Proceedings of the 20th Symposium on Applied Computing
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, Roger L. Wainwright
Proceedings of the 20th Symposium on Applied Computing
SAC, 2005.

SE
DBLP
Scholar
Full names Links ISxN
@proceedings{SAC-2005,
	address       = "Santa Fe, New Mexico, USA",
	editor        = "Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright",
	isbn          = "1-58113-964-0",
	publisher     = "{ACM}",
	title         = "{Proceedings of the 20th Symposium on Applied Computing}",
	year          = 2005,
}

Contents (319 items)

SAC-2005-Hutchinson #future of #information management
The future of systematic information protection (BH), p. 1.
SAC-2005-Moore #order
Order relations and rigor in computing (REM), p. 2.
SAC-2005-ValigianiBJLBC
Experimenting with a real-size man-hill to optimize pedagogical paths (GV, RB, YJ, EL, CBR, PC), pp. 4–8.
SAC-2005-OcaGA #algorithm #classification #clustering #network
An hybridization of an ant-based clustering algorithm with growing neural gas networks for classification tasks (MAMdO, LG, JLA), pp. 9–13.
SAC-2005-KatayamaKN #learning #process
Reinforcement learning agents with primary knowledge designed by analytic hierarchy process (KK, TK, HN), pp. 14–21.
SAC-2005-MartinB #fault
Estimating manifold dimension by inversion error (SM, AB), pp. 22–26.
SAC-2005-ZhouP #approach #data-driven #design #distance
Data driven approach to designing minimum hamming distance polychotomizer (JZ, GP), pp. 27–31.
SAC-2005-WangPSV #ranking
Variable selection and ranking for analyzing automobile traffic accident data (HW, ASP, RKS, SVV), pp. 32–37.
SAC-2005-PandeyGM #algorithm #learning #probability #scheduling
Stochastic scheduling of active support vector learning algorithms (GP, HG, PM), pp. 38–42.
SAC-2005-YangC #algorithm #detection #maturity
The T-detectors maturation algorithm based on match range model (DY, JC), pp. 43–44.
SAC-2005-JangSSH #comparison #identification
A comparison on information fusion methods for air target identification (DJ, SYS, CYS, CCH), pp. 45–46.
SAC-2005-ToKS #exclamation #mobile #network
Mobile agents for network management: when and when not! (HHT, SK, BS), pp. 47–53.
SAC-2005-AlbayrakWVLM #information management #personalisation
Agent technology for personalized information filtering: the PIA-system (SA, SW, NV, AL, DM), pp. 54–59.
SAC-2005-ZorzoM #fault tolerance
An agent model for fault-tolerant systems (AFZ, FRM), pp. 60–65.
SAC-2005-RothPP #distributed #mobile
A distributed content-based search engine based on mobile code (VR, UP, JP), pp. 66–73.
SAC-2005-HurtT #communication #effectiveness #empirical #evaluation #multi
An empirical evaluation of communication effectiveness in autonomous reactive multiagent systems (DH, PT), pp. 74–78.
SAC-2005-LauW #approach #multi #optimisation #problem
A multi-agent approach for solving optimization problems involving expensive resources (HCL, HW), pp. 79–83.
SAC-2005-HeI #distributed #resource management #self
Forming resource-sharing coalitions: a distributed resource allocation mechanism for self-interested agents in computational grids (LH, TRI), pp. 84–91.
SAC-2005-DaoudM #analysis #mobile #reliability
Reliability analysis of mobile agent-based systems (MD, QHM), pp. 92–93.
SAC-2005-MikhailovT #approach #fuzzy #outsourcing
Fuzzy approach to outsourcing of information technology services (LM, PET), pp. 94–98.
SAC-2005-LeeST #database #performance
Efficient discovery of unique signatures on whole-genome EST databases (HPL, TFS, YTT), pp. 100–104.
SAC-2005-HastingsLOKPCJS #data transformation #distributed #using #xml
Grid-based management of biomedical data using an XML-based distributed data management system (SH, SL, SO, TMK, TP, ÜVÇ, DJ, JHS), pp. 105–109.
SAC-2005-ChenCG #biology #database #query
A complex biological database querying method (JYC, JVC, NG), pp. 110–114.
SAC-2005-WernertL #database #flexibility #named #scalability #visualisation
PViN: a scalable and flexible system for visualizing pedigree databases (EAW, JL), pp. 115–122.
SAC-2005-RahalRPNPRV #biology #incremental #interactive #mining
Incremental interactive mining of constrained association rules from biological annotation data with nominal features (IR, DR, AP, HN, WP, RR, WVG), pp. 123–127.
SAC-2005-SilvaS #design #framework
A framework for result handling in bioinformatics: an application to computer assisted drug design (AOdS, ONdS), pp. 128–132.
SAC-2005-FaederBH #network #representation #rule-based #visual notation
Graphical rule-based representation of signal-transduction networks (JRF, MLB, WSH), pp. 133–140.
SAC-2005-JayadevaprakashMP #generative #graph #transitive #using
Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
SAC-2005-HuangCC #algorithm #approximate #type inference
An approximation algorithm for haplotype inference by maximum parsimony (YTH, KMC, TC), pp. 146–150.
SAC-2005-BockerL #composition #performance
Efficient mass decomposition (SB, ZL), pp. 151–157.
SAC-2005-TayJ #adaptation #framework #named #simulation
CAFISS: a complex adaptive framework for immune system simulation (JCT, AJ), pp. 158–164.
SAC-2005-SignoriniG #evolution #object-oriented
Object-oriented wound healing in the liver: a class-structured view of fibrogenesis and a glimpse of its evolution (JS, PG), pp. 165–171.
SAC-2005-HuP #3d #complexity #parametricity
Volume fractal dimensionality: a useful parameter for measuring the complexity of 3D protein spatial structures (MH, QP), pp. 172–176.
SAC-2005-ChenA #analysis #approach #comparative #predict #sequence #using
A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
SAC-2005-DavidssonHS #predict #sequence
Comparing approaches to predict transmembrane domains in protein sequences (PD, JH, KS), pp. 185–189.
SAC-2005-DalkilicS #analysis #design #evaluation
Design and evaluation of CATPA: curation and alignment tool for protein analysis (MMD, AS), pp. 190–194.
SAC-2005-PlakeHL #interactive #optimisation #syntax
Optimizing syntax patterns for discovering protein-protein interactions (CP, JH, UL), pp. 195–201.
SAC-2005-HsiehCLT #detection #named #predict #sequence
EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences (SJH, YSC, CYL, CYT), pp. 202–203.
SAC-2005-WangP #clustering
Tree-based clustering for gene expression data (BW, WP), pp. 204–205.
SAC-2005-WanMA #array #markov #random #similarity #using
Cleaning microarray expression data using Markov random fields based on profile similarity (RW, HM, KFA), pp. 206–207.
SAC-2005-BalsaraR #model checking #predict #search-based #using
Prediction of inherited and genetic mutations using the software model checker SPIN (ZB, SR), pp. 208–209.
SAC-2005-KankarM #clustering #summary #visualisation
Text-based summarization and visualization of gene clusters (PK, SM), pp. 210–211.
SAC-2005-ReddyC #bound #using
Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
SAC-2005-Masero #health #information management
Health care information systems (VM), pp. 214–215.
SAC-2005-FernandezS #analysis #modelling
An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
SAC-2005-PowerSPS #query
Protecting sensitive patient data via query modification (DJP, MS, EAP, ACS), pp. 224–230.
SAC-2005-Bourgeois-RepubliqueVC #algorithm #interactive
An interactive evolutionary algorithm for cochlear implant fitting: first results (CBR, GV, PC), pp. 231–235.
SAC-2005-JablonskiLMMH #integration
Data logistics as a means of integration in healthcare applications (SJ, RL, CM, SM, WH), pp. 236–241.
SAC-2005-WuA #reduction
The intensity level reduction in radiation therapy (XW, JA), pp. 242–246.
SAC-2005-GuerreroMLM #multi
Multilure active contours (FJG, VM, JMLR, JM), pp. 247–254.
SAC-2005-AntonelliLM #image #re-engineering #segmentation
Segmentation and reconstruction of the lung volume in CT images (MA, BL, FM), pp. 255–259.
SAC-2005-HuangSMZGGP #approach #clustering #predict
A clustering-based approach for prediction of cardiac resynchronization therapy (HH, LS, FM, SZ, MG, LG, JDP), pp. 260–266.
SAC-2005-AbbasMG #analysis
Temporal analysis of infectious diseases: influenza (KA, ARM, RG), pp. 267–271.
SAC-2005-JafariDBS #adaptation #fault tolerance #monitoring
Adaptive and fault tolerant medical vest for life-critical medical monitoring (RJ, FD, PB, MS), pp. 272–279.
SAC-2005-SartorPV
Computer-aided law and advanced technologies (GS, JVP, AV), pp. 280–281.
SAC-2005-KiskisP
Compensating creativity in the digital world: reconciling technology and culture (MK, RP), pp. 282–286.
SAC-2005-RekhisB #automation #forensics #verification
A formal logic-based language and an automated verification tool for computer forensic investigation (SR, NB), pp. 287–291.
SAC-2005-HacheyG #classification #modelling #sequence #summary
Sequence modelling for sentence classification in a legal summarisation system (BH, CG), pp. 292–296.
SAC-2005-Bettelli #standard #xml
The employment of XML standards in electronic judicial proceedings (AVB), pp. 297–301.
SAC-2005-RenJ #adaptation #distributed #forensics #network #realtime
Honeynet based distributed adaptive network forensics and active real time investigation (WR, HJ), pp. 302–303.
SAC-2005-KhuranaSB #email #named
SELS: a secure e-mail list service (HK, AJS, RB), pp. 306–313.
SAC-2005-MylesC #n-gram
K-gram based software birthmarks (GM, CSC), pp. 314–318.
SAC-2005-AnshulR #identification #network
A ZKP-based identification scheme for base nodes in wireless sensor networks (DA, SR), pp. 319–323.
SAC-2005-Strangio #performance #protocol
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
SAC-2005-SohrDA #information management #policy #security #specification
Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
SAC-2005-Ungureanu #enterprise #performance #policy
Efficient support for enterprise delegation policies (VU), pp. 340–345.
SAC-2005-UppuluriJR
Preventing race condition attacks on file-systems (PU, UJ, AR), pp. 346–353.
SAC-2005-YangEY #database #security #semistructured data #specification
Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
SAC-2005-ZhangLN #matrix
An attribute-based access matrix model (XZ, YL, DN), pp. 359–363.
SAC-2005-AjiliRE #approach #optimisation
A branch-price-and-propagate approach for optimizing IGP weight setting subject to unique shortest paths (FA, RR, AE), pp. 366–370.
SAC-2005-LawL #constraints #matrix #modelling #symmetry #using
Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
SAC-2005-GoualardG #constraints #network
Controlled propagation in continuous numerical constraint networks (FG, LG), pp. 377–382.
SAC-2005-OuajaR #composition #hybrid
Hybrid Lagrangian relaxation for bandwidth-constrained routing: knapsack decomposition (WO, BR), pp. 383–387.
SAC-2005-BartakR
Limited assignments: a new cutoff strategy for incomplete depth-first search (RB, HR), pp. 388–392.
SAC-2005-DantchevV #infinity #on the
On the computational limits of infinite satisfaction (SSD, FDV), pp. 393–397.
SAC-2005-LambertMS #constraints #using
Solving strategies using a hybridization model for local search and constraint propagation (TL, EM, FS), pp. 398–403.
SAC-2005-OConnellOF #constraints #problem
Timid acquisition of constraint satisfaction problems (SO, BO, ECF), pp. 404–408.
SAC-2005-GuoLLW #linear #problem
The shortest route cut and fill problem in linear topological structure (SG, WL, AL, FW), pp. 409–410.
SAC-2005-PiccoBC #lightweight #named #tuple
LighTS: a lightweight, customizable tuple space supporting context-aware applications (GPP, DB, PC), pp. 413–419.
SAC-2005-RicciV
A timed extension of ReSpecT (AR, MV), pp. 420–427.
SAC-2005-NicolaLM #analysis #formal method #mobile #modelling
Formal modeling and quantitative analysis of KLAIM-based mobile systems (RDN, DL, MM), pp. 428–435.
SAC-2005-Guillen-ScholtenABB #calculus #coordination #mobile
MoCha-pi, an exogenous coordination calculus based on mobile channels (JGS, FA, FSdB, MMB), pp. 436–442.
SAC-2005-FortinoR #architecture #component #coordination #mobile #multi
Multi-coordination of mobile agents: a model and a component-based architecture (GF, WR), pp. 443–450.
SAC-2005-SerranoO #framework #interactive #protocol #recursion #semantics #specification
A semantic framework for the recursive specification of interaction protocols (JMS, SO), pp. 451–456.
SAC-2005-TafatCH #coordination #pervasive
Implicit environment-based coordination in pervasive computing (AT, MC, BH), pp. 457–461.
SAC-2005-BelmontePTF #coordination
Agent coordination for bus fleet management (MVB, JLPdlC, FTR, AF), pp. 462–466.
SAC-2005-Menezes #adaptation #case study #coordination #security #self
Self-organization and computer security: a case study in adaptive coordination (RM), pp. 467–468.
SAC-2005-KimJ #performance #sequence
Performance bottleneck in time-series subsequence matching (SWK, BSJ), pp. 469–473.
SAC-2005-BaglioniFT #information management
DrC4.5: Improving C4.5 by means of prior knowledge (MB, BF, FT), pp. 474–481.
SAC-2005-AgyemangBA #mining #n-gram #using #web
Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
SAC-2005-SongR #transaction
Finding frequent itemsets by transaction mapping (MS, SR), pp. 488–492.
SAC-2005-JanejaA #detection #linear #named #semantics #statistics
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
SAC-2005-EbertG #approach
A “Go With the Winners” approach to finding frequent patterns (TE, DG), pp. 498–502.
SAC-2005-CareniniNZZ #email
Discovery and regeneration of hidden emails (GC, RTN, XZ, EZ), pp. 503–510.
SAC-2005-Eliassi-RadC #approach #hybrid #modelling #multi #scalability
A hybrid approach for multiresolution modeling of large-scale scientific data (TER, TC), pp. 511–518.
SAC-2005-LeeWC #clustering #performance
Rearranging data objects for efficient and stable clustering (GL, XW, JC), pp. 519–523.
SAC-2005-QianZQ #classification #image
Spatial contextual noise removal for post classification smoothing of remotely sensed images (YQ, KZ, FQ), pp. 524–528.
SAC-2005-SilvestriO #approximate #distributed #mining
Distributed approximate mining of frequent patterns (CS, SO), pp. 529–536.
SAC-2005-AngiulliBP #detection #predict
Detection and prediction of distance-based outliers (FA, SB, CP), pp. 537–542.
SAC-2005-Morimoto #mining #transitive
Optimized transitive association rule: mining significant stopover between events (YM), pp. 543–544.
SAC-2005-Ordonez #clustering
A model for association rules based on clustering (CO), pp. 545–546.
SAC-2005-DalkilicS05a #classification #design #implementation #named
Circle: design and implementation of a classifier based on circuit minimization (MMD, AS), pp. 547–548.
SAC-2005-XuMY #concept #database #information management #mining #scalability
Mining concept associations for knowledge discovery in large textual databases (XX, MM, NY), pp. 549–550.
SAC-2005-NatarajanS #approach #data-driven
A relatedness-based data-driven approach to determination of interestingness of association rules (RN, BS), pp. 551–552.
SAC-2005-BertholdSLH #data type #resource management
Integrated resource management for data stream systems (HB, SS, WL, CJH), pp. 555–562.
SAC-2005-GaoWW #evaluation #quality #streaming
Quality-driven evaluation of trigger conditions on streaming time series (LG, MW, XSW), pp. 563–567.
SAC-2005-Ferrer-TroyanoAS #data type #incremental #learning
Incremental rule learning based on example nearness from numerical data streams (FJFT, JSAR, JCRS), pp. 568–572.
SAC-2005-GamaMR #data type #learning
Learning decision trees from dynamic data streams (JG, PM, PPR), pp. 573–577.
SAC-2005-HeinzS #data type
Wavelet density estimators over data streams (CH, BS), pp. 578–579.
SAC-2005-KimKS #database #optimisation #sequence
Optimization of subsequence matching under time warping in time-series databases (MSK, SWK, MS), pp. 581–586.
SAC-2005-PaulyS #identification
Identifying topological predicates for vague spatial objects (AP, MS), pp. 587–591.
SAC-2005-EgidiT #approach #database #flexibility
A flexible approach to user-defined symbolic granularities in temporal databases (LE, PT), pp. 592–597.
SAC-2005-FurfaroMSS #multi
Hierarchical binary histograms for summarizing multi-dimensional data (FF, GMM, DS, CS), pp. 598–603.
SAC-2005-TrainaFT #formal method #image #retrieval
Image domain formalization for content-based image retrieval (CTJ, JMdF, AJMT), pp. 604–609.
SAC-2005-StefanescuTT #distributed #evaluation #query
Distributed evaluation of generalized path queries (DCS, AT, LT), pp. 610–616.
SAC-2005-BuenoTT #algorithm #approximate #query #search-based #similarity #using
Accelerating approximate similarity queries using genetic algorithms (RB, AJMT, CTJ), pp. 617–622.
SAC-2005-Behrend #database #deduction #optimisation #query
Optimizing existential queries in stratifiable deductive databases (AB), pp. 623–628.
SAC-2005-WojnickiL #query
Jelly view: a technology for arbitrarily advanced queries within RDBMS (IW, AL), pp. 629–633.
SAC-2005-LiuSC #distributed #low cost #nondeterminism #query
Cost-efficient processing of MIN/MAX queries over distributed sensors with uncertainty (ZL, KCS, JC), pp. 634–641.
SAC-2005-BaresiQ #documentation #graph transformation #xml
Graph transformation to infer schemata from XML documents (LB, EQ), pp. 642–646.
SAC-2005-Suzuki #documentation #xml
Finding an optimum edit script between an XML document and a DTD (NS), pp. 647–653.
SAC-2005-RaposoPAV #automation #maintenance #query #using #web
Automatic wrapper maintenance for semi-structured web sources using results from previous queries (JR, AP, , ÁV), pp. 654–659.
SAC-2005-LinZLY #performance #query #xml
Supporting efficient query processing on compressed XML files (YL, YZ, QL, JY), pp. 660–665.
SAC-2005-UpadhyayaK #diagrams #named #ontology
ERONTO: a tool for extracting ontologies from extended E/R diagrams (SRU, PSK), pp. 666–670.
SAC-2005-RobinsonRHD #automation #database
User-defined view automation of genomic databases (AJR, JWR, SH, TSD), pp. 671–675.
SAC-2005-GiannellaS #estimation
An information theoretic histogram for single dimensional selectivity estimation (CG, BS), pp. 676–677.
SAC-2005-SinghDMVSBGJKLBK #grid #web
The Pegasus portal: web based grid computing (GS, ED, GM, KV, MHS, GBB, JG, JCJ, DSK, AL, KB, SK), pp. 680–686.
SAC-2005-ProdanF #case study #grid #scheduling #workflow
Dynamic scheduling of scientific workflow applications on the grid: a case study (RP, TF), pp. 687–694.
SAC-2005-RahmanBA #approach #grid
Replica selection in grid environment: a data-mining approach (RMR, KB, RA), pp. 695–700.
SAC-2005-AloisioCFQ #architecture #data access
A grid-based architecture for earth observation data access (GA, MC, SF, GQ), pp. 701–705.
SAC-2005-AleksyKS #concept #corba
Realizing the leasing concept in CORBA-based applications (MA, AK, MS), pp. 706–712.
SAC-2005-XiaoLJ #clustering #on the #problem #scheduling
On unit task linear-nonlinear two-cluster scheduling problem (ZX, WNL, JJFJ), pp. 713–717.
SAC-2005-QuagliaR #coordination #persistent #reliability
Reliability in three-tier systems without application server coordination and persistent message queues (FQ, PR), pp. 718–723.
SAC-2005-NeisseAGT #network #policy
Policies translation for integrated management of grids and networks (RN, MJBA, LZG, LMRT), pp. 724–729.
SAC-2005-MonemizadehS #multi #network #scalability
The necklace-hypercube: a well scalable hypercube-based interconnection network for multiprocessors (MM, HSA), pp. 729–733.
SAC-2005-FarahabadyS #multi #network #recursion
The recursive transpose-connected cycles (RTCC) interconnection network for multiprocessors (MHF, HSA), pp. 734–738.
SAC-2005-SpohnG #network #problem #set #using
A solution for the location problem in arbitrary computer networks using generic dominating sets (MAS, JJGLA), pp. 739–743.
SAC-2005-ZhengZOMF #clustering #network
Node clustering based on link delay in P2P networks (WZ, SZ, YO, FM, JF), pp. 744–749.
SAC-2005-JiJC #adaptation #analysis #migration
Adaptation point analysis for computation migration/checkpointing (YJ, HJ, VC), pp. 750–751.
SAC-2005-PervouchineLM #analysis #documentation #forensics
Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
SAC-2005-Lopresti #evaluation #performance
Performance evaluation for text processing of noisy inputs (DPL), pp. 759–763.
SAC-2005-MartinsS #identification #web
Language identification in web pages (BM, MJS), pp. 764–768.
SAC-2005-BeszteriV #adaptation #documentation #editing
An XForms based solution for adaptable documents editing (IB, PV), pp. 769–775.
SAC-2005-GrunerN #detection #documentation #tool support
Tool support for plagiarism detection in text documents (SG, SN), pp. 776–781.
SAC-2005-TarauMF #documentation #rank #semantics
Semantic document engineering with WordNet and PageRank (PT, RM, EF), pp. 782–786.
SAC-2005-CanfieldX #approximate #documentation #xml
Approximate XML document matching (ERC, GX), pp. 787–788.
SAC-2005-PolatD #collaboration #privacy
SVD-based collaborative filtering with privacy (HP, WD), pp. 791–795.
SAC-2005-RodriguezL #implementation
Implementing private Vickrey auctions (IR, NL), pp. 796–800.
SAC-2005-Khurana #scalability #security
Scalable security and accounting services for content-based publish/subscribe systems (HK), pp. 801–807.
SAC-2005-ZhangP #analysis
Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
SAC-2005-DiazLPCV #approach #behaviour #e-commerce #probability #protocol #realtime #set #validation
An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
SAC-2005-ZhangM #learning #privacy
Privacy preserving learning in negotiation (SZ, FM), pp. 821–825.
SAC-2005-Arias-FisteusFK #model checking
Applying model checking to BPEL4WS business collaborations (JAF, LSF, CDK), pp. 826–830.
SAC-2005-BravettiGLZ #e-commerce #formal method
Supporting e-commerce systems formalization with choreography languages (MB, CG, RL, GZ), pp. 831–835.
SAC-2005-HsiehCK #identification #online #performance
Efficient on-line identification of hot data for flash-memory management (JWH, LPC, TWK), pp. 838–842.
SAC-2005-YimKK #memory management #performance
A fast start-up technique for flash memory based computing systems (KSY, JK, KK), pp. 843–849.
SAC-2005-WaerdtSIV #estimation #performance
Motion estimation performance of the TM3270 processor (JWvdW, GAS, JPvI, SV), pp. 850–856.
SAC-2005-FeizabadiRJ #algorithm #named #scheduling
MSA: a memory-aware utility accrual scheduling algorithm (SF, BR, EDJ), pp. 857–862.
SAC-2005-MenonS #embedded
A code compression advisory tool for embedded processors (SKM, PS), pp. 863–867.
SAC-2005-GriffinSC #case study #design #embedded #garbage collection #java #on the #power management
On designing a low-power garbage collector for java embedded devices: a case study (PAG, WSa, JMC), pp. 868–873.
SAC-2005-DebbabiMT #compilation #embedded #java #virtual machine
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors (MD, AM, NT), pp. 874–878.
SAC-2005-GruianAKS #automation #generative #java
Automatic generation of application-specific systems based on a micro-programmed Java core (FG, PA, KK, MS), pp. 879–884.
SAC-2005-Rosso #analysis #framework #message passing #paradigm #performance #scalability
Performance analysis framework for large software-intensive systems with a message passing paradigm (CDR), pp. 885–889.
SAC-2005-WengW #network #parallel #profiling
Profiling and mapping of parallel workloads on network processors (NW, TW), pp. 890–896.
SAC-2005-ChenCKM #realtime #scheduling
Real-time task scheduling anomaly: observations and prevention (YSC, LPC, TWK, AKM), pp. 897–898.
SAC-2005-JafariDCS #network #performance
Efficient placement and routing in grid-based networks (RJ, FD, BKC, MS), pp. 899–900.
SAC-2005-JuurlinkSV #embedded
Avoiding data conversions in embedded media processors (BHHJ, AS, SV), pp. 901–902.
SAC-2005-LiuBGROA #assurance #distributed #embedded #realtime #requirements
Two-level assurance of QoS requirements for distributed real-time and embedded systems (SHL, BRB, JGG, RRR, AMO, MA), pp. 903–904.
SAC-2005-DanielOS #algorithm #multi #search-based
Airspace congestion smoothing by multi-objective genetic algorithm (DD, SO, SP), pp. 907–912.
SAC-2005-LimZ #problem
The container loading problem (AL, XZ), pp. 913–917.
SAC-2005-TangV #approach #clustering #documentation
An artificial immune system approach to document clustering (NT, VRV), pp. 918–922.
SAC-2005-FalcoTCG #algorithm #clustering #search-based
A new variable-length genome genetic algorithm for data clustering in semeiotics (IDF, ET, ADC, FG), pp. 923–927.
SAC-2005-FalcoTCG05a #approach #clustering #grammarware #novel #programming #search-based
A novel grammar-based genetic programming approach to clustering (IDF, ET, ADC, FG), pp. 928–932.
SAC-2005-LimZLR #graph #heuristic #problem
Heuristic methods for graph coloring problems (AL, YZ, QL, BR), pp. 933–939.
SAC-2005-ZhangGZL #algorithm
A tabu search algorithm for the safe transportation of hazardous materials (LZ, SG, YZ, AL), pp. 940–946.
SAC-2005-GoettlBJ #algorithm #email #search-based
Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm (JSG, AWB, BAJ), pp. 947–951.
SAC-2005-HouD #analysis #design #detection #search-based
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
SAC-2005-FalcoTCP #approach #induction #programming #search-based
Inductive inference of chaotic series by Genetic Programming: a Solomonoff-based approach (IDF, ET, ADC, AP), pp. 957–958.
SAC-2005-Aguilar-RuizD #clustering
Evolutionary computation for biclustering of gene expression (JSAR, FD), pp. 959–960.
SAC-2005-OSullivanS #configuration management #mobile
Agent technology and reconfigurable computing for mobile devices (TO, RS), pp. 963–969.
SAC-2005-AroraF
Pocket PC beacons: Wi-Fi based human tracking and following (AA, AF), pp. 970–974.
SAC-2005-WattersZD
Comparing table views for small devices (CRW, RZ, JD), pp. 975–980.
SAC-2005-MongaS #mobile
A generic serializer for mobile devices (MM, AS), pp. 981–985.
SAC-2005-YonekiB #communication #mobile #peer-to-peer
Dynamic group communication in mobile peer-to-peer environments (EY, JB), pp. 986–992.
SAC-2005-BellaachiaR #database #performance #string
Efficiency of prefix and non-prefix codes in string matching over compressed databases on handheld devices (AB, IAR), pp. 993–997.
SAC-2005-TournierBO #architecture #component #embedded #evaluation
An evaluation of Qinna, a component-based QoS architecture for embedded systems (JCT, JPB, VO), pp. 998–1002.
SAC-2005-RamosGVM #framework #information management #mobile #named #ubiquitous #web
PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devices (ACR, JG, MVO, HM), pp. 1003–1008.
SAC-2005-BazizBAC #documentation #information retrieval #representation #semantics
Semantic cores for representing documents in IR (MB, MB, NAG, CC), pp. 1011–1017.
SAC-2005-BeigbederM #fuzzy #information retrieval #proximity #using
An information retrieval model using the fuzzy proximity degree of term occurences (MB, AM), pp. 1018–1022.
SAC-2005-YeeF #on the #peer-to-peer
On search in peer-to-peer file sharing systems (WGY, OF), pp. 1023–1030.
SAC-2005-InoueU #image #using
Retrieving lightly annotated images using image similarities (MI, NU), pp. 1031–1037.
SAC-2005-FradkinK #classification #learning
Methods for learning classifier combinations: no clear winner (DF, PBK), pp. 1038–1043.
SAC-2005-DongH #classification #clustering #parametricity
Text classification based on data partitioning and parameter varying ensembles (YSD, KSH), pp. 1044–1048.
SAC-2005-HanMZTGZ #clustering #documentation #metadata #rule-based #word
Rule-based word clustering for document metadata extraction (HH, EM, HZ, KT, CLG, XZ), pp. 1049–1053.
SAC-2005-LiY #classification #predict #recursion #using
Using recursive classification to discover predictive features (FL, YY), pp. 1054–1058.
SAC-2005-MandlW #effectiveness #evaluation #information retrieval
The effect of named entities on effectiveness in cross-language information retrieval evaluation (TM, CWH), pp. 1059–1064.
SAC-2005-HanXZG #ambiguity #naive bayes
A hierarchical naive Bayes mixture model for name disambiguation in author citations (HH, WX, HZ, CLG), pp. 1065–1069.
SAC-2005-MaG #detection #information retrieval #query
Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
SAC-2005-LiuC #knowledge-based #query #retrieval
Knowledge-based query expansion to support scenario-specific retrieval of medical free text (ZL, WWC), pp. 1076–1083.
SAC-2005-ElkhalifaAC #detection #named #specification
InfoFilter: a system for expressive pattern specification and detection over text streams (LE, RA, SC), pp. 1084–1088.
SAC-2005-CuiK #analysis #documentation #topic
Topic activation analysis for document streams based on document arrival rate and relevance (CC, HK), pp. 1089–1095.
SAC-2005-TebriBC #incremental #learning
Incremental profile learning based on a reinforcement method (HT, MB, CC), pp. 1096–1101.
SAC-2005-CosterS #collaboration #incremental #mobile
Incremental collaborative filtering for mobile devices (RC, MS), pp. 1102–1106.
SAC-2005-BordognaP #sql
Extending SQL with customizable soft selection conditions (GB, GP), pp. 1107–1111.
SAC-2005-ShangS #database #mining #relational
Depth-first frequent itemset mining in relational databases (XS, KUS), pp. 1112–1117.
SAC-2005-GaoH #query
Location dependent query proxy (XG, ARH), pp. 1120–1124.
SAC-2005-XiaPLCS
Indexing continuously changing data with mean-variance tree (YX, SP, SL, RC, RS), pp. 1125–1132.
SAC-2005-KanedaTET #fault tolerance #object-oriented #transaction
Transactional agent model for fault-tolerant object systems (TK, YT, TE, MT), pp. 1133–1138.
SAC-2005-Nakayama #communication #mobile
Alternative source coding model for mobile text communication (TN), pp. 1139–1145.
SAC-2005-Chefrour #adaptation #component #mobile
Developing component based adaptive applications in mobile environments (DC), pp. 1146–1150.
SAC-2005-CostaSB #adaptation #architecture #middleware #mobile
A reflective middleware architecture to support adaptive mobile applications (CMdC, MdSS, GB), pp. 1151–1154.
SAC-2005-DelicatoPRPR #middleware #network
Reflective middleware for wireless sensor networks (FCD, PFP, LFRdCC, LP, JFdR), pp. 1155–1159.
SAC-2005-KanzakiHN #ad hoc #adaptation #network #protocol
An adaptive TDMA slot assignment protocol in ad hoc sensor networks (AK, TH, SN), pp. 1160–1165.
SAC-2005-BarrettEKMS #ad hoc #multi #network #probability #protocol
Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios (CLB, SE, LK, MVM, JPS), pp. 1166–1173.
SAC-2005-Hara #ad hoc #mobile #network
Location management of data items in mobile ad hoc networks (TH), pp. 1174–1175.
SAC-2005-LiWLC #mobile #realtime #transaction
Mobile real-time read-only transaction processing in data broadcast environments (GL, HW, YL, JC), pp. 1176–1177.
SAC-2005-Sabharwal #multi #visualisation
MultiMedia and visualization track (CLS), pp. 1178–1179.
SAC-2005-BustosKS
A pivot-based index structure for combination of feature vectors (BB, DAK, TS), pp. 1180–1184.
SAC-2005-FlanaginGRAS #automation #generative #overview #using
Automated terrain generation using LIDAR and waterbody survey data (MF, AG, JJR, MA, KS), pp. 1185–1189.
SAC-2005-ChoC #database #image #recognition #symmetry #using
Contour-based partial object recognition using symmetry in image databases (JSC, JC), pp. 1190–1194.
SAC-2005-HiransakolwongHKVL #adaptation #distance #image #retrieval
An adaptive distance computation technique for image retrieval systems (NH, KAH, SK, KV, SDL), pp. 1195–1199.
SAC-2005-FoutHD #optimisation #visualisation
Visualization of neuronal fiber connections from DT-MRI with global optimization (NF, JH, ZD), pp. 1200–1206.
SAC-2005-YoonYMWD #3d #interactive #network #visualisation
Interactive 3D visualization of highly connected ecological networks on the WWW (IY, SY, NDM, RJW, JAD), pp. 1207–1212.
SAC-2005-KimY #metric #similarity
Similarity measurement for aggregation of spatial objects (BK, JPY), pp. 1213–1217.
SAC-2005-ChinoVTT #comprehension #data access #metric #named #visual notation
MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
SAC-2005-FoutMA #multi #reduction
Time-varying, multivariate volume data reduction (NF, KLM, JPA), pp. 1224–1230.
SAC-2005-McPhersonMO #clustering #graph #parametricity #social
Discovering parametric clusters in social small-world graphs (JM, KLM, MO), pp. 1231–1238.
SAC-2005-QianZ #effectiveness #visualisation
The role of visualization in effective data cleaning (YQ, KZ), pp. 1239–1243.
SAC-2005-MillerYS #collaboration #framework
A framework for collaborative control of applications (JRM, SY, PLS), pp. 1244–1249.
SAC-2005-WalkerMH #re-engineering #using
Surface reconstruction using shadow profilometry (CPW, NM, MGH), pp. 1250–1251.
SAC-2005-Hosobe #constraints #documentation #layout #linear #web
Solving linear and one-way constraints for web document layout (HH), pp. 1252–1253.
SAC-2005-Brown #database #image #similarity
Issues in augmenting image databases to improve processing content-based similarity searches (LB), pp. 1254–1255.
SAC-2005-BettiniBL #flexibility
Safe and flexible objects (LB, VB, SL), pp. 1258–1263.
SAC-2005-CazzolaCC #c#
[a]C#: C# with a customizable code annotation mechanism (WC, AC, DC), pp. 1264–1268.
SAC-2005-KaminaT #composition #mixin
Selective method combination in mixin-based composition (TK, TT), pp. 1269–1273.
SAC-2005-Heinlein #c++
Virtual namespace functions: an alternative to virtual member functions in C++ and advice in AspectC++ (CH), pp. 1274–1281.
SAC-2005-CabralMS #dot-net #named
RAIL: code instrumentation for .NET (BC, PM, LMS), pp. 1282–1287.
SAC-2005-GorappaK #distributed #embedded #empirical #evaluation #realtime
Empirical evaluation of OpenCCM for Java-based distributed, real-time, and embedded systems (SG, RK), pp. 1288–1292.
SAC-2005-BraunWHW #approach
Method construction — a core approach to organizational engineering (CB, FW, MH, RW), pp. 1295–1299.
SAC-2005-BleisteinCV #analysis #approach #requirements
Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
SAC-2005-CaetanoST #process #using
Using roles and business objects to model and understand business processes (AC, ARS, JMT), pp. 1308–1313.
SAC-2005-ColucciNSDPC #approach #composition #knowledge base #semantics
Knowledge based approach to semantic composition of teams in an organization (SC, TDN, EDS, FMD, GP, SC), pp. 1314–1319.
SAC-2005-WieringaG #coordination #correctness #design #process #trust
Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
SAC-2005-SchaadSW #case study #process
A case study of separation of duty properties in the context of the Austrian “eLaw” process (AS, PS, HW), pp. 1328–1332.
SAC-2005-SchelpS #framework #integration
Extending the business engineering framework for application integration purposes (JS, AS), pp. 1333–1337.
SAC-2005-AversanoBT #assessment #impact analysis #process
Assessment and impact analysis for aligning business processes and software systems (LA, TB, MT), pp. 1338–1343.
SAC-2005-PereiraS #architecture #enterprise
Enterprise architecture: business and IT alignment (CMP, PMAS), pp. 1344–1345.
SAC-2005-CazzolaPA #approach #aspect-oriented #design #evolution
AOP for software evolution: a design oriented approach (WC, SP, MA), pp. 1346–1350.
SAC-2005-OgelTF #aspect-oriented #compilation #performance
Supporting efficient dynamic aspects through reflection and dynamic compilation (FO, GT, BF), pp. 1351–1356.
SAC-2005-CarvalhoL #abstraction #composition #distributed #parallel #performance #programming
The # model: separation of concerns for reconciling modularity, abstraction and efficiency in distributed parallel programming (FHdCJ, RDL), pp. 1357–1364.
SAC-2005-WuRBGM #2d #compilation
A two-dimensional separation of concerns for compiler construction (XW, SR, BRB, JGG, MM), pp. 1365–1369.
SAC-2005-WuGRM #debugging #domain-specific language #weaving
Weaving a debugging aspect into domain-specific language grammars (HW, JGG, SR, MM), pp. 1370–1374.
SAC-2005-MilazzoPTU #distributed #runtime
Handling run-time updates in distributed applications (MM, GP, ET, GU), pp. 1375–1380.
SAC-2005-StefanoFPT #composition #metric
Metrics for evaluating concern separation and composition (ADS, MF, GP, ET), pp. 1381–1382.
SAC-2005-Emir #compilation
Compiling regular patterns to sequential machines (BE), pp. 1385–1389.
SAC-2005-RimassaV #comprehension #java #parametricity #strict
Understanding access restriction of variant parametric types and Java wildcards (GR, MV), pp. 1390–1397.
SAC-2005-CleenewerckD #implementation
Disentangling the implementation of local-to-global transformations in a rewrite rule transformation system (TC, TD), pp. 1398–1403.
SAC-2005-Lu #correctness #declarative #using
Use of correctness assertions in declarative diagnosis (LL), pp. 1404–1408.
SAC-2005-ForaxDR #implementation #java
Reflection-based implementation of Java extensions: the double-dispatch use-case (RF, ÉD, GR), pp. 1409–1413.
SAC-2005-GuoJ #logic programming #source code
Mode-directed preferences for logic programs (HFG, BJ), pp. 1414–1418.
SAC-2005-WangG #approach #domain-specific language #framework #implementation #prototype #semantics
Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approach (QW, GG), pp. 1419–1426.
SAC-2005-Tarau #logic programming
Agent oriented logic programming in Jinni 2004 (PT), pp. 1427–1428.
SAC-2005-Moore05a #order
Order relations and rigor in computing (REM), pp. 1431–1433.
SAC-2005-Goualard #algorithm #constraints #on the #theorem proving
On considering an interval constraint solving algorithm as a free-steering nonlinear Gauss-Seidel procedure (FG), pp. 1434–1438.
SAC-2005-ChabertTN #consistency #constraints #problem
Box-set consistency for interval-based constraint problems (GC, GT, BN), pp. 1439–1443.
SAC-2005-DuanHW #detection #network
Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
SAC-2005-KoshelevaKMN #matrix #np-hard
Computing the cube of an interval matrix is NP-Hard (OK, VK, GM, HTN), pp. 1449–1453.
SAC-2005-MitchellP #metric #runtime #using
Using object-level run-time metrics to study coupling between objects (ÁM, JFP), pp. 1456–1462.
SAC-2005-CaiCLNY #adaptation #component #testing
Adaptive testing of software components (KYC, TYC, YCL, WYN, YTY), pp. 1463–1469.
SAC-2005-BlakeCRIG #case study #component #development #product line #specification
Use case-driven component specification: a medical applications perspective to product line development (MBB, KC, SR, LI, KG), pp. 1470–1477.
SAC-2005-CanforaCGPV #education
Confirming the influence of educational background in pair-design knowledge through experiments (GC, AC, FG, MP, CAV), pp. 1478–1484.
SAC-2005-WongQC #risk management #source code
Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
SAC-2005-KvaleLC #aspect-oriented #case study #programming #using
A case study on building COTS-based system using aspect-oriented programming (AAK, JL, RC), pp. 1491–1498.
SAC-2005-RummelKT #data flow #testing #towards
Towards the prioritization of regression test suites with data flow information (MJR, GMK, AT), pp. 1499–1504.
SAC-2005-ManceboA #component #multi
A strategy for selecting multiple components (EM, AAA), pp. 1505–1510.
SAC-2005-VarmaAPT #automation #migration
NextGen eXtreme porting: structured by automation (PV, AA, DPP, BT), pp. 1511–1517.
SAC-2005-PaigeCMS #programming
High-integrity extreme programming (RFP, HC, JAM, ZRS), pp. 1518–1523.
SAC-2005-ByunS #communication #development #protocol
A pattern-based development methodology for communication protocols (YB, BAS), pp. 1524–1528.
SAC-2005-ZhaoCL #modelling #process #re-engineering
Applying agent technology to software process modeling and process-centered software engineering environment (XZ, KC, ML), pp. 1529–1533.
SAC-2005-TrentiniM #framework #java #petri net #realtime #validation
Plan validation via petri nets in the real-time performers Java framework (AT, DM), pp. 1534–1538.
SAC-2005-TangsripairojS #repository #self #using #visualisation
Organizing and visualizing software repositories using the growing hierarchical self-organizing map (ST, MHS), pp. 1539–1545.
SAC-2005-TruongS #behaviour #modelling #uml #using #verification
Verification of behavioural elements of UML models using B (NTT, JS), pp. 1546–1552.
SAC-2005-CaoBZBROA #modelling #using
Marshaling and unmarshaling models using the entity-relationship model (FC, BRB, WZ, CCB, RRR, AMO, MA), pp. 1553–1557.
SAC-2005-HeoYCHS #incremental
Space-efficient page-level incremental checkpointing (JH, SY, YC, JH, SYS), pp. 1558–1562.
SAC-2005-DAgostiniF #aspect-oriented #metalanguage #preprocessor
Bridging AOP to SMP: turning GCC into a metalanguage preprocessor (TSD, AAF), pp. 1563–1564.
SAC-2005-DoxseeG #automation #c++ #specification #synthesis
Synthesis of C++ software for automated teller from CSPm specifications (SD, WBG), pp. 1565–1566.
SAC-2005-YangEY05a #framework #modelling #verification
Mediation framework modeling and verification by SAM (LY, RKE, HY), pp. 1567–1568.
SAC-2005-KinatederTR #alias #communication #peer-to-peer
Strong pseudonymous communication for peer-to-peer reputation systems (MK, RT, KR), pp. 1570–1576.
SAC-2005-Moloney #distributed #network #pervasive #recommendation #simulation
Simulation of a distributed recommendation system for pervasive networks (SM), pp. 1577–1581.
SAC-2005-ZuoP #component #trust
Component based trust management in the context of a virtual organization (YZ, BP), pp. 1582–1588.
SAC-2005-AvesaniMT #recommendation
A trust-enhanced recommender system application: Moleskiing (PA, PM, RT), pp. 1589–1593.
SAC-2005-BicakciCT #certification #how #metric #trust
How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
SAC-2005-VogiazouEDK #community #game studies #scalability
From buddyspace to CitiTag: large-scale symbolic presence for community building and spontaneous play (YV, ME, MD, JK), pp. 1600–1606.
SAC-2005-StaakeTF #anti #network
Extending the EPC network: the potential of RFID in anti-counterfeiting (TS, FT, EF), pp. 1607–1612.
SAC-2005-FujinamiN #physics #towards
Towards system software for physical space applications (KF, TN), pp. 1613–1620.
SAC-2005-VishwanathGL #ubiquitous
Intelligent file management in ubiquitous environments (KV, AG, YL), pp. 1621–1625.
SAC-2005-Omitola #declarative
Declarative control of the future home environment (TO), pp. 1626–1627.
SAC-2005-SunZ #approach #semantics
An approach to acquire semantic relationships between terms (XS, QZ), pp. 1630–1633.
SAC-2005-ReeveH #overview #platform #semantics
Survey of semantic annotation platforms (LHR, HH), pp. 1634–1638.
SAC-2005-BoninoCP #automation #concept #learning #network
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks (DB, FC, FP), pp. 1639–1644.
SAC-2005-BryP #paradigm #web
Reactivity on the web: paradigms and applications of the language XChange (FB, PLP), pp. 1645–1649.
SAC-2005-LuHVL #automation #generative #named #web #web service
Pollock: automatic generation of virtual web services from web sites (YHL, YH, JV, DL), pp. 1650–1655.
SAC-2005-MaamarBGMY #coordination #self #tuple #web #web service
Tuple spaces for self-coordination of web services (ZM, DB, CG, QHM, HY), pp. 1656–1660.
SAC-2005-BocchiCMPR #approach #coordination #grid
An OWL-S based approach to express grid services coordination (LB, PC, RM, VP, DR), pp. 1661–1667.
SAC-2005-Kirsch-PinheiroVGM #adaptation #collaboration #web
Context-aware filtering for collaborative web systems: adapting the awareness information to the user’s context (MKP, MVO, JG, HM), pp. 1668–1673.
SAC-2005-BaresiCM #adaptation #case study #consistency #experience #modelling
First experiences on constraining consistency and adaptivity of W2000 models (LB, SC, LM), pp. 1674–1678.
SAC-2005-ZhouX #approach #complexity #diagrams
Measuring structural complexity for class diagrams: an information theory approach (YZ, BX), pp. 1679–1683.
SAC-2005-Atterer #tool support #web
Where web engineering tool support ends: building usable websites (RA), pp. 1684–1688.
SAC-2005-BalzeraniRPA #architecture #product line #web
A product line architecture for web applications (LB, DDR, AP, GDA), pp. 1689–1693.
SAC-2005-BellettiniMT #named #testing #web
TestUml: user-metrics driven web applications testing (CB, AM, AT), pp. 1694–1698.
SAC-2005-Casale #analysis #mining #network #performance #web
Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
SAC-2005-MendoncaS #empirical #evaluation #policy #web #web service
An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
SAC-2005-GriecoMS #named #scalability
SEcS: scalable edge-computing services (RG, DM, VS), pp. 1709–1713.
SAC-2005-Ahmedi #xpath
Making XPath reach for the web-wide links (LA), pp. 1714–1721.
SAC-2005-DebnathMG #automation
Automatic extraction of informative blocks from webpages (SD, PM, CLG), pp. 1722–1726.
SAC-2005-AdaikkalavanC #approach #named #security #web
SmartGate: a smart push-pull approach to support role-based security in web gateways (RA, SC), pp. 1727–1731.
SAC-2005-JinD #metadata #using
Sanitizing using metadata in MetaXQuery (HJ, CED), pp. 1732–1736.
SAC-2005-LunaLSHHB #learning
Learning system to introduce GIS to civil engineers (RL, WTL, JMS, RHH, MGH, MB), pp. 1737–1738.
SAC-2005-ErradiM #framework #interactive #named #reliability #web #web service
wsBus: a framework for reliable web services interactions (AE, PM), pp. 1739–1740.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.