- Chien-Chang Chen
, Yao-Hong Tsai:
Adaptive reversible image watermarking scheme. J. Syst. Softw. 84(3): 428-434 (2011) - Tzung-Her Chen
, Kai-Hsiang Tsao:
Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7): 1197-1208 (2011) - Byoungju Choi, Richard Lai:
Special issue on the best papers of QSIC 2009. J. Syst. Softw. 84(4): 527 (2011) - Chien-Ping Chou, Kuen-Fang Jea, Heng-Hsun Liao:
A syntactic approach to twig-query matching on XML streams. J. Syst. Softw. 84(6): 993-1007 (2011) - Delphine Christin
, Andreas Reinhardt, Salil S. Kanhere
, Matthias Hollick:
A survey on privacy in mobile participatory sensing applications. J. Syst. Softw. 84(11): 1928-1946 (2011) - Pedro J. Clemente
, Juan Hernández Núñez
, José María Conejero, Guadalupe Ortiz
:
Managing crosscutting concerns in component based systems using a model driven development approach. J. Syst. Softw. 84(6): 1032-1053 (2011) - María José Escalona Cuaresma
, Javier J. Gutiérrez
, Manuel Mejías
, Gustavo Aragón, Isabel M. Ramos
, Jesús Torres Valderrama
, Francisco José Domínguez Mayo:
An overview on test generation from functional requirements. J. Syst. Softw. 84(8): 1379-1393 (2011) - Waltenegus Dargie
, Rami Mochaourab
, Alexander Schill, Lin Guan
:
A topology control protocol based on eligibility and efficiency metrics. J. Syst. Softw. 84(1): 2-11 (2011) - Brett Dawes, Kwan-Wu Chin
:
A comparison of deterministic and probabilistic methods for indoor localization. J. Syst. Softw. 84(3): 442-451 (2011) - Vidroha Debroy, W. Eric Wong:
On the estimation of adequate test set size using fault failure rates. J. Syst. Softw. 84(4): 587-602 (2011) - Gustavo Weber Denardin
, Carlos Henrique Barriquello
, Alexandre Campos
, Ricardo Nederson do Prado
:
A geographic routing hybrid approach for void resolution in wireless sensor networks. J. Syst. Softw. 84(10): 1577-1590 (2011) - Zhihui Du
, Jingkun Hu, Yinong Chen
, Zhili Cheng, Xiaoying Wang
:
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid. J. Syst. Softw. 84(7): 1224-1232 (2011) - T. Edagawa, T. Akaike, Yoshiki Higo, Shinji Kusumoto, Shigeo Hanabusa, T. Shibamoto:
Function point measurement from Web application source code based on screen transitions and database accesses. J. Syst. Softw. 84(6): 976-984 (2011) - Mosa Elbendak, Paul Vickers
, B. Nick Rossiter:
Parsed use case descriptions as a basis for object-oriented class model generation. J. Syst. Softw. 84(7): 1209-1223 (2011) - Joaquín Entrialgo
, Daniel F. García
, Javier García, Manuel García, Pablo Valledor, Mohammad S. Obaidat
:
Dynamic adaptation of response-time models for QoS management in autonomic systems. J. Syst. Softw. 84(5): 810-820 (2011) - Arnau Erola, Jordi Castellà-Roca
, Alexandre Viejo
, Josep Maria Mateo-Sanz
:
Exploiting social networks to provide privacy in personalized web search. J. Syst. Softw. 84(10): 1734-1745 (2011) - Faramarz Safi Esfahani
, Masrah Azrifah Azmi Murad
, Md. Nasir bin Sulaiman, Nur Izura Udzir:
Adaptable Decentralized Service Oriented Architecture. J. Syst. Softw. 84(10): 1591-1617 (2011) - Ziba Eslami, Jamal Zarepour-Ahmadabadi:
Secret image sharing with authentication-chaining and dynamic embedding. J. Syst. Softw. 84(5): 803-809 (2011) - Liming Fang, Willy Susilo
, Chunpeng Ge, Jiandong Wang:
Interactive conditional proxy re-encryption with fine grain policy. J. Syst. Softw. 84(12): 2293-2302 (2011) - Jean-Baptiste Fasquel, Johan Moreau
:
A design pattern coupling role and component concepts: Application to medical software. J. Syst. Softw. 84(5): 847-863 (2011) - Francesca Arcelli Fontana, Stefano Maggioni, Claudia Raibulet
:
Understanding the relevance of micro-structures for design patterns detection. J. Syst. Softw. 84(12): 2334-2347 (2011) - Ganna Frankova, Magali Seguran, Florian Gilcher
, Slim Trabelsi, Jörg Dörflinger, Marco Aiello
:
Deriving business processes with service level agreements from early requirements. J. Syst. Softw. 84(8): 1351-1363 (2011) - Damianos Gavalas
, Paolo Bellavista
, Jiannong Cao
, Valérie Issarny:
Mobile applications: Status and trends. J. Syst. Softw. 84(11): 1823-1826 (2011) - C. C. F. Pereira Geovandro, Marcos A. Simplício Jr.
, Michael Naehrig, Paulo S. L. M. Barreto:
A family of implementation-friendly BN elliptic curves. J. Syst. Softw. 84(8): 1319-1326 (2011) - Amir Hossein Ghapanchi
, Aybüke Aurum:
Antecedents to IT personnel's intentions to leave: A systematic literature review. J. Syst. Softw. 84(2): 238-249 (2011) - Vittorio Ghini, Stefano Ferretti
, Fabio Panzieri:
The "Always Best Packet Switching" architecture for SIP-based mobile multimedia services. J. Syst. Softw. 84(11): 1827-1851 (2011) - Dunwei Gong, Wanqiu Zhang, Xiangjuan Yao:
Evolutionary generation of test data for many paths coverage based on grouping. J. Syst. Softw. 84(12): 2222-2233 (2011) - Ning Gui, Vincenzo De Florio
, Hong Sun
, Chris Blondia:
Toward architecture-based context-aware deployment and adaptation. J. Syst. Softw. 84(2): 185-197 (2011) - Fuchun Guo, Yi Mu, Willy Susilo
:
Improving security of q-SDH based digital signatures. J. Syst. Softw. 84(10): 1783-1790 (2011) - Jianmei Guo, Jules White, Guangxin Wang, Jian Li, Yinglin Wang:
A genetic algorithm for optimized feature selection with resource constraints in software product lines. J. Syst. Softw. 84(12): 2208-2221 (2011)