[1]
M.A. Akbari, H. Takahashi, and M. Nakajima. Discerning advisor: An intelligent advertising system for clothes considering skin color. In Proceedings - 2005 International Conference on Cyberworlds, CW 2005, volume 2005, pages 202–209, 2005. (doi:10.1109/CW.2005.40)
[2]
M.W. Akhtar and M.-T. Kechadi. Dynamic load balancing of content requests in peer to peer systems. In S.Q. Zheng, editor, Parallel and Distributed Computing and Systems — PDCS 2005. ACTA Press, November 2005.
[3]
G. Alon, D.P. Kroese, T. Raviv, and R.Y. Rubinstein. Application of the cross-entropy method to the buffer allocation problem in a simulation-based environment. Annals of Operations Research, 134(1-4):137–151, 2005. (doi:10.1007/s10479-005-5728-8)
[4]
K.G. Anagnostakis and A.D. Keromytis. Action amplification: A new approach to scalable administration. In 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, volume 2, pages 862–867, 2005. (doi:10.1109/ICON.2005.1635629)
[5]
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In 14th USENIX Security Symposium, Berkeley, CA, August 2005. Usenix Association.
[6]
E. Anceaume, X. Defago, M. Gradinariu, and M. Roy. Towards a theory of self-organization. In Pierre Fraigniaud, editor, Distributed Computing: 19th International Conference (DISC 2005), pages 505–506. Springer-Verlag, September 2005. Lecture Notes in Computer Science 3724. (doi:10.1007/11561927_43)
[7]
Brent Auernjeimer and Max J. Tsai. Biometric authentication for web-based course examinations. In Proceedings of the 38th Hawaii Int. Conf. on System Sciences (HICSS-38) — Track 9, page 294b, January 2005. (doi:10.1109/HICSS.2005.120)
[8]
(Author names in Chinese). A security model of e-commerce based on internet agent. Microcomputer Applications, 21(1):4–16, 2005. In Chinese.
[9]
Charlie C. Baggett, Jr. and John J. Adams. Method, system and computer program product for assessing information security. United States Patent 6,925,443, August 2005. Assignee: SAFEOperations, Inc. (Columbia, MD).
[10]
Wolf-Tilo Balke. Information retrieval in peer-to-peer systems. In R. Steinmetz and K. Wehrle, editors, Peer-to-Peer Systems and Applications. Springer-Verlag, Berlin, 2005. Lecture Notes in Computer Science 3485.
[11]
M. Barrett and C. Thomborson. Using NGSCB to mitigate existing software threats. IFIP Advances in Information and Communication Technology, 177:55–74, 2005.
[12]
Matthew Frederick Barrett. Towards an open trusted computing framework. Master's thesis, The University of Auckland, February 2005.
[13]
P. Bellavista, A. Corradi, and E. Magistretti. REDMAN: An optimistic replication middleware for read-only resources in dense MANETs. Pervasive and Mobile Computing, 1(3):279–310, 2005. (doi:10.1016/j.pmcj.2005.06.002)
[14]
S. Bergamaschi, P. Bouquet, P. Ciaccia, and P. Merialdo. Speaking words of WISDOM: Web intelligent search based on DOMain ontologies. In CEUR Workshop Proceedings, volume 166, 2005.
[15]
S. Bistarelli, S.N. Foley, and B. O'Sullivan. A soft constraint-based approach to the cascade vulnerability problem. Journal of Computer Security, 13(5):699–720, 2005.
[16]
Jurgen Bitzer and Philipp J.H. Schroder. The impact of entry and competition by open source software on innovation activity. Industrial Organization 0512001, EconWPA, December 2005.
[17]
Alsberg B.K., Bjerke H., Navestad G.M., and Astrand P.O. GaussDal: An open source database management system for quantum chemical computations. Computer Physics Communications, 171(2):133–153, September 2005. (doi:10.1016/j.cpc.2005.04.008)
[18]
Silas S. Brown and Peter Robinson. Transformation frameworks and their relevance in universal design. Universal Access in the Information Society, 2005.
[19]
D.-W. Chen, B. Xu, Y.-R. Cai, and J.-Z. Li. P2P based web service discovery mechanism with bounding deployment and publication. Jisuanji Xuebao/Chinese Journal of Computers, 28(4):615–626, 2005.
[20]
Q. Chen, C. Zhang, and S. Zhang. ENDL: A logical framework for verifying secure transaction protocols. Knowledge and Information Systems, 7(1):84–109, 2005. (doi:10.1007/s10115-003-0127-4)
[21]
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant. Semantics-aware malware detection. In Proceedings — IEEE Symposium on Security and Privacy, pages 32–46, 2005.
[22]
G. Chroust. Mutual influences of society's paradigm and information and communication technologies. In 49th Annual Meeting of the International Society for the Systems Sciences 2005, ISSS 2005, pages 843–860, 2005.
[23]
Mihai Ciocarlie, Marcela-Simona Atanasoae, and Horia Ciocarlie. System of programs for rapid development and execution of Palm OS applications. Transactions on Engineering, Computing and Technology, 7:260–263, 2005.
[24]
Sam St. Clair-Ford, Mohamed Ould-Khaoua, and Lewis Mackenzie. The impact of network bandwidth on worm propagation. In Nigel Thomas, editor, 21st UK Performance Engineering Workshop, pages 21–29, Newcastle upon Tyne, UK, July 2005. University of Newcastle. Technical Report CS-TR-916.
[25]
A.J. Conover and Y.-T. Song. A framework for component mining of java applications via dynamic slicing. In Proceedings - Third ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2005, volume 2005, pages 40–47, 2005. (doi:10.1109/SERA.2005.7)
[26]
Paul A. Cronce. Method for runtime code integrity validation using code block checksums. United States Patent 6,880,149, April 2005. Assignee: Pace Anti-Piracy (San Jose, CA).
[27]
H. Dagdeviren, R. Juric, and T.A. Kassana. An exploratory study for effective COTS and OSS product marketing. In Proceedings of the International Conference on Information Technology Interfaces, ITI, pages 681–686, 2005. (doi:10.1109/ITI.2005.1491205)
[28]
Dominik Roman Christian Dahlem. Digital rights enforcement for pervasive computing applications. Master's thesis, University of Dublin, Trinity College, March 2005.
[29]
Raphael Y. de Camargo, Renato Cerqueira, and Fabio Kon. Strategies for storage of checkpointing data using non-dedicated repositories on grid systems. In MGC '05: Proceedings of the 3rd International Workshop on Middleware for Grid Computing, pages 1–6, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1101499.1101500)
[30]
Diego López de Ipiña, Iñaki Vázquez, Daniel García, Javier Fernández, and Iván García. A reflective middleware for controlling smart objects from mobile devices. In sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart objects and ambient intelligence, pages 213–218, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1107548.1107602)
[31]
V. Dimopoulos and S. Furnell. A protection profiles approach to risk analysis for small and medium enterprises. IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, 193:267–283, 2005.
[32]
Florin Dragan, Georges Gardarin, and Laurent Yeh. Routing XQuery in a P2P network using adaptable trie-indexes. In IADIS International Conference WWW/Internet, October 2005.
[33]
Gunther Eysenbach and Mathieu Trudel. Going, going, still there: Using the WebCite service to permanently archive cited web pages. Journal of Medical Internet Research, 7(5):e60, 2005. (doi:10.2196/jmir.7.5.e60)
[34]
S. Goel and D. Pon. Distribution of patches within vulnerable systems: A distributed model. In Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005, volume 2005, pages 458–460, 2005. (doi:10.1109/IAW.2005.1496000)
[35]
Daniel Gomes and Mário J. Silva. Characterizing a national community web. ACM Transactions on Internet Technology, 5(3):508–531, August 2005. (doi:10.1145/1084772.1084775)
[36]
Jesus M. González-Barahona, Gregorio Robles, and Israel Herraiz. Challenges in software evolution: the libre software perspective. In Workshop on Challenges in Software Evolution, pages 557–560, April 2005.
[37]
Georgios Gousios, Eyfthymia Aivaloglou, and Stefanos Gritzallis. Distributed component architectures security issues. Computer Standards & Interfaces, 27(3):269–284, March 2005. (doi:10.1016/j.csi.2004.08.003)
[38]
L.Z. Granville, D.M. da Rosa, A. Panisson, C. Melchiors, M. J. B. Almeida, and L. M. R. Tarouco. Managing computer networks using peer-to-peer technologies. IEEE Communications, 43(10):62–68, October 2005. (doi:10.1109/MCOM.2005.1522126)
[39]
M. Grechanik, D.E. Perry, and D. Batory. Using AOP to monitor and administer software for grid computing environments. In Proceedings — International Computer Software and Applications Conference, pages 241–248, 2005. (doi:10.1109/COMPSAC.2005.167)
[40]
Yann-Gaël Guéhéneuc. A theory of program comprehension — joining vision science and program comprehension. Technical Report 1267, University of Montreal, December 2005.
[41]
Leitao Guo, Shoubao Yang, Jing Wang, and Jinyang Zhou. Trust model based on similarity measure of vectors in p2p networks. In Grid and Cooperative Computing — GCC 2005, pages 836–847. Springer-Verlag, 2005. Lecture Notes in Computer Science 3795. (doi:10.1007/11590354_103)
[42]
A. Gupta and R. Hammond. Information systems security issues and decisions for small businesses: An empirical examination. Information Management and Computer Security, 13(4):297–310, June 2005. (doi:10.1108/09685220510614425)
[43]
Jin ha Kim. Design and Analysis of Cluster-Based Web Servers. PhD thesis, Pennsylvania State University, University Park, PA, 2005.
[44]
D. Hartmann. Computer simulation for contemporary problems in civil engineering. In Proceedings of the 2005 ASCE International Conference on Computing in Civil Engineering, pages 295–310, 2005.
[45]
R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and R. Campbell. A survey of peer-to-peer storage techniques for distributed file systems. In International Conference on Information Technology: Coding and Computing, ITCC, volume 2, pages 205–213, 2005.
[46]
M. Hussain, I. Hajjeh, H. Afifi, and D. Seret. Extending IKEv2 for multi-vendor home network environment. In The 7th International Conference on Advanced Communication Technology, ICACT 2005, volume 1, pages 63–68, 2005.
[47]
K. Iwasaki, K. Yamazawa, and N. Yokoya. An indexing system for photos based on shooting position and orientation with geographic database. In IEEE International Conference on Multimedia and Expo, ICME 2005, volume 2005, pages 390–393, 2005. (doi:10.1109/ICME.2005.1521442)
[48]
G. Janée and J. Frew. A hybrid declarative/procedural metadata mapping language based on Python. In Research and Advanced Technology for Digital Libraries, pages 302–313. Springer-Verlag, 2005. Lecture Notes in Computer Science 3652. (doi:10.1007/11551362_27)
[49]
R. Jantz and M.J. Giarlo. Digital preservation architecture and technology for trusted digital repositories. D-Lib Magazine, 11(6):350–373, 2005. (doi:10.1045/june2005-jantz)
[50]
Z. Jiliang, L. Xianxian, and L. Jianxin. A new taxonomy of attacks on security protocols and their security evaluation. Journal of Computer Research and Development, 42(7):1100–1107, 2005. In Chinese.
[51]
J. Jürjens. Secure systems development with UML. Springer Berlin Heidelberg, 2005. (doi:10.1007/b137706)
[52]
Ioanna Kantzavelou. A virtual lab model for an introductory computer science course. Facta Universitatis, Electrical Engineering Series, 18(2):263–274, August 2005.
[53]
Bilge Karabacak and Ibrahim Sogukpinar. ISRAM: information security risk analysis method. Computers & Security, 24(2):147–159, March 2005. (doi:10.1016/j.cose.2004.07.004)
[54]
Ajay K. Katangur and Yi Pan. Performance analysis of optical multistage interconnection networks with limited crosstalk. In 19th International Parallel and Distributed Processing Symposium (IPDPS 2005). IEEE Computer Society, April 2005. (doi:10.1109/IPDPS.2005.336)
[55]
T. Kathiravelu and A. Pears. Approaches to P2P internet application development. In Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services, ICAS/ICNS 2005, volume 2005, page 38, 2005. (doi:10.1109/ICAS-ICNS.2005.25)
[56]
G.S. Kc and A.D. Keromytis. e-NeXSh: Achieving an effectively non-executable stack and heap via system-call policing. In Proceedings — Annual Computer Security Applications Conference, ACSAC, volume 2005, pages 286–300, 2005. (doi:10.1109/CSAC.2005.22)
[57]
D.J. Kim, Y.I. Song, S.B. Braynov, and H.R. Rao. A multidimensional trust formation model in B-to-C e-commerce: A conceptual framework and content analyses of academia/practitioner perspectives. Decision Support Systems, 40(2):143–165, 2005. (doi:10.1016/j.dss.2004.01.006)
[58]
J.-H. Kim, G.S. Choi, and C.R. Das. A load balancing scheme for cluster-based secure network servers. In ICCC 2005: IEEE International Conference on Cluster Computing, 2005. (doi:10.1109/CLUSTR.2005.347056)
[59]
Jin-Ha Kim, Gyu Sang Choi, and Chita Das. A load balancing scheme for cluster-based secure network servers. In IEEE International Conference on Cluster Computing, 2005.
[60]
Paul Klint, Ralf Lämmel, and Chris Verhoef. Towards an Engineering Discipline for Grammarware. ACM Transactions on Software Engineering Methodology, 14(3):331–380, July 2005. (doi:10.1145/1072997.1073000)
[61]
S. Koch and C. Neumann. Evaluation and estimate of costs in the integration of open source software components. In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1, pages 91–95, 2005.
[62]
H. König. Peer-to-peer intrusion detection systems for the protection of sensitive IT infrastructures. In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 2, pages 638–642, 2005.
[63]
Dionysios Konstantinos Kostoulas. Distributed reputation-based mechanisms for trust propagation in large groups. Master's thesis, University of Illinois at Urbana-Champaign, Urbana, IL, 2005.
[64]
Rajeev Kumar, Amit Gupta, B. S. Pankaj, Mrinmoy Ghosh, and P. P. Chakrabarti. Post-compilation optimization for multiple gains with pattern matching. SIGPLAN Notices, 40(12):14–23, December 2005. (doi:10.1016/j.jcis.2004.09.063)
[65]
J.D. Kushkowski. Web citation by graduate students: A comparison of print and electronic theses. Portal, 5(2):259–276, 2005.
[66]
L.-C. Lam and T.-C. Chiueh. Automatic extraction of accurate application-specific sandboxing policy. In IEEE Military Communications Conference MILCOM, volume 2005, 2005. (doi:10.1109/MILCOM.2005.1605766)
[67]
M. Lesk. Understanding Digital Libraries. Elsevier Inc., 2005.
[68]
Chi-Chia Lin and Ming-Syan Chen. On controlling digital TV set-top-box by mobile devices via IP network. In Seventh IEEE International Symposium on Multimedia (ISM'05), pages 52–59, 2005. (doi:10.1109/ISM.2005.85)
[69]
K.-J. Lin, T. Yu, and C.-Y. Shih. The design of a personal and intelligent pervasive-commerce system architecture. In 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05, pages 163–172, 2005. (doi:10.1109/WMCS.2005.25)
[70]
Jun Liu, Khiang Wee Lim, Weng Khuen Ho, Kay Chen Tan, Arthur Tay, and Rajagopalan Srinivasan. Using the OPC standard for real-time process monitoring and control. IEEE Software, 22(6):54–59, November/December 2005. (doi:10.1109/MS.2005.168)
[71]
P.C. Lockemann and R. Witte. Agents and databases: Friends or foes? In 9th International Database Engineering and Application Symposium, IDEAS 2005, pages 137–147. Institute of Electrical and Electronics Engineers Inc., January 2005. (doi:10.1109/IDEAS.2005.8)
[72]
A. Löser, S. Staab, and C. Tempich. Semantic methods for p2p query routing. In T. Eymann, F. Klügl, W. Lamersdorf, M. Klusch, and M.N. Huhns, editors, Multiagent System Technologies—MATES 2005, pages 15–26, Berlin, September 2005. Springer Verlag. Lecture Notes in Artificial Intelligence 3550.
[73]
Alexander Löser, Christoph Tempich, Bastian Quilitz, Wolf-Tilo Balke, Steffen Staab, and Wolfgang Nejdl. Searching dynamic communities with personal indexes. In Yolanda Gil, Enrico Motta, V. Richard Benjamins, and Mark A. Musen, editors, The Semantic Web — ISWC 2005: 4th International Semantic Web Conference, pages 491–505, Berlin, November 2005. Springer-Verlag. Lecture Notes in Computer Science 3729.
[74]
T. Lu, Z.-S. Li, and Y.-B. Wu. GSM: A new computing paradigm based on OGSA. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 29(2):149–152, 157, 2005.
[75]
T. Lu, Z.-S. Li, C.-L. Xu, X.-M. Huang, N.-J. Tang, and Y.-Y. Xiong. FGSM: A framework for grid service mining. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 37(2):86–92, 2005.
[76]
Moreno Marzolla, Matteo Mordacchini, and Salvatore Orlando. Resource discovery in a dynamic grid environment. In 16th International Workshop on Database and Expert Systems Applications (DEXA'05), pages 356–360. IEEE Computer Society, August 2005. (doi:10.1109/DEXA.2005.166)
[77]
Bill McCloskey and Eric Brewer. ASTEC: a new approach to refactoring C. In ESEC/FSE-13: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 21–30, New York, 2005. ACM Press. (doi:10.1145/1081706.1081712)
[78]
Luis Rodero Merino, Luis López, Antonio Fernández, and Vicent Cholvi. DANTE: Self-adaptable unstructured peer-to-peer networks. Reports on Systems and Communications, V(12), July 2005.
[79]
Marjan Mernik, Jan Heering, and Anthony M. Sloane. When and how to develop domain-specific languages. ACM Computing Surveys, 37(4):316–344, 2005. (doi:10.1145/1118890.1118892)
[80]
D. Millć, M. Brogle, and T. Braun. Video broadcasting using overlay multicast. In Proceedings — Seventh IEEE International Symposium on Multimedia, ISM 2005, volume 2005, pages 515–522, 2005. (doi:10.1109/ISM.2005.119)
[81]
Jaydev Misra, Pinakpani Pal, and Aditya Bagchi. Spear: Design of a secured peer-to-peer architecture. In Information Systems Security, pages 322–327. Springer-Verlag, 2005. Lecture Notes in Computer Science 3803. (doi:10.1007/11593980_25)
[82]
Y. Mo, Y. Zhang, and X. Li. Research on the design principles of security protocol. Computer Engineering, 31(24):181–185, 2005. In Chinese.
[83]
Yong-Hyuk Moon, Byung-Sang Kim, and Chan-Hyun Youn. Design of P2P grid networking architecture using k-redundancy scheme based group peer concept. In Internet and Network Economics, pages 748–757. Springer-Verlag, 2005. Lecture Notes in Computer Science 3828. (doi:10.1007/11600930_75)
[84]
Bita Mortazavi and George Kesidis. A model of a reputation service for incentive engineering. Technical Report NAS-TR-0022-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July 2005.
[85]
J.L. Muñoz, J. Forné, O. Esparza, and M. Rey. Efficient certificate revocation system implementation: Huffman Merkle hash tree (HuffMHT). In 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus/05), pages 119–127. Springer Verlag, 2005. LNCS 3592.
[86]
Mor Naaman. Leveraging geo-referenced digital photographs. PhD thesis, Stanford University, 2005.
[87]
G.M.P. O'Hare, M.J. O'Grady, R.W. Collier, and S. Keegan. Agents as catalysts for mobile computing. In Paolo Bresciani, Paolo Giorgini, Brian Henderson-Sellers, Graham Low, and Michael Winikoff, editors, Agent-Oriented Information Systems II, 6th International Bi-Conference Workshop, AOIS 2004, Riga, Latvia, June 8, 2004 and New York, NY, USA, July 20, 2004, Revised Selected Papers, pages 182–197. Springer-Verlag, 2005. Lecture Notes in Computer Science 3508. (doi:10.1007/11426714_13)
[88]
Gregory M.P. O'Hare, M.J. O'Grady, R. Collier, S. Keegan, D. O'Kane, R. Tynan, and D. Marsh. Ambient intelligence through agile agents. In Ambient Intelligence for Scientific Discovery, pages 286–310. Springer-Verlag, 2005. Lecture Notes in Computer Science 3345. (doi:10.1007/b105582)
[89]
Y. Oyama, K. Onoue, and A. Yonezawa. Speculative security checks in sandboxing systems. In Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005, volume 2005, pages 111–116, 2005. (doi:10.1109/IPDPS.2005.408)
[90]
A. Pashalides. Interdomain user authentication and privacy. PhD thesis, Royal Holloway University of London, 2005.
[91]
W. Purwasih and Y. Nakamori. A diagramming technique for representation of integrated assessment models. In 4th International Conference on Environmental Informatics, ISEIS 2005, pages 211–217. International Society for Environmental Information Sciences, 2005.
[92]
P.A. Relf. Tool assisted identifier naming for improved software readability: an empirical study. In ISESE 2005: International Symposium on Empirical Software Engineering, pages 53–62, 2005. (doi:10.1109/ISESE.2005.1541814)
[93]
J. Reuning and P. Jones. Osprey: Peer-to-peer enabled content distribution. In Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, page 396, 2005.
[94]
T. Roscoe. 33. the PlanetLab platform. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3485 LNCS:567–629, 2005. (doi:10.1007/11530657-33)
[95]
J. Rountree, N. Rountree, A. Robins, and R. Hannah. Observations of student competency in a CS1 course. In Conferences in Research and Practice in Information Technology Series, volume 42, pages 145–149, 2005.
[96]
Janet Rountree, Nathan Rountree, Anthony Robins, and Robert Hannah. Observations of student competency in a CS1 course. In CRPIT '42: Proceedings of the 7th Australian conference on Computing education, pages 145–149, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc.
[97]
Carmine Sellitto. The impact of impermanent web-located citations: A study of 123 scholarly conference publications. Journal of the American Society for Information Science and Technology, 56(7):695–703, May 2005. (doi:10.1002/asi.20159)
[98]
Ali A. Nazari Shirehjini. PECO: 3D-based interaction with a UPnP meeting room. In A. Ferscha, R. Mayrhofer, T. Strang, C. Linnhoff-Popien, A. Dey, A. Butz, and A. Schmidt, editors, Advances in Pervasive Computing: Adjunct Proceedings of the Third International Conference on Pervasive Computing. Vol. 191, pages 105–108. Austrian Computer Society (OCG), May 2005.
[99]
S. Sidiroglou, J. Ioannidis, A. D. Keromytis, and Stolfo S.J. An email worm vaccine architecture. In Information Security Practice and Experience, pages 97–108. Springer Verlag, 2005. LNCS 3439.
[100]
S. Smith and R. Jamieson. Key factors in e-government information system security. In 18th Bled eConference: eIntegration in Action. Bled eCommerce Conference, 2005.
[101]
S. Smith. Key factors in egovernment information system security. In Proceedings of the 18th Bled eConference — eIntegration in Action, 2005.
[102]
K. Staring, O. Titlestad, and J. Gailis. Educational transformation through open source approaches. In Information Systems Research Seminar in Scandinavia (IRIS 28), April 2005.
[103]
H. Stuckenschmidt, W. Siberski, and W. Nejdl. Combining ontologies and peer-to-peer technologies for inter-organizational knowledge management. Learning Organization, 12(5):480–491, 2005. (doi:10.1108/09696470510611429)
[104]
Alex S. Taylor and Laurel Swan. Artful systems in the home. In CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 641–650, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1054972.1055060)
[105]
A.S. Taylor and L. Swan. Artful systems in the home. In Conference on Human Factors in Computing Systems, pages 641–650, 2005.
[106]
W. Teepe. Integrity and dissemination control in administrative applications through information designators. Computer Systems Science and Engineering, 20(5):377–386, 2005.
[107]
H. Toba. A tight flow control for job-shop fabrication lines with finite buffers. IEEE Transactions on Automation Science and Engineering, 2(1):78–83, 2005. (doi:10.1109/TASE.2004.829440)
[108]
M. Torchiano, F. Ricca, and P. Tonella. A comparative study on the re-documentation of existing software: Code annotations vs. drawing editors. In 2005 International Symposium on Empirical Software Engineering, ISESE 2005, pages 277–286, 2005. (doi:10.1109/ISESE.2005.1541836)
[109]
C.-M. Tsai, A. Qamra, E.Y. Chang, and Y.-F. Wang. EXTENT: Inferring image metadata from context and content. In IEEE International Conference on Multimedia and Expo, ICME 2005, volume 2005, pages 1270–1273, 2005. (doi:10.1109/ICME.2005.1521660)
[110]
T. Tsiakis and G. Stephanides. The concept of security and trust in electronic payments. Computers and Security, 24(1):10–15, 2005. (doi:10.1016/j.cose.2004.11.001)
[111]
B. Vassiliadis, J. Tsaknakis, L. Drossos, S. Sirmakessis, and K. Ioannou. Providing service standardisation for virtual enterprises. WSEAS Transactions on Circuits and Systems, 4(11):1545–1552, 2005.
[112]
Michael A. Veronin. One step forward, two steps back: The world wide web as an information resource. Pharmacy Education, 5(3–4):209–214, 2005. (doi:10.1080/15602210500330175)
[113]
K. Votis, B. Vassiliadis, J. Tsaknakis, A. Stefani, K. Ioannou, and L. Drossos. An architecture for mobile-health care service provision. WSEAS Transactions on Computers, 4(11):1502–1509, 2005.
[114]
T. Waring and P. Maddocks. Open source software implementation in the uk public sector: Evidence from the field and implications for the future. International Journal of Information Management, 25(5):411–428, 2005. (doi:10.1016/j.ijinfomgt.2005.06.002)
[115]
Matt Webster. Algebraic specification of computer viruses and their environments. In Peter Mosses, John Power, and Monika Seisenberger, editors, Selected Papers from the First Conference on Algebra and Coalgebra in Computer Science Young Researchers Workshop (CALCO-jnr 2005). University of Wales Swansea Computer Science Report Series CSR 18-2005, pages 99–113, 2005.
[116]
Peter Weiss, Matthias Rott, and Jurgen Weisheit. Facilitate successful cross-organisational business processes — a business case. In Paul Cunningham and Miriam Cunningham, editors, Innovation and the Knowledge Economy: Issues, Applications, Case Studies. IOS Press, Amsterdam, 2005.
[117]
David A. Wheeler. Countering trusting trust through diverse double-compiling. In 21st Annual Computer Security Applications Conference, December 2005.
[118]
G. O. Wimmel. Model-based Development of Security-Critical Systems. PhD thesis, Technische Universität München, June 2005.
[119]
Jonathan D. Wren. Open access and openly accessible: a study of scientific publications shared via the internet. British Medical Journal, 330(7500):1128–1131, 2005.
[120]
Yi Wu, Edward Y. Chang, and Belle L. Tseng. Multimodal metadata fusion using causal strength. In MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia, pages 872–881, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1101149.1101338)
[121]
X. Xu, V.V. Phoha, A. Ray, and S. Phoha. Supervisory control of malicious executables in software processes. Quantitative Measure for Discrete Event Supervisory Control, pages 239–259, 2005. (doi:10.1007/0-387-23903-0_9)
[122]
J.-S. Yin, F. Pinel, Y.-H. Liu, and T. Chieu. Pervasive computing technologies for retail in-store shopping. In Proceedings — International Conference on Pervasive Services, ICPS '05, volume 2005, pages 111–116, 2005. (doi:10.1109/PERSER.2005.1506399)
[123]
Yves Younan, Wouter Joosen, and Frank Piessens. A methodology for designing countermeasures against current and future code injection attacks. In Proceedings of the Third IEEE International Information Assurance Workshop 2005 (IWIA2005). IEEE, March 2005.
[124]
Andy Zaidman and Serge Demeyer. Mining ArgoUML with dynamic analysis to establish a set of key classes for program comprehension. In Proceedings of the 6th International Workshop on OO ReengineeringWorkshop on Challenges in Software Evolution, July 2005.
[125]
A. Zaidman, T. Calders, S. Demeyer, and J. Paredaens. Applying webmining techniques to execution traces to support the program comprehension process. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 134–142, 2005. (doi:10.1109/CSMR.2005.12)
[126]
Uwe Zdun. Concepts for model-driven design and evolution of domain-specific languages. In OOPSLA 2005—International Workshop on Software Factories, October 2005.
[127]
Zuo Z.H., Zhu Q.X., and Zhou M.T. On the time complexity of computer viruses. IEEE Transactions on Information Theory, 51(8):2962–2966, August 2005. (doi:10.1109/TIT.2005.851780)
[128]
C. Zhang and C. Phoebe. Mining inconsistent secure messages towards analyzing security protocols. International Journal of Intelligent Control and Systems, 10(1):77–85, 2005.
[129]
L. Zhang, J. Yin, and J. Long. Formal analysis of fairness of the ZG protocol. In P. Georgiadis, S. Gritzalis, and Y. Marias, editors, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 — Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU'05, pages 111–118, 2005.
[130]
M. Zhao. Performance Evaluation of Distributed security protocols using discrete event simulation. PhD thesis, Dartmouth College, 2005.
[131]
John Zimmerman and Kursat Fatih Ozenc. Exploring social relationships between smart homes and their occupants. In CHI 2005—W15: First International Workshop on Social Implications of Uniquitous Computing. ACM, April 2005.
[1]
M.A. Akbari, H. Takahashi, and M. Nakajima. Discerning advisor: An intelligent advertising system for clothes considering skin color. In Proceedings - 2005 International Conference on Cyberworlds, CW 2005, volume 2005, pages 202–209, 2005. (doi:10.1109/CW.2005.40)

[2]
M.W. Akhtar and M.-T. Kechadi. Dynamic load balancing of content requests in peer to peer systems. In S.Q. Zheng, editor, Parallel and Distributed Computing and Systems — PDCS 2005. ACTA Press, November 2005.

[3]
G. Alon, D.P. Kroese, T. Raviv, and R.Y. Rubinstein. Application of the cross-entropy method to the buffer allocation problem in a simulation-based environment. Annals of Operations Research, 134(1-4):137–151, 2005. (doi:10.1007/s10479-005-5728-8)

[4]
K.G. Anagnostakis and A.D. Keromytis. Action amplification: A new approach to scalable administration. In 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, volume 2, pages 862–867, 2005. (doi:10.1109/ICON.2005.1635629)

[5]
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In 14th USENIX Security Symposium, Berkeley, CA, August 2005. Usenix Association.

[6]
E. Anceaume, X. Defago, M. Gradinariu, and M. Roy. Towards a theory of self-organization. In Pierre Fraigniaud, editor, Distributed Computing: 19th International Conference (DISC 2005), pages 505–506. Springer-Verlag, September 2005. Lecture Notes in Computer Science 3724. (doi:10.1007/11561927_43)

[7]
Brent Auernjeimer and Max J. Tsai. Biometric authentication for web-based course examinations. In Proceedings of the 38th Hawaii Int. Conf. on System Sciences (HICSS-38) — Track 9, page 294b, January 2005. (doi:10.1109/HICSS.2005.120)

[8]
(Author names in Chinese). A security model of e-commerce based on internet agent. Microcomputer Applications, 21(1):4–16, 2005. In Chinese.

[9]
Charlie C. Baggett, Jr. and John J. Adams. Method, system and computer program product for assessing information security. United States Patent 6,925,443, August 2005. Assignee: SAFEOperations, Inc. (Columbia, MD).

[10]
Wolf-Tilo Balke. Information retrieval in peer-to-peer systems. In R. Steinmetz and K. Wehrle, editors, Peer-to-Peer Systems and Applications. Springer-Verlag, Berlin, 2005. Lecture Notes in Computer Science 3485.

[11]
M. Barrett and C. Thomborson. Using NGSCB to mitigate existing software threats. IFIP Advances in Information and Communication Technology, 177:55–74, 2005.

[12]
Matthew Frederick Barrett. Towards an open trusted computing framework. Master's thesis, The University of Auckland, February 2005.

[13]
P. Bellavista, A. Corradi, and E. Magistretti. REDMAN: An optimistic replication middleware for read-only resources in dense MANETs. Pervasive and Mobile Computing, 1(3):279–310, 2005. (doi:10.1016/j.pmcj.2005.06.002)

[14]
S. Bergamaschi, P. Bouquet, P. Ciaccia, and P. Merialdo. Speaking words of WISDOM: Web intelligent search based on DOMain ontologies. In CEUR Workshop Proceedings, volume 166, 2005.

[15]
S. Bistarelli, S.N. Foley, and B. O'Sullivan. A soft constraint-based approach to the cascade vulnerability problem. Journal of Computer Security, 13(5):699–720, 2005.

[16]
Jurgen Bitzer and Philipp J.H. Schroder. The impact of entry and competition by open source software on innovation activity. Industrial Organization 0512001, EconWPA, December 2005.

[17]
Alsberg B.K., Bjerke H., Navestad G.M., and Astrand P.O. GaussDal: An open source database management system for quantum chemical computations. Computer Physics Communications, 171(2):133–153, September 2005. (doi:10.1016/j.cpc.2005.04.008)

[18]
Silas S. Brown and Peter Robinson. Transformation frameworks and their relevance in universal design. Universal Access in the Information Society, 2005.

[19]
D.-W. Chen, B. Xu, Y.-R. Cai, and J.-Z. Li. P2P based web service discovery mechanism with bounding deployment and publication. Jisuanji Xuebao/Chinese Journal of Computers, 28(4):615–626, 2005.

[20]
Q. Chen, C. Zhang, and S. Zhang. ENDL: A logical framework for verifying secure transaction protocols. Knowledge and Information Systems, 7(1):84–109, 2005. (doi:10.1007/s10115-003-0127-4)

[21]
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant. Semantics-aware malware detection. In Proceedings — IEEE Symposium on Security and Privacy, pages 32–46, 2005.

[22]
G. Chroust. Mutual influences of society's paradigm and information and communication technologies. In 49th Annual Meeting of the International Society for the Systems Sciences 2005, ISSS 2005, pages 843–860, 2005.

[23]
Mihai Ciocarlie, Marcela-Simona Atanasoae, and Horia Ciocarlie. System of programs for rapid development and execution of Palm OS applications. Transactions on Engineering, Computing and Technology, 7:260–263, 2005.

[24]
Sam St. Clair-Ford, Mohamed Ould-Khaoua, and Lewis Mackenzie. The impact of network bandwidth on worm propagation. In Nigel Thomas, editor, 21st UK Performance Engineering Workshop, pages 21–29, Newcastle upon Tyne, UK, July 2005. University of Newcastle. Technical Report CS-TR-916.

[25]
A.J. Conover and Y.-T. Song. A framework for component mining of java applications via dynamic slicing. In Proceedings - Third ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2005, volume 2005, pages 40–47, 2005. (doi:10.1109/SERA.2005.7)

[26]
Paul A. Cronce. Method for runtime code integrity validation using code block checksums. United States Patent 6,880,149, April 2005. Assignee: Pace Anti-Piracy (San Jose, CA).

[27]
H. Dagdeviren, R. Juric, and T.A. Kassana. An exploratory study for effective COTS and OSS product marketing. In Proceedings of the International Conference on Information Technology Interfaces, ITI, pages 681–686, 2005. (doi:10.1109/ITI.2005.1491205)

[28]
Dominik Roman Christian Dahlem. Digital rights enforcement for pervasive computing applications. Master's thesis, University of Dublin, Trinity College, March 2005.

[29]
Raphael Y. de Camargo, Renato Cerqueira, and Fabio Kon. Strategies for storage of checkpointing data using non-dedicated repositories on grid systems. In MGC '05: Proceedings of the 3rd International Workshop on Middleware for Grid Computing, pages 1–6, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1101499.1101500)

[30]
Diego López de Ipiña, Iñaki Vázquez, Daniel García, Javier Fernández, and Iván García. A reflective middleware for controlling smart objects from mobile devices. In sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart objects and ambient intelligence, pages 213–218, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1107548.1107602)

[31]
V. Dimopoulos and S. Furnell. A protection profiles approach to risk analysis for small and medium enterprises. IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, 193:267–283, 2005.

[32]
Florin Dragan, Georges Gardarin, and Laurent Yeh. Routing XQuery in a P2P network using adaptable trie-indexes. In IADIS International Conference WWW/Internet, October 2005.

[33]
Gunther Eysenbach and Mathieu Trudel. Going, going, still there: Using the WebCite service to permanently archive cited web pages. Journal of Medical Internet Research, 7(5):e60, 2005. (doi:10.2196/jmir.7.5.e60)

[34]
S. Goel and D. Pon. Distribution of patches within vulnerable systems: A distributed model. In Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005, volume 2005, pages 458–460, 2005. (doi:10.1109/IAW.2005.1496000)

[35]
Daniel Gomes and Mário J. Silva. Characterizing a national community web. ACM Transactions on Internet Technology, 5(3):508–531, August 2005. (doi:10.1145/1084772.1084775)

[36]
Jesus M. González-Barahona, Gregorio Robles, and Israel Herraiz. Challenges in software evolution: the libre software perspective. In Workshop on Challenges in Software Evolution, pages 557–560, April 2005.

[37]
Georgios Gousios, Eyfthymia Aivaloglou, and Stefanos Gritzallis. Distributed component architectures security issues. Computer Standards & Interfaces, 27(3):269–284, March 2005. (doi:10.1016/j.csi.2004.08.003)

[38]
L.Z. Granville, D.M. da Rosa, A. Panisson, C. Melchiors, M. J. B. Almeida, and L. M. R. Tarouco. Managing computer networks using peer-to-peer technologies. IEEE Communications, 43(10):62–68, October 2005. (doi:10.1109/MCOM.2005.1522126)

[39]
M. Grechanik, D.E. Perry, and D. Batory. Using AOP to monitor and administer software for grid computing environments. In Proceedings — International Computer Software and Applications Conference, pages 241–248, 2005. (doi:10.1109/COMPSAC.2005.167)

[40]
Yann-Gaël Guéhéneuc. A theory of program comprehension — joining vision science and program comprehension. Technical Report 1267, University of Montreal, December 2005.

[41]
Leitao Guo, Shoubao Yang, Jing Wang, and Jinyang Zhou. Trust model based on similarity measure of vectors in p2p networks. In Grid and Cooperative Computing — GCC 2005, pages 836–847. Springer-Verlag, 2005. Lecture Notes in Computer Science 3795. (doi:10.1007/11590354_103)

[42]
A. Gupta and R. Hammond. Information systems security issues and decisions for small businesses: An empirical examination. Information Management and Computer Security, 13(4):297–310, June 2005. (doi:10.1108/09685220510614425)

[43]
Jin ha Kim. Design and Analysis of Cluster-Based Web Servers. PhD thesis, Pennsylvania State University, University Park, PA, 2005.

[44]
D. Hartmann. Computer simulation for contemporary problems in civil engineering. In Proceedings of the 2005 ASCE International Conference on Computing in Civil Engineering, pages 295–310, 2005.

[45]
R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and R. Campbell. A survey of peer-to-peer storage techniques for distributed file systems. In International Conference on Information Technology: Coding and Computing, ITCC, volume 2, pages 205–213, 2005.

[46]
M. Hussain, I. Hajjeh, H. Afifi, and D. Seret. Extending IKEv2 for multi-vendor home network environment. In The 7th International Conference on Advanced Communication Technology, ICACT 2005, volume 1, pages 63–68, 2005.

[47]
K. Iwasaki, K. Yamazawa, and N. Yokoya. An indexing system for photos based on shooting position and orientation with geographic database. In IEEE International Conference on Multimedia and Expo, ICME 2005, volume 2005, pages 390–393, 2005. (doi:10.1109/ICME.2005.1521442)

[48]
G. Janée and J. Frew. A hybrid declarative/procedural metadata mapping language based on Python. In Research and Advanced Technology for Digital Libraries, pages 302–313. Springer-Verlag, 2005. Lecture Notes in Computer Science 3652. (doi:10.1007/11551362_27)

[49]
R. Jantz and M.J. Giarlo. Digital preservation architecture and technology for trusted digital repositories. D-Lib Magazine, 11(6):350–373, 2005. (doi:10.1045/june2005-jantz)

[50]
Z. Jiliang, L. Xianxian, and L. Jianxin. A new taxonomy of attacks on security protocols and their security evaluation. Journal of Computer Research and Development, 42(7):1100–1107, 2005. In Chinese.

[51]
J. Jürjens. Secure systems development with UML. Springer Berlin Heidelberg, 2005. (doi:10.1007/b137706)

[52]
Ioanna Kantzavelou. A virtual lab model for an introductory computer science course. Facta Universitatis, Electrical Engineering Series, 18(2):263–274, August 2005.

[53]
Bilge Karabacak and Ibrahim Sogukpinar. ISRAM: information security risk analysis method. Computers & Security, 24(2):147–159, March 2005. (doi:10.1016/j.cose.2004.07.004)

[54]
Ajay K. Katangur and Yi Pan. Performance analysis of optical multistage interconnection networks with limited crosstalk. In 19th International Parallel and Distributed Processing Symposium (IPDPS 2005). IEEE Computer Society, April 2005. (doi:10.1109/IPDPS.2005.336)

[55]
T. Kathiravelu and A. Pears. Approaches to P2P internet application development. In Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services, ICAS/ICNS 2005, volume 2005, page 38, 2005. (doi:10.1109/ICAS-ICNS.2005.25)

[56]
G.S. Kc and A.D. Keromytis. e-NeXSh: Achieving an effectively non-executable stack and heap via system-call policing. In Proceedings — Annual Computer Security Applications Conference, ACSAC, volume 2005, pages 286–300, 2005. (doi:10.1109/CSAC.2005.22)

[57]
D.J. Kim, Y.I. Song, S.B. Braynov, and H.R. Rao. A multidimensional trust formation model in B-to-C e-commerce: A conceptual framework and content analyses of academia/practitioner perspectives. Decision Support Systems, 40(2):143–165, 2005. (doi:10.1016/j.dss.2004.01.006)

[58]
J.-H. Kim, G.S. Choi, and C.R. Das. A load balancing scheme for cluster-based secure network servers. In ICCC 2005: IEEE International Conference on Cluster Computing, 2005. (doi:10.1109/CLUSTR.2005.347056)

[59]
Jin-Ha Kim, Gyu Sang Choi, and Chita Das. A load balancing scheme for cluster-based secure network servers. In IEEE International Conference on Cluster Computing, 2005.

[60]
Paul Klint, Ralf Lämmel, and Chris Verhoef. Towards an Engineering Discipline for Grammarware. ACM Transactions on Software Engineering Methodology, 14(3):331–380, July 2005. (doi:10.1145/1072997.1073000)

[61]
S. Koch and C. Neumann. Evaluation and estimate of costs in the integration of open source software components. In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 1, pages 91–95, 2005.

[62]
H. König. Peer-to-peer intrusion detection systems for the protection of sensitive IT infrastructures. In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), volume 2, pages 638–642, 2005.

[63]
Dionysios Konstantinos Kostoulas. Distributed reputation-based mechanisms for trust propagation in large groups. Master's thesis, University of Illinois at Urbana-Champaign, Urbana, IL, 2005.

[64]
Rajeev Kumar, Amit Gupta, B. S. Pankaj, Mrinmoy Ghosh, and P. P. Chakrabarti. Post-compilation optimization for multiple gains with pattern matching. SIGPLAN Notices, 40(12):14–23, December 2005. (doi:10.1016/j.jcis.2004.09.063)

[65]
J.D. Kushkowski. Web citation by graduate students: A comparison of print and electronic theses. Portal, 5(2):259–276, 2005.

[66]
L.-C. Lam and T.-C. Chiueh. Automatic extraction of accurate application-specific sandboxing policy. In IEEE Military Communications Conference MILCOM, volume 2005, 2005. (doi:10.1109/MILCOM.2005.1605766)

[67]
M. Lesk. Understanding Digital Libraries. Elsevier Inc., 2005.

[68]
Chi-Chia Lin and Ming-Syan Chen. On controlling digital TV set-top-box by mobile devices via IP network. In Seventh IEEE International Symposium on Multimedia (ISM'05), pages 52–59, 2005. (doi:10.1109/ISM.2005.85)

[69]
K.-J. Lin, T. Yu, and C.-Y. Shih. The design of a personal and intelligent pervasive-commerce system architecture. In 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05, pages 163–172, 2005. (doi:10.1109/WMCS.2005.25)

[70]
Jun Liu, Khiang Wee Lim, Weng Khuen Ho, Kay Chen Tan, Arthur Tay, and Rajagopalan Srinivasan. Using the OPC standard for real-time process monitoring and control. IEEE Software, 22(6):54–59, November/December 2005. (doi:10.1109/MS.2005.168)

[71]
A. Löser, S. Staab, and C. Tempich. Semantic methods for p2p query routing. In T. Eymann, F. Klügl, W. Lamersdorf, M. Klusch, and M.N. Huhns, editors, Multiagent System Technologies—MATES 2005, pages 15–26, Berlin, September 2005. Springer Verlag. Lecture Notes in Artificial Intelligence 3550.

[72]
Alexander Löser, Christoph Tempich, Bastian Quilitz, Wolf-Tilo Balke, Steffen Staab, and Wolfgang Nejdl. Searching dynamic communities with personal indexes. In Yolanda Gil, Enrico Motta, V. Richard Benjamins, and Mark A. Musen, editors, The Semantic Web — ISWC 2005: 4th International Semantic Web Conference, pages 491–505, Berlin, November 2005. Springer-Verlag. Lecture Notes in Computer Science 3729.

[73]
T. Lu, Z.-S. Li, and Y.-B. Wu. GSM: A new computing paradigm based on OGSA. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 29(2):149–152, 157, 2005.

[74]
T. Lu, Z.-S. Li, C.-L. Xu, X.-M. Huang, N.-J. Tang, and Y.-Y. Xiong. FGSM: A framework for grid service mining. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 37(2):86–92, 2005.

[75]
Moreno Marzolla, Matteo Mordacchini, and Salvatore Orlando. Resource discovery in a dynamic grid environment. In 16th International Workshop on Database and Expert Systems Applications (DEXA'05), pages 356–360. IEEE Computer Society, August 2005. (doi:10.1109/DEXA.2005.166)

[76]
Bill McCloskey and Eric Brewer. ASTEC: a new approach to refactoring C. In ESEC/FSE-13: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 21–30, New York, 2005. ACM Press. (doi:10.1145/1081706.1081712)

[77]
Luis Rodero Merino, Luis López, Antonio Fernández, and Vicent Cholvi. DANTE: Self-adaptable unstructured peer-to-peer networks. Reports on Systems and Communications, V(12), July 2005.

[78]
Marjan Mernik, Jan Heering, and Anthony M. Sloane. When and how to develop domain-specific languages. ACM Computing Surveys, 37(4):316–344, 2005. (doi:10.1145/1118890.1118892)

[79]
D. Millć, M. Brogle, and T. Braun. Video broadcasting using overlay multicast. In Proceedings — Seventh IEEE International Symposium on Multimedia, ISM 2005, volume 2005, pages 515–522, 2005. (doi:10.1109/ISM.2005.119)

[80]
Jaydev Misra, Pinakpani Pal, and Aditya Bagchi. Spear: Design of a secured peer-to-peer architecture. In Information Systems Security, pages 322–327. Springer-Verlag, 2005. Lecture Notes in Computer Science 3803. (doi:10.1007/11593980_25)

[81]
Y. Mo, Y. Zhang, and X. Li. Research on the design principles of security protocol. Computer Engineering, 31(24):181–185, 2005. In Chinese.

[82]
Yong-Hyuk Moon, Byung-Sang Kim, and Chan-Hyun Youn. Design of P2P grid networking architecture using k-redundancy scheme based group peer concept. In Internet and Network Economics, pages 748–757. Springer-Verlag, 2005. Lecture Notes in Computer Science 3828. (doi:10.1007/11600930_75)

[83]
Bita Mortazavi and George Kesidis. A model of a reputation service for incentive engineering. Technical Report NAS-TR-0022-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July 2005.

[84]
J.L. Muñoz, J. Forné, O. Esparza, and M. Rey. Efficient certificate revocation system implementation: Huffman Merkle hash tree (HuffMHT). In 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus/05), pages 119–127. Springer Verlag, 2005. LNCS 3592.

[85]
Mor Naaman. Leveraging geo-referenced digital photographs. PhD thesis, Stanford University, 2005.

[86]
G.M.P. O'Hare, M.J. O'Grady, R.W. Collier, and S. Keegan. Agents as catalysts for mobile computing. In Paolo Bresciani, Paolo Giorgini, Brian Henderson-Sellers, Graham Low, and Michael Winikoff, editors, Agent-Oriented Information Systems II, 6th International Bi-Conference Workshop, AOIS 2004, Riga, Latvia, June 8, 2004 and New York, NY, USA, July 20, 2004, Revised Selected Papers, pages 182–197. Springer-Verlag, 2005. Lecture Notes in Computer Science 3508. (doi:10.1007/11426714_13)

[87]
Gregory M.P. O'Hare, M.J. O'Grady, R. Collier, S. Keegan, D. O'Kane, R. Tynan, and D. Marsh. Ambient intelligence through agile agents. In Ambient Intelligence for Scientific Discovery, pages 286–310. Springer-Verlag, 2005. Lecture Notes in Computer Science 3345. (doi:10.1007/b105582)

[88]
Y. Oyama, K. Onoue, and A. Yonezawa. Speculative security checks in sandboxing systems. In Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005, volume 2005, pages 111–116, 2005. (doi:10.1109/IPDPS.2005.408)

[89]
A. Pashalides. Interdomain user authentication and privacy. PhD thesis, Royal Holloway University of London, 2005.

[90]
P.A. Relf. Tool assisted identifier naming for improved software readability: an empirical study. In ISESE 2005: International Symposium on Empirical Software Engineering, pages 53–62, 2005. (doi:10.1109/ISESE.2005.1541814)

[91]
J. Reuning and P. Jones. Osprey: Peer-to-peer enabled content distribution. In Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, page 396, 2005.

[92]
T. Roscoe. 33. the PlanetLab platform. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3485 LNCS:567–629, 2005. (doi:10.1007/11530657-33)

[93]
J. Rountree, N. Rountree, A. Robins, and R. Hannah. Observations of student competency in a CS1 course. In Conferences in Research and Practice in Information Technology Series, volume 42, pages 145–149, 2005.

[94]
Janet Rountree, Nathan Rountree, Anthony Robins, and Robert Hannah. Observations of student competency in a CS1 course. In CRPIT '42: Proceedings of the 7th Australian conference on Computing education, pages 145–149, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc.

[95]
Carmine Sellitto. The impact of impermanent web-located citations: A study of 123 scholarly conference publications. Journal of the American Society for Information Science and Technology, 56(7):695–703, May 2005. (doi:10.1002/asi.20159)

[96]
Ali A. Nazari Shirehjini. PECO: 3D-based interaction with a UPnP meeting room. In A. Ferscha, R. Mayrhofer, T. Strang, C. Linnhoff-Popien, A. Dey, A. Butz, and A. Schmidt, editors, Advances in Pervasive Computing: Adjunct Proceedings of the Third International Conference on Pervasive Computing. Vol. 191, pages 105–108. Austrian Computer Society (OCG), May 2005.

[97]
S. Sidiroglou, J. Ioannidis, A. D. Keromytis, and Stolfo S.J. An email worm vaccine architecture. In Information Security Practice and Experience, pages 97–108. Springer Verlag, 2005. LNCS 3439.

[98]
S. Smith. Key factors in egovernment information system security. In Proceedings of the 18th Bled eConference — eIntegration in Action, 2005.

[99]
K. Staring, O. Titlestad, and J. Gailis. Educational transformation through open source approaches. In Information Systems Research Seminar in Scandinavia (IRIS 28), April 2005.

[100]
H. Stuckenschmidt, W. Siberski, and W. Nejdl. Combining ontologies and peer-to-peer technologies for inter-organizational knowledge management. Learning Organization, 12(5):480–491, 2005. (doi:10.1108/09696470510611429)

[101]
Alex S. Taylor and Laurel Swan. Artful systems in the home. In CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 641–650, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1054972.1055060)

[102]
A.S. Taylor and L. Swan. Artful systems in the home. In Conference on Human Factors in Computing Systems, pages 641–650, 2005.

[103]
W. Teepe. Integrity and dissemination control in administrative applications through information designators. Computer Systems Science and Engineering, 20(5):377–386, 2005.

[104]
H. Toba. A tight flow control for job-shop fabrication lines with finite buffers. IEEE Transactions on Automation Science and Engineering, 2(1):78–83, 2005. (doi:10.1109/TASE.2004.829440)

[105]
M. Torchiano, F. Ricca, and P. Tonella. A comparative study on the re-documentation of existing software: Code annotations vs. drawing editors. In 2005 International Symposium on Empirical Software Engineering, ISESE 2005, pages 277–286, 2005. (doi:10.1109/ISESE.2005.1541836)

[106]
C.-M. Tsai, A. Qamra, E.Y. Chang, and Y.-F. Wang. EXTENT: Inferring image metadata from context and content. In IEEE International Conference on Multimedia and Expo, ICME 2005, volume 2005, pages 1270–1273, 2005. (doi:10.1109/ICME.2005.1521660)

[107]
T. Tsiakis and G. Stephanides. The concept of security and trust in electronic payments. Computers and Security, 24(1):10–15, 2005. (doi:10.1016/j.cose.2004.11.001)

[108]
B. Vassiliadis, J. Tsaknakis, L. Drossos, S. Sirmakessis, and K. Ioannou. Providing service standardisation for virtual enterprises. WSEAS Transactions on Circuits and Systems, 4(11):1545–1552, 2005.

[109]
Michael A. Veronin. One step forward, two steps back: The world wide web as an information resource. Pharmacy Education, 5(3–4):209–214, 2005. (doi:10.1080/15602210500330175)

[110]
K. Votis, B. Vassiliadis, J. Tsaknakis, A. Stefani, K. Ioannou, and L. Drossos. An architecture for mobile-health care service provision. WSEAS Transactions on Computers, 4(11):1502–1509, 2005.

[111]
T. Waring and P. Maddocks. Open source software implementation in the uk public sector: Evidence from the field and implications for the future. International Journal of Information Management, 25(5):411–428, 2005. (doi:10.1016/j.ijinfomgt.2005.06.002)

[112]
Matt Webster. Algebraic specification of computer viruses and their environments. In Peter Mosses, John Power, and Monika Seisenberger, editors, Selected Papers from the First Conference on Algebra and Coalgebra in Computer Science Young Researchers Workshop (CALCO-jnr 2005). University of Wales Swansea Computer Science Report Series CSR 18-2005, pages 99–113, 2005.

[113]
Peter Weiss, Matthias Rott, and Jurgen Weisheit. Facilitate successful cross-organisational business processes — a business case. In Paul Cunningham and Miriam Cunningham, editors, Innovation and the Knowledge Economy: Issues, Applications, Case Studies. IOS Press, Amsterdam, 2005.

[114]
David A. Wheeler. Countering trusting trust through diverse double-compiling. In 21st Annual Computer Security Applications Conference, December 2005.

[115]
G. O. Wimmel. Model-based Development of Security-Critical Systems. PhD thesis, Technische Universität München, June 2005.

[116]
Jonathan D. Wren. Open access and openly accessible: a study of scientific publications shared via the internet. British Medical Journal, 330(7500):1128–1131, 2005.

[117]
Yi Wu, Edward Y. Chang, and Belle L. Tseng. Multimodal metadata fusion using causal strength. In MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia, pages 872–881, New York, NY, USA, 2005. ACM Press. (doi:10.1145/1101149.1101338)

[118]
X. Xu, V.V. Phoha, A. Ray, and S. Phoha. Supervisory control of malicious executables in software processes. Quantitative Measure for Discrete Event Supervisory Control, pages 239–259, 2005. (doi:10.1007/0-387-23903-0_9)

[119]
J.-S. Yin, F. Pinel, Y.-H. Liu, and T. Chieu. Pervasive computing technologies for retail in-store shopping. In Proceedings — International Conference on Pervasive Services, ICPS '05, volume 2005, pages 111–116, 2005. (doi:10.1109/PERSER.2005.1506399)

[120]
Yves Younan, Wouter Joosen, and Frank Piessens. A methodology for designing countermeasures against current and future code injection attacks. In Proceedings of the Third IEEE International Information Assurance Workshop 2005 (IWIA2005). IEEE, March 2005.

[121]
Andy Zaidman and Serge Demeyer. Mining ArgoUML with dynamic analysis to establish a set of key classes for program comprehension. In Proceedings of the 6th International Workshop on OO ReengineeringWorkshop on Challenges in Software Evolution, July 2005.

[122]
A. Zaidman, T. Calders, S. Demeyer, and J. Paredaens. Applying webmining techniques to execution traces to support the program comprehension process. In Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, pages 134–142, 2005. (doi:10.1109/CSMR.2005.12)

[123]
Uwe Zdun. Concepts for model-driven design and evolution of domain-specific languages. In OOPSLA 2005—International Workshop on Software Factories, October 2005.

[124]
Zuo Z.H., Zhu Q.X., and Zhou M.T. On the time complexity of computer viruses. IEEE Transactions on Information Theory, 51(8):2962–2966, August 2005. (doi:10.1109/TIT.2005.851780)

[125]
C. Zhang and C. Phoebe. Mining inconsistent secure messages towards analyzing security protocols. International Journal of Intelligent Control and Systems, 10(1):77–85, 2005.

[126]
L. Zhang, J. Yin, and J. Long. Formal analysis of fairness of the ZG protocol. In P. Georgiadis, S. Gritzalis, and Y. Marias, editors, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 — Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU'05, pages 111–118, 2005.

[127]
M. Zhao. Performance Evaluation of Distributed security protocols using discrete event simulation. PhD thesis, Dartmouth College, 2005.

[128]
John Zimmerman and Kursat Fatih Ozenc. Exploring social relationships between smart homes and their occupants. In CHI 2005—W15: First International Workshop on Social Implications of Uniquitous Computing. ACM, April 2005.