default search action
17th SAC 2002: Madrid, Spain
- Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain. ACM 2002, ISBN 1-58113-445-2
A.I. and computational logic
- Stefano Bistarelli, Thom W. Frühwirth, Michael Marte:
Soft constraint propagation and solving in CHRs. 1-5 - Grigoris Antoniou, M. Arief:
Executable declarative business rules and their use in electronic commerce. 6-10 - Manuel Alfonseca, Juan de Lara:
Simulating evolutionary agent communities with OOCSMP. 11-15 - Han-joon Kim, Sang-goo Lee:
An effective document clustering method using user-adaptable distance metrics. 16-20
Agents, interactions, mobility and systems
- Henry Hexmoor, Justin Tyrel Vaughn:
Computational adjustable autonomy for NASA Personal Satellite Assistants. 21-26 - Chang-Hyun Jo, Allen J. Arnold:
The Agent-based Programming Language: APL. 27-31 - Lorenzo Bettini, Rocco De Nicola, Michele Loreti:
Software update via mobile agent based programming. 32-36 - Jorge J. Gómez-Sanz, Juan Pavón, Francisco J. Garijo:
Meta-models for building multi-agent systems. 37-41 - Bengt Carlsson, K. Ingemar Jönsson:
Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions. 42-48 - Susan Weissman Lauzac, Panos K. Chrysanthis:
Personalizing information gathering for mobile database clients. 49-56 - Iadine Chades, Bruno Scherrer, François Charpillet:
A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem. 57-62 - Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Colin R. Reeves, Peter Smith:
An automated negotiation mechanism based on co-evolution and game theory. 63-67 - Hoang Pham Huy, Simone Sédillot:
Agent-based mobility add-in feature for Object Transaction Service (OTS). 68-75 - Hock Kim Tan, Luc Moreau:
Certificates for mobile code security. 76-81 - Lucas C. Ferreira, Ricardo Dahab:
Blinded-key signatures: securing private keys embedded in mobile agents. 82-86 - Abhishek Singh, Santosh Pande:
Compiler optimizations for Java aglets in distributed data intensive applications. 87-92 - Luc Moreau:
A fault-tolerant directory service for mobile agents based on forwarding pointers. 93-100 - Frances M. T. Brazier, Benno J. Overeinder, Maarten van Steen, Niek J. E. Wijngaards:
Agent factory: generative migration of mobile agents in heterogeneous environments. 101-106 - Laurent Magnin, Viet Thang Pham, Arnaud Dury, Nicolas Besson, Arnaud Thiefaine:
Our guest agents are welcome to your agent platforms. 107-114 - Walter Binder, Volker Roth:
Secure mobile agent systems using Java: where are we heading?. 115-119
Applications of spatial simulation of discrete entities
- William Maniatty, Boleslaw K. Szymanski:
Editorial message: special track on applications of spatial simulation of discrete entities. 120-121 - Christopher L. Barrett, Madhav V. Marathe, James P. Smith, S. S. Ravi:
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks. 122-126 - Jacki P. Goldman, William J. Gullick, Dennis Bray, Colin G. Johnson:
Individual-based simulation of the clustering behaviour of epidermal growth factor receptors. 127-131 - György Korniss, Mark A. Novotny, A. K. Kolakowska, Hasan Guclu:
Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations. 132-137 - Stephen G. Eubank:
Scalable, efficient epidemiological simulation. 139-145
Bioinformatics
- Warren T. Jones, Hasan M. Jamil:
Bioinformatics track. 146 - Guoying Liu, Ann E. Loraine, Ron Shigeta, Melissa S. Cline, Jill Cheng, Stephen A. Chervitz, David Kulp, Michael A. Siani-Rose:
NetAffx: affymetrix probeset annotations. 147-150 - Rhonda Harrison, Charles DeLisi:
A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c.. 151-158 - Mathew J. Palakal, Snehasis Mukhopadhyay, Javed Mostafa:
An intelligent biological information management system. 159-163 - David Sankoff:
Short inversions and conserved gene clusters. 164-167 - Deendayal Dinakarpandian, Vijay Kumar:
BlOMIND-protein property prediction by property proximity profiles. 168-172 - Gianluca Della Vedova, Todd Wareham:
Optimal algorithms for local vertex quartet cleaning. 173-177
Computational science
- Duy Huynh:
Slide Edge Algorithm. 178-183 - H. Martin Bücker, Arno Rasch:
Efficient derivative computations in neutron scattering via interface contraction. 184-188 - J. Pleite, Emilio Olías, Andrés Barrado, Antonio Lázaro, J. Váquez:
A procedure to model the frequency response. 189-193
Computer security
- Giampaolo Bella, Ronaldo Menezes, James A. Whittaker:
Editorial Message: special track on computer security. 194-195 - Shouhuai Xu, Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack. 196-200 - Christopher Krügel, Thomas Toth, Engin Kirda:
Service specific anomaly detection for network intrusion detection. 201-208 - Alexandr Seleznyov, Oleksiy Mazhelis:
Learning temporal patterns for anomaly intrusion detection. 209-213 - Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel:
Implementation of fast RSA key generation on smart cards. 214-220 - Abhishek Singh, André L. M. dos Santos:
Grammar based off line generation of disposable credit card numbers. 221-228 - Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco:
Checking security of Java bytecode by abstract interpretation. 229-236 - Larry A. Dunning, Sub Ramakrishnan:
Security status display and browser interframe communication. 237-241 - James A. Whittaker, Andres De Vivanco:
Neutralizing windows-based malicious mobile code. 242-246 - Giampaolo Bella:
Interactive simulation of security policies. 247-252 - Jan Steffan, Markus Schumacher:
Collaborative attack modeling. 253-259 - Herbert H. Thompson, James A. Whittaker, Florence E. Mottay:
Software security vulnerability testing in hostile environments. 260-264 - Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest:
Proxy-based security protocols in networked mobile devices. 265-272 - Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch:
A conceptual framework for testing biometric algorithms within operating systems' authentication. 273-280 - Michele Boreale, Maria Grazia Buscemi:
Experimenting with STA, a tool for automatic analysis of security protocols. 281-285
Coordination models, languages and applications
- Andrea Omicini, Sascha Ossowski:
Editorial message: special track on coordination models, languages and applications. 286-287 - Sherief Abdallah, Nevin M. Darwish, Osman Hegazy:
Monitoring and synchronization for teamwork in GPGP. 288-293 - Paul Davidsson, Fredrik Wernstedt:
A multi-agent system architecture for coordination of just-in-time production and distribution. 294-299 - Elth Ogston, Stamatis Vassiliadis:
Unstructured agent matchmaking: experiments in timing and fuzzy matching. 300-305 - Anthony Karageorgos, Simon G. Thompson, Nikolay Mehandjiev:
Semi-automatic design of agent organisations. 306-313 - Neal Sample, Dorothea Beringer, Gio Wiederhold:
A comprehensive model for arbitrary result extraction. 314-321 - Guangxin Yang:
A uniform meta-model for modeling integrated cooperation. 322-328 - Jinlei Jiang, Guangxin Yang, Yan Wu, Meilin Shi:
CovaTM: a transaction model for cooperative applications. 329-335 - Paolo Ciancarini, Robert Tolksdorf, Franco Zambonelli:
Coordination middleware for XML-centric applications. 336-343 - Philipp Obreiter, Guntram Gräf:
Towards scalability in tuple spaces. 344-350 - Jozef Hooman, Jaco van de Pol:
Formal verification of replication on a distributed data space architecture. 351-358 - Nadia Busi, Gianluigi Zavattaro:
On the serializability of transactions in shared dataspaces with temporary data. 359-366 - Federico Bergenti, Alessandro Ricci:
Three approaches to the coordination of multiagent systems. 367-372 - Lorenzo Bettini, Michele Loreti, Rosario Pugliese:
An infrastructure language for open nets. 373-377 - José Antonio Pérez, Rafael Corchuelo, David Ruiz, Miguel Toro:
An enablement detection algorithm for open multiparty interactions. 378-384 - Ludger Fiege, Gero Mühl, Felix C. Gärtner:
A modular approach to build structured event-based systems. 385-392 - F. H. Carvalho, Ricardo Massa Ferreira Lima, Rafael Dueire Lins:
Coordinating functional processes with Haskell#. 393-400
Database and digital library technologies
- Ramzi A. Haraty, Mohammad Zubair:
Database and digital library technologies: track chairs message. 401 - Kjetil Nørvåg:
Temporal query operators in XML databases. 402-406 - Albrecht Schmidt, Martin L. Kersten:
Bulkloading and maintaining XML documents. 407-412 - Qiang Ding, Qin Ding, William Perrizo:
Decision tree classification of spatial data streams using Peano Count Trees. 413-417 - Jon Olav Hauglid, Roger Midtstraum:
SESAM: searching supported by analysis of metadata. 418-425 - Qin Ding, Maleq Khan, Amalendu Roy, William Perrizo:
The P-tree algebra. 426-431 - Fernando Ferri, Elaheh Pourabbas, Maurizio Rafanelli:
The syntactic and semantic correctness of pictorial configurations to query geographic databases by PQL. 432-437 - Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Tae-Hoon Kim:
Shape-based retrieval of similar subsequences in time-series databases. 438-445 - Brajendra Panda, Kazi Asharful Haque:
Extended data dependency approach: a robust way of rebuilding database. 446-452 - Maria Cláudia Cavalcanti, Marta Mattoso, Maria Luiza Machado Campos, François Llirbat, Eric Simon:
Sharing scientific models in environmental applications. 453-457 - Ramzi A. Haraty, Mazen Hamdoun:
Iterative querying in web-based database applications. 458-462 - Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine:
Elicitation and conversion of hidden objects and restrictions in a database schema. 463-469 - Zaher Aghbari, Kunihiko Kaneko, Akifumi Makinouchi:
Topological mapping: a dimensionality reduction method for efficient video search. 470-475 - M. Mercedes Martínez, Jean-Claude Derniame, Pablo de la Fuente:
A method for the dynamic generation of virtual versions of evolving documents. 476-482 - Jeffrey T. Clark, Brian M. Slator, Aaron Bergstrom, Francis Larson, Richard Frovarp, James E. Landrum, William Perrizo, William Jockheck:
DANA (Digital Archive Network for Anthropology): a model for digital archiving. 483-487 - Cláudio de Souza Baptista:
A geolibrary for multimedia data sets: design and implementation issues. 488-492 - Kurt Maly, Mohammad Zubair, Srikanth Balusani, A. Mathur, S. Sudeep, W. Wolters:
DL-COTF: an XML based digital library for U. S. Navy's operational test and evaluation force. 493-497
Declarative data mining
- José Luis Álvarez Macías, Jacinto Mata Vázquez, José Cristóbal Riquelme Santos:
Mining interesting regions using an evolutionary algorithm. 498-502 - Jae-Woo Chang, Du-Seok Jin:
A new cell-based clustering method for large, high-dimensional data in data mining applications. 503-507 - Ingolf Geist:
A framework for data mining and KDD. 508-513 - Hui Wang, Ivo Düntsch, Günther Gediga, Andrzej Skowron:
Hyperrelations in version space. 514-518
Electronics books for technical learning
- Monica Landoni, Ignacio Aedo:
Editorial message: special track on electronic books for teaching and learning. 519 - François Bry, Michael Kraus:
Advanced modeling and browsing of technical documents. 520-524 - Ruth Cobos, Xavier Alamán:
From collective knowledge to e-books. 525-529 - Ruth Wilson:
The "look and feel" of an ebook: considerations in interface design. 530-534 - Won-Sung Sohn, Seung-Kyu Ko, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Hyuk Kim, Soon-Bum Lim:
Development of a standard format for eBooks. 535-540
Evolutionary computing and optimization
- Roger L. Wainwright, Günther R. Raidl:
Evolutionary computation and optimization track: SAC 2002. 541 - Sergiy Butenko, Panos M. Pardalos, Ivan Sergienko, Vladimir Shylo, Petro Stetsyuk:
Finding maximum independent sets in graphs arising from coding theory. 542-546 - Bryant A. Julstrom, Günther R. Raidl:
Initialization is robust in evolutionary algorithms that encode spanning trees as sets of edges. 547-552 - Brad Dolin, Forrest H. Bennett III, Eleanor Gilbert Rieffel:
Co-evolving an effective fitness sample: experiments in symbolic regression and distributed robot control. 553-559 - Haibing Li, Andrew Lim:
Local search with annealing-like restarts to solve the vehicle routing problem with time windows. 560-565 - George Nyauma Nyakoe, Makoto Ohki, Suichiro Tabuchi:
Acquisition of modulation pulses for a multi-robot system using genetic algorithm. 568-573 - Steve Hurley, Roger M. Whitaker:
An agent based approach to site selection for wireless networks. 574-577 - Nelishia Pillay:
Using genetic programming for the induction of novice procedural programming solution algorithms. 578-583 - Atila Neves, Osvaldo Brasão, Agostinho C. Rosa:
Learning the risk board game with classifier systems. 585-589 - Jacinto Mata Vázquez, José Luis Álvarez Macías, José Cristóbal Riquelme Santos:
An evolutionary algorithm to discover numeric association rules. 590-594 - David A. van Veldhuizen, Jesse B. Zydallis, Gary B. Lamont:
Issues in parallelizing multiobjective evolutionary algorithms for real world applications. 595-602 - Konstantinos E. Parsopoulos, Michael N. Vrahatis:
Particle swarm optimization method in multiobjective problems. 603-607 - Fulvio Corno, Matteo Sonza Reorda, Giovanni Squillero:
An evolutionary algorithm for reducing integrated-circuit test application time. 608-612
Information access and retrieval
- Fabio Crestani, Gabriella Pasi:
Editorial message: special track on information access and retrieval systems. 613-614 - José María Gómez Hidalgo:
Evaluating cost-sensitive Unsolicited Bulk Email categorization. 615-620 - Andreas Becks, Christian Seeling, Ralf Minkenberg:
Benefits of document maps for text access in knowledge management: a comparative study. 621-626 - David L. Chan, Robert W. P. Luk, W. K. Mak, Hong Va Leong, Edward Kei Shiu Ho, Qin Lu:
Multiple related document summary and navigation using concept hierarchies for mobile clients. 627-632 - Simon O. Sweeney, Fabio Crestani, Anastasios Tombros:
Mobile delivery of news using hierarchical query-biased summaries. 634-639 - Mohand Boughanem, Mohamed Tmar:
Incremental adaptive filtering: profile learning and threshold calibration. 640-644 - Hideo Joho, Claire Coverson, Mark Sanderson, Micheline Hancock-Beaulieu:
Hierarchical presentation of expansion terms. 645-649 - Peter J. Brown, Gareth J. F. Jones:
Exploiting contextual change in context-aware retrieval. 650-656 - Holger Billhardt, Daniel Borrajo, Victor Maojo:
Using genetic algorithms to find suboptimal retrieval expert combinations. 657-662 - Evangelos Kotsakis:
Structured information retrieval in XML documents. 663-667 - Seung-Kyu Ko, Yoon-Chul Choy:
A structured documents retrieval method supporting attribute-based structure information. 668-674 - Gloria Bordogna, Gabriella Pasi:
Flexible querying of WEB documents. 675-680 - Satoshi Watanabe, Takao Miura:
Reordering B-tree files. 681-686 - Mario A. Nascimento, Vishal Chitkara:
Color-based image retrieval using binary signatures. 687-692 - Daniela Stan, Ishwar K. Sethi:
Color patterns for pictorial content description. 693-698 - Patrick Ruch:
Information retrieval and spelling correction: an inquiry into lexical disambiguation. 699-703
Inter disciplinary approaches to the design of dependable computer systems
- John E. Dobson, Cliff B. Jones, Rob Procter, Mark Rouncefield, Robin Williams:
Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems. 704-705 - Massimo Felici, Juliana Küster Filipe:
Limits in modelling evolving computer-based systems. 706-710 - Mark-Alexander Sujan, Antonio Rizzo, Alberto Pasquini:
Contradictions and critical issues during system evolution. 711-715 - Corin A. Gurr, Gillian Hardstone:
Modelling organisational practice in user requirements. 716-720 - Neil Pollock, James Cornford:
Fitting standard software to non-standard organisations. 721-725 - Luciana D'Adderio:
Configuring software, reconfiguring memories: the influence of integrated systems on knowledge storage, retrieval and reuse. 726-731 - Denis Besnard, Anthony Thomas Lawrie:
Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse. 732-738 - Shamus P. Smith, Michael D. Harrison:
Augmenting descriptive scenario analysis for improvements in human reliability design. 739-743 - Salem Aljareh, B. Nick Rossiter:
A task-based security model to facilitate collaboration in trusted multi-agency networks. 744-749
Multimedia and visualization
- Chung-Ming Huang, Tz-Heng Hsu, Chi-Kuang Chang:
A proxy-based adaptive flow control scheme for media streaming. 750-754 - Sooyong Kang, Heon Young Yeom:
Smoothed fetching: bridging the data layout and transmission schemes in multimedia servers. 755-760 - Alfred Yu, Wael M. Badawy:
A mesh update requirement for hierarchical adaptive meshes in mesh-based motion tracking. 761-765 - Yongjian Fu, Jui-Che Teng, S. R. Subramanya:
Node splitting algorithms in tree-structured high-dimensional indexes for similarity search. 766-770 - Fernando Naharro-Berrocal, Cristóbal Pareja-Flores, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide:
Approaches to comprehension-preserving graphical reduction of program visualizations. 771-777 - Jess Y. S. Mak, Hong Va Leong, Alvin T. S. Chan:
Dynamic structuring of web information for access visualization. 778-784 - Andrzej Trembilski, Andreas Broßler:
Transparency for polygon based cloud rendering. 785-790 - José Martinez, Erwan Loisant:
Browsing image databases with Galois' lattices. 791-795 - Mingjun Zhang, Chaman L. Sabharwal:
An efficient implementation of parametric line and polygon clipping algorithm. 796-800
Neuro-fuzzy applications
- Stamatis Karnouskos, Athanasios V. Vasilakos:
Active electronic mail. 801-806 - Patrick Bosc, Laurence Duval, Olivier Pivert:
About possibilistic queries against possibilistic databases. 807-811 - Rafael Alcalá, Jorge Casillas, Oscar Cordón, Francisco Herrera, Igor Zwir:
Hybridizing Hierarchical and Weighted Linguistic Rules. 812-816
Parallel and distributed systems and networking
- Indhira Garcés, Daniel Franco:
Analysis of Distributed Routing Balancing behavior. 817-824 - Alireza Shahrabi, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Communication delay in wormhole-routed torus networks. 825-829 - Jehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua:
Probability vectors: a new fault-tolerant routing algorithm for k-ary n-cubes. 830-834 - Hamid Sarbazi-Azad, Mohamed Ould-Khaoua:
A simple mathematical model of adaptive routing in wormhole k-ary n-cubes. 835-839 - Ahmed Yassin Al-Dubai, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Towards a scalable broadcast in wormhole-switched mesh networks. 840-844 - Hiroshi Fujimoto, Tadashi Nakano, Kaname Harumoto, Shojiro Nishio:
Response order rearrangement on a caching proxy for reducing WWW latency. 845-851 - Wooi-Ghee Wang, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio:
AODV compatible routing with extensive use of cache information in ad-hoc networks. 852-859 - Jung-Sheng Fu, Gen-Huey Chen:
Cycle embedding in faulty hierarchical cubic networks. 860-864 - Chun-Hsi Huang:
Grid-enabled parallel divide-and-conquer: theory and practice. 865-869 - Eder N. Mathias, Celso Maciel da Costa, Fernando Luís Dotti, Felipe Martins Müller:
DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methods. 870-875 - Georgios I. Goumas, Maria Athanasaki, Nectarios Koziris:
Automatic code generation for executing tiled nested loops onto parallel architectures. 876-881 - Heinz Stockinger, Andrew Hanushevsky:
HTTP redirection for replica catalogue lookups in data grids. 882-889 - Brian F. Cooper, Neal Sample, Moshe Shadmon:
A parallel index for semistructured data. 890-896 - Franck Morvan, Abdelkader Hameurlain:
Dynamic memory allocation strategies for parallel query execution. 897-901 - Dirk Thißen:
Load balancing for the management of service performance in open service markets: a customer-oriented approach. 902-906 - Juan Touriño, Jacobo Barro, Ramon Doallo, Víctor M. Gulías:
Performance analysis of MPI-I/O primitives on a PC cluster. 907-912 - Sunghyun Jee, Kannappan Palaniappan:
Performance evaluation for a compressed-VLIW processor. 913-917 - B. Anthony Kadrovach, Gary B. Lamont:
A particle swarm model for swarm-based networked sensor systems. 918-924
Programming languages and object technologies
- Chang-Hyun Jo, Rajeev R. Raje:
Editorial message: special track on the programming languages and object technologies. 925-926 - Robert Tolksdorf, Kai Knubben:
Programming distributed systems with the delegation-based object-oriented language dSelf. 927-931 - Beum-Seuk Lee, Barrett R. Bryant:
Automated conversion from requirements documentation to an object-oriented formal specification language. 932-936 - Ian Nunn, Dwight Deugo:
Automated assembly of software components based on XML-coded instructions. 937-942 - Enis Avdicausevic, Marjan Mernik, Mitja Lenic, Viljem Zumer:
Experimental aspect-oriented language - AspectCOOL. 943-947 - Claudia Leopold:
On optimal temporal locality of stencil codes. SAC 2002: 948-952 - Kameswari V. Garigipati, Cindy Norris:
Evaluating the use of profiling by a region-based register allocator. 953-957 - João Coelho Garcia, Paulo Ferreira:
Concurrency control for distributed cooperative engineering applications. 958-963 - Nael B. Abu-Ghazaleh, Dhananjay S. Phatak:
Verification caching: towards efficient and secure mobile code execution environments. 964-968
Software engineering: theory, application and practice
- David C. Rine, James F. Power, J. Paul Gibson:
ACM SAC2002 software engineering: theory and applications (SETA) track description. 969-970 - Hisham Haddad, Herbert Tesser:
Reusable subsystems: domain-based approach. 971-975 - Paul Young, Valdis Berzins, Jun Ge, Luqi:
Using an object oriented model for resolving representational differences between heterogeneous systems. 976-983 - Assem El-Ansary:
Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events. 984-991 - Mahmoud O. Elish, David C. Rine, Joel E. Foreman:
Evaluating collaborative software in supporting organizational learning with Bayesian Networks. 992-996 - Fatma Dandashi:
A method for assessing the reusability of object-oriented code using a validated set of automated measurements. 997-1003 - Seok Won Lee:
Proxy Viewpoints Model-based Requirements engineering. 1004-1008 - Jan Jürjens:
A UML statecharts semantics with message-passing. 1009-1013 - Sergiu Dascalu, Peter Hitchcock:
An approach to integrating semi-formal and formal notations in software specification. 1014-1020 - María-del-Mar Gallardo, Jesús Martínez, Pedro Merino, Estefanía Rosales:
Using XML to implement abstraction for Model Checking. 1021-1025 - Jan Jürjens:
Using UMLsec and goal trees for secure systems development. 1026-1030 - Derek Lawson, Gerry Coleman:
Investigating software measures to improve product reliability. 1031-1035 - Rory O'Connor, Gerry Coleman:
Strategies for personal process improvement a comparison. 1036-1040
Standardization in IT
- Kai Jakobs:
Editorial message: special track on standardisation in IT. 1041-1042 - Luis Martín Díaz, Erik Wüstner, Peter Buxmann:
Inter-organizational document exchange: facing the conversion problem with XML. 1043-1047 - Eva Söderström:
Standardising the business vocabulary of standards. 1048-1052 - Ken Krechmer:
Cathedrals, libraries and bazaars. 1053-1057
Virtual reality, digital media, and computer games
- Daniel Ballin, Ruth Aylett, Marc Cavazza:
Editorial message: special track on virtual reality, digital media, and computer games. 1058-1059 - Taku Komura, Atsushi Kuroda, Yoshihisa Shinagawa:
NiceMeetVR: facing professional baseball pitchers in the virtual batting cage. 1060-1065 - Marco Roccetti, Vittorio Ghini, Paola Salomoni, Alessandro Gambetti, Davide Melandri, Mirko Piaggesi, Daniela Salsi:
The structuring of a wireless internet application for a music-on-demand service on UMST devices. 1066-1073 - Kikuo Asai, Noritaka Osawa, Yuji Y. Sugimoto, Yoshiaki Tanaka:
Viewpoint motion control by body position in immersive projection display. 1074-1079 - Marc Cavazza, Fred Charles, Steven J. Mead:
Emergent situations in interactive storytelling. 1080-1085
Web and e-business application
- Sara Comai, Letizia Tanca:
Editorial message: special track on web and E-business applications. 1086-1087 - Sabrina De Capitani di Vimercati:
An authorization model for temporal XML documents. 1088-1093 - Petri Vuorimaa, Teemu Ropponen, Niklas von Knorring, Mikko Honkala:
A Java based XML browser for consumer devices. 1094-1099 - Ljiljana Stojanovic, Nenad Stojanovic, Raphael Volz:
Migrating data-intensive web sites into the Semantic Web. 1100-1107 - Valter Crescenzi, Giansalvatore Mecca, Paolo Merialdo:
Wrapping-oriented classification of web pages. 1108-1112 - Uwe Zdun:
Dynamically generating web application fragments from page templates. 1113-1120 - Volker Turau:
A framework for automatic generation of web-based data entry applications based on XML. 1121-1126 - Danilo Ardagna, Chiara Francalanci:
A cost-oriented methodology for the design of web based IT architectures. 1127-1133 - Mon-Yen Luo, Chu-Sing Yang, Chun-Wei Tseng:
Content management on server farm with layer-7 routing. 1134-1139 - Tadashi Nakano, Kaname Harumoto, Shinji Shimojo, Shojiro Nishio:
User adaptive content delivery mechanism on the world wide web. 1140-1146 - Min Wang, Xiaoyang Sean Wang:
Optimizing relational store for e-catalog queries: a data mining approach. 1147-1152 - Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zaslavsky:
Application run time estimation: a quality of service metric for web-based data mining services. 1153-1159 - Victoria Ungureanu:
An agreement centric access control mechanism for business to business e-commerce. 1160-1164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.