Showing papers in "Journal of Systems and Software in 2011"
••
TL;DR: This survey identifies the sensing modalities used in current participatory sensing applications, and assess the threats to user privacy when personal information is sensed and disclosed, and identifies open issues and possible solutions to guarantee user privacy in Participatory sensing.
451 citations
••
TL;DR: It was shown that although the biggest group of apps was medical information reference apps that were delivered from or related to medical articles, websites, or journals, mobile users disproportionally favored tracking tools and it was clear that m-health apps still had plenty of room to grow to take full advantage of unique mobile platform features and truly fulfill their potential.
280 citations
••
TL;DR: This work presents a review of the status of mobile functionalities and applications that can satisfy the requirements and needs of older people and improve their quality of life, and outlines several needs that should be met to improve the quality of research in this area.
269 citations
••
TL;DR: A threshold RG-based VSS scheme aiming at providing the wide-use version is presented, and the experimental results and theoretically analysis in visual quality and security show that the proposed scheme performs well.
203 citations
••
TL;DR: Cost-saving should not be considered as the driving factor in the selection process of software development outsourcing vendors, and vendors should address other factors in order to compete in the OSDO business, such as skilled human resource, appropriate infrastructure and quality of products and services.
177 citations
••
TL;DR: This paper presents an approach that uses GAFES for optimized FE ature S election (GAFES) in SPLs and empirical results show that GAFes can produce solutions with 86-97% of the optimality of other automated feature selection algorithms and in 45-99% less time than existing exact and heuristic feature selection techniques.
176 citations
••
TL;DR: A systematic review of 72 studies from 1980 to 2008 examines the background and trend of research into IT personnel's intentions to leave their workplaces, in addition to providing a taxonomy of the determinants of their intentions to quit as captured in IT literature.
173 citations
••
TL;DR: The goal of the approach is to automatically identify Extract Method refactoring opportunities which are related with the complete computation of a given variable and the statements affecting the state of aGiven object (object state slice).
155 citations
••
TL;DR: This work investigates the literature on both metamodelling and ontologies in order to identify ways in which they can be made compatible and linked in such a way as to benefit both communities and create a contribution to a coherent underpinning theory for software engineering.
143 citations
••
TL;DR: BDTEX (Bayesian Detection Expert) is presented, a Goal Question Metric based approach to build Bayesian Belief Networks (BBNs) from the definitions of antipatterns and the advantages of BBNs over rule-based models are discussed.
141 citations
••
TL;DR: In this paper, a hybrid knowledge based system (HKBS) approach is proposed to assist decision makers in evaluation and selection of the software packages, which employs an integrated rule based and case based reasoning techniques.
••
TL;DR: An enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique that supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability is proposed.
••
TL;DR: An analytical framework is proposed containing two approaches-Technology Acceptance Model (TAM) and Rough Set Theory (RST) and an empirical study on the IT/MIS enterprises in Taiwan is carried out, which reveals a considerable amount of meaningful information that facilitates the SaaS vendors to grasp users' needs and concerns about SAAS adoption.
••
TL;DR: An Extract Class refactoring method based on graph theory that exploits structural and semantic relationships between methods and the benefits provided by the combination of semantic and structural measures and the potential usefulness of the proposed method as a feature for software development environments are highlighted.
••
TL;DR: A black box method based on genetically optimized artificial neural networks is inserted in order to investigate the degradation prediction ability a priori of the execution and is compared to the linear regression method.
••
TL;DR: This research's results confirmed that external expertise and internal computer/IT knowledge are pertinent to success enhancement of ERP system success for adopting organizations.
••
TL;DR: Shamir's secret sharing scheme is used to address all the security issues in one method which can store longer EPR strings along with better authenticity and confidentiality properties while satisfying all the requirements as shown in the results.
••
TL;DR: Comparative results indicate that VS-PSTG gives competitive results as compared to existing strategies, and adopts Particle Swarm Optimization to ensure optimal test size reduction.
••
TL;DR: The approach is based on established practices of the industrial automation and control domain, a compatible UML profile, and an integrated and standards based tool environment for modeling and transformation execution to support industrial practices and to utilize existing control system platforms.
••
TL;DR: A range of RSSIF methods, drawn from both probabilistic and deterministic paradigms, are compared on a common test-bed to evaluate their localization efficiency and accuracy, and also propose a number of improvements and modifications.
••
TL;DR: This paper describes BN curves that are not only computationally very simple to generate, but also specially suitable for efficient implementation on a very broad range of scenarios and presents implementation results of the optimal ate pairing using such a curve defined over a 254-bit prime field.
••
TL;DR: A new scheme, based on DE is proposed in order to increase the hiding capacity for medical images, and showed that the proposed scheme has higher hiding capacity compared to the original schemes.
••
TL;DR: The proposed design-based process allowed us to develop pedagogical models that respond to real needs of learners and instructors, where development is grounded on rigorous scientific research, allowing to reuse both knowledge and software, and showing an improvement of the mobile software built based on continuous experimentation and evaluation.
••
TL;DR: The utilization of information within incomplete instances is of benefit to easily capture the distribution of a dataset, and the NIIA method outperforms the existing methods in accuracy, and this advantage is clearly highlighted when datasets have a high missing ratio.
••
TL;DR: This paper proposes a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions and demonstrates the efficacy of authentication capability of the proposed scheme.
••
TL;DR: This paper investigates the synchronization mechanism between architecture configurations and system states for maintaining the causal connections, and designs an algorithm based on it, which addresses issues such as conflicts between architecture and system changes, and exceptions of system manipulations.
••
TL;DR: A pixel-value shifting scheme is proposed that exploits the edge areas more efficiently, thus leading to an increase in embedding capacity as shown by experimental results compared to Wu and Tsai's method.
••
TL;DR: A new software project similarity measure and adaptation technique based on Fuzzy numbers is proposed and it is concluded that the proposed estimation model could form a useful approach for early stage estimation especially when data is almost uncertain.
••
TL;DR: This paper analyses the most notable AOMs, paying attention to the support and possibilities that they offer for modelling organizational structures with different levels of complexity, to help developers to select the most appropriate methodology taking into account the social and organizational requirements of the multi-agent system to be deployed.
••
TL;DR: In the proposed VSN architecture, this paper addresses two network-related issues: how to adaptively adjust the reporting rates of mobile nodes to satisfy a target monitoring quality with less communication overhead and how to exploit opportunistic communications to reduce message transmissions.