[1]
T. Abdou, P. Grogono, and P. Kamthan. A conceptual framework for open source software test process. In Proceedings - International Computer Software and Applications Conference, pages 458–463, 2012. (doi:10.1109/COMPSACW.2012.87)
[2]
E. Abdullah and S. Fujita. Colluder detection in commercial P2P CDNs using reputation information. In Proceedings - 2012 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012, pages 183–190, 2012. (doi:10.1109/3PGCIC.2012.19)
[3]
M. Alhaisoni and A. Liotta. Pervasive streaming via peer-to-peer networks. In Streaming Media with Peer-to-Peer Networks: Wireless Perspectives, pages 31–51. IGI Global, 2012. (doi:10.4018/978-1-4666-1613-4.ch003)
[4]
A. Andreatos. Educating the 21st century's engineers and IT professionals. In New Media Communication Skills for Engineers and IT Professionals: Trans-National and Trans-Cultural Demands, pages 132–159. IGI Global, 2012. (doi:10.4018/978-1-4666-0243-4.ch009)
[5]
N. Apolónia, P. Ferreira, and L. Veiga. Enhancing online communities with cycle-sharing for social networks. Computational Social Networks: Tools, Perspectives and Applications, 9781447140481:161–195, 2012. (doi:10.1007/978-1-4471-4048-1_7)
[6]
P. Appavoo, A. Meetoo-Appavoo, A. Chutoo, and B. Durgahee. Using network protocols' fingerprints to efficiently determine the penetration level of open source software in online businesses. In 2012 IEEE Conference on Open Systems, ICOS 2012, 2012.
[7]
F. Armetta, M. Haddad, S. Hassas, and H. Kheddouci. A self-organized system improving inner topology for data sharing efficiency. In 2012 IEEE Conference on Evolving and Adaptive Intelligent Systems, EAIS 2012 - Proceedings, pages 145–150, 2012. (doi:10.1109/EAIS.2012.6232820)
[8]
M. Arzoky, S. Swift, A. Tucker, and J. Cain. A seeded search for the modularisation of sequential software versions. Journal of Object Technology, 11(2), 2012. (doi:10.5381/jot.2012.11.2.a6)
[9]
A. Asmawi, L.S. Affendey, N.I. Udzir, and R. Mahmod. Model-based system architecture for preventing XPath injection in database-centric web services environment. In 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, pages 621–625, 2012.
[10]
J. Augustine, G. Pandurangan, P. Robinson, and E. Upfal. Towards robust and efficient computation in dynamic peer-to-peer networks. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, pages 551–569, 2012.
[11]
M. Avvenuti, C. Bernardeschi, N. De Francesco, and P. Masci. JCSI: A tool for checking secure information flow in java card applications. Journal of Systems and Software, 85(11):2479–2493, 2012. (doi:10.1016/j.jss.2012.05.061)
[12]
T. Baar and P. Kumar. Detecting entry points in java libraries. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7162 LNCS:42–54, 2012. (doi:10.1007/978-3-642-29709-0_6)
[13]
T. Baar. Improving software engineering education by modeling real-world implementations. In Proceedings of the 8th Educators' Symposium, EduSymp 2012, pages 36–39, 2012. (doi:10.1145/2425936.2425943)
[14]
Charlie C. Baggett, Jr. and John J. Adams. Method, system, and computer program product for assessing information security. United States Patent 8,121,892, February 2012. Assignee: Safeoperations, Inc. (Columbia, MD).
[15]
N.S.A.A. Bakar and C.V. Boughton. Validation of measurement tools to extract metrics from open source projects. In 2012 IEEE Conference on Open Systems, ICOS 2012, 2012.
[16]
A.D. Bakar, A.B. Sultan, H. Zulzalil, and J. Din. Applying evolution programming search based software engineering (SBSE) in selecting the best open source software maintainability metrics. In ISCAIE 2012 - 2012 IEEE Symposium on Computer Applications and Industrial Electronics, pages 70–73, 2012.
[17]
A. Barham. The impact of formal QA practices on FLOSS communities - the case of Mozilla. IFIP Advances in Information and Communication Technology, 378 AICT:262–267, 2012. (doi:10.1007/978-3-642-33442-9_19)
[18]
A. Bassiri, M.R. Malek, and P. Amirian. Ambient shopping advertisement using rough service domain. Journal of Ambient Intelligence and Smart Environments, 4(2):95–105, 2012. (doi:10.3233/AIS-2012-0138)
[19]
L. Becchetti, U. Colesanti, A. Marchetti-Spaccamela, and A. Vitaletti. Fully decentralized recommendations in pervasive systems: Models and experimental analysis. Engineering Intelligent Systems, 20(3):161–170, 2012.
[20]
Daniel C. Becker. Logging system and method for computer software. United States Patent 8,245,203, August 2012. Assignee: Alcatel Lucent (Paris, FR).
[21]
N. Benkeltoum. Open source et systèmes critiques: Le cas thales. In 17th Symposium of the Association Information and Management 2012, AIM 2012. Association Information and Management, 2012.
[22]
Farrel David Benton, Shane Christopher Branch, Robert J. Kapinos, Raymond G. Octaviano, II, Alberto Jose Rojas Saba, James C. Salembier, Simon David Nicholas Taylor, and Sean Michael Ulrich. System and method for autonomic peer-to-peer virus inoculation. United States Patent 8,091,134, January 2012. Assignee: Lenovo (Singapore) Pte. Ltd. (Singapore, SG).
[23]
S. Berkovsky, T. Kuflik, and F. Ricci. The impact of data obfuscation on the accuracy of collaborative filtering. Expert Systems with Applications, 39(5):5033–5042, 2012. (doi:10.1016/j.eswa.2011.11.037)
[24]
J. Bernedixen and A. Syberfeldt. A comparative study of production control mechanisms using simulation-based multi-objective optimisation. International Journal of Production Research, 50(2):359–377, 2012. (doi:10.1080/00207543.2010.538741)
[25]
P. Bhattacharya, M. Iliofotou, I. Neamtiu, and M. Faloutsos. Graph-based analysis and prediction for software evolution. In Proceedings - International Conference on Software Engineering, pages 419–429, 2012. (doi:10.1109/ICSE.2012.6227173)
[26]
C. Bird and N. Nagappan. Who? where? what? examining distributed development in two large open source projects. In IEEE International Working Conference on Mining Software Repositories, pages 237–246, 2012. (doi:10.1109/MSR.2012.6224286)
[27]
A. Bourouis and B. Belattar. Towards a metamodel for extended queuing networks. International Journal of Simulation Modelling, 11(3):117–128, 2012. (doi:10.2507/IJSIMM11(3)1.190)
[28]
S. Burger and O. Hummel. Applying maintainability oriented software metrics to cabin software of a commercial airliner. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 457–460, 2012. (doi:10.1109/CSMR.2012.58)
[29]
A. Capiluppi, P. Falcarin, and C. Boldyreff. Code defactoring: Evaluating the effectiveness of Java obfuscations. In Proceedings - Working Conference on Reverse Engineering, WCRE, pages 71–80, 2012. (doi:10.1109/WCRE.2012.17)
[30]
A. Capiluppi, A. Serebrenik, and A. Youssef. Developing an H-index for OSS developers. In IEEE International Working Conference on Mining Software Repositories, pages 251–254, 2012. (doi:10.1109/MSR.2012.6224288)
[31]
T. Chaikalis, G. Melas, and A. Chatzigeorgiou. SEANets: Software evolution analysis with networks. In IEEE International Conference on Software Maintenance, ICSM, pages 634–637, 2012. (doi:10.1109/ICSM.2012.6405341)
[32]
A. Chatzigeorgiou and G. Melas. Trends in object-oriented software evolution: Investigating network properties. In Proceedings - International Conference on Software Engineering, pages 1309–1312, 2012. (doi:10.1109/ICSE.2012.6227092)
[33]
V. Chiprianov, Y. Kermarrec, and S. Rouvrais. Integrating DSLs into a software engineering process: Application to collaborative construction of telecom services. In Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 408–434. IGI Global, 2012. (doi:10.4018/978-1-4666-2092-6.ch015)
[34]
K. Christidis, F. Paraskevopoulos, D. Panagiotou, and G. Mentzas. Combining activity metrics and contribution topics for software recommendations. In 2012 3rd International Workshop on Recommendation Systems for Software Engineering, RSSE 2012 - Proceedings, pages 43–46, 2012. (doi:10.1109/RSSE.2012.6233408)
[35]
J.-Y. Chuang, P.-L. Hsu, and Y.-S. Chen. Improving broadcast processes in peer-to-peer systems. Advances in Information Sciences and Service Sciences, 4(8):187–198, 2012. (doi:10.4156/AISS.vol4.issue8.24)
[36]
Y.-C. Chung, , Y.-C. Chen, and W.-K. Chang. A Hot Query Bank approach to improve detection performance against SQL injection attacks. Computers and Security, 31(2):233–248, 2012. (doi:10.1016/j.cose.2011.11.007)
[37]
T. Chusho. Classification and definitions of business logic for end-user-initiative development. Frontiers in Artificial Intelligence and Applications, 246:41–56, 2012. (doi:10.3233/978-1-61499-125-0-41)
[38]
T. Clark and P.-A. Muller. Exploiting model driven technology: A tale of two startups. Software and Systems Modeling, 11(4):481–493, 2012. (doi:10.1007/s10270-012-0260-1)
[39]
P.J. Clarke, Y. Wu, A.A. Allen, F. Hernandez, M. Allison, and R. France. Towards dynamic semantics for synthesizing interpreted DSMLs. Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 242–269, 2012. (doi:10.4018/978-1-4666-2092-6.ch009)
[40]
T. Cleenewerck and V. Jonckers. Software variability: The design space of configuration languages. In ACM International Conference Proceeding Series, pages 157–164, 2012. (doi:10.1145/2110147.2110165)
[41]
H. Coltzau, D. Berg, and H. Unger. Anonymous communication in distributed organized lattice structures. In 15th Workshop on Communities in New Media: Virtual Enterprises, Research Communities and Social Media Networks, GeNeMe 2012, pages 11–22. TUDpress, 2012.
[42]
C. Comito, A. Forestiero, and C. Mastroianni. A self-organizing P2P architecture for indexing and searching distributed XML documents. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7469 LNCS:295–306, 2012. (doi:10.1007/978-3-642-32686-8_27)
[43]
G. Concas, M. Marchesi, G. Destefanis, and R. Tonelli. An empirical study of software metrics for assessing the phases of an agile project. International Journal of Software Engineering and Knowledge Engineering, 22(4):525–548, 2012. (doi:10.1142/S0218194012500131)
[44]
J.L.O. Coscia, M. Crasso, C. Mateos, and A. Zunino. Estimating web service interface complexity and quality through conventional object-oriented metrics. In 15th Ibero-American Conference on Software Engineering, CIbSE 2012, 2012.
[45]
J.L.O. Coscia, M. Crasso, C. Mateos, A. Zunino, and S. Misra. Predicting web service maintainability via object-oriented metrics: A statistics-based approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7336 LNCS(PART 4):29–39, 2012. (doi:10.1007/978-3-642-31128-4_3)
[46]
Y. Cui, Y. Chen, and Y. Shi. Comparing operating systems scalability on multicore processors by microbenchmarking. IEICE Transactions on Information and Systems, E95-D(12):2810–2820, 2012. (doi:10.1587/transinf.E95.D.2810)
[47]
J. Cunha, J.P. Fernandes, C. Peixoto, and J. Saraiva. A quality model for spreadsheets. In Proceedings - 2012 8th International Conference on the Quality of Information and Communications Technology, QUATIC 2012, pages 231–236, 2012.
[48]
B. Curtis, J. Sappidi, and A. Szynkarski. Estimating the principal of an application's technical debt. IEEE Software, 29(6):34–42, 2012. (doi:10.1109/MS.2012.156)
[49]
B. Curtis, J. Sappidi, and A. Szynkarski. Estimating the size, cost, and types of technical debt. In 2012 3rd International Workshop on Managing Technical Debt, MTD 2012 - Proceedings, pages 49–53, 2012. (doi:10.1109/MTD.2012.6226000)
[50]
Z. Czirkos and G. Hosszú. Enhancing collaborative intrusion detection methods using a Kademlia overlay network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7479 LNCS:52–63, 2012. (doi:10.1007/978-3-642-32808-4_6)
[51]
J.A. Dallal and L.C. Briand. A precise method-method interaction-based cohesion metric for object-oriented classes. ACM Transactions on Software Engineering and Methodology, 21(2), 2012. (doi:10.1145/2089116.2089118)
[52]
J.A. Dallal. The impact of accounting for special methods in the measurement of object-oriented class cohesion on refactoring and fault prediction activities. Journal of Systems and Software, 85(5):1042–1057, 2012. (doi:10.1016/j.jss.2011.12.006)
[53]
J.A.L. Dallal. The impact of inheritance on the internal quality attributes of Java classes. Kuwait Journal of Science and Engineering, 39(2 A):131–154, 2012.
[54]
Jehad Al Dallal. Constructing models for predicting extract subclass refactoring opportunities using object-oriented quality metrics. Information and Software Technology, 54(10):1125–1141, 2012. (doi:10.1016/j.infsof.2012.04.004)
[55]
Jehad Al Dallal. Fault prediction and the discriminative powers of connectivity-based object-oriented class cohesion metrics. Information and Software Technology, 54(4):396–416, 2012. (doi:10.1016/j.infsof.2011.11.007)
[56]
T. Danikauskas, R. Butleris, and V. Sakys. Application of domain specific language in information system development process: The case of Lithuanian Forest Cadastre Integrated Information system. Transformations in Business and Economics, 11(1):232–247, 2012.
[57]
S. Das and M. Magdon-Ismail. A model for information growth in collective wisdom processes. ACM Transactions on Knowledge Discovery from Data, 6(2), 2012. (doi:10.1145/2297456.2297458)
[58]
B. Das, A. Garcia-Diaz, C.A. MacDonald, and K.K. Ghoshal. Evaluation of alternative assembly line arrangements with stochastic operation times a computer simulation approach. Journal of Manufacturing Technology Management, 23(6):806–822, 2012. (doi:10.1108/17410381211253353)
[59]
E.M. De Menezes, L.S.G. Piccolo, and C.D.A. Tambascia. Interacting with TV: Report of a user experience evaluation considering affective state. In WebMedia'12 - Proceedings of the 2012 Brazilian Symposium on Multimedia and the Web, pages 331–334, 2012. (doi:10.1145/2382636.2382705)
[60]
T. Dehling and A. Sunyaev. Domain-specific languages and digital preservation supporting knowledge-management. In Multikonferenz Wirtschaftsinformatik 2012, MKWI 2012 - Multiconference Business Information Systems 2012, MKWI 2012, pages 1273–1284, 2012.
[61]
L. Demir, S.Y. Köse, S. Tunali, and D.T. Eliiyi. An integrated binary-tabu search approach for the buffer allocation problem: An industrial case study. In 24th European Modeling and Simulation Symposium, EMSS 2012, pages 44–49, 2012.
[62]
L. Demir, S. Tunal, and D.T. Eliiyi. An adaptive tabu search approach for buffer allocation problem in unreliable non-homogenous production lines. Computers and Operations Research, 39(7):1477–1486, 2012. (doi:10.1016/j.cor.2011.08.019)
[63]
J. Dıaz and C. Torras. A personal account of Turing's imprint on the development of computer science. Computer Science Review, 6(5-6):225–234, 2012. (doi:10.1016/j.cosrev.2012.11.001)
[64]
C. Dietrich, R. Tartler, W. Schröder-Preikschat, and D. Lohmann. A robust approach for variability extraction from the Linux build system. In ACM International Conference Proceeding Series, volume 1, pages 21–30, 2012. (doi:10.1145/2362536.2362544)
[65]
C. Dietrich, R. Tartler, W. Schröder-Preikschat, and D. Lohmann. Understanding Linux feature distribution. In MISS'12 - Proceedings of the 2012 Workshop on Modularity in Systems Software, pages 15–19, 2012. (doi:10.1145/2162024.2162030)
[66]
D. Djuric and V. Devedzic. Incorporating the ontology paradigm into a mainstream programming environment. Informatica (Netherlands), 23(2):203–224, 2012.
[67]
D. Djuric and V. Devedzic. Incorporating the ontology paradigm into software engineering: Enhancing domain-driven programming in Clojure/Java. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(1):3–14, 2012. (doi:10.1109/TSMCC.2011.2140316)
[68]
K.O. Elish and M. Alshayeb. Using software quality attributes to classify refactoring to patterns. Journal of Software, 7(2):408–419, 2012. (doi:10.4304/jsw.7.2.408-419)
[69]
D.C. Erdil and M.J. Lewis. Dynamic grid load sharing with adaptive dissemination protocols. Journal of Supercomputing, 59(3):1139–1166, 2012. (doi:10.1007/s11227-010-0507-y)
[70]
S. Erdweg, P.G. Giarrusso, and T. Rendel. Language composition untangled. In Proceedings of the 12th Workshop on Language Descriptions, Tools, and Applications, LDTA 2012, 2012. (doi:10.1145/2427048.2427055)
[71]
H.-C. Estler, M. Nordio, C.A. Furia, B. Meyer, and J. Schneider. Agile vs. structured distributed software development: A case study. In Proceedings - 2012 IEEE 7th International Conference on Global Software Engineering, ICGSE 2012, pages 11–20, 2012. (doi:10.1109/ICGSE.2012.22)
[72]
G. Exarchakos and N. Antonopoulos. A peer-to-peer system for on-demand sharing of capacity across network applications. Peer-to-Peer Networking and Applications, 5(1):58–73, 2012. (doi:10.1007/s12083-011-0108-4)
[73]
M. Fathy, K. Rahemifar, H. Babaei, M. Romoozi, and R. Berangy. Impact of mobility on performance of P2P content discovery protocols over MANET. In 3rd International Conference on Ambient Systems, Networks and Technologies, ANT 2012 and 9th International Conference on Mobile Web Information Systems, MobiWIS 2012, volume 10, pages 642–649. Elsevier, 2012. (doi:10.1016/j.procs.2012.06.082)
[74]
O. Febbraro, G. Grasso, N. Leone, and F. Ricca. JASP: A framework for integrating answer set programming with Java. In 13th International Conference on the Principles of Knowledge Representation and Reasoning, KR 2012, pages 541–551, 2012.
[75]
M.J. Fernández Iglesias, L.M. Álvarez Sabucedo, J.M. Santos Gago, and L.E. Anido Rifón. A peer-to-peer semantically-driven environment to distribute contents applied to the digital administration. Expert Systems with Applications, 39(17):12984–12991, 2012. (doi:10.1016/j.eswa.2012.05.100)
[76]
K.A.M. Ferreira, M.A.S. Bigonha, R.S. Bigonha, L.F.O. Mendes, and H.C. Almeida. Identifying thresholds for object-oriented software metrics. Journal of Systems and Software, 85(2):244–257, 2012. (doi:10.1016/j.jss.2011.05.044)
[77]
K.A.M. Ferreira, R.C.N. Moreira, M.A.S. Bigonha, and R.S. Bigonha. The evolving structures of software systems. In 2012 3rd International Workshop on Emerging Trends in Software Metrics, WETSoM 2012 - Proceedings, pages 28–34, 2012. (doi:10.1109/WETSoM.2012.6226989)
[78]
K.A.M. Ferreira, R.C.N. Moreira, M.A.S. Bigonha, and R.S. Bigonha. A generic macroscopic topology of software networks — a quantitative evaluation. In Proceedings - 2012 Brazilian Symposium on Software Engineering, SBES 2012, pages 161–170, 2012. (doi:10.1109/SBES.2012.26)
[79]
L.P. Ferreira, E. Ares, G. Peláez, M. Marcos, and M. Araújo. Analysis of the influence of the production sequence in an automobile assembly line, modeled as a network of closed-loops. In AIP Conference Proceedings, volume 1431, pages 609–616, 2012. (doi:10.1063/1.4707615)
[80]
L.P. Ferreira, E. Ares, G. Peláez, A. Resano, C.J. Luis, and B. Tjahjono. Evaluation of the changes in working limits in an automobile assembly line using simulation. In AIP Conference Proceedings, volume 1431, pages 617–624, 2012. (doi:10.1063/1.4707616)
[81]
L.P. Ferreira, E. Ares, G. Peláez, A. Resano, C.J. Luis, and B. Tjahjono. Simulation of a closed-loops assembly line. Key Engineering Materials, 502:127–132, 2012. (doi:10.4028/www.scientific.net/KEM.502.127)
[82]
L.P. Ferreira, E. Ares, G. Peláez, B. Tjahjono, and J.J. Areal. Production planning and control in an automobile closed-loops assembly line. Key Engineering Materials, 502:103–108, 2012. (doi:10.4028/www.scientific.net/KEM.502.103)
[83]
A. Finney, C. Japing, and P. Nixon. Preventing piracy — verifying veracity in web 2.0 content assessments. In 7th International Conference on eLearning, ICEL 2012, pages 72–78. Academic Conferences Limited, 2012.
[84]
A. Finney, C. Japing, and P. Nixon. Preventing piracy - verifying veracity in web 2.0 content assessments. Proceedings of the European Conference on e-Government, ECEG, pages 72–78, 2012.
[85]
I. Fister Jr., M. Mernik, I. Fister, and D. Hrnčič. Implementation of easytime formal semantics using a LISA compiler generator. Computer Science and Information Systems, 9(3):1019–1044, 2012. (doi:10.2298/CSIS111110021F)
[86]
T.J. Gandomani, H. Zulzalil, A.A.A. Ghani, and A.B.M. Sultan. A systematic literature review on relationship between agile methods and open source software development methodology. International Review on Computers and Software, 7(4):1602–1607, 2012.
[87]
I. Garcia, S. Pajares, L. Sebastia, and E. Onaindia. Preference elicitation techniques for group recommender systems. Information Sciences, 189:155–175, 2012. (doi:10.1016/j.ins.2011.11.037)
[88]
P. Gazzillo and R. Grimm. SuperC: Parsing all of C by taming the preprocessor. In PLDI '12: Programming Language Design and Implementation, pages 323–334, 2012. (doi:10.1145/2254064.2254103)
[89]
P. Giannikopoulos and C. Vassilakis. A distributed recommender system architecture. International Journal of Web Engineering and Technology, 7(3):203–227, 2012. (doi:10.1504/IJWET.2012.048517)
[90]
R. Giordanelli, C. Mastroianni, and M. Meo. Bio-inspired P2P systems: The case of multidimensional overlay. ACM Transactions on Autonomous and Adaptive Systems, 7(4), 2012. (doi:10.1145/2382570.2382571)
[91]
Andreea Gorbatai, Dariusz Jemielniak, and Mathieu O'Neil. Special issue on management and the future of open collaboration. Journal of Organizational Change Management, 25(6), 2012. (doi:10.1108/jocm.2012.02325faa.002)
[92]
S. Günther. Design patterns and design principles for internal domain-specific languages. Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 156–214, 2012. (doi:10.4018/978-1-4666-2092-6.ch007)
[93]
Y. Guo, Z. Zhao, and Y. Zhou. Complexity analysis with function-call graph on windows software. International Review on Computers and Software, 7(3):1149–1153, 2012.
[94]
I. Hadar and S. Sherman. Agile vs. plan-driven perceptions of software architecture. In 2012 5th International Workshop on Co-operative and Human Aspects of Software Engineering, CHASE 2012 - Proceedings, pages 50–55, 2012. (doi:10.1109/CHASE.2012.6223022)
[95]
W. Haihong. An e-business process modeling based on ontology for industrial enterprise. International Journal of Digital Content Technology and its Applications, 6(14):42–49, 2012. (doi:10.4156/jdcta.vol6.issue14.6)
[96]
T. Haitzer and U. Zdun. DSL-based support for semi-automated architectural component model abstraction throughout the software lifecycle. In QoSA'12 - Proceedings of the 8th International ACM SIGSOFT Conference on the Quality of Software Architectures, pages 61–70, 2012. (doi:10.1145/2304696.2304709)
[97]
J. He, X. Zhao, and B. Zhao. A fast, simple and near-optimal content placement scheme for a large-scale VoD system. In 2012 IEEE International Conference on Communication Systems, ICCS 2012, pages 378–382, 2012. (doi:10.1109/ICCS.2012.6406174)
[98]
H. Heitkötter. A framework for creating domain-specific process modeling languages. In ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, pages 127–136, 2012.
[99]
I. Herraiz, D. Rodriguez, and R. Harrison. On the statistical distribution of object-oriented system properties. In 2012 3rd International Workshop on Emerging Trends in Software Metrics, WETSoM 2012 - Proceedings, pages 56–62, 2012. (doi:10.1109/WETSoM.2012.6226994)
[100]
B. Hoisl, M. Strembeck, and S. Sobernig. Towards a systematic integration of MOF/UML-based domain-specific modeling languages. In Proceedings of the IASTED International Conference on Software Engineering and Applications, SEA 2012, pages 337–344, 2012.
[101]
K.J. Hole. Toward a practical technique to halt multiple virus outbreaks on computer networks. Journal of Computer Networks and Communications, 2012. (doi:10.1155/2012/462747)
[102]
H. Holm and M. Ekstedt. A metamodel for web application injection attacks and countermeasures. Lecture Notes in Business Information Processing, 131 LNBIP:198–217, 2012. (doi:10.1007/978-3-642-34163-2_12)
[103]
K. Hose and A. Vlachou. A survey of skyline processing in highly distributed environments. VLDB Journal, 21(3):359–384, 2012. (doi:10.1007/s00778-011-0246-6)
[104]
N.-L. Hsueh, J.-Y. Wang, and D.-H. Ting. A cloud service design for quality evaluation of design patterns. In Proceedings - 2012 6th International Conference on Genetic and Evolutionary Computing, ICGEC 2012, pages 184–187, 2012.
[105]
C.-L. Hu and T.-H. Kuo. A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems. Journal of Network and Computer Applications, 35(6):1990–2002, 2012. (doi:10.1016/j.jnca.2012.07.022)
[106]
C.-L. Hu and Z.-X. Lu. Downloading trace study for BitTorrent P2P performance measurement and analysis. Peer-to-Peer Networking and Applications, 5(4):384–397, 2012. (doi:10.1007/s12083-012-0146-6)
[107]
Chih-Lin Hu and Zong-Xian Lu. A trace study of BitTorrent P2P file distribution with downloading-side performance measurement and analysis. In International Conference on Advanced Communication Technology, ICACT, pages 875–880, 2012.
[108]
Z. Hu. Research and implementation of peer-to-peer network topology based on balanced binary tree. WSEAS Transactions on Computers, 11(8):252–264, 2012.
[109]
B. Huang, T. Xie, and Y. Ma. Anti SQL injection with statements sequence digest. In 2012 Spring World Congress on Engineering and Technology, SCET 2012 - Proceedings, 2012. (doi:10.1109/SCET.2012.6341889)
[110]
F. Jacob, J. Gray, J.C. Carver, M. Mernik, and P. Bangalore. PPModel: A modeling tool for source code maintenance and optimization of parallel programs. Journal of Supercomputing, 62(3):1560–1582, 2012. (doi:10.1007/s11227-012-0821-7)
[111]
Namit Jain, Nipun Agarwal, Vikram Kapoor, Syam Pannala, and Ravi Murthy. Method and mechanism for supporting virtual content in performing file operations at a RDBMS. United States Patent 8,224,837, July 2012. Assignee: Oracle International Corporation (Redwood Shores, CA).
[112]
R. Jalan and A. Kejariwal. Trin-Trin: Who's calling? a pin-based dynamic call graph extraction framework. International Journal of Parallel Programming, 40(4):410–442, 2012. (doi:10.1007/s10766-012-0193-x)
[113]
W. Jung and E. and Lee. A survey on mining software repositories. IEICE Transactions on Information and Systems, E95-D(5):1384–1406, 2012. (doi:10.1587/transinf.E95.D.1384)
[114]
Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. Portable device and method for entertainment interaction data. United States Patent 8,208,850, June 2012. Assignee: The Invention Science Fund I, LLC (Bellevue, WA).
[115]
Y. Jusoh, K. Chamili, J.H. Yahaya, and N.C. Pa. The selection criteria of open source software adoption in Malaysia. International Journal of Advancements in Computing Technology, 4(21):278–287, 2012. (doi:10.4156/ijact.vol4.issue21.33)
[116]
E. Kajo-Mece, L. Kodra, E. Vrenozaj, and B. Shehu. Protection of web applications using aspect oriented programming and performance evaluation. In 5th Balkan Conference in Informatics, BCI 2012, volume 920, pages 46–50, 2012.
[117]
G. Kakarontzas, I. Stamelos, S. Skalistis, and A. Naskos. Extracting components from open source: The component adaptation environment (COPE) approach. In Proceedings - 38th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2012, pages 192–199, 2012. (doi:10.1109/SEAA.2012.39)
[118]
P. Kamthan. A perspective on software engineering education with open source software. International Journal of Open Source Software and Processes, 4(3):13–25, 2012. (doi:10.4018/ijossp.2012070102)
[119]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,135,994, March 2012. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).
[120]
G. Khataniar and D. Goswami. A hierarchical approach to improve performance of unstructured peer-to-peer system. International Journal of Communication Networks and Distributed Systems, 9(1-2):37–61, 2012. (doi:10.1504/IJCNDS.2012.047895)
[121]
I.A. Klampanos and J.M. Jose. Searching in peer-to-peer networks. Computer Science Review, 6(4):161–183, 2012. (doi:10.1016/j.cosrev.2012.07.001)
[122]
A. Kocurova, S. Oussena, P. Komisarczuk, T. Clark, and D. Kramer. Towards distributed collaborative workflow management for mobile devices. Lecture Notes in Business Information Processing, 116 LNBIP:1–20, 2012. (doi:10.1007/978-3-642-34044-4_1)
[123]
K. Kolomvatsos, G. Valkanas, and S. Hadjiefthymiades. Debugging applications created by a domain specific language: The IPAC case. Journal of Systems and Software, 85(4):932–943, 2012. (doi:10.1016/j.jss.2011.11.1009)
[124]
T. Kos, T. Kosar, and M. Mernik. Development of data acquisition systems by using a domain-specific modeling language. Computers in Industry, 63(3):181–192, 2012. (doi:10.1016/j.compind.2011.09.004)
[125]
T. Kosar, M. Mernik, and J.C. Carver. Program comprehension of domain-specific and general-purpose languages: Comparison using a family of experiments. Empirical Software Engineering, 17(3):276–304, 2012. (doi:10.1007/s10664-011-9172-x)
[126]
S.Y. Kose and O. Kilincci. Hybrid simulated annealing/genetic algorithm approach to buffer allocation problem in unreliable production lines. In 10th International Fuzzy Logic and Intelligent Technologies inNuclear Science Conference, FLINS 2012, volume 7, pages 981–986, 2012.
[127]
P. Kotzé, M. Tsogang, and A. Van Der Merwe. A framework for creating pattern languages for enterprise architecture. Lecture Notes in Business Information Processing, 131 LNBIP:1–20, 2012. (doi:10.1007/978-3-642-34163-2_1)
[128]
A. Kowalski and T. Marut. Hybrid methods aiding organisational and technological production preparation using simulation models of nonlinear production systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7209 LNAI(PART 2):259–266, 2012. (doi:10.1007/978-3-642-28931-6_25)
[129]
C. Kozak and M. Squire. A secondary data archive for code-level debian metrics. In Proceedings - 2011 2nd International Workshop on Replication in Empirical Software Engineering Research, RESER 2011, pages 43–51, 2012. (doi:10.1109/RESER.2011.9)
[130]
N. Kumar, R. Iqbal, and N. Chilamkurti. Capacity and load-aware service discovery with service selection in peer-to-peer grids. Future Generation Computer Systems, 28(7):1090–1099, 2012. (doi:10.1016/j.future.2011.11.008)
[131]
S. Kurkovsky. Peer-to-peer network applications. Handbook of Computer Networks, 3:152–167, 2012. (doi:10.1002/9781118256107.ch10)
[132]
Y.-K. Kwok. Incentive issues in peer-to-peer systems. Handbook of Computer Networks, 3:168–188, 2012. (doi:10.1002/9781118256107.ch11)
[133]
Y. Lai and Z. Liu. Unknown malicious code detection comparison of statistical and encoding method. Information, 15(11 A):4563–4571, 2012.
[134]
Ralf Lammel, Anders Hejlsberg, Andrew E. Kimball, David Lawrence Remy, and Erik Meijer. Instance annotation in object-oriented programming. United States Patent 8,132,093, March 2012. Assignee: Microsoft Corporation (Redmond, WA).
[135]
G. Lee, J. Han, and S. Lee. A TV remote pointing device using LED directivity. In Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI 2012, pages 331–338, 2012. (doi:10.1145/2414536.2414590)
[136]
M.B. Lehmann, L.F. Müller, R.S. Antunes, and M.P. Barcellos. Disconnecting to connect: Understanding optimistic disconnection in BitTorrent. In 2012 IEEE 12th International Conference on Peer-to-Peer Computing, P2P 2012, pages 138–148, 2012. (doi:10.1109/P2P.2012.6335793)
[137]
A.F. Leite, H.C. Mendes, L. Weigang, A.C.M.A. de Melo, and A. Boukerche. An architecture for P2P bag-of-tasks execution with multiple task allocation policies in desktop grids. Cluster Computing, 15(4):351–361, 2012. (doi:10.1007/s10586-011-0154-y)
[138]
J. Li and T. Chusho. A web application framework for end-user-initiative development with a visual tool. In Lecture Notes in Engineering and Computer Science, volume 1, pages 816–822, 2012.
[139]
Z. Liaghat, A.H. Rasekh, and A.R. Tabebordbar. Enhance software quality using data mining algorithms. In 2012 Spring World Congress on Engineering and Technology, SCET 2012 - Proceedings, 2012. (doi:10.1109/SCET.2012.6342020)
[140]
S.B. Lim and K. and Yoon. Ubiquitous air quality monitoring system with service oriented architecture middleware. Journal of Convergence Information Technology, 7(6):193–201, 2012. (doi:10.4156/jcit.vol7.issue6.24)
[141]
H.-C. Lin, Y.-F. Hsu, and B.-J. Hsieh. A P2P-to-UPnP proxy gateway architecture for home multimedia content distribution. KSII Transactions on Internet and Information Systems, 6(1):405–424, 2012. (doi:10.3837/tiis.2012.01.023)
[142]
H. Lin. Operational considerations in cyber attack and cyber exploitation. In Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, pages 37–56. Georgetown University Press, 2012.
[143]
K.J. Lin. Building a video monitoring system with Linux using component-based approach. In 6th IASTED International Conference on Software Engineering and Applications, SEA 2002, pages 385–390. Acta Press, 2012.
[144]
J. Linggarjati and R. Hedwig. Manually interchangeable heads of homemade computer numerical control (CNC) machine. Internetworking Indonesia Journal, 4(1):19–22, 2012.
[145]
V. Ljubovic and N. Nosovic. Repository analysis tools in teaching software engineering. In 2012 9th International Symposium on Telecommunications, BIHTEL 2012 - Proceedings, 2012.
[146]
V. Ljubovic and N. Nosovic. Software metrics in student projects. In 2012 20th Telecommunications Forum, TELFOR 2012 - Proceedings, pages 1464–1467, 2012.
[147]
A. Logvinenko and D. Tutsch. RecSim — a simulator for reconfigurable network on chip topologies. In 26th European Simulation and Modelling Conference, ESM 2012, pages 144–151. EUROSIS, 2012.
[148]
M. Lumpe, R. Vasa, T. Menzies, R. Rush, and B. Turhan. Learning better inspection optimization policies. International Journal of Software Engineering and Knowledge Engineering, 22(5):621–644, 2012. (doi:10.1142/S0218194012500179)
[149]
E. Maani, Z. Chen, and A.K. Katsaggelos. A game theoretic approach to video streaming over peer-to-peer networks. Signal Processing: Image Communication, 27(5):545–554, 2012. (doi:10.1016/j.image.2012.02.015)
[150]
G. Magklaras and S.M. Furnell. The insider threat prediction and specification language. In 9th International Network Conference, INC 2012, pages 51–61. Plymouth University, 2012.
[151]
S. Maitrehenry, S. Metge, Y. Aït-Ameur, and P. Bieber. An MDE-based synthesis of aircraft safety models. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7602 LNCS:43–54, 2012. (doi:10.1007/978-3-642-33609-6_6)
[152]
T. Makino and K. Aihara. Software development and testing for machine learning studies: With an example of probabilistic inference with Monte Carlo based methods. Transactions of the Japanese Society for Artificial Intelligence, 27(4):253–262, 2012. (doi:10.1527/tjsai.27.253)
[153]
R. Malhotra and A. Jain. Fault prediction using statistical and machine learning methods for improving software quality. Journal of Information Processing Systems, 8(2):241–262, 2012. (doi:10.3745/JIPS.2012.8.2.241)
[154]
S. Mandal, S. Chakraborty, and S. Karmakar. Deterministic 1-2 skip list in distributed system. In Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, PDGC 2012, pages 296–301, 2012.
[155]
A. Mardani. An investigation of the web citations in Iran's chemistry articles in SCI. Library Review, 61(1):18–29, 2012. (doi:10.1108/00242531211207398)
[156]
Z. Marian. Aggregated metrics guided software restructuring. In Proceedings - 2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing, ICCP 2012, pages 259–266, 2012. (doi:10.1109/ICCP.2012.6356197)
[157]
T. Matsushita, S. Yamanaka, and F. Zhao. A peer-to-peer content-distribution scheme resilient to key leakage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7115 LNCS:121–135, 2012. (doi:10.1007/978-3-642-27890-7_10)
[158]
A. Matta, M. Pezzoni, and Q. Semeraro. A Kriging-based algorithm to optimize production systems approximated by analytical models. Journal of Intelligent Manufacturing, 23(3):587–597, 2012. (doi:10.1007/s10845-010-0397-0)
[159]
P.J. McKenzie, J. Burkell, L. Wong, C. Whippey, S.E. Trosow, and M. McNally. User-generated online content 1: Overview, current state and context. First Monday, 17(6), 2012.
[160]
J.A. Meira, E.C.D. Almeida, , and G. Sunye. Peer-to-peer load testing. In Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, pages 642–647, 2012. (doi:10.1109/ICST.2012.153)
[161]
L. Meneses, R. Furuta, and F. Shipman. Identifying "soft 404" error pages: Analyzing the lexical signatures of documents in distributed collections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7489 LNCS:197–208, 2012. (doi:10.1007/978-3-642-33290-6_22)
[162]
B. Molina, C.E. Palau, and M. Esteve. CDN modeling and performance. In Next Generation Content Delivery Infrastructures: Emerging Paradigms and Technologies, pages 1–28. IGI Global, 2012. (doi:10.4018/978-1-4666-1794-0.ch001)
[163]
J.M. Monteiro, R.S. Cruz, C.Z. Patrikakis, N.C. Papaoulakis, C.T. Calafate, and M.S. Nunes. Peer-to-peer video streaming. In Multimedia Networking and Coding, pages 254–313. IGI Global, 2012. (doi:10.4018/978-1-4666-2660-7.ch010)
[164]
R. Moreno-Sanchez. Free and open source software for geospatial applications (FOSS4G): A mature alternative in the geospatial technologies arena. Transactions in GIS, 16(2):81–88, 2012. (doi:10.1111/j.1467-9671.2012.01314.x)
[165]
H.S. Mounine and H.K. Walid. D3-P2P: Managing distributed and replicated database in P2P environment by using quorum system. Journal of Digital Information Management, 10(6):351–364, 2012.
[166]
H.S. Mounine and H.K. Walid. A deadlock managing process for distributed and replicated database in P2P system. In 2nd International Conference on Innovative Computing Technology, INTECH 2012, pages 6–9, 2012.
[167]
B. Movahedi, K.M. Lavassani, and V. Kumar. E-marketplace emergence: Evolution, developments and classification. Journal of Electronic Commerce in Organizations, 10(1):14–32, 2012. (doi:10.4018/jeco.2012010102)
[168]
T. Moyer, T. Jaeger, and P. McDaniel. Scalable integrity-guaranteed AJAX. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7235 LNCS:1–19, 2012. (doi:10.1007/978-3-642-29253-8_1)
[169]
A. Murgia, R. Tonelli, G. Concas, M. Marchesi, and S. Counsell. Parameter-based refactoring and the relationship with fan-in/fan-out coupling. Journal of Object Technology, 11(2), 2012. (doi:10.5381/jot.2012.11.2.a7)
[170]
A. Murgia, R. Tonelli, M. Marchesi, G. Concas, S. Counsell, J. McFall, and S. Swift. Refactoring and its relationship with fan-in and fan-out: An empirical study. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 63–72, 2012. (doi:10.1109/CSMR.2012.17)
[171]
E. Murphy-Hill, C. Parnin, and A.P. Black. How we refactor, and how we know it. IEEE Transactions on Software Engineering, 38(1):5–18, 2012. (doi:10.1109/TSE.2011.41)
[172]
S. Nalliah and K.Y. Loh. Concepts in the management of the overactive bladder in women. Medical Journal of Malaysia, 67(1):137–142, 2012.
[173]
Raman Narayanan, Ming Liu, and Paresh S Suthar. Enabling access to rich data by intercepting paste operations. United States Patent 8,296,671, October 2012. Assignee: Microsoft Corporation (Redmond, WA).
[174]
A. Nieminen. Real-time collaborative resolving of merge conflicts. In CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 540–543, 2012.
[175]
C. Okoli and K. Carillo. The best of adaptive and predictive methodologies: Open source software development, a balance between agility and discipline. International Journal of Information Technology and Management, 11(1-2):153–166, 2012. (doi:10.1504/IJITM.2012.044071)
[176]
J.L. Ordiales Coscia, M. Crasso, C. Mateos, and A. Zunino. An approach to improve code-first web services discoverability at development time. In Proceedings of the ACM Symposium on Applied Computing, pages 638–643, 2012. (doi:10.1145/2245276.2245400)
[177]
J. Ossher, H. Sajnani, and C. Lopes. Astra: Bottom-up construction of structured artifact repositories. In Proceedings - Working Conference on Reverse Engineering, WCRE, pages 41–50, 2012. (doi:10.1109/WCRE.2012.14)
[178]
J. Pan and C.C. Fung. An agent-based model to simulate coordinated response to malware outbreak within an organisation. International Journal of Information and Computer Security, 5(2):115–131, 2012. (doi:10.1504/IJICS.2012.051777)
[179]
P.M. Papadopoulos, I.G. Stamelos, and A. Meiszner. Students' perspectives on learning software engineering with open source projects: Lessons learnt after three years of program operation. In CSEDU 2012 - Proceedings of the 4th International Conference on Computer Supported Education, volume 2, pages 313–322, 2012.
[180]
E. Papapetrou, P. Vassiliadis, E. Rova, and A. Zarras. Cross-layer routing for peer database querying over mobile ad hoc networks. Computer Networks, 56(2):504–520, 2012. (doi:10.1016/j.comnet.2011.10.004)
[181]
A. Passarella. A survey on content-centric technologies for the current internet: CDN and P2P solutions. Computer Communications, 35(1):1–32, 2012. (doi:10.1016/j.comcom.2011.10.005)
[182]
P. Patel and J. Bhatia. Review on variants of reliable and security aware peer to peer content distribution using network coding. In 3rd Nirma University International Conference on Engineering, NUiCONE 2012, 2012.
[183]
G. Pau and R. Tse. Challenges and opportunities in immersive vehicular sensing: Lessons from urban deployments. Signal Processing: Image Communication, 27(8):900–908, 2012. (doi:10.1016/j.image.2012.01.015)
[184]
X. Peng, M. Li, and Z. Huang. A data collection framework with extensible protocol based on XML. 2nd World Congress on Computer Science and Information Engineering, CSIE 2011, 124 LNEE(VOL. 1):481–489, 2012. (doi:10.1007/978-3-642-25781-0_72)
[185]
E. Perakakis, A. Levinenko, and G. Ghinea. HTML5 and companion web technologies as a universal platform for interactive internet TV advertising. In 2012 International Conference on Telecommunications and Multimedia, TEMU 2012, pages 214–219, 2012. (doi:10.1109/TEMU.2012.6294721)
[186]
G.J. Pérez-Irizarry, F. De La Cruz-Sanchez, B.A. Landrón-Rivera, N.G. Santiago, and M. Velez-Reyes. Developing a portable GPU library for hyperspectral image processing. In 18th Annual Conference on Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery, volume 8390. SPIE, 2012. (doi:10.1117/12.920499)
[187]
C.E.S. Pires, R.M.L. Santiago, A.C. Salgado, Z. Kedad, and M. Bouzeghoub. Ontology-based clustering in a peer data management system. International Journal of Distributed Systems and Technologies, 3(2):1–21, 2012. (doi:10.4018/jdst.2012040101)
[188]
J. Porubän, J. Kollár, and M. Sabo. Abstraction of computer language patterns: The inference of textual notation for a DSL. In Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 365–385. IGI Global, 2012. (doi:10.4018/978-1-4666-2092-6.ch013)
[189]
C. Preschern, N. Kajtazovic, and C. Kreiner. Applying patterns to model-driven development of automation systems: An industrial case study. In 17th European Conference on Pattern Languages of Programs, EuroPLoP 2012. Association for Computing Machinery, 2012. (doi:10.1145/2602928.2603081)
[190]
N.N. Qadri and M. Fleury. P2P streaming over MANET and VANET. Streaming Media with Peer-to-Peer Networks: Wireless Perspectives, pages 119–161, 2012. (doi:10.4018/978-1-4666-1613-4.ch007)
[191]
N.N. Qadri, M. Fleury, B.R. Rofoee, M. Altaf, and M. Ghanbari. Robust P2P multimedia exchange within a vanet. Wireless Personal Communications, 63(3):561–577, 2012. (doi:10.1007/s11277-010-0150-1)
[192]
I. Raikov and E. de Schutter. The layer-oriented approach to declarative languages for biological modeling. PLoS Computational Biology, 8(5), 2012. (doi:10.1371/journal.pcbi.1002521)
[193]
C.K. Raju, A. Mishra, and P.B.S. Bhadoria. Synthesis of sustainability and secureness of software in public applications using deductive-nomological model. In ACM International Conference Proceeding Series, pages 579–588, 2012. (doi:10.1145/2345396.2345491)
[194]
N. Ramasubbu, C.F. Kemerer, and J. Hong. Structural complexity and programmer team strategy: An experimental test. IEEE Transactions on Software Engineering, 38(5):1–15, 2012. (doi:10.1109/TSE.2011.88)
[195]
A. Raza, L.F. Capretz, and F. Ahmed. Users' perception of open source usability: An empirical study. Engineering with Computers, 28(2):109–121, 2012. (doi:10.1007/s00366-011-0222-1)
[196]
E. Reategui, L.M.A. dos Santos, and L. Tarouco. Pedagogical agents and the efficiency of instructional conditions in educational applications. In Educational Stages and Interactive Learning: From Kindergarten to Workplace Training, pages 121–133. IGI Global, 2012. (doi:10.4018/978-1-4666-0137-6.ch008)
[197]
J. Reutelshoefer, J. Baumeister, and F. Puppe. A meta-engineering approach for customized document-centered knowledge acquisition. In Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), volume P-201, pages 187–202, 2012.
[198]
Anthony Rose. Filter for a distributed network. United States Patent 8,185,576, May 2012. Assignee: Altnet, Inc. (Sherman Oaks, CA).
[199]
M.K. Saberi and H. Abedi. Accessibility and decay of web citations in five open access ISI journals. Internet Research, 22(2):234–247, 2012. (doi:10.1108/10662241211214584)
[200]
A. Sadat-Moosavi, A. Isfandyari-Moghaddam, and O. Tajeddini. Accessibility of online resources cited in scholarly LIS journals: A study of Emerald ISI-ranked journals. Aslib Proceedings: New Information Perspectives, 64(2):178–192, 2012. (doi:10.1108/00012531211215196)
[201]
M. Salamó, K. McCarthy, and B. Smyth. Generating recommendations for consensus negotiation in group personalization services. Personal and Ubiquitous Computing, 16(5):597–610, 2012. (doi:10.1007/s00779-011-0413-1)
[202]
B.T. Sampath Kumar and K.S. Manoj Kumar. Decay and half-life period of online citations cited in open access journals. International Information and Library Review, 44(4):202–211, 2012. (doi:10.1016/j.iilr.2012.09.002)
[203]
B.T. Sampath Kumar and K.S. Manoj Kumar. Persistence and half-life of URL citations cited in LIS open access journals. Aslib Proceedings: New Information Perspectives, 64(4):405–422, 2012. (doi:10.1108/00012531211244752)
[204]
B.T. Sampath Kumar and K.R. Prithvi Raj. Availability and persistence of web citations in Indian LIS literature. Electronic Library, 30(1):19–32, 2012. (doi:10.1108/02640471211204042)
[205]
A. Santos-Olmo, L.E. Sánchez, E. Fernández-Medina, and M. Piattini. A systematic review of methodologies and models for the analysis and management of associative and hierarchical risk in SMEs. In Proceedings of the 9th International Workshop on Security in Information Systems, WOSIS 2012, in Conjunction with ICEIS 2012, pages 117–124, 2012.
[206]
M. Schmidberger and M. Schmidberger. Software engineering as a service for HPC. In Proceedings - 2012 11th International Symposium on Parallel and Distributed Computing, ISPDC 2012, pages 34–39, 2012. (doi:10.1109/ISPDC.2012.13)
[207]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,204,913, June 2012. Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).
[208]
T.A. Sedbrook. Modeling the REA enterprise ontology with a domain specific language. Journal of Emerging Technologies in Accounting, 9(1):47–70, 2012.
[209]
S. Shaaban and S. Hudson. Transient behaviour of unbalanced lines. Flexible Services and Manufacturing Journal, 24(4):575–602, 2012. (doi:10.1007/s10696-011-9110-7)
[210]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive media playback based on destination. United States Patent 8,239,410, August 2012. Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).
[211]
W. Shang, B. Adams, and A.E. Hassan. Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report. Journal of Systems and Software, 85(10):2195–2204, 2012. (doi:10.1016/j.jss.2011.07.034)
[212]
V. Shanmughaneethi, R.Y. Praveen, and S. Swamynathan. CIVD: Detection of command injection vulnerabilities in web services through aspect-oriented programming. International Journal of Computer Applications in Technology, 44(4):312–320, 2012. (doi:10.1504/IJCAT.2012.050119)
[213]
F. Shu, Y. Yang, , and Q. Wang. An investigation on the feasibility of cross-project defect prediction. Automated Software Engineering, 19(2):167–199, 2012. (doi:10.1007/s10515-011-0090-3)
[214]
C. Song and L. Han. Application of the work study to balancing hydraulic component assembly lines. Advanced Materials Research, 452-453:206–210, 2012. (doi:10.4028/www.scientific.net/AMR.452-453.206)
[215]
E. Spishak, W. Dietl, and M.D. Ernst. A type system for regular expressions. In Proceedings for FTfJP 2012: The 14th Workshop on Formal Techniques for Java-Like Programs - Co-located with ECOOP 2012 and PLDI 2012, Papers Presented at the Workshop, pages 20–26, 2012. (doi:10.1145/2318202.2318207)
[216]
S. Srivastava, V. Gupta, R. Yadav, and K. Kant. Controlling free riding using extended point based incentive mechanism in peer-to-peer networks. In Proceedings of the 2012 3rd International Conference on Computer and Communication Technology, ICCCT 2012, pages 200–205, 2012. (doi:10.1109/ICCCT.2012.48)
[217]
J. Staiano, M. Menéndez, A. Battocchi, A. De Angeli, and N. Sebe. UX-mate: From facial expressions to UX evaluation. In Proceedings of the Designing Interactive Systems Conference, DIS '12, pages 741–750, 2012. (doi:10.1145/2317956.2318068)
[218]
Sufatrio and R.H.C. Yap. Quantifying the effects of more timely certificate revocation on lightweight mobile devices. In Proceedings - 2011 3rd International Workshop on Security Measurements and Metrics, Metrisec 2011, pages 31–40, 2012. (doi:10.1109/Metrisec.2011.17)
[219]
Z. Sun, A. Purohit, S. Pan, F. Mokaya, R. Bose, and P. Zhang. Polaris: Getting accurate indoor orientations for mobile devices using ubiquitous visual patterns on ceilings. In HotMobile 2012 - 13th Workshop on Mobile Computing Systems and Applications, 2012. (doi:10.1145/2162081.2162101)
[220]
V.M. Suresh, D. Karthikeswaran, V.M. Sudha, and D. Murali Chandraseker. Web server load balancing using SSL back-end forwarding method. In IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012, pages 822–827, 2012.
[221]
G. Tang, , D.-F. Chang, C.-T. Wang, and X.-L. Bai. Distributed computing for mechanical virtual human. Advanced Materials Research, 341-342:695–699, 2012. (doi:10.4028/www.scientific.net/AMR.341-342.695)
[222]
G. Tang, D.-F. Chang, , C.-T. Wang, and D.-M. Wang. Networking architecture for Chinese mechanical virtual human. Advanced Materials Research, 433-440:5828–5831, 2012. (doi:10.4028/www.scientific.net/AMR.433-440.5828)
[223]
R. Tartler, J. Sincero, C. Dietrich, W. Schröder-Preikschat, and D. Lohmann. Revealing and repairing configuration inconsistencies in large-scale system software. International Journal on Software Tools for Technology Transfer, 14(5):531–551, 2012. (doi:10.1007/s10009-012-0225-2)
[224]
Yannick Teglia and Pierre-Yvan Liardet. Statistical control of the integrity of a program. United States Patent 8,239,833, August 2012. Assignee: STMicroelectronics S.A. (Montrouge, FR).
[225]
K. Thornton and D.W. Mcdonald. Tagging wikipedia: Collaboratively creating a category system. In GROUP'12 - Proceedings of the ACM 2012 International Conference on Support Group Work, pages 219–227, 2012. (doi:10.1145/2389176.2389210)
[226]
D.S. Touceda, J.M. Sierra, A. Izquierdo, and H. Schulzrinne. Survey of attacks and defenses on P2PSIP communications. IEEE Communications Surveys and Tutorials, 14(3):750–783, 2012. (doi:10.1109/SURV.2011.060711.00152)
[227]
A.V. Uzunov, E.B. Fernandez, and K. Falkner. Engineering security into distributed systems: A survey of methodologies. Journal of Universal Computer Science, 18(20):2920–3006, 2012.
[228]
M. Vdalis, S. Koukoumialos, D. Ntio, and G. Varlas. Performance evaluation of a merge supply system with a distribution centre, two reliable suppliers, one buffer and Erlang lead times. International Journal of Business Science and Applied Management, 7(3):42–55, 2012.
[229]
L. Vidács, R. Dévai, R. Ferenc, and T. Gyimóthy. Developer support for understanding preprocessor macro expansions. Communications in Computer and Information Science, 340 CCIS:121–130, 2012. (doi:10.1007/978-3-642-35267-6_16)
[230]
A.S. Vijendran and S. Thavamani. Survey of caching and replica placement algorithm for content distribution in peer to peer overlay networks. In ACM International Conference Proceeding Series, pages 248–252, 2012. (doi:10.1145/2393216.2393259)
[231]
R.J. Walker, S. Rawal, and J. Sillito. Do crosscutting concerns cause modularity problems? In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE 2012, 2012. (doi:10.1145/2393596.2393654)
[232]
W. Wang and L. Hong. Research on Chord algorithm based on polycyclic structure. In 2012 IEEE 5th International Conference on Advanced Computational Intelligence, ICACI 2012, pages 90–93, 2012.
[233]
H. Wang, G. Tan, and L. Liu. Authentication protocol security assessment framework based on attack classification. Applied Mechanics and Materials, 143-144:859–863, 2012. (doi:10.4028/www.scientific.net/AMM.143-144.859)
[234]
Z. Wang, Z. Guan, W. Li, K. Wu, J. Guo, and G. Tian. A tableau-based reasoning algorithm for distributed dynamic description logics. Communications in Computer and Information Science, 307 CCIS(PART 1):192–199, 2012. (doi:10.1007/978-3-642-34038-3_27)
[235]
M. Waterman, J. Noble, and G. Allan. How much architecture? reducing the up-front effort. In Proceedings - Agile India 2012, AgileIndia 2012, pages 56–59, 2012. (doi:10.1109/AgileIndia.2012.11)
[236]
M. Wisely and J.L. Leopold. Semi-automated generation of domain-specific, natural language-based, visual programming languages. In 18th International Conference on Distributed Multimedia Systems, DMS 2012, pages 177–180. Knowledge Systems Institute Graduate School, 2012.
[237]
J. Wu and M. Savoie. Peer-to-peer network architecture. Handbook of Computer Networks, 3:131–151, 2012. (doi:10.1002/9781118256107.ch9)
[238]
F. Wu. Discussion on experimental teaching of data warehouse and data mining course for undergraduate education. In ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education, pages 1425–1429, 2012. (doi:10.1109/ICCSE.2012.6295331)
[239]
Shlomo Wygodny, Valery Golender, Ido Ben-Moshe, and Vladimir Andreev. System and method for conditional tracing of computer programs. United States Patent 8,312,435, November 2012. Assignee: Identify Software Ltd. (IL) (Petach Tikva, IL).
[240]
H. Yamamoto and K. Yamazaki. LISP-based information multicasting system using location-aware P2P network technologies. In 2012 IEEE Consumer Communications and Networking Conference, CCNC'2012, pages 640–644, 2012. (doi:10.1109/CCNC.2012.6181144)
[241]
S. Yang, R. Han, J. Ding, and Y. Song. The distribution of web citations. Information Processing and Management, 48(4):779–790, 2012. (doi:10.1016/j.ipm.2011.10.002)
[242]
Y. Younan, W. Joosen, and F. Piessens. Runtime countermeasures for code injection attacks against C and C++ programs. ACM Computing Surveys, 44(3), 2012. (doi:10.1145/2187671.2187679)
[243]
X. Zhang and H. Hassanein. A survey of peer-to-peer live video streaming schemes — an algorithmic perspective. Computer Networks, 56(15):3548–3579, 2012. (doi:10.1016/j.comnet.2012.06.013)
[244]
N. Zhang, J. Lin, J. Jing, and N. Gao. RIKE: Using revocable identities to support key escrow in PKIs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7341 LNCS:48–65, 2012. (doi:10.1007/978-3-642-31284-7_4)
[245]
Y. Zheng, F. Liu, X. Luo, and C. Yang. A method based on feature matching to identify steganography software. In Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012, pages 989–994, 2012. (doi:10.1109/MINES.2012.26)
[246]
F.-C. Zhou, , and Z.-L. Zhu. Distributed authenticated skip list for secure P2P storage. Dongbei Daxue Xuebao/Journal of Northeastern University, 33(1):73–76, 2012.
[247]
J. Zhou, J. Li, Q. Chi, Y. Zhang, and H. Hua. Personalized intelligent guidance system for large-scale crowd's activities. In 2012 9th International Conference on Service Systems and Service Management - Proceedings of ICSSSM'12, pages 583–587, 2012. (doi:10.1109/ICSSSM.2012.6252305)
[248]
J. Zhou, D. Zhao, , and J. Liu. Do we need another textual language for feature modeling? a preliminary evaluation on the XML based approach. Studies in Computational Intelligence, 430:97–111, 2012. (doi:10.1007/978-3-642-30460-6_7)
[249]
H. Zhuge. The knowledge grid: Toward cyber-physical society, second edition. World Scientific Publishing Co., 2012. (doi:10.1142/7567)
[250]
E.M.-B.O. Zierau. A holistic approach to bit preservation. Library Hi Tech, 30(3):472–489, 2012. (doi:10.1108/07378831211266618)
[1]
T. Abdou, P. Grogono, and P. Kamthan. A conceptual framework for open source software test process. In Proceedings - International Computer Software and Applications Conference, pages 458–463, 2012. (doi:10.1109/COMPSACW.2012.87)

[2]
E. Abdullah and S. Fujita. Colluder detection in commercial P2P CDNs using reputation information. In Proceedings - 2012 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012, pages 183–190, 2012. (doi:10.1109/3PGCIC.2012.19)

[3]
M. Alhaisoni and A. Liotta. Pervasive streaming via peer-to-peer networks. In Streaming Media with Peer-to-Peer Networks: Wireless Perspectives, pages 31–51. IGI Global, 2012. (doi:10.4018/978-1-4666-1613-4.ch003)

[4]
A. Andreatos. Educating the 21st century's engineers and IT professionals. In New Media Communication Skills for Engineers and IT Professionals: Trans-National and Trans-Cultural Demands, pages 132–159. IGI Global, 2012. (doi:10.4018/978-1-4666-0243-4.ch009)

[5]
P. Appavoo, A. Meetoo-Appavoo, A. Chutoo, and B. Durgahee. Using network protocols' fingerprints to efficiently determine the penetration level of open source software in online businesses. In 2012 IEEE Conference on Open Systems, ICOS 2012, 2012.

[6]
F. Armetta, M. Haddad, S. Hassas, and H. Kheddouci. A self-organized system improving inner topology for data sharing efficiency. In 2012 IEEE Conference on Evolving and Adaptive Intelligent Systems, EAIS 2012 - Proceedings, pages 145–150, 2012. (doi:10.1109/EAIS.2012.6232820)

[7]
M. Arzoky, S. Swift, A. Tucker, and J. Cain. A seeded search for the modularisation of sequential software versions. Journal of Object Technology, 11(2), 2012. (doi:10.5381/jot.2012.11.2.a6)

[8]
A. Asmawi, L.S. Affendey, N.I. Udzir, and R. Mahmod. Model-based system architecture for preventing XPath injection in database-centric web services environment. In 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, pages 621–625, 2012.

[9]
J. Augustine, G. Pandurangan, P. Robinson, and E. Upfal. Towards robust and efficient computation in dynamic peer-to-peer networks. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, pages 551–569, 2012.

[10]
M. Avvenuti, C. Bernardeschi, N. De Francesco, and P. Masci. JCSI: A tool for checking secure information flow in java card applications. Journal of Systems and Software, 85(11):2479–2493, 2012. (doi:10.1016/j.jss.2012.05.061)

[11]
T. Baar and P. Kumar. Detecting entry points in java libraries. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7162 LNCS:42–54, 2012. (doi:10.1007/978-3-642-29709-0_6)

[12]
T. Baar. Improving software engineering education by modeling real-world implementations. In Proceedings of the 8th Educators' Symposium, EduSymp 2012, pages 36–39, 2012. (doi:10.1145/2425936.2425943)

[13]
Charlie C. Baggett, Jr. and John J. Adams. Method, system, and computer program product for assessing information security. United States Patent 8,121,892, February 2012. Assignee: Safeoperations, Inc. (Columbia, MD).

[14]
N.S.A.A. Bakar and C.V. Boughton. Validation of measurement tools to extract metrics from open source projects. In 2012 IEEE Conference on Open Systems, ICOS 2012, 2012.

[15]
A.D. Bakar, A.B. Sultan, H. Zulzalil, and J. Din. Applying evolution programming search based software engineering (SBSE) in selecting the best open source software maintainability metrics. In ISCAIE 2012 - 2012 IEEE Symposium on Computer Applications and Industrial Electronics, pages 70–73, 2012.

[16]
A. Barham. The impact of formal QA practices on FLOSS communities - the case of Mozilla. IFIP Advances in Information and Communication Technology, 378 AICT:262–267, 2012. (doi:10.1007/978-3-642-33442-9_19)

[17]
A. Bassiri, M.R. Malek, and P. Amirian. Ambient shopping advertisement using rough service domain. Journal of Ambient Intelligence and Smart Environments, 4(2):95–105, 2012. (doi:10.3233/AIS-2012-0138)

[18]
L. Becchetti, U. Colesanti, A. Marchetti-Spaccamela, and A. Vitaletti. Fully decentralized recommendations in pervasive systems: Models and experimental analysis. Engineering Intelligent Systems, 20(3):161–170, 2012.

[19]
Daniel C. Becker. Logging system and method for computer software. United States Patent 8,245,203, August 2012. Assignee: Alcatel Lucent (Paris, FR).

[20]
Farrel David Benton, Shane Christopher Branch, Robert J. Kapinos, Raymond G. Octaviano, II, Alberto Jose Rojas Saba, James C. Salembier, Simon David Nicholas Taylor, and Sean Michael Ulrich. System and method for autonomic peer-to-peer virus inoculation. United States Patent 8,091,134, January 2012. Assignee: Lenovo (Singapore) Pte. Ltd. (Singapore, SG).

[21]
S. Berkovsky, T. Kuflik, and F. Ricci. The impact of data obfuscation on the accuracy of collaborative filtering. Expert Systems with Applications, 39(5):5033–5042, 2012. (doi:10.1016/j.eswa.2011.11.037)

[22]
J. Bernedixen and A. Syberfeldt. A comparative study of production control mechanisms using simulation-based multi-objective optimisation. International Journal of Production Research, 50(2):359–377, 2012. (doi:10.1080/00207543.2010.538741)

[23]
P. Bhattacharya, M. Iliofotou, I. Neamtiu, and M. Faloutsos. Graph-based analysis and prediction for software evolution. In Proceedings - International Conference on Software Engineering, pages 419–429, 2012. (doi:10.1109/ICSE.2012.6227173)

[24]
C. Bird and N. Nagappan. Who? where? what? examining distributed development in two large open source projects. In IEEE International Working Conference on Mining Software Repositories, pages 237–246, 2012. (doi:10.1109/MSR.2012.6224286)

[25]
A. Bourouis and B. Belattar. Towards a metamodel for extended queuing networks. International Journal of Simulation Modelling, 11(3):117–128, 2012. (doi:10.2507/IJSIMM11(3)1.190)

[26]
S. Burger and O. Hummel. Applying maintainability oriented software metrics to cabin software of a commercial airliner. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 457–460, 2012. (doi:10.1109/CSMR.2012.58)

[27]
A. Capiluppi, P. Falcarin, and C. Boldyreff. Code defactoring: Evaluating the effectiveness of Java obfuscations. In Proceedings - Working Conference on Reverse Engineering, WCRE, pages 71–80, 2012. (doi:10.1109/WCRE.2012.17)

[28]
A. Capiluppi, A. Serebrenik, and A. Youssef. Developing an H-index for OSS developers. In IEEE International Working Conference on Mining Software Repositories, pages 251–254, 2012. (doi:10.1109/MSR.2012.6224288)

[29]
T. Chaikalis, G. Melas, and A. Chatzigeorgiou. SEANets: Software evolution analysis with networks. In IEEE International Conference on Software Maintenance, ICSM, pages 634–637, 2012. (doi:10.1109/ICSM.2012.6405341)

[30]
A. Chatzigeorgiou and G. Melas. Trends in object-oriented software evolution: Investigating network properties. In Proceedings - International Conference on Software Engineering, pages 1309–1312, 2012. (doi:10.1109/ICSE.2012.6227092)

[31]
V. Chiprianov, Y. Kermarrec, and S. Rouvrais. Integrating DSLs into a software engineering process: Application to collaborative construction of telecom services. In Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 408–434. IGI Global, 2012. (doi:10.4018/978-1-4666-2092-6.ch015)

[32]
K. Christidis, F. Paraskevopoulos, D. Panagiotou, and G. Mentzas. Combining activity metrics and contribution topics for software recommendations. In 2012 3rd International Workshop on Recommendation Systems for Software Engineering, RSSE 2012 - Proceedings, pages 43–46, 2012. (doi:10.1109/RSSE.2012.6233408)

[33]
J.-Y. Chuang, P.-L. Hsu, and Y.-S. Chen. Improving broadcast processes in peer-to-peer systems. Advances in Information Sciences and Service Sciences, 4(8):187–198, 2012. (doi:10.4156/AISS.vol4.issue8.24)

[34]
Y.-C. Chung, , Y.-C. Chen, and W.-K. Chang. A Hot Query Bank approach to improve detection performance against SQL injection attacks. Computers and Security, 31(2):233–248, 2012. (doi:10.1016/j.cose.2011.11.007)

[35]
T. Chusho. Classification and definitions of business logic for end-user-initiative development. Frontiers in Artificial Intelligence and Applications, 246:41–56, 2012. (doi:10.3233/978-1-61499-125-0-41)

[36]
T. Clark and P.-A. Muller. Exploiting model driven technology: A tale of two startups. Software and Systems Modeling, 11(4):481–493, 2012. (doi:10.1007/s10270-012-0260-1)

[37]
P.J. Clarke, Y. Wu, A.A. Allen, F. Hernandez, M. Allison, and R. France. Towards dynamic semantics for synthesizing interpreted DSMLs. Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 242–269, 2012. (doi:10.4018/978-1-4666-2092-6.ch009)

[38]
T. Cleenewerck and V. Jonckers. Software variability: The design space of configuration languages. In ACM International Conference Proceeding Series, pages 157–164, 2012. (doi:10.1145/2110147.2110165)

[39]
C. Comito, A. Forestiero, and C. Mastroianni. A self-organizing P2P architecture for indexing and searching distributed XML documents. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7469 LNCS:295–306, 2012. (doi:10.1007/978-3-642-32686-8_27)

[40]
G. Concas, M. Marchesi, G. Destefanis, and R. Tonelli. An empirical study of software metrics for assessing the phases of an agile project. International Journal of Software Engineering and Knowledge Engineering, 22(4):525–548, 2012. (doi:10.1142/S0218194012500131)

[41]
J.L.O. Coscia, M. Crasso, C. Mateos, and A. Zunino. Estimating web service interface complexity and quality through conventional object-oriented metrics. In 15th Ibero-American Conference on Software Engineering, CIbSE 2012, 2012.

[42]
J.L.O. Coscia, M. Crasso, C. Mateos, A. Zunino, and S. Misra. Predicting web service maintainability via object-oriented metrics: A statistics-based approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7336 LNCS(PART 4):29–39, 2012. (doi:10.1007/978-3-642-31128-4_3)

[43]
Y. Cui, Y. Chen, and Y. Shi. Comparing operating systems scalability on multicore processors by microbenchmarking. IEICE Transactions on Information and Systems, E95-D(12):2810–2820, 2012. (doi:10.1587/transinf.E95.D.2810)

[44]
J. Cunha, J.P. Fernandes, C. Peixoto, and J. Saraiva. A quality model for spreadsheets. In Proceedings - 2012 8th International Conference on the Quality of Information and Communications Technology, QUATIC 2012, pages 231–236, 2012.

[45]
B. Curtis, J. Sappidi, and A. Szynkarski. Estimating the principal of an application's technical debt. IEEE Software, 29(6):34–42, 2012. (doi:10.1109/MS.2012.156)

[46]
B. Curtis, J. Sappidi, and A. Szynkarski. Estimating the size, cost, and types of technical debt. In 2012 3rd International Workshop on Managing Technical Debt, MTD 2012 - Proceedings, pages 49–53, 2012. (doi:10.1109/MTD.2012.6226000)

[47]
Z. Czirkos and G. Hosszú. Enhancing collaborative intrusion detection methods using a Kademlia overlay network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7479 LNCS:52–63, 2012. (doi:10.1007/978-3-642-32808-4_6)

[48]
J.A. Dallal and L.C. Briand. A precise method-method interaction-based cohesion metric for object-oriented classes. ACM Transactions on Software Engineering and Methodology, 21(2), 2012. (doi:10.1145/2089116.2089118)

[49]
J.A. Dallal. The impact of accounting for special methods in the measurement of object-oriented class cohesion on refactoring and fault prediction activities. Journal of Systems and Software, 85(5):1042–1057, 2012. (doi:10.1016/j.jss.2011.12.006)

[50]
J.A.L. Dallal. The impact of inheritance on the internal quality attributes of Java classes. Kuwait Journal of Science and Engineering, 39(2 A):131–154, 2012.

[51]
Jehad Al Dallal. Constructing models for predicting extract subclass refactoring opportunities using object-oriented quality metrics. Information and Software Technology, 54(10):1125–1141, 2012. (doi:10.1016/j.infsof.2012.04.004)

[52]
Jehad Al Dallal. Fault prediction and the discriminative powers of connectivity-based object-oriented class cohesion metrics. Information and Software Technology, 54(4):396–416, 2012. (doi:10.1016/j.infsof.2011.11.007)

[53]
T. Danikauskas, R. Butleris, and V. Sakys. Application of domain specific language in information system development process: The case of Lithuanian Forest Cadastre Integrated Information system. Transformations in Business and Economics, 11(1):232–247, 2012.

[54]
S. Das and M. Magdon-Ismail. A model for information growth in collective wisdom processes. ACM Transactions on Knowledge Discovery from Data, 6(2), 2012. (doi:10.1145/2297456.2297458)

[55]
B. Das, A. Garcia-Diaz, C.A. MacDonald, and K.K. Ghoshal. Evaluation of alternative assembly line arrangements with stochastic operation times a computer simulation approach. Journal of Manufacturing Technology Management, 23(6):806–822, 2012. (doi:10.1108/17410381211253353)

[56]
E.M. De Menezes, L.S.G. Piccolo, and C.D.A. Tambascia. Interacting with TV: Report of a user experience evaluation considering affective state. In WebMedia'12 - Proceedings of the 2012 Brazilian Symposium on Multimedia and the Web, pages 331–334, 2012. (doi:10.1145/2382636.2382705)

[57]
T. Dehling and A. Sunyaev. Domain-specific languages and digital preservation supporting knowledge-management. In Multikonferenz Wirtschaftsinformatik 2012, MKWI 2012 - Multiconference Business Information Systems 2012, MKWI 2012, pages 1273–1284, 2012.

[58]
L. Demir, S.Y. Köse, S. Tunali, and D.T. Eliiyi. An integrated binary-tabu search approach for the buffer allocation problem: An industrial case study. In 24th European Modeling and Simulation Symposium, EMSS 2012, pages 44–49, 2012.

[59]
L. Demir, S. Tunal, and D.T. Eliiyi. An adaptive tabu search approach for buffer allocation problem in unreliable non-homogenous production lines. Computers and Operations Research, 39(7):1477–1486, 2012. (doi:10.1016/j.cor.2011.08.019)

[60]
J. Dıaz and C. Torras. A personal account of Turing's imprint on the development of computer science. Computer Science Review, 6(5-6):225–234, 2012. (doi:10.1016/j.cosrev.2012.11.001)

[61]
C. Dietrich, R. Tartler, W. Schröder-Preikschat, and D. Lohmann. A robust approach for variability extraction from the Linux build system. In ACM International Conference Proceeding Series, volume 1, pages 21–30, 2012. (doi:10.1145/2362536.2362544)

[62]
C. Dietrich, R. Tartler, W. Schröder-Preikschat, and D. Lohmann. Understanding Linux feature distribution. In MISS'12 - Proceedings of the 2012 Workshop on Modularity in Systems Software, pages 15–19, 2012. (doi:10.1145/2162024.2162030)

[63]
D. Djuric and V. Devedzic. Incorporating the ontology paradigm into a mainstream programming environment. Informatica (Netherlands), 23(2):203–224, 2012.

[64]
D. Djuric and V. Devedzic. Incorporating the ontology paradigm into software engineering: Enhancing domain-driven programming in Clojure/Java. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(1):3–14, 2012. (doi:10.1109/TSMCC.2011.2140316)

[65]
K.O. Elish and M. Alshayeb. Using software quality attributes to classify refactoring to patterns. Journal of Software, 7(2):408–419, 2012. (doi:10.4304/jsw.7.2.408-419)

[66]
D.C. Erdil and M.J. Lewis. Dynamic grid load sharing with adaptive dissemination protocols. Journal of Supercomputing, 59(3):1139–1166, 2012. (doi:10.1007/s11227-010-0507-y)

[67]
S. Erdweg, P.G. Giarrusso, and T. Rendel. Language composition untangled. In Proceedings of the 12th Workshop on Language Descriptions, Tools, and Applications, LDTA 2012, 2012. (doi:10.1145/2427048.2427055)

[68]
H.-C. Estler, M. Nordio, C.A. Furia, B. Meyer, and J. Schneider. Agile vs. structured distributed software development: A case study. In Proceedings - 2012 IEEE 7th International Conference on Global Software Engineering, ICGSE 2012, pages 11–20, 2012. (doi:10.1109/ICGSE.2012.22)

[69]
G. Exarchakos and N. Antonopoulos. A peer-to-peer system for on-demand sharing of capacity across network applications. Peer-to-Peer Networking and Applications, 5(1):58–73, 2012. (doi:10.1007/s12083-011-0108-4)

[70]
M. Fathy, K. Rahemifar, H. Babaei, M. Romoozi, and R. Berangy. Impact of mobility on performance of P2P content discovery protocols over MANET. In 3rd International Conference on Ambient Systems, Networks and Technologies, ANT 2012 and 9th International Conference on Mobile Web Information Systems, MobiWIS 2012, volume 10, pages 642–649. Elsevier, 2012. (doi:10.1016/j.procs.2012.06.082)

[71]
O. Febbraro, G. Grasso, N. Leone, and F. Ricca. JASP: A framework for integrating answer set programming with Java. In 13th International Conference on the Principles of Knowledge Representation and Reasoning, KR 2012, pages 541–551, 2012.

[72]
M.J. Fernández Iglesias, L.M. Álvarez Sabucedo, J.M. Santos Gago, and L.E. Anido Rifón. A peer-to-peer semantically-driven environment to distribute contents applied to the digital administration. Expert Systems with Applications, 39(17):12984–12991, 2012. (doi:10.1016/j.eswa.2012.05.100)

[73]
K.A.M. Ferreira, M.A.S. Bigonha, R.S. Bigonha, L.F.O. Mendes, and H.C. Almeida. Identifying thresholds for object-oriented software metrics. Journal of Systems and Software, 85(2):244–257, 2012. (doi:10.1016/j.jss.2011.05.044)

[74]
K.A.M. Ferreira, R.C.N. Moreira, M.A.S. Bigonha, and R.S. Bigonha. The evolving structures of software systems. In 2012 3rd International Workshop on Emerging Trends in Software Metrics, WETSoM 2012 - Proceedings, pages 28–34, 2012. (doi:10.1109/WETSoM.2012.6226989)

[75]
K.A.M. Ferreira, R.C.N. Moreira, M.A.S. Bigonha, and R.S. Bigonha. A generic macroscopic topology of software networks — a quantitative evaluation. In Proceedings - 2012 Brazilian Symposium on Software Engineering, SBES 2012, pages 161–170, 2012. (doi:10.1109/SBES.2012.26)

[76]
L.P. Ferreira, E. Ares, G. Peláez, M. Marcos, and M. Araújo. Analysis of the influence of the production sequence in an automobile assembly line, modeled as a network of closed-loops. In AIP Conference Proceedings, volume 1431, pages 609–616, 2012. (doi:10.1063/1.4707615)

[77]
L.P. Ferreira, E. Ares, G. Peláez, A. Resano, C.J. Luis, and B. Tjahjono. Evaluation of the changes in working limits in an automobile assembly line using simulation. In AIP Conference Proceedings, volume 1431, pages 617–624, 2012. (doi:10.1063/1.4707616)

[78]
L.P. Ferreira, E. Ares, G. Peláez, A. Resano, C.J. Luis, and B. Tjahjono. Simulation of a closed-loops assembly line. Key Engineering Materials, 502:127–132, 2012. (doi:10.4028/www.scientific.net/KEM.502.127)

[79]
L.P. Ferreira, E. Ares, G. Peláez, B. Tjahjono, and J.J. Areal. Production planning and control in an automobile closed-loops assembly line. Key Engineering Materials, 502:103–108, 2012. (doi:10.4028/www.scientific.net/KEM.502.103)

[80]
A. Finney, C. Japing, and P. Nixon. Preventing piracy — verifying veracity in web 2.0 content assessments. In 7th International Conference on eLearning, ICEL 2012, pages 72–78. Academic Conferences Limited, 2012.

[81]
A. Finney, C. Japing, and P. Nixon. Preventing piracy - verifying veracity in web 2.0 content assessments. Proceedings of the European Conference on e-Government, ECEG, pages 72–78, 2012.

[82]
I. Fister Jr., M. Mernik, I. Fister, and D. Hrnčič. Implementation of easytime formal semantics using a LISA compiler generator. Computer Science and Information Systems, 9(3):1019–1044, 2012. (doi:10.2298/CSIS111110021F)

[83]
T.J. Gandomani, H. Zulzalil, A.A.A. Ghani, and A.B.M. Sultan. A systematic literature review on relationship between agile methods and open source software development methodology. International Review on Computers and Software, 7(4):1602–1607, 2012.

[84]
I. Garcia, S. Pajares, L. Sebastia, and E. Onaindia. Preference elicitation techniques for group recommender systems. Information Sciences, 189:155–175, 2012. (doi:10.1016/j.ins.2011.11.037)

[85]
P. Gazzillo and R. Grimm. SuperC: Parsing all of C by taming the preprocessor. In PLDI '12: Programming Language Design and Implementation, pages 323–334, 2012. (doi:10.1145/2254064.2254103)

[86]
P. Giannikopoulos and C. Vassilakis. A distributed recommender system architecture. International Journal of Web Engineering and Technology, 7(3):203–227, 2012. (doi:10.1504/IJWET.2012.048517)

[87]
R. Giordanelli, C. Mastroianni, and M. Meo. Bio-inspired P2P systems: The case of multidimensional overlay. ACM Transactions on Autonomous and Adaptive Systems, 7(4), 2012. (doi:10.1145/2382570.2382571)

[88]
S. Günther. Design patterns and design principles for internal domain-specific languages. Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 156–214, 2012. (doi:10.4018/978-1-4666-2092-6.ch007)

[89]
Y. Guo, Z. Zhao, and Y. Zhou. Complexity analysis with function-call graph on windows software. International Review on Computers and Software, 7(3):1149–1153, 2012.

[90]
I. Hadar and S. Sherman. Agile vs. plan-driven perceptions of software architecture. In 2012 5th International Workshop on Co-operative and Human Aspects of Software Engineering, CHASE 2012 - Proceedings, pages 50–55, 2012. (doi:10.1109/CHASE.2012.6223022)

[91]
W. Haihong. An e-business process modeling based on ontology for industrial enterprise. International Journal of Digital Content Technology and its Applications, 6(14):42–49, 2012. (doi:10.4156/jdcta.vol6.issue14.6)

[92]
T. Haitzer and U. Zdun. DSL-based support for semi-automated architectural component model abstraction throughout the software lifecycle. In QoSA'12 - Proceedings of the 8th International ACM SIGSOFT Conference on the Quality of Software Architectures, pages 61–70, 2012. (doi:10.1145/2304696.2304709)

[93]
J. He, X. Zhao, and B. Zhao. A fast, simple and near-optimal content placement scheme for a large-scale VoD system. In 2012 IEEE International Conference on Communication Systems, ICCS 2012, pages 378–382, 2012. (doi:10.1109/ICCS.2012.6406174)

[94]
H. Heitkötter. A framework for creating domain-specific process modeling languages. In ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, pages 127–136, 2012.

[95]
I. Herraiz, D. Rodriguez, and R. Harrison. On the statistical distribution of object-oriented system properties. In 2012 3rd International Workshop on Emerging Trends in Software Metrics, WETSoM 2012 - Proceedings, pages 56–62, 2012. (doi:10.1109/WETSoM.2012.6226994)

[96]
B. Hoisl, M. Strembeck, and S. Sobernig. Towards a systematic integration of MOF/UML-based domain-specific modeling languages. In Proceedings of the IASTED International Conference on Software Engineering and Applications, SEA 2012, pages 337–344, 2012.

[97]
K.J. Hole. Toward a practical technique to halt multiple virus outbreaks on computer networks. Journal of Computer Networks and Communications, 2012. (doi:10.1155/2012/462747)

[98]
H. Holm and M. Ekstedt. A metamodel for web application injection attacks and countermeasures. Lecture Notes in Business Information Processing, 131 LNBIP:198–217, 2012. (doi:10.1007/978-3-642-34163-2_12)

[99]
K. Hose and A. Vlachou. A survey of skyline processing in highly distributed environments. VLDB Journal, 21(3):359–384, 2012. (doi:10.1007/s00778-011-0246-6)

[100]
N.-L. Hsueh, J.-Y. Wang, and D.-H. Ting. A cloud service design for quality evaluation of design patterns. In Proceedings - 2012 6th International Conference on Genetic and Evolutionary Computing, ICGEC 2012, pages 184–187, 2012.

[101]
C.-L. Hu and T.-H. Kuo. A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems. Journal of Network and Computer Applications, 35(6):1990–2002, 2012. (doi:10.1016/j.jnca.2012.07.022)

[102]
C.-L. Hu and Z.-X. Lu. Downloading trace study for BitTorrent P2P performance measurement and analysis. Peer-to-Peer Networking and Applications, 5(4):384–397, 2012. (doi:10.1007/s12083-012-0146-6)

[103]
Chih-Lin Hu and Zong-Xian Lu. A trace study of BitTorrent P2P file distribution with downloading-side performance measurement and analysis. In International Conference on Advanced Communication Technology, ICACT, pages 875–880, 2012.

[104]
Z. Hu. Research and implementation of peer-to-peer network topology based on balanced binary tree. WSEAS Transactions on Computers, 11(8):252–264, 2012.

[105]
B. Huang, T. Xie, and Y. Ma. Anti SQL injection with statements sequence digest. In 2012 Spring World Congress on Engineering and Technology, SCET 2012 - Proceedings, 2012. (doi:10.1109/SCET.2012.6341889)

[106]
F. Jacob, J. Gray, J.C. Carver, M. Mernik, and P. Bangalore. PPModel: A modeling tool for source code maintenance and optimization of parallel programs. Journal of Supercomputing, 62(3):1560–1582, 2012. (doi:10.1007/s11227-012-0821-7)

[107]
Namit Jain, Nipun Agarwal, Vikram Kapoor, Syam Pannala, and Ravi Murthy. Method and mechanism for supporting virtual content in performing file operations at a RDBMS. United States Patent 8,224,837, July 2012. Assignee: Oracle International Corporation (Redwood Shores, CA).

[108]
R. Jalan and A. Kejariwal. Trin-Trin: Who's calling? a pin-based dynamic call graph extraction framework. International Journal of Parallel Programming, 40(4):410–442, 2012. (doi:10.1007/s10766-012-0193-x)

[109]
W. Jung and E. and Lee. A survey on mining software repositories. IEICE Transactions on Information and Systems, E95-D(5):1384–1406, 2012. (doi:10.1587/transinf.E95.D.1384)

[110]
Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. Portable device and method for entertainment interaction data. United States Patent 8,208,850, June 2012. Assignee: The Invention Science Fund I, LLC (Bellevue, WA).

[111]
Y. Jusoh, K. Chamili, J.H. Yahaya, and N.C. Pa. The selection criteria of open source software adoption in Malaysia. International Journal of Advancements in Computing Technology, 4(21):278–287, 2012. (doi:10.4156/ijact.vol4.issue21.33)

[112]
E. Kajo-Mece, L. Kodra, E. Vrenozaj, and B. Shehu. Protection of web applications using aspect oriented programming and performance evaluation. In 5th Balkan Conference in Informatics, BCI 2012, volume 920, pages 46–50, 2012.

[113]
G. Kakarontzas, I. Stamelos, S. Skalistis, and A. Naskos. Extracting components from open source: The component adaptation environment (COPE) approach. In Proceedings - 38th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2012, pages 192–199, 2012. (doi:10.1109/SEAA.2012.39)

[114]
P. Kamthan. A perspective on software engineering education with open source software. International Journal of Open Source Software and Processes, 4(3):13–25, 2012. (doi:10.4018/ijossp.2012070102)

[115]
Angelos D. Keromytis and Salvatore J. Stolfo. Methods, media, and systems for detecting an anomalous sequence of function calls. United States Patent 8,135,994, March 2012. Assignee: The Trustees of Columbia University in the City of New York (New York, NY).

[116]
G. Khataniar and D. Goswami. A hierarchical approach to improve performance of unstructured peer-to-peer system. International Journal of Communication Networks and Distributed Systems, 9(1-2):37–61, 2012. (doi:10.1504/IJCNDS.2012.047895)

[117]
I.A. Klampanos and J.M. Jose. Searching in peer-to-peer networks. Computer Science Review, 6(4):161–183, 2012. (doi:10.1016/j.cosrev.2012.07.001)

[118]
A. Kocurova, S. Oussena, P. Komisarczuk, T. Clark, and D. Kramer. Towards distributed collaborative workflow management for mobile devices. Lecture Notes in Business Information Processing, 116 LNBIP:1–20, 2012. (doi:10.1007/978-3-642-34044-4_1)

[119]
K. Kolomvatsos, G. Valkanas, and S. Hadjiefthymiades. Debugging applications created by a domain specific language: The IPAC case. Journal of Systems and Software, 85(4):932–943, 2012. (doi:10.1016/j.jss.2011.11.1009)

[120]
T. Kos, T. Kosar, and M. Mernik. Development of data acquisition systems by using a domain-specific modeling language. Computers in Industry, 63(3):181–192, 2012. (doi:10.1016/j.compind.2011.09.004)

[121]
T. Kosar, M. Mernik, and J.C. Carver. Program comprehension of domain-specific and general-purpose languages: Comparison using a family of experiments. Empirical Software Engineering, 17(3):276–304, 2012. (doi:10.1007/s10664-011-9172-x)

[122]
S.Y. Kose and O. Kilincci. Hybrid simulated annealing/genetic algorithm approach to buffer allocation problem in unreliable production lines. In 10th International Fuzzy Logic and Intelligent Technologies inNuclear Science Conference, FLINS 2012, volume 7, pages 981–986, 2012.

[123]
P. Kotzé, M. Tsogang, and A. Van Der Merwe. A framework for creating pattern languages for enterprise architecture. Lecture Notes in Business Information Processing, 131 LNBIP:1–20, 2012. (doi:10.1007/978-3-642-34163-2_1)

[124]
A. Kowalski and T. Marut. Hybrid methods aiding organisational and technological production preparation using simulation models of nonlinear production systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7209 LNAI(PART 2):259–266, 2012. (doi:10.1007/978-3-642-28931-6_25)

[125]
C. Kozak and M. Squire. A secondary data archive for code-level debian metrics. In Proceedings - 2011 2nd International Workshop on Replication in Empirical Software Engineering Research, RESER 2011, pages 43–51, 2012. (doi:10.1109/RESER.2011.9)

[126]
N. Kumar, R. Iqbal, and N. Chilamkurti. Capacity and load-aware service discovery with service selection in peer-to-peer grids. Future Generation Computer Systems, 28(7):1090–1099, 2012. (doi:10.1016/j.future.2011.11.008)

[127]
S. Kurkovsky. Peer-to-peer network applications. Handbook of Computer Networks, 3:152–167, 2012. (doi:10.1002/9781118256107.ch10)

[128]
Y.-K. Kwok. Incentive issues in peer-to-peer systems. Handbook of Computer Networks, 3:168–188, 2012. (doi:10.1002/9781118256107.ch11)

[129]
Y. Lai and Z. Liu. Unknown malicious code detection comparison of statistical and encoding method. Information, 15(11 A):4563–4571, 2012.

[130]
Ralf Lammel, Anders Hejlsberg, Andrew E. Kimball, David Lawrence Remy, and Erik Meijer. Instance annotation in object-oriented programming. United States Patent 8,132,093, March 2012. Assignee: Microsoft Corporation (Redmond, WA).

[131]
G. Lee, J. Han, and S. Lee. A TV remote pointing device using LED directivity. In Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI 2012, pages 331–338, 2012. (doi:10.1145/2414536.2414590)

[132]
M.B. Lehmann, L.F. Müller, R.S. Antunes, and M.P. Barcellos. Disconnecting to connect: Understanding optimistic disconnection in BitTorrent. In 2012 IEEE 12th International Conference on Peer-to-Peer Computing, P2P 2012, pages 138–148, 2012. (doi:10.1109/P2P.2012.6335793)

[133]
A.F. Leite, H.C. Mendes, L. Weigang, A.C.M.A. de Melo, and A. Boukerche. An architecture for P2P bag-of-tasks execution with multiple task allocation policies in desktop grids. Cluster Computing, 15(4):351–361, 2012. (doi:10.1007/s10586-011-0154-y)

[134]
J. Li and T. Chusho. A web application framework for end-user-initiative development with a visual tool. In Lecture Notes in Engineering and Computer Science, volume 1, pages 816–822, 2012.

[135]
Z. Liaghat, A.H. Rasekh, and A.R. Tabebordbar. Enhance software quality using data mining algorithms. In 2012 Spring World Congress on Engineering and Technology, SCET 2012 - Proceedings, 2012. (doi:10.1109/SCET.2012.6342020)

[136]
S.B. Lim and K. and Yoon. Ubiquitous air quality monitoring system with service oriented architecture middleware. Journal of Convergence Information Technology, 7(6):193–201, 2012. (doi:10.4156/jcit.vol7.issue6.24)

[137]
H.-C. Lin, Y.-F. Hsu, and B.-J. Hsieh. A P2P-to-UPnP proxy gateway architecture for home multimedia content distribution. KSII Transactions on Internet and Information Systems, 6(1):405–424, 2012. (doi:10.3837/tiis.2012.01.023)

[138]
H. Lin. Operational considerations in cyber attack and cyber exploitation. In Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, pages 37–56. Georgetown University Press, 2012.

[139]
K.J. Lin. Building a video monitoring system with Linux using component-based approach. In 6th IASTED International Conference on Software Engineering and Applications, SEA 2002, pages 385–390. Acta Press, 2012.

[140]
J. Linggarjati and R. Hedwig. Manually interchangeable heads of homemade computer numerical control (CNC) machine. Internetworking Indonesia Journal, 4(1):19–22, 2012.

[141]
V. Ljubovic and N. Nosovic. Repository analysis tools in teaching software engineering. In 2012 9th International Symposium on Telecommunications, BIHTEL 2012 - Proceedings, 2012.

[142]
V. Ljubovic and N. Nosovic. Software metrics in student projects. In 2012 20th Telecommunications Forum, TELFOR 2012 - Proceedings, pages 1464–1467, 2012.

[143]
A. Logvinenko and D. Tutsch. RecSim — a simulator for reconfigurable network on chip topologies. In 26th European Simulation and Modelling Conference, ESM 2012, pages 144–151. EUROSIS, 2012.

[144]
M. Lumpe, R. Vasa, T. Menzies, R. Rush, and B. Turhan. Learning better inspection optimization policies. International Journal of Software Engineering and Knowledge Engineering, 22(5):621–644, 2012. (doi:10.1142/S0218194012500179)

[145]
E. Maani, Z. Chen, and A.K. Katsaggelos. A game theoretic approach to video streaming over peer-to-peer networks. Signal Processing: Image Communication, 27(5):545–554, 2012. (doi:10.1016/j.image.2012.02.015)

[146]
G. Magklaras and S.M. Furnell. The insider threat prediction and specification language. In 9th International Network Conference, INC 2012, pages 51–61. Plymouth University, 2012.

[147]
S. Maitrehenry, S. Metge, Y. Aït-Ameur, and P. Bieber. An MDE-based synthesis of aircraft safety models. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7602 LNCS:43–54, 2012. (doi:10.1007/978-3-642-33609-6_6)

[148]
T. Makino and K. Aihara. Software development and testing for machine learning studies: With an example of probabilistic inference with Monte Carlo based methods. Transactions of the Japanese Society for Artificial Intelligence, 27(4):253–262, 2012. (doi:10.1527/tjsai.27.253)

[149]
R. Malhotra and A. Jain. Fault prediction using statistical and machine learning methods for improving software quality. Journal of Information Processing Systems, 8(2):241–262, 2012. (doi:10.3745/JIPS.2012.8.2.241)

[150]
S. Mandal, S. Chakraborty, and S. Karmakar. Deterministic 1-2 skip list in distributed system. In Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, PDGC 2012, pages 296–301, 2012.

[151]
A. Mardani. An investigation of the web citations in Iran's chemistry articles in SCI. Library Review, 61(1):18–29, 2012. (doi:10.1108/00242531211207398)

[152]
Z. Marian. Aggregated metrics guided software restructuring. In Proceedings - 2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing, ICCP 2012, pages 259–266, 2012. (doi:10.1109/ICCP.2012.6356197)

[153]
T. Matsushita, S. Yamanaka, and F. Zhao. A peer-to-peer content-distribution scheme resilient to key leakage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7115 LNCS:121–135, 2012. (doi:10.1007/978-3-642-27890-7_10)

[154]
A. Matta, M. Pezzoni, and Q. Semeraro. A Kriging-based algorithm to optimize production systems approximated by analytical models. Journal of Intelligent Manufacturing, 23(3):587–597, 2012. (doi:10.1007/s10845-010-0397-0)

[155]
P.J. McKenzie, J. Burkell, L. Wong, C. Whippey, S.E. Trosow, and M. McNally. User-generated online content 1: Overview, current state and context. First Monday, 17(6), 2012.

[156]
J.A. Meira, E.C.D. Almeida, , and G. Sunye. Peer-to-peer load testing. In Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, pages 642–647, 2012. (doi:10.1109/ICST.2012.153)

[157]
L. Meneses, R. Furuta, and F. Shipman. Identifying "soft 404" error pages: Analyzing the lexical signatures of documents in distributed collections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7489 LNCS:197–208, 2012. (doi:10.1007/978-3-642-33290-6_22)

[158]
B. Molina, C.E. Palau, and M. Esteve. CDN modeling and performance. In Next Generation Content Delivery Infrastructures: Emerging Paradigms and Technologies, pages 1–28. IGI Global, 2012. (doi:10.4018/978-1-4666-1794-0.ch001)

[159]
J.M. Monteiro, R.S. Cruz, C.Z. Patrikakis, N.C. Papaoulakis, C.T. Calafate, and M.S. Nunes. Peer-to-peer video streaming. In Multimedia Networking and Coding, pages 254–313. IGI Global, 2012. (doi:10.4018/978-1-4666-2660-7.ch010)

[160]
R. Moreno-Sanchez. Free and open source software for geospatial applications (FOSS4G): A mature alternative in the geospatial technologies arena. Transactions in GIS, 16(2):81–88, 2012. (doi:10.1111/j.1467-9671.2012.01314.x)

[161]
H.S. Mounine and H.K. Walid. D3-P2P: Managing distributed and replicated database in P2P environment by using quorum system. Journal of Digital Information Management, 10(6):351–364, 2012.

[162]
H.S. Mounine and H.K. Walid. A deadlock managing process for distributed and replicated database in P2P system. In 2nd International Conference on Innovative Computing Technology, INTECH 2012, pages 6–9, 2012.

[163]
B. Movahedi, K.M. Lavassani, and V. Kumar. E-marketplace emergence: Evolution, developments and classification. Journal of Electronic Commerce in Organizations, 10(1):14–32, 2012. (doi:10.4018/jeco.2012010102)

[164]
T. Moyer, T. Jaeger, and P. McDaniel. Scalable integrity-guaranteed AJAX. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7235 LNCS:1–19, 2012. (doi:10.1007/978-3-642-29253-8_1)

[165]
A. Murgia, R. Tonelli, G. Concas, M. Marchesi, and S. Counsell. Parameter-based refactoring and the relationship with fan-in/fan-out coupling. Journal of Object Technology, 11(2), 2012. (doi:10.5381/jot.2012.11.2.a7)

[166]
A. Murgia, R. Tonelli, M. Marchesi, G. Concas, S. Counsell, J. McFall, and S. Swift. Refactoring and its relationship with fan-in and fan-out: An empirical study. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 63–72, 2012. (doi:10.1109/CSMR.2012.17)

[167]
E. Murphy-Hill, C. Parnin, and A.P. Black. How we refactor, and how we know it. IEEE Transactions on Software Engineering, 38(1):5–18, 2012. (doi:10.1109/TSE.2011.41)

[168]
S. Nalliah and K.Y. Loh. Concepts in the management of the overactive bladder in women. Medical Journal of Malaysia, 67(1):137–142, 2012.

[169]
Raman Narayanan, Ming Liu, and Paresh S Suthar. Enabling access to rich data by intercepting paste operations. United States Patent 8,296,671, October 2012. Assignee: Microsoft Corporation (Redmond, WA).

[170]
A. Nieminen. Real-time collaborative resolving of merge conflicts. In CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 540–543, 2012.

[171]
C. Okoli and K. Carillo. The best of adaptive and predictive methodologies: Open source software development, a balance between agility and discipline. International Journal of Information Technology and Management, 11(1-2):153–166, 2012. (doi:10.1504/IJITM.2012.044071)

[172]
J.L. Ordiales Coscia, M. Crasso, C. Mateos, and A. Zunino. An approach to improve code-first web services discoverability at development time. In Proceedings of the ACM Symposium on Applied Computing, pages 638–643, 2012. (doi:10.1145/2245276.2245400)

[173]
J. Ossher, H. Sajnani, and C. Lopes. Astra: Bottom-up construction of structured artifact repositories. In Proceedings - Working Conference on Reverse Engineering, WCRE, pages 41–50, 2012. (doi:10.1109/WCRE.2012.14)

[174]
J. Pan and C.C. Fung. An agent-based model to simulate coordinated response to malware outbreak within an organisation. International Journal of Information and Computer Security, 5(2):115–131, 2012. (doi:10.1504/IJICS.2012.051777)

[175]
P.M. Papadopoulos, I.G. Stamelos, and A. Meiszner. Students' perspectives on learning software engineering with open source projects: Lessons learnt after three years of program operation. In CSEDU 2012 - Proceedings of the 4th International Conference on Computer Supported Education, volume 2, pages 313–322, 2012.

[176]
E. Papapetrou, P. Vassiliadis, E. Rova, and A. Zarras. Cross-layer routing for peer database querying over mobile ad hoc networks. Computer Networks, 56(2):504–520, 2012. (doi:10.1016/j.comnet.2011.10.004)

[177]
A. Passarella. A survey on content-centric technologies for the current internet: CDN and P2P solutions. Computer Communications, 35(1):1–32, 2012. (doi:10.1016/j.comcom.2011.10.005)

[178]
P. Patel and J. Bhatia. Review on variants of reliable and security aware peer to peer content distribution using network coding. In 3rd Nirma University International Conference on Engineering, NUiCONE 2012, 2012.

[179]
G. Pau and R. Tse. Challenges and opportunities in immersive vehicular sensing: Lessons from urban deployments. Signal Processing: Image Communication, 27(8):900–908, 2012. (doi:10.1016/j.image.2012.01.015)

[180]
X. Peng, M. Li, and Z. Huang. A data collection framework with extensible protocol based on XML. 2nd World Congress on Computer Science and Information Engineering, CSIE 2011, 124 LNEE(VOL. 1):481–489, 2012. (doi:10.1007/978-3-642-25781-0_72)

[181]
E. Perakakis, A. Levinenko, and G. Ghinea. HTML5 and companion web technologies as a universal platform for interactive internet TV advertising. In 2012 International Conference on Telecommunications and Multimedia, TEMU 2012, pages 214–219, 2012. (doi:10.1109/TEMU.2012.6294721)

[182]
G.J. Pérez-Irizarry, F. De La Cruz-Sanchez, B.A. Landrón-Rivera, N.G. Santiago, and M. Velez-Reyes. Developing a portable GPU library for hyperspectral image processing. In 18th Annual Conference on Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery, volume 8390. SPIE, 2012. (doi:10.1117/12.920499)

[183]
C.E.S. Pires, R.M.L. Santiago, A.C. Salgado, Z. Kedad, and M. Bouzeghoub. Ontology-based clustering in a peer data management system. International Journal of Distributed Systems and Technologies, 3(2):1–21, 2012. (doi:10.4018/jdst.2012040101)

[184]
J. Porubän, J. Kollár, and M. Sabo. Abstraction of computer language patterns: The inference of textual notation for a DSL. In Formal and Practical Aspects of Domain-Specific Languages: Recent Developments, pages 365–385. IGI Global, 2012. (doi:10.4018/978-1-4666-2092-6.ch013)

[185]
C. Preschern, N. Kajtazovic, and C. Kreiner. Applying patterns to model-driven development of automation systems: An industrial case study. In 17th European Conference on Pattern Languages of Programs, EuroPLoP 2012. Association for Computing Machinery, 2012. (doi:10.1145/2602928.2603081)

[186]
N.N. Qadri and M. Fleury. P2P streaming over MANET and VANET. Streaming Media with Peer-to-Peer Networks: Wireless Perspectives, pages 119–161, 2012. (doi:10.4018/978-1-4666-1613-4.ch007)

[187]
N.N. Qadri, M. Fleury, B.R. Rofoee, M. Altaf, and M. Ghanbari. Robust P2P multimedia exchange within a vanet. Wireless Personal Communications, 63(3):561–577, 2012. (doi:10.1007/s11277-010-0150-1)

[188]
I. Raikov and E. de Schutter. The layer-oriented approach to declarative languages for biological modeling. PLoS Computational Biology, 8(5), 2012. (doi:10.1371/journal.pcbi.1002521)

[189]
C.K. Raju, A. Mishra, and P.B.S. Bhadoria. Synthesis of sustainability and secureness of software in public applications using deductive-nomological model. In ACM International Conference Proceeding Series, pages 579–588, 2012. (doi:10.1145/2345396.2345491)

[190]
N. Ramasubbu, C.F. Kemerer, and J. Hong. Structural complexity and programmer team strategy: An experimental test. IEEE Transactions on Software Engineering, 38(5):1–15, 2012. (doi:10.1109/TSE.2011.88)

[191]
A. Raza, L.F. Capretz, and F. Ahmed. Users' perception of open source usability: An empirical study. Engineering with Computers, 28(2):109–121, 2012. (doi:10.1007/s00366-011-0222-1)

[192]
E. Reategui, L.M.A. dos Santos, and L. Tarouco. Pedagogical agents and the efficiency of instructional conditions in educational applications. In Educational Stages and Interactive Learning: From Kindergarten to Workplace Training, pages 121–133. IGI Global, 2012. (doi:10.4018/978-1-4666-0137-6.ch008)

[193]
J. Reutelshoefer, J. Baumeister, and F. Puppe. A meta-engineering approach for customized document-centered knowledge acquisition. In Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), volume P-201, pages 187–202, 2012.

[194]
Anthony Rose. Filter for a distributed network. United States Patent 8,185,576, May 2012. Assignee: Altnet, Inc. (Sherman Oaks, CA).

[195]
M.K. Saberi and H. Abedi. Accessibility and decay of web citations in five open access ISI journals. Internet Research, 22(2):234–247, 2012. (doi:10.1108/10662241211214584)

[196]
A. Sadat-Moosavi, A. Isfandyari-Moghaddam, and O. Tajeddini. Accessibility of online resources cited in scholarly LIS journals: A study of Emerald ISI-ranked journals. Aslib Proceedings: New Information Perspectives, 64(2):178–192, 2012. (doi:10.1108/00012531211215196)

[197]
M. Salamó, K. McCarthy, and B. Smyth. Generating recommendations for consensus negotiation in group personalization services. Personal and Ubiquitous Computing, 16(5):597–610, 2012. (doi:10.1007/s00779-011-0413-1)

[198]
B.T. Sampath Kumar and K.S. Manoj Kumar. Decay and half-life period of online citations cited in open access journals. International Information and Library Review, 44(4):202–211, 2012. (doi:10.1016/j.iilr.2012.09.002)

[199]
B.T. Sampath Kumar and K.S. Manoj Kumar. Persistence and half-life of URL citations cited in LIS open access journals. Aslib Proceedings: New Information Perspectives, 64(4):405–422, 2012. (doi:10.1108/00012531211244752)

[200]
B.T. Sampath Kumar and K.R. Prithvi Raj. Availability and persistence of web citations in Indian LIS literature. Electronic Library, 30(1):19–32, 2012. (doi:10.1108/02640471211204042)

[201]
A. Santos-Olmo, L.E. Sánchez, E. Fernández-Medina, and M. Piattini. A systematic review of methodologies and models for the analysis and management of associative and hierarchical risk in SMEs. In Proceedings of the 9th International Workshop on Security in Information Systems, WOSIS 2012, in Conjunction with ICEIS 2012, pages 117–124, 2012.

[202]
M. Schmidberger and M. Schmidberger. Software engineering as a service for HPC. In Proceedings - 2012 11th International Symposium on Parallel and Distributed Computing, ISPDC 2012, pages 34–39, 2012. (doi:10.1109/ISPDC.2012.13)

[203]
Christoph Schnelle and Geoffrey John Nolan. Mapping of data from XML to SQL. United States Patent 8,204,913, June 2012. Assignee: Timebase Pty Limited (Sydney, New South Wales, AU).

[204]
T.A. Sedbrook. Modeling the REA enterprise ontology with a domain specific language. Journal of Emerging Technologies in Accounting, 9(1):47–70, 2012.

[205]
S. Shaaban and S. Hudson. Transient behaviour of unbalanced lines. Flexible Services and Manufacturing Journal, 24(4):575–602, 2012. (doi:10.1007/s10696-011-9110-7)

[206]
Behzad Shahraray, Andrea Basso, Lee Begeja, David C. Gibbon, Zhu Liu, and Bernard S. Renger. System and method for adaptive media playback based on destination. United States Patent 8,239,410, August 2012. Assignee: AT&T Intellectual Property I, L.P. (Atlanta, GA).

[207]
W. Shang, B. Adams, and A.E. Hassan. Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report. Journal of Systems and Software, 85(10):2195–2204, 2012. (doi:10.1016/j.jss.2011.07.034)

[208]
V. Shanmughaneethi, R.Y. Praveen, and S. Swamynathan. CIVD: Detection of command injection vulnerabilities in web services through aspect-oriented programming. International Journal of Computer Applications in Technology, 44(4):312–320, 2012. (doi:10.1504/IJCAT.2012.050119)

[209]
F. Shu, Y. Yang, , and Q. Wang. An investigation on the feasibility of cross-project defect prediction. Automated Software Engineering, 19(2):167–199, 2012. (doi:10.1007/s10515-011-0090-3)

[210]
C. Song and L. Han. Application of the work study to balancing hydraulic component assembly lines. Advanced Materials Research, 452-453:206–210, 2012. (doi:10.4028/www.scientific.net/AMR.452-453.206)

[211]
E. Spishak, W. Dietl, and M.D. Ernst. A type system for regular expressions. In Proceedings for FTfJP 2012: The 14th Workshop on Formal Techniques for Java-Like Programs - Co-located with ECOOP 2012 and PLDI 2012, Papers Presented at the Workshop, pages 20–26, 2012. (doi:10.1145/2318202.2318207)

[212]
S. Srivastava, V. Gupta, R. Yadav, and K. Kant. Controlling free riding using extended point based incentive mechanism in peer-to-peer networks. In Proceedings of the 2012 3rd International Conference on Computer and Communication Technology, ICCCT 2012, pages 200–205, 2012. (doi:10.1109/ICCCT.2012.48)

[213]
J. Staiano, M. Menéndez, A. Battocchi, A. De Angeli, and N. Sebe. UX-mate: From facial expressions to UX evaluation. In Proceedings of the Designing Interactive Systems Conference, DIS '12, pages 741–750, 2012. (doi:10.1145/2317956.2318068)

[214]
Sufatrio and R.H.C. Yap. Quantifying the effects of more timely certificate revocation on lightweight mobile devices. In Proceedings - 2011 3rd International Workshop on Security Measurements and Metrics, Metrisec 2011, pages 31–40, 2012. (doi:10.1109/Metrisec.2011.17)

[215]
Z. Sun, A. Purohit, S. Pan, F. Mokaya, R. Bose, and P. Zhang. Polaris: Getting accurate indoor orientations for mobile devices using ubiquitous visual patterns on ceilings. In HotMobile 2012 - 13th Workshop on Mobile Computing Systems and Applications, 2012. (doi:10.1145/2162081.2162101)

[216]
V.M. Suresh, D. Karthikeswaran, V.M. Sudha, and D. Murali Chandraseker. Web server load balancing using SSL back-end forwarding method. In IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012, pages 822–827, 2012.

[217]
G. Tang, , D.-F. Chang, C.-T. Wang, and X.-L. Bai. Distributed computing for mechanical virtual human. Advanced Materials Research, 341-342:695–699, 2012. (doi:10.4028/www.scientific.net/AMR.341-342.695)

[218]
G. Tang, D.-F. Chang, , C.-T. Wang, and D.-M. Wang. Networking architecture for Chinese mechanical virtual human. Advanced Materials Research, 433-440:5828–5831, 2012. (doi:10.4028/www.scientific.net/AMR.433-440.5828)

[219]
R. Tartler, J. Sincero, C. Dietrich, W. Schröder-Preikschat, and D. Lohmann. Revealing and repairing configuration inconsistencies in large-scale system software. International Journal on Software Tools for Technology Transfer, 14(5):531–551, 2012. (doi:10.1007/s10009-012-0225-2)

[220]
Yannick Teglia and Pierre-Yvan Liardet. Statistical control of the integrity of a program. United States Patent 8,239,833, August 2012. Assignee: STMicroelectronics S.A. (Montrouge, FR).

[221]
K. Thornton and D.W. Mcdonald. Tagging wikipedia: Collaboratively creating a category system. In GROUP'12 - Proceedings of the ACM 2012 International Conference on Support Group Work, pages 219–227, 2012. (doi:10.1145/2389176.2389210)

[222]
D.S. Touceda, J.M. Sierra, A. Izquierdo, and H. Schulzrinne. Survey of attacks and defenses on P2PSIP communications. IEEE Communications Surveys and Tutorials, 14(3):750–783, 2012. (doi:10.1109/SURV.2011.060711.00152)

[223]
A.V. Uzunov, E.B. Fernandez, and K. Falkner. Engineering security into distributed systems: A survey of methodologies. Journal of Universal Computer Science, 18(20):2920–3006, 2012.

[224]
M. Vdalis, S. Koukoumialos, D. Ntio, and G. Varlas. Performance evaluation of a merge supply system with a distribution centre, two reliable suppliers, one buffer and Erlang lead times. International Journal of Business Science and Applied Management, 7(3):42–55, 2012.

[225]
L. Vidács, R. Dévai, R. Ferenc, and T. Gyimóthy. Developer support for understanding preprocessor macro expansions. Communications in Computer and Information Science, 340 CCIS:121–130, 2012. (doi:10.1007/978-3-642-35267-6_16)

[226]
A.S. Vijendran and S. Thavamani. Survey of caching and replica placement algorithm for content distribution in peer to peer overlay networks. In ACM International Conference Proceeding Series, pages 248–252, 2012. (doi:10.1145/2393216.2393259)

[227]
R.J. Walker, S. Rawal, and J. Sillito. Do crosscutting concerns cause modularity problems? In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE 2012, 2012. (doi:10.1145/2393596.2393654)

[228]
W. Wang and L. Hong. Research on Chord algorithm based on polycyclic structure. In 2012 IEEE 5th International Conference on Advanced Computational Intelligence, ICACI 2012, pages 90–93, 2012.

[229]
H. Wang, G. Tan, and L. Liu. Authentication protocol security assessment framework based on attack classification. Applied Mechanics and Materials, 143-144:859–863, 2012. (doi:10.4028/www.scientific.net/AMM.143-144.859)

[230]
Z. Wang, Z. Guan, W. Li, K. Wu, J. Guo, and G. Tian. A tableau-based reasoning algorithm for distributed dynamic description logics. Communications in Computer and Information Science, 307 CCIS(PART 1):192–199, 2012. (doi:10.1007/978-3-642-34038-3_27)

[231]
M. Waterman, J. Noble, and G. Allan. How much architecture? reducing the up-front effort. In Proceedings - Agile India 2012, AgileIndia 2012, pages 56–59, 2012. (doi:10.1109/AgileIndia.2012.11)

[232]
J. Wu and M. Savoie. Peer-to-peer network architecture. Handbook of Computer Networks, 3:131–151, 2012. (doi:10.1002/9781118256107.ch9)

[233]
F. Wu. Discussion on experimental teaching of data warehouse and data mining course for undergraduate education. In ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education, pages 1425–1429, 2012. (doi:10.1109/ICCSE.2012.6295331)

[234]
Shlomo Wygodny, Valery Golender, Ido Ben-Moshe, and Vladimir Andreev. System and method for conditional tracing of computer programs. United States Patent 8,312,435, November 2012. Assignee: Identify Software Ltd. (IL) (Petach Tikva, IL).

[235]
H. Yamamoto and K. Yamazaki. LISP-based information multicasting system using location-aware P2P network technologies. In 2012 IEEE Consumer Communications and Networking Conference, CCNC'2012, pages 640–644, 2012. (doi:10.1109/CCNC.2012.6181144)

[236]
S. Yang, R. Han, J. Ding, and Y. Song. The distribution of web citations. Information Processing and Management, 48(4):779–790, 2012. (doi:10.1016/j.ipm.2011.10.002)

[237]
Y. Younan, W. Joosen, and F. Piessens. Runtime countermeasures for code injection attacks against C and C++ programs. ACM Computing Surveys, 44(3), 2012. (doi:10.1145/2187671.2187679)

[238]
X. Zhang and H. Hassanein. A survey of peer-to-peer live video streaming schemes — an algorithmic perspective. Computer Networks, 56(15):3548–3579, 2012. (doi:10.1016/j.comnet.2012.06.013)

[239]
N. Zhang, J. Lin, J. Jing, and N. Gao. RIKE: Using revocable identities to support key escrow in PKIs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7341 LNCS:48–65, 2012. (doi:10.1007/978-3-642-31284-7_4)

[240]
Y. Zheng, F. Liu, X. Luo, and C. Yang. A method based on feature matching to identify steganography software. In Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012, pages 989–994, 2012. (doi:10.1109/MINES.2012.26)

[241]
F.-C. Zhou, , and Z.-L. Zhu. Distributed authenticated skip list for secure P2P storage. Dongbei Daxue Xuebao/Journal of Northeastern University, 33(1):73–76, 2012.

[242]
J. Zhou, J. Li, Q. Chi, Y. Zhang, and H. Hua. Personalized intelligent guidance system for large-scale crowd's activities. In 2012 9th International Conference on Service Systems and Service Management - Proceedings of ICSSSM'12, pages 583–587, 2012. (doi:10.1109/ICSSSM.2012.6252305)

[243]
J. Zhou, D. Zhao, , and J. Liu. Do we need another textual language for feature modeling? a preliminary evaluation on the XML based approach. Studies in Computational Intelligence, 430:97–111, 2012. (doi:10.1007/978-3-642-30460-6_7)

[244]
E.M.-B.O. Zierau. A holistic approach to bit preservation. Library Hi Tech, 30(3):472–489, 2012. (doi:10.1108/07378831211266618)