Content of Issue 1
DOI: 10.3217/jucs-012-01
|
Pervasive Health Management: New Challenges for Health Informatics |
J.C. Augusto, N.D. Black, H.G. McAllister, P.J. McCullagh, C.D. Nugent |
1 |
Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues |
J. Roberts |
6 |
Health Monitoring and Assistance to Support Aging in Place |
D.J. Cook |
15 |
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring |
H. Zhou, K.M. Hou, L. Gineste, C. De Vaulx, J. Ponsonnaille |
30 |
CAMMD: Context-Aware Mobile Medical Devices |
T. O'Sullivan, J. O'Donoghue, J. Herbert, R. Studdert |
45 |
The Impact of Behavioral Monitoring Technology on the Provision of Health Care in the Home |
A.P. Glascock, D.M. Kutzik |
59 |
A Collaborative Biomedical Research System |
A. Taweel, A. Rector, J. Rogers |
80 |
A Pervasive Multimodal Tele-Home Healthcare System |
Z. Miao, B. Yuan, M. Yu |
99 |
A Web-Based Decision Support System for Chronic Diseases |
C.-C. Chang, C.-S. Cheng, Y.-S. Huang |
115 |
Content of Issue 3
DOI: 10.3217/jucs-012-03
|
Ubiquitous Computing and Ambient Intelligence: New Challenges for Computing |
J. Bravo, X. Alamán, T. Riesgo |
233 |
Development of Ambient Intelligence Applications using Components and Aspects |
L. Fuentes, D. Jiménez, M. Pinto |
236 |
Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications |
M. Tentori, J. Favela, V.M. González |
252 |
Visualization Services in a Conference Context: An Approach by RFID Technology |
J. Bravo, R. Hervás, I. Sánchez, G. Chavira, S. Nava |
270 |
A Mechanism for Solving Conflicts in Ambient Intelligent Environments |
P.A. Haya, G. Montoro, A. Esquivel, M. García-Herranz, X. Alamán |
284 |
EMI²lets: A Reflective Framework for Enabling AmI |
D. López de Ipiña, J.I. Vázquez, D. García, J. Fernández, I. García, D. Sainz, A. Almeida |
297 |
Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments |
F.J. Villanueva, D. Villa, F. Moya, J. Barba, F. Rincón, J.C. López |
315 |
A Modular Architecture for Nodes in Wireless Sensor Networks |
J. Portilla, A. de Castro, E. de la Torre, T. Riesgo |
328 |
Secure Service Discovery based on Trust Management for ad-hoc Networks |
C. Campo, F. Almenárez, D. Díaz, C. García-Rubio, A.M. López |
340 |
Information and Hybrid Architecture Model of the OCP Contextual Information Management System |
I. Nieto, J.A. Botía, A.F. Gómez-Skarmeta |
357 |
Content of Issue 4
DOI: 10.3217/jucs-012-04
|
Evolvable Hardware |
N. Nedjah, L. de Macedo Mourelle |
367 |
A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip |
G. Ascia, V. Catania, M. Palesi |
370 |
Pareto-Optimal Hardware for Substitution Boxes |
N. Nedjah, L. de Macedo Mourelle |
395 |
Automatic Programming Methodologies for Electronic Hardware Fault Monitoring |
A. Abraham, C. Grosan |
408 |
Multi-Objective Evolutionary Algorithms and Pattern Search Methods for Circuit Design Problems |
T. Biondi, A. Ciccazzo, V. Cutello, S. D'Antona, G. Nicosia, S. Spinella |
432 |
DS/CDMA Multiuser Detection with Evolutionary Algorithms |
F. Ciriaco, T. Abrão, P.J.E. Jeszensky |
450 |
Content of Issue 6
DOI: 10.3217/jucs-012-06
|
Computational Challenges of Massive Data Sets and Randomness in Computation J.UCS Special Issue on the First and Second Japanese-German Frontiers of Science Symposia |
J. Rothe, H. Arimura |
579 |
The Berlin Brain-Computer Interface: Machine Learning Based Detection of User Specific Brain States |
B. Blankertz, G. Dornhege, S. Lemm, M. Krauledat, G. Curio, K.-R. Müller |
581 |
Sequential Data Assimilation: Information Fusion of a Numerical Simulation and Large Scale Observation Data |
K. Nakamura, T. Higuchi, N. Hirose |
608 |
Data Mining Methods for Discovering Interesting Exceptions from an Unsupervised Table |
E. Suzuki |
627 |
Randomness and Secrecy - A Brief Introduction |
J. Blõmer |
654 |
Pseudorandom Number Generation: Impossibility and Compromise |
M. Matsumoto, M. Saito, H. Haramoto, T. Nishimura |
672 |
Progress in Quantum Computational Cryptography |
A. Kawachi, T. Koshiba |
691 |
Testing Membership in Formal Languages Implicitly Represented by Boolean Functions |
B. Bollig |
710 |
Improving Deterministic and Randomized Exponential-Time Algorithms for the Satisfiability, the Colorability, and the Domatic Number Problem |
T. Riege, J. Rothe |
725 |
Randomized Algorithms and Complexity Theory |
H. Hempel |
746 |
Content of Issue 7
|
Selected Papers from SBLP 2006: The 10th Brazilian Symposium on Programming Languages |
M.A. Silva Bigonha, A. de Vasconcellos Garcia |
762 |
The Design of the YAP Compiler: An Optimizing Compiler for Logic Programming Languages |
A.F. da Silva, V.S. Costa |
764 |
Our Experiences with Optimizations in Sun's Java Just-In-Time Compilers |
A.F. da Silva, V.S. Costa |
788 |
Detecting Bad Smells in AspectJ |
E. Kessler Piveta, M. Hecht, M. Soares Pimenta, R.T. Price |
811 |
Program Slicing by Calculation |
N.F. Rodrigues, L. Soares Barbosa |
828 |
The Language of the Visitor Design Pattern |
M. Schordan |
849 |
Strong Mobility in Mobile Haskell |
A. Rauber Du Bois, P. Trinder, H.-W. Loidl |
868 |
An Object Model for Interoperable Systems |
A. Calsavara, A. Borges, L. Nunes, D. Variani, C. Kolb |
885 |
Expressing Workflow Patterns for Web Services: The Case of PEWS |
M.A. Musicante, E. Potrich |
903 |
Generic Process Algebra: A Programming Challenge |
P.R. Ribeiro, M.A. Barbosa, L.S. Barbosa |
922 |
Type-safe Versioned Object Query Language |
R. Machado, Á. Freitas Moreira, R. de Matos Galante, M. Moura Moro |
938 |
Defining Atomic Composition in UML Behavioral Diagrams |
J. Pereira Machado, P. Blauth Menezes |
958 |
Content of Issue 9
DOI: 10.3217/jucs-012-09
|
Informatics in Higher Education |
A. Pethő, D. Sima |
1085 |
Creation and Evaluation of Fuzzy Knowledge-base |
Á. Achs |
1087 |
UML-Based Modeling of Data-oriented WEB Applications |
A. Adamkó |
1104 |
The mobiDIÁK Educational Portal |
P. Antal, N. Bátfai, I. Fazekas, P. Jeszenszky |
1118 |
Design and Implementation of Enum-Based Services |
B. Benyó, M.F. Hatwágner, T. Heckenast, K. Kovács, Á. Varga, N. Varjasi |
1128 |
Performance Modeling of Proxy Cache Servers |
T. Bérczes, J. Sztrik |
1139 |
Developing on Exact Quality and Classification System for Plant Improvement |
J. Berke, Z. Polgár, Z. Horváth, T. Nagy |
1154 |
Extension of CQL over Dynamic Databases |
A. Buza |
1165 |
Japlo: Rule-based Programming on Java |
M. Espák |
1177 |
Analysing Data of Childhood Acute Lymphoid Leukaemia by Seasonal Time Series Methods |
M. Fazekas |
1190 |
4M — Software for Modelling and Analysing Cropping Systems |
N. Fodor |
1196 |
Modern Technologies in Client-Server Architecture for Geo-based Interactive Web Portals |
P. Gocek, M. Hartmann, H. Schleusener |
1208 |
The Number of the Modulo n Roots of the Polynomial xv — xv and the RSA |
J. Gonda |
1215 |
The "MEDIP-Platform Independent Software System for Medical Image Processing" Project |
A. Hajdu, J. Kormos, Z. Lencse, L. Trón, M. Emri |
1229 |
Applications of Neighborhood Sequence in Image Processing and Database Retrieval |
A. Hajdu, J. Kormos, T. Tóth, K. Veréb |
1240 |
Course Modeling for Student Profile Based Flexible Higher Education on the Internet |
L. Horváth, I. Rudas |
1254 |
Mathematical Models of Endocrine Systems |
I. Koós |
1267 |
Construction of Wavelets and Applications |
I. László, F. Schipp, S.P. Kozaitis |
1278 |
Resource Efficient Maintenance of Wireless Network Topologies |
T. Lukovszki, C. Schindelhauer, K. Volbert |
1292 |
Membrane Computing and Graphical Operating Systems |
B. Nagy, L. Szegedi |
1312 |
Parameter Estimation of the Cauchy Distribution in Information Theory Approach |
F. Nagy |
1332 |
Phasetransition-like Changes in Human Visual Information Processing |
P. Nagy, I. Pintér, M. Bagány |
1345 |
Primary School Teachers in the Information Society |
R. Sinka |
1358 |
The Additional Examination of the Kudo-Mathuria Time-Release Protocol |
P. Takács |
1373 |
Synthesis of Optimal Workflow Structure |
J. Tick, Z. Kovacs, F. Friedler |
1385 |
Systems Engineering: A New Approach to Complex IT-based Technological Systems in Engineering Education |
T. Tóth, F. Erdélyi |
1393 |
Computer Science, Logic, Informatics Education |
K.P. Varga, M. Várterész |
1405 |
Content of Issue 11
DOI: 10.3217/jucs-012-11
|
Programming and Languages |
F.J. López-Fraguas |
1464 |
An Interval Constraint Branching Scheme for Lattice Domains |
A.J. Fernández, P.M. Hill |
1466 |
Constraint Based Methods for Biological Sequence Analysis |
M. Bavarian, V. Dahl |
1500 |
Process Equivalences as Global Bisimulations |
D. de Frutos Escrig, C.G. Rodríguez |
1521 |
Verifying Real-Time Properties of tccp Programs |
M. Alpuente, M. del Mar Gallardo, E. Pimentel, A. Villanueva |
1551 |
Constructive Failure in Functional-Logic Programming: From Theory to Implementation |
J. Sánchez-Hernández |
1574 |
Verification of CRWL Programs with Rewriting Logic |
J.M. Cleva, I. Pita |
1594 |
Introducing the ITP Tool: a Tutorial |
M. Clavel, M. Palomino, A. Riesco |
1618 |
Magic Sets for the XPath Language |
J.M. Almendros-Jiménez, A. Becerra-Terón, F.J. Enciso-Baños |
1651 |
Operational/Interpretive Unfolding of Multi-adjoint Logic Programs |
P. Julián, G. Moreno, J. Penabad |
1679 |
|