornel Turcu}, title = {A New Formalism for Failure Diagnosis: Ant Colony Decision Petri Nets}, journal = {J. Softw.}, volume = {2}, number = {1}, pages = {39--46}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.1.39-46}, doi = {10.4304/JSW.2.1.39-46}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/CiufudeanGFT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/CordeiroDB07, author = {Jo{\~{a}}o Cordeiro and Ga{\"{e}}l Dias and Pavel Brazdil}, title = {New Functions for Unsupervised Asymmetrical Paraphrase Detection}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {12--23}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.12-23}, doi = {10.4304/JSW.2.4.12-23}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/CordeiroDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Dvorak07, author = {Vaclav Dvorak}, title = {Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {52--63}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.52-63}, doi = {10.4304/JSW.2.5.52-63}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Dvorak07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/FernandezPL07, author = {Eduardo B. Fern{\'{a}}ndez and Juan C. Pelaez and Mar{\'{\i}}a M. Larrondo{-}Petrie}, title = {Security Patterns for Voice over {IP} Networks}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {19--29}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.19-29}, doi = {10.4304/JSW.2.2.19-29}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/FernandezPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/FlorentzH07, author = {Bastian Florentz and Michaela Huhn}, title = {Architecture Potential Analysis: {A} Closer Look inside Architecture Evaluation}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {43--56}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.43-56}, doi = {10.4304/JSW.2.4.43-56}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/FlorentzH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/FragaL07, author = {Anabel Fraga and Juan Llor{\'{e}}ns}, title = {The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {24--28}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.24-28}, doi = {10.4304/JSW.2.5.24-28}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/FragaL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/GarochePT07, author = {Pierre{-}Lo{\"{\i}}c Garoche and Marc Pantel and Xavier Thirioux}, title = {Abstract Interpretation-based Static Safety for Actors}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {87--98}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.3.87-98}, doi = {10.4304/JSW.2.3.87-98}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/GarochePT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/GarzonHMLC07, author = {Jos{\'{e}} Ignacio Garz{\'{o}}n and Eduardo Huedo and Rub{\'{e}}n S. Montero and Ignacio Mart{\'{\i}}n Llorente and Pablo Chac{\'{o}}n}, title = {Adaptation of a Multi-Resolution Docking Bioinformatics Application to the Grid}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {1--10}, year = {2007}, url = {http://www.academypublisher.com/jsw/vol02/no02/jsw02020110.html}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/GarzonHMLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/GuidiL07, author = {Claudio Guidi and Roberto Lucchi}, title = {Formalizing Mobility in Service Oriented Computing}, journal = {J. Softw.}, volume = {2}, number = {1}, pages = {1--13}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.1.1-13}, doi = {10.4304/JSW.2.1.1-13}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/GuidiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HejtmanekM07, author = {Luk{\'{a}}s Hejtm{\'{a}}nek and Ludek Matyska}, title = {Nonblocking Distributed Replication of Versioned Files}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {16--23}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.16-23}, doi = {10.4304/JSW.2.5.16-23}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HejtmanekM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HermosilloGSD07, author = {Gabriel Hermosillo and Roberto Gomez and Lionel Seinturier and Laurence Duchien}, title = {Using Aspect Programming to Secure Web Applications}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {53--63}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.53-63}, doi = {10.4304/JSW.2.6.53-63}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HermosilloGSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HiekataYRO07, author = {Kazuo Hiekata and Hiroyuki Yamato and Piroon Rojanakamolsan and Wataru Oishi}, title = {A Framework for Design Engineering Education with Workflow-based e-Learning System}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {88--95}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.88-95}, doi = {10.4304/JSW.2.4.88-95}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsw/HiekataYRO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HillG07, author = {James H. Hill and Aniruddha S. Gokhale}, title = {Model-driven Engineering for Early QoS Validation of Component-based Software Systems}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {9--18}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.3.9-18}, doi = {10.4304/JSW.2.3.9-18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HillG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Hohfeld07, author = {Alexander H{\"{o}}hfeld}, title = {In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {86--92}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.86-92}, doi = {10.4304/JSW.2.6.86-92}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Hohfeld07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Hussain07, author = {Dil Muhammad Akbar Hussain}, title = {Destabilization of Terrorist Networks through Argument Driven Hypothesis Model}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {22--29}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.22-29}, doi = {10.4304/JSW.2.6.22-29}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Hussain07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/JechevaN07, author = {Veselina G. Jecheva and Evgeniya P. Nikolova}, title = {Learning Problem and {BCJR} Decoding Algorithm in Anomaly-based Intrusion Detection Systems}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {42--52}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.42-52}, doi = {10.4304/JSW.2.6.42-52}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/JechevaN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/JeschkeSRT07, author = {Sabina Jeschke and Harald Scheel and Thomas Richter and Christian Thomsen}, title = {On Remote and Virtual Experiments in eLearning}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {76--85}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.76-85}, doi = {10.4304/JSW.2.6.76-85}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/JeschkeSRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/JohnsonLNS07, author = {Pontus Johnson and Robert Lagerstr{\"{o}}m and Per N{\"{a}}rman and M{\aa}rten Simonsson}, title = {Extended Influence Diagrams for System Quality Analysis}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {30--42}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.3.30-42}, doi = {10.4304/JSW.2.3.30-42}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/JohnsonLNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/KarwaczynskiM07, author = {Piotr Karwaczynski and Jaka Mocnik}, title = {IP-based Clustering for Peer-to-Peer Overlays}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {30--37}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.30-37}, doi = {10.4304/JSW.2.2.30-37}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/KarwaczynskiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LaarG07, author = {Pi{\"{e}}rre van de Laar and Rob Golsteijn}, title = {User-Controlled Reflection on Join Points}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {1--8}, year = {2007}, url = {http://www.academypublisher.com/jsw/vol02/no03/jsw02030108.html}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LaarG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LarreaLACW07, author = {Mikel Larrea and Alberto Lafuente and Iratxe Soraluze Arriola and Roberto Corti{\~{n}}as and Joachim Wieland}, title = {Designing Efficient Algorithms for the Eventually Perfect Failure Detector Class}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {1--11}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.1-11}, doi = {10.4304/JSW.2.4.1-11}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LarreaLACW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LiZ07, author = {Wei Li and Zhikun Zhao}, title = {Influence Control for Dynamic Reconfiguration of Data Flow Systems}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {1--13}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.1-13}, doi = {10.4304/JSW.2.6.1-13}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LiZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LopesTMS07, author = {S{\'{e}}rgio F. Lopes and Adriano Tavares and Jo{\~{a}}o Monteiro and Carlos A. Silva}, title = {Instantiation of a Classification System Framework that Facilitates Reuse}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {57--69}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.57-69}, doi = {10.4304/JSW.2.4.57-69}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LopesTMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LorenzoMMV07, author = {Giusy Di Lorenzo and Nicola Mazzocca and Francesco Moscato and Valeria Vittorini}, title = {Towards Semantics Driven Generation of Executable Web Services Compositions}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {1--15}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.1-15}, doi = {10.4304/JSW.2.5.1-15}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LorenzoMMV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/MoserMZ07, author = {Louise E. Moser and P. Michael Melliar{-}Smith and Wenbing Zhao}, title = {Building Dependable and Secure Web Services}, journal = {J. Softw.}, volume = {2}, number = {1}, pages = {14--26}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.1.14-26}, doi = {10.4304/JSW.2.1.14-26}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/MoserMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/NgoA07, author = {Linh Ngo and Amy W. Apon}, title = {Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {78--86}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.3.78-86}, doi = {10.4304/JSW.2.3.78-86}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/NgoA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/OrtizODP07, author = {Andr{\'{e}}s Ortiz and Julio Ortega and Antonio F. D{\'{\i}}az and Alberto Prieto}, title = {Modeling Network Behaviour By Full-System Simulation}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {11--18}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.11-18}, doi = {10.4304/JSW.2.2.11-18}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/OrtizODP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ParkD07, author = {Joon S. Park and Ganesh Devarajan}, title = {Fine-Grained and Scalable Message Protection in Sensitive Organizations}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {64--75}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.64-75}, doi = {10.4304/JSW.2.6.64-75}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ParkD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/PriebeDSK07, author = {Torsten Priebe and Wolfgang Dobmeier and Christian Schl{\"{a}}ger and Nora Kamprath}, title = {Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies}, journal = {J. Softw.}, volume = {2}, number = {1}, pages = {27--38}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.1.27-38}, doi = {10.4304/JSW.2.1.27-38}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/PriebeDSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/RabuzinBM07, author = {Kornelije Rabuzin and Miroslav Baca and Mirko Malekovic}, title = {A Multimodal Biometric System Implemented within an Active Database Management System}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {24--31}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.24-31}, doi = {10.4304/JSW.2.4.24-31}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/RabuzinBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Saint-VoirinLGZ07, author = {David Saint{-}Voirin and Christophe Lang and Herv{\'{e}} Guyennet and Noureddine Zerhouni}, title = {Scoop Methodology: Modeling, Simulation And Analysis For Cooperative Systems}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {32--42}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.32-42}, doi = {10.4304/JSW.2.4.32-42}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Saint-VoirinLGZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Silly-ChettoM07, author = {Maryline Silly{-}Chetto and Audrey Marchand}, title = {Dynamic Scheduling of Skippable Periodic Tasks: Issues and Proposals}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {44--51}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.44-51}, doi = {10.4304/JSW.2.5.44-51}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Silly-ChettoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/SkrochT07, author = {Oliver Skroch and Klaus Turowski}, title = {Reducing Domain Level Scenarios to Test Component-based Software}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {64--73}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.64-73}, doi = {10.4304/JSW.2.5.64-73}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/SkrochT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Staines07, author = {Tony Spiteri Staines}, title = {Supporting {UML} Sequence Diagrams with a Processor Net Approach}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {64--73}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.64-73}, doi = {10.4304/JSW.2.2.64-73}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Staines07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/TanYY07, author = {Vu Van Tan and Dae{-}Seung Yoo and Myeong{-}Jae Yi}, title = {A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {70--79}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.70-79}, doi = {10.4304/JSW.2.4.70-79}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/TanYY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ThonhauserSK07, author = {Michael Thonhauser and Gernot Schmoelzer and Christian Kreiner}, title = {Implementing Model-Based Data Structures using Transient Model Extensions}, journal = {J. Softw.}, volume = {2}, number = {2}, pages = {74--83}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.2.74-83}, doi = {10.4304/JSW.2.2.74-83}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ThonhauserSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Triebsees07, author = {Thomas Triebsees}, title = {Constraint-based Model Transformation: Tracing the Preservation of Semantic Properties}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {19--29}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.3.19-29}, doi = {10.4304/JSW.2.3.19-29}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Triebsees07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/VargheseJ07, author = {Surekha Mariam Varghese and K. Poulose Jacob}, title = {Anomaly Detection Using System Call Sequence Sets}, journal = {J. Softw.}, volume = {2}, number = {6}, pages = {14--21}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.6.14-21}, doi = {10.4304/JSW.2.6.14-21}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/VargheseJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Waraporn07, author = {Narongrit Waraporn}, title = {Real Time Simulation of Medical Diagnosis with Confidence Levels on Distributed Knowledge Nodes}, journal = {J. Softw.}, volume = {2}, number = {4}, pages = {80--87}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.4.80-87}, doi = {10.4304/JSW.2.4.80-87}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Waraporn07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/WebberLCR07, author = {Carine G. Webber and Maria de F{\'{a}}tima Webber do Prado Lima and Marcos E. Casa and Alexandre M. Ribeiro}, title = {Towards Secure e-Learning Applications: a Multiagent Platform}, journal = {J. Softw.}, volume = {2}, number = {1}, pages = {60--69}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.1.60-69}, doi = {10.4304/JSW.2.1.60-69}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/WebberLCR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YounM07, author = {Seongwook Youn and Dennis McLeod}, title = {Spam Email Classification using an Adaptive Ontology}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {43--55}, year = {2007}, url = {http://www.academypublisher.com/jsw/vol02/no03/jsw02034355.html}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YounM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZeinK07, author = {Oussama Kassem Zein and Yvon Kermarrec}, title = {Description and Composition of E-Learning Services}, journal = {J. Softw.}, volume = {2}, number = {5}, pages = {74--83}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.5.74-83}, doi = {10.4304/JSW.2.5.74-83}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZeinK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZhengZK07, author = {Yongyan Zheng and Jiong Zhou and Paul Krause}, title = {An Automatic Test Case Generation Framework for Web Services}, journal = {J. Softw.}, volume = {2}, number = {3}, pages = {64--77}, year = {2007}, url = {https://doi.org/10.4304/jsw.2.3.64-77}, doi = {10.4304/JSW.2.3.64-77}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZhengZK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.