Content of Issue 1
DOI: 10.3217/jucs-011-01
|
| Information Assurance and Security |
A. Abraham, J. Thomas, S. Sanyal, L. Jain |
1 |
| Physically Locating Wireless Intruders |
F. Adelstein, P. Alla, R. Joyce, G. G. Richard III |
4 |
| Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics |
S. Sitaraman, S. Venkatesan |
20 |
| Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks |
I. Joe Khor, J. Thomas, I. Jonyer |
37 |
| Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding |
N. Cvejic, T. Seppänen |
56 |
| Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware |
N. Nedjah, L.d.M. Mourelle |
66 |
| ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention |
S. P. Joglekar, S. R. Tate |
83 |
| A Novel Scheme for Secured Data Transfer Over Computer Networks |
R. Athi Vasudevan, A. Abraham, S. Sanyal |
104 |
| Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing |
R. S. Veerubhotla, A. Saxena, V. P. Gulati, A. K. Pujari |
122 |
| A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques |
V. Casola, R. Preziosi, M. Rak, L. Troiano |
150 |
| RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption |
A. Nenadic, N. Zhang, B. Cheetham, C. Goble |
175 |
| Information Quality Assurance by Lazy Exploration of Information Source Combinations Space in Open Multi-Agent Systems |
J. Park, K.S. Barber |
193 |
Content of Issue 4
DOI: 10.3217/jucs-011-04
|
| Integrating Business Processes and Knowledge Infrastructures |
M. Strohmaier, S. N. Lindstaedt |
426 |
| Modeling Knowledge Work for the Design of Knowledge Infrastructures |
R. Maier |
429 |
| KMDL - Capturing, Analysing and Improving Knowledge-Intensive Business Processes |
N. Gronau, C. Müller, R. Korf |
452 |
| Tube Map Visualization: Evaluation of a Novel Knowledge Visualization Application for the Transfer of Knowledge in Long-Term Projects |
R. Aslak Burkhard, M. Meier |
473 |
| A Methodology and a Toolkit that Integrate Technological, Organisational, and Human Factors to Design KM within Knowledge-Intensive Networks |
T. Forzi, M. Peters |
495 |
| The Role of Knowledge Management Solutions in Enterprise Business Processes |
V. Janev, S. Vraneš |
526 |
| A Knowledge Infrastructure Hierarchy Model for Call-Centre Processes |
G. Timbrell, S. Koller, N. Schefe, S. N. Lindstaedt |
546 |
| Process Oriented Knowledge Management: A Service Based Approach |
R. Woitsch, D. Karagiannis |
565 |
| Reconciling Knowledge Management and Workflow Management Systems: The Activity-Based Knowledge Management Approach |
S. Dustdar |
589 |
| Modelling and Implementing Pre-built Information Spaces. Architecture and Methods for Process Oriented Knowledge Management |
K. Böhm, W. Engelbach, J. Härtwig, M. Wilcken, M. Delp |
605 |
Content of Issue 5
DOI: 10.3217/jucs-011-05
|
| Atomicity in System Design and Execution (Proceedings of Dagstuhl-Seminar 04181) |
J. Burton, C. B. Jones |
634 |
| The Atomic Manifesto |
C. B. Jones, D. Lomet, A. Romanovsky, G. Weikum |
636 |
| Atomicity as a First-Class System Provision |
J.E.B. Moss, R. Rajwar |
651 |
| Investigating Atomicity and Observability |
J. Burton, C. B. Jones |
661 |
| On Atomicity and Software Development |
J. Kienzle |
687 |
| Replication: Understanding the Advantage of Atomic Broadcast over Quorum Systems |
R. Ekwall, A. Schiper |
703 |
| Precise Modelling of Compensating Business Transactions and its Application to BPEL |
M. Butler, C. Ferreira, M.Y. Ng |
712 |
| Formal Construction of a Non-blocking Concurrent Queue Algorithm |
J.-R. Abrial, D. Cansell |
744 |
| Relaxing Atomicity and Verifying Correctness: Considering the Case of an Asynchronous Communication Mechanism |
J. Burton |
771 |
Content of Issue 6
DOI: 10.3217/jucs-011-06
|
| Managing Editor's Column |
H. Maurer |
803 |
| How to Draw Free Trees Inside Bounded Simple Polygons |
A. Bagheri, M. Razzazi |
804 |
| A Provably Efficient Computational Model For Approximate Spatiotemporal Retrieval |
V. Delis, C. Makris, S. Sioutas |
830 |
| Time Costs in Actor Computations |
M. Di Santo, F. Frattolillo |
850 |
| Analysis, Design, and Performance Evaluation of MS-RTCP: More Scalable Scheme for the Real-Time Control Protocol |
N. A. Elramly, A. S. Habib, O. S. Essa, H. M. Harb |
874 |
| Automatic Test Data Generation for Data Flow Testing Using a Genetic Algorithm |
M. R. Girgis |
898 |
| On Theoretical Upper Bound for Routing Estimation |
F. He, G. Yang, L. Cheng, X. Song, M. Gu, J. Sun |
916 |
| Fine-Grained Transclusions of Multimedia Documents in HTML |
J. Kolbitsch |
926 |
| On Complexity of Collective Communications on a Fat Cube Topology |
V. Kutálek, V. Dvořák |
944 |
| TESTAF: A Test Automation Framework for Class Testing using Object-Oriented Formal Specifications |
A. Nadeem, M. Jaffar-ur-Rehman |
962 |
| A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem |
L. Nguyen, R. Safavi-Naini, K. Kurosawa |
986 |
| Exploiting Agent Ontologies in B2C Virtual Marketplaces |
D. Rosaci |
1011 |
| Domain Extenders for UOWHF: A Finite Binary Tree Algorithm |
P. Sarkar |
1040 |
| Model Checking, Automated Abstraction, and Compositional Verification of Rebeca Models |
M. Sirjani, A. Movaghar, A. Shali, F. S. de Boer |
1054 |
| A Fast T-decomposition Algorithm |
J. Yang, U. Speidel |
1083 |
| Collect the Fitted Surfaces into Complex Based on C0 Continuity |
E. A. Zanaty, M. R. Girgis |
1102 |
Content of Issue 7
DOI: 10.3217/jucs-011-07
|
| The 9th Brazilian Symposium on Programming Languages |
M.A. Musicante, R.M.F. Lima |
1115 |
| A Constructive Approach to Language Definition |
P.D. Mosses |
1117 |
| Hardware Design and Functional Programming: a Perfect Match |
M. Sheeran |
1135 |
| The Implementation of Lua 5.0 |
R. Ierusalimschy, L.H. de Figueiredo, W. Celes |
1159 |
| AspectLua - A Dynamic AOP Approach |
N. Cacho, T. Batista, F. Fernandes |
1177 |
| A Formal Semantics for Finalizers |
M. Amorim Leal, R. Ierusalimschy |
1198 |
| PEWS: A New Language for Building Web Service Interfaces |
C. Ba, M.A. Carrero, M. Halfeld Ferrari, M.A. Musicante |
1215 |
| mHaskell: Mobile Computation in a Purely Functional Language |
A. Rauber Du Bois, P. Trinder, H.-W. Loidl |
1234 |
| Compiling Nonstrict Functional Languages for the .NET Platform |
M. Monteiro, M. Araújo, R. Borges, A. Santos |
1255 |
| Running Lua Scripts on the CLR through Bytecode Translation |
F. Mascarenhas, R. Ierusalimschy |
1275 |
| An Experimental Evaluation of JAVA JIT Technology |
A. Faustino da Silva, V. Santos Costa |
1291 |
| Signals and Comonads |
T. Uustalu, T. Vene |
1311 |
| An Equational Specification for the Scheme Language |
M. d'Amorim, G. Rosu |
1327 |
Content of Issue 8
DOI: 10.3217/jucs-011-08
|
| Data Streams |
J.S. Aguilar-Ruiz, J. Gama |
1349 |
| Learning Decision Trees from Dynamic Data Streams |
J. Gama, P. Medas |
1353 |
| Network Attack Scenarios Extraction and Categorization by Mining IDS Alert Streams |
W. Yan |
1367 |
| Semantic Preprocessing of Web Request Streams for Web Usage Mining |
J.J. Jung |
1383 |
| Evaluating Trigger Conditions on Streaming Time Series with User-given Quality Requirements |
L. Gao, M. Wang, X.S. Wang |
1397 |
| Online Mining Changes of Items over Continuous Append-only and Dynamic Data Streams |
H.-F. Li, S.-Y. Lee, M.-K. Shan |
1411 |
| Incremental Rule Learning and Border Examples Selection from Numerical Data Streams |
F.J. Ferrer-Troyano, J.S. Aguilar-Ruiz, J.C. Riquelme |
1426 |
| Resource-aware Mining of Data Streams |
M.M. Gaber, S. Krishnaswamy, A. Zaslavsky |
1440 |
|
Content of Issue 9
|
| Computers and Education: Research and Experiences in eLearning Technology |
J. Bravo, B. Fernández-Manjón, J.M. Sánchez-Pérez |
1454 |
| From Contents to Activities: Modelling Units of Learning |
M. Caeiro-Rodríguez, M. Llamas-Nistal, L. Anido-Rifón |
1458 |
| Semantic Web Technologies Applied to e-learning Personalization in <e-aula> |
P. Sancho, I. Martínez, B. Fernández-Manjón |
1470 |
| A Tool for the Reinforcement of Conceptual Learning: Description and Use Experiences |
R. Moriyón, F. Saiz |
1482 |
| Ubiquitous Computing in the Classroom: An Approach through Identification Process |
J. Bravo, R. Hervás, G. Chavira |
1494 |
| Integrating Educational Tools for Collaborative Computer Programming Learning |
C. Bravo, M.J. Marcelino, A. Gomes, M. Esteves, A.J. Mendes |
1505 |
| From Chasqui to Chasqui II: an Evolution in the Conceptualization of Virtual Objects |
A. Navarro, J.L. Sierra, A. Fernández-Valmayor, H. Hernanz |
1518 |
| Authoring and Diagnosis of Learning Activities with the KADD ET Environment |
B. Ferrero, M. Martín, A. Alvarez, M. Urretavizcaya, I. Fernández-Castro |
1530 |
| A System to Support Asynchronous Collaborative Learning Tasks Using PDAs |
A.I. Molina, M.A. Redondo, M. Ortega |
1543 |
| Case Studies in Tele-Education: Research and Projects |
M.A. Vega-Rodríguez, J.A. Gómez-Pulido, J.M. Sánchez-Pérez |
1555 |
| Integrating Ontologies into the Collaborative Authoring of Learning Objects |
J.M. Dodero, P. Díaz, A. Sarasa, I. Sarasa |
1568 |
|
Content of Issue 10
|
| Compositional Construction and Reasoning Techniques for Software |
F. Arbab, J.N. Kok |
1577 |
| From Algebras to Objects: Generation and Composition |
A.M. Cruz, L. Soares Barbosa, J.N. Oliveira |
1580 |
| Analyzing Module Diversity |
A. Bergel, S. Ducasse, O. Nierstrasz |
1613 |
| A Non-Invasive Approach to Assertive and Autonomous Dynamic Component Composition in the Service-Oriented Paradigm |
F. Cao, B.R. Bryant, R.R. Raje, A.M. Olson, M. Auguston, W. Zhao, C.C. Burt |
1645 |
| Coordinating Behavioral Descriptions of Components |
S. Amaro, E. Pimentel, A.M. Roldán |
1676 |
| Modular Verification of a Component-Based Actor Language |
M. Sirjani, F.S. de Boer, A. Movaghar |
1695 |
| Probabilistic Models for Reo Connector Circuits |
C. Baier |
1718 |
Content of Issue 11
DOI: 10.3217/jucs-011-11
|
| Visual Data Mining |
J.S. Aguilar-Ruiz, F.J. Ferrer-Troyano |
1749 |
| Semi-Automatic Visual Subgroup Mining using VIKAMINE |
M. Atzmueller, F. Puppe |
1752 |
| Scalable Visual Data Exploration of Large Data Sets via MultiResolution |
D.A. Keim, J. Schneidewind |
1766 |
| Visualizing Recommendation Flow on Social Network |
J.J. Jung |
1780 |
| Gravi++: Interactive Information Visualization to Explore Highly Structured Temporal Data |
K. Hinum, S. Miksch, W. Aigner, S. Ohmann, C. Popow, M. Pohl, M. Rester |
1792 |
| Visualization of High-dimensional Data via Orthogonal Curves |
C. García-Osorio, C. Fyfe |
1806 |
| Integrating Lite-Weight but Ubiquitous Data Mining into GUI Operating Systems |
L. Wei, E. Keogh, X. Xi, S. Lonardi |
1820 |
| Connecting Segments for Visual Data Exploration and Interactive Mining of Decision Rules |
F.J. Ferrer-Troyano, J.S. Aguilar-Ruiz, J.C. Riquelme |
1835 |
| Visualization and Manipulation of Incomplete and Uncertain Dependencies by Decision Diagrams |
D.V. Popel |
1849 |
Content of Issue 12
DOI: 10.3217/jucs-011-12
|
Constructivity, Computability, and Logic A Collection of Papers in Honour of the 60th Birthday of Douglas Bridges |
C.S. Calude, H. Ishihara |
1863 |
| Constructive Suprema |
M.A. Baroni |
1865 |
| Constructive Equivalents of the Uniform Continuity Theorem |
J. Berger |
1878 |
| Computability of the Spectrum of Self-Adjoint Operators |
V. Brattka, R. Dillhage |
1884 |
| Algorithmic Irreducibility in a Cellular Automata Universe |
G. Chaitin |
1901 |
| Constructive Analysis of Iterated Rational Functions |
J. Clark |
1904 |
| Formal Topology and Constructive Mathematics: the Gelfand and Stone-Yosida Representation Theorems |
T. Coquand, B. Spitters |
1932 |
| Axiomatic Classes of Intuitionistic Models |
R. Goldblatt |
1945 |
| On Firmness of the State Space and Positive Elements of a Banach Algebra |
R.S. Havea |
1963 |
| Nonrandom Sequences between Random Sequences |
P. Hertling |
1970 |
| Permutability of Rules for Linear Lattices |
S. Negri |
1986 |
| Quotient Spaces and Coequalisers in Formal Topology |
E. Palmgren |
1996 |
| Constructive Set Theory and Brouwerian Principles |
M. Rathjen |
2008 |
| Constructing Programs or Processes |
S. Reeves, D. Streader |
2034 |
| Constructive Aspects of Markov Chains |
F. Richman |
2046 |
| On the Meaning of Positivity Relations for Regular Formal Spaces |
G. Sambin, G. Trentinaglia |
2056 |
| Functional Dependencies with Counting on Trees |
K.-D. Schewe |
2063 |
| What is Continuity, Constructively? |
P. Schuster |
2076 |
| A Direct Proof of the Equivalence between Brouwer's Fan Theorem and König's Lemma with a Uniqueness Hypothesis |
H. Schwichtenberg |
2086 |
| Constructive Results on Operator Algebras |
B. Spitters |
2096 |
| Hausdorff Measure and Lukasiewicz Languages |
L. Staiger |
2114 |
| New Bounds for Positive Roots of Polynomials |
D. Ştefănescu |
2125 |
| How the Mathematical Objects Determine the Mathematical Principles |
D. van Dalen |
2132 |
| Perhaps the Intermediate Value Theorem |
W. Veldman |
2142 |
| On Complements of Sets and the Efremovič Condition in Pre-apartness Spaces |
L.S. Vîţă |
2159 |
| A Constructive Approach to Sylvester's Conjecture |
J. von Plato |
2165 |
| Sequential Computability of a Function. Effective Fine Space and Limiting Recursion |
M. Yasugi, Y. Tsujii, T. Mori |
2179 |
|