ebook img

Software: Practice & Experience 2005: Vol 35 Table of Contents PDF

2005·1.8 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Software: Practice & Experience 2005: Vol 35 Table of Contents

P. SOFTWARE PRACTICE & EXPERIENCE CONTENTS Volume 35 Number 1 January 2005 Making XML document markup international Y. Yu, J. Lu, J. Mylopoulos, W. Sun, J.-H. Xue and E. H. D’ Hollander Selective sweeping Y. C. Chung, S.-M. Moon, K. Ebcioglu and D. Sahlin Efficient implementation of multiprocessor scheduling algorithms on a simulation testbed J. R. Ramos and V. Rego Branch elimination by condition merging W. C. Kreahling, D. Whalley, M. W. Bailey, X. Yuan, G.-R. Uh and R. van Engelen ... Applications of dynamic proxies in distributed environments Y. Hassoun, R. Johnson and S. Counsell Volume 35 Number 2 February 2005 Minimizing development and maintenance costs in supporting persistently optimized BLAS R. C. Whaley and A. Petitet A resource management interface for the Java™ platform G. Czajkowski, S. Hahn, G. Skinner, P. Soper and C. Bryce MultiArray: a C++ library for generic programming with arrays R. Garcia and A. Lumsdaine Note: Correction to the 1997 tutorial on Reed-Solomon coding J. S. Plank and Y. Ding Volume 35 Number 3 Exception handling in the development of dependable component-based systems C. M. F. Rubira, R. de Lemos, G. R. M. Ferreira and F. Castor Filho Scientific computing with Java and C++: a case study using functional magnetic resonance neuroimages OM OTT TTT EPI Te OTC er tere iil iV VOLUME CONTENTS Object-oriented design patterns for debugging heterogeneous languages and virtual machines D. Parson, D. J. Murray and Y. Chen Lightweight monitors for the Java virtual machine B.-S. Yang, S.-M. Moon and K. Ebcioglu Sharing of precompiled database statements in J2EE applications R. Latorre, F. Lopez and A. E. Martinez Volume 35 Number 4 10 April 2005 Perturbing and evaluating numerical programs without recompilation—the wonglediff way P. R. Eggert and D. S. Parker A negotiation description language A. Elfatatry and P. Layzell Scalability evaluation of the Yima streaming media architecture R. Zimmermann, C. Shahabi, K. Fu and S.-Y. D. Yao 345 Multiple query optimization in middleware using query teamwork K. O’Gorman, A. El Abbadi and D. Agrawal ; a Compiler transformations for effectively exploiting a zero overhead loop buffer G.-R. Uh, Y. Wang, D. Whalley, S. Jinturkar, Y. Paek, V. Cao and C. Burns........... 393 Volume 35 Number 5 25 April 2005 Classifying product families using platform coverage and variation mechanisms J. G. Wijnstra LZ trie and dictionary compression S. Ristov A graphical user-interface and an image processing toolkit for Perl 7, maretex, A. Beserm, V. Belmean and J. Sporritg ...... 2... wc ccc ce ceccrecsees Scheduling parameter sweep applications on global Grids: a deadline and budget constrained cost-time optimization algorithm R. Buyya, M. Murshed, D. Abramson and S. Venugopal VOLUME CONTENTS Volume 35 Number 6 May 2005 Managing infinite variability in mobile terminal software A. Maccari and A. Heie So JiST: an efficient approach to simulation using virtual machines R. Barr, Z. J. Haas and R. van Renesse Heuristic compression of an English word list R. P. Cook Model variables: cleanly supporting abstraction in design by contract Y. Cheon, G. Leavens, M. Sitaraman and S. Edwards.................cccceeeeeeeeee Developing dynamic-reconfigurable communication protocol stacks using Java Y.-F. Lee and R.-C. Chang Volume 35 Number 7 June 2005 Utilizing commodity hardware and software to distribute a real-world application: maximizing reuse while improving performance M. Davis, R. Smith, B. Dixon; A. Parrish and D. Cordes.............cccccccceacecss 621 Arabic GramCheck: a grammar checker for Arabic K. F. Shaalan Design, implementation, and performance of an automatic configuration service for distributed component systems F. Kon, J. R. Marques, T. Yamane, R. H. Campbell and M. D. Mickunas Volume 35 Number 8 10 July 2005 A taxonomy of variability realization techniques M. Svahnberg, J. van Gurp and J. Bosch Software Distributed Shared Memory: a VIA-based implementation and comparison of sequential consistency with home-based lazy release consistency V. losevich and A. Schuster Converting command-line applications into binary components P. M. Maurer VOLUME CONTENTS Volume 35 Number 9 25 July 2005 Special Issue Grid Security Editorial H. Chivers and A. Martin The MyProxy online credential repository J. Basney, M. Humphrey and V. Welch The case for using Bridge Certificate Authorities for Grid computing M. Humphrey, J. Basney and J. Jokl The GridSite Web/Grid security system A. McNab ‘R-What?’ Development of a role-based access control policy-writing tool for e-Scientists S. Brostoff, M. A. Sasse, D. Chadwick, J. Cunningham, U. Mbanaso and S. Otenko... Towards secure Grid-enabled healthcare D. J. Power, E. A. Politou, M. A. Slaymaker and A. C. Simpson Applying Security Design Analysis to a service-based system H. Chivers and M. Fletcher 873 Volume 35 Number 10 August 2005 SESAG: an object-oriented application framework for real-time systems P.-A. Hsiung, T.-Y. Lee, J.-M. Fu and W.-B. See 899 The evaluation of two software watermarking algorithms G. Myles, C. Collberg, Z. Heidepriem and A. Navabi 923 MobileRMI: upgrading Java Remote Method Invocation towards mobility M. Avvenuti and A. Vecchio 939 Unifying program slicing and concept assignment for higher-level executable source code extraction N. E. Gold, M. Harman, D. Binkley and R. M. Hierons.................e.e.e 0eee e 977 Volume 35 Number 11 September 2005 Generating high quality printouts from content management systems: a cost-effective approach M. J. Ferndndez-Iglesias, L. M. Alvarez-Sabucedo, C. Lojo-Silva and L. E. Anido-Rif6n VOLUME CONTENTS Programming the data path in network processor-based routers M. E. Kounavis, A. T. Campbell, S. T. Chou and J. Vicente lmbench: an extensible micro-benchmark suite C. Staelin Volume 35 Number 12 October 2005 LZgrep: a Boyer—Moore string matching tool for Ziv-Lempel compressed text G. Navarro and J. Tarhio A middleware-transparent approach to developing distributed applications S. Ghosh, R. B. France, D. M. Simmonds, A. Bare, B. Kamalakar, R. P. Shankar, G. Tandon, P. Vile and S. Yin Building extensible routers using network processors N. Shalaby, A. Bavier, Y. Gottlieb, S. Karlin, L. Peterson, X. Qie, T. Spalink and M. Wawrzoniak SchedSP: a Grid-based application service provider of scheduling solutions 5, Seay Fs PMU EE, BONN Sib. a ca .noads dene habeadaasyacenness@uaaccaaes Volume 35 Number 13 10 November 2005 A comparison of BWT approaches to string pattern matching A. Firth, T. Bell, A. Mukherjee and D. Adjeroh Validation of dynamic Web pages generated by an embedded scripting language R. G. Stone Lessons learned from programmers’ experiences with one-way constraints B. T. Vander Zanden, R. Halterman, B. A. Myers, R. Miller, P. Szekely, D. A. Giuse, D. Kosbie and R. McDaniel The effect of multiple reference characters on detecting matches in string-searching algorithms M. M. Mhashi 1299 Volume 35 Number 14 25 November 2005 A comparison between handwritten and automatic generation of C code from SDL using static analysis M. Becucci, A. Fantechi, M. Giromini and E. Spinicci Automatic adaptation of mobile applications to different user devices using modular mobile agents T.-H. Kao and S.-M. Yuan GLAL: An OpenGL Arabization Library A. S. Al-Salman and F. Al-Qahtani VOLUME CONTENTS Volume 35 Number 15 December 2005 Visual programming support for graph-oriented parallel/distributed processing F. Chan, J. Cao, A. T. S. Chan and K. Zhang A software methodology for applied research: eXtreme Researching O. Chirouze, D. Cleary and G. G. Mitchell Revisiting dictionary-based compression Pp; Beeman, S. Grabowski and S. TOGOWICZ «.. ow. ccc cdc ccccccssccnescuseesaus Interpreting computer code in a computer-based learning system for novice programmers I. Milne and G. Rowe Author Index Key Word Index Volume Contents Indexed or abstracted by ‘ANTE: Abstracts in New Technologies & Engineering (CIG)’, ‘Applied Science & Technology Index & Abstracts (HW Wilson)’, ‘Cambridge Scientific Abstracts (CIG)’, “COMPENDEX (Elsevier)’, “CompuMath Citation Index (Thomson IS{)’, “COMPUSCIENCE Database (Fiz Karlsruhe)’, ‘Computer Abstracts International Database (EMERALD)’, ‘Computer Science Index (EBSCO)’, ‘Computing Reviews (ACM)’, ‘Current Contents(®)/Engineering, Computing & Technology (Thomson ISI)’, ‘Information Science Abstracts (Kluwer)’, ‘INSPEC (IEE)’, ‘Science Citation Index Expanded!™ (Thomson ISI)’, ‘SCOPUS (Elsevier)’, “Zentralblatt Math/Mathematics Abstracts’. # WILEY This journal is online InterS@ience’ www.interscience.wiley.com fe ge peed

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.