[1]
C. Abalde, V.M. Gulıas, and L.M. Castro. Efficient discovery of widely distributed and non-volatile resources on DHTs. In 3rd International Conference on Internet and Web Applications and Services, ICIW 2008, pages 370–376, 2008. (doi:10.1109/ICIW.2008.19)
[2]
M. Abdelouahab, H.R. Hassen, A. Bouabdallah, M. Achemlal, and S. Laniepce. TCA: Topology change attack in peer-to-peer networks. In Workshop on Mobile and Wireless Networks Security, MWNS 2008, pages 13–25, 2008.
[3]
A. Abraham, Y. Badr, H. Liu, and C. Grosan. A multi-swarm approach for neighbor selection in peer-to-peer networks. In 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, CSTST '08 - Proceedings, pages 178–184, 2008. (doi:10.1145/1456223.1456263)
[4]
J. Abu Qudeiri, H. Yamamoto, R. Ramli, and A. Jamali. Genetic algorithm for buffer size and work station capacity in serial-parallel production lines. Artificial Life and Robotics, 12(1-2):102–106, 2008. (doi:10.1007/s10015-007-0449-5)
[5]
B. Adams, B. Van Rompaey, C. Gibbs, and Y. Coady. Aspect mining in the presence of the C preprocessor. In Proceedings of the 4th Linking Aspect Technology and Evolution Workshop, LATE'08 — held at the 7th International Conference on Aspect-Oriented Software Development, 2008. (doi:10.1145/1404953.1404954)
[6]
A. Aikebaier, T. Enokido, and M. Takizawa. A distributed coordination protocol in an order-heterogeneous group. International Journal of Web and Grid Services, 4(1):5–23, 2008. (doi:10.1504/IJWGS.2008.018486)
[7]
M.D. Aime, P.C. Pomi, and M. Vallini. Policy-driven system configuration for dependability. In Proceedings — 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys., pages 420–425, 2008. (doi:10.1109/SECURWARE.2008.54)
[8]
C.E. Alexakos, K.I. Paraskevopoulos, K.V. Votis, and S.D. Likothanassis. Ontology-supported indexing in P2P networks of digital libraries. International Journal of Web Engineering and Technology, 4(1):44–69, 2008. (doi:10.1504/IJWET.2008.016104)
[9]
Y. Alkabani and F. Koushanfar. Designer's hardware Trojan horse. In HOST 2008: IEEE International Workshop on Hardware-Oriented Security and Trust, pages 82–83, 2008. (doi:10.1109/HST.2008.4559059)
[10]
Ghazi I. Alkhatib and David C. Rine. Preface. In Agent Technologies and Web Engineering: Applications and Systems, pages xv–xvii. IGI Global, 2008. (doi:10.4018/978-1-60566-618-1)
[11]
S. Alshattnawi, G. Canals, and P. Molli. Concurrency awareness in a P2P wiki system. In 2008 International Symposium on Collaborative Technologies and Systems, CTS'08, pages 285–294, 2008. (doi:10.1109/CTS.2008.4543942)
[12]
S. Apel, T. Leich, and G. Saake. Aspectual feature modules. IEEE Transactions on Software Engineering, 34(2):162–180, 2008. (doi:10.1109/TSE.2007.70770)
[13]
Yves Barlette and Vladislav V. Fomin. Exploring the suitability of is security management standards for smes. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences, pages 308–308, 2008. (doi:10.1109/HICSS.2008.167)
[14]
S.J. Barr, S.J. Cardman, and D.M. Martin Jr. A boosting ensemble for the recognition of code sharing in malware. Journal in Computer Virology, 4(4):335–345, 2008. (doi:10.1007/s11416-008-0087-z)
[15]
L. Becchetti, U. Colesanti, A. Marchetti-Spaccamela, and A. Vitaletti. Self-adaptive recommendation systems: Models and experimental analysis. In Proceedings - 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2008, pages 479–480, 2008. (doi:10.1109/SASO.2008.55)
[16]
S.M. Bellovin, M. Blaze, W. Diffie, S. Landau, P.G. Neumann, and J. Rexford. Risking communications security: Potential hazards of the Protect America Act. IEEE Security and Privacy, 6(1):24–33, 2008. (doi:10.1109/MSP.2008.17)
[17]
P. Benou and V. Bitos. Developing mobile commerce applications. Journal of Electronic Commerce in Organizations, 6(1):63–78, 2008.
[18]
A.M. Bernardos, P. Tarrıo, J. Iglesias, and J.R. Casar. Diseño y despliegue de servicios móviles basados en contexto: Un caso de estudio. In 3rd Iberian Conference on Information Systems and Technologies, CISTI 2008, 2008.
[19]
A. Bonifati, P.K. Chrysanthis, A.M. Ouksel, and K.-U. Sattler. Distributed databases and peer-to-peer databases: Past and present. SIGMOD Record, 37(1):5–11, 2008. (doi:10.1145/1374780.1374781)
[20]
E. Borcoci, A. Pinto, A. Mehaoua, L. Fang, and N. Wang. Resource management and signalling architecture of a hybrid multicast service for multimedia distribution. Lecture Notes in Computer Science, 5274 LNCS:39–51, 2008. (doi:10.1007/978-3-540-87359-4-5)
[21]
J.-M. Borello and L. Mé. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, 4(3):211–220, 2008. (doi:10.1007/s11416-008-0084-2)
[22]
S. Bryton and F.B.E. Abreu. Modularity-oriented refactoring. In CSMR 2008: Proceedings of the European Conference on Software Maintenance and Reengineering, pages 294–297, 2008. (doi:10.1109/CSMR.2008.4493330)
[23]
K.R.B. Butler, S. McLaughlin, and P.D. McDaniel. Rootkit-resistant disks. In Proceedings of the ACM Conference on Computer and Communications Security, pages 403–415, 2008. (doi:10.1145/1455770.1455821)
[24]
D. Cabanillas and S. Willmott. Studying viable free markets in peer-to-peer file exchange applications without altruistic agents. In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC 2006, pages 151–158, May 2008. Lecture Notes in Computer Science 4461. (doi:10.1007/978-3-540-79705-0_14)
[25]
B. Can, A. Beham, and C. Heavey. A comparative study of genetic algorithm components in simulation-based optimisation. In Winter Simulation Conference, pages 1829–1837, 2008. (doi:10.1109/WSC.2008.4736272)
[26]
G. Canals, P. Molli, J. Maire, S. Lauriére, E. Pacitti, and M. Tlili. XWiki concerto: A P2P wiki system supporting disconnected work. In Cooperative Design, Visualization, and Engineering. 5th International Conference, CDVE 2008, pages 98–106, September 2008. Lecture Notes in Computer Science 5520. (doi:10.1007/978-3-540-88011-0_13)
[27]
D.A. Carrington. What can software engineering students learn from studying open source software? International Journal of Engineering Education, 24(4):729–737, 2008.
[28]
A.L. Carvalho, M. Mendes, P. Pinheiro, and E. Furtado. Analysis of the interaction design for mobile TV applications based on multicriteria. IFIP TC 8 WG 8.9 International Conference on Research and Practical lssues of Enterprise Information Systems, CONFENIS 2007, 254 VOLUME 1:389–394, 2008.
[29]
M. Cassell. Why governments innovate: Adoption and implementation of open source software by four European cities. International Public Management Journal, 11(2):193–213, 2008. (doi:10.1080/10967490802095680)
[30]
M.F. Casserly and J.E. Bird. Web citation availability. Library Resources and Technical Services, 52(1):42–53, 2008.
[31]
E.-C. Chang and J. Xu. Remote integrity check with dishonest storage server. In Computer Security — ESORICS 2008: 13th European Symposium on Research in Computer Security, pages 223–237, October 2008. Lecture Notes in Computer Science 5283. (doi:10.1007/978-3-540-88313-5-15)
[32]
G. Chen, M. Li, and D. Kotz. Data-centric middleware for context-aware pervasive computing. Pervasive and Mobile Computing, 4(2):216–253, 2008. (doi:10.1016/j.pmcj.2007.10.001)
[33]
G. Chen, C.P. Low, and Z. Yang. Coordinated services provision in peer-to-peer environments. IEEE Transactions on Parallel and Distributed Systems, 19(4):433–446, 2008. (doi:10.1109/TPDS.2007.70745)
[34]
G. Chen, C.P. Low, and Z. Yang. Enhancing search performance in unstructured P2P networks based on users' common interest. IEEE Transactions on Parallel and Distributed Systems, 19(6):821–836, 2008. (doi:10.1109/TPDS.2008.42)
[35]
Q. Chen, S. Zhang, and Y.-P.P. Chen. Rule-based dependency models for security protocol analysis. Integrated Computer-Aided Engineering, 15(4):369–380, 2008.
[36]
Qingfeng Chen, Chengqi Zhang, and Shichao Zhang. Secure Transaction Protocol Analysis: Models and Applications. Springer-Verlag, 2008. Lecture Notes in Computer Science 5111. (doi:10.1007/978-3-540-85074-8_1)
[37]
W. Chen, J. Li, J. Ma, R. Conradi, J. Ji, and C. Liu. An empirical study on software development with open source components in the Chinese software industry. Software Process Improvement and Practice, 13(1):89–100, 2008. (doi:10.1002/spip.361)
[38]
S.-F. Chiang, C.-H. Wu, and S.-D. Wang. An active index diffusion scheme for multilayer unstructured peer-to-peer networks. In ICCCAS 2007 - International Conference on Communications, Circuits and Systems 2007, pages 424–430, 2008. (doi:10.1109/ICCCAS.2007.6251600)
[39]
J. Cho, J.S. Young, and J. Ryu. A new content-related advertising model for interactive television. In IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2008, Broadband Multimedia Symposium 2008, BMSB, 2008. (doi:10.1109/ISBMSB.2008.4536639)
[40]
L.-D. Chou, H.-H. Liang, S.-K. Chen, Y.-S. Wang, C.-N. Yang, and M. Chen. P2p-based distributed qos monitoring systems. Journal of Internet Technology, 9(2):153–159, 2008.
[41]
S. Chung, E. Kim, and J.C.L. Liu. A storage saving scheme to share HD-quality content in community networks. IEEE Transactions on Consumer Electronics, 54(4):1730–1738, 2008. (doi:10.1109/TCE.2008.4711227)
[42]
J.P. Correia and J. Visser. Benchmarking technical quality of software products. In Working Conference on Reverse Engineering, WCRE, pages 297–300, 2008. (doi:10.1109/WCRE.2008.16)
[43]
S. Counsell. Is the need to follow chains a possible deterrent to certain refactorings and an inducement to others? In Proceedings of the 2nd International Conference on Research Challenges in Information Science, RCIS 2008, pages 111–122, 2008. (doi:10.1109/RCIS.2008.4632099)
[44]
F.R.B. Cruz, A.R. Duarte, and T. van Woensel. Buffer allocation in general single-server queueing networks. Computers and Operations Research, 35(11):3581–3598, 2008. (doi:10.1016/j.cor.2007.03.004)
[45]
M. Czyrnek, E. Kuśmierek, C. Mazurek, and M. Stroiński. New services for iTVP content providers to manage live and on-demand content streaming. In Proceedings - 4th International Conference on Automated Solutions for Cross Media Content and Multi-Channel Distribution, Axmedis 2008, pages 180–186, 2008. (doi:10.1109/AXMEDIS.2008.28)
[46]
I. Dacosta, N. Mehta, E. Metrock, and J. Giffin. Security analysis of an IP phone: Cisco 7960G. In IPTComm 2008: Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks — Second International Conference, pages 236–255, July 2008. Lecture Notes in Computer Science 5310. (doi:10.1007/978-3-540-89054-6-12)
[47]
A. D'Aguanno and G. Haus. Audio fingerprint and its applications to peer-to-peer systems. In Audio Engineering Society - 124th Audio Engineering Society Convention 2008, volume 1, pages 86–94, 2008.
[48]
A. Davis. Enterprise resource planning under open source software. Enterprise Resource Planning for Global Economies: Managerial Issues and Challenges, pages 56–76, 2008. (doi:10.4018/978-1-59904-531-3.ch004)
[49]
E.C. De Almeida, G. Sunyé, Y.L. Traon, and P. Valduriez. A framework for testing peer-to-peer systems. In Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pages 167–176, 2008. (doi:10.1109/ISSRE.2008.42)
[50]
J. De Boever. Peer-to-peer content distribution an analysis of the internal and external potentials and obstacles. In WEBIST 2008 - 4th International Conference on Web Information Systems and Technologies, Proceedings, volume 2, pages 367–377, 2008.
[51]
O. De Moor, D. Sereni, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, and J. Tibble. Ql: Object-oriented queries made easy. In Generative and Transformational Techniques in Software Engineering II: International Summer School, GTTSE 2007, pages 78–133, July 2008. Lecture Notes in Computer Science 5235. (doi:10.1007/978-3-540-88643-3_3)
[52]
J.S. De Oliveira Neto and V.F.M. Salvador. Non-functional requirements to voice user interface on interactive television: An initial study. In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information Systems; Proceedings of Interfaces and Human Computer Interaction 2008, pages 77–84, 2008.
[53]
I. De Rezende and F. Siqueira. XOP: Sharing XML data objects through peer-to-peer networks. In AINA 2008: International Conference on Advanced Information Networking and Applications, pages 1021–1027, 2008. (doi:10.1109/AINA.2008.37)
[54]
H. de Vries, H. de Vries, and I. Oshri. Standards-battles in open source software: The case of firefox. Palgrave Macmillan, 2008. (doi:10.1057/9780230595095)
[55]
L. Demir and S. Tunali. A new approach for optimal buffer allocation in unreliable production lines. In 38th International Conference on Computers and Industrial Engineering 2008, volume 2, pages 1962–1970, 2008.
[56]
G.I. Doukidis, K. Pramatari, and G. Lekakos. OR and the management of electronic services. European Journal of Operational Research, 187(3):1296–1309, 2008. (doi:10.1016/j.ejor.2006.09.014)
[57]
G. Exarchakos and N. Antonopoulos. Non-replicable reusable resources discovery on scale-free peer-to-peer networks. In 2nd IEEE International Conference on Digital Ecosystems and Technologies, IEEE-DEST 2008, pages 28–33, 2008. (doi:10.1109/DEST.2008.4635188)
[58]
M.E. Falagas, E.A. Karveli, and V.I. Tritsaroli. The risk of using the internet as reference resource: A comparative study. International Journal of Medical Informatics, 77(4):280–286, 2008. (doi:10.1016/j.ijmedinf.2007.07.001)
[59]
S. Fenz, A. Ekelhart, and E. Weippl. Fortification of IT security by automatic security advisory processing. In AINA 2008: International Conference on Advanced Information Networking and Applications, pages 575–582, 2008. (doi:10.1109/AINA.2008.69)
[60]
O. Ferrer-Roca, F. Marcano, and A. Diaz-Cardama. Quality labels for e-health. IET Communications, 2(2):202–207, 2008. (doi:10.1049/iet-com:20060596)
[61]
N. Folinas, P. Vassiliadis, E. Pitouri, E. Papapetrou, and A. Zarras. Context-aware query processing in ad-hoc environments of peers. Journal of Electronic Commerce in Organizations, 6(1):38–62, 2008.
[62]
G. Fortino and W. Russo. Using P2P, GRID and agent technologies for the development of content distribution networks. Future Generation Computer Systems, 24(3):180–190, 2008. (doi:10.1016/j.future.2007.06.007)
[63]
G. Frantzeskou, S. MacDonell, E. Stamatatos, and S. Gritzalis. Examining the significance of high-level programming features in source code author classification. Journal of Systems and Software, 81(3):447–460, 2008. (doi:10.1016/j.jss.2007.03.004)
[64]
M. Freiberger and S. Huq. Network element security in optical communications equipment. In National Fiber Optic Engineers Conference, NFOEC 2008. Optical Society of America, 2008.
[65]
E.S. Furtado and V. Furtado. A multi-disciplinary strategy for identifying affective usability aspects in educational geosimulation systems. International Journal of Information and Communication Technology Education, 4(1):15–24, 2008.
[66]
A.E. Garcıa, A. Berl, K.A. Hummel, R. Weidlich, A. Houyou, K.D. Hackbarth, H. De Meer, and H. Hlavacs. An economical cost model for fair resource sharing in virtual home environments. In 4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings, pages 153–160, 2008. (doi:10.1109/NGI.2008.27)
[67]
M. Garuba, C. Liu, and N. Washington. A comparative analysis of anti-malware software, patch management, and host-based firewalls in preventing malware infections on client computers. In Proceedings — International Conference on Information Technology: New Generations, ITNG 2008, pages 628–632, 2008. (doi:10.1109/ITNG.2008.233)
[68]
M. Gegick, L. Williams, J. Osborne, and M. Vouk. Prioritizing software security fortification through code-level metrics. In Proceedings of the ACM Conference on Computer and Communications Security, pages 31–37, 2008. (doi:10.1145/1456362.1456370)
[69]
R. Gelbard. Decision rule for investment in frameworks of reuse. In Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, pages 140–147. IGI Global, 2008. (doi:10.4018/978-1-59904-887-1.ch010)
[70]
E. Georgiou, M.D. Dikaiakos, and A. Stassopoulou. On the properties of spam-advertised URL addresses. Journal of Network and Computer Applications, 31(4):966–985, 2008. (doi:10.1016/j.jnca.2007.01.003)
[71]
H. Ghanbari and C. Constantinides. An algebraic query method for static program analysis and measurement. In 17th International Conference on Software Engineering and Data Engineering, SEDE 2008, pages 174–181, 2008.
[72]
H. Ghasemalizadeh and M. Razzazi. A distributed web service retrieval and composition method. In 31st International Convention Proceedings: Digital Economy - 5th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers, volume 5, pages 253–258, 2008.
[73]
Robert L. Glass. Open source vs. proprietary software: Yet another answer to the quality comparison. Software Practitioner, pages 1,4, 2008.
[74]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for troubleshooting software configuration problems using application tracing. United States Patent 7,386,839, June 2008.
[75]
K. Gondow, H. Kawashima, and T. Imaizumi. TBCppA: A tracer approach for automatic accurate analysis of C preprocessor's behaviors. In SCAM 2008: 8th IEEE International Working Conference on Source Code Analysis and Manipulation,, pages 35–44, 2008. (doi:10.1109/SCAM.2008.13)
[76]
K. Gondow, H. Kawashima, and T. Imaizumi. TBCppA: Tracer-based C preprocessor analyzer. Computer Software, 25(1):105–123, 2008.
[77]
V.I. Gorodetskii, O.V. Karsaev, V.V. Samoilov, and S.V. Serebryakov. Development tools for open agent networks. Journal of Computer and Systems Sciences International, 47(3):429–446, 2008. (doi:10.1134/S1064230708030131)
[78]
P. Gotthelf, A. Zunino, C. Mateos, and M. Campo. GMAC: An overlay multicast network for mobile agent platforms. Journal of Parallel and Distributed Computing, 68(8):1081–1096, 2008. (doi:10.1016/j.jpdc.2008.04.002)
[79]
P. Grobelny. The expert system approach in development of loosely coupled software with use of domain specific language. In Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, volume 3, pages 119–123, 2008. (doi:10.1109/IMCSIT.2008.4747227)
[80]
T. Guo and S.A. Jarvis. DIAO: A scheme of cooperative data distribution for grid-enabled data analysis applications. In The 3rd Int. Multi-Conf. Computing in the Global Information Technology, ICCGI 2008 in Conjunction with ComP2P 2008: The 1st Int. Workshop on Computational P2P Networks: Theory and Practice, pages 200–209, 2008. (doi:10.1109/ICCGI.2008.26)
[81]
T. Haenselmann, T. King, M. Busse, W. Effelsberg, and M. Fuchs. Embedded script-driven home-automation with sensor networks. 1st IFIP WG 6.2 Home Networking Conference, IHN 2007, 256:225–238, 2008.
[82]
Y. Haining, L.H. Etzkorn, and S. Virani. Automated classification and retrieval of reusable software components. Journal of the American Society for Information Science and Technology, 59(4):613–627, 2008. (doi:10.1002/asi.20775)
[83]
Y. Hanna, H. Rajan, and W. Zhang. Slede: A domain-specific verification framework for sensor network security protocol implementations. In WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security, pages 109–118, 2008. (doi:10.1145/1352533.1352551)
[84]
F. Hashim, M.R. Kibria, and A. Jamalipour. A detection and recovery architecture against DoS and worm attacks in NGMN. In IEEE International Conference on Communications, pages 1675–1679, 2008. (doi:10.1109/ICC.2008.323)
[85]
S. Hatahet, A. Bouabdallah, and Y. Challal. A new worm propagation threat in bittorrent: Modeling and analysis. In Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, volume 3, pages 791–798, 2008. (doi:10.1109/IMCSIT.2008.4747333)
[86]
M.V.J. Heikkinen and H. Hammaınen. Scenario planning of mobile peer-to-peer service usage. In 7th International Conference on Mobile Business, ICMB 2008, Creativity and Convergence, pages 145–152, 2008. (doi:10.1109/ICMB.2008.15)
[87]
Israel Herraiz. A statistical examination of the properties and evolution of libre software. PhD thesis, Universidad Rey Juan Carlos, Madrid, 2008.
[88]
M. Hölzl, A. Rauschmayer, and M. Wirsing. Engineering of software-intensive systems: State of the art and research challenges. In M. Hölzl, A. Rauschmayer, and M. Wirsing, editors, Software-Intensive Systems and New Computing Paradigms: Challenges and Visions, pages 1–44. Springer-Verlag, 2008. Lecture Notes in Computer Science 5380. (doi:10.1007/978-3-540-89437-7-1)
[89]
G. Huang, Y. Zhou, and Y. Zhang. A small world routing model for structured P2P systems. In 2008 International Symposium on Information Science and Engineering, ISISE 2008, pages 632–636, 2008. (doi:10.1109/ISISE.2008.332)
[90]
D. Hull, S.R. Pettifer, and D.B. Kell. Defrosting the digital library: Bibliographic tools for the next generation web. PLoS Computational Biology, 4(10), 2008. (doi:10.1371/journal.pcbi.1000204)
[91]
P. Hyojin, Y. Jinhong, P. Juyoung, G.K. Shin, and K.C. Jun. A survey on peer-to-peer overlay network schemes. In International Conference on Advanced Communication Technology, ICACT, volume 2, pages 986–988, 2008. (doi:10.1109/ICACT.2008.4493931)
[92]
Indratmo and J. Vassileva. A review of organizational structures of personal information management. Journal of Digital Information, 9(26), 2008.
[93]
C. Isen, L. John, P.C. Jung, and J.S. Hyo. On the representativeness of embedded Java benchmarks. In 2008 IEEE International Symposium on Workload Characterization, IISWC'08, pages 153–162, 2008. (doi:10.1109/IISWC.2008.4636100)
[94]
H. Ito. Available bandwidth and minimum bandwidth delivery methods for video delivery and video replication. In 5th International Conference on Information Technology and Applications, ICITA 2008, pages 828–833, 2008.
[95]
K. Iwasaki, M. Kanbara, K. Yamazawa, and N. Yokoya. Construction of extended geographical database based on photo shooting history. In CIVR 2008: Proceedings of the International Conference on Content-based Image and Video Retrieval, pages 185–194, 2008. (doi:10.1145/1386352.1386381)
[96]
G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware: From a survey towards an established taxonomy. Journal in Computer Virology, 4(3):251–266, 2008. (doi:10.1007/s11416-008-0086-0)
[97]
Stéephane Ducasse Jannik Laval, Alexandre Bergel. Assessing the quality of your software with MoQam. In FAMOOSr 2008: 2nd Workshop on FAMIX and Moose in Reengineering, pages 1–4, 2008.
[98]
E. Jeschke, B. Bon, T. Inagaki, and S. Streeper. A framework for the subaru telescope observation control system based on the command design pattern. In Proceedings of SPIE - The International Society for Optical Engineering, volume 7019, 2008. (doi:10.1117/12.788073)
[99]
H. Jiang, J. Li, Z. Li, and X. Bai. Performance evaluation of content distribution in hybrid CDN-P2P network. In Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, pages 188–193, 2008. (doi:10.1109/FGCN.2008.63)
[100]
H. Jiang, J. Li, Z. Li, and J. Liu. Efficient hierarchical content distribution using P2P technology. In Proceedings of the 2008 16th International Conference on Networks, ICON 2008, 2008. (doi:10.1109/ICON.2008.4772628)
[101]
H. Jiang, J. Liu, J. Li, and Z. Li. A scalable system for large-scale multimedia distribution based on hybrid networks. In International Conference on Communication Technology Proceedings, ICCT, pages 584–587, 2008. (doi:10.1109/ICCT.2008.4716134)
[102]
Z. Joseph, G. Das, and L. Fegaras. Distinct value estimation on peer-to-peer networks. In 1st International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2008, 2008. (doi:10.1145/1389586.1389617)
[103]
E.-H. Jung and Y.-J. Park. TinyONet: A cache-based sensor network bridge enabling sensing data reusability and customized wireless sensor network services. Sensors, 8(12):7930–7950, 2008. (doi:10.3390/s8127930)
[104]
E. Kageyama, C. Maziero, and A. Santin. An experimental peer-to-peer e-mail system. In CSE 2008: IEEE 11th International Conference on Computational Science and Engineering, pages 203–208, 2008. (doi:10.1109/CSE.2008.9)
[105]
E. Kageyama, C. Maziero, and A. Santin. A pull-based e-mail architecture. In Proceedings of the ACM Symposium on Applied Computing, pages 468–472, 2008. (doi:10.1145/1363686.1363802)
[106]
A. Keramati, B. Hadjiha, and M.S. Saremi. A proposal framework for adoption of electronic payment services by iranian customers. In IEEE International Conference on Industrial Informatics (INDIN), pages 592–597, 2008. (doi:10.1109/INDIN.2008.4618169)
[107]
Z. Khallouf. Trust management in peer-to-peer SIP using the security assertion markup language. In ICTTA 2008: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008. (doi:10.1109/ICTTA.2008.4530277)
[108]
A. Klenk, M. Kleis, B. Radier, S. Elmoumouhi, G. Carle, and M. Salaun. Towards autonomic service control in next generation networks. In ICAS 2008: 4th International Conference on Autonomic and Autonomous Systems, pages 266–271, 2008. (doi:10.1109/ICAS.2008.22)
[109]
M. Knoll, H. Abbadi, and T. Weis. Replication in peer-to-peer systems. Lecture Notes in Computer Science, 5343:35–46, 2008. (doi:10.1007/978-3-540-92157-8-4)
[110]
H.J. Ko, K.I. Kim, E.J. Lee, W.G. Choi, and U.M. Kim. An effective XML data release in dynamic environments. In Proceedings — 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008, pages 182–189, 2008. (doi:10.1109/ICHIT.2008.222)
[111]
H.L. Koch and D.W. Johnson. Are home-based sales representatives aware and proactive regarding security risks in the internet era? Journal of Internet Commerce, 7(3):379–402, 2008. (doi:10.1080/15332860802250492)
[112]
T. Kosar, P.E. Martínez López, P.A. Barrientos, and M. Mernik. A preliminary study on various implementation approaches of domain-specific language. Information and Software Technology, 50(5):390–405, 2008. (doi:10.1016/j.infsof.2007.04.002)
[113]
T. Koskela, J. Julkunen, J. Korhonen, M. Liu, and M. Ylianttila. Leveraging collaboration of peer-to-peer and web services. In Proceedings — The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008, pages 496–501, 2008. (doi:10.1109/UBICOMM.2008.24)
[114]
T. Koskela, O. Kassinen, J. Korhonen, Z. Ou, and M. Ylianttila. Peer-to-peer community management using structured overlay networks. In Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility'08, 2008. (doi:10.1145/1506270.1506283)
[115]
K. Kotapati, P. Liu, and T.F. LaPorta. EndSec: An end-to-end message security protocol for mobile telecommunication networks. In WoWMoM 2008: IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, 2008. (doi:10.1109/WOWMOM.2008.4594919)
[116]
B.R. Krogstie. Power through brokering: Open source community participation in software engineering student projects. In Proceedings - International Conference on Software Engineering, pages 791–800, 2008. (doi:10.1145/1368088.1368201)
[117]
A.D. Kshemkalyani and M. Singhal. Distributed computing: Principles, algorithms, and systems. Cambridge University Press, 2008. (doi:10.1017/CBO9780511805318)
[118]
H.C.W. Lau, T.M. Chan, and W.T. Tsui. Fuzzy logic guided genetic algorithms for the location assignment of items. In 2007 IEEE Congress on Evolutionary Computation, CEC 2007, pages 4281–4288, 2008. (doi:10.1109/CEC.2007.4425030)
[119]
H.C.W. Lau, T.M. Chan, and W.T. Tsui. Item-location assignment using fuzzy logic guided genetic algorithms. IEEE Transactions on Evolutionary Computation, 12(6):765–780, 2008. (doi:10.1109/TEVC.2008.924426)
[120]
C.-H. Li, G.-F. Feng, T.-C. Gu, S.-L. Lu, and D.-X. Chen. Hotspots-free overlay cooperative caching scheme. Ruan Jian Xue Bao/Journal of Software, 19(3):744–754, 2008. (doi:10.3724/SP.J.1001.2008.00744)
[121]
D.-C. Li, H.-B. Sun, and Z.-H. Xin. Relativity analysis on wireless value-added services market and SP regulation. Tongxin Xuebao/Journal on Communication, 29(2):116–122, 2008.
[122]
F. Li, T. Iida, and Y. Ishikawa. Traceable P2P record exchange: A database-oriented approach. Frontiers of Computer Science in China, 2(3):257–267, 2008. (doi:10.1007/s11704-008-0028-5)
[123]
K. Li, X. Sun, and Y. He. Duty-oriented hybrid peer-to-peer network based on metadata. In International Symposium on Advances in Computer and Sensor Networks and Systems, 2008. Aardvark Global Publishing, 2008.
[124]
T. Li, J. Wang, and J. You. Using degree-based strategy for network coding in content distribution network. In Proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008, pages 487–491, 2008. (doi:10.1109/ICCEE.2008.20)
[125]
F.-R. Lin, H.-M. Lo, and C.-R. Wang. Can a p2p file-sharing network become an e-marketplace? In Proceedings of the Annual Hawaii International Conference on System Sciences, 2008. (doi:10.1109/HICSS.2008.86)
[126]
S.-J. Lin, M.-C. Huang, K.-C. Lai, and K.-C. Huang. Design and implementation of job migration policies in p2p grid systems. In Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pages 75–80, 2008. (doi:10.1109/APSCC.2008.246)
[127]
M. Lindgren, R. Land, C. Norström, and A. Wall. Key aspects of software release planning in industry. In ASWEC 2008: Proceedings of the Australian Software Engineering Conference, pages 320–329, 2008. (doi:10.1109/ASWEC.2008.4483220)
[128]
M. Lindgren, A. Wall, R. Land, and C. Norstr?m. A method for balancing short- and long-term investments: Quality vs. features. In EUROMICRO 2008 - Proceedings of the 34th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2008, pages 175–182, 2008. (doi:10.1109/SEAA.2008.22)
[129]
Y. Liu, G. Guo, and J. Qi. An algorithm of system decomposition based on Laplace spectral graph partitioning technology. In Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008, volume 2, pages 85–89, 2008. (doi:10.1109/CSSE.2008.1015)
[130]
Y. Liu, C. Yang, K. Xu, and H. Chen. Controlling mechanism for the hubs in peer-to-peer networks. In Proceedings - 2008 International Conference on Computational Intelligence and Security, CIS 2008, volume 1, pages 511–515, 2008. (doi:10.1109/CIS.2008.109)
[131]
Y. Liu, C. Yang, K. Xu, and H. Chen. A fair utility function for incentive mechanism against free-riding in peer-to-peer networks. In ruSMART 2008: 8th International Conference, NEW2AN and 1st Russian Conference on Smart Spaces — Next Generation Teletraffic and Wired/Wireless Advanced Networking, pages 222–233, 2008. Lecture Notes in Computer Science 5174. (doi:10.1007/978-3-540-85500-2_20)
[132]
Y. Liu, L. Zhu, J. Gao, and W. Cheng. A research about redundant data packet in unstructured P2P network. In HPCC 2008: 10th IEEE International Conference on High Performance Computing and Communications,, pages 653–658, 2008. (doi:10.1109/HPCC.2008.75)
[133]
Y. Liu, L. Zhu, J. Gao, and Y. Li. A segment strategy based on flooding search in unstructured P2P network. In Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, volume 1, pages 252–255, 2008. (doi:10.1109/FGCN.2008.201)
[134]
Y.-H. Liu, J.-S. Yih, F. Pinel, and T. Chieu. A model-driven SOA implementation of multi-channel Websphere Commerce Gift Center. In IEEE International Conference on e-Business Engineering, ICEBE'08 - Workshops: AiR'08, EM2I'08, SOAIC'08, SOKM'08, BIMA'08, DKEEE'08, pages 29–34, 2008. (doi:10.1109/ICEBE.2008.96)
[135]
J.-W. Lo, M.-S. Hwang, and Y.-P. Chu. An exchangeable e-cash scheme by e-mint. In Proceedings - 8th International Conference on Intelligent Systems on Intelligent Systems Design and Applications, ISDA 2008, volume 3, pages 246–251, 2008. (doi:10.1109/ISDA.2008.186)
[136]
S. Loeb, B. Falchuk, and E. Panagos. The Fabric of Mobile Services: Software Paradigms and Business Demands. wiley, 2008. (doi:10.1002/9780470478240)
[137]
M. Lopez, J. Whalley, P. Robbins, and R. Lister. Relationships between reading, tracing and writing skills in introductory programming. In ICER'08 - Proceedings of the ACM Workshop on International Computing Education Research, pages 101–111, 2008. (doi:10.1145/1404520.1404531)
[138]
R.P. Loui. In praise of scripting: Real programming pragmatism. Computer, 41(7):22–26, 2008. (doi:10.1109/MC.2008.228)
[139]
X.-C. Lu and D.-S. Li. Overlay technologies for internet-based virtual computing environment. Jisuanji Xuebao/Chinese Journal of Computers, 31(9):1516–1524, 2008.
[140]
D.F. Macedo, A.L. Dos Santos, and G. Pujolle. From TCP/IP to convergent networks: Challenges and taxonomy. IEEE Communications Surveys and Tutorials, 10(4):40–55, 2008. (doi:10.1109/SURV.2008.080405)
[141]
J. Mallet and S. Rouvrais. Style-based model transformation for early extrafunctional analysis of distributed systems. Lecture Notes in Computer Science, 5281 LNCS:55–70, 2008. (doi:10.1007/978-3-540-87879-7-4)
[142]
T. Mandl. Automatic quality assessment for internet pages. In Handbook of Research on Web Information Systems Quality, pages 104–112. IGI Global, 2008. (doi:10.4018/978-1-59904-847-5.ch006)
[143]
M.R. Martınez Torres, S.L. Toral Marın, and F.J. Barrero Garcıa. Study and analysis of open source software projects mailing lists as a tool for knowledge sharing. Investigaciones Europeas de Direccion y Economia de la Empresa, 14(3):79–90, 2008. (doi:10.1016/S1135-2523(12)60068-9)
[144]
D. Matthews, G. Wilson, and S. Easterbrook. Configuration management for large-scale scientific computing at the UK met office. Computing in Science and Engineering, 10(6):56–64, 2008. (doi:10.1109/MCSE.2008.144)
[145]
F. Menczer, L.-S. Wu, and R. Akavipat. Intelligent peer networks for collaborative web search. AI Magazine, 29(3):35–46, 2008.
[146]
S. Montanelli and S. Castano. Semantically routing queries in peer-based systems: The H-Link approach. Knowledge Engineering Review, 23(1):51–72, 2008. (doi:10.1017/S0269888907001257)
[147]
E. Mourtou. Modelling access control in a greek public hospital. Journal on Information Technology in Healthcare, 6(3):230–239, 2008.
[148]
J.L. Muñoz, O. Esparza, J. Forné, and E. Pallares. H-OCSP: A protocol to reduce the processing burden in online certificate status validation. Electronic Commerce Research, 8(4):255–273, 2008. (doi:10.1007/s10660-008-9024-y)
[149]
E. Murphy-Hill, A.P. Black, D. Dig, and C. Parnin. Gathering refactoring data: A comparison of four methods. In Proceedings of the 2nd Workshop on Refactoring Tools, WRT '08, in conjunction with the Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2008, 2008. (doi:10.1145/1636642.1636649)
[150]
A. Nabih, A. Hossain, S. Shepherd, and M. Khaled. "where you are" based authentication: An improved security protocol using BAN logic. In 7th European Conference on Information Warfare and Security 2008, ECIW 2008, pages 153–162, 2008.
[151]
P. Naubourg, V. Lopes, and L. Bossu. A case study of open source software development in proteomic area: The LIMS ePims. In SITIS 2008 — Proceedings of the 4th International Conference on Signal Image Technology and Internet Based Systems, pages 555–562, 2008. (doi:10.1109/SITIS.2008.83)
[152]
A. Ng, H. Grimm, T. Lezama, A. Persson, M. Andersson, and M. Jag̈stam. OPTIMISE: An internet-based platform for metamodel-assisted simulation optimization. International Conference on Communication Systems and Electrical Engineering, 4 LNEE:281–296, 2008. (doi:10.1007/978-0-387-74938-9_20)
[153]
T. Nguyen, T. Wolf, and D. Damian. Global software development and delay: Does distance still matter? In ICGSE 2008: 3rd IEEE International Conference Global Software Engineering, pages 45–54, 2008. (doi:10.1109/ICGSE.2008.39)
[154]
J. Ni, J. Lin, S.J. Harrington, and N. Sharma. Designing file replication schemes for peer-to-peer file sharing systems. In IEEE International Conference on Communications, pages 5609–5613, 2008. (doi:10.1109/ICC.2008.1051)
[155]
M. Obrist, R. Bernhaupt, and M. Tscheligi. Interactive TV for the home: An ethnographic study on users' requirements and experiences. International Journal of Human-Computer Interaction, 24(2):174–196, 2008. (doi:10.1080/10447310701821541)
[156]
G. Oleksik, D. Frohlich, L.M. Brown, and A. Sellen. Sonic interventions: Understanding and extending the domestic soundscape. In Conference on Human Factors in Computing Systems - Proceedings, pages 1419–1428, 2008. (doi:10.1145/1357054.1357277)
[157]
H. Park and M. Van Der Schaar. Coalition based multimedia peer matching strategies for P2P networks. In Proceedings of SPIE — The International Society for Optical Engineering, volume 6822, 2008. Article number 682203. (doi:10.1117/12.766578)
[158]
H. Park and M. Van Der Schaar. Coalition-based resource reciprocation strategies for P2P multimedia broadcasting. IEEE Transactions on Broadcasting, 54(3):557–567, 2008. (doi:10.1109/TBC.2008.2001148)
[159]
M. Pathan and R. Buyya. A taxonomy of CDNs. Lecture Notes in Electrical Engineering, 9 LNEE:33–77, 2008. (doi:10.1007/978-3-540-77887-5_2)
[160]
M. Pathan, R. Buyya, and A. Vakali. Content delivery networks: State of the art, insights, and imperatives. Lecture Notes in Electrical Engineering, 9 LNEE:3–32, 2008. (doi:10.1007/978-3-540-77887-5_1)
[161]
M.J.V. Pereira, M. Mernik, D. da Cruz, and P.R. Henriques. Program comprehension for domain-specific languages. Computer Science and Information Systems, 5(2):1–17, 2008. (doi:10.2298/CSIS0802001P)
[162]
L.S.G. Piccolo, M.C.C. Baranauskas, and E. Furtado. A t-gov prototype evaluation considering a wide diversity of users. In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information Systems; Proceedings of Interfaces and Human Computer Interaction 2008, pages 27–34, 2008.
[163]
E.S. Poole, M. Chetty, R.E. Grinter, and K.W. Edwards. More than meets the eye: Transforming the user experience of home network management. In Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS, pages 455–464, 2008. (doi:10.1145/1394445.1394494)
[164]
C.R. Prause and M. Eisenhauer. Social aspects of a continuous inspection platform for software source code. In Proceedings - International Conference on Software Engineering, pages 85–88, 2008. (doi:10.1145/1370114.1370136)
[165]
A. Qamra and E.Y. Chang. Scalable landmark recognition using extent. Multimedia Tools and Applications, 38(2):187–208, 2008. (doi:10.1007/s11042-007-0178-8)
[166]
C. Rahhal, H. Skaf-Molli, and P. Molli. SWOOKI: A peer-to-peer semantic wiki. In CEUR Workshop Proceedings, volume 360, pages 124–125, 2008.
[167]
C. Åhlund, S. Wallin, K. Andersson, and R. Brännström. A service level model and internet mobility monitor. Telecommunication Systems, 37(1-3):49–70, 2008. (doi:10.1007/s11235-008-9072-6)
[168]
M. Ramachandran. Software components: Guidelines and applications. Nova Science Publishers, Inc., 2008.
[169]
J. Ramırez, L. Gimson, G. Gil, E. Fernández, D. Romero, D. Arias, A. Vera, and E. Sanchez. The reuse of libraries in moodle: Impact on the estimation of the development of a similar platform. In 7th Ibero-American Conference on Systems, Cybernetics and Informatics, CISCI 2008, Jointly with the 5th Ibero-American Symposium on Education, Cybernetics and Informatics, SIECI 2008 and 3rd Int. Symp. on Knowledge Communication and Conf. CCC 2008, volume 2, pages 194–198. International Institute of Informatics and Systemics, IIIS, 2008.
[170]
H. Reza, K. Ogaard, and A. Malge. A model based testing technique to test web applications using StateCharts. In Proceedings — International Conference on Information Technology: New Generations, ITNG 2008, pages 183–188, 2008. (doi:10.1109/ITNG.2008.145)
[171]
M. Rice and N. Alm. Designing new interfaces for digital interactive television usable by older adults. Computers in Entertainment, 6(1), May 2008. (doi:10.1145/1350843.1350849)
[172]
A. Roczniak, A.E. Saddik, and R. Kouhi. Design of application-specific incentives in p2p networks. In Proceedings - 12th 2008 IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2008, pages 194–203, 2008. (doi:10.1109/DS-RT.2008.17)
[173]
L. Rodero Merino, L. López, A. Fernández, and V. Cholvi. DANTE: A self-adapting peer-to-peer system. In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC 2006, pages 31–42, May 2008. Lecture Notes in Computer Science 4461. (doi:10.1007/978-3-540-79705-0_3)
[174]
M. Rohr, A. Van Hoorn, J. Matevska, N. Sommer, L. Stoever, S. Giesecke, and W. Hasselbring. Kieker: Continuous monitoring and on demand visualization of Java software behavior. In Proceedings of the IASTED International Conference on Software Engineering, SE 2008, pages 80–85, 2008.
[175]
N.C. Romano Jr. and J. Fjermestad. Privacy and security in the age of electronic customer relationship management. In Selected Readings on Electronic Commerce Technologies: Contemporary Applications, pages 310–332. IGI Global, 2008. (doi:10.4018/978-1-60566-096-7.ch022)
[176]
P. Rosner and S. Viswanathan. Visualisation of coupling and programming to interface for object-oriented systems. In Proceedings of the International Conference on Information Visualisation, pages 575–581, 2008. (doi:10.1109/IV.2008.96)
[177]
J.A. Roy, F. Koushanfar, and I.L. Markov. Circuit CAD tools as a security threat. In HOST 2008: IEEE International Workshop on Hardware-Oriented Security and Trust, pages 65–66, 2008. (doi:10.1109/HST.2008.4559052)
[178]
S. Rueda, P. Morillo, and J.M. Orduña. A comparative study of awareness methods for peer-to-peer distributed virtual environments. Computer Animation and Virtual Worlds, 19(5):537–552, 2008. (doi:10.1002/cav.230)
[179]
F. Safaei, A. Khonsari, M. Fathy, and M. Ould-Khaoua. Performance modelling of pipelined circuit switching in hypercubes with hot spot traffic. Microprocessors and Microsystems, 32(1):10–22, 2008. (doi:10.1016/j.micpro.2007.09.002)
[180]
M.B. Salem, S. Hershkop, and S.J. Stolfo. A survey of insider attack detection research. Advances in Information Security, 39:69–70, 2008.
[181]
S. Sarkar, R. Sindhgatta, and K. Pooloth. A collaborative platform for application knowledge management in software maintenance projects. In COMPUTE 2008 - The 1st ACM Bangalore Annual Conference, 2008. (doi:10.1145/1341771.1341774)
[182]
M.I. Sarwar, W. Tanveer, I. Sarwar, and W. Mahmood. A comparative study of MI tools: Defining the roadmap to MI tools standardization. In IEEE INMIC 2008: 12th IEEE International Multitopic Conference - Conference Proceedings, pages 379–385, 2008. (doi:10.1109/INMIC.2008.4777767)
[183]
J. Schäfer, K. Malinka, and P. Hanáček. Malware spreading models in peer-to-peer networks. In International Carnahan Conference on Security Technology, pages 339–345, 2008. (doi:10.1109/CCST.2008.4751325)
[184]
J. Schäfer, K. Malinka, and P. Hanáček. Peer-to-peer networks security. In ICIMP 2008: The 3rd International Conference on Internet Monitoring and Protection, pages 74–79, 2008. (doi:10.1109/ICIMP.2008.26)
[185]
A.U. Schmidt. On the superdistribution of digital goods. In 3rd International Conference on Communications and Networking in China, ChinaCom 2008, pages 1337–1344, 2008. (doi:10.1109/CHINACOM.2008.4685251)
[186]
S. Schosser, K. Böhm, and B. Vogt. Do humans identify efficient strategies in structured peer-to-peer systems? In 7th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2008, volume 3, pages 1481–1484. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2008.
[187]
S. Schosser, K. Böhm, and B. Vogt. Online vs. offline behavior: How to design strategic agents for distributed coordinator-free environments. In Proceedings - 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008, pages 48–56, 2008. (doi:10.1109/WIIAT.2008.10)
[188]
Robert C. Seacord. The CERT C Secure Coding Standard. Addison-Wesley, Boston, MA, 2008.
[189]
F.J. Seifert. Safety from deception through broadband coding the Austrian victory over the hackers at Graz in 1991. Elektrotechnik und Informationstechnik, 125(11), 2008. In German (Täuschungssicherheit durch Breitbandige Verschlüsselung Der Österreichische Sieg uber die Hacker bei Graz 1991). (doi:10.1007/s00502-008-0588-y)
[190]
D. Sereni, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, and J. Tibble. QL: Object-oriented queries made easy. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5235 LNCS:78–133, 2008. (doi:10.1007/978-3-540-88643-3-3)
[191]
V. Sesum-Cavic and E. Küehn. Instantiation of a generic model for load balancing with intelligent algorithms. Lecture Notes in Computer Science, 5343:311–317, 2008. (doi:10.1007/978-3-540-92157-8-31)
[192]
P.C. Sethia, S.K. Somani, and A.I. Khandwawala. Enhancing reliability of a continuous manufacturing system using WIP buffers. International Journal of Simulation Modelling, 7(2):61–70, 2008. (doi:10.2507/IJSIMM07(2)1.098)
[193]
N. Seyff, F. Graf, P. Grünbacher, and N. Maiden. Mobile discovery of requirements for context-aware systems. In Requirements Engineering: Foundation for Software Quality, pages 183–197, 2008. Lecture Notes in Computer Science 5025. (doi:10.1007/978-3-540-69062-7_18)
[194]
Z. Shen, W. Yongji, and X. Junchao. Mining individual performance indicators in collaborative development using software repositories. In APSEC 08: 15th Asia-Pacific Software Engineering Conference, pages 247–254, December 2008. (doi:10.1109/APSEC.2008.12)
[195]
S. Shirali-Shahreza and M. Shirali-Shahreza. Various aspects of open source software development. In ITSim '08: International Symposium on Information Technology, volume 3, 2008. (doi:10.1109/ITSIM.2008.4631871)
[196]
S.A. Sioutas. NBDT: An efficient P2P indexing scheme for web service discovery. International Journal of Web Engineering and Technology, 4(1):95–113, 2008. (doi:10.1504/IJWET.2008.016106)
[197]
J.A. Solworth. Instant revocation. In Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, pages 31–48, 2008. Lecture Notes in Computer Science 5057. (doi:10.1007/978-3-540-69485-4_3)
[198]
K. Somasundaram and S. Radhakrishnan. Nimble protein sequence alignment in grid (NPSAG). Journal of Computer Science, 4(1):36–41, 2008.
[199]
A.M. Sourouni, S. Mouzakitis, D. Askounis, and G. Velegrakis. An ontology-based e-business transactions registry. In MCCSIS'08 — IADIS Multi Conference on Computer Science and Information Systems; Proceedings e-Commerce 2008, pages 86–93, 2008.
[200]
G. Spanoudakis, C. Kloukinas, and K. Androutsopoulos. Dynamic verification and control of mobile peer-to-peer systems. In ICIMP 2008: The 3rd International Conference on Internet Monitoring and Protection, pages 1–10, 2008. (doi:10.1109/ICIMP.2008.11)
[201]
C. Spielvoge, L. Böszörmenyi, and P. Kropf. A demo for affinity based content delivery architectures. In Proceedings of the International Workshop on Network and Operating System Support for Digital Audio and Video, pages 107–108, 2008. (doi:10.1145/1496046.1496071)
[202]
C. Stern, P. Adelt, V. Krummel, and M.R. Ackermann. Reliable evidence of data integrity from an untrusted storage service. In Proceedings - 4th International Conference on Networking and Services, ICNS 2008, pages 24–29, 2008. (doi:10.1109/ICNS.2008.28)
[203]
Sufatrio and R.H.C. Yap. Extending BAN logic for reasoning with modern PKI-based protocols. In 2008 IFIP International Conference on Network and Parallel Computing, NPC 2008, pages 190–197, 2008. (doi:10.1109/NPC.2008.86)
[204]
W. Sun, R. Sekar, Z. Liang, and V.N. Venkatakrishnan. Expanding malware defense by securing software installations. In DIMVA 2008: 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 164–185, July 2008. Lecture Notes in Computer Science 5137. (doi:10.1007/978-3-540-70542-0_9)
[205]
X. Sun, K. Li, Y. Liu, and Y. Tian. SLUP: A semantic-based and location-aware unstructured p2p network. In HPCC 2008: 10th IEEE International Conference on High Performance Computing and Communications, pages 288–295, 2008. (doi:10.1109/HPCC.2008.49)
[206]
X. Sun, Y. Tian, Y. Liu, and Y. He. An unstructured P2P network model for efficient resource discovery. In 1st International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2008, pages 156–161, 2008. (doi:10.1109/ICADIWT.2008.4664336)
[207]
L. Swan, A.S. Taylor, and R. Harper. Making place for clutter and other ideas of home. ACM Transactions on Computer-Human Interaction, 15(2), 2008. (doi:10.1145/1375761.1375764)
[208]
W. Taha. Domain-specific languages. In 2008 International Conference on Computer Engineering and Systems, ICCES 2008, 2008. (doi:10.1109/ICCES.2008.4772953)
[209]
I. Tamanini, T.C. Sampaio Machado, M.S. Mendes, A.L. Carvalho, M.E.S. Furtado, and P.R. Pinheiro. A model for mobile television applications based on verbal decision analysis. In Advances in Computer and Information Sciences and Engineering, pages 399–404, 2008.
[210]
X. Tang, J. Xu, and W.-C. Lee. Analysis of TTL-based consistency in unstructured peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 19(12):1683–1694, 2008. (doi:10.1109/TPDS.2008.44)
[211]
A. Telea and L. Voinea. A tool for optimizing the build performance of large software code bases. In CSMR 2008: Proceedings of the European Conference on Software Maintenance and Reengineering,, pages 323–325, 2008. (doi:10.1109/CSMR.2008.4493340)
[212]
A. Tiwana. Impact of classes of development coordination tools on software development performance: A multinational empirical study. ACM Transactions on Software Engineering and Methodology, 17(2), 2008. (doi:10.1145/1348250.1348257)
[213]
P. Traynor, P. McDaniel, and T.L. Porta. Security for telecommunications networks. Advances in Information Security, 40:1–177, 2008.
[214]
M. Tu, N. Tadayon, and E. Lu. A scalable update protocol for peer-to-peer data grids. In Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, pages 826–832, 2008.
[215]
F. Turkmen, P. Mazzoleni, B. Crispo, and E. Bertino. P-CDN: Extending access control capabilities of P2P systems to provide CDN services. In Proceedings — IEEE Symposium on Computers and Communications, pages 480–486, 2008. (doi:10.1109/ISCC.2008.4625671)
[216]
J. Ubacht and J.L.M. Vrancken. Next generation policy for the E-communications sector: The role of the end user and technology. In International Telecommunication Union - Proceedings of the 1st ITU-T Kaleidoscope Academic Conference, Innovations in NGN, K-INGN, 2008. (doi:10.1109/KINGN.2008.4542296)
[217]
D. Ueno. Linenum info: System support for code reading. In ICALT 2008: The 8th IEEE International Conference on Advanced Learning Technologies, pages 600–602, 2008. (doi:10.1109/ICALT.2008.162)
[218]
M. Umarji, S.E. Sim, and C. Lopes. Archetypal internet-scale source code searching. In Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, pages 257–263. IFIP: International Federation for Information Processing, Springer, September 2008. (doi:10.1007/978-0-387-09684-1_21)
[219]
S. Van Der Gaast and D. Bijwaard. Efficiency of personalized content distribution. Bell Labs Technical Journal, 13(2):135–146, 2008. (doi:10.1002/bltj.20309)
[220]
M. Van Der Schaar, D.S. Turaga, and R. Sood. Stochastic optimization for content sharing in P2P systems. IEEE Transactions on Multimedia, 10(1):132–143, 2008. (doi:10.1109/TMM.2007.911288)
[221]
L. Van Velsen, T. Van Der Geest, R. Klaassen, and M. Steehouder. User-centered evaluation of adaptive and adaptable systems: A literature review. Knowledge Engineering Review, 23(3):261–281, 2008. (doi:10.1017/S0269888908001379)
[222]
Eelco Visser. WebDSL: A case study in domain-specific language engineering. In Generative and Transformational Techniques in Software Engineering II: International Summer School, GTTSE 2007, pages 291–373, July 2008. Lecture Notes in Computer Science 5235. (doi:10.1007/978-3-540-88643-3_7)
[223]
H. Wang and P. Van Mieghem. Constructing the overlay network by tuning link weights. In Proceedings of the Second International Conference on Communications and Networking in China, ChinaCom 2007, pages 139–143, 2008. (doi:10.1109/CHINACOM.2007.4469347)
[224]
Y. Wen and H.-M. Wang. Isolated execution model based on local virtualization technology. Jisuanji Xuebao/Chinese Journal of Computers, 31(10):1768–1779, 2008.
[225]
T. Wolf, T. Nguyen, and D. Damian. Does distance still matter? Software Process Improvement and Practice, 13(6):493–510, 2008. (doi:10.1002/spip.401)
[226]
J.D. Wren. URL decay in MEDLINE — a 4-year follow-up study. Bioinformatics, 24(11):1381–1385, 2008. (doi:10.1093/bioinformatics/btn127)
[227]
H. Wu, J. Gray, and M. Mernik. Grammar-driven generation of domain-specific language debuggers. Software - Practice and Experience, 38(10):1073–1103, 2008. (doi:10.1002/spe.863)
[228]
H. Yamamoto, J. Abu Qudeiri, and E. Marui. Definition of FTL with bypass lines and its simulator for buffer size decision. International Journal of Production Economics, 112(1):18–25, 2008. (doi:10.1016/j.ijpe.2007.03.007)
[229]
M.K.H. Yeung and Y.-K. Kwok. Game theoretic peer selection for resilient peer-to-peer media streaming systems. In ICDCS 2008: The 28th International Conference on Distributed Computing Systems, pages 817–824, 2008. (doi:10.1109/ICDCS.2008.69)
[230]
H. Yin, C. Lin, Q. Zhang, and Z. and Chen. TrustStream: A secure and scalable architecture for large-scale internet media streaming. IEEE Transactions on Circuits and Systems for Video Technology, 18(12):1692–1702, 2008. (doi:10.1109/TCSVT.2008.927000)
[231]
U.H. Yoon, K.-I. Jeong, K.-L. Park, H. Jiyon, A. Jaemin, S. Jeonghwa, and S.-D. Kim. Reducing the discovery overheads in a DHT based P2P network by using virtual resources. In Proceedings of 19th International Conference on Systems Engineering, ICSEng 2008, pages 368–374, 2008. (doi:10.1109/ICSEng.2008.63)
[232]
M. Yoshida and K. Sakamoto. Performance comparison of load balancing algorithms through code migration in distributed desktop computing grids. In Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pages 781–788, 2008. (doi:10.1109/APSCC.2008.60)
[233]
L. Youseff, M. Butrico, and D. Da Silva. Toward a unified ontology of cloud computing. In Grid Computing Environments Workshop, GCE 2008, 2008. (doi:10.1109/GCE.2008.4738443)
[234]
L. Yuhua, Y. Chun, X. Kaihua, and C. Hongcai. Rank-based incentive mechanism for peer-to-peer networks. In 4th International Conference on Natural Computation, ICNC 2008, volume 5, pages 252–256, 2008. (doi:10.1109/ICNC.2008.641)
[235]
M. Yuzukirmizi and J. M. Smith. Optimal buffer allocation in finite closed networks with multiple servers. Computers and Operations Research, 35(8):2579–2598, 2008. (doi:10.1016/j.cor.2006.12.008)
[236]
V. Zadorozhny, L. Raschid, and A. Gal. Scalable catalog infrastructure for managing access costs and source selection in wide area networks. International Journal of Cooperative Information Systems, 17(1):77–109, March 2008. (doi:10.1142/S0218843008001786)
[237]
A. Zaidman and S. Demeyer. Automatic identification of key classes in a software system using webmining techniques. Journal of Software Maintenance and Evolution, 20(6):387–417, 2008. (doi:10.1002/smr.370)
[238]
C.M. Zapata and J.D. Velásquez. Algunas pautas para la escritura de artıculos cientıficos. Ingeniare, 16(2):128–137, 2008. (Some hints for writing scientific papers.) In Spanish.
[239]
Z. Zeng and B. Veeravalli. On the design of distributed object placement and load balancing strategies in large-scale networked multimedia storage systems. IEEE Transactions on Knowledge and Data Engineering, 20(3):369–382, 2008. (doi:10.1109/TKDE.2007.190694)
[240]
H.L. Zhang, C.H.C. Leung, and G.K. Raikundalia. Topological analysis of AOCD-based agent networks and experimental results. Journal of Computer and System Sciences, 74(2):255–278, 2008. (doi:10.1016/j.jcss.2007.04.006)
[241]
S. Zhang, Y. Wang, and J. Xiao. Mining individual performance indicators in collaborative development using software repositories. In Proceedings — Asia-Pacific Software Engineering Conference, APSEC, pages 247–254, 2008.
[242]
W. Zhangjin, H. Xingwen, D. Ying, Z. Rui, and Z. Qingguo. A CGI+AJAX+SVG based monitoring method for distributed and embedded system. In U-Media 2008: The 1st IEEE International Conference on Ubi-Media Computing and Workshops, pages 144–148, 2008. (doi:10.1109/UMEDIA.2008.4570880)
[243]
H. Zhou, P. Luo, D. Wang, and Y. Dai. Fast public key infrastructure authentication based on ca caching. Qinghua Daxue Xuebao/Journal of Tsinghua University, 48(7):1160–1164, 2008.
[244]
J. Zhou, L.N. Bhuyan, and A. Banerjee. An effective pointer replication algorithm in P2P networks. In IPDPS Miami 2008 - Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium, Program and CD-ROM, 2008. (doi:10.1109/IPDPS.2008.4536227)
[1]
C. Abalde, V.M. Gulías, and L.M. Castro. Efficient discovery of widely distributed and non-volatile resources on DHTs. In 3rd International Conference on Internet and Web Applications and Services, ICIW 2008, pages 370–376, 2008. (doi:10.1109/ICIW.2008.19)

[2]
M. Abdelouahab, H.R. Hassen, A. Bouabdallah, M. Achemlal, and S. Laniepce. TCA: Topology change attack in peer-to-peer networks. In Workshop on Mobile and Wireless Networks Security, MWNS 2008, pages 13–25, 2008.

[3]
A. Abraham, Y. Badr, H. Liu, and C. Grosan. A multi-swarm approach for neighbor selection in peer-to-peer networks. In 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, CSTST '08 - Proceedings, pages 178–184, 2008. (doi:10.1145/1456223.1456263)

[4]
J. Abu Qudeiri, H. Yamamoto, R. Ramli, and A. Jamali. Genetic algorithm for buffer size and work station capacity in serial-parallel production lines. Artificial Life and Robotics, 12(1-2):102–106, 2008. (doi:10.1007/s10015-007-0449-5)

[5]
B. Adams, B. Van Rompaey, C. Gibbs, and Y. Coady. Aspect mining in the presence of the C preprocessor. In Proceedings of the 4th Linking Aspect Technology and Evolution Workshop, LATE'08 — held at the 7th International Conference on Aspect-Oriented Software Development, 2008. (doi:10.1145/1404953.1404954)

[6]
A. Aikebaier, T. Enokido, and M. Takizawa. A distributed coordination protocol in an order-heterogeneous group. International Journal of Web and Grid Services, 4(1):5–23, 2008. (doi:10.1504/IJWGS.2008.018486)

[7]
M.D. Aime, P.C. Pomi, and M. Vallini. Policy-driven system configuration for dependability. In Proceedings — 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys., pages 420–425, 2008. (doi:10.1109/SECURWARE.2008.54)

[8]
C.E. Alexakos, K.I. Paraskevopoulos, K.V. Votis, and S.D. Likothanassis. Ontology-supported indexing in P2P networks of digital libraries. International Journal of Web Engineering and Technology, 4(1):44–69, 2008. (doi:10.1504/IJWET.2008.016104)

[9]
Y. Alkabani and F. Koushanfar. Designer's hardware Trojan horse. In HOST 2008: IEEE International Workshop on Hardware-Oriented Security and Trust, pages 82–83, 2008. (doi:10.1109/HST.2008.4559059)

[10]
Ghazi I. Alkhatib and David C. Rine. Preface. In Agent Technologies and Web Engineering: Applications and Systems, pages xv–xvii. IGI Global, 2008. (doi:10.4018/978-1-60566-618-1)

[11]
S. Alshattnawi, G. Canals, and P. Molli. Concurrency awareness in a P2P wiki system. In 2008 International Symposium on Collaborative Technologies and Systems, CTS'08, pages 285–294, 2008. (doi:10.1109/CTS.2008.4543942)

[12]
S. Apel, T. Leich, and G. Saake. Aspectual feature modules. IEEE Transactions on Software Engineering, 34(2):162–180, 2008. (doi:10.1109/TSE.2007.70770)

[13]
Yves Barlette and Vladislav V. Fomin. Exploring the suitability of is security management standards for smes. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences, pages 308–308, 2008. (doi:10.1109/HICSS.2008.167)

[14]
S.J. Barr, S.J. Cardman, and D.M. Martin Jr. A boosting ensemble for the recognition of code sharing in malware. Journal in Computer Virology, 4(4):335–345, 2008. (doi:10.1007/s11416-008-0087-z)

[15]
L. Becchetti, U. Colesanti, A. Marchetti-Spaccamela, and A. Vitaletti. Self-adaptive recommendation systems: Models and experimental analysis. In Proceedings - 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2008, pages 479–480, 2008. (doi:10.1109/SASO.2008.55)

[16]
S.M. Bellovin, M. Blaze, W. Diffie, S. Landau, P.G. Neumann, and J. Rexford. Risking communications security: Potential hazards of the Protect America Act. IEEE Security and Privacy, 6(1):24–33, 2008. (doi:10.1109/MSP.2008.17)

[17]
P. Benou and V. Bitos. Developing mobile commerce applications. Journal of Electronic Commerce in Organizations, 6(1):63–78, 2008.

[18]
A.M. Bernardos, P. Tarrıo, J. Iglesias, and J.R. Casar. Diseño y despliegue de servicios móviles basados en contexto: Un caso de estudio. In 3rd Iberian Conference on Information Systems and Technologies, CISTI 2008, 2008.

[19]
A. Bonifati, P.K. Chrysanthis, A.M. Ouksel, and K.-U. Sattler. Distributed databases and peer-to-peer databases: Past and present. SIGMOD Record, 37(1):5–11, 2008. (doi:10.1145/1374780.1374781)

[20]
E. Borcoci, A. Pinto, A. Mehaoua, L. Fang, and N. Wang. Resource management and signalling architecture of a hybrid multicast service for multimedia distribution. Lecture Notes in Computer Science, 5274 LNCS:39–51, 2008. (doi:10.1007/978-3-540-87359-4-5)

[21]
J.-M. Borello and L. Mé. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, 4(3):211–220, 2008. (doi:10.1007/s11416-008-0084-2)

[22]
S. Bryton and F.B.E. Abreu. Modularity-oriented refactoring. In CSMR 2008: Proceedings of the European Conference on Software Maintenance and Reengineering, pages 294–297, 2008. (doi:10.1109/CSMR.2008.4493330)

[23]
K.R.B. Butler, S. McLaughlin, and P.D. McDaniel. Rootkit-resistant disks. In Proceedings of the ACM Conference on Computer and Communications Security, pages 403–415, 2008. (doi:10.1145/1455770.1455821)

[24]
D. Cabanillas and S. Willmott. Studying viable free markets in peer-to-peer file exchange applications without altruistic agents. In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC 2006, pages 151–158, May 2008. Lecture Notes in Computer Science 4461. (doi:10.1007/978-3-540-79705-0_14)

[25]
B. Can, A. Beham, and C. Heavey. A comparative study of genetic algorithm components in simulation-based optimisation. In Winter Simulation Conference, pages 1829–1837, 2008. (doi:10.1109/WSC.2008.4736272)

[26]
G. Canals, P. Molli, J. Maire, S. Lauriére, E. Pacitti, and M. Tlili. XWiki concerto: A P2P wiki system supporting disconnected work. In Cooperative Design, Visualization, and Engineering. 5th International Conference, CDVE 2008, pages 98–106, September 2008. Lecture Notes in Computer Science 5520. (doi:10.1007/978-3-540-88011-0_13)

[27]
D.A. Carrington. What can software engineering students learn from studying open source software? International Journal of Engineering Education, 24(4):729–737, 2008.

[28]
A.L. Carvalho, M. Mendes, P. Pinheiro, and E. Furtado. Analysis of the interaction design for mobile TV applications based on multicriteria. IFIP TC 8 WG 8.9 International Conference on Research and Practical lssues of Enterprise Information Systems, CONFENIS 2007, 254 VOLUME 1:389–394, 2008.

[29]
M. Cassell. Why governments innovate: Adoption and implementation of open source software by four European cities. International Public Management Journal, 11(2):193–213, 2008. (doi:10.1080/10967490802095680)

[30]
M.F. Casserly and J.E. Bird. Web citation availability. Library Resources and Technical Services, 52(1):42–53, 2008.

[31]
E.-C. Chang and J. Xu. Remote integrity check with dishonest storage server. In Computer Security — ESORICS 2008: 13th European Symposium on Research in Computer Security, pages 223–237, October 2008. Lecture Notes in Computer Science 5283. (doi:10.1007/978-3-540-88313-5-15)

[32]
G. Chen, M. Li, and D. Kotz. Data-centric middleware for context-aware pervasive computing. Pervasive and Mobile Computing, 4(2):216–253, 2008. (doi:10.1016/j.pmcj.2007.10.001)

[33]
G. Chen, C.P. Low, and Z. Yang. Coordinated services provision in peer-to-peer environments. IEEE Transactions on Parallel and Distributed Systems, 19(4):433–446, 2008. (doi:10.1109/TPDS.2007.70745)

[34]
G. Chen, C.P. Low, and Z. Yang. Enhancing search performance in unstructured P2P networks based on users' common interest. IEEE Transactions on Parallel and Distributed Systems, 19(6):821–836, 2008. (doi:10.1109/TPDS.2008.42)

[35]
Q. Chen, S. Zhang, and Y.-P.P. Chen. Rule-based dependency models for security protocol analysis. Integrated Computer-Aided Engineering, 15(4):369–380, 2008.

[36]
Qingfeng Chen, Chengqi Zhang, and Shichao Zhang. Secure Transaction Protocol Analysis: Models and Applications. Springer-Verlag, 2008. Lecture Notes in Computer Science 5111. (doi:10.1007/978-3-540-85074-8_1)

[37]
W. Chen, J. Li, J. Ma, R. Conradi, J. Ji, and C. Liu. An empirical study on software development with open source components in the Chinese software industry. Software Process Improvement and Practice, 13(1):89–100, 2008. (doi:10.1002/spip.361)

[38]
S.-F. Chiang, C.-H. Wu, and S.-D. Wang. An active index diffusion scheme for multilayer unstructured peer-to-peer networks. In ICCCAS 2007 - International Conference on Communications, Circuits and Systems 2007, pages 424–430, 2008. (doi:10.1109/ICCCAS.2007.6251600)

[39]
J. Cho, J.S. Young, and J. Ryu. A new content-related advertising model for interactive television. In IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2008, Broadband Multimedia Symposium 2008, BMSB, 2008. (doi:10.1109/ISBMSB.2008.4536639)

[40]
L.-D. Chou, H.-H. Liang, S.-K. Chen, Y.-S. Wang, C.-N. Yang, and M. Chen. P2p-based distributed qos monitoring systems. Journal of Internet Technology, 9(2):153–159, 2008.

[41]
S. Chung, E. Kim, and J.C.L. Liu. A storage saving scheme to share HD-quality content in community networks. IEEE Transactions on Consumer Electronics, 54(4):1730–1738, 2008. (doi:10.1109/TCE.2008.4711227)

[42]
J.P. Correia and J. Visser. Benchmarking technical quality of software products. In Working Conference on Reverse Engineering, WCRE, pages 297–300, 2008. (doi:10.1109/WCRE.2008.16)

[43]
S. Counsell. Is the need to follow chains a possible deterrent to certain refactorings and an inducement to others? In Proceedings of the 2nd International Conference on Research Challenges in Information Science, RCIS 2008, pages 111–122, 2008. (doi:10.1109/RCIS.2008.4632099)

[44]
F.R.B. Cruz, A.R. Duarte, and T. van Woensel. Buffer allocation in general single-server queueing networks. Computers and Operations Research, 35(11):3581–3598, 2008. (doi:10.1016/j.cor.2007.03.004)

[45]
M. Czyrnek, E. Kuśmierek, C. Mazurek, and M. Stroiński. New services for iTVP content providers to manage live and on-demand content streaming. In Proceedings - 4th International Conference on Automated Solutions for Cross Media Content and Multi-Channel Distribution, Axmedis 2008, pages 180–186, 2008. (doi:10.1109/AXMEDIS.2008.28)

[46]
I. Dacosta, N. Mehta, E. Metrock, and J. Giffin. Security analysis of an IP phone: Cisco 7960G. In IPTComm 2008: Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks — Second International Conference, pages 236–255, July 2008. Lecture Notes in Computer Science 5310. (doi:10.1007/978-3-540-89054-6-12)

[47]
A. D'Aguanno and G. Haus. Audio fingerprint and its applications to peer-to-peer systems. In Audio Engineering Society - 124th Audio Engineering Society Convention 2008, volume 1, pages 86–94, 2008.

[48]
A. Davis. Enterprise resource planning under open source software. Enterprise Resource Planning for Global Economies: Managerial Issues and Challenges, pages 56–76, 2008. (doi:10.4018/978-1-59904-531-3.ch004)

[49]
E.C. De Almeida, G. Sunyé, Y.L. Traon, and P. Valduriez. A framework for testing peer-to-peer systems. In Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pages 167–176, 2008. (doi:10.1109/ISSRE.2008.42)

[50]
J. De Boever. Peer-to-peer content distribution an analysis of the internal and external potentials and obstacles. In WEBIST 2008 - 4th International Conference on Web Information Systems and Technologies, Proceedings, volume 2, pages 367–377, 2008.

[51]
O. De Moor, D. Sereni, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, and J. Tibble. Ql: Object-oriented queries made easy. In Generative and Transformational Techniques in Software Engineering II: International Summer School, GTTSE 2007, pages 78–133, July 2008. Lecture Notes in Computer Science 5235. (doi:10.1007/978-3-540-88643-3_3)

[52]
J.S. De Oliveira Neto and V.F.M. Salvador. Non-functional requirements to voice user interface on interactive television: An initial study. In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information Systems; Proceedings of Interfaces and Human Computer Interaction 2008, pages 77–84, 2008.

[53]
I. De Rezende and F. Siqueira. XOP: Sharing XML data objects through peer-to-peer networks. In AINA 2008: International Conference on Advanced Information Networking and Applications, pages 1021–1027, 2008. (doi:10.1109/AINA.2008.37)

[54]
L. Demir and S. Tunali. A new approach for optimal buffer allocation in unreliable production lines. In 38th International Conference on Computers and Industrial Engineering 2008, volume 2, pages 1962–1970, 2008.

[55]
G.I. Doukidis, K. Pramatari, and G. Lekakos. OR and the management of electronic services. European Journal of Operational Research, 187(3):1296–1309, 2008. (doi:10.1016/j.ejor.2006.09.014)

[56]
G. Exarchakos and N. Antonopoulos. Non-replicable reusable resources discovery on scale-free peer-to-peer networks. In 2nd IEEE International Conference on Digital Ecosystems and Technologies, IEEE-DEST 2008, pages 28–33, 2008. (doi:10.1109/DEST.2008.4635188)

[57]
M.E. Falagas, E.A. Karveli, and V.I. Tritsaroli. The risk of using the internet as reference resource: A comparative study. International Journal of Medical Informatics, 77(4):280–286, 2008. (doi:10.1016/j.ijmedinf.2007.07.001)

[58]
S. Fenz, A. Ekelhart, and E. Weippl. Fortification of IT security by automatic security advisory processing. In AINA 2008: International Conference on Advanced Information Networking and Applications, pages 575–582, 2008. (doi:10.1109/AINA.2008.69)

[59]
O. Ferrer-Roca, F. Marcano, and A. Diaz-Cardama. Quality labels for e-health. IET Communications, 2(2):202–207, 2008. (doi:10.1049/iet-com:20060596)

[60]
N. Folinas, P. Vassiliadis, E. Pitouri, E. Papapetrou, and A. Zarras. Context-aware query processing in ad-hoc environments of peers. Journal of Electronic Commerce in Organizations, 6(1):38–62, 2008.

[61]
G. Fortino and W. Russo. Using P2P, GRID and agent technologies for the development of content distribution networks. Future Generation Computer Systems, 24(3):180–190, 2008. (doi:10.1016/j.future.2007.06.007)

[62]
G. Frantzeskou, S. MacDonell, E. Stamatatos, and S. Gritzalis. Examining the significance of high-level programming features in source code author classification. Journal of Systems and Software, 81(3):447–460, 2008. (doi:10.1016/j.jss.2007.03.004)

[63]
M. Freiberger and S. Huq. Network element security in optical communications equipment. In National Fiber Optic Engineers Conference, NFOEC 2008. Optical Society of America, 2008.

[64]
E.S. Furtado and V. Furtado. A multi-disciplinary strategy for identifying affective usability aspects in educational geosimulation systems. International Journal of Information and Communication Technology Education, 4(1):15–24, 2008.

[65]
A.E. García, A. Berl, K.A. Hummel, R. Weidlich, A. Houyou, K.D. Hackbarth, H. De Meer, and H. Hlavacs. An economical cost model for fair resource sharing in virtual home environments. In 4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings, pages 153–160, 2008. (doi:10.1109/NGI.2008.27)

[66]
M. Garuba, C. Liu, and N. Washington. A comparative analysis of anti-malware software, patch management, and host-based firewalls in preventing malware infections on client computers. In Proceedings — International Conference on Information Technology: New Generations, ITNG 2008, pages 628–632, 2008. (doi:10.1109/ITNG.2008.233)

[67]
M. Gegick, L. Williams, J. Osborne, and M. Vouk. Prioritizing software security fortification through code-level metrics. In Proceedings of the ACM Conference on Computer and Communications Security, pages 31–37, 2008. (doi:10.1145/1456362.1456370)

[68]
R. Gelbard. Decision rule for investment in frameworks of reuse. In Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, pages 140–147. IGI Global, 2008. (doi:10.4018/978-1-59904-887-1.ch010)

[69]
E. Georgiou, M.D. Dikaiakos, and A. Stassopoulou. On the properties of spam-advertised URL addresses. Journal of Network and Computer Applications, 31(4):966–985, 2008. (doi:10.1016/j.jnca.2007.01.003)

[70]
H. Ghanbari and C. Constantinides. An algebraic query method for static program analysis and measurement. In 17th International Conference on Software Engineering and Data Engineering, SEDE 2008, pages 174–181, 2008.

[71]
H. Ghasemalizadeh and M. Razzazi. A distributed web service retrieval and composition method. In 31st International Convention Proceedings: Digital Economy - 5th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers, volume 5, pages 253–258, 2008.

[72]
Robert L. Glass. Open source vs. proprietary software: Yet another answer to the quality comparison. Software Practitioner, pages 1,4, 2008.

[73]
Valery Golender, Ido Ben Moshe, and Shlomo Wygodny. System and method for troubleshooting software configuration problems using application tracing. United States Patent 7,386,839, June 2008.

[74]
K. Gondow, H. Kawashima, and T. Imaizumi. TBCppA: A tracer approach for automatic accurate analysis of C preprocessor's behaviors. In SCAM 2008: 8th IEEE International Working Conference on Source Code Analysis and Manipulation,, pages 35–44, 2008. (doi:10.1109/SCAM.2008.13)

[75]
K. Gondow, H. Kawashima, and T. Imaizumi. TBCppA: Tracer-based C preprocessor analyzer. Computer Software, 25(1):105–123, 2008.

[76]
V.I. Gorodetskii, O.V. Karsaev, V.V. Samoilov, and S.V. Serebryakov. Development tools for open agent networks. Journal of Computer and Systems Sciences International, 47(3):429–446, 2008. (doi:10.1134/S1064230708030131)

[77]
P. Gotthelf, A. Zunino, C. Mateos, and M. Campo. GMAC: An overlay multicast network for mobile agent platforms. Journal of Parallel and Distributed Computing, 68(8):1081–1096, 2008. (doi:10.1016/j.jpdc.2008.04.002)

[78]
P. Grobelny. The expert system approach in development of loosely coupled software with use of domain specific language. In Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, volume 3, pages 119–123, 2008. (doi:10.1109/IMCSIT.2008.4747227)

[79]
T. Guo and S.A. Jarvis. DIAO: A scheme of cooperative data distribution for grid-enabled data analysis applications. In The 3rd Int. Multi-Conf. Computing in the Global Information Technology, ICCGI 2008 in Conjunction with ComP2P 2008: The 1st Int. Workshop on Computational P2P Networks: Theory and Practice, pages 200–209, 2008. (doi:10.1109/ICCGI.2008.26)

[80]
T. Haenselmann, T. King, M. Busse, W. Effelsberg, and M. Fuchs. Embedded script-driven home-automation with sensor networks. 1st IFIP WG 6.2 Home Networking Conference, IHN 2007, 256:225–238, 2008.

[81]
Y. Haining, L.H. Etzkorn, and S. Virani. Automated classification and retrieval of reusable software components. Journal of the American Society for Information Science and Technology, 59(4):613–627, 2008. (doi:10.1002/asi.20775)

[82]
Y. Hanna, H. Rajan, and W. Zhang. Slede: A domain-specific verification framework for sensor network security protocol implementations. In WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security, pages 109–118, 2008. (doi:10.1145/1352533.1352551)

[83]
F. Hashim, M.R. Kibria, and A. Jamalipour. A detection and recovery architecture against DoS and worm attacks in NGMN. In IEEE International Conference on Communications, pages 1675–1679, 2008. (doi:10.1109/ICC.2008.323)

[84]
S. Hatahet, A. Bouabdallah, and Y. Challal. A new worm propagation threat in bittorrent: Modeling and analysis. In Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, volume 3, pages 791–798, 2008. (doi:10.1109/IMCSIT.2008.4747333)

[85]
M.V.J. Heikkinen and H. Hammaınen. Scenario planning of mobile peer-to-peer service usage. In 7th International Conference on Mobile Business, ICMB 2008, Creativity and Convergence, pages 145–152, 2008. (doi:10.1109/ICMB.2008.15)

[86]
Israel Herraiz. A statistical examination of the properties and evolution of libre software. PhD thesis, Universidad Rey Juan Carlos, Madrid, 2008.

[87]
M. Hölzl, A. Rauschmayer, and M. Wirsing. Engineering of software-intensive systems: State of the art and research challenges. In M. Hölzl, A. Rauschmayer, and M. Wirsing, editors, Software-Intensive Systems and New Computing Paradigms: Challenges and Visions, pages 1–44. Springer-Verlag, 2008. Lecture Notes in Computer Science 5380. (doi:10.1007/978-3-540-89437-7-1)

[88]
G. Huang, Y. Zhou, and Y. Zhang. A small world routing model for structured P2P systems. In 2008 International Symposium on Information Science and Engineering, ISISE 2008, pages 632–636, 2008. (doi:10.1109/ISISE.2008.332)

[89]
D. Hull, S.R. Pettifer, and D.B. Kell. Defrosting the digital library: Bibliographic tools for the next generation web. PLoS Computational Biology, 4(10), 2008. (doi:10.1371/journal.pcbi.1000204)

[90]
P. Hyojin, Y. Jinhong, P. Juyoung, G.K. Shin, and K.C. Jun. A survey on peer-to-peer overlay network schemes. In International Conference on Advanced Communication Technology, ICACT, volume 2, pages 986–988, 2008. (doi:10.1109/ICACT.2008.4493931)

[91]
Indratmo and J. Vassileva. A review of organizational structures of personal information management. Journal of Digital Information, 9(26), 2008.

[92]
C. Isen, L. John, P.C. Jung, and J.S. Hyo. On the representativeness of embedded Java benchmarks. In 2008 IEEE International Symposium on Workload Characterization, IISWC'08, pages 153–162, 2008. (doi:10.1109/IISWC.2008.4636100)

[93]
H. Ito. Available bandwidth and minimum bandwidth delivery methods for video delivery and video replication. In 5th International Conference on Information Technology and Applications, ICITA 2008, pages 828–833, 2008.

[94]
K. Iwasaki, M. Kanbara, K. Yamazawa, and N. Yokoya. Construction of extended geographical database based on photo shooting history. In CIVR 2008: Proceedings of the International Conference on Content-based Image and Video Retrieval, pages 185–194, 2008. (doi:10.1145/1386352.1386381)

[95]
G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware: From a survey towards an established taxonomy. Journal in Computer Virology, 4(3):251–266, 2008. (doi:10.1007/s11416-008-0086-0)

[96]
Stéephane Ducasse Jannik Laval, Alexandre Bergel. Assessing the quality of your software with MoQam. In FAMOOSr 2008: 2nd Workshop on FAMIX and Moose in Reengineering, pages 1–4, 2008.

[97]
E. Jeschke, B. Bon, T. Inagaki, and S. Streeper. A framework for the subaru telescope observation control system based on the command design pattern. In Proceedings of SPIE - The International Society for Optical Engineering, volume 7019, 2008. (doi:10.1117/12.788073)

[98]
H. Jiang, J. Li, Z. Li, and X. Bai. Performance evaluation of content distribution in hybrid CDN-P2P network. In Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, pages 188–193, 2008. (doi:10.1109/FGCN.2008.63)

[99]
H. Jiang, J. Li, Z. Li, and J. Liu. Efficient hierarchical content distribution using P2P technology. In Proceedings of the 2008 16th International Conference on Networks, ICON 2008, 2008. (doi:10.1109/ICON.2008.4772628)

[100]
H. Jiang, J. Liu, J. Li, and Z. Li. A scalable system for large-scale multimedia distribution based on hybrid networks. In International Conference on Communication Technology Proceedings, ICCT, pages 584–587, 2008. (doi:10.1109/ICCT.2008.4716134)

[101]
Z. Joseph, G. Das, and L. Fegaras. Distinct value estimation on peer-to-peer networks. In 1st International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2008, 2008. (doi:10.1145/1389586.1389617)

[102]
E.-H. Jung and Y.-J. Park. TinyONet: A cache-based sensor network bridge enabling sensing data reusability and customized wireless sensor network services. Sensors, 8(12):7930–7950, 2008. (doi:10.3390/s8127930)

[103]
E. Kageyama, C. Maziero, and A. Santin. An experimental peer-to-peer e-mail system. In CSE 2008: IEEE 11th International Conference on Computational Science and Engineering, pages 203–208, 2008. (doi:10.1109/CSE.2008.9)

[104]
E. Kageyama, C. Maziero, and A. Santin. A pull-based e-mail architecture. In Proceedings of the ACM Symposium on Applied Computing, pages 468–472, 2008. (doi:10.1145/1363686.1363802)

[105]
A. Keramati, B. Hadjiha, and M.S. Saremi. A proposal framework for adoption of electronic payment services by iranian customers. In IEEE International Conference on Industrial Informatics (INDIN), pages 592–597, 2008. (doi:10.1109/INDIN.2008.4618169)

[106]
Z. Khallouf. Trust management in peer-to-peer SIP using the security assertion markup language. In ICTTA 2008: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008. (doi:10.1109/ICTTA.2008.4530277)

[107]
A. Klenk, M. Kleis, B. Radier, S. Elmoumouhi, G. Carle, and M. Salaun. Towards autonomic service control in next generation networks. In ICAS 2008: 4th International Conference on Autonomic and Autonomous Systems, pages 266–271, 2008. (doi:10.1109/ICAS.2008.22)

[108]
M. Knoll, H. Abbadi, and T. Weis. Replication in peer-to-peer systems. Lecture Notes in Computer Science, 5343:35–46, 2008. (doi:10.1007/978-3-540-92157-8-4)

[109]
H.J. Ko, K.I. Kim, E.J. Lee, W.G. Choi, and U.M. Kim. An effective XML data release in dynamic environments. In Proceedings — 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008, pages 182–189, 2008. (doi:10.1109/ICHIT.2008.222)

[110]
H.L. Koch and D.W. Johnson. Are home-based sales representatives aware and proactive regarding security risks in the internet era? Journal of Internet Commerce, 7(3):379–402, 2008. (doi:10.1080/15332860802250492)

[111]
T. Kosar, P.E. Martínez López, P.A. Barrientos, and M. Mernik. A preliminary study on various implementation approaches of domain-specific language. Information and Software Technology, 50(5):390–405, 2008. (doi:10.1016/j.infsof.2007.04.002)

[112]
T. Koskela, J. Julkunen, J. Korhonen, M. Liu, and M. Ylianttila. Leveraging collaboration of peer-to-peer and web services. In Proceedings — The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008, pages 496–501, 2008. (doi:10.1109/UBICOMM.2008.24)

[113]
T. Koskela, O. Kassinen, J. Korhonen, Z. Ou, and M. Ylianttila. Peer-to-peer community management using structured overlay networks. In Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility'08, 2008. (doi:10.1145/1506270.1506283)

[114]
K. Kotapati, P. Liu, and T.F. LaPorta. EndSec: An end-to-end message security protocol for mobile telecommunication networks. In WoWMoM 2008: IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, 2008. (doi:10.1109/WOWMOM.2008.4594919)

[115]
B.R. Krogstie. Power through brokering: Open source community participation in software engineering student projects. In Proceedings - International Conference on Software Engineering, pages 791–800, 2008. (doi:10.1145/1368088.1368201)

[116]
H.C.W. Lau, T.M. Chan, and W.T. Tsui. Fuzzy logic guided genetic algorithms for the location assignment of items. In 2007 IEEE Congress on Evolutionary Computation, CEC 2007, pages 4281–4288, 2008. (doi:10.1109/CEC.2007.4425030)

[117]
H.C.W. Lau, T.M. Chan, and W.T. Tsui. Item-location assignment using fuzzy logic guided genetic algorithms. IEEE Transactions on Evolutionary Computation, 12(6):765–780, 2008. (doi:10.1109/TEVC.2008.924426)

[118]
C.-H. Li, G.-F. Feng, T.-C. Gu, S.-L. Lu, and D.-X. Chen. Hotspots-free overlay cooperative caching scheme. Ruan Jian Xue Bao/Journal of Software, 19(3):744–754, 2008. (doi:10.3724/SP.J.1001.2008.00744)

[119]
D.-C. Li, H.-B. Sun, and Z.-H. Xin. Relativity analysis on wireless value-added services market and SP regulation. Tongxin Xuebao/Journal on Communication, 29(2):116–122, 2008.

[120]
F. Li, T. Iida, and Y. Ishikawa. Traceable P2P record exchange: A database-oriented approach. Frontiers of Computer Science in China, 2(3):257–267, 2008. (doi:10.1007/s11704-008-0028-5)

[121]
K. Li, X. Sun, and Y. He. Duty-oriented hybrid peer-to-peer network based on metadata. In International Symposium on Advances in Computer and Sensor Networks and Systems, 2008. Aardvark Global Publishing, 2008.

[122]
T. Li, J. Wang, and J. You. Using degree-based strategy for network coding in content distribution network. In Proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008, pages 487–491, 2008. (doi:10.1109/ICCEE.2008.20)

[123]
F.-R. Lin, H.-M. Lo, and C.-R. Wang. Can a p2p file-sharing network become an e-marketplace? In Proceedings of the Annual Hawaii International Conference on System Sciences, 2008. (doi:10.1109/HICSS.2008.86)

[124]
S.-J. Lin, M.-C. Huang, K.-C. Lai, and K.-C. Huang. Design and implementation of job migration policies in p2p grid systems. In Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pages 75–80, 2008. (doi:10.1109/APSCC.2008.246)

[125]
M. Lindgren, R. Land, C. Norström, and A. Wall. Key aspects of software release planning in industry. In ASWEC 2008: Proceedings of the Australian Software Engineering Conference, pages 320–329, 2008. (doi:10.1109/ASWEC.2008.4483220)

[126]
M. Lindgren, A. Wall, R. Land, and C. Norstr?m. A method for balancing short- and long-term investments: Quality vs. features. In EUROMICRO 2008 - Proceedings of the 34th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2008, pages 175–182, 2008. (doi:10.1109/SEAA.2008.22)

[127]
Y. Liu, G. Guo, and J. Qi. An algorithm of system decomposition based on Laplace spectral graph partitioning technology. In Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008, volume 2, pages 85–89, 2008. (doi:10.1109/CSSE.2008.1015)

[128]
Y. Liu, C. Yang, K. Xu, and H. Chen. Controlling mechanism for the hubs in peer-to-peer networks. In Proceedings - 2008 International Conference on Computational Intelligence and Security, CIS 2008, volume 1, pages 511–515, 2008. (doi:10.1109/CIS.2008.109)

[129]
Y. Liu, C. Yang, K. Xu, and H. Chen. A fair utility function for incentive mechanism against free-riding in peer-to-peer networks. In ruSMART 2008: 8th International Conference, NEW2AN and 1st Russian Conference on Smart Spaces — Next Generation Teletraffic and Wired/Wireless Advanced Networking, pages 222–233, 2008. Lecture Notes in Computer Science 5174. (doi:10.1007/978-3-540-85500-2_20)

[130]
Y. Liu, L. Zhu, J. Gao, and W. Cheng. A research about redundant data packet in unstructured P2P network. In HPCC 2008: 10th IEEE International Conference on High Performance Computing and Communications,, pages 653–658, 2008. (doi:10.1109/HPCC.2008.75)

[131]
Y. Liu, L. Zhu, J. Gao, and Y. Li. A segment strategy based on flooding search in unstructured P2P network. In Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, volume 1, pages 252–255, 2008. (doi:10.1109/FGCN.2008.201)

[132]
Y.-H. Liu, J.-S. Yih, F. Pinel, and T. Chieu. A model-driven SOA implementation of multi-channel Websphere Commerce Gift Center. In IEEE International Conference on e-Business Engineering, ICEBE'08 - Workshops: AiR'08, EM2I'08, SOAIC'08, SOKM'08, BIMA'08, DKEEE'08, pages 29–34, 2008. (doi:10.1109/ICEBE.2008.96)

[133]
J.-W. Lo, M.-S. Hwang, and Y.-P. Chu. An exchangeable e-cash scheme by e-mint. In Proceedings - 8th International Conference on Intelligent Systems on Intelligent Systems Design and Applications, ISDA 2008, volume 3, pages 246–251, 2008. (doi:10.1109/ISDA.2008.186)

[134]
M. Lopez, J. Whalley, P. Robbins, and R. Lister. Relationships between reading, tracing and writing skills in introductory programming. In ICER'08 - Proceedings of the ACM Workshop on International Computing Education Research, pages 101–111, 2008. (doi:10.1145/1404520.1404531)

[135]
R.P. Loui. In praise of scripting: Real programming pragmatism. Computer, 41(7):22–26, 2008. (doi:10.1109/MC.2008.228)

[136]
X.-C. Lu and D.-S. Li. Overlay technologies for internet-based virtual computing environment. Jisuanji Xuebao/Chinese Journal of Computers, 31(9):1516–1524, 2008.

[137]
D.F. Macedo, A.L. Dos Santos, and G. Pujolle. From TCP/IP to convergent networks: Challenges and taxonomy. IEEE Communications Surveys and Tutorials, 10(4):40–55, 2008. (doi:10.1109/SURV.2008.080405)

[138]
J. Mallet and S. Rouvrais. Style-based model transformation for early extrafunctional analysis of distributed systems. Lecture Notes in Computer Science, 5281 LNCS:55–70, 2008. (doi:10.1007/978-3-540-87879-7-4)

[139]
T. Mandl. Automatic quality assessment for internet pages. In Handbook of Research on Web Information Systems Quality, pages 104–112. IGI Global, 2008. (doi:10.4018/978-1-59904-847-5.ch006)

[140]
M.R. Martınez Torres, S.L. Toral Marın, and F.J. Barrero Garcıa. Study and analysis of open source software projects mailing lists as a tool for knowledge sharing. Investigaciones Europeas de Direccion y Economia de la Empresa, 14(3):79–90, 2008. (doi:10.1016/S1135-2523(12)60068-9)

[141]
D. Matthews, G. Wilson, and S. Easterbrook. Configuration management for large-scale scientific computing at the UK met office. Computing in Science and Engineering, 10(6):56–64, 2008. (doi:10.1109/MCSE.2008.144)

[142]
F. Menczer, L.-S. Wu, and R. Akavipat. Intelligent peer networks for collaborative web search. AI Magazine, 29(3):35–46, 2008.

[143]
S. Montanelli and S. Castano. Semantically routing queries in peer-based systems: The H-Link approach. Knowledge Engineering Review, 23(1):51–72, 2008. (doi:10.1017/S0269888907001257)

[144]
E. Mourtou. Modelling access control in a greek public hospital. Journal on Information Technology in Healthcare, 6(3):230–239, 2008.

[145]
J.L. Muñoz, O. Esparza, J. Forné, and E. Pallares. H-OCSP: A protocol to reduce the processing burden in online certificate status validation. Electronic Commerce Research, 8(4):255–273, 2008. (doi:10.1007/s10660-008-9024-y)

[146]
E. Murphy-Hill, A.P. Black, D. Dig, and C. Parnin. Gathering refactoring data: A comparison of four methods. In Proceedings of the 2nd Workshop on Refactoring Tools, WRT '08, in conjunction with the Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2008, 2008. (doi:10.1145/1636642.1636649)

[147]
A. Nabih, A. Hossain, S. Shepherd, and M. Khaled. "where you are" based authentication: An improved security protocol using BAN logic. In 7th European Conference on Information Warfare and Security 2008, ECIW 2008, pages 153–162, 2008.

[148]
P. Naubourg, V. Lopes, and L. Bossu. A case study of open source software development in proteomic area: The LIMS ePims. In SITIS 2008 — Proceedings of the 4th International Conference on Signal Image Technology and Internet Based Systems, pages 555–562, 2008. (doi:10.1109/SITIS.2008.83)

[149]
A. Ng, H. Grimm, T. Lezama, A. Persson, M. Andersson, and M. Jag̈stam. OPTIMISE: An internet-based platform for metamodel-assisted simulation optimization. International Conference on Communication Systems and Electrical Engineering, 4 LNEE:281–296, 2008. (doi:10.1007/978-0-387-74938-9_20)

[150]
T. Nguyen, T. Wolf, and D. Damian. Global software development and delay: Does distance still matter? In ICGSE 2008: 3rd IEEE International Conference Global Software Engineering, pages 45–54, 2008. (doi:10.1109/ICGSE.2008.39)

[151]
J. Ni, J. Lin, S.J. Harrington, and N. Sharma. Designing file replication schemes for peer-to-peer file sharing systems. In IEEE International Conference on Communications, pages 5609–5613, 2008. (doi:10.1109/ICC.2008.1051)

[152]
M. Obrist, R. Bernhaupt, and M. Tscheligi. Interactive TV for the home: An ethnographic study on users' requirements and experiences. International Journal of Human-Computer Interaction, 24(2):174–196, 2008. (doi:10.1080/10447310701821541)

[153]
G. Oleksik, D. Frohlich, L.M. Brown, and A. Sellen. Sonic interventions: Understanding and extending the domestic soundscape. In Conference on Human Factors in Computing Systems - Proceedings, pages 1419–1428, 2008. (doi:10.1145/1357054.1357277)

[154]
H. Park and M. Van Der Schaar. Coalition based multimedia peer matching strategies for P2P networks. In Proceedings of SPIE — The International Society for Optical Engineering, volume 6822, 2008. Article number 682203. (doi:10.1117/12.766578)

[155]
H. Park and M. Van Der Schaar. Coalition-based resource reciprocation strategies for P2P multimedia broadcasting. IEEE Transactions on Broadcasting, 54(3):557–567, 2008. (doi:10.1109/TBC.2008.2001148)

[156]
M. Pathan and R. Buyya. A taxonomy of CDNs. Lecture Notes in Electrical Engineering, 9 LNEE:33–77, 2008. (doi:10.1007/978-3-540-77887-5_2)

[157]
M. Pathan, R. Buyya, and A. Vakali. Content delivery networks: State of the art, insights, and imperatives. Lecture Notes in Electrical Engineering, 9 LNEE:3–32, 2008. (doi:10.1007/978-3-540-77887-5_1)

[158]
M.J.V. Pereira, M. Mernik, D. da Cruz, and P.R. Henriques. Program comprehension for domain-specific languages. Computer Science and Information Systems, 5(2):1–17, 2008. (doi:10.2298/CSIS0802001P)

[159]
L.S.G. Piccolo, M.C.C. Baranauskas, and E. Furtado. A t-gov prototype evaluation considering a wide diversity of users. In MCCSIS'08 - IADIS Multi Conference on Computer Science and Information Systems; Proceedings of Interfaces and Human Computer Interaction 2008, pages 27–34, 2008.

[160]
E.S. Poole, M. Chetty, R.E. Grinter, and K.W. Edwards. More than meets the eye: Transforming the user experience of home network management. In Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS, pages 455–464, 2008. (doi:10.1145/1394445.1394494)

[161]
C.R. Prause and M. Eisenhauer. Social aspects of a continuous inspection platform for software source code. In Proceedings - International Conference on Software Engineering, pages 85–88, 2008. (doi:10.1145/1370114.1370136)

[162]
A. Qamra and E.Y. Chang. Scalable landmark recognition using extent. Multimedia Tools and Applications, 38(2):187–208, 2008. (doi:10.1007/s11042-007-0178-8)

[163]
C. Rahhal, H. Skaf-Molli, and P. Molli. SWOOKI: A peer-to-peer semantic wiki. In CEUR Workshop Proceedings, volume 360, pages 124–125, 2008.

[164]
C.  r Ahlund, S. Wallin, K. Andersson, and R. Brännström. A service level model and internet mobility monitor. Telecommunication Systems, 37(1-3):49–70, 2008. (doi:10.1007/s11235-008-9072-6)

[165]
J. Ramırez, L. Gimson, G. Gil, E. Fernández, D. Romero, D. Arias, A. Vera, and E. Sanchez. The reuse of libraries in moodle: Impact on the estimation of the development of a similar platform. In 7th Ibero-American Conference on Systems, Cybernetics and Informatics, CISCI 2008, Jointly with the 5th Ibero-American Symposium on Education, Cybernetics and Informatics, SIECI 2008 and 3rd Int. Symp. on Knowledge Communication and Conf. CCC 2008, volume 2, pages 194–198. International Institute of Informatics and Systemics, IIIS, 2008.

[166]
H. Reza, K. Ogaard, and A. Malge. A model based testing technique to test web applications using StateCharts. In Proceedings — International Conference on Information Technology: New Generations, ITNG 2008, pages 183–188, 2008. (doi:10.1109/ITNG.2008.145)

[167]
M. Rice and N. Alm. Designing new interfaces for digital interactive television usable by older adults. Computers in Entertainment, 6(1), May 2008. (doi:10.1145/1350843.1350849)

[168]
A. Roczniak, A.E. Saddik, and R. Kouhi. Design of application-specific incentives in p2p networks. In Proceedings - 12th 2008 IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2008, pages 194–203, 2008. (doi:10.1109/DS-RT.2008.17)

[169]
L. Rodero Merino, L. López, A. Fernández, and V. Cholvi. DANTE: A self-adapting peer-to-peer system. In Agents and Peer-to-Peer Computing: 5th International Workshop, AP2PC 2006, pages 31–42, May 2008. Lecture Notes in Computer Science 4461. (doi:10.1007/978-3-540-79705-0_3)

[170]
M. Rohr, A. Van Hoorn, J. Matevska, N. Sommer, L. Stoever, S. Giesecke, and W. Hasselbring. Kieker: Continuous monitoring and on demand visualization of Java software behavior. In Proceedings of the IASTED International Conference on Software Engineering, SE 2008, pages 80–85, 2008.

[171]
N.C. Romano Jr. and J. Fjermestad. Privacy and security in the age of electronic customer relationship management. In Selected Readings on Electronic Commerce Technologies: Contemporary Applications, pages 310–332. IGI Global, 2008. (doi:10.4018/978-1-60566-096-7.ch022)

[172]
P. Rosner and S. Viswanathan. Visualisation of coupling and programming to interface for object-oriented systems. In Proceedings of the International Conference on Information Visualisation, pages 575–581, 2008. (doi:10.1109/IV.2008.96)

[173]
J.A. Roy, F. Koushanfar, and I.L. Markov. Circuit CAD tools as a security threat. In HOST 2008: IEEE International Workshop on Hardware-Oriented Security and Trust, pages 65–66, 2008. (doi:10.1109/HST.2008.4559052)

[174]
S. Rueda, P. Morillo, and J.M. Orduña. A comparative study of awareness methods for peer-to-peer distributed virtual environments. Computer Animation and Virtual Worlds, 19(5):537–552, 2008. (doi:10.1002/cav.230)

[175]
F. Safaei, A. Khonsari, M. Fathy, and M. Ould-Khaoua. Performance modelling of pipelined circuit switching in hypercubes with hot spot traffic. Microprocessors and Microsystems, 32(1):10–22, 2008. (doi:10.1016/j.micpro.2007.09.002)

[176]
M.B. Salem, S. Hershkop, and S.J. Stolfo. A survey of insider attack detection research. Advances in Information Security, 39:69–70, 2008.

[177]
S. Sarkar, R. Sindhgatta, and K. Pooloth. A collaborative platform for application knowledge management in software maintenance projects. In COMPUTE 2008 - The 1st ACM Bangalore Annual Conference, 2008. (doi:10.1145/1341771.1341774)

[178]
M.I. Sarwar, W. Tanveer, I. Sarwar, and W. Mahmood. A comparative study of MI tools: Defining the roadmap to MI tools standardization. In IEEE INMIC 2008: 12th IEEE International Multitopic Conference - Conference Proceedings, pages 379–385, 2008. (doi:10.1109/INMIC.2008.4777767)

[179]
J. Schäfer, K. Malinka, and P. Hanáček. Malware spreading models in peer-to-peer networks. In International Carnahan Conference on Security Technology, pages 339–345, 2008. (doi:10.1109/CCST.2008.4751325)

[180]
J. Schäfer, K. Malinka, and P. Hanáček. Peer-to-peer networks security. In ICIMP 2008: The 3rd International Conference on Internet Monitoring and Protection, pages 74–79, 2008. (doi:10.1109/ICIMP.2008.26)

[181]
A.U. Schmidt. On the superdistribution of digital goods. In 3rd International Conference on Communications and Networking in China, ChinaCom 2008, pages 1337–1344, 2008. (doi:10.1109/CHINACOM.2008.4685251)

[182]
S. Schosser, K. Böhm, and B. Vogt. Do humans identify efficient strategies in structured peer-to-peer systems? In 7th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2008, volume 3, pages 1481–1484. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2008.

[183]
S. Schosser, K. Böhm, and B. Vogt. Online vs. offline behavior: How to design strategic agents for distributed coordinator-free environments. In Proceedings - 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008, pages 48–56, 2008. (doi:10.1109/WIIAT.2008.10)

[184]
Robert C. Seacord. The CERT C Secure Coding Standard. Addison-Wesley, Boston, MA, 2008.

[185]
F.J. Seifert. Safety from deception through broadband coding the Austrian victory over the hackers at Graz in 1991. Elektrotechnik und Informationstechnik, 125(11), 2008. In German (Täuschungssicherheit durch Breitbandige Verschlüsselung Der Österreichische Sieg uber die Hacker bei Graz 1991). (doi:10.1007/s00502-008-0588-y)

[186]
D. Sereni, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, and J. Tibble. QL: Object-oriented queries made easy. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5235 LNCS:78–133, 2008. (doi:10.1007/978-3-540-88643-3-3)

[187]
V. Sesum-Cavic and E. Küehn. Instantiation of a generic model for load balancing with intelligent algorithms. Lecture Notes in Computer Science, 5343:311–317, 2008. (doi:10.1007/978-3-540-92157-8-31)

[188]
P.C. Sethia, S.K. Somani, and A.I. Khandwawala. Enhancing reliability of a continuous manufacturing system using WIP buffers. International Journal of Simulation Modelling, 7(2):61–70, 2008. (doi:10.2507/IJSIMM07(2)1.098)

[189]
N. Seyff, F. Graf, P. Grünbacher, and N. Maiden. Mobile discovery of requirements for context-aware systems. In Requirements Engineering: Foundation for Software Quality, pages 183–197, 2008. Lecture Notes in Computer Science 5025. (doi:10.1007/978-3-540-69062-7_18)

[190]
Z. Shen, W. Yongji, and X. Junchao. Mining individual performance indicators in collaborative development using software repositories. In APSEC 08: 15th Asia-Pacific Software Engineering Conference, pages 247–254, December 2008. (doi:10.1109/APSEC.2008.12)

[191]
S. Shirali-Shahreza and M. Shirali-Shahreza. Various aspects of open source software development. In ITSim '08: International Symposium on Information Technology, volume 3, 2008. (doi:10.1109/ITSIM.2008.4631871)

[192]
S.A. Sioutas. NBDT: An efficient P2P indexing scheme for web service discovery. International Journal of Web Engineering and Technology, 4(1):95–113, 2008. (doi:10.1504/IJWET.2008.016106)

[193]
J.A. Solworth. Instant revocation. In Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, pages 31–48, 2008. Lecture Notes in Computer Science 5057. (doi:10.1007/978-3-540-69485-4_3)

[194]
K. Somasundaram and S. Radhakrishnan. Nimble protein sequence alignment in grid (NPSAG). Journal of Computer Science, 4(1):36–41, 2008.

[195]
A.M. Sourouni, S. Mouzakitis, D. Askounis, and G. Velegrakis. An ontology-based e-business transactions registry. In MCCSIS'08 — IADIS Multi Conference on Computer Science and Information Systems; Proceedings e-Commerce 2008, pages 86–93, 2008.

[196]
G. Spanoudakis, C. Kloukinas, and K. Androutsopoulos. Dynamic verification and control of mobile peer-to-peer systems. In ICIMP 2008: The 3rd International Conference on Internet Monitoring and Protection, pages 1–10, 2008. (doi:10.1109/ICIMP.2008.11)

[197]
C. Spielvoge, L. Böszörmenyi, and P. Kropf. A demo for affinity based content delivery architectures. In Proceedings of the International Workshop on Network and Operating System Support for Digital Audio and Video, pages 107–108, 2008. (doi:10.1145/1496046.1496071)

[198]
C. Stern, P. Adelt, V. Krummel, and M.R. Ackermann. Reliable evidence of data integrity from an untrusted storage service. In Proceedings - 4th International Conference on Networking and Services, ICNS 2008, pages 24–29, 2008. (doi:10.1109/ICNS.2008.28)

[199]
Sufatrio and R.H.C. Yap. Extending BAN logic for reasoning with modern PKI-based protocols. In 2008 IFIP International Conference on Network and Parallel Computing, NPC 2008, pages 190–197, 2008. (doi:10.1109/NPC.2008.86)

[200]
W. Sun, R. Sekar, Z. Liang, and V.N. Venkatakrishnan. Expanding malware defense by securing software installations. In DIMVA 2008: 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 164–185, July 2008. Lecture Notes in Computer Science 5137. (doi:10.1007/978-3-540-70542-0_9)

[201]
X. Sun, K. Li, Y. Liu, and Y. Tian. SLUP: A semantic-based and location-aware unstructured p2p network. In HPCC 2008: 10th IEEE International Conference on High Performance Computing and Communications, pages 288–295, 2008. (doi:10.1109/HPCC.2008.49)

[202]
X. Sun, Y. Tian, Y. Liu, and Y. He. An unstructured P2P network model for efficient resource discovery. In 1st International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2008, pages 156–161, 2008. (doi:10.1109/ICADIWT.2008.4664336)

[203]
L. Swan, A.S. Taylor, and R. Harper. Making place for clutter and other ideas of home. ACM Transactions on Computer-Human Interaction, 15(2), 2008. (doi:10.1145/1375761.1375764)

[204]
W. Taha. Domain-specific languages. In 2008 International Conference on Computer Engineering and Systems, ICCES 2008, 2008. (doi:10.1109/ICCES.2008.4772953)

[205]
I. Tamanini, T.C. Sampaio Machado, M.S. Mendes, A.L. Carvalho, M.E.S. Furtado, and P.R. Pinheiro. A model for mobile television applications based on verbal decision analysis. In Advances in Computer and Information Sciences and Engineering, pages 399–404, 2008.

[206]
X. Tang, J. Xu, and W.-C. Lee. Analysis of TTL-based consistency in unstructured peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 19(12):1683–1694, 2008. (doi:10.1109/TPDS.2008.44)

[207]
A. Telea and L. Voinea. A tool for optimizing the build performance of large software code bases. In CSMR 2008: Proceedings of the European Conference on Software Maintenance and Reengineering,, pages 323–325, 2008. (doi:10.1109/CSMR.2008.4493340)

[208]
A. Tiwana. Impact of classes of development coordination tools on software development performance: A multinational empirical study. ACM Transactions on Software Engineering and Methodology, 17(2), 2008. (doi:10.1145/1348250.1348257)

[209]
P. Traynor, P. McDaniel, and T.L. Porta. Security for telecommunications networks. Advances in Information Security, 40:1–177, 2008.

[210]
M. Tu, N. Tadayon, and E. Lu. A scalable update protocol for peer-to-peer data grids. In Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, pages 826–832, 2008.

[211]
F. Turkmen, P. Mazzoleni, B. Crispo, and E. Bertino. P-CDN: Extending access control capabilities of P2P systems to provide CDN services. In Proceedings — IEEE Symposium on Computers and Communications, pages 480–486, 2008. (doi:10.1109/ISCC.2008.4625671)

[212]
J. Ubacht and J.L.M. Vrancken. Next generation policy for the E-communications sector: The role of the end user and technology. In International Telecommunication Union - Proceedings of the 1st ITU-T Kaleidoscope Academic Conference, Innovations in NGN, K-INGN, 2008. (doi:10.1109/KINGN.2008.4542296)

[213]
D. Ueno. Linenum info: System support for code reading. In ICALT 2008: The 8th IEEE International Conference on Advanced Learning Technologies, pages 600–602, 2008. (doi:10.1109/ICALT.2008.162)

[214]
M. Umarji, S.E. Sim, and C. Lopes. Archetypal internet-scale source code searching. In Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, pages 257–263. IFIP: International Federation for Information Processing, Springer, September 2008. (doi:10.1007/978-0-387-09684-1_21)

[215]
S. Van Der Gaast and D. Bijwaard. Efficiency of personalized content distribution. Bell Labs Technical Journal, 13(2):135–146, 2008. (doi:10.1002/bltj.20309)

[216]
M. Van Der Schaar, D.S. Turaga, and R. Sood. Stochastic optimization for content sharing in P2P systems. IEEE Transactions on Multimedia, 10(1):132–143, 2008. (doi:10.1109/TMM.2007.911288)

[217]
L. Van Velsen, T. Van Der Geest, R. Klaassen, and M. Steehouder. User-centered evaluation of adaptive and adaptable systems: A literature review. Knowledge Engineering Review, 23(3):261–281, 2008. (doi:10.1017/S0269888908001379)

[218]
Eelco Visser. WebDSL: A case study in domain-specific language engineering. In Generative and Transformational Techniques in Software Engineering II: International Summer School, GTTSE 2007, pages 291–373, July 2008. Lecture Notes in Computer Science 5235. (doi:10.1007/978-3-540-88643-3_7)

[219]
H. Wang and P. Van Mieghem. Constructing the overlay network by tuning link weights. In Proceedings of the Second International Conference on Communications and Networking in China, ChinaCom 2007, pages 139–143, 2008. (doi:10.1109/CHINACOM.2007.4469347)

[220]
Y. Wen and H.-M. Wang. Isolated execution model based on local virtualization technology. Jisuanji Xuebao/Chinese Journal of Computers, 31(10):1768–1779, 2008.

[221]
T. Wolf, T. Nguyen, and D. Damian. Does distance still matter? Software Process Improvement and Practice, 13(6):493–510, 2008. (doi:10.1002/spip.401)

[222]
J.D. Wren. URL decay in MEDLINE — a 4-year follow-up study. Bioinformatics, 24(11):1381–1385, 2008. (doi:10.1093/bioinformatics/btn127)

[223]
H. Wu, J. Gray, and M. Mernik. Grammar-driven generation of domain-specific language debuggers. Software - Practice and Experience, 38(10):1073–1103, 2008. (doi:10.1002/spe.863)

[224]
H. Yamamoto, J. Abu Qudeiri, and E. Marui. Definition of FTL with bypass lines and its simulator for buffer size decision. International Journal of Production Economics, 112(1):18–25, 2008. (doi:10.1016/j.ijpe.2007.03.007)

[225]
M.K.H. Yeung and Y.-K. Kwok. Game theoretic peer selection for resilient peer-to-peer media streaming systems. In ICDCS 2008: The 28th International Conference on Distributed Computing Systems, pages 817–824, 2008. (doi:10.1109/ICDCS.2008.69)

[226]
H. Yin, C. Lin, Q. Zhang, and Z. and Chen. TrustStream: A secure and scalable architecture for large-scale internet media streaming. IEEE Transactions on Circuits and Systems for Video Technology, 18(12):1692–1702, 2008. (doi:10.1109/TCSVT.2008.927000)

[227]
U.H. Yoon, K.-I. Jeong, K.-L. Park, H. Jiyon, A. Jaemin, S. Jeonghwa, and S.-D. Kim. Reducing the discovery overheads in a DHT based P2P network by using virtual resources. In Proceedings of 19th International Conference on Systems Engineering, ICSEng 2008, pages 368–374, 2008. (doi:10.1109/ICSEng.2008.63)

[228]
M. Yoshida and K. Sakamoto. Performance comparison of load balancing algorithms through code migration in distributed desktop computing grids. In Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pages 781–788, 2008. (doi:10.1109/APSCC.2008.60)

[229]
L. Youseff, M. Butrico, and D. Da Silva. Toward a unified ontology of cloud computing. In Grid Computing Environments Workshop, GCE 2008, 2008. (doi:10.1109/GCE.2008.4738443)

[230]
L. Yuhua, Y. Chun, X. Kaihua, and C. Hongcai. Rank-based incentive mechanism for peer-to-peer networks. In 4th International Conference on Natural Computation, ICNC 2008, volume 5, pages 252–256, 2008. (doi:10.1109/ICNC.2008.641)

[231]
M. Yuzukirmizi and J. M. Smith. Optimal buffer allocation in finite closed networks with multiple servers. Computers and Operations Research, 35(8):2579–2598, 2008. (doi:10.1016/j.cor.2006.12.008)

[232]
V. Zadorozhny, L. Raschid, and A. Gal. Scalable catalog infrastructure for managing access costs and source selection in wide area networks. International Journal of Cooperative Information Systems, 17(1):77–109, March 2008. (doi:10.1142/S0218843008001786)

[233]
A. Zaidman and S. Demeyer. Automatic identification of key classes in a software system using webmining techniques. Journal of Software Maintenance and Evolution, 20(6):387–417, 2008. (doi:10.1002/smr.370)

[234]
C.M. Zapata and J.D. Velásquez. Algunas pautas para la escritura de artículos científicos. Ingeniare, 16(2):128–137, 2008. (Some hints for writing scientific papers.) In Spanish.

[235]
Z. Zeng and B. Veeravalli. On the design of distributed object placement and load balancing strategies in large-scale networked multimedia storage systems. IEEE Transactions on Knowledge and Data Engineering, 20(3):369–382, 2008. (doi:10.1109/TKDE.2007.190694)

[236]
H.L. Zhang, C.H.C. Leung, and G.K. Raikundalia. Topological analysis of AOCD-based agent networks and experimental results. Journal of Computer and System Sciences, 74(2):255–278, 2008. (doi:10.1016/j.jcss.2007.04.006)

[237]
S. Zhang, Y. Wang, and J. Xiao. Mining individual performance indicators in collaborative development using software repositories. In Proceedings — Asia-Pacific Software Engineering Conference, APSEC, pages 247–254, 2008.

[238]
W. Zhangjin, H. Xingwen, D. Ying, Z. Rui, and Z. Qingguo. A CGI+AJAX+SVG based monitoring method for distributed and embedded system. In U-Media 2008: The 1st IEEE International Conference on Ubi-Media Computing and Workshops, pages 144–148, 2008. (doi:10.1109/UMEDIA.2008.4570880)

[239]
H. Zhou, P. Luo, D. Wang, and Y. Dai. Fast public key infrastructure authentication based on ca caching. Qinghua Daxue Xuebao/Journal of Tsinghua University, 48(7):1160–1164, 2008.

[240]
J. Zhou, L.N. Bhuyan, and A. Banerjee. An effective pointer replication algorithm in P2P networks. In IPDPS Miami 2008 - Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium, Program and CD-ROM, 2008. (doi:10.1109/IPDPS.2008.4536227)