- [1]
- K. Li,
X. Sun, and Y. He.
Duty-oriented hybrid peer-to-peer network based on metadata.
In International Symposium on Advances in Computer and Sensor Networks
and Systems, 2008. Aardvark Global Publishing, 2008.
- [2]
- J. Ni,
J. Lin, S.J. Harrington, and
N. Sharma.
Designing file replication schemes for peer-to-peer file sharing systems.
In IEEE International Conference on Communications, pages
5609–5613, 2008.
(doi:10.1109/ICC.2008.1051)
- [3]
- T. Li,
J. Wang, and J. You.
Using degree-based strategy for network coding in content distribution network.
In Proceedings of the 2008 International Conference on Computer and
Electrical Engineering, ICCEE 2008, pages 487–491, 2008.
(doi:10.1109/ICCEE.2008.20)
- [4]
- H. Wu,
J. Gray, and M. Mernik.
Grammar-driven generation of domain-specific language debuggers.
Software - Practice and Experience, 38(10):1073–1103, 2008.
(doi:10.1002/spe.863)
- [5]
- F. Li,
T. Iida, and Y. Ishikawa.
Traceable P2P record exchange: A database-oriented approach.
Frontiers of Computer Science in China, 2(3):257–267, 2008.
(doi:10.1007/s11704-008-0028-5)
- [6]
- A. Ng,
H. Grimm, T. Lezama, A. Persson,
M. Andersson, and M. JagÌstam.
OPTIMISE: An internet-based platform for metamodel-assisted simulation
optimization.
International Conference on Communication Systems and Electrical
Engineering, 4 LNEE:281–296, 2008.
(doi:10.1007/978-0-387-74938-9_20)
- [7]
- M. Tu,
N. Tadayon, and E. Lu.
A scalable update protocol for peer-to-peer data grids.
In Proceedings of the 2008 International Conference on Parallel and
Distributed Processing Techniques and Applications, PDPTA 2008, pages
826–832, 2008.
- [8]
- D.-C. Li,
H.-B. Sun, and Z.-H. Xin.
Relativity analysis on wireless value-added services market and SP
regulation.
Tongxin Xuebao/Journal on Communication, 29(2):116–122,
2008.
- [9]
- C.-H. Li,
G.-F. Feng, T.-C. Gu, S.-L. Lu,
and D.-X. Chen.
Hotspots-free overlay cooperative caching scheme.
Ruan Jian Xue Bao/Journal of Software, 19(3):744–754, 2008.
(doi:10.3724/SP.J.1001.2008.00744)
- [10]
- J.-W. Lo,
M.-S. Hwang, and Y.-P. Chu.
An exchangeable e-cash scheme by e-mint.
In Proceedings - 8th International Conference on Intelligent Systems on
Intelligent Systems Design and Applications, ISDA 2008, volume 3,
pages 246–251, 2008.
(doi:10.1109/ISDA.2008.186)
- [11]
- H.J. Ko,
K.I. Kim, E.J. Lee, W.G. Choi,
and U.M. Kim.
An effective XML data release in dynamic environments.
In Proceedings — 2008 International Conference on Convergence and
Hybrid Information Technology, ICHIT 2008, pages 182–189, 2008.
(doi:10.1109/ICHIT.2008.222)
- [12]
- J.L.
Muñoz, O. Esparza, J. Forné, and
E. Pallares.
H-OCSP: A protocol to reduce the processing burden in online certificate
status validation.
Electronic Commerce Research, 8(4):255–273, 2008.
(doi:10.1007/s10660-008-9024-y)
- [13]
- X.-C. Lu and
D.-S. Li.
Overlay technologies for internet-based virtual computing environment.
Jisuanji Xuebao/Chinese Journal of Computers, 31(9):1516–1524,
2008.
- [14]
- O. De Moor, D. Sereni,
M. Verbaere, E. Hajiyev,
P. Avgustinov, T. Ekman,
N. Ongkingco, and J. Tibble.
Ql: Object-oriented queries made easy.
In Generative and Transformational Techniques in Software Engineering II:
International Summer School, GTTSE 2007, pages 78–133, July 2008.
Lecture Notes in Computer Science 5235.
(doi:10.1007/978-3-540-88643-3_3)
- [15]
- H. de Vries, H. de Vries, and
I. Oshri.
Standards-battles in open source software: The case of firefox.
Palgrave Macmillan, 2008.
(doi:10.1057/9780230595095)
- [16]
- E.C.
De Almeida, G. Sunyé, Y.L. Traon, and
P. Valduriez.
A framework for testing peer-to-peer systems.
In Proceedings - International Symposium on Software Reliability
Engineering, ISSRE, pages 167–176, 2008.
(doi:10.1109/ISSRE.2008.42)
- [17]
- I. De Rezende and
F. Siqueira.
XOP: Sharing XML data objects through peer-to-peer networks.
In AINA 2008: International Conference on Advanced Information Networking
and Applications, pages 1021–1027, 2008.
(doi:10.1109/AINA.2008.37)
- [18]
- J.S. De Oliveira Neto and
V.F.M. Salvador.
Non-functional requirements to voice user interface on interactive television:
An initial study.
In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information
Systems; Proceedings of Interfaces and Human Computer Interaction
2008, pages 77–84, 2008.
- [19]
- J. De Boever.
Peer-to-peer content distribution an analysis of the internal and external
potentials and obstacles.
In WEBIST 2008 - 4th International Conference on Web Information Systems
and Technologies, Proceedings, volume 2, pages 367–377, 2008.
- [20]
- X. Sun,
K. Li, Y. Liu, and Y. Tian.
SLUP: A semantic-based and location-aware unstructured p2p network.
In HPCC 2008: 10th IEEE International Conference on High Performance
Computing and Communications, pages 288–295, 2008.
(doi:10.1109/HPCC.2008.49)
- [21]
- Y. Liu,
G. Guo, and J. Qi.
An algorithm of system decomposition based on Laplace spectral graph
partitioning technology.
In Proceedings - International Conference on Computer Science and
Software Engineering, CSSE 2008, volume 2, pages 85–89, 2008.
(doi:10.1109/CSSE.2008.1015)
- [22]
- Y. Liu,
L. Zhu, J. Gao, and Y. Li.
A segment strategy based on flooding search in unstructured P2P network.
In Proceedings of the 2008 2nd International Conference on Future
Generation Communication and Networking, FGCN 2008, volume 1, pages
252–255, 2008.
(doi:10.1109/FGCN.2008.201)
- [23]
- Y. Liu,
L. Zhu, J. Gao, and W. Cheng.
A research about redundant data packet in unstructured P2P network.
In HPCC 2008: 10th IEEE International Conference on High Performance
Computing and Communications,, pages 653–658, 2008.
(doi:10.1109/HPCC.2008.75)
- [24]
- H. Yin,
C. Lin, Q. Zhang, and Z. and
Chen.
TrustStream: A secure and scalable architecture for large-scale internet
media streaming.
IEEE Transactions on Circuits and Systems for Video Technology,
18(12):1692–1702, 2008.
(doi:10.1109/TCSVT.2008.927000)
- [25]
- Y. Liu,
C. Yang, K. Xu, and H. Chen.
A fair utility function for incentive mechanism against free-riding in
peer-to-peer networks.
In ruSMART 2008: 8th International Conference, NEW2AN and 1st Russian
Conference on Smart Spaces — Next Generation Teletraffic and Wired/Wireless
Advanced Networking, pages 222–233, 2008.
Lecture Notes in Computer Science 5174.
(doi:10.1007/978-3-540-85500-2_20)
- [26]
- Y. Liu,
C. Yang, K. Xu, and H. Chen.
Controlling mechanism for the hubs in peer-to-peer networks.
In Proceedings - 2008 International Conference on Computational
Intelligence and Security, CIS 2008, volume 1, pages 511–515, 2008.
(doi:10.1109/CIS.2008.109)
- [27]
- X. Sun,
Y. Tian, Y. Liu, and Y. He.
An unstructured P2P network model for efficient resource discovery.
In 1st International Conference on the Applications of Digital
Information and Web Technologies, ICADIWT 2008, pages 156–161, 2008.
(doi:10.1109/ICADIWT.2008.4664336)
- [28]
- W. Sun,
R. Sekar, Z. Liang, and V.N.
Venkatakrishnan.
Expanding malware defense by securing software installations.
In DIMVA 2008: 5th International Conference on Detection of Intrusions
and Malware, and Vulnerability Assessment, pages 164–185, July 2008.
Lecture Notes in Computer Science 5137.
(doi:10.1007/978-3-540-70542-0_9)
- [29]
- B. Can,
A. Beham, and C. Heavey.
A comparative study of genetic algorithm components in simulation-based
optimisation.
In Winter Simulation Conference, pages 1829–1837, 2008.
(doi:10.1109/WSC.2008.4736272)
- [30]
- J. Cho,
J.S. Young, and J. Ryu.
A new content-related advertising model for interactive television.
In IEEE International Symposium on Broadband Multimedia Systems and
Broadcasting 2008, Broadband Multimedia Symposium 2008, BMSB, 2008.
(doi:10.1109/ISBMSB.2008.4536639)
- [31]
- F.-R. Lin,
H.-M. Lo, and C.-R. Wang.
Can a p2p file-sharing network become an e-marketplace?
In Proceedings of the Annual Hawaii International Conference on System
Sciences, 2008.
(doi:10.1109/HICSS.2008.86)
- [32]
- Y.-H. Liu,
J.-S. Yih, F. Pinel, and
T. Chieu.
A model-driven SOA implementation of multi-channel Websphere Commerce
Gift Center.
In IEEE International Conference on e-Business Engineering, ICEBE'08 -
Workshops: AiR'08, EM2I'08, SOAIC'08, SOKM'08, BIMA'08, DKEEE'08,
pages 29–34, 2008.
(doi:10.1109/ICEBE.2008.96)
- [33]
- S.-J. Lin,
M.-C. Huang, K.-C. Lai, and K.-C.
Huang.
Design and implementation of job migration policies in p2p grid systems.
In Proceedings of the 3rd IEEE Asia-Pacific Services Computing
Conference, APSCC 2008, pages 75–80, 2008.
(doi:10.1109/APSCC.2008.246)
- [34]
- J.A. Roy,
F. Koushanfar, and I.L. Markov.
Circuit CAD tools as a security threat.
In HOST 2008: IEEE International Workshop on Hardware-Oriented Security
and Trust, pages 65–66, 2008.
(doi:10.1109/HST.2008.4559052)
- [35]
- H.C.W. Lau,
T.M. Chan, and W.T. Tsui.
Item-location assignment using fuzzy logic guided genetic algorithms.
IEEE Transactions on Evolutionary Computation, 12(6):765–780,
2008.
(doi:10.1109/TEVC.2008.924426)
- [36]
- H.C.W. Lau,
T.M. Chan, and W.T. Tsui.
Fuzzy logic guided genetic algorithms for the location assignment of items.
In 2007 IEEE Congress on Evolutionary Computation, CEC 2007, pages
4281–4288, 2008.
(doi:10.1109/CEC.2007.4425030)
- [37]
- S. Van Der Gaast and
D. Bijwaard.
Efficiency of personalized content distribution.
Bell Labs Technical Journal, 13(2):135–146, 2008.
(doi:10.1002/bltj.20309)
- [38]
- M. Van Der Schaar, D.S.
Turaga, and R. Sood.
Stochastic optimization for content sharing in P2P systems.
IEEE Transactions on Multimedia, 10(1):132–143, 2008.
(doi:10.1109/TMM.2007.911288)
- [39]
- Y. Wen and
H.-M. Wang.
Isolated execution model based on local virtualization technology.
Jisuanji Xuebao/Chinese Journal of Computers, 31(10):1768–1779,
2008.
- [40]
- T. Guo and
S.A. Jarvis.
DIAO: A scheme of cooperative data distribution for grid-enabled data
analysis applications.
In The 3rd Int. Multi-Conf. Computing in the Global Information
Technology, ICCGI 2008 in Conjunction with ComP2P 2008: The 1st Int. Workshop
on Computational P2P Networks: Theory and Practice, pages 200–209,
2008.
(doi:10.1109/ICCGI.2008.26)
- [41]
- L. Van Velsen, T. Van
Der Geest, R. Klaassen, and M. Steehouder.
User-centered evaluation of adaptive and adaptable systems: A literature
review.
Knowledge Engineering Review, 23(3):261–281, 2008.
(doi:10.1017/S0269888908001379)
- [42]
- J. Abu Qudeiri, H. Yamamoto,
R. Ramli, and A. Jamali.
Genetic algorithm for buffer size and work station capacity in serial-parallel
production lines.
Artificial Life and Robotics, 12(1-2):102–106, 2008.
(doi:10.1007/s10015-007-0449-5)
- [43]
- W. Chen,
J. Li, J. Ma, R. Conradi,
J. Ji, and C. Liu.
An empirical study on software development with open source components in the
Chinese software industry.
Software Process Improvement and Practice, 13(1):89–100, 2008.
(doi:10.1002/spip.361)
- [44]
- X. Tang,
J. Xu, and W.-C. Lee.
Analysis of TTL-based consistency in unstructured peer-to-peer networks.
IEEE Transactions on Parallel and Distributed Systems,
19(12):1683–1694, 2008.
(doi:10.1109/TPDS.2008.44)
- [45]
- G. Chen,
M. Li, and D. Kotz.
Data-centric middleware for context-aware pervasive computing.
Pervasive and Mobile Computing, 4(2):216–253, 2008.
(doi:10.1016/j.pmcj.2007.10.001)
- [46]
- H. Zhou,
P. Luo, D. Wang, and Y. Dai.
Fast public key infrastructure authentication based on ca caching.
Qinghua Daxue Xuebao/Journal of Tsinghua University,
48(7):1160–1164, 2008.
- [47]
- G. Chen,
C.P. Low, and Z. Yang.
Enhancing search performance in unstructured P2P networks based on users'
common interest.
IEEE Transactions on Parallel and Distributed Systems,
19(6):821–836, 2008.
(doi:10.1109/TPDS.2008.42)
- [48]
- G. Chen,
C.P. Low, and Z. Yang.
Coordinated services provision in peer-to-peer environments.
IEEE Transactions on Parallel and Distributed Systems,
19(4):433–446, 2008.
(doi:10.1109/TPDS.2007.70745)
- [49]
- M. Rohr,
A. Van Hoorn, J. Matevska,
N. Sommer, L. Stoever,
S. Giesecke, and W. Hasselbring.
Kieker: Continuous monitoring and on demand visualization of Java software
behavior.
In Proceedings of the IASTED International Conference on Software
Engineering, SE 2008, pages 80–85, 2008.
- [50]
- C. Isen,
L. John, P.C. Jung, and J.S.
Hyo.
On the representativeness of embedded Java benchmarks.
In 2008 IEEE International Symposium on Workload Characterization,
IISWC'08, pages 153–162, 2008.
(doi:10.1109/IISWC.2008.4636100)
- [51]
- Q. Chen,
S. Zhang, and Y.-P.P. Chen.
Rule-based dependency models for security protocol analysis.
Integrated Computer-Aided Engineering, 15(4):369–380, 2008.
- [52]
- S. Apel,
T. Leich, and G. Saake.
Aspectual feature modules.
IEEE Transactions on Software Engineering, 34(2):162–180, 2008.
(doi:10.1109/TSE.2007.70770)
- [53]
- H. Reza,
K. Ogaard, and A. Malge.
A model based testing technique to test web applications using StateCharts.
In Proceedings — International Conference on Information Technology:
New Generations, ITNG 2008, pages 183–188, 2008.
(doi:10.1109/ITNG.2008.145)
- [54]
- T. Wolf,
T. Nguyen, and D. Damian.
Does distance still matter?
Software Process Improvement and Practice, 13(6):493–510, 2008.
(doi:10.1002/spip.401)
- [55]
- Z. Shen,
W. Yongji, and X. Junchao.
Mining individual performance indicators in collaborative development using
software repositories.
In APSEC 08: 15th Asia-Pacific Software Engineering Conference,
pages 247–254, December 2008.
(doi:10.1109/APSEC.2008.12)
- [56]
- L. Swan,
A.S. Taylor, and R. Harper.
Making place for clutter and other ideas of home.
ACM Transactions on Computer-Human Interaction, 15(2), 2008.
(doi:10.1145/1375761.1375764)
- [57]
- J. Zhou,
L.N. Bhuyan, and A. Banerjee.
An effective pointer replication algorithm in P2P networks.
In IPDPS Miami 2008 - Proceedings of the 22nd IEEE International Parallel
and Distributed Processing Symposium, Program and CD-ROM, 2008.
(doi:10.1109/IPDPS.2008.4536227)
- [58]
- S. Loeb,
B. Falchuk, and E. Panagos.
The Fabric of Mobile Services: Software Paradigms and Business
Demands.
wiley, 2008.
(doi:10.1002/9780470478240)
- [59]
- S. Fenz,
A. Ekelhart, and E. Weippl.
Fortification of IT security by automatic security advisory processing.
In AINA 2008: International Conference on Advanced Information Networking
and Applications, pages 575–582, 2008.
(doi:10.1109/AINA.2008.69)
- [60]
- D. Hull,
S.R. Pettifer, and D.B. Kell.
Defrosting the digital library: Bibliographic tools for the next generation
web.
PLoS Computational Biology, 4(10), 2008.
(doi:10.1371/journal.pcbi.1000204)
- [61]
- L.-D. Chou,
H.-H. Liang, S.-K. Chen, Y.-S.
Wang, C.-N. Yang, and M. Chen.
P2p-based distributed qos monitoring systems.
Journal of Internet Technology, 9(2):153–159, 2008.
- [62]
- M.D. Aime,
P.C. Pomi, and M. Vallini.
Policy-driven system configuration for dependability.
In Proceedings — 2nd Int. Conf. Emerging Security Inf., Systems and
Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on
Dependability and Security in Complex and Critical Inf. Sys., pages
420–425, 2008.
(doi:10.1109/SECURWARE.2008.54)
- [63]
- U.H. Yoon,
K.-I. Jeong, K.-L. Park,
H. Jiyon, A. Jaemin,
S. Jeonghwa, and S.-D. Kim.
Reducing the discovery overheads in a DHT based P2P network by using
virtual resources.
In Proceedings of 19th International Conference on Systems Engineering,
ICSEng 2008, pages 368–374, 2008.
(doi:10.1109/ICSEng.2008.63)
- [64]
- S.J. Barr,
S.J. Cardman, and D.M. Martin Jr.
A boosting ensemble for the recognition of code sharing in malware.
Journal in Computer Virology, 4(4):335–345, 2008.
(doi:10.1007/s11416-008-0087-z)
- [65]
- F.R.B. Cruz,
A.R. Duarte, and T. van Woensel.
Buffer allocation in general single-server queueing networks.
Computers and Operations Research, 35(11):3581–3598, 2008.
(doi:10.1016/j.cor.2007.03.004)
- [66]
- Qingfeng
Chen, Chengqi Zhang, and Shichao Zhang.
Secure Transaction Protocol Analysis: Models and Applications.
Springer-Verlag, 2008.
Lecture Notes in Computer Science 5111.
(doi:10.1007/978-3-540-85074-8_1)
- [67]
- H. Park and M. Van
Der Schaar.
Coalition-based resource reciprocation strategies for P2P multimedia
broadcasting.
IEEE Transactions on Broadcasting, 54(3):557–567, 2008.
(doi:10.1109/TBC.2008.2001148)
- [68]
- H. Park and M. Van
Der Schaar.
Coalition based multimedia peer matching strategies for P2P networks.
In Proceedings of SPIE — The International Society for Optical
Engineering, volume 6822, 2008.
Article number 682203.
(doi:10.1117/12.766578)
- [69]
- H. Wang and P. Van Mieghem.
Constructing the overlay network by tuning link weights.
In Proceedings of the Second International Conference on Communications
and Networking in China, ChinaCom 2007, pages 139–143, 2008.
(doi:10.1109/CHINACOM.2007.4469347)
- [70]
- M. Rice and
N. Alm.
Designing new interfaces for digital interactive television usable by older
adults.
Computers in Entertainment, 6(1), May 2008.
(doi:10.1145/1350843.1350849)
- [71]
- E.-H. Jung
and Y.-J. Park.
TinyONet: A cache-based sensor network bridge enabling sensing data
reusability and customized wireless sensor network services.
Sensors, 8(12):7930–7950, 2008.
(doi:10.3390/s8127930)
- [72]
- H.L.
Koch and D.W. Johnson.
Are home-based sales representatives aware and proactive regarding security
risks in the internet era?
Journal of Internet Commerce, 7(3):379–402, 2008.
(doi:10.1080/15332860802250492)
- [73]
- Z. Zeng and B. Veeravalli.
On the design of distributed object placement and load balancing strategies in
large-scale networked multimedia storage systems.
IEEE Transactions on Knowledge and Data Engineering,
20(3):369–382, 2008.
(doi:10.1109/TKDE.2007.190694)
- [74]
- H. Jiang, J. Li,
Z. Li, and J. Liu.
Efficient hierarchical content distribution using P2P technology.
In Proceedings of the 2008 16th International Conference on Networks,
ICON 2008, 2008.
(doi:10.1109/ICON.2008.4772628)
- [75]
- H. Jiang,
J. Li, Z. Li, and X. Bai.
Performance evaluation of content distribution in hybrid CDN-P2P network.
In Proceedings of the 2008 2nd International Conference on Future
Generation Communication and Networking, FGCN 2008, pages 188–193,
2008.
(doi:10.1109/FGCN.2008.63)
- [76]
- H. Jiang,
J. Liu, J. Li, and Z. Li.
A scalable system for large-scale multimedia distribution based on hybrid
networks.
In International Conference on Communication Technology Proceedings,
ICCT, pages 584–587, 2008.
(doi:10.1109/ICCT.2008.4716134)
- [77]
- S. Chung,
E. Kim, and J.C.L. Liu.
A storage saving scheme to share HD-quality content in community networks.
IEEE Transactions on Consumer Electronics, 54(4):1730–1738, 2008.
(doi:10.1109/TCE.2008.4711227)
- [78]
- B. Adams,
B. Van Rompaey, C. Gibbs, and
Y. Coady.
Aspect mining in the presence of the C preprocessor.
In Proceedings of the 4th Linking Aspect Technology and Evolution
Workshop, LATE'08 — held at the 7th International Conference on
Aspect-Oriented Software Development, 2008.
(doi:10.1145/1404953.1404954)
- [79]
- S. Zhang,
Y. Wang, and J. Xiao.
Mining individual performance indicators in collaborative development using
software repositories.
In Proceedings — Asia-Pacific Software Engineering Conference,
APSEC, pages 247–254, 2008.
- [80]
- G. Huang,
Y. Zhou, and Y. Zhang.
A small world routing model for structured P2P systems.
In 2008 International Symposium on Information Science and Engineering,
ISISE 2008, pages 632–636, 2008.
(doi:10.1109/ISISE.2008.332)
- [81]
- L. Yuhua,
Y. Chun, X. Kaihua, and
C. Hongcai.
Rank-based incentive mechanism for peer-to-peer networks.
In 4th International Conference on Natural Computation, ICNC 2008,
volume 5, pages 252–256, 2008.
(doi:10.1109/ICNC.2008.641)
- [82]
- N. Seyff,
F. Graf, P. Grünbacher, and
N. Maiden.
Mobile discovery of requirements for context-aware systems.
In Requirements Engineering: Foundation for Software Quality,
pages 183–197, 2008.
Lecture Notes in Computer Science 5025.
(doi:10.1007/978-3-540-69062-7_18)
- [83]
- Y. Hanna,
H. Rajan, and W. Zhang.
Slede: A domain-specific verification framework for sensor network security
protocol implementations.
In WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network
Security, pages 109–118, 2008.
(doi:10.1145/1352533.1352551)
- [84]
- G. Jacob,
H. Debar, and E. Filiol.
Behavioral detection of malware: From a survey towards an established taxonomy.
Journal in Computer Virology, 4(3):251–266, 2008.
(doi:10.1007/s11416-008-0086-0)
- [85]
- A. Klenk,
M. Kleis, B. Radier,
S. Elmoumouhi, G. Carle, and
M. Salaun.
Towards autonomic service control in next generation networks.
In ICAS 2008: 4th International Conference on Autonomic and Autonomous
Systems, pages 266–271, 2008.
(doi:10.1109/ICAS.2008.22)
- [86]
- C. Stern,
P. Adelt, V. Krummel, and M.R.
Ackermann.
Reliable evidence of data integrity from an untrusted storage service.
In Proceedings - 4th International Conference on Networking and Services,
ICNS 2008, pages 24–29, 2008.
(doi:10.1109/ICNS.2008.28)
- [87]
- M. Knoll,
H. Abbadi, and T. Weis.
Replication in peer-to-peer systems.
Lecture Notes in Computer Science, 5343:35–46, 2008.
(doi:10.1007/978-3-540-92157-8-4)
- [88]
- S. Rueda,
P. Morillo, and J.M. Orduña.
A comparative study of awareness methods for peer-to-peer distributed virtual
environments.
Computer Animation and Virtual Worlds, 19(5):537–552, 2008.
(doi:10.1002/cav.230)
- [89]
- M. Lopez,
J. Whalley, P. Robbins, and
R. Lister.
Relationships between reading, tracing and writing skills in introductory
programming.
In ICER'08 - Proceedings of the ACM Workshop on International Computing
Education Research, pages 101–111, 2008.
(doi:10.1145/1404520.1404531)
- [90]
- A. Nabih,
A. Hossain, S. Shepherd, and
M. Khaled.
"where you are" based authentication: An improved security protocol using BAN
logic.
In 7th European Conference on Information Warfare and Security 2008, ECIW
2008, pages 153–162, 2008.
- [91]
- T. Kosar,
P.E. Martínez López, P.A. Barrientos,
and M. Mernik.
A preliminary study on various implementation approaches of domain-specific
language.
Information and Software Technology, 50(5):390–405, 2008.
(doi:10.1016/j.infsof.2007.04.002)
- [92]
- M. Hölzl, A. Rauschmayer,
and M. Wirsing.
Engineering of software-intensive systems: State of the art and research
challenges.
In M. Hölzl, A. Rauschmayer, and
M. Wirsing, editors, Software-Intensive Systems and New
Computing Paradigms: Challenges and Visions, pages 1–44.
Springer-Verlag, 2008.
Lecture Notes in Computer Science 5380.
(doi:10.1007/978-3-540-89437-7-1)
- [93]
- H.L. Zhang,
C.H.C. Leung, and G.K. Raikundalia.
Topological analysis of AOCD-based agent networks and experimental results.
Journal of Computer and System Sciences, 74(2):255–278, 2008.
(doi:10.1016/j.jcss.2007.04.006)
- [94]
- E.S.
Poole, M. Chetty, R.E. Grinter, and
K.W. Edwards.
More than meets the eye: Transforming the user experience of home network
management.
In Proceedings of the Conference on Designing Interactive Systems:
Processes, Practices, Methods, and Techniques, DIS, pages 455–464,
2008.
(doi:10.1145/1394445.1394494)
- [95]
- M.B.
Salem, S. Hershkop, and S.J. Stolfo.
A survey of insider attack detection research.
Advances in Information Security, 39:69–70, 2008.
- [96]
- E.-C. Chang
and J. Xu.
Remote integrity check with dishonest storage server.
In Computer Security — ESORICS 2008: 13th European Symposium on
Research in Computer Security, pages 223–237, October 2008.
Lecture Notes in Computer Science 5283.
(doi:10.1007/978-3-540-88313-5-15)
- [97]
- M.K.H.
Yeung and Y.-K. Kwok.
Game theoretic peer selection for resilient peer-to-peer media streaming
systems.
In ICDCS 2008: The 28th International Conference on Distributed Computing
Systems, pages 817–824, 2008.
(doi:10.1109/ICDCS.2008.69)
- [98]
- P. Benou
and V. Bitos.
Developing mobile commerce applications.
Journal of Electronic Commerce in Organizations, 6(1):63–78,
2008.
- [99]
- A. Qamra
and E.Y. Chang.
Scalable landmark recognition using extent.
Multimedia Tools and Applications, 38(2):187–208, 2008.
(doi:10.1007/s11042-007-0178-8)
- [100]
- L. Demir and S. Tunali.
A new approach for optimal buffer allocation in unreliable production lines.
In 38th International Conference on Computers and Industrial Engineering
2008, volume 2, pages 1962–1970, 2008.
- [101]
- A. Telea
and L. Voinea.
A tool for optimizing the build performance of large software code bases.
In CSMR 2008: Proceedings of the European Conference on Software
Maintenance and Reengineering,, pages 323–325, 2008.
(doi:10.1109/CSMR.2008.4493340)
- [102]
- V. Sesum-Cavic and
E. Küehn.
Instantiation of a generic model for load balancing with intelligent
algorithms.
Lecture Notes in Computer Science, 5343:311–317, 2008.
(doi:10.1007/978-3-540-92157-8-31)
- [103]
- N.C. Romano Jr. and
J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
In Selected Readings on Electronic Commerce Technologies: Contemporary
Applications, pages 310–332. IGI Global, 2008.
(doi:10.4018/978-1-60566-096-7.ch022)
- [104]
- Z. Joseph, G. Das, and
L. Fegaras.
Distinct value estimation on peer-to-peer networks.
In 1st International Conference on Pervasive Technologies Related to
Assistive Environments, PETRA 2008, 2008.
(doi:10.1145/1389586.1389617)
- [105]
- M. Garuba,
C. Liu, and N. Washington.
A comparative analysis of anti-malware software, patch management, and
host-based firewalls in preventing malware infections on client computers.
In Proceedings — International Conference on Information Technology:
New Generations, ITNG 2008, pages 628–632, 2008.
(doi:10.1109/ITNG.2008.233)
- [106]
- M. Umarji,
S.E. Sim, and C. Lopes.
Archetypal internet-scale source code searching.
In Open Source Development, Communities and Quality: IFIP 20th World
Computer Congress, Working Group 2.3 on Open Source Software, pages
257–263. IFIP: International Federation for Information Processing,
Springer, September 2008.
(doi:10.1007/978-0-387-09684-1_21)
- [107]
- T. Nguyen,
T. Wolf, and D. Damian.
Global software development and delay: Does distance still matter?
In ICGSE 2008: 3rd IEEE International Conference Global Software
Engineering, pages 45–54, 2008.
(doi:10.1109/ICGSE.2008.39)
- [108]
- C. Rahhal,
H. Skaf-Molli, and P. Molli.
SWOOKI: A peer-to-peer semantic wiki.
In CEUR Workshop Proceedings, volume 360, pages 124–125,
2008.
- [109]
- G. Canals, P. Molli,
J. Maire, S. Lauriére,
E. Pacitti, and M. Tlili.
XWiki concerto: A P2P wiki system supporting disconnected work.
In Cooperative Design, Visualization, and Engineering. 5th International
Conference, CDVE 2008, pages 98–106, September 2008.
Lecture Notes in Computer Science 5520.
(doi:10.1007/978-3-540-88011-0_13)
- [110]
- M. Pathan,
R. Buyya, and A. Vakali.
Content delivery networks: State of the art, insights, and imperatives.
Lecture Notes in Electrical Engineering, 9 LNEE:3–32, 2008.
(doi:10.1007/978-3-540-77887-5_1)
- [111]
- C. Abalde,
V.M. Gulıas, and L.M. Castro.
Efficient discovery of widely distributed and non-volatile resources on DHTs.
In 3rd International Conference on Internet and Web Applications and
Services, ICIW 2008, pages 370–376, 2008.
(doi:10.1109/ICIW.2008.19)
- [112]
- F. Hashim,
M.R. Kibria, and A. Jamalipour.
A detection and recovery architecture against DoS and worm attacks in NGMN.
In IEEE International Conference on Communications, pages
1675–1679, 2008.
(doi:10.1109/ICC.2008.323)
- [113]
- P. Hyojin, Y. Jinhong,
P. Juyoung, G.K. Shin, and K.C.
Jun.
A survey on peer-to-peer overlay network schemes.
In International Conference on Advanced Communication Technology,
ICACT, volume 2, pages 986–988, 2008.
(doi:10.1109/ICACT.2008.4493931)
- [114]
- F. Safaei, A. Khonsari,
M. Fathy, and M. Ould-Khaoua.
Performance modelling of pipelined circuit switching in hypercubes with hot
spot traffic.
Microprocessors and Microsystems, 32(1):10–22, 2008.
(doi:10.1016/j.micpro.2007.09.002)
- [115]
- M. Gegick, L. Williams,
J. Osborne, and M. Vouk.
Prioritizing software security fortification through code-level metrics.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 31–37, 2008.
(doi:10.1145/1456362.1456370)
- [116]
- D. Sereni, M. Verbaere,
E. Hajiyev, P. Avgustinov,
T. Ekman, N. Ongkingco, and
J. Tibble.
QL: Object-oriented queries made easy.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 5235
LNCS:78–133, 2008.
(doi:10.1007/978-3-540-88643-3-3)
- [117]
- K. Gondow, H. Kawashima, and
T. Imaizumi.
TBCppA: A tracer approach for automatic accurate analysis of C
preprocessor's behaviors.
In SCAM 2008: 8th IEEE International Working Conference on Source Code
Analysis and Manipulation,, pages 35–44, 2008.
(doi:10.1109/SCAM.2008.13)
- [118]
- K. Gondow, H. Kawashima, and
T. Imaizumi.
TBCppA: Tracer-based C preprocessor analyzer.
Computer Software, 25(1):105–123, 2008.
- [119]
- M. Obrist,
R. Bernhaupt, and M. Tscheligi.
Interactive TV for the home: An ethnographic study on users' requirements and
experiences.
International Journal of Human-Computer Interaction,
24(2):174–196, 2008.
(doi:10.1080/10447310701821541)
- [120]
- S. Sarkar,
R. Sindhgatta, and K. Pooloth.
A collaborative platform for application knowledge management in software
maintenance projects.
In COMPUTE 2008 - The 1st ACM Bangalore Annual Conference, 2008.
(doi:10.1145/1341771.1341774)
- [121]
- S.-F.
Chiang, C.-H. Wu, and S.-D. Wang.
An active index diffusion scheme for multilayer unstructured peer-to-peer
networks.
In ICCCAS 2007 - International Conference on Communications, Circuits and
Systems 2007, pages 424–430, 2008.
(doi:10.1109/ICCCAS.2007.6251600)
- [122]
- D.F.
Macedo, A.L. Dos Santos, and G. Pujolle.
From TCP/IP to convergent networks: Challenges and taxonomy.
IEEE Communications Surveys and Tutorials, 10(4):40–55, 2008.
(doi:10.1109/SURV.2008.080405)
- [123]
- A.E.
Garcıa, A. Berl, K.A. Hummel,
R. Weidlich, A. Houyou, K.D.
Hackbarth, H. De Meer, and H. Hlavacs.
An economical cost model for fair resource sharing in virtual home
environments.
In 4th EURO-NGI Conference on Next Generation Internet Networks -
Proceedings, pages 153–160, 2008.
(doi:10.1109/NGI.2008.27)
- [124]
- P.C.
Sethia, S.K. Somani, and A.I. Khandwawala.
Enhancing reliability of a continuous manufacturing system using WIP buffers.
International Journal of Simulation Modelling, 7(2):61–70, 2008.
(doi:10.2507/IJSIMM07(2)1.098)
- [125]
- M.I.
Sarwar, W. Tanveer, I. Sarwar, and
W. Mahmood.
A comparative study of MI tools: Defining the roadmap to MI tools
standardization.
In IEEE INMIC 2008: 12th IEEE International Multitopic Conference -
Conference Proceedings, pages 379–385, 2008.
(doi:10.1109/INMIC.2008.4777767)
- [126]
- K.R.B.
Butler, S. McLaughlin, and P.D. McDaniel.
Rootkit-resistant disks.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 403–415, 2008.
(doi:10.1145/1455770.1455821)
- [127]
- M. Pathan and R. Buyya.
A taxonomy of CDNs.
Lecture Notes in Electrical Engineering, 9 LNEE:33–77, 2008.
(doi:10.1007/978-3-540-77887-5_2)
- [128]
- S. Bryton and F.B.E. Abreu.
Modularity-oriented refactoring.
In CSMR 2008: Proceedings of the European Conference on Software
Maintenance and Reengineering, pages 294–297, 2008.
(doi:10.1109/CSMR.2008.4493330)
- [129]
- J. Mallet and S. Rouvrais.
Style-based model transformation for early extrafunctional analysis of
distributed systems.
Lecture Notes in Computer Science, 5281 LNCS:55–70, 2008.
(doi:10.1007/978-3-540-87879-7-4)
- [130]
- J. Ubacht and J.L.M.
Vrancken.
Next generation policy for the E-communications sector: The role of the end
user and technology.
In International Telecommunication Union - Proceedings of the 1st ITU-T
Kaleidoscope Academic Conference, Innovations in NGN, K-INGN, 2008.
(doi:10.1109/KINGN.2008.4542296)
- [131]
- C.M. Zapata and J.D.
Velásquez.
Algunas pautas para la escritura de artıculos cientıficos.
Ingeniare, 16(2):128–137, 2008.
(Some hints for writing scientific papers.) In Spanish.
- [132]
- C.R.
Prause and M. Eisenhauer.
Social aspects of a continuous inspection platform for software source code.
In Proceedings - International Conference on Software Engineering,
pages 85–88, 2008.
(doi:10.1145/1370114.1370136)
- [133]
- P. Rosner and S. Viswanathan.
Visualisation of coupling and programming to interface for object-oriented
systems.
In Proceedings of the International Conference on Information
Visualisation, pages 575–581, 2008.
(doi:10.1109/IV.2008.96)
- [134]
- E. Murphy-Hill, A.P. Black,
D. Dig, and C. Parnin.
Gathering refactoring data: A comparison of four methods.
In Proceedings of the 2nd Workshop on Refactoring Tools, WRT '08, in
conjunction with the Conference on Object Oriented Programming Systems
Languages and Applications, OOPSLA 2008, 2008.
(doi:10.1145/1636642.1636649)
- [135]
- O. Ferrer-Roca, F. Marcano,
and A. Diaz-Cardama.
Quality labels for e-health.
IET Communications, 2(2):202–207, 2008.
(doi:10.1049/iet-com:20060596)
- [136]
- L. Rodero Merino,
L. López, A. Fernández, and
V. Cholvi.
DANTE: A self-adapting peer-to-peer system.
In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC
2006, pages 31–42, May 2008.
Lecture Notes in Computer Science 4461.
(doi:10.1007/978-3-540-79705-0_3)
- [137]
- Stéephane Ducasse Jannik Laval,
Alexandre Bergel.
Assessing the
quality of your software with MoQam.
In FAMOOSr 2008: 2nd Workshop on FAMIX and Moose in Reengineering,
pages 1–4, 2008.
- [138]
- H. Ito.
Available bandwidth and minimum bandwidth delivery methods for video delivery
and video replication.
In 5th International Conference on Information Technology and
Applications, ICITA 2008, pages 828–833, 2008.
- [139]
- F. Menczer, L.-S. Wu, and
R. Akavipat.
Intelligent peer networks for collaborative web search.
AI Magazine, 29(3):35–46, 2008.
- [140]
- E. Jeschke, B. Bon,
T. Inagaki, and S. Streeper.
A framework for the subaru telescope observation control system based on the
command design pattern.
In Proceedings of SPIE - The International Society for Optical
Engineering, volume 7019, 2008.
(doi:10.1117/12.788073)
- [141]
- A. Abraham, Y. Badr,
H. Liu, and C. Grosan.
A multi-swarm approach for neighbor selection in peer-to-peer networks.
In 5th International Conference on Soft Computing as Transdisciplinary
Science and Technology, CSTST '08 - Proceedings, pages 178–184, 2008.
(doi:10.1145/1456223.1456263)
- [142]
- E. Borcoci, A. Pinto,
A. Mehaoua, L. Fang, and
N. Wang.
Resource management and signalling architecture of a hybrid multicast service
for multimedia distribution.
Lecture Notes in Computer Science, 5274 LNCS:39–51, 2008.
(doi:10.1007/978-3-540-87359-4-5)
- [143]
- I. Dacosta, N. Mehta,
E. Metrock, and J. Giffin.
Security analysis of an IP phone: Cisco 7960G.
In IPTComm 2008: Principles, Systems and Applications of IP
Telecommunications. Services and Security for Next Generation Networks —
Second International Conference, pages 236–255, July 2008.
Lecture Notes in Computer Science 5310.
(doi:10.1007/978-3-540-89054-6-12)
- [144]
- J. Ramırez, L. Gimson,
G. Gil, E. Fernández,
D. Romero, D. Arias, A. Vera,
and E. Sanchez.
The reuse of libraries in moodle: Impact on the estimation of the development
of a similar platform.
In 7th Ibero-American Conference on Systems, Cybernetics and Informatics,
CISCI 2008, Jointly with the 5th Ibero-American Symposium on Education,
Cybernetics and Informatics, SIECI 2008 and 3rd Int. Symp. on Knowledge
Communication and Conf. CCC 2008, volume 2, pages 194–198.
International Institute of Informatics and Systemics, IIIS, 2008.
- [145]
- C. Åhlund, S. Wallin,
K. Andersson, and R. Brännström.
A service level model and internet mobility monitor.
Telecommunication Systems, 37(1-3):49–70, 2008.
(doi:10.1007/s11235-008-9072-6)
- [146]
- L. Youseff, M. Butrico, and
D. Da Silva.
Toward a unified ontology of cloud computing.
In Grid Computing Environments Workshop, GCE 2008, 2008.
(doi:10.1109/GCE.2008.4738443)
- [147]
- J. Schäfer, K. Malinka,
and P. Hanáček.
Peer-to-peer networks security.
In ICIMP 2008: The 3rd International Conference on Internet Monitoring
and Protection, pages 74–79, 2008.
(doi:10.1109/ICIMP.2008.26)
- [148]
- J. Schäfer, K. Malinka,
and P. Hanáček.
Malware spreading models in peer-to-peer networks.
In International Carnahan Conference on Security Technology, pages
339–345, 2008.
(doi:10.1109/CCST.2008.4751325)
- [149]
- K. Iwasaki, M. Kanbara,
K. Yamazawa, and N. Yokoya.
Construction of extended geographical database based on photo shooting history.
In CIVR 2008: Proceedings of the International Conference on
Content-based Image and Video Retrieval, pages 185–194, 2008.
(doi:10.1145/1386352.1386381)
- [150]
- Y. Haining, L.H. Etzkorn, and
S. Virani.
Automated classification and retrieval of reusable software components.
Journal of the American Society for Information Science and
Technology, 59(4):613–627, 2008.
(doi:10.1002/asi.20775)
- [151]
- P. Traynor, P. McDaniel, and
T.L. Porta.
Security for telecommunications networks.
Advances in Information Security, 40:1–177, 2008.
- [152]
- G. Oleksik, D. Frohlich,
L.M. Brown, and A. Sellen.
Sonic interventions: Understanding and extending the domestic soundscape.
In Conference on Human Factors in Computing Systems - Proceedings,
pages 1419–1428, 2008.
(doi:10.1145/1357054.1357277)
- [153]
- T. Koskela, O. Kassinen,
J. Korhonen, Z. Ou, and
M. Ylianttila.
Peer-to-peer community management using structured overlay networks.
In Proceedings of the International Conference on Mobile Technology,
Applications, and Systems, Mobility'08, 2008.
(doi:10.1145/1506270.1506283)
- [154]
- T. Koskela, J. Julkunen,
J. Korhonen, M. Liu, and
M. Ylianttila.
Leveraging collaboration of peer-to-peer and web services.
In Proceedings — The 2nd International Conference on Mobile Ubiquitous
Computing, Systems, Services and Technologies, UBICOMM 2008, pages
496–501, 2008.
(doi:10.1109/UBICOMM.2008.24)
- [155]
- F. Turkmen, P. Mazzoleni,
B. Crispo, and E. Bertino.
P-CDN: Extending access control capabilities of P2P systems to provide
CDN services.
In Proceedings — IEEE Symposium on Computers and Communications,
pages 480–486, 2008.
(doi:10.1109/ISCC.2008.4625671)
- [156]
- M. Czyrnek, E. Kuśmierek,
C. Mazurek, and M. Stroiński.
New services for iTVP content providers to manage live and on-demand content
streaming.
In Proceedings - 4th International Conference on Automated Solutions for
Cross Media Content and Multi-Channel Distribution, Axmedis 2008,
pages 180–186, 2008.
(doi:10.1109/AXMEDIS.2008.28)
- [157]
- S. Hatahet, A. Bouabdallah,
and Y. Challal.
A new worm propagation threat in bittorrent: Modeling and analysis.
In Proceedings of the International Multiconference on Computer Science
and Information Technology, IMCSIT 2008, volume 3, pages 791–798,
2008.
(doi:10.1109/IMCSIT.2008.4747333)
- [158]
- N. Folinas, P. Vassiliadis,
E. Pitouri, E. Papapetrou, and
A. Zarras.
Context-aware query processing in ad-hoc environments of peers.
Journal of Electronic Commerce in Organizations, 6(1):38–62,
2008.
- [159]
- M.E.
Falagas, E.A. Karveli, and V.I. Tritsaroli.
The risk of using the internet as reference resource: A comparative study.
International Journal of Medical Informatics, 77(4):280–286,
2008.
(doi:10.1016/j.ijmedinf.2007.07.001)
- [160]
- M.J.V.
Pereira, M. Mernik, D. da Cruz, and
P.R. Henriques.
Program comprehension for domain-specific languages.
Computer Science and Information Systems, 5(2):1–17, 2008.
(doi:10.2298/CSIS0802001P)
- [161]
- L.S.G.
Piccolo, M.C.C. Baranauskas, and E. Furtado.
A t-gov prototype evaluation considering a wide diversity of users.
In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information
Systems; Proceedings of Interfaces and Human Computer Interaction
2008, pages 27–34, 2008.
- [162]
- J.-M.
Borello and L. Mé.
Code obfuscation techniques for metamorphic viruses.
Journal in Computer Virology, 4(3):211–220, 2008.
(doi:10.1007/s11416-008-0084-2)
- [163]
- G. Fortino and W. Russo.
Using P2P, GRID and agent technologies for the development of content
distribution networks.
Future Generation Computer Systems, 24(3):180–190, 2008.
(doi:10.1016/j.future.2007.06.007)
- [164]
- J.P.
Correia and J. Visser.
Benchmarking technical quality of software products.
In Working Conference on Reverse Engineering, WCRE, pages
297–300, 2008.
(doi:10.1109/WCRE.2008.16)
- [165]
- A. Zaidman and S. Demeyer.
Automatic identification of key classes in a software system using webmining
techniques.
Journal of Software Maintenance and Evolution, 20(6):387–417,
2008.
(doi:10.1002/smr.370)
- [166]
- E.S.
Furtado and V. Furtado.
A multi-disciplinary strategy for identifying affective usability aspects in
educational geosimulation systems.
International Journal of Information and Communication Technology
Education, 4(1):15–24, 2008.
- [167]
- M. Yoshida and K. Sakamoto.
Performance comparison of load balancing algorithms through code migration in
distributed desktop computing grids.
In Proceedings of the 3rd IEEE Asia-Pacific Services Computing
Conference, APSCC 2008, pages 781–788, 2008.
(doi:10.1109/APSCC.2008.60)
- [168]
- S. Shirali-Shahreza and
M. Shirali-Shahreza.
Various aspects of open source software development.
In ITSim '08: International Symposium on Information Technology,
volume 3, 2008.
(doi:10.1109/ITSIM.2008.4631871)
- [169]
- W. Taha.
Domain-specific languages.
In 2008 International Conference on Computer Engineering and Systems,
ICCES 2008, 2008.
(doi:10.1109/ICCES.2008.4772953)
- [170]
- D. Ueno.
Linenum info: System support for code reading.
In ICALT 2008: The 8th IEEE International Conference on Advanced Learning
Technologies, pages 600–602, 2008.
(doi:10.1109/ICALT.2008.162)
- [171]
- R.P. Loui.
In praise of scripting: Real programming pragmatism.
Computer, 41(7):22–26, 2008.
(doi:10.1109/MC.2008.228)
- [172]
- J.D. Wren.
URL decay in MEDLINE — a 4-year follow-up study.
Bioinformatics, 24(11):1381–1385, 2008.
(doi:10.1093/bioinformatics/btn127)
- [173]
- K. Kotapati, P. Liu, and
T.F. LaPorta.
EndSec: An end-to-end message security protocol for mobile telecommunication
networks.
In WoWMoM 2008: IEEE International Symposium on A World of Wireless,
Mobile and Multimedia Networks, 2008.
(doi:10.1109/WOWMOM.2008.4594919)
- [174]
- H. Yamamoto, J. Abu Qudeiri,
and E. Marui.
Definition of FTL with bypass lines and its simulator for buffer size
decision.
International Journal of Production Economics, 112(1):18–25,
2008.
(doi:10.1016/j.ijpe.2007.03.007)
- [175]
- S. Schosser, K. Böhm,
and B. Vogt.
Do humans identify efficient strategies in structured peer-to-peer systems?
In 7th International Joint Conference on Autonomous Agents and Multiagent
Systems, AAMAS 2008, volume 3, pages 1481–1484. International
Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2008.
- [176]
- S. Schosser, K. Böhm,
and B. Vogt.
Online vs. offline behavior: How to design strategic agents for distributed
coordinator-free environments.
In Proceedings - 2008 IEEE/WIC/ACM International Conference on
Intelligent Agent Technology, IAT 2008, pages 48–56, 2008.
(doi:10.1109/WIIAT.2008.10)
- [177]
- M. Lindgren, A. Wall,
R. Land, and C. Norstr?m.
A method for balancing short- and long-term investments: Quality vs. features.
In EUROMICRO 2008 - Proceedings of the 34th EUROMICRO Conference on
Software Engineering and Advanced Applications, SEAA 2008, pages
175–182, 2008.
(doi:10.1109/SEAA.2008.22)
- [178]
- M. Lindgren, R. Land,
C. Norström, and A. Wall.
Key aspects of software release planning in industry.
In ASWEC 2008: Proceedings of the Australian Software Engineering
Conference, pages 320–329, 2008.
(doi:10.1109/ASWEC.2008.4483220)
- [179]
- P. Naubourg, V. Lopes, and
L. Bossu.
A case study of open source software development in proteomic area: The LIMS
ePims.
In SITIS 2008 — Proceedings of the 4th International Conference on
Signal Image Technology and Internet Based Systems, pages 555–562,
2008.
(doi:10.1109/SITIS.2008.83)
- [180]
- P. Gotthelf, A. Zunino,
C. Mateos, and M. Campo.
GMAC: An overlay multicast network for mobile agent platforms.
Journal of Parallel and Distributed Computing, 68(8):1081–1096,
2008.
(doi:10.1016/j.jpdc.2008.04.002)
- [181]
- D. Matthews, G. Wilson, and
S. Easterbrook.
Configuration management for large-scale scientific computing at the UK met
office.
Computing in Science and Engineering, 10(6):56–64, 2008.
(doi:10.1109/MCSE.2008.144)
- [182]
- A. Roczniak, A.E. Saddik, and
R. Kouhi.
Design of application-specific incentives in p2p networks.
In Proceedings - 12th 2008 IEEE/ACM International Symposium on
Distributed Simulation and Real Time Applications, DS-RT 2008, pages
194–203, 2008.
(doi:10.1109/DS-RT.2008.17)
- [183]
- W. Zhangjin, H. Xingwen,
D. Ying, Z. Rui, and Z. Qingguo.
A CGI+AJAX+SVG based monitoring method for distributed and embedded
system.
In U-Media 2008: The 1st IEEE International Conference on Ubi-Media
Computing and Workshops, pages 144–148, 2008.
(doi:10.1109/UMEDIA.2008.4570880)
- [184]
- E. Kageyama, C. Maziero, and
A. Santin.
A pull-based e-mail architecture.
In Proceedings of the ACM Symposium on Applied Computing, pages
468–472, 2008.
(doi:10.1145/1363686.1363802)
- [185]
- E. Kageyama, C. Maziero, and
A. Santin.
An experimental peer-to-peer e-mail system.
In CSE 2008: IEEE 11th International Conference on Computational Science
and Engineering, pages 203–208, 2008.
(doi:10.1109/CSE.2008.9)
- [186]
- A. Keramati, B. Hadjiha, and
M.S. Saremi.
A proposal framework for adoption of electronic payment services by iranian
customers.
In IEEE International Conference on Industrial Informatics
(INDIN), pages 592–597, 2008.
(doi:10.1109/INDIN.2008.4618169)
- [187]
- I. Tamanini, T.C.
Sampaio Machado, M.S. Mendes, A.L. Carvalho,
M.E.S. Furtado, and P.R. Pinheiro.
A model for mobile television applications based on verbal decision analysis.
In Advances in Computer and Information Sciences and Engineering,
pages 399–404, 2008.
- [188]
- E. Georgiou, M.D. Dikaiakos,
and A. Stassopoulou.
On the properties of spam-advertised URL addresses.
Journal of Network and Computer Applications, 31(4):966–985,
2008.
(doi:10.1016/j.jnca.2007.01.003)
- [189]
- A. Bonifati, P.K.
Chrysanthis, A.M. Ouksel, and K.-U. Sattler.
Distributed databases and peer-to-peer databases: Past and present.
SIGMOD Record, 37(1):5–11, 2008.
(doi:10.1145/1374780.1374781)
- [190]
- S.M.
Bellovin, M. Blaze, W. Diffie,
S. Landau, P.G. Neumann, and
J. Rexford.
Risking communications security: Potential hazards of the Protect America
Act.
IEEE Security and Privacy, 6(1):24–33, 2008.
(doi:10.1109/MSP.2008.17)
- [191]
- A.L.
Carvalho, M. Mendes, P. Pinheiro, and
E. Furtado.
Analysis of the interaction design for mobile TV applications based on
multicriteria.
IFIP TC 8 WG 8.9 International Conference on Research and Practical
lssues of Enterprise Information Systems, CONFENIS 2007, 254 VOLUME
1:389–394, 2008.
- [192]
- G.I.
Doukidis, K. Pramatari, and G. Lekakos.
OR and the management of electronic services.
European Journal of Operational Research, 187(3):1296–1309, 2008.
(doi:10.1016/j.ejor.2006.09.014)
- [193]
- A.M.
Sourouni, S. Mouzakitis, D. Askounis, and
G. Velegrakis.
An ontology-based e-business transactions registry.
In MCCSIS'08 — IADIS Multi Conference on Computer Science and
Information Systems; Proceedings e-Commerce 2008, pages 86–93,
2008.
- [194]
- C.E.
Alexakos, K.I. Paraskevopoulos, K.V. Votis,
and S.D. Likothanassis.
Ontology-supported indexing in P2P networks of digital libraries.
International Journal of Web Engineering and Technology,
4(1):44–69, 2008.
(doi:10.1504/IJWET.2008.016104)
- [195]
- Valery Golender, Ido Ben
Moshe, and Shlomo Wygodny.
System
and method for troubleshooting software configuration problems using
application tracing.
United States Patent 7,386,839, June 2008.
- [196]
- Sufatrio
and R.H.C. Yap.
Extending BAN logic for reasoning with modern PKI-based protocols.
In 2008 IFIP International Conference on Network and Parallel Computing,
NPC 2008, pages 190–197, 2008.
(doi:10.1109/NPC.2008.86)
- [197]
- A. D'Aguanno and G. Haus.
Audio fingerprint and its applications to peer-to-peer systems.
In Audio Engineering Society - 124th Audio Engineering Society Convention
2008, volume 1, pages 86–94, 2008.
- [198]
- M.F.
Casserly and J.E. Bird.
Web citation availability.
Library Resources and Technical Services, 52(1):42–53, 2008.
- [199]
- Ghazi I. Alkhatib and David C.
Rine.
Preface.
In Agent Technologies and Web Engineering: Applications and
Systems, pages xv–xvii. IGI Global, 2008.
(doi:10.4018/978-1-60566-618-1)
- [200]
- Yves
Barlette and Vladislav V. Fomin.
Exploring the suitability of is security management standards for smes.
In Proceedings of the 41st Annual Hawaii International Conference on
System Sciences, pages 308–308, 2008.
(doi:10.1109/HICSS.2008.167)
- [201]
- Indratmo and J. Vassileva.
A review of organizational structures of personal information management.
Journal of Digital Information, 9(26), 2008.
- [202]
- Y. Alkabani and
F. Koushanfar.
Designer's hardware Trojan horse.
In HOST 2008: IEEE International Workshop on Hardware-Oriented Security
and Trust, pages 82–83, 2008.
(doi:10.1109/HST.2008.4559059)
- [203]
- H. Ghanbari and
C. Constantinides.
An algebraic query method for static program analysis and measurement.
In 17th International Conference on Software Engineering and Data
Engineering, SEDE 2008, pages 174–181, 2008.
- [204]
- M.R. Martınez Torres,
S.L. Toral Marın, and F.J.
Barrero Garcıa.
Study and analysis of open source software projects mailing lists as a tool for
knowledge sharing.
Investigaciones Europeas de Direccion y Economia de la Empresa,
14(3):79–90, 2008.
(doi:10.1016/S1135-2523(12)60068-9)
- [205]
- T. Mandl.
Automatic quality assessment for internet pages.
In Handbook of Research on Web Information Systems Quality, pages
104–112. IGI Global, 2008.
(doi:10.4018/978-1-59904-847-5.ch006)
- [206]
- A. Davis.
Enterprise resource planning under open source software.
Enterprise Resource Planning for Global Economies: Managerial Issues and
Challenges, pages 56–76, 2008.
(doi:10.4018/978-1-59904-531-3.ch004)
- [207]
- Robert L. Glass.
Open source vs. proprietary software: Yet another answer to the quality
comparison.
Software Practitioner, pages 1,4, 2008.
- [208]
- A. Aikebaier, T. Enokido, and
M. Takizawa.
A distributed coordination protocol in an order-heterogeneous group.
International Journal of Web and Grid Services, 4(1):5–23, 2008.
(doi:10.1504/IJWGS.2008.018486)
- [209]
- L. Becchetti, U. Colesanti,
A. Marchetti-Spaccamela, and A. Vitaletti.
Self-adaptive recommendation systems: Models and experimental analysis.
In Proceedings - 2nd IEEE International Conference on Self-Adaptive and
Self-Organizing Systems, SASO 2008, pages 479–480, 2008.
(doi:10.1109/SASO.2008.55)
- [210]
- C. Spielvoge,
L. Böszörmenyi, and P. Kropf.
A demo for affinity based content delivery architectures.
In Proceedings of the International Workshop on Network and Operating
System Support for Digital Audio and Video, pages 107–108, 2008.
(doi:10.1145/1496046.1496071)
- [211]
- A.M.
Bernardos, P. Tarrıo, J. Iglesias, and
J.R. Casar.
Diseño y despliegue de servicios móviles basados en contexto: Un caso
de estudio.
In 3rd Iberian Conference on Information Systems and Technologies, CISTI
2008, 2008.
- [212]
- M.V.J. Heikkinen and
H. Hammaınen.
Scenario planning of mobile peer-to-peer service usage.
In 7th International Conference on Mobile Business, ICMB 2008, Creativity
and Convergence, pages 145–152, 2008.
(doi:10.1109/ICMB.2008.15)
- [213]
- A. Tiwana.
Impact of classes of development coordination tools on software development
performance: A multinational empirical study.
ACM Transactions on Software Engineering and Methodology, 17(2),
2008.
(doi:10.1145/1348250.1348257)
- [214]
- Eelco Visser.
WebDSL: A case study in domain-specific language engineering.
In Generative and Transformational Techniques in Software Engineering II:
International Summer School, GTTSE 2007, pages 291–373, July 2008.
Lecture Notes in Computer Science 5235.
(doi:10.1007/978-3-540-88643-3_7)
- [215]
- V. Zadorozhny, L. Raschid,
and A. Gal.
Scalable catalog infrastructure for managing access costs and source selection
in wide area networks.
International Journal of Cooperative Information Systems,
17(1):77–109, March 2008.
(doi:10.1142/S0218843008001786)
- [216]
- M. Freiberger and S. Huq.
Network element security in optical communications equipment.
In National Fiber Optic Engineers Conference, NFOEC 2008. Optical
Society of America, 2008.
- [217]
- S. Montanelli and S. Castano.
Semantically routing queries in peer-based systems: The H-Link approach.
Knowledge Engineering Review, 23(1):51–72, 2008.
(doi:10.1017/S0269888907001257)
- [218]
- D. Cabanillas and
S. Willmott.
Studying viable free markets in peer-to-peer file exchange applications without
altruistic agents.
In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC
2006, pages 151–158, May 2008.
Lecture Notes in Computer Science 4461.
(doi:10.1007/978-3-540-79705-0_14)
- [219]
- G. Exarchakos and
N. Antonopoulos.
Non-replicable reusable resources discovery on scale-free peer-to-peer
networks.
In 2nd IEEE International Conference on Digital Ecosystems and
Technologies, IEEE-DEST 2008, pages 28–33, 2008.
(doi:10.1109/DEST.2008.4635188)
- [220]
- M. Cassell.
Why governments innovate: Adoption and implementation of open source software
by four European cities.
International Public Management Journal, 11(2):193–213, 2008.
(doi:10.1080/10967490802095680)
- [221]
- R. Gelbard.
Decision rule for investment in frameworks of reuse.
In Handbook of Research on Modern Systems Analysis and Design
Technologies and Applications, pages 140–147. IGI Global, 2008.
(doi:10.4018/978-1-59904-887-1.ch010)
- [222]
- E. Mourtou.
Modelling access control in a greek public hospital.
Journal on Information Technology in Healthcare, 6(3):230–239,
2008.
- [223]
- A.U. Schmidt.
On the superdistribution of digital goods.
In 3rd International Conference on Communications and Networking in
China, ChinaCom 2008, pages 1337–1344, 2008.
(doi:10.1109/CHINACOM.2008.4685251)
- [224]
- S.A. Sioutas.
NBDT: An efficient P2P indexing scheme for web service discovery.
International Journal of Web Engineering and Technology,
4(1):95–113, 2008.
(doi:10.1504/IJWET.2008.016106)
- [225]
- F.J. Seifert.
Safety from deception through broadband coding the Austrian victory over the
hackers at Graz in 1991.
Elektrotechnik und Informationstechnik, 125(11), 2008.
In German (Täuschungssicherheit durch Breitbandige Verschlüsselung Der
Österreichische Sieg uber die Hacker bei Graz 1991).
(doi:10.1007/s00502-008-0588-y)
- [226]
- Israel Herraiz.
A statistical
examination of the properties and evolution of libre software.
PhD thesis, Universidad Rey Juan Carlos, Madrid, 2008.
- [227]
- Robert C.
Seacord.
The CERT C Secure Coding Standard.
Addison-Wesley, Boston, MA, 2008.
- [228]
- T. Haenselmann, T. King,
M. Busse, W. Effelsberg, and
M. Fuchs.
Embedded script-driven home-automation with sensor networks.
1st IFIP WG 6.2 Home Networking Conference, IHN 2007,
256:225–238, 2008.
- [229]
- S. Alshattnawi, G. Canals,
and P. Molli.
Concurrency awareness in a P2P wiki system.
In 2008 International Symposium on Collaborative Technologies and
Systems, CTS'08, pages 285–294, 2008.
(doi:10.1109/CTS.2008.4543942)
- [230]
- M. Abdelouahab, H.R. Hassen,
A. Bouabdallah, M. Achemlal, and
S. Laniepce.
TCA: Topology change attack in peer-to-peer networks.
In Workshop on Mobile and Wireless Networks Security, MWNS 2008,
pages 13–25, 2008.
- [231]
- G. Frantzeskou, S. MacDonell,
E. Stamatatos, and S. Gritzalis.
Examining the significance of high-level programming features in source code
author classification.
Journal of Systems and Software, 81(3):447–460, 2008.
(doi:10.1016/j.jss.2007.03.004)
- [232]
- G. Spanoudakis, C. Kloukinas,
and K. Androutsopoulos.
Dynamic verification and control of mobile peer-to-peer systems.
In ICIMP 2008: The 3rd International Conference on Internet Monitoring
and Protection, pages 1–10, 2008.
(doi:10.1109/ICIMP.2008.11)
- [233]
- V.I.
Gorodetskii, O.V. Karsaev, V.V. Samoilov, and
S.V. Serebryakov.
Development tools for open agent networks.
Journal of Computer and Systems Sciences International,
47(3):429–446, 2008.
(doi:10.1134/S1064230708030131)
- [234]
- M. Yuzukirmizi and J. M.
Smith.
Optimal buffer allocation in finite closed networks with multiple servers.
Computers and Operations Research, 35(8):2579–2598, 2008.
(doi:10.1016/j.cor.2006.12.008)
- [235]
- S. Counsell.
Is the need to follow chains a possible deterrent to certain refactorings and
an inducement to others?
In Proceedings of the 2nd International Conference on Research Challenges
in Information Science, RCIS 2008, pages 111–122, 2008.
(doi:10.1109/RCIS.2008.4632099)
- [236]
- Z. Khallouf.
Trust management in peer-to-peer SIP using the security assertion markup
language.
In ICTTA 2008: 3rd International Conference on Information and
Communication Technologies: From Theory to Applications, 2008.
(doi:10.1109/ICTTA.2008.4530277)
- [237]
- P. Grobelny.
The expert system approach in development of loosely coupled software with use
of domain specific language.
In Proceedings of the International Multiconference on Computer Science
and Information Technology, IMCSIT 2008, volume 3, pages 119–123,
2008.
(doi:10.1109/IMCSIT.2008.4747227)
- [238]
- B.R. Krogstie.
Power through brokering: Open source community participation in software
engineering student projects.
In Proceedings - International Conference on Software Engineering,
pages 791–800, 2008.
(doi:10.1145/1368088.1368201)
- [239]
- J.A. Solworth.
Instant revocation.
In Public Key Infrastructure: 5th European PKI Workshop: Theory and
Practice, EuroPKI 2008, pages 31–48, 2008.
Lecture Notes in Computer Science 5057.
(doi:10.1007/978-3-540-69485-4_3)
- [240]
- A.D. Kshemkalyani and
M. Singhal.
Distributed computing: Principles, algorithms, and systems.
Cambridge University Press, 2008.
(doi:10.1017/CBO9780511805318)
- [241]
- K. Somasundaram and
S. Radhakrishnan.
Nimble protein sequence alignment in grid (NPSAG).
Journal of Computer Science, 4(1):36–41, 2008.
- [242]
- D.A.
Carrington.
What can software engineering students learn from studying open source
software?
International Journal of Engineering Education, 24(4):729–737,
2008.
- [243]
- H. Ghasemalizadeh and
M. Razzazi.
A distributed web service retrieval and composition method.
In 31st International Convention Proceedings: Digital Economy - 5th
ALADIN, Information Systems Security, Business Intelligence Systems, Local
Government and Student Papers, volume 5, pages 253–258, 2008.
- [244]
- M. Ramachandran.
Software components: Guidelines and applications.
Nova Science Publishers, Inc., 2008.