[1]
A. Aaltonen and G.F. Lanzara. Governing social production in the internet: The case of Wikipedia. In 19th European Conference on Information Systems, ECIS 2011, 2011.

[2]
W. Abdul-Kader, O. Ganjavi, and F. Baki. A nonlinear model for optimizing the performance of a multi-product production line. International Transactions in Operational Research, 18(5):561–577, 2011. (doi:10.1111/j.1475-3995.2011.00814.x)

[3]
A. Abraham, H. Liu, and A.E. Hassanien. Multi swarms for neighbor selection in peer-to-peer overlay networks. Telecommunication Systems, 46(3):195–208, 2011. (doi:10.1007/s11235-010-9285-3)

[4]
R. Ahmed and R. Boutaba. A survey of distributed search techniques in large scale distributed systems. IEEE Communications Surveys and Tutorials, 13(2):150–167, 2011. (doi:10.1109/SURV.2011.040410.00097)

[5]
J. Al Dallal. Improving the applicability of object-oriented class cohesion metrics. Information and Software Technology, 53(9):914–928, 2011. (doi:10.1016/j.infsof.2011.03.004)

[6]
K.R. Al-Momani and J.E.A. Qudeiri. Modelling of parallel production system with rework paths and its GA based simulator for optimal design. International Journal of Manufacturing Technology and Management, 23(1-2):69–81, 2011. (doi:10.1504/IJMTM.2011.042109)

[7]
M. Albert, J. Cabot, C. Gómez, and V. Pelechano. Generating operation specifications from UML class diagrams: A model transformation approach. Data and Knowledge Engineering, 70(4):365–389, 2011. (doi:10.1016/j.datak.2011.01.003)

[8]
E. Alsaggaf and F. Albouraey. Use of agents in building integration tool for component-based application. Communications in Computer and Information Science, 179 CCIS(PART 1):1–15, 2011. (doi:10.1007/978-3-642-22170-5_1)

[9]
M. Alshayeb. The impact of refactoring on class and architecture stability. Journal of Research and Practice in Information Technology, 43(4):269–284, 2011.

[10]
M. Alshayeb. The impact of refactoring to patterns on software quality attributes. Arabian Journal for Science and Engineering, 36(7):1241–1251, 2011. (doi:10.1007/s13369-011-0111-3)

[11]
T.L. Alves, J.P. Correia, and J. Visser. Benchmark-based aggregation of metrics to ratings. In Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011, pages 20–29, 2011. (doi:10.1109/IWSM-MENSURA.2011.15)

[12]
M. Anagnostaki. Community service in greece: Sentencing practices, the role of the prosecution service and local authorities. European Journal of Criminology, 8(2):157–166, 2011. (doi:10.1177/1477370810397256)

[13]
N. Anwar, M.N. Masrek, and Y.R. Rambli. Moderating effect between information systems resources and information security: A conceptual framework. In ISBEIA 2011 - 2011 IEEE Symposium on Business, Engineering and Industrial Applications, pages 247–252, 2011. (doi:10.1109/ISBEIA.2011.6088815)

[14]
J.J.P. Arias, A. Fernández Vilas, R.P. Dıaz Redondo, A. Gil Solla, M. Ramos Cabrer, and J. Garcıa Duque. Making the most of TV on the move: My newschannel. Information Sciences, 181(4):855–868, 2011. (doi:10.1016/j.ins.2010.10.017)

[15]
P. Arpaia, L. Fiscarelli, , and C. Petrone. A model-driven domain-specific scripting language for measurement-system frameworks. IEEE Transactions on Instrumentation and Measurement, 60(12):3756–3766, 2011. (doi:10.1109/TIM.2011.2149310)

[16]
M. Arzoky, S. Swift, A. Tucker, and J. Cain. Munch: An efficient modularisation strategy to assess the degree of refactoring on sequential source code checkings. In Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2011, pages 422–429, 2011. (doi:10.1109/ICSTW.2011.87)

[17]
S.A. Asghari, H.G. Zadeh, H. Taheri, and H. Pedram. Designing a self-organised system for service substitution and placement in wireless sensor networks. IET Wireless Sensor Systems, 1(4):200–205, 2011. (doi:10.1049/iet-wss.2011.0022)

[18]
K. Ashraf, R. Anane, and N. Blundell. Resilient and secure file dispersal in a mobile P2P system. In Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pages 555–560, 2011. (doi:10.1109/WAINA.2011.149)

[19]
L. Auer, J. Juntunen, and P. Ojala. Open source project as a pedagogical tool in higher education. In Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, MindTrek 2011, pages 207–213, 2011. (doi:10.1145/2181037.2181073)

[20]
Matthew S. Augustine, Arnold N. Blinn, John D. Elliott, and Don M. Gillett. Services for data sharing and synchronization. United States Patent 7,933,296, April 2011. Assignee: Microsoft Corporation (Redmond, WA).

[21]
L. Aversano and M. Tortorella. Applying EFFORT for evaluating CRM open source systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6759 LNCS:202–216, 2011. (doi:10.1007/978-3-642-21843-9_17)

[22]
G. Bailly, E. Lecolinet, and Y. Guiard. A space characterization of the remote control in the context of interactive television. In ACM International Conference Proceeding Series, 2011. (doi:10.1145/2044354.2044375)

[23]
H.M.N.D. Bandara and A.P. Jayasumana. Exploiting communities for enhancing lookup performance in structured P2P systems. In IEEE International Conference on Communications, 2011. (doi:10.1109/icc.2011.5962882)

[24]
S. Basagiannis, P. Katsaros, and A. Pombortsis. Synthesis of attack actions using model checking for the verification of security protocols. Security and Communication Networks, 4(2):147–161, 2011. (doi:10.1002/sec.119)

[25]
Douglas D. Beattie, Neal Lewis Creighton, Jr., Christopher T. M. Bailey, David L. Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 8,028,162, September 2011. Assignee: GeoTrust, Inc. (Wellesley Hills, MA).

[26]
L. Becchetti, U.M. Colesanti, A. Marchetti-Spaccamela, and A. Vitaletti. Recommending items in pervasive scenarios: Models and experimental analysis. Knowledge and Information Systems, 28(3):555–578, 2011. (doi:10.1007/s10115-010-0338-4)

[27]
A. Becker, T. Widjaja, and P. Buxmann. Nutzenpotenziale und herausforderungen des einsatzes von serviceorientierten architekturen : Ergebnisse einer empirischen untersuchung aus anwender- und herstellersicht. Wirtschaftsinformatik, 53(4):187–199, 2011. (doi:10.1007/s11576-011-0280-4)

[28]
A. Becker, T. Widjaja, and P. Buxmann. Value potentials and challenges of service-oriented architectures results of an empirical survey from user and vendor perspective. Business and Information Systems Engineering, 3(4):199–210, 2011. (doi:10.1007/s12599-011-0167-3)

[29]
M.V. Belmonte, M. Dıaz, and A. Reyna. A coalition based incentive mechanism for P2P content distribution systems. In ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, volume 2, pages 15–24, 2011.

[30]
W. Ben Jaballah, M. Mosbah, H. Youssef, O. Ly, and A. Meddeb. Modeling source authentication protocols in wireless sensor networks using HLPSL. In 2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings, 2011. (doi:10.1109/SAR-SSI.2011.5931362)

[31]
A. Bergmayr. Reuseme - towards aspect-driven reuse in modelling method development. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6627 LNCS:4–18, 2011. (doi:10.1007/978-3-642-21210-9_2)

[32]
J. Bernedixen and A.H.C. Ng. Optimal buffer allocation for semi-synchronized automotive assembly lines using simulation-based multi-objective optimization. In 2011 9th International Industrial Simulation Conference, ISC 2011, pages 129–135. EUROSIS, 2011.

[33]
M.A. Besbes and H. Hamam. An intelligent RFID checkout for stores. In Proceedings of the International Conference on Microelectronics, ICM, 2011. (doi:10.1109/ICM.2011.6177362)

[34]
J. Bo. Flooding-based resource locating in peer-to-peer networks. Lecture Notes in Electrical Engineering, 97 LNEE(VOL. 1):671–678, 2011. (doi:10.1007/978-3-642-21697-8_85)

[35]
F. Boem, R.M.G. Ferrari, and T. Parisini. Distributed fault detection and isolation of continuous-time non-linear systems. European Journal of Control, 17(5-6):603–620, 2011. (doi:10.3166/EJC.17.603-620)

[36]
David Boles, H. Bret Young, and Jack Basiago. System and method for defining and implementing policies in a database system. United States Patent 7,962,513, June 2011. Assignee: Crossroads Systems, Inc. (Austin, TX).

[37]
L. Böszörmenyi, M. Del Fabro, M. Kogler, M. Lux, O. Marques, and A. Sobe. Innovative directions in self-organized distributed multimedia systems. Multimedia Tools and Applications, 51(2):525–553, 2011. (doi:10.1007/s11042-010-0622-z)

[38]
B. Braatz and C. Brandt. Domain-specific modelling languages with algebraic graph transformations on RDF. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6563 LNCS:82–101, 2011. (doi:10.1007/978-3-642-19440-5_6)

[39]
B.R. Bryant, J. Gray, M. Mernik, P.J. Clarke, R.B. France, and G. Karsai. Challenges and directions in formalizing the semantics of modeling languages. Computer Science and Information Systems, 8(2):225–253, 2011. (doi:10.2298/CSIS110114012B)

[40]
E. Capra, C. Francalanci, F. Merlo, and C. Rossi-Lamastra. Firms' involvement in open source projects: A trade-off between software structural quality and popularity. Journal of Systems and Software, 84(1):144–161, 2011. (doi:10.1016/j.jss.2010.09.004)

[41]
J. Carter. An architecture for Concordia. In ACM International Conference Proceeding Series, 2011. (doi:10.1145/2179298.2179353)

[42]
H. Castro and A.P. Alves. A P2P content delivery system for alternative business models harnessing internet's full potential. In Proceedings of the 2011 7th International Conference on Next Generation Web Services Practices, NWeSP 2011, pages 86–92, 2011. (doi:10.1109/NWeSP.2011.6088158)

[43]
T. Cerny and M.J. Donahoo. How to reduce costs of business logic maintenance. In Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, volume 1, pages 77–82, 2011. (doi:10.1109/CSAE.2011.5953174)

[44]
V. Cesarotti, A. Giuiusa, and V. Introna. Increasing availability of production flow lines through optimal buffer sizing: A simulative study. In 23rd European Modeling and Simulation Symposium, EMSS 2011, pages 423–432, 2011.

[45]
C.L. Chen and M.H. Liu. A novel and low-computation e-cash transfer system against blackmail for mobile communications. International Journal of Mobile Communications, 9(2):159–186, 2011. (doi:10.1504/IJMC.2011.040144)

[46]
X. Chen and J. Zhang. Building decentralized resource space on a structured P2P network. Concurrency Computation Practice and Experience, 23(9):866–879, 2011. (doi:10.1002/cpe.1621)

[47]
Y. Chen, S. Jain, V.K. Adhikari, and Z.-L. Zhang. Characterizing roles of front-end servers in end-to-end performance of dynamic content distribution. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, pages 559–567, 2011. (doi:10.1145/2068816.2068868)

[48]
C.-B. Chirila and V. Cretu. A suite of java specific metrics for software quality assessment based on statical code analyzers. In SACI 2011 - 6th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings, pages 347–352, 2011. (doi:10.1109/SACI.2011.5873027)

[49]
I.Y. Choi, H.K. Kim, and J.K. Kim. A personalized booth recommendation using Bayesian networks in ubiquitous exhibition. Information, 14(9):2973–2989, 2011.

[50]
S. Choi, J. Han, G. Lee, N. Lee, and W. Lee. Remotetouch: Touch-screen-like interaction in the TV viewing environment. In Conference on Human Factors in Computing Systems - Proceedings, pages 393–402, 2011. (doi:10.1145/1978942.1978999)

[51]
B. Choi. Multiagent social computing. International Journal of Web Portals, 3(4):56–68, 2011. (doi:10.4018/jwp.2011100105)

[52]
R. Christanto, S.-G. Miaou, and T.-L. Lin. Reducing perceptual discontinuity P2P live video streaming using adaptive scheme based on frame loss visibility. International Journal on Electrical Engineering and Informatics, 3(4):516–529, 2011.

[53]
J.-Y. Chuang, P.-L. Hsu, and Y.-S. Chen. Improving broadcast processes in peer-to-peer systems. In Proceedings - 7th International Conference on Networked Computing, INC2011, pages 48–53, 2011.

[54]
T. Chusho, F. Zhou, and N. Yagi. End-user-initiative development with domain-specific frameworks and visual modeling. Frontiers in Artificial Intelligence and Applications, 231:57–71, 2011. (doi:10.3233/978-1-60750-831-1-57)

[55]
G. Concas, M. Di Penta, E. Tempero, and H. Zhang. Workshop on emerging trends in software metrics (WETSoM 2011). In Proceedings - International Conference on Software Engineering, pages 1224–1225, 2011. (doi:10.1145/1985793.1986057)

[56]
G. Concas, M. Marchesi, A. Murgia, R. Tonelli, and I. Turnu. On the distribution of bugs in the Eclipse system. IEEE Transactions on Software Engineering, 37(6):872–877, 2011. (doi:10.1109/TSE.2011.54)

[57]
E. Constantinou, G. Kakarontzas, and I. Stamelos. Towards open source software system architecture recovery using design metrics. In Proceedings - 2011 Panhellenic Conference on Informatics, PCI 2011, pages 166–170, 2011. (doi:10.1109/PCI.2011.36)

[58]
A.G. Cordeiro and A.L.P. Freitas. Prioritizaion of requirements and evaluation of software quality according to the users' perspective. Ciencia da Informacao, 40(2):160–179, 2011.

[59]
J.P. Correia and M.A. Ferreira. Measuring maintainability of spreadsheets in the wild. In IEEE International Conference on Software Maintenance, ICSM, pages 516–519, 2011. (doi:10.1109/ICSM.2011.6080821)

[60]
C. Costa, C. Ferreira, L. Bastião, L. Ribeiro, A. Silva, and J.L. Oliveira. Dicoogle - an open source peer-to-peer PACS. Journal of Digital Imaging, 24(5):848–856, 2011. (doi:10.1007/s10278-010-9347-9)

[61]
M. Crasso, A. Zunino, and M. Campo. Combining query-by-example and query expansion for simplifying web service discovery. Information Systems Frontiers, 13(3):407–428, 2011. (doi:10.1007/s10796-009-9221-9)

[62]
V. Cristea, F. Pop, C. Dobre, and A. Costan. Distributed architectures for event-based systems. Studies in Computational Intelligence, 347:11–45, 2011. (doi:10.1007/978-3-642-19724-6_2)

[63]
Y. Cui, Y. Wang, Y. Chen, and Y. Shi. Experience on comparison of operating systems scalability on the multi-core architecture. In Proceedings - IEEE International Conference on Cluster Computing, ICCC, pages 205–215, 2011. (doi:10.1109/CLUSTER.2011.31)

[64]
G.L. Curry and R.M. Feldman. Manufacturing systems modeling and analysis (Second Edition). Springer Berlin Heidelberg, 2011. (doi:10.1007/978-3-642-16618-1)

[65]
B. Curtis, J. Sappidi, and J. Subramanyam. An evaluation of the internal quality of business applications: Does size matter? In Proceedings - International Conference on Software Engineering, pages 711–715, 2011. (doi:10.1145/1985793.1985893)

[66]
B. Curtis, J. Sappidi, and J. Subramanyam. Measuring the structural quality of business applications. In Proceedings - 2011 Agile Conference, Agile 2011, pages 147–150, 2011. (doi:10.1109/AGILE.2011.48)

[67]
G. D'Angelo, S. Ferretti, V. Ghini, and F. Panzieri. Mobile computing in digital ecosystems: Design issues and challenges. In IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, pages 2127–2132, 2011. (doi:10.1109/IWCMC.2011.5982863)

[68]
L. de Donder, M.-L. Luoma, B. Penhale, G. Lang, A.J. Santos, I. Tamutiene, M. Koivusilta, A. Schopf, J. Ferreira Alves, J. Reingarde, S. Perttu, T. Savola, and D. Verté. European map of prevalence rates of elder abuse and its impact for future research. European Journal of Ageing, 8(2):129–143, 2011. (doi:10.1007/s10433-011-0187-3)

[69]
L.C. De Miranda, H.H. Hornung, and M.C.C. Baranauskas. Qualitative results of an experiment with adjustable interactive rings for IDTV. In Proceedings of the IADIS International Conference Interfaces and Human Computer Interaction 2011, Part of the IADIS Multi Conference on Computer Science and Information Systems 2011, MCCSIS 2011, pages 233–240, 2011.

[70]
T. Delot, S. Ilarri, M. Thilliez, G. Vargas-Solar, and S. Lecomte. Multi-scale query processing in vehicular networks. Journal of Ambient Intelligence and Humanized Computing, 2(3):213–226, 2011. (doi:10.1007/s12652-011-0058-y)

[71]
T. Delot, N. Mitton, S. Ilarri, and T. Hien. Decentralized pull-based information gathering in vehicular networks using GeoVanet. In Proceedings - IEEE International Conference on Mobile Data Management, volume 1, pages 174–183, 2011. (doi:10.1109/MDM.2011.38)

[72]
T. Delot, N. Mitton, S. Ilarri, and T. Hien. GeoVanet: A routing protocol for query processing in vehicular networks. Mobile Information Systems, 7(4):329–359, 2011. (doi:10.3233/MIS-2011-0126)

[73]
L. Demir, S. Tunali, and A. Lkketangen. A tabu search approach for buffer allocation in production lines with unreliable machines. Engineering Optimization, 43(2):213–231, 2011. (doi:10.1080/0305215X.2010.481022)

[74]
J. Dubey and V. Tokekar. P2PCS - a pure peer-to-peer computing system for large scale computation problems. In Proceedings - 2011 International Conference on Computational Intelligence and Communication Systems, CICN 2011, pages 582–585, 2011. (doi:10.1109/CICN.2011.126)

[75]
S. Dunning and D. Sawyer. A little language for rapidly constructing automated performance tests. In ICPE'11 - Proceedings of the 2nd Joint WOSP/SIPEW International Conference on Performance Engineering, pages 371–380, 2011. (doi:10.1145/1958746.1958798)

[76]
K.O. Elish and M. Alshayeb. A classification of refactoring methods based on software quality attributes. Arabian Journal for Science and Engineering, 36(7):1253–1267, 2011. (doi:10.1007/s13369-011-0117-x)

[77]
J. Eyolfson, L. Tan, and P. Lam. Do time of day and developer experience affect commit bugginess. In Proceedings - International Conference on Software Engineering, pages 153–162, 2011. (doi:10.1145/1985441.1985464)

[78]
M. Farooq-i Azam and M.N. Ayyaz. Embedded systems security. In Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, pages 179–198. IGI Global, 2011. (doi:10.4018/978-1-60960-851-4.ch010)

[79]
C. Feichtinger, S. Donath, H. Köstler, J. Götz, and U. Rüde. WaLBerla: HPC software design for computational engineering simulations. Journal of Computational Science, 2(2):105–112, 2011. (doi:10.1016/j.jocs.2011.01.004)

[80]
P. Fernandes, M.E.J. O'Kelly, C.T. Papadopoulos, and A. Sales. PLAT — production lines analysis tool. In 41st International Conference on Computers and Industrial Engineering 2011, pages 92–97, 2011.

[81]
J. Ferrer, F. Chicano, and E. Alba. Benchmark generator for software testers. IFIP Advances in Information and Communication Technology, 364 AICT(PART 2):378–388, 2011. (doi:10.1007/978-3-642-23960-1_45)

[82]
I. Fister Jr., M. Mernik, and J. Brest. Design and implementation of domain-specific language easytime. Computer Languages, Systems and Structures, 37(4):151–167, 2011. (doi:10.1016/j.cl.2011.04.001)

[83]
S. Frey and W. Hasselbring. An extensible architecture for detecting violations of a cloud environment's constraints during legacy software system migration. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 269–278, 2011. (doi:10.1109/CSMR.2011.33)

[84]
Y. Fujiwara, M. Onizuka, and M. Kitsuregawa. Real-time diameter monitoring for time-evolving graphs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6587 LNCS(PART 1):311–325, 2011. (doi:10.1007/978-3-642-20149-3_24)

[85]
A.D. Gassama and I. Sarr. Lifetime-based dynamic data replication in P2P systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6864 LNCS:13–24, 2011. (doi:10.1007/978-3-642-22947-3_2)

[86]
B. Ghit, F. Pop, and V. Cristea. Using bio-inspired models to design peer-to-peer overlays. In Proceedings - 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2011, pages 248–252, 2011. (doi:10.1109/3PGCIC.2011.45)

[87]
P.G. Giarrusso, T. Rendel, S. Erdweg, K. Ostermann, and T. Berger. Variability-aware parsing in the presence of lexical macros and conditional compilation. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA, pages 805–824, 2011. (doi:10.1145/2048066.2048128)

[88]
A.F.B. Godoi and E.P. Duarte Jr. Peer content groups for reliable and transparent content access in P2P networks. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 776–781, 2011. (doi:10.1109/ICPADS.2011.98)

[89]
K.-S. Goetzmann, T. Harks, M. Klimm, and K. Miller. Optimal file distribution in peer-to-peer networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7074 LNCS:210–219, 2011. (doi:10.1007/978-3-642-25591-5_23)

[90]
Valery Golender and Vladislav Gusev. System and method for troubleshooting runtime software problems using application learning. United States Patent 8,032,866, October 2011. Assignee: Identify Software Ltd.(IL).

[91]
D. Gomes, J. Miranda, and M. Costa. A survey on web archiving initiatives. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6966 LNCS:408–420, 2011. (doi:10.1007/978-3-642-24469-8_41)

[92]
A. Gorgeon and E.B. Swanson. Web 2.0 according to wikipedia: Capturing an organizing vision. Journal of the American Society for Information Science and Technology, 62(10):1916–1932, 2011. (doi:10.1002/asi.21612)

[93]
R. Gracia-Tinedo, P. Garcıa-López, and M. Sánchez-Artigas. Sophia: Local trust for securing routing in DHTs. In Proceedings - 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2011, pages 372–381, 2011. (doi:10.1109/CCGrid.2011.57)

[94]
A. Gupta and L.K. Awasthi. Peer-to-peer networks and computation: Current trends and future perspectives. Computing and Informatics, 30(3):559–594, 2011.

[95]
C. Gutierrez. Modeling the web of data (introductory overview). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6848 LNCS:416–444, 2011. (doi:10.1007/978-3-642-23032-5_8)

[96]
E. Harjula, T. Koskela, and M. Ylianttila. Comparing the performance and efficiency of two popular DHTs in interpersonal communication. In 2011 IEEE Wireless Communications and Networking Conference, WCNC 2011, pages 2173–2178, 2011. (doi:10.1109/WCNC.2011.5779469)

[97]
K.A. Hawick. Engineering domain-specific languages and automatic code generation for computational simulations of complex systems. In Proceedings of the IASTED International Conference on Software Engineering and Applications, SEA 2011, pages 222–229, 2011. (doi:10.2316/P.2011.758-046)

[98]
E.C.S. Hayashi and M.C.C. Baranauskas. Towards a framework for the affective and emotional faces of usability. In International Conference on Information Society, i-Society 2011, pages 72–79, 2011.

[99]
I. Herraiz, D.M. German, and A.E. Hassan. On the distribution of source code file sizes. In ICSOFT 2011 - Proceedings of the 6th International Conference on Software and Database Technologies, volume 2, pages 5–14, 2011.

[100]
A. Holzinger, O. Waclik, F. Kappe, S. Lenhart, G. Orasche, and B. Peischl. Rapid prototyping on the example of software development in automotive industry - the importance of their provision for software projects at the correct time. In ICE-B 2011 - Proceedings of the International Conference on e-Business, pages 57–61, 2011.

[101]
H.-H. Hsu and H.-T. Liao. A mobile RFID-based tour system with instant microblogging. Journal of Computer and System Sciences, 77(4):720–727, 2011. (doi:10.1016/j.jcss.2010.02.011)

[102]
C.-L. Hu and D.-Y. Chen. Distributed pairing for file sharing in large-scale peer-to-peer networks. In International Conference on Advanced Communication Technology, ICACT, pages 492–497, 2011.

[103]
H. Huang, Q. Yang, J. Xiao, and J. Zhai. Automatic mining of change set size information from repository for precise productivity estimation. In Proceedings - International Conference on Software Engineering, pages 72–80, 2011. (doi:10.1145/1987875.1987889)

[104]
T.-L. Huang, T.-A. Hsieh, K.-C. Lai, , C.-H. Hsu, and H.-Y. Chang. Fault tolerance policy on dynamic load balancing in P2P grids. In Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pages 1413–1420, 2011. (doi:10.1109/TrustCom.2011.193)

[105]
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. An integrated approach for identity and access management in a SOA context. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pages 21–30, 2011. (doi:10.1145/1998441.1998446)

[106]
J.B. Hurwitz. The influence of trust and privacy risk-taking on user acceptance of electronic services that collect personal information. In Proceedings of the Human Factors and Ergonomics Society, pages 1110–1114, 2011. (doi:10.1177/1071181311551232)

[107]
N.-T. Huynh, , and M.-T. Segarra. Towards reliable distributed reconfiguration. In Proceedings of the International Workshop on Adaptive and Reflective Middleware, ARM 2011, Co-located with ACM/IFIP/USENIX International Middleware Conference, pages 36–41, 2011. (doi:10.1145/2088876.2088882)

[108]
M. Ingle and M. Kumar. Push technique based certificate revocation model for mobile devices. In Proceedings - 2011 International Conference on Computational Intelligence and Communication Systems, CICN 2011, pages 635–638, 2011. (doi:10.1109/CICN.2011.138)

[109]
E. Irrazábal, J. Garzás, and E. Marcos. Alignment of open source tools with the new ISO 25010 standard: Focus on maintainability. In ICSOFT 2011 - Proceedings of the 6th International Conference on Software and Database Technologies, volume 2, pages 111–116, 2011.

[110]
A. Isfandyari-Moghaddam and M.-K. Saberi. The life and death of URLs: The case of journal of the Medical Library Association. Library Philosophy and Practice, 2011(JULY), 2011.

[111]
K.R. Islam and C.M. Snow. An architecture for delivery of distance education in developing countries. In SIGITE'11 - Proceedings of the 2011 ACM Special Interest Group for Information Technology Education Conference, pages 215–220, 2011. (doi:10.1145/2047594.2047651)

[112]
S.-X. and Jiang. Exploiting multi-level locality to implement the scalable search in unstructured P2P network. Ruan Jian Xue Bao/Journal of Software, 22(9):2014–2120, 2011. (doi:10.3724/SP.J.1001.2011.03878)

[113]
T. Kalibera, J. Hagelberg, P. Maj, F. Pizlo, B. Titzer, and J. Vitek. A family of real-time java benchmarks. Concurrency Computation Practice and Experience, 23(14):1679–1700, 2011. (doi:10.1002/cpe.1677)

[114]
D. Kanellopoulos. Peer-to-peer content distribution systems: Surveying the landscape. In Peer-to-Peer Networks and Internet Policies, pages 193–204. Nova Science Publishers, Inc., 2011.

[115]
S.F. Karabag and C. Berggren. Mobile communications in turkey: From first mover advantages to management capabilities. Info, 13(2):72–84, 2011. (doi:10.1108/14636691111121647)

[116]
C. Kästner, P.G. Giarrusso, and K. Ostermann. Partial preprocessing c code for variability analysis. In ACM International Conference Proceeding Series, pages 127–136, 2011. (doi:10.1145/1944892.1944908)

[117]
N. Kayarvizhy and S. Kanmani. An automated tool for computing object oriented metrics using XML. Communications in Computer and Information Science, 191 CCIS(PART 2):69–79, 2011. (doi:10.1007/978-3-642-22714-1_8)

[118]
M. Kellett, T. Tran, and M. Li. Trust by association: A meta-reputation system for peer-to-peer networks. Computational Intelligence, 27(3):363–392, 2011. (doi:10.1111/j.1467-8640.2011.00388.x)

[119]
A. Khanjani and R. Sulaiman. The aspects of choosing open source versus closed source. In ISCI 2011 - 2011 IEEE Symposium on Computers and Informatics, pages 646–649, 2011. (doi:10.1109/ISCI.2011.5958992)

[120]
M. Kobayashi, S. Shibusawa, H. Ohno, and T. Yonekura. Participation and departure processes of nodes in connection graph. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 805–810, 2011. (doi:10.1109/ICPADS.2011.96)

[121]
S. Koch. Open source as a sourcing strategy for corporations. International Journal of Business Innovation and Research, 5(1):1–16, 2011. (doi:10.1504/IJBIR.2011.037253)

[122]
M. Kodialam, T.V. Lakshman, S. Mukherjee, and L. Wang. Online scheduling of targeted advertisements for IPTV. IEEE/ACM Transactions on Networking, 19(6):1825–1834, 2011. (doi:10.1109/TNET.2011.2143725)

[123]
D. Korzun and A. Gurtov. Survey on hierarchical routing schemes in "flat" distributed hash tables. Peer-to-Peer Networking and Applications, 4(4):346–375, 2011. (doi:10.1007/s12083-010-0093-z)

[124]
T. Kos, T. Kosar, J. Knez, and M. Mernik. From DCOM interfaces to domain-specific modeling language: A case study on the sequencer. Computer Science and Information Systems, 8(2):361–378, 2011. (doi:10.2298/CSIS101231009K)

[125]
T. Kos, T. Kosar, M. Mernik, and J. Knez. Ladybird: Debugging support in the sequencer. In Applications of Mathematics and Computer Engineering - American Conference on Applied Mathematics, AMERICAN-MATH'11, 5th WSEAS International Conference on Computer Engineering and Applications, CEA'11, pages 135–139, 2011.

[126]
T. Koskela, E. Harjula, O. Kassinen, and M. Ylianttila. Robustness of a P2P community management system based on two-level hierarchical DHT overlays. In Proceedings - IEEE Symposium on Computers and Communications, pages 881–886, 2011. (doi:10.1109/ISCC.2011.5983953)

[127]
C. Kothapalli, S.G. Ganesh, H.K. Singh, D.V. Radhika, T. Rajaram, K. Ravikanth, S. Gupta, and K. Rao. Continual monitoring of code quality. In Proceedings of the 4th India Software Engineering Conference 2011, ISEC'11, pages 175–184, 2011. (doi:10.1145/1953355.1953379)

[128]
A. Kousaridas, P. Madgalinos, and N. Alonistioti. Service provision evolution in self-managed future internet environments. IGI Global, 2011. (doi:10.4018/978-1-61350-110-8.ch006)

[129]
F.B. Ktata, N.E. Kadhi, and K. Ghedira. Mobile agents for intrusion detection system based on a new anomaly approach. Journal of Engineering and Applied Sciences, 6(1):79–90, 2011. (doi:10.3923/jeasci.2011.79.90)

[130]
Y.-X. Lai and Z. Yang. Unknown malicious detection based on improved bayes algorithm. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 37(5):766–772, 2011.

[131]
K.-C. Lai, K.-C. Huang, and Y.-F. Yu. Multi-attribute range queries on structured overlay networks. Journal of Internet Technology, 12(2):269–278, 2011.

[132]
Susan Landau. Surveillance or Security?: The Risks Posed by New Wiretapping Technologies. The MIT Press, 2011.

[133]
P.A. Laplante and S.J. Ovaska. Real-Time Systems Design and Analysis: Tools for the Practitioner. John Wiley and Sons, 2011. (doi:10.1002/9781118136607)

[134]
R.P. Leal, J.Á. Cachinero, and E. Pastor Martın. New approach to inter-domain multicast protocols. ETRI Journal, 33(3):355–365, 2011. (doi:10.4218/etrij.11.0110.0405)

[135]
D. Lee, A. Smith, and M. Mortimer. Cultural differences affecting quality and productivity in Western / Asian offshore software development. In ACM International Conference Proceeding Series, pages 29–39, 2011. (doi:10.1145/2407796.2407801)

[136]
P. Lerthathairat and N. Prompoon. An approach for source code classification using software metrics and fuzzy logic to improve code quality with refactoring techniques. Communications in Computer and Information Science, 181 CCIS(PART 3):478–492, 2011. (doi:10.1007/978-3-642-22203-0_42)

[137]
J. Liebig, C. Kästner, and S. Apel. Analyzing the discipline of preprocessor annotations in 30 million lines of C code. In AOSD '11: 10th International Conference on Aspect-Oriented Software Development, pages 191–202, 2011. (doi:10.1145/1960275.1960299)

[138]
C.-Y. Lin and C.-C. Chou. Effectiveness of ontology-based online exam platform for programming language education. In Congress on Computing in Civil Engineering, Proceedings, pages 907–914, 2011. (doi:10.1061/41182(416)112)

[139]
C.-S. Lin and G.-S. Wang. Balanced dynamic buffering for scalable peer-to-peer video-on-demand streaming with multiple description coding. In Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2011, pages 371–376, 2011. (doi:10.1109/CISIS.2011.60)

[140]
C.-S. Lin and M.-J. Yan. Service availability for P2P on-demand streaming with dynamic buffering. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 741–746, 2011. (doi:10.1109/ICPADS.2011.118)

[141]
C.-F. Lin, M.-C. Leu, C.-W. Chang, and S.-M. Yuan. The study and methods for cloud based CDN. In Proceedings - 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2011, pages 469–475, 2011. (doi:10.1109/CyberC.2011.82)

[142]
A. Liotta and G. Exarchakos. Content-aware networks. Lecture Notes in Electrical Engineering, 92 LNEE:95–109, 2011. (doi:10.1007/978-94-007-1473-1_7)

[143]
A. Liotta and G. Exarchakos. Discovering virtual resources. Lecture Notes in Electrical Engineering, 92 LNEE:133–144, 2011. (doi:10.1007/978-94-007-1473-1_9)

[144]
A. Liotta and G. Exarchakos. Distribution-efficient networks. Lecture Notes in Electrical Engineering, 92 LNEE:111–131, 2011. (doi:10.1007/978-94-007-1473-1_8)

[145]
X. Liu and A. Datta. A trust prediction approach capturing agents' dynamic behavior. In 22nd International Joint Conference on Artificial Intelligence, IJCAI 2011, pages 2147–2152, 2011. (doi:10.5591/978-1-57735-516-8/IJCAI11-358)

[146]
M. Liu, T. Koskela, Z. Ou, J. Zhou, J. Riekki, and M. Ylianttila. Super-peer-based coordinated service provision. Journal of Network and Computer Applications, 34(4):1210–1224, 2011. (doi:10.1016/j.jnca.2011.01.007)

[147]
M. Liu, T. Koskela, and M. Ylianttila. An efficient collaborative mechanism for enterprise cloud applications. In 2011 International Conference on Networking, Sensing and Control, ICNSC 2011, pages 163–168, 2011. (doi:10.1109/ICNSC.2011.5874928)

[148]
S.-T. Liu, H.-C. Huang, and Y.-M. Chen. A system call analysis method with MapReduce for malware detection. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 631–637, 2011. (doi:10.1109/ICPADS.2011.17)

[149]
P.K.K. Loh and F. Tan. Mechanisms of polymorphic and metamorphic viruses. In Proceedings - 2011 European Intelligence and Security Informatics Conference, EISIC 2011, pages 149–154, 2011. (doi:10.1109/EISIC.2011.77)

[150]
F. Loukos, H.D. Karatza, and C.X. Mavromoustakis. Antp2pr: An ant intelligence inspired routing scheme for peer-to-peer networks. Simulation Modelling Practice and Theory, 19(2):649–661, 2011. (doi:10.1016/j.simpat.2010.10.004)

[151]
R.Z. Loureiro and A. Anzaloni. Searching content on peer-to-peer networks for in-flight entertainment. In IEEE Aerospace Conference Proceedings, 2011. (doi:10.1109/AERO.2011.5747377)

[152]
J. Luo and Y. Feng. Copyright protection in P2P networks using digital fingerprinting. International Review on Computers and Software, 6(3):366–370, 2011.

[153]
Y.-T. Ma, K.-Q. He, B. Li, and J. Liu. Empirical study on the characteristics of complex networks in networked software. Ruan Jian Xue Bao/Journal of Software, 22(3):381–407, 2011. (doi:10.3724/SP.J.1001.2011.03934)

[154]
D.F. MacEdo, A.L. Dos Santos, J.M. Nogueira, and G. Pujolle. Fuzzy-based load self-configuration in mobile P2P services. Computer Networks, 55(8):1834–1848, 2011. (doi:10.1016/j.comnet.2011.01.017)

[155]
G. MacKerron. Implementation, implementation, implementation: Old and new options for putting surveys and experiments online. Journal of Choice Modelling, 4(2):20–48, 2011. (doi:10.1016/S1755-5345(13)70056-3)

[156]
D. Malbaski, A. Kupusinac, and S. Popov. The impact of coding style on the readability of C programs. Technics Technologies Education Management, 6(4):1073–1082, 2011.

[157]
D. Man, Y. Ito, and K. Nakano. An efficient parallel sorting compatible with the standard qsort. International Journal of Foundations of Computer Science, 22(5):1057–1071, 2011. (doi:10.1142/S0129054111008568)

[158]
N. Marın, C. Sáez-Árcija, and M.A. Vila. Jar2Ontology - a tool for automatic extraction of semantic information from java object code. In ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, volume 1 DISI, pages 267–276, 2011.

[159]
S. Masrom, S.Z.Z. Abidin, P.N. Hashimah, and A.S. Abd. Rahman. Towards rapid development of user defined metaheuristics hybridization. International Journal of Software Engineering and its Applications, 5(2):1–12, 2011.

[160]
M. Masud and S. Aljahdali. Concurrent execution of transactions in a peer-to-peer database network. International Journal of Intelligent Information and Database Systems, 5(5):510–531, 2011. (doi:10.1504/IJIIDS.2011.042534)

[161]
M. Masud and I. Kiringa. Transaction processing in a peer to peer database network. Data and Knowledge Engineering, 70(4):307–334, 2011. (doi:10.1016/j.datak.2010.12.003)

[162]
C. Mateos, M. Crasso, A. Zunino, and J.L.O. Coscia. Detecting WSDL bad practices in code-first web services. International Journal of Web and Grid Services, 7(4):357–387, 2011. (doi:10.1504/IJWGS.2011.044710)

[163]
A. Mawji, H. Hassanein, and X. Zhang. Peer-to-peer overlay topology control for mobile ad hoc networks. Pervasive and Mobile Computing, 7(4):467–478, 2011. (doi:10.1016/j.pmcj.2011.04.003)

[164]
J.M. McCune and A. Perrig. VIPER: Verifying the integrity of peripherals' firmware. In Proceedings of the ACM Conference on Computer and Communications Security, pages 3–16, 2011. (doi:10.1145/2046707.2046711)

[165]
C. Melchiors, D.T. Mattjie, C.R.P. Dos Santos, A. Panisson, L.Z. Granville, and L.M.R. Tarouco. A P2P-based strongly distributed network polling solution. Advancements in Distributed Computing and Internet Technologies: Trends and Issues, pages 289–313, 2011. (doi:10.4018/978-1-61350-110-8.ch014)

[166]
M. Mernik and D. Rebernak. Aspect-oriented attribute grammars. Elektronika ir Elektrotechnika, 116(10):99–104, 2011.

[167]
K. Miller and A. Wolisz. Transport optimization in peer-to-peer networks. In Proceedings - 19th International Euromicro Conference on Parallel, Distributed, and Network-Based Processing, PDP 2011, pages 567–573, 2011. (doi:10.1109/PDP.2011.26)

[168]
D. Mishra and A. Mishra. Research trends in management issues of global software development: Evaluating the past to envision the future. Journal of Global Information Technology Management, 14(4):48–69, 2011.

[169]
Y. Mohamadi Begum and M.A. Maluk Mohamed. Deepg: Dual heap overlay resource discovery protocol for mobile grid. Scalable Computing, 12(2):239–255, 2011.

[170]
J.G. Mohebzada, G. Ruhe, and A. Eberlein. Srp-plugin: A strategic release planning plug-in for visual studio 2010. In Proceedings - International Conference on Software Engineering, pages 36–39, 2011. (doi:10.1145/1984708.1984719)

[171]
R. Mordinyi, A. Pacha, and S. Biffl. Quality assurance for data from low-tech participants in distributed automation engineering environments. In IEEE Symposium on Emerging Technologies and Factory Automation, ETFA, 2011. (doi:10.1109/ETFA.2011.6059149)

[172]
S. Murer, B. Bonati, and F.J. Furrer. Managed evolution: A strategy for very large information systems. Springer Berlin Heidelberg, 2011. (doi:10.1007/978-3-642-01633-2)

[173]
A. Murgia, M. Marchesi, G. Concas, R. Tonelli, and S. Counsell. Parameter-based refactoring and the relationship with fan-in/fan-out coupling. In Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2011, pages 430–436, 2011. (doi:10.1109/ICSTW.2011.26)

[174]
S. Nachtigal. E-business and security. IGI Global, 2011. (doi:10.4018/978-1-60960-501-8.ch016)

[175]
S. Nachtigal. E-business: Definition and characteristics. In Impact of E-Business Technologies on Public and Private Organizations: Industry Comparisons and Perspectives, pages 233–248. IGI Global, 2011. (doi:10.4018/978-1-60960-501-8.ch014)

[176]
J.A. Nacif, T.S.F. Silva, L.F.M. Vieira, A.B. Vieira, A.O. Fernandes, and C. Coelho Jr. Tracking hardware evolution. In Proceedings of the 12th International Symposium on Quality Electronic Design, ISQED 2011, pages 442–447, 2011. (doi:10.1109/ISQED.2011.5770764)

[177]
J.A.M. Nacif, T.S.F. Silva, L.F.M. Vieira, A.B. Vieira, A.O. Fernandes, and C.N. Coelho Jr. A cache based algorithm to predict HDL modules faults. In LATW 2011 - 12th IEEE Latin-American Test Workshop, 2011. (doi:10.1109/LATW.2011.5985931)

[178]
Yogesh Nagappa and Romain Moreau-Gobard. Method, apparatus and computer readable medium for secure conversion of confidential files. United States Patent 7,886,147, February 2011. Assignee: Siemens Aktiengesellschaft (Munich, DE).

[179]
A. Nagaraja, S.A. Joseph, H.H. Polen, and K.A. Clauson. Disappearing act: Persistence and attrition of uniform resource locators (URLs) in an open access medical journal. Program: electronic library and information systems, 45(1):98–106, 2011. (doi:10.1108/00330331111107420)

[180]
S. Nevo and I. Chengalur-Smith. Enhancing the performance of software development virtual teams through the use of agile methods: A pilot study. In Proceedings of the Annual Hawaii International Conference on System Sciences, 2011. (doi:10.1109/HICSS.2011.186)

[181]
X.-F. Nie, J.-W. Jing, Y.-W. Wang, and J. Xiang. Fluid-based large-scale bandwidth-limited worm simulation model. Ruan Jian Xue Bao/Journal of Software, 22(9):2157–2181, 2011. (doi:10.3724/SP.J.1001.2011.03854)

[182]
N. Nkomo, D. Ocholla, and D. Jacobs. Web information seeking behaviour of students and staff in rural and urban based universities in South Africa: A comparison analysis. Libri, 61(4):281–297, 2011. (doi:10.1515/libr.2011.024)

[183]
M. Nkosi and F. Mekuria. Improving the capacity, reliability and life of mobile devices with cloud computing. 2011 IST-Africa Conference Proceedings, IST 2011, 2011.

[184]
M.T. Nkosi, F. Mekuria, and S.H. Gejibo. Challenges in mobile bio-sensor based mHealth development. In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, HEALTHCOM 2011, pages 21–27, 2011. (doi:10.1109/HEALTH.2011.6026750)

[185]
M. Nordio, H.C. Estler, B. Meyer, J. Tschannen, and C. and Ghezzi. How do distribution and time zones affect software development? a case study on communication. In Proceedings - 2011 6th IEEE International Conference on Global Software Engineering, ICGSE 2011, pages 176–184, 2011. (doi:10.1109/ICGSE.2011.22)

[186]
M. Obrist, C. Moser, D. Alliez, and M. Tscheligi. In-situ evaluation of users' first impressions on a unified electronic program guide concept. Entertainment Computing, 2(3):191–202, 2011. (doi:10.1016/j.entcom.2011.02.003)

[187]
Y. Okaie and T. Nakano. A game theoretic framework for peer-to-peer market economy. International Journal of Grid and Utility Computing, 2(3):183–195, 2011. (doi:10.1504/IJGUC.2011.042041)

[188]
P. Oliveira, P. Ferreira, and L. Veiga. Gridlet economics: Resource management models and policies for cycle-sharing systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6646 LNCS:72–83, 2011. (doi:10.1007/978-3-642-20754-9_9)

[189]
J. Oosterman, W. Irwin, and N. Churcher. EVOJAVA: A tool for measuring evolving software. In Conferences in Research and Practice in Information Technology Series, volume 113, pages 117–125, 2011.

[190]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Clipboard augmentation. United States Patent 8,020,112, September 2011. Assignee: Microsoft Corporation (Redmond, WA).

[191]
A.S. Panah and S. Khorsandi. Overlay construction based on dynamic coalition formation game in P2P networks. In 5th International Conference on Signal Processing and Communication Systems, ICSPCS'2011 - Proceedings, 2011. (doi:10.1109/ICSPCS.2011.6140870)

[192]
M. Pančur and M. Ciglarič. Impact of test-driven development on productivity, code and tests: A controlled experiment. Information and Software Technology, 53(6):557–573, 2011. (doi:10.1016/j.infsof.2011.02.002)

[193]
C.T. Papadopoulos, M.E.J. O'Kelly, M.I. Vidalis, C. Petridis, N. Pistofidis, and M. Nikita. A comparative study on a selection of search design algorithms for solving the buffer allocation problem in serial production lines. In 41st International Conference on Computers and Industrial Engineering 2011, pages 208–213, 2011.

[194]
R.B. Patel and V. Garg. Resource management in peer-to-peer networks: A NADSE approach. In AIP Conference Proceedings, volume 1414, pages 159–164, 2011. (doi:10.1063/1.3669949)

[195]
S. Paul, J. Pan, and R. Jain. Architectures for the future networks and the next generation internet: A survey. Computer Communications, 34(1):2–42, 2011. (doi:10.1016/j.comcom.2010.08.001)

[196]
D.J. Pearce and J. Noble. Implementing a language with flow-sensitive and structural typing on the JVM. Electronic Notes in Theoretical Computer Science, 279(1):47–59, 2011. (doi:10.1016/j.entcs.2011.11.005)

[197]
Y. Peng, , and R. Shen. Distributed computing model and supporting technologies for the dynamic allocation of internet resources. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 48(9):1580–1588, 2011.

[198]
A. Pironti, D. Pozza, and R. Sisto. Automated formal methods for security protocol engineering. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, pages 138–166, 2011. (doi:10.4018/978-1-60960-851-4.ch008)

[199]
A.N. Platis and V.P. Koutras. Software rejuvenation on a PKI. In Proceedings - International Symposium on Software Reliability Engineering, ISSRE, 2011. (doi:10.1109/WOSAR.2010.5722102)

[200]
R.I. Podlovchenko, N.N. Kuzyurin, V.S. Shcherbina, and V.A. Zakharov. Using algebraic models of programs for detecting metamorphic malwares. Journal of Mathematical Sciences, 172(5):740–750, 2011. (doi:10.1007/s10958-011-0216-y)

[201]
W. Poncin, A. Serebrenik, and M. Van Den Brand. Mining student capstone projects with FRASR and prom. In SPLASH'11 Compilation - Proceedings of OOPSLA'11, Onward! 2011, GPCE'11, DLS'11, and SPLASH'11 Companion, pages 87–95, 2011. (doi:10.1145/2048147.2048181)

[202]
W. Poncin, A. Serebrenik, and M. Van Den Brand. Process mining software repositories. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 5–13, 2011. (doi:10.1109/CSMR.2011.5)

[203]
D. Posnett, V. Filkov, and P. Devanbu. Ecological inference in empirical software engineering. In 2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, Proceedings, pages 362–371, 2011. (doi:10.1109/ASE.2011.6100074)

[204]
P. Prabhu, H. Kim, , T.B. Jablin, N.P. Johnson, M. Zoufaly, A. Raman, F. Liu, D. Walker, Y. Zhang, S. Ghosh, D.I. August, J. Huang, and S. Beard. A survey of the practice of computational science. In State of the Practice Reports, SC'11, 2011. (doi:10.1145/2063348.2063374)

[205]
A.N. Prata and T. Chambel. Going beyond iTV: Designing flexible video-based crossmedia interactive services as informal learning contexts. In EuroITV'11 - Proceedings of the 9th European Interactive TV Conference, pages 65–74, 2011. (doi:10.1145/2000119.2000170)

[206]
C.R. Prause. Reputation-based self-management of software process artifact quality in consortium research projects. In Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pages 380–383, 2011. (doi:10.1145/2025113.2025166)

[207]
C.R. Prause. A software project perspective on the fitness and evolvability of personal learning environments. In 1st Workshop on Exploring Fitness and Evolvability of Personal Learning Environments, EFEPLE 2011, volume 773, pages 49–50. CEUR-WS, 2011.

[208]
I. Psaras and L. Mamatas. On demand connectivity sharing: Queuing management and load balancing for user-provided networks. Computer Networks, 55(2):399–414, 2011. (doi:10.1016/j.comnet.2010.08.015)

[209]
Y.-J. Qiu and X.-S. Liu. Efficient writing mechanism for P2P file system. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 40(4):587–591, 2011. (doi:10.3969/j.issn.1001-0548.2011.04.023)

[210]
L. Ramaswamy and J. Chen. The coquos approach to continuous queries in unstructured overlays. IEEE Transactions on Knowledge and Data Engineering, 23(3):463–478, 2011. (doi:10.1109/TKDE.2010.133)

[211]
X. Rao, G. Yin, H. Wang, D. Shi, and Y. Zhu. Filtering error log as time series in complex service-based storage systems. In Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011, pages 226–231, 2011.

[212]
J.M. Rodriguez, A. Zunino, and M. Campo. Introducing mobile devices into grid systems: A survey. International Journal of Web and Grid Services, 7(1):1–40, 2011. (doi:10.1504/IJWGS.2011.038386)

[213]
C. Ruiz and W. Robinson. Measuring open source quality: A literature review. International Journal of Open Source Software and Processes, 3(3):48–65, 2011.

[214]
C. Ruiz and W. Robinson. Towards a unified definition of open source quality. 7th IFIP WG 2.13 International Conference on Open Source Systems: Grounding Research, OSS 2011, 365:17–33, 2011.

[215]
S. Sawamura, A. Aikebaier, V. Barolli, and M. Takizawa. Trustworthy acquaintances in peer-to-peer (P2P) overlay networks. International Journal of Business Intelligence and Data Mining, 6(1):42–54, 2011. (doi:10.1504/IJBIDM.2011.038273)

[216]
S. Sawamura, A. Barolli, A. Aikebaier, M. Ikeda, and M. Takizawa. Objective trustworthiness of acquaintances in peer-to-peer (P2P) overlay networks. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pages 167–174, 2011. (doi:10.1109/AINA.2011.53)

[217]
S. Sawamura, A. Barolli, A. Aikebaier, M. Takizawa, and T. Enokido. Design and evaluation of algorithms for obtaining objective trustworthiness on acquaintances in P2P overlay networks. International Journal of Grid and Utility Computing, 2(3):196–203, 2011. (doi:10.1504/IJGUC.2011.042042)

[218]
C. Schäfer, T. Kuhn, and M. Trapp. A pattern-based approach to DSL development. In SPLASH'11 Workshops - Compilation Proceedings of the Co-Located Workshops: DSM'11, TMC'11, AGERE'11, AOOPES'11, NEAT'11, and VMIL'11, pages 39–45, 2011. (doi:10.1145/2095050.2095058)

[219]
Brian Lloyd Schmidt, Christopher M. Pirich, Derek H. Smith, Gregory A. Martinez, Jon Marcus Randall Whitten, Joshua G. Poley, Maciej Maciesowicz, and Michael Cory Maston. Game console communication with a device. United States Patent 7,991,890, August 2011. Assignee: Microsoft Corporation (Redmond, WA).

[220]
D. Schuurman, , and K. Berte. Adoption versus use diffusion of iDTV in flanders - personalized television content as a tool to cross the chasm? Computers in Entertainment, 9(3), 2011. (doi:10.1145/2027456.2027466)

[221]
E. and Scornavacca. The challenge of meeting users' requirements of a mobile accounting information system. In Proceedings - 2011 10th International Conference on Mobile Business, ICMB 2011, pages 105–113, 2011. (doi:10.1109/ICMB.2011.27)

[222]
S. Seneviratne and D.C. Levy. Task profiling model for load profile prediction. Future Generation Computer Systems, 27(3):245–255, 2011. (doi:10.1016/j.future.2010.09.004)

[223]
V. Sesum-Cavic and E. Kühn. Self-organized load balancing through swarm intelligence. Studies in Computational Intelligence, 352:195–224, 2011. (doi:10.1007/978-3-642-20344-2_8)

[224]
S. Shaaban. Unpaced production lines with jointly unbalanced operation time means and buffer capacities - their behaviour and performance. International Journal of Manufacturing Technology and Management, 23(1-2):54–68, 2011. (doi:10.1504/IJMTM.2011.042108)

[225]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive media playback based on destination. United States Patent 7,996,422, August 2011. Assignee: AT&T Intellectual Property L.L.P. (Atlanta, GA).

[226]
V. Shanmughaneethi, Ra.Y. Pravin, and S. Swamynathan. XIVD: Runtime detection of XPath injection vulnerabilities in XML databases through aspect oriented programming. Communications in Computer and Information Science, 198 CCIS:192–201, 2011. (doi:10.1007/978-3-642-22555-0_21)

[227]
R. Shen and H.-M. Wang. A programming language approach to internet-based virtual environment computing. Journal of Computer Science and Technology, 26(4):X600–615, 2011. (doi:10.1007/s11390-011-1160-5)

[228]
S. Shibusawa, M. Kobayashi, H. Ohno, and T. Yonekura. Arrival and departure processes of nodes in P2P systems. In 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011, pages 609–614, 2011. (doi:10.1109/GLOCOMW.2011.6162523)

[229]
Stylianos Sidiroglou, Angelos D. Keromytis, and Kostas G. Anagnostakis. Systems and methods for detecting and inhibiting attacks using honeypots. United States Patent 7,904,959, March 2011. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[230]
S.E. Sim, M. Umarji, S. Ratanotayanon, and C.V. Lopes. How well do search engines support code retrieval on the web? ACM Transactions on Software Engineering and Methodology, 21(1), 2011. (doi:10.1145/2063239.2063243)

[231]
N. Singh, D. Pucsek, J. Wall, C. Gibbs, M. Salois, and Y. Coady. Spinal tap: High level analysis for heavy metal systems. In IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings, pages 881–889, 2011. (doi:10.1109/PACRIM.2011.6033012)

[232]
R. Sitzenfrei, M. Mair, , and W. Rauch. Cascade vulnerability for risk analysis of water infrastructure. Water Science and Technology, 64(9):1885–1891, 2011. (doi:10.2166/wst.2011.813)

[233]
A. Sobe and W. and Elmenreich. Replication for bio-inspired delivery in unstructured peer-to-peer networks. In 2011 Proceedings of the 9th International Workshop on Intelligent Solutions in Embedded Systems, WISES 2011, 2011.

[234]
B. Sodhi and T.V. Prabhakar. Assessing suitability of cloud oriented platforms for application development. In Proceedings - 9th Working IEEE/IFIP Conference on Software Architecture, WICSA 2011, pages 328–335, 2011. (doi:10.1109/WICSA.2011.51)

[235]
M. Sojer and J. Henkel. License risks from ad hoc reuse of code from the internet. Communications of the ACM, 54(12):74–81, 2011. (doi:10.1145/2043174.2043193)

[236]
M. Sojer. Reusing open source code: Value creation and value appropriation perspectives on knowledge reuse. Gabler, 2011. (doi:10.1007/978-3-8349-6390-1)

[237]
A. Soumplis, E. Chatzidaki, E. Koulocheri, and M. Xenos. Implementing an open personal learning environment. In Proceedings - 2011 Panhellenic Conference on Informatics, PCI 2011, pages 345–349, 2011. (doi:10.1109/PCI.2011.2)

[238]
David Howard Spencer and Darla Renae Agard. Systems, methods, and software for researching statutory information. United States Patent 8,032,533, October 2011. Assignee: Thomson Reuters Global Resources (Baar, CH).

[239]
Salvatore J. Stolfo, Angelos D. Keromytis, and Stelios Sidiroglou. Methods, media and systems for detecting anomalous program executions. United States Patent 8,074,115, December 2011. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[240]
M. Strembeck and J. Mendling. Modeling process-related RBAC models with extended UML activity models. Information and Software Technology, 53(5):456–483, 2011. (doi:10.1016/j.infsof.2010.11.015)

[241]
Sufatrio and R.H.C. Yap. Trusted principal-hosted certificate revocation. IFIP Advances in Information and Communication Technology, 358 AICT:173–189, 2011. (doi:10.1007/978-3-642-22200-9_15)

[242]
W.D. Sunindyo, T. Moser, D. Winkler, and S. Biffl. Analyzing OSS project health with heterogeneous data sources. International Journal of Open Source Software and Processes, 3(4):1–23, 2011.

[243]
Hironori Suzuki, Kenichi Moriwaki, and Naoya Okamoto. GUI application development supporting apparatus, method, and computer program. United States Patent 8,074,174, December 2011. Assignee: SONY Corporation (Tokyo, JP).

[244]
E. Symeonidou-Kastanidou. Dna analysis and criminal proceedings: The european institutional framework. European Journal of Crime, Criminal Law and Criminal Justice, 19(2):139–160, 2011. (doi:10.1163/157181711X566317)

[245]
O. Tajeddini, A. Azimi, A. Sadatmoosavi, and H. Sharif-Moghaddam. Death of web citations: A serious alarm for authors. Malaysian Journal of Library and Information Science, 16(3):17–29, 2011.

[246]
H. Tan and Y. and Yang. Security design and implementation of yangtze gold cruises website. Advances in Intelligent and Soft Computing, 128:477–483, 2011. (doi:10.1007/978-3-642-25989-0_77)

[247]
R. Tartler, D. Lohmann, C. Dietrich, C. Egger, and J. Sincero. Configuration coverage in the analysis of large-scale system software. In Proceedings of the 6th Workshop on Programming Languages and Operating Systems, PLOS 2011 - In Conjunction with the 23rd ACM Symposium on Operating Systems Principles, SOSP 2011, 2011. (doi:10.1145/2039239.2039242)

[248]
R. Tartler, D. Lohmann, J. Sincero, and W. Schröder-Preikschat. Feature consistency in compile-time - configurable system software: Facing the linux 10,000 feature problem. In EuroSys'11 - Proceedings of the EuroSys 2011 Conference, pages 47–60, 2011. (doi:10.1145/1966445.1966451)

[249]
C. Taube-Schock, R.J. Walker, and I.H. Witten. Can we avoid high coupling? Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6813 LNCS:204–228, 2011. (doi:10.1007/978-3-642-22655-7_10)

[250]
A. Telea and L. Voinea. Visual software analytics for the build optimization of large-scale software systems. Computational Statistics, 26(4):635–654, 2011. (doi:10.1007/s00180-011-0248-2)

[251]
L.F. Teófilo and P.B. Silva. Integrating simple recommendation systems on digital TV widget applications. In Proceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011, 2011.

[252]
V.S. Tidake and S.A. Talekar. Steganography using version control system. Communications in Computer and Information Science, 133 CCIS(PART 3):470–480, 2011.

[253]
J.-P. Tolvanen, J. Sprinkle, M. Rossi, and J. Gray. The 11th workshop on domain-specific modeling. In SPLASH'11 Compilation - Proceedings of OOPSLA'11, Onward! 2011, GPCE'11, DLS'11, and SPLASH'11 Companion, pages 317–318, 2011. (doi:10.1145/2048147.2048227)

[254]
J.-P. Tolvanen. Creating domain-specific modelling languages that work: Hands-on. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6698 LNCS:393–394, 2011. (doi:10.1007/978-3-642-21470-7_34)

[255]
J.-P. Tolvanen. Metaedit+: Domain-specific modeling environment for product lines. In ACM International Conference Proceeding Series, 2011. (doi:10.1145/2019136.2019195)

[256]
R. Tonelli, G. Concas, M. Marchesi, and A. Murgia. An analysis of SNA metrics on the java qualitas corpus. In Proceedings of the 4th India Software Engineering Conference 2011, ISEC'11, pages 205–213, 2011. (doi:10.1145/1953355.1953382)

[257]
D. Traskas and J. Padget. A multi-agent systems approach to call-centre management. International Journal of Parallel, Emergent and Distributed Systems, 26(5):347–367, 2011. (doi:10.1080/17445761003720228)

[258]
D. Traskas, J. Padget, and J. Tansley. A probabilistic mechanism for agent discovery and pairing using domain-specific data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6541 LNAI:192–209, 2011. (doi:10.1007/978-3-642-21268-0_11)

[259]
E. Tsekleves, R. Whitham, K. Kondo, and A. Hill. Investigating media use and the television user experience in the home. Entertainment Computing, 2(3):151–161, 2011. (doi:10.1016/j.entcom.2011.02.002)

[260]
S.-M. Tseng and J.-S. Huang. The correlation between wikipedia and knowledge sharing on job performance. Expert Systems with Applications, 38(5):6118–6124, 2011. (doi:10.1016/j.eswa.2010.11.009)

[261]
D. Tsolis, S. Sioutas, M.N. Xenos, and G. Styliaras. Copyright and IPR management for cultural heritage digital content in peer-to-peer networks. Journal of Cultural Heritage, 12(4):466–475, 2011. (doi:10.1016/j.culher.2011.03.009)

[262]
A. Tsoukala. Timing 'dangerousness': Football crowd disorder in the italian and greek press. Sport in Society, 14(5):598–611, 2011. (doi:10.1080/17430437.2011.574360)

[263]
E. Turban, T.-P. Liang, and S.P.J. Wu. A framework for adopting collaboration 2.0 tools for virtual group decision making. Group Decision and Negotiation, 20(2):137–154, 2011. (doi:10.1007/s10726-010-9215-5)

[264]
P. Turek, J. Spychała, A. Wierzbicki, and P. Gackowski. Social mechanism of granting trust basing on polish wikipedia requests for adminship. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6984 LNCS:212–225, 2011. (doi:10.1007/978-3-642-24704-0_25)

[265]
I. Turnu, G. Concas, M. Marchesi, S. Pinna, and R. Tonelli. A modified yule process to model the evolution of some object-oriented system properties. Information Sciences, 181(4):883–902, 2011. (doi:10.1016/j.ins.2010.10.022)

[266]
P.K. Tysowski, P. Zhao, and K. Naik. Peer to peer content sharing on ad hoc networks of smartphones. In IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, pages 1445–1450, 2011. (doi:10.1109/IWCMC.2011.5982751)

[267]
Shah Ullah. Targeting content to network-enabled television devices. United States Patent 8,060,399, November 2011.

[268]
United States House of Representatives. Committee on the Judiciary. Subcommittee on Crime, Terrorism and Homeland Security. Hearing on: the ``going dark: Lawful electronic surveillance in the face of new technologies''. testimony of susan landau. Available online http://judiciary.house.gov/_files/hearings/printers/112th/112-59_64581.pdf, February 2011. Serial No. 112-59. U.S. Government Printing Office. Washington.

[269]
J. Van Den Bos and T. Van Der Storm. Bringing domain-specific languages to digital forensics. In Proceedings - International Conference on Software Engineering, pages 671–680, 2011. (doi:10.1145/1985793.1985887)

[270]
P. Vennou, E. Mantzari, and G. Lekakos. Evaluating program-embedded advertisement format in interactive digital TV. In EuroITV'11 - Proceedings of the 9th European Interactive TV Conference, pages 145–154, 2011. (doi:10.1145/2000119.2000149)

[271]
Z. Vukanovic. New media business models in social and web media. Journal of Media Business Studies, 8(3):51–67, 2011.

[272]
V. Waller. The search queries that took Australian internet users to wikipedia. Information Research, 16(2), 2011.

[273]
C.-S. Wang, W.-D. Chen, and C.-L. Chen. Location-based P2P mobile navigation system. In Proceedings - 2011 International Symposium on Computer Science and Society, ISCCS 2011, pages 361–364, 2011. (doi:10.1109/ISCCS.2011.104)

[274]
J.H. Wang, C. Wang, J. Yang, and C. An. A study on key strategies in P2P file sharing systems and ISPs' P2P traffic management. Peer-to-Peer Networking and Applications, 4(4):410–419, 2011. (doi:10.1007/s12083-010-0098-7)

[275]
Z. Wang, , L. Chen, and Z. Shi. Parallel computation techniques for dynamic description logics reasoning. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 48(12):2317–2325, 2011.

[276]
J.B. Wendt and M. Potkonjak. Nanotechnology-based trusted remote sensing. In Proceedings of IEEE Sensors, pages 1213–1216, 2011. (doi:10.1109/ICSENS.2011.6127174)

[277]
R. Wilken, B. Nansen, and M. Arnold. The cultural economy of TiVo in australia. Telecommunication Journal of Australia, 61(4):61.1–61.14, 2011.

[278]
F. Wu. Empirical tests of scale-free geometry in NASA DATA. Advanced Materials Research, 301-303:762–767, 2011. (doi:10.4028/www.scientific.net/AMR.301-303.762)

[279]
C.C. Xavier and V.L.S. De Lima. Declaration of research: Automatic extraction of ontologies from wikipedia. In Iberoamerican Meeting of Ontological Research 2011, Co-located with the 6th Ibero-American Congress on Telematics, CITA 2011, volume 728, 2011.

[280]
B. Xie, M. Van Der Schaar, T. Courtade, and R.D. Wesel. Minimizing weighted sum finish time for one-to-many file transfer in peer-to-peer networks. In 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, pages 1771–1778, 2011. (doi:10.1109/Allerton.2011.6120383)

[281]
H. Yamamoto and K. Yamazaki. Decentralized live video broadcasting system using location-aware P2P network technology. In 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011, pages 262–266, 2011. (doi:10.1109/CCNC.2011.5766469)

[282]
I. Yu, B. Song, J. Son, and D.-K. Baik. Discovering credentials in the content centric network. In International Conference on Information Networking 2011, ICOIN 2011, pages 43–47, 2011. (doi:10.1109/ICOIN.2011.5723111)

[283]
S. Zeltyn, P. Tarr, M. Cantor, R. Delmonico, S. Kannegala, M. Keren, A.P. Kumar, and S. Wasserkrug. Improving efficiency in software maintenance. In Proceedings - International Conference on Software Engineering, pages 215–218, 2011. (doi:10.1145/1985441.1985474)

[284]
Z. Zeng, B. Veeravalli, and K. Li. A novel server-side proxy caching strategy for large-scale multimedia applications. Journal of Parallel and Distributed Computing, 71(4):525–536, 2011. (doi:10.1016/j.jpdc.2010.06.008)

[285]
X. Zhan, X. Wang, and H. Hong. Caching, replication strategy and implementions of directories in DHT-based filesystem. In Proceedings - 2011 6th International Conference on Pervasive Computing and Applications, ICPCA 2011, pages 287–292, 2011. (doi:10.1109/ICPCA.2011.6106519)

[286]
Y. Zhang and and. Survey of DHT topology construction techniques in virtual computing environments. Science China Information Sciences, 54(11):2221–2235, 2011. (doi:10.1007/s11432-011-4377-6)

[287]
L. Zhang, J. Zhu, and Z. Tian. Research on verification method of mutual authentication in GSM/UMTS inter-system based on finite state machine. In Proceedings - 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control, IMCCC 2011, pages 541–544, 2011. (doi:10.1109/IMCCC.2011.140)

[288]
S. Zhang, B. Wang, G. Wei, and Y. Zhou. AF-Chord: An improved Chord model based adjusted Finger Table. In Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011, pages 335–338, 2011. (doi:10.1109/ICBNMT.2011.6155952)

[289]
X. Zhang, L. Zhang, M. Chai, Y. Taniguchi, and J. Hosoya. Implementation and evaluation of a flexible software measurement system for japan-oriented offshore development. In Proceedings of the 10th IASTED International Conference on Software Engineering, SE 2011, pages 95–102, 2011. (doi:10.2316/P.2011.720-028)

[290]
L. Zhang. Use of web resources in the journal literature 2001 and 2007: A cross-disciplinary study. College and Research Libraries, 72(2):167–179, 2011.

[291]
L. Zhao and J.H. Hayes. Rank-based refactoring decision support: Two studies. Innovations in Systems and Software Engineering, 7(3):171–189, 2011. (doi:10.1007/s11334-011-0154-3)

[292]
J. Zhao. Index-based search scheme in peer-to-peer networks. Communications in Computer and Information Science, 159 CCIS(PART 2):102–106, 2011. (doi:10.1007/978-3-642-22691-5_18)

[293]
Y.-T. Zheng, Z.-J. Zha, and T.-S. Chua. Research and applications on georeferenced multimedia: A survey. Multimedia Tools and Applications, 51(1):77–98, 2011. (doi:10.1007/s11042-010-0630-z)

[294]
L. Zhong, X. Wang, and M. Kihl. Topological model and analysis of the P2P bittorrent protocol. In Proceedings of the World Congress on Intelligent Control and Automation (WCICA), pages 753–758, 2011. (doi:10.1109/WCICA.2011.5970615)

[295]
L. Zhou, Y. Zhang, K. Song, W. Jing, and A.V. Vasilakos. Distributed media services in P2P-based vehicular networks. IEEE Transactions on Vehicular Technology, 60(2):692–703, 2011. (doi:10.1109/TVT.2010.2102782)

[296]
L. Zhu and S. Liu. An experimental comparative study on three classification algorithms on unknown malicious code identification. In 2011 International Conference on Multimedia Technology, ICMT 2011, pages 4829–4832, 2011. (doi:10.1109/ICMT.2011.6002063)

[297]
L. Zhu. An identification method on unknown malicious code based on the good or evil index of API. In 2011 International Conference on Multimedia Technology, ICMT 2011, pages 5285–5288, 2011. (doi:10.1109/ICMT.2011.6002319)

[1]
A. Aaltonen and G.F. Lanzara. Governing social production in the internet: The case of Wikipedia. In 19th European Conference on Information Systems, ECIS 2011, 2011.

[2]
W. Abdul-Kader, O. Ganjavi, and F. Baki. A nonlinear model for optimizing the performance of a multi-product production line. International Transactions in Operational Research, 18(5):561–577, 2011. (doi:10.1111/j.1475-3995.2011.00814.x)

[3]
A. Abraham, H. Liu, and A.E. Hassanien. Multi swarms for neighbor selection in peer-to-peer overlay networks. Telecommunication Systems, 46(3):195–208, 2011. (doi:10.1007/s11235-010-9285-3)

[4]
R. Ahmed and R. Boutaba. A survey of distributed search techniques in large scale distributed systems. IEEE Communications Surveys and Tutorials, 13(2):150–167, 2011. (doi:10.1109/SURV.2011.040410.00097)

[5]
J. Al Dallal. Improving the applicability of object-oriented class cohesion metrics. Information and Software Technology, 53(9):914–928, 2011. (doi:10.1016/j.infsof.2011.03.004)

[6]
K.R. Al-Momani and J.E.A. Qudeiri. Modelling of parallel production system with rework paths and its GA based simulator for optimal design. International Journal of Manufacturing Technology and Management, 23(1-2):69–81, 2011. (doi:10.1504/IJMTM.2011.042109)

[7]
M. Albert, J. Cabot, C. Gómez, and V. Pelechano. Generating operation specifications from UML class diagrams: A model transformation approach. Data and Knowledge Engineering, 70(4):365–389, 2011. (doi:10.1016/j.datak.2011.01.003)

[8]
E. Alsaggaf and F. Albouraey. Use of agents in building integration tool for component-based application. Communications in Computer and Information Science, 179 CCIS(PART 1):1–15, 2011. (doi:10.1007/978-3-642-22170-5_1)

[9]
M. Alshayeb. The impact of refactoring on class and architecture stability. Journal of Research and Practice in Information Technology, 43(4):269–284, 2011.

[10]
M. Alshayeb. The impact of refactoring to patterns on software quality attributes. Arabian Journal for Science and Engineering, 36(7):1241–1251, 2011. (doi:10.1007/s13369-011-0111-3)

[11]
T.L. Alves, J.P. Correia, and J. Visser. Benchmark-based aggregation of metrics to ratings. In Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011, pages 20–29, 2011. (doi:10.1109/IWSM-MENSURA.2011.15)

[12]
M. Anagnostaki. Community service in greece: Sentencing practices, the role of the prosecution service and local authorities. European Journal of Criminology, 8(2):157–166, 2011. (doi:10.1177/1477370810397256)

[13]
N. Anwar, M.N. Masrek, and Y.R. Rambli. Moderating effect between information systems resources and information security: A conceptual framework. In ISBEIA 2011 - 2011 IEEE Symposium on Business, Engineering and Industrial Applications, pages 247–252, 2011. (doi:10.1109/ISBEIA.2011.6088815)

[14]
J.J.P. Arias, A. Fernández Vilas, R.P. Dıaz Redondo, A. Gil Solla, M. Ramos Cabrer, and J. Garcıa Duque. Making the most of TV on the move: My newschannel. Information Sciences, 181(4):855–868, 2011. (doi:10.1016/j.ins.2010.10.017)

[15]
P. Arpaia, L. Fiscarelli, , and C. Petrone. A model-driven domain-specific scripting language for measurement-system frameworks. IEEE Transactions on Instrumentation and Measurement, 60(12):3756–3766, 2011. (doi:10.1109/TIM.2011.2149310)

[16]
M. Arzoky, S. Swift, A. Tucker, and J. Cain. Munch: An efficient modularisation strategy to assess the degree of refactoring on sequential source code checkings. In Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2011, pages 422–429, 2011. (doi:10.1109/ICSTW.2011.87)

[17]
S.A. Asghari, H.G. Zadeh, H. Taheri, and H. Pedram. Designing a self-organised system for service substitution and placement in wireless sensor networks. IET Wireless Sensor Systems, 1(4):200–205, 2011. (doi:10.1049/iet-wss.2011.0022)

[18]
K. Ashraf, R. Anane, and N. Blundell. Resilient and secure file dispersal in a mobile P2P system. In Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pages 555–560, 2011. (doi:10.1109/WAINA.2011.149)

[19]
L. Auer, J. Juntunen, and P. Ojala. Open source project as a pedagogical tool in higher education. In Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, MindTrek 2011, pages 207–213, 2011. (doi:10.1145/2181037.2181073)

[20]
Matthew S. Augustine, Arnold N. Blinn, John D. Elliott, and Don M. Gillett. Services for data sharing and synchronization. United States Patent 7,933,296, April 2011. Assignee: Microsoft Corporation (Redmond, WA).

[21]
L. Aversano and M. Tortorella. Applying EFFORT for evaluating CRM open source systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6759 LNCS:202–216, 2011. (doi:10.1007/978-3-642-21843-9_17)

[22]
G. Bailly, E. Lecolinet, and Y. Guiard. A space characterization of the remote control in the context of interactive television. In ACM International Conference Proceeding Series, 2011. (doi:10.1145/2044354.2044375)

[23]
H.M.N.D. Bandara and A.P. Jayasumana. Exploiting communities for enhancing lookup performance in structured P2P systems. In IEEE International Conference on Communications, 2011. (doi:10.1109/icc.2011.5962882)

[24]
S. Basagiannis, P. Katsaros, and A. Pombortsis. Synthesis of attack actions using model checking for the verification of security protocols. Security and Communication Networks, 4(2):147–161, 2011. (doi:10.1002/sec.119)

[25]
Douglas D. Beattie, Neal Lewis Creighton, Jr., Christopher T. M. Bailey, David L. Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 8,028,162, September 2011. Assignee: GeoTrust, Inc. (Wellesley Hills, MA).

[26]
L. Becchetti, U.M. Colesanti, A. Marchetti-Spaccamela, and A. Vitaletti. Recommending items in pervasive scenarios: Models and experimental analysis. Knowledge and Information Systems, 28(3):555–578, 2011. (doi:10.1007/s10115-010-0338-4)

[27]
A. Becker, T. Widjaja, and P. Buxmann. Nutzenpotenziale und herausforderungen des einsatzes von serviceorientierten architekturen : Ergebnisse einer empirischen untersuchung aus anwender- und herstellersicht. Wirtschaftsinformatik, 53(4):187–199, 2011. (doi:10.1007/s11576-011-0280-4)

[28]
A. Becker, T. Widjaja, and P. Buxmann. Value potentials and challenges of service-oriented architectures results of an empirical survey from user and vendor perspective. Business and Information Systems Engineering, 3(4):199–210, 2011. (doi:10.1007/s12599-011-0167-3)

[29]
M.V. Belmonte, M. Dıaz, and A. Reyna. A coalition based incentive mechanism for P2P content distribution systems. In ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, volume 2, pages 15–24, 2011.

[30]
W. Ben Jaballah, M. Mosbah, H. Youssef, O. Ly, and A. Meddeb. Modeling source authentication protocols in wireless sensor networks using HLPSL. In 2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings, 2011. (doi:10.1109/SAR-SSI.2011.5931362)

[31]
A. Bergmayr. Reuseme - towards aspect-driven reuse in modelling method development. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6627 LNCS:4–18, 2011. (doi:10.1007/978-3-642-21210-9_2)

[32]
J. Bernedixen and A.H.C. Ng. Optimal buffer allocation for semi-synchronized automotive assembly lines using simulation-based multi-objective optimization. In 2011 9th International Industrial Simulation Conference, ISC 2011, pages 129–135. EUROSIS, 2011.

[33]
M.A. Besbes and H. Hamam. An intelligent RFID checkout for stores. In Proceedings of the International Conference on Microelectronics, ICM, 2011. (doi:10.1109/ICM.2011.6177362)

[34]
J. Bo. Flooding-based resource locating in peer-to-peer networks. Lecture Notes in Electrical Engineering, 97 LNEE(VOL. 1):671–678, 2011. (doi:10.1007/978-3-642-21697-8_85)

[35]
F. Boem, R.M.G. Ferrari, and T. Parisini. Distributed fault detection and isolation of continuous-time non-linear systems. European Journal of Control, 17(5-6):603–620, 2011. (doi:10.3166/EJC.17.603-620)

[36]
David Boles, H. Bret Young, and Jack Basiago. System and method for defining and implementing policies in a database system. United States Patent 7,962,513, June 2011. Assignee: Crossroads Systems, Inc. (Austin, TX).

[37]
L. Böszörmenyi, M. Del Fabro, M. Kogler, M. Lux, O. Marques, and A. Sobe. Innovative directions in self-organized distributed multimedia systems. Multimedia Tools and Applications, 51(2):525–553, 2011. (doi:10.1007/s11042-010-0622-z)

[38]
B. Braatz and C. Brandt. Domain-specific modelling languages with algebraic graph transformations on RDF. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6563 LNCS:82–101, 2011. (doi:10.1007/978-3-642-19440-5_6)

[39]
B.R. Bryant, J. Gray, M. Mernik, P.J. Clarke, R.B. France, and G. Karsai. Challenges and directions in formalizing the semantics of modeling languages. Computer Science and Information Systems, 8(2):225–253, 2011. (doi:10.2298/CSIS110114012B)

[40]
E. Capra, C. Francalanci, F. Merlo, and C. Rossi-Lamastra. Firms' involvement in open source projects: A trade-off between software structural quality and popularity. Journal of Systems and Software, 84(1):144–161, 2011. (doi:10.1016/j.jss.2010.09.004)

[41]
J. Carter. An architecture for Concordia. In ACM International Conference Proceeding Series, 2011. (doi:10.1145/2179298.2179353)

[42]
H. Castro and A.P. Alves. A P2P content delivery system for alternative business models harnessing internet's full potential. In Proceedings of the 2011 7th International Conference on Next Generation Web Services Practices, NWeSP 2011, pages 86–92, 2011. (doi:10.1109/NWeSP.2011.6088158)

[43]
T. Cerny and M.J. Donahoo. How to reduce costs of business logic maintenance. In Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, volume 1, pages 77–82, 2011. (doi:10.1109/CSAE.2011.5953174)

[44]
V. Cesarotti, A. Giuiusa, and V. Introna. Increasing availability of production flow lines through optimal buffer sizing: A simulative study. In 23rd European Modeling and Simulation Symposium, EMSS 2011, pages 423–432, 2011.

[45]
C.L. Chen and M.H. Liu. A novel and low-computation e-cash transfer system against blackmail for mobile communications. International Journal of Mobile Communications, 9(2):159–186, 2011. (doi:10.1504/IJMC.2011.040144)

[46]
X. Chen and J. Zhang. Building decentralized resource space on a structured P2P network. Concurrency Computation Practice and Experience, 23(9):866–879, 2011. (doi:10.1002/cpe.1621)

[47]
Y. Chen, S. Jain, V.K. Adhikari, and Z.-L. Zhang. Characterizing roles of front-end servers in end-to-end performance of dynamic content distribution. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, pages 559–567, 2011. (doi:10.1145/2068816.2068868)

[48]
C.-B. Chirila and V. Cretu. A suite of java specific metrics for software quality assessment based on statical code analyzers. In SACI 2011 - 6th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings, pages 347–352, 2011. (doi:10.1109/SACI.2011.5873027)

[49]
I.Y. Choi, H.K. Kim, and J.K. Kim. A personalized booth recommendation using Bayesian networks in ubiquitous exhibition. Information, 14(9):2973–2989, 2011.

[50]
S. Choi, J. Han, G. Lee, N. Lee, and W. Lee. Remotetouch: Touch-screen-like interaction in the TV viewing environment. In Conference on Human Factors in Computing Systems - Proceedings, pages 393–402, 2011. (doi:10.1145/1978942.1978999)

[51]
B. Choi. Multiagent social computing. International Journal of Web Portals, 3(4):56–68, 2011. (doi:10.4018/jwp.2011100105)

[52]
R. Christanto, S.-G. Miaou, and T.-L. Lin. Reducing perceptual discontinuity P2P live video streaming using adaptive scheme based on frame loss visibility. International Journal on Electrical Engineering and Informatics, 3(4):516–529, 2011.

[53]
J.-Y. Chuang, P.-L. Hsu, and Y.-S. Chen. Improving broadcast processes in peer-to-peer systems. In Proceedings - 7th International Conference on Networked Computing, INC2011, pages 48–53, 2011.

[54]
T. Chusho, F. Zhou, and N. Yagi. End-user-initiative development with domain-specific frameworks and visual modeling. Frontiers in Artificial Intelligence and Applications, 231:57–71, 2011. (doi:10.3233/978-1-60750-831-1-57)

[55]
G. Concas, M. Di Penta, E. Tempero, and H. Zhang. Workshop on emerging trends in software metrics (WETSoM 2011). In Proceedings - International Conference on Software Engineering, pages 1224–1225, 2011. (doi:10.1145/1985793.1986057)

[56]
G. Concas, M. Marchesi, A. Murgia, R. Tonelli, and I. Turnu. On the distribution of bugs in the Eclipse system. IEEE Transactions on Software Engineering, 37(6):872–877, 2011. (doi:10.1109/TSE.2011.54)

[57]
E. Constantinou, G. Kakarontzas, and I. Stamelos. Towards open source software system architecture recovery using design metrics. In Proceedings - 2011 Panhellenic Conference on Informatics, PCI 2011, pages 166–170, 2011. (doi:10.1109/PCI.2011.36)

[58]
A.G. Cordeiro and A.L.P. Freitas. Prioritizaion of requirements and evaluation of software quality according to the users' perspective. Ciencia da Informacao, 40(2):160–179, 2011.

[59]
J.P. Correia and M.A. Ferreira. Measuring maintainability of spreadsheets in the wild. In IEEE International Conference on Software Maintenance, ICSM, pages 516–519, 2011. (doi:10.1109/ICSM.2011.6080821)

[60]
C. Costa, C. Ferreira, L. Bastião, L. Ribeiro, A. Silva, and J.L. Oliveira. Dicoogle - an open source peer-to-peer PACS. Journal of Digital Imaging, 24(5):848–856, 2011. (doi:10.1007/s10278-010-9347-9)

[61]
M. Crasso, A. Zunino, and M. Campo. Combining query-by-example and query expansion for simplifying web service discovery. Information Systems Frontiers, 13(3):407–428, 2011. (doi:10.1007/s10796-009-9221-9)

[62]
V. Cristea, F. Pop, C. Dobre, and A. Costan. Distributed architectures for event-based systems. Studies in Computational Intelligence, 347:11–45, 2011. (doi:10.1007/978-3-642-19724-6_2)

[63]
Y. Cui, Y. Wang, Y. Chen, and Y. Shi. Experience on comparison of operating systems scalability on the multi-core architecture. In Proceedings - IEEE International Conference on Cluster Computing, ICCC, pages 205–215, 2011. (doi:10.1109/CLUSTER.2011.31)

[64]
G.L. Curry and R.M. Feldman. Manufacturing systems modeling and analysis (Second Edition). Springer Berlin Heidelberg, 2011. (doi:10.1007/978-3-642-16618-1)

[65]
B. Curtis, J. Sappidi, and J. Subramanyam. An evaluation of the internal quality of business applications: Does size matter? In Proceedings - International Conference on Software Engineering, pages 711–715, 2011. (doi:10.1145/1985793.1985893)

[66]
B. Curtis, J. Sappidi, and J. Subramanyam. Measuring the structural quality of business applications. In Proceedings - 2011 Agile Conference, Agile 2011, pages 147–150, 2011. (doi:10.1109/AGILE.2011.48)

[67]
G. D'Angelo, S. Ferretti, V. Ghini, and F. Panzieri. Mobile computing in digital ecosystems: Design issues and challenges. In IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, pages 2127–2132, 2011. (doi:10.1109/IWCMC.2011.5982863)

[68]
L. de Donder, M.-L. Luoma, B. Penhale, G. Lang, A.J. Santos, I. Tamutiene, M. Koivusilta, A. Schopf, J. Ferreira Alves, J. Reingarde, S. Perttu, T. Savola, and D. Verté. European map of prevalence rates of elder abuse and its impact for future research. European Journal of Ageing, 8(2):129–143, 2011. (doi:10.1007/s10433-011-0187-3)

[69]
L.C. De Miranda, H.H. Hornung, and M.C.C. Baranauskas. Qualitative results of an experiment with adjustable interactive rings for IDTV. In Proceedings of the IADIS International Conference Interfaces and Human Computer Interaction 2011, Part of the IADIS Multi Conference on Computer Science and Information Systems 2011, MCCSIS 2011, pages 233–240, 2011.

[70]
T. Delot, S. Ilarri, M. Thilliez, G. Vargas-Solar, and S. Lecomte. Multi-scale query processing in vehicular networks. Journal of Ambient Intelligence and Humanized Computing, 2(3):213–226, 2011. (doi:10.1007/s12652-011-0058-y)

[71]
T. Delot, N. Mitton, S. Ilarri, and T. Hien. Decentralized pull-based information gathering in vehicular networks using GeoVanet. In Proceedings - IEEE International Conference on Mobile Data Management, volume 1, pages 174–183, 2011. (doi:10.1109/MDM.2011.38)

[72]
T. Delot, N. Mitton, S. Ilarri, and T. Hien. GeoVanet: A routing protocol for query processing in vehicular networks. Mobile Information Systems, 7(4):329–359, 2011. (doi:10.3233/MIS-2011-0126)

[73]
L. Demir, S. Tunali, and A. Lkketangen. A tabu search approach for buffer allocation in production lines with unreliable machines. Engineering Optimization, 43(2):213–231, 2011. (doi:10.1080/0305215X.2010.481022)

[74]
J. Dubey and V. Tokekar. P2PCS - a pure peer-to-peer computing system for large scale computation problems. In Proceedings - 2011 International Conference on Computational Intelligence and Communication Systems, CICN 2011, pages 582–585, 2011. (doi:10.1109/CICN.2011.126)

[75]
S. Dunning and D. Sawyer. A little language for rapidly constructing automated performance tests. In ICPE'11 - Proceedings of the 2nd Joint WOSP/SIPEW International Conference on Performance Engineering, pages 371–380, 2011. (doi:10.1145/1958746.1958798)

[76]
K.O. Elish and M. Alshayeb. A classification of refactoring methods based on software quality attributes. Arabian Journal for Science and Engineering, 36(7):1253–1267, 2011. (doi:10.1007/s13369-011-0117-x)

[77]
J. Eyolfson, L. Tan, and P. Lam. Do time of day and developer experience affect commit bugginess. In Proceedings - International Conference on Software Engineering, pages 153–162, 2011. (doi:10.1145/1985441.1985464)

[78]
M. Farooq-i Azam and M.N. Ayyaz. Embedded systems security. In Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, pages 179–198. IGI Global, 2011. (doi:10.4018/978-1-60960-851-4.ch010)

[79]
C. Feichtinger, S. Donath, H. Köstler, J. Götz, and U. Rüde. WaLBerla: HPC software design for computational engineering simulations. Journal of Computational Science, 2(2):105–112, 2011. (doi:10.1016/j.jocs.2011.01.004)

[80]
P. Fernandes, M.E.J. O'Kelly, C.T. Papadopoulos, and A. Sales. PLAT — production lines analysis tool. In 41st International Conference on Computers and Industrial Engineering 2011, pages 92–97, 2011.

[81]
J. Ferrer, F. Chicano, and E. Alba. Benchmark generator for software testers. IFIP Advances in Information and Communication Technology, 364 AICT(PART 2):378–388, 2011. (doi:10.1007/978-3-642-23960-1_45)

[82]
I. Fister Jr., M. Mernik, and J. Brest. Design and implementation of domain-specific language easytime. Computer Languages, Systems and Structures, 37(4):151–167, 2011. (doi:10.1016/j.cl.2011.04.001)

[83]
S. Frey and W. Hasselbring. An extensible architecture for detecting violations of a cloud environment's constraints during legacy software system migration. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 269–278, 2011. (doi:10.1109/CSMR.2011.33)

[84]
Y. Fujiwara, M. Onizuka, and M. Kitsuregawa. Real-time diameter monitoring for time-evolving graphs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6587 LNCS(PART 1):311–325, 2011. (doi:10.1007/978-3-642-20149-3_24)

[85]
A.D. Gassama and I. Sarr. Lifetime-based dynamic data replication in P2P systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6864 LNCS:13–24, 2011. (doi:10.1007/978-3-642-22947-3_2)

[86]
B. Ghit, F. Pop, and V. Cristea. Using bio-inspired models to design peer-to-peer overlays. In Proceedings - 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2011, pages 248–252, 2011. (doi:10.1109/3PGCIC.2011.45)

[87]
P.G. Giarrusso, T. Rendel, S. Erdweg, K. Ostermann, and T. Berger. Variability-aware parsing in the presence of lexical macros and conditional compilation. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA, pages 805–824, 2011. (doi:10.1145/2048066.2048128)

[88]
A.F.B. Godoi and E.P. Duarte Jr. Peer content groups for reliable and transparent content access in P2P networks. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 776–781, 2011. (doi:10.1109/ICPADS.2011.98)

[89]
K.-S. Goetzmann, T. Harks, M. Klimm, and K. Miller. Optimal file distribution in peer-to-peer networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7074 LNCS:210–219, 2011. (doi:10.1007/978-3-642-25591-5_23)

[90]
Valery Golender and Vladislav Gusev. System and method for troubleshooting runtime software problems using application learning. United States Patent 8,032,866, October 2011. Assignee: Identify Software Ltd.(IL).

[91]
D. Gomes, J. Miranda, and M. Costa. A survey on web archiving initiatives. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6966 LNCS:408–420, 2011. (doi:10.1007/978-3-642-24469-8_41)

[92]
A. Gorgeon and E.B. Swanson. Web 2.0 according to wikipedia: Capturing an organizing vision. Journal of the American Society for Information Science and Technology, 62(10):1916–1932, 2011. (doi:10.1002/asi.21612)

[93]
R. Gracia-Tinedo, P. Garcıa-López, and M. Sánchez-Artigas. Sophia: Local trust for securing routing in DHTs. In Proceedings - 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2011, pages 372–381, 2011. (doi:10.1109/CCGrid.2011.57)

[94]
A. Gupta and L.K. Awasthi. Peer-to-peer networks and computation: Current trends and future perspectives. Computing and Informatics, 30(3):559–594, 2011.

[95]
C. Gutierrez. Modeling the web of data (introductory overview). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6848 LNCS:416–444, 2011. (doi:10.1007/978-3-642-23032-5_8)

[96]
E. Harjula, T. Koskela, and M. Ylianttila. Comparing the performance and efficiency of two popular DHTs in interpersonal communication. In 2011 IEEE Wireless Communications and Networking Conference, WCNC 2011, pages 2173–2178, 2011. (doi:10.1109/WCNC.2011.5779469)

[97]
K.A. Hawick. Engineering domain-specific languages and automatic code generation for computational simulations of complex systems. In Proceedings of the IASTED International Conference on Software Engineering and Applications, SEA 2011, pages 222–229, 2011. (doi:10.2316/P.2011.758-046)

[98]
E.C.S. Hayashi and M.C.C. Baranauskas. Towards a framework for the affective and emotional faces of usability. In International Conference on Information Society, i-Society 2011, pages 72–79, 2011.

[99]
I. Herraiz, D.M. German, and A.E. Hassan. On the distribution of source code file sizes. In ICSOFT 2011 - Proceedings of the 6th International Conference on Software and Database Technologies, volume 2, pages 5–14, 2011.

[100]
A. Holzinger, O. Waclik, F. Kappe, S. Lenhart, G. Orasche, and B. Peischl. Rapid prototyping on the example of software development in automotive industry - the importance of their provision for software projects at the correct time. In ICE-B 2011 - Proceedings of the International Conference on e-Business, pages 57–61, 2011.

[101]
H.-H. Hsu and H.-T. Liao. A mobile RFID-based tour system with instant microblogging. Journal of Computer and System Sciences, 77(4):720–727, 2011. (doi:10.1016/j.jcss.2010.02.011)

[102]
C.-L. Hu and D.-Y. Chen. Distributed pairing for file sharing in large-scale peer-to-peer networks. In International Conference on Advanced Communication Technology, ICACT, pages 492–497, 2011.

[103]
H. Huang, Q. Yang, J. Xiao, and J. Zhai. Automatic mining of change set size information from repository for precise productivity estimation. In Proceedings - International Conference on Software Engineering, pages 72–80, 2011. (doi:10.1145/1987875.1987889)

[104]
T.-L. Huang, T.-A. Hsieh, K.-C. Lai, , C.-H. Hsu, and H.-Y. Chang. Fault tolerance policy on dynamic load balancing in P2P grids. In Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pages 1413–1420, 2011. (doi:10.1109/TrustCom.2011.193)

[105]
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. An integrated approach for identity and access management in a SOA context. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pages 21–30, 2011. (doi:10.1145/1998441.1998446)

[106]
J.B. Hurwitz. The influence of trust and privacy risk-taking on user acceptance of electronic services that collect personal information. In Proceedings of the Human Factors and Ergonomics Society, pages 1110–1114, 2011. (doi:10.1177/1071181311551232)

[107]
N.-T. Huynh, , and M.-T. Segarra. Towards reliable distributed reconfiguration. In Proceedings of the International Workshop on Adaptive and Reflective Middleware, ARM 2011, Co-located with ACM/IFIP/USENIX International Middleware Conference, pages 36–41, 2011. (doi:10.1145/2088876.2088882)

[108]
M. Ingle and M. Kumar. Push technique based certificate revocation model for mobile devices. In Proceedings - 2011 International Conference on Computational Intelligence and Communication Systems, CICN 2011, pages 635–638, 2011. (doi:10.1109/CICN.2011.138)

[109]
E. Irrazábal, J. Garzás, and E. Marcos. Alignment of open source tools with the new ISO 25010 standard: Focus on maintainability. In ICSOFT 2011 - Proceedings of the 6th International Conference on Software and Database Technologies, volume 2, pages 111–116, 2011.

[110]
A. Isfandyari-Moghaddam and M.-K. Saberi. The life and death of URLs: The case of journal of the Medical Library Association. Library Philosophy and Practice, 2011(JULY), 2011.

[111]
K.R. Islam and C.M. Snow. An architecture for delivery of distance education in developing countries. In SIGITE'11 - Proceedings of the 2011 ACM Special Interest Group for Information Technology Education Conference, pages 215–220, 2011. (doi:10.1145/2047594.2047651)

[112]
S.-X. and Jiang. Exploiting multi-level locality to implement the scalable search in unstructured P2P network. Ruan Jian Xue Bao/Journal of Software, 22(9):2014–2120, 2011. (doi:10.3724/SP.J.1001.2011.03878)

[113]
T. Kalibera, J. Hagelberg, P. Maj, F. Pizlo, B. Titzer, and J. Vitek. A family of real-time java benchmarks. Concurrency Computation Practice and Experience, 23(14):1679–1700, 2011. (doi:10.1002/cpe.1677)

[114]
D. Kanellopoulos. Peer-to-peer content distribution systems: Surveying the landscape. In Peer-to-Peer Networks and Internet Policies, pages 193–204. Nova Science Publishers, Inc., 2011.

[115]
S.F. Karabag and C. Berggren. Mobile communications in turkey: From first mover advantages to management capabilities. Info, 13(2):72–84, 2011. (doi:10.1108/14636691111121647)

[116]
C. Kästner, P.G. Giarrusso, and K. Ostermann. Partial preprocessing c code for variability analysis. In ACM International Conference Proceeding Series, pages 127–136, 2011. (doi:10.1145/1944892.1944908)

[117]
N. Kayarvizhy and S. Kanmani. An automated tool for computing object oriented metrics using XML. Communications in Computer and Information Science, 191 CCIS(PART 2):69–79, 2011. (doi:10.1007/978-3-642-22714-1_8)

[118]
M. Kellett, T. Tran, and M. Li. Trust by association: A meta-reputation system for peer-to-peer networks. Computational Intelligence, 27(3):363–392, 2011. (doi:10.1111/j.1467-8640.2011.00388.x)

[119]
A. Khanjani and R. Sulaiman. The aspects of choosing open source versus closed source. In ISCI 2011 - 2011 IEEE Symposium on Computers and Informatics, pages 646–649, 2011. (doi:10.1109/ISCI.2011.5958992)

[120]
M. Kobayashi, S. Shibusawa, H. Ohno, and T. Yonekura. Participation and departure processes of nodes in connection graph. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 805–810, 2011. (doi:10.1109/ICPADS.2011.96)

[121]
S. Koch. Open source as a sourcing strategy for corporations. International Journal of Business Innovation and Research, 5(1):1–16, 2011. (doi:10.1504/IJBIR.2011.037253)

[122]
M. Kodialam, T.V. Lakshman, S. Mukherjee, and L. Wang. Online scheduling of targeted advertisements for IPTV. IEEE/ACM Transactions on Networking, 19(6):1825–1834, 2011. (doi:10.1109/TNET.2011.2143725)

[123]
D. Korzun and A. Gurtov. Survey on hierarchical routing schemes in "flat" distributed hash tables. Peer-to-Peer Networking and Applications, 4(4):346–375, 2011. (doi:10.1007/s12083-010-0093-z)

[124]
T. Kos, T. Kosar, J. Knez, and M. Mernik. From DCOM interfaces to domain-specific modeling language: A case study on the sequencer. Computer Science and Information Systems, 8(2):361–378, 2011. (doi:10.2298/CSIS101231009K)

[125]
T. Kos, T. Kosar, M. Mernik, and J. Knez. Ladybird: Debugging support in the sequencer. In Applications of Mathematics and Computer Engineering - American Conference on Applied Mathematics, AMERICAN-MATH'11, 5th WSEAS International Conference on Computer Engineering and Applications, CEA'11, pages 135–139, 2011.

[126]
T. Koskela, E. Harjula, O. Kassinen, and M. Ylianttila. Robustness of a P2P community management system based on two-level hierarchical DHT overlays. In Proceedings - IEEE Symposium on Computers and Communications, pages 881–886, 2011. (doi:10.1109/ISCC.2011.5983953)

[127]
C. Kothapalli, S.G. Ganesh, H.K. Singh, D.V. Radhika, T. Rajaram, K. Ravikanth, S. Gupta, and K. Rao. Continual monitoring of code quality. In Proceedings of the 4th India Software Engineering Conference 2011, ISEC'11, pages 175–184, 2011. (doi:10.1145/1953355.1953379)

[128]
A. Kousaridas, P. Madgalinos, and N. Alonistioti. Service provision evolution in self-managed future internet environments. IGI Global, 2011. (doi:10.4018/978-1-61350-110-8.ch006)

[129]
F.B. Ktata, N.E. Kadhi, and K. Ghedira. Mobile agents for intrusion detection system based on a new anomaly approach. Journal of Engineering and Applied Sciences, 6(1):79–90, 2011. (doi:10.3923/jeasci.2011.79.90)

[130]
Y.-X. Lai and Z. Yang. Unknown malicious detection based on improved bayes algorithm. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 37(5):766–772, 2011.

[131]
K.-C. Lai, K.-C. Huang, and Y.-F. Yu. Multi-attribute range queries on structured overlay networks. Journal of Internet Technology, 12(2):269–278, 2011.

[132]
Susan Landau. Surveillance or Security?: The Risks Posed by New Wiretapping Technologies. The MIT Press, 2011.

[133]
P.A. Laplante and S.J. Ovaska. Real-Time Systems Design and Analysis: Tools for the Practitioner. John Wiley and Sons, 2011. (doi:10.1002/9781118136607)

[134]
R.P. Leal, J.Á. Cachinero, and E. Pastor Martın. New approach to inter-domain multicast protocols. ETRI Journal, 33(3):355–365, 2011. (doi:10.4218/etrij.11.0110.0405)

[135]
D. Lee, A. Smith, and M. Mortimer. Cultural differences affecting quality and productivity in Western / Asian offshore software development. In ACM International Conference Proceeding Series, pages 29–39, 2011. (doi:10.1145/2407796.2407801)

[136]
P. Lerthathairat and N. Prompoon. An approach for source code classification using software metrics and fuzzy logic to improve code quality with refactoring techniques. Communications in Computer and Information Science, 181 CCIS(PART 3):478–492, 2011. (doi:10.1007/978-3-642-22203-0_42)

[137]
J. Liebig, C. Kästner, and S. Apel. Analyzing the discipline of preprocessor annotations in 30 million lines of C code. In AOSD '11: 10th International Conference on Aspect-Oriented Software Development, pages 191–202, 2011. (doi:10.1145/1960275.1960299)

[138]
C.-Y. Lin and C.-C. Chou. Effectiveness of ontology-based online exam platform for programming language education. In Congress on Computing in Civil Engineering, Proceedings, pages 907–914, 2011. (doi:10.1061/41182(416)112)

[139]
C.-S. Lin and G.-S. Wang. Balanced dynamic buffering for scalable peer-to-peer video-on-demand streaming with multiple description coding. In Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2011, pages 371–376, 2011. (doi:10.1109/CISIS.2011.60)

[140]
C.-S. Lin and M.-J. Yan. Service availability for P2P on-demand streaming with dynamic buffering. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 741–746, 2011. (doi:10.1109/ICPADS.2011.118)

[141]
C.-F. Lin, M.-C. Leu, C.-W. Chang, and S.-M. Yuan. The study and methods for cloud based CDN. In Proceedings - 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2011, pages 469–475, 2011. (doi:10.1109/CyberC.2011.82)

[142]
A. Liotta and G. Exarchakos. Content-aware networks. Lecture Notes in Electrical Engineering, 92 LNEE:95–109, 2011. (doi:10.1007/978-94-007-1473-1_7)

[143]
A. Liotta and G. Exarchakos. Discovering virtual resources. Lecture Notes in Electrical Engineering, 92 LNEE:133–144, 2011. (doi:10.1007/978-94-007-1473-1_9)

[144]
A. Liotta and G. Exarchakos. Distribution-efficient networks. Lecture Notes in Electrical Engineering, 92 LNEE:111–131, 2011. (doi:10.1007/978-94-007-1473-1_8)

[145]
X. Liu and A. Datta. A trust prediction approach capturing agents' dynamic behavior. In 22nd International Joint Conference on Artificial Intelligence, IJCAI 2011, pages 2147–2152, 2011. (doi:10.5591/978-1-57735-516-8/IJCAI11-358)

[146]
M. Liu, T. Koskela, Z. Ou, J. Zhou, J. Riekki, and M. Ylianttila. Super-peer-based coordinated service provision. Journal of Network and Computer Applications, 34(4):1210–1224, 2011. (doi:10.1016/j.jnca.2011.01.007)

[147]
M. Liu, T. Koskela, and M. Ylianttila. An efficient collaborative mechanism for enterprise cloud applications. In 2011 International Conference on Networking, Sensing and Control, ICNSC 2011, pages 163–168, 2011. (doi:10.1109/ICNSC.2011.5874928)

[148]
S.-T. Liu, H.-C. Huang, and Y.-M. Chen. A system call analysis method with MapReduce for malware detection. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, pages 631–637, 2011. (doi:10.1109/ICPADS.2011.17)

[149]
P.K.K. Loh and F. Tan. Mechanisms of polymorphic and metamorphic viruses. In Proceedings - 2011 European Intelligence and Security Informatics Conference, EISIC 2011, pages 149–154, 2011. (doi:10.1109/EISIC.2011.77)

[150]
F. Loukos, H.D. Karatza, and C.X. Mavromoustakis. Antp2pr: An ant intelligence inspired routing scheme for peer-to-peer networks. Simulation Modelling Practice and Theory, 19(2):649–661, 2011. (doi:10.1016/j.simpat.2010.10.004)

[151]
R.Z. Loureiro and A. Anzaloni. Searching content on peer-to-peer networks for in-flight entertainment. In IEEE Aerospace Conference Proceedings, 2011. (doi:10.1109/AERO.2011.5747377)

[152]
J. Luo and Y. Feng. Copyright protection in P2P networks using digital fingerprinting. International Review on Computers and Software, 6(3):366–370, 2011.

[153]
Y.-T. Ma, K.-Q. He, B. Li, and J. Liu. Empirical study on the characteristics of complex networks in networked software. Ruan Jian Xue Bao/Journal of Software, 22(3):381–407, 2011. (doi:10.3724/SP.J.1001.2011.03934)

[154]
D.F. MacEdo, A.L. Dos Santos, J.M. Nogueira, and G. Pujolle. Fuzzy-based load self-configuration in mobile P2P services. Computer Networks, 55(8):1834–1848, 2011. (doi:10.1016/j.comnet.2011.01.017)

[155]
G. MacKerron. Implementation, implementation, implementation: Old and new options for putting surveys and experiments online. Journal of Choice Modelling, 4(2):20–48, 2011. (doi:10.1016/S1755-5345(13)70056-3)

[156]
D. Malbaski, A. Kupusinac, and S. Popov. The impact of coding style on the readability of C programs. Technics Technologies Education Management, 6(4):1073–1082, 2011.

[157]
D. Man, Y. Ito, and K. Nakano. An efficient parallel sorting compatible with the standard qsort. International Journal of Foundations of Computer Science, 22(5):1057–1071, 2011. (doi:10.1142/S0129054111008568)

[158]
N. Marın, C. Sáez-Árcija, and M.A. Vila. Jar2Ontology - a tool for automatic extraction of semantic information from java object code. In ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, volume 1 DISI, pages 267–276, 2011.

[159]
S. Masrom, S.Z.Z. Abidin, P.N. Hashimah, and A.S. Abd. Rahman. Towards rapid development of user defined metaheuristics hybridization. International Journal of Software Engineering and its Applications, 5(2):1–12, 2011.

[160]
M. Masud and S. Aljahdali. Concurrent execution of transactions in a peer-to-peer database network. International Journal of Intelligent Information and Database Systems, 5(5):510–531, 2011. (doi:10.1504/IJIIDS.2011.042534)

[161]
M. Masud and I. Kiringa. Transaction processing in a peer to peer database network. Data and Knowledge Engineering, 70(4):307–334, 2011. (doi:10.1016/j.datak.2010.12.003)

[162]
C. Mateos, M. Crasso, A. Zunino, and J.L.O. Coscia. Detecting WSDL bad practices in code-first web services. International Journal of Web and Grid Services, 7(4):357–387, 2011. (doi:10.1504/IJWGS.2011.044710)

[163]
A. Mawji, H. Hassanein, and X. Zhang. Peer-to-peer overlay topology control for mobile ad hoc networks. Pervasive and Mobile Computing, 7(4):467–478, 2011. (doi:10.1016/j.pmcj.2011.04.003)

[164]
J.M. McCune and A. Perrig. VIPER: Verifying the integrity of peripherals' firmware. In Proceedings of the ACM Conference on Computer and Communications Security, pages 3–16, 2011. (doi:10.1145/2046707.2046711)

[165]
C. Melchiors, D.T. Mattjie, C.R.P. Dos Santos, A. Panisson, L.Z. Granville, and L.M.R. Tarouco. A P2P-based strongly distributed network polling solution. Advancements in Distributed Computing and Internet Technologies: Trends and Issues, pages 289–313, 2011. (doi:10.4018/978-1-61350-110-8.ch014)

[166]
M. Mernik and D. Rebernak. Aspect-oriented attribute grammars. Elektronika ir Elektrotechnika, 116(10):99–104, 2011.

[167]
K. Miller and A. Wolisz. Transport optimization in peer-to-peer networks. In Proceedings - 19th International Euromicro Conference on Parallel, Distributed, and Network-Based Processing, PDP 2011, pages 567–573, 2011. (doi:10.1109/PDP.2011.26)

[168]
D. Mishra and A. Mishra. Research trends in management issues of global software development: Evaluating the past to envision the future. Journal of Global Information Technology Management, 14(4):48–69, 2011.

[169]
Y. Mohamadi Begum and M.A. Maluk Mohamed. Deepg: Dual heap overlay resource discovery protocol for mobile grid. Scalable Computing, 12(2):239–255, 2011.

[170]
J.G. Mohebzada, G. Ruhe, and A. Eberlein. Srp-plugin: A strategic release planning plug-in for visual studio 2010. In Proceedings - International Conference on Software Engineering, pages 36–39, 2011. (doi:10.1145/1984708.1984719)

[171]
R. Mordinyi, A. Pacha, and S. Biffl. Quality assurance for data from low-tech participants in distributed automation engineering environments. In IEEE Symposium on Emerging Technologies and Factory Automation, ETFA, 2011. (doi:10.1109/ETFA.2011.6059149)

[172]
S. Murer, B. Bonati, and F.J. Furrer. Managed evolution: A strategy for very large information systems. Springer Berlin Heidelberg, 2011. (doi:10.1007/978-3-642-01633-2)

[173]
A. Murgia, M. Marchesi, G. Concas, R. Tonelli, and S. Counsell. Parameter-based refactoring and the relationship with fan-in/fan-out coupling. In Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2011, pages 430–436, 2011. (doi:10.1109/ICSTW.2011.26)

[174]
S. Nachtigal. E-business and security. IGI Global, 2011. (doi:10.4018/978-1-60960-501-8.ch016)

[175]
S. Nachtigal. E-business: Definition and characteristics. In Impact of E-Business Technologies on Public and Private Organizations: Industry Comparisons and Perspectives, pages 233–248. IGI Global, 2011. (doi:10.4018/978-1-60960-501-8.ch014)

[176]
J.A. Nacif, T.S.F. Silva, L.F.M. Vieira, A.B. Vieira, A.O. Fernandes, and C. Coelho Jr. Tracking hardware evolution. In Proceedings of the 12th International Symposium on Quality Electronic Design, ISQED 2011, pages 442–447, 2011. (doi:10.1109/ISQED.2011.5770764)

[177]
J.A.M. Nacif, T.S.F. Silva, L.F.M. Vieira, A.B. Vieira, A.O. Fernandes, and C.N. Coelho Jr. A cache based algorithm to predict HDL modules faults. In LATW 2011 - 12th IEEE Latin-American Test Workshop, 2011. (doi:10.1109/LATW.2011.5985931)

[178]
Yogesh Nagappa and Romain Moreau-Gobard. Method, apparatus and computer readable medium for secure conversion of confidential files. United States Patent 7,886,147, February 2011. Assignee: Siemens Aktiengesellschaft (Munich, DE).

[179]
A. Nagaraja, S.A. Joseph, H.H. Polen, and K.A. Clauson. Disappearing act: Persistence and attrition of uniform resource locators (URLs) in an open access medical journal. Program: electronic library and information systems, 45(1):98–106, 2011. (doi:10.1108/00330331111107420)

[180]
S. Nevo and I. Chengalur-Smith. Enhancing the performance of software development virtual teams through the use of agile methods: A pilot study. In Proceedings of the Annual Hawaii International Conference on System Sciences, 2011. (doi:10.1109/HICSS.2011.186)

[181]
X.-F. Nie, J.-W. Jing, Y.-W. Wang, and J. Xiang. Fluid-based large-scale bandwidth-limited worm simulation model. Ruan Jian Xue Bao/Journal of Software, 22(9):2157–2181, 2011. (doi:10.3724/SP.J.1001.2011.03854)

[182]
N. Nkomo, D. Ocholla, and D. Jacobs. Web information seeking behaviour of students and staff in rural and urban based universities in South Africa: A comparison analysis. Libri, 61(4):281–297, 2011. (doi:10.1515/libr.2011.024)

[183]
M. Nkosi and F. Mekuria. Improving the capacity, reliability and life of mobile devices with cloud computing. 2011 IST-Africa Conference Proceedings, IST 2011, 2011.

[184]
M.T. Nkosi, F. Mekuria, and S.H. Gejibo. Challenges in mobile bio-sensor based mHealth development. In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, HEALTHCOM 2011, pages 21–27, 2011. (doi:10.1109/HEALTH.2011.6026750)

[185]
M. Nordio, H.C. Estler, B. Meyer, J. Tschannen, and C. and Ghezzi. How do distribution and time zones affect software development? a case study on communication. In Proceedings - 2011 6th IEEE International Conference on Global Software Engineering, ICGSE 2011, pages 176–184, 2011. (doi:10.1109/ICGSE.2011.22)

[186]
M. Obrist, C. Moser, D. Alliez, and M. Tscheligi. In-situ evaluation of users' first impressions on a unified electronic program guide concept. Entertainment Computing, 2(3):191–202, 2011. (doi:10.1016/j.entcom.2011.02.003)

[187]
Y. Okaie and T. Nakano. A game theoretic framework for peer-to-peer market economy. International Journal of Grid and Utility Computing, 2(3):183–195, 2011. (doi:10.1504/IJGUC.2011.042041)

[188]
P. Oliveira, P. Ferreira, and L. Veiga. Gridlet economics: Resource management models and policies for cycle-sharing systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6646 LNCS:72–83, 2011. (doi:10.1007/978-3-642-20754-9_9)

[189]
J. Oosterman, W. Irwin, and N. Churcher. EVOJAVA: A tool for measuring evolving software. In Conferences in Research and Practice in Information Technology Series, volume 113, pages 117–125, 2011.

[190]
Raymond E. Ozzie, Jack E. Ozzie, George P. Moromisato, Paresh S. Suthar, Raman Narayanan, and Matthew S. Augustine. Clipboard augmentation. United States Patent 8,020,112, September 2011. Assignee: Microsoft Corporation (Redmond, WA).

[191]
A.S. Panah and S. Khorsandi. Overlay construction based on dynamic coalition formation game in P2P networks. In 5th International Conference on Signal Processing and Communication Systems, ICSPCS'2011 - Proceedings, 2011. (doi:10.1109/ICSPCS.2011.6140870)

[192]
M. Pančur and M. Ciglarič. Impact of test-driven development on productivity, code and tests: A controlled experiment. Information and Software Technology, 53(6):557–573, 2011. (doi:10.1016/j.infsof.2011.02.002)

[193]
C.T. Papadopoulos, M.E.J. O'Kelly, M.I. Vidalis, C. Petridis, N. Pistofidis, and M. Nikita. A comparative study on a selection of search design algorithms for solving the buffer allocation problem in serial production lines. In 41st International Conference on Computers and Industrial Engineering 2011, pages 208–213, 2011.

[194]
R.B. Patel and V. Garg. Resource management in peer-to-peer networks: A NADSE approach. In AIP Conference Proceedings, volume 1414, pages 159–164, 2011. (doi:10.1063/1.3669949)

[195]
S. Paul, J. Pan, and R. Jain. Architectures for the future networks and the next generation internet: A survey. Computer Communications, 34(1):2–42, 2011. (doi:10.1016/j.comcom.2010.08.001)

[196]
D.J. Pearce and J. Noble. Implementing a language with flow-sensitive and structural typing on the JVM. Electronic Notes in Theoretical Computer Science, 279(1):47–59, 2011. (doi:10.1016/j.entcs.2011.11.005)

[197]
Y. Peng, , and R. Shen. Distributed computing model and supporting technologies for the dynamic allocation of internet resources. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 48(9):1580–1588, 2011.

[198]
A. Pironti, D. Pozza, and R. Sisto. Automated formal methods for security protocol engineering. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, pages 138–166, 2011. (doi:10.4018/978-1-60960-851-4.ch008)

[199]
A.N. Platis and V.P. Koutras. Software rejuvenation on a PKI. In Proceedings - International Symposium on Software Reliability Engineering, ISSRE, 2011. (doi:10.1109/WOSAR.2010.5722102)

[200]
R.I. Podlovchenko, N.N. Kuzyurin, V.S. Shcherbina, and V.A. Zakharov. Using algebraic models of programs for detecting metamorphic malwares. Journal of Mathematical Sciences, 172(5):740–750, 2011. (doi:10.1007/s10958-011-0216-y)

[201]
W. Poncin, A. Serebrenik, and M. Van Den Brand. Mining student capstone projects with FRASR and prom. In SPLASH'11 Compilation - Proceedings of OOPSLA'11, Onward! 2011, GPCE'11, DLS'11, and SPLASH'11 Companion, pages 87–95, 2011. (doi:10.1145/2048147.2048181)

[202]
W. Poncin, A. Serebrenik, and M. Van Den Brand. Process mining software repositories. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 5–13, 2011. (doi:10.1109/CSMR.2011.5)

[203]
D. Posnett, V. Filkov, and P. Devanbu. Ecological inference in empirical software engineering. In 2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, Proceedings, pages 362–371, 2011. (doi:10.1109/ASE.2011.6100074)

[204]
P. Prabhu, H. Kim, , T.B. Jablin, N.P. Johnson, M. Zoufaly, A. Raman, F. Liu, D. Walker, Y. Zhang, S. Ghosh, D.I. August, J. Huang, and S. Beard. A survey of the practice of computational science. In State of the Practice Reports, SC'11, 2011. (doi:10.1145/2063348.2063374)

[205]
A.N. Prata and T. Chambel. Going beyond iTV: Designing flexible video-based crossmedia interactive services as informal learning contexts. In EuroITV'11 - Proceedings of the 9th European Interactive TV Conference, pages 65–74, 2011. (doi:10.1145/2000119.2000170)

[206]
C.R. Prause. Reputation-based self-management of software process artifact quality in consortium research projects. In Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pages 380–383, 2011. (doi:10.1145/2025113.2025166)

[207]
C.R. Prause. A software project perspective on the fitness and evolvability of personal learning environments. In 1st Workshop on Exploring Fitness and Evolvability of Personal Learning Environments, EFEPLE 2011, volume 773, pages 49–50. CEUR-WS, 2011.

[208]
I. Psaras and L. Mamatas. On demand connectivity sharing: Queuing management and load balancing for user-provided networks. Computer Networks, 55(2):399–414, 2011. (doi:10.1016/j.comnet.2010.08.015)

[209]
Y.-J. Qiu and X.-S. Liu. Efficient writing mechanism for P2P file system. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 40(4):587–591, 2011. (doi:10.3969/j.issn.1001-0548.2011.04.023)

[210]
L. Ramaswamy and J. Chen. The coquos approach to continuous queries in unstructured overlays. IEEE Transactions on Knowledge and Data Engineering, 23(3):463–478, 2011. (doi:10.1109/TKDE.2010.133)

[211]
X. Rao, G. Yin, H. Wang, D. Shi, and Y. Zhu. Filtering error log as time series in complex service-based storage systems. In Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011, pages 226–231, 2011.

[212]
J.M. Rodriguez, A. Zunino, and M. Campo. Introducing mobile devices into grid systems: A survey. International Journal of Web and Grid Services, 7(1):1–40, 2011. (doi:10.1504/IJWGS.2011.038386)

[213]
C. Ruiz and W. Robinson. Measuring open source quality: A literature review. International Journal of Open Source Software and Processes, 3(3):48–65, 2011.

[214]
S. Sawamura, A. Aikebaier, V. Barolli, and M. Takizawa. Trustworthy acquaintances in peer-to-peer (P2P) overlay networks. International Journal of Business Intelligence and Data Mining, 6(1):42–54, 2011. (doi:10.1504/IJBIDM.2011.038273)

[215]
S. Sawamura, A. Barolli, A. Aikebaier, M. Ikeda, and M. Takizawa. Objective trustworthiness of acquaintances in peer-to-peer (P2P) overlay networks. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pages 167–174, 2011. (doi:10.1109/AINA.2011.53)

[216]
S. Sawamura, A. Barolli, A. Aikebaier, M. Takizawa, and T. Enokido. Design and evaluation of algorithms for obtaining objective trustworthiness on acquaintances in P2P overlay networks. International Journal of Grid and Utility Computing, 2(3):196–203, 2011. (doi:10.1504/IJGUC.2011.042042)

[217]
C. Schäfer, T. Kuhn, and M. Trapp. A pattern-based approach to DSL development. In SPLASH'11 Workshops - Compilation Proceedings of the Co-Located Workshops: DSM'11, TMC'11, AGERE'11, AOOPES'11, NEAT'11, and VMIL'11, pages 39–45, 2011. (doi:10.1145/2095050.2095058)

[218]
Brian Lloyd Schmidt, Christopher M. Pirich, Derek H. Smith, Gregory A. Martinez, Jon Marcus Randall Whitten, Joshua G. Poley, Maciej Maciesowicz, and Michael Cory Maston. Game console communication with a device. United States Patent 7,991,890, August 2011. Assignee: Microsoft Corporation (Redmond, WA).

[219]
D. Schuurman, , and K. Berte. Adoption versus use diffusion of iDTV in flanders - personalized television content as a tool to cross the chasm? Computers in Entertainment, 9(3), 2011. (doi:10.1145/2027456.2027466)

[220]
E. and Scornavacca. The challenge of meeting users' requirements of a mobile accounting information system. In Proceedings - 2011 10th International Conference on Mobile Business, ICMB 2011, pages 105–113, 2011. (doi:10.1109/ICMB.2011.27)

[221]
S. Seneviratne and D.C. Levy. Task profiling model for load profile prediction. Future Generation Computer Systems, 27(3):245–255, 2011. (doi:10.1016/j.future.2010.09.004)

[222]
V. Sesum-Cavic and E. Kühn. Self-organized load balancing through swarm intelligence. Studies in Computational Intelligence, 352:195–224, 2011. (doi:10.1007/978-3-642-20344-2_8)

[223]
S. Shaaban. Unpaced production lines with jointly unbalanced operation time means and buffer capacities - their behaviour and performance. International Journal of Manufacturing Technology and Management, 23(1-2):54–68, 2011. (doi:10.1504/IJMTM.2011.042108)

[224]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive media playback based on destination. United States Patent 7,996,422, August 2011. Assignee: AT&T Intellectual Property L.L.P. (Atlanta, GA).

[225]
V. Shanmughaneethi, Ra.Y. Pravin, and S. Swamynathan. XIVD: Runtime detection of XPath injection vulnerabilities in XML databases through aspect oriented programming. Communications in Computer and Information Science, 198 CCIS:192–201, 2011. (doi:10.1007/978-3-642-22555-0_21)

[226]
R. Shen and H.-M. Wang. A programming language approach to internet-based virtual environment computing. Journal of Computer Science and Technology, 26(4):X600–615, 2011. (doi:10.1007/s11390-011-1160-5)

[227]
S. Shibusawa, M. Kobayashi, H. Ohno, and T. Yonekura. Arrival and departure processes of nodes in P2P systems. In 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011, pages 609–614, 2011. (doi:10.1109/GLOCOMW.2011.6162523)

[228]
Stylianos Sidiroglou, Angelos D. Keromytis, and Kostas G. Anagnostakis. Systems and methods for detecting and inhibiting attacks using honeypots. United States Patent 7,904,959, March 2011. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[229]
S.E. Sim, M. Umarji, S. Ratanotayanon, and C.V. Lopes. How well do search engines support code retrieval on the web? ACM Transactions on Software Engineering and Methodology, 21(1), 2011. (doi:10.1145/2063239.2063243)

[230]
N. Singh, D. Pucsek, J. Wall, C. Gibbs, M. Salois, and Y. Coady. Spinal tap: High level analysis for heavy metal systems. In IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings, pages 881–889, 2011. (doi:10.1109/PACRIM.2011.6033012)

[231]
R. Sitzenfrei, M. Mair, , and W. Rauch. Cascade vulnerability for risk analysis of water infrastructure. Water Science and Technology, 64(9):1885–1891, 2011. (doi:10.2166/wst.2011.813)

[232]
A. Sobe and W. and Elmenreich. Replication for bio-inspired delivery in unstructured peer-to-peer networks. In 2011 Proceedings of the 9th International Workshop on Intelligent Solutions in Embedded Systems, WISES 2011, 2011.

[233]
B. Sodhi and T.V. Prabhakar. Assessing suitability of cloud oriented platforms for application development. In Proceedings - 9th Working IEEE/IFIP Conference on Software Architecture, WICSA 2011, pages 328–335, 2011. (doi:10.1109/WICSA.2011.51)

[234]
M. Sojer and J. Henkel. License risks from ad hoc reuse of code from the internet. Communications of the ACM, 54(12):74–81, 2011. (doi:10.1145/2043174.2043193)

[235]
M. Sojer. Reusing open source code: Value creation and value appropriation perspectives on knowledge reuse. Gabler, 2011. (doi:10.1007/978-3-8349-6390-1)

[236]
A. Soumplis, E. Chatzidaki, E. Koulocheri, and M. Xenos. Implementing an open personal learning environment. In Proceedings - 2011 Panhellenic Conference on Informatics, PCI 2011, pages 345–349, 2011. (doi:10.1109/PCI.2011.2)

[237]
David Howard Spencer and Darla Renae Agard. Systems, methods, and software for researching statutory information. United States Patent 8,032,533, October 2011. Assignee: Thomson Reuters Global Resources (Baar, CH).

[238]
Salvatore J. Stolfo, Angelos D. Keromytis, and Stelios Sidiroglou. Methods, media and systems for detecting anomalous program executions. United States Patent 8,074,115, December 2011. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[239]
M. Strembeck and J. Mendling. Modeling process-related RBAC models with extended UML activity models. Information and Software Technology, 53(5):456–483, 2011. (doi:10.1016/j.infsof.2010.11.015)

[240]
Sufatrio and R.H.C. Yap. Trusted principal-hosted certificate revocation. IFIP Advances in Information and Communication Technology, 358 AICT:173–189, 2011. (doi:10.1007/978-3-642-22200-9_15)

[241]
W.D. Sunindyo, T. Moser, D. Winkler, and S. Biffl. Analyzing OSS project health with heterogeneous data sources. International Journal of Open Source Software and Processes, 3(4):1–23, 2011.

[242]
Hironori Suzuki, Kenichi Moriwaki, and Naoya Okamoto. GUI application development supporting apparatus, method, and computer program. United States Patent 8,074,174, December 2011. Assignee: SONY Corporation (Tokyo, JP).

[243]
E. Symeonidou-Kastanidou. Dna analysis and criminal proceedings: The european institutional framework. European Journal of Crime, Criminal Law and Criminal Justice, 19(2):139–160, 2011. (doi:10.1163/157181711X566317)

[244]
O. Tajeddini, A. Azimi, A. Sadatmoosavi, and H. Sharif-Moghaddam. Death of web citations: A serious alarm for authors. Malaysian Journal of Library and Information Science, 16(3):17–29, 2011.

[245]
H. Tan and Y. and Yang. Security design and implementation of yangtze gold cruises website. Advances in Intelligent and Soft Computing, 128:477–483, 2011. (doi:10.1007/978-3-642-25989-0_77)

[246]
R. Tartler, D. Lohmann, C. Dietrich, C. Egger, and J. Sincero. Configuration coverage in the analysis of large-scale system software. In Proceedings of the 6th Workshop on Programming Languages and Operating Systems, PLOS 2011 - In Conjunction with the 23rd ACM Symposium on Operating Systems Principles, SOSP 2011, 2011. (doi:10.1145/2039239.2039242)

[247]
R. Tartler, D. Lohmann, J. Sincero, and W. Schröder-Preikschat. Feature consistency in compile-time - configurable system software: Facing the linux 10,000 feature problem. In EuroSys'11 - Proceedings of the EuroSys 2011 Conference, pages 47–60, 2011. (doi:10.1145/1966445.1966451)

[248]
C. Taube-Schock, R.J. Walker, and I.H. Witten. Can we avoid high coupling? Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6813 LNCS:204–228, 2011. (doi:10.1007/978-3-642-22655-7_10)

[249]
A. Telea and L. Voinea. Visual software analytics for the build optimization of large-scale software systems. Computational Statistics, 26(4):635–654, 2011. (doi:10.1007/s00180-011-0248-2)

[250]
L.F. Teófilo and P.B. Silva. Integrating simple recommendation systems on digital TV widget applications. In Proceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011, 2011.

[251]
V.S. Tidake and S.A. Talekar. Steganography using version control system. Communications in Computer and Information Science, 133 CCIS(PART 3):470–480, 2011.

[252]
J.-P. Tolvanen, J. Sprinkle, M. Rossi, and J. Gray. The 11th workshop on domain-specific modeling. In SPLASH'11 Compilation - Proceedings of OOPSLA'11, Onward! 2011, GPCE'11, DLS'11, and SPLASH'11 Companion, pages 317–318, 2011. (doi:10.1145/2048147.2048227)

[253]
J.-P. Tolvanen. Creating domain-specific modelling languages that work: Hands-on. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6698 LNCS:393–394, 2011. (doi:10.1007/978-3-642-21470-7_34)

[254]
J.-P. Tolvanen. Metaedit+: Domain-specific modeling environment for product lines. In ACM International Conference Proceeding Series, 2011. (doi:10.1145/2019136.2019195)

[255]
R. Tonelli, G. Concas, M. Marchesi, and A. Murgia. An analysis of SNA metrics on the java qualitas corpus. In Proceedings of the 4th India Software Engineering Conference 2011, ISEC'11, pages 205–213, 2011. (doi:10.1145/1953355.1953382)

[256]
D. Traskas and J. Padget. A multi-agent systems approach to call-centre management. International Journal of Parallel, Emergent and Distributed Systems, 26(5):347–367, 2011. (doi:10.1080/17445761003720228)

[257]
D. Traskas, J. Padget, and J. Tansley. A probabilistic mechanism for agent discovery and pairing using domain-specific data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6541 LNAI:192–209, 2011. (doi:10.1007/978-3-642-21268-0_11)

[258]
E. Tsekleves, R. Whitham, K. Kondo, and A. Hill. Investigating media use and the television user experience in the home. Entertainment Computing, 2(3):151–161, 2011. (doi:10.1016/j.entcom.2011.02.002)

[259]
S.-M. Tseng and J.-S. Huang. The correlation between wikipedia and knowledge sharing on job performance. Expert Systems with Applications, 38(5):6118–6124, 2011. (doi:10.1016/j.eswa.2010.11.009)

[260]
D. Tsolis, S. Sioutas, M.N. Xenos, and G. Styliaras. Copyright and IPR management for cultural heritage digital content in peer-to-peer networks. Journal of Cultural Heritage, 12(4):466–475, 2011. (doi:10.1016/j.culher.2011.03.009)

[261]
A. Tsoukala. Timing 'dangerousness': Football crowd disorder in the italian and greek press. Sport in Society, 14(5):598–611, 2011. (doi:10.1080/17430437.2011.574360)

[262]
E. Turban, T.-P. Liang, and S.P.J. Wu. A framework for adopting collaboration 2.0 tools for virtual group decision making. Group Decision and Negotiation, 20(2):137–154, 2011. (doi:10.1007/s10726-010-9215-5)

[263]
P. Turek, J. Spychała, A. Wierzbicki, and P. Gackowski. Social mechanism of granting trust basing on polish wikipedia requests for adminship. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6984 LNCS:212–225, 2011. (doi:10.1007/978-3-642-24704-0_25)

[264]
I. Turnu, G. Concas, M. Marchesi, S. Pinna, and R. Tonelli. A modified yule process to model the evolution of some object-oriented system properties. Information Sciences, 181(4):883–902, 2011. (doi:10.1016/j.ins.2010.10.022)

[265]
P.K. Tysowski, P. Zhao, and K. Naik. Peer to peer content sharing on ad hoc networks of smartphones. In IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, pages 1445–1450, 2011. (doi:10.1109/IWCMC.2011.5982751)

[266]
Shah Ullah. Targeting content to network-enabled television devices. United States Patent 8,060,399, November 2011.

[267]
United States House of Representatives. Committee on the Judiciary. Subcommittee on Crime, Terrorism and Homeland Security. Hearing on: the ``going dark: Lawful electronic surveillance in the face of new technologies''. testimony of susan landau. Available online http://judiciary.house.gov/_files/hearings/printers/112th/112-59_64581.pdf, February 2011. Serial No. 112-59. U.S. Government Printing Office. Washington.

[268]
J. Van Den Bos and T. Van Der Storm. Bringing domain-specific languages to digital forensics. In Proceedings - International Conference on Software Engineering, pages 671–680, 2011. (doi:10.1145/1985793.1985887)

[269]
P. Vennou, E. Mantzari, and G. Lekakos. Evaluating program-embedded advertisement format in interactive digital TV. In EuroITV'11 - Proceedings of the 9th European Interactive TV Conference, pages 145–154, 2011. (doi:10.1145/2000119.2000149)

[270]
Z. Vukanovic. New media business models in social and web media. Journal of Media Business Studies, 8(3):51–67, 2011.

[271]
V. Waller. The search queries that took Australian internet users to wikipedia. Information Research, 16(2), 2011.

[272]
C.-S. Wang, W.-D. Chen, and C.-L. Chen. Location-based P2P mobile navigation system. In Proceedings - 2011 International Symposium on Computer Science and Society, ISCCS 2011, pages 361–364, 2011. (doi:10.1109/ISCCS.2011.104)

[273]
J.H. Wang, C. Wang, J. Yang, and C. An. A study on key strategies in P2P file sharing systems and ISPs' P2P traffic management. Peer-to-Peer Networking and Applications, 4(4):410–419, 2011. (doi:10.1007/s12083-010-0098-7)

[274]
Z. Wang, , L. Chen, and Z. Shi. Parallel computation techniques for dynamic description logics reasoning. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 48(12):2317–2325, 2011.

[275]
J.B. Wendt and M. Potkonjak. Nanotechnology-based trusted remote sensing. In Proceedings of IEEE Sensors, pages 1213–1216, 2011. (doi:10.1109/ICSENS.2011.6127174)

[276]
R. Wilken, B. Nansen, and M. Arnold. The cultural economy of TiVo in australia. Telecommunication Journal of Australia, 61(4):61.1–61.14, 2011.

[277]
F. Wu. Empirical tests of scale-free geometry in NASA DATA. Advanced Materials Research, 301-303:762–767, 2011. (doi:10.4028/www.scientific.net/AMR.301-303.762)

[278]
C.C. Xavier and V.L.S. De Lima. Declaration of research: Automatic extraction of ontologies from wikipedia. In Iberoamerican Meeting of Ontological Research 2011, Co-located with the 6th Ibero-American Congress on Telematics, CITA 2011, volume 728, 2011.

[279]
B. Xie, M. Van Der Schaar, T. Courtade, and R.D. Wesel. Minimizing weighted sum finish time for one-to-many file transfer in peer-to-peer networks. In 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, pages 1771–1778, 2011. (doi:10.1109/Allerton.2011.6120383)

[280]
H. Yamamoto and K. Yamazaki. Decentralized live video broadcasting system using location-aware P2P network technology. In 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011, pages 262–266, 2011. (doi:10.1109/CCNC.2011.5766469)

[281]
I. Yu, B. Song, J. Son, and D.-K. Baik. Discovering credentials in the content centric network. In International Conference on Information Networking 2011, ICOIN 2011, pages 43–47, 2011. (doi:10.1109/ICOIN.2011.5723111)

[282]
S. Zeltyn, P. Tarr, M. Cantor, R. Delmonico, S. Kannegala, M. Keren, A.P. Kumar, and S. Wasserkrug. Improving efficiency in software maintenance. In Proceedings - International Conference on Software Engineering, pages 215–218, 2011. (doi:10.1145/1985441.1985474)

[283]
Z. Zeng, B. Veeravalli, and K. Li. A novel server-side proxy caching strategy for large-scale multimedia applications. Journal of Parallel and Distributed Computing, 71(4):525–536, 2011. (doi:10.1016/j.jpdc.2010.06.008)

[284]
X. Zhan, X. Wang, and H. Hong. Caching, replication strategy and implementions of directories in DHT-based filesystem. In Proceedings - 2011 6th International Conference on Pervasive Computing and Applications, ICPCA 2011, pages 287–292, 2011. (doi:10.1109/ICPCA.2011.6106519)

[285]
Y. Zhang and and. Survey of DHT topology construction techniques in virtual computing environments. Science China Information Sciences, 54(11):2221–2235, 2011. (doi:10.1007/s11432-011-4377-6)

[286]
L. Zhang, J. Zhu, and Z. Tian. Research on verification method of mutual authentication in GSM/UMTS inter-system based on finite state machine. In Proceedings - 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control, IMCCC 2011, pages 541–544, 2011. (doi:10.1109/IMCCC.2011.140)

[287]
S. Zhang, B. Wang, G. Wei, and Y. Zhou. AF-Chord: An improved Chord model based adjusted Finger Table. In Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011, pages 335–338, 2011. (doi:10.1109/ICBNMT.2011.6155952)

[288]
X. Zhang, L. Zhang, M. Chai, Y. Taniguchi, and J. Hosoya. Implementation and evaluation of a flexible software measurement system for japan-oriented offshore development. In Proceedings of the 10th IASTED International Conference on Software Engineering, SE 2011, pages 95–102, 2011. (doi:10.2316/P.2011.720-028)

[289]
L. Zhang. Use of web resources in the journal literature 2001 and 2007: A cross-disciplinary study. College and Research Libraries, 72(2):167–179, 2011.

[290]
L. Zhao and J.H. Hayes. Rank-based refactoring decision support: Two studies. Innovations in Systems and Software Engineering, 7(3):171–189, 2011. (doi:10.1007/s11334-011-0154-3)

[291]
J. Zhao. Index-based search scheme in peer-to-peer networks. Communications in Computer and Information Science, 159 CCIS(PART 2):102–106, 2011. (doi:10.1007/978-3-642-22691-5_18)

[292]
Y.-T. Zheng, Z.-J. Zha, and T.-S. Chua. Research and applications on georeferenced multimedia: A survey. Multimedia Tools and Applications, 51(1):77–98, 2011. (doi:10.1007/s11042-010-0630-z)

[293]
L. Zhong, X. Wang, and M. Kihl. Topological model and analysis of the P2P bittorrent protocol. In Proceedings of the World Congress on Intelligent Control and Automation (WCICA), pages 753–758, 2011. (doi:10.1109/WCICA.2011.5970615)

[294]
L. Zhou, Y. Zhang, K. Song, W. Jing, and A.V. Vasilakos. Distributed media services in P2P-based vehicular networks. IEEE Transactions on Vehicular Technology, 60(2):692–703, 2011. (doi:10.1109/TVT.2010.2102782)

[295]
L. Zhu and S. Liu. An experimental comparative study on three classification algorithms on unknown malicious code identification. In 2011 International Conference on Multimedia Technology, ICMT 2011, pages 4829–4832, 2011. (doi:10.1109/ICMT.2011.6002063)

[296]
L. Zhu. An identification method on unknown malicious code based on the good or evil index of API. In 2011 International Conference on Multimedia Technology, ICMT 2011, pages 5285–5288, 2011. (doi:10.1109/ICMT.2011.6002319)