[1]
W. Li, L.-C. Lam, and T.-C. Chiueh. Accurate application-specific sandboxing for Win32/Intel binaries. In IAS 2007: 3rd Internationl Symposium on Information Assurance and Security, pages 375–380, 2007. (doi:10.1109/IAS.2007.86)
[2]
C. Wu, S. Zhou, L. Wei, J. Luo, Y. Wang, and X. Yang. A new k-graph partition algorithm for distributed P2P simulation systems. In Algorithms and Architectures for Parallel Processing: 7th International Conference, ICA3PP, pages 391–402, 2007. Lecture Notes in Computer Science 4494. (doi:10.1007/978-3-540-72905-1_35)
[3]
A. Ng, H. Grimm, T. Lezama, A. Persson, M. Andersson, and M. Jägstam. Web services for metamodel-assisted parallel simulation optimization. In International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, pages 879–885, 2007.
[4]
R. Su, J.J. Lukkien, and M.R.V. Chaudron. Language-based access control approach for component-based software applications. IET Software, 1(5):206–216, 2007. (doi:10.1049/iet-sen:20070026)
[5]
N. Lu, P.M.C. Swatman, and S. Perreau. Sustainable agriculture mobile commerce (SamCom) - extending the rural grocery supply chain through m-commerce. In IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2007. (doi:10.1109/TENCON.2005.301236)
[6]
Junguo Li, Gang Huang, Jian Zou, and Hong Mei. Failure analysis of open source j2ee application servers. In QSIC '07: Seventh International Conference on Quality Software, pages 198–208, October 2007. (doi:10.1109/QSIC.2007.4385496)
[7]
O. De Moor, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, D. Sereni, and J. Tibble. Keynote address: QL for source code analysis. In SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation, pages 3–14, 2007. (doi:10.1109/SCAM.2007.31)
[8]
D.N. Da Hora, D.F. Macedo, J.M.S. Nogueira, and G. Pujolle. Optimizing peer-to-peer content discovery over wireless mobile ad hoc networks. In Proceedings of the 9th International Conference on Mobile and Wireless Communications Networks, MWCN'07, pages 6–10, 2007. (doi:10.1109/ICMWCN.2007.4668170)
[9]
Oege de Moor, Mathieu Verbaere, Elnar Hajiyev, Pavel Avgustinov, Torbjorn Ekman, Neil Ongkingco, Damien Sereni, and Julian Tibble. Keynote address: .QL for source code analysis. In Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pages 3–16, Los Alamitos, CA, USA, 2007. IEEE Computer Society. (doi:10.1109/SCAM.2007.13)
[10]
F. De Rango, F. Veltri, M. Tropea, A.-F. Santamaria, P. Fazio, A. Malfitano, and S. Marano. Interdisciplinary issues for the management of next generation autonomic wireless systems: Nature-inspired techniques and organic computing. International Journal of Mobile Network Design and Innovation, 2(3-4):141–152, 2007. (doi:10.1504/IJMNDI.2007.017318)
[11]
F. Al-Nayadi and J.H. Abawajy. An authentication framework for e-health systems. In ISSPIT 2007 — 2007 IEEE International Symposium on Signal Processing and Information Technology, pages 616–620, 2007. (doi:10.1109/ISSPIT.2007.4458207)
[12]
Z. Shi, , and H. Zhang. Time self-decay trust management algorithm for P2P computing security. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 44(1):1–10, 2007. (doi:10.1360/crad20070101)
[13]
Y. Mei, X. Dong, W. Wu, S. Guan, and J. Li. SDRD: A novel approach to resource discovery in grid environments. In Advanced Parallel Processing Technologies, pages 301–312. Springer Verlag, 2007. Lecture Notes in Computer Science 4847. (doi:10.1007/978-3-540-76837-1_34)
[14]
E. Ras, R. Carbon, B. Decker, and J. Rech. Experience management wikis for reflective practice in software capstone projects. IEEE Transactions on Education, 50(4):312–320, 2007. (doi:10.1109/TE.2007.904580)
[15]
R. Bye, K. Luther, S.A. Çamtepe, T. Alpcan, Ş. Albayrak, and B. Yener. Decentralized detector generation in cooperative intrusion detection systems. In Stabilization, Safety, and Security of Distributed Systems, pages 37–51. Springer Verlag, 2007. Lecture Notes in Computer Science 4838. (doi:10.1007/978-3-540-76627-8_6)
[16]
K. Ven, J. Verelst, and H. Mannaert. On the relationship between commoditization and open source software. In 12th International Conference of the Association Information and Management 2007, AIM 2007, 2007.
[17]
M. Mor, R. Mordinyi, and J. Riemer. Using space-based computing for more efficient group coordination and monitoring in an event-based work management system. In Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007, pages 1116–1123, 2007. (doi:10.1109/ARES.2007.158)
[18]
C.-L. Yeh, J.-F. Yu, and W.-C. Chen. Knowledge sharing and business matching in advertising and public relations services using semantic peer technology. In Proceedings of the International Conference on Electronic Business (ICEB), pages 352–358, 2007.
[19]
Y.-C. Lin, L.-S. Li, and C.-C. Haung. A p2p file discovery scheme in nemo. In IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference, pages 499–504, 2007. (doi:10.1145/1280940.1281047)
[20]
J.-M. Lin, Z.-W. Hong, G.-M. Fang, and C.-T. Lee. A style for integrating MS-windows software applications to client-server systems using Java technology. Software — Practice and Experience, 37(4):417–440, 2007. (doi:10.1002/spe.775)
[21]
J.-H. Kim, G.S. Choi, and C.R. Das. An SSL back-end forwarding scheme in cluster-based web servers. IEEE Transactions on Parallel and Distributed Systems, 18(7):946–957, 2007. (doi:10.1109/TPDS.2007.1062)
[22]
S.-W. Lee, R.A. Gandhi, and G.-J. Ahn. Certification process artifacts defined as measurable units for software assurance. Software Process Improvement and Practice, 12(2):165–189, 2007. (doi:10.1002/spip.313)
[23]
D.J. Kim, K.-B. Yue, and T.A. Yang. Information assurance in B2C e-commerce transactions: A process-oriented framework and empirical analysis of websites using semantic networks. In Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights, volume 2, pages 1335–1345, 2007.
[24]
Y.M. Lee, J.B. Kim, I.W. Choi, and S.Y. Rhew. A study on selection process of open source software. In ALPIT 2007: 6th International Conference on Advanced Language Processing and Web Information Technology, pages 568–571, 2007. (doi:10.1109/ALPIT.2007.83)
[25]
D.G. Lee, D.I. Fels, and J.P. Udo. Emotive captioning. Computers in Entertainment, 5(2):1281344:1–1281344:15, 2007. (doi:10.1145/1279540.1279551)
[26]
H. Tao and D. He. Normal forms and normalization of authentication protocols. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006, volume 2, pages 1363–1366, 2007. (doi:10.1109/ICCIAS.2006.295282)
[27]
Y.-C. Lin and L.-S. Li. Nemo based P2P file discovery scheme. In Mobility Conference 2007 - The 4th Int. Conf. Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st Int. Symp. Computer Human Interaction in Mobile Technology, IS-CHI 2007, pages 145–150, 2007. (doi:10.1145/1378063.1378088)
[28]
D.H.-L. Goh and P.K. Ng. Link decay in leading information science journals. Journal of the American Society for Information Science and Technology, 58(1):15–24, 2007. (doi:10.1002/asi.20513)
[29]
F. Liu and Y. Ding. Ecological network-inspired trust management model of p2p networks. In 2nd Workshop on Digital Media and its Application in Museum and Heritage, DMAMH 2007, pages 297–302, 2007. (doi:10.1109/DMAMH.2007.4414570)
[30]
J.B. Kim and S.Y. Rhew. Reuse procedure for open-source software. In Parallel Computational Fluid Dynamics 2006, pages 155–164. Elsevier Ltd, 2007. (doi:10.1016/B978-044453035-6/50022-5)
[31]
J. Bar-Ilan and B.C. Peritz. The lifespan of "informetrics" on the web: An eight year study (1998-2006). In 11th International Conference of the International Society for Scientometrics and Informetrics, ISSI 2007, pages 52–62. Spanish Research Council, 2007.
[32]
T. Van Woensel and N. Vandaele. Modeling traffic flows with queueing models: A review. Asia-Pacific Journal of Operational Research, 24(4):435–461, 2007. (doi:10.1142/S0217595907001383)
[33]
E. Van Ruitenbeek, T. Courtney, W.H. Sanders, and F. Stevens. Quantifying the effectiveness of mobile phone virus response mechanisms. In Proceedings of the International Conference on Dependable Systems and Networks, pages 790–799, 2007. (doi:10.1109/DSN.2007.78)
[34]
R. Wang, X. Yu, Y. Li, and Z. Gao. Ontology partition method for semantic query routing. In IPC 2007: 2007 International Conference on Intelligent Pervasive Computing, pages 86–89, 2007. (doi:10.1109/IPC.2007.87)
[35]
W. Chen, J. Li, J. Ma, R. Conradi, J. Ji, and C. Liu. A survey of software development with open source components in Chinese software industry. In Software Process Dynamics and Agility, pages 208–220. Springer Verlag, 2007. Lecture Notes in Computer Science 4470. (doi:10.1007/978-3-540-72426-1_18)
[36]
C. Park, K. Kim, J. Lee, and P. Kim. Improved CAN routing using additional neighbors. In International Conference on Advanced Communication Technology, ICACT, volume 2, pages 1457–1461, 2007. (doi:10.1109/ICACT.2007.358630)
[37]
Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-based attestation for node compromise detection in sensor networks. In Proceedings of the IEEE Symposium on Reliable Distributed Systems, pages 219–228, 2007. (doi:10.1109/SRDS.2007.4365698)
[38]
E. Byun, S. Choi, C. Hwang, and S. Lee. Survey on reputation management systems in p2p network. In Proceedings of The 2007 International Conference on Security and Management, SAM'07, pages 358–364, 2007.
[39]
M. Popa, A.S. Popa, and H. Ciocarlie. Mobile telephony with pocket PCs phone edition. WSEAS Transactions on Communications, 6(1):146–153, 2007.
[40]
S. Wang, Y. Zhang, and W. Wang. Reliable self-clustering P2P overlay networks. In International Computer Software and Applications Conference, volume 1, pages 105–108, 2007. (doi:10.1109/COMPSAC.2007.178)
[41]
J. Zhou, X. Zhang, L. Bhuyan, and B. Liu. Clustered K-center: Effective replica placement in peer-to-peer systems. In GLOBECOM: IEEE Global Telecommunications Conference, pages 2008–2013, 2007. (doi:10.1109/GLOCOM.2007.385)
[42]
I. Díaz, J. Touriño, and R. Doallo. Towards low-latency model-oriented distributed systems management. In Managing Next Generation Networks and Services, pages 41–50. Springer Verlag, 2007. Lecture Notes in Computer Science 4773. (doi:10.1007/978-3-540-75476-3_5)
[43]
L. Swan, A.S. Taylor, S. Izadi, and R. Harper. Containing family clutter. IFIP International Federation for Information Processing, 241:171–184, 2007. (doi:10.1007/978-0-387-73697-6_13)
[44]
M. Hepp, K. Siorpaes, and D. Bachlechner. Harvesting Wiki consensus: Using Wikipedia entries as vocabulary for knowledge management. IEEE Internet Computing, 11(5):54–65, September/October 2007. (doi:10.1109/MIC.2007.110)
[45]
M.-O. Choi, I.-W. Lee, S.-O. Lee, and H.-J. Park. A design and implementation of the contents sharing service on the peer-to-peer based virtual home platform. In International Conference on Advanced Communication Technology, ICACT, volume 3, pages 1853–1856, 2007. (doi:10.1109/ICACT.2007.358731)
[46]
J.S. Park, G. An, and D. Chandra. Trusted P2P computing environments with role-based access control. IET Information Security, 1(1):27–35, 2007. (doi:10.1049/iet-ifs:20060084)
[47]
W.J. Sung, J.H. Kim, and S.Y. Rhew. A quality model for open source software selection. In ALPIT 2007: 6th International Conference on Advanced Language Processing and Web Information Technology, pages 515–519, 2007. (doi:10.1109/ALPIT.2007.81)
[48]
Z. Yang and H. Ma. A game-based mechanism for avoiding routing hotspot in P2P streaming distribution. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, pages 2166–2169, 2007.
[49]
J.-C. Park and G. Yu. Securing overlay activities of peers in unstructured P2P networks. In Computational Intelligence and Security, pages 795–805. Springer Verlag, 2007. Lecture Notes in Computer Science 4456. (doi:10.1007/978-3-540-74377-4_83)
[50]
J.-C. Park and G. Yu. Securing overlay activities of peers in unstructured P2P networks. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006, volume 2, pages 1105–1108, 2007. (doi:10.1109/ICCIAS.2006.295433)
[51]
W. Wang and G. Zeng. Self-organization resource topology revolution based on trust mechanism. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 44(11):1849–1856, 2007. (doi:10.1360/crad20071106)
[52]
W. Wang and G. Zeng. AntRep: A swarm intelligence based trust model in P2P networks. Journal of Universal Computer Science, 13(7):1164–1174, 2007.
[53]
J. Chen and P. Cheng. A new multi-agent approach to adaptive e-education. 7th IFIP International Conference on e-Business, e-Services, and e-Society, I3E 2007, 252 VOLUME 2:404–411, 2007.
[54]
P. Kaur and H. Singh. Comparative analysis of automated version control tools. In International Conference on Software Engineering Theory and Practice 2007, SETP 2007, pages 106–111, 2007.
[55]
B. Rood and M.J. Lewis. Multi-state grid resource availability characterization. In IEEE/ACM International Workshop on Grid Computing, pages 42–49, 2007. (doi:10.1109/GRID.2007.4354114)
[56]
F.P. Deek and J.A.M. McHugh. Open source: Technology and policy. Cambridge University Press, 2007. (doi:10.1017/CBO9780511619526)
[57]
An Feng and Frank Minjarez. Enforcing data protection legislation in web data services. United States Patent 7,207,067, April 2007. Assignee: AOL LLC (Dulles, VA).
[58]
Ha Manh Tran and Jürgen Schönwälder. Distributed case-based reasoning for fault management. In Arosha K. Bandara and Mark Burgess, editors, Inter-Domain Management — First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, pages 200–203. Springer-Verlag, June 2007. Lecture Notes in Computer Science 4543. (doi:10.1007/978-3-540-72986-0_25)
[59]
Éric Filiol. Sciences à risque: Virus. Les Dossiers de la Recherche, 26:82–85, February 2007.
[60]
Y. Zhang, H. Shi, X. Wang, and J. Zhang. Collaborative legal information sharing on P2P network. In Proceedings - 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pages 41–47, 2007. (doi:10.1109/ICNPCW.2007.4351458)
[61]
A. Abada, L. Cui, C. Huang, and H.-H. Chen. A novel path selection and recovery mechanism for manets p2p file sharing applications. In IEEE Wireless Communications and Networking Conference, WCNC, pages 3475–3480, 2007. (doi:10.1109/WCNC.2007.637)
[62]
N. Singh, C. Gibbs, and Y. Coady. C-CLR: A tool for navigating highly configurable system software. In ACP4IS '07: Proceedings of the 6th workshop on Aspects, components, and patterns for infrastructure software, 2007. ACM International Conference Proceeding Series Volume 219. (doi:10.1145/1233901.1233910)
[63]
A. Löser, S. Staab, and C. Tempich. Semantic social overlay networks. IEEE Journal on Selected Areas in Communications, 25(1):5–14, 2007. (doi:10.1109/JSAC.2007.070102)
[64]
M. Yiduo, D. Xiaoshe, L. Junyang, X. Jing, and X. Zhenghua. Rapid and automated deployment of monitoring services in grid environments. In Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007, pages 328–335, 2007. (doi:10.1109/APSCC.2007.4414478)
[65]
T. Omari, S. Derisavi, and G. Franks. Deriving distribution of thread service time in layered queueing networks. In Proceedings of the 6th International Workshop on Software and Performance, WOPS'07, pages 66–77, 2007. (doi:10.1145/1216993.1217007)
[66]
T. Omari, S. Derisavi, G. Franks, and M. Woodside. Performance modeling of a quorum pattern in layered service systems. In 4th International Conference on the Quantitative Evaluation of Systems, QEST 2007, pages 201–210, 2007. (doi:10.1109/QEST.2007.31)
[67]
A. Belli, M. Geymonat, M. Perrero, R. Simeoni, and M. Badella. DynamicTV: The long tail applied to broadband-broadcast integration. In Interactive Digital Television: Technologies and Applications, pages 1–17. IGI Global, 2007. (doi:10.4018/978-1-59904-361-6.ch001)
[68]
C.-Y. Zheng, X. Wang, J. Zhao, and X.-Y. Xue. P2P video-on-demand content distribution schemes. Ruan Jian Xue Bao/Journal of Software, 18(11):2942–2954, 2007. (doi:10.1360/jos182942)
[69]
T.-Y. Chung, Y.-H. Chang, C.-Y. Liu, and Y.-M. Chen. SSIF: Stable self-organized infrastructure-based peer-to-peer network. In International Conference on Advanced Communication Technology, ICACT, volume 2, pages 1441–1446, 2007. (doi:10.1109/ICACT.2007.358627)
[70]
A.Q. Jaber, R. Ramli, and Y. Hidehiko. Genetic algorithms for buffer size and work stations capacity in serial-parallel production lines. In Proceedings of the 12th International Symposium on Artificial Life and Robotis, AROB 12th'07, pages 513–516, 2007.
[71]
Beat Fluri, Michael Würsch, and Harald Gall. Do code and comments co-evolve? on the relation between source code and comment changes. In 14th Working Conference on Reverse Engineering (WCRE 2007), pages 70–79, 2007. (doi:10.1109/WCRE.2007.21)
[72]
Yassir K. Elley, Anne H. Anderson, Stephen R. Hanna, Sean J. Mullan, and Radia J. Perlman. Method and system for proving membership in a nested group using chains of credentials. United States Patent 7,213,262, May 2007. Assignee: Sun Microsystems, Inc. (Santa Clara, CA).
[73]
H. Zhuge and X. Li. RSM-based gossip on P2P network. In Algorithms and Architectures for Parallel Processing: 7th International Conference, ICA3PP, pages 1–12, 2007. Lecture Notes in Computer Science 4494. (doi:10.1007/978-3-540-72905-1_1)
[74]
H. Zhuge and X. Li. Peer-to-peer in metric space and semantic space. IEEE Transactions on Knowledge and Data Engineering, 19(6):759–771, 2007. (doi:10.1109/TKDE.2007.190614)
[75]
H. Zhang and H. Su. A collaborative system for software engineering education. In International Computer Software and Applications Conference, volume 2, pages 313–318, 2007. (doi:10.1109/COMPSAC.2007.10)
[76]
S.A. Ajila and D. Wu. Empirical study of the effects of open source adoption on software development economics. Journal of Systems and Software, 80(9):1517–1529, 2007. (doi:10.1016/j.jss.2007.01.011)
[77]
D.C. Verma and A. Stanford-Clark. Simulation of sensor networks using message queue infrastructure. In Edward M. Carapezza, editor, Proceedings of SPIE — Volume 6562 – The International Society for Optical Engineering, 2007. (doi:10.1117/12.724960)
[78]
H. Okada and M. Inoue. Evaluation of P2P information recommendation based on collaborative filtering. In Human-Computer Interaction. HCI Intelligent Multimodal Interaction Environments, pages 449–458. Springer Verlag, 2007. Lecture Notes in Computer Science 4552. (doi:10.1007/978-3-540-73110-8_48)
[79]
W. Maass and M. Lampe. Integration of standardized and non-standardized product data. In INFORMATIK 2007 - Informatik Trifft Logistik, Beitrage der 37. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1, pages 141–146, 2007.
[80]
W. Maass and S. Janzen. Dynamic product interfaces: A key element for ambient shopping environments. In 20th Bled eConference - eMergence: Merging and Emerging Technologies, Processes, and Institutions, pages 457–470. Bled eCommerce Conference, 2007.
[81]
Stan Kelly-Bootle. Ode or code? — programmers be mused. ACM Queue, 5(3):48–52, April 2007. (doi:10.1145/1242489.1242508)
[82]
E. Costa-Montenegro, J.C. Burguillo-Rial, F.J. Gonzalez-Castano, and J. Vales-Alonso. Agent-controlled sharing of distributed resources in user networks. In Computational Intelligence for Agent-based Systems, pages 29–60. Springer Verlag, 2007. Studies in Computational Intelligence 72. (doi:10.1007/978-3-540-73177-1_2)
[83]
K. Luther, R. Bye, T. Alpcan, A. Müller, and Ş. Albayrak. A cooperative AIS framework for intrusion detection. In IEEE International Conference on Communications, pages 1409–1416, 2007. (doi:10.1109/ICC.2007.237)
[84]
G. Robles, S. Dueñas, and J.M. Gonzalez-Barahona. Corporate involvement of libre software: Study of presence in Debian code over time. In Open Source Development, Adoption and Innovation, volume 234, pages 121–132. Springer Verlag, 2007. IFIP International Federation for Information Processing Volume 234. (doi:10.1007/978-0-387-72486-7_10)
[85]
M. Brogle, D. Milic, and T. Braun. Supporting IP multicast streaming using overlay networks. In 4th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops, QSHINE '07, 2007. (doi:10.1145/1577222.1577289)
[86]
F. Moraán, M. Preda, G. Lafruit, P. Villegas, and R.-P. Berretty. 3D game content distributed adaptation in heterogeneous environments. Eurasip Journal on Advances in Signal Processing, 2007. (doi:10.1155/2007/93027)
[87]
R. Hassan, A. Harris, N. Topham, and A. Efthymiou. Synthetic trace-driven simulation of cache memory. In Proceedings — 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, volume 2, pages 764–771, 2007. (doi:10.1109/AINAW.2007.345)
[88]
H. Orsila, T. Kangas, E. Salminen, T.D. Hämäläinen, and M. Hännikäinen. Automated memory-aware application distribution for multi-processor system-on-chips. Journal of Systems Architecture, 53(11):795–815, 2007. (doi:10.1016/j.sysarc.2007.01.013)
[89]
C. Abalde, V.M. Gulías, and L.M. Castro. Towards a decentralized and structured network of P2P public information screens. In Computer Aided Systems Theory — EUROCAST 2007, pages 217–224, 2007. Lecture Notes in Computer Science 4739. (doi:10.1007/978-3-540-75867-9_28)
[90]
C. Abalde, V.M. Gulías, and L.M. Castro. Extending the VoDKA architecture with P2P aggregated content management. In IEEE Symposium on Computers and Communications, pages 1085–1090, 2007. (doi:10.1109/ISCC.2007.4381510)
[91]
P. Alvaro, D.V. Ryaboy, and D. Agrawal. Towards scalable architectures for clickstream data warehousing. In Databases in Networked Information Systems, pages 154–177. Springer Verlag, 2007. Lecture Notes in Computer Science 4777. (doi:10.1007/978-3-540-75512-8_12)
[92]
V. Clincy, J. Garrido, and Y. Nzibo. A firewall simulation study. In 2007 International Conference on Communications in Computing, CIC 2007, pages 16–20, 2007.
[93]
O. Christ, C. Schroth, and T. Janner. A hybrid framework for automated and adaptive e-business platforms. In Proceedings of the 15th European Conference on Information Systems, ECIS 2007, pages 191–202, 2007.
[94]
C. Kaiser, C. Pajault, and J.-F. Pradat-Peyre. Modelling remote concurrency with ada case study of symmetric non-deterministic rendezvous. In Reliable Software Technologies — Ada Europe 2007, pages 192–207. Springer Verlag, 2007. Lecture Notes in Computer Science 4498. (doi:10.1007/978-3-540-73230-3_15)
[95]
C. Servin, M. Ceberio, E. Freudenthal, and S. Bistarelli. An optimization approach using soft constraints for the cascade vulnerability problem. In Annual Conference of the North American Fuzzy Information Processing Society — NAFIPS, pages 372–377, 2007. (doi:10.1109/NAFIPS.2007.383867)
[96]
A. Dolgui, A.V. Eremeev, and V.S. Sigaev. HBBA: Hybrid algorithm for buffer allocation in tandem production lines. Journal of Intelligent Manufacturing, 18(3):411–420, 2007. (doi:10.1007/s10845-007-0030-z)
[97]
A. Iftene, A. Balahur-Dobrescu, and D. Matei. A distributed architecture system for recognizing textual entailment. In 9th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2007, pages 219–226, 2007. (doi:10.1109/SYNASC.2007.11)
[98]
K. Komine, Y. Sawahata, N. Uratani, Y. Yoshida, and T. Inoue. Evaluation of a prototype remote control for digital broadcasting receivers by using semantic differential method. IEEE Transactions on Consumer Electronics, 53(2):561–568, 2007. (doi:10.1109/TCE.2007.381730)
[99]
M. Becker, K. Kuladinithi, A. Timm-Giel, and C. Görg. Historical development of the idea of self-organisation in information and communication technology. In Understanding Autonomous Cooperation and Control in Logistics: The Impact of Autonomy on Management, Information, Communication and Material Flow, pages 45–56. Springer Berlin Heidelberg, 2007. (doi:10.1007/978-3-540-47450-0_4)
[100]
M.L. Nelson, F. McCown, J.A. Smith, and M. Klein. Using the web infrastructure to preserve web pages. International Journal on Digital Libraries, 6(4):327–349, 2007. (doi:10.1007/s00799-007-0012-y)
[101]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. A multi-sender multicast algorithm for media streaming on peer-to-peer networks. Computer Communications, 30(10):2191–2200, 2007. (doi:10.1016/j.comcom.2007.05.008)
[102]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. Wavelet-based unbalanced un-equivalent multiple description coding for P2P networks. In 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, pages 242–247, 2007. (doi:10.1109/ICTMICC.2007.4448642)
[103]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. IPROMISE: Reliable multi-sender algorithm for peer-to-peer networks. In Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007, 2007. (doi:10.1109/COMSWA.2007.382553)
[104]
Jeremy Singer, Gavin Brown, Mikel Luján, and Ian Watson. Towards intelligent analysis techniques for object pretenuring. In PPPJ '07: Proceedings of the 5th international symposium on Principles and practice of programming in Java, pages 203–208, New York, NY, USA, 2007. ACM. (doi:10.1145/1294325.1294353)
[105]
Jeremy Singer, Gavin Brown, Ian Watson, and John Cavazos. Intelligent selection of application-specific garbage collectors. In ISMM '07: Proceedings of the 6th international symposium on Memory management, pages 91–102, New York, NY, USA, 2007. ACM. (doi:10.1145/1296907.1296920)
[106]
M. Lahiri and T.Y. Berger-Wolf. Structure prediction in temporal networks using frequent subgraphs. In Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, pages 35–42, March 2007. (doi:10.1109/CIDM.2007.368850)
[107]
J.C. Morris and C. Lüer. DistriWiki: a distributed peer-to-peer wiki network. In WikiSym '07: Proceedings of the 2007 international symposium on Wikis, pages 69–74, New York, NY, USA, 2007. ACM. (doi:10.1145/1296951.1296959)
[108]
J. Mishra and S. Ahuja. P2PCompute: A peer-to-peer computing system. In Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems, CTS, pages 169–176, 2007. (doi:10.1109/CTS.2007.4621754)
[109]
P. Campos and N.J. Nunes. Practitioner tools and workstyles for user-interface design. IEEE Software, 24(1):73–80, 2007. (doi:10.1109/MS.2007.24)
[110]
R. Hassan and A. Harris. A hybrid Markov model for accurate memory reference generation. In International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, pages 550–555, 2007.
[111]
E. Razina and D. Janzen. Effects of dependency injection on maintainability. In J. Smith, editor, Software Engineering and Application, pages 91–102. Acta Press, 2007.
[112]
K. Yousef and E. O'Neill. Sunrise: Towards location based clustering for assisted photo management. In ICMI'07: Workshop on Tagging, Mining and Retrieval of Human-Related Activity Information, TMR'07 - Workshop Proceedings, pages 47–54, 2007.
[113]
F. Stäber and J. P. Müller. Evaluating peer-to-peer for loosely coupled business collaboration: A case study. In Business Process Management, pages 141–148. Springer Verlag, 2007. Lecture Notes in Computer Science 4714. (doi:10.1007/978-3-540-75183-0_11)
[114]
H.M. Kienle and H.A. Müller. A lightweight taxonomy to characterize component-based systems. In Proceedings — ICCBSS 2007: Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, pages 193–201, 2007. (doi:10.1109/ICCBSS.2007.2)
[115]
B. Fabian and O. Günther. Distributed ONS and its impact on privacy. In IEEE International Conference on Communications, pages 1223–1228, 2007. (doi:10.1109/ICC.2007.207)
[116]
A. Sutton and J.I. Maletic. How we manage portability and configuration with the C preprocessor. In IEEE International Conference on Software Maintenance, ICSM, pages 275–284, 2007. (doi:10.1109/ICSM.2007.4362640)
[117]
M.-O. Junker and R. Luchian. Developing web databases for aboriginal language preservation. Literary and Linguistic Computing, 22(2):187–206, 2007. (doi:10.1093/llc/fql049)
[118]
J. Bitzer and P.J.H. Schröder. Open source software, competition and innovation. Industry and Innovation, 14(5):461–476, 2007. (doi:10.1080/13662710701711315)
[119]
Nikolaos Doukas and Antonios Andreatos. Advancing electronic assessment. International Journal of Computers, Communications & Control, 2(1):56–65, 2007.
[120]
Jr. Romano, N.C. and J. Fjermestad. Privacy and security in the age of electronic customer relationship management. International Journal of Information Security and Privacy (IJISP), 1(1):65–86, 2007. (doi:10.4018/jisp.2007010105)
[121]
M. Virvou and A. Savvopoulos. An intelligent TV-shopping application that provides recommendations. In International Conference on Tools with Artificial Intelligence, ICTAI, volume 1, pages 366–373, 2007. (doi:10.1109/ICTAI.2007.26)
[122]
J. García-Vidal, M. Guerrero-Zapata, J. Morillo-Pozo, and D. Fusté-Vilella. A protocol stack for cooperative wireless networks. In Wireless Systems and Mobility in Next Generation Internet, pages 62–72. Springer Verlag, 2007. Lecture Notes in Computer Science 4396. (doi:10.1007/978-3-540-70969-5_5)
[123]
H. Cho. An update propagation algorithm for P2P file sharing over wireless mobile networks. In Computational Science — ICCS 2007, volume PART 4, pages 753–760. Springer Verlag, 2007. Lecture Notes in Computer Science 4490. (doi:10.1007/978-3-540-72590-9_113)
[124]
S. Qingwei, Z. Zheng, and B. Hu. A density-based approach to node clustering in decentralized peerto-peer networks. In Proceedings of SPIE – The International Society for Optical Engineering, volume 6773, 2007. (doi:10.1117/12.749683)
[125]
P. Bellini, I. Bruno, D. Cenni, P. Nesi, and D. Rogai. P2P architecture for automated B2B cross media content distribution. In 3rd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2007, pages 105–112, 2007. (doi:10.1109/AXMEDIS.2007.31)
[126]
L. Xiaoyun, H. Tiejun, H. Longshe, and M. Luntian. A DRM architecture for manageable P2P based IPTV system. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, pages 899–902, 2007.
[127]
D. Aronsky, S. Madani, R.J. Carnevale, S. Duda, and M.T. Feyder. The prevalence and inaccessibility of internet references in the biomedical literature at the time of publication. Journal of the American Medical Informatics Association, 14(2):232–234, 2007. (doi:10.1197/jamia.M2243)
[128]
T. Thireou, G. Spyrou, and V. Atlamazoglou. A survey of the availability of primary bioinformatics web resources. Genomics, Proteomics and Bioinformatics, 5(1):70–76, 2007. (doi:10.1016/S1672-0229(07)60017-5)
[129]
T. Koskela, N. Kostamo, O. Kassinen, J. Ohtonen, and M. Ylianttila. Towards context-aware mobile web 2.0 service architecture. In Proceedings - International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2007, pages 41–48, 2007. (doi:10.1109/UBICOMM.2007.15)
[130]
L. Grunske, P. Lindsay, E. Bondarev, Y. Papadopoulos, and D. Parker. An outline of an architecture-based method for optimizing dependability attributes of software-intensive systems. Lecture Notes in Computer Science, 4615:188–209, 2007.
[131]
N. Viorres, P. Xenofon, M. Stavrakis, E. Vlachogiannis, P. Koutsabasis, and J. Darzentas. Major HCI challenges for open source software adoption and development. In Online Communities and Social Computing, pages 455–464. Springer Verlag, 2007. Lecture Notes in Computer Science 4564. (doi:10.1007/978-3-540-73257-0_50)
[132]
S. Castano, A. Ferrara, and S. Montanelli. P2P routing-by-content on a lightweight community basis. In On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, pages 477–486, 2007. Lecture Notes in Computer Science 4805. (doi:10.1007/978-3-540-76888-3_70)
[133]
L. Baillie, P. Fröhlich, and R. Schatz. Exploring social TV. In Proceedings of the International Conference on Information Technology Interfaces, ITI, pages 215–220, 2007. (doi:10.1109/ITI.2007.4283773)
[134]
G. Schiele, R. Süselbeck, A. Wacker, J. Hähner, C. Becker, and T. Weis. Requirements of peer-to-peer-based massively multiplayer online gaming. In Proceedings — Seventh IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2007, pages 773–778, 2007. (doi:10.1109/CCGRID.2007.97)
[135]
V. Issarny, M. Caporuscio, and N. Georgantas. A perspective on the future of middleware-based software engineering. In FoSE 2007: Future of Software Engineering, pages 244–258, 2007. (doi:10.1109/FOSE.2007.2)
[136]
J. Rybicki, B. Scheuermann, W. Kiess, C. Lochert, P. Fallahi, and M. Mauve. Challenge: Peers on wheels — a road to new traffic information systems. In Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pages 215–221, 2007. (doi:10.1145/1287853.1287879)
[137]
H.B. Ribeiro, L.C. Lung, A.O. Santin, and N.L. Brisóla. Web2Peer: A peer-to-peer infrastructure for publishing/locating/replicating web pages on internet. In Proceedings — Eighth International Symposium on Autonomous Decentralized Systems, ISADS 2007, pages 421–428, 2007. (doi:10.1109/ISADS.2007.79)
[138]
H.B. Ribeiro, L.C. Lung, A.O. Santin, and N.L. Brisola. Implementing a peer-to-peer web browser for publishing and searching web pages on internet. In Proceedings — International Conference on Advanced Information Networking and Applications, AINA, pages 754–761, 2007. (doi:10.1109/AINA.2007.79)
[139]
J.A. Qudeiri, H. Yamamoto, and M. Jamali. Development of new production simulator for complex production systems design. In 37th International Conference on Computers and Industrial Engineering 2007, volume 2, pages 1521–1531, 2007.
[140]
L.P. Gaspary, M.P. Barcellos, A. Detsch, and R.S. Antunes. Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing. Computer Networks, 51(17):4797–4815, 2007. (doi:10.1016/j.comnet.2007.07.005)
[141]
J.E.A. Qudeiri, M.A. Jamali, and H. Yamamoto. Buffer size decision for the flexible transfer line with rework paths using genetic algorithms. In Proceedings — ICSSSM'06: 2006 International Conference on Service Systems and Service Management, pages 210–215, 2007. (doi:10.1109/ICSSSM.2006.320614)
[142]
B. Lagesse and M. Kumar. UBCA: Utility-based clustering architecture for peer-to-peer systems. In Proceedings — International Conference on Distributed Computing Systems, 2007. (doi:10.1109/ICDCSW.2007.86)
[143]
M. Yoshida and K. Sakamoto. Code migration control in large scale loosely coupled distributed systems. In Mobility Conference 2007 - The 4th Int. Conf. Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st Int. Symp. Computer Human Interaction in Mobile Technology, IS-CHI 2007, pages 32–38, 2007. (doi:10.1145/1378063.1378069)
[144]
S. Gadanho and N. Lhuillier. Addressing uncertainty in implicit preferences. In RecSys'07: Proceedings of the 2007 ACM Conference on Recommender Systems, pages 9–16, 2007. (doi:10.1145/1297231.1297248)
[145]
Siavash Mirarab and Ladan Tahvildari. A prioritization approach for software test cases based on Bayesian networks. In Fundamental Approaches to Software Engineering, pages 276–290. Springer Verlag, 2007. Lecture Notes in Computer Science 4422. (doi:10.1007/978-3-540-71289-3_22)
[146]
C. Bock. Model-driven HMI development: Can meta-CASE tools do the job? In Proceedings of the Annual Hawaii International Conference on System Sciences, 2007. (doi:10.1109/HICSS.2007.385)
[147]
R. Ando. Parallel analysis of polymorphic viral code using automated deduction system. In Proceedings — SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, volume 2, pages 585–592, 2007. (doi:10.1109/SNPD.2007.415)
[148]
M.H. Zack. The role of decision support systems in an indeterminate world. Decision Support Systems, 43(4):1664–1674, 2007. (doi:10.1016/j.dss.2006.09.003)
[149]
J.J. Jung. Semantic co-browsing system based on contextual synchronization on peer-to-peer environment. Computing and Informatics, 26(5):469–488, 2007.
[150]
Kent Beck. Implementation Patterns. Addison-Wesley, Boston, MA, 2007.
[151]
Sulayman K. Sowe. An Empirical Study of Knowledge Sharing in Free and Open Source Software Projects. PhD thesis, Aristotle University of Thessaloniki, 2007.
[152]
M. Kauhanen, C. Eaket, and R. Biddle. Patterns for story authoring tools. In EuroPLoP 2007 - 12th European Conferenceon Pattern Languages of Programs, pages 19–36, 2007.
[153]
A. Harriger, K. Lutes, and J. Purdum. Designing curricula to teach concepts and increase employability. In ASEE Annual Conference and Exposition, Conference Proceedings, page 11 pages, 2007.
[154]
S. Quenette, L. Moresi, P.D. Sunter, and B.F. Appelbe. Explaining StGermain: An aspect oriented environment for building extensible computational mechanics modeling software. In Proceedings — 21st International Parallel and Distributed Processing Symposium, IPDPS 2007, pages 1–8, 2007. (doi:10.1109/IPDPS.2007.370400)
[155]
F. Gortázar, M. Gallego, and A. Duarte. MetaCET: An object oriented tool for language design. In Proceedings of the International Multi-Conference on Computing in the Global Information Technology, ICCGI'06, 2007. (doi:10.1109/ICCGI.2006.49)
[156]
Y. Cardenas, J.-M. Pierson, and L. Brunie. Management of a cooperative cache in grids with grid cache services. Concurrency Computation Practice and Experience, 19(16):2141–2155, 2007. (doi:10.1002/cpe.1212)
[157]
R. Casallas, O. González, and N. López. Dealing with scalability in an event-based infrastructure to support global software development. In Trends in Enterprise Application Architecture, pages 100–111. Springer Verlag, 2007. Lecture Notes in Computer Science 4473. (doi:10.1007/978-3-540-75912-6_8)
[158]
K. Watanabe, Y. Nakajima, T. Enokido, and M. Takizawa. Ranking factors in peer-to-peer overlay networks. ACM Transactions on Autonomous and Adaptive Systems, 2(3), 2007. (doi:10.1145/1278460.1278465)
[159]
I. Carreras, D. Miorandi, and I. Chlamtac. From biology to evolve-able pervasive ICT systems. In Conference Proceedings — IEEE International Conference on Systems, Man and Cybernetics, pages 4075–4080, 2007. (doi:10.1109/ICSMC.2007.4414263)
[160]
K. Leibnitz, T. Hoßfeld, N. Wakamiya, and M. Murata. Peer-to-peer vs. client/server: Reliability and efficiency of a content distribution service. In Managing Traffic Performance in Converged Networks, pages 1161–1172. Springer Verlag, 2007. Lecture Notes in Computer Science 4516. (doi:10.1007/978-3-540-72990-7_99)
[161]
A. Chazapis, G. Tsoukalas, G. Verigakis, K. Kourtis, A. Sotiropoulos, and N. Koziris. Global-scale peer-to-peer file services with DFS. In IEEE/ACM International Workshop on Grid Computing, pages 251–258, 2007. (doi:10.1109/GRID.2007.4354140)
[162]
K. Watanabe, N. Hayashibara, and M. Takizawa. A superpeer-based two-layer P2P overlay network with the CBF strategy. In First International Conference on Complex, Intelligent and Software Intensive Systems, CISIS'07, pages 111–118, 2007. (doi:10.1109/CISIS.2007.8)
[163]
K. Watanabe, N. Hayashibara, and M. Takizawa. Performance analysis of the superpeer-based two-layer P2P overlay network with the CBF strategy. In Proceedings — International Conference on Distributed Computing Systems, 2007. (doi:10.1109/ICDCSW.2007.63)
[164]
A.S. Baumgart, H. Knapp, P. Suetterlin, and M. Schader. A profile-based peer-to-peer RSS information distribution. In 2007 2nd International Symposium on Wireless Pervasive Computing, pages 218–223, 2007. (doi:10.1109/ISWPC.2007.342604)
[165]
D.R. Campbell, S.J. Culley, C.A. McMahon, and F. Sellini. An approach for the capture of context-dependent document relationships extracted from Bayesian analysis of users' interactions with information. Information Retrieval, 10(2):115–141, 2007. (doi:10.1007/s10791-006-9016-2)
[166]
M.A. Johnston and J. Villà-Freixa. Enabling data sharing and collaboration in complex systems applications. In Distributed, High-Performance and Grid Computing in Computational Biology, pages 124–140. Springer Verlag, 2007. Lecture Notes in Computer Science 4360. (doi:10.1007/978-3-540-69968-2_10)
[167]
X. Bonnaire and O. Marin. Recursive replication: A survival solution for structured P2P information systems to denial of service attacks. In On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, pages 931–940, 2007. Lecture Notes in Computer Science 4806. (doi:10.1007/978-3-540-76890-6_19)
[168]
K. Sakamoto and M. Yoshida. Design and evaluation of large scale loosely coupled cluster-based distributed systems. In 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pages 572–577, 2007. (doi:10.1109/ICNPCW.2007.4351546)
[169]
H. Kokkinen and S. Moloney. Towards distributed service provisioning. In Proceedings - MUM 2007: 6th International Conference on Mobile and Ubiquitous Multimedia, volume 284, pages 69–73, 2007. (doi:10.1145/1329469.1329478)
[170]
C. Fragouli and E. Soljanin. Network coding applications. Foundations and Trends in Networking, 2(2):135–269, 2007. (doi:10.1561/1300000013)
[171]
I. Pavlović and D. Miklavćíc. Web-based electronic data collection system to support electrochemotherapy clinical trial. IEEE Transactions on Information Technology in Biomedicine, 11(2):222–230, 2007. (doi:10.1109/TITB.2006.879581)
[172]
M. Haigh. Downloading communism: File sharing as samizdat in ukraine. Libri, 57(3):165–178, 2007. (doi:10.1515/LIBR.2007.165)
[173]
D. Ch. Buser. Context-based recommender systems in conventional grocery - an economic analysis. In Proceedings of the Annual Hawaii International Conference on System Sciences, 2007. (doi:10.1109/HICSS.2007.147)
[174]
Fintan Clear. SMEs, electronically-mediated working and data security: cause for concern?. International Journal of Business Science and Applied Management, 2(2), 2007.
[175]
S. Abiteboul, I. Dar, R. Pop, G. Vasile, and D. Vodislav. EDOS distribution system: A P2P architecture for open-source content dissemination. In Open Source Development, Adoption and Innovation, pages 209–215. Springer Verlag, 2007. IFIP International Federation for Information Processing Volume 234. (doi:10.1007/978-0-387-72486-7_17)
[176]
S. Berkovsky, T. Kuflik, and F. Ricci. P2P case storage and retrieval with an unspecified ontology. Artificial Intelligence Review, 28(3):227–255, 2007. (doi:10.1007/s10462-009-9100-2)
[177]
T. Koulouris, G. Spanoudakis, and T. Tsigkritis. Towards a framework for dynamic verification of peer-to-peer systems. In Second International Conference on Internet and Web Applications and Services, ICIW'07, 2007. (doi:10.1109/ICIW.2007.63)
[178]
C.C. Marquezan, C.R.P.D. Santos, E.M. Salvador, M.J.B. Almeida, S.L. Cechin, and L.Z. Granville. Performance evaluation of notifications in a web services and P2P-based network management overlay. In International Computer Software and Applications Conference, volume 1, pages 241–248, 2007. (doi:10.1109/COMPSAC.2007.165)
[179]
Eva Magnusson, Torbjorn Ekman, and Gorel Hedin. Extending attribute grammars with collection attributes–evaluation and applications. In Source Code Analysis and Manipulation, 2007. SCAM 2007. Seventh IEEE International Working Conference on, pages 69–80, 2007. (doi:10.1109/SCAM.2007.4362899)
[180]
Horia Ciocarlie and Lavinia Simon. Definition of a high level language for real-time distributed systems programming. In EUROCON, 2007. The International Conference on "Computer as a Tool", pages 828–834, 2007. (doi:10.1109/EURCON.2007.4400651)
[181]
B. Mortazavi and G. Kesidis. Cumulative reputation systems for peer-to-peer content distribution. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings, pages 1546–1552, 2007. (doi:10.1109/CISS.2006.286385)
[182]
R.J. Carnevale and D. Aronsky. The life and death of urls in five biomedical informatics journals. International Journal of Medical Informatics, 76(4):269–273, 2007. (doi:10.1016/j.ijmedinf.2005.12.001)
[183]
M.V. Springett and R.N. Griffiths. Accessibility of interactive television for users with low vision: learning from the web. In Interactive TV: a Shared Experience — 5th European Conference, EuroITV 2007, pages 76–85, 2007. Lecture Notes in Computer Science 4471. (doi:10.1007/978-3-540-72559-6_9)
[184]
M.J. Fernández Iglesias, F. Rodrıguez González, and E. Medina Ferreiro. The multimedia center of galicia: A model of collaboration between the public and private sectors in e-learning development. Revista Iberoamericana de Tecnologias del Aprendizaje, 2(1):1–7, 2007.
[185]
C. Pheatt. An easy to use distributed computing framework. In SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education, pages 571–575, 2007. (doi:10.1145/1227310.1227500)
[186]
A. Zisman. A static verification framework for secure peer-to-peer applications. In Second International Conference on Internet and Web Applications and Services, ICIW'07, 2007. (doi:10.1109/ICIW.2007.11)
[187]
Ö. Ulusoy. Research issues in peer-to-peer data management. In 22nd International Symposium on Computer and Information Sciences, ISCIS 2007, pages 1–8, 2007. (doi:10.1109/ISCIS.2007.4456827)
[188]
E. Filiol. Formalisation and implementation aspects of k-ary (malicious) codes. Journal in Computer Virology, 3(2):75–86, 2007. (doi:10.1007/s11416-007-0044-2)
[189]
D.M. German. Using software distributions to understand the relationship among free and open source software projects. In Proceedings — ICSE 2007 Workshops: Fourth International Workshop on Mining Software Repositories, MSR 2007, 2007. (doi:10.1109/MSR.2007.32)
[190]
E. Papapetrou, E. Rova, A. Zarras, and P. Vassiliadis. Cross-layer networking for peer databases over wireless ad-hoc communities. In IEEE International Conference on Communications, pages 3443–3448, 2007. (doi:10.1109/ICC.2007.570)
[191]
G. Kakaletris, D. Varoutas, D. Katsianis, and T. Sphicopoulos. Design and implementation approaches for location-based, tourism-related services. In Information and Communication Technologies in Support of the Tourism Industry, pages 114–161. IGI Global, 2007. (doi:10.4018/978-1-59904-159-9.ch005)
[192]
P. Antonellis, D. Antoniou, Y. Kanellopoulos, C. Makris, E. Theodoridis, C. Tjortjis, and N.Tsirakis. A data mining methodology for evaluating maintainability according to ISO/IEC-9126 software engineering-product quality standard. In European Conference on Software Maintenance and Reengineering: Workshop on System Quality and Maintainability, 2007.
[193]
Nataraj Nagaratnam and Brian Keith Smith. Method, apparatus, and program for automated trust zone partitioning. United States Patent 7,272,714, September 2007. Assignee: International Business Machines Corporation (Armonk, NY).
[194]
J.P. Mulerikkal and I. Khalil. An architecture for distributed content delivery network. In ICON 2007 — Proceedings of the 2007 15th IEEE International Conference on Networks, pages 359–364, 2007. (doi:10.1109/ICON.2007.4444113)
[195]
E. Papapetrou and N. Pavlidou. A satellite-based architecture for internet P2P applications. In QShine 2007 Workshop: Satellite/Terrestrial Interworking, IWSTI '07, 2007.
[196]
G. Exarchakos and N. Antonopoulos. Resource sharing architecture for cooperative heterogeneous P2P overlays. Journal of Network and Systems Management, 15(3):311–334, 2007. (doi:10.1007/s10922-007-9069-6)
[197]
B. Skattør. Using contextual design to understand mobile work and design mobile services: A longitudinal case study. In 6th International Conference on Perspectives in Business Information Research, BIR 2007, pages 114–128. University of Tampere, 2007.
[198]
E. Hammami. Towards a peer-to-peer content discovery and delivery architecture for service provisioning. In Proceedings — ECUMN 2007: Fourth European Conference on Universal Multiservice Networks, pages 52–61, 2007. (doi:10.1109/ECUMN.2007.55)
[199]
L. Mannila. Novices' progress in introductory programming courses. Informatics in Education, 6(1):139–152, 2007.
[200]
T. Hopkins. Refactoring–does it improve software quality? ACM Computing Reviews, June 2007.
[201]
P. Kamthan. A perspective on software engineering education with open source software. In Handbook of Research on Open Source Software: Technological, Economic, and Social Perspectives, pages 690–702. IGI Global, 2007. (doi:10.4018/978-1-59140-999-1.ch054)
[202]
Pankaj Kamthan. On the prospects and concerns of integrating open source software environment in software engineering education. Journal of Information Technology Education, 6:45, April 2007.
[203]
Martin Karlsch. A model-driven framework for domain specific languages demonstrated on a test automation language. Master's thesis, Hasso-Plattner-Institute of Software Systems Engineering, Potsdam, Germany, January 2007.
[204]
T. Haenselmann, T. King, M. Busse, W. Effelsberg, and M. Fuchs. Scriptable sensor network based home-automation. In Emerging Directions in Embedded and Ubiquitous Computing, pages 579–591. Springer Verlag, 2007. Lecture Notes in Computer Science 4809. (doi:10.1007/978-3-540-77090-9_54)
[205]
S. Basagiannis, P. Katsaros, and A. Pombortsis. Intrusion attack tactics for the model checking of e-commerce security guarantees. In Computer Safety, Reliability, and Security, pages 238–251. Springer Verlag, 2007. Lecture Notes in Computer Science 4680. (doi:10.1007/978-3-540-75101-4_22)
[206]
P. Bocciarelli, A. D'Ambrogio, and M. Angelaccio. QShare: QoS-enabled description and discovery of services in SOA-based P2P applications. In Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE, pages 159–164, 2007. (doi:10.1109/WETICE.2007.4407144)
[207]
D. Beneventano, S. Bergamaschi, F. Guerra, and M. Vincini. Querying a super-peer in a schema-based super-peer network. In Databases, Information Systems, and Peer-to-Peer Computing, pages 13–25. Springer Verlag, 2007. Lecture Notes in Computer Science 4125. (doi:10.1007/978-3-540-71661-7_2)
[208]
V. Koutsiouris, C. Polychronopoulos, and A. Vrechopoulos. Developing 3G location based services: The case of an innovative entertainment guide application. In ICMB 2007: 6th International Conference on the Management of Mobile Business, 2007. (doi:10.1109/ICMB.2007.26)
[209]
B.K. Shrivastava, G. Khataniar, and D. Goswami. Performance enhancement in hierarchical peer-to-peer systems. In Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007, pages 1–7, 2007. (doi:10.1109/COMSWA.2007.382555)
[210]
Tobias Hildenbrand, Franz Rothlauf, and Armin Heinzl. Ansätze zur kollaborativen Softwareerstellung. Wirtschaftsinformatik, 49:72–80, 2007. In German.
[211]
S. Karjalainen and O. Koistinen. User problems with individual temperature control in offices. Building and Environment, 42(8):2880–2887, 2007. (doi:10.1016/j.buildenv.2006.10.031)
[212]
B. Vassiliadis and V. Fotopoulos. IPR protection for digital media distribution: Trends and solutions in the e-business domain. International Journal of E-Business Research (IJEBR), 3(4):79–97, 2007. (doi:10.4018/jebr.2007100105)
[213]
L. DeNardis. A history of internet security. In The History of Information Security, pages 681–704. Elsevier, 2007. (doi:10.1016/B978-044451608-4/50025-0)
[214]
N. Nagappan. Potential of open source systems as project repositories for empirical studies working group results. In Empirical Software Engineering Issues. Critical Assessment and Future Directions, pages 103–107. Springer Verlag, 2007. Lecture Notes in Computer Science 4336. (doi:10.1007/978-3-540-71301-2_29)
[215]
P.A.H. Williams. A holistic perspective on models for medical information security. In Proceedings of The 2007 International Conference on Security and Management, SAM'07, pages 510–519, 2007.
[216]
G. Liberopoulos, G. Kozanidis, and P. Tsarouhas. Performance evaluation of an automatic transfer line with WIP scrapping during long failures. Manufacturing and Service Operations Management, 9(1):62–83, 2007. (doi:10.1287/msom.1060.0118)
[217]
K.G. Anagnostakis, M.B. Greenwald, S. Ioannidis, and A.D. Keromytis. COVERAGE: Detecting and reacting to worm epidemics using cooperation and validation. International Journal of Information Security, 6(6):361–378, 2007. (doi:10.1007/s10207-007-0032-z)
[218]
M. Grechanik. Finding errors in components that exchange XML data. In ASE'07 - 2007 ACM/IEEE International Conference on Automated Software Engineering, pages 264–273, 2007. (doi:10.1145/1321631.1321671)
[219]
M. Grechanik. Finding errors in interoperating components. In Proceedings - ICSE 2007 Workshops: Second International Workshop on Incorporating COTS Software into Software Systems: Tools and Techniques, IWICSS'07, 2007. (doi:10.1109/IWICSS.2007.5)
[220]
S. Sucurovic. Security in e-health applications. In Advances in Enterprise Information Technology Security, pages 104–119. IGI Global, 2007. (doi:10.4018/978-1-59904-090-5.ch006)
[221]
H. Ciocarlie. Programming language for the development of distributed real-time applications dedicated to embedded systems. In International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, pages 540–545, 2007.
[222]
Y. Kanellopoulos, C. Makris, and C. Tjortjis. An improved methodology on information distillation by mining program source code. Data and Knowledge Engineering, 61(2):359–383, 2007. (doi:10.1016/j.datak.2006.06.002)
[223]
B. Krishnamurthy, D. Malandrino, and C.E. Wills. Measuring privacy loss and the impact of privacy protection in web browsing. In ACM International Conference Proceeding Series, volume 229, pages 52–63, 2007. (doi:10.1145/1280680.1280688)
[224]
M. Bortenschlager, S. Reich, and G. Kotsis. An architectural approach to apply the supervisor/worker collaboration pattern to nomadic workspaces. In Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE, pages 170–175, 2007. (doi:10.1109/WETICE.2007.4407146)
[225]
K. Papapanagiotou, G.F. Marias, and P. Georgiadis. A certificate validation protocol for VANETs. In GLOBECOM: IEEE Global Telecommunications Conference, 2007. (doi:10.1109/GLOCOMW.2007.4437825)
[226]
B.G. Christensen. LightPeers: A lightweight mobile P2P platform. In Proceedings — Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pages 132–136, 2007. (doi:10.1109/PERCOMW.2007.59)
[1]
A. Abada, L. Cui, C. Huang, and H.-H. Chen. A novel path selection and recovery mechanism for manets p2p file sharing applications. In IEEE Wireless Communications and Networking Conference, WCNC, pages 3475–3480, 2007. (doi:10.1109/WCNC.2007.637)

[2]
C. Abalde, V.M. Gulías, and L.M. Castro. Extending the VoDKA architecture with P2P aggregated content management. In IEEE Symposium on Computers and Communications, pages 1085–1090, 2007. (doi:10.1109/ISCC.2007.4381510)

[3]
C. Abalde, V.M. Gulías, and L.M. Castro. Towards a decentralized and structured network of P2P public information screens. In Computer Aided Systems Theory — EUROCAST 2007, pages 217–224, 2007. Lecture Notes in Computer Science 4739. (doi:10.1007/978-3-540-75867-9_28)

[4]
S. Abiteboul, I. Dar, R. Pop, G. Vasile, and D. Vodislav. EDOS distribution system: A P2P architecture for open-source content dissemination. In Open Source Development, Adoption and Innovation, pages 209–215. Springer Verlag, 2007. IFIP International Federation for Information Processing Volume 234. (doi:10.1007/978-0-387-72486-7_17)

[5]
S.A. Ajila and D. Wu. Empirical study of the effects of open source adoption on software development economics. Journal of Systems and Software, 80(9):1517–1529, 2007. (doi:10.1016/j.jss.2007.01.011)

[6]
F. Al-Nayadi and J.H. Abawajy. An authentication framework for e-health systems. In ISSPIT 2007 — 2007 IEEE International Symposium on Signal Processing and Information Technology, pages 616–620, 2007. (doi:10.1109/ISSPIT.2007.4458207)

[7]
P. Alvaro, D.V. Ryaboy, and D. Agrawal. Towards scalable architectures for clickstream data warehousing. In Databases in Networked Information Systems, pages 154–177. Springer Verlag, 2007. Lecture Notes in Computer Science 4777. (doi:10.1007/978-3-540-75512-8_12)

[8]
K.G. Anagnostakis, M.B. Greenwald, S. Ioannidis, and A.D. Keromytis. COVERAGE: Detecting and reacting to worm epidemics using cooperation and validation. International Journal of Information Security, 6(6):361–378, 2007. (doi:10.1007/s10207-007-0032-z)

[9]
R. Ando. Parallel analysis of polymorphic viral code using automated deduction system. In Proceedings — SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, volume 2, pages 585–592, 2007. (doi:10.1109/SNPD.2007.415)

[10]
P. Antonellis, D. Antoniou, Y. Kanellopoulos, C. Makris, E. Theodoridis, C. Tjortjis, and N.Tsirakis. A data mining methodology for evaluating maintainability according to ISO/IEC-9126 software engineering-product quality standard. In European Conference on Software Maintenance and Reengineering: Workshop on System Quality and Maintainability, 2007.

[11]
D. Aronsky, S. Madani, R.J. Carnevale, S. Duda, and M.T. Feyder. The prevalence and inaccessibility of internet references in the biomedical literature at the time of publication. Journal of the American Medical Informatics Association, 14(2):232–234, 2007. (doi:10.1197/jamia.M2243)

[12]
L. Baillie, P. Fröhlich, and R. Schatz. Exploring social TV. In Proceedings of the International Conference on Information Technology Interfaces, ITI, pages 215–220, 2007. (doi:10.1109/ITI.2007.4283773)

[13]
J. Bar-Ilan and B.C. Peritz. The lifespan of "informetrics" on the web: An eight year study (1998-2006). In 11th International Conference of the International Society for Scientometrics and Informetrics, ISSI 2007, pages 52–62. Spanish Research Council, 2007.

[14]
S. Basagiannis, P. Katsaros, and A. Pombortsis. Intrusion attack tactics for the model checking of e-commerce security guarantees. In Computer Safety, Reliability, and Security, pages 238–251. Springer Verlag, 2007. Lecture Notes in Computer Science 4680. (doi:10.1007/978-3-540-75101-4_22)

[15]
A.S. Baumgart, H. Knapp, P. Suetterlin, and M. Schader. A profile-based peer-to-peer RSS information distribution. In 2007 2nd International Symposium on Wireless Pervasive Computing, pages 218–223, 2007. (doi:10.1109/ISWPC.2007.342604)

[16]
Kent Beck. Implementation Patterns. Addison-Wesley, Boston, MA, 2007.

[17]
M. Becker, K. Kuladinithi, A. Timm-Giel, and C. Görg. Historical development of the idea of self-organisation in information and communication technology. In Understanding Autonomous Cooperation and Control in Logistics: The Impact of Autonomy on Management, Information, Communication and Material Flow, pages 45–56. Springer Berlin Heidelberg, 2007. (doi:10.1007/978-3-540-47450-0_4)

[18]
A. Belli, M. Geymonat, M. Perrero, R. Simeoni, and M. Badella. DynamicTV: The long tail applied to broadband-broadcast integration. In Interactive Digital Television: Technologies and Applications, pages 1–17. IGI Global, 2007. (doi:10.4018/978-1-59904-361-6.ch001)

[19]
P. Bellini, I. Bruno, D. Cenni, P. Nesi, and D. Rogai. P2P architecture for automated B2B cross media content distribution. In 3rd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2007, pages 105–112, 2007. (doi:10.1109/AXMEDIS.2007.31)

[20]
D. Beneventano, S. Bergamaschi, F. Guerra, and M. Vincini. Querying a super-peer in a schema-based super-peer network. In Databases, Information Systems, and Peer-to-Peer Computing, pages 13–25. Springer Verlag, 2007. Lecture Notes in Computer Science 4125. (doi:10.1007/978-3-540-71661-7_2)

[21]
S. Berkovsky, T. Kuflik, and F. Ricci. P2P case storage and retrieval with an unspecified ontology. Artificial Intelligence Review, 28(3):227–255, 2007. (doi:10.1007/s10462-009-9100-2)

[22]
J. Bitzer and P.J.H. Schröder. Open source software, competition and innovation. Industry and Innovation, 14(5):461–476, 2007. (doi:10.1080/13662710701711315)

[23]
P. Bocciarelli, A. D'Ambrogio, and M. Angelaccio. QShare: QoS-enabled description and discovery of services in SOA-based P2P applications. In Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE, pages 159–164, 2007. (doi:10.1109/WETICE.2007.4407144)

[24]
C. Bock. Model-driven HMI development: Can meta-CASE tools do the job? In Proceedings of the Annual Hawaii International Conference on System Sciences, 2007. (doi:10.1109/HICSS.2007.385)

[25]
X. Bonnaire and O. Marin. Recursive replication: A survival solution for structured P2P information systems to denial of service attacks. In On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, pages 931–940, 2007. Lecture Notes in Computer Science 4806. (doi:10.1007/978-3-540-76890-6_19)

[26]
M. Bortenschlager, S. Reich, and G. Kotsis. An architectural approach to apply the supervisor/worker collaboration pattern to nomadic workspaces. In Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE, pages 170–175, 2007. (doi:10.1109/WETICE.2007.4407146)

[27]
M. Brogle, D. Milic, and T. Braun. Supporting IP multicast streaming using overlay networks. In 4th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops, QSHINE '07, 2007. (doi:10.1145/1577222.1577289)

[28]
D. Ch. Buser. Context-based recommender systems in conventional grocery - an economic analysis. In Proceedings of the Annual Hawaii International Conference on System Sciences, 2007. (doi:10.1109/HICSS.2007.147)

[29]
R. Bye, K. Luther, S.A. Çamtepe, T. Alpcan, c S. Albayrak, and B. Yener. Decentralized detector generation in cooperative intrusion detection systems. In Stabilization, Safety, and Security of Distributed Systems, pages 37–51. Springer Verlag, 2007. Lecture Notes in Computer Science 4838. (doi:10.1007/978-3-540-76627-8_6)

[30]
E. Byun, S. Choi, C. Hwang, and S. Lee. Survey on reputation management systems in p2p network. In Proceedings of The 2007 International Conference on Security and Management, SAM'07, pages 358–364, 2007.

[31]
D.R. Campbell, S.J. Culley, C.A. McMahon, and F. Sellini. An approach for the capture of context-dependent document relationships extracted from Bayesian analysis of users' interactions with information. Information Retrieval, 10(2):115–141, 2007. (doi:10.1007/s10791-006-9016-2)

[32]
P. Campos and N.J. Nunes. Practitioner tools and workstyles for user-interface design. IEEE Software, 24(1):73–80, 2007. (doi:10.1109/MS.2007.24)

[33]
Y. Cardenas, J.-M. Pierson, and L. Brunie. Management of a cooperative cache in grids with grid cache services. Concurrency Computation Practice and Experience, 19(16):2141–2155, 2007. (doi:10.1002/cpe.1212)

[34]
R.J. Carnevale and D. Aronsky. The life and death of urls in five biomedical informatics journals. International Journal of Medical Informatics, 76(4):269–273, 2007. (doi:10.1016/j.ijmedinf.2005.12.001)

[35]
I. Carreras, D. Miorandi, and I. Chlamtac. From biology to evolve-able pervasive ICT systems. In Conference Proceedings — IEEE International Conference on Systems, Man and Cybernetics, pages 4075–4080, 2007. (doi:10.1109/ICSMC.2007.4414263)

[36]
R. Casallas, O. González, and N. López. Dealing with scalability in an event-based infrastructure to support global software development. In Trends in Enterprise Application Architecture, pages 100–111. Springer Verlag, 2007. Lecture Notes in Computer Science 4473. (doi:10.1007/978-3-540-75912-6_8)

[37]
S. Castano, A. Ferrara, and S. Montanelli. P2P routing-by-content on a lightweight community basis. In On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, pages 477–486, 2007. Lecture Notes in Computer Science 4805. (doi:10.1007/978-3-540-76888-3_70)

[38]
A. Chazapis, G. Tsoukalas, G. Verigakis, K. Kourtis, A. Sotiropoulos, and N. Koziris. Global-scale peer-to-peer file services with DFS. In IEEE/ACM International Workshop on Grid Computing, pages 251–258, 2007. (doi:10.1109/GRID.2007.4354140)

[39]
J. Chen and P. Cheng. A new multi-agent approach to adaptive e-education. 7th IFIP International Conference on e-Business, e-Services, and e-Society, I3E 2007, 252 VOLUME 2:404–411, 2007.

[40]
W. Chen, J. Li, J. Ma, R. Conradi, J. Ji, and C. Liu. A survey of software development with open source components in Chinese software industry. In Software Process Dynamics and Agility, pages 208–220. Springer Verlag, 2007. Lecture Notes in Computer Science 4470. (doi:10.1007/978-3-540-72426-1_18)

[41]
H. Cho. An update propagation algorithm for P2P file sharing over wireless mobile networks. In Computational Science — ICCS 2007, volume PART 4, pages 753–760. Springer Verlag, 2007. Lecture Notes in Computer Science 4490. (doi:10.1007/978-3-540-72590-9_113)

[42]
M.-O. Choi, I.-W. Lee, S.-O. Lee, and H.-J. Park. A design and implementation of the contents sharing service on the peer-to-peer based virtual home platform. In International Conference on Advanced Communication Technology, ICACT, volume 3, pages 1853–1856, 2007. (doi:10.1109/ICACT.2007.358731)

[43]
O. Christ, C. Schroth, and T. Janner. A hybrid framework for automated and adaptive e-business platforms. In Proceedings of the 15th European Conference on Information Systems, ECIS 2007, pages 191–202, 2007.

[44]
B.G. Christensen. LightPeers: A lightweight mobile P2P platform. In Proceedings — Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pages 132–136, 2007. (doi:10.1109/PERCOMW.2007.59)

[45]
T.-Y. Chung, Y.-H. Chang, C.-Y. Liu, and Y.-M. Chen. SSIF: Stable self-organized infrastructure-based peer-to-peer network. In International Conference on Advanced Communication Technology, ICACT, volume 2, pages 1441–1446, 2007. (doi:10.1109/ICACT.2007.358627)

[46]
Horia Ciocarlie and Lavinia Simon. Definition of a high level language for real-time distributed systems programming. In EUROCON, 2007. The International Conference on "Computer as a Tool", pages 828–834, 2007. (doi:10.1109/EURCON.2007.4400651)

[47]
H. Ciocarlie. Programming language for the development of distributed real-time applications dedicated to embedded systems. In International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, pages 540–545, 2007.

[48]
Fintan Clear. SMEs, electronically-mediated working and data security: cause for concern?. International Journal of Business Science and Applied Management, 2(2), 2007.

[49]
V. Clincy, J. Garrido, and Y. Nzibo. A firewall simulation study. In 2007 International Conference on Communications in Computing, CIC 2007, pages 16–20, 2007.

[50]
E. Costa-Montenegro, J.C. Burguillo-Rial, F.J. Gonzalez-Castano, and J. Vales-Alonso. Agent-controlled sharing of distributed resources in user networks. In Computational Intelligence for Agent-based Systems, pages 29–60. Springer Verlag, 2007. Studies in Computational Intelligence 72. (doi:10.1007/978-3-540-73177-1_2)

[51]
D.N. Da Hora, D.F. Macedo, J.M.S. Nogueira, and G. Pujolle. Optimizing peer-to-peer content discovery over wireless mobile ad hoc networks. In Proceedings of the 9th International Conference on Mobile and Wireless Communications Networks, MWCN'07, pages 6–10, 2007. (doi:10.1109/ICMWCN.2007.4668170)

[52]
O. De Moor, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, D. Sereni, and J. Tibble. Keynote address: QL for source code analysis. In SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation, pages 3–14, 2007. (doi:10.1109/SCAM.2007.31)

[53]
Oege de Moor, Mathieu Verbaere, Elnar Hajiyev, Pavel Avgustinov, Torbjorn Ekman, Neil Ongkingco, Damien Sereni, and Julian Tibble. Keynote address: .QL for source code analysis. In Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pages 3–16, Los Alamitos, CA, USA, 2007. IEEE Computer Society. (doi:10.1109/SCAM.2007.13)

[54]
F. De Rango, F. Veltri, M. Tropea, A.-F. Santamaria, P. Fazio, A. Malfitano, and S. Marano. Interdisciplinary issues for the management of next generation autonomic wireless systems: Nature-inspired techniques and organic computing. International Journal of Mobile Network Design and Innovation, 2(3-4):141–152, 2007. (doi:10.1504/IJMNDI.2007.017318)

[55]
L. DeNardis. A history of internet security. In The History of Information Security, pages 681–704. Elsevier, 2007. (doi:10.1016/B978-044451608-4/50025-0)

[56]
I. Díaz, J. Touriño, and R. Doallo. Towards low-latency model-oriented distributed systems management. In Managing Next Generation Networks and Services, pages 41–50. Springer Verlag, 2007. Lecture Notes in Computer Science 4773. (doi:10.1007/978-3-540-75476-3_5)

[57]
A. Dolgui, A.V. Eremeev, and V.S. Sigaev. HBBA: Hybrid algorithm for buffer allocation in tandem production lines. Journal of Intelligent Manufacturing, 18(3):411–420, 2007. (doi:10.1007/s10845-007-0030-z)

[58]
Nikolaos Doukas and Antonios Andreatos. Advancing electronic assessment. International Journal of Computers, Communications & Control, 2(1):56–65, 2007.

[59]
Yassir K. Elley, Anne H. Anderson, Stephen R. Hanna, Sean J. Mullan, and Radia J. Perlman. Method and system for proving membership in a nested group using chains of credentials. United States Patent 7,213,262, May 2007. Assignee: Sun Microsystems, Inc. (Santa Clara, CA).

[60]
Éric Filiol. Sciences à risque: Virus. Les Dossiers de la Recherche, 26:82–85, February 2007.

[61]
G. Exarchakos and N. Antonopoulos. Resource sharing architecture for cooperative heterogeneous P2P overlays. Journal of Network and Systems Management, 15(3):311–334, 2007. (doi:10.1007/s10922-007-9069-6)

[62]
B. Fabian and O. Günther. Distributed ONS and its impact on privacy. In IEEE International Conference on Communications, pages 1223–1228, 2007. (doi:10.1109/ICC.2007.207)

[63]
An Feng and Frank Minjarez. Enforcing data protection legislation in web data services. United States Patent 7,207,067, April 2007. Assignee: AOL LLC (Dulles, VA).

[64]
M.J. Fernández Iglesias, F. Rodrıguez González, and E. Medina Ferreiro. The multimedia center of galicia: A model of collaboration between the public and private sectors in e-learning development. Revista Iberoamericana de Tecnologias del Aprendizaje, 2(1):1–7, 2007.

[65]
E. Filiol. Formalisation and implementation aspects of k-ary (malicious) codes. Journal in Computer Virology, 3(2):75–86, 2007. (doi:10.1007/s11416-007-0044-2)

[66]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. IPROMISE: Reliable multi-sender algorithm for peer-to-peer networks. In Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007, 2007. (doi:10.1109/COMSWA.2007.382553)

[67]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. A multi-sender multicast algorithm for media streaming on peer-to-peer networks. Computer Communications, 30(10):2191–2200, 2007. (doi:10.1016/j.comcom.2007.05.008)

[68]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. Wavelet-based unbalanced un-equivalent multiple description coding for P2P networks. In 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, pages 242–247, 2007. (doi:10.1109/ICTMICC.2007.4448642)

[69]
Beat Fluri, Michael Würsch, and Harald Gall. Do code and comments co-evolve? on the relation between source code and comment changes. In 14th Working Conference on Reverse Engineering (WCRE 2007), pages 70–79, 2007. (doi:10.1109/WCRE.2007.21)

[70]
C. Fragouli and E. Soljanin. Network coding applications. Foundations and Trends in Networking, 2(2):135–269, 2007. (doi:10.1561/1300000013)

[71]
S. Gadanho and N. Lhuillier. Addressing uncertainty in implicit preferences. In RecSys'07: Proceedings of the 2007 ACM Conference on Recommender Systems, pages 9–16, 2007. (doi:10.1145/1297231.1297248)

[72]
J. García-Vidal, M. Guerrero-Zapata, J. Morillo-Pozo, and D. Fusté-Vilella. A protocol stack for cooperative wireless networks. In Wireless Systems and Mobility in Next Generation Internet, pages 62–72. Springer Verlag, 2007. Lecture Notes in Computer Science 4396. (doi:10.1007/978-3-540-70969-5_5)

[73]
L.P. Gaspary, M.P. Barcellos, A. Detsch, and R.S. Antunes. Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing. Computer Networks, 51(17):4797–4815, 2007. (doi:10.1016/j.comnet.2007.07.005)

[74]
D.M. German. Using software distributions to understand the relationship among free and open source software projects. In Proceedings — ICSE 2007 Workshops: Fourth International Workshop on Mining Software Repositories, MSR 2007, 2007. (doi:10.1109/MSR.2007.32)

[75]
D.H.-L. Goh and P.K. Ng. Link decay in leading information science journals. Journal of the American Society for Information Science and Technology, 58(1):15–24, 2007. (doi:10.1002/asi.20513)

[76]
F. Gortázar, M. Gallego, and A. Duarte. MetaCET: An object oriented tool for language design. In Proceedings of the International Multi-Conference on Computing in the Global Information Technology, ICCGI'06, 2007. (doi:10.1109/ICCGI.2006.49)

[77]
M. Grechanik. Finding errors in components that exchange XML data. In ASE'07 - 2007 ACM/IEEE International Conference on Automated Software Engineering, pages 264–273, 2007. (doi:10.1145/1321631.1321671)

[78]
M. Grechanik. Finding errors in interoperating components. In Proceedings - ICSE 2007 Workshops: Second International Workshop on Incorporating COTS Software into Software Systems: Tools and Techniques, IWICSS'07, 2007. (doi:10.1109/IWICSS.2007.5)

[79]
L. Grunske, P. Lindsay, E. Bondarev, Y. Papadopoulos, and D. Parker. An outline of an architecture-based method for optimizing dependability attributes of software-intensive systems. Lecture Notes in Computer Science, 4615:188–209, 2007.

[80]
T. Haenselmann, T. King, M. Busse, W. Effelsberg, and M. Fuchs. Scriptable sensor network based home-automation. In Emerging Directions in Embedded and Ubiquitous Computing, pages 579–591. Springer Verlag, 2007. Lecture Notes in Computer Science 4809. (doi:10.1007/978-3-540-77090-9_54)

[81]
M. Haigh. Downloading communism: File sharing as samizdat in ukraine. Libri, 57(3):165–178, 2007. (doi:10.1515/LIBR.2007.165)

[82]
E. Hammami. Towards a peer-to-peer content discovery and delivery architecture for service provisioning. In Proceedings — ECUMN 2007: Fourth European Conference on Universal Multiservice Networks, pages 52–61, 2007. (doi:10.1109/ECUMN.2007.55)

[83]
A. Harriger, K. Lutes, and J. Purdum. Designing curricula to teach concepts and increase employability. In ASEE Annual Conference and Exposition, Conference Proceedings, page 11 pages, 2007.

[84]
R. Hassan and A. Harris. A hybrid Markov model for accurate memory reference generation. In International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, pages 550–555, 2007.

[85]
R. Hassan, A. Harris, N. Topham, and A. Efthymiou. Synthetic trace-driven simulation of cache memory. In Proceedings — 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, volume 2, pages 764–771, 2007. (doi:10.1109/AINAW.2007.345)

[86]
M. Hepp, K. Siorpaes, and D. Bachlechner. Harvesting Wiki consensus: Using Wikipedia entries as vocabulary for knowledge management. IEEE Internet Computing, 11(5):54–65, September/October 2007. (doi:10.1109/MIC.2007.110)

[87]
Tobias Hildenbrand, Franz Rothlauf, and Armin Heinzl. Ansätze zur kollaborativen Softwareerstellung. Wirtschaftsinformatik, 49:72–80, 2007. In German.

[88]
T. Hopkins. Refactoring–does it improve software quality? ACM Computing Reviews, June 2007.

[89]
A. Iftene, A. Balahur-Dobrescu, and D. Matei. A distributed architecture system for recognizing textual entailment. In 9th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2007, pages 219–226, 2007. (doi:10.1109/SYNASC.2007.11)

[90]
V. Issarny, M. Caporuscio, and N. Georgantas. A perspective on the future of middleware-based software engineering. In FoSE 2007: Future of Software Engineering, pages 244–258, 2007. (doi:10.1109/FOSE.2007.2)

[91]
A.Q. Jaber, R. Ramli, and Y. Hidehiko. Genetic algorithms for buffer size and work stations capacity in serial-parallel production lines. In Proceedings of the 12th International Symposium on Artificial Life and Robotis, AROB 12th'07, pages 513–516, 2007.

[92]
M.A. Johnston and J. Villà-Freixa. Enabling data sharing and collaboration in complex systems applications. In Distributed, High-Performance and Grid Computing in Computational Biology, pages 124–140. Springer Verlag, 2007. Lecture Notes in Computer Science 4360. (doi:10.1007/978-3-540-69968-2_10)

[93]
J.J. Jung. Semantic co-browsing system based on contextual synchronization on peer-to-peer environment. Computing and Informatics, 26(5):469–488, 2007.

[94]
M.-O. Junker and R. Luchian. Developing web databases for aboriginal language preservation. Literary and Linguistic Computing, 22(2):187–206, 2007. (doi:10.1093/llc/fql049)

[95]
C. Kaiser, C. Pajault, and J.-F. Pradat-Peyre. Modelling remote concurrency with ada case study of symmetric non-deterministic rendezvous. In Reliable Software Technologies — Ada Europe 2007, pages 192–207. Springer Verlag, 2007. Lecture Notes in Computer Science 4498. (doi:10.1007/978-3-540-73230-3_15)

[96]
G. Kakaletris, D. Varoutas, D. Katsianis, and T. Sphicopoulos. Design and implementation approaches for location-based, tourism-related services. In Information and Communication Technologies in Support of the Tourism Industry, pages 114–161. IGI Global, 2007. (doi:10.4018/978-1-59904-159-9.ch005)

[97]
P. Kamthan. A perspective on software engineering education with open source software. In Handbook of Research on Open Source Software: Technological, Economic, and Social Perspectives, pages 690–702. IGI Global, 2007. (doi:10.4018/978-1-59140-999-1.ch054)

[98]
Pankaj Kamthan. On the prospects and concerns of integrating open source software environment in software engineering education. Journal of Information Technology Education, 6:45, April 2007.

[99]
Y. Kanellopoulos, C. Makris, and C. Tjortjis. An improved methodology on information distillation by mining program source code. Data and Knowledge Engineering, 61(2):359–383, 2007. (doi:10.1016/j.datak.2006.06.002)

[100]
S. Karjalainen and O. Koistinen. User problems with individual temperature control in offices. Building and Environment, 42(8):2880–2887, 2007. (doi:10.1016/j.buildenv.2006.10.031)

[101]
Martin Karlsch. A model-driven framework for domain specific languages demonstrated on a test automation language. Master's thesis, Hasso-Plattner-Institute of Software Systems Engineering, Potsdam, Germany, January 2007.

[102]
M. Kauhanen, C. Eaket, and R. Biddle. Patterns for story authoring tools. In EuroPLoP 2007 - 12th European Conferenceon Pattern Languages of Programs, pages 19–36, 2007.

[103]
P. Kaur and H. Singh. Comparative analysis of automated version control tools. In International Conference on Software Engineering Theory and Practice 2007, SETP 2007, pages 106–111, 2007.

[104]
Stan Kelly-Bootle. Ode or code? — programmers be mused. ACM Queue, 5(3):48–52, April 2007. (doi:10.1145/1242489.1242508)

[105]
H.M. Kienle and H.A. Müller. A lightweight taxonomy to characterize component-based systems. In Proceedings — ICCBSS 2007: Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, pages 193–201, 2007. (doi:10.1109/ICCBSS.2007.2)

[106]
J.B. Kim and S.Y. Rhew. Reuse procedure for open-source software. In Parallel Computational Fluid Dynamics 2006, pages 155–164. Elsevier Ltd, 2007. (doi:10.1016/B978-044453035-6/50022-5)

[107]
D.J. Kim, K.-B. Yue, and T.A. Yang. Information assurance in B2C e-commerce transactions: A process-oriented framework and empirical analysis of websites using semantic networks. In Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights, volume 2, pages 1335–1345, 2007.

[108]
J.-H. Kim, G.S. Choi, and C.R. Das. An SSL back-end forwarding scheme in cluster-based web servers. IEEE Transactions on Parallel and Distributed Systems, 18(7):946–957, 2007. (doi:10.1109/TPDS.2007.1062)

[109]
H. Kokkinen and S. Moloney. Towards distributed service provisioning. In Proceedings - MUM 2007: 6th International Conference on Mobile and Ubiquitous Multimedia, volume 284, pages 69–73, 2007. (doi:10.1145/1329469.1329478)

[110]
K. Komine, Y. Sawahata, N. Uratani, Y. Yoshida, and T. Inoue. Evaluation of a prototype remote control for digital broadcasting receivers by using semantic differential method. IEEE Transactions on Consumer Electronics, 53(2):561–568, 2007. (doi:10.1109/TCE.2007.381730)

[111]
T. Koskela, N. Kostamo, O. Kassinen, J. Ohtonen, and M. Ylianttila. Towards context-aware mobile web 2.0 service architecture. In Proceedings - International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2007, pages 41–48, 2007. (doi:10.1109/UBICOMM.2007.15)

[112]
T. Koulouris, G. Spanoudakis, and T. Tsigkritis. Towards a framework for dynamic verification of peer-to-peer systems. In Second International Conference on Internet and Web Applications and Services, ICIW'07, 2007. (doi:10.1109/ICIW.2007.63)

[113]
V. Koutsiouris, C. Polychronopoulos, and A. Vrechopoulos. Developing 3G location based services: The case of an innovative entertainment guide application. In ICMB 2007: 6th International Conference on the Management of Mobile Business, 2007. (doi:10.1109/ICMB.2007.26)

[114]
B. Krishnamurthy, D. Malandrino, and C.E. Wills. Measuring privacy loss and the impact of privacy protection in web browsing. In ACM International Conference Proceeding Series, volume 229, pages 52–63, 2007. (doi:10.1145/1280680.1280688)

[115]
B. Lagesse and M. Kumar. UBCA: Utility-based clustering architecture for peer-to-peer systems. In Proceedings — International Conference on Distributed Computing Systems, 2007. (doi:10.1109/ICDCSW.2007.86)

[116]
M. Lahiri and T.Y. Berger-Wolf. Structure prediction in temporal networks using frequent subgraphs. In Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, pages 35–42, March 2007. (doi:10.1109/CIDM.2007.368850)

[117]
D.G. Lee, D.I. Fels, and J.P. Udo. Emotive captioning. Computers in Entertainment, 5(2):1281344:1–1281344:15, 2007. (doi:10.1145/1279540.1279551)

[118]
S.-W. Lee, R.A. Gandhi, and G.-J. Ahn. Certification process artifacts defined as measurable units for software assurance. Software Process Improvement and Practice, 12(2):165–189, 2007. (doi:10.1002/spip.313)

[119]
Y.M. Lee, J.B. Kim, I.W. Choi, and S.Y. Rhew. A study on selection process of open source software. In ALPIT 2007: 6th International Conference on Advanced Language Processing and Web Information Technology, pages 568–571, 2007. (doi:10.1109/ALPIT.2007.83)

[120]
K. Leibnitz, T. Hoßfeld, N. Wakamiya, and M. Murata. Peer-to-peer vs. client/server: Reliability and efficiency of a content distribution service. In Managing Traffic Performance in Converged Networks, pages 1161–1172. Springer Verlag, 2007. Lecture Notes in Computer Science 4516. (doi:10.1007/978-3-540-72990-7_99)

[121]
Junguo Li, Gang Huang, Jian Zou, and Hong Mei. Failure analysis of open source j2ee application servers. In QSIC '07: Seventh International Conference on Quality Software, pages 198–208, October 2007. (doi:10.1109/QSIC.2007.4385496)

[122]
W. Li, L.-C. Lam, and T.-C. Chiueh. Accurate application-specific sandboxing for Win32/Intel binaries. In IAS 2007: 3rd Internationl Symposium on Information Assurance and Security, pages 375–380, 2007. (doi:10.1109/IAS.2007.86)

[123]
G. Liberopoulos, G. Kozanidis, and P. Tsarouhas. Performance evaluation of an automatic transfer line with WIP scrapping during long failures. Manufacturing and Service Operations Management, 9(1):62–83, 2007. (doi:10.1287/msom.1060.0118)

[124]
Y.-C. Lin and L.-S. Li. Nemo based P2P file discovery scheme. In Mobility Conference 2007 - The 4th Int. Conf. Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st Int. Symp. Computer Human Interaction in Mobile Technology, IS-CHI 2007, pages 145–150, 2007. (doi:10.1145/1378063.1378088)

[125]
J.-M. Lin, Z.-W. Hong, G.-M. Fang, and C.-T. Lee. A style for integrating MS-windows software applications to client-server systems using Java technology. Software — Practice and Experience, 37(4):417–440, 2007. (doi:10.1002/spe.775)

[126]
Y.-C. Lin, L.-S. Li, and C.-C. Haung. A p2p file discovery scheme in nemo. In IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference, pages 499–504, 2007. (doi:10.1145/1280940.1281047)

[127]
F. Liu and Y. Ding. Ecological network-inspired trust management model of p2p networks. In 2nd Workshop on Digital Media and its Application in Museum and Heritage, DMAMH 2007, pages 297–302, 2007. (doi:10.1109/DMAMH.2007.4414570)

[128]
A. Löser, S. Staab, and C. Tempich. Semantic social overlay networks. IEEE Journal on Selected Areas in Communications, 25(1):5–14, 2007. (doi:10.1109/JSAC.2007.070102)

[129]
N. Lu, P.M.C. Swatman, and S. Perreau. Sustainable agriculture mobile commerce (SamCom) - extending the rural grocery supply chain through m-commerce. In IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2007. (doi:10.1109/TENCON.2005.301236)

[130]
K. Luther, R. Bye, T. Alpcan, A. Müller, and c S. Albayrak. A cooperative AIS framework for intrusion detection. In IEEE International Conference on Communications, pages 1409–1416, 2007. (doi:10.1109/ICC.2007.237)

[131]
W. Maass and M. Lampe. Integration of standardized and non-standardized product data. In INFORMATIK 2007 - Informatik Trifft Logistik, Beitrage der 37. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1, pages 141–146, 2007.

[132]
Eva Magnusson, Torbjorn Ekman, and Gorel Hedin. Extending attribute grammars with collection attributes–evaluation and applications. In Source Code Analysis and Manipulation, 2007. SCAM 2007. Seventh IEEE International Working Conference on, pages 69–80, 2007. (doi:10.1109/SCAM.2007.4362899)

[133]
L. Mannila. Novices' progress in introductory programming courses. Informatics in Education, 6(1):139–152, 2007.

[134]
C.C. Marquezan, C.R.P.D. Santos, E.M. Salvador, M.J.B. Almeida, S.L. Cechin, and L.Z. Granville. Performance evaluation of notifications in a web services and P2P-based network management overlay. In International Computer Software and Applications Conference, volume 1, pages 241–248, 2007. (doi:10.1109/COMPSAC.2007.165)

[135]
Y. Mei, X. Dong, W. Wu, S. Guan, and J. Li. SDRD: A novel approach to resource discovery in grid environments. In Advanced Parallel Processing Technologies, pages 301–312. Springer Verlag, 2007. Lecture Notes in Computer Science 4847. (doi:10.1007/978-3-540-76837-1_34)

[136]
Siavash Mirarab and Ladan Tahvildari. A prioritization approach for software test cases based on Bayesian networks. In Fundamental Approaches to Software Engineering, pages 276–290. Springer Verlag, 2007. Lecture Notes in Computer Science 4422. (doi:10.1007/978-3-540-71289-3_22)

[137]
J. Mishra and S. Ahuja. P2PCompute: A peer-to-peer computing system. In Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems, CTS, pages 169–176, 2007. (doi:10.1109/CTS.2007.4621754)

[138]
M. Mor, R. Mordinyi, and J. Riemer. Using space-based computing for more efficient group coordination and monitoring in an event-based work management system. In Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007, pages 1116–1123, 2007. (doi:10.1109/ARES.2007.158)

[139]
F. Moraán, M. Preda, G. Lafruit, P. Villegas, and R.-P. Berretty. 3D game content distributed adaptation in heterogeneous environments. Eurasip Journal on Advances in Signal Processing, 2007. (doi:10.1155/2007/93027)

[140]
J.C. Morris and C. Lüer. DistriWiki: a distributed peer-to-peer wiki network. In WikiSym '07: Proceedings of the 2007 international symposium on Wikis, pages 69–74, New York, NY, USA, 2007. ACM. (doi:10.1145/1296951.1296959)

[141]
B. Mortazavi and G. Kesidis. Cumulative reputation systems for peer-to-peer content distribution. In 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings, pages 1546–1552, 2007. (doi:10.1109/CISS.2006.286385)

[142]
J.P. Mulerikkal and I. Khalil. An architecture for distributed content delivery network. In ICON 2007 — Proceedings of the 2007 15th IEEE International Conference on Networks, pages 359–364, 2007. (doi:10.1109/ICON.2007.4444113)

[143]
N. Nagappan. Potential of open source systems as project repositories for empirical studies working group results. In Empirical Software Engineering Issues. Critical Assessment and Future Directions, pages 103–107. Springer Verlag, 2007. Lecture Notes in Computer Science 4336. (doi:10.1007/978-3-540-71301-2_29)

[144]
Nataraj Nagaratnam and Brian Keith Smith. Method, apparatus, and program for automated trust zone partitioning. United States Patent 7,272,714, September 2007. Assignee: International Business Machines Corporation (Armonk, NY).

[145]
M.L. Nelson, F. McCown, J.A. Smith, and M. Klein. Using the web infrastructure to preserve web pages. International Journal on Digital Libraries, 6(4):327–349, 2007. (doi:10.1007/s00799-007-0012-y)

[146]
A. Ng, H. Grimm, T. Lezama, A. Persson, M. Andersson, and M. Jägstam. Web services for metamodel-assisted parallel simulation optimization. In International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, pages 879–885, 2007.

[147]
H. Okada and M. Inoue. Evaluation of P2P information recommendation based on collaborative filtering. In Human-Computer Interaction. HCI Intelligent Multimodal Interaction Environments, pages 449–458. Springer Verlag, 2007. Lecture Notes in Computer Science 4552. (doi:10.1007/978-3-540-73110-8_48)

[148]
T. Omari, S. Derisavi, and G. Franks. Deriving distribution of thread service time in layered queueing networks. In Proceedings of the 6th International Workshop on Software and Performance, WOPS'07, pages 66–77, 2007. (doi:10.1145/1216993.1217007)

[149]
T. Omari, S. Derisavi, G. Franks, and M. Woodside. Performance modeling of a quorum pattern in layered service systems. In 4th International Conference on the Quantitative Evaluation of Systems, QEST 2007, pages 201–210, 2007. (doi:10.1109/QEST.2007.31)

[150]
H. Orsila, T. Kangas, E. Salminen, T.D. Hämäläinen, and M. Hännikäinen. Automated memory-aware application distribution for multi-processor system-on-chips. Journal of Systems Architecture, 53(11):795–815, 2007. (doi:10.1016/j.sysarc.2007.01.013)

[151]
K. Papapanagiotou, G.F. Marias, and P. Georgiadis. A certificate validation protocol for VANETs. In GLOBECOM: IEEE Global Telecommunications Conference, 2007. (doi:10.1109/GLOCOMW.2007.4437825)

[152]
E. Papapetrou and N. Pavlidou. A satellite-based architecture for internet P2P applications. In QShine 2007 Workshop: Satellite/Terrestrial Interworking, IWSTI '07, 2007.

[153]
E. Papapetrou, E. Rova, A. Zarras, and P. Vassiliadis. Cross-layer networking for peer databases over wireless ad-hoc communities. In IEEE International Conference on Communications, pages 3443–3448, 2007. (doi:10.1109/ICC.2007.570)

[154]
J.-C. Park and G. Yu. Securing overlay activities of peers in unstructured P2P networks. In Computational Intelligence and Security, pages 795–805. Springer Verlag, 2007. Lecture Notes in Computer Science 4456. (doi:10.1007/978-3-540-74377-4_83)

[155]
J.-C. Park and G. Yu. Securing overlay activities of peers in unstructured P2P networks. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006, volume 2, pages 1105–1108, 2007. (doi:10.1109/ICCIAS.2006.295433)

[156]
C. Park, K. Kim, J. Lee, and P. Kim. Improved CAN routing using additional neighbors. In International Conference on Advanced Communication Technology, ICACT, volume 2, pages 1457–1461, 2007. (doi:10.1109/ICACT.2007.358630)

[157]
J.S. Park, G. An, and D. Chandra. Trusted P2P computing environments with role-based access control. IET Information Security, 1(1):27–35, 2007. (doi:10.1049/iet-ifs:20060084)

[158]
I. Pavlović and D. Miklavćíc. Web-based electronic data collection system to support electrochemotherapy clinical trial. IEEE Transactions on Information Technology in Biomedicine, 11(2):222–230, 2007. (doi:10.1109/TITB.2006.879581)

[159]
C. Pheatt. An easy to use distributed computing framework. In SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education, pages 571–575, 2007. (doi:10.1145/1227310.1227500)

[160]
M. Popa, A.S. Popa, and H. Ciocarlie. Mobile telephony with pocket PCs phone edition. WSEAS Transactions on Communications, 6(1):146–153, 2007.

[161]
S. Qingwei, Z. Zheng, and B. Hu. A density-based approach to node clustering in decentralized peerto-peer networks. In Proceedings of SPIE – The International Society for Optical Engineering, volume 6773, 2007. (doi:10.1117/12.749683)

[162]
J.A. Qudeiri, H. Yamamoto, and M. Jamali. Development of new production simulator for complex production systems design. In 37th International Conference on Computers and Industrial Engineering 2007, volume 2, pages 1521–1531, 2007.

[163]
J.E.A. Qudeiri, M.A. Jamali, and H. Yamamoto. Buffer size decision for the flexible transfer line with rework paths using genetic algorithms. In Proceedings — ICSSSM'06: 2006 International Conference on Service Systems and Service Management, pages 210–215, 2007. (doi:10.1109/ICSSSM.2006.320614)

[164]
S. Quenette, L. Moresi, P.D. Sunter, and B.F. Appelbe. Explaining StGermain: An aspect oriented environment for building extensible computational mechanics modeling software. In Proceedings — 21st International Parallel and Distributed Processing Symposium, IPDPS 2007, pages 1–8, 2007. (doi:10.1109/IPDPS.2007.370400)

[165]
E. Ras, R. Carbon, B. Decker, and J. Rech. Experience management wikis for reflective practice in software capstone projects. IEEE Transactions on Education, 50(4):312–320, 2007. (doi:10.1109/TE.2007.904580)

[166]
E. Razina and D. Janzen. Effects of dependency injection on maintainability. In J. Smith, editor, Software Engineering and Application, pages 91–102. Acta Press, 2007.

[167]
H.B. Ribeiro, L.C. Lung, A.O. Santin, and N.L. Brisola. Implementing a peer-to-peer web browser for publishing and searching web pages on internet. In Proceedings — International Conference on Advanced Information Networking and Applications, AINA, pages 754–761, 2007. (doi:10.1109/AINA.2007.79)

[168]
H.B. Ribeiro, L.C. Lung, A.O. Santin, and N.L. Brisóla. Web2Peer: A peer-to-peer infrastructure for publishing/locating/replicating web pages on internet. In Proceedings — Eighth International Symposium on Autonomous Decentralized Systems, ISADS 2007, pages 421–428, 2007. (doi:10.1109/ISADS.2007.79)

[169]
G. Robles, S. Dueñas, and J.M. Gonzalez-Barahona. Corporate involvement of libre software: Study of presence in Debian code over time. In Open Source Development, Adoption and Innovation, volume 234, pages 121–132. Springer Verlag, 2007. IFIP International Federation for Information Processing Volume 234. (doi:10.1007/978-0-387-72486-7_10)

[170]
B. Rood and M.J. Lewis. Multi-state grid resource availability characterization. In IEEE/ACM International Workshop on Grid Computing, pages 42–49, 2007. (doi:10.1109/GRID.2007.4354114)

[171]
J. Rybicki, B. Scheuermann, W. Kiess, C. Lochert, P. Fallahi, and M. Mauve. Challenge: Peers on wheels — a road to new traffic information systems. In Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pages 215–221, 2007. (doi:10.1145/1287853.1287879)

[172]
K. Sakamoto and M. Yoshida. Design and evaluation of large scale loosely coupled cluster-based distributed systems. In 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pages 572–577, 2007. (doi:10.1109/ICNPCW.2007.4351546)

[173]
G. Schiele, R. Süselbeck, A. Wacker, J. Hähner, C. Becker, and T. Weis. Requirements of peer-to-peer-based massively multiplayer online gaming. In Proceedings — Seventh IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2007, pages 773–778, 2007. (doi:10.1109/CCGRID.2007.97)

[174]
C. Servin, M. Ceberio, E. Freudenthal, and S. Bistarelli. An optimization approach using soft constraints for the cascade vulnerability problem. In Annual Conference of the North American Fuzzy Information Processing Society — NAFIPS, pages 372–377, 2007. (doi:10.1109/NAFIPS.2007.383867)

[175]
Z. Shi, , and H. Zhang. Time self-decay trust management algorithm for P2P computing security. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 44(1):1–10, 2007. (doi:10.1360/crad20070101)

[176]
B.K. Shrivastava, G. Khataniar, and D. Goswami. Performance enhancement in hierarchical peer-to-peer systems. In Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007, pages 1–7, 2007. (doi:10.1109/COMSWA.2007.382555)

[177]
Jeremy Singer, Gavin Brown, Mikel Luján, and Ian Watson. Towards intelligent analysis techniques for object pretenuring. In PPPJ '07: Proceedings of the 5th international symposium on Principles and practice of programming in Java, pages 203–208, New York, NY, USA, 2007. ACM. (doi:10.1145/1294325.1294353)

[178]
Jeremy Singer, Gavin Brown, Ian Watson, and John Cavazos. Intelligent selection of application-specific garbage collectors. In ISMM '07: Proceedings of the 6th international symposium on Memory management, pages 91–102, New York, NY, USA, 2007. ACM. (doi:10.1145/1296907.1296920)

[179]
N. Singh, C. Gibbs, and Y. Coady. C-CLR: A tool for navigating highly configurable system software. In ACP4IS '07: Proceedings of the 6th workshop on Aspects, components, and patterns for infrastructure software, 2007. ACM International Conference Proceeding Series Volume 219. (doi:10.1145/1233901.1233910)

[180]
Sulayman K. Sowe. An Empirical Study of Knowledge Sharing in Free and Open Source Software Projects. PhD thesis, Aristotle University of Thessaloniki, 2007.

[181]
M.V. Springett and R.N. Griffiths. Accessibility of interactive television for users with low vision: learning from the web. In Interactive TV: a Shared Experience — 5th European Conference, EuroITV 2007, pages 76–85, 2007. Lecture Notes in Computer Science 4471. (doi:10.1007/978-3-540-72559-6_9)

[182]
F. Stäber and J. P. Müller. Evaluating peer-to-peer for loosely coupled business collaboration: A case study. In Business Process Management, pages 141–148. Springer Verlag, 2007. Lecture Notes in Computer Science 4714. (doi:10.1007/978-3-540-75183-0_11)

[183]
R. Su, J.J. Lukkien, and M.R.V. Chaudron. Language-based access control approach for component-based software applications. IET Software, 1(5):206–216, 2007. (doi:10.1049/iet-sen:20070026)

[184]
S. Sucurovic. Security in e-health applications. In Advances in Enterprise Information Technology Security, pages 104–119. IGI Global, 2007. (doi:10.4018/978-1-59904-090-5.ch006)

[185]
W.J. Sung, J.H. Kim, and S.Y. Rhew. A quality model for open source software selection. In ALPIT 2007: 6th International Conference on Advanced Language Processing and Web Information Technology, pages 515–519, 2007. (doi:10.1109/ALPIT.2007.81)

[186]
A. Sutton and J.I. Maletic. How we manage portability and configuration with the C preprocessor. In IEEE International Conference on Software Maintenance, ICSM, pages 275–284, 2007. (doi:10.1109/ICSM.2007.4362640)

[187]
L. Swan, A.S. Taylor, S. Izadi, and R. Harper. Containing family clutter. IFIP International Federation for Information Processing, 241:171–184, 2007. (doi:10.1007/978-0-387-73697-6_13)

[188]
H. Tao and D. He. Normal forms and normalization of authentication protocols. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006, volume 2, pages 1363–1366, 2007. (doi:10.1109/ICCIAS.2006.295282)

[189]
T. Thireou, G. Spyrou, and V. Atlamazoglou. A survey of the availability of primary bioinformatics web resources. Genomics, Proteomics and Bioinformatics, 5(1):70–76, 2007. (doi:10.1016/S1672-0229(07)60017-5)

[190]
Ha Manh Tran and Jürgen Schönwälder. Distributed case-based reasoning for fault management. In Arosha K. Bandara and Mark Burgess, editors, Inter-Domain Management — First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, pages 200–203. Springer-Verlag, June 2007. Lecture Notes in Computer Science 4543. (doi:10.1007/978-3-540-72986-0_25)

[191]
Ö. Ulusoy. Research issues in peer-to-peer data management. In 22nd International Symposium on Computer and Information Sciences, ISCIS 2007, pages 1–8, 2007. (doi:10.1109/ISCIS.2007.4456827)

[192]
E. Van Ruitenbeek, T. Courtney, W.H. Sanders, and F. Stevens. Quantifying the effectiveness of mobile phone virus response mechanisms. In Proceedings of the International Conference on Dependable Systems and Networks, pages 790–799, 2007. (doi:10.1109/DSN.2007.78)

[193]
T. Van Woensel and N. Vandaele. Modeling traffic flows with queueing models: A review. Asia-Pacific Journal of Operational Research, 24(4):435–461, 2007. (doi:10.1142/S0217595907001383)

[194]
K. Ven, J. Verelst, and H. Mannaert. On the relationship between commoditization and open source software. In 12th International Conference of the Association Information and Management 2007, AIM 2007, 2007.

[195]
D.C. Verma and A. Stanford-Clark. Simulation of sensor networks using message queue infrastructure. In Edward M. Carapezza, editor, Proceedings of SPIE — Volume 6562 – The International Society for Optical Engineering, 2007. (doi:10.1117/12.724960)

[196]
N. Viorres, P. Xenofon, M. Stavrakis, E. Vlachogiannis, P. Koutsabasis, and J. Darzentas. Major HCI challenges for open source software adoption and development. In Online Communities and Social Computing, pages 455–464. Springer Verlag, 2007. Lecture Notes in Computer Science 4564. (doi:10.1007/978-3-540-73257-0_50)

[197]
M. Virvou and A. Savvopoulos. An intelligent TV-shopping application that provides recommendations. In International Conference on Tools with Artificial Intelligence, ICTAI, volume 1, pages 366–373, 2007. (doi:10.1109/ICTAI.2007.26)

[198]
W. Wang and G. Zeng. AntRep: A swarm intelligence based trust model in P2P networks. Journal of Universal Computer Science, 13(7):1164–1174, 2007.

[199]
W. Wang and G. Zeng. Self-organization resource topology revolution based on trust mechanism. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 44(11):1849–1856, 2007. (doi:10.1360/crad20071106)

[200]
R. Wang, X. Yu, Y. Li, and Z. Gao. Ontology partition method for semantic query routing. In IPC 2007: 2007 International Conference on Intelligent Pervasive Computing, pages 86–89, 2007. (doi:10.1109/IPC.2007.87)

[201]
S. Wang, Y. Zhang, and W. Wang. Reliable self-clustering P2P overlay networks. In International Computer Software and Applications Conference, volume 1, pages 105–108, 2007. (doi:10.1109/COMPSAC.2007.178)

[202]
K. Watanabe, N. Hayashibara, and M. Takizawa. Performance analysis of the superpeer-based two-layer P2P overlay network with the CBF strategy. In Proceedings — International Conference on Distributed Computing Systems, 2007. (doi:10.1109/ICDCSW.2007.63)

[203]
K. Watanabe, N. Hayashibara, and M. Takizawa. A superpeer-based two-layer P2P overlay network with the CBF strategy. In First International Conference on Complex, Intelligent and Software Intensive Systems, CISIS'07, pages 111–118, 2007. (doi:10.1109/CISIS.2007.8)

[204]
K. Watanabe, Y. Nakajima, T. Enokido, and M. Takizawa. Ranking factors in peer-to-peer overlay networks. ACM Transactions on Autonomous and Adaptive Systems, 2(3), 2007. (doi:10.1145/1278460.1278465)

[205]
P.A.H. Williams. A holistic perspective on models for medical information security. In Proceedings of The 2007 International Conference on Security and Management, SAM'07, pages 510–519, 2007.

[206]
C. Wu, S. Zhou, L. Wei, J. Luo, Y. Wang, and X. Yang. A new k-graph partition algorithm for distributed P2P simulation systems. In Algorithms and Architectures for Parallel Processing: 7th International Conference, ICA3PP, pages 391–402, 2007. Lecture Notes in Computer Science 4494. (doi:10.1007/978-3-540-72905-1_35)

[207]
L. Xiaoyun, H. Tiejun, H. Longshe, and M. Luntian. A DRM architecture for manageable P2P based IPTV system. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, pages 899–902, 2007.

[208]
Z. Yang and H. Ma. A game-based mechanism for avoiding routing hotspot in P2P streaming distribution. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, pages 2166–2169, 2007.

[209]
Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-based attestation for node compromise detection in sensor networks. In Proceedings of the IEEE Symposium on Reliable Distributed Systems, pages 219–228, 2007. (doi:10.1109/SRDS.2007.4365698)

[210]
C.-L. Yeh, J.-F. Yu, and W.-C. Chen. Knowledge sharing and business matching in advertising and public relations services using semantic peer technology. In Proceedings of the International Conference on Electronic Business (ICEB), pages 352–358, 2007.

[211]
M. Yiduo, D. Xiaoshe, L. Junyang, X. Jing, and X. Zhenghua. Rapid and automated deployment of monitoring services in grid environments. In Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007, pages 328–335, 2007. (doi:10.1109/APSCC.2007.4414478)

[212]
M. Yoshida and K. Sakamoto. Code migration control in large scale loosely coupled distributed systems. In Mobility Conference 2007 - The 4th Int. Conf. Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st Int. Symp. Computer Human Interaction in Mobile Technology, IS-CHI 2007, pages 32–38, 2007. (doi:10.1145/1378063.1378069)

[213]
K. Yousef and E. O'Neill. Sunrise: Towards location based clustering for assisted photo management. In ICMI'07: Workshop on Tagging, Mining and Retrieval of Human-Related Activity Information, TMR'07 - Workshop Proceedings, pages 47–54, 2007.

[214]
M.H. Zack. The role of decision support systems in an indeterminate world. Decision Support Systems, 43(4):1664–1674, 2007. (doi:10.1016/j.dss.2006.09.003)

[215]
H. Zhang and H. Su. A collaborative system for software engineering education. In International Computer Software and Applications Conference, volume 2, pages 313–318, 2007. (doi:10.1109/COMPSAC.2007.10)

[216]
Y. Zhang, H. Shi, X. Wang, and J. Zhang. Collaborative legal information sharing on P2P network. In Proceedings - 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007, pages 41–47, 2007. (doi:10.1109/ICNPCW.2007.4351458)

[217]
C.-Y. Zheng, X. Wang, J. Zhao, and X.-Y. Xue. P2P video-on-demand content distribution schemes. Ruan Jian Xue Bao/Journal of Software, 18(11):2942–2954, 2007. (doi:10.1360/jos182942)

[218]
J. Zhou, X. Zhang, L. Bhuyan, and B. Liu. Clustered K-center: Effective replica placement in peer-to-peer systems. In GLOBECOM: IEEE Global Telecommunications Conference, pages 2008–2013, 2007. (doi:10.1109/GLOCOM.2007.385)

[219]
H. Zhuge and X. Li. Peer-to-peer in metric space and semantic space. IEEE Transactions on Knowledge and Data Engineering, 19(6):759–771, 2007. (doi:10.1109/TKDE.2007.190614)

[220]
H. Zhuge and X. Li. RSM-based gossip on P2P network. In Algorithms and Architectures for Parallel Processing: 7th International Conference, ICA3PP, pages 1–12, 2007. Lecture Notes in Computer Science 4494. (doi:10.1007/978-3-540-72905-1_1)

[221]
A. Zisman. A static verification framework for secure peer-to-peer applications. In Second International Conference on Internet and Web Applications and Services, ICIW'07, 2007. (doi:10.1109/ICIW.2007.11)