


default search action
2. ICSECS 2011: Kuantan, Pahang, Malaysia
- Jasni Mohamad Zain

, Wan Maseri Binti Wan Mohd, Eyas El-Qawasmeh:
Software Engineering and Computer Systems - Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part III. Communications in Computer and Information Science 181, Springer 2011, ISBN 978-3-642-22202-3
Software Design/Testing
- Kamal Zuhairi Zamli, Rozmie Razif Othman

, Mohammed Issam Younis
, Mohd Hazli Mohamed Zabil:
Practical Adoptions of T-Way Strategies for Interaction Testing. 1-14 - Michael Hartwig:

On the Relationship between Proof Writing and Programming: Some Conclusions for Teaching Future Software Developers. 15-24 - Ahmed Al-Herz

, Moataz A. Ahmed
:
Model-Based Web Components Testing: A Prioritization Approach. 25-40 - Asma Md Ali

, Joan Richardson:
Web Interactive Multimedia Technology: State of the Art. 41-53 - Mohamed Elammari, Tarek F. Alteap:

Health Architecture Based on SOA and Mobile Agents. 54-65 - Fazal-e-Amin

, Ahmad Kamil Bin Mahmood, Alan Oxley:
Metrics Based Variability Assessment of Code Assets. 66-75 - Ionut Dinca, Alin Stefanescu, Florentin Ipate, Raluca Lefticaru

, Cristina Tudose:
Test Data Generation for Event-B Models Using Genetic Algorithms. 76-90 - Mohammad F. J. Klaib, Sangeetha Muthuraman, Ahmad Noraziah

:
A Parallel Tree Based Strategy for T-Way Combinatorial Interaction Testing. 91-98 - Sabira Khatun, Khandakar Fazley Rabbi, Che Yahaya Yaakub, Mohammad F. J. Klaib, Mohammad Masroor Ahmed:

PS2Way: An Efficient Pairwise Search Approach for Test Data Generation. 99-108 - Roslina Mohd Sidek, Ahmad Noraziah

, Mohd Helmy Abd Wahab
:
The Preferable Test Documentation Using IEEE 829. 109-118 - Yun-Kwan Kim, Doo-Hyun Kim, Tae Wan Kim, Chun-Hyon Chang:

Automatic Analysis of Static Execution Time for Complex Loop Contained External Input. 119-129 - Heru Agus Santoso

, Su-Cheng Haw
, Chien-Sing Lee
:
Software Reuse: MDA-Based Ontology Development to Support Data Access over Legacy Applications. 130-142 - Rabia Sammi, Iram Masood, Shunaila Jabeen:

A Framework to Assure the Quality of Sanity Check Process. 143-150 - Boon Wee Low, Boon Yaik Ooi, Chee Siang Wong

:
Scalability of Database Bulk Insertion with Multi-threading. 151-162 - Ben Sadeh, Kjetil Ørbekk, Magnus M. Eide, Njaal C. A. Gjerde, Trygve A. Tønnesland, Sundar Gopalakrishnan:

Towards Unit Testing of User Interface Code for Android Mobile Applications. 163-175 - Muhammad Qaiser Saleem

, Jafreezal Jaafar, Mohd Fadzil Hassan:
Security Modeling of SOA System Using Security Intent DSL. 176-190 - Mobashar Rehman

, Ahmad Kamil Mahmood, Rohani Salleh, Aamir Amin
:
Understanding Motivators and De-motivators for Software Engineers - A Case of Malaysian Software Engineering Industry. 205-214 - Muhazam Mustapha

, Nik Ghazali Nik Daud:
UML Diagram for Design Patterns. 215-230 - Mahmood Ashraf, Masitah Ghazali:

Towards Natural Interaction with Wheelchair Using Nintendo Wiimote Controller. 231-245 - Mohd Z. M. Zaki

, Mohd Adham Isa
, Dayang N. A. Jawawi
:
Meta-model Validation of Integrated MARTE and Component-Based Methodology Component Model for Embedded Real-Time Software. 246-256 - Siti Hafizah Ab Hamid

, Mohd Sapiyan Baba, Abdullah Gani
:
Abstract Formal Framework for Method Overriding. 257-265 - Won Shin, Tae Wan Kim, Doo-Hyun Kim, Chun-Hyon Chang:

Parametric Software Metric. 266-273
E- Technology
- Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor Maizura Mohamad Noor

:
Automatic Recognition of Document Structure from PDF Files. 274-282 - Radziah Mohamad

, Furkh Zeshan
:
Comparative Evaluation of Semantic Web Service Composition Approaches. 283-290 - Siti Noradlina Mat Using, Rohiza Ahmad, Shakirah Mohd Taib

:
Ontology Development for Programming Related Materials. 291-305 - Syarifah Bahiyah Rahayu

, Shahrul Azman Noah
, Andrianto Arfan Wardhana:
User-Centered Evaluation for IR: Ranking Annotated Document Algorithms. 306-312
Ad Hoc Networks
- Ronny Yongho Kim:

Efficient Wireless Communications Schemes for Machine to Machine Communications. 313-323 - Radhika Saini, Manju Khari

:
An Algorithm to Detect Attacks in Mobile Ad Hoc Network. 336-341 - Md. Mahedi Hassan, Poo Kuan Hoong

:
Integrated Solution Scheme with One-Time Key Diameter Message Authentication Framework for Proxy Mobile IPv6. 342-352 - Bilal Munir Mughal, Asif Ali Wagan

, Halabi Hasbullah:
Impact of Safety Beacons on the Performance of Vehicular Ad Hoc Networks. 368-383 - Mojtaba Asgari

, Kasmiran Jumari, Mahamod Ismail
:
Analysis of Routing Protocols in Vehicular Ad Hoc Network Applications. 384-397 - Khuzairi Mohd Zaini

, Adib M. Monzer Habbal, Fazli Azzali
, Mohamad Rizal Abdul Rejab:
Comparative Study on the Performance of TFRC over AODV and DSDV Routing Protocols. 398-407 - Kamarularifin Abd. Jalil

, Zaid Ahmad, Jamalul-lail Ab Manan:
An Enhanced Route Discovery Mechanism for AODV Routing Protocol. 408-418 - Radhwan M. Abduallah, Nor Asilah Wati Abdul Hamid

, Shamala K. Subramaniam, Azizol Abdullah
:
Fast Handover Technique for Efficient IPv6 Mobility Support in Heterogeneous Networks. 419-428 - Maha S. Abdelhaq

, Rosilah Hassan, Raed A. Alsaqour
:
Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET. 429-442
Social Networks
- Ahmed El Toukhy, Maytham Safar

, Khaled Mahdi
:
Modeling, Analysis, and Characterization of Dubai Financial Market as a Social Network. 443-454
Software Process Modeling
- Alaa M. Al-Obaidi, Sai Peck Lee

:
A Concurrent Coloured Petri Nets Model for Solving Binary Search Problem on a Multicore Architecture. 463-477 - Pornchai Lerthathairat, Nakornthip Prompoon:

An Approach for Source Code Classification Using Software Metrics and Fuzzy Logic to Improve Code Quality with Refactoring Techniques. 478-492 - Hamzah Asyrani Sulaiman

, Abdullah Bade
:
Balanced Hierarchical Method of Collision Detection in Virtual Environment. 493-501 - Rachit Mohan Garg, Deepak Dahiya

:
An Aspect Oriented Component Based Model Driven Development. 502-517 - Sabrina Ahmad

, Noor Azilah Muda
:
An Experimental Design to Exercise Negotiation in Requirements Engineering. 542-556 - Affandy, Nanna Suryana Herman

, Sazilah Binti Salam
, Edi Noersasongko
:
A Study of Tracing and Writing Performance of Novice Students in Introductory Programming. 557-570 - Rehan Akbar, Mohd Fadzil Hassan, Azrai Abdullah:

A Review of Prominent Work on Agile Processes Software Process Improvement and Process Tailoring Practices. 571-585 - Anas Bassam Al-Badareen

, Mohd Hasan Selamat, Marzanah A. Jabar
, Jamilah Din
, Sherzod Turaev
:
An Evaluation Model for Software Reuse Processes. 586-599 - Fares Anwar, Rozilawati Razali, Kamsuriah Ahmad:

Achieving Effective Communication during Requirements Elicitation - A Conceptual Framework. 600-610 - Hamdi A. Al-Jamimi, Mohammad R. Alshayeb

, Mahmoud O. Elish
:
Investigating the Effect of Aspect-Oriented Refactoring on Software Maintainability. 611-623 - José Sergio Magdaleno-Palencia

, José Mario García Valdez
, Manuel Castañón-Puga
, Luis Alfonso Gaxiola-Vega:
On the Modelling of Adaptive Hypermedia Systems Using Agents for Courses with the Competency Approach. 624-630 - Mahdi Fahmideh

, Fereidoon Shams, Pooyan Jamshidi:
Toward a Methodological Knowledge for Service-Oriented Development Based on OPEN Meta-Model. 631-643
Miscellaneous Topics in Software Engineering and Computer Systems
- Barjesh Kochar, Rajender Singh Chhillar

:
Mining Optimal Utility Incorporated Sequential Pattern from RFID Data Warehouse Using Genetic Algorithm. 659-676 - Syed Nasir Mehmood Shah, Ahmad Kamil Bin Mahmood, Alan Oxley:

SYEDWSIM: A Web Based Simulator for Grid Workload Analysis. 677-692 - Eviyanti Saari, Aman Jantan

:
F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics. 693-701 - Kiyoshi Akama, Ekawit Nantajeewarawat, Hidekatsu Koike:

Deterministic-Rule Programs on Specialization Systems: Clause-Model Semantics. 702-716 - Mohammed Madi, Yuhanis Yusof

, Suhaidi Hassan
, Omar Almomani
:
A Novel Replica Replacement Strategy for Data Grid Environment. 717-727 - Nasim Ahmed

, Syed Alwee Aljunid
, R. Badlishah Ahmad
, Hilal Adnan Fadhil
, Mohd Abdur Rashid
:
Investigate Spectrum-Sliced WDM System for FTTH Network. 728-734 - Mohammed Wajahat Kamal, Moataz A. Ahmed

, Mohamed El-Attar
:
Use Case-Based Effort Estimation Approaches: A Comparison Criteria. 735-754 - Sadia Afsar, Abdul Mateen, Fahim Arif:

An Agent-Based Autonomous Controller for Traffic Management. 755-763 - Mohd Adham Isa

, Dayang N. A. Jawawi
:
Comparative Evaluation of Performance Assessment and Modeling Method for Software Architecture. 764-776 - Ghassan Ahmed Ali

, Aman Jantan
:
A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm. 777-792 - Mohammadmehdi Bozorgi, Mohd Aizaini Maarof, Zhi-Sam Lee:

Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification. 793-802 - Noraini Che Pa, Abdullah Mohd Zin

:
Managing Communications Challenges in Requirement Elicitation. 803-811 - Norhamreeza Abdul Hamid, Nazri Mohd Nawi

, Rozaida Ghazali
, Mohd Najib B. Mohd Salleh
:
Learning Efficiency Improvement of Back Propagation Algorithm by Adaptively Changing Gain Parameter together with Momentum and Learning Rate. 812-824

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














