Volume 82, Number 1, January 2009
, Varsha Apte
: An overhead and resource contention aware analytical model for overloaded Web servers.
, Taskin Koçak
: Developing reusable simulation core code for networking: The grid resource discovery example.
Swapna S. Gokhale
: Model-based performance analysis using block coverage measurements.
Volume 82, Number 2, February 2009
Y. F. Li
, M. Xie
, T. N. Goh
: A study of project selection and feature weighting for analogy based software cost estimation.
, Geert Poels
: A family of experiments to evaluate a functional size measurement procedure for Web applications.
, Dawu Gu
, Yi Wang
: Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
Volume 82, Number 3, March 2009
Marvin V. Zelkowitz
: An update to experimental models for validating computer technology.
, Adalberto Zordan
: Reengineering for service oriented architectures: A strategic decision model for integration versus migration.
, Srini Ramaswamy
: An empirical approach to evaluating dependency locality in hierarchically structured software systems.
Volume 82, Number 4, April 2009
Selected papers from the 2008 IEEE Conference on Software Engineering Education and Training (CSEET08)
: Software engineering challenges of the "Net" generation.
, Jörg Rech
: Using Wikis to support the Net Generation in improving knowledge acquisition in capstone projects.
David S. Janzen
, Jungwoo Ryoo
: Engaging the net generation with evidence-based software engineering through a community-driven web database.
Nancy R. Mead
: Software engineering education: How far we've come and how far we have to go.
: Real-time task scheduling by multiobjective genetic algorithm.
, Zhenfu Cao
: An identity based universal designated verifier signature scheme secure in the standard model.
, Chin-Wen Liu
: A new relevance feedback technique for iconic image retrieval based on spatial relationships.
, Ali A. Ghorbani
: A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models.
Volume 82, Number 5, May 2009
: Improvement of identity-based proxy multi-signature scheme.
, Mikael Svahnberg
: Evaluating two ways of calculating priorities in requirements hierarchies - An experiment on hierarchical cumulative voting.
: Determining factors that affect long-term evolution in scientific application software.
: An entropy-based algorithm for data elimination in time-driven software instrumentation.
Volume 82, Number 6, June 2009
, Hafedh Mili
: A delegation-based approach for the unanticipated dynamic evolution of distributed objects.
, Sun-Jen Huang
: An empirical analysis of the impact of software development problem factors on software maintainability.
: Design and implementation of a Byzantine fault tolerance framework for Web services.
, Chien-Sing Lee
: Extending path summary and region encoding for efficient structural query processing in native XML databases.
Volume 82, Number 7, July 2009
Volume 82, Number 8, August 2009
Architectural Decisions and Rationale
, Yi-Ming Chen
: On the design of an global intrusion tolerance network architecture against the internet catastrophes.
Volume 82, Number 9, September 2009
, Claes Wohlin
: A comparison of issues and advantages in agile and incremental development between state of the art and an industrial case.
, Chin-Chen Chang
: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
Volume 82, Number 10, October 2009
Jeffrey J. P. Tsai
, Alan Liu
: Experience on knowledge-based software engineering: A logic-based requirements language and its industrial applications.
, Wen-Kang Jia
: Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet.
The Duc Kieu
, Chin-Chen Chang
: A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy.
Volume 82, Number 11, November 2009
TAIC PART 2007 and MUTATION 2007
, Cheng-Wei Tsai
: Practical design of a proxy agent to facilitate adaptive video streaming service across wired/wireless networks.
Volume 82, Number 12, December 2009
, Sungwon Jung
: An energy-efficient mobile transaction processing method using random back-off in wireless broadcast environments.
, Duen-Ren Liu
: Integrating knowledge flow mining and collaborative filtering to support document recommendation.
, Zhen Yu Wu
: Approach to designing bribery-free and coercion-free electronic voting scheme.