[1]
T. AbuHmed, N. Nyamaa, and D. Nyang. Software-based remote code attestation in wireless sensor network. In GLOBECOM - IEEE Global Telecommunications Conference, 2009. (doi:10.1109/GLOCOM.2009.5425280)
[2]
B. Adams, W. De Meuter, H. Tromp, and A.E. Hassan. Can we refactor conditional compilation into aspects? In Proceedings of the 8th ACM International Conference on Aspect-Oriented Software Development, AOSD'09, pages 243–254, 2009. (doi:10.1145/1509239.1509274)
[3]
J. Agron. Domain-specific language for HW/SW co-design for FPGAs. In IFIP TC 2 Working Conference Domain-Specific Languages, DSL 2009, pages 262–284, jul 2009. Lecture Notes in Computer Science 5658. (doi:10.1007/978-3-642-03034-5_13)
[4]
H. Ahmadi, A. Mehrbakhsh, and E. Asgarian. Towards an efficient method for spreading information in social network. In Proceedings — 2009 3rd Asia International Conference on Modelling and Simulation, AMS 2009, pages 152–157, 2009. (doi:10.1109/AMS.2009.107)
[5]
R. Ahmed and R. Boutaba. Plexus: A scalable peer-to-peer protocol enabling efficient subset search. IEEE/ACM Transactions on Networking, 17(1):130–143, 2009. (doi:10.1109/TNET.2008.2001466)
[6]
P. Ai and Y. Chen. Extracting software component from hydrological information service system. In IAHS-AISH Publication, volume 331, pages 333–341, 2009.
[7]
Z. Aixin, T. Junhua, and W. Peng. Authentication tests based on test type matrix. In IEEE International Conference on Communications, 2009. (doi:10.1109/ICC.2009.5198770)
[8]
D. Akoumianakis. Managing universal accessibility requirements in software-intensive projects. Software Process Improvement and Practice, 14(1):3–29, 2009. (doi:10.1002/spip.383)
[9]
A. Al-Tameem, M. Zairi, and M. Kamala. Critical factors of information security implementation. In 2009 1st International Conference on Networked Digital Technologies, NDT 2009, pages 379–385, 2009. (doi:10.1109/NDT.2009.5272217)
[10]
M. Alshayeb. Empirical investigation of refactoring effect on software quality. Information and Software Technology, 51(9):1319–1326, 2009. (doi:10.1016/j.infsof.2009.04.002)
[11]
M. Amoretti. The peer-to-peer paradigm applied to hydrogen energy distribution. In IEEE EUROCON 2009, EUROCON 2009, pages 494–500, 2009. (doi:10.1109/EURCON.2009.5167678)
[12]
R. Anane, S. Marrocco, and B. Bordbar. Trusted P2P group interaction. In Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009, 2009. (doi:10.1109/CSA.2009.5404307)
[13]
R. Ando. Automated log analysis of infected windows os using mechanized reasoning. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5864 LNCS(PART 2):540–547, 2009. (doi:10.1007/978-3-642-10684-2_60)
[14]
O. Arafat and D. Riehle. The comment density of open source software code. In 2009 31st International Conference on Software Engineering — Companion Volume, ICSE 2009, pages 195–198, 2009. (doi:10.1109/ICSE-COMPANION.2009.5070980)
[15]
O. Arafat and D. Riehle. The commenting practice of open source. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA, pages 857–863, 2009. (doi:10.1145/1639950.1640047)
[16]
M. Avvenuti, C. Bernardeschi, N. De Francesco, and P. Masci. A tool for checking secure interaction in java cards. In EWDC 2009: 12th European Workshop on Dependable Computing, 2009.
[17]
A. Azab and H. Meling. Decentralized service allocation in a broker overlay based grid. Lecture Notes in Computer Science, 5931 LNCS:200–211, 2009. (doi:10.1007/978-3-642-10665-1_18)
[18]
M.A. Babar, T. Dingsøyr, P. Lago, and H. Van Vliet. Software architecture knowledge management: Theory and practice. Springer Berlin Heidelberg, 2009. (doi:10.1007/978-3-642-02374-3)
[19]
J. Bar-Ilan and B.C. Peritz. The lifespan of "informetrics" on the web: An eight year study (1998-2006). Scientometrics, 79(1):7–25, 2009. (doi:10.1007/s11192-009-0401-7)
[20]
S. Bashar and Z. Ding. Optimum routing protection against cumulative eavesdropping in multihop wireless networks. In Proceedings - IEEE Military Communications Conference MILCOM, 2009. (doi:10.1109/MILCOM.2009.5379981)
[21]
D. Battini, A. Persona, and A. Regattieri. Buffer size design linked to reliability performance: A simulative study. Computers and Industrial Engineering, 56(4):1633–1641, 2009. (doi:10.1016/j.cie.2008.10.020)
[22]
Douglas D. Beattie, Neal Lewis Creighton, Jr., Christopher T. M. Bailey, David L. Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 7,562,212, July 2009. Assignee: GeoTrust, Inc. (Needham, MA).
[23]
A. Bergel, S. Denier, S. Ducasse, J. Laval, F. Bellingard, P. Vaillergues, F. Balmas, and K. Mordal-Manet. Squale — software quality enhancement. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 285–288, 2009. (doi:10.1109/CSMR.2009.13)
[24]
A.M. Bernardos, P. Tarrıo, J. Iglesias, and J.R. Casar. Deploying context-aware services: A case study of rapid prototyping. In 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, 2009. (doi:10.1109/CCNC.2009.4784991)
[25]
R. Bernhaupt, D. Wilfinger, and T. Mirlacher. Personalizing the TV experience: Vocomedia — A case study from interactive TV. IGI Global, 2009. (doi:10.4018/978-1-60566-260-2.ch009)
[26]
M.H. Bhat. Missing web references - a case study of five scholarly journals. LIBER Quarterly, 19(2):131–139, 2009.
[27]
N. Bicocchi, M. Mamei, and F. Zambonelli. An evaporative approach to handle dynamics in diffusive aggregation schemes. In Proceedings of the 2009 Workshop on Bio-inspired Algorithms for Distributed Systems, BADS '09, pages 53–60, 2009.
[28]
C. Bird, N. Nagappan, P. Devanbu, H. Gall, and B. Murphy. Does distributed development affect software quality?: An empirical case study of Windows Vista. Communications of the ACM, 52(8):85–93, 2009. (doi:10.1145/1536616.1536639)
[29]
C. Bird, N. Nagappan, P. Devanbu, H. Gall, and B. Murphy. Does distributed development affect software quality? an empirical case study of windows vista. In Proceedings - International Conference on Software Engineering, pages 518–528, 2009. (doi:10.1109/ICSE.2009.5070550)
[30]
A.F. Blackwell, J.A. Rode, and E.F. Toye. How do we program the home? gender, attention investment, and the psychology of programming at home. International Journal of Human Computer Studies, 67(4):324–341, 2009. (doi:10.1016/j.ijhcs.2008.09.011)
[31]
C. Boldyreff, A. Capiluppi, T. Knowles, and J. Munro. Undergraduate research opportunities in OSS. 5th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2009, 299:340–350, 2009.
[32]
M. Bortenschlager, G. Castelli, A. Rosi, and F. Zambonelli. A context-sensitive infrastructure for coordinating agents in ubiquitous environments. Multiagent and Grid Systems, 5(1):1–18, 2009. (doi:10.3233/MGS-2009-0116)
[33]
P. Bosch, A. Brusilovsky, R. McLellan, S. Mullender, and P. Polakos. Secure base stations. Bell Labs Technical Journal, 13(4):227–244, 2009. (doi:10.1002/bltj.20346)
[34]
E.H.T.B. Brands and G. Karagiannis. Taxonomy of P2P applications. In 2009 IEEE Globecom Workshops, Gc Workshops 2009, 2009. (doi:10.1109/GLOCOMW.2009.5360707)
[35]
N.L. Brisola, A.O. Santin, L.C. Lung, H.B. Ribeiro, and M.H. Vithoft. A public keys based architecture for P2P identification, content authenticity and reputation. In Proceedings — International Conference on Advanced Information Networking and Applications, AINA, pages 159–164, 2009. (doi:10.1109/WAINA.2009.139)
[36]
S. Bryton and F.B. Abreu. Strengthening refactoring: towards software evolution with quantitative and experimental grounds. In 4th International Conference on Software Engineering Advances, ICSEA 2009, Includes SEDES 2009: Simposio para Estudantes de Doutoramento em Engenharia de Software, pages 570–575, 2009. (doi:10.1109/ICSEA.2009.90)
[37]
R. Bye, S.A. Camtepe, and S. Albayrak. Design and modeling of collaboration architecture for security. In 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009, pages 330–341, 2009. (doi:10.1109/CTS.2009.5067498)
[38]
V. Carchiolo, A. Lima, and G. Mangioni. Resource advertising in prosa p2p network. In IPDPS 2009 — Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, 2009. (doi:10.1109/IPDPS.2009.5160950)
[39]
Y. Chai, Z. Du, and Y. Chen. A stepwise optimization algorithm of clustered streaming media servers. Journal of Systems and Software, 82(8):1344–1361, 2009. (doi:10.1016/j.jss.2009.03.002)
[40]
D.L. Chan, R.W.P. Luk, H.V. Leong, and E.K.S. Ho. Discovering user interface requirements of search results for mobile clients by contextual inquiry. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5618 LNCS(PART 2):365–374, 2009. (doi:10.1007/978-3-642-02559-4_40)
[41]
H. Chehade, F. Yalaoui, L. Amodeo, and P. De Guglielmo. Multi-objective optimization problem for the dimensioning of buffers. Journal of Decision Systems, 18(2):257–287, 2009. (doi:10.3166/jds.18.257-287)
[42]
B. Chelf and C. Ebert. Ensuring the integrity of embedded software with static code analysis. IEEE Software, 26(3):96–99, 2009. (doi:10.1109/MS.2009.65)
[43]
S.-S. Chen, G. Yang, K. Wang, and Y.-C. Zhang. A redemption-based trust model for ad hoc networks. Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 29(4):20–25, 2009.
[44]
X. Chen, J. Zhang, W. Xu, and X. Luo. Deploying resource space model on a structured P2P network. In SKG 2009 - 5th International Conference on Semantics, Knowledge, and Grid, pages 72–77, 2009. (doi:10.1109/SKG.2009.76)
[45]
Z. Chen, J. Liu, D. Li, H. Liu, and A. Vasilakos. Sobie: A novel super-node P2P overlay based on information exchange. Journal of Computers, 4(9):853–861, 2009.
[46]
M.T. Cheung and Z. Liao. Investing in real-world equity markets with an AHP-based decision framework. Journal of Decision Systems, 18(2):149–163, 2009. (doi:10.3166/jds.18.149-163)
[47]
S.-F. Chiang, K. Chiang, R.-J. Yu, and S.-D. Wang. Scalable index and data management for unstructured peer-to-peer networks. In The Handbook of Research on Scalable Computing Technologies, volume 1, pages 123–139. IGI Global, 2009. (doi:10.4018/978-1-60566-661-7.ch006)
[48]
D. Chopra, H. Schulzrinne, E. Marocco, and E. Ivov. Peer-to-peer overlays for real-time communication: Security issues and solutions. IEEE Communications Surveys and Tutorials, 11(1):4–12, 2009. (doi:10.1109/SURV.2009.090102)
[49]
A. Cicchetti, D. Di Ruscio, P. Pelliccione, A. Pierantonio, and S. Zacchiroli. Towards a model driven approach to upgrade complex software systems. In ENASE 2009 — 4th International Conference on Evaluation of Novel Approaches to Software Engineering, Proceedings, pages 121–133, 2009.
[50]
D.-L. Cui, G.-Q. Feng, C.-E. Wang, and K. Yang. Research of business component based integration in complex product design environment. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 15(2):250–257, 2009.
[51]
G.L. Curry and R.M. Feldman. Manufacturing systems modeling and analysis. Springer Berlin Heidelberg, 2009. (doi:10.1007/978-3-540-88763-8)
[52]
D.N. da Hora, D.F. Macedo, L.B. Oliveira, I.G. Siqueira, A.A.F. Loureiro, J.M. Nogueira, and G. Pujolle. Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks. Computer Communications, 32(13-14):1445–1459, 2009. (doi:10.1016/j.comcom.2009.04.005)
[53]
V. D'Andrea, S. De Paoli, and M. Teli. The construction of peers and artifacts: The organizing role of ``programming guidelines''? In Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 2009. (doi:10.1109/HICSS.2009.422)
[54]
V.P. De Almeida Neris and M.C.C. Baranauskas. Designing e-government systems for all-a case study in the Brazilian scenario. In IADIS International Conference WWW/Internet 2009, ICWI 2009, volume 1, pages 60–67. IADIS, 2009.
[55]
J. De Boever. Convergence of internet and TV: The commercial viability of P2P content delivery. Lecture Notes in Business Information Processing, 18:307–320, 2009. (doi:10.1007/978-3-642-01344-7_23)
[56]
A. Dedeke. Is Linux better than Windows software? IEEE Software, 26(3):103–104, May/June 2009. (doi:10.1109/MS.2009.72)
[57]
Ioannis Deliyannis, Anastasios Antoniou, and Panos Pandis. Design and development of an experimental low-cost internet-based interactive TV station. In A. Poulymenakou, N. Pouloudi, and K. Pramatari, editors, 4th Mediterranean Conference on Information Systems, pages 523–528, September 2009.
[58]
Z. Demirezen, M. Mernik, J. Gray, and B. Bryant. Verification of DSMLs using graph transformation: A case study with alloy. In ACM International Conference Proceeding Series, volume 413, 2009. (doi:10.1145/1656485.1656488)
[59]
Mark Doernhoefer. Surfing the net for software engineering notes. SIGSOFT Software Engineering Notes, 34(6):11–20, November 2009. (doi:10.1145/1640162.1655275)
[60]
B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In Proceedings of the ACM Conference on Computer and Communications Security, pages 566–577, 2009. (doi:10.1145/1653662.1653730)
[61]
L. Dong and Z. Yue-long. Distributed relational data sharing based on P2P. In Proceedings — 2009 International Conference on New Trends in Information and Service Science, NISS 2009, pages 378–383, 2009. (doi:10.1109/NISS.2009.144)
[62]
N.D. Doulamis, P.N. Karamolegkos, A. Doulamis, and I. Nikolakopoulos. Exploiting semantic proximities for content search over p2p networks. Computer Communications, 32(5):814–827, 2009. (doi:10.1016/j.comcom.2008.12.005)
[63]
I. Dzitac and B.E. B v arbat. Artificial intelligence + distributed systems = agents. International Journal of Computers, Communications and Control, 4(1):17–26, 2009.
[64]
E.J. Eckel. The emerging engineering scholar: A citation analysis of theses and dissertations at Western Michigan University. Issues in Science and Technology Librarianship, 56, 2009.
[65]
K.O. Elish and M. Alshayeb. Investigating the effect of refactoring on software testing effort. In Proceedings — Asia-Pacific Software Engineering Conference, APSEC, pages 29–34, 2009. (doi:10.1109/APSEC.2009.14)
[66]
C.-I. Fan, D.J. Guan, C.-I. Wang, and D.-R. Lin. Cryptanalysis of Lee-Hwang-Yang blind signature scheme. Computer Standards and Interfaces, 31(2):319–320, 2009. (doi:10.1016/j.csi.2008.02.002)
[67]
A. Ferrara, S. Montanelli, G. Varese, and S. Castano. Ontology knowledge authoring by natural language empowerment. In Proceedings — International Workshop on Database and Expert Systems Applications, DEXA, pages 469–473, 2009. (doi:10.1109/DEXA.2009.40)
[68]
J. Fjermestad and N.C. Romano Jr. Information privacy and security for e-CRM. In Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions, pages 48–70. IGI Global, 2009. (doi:10.4018/978-1-60566-196-4.ch004)
[69]
A. Forestiero and C. Mastroianni. A swarm algorithm for a self-structured P2P information system. IEEE Transactions on Evolutionary Computation, 13(4):681–694, 2009. (doi:10.1109/TEVC.2008.2011478)
[70]
A. Forestiero, C. Mastroianni, and M. Meo. Self-chord: A bio-inspired algorithm for structured P2P systems. In 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009, pages 44–51, 2009. (doi:10.1109/CCGRID.2009.39)
[71]
A. Forte, V. Larco, and A. Bruckman. Decentralization in Wikipedia governance. Journal of Management Information Systems, 26(1):49–72, 2009. (doi:10.2753/MIS0742-1222260103)
[72]
R.E. Gallardo-Valencia and S.E. Sim. Internet-scale code search. In Proceedings - International Conference on Software Engineering, pages 49–52, 2009. (doi:10.1109/SUITE.2009.5070022)
[73]
R. Gandhi and S.-W. Lee. Ontology guided risk analysis: From informal specifications to formal metrics. Studies in Computational Intelligence, 251:227–249, 2009. (doi:10.1007/978-3-642-04141-9_11)
[74]
K. Gary, H. Koehnemann, J. Blakley, C. Goar, H. Mann, and A. Kagan. A case study: Open source community and the commercial enterprise. In ITNG 2009 - 6th International Conference on Information Technology: New Generations, pages 940–945, 2009. (doi:10.1109/ITNG.2009.313)
[75]
R. Gelbard. Decision rule for investment in reusable code. IGI Global, 2009. (doi:10.4018/978-1-59904-630-3.Ch012)
[76]
P. Giotis and G. Lekakos. Effectiveness of interactive advertising presentation models. In EuroITV'09 - 7th European Conference on European Interactive Television Conference, pages 157–160, 2009. (doi:10.1145/1542084.1542115)
[77]
M. Golfarelli. Open source BI platforms: A functional and architectural comparison. In Torben Bach Pedersen, Mukesh K. Mohania, and A Min Tjoa, editors, Data Warehousing and Knowledge Discovery: 11th International Conference, DaWaK 2009, pages 287–297, August 2009. (doi:10.1007/978-3-642-03730-6_23)
[78]
C.E. Gómez, M. Del Pilar Villamil, H.E. Castro, and L. D'Orazio. DHTCache: A distributed service to improve the selection of cache configurations within a highly-distributed context. Lecture Notes in Computer Science, 5697 LNCS:48–59, 2009. (doi:10.1007/978-3-642-03715-3_5)
[79]
T.R. Gopalakrishnan Nair, R. Selvarani, and M. Ramachandran. Comprehensive software industry analysis model (CSIAM). In Handbook of Research on Software Engineering and Productivity Technologies: Implications of Globalization, pages 128–138. IGI Global, 2009. (doi:10.4018/978-1-60566-731-7.ch010)
[80]
S. Greiner. Run-time manipulation of programs in a statically-typed language. Informatica (Ljubljana), 33(3):397–398, 2009.
[81]
Y.-G. Guéhéneuc, J.-Y. Guyomarc'h, and H. Sahraoui. Improving design-pattern identification: A new approach and an exploratory study. Software Quality Journal, 18(1):145–174, 2009. (doi:10.1007/s11219-009-9082-y)
[82]
S.T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. Moving from requirements to design confronting security issues: A case study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5871 LNCS(PART 2):798–814, 2009. (doi:10.1007/978-3-642-05151-7_4)
[83]
R. Halonen, H. Haapala, T. Acton, K. Conboy, and W. Golden. Information systems — unavoidable nuisances in combining local administratives? In 22nd Bled eConference - eEnablement: Facilitating an Open, Effective and Representative eSociety, pages 532–545. Bled eCommerce Conference, 2009.
[84]
M. Hamed Firooz, A. Nasiri Avanaki, M. Reza Pakravan, and K. Ronasi. A fast and reliable multi-sender algorithm for peer-to-peer networks. Journal of Network and Computer Applications, 32(3):733–740, 2009. (doi:10.1016/j.jnca.2008.06.004)
[85]
M. Hammad and J. Cook. Lightweight monitoring of sensor software. In Proceedings of the ACM Symposium on Applied Computing, pages 2180–2185, 2009. (doi:10.1145/1529282.1529763)
[86]
K. Han, Q. Guo, and J. Luo. Optimal peer selection, task assignment and rate allocation for P2P downloading. In Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS 2009, pages 1088–1090, 2009. (doi:10.1109/ETCS.2009.248)
[87]
T. Hata, M. Takemoto, T. Kambayashi, K. Uchiyama, and M. Teramoto. A network architecture to easily control devices. In Proceedings — 2009 9th Annual International Symposium on Applications and the Internet, SAINT 2009, pages 189–192, 2009. (doi:10.1109/SAINT.2009.39)
[88]
Z. He and Y. Ma. Research and analysis of the optimization of the unstructured P2P overlay networks. In Proceedings — 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, 2009. (doi:10.1109/WICOM.2009.5301864)
[89]
M.V.J. Heikkinen, A. Kivi, and H. Verkasalo. Measuring mobile peer-to-peer usage: Case Finland 2007. Lecture Notes in Computer Science, 5448:165–174, 2009. (doi:10.1007/978-3-642-00975-4_17)
[90]
F. Hermans, M. Pinzger, and A. Van Deursen. Domain-specific languages in practice: A user study on the success factors. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5795 LNCS:423–437, 2009. (doi:10.1007/978-3-642-04425-0_33)
[91]
C.-P. Hong, E.-H. Lee, and S.-D. Kim. An efficient scheme to construct virtual community for multimedia content sharing based on profile in a ubiquitous computing environment. In NCM 2009 — 5th International Joint Conference on INC, IMS, and IDC, pages 1271–1276, 2009. (doi:10.1109/NCM.2009.86)
[92]
C.-P. Hong, E.-H. Lee, C.C. Weems, and S.-D. Kim. A profile-based multimedia sharing scheme with virtual community, based on personal space in a ubiquitous computing environment. IEEE Transactions on Multimedia, 11(7):1353–1361, 2009. (doi:10.1109/TMM.2009.2030616)
[93]
C.-L. Hu and T.-H. Kuo. Hierarchical peer-to-peer overlay with cluster-reputation-based adaptation. In IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing — Proceedings, pages 691–696, 2009. (doi:10.1109/PACRIM.2009.5291286)
[94]
K.R. Islam and C. Snow. A cost-effective distributed architecture to enable distance education over emerging wireless technologies. In SIGITE'09 — Proceedings of the 2009 ACM Special Interest Group for Information Technology Education, pages 182–186, 2009. (doi:10.1145/1631728.1631777)
[95]
G. Jacob, E. Filiol, and H. Debar. Functional polymorphic engines: Formalisation, implementation and use cases. Journal in Computer Virology, 5(3):247–261, 2009. (doi:10.1007/s11416-008-0095-z)
[96]
H. Jiang, J. Li, and Z.-C. Li. Hybrid content distribution network and its performance modeling. Jisuanji Xuebao/Chinese Journal of Computers, 32(3):473–482, 2009. (doi:10.3724/SP.J.1016.2009.00473)
[97]
L. Jin, W. Qinmin, Z. Daoli, and H. Yihong. Multi-stage dynamic coordination model for large-scale crowd's activities based on multi-agent. In 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009, volume 1, pages 487–491, 2009. (doi:10.1109/CSIE.2009.67)
[98]
S. Josse. White-box attack context cryptovirology. Journal in Computer Virology, 5(4):321–334, 2009. (doi:10.1007/s11416-008-0097-x)
[99]
G. Kakaletris, D. Varoutas, D. Katsianis, and T. Sphicopoulos. Design and implementation approaches for location-based, tourism-related services. IGI Global, 2009. (doi:10.4018/978-1-59140-995-3.ch048)
[100]
P. Kamthan. Embracing the social web for managing patterns. In Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications, volume 1, pages 733–747. IGI Global, 2009. (doi:10.4018/978-1-60566-384-5.ch042)
[101]
I. Kantzavelou and S. Katsikas. Playing games with internal attackers repeatedly. In 2009 16th International Conference on Systems, Signals and Image Processing, IWSSIP 2009, 2009. (doi:10.1109/IWSSIP.2009.5367708)
[102]
P. Karamolegkos and N. Doulamis. Multimedia file exchange and P2P social networking: Efficient allocation of users into communities of interest. In 2009 International Conference on Ultra Modern Telecommunications and Workshops, 2009. (doi:10.1109/ICUMT.2009.5345647)
[103]
S. Karpischek, F. Michahelles, F. Resatsch, and E. Fleisch. Mobile sales assistant: An NFC-based product information system for retailers. In Proceedings — 2009 1st International Workshop on Near Field Communication, NFC 2009, pages 20–23, 2009. (doi:10.1109/NFC.2009.18)
[104]
D.R. Karrels, G.L. Peterson, and B.E. Mullins. Structured P2P technologies for distributed command and control. Peer-to-Peer Networking and Applications, 2(4):311–333, 2009. (doi:10.1007/s12083-009-0033-y)
[105]
A. Karygiannis and E. Antonakakis. Security and privacy issues in agent-based location-aware mobile commerce. Lecture Notes in Computer Science, 4324 LNAI:308–329, 2009. (doi:10.1007/978-3-642-04879-1_21)
[106]
S. Kelly and R. Pohjonen. Worst practices for domain-specific modeling. IEEE Software, 26(4):22–29, 2009. (doi:10.1109/MS.2009.109)
[107]
H. Ketmaneechairat, P. Oothongsap, and A. Mingkhwan. Smart buffer management for different start video broadcasting. In ACM International Conference Proceeding Series, volume 403, pages 615–619, 2009. (doi:10.1145/1655925.1656036)
[108]
S.U. Khan, A.A. Maciejewski, and H.J. Siegel. Robust CDN replica placement techniques. In IPDPS 2009 — Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, 2009. (doi:10.1109/IPDPS.2009.5160908)
[109]
F. Khomh, Y.-G. Guéhéneuc, and G. Antoniol. Playing roles in design patterns: An empirical descriptive and analytic study. In IEEE International Conference on Software Maintenance, ICSM, pages 83–92, 2009. (doi:10.1109/ICSM.2009.5306327)
[110]
E. Kocagüneli, A. Tosun, A. Bener, B. Turhan, and B. Ça v glayan. Prest: An intelligent software metrics extraction, analysis and defect prediction tool. In Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, pages 637–642, 2009.
[111]
J. Kokemüller and A. Weisbecker. Aster data management: Products and research. In Proceedings of the 2009 International Conference on Information Quality, ICIQ 2009, 2009.
[112]
S. Kondakci. A concise cost analysis of Internet malware. Computers and Security, 28(7):648–659, 2009. (doi:10.1016/j.cose.2009.03.007)
[113]
K. Kotapati, P. Liu, and T.F. La Porta. Evaluating MAPSec by marking attack graphs. Wireless Networks, 15(8):1042–1058, 2009. (doi:10.1007/s11276-008-0101-x)
[114]
E. Kühn and V. Sesum-Cavic. A space-based generic pattern for self-initiative load balancing agents. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5881 LNAI:17–32, 2009. (doi:10.1007/978-3-642-10203-5_3)
[115]
H. Kwon, Y.-H. Moon, J. Nah, and D. Seo. Protecting IPTV service network against malicious rendezvous point. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5932 LNCS:1–9, 2009. (doi:10.1007/978-3-642-10838-9_1)
[116]
Y.-X. Lai and Z.-H. Liu. Unknown malicious identification. Lecture Notes in Electrical Engineering, 39 LNEE:301–312, 2009. (doi:10.1007/978-90-481-2311-7_26)
[117]
K.-C. Lai, C.-C. Wu, and S.-J. Lin. Exploring job migration technique for P2P grid systems. International Journal of Grid and High Performance Computing, 1(4):16–25, 2009. (doi:10.4018/jghpc.2009070802)
[118]
S.I. Lee, H. Park, and M. Van Der Schaar. Foresighted joint resource reciprocation and scheduling strategies for real-time video streaming over peer-to-peer networks. In 2009 17th International Packet Video Workshop, PV 2009, 2009. (doi:10.1109/PACKET.2009.5152153)
[119]
H. Lee. Agent based video contents identification and data mining using watermark based filtering. Springer US, 2009. (doi:10.1007/978-1-4419-0522-2_22)
[120]
T. Levendovszky, L. Lengyel, and T. Mészáros. Supporting domain-specific model patterns with metamodeling. Software and Systems Modeling, 8(4):501–520, 2009. (doi:10.1007/s10270-009-0118-3)
[121]
W. Li and D. Hoang. A new security scheme for e-health system. In 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009, pages 361–366, 2009. (doi:10.1109/CTS.2009.5067502)
[122]
J. Li, Q. Wu, and D. Zhu. Route guidance mechanism with centralized information control in large-scale crowd's activities. In IJCAI International Joint Conference on Artificial Intelligence, pages 7–11, 2009. (doi:10.1109/JCAI.2009.41)
[123]
T. Li, H. Ji, J. Mei, Y. Li, and C. Hu. Topology mismatch avoidable cross-layer protocol for P2P file discovery in MANETs. In IEEE Wireless Communications and Networking Conference, WCNC, 2009. (doi:10.1109/WCNC.2009.4917995)
[124]
C.-C. Liang, C.-H. Wang, H. Luh, and P.-Y. Hsu. Disaster avoidance mechanism for content-delivering service. Computers and Operations Research, 36(1):27–39, January 2009. (doi:10.1016/j.cor.2007.09.001)
[125]
Z. Liang, W. Sun, V.N. Venkatakrishnan, and R. Sekar. Alcatraz: An isolated environment for experimenting with untrusted software. ACM Transactions on Information and System Security, 12(3), 2009. (doi:10.1145/1455526.1455527)
[126]
C.-S. Lin and Y.-C. Cheng. A barter-based incentive mechanism for peer-to-peer media streaming. In Digest of Technical Papers — IEEE International Conference on Consumer Electronics, pages 871–875, 2009. (doi:10.1109/ISCE.2009.5157001)
[127]
X. Lin. Cat: Building couples to early detect node compromise attack in wireless sensor networks. In GLOBECOM - IEEE Global Telecommunications Conference, 2009. (doi:10.1109/GLOCOM.2009.5425922)
[128]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Computer and Information Security Handbook, pages 183–203. Elsevier Inc., 2009. (doi:10.1016/B978-0-12-374354-1.00012-1)
[129]
Y. Liu, K. Xu, C. Yang, and N. Xiong. Model of controlling the hubs in P2P networks. Journal of Networks, 4(4):236–243, 2009.
[130]
Y. Liu, X. Zhang, and H. Sun. The P2P wireless network applied in real-time vehicle navigation. In 3rd International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, pages 439–444, 2009. (doi:10.1109/MUE.2009.78)
[131]
M. Locci, G. Concas, and I. Turnu. Computing the fractal dimension of software networks. In Proceedings of the 9th WSEAS International Conference on Applied Computer Science, ACS '09, pages 146–151, 2009.
[132]
X. Lou and K. Hwang. Collusive piracy prevention in P2P content delivery networks. IEEE Transactions on Computers, 58(7):970–983, 2009. (doi:10.1109/TC.2009.26)
[133]
X. Lou, K. Hwang, and Y. Hu. Accountable file indexing against DDoS attacks in peer-to-peer networks. In GLOBECOM - IEEE Global Telecommunications Conference, 2009. (doi:10.1109/GLOCOM.2009.5425979)
[134]
F. Loukos and H. Karatza. Enabling cooperation in MANET-based peer-to-peer systems. IGI Global, 2009. (doi:10.4018/978-1-60566-715-7.ch006)
[135]
S.G. Lynn, D.R. Olsen Jr., and B.G. Partridge. Time warp football. In EuroITV'09 — Proceedings of the 7th European Conference on European Interactive Television Conference, pages 77–86, 2009. (doi:10.1145/1542084.1542098)
[136]
M. Madruga, S. Loest, and C. Maziero. Using transparent files in a fault tolerant distributed file system. In Proceedings — 2009 International Symposium on Autonomous Decentralized Systems, ISADS 2009, pages 109–114, 2009. (doi:10.1109/ISADS.2009.5207347)
[137]
T.K. Madsen, Q. Zhang, F. Fitzek, and M. Katz. Exploiting cooperation for performance enhancement and high data rates. Journal of Communications, 4(3):193–202, 2009.
[138]
E. Magnusson, T. Ekman, and G. Hedin. Demand-driven evaluation of collection attributes. Automated Software Engineering, 16(2):291–322, 2009. (doi:10.1007/s10515-009-0046-z)
[139]
H. Maisonneuve and C. Schnitter. The future of electronic biomedical journals. Presse Medicale, 38(10):1418–1424, 2009. (doi:10.1016/j.lpm.2009.07.002)
[140]
D. Man, Y. Ito, and K. Nakano. An efficient parallel sorting compatible with the standard qsort. In Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, pages 512–517, 2009. (doi:10.1109/PDCAT.2009.55)
[141]
D. Matter, A. Kuhn, and O. Nierstrasz. Assigning bug reports using a vocabulary-based expertise model of developers. In Proceedings of the 2009 6th IEEE International Working Conference on Mining Software Repositories, MSR 2009, pages 131–140, 2009. (doi:10.1109/MSR.2009.5069491)
[142]
P. McManus, C. Standing, and R. Zanoli. A preliminary laddering analysis on mobile services. In 17th European Conference on Information Systems, ECIS 2009, 2009.
[143]
D.A. McMeekin, B.R.V. Konsky, E. Chang, and D.J.A. Cooper. Evaluating software inspection cognition levels using Bloom's taxonomy. In Proceedings — 22nd Conference on Software Engineering Education and Training, CSEET 2009, pages 232–239, 2009. (doi:10.1109/CSEET.2009.15)
[144]
G. Me, D. Pirro, and R. Sarrecchia. Strong authentication for financial services: PTDs as a compromise between security and usability. In Mobile and Ubiquitous Commerce: Advanced E-Business Methods, pages 101–114. IGI Global, 2009. (doi:10.4018/978-1-60566-366-1.ch007)
[145]
H. Mendes, L. Weigang, A. Boukerche, and A.C.M.A. De Melo. Bag-of-tasks self-scheduling over range-queriable search overlays. In NPC 2009 — 6th International Conference on Network and Parallel Computing, pages 109–116, 2009. (doi:10.1109/NPC.2009.37)
[146]
W.-H. Min and Y.-G. Cheong. An interactive-content technique based approach to generating personalized advertisement for privacy protection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5618 LNCS(PART 2):185–191, 2009. (doi:10.1007/978-3-642-02559-4_21)
[147]
B. Molina, S.F. Pileggi, M. Esteve, and C.E. Palau. A negotiation framework for content distribution in mobile transient networks. Journal of Network and Computer Applications, 32(5):1000–1011, 2009. (doi:10.1016/j.jnca.2009.03.007)
[148]
J.L. Muñoz, O. Esparza, J. Forné, and E. Pallares. Design and implementation of a lightweight online certificate validation service. Telecommunication Systems, 41(3):229–241, 2009. (doi:10.1007/s11235-009-9144-2)
[149]
J. Munro, C. Boldyreff, and A. Capiluppi. Architectural studies of games engines — the Quake series. In 1st International IEEE Consumer Electronic Society's Games Innovation Conference, ICE-GiC 09, pages 246–255, 2009. (doi:10.1109/ICEGIC.2009.5293600)
[150]
E. Murphy-Hill, C. Parnin, and A.P. Black. How we refactor, and how we know it. In Proceedings - International Conference on Software Engineering, pages 287–297, 2009. (doi:10.1109/ICSE.2009.5070529)
[151]
N. Nahas, M. Nourelfath, and D. Ait-Kadi. Selecting machines and buffers in unreliable series-parallel production lines. International Journal of Production Research, 47(14):3741–3774, 2009. (doi:10.1080/00207540701806883)
[152]
D. Nobayashi, Y. Nakamura, T. Ikenaga, and Y. Hori. Development of single sign-on system with hardware token and key management server. IEICE Transactions on Information and Systems, E92-D(5):826–835, 2009. (doi:10.1587/transinf.E92.D.826)
[153]
J. O'Donoghue, J.B. McCarthy, S. Huang, and F. Adam. Evaluating the integration of leading edge pervasive technologies to improve service-based performance. In 3rd European Conference on Information Management and Evaluation, 2009, pages 363–370. Academic Conferences Limited, 2009.
[154]
M.J. O'Grady, G.M.P. O'Hare, J. Chen, and D. Phelan. Distributed network intelligence: A prerequisite for adaptive and personalised service delivery. Information Systems Frontiers, 11(1):61–73, 2009. (doi:10.1007/s10796-008-9140-1)
[155]
C. Okoli. A brief review of studies of wikipedia in peer-reviewed journals. In Proceedings of the 3rd International Conference on Digital Society, ICDS 2009, pages 155–160, 2009. (doi:10.1109/ICDS.2009.28)
[156]
F. Ortega and D. Izquierdo-Cortazar. Survival analysis in open development projects. In Proceedings of the 2009 ICSE Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development, FLOSS 2009, pages 7–12, 2009. (doi:10.1109/FLOSS.2009.5071353)
[157]
J.L. Ortega, V. Cothey, and I.F. Aguillo. How old is the web? characterizing the age and the currency of the european scientific web. Scientometrics, 81(1):295–309, 2009. (doi:10.1007/s11192-008-2149-x)
[158]
Z. Ou, E. Harjula, O. Kassinen, and M. Ylianttila. Feasibility evaluation of a communication-oriented P2P system in mobile environments. In Proceedings of the 6th International Conference on Mobile Technology, Application and Systems, Mobility '09, 2009. (doi:10.1145/1710035.1710078)
[159]
Z. Ou, E. Harjula, and M. Ylianttila. Effects of different churn models on the performance of structured peer-to-peer networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2009. (doi:10.1109/PIMRC.2009.5450134)
[160]
R. Owens and W. Wang. Building a dark piconet upon bluetooth interfaces of computers. In Proceedings - IEEE Military Communications Conference MILCOM, 2009. (doi:10.1109/MILCOM.2009.5379892)
[161]
W.A. Owens, K.W. Dam, H.S. Lin, and National Research Council. Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. National Academy of Sciences, 2009. (doi:10.17226/12651)
[162]
Y. Padioleau, L. Tan, and Y. Zhou. Listening to programmers - taxonomies and characteristics of comments in operating system code. In Proceedings - International Conference on Software Engineering, pages 331–341, 2009. (doi:10.1109/ICSE.2009.5070533)
[163]
Y. Padioleau. Parsing C/C++ code without pre-processing. Lecture Notes in Computer Science, 5501 LNCS:109–125, 2009. (doi:10.1007/978-3-642-00722-4_9)
[164]
R.F. Paige, D.S. Kolovos, L.M. Rose, N. Drivalos, and F.A.C. Polack. The design of a conceptual framework and technical infrastructure for model management language engineering. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, pages 162–171, 2009. (doi:10.1109/ICECCS.2009.14)
[165]
J.D. Palmer. Ginger: Implementing a new Lisp family syntax. In Proceedings of the 47th Annual Southeast Regional Conference, ACM-SE 47, 2009. (doi:10.1145/1566445.1566481)
[166]
F.S. Park, C. Gangakhedkar, and P. Traynor. Leveraging cellular infrastructure to improve fraud prevention. In Proceedings - Annual Computer Security Applications Conference, ACSAC, pages 350–359, 2009. (doi:10.1109/ACSAC.2009.40)
[167]
K. Pentikousis, C. Meirosu, A. Miron, and M. Brunner. Self-management for a network of information. In Proceedings — 2009 IEEE International Conference on Communications Workshops, ICC 2009, 2009. (doi:10.1109/ICCW.2009.5207967)
[168]
K. Pentikousis. Distributed information object resolution. In Proceedings of the 8th International Conference on Networks, ICN 2009, pages 360–366, 2009. (doi:10.1109/ICN.2009.31)
[169]
R. Peplow, D.S. Dawoud, and J. Van Der Merwe. Ensuring privacy in vehicular communication. In Proceedings of the 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2009, pages 610–614, 2009. (doi:10.1109/WIRELESSVITAE.2009.5172516)
[170]
D. Pierret and D. Poshyvanyk. An empirical exploration of regularities in open-source software lexicons. IEEE International Conference on Program Comprehension, pages 228–232, 2009. (doi:10.1109/ICPC.2009.5090047)
[171]
W. Ping, Q. Jing, and Q.Y. Hui. A computation trust model with confidence in unstructured P2P systems. In 2009 Joint Conferences on Pervasive Computing, JCPC 2009, pages 451–454, 2009. (doi:10.1109/JCPC.2009.5420144)
[172]
R.I. Podlovchenko, N.N. Kuzyurin, V.S. Shcherbina, and V.A. Zakharov. Using algebraic models of programs for detecting metamorphic malwares. Fundamental and Applied Mathematics, 15(5):181–198, 2009.
[173]
S. Poslad. Ubiquitous Computing: Smart Devices, Environments and Interactions. John Wiley and Sons, 2009. (doi:10.1002/9780470779446)
[174]
K. Pousttchi, M. Schiessler, and D.G. Wiedemann. Proposing a comprehensive framework for analysis and engineering of mobile payment business models. Information Systems and e-Business Management, 7(3):363–393, 2009. (doi:10.1007/s10257-008-0098-9)
[175]
N. Pratas, P.N. Anggraeni, S.A. Wardana, N.R. Prasad, A. Rodrigues, and R. Prasad. Context-aware trust and privacy application for mobile identification system. In IEEE Wireless Communications and Networking Conference, WCNC, 2009. (doi:10.1109/WCNC.2009.4917639)
[176]
C.R. Prause. Maintaining fine-grained code metadata regardless of moving, copying and merging. In 9th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, pages 109–118, 2009. (doi:10.1109/SCAM.2009.20)
[177]
H. Rao, C. Yang, and S. Tao. Controlling model for the hotspots in peer-to-peer networks. In Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS 2009, pages 665–669, 2009. (doi:10.1109/ETCS.2009.154)
[178]
J. Ravi, Z. Yu, and W. Shi. A survey on dynamic web content generation and delivery techniques. Journal of Network and Computer Applications, 32(5):943–960, 2009. (doi:10.1016/j.jnca.2009.03.005)
[179]
L. Rodero-Merino, A.F. Anta, L. López, and V. Cholvi. Self-managed topologies in p2p networks. Computer Networks, 53(10):1722–1736, 2009. (doi:10.1016/j.comnet.2008.09.006)
[180]
N.C. Romano Jr. and J. Fjermestad. Privacy and security in the age of electronic customer relationship management. In Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, pages 189–210. IGI Global, 2009. (doi:10.4018/978-1-60566-210-7.ch013)
[181]
C. Roncancio, M. Del Pilar Villamil, C. Labbé, and P. Serrano-Alvarado. Data sharing in DHT based P2P systems. Lecture Notes in Computer Science, 5740 LNCS:327–352, 2009. (doi:10.1007/978-3-642-03722-1_13)
[182]
B. Rood and M.J. Lewis. Grid resource availability prediction-based scheduling and task replication. Journal of Grid Computing, 7(4):479–500, 2009. (doi:10.1007/s10723-009-9135-2)
[183]
Jonathan B. Rosenberg, John Harrison, David L. Remy, and Neal L. Creighton. Web site identity assurance. United States Patent 7,552,466, June 2009. Assignee: GeoTrust, Inc. (Mountain View, CA).
[184]
S. Roubtsov, A. Serebrenik, and M.D. Van Brand. Dn-based design quality comparison of industrial java applications. In 2009 5th Central and Eastern European Software Engineering Conference in Russia, CEE-SECR 2009, pages 95–101, 2009. (doi:10.1109/CEE-SECR.2009.5501182)
[185]
S. Rui, W. Ji, Z. Shengdong, S. Siqi, and F. Pei. A framework for constructing peer-to-peer overlay networks in Java. In Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, PPPJ 2009, pages 40–48, 2009. (doi:10.1145/1596655.1596662)
[186]
A. Sæbjørnsen, L. Jiang, D. Quinlan, and Z. Su. Static validation of c preprocessor macros. In ASE2009 - 24th IEEE/ACM International Conference on Automated Software Engineering, pages 149–160, 2009. (doi:10.1109/ASE.2009.75)
[187]
J. Sanchez Cuadrado and J.G. Molina. A model-based approach to families of embedded domain-specific languages. IEEE Transactions on Software Engineering, 35(6):825–840, 2009. (doi:10.1109/TSE.2009.14)
[188]
C.G. Santillán, L. Cruz-Reyes, E. Meza, T.T. López, M.A. Aguirre Lam, and E. Schaeffer. Improving distributed resource search through a statistical methodology of topological feature selection. Journal of Computers, 4(8):727–733, 2009.
[189]
D. Santos, A. Pereira, and R. Gonçalves. Architecture of an innovative system for the acquisition of products in supermarkets — business model. In 4a Conferencia Iberica de Sistemas e Tecnologias de Informacao, CISTI 2009 - 4th Iberian Conference on Information Systems and Technologies, CISTI 2009, pages 61–66. Associacao Iberica de Sistemas e Tecnologias de Informacao, 2009.
[190]
D.S.S. Santos, A.M.J. Pereira, and R.M.R.M. Gonçalves. Intelligent cart: Architecture of an innovative system for the acquisition of products in grocery stores. In 11th International Business Information Management Association Conference, IBIMA 2009, volume 1-3, pages 350–357. International Business Information Management Association, IBIMA, 2009.
[191]
K. Sarelo. A SOA for ubiquitous communication management. In iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services, pages 253–260, 2009. (doi:10.1145/1806338.1806386)
[192]
M.I. Sarwar, W. Tanveer, and I. Sarwar. Performance of MI tools in perspective of open source software. In 2009 2nd International Conference on Computer, Control and Communication, IC4 2009, 2009. (doi:10.1109/IC4.2009.4909213)
[193]
H. Schackmann and H. Lichter. Evaluating process quality in GNOME based on change request data. In Proceedings of the 2009 6th IEEE International Working Conference on Mining Software Repositories, MSR 2009, pages 95–98, 2009. (doi:10.1109/MSR.2009.5069485)
[194]
H. Schackmann, H. Schaefer, and H. Lichter. Evaluating process quality based on change request data - an empirical study of the eclipse project. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5891 LNCS:227–241, 2009. (doi:10.1007/978-3-642-05415-0_17)
[195]
J. Schänfer and K. Malinka. Security in peer-to-peer networks : Empiric model of file diffusion in bittorrent. In Proceedings — 2009 4th International Conference on Internet Monitoring and Protection, ICIMP 2009, pages 39–44, 2009. (doi:10.1109/ICIMP.2009.14)
[196]
D. Schlosser and T. Hoßfeld. Mastering selfishness and heterogeneity in mobile P2P content distribution networks with multiple source download in cellular networks. Peer-to-Peer Networking and Applications, 2(3):252–266, 2009. (doi:10.1007/s12083-009-0034-x)
[197]
A.U. Schmidt. On the superdistribution of digital goods. Journal of Universal Computer Science, 15(2):401–425, 2009.
[198]
V. Sesum-Cavic and E. Kühn. Peer-to-peer overlay network based on swarm intelligence. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5881 LNAI:65–67, 2009. (doi:10.1007/978-3-642-10203-5_6)
[199]
V.A. Shekhovtsov, Y. Tomilko, and M.D. Godlevskiy. Facilitating reuse of code checking rules in static code analysis. Lecture Notes in Business Information Processing, 20:91–102, 2009. (doi:10.1007/978-3-642-01112-2_10)
[200]
M. Sherr, G. Shah, E. Cronin, S. Clark, and M. Blaze. Can they hear me now? a security analysis of law enforcement wiretaps. In Proceedings of the ACM Conference on Computer and Communications Security, pages 512–523, 2009. (doi:10.1145/1653662.1653724)
[201]
S. Sioutas, E. Sakkopoulos, Ch. Makris, B. Vassiliadis, A. Tsakalidis, and P. Triantafillou. Dynamic web service discovery architecture based on a novel peer based overlay network. Journal of Systems and Software, 82(5):809–824, 2009. (doi:10.1016/j.jss.2008.11.845)
[202]
H. Söezer, M. Tekkalmaz, and I. Korpeoglu. A peer-to-peer file search and download protocol for wireless ad-hoc networks. Computer Communications, 32(1):41–50, 2009. (doi:10.1016/j.comcom.2008.09.004)
[203]
J. Sorribas, D. Afonso, E. Arilla, O. Garcia, A. Hernández, J. Olivé, J.L. Ruiz, X. Romero, A. Sandoval, J.A. Serrano, E. Trullols, and J. Del Rıo. Real-time fleet ship monitoring system using satellite broadband communications and Google Earth. In Proceedings — 2009 1st International Conference on Advances in Satellite and Space Communications, SPACOMM 2009, pages 146–155, 2009. (doi:10.1109/SPACOMM.2009.44)
[204]
José Felipe Ortega Soto. Wikipedia: A Quantiative Analysis. PhD thesis, Universidad Rey Juan Carlos, Madrid, 2009.
[205]
A.M. Sourouni, S. Mouzakitis, G. Kourlimpinis, D. Askounis, and G. Velegrakis. E-business transactions modelling; an ontology-based repository. In Proceedings — 2009 International Conference on Interoperability for Enterprise Software and Applications, IESA 2009, pages 63–69, 2009. (doi:10.1109/I-ESA.2009.49)
[206]
S.M. Srinivasan and A.H. Azadmanesh. Data aggregation in partially connected networks. Computer Communications, 32(4):594–601, 2009. (doi:10.1016/j.comcom.2008.11.021)
[207]
I. Stamelos. Teaching software engineering with free/libre open source projects. International Journal of Open Source Software and Processes, 1(1):72–90, 2009.
[208]
M. Strembeck and U. Zdun. An approach for the systematic development of domain-specific languages. Software — Practice and Experience, 39(15):1253–1292, 2009. (doi:10.1002/spe.936)
[209]
B. Suh, G. Convertino, E.H. Chi, and P. Pirolli. The singularity is not near: Slowing growth of Wikipedia. In Proceedings of the 5th International Symposium on Wikis and Open Collaboration, WiKiSym 2009, 2009. (doi:10.1145/1641309.1641322)
[210]
C.X.H. Tang and H.C.W. Lau. Joint optimization for knowledge mining: Evaluating parameters of manufacturing processes. In Proceedings — 2009 International Conference on Information Management and Engineering, ICIME 2009, pages 689–693, 2009. (doi:10.1109/ICIME.2009.119)
[211]
S.M. Tawfik and N.M. El-Mekky. Unified framework of attributes in software quality models. AEJ - Alexandria Engineering Journal, 48(6):679–692, 2009.
[212]
A. Telea and L. Voinea. Case study: Visual analytics in software product assessments. In Proceedings of VISSOFT 2009 — 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis, pages 65–72, 2009. (doi:10.1109/VISSOF.2009.5336417)
[213]
Y.M. Teo, V. March, and M. Mihailescu. Hierarchical structured peer-to-peer networks, volume 1. IGI Global, 2009. (doi:10.4018/978-1-60566-661-7.ch007)
[214]
R. Tonelli, G. Concas, and M. Locci. Efficient implementation of the yule-simon stochastic process for modeling internet and software development activities. In Proceedings of the 9th WSEAS International Conference on Applied Computer Science, ACS '09, pages 180–186, 2009.
[215]
S.L. Toral, M.R. Martınez-Torres, and F.J. Barrero. Virtual communities as a resource for the development of OSS projects: The case of Linux ports to embedded processors. Behaviour and Information Technology, 28(5):405–419, 2009. (doi:10.1080/01449290903121394)
[216]
S.L. Toral, R. Martınez Torres, and F. Barrero. Modelling mailing list behaviour in open source projects: The case of Arm embedded Linux. Journal of Universal Computer Science, 15(3):648–664, 2009.
[217]
D. Traskas and J. Padget. Engineering agent organisations in a business environment. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5881 LNAI:49–64, 2009. (doi:10.1007/978-3-642-10203-5_5)
[218]
L. Tratt. Chapter 5 dynamically typed languages. In Marvin V. Zelkowitz, editor, Advances in Computers 77: Social Networking and the Web, chapter 5, pages 149–184. Academic Press, 2009. (doi:10.1016/S0065-2458(09)01205-4)
[219]
T. Tsiakis and P. Katsaros. Hands on dependability economics. In Proceedings — 2009 2nd International Conference on Dependability, DEPEND 2009, pages 117–121, 2009. (doi:10.1109/DEPEND.2009.24)
[220]
R. Usubamatov and M.Z. Abdulmuin. Optimization of structure of section-based automated lines. Proceedings of World Academy of Science, Engineering and Technology, 38:1231–1234, 2009.
[221]
J. Van Der Merwe, D.S. Dawoud, and R. Peplow. Vulnerability windows in vehicular communications. In Proceedings of the 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2009, pages 615–618, 2009. (doi:10.1109/WIRELESSVITAE.2009.5172517)
[222]
P. Van Mieghem and H. Wang. The observable part of a network. IEEE/ACM Transactions on Networking, 17(1):93–105, 2009. (doi:10.1109/TNET.2008.925089)
[223]
R. Venkataramu and M. Stamp. P2PTunes: A peer-to-peer digital rights management system. In Handbook of Research on Secure Multimedia Distribution, pages 137–156. IGI Global, 2009. (doi:10.4018/978-1-60566-262-6.ch008)
[224]
H.A. Vergara and D.S. Kim. A new method for the placement of buffers in serial production lines. International Journal of Production Research, 47(16):4437–4456, 2009. (doi:10.1080/00207540801939022)
[225]
I.V. Vitanov, V.I. Vitanov, and D.K. Harrison. Buffer capacity allocation using ant colony optimisation algorith. In Proceedings - Winter Simulation Conference, pages 3158–3168, 2009. (doi:10.1109/WSC.2009.5429277)
[226]
F. Von Reischach, F. Michahelles, and A. Schmidt. The design space of ubiquitous product recommendation systems. In MUM 2009 — Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, 2009. (doi:10.1145/1658550.1658552)
[227]
M. Štava and P. Tvrdık. Security system for overlapping non dedicated clusters. In Proceedings — 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, pages 272–281, 2009. (doi:10.1109/ISPA.2009.19)
[228]
C. Wagner, M.D. Gebremichael, M.K. Taylor, and M.J. Soltys. Disappearing act: Decay of uniform resource locators in health care management journals. Journal of the Medical Library Association, 97(2):122–130, 2009. (doi:10.3163/1536-5050.97.2.009)
[229]
W. Wang and Y. Chen. ePAD: Enhancing eMule for playing-as-downloading application. In Proceedings — 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, 2009. (doi:10.1109/WICOM.2009.5303293)
[230]
J. Wang, P. De Wilde, and H. Wang. Topological analysis of a two coupled evolving networks model for business systems. Expert Systems with Applications, 36(5):9548–9556, 2009. (doi:10.1016/j.eswa.2008.07.090)
[231]
J. Wang, Y. Li, and X. Jing. The research of resource locating model based on sub-domain hybrid P2P network. In Proceedings - 2009 International Conference on Information Engineering and Computer Science, ICIECS 2009, 2009. (doi:10.1109/ICIECS.2009.5362926)
[232]
J. Woodcock, P.G. Larsen, J. Bicarregui, and J. Fitzgerald. Formal methods: Practice and experience. ACM Computing Surveys, 41(4), 2009. (doi:10.1145/1592434.1592436)
[233]
Z. Wu. An empirical study of the accessibility of web references in two chinese academic journals. Scientometrics, 78(3):481–503, 2009. (doi:10.1007/s11192-007-1951-1)
[234]
R. Wuyts, H.M. Kienle, K. Mens, M. Van Den Brand, and A. Kuhn. Academic software development tools and techniques: Report on the 1st workshop WASDeTT at ECOOP 2008. In Object-Oriented Technology. ECOOP 2008 Workshop Reader, pages 87–103, 2009. (doi:10.1007/978-3-642-02047-6_10)
[235]
Q.-W. Xu and J. Gou. Hotdataspider, an ETL tool for supplementary data of biomedical journals. In FBIE 2009 - 2009 International Conference on Future BioMedical Information Engineering, pages 33–36, 2009. (doi:10.1109/FBIE.2009.5405918)
[236]
W. Xu, L. Huang, A. Fox, D. Patterson, and M. Jordan. Online system problem detection by mining patterns of console logs. In Proceedings - IEEE International Conference on Data Mining, ICDM, pages 588–597, 2009. (doi:10.1109/ICDM.2009.19)
[237]
Z. Yang and H. Ma. Hotspot avoidance for P2P streaming distribution application: A game theoretic approach. IEEE Transactions on Parallel and Distributed Systems, 20(2):219–232, 2009. (doi:10.1109/TPDS.2008.67)
[238]
L. Yang, Y. Liu, and Y. Liu. Optimization of source pencil deployment based on plant growth simulation algorithm. He Jishu/Nuclear Techniques, 32(12):915–921, 2009.
[239]
M.K.H. Yeung and Y.-K. Kwok. On game theoretic peer selection for resilient peer-to-peer media streaming. IEEE Transactions on Parallel and Distributed Systems, 20(10):1512–1525, 2009. (doi:10.1109/TPDS.2008.253)
[240]
S. Yi, J. Lee, H. Min, Y. Cho, and J. Hong. Yasic: Yet-another software integrity checker for security-critical wireless sensor networks. In 24th International Conference on Computers and Their Applications 2009, CATA 2009, pages 117–121, 2009.
[241]
U. Zdun and M. Strembeck. Reusable architectural decisions for DSL design: Foundational decisions in DSL development. In Proceedings of EuroPLoP 2009 - 14th Annual European Conference on Pattern Languages of Programming, 2009.
[242]
U. Zdun and M. Strembeck. Reusable architectural decisions for DSL design: Foundational decisions in DSL development. In 14th Annual European Conference on Pattern Languages of Programming, EuroPLoP 2009, volume 566, pages B61–B637, 2009.
[243]
Z. Zeng and B. Veeravalli. A novel distributed architecture of large-scale multimedia storage system using autonomous object-based storage devices. Journal of Parallel and Distributed Computing, 69(4):349–359, 2009. (doi:10.1016/j.jpdc.2008.12.004)
[244]
M. Zhao, X.-W. Li, and Q.-P. Liu. The realization of a kind of self-adapted making test paper system - using "object-oriented programming" for an example. In 2009 IEEE International Conference on Grey Systems and Intelligent Services, GSIS 2009, pages 1370–1374, 2009. (doi:10.1109/GSIS.2009.5408126)
[1]
T. AbuHmed, N. Nyamaa, and D. Nyang. Software-based remote code attestation in wireless sensor network. In GLOBECOM - IEEE Global Telecommunications Conference, 2009. (doi:10.1109/GLOCOM.2009.5425280)

[2]
B. Adams, W. De Meuter, H. Tromp, and A.E. Hassan. Can we refactor conditional compilation into aspects? In Proceedings of the 8th ACM International Conference on Aspect-Oriented Software Development, AOSD'09, pages 243–254, 2009. (doi:10.1145/1509239.1509274)

[3]
J. Agron. Domain-specific language for HW/SW co-design for FPGAs. In IFIP TC 2 Working Conference Domain-Specific Languages, DSL 2009, pages 262–284, jul 2009. Lecture Notes in Computer Science 5658. (doi:10.1007/978-3-642-03034-5_13)

[4]
H. Ahmadi, A. Mehrbakhsh, and E. Asgarian. Towards an efficient method for spreading information in social network. In Proceedings — 2009 3rd Asia International Conference on Modelling and Simulation, AMS 2009, pages 152–157, 2009. (doi:10.1109/AMS.2009.107)

[5]
R. Ahmed and R. Boutaba. Plexus: A scalable peer-to-peer protocol enabling efficient subset search. IEEE/ACM Transactions on Networking, 17(1):130–143, 2009. (doi:10.1109/TNET.2008.2001466)

[6]
P. Ai and Y. Chen. Extracting software component from hydrological information service system. In IAHS-AISH Publication, volume 331, pages 333–341, 2009.

[7]
Z. Aixin, T. Junhua, and W. Peng. Authentication tests based on test type matrix. In IEEE International Conference on Communications, 2009. (doi:10.1109/ICC.2009.5198770)

[8]
D. Akoumianakis. Managing universal accessibility requirements in software-intensive projects. Software Process Improvement and Practice, 14(1):3–29, 2009. (doi:10.1002/spip.383)

[9]
A. Al-Tameem, M. Zairi, and M. Kamala. Critical factors of information security implementation. In 2009 1st International Conference on Networked Digital Technologies, NDT 2009, pages 379–385, 2009. (doi:10.1109/NDT.2009.5272217)

[10]
M. Alshayeb. Empirical investigation of refactoring effect on software quality. Information and Software Technology, 51(9):1319–1326, 2009. (doi:10.1016/j.infsof.2009.04.002)

[11]
M. Amoretti. The peer-to-peer paradigm applied to hydrogen energy distribution. In IEEE EUROCON 2009, EUROCON 2009, pages 494–500, 2009. (doi:10.1109/EURCON.2009.5167678)

[12]
R. Anane, S. Marrocco, and B. Bordbar. Trusted P2P group interaction. In Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009, 2009. (doi:10.1109/CSA.2009.5404307)

[13]
R. Ando. Automated log analysis of infected windows os using mechanized reasoning. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5864 LNCS(PART 2):540–547, 2009. (doi:10.1007/978-3-642-10684-2_60)

[14]
O. Arafat and D. Riehle. The comment density of open source software code. In 2009 31st International Conference on Software Engineering — Companion Volume, ICSE 2009, pages 195–198, 2009. (doi:10.1109/ICSE-COMPANION.2009.5070980)

[15]
O. Arafat and D. Riehle. The commenting practice of open source. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA, pages 857–863, 2009. (doi:10.1145/1639950.1640047)

[16]
M. Avvenuti, C. Bernardeschi, N. De Francesco, and P. Masci. A tool for checking secure interaction in java cards. In EWDC 2009: 12th European Workshop on Dependable Computing, 2009.

[17]
A. Azab and H. Meling. Decentralized service allocation in a broker overlay based grid. Lecture Notes in Computer Science, 5931 LNCS:200–211, 2009. (doi:10.1007/978-3-642-10665-1_18)

[18]
M.A. Babar, T. Dingsøyr, P. Lago, and H. Van Vliet. Software architecture knowledge management: Theory and practice. Springer Berlin Heidelberg, 2009. (doi:10.1007/978-3-642-02374-3)

[19]
J. Bar-Ilan and B.C. Peritz. The lifespan of "informetrics" on the web: An eight year study (1998-2006). Scientometrics, 79(1):7–25, 2009. (doi:10.1007/s11192-009-0401-7)

[20]
S. Bashar and Z. Ding. Optimum routing protection against cumulative eavesdropping in multihop wireless networks. In Proceedings - IEEE Military Communications Conference MILCOM, 2009. (doi:10.1109/MILCOM.2009.5379981)

[21]
D. Battini, A. Persona, and A. Regattieri. Buffer size design linked to reliability performance: A simulative study. Computers and Industrial Engineering, 56(4):1633–1641, 2009. (doi:10.1016/j.cie.2008.10.020)

[22]
Douglas D. Beattie, Neal Lewis Creighton, Jr., Christopher T. M. Bailey, David L. Remy, and Hani Hamandi. Methods and systems for automated authentication, processing and issuance of digital certificates. United States Patent 7,562,212, July 2009. Assignee: GeoTrust, Inc. (Needham, MA).

[23]
A. Bergel, S. Denier, S. Ducasse, J. Laval, F. Bellingard, P. Vaillergues, F. Balmas, and K. Mordal-Manet. Squale — software quality enhancement. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 285–288, 2009. (doi:10.1109/CSMR.2009.13)

[24]
A.M. Bernardos, P. Tarrío, J. Iglesias, and J.R. Casar. Deploying context-aware services: A case study of rapid prototyping. In 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, 2009. (doi:10.1109/CCNC.2009.4784991)

[25]
R. Bernhaupt, D. Wilfinger, and T. Mirlacher. Personalizing the TV experience: Vocomedia — A case study from interactive TV. IGI Global, 2009. (doi:10.4018/978-1-60566-260-2.ch009)

[26]
M.H. Bhat. Missing web references - a case study of five scholarly journals. LIBER Quarterly, 19(2):131–139, 2009.

[27]
N. Bicocchi, M. Mamei, and F. Zambonelli. An evaporative approach to handle dynamics in diffusive aggregation schemes. In Proceedings of the 2009 Workshop on Bio-inspired Algorithms for Distributed Systems, BADS '09, pages 53–60, 2009.

[28]
C. Bird, N. Nagappan, P. Devanbu, H. Gall, and B. Murphy. Does distributed development affect software quality?: An empirical case study of Windows Vista. Communications of the ACM, 52(8):85–93, 2009. (doi:10.1145/1536616.1536639)

[29]
C. Bird, N. Nagappan, P. Devanbu, H. Gall, and B. Murphy. Does distributed development affect software quality? an empirical case study of windows vista. In Proceedings - International Conference on Software Engineering, pages 518–528, 2009. (doi:10.1109/ICSE.2009.5070550)

[30]
A.F. Blackwell, J.A. Rode, and E.F. Toye. How do we program the home? gender, attention investment, and the psychology of programming at home. International Journal of Human Computer Studies, 67(4):324–341, 2009. (doi:10.1016/j.ijhcs.2008.09.011)

[31]
P. Bosch, A. Brusilovsky, R. McLellan, S. Mullender, and P. Polakos. Secure base stations. Bell Labs Technical Journal, 13(4):227–244, 2009. (doi:10.1002/bltj.20346)

[32]
E.H.T.B. Brands and G. Karagiannis. Taxonomy of P2P applications. In 2009 IEEE Globecom Workshops, Gc Workshops 2009, 2009. (doi:10.1109/GLOCOMW.2009.5360707)

[33]
N.L. Brisola, A.O. Santin, L.C. Lung, H.B. Ribeiro, and M.H. Vithoft. A public keys based architecture for P2P identification, content authenticity and reputation. In Proceedings — International Conference on Advanced Information Networking and Applications, AINA, pages 159–164, 2009. (doi:10.1109/WAINA.2009.139)

[34]
S. Bryton and F.B. Abreu. Strengthening refactoring: towards software evolution with quantitative and experimental grounds. In 4th International Conference on Software Engineering Advances, ICSEA 2009, Includes SEDES 2009: Simposio para Estudantes de Doutoramento em Engenharia de Software, pages 570–575, 2009. (doi:10.1109/ICSEA.2009.90)

[35]
R. Bye, S.A. Camtepe, and S. Albayrak. Design and modeling of collaboration architecture for security. In 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009, pages 330–341, 2009. (doi:10.1109/CTS.2009.5067498)

[36]
V. Carchiolo, A. Lima, and G. Mangioni. Resource advertising in prosa p2p network. In IPDPS 2009 — Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, 2009. (doi:10.1109/IPDPS.2009.5160950)

[37]
Y. Chai, Z. Du, and Y. Chen. A stepwise optimization algorithm of clustered streaming media servers. Journal of Systems and Software, 82(8):1344–1361, 2009. (doi:10.1016/j.jss.2009.03.002)

[38]
D.L. Chan, R.W.P. Luk, H.V. Leong, and E.K.S. Ho. Discovering user interface requirements of search results for mobile clients by contextual inquiry. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5618 LNCS(PART 2):365–374, 2009. (doi:10.1007/978-3-642-02559-4_40)

[39]
H. Chehade, F. Yalaoui, L. Amodeo, and P. De Guglielmo. Multi-objective optimization problem for the dimensioning of buffers. Journal of Decision Systems, 18(2):257–287, 2009. (doi:10.3166/jds.18.257-287)

[40]
B. Chelf and C. Ebert. Ensuring the integrity of embedded software with static code analysis. IEEE Software, 26(3):96–99, 2009. (doi:10.1109/MS.2009.65)

[41]
S.-S. Chen, G. Yang, K. Wang, and Y.-C. Zhang. A redemption-based trust model for ad hoc networks. Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 29(4):20–25, 2009.

[42]
X. Chen, J. Zhang, W. Xu, and X. Luo. Deploying resource space model on a structured P2P network. In SKG 2009 - 5th International Conference on Semantics, Knowledge, and Grid, pages 72–77, 2009. (doi:10.1109/SKG.2009.76)

[43]
Z. Chen, J. Liu, D. Li, H. Liu, and A. Vasilakos. Sobie: A novel super-node P2P overlay based on information exchange. Journal of Computers, 4(9):853–861, 2009.

[44]
M.T. Cheung and Z. Liao. Investing in real-world equity markets with an AHP-based decision framework. Journal of Decision Systems, 18(2):149–163, 2009. (doi:10.3166/jds.18.149-163)

[45]
S.-F. Chiang, K. Chiang, R.-J. Yu, and S.-D. Wang. Scalable index and data management for unstructured peer-to-peer networks. In The Handbook of Research on Scalable Computing Technologies, volume 1, pages 123–139. IGI Global, 2009. (doi:10.4018/978-1-60566-661-7.ch006)

[46]
D. Chopra, H. Schulzrinne, E. Marocco, and E. Ivov. Peer-to-peer overlays for real-time communication: Security issues and solutions. IEEE Communications Surveys and Tutorials, 11(1):4–12, 2009. (doi:10.1109/SURV.2009.090102)

[47]
A. Cicchetti, D. Di Ruscio, P. Pelliccione, A. Pierantonio, and S. Zacchiroli. Towards a model driven approach to upgrade complex software systems. In ENASE 2009 — 4th International Conference on Evaluation of Novel Approaches to Software Engineering, Proceedings, pages 121–133, 2009.

[48]
D.-L. Cui, G.-Q. Feng, C.-E. Wang, and K. Yang. Research of business component based integration in complex product design environment. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 15(2):250–257, 2009.

[49]
G.L. Curry and R.M. Feldman. Manufacturing systems modeling and analysis. Springer Berlin Heidelberg, 2009. (doi:10.1007/978-3-540-88763-8)

[50]
D.N. da Hora, D.F. Macedo, L.B. Oliveira, I.G. Siqueira, A.A.F. Loureiro, J.M. Nogueira, and G. Pujolle. Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks. Computer Communications, 32(13-14):1445–1459, 2009. (doi:10.1016/j.comcom.2009.04.005)

[51]
V. D'Andrea, S. De Paoli, and M. Teli. The construction of peers and artifacts: The organizing role of ``programming guidelines''? In Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 2009. (doi:10.1109/HICSS.2009.422)

[52]
J. De Boever. Convergence of internet and TV: The commercial viability of P2P content delivery. Lecture Notes in Business Information Processing, 18:307–320, 2009. (doi:10.1007/978-3-642-01344-7_23)

[53]
A. Dedeke. Is Linux better than Windows software? IEEE Software, 26(3):103–104, May/June 2009. (doi:10.1109/MS.2009.72)

[54]
Ioannis Deliyannis, Anastasios Antoniou, and Panos Pandis. Design and development of an experimental low-cost internet-based interactive TV station. In A. Poulymenakou, N. Pouloudi, and K. Pramatari, editors, 4th Mediterranean Conference on Information Systems, pages 523–528, September 2009.

[55]
Z. Demirezen, M. Mernik, J. Gray, and B. Bryant. Verification of DSMLs using graph transformation: A case study with alloy. In ACM International Conference Proceeding Series, volume 413, 2009. (doi:10.1145/1656485.1656488)

[56]
Mark Doernhoefer. Surfing the net for software engineering notes. SIGSOFT Software Engineering Notes, 34(6):11–20, November 2009. (doi:10.1145/1640162.1655275)

[57]
B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In Proceedings of the ACM Conference on Computer and Communications Security, pages 566–577, 2009. (doi:10.1145/1653662.1653730)

[58]
L. Dong and Z. Yue-long. Distributed relational data sharing based on P2P. In Proceedings — 2009 International Conference on New Trends in Information and Service Science, NISS 2009, pages 378–383, 2009. (doi:10.1109/NISS.2009.144)

[59]
N.D. Doulamis, P.N. Karamolegkos, A. Doulamis, and I. Nikolakopoulos. Exploiting semantic proximities for content search over p2p networks. Computer Communications, 32(5):814–827, 2009. (doi:10.1016/j.comcom.2008.12.005)

[60]
I. Dzitac and B.E. B v arbat. Artificial intelligence + distributed systems = agents. International Journal of Computers, Communications and Control, 4(1):17–26, 2009.

[61]
E.J. Eckel. The emerging engineering scholar: A citation analysis of theses and dissertations at Western Michigan University. Issues in Science and Technology Librarianship, 56, 2009.

[62]
K.O. Elish and M. Alshayeb. Investigating the effect of refactoring on software testing effort. In Proceedings — Asia-Pacific Software Engineering Conference, APSEC, pages 29–34, 2009. (doi:10.1109/APSEC.2009.14)

[63]
C.-I. Fan, D.J. Guan, C.-I. Wang, and D.-R. Lin. Cryptanalysis of Lee-Hwang-Yang blind signature scheme. Computer Standards and Interfaces, 31(2):319–320, 2009. (doi:10.1016/j.csi.2008.02.002)

[64]
A. Ferrara, S. Montanelli, G. Varese, and S. Castano. Ontology knowledge authoring by natural language empowerment. In Proceedings — International Workshop on Database and Expert Systems Applications, DEXA, pages 469–473, 2009. (doi:10.1109/DEXA.2009.40)

[65]
J. Fjermestad and N.C. Romano Jr. Information privacy and security for e-CRM. In Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions, pages 48–70. IGI Global, 2009. (doi:10.4018/978-1-60566-196-4.ch004)

[66]
A. Forestiero and C. Mastroianni. A swarm algorithm for a self-structured P2P information system. IEEE Transactions on Evolutionary Computation, 13(4):681–694, 2009. (doi:10.1109/TEVC.2008.2011478)

[67]
A. Forestiero, C. Mastroianni, and M. Meo. Self-chord: A bio-inspired algorithm for structured P2P systems. In 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009, pages 44–51, 2009. (doi:10.1109/CCGRID.2009.39)

[68]
A. Forte, V. Larco, and A. Bruckman. Decentralization in Wikipedia governance. Journal of Management Information Systems, 26(1):49–72, 2009. (doi:10.2753/MIS0742-1222260103)

[69]
R.E. Gallardo-Valencia and S.E. Sim. Internet-scale code search. In Proceedings - International Conference on Software Engineering, pages 49–52, 2009. (doi:10.1109/SUITE.2009.5070022)

[70]
R. Gandhi and S.-W. Lee. Ontology guided risk analysis: From informal specifications to formal metrics. Studies in Computational Intelligence, 251:227–249, 2009. (doi:10.1007/978-3-642-04141-9_11)

[71]
K. Gary, H. Koehnemann, J. Blakley, C. Goar, H. Mann, and A. Kagan. A case study: Open source community and the commercial enterprise. In ITNG 2009 - 6th International Conference on Information Technology: New Generations, pages 940–945, 2009. (doi:10.1109/ITNG.2009.313)

[72]
R. Gelbard. Decision rule for investment in reusable code. IGI Global, 2009. (doi:10.4018/978-1-59904-630-3.Ch012)

[73]
P. Giotis and G. Lekakos. Effectiveness of interactive advertising presentation models. In EuroITV'09 - 7th European Conference on European Interactive Television Conference, pages 157–160, 2009. (doi:10.1145/1542084.1542115)

[74]
M. Golfarelli. Open source BI platforms: A functional and architectural comparison. In Torben Bach Pedersen, Mukesh K. Mohania, and A Min Tjoa, editors, Data Warehousing and Knowledge Discovery: 11th International Conference, DaWaK 2009, pages 287–297, August 2009. (doi:10.1007/978-3-642-03730-6_23)

[75]
C.E. Gómez, M. Del Pilar Villamil, H.E. Castro, and L. D'Orazio. DHTCache: A distributed service to improve the selection of cache configurations within a highly-distributed context. Lecture Notes in Computer Science, 5697 LNCS:48–59, 2009. (doi:10.1007/978-3-642-03715-3_5)

[76]
T.R. Gopalakrishnan Nair, R. Selvarani, and M. Ramachandran. Comprehensive software industry analysis model (CSIAM). In Handbook of Research on Software Engineering and Productivity Technologies: Implications of Globalization, pages 128–138. IGI Global, 2009. (doi:10.4018/978-1-60566-731-7.ch010)

[77]
S. Greiner. Run-time manipulation of programs in a statically-typed language. Informatica (Ljubljana), 33(3):397–398, 2009.

[78]
Y.-G. Guéhéneuc, J.-Y. Guyomarc'h, and H. Sahraoui. Improving design-pattern identification: A new approach and an exploratory study. Software Quality Journal, 18(1):145–174, 2009. (doi:10.1007/s11219-009-9082-y)

[79]
S.T. Halkidis, A. Chatzigeorgiou, and G. Stephanides. Moving from requirements to design confronting security issues: A case study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5871 LNCS(PART 2):798–814, 2009. (doi:10.1007/978-3-642-05151-7_4)

[80]
M. Hamed Firooz, A. Nasiri Avanaki, M. Reza Pakravan, and K. Ronasi. A fast and reliable multi-sender algorithm for peer-to-peer networks. Journal of Network and Computer Applications, 32(3):733–740, 2009. (doi:10.1016/j.jnca.2008.06.004)

[81]
M. Hammad and J. Cook. Lightweight monitoring of sensor software. In Proceedings of the ACM Symposium on Applied Computing, pages 2180–2185, 2009. (doi:10.1145/1529282.1529763)

[82]
K. Han, Q. Guo, and J. Luo. Optimal peer selection, task assignment and rate allocation for P2P downloading. In Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS 2009, pages 1088–1090, 2009. (doi:10.1109/ETCS.2009.248)

[83]
T. Hata, M. Takemoto, T. Kambayashi, K. Uchiyama, and M. Teramoto. A network architecture to easily control devices. In Proceedings — 2009 9th Annual International Symposium on Applications and the Internet, SAINT 2009, pages 189–192, 2009. (doi:10.1109/SAINT.2009.39)

[84]
Z. He and Y. Ma. Research and analysis of the optimization of the unstructured P2P overlay networks. In Proceedings — 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, 2009. (doi:10.1109/WICOM.2009.5301864)

[85]
M.V.J. Heikkinen, A. Kivi, and H. Verkasalo. Measuring mobile peer-to-peer usage: Case Finland 2007. Lecture Notes in Computer Science, 5448:165–174, 2009. (doi:10.1007/978-3-642-00975-4_17)

[86]
F. Hermans, M. Pinzger, and A. Van Deursen. Domain-specific languages in practice: A user study on the success factors. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5795 LNCS:423–437, 2009. (doi:10.1007/978-3-642-04425-0_33)

[87]
C.-P. Hong, E.-H. Lee, and S.-D. Kim. An efficient scheme to construct virtual community for multimedia content sharing based on profile in a ubiquitous computing environment. In NCM 2009 — 5th International Joint Conference on INC, IMS, and IDC, pages 1271–1276, 2009. (doi:10.1109/NCM.2009.86)

[88]
C.-P. Hong, E.-H. Lee, C.C. Weems, and S.-D. Kim. A profile-based multimedia sharing scheme with virtual community, based on personal space in a ubiquitous computing environment. IEEE Transactions on Multimedia, 11(7):1353–1361, 2009. (doi:10.1109/TMM.2009.2030616)

[89]
C.-L. Hu and T.-H. Kuo. Hierarchical peer-to-peer overlay with cluster-reputation-based adaptation. In IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing — Proceedings, pages 691–696, 2009. (doi:10.1109/PACRIM.2009.5291286)

[90]
K.R. Islam and C. Snow. A cost-effective distributed architecture to enable distance education over emerging wireless technologies. In SIGITE'09 — Proceedings of the 2009 ACM Special Interest Group for Information Technology Education, pages 182–186, 2009. (doi:10.1145/1631728.1631777)

[91]
G. Jacob, E. Filiol, and H. Debar. Functional polymorphic engines: Formalisation, implementation and use cases. Journal in Computer Virology, 5(3):247–261, 2009. (doi:10.1007/s11416-008-0095-z)

[92]
H. Jiang, J. Li, and Z.-C. Li. Hybrid content distribution network and its performance modeling. Jisuanji Xuebao/Chinese Journal of Computers, 32(3):473–482, 2009. (doi:10.3724/SP.J.1016.2009.00473)

[93]
L. Jin, W. Qinmin, Z. Daoli, and H. Yihong. Multi-stage dynamic coordination model for large-scale crowd's activities based on multi-agent. In 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009, volume 1, pages 487–491, 2009. (doi:10.1109/CSIE.2009.67)

[94]
S. Josse. White-box attack context cryptovirology. Journal in Computer Virology, 5(4):321–334, 2009. (doi:10.1007/s11416-008-0097-x)

[95]
G. Kakaletris, D. Varoutas, D. Katsianis, and T. Sphicopoulos. Design and implementation approaches for location-based, tourism-related services. IGI Global, 2009. (doi:10.4018/978-1-59140-995-3.ch048)

[96]
P. Kamthan. Embracing the social web for managing patterns. In Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications, volume 1, pages 733–747. IGI Global, 2009. (doi:10.4018/978-1-60566-384-5.ch042)

[97]
I. Kantzavelou and S. Katsikas. Playing games with internal attackers repeatedly. In 2009 16th International Conference on Systems, Signals and Image Processing, IWSSIP 2009, 2009. (doi:10.1109/IWSSIP.2009.5367708)

[98]
P. Karamolegkos and N. Doulamis. Multimedia file exchange and P2P social networking: Efficient allocation of users into communities of interest. In 2009 International Conference on Ultra Modern Telecommunications and Workshops, 2009. (doi:10.1109/ICUMT.2009.5345647)

[99]
S. Karpischek, F. Michahelles, F. Resatsch, and E. Fleisch. Mobile sales assistant: An NFC-based product information system for retailers. In Proceedings — 2009 1st International Workshop on Near Field Communication, NFC 2009, pages 20–23, 2009. (doi:10.1109/NFC.2009.18)

[100]
D.R. Karrels, G.L. Peterson, and B.E. Mullins. Structured P2P technologies for distributed command and control. Peer-to-Peer Networking and Applications, 2(4):311–333, 2009. (doi:10.1007/s12083-009-0033-y)

[101]
A. Karygiannis and E. Antonakakis. Security and privacy issues in agent-based location-aware mobile commerce. Lecture Notes in Computer Science, 4324 LNAI:308–329, 2009. (doi:10.1007/978-3-642-04879-1_21)

[102]
S. Kelly and R. Pohjonen. Worst practices for domain-specific modeling. IEEE Software, 26(4):22–29, 2009. (doi:10.1109/MS.2009.109)

[103]
H. Ketmaneechairat, P. Oothongsap, and A. Mingkhwan. Smart buffer management for different start video broadcasting. In ACM International Conference Proceeding Series, volume 403, pages 615–619, 2009. (doi:10.1145/1655925.1656036)

[104]
S.U. Khan, A.A. Maciejewski, and H.J. Siegel. Robust CDN replica placement techniques. In IPDPS 2009 — Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, 2009. (doi:10.1109/IPDPS.2009.5160908)

[105]
F. Khomh, Y.-G. Guéhéneuc, and G. Antoniol. Playing roles in design patterns: An empirical descriptive and analytic study. In IEEE International Conference on Software Maintenance, ICSM, pages 83–92, 2009. (doi:10.1109/ICSM.2009.5306327)

[106]
E. Kocagüneli, A. Tosun, A. Bener, B. Turhan, and B. Ça v glayan. Prest: An intelligent software metrics extraction, analysis and defect prediction tool. In Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, pages 637–642, 2009.

[107]
J. Kokemüller and A. Weisbecker. Aster data management: Products and research. In Proceedings of the 2009 International Conference on Information Quality, ICIQ 2009, 2009.

[108]
S. Kondakci. A concise cost analysis of Internet malware. Computers and Security, 28(7):648–659, 2009. (doi:10.1016/j.cose.2009.03.007)

[109]
K. Kotapati, P. Liu, and T.F. La Porta. Evaluating MAPSec by marking attack graphs. Wireless Networks, 15(8):1042–1058, 2009. (doi:10.1007/s11276-008-0101-x)

[110]
E. Kühn and V. Sesum-Cavic. A space-based generic pattern for self-initiative load balancing agents. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5881 LNAI:17–32, 2009. (doi:10.1007/978-3-642-10203-5_3)

[111]
H. Kwon, Y.-H. Moon, J. Nah, and D. Seo. Protecting IPTV service network against malicious rendezvous point. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5932 LNCS:1–9, 2009. (doi:10.1007/978-3-642-10838-9_1)

[112]
Y.-X. Lai and Z.-H. Liu. Unknown malicious identification. Lecture Notes in Electrical Engineering, 39 LNEE:301–312, 2009. (doi:10.1007/978-90-481-2311-7_26)

[113]
K.-C. Lai, C.-C. Wu, and S.-J. Lin. Exploring job migration technique for P2P grid systems. International Journal of Grid and High Performance Computing, 1(4):16–25, 2009. (doi:10.4018/jghpc.2009070802)

[114]
S.I. Lee, H. Park, and M. Van Der Schaar. Foresighted joint resource reciprocation and scheduling strategies for real-time video streaming over peer-to-peer networks. In 2009 17th International Packet Video Workshop, PV 2009, 2009. (doi:10.1109/PACKET.2009.5152153)

[115]
H. Lee. Agent based video contents identification and data mining using watermark based filtering. Springer US, 2009. (doi:10.1007/978-1-4419-0522-2_22)

[116]
T. Levendovszky, L. Lengyel, and T. Mészáros. Supporting domain-specific model patterns with metamodeling. Software and Systems Modeling, 8(4):501–520, 2009. (doi:10.1007/s10270-009-0118-3)

[117]
W. Li and D. Hoang. A new security scheme for e-health system. In 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009, pages 361–366, 2009. (doi:10.1109/CTS.2009.5067502)

[118]
J. Li, Q. Wu, and D. Zhu. Route guidance mechanism with centralized information control in large-scale crowd's activities. In IJCAI International Joint Conference on Artificial Intelligence, pages 7–11, 2009. (doi:10.1109/JCAI.2009.41)

[119]
T. Li, H. Ji, J. Mei, Y. Li, and C. Hu. Topology mismatch avoidable cross-layer protocol for P2P file discovery in MANETs. In IEEE Wireless Communications and Networking Conference, WCNC, 2009. (doi:10.1109/WCNC.2009.4917995)

[120]
C.-C. Liang, C.-H. Wang, H. Luh, and P.-Y. Hsu. Disaster avoidance mechanism for content-delivering service. Computers and Operations Research, 36(1):27–39, January 2009. (doi:10.1016/j.cor.2007.09.001)

[121]
Z. Liang, W. Sun, V.N. Venkatakrishnan, and R. Sekar. Alcatraz: An isolated environment for experimenting with untrusted software. ACM Transactions on Information and System Security, 12(3), 2009. (doi:10.1145/1455526.1455527)

[122]
C.-S. Lin and Y.-C. Cheng. A barter-based incentive mechanism for peer-to-peer media streaming. In Digest of Technical Papers — IEEE International Conference on Consumer Electronics, pages 871–875, 2009. (doi:10.1109/ISCE.2009.5157001)

[123]
X. Lin. Cat: Building couples to early detect node compromise attack in wireless sensor networks. In GLOBECOM - IEEE Global Telecommunications Conference, 2009. (doi:10.1109/GLOCOM.2009.5425922)

[124]
P. Liu, T.F. LaPorta, and K. Kotapati. Cellular network security. In Computer and Information Security Handbook, pages 183–203. Elsevier Inc., 2009. (doi:10.1016/B978-0-12-374354-1.00012-1)

[125]
Y. Liu, K. Xu, C. Yang, and N. Xiong. Model of controlling the hubs in P2P networks. Journal of Networks, 4(4):236–243, 2009.

[126]
Y. Liu, X. Zhang, and H. Sun. The P2P wireless network applied in real-time vehicle navigation. In 3rd International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, pages 439–444, 2009. (doi:10.1109/MUE.2009.78)

[127]
M. Locci, G. Concas, and I. Turnu. Computing the fractal dimension of software networks. In Proceedings of the 9th WSEAS International Conference on Applied Computer Science, ACS '09, pages 146–151, 2009.

[128]
X. Lou and K. Hwang. Collusive piracy prevention in P2P content delivery networks. IEEE Transactions on Computers, 58(7):970–983, 2009. (doi:10.1109/TC.2009.26)

[129]
X. Lou, K. Hwang, and Y. Hu. Accountable file indexing against DDoS attacks in peer-to-peer networks. In GLOBECOM - IEEE Global Telecommunications Conference, 2009. (doi:10.1109/GLOCOM.2009.5425979)

[130]
F. Loukos and H. Karatza. Enabling cooperation in MANET-based peer-to-peer systems. IGI Global, 2009. (doi:10.4018/978-1-60566-715-7.ch006)

[131]
S.G. Lynn, D.R. Olsen Jr., and B.G. Partridge. Time warp football. In EuroITV'09 — Proceedings of the 7th European Conference on European Interactive Television Conference, pages 77–86, 2009. (doi:10.1145/1542084.1542098)

[132]
M. Madruga, S. Loest, and C. Maziero. Using transparent files in a fault tolerant distributed file system. In Proceedings — 2009 International Symposium on Autonomous Decentralized Systems, ISADS 2009, pages 109–114, 2009. (doi:10.1109/ISADS.2009.5207347)

[133]
T.K. Madsen, Q. Zhang, F. Fitzek, and M. Katz. Exploiting cooperation for performance enhancement and high data rates. Journal of Communications, 4(3):193–202, 2009.

[134]
E. Magnusson, T. Ekman, and G. Hedin. Demand-driven evaluation of collection attributes. Automated Software Engineering, 16(2):291–322, 2009. (doi:10.1007/s10515-009-0046-z)

[135]
H. Maisonneuve and C. Schnitter. The future of electronic biomedical journals. Presse Medicale, 38(10):1418–1424, 2009. (doi:10.1016/j.lpm.2009.07.002)

[136]
D. Man, Y. Ito, and K. Nakano. An efficient parallel sorting compatible with the standard qsort. In Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, pages 512–517, 2009. (doi:10.1109/PDCAT.2009.55)

[137]
D. Matter, A. Kuhn, and O. Nierstrasz. Assigning bug reports using a vocabulary-based expertise model of developers. In Proceedings of the 2009 6th IEEE International Working Conference on Mining Software Repositories, MSR 2009, pages 131–140, 2009. (doi:10.1109/MSR.2009.5069491)

[138]
P. McManus, C. Standing, and R. Zanoli. A preliminary laddering analysis on mobile services. In 17th European Conference on Information Systems, ECIS 2009, 2009.

[139]
D.A. McMeekin, B.R.V. Konsky, E. Chang, and D.J.A. Cooper. Evaluating software inspection cognition levels using Bloom's taxonomy. In Proceedings — 22nd Conference on Software Engineering Education and Training, CSEET 2009, pages 232–239, 2009. (doi:10.1109/CSEET.2009.15)

[140]
G. Me, D. Pirro, and R. Sarrecchia. Strong authentication for financial services: PTDs as a compromise between security and usability. In Mobile and Ubiquitous Commerce: Advanced E-Business Methods, pages 101–114. IGI Global, 2009. (doi:10.4018/978-1-60566-366-1.ch007)

[141]
H. Mendes, L. Weigang, A. Boukerche, and A.C.M.A. De Melo. Bag-of-tasks self-scheduling over range-queriable search overlays. In NPC 2009 — 6th International Conference on Network and Parallel Computing, pages 109–116, 2009. (doi:10.1109/NPC.2009.37)

[142]
W.-H. Min and Y.-G. Cheong. An interactive-content technique based approach to generating personalized advertisement for privacy protection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5618 LNCS(PART 2):185–191, 2009. (doi:10.1007/978-3-642-02559-4_21)

[143]
B. Molina, S.F. Pileggi, M. Esteve, and C.E. Palau. A negotiation framework for content distribution in mobile transient networks. Journal of Network and Computer Applications, 32(5):1000–1011, 2009. (doi:10.1016/j.jnca.2009.03.007)

[144]
J.L. Muñoz, O. Esparza, J. Forné, and E. Pallares. Design and implementation of a lightweight online certificate validation service. Telecommunication Systems, 41(3):229–241, 2009. (doi:10.1007/s11235-009-9144-2)

[145]
J. Munro, C. Boldyreff, and A. Capiluppi. Architectural studies of games engines — the Quake series. In 1st International IEEE Consumer Electronic Society's Games Innovation Conference, ICE-GiC 09, pages 246–255, 2009. (doi:10.1109/ICEGIC.2009.5293600)

[146]
E. Murphy-Hill, C. Parnin, and A.P. Black. How we refactor, and how we know it. In Proceedings - International Conference on Software Engineering, pages 287–297, 2009. (doi:10.1109/ICSE.2009.5070529)

[147]
N. Nahas, M. Nourelfath, and D. Ait-Kadi. Selecting machines and buffers in unreliable series-parallel production lines. International Journal of Production Research, 47(14):3741–3774, 2009. (doi:10.1080/00207540701806883)

[148]
D. Nobayashi, Y. Nakamura, T. Ikenaga, and Y. Hori. Development of single sign-on system with hardware token and key management server. IEICE Transactions on Information and Systems, E92-D(5):826–835, 2009. (doi:10.1587/transinf.E92.D.826)

[149]
J. O'Donoghue, J.B. McCarthy, S. Huang, and F. Adam. Evaluating the integration of leading edge pervasive technologies to improve service-based performance. In 3rd European Conference on Information Management and Evaluation, 2009, pages 363–370. Academic Conferences Limited, 2009.

[150]
M.J. O'Grady, G.M.P. O'Hare, J. Chen, and D. Phelan. Distributed network intelligence: A prerequisite for adaptive and personalised service delivery. Information Systems Frontiers, 11(1):61–73, 2009. (doi:10.1007/s10796-008-9140-1)

[151]
C. Okoli. A brief review of studies of wikipedia in peer-reviewed journals. In Proceedings of the 3rd International Conference on Digital Society, ICDS 2009, pages 155–160, 2009. (doi:10.1109/ICDS.2009.28)

[152]
F. Ortega and D. Izquierdo-Cortazar. Survival analysis in open development projects. In Proceedings of the 2009 ICSE Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development, FLOSS 2009, pages 7–12, 2009. (doi:10.1109/FLOSS.2009.5071353)

[153]
J.L. Ortega, V. Cothey, and I.F. Aguillo. How old is the web? characterizing the age and the currency of the european scientific web. Scientometrics, 81(1):295–309, 2009. (doi:10.1007/s11192-008-2149-x)

[154]
Z. Ou, E. Harjula, O. Kassinen, and M. Ylianttila. Feasibility evaluation of a communication-oriented P2P system in mobile environments. In Proceedings of the 6th International Conference on Mobile Technology, Application and Systems, Mobility '09, 2009. (doi:10.1145/1710035.1710078)

[155]
Z. Ou, E. Harjula, and M. Ylianttila. Effects of different churn models on the performance of structured peer-to-peer networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2009. (doi:10.1109/PIMRC.2009.5450134)

[156]
R. Owens and W. Wang. Building a dark piconet upon bluetooth interfaces of computers. In Proceedings - IEEE Military Communications Conference MILCOM, 2009. (doi:10.1109/MILCOM.2009.5379892)

[157]
Y. Padioleau, L. Tan, and Y. Zhou. Listening to programmers - taxonomies and characteristics of comments in operating system code. In Proceedings - International Conference on Software Engineering, pages 331–341, 2009. (doi:10.1109/ICSE.2009.5070533)

[158]
Y. Padioleau. Parsing C/C++ code without pre-processing. Lecture Notes in Computer Science, 5501 LNCS:109–125, 2009. (doi:10.1007/978-3-642-00722-4_9)

[159]
R.F. Paige, D.S. Kolovos, L.M. Rose, N. Drivalos, and F.A.C. Polack. The design of a conceptual framework and technical infrastructure for model management language engineering. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, pages 162–171, 2009. (doi:10.1109/ICECCS.2009.14)

[160]
J.D. Palmer. Ginger: Implementing a new Lisp family syntax. In Proceedings of the 47th Annual Southeast Regional Conference, ACM-SE 47, 2009. (doi:10.1145/1566445.1566481)

[161]
F.S. Park, C. Gangakhedkar, and P. Traynor. Leveraging cellular infrastructure to improve fraud prevention. In Proceedings - Annual Computer Security Applications Conference, ACSAC, pages 350–359, 2009. (doi:10.1109/ACSAC.2009.40)

[162]
K. Pentikousis, C. Meirosu, A. Miron, and M. Brunner. Self-management for a network of information. In Proceedings — 2009 IEEE International Conference on Communications Workshops, ICC 2009, 2009. (doi:10.1109/ICCW.2009.5207967)

[163]
K. Pentikousis. Distributed information object resolution. In Proceedings of the 8th International Conference on Networks, ICN 2009, pages 360–366, 2009. (doi:10.1109/ICN.2009.31)

[164]
R. Peplow, D.S. Dawoud, and J. Van Der Merwe. Ensuring privacy in vehicular communication. In Proceedings of the 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2009, pages 610–614, 2009. (doi:10.1109/WIRELESSVITAE.2009.5172516)

[165]
D. Pierret and D. Poshyvanyk. An empirical exploration of regularities in open-source software lexicons. IEEE International Conference on Program Comprehension, pages 228–232, 2009. (doi:10.1109/ICPC.2009.5090047)

[166]
W. Ping, Q. Jing, and Q.Y. Hui. A computation trust model with confidence in unstructured P2P systems. In 2009 Joint Conferences on Pervasive Computing, JCPC 2009, pages 451–454, 2009. (doi:10.1109/JCPC.2009.5420144)

[167]
R.I. Podlovchenko, N.N. Kuzyurin, V.S. Shcherbina, and V.A. Zakharov. Using algebraic models of programs for detecting metamorphic malwares. Fundamental and Applied Mathematics, 15(5):181–198, 2009.

[168]
S. Poslad. Ubiquitous Computing: Smart Devices, Environments and Interactions. John Wiley and Sons, 2009. (doi:10.1002/9780470779446)

[169]
K. Pousttchi, M. Schiessler, and D.G. Wiedemann. Proposing a comprehensive framework for analysis and engineering of mobile payment business models. Information Systems and e-Business Management, 7(3):363–393, 2009. (doi:10.1007/s10257-008-0098-9)

[170]
N. Pratas, P.N. Anggraeni, S.A. Wardana, N.R. Prasad, A. Rodrigues, and R. Prasad. Context-aware trust and privacy application for mobile identification system. In IEEE Wireless Communications and Networking Conference, WCNC, 2009. (doi:10.1109/WCNC.2009.4917639)

[171]
C.R. Prause. Maintaining fine-grained code metadata regardless of moving, copying and merging. In 9th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, pages 109–118, 2009. (doi:10.1109/SCAM.2009.20)

[172]
H. Rao, C. Yang, and S. Tao. Controlling model for the hotspots in peer-to-peer networks. In Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS 2009, pages 665–669, 2009. (doi:10.1109/ETCS.2009.154)

[173]
J. Ravi, Z. Yu, and W. Shi. A survey on dynamic web content generation and delivery techniques. Journal of Network and Computer Applications, 32(5):943–960, 2009. (doi:10.1016/j.jnca.2009.03.005)

[174]
L. Rodero-Merino, A.F. Anta, L. López, and V. Cholvi. Self-managed topologies in p2p networks. Computer Networks, 53(10):1722–1736, 2009. (doi:10.1016/j.comnet.2008.09.006)

[175]
N.C. Romano Jr. and J. Fjermestad. Privacy and security in the age of electronic customer relationship management. In Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, pages 189–210. IGI Global, 2009. (doi:10.4018/978-1-60566-210-7.ch013)

[176]
C. Roncancio, M. Del Pilar Villamil, C. Labbé, and P. Serrano-Alvarado. Data sharing in DHT based P2P systems. Lecture Notes in Computer Science, 5740 LNCS:327–352, 2009. (doi:10.1007/978-3-642-03722-1_13)

[177]
B. Rood and M.J. Lewis. Grid resource availability prediction-based scheduling and task replication. Journal of Grid Computing, 7(4):479–500, 2009. (doi:10.1007/s10723-009-9135-2)

[178]
Jonathan B. Rosenberg, John Harrison, David L. Remy, and Neal L. Creighton. Web site identity assurance. United States Patent 7,552,466, June 2009. Assignee: GeoTrust, Inc. (Mountain View, CA).

[179]
S. Roubtsov, A. Serebrenik, and M.D. Van Brand. Dn-based design quality comparison of industrial java applications. In 2009 5th Central and Eastern European Software Engineering Conference in Russia, CEE-SECR 2009, pages 95–101, 2009. (doi:10.1109/CEE-SECR.2009.5501182)

[180]
S. Rui, W. Ji, Z. Shengdong, S. Siqi, and F. Pei. A framework for constructing peer-to-peer overlay networks in Java. In Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, PPPJ 2009, pages 40–48, 2009. (doi:10.1145/1596655.1596662)

[181]
A. Sæbjørnsen, L. Jiang, D. Quinlan, and Z. Su. Static validation of c preprocessor macros. In ASE2009 - 24th IEEE/ACM International Conference on Automated Software Engineering, pages 149–160, 2009. (doi:10.1109/ASE.2009.75)

[182]
J. Sanchez Cuadrado and J.G. Molina. A model-based approach to families of embedded domain-specific languages. IEEE Transactions on Software Engineering, 35(6):825–840, 2009. (doi:10.1109/TSE.2009.14)

[183]
C.G. Santillán, L. Cruz-Reyes, E. Meza, T.T. López, M.A. Aguirre Lam, and E. Schaeffer. Improving distributed resource search through a statistical methodology of topological feature selection. Journal of Computers, 4(8):727–733, 2009.

[184]
D.S.S. Santos, A.M.J. Pereira, and R.M.R.M. Gonçalves. Intelligent cart: Architecture of an innovative system for the acquisition of products in grocery stores. In 11th International Business Information Management Association Conference, IBIMA 2009, volume 1-3, pages 350–357. International Business Information Management Association, IBIMA, 2009.

[185]
K. Sarelo. A SOA for ubiquitous communication management. In iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services, pages 253–260, 2009. (doi:10.1145/1806338.1806386)

[186]
M.I. Sarwar, W. Tanveer, and I. Sarwar. Performance of MI tools in perspective of open source software. In 2009 2nd International Conference on Computer, Control and Communication, IC4 2009, 2009. (doi:10.1109/IC4.2009.4909213)

[187]
H. Schackmann and H. Lichter. Evaluating process quality in GNOME based on change request data. In Proceedings of the 2009 6th IEEE International Working Conference on Mining Software Repositories, MSR 2009, pages 95–98, 2009. (doi:10.1109/MSR.2009.5069485)

[188]
H. Schackmann, H. Schaefer, and H. Lichter. Evaluating process quality based on change request data - an empirical study of the eclipse project. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5891 LNCS:227–241, 2009. (doi:10.1007/978-3-642-05415-0_17)

[189]
J. Schänfer and K. Malinka. Security in peer-to-peer networks : Empiric model of file diffusion in bittorrent. In Proceedings — 2009 4th International Conference on Internet Monitoring and Protection, ICIMP 2009, pages 39–44, 2009. (doi:10.1109/ICIMP.2009.14)

[190]
D. Schlosser and T. Hoßfeld. Mastering selfishness and heterogeneity in mobile P2P content distribution networks with multiple source download in cellular networks. Peer-to-Peer Networking and Applications, 2(3):252–266, 2009. (doi:10.1007/s12083-009-0034-x)

[191]
A.U. Schmidt. On the superdistribution of digital goods. Journal of Universal Computer Science, 15(2):401–425, 2009.

[192]
V. Sesum-Cavic and E. Kühn. Peer-to-peer overlay network based on swarm intelligence. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5881 LNAI:65–67, 2009. (doi:10.1007/978-3-642-10203-5_6)

[193]
V.A. Shekhovtsov, Y. Tomilko, and M.D. Godlevskiy. Facilitating reuse of code checking rules in static code analysis. Lecture Notes in Business Information Processing, 20:91–102, 2009. (doi:10.1007/978-3-642-01112-2_10)

[194]
M. Sherr, G. Shah, E. Cronin, S. Clark, and M. Blaze. Can they hear me now? a security analysis of law enforcement wiretaps. In Proceedings of the ACM Conference on Computer and Communications Security, pages 512–523, 2009. (doi:10.1145/1653662.1653724)

[195]
S. Sioutas, E. Sakkopoulos, Ch. Makris, B. Vassiliadis, A. Tsakalidis, and P. Triantafillou. Dynamic web service discovery architecture based on a novel peer based overlay network. Journal of Systems and Software, 82(5):809–824, 2009. (doi:10.1016/j.jss.2008.11.845)

[196]
H. Söezer, M. Tekkalmaz, and I. Korpeoglu. A peer-to-peer file search and download protocol for wireless ad-hoc networks. Computer Communications, 32(1):41–50, 2009. (doi:10.1016/j.comcom.2008.09.004)

[197]
J. Sorribas, D. Afonso, E. Arilla, O. Garcia, A. Hernández, J. Olivé, J.L. Ruiz, X. Romero, A. Sandoval, J.A. Serrano, E. Trullols, and J. Del Río. Real-time fleet ship monitoring system using satellite broadband communications and Google Earth. In Proceedings — 2009 1st International Conference on Advances in Satellite and Space Communications, SPACOMM 2009, pages 146–155, 2009. (doi:10.1109/SPACOMM.2009.44)

[198]
José Felipe Ortega Soto. Wikipedia: A Quantiative Analysis. PhD thesis, Universidad Rey Juan Carlos, Madrid, 2009.

[199]
A.M. Sourouni, S. Mouzakitis, G. Kourlimpinis, D. Askounis, and G. Velegrakis. E-business transactions modelling; an ontology-based repository. In Proceedings — 2009 International Conference on Interoperability for Enterprise Software and Applications, IESA 2009, pages 63–69, 2009. (doi:10.1109/I-ESA.2009.49)

[200]
S.M. Srinivasan and A.H. Azadmanesh. Data aggregation in partially connected networks. Computer Communications, 32(4):594–601, 2009. (doi:10.1016/j.comcom.2008.11.021)

[201]
I. Stamelos. Teaching software engineering with free/libre open source projects. International Journal of Open Source Software and Processes, 1(1):72–90, 2009.

[202]
M. Strembeck and U. Zdun. An approach for the systematic development of domain-specific languages. Software — Practice and Experience, 39(15):1253–1292, 2009. (doi:10.1002/spe.936)

[203]
B. Suh, G. Convertino, E.H. Chi, and P. Pirolli. The singularity is not near: Slowing growth of Wikipedia. In Proceedings of the 5th International Symposium on Wikis and Open Collaboration, WiKiSym 2009, 2009. (doi:10.1145/1641309.1641322)

[204]
C.X.H. Tang and H.C.W. Lau. Joint optimization for knowledge mining: Evaluating parameters of manufacturing processes. In Proceedings — 2009 International Conference on Information Management and Engineering, ICIME 2009, pages 689–693, 2009. (doi:10.1109/ICIME.2009.119)

[205]
S.M. Tawfik and N.M. El-Mekky. Unified framework of attributes in software quality models. AEJ - Alexandria Engineering Journal, 48(6):679–692, 2009.

[206]
A. Telea and L. Voinea. Case study: Visual analytics in software product assessments. In Proceedings of VISSOFT 2009 — 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis, pages 65–72, 2009. (doi:10.1109/VISSOF.2009.5336417)

[207]
Y.M. Teo, V. March, and M. Mihailescu. Hierarchical structured peer-to-peer networks, volume 1. IGI Global, 2009. (doi:10.4018/978-1-60566-661-7.ch007)

[208]
R. Tonelli, G. Concas, and M. Locci. Efficient implementation of the yule-simon stochastic process for modeling internet and software development activities. In Proceedings of the 9th WSEAS International Conference on Applied Computer Science, ACS '09, pages 180–186, 2009.

[209]
S.L. Toral, M.R. Martínez-Torres, and F.J. Barrero. Virtual communities as a resource for the development of OSS projects: The case of Linux ports to embedded processors. Behaviour and Information Technology, 28(5):405–419, 2009. (doi:10.1080/01449290903121394)

[210]
S.L. Toral, R. Martínez Torres, and F. Barrero. Modelling mailing list behaviour in open source projects: The case of Arm embedded Linux. Journal of Universal Computer Science, 15(3):648–664, 2009.

[211]
D. Traskas and J. Padget. Engineering agent organisations in a business environment. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5881 LNAI:49–64, 2009. (doi:10.1007/978-3-642-10203-5_5)

[212]
L. Tratt. Chapter 5 dynamically typed languages. In Marvin V. Zelkowitz, editor, Advances in Computers 77: Social Networking and the Web, chapter 5, pages 149–184. Academic Press, 2009. (doi:10.1016/S0065-2458(09)01205-4)

[213]
T. Tsiakis and P. Katsaros. Hands on dependability economics. In Proceedings — 2009 2nd International Conference on Dependability, DEPEND 2009, pages 117–121, 2009. (doi:10.1109/DEPEND.2009.24)

[214]
R. Usubamatov and M.Z. Abdulmuin. Optimization of structure of section-based automated lines. Proceedings of World Academy of Science, Engineering and Technology, 38:1231–1234, 2009.

[215]
J. Van Der Merwe, D.S. Dawoud, and R. Peplow. Vulnerability windows in vehicular communications. In Proceedings of the 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2009, pages 615–618, 2009. (doi:10.1109/WIRELESSVITAE.2009.5172517)

[216]
P. Van Mieghem and H. Wang. The observable part of a network. IEEE/ACM Transactions on Networking, 17(1):93–105, 2009. (doi:10.1109/TNET.2008.925089)

[217]
R. Venkataramu and M. Stamp. P2PTunes: A peer-to-peer digital rights management system. In Handbook of Research on Secure Multimedia Distribution, pages 137–156. IGI Global, 2009. (doi:10.4018/978-1-60566-262-6.ch008)

[218]
H.A. Vergara and D.S. Kim. A new method for the placement of buffers in serial production lines. International Journal of Production Research, 47(16):4437–4456, 2009. (doi:10.1080/00207540801939022)

[219]
I.V. Vitanov, V.I. Vitanov, and D.K. Harrison. Buffer capacity allocation using ant colony optimisation algorith. In Proceedings - Winter Simulation Conference, pages 3158–3168, 2009. (doi:10.1109/WSC.2009.5429277)

[220]
F. Von Reischach, F. Michahelles, and A. Schmidt. The design space of ubiquitous product recommendation systems. In MUM 2009 — Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, 2009. (doi:10.1145/1658550.1658552)

[221]
M. Štava and P. Tvrdík. Security system for overlapping non dedicated clusters. In Proceedings — 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, pages 272–281, 2009. (doi:10.1109/ISPA.2009.19)

[222]
C. Wagner, M.D. Gebremichael, M.K. Taylor, and M.J. Soltys. Disappearing act: Decay of uniform resource locators in health care management journals. Journal of the Medical Library Association, 97(2):122–130, 2009. (doi:10.3163/1536-5050.97.2.009)

[223]
W. Wang and Y. Chen. ePAD: Enhancing eMule for playing-as-downloading application. In Proceedings — 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, 2009. (doi:10.1109/WICOM.2009.5303293)

[224]
J. Wang, P. De Wilde, and H. Wang. Topological analysis of a two coupled evolving networks model for business systems. Expert Systems with Applications, 36(5):9548–9556, 2009. (doi:10.1016/j.eswa.2008.07.090)

[225]
J. Wang, Y. Li, and X. Jing. The research of resource locating model based on sub-domain hybrid P2P network. In Proceedings - 2009 International Conference on Information Engineering and Computer Science, ICIECS 2009, 2009. (doi:10.1109/ICIECS.2009.5362926)

[226]
J. Woodcock, P.G. Larsen, J. Bicarregui, and J. Fitzgerald. Formal methods: Practice and experience. ACM Computing Surveys, 41(4), 2009. (doi:10.1145/1592434.1592436)

[227]
Z. Wu. An empirical study of the accessibility of web references in two chinese academic journals. Scientometrics, 78(3):481–503, 2009. (doi:10.1007/s11192-007-1951-1)

[228]
R. Wuyts, H.M. Kienle, K. Mens, M. Van Den Brand, and A. Kuhn. Academic software development tools and techniques: Report on the 1st workshop WASDeTT at ECOOP 2008. In Object-Oriented Technology. ECOOP 2008 Workshop Reader, pages 87–103, 2009. (doi:10.1007/978-3-642-02047-6_10)

[229]
Q.-W. Xu and J. Gou. Hotdataspider, an ETL tool for supplementary data of biomedical journals. In FBIE 2009 - 2009 International Conference on Future BioMedical Information Engineering, pages 33–36, 2009. (doi:10.1109/FBIE.2009.5405918)

[230]
W. Xu, L. Huang, A. Fox, D. Patterson, and M. Jordan. Online system problem detection by mining patterns of console logs. In Proceedings - IEEE International Conference on Data Mining, ICDM, pages 588–597, 2009. (doi:10.1109/ICDM.2009.19)

[231]
L. Yang, Y. Liu, and Y. Liu. Optimization of source pencil deployment based on plant growth simulation algorithm. He Jishu/Nuclear Techniques, 32(12):915–921, 2009.

[232]
M.K.H. Yeung and Y.-K. Kwok. On game theoretic peer selection for resilient peer-to-peer media streaming. IEEE Transactions on Parallel and Distributed Systems, 20(10):1512–1525, 2009. (doi:10.1109/TPDS.2008.253)

[233]
S. Yi, J. Lee, H. Min, Y. Cho, and J. Hong. Yasic: Yet-another software integrity checker for security-critical wireless sensor networks. In 24th International Conference on Computers and Their Applications 2009, CATA 2009, pages 117–121, 2009.

[234]
U. Zdun and M. Strembeck. Reusable architectural decisions for DSL design: Foundational decisions in DSL development. In Proceedings of EuroPLoP 2009 - 14th Annual European Conference on Pattern Languages of Programming, 2009.

[235]
U. Zdun and M. Strembeck. Reusable architectural decisions for DSL design: Foundational decisions in DSL development. In 14th Annual European Conference on Pattern Languages of Programming, EuroPLoP 2009, volume 566, pages B61–B637, 2009.

[236]
Z. Zeng and B. Veeravalli. A novel distributed architecture of large-scale multimedia storage system using autonomous object-based storage devices. Journal of Parallel and Distributed Computing, 69(4):349–359, 2009. (doi:10.1016/j.jpdc.2008.12.004)

[237]
M. Zhao, X.-W. Li, and Q.-P. Liu. The realization of a kind of self-adapted making test paper system - using "object-oriented programming" for an example. In 2009 IEEE International Conference on Grey Systems and Intelligent Services, GSIS 2009, pages 1370–1374, 2009. (doi:10.1109/GSIS.2009.5408126)