Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, Roger L. Wainwright
Proceedings of the 20th Symposium on Applied Computing
SAC, 2005.
@proceedings{SAC-2005, address = "Santa Fe, New Mexico, USA", editor = "Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright", isbn = "1-58113-964-0", publisher = "{ACM}", title = "{Proceedings of the 20th Symposium on Applied Computing}", year = 2005, }
Contents (319 items)
- SAC-2005-Hutchinson #future of #information management
- The future of systematic information protection (BH), p. 1.
- SAC-2005-Moore #order
- Order relations and rigor in computing (REM), p. 2.
- SAC-2005-ValigianiBJLBC
- Experimenting with a real-size man-hill to optimize pedagogical paths (GV, RB, YJ, EL, CBR, PC), pp. 4–8.
- SAC-2005-OcaGA #algorithm #classification #clustering #network
- An hybridization of an ant-based clustering algorithm with growing neural gas networks for classification tasks (MAMdO, LG, JLA), pp. 9–13.
- SAC-2005-KatayamaKN #learning #process
- Reinforcement learning agents with primary knowledge designed by analytic hierarchy process (KK, TK, HN), pp. 14–21.
- SAC-2005-MartinB #fault
- Estimating manifold dimension by inversion error (SM, AB), pp. 22–26.
- SAC-2005-ZhouP #approach #data-driven #design #distance
- Data driven approach to designing minimum hamming distance polychotomizer (JZ, GP), pp. 27–31.
- SAC-2005-WangPSV #ranking
- Variable selection and ranking for analyzing automobile traffic accident data (HW, ASP, RKS, SVV), pp. 32–37.
- SAC-2005-PandeyGM #algorithm #learning #probability #scheduling
- Stochastic scheduling of active support vector learning algorithms (GP, HG, PM), pp. 38–42.
- SAC-2005-YangC #algorithm #detection #maturity
- The T-detectors maturation algorithm based on match range model (DY, JC), pp. 43–44.
- SAC-2005-JangSSH #comparison #identification
- A comparison on information fusion methods for air target identification (DJ, SYS, CYS, CCH), pp. 45–46.
- SAC-2005-ToKS #exclamation #mobile #network
- Mobile agents for network management: when and when not! (HHT, SK, BS), pp. 47–53.
- SAC-2005-AlbayrakWVLM #information management #personalisation
- Agent technology for personalized information filtering: the PIA-system (SA, SW, NV, AL, DM), pp. 54–59.
- SAC-2005-ZorzoM #fault tolerance
- An agent model for fault-tolerant systems (AFZ, FRM), pp. 60–65.
- SAC-2005-RothPP #distributed #mobile
- A distributed content-based search engine based on mobile code (VR, UP, JP), pp. 66–73.
- SAC-2005-HurtT #communication #effectiveness #empirical #evaluation #multi
- An empirical evaluation of communication effectiveness in autonomous reactive multiagent systems (DH, PT), pp. 74–78.
- SAC-2005-LauW #approach #multi #optimisation #problem
- A multi-agent approach for solving optimization problems involving expensive resources (HCL, HW), pp. 79–83.
- SAC-2005-HeI #distributed #resource management #self
- Forming resource-sharing coalitions: a distributed resource allocation mechanism for self-interested agents in computational grids (LH, TRI), pp. 84–91.
- SAC-2005-DaoudM #analysis #mobile #reliability
- Reliability analysis of mobile agent-based systems (MD, QHM), pp. 92–93.
- SAC-2005-MikhailovT #approach #fuzzy #outsourcing
- Fuzzy approach to outsourcing of information technology services (LM, PET), pp. 94–98.
- SAC-2005-LeeST #database #performance
- Efficient discovery of unique signatures on whole-genome EST databases (HPL, TFS, YTT), pp. 100–104.
- SAC-2005-HastingsLOKPCJS #data transformation #distributed #using #xml
- Grid-based management of biomedical data using an XML-based distributed data management system (SH, SL, SO, TMK, TP, ÜVÇ, DJ, JHS), pp. 105–109.
- SAC-2005-ChenCG #biology #database #query
- A complex biological database querying method (JYC, JVC, NG), pp. 110–114.
- SAC-2005-WernertL #database #flexibility #named #scalability #visualisation
- PViN: a scalable and flexible system for visualizing pedigree databases (EAW, JL), pp. 115–122.
- SAC-2005-RahalRPNPRV #biology #incremental #interactive #mining
- Incremental interactive mining of constrained association rules from biological annotation data with nominal features (IR, DR, AP, HN, WP, RR, WVG), pp. 123–127.
- SAC-2005-SilvaS #design #framework
- A framework for result handling in bioinformatics: an application to computer assisted drug design (AOdS, ONdS), pp. 128–132.
- SAC-2005-FaederBH #network #representation #rule-based #visual notation
- Graphical rule-based representation of signal-transduction networks (JRF, MLB, WSH), pp. 133–140.
- SAC-2005-JayadevaprakashMP #generative #graph #transitive #using
- Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
- SAC-2005-HuangCC #algorithm #approximate #type inference
- An approximation algorithm for haplotype inference by maximum parsimony (YTH, KMC, TC), pp. 146–150.
- SAC-2005-BockerL #composition #performance
- Efficient mass decomposition (SB, ZL), pp. 151–157.
- SAC-2005-TayJ #adaptation #framework #named #simulation
- CAFISS: a complex adaptive framework for immune system simulation (JCT, AJ), pp. 158–164.
- SAC-2005-SignoriniG #evolution #object-oriented
- Object-oriented wound healing in the liver: a class-structured view of fibrogenesis and a glimpse of its evolution (JS, PG), pp. 165–171.
- SAC-2005-HuP #3d #complexity #parametricity
- Volume fractal dimensionality: a useful parameter for measuring the complexity of 3D protein spatial structures (MH, QP), pp. 172–176.
- SAC-2005-ChenA #analysis #approach #comparative #predict #sequence #using
- A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
- SAC-2005-DavidssonHS #predict #sequence
- Comparing approaches to predict transmembrane domains in protein sequences (PD, JH, KS), pp. 185–189.
- SAC-2005-DalkilicS #analysis #design #evaluation
- Design and evaluation of CATPA: curation and alignment tool for protein analysis (MMD, AS), pp. 190–194.
- SAC-2005-PlakeHL #interactive #optimisation #syntax
- Optimizing syntax patterns for discovering protein-protein interactions (CP, JH, UL), pp. 195–201.
- SAC-2005-HsiehCLT #detection #named #predict #sequence
- EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences (SJH, YSC, CYL, CYT), pp. 202–203.
- SAC-2005-WangP #clustering
- Tree-based clustering for gene expression data (BW, WP), pp. 204–205.
- SAC-2005-WanMA #array #markov #random #similarity #using
- Cleaning microarray expression data using Markov random fields based on profile similarity (RW, HM, KFA), pp. 206–207.
- SAC-2005-BalsaraR #model checking #predict #search-based #using
- Prediction of inherited and genetic mutations using the software model checker SPIN (ZB, SR), pp. 208–209.
- SAC-2005-KankarM #clustering #summary #visualisation
- Text-based summarization and visualization of gene clusters (PK, SM), pp. 210–211.
- SAC-2005-ReddyC #bound #using
- Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
- SAC-2005-Masero #health #information management
- Health care information systems (VM), pp. 214–215.
- SAC-2005-FernandezS #analysis #modelling
- An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
- SAC-2005-PowerSPS #query
- Protecting sensitive patient data via query modification (DJP, MS, EAP, ACS), pp. 224–230.
- SAC-2005-Bourgeois-RepubliqueVC #algorithm #interactive
- An interactive evolutionary algorithm for cochlear implant fitting: first results (CBR, GV, PC), pp. 231–235.
- SAC-2005-JablonskiLMMH #integration
- Data logistics as a means of integration in healthcare applications (SJ, RL, CM, SM, WH), pp. 236–241.
- SAC-2005-WuA #reduction
- The intensity level reduction in radiation therapy (XW, JA), pp. 242–246.
- SAC-2005-GuerreroMLM #multi
- Multilure active contours (FJG, VM, JMLR, JM), pp. 247–254.
- SAC-2005-AntonelliLM #image #re-engineering #segmentation
- Segmentation and reconstruction of the lung volume in CT images (MA, BL, FM), pp. 255–259.
- SAC-2005-HuangSMZGGP #approach #clustering #predict
- A clustering-based approach for prediction of cardiac resynchronization therapy (HH, LS, FM, SZ, MG, LG, JDP), pp. 260–266.
- SAC-2005-AbbasMG #analysis
- Temporal analysis of infectious diseases: influenza (KA, ARM, RG), pp. 267–271.
- SAC-2005-JafariDBS #adaptation #fault tolerance #monitoring
- Adaptive and fault tolerant medical vest for life-critical medical monitoring (RJ, FD, PB, MS), pp. 272–279.
- SAC-2005-SartorPV
- Computer-aided law and advanced technologies (GS, JVP, AV), pp. 280–281.
- SAC-2005-KiskisP
- Compensating creativity in the digital world: reconciling technology and culture (MK, RP), pp. 282–286.
- SAC-2005-RekhisB #automation #forensics #verification
- A formal logic-based language and an automated verification tool for computer forensic investigation (SR, NB), pp. 287–291.
- SAC-2005-HacheyG #classification #modelling #sequence #summary
- Sequence modelling for sentence classification in a legal summarisation system (BH, CG), pp. 292–296.
- SAC-2005-Bettelli #standard #xml
- The employment of XML standards in electronic judicial proceedings (AVB), pp. 297–301.
- SAC-2005-RenJ #adaptation #distributed #forensics #network #realtime
- Honeynet based distributed adaptive network forensics and active real time investigation (WR, HJ), pp. 302–303.
- SAC-2005-KhuranaSB #email #named
- SELS: a secure e-mail list service (HK, AJS, RB), pp. 306–313.
- SAC-2005-MylesC #n-gram
- K-gram based software birthmarks (GM, CSC), pp. 314–318.
- SAC-2005-AnshulR #identification #network
- A ZKP-based identification scheme for base nodes in wireless sensor networks (DA, SR), pp. 319–323.
- SAC-2005-Strangio #performance #protocol
- Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
- SAC-2005-SohrDA #information management #policy #security #specification
- Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
- SAC-2005-Ungureanu #enterprise #performance #policy
- Efficient support for enterprise delegation policies (VU), pp. 340–345.
- SAC-2005-UppuluriJR
- Preventing race condition attacks on file-systems (PU, UJ, AR), pp. 346–353.
- SAC-2005-YangEY #database #security #semistructured data #specification
- Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
- SAC-2005-ZhangLN #matrix
- An attribute-based access matrix model (XZ, YL, DN), pp. 359–363.
- SAC-2005-AjiliRE #approach #optimisation
- A branch-price-and-propagate approach for optimizing IGP weight setting subject to unique shortest paths (FA, RR, AE), pp. 366–370.
- SAC-2005-LawL #constraints #matrix #modelling #symmetry #using
- Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
- SAC-2005-GoualardG #constraints #network
- Controlled propagation in continuous numerical constraint networks (FG, LG), pp. 377–382.
- SAC-2005-OuajaR #composition #hybrid
- Hybrid Lagrangian relaxation for bandwidth-constrained routing: knapsack decomposition (WO, BR), pp. 383–387.
- SAC-2005-BartakR
- Limited assignments: a new cutoff strategy for incomplete depth-first search (RB, HR), pp. 388–392.
- SAC-2005-DantchevV #infinity #on the
- On the computational limits of infinite satisfaction (SSD, FDV), pp. 393–397.
- SAC-2005-LambertMS #constraints #using
- Solving strategies using a hybridization model for local search and constraint propagation (TL, EM, FS), pp. 398–403.
- SAC-2005-OConnellOF #constraints #problem
- Timid acquisition of constraint satisfaction problems (SO, BO, ECF), pp. 404–408.
- SAC-2005-GuoLLW #linear #problem
- The shortest route cut and fill problem in linear topological structure (SG, WL, AL, FW), pp. 409–410.
- SAC-2005-PiccoBC #lightweight #named #tuple
- LighTS: a lightweight, customizable tuple space supporting context-aware applications (GPP, DB, PC), pp. 413–419.
- SAC-2005-RicciV
- A timed extension of ReSpecT (AR, MV), pp. 420–427.
- SAC-2005-NicolaLM #analysis #formal method #mobile #modelling
- Formal modeling and quantitative analysis of KLAIM-based mobile systems (RDN, DL, MM), pp. 428–435.
- SAC-2005-Guillen-ScholtenABB #calculus #coordination #mobile
- MoCha-pi, an exogenous coordination calculus based on mobile channels (JGS, FA, FSdB, MMB), pp. 436–442.
- SAC-2005-FortinoR #architecture #component #coordination #mobile #multi
- Multi-coordination of mobile agents: a model and a component-based architecture (GF, WR), pp. 443–450.
- SAC-2005-SerranoO #framework #interactive #protocol #recursion #semantics #specification
- A semantic framework for the recursive specification of interaction protocols (JMS, SO), pp. 451–456.
- SAC-2005-TafatCH #coordination #pervasive
- Implicit environment-based coordination in pervasive computing (AT, MC, BH), pp. 457–461.
- SAC-2005-BelmontePTF #coordination
- Agent coordination for bus fleet management (MVB, JLPdlC, FTR, AF), pp. 462–466.
- SAC-2005-Menezes #adaptation #case study #coordination #security #self
- Self-organization and computer security: a case study in adaptive coordination (RM), pp. 467–468.
- SAC-2005-KimJ #performance #sequence
- Performance bottleneck in time-series subsequence matching (SWK, BSJ), pp. 469–473.
- SAC-2005-BaglioniFT #information management
- DrC4.5: Improving C4.5 by means of prior knowledge (MB, BF, FT), pp. 474–481.
- SAC-2005-AgyemangBA #mining #n-gram #using #web
- Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
- SAC-2005-SongR #transaction
- Finding frequent itemsets by transaction mapping (MS, SR), pp. 488–492.
- SAC-2005-JanejaA #detection #linear #named #semantics #statistics
- LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
- SAC-2005-EbertG #approach
- A “Go With the Winners” approach to finding frequent patterns (TE, DG), pp. 498–502.
- SAC-2005-CareniniNZZ #email
- Discovery and regeneration of hidden emails (GC, RTN, XZ, EZ), pp. 503–510.
- SAC-2005-Eliassi-RadC #approach #hybrid #modelling #multi #scalability
- A hybrid approach for multiresolution modeling of large-scale scientific data (TER, TC), pp. 511–518.
- SAC-2005-LeeWC #clustering #performance
- Rearranging data objects for efficient and stable clustering (GL, XW, JC), pp. 519–523.
- SAC-2005-QianZQ #classification #image
- Spatial contextual noise removal for post classification smoothing of remotely sensed images (YQ, KZ, FQ), pp. 524–528.
- SAC-2005-SilvestriO #approximate #distributed #mining
- Distributed approximate mining of frequent patterns (CS, SO), pp. 529–536.
- SAC-2005-AngiulliBP #detection #predict
- Detection and prediction of distance-based outliers (FA, SB, CP), pp. 537–542.
- SAC-2005-Morimoto #mining #transitive
- Optimized transitive association rule: mining significant stopover between events (YM), pp. 543–544.
- SAC-2005-Ordonez #clustering
- A model for association rules based on clustering (CO), pp. 545–546.
- SAC-2005-DalkilicS05a #classification #design #implementation #named
- Circle: design and implementation of a classifier based on circuit minimization (MMD, AS), pp. 547–548.
- SAC-2005-XuMY #concept #database #information management #mining #scalability
- Mining concept associations for knowledge discovery in large textual databases (XX, MM, NY), pp. 549–550.
- SAC-2005-NatarajanS #approach #data-driven
- A relatedness-based data-driven approach to determination of interestingness of association rules (RN, BS), pp. 551–552.
- SAC-2005-BertholdSLH #data type #resource management
- Integrated resource management for data stream systems (HB, SS, WL, CJH), pp. 555–562.
- SAC-2005-GaoWW #evaluation #quality #streaming
- Quality-driven evaluation of trigger conditions on streaming time series (LG, MW, XSW), pp. 563–567.
- SAC-2005-Ferrer-TroyanoAS #data type #incremental #learning
- Incremental rule learning based on example nearness from numerical data streams (FJFT, JSAR, JCRS), pp. 568–572.
- SAC-2005-GamaMR #data type #learning
- Learning decision trees from dynamic data streams (JG, PM, PPR), pp. 573–577.
- SAC-2005-HeinzS #data type
- Wavelet density estimators over data streams (CH, BS), pp. 578–579.
- SAC-2005-KimKS #database #optimisation #sequence
- Optimization of subsequence matching under time warping in time-series databases (MSK, SWK, MS), pp. 581–586.
- SAC-2005-PaulyS #identification
- Identifying topological predicates for vague spatial objects (AP, MS), pp. 587–591.
- SAC-2005-EgidiT #approach #database #flexibility
- A flexible approach to user-defined symbolic granularities in temporal databases (LE, PT), pp. 592–597.
- SAC-2005-FurfaroMSS #multi
- Hierarchical binary histograms for summarizing multi-dimensional data (FF, GMM, DS, CS), pp. 598–603.
- SAC-2005-TrainaFT #formal method #image #retrieval
- Image domain formalization for content-based image retrieval (CTJ, JMdF, AJMT), pp. 604–609.
- SAC-2005-StefanescuTT #distributed #evaluation #query
- Distributed evaluation of generalized path queries (DCS, AT, LT), pp. 610–616.
- SAC-2005-BuenoTT #algorithm #approximate #query #search-based #similarity #using
- Accelerating approximate similarity queries using genetic algorithms (RB, AJMT, CTJ), pp. 617–622.
- SAC-2005-Behrend #database #deduction #optimisation #query
- Optimizing existential queries in stratifiable deductive databases (AB), pp. 623–628.
- SAC-2005-WojnickiL #query
- Jelly view: a technology for arbitrarily advanced queries within RDBMS (IW, AL), pp. 629–633.
- SAC-2005-LiuSC #distributed #low cost #nondeterminism #query
- Cost-efficient processing of MIN/MAX queries over distributed sensors with uncertainty (ZL, KCS, JC), pp. 634–641.
- SAC-2005-BaresiQ #documentation #graph transformation #xml
- Graph transformation to infer schemata from XML documents (LB, EQ), pp. 642–646.
- SAC-2005-Suzuki #documentation #xml
- Finding an optimum edit script between an XML document and a DTD (NS), pp. 647–653.
- SAC-2005-RaposoPAV #automation #maintenance #query #using #web
- Automatic wrapper maintenance for semi-structured web sources using results from previous queries (JR, AP, MÁ, ÁV), pp. 654–659.
- SAC-2005-LinZLY #performance #query #xml
- Supporting efficient query processing on compressed XML files (YL, YZ, QL, JY), pp. 660–665.
- SAC-2005-UpadhyayaK #diagrams #named #ontology
- ERONTO: a tool for extracting ontologies from extended E/R diagrams (SRU, PSK), pp. 666–670.
- SAC-2005-RobinsonRHD #automation #database
- User-defined view automation of genomic databases (AJR, JWR, SH, TSD), pp. 671–675.
- SAC-2005-GiannellaS #estimation
- An information theoretic histogram for single dimensional selectivity estimation (CG, BS), pp. 676–677.
- SAC-2005-SinghDMVSBGJKLBK #grid #web
- The Pegasus portal: web based grid computing (GS, ED, GM, KV, MHS, GBB, JG, JCJ, DSK, AL, KB, SK), pp. 680–686.
- SAC-2005-ProdanF #case study #grid #scheduling #workflow
- Dynamic scheduling of scientific workflow applications on the grid: a case study (RP, TF), pp. 687–694.
- SAC-2005-RahmanBA #approach #grid
- Replica selection in grid environment: a data-mining approach (RMR, KB, RA), pp. 695–700.
- SAC-2005-AloisioCFQ #architecture #data access
- A grid-based architecture for earth observation data access (GA, MC, SF, GQ), pp. 701–705.
- SAC-2005-AleksyKS #concept #corba
- Realizing the leasing concept in CORBA-based applications (MA, AK, MS), pp. 706–712.
- SAC-2005-XiaoLJ #clustering #on the #problem #scheduling
- On unit task linear-nonlinear two-cluster scheduling problem (ZX, WNL, JJFJ), pp. 713–717.
- SAC-2005-QuagliaR #coordination #persistent #reliability
- Reliability in three-tier systems without application server coordination and persistent message queues (FQ, PR), pp. 718–723.
- SAC-2005-NeisseAGT #network #policy
- Policies translation for integrated management of grids and networks (RN, MJBA, LZG, LMRT), pp. 724–729.
- SAC-2005-MonemizadehS #multi #network #scalability
- The necklace-hypercube: a well scalable hypercube-based interconnection network for multiprocessors (MM, HSA), pp. 729–733.
- SAC-2005-FarahabadyS #multi #network #recursion
- The recursive transpose-connected cycles (RTCC) interconnection network for multiprocessors (MHF, HSA), pp. 734–738.
- SAC-2005-SpohnG #network #problem #set #using
- A solution for the location problem in arbitrary computer networks using generic dominating sets (MAS, JJGLA), pp. 739–743.
- SAC-2005-ZhengZOMF #clustering #network
- Node clustering based on link delay in P2P networks (WZ, SZ, YO, FM, JF), pp. 744–749.
- SAC-2005-JiJC #adaptation #analysis #migration
- Adaptation point analysis for computation migration/checkpointing (YJ, HJ, VC), pp. 750–751.
- SAC-2005-PervouchineLM #analysis #documentation #forensics
- Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
- SAC-2005-Lopresti #evaluation #performance
- Performance evaluation for text processing of noisy inputs (DPL), pp. 759–763.
- SAC-2005-MartinsS #identification #web
- Language identification in web pages (BM, MJS), pp. 764–768.
- SAC-2005-BeszteriV #adaptation #documentation #editing
- An XForms based solution for adaptable documents editing (IB, PV), pp. 769–775.
- SAC-2005-GrunerN #detection #documentation #tool support
- Tool support for plagiarism detection in text documents (SG, SN), pp. 776–781.
- SAC-2005-TarauMF #documentation #rank #semantics
- Semantic document engineering with WordNet and PageRank (PT, RM, EF), pp. 782–786.
- SAC-2005-CanfieldX #approximate #documentation #xml
- Approximate XML document matching (ERC, GX), pp. 787–788.
- SAC-2005-PolatD #collaboration #privacy
- SVD-based collaborative filtering with privacy (HP, WD), pp. 791–795.
- SAC-2005-RodriguezL #implementation
- Implementing private Vickrey auctions (IR, NL), pp. 796–800.
- SAC-2005-Khurana #scalability #security
- Scalable security and accounting services for content-based publish/subscribe systems (HK), pp. 801–807.
- SAC-2005-ZhangP #analysis
- Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
- SAC-2005-DiazLPCV #approach #behaviour #e-commerce #probability #protocol #realtime #set #validation
- An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
- SAC-2005-ZhangM #learning #privacy
- Privacy preserving learning in negotiation (SZ, FM), pp. 821–825.
- SAC-2005-Arias-FisteusFK #model checking
- Applying model checking to BPEL4WS business collaborations (JAF, LSF, CDK), pp. 826–830.
- SAC-2005-BravettiGLZ #e-commerce #formal method
- Supporting e-commerce systems formalization with choreography languages (MB, CG, RL, GZ), pp. 831–835.
- SAC-2005-HsiehCK #identification #online #performance
- Efficient on-line identification of hot data for flash-memory management (JWH, LPC, TWK), pp. 838–842.
- SAC-2005-YimKK #memory management #performance
- A fast start-up technique for flash memory based computing systems (KSY, JK, KK), pp. 843–849.
- SAC-2005-WaerdtSIV #estimation #performance
- Motion estimation performance of the TM3270 processor (JWvdW, GAS, JPvI, SV), pp. 850–856.
- SAC-2005-FeizabadiRJ #algorithm #named #scheduling
- MSA: a memory-aware utility accrual scheduling algorithm (SF, BR, EDJ), pp. 857–862.
- SAC-2005-MenonS #embedded
- A code compression advisory tool for embedded processors (SKM, PS), pp. 863–867.
- SAC-2005-GriffinSC #case study #design #embedded #garbage collection #java #on the #power management
- On designing a low-power garbage collector for java embedded devices: a case study (PAG, WSa, JMC), pp. 868–873.
- SAC-2005-DebbabiMT #compilation #embedded #java #virtual machine
- Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors (MD, AM, NT), pp. 874–878.
- SAC-2005-GruianAKS #automation #generative #java
- Automatic generation of application-specific systems based on a micro-programmed Java core (FG, PA, KK, MS), pp. 879–884.
- SAC-2005-Rosso #analysis #framework #message passing #paradigm #performance #scalability
- Performance analysis framework for large software-intensive systems with a message passing paradigm (CDR), pp. 885–889.
- SAC-2005-WengW #network #parallel #profiling
- Profiling and mapping of parallel workloads on network processors (NW, TW), pp. 890–896.
- SAC-2005-ChenCKM #realtime #scheduling
- Real-time task scheduling anomaly: observations and prevention (YSC, LPC, TWK, AKM), pp. 897–898.
- SAC-2005-JafariDCS #network #performance
- Efficient placement and routing in grid-based networks (RJ, FD, BKC, MS), pp. 899–900.
- SAC-2005-JuurlinkSV #embedded
- Avoiding data conversions in embedded media processors (BHHJ, AS, SV), pp. 901–902.
- SAC-2005-LiuBGROA #assurance #distributed #embedded #realtime #requirements
- Two-level assurance of QoS requirements for distributed real-time and embedded systems (SHL, BRB, JGG, RRR, AMO, MA), pp. 903–904.
- SAC-2005-DanielOS #algorithm #multi #search-based
- Airspace congestion smoothing by multi-objective genetic algorithm (DD, SO, SP), pp. 907–912.
- SAC-2005-LimZ #problem
- The container loading problem (AL, XZ), pp. 913–917.
- SAC-2005-TangV #approach #clustering #documentation
- An artificial immune system approach to document clustering (NT, VRV), pp. 918–922.
- SAC-2005-FalcoTCG #algorithm #clustering #search-based
- A new variable-length genome genetic algorithm for data clustering in semeiotics (IDF, ET, ADC, FG), pp. 923–927.
- SAC-2005-FalcoTCG05a #approach #clustering #grammarware #novel #programming #search-based
- A novel grammar-based genetic programming approach to clustering (IDF, ET, ADC, FG), pp. 928–932.
- SAC-2005-LimZLR #graph #heuristic #problem
- Heuristic methods for graph coloring problems (AL, YZ, QL, BR), pp. 933–939.
- SAC-2005-ZhangGZL #algorithm
- A tabu search algorithm for the safe transportation of hazardous materials (LZ, SG, YZ, AL), pp. 940–946.
- SAC-2005-GoettlBJ #algorithm #email #search-based
- Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm (JSG, AWB, BAJ), pp. 947–951.
- SAC-2005-HouD #analysis #design #detection #search-based
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
- SAC-2005-FalcoTCP #approach #induction #programming #search-based
- Inductive inference of chaotic series by Genetic Programming: a Solomonoff-based approach (IDF, ET, ADC, AP), pp. 957–958.
- SAC-2005-Aguilar-RuizD #clustering
- Evolutionary computation for biclustering of gene expression (JSAR, FD), pp. 959–960.
- SAC-2005-OSullivanS #configuration management #mobile
- Agent technology and reconfigurable computing for mobile devices (TO, RS), pp. 963–969.
- SAC-2005-AroraF
- Pocket PC beacons: Wi-Fi based human tracking and following (AA, AF), pp. 970–974.
- SAC-2005-WattersZD
- Comparing table views for small devices (CRW, RZ, JD), pp. 975–980.
- SAC-2005-MongaS #mobile
- A generic serializer for mobile devices (MM, AS), pp. 981–985.
- SAC-2005-YonekiB #communication #mobile #peer-to-peer
- Dynamic group communication in mobile peer-to-peer environments (EY, JB), pp. 986–992.
- SAC-2005-BellaachiaR #database #performance #string
- Efficiency of prefix and non-prefix codes in string matching over compressed databases on handheld devices (AB, IAR), pp. 993–997.
- SAC-2005-TournierBO #architecture #component #embedded #evaluation
- An evaluation of Qinna, a component-based QoS architecture for embedded systems (JCT, JPB, VO), pp. 998–1002.
- SAC-2005-RamosGVM #framework #information management #mobile #named #ubiquitous #web
- PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devices (ACR, JG, MVO, HM), pp. 1003–1008.
- SAC-2005-BazizBAC #documentation #information retrieval #representation #semantics
- Semantic cores for representing documents in IR (MB, MB, NAG, CC), pp. 1011–1017.
- SAC-2005-BeigbederM #fuzzy #information retrieval #proximity #using
- An information retrieval model using the fuzzy proximity degree of term occurences (MB, AM), pp. 1018–1022.
- SAC-2005-YeeF #on the #peer-to-peer
- On search in peer-to-peer file sharing systems (WGY, OF), pp. 1023–1030.
- SAC-2005-InoueU #image #using
- Retrieving lightly annotated images using image similarities (MI, NU), pp. 1031–1037.
- SAC-2005-FradkinK #classification #learning
- Methods for learning classifier combinations: no clear winner (DF, PBK), pp. 1038–1043.
- SAC-2005-DongH #classification #clustering #parametricity
- Text classification based on data partitioning and parameter varying ensembles (YSD, KSH), pp. 1044–1048.
- SAC-2005-HanMZTGZ #clustering #documentation #metadata #rule-based #word
- Rule-based word clustering for document metadata extraction (HH, EM, HZ, KT, CLG, XZ), pp. 1049–1053.
- SAC-2005-LiY #classification #predict #recursion #using
- Using recursive classification to discover predictive features (FL, YY), pp. 1054–1058.
- SAC-2005-MandlW #effectiveness #evaluation #information retrieval
- The effect of named entities on effectiveness in cross-language information retrieval evaluation (TM, CWH), pp. 1059–1064.
- SAC-2005-HanXZG #ambiguity #naive bayes
- A hierarchical naive Bayes mixture model for name disambiguation in author citations (HH, WX, HZ, CLG), pp. 1065–1069.
- SAC-2005-MaG #detection #information retrieval #query
- Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
- SAC-2005-LiuC #knowledge-based #query #retrieval
- Knowledge-based query expansion to support scenario-specific retrieval of medical free text (ZL, WWC), pp. 1076–1083.
- SAC-2005-ElkhalifaAC #detection #named #specification
- InfoFilter: a system for expressive pattern specification and detection over text streams (LE, RA, SC), pp. 1084–1088.
- SAC-2005-CuiK #analysis #documentation #topic
- Topic activation analysis for document streams based on document arrival rate and relevance (CC, HK), pp. 1089–1095.
- SAC-2005-TebriBC #incremental #learning
- Incremental profile learning based on a reinforcement method (HT, MB, CC), pp. 1096–1101.
- SAC-2005-CosterS #collaboration #incremental #mobile
- Incremental collaborative filtering for mobile devices (RC, MS), pp. 1102–1106.
- SAC-2005-BordognaP #sql
- Extending SQL with customizable soft selection conditions (GB, GP), pp. 1107–1111.
- SAC-2005-ShangS #database #mining #relational
- Depth-first frequent itemset mining in relational databases (XS, KUS), pp. 1112–1117.
- SAC-2005-GaoH #query
- Location dependent query proxy (XG, ARH), pp. 1120–1124.
- SAC-2005-XiaPLCS
- Indexing continuously changing data with mean-variance tree (YX, SP, SL, RC, RS), pp. 1125–1132.
- SAC-2005-KanedaTET #fault tolerance #object-oriented #transaction
- Transactional agent model for fault-tolerant object systems (TK, YT, TE, MT), pp. 1133–1138.
- SAC-2005-Nakayama #communication #mobile
- Alternative source coding model for mobile text communication (TN), pp. 1139–1145.
- SAC-2005-Chefrour #adaptation #component #mobile
- Developing component based adaptive applications in mobile environments (DC), pp. 1146–1150.
- SAC-2005-CostaSB #adaptation #architecture #middleware #mobile
- A reflective middleware architecture to support adaptive mobile applications (CMdC, MdSS, GB), pp. 1151–1154.
- SAC-2005-DelicatoPRPR #middleware #network
- Reflective middleware for wireless sensor networks (FCD, PFP, LFRdCC, LP, JFdR), pp. 1155–1159.
- SAC-2005-KanzakiHN #ad hoc #adaptation #network #protocol
- An adaptive TDMA slot assignment protocol in ad hoc sensor networks (AK, TH, SN), pp. 1160–1165.
- SAC-2005-BarrettEKMS #ad hoc #multi #network #probability #protocol
- Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios (CLB, SE, LK, MVM, JPS), pp. 1166–1173.
- SAC-2005-Hara #ad hoc #mobile #network
- Location management of data items in mobile ad hoc networks (TH), pp. 1174–1175.
- SAC-2005-LiWLC #mobile #realtime #transaction
- Mobile real-time read-only transaction processing in data broadcast environments (GL, HW, YL, JC), pp. 1176–1177.
- SAC-2005-Sabharwal #multi #visualisation
- MultiMedia and visualization track (CLS), pp. 1178–1179.
- SAC-2005-BustosKS
- A pivot-based index structure for combination of feature vectors (BB, DAK, TS), pp. 1180–1184.
- SAC-2005-FlanaginGRAS #automation #generative #overview #using
- Automated terrain generation using LIDAR and waterbody survey data (MF, AG, JJR, MA, KS), pp. 1185–1189.
- SAC-2005-ChoC #database #image #recognition #symmetry #using
- Contour-based partial object recognition using symmetry in image databases (JSC, JC), pp. 1190–1194.
- SAC-2005-HiransakolwongHKVL #adaptation #distance #image #retrieval
- An adaptive distance computation technique for image retrieval systems (NH, KAH, SK, KV, SDL), pp. 1195–1199.
- SAC-2005-FoutHD #optimisation #visualisation
- Visualization of neuronal fiber connections from DT-MRI with global optimization (NF, JH, ZD), pp. 1200–1206.
- SAC-2005-YoonYMWD #3d #interactive #network #visualisation
- Interactive 3D visualization of highly connected ecological networks on the WWW (IY, SY, NDM, RJW, JAD), pp. 1207–1212.
- SAC-2005-KimY #metric #similarity
- Similarity measurement for aggregation of spatial objects (BK, JPY), pp. 1213–1217.
- SAC-2005-ChinoVTT #comprehension #data access #metric #named #visual notation
- MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
- SAC-2005-FoutMA #multi #reduction
- Time-varying, multivariate volume data reduction (NF, KLM, JPA), pp. 1224–1230.
- SAC-2005-McPhersonMO #clustering #graph #parametricity #social
- Discovering parametric clusters in social small-world graphs (JM, KLM, MO), pp. 1231–1238.
- SAC-2005-QianZ #effectiveness #visualisation
- The role of visualization in effective data cleaning (YQ, KZ), pp. 1239–1243.
- SAC-2005-MillerYS #collaboration #framework
- A framework for collaborative control of applications (JRM, SY, PLS), pp. 1244–1249.
- SAC-2005-WalkerMH #re-engineering #using
- Surface reconstruction using shadow profilometry (CPW, NM, MGH), pp. 1250–1251.
- SAC-2005-Hosobe #constraints #documentation #layout #linear #web
- Solving linear and one-way constraints for web document layout (HH), pp. 1252–1253.
- SAC-2005-Brown #database #image #similarity
- Issues in augmenting image databases to improve processing content-based similarity searches (LB), pp. 1254–1255.
- SAC-2005-BettiniBL #flexibility
- Safe and flexible objects (LB, VB, SL), pp. 1258–1263.
- SAC-2005-CazzolaCC #c#
- [a]C#: C# with a customizable code annotation mechanism (WC, AC, DC), pp. 1264–1268.
- SAC-2005-KaminaT #composition #mixin
- Selective method combination in mixin-based composition (TK, TT), pp. 1269–1273.
- SAC-2005-Heinlein #c++
- Virtual namespace functions: an alternative to virtual member functions in C++ and advice in AspectC++ (CH), pp. 1274–1281.
- SAC-2005-CabralMS #dot-net #named
- RAIL: code instrumentation for .NET (BC, PM, LMS), pp. 1282–1287.
- SAC-2005-GorappaK #distributed #embedded #empirical #evaluation #realtime
- Empirical evaluation of OpenCCM for Java-based distributed, real-time, and embedded systems (SG, RK), pp. 1288–1292.
- SAC-2005-BraunWHW #approach
- Method construction — a core approach to organizational engineering (CB, FW, MH, RW), pp. 1295–1299.
- SAC-2005-BleisteinCV #analysis #approach #requirements
- Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
- SAC-2005-CaetanoST #process #using
- Using roles and business objects to model and understand business processes (AC, ARS, JMT), pp. 1308–1313.
- SAC-2005-ColucciNSDPC #approach #composition #knowledge base #semantics
- Knowledge based approach to semantic composition of teams in an organization (SC, TDN, EDS, FMD, GP, SC), pp. 1314–1319.
- SAC-2005-WieringaG #coordination #correctness #design #process #trust
- Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
- SAC-2005-SchaadSW #case study #process
- A case study of separation of duty properties in the context of the Austrian “eLaw” process (AS, PS, HW), pp. 1328–1332.
- SAC-2005-SchelpS #framework #integration
- Extending the business engineering framework for application integration purposes (JS, AS), pp. 1333–1337.
- SAC-2005-AversanoBT #assessment #impact analysis #process
- Assessment and impact analysis for aligning business processes and software systems (LA, TB, MT), pp. 1338–1343.
- SAC-2005-PereiraS #architecture #enterprise
- Enterprise architecture: business and IT alignment (CMP, PMAS), pp. 1344–1345.
- SAC-2005-CazzolaPA #approach #aspect-oriented #design #evolution
- AOP for software evolution: a design oriented approach (WC, SP, MA), pp. 1346–1350.
- SAC-2005-OgelTF #aspect-oriented #compilation #performance
- Supporting efficient dynamic aspects through reflection and dynamic compilation (FO, GT, BF), pp. 1351–1356.
- SAC-2005-CarvalhoL #abstraction #composition #distributed #parallel #performance #programming
- The # model: separation of concerns for reconciling modularity, abstraction and efficiency in distributed parallel programming (FHdCJ, RDL), pp. 1357–1364.
- SAC-2005-WuRBGM #2d #compilation
- A two-dimensional separation of concerns for compiler construction (XW, SR, BRB, JGG, MM), pp. 1365–1369.
- SAC-2005-WuGRM #debugging #domain-specific language #weaving
- Weaving a debugging aspect into domain-specific language grammars (HW, JGG, SR, MM), pp. 1370–1374.
- SAC-2005-MilazzoPTU #distributed #runtime
- Handling run-time updates in distributed applications (MM, GP, ET, GU), pp. 1375–1380.
- SAC-2005-StefanoFPT #composition #metric
- Metrics for evaluating concern separation and composition (ADS, MF, GP, ET), pp. 1381–1382.
- SAC-2005-Emir #compilation
- Compiling regular patterns to sequential machines (BE), pp. 1385–1389.
- SAC-2005-RimassaV #comprehension #java #parametricity #strict
- Understanding access restriction of variant parametric types and Java wildcards (GR, MV), pp. 1390–1397.
- SAC-2005-CleenewerckD #implementation
- Disentangling the implementation of local-to-global transformations in a rewrite rule transformation system (TC, TD), pp. 1398–1403.
- SAC-2005-Lu #correctness #declarative #using
- Use of correctness assertions in declarative diagnosis (LL), pp. 1404–1408.
- SAC-2005-ForaxDR #implementation #java
- Reflection-based implementation of Java extensions: the double-dispatch use-case (RF, ÉD, GR), pp. 1409–1413.
- SAC-2005-GuoJ #logic programming #source code
- Mode-directed preferences for logic programs (HFG, BJ), pp. 1414–1418.
- SAC-2005-WangG #approach #domain-specific language #framework #implementation #prototype #semantics
- Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approach (QW, GG), pp. 1419–1426.
- SAC-2005-Tarau #logic programming
- Agent oriented logic programming in Jinni 2004 (PT), pp. 1427–1428.
- SAC-2005-Moore05a #order
- Order relations and rigor in computing (REM), pp. 1431–1433.
- SAC-2005-Goualard #algorithm #constraints #on the #theorem proving
- On considering an interval constraint solving algorithm as a free-steering nonlinear Gauss-Seidel procedure (FG), pp. 1434–1438.
- SAC-2005-ChabertTN #consistency #constraints #problem
- Box-set consistency for interval-based constraint problems (GC, GT, BN), pp. 1439–1443.
- SAC-2005-DuanHW #detection #network
- Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
- SAC-2005-KoshelevaKMN #matrix #np-hard
- Computing the cube of an interval matrix is NP-Hard (OK, VK, GM, HTN), pp. 1449–1453.
- SAC-2005-MitchellP #metric #runtime #using
- Using object-level run-time metrics to study coupling between objects (ÁM, JFP), pp. 1456–1462.
- SAC-2005-CaiCLNY #adaptation #component #testing
- Adaptive testing of software components (KYC, TYC, YCL, WYN, YTY), pp. 1463–1469.
- SAC-2005-BlakeCRIG #case study #component #development #product line #specification
- Use case-driven component specification: a medical applications perspective to product line development (MBB, KC, SR, LI, KG), pp. 1470–1477.
- SAC-2005-CanforaCGPV #education
- Confirming the influence of educational background in pair-design knowledge through experiments (GC, AC, FG, MP, CAV), pp. 1478–1484.
- SAC-2005-WongQC #risk management #source code
- Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
- SAC-2005-KvaleLC #aspect-oriented #case study #programming #using
- A case study on building COTS-based system using aspect-oriented programming (AAK, JL, RC), pp. 1491–1498.
- SAC-2005-RummelKT #data flow #testing #towards
- Towards the prioritization of regression test suites with data flow information (MJR, GMK, AT), pp. 1499–1504.
- SAC-2005-ManceboA #component #multi
- A strategy for selecting multiple components (EM, AAA), pp. 1505–1510.
- SAC-2005-VarmaAPT #automation #migration
- NextGen eXtreme porting: structured by automation (PV, AA, DPP, BT), pp. 1511–1517.
- SAC-2005-PaigeCMS #programming
- High-integrity extreme programming (RFP, HC, JAM, ZRS), pp. 1518–1523.
- SAC-2005-ByunS #communication #development #protocol
- A pattern-based development methodology for communication protocols (YB, BAS), pp. 1524–1528.
- SAC-2005-ZhaoCL #modelling #process #re-engineering
- Applying agent technology to software process modeling and process-centered software engineering environment (XZ, KC, ML), pp. 1529–1533.
- SAC-2005-TrentiniM #framework #java #petri net #realtime #validation
- Plan validation via petri nets in the real-time performers Java framework (AT, DM), pp. 1534–1538.
- SAC-2005-TangsripairojS #repository #self #using #visualisation
- Organizing and visualizing software repositories using the growing hierarchical self-organizing map (ST, MHS), pp. 1539–1545.
- SAC-2005-TruongS #behaviour #modelling #uml #using #verification
- Verification of behavioural elements of UML models using B (NTT, JS), pp. 1546–1552.
- SAC-2005-CaoBZBROA #modelling #using
- Marshaling and unmarshaling models using the entity-relationship model (FC, BRB, WZ, CCB, RRR, AMO, MA), pp. 1553–1557.
- SAC-2005-HeoYCHS #incremental
- Space-efficient page-level incremental checkpointing (JH, SY, YC, JH, SYS), pp. 1558–1562.
- SAC-2005-DAgostiniF #aspect-oriented #metalanguage #preprocessor
- Bridging AOP to SMP: turning GCC into a metalanguage preprocessor (TSD, AAF), pp. 1563–1564.
- SAC-2005-DoxseeG #automation #c++ #specification #synthesis
- Synthesis of C++ software for automated teller from CSPm specifications (SD, WBG), pp. 1565–1566.
- SAC-2005-YangEY05a #framework #modelling #verification
- Mediation framework modeling and verification by SAM (LY, RKE, HY), pp. 1567–1568.
- SAC-2005-KinatederTR #alias #communication #peer-to-peer
- Strong pseudonymous communication for peer-to-peer reputation systems (MK, RT, KR), pp. 1570–1576.
- SAC-2005-Moloney #distributed #network #pervasive #recommendation #simulation
- Simulation of a distributed recommendation system for pervasive networks (SM), pp. 1577–1581.
- SAC-2005-ZuoP #component #trust
- Component based trust management in the context of a virtual organization (YZ, BP), pp. 1582–1588.
- SAC-2005-AvesaniMT #recommendation
- A trust-enhanced recommender system application: Moleskiing (PA, PM, RT), pp. 1589–1593.
- SAC-2005-BicakciCT #certification #how #metric #trust
- How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
- SAC-2005-VogiazouEDK #community #game studies #scalability
- From buddyspace to CitiTag: large-scale symbolic presence for community building and spontaneous play (YV, ME, MD, JK), pp. 1600–1606.
- SAC-2005-StaakeTF #anti #network
- Extending the EPC network: the potential of RFID in anti-counterfeiting (TS, FT, EF), pp. 1607–1612.
- SAC-2005-FujinamiN #physics #towards
- Towards system software for physical space applications (KF, TN), pp. 1613–1620.
- SAC-2005-VishwanathGL #ubiquitous
- Intelligent file management in ubiquitous environments (KV, AG, YL), pp. 1621–1625.
- SAC-2005-Omitola #declarative
- Declarative control of the future home environment (TO), pp. 1626–1627.
- SAC-2005-SunZ #approach #semantics
- An approach to acquire semantic relationships between terms (XS, QZ), pp. 1630–1633.
- SAC-2005-ReeveH #overview #platform #semantics
- Survey of semantic annotation platforms (LHR, HH), pp. 1634–1638.
- SAC-2005-BoninoCP #automation #concept #learning #network
- Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks (DB, FC, FP), pp. 1639–1644.
- SAC-2005-BryP #paradigm #web
- Reactivity on the web: paradigms and applications of the language XChange (FB, PLP), pp. 1645–1649.
- SAC-2005-LuHVL #automation #generative #named #web #web service
- Pollock: automatic generation of virtual web services from web sites (YHL, YH, JV, DL), pp. 1650–1655.
- SAC-2005-MaamarBGMY #coordination #self #tuple #web #web service
- Tuple spaces for self-coordination of web services (ZM, DB, CG, QHM, HY), pp. 1656–1660.
- SAC-2005-BocchiCMPR #approach #coordination #grid
- An OWL-S based approach to express grid services coordination (LB, PC, RM, VP, DR), pp. 1661–1667.
- SAC-2005-Kirsch-PinheiroVGM #adaptation #collaboration #web
- Context-aware filtering for collaborative web systems: adapting the awareness information to the user’s context (MKP, MVO, JG, HM), pp. 1668–1673.
- SAC-2005-BaresiCM #adaptation #case study #consistency #experience #modelling
- First experiences on constraining consistency and adaptivity of W2000 models (LB, SC, LM), pp. 1674–1678.
- SAC-2005-ZhouX #approach #complexity #diagrams
- Measuring structural complexity for class diagrams: an information theory approach (YZ, BX), pp. 1679–1683.
- SAC-2005-Atterer #tool support #web
- Where web engineering tool support ends: building usable websites (RA), pp. 1684–1688.
- SAC-2005-BalzeraniRPA #architecture #product line #web
- A product line architecture for web applications (LB, DDR, AP, GDA), pp. 1689–1693.
- SAC-2005-BellettiniMT #named #testing #web
- TestUml: user-metrics driven web applications testing (CB, AM, AT), pp. 1694–1698.
- SAC-2005-Casale #analysis #mining #network #performance #web
- Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
- SAC-2005-MendoncaS #empirical #evaluation #policy #web #web service
- An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
- SAC-2005-GriecoMS #named #scalability
- SEcS: scalable edge-computing services (RG, DM, VS), pp. 1709–1713.
- SAC-2005-Ahmedi #xpath
- Making XPath reach for the web-wide links (LA), pp. 1714–1721.
- SAC-2005-DebnathMG #automation
- Automatic extraction of informative blocks from webpages (SD, PM, CLG), pp. 1722–1726.
- SAC-2005-AdaikkalavanC #approach #named #security #web
- SmartGate: a smart push-pull approach to support role-based security in web gateways (RA, SC), pp. 1727–1731.
- SAC-2005-JinD #metadata #using
- Sanitizing using metadata in MetaXQuery (HJ, CED), pp. 1732–1736.
- SAC-2005-LunaLSHHB #learning
- Learning system to introduce GIS to civil engineers (RL, WTL, JMS, RHH, MGH, MB), pp. 1737–1738.
- SAC-2005-ErradiM #framework #interactive #named #reliability #web #web service
- wsBus: a framework for reliable web services interactions (AE, PM), pp. 1739–1740.
25 ×#using
24 ×#approach
23 ×#network
18 ×#named
17 ×#performance
17 ×#web
16 ×#mobile
15 ×#clustering
14 ×#analysis
13 ×#adaptation
24 ×#approach
23 ×#network
18 ×#named
17 ×#performance
17 ×#web
16 ×#mobile
15 ×#clustering
14 ×#analysis
13 ×#adaptation