[1]
E. Aarts and J. Encarnação. True visions: The emergence of ambient intelligence. Springer Berlin Heidelberg, 2006. (doi:10.1007/978-3-540-28974-6)
[2]
M. Abdullah, M. Othman, and R. Johari. An improved simulated annealing algorithm to avoid crosstalk in optical omega network. In 2006 International Conference on Computing and Informatics, ICOCI '06, 2006. (doi:10.1109/ICOCI.2006.5276543)
[3]
A.A. Abimbola, J.M. Munoz, and W.J. Buchanan. Nethost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4):166–175, 2006. (doi:10.1016/j.istr.2006.10.003)
[4]
N. Abu-Ghazaleh and M.J. Lewis. Short paper: Toward self organizing grids. In Proceedings of the IEEE International Symposium on High Performance Distributed Computing, volume 2006, pages 324–327, 2006.
[5]
J. Abu Qudeiri, H. Yamamoto, and M.A. Jamali. Buffer size decision for balanced and unbalanced flexible transfer line with rework paths. In ICPMT2006 — Progress of Machining Technology — Proceedings of the 8th International Conference on Progress of Machining Technology, pages 77–80, 2006.
[6]
R. Agrawal, A. Cheung, K. Kailing, and S. Schönauer. Towards traceability across sovereign, distributed rfid databases. In IDEAS: Proceedings of the International Database Engineering and Applications Symposium, pages 174–184, 2006. (doi:10.1109/IDEAS.2006.47)
[7]
Neta Aizenbud-Reshef and Gabi Zodik. Coverage analysis of message flows. United States Patent 7,137,103, November 2006. Assignee: International Business Machines Corporation (Armonk, NY).
[8]
R. Akavipat, L.-S. Wu, F. Menczer, and A.G. Maguitman. Emerging semantic communities in peer web search. In P2PIR 2006: International Workshop on Information Retrieval in Peer-to-Peer Networks, pages 1–8, 2006. (doi:10.1145/1183579.1183581)
[9]
Ruo Ando, Nguyen Anh Quynh, and Yoshiyasu Takefuji. Faster resolution based metamorphic virus detection using ATP control strategy. WSEAS Transactions on Information Science and Applications, 3(2):260–226, February 2006.
[10]
E. Balland, C. Kirchner, and P.-E. Moreau. Formal islands. In Algebraic Methodology and Software Technology, pages 51–65. Springer-Verlag, 2006. Lecture Notes in Computer Science 4019. (doi:10.1007/11784180_7)
[11]
U. Basters and M. Klusch. RS2D: Fast adaptive search for semantic web services in unstructured P2P networks. In 5th International Semantic Web Conference — ISWC '06, pages 87–100, 2006. Lecture Notes in Computer Science 4273. (doi:10.1007/11926078_7)
[12]
A.S. Baumgart, H. Knapp, and M. Schader. Mobile semantic data exchange in ad hoc networks using distributed profiles. In 2006 1st International Symposium on Wireless Pervasive Computing, volume 2006, pages 1–6, January 2006. (doi:10.1109/ISWPC.2006.1613649)
[13]
Douglas D. Beattie, Neal Lewis Creighton, Jr., Christopher T. M. Bailey, David L. Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 7,003,661, February 2006. Assignee: Geotrust, Inc. (Needham, MA).
[14]
Douglas Beattie, Neal Creighton, Jr., Christopher Bailey, David Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 7,120,929, October 2006. Assignee: GeoTrust, Inc. (Wellesley Hills, MA).
[15]
M.V. Belmonte, R. Conejo, M. Díaz, and J.L. Pérez-de-la Cruz. Coalition formation in P2P file sharing systems. In Current Topics in Artificial Intelligence, pages 153–162, 2006. Lecture Notes in Computer Science 4177. (doi:10.1007/11881216_17)
[16]
Y. Ben-Asher and S. Berkovsky. Semantic data management in peer-to-peer e-commerce applications. Journal on Data Semantics, VI:115–142, 2006. Lecture Notes in Computer Science 4090. (doi:10.1007/11803034_6)
[17]
P. Beritelli and M. Schuppisser. Challenges in mobile business solutions for tourist destinations - the trial case of St. Moritz. Journal of Quality Assurance in Hospitality and Tourism, 6(3-4):147–162, 2006. (doi:10.1300/J162v06n03_09)
[18]
J.D. Bitzer and P.J.H. Schröder. The impact of entry and competition by open source software on innovation activity. In The Economics of Open Source Software Development, pages 219–246. Elsevier, 2006. (doi:10.1016/B978-044452769-1/50011-1)
[19]
Stephen M. Blackburn, Robin Garner, Chris Hoffmann, Asjad M. Khang, Kathryn S. McKinley, Rotem Bentzur, Amer Diwan, Daniel Feinberg, Daniel Frampton, Samuel Z. Guyer, Martin Hirzel, Antony Hosking, Maria Jump, Han Lee, J. Eliot, B. Moss, Aashish Phansalkar, Darko Stefanović, Thomas VanDrunen, Daniel von Dincklage, and Ben Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis. ACM SIGPLAN Notices, 41(10):169–190, 2006. OOPSLA '06: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming Languages, Systems, and Applications. (doi:10.1145/1167515.1167488)
[20]
C. Bock and D. Zuehlke. Model-driven HMI development - can meta-case tools relieve the pain? In ICSOFT 2006 - 1st International Conference on Software and Data Technologies, Proceedings, volume 2, pages 312–319, 2006.
[21]
M. Bromba and S. Wetzel. Biometrics and authentication. In Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, pages 369–460. John Wiley & Sons, Inc., 2006. (doi:10.1002/9780470086100.ch10)
[22]
J. Buford, R. Kumar, and G. Perkins. Composition trust bindings in pervasive computing service composition. In Proceedings — Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, volume 2006, pages 261–266, 2006. (doi:10.1109/PERCOMW.2006.31)
[23]
A.A. Bulgak. Analysis and design of split and merge unpaced assembly systems by metamodelling and stochastic search. International Journal of Production Research, 44(18-19):4067–4080, 2006. (doi:10.1080/00207540600564625)
[24]
M.S.E. Burgess, O. Allam, W.A. Gray, and A. Al-Busaidi. Patient-centred approach to focusing online health information search results. In International Symposium on Electronic Personal Health Records 2006, ISePHR 2006, volume 219, 2006.
[25]
Y. Cardenas, J.-M. Pierson, and L. Brunie. Temporal storage space for grids. In High Performance Computing and Communications, pages 803–812, 2006. Lecture Notes in Computer Science 4208. (doi:10.1007/11847366_83)
[26]
Jeffrey Carver, Forrest Shull, and Victor Basili. Can observational techniques help novices overcome the software inspection learning curve? an empirical investigation. Empirical Softw. Engg., 11(4):523–539, 2006. (doi:10.1007/s10664-006-9021-5)
[27]
S. Castano and S. Montanelli. Enforcing a semantic routing mechanism based on peer context matching. In 2nd International Workshop on Contexts and Ontologies: Theory, Practice and Applications, C and O 2006 - Collocated with the 17th European Conference on Artificial Intelligence, ECAI 2006, volume 210, 2006.
[28]
S. Castano, A. Ferrara, and S. Montanelli. A matchmaking-based ontology evolution methodology? In CEUR Workshop Proceedings, volume 200, 2006.
[29]
M. Choi. Exploring requirements for e-learning professionals. In ICE-B 2006 - International Conference on e-Business, Proceedings, pages 323–326, 2006.
[30]
Mohamed R. Chouchane and Arun Lakhotia. Using engine signature to detect metamorphic malware. In WORM '06: Proceedings of the 4th ACM workshop on Recurring malcode, pages 73–78, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1179542.1179558)
[31]
T.-Y. Chung, Y.-H. Chang, K.-H. Chen, and Y.-M. Chen. On high performance file distribution over peer-to-peer networks. In Proceedings of the 10th IASTED International Conference on Internet and Multimedia Systems and Applications, IMSA 2006, pages 158–165, 2006.
[32]
Bas Cornelissen, Arie van Deursen, and Leon Moonen. Aiding in the comprehension of testsuites. In Andy Zaidman, Abdelwahab Hamou-Lhadj, and Orla Greevy, editors, Proceedings of the 2nd Workshop on Program Comprehension through Dynamic Analysis (PCODA'06), pages 17–20. Universiteit Antwerpen, 2006.
[33]
A.F. Da Silva and V.S. Costa. Our experiences with optimizations in Sun's java just-in-time compilers. Journal of Universal Computer Science, 12(7):788–810, 2006.
[34]
V. Darlagiannis, O. Heckmann, and R. Steinmetz. Peer-to-peer applications beyond file sharing: Overlay network requirements and solutions. Elektrotechnik und Informationstechnik, 123(6):242–250, 2006. (doi:10.1007/s00502-006-0345-z)
[35]
S. Datta, C. Giannella, and H. Kargupta. K-means clustering over a large, dynamic network. In Proceedings of the Sixth SIAM International Conference on Data Mining, pages 153–164, 2006.
[36]
Sergio de Cesare, Mark Geoffrey Lycett, and Robert Duncan Macredie. Development of component-based information systems: An introduction. In Development of Component-Based Information Systems, Advances in Management Information Systems, chapter 1, pages 3–20. M. E. Sharpe, 2006.
[37]
Adriaan de Groot, Sebastian Kügler, Paul Adams, and Georgios Gousios. Call for quality: Open source software quality observation. In Proceedings of the Second International Conference on Open Source Systems, June 2006.
[38]
V. Dimopoulos and S. Furnell. A protection profiles approach to risk analysis for small and medium enterprises. IFIP International Federation for Information Processing, 193, 2006.
[39]
C. Duma, M. Karresand, N. Shahmehri, and G. Caronni. A trust-aware, P2P-based overlay for intrusion detection. In 17th International Conference on Database and Expert Systems Applications, DEXA 2006, pages 692–697, 2006.
[40]
Holger Eichelberger. On class diagrams, crossings and metrics. In Michael Jünger, Stephen Kobourov, and Petra Mutzel, editors, Graph Drawing, number 05191 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, 2006.
[41]
Eric Filiol, Marko Helenius, and Stefano Zanero. Open problems in computer virology. Journal in Computer Virology, 1(3):55–66, 2006. (doi:10.1007/s11416-005-0008-3)
[42]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. A novel multi-sender algorithm based on multi-cast concept for P2P networks. In 2006 International Symposium on Communications and Information Technologies, ISCIT, pages 143–147, 2006. (doi:10.1109/ISCIT.2006.339904)
[43]
Daniel Gomes and Mário J. Silva. Modelling information persistence on the web. In ICWE '06: Proceedings of the 6th international conference on Web engineering, pages 193–200, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1145581.1145623)
[44]
Daniel Gomes, André L. Santos, and Má J. Silva. Managing duplicates in a web archive. In SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing, pages 818–825, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1141277.1141465)
[45]
M. Gordon. Small-scale peer-to-peer overlays. Operating Systems Review, 40(3):45–48, 2006. (doi:10.1145/1151374.1151385)
[46]
L. Guo, S. Yang, J. Wang, and J. Zhou. A distributed trust model based on vector space in p2p networks. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 43(9):1564–1570, 2006. (doi:10.1360/crad20060912)
[47]
Maria Håkansson, Lalya Gaye, Sara Ljungblad, and Lars Erik Holmquist. More than meets the eye: an exploratory study of context photography. In NordiCHI '06: Proceedings of the 4th Nordic conference on Human-computer interaction, pages 262–271, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1182475.1182503)
[48]
S. T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. A practical evaluation of security patterns. In 6th International Conference on Artificial Intelligence and Digital Communications (AIDC'2006), August 2006.
[49]
S.T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. Quantitative evaluation of systems with security patterns using a fuzzy approach. In Robert Meersman, Zahir Tari, and Pilar Herrero, editors, On the Move to Meaningful Internet Systems 2006, pages 554–564, 2006. Lecture Notes in Computer Science 4277.
[50]
S. Hao, Z. Yanchun, Z. Jingyuan, E. Beal, and N. Moustakas. Collaborative peer-to-peer service for information sharing using JXTA. In First International Multi-Symposiums on Computer and Computational Sciences, IMSCCS'06, pages 552–559, 2006. (doi:10.1109/IMSCCS.2006.45)
[51]
E. Harjula, J. Ala-Kurikka, D. Howie, and M. Ylianttila. Analysis of peer-to-peer sip in a distributed mobile middleware system. In GLOBECOM - IEEE Global Telecommunications Conference, 2006. (doi:10.1109/GLOCOM.2006.190)
[52]
T.L. Harrison and M.L. Nelson. Just-in-time recovery of missing web pages. In Proceedings of the Seventeenth ACM Conference on Hypertext and Hypermedia, HT'06, volume 2006, pages 145–156, 2006. (doi:10.1145/1149941.1149971)
[53]
Z.-W. Hong, J.-M. Lin, H.C. Jiau, G.-M. Fang, and C.W. Chiou. Encapsulating windows-based software applications into reusable components with design patterns. Information and Software Technology, 48(7):619–629, 2006. (doi:10.1016/j.infsof.2005.06.005)
[54]
M. Huang, L. Yang, and Y. Yang. A development process for building oss-based applications. In Unifying the Software Process Spectrum, pages 122–135. Springer-Verlag, 2006. Lecture Notes in Computer Science 3840. (doi:10.1007/11608035_13)
[55]
Y. Huang, B. Jin, and J. Cao. A distributed approach to construction of topology mismatching aware P2P overlays in wireless ad hoc networks. In Proceedings — 14th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2006, volume 2006, pages 340–347, 2006. (doi:10.1109/PDP.2006.9)
[56]
B. Hughes. Link? rot. URI citation durability in 10 years of AusWeb proceedings. In AusWeb 2006: 12th Australasian World Wide Web Conference, 2006.
[57]
M. Hussain and D. Seret. A comparative study of security protocols validation tools: HERMES vs. AVISPA. In 8th International Conference Advanced Communication Technology, ICACT 2006 — Proceedings, pages 303–308, 2006.
[58]
F. Ichihashi, Y. Sankai, and S. Kuno. Development of secure data management server for ehealth promotion system. International Journal of Sport and Health Science, 4:617–627, 2006.
[59]
S. Jieun and C. Myungae. An approach to realization and security provision of intelligent u-healthcare service. In Proceedings — 2006 International Conference on Hybrid Information Technology, ICHIT 2006, pages 462–467, 2006. (doi:10.1109/ICHIT.2006.253527)
[60]
S. Jieun and C. Myungae. SHOES: Secure healthcare oriented environement service model. In IEEE 2006 Biomedical Circuits and Systems Conference Healthcare Technology, BioCAS 2006, pages 89–93, 2006. (doi:10.1109/BIOCAS.2006.4600315)
[61]
D.W. Johnson and H. Koch. Computer security risks in the internet era: Are small business owners aware and proactive? In Proceedings of the Annual Hawaii International Conference on System Sciences, volume 6, 2006. (doi:10.1109/HICSS.2006.91)
[62]
Yiannis Kanellopoulos, Thimios Dimopulos, Christos Tjortjis, and Christos Makris. Mining source code elements for comprehending object-oriented systems and evaluating their maintainability. ACM SIGKDD Explorations Newsletter, 8(1):33–40, 2006. (doi:10.1145/1147234.1147240)
[63]
I. Kang, H. Kim, S. Choi, M. Baik, and C. Hwang. Multi-node global directory construction in peer-to-peer systems. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, volume 1, pages 713–718, 2006. (doi:10.1109/AINA.2006.236)
[64]
D. Kelly, P. Finnegan, and J. Feller. Open vs. closed standards for ambient intelligence: An exploratory study of adoption. In Proceedings of the 14th European Conference on Information Systems, ECIS 2006, 2006.
[65]
T. Khatiwala, R. Swaminathan, and V.N. Venkatakrishnan. Data sandboxing: A technique for enforcing confidentiality policies. In ACSAC: Annual Computer Security Applications Conference, pages 223–232, 2006. (doi:10.1109/ACSAC.2006.22)
[66]
J.W. Kim and S. Du. Design for an interactive television advertising system. In Proceedings of the Annual Hawaii International Conference on System Sciences, volume 2, page 47, 2006. (doi:10.1109/HICSS.2006.116)
[67]
J. Kim and S. Wu. Design for an interactive television advertising system. In Proceedings of the 39th Hawaii Int. Conf. on System Sciences (HICSS-39), January 2006.
[68]
Doo Yeon Kim, Jong Bae Kim, and Sung Yul Rhew. Effective reuse procedure for open source software. In Software Engineering Research and Practice, pages 163–167. CSREA Press, 2006.
[69]
J. Kim, H. Kim, and K. Park. Towards optimal navigation through video content on interactive TV. Interacting with Computers, 18(4):723–746, 2006. (doi:10.1016/j.intcom.2005.11.011)
[70]
V. King, J. Saia, V. Sanwalani, and E. Vee. Towards secure and scalable computation in peer-to-peer networks. In Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS, pages 87–96, 2006. (doi:10.1109/FOCS.2006.77)
[71]
R. Kolb, D. Muthig, T. Patzke, and K. Yamauchi. Refactoring a legacy component for reuse in a software product line: A case study. Journal of Software Maintenance and Evolution, 18(2):109–132, 2006. (doi:10.1002/smr.329)
[72]
Benjamin N. Lee, Wen-Yen Chen, and Edward Y. Chang. A scalable service for photo annotation, sharing, and search. In MULTIMEDIA '06: Proceedings of the 14th annual ACM international conference on Multimedia, pages 699–702, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1180639.1180787)
[73]
E.K. Lee, S. Maheshwary, J. Mason, and W. Glisson. Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks. Annals of Operations Research, 148(1):25–53, 2006. (doi:10.1007/s10479-006-0087-7)
[74]
E.K. Lee, S. Maheshwary, J. Mason, and W. Glisson. Large-scale dispensing for emergency response to bioterrorism and infectious-disease outbreak. Interfaces, 36(6):591–607, 2006. (doi:10.1287/inte.1060.0257)
[75]
Kyoung Jun Lee, Mu Jeong Jeong, and Jeong-In Ju. Seamlessness and privacy enhanced ubiquitous payment. In E-Commerce and Web Technologies, pages 142–151, 2006. Lecture Notes in Computer Science 4082. (doi:10.1007/11823865_15)
[76]
Kyoung Jun Lee, Jeong-In Ju, and Jeong Mu Jeong. A payment & receipt business model in U-commerce environment. In ICEC '06: Proceedings of the 8th international conference on Electronic commerce, pages 319–324, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1151454.1151507)
[77]
W. Li, L.-C. Lam, and T.-C. Chiueh. How to automatically and accurately sandbox Microsoft IIS. In Proceedings - Annual Computer Security Applications Conference, ACSAC, pages 213–222, 2006. (doi:10.1109/ACSAC.2006.31)
[78]
Zude Li, Guoqiang Zhan, and Xiaojun Ye. Role-based peer-to-peer model: Capture global pseudonymity for privacy protection. In Advances in Web-Age Information Management, pages 193–204. Springer-Verlag, 2006. Lecture Notes in Computer Science 4016. (doi:10.1007/11775300_17)
[79]
C.-C. Liang, C.-H. Wang, H. Luh, and P.-Y. Hsu. A robust web-based approach for broadcasting downward messages in a large-scaled company. In Web Information Systems — WISE 2006, pages 222–233, 2006. Lecture Notes in Computer Science 4255. (doi:10.1007/11912873_24)
[80]
N. Liebau, O. Heckmann, A. Kovacevic, A. Manthe, and R. Steinmetz. Charging in peer-to-peer systems based on a token accounting system. In Burkhard Stiller, Peter Reichl, and Bruno Tuffin, editors, Performability Has its Price, 5th International Workshop on Internet Charging and QoS Technologies, ICQT 2006, St. Malo, France, June 27, 2006, Proceedings, pages 49–60. Springer-Verlag, 2006. Lecture Notes in Computer Science 4033. (doi:10.1007/11780502_6)
[81]
A. Lioy, M. Marian, N. Moltchanova, and M. Pala. PKI past, present and future. International Journal of Information Security, 5(1):18–29, 2006. (doi:10.1007/s10207-005-0077-9)
[82]
Y.-J. Liu, H.-Y. Zhang, W.-H. Dou, and J.-F. Chen. Data allocation algorithms in layered P2P streaming. Ruan Jian Xue Bao/Journal of Software, 17(2):325–332, 2006. (doi:10.1360/jos170325)
[83]
Z. Liu, H. Yu, D. Kundur, and M. Merabti. On peer-to-peer multimedia content access and distribution. In 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings, pages 557–560, 2006. (doi:10.1109/ICME.2006.262469)
[84]
S.-H. Lo, C.-C. Lin, and M.-S. Chen. Controlling digital TV set-top box with mobile devices via an IP network. IEEE Transactions on Consumer Electronics, 52(3):935–942, 2006. (doi:10.1109/TCE.2006.1706491)
[85]
C. Loebbecke, S. Radtke, and C. Huyskens. Innovative media technologies: Digital video recorders changing the ad-TV business model. In Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006, volume 3, pages 1780–1786, 2006.
[86]
W. Lohmann, G. Riedewald, and T. Tuhlke. A light-weight infrastructure to support experimenting with heterogeneous transformations. In .NET Technologies 2006: 4th International Conference, 2006.
[87]
W. Maass and A. Filler. Towards an infrastructure for semantically annotated physical products. In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 2, pages 544–549, 2006.
[88]
Wolfgang Maass and Andreas Filler. Towards an infrastructure for semantically annotated physical products. In Christian Hochberger and Rüdiger Liskowsky, editors, Informatik 2006 — Informatik für Menschen, Band 2, Beiträge der 36. Jahrestagung der Gesellschaft für Informatik e.V. (GI), volume 94 of LNI, pages 544–549, 2006.
[89]
L. Mannila. Progress reports and novices' understanding of program code. In ACM International Conference Proceeding Series, volume 276, pages 27–31, 2006. (doi:10.1145/1315803.1315810)
[90]
A. Manzalini and F. Zambonelli. Towards autonomic and situation-aware communication services: The CASCADAS vision. In DIS 2006: IEEE Workshop on Distributed Intelligent Systems — Collective Intelligence and Its Applications, pages 383–388, 2006. (doi:10.1109/DIS.2006.71)
[91]
I. Martınez-Marchena, L. Mora-López, and M. Sidrach De Cardona. A framework for the development of monitoring systems software. In ICSOFT 2006 - 1st International Conference on Software and Data Technologies, Proceedings, volume 1, pages 133–138, 2006.
[92]
J. Masanés. Web archiving: Issues and methods. In Web Archiving, pages 1–53. Springer Berlin Heidelberg, 2006. (doi:10.1007/978-3-540-46332-0_1)
[93]
Rachit Mathur. Normalizing metamorphic malware using term rewriting. Master's thesis, Louisiana at Lafayette, 2006.
[94]
N. Matsuki and O. Ryabov. A component-based software building environment. In Proceedings of the IASTED International Conference on Software Engineering, as part of the 24th IASTED International Multi-Conference on APPLIED INFORMATICS, pages 133–136, 2006.
[95]
J. E. McEneaney. Agent-based literacy theory. Reading Research Quarterly, 41(3):352–371, 2006. (doi:10.1598/RRQ.41.3.3)
[96]
H. Mei, D.-G. Cao, and F.-Q. Yang. Development of software engineering: A research perspective. Journal of Computer Science and Technology, 21(5):682–696, 2006. (doi:10.1007/s11390-006-0682-8)
[97]
Matthias Merdes and Dirk Dorsch. Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java development. In PPPJ '06: Proceedings of the 4th international symposium on Principles and practice of programming in Java, pages 125–134, New York, NY, USA, 2006. ACM Press. ACM International Conference Proceeding Series 178. (doi:10.1145/1168054.1168072)
[98]
E. Michlmayr, A. Pany, and S. Graf. Applying ant-based multi-agent systems to query routing in distributed environments. IEEE Intelligent Systems, pages 36–41, 2006. (doi:10.1109/IS.2006.348390)
[99]
E. Michlmayr. Ant algorithms for search in unstructured peer-to-peer networks. In 22nd International Conference on Data Engineering Workshops, ICDEW 2006. Institute of Electrical and Electronics Engineers Inc., 2006. (doi:10.1109/ICDEW.2006.29)
[100]
M. Mongiello. Finite-state verification of the ebXML protocol. Electronic Commerce Research and Applications, 5(2):147–169, 2006. (doi:10.1016/j.elerap.2005.09.002)
[101]
S. Montanelli. Emergent communities for semantic collaboration in multi-knowledge environments: Methods and techniques. In 13th Doctoral Consortium - Held at the 18th Conference on Advanced Information Systems, DCCAISE 2006, volume 263, pages 1152–1159. CEUR-WS, 2006.
[102]
J. Močnik, M. Novak, G. Pipan, and P. Karwaczynski. A discovery service for very large, dynamic grids. In e-Science 2006 — Second IEEE International Conference on e-Science and Grid Computing, 2006. (doi:10.1109/E-SCIENCE.2006.261147)
[103]
Bhasker Mukerji, Vinod Kumar, and Uma Kumar. The challenges of adopting open source software in promoting e-government. In ICEG '06: International Conference on E-Governance, pages 22–31, 2006.
[104]
Maurice Mulvenna, Franco Zambonelli, Kevin Curran, and Chris Nugent. Knowledge networks. In Autonomic Communication, pages 99–114. Springer-Verlag, 2006. Lecture Notes in Computer Science 3854. (doi:10.1007/11687818_8)
[105]
Martin Naedele and Thomas E. Koch. Trust and tamper-proof software delivery. In SESS '06: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems, pages 51–58, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1137627.1137636)
[106]
N. Nahas, D. Ait-Kadi, and M. Nourelfath. A new approach for buffer allocation in unreliable production lines. International Journal of Production Economics, 103(2):873–881, 2006. (doi:10.1016/j.ijpe.2006.02.011)
[107]
Paul Nguyen and Robert Chun. Model driven development with interactive use cases and UML models. In Proceedings of The 2006 International Conference on Software Engineering Research & Practice (SERP'06) and Conference on Programming Languages & Compilers (PLC'06), pages 534–540, 2006.
[108]
M. Obrist, R. Bernhaupt, and M. Tscheligi. Users@home: Implications from studying itv. In 20th International Symposium on Human Factors in Telecommunication, 2006.
[109]
P. Ocenasek and M. Sveda. An approach to automated design of security protocols. In Proceedings of the International Conference on Networking, International Conference on Systems andInternational Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, volume 2006, pages 77–85, 2006. (doi:10.1109/ICNICONSMCL.2006.47)
[110]
S. Ovcharenko, Z. Alibhai, C. Ng, W.A. Graver, and D. Sabaz. Implementation of a wireless distributed intelligent system. In Proceedings - DIS 2006: IEEE Workshop on Distributed Intelligent Systems - Collective Intelligence and Its Applications, volume 2006, pages 207–212, 2006. (doi:10.1109/DIS.2006.38)
[111]
W. Pasman and J. Lindenberg. Human-agent service matching using natural language queries: system test and training. Personal and Ubiquitous Computing, 10(6):393–399, 2006. (doi:10.1007/s00779-006-0067-6)
[112]
J.J. Pazos-Arias, M. López-Nores, J. García-Duque, A. Gil-Solla, M. Ramos-Cabrer, Y. Blanco-Fernández, R.P. Díaz-Redondo, and A. Fernández-Vilas. ATLAS: A framework to provide multiuser and distributed t-learning services over MHP. Software — Practice and Experience, 36(8):845–869, 2006. (doi:10.1002/spe.719)
[113]
G. Perera and K. Christensen. Broadcast updates with local look-up search (BULLS): A new peer-to-peer protocol. In Proceedings of the Annual Southeast Conference, volume 2006, pages 124–129, 2006. (doi:10.1145/1185448.1185477)
[114]
T. Perlines Hormann, K. Wrona, and S. Holtmanns. Evaluation of certificate validation mechanisms. Computer Communications, 29(3):291–305, 2006. (doi:10.1016/j.comcom.2004.12.008)
[115]
C. Pescio. Listen to your tools and materials. IEEE Software, 23(5):74–80, 2006. (doi:10.1109/MS.2006.134)
[116]
T. Pfeiffer and M.A. Nowak. Digital cows grazing on digital grounds. Current Biology, 16(22), 2006. (doi:10.1016/j.cub.2006.10.011)
[117]
Chuck Pheatt. Network distributed computing using DCEZ. Journal of Computing Sciences in Colleges, 21(4):9–15, 2006.
[118]
F. Qiu, C. Lin, and H. Yin. EKM: An efficient key management scheme for large-scale peer-to-peer media streaming. In Advances in Multimedia Information Processing — PCM 2006, pages 395–404, 2006. Lecture Notes in Computer Science 4261. (doi:10.1007/11922162_46)
[119]
E. Reategui, C. Fruet, and D.M. Filho. Evaluating the impact of different virtual characters in product recommendations. In Proceedings of the VII Symposium on Human Factors in Computing Systems, IHC 2006, pages 73–80, 2006. (doi:10.1145/1298023.1298034)
[120]
T. Reiter, E. Kapsammer, W. Retschitzegger, W. Schwinger, and M. Stumptner. A generator framework for domain-specific model transformation languages. In ICEIS 2006 - 8th International Conference on Enterprise Information Systems, Proceedings, volume ISAS, pages 27–35, 2006.
[121]
Phillip Anthony Relf. Source Code Readability Improvement Using Heuristic-Based Dynamic Error Reporting During Editing. PhD thesis, University of Technology, Sydney, 2006.
[122]
F. Ricca and P. Tonella. Reverse engineering di sistemi software limiti e potenzialità (reverse engineering of software systems limits and potential). Mondo Digitale, 5(3):52–63, 2006.
[123]
L. Rodero-Merino, L. López, A. Fernández, and V. Cholvi. A topology self-adaptation mechanism for efficient resource location. 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, 4330:660–671, 2006.
[124]
K. Ronasi, M.H. Firooz, M.R. Pakravan, and A.N. Avanaki. A fast algorithm for construction of minimum delay multicast trees in P2P networks. In 2006 International Symposium on Communications and Information Technologies, ISCIT, pages 137–142, 2006. (doi:10.1109/ISCIT.2006.339903)
[125]
Jonathan B. Rosenberg, John C. Harrison, David L. Remy, and Neal L. Creighton, Jr. Web site identity assurance. United States Patent 7,114,177, September 2006. Assignee: GeoTrust, Inc. (Portland, OR).
[126]
C. Roser, M. Nakano, and M. Tanaka. Single simulation buffer optimization. JSME International Journal, Series C: Mechanical Systems, Machine Elements and Manufacturing, 48(4):763–768, 2006. (doi:10.1299/jsmec.48.763)
[127]
F. Rotar and A. Sluga. Razvoj generi^cne strukture in programskih modulov elementarnega delovnega sistema porazdeljenega tiskanja / development of the generic structure and programming modules of an elementary work system for distributed printing. Strojniski Vestnik / Journal of Mechanical Engineering, 52(9):599–612, September 2006.
[128]
I. Sabuncuoglu, E. Erel, and Y. Gocgun. Analysis of serial production lines: Characterisation study and a new heuristic procedure for optimal buffer allocation. International Journal of Production Research, 44(13):2499–2523, 2006. (doi:10.1080/00207540500465535)
[129]
Helmut Salmen. Method and apparatus for restricted run-time environment with dynamic user context. United States Patent 7,069,275, June 2006. Assignee: Sun Microsystems, Inc. (Santa Clara, CA).
[130]
M. Savsar. Buffer allocation in serial production lines with preventive and corrective maintenance operations. Kuwait Journal of Science and Engineering, 33(2):253–266, 2006.
[131]
C. Schmitz and A. Löser. How to model semantic peer-to-peer overlays? In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1, pages 12–19, 2006.
[132]
Adrian Schröter, Thomas Zimmermann, Rahul Premraj, and Andreas Zeller. If your bug database could talk... In Proceedings of the 5th International Symposium on Empirical Software Engineering, September 2006.
[133]
A. Seshadri, M. Luk, A. Perrig, L. Van Doorn, and P. Khosla. Scuba: Secure code update by attestation in sensor networks. In WiSE 2006 — Proceedings of the 5th ACM Workshop on Wireless Security, volume 2006, pages 85–94, 2006.
[134]
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. SCUBA: Secure code update by attestation in sensor networks. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless Security, pages 85–94, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1161289.1161306)
[135]
W. Shi and Y. Mao. Performance evaluation of peer-to-peer web caching systems. Journal of Systems and Software, 79(5):714–726, 2006. (doi:10.1016/j.jss.2005.08.012)
[136]
S. Sidiroglou and A.D. Keromytis. Execution transactions for defending against software failures: Use and evaluation. International Journal of Information Security, 5(2):77–91, 2006. (doi:10.1007/s10207-006-0083-6)
[137]
S. Simmons, D. Edwards, N. Wilde, J. Homan, and M. Groble. Industrial tools for the feature location problem: An exploratory study. Journal of Software Maintenance and Evolution, 18(6):457–474, 2006. (doi:10.1002/smr.338)
[138]
S. Smith and R. Jamieson. Determining key factors in e-government information system security. Information Systems Management, 23(2):23–32, 2006. (doi:10.1201/1078.10580530/45925.23.2.20060301/92671.4)
[139]
C. Song and M. Chun. An approach to realization and security provision ofintelligent U-Healthcare service. In Proceedings of the ICHIT'06 2006 Conference on Hybrid Information Technology, pages 462–467, 2006.
[140]
C. Song and V. Sazawal. Information-hiding URLs for easier website evolution. In Proceedings of the Eighth IEEE International Symposium on Web Site Evolution, WSE 2006, pages 95–102, 2006. (doi:10.1109/WSE.2006.10)
[141]
C. Squarr, J. Brunn, and G. Wirtz. Adaptive search in a semi-structured peer-to-peer system. In IEEE International Conference on Computer Systems and Applications, pages 25–32, 2006.
[142]
E. Stavrou and A. Pitsillides. Securing mobile healthcare systems based on information classification: DITIS case study. In Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006, pages 67–79, 2006.
[143]
R. Steele and W. Tao. An enhanced architecture for mobile retailing. In ACM International Conference Proceeding Series, volume 270, 2006. (doi:10.1145/1292331.1292367)
[144]
A. Stefani, B. Vassiliadis, and M. Xenos. On the quality assessment of advanced e-learning services. Interactive Technology and Smart Education, 3(3):237–250, 2006. (doi:10.1108/17415650680001449)
[145]
H. Stuckenschmidt, F. Van Harmelen, W. Siberski, and S. Staab. Peer-to -peer and semantic web. In Semantic Web and Peer-to-Peer: Decentralized Management and Exchange of Knowledge and Information, pages 1–17. Springer Berlin Heidelberg, 2006. (doi:10.1007/3-540-28347-1_1)
[146]
Miquel Termens. DOI: The "Big Brother" in the dissemination of scientific documentation. International Microbiology, 9(2):139–142, 2006.
[147]
G.H. Tolosa, J.A. Peri, and F.R.A. Bordignon. Peer-to-peer content search supported by a distributed index in a publication/search model. Journal of Digital Information Management, 4(3):175–183, 2006.
[148]
N. Tomaiuolo. DOIs, URLs, LoCKSS, and missing links. Searcher:Magazine for Database Professionals, 14(7):18–23, 2006.
[149]
M. Treaster, W. Conner, I. Gupta, and K. Nahrstedt. Contagalert: Using contagion theory for adaptive, distributed alert propagation. In Proceedings — Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, volume 2006, pages 126–133, 2006. (doi:10.1109/NCA.2006.20)
[150]
V. Vaishnavi, A. Vandenberg, R. Baskerville, and G. Zheng. TQN: A novel approach to generating information security data. In 16th Workshop on Information Technologies and Systems, WITS 2006, pages 187–192. Social Science Research Network, 2006.
[151]
Gabriel Vanrenen, Sean Smith, and John Marchesini. Distributing security-mediated PKI. International Journal of Information Security, 5(1):3–17, January 2006. (doi:10.1007/s10207-005-0076-x)
[152]
B. Vassiliadis, V. Fotopoulos, and A.N. Skodras. Decentralising the digital rights management value chain by means of distributed license catalogues. In Artificial Intelligence Applications and Innovations, volume 204 of IFIP International Federation for Information Processing, pages 689–696. Springer Verlag, 2006. (doi:10.1007/0-387-34224-9_81)
[153]
H. Wada, J. Suzuki, K. Oba, S. Takada, and N. Doi. mTurnpike: A model-driven framework for domain specific software development. Computer Software, 23(3):158–169, 2006.
[154]
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, and Arun Lakhotia. Normalizing metamorphic malware using term rewriting. In SCAM '06: Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation, pages 75–84, Washington, DC, USA, 2006. IEEE Computer Society. (doi:10.1109/SCAM.2006.20)
[155]
H. Wang, S. Tan, S. Tang, D. Yang, and Y. Tong. File correspondences dictionary construction in multilingual p2p file sharing systems. In Ulf Leser, Felix Naumann, and Barbara A. Eckman, editors, Data Integration in the Life Sciences, Third International Workshop, DILS 2006, pages 144–152, July 2006. Lecture Notes in Computer Science 4097. (doi:10.1007/11807964_15)
[156]
M. Wang, S. Zhang, J. Zhou, and H. Zhao. An architecture of semantic desktop data grid. In Proceedings — 2006 10th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006, pages 1082–1087, 2006. (doi:10.1109/CSCWD.2006.253210)
[157]
S.-T. Wang, J.-L.C. Wu, and C.-Y. Hsu. Design of a resource advertisement and discovery protocol for large and dense manets. Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an, 29(7):1161–1171, 2006.
[158]
Rainer Wasinger and Wolfgang Wahlster. The anthropomorphized product shelf: Symmetric multimodal interaction with instrumented environments. In E.H.L. Aarts and J.L. Encarnaç ao, editors, True Visions: The Emergence of Ambient Intelligence. Springer-Verlag, 2006.
[159]
S.M. White. Requirements for distributed mission-critical decision support systems. In Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems, pages 123–129, 2006. (doi:10.1109/ECBS.2006.61)
[160]
K. Wilson and P. Machanick. SecureTorrent: A security framework for file swarming. In Advances in Computer Systems Architecture, pages 538–544, 2006. Lecture Notes in Computer Science 4186. (doi:10.1007/11859802_55)
[161]
Greg Wilson. Software carpentry: Getting scientists to write better code by making them more productive. Computing in Science and Engineering, 8(6):66–69, November/December 2006. (doi:10.1109/MCSE.2006.122)
[162]
W. Wong and M. Stamp. Hunting for metamorphic engines. Journal in Computer Virology, 2(3):211–229, 2006. (doi:10.1007/s11416-006-0028-7)
[163]
J.D. Wren, J.E. Grissom, and T. Conway. E-mail decay rates among corresponding authors in medline. EMBO Reports, 7(2):122–127, 2006. (doi:10.1038/sj.embor.7400631)
[164]
J.D. Wren, K.R. Johnson, D.M. Crockett, L.F. Heilig, L.M. Schilling, and R.P. Dellavalle. Uniform resource locator decay in dermatology journals: Author attitudes and preservation practices. Archives of Dermatology, 142(9):1147–1152, 2006. (doi:10.1001/archderm.142.9.1147)
[165]
Shlomo Wygodny, Valery Golender, Ido Ben-Moshe, and Vladimir Andreev. System and method for conditional tracing of computer programs. United States Patent 7,058,928, June 2006. Assignee: Identify Software Ltd.(IL).
[166]
T. Yamakami. Empirical long-term observation on the mobile web update frequency. In 2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006. (doi:10.1109/WOCN.2006.1666603)
[167]
Gang YANG, Xingshe ZHOU, and Huifang PAN. Feedback-based framework of adaptive threads-pool management. Computer Engineering, 32(5):65–67, 2006. In Chinese.
[168]
Niteen Yemul. The tools at hand. ACM Computing Reviews, 47(2), February 2006.
[169]
I. You and C. Park. An analysis on the web technologies for dynamically generating web-based user interfaces in ubiquitous spaces. In Ulf Leser, Felix Naumann, and Barbara A. Eckman, editors, Data Integration in the Life Sciences, Third International Workshop, DILS 2006, pages 639–649, July 2006. Lecture Notes in Computer Science 4097. (doi:10.1007/11807964_65)
[170]
X. Zeng, A.O. Fapojuwo, and R.J. Davies. Design and performance evaluation of voice activated wireless home devices. IEEE Transactions on Consumer Electronics, 52(3):983–989, 2006. (doi:10.1109/TCE.2006.1706497)
[171]
H.L. Zhang, C.H.C. Leung, and G.K. Raikundalia. Performance analysis of network topologies in agent-based open connectivity architecture for DSS. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, volume 2, pages 257–261, 2006. (doi:10.1109/AINA.2006.266)
[172]
M. Zhao and S.W. Smith. Modeling and evaluation of certification path discovery in the emerging global PKI. In Andrea S. Atzeni and Antonio Lioy, editors, Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pages 16–30. Springer-Verlag, 2006. Lecture Notes in Computer Science 4043.
[173]
J. Zhou and M. Wang. Semantic integration of enterprise information: Challenges and basic principles. In The Semantic Web — ASWC 2006, volume 4185 LNCS, pages 219–233, 2006. Lecture Notes in Computer Science 4185. (doi:10.1007/11836025_23)
[1]
E. Aarts and J. Encarnação. True visions: The emergence of ambient intelligence. Springer Berlin Heidelberg, 2006. (doi:10.1007/978-3-540-28974-6)

[2]
M. Abdullah, M. Othman, and R. Johari. An improved simulated annealing algorithm to avoid crosstalk in optical omega network. In 2006 International Conference on Computing and Informatics, ICOCI '06, 2006. (doi:10.1109/ICOCI.2006.5276543)

[3]
A.A. Abimbola, J.M. Munoz, and W.J. Buchanan. Nethost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4):166–175, 2006. (doi:10.1016/j.istr.2006.10.003)

[4]
N. Abu-Ghazaleh and M.J. Lewis. Short paper: Toward self organizing grids. In Proceedings of the IEEE International Symposium on High Performance Distributed Computing, volume 2006, pages 324–327, 2006.

[5]
J. Abu Qudeiri, H. Yamamoto, and M.A. Jamali. Buffer size decision for balanced and unbalanced flexible transfer line with rework paths. In ICPMT2006 — Progress of Machining Technology — Proceedings of the 8th International Conference on Progress of Machining Technology, pages 77–80, 2006.

[6]
R. Agrawal, A. Cheung, K. Kailing, and S. Schönauer. Towards traceability across sovereign, distributed rfid databases. In IDEAS: Proceedings of the International Database Engineering and Applications Symposium, pages 174–184, 2006. (doi:10.1109/IDEAS.2006.47)

[7]
Neta Aizenbud-Reshef and Gabi Zodik. Coverage analysis of message flows. United States Patent 7,137,103, November 2006. Assignee: International Business Machines Corporation (Armonk, NY).

[8]
R. Akavipat, L.-S. Wu, F. Menczer, and A.G. Maguitman. Emerging semantic communities in peer web search. In P2PIR 2006: International Workshop on Information Retrieval in Peer-to-Peer Networks, pages 1–8, 2006. (doi:10.1145/1183579.1183581)

[9]
Ruo Ando, Nguyen Anh Quynh, and Yoshiyasu Takefuji. Faster resolution based metamorphic virus detection using ATP control strategy. WSEAS Transactions on Information Science and Applications, 3(2):260–226, February 2006.

[10]
E. Balland, C. Kirchner, and P.-E. Moreau. Formal islands. In Algebraic Methodology and Software Technology, pages 51–65. Springer-Verlag, 2006. Lecture Notes in Computer Science 4019. (doi:10.1007/11784180_7)

[11]
U. Basters and M. Klusch. RS2D: Fast adaptive search for semantic web services in unstructured P2P networks. In 5th International Semantic Web Conference — ISWC '06, pages 87–100, 2006. Lecture Notes in Computer Science 4273. (doi:10.1007/11926078_7)

[12]
A.S. Baumgart, H. Knapp, and M. Schader. Mobile semantic data exchange in ad hoc networks using distributed profiles. In 2006 1st International Symposium on Wireless Pervasive Computing, volume 2006, pages 1–6, January 2006. (doi:10.1109/ISWPC.2006.1613649)

[13]
Douglas Beattie, Neal Creighton, Jr., Christopher Bailey, David Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 7,120,929, October 2006. Assignee: GeoTrust, Inc. (Wellesley Hills, MA).

[14]
Douglas D. Beattie, Neal Lewis Creighton, Jr., Christopher T. M. Bailey, David L. Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 7,003,661, February 2006. Assignee: Geotrust, Inc. (Needham, MA).

[15]
M.V. Belmonte, R. Conejo, M. Díaz, and J.L. Pérez-de-la Cruz. Coalition formation in P2P file sharing systems. In Current Topics in Artificial Intelligence, pages 153–162, 2006. Lecture Notes in Computer Science 4177. (doi:10.1007/11881216_17)

[16]
Y. Ben-Asher and S. Berkovsky. Semantic data management in peer-to-peer e-commerce applications. Journal on Data Semantics, VI:115–142, 2006. Lecture Notes in Computer Science 4090. (doi:10.1007/11803034_6)

[17]
P. Beritelli and M. Schuppisser. Challenges in mobile business solutions for tourist destinations - the trial case of St. Moritz. Journal of Quality Assurance in Hospitality and Tourism, 6(3-4):147–162, 2006. (doi:10.1300/J162v06n03_09)

[18]
J.D. Bitzer and P.J.H. Schröder. The impact of entry and competition by open source software on innovation activity. In The Economics of Open Source Software Development, pages 219–246. Elsevier, 2006. (doi:10.1016/B978-044452769-1/50011-1)

[19]
Stephen M. Blackburn, Robin Garner, Chris Hoffmann, Asjad M. Khang, Kathryn S. McKinley, Rotem Bentzur, Amer Diwan, Daniel Feinberg, Daniel Frampton, Samuel Z. Guyer, Martin Hirzel, Antony Hosking, Maria Jump, Han Lee, J. Eliot, B. Moss, Aashish Phansalkar, Darko Stefanović, Thomas VanDrunen, Daniel von Dincklage, and Ben Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis. ACM SIGPLAN Notices, 41(10):169–190, 2006. OOPSLA '06: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming Languages, Systems, and Applications. (doi:10.1145/1167515.1167488)

[20]
C. Bock and D. Zuehlke. Model-driven HMI development - can meta-case tools relieve the pain? In ICSOFT 2006 - 1st International Conference on Software and Data Technologies, Proceedings, volume 2, pages 312–319, 2006.

[21]
M. Bromba and S. Wetzel. Biometrics and authentication. In Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, pages 369–460. John Wiley & Sons, Inc., 2006. (doi:10.1002/9780470086100.ch10)

[22]
J. Buford, R. Kumar, and G. Perkins. Composition trust bindings in pervasive computing service composition. In Proceedings — Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, volume 2006, pages 261–266, 2006. (doi:10.1109/PERCOMW.2006.31)

[23]
A.A. Bulgak. Analysis and design of split and merge unpaced assembly systems by metamodelling and stochastic search. International Journal of Production Research, 44(18-19):4067–4080, 2006. (doi:10.1080/00207540600564625)

[24]
M.S.E. Burgess, O. Allam, W.A. Gray, and A. Al-Busaidi. Patient-centred approach to focusing online health information search results. In International Symposium on Electronic Personal Health Records 2006, ISePHR 2006, volume 219, 2006.

[25]
Y. Cardenas, J.-M. Pierson, and L. Brunie. Temporal storage space for grids. In High Performance Computing and Communications, pages 803–812, 2006. Lecture Notes in Computer Science 4208. (doi:10.1007/11847366_83)

[26]
Jeffrey Carver, Forrest Shull, and Victor Basili. Can observational techniques help novices overcome the software inspection learning curve? an empirical investigation. Empirical Softw. Engg., 11(4):523–539, 2006. (doi:10.1007/s10664-006-9021-5)

[27]
S. Castano and S. Montanelli. Enforcing a semantic routing mechanism based on peer context matching. In 2nd International Workshop on Contexts and Ontologies: Theory, Practice and Applications, C and O 2006 - Collocated with the 17th European Conference on Artificial Intelligence, ECAI 2006, volume 210, 2006.

[28]
S. Castano, A. Ferrara, and S. Montanelli. A matchmaking-based ontology evolution methodology? In CEUR Workshop Proceedings, volume 200, 2006.

[29]
M. Choi. Exploring requirements for e-learning professionals. In ICE-B 2006 - International Conference on e-Business, Proceedings, pages 323–326, 2006.

[30]
Mohamed R. Chouchane and Arun Lakhotia. Using engine signature to detect metamorphic malware. In WORM '06: Proceedings of the 4th ACM workshop on Recurring malcode, pages 73–78, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1179542.1179558)

[31]
T.-Y. Chung, Y.-H. Chang, K.-H. Chen, and Y.-M. Chen. On high performance file distribution over peer-to-peer networks. In Proceedings of the 10th IASTED International Conference on Internet and Multimedia Systems and Applications, IMSA 2006, pages 158–165, 2006.

[32]
Bas Cornelissen, Arie van Deursen, and Leon Moonen. Aiding in the comprehension of testsuites. In Andy Zaidman, Abdelwahab Hamou-Lhadj, and Orla Greevy, editors, Proceedings of the 2nd Workshop on Program Comprehension through Dynamic Analysis (PCODA'06), pages 17–20. Universiteit Antwerpen, 2006.

[33]
A.F. Da Silva and V.S. Costa. Our experiences with optimizations in Sun's java just-in-time compilers. Journal of Universal Computer Science, 12(7):788–810, 2006.

[34]
V. Darlagiannis, O. Heckmann, and R. Steinmetz. Peer-to-peer applications beyond file sharing: Overlay network requirements and solutions. Elektrotechnik und Informationstechnik, 123(6):242–250, 2006. (doi:10.1007/s00502-006-0345-z)

[35]
S. Datta, C. Giannella, and H. Kargupta. K-means clustering over a large, dynamic network. In Proceedings of the Sixth SIAM International Conference on Data Mining, pages 153–164, 2006.

[36]
Sergio de Cesare, Mark Geoffrey Lycett, and Robert Duncan Macredie. Development of component-based information systems: An introduction. In Development of Component-Based Information Systems, Advances in Management Information Systems, chapter 1, pages 3–20. M. E. Sharpe, 2006.

[37]
Adriaan de Groot, Sebastian Kügler, Paul Adams, and Georgios Gousios. Call for quality: Open source software quality observation. In Proceedings of the Second International Conference on Open Source Systems, June 2006.

[38]
V. Dimopoulos and S. Furnell. A protection profiles approach to risk analysis for small and medium enterprises. IFIP International Federation for Information Processing, 193, 2006.

[39]
C. Duma, M. Karresand, N. Shahmehri, and G. Caronni. A trust-aware, P2P-based overlay for intrusion detection. In 17th International Conference on Database and Expert Systems Applications, DEXA 2006, pages 692–697, 2006.

[40]
Holger Eichelberger. On class diagrams, crossings and metrics. In Michael Jünger, Stephen Kobourov, and Petra Mutzel, editors, Graph Drawing, number 05191 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, 2006.

[41]
Eric Filiol, Marko Helenius, and Stefano Zanero. Open problems in computer virology. Journal in Computer Virology, 1(3):55–66, 2006. (doi:10.1007/s11416-005-0008-3)

[42]
M.H. Firooz, K. Ronasi, M.R. Pakravan, and A.N. Avanaki. A novel multi-sender algorithm based on multi-cast concept for P2P networks. In 2006 International Symposium on Communications and Information Technologies, ISCIT, pages 143–147, 2006. (doi:10.1109/ISCIT.2006.339904)

[43]
Daniel Gomes and Mário J. Silva. Modelling information persistence on the web. In ICWE '06: Proceedings of the 6th international conference on Web engineering, pages 193–200, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1145581.1145623)

[44]
Daniel Gomes, André L. Santos, and Má J. Silva. Managing duplicates in a web archive. In SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing, pages 818–825, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1141277.1141465)

[45]
M. Gordon. Small-scale peer-to-peer overlays. Operating Systems Review, 40(3):45–48, 2006. (doi:10.1145/1151374.1151385)

[46]
L. Guo, S. Yang, J. Wang, and J. Zhou. A distributed trust model based on vector space in p2p networks. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 43(9):1564–1570, 2006. (doi:10.1360/crad20060912)

[47]
Maria Håkansson, Lalya Gaye, Sara Ljungblad, and Lars Erik Holmquist. More than meets the eye: an exploratory study of context photography. In NordiCHI '06: Proceedings of the 4th Nordic conference on Human-computer interaction, pages 262–271, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1182475.1182503)

[48]
S. T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. A practical evaluation of security patterns. In 6th International Conference on Artificial Intelligence and Digital Communications (AIDC'2006), August 2006.

[49]
S.T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. Quantitative evaluation of systems with security patterns using a fuzzy approach. In Robert Meersman, Zahir Tari, and Pilar Herrero, editors, On the Move to Meaningful Internet Systems 2006, pages 554–564, 2006. Lecture Notes in Computer Science 4277.

[50]
S. Hao, Z. Yanchun, Z. Jingyuan, E. Beal, and N. Moustakas. Collaborative peer-to-peer service for information sharing using JXTA. In First International Multi-Symposiums on Computer and Computational Sciences, IMSCCS'06, pages 552–559, 2006. (doi:10.1109/IMSCCS.2006.45)

[51]
E. Harjula, J. Ala-Kurikka, D. Howie, and M. Ylianttila. Analysis of peer-to-peer sip in a distributed mobile middleware system. In GLOBECOM - IEEE Global Telecommunications Conference, 2006. (doi:10.1109/GLOCOM.2006.190)

[52]
T.L. Harrison and M.L. Nelson. Just-in-time recovery of missing web pages. In Proceedings of the Seventeenth ACM Conference on Hypertext and Hypermedia, HT'06, volume 2006, pages 145–156, 2006. (doi:10.1145/1149941.1149971)

[53]
Z.-W. Hong, J.-M. Lin, H.C. Jiau, G.-M. Fang, and C.W. Chiou. Encapsulating windows-based software applications into reusable components with design patterns. Information and Software Technology, 48(7):619–629, 2006. (doi:10.1016/j.infsof.2005.06.005)

[54]
M. Huang, L. Yang, and Y. Yang. A development process for building oss-based applications. In Unifying the Software Process Spectrum, pages 122–135. Springer-Verlag, 2006. Lecture Notes in Computer Science 3840. (doi:10.1007/11608035_13)

[55]
Y. Huang, B. Jin, and J. Cao. A distributed approach to construction of topology mismatching aware P2P overlays in wireless ad hoc networks. In Proceedings — 14th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2006, volume 2006, pages 340–347, 2006. (doi:10.1109/PDP.2006.9)

[56]
B. Hughes. Link? rot. URI citation durability in 10 years of AusWeb proceedings. In AusWeb 2006: 12th Australasian World Wide Web Conference, 2006.

[57]
M. Hussain and D. Seret. A comparative study of security protocols validation tools: HERMES vs. AVISPA. In 8th International Conference Advanced Communication Technology, ICACT 2006 — Proceedings, pages 303–308, 2006.

[58]
F. Ichihashi, Y. Sankai, and S. Kuno. Development of secure data management server for ehealth promotion system. International Journal of Sport and Health Science, 4:617–627, 2006.

[59]
S. Jieun and C. Myungae. An approach to realization and security provision of intelligent u-healthcare service. In Proceedings — 2006 International Conference on Hybrid Information Technology, ICHIT 2006, pages 462–467, 2006. (doi:10.1109/ICHIT.2006.253527)

[60]
S. Jieun and C. Myungae. SHOES: Secure healthcare oriented environement service model. In IEEE 2006 Biomedical Circuits and Systems Conference Healthcare Technology, BioCAS 2006, pages 89–93, 2006. (doi:10.1109/BIOCAS.2006.4600315)

[61]
D.W. Johnson and H. Koch. Computer security risks in the internet era: Are small business owners aware and proactive? In Proceedings of the Annual Hawaii International Conference on System Sciences, volume 6, 2006. (doi:10.1109/HICSS.2006.91)

[62]
Yiannis Kanellopoulos, Thimios Dimopulos, Christos Tjortjis, and Christos Makris. Mining source code elements for comprehending object-oriented systems and evaluating their maintainability. ACM SIGKDD Explorations Newsletter, 8(1):33–40, 2006. (doi:10.1145/1147234.1147240)

[63]
I. Kang, H. Kim, S. Choi, M. Baik, and C. Hwang. Multi-node global directory construction in peer-to-peer systems. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, volume 1, pages 713–718, 2006. (doi:10.1109/AINA.2006.236)

[64]
D. Kelly, P. Finnegan, and J. Feller. Open vs. closed standards for ambient intelligence: An exploratory study of adoption. In Proceedings of the 14th European Conference on Information Systems, ECIS 2006, 2006.

[65]
T. Khatiwala, R. Swaminathan, and V.N. Venkatakrishnan. Data sandboxing: A technique for enforcing confidentiality policies. In ACSAC: Annual Computer Security Applications Conference, pages 223–232, 2006. (doi:10.1109/ACSAC.2006.22)

[66]
J.W. Kim and S. Du. Design for an interactive television advertising system. In Proceedings of the Annual Hawaii International Conference on System Sciences, volume 2, page 47, 2006. (doi:10.1109/HICSS.2006.116)

[67]
J. Kim and S. Wu. Design for an interactive television advertising system. In Proceedings of the 39th Hawaii Int. Conf. on System Sciences (HICSS-39), January 2006.

[68]
Doo Yeon Kim, Jong Bae Kim, and Sung Yul Rhew. Effective reuse procedure for open source software. In Software Engineering Research and Practice, pages 163–167. CSREA Press, 2006.

[69]
J. Kim, H. Kim, and K. Park. Towards optimal navigation through video content on interactive TV. Interacting with Computers, 18(4):723–746, 2006. (doi:10.1016/j.intcom.2005.11.011)

[70]
V. King, J. Saia, V. Sanwalani, and E. Vee. Towards secure and scalable computation in peer-to-peer networks. In Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS, pages 87–96, 2006. (doi:10.1109/FOCS.2006.77)

[71]
R. Kolb, D. Muthig, T. Patzke, and K. Yamauchi. Refactoring a legacy component for reuse in a software product line: A case study. Journal of Software Maintenance and Evolution, 18(2):109–132, 2006. (doi:10.1002/smr.329)

[72]
Benjamin N. Lee, Wen-Yen Chen, and Edward Y. Chang. A scalable service for photo annotation, sharing, and search. In MULTIMEDIA '06: Proceedings of the 14th annual ACM international conference on Multimedia, pages 699–702, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1180639.1180787)

[73]
E.K. Lee, S. Maheshwary, J. Mason, and W. Glisson. Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks. Annals of Operations Research, 148(1):25–53, 2006. (doi:10.1007/s10479-006-0087-7)

[74]
E.K. Lee, S. Maheshwary, J. Mason, and W. Glisson. Large-scale dispensing for emergency response to bioterrorism and infectious-disease outbreak. Interfaces, 36(6):591–607, 2006. (doi:10.1287/inte.1060.0257)

[75]
Kyoung Jun Lee, Mu Jeong Jeong, and Jeong-In Ju. Seamlessness and privacy enhanced ubiquitous payment. In E-Commerce and Web Technologies, pages 142–151, 2006. Lecture Notes in Computer Science 4082. (doi:10.1007/11823865_15)

[76]
Kyoung Jun Lee, Jeong-In Ju, and Jeong Mu Jeong. A payment & receipt business model in U-commerce environment. In ICEC '06: Proceedings of the 8th international conference on Electronic commerce, pages 319–324, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1151454.1151507)

[77]
W. Li, L.-C. Lam, and T.-C. Chiueh. How to automatically and accurately sandbox Microsoft IIS. In Proceedings - Annual Computer Security Applications Conference, ACSAC, pages 213–222, 2006. (doi:10.1109/ACSAC.2006.31)

[78]
Zude Li, Guoqiang Zhan, and Xiaojun Ye. Role-based peer-to-peer model: Capture global pseudonymity for privacy protection. In Advances in Web-Age Information Management, pages 193–204. Springer-Verlag, 2006. Lecture Notes in Computer Science 4016. (doi:10.1007/11775300_17)

[79]
C.-C. Liang, C.-H. Wang, H. Luh, and P.-Y. Hsu. A robust web-based approach for broadcasting downward messages in a large-scaled company. In Web Information Systems — WISE 2006, pages 222–233, 2006. Lecture Notes in Computer Science 4255. (doi:10.1007/11912873_24)

[80]
N. Liebau, O. Heckmann, A. Kovacevic, A. Manthe, and R. Steinmetz. Charging in peer-to-peer systems based on a token accounting system. In Burkhard Stiller, Peter Reichl, and Bruno Tuffin, editors, Performability Has its Price, 5th International Workshop on Internet Charging and QoS Technologies, ICQT 2006, St. Malo, France, June 27, 2006, Proceedings, pages 49–60. Springer-Verlag, 2006. Lecture Notes in Computer Science 4033. (doi:10.1007/11780502_6)

[81]
A. Lioy, M. Marian, N. Moltchanova, and M. Pala. PKI past, present and future. International Journal of Information Security, 5(1):18–29, 2006. (doi:10.1007/s10207-005-0077-9)

[82]
Y.-J. Liu, H.-Y. Zhang, W.-H. Dou, and J.-F. Chen. Data allocation algorithms in layered P2P streaming. Ruan Jian Xue Bao/Journal of Software, 17(2):325–332, 2006. (doi:10.1360/jos170325)

[83]
Z. Liu, H. Yu, D. Kundur, and M. Merabti. On peer-to-peer multimedia content access and distribution. In 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings, pages 557–560, 2006. (doi:10.1109/ICME.2006.262469)

[84]
S.-H. Lo, C.-C. Lin, and M.-S. Chen. Controlling digital TV set-top box with mobile devices via an IP network. IEEE Transactions on Consumer Electronics, 52(3):935–942, 2006. (doi:10.1109/TCE.2006.1706491)

[85]
C. Loebbecke, S. Radtke, and C. Huyskens. Innovative media technologies: Digital video recorders changing the ad-TV business model. In Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006, volume 3, pages 1780–1786, 2006.

[86]
W. Lohmann, G. Riedewald, and T. Tuhlke. A light-weight infrastructure to support experimenting with heterogeneous transformations. In .NET Technologies 2006: 4th International Conference, 2006.

[87]
W. Maass and A. Filler. Towards an infrastructure for semantically annotated physical products. In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 2, pages 544–549, 2006.

[88]
Wolfgang Maass and Andreas Filler. Towards an infrastructure for semantically annotated physical products. In Christian Hochberger and Rüdiger Liskowsky, editors, Informatik 2006 — Informatik für Menschen, Band 2, Beiträge der 36. Jahrestagung der Gesellschaft für Informatik e.V. (GI), volume 94 of LNI, pages 544–549, 2006.

[89]
L. Mannila. Progress reports and novices' understanding of program code. In ACM International Conference Proceeding Series, volume 276, pages 27–31, 2006. (doi:10.1145/1315803.1315810)

[90]
A. Manzalini and F. Zambonelli. Towards autonomic and situation-aware communication services: The CASCADAS vision. In DIS 2006: IEEE Workshop on Distributed Intelligent Systems — Collective Intelligence and Its Applications, pages 383–388, 2006. (doi:10.1109/DIS.2006.71)

[91]
I. Martınez-Marchena, L. Mora-López, and M. Sidrach De Cardona. A framework for the development of monitoring systems software. In ICSOFT 2006 - 1st International Conference on Software and Data Technologies, Proceedings, volume 1, pages 133–138, 2006.

[92]
J. Masanés. Web archiving: Issues and methods. In Web Archiving, pages 1–53. Springer Berlin Heidelberg, 2006. (doi:10.1007/978-3-540-46332-0_1)

[93]
Rachit Mathur. Normalizing metamorphic malware using term rewriting. Master's thesis, Louisiana at Lafayette, 2006.

[94]
N. Matsuki and O. Ryabov. A component-based software building environment. In Proceedings of the IASTED International Conference on Software Engineering, as part of the 24th IASTED International Multi-Conference on APPLIED INFORMATICS, pages 133–136, 2006.

[95]
J. E. McEneaney. Agent-based literacy theory. Reading Research Quarterly, 41(3):352–371, 2006. (doi:10.1598/RRQ.41.3.3)

[96]
H. Mei, D.-G. Cao, and F.-Q. Yang. Development of software engineering: A research perspective. Journal of Computer Science and Technology, 21(5):682–696, 2006. (doi:10.1007/s11390-006-0682-8)

[97]
Matthias Merdes and Dirk Dorsch. Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java development. In PPPJ '06: Proceedings of the 4th international symposium on Principles and practice of programming in Java, pages 125–134, New York, NY, USA, 2006. ACM Press. ACM International Conference Proceeding Series 178. (doi:10.1145/1168054.1168072)

[98]
E. Michlmayr, A. Pany, and S. Graf. Applying ant-based multi-agent systems to query routing in distributed environments. IEEE Intelligent Systems, pages 36–41, 2006. (doi:10.1109/IS.2006.348390)

[99]
M. Mongiello. Finite-state verification of the ebXML protocol. Electronic Commerce Research and Applications, 5(2):147–169, 2006. (doi:10.1016/j.elerap.2005.09.002)

[100]
S. Montanelli. Emergent communities for semantic collaboration in multi-knowledge environments: Methods and techniques. In 13th Doctoral Consortium - Held at the 18th Conference on Advanced Information Systems, DCCAISE 2006, volume 263, pages 1152–1159. CEUR-WS, 2006.

[101]
J. Močnik, M. Novak, G. Pipan, and P. Karwaczynski. A discovery service for very large, dynamic grids. In e-Science 2006 — Second IEEE International Conference on e-Science and Grid Computing, 2006. (doi:10.1109/E-SCIENCE.2006.261147)

[102]
Bhasker Mukerji, Vinod Kumar, and Uma Kumar. The challenges of adopting open source software in promoting e-government. In ICEG '06: International Conference on E-Governance, pages 22–31, 2006.

[103]
Maurice Mulvenna, Franco Zambonelli, Kevin Curran, and Chris Nugent. Knowledge networks. In Autonomic Communication, pages 99–114. Springer-Verlag, 2006. Lecture Notes in Computer Science 3854. (doi:10.1007/11687818_8)

[104]
Martin Naedele and Thomas E. Koch. Trust and tamper-proof software delivery. In SESS '06: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems, pages 51–58, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1137627.1137636)

[105]
N. Nahas, D. Ait-Kadi, and M. Nourelfath. A new approach for buffer allocation in unreliable production lines. International Journal of Production Economics, 103(2):873–881, 2006. (doi:10.1016/j.ijpe.2006.02.011)

[106]
Paul Nguyen and Robert Chun. Model driven development with interactive use cases and UML models. In Proceedings of The 2006 International Conference on Software Engineering Research & Practice (SERP'06) and Conference on Programming Languages & Compilers (PLC'06), pages 534–540, 2006.

[107]
M. Obrist, R. Bernhaupt, and M. Tscheligi. Users@home: Implications from studying itv. In 20th International Symposium on Human Factors in Telecommunication, 2006.

[108]
P. Ocenasek and M. Sveda. An approach to automated design of security protocols. In Proceedings of the International Conference on Networking, International Conference on Systems andInternational Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, volume 2006, pages 77–85, 2006. (doi:10.1109/ICNICONSMCL.2006.47)

[109]
S. Ovcharenko, Z. Alibhai, C. Ng, W.A. Graver, and D. Sabaz. Implementation of a wireless distributed intelligent system. In Proceedings - DIS 2006: IEEE Workshop on Distributed Intelligent Systems - Collective Intelligence and Its Applications, volume 2006, pages 207–212, 2006. (doi:10.1109/DIS.2006.38)

[110]
W. Pasman and J. Lindenberg. Human-agent service matching using natural language queries: system test and training. Personal and Ubiquitous Computing, 10(6):393–399, 2006. (doi:10.1007/s00779-006-0067-6)

[111]
J.J. Pazos-Arias, M. López-Nores, J. García-Duque, A. Gil-Solla, M. Ramos-Cabrer, Y. Blanco-Fernández, R.P. Díaz-Redondo, and A. Fernández-Vilas. ATLAS: A framework to provide multiuser and distributed t-learning services over MHP. Software — Practice and Experience, 36(8):845–869, 2006. (doi:10.1002/spe.719)

[112]
G. Perera and K. Christensen. Broadcast updates with local look-up search (BULLS): A new peer-to-peer protocol. In Proceedings of the Annual Southeast Conference, volume 2006, pages 124–129, 2006. (doi:10.1145/1185448.1185477)

[113]
T. Perlines Hormann, K. Wrona, and S. Holtmanns. Evaluation of certificate validation mechanisms. Computer Communications, 29(3):291–305, 2006. (doi:10.1016/j.comcom.2004.12.008)

[114]
C. Pescio. Listen to your tools and materials. IEEE Software, 23(5):74–80, 2006. (doi:10.1109/MS.2006.134)

[115]
T. Pfeiffer and M.A. Nowak. Digital cows grazing on digital grounds. Current Biology, 16(22), 2006. (doi:10.1016/j.cub.2006.10.011)

[116]
Chuck Pheatt. Network distributed computing using DCEZ. Journal of Computing Sciences in Colleges, 21(4):9–15, 2006.

[117]
F. Qiu, C. Lin, and H. Yin. EKM: An efficient key management scheme for large-scale peer-to-peer media streaming. In Advances in Multimedia Information Processing — PCM 2006, pages 395–404, 2006. Lecture Notes in Computer Science 4261. (doi:10.1007/11922162_46)

[118]
E. Reategui, C. Fruet, and D.M. Filho. Evaluating the impact of different virtual characters in product recommendations. In Proceedings of the VII Symposium on Human Factors in Computing Systems, IHC 2006, pages 73–80, 2006. (doi:10.1145/1298023.1298034)

[119]
T. Reiter, E. Kapsammer, W. Retschitzegger, W. Schwinger, and M. Stumptner. A generator framework for domain-specific model transformation languages. In ICEIS 2006 - 8th International Conference on Enterprise Information Systems, Proceedings, volume ISAS, pages 27–35, 2006.

[120]
Phillip Anthony Relf. Source Code Readability Improvement Using Heuristic-Based Dynamic Error Reporting During Editing. PhD thesis, University of Technology, Sydney, 2006.

[121]
F. Ricca and P. Tonella. Reverse engineering di sistemi software limiti e potenzialità (reverse engineering of software systems limits and potential). Mondo Digitale, 5(3):52–63, 2006.

[122]
K. Ronasi, M.H. Firooz, M.R. Pakravan, and A.N. Avanaki. A fast algorithm for construction of minimum delay multicast trees in P2P networks. In 2006 International Symposium on Communications and Information Technologies, ISCIT, pages 137–142, 2006. (doi:10.1109/ISCIT.2006.339903)

[123]
Jonathan B. Rosenberg, John C. Harrison, David L. Remy, and Neal L. Creighton, Jr. Web site identity assurance. United States Patent 7,114,177, September 2006. Assignee: GeoTrust, Inc. (Portland, OR).

[124]
C. Roser, M. Nakano, and M. Tanaka. Single simulation buffer optimization. JSME International Journal, Series C: Mechanical Systems, Machine Elements and Manufacturing, 48(4):763–768, 2006. (doi:10.1299/jsmec.48.763)

[125]
F. Rotar and A. Sluga. Razvoj generi^cne strukture in programskih modulov elementarnega delovnega sistema porazdeljenega tiskanja / development of the generic structure and programming modules of an elementary work system for distributed printing. Strojniski Vestnik / Journal of Mechanical Engineering, 52(9):599–612, September 2006.

[126]
I. Sabuncuoglu, E. Erel, and Y. Gocgun. Analysis of serial production lines: Characterisation study and a new heuristic procedure for optimal buffer allocation. International Journal of Production Research, 44(13):2499–2523, 2006. (doi:10.1080/00207540500465535)

[127]
Helmut Salmen. Method and apparatus for restricted run-time environment with dynamic user context. United States Patent 7,069,275, June 2006. Assignee: Sun Microsystems, Inc. (Santa Clara, CA).

[128]
M. Savsar. Buffer allocation in serial production lines with preventive and corrective maintenance operations. Kuwait Journal of Science and Engineering, 33(2):253–266, 2006.

[129]
C. Schmitz and A. Löser. How to model semantic peer-to-peer overlays? In INFORMATIK 2006 - Informatik fur Menschen, Beitrage der 36. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1, pages 12–19, 2006.

[130]
Adrian Schröter, Thomas Zimmermann, Rahul Premraj, and Andreas Zeller. If your bug database could talk... In Proceedings of the 5th International Symposium on Empirical Software Engineering, September 2006.

[131]
A. Seshadri, M. Luk, A. Perrig, L. Van Doorn, and P. Khosla. Scuba: Secure code update by attestation in sensor networks. In WiSE 2006 — Proceedings of the 5th ACM Workshop on Wireless Security, volume 2006, pages 85–94, 2006.

[132]
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. SCUBA: Secure code update by attestation in sensor networks. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless Security, pages 85–94, New York, NY, USA, 2006. ACM Press. (doi:10.1145/1161289.1161306)

[133]
W. Shi and Y. Mao. Performance evaluation of peer-to-peer web caching systems. Journal of Systems and Software, 79(5):714–726, 2006. (doi:10.1016/j.jss.2005.08.012)

[134]
S. Sidiroglou and A.D. Keromytis. Execution transactions for defending against software failures: Use and evaluation. International Journal of Information Security, 5(2):77–91, 2006. (doi:10.1007/s10207-006-0083-6)

[135]
S. Simmons, D. Edwards, N. Wilde, J. Homan, and M. Groble. Industrial tools for the feature location problem: An exploratory study. Journal of Software Maintenance and Evolution, 18(6):457–474, 2006. (doi:10.1002/smr.338)

[136]
S. Smith and R. Jamieson. Determining key factors in e-government information system security. Information Systems Management, 23(2):23–32, 2006. (doi:10.1201/1078.10580530/45925.23.2.20060301/92671.4)

[137]
C. Song and M. Chun. An approach to realization and security provision ofintelligent U-Healthcare service. In Proceedings of the ICHIT'06 2006 Conference on Hybrid Information Technology, pages 462–467, 2006.

[138]
C. Song and V. Sazawal. Information-hiding URLs for easier website evolution. In Proceedings of the Eighth IEEE International Symposium on Web Site Evolution, WSE 2006, pages 95–102, 2006. (doi:10.1109/WSE.2006.10)

[139]
C. Squarr, J. Brunn, and G. Wirtz. Adaptive search in a semi-structured peer-to-peer system. In IEEE International Conference on Computer Systems and Applications, pages 25–32, 2006.

[140]
E. Stavrou and A. Pitsillides. Securing mobile healthcare systems based on information classification: DITIS case study. In Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006, pages 67–79, 2006.

[141]
R. Steele and W. Tao. An enhanced architecture for mobile retailing. In ACM International Conference Proceeding Series, volume 270, 2006. (doi:10.1145/1292331.1292367)

[142]
H. Stuckenschmidt, F. Van Harmelen, W. Siberski, and S. Staab. Peer-to -peer and semantic web. In Semantic Web and Peer-to-Peer: Decentralized Management and Exchange of Knowledge and Information, pages 1–17. Springer Berlin Heidelberg, 2006. (doi:10.1007/3-540-28347-1_1)

[143]
Miquel Termens. DOI: The "Big Brother" in the dissemination of scientific documentation. International Microbiology, 9(2):139–142, 2006.

[144]
G.H. Tolosa, J.A. Peri, and F.R.A. Bordignon. Peer-to-peer content search supported by a distributed index in a publication/search model. Journal of Digital Information Management, 4(3):175–183, 2006.

[145]
N. Tomaiuolo. DOIs, URLs, LoCKSS, and missing links. Searcher:Magazine for Database Professionals, 14(7):18–23, 2006.

[146]
M. Treaster, W. Conner, I. Gupta, and K. Nahrstedt. Contagalert: Using contagion theory for adaptive, distributed alert propagation. In Proceedings — Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, volume 2006, pages 126–133, 2006. (doi:10.1109/NCA.2006.20)

[147]
V. Vaishnavi, A. Vandenberg, R. Baskerville, and G. Zheng. TQN: A novel approach to generating information security data. In 16th Workshop on Information Technologies and Systems, WITS 2006, pages 187–192. Social Science Research Network, 2006.

[148]
Gabriel Vanrenen, Sean Smith, and John Marchesini. Distributing security-mediated PKI. International Journal of Information Security, 5(1):3–17, January 2006. (doi:10.1007/s10207-005-0076-x)

[149]
B. Vassiliadis, V. Fotopoulos, and A.N. Skodras. Decentralising the digital rights management value chain by means of distributed license catalogues. In Artificial Intelligence Applications and Innovations, volume 204 of IFIP International Federation for Information Processing, pages 689–696. Springer Verlag, 2006. (doi:10.1007/0-387-34224-9_81)

[150]
H. Wada, J. Suzuki, K. Oba, S. Takada, and N. Doi. mTurnpike: A model-driven framework for domain specific software development. Computer Software, 23(3):158–169, 2006.

[151]
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, and Arun Lakhotia. Normalizing metamorphic malware using term rewriting. In SCAM '06: Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation, pages 75–84, Washington, DC, USA, 2006. IEEE Computer Society. (doi:10.1109/SCAM.2006.20)

[152]
H. Wang, S. Tan, S. Tang, D. Yang, and Y. Tong. File correspondences dictionary construction in multilingual p2p file sharing systems. In Ulf Leser, Felix Naumann, and Barbara A. Eckman, editors, Data Integration in the Life Sciences, Third International Workshop, DILS 2006, pages 144–152, July 2006. Lecture Notes in Computer Science 4097. (doi:10.1007/11807964_15)

[153]
M. Wang, S. Zhang, J. Zhou, and H. Zhao. An architecture of semantic desktop data grid. In Proceedings — 2006 10th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006, pages 1082–1087, 2006. (doi:10.1109/CSCWD.2006.253210)

[154]
S.-T. Wang, J.-L.C. Wu, and C.-Y. Hsu. Design of a resource advertisement and discovery protocol for large and dense manets. Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an, 29(7):1161–1171, 2006.

[155]
Rainer Wasinger and Wolfgang Wahlster. The anthropomorphized product shelf: Symmetric multimodal interaction with instrumented environments. In E.H.L. Aarts and J.L. Encarnaç ao, editors, True Visions: The Emergence of Ambient Intelligence. Springer-Verlag, 2006.

[156]
S.M. White. Requirements for distributed mission-critical decision support systems. In Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems, pages 123–129, 2006. (doi:10.1109/ECBS.2006.61)

[157]
K. Wilson and P. Machanick. SecureTorrent: A security framework for file swarming. In Advances in Computer Systems Architecture, pages 538–544, 2006. Lecture Notes in Computer Science 4186. (doi:10.1007/11859802_55)

[158]
Greg Wilson. Software carpentry: Getting scientists to write better code by making them more productive. Computing in Science and Engineering, 8(6):66–69, November/December 2006. (doi:10.1109/MCSE.2006.122)

[159]
W. Wong and M. Stamp. Hunting for metamorphic engines. Journal in Computer Virology, 2(3):211–229, 2006. (doi:10.1007/s11416-006-0028-7)

[160]
J.D. Wren, J.E. Grissom, and T. Conway. E-mail decay rates among corresponding authors in medline. EMBO Reports, 7(2):122–127, 2006. (doi:10.1038/sj.embor.7400631)

[161]
J.D. Wren, K.R. Johnson, D.M. Crockett, L.F. Heilig, L.M. Schilling, and R.P. Dellavalle. Uniform resource locator decay in dermatology journals: Author attitudes and preservation practices. Archives of Dermatology, 142(9):1147–1152, 2006. (doi:10.1001/archderm.142.9.1147)

[162]
Shlomo Wygodny, Valery Golender, Ido Ben-Moshe, and Vladimir Andreev. System and method for conditional tracing of computer programs. United States Patent 7,058,928, June 2006. Assignee: Identify Software Ltd.(IL).

[163]
T. Yamakami. Empirical long-term observation on the mobile web update frequency. In 2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006. (doi:10.1109/WOCN.2006.1666603)

[164]
Gang YANG, Xingshe ZHOU, and Huifang PAN. Feedback-based framework of adaptive threads-pool management. Computer Engineering, 32(5):65–67, 2006. In Chinese.

[165]
Niteen Yemul. The tools at hand. ACM Computing Reviews, 47(2), February 2006.

[166]
I. You and C. Park. An analysis on the web technologies for dynamically generating web-based user interfaces in ubiquitous spaces. In Ulf Leser, Felix Naumann, and Barbara A. Eckman, editors, Data Integration in the Life Sciences, Third International Workshop, DILS 2006, pages 639–649, July 2006. Lecture Notes in Computer Science 4097. (doi:10.1007/11807964_65)

[167]
X. Zeng, A.O. Fapojuwo, and R.J. Davies. Design and performance evaluation of voice activated wireless home devices. IEEE Transactions on Consumer Electronics, 52(3):983–989, 2006. (doi:10.1109/TCE.2006.1706497)

[168]
H.L. Zhang, C.H.C. Leung, and G.K. Raikundalia. Performance analysis of network topologies in agent-based open connectivity architecture for DSS. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, volume 2, pages 257–261, 2006. (doi:10.1109/AINA.2006.266)

[169]
M. Zhao and S.W. Smith. Modeling and evaluation of certification path discovery in the emerging global PKI. In Andrea S. Atzeni and Antonio Lioy, editors, Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pages 16–30. Springer-Verlag, 2006. Lecture Notes in Computer Science 4043.

[170]
J. Zhou and M. Wang. Semantic integration of enterprise information: Challenges and basic principles. In The Semantic Web — ASWC 2006, volume 4185 LNCS, pages 219–233, 2006. Lecture Notes in Computer Science 4185. (doi:10.1007/11836025_23)