Content of Issue 1
DOI: 10.3217/jucs-015-01
|
Logic, Abstract State Machines and Databases |
K.-D. Schewe |
1 |
On Defining the Behavior of OR-joins in Business Process Models |
E. Börger, O. Sörensen, B. Thalheim |
3 |
Dynamic Query Optimization under Access Limitations and Dependencies |
A. Calì, D. Calvanese, D. Martinenghi |
33 |
Non-Denumerable Infinitary Modal Logic |
M.J. Cresswell |
63 |
Reasoning about Nonblocking Concurrency |
L. Groves |
72 |
Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner |
S. Hartmann, S. Link |
112 |
Using Abstract State Machines to Model ARIES-based Transaction Processing |
M. Kirchberg |
157 |
Global Database Design based on Storage Space and Update Time Minimization |
H. Köhler |
195 |
Formal Verification of Semistructured Data Models in PVS |
S.U.-J. Lee, G. Dobbie, J. Sun, L. Groves |
241 |
A Formal Framework of Aggregation for the OLAP-OLTP Model |
H.-J. Lenz, B. Thalheim |
273 |
A Characterisation of Coincidence Ideals for Complex Values |
A. Sali, K.-D. Schewe |
304 |
Dynamic Data Warehouse Design with Abstract State Machines |
J. Zhao, K.-D. Schewe, H. Koehler |
355 |
Content of Issue 3
DOI: 10.3217/jucs-015-03
|
Managing Editor's Column |
H. Maurer |
505 |
Advances in Homomorphic Cryptosystems |
M. Akinwande |
506 |
Linear and Quadratic Complexity Bounds on the Values of the Positive Roots of Polynomials |
A.G. Akritas |
523 |
DS RBAC - Dynamic Sessions in Role Based Access Control |
J.R. Mühlbacher, C. Praher |
538 |
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing |
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López, A.F. Gómez-Skarmeta |
555 |
Structural Coverage Criteria for Testing SQL Queries |
M.J. Suárez-Cabal, J. Tuya |
584 |
Supporting Composition of Structural Aspects in an AOP Kernel |
É. Tanter, J. Fabry |
620 |
Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux |
S.L. Toral, R. Martínez Torres, F. Barrero |
648 |
Knowledge Sharing and Collaborative Learning in Second Life: A Classification of Virtual 3D Group Interaction Scripts |
A. Schmeil, M.J. Eppler |
665 |
Providing Multi Source Tag Recommendations in a Social Resource Sharing Platform |
M. Memmel, M. Kockler, R. Schirru |
678 |
Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models? |
N. Bjørn-Andersen, L. Bloch Rasmussen, S. Rasmussen |
692 |
Content of Issue 4
DOI: 10.3217/jucs-015-04
|
Knowledge Management for Autonomous Systems and Computational Intelligence |
N.T. Nguyen, D.-S. Huang |
704 |
An Efficient Data Preprocessing Procedure for Support Vector Clustering |
J.-S. Wang, J.-C. Chiang |
705 |
PDE-PEDA: A New Pareto-Based Multi-objective Optimization Algorithm |
X. Wang, M. Hao, Y. Cheng, R. Lei |
722 |
Integrative Discovery of Multifaceted Sequence Patterns by Frame-Relayed Search and Hybrid PSO-ANN |
S.-W. Liou, C.-M. Wang, Y.-F. Huang |
742 |
A Quantum-Inspired Immune Algorithm for Hybrid Flow Shop with Makespan Criterion |
Q. Niu, T. Zhou, S. Ma |
765 |
Graph-based Approach for Robust Road Guidance Sign Recognition from Differently Exposed Images |
A. Vavilin, K.-H. Jo |
786 |
Fingerprinting Lexical Contexts over the Web |
V. Di Lecce, M. Calabrese, D. Soldo |
805 |
Bayesian Gene Regulatory Network Inference Optimization by means of Genetic Algorithms |
V. Bevilacqua, G. Mastronardi, F. Menolascina, P. Pannarale, G. Romanazzi |
826 |
Multilayer Ensemble Pruning via Novel Multi-sub-swarm Particle Swarm Optimization |
J. Zhang, K.-W. Chau |
840 |
A DCM Based Orientation Estimation Algorithm with an Inertial Measurement Unit and a Magnetic Compass |
N.H.Q. Phuong, H.-J. Kang, Y.-S. Suh, Y.-S. Ro |
859 |
Complexity Analysis of Ontology Integration Methodologies:a Comparative Study |
T.H. Duong, G.S. Jo, J.J. Jung, N.T. Nguyen |
877 |
SDLMAS: A Scenario Modeling Framework for Multi-Agent Systems |
I. Čavrak, A. Stranjak, M. Žagar |
898 |
A Personalized URL Re-ranking Method using Psychological User Browsing Characteristics |
S. Ahmed, S. Park, J.J. Jung, S. Kang |
926 |
Agent Migration: Framework for Analysis |
D. Król, A. Lupa |
941 |
Content of Issue 5
DOI: 10.3217/jucs-015-05
|
Data Security and Privacy Protection in Pervasive Computing Environments |
B.-S. Koh, M. Denko, S. Gritzalis, C.-H. Hsu |
967 |
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents |
P. Najera, F. Moyano, J. Lopez |
970 |
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols |
P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek |
992 |
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments |
C. Lee, J. Kim, S. Hong, Y.-S. Lee |
1007 |
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks |
S. Lian, Y. Zhang |
1023 |
Light-Weight Key Exchange with Different Passwords in the Standard Model |
J.O. Kwon, I.R. Jeong, D.H. Lee |
1042 |
USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework |
J.H. Park |
1065 |
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication |
D. Bhattacharyya, P. Das, T.-h. Kim, S.K. Bandyopadhyay |
1081 |
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network |
Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie |
1090 |
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security |
N. Xiong, J. He, J.H. Park, D. Cooley, Y. Li |
1119 |
Content of Issue 6
DOI: 10.3217/jucs-015-06
|
Computability and Complexity in Analysis |
V. Brattka, P. Collins, R. Rettinger |
1143 |
On the Effective Existence of Schauder Bases |
V. Bosserhoff |
1145 |
Effective Computability of Solutions of Differential Inclusions The Ten Thousand Monkeys Approach |
P. Collins, D.S. Graça |
1162 |
Oracles and Relativizations of the P =? NP Question for Several Structures |
C. Gaßner |
1186 |
Chainable and Circularly Chainable Co-r.e. Sets in Computable Metric Spaces |
Z. Iljazović |
1206 |
Constructive Urysohn Universal Metric Space |
D. Lešnik |
1236 |
Fine-computable Functions on the Unit Square and their Integral |
T. Mori, M. Yasugi, Y. Tsujii |
1264 |
Representing Measurement Results |
A. Pauly |
1280 |
Topological Complexity of Blowup Problems |
R. Rettinger, K. Weihrauch, N. Zhong |
1301 |
An Effective Tietze-Urysohn Theorem for QCB-Spaces |
M. Schröder |
1317 |
Computing the Solution Operators of Symmetric Hyperbolic Systems of PDE |
S. Selivanova, V. Selivanov |
1337 |
On Finite-time Computability Preserving Conversions |
H. Tsuiki, S. Yamada |
1365 |
Elementary Computable Topology |
K. Weihrauch, T. Grubba |
1381 |
Content of Issue 7
DOI: 10.3217/jucs-015-07
|
Computers in Education: Advances in Software Technology |
J.Á. Velázquez-Iturbide, F.J. García-Peñalvo |
1423 |
Innovation and Quality in e-Learning: a European Perspective |
C. Dondi |
1427 |
A Meta-modeling based Approach for the Multi-Disciplinary Design of Web Educational Systems |
P. Díaz, E. Guerra, T. Zarraonandía, I. Aedo, C.L. Padrón |
1440 |
Application Scenarios for the Learning Objects Pool |
P. Dinis, A. Rodrigues da Silva |
1455 |
Learning to Program with COALA, a Distributed Computer Assisted Environment |
F. Jurado, A.I. Molina, M.A. Redondo, M. Ortega, A. Giemza, L. Bollen, H.U. Hoppe |
1472 |
TQ-Bot: An AIML-based Tutor and Evaluator Bot |
F.A. Mikic Fonte, J.C. Burguillo Rial, M. Llamas-Nistal |
1486 |
Eduquito: Virtual Environment for Digital Inclusion of People with Special Educational Needs |
L.M. Costi Santarosa, L. de Oliveira Basso |
1496 |
Development of a Web Application for Management of Learning Styles |
R. Silva, A. Andrade |
1508 |
Semantic Spiral Timelines Used as Support for e-Learning |
D.A.G. Aguilar, R. Therón, F.J. García-Peñalvo |
1526 |
Visualization of Syntax Trees for Language Processing Courses |
F.J. Almeida-Martínez, J. Urquiza-Fuentes, J.Á. Velázquez-Iturbide |
1546 |
Content of Issue 8
DOI: 10.3217/jucs-015-08
|
Managing Editor's Column |
H. Maurer |
1562 |
Tools and Stochastic Metrics for Debugging Temporal Behaviour of Real-Time Systems |
J. Entrialgo, J. García, J.L. Díaz, D.F. García |
1563 |
Modelling Weblog Success: Case of Korea |
J. Hwang, Y. Lee, S. Kim |
1589 |
Designing Secure Data Warehouses by Using MDA and QVT |
E. Soler, J. Trujillo, C. Blanco, E. Fernández-Medina |
1607 |
Computing as Engineering |
M. Tedre |
1642 |
Certificate-based Signatures Revisited |
W. Wu, Y. Mu, W. Susilo, X. Huang |
1659 |
Discovering Semantic Aspects of Socially Constructed Knowledge Hierarchy to Boost the Relevance of Web Searching |
D. Zhu, H. Dreher |
1685 |
ActiveTM - The Factory for Domain-customised Portal Engines |
L. Maicher, B. Bock |
1711 |
Fostering Knowledge Flow and Community Engagement in the Development of Interactive Entertainment |
S. Lohmann, J. Niesenhaus, P. Heim, J. Ziegler |
1722 |
Success and Failure Factors for KM: The Utilization of Knowledge in the Swedish Armed Forces |
U. Pettersson |
1735 |
Content of Issue 9
DOI: 10.3217/jucs-015-09
|
CSCWD Technologies, Applications and Challenges |
J. Yong, W. Shen, J.A. Pino |
1744 |
Organizational Simulation of Complex Process Engineering Projects in the Chemical Industry |
S. Tackenberg, B. Kausch, S. Duckwitz, C.M. Schlick, S. Karahancer |
1746 |
A Tree Similarity Measuring Method and its Application to Ontology Comparison |
Y. Xue, C. Wang, H.H. Ghenniwa, W. Shen |
1766 |
Authorization Algorithms for Permission-Role Assignments |
L. Sun, H. Wang, J. Yong |
1782 |
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme |
J. Luo, X. Wang, M. Yang |
1797 |
Estimating Software Projects Based On Negotiation |
S.F. Ochoa, J.A. Pino, F. Poblete |
1812 |
MC-Supporter: Flexible Mobile Computing Supporting Learning though Social Interactions |
N. Baloian, G. Zurita |
1833 |
An Application of the Dynamic Pattern Analysis Framework to the Analysis of Spatial-Temporal Crime Relationships |
K. Leong, J. Li, S. Chan, V. Ng |
1852 |
A QoS Perspective on Exception Diagnosis in Service-Oriented Computing |
N. Shah, R. Iqbal, K. Iqbal, A. James |
1871 |
Applying Reputation Mechanisms in Communities of Practice: A Case Study |
C.C.P. Cruz, C.L.R. Motta, F.M. Santoro, M. Elia |
1886 |
Application of Intelligent Strategies for Cooperative Manufacturing Planning |
W. Li, L. Gao, X. Li |
1907 |
Pattern-Oriented Workflow Generation and Optimization |
Y. Xiang, S. Zhang, Y. Shen, M. Shi |
1924 |
Supporting Awareness in Groupware through an Aspect-Oriented Middleware Service |
R.S.P. Maciel, J.M.N. David, M.R. Oei, A.A. de Oliveira Bastos, L. de Oliveira Menezes |
1945 |
Integrating Semantic Web and Object-Oriented Programming for Cooperative Design |
P.-H. Chiu, C.-C. Lo, K.-M. Chao |
1970 |
Using Embodied Conversational Assistants to Interface Users with Multi-Agent Based CSCW Applications: The WebAnima Agent |
E. Cabrera Paraiso, C.A. Tacla |
1991 |
Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming |
T. Peng, Q. Zheng, Y. Jin |
2011 |
Content of Issue 10
DOI: 10.3217/jucs-015-10
|
Information Integration on Web-based Applications and Services |
G. Kotsis, D. Taniar, I. Khalil, E. Pardede |
2026 |
Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States |
K.-D. Schewe, B. Thalheim, Q. Wang |
2028 |
SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System |
E. Pardede, J.W. Rahayu, R. Kaur Aujla, D. Taniar |
2058 |
An Agent for Web-based Structured Hypermedia Algorithm Explanation System |
E.M. Shakshuki, R. Halliday |
2078 |
Application Framework with Demand-Driven Mashup for Selective Browsing |
S. Ikeda, T. Nagamine, T. Kamada |
2109 |
Content of Issue 11
DOI: 10.3217/jucs-015-11
|
Software Components, Architectures and Reuse |
C. Werner, F. Oquendo |
2138 |
An Approach for Estimating Execution Time Probability Distributions of Component-based Real-Time Systems |
R. Perrone, R. Macedo, G. Lima, V. Lima |
2142 |
Distribution Pattern-driven Development of Service Architectures |
R. Barrett, C. Pahl |
2166 |
Checking Semantics Equivalence of MDA Transformations in Concurrent Systems |
P. Barbosa, F. Ramalho, J. Figueiredo, A. Júnior, A. Costa, L. Gomes |
2196 |
A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap |
K. Oliveira, K. Breitman, T. Oliveira |
2225 |
Assessment of the Design Modularity and Stability of Multi-Agent System Product Lines |
C. Nunes, U. Kulesza, C. Sant'Anna, I. Nunes, A. Garcia, C. Lucena |
2254 |
Content of Issue 12
DOI: 10.3217/jucs-015-12
|
Intelligent Environments and Services |
T.-h. Kim, A. Kusiak, D. Taniar, D. Zhang |
2284 |
Causality Join Query Processing for Data Streams via a Spatiotemporal Sliding Window |
O. Kwon, K.-J. Li |
2287 |
Meeting Warming-up: Detecting Common Interests and Conflicts among Participants before a Meeting |
Z. Yu, Z. Yu, X. Zhou, D. Zhang, Y. Nakamura |
2311 |
Service Conflict Management Framework for Multi-user Inhabited Smart Home |
C. Shin, W. Woo |
2330 |
On the Personalization of Personal Networks - Service Provision Based on User Profiles |
I.G. Nikolakopoulos, C.Z. Patrikakis, A. Cimmino, M. Bauer, H. Olesen |
2353 |
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears |
H.-C. Chu, D.-J. Deng, H.-C. Chao, Y.-M. Huang |
2373 |
A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph |
L. Weng, Y. Zhang, Y. Zhou, L.T. Yang, P. Tian, M. Zhong |
2387 |
Mining Dynamic Databases using Probability-Based Incremental Association Rule Discovery Algorithm |
R. Amornchewin, W. Kreesuradej |
2409 |
Modeling of an Intelligent e-Consent System in a Healthcare Domain |
C. Ruan, S.-S. Yeo |
2429 |
Content of Issue 13
DOI: 10.3217/jucs-015-13
|
Knowledge Management for Intelligent Systems |
K.-H. Jo, N.T. Nguyen, E. Szczerbicki |
2445 |
Interactive Genetic Algorithms with Individual Fitness Not Assigned by Human |
D. Gong, X. Yao, J. Yuan |
2446 |
Human Tracking based on Multiple View Homography |
D.-W. Seo, H.-U. Chae, B.-W. Kim, W.-H. Choi, K.-H. Jo |
2463 |
A Multiagent System for Hierarchical Control and Monitoring |
V.V. Tan, D.-S. Yoo, J.-C. Shin, M.-J. Yi |
2485 |
A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks |
C.-J. Huang, I.-F. Chen, K.-W. Hu, H.-Y. Shen, Y.-J. Chen, D.-X. Yang |
2506 |
Splice Site Prediction using Support Vector Machines with Context-Sensitive Kernel Functions |
Y. Chen, F. Liu, B. Vanschoenwinkel, B. Manderick |
2528 |
A Hammerstein-Wiener Recurrent Neural Network with Frequency-Domain Eigensystem Realization Algorithm for Unknown System Identification |
Y.-C. Chen, J.-S. Wang |
2547 |
Online Detecting and Predicting Special Patterns over Financial Data Streams |
T. Jiang, Y. Feng, B. Zhang |
2566 |
Applications of Cerebellar Model Articulation Controllers to Intelligent Landing System |
J.-G. Juang, C.-L. Lee |
2586 |
A Comparison Between a Geometrical and an ANN Based Method for Retinal Bifurcation Points Extraction |
V. Bevilacqua, L. Cariello, M. Giannini, G. Mastronardi, V. Santarcangelo, R. Scaramuzzi, A. Troccoli |
2608 |
Rough Classification - New Approach and Applications |
N.T. Nguyen |
2622 |
On the Semantics and Verification of Normative Multi-Agent Systems |
L. Aştefănoaei, M. Dastani, J.-J. Meyer, F.S. de Boer |
2629 |
Extended Defeasible Reasoning for Common Goals in n-Person Argumentation Games |
D.H. Pham, G. Governatori, S. Thakur |
2653 |
Analyzing Cooperation in Iterative Social Network Design |
G. Boella, L. van der Torre, S. Villata |
2676 |
Interactive Learning of Independent Experts' Criteria for Rescue Simulations |
T.-Q. Chu, A. Drogoul, A. Boucher, J.-D. Zucker |
2701 |
A New Short-term Power Load Forecasting Model Based on Chaotic Time Series and SVM |
D. Niu, Y. Wang, C. Duan, M. Xing |
2726 |
Content of Issue 14
DOI: 10.3217/jucs-015-14
|
Managing Editor's Column |
H. Maurer |
2746 |
Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms |
C. Aguirre, R. Huerta, L. Tsimring |
2747 |
Realtime LEGO Brick Image Retrieval with Cellular Automata |
L. Botha, L. van Zijl, M. Hoffmann |
2765 |
A Web-Decision Support System based on Collaborative Filtering for Academic Orientation. Case Study of the Spanish Secondary School. |
E.J. Castellano, L. Martínez |
2786 |
Petri Net Controlled Grammars: the Case of Special Petri Nets |
J. Dassow, S. Turaev |
2808 |
A Debugging System Based on Natural Semantics |
A. de la Encina, L. Llana, F. Rubio |
2836 |
Ideal Homogeneous Access Structures Constructed from Graphs |
J. Herranz |
2881 |
A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes |
G. Rodríguez, M.J. Martín, P. González, J. Touriño |
2894 |
Content of Issue 15
DOI: 10.3217/jucs-015-15
|
Security in Information Systems: New Advances and Tendencies |
E. Fernández-Medina, A. Rodríguez |
2912 |
SeAAS - A Reference Architecture for Security Services in SOA |
M. Hafner, M. Memon, R. Breu |
2916 |
Information Theoretically Secure Encryption with Almost Free Authentication |
B. Alomair, R. Poovendran |
2937 |
ModelSec: A Generative Architecture for Model-Driven Security |
Ó. Sánchez, F. Molina, J. García-Molina, A. Toval |
2957 |
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers |
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya |
2981 |
A User Controlled Approach for Securing Sensitive Information in Directory Services |
W. Claycomb, D. Shin |
2999 |
Optimizations for Risk-Aware Secure Supply Chain Master Planning |
A. Schröpfer, F. Kerschbaum, C. Schütz, R. Pibernik |
3019 |
Managing Security and its Maturity in Small and Medium-sized Enterprises |
L.E. Sánchez, A. Santos-Olmo Parra, D.G. Rosado, M. Piattini |
3038 |
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases |
C.A. Visaggio, F. de Rosa |
3059 |
Content of Issue 18
DOI: 10.3217/jucs-015-18
|
Processing Camera-Based Documents |
R. Dueire Lins |
3158 |
Layout Analysis for Camera-Based Whiteboard Notes |
S. Vajda, T. Plötz, G.A. Fink |
3307 |
Robust Extraction of Text from Camera Images using Colour and Spatial Information Simultaneously |
S.P. Chowdhury, S. Dhar, K. Rafferty, A.K. Das, B. Chanda |
3325 |
Adaptive Binarization of Unconstrained Hand-Held Camera-Captured Document Images |
S.S. Bukhari, F. Shafait, T.M. Breuel |
3343 |
Automatically Deciding if a Document was Scanned or Photographed |
G. Pereira e Silva, M. Thielo, R. Dueire Lins, B. Miro, S.J. Simske |
3364 |
|