- [1]
- C. Abalde,
V.M. Gulıas, and L.M. Castro.
Efficient discovery of widely distributed and non-volatile resources on DHTs.
In 3rd International Conference on Internet and Web Applications and
Services, ICIW 2008, pages 370–376, 2008.
(doi:10.1109/ICIW.2008.19)
- [2]
- M. Abdelouahab, H.R. Hassen,
A. Bouabdallah, M. Achemlal, and
S. Laniepce.
TCA: Topology change attack in peer-to-peer networks.
In Workshop on Mobile and Wireless Networks Security, MWNS 2008,
pages 13–25, 2008.
- [3]
- A. Abraham, Y. Badr,
H. Liu, and C. Grosan.
A multi-swarm approach for neighbor selection in peer-to-peer networks.
In 5th International Conference on Soft Computing as Transdisciplinary
Science and Technology, CSTST '08 - Proceedings, pages 178–184, 2008.
(doi:10.1145/1456223.1456263)
- [4]
- J. Abu Qudeiri, H. Yamamoto,
R. Ramli, and A. Jamali.
Genetic algorithm for buffer size and work station capacity in serial-parallel
production lines.
Artificial Life and Robotics, 12(1-2):102–106, 2008.
(doi:10.1007/s10015-007-0449-5)
- [5]
- B. Adams,
B. Van Rompaey, C. Gibbs, and
Y. Coady.
Aspect mining in the presence of the C preprocessor.
In Proceedings of the 4th Linking Aspect Technology and Evolution
Workshop, LATE'08 — held at the 7th International Conference on
Aspect-Oriented Software Development, 2008.
(doi:10.1145/1404953.1404954)
- [6]
- A. Aikebaier, T. Enokido, and
M. Takizawa.
A distributed coordination protocol in an order-heterogeneous group.
International Journal of Web and Grid Services, 4(1):5–23, 2008.
(doi:10.1504/IJWGS.2008.018486)
- [7]
- M.D. Aime,
P.C. Pomi, and M. Vallini.
Policy-driven system configuration for dependability.
In Proceedings — 2nd Int. Conf. Emerging Security Inf., Systems and
Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on
Dependability and Security in Complex and Critical Inf. Sys., pages
420–425, 2008.
(doi:10.1109/SECURWARE.2008.54)
- [8]
- C.E.
Alexakos, K.I. Paraskevopoulos, K.V. Votis,
and S.D. Likothanassis.
Ontology-supported indexing in P2P networks of digital libraries.
International Journal of Web Engineering and Technology,
4(1):44–69, 2008.
(doi:10.1504/IJWET.2008.016104)
- [9]
- Y. Alkabani and
F. Koushanfar.
Designer's hardware Trojan horse.
In HOST 2008: IEEE International Workshop on Hardware-Oriented Security
and Trust, pages 82–83, 2008.
(doi:10.1109/HST.2008.4559059)
- [10]
- Ghazi I. Alkhatib and David C.
Rine.
Preface.
In Agent Technologies and Web Engineering: Applications and
Systems, pages xv–xvii. IGI Global, 2008.
(doi:10.4018/978-1-60566-618-1)
- [11]
- S. Alshattnawi, G. Canals,
and P. Molli.
Concurrency awareness in a P2P wiki system.
In 2008 International Symposium on Collaborative Technologies and
Systems, CTS'08, pages 285–294, 2008.
(doi:10.1109/CTS.2008.4543942)
- [12]
- S. Apel,
T. Leich, and G. Saake.
Aspectual feature modules.
IEEE Transactions on Software Engineering, 34(2):162–180, 2008.
(doi:10.1109/TSE.2007.70770)
- [13]
- Yves
Barlette and Vladislav V. Fomin.
Exploring the suitability of is security management standards for smes.
In Proceedings of the 41st Annual Hawaii International Conference on
System Sciences, pages 308–308, 2008.
(doi:10.1109/HICSS.2008.167)
- [14]
- S.J. Barr,
S.J. Cardman, and D.M. Martin Jr.
A boosting ensemble for the recognition of code sharing in malware.
Journal in Computer Virology, 4(4):335–345, 2008.
(doi:10.1007/s11416-008-0087-z)
- [15]
- L. Becchetti, U. Colesanti,
A. Marchetti-Spaccamela, and A. Vitaletti.
Self-adaptive recommendation systems: Models and experimental analysis.
In Proceedings - 2nd IEEE International Conference on Self-Adaptive and
Self-Organizing Systems, SASO 2008, pages 479–480, 2008.
(doi:10.1109/SASO.2008.55)
- [16]
- S.M.
Bellovin, M. Blaze, W. Diffie,
S. Landau, P.G. Neumann, and
J. Rexford.
Risking communications security: Potential hazards of the Protect America
Act.
IEEE Security and Privacy, 6(1):24–33, 2008.
(doi:10.1109/MSP.2008.17)
- [17]
- P. Benou
and V. Bitos.
Developing mobile commerce applications.
Journal of Electronic Commerce in Organizations, 6(1):63–78,
2008.
- [18]
- A.M.
Bernardos, P. Tarrıo, J. Iglesias, and
J.R. Casar.
Diseño y despliegue de servicios móviles basados en contexto: Un caso
de estudio.
In 3rd Iberian Conference on Information Systems and Technologies, CISTI
2008, 2008.
- [19]
- A. Bonifati, P.K.
Chrysanthis, A.M. Ouksel, and K.-U. Sattler.
Distributed databases and peer-to-peer databases: Past and present.
SIGMOD Record, 37(1):5–11, 2008.
(doi:10.1145/1374780.1374781)
- [20]
- E. Borcoci, A. Pinto,
A. Mehaoua, L. Fang, and
N. Wang.
Resource management and signalling architecture of a hybrid multicast service
for multimedia distribution.
Lecture Notes in Computer Science, 5274 LNCS:39–51, 2008.
(doi:10.1007/978-3-540-87359-4-5)
- [21]
- J.-M.
Borello and L. Mé.
Code obfuscation techniques for metamorphic viruses.
Journal in Computer Virology, 4(3):211–220, 2008.
(doi:10.1007/s11416-008-0084-2)
- [22]
- S. Bryton and F.B.E. Abreu.
Modularity-oriented refactoring.
In CSMR 2008: Proceedings of the European Conference on Software
Maintenance and Reengineering, pages 294–297, 2008.
(doi:10.1109/CSMR.2008.4493330)
- [23]
- K.R.B.
Butler, S. McLaughlin, and P.D. McDaniel.
Rootkit-resistant disks.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 403–415, 2008.
(doi:10.1145/1455770.1455821)
- [24]
- D. Cabanillas and
S. Willmott.
Studying viable free markets in peer-to-peer file exchange applications without
altruistic agents.
In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC
2006, pages 151–158, May 2008.
Lecture Notes in Computer Science 4461.
(doi:10.1007/978-3-540-79705-0_14)
- [25]
- B. Can,
A. Beham, and C. Heavey.
A comparative study of genetic algorithm components in simulation-based
optimisation.
In Winter Simulation Conference, pages 1829–1837, 2008.
(doi:10.1109/WSC.2008.4736272)
- [26]
- G. Canals, P. Molli,
J. Maire, S. Lauriére,
E. Pacitti, and M. Tlili.
XWiki concerto: A P2P wiki system supporting disconnected work.
In Cooperative Design, Visualization, and Engineering. 5th International
Conference, CDVE 2008, pages 98–106, September 2008.
Lecture Notes in Computer Science 5520.
(doi:10.1007/978-3-540-88011-0_13)
- [27]
- D.A.
Carrington.
What can software engineering students learn from studying open source
software?
International Journal of Engineering Education, 24(4):729–737,
2008.
- [28]
- A.L.
Carvalho, M. Mendes, P. Pinheiro, and
E. Furtado.
Analysis of the interaction design for mobile TV applications based on
multicriteria.
IFIP TC 8 WG 8.9 International Conference on Research and Practical
lssues of Enterprise Information Systems, CONFENIS 2007, 254 VOLUME
1:389–394, 2008.
- [29]
- M. Cassell.
Why governments innovate: Adoption and implementation of open source software
by four European cities.
International Public Management Journal, 11(2):193–213, 2008.
(doi:10.1080/10967490802095680)
- [30]
- M.F.
Casserly and J.E. Bird.
Web citation availability.
Library Resources and Technical Services, 52(1):42–53, 2008.
- [31]
- E.-C. Chang
and J. Xu.
Remote integrity check with dishonest storage server.
In Computer Security — ESORICS 2008: 13th European Symposium on
Research in Computer Security, pages 223–237, October 2008.
Lecture Notes in Computer Science 5283.
(doi:10.1007/978-3-540-88313-5-15)
- [32]
- G. Chen,
M. Li, and D. Kotz.
Data-centric middleware for context-aware pervasive computing.
Pervasive and Mobile Computing, 4(2):216–253, 2008.
(doi:10.1016/j.pmcj.2007.10.001)
- [33]
- G. Chen,
C.P. Low, and Z. Yang.
Coordinated services provision in peer-to-peer environments.
IEEE Transactions on Parallel and Distributed Systems,
19(4):433–446, 2008.
(doi:10.1109/TPDS.2007.70745)
- [34]
- G. Chen,
C.P. Low, and Z. Yang.
Enhancing search performance in unstructured P2P networks based on users'
common interest.
IEEE Transactions on Parallel and Distributed Systems,
19(6):821–836, 2008.
(doi:10.1109/TPDS.2008.42)
- [35]
- Q. Chen,
S. Zhang, and Y.-P.P. Chen.
Rule-based dependency models for security protocol analysis.
Integrated Computer-Aided Engineering, 15(4):369–380, 2008.
- [36]
- Qingfeng
Chen, Chengqi Zhang, and Shichao Zhang.
Secure Transaction Protocol Analysis: Models and Applications.
Springer-Verlag, 2008.
Lecture Notes in Computer Science 5111.
(doi:10.1007/978-3-540-85074-8_1)
- [37]
- W. Chen,
J. Li, J. Ma, R. Conradi,
J. Ji, and C. Liu.
An empirical study on software development with open source components in the
Chinese software industry.
Software Process Improvement and Practice, 13(1):89–100, 2008.
(doi:10.1002/spip.361)
- [38]
- S.-F.
Chiang, C.-H. Wu, and S.-D. Wang.
An active index diffusion scheme for multilayer unstructured peer-to-peer
networks.
In ICCCAS 2007 - International Conference on Communications, Circuits and
Systems 2007, pages 424–430, 2008.
(doi:10.1109/ICCCAS.2007.6251600)
- [39]
- J. Cho,
J.S. Young, and J. Ryu.
A new content-related advertising model for interactive television.
In IEEE International Symposium on Broadband Multimedia Systems and
Broadcasting 2008, Broadband Multimedia Symposium 2008, BMSB, 2008.
(doi:10.1109/ISBMSB.2008.4536639)
- [40]
- L.-D. Chou,
H.-H. Liang, S.-K. Chen, Y.-S.
Wang, C.-N. Yang, and M. Chen.
P2p-based distributed qos monitoring systems.
Journal of Internet Technology, 9(2):153–159, 2008.
- [41]
- S. Chung,
E. Kim, and J.C.L. Liu.
A storage saving scheme to share HD-quality content in community networks.
IEEE Transactions on Consumer Electronics, 54(4):1730–1738, 2008.
(doi:10.1109/TCE.2008.4711227)
- [42]
- J.P.
Correia and J. Visser.
Benchmarking technical quality of software products.
In Working Conference on Reverse Engineering, WCRE, pages
297–300, 2008.
(doi:10.1109/WCRE.2008.16)
- [43]
- S. Counsell.
Is the need to follow chains a possible deterrent to certain refactorings and
an inducement to others?
In Proceedings of the 2nd International Conference on Research Challenges
in Information Science, RCIS 2008, pages 111–122, 2008.
(doi:10.1109/RCIS.2008.4632099)
- [44]
- F.R.B. Cruz,
A.R. Duarte, and T. van Woensel.
Buffer allocation in general single-server queueing networks.
Computers and Operations Research, 35(11):3581–3598, 2008.
(doi:10.1016/j.cor.2007.03.004)
- [45]
- M. Czyrnek, E. Kuśmierek,
C. Mazurek, and M. Stroiński.
New services for iTVP content providers to manage live and on-demand content
streaming.
In Proceedings - 4th International Conference on Automated Solutions for
Cross Media Content and Multi-Channel Distribution, Axmedis 2008,
pages 180–186, 2008.
(doi:10.1109/AXMEDIS.2008.28)
- [46]
- I. Dacosta, N. Mehta,
E. Metrock, and J. Giffin.
Security analysis of an IP phone: Cisco 7960G.
In IPTComm 2008: Principles, Systems and Applications of IP
Telecommunications. Services and Security for Next Generation Networks —
Second International Conference, pages 236–255, July 2008.
Lecture Notes in Computer Science 5310.
(doi:10.1007/978-3-540-89054-6-12)
- [47]
- A. D'Aguanno and G. Haus.
Audio fingerprint and its applications to peer-to-peer systems.
In Audio Engineering Society - 124th Audio Engineering Society Convention
2008, volume 1, pages 86–94, 2008.
- [48]
- A. Davis.
Enterprise resource planning under open source software.
Enterprise Resource Planning for Global Economies: Managerial Issues and
Challenges, pages 56–76, 2008.
(doi:10.4018/978-1-59904-531-3.ch004)
- [49]
- E.C.
De Almeida, G. Sunyé, Y.L. Traon, and
P. Valduriez.
A framework for testing peer-to-peer systems.
In Proceedings - International Symposium on Software Reliability
Engineering, ISSRE, pages 167–176, 2008.
(doi:10.1109/ISSRE.2008.42)
- [50]
- J. De Boever.
Peer-to-peer content distribution an analysis of the internal and external
potentials and obstacles.
In WEBIST 2008 - 4th International Conference on Web Information Systems
and Technologies, Proceedings, volume 2, pages 367–377, 2008.
- [51]
- O. De Moor, D. Sereni,
M. Verbaere, E. Hajiyev,
P. Avgustinov, T. Ekman,
N. Ongkingco, and J. Tibble.
Ql: Object-oriented queries made easy.
In Generative and Transformational Techniques in Software Engineering II:
International Summer School, GTTSE 2007, pages 78–133, July 2008.
Lecture Notes in Computer Science 5235.
(doi:10.1007/978-3-540-88643-3_3)
- [52]
- J.S. De Oliveira Neto and
V.F.M. Salvador.
Non-functional requirements to voice user interface on interactive television:
An initial study.
In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information
Systems; Proceedings of Interfaces and Human Computer Interaction
2008, pages 77–84, 2008.
- [53]
- I. De Rezende and
F. Siqueira.
XOP: Sharing XML data objects through peer-to-peer networks.
In AINA 2008: International Conference on Advanced Information Networking
and Applications, pages 1021–1027, 2008.
(doi:10.1109/AINA.2008.37)
- [54]
- H. de Vries, H. de Vries, and
I. Oshri.
Standards-battles in open source software: The case of firefox.
Palgrave Macmillan, 2008.
(doi:10.1057/9780230595095)
- [55]
- L. Demir and S. Tunali.
A new approach for optimal buffer allocation in unreliable production lines.
In 38th International Conference on Computers and Industrial Engineering
2008, volume 2, pages 1962–1970, 2008.
- [56]
- G.I.
Doukidis, K. Pramatari, and G. Lekakos.
OR and the management of electronic services.
European Journal of Operational Research, 187(3):1296–1309, 2008.
(doi:10.1016/j.ejor.2006.09.014)
- [57]
- G. Exarchakos and
N. Antonopoulos.
Non-replicable reusable resources discovery on scale-free peer-to-peer
networks.
In 2nd IEEE International Conference on Digital Ecosystems and
Technologies, IEEE-DEST 2008, pages 28–33, 2008.
(doi:10.1109/DEST.2008.4635188)
- [58]
- M.E.
Falagas, E.A. Karveli, and V.I. Tritsaroli.
The risk of using the internet as reference resource: A comparative study.
International Journal of Medical Informatics, 77(4):280–286,
2008.
(doi:10.1016/j.ijmedinf.2007.07.001)
- [59]
- S. Fenz,
A. Ekelhart, and E. Weippl.
Fortification of IT security by automatic security advisory processing.
In AINA 2008: International Conference on Advanced Information Networking
and Applications, pages 575–582, 2008.
(doi:10.1109/AINA.2008.69)
- [60]
- O. Ferrer-Roca, F. Marcano,
and A. Diaz-Cardama.
Quality labels for e-health.
IET Communications, 2(2):202–207, 2008.
(doi:10.1049/iet-com:20060596)
- [61]
- N. Folinas, P. Vassiliadis,
E. Pitouri, E. Papapetrou, and
A. Zarras.
Context-aware query processing in ad-hoc environments of peers.
Journal of Electronic Commerce in Organizations, 6(1):38–62,
2008.
- [62]
- G. Fortino and W. Russo.
Using P2P, GRID and agent technologies for the development of content
distribution networks.
Future Generation Computer Systems, 24(3):180–190, 2008.
(doi:10.1016/j.future.2007.06.007)
- [63]
- G. Frantzeskou, S. MacDonell,
E. Stamatatos, and S. Gritzalis.
Examining the significance of high-level programming features in source code
author classification.
Journal of Systems and Software, 81(3):447–460, 2008.
(doi:10.1016/j.jss.2007.03.004)
- [64]
- M. Freiberger and S. Huq.
Network element security in optical communications equipment.
In National Fiber Optic Engineers Conference, NFOEC 2008. Optical
Society of America, 2008.
- [65]
- E.S.
Furtado and V. Furtado.
A multi-disciplinary strategy for identifying affective usability aspects in
educational geosimulation systems.
International Journal of Information and Communication Technology
Education, 4(1):15–24, 2008.
- [66]
- A.E.
Garcıa, A. Berl, K.A. Hummel,
R. Weidlich, A. Houyou, K.D.
Hackbarth, H. De Meer, and H. Hlavacs.
An economical cost model for fair resource sharing in virtual home
environments.
In 4th EURO-NGI Conference on Next Generation Internet Networks -
Proceedings, pages 153–160, 2008.
(doi:10.1109/NGI.2008.27)
- [67]
- M. Garuba,
C. Liu, and N. Washington.
A comparative analysis of anti-malware software, patch management, and
host-based firewalls in preventing malware infections on client computers.
In Proceedings — International Conference on Information Technology:
New Generations, ITNG 2008, pages 628–632, 2008.
(doi:10.1109/ITNG.2008.233)
- [68]
- M. Gegick, L. Williams,
J. Osborne, and M. Vouk.
Prioritizing software security fortification through code-level metrics.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 31–37, 2008.
(doi:10.1145/1456362.1456370)
- [69]
- R. Gelbard.
Decision rule for investment in frameworks of reuse.
In Handbook of Research on Modern Systems Analysis and Design
Technologies and Applications, pages 140–147. IGI Global, 2008.
(doi:10.4018/978-1-59904-887-1.ch010)
- [70]
- E. Georgiou, M.D. Dikaiakos,
and A. Stassopoulou.
On the properties of spam-advertised URL addresses.
Journal of Network and Computer Applications, 31(4):966–985,
2008.
(doi:10.1016/j.jnca.2007.01.003)
- [71]
- H. Ghanbari and
C. Constantinides.
An algebraic query method for static program analysis and measurement.
In 17th International Conference on Software Engineering and Data
Engineering, SEDE 2008, pages 174–181, 2008.
- [72]
- H. Ghasemalizadeh and
M. Razzazi.
A distributed web service retrieval and composition method.
In 31st International Convention Proceedings: Digital Economy - 5th
ALADIN, Information Systems Security, Business Intelligence Systems, Local
Government and Student Papers, volume 5, pages 253–258, 2008.
- [73]
- Robert L. Glass.
Open source vs. proprietary software: Yet another answer to the quality
comparison.
Software Practitioner, pages 1,4, 2008.
- [74]
- Valery Golender, Ido Ben
Moshe, and Shlomo Wygodny.
System
and method for troubleshooting software configuration problems using
application tracing.
United States Patent 7,386,839, June 2008.
- [75]
- K. Gondow, H. Kawashima, and
T. Imaizumi.
TBCppA: A tracer approach for automatic accurate analysis of C
preprocessor's behaviors.
In SCAM 2008: 8th IEEE International Working Conference on Source Code
Analysis and Manipulation,, pages 35–44, 2008.
(doi:10.1109/SCAM.2008.13)
- [76]
- K. Gondow, H. Kawashima, and
T. Imaizumi.
TBCppA: Tracer-based C preprocessor analyzer.
Computer Software, 25(1):105–123, 2008.
- [77]
- V.I.
Gorodetskii, O.V. Karsaev, V.V. Samoilov, and
S.V. Serebryakov.
Development tools for open agent networks.
Journal of Computer and Systems Sciences International,
47(3):429–446, 2008.
(doi:10.1134/S1064230708030131)
- [78]
- P. Gotthelf, A. Zunino,
C. Mateos, and M. Campo.
GMAC: An overlay multicast network for mobile agent platforms.
Journal of Parallel and Distributed Computing, 68(8):1081–1096,
2008.
(doi:10.1016/j.jpdc.2008.04.002)
- [79]
- P. Grobelny.
The expert system approach in development of loosely coupled software with use
of domain specific language.
In Proceedings of the International Multiconference on Computer Science
and Information Technology, IMCSIT 2008, volume 3, pages 119–123,
2008.
(doi:10.1109/IMCSIT.2008.4747227)
- [80]
- T. Guo and
S.A. Jarvis.
DIAO: A scheme of cooperative data distribution for grid-enabled data
analysis applications.
In The 3rd Int. Multi-Conf. Computing in the Global Information
Technology, ICCGI 2008 in Conjunction with ComP2P 2008: The 1st Int. Workshop
on Computational P2P Networks: Theory and Practice, pages 200–209,
2008.
(doi:10.1109/ICCGI.2008.26)
- [81]
- T. Haenselmann, T. King,
M. Busse, W. Effelsberg, and
M. Fuchs.
Embedded script-driven home-automation with sensor networks.
1st IFIP WG 6.2 Home Networking Conference, IHN 2007,
256:225–238, 2008.
- [82]
- Y. Haining, L.H. Etzkorn, and
S. Virani.
Automated classification and retrieval of reusable software components.
Journal of the American Society for Information Science and
Technology, 59(4):613–627, 2008.
(doi:10.1002/asi.20775)
- [83]
- Y. Hanna,
H. Rajan, and W. Zhang.
Slede: A domain-specific verification framework for sensor network security
protocol implementations.
In WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network
Security, pages 109–118, 2008.
(doi:10.1145/1352533.1352551)
- [84]
- F. Hashim,
M.R. Kibria, and A. Jamalipour.
A detection and recovery architecture against DoS and worm attacks in NGMN.
In IEEE International Conference on Communications, pages
1675–1679, 2008.
(doi:10.1109/ICC.2008.323)
- [85]
- S. Hatahet, A. Bouabdallah,
and Y. Challal.
A new worm propagation threat in bittorrent: Modeling and analysis.
In Proceedings of the International Multiconference on Computer Science
and Information Technology, IMCSIT 2008, volume 3, pages 791–798,
2008.
(doi:10.1109/IMCSIT.2008.4747333)
- [86]
- M.V.J. Heikkinen and
H. Hammaınen.
Scenario planning of mobile peer-to-peer service usage.
In 7th International Conference on Mobile Business, ICMB 2008, Creativity
and Convergence, pages 145–152, 2008.
(doi:10.1109/ICMB.2008.15)
- [87]
- Israel Herraiz.
A statistical
examination of the properties and evolution of libre software.
PhD thesis, Universidad Rey Juan Carlos, Madrid, 2008.
- [88]
- M. Hölzl, A. Rauschmayer,
and M. Wirsing.
Engineering of software-intensive systems: State of the art and research
challenges.
In M. Hölzl, A. Rauschmayer, and
M. Wirsing, editors, Software-Intensive Systems and New
Computing Paradigms: Challenges and Visions, pages 1–44.
Springer-Verlag, 2008.
Lecture Notes in Computer Science 5380.
(doi:10.1007/978-3-540-89437-7-1)
- [89]
- G. Huang,
Y. Zhou, and Y. Zhang.
A small world routing model for structured P2P systems.
In 2008 International Symposium on Information Science and Engineering,
ISISE 2008, pages 632–636, 2008.
(doi:10.1109/ISISE.2008.332)
- [90]
- D. Hull,
S.R. Pettifer, and D.B. Kell.
Defrosting the digital library: Bibliographic tools for the next generation
web.
PLoS Computational Biology, 4(10), 2008.
(doi:10.1371/journal.pcbi.1000204)
- [91]
- P. Hyojin, Y. Jinhong,
P. Juyoung, G.K. Shin, and K.C.
Jun.
A survey on peer-to-peer overlay network schemes.
In International Conference on Advanced Communication Technology,
ICACT, volume 2, pages 986–988, 2008.
(doi:10.1109/ICACT.2008.4493931)
- [92]
- Indratmo and J. Vassileva.
A review of organizational structures of personal information management.
Journal of Digital Information, 9(26), 2008.
- [93]
- C. Isen,
L. John, P.C. Jung, and J.S.
Hyo.
On the representativeness of embedded Java benchmarks.
In 2008 IEEE International Symposium on Workload Characterization,
IISWC'08, pages 153–162, 2008.
(doi:10.1109/IISWC.2008.4636100)
- [94]
- H. Ito.
Available bandwidth and minimum bandwidth delivery methods for video delivery
and video replication.
In 5th International Conference on Information Technology and
Applications, ICITA 2008, pages 828–833, 2008.
- [95]
- K. Iwasaki, M. Kanbara,
K. Yamazawa, and N. Yokoya.
Construction of extended geographical database based on photo shooting history.
In CIVR 2008: Proceedings of the International Conference on
Content-based Image and Video Retrieval, pages 185–194, 2008.
(doi:10.1145/1386352.1386381)
- [96]
- G. Jacob,
H. Debar, and E. Filiol.
Behavioral detection of malware: From a survey towards an established taxonomy.
Journal in Computer Virology, 4(3):251–266, 2008.
(doi:10.1007/s11416-008-0086-0)
- [97]
- Stéephane Ducasse Jannik Laval,
Alexandre Bergel.
Assessing the
quality of your software with MoQam.
In FAMOOSr 2008: 2nd Workshop on FAMIX and Moose in Reengineering,
pages 1–4, 2008.
- [98]
- E. Jeschke, B. Bon,
T. Inagaki, and S. Streeper.
A framework for the subaru telescope observation control system based on the
command design pattern.
In Proceedings of SPIE - The International Society for Optical
Engineering, volume 7019, 2008.
(doi:10.1117/12.788073)
- [99]
- H. Jiang,
J. Li, Z. Li, and X. Bai.
Performance evaluation of content distribution in hybrid CDN-P2P network.
In Proceedings of the 2008 2nd International Conference on Future
Generation Communication and Networking, FGCN 2008, pages 188–193,
2008.
(doi:10.1109/FGCN.2008.63)
- [100]
- H. Jiang, J. Li,
Z. Li, and J. Liu.
Efficient hierarchical content distribution using P2P technology.
In Proceedings of the 2008 16th International Conference on Networks,
ICON 2008, 2008.
(doi:10.1109/ICON.2008.4772628)
- [101]
- H. Jiang,
J. Liu, J. Li, and Z. Li.
A scalable system for large-scale multimedia distribution based on hybrid
networks.
In International Conference on Communication Technology Proceedings,
ICCT, pages 584–587, 2008.
(doi:10.1109/ICCT.2008.4716134)
- [102]
- Z. Joseph, G. Das, and
L. Fegaras.
Distinct value estimation on peer-to-peer networks.
In 1st International Conference on Pervasive Technologies Related to
Assistive Environments, PETRA 2008, 2008.
(doi:10.1145/1389586.1389617)
- [103]
- E.-H. Jung
and Y.-J. Park.
TinyONet: A cache-based sensor network bridge enabling sensing data
reusability and customized wireless sensor network services.
Sensors, 8(12):7930–7950, 2008.
(doi:10.3390/s8127930)
- [104]
- E. Kageyama, C. Maziero, and
A. Santin.
An experimental peer-to-peer e-mail system.
In CSE 2008: IEEE 11th International Conference on Computational Science
and Engineering, pages 203–208, 2008.
(doi:10.1109/CSE.2008.9)
- [105]
- E. Kageyama, C. Maziero, and
A. Santin.
A pull-based e-mail architecture.
In Proceedings of the ACM Symposium on Applied Computing, pages
468–472, 2008.
(doi:10.1145/1363686.1363802)
- [106]
- A. Keramati, B. Hadjiha, and
M.S. Saremi.
A proposal framework for adoption of electronic payment services by iranian
customers.
In IEEE International Conference on Industrial Informatics
(INDIN), pages 592–597, 2008.
(doi:10.1109/INDIN.2008.4618169)
- [107]
- Z. Khallouf.
Trust management in peer-to-peer SIP using the security assertion markup
language.
In ICTTA 2008: 3rd International Conference on Information and
Communication Technologies: From Theory to Applications, 2008.
(doi:10.1109/ICTTA.2008.4530277)
- [108]
- A. Klenk,
M. Kleis, B. Radier,
S. Elmoumouhi, G. Carle, and
M. Salaun.
Towards autonomic service control in next generation networks.
In ICAS 2008: 4th International Conference on Autonomic and Autonomous
Systems, pages 266–271, 2008.
(doi:10.1109/ICAS.2008.22)
- [109]
- M. Knoll,
H. Abbadi, and T. Weis.
Replication in peer-to-peer systems.
Lecture Notes in Computer Science, 5343:35–46, 2008.
(doi:10.1007/978-3-540-92157-8-4)
- [110]
- H.J. Ko,
K.I. Kim, E.J. Lee, W.G. Choi,
and U.M. Kim.
An effective XML data release in dynamic environments.
In Proceedings — 2008 International Conference on Convergence and
Hybrid Information Technology, ICHIT 2008, pages 182–189, 2008.
(doi:10.1109/ICHIT.2008.222)
- [111]
- H.L.
Koch and D.W. Johnson.
Are home-based sales representatives aware and proactive regarding security
risks in the internet era?
Journal of Internet Commerce, 7(3):379–402, 2008.
(doi:10.1080/15332860802250492)
- [112]
- T. Kosar,
P.E. Martínez López, P.A. Barrientos,
and M. Mernik.
A preliminary study on various implementation approaches of domain-specific
language.
Information and Software Technology, 50(5):390–405, 2008.
(doi:10.1016/j.infsof.2007.04.002)
- [113]
- T. Koskela, J. Julkunen,
J. Korhonen, M. Liu, and
M. Ylianttila.
Leveraging collaboration of peer-to-peer and web services.
In Proceedings — The 2nd International Conference on Mobile Ubiquitous
Computing, Systems, Services and Technologies, UBICOMM 2008, pages
496–501, 2008.
(doi:10.1109/UBICOMM.2008.24)
- [114]
- T. Koskela, O. Kassinen,
J. Korhonen, Z. Ou, and
M. Ylianttila.
Peer-to-peer community management using structured overlay networks.
In Proceedings of the International Conference on Mobile Technology,
Applications, and Systems, Mobility'08, 2008.
(doi:10.1145/1506270.1506283)
- [115]
- K. Kotapati, P. Liu, and
T.F. LaPorta.
EndSec: An end-to-end message security protocol for mobile telecommunication
networks.
In WoWMoM 2008: IEEE International Symposium on A World of Wireless,
Mobile and Multimedia Networks, 2008.
(doi:10.1109/WOWMOM.2008.4594919)
- [116]
- B.R. Krogstie.
Power through brokering: Open source community participation in software
engineering student projects.
In Proceedings - International Conference on Software Engineering,
pages 791–800, 2008.
(doi:10.1145/1368088.1368201)
- [117]
- A.D. Kshemkalyani and
M. Singhal.
Distributed computing: Principles, algorithms, and systems.
Cambridge University Press, 2008.
(doi:10.1017/CBO9780511805318)
- [118]
- H.C.W. Lau,
T.M. Chan, and W.T. Tsui.
Fuzzy logic guided genetic algorithms for the location assignment of items.
In 2007 IEEE Congress on Evolutionary Computation, CEC 2007, pages
4281–4288, 2008.
(doi:10.1109/CEC.2007.4425030)
- [119]
- H.C.W. Lau,
T.M. Chan, and W.T. Tsui.
Item-location assignment using fuzzy logic guided genetic algorithms.
IEEE Transactions on Evolutionary Computation, 12(6):765–780,
2008.
(doi:10.1109/TEVC.2008.924426)
- [120]
- C.-H. Li,
G.-F. Feng, T.-C. Gu, S.-L. Lu,
and D.-X. Chen.
Hotspots-free overlay cooperative caching scheme.
Ruan Jian Xue Bao/Journal of Software, 19(3):744–754, 2008.
(doi:10.3724/SP.J.1001.2008.00744)
- [121]
- D.-C. Li,
H.-B. Sun, and Z.-H. Xin.
Relativity analysis on wireless value-added services market and SP
regulation.
Tongxin Xuebao/Journal on Communication, 29(2):116–122,
2008.
- [122]
- F. Li,
T. Iida, and Y. Ishikawa.
Traceable P2P record exchange: A database-oriented approach.
Frontiers of Computer Science in China, 2(3):257–267, 2008.
(doi:10.1007/s11704-008-0028-5)
- [123]
- K. Li,
X. Sun, and Y. He.
Duty-oriented hybrid peer-to-peer network based on metadata.
In International Symposium on Advances in Computer and Sensor Networks
and Systems, 2008. Aardvark Global Publishing, 2008.
- [124]
- T. Li,
J. Wang, and J. You.
Using degree-based strategy for network coding in content distribution network.
In Proceedings of the 2008 International Conference on Computer and
Electrical Engineering, ICCEE 2008, pages 487–491, 2008.
(doi:10.1109/ICCEE.2008.20)
- [125]
- F.-R. Lin,
H.-M. Lo, and C.-R. Wang.
Can a p2p file-sharing network become an e-marketplace?
In Proceedings of the Annual Hawaii International Conference on System
Sciences, 2008.
(doi:10.1109/HICSS.2008.86)
- [126]
- S.-J. Lin,
M.-C. Huang, K.-C. Lai, and K.-C.
Huang.
Design and implementation of job migration policies in p2p grid systems.
In Proceedings of the 3rd IEEE Asia-Pacific Services Computing
Conference, APSCC 2008, pages 75–80, 2008.
(doi:10.1109/APSCC.2008.246)
- [127]
- M. Lindgren, R. Land,
C. Norström, and A. Wall.
Key aspects of software release planning in industry.
In ASWEC 2008: Proceedings of the Australian Software Engineering
Conference, pages 320–329, 2008.
(doi:10.1109/ASWEC.2008.4483220)
- [128]
- M. Lindgren, A. Wall,
R. Land, and C. Norstr?m.
A method for balancing short- and long-term investments: Quality vs. features.
In EUROMICRO 2008 - Proceedings of the 34th EUROMICRO Conference on
Software Engineering and Advanced Applications, SEAA 2008, pages
175–182, 2008.
(doi:10.1109/SEAA.2008.22)
- [129]
- Y. Liu,
G. Guo, and J. Qi.
An algorithm of system decomposition based on Laplace spectral graph
partitioning technology.
In Proceedings - International Conference on Computer Science and
Software Engineering, CSSE 2008, volume 2, pages 85–89, 2008.
(doi:10.1109/CSSE.2008.1015)
- [130]
- Y. Liu,
C. Yang, K. Xu, and H. Chen.
Controlling mechanism for the hubs in peer-to-peer networks.
In Proceedings - 2008 International Conference on Computational
Intelligence and Security, CIS 2008, volume 1, pages 511–515, 2008.
(doi:10.1109/CIS.2008.109)
- [131]
- Y. Liu,
C. Yang, K. Xu, and H. Chen.
A fair utility function for incentive mechanism against free-riding in
peer-to-peer networks.
In ruSMART 2008: 8th International Conference, NEW2AN and 1st Russian
Conference on Smart Spaces — Next Generation Teletraffic and Wired/Wireless
Advanced Networking, pages 222–233, 2008.
Lecture Notes in Computer Science 5174.
(doi:10.1007/978-3-540-85500-2_20)
- [132]
- Y. Liu,
L. Zhu, J. Gao, and W. Cheng.
A research about redundant data packet in unstructured P2P network.
In HPCC 2008: 10th IEEE International Conference on High Performance
Computing and Communications,, pages 653–658, 2008.
(doi:10.1109/HPCC.2008.75)
- [133]
- Y. Liu,
L. Zhu, J. Gao, and Y. Li.
A segment strategy based on flooding search in unstructured P2P network.
In Proceedings of the 2008 2nd International Conference on Future
Generation Communication and Networking, FGCN 2008, volume 1, pages
252–255, 2008.
(doi:10.1109/FGCN.2008.201)
- [134]
- Y.-H. Liu,
J.-S. Yih, F. Pinel, and
T. Chieu.
A model-driven SOA implementation of multi-channel Websphere Commerce
Gift Center.
In IEEE International Conference on e-Business Engineering, ICEBE'08 -
Workshops: AiR'08, EM2I'08, SOAIC'08, SOKM'08, BIMA'08, DKEEE'08,
pages 29–34, 2008.
(doi:10.1109/ICEBE.2008.96)
- [135]
- J.-W. Lo,
M.-S. Hwang, and Y.-P. Chu.
An exchangeable e-cash scheme by e-mint.
In Proceedings - 8th International Conference on Intelligent Systems on
Intelligent Systems Design and Applications, ISDA 2008, volume 3,
pages 246–251, 2008.
(doi:10.1109/ISDA.2008.186)
- [136]
- S. Loeb,
B. Falchuk, and E. Panagos.
The Fabric of Mobile Services: Software Paradigms and Business
Demands.
wiley, 2008.
(doi:10.1002/9780470478240)
- [137]
- M. Lopez,
J. Whalley, P. Robbins, and
R. Lister.
Relationships between reading, tracing and writing skills in introductory
programming.
In ICER'08 - Proceedings of the ACM Workshop on International Computing
Education Research, pages 101–111, 2008.
(doi:10.1145/1404520.1404531)
- [138]
- R.P. Loui.
In praise of scripting: Real programming pragmatism.
Computer, 41(7):22–26, 2008.
(doi:10.1109/MC.2008.228)
- [139]
- X.-C. Lu and
D.-S. Li.
Overlay technologies for internet-based virtual computing environment.
Jisuanji Xuebao/Chinese Journal of Computers, 31(9):1516–1524,
2008.
- [140]
- D.F.
Macedo, A.L. Dos Santos, and G. Pujolle.
From TCP/IP to convergent networks: Challenges and taxonomy.
IEEE Communications Surveys and Tutorials, 10(4):40–55, 2008.
(doi:10.1109/SURV.2008.080405)
- [141]
- J. Mallet and S. Rouvrais.
Style-based model transformation for early extrafunctional analysis of
distributed systems.
Lecture Notes in Computer Science, 5281 LNCS:55–70, 2008.
(doi:10.1007/978-3-540-87879-7-4)
- [142]
- T. Mandl.
Automatic quality assessment for internet pages.
In Handbook of Research on Web Information Systems Quality, pages
104–112. IGI Global, 2008.
(doi:10.4018/978-1-59904-847-5.ch006)
- [143]
- M.R. Martınez Torres,
S.L. Toral Marın, and F.J.
Barrero Garcıa.
Study and analysis of open source software projects mailing lists as a tool for
knowledge sharing.
Investigaciones Europeas de Direccion y Economia de la Empresa,
14(3):79–90, 2008.
(doi:10.1016/S1135-2523(12)60068-9)
- [144]
- D. Matthews, G. Wilson, and
S. Easterbrook.
Configuration management for large-scale scientific computing at the UK met
office.
Computing in Science and Engineering, 10(6):56–64, 2008.
(doi:10.1109/MCSE.2008.144)
- [145]
- F. Menczer, L.-S. Wu, and
R. Akavipat.
Intelligent peer networks for collaborative web search.
AI Magazine, 29(3):35–46, 2008.
- [146]
- S. Montanelli and S. Castano.
Semantically routing queries in peer-based systems: The H-Link approach.
Knowledge Engineering Review, 23(1):51–72, 2008.
(doi:10.1017/S0269888907001257)
- [147]
- E. Mourtou.
Modelling access control in a greek public hospital.
Journal on Information Technology in Healthcare, 6(3):230–239,
2008.
- [148]
- J.L.
Muñoz, O. Esparza, J. Forné, and
E. Pallares.
H-OCSP: A protocol to reduce the processing burden in online certificate
status validation.
Electronic Commerce Research, 8(4):255–273, 2008.
(doi:10.1007/s10660-008-9024-y)
- [149]
- E. Murphy-Hill, A.P. Black,
D. Dig, and C. Parnin.
Gathering refactoring data: A comparison of four methods.
In Proceedings of the 2nd Workshop on Refactoring Tools, WRT '08, in
conjunction with the Conference on Object Oriented Programming Systems
Languages and Applications, OOPSLA 2008, 2008.
(doi:10.1145/1636642.1636649)
- [150]
- A. Nabih,
A. Hossain, S. Shepherd, and
M. Khaled.
"where you are" based authentication: An improved security protocol using BAN
logic.
In 7th European Conference on Information Warfare and Security 2008, ECIW
2008, pages 153–162, 2008.
- [151]
- P. Naubourg, V. Lopes, and
L. Bossu.
A case study of open source software development in proteomic area: The LIMS
ePims.
In SITIS 2008 — Proceedings of the 4th International Conference on
Signal Image Technology and Internet Based Systems, pages 555–562,
2008.
(doi:10.1109/SITIS.2008.83)
- [152]
- A. Ng,
H. Grimm, T. Lezama, A. Persson,
M. Andersson, and M. JagÌstam.
OPTIMISE: An internet-based platform for metamodel-assisted simulation
optimization.
International Conference on Communication Systems and Electrical
Engineering, 4 LNEE:281–296, 2008.
(doi:10.1007/978-0-387-74938-9_20)
- [153]
- T. Nguyen,
T. Wolf, and D. Damian.
Global software development and delay: Does distance still matter?
In ICGSE 2008: 3rd IEEE International Conference Global Software
Engineering, pages 45–54, 2008.
(doi:10.1109/ICGSE.2008.39)
- [154]
- J. Ni,
J. Lin, S.J. Harrington, and
N. Sharma.
Designing file replication schemes for peer-to-peer file sharing systems.
In IEEE International Conference on Communications, pages
5609–5613, 2008.
(doi:10.1109/ICC.2008.1051)
- [155]
- M. Obrist,
R. Bernhaupt, and M. Tscheligi.
Interactive TV for the home: An ethnographic study on users' requirements and
experiences.
International Journal of Human-Computer Interaction,
24(2):174–196, 2008.
(doi:10.1080/10447310701821541)
- [156]
- G. Oleksik, D. Frohlich,
L.M. Brown, and A. Sellen.
Sonic interventions: Understanding and extending the domestic soundscape.
In Conference on Human Factors in Computing Systems - Proceedings,
pages 1419–1428, 2008.
(doi:10.1145/1357054.1357277)
- [157]
- H. Park and M. Van
Der Schaar.
Coalition based multimedia peer matching strategies for P2P networks.
In Proceedings of SPIE — The International Society for Optical
Engineering, volume 6822, 2008.
Article number 682203.
(doi:10.1117/12.766578)
- [158]
- H. Park and M. Van
Der Schaar.
Coalition-based resource reciprocation strategies for P2P multimedia
broadcasting.
IEEE Transactions on Broadcasting, 54(3):557–567, 2008.
(doi:10.1109/TBC.2008.2001148)
- [159]
- M. Pathan and R. Buyya.
A taxonomy of CDNs.
Lecture Notes in Electrical Engineering, 9 LNEE:33–77, 2008.
(doi:10.1007/978-3-540-77887-5_2)
- [160]
- M. Pathan,
R. Buyya, and A. Vakali.
Content delivery networks: State of the art, insights, and imperatives.
Lecture Notes in Electrical Engineering, 9 LNEE:3–32, 2008.
(doi:10.1007/978-3-540-77887-5_1)
- [161]
- M.J.V.
Pereira, M. Mernik, D. da Cruz, and
P.R. Henriques.
Program comprehension for domain-specific languages.
Computer Science and Information Systems, 5(2):1–17, 2008.
(doi:10.2298/CSIS0802001P)
- [162]
- L.S.G.
Piccolo, M.C.C. Baranauskas, and E. Furtado.
A t-gov prototype evaluation considering a wide diversity of users.
In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information
Systems; Proceedings of Interfaces and Human Computer Interaction
2008, pages 27–34, 2008.
- [163]
- E.S.
Poole, M. Chetty, R.E. Grinter, and
K.W. Edwards.
More than meets the eye: Transforming the user experience of home network
management.
In Proceedings of the Conference on Designing Interactive Systems:
Processes, Practices, Methods, and Techniques, DIS, pages 455–464,
2008.
(doi:10.1145/1394445.1394494)
- [164]
- C.R.
Prause and M. Eisenhauer.
Social aspects of a continuous inspection platform for software source code.
In Proceedings - International Conference on Software Engineering,
pages 85–88, 2008.
(doi:10.1145/1370114.1370136)
- [165]
- A. Qamra
and E.Y. Chang.
Scalable landmark recognition using extent.
Multimedia Tools and Applications, 38(2):187–208, 2008.
(doi:10.1007/s11042-007-0178-8)
- [166]
- C. Rahhal,
H. Skaf-Molli, and P. Molli.
SWOOKI: A peer-to-peer semantic wiki.
In CEUR Workshop Proceedings, volume 360, pages 124–125,
2008.
- [167]
- C. Åhlund, S. Wallin,
K. Andersson, and R. Brännström.
A service level model and internet mobility monitor.
Telecommunication Systems, 37(1-3):49–70, 2008.
(doi:10.1007/s11235-008-9072-6)
- [168]
- M. Ramachandran.
Software components: Guidelines and applications.
Nova Science Publishers, Inc., 2008.
- [169]
- J. Ramırez, L. Gimson,
G. Gil, E. Fernández,
D. Romero, D. Arias, A. Vera,
and E. Sanchez.
The reuse of libraries in moodle: Impact on the estimation of the development
of a similar platform.
In 7th Ibero-American Conference on Systems, Cybernetics and Informatics,
CISCI 2008, Jointly with the 5th Ibero-American Symposium on Education,
Cybernetics and Informatics, SIECI 2008 and 3rd Int. Symp. on Knowledge
Communication and Conf. CCC 2008, volume 2, pages 194–198.
International Institute of Informatics and Systemics, IIIS, 2008.
- [170]
- H. Reza,
K. Ogaard, and A. Malge.
A model based testing technique to test web applications using StateCharts.
In Proceedings — International Conference on Information Technology:
New Generations, ITNG 2008, pages 183–188, 2008.
(doi:10.1109/ITNG.2008.145)
- [171]
- M. Rice and
N. Alm.
Designing new interfaces for digital interactive television usable by older
adults.
Computers in Entertainment, 6(1), May 2008.
(doi:10.1145/1350843.1350849)
- [172]
- A. Roczniak, A.E. Saddik, and
R. Kouhi.
Design of application-specific incentives in p2p networks.
In Proceedings - 12th 2008 IEEE/ACM International Symposium on
Distributed Simulation and Real Time Applications, DS-RT 2008, pages
194–203, 2008.
(doi:10.1109/DS-RT.2008.17)
- [173]
- L. Rodero Merino,
L. López, A. Fernández, and
V. Cholvi.
DANTE: A self-adapting peer-to-peer system.
In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC
2006, pages 31–42, May 2008.
Lecture Notes in Computer Science 4461.
(doi:10.1007/978-3-540-79705-0_3)
- [174]
- M. Rohr,
A. Van Hoorn, J. Matevska,
N. Sommer, L. Stoever,
S. Giesecke, and W. Hasselbring.
Kieker: Continuous monitoring and on demand visualization of Java software
behavior.
In Proceedings of the IASTED International Conference on Software
Engineering, SE 2008, pages 80–85, 2008.
- [175]
- N.C. Romano Jr. and
J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
In Selected Readings on Electronic Commerce Technologies: Contemporary
Applications, pages 310–332. IGI Global, 2008.
(doi:10.4018/978-1-60566-096-7.ch022)
- [176]
- P. Rosner and S. Viswanathan.
Visualisation of coupling and programming to interface for object-oriented
systems.
In Proceedings of the International Conference on Information
Visualisation, pages 575–581, 2008.
(doi:10.1109/IV.2008.96)
- [177]
- J.A. Roy,
F. Koushanfar, and I.L. Markov.
Circuit CAD tools as a security threat.
In HOST 2008: IEEE International Workshop on Hardware-Oriented Security
and Trust, pages 65–66, 2008.
(doi:10.1109/HST.2008.4559052)
- [178]
- S. Rueda,
P. Morillo, and J.M. Orduña.
A comparative study of awareness methods for peer-to-peer distributed virtual
environments.
Computer Animation and Virtual Worlds, 19(5):537–552, 2008.
(doi:10.1002/cav.230)
- [179]
- F. Safaei, A. Khonsari,
M. Fathy, and M. Ould-Khaoua.
Performance modelling of pipelined circuit switching in hypercubes with hot
spot traffic.
Microprocessors and Microsystems, 32(1):10–22, 2008.
(doi:10.1016/j.micpro.2007.09.002)
- [180]
- M.B.
Salem, S. Hershkop, and S.J. Stolfo.
A survey of insider attack detection research.
Advances in Information Security, 39:69–70, 2008.
- [181]
- S. Sarkar,
R. Sindhgatta, and K. Pooloth.
A collaborative platform for application knowledge management in software
maintenance projects.
In COMPUTE 2008 - The 1st ACM Bangalore Annual Conference, 2008.
(doi:10.1145/1341771.1341774)
- [182]
- M.I.
Sarwar, W. Tanveer, I. Sarwar, and
W. Mahmood.
A comparative study of MI tools: Defining the roadmap to MI tools
standardization.
In IEEE INMIC 2008: 12th IEEE International Multitopic Conference -
Conference Proceedings, pages 379–385, 2008.
(doi:10.1109/INMIC.2008.4777767)
- [183]
- J. Schäfer, K. Malinka,
and P. Hanáček.
Malware spreading models in peer-to-peer networks.
In International Carnahan Conference on Security Technology, pages
339–345, 2008.
(doi:10.1109/CCST.2008.4751325)
- [184]
- J. Schäfer, K. Malinka,
and P. Hanáček.
Peer-to-peer networks security.
In ICIMP 2008: The 3rd International Conference on Internet Monitoring
and Protection, pages 74–79, 2008.
(doi:10.1109/ICIMP.2008.26)
- [185]
- A.U. Schmidt.
On the superdistribution of digital goods.
In 3rd International Conference on Communications and Networking in
China, ChinaCom 2008, pages 1337–1344, 2008.
(doi:10.1109/CHINACOM.2008.4685251)
- [186]
- S. Schosser, K. Böhm,
and B. Vogt.
Do humans identify efficient strategies in structured peer-to-peer systems?
In 7th International Joint Conference on Autonomous Agents and Multiagent
Systems, AAMAS 2008, volume 3, pages 1481–1484. International
Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2008.
- [187]
- S. Schosser, K. Böhm,
and B. Vogt.
Online vs. offline behavior: How to design strategic agents for distributed
coordinator-free environments.
In Proceedings - 2008 IEEE/WIC/ACM International Conference on
Intelligent Agent Technology, IAT 2008, pages 48–56, 2008.
(doi:10.1109/WIIAT.2008.10)
- [188]
- Robert C.
Seacord.
The CERT C Secure Coding Standard.
Addison-Wesley, Boston, MA, 2008.
- [189]
- F.J. Seifert.
Safety from deception through broadband coding the Austrian victory over the
hackers at Graz in 1991.
Elektrotechnik und Informationstechnik, 125(11), 2008.
In German (Täuschungssicherheit durch Breitbandige Verschlüsselung Der
Österreichische Sieg uber die Hacker bei Graz 1991).
(doi:10.1007/s00502-008-0588-y)
- [190]
- D. Sereni, M. Verbaere,
E. Hajiyev, P. Avgustinov,
T. Ekman, N. Ongkingco, and
J. Tibble.
QL: Object-oriented queries made easy.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5235
LNCS:78–133, 2008.
(doi:10.1007/978-3-540-88643-3-3)
- [191]
- V. Sesum-Cavic and
E. Küehn.
Instantiation of a generic model for load balancing with intelligent
algorithms.
Lecture Notes in Computer Science, 5343:311–317, 2008.
(doi:10.1007/978-3-540-92157-8-31)
- [192]
- P.C.
Sethia, S.K. Somani, and A.I. Khandwawala.
Enhancing reliability of a continuous manufacturing system using WIP buffers.
International Journal of Simulation Modelling, 7(2):61–70, 2008.
(doi:10.2507/IJSIMM07(2)1.098)
- [193]
- N. Seyff,
F. Graf, P. Grünbacher, and
N. Maiden.
Mobile discovery of requirements for context-aware systems.
In Requirements Engineering: Foundation for Software Quality,
pages 183–197, 2008.
Lecture Notes in Computer Science 5025.
(doi:10.1007/978-3-540-69062-7_18)
- [194]
- Z. Shen,
W. Yongji, and X. Junchao.
Mining individual performance indicators in collaborative development using
software repositories.
In APSEC 08: 15th Asia-Pacific Software Engineering Conference,
pages 247–254, December 2008.
(doi:10.1109/APSEC.2008.12)
- [195]
- S. Shirali-Shahreza and
M. Shirali-Shahreza.
Various aspects of open source software development.
In ITSim '08: International Symposium on Information Technology,
volume 3, 2008.
(doi:10.1109/ITSIM.2008.4631871)
- [196]
- S.A. Sioutas.
NBDT: An efficient P2P indexing scheme for web service discovery.
International Journal of Web Engineering and Technology,
4(1):95–113, 2008.
(doi:10.1504/IJWET.2008.016106)
- [197]
- J.A. Solworth.
Instant revocation.
In Public Key Infrastructure: 5th European PKI Workshop: Theory and
Practice, EuroPKI 2008, pages 31–48, 2008.
Lecture Notes in Computer Science 5057.
(doi:10.1007/978-3-540-69485-4_3)
- [198]
- K. Somasundaram and
S. Radhakrishnan.
Nimble protein sequence alignment in grid (NPSAG).
Journal of Computer Science, 4(1):36–41, 2008.
- [199]
- A.M.
Sourouni, S. Mouzakitis, D. Askounis, and
G. Velegrakis.
An ontology-based e-business transactions registry.
In MCCSIS'08 — IADIS Multi Conference on Computer Science and
Information Systems; Proceedings e-Commerce 2008, pages 86–93,
2008.
- [200]
- G. Spanoudakis, C. Kloukinas,
and K. Androutsopoulos.
Dynamic verification and control of mobile peer-to-peer systems.
In ICIMP 2008: The 3rd International Conference on Internet Monitoring
and Protection, pages 1–10, 2008.
(doi:10.1109/ICIMP.2008.11)
- [201]
- C. Spielvoge,
L. Böszörmenyi, and P. Kropf.
A demo for affinity based content delivery architectures.
In Proceedings of the International Workshop on Network and Operating
System Support for Digital Audio and Video, pages 107–108, 2008.
(doi:10.1145/1496046.1496071)
- [202]
- C. Stern,
P. Adelt, V. Krummel, and M.R.
Ackermann.
Reliable evidence of data integrity from an untrusted storage service.
In Proceedings - 4th International Conference on Networking and Services,
ICNS 2008, pages 24–29, 2008.
(doi:10.1109/ICNS.2008.28)
- [203]
- Sufatrio
and R.H.C. Yap.
Extending BAN logic for reasoning with modern PKI-based protocols.
In 2008 IFIP International Conference on Network and Parallel Computing,
NPC 2008, pages 190–197, 2008.
(doi:10.1109/NPC.2008.86)
- [204]
- W. Sun,
R. Sekar, Z. Liang, and V.N.
Venkatakrishnan.
Expanding malware defense by securing software installations.
In DIMVA 2008: 5th International Conference on Detection of Intrusions
and Malware, and Vulnerability Assessment, pages 164–185, July 2008.
Lecture Notes in Computer Science 5137.
(doi:10.1007/978-3-540-70542-0_9)
- [205]
- X. Sun,
K. Li, Y. Liu, and Y. Tian.
SLUP: A semantic-based and location-aware unstructured p2p network.
In HPCC 2008: 10th IEEE International Conference on High Performance
Computing and Communications, pages 288–295, 2008.
(doi:10.1109/HPCC.2008.49)
- [206]
- X. Sun,
Y. Tian, Y. Liu, and Y. He.
An unstructured P2P network model for efficient resource discovery.
In 1st International Conference on the Applications of Digital
Information and Web Technologies, ICADIWT 2008, pages 156–161, 2008.
(doi:10.1109/ICADIWT.2008.4664336)
- [207]
- L. Swan,
A.S. Taylor, and R. Harper.
Making place for clutter and other ideas of home.
ACM Transactions on Computer-Human Interaction, 15(2), 2008.
(doi:10.1145/1375761.1375764)
- [208]
- W. Taha.
Domain-specific languages.
In 2008 International Conference on Computer Engineering and Systems,
ICCES 2008, 2008.
(doi:10.1109/ICCES.2008.4772953)
- [209]
- I. Tamanini, T.C.
Sampaio Machado, M.S. Mendes, A.L. Carvalho,
M.E.S. Furtado, and P.R. Pinheiro.
A model for mobile television applications based on verbal decision analysis.
In Advances in Computer and Information Sciences and Engineering,
pages 399–404, 2008.
- [210]
- X. Tang,
J. Xu, and W.-C. Lee.
Analysis of TTL-based consistency in unstructured peer-to-peer networks.
IEEE Transactions on Parallel and Distributed Systems,
19(12):1683–1694, 2008.
(doi:10.1109/TPDS.2008.44)
- [211]
- A. Telea
and L. Voinea.
A tool for optimizing the build performance of large software code bases.
In CSMR 2008: Proceedings of the European Conference on Software
Maintenance and Reengineering,, pages 323–325, 2008.
(doi:10.1109/CSMR.2008.4493340)
- [212]
- A. Tiwana.
Impact of classes of development coordination tools on software development
performance: A multinational empirical study.
ACM Transactions on Software Engineering and Methodology, 17(2),
2008.
(doi:10.1145/1348250.1348257)
- [213]
- P. Traynor, P. McDaniel, and
T.L. Porta.
Security for telecommunications networks.
Advances in Information Security, 40:1–177, 2008.
- [214]
- M. Tu,
N. Tadayon, and E. Lu.
A scalable update protocol for peer-to-peer data grids.
In Proceedings of the 2008 International Conference on Parallel and
Distributed Processing Techniques and Applications, PDPTA 2008, pages
826–832, 2008.
- [215]
- F. Turkmen, P. Mazzoleni,
B. Crispo, and E. Bertino.
P-CDN: Extending access control capabilities of P2P systems to provide
CDN services.
In Proceedings — IEEE Symposium on Computers and Communications,
pages 480–486, 2008.
(doi:10.1109/ISCC.2008.4625671)
- [216]
- J. Ubacht and J.L.M.
Vrancken.
Next generation policy for the E-communications sector: The role of the end
user and technology.
In International Telecommunication Union - Proceedings of the 1st ITU-T
Kaleidoscope Academic Conference, Innovations in NGN, K-INGN, 2008.
(doi:10.1109/KINGN.2008.4542296)
- [217]
- D. Ueno.
Linenum info: System support for code reading.
In ICALT 2008: The 8th IEEE International Conference on Advanced Learning
Technologies, pages 600–602, 2008.
(doi:10.1109/ICALT.2008.162)
- [218]
- M. Umarji,
S.E. Sim, and C. Lopes.
Archetypal internet-scale source code searching.
In Open Source Development, Communities and Quality: IFIP 20th World
Computer Congress, Working Group 2.3 on Open Source Software, pages
257–263. IFIP: International Federation for Information Processing,
Springer, September 2008.
(doi:10.1007/978-0-387-09684-1_21)
- [219]
- S. Van Der Gaast and
D. Bijwaard.
Efficiency of personalized content distribution.
Bell Labs Technical Journal, 13(2):135–146, 2008.
(doi:10.1002/bltj.20309)
- [220]
- M. Van Der Schaar, D.S.
Turaga, and R. Sood.
Stochastic optimization for content sharing in P2P systems.
IEEE Transactions on Multimedia, 10(1):132–143, 2008.
(doi:10.1109/TMM.2007.911288)
- [221]
- L. Van Velsen, T. Van
Der Geest, R. Klaassen, and M. Steehouder.
User-centered evaluation of adaptive and adaptable systems: A literature
review.
Knowledge Engineering Review, 23(3):261–281, 2008.
(doi:10.1017/S0269888908001379)
- [222]
- Eelco Visser.
WebDSL: A case study in domain-specific language engineering.
In Generative and Transformational Techniques in Software Engineering II:
International Summer School, GTTSE 2007, pages 291–373, July 2008.
Lecture Notes in Computer Science 5235.
(doi:10.1007/978-3-540-88643-3_7)
- [223]
- H. Wang and P. Van Mieghem.
Constructing the overlay network by tuning link weights.
In Proceedings of the Second International Conference on Communications
and Networking in China, ChinaCom 2007, pages 139–143, 2008.
(doi:10.1109/CHINACOM.2007.4469347)
- [224]
- Y. Wen and
H.-M. Wang.
Isolated execution model based on local virtualization technology.
Jisuanji Xuebao/Chinese Journal of Computers, 31(10):1768–1779,
2008.
- [225]
- T. Wolf,
T. Nguyen, and D. Damian.
Does distance still matter?
Software Process Improvement and Practice, 13(6):493–510, 2008.
(doi:10.1002/spip.401)
- [226]
- J.D. Wren.
URL decay in MEDLINE — a 4-year follow-up study.
Bioinformatics, 24(11):1381–1385, 2008.
(doi:10.1093/bioinformatics/btn127)
- [227]
- H. Wu,
J. Gray, and M. Mernik.
Grammar-driven generation of domain-specific language debuggers.
Software - Practice and Experience, 38(10):1073–1103, 2008.
(doi:10.1002/spe.863)
- [228]
- H. Yamamoto, J. Abu Qudeiri,
and E. Marui.
Definition of FTL with bypass lines and its simulator for buffer size
decision.
International Journal of Production Economics, 112(1):18–25,
2008.
(doi:10.1016/j.ijpe.2007.03.007)
- [229]
- M.K.H.
Yeung and Y.-K. Kwok.
Game theoretic peer selection for resilient peer-to-peer media streaming
systems.
In ICDCS 2008: The 28th International Conference on Distributed Computing
Systems, pages 817–824, 2008.
(doi:10.1109/ICDCS.2008.69)
- [230]
- H. Yin,
C. Lin, Q. Zhang, and Z. and
Chen.
TrustStream: A secure and scalable architecture for large-scale internet
media streaming.
IEEE Transactions on Circuits and Systems for Video Technology,
18(12):1692–1702, 2008.
(doi:10.1109/TCSVT.2008.927000)
- [231]
- U.H. Yoon,
K.-I. Jeong, K.-L. Park,
H. Jiyon, A. Jaemin,
S. Jeonghwa, and S.-D. Kim.
Reducing the discovery overheads in a DHT based P2P network by using
virtual resources.
In Proceedings of 19th International Conference on Systems Engineering,
ICSEng 2008, pages 368–374, 2008.
(doi:10.1109/ICSEng.2008.63)
- [232]
- M. Yoshida and K. Sakamoto.
Performance comparison of load balancing algorithms through code migration in
distributed desktop computing grids.
In Proceedings of the 3rd IEEE Asia-Pacific Services Computing
Conference, APSCC 2008, pages 781–788, 2008.
(doi:10.1109/APSCC.2008.60)
- [233]
- L. Youseff, M. Butrico, and
D. Da Silva.
Toward a unified ontology of cloud computing.
In Grid Computing Environments Workshop, GCE 2008, 2008.
(doi:10.1109/GCE.2008.4738443)
- [234]
- L. Yuhua,
Y. Chun, X. Kaihua, and
C. Hongcai.
Rank-based incentive mechanism for peer-to-peer networks.
In 4th International Conference on Natural Computation, ICNC 2008,
volume 5, pages 252–256, 2008.
(doi:10.1109/ICNC.2008.641)
- [235]
- M. Yuzukirmizi and J. M.
Smith.
Optimal buffer allocation in finite closed networks with multiple servers.
Computers and Operations Research, 35(8):2579–2598, 2008.
(doi:10.1016/j.cor.2006.12.008)
- [236]
- V. Zadorozhny, L. Raschid,
and A. Gal.
Scalable catalog infrastructure for managing access costs and source selection
in wide area networks.
International Journal of Cooperative Information Systems,
17(1):77–109, March 2008.
(doi:10.1142/S0218843008001786)
- [237]
- A. Zaidman and S. Demeyer.
Automatic identification of key classes in a software system using webmining
techniques.
Journal of Software Maintenance and Evolution, 20(6):387–417,
2008.
(doi:10.1002/smr.370)
- [238]
- C.M. Zapata and J.D.
Velásquez.
Algunas pautas para la escritura de artıculos cientıficos.
Ingeniare, 16(2):128–137, 2008.
(Some hints for writing scientific papers.) In Spanish.
- [239]
- Z. Zeng and B. Veeravalli.
On the design of distributed object placement and load balancing strategies in
large-scale networked multimedia storage systems.
IEEE Transactions on Knowledge and Data Engineering,
20(3):369–382, 2008.
(doi:10.1109/TKDE.2007.190694)
- [240]
- H.L.
Zhang, C.H.C. Leung, and G.K. Raikundalia.
Topological analysis of AOCD-based agent networks and experimental results.
Journal of Computer and System Sciences, 74(2):255–278, 2008.
(doi:10.1016/j.jcss.2007.04.006)
- [241]
- S. Zhang,
Y. Wang, and J. Xiao.
Mining individual performance indicators in collaborative development using
software repositories.
In Proceedings — Asia-Pacific Software Engineering Conference,
APSEC, pages 247–254, 2008.
- [242]
- W. Zhangjin, H. Xingwen,
D. Ying, Z. Rui, and Z. Qingguo.
A CGI+AJAX+SVG based monitoring method for distributed and embedded
system.
In U-Media 2008: The 1st IEEE International Conference on Ubi-Media
Computing and Workshops, pages 144–148, 2008.
(doi:10.1109/UMEDIA.2008.4570880)
- [243]
- H. Zhou,
P. Luo, D. Wang, and Y. Dai.
Fast public key infrastructure authentication based on ca caching.
Qinghua Daxue Xuebao/Journal of Tsinghua University,
48(7):1160–1164, 2008.
- [244]
- J. Zhou,
L.N. Bhuyan, and A. Banerjee.
An effective pointer replication algorithm in P2P networks.
In IPDPS Miami 2008 - Proceedings of the 22nd IEEE International Parallel
and Distributed Processing Symposium, Program and CD-ROM, 2008.
(doi:10.1109/IPDPS.2008.4536227)