- [1]
- T. AbuHmed, N. Nyamaa, and
D. Nyang.
Software-based remote code attestation in wireless sensor network.
In GLOBECOM - IEEE Global Telecommunications Conference, 2009.
(doi:10.1109/GLOCOM.2009.5425280)
- [2]
- B. Adams,
W. De Meuter, H. Tromp, and A.E.
Hassan.
Can we refactor conditional compilation into aspects?
In Proceedings of the 8th ACM International Conference on Aspect-Oriented
Software Development, AOSD'09, pages 243–254, 2009.
(doi:10.1145/1509239.1509274)
- [3]
- J. Agron.
Domain-specific language for HW/SW co-design for FPGAs.
In IFIP TC 2 Working Conference Domain-Specific Languages, DSL
2009, pages 262–284, jul 2009.
Lecture Notes in Computer Science 5658.
(doi:10.1007/978-3-642-03034-5_13)
- [4]
- H. Ahmadi,
A. Mehrbakhsh, and E. Asgarian.
Towards an efficient method for spreading information in social network.
In Proceedings — 2009 3rd Asia International Conference on Modelling
and Simulation, AMS 2009, pages 152–157, 2009.
(doi:10.1109/AMS.2009.107)
- [5]
- R. Ahmed and R. Boutaba.
Plexus: A scalable peer-to-peer protocol enabling efficient subset search.
IEEE/ACM Transactions on Networking, 17(1):130–143, 2009.
(doi:10.1109/TNET.2008.2001466)
- [6]
- P. Ai and
Y. Chen.
Extracting software component from hydrological information service system.
In IAHS-AISH Publication, volume 331, pages 333–341, 2009.
- [7]
- Z. Aixin,
T. Junhua, and W. Peng.
Authentication tests based on test type matrix.
In IEEE International Conference on Communications, 2009.
(doi:10.1109/ICC.2009.5198770)
- [8]
- D. Akoumianakis.
Managing universal accessibility requirements in software-intensive projects.
Software Process Improvement and Practice, 14(1):3–29, 2009.
(doi:10.1002/spip.383)
- [9]
- A. Al-Tameem, M. Zairi, and
M. Kamala.
Critical factors of information security implementation.
In 2009 1st International Conference on Networked Digital Technologies,
NDT 2009, pages 379–385, 2009.
(doi:10.1109/NDT.2009.5272217)
- [10]
- M. Alshayeb.
Empirical investigation of refactoring effect on software quality.
Information and Software Technology, 51(9):1319–1326, 2009.
(doi:10.1016/j.infsof.2009.04.002)
- [11]
- M. Amoretti.
The peer-to-peer paradigm applied to hydrogen energy distribution.
In IEEE EUROCON 2009, EUROCON 2009, pages 494–500, 2009.
(doi:10.1109/EURCON.2009.5167678)
- [12]
- R. Anane,
S. Marrocco, and B. Bordbar.
Trusted P2P group interaction.
In Proceedings of the 2009 2nd International Conference on Computer
Science and Its Applications, CSA 2009, 2009.
(doi:10.1109/CSA.2009.5404307)
- [13]
- R. Ando.
Automated log analysis of infected windows os using mechanized reasoning.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5864
LNCS(PART 2):540–547, 2009.
(doi:10.1007/978-3-642-10684-2_60)
- [14]
- O. Arafat and D. Riehle.
The comment density of open source software code.
In 2009 31st International Conference on Software Engineering —
Companion Volume, ICSE 2009, pages 195–198, 2009.
(doi:10.1109/ICSE-COMPANION.2009.5070980)
- [15]
- O. Arafat and D. Riehle.
The commenting practice of open source.
In Proceedings of the Conference on Object-Oriented Programming Systems,
Languages, and Applications, OOPSLA, pages 857–863, 2009.
(doi:10.1145/1639950.1640047)
- [16]
- M. Avvenuti, C. Bernardeschi,
N. De Francesco, and P. Masci.
A tool for checking secure interaction in java cards.
In EWDC 2009: 12th European Workshop on Dependable Computing,
2009.
- [17]
- A. Azab
and H. Meling.
Decentralized service allocation in a broker overlay based grid.
Lecture Notes in Computer Science, 5931 LNCS:200–211, 2009.
(doi:10.1007/978-3-642-10665-1_18)
- [18]
- M.A.
Babar, T. Dingsøyr, P. Lago, and
H. Van Vliet.
Software architecture knowledge management: Theory and practice.
Springer Berlin Heidelberg, 2009.
(doi:10.1007/978-3-642-02374-3)
- [19]
- J. Bar-Ilan and B.C. Peritz.
The lifespan of "informetrics" on the web: An eight year study (1998-2006).
Scientometrics, 79(1):7–25, 2009.
(doi:10.1007/s11192-009-0401-7)
- [20]
- S. Bashar
and Z. Ding.
Optimum routing protection against cumulative eavesdropping in multihop
wireless networks.
In Proceedings - IEEE Military Communications Conference MILCOM,
2009.
(doi:10.1109/MILCOM.2009.5379981)
- [21]
- D. Battini, A. Persona, and
A. Regattieri.
Buffer size design linked to reliability performance: A simulative study.
Computers and Industrial Engineering, 56(4):1633–1641, 2009.
(doi:10.1016/j.cie.2008.10.020)
- [22]
- Douglas D. Beattie, Neal Lewis
Creighton, Jr., Christopher T. M. Bailey,
David L. Remy, and Hani Hamandi.
Methods
and systems for automated authentication, processing and issuance of digital
certificates.
United States Patent 7,562,212, July 2009.
Assignee: GeoTrust, Inc. (Needham, MA).
- [23]
- A. Bergel, S. Denier,
S. Ducasse, J. Laval,
F. Bellingard, P. Vaillergues,
F. Balmas, and K. Mordal-Manet.
Squale — software quality enhancement.
In Proceedings of the European Conference on Software Maintenance and
Reengineering, CSMR, pages 285–288, 2009.
(doi:10.1109/CSMR.2009.13)
- [24]
- A.M.
Bernardos, P. Tarrıo, J. Iglesias, and
J.R. Casar.
Deploying context-aware services: A case study of rapid prototyping.
In 2009 6th IEEE Consumer Communications and Networking Conference, CCNC
2009, 2009.
(doi:10.1109/CCNC.2009.4784991)
- [25]
- R. Bernhaupt, D. Wilfinger,
and T. Mirlacher.
Personalizing the TV experience: Vocomedia — A case study from
interactive TV.
IGI Global, 2009.
(doi:10.4018/978-1-60566-260-2.ch009)
- [26]
- M.H. Bhat.
Missing web references - a case study of five scholarly journals.
LIBER Quarterly, 19(2):131–139, 2009.
- [27]
- N. Bicocchi, M. Mamei, and
F. Zambonelli.
An evaporative approach to handle dynamics in diffusive aggregation schemes.
In Proceedings of the 2009 Workshop on Bio-inspired Algorithms for
Distributed Systems, BADS '09, pages 53–60, 2009.
- [28]
- C. Bird,
N. Nagappan, P. Devanbu,
H. Gall, and B. Murphy.
Does distributed development affect software quality?: An empirical case study
of Windows Vista.
Communications of the ACM, 52(8):85–93, 2009.
(doi:10.1145/1536616.1536639)
- [29]
- C. Bird,
N. Nagappan, P. Devanbu,
H. Gall, and B. Murphy.
Does distributed development affect software quality? an empirical case study
of windows vista.
In Proceedings - International Conference on Software Engineering,
pages 518–528, 2009.
(doi:10.1109/ICSE.2009.5070550)
- [30]
- A.F.
Blackwell, J.A. Rode, and E.F. Toye.
How do we program the home? gender, attention investment, and the psychology of
programming at home.
International Journal of Human Computer Studies, 67(4):324–341,
2009.
(doi:10.1016/j.ijhcs.2008.09.011)
- [31]
- C. Boldyreff, A. Capiluppi,
T. Knowles, and J. Munro.
Undergraduate research opportunities in OSS.
5th IFIP WG 2.13 International Conference on Open Source Systems, OSS
2009, 299:340–350, 2009.
- [32]
- M. Bortenschlager,
G. Castelli, A. Rosi, and
F. Zambonelli.
A context-sensitive infrastructure for coordinating agents in ubiquitous
environments.
Multiagent and Grid Systems, 5(1):1–18, 2009.
(doi:10.3233/MGS-2009-0116)
- [33]
- P. Bosch,
A. Brusilovsky, R. McLellan,
S. Mullender, and P. Polakos.
Secure base stations.
Bell Labs Technical Journal, 13(4):227–244, 2009.
(doi:10.1002/bltj.20346)
- [34]
- E.H.T.B. Brands and
G. Karagiannis.
Taxonomy of P2P applications.
In 2009 IEEE Globecom Workshops, Gc Workshops 2009, 2009.
(doi:10.1109/GLOCOMW.2009.5360707)
- [35]
- N.L.
Brisola, A.O. Santin, L.C. Lung,
H.B. Ribeiro, and M.H. Vithoft.
A public keys based architecture for P2P identification, content authenticity
and reputation.
In Proceedings — International Conference on Advanced Information
Networking and Applications, AINA, pages 159–164, 2009.
(doi:10.1109/WAINA.2009.139)
- [36]
- S. Bryton and F.B. Abreu.
Strengthening refactoring: towards software evolution with quantitative and
experimental grounds.
In 4th International Conference on Software Engineering Advances, ICSEA
2009, Includes SEDES 2009: Simposio para Estudantes de Doutoramento em
Engenharia de Software, pages 570–575, 2009.
(doi:10.1109/ICSEA.2009.90)
- [37]
- R. Bye,
S.A. Camtepe, and S. Albayrak.
Design and modeling of collaboration architecture for security.
In 2009 International Symposium on Collaborative Technologies and
Systems, CTS 2009, pages 330–341, 2009.
(doi:10.1109/CTS.2009.5067498)
- [38]
- V. Carchiolo, A. Lima, and
G. Mangioni.
Resource advertising in prosa p2p network.
In IPDPS 2009 — Proceedings of the 2009 IEEE International Parallel and
Distributed Processing Symposium, 2009.
(doi:10.1109/IPDPS.2009.5160950)
- [39]
- Y. Chai,
Z. Du, and Y. Chen.
A stepwise optimization algorithm of clustered streaming media servers.
Journal of Systems and Software, 82(8):1344–1361, 2009.
(doi:10.1016/j.jss.2009.03.002)
- [40]
- D.L. Chan,
R.W.P. Luk, H.V. Leong, and
E.K.S. Ho.
Discovering user interface requirements of search results for mobile clients by
contextual inquiry.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5618
LNCS(PART 2):365–374, 2009.
(doi:10.1007/978-3-642-02559-4_40)
- [41]
- H. Chehade, F. Yalaoui,
L. Amodeo, and P. De Guglielmo.
Multi-objective optimization problem for the dimensioning of buffers.
Journal of Decision Systems, 18(2):257–287, 2009.
(doi:10.3166/jds.18.257-287)
- [42]
- B. Chelf
and C. Ebert.
Ensuring the integrity of embedded software with static code analysis.
IEEE Software, 26(3):96–99, 2009.
(doi:10.1109/MS.2009.65)
- [43]
- S.-S.
Chen, G. Yang, K. Wang, and
Y.-C. Zhang.
A redemption-based trust model for ad hoc networks.
Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing
University of Posts and Telecommunications (Natural Science),
29(4):20–25, 2009.
- [44]
- X. Chen,
J. Zhang, W. Xu, and X. Luo.
Deploying resource space model on a structured P2P network.
In SKG 2009 - 5th International Conference on Semantics, Knowledge, and
Grid, pages 72–77, 2009.
(doi:10.1109/SKG.2009.76)
- [45]
- Z. Chen,
J. Liu, D. Li, H. Liu, and
A. Vasilakos.
Sobie: A novel super-node P2P overlay based on information exchange.
Journal of Computers, 4(9):853–861, 2009.
- [46]
- M.T.
Cheung and Z. Liao.
Investing in real-world equity markets with an AHP-based decision framework.
Journal of Decision Systems, 18(2):149–163, 2009.
(doi:10.3166/jds.18.149-163)
- [47]
- S.-F.
Chiang, K. Chiang, R.-J. Yu, and
S.-D. Wang.
Scalable index and data management for unstructured peer-to-peer networks.
In The Handbook of Research on Scalable Computing Technologies,
volume 1, pages 123–139. IGI Global, 2009.
(doi:10.4018/978-1-60566-661-7.ch006)
- [48]
- D. Chopra, H. Schulzrinne,
E. Marocco, and E. Ivov.
Peer-to-peer overlays for real-time communication: Security issues and
solutions.
IEEE Communications Surveys and Tutorials, 11(1):4–12, 2009.
(doi:10.1109/SURV.2009.090102)
- [49]
- A. Cicchetti, D. Di Ruscio,
P. Pelliccione, A. Pierantonio, and
S. Zacchiroli.
Towards a model driven approach to upgrade complex software systems.
In ENASE 2009 — 4th International Conference on Evaluation of Novel
Approaches to Software Engineering, Proceedings, pages 121–133,
2009.
- [50]
- D.-L. Cui,
G.-Q. Feng, C.-E. Wang, and
K. Yang.
Research of business component based integration in complex product design
environment.
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems,
CIMS, 15(2):250–257, 2009.
- [51]
- G.L.
Curry and R.M. Feldman.
Manufacturing systems modeling and analysis.
Springer Berlin Heidelberg, 2009.
(doi:10.1007/978-3-540-88763-8)
- [52]
- D.N.
da Hora, D.F. Macedo, L.B. Oliveira,
I.G. Siqueira, A.A.F. Loureiro,
J.M. Nogueira, and G. Pujolle.
Enhancing peer-to-peer content discovery techniques over mobile ad hoc
networks.
Computer Communications, 32(13-14):1445–1459, 2009.
(doi:10.1016/j.comcom.2009.04.005)
- [53]
- V. D'Andrea, S. De Paoli, and
M. Teli.
The construction of peers and artifacts: The organizing role of ``programming
guidelines''?
In Proceedings of the 42nd Annual Hawaii International Conference on
System Sciences, HICSS, 2009.
(doi:10.1109/HICSS.2009.422)
- [54]
- V.P. De Almeida Neris and
M.C.C. Baranauskas.
Designing e-government systems for all-a case study in the Brazilian
scenario.
In IADIS International Conference WWW/Internet 2009, ICWI 2009,
volume 1, pages 60–67. IADIS, 2009.
- [55]
- J. De Boever.
Convergence of internet and TV: The commercial viability of P2P content
delivery.
Lecture Notes in Business Information Processing, 18:307–320,
2009.
(doi:10.1007/978-3-642-01344-7_23)
- [56]
- A. Dedeke.
Is Linux better than Windows software?
IEEE Software, 26(3):103–104, May/June 2009.
(doi:10.1109/MS.2009.72)
- [57]
- Ioannis
Deliyannis, Anastasios Antoniou, and Panos
Pandis.
Design and development of an experimental low-cost internet-based interactive
TV station.
In A. Poulymenakou, N. Pouloudi, and
K. Pramatari, editors, 4th Mediterranean Conference on
Information Systems, pages 523–528, September 2009.
- [58]
- Z. Demirezen, M. Mernik,
J. Gray, and B. Bryant.
Verification of DSMLs using graph transformation: A case study with alloy.
In ACM International Conference Proceeding Series, volume 413,
2009.
(doi:10.1145/1656485.1656488)
- [59]
- Mark
Doernhoefer.
Surfing the net for software engineering notes.
SIGSOFT Software Engineering Notes, 34(6):11–20, November 2009.
(doi:10.1145/1640162.1655275)
- [60]
- B. Dolan-Gavitt,
A. Srivastava, P. Traynor, and
J. Giffin.
Robust signatures for kernel data structures.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 566–577, 2009.
(doi:10.1145/1653662.1653730)
- [61]
- L. Dong
and Z. Yue-long.
Distributed relational data sharing based on P2P.
In Proceedings — 2009 International Conference on New Trends in
Information and Service Science, NISS 2009, pages 378–383, 2009.
(doi:10.1109/NISS.2009.144)
- [62]
- N.D.
Doulamis, P.N. Karamolegkos, A. Doulamis, and
I. Nikolakopoulos.
Exploiting semantic proximities for content search over p2p networks.
Computer Communications, 32(5):814–827, 2009.
(doi:10.1016/j.comcom.2008.12.005)
- [63]
- I. Dzitac and B.E.
B v arbat.
Artificial intelligence + distributed systems = agents.
International Journal of Computers, Communications and Control,
4(1):17–26, 2009.
- [64]
- E.J. Eckel.
The emerging engineering scholar: A citation analysis of theses and
dissertations at Western Michigan University.
Issues in Science and Technology Librarianship, 56, 2009.
- [65]
- K.O.
Elish and M. Alshayeb.
Investigating the effect of refactoring on software testing effort.
In Proceedings — Asia-Pacific Software Engineering Conference,
APSEC, pages 29–34, 2009.
(doi:10.1109/APSEC.2009.14)
- [66]
- C.-I. Fan,
D.J. Guan, C.-I. Wang, and D.-R.
Lin.
Cryptanalysis of Lee-Hwang-Yang blind signature scheme.
Computer Standards and Interfaces, 31(2):319–320, 2009.
(doi:10.1016/j.csi.2008.02.002)
- [67]
- A. Ferrara, S. Montanelli,
G. Varese, and S. Castano.
Ontology knowledge authoring by natural language empowerment.
In Proceedings — International Workshop on Database and Expert Systems
Applications, DEXA, pages 469–473, 2009.
(doi:10.1109/DEXA.2009.40)
- [68]
- J. Fjermestad and N.C.
Romano Jr.
Information privacy and security for e-CRM.
In Social Implications of Data Mining and Information Privacy:
Interdisciplinary Frameworks and Solutions, pages 48–70. IGI Global,
2009.
(doi:10.4018/978-1-60566-196-4.ch004)
- [69]
- A. Forestiero and
C. Mastroianni.
A swarm algorithm for a self-structured P2P information system.
IEEE Transactions on Evolutionary Computation, 13(4):681–694,
2009.
(doi:10.1109/TEVC.2008.2011478)
- [70]
- A. Forestiero,
C. Mastroianni, and M. Meo.
Self-chord: A bio-inspired algorithm for structured P2P systems.
In 2009 9th IEEE/ACM International Symposium on Cluster Computing and the
Grid, CCGRID 2009, pages 44–51, 2009.
(doi:10.1109/CCGRID.2009.39)
- [71]
- A. Forte,
V. Larco, and A. Bruckman.
Decentralization in Wikipedia governance.
Journal of Management Information Systems, 26(1):49–72, 2009.
(doi:10.2753/MIS0742-1222260103)
- [72]
- R.E. Gallardo-Valencia and
S.E. Sim.
Internet-scale code search.
In Proceedings - International Conference on Software Engineering,
pages 49–52, 2009.
(doi:10.1109/SUITE.2009.5070022)
- [73]
- R. Gandhi
and S.-W. Lee.
Ontology guided risk analysis: From informal specifications to formal metrics.
Studies in Computational Intelligence, 251:227–249, 2009.
(doi:10.1007/978-3-642-04141-9_11)
- [74]
- K. Gary,
H. Koehnemann, J. Blakley,
C. Goar, H. Mann, and A. Kagan.
A case study: Open source community and the commercial enterprise.
In ITNG 2009 - 6th International Conference on Information Technology:
New Generations, pages 940–945, 2009.
(doi:10.1109/ITNG.2009.313)
- [75]
- R. Gelbard.
Decision rule for investment in reusable code.
IGI Global, 2009.
(doi:10.4018/978-1-59904-630-3.Ch012)
- [76]
- P. Giotis and G. Lekakos.
Effectiveness of interactive advertising presentation models.
In EuroITV'09 - 7th European Conference on European Interactive
Television Conference, pages 157–160, 2009.
(doi:10.1145/1542084.1542115)
- [77]
- M. Golfarelli.
Open source BI platforms: A functional and architectural comparison.
In Torben Bach Pedersen, Mukesh K. Mohania, and
A Min Tjoa, editors, Data Warehousing and Knowledge
Discovery: 11th International Conference, DaWaK 2009, pages 287–297,
August 2009.
(doi:10.1007/978-3-642-03730-6_23)
- [78]
- C.E.
Gómez, M. Del Pilar Villamil, H.E. Castro,
and L. D'Orazio.
DHTCache: A distributed service to improve the selection of cache
configurations within a highly-distributed context.
Lecture Notes in Computer Science, 5697 LNCS:48–59, 2009.
(doi:10.1007/978-3-642-03715-3_5)
- [79]
- T.R. Gopalakrishnan Nair,
R. Selvarani, and M. Ramachandran.
Comprehensive software industry analysis model (CSIAM).
In Handbook of Research on Software Engineering and Productivity
Technologies: Implications of Globalization, pages 128–138. IGI
Global, 2009.
(doi:10.4018/978-1-60566-731-7.ch010)
- [80]
- S. Greiner.
Run-time manipulation of programs in a statically-typed language.
Informatica (Ljubljana), 33(3):397–398, 2009.
- [81]
- Y.-G. Guéhéneuc, J.-Y.
Guyomarc'h, and H. Sahraoui.
Improving design-pattern identification: A new approach and an exploratory
study.
Software Quality Journal, 18(1):145–174, 2009.
(doi:10.1007/s11219-009-9082-y)
- [82]
- S.T.
Halkidis, A. Chatzigeorgiou, and
G. Stephanides.
Moving from requirements to design confronting security issues: A case study.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5871
LNCS(PART 2):798–814, 2009.
(doi:10.1007/978-3-642-05151-7_4)
- [83]
- R. Halonen, H. Haapala,
T. Acton, K. Conboy, and
W. Golden.
Information systems — unavoidable nuisances in combining local
administratives?
In 22nd Bled eConference - eEnablement: Facilitating an Open, Effective
and Representative eSociety, pages 532–545. Bled eCommerce
Conference, 2009.
- [84]
- M. Hamed Firooz,
A. Nasiri Avanaki, M. Reza Pakravan, and
K. Ronasi.
A fast and reliable multi-sender algorithm for peer-to-peer networks.
Journal of Network and Computer Applications, 32(3):733–740,
2009.
(doi:10.1016/j.jnca.2008.06.004)
- [85]
- M. Hammad
and J. Cook.
Lightweight monitoring of sensor software.
In Proceedings of the ACM Symposium on Applied Computing, pages
2180–2185, 2009.
(doi:10.1145/1529282.1529763)
- [86]
- K. Han,
Q. Guo, and J. Luo.
Optimal peer selection, task assignment and rate allocation for P2P
downloading.
In Proceedings of the 1st International Workshop on Education Technology
and Computer Science, ETCS 2009, pages 1088–1090, 2009.
(doi:10.1109/ETCS.2009.248)
- [87]
- T. Hata,
M. Takemoto, T. Kambayashi,
K. Uchiyama, and M. Teramoto.
A network architecture to easily control devices.
In Proceedings — 2009 9th Annual International Symposium on
Applications and the Internet, SAINT 2009, pages 189–192, 2009.
(doi:10.1109/SAINT.2009.39)
- [88]
- Z. He and
Y. Ma.
Research and analysis of the optimization of the unstructured P2P overlay
networks.
In Proceedings — 5th International Conference on Wireless
Communications, Networking and Mobile Computing, WiCOM 2009, 2009.
(doi:10.1109/WICOM.2009.5301864)
- [89]
- M.V.J.
Heikkinen, A. Kivi, and H. Verkasalo.
Measuring mobile peer-to-peer usage: Case Finland 2007.
Lecture Notes in Computer Science, 5448:165–174, 2009.
(doi:10.1007/978-3-642-00975-4_17)
- [90]
- F. Hermans, M. Pinzger, and
A. Van Deursen.
Domain-specific languages in practice: A user study on the success factors.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5795
LNCS:423–437, 2009.
(doi:10.1007/978-3-642-04425-0_33)
- [91]
- C.-P. Hong,
E.-H. Lee, and S.-D. Kim.
An efficient scheme to construct virtual community for multimedia content
sharing based on profile in a ubiquitous computing environment.
In NCM 2009 — 5th International Joint Conference on INC, IMS, and
IDC, pages 1271–1276, 2009.
(doi:10.1109/NCM.2009.86)
- [92]
- C.-P.
Hong, E.-H. Lee, C.C. Weems, and
S.-D. Kim.
A profile-based multimedia sharing scheme with virtual community, based on
personal space in a ubiquitous computing environment.
IEEE Transactions on Multimedia, 11(7):1353–1361, 2009.
(doi:10.1109/TMM.2009.2030616)
- [93]
- C.-L. Hu and
T.-H. Kuo.
Hierarchical peer-to-peer overlay with cluster-reputation-based adaptation.
In IEEE Pacific RIM Conference on Communications, Computers, and Signal
Processing — Proceedings, pages 691–696, 2009.
(doi:10.1109/PACRIM.2009.5291286)
- [94]
- K.R. Islam
and C. Snow.
A cost-effective distributed architecture to enable distance education over
emerging wireless technologies.
In SIGITE'09 — Proceedings of the 2009 ACM Special Interest Group for
Information Technology Education, pages 182–186, 2009.
(doi:10.1145/1631728.1631777)
- [95]
- G. Jacob,
E. Filiol, and H. Debar.
Functional polymorphic engines: Formalisation, implementation and use cases.
Journal in Computer Virology, 5(3):247–261, 2009.
(doi:10.1007/s11416-008-0095-z)
- [96]
- H. Jiang,
J. Li, and Z.-C. Li.
Hybrid content distribution network and its performance modeling.
Jisuanji Xuebao/Chinese Journal of Computers, 32(3):473–482,
2009.
(doi:10.3724/SP.J.1016.2009.00473)
- [97]
- L. Jin,
W. Qinmin, Z. Daoli, and
H. Yihong.
Multi-stage dynamic coordination model for large-scale crowd's activities based
on multi-agent.
In 2009 WRI World Congress on Computer Science and Information
Engineering, CSIE 2009, volume 1, pages 487–491, 2009.
(doi:10.1109/CSIE.2009.67)
- [98]
- S. Josse.
White-box attack context cryptovirology.
Journal in Computer Virology, 5(4):321–334, 2009.
(doi:10.1007/s11416-008-0097-x)
- [99]
- G. Kakaletris, D. Varoutas,
D. Katsianis, and T. Sphicopoulos.
Design and implementation approaches for location-based, tourism-related
services.
IGI Global, 2009.
(doi:10.4018/978-1-59140-995-3.ch048)
- [100]
- P. Kamthan.
Embracing the social web for managing patterns.
In Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business,
and Social Applications, volume 1, pages 733–747. IGI Global, 2009.
(doi:10.4018/978-1-60566-384-5.ch042)
- [101]
- I. Kantzavelou and
S. Katsikas.
Playing games with internal attackers repeatedly.
In 2009 16th International Conference on Systems, Signals and Image
Processing, IWSSIP 2009, 2009.
(doi:10.1109/IWSSIP.2009.5367708)
- [102]
- P. Karamolegkos and
N. Doulamis.
Multimedia file exchange and P2P social networking: Efficient allocation of
users into communities of interest.
In 2009 International Conference on Ultra Modern Telecommunications and
Workshops, 2009.
(doi:10.1109/ICUMT.2009.5345647)
- [103]
- S. Karpischek,
F. Michahelles, F. Resatsch, and
E. Fleisch.
Mobile sales assistant: An NFC-based product information system for
retailers.
In Proceedings — 2009 1st International Workshop on Near Field
Communication, NFC 2009, pages 20–23, 2009.
(doi:10.1109/NFC.2009.18)
- [104]
- D.R.
Karrels, G.L. Peterson, and B.E. Mullins.
Structured P2P technologies for distributed command and control.
Peer-to-Peer Networking and Applications, 2(4):311–333, 2009.
(doi:10.1007/s12083-009-0033-y)
- [105]
- A. Karygiannis and
E. Antonakakis.
Security and privacy issues in agent-based location-aware mobile commerce.
Lecture Notes in Computer Science, 4324 LNAI:308–329, 2009.
(doi:10.1007/978-3-642-04879-1_21)
- [106]
- S. Kelly and R. Pohjonen.
Worst practices for domain-specific modeling.
IEEE Software, 26(4):22–29, 2009.
(doi:10.1109/MS.2009.109)
- [107]
- H. Ketmaneechairat,
P. Oothongsap, and A. Mingkhwan.
Smart buffer management for different start video broadcasting.
In ACM International Conference Proceeding Series, volume 403,
pages 615–619, 2009.
(doi:10.1145/1655925.1656036)
- [108]
- S.U. Khan,
A.A. Maciejewski, and H.J. Siegel.
Robust CDN replica placement techniques.
In IPDPS 2009 — Proceedings of the 2009 IEEE International Parallel and
Distributed Processing Symposium, 2009.
(doi:10.1109/IPDPS.2009.5160908)
- [109]
- F. Khomh,
Y.-G. Guéhéneuc, and G. Antoniol.
Playing roles in design patterns: An empirical descriptive and analytic study.
In IEEE International Conference on Software Maintenance, ICSM,
pages 83–92, 2009.
(doi:10.1109/ICSM.2009.5306327)
- [110]
- E. Kocagüneli, A. Tosun,
A. Bener, B. Turhan, and
B. Ça v glayan.
Prest: An intelligent software metrics extraction, analysis and defect
prediction tool.
In Proceedings of the 21st International Conference on Software
Engineering and Knowledge Engineering, SEKE 2009, pages 637–642,
2009.
- [111]
- J. Kokemüller and
A. Weisbecker.
Aster data management: Products and research.
In Proceedings of the 2009 International Conference on Information
Quality, ICIQ 2009, 2009.
- [112]
- S. Kondakci.
A concise cost analysis of Internet malware.
Computers and Security, 28(7):648–659, 2009.
(doi:10.1016/j.cose.2009.03.007)
- [113]
- K. Kotapati, P. Liu, and
T.F. La Porta.
Evaluating MAPSec by marking attack graphs.
Wireless Networks, 15(8):1042–1058, 2009.
(doi:10.1007/s11276-008-0101-x)
- [114]
- E. Kühn and
V. Sesum-Cavic.
A space-based generic pattern for self-initiative load balancing agents.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5881
LNAI:17–32, 2009.
(doi:10.1007/978-3-642-10203-5_3)
- [115]
- H. Kwon,
Y.-H. Moon, J. Nah, and D. Seo.
Protecting IPTV service network against malicious rendezvous point.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5932
LNCS:1–9, 2009.
(doi:10.1007/978-3-642-10838-9_1)
- [116]
- Y.-X. Lai and
Z.-H. Liu.
Unknown malicious identification.
Lecture Notes in Electrical Engineering, 39 LNEE:301–312, 2009.
(doi:10.1007/978-90-481-2311-7_26)
- [117]
- K.-C. Lai,
C.-C. Wu, and S.-J. Lin.
Exploring job migration technique for P2P grid systems.
International Journal of Grid and High Performance Computing,
1(4):16–25, 2009.
(doi:10.4018/jghpc.2009070802)
- [118]
- S.I. Lee,
H. Park, and M. Van Der Schaar.
Foresighted joint resource reciprocation and scheduling strategies for
real-time video streaming over peer-to-peer networks.
In 2009 17th International Packet Video Workshop, PV 2009, 2009.
(doi:10.1109/PACKET.2009.5152153)
- [119]
- H. Lee.
Agent based video contents identification and data mining using watermark
based filtering.
Springer US, 2009.
(doi:10.1007/978-1-4419-0522-2_22)
- [120]
- T. Levendovszky, L. Lengyel,
and T. Mészáros.
Supporting domain-specific model patterns with metamodeling.
Software and Systems Modeling, 8(4):501–520, 2009.
(doi:10.1007/s10270-009-0118-3)
- [121]
- W. Li and
D. Hoang.
A new security scheme for e-health system.
In 2009 International Symposium on Collaborative Technologies and
Systems, CTS 2009, pages 361–366, 2009.
(doi:10.1109/CTS.2009.5067502)
- [122]
- J. Li,
Q. Wu, and D. Zhu.
Route guidance mechanism with centralized information control in large-scale
crowd's activities.
In IJCAI International Joint Conference on Artificial
Intelligence, pages 7–11, 2009.
(doi:10.1109/JCAI.2009.41)
- [123]
- T. Li,
H. Ji, J. Mei, Y. Li, and
C. Hu.
Topology mismatch avoidable cross-layer protocol for P2P file discovery in
MANETs.
In IEEE Wireless Communications and Networking Conference, WCNC,
2009.
(doi:10.1109/WCNC.2009.4917995)
- [124]
- C.-C.
Liang, C.-H. Wang, H. Luh, and
P.-Y. Hsu.
Disaster avoidance mechanism for content-delivering service.
Computers and Operations Research, 36(1):27–39, January 2009.
(doi:10.1016/j.cor.2007.09.001)
- [125]
- Z. Liang,
W. Sun, V.N. Venkatakrishnan, and
R. Sekar.
Alcatraz: An isolated environment for experimenting with untrusted software.
ACM Transactions on Information and System Security, 12(3), 2009.
(doi:10.1145/1455526.1455527)
- [126]
- C.-S. Lin
and Y.-C. Cheng.
A barter-based incentive mechanism for peer-to-peer media streaming.
In Digest of Technical Papers — IEEE International Conference on
Consumer Electronics, pages 871–875, 2009.
(doi:10.1109/ISCE.2009.5157001)
- [127]
- X. Lin.
Cat: Building couples to early detect node compromise attack in wireless sensor
networks.
In GLOBECOM - IEEE Global Telecommunications Conference, 2009.
(doi:10.1109/GLOCOM.2009.5425922)
- [128]
- P. Liu,
T.F. LaPorta, and K. Kotapati.
Cellular network security.
In Computer and Information Security Handbook, pages 183–203.
Elsevier Inc., 2009.
(doi:10.1016/B978-0-12-374354-1.00012-1)
- [129]
- Y. Liu,
K. Xu, C. Yang, and N. Xiong.
Model of controlling the hubs in P2P networks.
Journal of Networks, 4(4):236–243, 2009.
- [130]
- Y. Liu,
X. Zhang, and H. Sun.
The P2P wireless network applied in real-time vehicle navigation.
In 3rd International Conference on Multimedia and Ubiquitous Engineering,
MUE 2009, pages 439–444, 2009.
(doi:10.1109/MUE.2009.78)
- [131]
- M. Locci,
G. Concas, and I. Turnu.
Computing the fractal dimension of software networks.
In Proceedings of the 9th WSEAS International Conference on Applied
Computer Science, ACS '09, pages 146–151, 2009.
- [132]
- X. Lou and
K. Hwang.
Collusive piracy prevention in P2P content delivery networks.
IEEE Transactions on Computers, 58(7):970–983, 2009.
(doi:10.1109/TC.2009.26)
- [133]
- X. Lou,
K. Hwang, and Y. Hu.
Accountable file indexing against DDoS attacks in peer-to-peer networks.
In GLOBECOM - IEEE Global Telecommunications Conference, 2009.
(doi:10.1109/GLOCOM.2009.5425979)
- [134]
- F. Loukos and H. Karatza.
Enabling cooperation in MANET-based peer-to-peer systems.
IGI Global, 2009.
(doi:10.4018/978-1-60566-715-7.ch006)
- [135]
- S.G. Lynn,
D.R. Olsen Jr., and B.G. Partridge.
Time warp football.
In EuroITV'09 — Proceedings of the 7th European Conference on European
Interactive Television Conference, pages 77–86, 2009.
(doi:10.1145/1542084.1542098)
- [136]
- M. Madruga, S. Loest, and
C. Maziero.
Using transparent files in a fault tolerant distributed file system.
In Proceedings — 2009 International Symposium on Autonomous
Decentralized Systems, ISADS 2009, pages 109–114, 2009.
(doi:10.1109/ISADS.2009.5207347)
- [137]
- T.K.
Madsen, Q. Zhang, F. Fitzek, and
M. Katz.
Exploiting cooperation for performance enhancement and high data rates.
Journal of Communications, 4(3):193–202, 2009.
- [138]
- E. Magnusson, T. Ekman, and
G. Hedin.
Demand-driven evaluation of collection attributes.
Automated Software Engineering, 16(2):291–322, 2009.
(doi:10.1007/s10515-009-0046-z)
- [139]
- H. Maisonneuve and
C. Schnitter.
The future of electronic biomedical journals.
Presse Medicale, 38(10):1418–1424, 2009.
(doi:10.1016/j.lpm.2009.07.002)
- [140]
- D. Man,
Y. Ito, and K. Nakano.
An efficient parallel sorting compatible with the standard qsort.
In Parallel and Distributed Computing, Applications and Technologies,
PDCAT Proceedings, pages 512–517, 2009.
(doi:10.1109/PDCAT.2009.55)
- [141]
- D. Matter,
A. Kuhn, and O. Nierstrasz.
Assigning bug reports using a vocabulary-based expertise model of developers.
In Proceedings of the 2009 6th IEEE International Working Conference on
Mining Software Repositories, MSR 2009, pages 131–140, 2009.
(doi:10.1109/MSR.2009.5069491)
- [142]
- P. McManus, C. Standing, and
R. Zanoli.
A preliminary laddering analysis on mobile services.
In 17th European Conference on Information Systems, ECIS 2009,
2009.
- [143]
- D.A.
McMeekin, B.R.V. Konsky, E. Chang, and
D.J.A. Cooper.
Evaluating software inspection cognition levels using Bloom's taxonomy.
In Proceedings — 22nd Conference on Software Engineering Education and
Training, CSEET 2009, pages 232–239, 2009.
(doi:10.1109/CSEET.2009.15)
- [144]
- G. Me,
D. Pirro, and R. Sarrecchia.
Strong authentication for financial services: PTDs as a compromise between
security and usability.
In Mobile and Ubiquitous Commerce: Advanced E-Business Methods,
pages 101–114. IGI Global, 2009.
(doi:10.4018/978-1-60566-366-1.ch007)
- [145]
- H. Mendes, L. Weigang,
A. Boukerche, and A.C.M.A. De Melo.
Bag-of-tasks self-scheduling over range-queriable search overlays.
In NPC 2009 — 6th International Conference on Network and Parallel
Computing, pages 109–116, 2009.
(doi:10.1109/NPC.2009.37)
- [146]
- W.-H. Min
and Y.-G. Cheong.
An interactive-content technique based approach to generating personalized
advertisement for privacy protection.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5618
LNCS(PART 2):185–191, 2009.
(doi:10.1007/978-3-642-02559-4_21)
- [147]
- B. Molina, S.F. Pileggi,
M. Esteve, and C.E. Palau.
A negotiation framework for content distribution in mobile transient networks.
Journal of Network and Computer Applications, 32(5):1000–1011,
2009.
(doi:10.1016/j.jnca.2009.03.007)
- [148]
- J.L.
Muñoz, O. Esparza, J. Forné, and
E. Pallares.
Design and implementation of a lightweight online certificate validation
service.
Telecommunication Systems, 41(3):229–241, 2009.
(doi:10.1007/s11235-009-9144-2)
- [149]
- J. Munro,
C. Boldyreff, and A. Capiluppi.
Architectural studies of games engines — the Quake series.
In 1st International IEEE Consumer Electronic Society's Games Innovation
Conference, ICE-GiC 09, pages 246–255, 2009.
(doi:10.1109/ICEGIC.2009.5293600)
- [150]
- E. Murphy-Hill, C. Parnin,
and A.P. Black.
How we refactor, and how we know it.
In Proceedings - International Conference on Software Engineering,
pages 287–297, 2009.
(doi:10.1109/ICSE.2009.5070529)
- [151]
- N. Nahas,
M. Nourelfath, and D. Ait-Kadi.
Selecting machines and buffers in unreliable series-parallel production lines.
International Journal of Production Research, 47(14):3741–3774,
2009.
(doi:10.1080/00207540701806883)
- [152]
- D. Nobayashi, Y. Nakamura,
T. Ikenaga, and Y. Hori.
Development of single sign-on system with hardware token and key management
server.
IEICE Transactions on Information and Systems, E92-D(5):826–835,
2009.
(doi:10.1587/transinf.E92.D.826)
- [153]
- J. O'Donoghue, J.B. McCarthy,
S. Huang, and F. Adam.
Evaluating the integration of leading edge pervasive technologies to improve
service-based performance.
In 3rd European Conference on Information Management and Evaluation,
2009, pages 363–370. Academic Conferences Limited, 2009.
- [154]
- M.J.
O'Grady, G.M.P. O'Hare, J. Chen, and
D. Phelan.
Distributed network intelligence: A prerequisite for adaptive and personalised
service delivery.
Information Systems Frontiers, 11(1):61–73, 2009.
(doi:10.1007/s10796-008-9140-1)
- [155]
- C. Okoli.
A brief review of studies of wikipedia in peer-reviewed journals.
In Proceedings of the 3rd International Conference on Digital Society,
ICDS 2009, pages 155–160, 2009.
(doi:10.1109/ICDS.2009.28)
- [156]
- F. Ortega and
D. Izquierdo-Cortazar.
Survival analysis in open development projects.
In Proceedings of the 2009 ICSE Workshop on Emerging Trends in
Free/Libre/Open Source Software Research and Development, FLOSS 2009,
pages 7–12, 2009.
(doi:10.1109/FLOSS.2009.5071353)
- [157]
- J.L.
Ortega, V. Cothey, and I.F. Aguillo.
How old is the web? characterizing the age and the currency of the european
scientific web.
Scientometrics, 81(1):295–309, 2009.
(doi:10.1007/s11192-008-2149-x)
- [158]
- Z. Ou,
E. Harjula, O. Kassinen, and
M. Ylianttila.
Feasibility evaluation of a communication-oriented P2P system in mobile
environments.
In Proceedings of the 6th International Conference on Mobile Technology,
Application and Systems, Mobility '09, 2009.
(doi:10.1145/1710035.1710078)
- [159]
- Z. Ou,
E. Harjula, and M. Ylianttila.
Effects of different churn models on the performance of structured peer-to-peer
networks.
In IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications, PIMRC, 2009.
(doi:10.1109/PIMRC.2009.5450134)
- [160]
- R. Owens
and W. Wang.
Building a dark piconet upon bluetooth interfaces of computers.
In Proceedings - IEEE Military Communications Conference MILCOM,
2009.
(doi:10.1109/MILCOM.2009.5379892)
- [161]
- W.A.
Owens, K.W. Dam, H.S. Lin, and
National Research Council.
Technology, policy, law, and ethics regarding U.S. acquisition and use of
cyberattack capabilities.
National Academy of Sciences, 2009.
(doi:10.17226/12651)
- [162]
- Y. Padioleau, L. Tan, and
Y. Zhou.
Listening to programmers - taxonomies and characteristics of comments in
operating system code.
In Proceedings - International Conference on Software Engineering,
pages 331–341, 2009.
(doi:10.1109/ICSE.2009.5070533)
- [163]
- Y. Padioleau.
Parsing C/C++ code without pre-processing.
Lecture Notes in Computer Science, 5501 LNCS:109–125, 2009.
(doi:10.1007/978-3-642-00722-4_9)
- [164]
- R.F.
Paige, D.S. Kolovos, L.M. Rose,
N. Drivalos, and F.A.C. Polack.
The design of a conceptual framework and technical infrastructure for model
management language engineering.
In Proceedings of the IEEE International Conference on Engineering of
Complex Computer Systems, ICECCS, pages 162–171, 2009.
(doi:10.1109/ICECCS.2009.14)
- [165]
- J.D. Palmer.
Ginger: Implementing a new Lisp family syntax.
In Proceedings of the 47th Annual Southeast Regional Conference, ACM-SE
47, 2009.
(doi:10.1145/1566445.1566481)
- [166]
- F.S. Park,
C. Gangakhedkar, and P. Traynor.
Leveraging cellular infrastructure to improve fraud prevention.
In Proceedings - Annual Computer Security Applications Conference,
ACSAC, pages 350–359, 2009.
(doi:10.1109/ACSAC.2009.40)
- [167]
- K. Pentikousis, C. Meirosu,
A. Miron, and M. Brunner.
Self-management for a network of information.
In Proceedings — 2009 IEEE International Conference on Communications
Workshops, ICC 2009, 2009.
(doi:10.1109/ICCW.2009.5207967)
- [168]
- K. Pentikousis.
Distributed information object resolution.
In Proceedings of the 8th International Conference on Networks, ICN
2009, pages 360–366, 2009.
(doi:10.1109/ICN.2009.31)
- [169]
- R. Peplow,
D.S. Dawoud, and J. Van Der Merwe.
Ensuring privacy in vehicular communication.
In Proceedings of the 2009 1st International Conference on Wireless
Communication, Vehicular Technology, Information Theory and Aerospace and
Electronic Systems Technology, Wireless VITAE 2009, pages 610–614,
2009.
(doi:10.1109/WIRELESSVITAE.2009.5172516)
- [170]
- D. Pierret and D. Poshyvanyk.
An empirical exploration of regularities in open-source software lexicons.
IEEE International Conference on Program Comprehension, pages
228–232, 2009.
(doi:10.1109/ICPC.2009.5090047)
- [171]
- W. Ping,
Q. Jing, and Q.Y. Hui.
A computation trust model with confidence in unstructured P2P systems.
In 2009 Joint Conferences on Pervasive Computing, JCPC 2009, pages
451–454, 2009.
(doi:10.1109/JCPC.2009.5420144)
- [172]
- R.I.
Podlovchenko, N.N. Kuzyurin, V.S. Shcherbina,
and V.A. Zakharov.
Using algebraic models of programs for detecting metamorphic malwares.
Fundamental and Applied Mathematics, 15(5):181–198, 2009.
- [173]
- S. Poslad.
Ubiquitous Computing: Smart Devices, Environments and
Interactions.
John Wiley and Sons, 2009.
(doi:10.1002/9780470779446)
- [174]
- K. Pousttchi, M. Schiessler,
and D.G. Wiedemann.
Proposing a comprehensive framework for analysis and engineering of mobile
payment business models.
Information Systems and e-Business Management, 7(3):363–393,
2009.
(doi:10.1007/s10257-008-0098-9)
- [175]
- N. Pratas, P.N. Anggraeni,
S.A. Wardana, N.R. Prasad,
A. Rodrigues, and R. Prasad.
Context-aware trust and privacy application for mobile identification system.
In IEEE Wireless Communications and Networking Conference, WCNC,
2009.
(doi:10.1109/WCNC.2009.4917639)
- [176]
- C.R. Prause.
Maintaining fine-grained code metadata regardless of moving, copying and
merging.
In 9th IEEE International Working Conference on Source Code Analysis and
Manipulation, SCAM 2009, pages 109–118, 2009.
(doi:10.1109/SCAM.2009.20)
- [177]
- H. Rao,
C. Yang, and S. Tao.
Controlling model for the hotspots in peer-to-peer networks.
In Proceedings of the 1st International Workshop on Education Technology
and Computer Science, ETCS 2009, pages 665–669, 2009.
(doi:10.1109/ETCS.2009.154)
- [178]
- J. Ravi,
Z. Yu, and W. Shi.
A survey on dynamic web content generation and delivery techniques.
Journal of Network and Computer Applications, 32(5):943–960,
2009.
(doi:10.1016/j.jnca.2009.03.005)
- [179]
- L. Rodero-Merino, A.F. Anta,
L. López, and V. Cholvi.
Self-managed topologies in p2p networks.
Computer Networks, 53(10):1722–1736, 2009.
(doi:10.1016/j.comnet.2008.09.006)
- [180]
- N.C. Romano Jr. and
J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
In Techniques and Applications for Advanced Information Privacy and
Security: Emerging Organizational, Ethical, and Human Issues, pages
189–210. IGI Global, 2009.
(doi:10.4018/978-1-60566-210-7.ch013)
- [181]
- C. Roncancio, M. Del
Pilar Villamil, C. Labbé, and
P. Serrano-Alvarado.
Data sharing in DHT based P2P systems.
Lecture Notes in Computer Science, 5740 LNCS:327–352, 2009.
(doi:10.1007/978-3-642-03722-1_13)
- [182]
- B. Rood
and M.J. Lewis.
Grid resource availability prediction-based scheduling and task replication.
Journal of Grid Computing, 7(4):479–500, 2009.
(doi:10.1007/s10723-009-9135-2)
- [183]
- Jonathan B. Rosenberg, John
Harrison, David L. Remy, and Neal L.
Creighton.
Web
site identity assurance.
United States Patent 7,552,466, June 2009.
Assignee: GeoTrust, Inc. (Mountain View, CA).
- [184]
- S. Roubtsov, A. Serebrenik,
and M.D. Van Brand.
Dn-based design quality comparison of industrial java applications.
In 2009 5th Central and Eastern European Software Engineering Conference
in Russia, CEE-SECR 2009, pages 95–101, 2009.
(doi:10.1109/CEE-SECR.2009.5501182)
- [185]
- S. Rui,
W. Ji, Z. Shengdong, S. Siqi,
and F. Pei.
A framework for constructing peer-to-peer overlay networks in Java.
In Proceedings of the 7th International Conference on Principles and
Practice of Programming in Java, PPPJ 2009, pages 40–48, 2009.
(doi:10.1145/1596655.1596662)
- [186]
- A. Sæbjørnsen,
L. Jiang, D. Quinlan, and Z. Su.
Static validation of c preprocessor macros.
In ASE2009 - 24th IEEE/ACM International Conference on Automated Software
Engineering, pages 149–160, 2009.
(doi:10.1109/ASE.2009.75)
- [187]
- J. Sanchez Cuadrado and J.G.
Molina.
A model-based approach to families of embedded domain-specific languages.
IEEE Transactions on Software Engineering, 35(6):825–840, 2009.
(doi:10.1109/TSE.2009.14)
- [188]
- C.G. Santillán,
L. Cruz-Reyes, E. Meza, T.T.
López, M.A. Aguirre Lam, and E. Schaeffer.
Improving distributed resource search through a statistical methodology of
topological feature selection.
Journal of Computers, 4(8):727–733, 2009.
- [189]
- D. Santos, A. Pereira, and
R. Gonçalves.
Architecture of an innovative system for the acquisition of products in
supermarkets — business model.
In 4a Conferencia Iberica de Sistemas e Tecnologias de Informacao, CISTI
2009 - 4th Iberian Conference on Information Systems and Technologies, CISTI
2009, pages 61–66. Associacao Iberica de Sistemas e Tecnologias de
Informacao, 2009.
- [190]
- D.S.S.
Santos, A.M.J. Pereira, and R.M.R.M.
Gonçalves.
Intelligent cart: Architecture of an innovative system for the acquisition of
products in grocery stores.
In 11th International Business Information Management Association
Conference, IBIMA 2009, volume 1-3, pages 350–357. International
Business Information Management Association, IBIMA, 2009.
- [191]
- K. Sarelo.
A SOA for ubiquitous communication management.
In iiWAS2009 - The 11th International Conference on Information
Integration and Web-based Applications and Services, pages 253–260,
2009.
(doi:10.1145/1806338.1806386)
- [192]
- M.I.
Sarwar, W. Tanveer, and I. Sarwar.
Performance of MI tools in perspective of open source software.
In 2009 2nd International Conference on Computer, Control and
Communication, IC4 2009, 2009.
(doi:10.1109/IC4.2009.4909213)
- [193]
- H. Schackmann and H. Lichter.
Evaluating process quality in GNOME based on change request data.
In Proceedings of the 2009 6th IEEE International Working Conference on
Mining Software Repositories, MSR 2009, pages 95–98, 2009.
(doi:10.1109/MSR.2009.5069485)
- [194]
- H. Schackmann, H. Schaefer,
and H. Lichter.
Evaluating process quality based on change request data - an empirical study of
the eclipse project.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5891
LNCS:227–241, 2009.
(doi:10.1007/978-3-642-05415-0_17)
- [195]
- J. Schänfer and
K. Malinka.
Security in peer-to-peer networks : Empiric model of file diffusion in
bittorrent.
In Proceedings — 2009 4th International Conference on Internet
Monitoring and Protection, ICIMP 2009, pages 39–44, 2009.
(doi:10.1109/ICIMP.2009.14)
- [196]
- D. Schlosser and
T. Hoßfeld.
Mastering selfishness and heterogeneity in mobile P2P content distribution
networks with multiple source download in cellular networks.
Peer-to-Peer Networking and Applications, 2(3):252–266, 2009.
(doi:10.1007/s12083-009-0034-x)
- [197]
- A.U. Schmidt.
On the superdistribution of digital goods.
Journal of Universal Computer Science, 15(2):401–425, 2009.
- [198]
- V. Sesum-Cavic and
E. Kühn.
Peer-to-peer overlay network based on swarm intelligence.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5881
LNAI:65–67, 2009.
(doi:10.1007/978-3-642-10203-5_6)
- [199]
- V.A.
Shekhovtsov, Y. Tomilko, and M.D. Godlevskiy.
Facilitating reuse of code checking rules in static code analysis.
Lecture Notes in Business Information Processing, 20:91–102,
2009.
(doi:10.1007/978-3-642-01112-2_10)
- [200]
- M. Sherr,
G. Shah, E. Cronin, S. Clark,
and M. Blaze.
Can they hear me now? a security analysis of law enforcement wiretaps.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 512–523, 2009.
(doi:10.1145/1653662.1653724)
- [201]
- S. Sioutas, E. Sakkopoulos,
Ch. Makris, B. Vassiliadis,
A. Tsakalidis, and P. Triantafillou.
Dynamic web service discovery architecture based on a novel peer based overlay
network.
Journal of Systems and Software, 82(5):809–824, 2009.
(doi:10.1016/j.jss.2008.11.845)
- [202]
- H. Söezer, M. Tekkalmaz,
and I. Korpeoglu.
A peer-to-peer file search and download protocol for wireless ad-hoc networks.
Computer Communications, 32(1):41–50, 2009.
(doi:10.1016/j.comcom.2008.09.004)
- [203]
- J. Sorribas, D. Afonso,
E. Arilla, O. Garcia,
A. Hernández, J. Olivé,
J.L. Ruiz, X. Romero,
A. Sandoval, J.A. Serrano,
E. Trullols, and J. Del Rıo.
Real-time fleet ship monitoring system using satellite broadband communications
and Google Earth.
In Proceedings — 2009 1st International Conference on Advances in
Satellite and Space Communications, SPACOMM 2009, pages 146–155,
2009.
(doi:10.1109/SPACOMM.2009.44)
- [204]
- José
Felipe Ortega Soto.
Wikipedia:
A Quantiative Analysis.
PhD thesis, Universidad Rey Juan Carlos, Madrid, 2009.
- [205]
- A.M.
Sourouni, S. Mouzakitis, G. Kourlimpinis,
D. Askounis, and G. Velegrakis.
E-business transactions modelling; an ontology-based repository.
In Proceedings — 2009 International Conference on Interoperability for
Enterprise Software and Applications, IESA 2009, pages 63–69, 2009.
(doi:10.1109/I-ESA.2009.49)
- [206]
- S.M. Srinivasan and A.H.
Azadmanesh.
Data aggregation in partially connected networks.
Computer Communications, 32(4):594–601, 2009.
(doi:10.1016/j.comcom.2008.11.021)
- [207]
- I. Stamelos.
Teaching software engineering with free/libre open source projects.
International Journal of Open Source Software and Processes,
1(1):72–90, 2009.
- [208]
- M. Strembeck and U. Zdun.
An approach for the systematic development of domain-specific languages.
Software — Practice and Experience, 39(15):1253–1292, 2009.
(doi:10.1002/spe.936)
- [209]
- B. Suh,
G. Convertino, E.H. Chi, and
P. Pirolli.
The singularity is not near: Slowing growth of Wikipedia.
In Proceedings of the 5th International Symposium on Wikis and Open
Collaboration, WiKiSym 2009, 2009.
(doi:10.1145/1641309.1641322)
- [210]
- C.X.H. Tang
and H.C.W. Lau.
Joint optimization for knowledge mining: Evaluating parameters of manufacturing
processes.
In Proceedings — 2009 International Conference on Information
Management and Engineering, ICIME 2009, pages 689–693, 2009.
(doi:10.1109/ICIME.2009.119)
- [211]
- S.M.
Tawfik and N.M. El-Mekky.
Unified framework of attributes in software quality models.
AEJ - Alexandria Engineering Journal, 48(6):679–692, 2009.
- [212]
- A. Telea
and L. Voinea.
Case study: Visual analytics in software product assessments.
In Proceedings of VISSOFT 2009 — 5th IEEE International Workshop on
Visualizing Software for Understanding and Analysis, pages 65–72,
2009.
(doi:10.1109/VISSOF.2009.5336417)
- [213]
- Y.M. Teo,
V. March, and M. Mihailescu.
Hierarchical structured peer-to-peer networks, volume 1.
IGI Global, 2009.
(doi:10.4018/978-1-60566-661-7.ch007)
- [214]
- R. Tonelli, G. Concas, and
M. Locci.
Efficient implementation of the yule-simon stochastic process for modeling
internet and software development activities.
In Proceedings of the 9th WSEAS International Conference on Applied
Computer Science, ACS '09, pages 180–186, 2009.
- [215]
- S.L.
Toral, M.R. Martınez-Torres, and F.J.
Barrero.
Virtual communities as a resource for the development of OSS projects: The
case of Linux ports to embedded processors.
Behaviour and Information Technology, 28(5):405–419, 2009.
(doi:10.1080/01449290903121394)
- [216]
- S.L.
Toral, R. Martınez Torres, and
F. Barrero.
Modelling mailing list behaviour in open source projects: The case of Arm
embedded Linux.
Journal of Universal Computer Science, 15(3):648–664, 2009.
- [217]
- D. Traskas and J. Padget.
Engineering agent organisations in a business environment.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5881
LNAI:49–64, 2009.
(doi:10.1007/978-3-642-10203-5_5)
- [218]
- L. Tratt.
Chapter 5 dynamically typed languages.
In Marvin V. Zelkowitz, editor, Advances in Computers 77:
Social Networking and the Web, chapter 5, pages 149–184. Academic
Press, 2009.
(doi:10.1016/S0065-2458(09)01205-4)
- [219]
- T. Tsiakis and P. Katsaros.
Hands on dependability economics.
In Proceedings — 2009 2nd International Conference on Dependability,
DEPEND 2009, pages 117–121, 2009.
(doi:10.1109/DEPEND.2009.24)
- [220]
- R. Usubamatov and M.Z.
Abdulmuin.
Optimization of structure of section-based automated lines.
Proceedings of World Academy of Science, Engineering and
Technology, 38:1231–1234, 2009.
- [221]
- J. Van Der Merwe, D.S.
Dawoud, and R. Peplow.
Vulnerability windows in vehicular communications.
In Proceedings of the 2009 1st International Conference on Wireless
Communication, Vehicular Technology, Information Theory and Aerospace and
Electronic Systems Technology, Wireless VITAE 2009, pages 615–618,
2009.
(doi:10.1109/WIRELESSVITAE.2009.5172517)
- [222]
- P. Van Mieghem and H. Wang.
The observable part of a network.
IEEE/ACM Transactions on Networking, 17(1):93–105, 2009.
(doi:10.1109/TNET.2008.925089)
- [223]
- R. Venkataramu and M. Stamp.
P2PTunes: A peer-to-peer digital rights management system.
In Handbook of Research on Secure Multimedia Distribution, pages
137–156. IGI Global, 2009.
(doi:10.4018/978-1-60566-262-6.ch008)
- [224]
- H.A.
Vergara and D.S. Kim.
A new method for the placement of buffers in serial production lines.
International Journal of Production Research, 47(16):4437–4456,
2009.
(doi:10.1080/00207540801939022)
- [225]
- I.V.
Vitanov, V.I. Vitanov, and D.K. Harrison.
Buffer capacity allocation using ant colony optimisation algorith.
In Proceedings - Winter Simulation Conference, pages 3158–3168,
2009.
(doi:10.1109/WSC.2009.5429277)
- [226]
- F. Von Reischach,
F. Michahelles, and A. Schmidt.
The design space of ubiquitous product recommendation systems.
In MUM 2009 — Proceedings of the 8th International Conference on Mobile
and Ubiquitous Multimedia, 2009.
(doi:10.1145/1658550.1658552)
- [227]
- M. Štava and
P. Tvrdık.
Security system for overlapping non dedicated clusters.
In Proceedings — 2009 IEEE International Symposium on Parallel and
Distributed Processing with Applications, ISPA 2009, pages 272–281,
2009.
(doi:10.1109/ISPA.2009.19)
- [228]
- C. Wagner, M.D. Gebremichael,
M.K. Taylor, and M.J. Soltys.
Disappearing act: Decay of uniform resource locators in health care management
journals.
Journal of the Medical Library Association, 97(2):122–130, 2009.
(doi:10.3163/1536-5050.97.2.009)
- [229]
- W. Wang and
Y. Chen.
ePAD: Enhancing eMule for playing-as-downloading application.
In Proceedings — 5th International Conference on Wireless
Communications, Networking and Mobile Computing, WiCOM 2009, 2009.
(doi:10.1109/WICOM.2009.5303293)
- [230]
- J. Wang,
P. De Wilde, and H. Wang.
Topological analysis of a two coupled evolving networks model for business
systems.
Expert Systems with Applications, 36(5):9548–9556, 2009.
(doi:10.1016/j.eswa.2008.07.090)
- [231]
- J. Wang,
Y. Li, and X. Jing.
The research of resource locating model based on sub-domain hybrid P2P
network.
In Proceedings - 2009 International Conference on Information Engineering
and Computer Science, ICIECS 2009, 2009.
(doi:10.1109/ICIECS.2009.5362926)
- [232]
- J. Woodcock, P.G. Larsen,
J. Bicarregui, and J. Fitzgerald.
Formal methods: Practice and experience.
ACM Computing Surveys, 41(4), 2009.
(doi:10.1145/1592434.1592436)
- [233]
- Z. Wu.
An empirical study of the accessibility of web references in two chinese
academic journals.
Scientometrics, 78(3):481–503, 2009.
(doi:10.1007/s11192-007-1951-1)
- [234]
- R. Wuyts,
H.M. Kienle, K. Mens, M. Van
Den Brand, and A. Kuhn.
Academic software development tools and techniques: Report on the 1st workshop
WASDeTT at ECOOP 2008.
In Object-Oriented Technology. ECOOP 2008 Workshop Reader, pages
87–103, 2009.
(doi:10.1007/978-3-642-02047-6_10)
- [235]
- Q.-W. Xu and
J. Gou.
Hotdataspider, an ETL tool for supplementary data of biomedical journals.
In FBIE 2009 - 2009 International Conference on Future BioMedical
Information Engineering, pages 33–36, 2009.
(doi:10.1109/FBIE.2009.5405918)
- [236]
- W. Xu,
L. Huang, A. Fox, D. Patterson,
and M. Jordan.
Online system problem detection by mining patterns of console logs.
In Proceedings - IEEE International Conference on Data Mining,
ICDM, pages 588–597, 2009.
(doi:10.1109/ICDM.2009.19)
- [237]
- Z. Yang
and H. Ma.
Hotspot avoidance for P2P streaming distribution application: A game
theoretic approach.
IEEE Transactions on Parallel and Distributed Systems,
20(2):219–232, 2009.
(doi:10.1109/TPDS.2008.67)
- [238]
- L. Yang,
Y. Liu, and Y. Liu.
Optimization of source pencil deployment based on plant growth simulation
algorithm.
He Jishu/Nuclear Techniques, 32(12):915–921, 2009.
- [239]
- M.K.H.
Yeung and Y.-K. Kwok.
On game theoretic peer selection for resilient peer-to-peer media streaming.
IEEE Transactions on Parallel and Distributed Systems,
20(10):1512–1525, 2009.
(doi:10.1109/TPDS.2008.253)
- [240]
- S. Yi,
J. Lee, H. Min, Y. Cho, and
J. Hong.
Yasic: Yet-another software integrity checker for security-critical wireless
sensor networks.
In 24th International Conference on Computers and Their Applications
2009, CATA 2009, pages 117–121, 2009.
- [241]
- U. Zdun and M. Strembeck.
Reusable architectural decisions for DSL design: Foundational decisions in
DSL development.
In Proceedings of EuroPLoP 2009 - 14th Annual European Conference on
Pattern Languages of Programming, 2009.
- [242]
- U. Zdun and M. Strembeck.
Reusable architectural decisions for DSL design: Foundational decisions in
DSL development.
In 14th Annual European Conference on Pattern Languages of Programming,
EuroPLoP 2009, volume 566, pages B61–B637, 2009.
- [243]
- Z. Zeng and B. Veeravalli.
A novel distributed architecture of large-scale multimedia storage system using
autonomous object-based storage devices.
Journal of Parallel and Distributed Computing, 69(4):349–359,
2009.
(doi:10.1016/j.jpdc.2008.12.004)
- [244]
- M. Zhao,
X.-W. Li, and Q.-P. Liu.
The realization of a kind of self-adapted making test paper system - using
"object-oriented programming" for an example.
In 2009 IEEE International Conference on Grey Systems and Intelligent
Services, GSIS 2009, pages 1370–1374, 2009.
(doi:10.1109/GSIS.2009.5408126)