[1]
N.T. Abdelmajid, M.A. Hossain, S. Shepherd, and K. Mahmoud. Improved kerberos security protocol evaluation using modified BAN logic. In Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages 1610–1615, 2010. (doi:10.1109/CIT.2010.285)
[2]
N.T. Abdelmajid, M.A. Hossain, S. Shepherd, and K. Mahmoud. Location-based kerberos authentication protocol. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, pages 1099–1104, 2010. (doi:10.1109/SocialCom.2010.163)
[3]
D. Acharya and V. Kumar. A secure pervasive health care system using location dependent unicast key generation scheme. In International Conference on Information and Knowledge Management, Proceedings, pages 87–90, 2010. (doi:10.1145/1871902.1871919)
[4]
D. Acharya. Security in pervasive health care networks: Current r&d and future challenges. In Proceedings - IEEE International Conference on Mobile Data Management, pages 305–306, 2010. (doi:10.1109/MDM.2010.38)
[5]
A. Achilleos, N. Georgalas, K. Yang, and G.A. Papadopoulos. A software cost model to assess productivity impact of a model-driven technique in developing domain-specific design tools. Modern Software Engineering Concepts and Practices: Advanced Approaches, pages 333–355, 2010. (doi:10.4018/978-1-60960-215-4.ch014)
[6]
D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe. Optimal design of service overlay networks with economic and performance constraints. International Journal of Communication Systems, 23(3):369–389, 2010. (doi:10.1002/dac.1072)
[7]
G. Adamson. Challenges in researching portals and the internet. International Journal of Web Portals, 2(2):26–37, 2010. (doi:10.4018/jwp.2010040103)
[8]
M.D. Aime, P.C. Pomi, and M. Vallini. Ontology and algorithms for the dependable configuration of information systems. International Journal of Critical Computer-Based Systems, 1(4):310–335, 2010.
[9]
A. Aksulu and M. Wade. A comprehensive review and synthesis of open source research. Journal of the Association of Information Systems, 11(11):576–656, 2010.
[10]
B. Al-Dabbagh, E. Scornavacca, and H. Hoehle. User perceived requirements for a mobile accounting information system. In ACIS 2010 Proceedings - 21st Australasian Conference on Information Systems, 2010.
[11]
J. Al Dallal and L.C. Briand. An object-oriented high-level design-based class cohesion metric. Information and Software Technology, 52(12):1346–1361, 2010. (doi:10.1016/j.infsof.2010.08.006)
[12]
P. Alvaro, D.V. Ryaboy, and D. Agrawal. Knuckles: Bringing the database to the data. International Journal of Computational Science and Engineering, 5(3-4):214–225, 2010. (doi:10.1504/IJCSE.2010.037677)
[13]
T.L. Alves, C. Ypma, and J. Visser. Deriving metric thresholds from benchmark data. In IEEE International Conference on Software Maintenance, ICSM, 2010. (doi:10.1109/ICSM.2010.5609747)
[14]
M. Analoui, M. Sharifi, and M.H. Rezvani. Probabilistic proximity-aware resource location in peer-to-peer networks using resource replication. International Journal of Computers, Communications and Control, 5(4):418–431, 2010.
[15]
A. Andreatos and A. Leros. Simulation course redesign and educational software selection. In 9th European Conference on eLearning 2010, ECEL 2010, pages 29–38. Academic Conferences Limited, 2010.
[16]
R. Andriansyah, T. Van Woensel, F.R.B. Cruz, and L. Duczmal. Performance optimization of open zero-buffer multi-server queueing networks. Computers and Operations Research, 37(8):1472–1487, 2010. (doi:10.1016/j.cor.2009.11.004)
[17]
O. Antonaccio, C.R. Tittle, E. Botchkovar, and M. Kranidiotis. The correlates of crime and deviance: Additional evidence. Journal of Research in Crime and Delinquency, 47(3):297–328, 2010. (doi:10.1177/0022427810365678)
[18]
P. Ardimento, G. Bruno, D. Caivano, and M. Cimitile. A maintenance metric model for open source governance. In 5th Conference of the Italian Chapter of the Association for Information Systems, ItAIS 2008, pages 139–146. Physica-Verlag, 2010. (doi:10.1007/978-3-7908-2148-2_17)
[19]
H.S. Ayatollahi Tabatabaii, M. Khansari, and H.R. Rabiee. Livecod: A mesh-pull P2P live streaming system with XOR-based network coding. In 2010 IEEE Globecom Workshops, GC'10, pages 436–441, 2010. (doi:10.1109/GLOCOMW.2010.5700357)
[20]
R.S. Aygün, Y. Ma, K. Akkaya, G. Cox, and A. Bicak. A conceptual model for data management and distribution in peer-to-peer systems. Peer-to-Peer Networking and Applications, 3(4):294–322, 2010. (doi:10.1007/s12083-009-0061-7)
[21]
S. Baerisch. Domain-specific model-driven testing. Springer Vieweg, 2010. (doi:10.1007/978-3-8348-9624-7)
[22]
K. Bakhrankova. Decision support system for continuous production. Industrial Management and Data Systems, 110(4):591–610, 2010. (doi:10.1108/02635571011039043)
[23]
Kevin Banks, Donovan Kolbly, and Matthew Blackmon. System and method for summarizing and reporting impact of database statements. United States Patent 7,831,621, November 2010. Assignee: Crossroads Systems, Inc. (Austin, TX).
[24]
S. Basagiannis, P. Katsaros, and A. Pombortsis. An intruder model with message inspection for model checking security protocols. Computers and Security, 29(1):16–34, 2010. (doi:10.1016/j.cose.2009.08.003)
[25]
Christian Beaumont, James F. Springfield, and Nenad Stefanovic. Hosting controls in a window via an interface for controlling the window. United States Patent 7,730,496, June 2010. Assignee: Microsoft Corporation (Redmond, WA).
[26]
K. Berte, D. Schuurman, and L. De Marez. Adoption versus use diffusion of idtv in flanders- personalized television content as a tool to cross the chasm? In EuroITV'10 - Proceedings of the 8th International Interactive TV and Video Conference, pages 15–22, 2010. (doi:10.1145/1809777.1809781)
[27]
N. Bicocchi, M. Baumgarten, N. Brgulja, R. Kusber, M. Mamei, M. Mulvenna, and F. Zambonelli. Self-organized data ecologies for pervasive situation-aware services: The knowledge networks approach. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans, 40(4):789–802, 2010. (doi:10.1109/TSMCA.2010.2048023)
[28]
N. Bicocchi, M. Mamei, and F. Zambonelli. Handling dynamics in diffusive aggregation schemes: An evaporative approach. Future Generation Computer Systems, 26(6):877–889, 2010. (doi:10.1016/j.future.2010.02.008)
[29]
H. Boomkamp. Global GPS reference frame solutions of unlimited size. Advances in Space Research, 46(2):136–143, 2010. (doi:10.1016/j.asr.2010.02.015)
[30]
N. Borch, K. Mitchell, and D. Gabrijelčič. Access control to bittorrent swarms using closed swarms. In AVSTP2P'10 - Proceedings of the 2010 ACM Workshop on Advanced Video Streaming Techniques for Peer-to-Peer Networks and Social Networking, Co-located with ACM Multimedia 2010, pages 25–30, 2010. (doi:10.1145/1877891.1877898)
[31]
J.-M. Borello, E. Filiol, and L. Mé. From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques. Journal in Computer Virology, 6(3):277–287, 2010. (doi:10.1007/s11416-009-0136-2)
[32]
M. Brogle, S. Barthlomé, and T. Braun. Quality of service for multicasting using NICE. In Proceedings of the ACM Symposium on Applied Computing, pages 670–677, 2010. (doi:10.1145/1774088.1774227)
[33]
B.R. Bryant, J. Gray, and M. Mernik. Domain-specific software engineering. In Proceedings of the FSE/SDP Workshop on the Future of Software Engineering Research, FoSER 2010, pages 65–68, 2010. (doi:10.1145/1882362.1882376)
[34]
R.P.L. Buse and T. Zimmermann. Analytics for software development. In Proceedings of the FSE/SDP Workshop on the Future of Software Engineering Research, FoSER 2010, pages 77–80, 2010. (doi:10.1145/1882362.1882379)
[35]
A.A. Bush and A. Tiwana. Signaling in content sharing platforms. In ICIS 2010 Proceedings - Thirty First International Conference on Information Systems, 2010.
[36]
F. Calzolari, S. Arezzini, A. Ciampa, E. Mazzoni, A. Domenici, and G. Vaglini. High availability using virtualization. Journal of Physics: Conference Series, 219(1 PART 5), 2010. (doi:10.1088/1742-6596/219/5/052017)
[37]
S. Castano, A. Ferrara, and S. Montanelli. A reference architecture for semantic knowledge coordination. In 5th Conference of the Italian Chapter of the Association for Information Systems, ItAIS 2008, pages 185–193. Physica-Verlag, 2010. (doi:10.1007/978-3-7908-2148-2_22)
[38]
H. Chehade, F. Yalaoui, L. Amodeo, and F. Dugardin. Buffers sizing in assembly lines using a lorenz multiobjective ant colony optimization algorithm. In 2010 International Conference on Machine and Web Intelligence, ICMWI 2010 - Proceedings, pages 283–287, 2010. (doi:10.1109/ICMWI.2010.5647916)
[39]
S. Chen and G. Yang. Superpathtrust for trust aggregation in unstructured peer-to-peer networks. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 31(1):223–228, 2010.
[40]
F. Chen, M.P. Johnson, A. Bar-Noy, and T.F. La Porta. Cooperative data dissemination to mission sites. In Proceedings of SPIE - The International Society for Optical Engineering, volume 7706, 2010. (doi:10.1117/12.851186)
[41]
G. Chen, A. Sarrafzadeh, C.P. Low, and L. Zhang. A self-organization mechanism based on cross-entropy method for P2P-like applications. ACM Transactions on Autonomous and Adaptive Systems, 5(4), 2010. (doi:10.1145/1867713.1867716)
[42]
K. Chen, T.-L. Hu, and G. Chen. Fast trust chain search in role-based credential overlay network. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 44(12):2241–2250, 2010. (doi:10.3785/j.issn.1008-973X.2010.12.003)
[43]
S. Chen, S. Liang, and M. Wang. A locality-aware peer-to-peer approach for geospatial web services discovery. In 2010 Canadian Geomatics Conference and Symposium of Commission I, ISPRS Convergence in Geomatics - Shaping Canada's Competitive Landscape, volume 38. International Society for Photogrammetry and Remote Sensing, 2010.
[44]
Y. Chung. Efficient batch update of unique identifiers in a distributed hash table for resources in a mobile host. In Proceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, pages 625–630, 2010. (doi:10.1109/ISPA.2010.73)
[45]
A. Cicchetti, D. Di Ruscio, P. Pelliccione, A. Pierantonio, and S. Zacchiroli. A model driven approach to upgrade package-based software systems. Communications in Computer and Information Science, 69 CCIS:262–276, 2010. (doi:10.1007/978-3-642-14819-4_19)
[46]
T. Clark and L. Tratt. Formalizing homogeneous language embeddings. Electronic Notes in Theoretical Computer Science, 253(7):75–88, 2010. (doi:10.1016/j.entcs.2010.08.033)
[47]
F. Clear. Innovative knowledge transfer mechanisms and the potential role for theatric methods in the propagation of good data handling practice. Smart Innovation, Systems and Technologies, 5:197–208, 2010.
[48]
M. Colajanni, M. Marchetti, and M. Messori. Selective and early threat detection in large networked systems. In Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages 604–611, 2010. (doi:10.1109/CIT.2010.124)
[49]
G. Concas, M. Locci, M. Marchesi, R. Tonelli, and I. Turnu. Computing the fractal dimension - a global metrics for large software systems. In 2010 International Conference on Computational Intelligence and Software Engineering, CiSE 2010, 2010. (doi:10.1109/CISE.2010.5676891)
[50]
Rod Cope and Eric Weidner. Installation of software stacks including uncoordinated projects. United States Patent 7,669,199, February 2010. Assignee: OpenLogic, Inc. (Broomfield, CO).
[51]
Rod Cope and Eric Weidner. Software project filter. United States Patent 7,665,086, February 2010. Assignee: OpenLogic, Inc. (Broomfield, CO).
[52]
Rod Cope and Eric Weidner. Tools for stacking uncoordinated software projects. United States Patent 7,661,089, February 2010. Assignee: OpenLogic, Inc. (Broomfield, CO).
[53]
S. Counsell, G. Loizou, and R. Najjar. Is manual data collection hampered by the presence of inner classes or class size. In Advanced Techniques in Computing Sciences and Software Engineering, pages 91–97, 2010.
[54]
M. Crasso, C. Mateos, A. Zunino, and M. Campo. Empirically assessing the impact of dependency injection on the development of web service applications. Journal of Web Engineering, 9(1):66–94, 2010.
[55]
O. Curé, R. Forax, P. Degenne, D.L. Seen, D. Parigot, and A.A. Lahcen. Ocelet: An ontology-based domain specific language to model complex domains. In 3rd Int. Conf. on Communication Theory, Reliability, and Quality of Service, CTRQ 2010, Includes MOPAS 2010: 1st Int. Conf. on Models and Ontology-Based Design of Protocols, Architecture and Services, pages 255–260, 2010. (doi:10.1109/CTRQ.2010.50)
[56]
S. Das and M. Magdon-Ismail. Collective wisdom: Information growth in wikis and blogs. In Proceedings of the ACM Conference on Electronic Commerce, pages 231–240, 2010. (doi:10.1145/1807342.1807380)
[57]
B. Das, A. Garcia-Diaz, C.A. MacDonald, and K.K. Ghoshal. A computer simulation approach to evaluating bowl versus inverted bowl assembly line arrangement with variable operation times. International Journal of Advanced Manufacturing Technology, 51(1-4):15–24, 2010. (doi:10.1007/s00170-010-2614-6)
[58]
B. Das, J.M. Sanchez-Rivas, A. Garcia-Diaz, and C.A. MacDonald. A computer simulation approach to evaluating assembly line balancing with variable operation times. Journal of Manufacturing Technology Management, 21(7):872–887, 2010. (doi:10.1108/17410381011077964)
[59]
E.C. De Almeida, J.E. Marynowski, G. Sunyé, and P. Valduriez. Peerunit: A framework for testing peer-to-peer systems. In ASE'10 - Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pages 169–170, 2010. (doi:10.1145/1858996.1859030)
[60]
E.C. De Almeida, G. Sunyé, Y. Le Traon, and P. Valduriez. Testing peer-to-peer systems. Empirical Software Engineering, 15(4):346–379, 2010. (doi:10.1007/s10664-009-9124-x)
[61]
W.K. Dedzoe, P. Lamarre, R. Akbarinia, and P. Valduriez. Asap top-k query processing in unstructured P2P systems. In 2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010 - Proceedings, 2010. (doi:10.1109/P2P.2010.5569974)
[62]
L. Demir, S. Tunali, and D.T. Eliiyi. An adaptive tabu search approach for buffer allocation problem in unreliable production lines. In 24th Mini EURO Conference on Continuous Optimization and Information-Based Technologies in the Financial Sector, MEC EurOPT 2010, pages 207–212. Vilnius Gediminas Technical University, 2010.
[63]
M. Deriu, A. Soro, and G. Paddeu. Dynamic TV content augmentation by web pages - a prototype of enhanced remote control capable to complement TV-viewing retrieving additional information from the world wide web. In International Conference on Applied Computer Science - Proceedings, pages 469–472, 2010.
[64]
R. Di Pietro and N.V. Verde. OS and network security. In Handbook of Electronic Security and Digital Forensics, pages 1–24. World Scientific Publishing Co., 2010. (doi:10.1142/9789812837042_0001)
[65]
S. Dix and I. Phau. Measuring situational triggers of television channel switching. Marketing Intelligence and Planning, 28(2):137–150, 2010. (doi:10.1108/02634501011029655)
[66]
D. Djuric and V. Devedzic. Magic potion: Incorporating new development paradigms through metaprogramming. IEEE Software, 27(5):38–44, 2010. (doi:10.1109/MS.2010.90)
[67]
E. Dodonov and R.F. de Mello. A novel approach for distributed application scheduling based on prediction of communication events. Future Generation Computer Systems, 26(5):740–752, 2010. (doi:10.1016/j.future.2009.05.004)
[68]
C.R.P. Dos Santos, S. Cechin, L.Z. Granville, M.J.B. Almeida, and L.M.R. Tarouco. On the impact of using presence services in P2P-based network management systems. In GLOBECOM - IEEE Global Telecommunications Conference, 2010. (doi:10.1109/GLOCOM.2010.5683578)
[69]
M. El-Sharqwi, H. Mahdi, and I. El-Madah. Pattern-based model refactoring. In Proceedings, ICCES'2010 - 2010 International Conference on Computer Engineering and Systems, pages 301–306, 2010. (doi:10.1109/ICCES.2010.5674873)
[70]
A. Epstein, D.H. Lorenz, E. Silvera, and I. Shapira. Virtual appliance content distribution for a global infrastructure cloud service. In Proceedings - IEEE INFOCOM, 2010. (doi:10.1109/INFCOM.2010.5462176)
[71]
M.A. Ertürk, A.H. Zaim, and S. Akyokuş. Semantic information retrieval on peer-to-peer networks. Communications in Computer and Information Science, 88 CCIS(PART 2):715–725, 2010. (doi:10.1007/978-3-642-14306-9_71)
[72]
S. Esteves, L. Veiga, and P. Ferreira. Gridp2p: Resource usage in grids and peer-to-peer systems. In Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, 2010. (doi:10.1109/IPDPSW.2010.5470917)
[73]
V. Fåk. IT – risks and security. Springer Series in Reliability Engineering, 19:143–160, 2010. (doi:10.1007/978-1-84882-641-0_10)
[74]
M. Fleck, A. von Kaenel, and M. Meckel. Web 2.0 concepts, social software and business models. Encyclopedia of E-Business Development and Management in the Global Economy, 3:1183–1192, 2010. (doi:10.4018/978-1-61520-611-7.ch119)
[75]
A. Forestiero, E. Leonardi, C. Mastroianni, and M. Meo. Self-chord: A bio-inspired P2P framework for self-organizing distributed systems. IEEE/ACM Transactions on Networking, 18(5):1651–1664, 2010. (doi:10.1109/TNET.2010.2046745)
[76]
A. Forestiero, C. Mastroianni, G. Papuzzo, and G. Spezzano. A proximity-based self-organizing framework for service composition and discovery. In CCGrid 2010 - 10th IEEE/ACM International Conference on Cluster, Cloud, and Grid Computing, pages 428–437, 2010. (doi:10.1109/CCGRID.2010.48)
[77]
D. Forte and A. de Donno. Mobile network investigations. In Handbook of Digital Forensics and Investigation, pages 517–557. Elsevier Ltd, 2010. (doi:10.1016/B978-0-12-374267-4.00010-0)
[78]
S. Gad. Data synchronization architectural pattern for ubiquitous learning systems. In Workshop on Programming Support Innovations for Emerging Distributed Applications, PSI EtA - PsiH 2010, 2010. (doi:10.1145/1940747.1940749)
[79]
D. Gamayunov, N.T.M. Quan, F. Sakharov, and E. Toroshchin. Race walk: Fast instruction frequency analysis and classification for shellcode detection in network flow. In EC2ND 2009 - European Conference on Computer Network Defense, pages 4–12, 2010. (doi:10.1109/EC2ND.2009.9)
[80]
W. Gao, G. Zhang, M. Wang, S. See, Q. Wang, and X. Jiang. An agricultural information sharing system based on P2P network technology. Intelligent Automation and Soft Computing, 16(6):945–951, 2010.
[81]
V. Garcıa-Dıaz, H. Fernández-Fernández, E. Palacios-González, B.C.P. G-Bustelo, O. Sanjuán-Martınez, and J.M.C. Lovelle. Talisman MDE: Mixing MDE principles. Journal of Systems and Software, 83(7):1179–1191, 2010. (doi:10.1016/j.jss.2010.01.010)
[82]
J. Geldenhuys. Finding the core developers. In Proceedings - 36th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2010, pages 447–450, 2010. (doi:10.1109/SEAA.2010.66)
[83]
S. Georgiades. Sensitive practice with greek immigrants: A review of evidence. International Journal of Culture and Mental Health, 3(1):52–60, 2010. (doi:10.1080/17542861003607995)
[84]
D. Germanus, A. Khelil, and N. Suri. Increasing the resilience of critical SCADA systems using peer-to-peer overlays. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6150 LNCS:161–178, 2010. (doi:10.1007/978-3-642-13556-9_10)
[85]
Allan E. Gillespie. Reduction of join operations when archiving related database tables. United States Patent 7,836,022, November 2010. Assignee: International Business Machines Corporation (Armonk, NY).
[86]
R. Gitzel, S. Krug, and M. Brhel. Towards a software failure cost impact model for the customer: An analysis of an open source product. In ACM International Conference Proceeding Series, 2010. (doi:10.1145/1868328.1868354)
[87]
D.X. Gkoutzelis and M.S. Sardis. Web server security on open source environments. 3rd International Conference on Next Generation Society: Technological and Legal Issues, e-Democracy 2009, 26 LNICST:236–247, 2010. (doi:10.1007/978-3-642-11631-5_22)
[88]
R. Glott, A.-K. Groven, K. Haaland, and A. Tannenberg. Quality models for free/libre open source software - towards the "silver bullet"? In Proceedings - 36th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2010, pages 439–446, 2010. (doi:10.1109/SEAA.2010.23)
[89]
J.M. Gonzalez-Barahona, G. Robles, and S. Dueñas. Collecting data about FLOSS development: The FLOSSMetrics experience. In Proceedings - International Conference on Software Engineering, pages 29–34, 2010. (doi:10.1145/1833272.1833278)
[90]
V. Gorodetsky, O. Karsaev, V. Samoylov, and S. Serebryakov. P2p agent platform: Implementation and testing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5319 LNAI:41–54, 2010. (doi:10.1007/978-3-642-11368-0_4)
[91]
P. Grobelny. A method for reasoning about complex services within geographic information systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6070 LNAI(PART 1):132–141, 2010. (doi:10.1007/978-3-642-13480-7_15)
[92]
A.-K. Groven, K. Haaland, R. Glott, and A. Tannenberg. Security measurements within the framework of quality assessment models for free/libre open source software. In ACM International Conference Proceeding Series, pages 229–235, 2010. (doi:10.1145/1842752.1842796)
[93]
S. Günther and T. Cleenewerck. Design principles for internal domain-specific languages: A pattern catalog illustrated by Ruby. In 17th Conference on Pattern Languages of Programs, PLoP 2010, 2010. (doi:10.1145/2493288.2493291)
[94]
S. Günther, M. Haupt, and M. Splieth. Agile engineering of internal domain-specific languages with dynamic programming languages. In Proceedings - 5th International Conference on Software Engineering Advances, ICSEA 2010, pages 162–168, 2010. (doi:10.1109/ICSEA.2010.32)
[95]
M. Hai and S. Guo. A distributed node clustering mechanism in P2P networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6441 LNAI(PART 2):553–560, 2010. (doi:10.1007/978-3-642-17313-4_57)
[96]
M. Hai and Y. Tu. A P2P e-commerce model based on interest community. In Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, pages 362–365, 2010. (doi:10.1109/ICMeCG.2010.80)
[97]
E. Haleplidis, C. Tranoris, S. Denazis, and O. Koufopavlou. Adopting software engineering practices to network processor devices: Introducing the domain specific modeling paradigm to the forces framework. In Proceedings of the 2010 International Conference on Network and Service Management, CNSM 2010, pages 366–369, 2010. (doi:10.1109/CNSM.2010.5691237)
[98]
M. Hamasaki, H. Takeda, and T. Nishimura. Network analysis of an emergent massively collaborative creation on video sharing website: Case study of creation community of hatsume miku movie on nico nico douga. Transactions of the Japanese Society for Artificial Intelligence, 25(1):157–167, 2010.
[99]
A. Hameurlain, D. Cokuslu, and K. Erciyes. Resource discovery in grid systems: A survey. International Journal of Metadata, Semantics and Ontologies, 5(3):251–263, 2010. (doi:10.1504/IJMSO.2010.034048)
[100]
D. Han and Y. Yu. Keyword search in unstructured peer-to-peer networks. Springer US, 2010. (doi:10.1007/978-0-387-09751-0_15)
[101]
B.-O. Hartmann and K. Böhm. Towards efficient equilibria of combinations of network-formation and interaction strategies. In Proceedings - 2010 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2010, volume 2, pages 14–23, 2010. (doi:10.1109/WI-IAT.2010.50)
[102]
S. Hatahet, A. Bouabdallah, and Y. Challal. A new worm propagation threat in bittorrent: Modeling and analysis. Telecommunication Systems, 45(2-3):95–109, 2010. (doi:10.1007/s11235-009-9241-2)
[103]
Ø. Hauge, C. Ayala, and R. Conradi. Adoption of open source software in software-intensive organizations - a systematic literature review. Information and Software Technology, 52(11):1133–1154, 2010. (doi:10.1016/j.infsof.2010.05.008)
[104]
H. Hietanen. Networked digital video recorders and social networks. In 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 2010. (doi:10.1109/CCNC.2010.5421715)
[105]
L.J. Holtzblatt, L.E. Damianos, and D. Weiss. Factors impeding wiki use in the enterprise: A case study. In Conference on Human Factors in Computing Systems - Proceedings, pages 4661–4675, 2010. (doi:10.1145/1753846.1754208)
[106]
S.K.A. Hossain, A.S.M. Mahfujur Rahman, T.T. Tran, and A. El Saddik. Location aware question answering based product searching in mobile handheld devices. In Proceedings - IEEE International Symposium on Distributed Simulation and Real-Time Applications, DS-RT, pages 189–195, 2010. (doi:10.1109/DS-RT.2010.28)
[107]
H.-H. Hsu and H.-T. Liao. Online note sharing in a mobile self-guided tour system. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pages 740–745, 2010. (doi:10.1109/CISIS.2010.121)
[108]
C.-L. Hu, Y.-H. Chang, D.-Y. Chen, and Y.-W. Chen. Simple peer selection strategies for fast and fair peer-to-peer file sharing. In International Conference on Advanced Communication Technology, ICACT, volume 1, pages 208–213, 2010.
[109]
C.-L. Hu, D.-Y. Chen, Y.-H. Chang, and Y.-W. Chen. Fair peer assignment scheme for peer-to-peer file sharing. KSII Transactions on Internet and Information Systems, 4(5):709–735, 2010. (doi:10.3837/tiis.2010.10.002)
[110]
Y.-S. Huang, X.-W. Meng, and Y.-J. Zhang. Strategy of content location of P2P based on the social network. Ruan Jian Xue Bao/Journal of Software, 21(10):2622–2630, 2010. (doi:10.3724/SP.J.1001.2010.03647)
[111]
Z. Huang, J. Huai, X. Liu, and J. Zhu. Business process decomposition based on service relevance mining. In Proceedings - 2010 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2010, volume 1, pages 573–580, 2010. (doi:10.1109/WI-IAT.2010.21)
[112]
T. Huffmire, C. Irvine, T.D. Nguyen, T. Levin, R. Kastner, and T. Sherwood. Handbook of FPGA design security. Springer Netherlands, 2010. (doi:10.1007/978-90-481-9157-4)
[113]
J.R. Ikoja-Odongo. Information security policies, volume 1. IGI Global, 2010. (doi:10.4018/978-1-61520-847-0.ch025)
[114]
L. Ilijašić and L. Saitta. Long-tailed distributions in grid complex network. In Proceeding of the 2nd Workshop on Grids Meets Autonomic Computing, GMAC '10, Co-located with ICAC'10, pages 21–30, 2010. (doi:10.1145/1809029.1809032)
[115]
D. Irwanto. Visual indicator component software to show component design quality and characteristic. In Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010, pages 50–54, 2010. (doi:10.1109/ACT.2010.34)
[116]
A. Israeli and D.G. Feitelson. The Linux kernel as a case study in software evolution. Journal of Systems and Software, 83(3):485–501, 2010. (doi:10.1016/j.jss.2009.09.042)
[117]
S.S. Iyengar, N. Parameshwaran, V.V. Phoha, N. Balakrishnan, and C.D. Okoye. Fundamentals of Sensor Network Programming: Applications and Technology. John Wiley and Sons, 2010. (doi:10.1002/9780470890158)
[118]
D. Izquierdo-Cortazar, J.M. Gonzalez-Barahona, S. Dueñas, and G. Robles. Towards automated quality models for software development communities: The QualOSS and FLOSSMetrics case. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 364–369, 2010. (doi:10.1109/QUATIC.2010.66)
[119]
L. Jakab, A. Cabellos-Aparicio, T. Silverston, M. Solé, F. Cora, and J. Domingo-Pascual. Corecast: How core/edge separation can help improving inter-domain live streaming. Computer Networks, 54(18):3388–3401, 2010. (doi:10.1016/j.comnet.2010.07.005)
[120]
Q.-J. Ji. A novel optimal data scheduling approach to P2P content distribution. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 44(3):403–406+412, 2010.
[121]
H.M. Judi, S.M. Salleh, N. Hussin, and S. Idris. Activity surveillance and hawthorne effect to prevent programming plagiarism. Journal of Computer Science, 6(11):1341–1346, 2010. (doi:10.3844/jcssp.2010.1341.1346)
[122]
M. Jureczko and L. Madeyski. Towards identifying software project clusters with regard to defect prediction. In ACM International Conference Proceeding Series, 2010. (doi:10.1145/1868328.1868342)
[123]
M. Kaiafa-Gbandi. Punishing corruption in the public and the private sector: The legal framework of the european union in the international scene and the greek legal order. European Journal of Crime, Criminal Law and Criminal Justice, 18(2):139–183, 2010. (doi:10.1163/157181710X12659830399617)
[124]
G. Kakarontzas and I. Stamelos. Component recycling for agile methods. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 397–402, 2010. (doi:10.1109/QUATIC.2010.72)
[125]
T. Kalibera, P. Parizek, G. Haddad, G.T. Leavens, and J. Vitek. Challenge benchmarks for verification of real-time programs. In PLPV'10 - Proceedings of the 2010 ACM SIGPLAN Workshop on Programming Languages meets Program Verification, pages 57–62, 2010. (doi:10.1145/1707790.1707800)
[126]
T. Kalibera, P. Parizek, M. Malohlava, and M. Schoeberl. Exhaustive testing of safety critical java. In ACM International Conference Proceeding Series, pages 164–174, 2010. (doi:10.1145/1850771.1850794)
[127]
D. Kallinikou, M. Papadopoulos, A. Kaponi, and V. Strakantouna. Intellectual property issues for digital libraries at the intersection of law, technology, and the public interest. E-Publishing and Digital Libraries: Legal and Organizational Issues, pages 294–341, 2010. (doi:10.4018/978-1-60960-031-0.ch015)
[128]
P. Kamthan. On the implications of the social web environment for pedagogical patterns. IGI Global, 2010. (doi:10.4018/978-1-60960-144-7.ch009)
[129]
Yiannis Kanellopoulos, Panos Antonellis, Dimitris Antoniou, Christos Makris, Evangelos Theodoridis, Christos Tjortjis, and Nikos Tsirakis. Code quality evaluation methodology using the ISO/IEC 9126 standard. International Journal of Software Engineering and Applications, 1(3):17–36, July 2010.
[130]
I. Kang, S. Choi, S. Jung, and S. Lee. Tree-based index overlay in hybrid peer-to-peer systems. Journal of Computer Science and Technology, 25(2):313–329, 2010. (doi:10.1007/s11390-010-9326-0)
[131]
G. Kardas, Z. Demirezen, and M. Challenger. Towards a DSML for semantic web enabled multi-agent systems. In ECOOP 2010 Workshop Proceedings - International Workshop on Formalization of Modeling Languages, FML'10, 2010. (doi:10.1145/1943397.1943402)
[132]
I. Kelényi, Á. Ludányi, and J.K. Nurminen. Bittorrent on mobile phones - energy efficiency of a distributed proxy solution. In 2010 International Conference on Green Computing, Green Comp 2010, pages 451–458, 2010. (doi:10.1109/GREENCOMP.2010.5598282)
[133]
P. Kenyeres, A. Szentgyörgyi, T. Mészáros, and G. Fehér. Botspot: Anonymous and distributed malware detection. 2nd International Conference on Wireless and Mobile networks, WiMo 2010, 84:59–70, 2010. (doi:10.1007/978-3-642-14171-3_6)
[134]
H. Ketmaneechairat, P. Oothongsap, and A. Mingkhwan. Buffer size estimation for different start video broadcasting. In ECTI-CON 2010 - The 2010 ECTI International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pages 924–928, 2010.
[135]
A. Khelil, S. Jeckel, D. Germanus, and N. Suri. Towards benchmarking of P2P technologies from a SCADA systems protection perspective. 2nd International ICST Conference on Mobile Lightweight Wireless Systems, MOBILIGHT 2010, 45 LNICST:400–414, 2010. (doi:10.1007/978-3-642-16644-0_35)
[136]
H.M. Kienle. It's about time to take javascript (more) seriously. IEEE Software, 27(3):60–62, 2010. (doi:10.1109/MS.2010.76)
[137]
J. Kim, J. Shin, J. Choi, S. Lee, M. Kim, and S. Lee. A DHT-based virtual storage system in windows environments. In 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010, volume 4, pages 169–172, 2010. (doi:10.1109/ICCAE.2010.5451741)
[138]
M.S. Kirkpatrick and E. Bertino. Enforcing spatial constraints for mobile RBAC systems. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pages 99–108, 2010. (doi:10.1145/1809842.1809860)
[139]
Darko Kirovski and Kamal Jain. Off-line economies for digital media. United States Patent 7,818,811, October 2010. Assignee: Microsoft Corporation (Redmond, WA).
[140]
B. Kitts, L. Wei, D. Au, S. Zlomek, R. Brooks, and B. Burdick. Targeting television audiences using demographic similarity. In Proceedings - IEEE International Conference on Data Mining, ICDM, pages 1391–1399, 2010. (doi:10.1109/ICDMW.2010.200)
[141]
M. Klein and M.L. Nelson. Evaluating methods to rediscover missing web pages from the web infrastructure. In Proceedings of the ACM International Conference on Digital Libraries, pages 59–68, 2010. (doi:10.1145/1816123.1816133)
[142]
M. Klein, J. Shipman, and M.L. Nelson. Is this a good title? In HT'10 - Proceedings of the 21st ACM Conference on Hypertext and Hypermedia, pages 3–12, 2010. (doi:10.1145/1810617.1810621)
[143]
M. Kobayashi, J. Kageyama, S. Shibusawa, and T. Yonekura. File replication method based on demand forecasting of file download in P2P networks. Journal of Digital Information Management, 8(4):247–253, 2010.
[144]
M. Kodialam, T.V. Lakshman, S. Mukherjee, and L. Wang. Online scheduling of targeted advertisements for IPTV. In Proceedings - IEEE INFOCOM, 2010. (doi:10.1109/INFCOM.2010.5461972)
[145]
E. Konidari and P. Louridas. When students are not programmers. ACM Inroads, 1(1):55–60, 2010. (doi:10.1145/1721933.1721952)
[146]
T. Kos, T. Kosar, J. Knez, and M. Mernik. Improving end-user productivity in measurement systems with a domain-specific (modeling) language sequencer. In 14th East-European Conference on Advances in Databases and Information Systems, ADBIS 2010, volume 639, pages 61–76, 2010.
[147]
T. Kosar, N. Oliveira, M. Mernik, M.J.V. Pereira, M. Črepinšek, D. da Cruz, and P.R. Henriques. Comparing general-purpose and domain-specific languages: An empirical study. Computer Science and Information Systems, 7(2):247–264, 2010. (doi:10.2298/CSIS1002247K)
[148]
T. Koskela, O. Kassinen, Z. Ou, and M. Ylianttila. Improving community management performance with two-level hierarchical DHT overlays. Journal of Internet Technology, 11(2):167–180, 2010.
[149]
A.G. Kotsopoulos and T.A. Antonakopoulos. Nanopositioning using the spiral of archimedes: The probe-based storage case. Mechatronics, 20(2):273–280, 2010. (doi:10.1016/j.mechatronics.2009.12.004)
[150]
D.E. Koulouriotis, A.S. Xanthopoulos, and V.D. Tourassis. Simulation optimisation of pull control policies for serial manufacturing lines and assembly manufacturing systems using genetic algorithms. International Journal of Production Research, 48(10):2887–2912, 2010. (doi:10.1080/00207540802603759)
[151]
U. Krenn, M. Thonhauser, and C. Kreiner. Ecql: A query and action language for model-based applications. In 17th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2010, pages 286–290, 2010. (doi:10.1109/ECBS.2010.40)
[152]
A. Kritikos, G. Kakarontzas, and I. Stamelos. A semi-automated process for open source code reuse. In ENASE 2010 - Proceedings of the 5th International Conference on Evaluation of Novel Approaches to Software Engineering, pages 179–185, 2010.
[153]
E. La Mattina, V. Savarino, C. Vicari, D. Storelli, and D. Bianchini. A technological infrastructure to sustain internetworked enterprises. Evolving Towards the Internetworked Enterprise: Technological and Organizational Perspectives, pages 97–117, 2010. (doi:10.1007/978-1-4419-7279-8_5)
[154]
A.P. Leros, A. Andreatos, and A. Zagorianos. Matlab - octave science and engineering benchmarking and comparison. In International Conference on Computers - Proceedings, volume 1, pages 746–754, 2010.
[155]
F. Li and Y. Ishikawa. Query processing in a traceable P2P record exchange framework. IEICE Transactions on Information and Systems, E93-D(6):1433–1446, 2010. (doi:10.1587/transinf.E93.D.1433)
[156]
Y. Li and X. Zhang. AjCQFr: AOP-based code quality framework. In Proceedings of ICCIA 2010 — 2010 International Conference on Computer and Information Application, pages 199–202, 2010. (doi:10.1109/ICCIA.2010.6141570)
[157]
Y.-M. Li. Pricing digital content distribution over heterogeneous channels. Decision Support Systems, 50(1):243–257, 2010. (doi:10.1016/j.dss.2010.08.027)
[158]
C.-C. Liang. Downward communications enhancement using a robust broadcasting mechanism. Expert Systems with Applications, 37(1):741–755, 2010. (doi:10.1016/j.eswa.2009.05.096)
[159]
J. Liebig, S. Apel, C. Lengauer, C. Kästner, and M. Schulze. An analysis of the variability in forty preprocessor-based software product lines. In Proceedings - International Conference on Software Engineering, volume 1, pages 105–114, 2010. (doi:10.1145/1806799.1806819)
[160]
C.-S. Lin. Improving the availability of scalable on-demand streams by dynamic buffering on P2P networks. KSII Transactions on Internet and Information Systems, 4(4):491–508, 2010. (doi:10.3837/tiis.2010.08.003)
[161]
M.A. Lindner, L.M. Vaquero, L. Rodero-Merino, and J. Caceres. Cloud economics: Dynamic business models for business on demand. International Journal of Business Information Systems, 5(4):373–392, 2010. (doi:10.1504/IJBIS.2010.032938)
[162]
J. Lindsay, J. Noble, and E. Tempero. Does size matter? a preliminary investigation of the consequences of powerlaws in software. In Proceedings - International Conference on Software Engineering, pages 16–23, 2010. (doi:10.1145/1809223.1809226)
[163]
Y. Liu, Y. Li, L.T. Yang, N. Xiong, L. Zhu, and K. Xu. The resource locating strategy based on subdomain hybrid P2P network model. In Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, 2010. (doi:10.1109/IPDPSW.2010.5470710)
[164]
Y. Liu, N. Xiong, J.H. Park, C. Yang, and K. Xu. Fair incentive mechanism with pyramidal structure for peer-to-peer networks. IET Communications, 4(1):1–12, 2010. (doi:10.1049/iet-com.2008.0702)
[165]
Y. Liu, N. Xiong, L. Zhu, J.H. Park, and J. Gao. An effective simulation method for search strategy in unstructured P2P network. Simulation Modelling Practice and Theory, 18(4):456–469, 2010. (doi:10.1016/j.simpat.2009.09.001)
[166]
M. Locci, G. Concas, R. Tonelli, and I. Turnu. Three algorithms for analyzing fractal software networks. WSEAS Transactions on Information Science and Applications, 7(3):371–380, 2010.
[167]
X. Long and J. Joshi. Barms: A bayesian reputation management approach for P2P systems. In 2010 IEEE International Conference on Information Reuse and Integration, IRI 2010, pages 147–152, 2010. (doi:10.1109/IRI.2010.5558948)
[168]
G. López Millán, M. Gil Pérez, G. Martınez Pérez, and A.F. Gómez Skarmeta. PKI-based trust management in inter-domain scenarios. Computers and Security, 29(2):278–290, 2010. (doi:10.1016/j.cose.2009.08.004)
[169]
S.-P. Lu, K.-M. Li, and C.-Y. Hsieh. The study of dynamic navigation with WAVE/DSRC in VANETs. In ICS 2010 - International Computer Symposium, pages 524–528, 2010. (doi:10.1109/COMPSYM.2010.5685457)
[170]
T. Lukman, G. Godena, J. Gray, and S. Strmčnik. Model-driven engineering of industrial process control applications. In Proceedings of the 15th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2010, 2010. (doi:10.1109/ETFA.2010.5641224)
[171]
T. Lukman, M. Mernik, Z. Demirezen, B. Bryant, and J. Gray. Automatic generation of model traversals from metamodel definitions. In Proceedings of the Annual Southeast Conference, 2010. (doi:10.1145/1900008.1900113)
[172]
B. Lundell, B. Lings, and E. Lindqvist. Open source in Swedish companies: Where are we? Information Systems Journal, 20(6):519–535, 2010. (doi:10.1111/j.1365-2575.2010.00348.x)
[173]
Y. Ma, K. He, B. Li, and X. Zhou. How multiple-dependency structure of classes affects their functions: A statistical perspective. In ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings, volume 2, pages V260–V266, 2010. (doi:10.1109/ICSTE.2010.5608763)
[174]
Y.-T. Ma, K.-Q. He, B. Li, J. Liu, and X.-Y. Zhou. A hybrid set of complexity metrics for large-scale object-oriented software systems. Journal of Computer Science and Technology, 25(6):1184–1201, 2010. (doi:10.1007/s11390-010-9398-x)
[175]
G. Magklaras and S. Furnell. Insider threat specification as a threat mitigation technique. Advances in Information Security, 49:219–244, 2010. (doi:10.1007/978-1-4419-7133-3_10)
[176]
M.E.F. Maia, C. Celes, R. Castro, and R.M.C. Andrade. Considerations on developing mobile applications based on the capuchin project. In Proceedings of the ACM Symposium on Applied Computing, pages 575–579, 2010. (doi:10.1145/1774088.1774207)
[177]
A. Manjunatha, A. Ranabahu, A. Sheth, and K. Thirunarayan. Power of clouds in your pocket: An efficient approach for cloud mobile hybrid application development. In Proceedings - 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010, pages 496–503, 2010. (doi:10.1109/CloudCom.2010.78)
[178]
I. Martinez-Marchena, L. Mora-Lopez, P.J. Sanchez, and M. Sidrach-De-Cardona. Binding machine learning models and OPC technology for evaluating solar energy systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6098 LNAI(PART 3):606–615, 2010. (doi:10.1007/978-3-642-13033-5_62)
[179]
S. Masrom, S.Z.Z. Abidin, P.N.M. Abdul Rahman, and A.S. Abd. Rahman. Software framework for flexible user defined metaheuristic hybridization. Communications in Computer and Information Science, 117 CCIS:218–227, 2010. (doi:10.1007/978-3-642-17578-7_22)
[180]
Y. Massim, F. Yalaoui, L. Amodeo, E. Chatelet, and A. Zeblah. Efficient combined immune-decomposition algorithm for optimal buffer allocation in production lines for throughput and profit maximization. Computers and Operations Research, 37(4):611–620, 2010. (doi:10.1016/j.cor.2009.06.016)
[181]
C. Melchiors, A.H. Dos Santos, D. Mattjie, C.R.P. Dos Santos, A. Panisson, L.Z. Granville, and L.M.R. Tarouco. A network polling solution through a P2P-based distributed management environment. In Proceedings of the ACM Symposium on Applied Computing, pages 729–730, 2010. (doi:10.1145/1774088.1774238)
[182]
P.M. Melliar-Smith and L.E. Moser. O-ring: A fault tolerance and load balancing architecture for peer-to-peer systems. In Proceedings - International Conference of the Chilean Computer Science Society, SCCC, pages 25–33, 2010. (doi:10.1109/SCCC.2009.15)
[183]
J. Metrôlho, M. Costa, F.R. Ribeiro, and E. Lopes. A target environment programming language to improve developer's productivity - a case study. In International Conference on Applied Computer Science - Proceedings, pages 530–533, 2010.
[184]
John L. Miller. Routing cache for distributed hash tables. United States Patent 7,808,971, October 2010.
[185]
N. Mitchell, E. Schonberg, and G. Sevitsky. Four trends leading to Java runtime bloat. IEEE Software, 27(1):56–63, 2010. (doi:10.1109/MS.2010.7)
[186]
H. Mohamad Judi, S. Mohd Sallen, N. Hussin, and S. Idris. The use of assignment programming activity log to study novice programmers' behavior between non-plagiarized and plagiarized groups. Information Technology Journal, 9(1):98–106, 2010. (doi:10.3923/itj.2010.98.106)
[187]
P. Monteiro and M.P. Monteiro. A pattern language for parallelizing irregular algorithms. In ACM International Conference Proceeding Series, 2010. (doi:10.1145/1953611.1953624)
[188]
E. Mourtou. Modeling access control in healthcare organizations. Certification and Security in Health-Related Web Applications: Concepts and Solutions, pages 23–44, 2010. (doi:10.4018/978-1-61692-895-7.ch002)
[189]
A.S. Mousas, A. Antonakopoulou, F. Gogoulos, G.V. Lioudakis, D.I. Kaklamani, and I.S. Venieris. Visualising access control: The PRISM approach. In Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010, pages 107–111, 2010. (doi:10.1109/PCI.2010.52)
[190]
B. Mukerji, B. Maheshwari, U. Kumar, and V. Kumar. Open source software: emerging business models. International Journal of Information and Decision Sciences, 2(4):319–339, 2010. (doi:10.1504/IJIDS.2010.037229)
[191]
M. Müller-Hannemann and S. Schirra. Chapter 10. challenges in algorithm engineering. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5971 LNCS:446–496, 2010. (doi:10.1007/978-3-642-14866-8_10)
[192]
Takayuki Nakayama. Numerical calculation device, numerical calculation method, and computer product. United States Patent 7,650,302, January 2010. Assignee: Fujitsu Limited (Kawasaki, JP)The Bank of Tokyo-Mitsubishi UFJ, Ltd. (Tokyo, JP).
[193]
S. Nasrin and K. Kawagoe. Sg2: A novel index structure for efficient data management in super-peer architecture. In ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks, pages 378–383, 2010. (doi:10.1109/ICUFN.2010.5547178)
[194]
R. Niemeijer, B. De Vries, and J. Beetz. Constraint soup: Interpreting natural language architectural constraints. In Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, NLP-KE 2010, 2010. (doi:10.1109/NLPKE.2010.5587851)
[195]
R.A. Niemeijer, B. De Vries, and J. Beetz. Designing with constraints towards mass customization in the housing industry. In 10th International Conference on Design and Decision Support Systems, DDSS 2010. Eindhoven University of Technology, 2010.
[196]
E. Nygren, R.K. Sitaraman, and J. Sun. The akamai network: A platform for high-performance internet applications. Operating Systems Review (ACM), 44(3):2–19, 2010. (doi:10.1145/1842733.1842736)
[197]
D.R. Olsen, B. Partridge, and S. Lynn. Time warp sports for internet television. ACM Transactions on Computer-Human Interaction, 17(4), 2010. (doi:10.1145/1879831.1879834)
[198]
G. Oster, R. Mondéjar, P. Molli, and S. Dumitriu. Building a collaborative peer-to-peer wiki system on a structured overlay. Computer Networks, 54(12):1939–1952, 2010. (doi:10.1016/j.comnet.2010.03.019)
[199]
Z. Ou, E. Harjula, O. Kassinen, and M. Ylianttila. Performance evaluation of a kademlia-based communication-oriented P2P system under churn. Computer Networks, 54(5):689–705, 2010. (doi:10.1016/j.comnet.2009.09.022)
[200]
W.-F. Pan, B. Li, Y.-T. Ma, Y.-Y. Qin, and X.-Y. Zhou. Measuring structural quality of object-oriented softwares via bug propagation analysis on weighted software networks. Journal of Computer Science and Technology, 25(6):1202–1213, 2010. (doi:10.1007/s11390-010-9399-9)
[201]
K. Papapanagiotou, G.F. Marias, and P. Georgiadis. Revising centralized certificate validation standards for mobile and wireless communications. Computer Standards and Interfaces, 32(5-6):281–287, 2010. (doi:10.1016/j.csi.2009.07.001)
[202]
R.M. Parizi and A.A.A. Ghani. Towards automated monitoring and forecasting of probabilistic quality properties in open source software (OSS): A striking hybrid approach. In 8th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2010, pages 329–334, 2010. (doi:10.1109/SERA.2010.48)
[203]
H. Park and M. Van Der Schaar. Evolution of resource reciprocation strategies in P2P networks. IEEE Transactions on Signal Processing, 58(3 PART 1):1205–1218, 2010. (doi:10.1109/TSP.2009.2033731)
[204]
B. Parno, J.M. McCune, and A. Perrig. Bootstrapping trust in commodity computers. In Proceedings - IEEE Symposium on Security and Privacy, pages 414–429, 2010. (doi:10.1109/SP.2010.32)
[205]
K. Pentikousis and T. Rautio. A multiaccess network of information. In 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings, 2010. (doi:10.1109/WOWMOM.2010.5534922)
[206]
A. Pino and G. Kouroupetroglou. Ithaca: An open source framework for building component-based augmentative and alternative communication applications. ACM Transactions on Accessible Computing, 2(4), 2010. (doi:10.1145/1786774.1786775)
[207]
R. Plösch, H. Gruber, C. Körner, and M. Saft. A method for continuous code quality management using static analysis. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 370–375, 2010. (doi:10.1109/QUATIC.2010.68)
[208]
A. Poggi and M. Tomaiuolo. Integrating peer-to-peer and multi-agent technologies for the realization of content sharing applications. Studies in Computational Intelligence, 324:93–107, 2010. (doi:10.1007/978-3-642-16089-9_6)
[209]
M. Poktonjak, S. Meguerdichian, and J.L. Wong. Trusted sensors and remote sensing. In Proceedings of IEEE Sensors, pages 1104–1107, 2010. (doi:10.1109/ICSENS.2010.5690721)
[210]
A. Prata, T. Chambel, and N. Guimarães. Generation of crossmedia dynamic learning contexts from iTV. In EuroITV'10 - Proceedings of the 8th International Interactive TV and Video Conference, pages 91–100, 2010. (doi:10.1145/1809777.1809798)
[211]
A. Prata, N. Guimarães, and T. Chambel. Designing iTV based crossmedia personalized informal learning contexts. In Proceedings of the 14th International Academic MindTrek Conference: Envisioning Future Media Environments, MindTrek 2010, pages 187–194, 2010. (doi:10.1145/1930488.1930528)
[212]
Y. Qiu and X. Liu. Writing mechanism in digital organism file system. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 47(12):2177–2184, 2010.
[213]
K. Rabe and N. Konrad. Current aspects of suicide in correctional facilities. Forensische Psychiatrie, Psychologie, Kriminologie, 4(3):182–192, 2010. (doi:10.1007/s11757-010-0064-5)
[214]
N. Ramzan, M. Larson, F. Dufaux, and K. Clüver. The participation payoff: Challenges and opportunities for multimedia access in networked communities. In MIR 2010 - Proceedings of the 2010 ACM SIGMM International Conference on Multimedia Information Retrieval, pages 487–496, 2010. (doi:10.1145/1743384.1743470)
[215]
A.D. Rand. Mediating at the student-wikipedia intersection. Journal of Library Administration, 50(7):923–932, 2010. (doi:10.1080/01930826.2010.488994)
[216]
Patrick W. Ransil, Aleksey V. Martynov, James S. Larson, James R. Collette, Robert Wai-Chi Chu, and Partha Saha. Method and apparatus for a searchable data service. United States Patent 7,801,912, September 2010. Assignee: Amazon Technologies, Inc. (Reno, NV).
[217]
L. Renggli, M. Denker, and O. Nierstrasz. Language boxes: Bending the host language with modular language changes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5969 LNCS:274–293, 2010. (doi:10.1007/978-3-642-12107-4_20)
[218]
L. Renggli, T. Gîrba, and O. Nierstrasz. Embedding languages without breaking tools. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6183 LNCS:380–404, 2010. (doi:10.1007/978-3-642-14107-2_19)
[219]
J. Reutelshoefer, J. Baumeister, and F. Puppe. Towards meta-engineering for semantic wikis. In CEUR Workshop Proceedings, volume 632, pages 49–63, 2010.
[220]
M. Rey-López, F.A. Mikic-Fonte, A.M. Peleteiro, J.C. Burguillo, and A.B. Barragáns-Martınez. L4f: A P2P its for recommending additional learning contents by means of folksonomies. In ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, volume 4 SAIC, pages 135–138, 2010.
[221]
B. Robinson and P. Francis. Improving industrial adoption of software engineering research: A comparison of open and closed source software. In ESEM 2010 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2010. (doi:10.1145/1852786.1852814)
[222]
Michael J. Rowan, Christopher T. M. Bailey, Kefeng Chen, and Neal Creighton. Security systems and services to provide identity and uniform resource identifier verification. United States Patent 7,694,135, April 2010. Assignee: Geotrust, Inc. (Mountain View, CA).
[223]
B. Salem, J.A. Lino, and M. Rauterberg. Smartex: A case study on user profiling and adaptation in exhibition booths. Journal of Ambient Intelligence and Humanized Computing, 1(3):185–198, 2010. (doi:10.1007/s12652-010-0018-y)
[224]
L.E. Sánchez, C. Ruiz, E. Fernández-Medina, and M. Piattini. Managing the asset risk of SMEs. In ARES 2010 - 5th International Conference on Availability, Reliability, and Security, pages 422–429, 2010. (doi:10.1109/ARES.2010.52)
[225]
C.G. Santillán, L.C. Reyes, E. Schaeffer, E. Meza, and G.R. Zarate. Local survival rule for steer an adaptive ant-colony algorithm in complex systems. Studies in Computational Intelligence, 312:245–265, 2010. (doi:10.1007/978-3-642-15111-8_15)
[226]
S. Sawamura, A. Aikebaier, T. Enokido, V. Barolli, and M. Takizawa. Confidence and trustworthiness in peer-to-peer overlay networks. In Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, pages 117–124, 2010. (doi:10.1109/NBiS.2010.84)
[227]
S. Sawamura, A. Aikebaier, T. Enokido, V. Barolli, and M. Takizawa. Subjective and objective types of trustworthiness in peer-to-peer(P2P) overlay networks. In 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, pages 1108–1113, 2010. (doi:10.1109/WAINA.2010.180)
[228]
S. Sawamura, A. Aikebaier, T. Enokido, V. Barolli, and M. Takizawa. Trustworthiness of acquaintances in peer-to-peer(P2P) overlay networks. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pages 267–274, 2010. (doi:10.1109/CISIS.2010.160)
[229]
S. Sawamura, A. Barolli, A. Aikebaier, V. Barolli, and M. Takizawa. Two types of trustworthiness of acquaintances in peer-to-peer (P2P) overlay networks. In Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010, pages 320–327, 2010. (doi:10.1109/BWCCA.2010.90)
[230]
C. Schanes, A. Mauczka, U. Kirchengast, T. Grechenig, and S. Marx. Nationwide PKI testing - ensuring interoperability of OCSP server and client implementations early during component tests. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6391 LNCS:114–129, 2010. (doi:10.1007/978-3-642-16441-5_8)
[231]
G. Schuster and R. Lovassy. A possible control structure for production lines optimization. In 19th International Workshop on Robotics in Alpe-Adria-Danube Region, RAAD 2010 - Proceedings, pages 423–425, 2010. (doi:10.1109/RAAD.2010.5524550)
[232]
M. Schwind, A. Schenk, and M. Schneider. A tool for the analysis of social networks in collaborative software development. In Proceedings of the Annual Hawaii International Conference on System Sciences, 2010. (doi:10.1109/HICSS.2010.40)
[233]
S. Seneviratne and D.C. Levy. Cost profile prediction for grid computing. Concurrency Computation Practice and Experience, 22(1):107–142, 2010. (doi:10.1002/cpe.1537)
[234]
V. Sesum-Cavic and E. Kühn. A swarm intelligence appliance to the construction of an intelligent peer-to-peer overlay network. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pages 1028–1035, 2010. (doi:10.1109/CISIS.2010.64)
[235]
Q.Z. Sheng, Y. Wu, and D. Ranasinghe. Enabling scalable RFID traceability networks. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pages 1061–1068, 2010. (doi:10.1109/AINA.2010.150)
[236]
S. Shrestha, D.S. Kim, S. Lee, and J.S. Park. A peer-to-peer RFID resolution framework for supply chain network. In 2nd International Conference on Future Networks, ICFN 2010, pages 318–322, 2010. (doi:10.1109/ICFN.2010.98)
[237]
I. Siveroni, A. Zisman, and G. Spanoudakis. A UML-based static verification framework for security. Requirements Engineering, 15(1):95–118, 2010. (doi:10.1007/s00766-009-0091-y)
[238]
D.I.K. Sjøberg. Confronting the myth of rapid obsolescence in computing research. Communications of the ACM, 53(9):62–67, 2010. (doi:10.1145/1810891.1810911)
[239]
J.M. Smith, F.R.B. Cruz, and T. Van Woensel. Optimal server allocation in general, finite, multi-server queueing networks. Applied Stochastic Models in Business and Industry, 26(6):705–736, 2010. (doi:10.1002/asmb.813)
[240]
J.M. Smith, F.R.B. Cruz, and T. van Woensel. Topological network design of general, finite, multi-server queueing networks. European Journal of Operational Research, 201(2):427–441, 2010. (doi:10.1016/j.ejor.2009.03.012)
[241]
Q.D. Soetens and S. Demeyer. Studying the effect of refactorings: A complexity metrics perspective. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 313–318, 2010. (doi:10.1109/QUATIC.2010.58)
[242]
Y.-R. Song and G.-P. Jiang. Epidemic-spreading model for networks with different anti-attack abilities of nodes and nonuniform transmission of edges. Wuli Xuebao/Acta Physica Sinica, 59(11):7546–7551, 2010.
[243]
Y. Song, M.E. Locasto, A. Stavrou, A.D. Keromytis, and S.J. Stolfo. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems. Machine Learning, 81(2):179–205, 2010. (doi:10.1007/s10994-009-5143-5)
[244]
P.G. Spirakis, V. Vlachos, V. Karakoidas, D. Liappis, D. Kalaitzis, E. Valeontis, S. Kollias, and G. Argyros. Blueprints for a large-scale early warning system. In Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010, pages 7–11, 2010. (doi:10.1109/PCI.2010.27)
[245]
A. Steed and M.F. Oliveira. Networked Graphics. Elsevier Inc., 2010.
[246]
K.-J. Stol and M. Ali Babar. Challenges in using open source software in product development: A review of the literature. In Proceedings - International Conference on Software Engineering, pages 17–22, 2010. (doi:10.1145/1833272.1833276)
[247]
K.-J. Stol and M. Ali Babar. A comparison framework for open source software evaluation methods. IFIP Advances in Information and Communication Technology, 319 AICT:389–394, 2010. (doi:10.1007/978-3-642-13244-5_36)
[248]
V. Stolz. An integrated multi-view model evolution framework. Innovations in Systems and Software Engineering, 6(1):13–20, 2010. (doi:10.1007/s11334-009-0102-7)
[249]
J. Sun, H. Chen, and C. Niu. A new database firewall based on anomaly detection. In Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, pages 399–404, 2010. (doi:10.1109/PDCAT.2010.71)
[250]
Hironori Suzuki, Kenichi Moriwaki, and Naoya Okamoto. GUI application development support device, GUI display device, and method, and computer program. United States Patent 7,823,075, October 2010. Assignee: Sony Corporation (Tokyo, JP).
[251]
S. Suzuki, R. Van Meter, O. Nakamura, and J. Murai. Otedama: A relocatable RFID information repository architecture. IEICE Transactions on Information and Systems, E93-D(11):2922–2931, 2010. (doi:10.1587/transinf.E93.D.2922)
[252]
O.Y. Tahboub and J.I. Khan. Forwarding on froggers networks: Principle of data flow equilibrium. In Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pages 125–130, 2010. (doi:10.1109/ITNG.2011.29)
[253]
J.-P. Tolvanen, J. Sprinkle, M. Rossi, and S. Kelly. The 10th workshop on domain-specific modeling. In Proceedings of the ACM International Conference Companion on Object Oriented Programming Systems Languages and Applications Companion, SPLASH '10, pages 269–270, 2010. (doi:10.1145/1869542.1869607)
[254]
R. Tonelli, G. Concas, and M. Locci. Three efficient algorithms for implementing the preferential attachment mechanism in yule-simon stochastic process. WSEAS Transactions on Information Science and Applications, 7(2):176–185, 2010.
[255]
J. Tong, K. Xu, and R. Pi. A new web service structure of combining P2P and CDN technologies. In Proceedings - 2010 IEEE 2nd Symposium on Web Society, SWS 2010, pages 475–479, 2010. (doi:10.1109/SWS.2010.5607404)
[256]
M. Torchiano, F. Ricca, and P. Tonella. Empirical comparison of graphical and annotation-based re-documentation approaches. IET Software, 4(1):15–31, 2010. (doi:10.1049/iet-sen.2009.0015)
[257]
D. Tsolis and S. Sioutas. Digital rights management in peer to peer cultural networks. Handbook of Research on Technologies and Cultural Heritage: Applications and Environments, pages 119–140, 2010. (doi:10.4018/978-1-60960-044-0.ch006)
[258]
Shah Ullah. Targeting content to internet enabled radio devices. United States Patent 7,856,372, December 2010.
[259]
Shah Ullah. Targeting content to network-enabled devices based upon stored profiles. United States Patent 7,856,373, December 2010.
[260]
J. Van Den Bos. Domain-specific languages for digital forensics. In 1st Doctoral Symposium of the International Conference on Software Language Engineering 2010, SLE-DS 2010, volume 648, pages 49–53, 2010.
[261]
B. Van Niekerk and M. Maharaj. Mobile security from an information warfare perspective. In Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010, 2010. (doi:10.1109/ISSA.2010.5588339)
[262]
M. Viroli and F. Zambonelli. A biochemical approach to adaptive service ecosystems. Information Sciences, 180(10):1876–1892, 2010. (doi:10.1016/j.ins.2009.11.021)
[263]
A. Visan, M. Istin, F. Pop, F. Xhafa, and V. Cristea. Peer interest-based discovery for decentralized peer-to-peer systems. In 5th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2010, pages 363–368, 2010. (doi:10.1109/3PGCIC.2010.60)
[264]
P. Vitharana, J. King, and H. Chapman. Impact of internal open source development on reuse: Participatory reuse in action. Journal of Management Information Systems, 27(2):277–304, 2010. (doi:10.2753/MIS0742-1222270209)
[265]
J.L. Vivas, F.-G. Carmen, J. Lopez, and A. Benjumea. A security framework for a workflow-based grid development platform. Computer Standards and Interfaces, 32(5-6):230–245, 2010. (doi:10.1016/j.csi.2009.04.001)
[266]
F. Von Reischach, E. Dubach, F. Michahelles, and A. Schmidt. An evaluation of product review modalities for mobile phones. In ACM International Conference Proceeding Series, pages 199–207, 2010. (doi:10.1145/1851600.1851635)
[267]
A. Vosoughi, K. Bilal, S.U. Khan, N. Min-Allah, J. Li, N. Ghani, P. Bouvry, and S. Madani. A multidimensional robust greedy algorithm for resource path finding in large-scale distributed networks. In Proceedings of the 8th International Conference on Frontiers of Information Technology, FIT'10, 2010. (doi:10.1145/1943628.1943644)
[268]
A. Živkovič, U. Goljat, and M. Heričko. Improving the usability of the source code quality index with interchangeable metrics sets. Information Processing Letters, 110(6):236–240, 2010. (doi:10.1016/j.ipl.2010.01.002)
[269]
W.-Y. Wang and Y.-W. Chen. Is playing-as-downloading feasible in an emule P2P file sharing system? Journal of Zhejiang University: Science C, 11(6):465–475, 2010. (doi:10.1631/jzus.C0910408)
[270]
J. Wang, Y. Li, F. Gong, and W. Chen. A new strategy of resource searching in unstructured P2P network. In 2nd International Conference on Communication Software and Networks, ICCSN 2010, pages 32–36, 2010. (doi:10.1109/ICCSN.2010.120)
[271]
Z. Wei, X. Yuan, D. Jia, and G. Wang. An aquatic product traceability system based on RFID technology. In Proceedings 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010, pages 154–157, 2010. (doi:10.1109/ICSESS.2010.5552384)
[272]
S. Weiss, P. Urso, and P. Molli. Logoot-undo: Distributed collaborative editing system on P2P networks. IEEE Transactions on Parallel and Distributed Systems, 21(8):1162–1174, 2010. (doi:10.1109/TPDS.2009.173)
[273]
W. Wong, M.F. Magalhães, and J. Kangasharju. Piece fingerprinting: Binding content and data blocks together in peer-to-peer networks. In GLOBECOM - IEEE Global Telecommunications Conference, 2010. (doi:10.1109/GLOCOM.2010.5683550)
[274]
W. Wong, M.F. Magalhães, and J. Kangasharju. Towards verifiable parallel content retrieval. In 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010, pages 49–54, 2010. (doi:10.1109/NPSEC.2010.5634450)
[275]
B. Wu, J. Saia, and V. King. Attack-resistant frequency counting. In Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2010, 2010. (doi:10.1109/IPDPS.2010.5470344)
[276]
J. Wulf and R. Zarnekow. Technologies for the electronic distribution of information services - a value proposition analysis. Electronic Markets, 20(1):3–19, 2010. (doi:10.1007/s12525-010-0027-x)
[277]
Shlomo Wygodny, David Elkind, and Moshe Kravchik. System and method for automated tuning of program execution tracing. United States Patent 7,827,539, November 2010. Assignee: Identify Software Ltd.(IL).
[278]
C.C. Xavier and V.L.S. De Lima. Construction of a domain ontological structure from wikipedia. In STIL 2009 - 2009 7th Brazilian Symposium in Information and Human Language Technology, pages 98–107, 2010. (doi:10.1109/STIL.2009.26)
[279]
R.L. Xia and J.K. Muppala. A survey of bittorrent performance. IEEE Communications Surveys and Tutorials, 12(2):140–158, 2010. (doi:10.1109/SURV.2010.021110.00036)
[280]
A. Yadav and R.A. Khan. Does coupling really affect complexity? In 2010 International Conference on Computer and Communication Technology, ICCCT-2010, pages 583–588, 2010. (doi:10.1109/ICCCT.2010.5640463)
[281]
S. Yang and J. Qiu. The utilization law of web academic information: An exploring from the domain name of web citation. Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, 35(SPECIAL ISSUE 1):52–56, 2010.
[282]
S. Yang, J. Qiu, and Z. Xiong. An empirical study on the utilization of web academic resources in humanities and social sciences based on web citations. Scientometrics, 84(1):1–19, 2010. (doi:10.1007/s11192-009-0142-7)
[283]
B.-B. Yin, L.-Z. Zhu, and K.-Y. Cai. Entropy-based measures of heterogeneity of software structural profile. In Proceedings - International Computer Software and Applications Conference, pages 196–201, 2010. (doi:10.1109/COMPSACW.2010.41)
[284]
M. Yoshida and K. Kojima. Design methodologies of workload management through code migration in distributed desktop computing grids. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6082 LNCS(PART 2):100–111, 2010. (doi:10.1007/978-3-642-13136-3_10)
[285]
Y.-F. Yu, P.-J. Huang, Q.-J. Chen, T.-L. Huang, and K.-C. Lai. A scalable multi-attribute range query approach on cluster-based hybrid overlays. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6083 LNCS:136–145, 2010. (doi:10.1007/978-3-642-14822-4_15)
[286]
L. Yuan, H.-M. Wang, G. Yin, D.-X. Shi, and X. Li. Mining and analyzing behavioral characteristic of developers in open source software. Jisuanji Xuebao/Chinese Journal of Computers, 33(10):1909–1918, 2010. (doi:10.3724/SP.J.1016.2010.01909)
[287]
F. Zambonelli and M. Viroli. From service-oriented architectures to nature-inspired pervasive service ecosystems. In CEUR Workshop Proceedings, volume 621, 2010.
[288]
V. Zeimpekis, I. Minis, and V. Pappa. Real-time logistics management of dried figs using RFID technology: Case study in a greek cooperative company. International Journal of Logistics Systems and Management, 7(3):265–285, 2010. (doi:10.1504/IJLSM.2010.035035)
[289]
X. Zhang and H. Hassanein. Video on-demand streaming on the internet - a survey. In 2010 25th Biennial Symposium on Communications, QBSC 2010, pages 88–91, 2010. (doi:10.1109/BSC.2010.5472998)
[290]
L. Zhang, J. Luo, H. Li, J. Sun, and H. Mei. A biting-down approach to hierarchical decomposition of object-oriented systems based on structure analysis. Journal of Software Maintenance and Evolution, 22(8):567–596, 2010. (doi:10.1002/smr.417)
[291]
Y. Zhang, X. Jiang, T. Wang, and Z. Lin. A utility function analysis on DTN services of resource pre- and post-fetching. In Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, pages 3637–3640, 2010. (doi:10.1109/ICEE.2010.913)
[292]
Y. Zhang, X. Lu, and D. Li. Embedded DHT overlays in virtual computing environments. Science in China, Series F: Information Sciences, 53(3):483–493, 2010. (doi:10.1007/s11432-010-0034-8)
[293]
L. Zheng, D. Yue, and J. Niu. A new network acceleration technology based on network server. In Proceedings - 2010 WASE International Conference on Information Engineering, ICIE 2010, volume 4, pages 110–113, 2010. (doi:10.1109/ICIE.2010.317)
[294]
J. Zhou, R. Mo, M. Wang, R. Zhang, M. Shi, H. Yang, and T. Yue. Sddg: Semantic desktop data grid. In Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010, pages 240–245, 2010. (doi:10.1109/ICICIS.2010.5534749)
[295]
J.-T. Zhou, H.-C. Yang, M.-W. Wang, and R. Mo. Peer to peer semantic grid service oriented enterprise information integration architecture. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 16(12):2697–2707, 2010.
[296]
H. Ziekow, B. Fabian, C. Müller, and O. Günther. RFID in the cloud: A service for high-speed data access in distributed value chains. In 16th Americas Conference on Information Systems 2010, AMCIS 2010, volume 7, pages 5453–5463, 2010.
[297]
S. Zuo, Y. Guo, S. Gong, X. Wu, and H. Zhang. Trust value update model based on the memory theory. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 40(SUPPL. 2):307–312, 2010.
[298]
V. Zwass. Co-creation: Toward a taxonomy and an integrated research perspective. International Journal of Electronic Commerce, 15(1):11–48, 2010. (doi:10.2753/JEC1086-4415150101)
[1]
N.T. Abdelmajid, M.A. Hossain, S. Shepherd, and K. Mahmoud. Improved kerberos security protocol evaluation using modified BAN logic. In Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages 1610–1615, 2010. (doi:10.1109/CIT.2010.285)

[2]
N.T. Abdelmajid, M.A. Hossain, S. Shepherd, and K. Mahmoud. Location-based kerberos authentication protocol. In Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, pages 1099–1104, 2010. (doi:10.1109/SocialCom.2010.163)

[3]
D. Acharya and V. Kumar. A secure pervasive health care system using location dependent unicast key generation scheme. In International Conference on Information and Knowledge Management, Proceedings, pages 87–90, 2010. (doi:10.1145/1871902.1871919)

[4]
D. Acharya. Security in pervasive health care networks: Current r&d and future challenges. In Proceedings - IEEE International Conference on Mobile Data Management, pages 305–306, 2010. (doi:10.1109/MDM.2010.38)

[5]
A. Achilleos, N. Georgalas, K. Yang, and G.A. Papadopoulos. A software cost model to assess productivity impact of a model-driven technique in developing domain-specific design tools. Modern Software Engineering Concepts and Practices: Advanced Approaches, pages 333–355, 2010. (doi:10.4018/978-1-60960-215-4.ch014)

[6]
D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe. Optimal design of service overlay networks with economic and performance constraints. International Journal of Communication Systems, 23(3):369–389, 2010. (doi:10.1002/dac.1072)

[7]
G. Adamson. Challenges in researching portals and the internet. International Journal of Web Portals, 2(2):26–37, 2010. (doi:10.4018/jwp.2010040103)

[8]
M.D. Aime, P.C. Pomi, and M. Vallini. Ontology and algorithms for the dependable configuration of information systems. International Journal of Critical Computer-Based Systems, 1(4):310–335, 2010.

[9]
A. Aksulu and M. Wade. A comprehensive review and synthesis of open source research. Journal of the Association of Information Systems, 11(11):576–656, 2010.

[10]
B. Al-Dabbagh, E. Scornavacca, and H. Hoehle. User perceived requirements for a mobile accounting information system. In ACIS 2010 Proceedings - 21st Australasian Conference on Information Systems, 2010.

[11]
J. Al Dallal and L.C. Briand. An object-oriented high-level design-based class cohesion metric. Information and Software Technology, 52(12):1346–1361, 2010. (doi:10.1016/j.infsof.2010.08.006)

[12]
P. Alvaro, D.V. Ryaboy, and D. Agrawal. Knuckles: Bringing the database to the data. International Journal of Computational Science and Engineering, 5(3-4):214–225, 2010. (doi:10.1504/IJCSE.2010.037677)

[13]
T.L. Alves, C. Ypma, and J. Visser. Deriving metric thresholds from benchmark data. In IEEE International Conference on Software Maintenance, ICSM, 2010. (doi:10.1109/ICSM.2010.5609747)

[14]
M. Analoui, M. Sharifi, and M.H. Rezvani. Probabilistic proximity-aware resource location in peer-to-peer networks using resource replication. International Journal of Computers, Communications and Control, 5(4):418–431, 2010.

[15]
A. Andreatos and A. Leros. Simulation course redesign and educational software selection. In 9th European Conference on eLearning 2010, ECEL 2010, pages 29–38. Academic Conferences Limited, 2010.

[16]
R. Andriansyah, T. Van Woensel, F.R.B. Cruz, and L. Duczmal. Performance optimization of open zero-buffer multi-server queueing networks. Computers and Operations Research, 37(8):1472–1487, 2010. (doi:10.1016/j.cor.2009.11.004)

[17]
O. Antonaccio, C.R. Tittle, E. Botchkovar, and M. Kranidiotis. The correlates of crime and deviance: Additional evidence. Journal of Research in Crime and Delinquency, 47(3):297–328, 2010. (doi:10.1177/0022427810365678)

[18]
P. Ardimento, G. Bruno, D. Caivano, and M. Cimitile. A maintenance metric model for open source governance. In 5th Conference of the Italian Chapter of the Association for Information Systems, ItAIS 2008, pages 139–146. Physica-Verlag, 2010. (doi:10.1007/978-3-7908-2148-2_17)

[19]
H.S. Ayatollahi Tabatabaii, M. Khansari, and H.R. Rabiee. Livecod: A mesh-pull P2P live streaming system with XOR-based network coding. In 2010 IEEE Globecom Workshops, GC'10, pages 436–441, 2010. (doi:10.1109/GLOCOMW.2010.5700357)

[20]
R.S. Aygün, Y. Ma, K. Akkaya, G. Cox, and A. Bicak. A conceptual model for data management and distribution in peer-to-peer systems. Peer-to-Peer Networking and Applications, 3(4):294–322, 2010. (doi:10.1007/s12083-009-0061-7)

[21]
S. Baerisch. Domain-specific model-driven testing. Springer Vieweg, 2010. (doi:10.1007/978-3-8348-9624-7)

[22]
K. Bakhrankova. Decision support system for continuous production. Industrial Management and Data Systems, 110(4):591–610, 2010. (doi:10.1108/02635571011039043)

[23]
Kevin Banks, Donovan Kolbly, and Matthew Blackmon. System and method for summarizing and reporting impact of database statements. United States Patent 7,831,621, November 2010. Assignee: Crossroads Systems, Inc. (Austin, TX).

[24]
S. Basagiannis, P. Katsaros, and A. Pombortsis. An intruder model with message inspection for model checking security protocols. Computers and Security, 29(1):16–34, 2010. (doi:10.1016/j.cose.2009.08.003)

[25]
Christian Beaumont, James F. Springfield, and Nenad Stefanovic. Hosting controls in a window via an interface for controlling the window. United States Patent 7,730,496, June 2010. Assignee: Microsoft Corporation (Redmond, WA).

[26]
K. Berte, D. Schuurman, and L. De Marez. Adoption versus use diffusion of idtv in flanders- personalized television content as a tool to cross the chasm? In EuroITV'10 - Proceedings of the 8th International Interactive TV and Video Conference, pages 15–22, 2010. (doi:10.1145/1809777.1809781)

[27]
N. Bicocchi, M. Baumgarten, N. Brgulja, R. Kusber, M. Mamei, M. Mulvenna, and F. Zambonelli. Self-organized data ecologies for pervasive situation-aware services: The knowledge networks approach. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans, 40(4):789–802, 2010. (doi:10.1109/TSMCA.2010.2048023)

[28]
N. Bicocchi, M. Mamei, and F. Zambonelli. Handling dynamics in diffusive aggregation schemes: An evaporative approach. Future Generation Computer Systems, 26(6):877–889, 2010. (doi:10.1016/j.future.2010.02.008)

[29]
H. Boomkamp. Global GPS reference frame solutions of unlimited size. Advances in Space Research, 46(2):136–143, 2010. (doi:10.1016/j.asr.2010.02.015)

[30]
N. Borch, K. Mitchell, and D. Gabrijelčič. Access control to bittorrent swarms using closed swarms. In AVSTP2P'10 - Proceedings of the 2010 ACM Workshop on Advanced Video Streaming Techniques for Peer-to-Peer Networks and Social Networking, Co-located with ACM Multimedia 2010, pages 25–30, 2010. (doi:10.1145/1877891.1877898)

[31]
J.-M. Borello, E. Filiol, and L. Mé. From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques. Journal in Computer Virology, 6(3):277–287, 2010. (doi:10.1007/s11416-009-0136-2)

[32]
M. Brogle, S. Barthlomé, and T. Braun. Quality of service for multicasting using NICE. In Proceedings of the ACM Symposium on Applied Computing, pages 670–677, 2010. (doi:10.1145/1774088.1774227)

[33]
B.R. Bryant, J. Gray, and M. Mernik. Domain-specific software engineering. In Proceedings of the FSE/SDP Workshop on the Future of Software Engineering Research, FoSER 2010, pages 65–68, 2010. (doi:10.1145/1882362.1882376)

[34]
R.P.L. Buse and T. Zimmermann. Analytics for software development. In Proceedings of the FSE/SDP Workshop on the Future of Software Engineering Research, FoSER 2010, pages 77–80, 2010. (doi:10.1145/1882362.1882379)

[35]
A.A. Bush and A. Tiwana. Signaling in content sharing platforms. In ICIS 2010 Proceedings - Thirty First International Conference on Information Systems, 2010.

[36]
F. Calzolari, S. Arezzini, A. Ciampa, E. Mazzoni, A. Domenici, and G. Vaglini. High availability using virtualization. Journal of Physics: Conference Series, 219(1 PART 5), 2010. (doi:10.1088/1742-6596/219/5/052017)

[37]
S. Castano, A. Ferrara, and S. Montanelli. A reference architecture for semantic knowledge coordination. In 5th Conference of the Italian Chapter of the Association for Information Systems, ItAIS 2008, pages 185–193. Physica-Verlag, 2010. (doi:10.1007/978-3-7908-2148-2_22)

[38]
H. Chehade, F. Yalaoui, L. Amodeo, and F. Dugardin. Buffers sizing in assembly lines using a lorenz multiobjective ant colony optimization algorithm. In 2010 International Conference on Machine and Web Intelligence, ICMWI 2010 - Proceedings, pages 283–287, 2010. (doi:10.1109/ICMWI.2010.5647916)

[39]
S. Chen and G. Yang. Superpathtrust for trust aggregation in unstructured peer-to-peer networks. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 31(1):223–228, 2010.

[40]
F. Chen, M.P. Johnson, A. Bar-Noy, and T.F. La Porta. Cooperative data dissemination to mission sites. In Proceedings of SPIE - The International Society for Optical Engineering, volume 7706, 2010. (doi:10.1117/12.851186)

[41]
G. Chen, A. Sarrafzadeh, C.P. Low, and L. Zhang. A self-organization mechanism based on cross-entropy method for P2P-like applications. ACM Transactions on Autonomous and Adaptive Systems, 5(4), 2010. (doi:10.1145/1867713.1867716)

[42]
K. Chen, T.-L. Hu, and G. Chen. Fast trust chain search in role-based credential overlay network. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 44(12):2241–2250, 2010. (doi:10.3785/j.issn.1008-973X.2010.12.003)

[43]
Y. Chung. Efficient batch update of unique identifiers in a distributed hash table for resources in a mobile host. In Proceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, pages 625–630, 2010. (doi:10.1109/ISPA.2010.73)

[44]
A. Cicchetti, D. Di Ruscio, P. Pelliccione, A. Pierantonio, and S. Zacchiroli. A model driven approach to upgrade package-based software systems. Communications in Computer and Information Science, 69 CCIS:262–276, 2010. (doi:10.1007/978-3-642-14819-4_19)

[45]
T. Clark and L. Tratt. Formalizing homogeneous language embeddings. Electronic Notes in Theoretical Computer Science, 253(7):75–88, 2010. (doi:10.1016/j.entcs.2010.08.033)

[46]
F. Clear. Innovative knowledge transfer mechanisms and the potential role for theatric methods in the propagation of good data handling practice. Smart Innovation, Systems and Technologies, 5:197–208, 2010.

[47]
M. Colajanni, M. Marchetti, and M. Messori. Selective and early threat detection in large networked systems. In Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages 604–611, 2010. (doi:10.1109/CIT.2010.124)

[48]
G. Concas, M. Locci, M. Marchesi, R. Tonelli, and I. Turnu. Computing the fractal dimension - a global metrics for large software systems. In 2010 International Conference on Computational Intelligence and Software Engineering, CiSE 2010, 2010. (doi:10.1109/CISE.2010.5676891)

[49]
Rod Cope and Eric Weidner. Installation of software stacks including uncoordinated projects. United States Patent 7,669,199, February 2010. Assignee: OpenLogic, Inc. (Broomfield, CO).

[50]
Rod Cope and Eric Weidner. Software project filter. United States Patent 7,665,086, February 2010. Assignee: OpenLogic, Inc. (Broomfield, CO).

[51]
Rod Cope and Eric Weidner. Tools for stacking uncoordinated software projects. United States Patent 7,661,089, February 2010. Assignee: OpenLogic, Inc. (Broomfield, CO).

[52]
S. Counsell, G. Loizou, and R. Najjar. Is manual data collection hampered by the presence of inner classes or class size. In Advanced Techniques in Computing Sciences and Software Engineering, pages 91–97, 2010.

[53]
M. Crasso, C. Mateos, A. Zunino, and M. Campo. Empirically assessing the impact of dependency injection on the development of web service applications. Journal of Web Engineering, 9(1):66–94, 2010.

[54]
O. Curé, R. Forax, P. Degenne, D.L. Seen, D. Parigot, and A.A. Lahcen. Ocelet: An ontology-based domain specific language to model complex domains. In 3rd Int. Conf. on Communication Theory, Reliability, and Quality of Service, CTRQ 2010, Includes MOPAS 2010: 1st Int. Conf. on Models and Ontology-Based Design of Protocols, Architecture and Services, pages 255–260, 2010. (doi:10.1109/CTRQ.2010.50)

[55]
S. Das and M. Magdon-Ismail. Collective wisdom: Information growth in wikis and blogs. In Proceedings of the ACM Conference on Electronic Commerce, pages 231–240, 2010. (doi:10.1145/1807342.1807380)

[56]
B. Das, A. Garcia-Diaz, C.A. MacDonald, and K.K. Ghoshal. A computer simulation approach to evaluating bowl versus inverted bowl assembly line arrangement with variable operation times. International Journal of Advanced Manufacturing Technology, 51(1-4):15–24, 2010. (doi:10.1007/s00170-010-2614-6)

[57]
B. Das, J.M. Sanchez-Rivas, A. Garcia-Diaz, and C.A. MacDonald. A computer simulation approach to evaluating assembly line balancing with variable operation times. Journal of Manufacturing Technology Management, 21(7):872–887, 2010. (doi:10.1108/17410381011077964)

[58]
E.C. De Almeida, J.E. Marynowski, G. Sunyé, and P. Valduriez. Peerunit: A framework for testing peer-to-peer systems. In ASE'10 - Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pages 169–170, 2010. (doi:10.1145/1858996.1859030)

[59]
E.C. De Almeida, G. Sunyé, Y. Le Traon, and P. Valduriez. Testing peer-to-peer systems. Empirical Software Engineering, 15(4):346–379, 2010. (doi:10.1007/s10664-009-9124-x)

[60]
W.K. Dedzoe, P. Lamarre, R. Akbarinia, and P. Valduriez. Asap top-k query processing in unstructured P2P systems. In 2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010 - Proceedings, 2010. (doi:10.1109/P2P.2010.5569974)

[61]
L. Demir, S. Tunali, and D.T. Eliiyi. An adaptive tabu search approach for buffer allocation problem in unreliable production lines. In 24th Mini EURO Conference on Continuous Optimization and Information-Based Technologies in the Financial Sector, MEC EurOPT 2010, pages 207–212. Vilnius Gediminas Technical University, 2010.

[62]
M. Deriu, A. Soro, and G. Paddeu. Dynamic TV content augmentation by web pages - a prototype of enhanced remote control capable to complement TV-viewing retrieving additional information from the world wide web. In International Conference on Applied Computer Science - Proceedings, pages 469–472, 2010.

[63]
S. Dix and I. Phau. Measuring situational triggers of television channel switching. Marketing Intelligence and Planning, 28(2):137–150, 2010. (doi:10.1108/02634501011029655)

[64]
D. Djuric and V. Devedzic. Magic potion: Incorporating new development paradigms through metaprogramming. IEEE Software, 27(5):38–44, 2010. (doi:10.1109/MS.2010.90)

[65]
E. Dodonov and R.F. de Mello. A novel approach for distributed application scheduling based on prediction of communication events. Future Generation Computer Systems, 26(5):740–752, 2010. (doi:10.1016/j.future.2009.05.004)

[66]
C.R.P. Dos Santos, S. Cechin, L.Z. Granville, M.J.B. Almeida, and L.M.R. Tarouco. On the impact of using presence services in P2P-based network management systems. In GLOBECOM - IEEE Global Telecommunications Conference, 2010. (doi:10.1109/GLOCOM.2010.5683578)

[67]
M. El-Sharqwi, H. Mahdi, and I. El-Madah. Pattern-based model refactoring. In Proceedings, ICCES'2010 - 2010 International Conference on Computer Engineering and Systems, pages 301–306, 2010. (doi:10.1109/ICCES.2010.5674873)

[68]
A. Epstein, D.H. Lorenz, E. Silvera, and I. Shapira. Virtual appliance content distribution for a global infrastructure cloud service. In Proceedings - IEEE INFOCOM, 2010. (doi:10.1109/INFCOM.2010.5462176)

[69]
M.A. Ertürk, A.H. Zaim, and S. Akyoku c s. Semantic information retrieval on peer-to-peer networks. Communications in Computer and Information Science, 88 CCIS(PART 2):715–725, 2010. (doi:10.1007/978-3-642-14306-9_71)

[70]
S. Esteves, L. Veiga, and P. Ferreira. Gridp2p: Resource usage in grids and peer-to-peer systems. In Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, 2010. (doi:10.1109/IPDPSW.2010.5470917)

[71]
M. Fleck, A. von Kaenel, and M. Meckel. Web 2.0 concepts, social software and business models. Encyclopedia of E-Business Development and Management in the Global Economy, 3:1183–1192, 2010. (doi:10.4018/978-1-61520-611-7.ch119)

[72]
A. Forestiero, E. Leonardi, C. Mastroianni, and M. Meo. Self-chord: A bio-inspired P2P framework for self-organizing distributed systems. IEEE/ACM Transactions on Networking, 18(5):1651–1664, 2010. (doi:10.1109/TNET.2010.2046745)

[73]
A. Forestiero, C. Mastroianni, G. Papuzzo, and G. Spezzano. A proximity-based self-organizing framework for service composition and discovery. In CCGrid 2010 - 10th IEEE/ACM International Conference on Cluster, Cloud, and Grid Computing, pages 428–437, 2010. (doi:10.1109/CCGRID.2010.48)

[74]
D. Forte and A. de Donno. Mobile network investigations. In Handbook of Digital Forensics and Investigation, pages 517–557. Elsevier Ltd, 2010. (doi:10.1016/B978-0-12-374267-4.00010-0)

[75]
S. Gad. Data synchronization architectural pattern for ubiquitous learning systems. In Workshop on Programming Support Innovations for Emerging Distributed Applications, PSI EtA - PsiH 2010, 2010. (doi:10.1145/1940747.1940749)

[76]
D. Gamayunov, N.T.M. Quan, F. Sakharov, and E. Toroshchin. Race walk: Fast instruction frequency analysis and classification for shellcode detection in network flow. In EC2ND 2009 - European Conference on Computer Network Defense, pages 4–12, 2010. (doi:10.1109/EC2ND.2009.9)

[77]
W. Gao, G. Zhang, M. Wang, S. See, Q. Wang, and X. Jiang. An agricultural information sharing system based on P2P network technology. Intelligent Automation and Soft Computing, 16(6):945–951, 2010.

[78]
V. Garcıa-Dıaz, H. Fernández-Fernández, E. Palacios-González, B.C.P. G-Bustelo, O. Sanjuán-Martınez, and J.M.C. Lovelle. Talisman MDE: Mixing MDE principles. Journal of Systems and Software, 83(7):1179–1191, 2010. (doi:10.1016/j.jss.2010.01.010)

[79]
J. Geldenhuys. Finding the core developers. In Proceedings - 36th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2010, pages 447–450, 2010. (doi:10.1109/SEAA.2010.66)

[80]
S. Georgiades. Sensitive practice with greek immigrants: A review of evidence. International Journal of Culture and Mental Health, 3(1):52–60, 2010. (doi:10.1080/17542861003607995)

[81]
D. Germanus, A. Khelil, and N. Suri. Increasing the resilience of critical SCADA systems using peer-to-peer overlays. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6150 LNCS:161–178, 2010. (doi:10.1007/978-3-642-13556-9_10)

[82]
Allan E. Gillespie. Reduction of join operations when archiving related database tables. United States Patent 7,836,022, November 2010. Assignee: International Business Machines Corporation (Armonk, NY).

[83]
R. Gitzel, S. Krug, and M. Brhel. Towards a software failure cost impact model for the customer: An analysis of an open source product. In ACM International Conference Proceeding Series, 2010. (doi:10.1145/1868328.1868354)

[84]
D.X. Gkoutzelis and M.S. Sardis. Web server security on open source environments. 3rd International Conference on Next Generation Society: Technological and Legal Issues, e-Democracy 2009, 26 LNICST:236–247, 2010. (doi:10.1007/978-3-642-11631-5_22)

[85]
R. Glott, A.-K. Groven, K. Haaland, and A. Tannenberg. Quality models for free/libre open source software - towards the "silver bullet"? In Proceedings - 36th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2010, pages 439–446, 2010. (doi:10.1109/SEAA.2010.23)

[86]
J.M. Gonzalez-Barahona, G. Robles, and S. Dueñas. Collecting data about FLOSS development: The FLOSSMetrics experience. In Proceedings - International Conference on Software Engineering, pages 29–34, 2010. (doi:10.1145/1833272.1833278)

[87]
V. Gorodetsky, O. Karsaev, V. Samoylov, and S. Serebryakov. P2p agent platform: Implementation and testing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5319 LNAI:41–54, 2010. (doi:10.1007/978-3-642-11368-0_4)

[88]
P. Grobelny. A method for reasoning about complex services within geographic information systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6070 LNAI(PART 1):132–141, 2010. (doi:10.1007/978-3-642-13480-7_15)

[89]
A.-K. Groven, K. Haaland, R. Glott, and A. Tannenberg. Security measurements within the framework of quality assessment models for free/libre open source software. In ACM International Conference Proceeding Series, pages 229–235, 2010. (doi:10.1145/1842752.1842796)

[90]
S. Günther and T. Cleenewerck. Design principles for internal domain-specific languages: A pattern catalog illustrated by Ruby. In 17th Conference on Pattern Languages of Programs, PLoP 2010, 2010. (doi:10.1145/2493288.2493291)

[91]
S. Günther, M. Haupt, and M. Splieth. Agile engineering of internal domain-specific languages with dynamic programming languages. In Proceedings - 5th International Conference on Software Engineering Advances, ICSEA 2010, pages 162–168, 2010. (doi:10.1109/ICSEA.2010.32)

[92]
M. Hai and S. Guo. A distributed node clustering mechanism in P2P networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6441 LNAI(PART 2):553–560, 2010. (doi:10.1007/978-3-642-17313-4_57)

[93]
M. Hai and Y. Tu. A P2P e-commerce model based on interest community. In Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, pages 362–365, 2010. (doi:10.1109/ICMeCG.2010.80)

[94]
E. Haleplidis, C. Tranoris, S. Denazis, and O. Koufopavlou. Adopting software engineering practices to network processor devices: Introducing the domain specific modeling paradigm to the forces framework. In Proceedings of the 2010 International Conference on Network and Service Management, CNSM 2010, pages 366–369, 2010. (doi:10.1109/CNSM.2010.5691237)

[95]
M. Hamasaki, H. Takeda, and T. Nishimura. Network analysis of an emergent massively collaborative creation on video sharing website: Case study of creation community of hatsume miku movie on nico nico douga. Transactions of the Japanese Society for Artificial Intelligence, 25(1):157–167, 2010.

[96]
A. Hameurlain, D. Cokuslu, and K. Erciyes. Resource discovery in grid systems: A survey. International Journal of Metadata, Semantics and Ontologies, 5(3):251–263, 2010. (doi:10.1504/IJMSO.2010.034048)

[97]
D. Han and Y. Yu. Keyword search in unstructured peer-to-peer networks. Springer US, 2010. (doi:10.1007/978-0-387-09751-0_15)

[98]
B.-O. Hartmann and K. Böhm. Towards efficient equilibria of combinations of network-formation and interaction strategies. In Proceedings - 2010 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2010, volume 2, pages 14–23, 2010. (doi:10.1109/WI-IAT.2010.50)

[99]
S. Hatahet, A. Bouabdallah, and Y. Challal. A new worm propagation threat in bittorrent: Modeling and analysis. Telecommunication Systems, 45(2-3):95–109, 2010. (doi:10.1007/s11235-009-9241-2)

[100]
Ø. Hauge, C. Ayala, and R. Conradi. Adoption of open source software in software-intensive organizations - a systematic literature review. Information and Software Technology, 52(11):1133–1154, 2010. (doi:10.1016/j.infsof.2010.05.008)

[101]
H. Hietanen. Networked digital video recorders and social networks. In 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 2010. (doi:10.1109/CCNC.2010.5421715)

[102]
L.J. Holtzblatt, L.E. Damianos, and D. Weiss. Factors impeding wiki use in the enterprise: A case study. In Conference on Human Factors in Computing Systems - Proceedings, pages 4661–4675, 2010. (doi:10.1145/1753846.1754208)

[103]
S.K.A. Hossain, A.S.M. Mahfujur Rahman, T.T. Tran, and A. El Saddik. Location aware question answering based product searching in mobile handheld devices. In Proceedings - IEEE International Symposium on Distributed Simulation and Real-Time Applications, DS-RT, pages 189–195, 2010. (doi:10.1109/DS-RT.2010.28)

[104]
H.-H. Hsu and H.-T. Liao. Online note sharing in a mobile self-guided tour system. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pages 740–745, 2010. (doi:10.1109/CISIS.2010.121)

[105]
C.-L. Hu, Y.-H. Chang, D.-Y. Chen, and Y.-W. Chen. Simple peer selection strategies for fast and fair peer-to-peer file sharing. In International Conference on Advanced Communication Technology, ICACT, volume 1, pages 208–213, 2010.

[106]
C.-L. Hu, D.-Y. Chen, Y.-H. Chang, and Y.-W. Chen. Fair peer assignment scheme for peer-to-peer file sharing. KSII Transactions on Internet and Information Systems, 4(5):709–735, 2010. (doi:10.3837/tiis.2010.10.002)

[107]
Y.-S. Huang, X.-W. Meng, and Y.-J. Zhang. Strategy of content location of P2P based on the social network. Ruan Jian Xue Bao/Journal of Software, 21(10):2622–2630, 2010. (doi:10.3724/SP.J.1001.2010.03647)

[108]
Z. Huang, J. Huai, X. Liu, and J. Zhu. Business process decomposition based on service relevance mining. In Proceedings - 2010 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2010, volume 1, pages 573–580, 2010. (doi:10.1109/WI-IAT.2010.21)

[109]
T. Huffmire, C. Irvine, T.D. Nguyen, T. Levin, R. Kastner, and T. Sherwood. Handbook of FPGA design security. Springer Netherlands, 2010. (doi:10.1007/978-90-481-9157-4)

[110]
J.R. Ikoja-Odongo. Information security policies, volume 1. IGI Global, 2010. (doi:10.4018/978-1-61520-847-0.ch025)

[111]
L. Ilijašić and L. Saitta. Long-tailed distributions in grid complex network. In Proceeding of the 2nd Workshop on Grids Meets Autonomic Computing, GMAC '10, Co-located with ICAC'10, pages 21–30, 2010. (doi:10.1145/1809029.1809032)

[112]
D. Irwanto. Visual indicator component software to show component design quality and characteristic. In Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010, pages 50–54, 2010. (doi:10.1109/ACT.2010.34)

[113]
A. Israeli and D.G. Feitelson. The Linux kernel as a case study in software evolution. Journal of Systems and Software, 83(3):485–501, 2010. (doi:10.1016/j.jss.2009.09.042)

[114]
S.S. Iyengar, N. Parameshwaran, V.V. Phoha, N. Balakrishnan, and C.D. Okoye. Fundamentals of Sensor Network Programming: Applications and Technology. John Wiley and Sons, 2010. (doi:10.1002/9780470890158)

[115]
D. Izquierdo-Cortazar, J.M. Gonzalez-Barahona, S. Dueñas, and G. Robles. Towards automated quality models for software development communities: The QualOSS and FLOSSMetrics case. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 364–369, 2010. (doi:10.1109/QUATIC.2010.66)

[116]
L. Jakab, A. Cabellos-Aparicio, T. Silverston, M. Solé, F. Cora, and J. Domingo-Pascual. Corecast: How core/edge separation can help improving inter-domain live streaming. Computer Networks, 54(18):3388–3401, 2010. (doi:10.1016/j.comnet.2010.07.005)

[117]
Q.-J. Ji. A novel optimal data scheduling approach to P2P content distribution. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 44(3):403–406+412, 2010.

[118]
H.M. Judi, S.M. Salleh, N. Hussin, and S. Idris. Activity surveillance and hawthorne effect to prevent programming plagiarism. Journal of Computer Science, 6(11):1341–1346, 2010. (doi:10.3844/jcssp.2010.1341.1346)

[119]
M. Jureczko and L. Madeyski. Towards identifying software project clusters with regard to defect prediction. In ACM International Conference Proceeding Series, 2010. (doi:10.1145/1868328.1868342)

[120]
M. Kaiafa-Gbandi. Punishing corruption in the public and the private sector: The legal framework of the european union in the international scene and the greek legal order. European Journal of Crime, Criminal Law and Criminal Justice, 18(2):139–183, 2010. (doi:10.1163/157181710X12659830399617)

[121]
G. Kakarontzas and I. Stamelos. Component recycling for agile methods. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 397–402, 2010. (doi:10.1109/QUATIC.2010.72)

[122]
T. Kalibera, P. Parizek, G. Haddad, G.T. Leavens, and J. Vitek. Challenge benchmarks for verification of real-time programs. In PLPV'10 - Proceedings of the 2010 ACM SIGPLAN Workshop on Programming Languages meets Program Verification, pages 57–62, 2010. (doi:10.1145/1707790.1707800)

[123]
T. Kalibera, P. Parizek, M. Malohlava, and M. Schoeberl. Exhaustive testing of safety critical java. In ACM International Conference Proceeding Series, pages 164–174, 2010. (doi:10.1145/1850771.1850794)

[124]
D. Kallinikou, M. Papadopoulos, A. Kaponi, and V. Strakantouna. Intellectual property issues for digital libraries at the intersection of law, technology, and the public interest. E-Publishing and Digital Libraries: Legal and Organizational Issues, pages 294–341, 2010. (doi:10.4018/978-1-60960-031-0.ch015)

[125]
P. Kamthan. On the implications of the social web environment for pedagogical patterns. IGI Global, 2010. (doi:10.4018/978-1-60960-144-7.ch009)

[126]
Yiannis Kanellopoulos, Panos Antonellis, Dimitris Antoniou, Christos Makris, Evangelos Theodoridis, Christos Tjortjis, and Nikos Tsirakis. Code quality evaluation methodology using the ISO/IEC 9126 standard. International Journal of Software Engineering and Applications, 1(3):17–36, July 2010.

[127]
I. Kang, S. Choi, S. Jung, and S. Lee. Tree-based index overlay in hybrid peer-to-peer systems. Journal of Computer Science and Technology, 25(2):313–329, 2010. (doi:10.1007/s11390-010-9326-0)

[128]
G. Kardas, Z. Demirezen, and M. Challenger. Towards a DSML for semantic web enabled multi-agent systems. In ECOOP 2010 Workshop Proceedings - International Workshop on Formalization of Modeling Languages, FML'10, 2010. (doi:10.1145/1943397.1943402)

[129]
I. Kelényi, Á. Ludányi, and J.K. Nurminen. Bittorrent on mobile phones - energy efficiency of a distributed proxy solution. In 2010 International Conference on Green Computing, Green Comp 2010, pages 451–458, 2010. (doi:10.1109/GREENCOMP.2010.5598282)

[130]
P. Kenyeres, A. Szentgyörgyi, T. Mészáros, and G. Fehér. Botspot: Anonymous and distributed malware detection. 2nd International Conference on Wireless and Mobile networks, WiMo 2010, 84:59–70, 2010. (doi:10.1007/978-3-642-14171-3_6)

[131]
H. Ketmaneechairat, P. Oothongsap, and A. Mingkhwan. Buffer size estimation for different start video broadcasting. In ECTI-CON 2010 - The 2010 ECTI International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pages 924–928, 2010.

[132]
A. Khelil, S. Jeckel, D. Germanus, and N. Suri. Towards benchmarking of P2P technologies from a SCADA systems protection perspective. 2nd International ICST Conference on Mobile Lightweight Wireless Systems, MOBILIGHT 2010, 45 LNICST:400–414, 2010. (doi:10.1007/978-3-642-16644-0_35)

[133]
H.M. Kienle. It's about time to take javascript (more) seriously. IEEE Software, 27(3):60–62, 2010. (doi:10.1109/MS.2010.76)

[134]
J. Kim, J. Shin, J. Choi, S. Lee, M. Kim, and S. Lee. A DHT-based virtual storage system in windows environments. In 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010, volume 4, pages 169–172, 2010. (doi:10.1109/ICCAE.2010.5451741)

[135]
M.S. Kirkpatrick and E. Bertino. Enforcing spatial constraints for mobile RBAC systems. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pages 99–108, 2010. (doi:10.1145/1809842.1809860)

[136]
Darko Kirovski and Kamal Jain. Off-line economies for digital media. United States Patent 7,818,811, October 2010. Assignee: Microsoft Corporation (Redmond, WA).

[137]
B. Kitts, L. Wei, D. Au, S. Zlomek, R. Brooks, and B. Burdick. Targeting television audiences using demographic similarity. In Proceedings - IEEE International Conference on Data Mining, ICDM, pages 1391–1399, 2010. (doi:10.1109/ICDMW.2010.200)

[138]
M. Klein and M.L. Nelson. Evaluating methods to rediscover missing web pages from the web infrastructure. In Proceedings of the ACM International Conference on Digital Libraries, pages 59–68, 2010. (doi:10.1145/1816123.1816133)

[139]
M. Klein, J. Shipman, and M.L. Nelson. Is this a good title? In HT'10 - Proceedings of the 21st ACM Conference on Hypertext and Hypermedia, pages 3–12, 2010. (doi:10.1145/1810617.1810621)

[140]
M. Kobayashi, J. Kageyama, S. Shibusawa, and T. Yonekura. File replication method based on demand forecasting of file download in P2P networks. Journal of Digital Information Management, 8(4):247–253, 2010.

[141]
M. Kodialam, T.V. Lakshman, S. Mukherjee, and L. Wang. Online scheduling of targeted advertisements for IPTV. In Proceedings - IEEE INFOCOM, 2010. (doi:10.1109/INFCOM.2010.5461972)

[142]
E. Konidari and P. Louridas. When students are not programmers. ACM Inroads, 1(1):55–60, 2010. (doi:10.1145/1721933.1721952)

[143]
T. Kos, T. Kosar, J. Knez, and M. Mernik. Improving end-user productivity in measurement systems with a domain-specific (modeling) language sequencer. In 14th East-European Conference on Advances in Databases and Information Systems, ADBIS 2010, volume 639, pages 61–76, 2010.

[144]
T. Kosar, N. Oliveira, M. Mernik, M.J.V. Pereira, M. Črepinšek, D. da Cruz, and P.R. Henriques. Comparing general-purpose and domain-specific languages: An empirical study. Computer Science and Information Systems, 7(2):247–264, 2010. (doi:10.2298/CSIS1002247K)

[145]
T. Koskela, O. Kassinen, Z. Ou, and M. Ylianttila. Improving community management performance with two-level hierarchical DHT overlays. Journal of Internet Technology, 11(2):167–180, 2010.

[146]
A.G. Kotsopoulos and T.A. Antonakopoulos. Nanopositioning using the spiral of archimedes: The probe-based storage case. Mechatronics, 20(2):273–280, 2010. (doi:10.1016/j.mechatronics.2009.12.004)

[147]
D.E. Koulouriotis, A.S. Xanthopoulos, and V.D. Tourassis. Simulation optimisation of pull control policies for serial manufacturing lines and assembly manufacturing systems using genetic algorithms. International Journal of Production Research, 48(10):2887–2912, 2010. (doi:10.1080/00207540802603759)

[148]
U. Krenn, M. Thonhauser, and C. Kreiner. Ecql: A query and action language for model-based applications. In 17th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2010, pages 286–290, 2010. (doi:10.1109/ECBS.2010.40)

[149]
A. Kritikos, G. Kakarontzas, and I. Stamelos. A semi-automated process for open source code reuse. In ENASE 2010 - Proceedings of the 5th International Conference on Evaluation of Novel Approaches to Software Engineering, pages 179–185, 2010.

[150]
E. La Mattina, V. Savarino, C. Vicari, D. Storelli, and D. Bianchini. A technological infrastructure to sustain internetworked enterprises. Evolving Towards the Internetworked Enterprise: Technological and Organizational Perspectives, pages 97–117, 2010. (doi:10.1007/978-1-4419-7279-8_5)

[151]
A.P. Leros, A. Andreatos, and A. Zagorianos. Matlab - octave science and engineering benchmarking and comparison. In International Conference on Computers - Proceedings, volume 1, pages 746–754, 2010.

[152]
F. Li and Y. Ishikawa. Query processing in a traceable P2P record exchange framework. IEICE Transactions on Information and Systems, E93-D(6):1433–1446, 2010. (doi:10.1587/transinf.E93.D.1433)

[153]
Y. Li and X. Zhang. AjCQFr: AOP-based code quality framework. In Proceedings of ICCIA 2010 — 2010 International Conference on Computer and Information Application, pages 199–202, 2010. (doi:10.1109/ICCIA.2010.6141570)

[154]
Y.-M. Li. Pricing digital content distribution over heterogeneous channels. Decision Support Systems, 50(1):243–257, 2010. (doi:10.1016/j.dss.2010.08.027)

[155]
C.-C. Liang. Downward communications enhancement using a robust broadcasting mechanism. Expert Systems with Applications, 37(1):741–755, 2010. (doi:10.1016/j.eswa.2009.05.096)

[156]
J. Liebig, S. Apel, C. Lengauer, C. Kästner, and M. Schulze. An analysis of the variability in forty preprocessor-based software product lines. In Proceedings - International Conference on Software Engineering, volume 1, pages 105–114, 2010. (doi:10.1145/1806799.1806819)

[157]
C.-S. Lin. Improving the availability of scalable on-demand streams by dynamic buffering on P2P networks. KSII Transactions on Internet and Information Systems, 4(4):491–508, 2010. (doi:10.3837/tiis.2010.08.003)

[158]
M.A. Lindner, L.M. Vaquero, L. Rodero-Merino, and J. Caceres. Cloud economics: Dynamic business models for business on demand. International Journal of Business Information Systems, 5(4):373–392, 2010. (doi:10.1504/IJBIS.2010.032938)

[159]
J. Lindsay, J. Noble, and E. Tempero. Does size matter? a preliminary investigation of the consequences of powerlaws in software. In Proceedings - International Conference on Software Engineering, pages 16–23, 2010. (doi:10.1145/1809223.1809226)

[160]
Y. Liu, Y. Li, L.T. Yang, N. Xiong, L. Zhu, and K. Xu. The resource locating strategy based on subdomain hybrid P2P network model. In Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, 2010. (doi:10.1109/IPDPSW.2010.5470710)

[161]
Y. Liu, N. Xiong, J.H. Park, C. Yang, and K. Xu. Fair incentive mechanism with pyramidal structure for peer-to-peer networks. IET Communications, 4(1):1–12, 2010. (doi:10.1049/iet-com.2008.0702)

[162]
Y. Liu, N. Xiong, L. Zhu, J.H. Park, and J. Gao. An effective simulation method for search strategy in unstructured P2P network. Simulation Modelling Practice and Theory, 18(4):456–469, 2010. (doi:10.1016/j.simpat.2009.09.001)

[163]
M. Locci, G. Concas, R. Tonelli, and I. Turnu. Three algorithms for analyzing fractal software networks. WSEAS Transactions on Information Science and Applications, 7(3):371–380, 2010.

[164]
X. Long and J. Joshi. Barms: A bayesian reputation management approach for P2P systems. In 2010 IEEE International Conference on Information Reuse and Integration, IRI 2010, pages 147–152, 2010. (doi:10.1109/IRI.2010.5558948)

[165]
G. López Millán, M. Gil Pérez, G. Martínez Pérez, and A.F. Gómez Skarmeta. PKI-based trust management in inter-domain scenarios. Computers and Security, 29(2):278–290, 2010. (doi:10.1016/j.cose.2009.08.004)

[166]
S.-P. Lu, K.-M. Li, and C.-Y. Hsieh. The study of dynamic navigation with WAVE/DSRC in VANETs. In ICS 2010 - International Computer Symposium, pages 524–528, 2010. (doi:10.1109/COMPSYM.2010.5685457)

[167]
T. Lukman, G. Godena, J. Gray, and S. Strmčnik. Model-driven engineering of industrial process control applications. In Proceedings of the 15th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2010, 2010. (doi:10.1109/ETFA.2010.5641224)

[168]
T. Lukman, M. Mernik, Z. Demirezen, B. Bryant, and J. Gray. Automatic generation of model traversals from metamodel definitions. In Proceedings of the Annual Southeast Conference, 2010. (doi:10.1145/1900008.1900113)

[169]
B. Lundell, B. Lings, and E. Lindqvist. Open source in Swedish companies: Where are we? Information Systems Journal, 20(6):519–535, 2010. (doi:10.1111/j.1365-2575.2010.00348.x)

[170]
Y. Ma, K. He, B. Li, and X. Zhou. How multiple-dependency structure of classes affects their functions: A statistical perspective. In ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings, volume 2, pages V260–V266, 2010. (doi:10.1109/ICSTE.2010.5608763)

[171]
Y.-T. Ma, K.-Q. He, B. Li, J. Liu, and X.-Y. Zhou. A hybrid set of complexity metrics for large-scale object-oriented software systems. Journal of Computer Science and Technology, 25(6):1184–1201, 2010. (doi:10.1007/s11390-010-9398-x)

[172]
G. Magklaras and S. Furnell. Insider threat specification as a threat mitigation technique. Advances in Information Security, 49:219–244, 2010. (doi:10.1007/978-1-4419-7133-3_10)

[173]
M.E.F. Maia, C. Celes, R. Castro, and R.M.C. Andrade. Considerations on developing mobile applications based on the capuchin project. In Proceedings of the ACM Symposium on Applied Computing, pages 575–579, 2010. (doi:10.1145/1774088.1774207)

[174]
A. Manjunatha, A. Ranabahu, A. Sheth, and K. Thirunarayan. Power of clouds in your pocket: An efficient approach for cloud mobile hybrid application development. In Proceedings - 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010, pages 496–503, 2010. (doi:10.1109/CloudCom.2010.78)

[175]
I. Martinez-Marchena, L. Mora-Lopez, P.J. Sanchez, and M. Sidrach-De-Cardona. Binding machine learning models and OPC technology for evaluating solar energy systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6098 LNAI(PART 3):606–615, 2010. (doi:10.1007/978-3-642-13033-5_62)

[176]
S. Masrom, S.Z.Z. Abidin, P.N.M. Abdul Rahman, and A.S. Abd. Rahman. Software framework for flexible user defined metaheuristic hybridization. Communications in Computer and Information Science, 117 CCIS:218–227, 2010. (doi:10.1007/978-3-642-17578-7_22)

[177]
Y. Massim, F. Yalaoui, L. Amodeo, E. Chatelet, and A. Zeblah. Efficient combined immune-decomposition algorithm for optimal buffer allocation in production lines for throughput and profit maximization. Computers and Operations Research, 37(4):611–620, 2010. (doi:10.1016/j.cor.2009.06.016)

[178]
C. Melchiors, A.H. Dos Santos, D. Mattjie, C.R.P. Dos Santos, A. Panisson, L.Z. Granville, and L.M.R. Tarouco. A network polling solution through a P2P-based distributed management environment. In Proceedings of the ACM Symposium on Applied Computing, pages 729–730, 2010. (doi:10.1145/1774088.1774238)

[179]
P.M. Melliar-Smith and L.E. Moser. O-ring: A fault tolerance and load balancing architecture for peer-to-peer systems. In Proceedings - International Conference of the Chilean Computer Science Society, SCCC, pages 25–33, 2010. (doi:10.1109/SCCC.2009.15)

[180]
J. Metrôlho, M. Costa, F.R. Ribeiro, and E. Lopes. A target environment programming language to improve developer's productivity - a case study. In International Conference on Applied Computer Science - Proceedings, pages 530–533, 2010.

[181]
John L. Miller. Routing cache for distributed hash tables. United States Patent 7,808,971, October 2010.

[182]
N. Mitchell, E. Schonberg, and G. Sevitsky. Four trends leading to Java runtime bloat. IEEE Software, 27(1):56–63, 2010. (doi:10.1109/MS.2010.7)

[183]
H. Mohamad Judi, S. Mohd Sallen, N. Hussin, and S. Idris. The use of assignment programming activity log to study novice programmers' behavior between non-plagiarized and plagiarized groups. Information Technology Journal, 9(1):98–106, 2010. (doi:10.3923/itj.2010.98.106)

[184]
P. Monteiro and M.P. Monteiro. A pattern language for parallelizing irregular algorithms. In ACM International Conference Proceeding Series, 2010. (doi:10.1145/1953611.1953624)

[185]
E. Mourtou. Modeling access control in healthcare organizations. Certification and Security in Health-Related Web Applications: Concepts and Solutions, pages 23–44, 2010. (doi:10.4018/978-1-61692-895-7.ch002)

[186]
A.S. Mousas, A. Antonakopoulou, F. Gogoulos, G.V. Lioudakis, D.I. Kaklamani, and I.S. Venieris. Visualising access control: The PRISM approach. In Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010, pages 107–111, 2010. (doi:10.1109/PCI.2010.52)

[187]
M. Müller-Hannemann and S. Schirra. Chapter 10. challenges in algorithm engineering. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5971 LNCS:446–496, 2010. (doi:10.1007/978-3-642-14866-8_10)

[188]
Takayuki Nakayama. Numerical calculation device, numerical calculation method, and computer product. United States Patent 7,650,302, January 2010. Assignee: Fujitsu Limited (Kawasaki, JP)The Bank of Tokyo-Mitsubishi UFJ, Ltd. (Tokyo, JP).

[189]
S. Nasrin and K. Kawagoe. Sg2: A novel index structure for efficient data management in super-peer architecture. In ICUFN 2010 - 2nd International Conference on Ubiquitous and Future Networks, pages 378–383, 2010. (doi:10.1109/ICUFN.2010.5547178)

[190]
R. Niemeijer, B. De Vries, and J. Beetz. Constraint soup: Interpreting natural language architectural constraints. In Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, NLP-KE 2010, 2010. (doi:10.1109/NLPKE.2010.5587851)

[191]
E. Nygren, R.K. Sitaraman, and J. Sun. The akamai network: A platform for high-performance internet applications. Operating Systems Review (ACM), 44(3):2–19, 2010. (doi:10.1145/1842733.1842736)

[192]
D.R. Olsen, B. Partridge, and S. Lynn. Time warp sports for internet television. ACM Transactions on Computer-Human Interaction, 17(4), 2010. (doi:10.1145/1879831.1879834)

[193]
G. Oster, R. Mondéjar, P. Molli, and S. Dumitriu. Building a collaborative peer-to-peer wiki system on a structured overlay. Computer Networks, 54(12):1939–1952, 2010. (doi:10.1016/j.comnet.2010.03.019)

[194]
Z. Ou, E. Harjula, O. Kassinen, and M. Ylianttila. Performance evaluation of a kademlia-based communication-oriented P2P system under churn. Computer Networks, 54(5):689–705, 2010. (doi:10.1016/j.comnet.2009.09.022)

[195]
W.-F. Pan, B. Li, Y.-T. Ma, Y.-Y. Qin, and X.-Y. Zhou. Measuring structural quality of object-oriented softwares via bug propagation analysis on weighted software networks. Journal of Computer Science and Technology, 25(6):1202–1213, 2010. (doi:10.1007/s11390-010-9399-9)

[196]
K. Papapanagiotou, G.F. Marias, and P. Georgiadis. Revising centralized certificate validation standards for mobile and wireless communications. Computer Standards and Interfaces, 32(5-6):281–287, 2010. (doi:10.1016/j.csi.2009.07.001)

[197]
R.M. Parizi and A.A.A. Ghani. Towards automated monitoring and forecasting of probabilistic quality properties in open source software (OSS): A striking hybrid approach. In 8th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2010, pages 329–334, 2010. (doi:10.1109/SERA.2010.48)

[198]
H. Park and M. Van Der Schaar. Evolution of resource reciprocation strategies in P2P networks. IEEE Transactions on Signal Processing, 58(3 PART 1):1205–1218, 2010. (doi:10.1109/TSP.2009.2033731)

[199]
B. Parno, J.M. McCune, and A. Perrig. Bootstrapping trust in commodity computers. In Proceedings - IEEE Symposium on Security and Privacy, pages 414–429, 2010. (doi:10.1109/SP.2010.32)

[200]
K. Pentikousis and T. Rautio. A multiaccess network of information. In 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings, 2010. (doi:10.1109/WOWMOM.2010.5534922)

[201]
A. Pino and G. Kouroupetroglou. Ithaca: An open source framework for building component-based augmentative and alternative communication applications. ACM Transactions on Accessible Computing, 2(4), 2010. (doi:10.1145/1786774.1786775)

[202]
R. Plösch, H. Gruber, C. Körner, and M. Saft. A method for continuous code quality management using static analysis. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 370–375, 2010. (doi:10.1109/QUATIC.2010.68)

[203]
A. Poggi and M. Tomaiuolo. Integrating peer-to-peer and multi-agent technologies for the realization of content sharing applications. Studies in Computational Intelligence, 324:93–107, 2010. (doi:10.1007/978-3-642-16089-9_6)

[204]
M. Poktonjak, S. Meguerdichian, and J.L. Wong. Trusted sensors and remote sensing. In Proceedings of IEEE Sensors, pages 1104–1107, 2010. (doi:10.1109/ICSENS.2010.5690721)

[205]
A. Prata, T. Chambel, and N. Guimarães. Generation of crossmedia dynamic learning contexts from iTV. In EuroITV'10 - Proceedings of the 8th International Interactive TV and Video Conference, pages 91–100, 2010. (doi:10.1145/1809777.1809798)

[206]
A. Prata, N. Guimarães, and T. Chambel. Designing iTV based crossmedia personalized informal learning contexts. In Proceedings of the 14th International Academic MindTrek Conference: Envisioning Future Media Environments, MindTrek 2010, pages 187–194, 2010. (doi:10.1145/1930488.1930528)

[207]
Y. Qiu and X. Liu. Writing mechanism in digital organism file system. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 47(12):2177–2184, 2010.

[208]
K. Rabe and N. Konrad. Current aspects of suicide in correctional facilities. Forensische Psychiatrie, Psychologie, Kriminologie, 4(3):182–192, 2010. (doi:10.1007/s11757-010-0064-5)

[209]
N. Ramzan, M. Larson, F. Dufaux, and K. Clüver. The participation payoff: Challenges and opportunities for multimedia access in networked communities. In MIR 2010 - Proceedings of the 2010 ACM SIGMM International Conference on Multimedia Information Retrieval, pages 487–496, 2010. (doi:10.1145/1743384.1743470)

[210]
A.D. Rand. Mediating at the student-wikipedia intersection. Journal of Library Administration, 50(7):923–932, 2010. (doi:10.1080/01930826.2010.488994)

[211]
Patrick W. Ransil, Aleksey V. Martynov, James S. Larson, James R. Collette, Robert Wai-Chi Chu, and Partha Saha. Method and apparatus for a searchable data service. United States Patent 7,801,912, September 2010. Assignee: Amazon Technologies, Inc. (Reno, NV).

[212]
L. Renggli, M. Denker, and O. Nierstrasz. Language boxes: Bending the host language with modular language changes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5969 LNCS:274–293, 2010. (doi:10.1007/978-3-642-12107-4_20)

[213]
L. Renggli, T. Gîrba, and O. Nierstrasz. Embedding languages without breaking tools. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6183 LNCS:380–404, 2010. (doi:10.1007/978-3-642-14107-2_19)

[214]
J. Reutelshoefer, J. Baumeister, and F. Puppe. Towards meta-engineering for semantic wikis. In CEUR Workshop Proceedings, volume 632, pages 49–63, 2010.

[215]
M. Rey-López, F.A. Mikic-Fonte, A.M. Peleteiro, J.C. Burguillo, and A.B. Barragáns-Martınez. L4f: A P2P its for recommending additional learning contents by means of folksonomies. In ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, volume 4 SAIC, pages 135–138, 2010.

[216]
B. Robinson and P. Francis. Improving industrial adoption of software engineering research: A comparison of open and closed source software. In ESEM 2010 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2010. (doi:10.1145/1852786.1852814)

[217]
Michael J. Rowan, Christopher T. M. Bailey, Kefeng Chen, and Neal Creighton. Security systems and services to provide identity and uniform resource identifier verification. United States Patent 7,694,135, April 2010. Assignee: Geotrust, Inc. (Mountain View, CA).

[218]
B. Salem, J.A. Lino, and M. Rauterberg. Smartex: A case study on user profiling and adaptation in exhibition booths. Journal of Ambient Intelligence and Humanized Computing, 1(3):185–198, 2010. (doi:10.1007/s12652-010-0018-y)

[219]
L.E. Sánchez, C. Ruiz, E. Fernández-Medina, and M. Piattini. Managing the asset risk of SMEs. In ARES 2010 - 5th International Conference on Availability, Reliability, and Security, pages 422–429, 2010. (doi:10.1109/ARES.2010.52)

[220]
C.G. Santillán, L.C. Reyes, E. Schaeffer, E. Meza, and G.R. Zarate. Local survival rule for steer an adaptive ant-colony algorithm in complex systems. Studies in Computational Intelligence, 312:245–265, 2010. (doi:10.1007/978-3-642-15111-8_15)

[221]
S. Sawamura, A. Aikebaier, T. Enokido, V. Barolli, and M. Takizawa. Confidence and trustworthiness in peer-to-peer overlay networks. In Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, pages 117–124, 2010. (doi:10.1109/NBiS.2010.84)

[222]
S. Sawamura, A. Aikebaier, T. Enokido, V. Barolli, and M. Takizawa. Subjective and objective types of trustworthiness in peer-to-peer(P2P) overlay networks. In 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, pages 1108–1113, 2010. (doi:10.1109/WAINA.2010.180)

[223]
S. Sawamura, A. Aikebaier, T. Enokido, V. Barolli, and M. Takizawa. Trustworthiness of acquaintances in peer-to-peer(P2P) overlay networks. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pages 267–274, 2010. (doi:10.1109/CISIS.2010.160)

[224]
S. Sawamura, A. Barolli, A. Aikebaier, V. Barolli, and M. Takizawa. Two types of trustworthiness of acquaintances in peer-to-peer (P2P) overlay networks. In Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010, pages 320–327, 2010. (doi:10.1109/BWCCA.2010.90)

[225]
C. Schanes, A. Mauczka, U. Kirchengast, T. Grechenig, and S. Marx. Nationwide PKI testing - ensuring interoperability of OCSP server and client implementations early during component tests. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6391 LNCS:114–129, 2010. (doi:10.1007/978-3-642-16441-5_8)

[226]
G. Schuster and R. Lovassy. A possible control structure for production lines optimization. In 19th International Workshop on Robotics in Alpe-Adria-Danube Region, RAAD 2010 - Proceedings, pages 423–425, 2010. (doi:10.1109/RAAD.2010.5524550)

[227]
M. Schwind, A. Schenk, and M. Schneider. A tool for the analysis of social networks in collaborative software development. In Proceedings of the Annual Hawaii International Conference on System Sciences, 2010. (doi:10.1109/HICSS.2010.40)

[228]
S. Seneviratne and D.C. Levy. Cost profile prediction for grid computing. Concurrency Computation Practice and Experience, 22(1):107–142, 2010. (doi:10.1002/cpe.1537)

[229]
V. Sesum-Cavic and E. Kühn. A swarm intelligence appliance to the construction of an intelligent peer-to-peer overlay network. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pages 1028–1035, 2010. (doi:10.1109/CISIS.2010.64)

[230]
Q.Z. Sheng, Y. Wu, and D. Ranasinghe. Enabling scalable RFID traceability networks. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pages 1061–1068, 2010. (doi:10.1109/AINA.2010.150)

[231]
S. Shrestha, D.S. Kim, S. Lee, and J.S. Park. A peer-to-peer RFID resolution framework for supply chain network. In 2nd International Conference on Future Networks, ICFN 2010, pages 318–322, 2010. (doi:10.1109/ICFN.2010.98)

[232]
I. Siveroni, A. Zisman, and G. Spanoudakis. A UML-based static verification framework for security. Requirements Engineering, 15(1):95–118, 2010. (doi:10.1007/s00766-009-0091-y)

[233]
D.I.K. Sjøberg. Confronting the myth of rapid obsolescence in computing research. Communications of the ACM, 53(9):62–67, 2010. (doi:10.1145/1810891.1810911)

[234]
J.M. Smith, F.R.B. Cruz, and T. Van Woensel. Optimal server allocation in general, finite, multi-server queueing networks. Applied Stochastic Models in Business and Industry, 26(6):705–736, 2010. (doi:10.1002/asmb.813)

[235]
J.M. Smith, F.R.B. Cruz, and T. van Woensel. Topological network design of general, finite, multi-server queueing networks. European Journal of Operational Research, 201(2):427–441, 2010. (doi:10.1016/j.ejor.2009.03.012)

[236]
Q.D. Soetens and S. Demeyer. Studying the effect of refactorings: A complexity metrics perspective. In Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010, pages 313–318, 2010. (doi:10.1109/QUATIC.2010.58)

[237]
Y.-R. Song and G.-P. Jiang. Epidemic-spreading model for networks with different anti-attack abilities of nodes and nonuniform transmission of edges. Wuli Xuebao/Acta Physica Sinica, 59(11):7546–7551, 2010.

[238]
Y. Song, M.E. Locasto, A. Stavrou, A.D. Keromytis, and S.J. Stolfo. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems. Machine Learning, 81(2):179–205, 2010. (doi:10.1007/s10994-009-5143-5)

[239]
P.G. Spirakis, V. Vlachos, V. Karakoidas, D. Liappis, D. Kalaitzis, E. Valeontis, S. Kollias, and G. Argyros. Blueprints for a large-scale early warning system. In Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010, pages 7–11, 2010. (doi:10.1109/PCI.2010.27)

[240]
A. Steed and M.F. Oliveira. Networked Graphics. Elsevier Inc., 2010.

[241]
K.-J. Stol and M. Ali Babar. Challenges in using open source software in product development: A review of the literature. In Proceedings - International Conference on Software Engineering, pages 17–22, 2010. (doi:10.1145/1833272.1833276)

[242]
K.-J. Stol and M. Ali Babar. A comparison framework for open source software evaluation methods. IFIP Advances in Information and Communication Technology, 319 AICT:389–394, 2010. (doi:10.1007/978-3-642-13244-5_36)

[243]
V. Stolz. An integrated multi-view model evolution framework. Innovations in Systems and Software Engineering, 6(1):13–20, 2010. (doi:10.1007/s11334-009-0102-7)

[244]
J. Sun, H. Chen, and C. Niu. A new database firewall based on anomaly detection. In Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, pages 399–404, 2010. (doi:10.1109/PDCAT.2010.71)

[245]
Hironori Suzuki, Kenichi Moriwaki, and Naoya Okamoto. GUI application development support device, GUI display device, and method, and computer program. United States Patent 7,823,075, October 2010. Assignee: Sony Corporation (Tokyo, JP).

[246]
S. Suzuki, R. Van Meter, O. Nakamura, and J. Murai. Otedama: A relocatable RFID information repository architecture. IEICE Transactions on Information and Systems, E93-D(11):2922–2931, 2010. (doi:10.1587/transinf.E93.D.2922)

[247]
O.Y. Tahboub and J.I. Khan. Forwarding on froggers networks: Principle of data flow equilibrium. In Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pages 125–130, 2010. (doi:10.1109/ITNG.2011.29)

[248]
J.-P. Tolvanen, J. Sprinkle, M. Rossi, and S. Kelly. The 10th workshop on domain-specific modeling. In Proceedings of the ACM International Conference Companion on Object Oriented Programming Systems Languages and Applications Companion, SPLASH '10, pages 269–270, 2010. (doi:10.1145/1869542.1869607)

[249]
R. Tonelli, G. Concas, and M. Locci. Three efficient algorithms for implementing the preferential attachment mechanism in yule-simon stochastic process. WSEAS Transactions on Information Science and Applications, 7(2):176–185, 2010.

[250]
J. Tong, K. Xu, and R. Pi. A new web service structure of combining P2P and CDN technologies. In Proceedings - 2010 IEEE 2nd Symposium on Web Society, SWS 2010, pages 475–479, 2010. (doi:10.1109/SWS.2010.5607404)

[251]
M. Torchiano, F. Ricca, and P. Tonella. Empirical comparison of graphical and annotation-based re-documentation approaches. IET Software, 4(1):15–31, 2010. (doi:10.1049/iet-sen.2009.0015)

[252]
D. Tsolis and S. Sioutas. Digital rights management in peer to peer cultural networks. Handbook of Research on Technologies and Cultural Heritage: Applications and Environments, pages 119–140, 2010. (doi:10.4018/978-1-60960-044-0.ch006)

[253]
Shah Ullah. Targeting content to internet enabled radio devices. United States Patent 7,856,372, December 2010.

[254]
Shah Ullah. Targeting content to network-enabled devices based upon stored profiles. United States Patent 7,856,373, December 2010.

[255]
J. Van Den Bos. Domain-specific languages for digital forensics. In 1st Doctoral Symposium of the International Conference on Software Language Engineering 2010, SLE-DS 2010, volume 648, pages 49–53, 2010.

[256]
B. Van Niekerk and M. Maharaj. Mobile security from an information warfare perspective. In Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010, 2010. (doi:10.1109/ISSA.2010.5588339)

[257]
M. Viroli and F. Zambonelli. A biochemical approach to adaptive service ecosystems. Information Sciences, 180(10):1876–1892, 2010. (doi:10.1016/j.ins.2009.11.021)

[258]
A. Visan, M. Istin, F. Pop, F. Xhafa, and V. Cristea. Peer interest-based discovery for decentralized peer-to-peer systems. In 5th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2010, pages 363–368, 2010. (doi:10.1109/3PGCIC.2010.60)

[259]
P. Vitharana, J. King, and H. Chapman. Impact of internal open source development on reuse: Participatory reuse in action. Journal of Management Information Systems, 27(2):277–304, 2010. (doi:10.2753/MIS0742-1222270209)

[260]
J.L. Vivas, F.-G. Carmen, J. Lopez, and A. Benjumea. A security framework for a workflow-based grid development platform. Computer Standards and Interfaces, 32(5-6):230–245, 2010. (doi:10.1016/j.csi.2009.04.001)

[261]
F. Von Reischach, E. Dubach, F. Michahelles, and A. Schmidt. An evaluation of product review modalities for mobile phones. In ACM International Conference Proceeding Series, pages 199–207, 2010. (doi:10.1145/1851600.1851635)

[262]
A. Vosoughi, K. Bilal, S.U. Khan, N. Min-Allah, J. Li, N. Ghani, P. Bouvry, and S. Madani. A multidimensional robust greedy algorithm for resource path finding in large-scale distributed networks. In Proceedings of the 8th International Conference on Frontiers of Information Technology, FIT'10, 2010. (doi:10.1145/1943628.1943644)

[263]
A. Živkovič, U. Goljat, and M. Heričko. Improving the usability of the source code quality index with interchangeable metrics sets. Information Processing Letters, 110(6):236–240, 2010. (doi:10.1016/j.ipl.2010.01.002)

[264]
W.-Y. Wang and Y.-W. Chen. Is playing-as-downloading feasible in an emule P2P file sharing system? Journal of Zhejiang University: Science C, 11(6):465–475, 2010. (doi:10.1631/jzus.C0910408)

[265]
J. Wang, Y. Li, F. Gong, and W. Chen. A new strategy of resource searching in unstructured P2P network. In 2nd International Conference on Communication Software and Networks, ICCSN 2010, pages 32–36, 2010. (doi:10.1109/ICCSN.2010.120)

[266]
Z. Wei, X. Yuan, D. Jia, and G. Wang. An aquatic product traceability system based on RFID technology. In Proceedings 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010, pages 154–157, 2010. (doi:10.1109/ICSESS.2010.5552384)

[267]
S. Weiss, P. Urso, and P. Molli. Logoot-undo: Distributed collaborative editing system on P2P networks. IEEE Transactions on Parallel and Distributed Systems, 21(8):1162–1174, 2010. (doi:10.1109/TPDS.2009.173)

[268]
W. Wong, M.F. Magalhães, and J. Kangasharju. Piece fingerprinting: Binding content and data blocks together in peer-to-peer networks. In GLOBECOM - IEEE Global Telecommunications Conference, 2010. (doi:10.1109/GLOCOM.2010.5683550)

[269]
W. Wong, M.F. Magalhães, and J. Kangasharju. Towards verifiable parallel content retrieval. In 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010, pages 49–54, 2010. (doi:10.1109/NPSEC.2010.5634450)

[270]
B. Wu, J. Saia, and V. King. Attack-resistant frequency counting. In Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2010, 2010. (doi:10.1109/IPDPS.2010.5470344)

[271]
J. Wulf and R. Zarnekow. Technologies for the electronic distribution of information services - a value proposition analysis. Electronic Markets, 20(1):3–19, 2010. (doi:10.1007/s12525-010-0027-x)

[272]
Shlomo Wygodny, David Elkind, and Moshe Kravchik. System and method for automated tuning of program execution tracing. United States Patent 7,827,539, November 2010. Assignee: Identify Software Ltd.(IL).

[273]
C.C. Xavier and V.L.S. De Lima. Construction of a domain ontological structure from wikipedia. In STIL 2009 - 2009 7th Brazilian Symposium in Information and Human Language Technology, pages 98–107, 2010. (doi:10.1109/STIL.2009.26)

[274]
R.L. Xia and J.K. Muppala. A survey of bittorrent performance. IEEE Communications Surveys and Tutorials, 12(2):140–158, 2010. (doi:10.1109/SURV.2010.021110.00036)

[275]
A. Yadav and R.A. Khan. Does coupling really affect complexity? In 2010 International Conference on Computer and Communication Technology, ICCCT-2010, pages 583–588, 2010. (doi:10.1109/ICCCT.2010.5640463)

[276]
S. Yang and J. Qiu. The utilization law of web academic information: An exploring from the domain name of web citation. Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, 35(SPECIAL ISSUE 1):52–56, 2010.

[277]
S. Yang, J. Qiu, and Z. Xiong. An empirical study on the utilization of web academic resources in humanities and social sciences based on web citations. Scientometrics, 84(1):1–19, 2010. (doi:10.1007/s11192-009-0142-7)

[278]
B.-B. Yin, L.-Z. Zhu, and K.-Y. Cai. Entropy-based measures of heterogeneity of software structural profile. In Proceedings - International Computer Software and Applications Conference, pages 196–201, 2010. (doi:10.1109/COMPSACW.2010.41)

[279]
M. Yoshida and K. Kojima. Design methodologies of workload management through code migration in distributed desktop computing grids. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6082 LNCS(PART 2):100–111, 2010. (doi:10.1007/978-3-642-13136-3_10)

[280]
Y.-F. Yu, P.-J. Huang, Q.-J. Chen, T.-L. Huang, and K.-C. Lai. A scalable multi-attribute range query approach on cluster-based hybrid overlays. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6083 LNCS:136–145, 2010. (doi:10.1007/978-3-642-14822-4_15)

[281]
L. Yuan, H.-M. Wang, G. Yin, D.-X. Shi, and X. Li. Mining and analyzing behavioral characteristic of developers in open source software. Jisuanji Xuebao/Chinese Journal of Computers, 33(10):1909–1918, 2010. (doi:10.3724/SP.J.1016.2010.01909)

[282]
F. Zambonelli and M. Viroli. From service-oriented architectures to nature-inspired pervasive service ecosystems. In CEUR Workshop Proceedings, volume 621, 2010.

[283]
V. Zeimpekis, I. Minis, and V. Pappa. Real-time logistics management of dried figs using RFID technology: Case study in a greek cooperative company. International Journal of Logistics Systems and Management, 7(3):265–285, 2010. (doi:10.1504/IJLSM.2010.035035)

[284]
X. Zhang and H. Hassanein. Video on-demand streaming on the internet - a survey. In 2010 25th Biennial Symposium on Communications, QBSC 2010, pages 88–91, 2010. (doi:10.1109/BSC.2010.5472998)

[285]
L. Zhang, J. Luo, H. Li, J. Sun, and H. Mei. A biting-down approach to hierarchical decomposition of object-oriented systems based on structure analysis. Journal of Software Maintenance and Evolution, 22(8):567–596, 2010. (doi:10.1002/smr.417)

[286]
Y. Zhang, X. Jiang, T. Wang, and Z. Lin. A utility function analysis on DTN services of resource pre- and post-fetching. In Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, pages 3637–3640, 2010. (doi:10.1109/ICEE.2010.913)

[287]
Y. Zhang, X. Lu, and D. Li. Embedded DHT overlays in virtual computing environments. Science in China, Series F: Information Sciences, 53(3):483–493, 2010. (doi:10.1007/s11432-010-0034-8)

[288]
L. Zheng, D. Yue, and J. Niu. A new network acceleration technology based on network server. In Proceedings - 2010 WASE International Conference on Information Engineering, ICIE 2010, volume 4, pages 110–113, 2010. (doi:10.1109/ICIE.2010.317)

[289]
J. Zhou, R. Mo, M. Wang, R. Zhang, M. Shi, H. Yang, and T. Yue. Sddg: Semantic desktop data grid. In Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010, pages 240–245, 2010. (doi:10.1109/ICICIS.2010.5534749)

[290]
J.-T. Zhou, H.-C. Yang, M.-W. Wang, and R. Mo. Peer to peer semantic grid service oriented enterprise information integration architecture. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 16(12):2697–2707, 2010.

[291]
H. Ziekow, B. Fabian, C. Müller, and O. Günther. RFID in the cloud: A service for high-speed data access in distributed value chains. In 16th Americas Conference on Information Systems 2010, AMCIS 2010, volume 7, pages 5453–5463, 2010.

[292]
S. Zuo, Y. Guo, S. Gong, X. Wu, and H. Zhang. Trust value update model based on the memory theory. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 40(SUPPL. 2):307–312, 2010.

[293]
V. Zwass. Co-creation: Toward a taxonomy and an integrated research perspective. International Journal of Electronic Commerce, 15(1):11–48, 2010. (doi:10.2753/JEC1086-4415150101)