- [1]
- T. Abdou,
P. Grogono, and P. Kamthan.
A conceptual framework for open source software test process.
In Proceedings - International Computer Software and Applications
Conference, pages 458–463, 2012.
(doi:10.1109/COMPSACW.2012.87)
- [2]
- E. Abdullah and S. Fujita.
Colluder detection in commercial P2P CDNs using reputation information.
In Proceedings - 2012 7th International Conference on P2P, Parallel,
Grid, Cloud and Internet Computing, 3PGCIC 2012, pages 183–190, 2012.
(doi:10.1109/3PGCIC.2012.19)
- [3]
- M. Alhaisoni and A. Liotta.
Pervasive streaming via peer-to-peer networks.
In Streaming Media with Peer-to-Peer Networks: Wireless
Perspectives, pages 31–51. IGI Global, 2012.
(doi:10.4018/978-1-4666-1613-4.ch003)
- [4]
- A. Andreatos.
Educating the 21st century's engineers and IT professionals.
In New Media Communication Skills for Engineers and IT Professionals:
Trans-National and Trans-Cultural Demands, pages 132–159. IGI Global,
2012.
(doi:10.4018/978-1-4666-0243-4.ch009)
- [5]
- N. Apolónia, P. Ferreira,
and L. Veiga.
Enhancing online communities with cycle-sharing for social networks.
Computational Social Networks: Tools, Perspectives and
Applications, 9781447140481:161–195, 2012.
(doi:10.1007/978-1-4471-4048-1_7)
- [6]
- P. Appavoo,
A. Meetoo-Appavoo, A. Chutoo, and
B. Durgahee.
Using network protocols' fingerprints to efficiently determine the penetration
level of open source software in online businesses.
In 2012 IEEE Conference on Open Systems, ICOS 2012, 2012.
- [7]
- F. Armetta, M. Haddad,
S. Hassas, and H. Kheddouci.
A self-organized system improving inner topology for data sharing efficiency.
In 2012 IEEE Conference on Evolving and Adaptive Intelligent Systems,
EAIS 2012 - Proceedings, pages 145–150, 2012.
(doi:10.1109/EAIS.2012.6232820)
- [8]
- M. Arzoky, S. Swift,
A. Tucker, and J. Cain.
A seeded search for the modularisation of sequential software versions.
Journal of Object Technology, 11(2), 2012.
(doi:10.5381/jot.2012.11.2.a6)
- [9]
- A. Asmawi, L.S. Affendey,
N.I. Udzir, and R. Mahmod.
Model-based system architecture for preventing XPath injection in
database-centric web services environment.
In 2012 7th International Conference on Computing and Convergence
Technology (ICCIT, ICEI and ICACT), ICCCT 2012, pages 621–625,
2012.
- [10]
- J. Augustine, G. Pandurangan,
P. Robinson, and E. Upfal.
Towards robust and efficient computation in dynamic peer-to-peer networks.
In Proceedings of the Annual ACM-SIAM Symposium on Discrete
Algorithms, pages 551–569, 2012.
- [11]
- M. Avvenuti, C. Bernardeschi,
N. De Francesco, and P. Masci.
JCSI: A tool for checking secure information flow in java card applications.
Journal of Systems and Software, 85(11):2479–2493, 2012.
(doi:10.1016/j.jss.2012.05.061)
- [12]
- T. Baar
and P. Kumar.
Detecting entry points in java libraries.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7162
LNCS:42–54, 2012.
(doi:10.1007/978-3-642-29709-0_6)
- [13]
- T. Baar.
Improving software engineering education by modeling real-world
implementations.
In Proceedings of the 8th Educators' Symposium, EduSymp 2012,
pages 36–39, 2012.
(doi:10.1145/2425936.2425943)
- [14]
- Charlie C. Baggett, Jr. and
John J. Adams.
Method,
system, and computer program product for assessing information security.
United States Patent 8,121,892, February 2012.
Assignee: Safeoperations, Inc. (Columbia, MD).
- [15]
- N.S.A.A. Bakar and C.V.
Boughton.
Validation of measurement tools to extract metrics from open source projects.
In 2012 IEEE Conference on Open Systems, ICOS 2012, 2012.
- [16]
- A.D.
Bakar, A.B. Sultan, H. Zulzalil, and
J. Din.
Applying evolution programming search based software engineering (SBSE) in
selecting the best open source software maintainability metrics.
In ISCAIE 2012 - 2012 IEEE Symposium on Computer Applications and
Industrial Electronics, pages 70–73, 2012.
- [17]
- A. Barham.
The impact of formal QA practices on FLOSS communities - the case of
Mozilla.
IFIP Advances in Information and Communication Technology, 378
AICT:262–267, 2012.
(doi:10.1007/978-3-642-33442-9_19)
- [18]
- A. Bassiri, M.R. Malek, and
P. Amirian.
Ambient shopping advertisement using rough service domain.
Journal of Ambient Intelligence and Smart Environments,
4(2):95–105, 2012.
(doi:10.3233/AIS-2012-0138)
- [19]
- L. Becchetti, U. Colesanti,
A. Marchetti-Spaccamela, and A. Vitaletti.
Fully decentralized recommendations in pervasive systems: Models and
experimental analysis.
Engineering Intelligent Systems, 20(3):161–170, 2012.
- [20]
- Daniel C.
Becker.
Logging
system and method for computer software.
United States Patent 8,245,203, August 2012.
Assignee: Alcatel Lucent (Paris, FR).
- [21]
- N. Benkeltoum.
Open source et systèmes critiques: Le cas thales.
In 17th Symposium of the Association Information and Management 2012, AIM
2012. Association Information and Management, 2012.
- [22]
- Farrel David Benton,
Shane Christopher Branch, Robert J. Kapinos,
Raymond G. Octaviano, II, Alberto Jose Rojas
Saba, James C. Salembier, Simon David Nicholas
Taylor, and Sean Michael Ulrich.
System
and method for autonomic peer-to-peer virus inoculation.
United States Patent 8,091,134, January 2012.
Assignee: Lenovo (Singapore) Pte. Ltd. (Singapore, SG).
- [23]
- S. Berkovsky, T. Kuflik, and
F. Ricci.
The impact of data obfuscation on the accuracy of collaborative filtering.
Expert Systems with Applications, 39(5):5033–5042, 2012.
(doi:10.1016/j.eswa.2011.11.037)
- [24]
- J. Bernedixen and
A. Syberfeldt.
A comparative study of production control mechanisms using simulation-based
multi-objective optimisation.
International Journal of Production Research, 50(2):359–377,
2012.
(doi:10.1080/00207543.2010.538741)
- [25]
- P. Bhattacharya,
M. Iliofotou, I. Neamtiu, and
M. Faloutsos.
Graph-based analysis and prediction for software evolution.
In Proceedings - International Conference on Software Engineering,
pages 419–429, 2012.
(doi:10.1109/ICSE.2012.6227173)
- [26]
- C. Bird
and N. Nagappan.
Who? where? what? examining distributed development in two large open source
projects.
In IEEE International Working Conference on Mining Software
Repositories, pages 237–246, 2012.
(doi:10.1109/MSR.2012.6224286)
- [27]
- A. Bourouis and B. Belattar.
Towards a metamodel for extended queuing networks.
International Journal of Simulation Modelling, 11(3):117–128,
2012.
(doi:10.2507/IJSIMM11(3)1.190)
- [28]
- S. Burger and O. Hummel.
Applying maintainability oriented software metrics to cabin software of a
commercial airliner.
In Proceedings of the European Conference on Software Maintenance and
Reengineering, CSMR, pages 457–460, 2012.
(doi:10.1109/CSMR.2012.58)
- [29]
- A. Capiluppi, P. Falcarin,
and C. Boldyreff.
Code defactoring: Evaluating the effectiveness of Java obfuscations.
In Proceedings - Working Conference on Reverse Engineering, WCRE,
pages 71–80, 2012.
(doi:10.1109/WCRE.2012.17)
- [30]
- A. Capiluppi, A. Serebrenik,
and A. Youssef.
Developing an H-index for OSS developers.
In IEEE International Working Conference on Mining Software
Repositories, pages 251–254, 2012.
(doi:10.1109/MSR.2012.6224288)
- [31]
- T. Chaikalis, G. Melas, and
A. Chatzigeorgiou.
SEANets: Software evolution analysis with networks.
In IEEE International Conference on Software Maintenance, ICSM,
pages 634–637, 2012.
(doi:10.1109/ICSM.2012.6405341)
- [32]
- A. Chatzigeorgiou and
G. Melas.
Trends in object-oriented software evolution: Investigating network properties.
In Proceedings - International Conference on Software Engineering,
pages 1309–1312, 2012.
(doi:10.1109/ICSE.2012.6227092)
- [33]
- V. Chiprianov, Y. Kermarrec,
and S. Rouvrais.
Integrating DSLs into a software engineering process: Application to
collaborative construction of telecom services.
In Formal and Practical Aspects of Domain-Specific Languages: Recent
Developments, pages 408–434. IGI Global, 2012.
(doi:10.4018/978-1-4666-2092-6.ch015)
- [34]
- K. Christidis,
F. Paraskevopoulos, D. Panagiotou, and
G. Mentzas.
Combining activity metrics and contribution topics for software
recommendations.
In 2012 3rd International Workshop on Recommendation Systems for Software
Engineering, RSSE 2012 - Proceedings, pages 43–46, 2012.
(doi:10.1109/RSSE.2012.6233408)
- [35]
- J.-Y.
Chuang, P.-L. Hsu, and Y.-S. Chen.
Improving broadcast processes in peer-to-peer systems.
Advances in Information Sciences and Service Sciences,
4(8):187–198, 2012.
(doi:10.4156/AISS.vol4.issue8.24)
- [36]
- Y.-C.
Chung, , Y.-C. Chen, and W.-K.
Chang.
A Hot Query Bank approach to improve detection performance against SQL
injection attacks.
Computers and Security, 31(2):233–248, 2012.
(doi:10.1016/j.cose.2011.11.007)
- [37]
- T. Chusho.
Classification and definitions of business logic for end-user-initiative
development.
Frontiers in Artificial Intelligence and Applications, 246:41–56,
2012.
(doi:10.3233/978-1-61499-125-0-41)
- [38]
- T. Clark
and P.-A. Muller.
Exploiting model driven technology: A tale of two startups.
Software and Systems Modeling, 11(4):481–493, 2012.
(doi:10.1007/s10270-012-0260-1)
- [39]
- P.J.
Clarke, Y. Wu, A.A. Allen,
F. Hernandez, M. Allison, and
R. France.
Towards dynamic semantics for synthesizing interpreted DSMLs.
Formal and Practical Aspects of Domain-Specific Languages: Recent
Developments, pages 242–269, 2012.
(doi:10.4018/978-1-4666-2092-6.ch009)
- [40]
- T. Cleenewerck and
V. Jonckers.
Software variability: The design space of configuration languages.
In ACM International Conference Proceeding Series, pages 157–164,
2012.
(doi:10.1145/2110147.2110165)
- [41]
- H. Coltzau, D. Berg, and
H. Unger.
Anonymous communication in distributed organized lattice structures.
In 15th Workshop on Communities in New Media: Virtual Enterprises,
Research Communities and Social Media Networks, GeNeMe 2012, pages
11–22. TUDpress, 2012.
- [42]
- C. Comito,
A. Forestiero, and C. Mastroianni.
A self-organizing P2P architecture for indexing and searching distributed
XML documents.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7469
LNCS:295–306, 2012.
(doi:10.1007/978-3-642-32686-8_27)
- [43]
- G. Concas, M. Marchesi,
G. Destefanis, and R. Tonelli.
An empirical study of software metrics for assessing the phases of an agile
project.
International Journal of Software Engineering and Knowledge
Engineering, 22(4):525–548, 2012.
(doi:10.1142/S0218194012500131)
- [44]
- J.L.O.
Coscia, M. Crasso, C. Mateos, and
A. Zunino.
Estimating web service interface complexity and quality through conventional
object-oriented metrics.
In 15th Ibero-American Conference on Software Engineering, CIbSE
2012, 2012.
- [45]
- J.L.O.
Coscia, M. Crasso, C. Mateos,
A. Zunino, and S. Misra.
Predicting web service maintainability via object-oriented metrics: A
statistics-based approach.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7336
LNCS(PART 4):29–39, 2012.
(doi:10.1007/978-3-642-31128-4_3)
- [46]
- Y. Cui,
Y. Chen, and Y. Shi.
Comparing operating systems scalability on multicore processors by
microbenchmarking.
IEICE Transactions on Information and Systems,
E95-D(12):2810–2820, 2012.
(doi:10.1587/transinf.E95.D.2810)
- [47]
- J. Cunha,
J.P. Fernandes, C. Peixoto, and
J. Saraiva.
A quality model for spreadsheets.
In Proceedings - 2012 8th International Conference on the Quality of
Information and Communications Technology, QUATIC 2012, pages
231–236, 2012.
- [48]
- B. Curtis, J. Sappidi, and
A. Szynkarski.
Estimating the principal of an application's technical debt.
IEEE Software, 29(6):34–42, 2012.
(doi:10.1109/MS.2012.156)
- [49]
- B. Curtis, J. Sappidi, and
A. Szynkarski.
Estimating the size, cost, and types of technical debt.
In 2012 3rd International Workshop on Managing Technical Debt, MTD 2012 -
Proceedings, pages 49–53, 2012.
(doi:10.1109/MTD.2012.6226000)
- [50]
- Z. Czirkos and G. Hosszú.
Enhancing collaborative intrusion detection methods using a Kademlia overlay
network.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7479
LNCS:52–63, 2012.
(doi:10.1007/978-3-642-32808-4_6)
- [51]
- J.A.
Dallal and L.C. Briand.
A precise method-method interaction-based cohesion metric for object-oriented
classes.
ACM Transactions on Software Engineering and Methodology, 21(2),
2012.
(doi:10.1145/2089116.2089118)
- [52]
- J.A. Dallal.
The impact of accounting for special methods in the measurement of
object-oriented class cohesion on refactoring and fault prediction
activities.
Journal of Systems and Software, 85(5):1042–1057, 2012.
(doi:10.1016/j.jss.2011.12.006)
- [53]
- J.A.L. Dallal.
The impact of inheritance on the internal quality attributes of Java classes.
Kuwait Journal of Science and Engineering, 39(2 A):131–154,
2012.
- [54]
- Jehad Al Dallal.
Constructing models for predicting extract subclass refactoring opportunities
using object-oriented quality metrics.
Information and Software Technology, 54(10):1125–1141, 2012.
(doi:10.1016/j.infsof.2012.04.004)
- [55]
- Jehad Al Dallal.
Fault prediction and the discriminative powers of connectivity-based
object-oriented class cohesion metrics.
Information and Software Technology, 54(4):396–416, 2012.
(doi:10.1016/j.infsof.2011.11.007)
- [56]
- T. Danikauskas, R. Butleris,
and V. Sakys.
Application of domain specific language in information system development
process: The case of Lithuanian Forest Cadastre Integrated
Information system.
Transformations in Business and Economics, 11(1):232–247,
2012.
- [57]
- S. Das and M. Magdon-Ismail.
A model for information growth in collective wisdom processes.
ACM Transactions on Knowledge Discovery from Data, 6(2), 2012.
(doi:10.1145/2297456.2297458)
- [58]
- B. Das,
A. Garcia-Diaz, C.A. MacDonald, and
K.K. Ghoshal.
Evaluation of alternative assembly line arrangements with stochastic operation
times a computer simulation approach.
Journal of Manufacturing Technology Management, 23(6):806–822,
2012.
(doi:10.1108/17410381211253353)
- [59]
- E.M.
De Menezes, L.S.G. Piccolo, and C.D.A.
Tambascia.
Interacting with TV: Report of a user experience evaluation considering
affective state.
In WebMedia'12 - Proceedings of the 2012 Brazilian Symposium on
Multimedia and the Web, pages 331–334, 2012.
(doi:10.1145/2382636.2382705)
- [60]
- T. Dehling and A. Sunyaev.
Domain-specific languages and digital preservation supporting
knowledge-management.
In Multikonferenz Wirtschaftsinformatik 2012, MKWI 2012 - Multiconference
Business Information Systems 2012, MKWI 2012, pages 1273–1284,
2012.
- [61]
- L. Demir,
S.Y. Köse, S. Tunali, and
D.T. Eliiyi.
An integrated binary-tabu search approach for the buffer allocation problem: An
industrial case study.
In 24th European Modeling and Simulation Symposium, EMSS 2012,
pages 44–49, 2012.
- [62]
- L. Demir,
S. Tunal, and D.T. Eliiyi.
An adaptive tabu search approach for buffer allocation problem in unreliable
non-homogenous production lines.
Computers and Operations Research, 39(7):1477–1486, 2012.
(doi:10.1016/j.cor.2011.08.019)
- [63]
- J. Dıaz and C. Torras.
A personal account of Turing's imprint on the development of computer
science.
Computer Science Review, 6(5-6):225–234, 2012.
(doi:10.1016/j.cosrev.2012.11.001)
- [64]
- C. Dietrich, R. Tartler,
W. Schröder-Preikschat, and D. Lohmann.
A robust approach for variability extraction from the Linux build system.
In ACM International Conference Proceeding Series, volume 1, pages
21–30, 2012.
(doi:10.1145/2362536.2362544)
- [65]
- C. Dietrich, R. Tartler,
W. Schröder-Preikschat, and D. Lohmann.
Understanding Linux feature distribution.
In MISS'12 - Proceedings of the 2012 Workshop on Modularity in Systems
Software, pages 15–19, 2012.
(doi:10.1145/2162024.2162030)
- [66]
- D. Djuric and V. Devedzic.
Incorporating the ontology paradigm into a mainstream programming environment.
Informatica (Netherlands), 23(2):203–224, 2012.
- [67]
- D. Djuric and V. Devedzic.
Incorporating the ontology paradigm into software engineering: Enhancing
domain-driven programming in Clojure/Java.
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications
and Reviews, 42(1):3–14, 2012.
(doi:10.1109/TSMCC.2011.2140316)
- [68]
- K.O.
Elish and M. Alshayeb.
Using software quality attributes to classify refactoring to patterns.
Journal of Software, 7(2):408–419, 2012.
(doi:10.4304/jsw.7.2.408-419)
- [69]
- D.C.
Erdil and M.J. Lewis.
Dynamic grid load sharing with adaptive dissemination protocols.
Journal of Supercomputing, 59(3):1139–1166, 2012.
(doi:10.1007/s11227-010-0507-y)
- [70]
- S. Erdweg,
P.G. Giarrusso, and T. Rendel.
Language composition untangled.
In Proceedings of the 12th Workshop on Language Descriptions, Tools, and
Applications, LDTA 2012, 2012.
(doi:10.1145/2427048.2427055)
- [71]
- H.-C.
Estler, M. Nordio, C.A. Furia,
B. Meyer, and J. Schneider.
Agile vs. structured distributed software development: A case study.
In Proceedings - 2012 IEEE 7th International Conference on Global
Software Engineering, ICGSE 2012, pages 11–20, 2012.
(doi:10.1109/ICGSE.2012.22)
- [72]
- G. Exarchakos and
N. Antonopoulos.
A peer-to-peer system for on-demand sharing of capacity across network
applications.
Peer-to-Peer Networking and Applications, 5(1):58–73, 2012.
(doi:10.1007/s12083-011-0108-4)
- [73]
- M. Fathy, K. Rahemifar,
H. Babaei, M. Romoozi, and
R. Berangy.
Impact of mobility on performance of P2P content discovery protocols over
MANET.
In 3rd International Conference on Ambient Systems, Networks and
Technologies, ANT 2012 and 9th International Conference on Mobile Web
Information Systems, MobiWIS 2012, volume 10, pages 642–649.
Elsevier, 2012.
(doi:10.1016/j.procs.2012.06.082)
- [74]
- O. Febbraro, G. Grasso,
N. Leone, and F. Ricca.
JASP: A framework for integrating answer set programming with Java.
In 13th International Conference on the Principles of Knowledge
Representation and Reasoning, KR 2012, pages 541–551, 2012.
- [75]
- M.J. Fernández Iglesias,
L.M. Álvarez Sabucedo, J.M. Santos Gago,
and L.E. Anido Rifón.
A peer-to-peer semantically-driven environment to distribute contents applied
to the digital administration.
Expert Systems with Applications, 39(17):12984–12991, 2012.
(doi:10.1016/j.eswa.2012.05.100)
- [76]
- K.A.M.
Ferreira, M.A.S. Bigonha, R.S. Bigonha,
L.F.O. Mendes, and H.C. Almeida.
Identifying thresholds for object-oriented software metrics.
Journal of Systems and Software, 85(2):244–257, 2012.
(doi:10.1016/j.jss.2011.05.044)
- [77]
- K.A.M.
Ferreira, R.C.N. Moreira, M.A.S. Bigonha, and
R.S. Bigonha.
The evolving structures of software systems.
In 2012 3rd International Workshop on Emerging Trends in Software
Metrics, WETSoM 2012 - Proceedings, pages 28–34, 2012.
(doi:10.1109/WETSoM.2012.6226989)
- [78]
- K.A.M.
Ferreira, R.C.N. Moreira, M.A.S. Bigonha, and
R.S. Bigonha.
A generic macroscopic topology of software networks — a quantitative
evaluation.
In Proceedings - 2012 Brazilian Symposium on Software Engineering, SBES
2012, pages 161–170, 2012.
(doi:10.1109/SBES.2012.26)
- [79]
- L.P.
Ferreira, E. Ares, G. Peláez,
M. Marcos, and M. Araújo.
Analysis of the influence of the production sequence in an automobile assembly
line, modeled as a network of closed-loops.
In AIP Conference Proceedings, volume 1431, pages 609–616, 2012.
(doi:10.1063/1.4707615)
- [80]
- L.P.
Ferreira, E. Ares, G. Peláez,
A. Resano, C.J. Luis, and
B. Tjahjono.
Evaluation of the changes in working limits in an automobile assembly line
using simulation.
In AIP Conference Proceedings, volume 1431, pages 617–624, 2012.
(doi:10.1063/1.4707616)
- [81]
- L.P.
Ferreira, E. Ares, G. Peláez,
A. Resano, C.J. Luis, and
B. Tjahjono.
Simulation of a closed-loops assembly line.
Key Engineering Materials, 502:127–132, 2012.
(doi:10.4028/www.scientific.net/KEM.502.127)
- [82]
- L.P.
Ferreira, E. Ares, G. Peláez,
B. Tjahjono, and J.J. Areal.
Production planning and control in an automobile closed-loops assembly line.
Key Engineering Materials, 502:103–108, 2012.
(doi:10.4028/www.scientific.net/KEM.502.103)
- [83]
- A. Finney, C. Japing, and
P. Nixon.
Preventing piracy — verifying veracity in web 2.0 content assessments.
In 7th International Conference on eLearning, ICEL 2012, pages
72–78. Academic Conferences Limited, 2012.
- [84]
- A. Finney, C. Japing, and
P. Nixon.
Preventing piracy - verifying veracity in web 2.0 content assessments.
Proceedings of the European Conference on e-Government, ECEG,
pages 72–78, 2012.
- [85]
- I. Fister Jr., M. Mernik,
I. Fister, and D. Hrnčič.
Implementation of easytime formal semantics using a LISA compiler generator.
Computer Science and Information Systems, 9(3):1019–1044, 2012.
(doi:10.2298/CSIS111110021F)
- [86]
- T.J.
Gandomani, H. Zulzalil, A.A.A. Ghani, and
A.B.M. Sultan.
A systematic literature review on relationship between agile methods and open
source software development methodology.
International Review on Computers and Software, 7(4):1602–1607,
2012.
- [87]
- I. Garcia, S. Pajares,
L. Sebastia, and E. Onaindia.
Preference elicitation techniques for group recommender systems.
Information Sciences, 189:155–175, 2012.
(doi:10.1016/j.ins.2011.11.037)
- [88]
- P. Gazzillo and R. Grimm.
SuperC: Parsing all of C by taming the preprocessor.
In PLDI '12: Programming Language Design and Implementation, pages
323–334, 2012.
(doi:10.1145/2254064.2254103)
- [89]
- P. Giannikopoulos and
C. Vassilakis.
A distributed recommender system architecture.
International Journal of Web Engineering and Technology,
7(3):203–227, 2012.
(doi:10.1504/IJWET.2012.048517)
- [90]
- R. Giordanelli,
C. Mastroianni, and M. Meo.
Bio-inspired P2P systems: The case of multidimensional overlay.
ACM Transactions on Autonomous and Adaptive Systems, 7(4), 2012.
(doi:10.1145/2382570.2382571)
- [91]
- Andreea
Gorbatai, Dariusz Jemielniak, and Mathieu
O'Neil.
Special issue on management and the future of open collaboration.
Journal of Organizational Change Management, 25(6), 2012.
(doi:10.1108/jocm.2012.02325faa.002)
- [92]
- S. Günther.
Design patterns and design principles for internal domain-specific languages.
Formal and Practical Aspects of Domain-Specific Languages: Recent
Developments, pages 156–214, 2012.
(doi:10.4018/978-1-4666-2092-6.ch007)
- [93]
- Y. Guo,
Z. Zhao, and Y. Zhou.
Complexity analysis with function-call graph on windows software.
International Review on Computers and Software, 7(3):1149–1153,
2012.
- [94]
- I. Hadar and S. Sherman.
Agile vs. plan-driven perceptions of software architecture.
In 2012 5th International Workshop on Co-operative and Human Aspects of
Software Engineering, CHASE 2012 - Proceedings, pages 50–55, 2012.
(doi:10.1109/CHASE.2012.6223022)
- [95]
- W. Haihong.
An e-business process modeling based on ontology for industrial enterprise.
International Journal of Digital Content Technology and its
Applications, 6(14):42–49, 2012.
(doi:10.4156/jdcta.vol6.issue14.6)
- [96]
- T. Haitzer and U. Zdun.
DSL-based support for semi-automated architectural component model
abstraction throughout the software lifecycle.
In QoSA'12 - Proceedings of the 8th International ACM SIGSOFT Conference
on the Quality of Software Architectures, pages 61–70, 2012.
(doi:10.1145/2304696.2304709)
- [97]
- J. He,
X. Zhao, and B. Zhao.
A fast, simple and near-optimal content placement scheme for a large-scale
VoD system.
In 2012 IEEE International Conference on Communication Systems, ICCS
2012, pages 378–382, 2012.
(doi:10.1109/ICCS.2012.6406174)
- [98]
- H. Heitkötter.
A framework for creating domain-specific process modeling languages.
In ICSOFT 2012 - Proceedings of the 7th International Conference on
Software Paradigm Trends, pages 127–136, 2012.
- [99]
- I. Herraiz, D. Rodriguez, and
R. Harrison.
On the statistical distribution of object-oriented system properties.
In 2012 3rd International Workshop on Emerging Trends in Software
Metrics, WETSoM 2012 - Proceedings, pages 56–62, 2012.
(doi:10.1109/WETSoM.2012.6226994)
- [100]
- B. Hoisl,
M. Strembeck, and S. Sobernig.
Towards a systematic integration of MOF/UML-based domain-specific modeling
languages.
In Proceedings of the IASTED International Conference on Software
Engineering and Applications, SEA 2012, pages 337–344, 2012.
- [101]
- K.J. Hole.
Toward a practical technique to halt multiple virus outbreaks on computer
networks.
Journal of Computer Networks and Communications, 2012.
(doi:10.1155/2012/462747)
- [102]
- H. Holm
and M. Ekstedt.
A metamodel for web application injection attacks and countermeasures.
Lecture Notes in Business Information Processing, 131
LNBIP:198–217, 2012.
(doi:10.1007/978-3-642-34163-2_12)
- [103]
- K. Hose
and A. Vlachou.
A survey of skyline processing in highly distributed environments.
VLDB Journal, 21(3):359–384, 2012.
(doi:10.1007/s00778-011-0246-6)
- [104]
- N.-L.
Hsueh, J.-Y. Wang, and D.-H. Ting.
A cloud service design for quality evaluation of design patterns.
In Proceedings - 2012 6th International Conference on Genetic and
Evolutionary Computing, ICGEC 2012, pages 184–187, 2012.
- [105]
- C.-L. Hu and
T.-H. Kuo.
A hierarchical overlay with cluster-based reputation tree for dynamic
peer-to-peer systems.
Journal of Network and Computer Applications, 35(6):1990–2002,
2012.
(doi:10.1016/j.jnca.2012.07.022)
- [106]
- C.-L. Hu and
Z.-X. Lu.
Downloading trace study for BitTorrent P2P performance measurement and
analysis.
Peer-to-Peer Networking and Applications, 5(4):384–397, 2012.
(doi:10.1007/s12083-012-0146-6)
- [107]
- Chih-Lin Hu
and Zong-Xian Lu.
A trace study of BitTorrent P2P file distribution with downloading-side
performance measurement and analysis.
In International Conference on Advanced Communication Technology,
ICACT, pages 875–880, 2012.
- [108]
- Z. Hu.
Research and implementation of peer-to-peer network topology based on balanced
binary tree.
WSEAS Transactions on Computers, 11(8):252–264, 2012.
- [109]
- B. Huang,
T. Xie, and Y. Ma.
Anti SQL injection with statements sequence digest.
In 2012 Spring World Congress on Engineering and Technology, SCET 2012 -
Proceedings, 2012.
(doi:10.1109/SCET.2012.6341889)
- [110]
- F. Jacob,
J. Gray, J.C. Carver, M. Mernik,
and P. Bangalore.
PPModel: A modeling tool for source code maintenance and optimization of
parallel programs.
Journal of Supercomputing, 62(3):1560–1582, 2012.
(doi:10.1007/s11227-012-0821-7)
- [111]
- Namit
Jain, Nipun Agarwal, Vikram Kapoor,
Syam Pannala, and Ravi Murthy.
Method
and mechanism for supporting virtual content in performing file operations at
a RDBMS.
United States Patent 8,224,837, July 2012.
Assignee: Oracle International Corporation (Redwood Shores, CA).
- [112]
- R. Jalan and A. Kejariwal.
Trin-Trin: Who's calling? a pin-based dynamic call graph extraction
framework.
International Journal of Parallel Programming, 40(4):410–442,
2012.
(doi:10.1007/s10766-012-0193-x)
- [113]
- W. Jung and
E. and Lee.
A survey on mining software repositories.
IEICE Transactions on Information and Systems,
E95-D(5):1384–1406, 2012.
(doi:10.1587/transinf.E95.D.1384)
- [114]
- Edward
K. Y. Jung, Royce A. Levien, Robert W. Lord,
Mark A. Malamud, and John D. Rinaldo, Jr.
Portable
device and method for entertainment interaction data.
United States Patent 8,208,850, June 2012.
Assignee: The Invention Science Fund I, LLC (Bellevue, WA).
- [115]
- Y. Jusoh,
K. Chamili, J.H. Yahaya, and N.C.
Pa.
The selection criteria of open source software adoption in Malaysia.
International Journal of Advancements in Computing Technology,
4(21):278–287, 2012.
(doi:10.4156/ijact.vol4.issue21.33)
- [116]
- E. Kajo-Mece, L. Kodra,
E. Vrenozaj, and B. Shehu.
Protection of web applications using aspect oriented programming and
performance evaluation.
In 5th Balkan Conference in Informatics, BCI 2012, volume 920,
pages 46–50, 2012.
- [117]
- G. Kakarontzas, I. Stamelos,
S. Skalistis, and A. Naskos.
Extracting components from open source: The component adaptation environment
(COPE) approach.
In Proceedings - 38th EUROMICRO Conference on Software Engineering and
Advanced Applications, SEAA 2012, pages 192–199, 2012.
(doi:10.1109/SEAA.2012.39)
- [118]
- P. Kamthan.
A perspective on software engineering education with open source software.
International Journal of Open Source Software and Processes,
4(3):13–25, 2012.
(doi:10.4018/ijossp.2012070102)
- [119]
- Angelos D. Keromytis and
Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 8,135,994, March 2012.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- [120]
- G. Khataniar and D. Goswami.
A hierarchical approach to improve performance of unstructured peer-to-peer
system.
International Journal of Communication Networks and Distributed
Systems, 9(1-2):37–61, 2012.
(doi:10.1504/IJCNDS.2012.047895)
- [121]
- I.A.
Klampanos and J.M. Jose.
Searching in peer-to-peer networks.
Computer Science Review, 6(4):161–183, 2012.
(doi:10.1016/j.cosrev.2012.07.001)
- [122]
- A. Kocurova, S. Oussena,
P. Komisarczuk, T. Clark, and
D. Kramer.
Towards distributed collaborative workflow management for mobile devices.
Lecture Notes in Business Information Processing, 116 LNBIP:1–20,
2012.
(doi:10.1007/978-3-642-34044-4_1)
- [123]
- K. Kolomvatsos, G. Valkanas,
and S. Hadjiefthymiades.
Debugging applications created by a domain specific language: The IPAC case.
Journal of Systems and Software, 85(4):932–943, 2012.
(doi:10.1016/j.jss.2011.11.1009)
- [124]
- T. Kos,
T. Kosar, and M. Mernik.
Development of data acquisition systems by using a domain-specific modeling
language.
Computers in Industry, 63(3):181–192, 2012.
(doi:10.1016/j.compind.2011.09.004)
- [125]
- T. Kosar,
M. Mernik, and J.C. Carver.
Program comprehension of domain-specific and general-purpose languages:
Comparison using a family of experiments.
Empirical Software Engineering, 17(3):276–304, 2012.
(doi:10.1007/s10664-011-9172-x)
- [126]
- S.Y.
Kose and O. Kilincci.
Hybrid simulated annealing/genetic algorithm approach to buffer allocation
problem in unreliable production lines.
In 10th International Fuzzy Logic and Intelligent Technologies inNuclear
Science Conference, FLINS 2012, volume 7, pages 981–986, 2012.
- [127]
- P. Kotzé, M. Tsogang, and
A. Van Der Merwe.
A framework for creating pattern languages for enterprise architecture.
Lecture Notes in Business Information Processing, 131 LNBIP:1–20,
2012.
(doi:10.1007/978-3-642-34163-2_1)
- [128]
- A. Kowalski and T. Marut.
Hybrid methods aiding organisational and technological production preparation
using simulation models of nonlinear production systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7209
LNAI(PART 2):259–266, 2012.
(doi:10.1007/978-3-642-28931-6_25)
- [129]
- C. Kozak
and M. Squire.
A secondary data archive for code-level debian metrics.
In Proceedings - 2011 2nd International Workshop on Replication in
Empirical Software Engineering Research, RESER 2011, pages 43–51,
2012.
(doi:10.1109/RESER.2011.9)
- [130]
- N. Kumar,
R. Iqbal, and N. Chilamkurti.
Capacity and load-aware service discovery with service selection in
peer-to-peer grids.
Future Generation Computer Systems, 28(7):1090–1099, 2012.
(doi:10.1016/j.future.2011.11.008)
- [131]
- S. Kurkovsky.
Peer-to-peer network applications.
Handbook of Computer Networks, 3:152–167, 2012.
(doi:10.1002/9781118256107.ch10)
- [132]
- Y.-K. Kwok.
Incentive issues in peer-to-peer systems.
Handbook of Computer Networks, 3:168–188, 2012.
(doi:10.1002/9781118256107.ch11)
- [133]
- Y. Lai and
Z. Liu.
Unknown malicious code detection comparison of statistical and encoding method.
Information, 15(11 A):4563–4571, 2012.
- [134]
- Ralf
Lammel, Anders Hejlsberg, Andrew E. Kimball,
David Lawrence Remy, and Erik Meijer.
Instance
annotation in object-oriented programming.
United States Patent 8,132,093, March 2012.
Assignee: Microsoft Corporation (Redmond, WA).
- [135]
- G. Lee,
J. Han, and S. Lee.
A TV remote pointing device using LED directivity.
In Proceedings of the 24th Australian Computer-Human Interaction
Conference, OzCHI 2012, pages 331–338, 2012.
(doi:10.1145/2414536.2414590)
- [136]
- M.B.
Lehmann, L.F. Müller, R.S. Antunes, and
M.P. Barcellos.
Disconnecting to connect: Understanding optimistic disconnection in
BitTorrent.
In 2012 IEEE 12th International Conference on Peer-to-Peer Computing, P2P
2012, pages 138–148, 2012.
(doi:10.1109/P2P.2012.6335793)
- [137]
- A.F.
Leite, H.C. Mendes, L. Weigang,
A.C.M.A. de Melo, and A. Boukerche.
An architecture for P2P bag-of-tasks execution with multiple task allocation
policies in desktop grids.
Cluster Computing, 15(4):351–361, 2012.
(doi:10.1007/s10586-011-0154-y)
- [138]
- J. Li and
T. Chusho.
A web application framework for end-user-initiative development with a visual
tool.
In Lecture Notes in Engineering and Computer Science, volume 1,
pages 816–822, 2012.
- [139]
- Z. Liaghat, A.H. Rasekh, and
A.R. Tabebordbar.
Enhance software quality using data mining algorithms.
In 2012 Spring World Congress on Engineering and Technology, SCET 2012 -
Proceedings, 2012.
(doi:10.1109/SCET.2012.6342020)
- [140]
- S.B. Lim
and K. and Yoon.
Ubiquitous air quality monitoring system with service oriented architecture
middleware.
Journal of Convergence Information Technology, 7(6):193–201,
2012.
(doi:10.4156/jcit.vol7.issue6.24)
- [141]
- H.-C. Lin,
Y.-F. Hsu, and B.-J. Hsieh.
A P2P-to-UPnP proxy gateway architecture for home multimedia content
distribution.
KSII Transactions on Internet and Information Systems,
6(1):405–424, 2012.
(doi:10.3837/tiis.2012.01.023)
- [142]
- H. Lin.
Operational considerations in cyber attack and cyber exploitation.
In Cyberspace and National Security: Threats, Opportunities, and Power in
a Virtual World, pages 37–56. Georgetown University Press, 2012.
- [143]
- K.J. Lin.
Building a video monitoring system with Linux using component-based approach.
In 6th IASTED International Conference on Software Engineering and
Applications, SEA 2002, pages 385–390. Acta Press, 2012.
- [144]
- J. Linggarjati and R. Hedwig.
Manually interchangeable heads of homemade computer numerical control (CNC)
machine.
Internetworking Indonesia Journal, 4(1):19–22, 2012.
- [145]
- V. Ljubovic and N. Nosovic.
Repository analysis tools in teaching software engineering.
In 2012 9th International Symposium on Telecommunications, BIHTEL 2012 -
Proceedings, 2012.
- [146]
- V. Ljubovic and N. Nosovic.
Software metrics in student projects.
In 2012 20th Telecommunications Forum, TELFOR 2012 - Proceedings,
pages 1464–1467, 2012.
- [147]
- A. Logvinenko and D. Tutsch.
RecSim — a simulator for reconfigurable network on chip topologies.
In 26th European Simulation and Modelling Conference, ESM 2012,
pages 144–151. EUROSIS, 2012.
- [148]
- M. Lumpe,
R. Vasa, T. Menzies, R. Rush,
and B. Turhan.
Learning better inspection optimization policies.
International Journal of Software Engineering and Knowledge
Engineering, 22(5):621–644, 2012.
(doi:10.1142/S0218194012500179)
- [149]
- E. Maani,
Z. Chen, and A.K. Katsaggelos.
A game theoretic approach to video streaming over peer-to-peer networks.
Signal Processing: Image Communication, 27(5):545–554, 2012.
(doi:10.1016/j.image.2012.02.015)
- [150]
- G. Magklaras and S.M.
Furnell.
The insider threat prediction and specification language.
In 9th International Network Conference, INC 2012, pages 51–61.
Plymouth University, 2012.
- [151]
- S. Maitrehenry, S. Metge,
Y. Aït-Ameur, and P. Bieber.
An MDE-based synthesis of aircraft safety models.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7602
LNCS:43–54, 2012.
(doi:10.1007/978-3-642-33609-6_6)
- [152]
- T. Makino and K. Aihara.
Software development and testing for machine learning studies: With an example
of probabilistic inference with Monte Carlo based methods.
Transactions of the Japanese Society for Artificial Intelligence,
27(4):253–262, 2012.
(doi:10.1527/tjsai.27.253)
- [153]
- R. Malhotra and A. Jain.
Fault prediction using statistical and machine learning methods for improving
software quality.
Journal of Information Processing Systems, 8(2):241–262, 2012.
(doi:10.3745/JIPS.2012.8.2.241)
- [154]
- S. Mandal, S. Chakraborty,
and S. Karmakar.
Deterministic 1-2 skip list in distributed system.
In Proceedings of 2012 2nd IEEE International Conference on Parallel,
Distributed and Grid Computing, PDGC 2012, pages 296–301, 2012.
- [155]
- A. Mardani.
An investigation of the web citations in Iran's chemistry articles in SCI.
Library Review, 61(1):18–29, 2012.
(doi:10.1108/00242531211207398)
- [156]
- Z. Marian.
Aggregated metrics guided software restructuring.
In Proceedings - 2012 IEEE 8th International Conference on Intelligent
Computer Communication and Processing, ICCP 2012, pages 259–266,
2012.
(doi:10.1109/ICCP.2012.6356197)
- [157]
- T. Matsushita, S. Yamanaka,
and F. Zhao.
A peer-to-peer content-distribution scheme resilient to key leakage.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7115
LNCS:121–135, 2012.
(doi:10.1007/978-3-642-27890-7_10)
- [158]
- A. Matta,
M. Pezzoni, and Q. Semeraro.
A Kriging-based algorithm to optimize production systems approximated by
analytical models.
Journal of Intelligent Manufacturing, 23(3):587–597, 2012.
(doi:10.1007/s10845-010-0397-0)
- [159]
- P.J.
McKenzie, J. Burkell, L. Wong,
C. Whippey, S.E. Trosow, and
M. McNally.
User-generated online content 1: Overview, current state and context.
First Monday, 17(6), 2012.
- [160]
- J.A.
Meira, E.C.D. Almeida, , and
G. Sunye.
Peer-to-peer load testing.
In Proceedings - IEEE 5th International Conference on Software Testing,
Verification and Validation, ICST 2012, pages 642–647, 2012.
(doi:10.1109/ICST.2012.153)
- [161]
- L. Meneses, R. Furuta, and
F. Shipman.
Identifying "soft 404" error pages: Analyzing the lexical signatures of
documents in distributed collections.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7489
LNCS:197–208, 2012.
(doi:10.1007/978-3-642-33290-6_22)
- [162]
- B. Molina, C.E. Palau, and
M. Esteve.
CDN modeling and performance.
In Next Generation Content Delivery Infrastructures: Emerging Paradigms
and Technologies, pages 1–28. IGI Global, 2012.
(doi:10.4018/978-1-4666-1794-0.ch001)
- [163]
- J.M. Monteiro, R.S. Cruz,
C.Z. Patrikakis, N.C. Papaoulakis,
C.T. Calafate, and M.S. Nunes.
Peer-to-peer video streaming.
In Multimedia Networking and Coding, pages 254–313. IGI Global,
2012.
(doi:10.4018/978-1-4666-2660-7.ch010)
- [164]
- R. Moreno-Sanchez.
Free and open source software for geospatial applications (FOSS4G): A mature
alternative in the geospatial technologies arena.
Transactions in GIS, 16(2):81–88, 2012.
(doi:10.1111/j.1467-9671.2012.01314.x)
- [165]
- H.S.
Mounine and H.K. Walid.
D3-P2P: Managing distributed and replicated database in P2P environment
by using quorum system.
Journal of Digital Information Management, 10(6):351–364,
2012.
- [166]
- H.S.
Mounine and H.K. Walid.
A deadlock managing process for distributed and replicated database in P2P
system.
In 2nd International Conference on Innovative Computing Technology,
INTECH 2012, pages 6–9, 2012.
- [167]
- B. Movahedi, K.M. Lavassani,
and V. Kumar.
E-marketplace emergence: Evolution, developments and classification.
Journal of Electronic Commerce in Organizations, 10(1):14–32,
2012.
(doi:10.4018/jeco.2012010102)
- [168]
- T. Moyer,
T. Jaeger, and P. McDaniel.
Scalable integrity-guaranteed AJAX.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7235
LNCS:1–19, 2012.
(doi:10.1007/978-3-642-29253-8_1)
- [169]
- A. Murgia, R. Tonelli,
G. Concas, M. Marchesi, and
S. Counsell.
Parameter-based refactoring and the relationship with fan-in/fan-out coupling.
Journal of Object Technology, 11(2), 2012.
(doi:10.5381/jot.2012.11.2.a7)
- [170]
- A. Murgia, R. Tonelli,
M. Marchesi, G. Concas,
S. Counsell, J. McFall, and
S. Swift.
Refactoring and its relationship with fan-in and fan-out: An empirical study.
In Proceedings of the European Conference on Software Maintenance and
Reengineering, CSMR, pages 63–72, 2012.
(doi:10.1109/CSMR.2012.17)
- [171]
- E. Murphy-Hill, C. Parnin,
and A.P. Black.
How we refactor, and how we know it.
IEEE Transactions on Software Engineering, 38(1):5–18, 2012.
(doi:10.1109/TSE.2011.41)
- [172]
- S. Nalliah and K.Y. Loh.
Concepts in the management of the overactive bladder in women.
Medical Journal of Malaysia, 67(1):137–142, 2012.
- [173]
- Raman Narayanan, Ming Liu,
and Paresh S Suthar.
Enabling
access to rich data by intercepting paste operations.
United States Patent 8,296,671, October 2012.
Assignee: Microsoft Corporation (Redmond, WA).
- [174]
- A. Nieminen.
Real-time collaborative resolving of merge conflicts.
In CollaborateCom 2012 - Proceedings of the 8th International Conference
on Collaborative Computing: Networking, Applications and Worksharing,
pages 540–543, 2012.
- [175]
- C. Okoli and K. Carillo.
The best of adaptive and predictive methodologies: Open source software
development, a balance between agility and discipline.
International Journal of Information Technology and Management,
11(1-2):153–166, 2012.
(doi:10.1504/IJITM.2012.044071)
- [176]
- J.L. Ordiales Coscia,
M. Crasso, C. Mateos, and
A. Zunino.
An approach to improve code-first web services discoverability at development
time.
In Proceedings of the ACM Symposium on Applied Computing, pages
638–643, 2012.
(doi:10.1145/2245276.2245400)
- [177]
- J. Ossher,
H. Sajnani, and C. Lopes.
Astra: Bottom-up construction of structured artifact repositories.
In Proceedings - Working Conference on Reverse Engineering, WCRE,
pages 41–50, 2012.
(doi:10.1109/WCRE.2012.14)
- [178]
- J. Pan and
C.C. Fung.
An agent-based model to simulate coordinated response to malware outbreak
within an organisation.
International Journal of Information and Computer Security,
5(2):115–131, 2012.
(doi:10.1504/IJICS.2012.051777)
- [179]
- P.M.
Papadopoulos, I.G. Stamelos, and A. Meiszner.
Students' perspectives on learning software engineering with open source
projects: Lessons learnt after three years of program operation.
In CSEDU 2012 - Proceedings of the 4th International Conference on
Computer Supported Education, volume 2, pages 313–322, 2012.
- [180]
- E. Papapetrou,
P. Vassiliadis, E. Rova, and
A. Zarras.
Cross-layer routing for peer database querying over mobile ad hoc networks.
Computer Networks, 56(2):504–520, 2012.
(doi:10.1016/j.comnet.2011.10.004)
- [181]
- A. Passarella.
A survey on content-centric technologies for the current internet: CDN and
P2P solutions.
Computer Communications, 35(1):1–32, 2012.
(doi:10.1016/j.comcom.2011.10.005)
- [182]
- P. Patel
and J. Bhatia.
Review on variants of reliable and security aware peer to peer content
distribution using network coding.
In 3rd Nirma University International Conference on Engineering, NUiCONE
2012, 2012.
- [183]
- G. Pau and
R. Tse.
Challenges and opportunities in immersive vehicular sensing: Lessons from urban
deployments.
Signal Processing: Image Communication, 27(8):900–908, 2012.
(doi:10.1016/j.image.2012.01.015)
- [184]
- X. Peng,
M. Li, and Z. Huang.
A data collection framework with extensible protocol based on XML.
2nd World Congress on Computer Science and Information Engineering, CSIE
2011, 124 LNEE(VOL. 1):481–489, 2012.
(doi:10.1007/978-3-642-25781-0_72)
- [185]
- E. Perakakis, A. Levinenko,
and G. Ghinea.
HTML5 and companion web technologies as a universal platform for interactive
internet TV advertising.
In 2012 International Conference on Telecommunications and Multimedia,
TEMU 2012, pages 214–219, 2012.
(doi:10.1109/TEMU.2012.6294721)
- [186]
- G.J. Pérez-Irizarry,
F. De La Cruz-Sanchez, B.A. Landrón-Rivera,
N.G. Santiago, and M. Velez-Reyes.
Developing a portable GPU library for hyperspectral image processing.
In 18th Annual Conference on Algorithms and Technologies for
Multispectral, Hyperspectral, and Ultraspectral Imagery, volume 8390.
SPIE, 2012.
(doi:10.1117/12.920499)
- [187]
- C.E.S.
Pires, R.M.L. Santiago, A.C. Salgado,
Z. Kedad, and M. Bouzeghoub.
Ontology-based clustering in a peer data management system.
International Journal of Distributed Systems and Technologies,
3(2):1–21, 2012.
(doi:10.4018/jdst.2012040101)
- [188]
- J. Porubän,
J. Kollár, and M. Sabo.
Abstraction of computer language patterns: The inference of textual notation
for a DSL.
In Formal and Practical Aspects of Domain-Specific Languages: Recent
Developments, pages 365–385. IGI Global, 2012.
(doi:10.4018/978-1-4666-2092-6.ch013)
- [189]
- C. Preschern, N. Kajtazovic,
and C. Kreiner.
Applying patterns to model-driven development of automation systems: An
industrial case study.
In 17th European Conference on Pattern Languages of Programs, EuroPLoP
2012. Association for Computing Machinery, 2012.
(doi:10.1145/2602928.2603081)
- [190]
- N.N.
Qadri and M. Fleury.
P2P streaming over MANET and VANET.
Streaming Media with Peer-to-Peer Networks: Wireless Perspectives,
pages 119–161, 2012.
(doi:10.4018/978-1-4666-1613-4.ch007)
- [191]
- N.N.
Qadri, M. Fleury, B.R. Rofoee,
M. Altaf, and M. Ghanbari.
Robust P2P multimedia exchange within a vanet.
Wireless Personal Communications, 63(3):561–577, 2012.
(doi:10.1007/s11277-010-0150-1)
- [192]
- I. Raikov and E. de Schutter.
The layer-oriented approach to declarative languages for biological modeling.
PLoS Computational Biology, 8(5), 2012.
(doi:10.1371/journal.pcbi.1002521)
- [193]
- C.K. Raju,
A. Mishra, and P.B.S. Bhadoria.
Synthesis of sustainability and secureness of software in public applications
using deductive-nomological model.
In ACM International Conference Proceeding Series, pages 579–588,
2012.
(doi:10.1145/2345396.2345491)
- [194]
- N. Ramasubbu, C.F. Kemerer,
and J. Hong.
Structural complexity and programmer team strategy: An experimental test.
IEEE Transactions on Software Engineering, 38(5):1–15, 2012.
(doi:10.1109/TSE.2011.88)
- [195]
- A. Raza,
L.F. Capretz, and F. Ahmed.
Users' perception of open source usability: An empirical study.
Engineering with Computers, 28(2):109–121, 2012.
(doi:10.1007/s00366-011-0222-1)
- [196]
- E. Reategui, L.M.A. dos
Santos, and L. Tarouco.
Pedagogical agents and the efficiency of instructional conditions in
educational applications.
In Educational Stages and Interactive Learning: From Kindergarten to
Workplace Training, pages 121–133. IGI Global, 2012.
(doi:10.4018/978-1-4666-0137-6.ch008)
- [197]
- J. Reutelshoefer,
J. Baumeister, and F. Puppe.
A meta-engineering approach for customized document-centered knowledge
acquisition.
In Lecture Notes in Informatics (LNI), Proceedings - Series of the
Gesellschaft fur Informatik (GI), volume P-201, pages 187–202,
2012.
- [198]
- Anthony
Rose.
Filter
for a distributed network.
United States Patent 8,185,576, May 2012.
Assignee: Altnet, Inc. (Sherman Oaks, CA).
- [199]
- M.K.
Saberi and H. Abedi.
Accessibility and decay of web citations in five open access ISI journals.
Internet Research, 22(2):234–247, 2012.
(doi:10.1108/10662241211214584)
- [200]
- A. Sadat-Moosavi,
A. Isfandyari-Moghaddam, and O. Tajeddini.
Accessibility of online resources cited in scholarly LIS journals: A study of
Emerald ISI-ranked journals.
Aslib Proceedings: New Information Perspectives, 64(2):178–192,
2012.
(doi:10.1108/00012531211215196)
- [201]
- M. Salamó, K. McCarthy,
and B. Smyth.
Generating recommendations for consensus negotiation in group personalization
services.
Personal and Ubiquitous Computing, 16(5):597–610, 2012.
(doi:10.1007/s00779-011-0413-1)
- [202]
- B.T. Sampath Kumar and K.S.
Manoj Kumar.
Decay and half-life period of online citations cited in open access journals.
International Information and Library Review, 44(4):202–211,
2012.
(doi:10.1016/j.iilr.2012.09.002)
- [203]
- B.T. Sampath Kumar and K.S.
Manoj Kumar.
Persistence and half-life of URL citations cited in LIS open access
journals.
Aslib Proceedings: New Information Perspectives, 64(4):405–422,
2012.
(doi:10.1108/00012531211244752)
- [204]
- B.T. Sampath Kumar and K.R.
Prithvi Raj.
Availability and persistence of web citations in Indian LIS literature.
Electronic Library, 30(1):19–32, 2012.
(doi:10.1108/02640471211204042)
- [205]
- A. Santos-Olmo, L.E.
Sánchez, E. Fernández-Medina, and
M. Piattini.
A systematic review of methodologies and models for the analysis and management
of associative and hierarchical risk in SMEs.
In Proceedings of the 9th International Workshop on Security in
Information Systems, WOSIS 2012, in Conjunction with ICEIS 2012, pages
117–124, 2012.
- [206]
- M. Schmidberger and
M. Schmidberger.
Software engineering as a service for HPC.
In Proceedings - 2012 11th International Symposium on Parallel and
Distributed Computing, ISPDC 2012, pages 34–39, 2012.
(doi:10.1109/ISPDC.2012.13)
- [207]
- Christoph Schnelle and
Geoffrey John Nolan.
Mapping
of data from XML to SQL.
United States Patent 8,204,913, June 2012.
Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).
- [208]
- T.A. Sedbrook.
Modeling the REA enterprise ontology with a domain specific language.
Journal of Emerging Technologies in Accounting, 9(1):47–70,
2012.
- [209]
- S. Shaaban and S. Hudson.
Transient behaviour of unbalanced lines.
Flexible Services and Manufacturing Journal, 24(4):575–602, 2012.
(doi:10.1007/s10696-011-9110-7)
- [210]
- Behzad Shahraray, Andrea
Basso, Lee Begeja, David C. Gibbon,
Zhu Liu, and Bernard S. Renger.
System
and method for adaptive media playback based on destination.
United States Patent 8,239,410, August 2012.
Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
- [211]
- W. Shang,
B. Adams, and A.E. Hassan.
Using Pig as a data preparation language for large-scale mining software
repositories studies: An experience report.
Journal of Systems and Software, 85(10):2195–2204, 2012.
(doi:10.1016/j.jss.2011.07.034)
- [212]
- V. Shanmughaneethi, R.Y.
Praveen, and S. Swamynathan.
CIVD: Detection of command injection vulnerabilities in web services through
aspect-oriented programming.
International Journal of Computer Applications in Technology,
44(4):312–320, 2012.
(doi:10.1504/IJCAT.2012.050119)
- [213]
- F. Shu,
Y. Yang, , and Q. Wang.
An investigation on the feasibility of cross-project defect prediction.
Automated Software Engineering, 19(2):167–199, 2012.
(doi:10.1007/s10515-011-0090-3)
- [214]
- C. Song and
L. Han.
Application of the work study to balancing hydraulic component assembly lines.
Advanced Materials Research, 452-453:206–210, 2012.
(doi:10.4028/www.scientific.net/AMR.452-453.206)
- [215]
- E. Spishak, W. Dietl, and
M.D. Ernst.
A type system for regular expressions.
In Proceedings for FTfJP 2012: The 14th Workshop on Formal Techniques for
Java-Like Programs - Co-located with ECOOP 2012 and PLDI 2012, Papers
Presented at the Workshop, pages 20–26, 2012.
(doi:10.1145/2318202.2318207)
- [216]
- S. Srivastava, V. Gupta,
R. Yadav, and K. Kant.
Controlling free riding using extended point based incentive mechanism in
peer-to-peer networks.
In Proceedings of the 2012 3rd International Conference on Computer and
Communication Technology, ICCCT 2012, pages 200–205, 2012.
(doi:10.1109/ICCCT.2012.48)
- [217]
- J. Staiano, M. Menéndez,
A. Battocchi, A. De Angeli, and
N. Sebe.
UX-mate: From facial expressions to UX evaluation.
In Proceedings of the Designing Interactive Systems Conference, DIS
'12, pages 741–750, 2012.
(doi:10.1145/2317956.2318068)
- [218]
- Sufatrio
and R.H.C. Yap.
Quantifying the effects of more timely certificate revocation on lightweight
mobile devices.
In Proceedings - 2011 3rd International Workshop on Security Measurements
and Metrics, Metrisec 2011, pages 31–40, 2012.
(doi:10.1109/Metrisec.2011.17)
- [219]
- Z. Sun,
A. Purohit, S. Pan, F. Mokaya,
R. Bose, and P. Zhang.
Polaris: Getting accurate indoor orientations for mobile devices using
ubiquitous visual patterns on ceilings.
In HotMobile 2012 - 13th Workshop on Mobile Computing Systems and
Applications, 2012.
(doi:10.1145/2162081.2162101)
- [220]
- V.M.
Suresh, D. Karthikeswaran, V.M. Sudha, and
D. Murali Chandraseker.
Web server load balancing using SSL back-end forwarding method.
In IEEE-International Conference on Advances in Engineering, Science and
Management, ICAESM-2012, pages 822–827, 2012.
- [221]
- G. Tang,
, D.-F. Chang, C.-T. Wang, and
X.-L. Bai.
Distributed computing for mechanical virtual human.
Advanced Materials Research, 341-342:695–699, 2012.
(doi:10.4028/www.scientific.net/AMR.341-342.695)
- [222]
- G. Tang,
D.-F. Chang, , C.-T. Wang, and
D.-M. Wang.
Networking architecture for Chinese mechanical virtual human.
Advanced Materials Research, 433-440:5828–5831, 2012.
(doi:10.4028/www.scientific.net/AMR.433-440.5828)
- [223]
- R. Tartler, J. Sincero,
C. Dietrich, W. Schröder-Preikschat, and
D. Lohmann.
Revealing and repairing configuration inconsistencies in large-scale system
software.
International Journal on Software Tools for Technology Transfer,
14(5):531–551, 2012.
(doi:10.1007/s10009-012-0225-2)
- [224]
- Yannick Teglia and Pierre-Yvan
Liardet.
Statistical
control of the integrity of a program.
United States Patent 8,239,833, August 2012.
Assignee: STMicroelectronics S.A. (Montrouge, FR).
- [225]
- K. Thornton and D.W.
Mcdonald.
Tagging wikipedia: Collaboratively creating a category system.
In GROUP'12 - Proceedings of the ACM 2012 International Conference on
Support Group Work, pages 219–227, 2012.
(doi:10.1145/2389176.2389210)
- [226]
- D.S.
Touceda, J.M. Sierra, A. Izquierdo, and
H. Schulzrinne.
Survey of attacks and defenses on P2PSIP communications.
IEEE Communications Surveys and Tutorials, 14(3):750–783, 2012.
(doi:10.1109/SURV.2011.060711.00152)
- [227]
- A.V.
Uzunov, E.B. Fernandez, and K. Falkner.
Engineering security into distributed systems: A survey of methodologies.
Journal of Universal Computer Science, 18(20):2920–3006,
2012.
- [228]
- M. Vdalis, S. Koukoumialos,
D. Ntio, and G. Varlas.
Performance evaluation of a merge supply system with a distribution centre, two
reliable suppliers, one buffer and Erlang lead times.
International Journal of Business Science and Applied Management,
7(3):42–55, 2012.
- [229]
- L. Vidács, R. Dévai,
R. Ferenc, and T. Gyimóthy.
Developer support for understanding preprocessor macro expansions.
Communications in Computer and Information Science, 340
CCIS:121–130, 2012.
(doi:10.1007/978-3-642-35267-6_16)
- [230]
- A.S. Vijendran and
S. Thavamani.
Survey of caching and replica placement algorithm for content distribution in
peer to peer overlay networks.
In ACM International Conference Proceeding Series, pages 248–252,
2012.
(doi:10.1145/2393216.2393259)
- [231]
- R.J.
Walker, S. Rawal, and J. Sillito.
Do crosscutting concerns cause modularity problems?
In Proceedings of the ACM SIGSOFT 20th International Symposium on the
Foundations of Software Engineering, FSE 2012, 2012.
(doi:10.1145/2393596.2393654)
- [232]
- W. Wang and
L. Hong.
Research on Chord algorithm based on polycyclic structure.
In 2012 IEEE 5th International Conference on Advanced Computational
Intelligence, ICACI 2012, pages 90–93, 2012.
- [233]
- H. Wang,
G. Tan, and L. Liu.
Authentication protocol security assessment framework based on attack
classification.
Applied Mechanics and Materials, 143-144:859–863, 2012.
(doi:10.4028/www.scientific.net/AMM.143-144.859)
- [234]
- Z. Wang,
Z. Guan, W. Li, K. Wu,
J. Guo, and G. Tian.
A tableau-based reasoning algorithm for distributed dynamic description logics.
Communications in Computer and Information Science, 307 CCIS(PART
1):192–199, 2012.
(doi:10.1007/978-3-642-34038-3_27)
- [235]
- M. Waterman, J. Noble, and
G. Allan.
How much architecture? reducing the up-front effort.
In Proceedings - Agile India 2012, AgileIndia 2012, pages 56–59,
2012.
(doi:10.1109/AgileIndia.2012.11)
- [236]
- M. Wisely and J.L. Leopold.
Semi-automated generation of domain-specific, natural language-based, visual
programming languages.
In 18th International Conference on Distributed Multimedia Systems, DMS
2012, pages 177–180. Knowledge Systems Institute Graduate School,
2012.
- [237]
- J. Wu
and M. Savoie.
Peer-to-peer network architecture.
Handbook of Computer Networks, 3:131–151, 2012.
(doi:10.1002/9781118256107.ch9)
- [238]
- F. Wu.
Discussion on experimental teaching of data warehouse and data mining course
for undergraduate education.
In ICCSE 2012 - Proceedings of 2012 7th International Conference on
Computer Science and Education, pages 1425–1429, 2012.
(doi:10.1109/ICCSE.2012.6295331)
- [239]
- Shlomo Wygodny, Valery
Golender, Ido Ben-Moshe, and Vladimir Andreev.
System
and method for conditional tracing of computer programs.
United States Patent 8,312,435, November 2012.
Assignee: Identify Software Ltd. (IL) (Petach Tikva, IL).
- [240]
- H. Yamamoto and K. Yamazaki.
LISP-based information multicasting system using location-aware P2P network
technologies.
In 2012 IEEE Consumer Communications and Networking Conference,
CCNC'2012, pages 640–644, 2012.
(doi:10.1109/CCNC.2012.6181144)
- [241]
- S. Yang,
R. Han, J. Ding, and Y. Song.
The distribution of web citations.
Information Processing and Management, 48(4):779–790, 2012.
(doi:10.1016/j.ipm.2011.10.002)
- [242]
- Y. Younan,
W. Joosen, and F. Piessens.
Runtime countermeasures for code injection attacks against C and C++
programs.
ACM Computing Surveys, 44(3), 2012.
(doi:10.1145/2187671.2187679)
- [243]
- X. Zhang and H. Hassanein.
A survey of peer-to-peer live video streaming schemes — an algorithmic
perspective.
Computer Networks, 56(15):3548–3579, 2012.
(doi:10.1016/j.comnet.2012.06.013)
- [244]
- N. Zhang,
J. Lin, J. Jing, and N. Gao.
RIKE: Using revocable identities to support key escrow in PKIs.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7341
LNCS:48–65, 2012.
(doi:10.1007/978-3-642-31284-7_4)
- [245]
- Y. Zheng,
F. Liu, X. Luo, and C. Yang.
A method based on feature matching to identify steganography software.
In Proceedings - 2012 4th International Conference on Multimedia and
Security, MINES 2012, pages 989–994, 2012.
(doi:10.1109/MINES.2012.26)
- [246]
- F.-C.
Zhou, , and Z.-L. Zhu.
Distributed authenticated skip list for secure P2P storage.
Dongbei Daxue Xuebao/Journal of Northeastern University,
33(1):73–76, 2012.
- [247]
- J. Zhou,
J. Li, Q. Chi, Y. Zhang, and
H. Hua.
Personalized intelligent guidance system for large-scale crowd's activities.
In 2012 9th International Conference on Service Systems and Service
Management - Proceedings of ICSSSM'12, pages 583–587, 2012.
(doi:10.1109/ICSSSM.2012.6252305)
- [248]
- J. Zhou,
D. Zhao, , and J. Liu.
Do we need another textual language for feature modeling? a preliminary
evaluation on the XML based approach.
Studies in Computational Intelligence, 430:97–111, 2012.
(doi:10.1007/978-3-642-30460-6_7)
- [249]
- H. Zhuge.
The knowledge grid: Toward cyber-physical society, second
edition.
World Scientific Publishing Co., 2012.
(doi:10.1142/7567)
- [250]
- E.M.-B.O. Zierau.
A holistic approach to bit preservation.
Library Hi Tech, 30(3):472–489, 2012.
(doi:10.1108/07378831211266618)