- [1]
- N.T.
Abdelmajid, M.A. Hossain, S. Shepherd, and
K. Mahmoud.
Improved kerberos security protocol evaluation using modified BAN logic.
In Proceedings - 10th IEEE International Conference on Computer and
Information Technology, CIT-2010, 7th IEEE International Conference on
Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages
1610–1615, 2010.
(doi:10.1109/CIT.2010.285)
- [2]
- N.T.
Abdelmajid, M.A. Hossain, S. Shepherd, and
K. Mahmoud.
Location-based kerberos authentication protocol.
In Proceedings - SocialCom 2010: 2nd IEEE International Conference on
Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy,
Security, Risk and Trust, pages 1099–1104, 2010.
(doi:10.1109/SocialCom.2010.163)
- [3]
- D. Acharya and V. Kumar.
A secure pervasive health care system using location dependent unicast key
generation scheme.
In International Conference on Information and Knowledge Management,
Proceedings, pages 87–90, 2010.
(doi:10.1145/1871902.1871919)
- [4]
- D. Acharya.
Security in pervasive health care networks: Current r&d and future challenges.
In Proceedings - IEEE International Conference on Mobile Data
Management, pages 305–306, 2010.
(doi:10.1109/MDM.2010.38)
- [5]
- A. Achilleos, N. Georgalas,
K. Yang, and G.A. Papadopoulos.
A software cost model to assess productivity impact of a model-driven technique
in developing domain-specific design tools.
Modern Software Engineering Concepts and Practices: Advanced
Approaches, pages 333–355, 2010.
(doi:10.4018/978-1-60960-215-4.ch014)
- [6]
- D. Adami,
C. Callegari, S. Giordano,
M. Pagano, and T. Pepe.
Optimal design of service overlay networks with economic and performance
constraints.
International Journal of Communication Systems, 23(3):369–389,
2010.
(doi:10.1002/dac.1072)
- [7]
- G. Adamson.
Challenges in researching portals and the internet.
International Journal of Web Portals, 2(2):26–37, 2010.
(doi:10.4018/jwp.2010040103)
- [8]
- M.D. Aime,
P.C. Pomi, and M. Vallini.
Ontology and algorithms for the dependable configuration of information
systems.
International Journal of Critical Computer-Based Systems,
1(4):310–335, 2010.
- [9]
- A. Aksulu
and M. Wade.
A comprehensive review and synthesis of open source research.
Journal of the Association of Information Systems,
11(11):576–656, 2010.
- [10]
- B. Al-Dabbagh,
E. Scornavacca, and H. Hoehle.
User perceived requirements for a mobile accounting information system.
In ACIS 2010 Proceedings - 21st Australasian Conference on Information
Systems, 2010.
- [11]
- J. Al Dallal and L.C. Briand.
An object-oriented high-level design-based class cohesion metric.
Information and Software Technology, 52(12):1346–1361, 2010.
(doi:10.1016/j.infsof.2010.08.006)
- [12]
- P. Alvaro,
D.V. Ryaboy, and D. Agrawal.
Knuckles: Bringing the database to the data.
International Journal of Computational Science and Engineering,
5(3-4):214–225, 2010.
(doi:10.1504/IJCSE.2010.037677)
- [13]
- T.L. Alves,
C. Ypma, and J. Visser.
Deriving metric thresholds from benchmark data.
In IEEE International Conference on Software Maintenance, ICSM,
2010.
(doi:10.1109/ICSM.2010.5609747)
- [14]
- M. Analoui, M. Sharifi, and
M.H. Rezvani.
Probabilistic proximity-aware resource location in peer-to-peer networks using
resource replication.
International Journal of Computers, Communications and Control,
5(4):418–431, 2010.
- [15]
- A. Andreatos and A. Leros.
Simulation course redesign and educational software selection.
In 9th European Conference on eLearning 2010, ECEL 2010, pages
29–38. Academic Conferences Limited, 2010.
- [16]
- R. Andriansyah,
T. Van Woensel, F.R.B. Cruz, and
L. Duczmal.
Performance optimization of open zero-buffer multi-server queueing networks.
Computers and Operations Research, 37(8):1472–1487, 2010.
(doi:10.1016/j.cor.2009.11.004)
- [17]
- O. Antonaccio, C.R. Tittle,
E. Botchkovar, and M. Kranidiotis.
The correlates of crime and deviance: Additional evidence.
Journal of Research in Crime and Delinquency, 47(3):297–328,
2010.
(doi:10.1177/0022427810365678)
- [18]
- P. Ardimento, G. Bruno,
D. Caivano, and M. Cimitile.
A maintenance metric model for open source governance.
In 5th Conference of the Italian Chapter of the Association for
Information Systems, ItAIS 2008, pages 139–146. Physica-Verlag, 2010.
(doi:10.1007/978-3-7908-2148-2_17)
- [19]
- H.S. Ayatollahi Tabatabaii,
M. Khansari, and H.R. Rabiee.
Livecod: A mesh-pull P2P live streaming system with XOR-based network
coding.
In 2010 IEEE Globecom Workshops, GC'10, pages 436–441, 2010.
(doi:10.1109/GLOCOMW.2010.5700357)
- [20]
- R.S.
Aygün, Y. Ma, K. Akkaya,
G. Cox, and A. Bicak.
A conceptual model for data management and distribution in peer-to-peer
systems.
Peer-to-Peer Networking and Applications, 3(4):294–322, 2010.
(doi:10.1007/s12083-009-0061-7)
- [21]
- S. Baerisch.
Domain-specific model-driven testing.
Springer Vieweg, 2010.
(doi:10.1007/978-3-8348-9624-7)
- [22]
- K. Bakhrankova.
Decision support system for continuous production.
Industrial Management and Data Systems, 110(4):591–610, 2010.
(doi:10.1108/02635571011039043)
- [23]
- Kevin
Banks, Donovan Kolbly, and Matthew Blackmon.
System
and method for summarizing and reporting impact of database statements.
United States Patent 7,831,621, November 2010.
Assignee: Crossroads Systems, Inc. (Austin, TX).
- [24]
- S. Basagiannis, P. Katsaros,
and A. Pombortsis.
An intruder model with message inspection for model checking security
protocols.
Computers and Security, 29(1):16–34, 2010.
(doi:10.1016/j.cose.2009.08.003)
- [25]
- Christian Beaumont, James F.
Springfield, and Nenad Stefanovic.
Hosting
controls in a window via an interface for controlling the window.
United States Patent 7,730,496, June 2010.
Assignee: Microsoft Corporation (Redmond, WA).
- [26]
- K. Berte,
D. Schuurman, and L. De Marez.
Adoption versus use diffusion of idtv in flanders- personalized television
content as a tool to cross the chasm?
In EuroITV'10 - Proceedings of the 8th International Interactive TV and
Video Conference, pages 15–22, 2010.
(doi:10.1145/1809777.1809781)
- [27]
- N. Bicocchi, M. Baumgarten,
N. Brgulja, R. Kusber, M. Mamei,
M. Mulvenna, and F. Zambonelli.
Self-organized data ecologies for pervasive situation-aware services: The
knowledge networks approach.
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and
Humans, 40(4):789–802, 2010.
(doi:10.1109/TSMCA.2010.2048023)
- [28]
- N. Bicocchi, M. Mamei, and
F. Zambonelli.
Handling dynamics in diffusive aggregation schemes: An evaporative approach.
Future Generation Computer Systems, 26(6):877–889, 2010.
(doi:10.1016/j.future.2010.02.008)
- [29]
- H. Boomkamp.
Global GPS reference frame solutions of unlimited size.
Advances in Space Research, 46(2):136–143, 2010.
(doi:10.1016/j.asr.2010.02.015)
- [30]
- N. Borch,
K. Mitchell, and D. Gabrijelčič.
Access control to bittorrent swarms using closed swarms.
In AVSTP2P'10 - Proceedings of the 2010 ACM Workshop on Advanced Video
Streaming Techniques for Peer-to-Peer Networks and Social Networking,
Co-located with ACM Multimedia 2010, pages 25–30, 2010.
(doi:10.1145/1877891.1877898)
- [31]
- J.-M.
Borello, E. Filiol, and L. Mé.
From the design of a generic metamorphic engine to a black-box classification
of antivirus detection techniques.
Journal in Computer Virology, 6(3):277–287, 2010.
(doi:10.1007/s11416-009-0136-2)
- [32]
- M. Brogle,
S. Barthlomé, and T. Braun.
Quality of service for multicasting using NICE.
In Proceedings of the ACM Symposium on Applied Computing, pages
670–677, 2010.
(doi:10.1145/1774088.1774227)
- [33]
- B.R.
Bryant, J. Gray, and M. Mernik.
Domain-specific software engineering.
In Proceedings of the FSE/SDP Workshop on the Future of Software
Engineering Research, FoSER 2010, pages 65–68, 2010.
(doi:10.1145/1882362.1882376)
- [34]
- R.P.L.
Buse and T. Zimmermann.
Analytics for software development.
In Proceedings of the FSE/SDP Workshop on the Future of Software
Engineering Research, FoSER 2010, pages 77–80, 2010.
(doi:10.1145/1882362.1882379)
- [35]
- A.A. Bush
and A. Tiwana.
Signaling in content sharing platforms.
In ICIS 2010 Proceedings - Thirty First International Conference on
Information Systems, 2010.
- [36]
- F. Calzolari, S. Arezzini,
A. Ciampa, E. Mazzoni,
A. Domenici, and G. Vaglini.
High availability using virtualization.
Journal of Physics: Conference Series, 219(1 PART 5), 2010.
(doi:10.1088/1742-6596/219/5/052017)
- [37]
- S. Castano, A. Ferrara, and
S. Montanelli.
A reference architecture for semantic knowledge coordination.
In 5th Conference of the Italian Chapter of the Association for
Information Systems, ItAIS 2008, pages 185–193. Physica-Verlag, 2010.
(doi:10.1007/978-3-7908-2148-2_22)
- [38]
- H. Chehade, F. Yalaoui,
L. Amodeo, and F. Dugardin.
Buffers sizing in assembly lines using a lorenz multiobjective ant colony
optimization algorithm.
In 2010 International Conference on Machine and Web Intelligence, ICMWI
2010 - Proceedings, pages 283–287, 2010.
(doi:10.1109/ICMWI.2010.5647916)
- [39]
- S. Chen and
G. Yang.
Superpathtrust for trust aggregation in unstructured peer-to-peer networks.
Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument,
31(1):223–228, 2010.
- [40]
- F. Chen,
M.P. Johnson, A. Bar-Noy, and
T.F. La Porta.
Cooperative data dissemination to mission sites.
In Proceedings of SPIE - The International Society for Optical
Engineering, volume 7706, 2010.
(doi:10.1117/12.851186)
- [41]
- G. Chen,
A. Sarrafzadeh, C.P. Low, and
L. Zhang.
A self-organization mechanism based on cross-entropy method for P2P-like
applications.
ACM Transactions on Autonomous and Adaptive Systems, 5(4), 2010.
(doi:10.1145/1867713.1867716)
- [42]
- K. Chen,
T.-L. Hu, and G. Chen.
Fast trust chain search in role-based credential overlay network.
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University
(Engineering Science), 44(12):2241–2250, 2010.
(doi:10.3785/j.issn.1008-973X.2010.12.003)
- [43]
- S. Chen,
S. Liang, and M. Wang.
A locality-aware peer-to-peer approach for geospatial web services discovery.
In 2010 Canadian Geomatics Conference and Symposium of Commission I,
ISPRS Convergence in Geomatics - Shaping Canada's Competitive
Landscape, volume 38. International Society for Photogrammetry and
Remote Sensing, 2010.
- [44]
- Y. Chung.
Efficient batch update of unique identifiers in a distributed hash table for
resources in a mobile host.
In Proceedings - International Symposium on Parallel and Distributed
Processing with Applications, ISPA 2010, pages 625–630, 2010.
(doi:10.1109/ISPA.2010.73)
- [45]
- A. Cicchetti, D. Di Ruscio,
P. Pelliccione, A. Pierantonio, and
S. Zacchiroli.
A model driven approach to upgrade package-based software systems.
Communications in Computer and Information Science, 69
CCIS:262–276, 2010.
(doi:10.1007/978-3-642-14819-4_19)
- [46]
- T. Clark
and L. Tratt.
Formalizing homogeneous language embeddings.
Electronic Notes in Theoretical Computer Science, 253(7):75–88,
2010.
(doi:10.1016/j.entcs.2010.08.033)
- [47]
- F. Clear.
Innovative knowledge transfer mechanisms and the potential role for theatric
methods in the propagation of good data handling practice.
Smart Innovation, Systems and Technologies, 5:197–208, 2010.
- [48]
- M. Colajanni, M. Marchetti,
and M. Messori.
Selective and early threat detection in large networked systems.
In Proceedings - 10th IEEE International Conference on Computer and
Information Technology, CIT-2010, 7th IEEE International Conference on
Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages
604–611, 2010.
(doi:10.1109/CIT.2010.124)
- [49]
- G. Concas, M. Locci,
M. Marchesi, R. Tonelli, and
I. Turnu.
Computing the fractal dimension - a global metrics for large software systems.
In 2010 International Conference on Computational Intelligence and
Software Engineering, CiSE 2010, 2010.
(doi:10.1109/CISE.2010.5676891)
- [50]
- Rod Cope and Eric Weidner.
Installation
of software stacks including uncoordinated projects.
United States Patent 7,669,199, February 2010.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [51]
- Rod Cope and Eric Weidner.
Software
project filter.
United States Patent 7,665,086, February 2010.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [52]
- Rod Cope and Eric Weidner.
Tools
for stacking uncoordinated software projects.
United States Patent 7,661,089, February 2010.
Assignee: OpenLogic, Inc. (Broomfield, CO).
- [53]
- S. Counsell, G. Loizou, and
R. Najjar.
Is manual data collection hampered by the presence of inner classes or class
size.
In Advanced Techniques in Computing Sciences and Software
Engineering, pages 91–97, 2010.
- [54]
- M. Crasso, C. Mateos,
A. Zunino, and M. Campo.
Empirically assessing the impact of dependency injection on the development of
web service applications.
Journal of Web Engineering, 9(1):66–94, 2010.
- [55]
- O. Curé, R. Forax,
P. Degenne, D.L. Seen,
D. Parigot, and A.A. Lahcen.
Ocelet: An ontology-based domain specific language to model complex domains.
In 3rd Int. Conf. on Communication Theory, Reliability, and Quality of
Service, CTRQ 2010, Includes MOPAS 2010: 1st Int. Conf. on Models and
Ontology-Based Design of Protocols, Architecture and Services, pages
255–260, 2010.
(doi:10.1109/CTRQ.2010.50)
- [56]
- S. Das and M. Magdon-Ismail.
Collective wisdom: Information growth in wikis and blogs.
In Proceedings of the ACM Conference on Electronic Commerce, pages
231–240, 2010.
(doi:10.1145/1807342.1807380)
- [57]
- B. Das,
A. Garcia-Diaz, C.A. MacDonald, and
K.K. Ghoshal.
A computer simulation approach to evaluating bowl versus inverted bowl assembly
line arrangement with variable operation times.
International Journal of Advanced Manufacturing Technology,
51(1-4):15–24, 2010.
(doi:10.1007/s00170-010-2614-6)
- [58]
- B. Das,
J.M. Sanchez-Rivas, A. Garcia-Diaz, and
C.A. MacDonald.
A computer simulation approach to evaluating assembly line balancing with
variable operation times.
Journal of Manufacturing Technology Management, 21(7):872–887,
2010.
(doi:10.1108/17410381011077964)
- [59]
- E.C.
De Almeida, J.E. Marynowski, G. Sunyé, and
P. Valduriez.
Peerunit: A framework for testing peer-to-peer systems.
In ASE'10 - Proceedings of the IEEE/ACM International Conference on
Automated Software Engineering, pages 169–170, 2010.
(doi:10.1145/1858996.1859030)
- [60]
- E.C.
De Almeida, G. Sunyé, Y. Le Traon, and
P. Valduriez.
Testing peer-to-peer systems.
Empirical Software Engineering, 15(4):346–379, 2010.
(doi:10.1007/s10664-009-9124-x)
- [61]
- W.K.
Dedzoe, P. Lamarre, R. Akbarinia, and
P. Valduriez.
Asap top-k query processing in unstructured P2P systems.
In 2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P
2010 - Proceedings, 2010.
(doi:10.1109/P2P.2010.5569974)
- [62]
- L. Demir, S. Tunali, and
D.T. Eliiyi.
An adaptive tabu search approach for buffer allocation problem in unreliable
production lines.
In 24th Mini EURO Conference on Continuous Optimization and
Information-Based Technologies in the Financial Sector, MEC EurOPT
2010, pages 207–212. Vilnius Gediminas Technical University,
2010.
- [63]
- M. Deriu,
A. Soro, and G. Paddeu.
Dynamic TV content augmentation by web pages - a prototype of enhanced remote
control capable to complement TV-viewing retrieving additional information
from the world wide web.
In International Conference on Applied Computer Science -
Proceedings, pages 469–472, 2010.
- [64]
- R. Di Pietro and N.V. Verde.
OS and network security.
In Handbook of Electronic Security and Digital Forensics, pages
1–24. World Scientific Publishing Co., 2010.
(doi:10.1142/9789812837042_0001)
- [65]
- S. Dix and
I. Phau.
Measuring situational triggers of television channel switching.
Marketing Intelligence and Planning, 28(2):137–150, 2010.
(doi:10.1108/02634501011029655)
- [66]
- D. Djuric and V. Devedzic.
Magic potion: Incorporating new development paradigms through metaprogramming.
IEEE Software, 27(5):38–44, 2010.
(doi:10.1109/MS.2010.90)
- [67]
- E. Dodonov and R.F. de Mello.
A novel approach for distributed application scheduling based on prediction of
communication events.
Future Generation Computer Systems, 26(5):740–752, 2010.
(doi:10.1016/j.future.2009.05.004)
- [68]
- C.R.P. Dos Santos, S. Cechin,
L.Z. Granville, M.J.B. Almeida, and
L.M.R. Tarouco.
On the impact of using presence services in P2P-based network management
systems.
In GLOBECOM - IEEE Global Telecommunications Conference, 2010.
(doi:10.1109/GLOCOM.2010.5683578)
- [69]
- M. El-Sharqwi, H. Mahdi, and
I. El-Madah.
Pattern-based model refactoring.
In Proceedings, ICCES'2010 - 2010 International Conference on Computer
Engineering and Systems, pages 301–306, 2010.
(doi:10.1109/ICCES.2010.5674873)
- [70]
- A. Epstein, D.H. Lorenz,
E. Silvera, and I. Shapira.
Virtual appliance content distribution for a global infrastructure cloud
service.
In Proceedings - IEEE INFOCOM, 2010.
(doi:10.1109/INFCOM.2010.5462176)
- [71]
- M.A.
Ertürk, A.H. Zaim, and S. Akyokuş.
Semantic information retrieval on peer-to-peer networks.
Communications in Computer and Information Science, 88 CCIS(PART
2):715–725, 2010.
(doi:10.1007/978-3-642-14306-9_71)
- [72]
- S. Esteves, L. Veiga, and
P. Ferreira.
Gridp2p: Resource usage in grids and peer-to-peer systems.
In Proceedings of the 2010 IEEE International Symposium on Parallel and
Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, 2010.
(doi:10.1109/IPDPSW.2010.5470917)
- [73]
- V. Fåk.
IT – risks and security.
Springer Series in Reliability Engineering, 19:143–160, 2010.
(doi:10.1007/978-1-84882-641-0_10)
- [74]
- M. Fleck, A. von Kaenel, and
M. Meckel.
Web 2.0 concepts, social software and business models.
Encyclopedia of E-Business Development and Management in the Global
Economy, 3:1183–1192, 2010.
(doi:10.4018/978-1-61520-611-7.ch119)
- [75]
- A. Forestiero, E. Leonardi,
C. Mastroianni, and M. Meo.
Self-chord: A bio-inspired P2P framework for self-organizing distributed
systems.
IEEE/ACM Transactions on Networking, 18(5):1651–1664, 2010.
(doi:10.1109/TNET.2010.2046745)
- [76]
- A. Forestiero,
C. Mastroianni, G. Papuzzo, and
G. Spezzano.
A proximity-based self-organizing framework for service composition and
discovery.
In CCGrid 2010 - 10th IEEE/ACM International Conference on Cluster,
Cloud, and Grid Computing, pages 428–437, 2010.
(doi:10.1109/CCGRID.2010.48)
- [77]
- D. Forte and A. de Donno.
Mobile network investigations.
In Handbook of Digital Forensics and Investigation, pages
517–557. Elsevier Ltd, 2010.
(doi:10.1016/B978-0-12-374267-4.00010-0)
- [78]
- S. Gad.
Data synchronization architectural pattern for ubiquitous learning systems.
In Workshop on Programming Support Innovations for Emerging Distributed
Applications, PSI EtA - PsiH 2010, 2010.
(doi:10.1145/1940747.1940749)
- [79]
- D. Gamayunov, N.T.M. Quan,
F. Sakharov, and E. Toroshchin.
Race walk: Fast instruction frequency analysis and classification for shellcode
detection in network flow.
In EC2ND 2009 - European Conference on Computer Network Defense,
pages 4–12, 2010.
(doi:10.1109/EC2ND.2009.9)
- [80]
- W. Gao,
G. Zhang, M. Wang, S. See,
Q. Wang, and X. Jiang.
An agricultural information sharing system based on P2P network technology.
Intelligent Automation and Soft Computing, 16(6):945–951,
2010.
- [81]
- V. Garcıa-Dıaz,
H. Fernández-Fernández,
E. Palacios-González, B.C.P. G-Bustelo,
O. Sanjuán-Martınez, and J.M.C.
Lovelle.
Talisman MDE: Mixing MDE principles.
Journal of Systems and Software, 83(7):1179–1191, 2010.
(doi:10.1016/j.jss.2010.01.010)
- [82]
- J. Geldenhuys.
Finding the core developers.
In Proceedings - 36th EUROMICRO Conference on Software Engineering and
Advanced Applications, SEAA 2010, pages 447–450, 2010.
(doi:10.1109/SEAA.2010.66)
- [83]
- S. Georgiades.
Sensitive practice with greek immigrants: A review of evidence.
International Journal of Culture and Mental Health, 3(1):52–60,
2010.
(doi:10.1080/17542861003607995)
- [84]
- D. Germanus, A. Khelil, and
N. Suri.
Increasing the resilience of critical SCADA systems using peer-to-peer
overlays.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6150
LNCS:161–178, 2010.
(doi:10.1007/978-3-642-13556-9_10)
- [85]
- Allan E.
Gillespie.
Reduction
of join operations when archiving related database tables.
United States Patent 7,836,022, November 2010.
Assignee: International Business Machines Corporation (Armonk, NY).
- [86]
- R. Gitzel,
S. Krug, and M. Brhel.
Towards a software failure cost impact model for the customer: An analysis of
an open source product.
In ACM International Conference Proceeding Series, 2010.
(doi:10.1145/1868328.1868354)
- [87]
- D.X. Gkoutzelis and M.S.
Sardis.
Web server security on open source environments.
3rd International Conference on Next Generation Society: Technological
and Legal Issues, e-Democracy 2009, 26 LNICST:236–247, 2010.
(doi:10.1007/978-3-642-11631-5_22)
- [88]
- R. Glott,
A.-K. Groven, K. Haaland, and
A. Tannenberg.
Quality models for free/libre open source software - towards the "silver
bullet"?
In Proceedings - 36th EUROMICRO Conference on Software Engineering and
Advanced Applications, SEAA 2010, pages 439–446, 2010.
(doi:10.1109/SEAA.2010.23)
- [89]
- J.M. Gonzalez-Barahona,
G. Robles, and S. Dueñas.
Collecting data about FLOSS development: The FLOSSMetrics experience.
In Proceedings - International Conference on Software Engineering,
pages 29–34, 2010.
(doi:10.1145/1833272.1833278)
- [90]
- V. Gorodetsky, O. Karsaev,
V. Samoylov, and S. Serebryakov.
P2p agent platform: Implementation and testing.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5319
LNAI:41–54, 2010.
(doi:10.1007/978-3-642-11368-0_4)
- [91]
- P. Grobelny.
A method for reasoning about complex services within geographic information
systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6070
LNAI(PART 1):132–141, 2010.
(doi:10.1007/978-3-642-13480-7_15)
- [92]
- A.-K.
Groven, K. Haaland, R. Glott, and
A. Tannenberg.
Security measurements within the framework of quality assessment models for
free/libre open source software.
In ACM International Conference Proceeding Series, pages 229–235,
2010.
(doi:10.1145/1842752.1842796)
- [93]
- S. Günther and
T. Cleenewerck.
Design principles for internal domain-specific languages: A pattern catalog
illustrated by Ruby.
In 17th Conference on Pattern Languages of Programs, PLoP 2010,
2010.
(doi:10.1145/2493288.2493291)
- [94]
- S. Günther, M. Haupt, and
M. Splieth.
Agile engineering of internal domain-specific languages with dynamic
programming languages.
In Proceedings - 5th International Conference on Software Engineering
Advances, ICSEA 2010, pages 162–168, 2010.
(doi:10.1109/ICSEA.2010.32)
- [95]
- M. Hai and
S. Guo.
A distributed node clustering mechanism in P2P networks.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6441
LNAI(PART 2):553–560, 2010.
(doi:10.1007/978-3-642-17313-4_57)
- [96]
- M. Hai and
Y. Tu.
A P2P e-commerce model based on interest community.
In Proceedings - 2010 International Conference on Management of
e-Commerce and e-Government, ICMeCG 2010, pages 362–365, 2010.
(doi:10.1109/ICMeCG.2010.80)
- [97]
- E. Haleplidis, C. Tranoris,
S. Denazis, and O. Koufopavlou.
Adopting software engineering practices to network processor devices:
Introducing the domain specific modeling paradigm to the forces framework.
In Proceedings of the 2010 International Conference on Network and
Service Management, CNSM 2010, pages 366–369, 2010.
(doi:10.1109/CNSM.2010.5691237)
- [98]
- M. Hamasaki, H. Takeda, and
T. Nishimura.
Network analysis of an emergent massively collaborative creation on video
sharing website: Case study of creation community of hatsume miku movie on
nico nico douga.
Transactions of the Japanese Society for Artificial Intelligence,
25(1):157–167, 2010.
- [99]
- A. Hameurlain, D. Cokuslu,
and K. Erciyes.
Resource discovery in grid systems: A survey.
International Journal of Metadata, Semantics and Ontologies,
5(3):251–263, 2010.
(doi:10.1504/IJMSO.2010.034048)
- [100]
- D. Han and
Y. Yu.
Keyword search in unstructured peer-to-peer networks.
Springer US, 2010.
(doi:10.1007/978-0-387-09751-0_15)
- [101]
- B.-O. Hartmann and
K. Böhm.
Towards efficient equilibria of combinations of network-formation and
interaction strategies.
In Proceedings - 2010 IEEE/WIC/ACM International Conference on
Intelligent Agent Technology, IAT 2010, volume 2, pages 14–23, 2010.
(doi:10.1109/WI-IAT.2010.50)
- [102]
- S. Hatahet, A. Bouabdallah,
and Y. Challal.
A new worm propagation threat in bittorrent: Modeling and analysis.
Telecommunication Systems, 45(2-3):95–109, 2010.
(doi:10.1007/s11235-009-9241-2)
- [103]
- Ø. Hauge, C. Ayala, and
R. Conradi.
Adoption of open source software in software-intensive organizations - a
systematic literature review.
Information and Software Technology, 52(11):1133–1154, 2010.
(doi:10.1016/j.infsof.2010.05.008)
- [104]
- H. Hietanen.
Networked digital video recorders and social networks.
In 2010 7th IEEE Consumer Communications and Networking Conference, CCNC
2010, 2010.
(doi:10.1109/CCNC.2010.5421715)
- [105]
- L.J.
Holtzblatt, L.E. Damianos, and D. Weiss.
Factors impeding wiki use in the enterprise: A case study.
In Conference on Human Factors in Computing Systems - Proceedings,
pages 4661–4675, 2010.
(doi:10.1145/1753846.1754208)
- [106]
- S.K.A.
Hossain, A.S.M. Mahfujur Rahman, T.T. Tran,
and A. El Saddik.
Location aware question answering based product searching in mobile handheld
devices.
In Proceedings - IEEE International Symposium on Distributed Simulation
and Real-Time Applications, DS-RT, pages 189–195, 2010.
(doi:10.1109/DS-RT.2010.28)
- [107]
- H.-H. Hsu
and H.-T. Liao.
Online note sharing in a mobile self-guided tour system.
In CISIS 2010 - The 4th International Conference on Complex, Intelligent
and Software Intensive Systems, pages 740–745, 2010.
(doi:10.1109/CISIS.2010.121)
- [108]
- C.-L. Hu,
Y.-H. Chang, D.-Y. Chen, and
Y.-W. Chen.
Simple peer selection strategies for fast and fair peer-to-peer file sharing.
In International Conference on Advanced Communication Technology,
ICACT, volume 1, pages 208–213, 2010.
- [109]
- C.-L. Hu,
D.-Y. Chen, Y.-H. Chang, and
Y.-W. Chen.
Fair peer assignment scheme for peer-to-peer file sharing.
KSII Transactions on Internet and Information Systems,
4(5):709–735, 2010.
(doi:10.3837/tiis.2010.10.002)
- [110]
- Y.-S.
Huang, X.-W. Meng, and Y.-J. Zhang.
Strategy of content location of P2P based on the social network.
Ruan Jian Xue Bao/Journal of Software, 21(10):2622–2630, 2010.
(doi:10.3724/SP.J.1001.2010.03647)
- [111]
- Z. Huang,
J. Huai, X. Liu, and J. Zhu.
Business process decomposition based on service relevance mining.
In Proceedings - 2010 IEEE/WIC/ACM International Conference on Web
Intelligence, WI 2010, volume 1, pages 573–580, 2010.
(doi:10.1109/WI-IAT.2010.21)
- [112]
- T. Huffmire, C. Irvine,
T.D. Nguyen, T. Levin,
R. Kastner, and T. Sherwood.
Handbook of FPGA design security.
Springer Netherlands, 2010.
(doi:10.1007/978-90-481-9157-4)
- [113]
- J.R.
Ikoja-Odongo.
Information security policies, volume 1.
IGI Global, 2010.
(doi:10.4018/978-1-61520-847-0.ch025)
- [114]
- L. Ilijašić and
L. Saitta.
Long-tailed distributions in grid complex network.
In Proceeding of the 2nd Workshop on Grids Meets Autonomic Computing,
GMAC '10, Co-located with ICAC'10, pages 21–30, 2010.
(doi:10.1145/1809029.1809032)
- [115]
- D. Irwanto.
Visual indicator component software to show component design quality and
characteristic.
In Proceedings - 2010 2nd International Conference on Advances in
Computing, Control and Telecommunication Technologies, ACT 2010, pages
50–54, 2010.
(doi:10.1109/ACT.2010.34)
- [116]
- A. Israeli and D.G.
Feitelson.
The Linux kernel as a case study in software evolution.
Journal of Systems and Software, 83(3):485–501, 2010.
(doi:10.1016/j.jss.2009.09.042)
- [117]
- S.S.
Iyengar, N. Parameshwaran, V.V. Phoha,
N. Balakrishnan, and C.D. Okoye.
Fundamentals of Sensor Network Programming: Applications and
Technology.
John Wiley and Sons, 2010.
(doi:10.1002/9780470890158)
- [118]
- D. Izquierdo-Cortazar, J.M.
Gonzalez-Barahona, S. Dueñas, and
G. Robles.
Towards automated quality models for software development communities: The
QualOSS and FLOSSMetrics case.
In Proceedings - 7th International Conference on the Quality of
Information and Communications Technology, QUATIC 2010, pages
364–369, 2010.
(doi:10.1109/QUATIC.2010.66)
- [119]
- L. Jakab,
A. Cabellos-Aparicio, T. Silverston,
M. Solé, F. Cora, and
J. Domingo-Pascual.
Corecast: How core/edge separation can help improving inter-domain live
streaming.
Computer Networks, 54(18):3388–3401, 2010.
(doi:10.1016/j.comnet.2010.07.005)
- [120]
- Q.-J. Ji.
A novel optimal data scheduling approach to P2P content distribution.
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong
University, 44(3):403–406+412, 2010.
- [121]
- H.M. Judi,
S.M. Salleh, N. Hussin, and
S. Idris.
Activity surveillance and hawthorne effect to prevent programming plagiarism.
Journal of Computer Science, 6(11):1341–1346, 2010.
(doi:10.3844/jcssp.2010.1341.1346)
- [122]
- M. Jureczko and L. Madeyski.
Towards identifying software project clusters with regard to defect prediction.
In ACM International Conference Proceeding Series, 2010.
(doi:10.1145/1868328.1868342)
- [123]
- M. Kaiafa-Gbandi.
Punishing corruption in the public and the private sector: The legal framework
of the european union in the international scene and the greek legal order.
European Journal of Crime, Criminal Law and Criminal Justice,
18(2):139–183, 2010.
(doi:10.1163/157181710X12659830399617)
- [124]
- G. Kakarontzas and
I. Stamelos.
Component recycling for agile methods.
In Proceedings - 7th International Conference on the Quality of
Information and Communications Technology, QUATIC 2010, pages
397–402, 2010.
(doi:10.1109/QUATIC.2010.72)
- [125]
- T. Kalibera, P. Parizek,
G. Haddad, G.T. Leavens, and
J. Vitek.
Challenge benchmarks for verification of real-time programs.
In PLPV'10 - Proceedings of the 2010 ACM SIGPLAN Workshop on Programming
Languages meets Program Verification, pages 57–62, 2010.
(doi:10.1145/1707790.1707800)
- [126]
- T. Kalibera, P. Parizek,
M. Malohlava, and M. Schoeberl.
Exhaustive testing of safety critical java.
In ACM International Conference Proceeding Series, pages 164–174,
2010.
(doi:10.1145/1850771.1850794)
- [127]
- D. Kallinikou,
M. Papadopoulos, A. Kaponi, and
V. Strakantouna.
Intellectual property issues for digital libraries at the intersection of law,
technology, and the public interest.
E-Publishing and Digital Libraries: Legal and Organizational
Issues, pages 294–341, 2010.
(doi:10.4018/978-1-60960-031-0.ch015)
- [128]
- P. Kamthan.
On the implications of the social web environment for pedagogical
patterns.
IGI Global, 2010.
(doi:10.4018/978-1-60960-144-7.ch009)
- [129]
- Yiannis Kanellopoulos, Panos
Antonellis, Dimitris Antoniou, Christos
Makris, Evangelos Theodoridis, Christos
Tjortjis, and Nikos Tsirakis.
Code quality evaluation methodology using the ISO/IEC 9126 standard.
International Journal of Software Engineering and Applications,
1(3):17–36, July 2010.
- [130]
- I. Kang,
S. Choi, S. Jung, and S. Lee.
Tree-based index overlay in hybrid peer-to-peer systems.
Journal of Computer Science and Technology, 25(2):313–329, 2010.
(doi:10.1007/s11390-010-9326-0)
- [131]
- G. Kardas,
Z. Demirezen, and M. Challenger.
Towards a DSML for semantic web enabled multi-agent systems.
In ECOOP 2010 Workshop Proceedings - International Workshop on
Formalization of Modeling Languages, FML'10, 2010.
(doi:10.1145/1943397.1943402)
- [132]
- I. Kelényi, Á.
Ludányi, and J.K. Nurminen.
Bittorrent on mobile phones - energy efficiency of a distributed proxy
solution.
In 2010 International Conference on Green Computing, Green Comp
2010, pages 451–458, 2010.
(doi:10.1109/GREENCOMP.2010.5598282)
- [133]
- P. Kenyeres,
A. Szentgyörgyi, T. Mészáros, and
G. Fehér.
Botspot: Anonymous and distributed malware detection.
2nd International Conference on Wireless and Mobile networks, WiMo
2010, 84:59–70, 2010.
(doi:10.1007/978-3-642-14171-3_6)
- [134]
- H. Ketmaneechairat,
P. Oothongsap, and A. Mingkhwan.
Buffer size estimation for different start video broadcasting.
In ECTI-CON 2010 - The 2010 ECTI International Conference on Electrical
Engineering/Electronics, Computer, Telecommunications and Information
Technology, pages 924–928, 2010.
- [135]
- A. Khelil, S. Jeckel,
D. Germanus, and N. Suri.
Towards benchmarking of P2P technologies from a SCADA systems protection
perspective.
2nd International ICST Conference on Mobile Lightweight Wireless Systems,
MOBILIGHT 2010, 45 LNICST:400–414, 2010.
(doi:10.1007/978-3-642-16644-0_35)
- [136]
- H.M. Kienle.
It's about time to take javascript (more) seriously.
IEEE Software, 27(3):60–62, 2010.
(doi:10.1109/MS.2010.76)
- [137]
- J. Kim,
J. Shin, J. Choi, S. Lee,
M. Kim, and S. Lee.
A DHT-based virtual storage system in windows environments.
In 2010 The 2nd International Conference on Computer and Automation
Engineering, ICCAE 2010, volume 4, pages 169–172, 2010.
(doi:10.1109/ICCAE.2010.5451741)
- [138]
- M.S. Kirkpatrick and
E. Bertino.
Enforcing spatial constraints for mobile RBAC systems.
In Proceedings of ACM Symposium on Access Control Models and
Technologies, SACMAT, pages 99–108, 2010.
(doi:10.1145/1809842.1809860)
- [139]
- Darko Kirovski and Kamal
Jain.
Off-line
economies for digital media.
United States Patent 7,818,811, October 2010.
Assignee: Microsoft Corporation (Redmond, WA).
- [140]
- B. Kitts, L. Wei,
D. Au, S. Zlomek, R. Brooks, and
B. Burdick.
Targeting television audiences using demographic similarity.
In Proceedings - IEEE International Conference on Data Mining,
ICDM, pages 1391–1399, 2010.
(doi:10.1109/ICDMW.2010.200)
- [141]
- M. Klein
and M.L. Nelson.
Evaluating methods to rediscover missing web pages from the web infrastructure.
In Proceedings of the ACM International Conference on Digital
Libraries, pages 59–68, 2010.
(doi:10.1145/1816123.1816133)
- [142]
- M. Klein,
J. Shipman, and M.L. Nelson.
Is this a good title?
In HT'10 - Proceedings of the 21st ACM Conference on Hypertext and
Hypermedia, pages 3–12, 2010.
(doi:10.1145/1810617.1810621)
- [143]
- M. Kobayashi, J. Kageyama,
S. Shibusawa, and T. Yonekura.
File replication method based on demand forecasting of file download in P2P
networks.
Journal of Digital Information Management, 8(4):247–253,
2010.
- [144]
- M. Kodialam, T.V. Lakshman,
S. Mukherjee, and L. Wang.
Online scheduling of targeted advertisements for IPTV.
In Proceedings - IEEE INFOCOM, 2010.
(doi:10.1109/INFCOM.2010.5461972)
- [145]
- E. Konidari and P. Louridas.
When students are not programmers.
ACM Inroads, 1(1):55–60, 2010.
(doi:10.1145/1721933.1721952)
- [146]
- T. Kos,
T. Kosar, J. Knez, and
M. Mernik.
Improving end-user productivity in measurement systems with a domain-specific
(modeling) language sequencer.
In 14th East-European Conference on Advances in Databases and Information
Systems, ADBIS 2010, volume 639, pages 61–76, 2010.
- [147]
- T. Kosar, N. Oliveira,
M. Mernik, M.J.V. Pereira,
M. Črepinšek, D. da Cruz, and
P.R. Henriques.
Comparing general-purpose and domain-specific languages: An empirical study.
Computer Science and Information Systems, 7(2):247–264, 2010.
(doi:10.2298/CSIS1002247K)
- [148]
- T. Koskela, O. Kassinen,
Z. Ou, and M. Ylianttila.
Improving community management performance with two-level hierarchical DHT
overlays.
Journal of Internet Technology, 11(2):167–180, 2010.
- [149]
- A.G. Kotsopoulos and T.A.
Antonakopoulos.
Nanopositioning using the spiral of archimedes: The probe-based storage case.
Mechatronics, 20(2):273–280, 2010.
(doi:10.1016/j.mechatronics.2009.12.004)
- [150]
- D.E.
Koulouriotis, A.S. Xanthopoulos, and V.D.
Tourassis.
Simulation optimisation of pull control policies for serial manufacturing lines
and assembly manufacturing systems using genetic algorithms.
International Journal of Production Research, 48(10):2887–2912,
2010.
(doi:10.1080/00207540802603759)
- [151]
- U. Krenn,
M. Thonhauser, and C. Kreiner.
Ecql: A query and action language for model-based applications.
In 17th IEEE International Conference and Workshops on the Engineering of
Computer-Based Systems, ECBS 2010, pages 286–290, 2010.
(doi:10.1109/ECBS.2010.40)
- [152]
- A. Kritikos, G. Kakarontzas,
and I. Stamelos.
A semi-automated process for open source code reuse.
In ENASE 2010 - Proceedings of the 5th International Conference on
Evaluation of Novel Approaches to Software Engineering, pages
179–185, 2010.
- [153]
- E. La Mattina, V. Savarino,
C. Vicari, D. Storelli, and
D. Bianchini.
A technological infrastructure to sustain internetworked enterprises.
Evolving Towards the Internetworked Enterprise: Technological and
Organizational Perspectives, pages 97–117, 2010.
(doi:10.1007/978-1-4419-7279-8_5)
- [154]
- A.P. Leros,
A. Andreatos, and A. Zagorianos.
Matlab - octave science and engineering benchmarking and comparison.
In International Conference on Computers - Proceedings, volume 1,
pages 746–754, 2010.
- [155]
- F. Li
and Y. Ishikawa.
Query processing in a traceable P2P record exchange framework.
IEICE Transactions on Information and Systems,
E93-D(6):1433–1446, 2010.
(doi:10.1587/transinf.E93.D.1433)
- [156]
- Y. Li and
X. Zhang.
AjCQFr: AOP-based code quality framework.
In Proceedings of ICCIA 2010 — 2010 International Conference on
Computer and Information Application, pages 199–202, 2010.
(doi:10.1109/ICCIA.2010.6141570)
- [157]
- Y.-M. Li.
Pricing digital content distribution over heterogeneous channels.
Decision Support Systems, 50(1):243–257, 2010.
(doi:10.1016/j.dss.2010.08.027)
- [158]
- C.-C. Liang.
Downward communications enhancement using a robust broadcasting mechanism.
Expert Systems with Applications, 37(1):741–755, 2010.
(doi:10.1016/j.eswa.2009.05.096)
- [159]
- J. Liebig, S. Apel,
C. Lengauer, C. Kästner, and
M. Schulze.
An analysis of the variability in forty preprocessor-based software product
lines.
In Proceedings - International Conference on Software Engineering,
volume 1, pages 105–114, 2010.
(doi:10.1145/1806799.1806819)
- [160]
- C.-S. Lin.
Improving the availability of scalable on-demand streams by dynamic buffering
on P2P networks.
KSII Transactions on Internet and Information Systems,
4(4):491–508, 2010.
(doi:10.3837/tiis.2010.08.003)
- [161]
- M.A.
Lindner, L.M. Vaquero, L. Rodero-Merino, and
J. Caceres.
Cloud economics: Dynamic business models for business on demand.
International Journal of Business Information Systems,
5(4):373–392, 2010.
(doi:10.1504/IJBIS.2010.032938)
- [162]
- J. Lindsay, J. Noble, and
E. Tempero.
Does size matter? a preliminary investigation of the consequences of powerlaws
in software.
In Proceedings - International Conference on Software Engineering,
pages 16–23, 2010.
(doi:10.1145/1809223.1809226)
- [163]
- Y. Liu,
Y. Li, L.T. Yang, N. Xiong,
L. Zhu, and K. Xu.
The resource locating strategy based on subdomain hybrid P2P network model.
In Proceedings of the 2010 IEEE International Symposium on Parallel and
Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, 2010.
(doi:10.1109/IPDPSW.2010.5470710)
- [164]
- Y. Liu,
N. Xiong, J.H. Park, C. Yang,
and K. Xu.
Fair incentive mechanism with pyramidal structure for peer-to-peer networks.
IET Communications, 4(1):1–12, 2010.
(doi:10.1049/iet-com.2008.0702)
- [165]
- Y. Liu,
N. Xiong, L. Zhu, J.H. Park, and
J. Gao.
An effective simulation method for search strategy in unstructured P2P
network.
Simulation Modelling Practice and Theory, 18(4):456–469, 2010.
(doi:10.1016/j.simpat.2009.09.001)
- [166]
- M. Locci,
G. Concas, R. Tonelli, and
I. Turnu.
Three algorithms for analyzing fractal software networks.
WSEAS Transactions on Information Science and Applications,
7(3):371–380, 2010.
- [167]
- X. Long
and J. Joshi.
Barms: A bayesian reputation management approach for P2P systems.
In 2010 IEEE International Conference on Information Reuse and
Integration, IRI 2010, pages 147–152, 2010.
(doi:10.1109/IRI.2010.5558948)
- [168]
- G. López Millán,
M. Gil Pérez, G. Martınez Pérez,
and A.F. Gómez Skarmeta.
PKI-based trust management in inter-domain scenarios.
Computers and Security, 29(2):278–290, 2010.
(doi:10.1016/j.cose.2009.08.004)
- [169]
- S.-P. Lu,
K.-M. Li, and C.-Y. Hsieh.
The study of dynamic navigation with WAVE/DSRC in VANETs.
In ICS 2010 - International Computer Symposium, pages 524–528,
2010.
(doi:10.1109/COMPSYM.2010.5685457)
- [170]
- T. Lukman, G. Godena,
J. Gray, and S. Strmčnik.
Model-driven engineering of industrial process control applications.
In Proceedings of the 15th IEEE International Conference on Emerging
Technologies and Factory Automation, ETFA 2010, 2010.
(doi:10.1109/ETFA.2010.5641224)
- [171]
- T. Lukman, M. Mernik,
Z. Demirezen, B. Bryant, and
J. Gray.
Automatic generation of model traversals from metamodel definitions.
In Proceedings of the Annual Southeast Conference, 2010.
(doi:10.1145/1900008.1900113)
- [172]
- B. Lundell, B. Lings, and
E. Lindqvist.
Open source in Swedish companies: Where are we?
Information Systems Journal, 20(6):519–535, 2010.
(doi:10.1111/j.1365-2575.2010.00348.x)
- [173]
- Y. Ma,
K. He, B. Li, and X. Zhou.
How multiple-dependency structure of classes affects their functions: A
statistical perspective.
In ICSTE 2010 - 2010 2nd International Conference on Software Technology
and Engineering, Proceedings, volume 2, pages V260–V266, 2010.
(doi:10.1109/ICSTE.2010.5608763)
- [174]
- Y.-T. Ma,
K.-Q. He, B. Li, J. Liu, and
X.-Y. Zhou.
A hybrid set of complexity metrics for large-scale object-oriented software
systems.
Journal of Computer Science and Technology, 25(6):1184–1201,
2010.
(doi:10.1007/s11390-010-9398-x)
- [175]
- G. Magklaras and S. Furnell.
Insider threat specification as a threat mitigation technique.
Advances in Information Security, 49:219–244, 2010.
(doi:10.1007/978-1-4419-7133-3_10)
- [176]
- M.E.F.
Maia, C. Celes, R. Castro, and
R.M.C. Andrade.
Considerations on developing mobile applications based on the capuchin project.
In Proceedings of the ACM Symposium on Applied Computing, pages
575–579, 2010.
(doi:10.1145/1774088.1774207)
- [177]
- A. Manjunatha, A. Ranabahu,
A. Sheth, and K. Thirunarayan.
Power of clouds in your pocket: An efficient approach for cloud mobile hybrid
application development.
In Proceedings - 2nd IEEE International Conference on Cloud Computing
Technology and Science, CloudCom 2010, pages 496–503, 2010.
(doi:10.1109/CloudCom.2010.78)
- [178]
- I. Martinez-Marchena,
L. Mora-Lopez, P.J. Sanchez, and
M. Sidrach-De-Cardona.
Binding machine learning models and OPC technology for evaluating solar
energy systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6098
LNAI(PART 3):606–615, 2010.
(doi:10.1007/978-3-642-13033-5_62)
- [179]
- S. Masrom, S.Z.Z. Abidin,
P.N.M. Abdul Rahman, and A.S. Abd. Rahman.
Software framework for flexible user defined metaheuristic hybridization.
Communications in Computer and Information Science, 117
CCIS:218–227, 2010.
(doi:10.1007/978-3-642-17578-7_22)
- [180]
- Y. Massim, F. Yalaoui,
L. Amodeo, E. Chatelet, and
A. Zeblah.
Efficient combined immune-decomposition algorithm for optimal buffer allocation
in production lines for throughput and profit maximization.
Computers and Operations Research, 37(4):611–620, 2010.
(doi:10.1016/j.cor.2009.06.016)
- [181]
- C. Melchiors, A.H.
Dos Santos, D. Mattjie, C.R.P. Dos Santos,
A. Panisson, L.Z. Granville, and
L.M.R. Tarouco.
A network polling solution through a P2P-based distributed management
environment.
In Proceedings of the ACM Symposium on Applied Computing, pages
729–730, 2010.
(doi:10.1145/1774088.1774238)
- [182]
- P.M. Melliar-Smith and L.E.
Moser.
O-ring: A fault tolerance and load balancing architecture for peer-to-peer
systems.
In Proceedings - International Conference of the Chilean Computer Science
Society, SCCC, pages 25–33, 2010.
(doi:10.1109/SCCC.2009.15)
- [183]
- J. Metrôlho, M. Costa,
F.R. Ribeiro, and E. Lopes.
A target environment programming language to improve developer's productivity -
a case study.
In International Conference on Applied Computer Science -
Proceedings, pages 530–533, 2010.
- [184]
- John L.
Miller.
Routing
cache for distributed hash tables.
United States Patent 7,808,971, October 2010.
- [185]
- N. Mitchell, E. Schonberg,
and G. Sevitsky.
Four trends leading to Java runtime bloat.
IEEE Software, 27(1):56–63, 2010.
(doi:10.1109/MS.2010.7)
- [186]
- H. Mohamad Judi,
S. Mohd Sallen, N. Hussin, and
S. Idris.
The use of assignment programming activity log to study novice programmers'
behavior between non-plagiarized and plagiarized groups.
Information Technology Journal, 9(1):98–106, 2010.
(doi:10.3923/itj.2010.98.106)
- [187]
- P. Monteiro and M.P.
Monteiro.
A pattern language for parallelizing irregular algorithms.
In ACM International Conference Proceeding Series, 2010.
(doi:10.1145/1953611.1953624)
- [188]
- E. Mourtou.
Modeling access control in healthcare organizations.
Certification and Security in Health-Related Web Applications: Concepts
and Solutions, pages 23–44, 2010.
(doi:10.4018/978-1-61692-895-7.ch002)
- [189]
- A.S.
Mousas, A. Antonakopoulou, F. Gogoulos,
G.V. Lioudakis, D.I. Kaklamani, and
I.S. Venieris.
Visualising access control: The PRISM approach.
In Proceedings - 14th Panhellenic Conference on Informatics, PCI
2010, pages 107–111, 2010.
(doi:10.1109/PCI.2010.52)
- [190]
- B. Mukerji, B. Maheshwari,
U. Kumar, and V. Kumar.
Open source software: emerging business models.
International Journal of Information and Decision Sciences,
2(4):319–339, 2010.
(doi:10.1504/IJIDS.2010.037229)
- [191]
- M. Müller-Hannemann and
S. Schirra.
Chapter 10. challenges in algorithm engineering.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5971
LNCS:446–496, 2010.
(doi:10.1007/978-3-642-14866-8_10)
- [192]
- Takayuki
Nakayama.
Numerical
calculation device, numerical calculation method, and computer product.
United States Patent 7,650,302, January 2010.
Assignee: Fujitsu Limited (Kawasaki, JP)The Bank of Tokyo-Mitsubishi UFJ, Ltd.
(Tokyo, JP).
- [193]
- S. Nasrin and K. Kawagoe.
Sg2: A novel index structure for efficient data management in super-peer
architecture.
In ICUFN 2010 - 2nd International Conference on Ubiquitous and Future
Networks, pages 378–383, 2010.
(doi:10.1109/ICUFN.2010.5547178)
- [194]
- R. Niemeijer, B. De Vries,
and J. Beetz.
Constraint soup: Interpreting natural language architectural constraints.
In Proceedings of the 6th International Conference on Natural Language
Processing and Knowledge Engineering, NLP-KE 2010, 2010.
(doi:10.1109/NLPKE.2010.5587851)
- [195]
- R.A.
Niemeijer, B. De Vries, and J. Beetz.
Designing with constraints towards mass customization in the housing industry.
In 10th International Conference on Design and Decision Support Systems,
DDSS 2010. Eindhoven University of Technology, 2010.
- [196]
- E. Nygren,
R.K. Sitaraman, and J. Sun.
The akamai network: A platform for high-performance internet applications.
Operating Systems Review (ACM), 44(3):2–19, 2010.
(doi:10.1145/1842733.1842736)
- [197]
- D.R. Olsen,
B. Partridge, and S. Lynn.
Time warp sports for internet television.
ACM Transactions on Computer-Human Interaction, 17(4), 2010.
(doi:10.1145/1879831.1879834)
- [198]
- G. Oster,
R. Mondéjar, P. Molli, and
S. Dumitriu.
Building a collaborative peer-to-peer wiki system on a structured overlay.
Computer Networks, 54(12):1939–1952, 2010.
(doi:10.1016/j.comnet.2010.03.019)
- [199]
- Z. Ou,
E. Harjula, O. Kassinen, and
M. Ylianttila.
Performance evaluation of a kademlia-based communication-oriented P2P system
under churn.
Computer Networks, 54(5):689–705, 2010.
(doi:10.1016/j.comnet.2009.09.022)
- [200]
- W.-F. Pan,
B. Li, Y.-T. Ma, Y.-Y. Qin, and
X.-Y. Zhou.
Measuring structural quality of object-oriented softwares via bug propagation
analysis on weighted software networks.
Journal of Computer Science and Technology, 25(6):1202–1213,
2010.
(doi:10.1007/s11390-010-9399-9)
- [201]
- K. Papapanagiotou, G.F.
Marias, and P. Georgiadis.
Revising centralized certificate validation standards for mobile and wireless
communications.
Computer Standards and Interfaces, 32(5-6):281–287, 2010.
(doi:10.1016/j.csi.2009.07.001)
- [202]
- R.M.
Parizi and A.A.A. Ghani.
Towards automated monitoring and forecasting of probabilistic quality
properties in open source software (OSS): A striking hybrid approach.
In 8th ACIS International Conference on Software Engineering Research,
Management and Applications, SERA 2010, pages 329–334, 2010.
(doi:10.1109/SERA.2010.48)
- [203]
- H. Park and M. Van
Der Schaar.
Evolution of resource reciprocation strategies in P2P networks.
IEEE Transactions on Signal Processing, 58(3 PART 1):1205–1218,
2010.
(doi:10.1109/TSP.2009.2033731)
- [204]
- B. Parno,
J.M. McCune, and A. Perrig.
Bootstrapping trust in commodity computers.
In Proceedings - IEEE Symposium on Security and Privacy, pages
414–429, 2010.
(doi:10.1109/SP.2010.32)
- [205]
- K. Pentikousis and T. Rautio.
A multiaccess network of information.
In 2010 IEEE International Symposium on "A World of Wireless, Mobile and
Multimedia Networks", WoWMoM 2010 - Digital Proceedings, 2010.
(doi:10.1109/WOWMOM.2010.5534922)
- [206]
- A. Pino and
G. Kouroupetroglou.
Ithaca: An open source framework for building component-based augmentative and
alternative communication applications.
ACM Transactions on Accessible Computing, 2(4), 2010.
(doi:10.1145/1786774.1786775)
- [207]
- R. Plösch, H. Gruber,
C. Körner, and M. Saft.
A method for continuous code quality management using static analysis.
In Proceedings - 7th International Conference on the Quality of
Information and Communications Technology, QUATIC 2010, pages
370–375, 2010.
(doi:10.1109/QUATIC.2010.68)
- [208]
- A. Poggi and M. Tomaiuolo.
Integrating peer-to-peer and multi-agent technologies for the realization of
content sharing applications.
Studies in Computational Intelligence, 324:93–107, 2010.
(doi:10.1007/978-3-642-16089-9_6)
- [209]
- M. Poktonjak,
S. Meguerdichian, and J.L. Wong.
Trusted sensors and remote sensing.
In Proceedings of IEEE Sensors, pages 1104–1107, 2010.
(doi:10.1109/ICSENS.2010.5690721)
- [210]
- A. Prata,
T. Chambel, and N. Guimarães.
Generation of crossmedia dynamic learning contexts from iTV.
In EuroITV'10 - Proceedings of the 8th International Interactive TV and
Video Conference, pages 91–100, 2010.
(doi:10.1145/1809777.1809798)
- [211]
- A. Prata,
N. Guimarães, and T. Chambel.
Designing iTV based crossmedia personalized informal learning contexts.
In Proceedings of the 14th International Academic MindTrek Conference:
Envisioning Future Media Environments, MindTrek 2010, pages 187–194,
2010.
(doi:10.1145/1930488.1930528)
- [212]
- Y. Qiu and
X. Liu.
Writing mechanism in digital organism file system.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
47(12):2177–2184, 2010.
- [213]
- K. Rabe
and N. Konrad.
Current aspects of suicide in correctional facilities.
Forensische Psychiatrie, Psychologie, Kriminologie, 4(3):182–192,
2010.
(doi:10.1007/s11757-010-0064-5)
- [214]
- N. Ramzan, M. Larson,
F. Dufaux, and K. Clüver.
The participation payoff: Challenges and opportunities for multimedia access in
networked communities.
In MIR 2010 - Proceedings of the 2010 ACM SIGMM International Conference
on Multimedia Information Retrieval, pages 487–496, 2010.
(doi:10.1145/1743384.1743470)
- [215]
- A.D. Rand.
Mediating at the student-wikipedia intersection.
Journal of Library Administration, 50(7):923–932, 2010.
(doi:10.1080/01930826.2010.488994)
- [216]
- Patrick W. Ransil, Aleksey V.
Martynov, James S. Larson, James R. Collette,
Robert Wai-Chi Chu, and Partha Saha.
Method
and apparatus for a searchable data service.
United States Patent 7,801,912, September 2010.
Assignee: Amazon Technologies, Inc. (Reno, NV).
- [217]
- L. Renggli, M. Denker, and
O. Nierstrasz.
Language boxes: Bending the host language with modular language changes.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5969
LNCS:274–293, 2010.
(doi:10.1007/978-3-642-12107-4_20)
- [218]
- L. Renggli, T. Gîrba,
and O. Nierstrasz.
Embedding languages without breaking tools.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6183
LNCS:380–404, 2010.
(doi:10.1007/978-3-642-14107-2_19)
- [219]
- J. Reutelshoefer,
J. Baumeister, and F. Puppe.
Towards meta-engineering for semantic wikis.
In CEUR Workshop Proceedings, volume 632, pages 49–63, 2010.
- [220]
- M. Rey-López, F.A.
Mikic-Fonte, A.M. Peleteiro, J.C. Burguillo,
and A.B. Barragáns-Martınez.
L4f: A P2P its for recommending additional learning contents by means of
folksonomies.
In ICEIS 2010 - Proceedings of the 12th International Conference on
Enterprise Information Systems, volume 4 SAIC, pages 135–138,
2010.
- [221]
- B. Robinson and P. Francis.
Improving industrial adoption of software engineering research: A comparison of
open and closed source software.
In ESEM 2010 - Proceedings of the 2010 ACM-IEEE International Symposium
on Empirical Software Engineering and Measurement, 2010.
(doi:10.1145/1852786.1852814)
- [222]
- Michael J. Rowan, Christopher
T. M. Bailey, Kefeng Chen, and Neal Creighton.
Security
systems and services to provide identity and uniform resource identifier
verification.
United States Patent 7,694,135, April 2010.
Assignee: Geotrust, Inc. (Mountain View, CA).
- [223]
- B. Salem,
J.A. Lino, and M. Rauterberg.
Smartex: A case study on user profiling and adaptation in exhibition booths.
Journal of Ambient Intelligence and Humanized Computing,
1(3):185–198, 2010.
(doi:10.1007/s12652-010-0018-y)
- [224]
- L.E.
Sánchez, C. Ruiz, E. Fernández-Medina,
and M. Piattini.
Managing the asset risk of SMEs.
In ARES 2010 - 5th International Conference on Availability, Reliability,
and Security, pages 422–429, 2010.
(doi:10.1109/ARES.2010.52)
- [225]
- C.G. Santillán, L.C.
Reyes, E. Schaeffer, E. Meza, and
G.R. Zarate.
Local survival rule for steer an adaptive ant-colony algorithm in complex
systems.
Studies in Computational Intelligence, 312:245–265, 2010.
(doi:10.1007/978-3-642-15111-8_15)
- [226]
- S. Sawamura, A. Aikebaier,
T. Enokido, V. Barolli, and
M. Takizawa.
Confidence and trustworthiness in peer-to-peer overlay networks.
In Proceedings - 13th International Conference on Network-Based
Information Systems, NBiS 2010, pages 117–124, 2010.
(doi:10.1109/NBiS.2010.84)
- [227]
- S. Sawamura, A. Aikebaier,
T. Enokido, V. Barolli, and
M. Takizawa.
Subjective and objective types of trustworthiness in peer-to-peer(P2P)
overlay networks.
In 24th IEEE International Conference on Advanced Information Networking
and Applications Workshops, WAINA 2010, pages 1108–1113, 2010.
(doi:10.1109/WAINA.2010.180)
- [228]
- S. Sawamura, A. Aikebaier,
T. Enokido, V. Barolli, and
M. Takizawa.
Trustworthiness of acquaintances in peer-to-peer(P2P) overlay networks.
In CISIS 2010 - The 4th International Conference on Complex, Intelligent
and Software Intensive Systems, pages 267–274, 2010.
(doi:10.1109/CISIS.2010.160)
- [229]
- S. Sawamura, A. Barolli,
A. Aikebaier, V. Barolli, and
M. Takizawa.
Two types of trustworthiness of acquaintances in peer-to-peer (P2P) overlay
networks.
In Proceedings - 2010 International Conference on Broadband, Wireless
Computing Communication and Applications, BWCCA 2010, pages 320–327,
2010.
(doi:10.1109/BWCCA.2010.90)
- [230]
- C. Schanes, A. Mauczka,
U. Kirchengast, T. Grechenig, and
S. Marx.
Nationwide PKI testing - ensuring interoperability of OCSP server and
client implementations early during component tests.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6391
LNCS:114–129, 2010.
(doi:10.1007/978-3-642-16441-5_8)
- [231]
- G. Schuster and R. Lovassy.
A possible control structure for production lines optimization.
In 19th International Workshop on Robotics in Alpe-Adria-Danube Region,
RAAD 2010 - Proceedings, pages 423–425, 2010.
(doi:10.1109/RAAD.2010.5524550)
- [232]
- M. Schwind, A. Schenk, and
M. Schneider.
A tool for the analysis of social networks in collaborative software
development.
In Proceedings of the Annual Hawaii International Conference on System
Sciences, 2010.
(doi:10.1109/HICSS.2010.40)
- [233]
- S. Seneviratne and D.C. Levy.
Cost profile prediction for grid computing.
Concurrency Computation Practice and Experience, 22(1):107–142,
2010.
(doi:10.1002/cpe.1537)
- [234]
- V. Sesum-Cavic and
E. Kühn.
A swarm intelligence appliance to the construction of an intelligent
peer-to-peer overlay network.
In CISIS 2010 - The 4th International Conference on Complex, Intelligent
and Software Intensive Systems, pages 1028–1035, 2010.
(doi:10.1109/CISIS.2010.64)
- [235]
- Q.Z. Sheng,
Y. Wu, and D. Ranasinghe.
Enabling scalable RFID traceability networks.
In Proceedings - International Conference on Advanced Information
Networking and Applications, AINA, pages 1061–1068, 2010.
(doi:10.1109/AINA.2010.150)
- [236]
- S. Shrestha, D.S. Kim,
S. Lee, and J.S. Park.
A peer-to-peer RFID resolution framework for supply chain network.
In 2nd International Conference on Future Networks, ICFN 2010,
pages 318–322, 2010.
(doi:10.1109/ICFN.2010.98)
- [237]
- I. Siveroni, A. Zisman, and
G. Spanoudakis.
A UML-based static verification framework for security.
Requirements Engineering, 15(1):95–118, 2010.
(doi:10.1007/s00766-009-0091-y)
- [238]
- D.I.K.
Sjøberg.
Confronting the myth of rapid obsolescence in computing research.
Communications of the ACM, 53(9):62–67, 2010.
(doi:10.1145/1810891.1810911)
- [239]
- J.M.
Smith, F.R.B. Cruz, and T. Van Woensel.
Optimal server allocation in general, finite, multi-server queueing networks.
Applied Stochastic Models in Business and Industry,
26(6):705–736, 2010.
(doi:10.1002/asmb.813)
- [240]
- J.M.
Smith, F.R.B. Cruz, and T. van Woensel.
Topological network design of general, finite, multi-server queueing networks.
European Journal of Operational Research, 201(2):427–441, 2010.
(doi:10.1016/j.ejor.2009.03.012)
- [241]
- Q.D.
Soetens and S. Demeyer.
Studying the effect of refactorings: A complexity metrics perspective.
In Proceedings - 7th International Conference on the Quality of
Information and Communications Technology, QUATIC 2010, pages
313–318, 2010.
(doi:10.1109/QUATIC.2010.58)
- [242]
- Y.-R. Song
and G.-P. Jiang.
Epidemic-spreading model for networks with different anti-attack abilities of
nodes and nonuniform transmission of edges.
Wuli Xuebao/Acta Physica Sinica, 59(11):7546–7551, 2010.
- [243]
- Y. Song,
M.E. Locasto, A. Stavrou, A.D.
Keromytis, and S.J. Stolfo.
On the infeasibility of modeling polymorphic shellcode : Re-thinking the role
of learning in intrusion detection systems.
Machine Learning, 81(2):179–205, 2010.
(doi:10.1007/s10994-009-5143-5)
- [244]
- P.G.
Spirakis, V. Vlachos, V. Karakoidas,
D. Liappis, D. Kalaitzis,
E. Valeontis, S. Kollias, and
G. Argyros.
Blueprints for a large-scale early warning system.
In Proceedings - 14th Panhellenic Conference on Informatics, PCI
2010, pages 7–11, 2010.
(doi:10.1109/PCI.2010.27)
- [245]
- A. Steed and M.F. Oliveira.
Networked Graphics.
Elsevier Inc., 2010.
- [246]
- K.-J.
Stol and M. Ali Babar.
Challenges in using open source software in product development: A review of
the literature.
In Proceedings - International Conference on Software Engineering,
pages 17–22, 2010.
(doi:10.1145/1833272.1833276)
- [247]
- K.-J.
Stol and M. Ali Babar.
A comparison framework for open source software evaluation methods.
IFIP Advances in Information and Communication Technology, 319
AICT:389–394, 2010.
(doi:10.1007/978-3-642-13244-5_36)
- [248]
- V. Stolz.
An integrated multi-view model evolution framework.
Innovations in Systems and Software Engineering, 6(1):13–20,
2010.
(doi:10.1007/s11334-009-0102-7)
- [249]
- J. Sun,
H. Chen, and C. Niu.
A new database firewall based on anomaly detection.
In Parallel and Distributed Computing, Applications and Technologies,
PDCAT Proceedings, pages 399–404, 2010.
(doi:10.1109/PDCAT.2010.71)
- [250]
- Hironori Suzuki, Kenichi
Moriwaki, and Naoya Okamoto.
GUI
application development support device, GUI display device, and method, and
computer program.
United States Patent 7,823,075, October 2010.
Assignee: Sony Corporation (Tokyo, JP).
- [251]
- S. Suzuki, R. Van Meter,
O. Nakamura, and J. Murai.
Otedama: A relocatable RFID information repository architecture.
IEICE Transactions on Information and Systems,
E93-D(11):2922–2931, 2010.
(doi:10.1587/transinf.E93.D.2922)
- [252]
- O.Y.
Tahboub and J.I. Khan.
Forwarding on froggers networks: Principle of data flow equilibrium.
In Proceedings - 2011 8th International Conference on Information
Technology: New Generations, ITNG 2011, pages 125–130, 2010.
(doi:10.1109/ITNG.2011.29)
- [253]
- J.-P.
Tolvanen, J. Sprinkle, M. Rossi, and
S. Kelly.
The 10th workshop on domain-specific modeling.
In Proceedings of the ACM International Conference Companion on Object
Oriented Programming Systems Languages and Applications Companion, SPLASH
'10, pages 269–270, 2010.
(doi:10.1145/1869542.1869607)
- [254]
- R. Tonelli, G. Concas, and
M. Locci.
Three efficient algorithms for implementing the preferential attachment
mechanism in yule-simon stochastic process.
WSEAS Transactions on Information Science and Applications,
7(2):176–185, 2010.
- [255]
- J. Tong,
K. Xu, and R. Pi.
A new web service structure of combining P2P and CDN technologies.
In Proceedings - 2010 IEEE 2nd Symposium on Web Society, SWS 2010,
pages 475–479, 2010.
(doi:10.1109/SWS.2010.5607404)
- [256]
- M. Torchiano, F. Ricca, and
P. Tonella.
Empirical comparison of graphical and annotation-based re-documentation
approaches.
IET Software, 4(1):15–31, 2010.
(doi:10.1049/iet-sen.2009.0015)
- [257]
- D. Tsolis and S. Sioutas.
Digital rights management in peer to peer cultural networks.
Handbook of Research on Technologies and Cultural Heritage: Applications
and Environments, pages 119–140, 2010.
(doi:10.4018/978-1-60960-044-0.ch006)
- [258]
- Shah
Ullah.
Targeting
content to internet enabled radio devices.
United States Patent 7,856,372, December 2010.
- [259]
- Shah
Ullah.
Targeting
content to network-enabled devices based upon stored profiles.
United States Patent 7,856,373, December 2010.
- [260]
- J. Van
Den Bos.
Domain-specific languages for digital forensics.
In 1st Doctoral Symposium of the International Conference on Software
Language Engineering 2010, SLE-DS 2010, volume 648, pages 49–53,
2010.
- [261]
- B. Van Niekerk and
M. Maharaj.
Mobile security from an information warfare perspective.
In Proceedings of the 2010 Information Security for South Africa
Conference, ISSA 2010, 2010.
(doi:10.1109/ISSA.2010.5588339)
- [262]
- M. Viroli and F. Zambonelli.
A biochemical approach to adaptive service ecosystems.
Information Sciences, 180(10):1876–1892, 2010.
(doi:10.1016/j.ins.2009.11.021)
- [263]
- A. Visan, M. Istin,
F. Pop, F. Xhafa, and
V. Cristea.
Peer interest-based discovery for decentralized peer-to-peer systems.
In 5th International Conference on P2P, Parallel, Grid, Cloud and
Internet Computing, 3PGCIC 2010, pages 363–368, 2010.
(doi:10.1109/3PGCIC.2010.60)
- [264]
- P. Vitharana, J. King, and
H. Chapman.
Impact of internal open source development on reuse: Participatory reuse in
action.
Journal of Management Information Systems, 27(2):277–304, 2010.
(doi:10.2753/MIS0742-1222270209)
- [265]
- J.L.
Vivas, F.-G. Carmen, J. Lopez, and
A. Benjumea.
A security framework for a workflow-based grid development platform.
Computer Standards and Interfaces, 32(5-6):230–245, 2010.
(doi:10.1016/j.csi.2009.04.001)
- [266]
- F. Von Reischach, E. Dubach,
F. Michahelles, and A. Schmidt.
An evaluation of product review modalities for mobile phones.
In ACM International Conference Proceeding Series, pages 199–207,
2010.
(doi:10.1145/1851600.1851635)
- [267]
- A. Vosoughi, K. Bilal,
S.U. Khan, N. Min-Allah, J. Li,
N. Ghani, P. Bouvry, and
S. Madani.
A multidimensional robust greedy algorithm for resource path finding in
large-scale distributed networks.
In Proceedings of the 8th International Conference on Frontiers of
Information Technology, FIT'10, 2010.
(doi:10.1145/1943628.1943644)
- [268]
- A. Živkovič,
U. Goljat, and M. Heričko.
Improving the usability of the source code quality index with interchangeable
metrics sets.
Information Processing Letters, 110(6):236–240, 2010.
(doi:10.1016/j.ipl.2010.01.002)
- [269]
- W.-Y. Wang
and Y.-W. Chen.
Is playing-as-downloading feasible in an emule P2P file sharing system?
Journal of Zhejiang University: Science C, 11(6):465–475, 2010.
(doi:10.1631/jzus.C0910408)
- [270]
- J. Wang,
Y. Li, F. Gong, and W. Chen.
A new strategy of resource searching in unstructured P2P network.
In 2nd International Conference on Communication Software and Networks,
ICCSN 2010, pages 32–36, 2010.
(doi:10.1109/ICCSN.2010.120)
- [271]
- Z. Wei,
X. Yuan, D. Jia, and G. Wang.
An aquatic product traceability system based on RFID technology.
In Proceedings 2010 IEEE International Conference on Software Engineering
and Service Sciences, ICSESS 2010, pages 154–157, 2010.
(doi:10.1109/ICSESS.2010.5552384)
- [272]
- S. Weiss,
P. Urso, and P. Molli.
Logoot-undo: Distributed collaborative editing system on P2P networks.
IEEE Transactions on Parallel and Distributed Systems,
21(8):1162–1174, 2010.
(doi:10.1109/TPDS.2009.173)
- [273]
- W. Wong,
M.F. Magalhães, and J. Kangasharju.
Piece fingerprinting: Binding content and data blocks together in peer-to-peer
networks.
In GLOBECOM - IEEE Global Telecommunications Conference, 2010.
(doi:10.1109/GLOCOM.2010.5683550)
- [274]
- W. Wong,
M.F. Magalhães, and J. Kangasharju.
Towards verifiable parallel content retrieval.
In 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010,
pages 49–54, 2010.
(doi:10.1109/NPSEC.2010.5634450)
- [275]
- B. Wu,
J. Saia, and V. King.
Attack-resistant frequency counting.
In Proceedings of the 2010 IEEE International Symposium on Parallel and
Distributed Processing, IPDPS 2010, 2010.
(doi:10.1109/IPDPS.2010.5470344)
- [276]
- J. Wulf
and R. Zarnekow.
Technologies for the electronic distribution of information services - a value
proposition analysis.
Electronic Markets, 20(1):3–19, 2010.
(doi:10.1007/s12525-010-0027-x)
- [277]
- Shlomo Wygodny, David Elkind,
and Moshe Kravchik.
System
and method for automated tuning of program execution tracing.
United States Patent 7,827,539, November 2010.
Assignee: Identify Software Ltd.(IL).
- [278]
- C.C.
Xavier and V.L.S. De Lima.
Construction of a domain ontological structure from wikipedia.
In STIL 2009 - 2009 7th Brazilian Symposium in Information and Human
Language Technology, pages 98–107, 2010.
(doi:10.1109/STIL.2009.26)
- [279]
- R.L. Xia
and J.K. Muppala.
A survey of bittorrent performance.
IEEE Communications Surveys and Tutorials, 12(2):140–158, 2010.
(doi:10.1109/SURV.2010.021110.00036)
- [280]
- A. Yadav
and R.A. Khan.
Does coupling really affect complexity?
In 2010 International Conference on Computer and Communication
Technology, ICCCT-2010, pages 583–588, 2010.
(doi:10.1109/ICCCT.2010.5640463)
- [281]
- S. Yang and
J. Qiu.
The utilization law of web academic information: An exploring from the domain
name of web citation.
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of
Wuhan University, 35(SPECIAL ISSUE 1):52–56, 2010.
- [282]
- S. Yang,
J. Qiu, and Z. Xiong.
An empirical study on the utilization of web academic resources in humanities
and social sciences based on web citations.
Scientometrics, 84(1):1–19, 2010.
(doi:10.1007/s11192-009-0142-7)
- [283]
- B.-B. Yin,
L.-Z. Zhu, and K.-Y. Cai.
Entropy-based measures of heterogeneity of software structural profile.
In Proceedings - International Computer Software and Applications
Conference, pages 196–201, 2010.
(doi:10.1109/COMPSACW.2010.41)
- [284]
- M. Yoshida and K. Kojima.
Design methodologies of workload management through code migration in
distributed desktop computing grids.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6082
LNCS(PART 2):100–111, 2010.
(doi:10.1007/978-3-642-13136-3_10)
- [285]
- Y.-F. Yu,
P.-J. Huang, Q.-J. Chen, T.-L.
Huang, and K.-C. Lai.
A scalable multi-attribute range query approach on cluster-based hybrid
overlays.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 6083
LNCS:136–145, 2010.
(doi:10.1007/978-3-642-14822-4_15)
- [286]
- L. Yuan,
H.-M. Wang, G. Yin, D.-X. Shi,
and X. Li.
Mining and analyzing behavioral characteristic of developers in open source
software.
Jisuanji Xuebao/Chinese Journal of Computers, 33(10):1909–1918,
2010.
(doi:10.3724/SP.J.1016.2010.01909)
- [287]
- F. Zambonelli and M. Viroli.
From service-oriented architectures to nature-inspired pervasive service
ecosystems.
In CEUR Workshop Proceedings, volume 621, 2010.
- [288]
- V. Zeimpekis, I. Minis, and
V. Pappa.
Real-time logistics management of dried figs using RFID technology: Case
study in a greek cooperative company.
International Journal of Logistics Systems and Management,
7(3):265–285, 2010.
(doi:10.1504/IJLSM.2010.035035)
- [289]
- X. Zhang and H. Hassanein.
Video on-demand streaming on the internet - a survey.
In 2010 25th Biennial Symposium on Communications, QBSC 2010,
pages 88–91, 2010.
(doi:10.1109/BSC.2010.5472998)
- [290]
- L. Zhang, J. Luo,
H. Li, J. Sun, and H. Mei.
A biting-down approach to hierarchical decomposition of object-oriented systems
based on structure analysis.
Journal of Software Maintenance and Evolution, 22(8):567–596,
2010.
(doi:10.1002/smr.417)
- [291]
- Y. Zhang,
X. Jiang, T. Wang, and Z. Lin.
A utility function analysis on DTN services of resource pre- and
post-fetching.
In Proceedings of the International Conference on E-Business and
E-Government, ICEE 2010, pages 3637–3640, 2010.
(doi:10.1109/ICEE.2010.913)
- [292]
- Y. Zhang,
X. Lu, and D. Li.
Embedded DHT overlays in virtual computing environments.
Science in China, Series F: Information Sciences, 53(3):483–493,
2010.
(doi:10.1007/s11432-010-0034-8)
- [293]
- L. Zheng,
D. Yue, and J. Niu.
A new network acceleration technology based on network server.
In Proceedings - 2010 WASE International Conference on Information
Engineering, ICIE 2010, volume 4, pages 110–113, 2010.
(doi:10.1109/ICIE.2010.317)
- [294]
- J. Zhou, R. Mo,
M. Wang, R. Zhang, M. Shi,
H. Yang, and T. Yue.
Sddg: Semantic desktop data grid.
In Proceedings - 3rd International Conference on Information Sciences and
Interaction Sciences, ICIS 2010, pages 240–245, 2010.
(doi:10.1109/ICICIS.2010.5534749)
- [295]
- J.-T.
Zhou, H.-C. Yang, M.-W. Wang, and
R. Mo.
Peer to peer semantic grid service oriented enterprise information integration
architecture.
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems,
CIMS, 16(12):2697–2707, 2010.
- [296]
- H. Ziekow, B. Fabian,
C. Müller, and O. Günther.
RFID in the cloud: A service for high-speed data access in distributed value
chains.
In 16th Americas Conference on Information Systems 2010, AMCIS
2010, volume 7, pages 5453–5463, 2010.
- [297]
- S. Zuo,
Y. Guo, S. Gong, X. Wu, and
H. Zhang.
Trust value update model based on the memory theory.
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University
(Natural Science Edition), 40(SUPPL. 2):307–312, 2010.
- [298]
- V. Zwass.
Co-creation: Toward a taxonomy and an integrated research perspective.
International Journal of Electronic Commerce, 15(1):11–48, 2010.
(doi:10.2753/JEC1086-4415150101)