- [1]
- A. Abada,
L. Cui, C. Huang, and H.-H.
Chen.
A novel path selection and recovery mechanism for manets p2p file sharing
applications.
In IEEE Wireless Communications and Networking Conference, WCNC,
pages 3475–3480, 2007.
(doi:10.1109/WCNC.2007.637)
- [2]
- C. Abalde, V.M. Gulías,
and L.M. Castro.
Extending the VoDKA architecture with P2P aggregated content management.
In IEEE Symposium on Computers and Communications, pages
1085–1090, 2007.
(doi:10.1109/ISCC.2007.4381510)
- [3]
- C. Abalde, V.M. Gulías,
and L.M. Castro.
Towards a decentralized and structured network of P2P public information
screens.
In Computer Aided Systems Theory — EUROCAST 2007, pages
217–224, 2007.
Lecture Notes in Computer Science 4739.
(doi:10.1007/978-3-540-75867-9_28)
- [4]
- S. Abiteboul, I. Dar,
R. Pop, G. Vasile, and
D. Vodislav.
EDOS distribution system: A P2P architecture for open-source content
dissemination.
In Open Source Development, Adoption and Innovation, pages
209–215. Springer Verlag, 2007.
IFIP International Federation for Information Processing Volume 234.
(doi:10.1007/978-0-387-72486-7_17)
- [5]
- S.A.
Ajila and D. Wu.
Empirical study of the effects of open source adoption on software development
economics.
Journal of Systems and Software, 80(9):1517–1529, 2007.
(doi:10.1016/j.jss.2007.01.011)
- [6]
- F. Al-Nayadi and J.H.
Abawajy.
An authentication framework for e-health systems.
In ISSPIT 2007 — 2007 IEEE International Symposium on Signal Processing
and Information Technology, pages 616–620, 2007.
(doi:10.1109/ISSPIT.2007.4458207)
- [7]
- P. Alvaro,
D.V. Ryaboy, and D. Agrawal.
Towards scalable architectures for clickstream data warehousing.
In Databases in Networked Information Systems, pages 154–177.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4777.
(doi:10.1007/978-3-540-75512-8_12)
- [8]
- K.G. Anagnostakis, M.B.
Greenwald, S. Ioannidis, and A.D. Keromytis.
COVERAGE: Detecting and reacting to worm epidemics using cooperation and
validation.
International Journal of Information Security, 6(6):361–378,
2007.
(doi:10.1007/s10207-007-0032-z)
- [9]
- R. Ando.
Parallel analysis of polymorphic viral code using automated deduction system.
In Proceedings — SNPD 2007: Eighth ACIS International Conference on
Software Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, volume 2, pages 585–592, 2007.
(doi:10.1109/SNPD.2007.415)
- [10]
- P. Antonellis, D. Antoniou,
Y. Kanellopoulos, C. Makris,
E. Theodoridis, C. Tjortjis, and
N.Tsirakis.
A data mining
methodology for evaluating maintainability according to ISO/IEC-9126
software engineering-product quality standard.
In European Conference on Software Maintenance and Reengineering:
Workshop on System Quality and Maintainability, 2007.
- [11]
- D. Aronsky, S. Madani,
R.J. Carnevale, S. Duda, and M.T.
Feyder.
The prevalence and inaccessibility of internet references in the biomedical
literature at the time of publication.
Journal of the American Medical Informatics Association,
14(2):232–234, 2007.
(doi:10.1197/jamia.M2243)
- [12]
- L. Baillie, P. Fröhlich,
and R. Schatz.
Exploring social TV.
In Proceedings of the International Conference on Information Technology
Interfaces, ITI, pages 215–220, 2007.
(doi:10.1109/ITI.2007.4283773)
- [13]
- J. Bar-Ilan and B.C. Peritz.
The lifespan of "informetrics" on the web: An eight year study
(1998-2006).
In 11th International Conference of the International Society for
Scientometrics and Informetrics, ISSI 2007, pages 52–62. Spanish
Research Council, 2007.
- [14]
- S. Basagiannis, P. Katsaros,
and A. Pombortsis.
Intrusion attack tactics for the model checking of e-commerce security
guarantees.
In Computer Safety, Reliability, and Security, pages 238–251.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4680.
(doi:10.1007/978-3-540-75101-4_22)
- [15]
- A.S.
Baumgart, H. Knapp, P. Suetterlin, and
M. Schader.
A profile-based peer-to-peer RSS information distribution.
In 2007 2nd International Symposium on Wireless Pervasive
Computing, pages 218–223, 2007.
(doi:10.1109/ISWPC.2007.342604)
- [16]
- Kent Beck.
Implementation Patterns.
Addison-Wesley, Boston, MA, 2007.
- [17]
- M. Becker, K. Kuladinithi,
A. Timm-Giel, and C. Görg.
Historical development of the idea of self-organisation in information and
communication technology.
In Understanding Autonomous Cooperation and Control in Logistics: The
Impact of Autonomy on Management, Information, Communication and Material
Flow, pages 45–56. Springer Berlin Heidelberg, 2007.
(doi:10.1007/978-3-540-47450-0_4)
- [18]
- A. Belli, M. Geymonat,
M. Perrero, R. Simeoni, and
M. Badella.
DynamicTV: The long tail applied to broadband-broadcast integration.
In Interactive Digital Television: Technologies and Applications,
pages 1–17. IGI Global, 2007.
(doi:10.4018/978-1-59904-361-6.ch001)
- [19]
- P. Bellini, I. Bruno,
D. Cenni, P. Nesi, and D. Rogai.
P2P architecture for automated B2B cross media content distribution.
In 3rd International Conference on Automated Production of Cross Media
Content for Multi-Channel Distribution, AXMEDIS 2007, pages 105–112,
2007.
(doi:10.1109/AXMEDIS.2007.31)
- [20]
- D. Beneventano,
S. Bergamaschi, F. Guerra, and
M. Vincini.
Querying a super-peer in a schema-based super-peer network.
In Databases, Information Systems, and Peer-to-Peer Computing,
pages 13–25. Springer Verlag, 2007.
Lecture Notes in Computer Science 4125.
(doi:10.1007/978-3-540-71661-7_2)
- [21]
- S. Berkovsky, T. Kuflik, and
F. Ricci.
P2P case storage and retrieval with an unspecified ontology.
Artificial Intelligence Review, 28(3):227–255, 2007.
(doi:10.1007/s10462-009-9100-2)
- [22]
- J. Bitzer and P.J.H.
Schröder.
Open source software, competition and innovation.
Industry and Innovation, 14(5):461–476, 2007.
(doi:10.1080/13662710701711315)
- [23]
- P. Bocciarelli,
A. D'Ambrogio, and M. Angelaccio.
QShare: QoS-enabled description and discovery of services in SOA-based
P2P applications.
In Proceedings of the Workshop on Enabling Technologies: Infrastructure
for Collaborative Enterprises, WET ICE, pages 159–164, 2007.
(doi:10.1109/WETICE.2007.4407144)
- [24]
- C. Bock.
Model-driven HMI development: Can meta-CASE tools do the job?
In Proceedings of the Annual Hawaii International Conference on System
Sciences, 2007.
(doi:10.1109/HICSS.2007.385)
- [25]
- X. Bonnaire and O. Marin.
Recursive replication: A survival solution for structured P2P information
systems to denial of service attacks.
In On the Move to Meaningful Internet Systems 2007: OTM 2007
Workshops, pages 931–940, 2007.
Lecture Notes in Computer Science 4806.
(doi:10.1007/978-3-540-76890-6_19)
- [26]
- M. Bortenschlager, S. Reich,
and G. Kotsis.
An architectural approach to apply the supervisor/worker collaboration pattern
to nomadic workspaces.
In Proceedings of the Workshop on Enabling Technologies: Infrastructure
for Collaborative Enterprises, WET ICE, pages 170–175, 2007.
(doi:10.1109/WETICE.2007.4407146)
- [27]
- M. Brogle,
D. Milic, and T. Braun.
Supporting IP multicast streaming using overlay networks.
In 4th International Conference on Heterogeneous Networking for Quality,
Reliability, Security and Robustness and Workshops, QSHINE '07, 2007.
(doi:10.1145/1577222.1577289)
- [28]
- D. Ch. Buser.
Context-based recommender systems in conventional grocery - an economic
analysis.
In Proceedings of the Annual Hawaii International Conference on System
Sciences, 2007.
(doi:10.1109/HICSS.2007.147)
- [29]
- R. Bye,
K. Luther, S.A. Çamtepe,
T. Alpcan, Ş. Albayrak, and
B. Yener.
Decentralized detector generation in cooperative intrusion detection systems.
In Stabilization, Safety, and Security of Distributed Systems,
pages 37–51. Springer Verlag, 2007.
Lecture Notes in Computer Science 4838.
(doi:10.1007/978-3-540-76627-8_6)
- [30]
- E. Byun,
S. Choi, C. Hwang, and S. Lee.
Survey on reputation management systems in p2p network.
In Proceedings of The 2007 International Conference on Security and
Management, SAM'07, pages 358–364, 2007.
- [31]
- D.R.
Campbell, S.J. Culley, C.A. McMahon, and
F. Sellini.
An approach for the capture of context-dependent document relationships
extracted from Bayesian analysis of users' interactions with information.
Information Retrieval, 10(2):115–141, 2007.
(doi:10.1007/s10791-006-9016-2)
- [32]
- P. Campos and N.J. Nunes.
Practitioner tools and workstyles for user-interface design.
IEEE Software, 24(1):73–80, 2007.
(doi:10.1109/MS.2007.24)
- [33]
- Y. Cardenas, J.-M. Pierson,
and L. Brunie.
Management of a cooperative cache in grids with grid cache services.
Concurrency Computation Practice and Experience,
19(16):2141–2155, 2007.
(doi:10.1002/cpe.1212)
- [34]
- R.J. Carnevale and
D. Aronsky.
The life and death of urls in five biomedical informatics journals.
International Journal of Medical Informatics, 76(4):269–273,
2007.
(doi:10.1016/j.ijmedinf.2005.12.001)
- [35]
- I. Carreras, D. Miorandi, and
I. Chlamtac.
From biology to evolve-able pervasive ICT systems.
In Conference Proceedings — IEEE International Conference on Systems,
Man and Cybernetics, pages 4075–4080, 2007.
(doi:10.1109/ICSMC.2007.4414263)
- [36]
- R. Casallas, O. González,
and N. López.
Dealing with scalability in an event-based infrastructure to support global
software development.
In Trends in Enterprise Application Architecture, pages 100–111.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4473.
(doi:10.1007/978-3-540-75912-6_8)
- [37]
- S. Castano, A. Ferrara, and
S. Montanelli.
P2P routing-by-content on a lightweight community basis.
In On the Move to Meaningful Internet Systems 2007: OTM 2007
Workshops, pages 477–486, 2007.
Lecture Notes in Computer Science 4805.
(doi:10.1007/978-3-540-76888-3_70)
- [38]
- A. Chazapis, G. Tsoukalas,
G. Verigakis, K. Kourtis,
A. Sotiropoulos, and N. Koziris.
Global-scale peer-to-peer file services with DFS.
In IEEE/ACM International Workshop on Grid Computing, pages
251–258, 2007.
(doi:10.1109/GRID.2007.4354140)
- [39]
- J. Chen
and P. Cheng.
A new multi-agent approach to adaptive e-education.
7th IFIP International Conference on e-Business, e-Services, and
e-Society, I3E 2007, 252 VOLUME 2:404–411, 2007.
- [40]
- W. Chen,
J. Li, J. Ma, R. Conradi,
J. Ji, and C. Liu.
A survey of software development with open source components in Chinese
software industry.
In Software Process Dynamics and Agility, pages 208–220. Springer
Verlag, 2007.
Lecture Notes in Computer Science 4470.
(doi:10.1007/978-3-540-72426-1_18)
- [41]
- H. Cho.
An update propagation algorithm for P2P file sharing over wireless mobile
networks.
In Computational Science — ICCS 2007, volume PART 4, pages
753–760. Springer Verlag, 2007.
Lecture Notes in Computer Science 4490.
(doi:10.1007/978-3-540-72590-9_113)
- [42]
- M.-O.
Choi, I.-W. Lee, S.-O. Lee, and
H.-J. Park.
A design and implementation of the contents sharing service on the peer-to-peer
based virtual home platform.
In International Conference on Advanced Communication Technology,
ICACT, volume 3, pages 1853–1856, 2007.
(doi:10.1109/ICACT.2007.358731)
- [43]
- O. Christ,
C. Schroth, and T. Janner.
A hybrid framework for automated and adaptive e-business platforms.
In Proceedings of the 15th European Conference on Information Systems,
ECIS 2007, pages 191–202, 2007.
- [44]
- B.G.
Christensen.
LightPeers: A lightweight mobile P2P platform.
In Proceedings — Fifth Annual IEEE International Conference on
Pervasive Computing and Communications Workshops, PerCom Workshops
2007, pages 132–136, 2007.
(doi:10.1109/PERCOMW.2007.59)
- [45]
- T.-Y.
Chung, Y.-H. Chang, C.-Y. Liu, and
Y.-M. Chen.
SSIF: Stable self-organized infrastructure-based peer-to-peer network.
In International Conference on Advanced Communication Technology,
ICACT, volume 2, pages 1441–1446, 2007.
(doi:10.1109/ICACT.2007.358627)
- [46]
- Horia
Ciocarlie and Lavinia Simon.
Definition of a high level language for real-time distributed systems
programming.
In EUROCON, 2007. The International Conference on "Computer as a
Tool", pages 828–834, 2007.
(doi:10.1109/EURCON.2007.4400651)
- [47]
- H. Ciocarlie.
Programming language for the development of distributed real-time applications
dedicated to embedded systems.
In International MultiConference of Engineers and Computer Scientists
2007, IMECS 2007, pages 540–545, 2007.
- [48]
- Fintan Clear.
SMEs,
electronically-mediated working and data security: cause for concern?.
International Journal of Business Science and Applied Management,
2(2), 2007.
- [49]
- V. Clincy, J. Garrido, and
Y. Nzibo.
A firewall simulation study.
In 2007 International Conference on Communications in Computing, CIC
2007, pages 16–20, 2007.
- [50]
- E. Costa-Montenegro, J.C.
Burguillo-Rial, F.J. Gonzalez-Castano, and
J. Vales-Alonso.
Agent-controlled sharing of distributed resources in user networks.
In Computational Intelligence for Agent-based Systems, pages
29–60. Springer Verlag, 2007.
Studies in Computational Intelligence 72.
(doi:10.1007/978-3-540-73177-1_2)
- [51]
- D.N.
Da Hora, D.F. Macedo, J.M.S. Nogueira, and
G. Pujolle.
Optimizing peer-to-peer content discovery over wireless mobile ad hoc networks.
In Proceedings of the 9th International Conference on Mobile and Wireless
Communications Networks, MWCN'07, pages 6–10, 2007.
(doi:10.1109/ICMWCN.2007.4668170)
- [52]
- O. De Moor, M. Verbaere,
E. Hajiyev, P. Avgustinov,
T. Ekman, N. Ongkingco,
D. Sereni, and J. Tibble.
Keynote address: QL for source code analysis.
In SCAM 2007 - Proceedings 7th IEEE International Working Conference on
Source Code Analysis and Manipulation, pages 3–14, 2007.
(doi:10.1109/SCAM.2007.31)
- [53]
- Oege
de Moor, Mathieu Verbaere, Elnar Hajiyev,
Pavel Avgustinov, Torbjorn Ekman,
Neil Ongkingco, Damien Sereni, and
Julian Tibble.
Keynote address: .QL for source code analysis.
In Seventh IEEE International Working Conference on Source Code Analysis
and Manipulation (SCAM 2007), pages 3–16, Los Alamitos, CA, USA,
2007. IEEE Computer Society.
(doi:10.1109/SCAM.2007.13)
- [54]
- F. De Rango, F. Veltri,
M. Tropea, A.-F. Santamaria,
P. Fazio, A. Malfitano, and
S. Marano.
Interdisciplinary issues for the management of next generation autonomic
wireless systems: Nature-inspired techniques and organic computing.
International Journal of Mobile Network Design and Innovation,
2(3-4):141–152, 2007.
(doi:10.1504/IJMNDI.2007.017318)
- [55]
- F.P.
Deek and J.A.M. McHugh.
Open source: Technology and policy.
Cambridge University Press, 2007.
(doi:10.1017/CBO9780511619526)
- [56]
- L. DeNardis.
A history of internet security.
In The History of Information Security, pages 681–704. Elsevier,
2007.
(doi:10.1016/B978-044451608-4/50025-0)
- [57]
- I. Díaz, J. Touriño,
and R. Doallo.
Towards low-latency model-oriented distributed systems management.
In Managing Next Generation Networks and Services, pages 41–50.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4773.
(doi:10.1007/978-3-540-75476-3_5)
- [58]
- A. Dolgui, A.V. Eremeev, and
V.S. Sigaev.
HBBA: Hybrid algorithm for buffer allocation in tandem production lines.
Journal of Intelligent Manufacturing, 18(3):411–420, 2007.
(doi:10.1007/s10845-007-0030-z)
- [59]
- Nikolaos Doukas and Antonios
Andreatos.
Advancing electronic
assessment.
International Journal of Computers, Communications & Control,
2(1):56–65, 2007.
- [60]
- Yassir K. Elley, Anne H.
Anderson, Stephen R. Hanna, Sean J. Mullan,
and Radia J. Perlman.
Method
and system for proving membership in a nested group using chains of
credentials.
United States Patent 7,213,262, May 2007.
Assignee: Sun Microsystems, Inc. (Santa Clara, CA).
- [61]
- Éric Filiol.
Sciences à risque: Virus.
Les Dossiers de la Recherche, 26:82–85, February 2007.
- [62]
- G. Exarchakos and
N. Antonopoulos.
Resource sharing architecture for cooperative heterogeneous P2P overlays.
Journal of Network and Systems Management, 15(3):311–334, 2007.
(doi:10.1007/s10922-007-9069-6)
- [63]
- B. Fabian and O. Günther.
Distributed ONS and its impact on privacy.
In IEEE International Conference on Communications, pages
1223–1228, 2007.
(doi:10.1109/ICC.2007.207)
- [64]
- An Feng and Frank Minjarez.
Enforcing
data protection legislation in web data services.
United States Patent 7,207,067, April 2007.
Assignee: AOL LLC (Dulles, VA).
- [65]
- M.J. Fernández Iglesias,
F. Rodrıguez González, and
E. Medina Ferreiro.
The multimedia center of galicia: A model of collaboration between the public
and private sectors in e-learning development.
Revista Iberoamericana de Tecnologias del Aprendizaje, 2(1):1–7,
2007.
- [66]
- E. Filiol.
Formalisation and implementation aspects of k-ary (malicious) codes.
Journal in Computer Virology, 3(2):75–86, 2007.
(doi:10.1007/s11416-007-0044-2)
- [67]
- M.H.
Firooz, K. Ronasi, M.R. Pakravan, and
A.N. Avanaki.
IPROMISE: Reliable multi-sender algorithm for peer-to-peer networks.
In Proceedings of the 2007 2nd International Conference on Communication
System Software and Middleware and Workshops, COMSWARE 2007, 2007.
(doi:10.1109/COMSWA.2007.382553)
- [68]
- M.H.
Firooz, K. Ronasi, M.R. Pakravan, and
A.N. Avanaki.
A multi-sender multicast algorithm for media streaming on peer-to-peer
networks.
Computer Communications, 30(10):2191–2200, 2007.
(doi:10.1016/j.comcom.2007.05.008)
- [69]
- M.H.
Firooz, K. Ronasi, M.R. Pakravan, and
A.N. Avanaki.
Wavelet-based unbalanced un-equivalent multiple description coding for P2P
networks.
In 2007 IEEE International Conference on Telecommunications and Malaysia
International Conference on Communications, ICT-MICC 2007, pages
242–247, 2007.
(doi:10.1109/ICTMICC.2007.4448642)
- [70]
- Beat Fluri,
Michael Würsch, and Harald Gall.
Do code and comments co-evolve? on the relation between source code and comment
changes.
In 14th Working Conference on Reverse Engineering (WCRE 2007),
pages 70–79, 2007.
(doi:10.1109/WCRE.2007.21)
- [71]
- C. Fragouli and E. Soljanin.
Network coding applications.
Foundations and Trends in Networking, 2(2):135–269, 2007.
(doi:10.1561/1300000013)
- [72]
- S. Gadanho and N. Lhuillier.
Addressing uncertainty in implicit preferences.
In RecSys'07: Proceedings of the 2007 ACM Conference on Recommender
Systems, pages 9–16, 2007.
(doi:10.1145/1297231.1297248)
- [73]
- J. García-Vidal,
M. Guerrero-Zapata, J. Morillo-Pozo, and
D. Fusté-Vilella.
A protocol stack for cooperative wireless networks.
In Wireless Systems and Mobility in Next Generation Internet,
pages 62–72. Springer Verlag, 2007.
Lecture Notes in Computer Science 4396.
(doi:10.1007/978-3-540-70969-5_5)
- [74]
- L.P.
Gaspary, M.P. Barcellos, A. Detsch, and
R.S. Antunes.
Flexible security in peer-to-peer applications: Enabling new opportunities
beyond file sharing.
Computer Networks, 51(17):4797–4815, 2007.
(doi:10.1016/j.comnet.2007.07.005)
- [75]
- D.M. German.
Using software distributions to understand the relationship among free and open
source software projects.
In Proceedings — ICSE 2007 Workshops: Fourth International Workshop on
Mining Software Repositories, MSR 2007, 2007.
(doi:10.1109/MSR.2007.32)
- [76]
- D.H.-L. Goh
and P.K. Ng.
Link decay in leading information science journals.
Journal of the American Society for Information Science and
Technology, 58(1):15–24, 2007.
(doi:10.1002/asi.20513)
- [77]
- F. Gortázar, M. Gallego,
and A. Duarte.
MetaCET: An object oriented tool for language design.
In Proceedings of the International Multi-Conference on Computing in the
Global Information Technology, ICCGI'06, 2007.
(doi:10.1109/ICCGI.2006.49)
- [78]
- M. Grechanik.
Finding errors in components that exchange XML data.
In ASE'07 - 2007 ACM/IEEE International Conference on Automated Software
Engineering, pages 264–273, 2007.
(doi:10.1145/1321631.1321671)
- [79]
- M. Grechanik.
Finding errors in interoperating components.
In Proceedings - ICSE 2007 Workshops: Second International Workshop on
Incorporating COTS Software into Software Systems: Tools and Techniques,
IWICSS'07, 2007.
(doi:10.1109/IWICSS.2007.5)
- [80]
- L. Grunske, P. Lindsay,
E. Bondarev, Y. Papadopoulos, and
D. Parker.
An outline of an architecture-based method for optimizing dependability
attributes of software-intensive systems.
Lecture Notes in Computer Science, 4615:188–209, 2007.
- [81]
- T. Haenselmann, T. King,
M. Busse, W. Effelsberg, and
M. Fuchs.
Scriptable sensor network based home-automation.
In Emerging Directions in Embedded and Ubiquitous Computing, pages
579–591. Springer Verlag, 2007.
Lecture Notes in Computer Science 4809.
(doi:10.1007/978-3-540-77090-9_54)
- [82]
- M. Haigh.
Downloading communism: File sharing as samizdat in ukraine.
Libri, 57(3):165–178, 2007.
(doi:10.1515/LIBR.2007.165)
- [83]
- E. Hammami.
Towards a peer-to-peer content discovery and delivery architecture for service
provisioning.
In Proceedings — ECUMN 2007: Fourth European Conference on Universal
Multiservice Networks, pages 52–61, 2007.
(doi:10.1109/ECUMN.2007.55)
- [84]
- A. Harriger, K. Lutes, and
J. Purdum.
Designing curricula to teach concepts and increase employability.
In ASEE Annual Conference and Exposition, Conference Proceedings,
page 11 pages, 2007.
- [85]
- R. Hassan and A. Harris.
A hybrid Markov model for accurate memory reference generation.
In International MultiConference of Engineers and Computer Scientists
2007, IMECS 2007, pages 550–555, 2007.
- [86]
- R. Hassan, A. Harris,
N. Topham, and A. Efthymiou.
Synthetic trace-driven simulation of cache memory.
In Proceedings — 21st International Conference on Advanced Information
Networking and Applications Workshops/Symposia, AINAW'07, volume 2,
pages 764–771, 2007.
(doi:10.1109/AINAW.2007.345)
- [87]
- M. Hepp,
K. Siorpaes, and D. Bachlechner.
Harvesting Wiki consensus: Using Wikipedia entries as vocabulary for
knowledge management.
IEEE Internet Computing, 11(5):54–65, September/October 2007.
(doi:10.1109/MIC.2007.110)
- [88]
- Tobias
Hildenbrand, Franz Rothlauf, and Armin Heinzl.
Ansätze zur kollaborativen Softwareerstellung.
Wirtschaftsinformatik, 49:72–80, 2007.
In German.
- [89]
- T. Hopkins.
Refactoring–does it improve software quality?
ACM Computing Reviews, June 2007.
- [90]
- A. Iftene,
A. Balahur-Dobrescu, and D. Matei.
A distributed architecture system for recognizing textual entailment.
In 9th International Symposium on Symbolic and Numeric Algorithms for
Scientific Computing, SYNASC 2007, pages 219–226, 2007.
(doi:10.1109/SYNASC.2007.11)
- [91]
- V. Issarny, M. Caporuscio,
and N. Georgantas.
A perspective on the future of middleware-based software engineering.
In FoSE 2007: Future of Software Engineering, pages 244–258,
2007.
(doi:10.1109/FOSE.2007.2)
- [92]
- A.Q. Jaber,
R. Ramli, and Y. Hidehiko.
Genetic algorithms for buffer size and work stations capacity in
serial-parallel production lines.
In Proceedings of the 12th International Symposium on Artificial Life and
Robotis, AROB 12th'07, pages 513–516, 2007.
- [93]
- M.A. Johnston and
J. Villà-Freixa.
Enabling data sharing and collaboration in complex systems applications.
In Distributed, High-Performance and Grid Computing in Computational
Biology, pages 124–140. Springer Verlag, 2007.
Lecture Notes in Computer Science 4360.
(doi:10.1007/978-3-540-69968-2_10)
- [94]
- J.J. Jung.
Semantic co-browsing system based on contextual synchronization on peer-to-peer
environment.
Computing and Informatics, 26(5):469–488, 2007.
- [95]
- M.-O. Junker and R. Luchian.
Developing web databases for aboriginal language preservation.
Literary and Linguistic Computing, 22(2):187–206, 2007.
(doi:10.1093/llc/fql049)
- [96]
- C. Kaiser,
C. Pajault, and J.-F. Pradat-Peyre.
Modelling remote concurrency with ada case study of symmetric non-deterministic
rendezvous.
In Reliable Software Technologies — Ada Europe 2007, pages
192–207. Springer Verlag, 2007.
Lecture Notes in Computer Science 4498.
(doi:10.1007/978-3-540-73230-3_15)
- [97]
- G. Kakaletris, D. Varoutas,
D. Katsianis, and T. Sphicopoulos.
Design and implementation approaches for location-based, tourism-related
services.
In Information and Communication Technologies in Support of the Tourism
Industry, pages 114–161. IGI Global, 2007.
(doi:10.4018/978-1-59904-159-9.ch005)
- [98]
- Pankaj Kamthan.
On the prospects and concerns of integrating open source software environment
in software engineering education.
Journal of Information Technology Education, 6:45, April
2007.
- [99]
- P. Kamthan.
A perspective on software engineering education with open source software.
In Handbook of Research on Open Source Software: Technological, Economic,
and Social Perspectives, pages 690–702. IGI Global, 2007.
(doi:10.4018/978-1-59140-999-1.ch054)
- [100]
- Y. Kanellopoulos, C. Makris,
and C. Tjortjis.
An improved methodology on information distillation by mining program source
code.
Data and Knowledge Engineering, 61(2):359–383, 2007.
(doi:10.1016/j.datak.2006.06.002)
- [101]
- S. Karjalainen and
O. Koistinen.
User problems with individual temperature control in offices.
Building and Environment, 42(8):2880–2887, 2007.
(doi:10.1016/j.buildenv.2006.10.031)
- [102]
- Martin Karlsch.
A model-driven framework for domain
specific languages demonstrated on a test automation language.
Master's thesis, Hasso-Plattner-Institute of Software Systems Engineering,
Potsdam, Germany, January 2007.
- [103]
- M. Kauhanen, C. Eaket, and
R. Biddle.
Patterns for story authoring tools.
In EuroPLoP 2007 - 12th European Conferenceon Pattern Languages of
Programs, pages 19–36, 2007.
- [104]
- P. Kaur
and H. Singh.
Comparative analysis of automated version control tools.
In International Conference on Software Engineering Theory and Practice
2007, SETP 2007, pages 106–111, 2007.
- [105]
- Stan
Kelly-Bootle.
Ode or code? — programmers be mused.
ACM Queue, 5(3):48–52, April 2007.
(doi:10.1145/1242489.1242508)
- [106]
- H.M. Kienle and H.A.
Müller.
A lightweight taxonomy to characterize component-based systems.
In Proceedings — ICCBSS 2007: Sixth International IEEE Conference on
Commercial-off-the-Shelf (COTS)-Based Software Systems, pages
193–201, 2007.
(doi:10.1109/ICCBSS.2007.2)
- [107]
- J.B. Kim
and S.Y. Rhew.
Reuse procedure for open-source software.
In Parallel Computational Fluid Dynamics 2006, pages 155–164.
Elsevier Ltd, 2007.
(doi:10.1016/B978-044453035-6/50022-5)
- [108]
- D.J. Kim,
K.-B. Yue, and T.A. Yang.
Information assurance in B2C e-commerce transactions: A process-oriented
framework and empirical analysis of websites using semantic networks.
In Association for Information Systems - 13th Americas Conference on
Information Systems, AMCIS 2007: Reaching New Heights, volume 2, pages
1335–1345, 2007.
- [109]
- J.-H.
Kim, G.S. Choi, and C.R. Das.
An SSL back-end forwarding scheme in cluster-based web servers.
IEEE Transactions on Parallel and Distributed Systems,
18(7):946–957, 2007.
(doi:10.1109/TPDS.2007.1062)
- [110]
- H. Kokkinen and S. Moloney.
Towards distributed service provisioning.
In Proceedings - MUM 2007: 6th International Conference on Mobile and
Ubiquitous Multimedia, volume 284, pages 69–73, 2007.
(doi:10.1145/1329469.1329478)
- [111]
- K. Komine, Y. Sawahata,
N. Uratani, Y. Yoshida, and
T. Inoue.
Evaluation of a prototype remote control for digital broadcasting receivers by
using semantic differential method.
IEEE Transactions on Consumer Electronics, 53(2):561–568, 2007.
(doi:10.1109/TCE.2007.381730)
- [112]
- T. Koskela, N. Kostamo,
O. Kassinen, J. Ohtonen, and
M. Ylianttila.
Towards context-aware mobile web 2.0 service architecture.
In Proceedings - International Conference on Mobile Ubiquitous Computing,
Systems, Services and Technologies, UBICOMM 2007, pages 41–48, 2007.
(doi:10.1109/UBICOMM.2007.15)
- [113]
- T. Koulouris, G. Spanoudakis,
and T. Tsigkritis.
Towards a framework for dynamic verification of peer-to-peer systems.
In Second International Conference on Internet and Web Applications and
Services, ICIW'07, 2007.
(doi:10.1109/ICIW.2007.63)
- [114]
- V. Koutsiouris,
C. Polychronopoulos, and A. Vrechopoulos.
Developing 3G location based services: The case of an innovative
entertainment guide application.
In ICMB 2007: 6th International Conference on the Management of Mobile
Business, 2007.
(doi:10.1109/ICMB.2007.26)
- [115]
- B. Krishnamurthy,
D. Malandrino, and C.E. Wills.
Measuring privacy loss and the impact of privacy protection in web browsing.
In ACM International Conference Proceeding Series, volume 229,
pages 52–63, 2007.
(doi:10.1145/1280680.1280688)
- [116]
- B. Lagesse and M. Kumar.
UBCA: Utility-based clustering architecture for peer-to-peer systems.
In Proceedings — International Conference on Distributed Computing
Systems, 2007.
(doi:10.1109/ICDCSW.2007.86)
- [117]
- M. Lahiri and T.Y.
Berger-Wolf.
Structure prediction in temporal networks using frequent subgraphs.
In Proceedings of the 2007 IEEE Symposium on Computational Intelligence
and Data Mining, CIDM 2007, pages 35–42, March 2007.
(doi:10.1109/CIDM.2007.368850)
- [118]
- D.G. Lee,
D.I. Fels, and J.P. Udo.
Emotive captioning.
Computers in Entertainment, 5(2):1281344:1–1281344:15, 2007.
(doi:10.1145/1279540.1279551)
- [119]
- S.-W.
Lee, R.A. Gandhi, and G.-J. Ahn.
Certification process artifacts defined as measurable units for software
assurance.
Software Process Improvement and Practice, 12(2):165–189, 2007.
(doi:10.1002/spip.313)
- [120]
- Y.M. Lee,
J.B. Kim, I.W. Choi, and S.Y.
Rhew.
A study on selection process of open source software.
In ALPIT 2007: 6th International Conference on Advanced Language
Processing and Web Information Technology, pages 568–571, 2007.
(doi:10.1109/ALPIT.2007.83)
- [121]
- K. Leibnitz, T. Hoßfeld,
N. Wakamiya, and M. Murata.
Peer-to-peer vs. client/server: Reliability and efficiency of a content
distribution service.
In Managing Traffic Performance in Converged Networks, pages
1161–1172. Springer Verlag, 2007.
Lecture Notes in Computer Science 4516.
(doi:10.1007/978-3-540-72990-7_99)
- [122]
- Junguo Li,
Gang Huang, Jian Zou, and Hong
Mei.
Failure analysis of open source j2ee application servers.
In QSIC '07: Seventh International Conference on Quality Software,
pages 198–208, October 2007.
(doi:10.1109/QSIC.2007.4385496)
- [123]
- W. Li,
L.-C. Lam, and T.-C. Chiueh.
Accurate application-specific sandboxing for Win32/Intel binaries.
In IAS 2007: 3rd Internationl Symposium on Information Assurance and
Security, pages 375–380, 2007.
(doi:10.1109/IAS.2007.86)
- [124]
- G. Liberopoulos,
G. Kozanidis, and P. Tsarouhas.
Performance evaluation of an automatic transfer line with WIP scrapping
during long failures.
Manufacturing and Service Operations Management, 9(1):62–83,
2007.
(doi:10.1287/msom.1060.0118)
- [125]
- Y.-C. Lin and
L.-S. Li.
Nemo based P2P file discovery scheme.
In Mobility Conference 2007 - The 4th Int. Conf. Mobile Technology,
Applications and Systems, Mobility 2007, Incorporating the 1st Int. Symp.
Computer Human Interaction in Mobile Technology, IS-CHI 2007, pages
145–150, 2007.
(doi:10.1145/1378063.1378088)
- [126]
- J.-M.
Lin, Z.-W. Hong, G.-M. Fang, and
C.-T. Lee.
A style for integrating MS-windows software applications to client-server
systems using Java technology.
Software — Practice and Experience, 37(4):417–440, 2007.
(doi:10.1002/spe.775)
- [127]
- Y.-C. Lin,
L.-S. Li, and C.-C. Haung.
A p2p file discovery scheme in nemo.
In IWCMC 2007: Proceedings of the 2007 International Wireless
Communications and Mobile Computing Conference, pages 499–504, 2007.
(doi:10.1145/1280940.1281047)
- [128]
- F. Liu and
Y. Ding.
Ecological network-inspired trust management model of p2p networks.
In 2nd Workshop on Digital Media and its Application in Museum and
Heritage, DMAMH 2007, pages 297–302, 2007.
(doi:10.1109/DMAMH.2007.4414570)
- [129]
- A. Löser, S. Staab, and
C. Tempich.
Semantic social overlay networks.
IEEE Journal on Selected Areas in Communications, 25(1):5–14,
2007.
(doi:10.1109/JSAC.2007.070102)
- [130]
- N. Lu,
P.M.C. Swatman, and S. Perreau.
Sustainable agriculture mobile commerce (SamCom) - extending the rural
grocery supply chain through m-commerce.
In IEEE Region 10 Annual International Conference,
Proceedings/TENCON, 2007.
(doi:10.1109/TENCON.2005.301236)
- [131]
- K. Luther, R. Bye,
T. Alpcan, A. Müller, and
Ş. Albayrak.
A cooperative AIS framework for intrusion detection.
In IEEE International Conference on Communications, pages
1409–1416, 2007.
(doi:10.1109/ICC.2007.237)
- [132]
- W. Maass and S. Janzen.
Dynamic product interfaces: A key element for ambient shopping environments.
In 20th Bled eConference - eMergence: Merging and Emerging Technologies,
Processes, and Institutions, pages 457–470. Bled eCommerce
Conference, 2007.
- [133]
- W. Maass
and M. Lampe.
Integration of standardized and non-standardized product data.
In INFORMATIK 2007 - Informatik Trifft Logistik, Beitrage der 37.
Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1,
pages 141–146, 2007.
- [134]
- Eva
Magnusson, Torbjorn Ekman, and Gorel Hedin.
Extending attribute grammars with collection attributes–evaluation and
applications.
In Source Code Analysis and Manipulation, 2007. SCAM 2007. Seventh IEEE
International Working Conference on, pages 69–80, 2007.
(doi:10.1109/SCAM.2007.4362899)
- [135]
- L. Mannila.
Novices' progress in introductory programming courses.
Informatics in Education, 6(1):139–152, 2007.
- [136]
- C.C.
Marquezan, C.R.P.D. Santos, E.M. Salvador,
M.J.B. Almeida, S.L. Cechin, and
L.Z. Granville.
Performance evaluation of notifications in a web services and P2P-based
network management overlay.
In International Computer Software and Applications Conference,
volume 1, pages 241–248, 2007.
(doi:10.1109/COMPSAC.2007.165)
- [137]
- Y. Mei,
X. Dong, W. Wu, S. Guan, and
J. Li.
SDRD: A novel approach to resource discovery in grid environments.
In Advanced Parallel Processing Technologies, pages 301–312.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4847.
(doi:10.1007/978-3-540-76837-1_34)
- [138]
- Siavash Mirarab and Ladan
Tahvildari.
A prioritization approach for software test cases based on Bayesian networks.
In Fundamental Approaches to Software Engineering, pages 276–290.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4422.
(doi:10.1007/978-3-540-71289-3_22)
- [139]
- J. Mishra and S. Ahuja.
P2PCompute: A peer-to-peer computing system.
In Proceedings of the 2007 International Symposium on Collaborative
Technologies and Systems, CTS, pages 169–176, 2007.
(doi:10.1109/CTS.2007.4621754)
- [140]
- M. Mor,
R. Mordinyi, and J. Riemer.
Using space-based computing for more efficient group coordination and
monitoring in an event-based work management system.
In Proceedings - Second International Conference on Availability,
Reliability and Security, ARES 2007, pages 1116–1123, 2007.
(doi:10.1109/ARES.2007.158)
- [141]
- F. Moraán, M. Preda,
G. Lafruit, P. Villegas, and
R.-P. Berretty.
3D game content distributed adaptation in heterogeneous environments.
Eurasip Journal on Advances in Signal Processing, 2007.
(doi:10.1155/2007/93027)
- [142]
- J.C.
Morris and C. Lüer.
DistriWiki: a distributed peer-to-peer wiki network.
In WikiSym '07: Proceedings of the 2007 international symposium on
Wikis, pages 69–74, New York, NY, USA, 2007. ACM.
(doi:10.1145/1296951.1296959)
- [143]
- B. Mortazavi and G. Kesidis.
Cumulative reputation systems for peer-to-peer content distribution.
In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 -
Proceedings, pages 1546–1552, 2007.
(doi:10.1109/CISS.2006.286385)
- [144]
- J.P. Mulerikkal and
I. Khalil.
An architecture for distributed content delivery network.
In ICON 2007 — Proceedings of the 2007 15th IEEE International
Conference on Networks, pages 359–364, 2007.
(doi:10.1109/ICON.2007.4444113)
- [145]
- N. Nagappan.
Potential of open source systems as project repositories for empirical studies
working group results.
In Empirical Software Engineering Issues. Critical Assessment and Future
Directions, pages 103–107. Springer Verlag, 2007.
Lecture Notes in Computer Science 4336.
(doi:10.1007/978-3-540-71301-2_29)
- [146]
- Nataraj Nagaratnam and
Brian Keith Smith.
Method,
apparatus, and program for automated trust zone partitioning.
United States Patent 7,272,714, September 2007.
Assignee: International Business Machines Corporation (Armonk, NY).
- [147]
- M.L.
Nelson, F. McCown, J.A. Smith, and
M. Klein.
Using the web infrastructure to preserve web pages.
International Journal on Digital Libraries, 6(4):327–349, 2007.
(doi:10.1007/s00799-007-0012-y)
- [148]
- A. Ng,
H. Grimm, T. Lezama, A. Persson,
M. Andersson, and M. Jägstam.
Web services for metamodel-assisted parallel simulation optimization.
In International MultiConference of Engineers and Computer Scientists
2007, IMECS 2007, pages 879–885, 2007.
- [149]
- H. Okada
and M. Inoue.
Evaluation of P2P information recommendation based on collaborative
filtering.
In Human-Computer Interaction. HCI Intelligent Multimodal Interaction
Environments, pages 449–458. Springer Verlag, 2007.
Lecture Notes in Computer Science 4552.
(doi:10.1007/978-3-540-73110-8_48)
- [150]
- T. Omari, S. Derisavi, and
G. Franks.
Deriving distribution of thread service time in layered queueing networks.
In Proceedings of the 6th International Workshop on Software and
Performance, WOPS'07, pages 66–77, 2007.
(doi:10.1145/1216993.1217007)
- [151]
- T. Omari,
S. Derisavi, G. Franks, and
M. Woodside.
Performance modeling of a quorum pattern in layered service systems.
In 4th International Conference on the Quantitative Evaluation of
Systems, QEST 2007, pages 201–210, 2007.
(doi:10.1109/QEST.2007.31)
- [152]
- H. Orsila, T. Kangas,
E. Salminen, T.D. Hämäläinen, and
M. Hännikäinen.
Automated memory-aware application distribution for multi-processor
system-on-chips.
Journal of Systems Architecture, 53(11):795–815, 2007.
(doi:10.1016/j.sysarc.2007.01.013)
- [153]
- K. Papapanagiotou, G.F.
Marias, and P. Georgiadis.
A certificate validation protocol for VANETs.
In GLOBECOM: IEEE Global Telecommunications Conference, 2007.
(doi:10.1109/GLOCOMW.2007.4437825)
- [154]
- E. Papapetrou and
N. Pavlidou.
A satellite-based architecture for internet P2P applications.
In QShine 2007 Workshop: Satellite/Terrestrial Interworking, IWSTI
'07, 2007.
- [155]
- E. Papapetrou, E. Rova,
A. Zarras, and P. Vassiliadis.
Cross-layer networking for peer databases over wireless ad-hoc communities.
In IEEE International Conference on Communications, pages
3443–3448, 2007.
(doi:10.1109/ICC.2007.570)
- [156]
- J.-C. Park
and G. Yu.
Securing overlay activities of peers in unstructured P2P networks.
In Computational Intelligence and Security, pages 795–805.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4456.
(doi:10.1007/978-3-540-74377-4_83)
- [157]
- J.-C. Park
and G. Yu.
Securing overlay activities of peers in unstructured P2P networks.
In 2006 International Conference on Computational Intelligence and
Security, ICCIAS 2006, volume 2, pages 1105–1108, 2007.
(doi:10.1109/ICCIAS.2006.295433)
- [158]
- C. Park, K. Kim,
J. Lee, and P. Kim.
Improved CAN routing using additional neighbors.
In International Conference on Advanced Communication Technology,
ICACT, volume 2, pages 1457–1461, 2007.
(doi:10.1109/ICACT.2007.358630)
- [159]
- J.S.
Park, G. An, and D. Chandra.
Trusted P2P computing environments with role-based access control.
IET Information Security, 1(1):27–35, 2007.
(doi:10.1049/iet-ifs:20060084)
- [160]
- I. Pavlović and
D. Miklavćíc.
Web-based electronic data collection system to support electrochemotherapy
clinical trial.
IEEE Transactions on Information Technology in Biomedicine,
11(2):222–230, 2007.
(doi:10.1109/TITB.2006.879581)
- [161]
- C. Pheatt.
An easy to use distributed computing framework.
In SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science
Education, pages 571–575, 2007.
(doi:10.1145/1227310.1227500)
- [162]
- M. Popa,
A.S. Popa, and H. Ciocarlie.
Mobile telephony with pocket PCs phone edition.
WSEAS Transactions on Communications, 6(1):146–153, 2007.
- [163]
- S. Qingwei, Z. Zheng, and
B. Hu.
A density-based approach to node clustering in decentralized peerto-peer
networks.
In Proceedings of SPIE – The International Society for Optical
Engineering, volume 6773, 2007.
(doi:10.1117/12.749683)
- [164]
- J.A.
Qudeiri, H. Yamamoto, and M. Jamali.
Development of new production simulator for complex production systems design.
In 37th International Conference on Computers and Industrial Engineering
2007, volume 2, pages 1521–1531, 2007.
- [165]
- J.E.A.
Qudeiri, M.A. Jamali, and H. Yamamoto.
Buffer size decision for the flexible transfer line with rework paths using
genetic algorithms.
In Proceedings — ICSSSM'06: 2006 International Conference on Service
Systems and Service Management, pages 210–215, 2007.
(doi:10.1109/ICSSSM.2006.320614)
- [166]
- S. Quenette, L. Moresi,
P.D. Sunter, and B.F. Appelbe.
Explaining StGermain: An aspect oriented environment for building extensible
computational mechanics modeling software.
In Proceedings — 21st International Parallel and Distributed Processing
Symposium, IPDPS 2007, pages 1–8, 2007.
(doi:10.1109/IPDPS.2007.370400)
- [167]
- E. Ras,
R. Carbon, B. Decker, and
J. Rech.
Experience management wikis for reflective practice in software capstone
projects.
IEEE Transactions on Education, 50(4):312–320, 2007.
(doi:10.1109/TE.2007.904580)
- [168]
- E. Razina and D. Janzen.
Effects of dependency injection on maintainability.
In J. Smith, editor, Software Engineering and
Application, pages 91–102. Acta Press, 2007.
- [169]
- H.B.
Ribeiro, L.C. Lung, A.O. Santin, and
N.L. Brisola.
Implementing a peer-to-peer web browser for publishing and searching web pages
on internet.
In Proceedings — International Conference on Advanced Information
Networking and Applications, AINA, pages 754–761, 2007.
(doi:10.1109/AINA.2007.79)
- [170]
- H.B.
Ribeiro, L.C. Lung, A.O. Santin, and
N.L. Brisóla.
Web2Peer: A peer-to-peer infrastructure for publishing/locating/replicating
web pages on internet.
In Proceedings — Eighth International Symposium on Autonomous
Decentralized Systems, ISADS 2007, pages 421–428, 2007.
(doi:10.1109/ISADS.2007.79)
- [171]
- G. Robles, S. Dueñas, and
J.M. Gonzalez-Barahona.
Corporate involvement of libre software: Study of presence in Debian code
over time.
In Open Source Development, Adoption and Innovation, volume 234,
pages 121–132. Springer Verlag, 2007.
IFIP International Federation for Information Processing Volume 234.
(doi:10.1007/978-0-387-72486-7_10)
- [172]
- Jr. Romano, N.C. and
J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
International Journal of Information Security and Privacy (IJISP),
1(1):65–86, 2007.
(doi:10.4018/jisp.2007010105)
- [173]
- B. Rood
and M.J. Lewis.
Multi-state grid resource availability characterization.
In IEEE/ACM International Workshop on Grid Computing, pages
42–49, 2007.
(doi:10.1109/GRID.2007.4354114)
- [174]
- J. Rybicki, B. Scheuermann,
W. Kiess, C. Lochert,
P. Fallahi, and M. Mauve.
Challenge: Peers on wheels — a road to new traffic information systems.
In Proceedings of the Annual International Conference on Mobile Computing
and Networking, MOBICOM, pages 215–221, 2007.
(doi:10.1145/1287853.1287879)
- [175]
- K. Sakamoto and M. Yoshida.
Design and evaluation of large scale loosely coupled cluster-based distributed
systems.
In 2007 IFIP International Conference on Network and Parallel Computing
Workshops, NPC 2007, pages 572–577, 2007.
(doi:10.1109/ICNPCW.2007.4351546)
- [176]
- G. Schiele, R. Süselbeck,
A. Wacker, J. Hähner,
C. Becker, and T. Weis.
Requirements of peer-to-peer-based massively multiplayer online gaming.
In Proceedings — Seventh IEEE International Symposium on Cluster
Computing and the Grid, CCGrid 2007, pages 773–778, 2007.
(doi:10.1109/CCGRID.2007.97)
- [177]
- C. Servin, M. Ceberio,
E. Freudenthal, and S. Bistarelli.
An optimization approach using soft constraints for the cascade vulnerability
problem.
In Annual Conference of the North American Fuzzy Information Processing
Society — NAFIPS, pages 372–377, 2007.
(doi:10.1109/NAFIPS.2007.383867)
- [178]
- Z. Shi,
, and H. Zhang.
Time self-decay trust management algorithm for P2P computing security.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
44(1):1–10, 2007.
(doi:10.1360/crad20070101)
- [179]
- B.K. Shrivastava,
G. Khataniar, and D. Goswami.
Performance enhancement in hierarchical peer-to-peer systems.
In Proceedings of the 2007 2nd International Conference on Communication
System Software and Middleware and Workshops, COMSWARE 2007, pages
1–7, 2007.
(doi:10.1109/COMSWA.2007.382555)
- [180]
- Jeremy
Singer, Gavin Brown, Mikel Luján, and
Ian Watson.
Towards intelligent analysis techniques for object pretenuring.
In PPPJ '07: Proceedings of the 5th international symposium on Principles
and practice of programming in Java, pages 203–208, New York, NY,
USA, 2007. ACM.
(doi:10.1145/1294325.1294353)
- [181]
- Jeremy
Singer, Gavin Brown, Ian Watson, and
John Cavazos.
Intelligent selection of application-specific garbage collectors.
In ISMM '07: Proceedings of the 6th international symposium on Memory
management, pages 91–102, New York, NY, USA, 2007. ACM.
(doi:10.1145/1296907.1296920)
- [182]
- N. Singh, C. Gibbs, and
Y. Coady.
C-CLR: A tool for navigating highly configurable system software.
In ACP4IS '07: Proceedings of the 6th workshop on Aspects, components,
and patterns for infrastructure software, 2007.
ACM International Conference Proceeding Series Volume 219.
(doi:10.1145/1233901.1233910)
- [183]
- B. Skattør.
Using contextual design to understand mobile work and design mobile services:
A longitudinal case study.
In 6th International Conference on Perspectives in Business Information
Research, BIR 2007, pages 114–128. University of Tampere, 2007.
- [184]
- Sulayman K.
Sowe.
An Empirical Study of Knowledge Sharing in Free and Open Source Software
Projects.
PhD thesis, Aristotle University of Thessaloniki, 2007.
- [185]
- M.V. Springett and R.N.
Griffiths.
Accessibility of interactive television for users with low vision: learning
from the web.
In Interactive TV: a Shared Experience — 5th European Conference,
EuroITV 2007, pages 76–85, 2007.
Lecture Notes in Computer Science 4471.
(doi:10.1007/978-3-540-72559-6_9)
- [186]
- F. Stäber and J. P.
Müller.
Evaluating peer-to-peer for loosely coupled business collaboration: A case
study.
In Business Process Management, pages 141–148. Springer Verlag,
2007.
Lecture Notes in Computer Science 4714.
(doi:10.1007/978-3-540-75183-0_11)
- [187]
- R. Su,
J.J. Lukkien, and M.R.V. Chaudron.
Language-based access control approach for component-based software
applications.
IET Software, 1(5):206–216, 2007.
(doi:10.1049/iet-sen:20070026)
- [188]
- S. Sucurovic.
Security in e-health applications.
In Advances in Enterprise Information Technology Security, pages
104–119. IGI Global, 2007.
(doi:10.4018/978-1-59904-090-5.ch006)
- [189]
- W.J. Sung,
J.H. Kim, and S.Y. Rhew.
A quality model for open source software selection.
In ALPIT 2007: 6th International Conference on Advanced Language
Processing and Web Information Technology, pages 515–519, 2007.
(doi:10.1109/ALPIT.2007.81)
- [190]
- A. Sutton and J.I. Maletic.
How we manage portability and configuration with the C preprocessor.
In IEEE International Conference on Software Maintenance, ICSM,
pages 275–284, 2007.
(doi:10.1109/ICSM.2007.4362640)
- [191]
- L. Swan,
A.S. Taylor, S. Izadi, and
R. Harper.
Containing family clutter.
IFIP International Federation for Information Processing,
241:171–184, 2007.
(doi:10.1007/978-0-387-73697-6_13)
- [192]
- H. Tao and
D. He.
Normal forms and normalization of authentication protocols.
In 2006 International Conference on Computational Intelligence and
Security, ICCIAS 2006, volume 2, pages 1363–1366, 2007.
(doi:10.1109/ICCIAS.2006.295282)
- [193]
- T. Thireou, G. Spyrou, and
V. Atlamazoglou.
A survey of the availability of primary bioinformatics web resources.
Genomics, Proteomics and Bioinformatics, 5(1):70–76, 2007.
(doi:10.1016/S1672-0229(07)60017-5)
- [194]
- Ha Manh Tran and Jürgen
Schönwälder.
Distributed case-based reasoning for fault management.
In Arosha K. Bandara and Mark Burgess, editors,
Inter-Domain Management — First International Conference on
Autonomous Infrastructure, Management and Security, AIMS 2007, pages
200–203. Springer-Verlag, June 2007.
Lecture Notes in Computer Science 4543.
(doi:10.1007/978-3-540-72986-0_25)
- [195]
- Ö. Ulusoy.
Research issues in peer-to-peer data management.
In 22nd International Symposium on Computer and Information Sciences,
ISCIS 2007, pages 1–8, 2007.
(doi:10.1109/ISCIS.2007.4456827)
- [196]
- E. Van Ruitenbeek,
T. Courtney, W.H. Sanders, and
F. Stevens.
Quantifying the effectiveness of mobile phone virus response mechanisms.
In Proceedings of the International Conference on Dependable Systems and
Networks, pages 790–799, 2007.
(doi:10.1109/DSN.2007.78)
- [197]
- T. Van Woensel and
N. Vandaele.
Modeling traffic flows with queueing models: A review.
Asia-Pacific Journal of Operational Research, 24(4):435–461,
2007.
(doi:10.1142/S0217595907001383)
- [198]
- B. Vassiliadis and
V. Fotopoulos.
IPR protection for digital media distribution: Trends and solutions in the
e-business domain.
International Journal of E-Business Research (IJEBR), 3(4):79–97,
2007.
(doi:10.4018/jebr.2007100105)
- [199]
- K. Ven,
J. Verelst, and H. Mannaert.
On the relationship between commoditization and open source software.
In 12th International Conference of the Association Information and
Management 2007, AIM 2007, 2007.
- [200]
- D.C. Verma and
A. Stanford-Clark.
Simulation of sensor networks using message queue infrastructure.
In Edward M. Carapezza, editor, Proceedings of SPIE —
Volume 6562 – The International Society for Optical Engineering,
2007.
(doi:10.1117/12.724960)
- [201]
- N. Viorres, P. Xenofon,
M. Stavrakis, E. Vlachogiannis,
P. Koutsabasis, and J. Darzentas.
Major HCI challenges for open source software adoption and development.
In Online Communities and Social Computing, pages 455–464.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4564.
(doi:10.1007/978-3-540-73257-0_50)
- [202]
- M. Virvou and A. Savvopoulos.
An intelligent TV-shopping application that provides recommendations.
In International Conference on Tools with Artificial Intelligence,
ICTAI, volume 1, pages 366–373, 2007.
(doi:10.1109/ICTAI.2007.26)
- [203]
- W. Wang
and G. Zeng.
AntRep: A swarm intelligence based trust model in P2P networks.
Journal of Universal Computer Science, 13(7):1164–1174,
2007.
- [204]
- W. Wang
and G. Zeng.
Self-organization resource topology revolution based on trust mechanism.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
44(11):1849–1856, 2007.
(doi:10.1360/crad20071106)
- [205]
- R. Wang,
X. Yu, Y. Li, and Z. Gao.
Ontology partition method for semantic query routing.
In IPC 2007: 2007 International Conference on Intelligent Pervasive
Computing, pages 86–89, 2007.
(doi:10.1109/IPC.2007.87)
- [206]
- S. Wang,
Y. Zhang, and W. Wang.
Reliable self-clustering P2P overlay networks.
In International Computer Software and Applications Conference,
volume 1, pages 105–108, 2007.
(doi:10.1109/COMPSAC.2007.178)
- [207]
- K. Watanabe, N. Hayashibara,
and M. Takizawa.
Performance analysis of the superpeer-based two-layer P2P overlay network
with the CBF strategy.
In Proceedings — International Conference on Distributed Computing
Systems, 2007.
(doi:10.1109/ICDCSW.2007.63)
- [208]
- K. Watanabe, N. Hayashibara,
and M. Takizawa.
A superpeer-based two-layer P2P overlay network with the CBF strategy.
In First International Conference on Complex, Intelligent and Software
Intensive Systems, CISIS'07, pages 111–118, 2007.
(doi:10.1109/CISIS.2007.8)
- [209]
- K. Watanabe, Y. Nakajima,
T. Enokido, and M. Takizawa.
Ranking factors in peer-to-peer overlay networks.
ACM Transactions on Autonomous and Adaptive Systems, 2(3), 2007.
(doi:10.1145/1278460.1278465)
- [210]
- P.A.H.
Williams.
A holistic perspective on models for medical information security.
In Proceedings of The 2007 International Conference on Security and
Management, SAM'07, pages 510–519, 2007.
- [211]
- C. Wu,
S. Zhou, L. Wei, J. Luo,
Y. Wang, and X. Yang.
A new k-graph partition algorithm for distributed P2P simulation systems.
In Algorithms and Architectures for Parallel Processing: 7th
International Conference, ICA3PP, pages 391–402, 2007.
Lecture Notes in Computer Science 4494.
(doi:10.1007/978-3-540-72905-1_35)
- [212]
- L. Xiaoyun, H. Tiejun,
H. Longshe, and M. Luntian.
A DRM architecture for manageable P2P based IPTV system.
In Proceedings of the 2007 IEEE International Conference on Multimedia
and Expo, ICME 2007, pages 899–902, 2007.
- [213]
- Z. Yang and
H. Ma.
A game-based mechanism for avoiding routing hotspot in P2P streaming
distribution.
In Proceedings of the 2007 IEEE International Conference on Multimedia
and Expo, ICME 2007, pages 2166–2169, 2007.
- [214]
- Y. Yang,
X. Wang, S. Zhu, and G. Cao.
Distributed software-based attestation for node compromise detection in sensor
networks.
In Proceedings of the IEEE Symposium on Reliable Distributed
Systems, pages 219–228, 2007.
(doi:10.1109/SRDS.2007.4365698)
- [215]
- C.-L. Yeh,
J.-F. Yu, and W.-C. Chen.
Knowledge sharing and business matching in advertising and public relations
services using semantic peer technology.
In Proceedings of the International Conference on Electronic Business
(ICEB), pages 352–358, 2007.
- [216]
- M. Yiduo,
D. Xiaoshe, L. Junyang, X. Jing,
and X. Zhenghua.
Rapid and automated deployment of monitoring services in grid environments.
In Proceedings of The 2nd IEEE Asia-Pacific Services Computing
Conference, APSCC 2007, pages 328–335, 2007.
(doi:10.1109/APSCC.2007.4414478)
- [217]
- M. Yoshida and K. Sakamoto.
Code migration control in large scale loosely coupled distributed systems.
In Mobility Conference 2007 - The 4th Int. Conf. Mobile Technology,
Applications and Systems, Mobility 2007, Incorporating the 1st Int. Symp.
Computer Human Interaction in Mobile Technology, IS-CHI 2007, pages
32–38, 2007.
(doi:10.1145/1378063.1378069)
- [218]
- K. Yousef and E. O'Neill.
Sunrise: Towards location based clustering for assisted photo management.
In ICMI'07: Workshop on Tagging, Mining and Retrieval of Human-Related
Activity Information, TMR'07 - Workshop Proceedings, pages 47–54,
2007.
- [219]
- M.H. Zack.
The role of decision support systems in an indeterminate world.
Decision Support Systems, 43(4):1664–1674, 2007.
(doi:10.1016/j.dss.2006.09.003)
- [220]
- H. Zhang and
H. Su.
A collaborative system for software engineering education.
In International Computer Software and Applications Conference,
volume 2, pages 313–318, 2007.
(doi:10.1109/COMPSAC.2007.10)
- [221]
- Y. Zhang,
H. Shi, X. Wang, and J. Zhang.
Collaborative legal information sharing on P2P network.
In Proceedings - 2007 IFIP International Conference on Network and
Parallel Computing Workshops, NPC 2007, pages 41–47, 2007.
(doi:10.1109/ICNPCW.2007.4351458)
- [222]
- C.-Y.
Zheng, X. Wang, J. Zhao, and
X.-Y. Xue.
P2P video-on-demand content distribution schemes.
Ruan Jian Xue Bao/Journal of Software, 18(11):2942–2954, 2007.
(doi:10.1360/jos182942)
- [223]
- J. Zhou,
X. Zhang, L. Bhuyan, and B. Liu.
Clustered K-center: Effective replica placement in peer-to-peer systems.
In GLOBECOM: IEEE Global Telecommunications Conference, pages
2008–2013, 2007.
(doi:10.1109/GLOCOM.2007.385)
- [224]
- H. Zhuge
and X. Li.
Peer-to-peer in metric space and semantic space.
IEEE Transactions on Knowledge and Data Engineering,
19(6):759–771, 2007.
(doi:10.1109/TKDE.2007.190614)
- [225]
- H. Zhuge
and X. Li.
RSM-based gossip on P2P network.
In Algorithms and Architectures for Parallel Processing: 7th
International Conference, ICA3PP, pages 1–12, 2007.
Lecture Notes in Computer Science 4494.
(doi:10.1007/978-3-540-72905-1_1)
- [226]
- A. Zisman.
A static verification framework for secure peer-to-peer applications.
In Second International Conference on Internet and Web Applications and
Services, ICIW'07, 2007.
(doi:10.1109/ICIW.2007.11)