- [1]
- E. Aarts and
J. Encarnação.
True visions: The emergence of ambient intelligence.
Springer Berlin Heidelberg, 2006.
(doi:10.1007/978-3-540-28974-6)
- [2]
- M. Abdullah, M. Othman, and
R. Johari.
An improved simulated annealing algorithm to avoid crosstalk in optical omega
network.
In 2006 International Conference on Computing and Informatics, ICOCI
'06, 2006.
(doi:10.1109/ICOCI.2006.5276543)
- [3]
- A.A.
Abimbola, J.M. Munoz, and W.J. Buchanan.
Nethost-sensor: Monitoring a target host's application via system calls.
Information Security Technical Report, 11(4):166–175, 2006.
(doi:10.1016/j.istr.2006.10.003)
- [4]
- N. Abu-Ghazaleh and M.J.
Lewis.
Short paper: Toward self organizing grids.
In Proceedings of the IEEE International Symposium on High Performance
Distributed Computing, volume 2006, pages 324–327, 2006.
- [5]
- J. Abu Qudeiri, H. Yamamoto,
and M.A. Jamali.
Buffer size decision for balanced and unbalanced flexible transfer line with
rework paths.
In ICPMT2006 — Progress of Machining Technology — Proceedings of the
8th International Conference on Progress of Machining Technology,
pages 77–80, 2006.
- [6]
- R. Agrawal, A. Cheung,
K. Kailing, and S. Schönauer.
Towards traceability across sovereign, distributed rfid databases.
In IDEAS: Proceedings of the International Database Engineering and
Applications Symposium, pages 174–184, 2006.
(doi:10.1109/IDEAS.2006.47)
- [7]
- Neta Aizenbud-Reshef and Gabi
Zodik.
Coverage
analysis of message flows.
United States Patent 7,137,103, November 2006.
Assignee: International Business Machines Corporation (Armonk, NY).
- [8]
- R. Akavipat, L.-S. Wu,
F. Menczer, and A.G. Maguitman.
Emerging semantic communities in peer web search.
In P2PIR 2006: International Workshop on Information Retrieval in
Peer-to-Peer Networks, pages 1–8, 2006.
(doi:10.1145/1183579.1183581)
- [9]
- Ruo Ando,
Nguyen Anh Quynh, and Yoshiyasu Takefuji.
Faster
resolution based metamorphic virus detection using ATP control
strategy.
WSEAS Transactions on Information Science and Applications,
3(2):260–226, February 2006.
- [10]
- E. Balland, C. Kirchner, and
P.-E. Moreau.
Formal islands.
In Algebraic Methodology and Software Technology, pages 51–65.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 4019.
(doi:10.1007/11784180_7)
- [11]
- U. Basters and M. Klusch.
RS2D: Fast adaptive search for semantic web services in unstructured P2P
networks.
In 5th International Semantic Web Conference — ISWC '06, pages
87–100, 2006.
Lecture Notes in Computer Science 4273.
(doi:10.1007/11926078_7)
- [12]
- A.S.
Baumgart, H. Knapp, and M. Schader.
Mobile semantic data exchange in ad hoc networks using distributed profiles.
In 2006 1st International Symposium on Wireless Pervasive
Computing, volume 2006, pages 1–6, January 2006.
(doi:10.1109/ISWPC.2006.1613649)
- [13]
- Douglas D. Beattie, Neal Lewis
Creighton, Jr., Christopher T. M. Bailey,
David L. Remy, and Hani Hamandi.
Methods
and systems for automated authentication, processing and issuance of digital
certificates.
United States Patent 7,003,661, February 2006.
Assignee: Geotrust, Inc. (Needham, MA).
- [14]
- Douglas Beattie, Neal
Creighton, Jr., Christopher Bailey, David
Remy, and Hani Hamandi.
Methods
and systems for automated authentication, processing and issuance of digital
certificates.
United States Patent 7,120,929, October 2006.
Assignee: GeoTrust, Inc. (Wellesley Hills, MA).
- [15]
- M.V.
Belmonte, R. Conejo, M. Díaz, and
J.L. Pérez-de-la Cruz.
Coalition formation in P2P file sharing systems.
In Current Topics in Artificial Intelligence, pages 153–162,
2006.
Lecture Notes in Computer Science 4177.
(doi:10.1007/11881216_17)
- [16]
- Y. Ben-Asher and
S. Berkovsky.
Semantic data management in peer-to-peer e-commerce applications.
Journal on Data Semantics, VI:115–142, 2006.
Lecture Notes in Computer Science 4090.
(doi:10.1007/11803034_6)
- [17]
- P. Beritelli and
M. Schuppisser.
Challenges in mobile business solutions for tourist destinations - the trial
case of St. Moritz.
Journal of Quality Assurance in Hospitality and Tourism,
6(3-4):147–162, 2006.
(doi:10.1300/J162v06n03_09)
- [18]
- J.D. Bitzer and P.J.H.
Schröder.
The impact of entry and competition by open source software on innovation
activity.
In The Economics of Open Source Software Development, pages
219–246. Elsevier, 2006.
(doi:10.1016/B978-044452769-1/50011-1)
- [19]
- Stephen M. Blackburn, Robin
Garner, Chris Hoffmann, Asjad M. Khang,
Kathryn S. McKinley, Rotem Bentzur,
Amer Diwan, Daniel Feinberg,
Daniel Frampton, Samuel Z. Guyer,
Martin Hirzel, Antony Hosking,
Maria Jump, Han Lee, J. Eliot,
B. Moss, Aashish Phansalkar,
Darko Stefanović, Thomas VanDrunen,
Daniel von Dincklage, and Ben Wiedermann.
The DaCapo benchmarks: Java benchmarking development and analysis.
ACM SIGPLAN Notices, 41(10):169–190, 2006.
OOPSLA '06: Proceedings of the 21st Annual ACM SIGPLAN Conference on
Object-Oriented Programming Languages, Systems, and Applications.
(doi:10.1145/1167515.1167488)
- [20]
- C. Bock
and D. Zuehlke.
Model-driven HMI development - can meta-case tools relieve the pain?
In ICSOFT 2006 - 1st International Conference on Software and Data
Technologies, Proceedings, volume 2, pages 312–319, 2006.
- [21]
- M. Bromba and S. Wetzel.
Biometrics and authentication.
In Phishing and Countermeasures: Understanding the Increasing Problem of
Electronic Identity Theft, pages 369–460. John Wiley & Sons, Inc.,
2006.
(doi:10.1002/9780470086100.ch10)
- [22]
- J. Buford, R. Kumar, and
G. Perkins.
Composition trust bindings in pervasive computing service composition.
In Proceedings — Fourth Annual IEEE International Conference on
Pervasive Computing and Communications Workshops, PerCom Workshops
2006, volume 2006, pages 261–266, 2006.
(doi:10.1109/PERCOMW.2006.31)
- [23]
- A.A. Bulgak.
Analysis and design of split and merge unpaced assembly systems by
metamodelling and stochastic search.
International Journal of Production Research,
44(18-19):4067–4080, 2006.
(doi:10.1080/00207540600564625)
- [24]
- M.S.E.
Burgess, O. Allam, W.A. Gray, and
A. Al-Busaidi.
Patient-centred approach to focusing online health information search results.
In International Symposium on Electronic Personal Health Records 2006,
ISePHR 2006, volume 219, 2006.
- [25]
- Y. Cardenas, J.-M. Pierson,
and L. Brunie.
Temporal storage space for grids.
In High Performance Computing and Communications, pages 803–812,
2006.
Lecture Notes in Computer Science 4208.
(doi:10.1007/11847366_83)
- [26]
- Jeffrey
Carver, Forrest Shull, and Victor Basili.
Can observational techniques help novices overcome the software inspection
learning curve? an empirical investigation.
Empirical Softw. Engg., 11(4):523–539, 2006.
(doi:10.1007/s10664-006-9021-5)
- [27]
- S. Castano and S. Montanelli.
Enforcing a semantic routing mechanism based on peer context matching.
In 2nd International Workshop on Contexts and Ontologies: Theory,
Practice and Applications, C and O 2006 - Collocated with the 17th European
Conference on Artificial Intelligence, ECAI 2006, volume 210,
2006.
- [28]
- S. Castano, A. Ferrara, and
S. Montanelli.
A matchmaking-based ontology evolution methodology?
In CEUR Workshop Proceedings, volume 200, 2006.
- [29]
- M. Choi.
Exploring requirements for e-learning professionals.
In ICE-B 2006 - International Conference on e-Business,
Proceedings, pages 323–326, 2006.
- [30]
- Mohamed R. Chouchane and Arun
Lakhotia.
Using engine signature to detect metamorphic malware.
In WORM '06: Proceedings of the 4th ACM workshop on Recurring
malcode, pages 73–78, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1179542.1179558)
- [31]
- T.-Y.
Chung, Y.-H. Chang, K.-H. Chen, and
Y.-M. Chen.
On high performance file distribution over peer-to-peer networks.
In Proceedings of the 10th IASTED International Conference on Internet
and Multimedia Systems and Applications, IMSA 2006, pages 158–165,
2006.
- [32]
- Bas
Cornelissen, Arie van Deursen, and Leon
Moonen.
Aiding in the comprehension of testsuites.
In Andy Zaidman, Abdelwahab Hamou-Lhadj, and
Orla Greevy, editors, Proceedings of the 2nd Workshop on
Program Comprehension through Dynamic Analysis (PCODA'06), pages
17–20. Universiteit Antwerpen, 2006.
- [33]
- A.F.
Da Silva and V.S. Costa.
Our
experiences with optimizations in Sun's java just-in-time compilers.
Journal of Universal Computer Science, 12(7):788–810, 2006.
- [34]
- V. Darlagiannis, O. Heckmann,
and R. Steinmetz.
Peer-to-peer applications beyond file sharing: Overlay network requirements and
solutions.
Elektrotechnik und Informationstechnik, 123(6):242–250, 2006.
(doi:10.1007/s00502-006-0345-z)
- [35]
- S. Datta, C. Giannella, and
H. Kargupta.
K-means clustering over a large, dynamic network.
In Proceedings of the Sixth SIAM International Conference on Data
Mining, pages 153–164, 2006.
- [36]
- Sergio
de Cesare, Mark Geoffrey Lycett, and
Robert Duncan Macredie.
Development
of component-based information systems: An introduction.
In Development of Component-Based Information Systems, Advances in
Management Information Systems, chapter 1, pages 3–20. M. E. Sharpe,
2006.
- [37]
- Adriaan de Groot, Sebastian
Kügler, Paul Adams, and Georgios Gousios.
Call
for quality: Open source software quality observation.
In Proceedings of the Second International Conference on Open Source
Systems, June 2006.
- [38]
- V. Dimopoulos and S. Furnell.
A protection profiles approach to risk analysis for small and medium
enterprises.
IFIP International Federation for Information Processing, 193,
2006.
- [39]
- C. Duma,
M. Karresand, N. Shahmehri, and
G. Caronni.
A trust-aware, P2P-based overlay for intrusion detection.
In 17th International Conference on Database and Expert Systems
Applications, DEXA 2006, pages 692–697, 2006.
- [40]
- Holger
Eichelberger.
On
class diagrams, crossings and metrics.
In Michael Jünger, Stephen Kobourov, and
Petra Mutzel, editors, Graph Drawing, number
05191 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und
Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany,
2006.
- [41]
- Eric
Filiol, Marko Helenius, and Stefano Zanero.
Open problems in computer virology.
Journal in Computer Virology, 1(3):55–66, 2006.
(doi:10.1007/s11416-005-0008-3)
- [42]
- M.H.
Firooz, K. Ronasi, M.R. Pakravan, and
A.N. Avanaki.
A novel multi-sender algorithm based on multi-cast concept for P2P networks.
In 2006 International Symposium on Communications and Information
Technologies, ISCIT, pages 143–147, 2006.
(doi:10.1109/ISCIT.2006.339904)
- [43]
- Daniel
Gomes and Mário J. Silva.
Modelling information persistence on the web.
In ICWE '06: Proceedings of the 6th international conference on Web
engineering, pages 193–200, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1145581.1145623)
- [44]
- Daniel
Gomes, André L. Santos, and Má J.
Silva.
Managing duplicates in a web archive.
In SAC '06: Proceedings of the 2006 ACM Symposium on Applied
Computing, pages 818–825, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1141277.1141465)
- [45]
- M. Gordon.
Small-scale peer-to-peer overlays.
Operating Systems Review, 40(3):45–48, 2006.
(doi:10.1145/1151374.1151385)
- [46]
- L. Guo,
S. Yang, J. Wang, and J. Zhou.
A distributed trust model based on vector space in p2p networks.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
43(9):1564–1570, 2006.
(doi:10.1360/crad20060912)
- [47]
- Maria Håkansson, Lalya
Gaye, Sara Ljungblad, and Lars Erik Holmquist.
More than meets the eye: an exploratory study of context photography.
In NordiCHI '06: Proceedings of the 4th Nordic conference on
Human-computer interaction, pages 262–271, New York, NY, USA, 2006.
ACM Press.
(doi:10.1145/1182475.1182503)
- [48]
- S. T.
Halkidis, A. Chatzigeorgiou, and
G. Stephanides.
A practical evaluation
of security patterns.
In 6th International Conference on Artificial Intelligence and Digital
Communications (AIDC'2006), August 2006.
- [49]
- S.T.
Halkidis, A. Chatzigeorgiou, and
G. Stephanides.
Quantitative evaluation of systems with security patterns using a fuzzy
approach.
In Robert Meersman, Zahir Tari, and
Pilar Herrero, editors, On the Move to Meaningful
Internet Systems 2006, pages 554–564, 2006.
Lecture Notes in Computer Science 4277.
- [50]
- S. Hao,
Z. Yanchun, Z. Jingyuan,
E. Beal, and N. Moustakas.
Collaborative peer-to-peer service for information sharing using JXTA.
In First International Multi-Symposiums on Computer and Computational
Sciences, IMSCCS'06, pages 552–559, 2006.
(doi:10.1109/IMSCCS.2006.45)
- [51]
- E. Harjula, J. Ala-Kurikka,
D. Howie, and M. Ylianttila.
Analysis of peer-to-peer sip in a distributed mobile middleware system.
In GLOBECOM - IEEE Global Telecommunications Conference, 2006.
(doi:10.1109/GLOCOM.2006.190)
- [52]
- T.L.
Harrison and M.L. Nelson.
Just-in-time recovery of missing web pages.
In Proceedings of the Seventeenth ACM Conference on Hypertext and
Hypermedia, HT'06, volume 2006, pages 145–156, 2006.
(doi:10.1145/1149941.1149971)
- [53]
- Z.-W.
Hong, J.-M. Lin, H.C. Jiau,
G.-M. Fang, and C.W. Chiou.
Encapsulating windows-based software applications into reusable components with
design patterns.
Information and Software Technology, 48(7):619–629, 2006.
(doi:10.1016/j.infsof.2005.06.005)
- [54]
- M. Huang, L. Yang, and
Y. Yang.
A development process for building oss-based applications.
In Unifying the Software Process Spectrum, pages 122–135.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 3840.
(doi:10.1007/11608035_13)
- [55]
- Y. Huang, B. Jin, and
J. Cao.
A
distributed approach to construction of topology mismatching aware P2P
overlays in wireless ad hoc networks.
In Proceedings — 14th Euromicro International Conference on Parallel,
Distributed, and Network-Based Processing, PDP 2006, volume 2006,
pages 340–347, 2006.
(doi:10.1109/PDP.2006.9)
- [56]
- B. Hughes.
Link? rot. URI citation durability in 10 years of AusWeb proceedings.
In AusWeb 2006: 12th Australasian World Wide Web Conference,
2006.
- [57]
- M. Hussain and D. Seret.
A comparative study of security protocols validation tools: HERMES vs.
AVISPA.
In 8th International Conference Advanced Communication Technology, ICACT
2006 — Proceedings, pages 303–308, 2006.
- [58]
- F. Ichihashi, Y. Sankai, and
S. Kuno.
Development of secure data management server for ehealth promotion system.
International Journal of Sport and Health Science, 4:617–627,
2006.
- [59]
- S. Jieun and C. Myungae.
An approach to realization and security provision of intelligent u-healthcare
service.
In Proceedings — 2006 International Conference on Hybrid Information
Technology, ICHIT 2006, pages 462–467, 2006.
(doi:10.1109/ICHIT.2006.253527)
- [60]
- S. Jieun and C. Myungae.
SHOES: Secure healthcare oriented environement service model.
In IEEE 2006 Biomedical Circuits and Systems Conference Healthcare
Technology, BioCAS 2006, pages 89–93, 2006.
(doi:10.1109/BIOCAS.2006.4600315)
- [61]
- D.W.
Johnson and H. Koch.
Computer security risks in the internet era: Are small business owners aware
and proactive?
In Proceedings of the Annual Hawaii International Conference on System
Sciences, volume 6, 2006.
(doi:10.1109/HICSS.2006.91)
- [62]
- Yiannis Kanellopoulos, Thimios
Dimopulos, Christos Tjortjis, and Christos
Makris.
Mining source code elements for comprehending object-oriented systems and
evaluating their maintainability.
ACM SIGKDD Explorations Newsletter, 8(1):33–40, 2006.
(doi:10.1145/1147234.1147240)
- [63]
- I. Kang, H. Kim,
S. Choi, M. Baik, and C. Hwang.
Multi-node global directory construction in peer-to-peer systems.
In Proceedings - International Conference on Advanced Information
Networking and Applications, AINA, volume 1, pages 713–718, 2006.
(doi:10.1109/AINA.2006.236)
- [64]
- D. Kelly,
P. Finnegan, and J. Feller.
Open vs. closed standards for ambient intelligence: An exploratory study of
adoption.
In Proceedings of the 14th European Conference on Information Systems,
ECIS 2006, 2006.
- [65]
- T. Khatiwala, R. Swaminathan,
and V.N. Venkatakrishnan.
Data sandboxing: A technique for enforcing confidentiality policies.
In ACSAC: Annual Computer Security Applications Conference, pages
223–232, 2006.
(doi:10.1109/ACSAC.2006.22)
- [66]
- J.W. Kim
and S. Du.
Design for an interactive television advertising system.
In Proceedings of the Annual Hawaii International Conference on System
Sciences, volume 2, page 47, 2006.
(doi:10.1109/HICSS.2006.116)
- [67]
- J. Kim and
S. Wu.
Design for an interactive television advertising system.
In Proceedings of the 39th Hawaii Int. Conf. on System Sciences
(HICSS-39), January 2006.
- [68]
- Doo Yeon
Kim, Jong Bae Kim, and Sung Yul Rhew.
Effective reuse procedure for open source software.
In Software Engineering Research and Practice, pages 163–167.
CSREA Press, 2006.
- [69]
- J. Kim,
H. Kim, and K. Park.
Towards optimal navigation through video content on interactive TV.
Interacting with Computers, 18(4):723–746, 2006.
(doi:10.1016/j.intcom.2005.11.011)
- [70]
- V. King,
J. Saia, V. Sanwalani, and
E. Vee.
Towards secure and scalable computation in peer-to-peer networks.
In Proceedings - Annual IEEE Symposium on Foundations of Computer
Science, FOCS, pages 87–96, 2006.
(doi:10.1109/FOCS.2006.77)
- [71]
- R. Kolb,
D. Muthig, T. Patzke, and
K. Yamauchi.
Refactoring a legacy component for reuse in a software product line: A case
study.
Journal of Software Maintenance and Evolution, 18(2):109–132,
2006.
(doi:10.1002/smr.329)
- [72]
- Benjamin N. Lee, Wen-Yen
Chen, and Edward Y. Chang.
A scalable service for photo annotation, sharing, and search.
In MULTIMEDIA '06: Proceedings of the 14th annual ACM international
conference on Multimedia, pages 699–702, New York, NY, USA, 2006. ACM
Press.
(doi:10.1145/1180639.1180787)
- [73]
- E.K.
Lee, S. Maheshwary, J. Mason, and
W. Glisson.
Decision support system for mass dispensing of medications for infectious
disease outbreaks and bioterrorist attacks.
Annals of Operations Research, 148(1):25–53, 2006.
(doi:10.1007/s10479-006-0087-7)
- [74]
- E.K.
Lee, S. Maheshwary, J. Mason, and
W. Glisson.
Large-scale dispensing for emergency response to bioterrorism and
infectious-disease outbreak.
Interfaces, 36(6):591–607, 2006.
(doi:10.1287/inte.1060.0257)
- [75]
- Kyoung Jun
Lee, Mu Jeong Jeong, and Jeong-In Ju.
Seamlessness and privacy enhanced ubiquitous payment.
In E-Commerce and Web Technologies, pages 142–151, 2006.
Lecture Notes in Computer Science 4082.
(doi:10.1007/11823865_15)
- [76]
- Kyoung Jun Lee, Jeong-In Ju,
and Jeong Mu Jeong.
A payment & receipt business model in U-commerce environment.
In ICEC '06: Proceedings of the 8th international conference on
Electronic commerce, pages 319–324, New York, NY, USA, 2006. ACM
Press.
(doi:10.1145/1151454.1151507)
- [77]
- W. Li,
L.-C. Lam, and T.-C. Chiueh.
How to automatically and accurately sandbox Microsoft IIS.
In Proceedings - Annual Computer Security Applications Conference,
ACSAC, pages 213–222, 2006.
(doi:10.1109/ACSAC.2006.31)
- [78]
- Zude Li,
Guoqiang Zhan, and Xiaojun Ye.
Role-based peer-to-peer model: Capture global pseudonymity for privacy
protection.
In Advances in Web-Age Information Management, pages 193–204.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 4016.
(doi:10.1007/11775300_17)
- [79]
- C.-C.
Liang, C.-H. Wang, H. Luh, and
P.-Y. Hsu.
A robust web-based approach for broadcasting downward messages in a
large-scaled company.
In Web Information Systems — WISE 2006, pages 222–233, 2006.
Lecture Notes in Computer Science 4255.
(doi:10.1007/11912873_24)
- [80]
- N. Liebau, O. Heckmann,
A. Kovacevic, A. Manthe, and
R. Steinmetz.
Charging in peer-to-peer systems based on a token accounting system.
In Burkhard Stiller, Peter Reichl, and
Bruno Tuffin, editors, Performability Has its Price, 5th
International Workshop on Internet Charging and QoS Technologies, ICQT 2006,
St. Malo, France, June 27, 2006, Proceedings, pages 49–60.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 4033.
(doi:10.1007/11780502_6)
- [81]
- A. Lioy,
M. Marian, N. Moltchanova, and
M. Pala.
PKI past, present and future.
International Journal of Information Security, 5(1):18–29, 2006.
(doi:10.1007/s10207-005-0077-9)
- [82]
- Y.-J.
Liu, H.-Y. Zhang, W.-H. Dou, and
J.-F. Chen.
Data allocation algorithms in layered P2P streaming.
Ruan Jian Xue Bao/Journal of Software, 17(2):325–332, 2006.
(doi:10.1360/jos170325)
- [83]
- Z. Liu,
H. Yu, D. Kundur, and
M. Merabti.
On peer-to-peer multimedia content access and distribution.
In 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 -
Proceedings, pages 557–560, 2006.
(doi:10.1109/ICME.2006.262469)
- [84]
- S.-H. Lo,
C.-C. Lin, and M.-S. Chen.
Controlling digital TV set-top box with mobile devices via an IP network.
IEEE Transactions on Consumer Electronics, 52(3):935–942, 2006.
(doi:10.1109/TCE.2006.1706491)
- [85]
- C. Loebbecke, S. Radtke, and
C. Huyskens.
Innovative media technologies: Digital video recorders changing the ad-TV
business model.
In Association for Information Systems - 12th Americas Conference On
Information Systems, AMCIS 2006, volume 3, pages 1780–1786,
2006.
- [86]
- W. Lohmann, G. Riedewald, and
T. Tuhlke.
A
light-weight infrastructure to support experimenting with heterogeneous
transformations.
In .NET Technologies 2006: 4th International Conference,
2006.
- [87]
- W. Maass and A. Filler.
Towards an infrastructure for semantically annotated physical products.
In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36.
Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 2,
pages 544–549, 2006.
- [88]
- Wolfgang Maass and Andreas
Filler.
Towards an
infrastructure for semantically annotated physical products.
In Christian Hochberger and Rüdiger
Liskowsky, editors, Informatik 2006 — Informatik für Menschen,
Band 2, Beiträge der 36. Jahrestagung der Gesellschaft für Informatik
e.V. (GI), volume 94 of LNI, pages 544–549, 2006.
- [89]
- L. Mannila.
Progress reports and novices' understanding of program code.
In ACM International Conference Proceeding Series, volume 276,
pages 27–31, 2006.
(doi:10.1145/1315803.1315810)
- [90]
- A. Manzalini and
F. Zambonelli.
Towards autonomic and situation-aware communication services: The CASCADAS
vision.
In DIS 2006: IEEE Workshop on Distributed Intelligent Systems —
Collective Intelligence and Its Applications, pages 383–388, 2006.
(doi:10.1109/DIS.2006.71)
- [91]
- I. Martınez-Marchena,
L. Mora-López, and M. Sidrach De Cardona.
A framework for the development of monitoring systems software.
In ICSOFT 2006 - 1st International Conference on Software and Data
Technologies, Proceedings, volume 1, pages 133–138, 2006.
- [92]
- J. Masanés.
Web archiving: Issues and methods.
In Web Archiving, pages 1–53. Springer Berlin Heidelberg, 2006.
(doi:10.1007/978-3-540-46332-0_1)
- [93]
- Rachit Mathur.
Normalizing
metamorphic malware using term rewriting.
Master's thesis, Louisiana at Lafayette, 2006.
- [94]
- N. Matsuki and O. Ryabov.
A component-based software building environment.
In Proceedings of the IASTED International Conference on Software
Engineering, as part of the 24th IASTED International Multi-Conference on
APPLIED INFORMATICS, pages 133–136, 2006.
- [95]
- J. E.
McEneaney.
Agent-based
literacy theory.
Reading Research Quarterly, 41(3):352–371, 2006.
(doi:10.1598/RRQ.41.3.3)
- [96]
- H. Mei,
D.-G. Cao, and F.-Q. Yang.
Development of software engineering: A research perspective.
Journal of Computer Science and Technology, 21(5):682–696, 2006.
(doi:10.1007/s11390-006-0682-8)
- [97]
- Matthias Merdes and Dirk
Dorsch.
Experiences with the development of a reverse engineering tool for UML
sequence diagrams: a case study in modern Java development.
In PPPJ '06: Proceedings of the 4th international symposium on Principles
and practice of programming in Java, pages 125–134, New York, NY,
USA, 2006. ACM Press.
ACM International Conference Proceeding Series 178.
(doi:10.1145/1168054.1168072)
- [98]
- E. Michlmayr, A. Pany, and
S. Graf.
Applying ant-based multi-agent systems to query routing in distributed
environments.
IEEE Intelligent Systems, pages 36–41, 2006.
(doi:10.1109/IS.2006.348390)
- [99]
- E. Michlmayr.
Ant algorithms for search in unstructured peer-to-peer networks.
In 22nd International Conference on Data Engineering Workshops, ICDEW
2006. Institute of Electrical and Electronics Engineers Inc., 2006.
(doi:10.1109/ICDEW.2006.29)
- [100]
- M. Mongiello.
Finite-state verification of the ebXML protocol.
Electronic Commerce Research and Applications, 5(2):147–169,
2006.
(doi:10.1016/j.elerap.2005.09.002)
- [101]
- S. Montanelli.
Emergent communities for semantic collaboration in multi-knowledge
environments: Methods and techniques.
In 13th Doctoral Consortium - Held at the 18th Conference on Advanced
Information Systems, DCCAISE 2006, volume 263, pages 1152–1159.
CEUR-WS, 2006.
- [102]
- J. Močnik, M. Novak,
G. Pipan, and P. Karwaczynski.
A discovery service for very large, dynamic grids.
In e-Science 2006 — Second IEEE International Conference on e-Science
and Grid Computing, 2006.
(doi:10.1109/E-SCIENCE.2006.261147)
- [103]
- Bhasker
Mukerji, Vinod Kumar, and Uma Kumar.
The challenges of adopting
open source software in promoting e-government.
In ICEG '06: International Conference on E-Governance, pages
22–31, 2006.
- [104]
- Maurice Mulvenna, Franco
Zambonelli, Kevin Curran, and Chris Nugent.
Knowledge networks.
In Autonomic Communication, pages 99–114. Springer-Verlag, 2006.
Lecture Notes in Computer Science 3854.
(doi:10.1007/11687818_8)
- [105]
- Martin
Naedele and Thomas E. Koch.
Trust and tamper-proof software delivery.
In SESS '06: Proceedings of the 2006 International Workshop on Software
Engineering for Secure Systems, pages 51–58, New York, NY, USA, 2006.
ACM Press.
(doi:10.1145/1137627.1137636)
- [106]
- N. Nahas, D. Ait-Kadi, and
M. Nourelfath.
A new approach for buffer allocation in unreliable production lines.
International Journal of Production Economics, 103(2):873–881,
2006.
(doi:10.1016/j.ijpe.2006.02.011)
- [107]
- Paul
Nguyen and Robert Chun.
Model driven
development with interactive use cases and UML models.
In Proceedings of The 2006 International Conference on Software
Engineering Research & Practice (SERP'06) and Conference on Programming
Languages & Compilers (PLC'06), pages 534–540, 2006.
- [108]
- M. Obrist, R. Bernhaupt, and
M. Tscheligi.
Users@home: Implications from studying itv.
In 20th International Symposium on Human Factors in
Telecommunication, 2006.
- [109]
- P. Ocenasek and M. Sveda.
An approach to automated design of security protocols.
In Proceedings of the International Conference on Networking,
International Conference on Systems andInternational Conference on Mobile
Communications and Learning Technologies, ICN/ICONS/MCL'06, volume
2006, pages 77–85, 2006.
(doi:10.1109/ICNICONSMCL.2006.47)
- [110]
- S. Ovcharenko, Z. Alibhai,
C. Ng, W.A. Graver, and
D. Sabaz.
Implementation of a wireless distributed intelligent system.
In Proceedings - DIS 2006: IEEE Workshop on Distributed Intelligent
Systems - Collective Intelligence and Its Applications, volume 2006,
pages 207–212, 2006.
(doi:10.1109/DIS.2006.38)
- [111]
- W. Pasman and J. Lindenberg.
Human-agent service matching using natural language queries: system test and
training.
Personal and Ubiquitous Computing, 10(6):393–399, 2006.
(doi:10.1007/s00779-006-0067-6)
- [112]
- J.J. Pazos-Arias,
M. López-Nores, J. García-Duque,
A. Gil-Solla, M. Ramos-Cabrer,
Y. Blanco-Fernández, R.P. Díaz-Redondo,
and A. Fernández-Vilas.
ATLAS: A framework to provide multiuser and distributed t-learning services
over MHP.
Software — Practice and Experience, 36(8):845–869, 2006.
(doi:10.1002/spe.719)
- [113]
- G. Perera and K. Christensen.
Broadcast updates with local look-up search (BULLS): A new peer-to-peer
protocol.
In Proceedings of the Annual Southeast Conference, volume 2006,
pages 124–129, 2006.
(doi:10.1145/1185448.1185477)
- [114]
- T. Perlines Hormann,
K. Wrona, and S. Holtmanns.
Evaluation of certificate validation mechanisms.
Computer Communications, 29(3):291–305, 2006.
(doi:10.1016/j.comcom.2004.12.008)
- [115]
- C. Pescio.
Listen to your tools and materials.
IEEE Software, 23(5):74–80, 2006.
(doi:10.1109/MS.2006.134)
- [116]
- T. Pfeiffer and M.A. Nowak.
Digital cows grazing on digital grounds.
Current Biology, 16(22), 2006.
(doi:10.1016/j.cub.2006.10.011)
- [117]
- Chuck Pheatt.
Network distributed computing using DCEZ.
Journal of Computing Sciences in Colleges, 21(4):9–15, 2006.
- [118]
- F. Qiu,
C. Lin, and H. Yin.
EKM: An efficient key management scheme for large-scale peer-to-peer media
streaming.
In Advances in Multimedia Information Processing — PCM 2006,
pages 395–404, 2006.
Lecture Notes in Computer Science 4261.
(doi:10.1007/11922162_46)
- [119]
- E. Reategui, C. Fruet, and
D.M. Filho.
Evaluating the impact of different virtual characters in product
recommendations.
In Proceedings of the VII Symposium on Human Factors in Computing
Systems, IHC 2006, pages 73–80, 2006.
(doi:10.1145/1298023.1298034)
- [120]
- T. Reiter, E. Kapsammer,
W. Retschitzegger, W. Schwinger, and
M. Stumptner.
A generator framework for domain-specific model transformation languages.
In ICEIS 2006 - 8th International Conference on Enterprise Information
Systems, Proceedings, volume ISAS, pages 27–35, 2006.
- [121]
- Phillip Anthony
Relf.
Source Code Readability Improvement Using Heuristic-Based Dynamic Error
Reporting During Editing.
PhD thesis, University of Technology, Sydney, 2006.
- [122]
- F. Ricca and P. Tonella.
Reverse engineering di sistemi software limiti e potenzialità (reverse
engineering of software systems limits and potential).
Mondo Digitale, 5(3):52–63, 2006.
- [123]
- L. Rodero-Merino,
L. López, A. Fernández, and
V. Cholvi.
A topology self-adaptation mechanism for efficient resource location.
4th International Symposium on Parallel and Distributed Processing and
Applications, ISPA 2006, 4330:660–671, 2006.
- [124]
- K. Ronasi, M.H. Firooz,
M.R. Pakravan, and A.N. Avanaki.
A fast algorithm for construction of minimum delay multicast trees in P2P
networks.
In 2006 International Symposium on Communications and Information
Technologies, ISCIT, pages 137–142, 2006.
(doi:10.1109/ISCIT.2006.339903)
- [125]
- Jonathan B. Rosenberg, John C.
Harrison, David L. Remy, and Neal L. Creighton,
Jr.
Web
site identity assurance.
United States Patent 7,114,177, September 2006.
Assignee: GeoTrust, Inc. (Portland, OR).
- [126]
- C. Roser, M. Nakano, and
M. Tanaka.
Single simulation buffer optimization.
JSME International Journal, Series C: Mechanical Systems, Machine
Elements and Manufacturing, 48(4):763–768, 2006.
(doi:10.1299/jsmec.48.763)
- [127]
- F. Rotar and A. Sluga.
Razvoj generi^cne strukture in programskih modulov elementarnega delovnega
sistema porazdeljenega tiskanja / development of the generic structure and
programming modules of an elementary work system for distributed printing.
Strojniski Vestnik / Journal of Mechanical Engineering,
52(9):599–612, September 2006.
- [128]
- I. Sabuncuoglu, E. Erel, and
Y. Gocgun.
Analysis of serial production lines: Characterisation study and a new heuristic
procedure for optimal buffer allocation.
International Journal of Production Research, 44(13):2499–2523,
2006.
(doi:10.1080/00207540500465535)
- [129]
- Helmut
Salmen.
Method
and apparatus for restricted run-time environment with dynamic user
context.
United States Patent 7,069,275, June 2006.
Assignee: Sun Microsystems, Inc. (Santa Clara, CA).
- [130]
- M. Savsar.
Buffer allocation in serial production lines with preventive and corrective
maintenance operations.
Kuwait Journal of Science and Engineering, 33(2):253–266,
2006.
- [131]
- C. Schmitz and A. Löser.
How to model semantic peer-to-peer overlays?
In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36.
Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1,
pages 12–19, 2006.
- [132]
- Adrian Schröter, Thomas
Zimmermann, Rahul Premraj, and Andreas Zeller.
If your bug database could talk...
In Proceedings of the 5th International Symposium on Empirical Software
Engineering, September 2006.
- [133]
- A. Seshadri, M. Luk,
A. Perrig, L. Van Doorn, and
P. Khosla.
Scuba: Secure code update by attestation in sensor networks.
In WiSE 2006 — Proceedings of the 5th ACM Workshop on Wireless
Security, volume 2006, pages 85–94, 2006.
- [134]
- Arvind Seshadri, Mark Luk,
Adrian Perrig, Leendert van Doorn, and
Pradeep Khosla.
SCUBA: Secure code update by attestation in sensor networks.
In WiSe '06: Proceedings of the 5th ACM workshop on Wireless
Security, pages 85–94, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1161289.1161306)
- [135]
- W. Shi and
Y. Mao.
Performance evaluation of peer-to-peer web caching systems.
Journal of Systems and Software, 79(5):714–726, 2006.
(doi:10.1016/j.jss.2005.08.012)
- [136]
- S. Sidiroglou and A.D.
Keromytis.
Execution transactions for defending against software failures: Use and
evaluation.
International Journal of Information Security, 5(2):77–91, 2006.
(doi:10.1007/s10207-006-0083-6)
- [137]
- S. Simmons, D. Edwards,
N. Wilde, J. Homan, and
M. Groble.
Industrial tools for the feature location problem: An exploratory study.
Journal of Software Maintenance and Evolution, 18(6):457–474,
2006.
(doi:10.1002/smr.338)
- [138]
- S. Smith and R. Jamieson.
Determining key factors in e-government information system security.
Information Systems Management, 23(2):23–32, 2006.
(doi:10.1201/1078.10580530/45925.23.2.20060301/92671.4)
- [139]
- C. Song
and M. Chun.
An approach to realization and security provision ofintelligent U-Healthcare
service.
In Proceedings of the ICHIT'06 2006 Conference on Hybrid Information
Technology, pages 462–467, 2006.
- [140]
- C. Song and V. Sazawal.
Information-hiding URLs for easier website evolution.
In Proceedings of the Eighth IEEE International Symposium on Web Site
Evolution, WSE 2006, pages 95–102, 2006.
(doi:10.1109/WSE.2006.10)
- [141]
- C. Squarr, J. Brunn, and
G. Wirtz.
Adaptive search in a semi-structured peer-to-peer system.
In IEEE International Conference on Computer Systems and
Applications, pages 25–32, 2006.
- [142]
- E. Stavrou and
A. Pitsillides.
Securing mobile healthcare systems based on information classification: DITIS
case study.
In Proceedings of the 4th International Workshop on Security in
Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006, pages
67–79, 2006.
- [143]
- R. Steele
and W. Tao.
An enhanced architecture for mobile retailing.
In ACM International Conference Proceeding Series, volume 270,
2006.
(doi:10.1145/1292331.1292367)
- [144]
- A. Stefani, B. Vassiliadis,
and M. Xenos.
On the quality assessment of advanced e-learning services.
Interactive Technology and Smart Education, 3(3):237–250, 2006.
(doi:10.1108/17415650680001449)
- [145]
- H. Stuckenschmidt,
F. Van Harmelen, W. Siberski, and
S. Staab.
Peer-to -peer and semantic web.
In Semantic Web and Peer-to-Peer: Decentralized Management and Exchange
of Knowledge and Information, pages 1–17. Springer Berlin Heidelberg,
2006.
(doi:10.1007/3-540-28347-1_1)
- [146]
- Miquel Termens.
DOI: The "Big Brother" in the dissemination of scientific documentation.
International Microbiology, 9(2):139–142, 2006.
- [147]
- G.H.
Tolosa, J.A. Peri, and F.R.A. Bordignon.
Peer-to-peer content search supported by a distributed index in a
publication/search model.
Journal of Digital Information Management, 4(3):175–183,
2006.
- [148]
- N. Tomaiuolo.
DOIs, URLs, LoCKSS, and missing links.
Searcher:Magazine for Database Professionals, 14(7):18–23,
2006.
- [149]
- M. Treaster, W. Conner,
I. Gupta, and K. Nahrstedt.
Contagalert: Using contagion theory for adaptive, distributed alert
propagation.
In Proceedings — Fifth IEEE International Symposium on Network
Computing and Applications, NCA 2006, volume 2006, pages 126–133,
2006.
(doi:10.1109/NCA.2006.20)
- [150]
- V. Vaishnavi, A. Vandenberg,
R. Baskerville, and G. Zheng.
TQN: A novel approach to generating information security data.
In 16th Workshop on Information Technologies and Systems, WITS
2006, pages 187–192. Social Science Research Network, 2006.
- [151]
- Gabriel Vanrenen, Sean Smith,
and John Marchesini.
Distributing security-mediated PKI.
International Journal of Information Security, 5(1):3–17, January
2006.
(doi:10.1007/s10207-005-0076-x)
- [152]
- B. Vassiliadis,
V. Fotopoulos, and A.N. Skodras.
Decentralising the digital rights management value chain by means of
distributed license catalogues.
In Artificial Intelligence Applications and Innovations, volume
204 of IFIP International Federation for Information Processing,
pages 689–696. Springer Verlag, 2006.
(doi:10.1007/0-387-34224-9_81)
- [153]
- H. Wada,
J. Suzuki, K. Oba, S. Takada,
and N. Doi.
mTurnpike: A model-driven framework for domain specific software development.
Computer Software, 23(3):158–169, 2006.
- [154]
- Andrew Walenstein, Rachit
Mathur, Mohamed R. Chouchane, and Arun
Lakhotia.
Normalizing metamorphic malware using term rewriting.
In SCAM '06: Proceedings of the Sixth IEEE International Workshop on
Source Code Analysis and Manipulation, pages 75–84, Washington, DC,
USA, 2006. IEEE Computer Society.
(doi:10.1109/SCAM.2006.20)
- [155]
- H. Wang, S. Tan,
S. Tang, D. Yang, and Y. Tong.
File correspondences dictionary construction in multilingual p2p file sharing
systems.
In Ulf Leser, Felix Naumann, and
Barbara A. Eckman, editors, Data Integration in the Life
Sciences, Third International Workshop, DILS 2006, pages 144–152,
July 2006.
Lecture Notes in Computer Science 4097.
(doi:10.1007/11807964_15)
- [156]
- M. Wang, S. Zhang,
J. Zhou, and H. Zhao.
An architecture of semantic desktop data grid.
In Proceedings — 2006 10th International Conference on Computer
Supported Cooperative Work in Design, CSCWD 2006, pages 1082–1087,
2006.
(doi:10.1109/CSCWD.2006.253210)
- [157]
- S.-T.
Wang, J.-L.C. Wu, and C.-Y. Hsu.
Design of a resource advertisement and discovery protocol for large and dense
manets.
Journal of the Chinese Institute of Engineers, Transactions of the
Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch
K'an, 29(7):1161–1171, 2006.
- [158]
- Rainer Wasinger and Wolfgang
Wahlster.
The
anthropomorphized product shelf: Symmetric multimodal interaction with
instrumented environments.
In E.H.L. Aarts and J.L. Encarnaç ao,
editors, True Visions: The Emergence of Ambient Intelligence.
Springer-Verlag, 2006.
- [159]
- S.M. White.
Requirements for distributed mission-critical decision support systems.
In Proceedings of the International Symposium and Workshop on Engineering
of Computer Based Systems, pages 123–129, 2006.
(doi:10.1109/ECBS.2006.61)
- [160]
- K. Wilson and P. Machanick.
SecureTorrent: A security framework for file swarming.
In Advances in Computer Systems Architecture, pages 538–544,
2006.
Lecture Notes in Computer Science 4186.
(doi:10.1007/11859802_55)
- [161]
- Greg Wilson.
Software carpentry: Getting scientists to write better code by making them more
productive.
Computing in Science and Engineering, 8(6):66–69,
November/December 2006.
(doi:10.1109/MCSE.2006.122)
- [162]
- W. Wong
and M. Stamp.
Hunting for metamorphic engines.
Journal in Computer Virology, 2(3):211–229, 2006.
(doi:10.1007/s11416-006-0028-7)
- [163]
- J.D.
Wren, J.E. Grissom, and T. Conway.
E-mail decay rates among corresponding authors in medline.
EMBO Reports, 7(2):122–127, 2006.
(doi:10.1038/sj.embor.7400631)
- [164]
- J.D.
Wren, K.R. Johnson, D.M. Crockett,
L.F. Heilig, L.M. Schilling, and
R.P. Dellavalle.
Uniform resource locator decay in dermatology journals: Author attitudes and
preservation practices.
Archives of Dermatology, 142(9):1147–1152, 2006.
(doi:10.1001/archderm.142.9.1147)
- [165]
- Shlomo Wygodny, Valery
Golender, Ido Ben-Moshe, and Vladimir Andreev.
System
and method for conditional tracing of computer programs.
United States Patent 7,058,928, June 2006.
Assignee: Identify Software Ltd.(IL).
- [166]
- T. Yamakami.
Empirical long-term observation on the mobile web update frequency.
In 2006 IFIP International Conference on Wireless and Optical
Communications Networks, 2006.
(doi:10.1109/WOCN.2006.1666603)
- [167]
- Gang
YANG, Xingshe ZHOU, and Huifang PAN.
Feedback-based
framework of adaptive threads-pool management.
Computer Engineering, 32(5):65–67, 2006.
In Chinese.
- [168]
- Niteen Yemul.
The
tools at hand.
ACM Computing Reviews, 47(2), February 2006.
- [169]
- I. You
and C. Park.
An analysis on the web technologies for dynamically generating web-based user
interfaces in ubiquitous spaces.
In Ulf Leser, Felix Naumann, and
Barbara A. Eckman, editors, Data Integration in the Life
Sciences, Third International Workshop, DILS 2006, pages 639–649,
July 2006.
Lecture Notes in Computer Science 4097.
(doi:10.1007/11807964_65)
- [170]
- X. Zeng,
A.O. Fapojuwo, and R.J. Davies.
Design and performance evaluation of voice activated wireless home devices.
IEEE Transactions on Consumer Electronics, 52(3):983–989, 2006.
(doi:10.1109/TCE.2006.1706497)
- [171]
- H.L.
Zhang, C.H.C. Leung, and G.K. Raikundalia.
Performance analysis of network topologies in agent-based open connectivity
architecture for DSS.
In Proceedings - International Conference on Advanced Information
Networking and Applications, AINA, volume 2, pages 257–261, 2006.
(doi:10.1109/AINA.2006.266)
- [172]
- M. Zhao
and S.W. Smith.
Modeling
and evaluation of certification path discovery in the emerging global
PKI.
In Andrea S. Atzeni and Antonio Lioy, editors,
Public Key Infrastructure, Third European PKI Workshop: Theory and
Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings,
pages 16–30. Springer-Verlag, 2006.
Lecture Notes in Computer Science 4043.
- [173]
- J. Zhou
and M. Wang.
Semantic integration of enterprise information: Challenges and basic
principles.
In The Semantic Web — ASWC 2006, volume 4185 LNCS, pages
219–233, 2006.
Lecture Notes in Computer Science 4185.
(doi:10.1007/11836025_23)