文字方塊: 2009 Subject Index

 


<Hardware<

Arithmetic and Logic Structures

An Efficient Multiplier/Divider Design for Elliptic Curve Cryptosystem over GF(2m)

Ming-Der Shieh, Jun-Hong Chen, Wen-Ching Lin and Chien-Ming Wu... Vol. 25, No. 5, pp. 1555-1573

 

Register-transfer-level Implementation

Simultaneous Clock Skew Scheduling and Power-Gated Module Selection for Standby Leakage

Minimization

Shih-Hsu Huang, Chun-Hua Cheng and Da-Chen Tzeng....................... Vol. 25, No. 6, pp. 1707-1722

Synthesis of Anti-Aging Gated Clock Designs

Shih-Hsu Huang, Chun-Hua Cheng and Song-Bin Pan.......................... Vol. 25, No. 6, pp. 1651-1670

 

Logic Design

Efficient Header Classification Architecture for Network Intrusion Detection

Wen-Jyi Hwang and Chien-Min Ou........................................................ Vol. 25, No. 6, pp. 1839-1853

 

<Computer Systems Organization<

A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes

I-Hsuan Peng, Yen-Wen Chen and Hsiang-Ru Peng............................. Vol. 25, No. 2, pp. 559-574

 

Processor Architectures

A Quasi-Delay-Insensitive Microprocessor Core Implementation for Microcontrollers

Chang-Jiu Chen, Wei-Min Cheng, Hung-Yue Tsai and Jen-Chieh Wu…Vol. 25, No. 2, pp. 543-557

FPGA Implementation of a Recurrent Neural Fuzzy Network with On-Chip Learning for Prediction

and Identification Applications

Cheng-Jian Lin and Chi-Yung Lee......................................................... Vol. 25, No. 2, pp. 575-589

Power-Aware Register Assignment for Multi-Banked Register Files

Wann-Yun Shieh and Shu-Yi Hsu ........................................................ Vol. 25, No. 6, pp. 1901-1920

 

Computer-Communication Networks

A Cover-Up Scheme for Data-Centric Storage in Wireless Sensor Networks

Wen-Hwa Liao, Kuei-Ping Shih and Wan-Chi Wu.................................. Vol. 25, No. 5, pp. 1525-1537

A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks

Chung Il Sun, Hae Young Lee and Tae Ho Cho..................................... Vol. 25, No. 4, pp. 1163-1175

Deadlock Detection and Recovery for True Fully Adaptive Routing in Regular Wormhole Networks

Soojung Lee........................................................................................... Vol. 25, No. 2, pp. 465-479

Distributed Transmission Power Control Algorithm for Wireless Sensor Networks

Jang-Ping Sheu, Kun-Ying Hsieh and Yao-Kun Cheng......................... Vol. 25, No. 5, pp. 1447-1463

DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks

Mahdi Niamanesh and Rasool Jalili......................................................... Vol. 25, No. 3, pp. 827-841

High Performance Overlay File Distribution by Integrating Resource Discovery and Service Scheduling

Tein-Yaw Chung, Yang-Hui Chang, Kun-Hung Chen and Yung-Mu Chen Vol. 25, No. 3, pp. 861-875

Hybrid Congestion Control Protocol in Wireless Sensor Networks

Jang-Ping Sheu, Li-Jen Chang and Wei-Kai Hu..................................... Vol. 25, No. 4, pp. 1103-1119

Intrusion Detection Based on Active Networks

Han-Pang Huang, Feng-Cheng Yang, Ming-Tzong Wang and Chia-Ming Chang    Vol. 25, No. 3, pp. 843-859

Liveness Enforcing Supervision in Video Streaming Systems using Siphons

Hesuan Hu and Zhiwu Li....................................................................... Vol. 25, No. 6, pp. 1863-1884

Low-Latency Mobile IP Handover Based on Active-Scan Link Layer Assisted FMIPv60

Ming-Chun Hsia and Chunhung Richard Lin........................................... Vol. 25, No. 1, pp. 235-250

Modeling and Analysis of Wireless LAN Traffic

Dashdorj Yamkhin and Youjip Won........................................................ Vol. 25, No. 6, pp. 1783-1801

Packet-Oriented Routing in Delay-Tolerant Vehicular Sensor Networks

Xu Li, Hong-Yu Huang, Ming-Lu Li, Wei Shu and Min-You Wu.............. Vol. 25, No. 6, pp. 1803-1817

Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks

Lien-Wu Chen, WeiKuo Chu, Yu-Chee Tseng and Jan-Jan Wu............ Vol. 25, No. 5, pp. 1593-1604

Towards Provable Security for Data Transmission Protocols in Sensor Network

Wen, Ling Dong, Yanfei Zheng and Kefei Chen.................................... Vol. 25, No. 1, pp. 319-333

Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks

Ying-Sung Lee, Hsien-Te Chien and Wen-Nung Tsai............................ Vol. 25, No. 5, pp. 1485-1500

 

Special-Purpose and Application-Based Systems

A Fault-tolerant Adaptive Node Scheduling Scheme for Wireless Sensor Networks

Jungeun Choi, Joosun Hahn and Rhan Ha............................................. Vol. 25, No. 1, pp. 273-287

 

<Software<

Using a Performance-based Skeleton to Implement Divisible Load Applications on Grid Computing

Environments

Wen-Chung Shih, Chao-Tung Yang, and Shian-Shyong Tseng............ Vol. 25, No. 1, pp. 59-81

 

Software Engineering

Improving Object-Oriented Frameworks by Considering the Characteristics of Constituent Elements

Gregor Polancic, Romana Vajde Horvat and Ivan Rozman.................... Vol. 25, No. 4, pp. 1067-1085

 

Operating Systems

Energy Efficient Intra-Task Dynamic Voltage Scaling for Realistic CPUs of Mobile Devices

Chien-Chung Yang, Kuochen Wang, Ming-Ham Lin and Pochun Lin ….Vol. 25, No. 1, pp. 251-272

<Data<

Data Storage Representations

A Translation Algorithm for Effective RDB-to-XML Schema Conversion Considering Referential

Integrity Information

Jinhyung Kim, Dongwon Jeong and Doo-Kwon Baik............................. Vol. 25, No. 1, pp. 137-166

Multi-Clustering Centers Approach to Enhancing the Performance of SOM Clustering Ability

Ching-Hwang Wang and Chih-Han Kao................................................. Vol. 25, No. 4, pp. 1087-1102

 

Data Encryption

Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication

Hsiao-Ying Lin and Wen-Guey Tzeng................................................... Vol. 25, No. 3, pp. 907-920

Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme

Zuo-Wen Tan and Zhuo-Jun Liu............................................................ Vol. 25, No. 2, pp. 619-631

Double Voting Problem of Some Anonymous E-Voting Schemes

Mahdi Asadpour and Rasool Jalili.......................................................... Vol. 25, No. 3, pp. 895-906

Efficient Identigy-Committable Signature and Group-Oriented Ring Signature Schemes

Cheng-Kang Chu and Wen-Guey Tzeng............................................... Vol. 25, No. 5, pp. 1465-1483

Structural Binary CBC Encryption Mode

Yi-Shiung Yeh, Ting-Yu Huang and Han-Yu Lin.................................... Vol. 25, No. 3, pp. 937-944

 

Coding and Information Theory

An Integrated Failure and QoS Recoverable Transmission Scheme Based on Multi-path Network Coding

Chung-Shih Tang and Wen-Tsuen Chen............................................... Vol. 25, No. 4, pp. 1005-1020

Decoding Binary Quadratic Residue Codes using the Euclidean Algorithm

Pei-Yu Shih, Wen-Ku Su, Trieu-Kien Truong and Yaotsu Chang.......... Vol. 25, No. 4, pp. 1283-1294

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code

Huang-Chi Chen, Yu-Wen Chang and Rey-Chue Hwang...................... Vol. 25, No. 4, pp. 1041-1054

 

Files

A Flash-Aware Cluster Allocation Scheme for Legacy File Systems

Sung-Kwan Kim, Hunki Kwon, Dong-Hee Lee, Sam H. Noh

and Sang Lyul Min.................................................................................. Vol. 25, No. 4, pp. 1191-1220

<Theory of Computation<

A Novel Performance Method for DES

Ozgur Kaymakci and Salman Kurtulan................................................... Vol. 25, No. 1, pp. 105-120

Hamiltonicity of the Pyramid Network with or without Fault

Ruei-Yu Wu and Dyi-Rong Duh.............................................................. Vol. 25, No. 2, pp. 531-542

 

Analysis of Algorithms and Problem Complexity

Heuristic Algorithms for Finding Light-Forest of Multicast Routing on WDM Network

Der-Rong Din.......................................................................................... Vol. 25, No. 1, pp. 83-103

Imprecise Computations with Deferred Optional Tasks

Jia-Ming Chen, Wan-Chen Lu, Wei-Kuan Shih, and Ming-Chung Tang.. Vol. 25, No. 1, pp. 185-200

Pitch Detection/Tracking Strategy for Musical Recordings of Solo Bowed-String and Wind Instruments

Yi-Song Siao, Wei-Chen Chang and Alvin W. Y. Su.............................. Vol. 25, No. 4, pp. 1239-1253

<Mathematics of Computing<

Discrete Mathematics

Fault-Tolerant Hamiltonian Connectivity and Fault-Tolerant Hamiltonicity of the Fully Connected

Cubic Networks

Tung-Yang Ho and Cheng-Kuan Lin...................................................... Vol. 25, No. 6, pp. 1855-1862

<Information Systems<

A Semantic-Based Protocol for Concurrency Control in DOM Database Systems

Kuen-Fang Jea, Tsui-Ping Chang and Shih-Ying Chen.......................... Vol. 25, No. 5, pp. 1617-1639

An Automatic Code Generation for Self-Healing

Jeongmin Park, Hyunsang Youn and Eunseok Lee............................... Vol. 25, No. 6, pp. 1753-1781

Investigation of Consensus Problem over Combined Wired/Wireless Network

Chien-Fu Cheng, Shu-Ching Wang and Tyne Liang............................... Vol. 25, No. 4, pp. 1267-1281

 

Models and Principles

Incidence Matrix Based Methods for Computing Repetitive Vectors and Siphons of Petri Net

Guan-Jun Liu and Chang-Jun Jiang....................................................... Vol. 25, No. 1, pp. 121-136

Preventing Information Leakage in Mobile Applications with Object-Oriented Access Control Lists and Security Monitor Encapsulation

Shiow-Yang Wu and Shih-Chien Chou.................................................. Vol. 25, No. 6, pp. 1921-1937

 

Database Management

A New Optimistic Concurrency Control in Valid XML

Changwoo Byun, Ilkook Yun and Seog Park......................................... Vol. 25, No. 1, pp. 11-31

Design of Spatial Data Broadcast for Mobile Navigation Applications

Shou-Chih Lo......................................................................................... Vol. 25, No. 4, pp. 1147-1161

GPE: A Grid-based Population Estimation Algorithm for Resource Inventory Applications over Sensor Networks

Jiun-Long Huang, Shih-Chuan Chiu and Xin-MaoHuang........................ Vol. 25, No. 1, pp. 201-218

Mining Top-K Path Traversal Patterns over Streaming Web Click-Sequences

Hua-Fu Li and Suh-Yin Lee.................................................................... Vol. 25, No. 4, pp. 1121-1133

 

Information Storage and Retrieval

An Efficient Query Index on RFID Streaming Data

Jaekwan Park, Bonghee Hong and Chaehoon Ban............................... Vol. 25, No. 3, pp. 921-935

Fast Extraction of Maximal Frequent Subtrees Using Bits Representation

Juryon Paik, Junghyun Nam, Dongho Won and Ung Mo Kim.................. Vol. 25, No. 2, pp. 435-464

Personal Spoken Sentence Retrieval Using Two-Level Feature Matching and MPEG-7 Audio LLDs

Po-Chuan Lin, Jhing-Fa Wang, Jia-Ching Wang and Jun-Jin Huang.... . Vol. 25, No. 4, pp. 1221-1238

TwigX-Guide: An Efficient Twig Pattern Matching System Extending DataGuide Indexing and Region Encoding Labeling

Su-Cheng Haw and Chien-Sing Lee...................................................... Vol. 25, No. 2, pp. 603-617

 

Information Systems Applications  

An Object-Oriented Framework Approach to Flexible Availability Management for Developing

Distributed Applications

Heung Seok Chae, Jian Fang Cui, Jin Wook Park, Jae Geol Park

and Woo Jin Lee.................................................................................... Vol. 25, No. 4, pp. 1021-1039

An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification

Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador

and Arturo Ribagorda............................................................................ Vol. 25, No. 1, pp. 33-57

Distributed Adaption System for Quality Assurance of Web Service in Mobile Environment

Seunghwa Lee and Eunseok Lee ........................................................ Vol. 25, No. 2, pp. 403-417

Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes

Ching-Nung Yang and Bing-Ling Lu....................................................... Vol. 25, No. 1, pp. 1-10

The Study of Secure E-Will System on the Internet

Hung-Yu Chien and Ru-Yu Lin............................................................... Vol. 25, No. 3, pp. 877-893

 

Information Interfaces and Presentation

A Distributed Multi-Dimensional Publications Management System

Tsung-Yuan Liu and Yuh-Jzer Joung.................................................... Vol. 25, No. 5, pp. 1539-1553

Miscellaneous

Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

Suat Ozdemir......................................................................................... Vol. 25, No. 6, pp. 1691-1705

<Computing Methodologies<

A Novel Approach for Treating Uncertain Rule-based Knowledge Conflicts

Min-Yuan Cheng and Chin-Jung Huang................................................. Vol. 25, No. 2, pp. 649-663

Reordering for Indexing in an RFID Tag Database

Sungwoo Ahn and Bonghee Hong........................................................ Vol. 25, No. 6, pp. 1671-1690

 

Artificial Intelligence

A New Perspective for Neural Networks: Application to a Marketing Management Problem

Jaesoo Kim and Heejune Ahn................................................................ Vol. 25, No. 5, pp. 1605-1616

Blood Cell Identification using Emotional Neural Networks

Adnan Khashman ................................................................................. Vol. 25, No. 6, pp. 1737-1751

Deadlock Control for Weighted Systems of Simple Sequential Processes with Resources Requirement (WS3PR)

Daniel Yuh Chao.................................................................................... Vol. 25, No. 6, pp. 1963-1978

 

Computer Graphics

A Feature-Preserving Filtering Algorithm for Point Set Surface and Surface Attributes Based

on Robust Statistics

Hong-Xing Qin, Jie Yang and Yue-Min Zhu........................................... Vol. 25, No. 4, pp. 1135-1146

Texture Synthesis with Prioritized Pixel Re-synthesis

Chung-Ren Yan and Tong-Yee Lee...................................................... Vol. 25, No. 2, pp. 389-402

 

Image Processing and Computer Vision

A Blind Image Watermarking Based on Dual Detector

Chin-Pan Huang, Chi-Jen Liao and Chaur-Heh Hsieh............................ Vol. 25, No. 6, pp. 1723-1736

A Novel Exemplar-Based Image Completion Model

Ji-Ying Wu and Qiu-Qi Ruan.................................................................. Vol. 25, No. 2, pp. 481-497

A Spatial-Extended Background Model for Moving Blobs Extraction in Indoor Environments

San-Lung Zhao and Hsi-Jian Lee.......................................................... Vol. 25, No. 6, pp. 1819-1837

Analysis and Comparison of Various Shape Mirrors Used in Omnidirectional Cameras with Parameter Variation

Kuo-Yang Tu.......................................................................................... Vol. 25, No. 3, pp. 945-959

Analysis of Camera’s Images Influenced by Varying Light Illumination for Design of Color Segmentation

Kuo-Yang Tu.......................................................................................... Vol. 25, No. 6, pp. 1885-1899

Combining Interest Point and Invariant Moment for Geometrically Robust Image Watermarking

Lei-Da Li, Bao-Long Guo and Lei Guo................................................... Vol. 25, No. 2, pp. 499-515

Content-Based Image Retrieval using Fractal Orthonormal Basis

John Y. Chiang and Yau-Ren Jenq........................................................ Vol. 25, No. 4, pp. 1255-1266

Illegal Entrant Detection at a Restricted Area in Open Spaces Using Color Features

Jau-Ling Shih, Ying-Nong Chen, Kai-Chiun Yan and Chin-Chuan Han Vol. 25, No. 5, pp. 1575-1592

Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault

ungju Lee, Daesung Moon and Yongwha Chung.................................. Vol. 25, No. 4, pp. 1177-1190

Intrinsic Image Extraction from a Single Image

Yun-Chung Chung, Shen Cherng, Robert R. Bailey and Sei-Wang Chen    Vol. 25, No. 6, pp. 1939-1953

Principal Component Analysis-based Mesh Decomposition

Jung-Shiong Chang, Arthur Chun-Chieh Shih, Hsiao-Rong Tyan

and Wen-Hsien Fang............................................................................. Vol. 25, No. 4, pp. 971-987

Shape Memorization and Recognition of 3D Objects Using a Similarity-Based Aspect-Graph Approach

Jwu-Sheng Hu and Tzung-Min Su......................................................... Vol. 25, No. 1, pp. 289-301

 

Pattern Recognition  

Fingerprint Classification in DCT Domain using RBF Neural Networks

Cong Jin and Ping Jin............................................................................. Vol. 25, No. 6, pp. 1955-1962

Genetic Optimization of Fingerprint Recognition Based on Core Sub-Region

Jing-Wein Wang and Wen-Yuan Chen.................................................. Vol. 25, No. 1, pp. 303-317

Image Processing and Image Mining using Decision Trees

Kun-Che Lu and Don-Lin Yang.............................................................. Vol. 25, No. 4, pp. 989-1003

Iris Recognition Using Gabor Filters and the Fractal Dimension

C. C. Tsai, J. S. Taur and C. W. Tao ..................................................... Vol. 25, No. 2, pp. 633-648

Orthogonal Locality Sensitive Discriminant Analysis for Face Recognition

Yi Jin and Qiu-Qi Ruan........................................................................... Vol. 25, No. 2, pp. 419-433

 

Document and Text Processing

Using Redundancy Reduction in Summarization to Improve Text Classification by SVMs

Jiaming Zhan and Han-Tong Loh........................................................... Vol. 25, No. 2, pp. 591-601

<Computer Applications<

A Real-Time Driving Assistance and Surveillance System

Chao-Jung Chen, Hsin-Yuan Peng, Bing-Fei Wu and Ying-Han Chen . Vol. 25, No. 5, pp. 1501-1523

Tele-consultation Enhanced via Session Retrieval and Session Scheduling Capabilities

Cheng-Hsiung Wang, Chien-Cheng Lee, Hewijin Christine Jiau, Tsung-Lung Yang,

Kuo-Feng Ssu and Pau-Choo Chung..................................................... Vol. 25, No. 4, pp. 1055-1066

 

Administrative Data Processing

Receipt-Freeness for Groth e-Voting Schemes

Wei Han, Ke-Fei Chen and Dong Zheng................................................ Vol. 25, No. 2, pp. 517-530

 

Computers in Other Systems

USVoD: A Large Scale Video-on-Demand System Based on Uniform Sampling Cache Mechanism

Chin-Fu Ku, Yu-Fang Zheng, Sao-Jie Chen, and Jan-Ming Ho.............. Vol. 25, No. 1, pp. 219-233

<Computing Milieux<

Management of Computing and Information Systems

A Deadlock Prevention Policy for a Class of Petri Nets S3PMR

Mingming Yan, Zhiwu Li, Na Wei, and Mi Zhao...................................... Vol. 25, No. 1, pp. 167-183

<SPECIAL ISSUES<

Enterprise Systems and Applications

An Intelligent Ubiquitous Middleware for U-City: SmartUM

Hae-Sun Jung, Chang-Sung Jeong, Yong-Woo Lee and Phil-Doo Hong     Vol. 25, No. 2, pp. 375-388

Experienced Report on Assessing and Evaluating Change Impact Analysis through a Framework

and Associated Models

Obeten O. Ekabua and Matthew O. Adigun........................................... Vol. 25, No. 2, pp. 363-373

Performance Prediction Based EX-QoS Driven Approach for Adaptive Service Composition

Lei Yang, Yu Dai and Bin Zhang............................................................ Vol. 25, No. 2, pp. 345-362

 

DIGITAL LIFE TECHNOLOGY FOR SMART LIVING

A Template-based Recognition System for On-line Handwritten Characters

Federico Prat, Andres Marzal, Sergio Martin, Rafael Ramos-Garijo

and Maria Jose Castro ......................................................................... Vol. 25, No. 3, pp. 779-791

Construction of a Real-Time and Secure Mobile Ticket System

Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen and Kun-Chih Chen Vol. 25, No. 3, pp. 807-825

Federal Funds Rate Prediction: A Comparison between the Robust RBF Neural Network

and Economic Models

Chien-Cheng Lee, Chun-Li Tsai and Yu-Chun Chiang........................... Vol. 25, No. 3, pp. 763-778

Modeling and Analysis of Code-based Call Admission Control for QoS Management

In W-CDMA Systems

Sheng-Tzong Cheng and Ming-Tzung Hsieh......................................... Vol. 25, No. 3, pp. 717-731

Quality-Adaptive Proxy Caching for Peer-to-Peer Video Streaming Using Multiple Description Coding

Jen-Wen Ding and Shi-Yuan Lan........................................................... Vol. 25, No. 3, pp. 687-701

Simulated Annealing for Pattern Detection and Seismic Applications

Kou-Yuan Huang and Kai-Ju Chen........................................................ Vol. 25, No. 3, pp. 793-805

Statistical Multiplexing of H.264 Video Streams Using Structural Similarity Information

Luis Teixeira and Luis Corte-Real.......................................................... Vol. 25, No. 3, pp. 703-715

Strategies Toward Optimal Access to File Replicas in Data Grid Environments

Kuan-Ching Li, Hsiao-Hsi Wang, Kuo-Yang Cheng and Tsung-Ying Wu Vol. 25, No. 3, pp. 747-762

The Multiple Path Protection of DWDM Backbone Optical Networks

Wen-Ping Chen, Fu-Hung Shih and Wen-Shyang Hwang..................... Vol. 25, No. 3, pp. 733-745

Toward a Ubiquitous Smart Space Design Framework

Taysheng Jeng...................................................................................... Vol. 25, No. 3, pp. 675-686

 

SERVICE-ORIENTED COMPUTING

BPEL Extensions to User-Interactive Service Delivery

Jonathan Lee, Ying-Yan Lin, Shang-Pin Ma and Shin-Jie Lee............... Vol. 25, No. 5, pp. 1427-1445

Classification and Evaluation of Middleware Collaboration Architectures for Converging MHP and OSGi in a Smart Home

Cheng-Liang Lin, Pang-Chieh Wang and Ting-Wei Hou......................... Vol. 25, No. 5, pp. 1337-1356

Delivering Specification-Based Learning Processes with Service-Oriented Architecture:

A Process Translation Approach

Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh and Tien-Song Hsu     Vol. 25, No. 5, pp. 1373-1389

Design and Implementation of a Policy-Based Monitoring System for Web Services

Li-Der Chou, Chien-Chi Chen and Po-Chia Tseng.................................. Vol. 25, No. 5, pp. 1357-1372

Empowering Plagiarism Detection with a Web Services Enabled Collaborative Network

Bilal Zaka................................................................................................ Vol. 25, No. 5, pp. 1391-1403

Measuring and Evaluating a Design Complexity Metric for XML Schema Documents

Dilek Basci and Sanjay Misra................................................................. Vol. 25, No. 5, pp. 1405-1425

Service Quality Evaluation by Personal Ontology

Chiung-Hon Leon Lee, Alan Liu and Jeng-Shin Hung............................ Vol. 25, No. 5, pp. 1305-1319

Service-Centric Integration Architecture for Enterprise Software Systems

Claus Pahl, Wilhelm Hasselbring and Markus Voss............................... Vol. 25, No. 5, pp. 1321-1336