Content of Issue 1
DOI: 10.3217/jucs-012-01
|
| Pervasive Health Management: New Challenges for Health Informatics |
J.C. Augusto, N.D. Black, H.G. McAllister, P.J. McCullagh, C.D. Nugent |
1 |
| Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues |
J. Roberts |
6 |
| Health Monitoring and Assistance to Support Aging in Place |
D.J. Cook |
15 |
| A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring |
H. Zhou, K.M. Hou, L. Gineste, C. De Vaulx, J. Ponsonnaille |
30 |
| CAMMD: Context-Aware Mobile Medical Devices |
T. O'Sullivan, J. O'Donoghue, J. Herbert, R. Studdert |
45 |
| The Impact of Behavioral Monitoring Technology on the Provision of Health Care in the Home |
A.P. Glascock, D.M. Kutzik |
59 |
| A Collaborative Biomedical Research System |
A. Taweel, A. Rector, J. Rogers |
80 |
| A Pervasive Multimodal Tele-Home Healthcare System |
Z. Miao, B. Yuan, M. Yu |
99 |
| A Web-Based Decision Support System for Chronic Diseases |
C.-C. Chang, C.-S. Cheng, Y.-S. Huang |
115 |
Content of Issue 3
DOI: 10.3217/jucs-012-03
|
| Ubiquitous Computing and Ambient Intelligence: New Challenges for Computing |
J. Bravo, X. Alamán, T. Riesgo |
233 |
| Development of Ambient Intelligence Applications using Components and Aspects |
L. Fuentes, D. Jiménez, M. Pinto |
236 |
| Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications |
M. Tentori, J. Favela, V.M. González |
252 |
| Visualization Services in a Conference Context: An Approach by RFID Technology |
J. Bravo, R. Hervás, I. Sánchez, G. Chavira, S. Nava |
270 |
| A Mechanism for Solving Conflicts in Ambient Intelligent Environments |
P.A. Haya, G. Montoro, A. Esquivel, M. García-Herranz, X. Alamán |
284 |
| EMI²lets: A Reflective Framework for Enabling AmI |
D. López de Ipiña, J.I. Vázquez, D. García, J. Fernández, I. García, D. Sainz, A. Almeida |
297 |
| Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments |
F.J. Villanueva, D. Villa, F. Moya, J. Barba, F. Rincón, J.C. López |
315 |
| A Modular Architecture for Nodes in Wireless Sensor Networks |
J. Portilla, A. de Castro, E. de la Torre, T. Riesgo |
328 |
| Secure Service Discovery based on Trust Management for ad-hoc Networks |
C. Campo, F. Almenárez, D. Díaz, C. García-Rubio, A.M. López |
340 |
| Information and Hybrid Architecture Model of the OCP Contextual Information Management System |
I. Nieto, J.A. Botía, A.F. Gómez-Skarmeta |
357 |
Content of Issue 4
DOI: 10.3217/jucs-012-04
|
| Evolvable Hardware |
N. Nedjah, L. de Macedo Mourelle |
367 |
| A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip |
G. Ascia, V. Catania, M. Palesi |
370 |
| Pareto-Optimal Hardware for Substitution Boxes |
N. Nedjah, L. de Macedo Mourelle |
395 |
| Automatic Programming Methodologies for Electronic Hardware Fault Monitoring |
A. Abraham, C. Grosan |
408 |
| Multi-Objective Evolutionary Algorithms and Pattern Search Methods for Circuit Design Problems |
T. Biondi, A. Ciccazzo, V. Cutello, S. D'Antona, G. Nicosia, S. Spinella |
432 |
| DS/CDMA Multiuser Detection with Evolutionary Algorithms |
F. Ciriaco, T. Abrão, P.J.E. Jeszensky |
450 |
Content of Issue 6
DOI: 10.3217/jucs-012-06
|
Computational Challenges of Massive Data Sets and Randomness in Computation J.UCS Special Issue on the First and Second Japanese-German Frontiers of Science Symposia |
J. Rothe, H. Arimura |
579 |
The Berlin Brain-Computer Interface: Machine Learning Based Detection of User Specific Brain States |
B. Blankertz, G. Dornhege, S. Lemm, M. Krauledat, G. Curio, K.-R. Müller |
581 |
| Sequential Data Assimilation: Information Fusion of a Numerical Simulation and Large Scale Observation Data |
K. Nakamura, T. Higuchi, N. Hirose |
608 |
| Data Mining Methods for Discovering Interesting Exceptions from an Unsupervised Table |
E. Suzuki |
627 |
| Randomness and Secrecy - A Brief Introduction |
J. Blõmer |
654 |
| Pseudorandom Number Generation: Impossibility and Compromise |
M. Matsumoto, M. Saito, H. Haramoto, T. Nishimura |
672 |
| Progress in Quantum Computational Cryptography |
A. Kawachi, T. Koshiba |
691 |
| Testing Membership in Formal Languages Implicitly Represented by Boolean Functions |
B. Bollig |
710 |
| Improving Deterministic and Randomized Exponential-Time Algorithms for the Satisfiability, the Colorability, and the Domatic Number Problem |
T. Riege, J. Rothe |
725 |
| Randomized Algorithms and Complexity Theory |
H. Hempel |
746 |
|
Content of Issue 7
|
| Selected Papers from SBLP 2006: The 10th Brazilian Symposium on Programming Languages |
M.A. Silva Bigonha, A. de Vasconcellos Garcia |
762 |
| The Design of the YAP Compiler: An Optimizing Compiler for Logic Programming Languages |
A.F. da Silva, V.S. Costa |
764 |
| Our Experiences with Optimizations in Sun's Java Just-In-Time Compilers |
A.F. da Silva, V.S. Costa |
788 |
| Detecting Bad Smells in AspectJ |
E. Kessler Piveta, M. Hecht, M. Soares Pimenta, R.T. Price |
811 |
| Program Slicing by Calculation |
N.F. Rodrigues, L. Soares Barbosa |
828 |
| The Language of the Visitor Design Pattern |
M. Schordan |
849 |
| Strong Mobility in Mobile Haskell |
A. Rauber Du Bois, P. Trinder, H.-W. Loidl |
868 |
| An Object Model for Interoperable Systems |
A. Calsavara, A. Borges, L. Nunes, D. Variani, C. Kolb |
885 |
| Expressing Workflow Patterns for Web Services: The Case of PEWS |
M.A. Musicante, E. Potrich |
903 |
| Generic Process Algebra: A Programming Challenge |
P.R. Ribeiro, M.A. Barbosa, L.S. Barbosa |
922 |
| Type-safe Versioned Object Query Language |
R. Machado, Á. Freitas Moreira, R. de Matos Galante, M. Moura Moro |
938 |
| Defining Atomic Composition in UML Behavioral Diagrams |
J. Pereira Machado, P. Blauth Menezes |
958 |
Content of Issue 9
DOI: 10.3217/jucs-012-09
|
| Informatics in Higher Education |
A. Pethő, D. Sima |
1085 |
| Creation and Evaluation of Fuzzy Knowledge-base |
Á. Achs |
1087 |
| UML-Based Modeling of Data-oriented WEB Applications |
A. Adamkó |
1104 |
| The mobiDIÁK Educational Portal |
P. Antal, N. Bátfai, I. Fazekas, P. Jeszenszky |
1118 |
| Design and Implementation of Enum-Based Services |
B. Benyó, M.F. Hatwágner, T. Heckenast, K. Kovács, Á. Varga, N. Varjasi |
1128 |
| Performance Modeling of Proxy Cache Servers |
T. Bérczes, J. Sztrik |
1139 |
| Developing on Exact Quality and Classification System for Plant Improvement |
J. Berke, Z. Polgár, Z. Horváth, T. Nagy |
1154 |
| Extension of CQL over Dynamic Databases |
A. Buza |
1165 |
| Japlo: Rule-based Programming on Java |
M. Espák |
1177 |
| Analysing Data of Childhood Acute Lymphoid Leukaemia by Seasonal Time Series Methods |
M. Fazekas |
1190 |
| 4M — Software for Modelling and Analysing Cropping Systems |
N. Fodor |
1196 |
| Modern Technologies in Client-Server Architecture for Geo-based Interactive Web Portals |
P. Gocek, M. Hartmann, H. Schleusener |
1208 |
| The Number of the Modulo n Roots of the Polynomial xv — xv and the RSA |
J. Gonda |
1215 |
| The "MEDIP-Platform Independent Software System for Medical Image Processing" Project |
A. Hajdu, J. Kormos, Z. Lencse, L. Trón, M. Emri |
1229 |
| Applications of Neighborhood Sequence in Image Processing and Database Retrieval |
A. Hajdu, J. Kormos, T. Tóth, K. Veréb |
1240 |
| Course Modeling for Student Profile Based Flexible Higher Education on the Internet |
L. Horváth, I. Rudas |
1254 |
| Mathematical Models of Endocrine Systems |
I. Koós |
1267 |
| Construction of Wavelets and Applications |
I. László, F. Schipp, S.P. Kozaitis |
1278 |
| Resource Efficient Maintenance of Wireless Network Topologies |
T. Lukovszki, C. Schindelhauer, K. Volbert |
1292 |
| Membrane Computing and Graphical Operating Systems |
B. Nagy, L. Szegedi |
1312 |
| Parameter Estimation of the Cauchy Distribution in Information Theory Approach |
F. Nagy |
1332 |
| Phasetransition-like Changes in Human Visual Information Processing |
P. Nagy, I. Pintér, M. Bagány |
1345 |
| Primary School Teachers in the Information Society |
R. Sinka |
1358 |
| The Additional Examination of the Kudo-Mathuria Time-Release Protocol |
P. Takács |
1373 |
| Synthesis of Optimal Workflow Structure |
J. Tick, Z. Kovacs, F. Friedler |
1385 |
| Systems Engineering: A New Approach to Complex IT-based Technological Systems in Engineering Education |
T. Tóth, F. Erdélyi |
1393 |
| Computer Science, Logic, Informatics Education |
K.P. Varga, M. Várterész |
1405 |
Content of Issue 11
DOI: 10.3217/jucs-012-11
|
| Programming and Languages |
F.J. López-Fraguas |
1464 |
| An Interval Constraint Branching Scheme for Lattice Domains |
A.J. Fernández, P.M. Hill |
1466 |
| Constraint Based Methods for Biological Sequence Analysis |
M. Bavarian, V. Dahl |
1500 |
| Process Equivalences as Global Bisimulations |
D. de Frutos Escrig, C.G. Rodríguez |
1521 |
| Verifying Real-Time Properties of tccp Programs |
M. Alpuente, M. del Mar Gallardo, E. Pimentel, A. Villanueva |
1551 |
| Constructive Failure in Functional-Logic Programming: From Theory to Implementation |
J. Sánchez-Hernández |
1574 |
| Verification of CRWL Programs with Rewriting Logic |
J.M. Cleva, I. Pita |
1594 |
| Introducing the ITP Tool: a Tutorial |
M. Clavel, M. Palomino, A. Riesco |
1618 |
| Magic Sets for the XPath Language |
J.M. Almendros-Jiménez, A. Becerra-Terón, F.J. Enciso-Baños |
1651 |
| Operational/Interpretive Unfolding of Multi-adjoint Logic Programs |
P. Julián, G. Moreno, J. Penabad |
1679 |
|