- [1]
- M.A.
Akbari, H. Takahashi, and M. Nakajima.
Discerning advisor: An intelligent advertising system for clothes considering
skin color.
In Proceedings - 2005 International Conference on Cyberworlds, CW
2005, volume 2005, pages 202–209, 2005.
(doi:10.1109/CW.2005.40)
- [2]
- M.W.
Akhtar and M.-T. Kechadi.
Dynamic load
balancing of content requests in peer to peer systems.
In S.Q. Zheng, editor, Parallel and Distributed Computing
and Systems — PDCS 2005. ACTA Press, November 2005.
- [3]
- G. Alon,
D.P. Kroese, T. Raviv, and R.Y.
Rubinstein.
Application of the cross-entropy method to the buffer allocation problem in a
simulation-based environment.
Annals of Operations Research, 134(1-4):137–151, 2005.
(doi:10.1007/s10479-005-5728-8)
- [4]
- K.G. Anagnostakis and A.D.
Keromytis.
Action amplification: A new approach to scalable administration.
In 2005 13th IEEE International Conference on Networks jointly held with
the 2005 7th IEEE Malaysia International Conference on Communications,
Proceedings, volume 2, pages 862–867, 2005.
(doi:10.1109/ICON.2005.1635629)
- [5]
- K. G. Anagnostakis,
S. Sidiroglou, P. Akritidis,
K. Xinidis, E. Markatos, and
A. D. Keromytis.
Detecting
targeted attacks using shadow honeypots.
In 14th USENIX Security Symposium, Berkeley, CA, August 2005.
Usenix Association.
- [6]
- E. Anceaume, X. Defago,
M. Gradinariu, and M. Roy.
Towards a theory of self-organization.
In Pierre Fraigniaud, editor, Distributed Computing: 19th
International Conference (DISC 2005), pages 505–506. Springer-Verlag,
September 2005.
Lecture Notes in Computer Science 3724.
(doi:10.1007/11561927_43)
- [7]
- Brent Auernjeimer and Max J.
Tsai.
Biometric authentication for web-based course examinations.
In Proceedings of the 38th Hawaii Int. Conf. on System Sciences
(HICSS-38) — Track 9, page 294b, January 2005.
(doi:10.1109/HICSS.2005.120)
- [8]
- (Author names in Chinese).
A security model of
e-commerce based on internet agent.
Microcomputer Applications, 21(1):4–16, 2005.
In Chinese.
- [9]
- Charlie C. Baggett, Jr. and
John J. Adams.
Method,
system and computer program product for assessing information security.
United States Patent 6,925,443, August 2005.
Assignee: SAFEOperations, Inc. (Columbia, MD).
- [10]
- Wolf-Tilo
Balke.
Information retrieval in
peer-to-peer systems.
In R. Steinmetz and K. Wehrle, editors,
Peer-to-Peer Systems and Applications. Springer-Verlag, Berlin,
2005.
Lecture Notes in Computer Science 3485.
- [11]
- M. Barrett and C. Thomborson.
Using NGSCB to mitigate existing software threats.
IFIP Advances in Information and Communication Technology,
177:55–74, 2005.
- [12]
- Matthew Frederick Barrett.
Towards
an open trusted computing framework.
Master's thesis, The University of Auckland, February 2005.
- [13]
- P. Bellavista, A. Corradi,
and E. Magistretti.
REDMAN: An optimistic replication middleware for read-only resources in dense
MANETs.
Pervasive and Mobile Computing, 1(3):279–310, 2005.
(doi:10.1016/j.pmcj.2005.06.002)
- [14]
- S. Bergamaschi, P. Bouquet,
P. Ciaccia, and P. Merialdo.
Speaking words of WISDOM: Web intelligent search based on DOMain
ontologies.
In CEUR Workshop Proceedings, volume 166, 2005.
- [15]
- S. Bistarelli, S.N. Foley,
and B. O'Sullivan.
A soft constraint-based approach to the cascade vulnerability problem.
Journal of Computer Security, 13(5):699–720, 2005.
- [16]
- Jurgen
Bitzer and Philipp J.H. Schroder.
The impact of entry
and competition by open source software on innovation activity.
Industrial Organization 0512001, EconWPA, December 2005.
- [17]
- Alsberg
B.K., Bjerke H., Navestad G.M., and
Astrand P.O.
GaussDal: An open source database management system for quantum chemical
computations.
Computer Physics Communications, 171(2):133–153, September 2005.
(doi:10.1016/j.cpc.2005.04.008)
- [18]
- Silas S. Brown and Peter
Robinson.
Transformation
frameworks and their relevance in universal design.
Universal Access in the Information Society, 2005.
- [19]
- D.-W.
Chen, B. Xu, Y.-R. Cai, and
J.-Z. Li.
P2P based web service discovery mechanism with bounding deployment and
publication.
Jisuanji Xuebao/Chinese Journal of Computers, 28(4):615–626,
2005.
- [20]
- Q. Chen,
C. Zhang, and S. Zhang.
ENDL: A logical framework for verifying secure transaction protocols.
Knowledge and Information Systems, 7(1):84–109, 2005.
(doi:10.1007/s10115-003-0127-4)
- [21]
- M. Christodorescu, S. Jha,
S.A. Seshia, D. Song, and R.E.
Bryant.
Semantics-aware malware detection.
In Proceedings — IEEE Symposium on Security and Privacy, pages
32–46, 2005.
- [22]
- G. Chroust.
Mutual influences of society's paradigm and information and communication
technologies.
In 49th Annual Meeting of the International Society for the Systems
Sciences 2005, ISSS 2005, pages 843–860, 2005.
- [23]
- Mihai
Ciocarlie, Marcela-Simona Atanasoae, and Horia
Ciocarlie.
System of programs for
rapid development and execution of Palm OS applications.
Transactions on Engineering, Computing and Technology, 7:260–263,
2005.
- [24]
- Sam St. Clair-Ford, Mohamed
Ould-Khaoua, and Lewis Mackenzie.
The
impact of network bandwidth on worm propagation.
In Nigel Thomas, editor, 21st UK Performance Engineering
Workshop, pages 21–29, Newcastle upon Tyne, UK, July 2005. University
of Newcastle.
Technical Report CS-TR-916.
- [25]
- A.J.
Conover and Y.-T. Song.
A framework for component mining of java applications via dynamic slicing.
In Proceedings - Third ACIS International Conference on Software
Engineering Research, Management and Applications, SERA 2005, volume
2005, pages 40–47, 2005.
(doi:10.1109/SERA.2005.7)
- [26]
- Paul A.
Cronce.
Method
for runtime code integrity validation using code block checksums.
United States Patent 6,880,149, April 2005.
Assignee: Pace Anti-Piracy (San Jose, CA).
- [27]
- H. Dagdeviren, R. Juric, and
T.A. Kassana.
An exploratory study for effective COTS and OSS product marketing.
In Proceedings of the International Conference on Information Technology
Interfaces, ITI, pages 681–686, 2005.
(doi:10.1109/ITI.2005.1491205)
- [28]
- Dominik
Roman Christian Dahlem.
Digital
rights enforcement for pervasive computing applications.
Master's thesis, University of Dublin, Trinity College, March 2005.
- [29]
- Raphael Y. de Camargo, Renato
Cerqueira, and Fabio Kon.
Strategies for storage of checkpointing data using non-dedicated repositories
on grid systems.
In MGC '05: Proceedings of the 3rd International Workshop on Middleware
for Grid Computing, pages 1–6, New York, NY, USA, 2005. ACM Press.
(doi:10.1145/1101499.1101500)
- [30]
- Diego López de Ipiña,
Iñaki Vázquez, Daniel García,
Javier Fernández, and Iván García.
A reflective middleware for controlling smart objects from mobile devices.
In sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart
objects and ambient intelligence, pages 213–218, New York, NY, USA,
2005. ACM Press.
(doi:10.1145/1107548.1107602)
- [31]
- V. Dimopoulos and S. Furnell.
A protection profiles approach to risk analysis for small and medium
enterprises.
IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security
Management, Integrity, and Internal Control in Information Systems,
193:267–283, 2005.
- [32]
- Florin
Dragan, Georges Gardarin, and Laurent Yeh.
Routing
XQuery in a P2P network using adaptable trie-indexes.
In IADIS International Conference WWW/Internet, October 2005.
- [33]
- Gunther Eysenbach and Mathieu
Trudel.
Going, going, still there: Using the WebCite service to permanently archive
cited web pages.
Journal of Medical Internet Research, 7(5):e60, 2005.
(doi:10.2196/jmir.7.5.e60)
- [34]
- S. Goel
and D. Pon.
Distribution of patches within vulnerable systems: A distributed model.
In Proceedings from the 6th Annual IEEE System, Man and Cybernetics
Information Assurance Workshop, SMC 2005, volume 2005, pages 458–460,
2005.
(doi:10.1109/IAW.2005.1496000)
- [35]
- Daniel
Gomes and Mário J. Silva.
Characterizing
a national community web.
ACM Transactions on Internet Technology, 5(3):508–531, August
2005.
(doi:10.1145/1084772.1084775)
- [36]
- Jesus M. González-Barahona,
Gregorio Robles, and Israel Herraiz.
Challenges in software
evolution: the libre software perspective.
In Workshop on Challenges in Software Evolution, pages 557–560,
April 2005.
- [37]
- Georgios Gousios, Eyfthymia
Aivaloglou, and Stefanos Gritzallis.
Distributed
component architectures security issues.
Computer Standards & Interfaces, 27(3):269–284, March 2005.
(doi:10.1016/j.csi.2004.08.003)
- [38]
- L.Z.
Granville, D.M. da Rosa, A. Panisson,
C. Melchiors, M. J. B. Almeida, and
L. M. R. Tarouco.
Managing computer networks using peer-to-peer technologies.
IEEE Communications, 43(10):62–68, October 2005.
(doi:10.1109/MCOM.2005.1522126)
- [39]
- M. Grechanik, D.E. Perry, and
D. Batory.
Using AOP to monitor and administer software for grid computing environments.
In Proceedings — International Computer Software and Applications
Conference, pages 241–248, 2005.
(doi:10.1109/COMPSAC.2005.167)
- [40]
- Yann-Gaël Guéhéneuc.
A
theory of program comprehension — joining vision science and program
comprehension.
Technical Report 1267, University of Montreal, December 2005.
- [41]
- Leitao
Guo, Shoubao Yang, Jing Wang, and
Jinyang Zhou.
Trust model based on similarity measure of vectors in p2p networks.
In Grid and Cooperative Computing — GCC 2005, pages 836–847.
Springer-Verlag, 2005.
Lecture Notes in Computer Science 3795.
(doi:10.1007/11590354_103)
- [42]
- A. Gupta and R. Hammond.
Information systems security issues and decisions for small businesses: An
empirical examination.
Information Management and Computer Security, 13(4):297–310, June
2005.
(doi:10.1108/09685220510614425)
- [43]
- Jin ha Kim.
Design
and Analysis of Cluster-Based Web Servers.
PhD thesis, Pennsylvania State University, University Park, PA, 2005.
- [44]
- D. Hartmann.
Computer simulation for contemporary problems in civil engineering.
In Proceedings of the 2005 ASCE International Conference on Computing in
Civil Engineering, pages 295–310, 2005.
- [45]
- R. Hasan, Z. Anwar,
W. Yurcik, L. Brumbaugh, and
R. Campbell.
A survey of peer-to-peer storage techniques for distributed file systems.
In International Conference on Information Technology: Coding and
Computing, ITCC, volume 2, pages 205–213, 2005.
- [46]
- M. Hussain, I. Hajjeh,
H. Afifi, and D. Seret.
Extending IKEv2 for multi-vendor home network environment.
In The 7th International Conference on Advanced Communication Technology,
ICACT 2005, volume 1, pages 63–68, 2005.
- [47]
- K. Iwasaki, K. Yamazawa, and
N. Yokoya.
An indexing system for photos based on shooting position and orientation with
geographic database.
In IEEE International Conference on Multimedia and Expo, ICME
2005, volume 2005, pages 390–393, 2005.
(doi:10.1109/ICME.2005.1521442)
- [48]
- G. Janée and J. Frew.
A hybrid declarative/procedural metadata mapping language based on Python.
In Research and Advanced Technology for Digital Libraries, pages
302–313. Springer-Verlag, 2005.
Lecture Notes in Computer Science 3652.
(doi:10.1007/11551362_27)
- [49]
- R. Jantz and M.J. Giarlo.
Digital preservation architecture and technology for trusted digital
repositories.
D-Lib Magazine, 11(6):350–373, 2005.
(doi:10.1045/june2005-jantz)
- [50]
- Z. Jiliang, L. Xianxian, and
L. Jianxin.
A new taxonomy of attacks
on security protocols and their security evaluation.
Journal of Computer Research and Development, 42(7):1100–1107,
2005.
In Chinese.
- [51]
- J. Jürjens.
Secure systems development with UML.
Springer Berlin Heidelberg, 2005.
(doi:10.1007/b137706)
- [52]
- Ioanna
Kantzavelou.
A virtual lab
model for an introductory computer science course.
Facta Universitatis, Electrical Engineering Series,
18(2):263–274, August 2005.
- [53]
- Bilge Karabacak and Ibrahim
Sogukpinar.
ISRAM:
information security risk analysis method.
Computers & Security, 24(2):147–159, March 2005.
(doi:10.1016/j.cose.2004.07.004)
- [54]
- Ajay K. Katangur and Yi Pan.
Performance analysis of optical multistage interconnection networks with
limited crosstalk.
In 19th International Parallel and Distributed Processing Symposium
(IPDPS 2005). IEEE Computer Society, April 2005.
(doi:10.1109/IPDPS.2005.336)
- [55]
- T. Kathiravelu and A. Pears.
Approaches to P2P internet application development.
In Proceedings of the Joint International Conference on Autonomic and
Autonomous Systems and International Conference on Networking and Services,
ICAS/ICNS 2005, volume 2005, page 38, 2005.
(doi:10.1109/ICAS-ICNS.2005.25)
- [56]
- G.S.
Kc and A.D. Keromytis.
e-NeXSh: Achieving an effectively non-executable stack and heap via
system-call policing.
In Proceedings — Annual Computer Security Applications Conference,
ACSAC, volume 2005, pages 286–300, 2005.
(doi:10.1109/CSAC.2005.22)
- [57]
- D.J.
Kim, Y.I. Song, S.B. Braynov, and
H.R. Rao.
A multidimensional trust formation model in B-to-C e-commerce: A conceptual
framework and content analyses of academia/practitioner perspectives.
Decision Support Systems, 40(2):143–165, 2005.
(doi:10.1016/j.dss.2004.01.006)
- [58]
- J.-H. Kim,
G.S. Choi, and C.R. Das.
A load balancing scheme for cluster-based secure network servers.
In ICCC 2005: IEEE International Conference on Cluster Computing,
2005.
(doi:10.1109/CLUSTR.2005.347056)
- [59]
- Jin-Ha
Kim, Gyu Sang Choi, and Chita Das.
A load
balancing scheme for cluster-based secure network servers.
In IEEE International Conference on Cluster Computing, 2005.
- [60]
- Paul
Klint, Ralf Lämmel, and Chris Verhoef.
Towards an Engineering Discipline for Grammarware.
ACM Transactions on Software Engineering Methodology,
14(3):331–380, July 2005.
(doi:10.1145/1072997.1073000)
- [61]
- S. Koch
and C. Neumann.
Evaluation and estimate of costs in the integration of open source software
components.
In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der
Gesellschaft fur Informatik e.V. (GI), volume 1, pages 91–95,
2005.
- [62]
- H. König.
Peer-to-peer intrusion detection systems for the protection of sensitive IT
infrastructures.
In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der
Gesellschaft fur Informatik e.V. (GI), volume 2, pages 638–642,
2005.
- [63]
- Dionysios Konstantinos Kostoulas.
Distributed
reputation-based mechanisms for trust propagation in large groups.
Master's thesis, University of Illinois at Urbana-Champaign, Urbana, IL,
2005.
- [64]
- Rajeev
Kumar, Amit Gupta, B. S. Pankaj,
Mrinmoy Ghosh, and P. P. Chakrabarti.
Post-compilation optimization for multiple gains with pattern matching.
SIGPLAN Notices, 40(12):14–23, December 2005.
(doi:10.1016/j.jcis.2004.09.063)
- [65]
- J.D.
Kushkowski.
Web citation by graduate students: A comparison of print and electronic theses.
Portal, 5(2):259–276, 2005.
- [66]
- L.-C.
Lam and T.-C. Chiueh.
Automatic extraction of accurate application-specific sandboxing policy.
In IEEE Military Communications Conference MILCOM, volume 2005,
2005.
(doi:10.1109/MILCOM.2005.1605766)
- [67]
- M. Lesk.
Understanding Digital Libraries.
Elsevier Inc., 2005.
- [68]
- Chi-Chia
Lin and Ming-Syan Chen.
On controlling digital TV set-top-box by mobile devices via IP network.
In Seventh IEEE International Symposium on Multimedia (ISM'05),
pages 52–59, 2005.
(doi:10.1109/ISM.2005.85)
- [69]
- K.-J. Lin,
T. Yu, and C.-Y. Shih.
The design of a personal and intelligent pervasive-commerce system
architecture.
In 2005 Second IEEE International Workshop on Mobile Commerce and
Services, WMCS'05, pages 163–172, 2005.
(doi:10.1109/WMCS.2005.25)
- [70]
- Jun
Liu, Khiang Wee Lim, Weng Khuen Ho,
Kay Chen Tan, Arthur Tay, and
Rajagopalan Srinivasan.
Using the OPC standard for real-time process monitoring and control.
IEEE Software, 22(6):54–59, November/December 2005.
(doi:10.1109/MS.2005.168)
- [71]
- P.C. Lockemann and R. Witte.
Agents and databases: Friends or foes?
In 9th International Database Engineering and Application Symposium,
IDEAS 2005, pages 137–147. Institute of Electrical and Electronics
Engineers Inc., January 2005.
(doi:10.1109/IDEAS.2005.8)
- [72]
- A. Löser, S. Staab, and
C. Tempich.
Semantic
methods for p2p query routing.
In T. Eymann, F. Klügl,
W. Lamersdorf, M. Klusch, and
M.N. Huhns, editors, Multiagent System
Technologies—MATES 2005, pages 15–26, Berlin, September 2005.
Springer Verlag.
Lecture Notes in Artificial Intelligence 3550.
- [73]
- Alexander Löser, Christoph
Tempich, Bastian Quilitz, Wolf-Tilo Balke,
Steffen Staab, and Wolfgang Nejdl.
Searching
dynamic communities with personal indexes.
In Yolanda Gil, Enrico Motta,
V. Richard Benjamins, and Mark A. Musen,
editors, The Semantic Web — ISWC 2005: 4th International Semantic Web
Conference, pages 491–505, Berlin, November 2005. Springer-Verlag.
Lecture Notes in Computer Science 3729.
- [74]
- T. Lu,
Z.-S. Li, and Y.-B. Wu.
GSM: A new computing paradigm based on OGSA.
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and
Technology, 29(2):149–152, 157, 2005.
- [75]
- T. Lu,
Z.-S. Li, C.-L. Xu, X.-M. Huang,
N.-J. Tang, and Y.-Y. Xiong.
FGSM: A framework for grid service mining.
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University
(Engineering Science Edition), 37(2):86–92, 2005.
- [76]
- Moreno
Marzolla, Matteo Mordacchini, and Salvatore
Orlando.
Resource discovery in a dynamic grid environment.
In 16th International Workshop on Database and Expert Systems
Applications (DEXA'05), pages 356–360. IEEE Computer Society, August
2005.
(doi:10.1109/DEXA.2005.166)
- [77]
- Bill McCloskey and Eric
Brewer.
ASTEC: a new approach to refactoring C.
In ESEC/FSE-13: Proceedings of the 10th European Software Engineering
Conference held jointly with 13th ACM SIGSOFT International Symposium on
Foundations of Software Engineering, pages 21–30, New York, 2005. ACM
Press.
(doi:10.1145/1081706.1081712)
- [78]
- Luis Rodero Merino, Luis
López, Antonio Fernández, and Vicent
Cholvi.
DANTE:
Self-adaptable unstructured peer-to-peer networks.
Reports on Systems and Communications, V(12), July 2005.
- [79]
- Marjan
Mernik, Jan Heering, and Anthony M. Sloane.
When and how to develop domain-specific languages.
ACM Computing Surveys, 37(4):316–344, 2005.
(doi:10.1145/1118890.1118892)
- [80]
- D. Millć, M. Brogle, and
T. Braun.
Video broadcasting using overlay multicast.
In Proceedings — Seventh IEEE International Symposium on Multimedia,
ISM 2005, volume 2005, pages 515–522, 2005.
(doi:10.1109/ISM.2005.119)
- [81]
- Jaydev
Misra, Pinakpani Pal, and Aditya Bagchi.
Spear: Design of a secured peer-to-peer architecture.
In Information Systems Security, pages 322–327. Springer-Verlag,
2005.
Lecture Notes in Computer Science 3803.
(doi:10.1007/11593980_25)
- [82]
- Y. Mo,
Y. Zhang, and X. Li.
Research on the design
principles of security protocol.
Computer Engineering, 31(24):181–185, 2005.
In Chinese.
- [83]
- Yong-Hyuk
Moon, Byung-Sang Kim, and Chan-Hyun Youn.
Design of P2P grid networking architecture using k-redundancy scheme based
group peer concept.
In Internet and Network Economics, pages 748–757.
Springer-Verlag, 2005.
Lecture Notes in Computer Science 3828.
(doi:10.1007/11600930_75)
- [84]
- Bita Mortazavi and George
Kesidis.
A model of a
reputation service for incentive engineering.
Technical Report NAS-TR-0022-2005, Network and Security Research Center,
Department of Computer Science and Engineering, Pennsylvania State
University, University Park, PA, USA, July 2005.
- [85]
- J.L.
Muñoz, J. Forné, O. Esparza, and
M. Rey.
Efficient certificate revocation system implementation: Huffman Merkle hash
tree (HuffMHT).
In 2nd International Conference on Trust, Privacy, and Security in
Digital Business (TrustBus/05), pages 119–127. Springer Verlag, 2005.
LNCS 3592.
- [86]
- Mor Naaman.
Leveraging
geo-referenced digital photographs.
PhD thesis, Stanford University, 2005.
- [87]
- G.M.P.
O'Hare, M.J. O'Grady, R.W. Collier, and
S. Keegan.
Agents as catalysts for mobile computing.
In Paolo Bresciani, Paolo Giorgini,
Brian Henderson-Sellers, Graham Low, and
Michael Winikoff, editors, Agent-Oriented Information
Systems II, 6th International Bi-Conference Workshop, AOIS 2004, Riga,
Latvia, June 8, 2004 and New York, NY, USA, July 20, 2004, Revised Selected
Papers, pages 182–197. Springer-Verlag, 2005.
Lecture Notes in Computer Science 3508.
(doi:10.1007/11426714_13)
- [88]
- Gregory M.P. O'Hare, M.J.
O'Grady, R. Collier, S. Keegan,
D. O'Kane, R. Tynan, and
D. Marsh.
Ambient intelligence through agile agents.
In Ambient Intelligence for Scientific Discovery, pages 286–310.
Springer-Verlag, 2005.
Lecture Notes in Computer Science 3345.
(doi:10.1007/b105582)
- [89]
- Y. Oyama, K. Onoue, and
A. Yonezawa.
Speculative security checks in sandboxing systems.
In Proceedings - 19th IEEE International Parallel and Distributed
Processing Symposium, IPDPS 2005, volume 2005, pages 111–116, 2005.
(doi:10.1109/IPDPS.2005.408)
- [90]
- A. Pashalides.
Interdomain user authentication and privacy.
PhD thesis, Royal Holloway University of London, 2005.
- [91]
- W. Purwasih and Y. Nakamori.
A diagramming technique for representation of integrated assessment models.
In 4th International Conference on Environmental Informatics, ISEIS
2005, pages 211–217. International Society for Environmental
Information Sciences, 2005.
- [92]
- P.A. Relf.
Tool assisted identifier naming for improved software readability: an empirical
study.
In ISESE 2005: International Symposium on Empirical Software
Engineering, pages 53–62, 2005.
(doi:10.1109/ISESE.2005.1541814)
- [93]
- J. Reuning and P. Jones.
Osprey: Peer-to-peer enabled content distribution.
In Proceedings of the ACM/IEEE Joint Conference on Digital
Libraries, page 396, 2005.
- [94]
- T. Roscoe.
33. the PlanetLab platform.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 3485
LNCS:567–629, 2005.
(doi:10.1007/11530657-33)
- [95]
- J. Rountree, N. Rountree,
A. Robins, and R. Hannah.
Observations of student competency in a CS1 course.
In Conferences in Research and Practice in Information Technology
Series, volume 42, pages 145–149, 2005.
- [96]
- Janet Rountree, Nathan
Rountree, Anthony Robins, and Robert Hannah.
Observations of student competency in a CS1 course.
In CRPIT '42: Proceedings of the 7th Australian conference on Computing
education, pages 145–149, Darlinghurst, Australia, Australia, 2005.
Australian Computer Society, Inc.
- [97]
- Carmine
Sellitto.
The impact of impermanent
web-located citations: A study of 123 scholarly conference publications.
Journal of the American Society for Information Science and
Technology, 56(7):695–703, May 2005.
(doi:10.1002/asi.20159)
- [98]
- Ali
A. Nazari Shirehjini.
PECO:
3D-based interaction with a UPnP meeting room.
In A. Ferscha, R. Mayrhofer,
T. Strang, C. Linnhoff-Popien,
A. Dey, A. Butz, and A. Schmidt,
editors, Advances in Pervasive Computing: Adjunct Proceedings of the
Third International Conference on Pervasive Computing. Vol. 191, pages
105–108. Austrian Computer Society (OCG), May 2005.
- [99]
- S. Sidiroglou, J. Ioannidis,
A. D. Keromytis, and Stolfo S.J.
An email worm vaccine architecture.
In Information Security Practice and Experience, pages 97–108.
Springer Verlag, 2005.
LNCS 3439.
- [100]
- S. Smith and R. Jamieson.
Key factors in e-government information system security.
In 18th Bled eConference: eIntegration in Action. Bled eCommerce
Conference, 2005.
- [101]
- S. Smith.
Key factors in egovernment information system security.
In Proceedings of the 18th Bled eConference — eIntegration in
Action, 2005.
- [102]
- K. Staring, O. Titlestad, and
J. Gailis.
Educational
transformation through open source approaches.
In Information Systems Research Seminar in Scandinavia (IRIS 28),
April 2005.
- [103]
- H. Stuckenschmidt,
W. Siberski, and W. Nejdl.
Combining ontologies and peer-to-peer technologies for inter-organizational
knowledge management.
Learning Organization, 12(5):480–491, 2005.
(doi:10.1108/09696470510611429)
- [104]
- Alex S. Taylor and Laurel
Swan.
Artful systems in the home.
In CHI '05: Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems, pages 641–650, New York, NY, USA, 2005. ACM Press.
(doi:10.1145/1054972.1055060)
- [105]
- A.S.
Taylor and L. Swan.
Artful systems in the home.
In Conference on Human Factors in Computing Systems, pages
641–650, 2005.
- [106]
- W. Teepe.
Integrity and dissemination control in administrative applications through
information designators.
Computer Systems Science and Engineering, 20(5):377–386,
2005.
- [107]
- H. Toba.
A tight flow control for job-shop fabrication lines with finite buffers.
IEEE Transactions on Automation Science and Engineering,
2(1):78–83, 2005.
(doi:10.1109/TASE.2004.829440)
- [108]
- M. Torchiano, F. Ricca, and
P. Tonella.
A comparative study on the re-documentation of existing software: Code
annotations vs. drawing editors.
In 2005 International Symposium on Empirical Software Engineering, ISESE
2005, pages 277–286, 2005.
(doi:10.1109/ISESE.2005.1541836)
- [109]
- C.-M.
Tsai, A. Qamra, E.Y. Chang, and
Y.-F. Wang.
EXTENT: Inferring image metadata from context and content.
In IEEE International Conference on Multimedia and Expo, ICME
2005, volume 2005, pages 1270–1273, 2005.
(doi:10.1109/ICME.2005.1521660)
- [110]
- T. Tsiakis and
G. Stephanides.
The concept of security and trust in electronic payments.
Computers and Security, 24(1):10–15, 2005.
(doi:10.1016/j.cose.2004.11.001)
- [111]
- B. Vassiliadis, J. Tsaknakis,
L. Drossos, S. Sirmakessis, and
K. Ioannou.
Providing service standardisation for virtual enterprises.
WSEAS Transactions on Circuits and Systems, 4(11):1545–1552,
2005.
- [112]
- Michael A.
Veronin.
One step forward, two steps back: The world wide web as an information
resource.
Pharmacy Education, 5(3–4):209–214, 2005.
(doi:10.1080/15602210500330175)
- [113]
- K. Votis, B. Vassiliadis,
J. Tsaknakis, A. Stefani,
K. Ioannou, and L. Drossos.
An architecture for mobile-health care service provision.
WSEAS Transactions on Computers, 4(11):1502–1509, 2005.
- [114]
- T. Waring and P. Maddocks.
Open source software implementation in the uk public sector: Evidence from the
field and implications for the future.
International Journal of Information Management, 25(5):411–428,
2005.
(doi:10.1016/j.ijinfomgt.2005.06.002)
- [115]
- Matt Webster.
Algebraic
specification of computer viruses and their environments.
In Peter Mosses, John Power, and
Monika Seisenberger, editors, Selected Papers from the
First Conference on Algebra and Coalgebra in Computer Science Young
Researchers Workshop (CALCO-jnr 2005). University of Wales Swansea Computer
Science Report Series CSR 18-2005, pages 99–113, 2005.
- [116]
- Peter
Weiss, Matthias Rott, and Jurgen Weisheit.
Facilitate successful cross-organisational business processes — a business
case.
In Paul Cunningham and Miriam Cunningham,
editors, Innovation and the Knowledge Economy: Issues, Applications,
Case Studies. IOS Press, Amsterdam, 2005.
- [117]
- David A.
Wheeler.
Countering trusting
trust through diverse double-compiling.
In 21st Annual Computer Security Applications Conference, December
2005.
- [118]
- G. O. Wimmel.
Model-based Development of Security-Critical Systems.
PhD thesis, Technische Universität München, June 2005.
- [119]
- Jonathan D.
Wren.
Open access and openly accessible: a study of scientific publications shared
via the internet.
British Medical Journal, 330(7500):1128–1131, 2005.
- [120]
- Yi Wu,
Edward Y. Chang, and Belle L. Tseng.
Multimodal metadata fusion using causal strength.
In MULTIMEDIA '05: Proceedings of the 13th annual ACM international
conference on Multimedia, pages 872–881, New York, NY, USA, 2005. ACM
Press.
(doi:10.1145/1101149.1101338)
- [121]
- X. Xu,
V.V. Phoha, A. Ray, and
S. Phoha.
Supervisory control of malicious executables in software processes.
Quantitative Measure for Discrete Event Supervisory Control, pages
239–259, 2005.
(doi:10.1007/0-387-23903-0_9)
- [122]
- J.-S.
Yin, F. Pinel, Y.-H. Liu, and
T. Chieu.
Pervasive computing technologies for retail in-store shopping.
In Proceedings — International Conference on Pervasive Services, ICPS
'05, volume 2005, pages 111–116, 2005.
(doi:10.1109/PERSER.2005.1506399)
- [123]
- Yves
Younan, Wouter Joosen, and Frank Piessens.
A methodology for
designing countermeasures against current and future code injection
attacks.
In Proceedings of the Third IEEE International Information Assurance
Workshop 2005 (IWIA2005). IEEE, March 2005.
- [124]
- Andy Zaidman and Serge
Demeyer.
Mining
ArgoUML with dynamic analysis to establish a set of key classes for program
comprehension.
In Proceedings of the 6th International Workshop on OO
ReengineeringWorkshop on Challenges in Software Evolution, July
2005.
- [125]
- A. Zaidman, T. Calders,
S. Demeyer, and J. Paredaens.
Applying webmining techniques to execution traces to support the program
comprehension process.
In Proceedings of the European Conference on Software Maintenance and
Reengineering, CSMR, pages 134–142, 2005.
(doi:10.1109/CSMR.2005.12)
- [126]
- Uwe Zdun.
Concepts
for model-driven design and evolution of domain-specific languages.
In OOPSLA 2005—International Workshop on Software Factories,
October 2005.
- [127]
- Zuo Z.H.,
Zhu Q.X., and Zhou M.T.
On the time complexity of computer viruses.
IEEE Transactions on Information Theory, 51(8):2962–2966, August
2005.
(doi:10.1109/TIT.2005.851780)
- [128]
- C. Zhang and C. Phoebe.
Mining inconsistent secure messages towards analyzing security protocols.
International Journal of Intelligent Control and Systems,
10(1):77–85, 2005.
- [129]
- L. Zhang, J. Yin, and
J. Long.
Formal analysis of fairness of the ZG protocol.
In P. Georgiadis, S. Gritzalis, and
Y. Marias, editors, Proceedings of the 1st IEEE
International Conference on Pervasive Services ICPS 2005 — Workshop on
Security, Privacy, and Trust in Pervasive and Ubiquitous Computing
SecPerU'05, pages 111–118, 2005.
- [130]
- M. Zhao.
Performance Evaluation of Distributed security protocols using discrete
event simulation.
PhD thesis, Dartmouth College, 2005.
- [131]
- John Zimmerman and
Kursat Fatih Ozenc.
Exploring
social relationships between smart homes and their occupants.
In CHI 2005—W15: First International Workshop on Social Implications of
Uniquitous Computing. ACM, April 2005.