- [1]
- W. Li,
L.-C. Lam, and T.-C. Chiueh.
How to automatically and accurately sandbox Microsoft IIS.
In Proceedings - Annual Computer Security Applications Conference,
ACSAC, pages 213–222, 2006.
(doi:10.1109/ACSAC.2006.31)
- [2]
- S.-H. Lo,
C.-C. Lin, and M.-S. Chen.
Controlling digital TV set-top box with mobile devices via an IP network.
IEEE Transactions on Consumer Electronics, 52(3):935–942, 2006.
(doi:10.1109/TCE.2006.1706491)
- [3]
- Zude Li,
Guoqiang Zhan, and Xiaojun Ye.
Role-based peer-to-peer model: Capture global pseudonymity for privacy
protection.
In Advances in Web-Age Information Management, pages 193–204.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 4016.
(doi:10.1007/11775300_17)
- [4]
- Adriaan de Groot, Sebastian
Kügler, Paul Adams, and Georgios Gousios.
Call
for quality: Open source software quality observation.
In Proceedings of the Second International Conference on Open Source
Systems, June 2006.
- [5]
- A.F.
Da Silva and V.S. Costa.
Our
experiences with optimizations in Sun's java just-in-time compilers.
Journal of Universal Computer Science, 12(7):788–810, 2006.
- [6]
- Sergio
de Cesare, Mark Geoffrey Lycett, and
Robert Duncan Macredie.
Development
of component-based information systems: An introduction.
In Development of Component-Based Information Systems, Advances in
Management Information Systems, chapter 1, pages 3–20. M. E. Sharpe,
2006.
- [7]
- Z. Liu,
H. Yu, D. Kundur, and
M. Merabti.
On peer-to-peer multimedia content access and distribution.
In 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 -
Proceedings, pages 557–560, 2006.
(doi:10.1109/ICME.2006.262469)
- [8]
- F. Qiu,
C. Lin, and H. Yin.
EKM: An efficient key management scheme for large-scale peer-to-peer media
streaming.
In Advances in Multimedia Information Processing — PCM 2006,
pages 395–404, 2006.
Lecture Notes in Computer Science 4261.
(doi:10.1007/11922162_46)
- [9]
- J. Kim,
H. Kim, and K. Park.
Towards optimal navigation through video content on interactive TV.
Interacting with Computers, 18(4):723–746, 2006.
(doi:10.1016/j.intcom.2005.11.011)
- [10]
- H. Mei,
D.-G. Cao, and F.-Q. Yang.
Development of software engineering: A research perspective.
Journal of Computer Science and Technology, 21(5):682–696, 2006.
(doi:10.1007/s11390-006-0682-8)
- [11]
- L. Guo,
S. Yang, J. Wang, and J. Zhou.
A distributed trust model based on vector space in p2p networks.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
43(9):1564–1570, 2006.
(doi:10.1360/crad20060912)
- [12]
- S. Hao,
Z. Yanchun, Z. Jingyuan,
E. Beal, and N. Moustakas.
Collaborative peer-to-peer service for information sharing using JXTA.
In First International Multi-Symposiums on Computer and Computational
Sciences, IMSCCS'06, pages 552–559, 2006.
(doi:10.1109/IMSCCS.2006.45)
- [13]
- Y.-J.
Liu, H.-Y. Zhang, W.-H. Dou, and
J.-F. Chen.
Data allocation algorithms in layered P2P streaming.
Ruan Jian Xue Bao/Journal of Software, 17(2):325–332, 2006.
(doi:10.1360/jos170325)
- [14]
- E.K.
Lee, S. Maheshwary, J. Mason, and
W. Glisson.
Large-scale dispensing for emergency response to bioterrorism and
infectious-disease outbreak.
Interfaces, 36(6):591–607, 2006.
(doi:10.1287/inte.1060.0257)
- [15]
- E.K.
Lee, S. Maheshwary, J. Mason, and
W. Glisson.
Decision support system for mass dispensing of medications for infectious
disease outbreaks and bioterrorist attacks.
Annals of Operations Research, 148(1):25–53, 2006.
(doi:10.1007/s10479-006-0087-7)
- [16]
- Doo Yeon Kim,
Jong Bae Kim, and Sung Yul Rhew.
Effective reuse procedure for open source software.
In Software Engineering Research and Practice, pages 163–167.
CSREA Press, 2006.
- [17]
- Kyoung Jun Lee, Jeong-In Ju,
and Jeong Mu Jeong.
A payment & receipt business model in U-commerce environment.
In ICEC '06: Proceedings of the 8th international conference on
Electronic commerce, pages 319–324, New York, NY, USA, 2006. ACM
Press.
(doi:10.1145/1151454.1151507)
- [18]
- Kyoung Jun
Lee, Mu Jeong Jeong, and Jeong-In Ju.
Seamlessness and privacy enhanced ubiquitous payment.
In E-Commerce and Web Technologies, pages 142–151, 2006.
Lecture Notes in Computer Science 4082.
(doi:10.1007/11823865_15)
- [19]
- Benjamin N. Lee, Wen-Yen
Chen, and Edward Y. Chang.
A scalable service for photo annotation, sharing, and search.
In MULTIMEDIA '06: Proceedings of the 14th annual ACM international
conference on Multimedia, pages 699–702, New York, NY, USA, 2006. ACM
Press.
(doi:10.1145/1180639.1180787)
- [20]
- J. Kim and
S. Wu.
Design for an interactive television advertising system.
In Proceedings of the 39th Hawaii Int. Conf. on System Sciences
(HICSS-39), January 2006.
- [21]
- J.W. Kim
and S. Du.
Design for an interactive television advertising system.
In Proceedings of the Annual Hawaii International Conference on System
Sciences, volume 2, page 47, 2006.
(doi:10.1109/HICSS.2006.116)
- [22]
- W. Shi and
Y. Mao.
Performance evaluation of peer-to-peer web caching systems.
Journal of Systems and Software, 79(5):714–726, 2006.
(doi:10.1016/j.jss.2005.08.012)
- [23]
- I. You
and C. Park.
An analysis on the web technologies for dynamically generating web-based user
interfaces in ubiquitous spaces.
In Ulf Leser, Felix Naumann, and
Barbara A. Eckman, editors, Data Integration in the Life
Sciences, Third International Workshop, DILS 2006, pages 639–649,
July 2006.
Lecture Notes in Computer Science 4097.
(doi:10.1007/11807964_65)
- [24]
- Y. Ben-Asher and
S. Berkovsky.
Semantic data management in peer-to-peer e-commerce applications.
Journal on Data Semantics, VI:115–142, 2006.
Lecture Notes in Computer Science 4090.
(doi:10.1007/11803034_6)
- [25]
- J. Abu Qudeiri, H. Yamamoto,
and M.A. Jamali.
Buffer size decision for balanced and unbalanced flexible transfer line with
rework paths.
In ICPMT2006 — Progress of Machining Technology — Proceedings of the
8th International Conference on Progress of Machining Technology,
pages 77–80, 2006.
- [26]
- N. Abu-Ghazaleh and M.J.
Lewis.
Short paper: Toward self organizing grids.
In Proceedings of the IEEE International Symposium on High Performance
Distributed Computing, volume 2006, pages 324–327, 2006.
- [27]
- H. Wang, S. Tan,
S. Tang, D. Yang, and Y. Tong.
File correspondences dictionary construction in multilingual p2p file sharing
systems.
In Ulf Leser, Felix Naumann, and
Barbara A. Eckman, editors, Data Integration in the Life
Sciences, Third International Workshop, DILS 2006, pages 144–152,
July 2006.
Lecture Notes in Computer Science 4097.
(doi:10.1007/11807964_15)
- [28]
- I. Kang, H. Kim,
S. Choi, M. Baik, and C. Hwang.
Multi-node global directory construction in peer-to-peer systems.
In Proceedings - International Conference on Advanced Information
Networking and Applications, AINA, volume 1, pages 713–718, 2006.
(doi:10.1109/AINA.2006.236)
- [29]
- V. King,
J. Saia, V. Sanwalani, and
E. Vee.
Towards secure and scalable computation in peer-to-peer networks.
In Proceedings - Annual IEEE Symposium on Foundations of Computer
Science, FOCS, pages 87–96, 2006.
(doi:10.1109/FOCS.2006.77)
- [30]
- M. Wang,
S. Zhang, J. Zhou, and H. Zhao.
An architecture of semantic desktop data grid.
In Proceedings — 2006 10th International Conference on Computer
Supported Cooperative Work in Design, CSCWD 2006, pages 1082–1087,
2006.
(doi:10.1109/CSCWD.2006.253210)
- [31]
- H. Wada,
J. Suzuki, K. Oba, S. Takada,
and N. Doi.
mTurnpike: A model-driven framework for domain specific software development.
Computer Software, 23(3):158–169, 2006.
- [32]
- R. Kolb,
D. Muthig, T. Patzke, and
K. Yamauchi.
Refactoring a legacy component for reuse in a software product line: A case
study.
Journal of Software Maintenance and Evolution, 18(2):109–132,
2006.
(doi:10.1002/smr.329)
- [33]
- A. Lioy,
M. Marian, N. Moltchanova, and
M. Pala.
PKI past, present and future.
International Journal of Information Security, 5(1):18–29, 2006.
(doi:10.1007/s10207-005-0077-9)
- [34]
- X. Zeng,
A.O. Fapojuwo, and R.J. Davies.
Design and performance evaluation of voice activated wireless home devices.
IEEE Transactions on Consumer Electronics, 52(3):983–989, 2006.
(doi:10.1109/TCE.2006.1706497)
- [35]
- C. Duma,
M. Karresand, N. Shahmehri, and
G. Caronni.
A trust-aware, P2P-based overlay for intrusion detection.
In 17th International Conference on Database and Expert Systems
Applications, DEXA 2006, pages 692–697, 2006.
- [36]
- S.-T.
Wang, J.-L.C. Wu, and C.-Y. Hsu.
Design of a resource advertisement and discovery protocol for large and dense
manets.
Journal of the Chinese Institute of Engineers, Transactions of the
Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch
K'an, 29(7):1161–1171, 2006.
- [37]
- Z.-W.
Hong, J.-M. Lin, H.C. Jiau,
G.-M. Fang, and C.W. Chiou.
Encapsulating windows-based software applications into reusable components with
design patterns.
Information and Software Technology, 48(7):619–629, 2006.
(doi:10.1016/j.infsof.2005.06.005)
- [38]
- J.D.
Wren, J.E. Grissom, and T. Conway.
E-mail decay rates among corresponding authors in medline.
EMBO Reports, 7(2):122–127, 2006.
(doi:10.1038/sj.embor.7400631)
- [39]
- J.D.
Wren, K.R. Johnson, D.M. Crockett,
L.F. Heilig, L.M. Schilling, and
R.P. Dellavalle.
Uniform resource locator decay in dermatology journals: Author attitudes and
preservation practices.
Archives of Dermatology, 142(9):1147–1152, 2006.
(doi:10.1001/archderm.142.9.1147)
- [40]
- Ruo Ando,
Nguyen Anh Quynh, and Yoshiyasu Takefuji.
Faster
resolution based metamorphic virus detection using ATP control
strategy.
WSEAS Transactions on Information Science and Applications,
3(2):260–226, February 2006.
- [41]
- Gang
YANG, Xingshe ZHOU, and Huifang PAN.
Feedback-based
framework of adaptive threads-pool management.
Computer Engineering, 32(5):65–67, 2006.
In Chinese.
- [42]
- C. Song
and M. Chun.
An approach to realization and security provision ofintelligent U-Healthcare
service.
In Proceedings of the ICHIT'06 2006 Conference on Hybrid Information
Technology, pages 462–467, 2006.
- [43]
- J. Zhou
and M. Wang.
Semantic integration of enterprise information: Challenges and basic
principles.
In The Semantic Web — ASWC 2006, volume 4185 LNCS, pages
219–233, 2006.
Lecture Notes in Computer Science 4185.
(doi:10.1007/11836025_23)
- [44]
- W. Wong
and M. Stamp.
Hunting for metamorphic engines.
Journal in Computer Virology, 2(3):211–229, 2006.
(doi:10.1007/s11416-006-0028-7)
- [45]
- M. Zhao
and S.W. Smith.
Modeling
and evaluation of certification path discovery in the emerging global
PKI.
In Andrea S. Atzeni and Antonio Lioy, editors,
Public Key Infrastructure, Third European PKI Workshop: Theory and
Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings,
pages 16–30. Springer-Verlag, 2006.
Lecture Notes in Computer Science 4043.
- [46]
- C. Bock
and D. Zuehlke.
Model-driven HMI development - can meta-case tools relieve the pain?
In ICSOFT 2006 - 1st International Conference on Software and Data
Technologies, Proceedings, volume 2, pages 312–319, 2006.
- [47]
- C. Song and V. Sazawal.
Information-hiding URLs for easier website evolution.
In Proceedings of the Eighth IEEE International Symposium on Web Site
Evolution, WSE 2006, pages 95–102, 2006.
(doi:10.1109/WSE.2006.10)
- [48]
- Y. Huang, B. Jin, and
J. Cao.
A
distributed approach to construction of topology mismatching aware P2P
overlays in wireless ad hoc networks.
In Proceedings — 14th Euromicro International Conference on Parallel,
Distributed, and Network-Based Processing, PDP 2006, volume 2006,
pages 340–347, 2006.
(doi:10.1109/PDP.2006.9)
- [49]
- N. Nahas, D. Ait-Kadi, and
M. Nourelfath.
A new approach for buffer allocation in unreliable production lines.
International Journal of Production Economics, 103(2):873–881,
2006.
(doi:10.1016/j.ijpe.2006.02.011)
- [50]
- M. Huang, L. Yang, and
Y. Yang.
A development process for building oss-based applications.
In Unifying the Software Process Spectrum, pages 122–135.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 3840.
(doi:10.1007/11608035_13)
- [51]
- C. Roser, M. Nakano, and
M. Tanaka.
Single simulation buffer optimization.
JSME International Journal, Series C: Mechanical Systems, Machine
Elements and Manufacturing, 48(4):763–768, 2006.
(doi:10.1299/jsmec.48.763)
- [52]
- D. Kelly,
P. Finnegan, and J. Feller.
Open vs. closed standards for ambient intelligence: An exploratory study of
adoption.
In Proceedings of the 14th European Conference on Information Systems,
ECIS 2006, 2006.
- [53]
- S. Datta, C. Giannella, and
H. Kargupta.
K-means clustering over a large, dynamic network.
In Proceedings of the Sixth SIAM International Conference on Data
Mining, pages 153–164, 2006.
- [54]
- C.-C.
Liang, C.-H. Wang, H. Luh, and
P.-Y. Hsu.
A robust web-based approach for broadcasting downward messages in a
large-scaled company.
In Web Information Systems — WISE 2006, pages 222–233, 2006.
Lecture Notes in Computer Science 4255.
(doi:10.1007/11912873_24)
- [55]
- T.-Y.
Chung, Y.-H. Chang, K.-H. Chen, and
Y.-M. Chen.
On high performance file distribution over peer-to-peer networks.
In Proceedings of the 10th IASTED International Conference on Internet
and Multimedia Systems and Applications, IMSA 2006, pages 158–165,
2006.
- [56]
- H.L.
Zhang, C.H.C. Leung, and G.K. Raikundalia.
Performance analysis of network topologies in agent-based open connectivity
architecture for DSS.
In Proceedings - International Conference on Advanced Information
Networking and Applications, AINA, volume 2, pages 257–261, 2006.
(doi:10.1109/AINA.2006.266)
- [57]
- Daniel
Gomes, André L. Santos, and Má J.
Silva.
Managing duplicates in a web archive.
In SAC '06: Proceedings of the 2006 ACM Symposium on Applied
Computing, pages 818–825, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1141277.1141465)
- [58]
- F. Rotar and A. Sluga.
Razvoj generi^cne strukture in programskih modulov elementarnega delovnega
sistema porazdeljenega tiskanja / development of the generic structure and
programming modules of an elementary work system for distributed printing.
Strojniski Vestnik / Journal of Mechanical Engineering,
52(9):599–612, September 2006.
- [59]
- Daniel
Gomes and Mário J. Silva.
Modelling information persistence on the web.
In ICWE '06: Proceedings of the 6th international conference on Web
engineering, pages 193–200, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1145581.1145623)
- [60]
- E. Aarts and
J. Encarnação.
True visions: The emergence of ambient intelligence.
Springer Berlin Heidelberg, 2006.
(doi:10.1007/978-3-540-28974-6)
- [61]
- W. Maass and A. Filler.
Towards an infrastructure for semantically annotated physical products.
In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36.
Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 2,
pages 544–549, 2006.
- [62]
- Wolfgang Maass and Andreas
Filler.
Towards an
infrastructure for semantically annotated physical products.
In Christian Hochberger and Rüdiger
Liskowsky, editors, Informatik 2006 — Informatik für Menschen,
Band 2, Beiträge der 36. Jahrestagung der Gesellschaft für Informatik
e.V. (GI), volume 94 of LNI, pages 544–549, 2006.
- [63]
- S. Jieun and C. Myungae.
SHOES: Secure healthcare oriented environement service model.
In IEEE 2006 Biomedical Circuits and Systems Conference Healthcare
Technology, BioCAS 2006, pages 89–93, 2006.
(doi:10.1109/BIOCAS.2006.4600315)
- [64]
- F. Ricca and P. Tonella.
Reverse engineering di sistemi software limiti e potenzialità (reverse
engineering of software systems limits and potential).
Mondo Digitale, 5(3):52–63, 2006.
- [65]
- S. Jieun and C. Myungae.
An approach to realization and security provision of intelligent u-healthcare
service.
In Proceedings — 2006 International Conference on Hybrid Information
Technology, ICHIT 2006, pages 462–467, 2006.
(doi:10.1109/ICHIT.2006.253527)
- [66]
- S. Smith and R. Jamieson.
Determining key factors in e-government information system security.
Information Systems Management, 23(2):23–32, 2006.
(doi:10.1201/1078.10580530/45925.23.2.20060301/92671.4)
- [67]
- J.J. Pazos-Arias,
M. López-Nores, J. García-Duque,
A. Gil-Solla, M. Ramos-Cabrer,
Y. Blanco-Fernández, R.P. Díaz-Redondo,
and A. Fernández-Vilas.
ATLAS: A framework to provide multiuser and distributed t-learning services
over MHP.
Software — Practice and Experience, 36(8):845–869, 2006.
(doi:10.1002/spe.719)
- [68]
- C. Squarr, J. Brunn, and
G. Wirtz.
Adaptive search in a semi-structured peer-to-peer system.
In IEEE International Conference on Computer Systems and
Applications, pages 25–32, 2006.
- [69]
- J. Buford, R. Kumar, and
G. Perkins.
Composition trust bindings in pervasive computing service composition.
In Proceedings — Fourth Annual IEEE International Conference on
Pervasive Computing and Communications Workshops, PerCom Workshops
2006, volume 2006, pages 261–266, 2006.
(doi:10.1109/PERCOMW.2006.31)
- [70]
- K. Ronasi, M.H. Firooz,
M.R. Pakravan, and A.N. Avanaki.
A fast algorithm for construction of minimum delay multicast trees in P2P
networks.
In 2006 International Symposium on Communications and Information
Technologies, ISCIT, pages 137–142, 2006.
(doi:10.1109/ISCIT.2006.339903)
- [71]
- N. Liebau, O. Heckmann,
A. Kovacevic, A. Manthe, and
R. Steinmetz.
Charging in peer-to-peer systems based on a token accounting system.
In Burkhard Stiller, Peter Reichl, and
Bruno Tuffin, editors, Performability Has its Price, 5th
International Workshop on Internet Charging and QoS Technologies, ICQT 2006,
St. Malo, France, June 27, 2006, Proceedings, pages 49–60.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 4033.
(doi:10.1007/11780502_6)
- [72]
- M. Obrist, R. Bernhaupt, and
M. Tscheligi.
Users@home: Implications from studying itv.
In 20th International Symposium on Human Factors in
Telecommunication, 2006.
- [73]
- T. Reiter, E. Kapsammer,
W. Retschitzegger, W. Schwinger, and
M. Stumptner.
A generator framework for domain-specific model transformation languages.
In ICEIS 2006 - 8th International Conference on Enterprise Information
Systems, Proceedings, volume ISAS, pages 27–35, 2006.
- [74]
- G.H.
Tolosa, J.A. Peri, and F.R.A. Bordignon.
Peer-to-peer content search supported by a distributed index in a
publication/search model.
Journal of Digital Information Management, 4(3):175–183,
2006.
- [75]
- M.H.
Firooz, K. Ronasi, M.R. Pakravan, and
A.N. Avanaki.
A novel multi-sender algorithm based on multi-cast concept for P2P networks.
In 2006 International Symposium on Communications and Information
Technologies, ISCIT, pages 143–147, 2006.
(doi:10.1109/ISCIT.2006.339904)
- [76]
- Eric
Filiol, Marko Helenius, and Stefano Zanero.
Open problems in computer virology.
Journal in Computer Virology, 1(3):55–66, 2006.
(doi:10.1007/s11416-005-0008-3)
- [77]
- Jeffrey
Carver, Forrest Shull, and Victor Basili.
Can observational techniques help novices overcome the software inspection
learning curve? an empirical investigation.
Empirical Softw. Engg., 11(4):523–539, 2006.
(doi:10.1007/s10664-006-9021-5)
- [78]
- R. Steele
and W. Tao.
An enhanced architecture for mobile retailing.
In ACM International Conference Proceeding Series, volume 270,
2006.
(doi:10.1145/1292331.1292367)
- [79]
- Paul
Nguyen and Robert Chun.
Model driven
development with interactive use cases and UML models.
In Proceedings of The 2006 International Conference on Software
Engineering Research & Practice (SERP'06) and Conference on Programming
Languages & Compilers (PLC'06), pages 534–540, 2006.
- [80]
- M. Bromba and S. Wetzel.
Biometrics and authentication.
In Phishing and Countermeasures: Understanding the Increasing Problem of
Electronic Identity Theft, pages 369–460. John Wiley & Sons, Inc.,
2006.
(doi:10.1002/9780470086100.ch10)
- [81]
- Matthias Merdes and Dirk
Dorsch.
Experiences with the development of a reverse engineering tool for UML
sequence diagrams: a case study in modern Java development.
In PPPJ '06: Proceedings of the 4th international symposium on Principles
and practice of programming in Java, pages 125–134, New York, NY,
USA, 2006. ACM Press.
ACM International Conference Proceeding Series 178.
(doi:10.1145/1168054.1168072)
- [82]
- J.D. Bitzer and P.J.H.
Schröder.
The impact of entry and competition by open source software on innovation
activity.
In The Economics of Open Source Software Development, pages
219–246. Elsevier, 2006.
(doi:10.1016/B978-044452769-1/50011-1)
- [83]
- K. Wilson and P. Machanick.
SecureTorrent: A security framework for file swarming.
In Advances in Computer Systems Architecture, pages 538–544,
2006.
Lecture Notes in Computer Science 4186.
(doi:10.1007/11859802_55)
- [84]
- W. Pasman and J. Lindenberg.
Human-agent service matching using natural language queries: system test and
training.
Personal and Ubiquitous Computing, 10(6):393–399, 2006.
(doi:10.1007/s00779-006-0067-6)
- [85]
- G. Perera and K. Christensen.
Broadcast updates with local look-up search (BULLS): A new peer-to-peer
protocol.
In Proceedings of the Annual Southeast Conference, volume 2006,
pages 124–129, 2006.
(doi:10.1145/1185448.1185477)
- [86]
- L. Rodero-Merino,
L. López, A. Fernández, and
V. Cholvi.
A topology self-adaptation mechanism for efficient resource location.
4th International Symposium on Parallel and Distributed Processing and
Applications, ISPA 2006, 4330:660–671, 2006.
- [87]
- E. Harjula, J. Ala-Kurikka,
D. Howie, and M. Ylianttila.
Analysis of peer-to-peer sip in a distributed mobile middleware system.
In GLOBECOM - IEEE Global Telecommunications Conference, 2006.
(doi:10.1109/GLOCOM.2006.190)
- [88]
- J. Močnik, M. Novak,
G. Pipan, and P. Karwaczynski.
A discovery service for very large, dynamic grids.
In e-Science 2006 — Second IEEE International Conference on e-Science
and Grid Computing, 2006.
(doi:10.1109/E-SCIENCE.2006.261147)
- [89]
- R. Agrawal, A. Cheung,
K. Kailing, and S. Schönauer.
Towards traceability across sovereign, distributed rfid databases.
In IDEAS: Proceedings of the International Database Engineering and
Applications Symposium, pages 174–184, 2006.
(doi:10.1109/IDEAS.2006.47)
- [90]
- S. Simmons, D. Edwards,
N. Wilde, J. Homan, and
M. Groble.
Industrial tools for the feature location problem: An exploratory study.
Journal of Software Maintenance and Evolution, 18(6):457–474,
2006.
(doi:10.1002/smr.338)
- [91]
- S. Castano, A. Ferrara, and
S. Montanelli.
A matchmaking-based ontology evolution methodology?
In CEUR Workshop Proceedings, volume 200, 2006.
- [92]
- E. Balland, C. Kirchner, and
P.-E. Moreau.
Formal islands.
In Algebraic Methodology and Software Technology, pages 51–65.
Springer-Verlag, 2006.
Lecture Notes in Computer Science 4019.
(doi:10.1007/11784180_7)
- [93]
- W. Lohmann, G. Riedewald, and
T. Tuhlke.
A
light-weight infrastructure to support experimenting with heterogeneous
transformations.
In .NET Technologies 2006: 4th International Conference,
2006.
- [94]
- A. Stefani, B. Vassiliadis,
and M. Xenos.
On the quality assessment of advanced e-learning services.
Interactive Technology and Smart Education, 3(3):237–250, 2006.
(doi:10.1108/17415650680001449)
- [95]
- M.S.E.
Burgess, O. Allam, W.A. Gray, and
A. Al-Busaidi.
Patient-centred approach to focusing online health information search results.
In International Symposium on Electronic Personal Health Records 2006,
ISePHR 2006, volume 219, 2006.
- [96]
- Shlomo Wygodny, Valery
Golender, Ido Ben-Moshe, and Vladimir Andreev.
System
and method for conditional tracing of computer programs.
United States Patent 7,058,928, June 2006.
Assignee: Identify Software Ltd.(IL).
- [97]
- Bhasker
Mukerji, Vinod Kumar, and Uma Kumar.
The challenges of adopting
open source software in promoting e-government.
In ICEG '06: International Conference on E-Governance, pages
22–31, 2006.
- [98]
- Douglas Beattie, Neal
Creighton, Jr., Christopher Bailey, David
Remy, and Hani Hamandi.
Methods
and systems for automated authentication, processing and issuance of digital
certificates.
United States Patent 7,120,929, October 2006.
Assignee: GeoTrust, Inc. (Wellesley Hills, MA).
- [99]
- Douglas D. Beattie, Neal Lewis
Creighton, Jr., Christopher T. M. Bailey,
David L. Remy, and Hani Hamandi.
Methods
and systems for automated authentication, processing and issuance of digital
certificates.
United States Patent 7,003,661, February 2006.
Assignee: Geotrust, Inc. (Needham, MA).
- [100]
- D.W.
Johnson and H. Koch.
Computer security risks in the internet era: Are small business owners aware
and proactive?
In Proceedings of the Annual Hawaii International Conference on System
Sciences, volume 6, 2006.
(doi:10.1109/HICSS.2006.91)
- [101]
- Martin
Naedele and Thomas E. Koch.
Trust and tamper-proof software delivery.
In SESS '06: Proceedings of the 2006 International Workshop on Software
Engineering for Secure Systems, pages 51–58, New York, NY, USA, 2006.
ACM Press.
(doi:10.1145/1137627.1137636)
- [102]
- C. Schmitz and A. Löser.
How to model semantic peer-to-peer overlays?
In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36.
Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1,
pages 12–19, 2006.
- [103]
- M. Hussain and D. Seret.
A comparative study of security protocols validation tools: HERMES vs.
AVISPA.
In 8th International Conference Advanced Communication Technology, ICACT
2006 — Proceedings, pages 303–308, 2006.
- [104]
- U. Basters and M. Klusch.
RS2D: Fast adaptive search for semantic web services in unstructured P2P
networks.
In 5th International Semantic Web Conference — ISWC '06, pages
87–100, 2006.
Lecture Notes in Computer Science 4273.
(doi:10.1007/11926078_7)
- [105]
- N. Matsuki and O. Ryabov.
A component-based software building environment.
In Proceedings of the IASTED International Conference on Software
Engineering, as part of the 24th IASTED International Multi-Conference on
APPLIED INFORMATICS, pages 133–136, 2006.
- [106]
- S. Castano and S. Montanelli.
Enforcing a semantic routing mechanism based on peer context matching.
In 2nd International Workshop on Contexts and Ontologies: Theory,
Practice and Applications, C and O 2006 - Collocated with the 17th European
Conference on Artificial Intelligence, ECAI 2006, volume 210,
2006.
- [107]
- E. Stavrou and
A. Pitsillides.
Securing mobile healthcare systems based on information classification: DITIS
case study.
In Proceedings of the 4th International Workshop on Security in
Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006, pages
67–79, 2006.
- [108]
- M. Choi.
Exploring requirements for e-learning professionals.
In ICE-B 2006 - International Conference on e-Business,
Proceedings, pages 323–326, 2006.
- [109]
- Phillip Anthony
Relf.
Source Code Readability Improvement Using Heuristic-Based Dynamic Error
Reporting During Editing.
PhD thesis, University of Technology, Sydney, 2006.
- [110]
- R. Akavipat, L.-S. Wu,
F. Menczer, and A.G. Maguitman.
Emerging semantic communities in peer web search.
In P2PIR 2006: International Workshop on Information Retrieval in
Peer-to-Peer Networks, pages 1–8, 2006.
(doi:10.1145/1183579.1183581)
- [111]
- A. Seshadri, M. Luk,
A. Perrig, L. Van Doorn, and
P. Khosla.
Scuba: Secure code update by attestation in sensor networks.
In WiSE 2006 — Proceedings of the 5th ACM Workshop on Wireless
Security, volume 2006, pages 85–94, 2006.
- [112]
- E. Reategui, C. Fruet, and
D.M. Filho.
Evaluating the impact of different virtual characters in product
recommendations.
In Proceedings of the VII Symposium on Human Factors in Computing
Systems, IHC 2006, pages 73–80, 2006.
(doi:10.1145/1298023.1298034)
- [113]
- M. Treaster, W. Conner,
I. Gupta, and K. Nahrstedt.
Contagalert: Using contagion theory for adaptive, distributed alert
propagation.
In Proceedings — Fifth IEEE International Symposium on Network
Computing and Applications, NCA 2006, volume 2006, pages 126–133,
2006.
(doi:10.1109/NCA.2006.20)
- [114]
- M. Abdullah, M. Othman, and
R. Johari.
An improved simulated annealing algorithm to avoid crosstalk in optical omega
network.
In 2006 International Conference on Computing and Informatics, ICOCI
'06, 2006.
(doi:10.1109/ICOCI.2006.5276543)
- [115]
- Y. Cardenas, J.-M. Pierson,
and L. Brunie.
Temporal storage space for grids.
In High Performance Computing and Communications, pages 803–812,
2006.
Lecture Notes in Computer Science 4208.
(doi:10.1007/11847366_83)
- [116]
- S. T.
Halkidis, A. Chatzigeorgiou, and
G. Stephanides.
A practical evaluation
of security patterns.
In 6th International Conference on Artificial Intelligence and Digital
Communications (AIDC'2006), August 2006.
- [117]
- A.S.
Baumgart, H. Knapp, and M. Schader.
Mobile semantic data exchange in ad hoc networks using distributed profiles.
In 2006 1st International Symposium on Wireless Pervasive
Computing, volume 2006, pages 1–6, January 2006.
(doi:10.1109/ISWPC.2006.1613649)
- [118]
- A.A.
Abimbola, J.M. Munoz, and W.J. Buchanan.
Nethost-sensor: Monitoring a target host's application via system calls.
Information Security Technical Report, 11(4):166–175, 2006.
(doi:10.1016/j.istr.2006.10.003)
- [119]
- M.V.
Belmonte, R. Conejo, M. Díaz, and
J.L. Pérez-de-la Cruz.
Coalition formation in P2P file sharing systems.
In Current Topics in Artificial Intelligence, pages 153–162,
2006.
Lecture Notes in Computer Science 4177.
(doi:10.1007/11881216_17)
- [120]
- S.T.
Halkidis, A. Chatzigeorgiou, and
G. Stephanides.
Quantitative evaluation of systems with security patterns using a fuzzy
approach.
In Robert Meersman, Zahir Tari, and
Pilar Herrero, editors, On the Move to Meaningful
Internet Systems 2006, pages 554–564, 2006.
Lecture Notes in Computer Science 4277.
- [121]
- Arvind Seshadri, Mark Luk,
Adrian Perrig, Leendert van Doorn, and
Pradeep Khosla.
SCUBA: Secure code update by attestation in sensor networks.
In WiSe '06: Proceedings of the 5th ACM workshop on Wireless
Security, pages 85–94, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1161289.1161306)
- [122]
- Adrian Schröter, Thomas
Zimmermann, Rahul Premraj, and Andreas Zeller.
If your bug database could talk...
In Proceedings of the 5th International Symposium on Empirical Software
Engineering, September 2006.
- [123]
- Gabriel Vanrenen, Sean Smith,
and John Marchesini.
Distributing security-mediated PKI.
International Journal of Information Security, 5(1):3–17, January
2006.
(doi:10.1007/s10207-005-0076-x)
- [124]
- Maurice Mulvenna, Franco
Zambonelli, Kevin Curran, and Chris Nugent.
Knowledge networks.
In Autonomic Communication, pages 99–114. Springer-Verlag, 2006.
Lecture Notes in Computer Science 3854.
(doi:10.1007/11687818_8)
- [125]
- P. Ocenasek and M. Sveda.
An approach to automated design of security protocols.
In Proceedings of the International Conference on Networking,
International Conference on Systems andInternational Conference on Mobile
Communications and Learning Technologies, ICN/ICONS/MCL'06, volume
2006, pages 77–85, 2006.
(doi:10.1109/ICNICONSMCL.2006.47)
- [126]
- T. Pfeiffer and M.A. Nowak.
Digital cows grazing on digital grounds.
Current Biology, 16(22), 2006.
(doi:10.1016/j.cub.2006.10.011)
- [127]
- T.L.
Harrison and M.L. Nelson.
Just-in-time recovery of missing web pages.
In Proceedings of the Seventeenth ACM Conference on Hypertext and
Hypermedia, HT'06, volume 2006, pages 145–156, 2006.
(doi:10.1145/1149941.1149971)
- [128]
- Rainer Wasinger and Wolfgang
Wahlster.
The
anthropomorphized product shelf: Symmetric multimodal interaction with
instrumented environments.
In E.H.L. Aarts and J.L. Encarnaç ao,
editors, True Visions: The Emergence of Ambient Intelligence.
Springer-Verlag, 2006.
- [129]
- Neta Aizenbud-Reshef and Gabi
Zodik.
Coverage
analysis of message flows.
United States Patent 7,137,103, November 2006.
Assignee: International Business Machines Corporation (Armonk, NY).
- [130]
- T. Perlines Hormann,
K. Wrona, and S. Holtmanns.
Evaluation of certificate validation mechanisms.
Computer Communications, 29(3):291–305, 2006.
(doi:10.1016/j.comcom.2004.12.008)
- [131]
- I. Martınez-Marchena,
L. Mora-López, and M. Sidrach De Cardona.
A framework for the development of monitoring systems software.
In ICSOFT 2006 - 1st International Conference on Software and Data
Technologies, Proceedings, volume 1, pages 133–138, 2006.
- [132]
- S.M. White.
Requirements for distributed mission-critical decision support systems.
In Proceedings of the International Symposium and Workshop on Engineering
of Computer Based Systems, pages 123–129, 2006.
(doi:10.1109/ECBS.2006.61)
- [133]
- Niteen Yemul.
The
tools at hand.
ACM Computing Reviews, 47(2), February 2006.
- [134]
- E. Michlmayr, A. Pany, and
S. Graf.
Applying ant-based multi-agent systems to query routing in distributed
environments.
IEEE Intelligent Systems, pages 36–41, 2006.
(doi:10.1109/IS.2006.348390)
- [135]
- F. Ichihashi, Y. Sankai, and
S. Kuno.
Development of secure data management server for ehealth promotion system.
International Journal of Sport and Health Science, 4:617–627,
2006.
- [136]
- C. Loebbecke, S. Radtke, and
C. Huyskens.
Innovative media technologies: Digital video recorders changing the ad-TV
business model.
In Association for Information Systems - 12th Americas Conference On
Information Systems, AMCIS 2006, volume 3, pages 1780–1786,
2006.
- [137]
- V. Vaishnavi, A. Vandenberg,
R. Baskerville, and G. Zheng.
TQN: A novel approach to generating information security data.
In 16th Workshop on Information Technologies and Systems, WITS
2006, pages 187–192. Social Science Research Network, 2006.
- [138]
- T. Khatiwala, R. Swaminathan,
and V.N. Venkatakrishnan.
Data sandboxing: A technique for enforcing confidentiality policies.
In ACSAC: Annual Computer Security Applications Conference, pages
223–232, 2006.
(doi:10.1109/ACSAC.2006.22)
- [139]
- Maria Håkansson, Lalya
Gaye, Sara Ljungblad, and Lars Erik Holmquist.
More than meets the eye: an exploratory study of context photography.
In NordiCHI '06: Proceedings of the 4th Nordic conference on
Human-computer interaction, pages 262–271, New York, NY, USA, 2006.
ACM Press.
(doi:10.1145/1182475.1182503)
- [140]
- Stephen M. Blackburn, Robin
Garner, Chris Hoffmann, Asjad M. Khang,
Kathryn S. McKinley, Rotem Bentzur,
Amer Diwan, Daniel Feinberg,
Daniel Frampton, Samuel Z. Guyer,
Martin Hirzel, Antony Hosking,
Maria Jump, Han Lee, J. Eliot,
B. Moss, Aashish Phansalkar,
Darko Stefanović, Thomas VanDrunen,
Daniel von Dincklage, and Ben Wiedermann.
The DaCapo benchmarks: Java benchmarking development and analysis.
ACM SIGPLAN Notices, 41(10):169–190, 2006.
OOPSLA '06: Proceedings of the 21st Annual ACM SIGPLAN Conference on
Object-Oriented Programming Languages, Systems, and Applications.
(doi:10.1145/1167515.1167488)
- [141]
- Jonathan B. Rosenberg, John C.
Harrison, David L. Remy, and Neal L. Creighton,
Jr.
Web
site identity assurance.
United States Patent 7,114,177, September 2006.
Assignee: GeoTrust, Inc. (Portland, OR).
- [142]
- Mohamed R. Chouchane and Arun
Lakhotia.
Using engine signature to detect metamorphic malware.
In WORM '06: Proceedings of the 4th ACM workshop on Recurring
malcode, pages 73–78, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1179542.1179558)
- [143]
- A. Manzalini and
F. Zambonelli.
Towards autonomic and situation-aware communication services: The CASCADAS
vision.
In DIS 2006: IEEE Workshop on Distributed Intelligent Systems —
Collective Intelligence and Its Applications, pages 383–388, 2006.
(doi:10.1109/DIS.2006.71)
- [144]
- P. Beritelli and
M. Schuppisser.
Challenges in mobile business solutions for tourist destinations - the trial
case of St. Moritz.
Journal of Quality Assurance in Hospitality and Tourism,
6(3-4):147–162, 2006.
(doi:10.1300/J162v06n03_09)
- [145]
- B. Hughes.
Link? rot. URI citation durability in 10 years of AusWeb proceedings.
In AusWeb 2006: 12th Australasian World Wide Web Conference,
2006.
- [146]
- M. Gordon.
Small-scale peer-to-peer overlays.
Operating Systems Review, 40(3):45–48, 2006.
(doi:10.1145/1151374.1151385)
- [147]
- C. Pescio.
Listen to your tools and materials.
IEEE Software, 23(5):74–80, 2006.
(doi:10.1109/MS.2006.134)
- [148]
- M. Savsar.
Buffer allocation in serial production lines with preventive and corrective
maintenance operations.
Kuwait Journal of Science and Engineering, 33(2):253–266,
2006.
- [149]
- A.A. Bulgak.
Analysis and design of split and merge unpaced assembly systems by
metamodelling and stochastic search.
International Journal of Production Research,
44(18-19):4067–4080, 2006.
(doi:10.1080/00207540600564625)
- [150]
- Greg Wilson.
Software carpentry: Getting scientists to write better code by making them more
productive.
Computing in Science and Engineering, 8(6):66–69,
November/December 2006.
(doi:10.1109/MCSE.2006.122)
- [151]
- Chuck Pheatt.
Network distributed computing using DCEZ.
Journal of Computing Sciences in Colleges, 21(4):9–15, 2006.
- [152]
- Helmut
Salmen.
Method
and apparatus for restricted run-time environment with dynamic user
context.
United States Patent 7,069,275, June 2006.
Assignee: Sun Microsystems, Inc. (Santa Clara, CA).
- [153]
- Rachit Mathur.
Normalizing
metamorphic malware using term rewriting.
Master's thesis, Louisiana at Lafayette, 2006.
- [154]
- S. Ovcharenko, Z. Alibhai,
C. Ng, W.A. Graver, and
D. Sabaz.
Implementation of a wireless distributed intelligent system.
In Proceedings - DIS 2006: IEEE Workshop on Distributed Intelligent
Systems - Collective Intelligence and Its Applications, volume 2006,
pages 207–212, 2006.
(doi:10.1109/DIS.2006.38)
- [155]
- Andrew Walenstein, Rachit
Mathur, Mohamed R. Chouchane, and Arun
Lakhotia.
Normalizing metamorphic malware using term rewriting.
In SCAM '06: Proceedings of the Sixth IEEE International Workshop on
Source Code Analysis and Manipulation, pages 75–84, Washington, DC,
USA, 2006. IEEE Computer Society.
(doi:10.1109/SCAM.2006.20)
- [156]
- V. Dimopoulos and S. Furnell.
A protection profiles approach to risk analysis for small and medium
enterprises.
IFIP International Federation for Information Processing, 193,
2006.
- [157]
- S. Sidiroglou and A.D.
Keromytis.
Execution transactions for defending against software failures: Use and
evaluation.
International Journal of Information Security, 5(2):77–91, 2006.
(doi:10.1007/s10207-006-0083-6)
- [158]
- J. Masanés.
Web archiving: Issues and methods.
In Web Archiving, pages 1–53. Springer Berlin Heidelberg, 2006.
(doi:10.1007/978-3-540-46332-0_1)
- [159]
- L. Mannila.
Progress reports and novices' understanding of program code.
In ACM International Conference Proceeding Series, volume 276,
pages 27–31, 2006.
(doi:10.1145/1315803.1315810)
- [160]
- Miquel Termens.
DOI: The "Big Brother" in the dissemination of scientific documentation.
International Microbiology, 9(2):139–142, 2006.
- [161]
- I. Sabuncuoglu, E. Erel, and
Y. Gocgun.
Analysis of serial production lines: Characterisation study and a new heuristic
procedure for optimal buffer allocation.
International Journal of Production Research, 44(13):2499–2523,
2006.
(doi:10.1080/00207540500465535)
- [162]
- B. Vassiliadis,
V. Fotopoulos, and A.N. Skodras.
Decentralising the digital rights management value chain by means of
distributed license catalogues.
In Artificial Intelligence Applications and Innovations, volume
204 of IFIP International Federation for Information Processing,
pages 689–696. Springer Verlag, 2006.
(doi:10.1007/0-387-34224-9_81)
- [163]
- Bas
Cornelissen, Arie van Deursen, and Leon
Moonen.
Aiding in the comprehension of testsuites.
In Andy Zaidman, Abdelwahab Hamou-Lhadj, and
Orla Greevy, editors, Proceedings of the 2nd Workshop on
Program Comprehension through Dynamic Analysis (PCODA'06), pages
17–20. Universiteit Antwerpen, 2006.
- [164]
- T. Yamakami.
Empirical long-term observation on the mobile web update frequency.
In 2006 IFIP International Conference on Wireless and Optical
Communications Networks, 2006.
(doi:10.1109/WOCN.2006.1666603)
- [165]
- V. Darlagiannis, O. Heckmann,
and R. Steinmetz.
Peer-to-peer applications beyond file sharing: Overlay network requirements and
solutions.
Elektrotechnik und Informationstechnik, 123(6):242–250, 2006.
(doi:10.1007/s00502-006-0345-z)
- [166]
- E. Michlmayr.
Ant algorithms for search in unstructured peer-to-peer networks.
In 22nd International Conference on Data Engineering Workshops, ICDEW
2006. Institute of Electrical and Electronics Engineers Inc., 2006.
(doi:10.1109/ICDEW.2006.29)
- [167]
- N. Tomaiuolo.
DOIs, URLs, LoCKSS, and missing links.
Searcher:Magazine for Database Professionals, 14(7):18–23,
2006.
- [168]
- M. Mongiello.
Finite-state verification of the ebXML protocol.
Electronic Commerce Research and Applications, 5(2):147–169,
2006.
(doi:10.1016/j.elerap.2005.09.002)
- [169]
- J. E.
McEneaney.
Agent-based
literacy theory.
Reading Research Quarterly, 41(3):352–371, 2006.
(doi:10.1598/RRQ.41.3.3)
- [170]
- Yiannis Kanellopoulos, Thimios
Dimopulos, Christos Tjortjis, and Christos
Makris.
Mining source code elements for comprehending object-oriented systems and
evaluating their maintainability.
ACM SIGKDD Explorations Newsletter, 8(1):33–40, 2006.
(doi:10.1145/1147234.1147240)
- [171]
- S. Montanelli.
Emergent communities for semantic collaboration in multi-knowledge
environments: Methods and techniques.
In 13th Doctoral Consortium - Held at the 18th Conference on Advanced
Information Systems, DCCAISE 2006, volume 263, pages 1152–1159.
CEUR-WS, 2006.
- [172]
- H. Stuckenschmidt,
F. Van Harmelen, W. Siberski, and
S. Staab.
Peer-to -peer and semantic web.
In Semantic Web and Peer-to-Peer: Decentralized Management and Exchange
of Knowledge and Information, pages 1–17. Springer Berlin Heidelberg,
2006.
(doi:10.1007/3-540-28347-1_1)
- [173]
- Holger
Eichelberger.
On
class diagrams, crossings and metrics.
In Michael Jünger, Stephen Kobourov, and
Petra Mutzel, editors, Graph Drawing, number
05191 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und
Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany,
2006.