scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Systems and Software in 2011"


Journal ArticleDOI
TL;DR: This survey identifies the sensing modalities used in current participatory sensing applications, and assess the threats to user privacy when personal information is sensed and disclosed, and identifies open issues and possible solutions to guarantee user privacy in Participatory sensing.

451 citations


Journal ArticleDOI
TL;DR: It was shown that although the biggest group of apps was medical information reference apps that were delivered from or related to medical articles, websites, or journals, mobile users disproportionally favored tracking tools and it was clear that m-health apps still had plenty of room to grow to take full advantage of unique mobile platform features and truly fulfill their potential.

280 citations


Journal ArticleDOI
TL;DR: This work presents a review of the status of mobile functionalities and applications that can satisfy the requirements and needs of older people and improve their quality of life, and outlines several needs that should be met to improve the quality of research in this area.

269 citations


Journal ArticleDOI
TL;DR: A threshold RG-based VSS scheme aiming at providing the wide-use version is presented, and the experimental results and theoretically analysis in visual quality and security show that the proposed scheme performs well.

203 citations


Journal ArticleDOI
TL;DR: Cost-saving should not be considered as the driving factor in the selection process of software development outsourcing vendors, and vendors should address other factors in order to compete in the OSDO business, such as skilled human resource, appropriate infrastructure and quality of products and services.

177 citations


Journal ArticleDOI
TL;DR: This paper presents an approach that uses GAFES for optimized FE ature S election (GAFES) in SPLs and empirical results show that GAFes can produce solutions with 86-97% of the optimality of other automated feature selection algorithms and in 45-99% less time than existing exact and heuristic feature selection techniques.

176 citations


Journal ArticleDOI
TL;DR: A systematic review of 72 studies from 1980 to 2008 examines the background and trend of research into IT personnel's intentions to leave their workplaces, in addition to providing a taxonomy of the determinants of their intentions to quit as captured in IT literature.

173 citations


Journal ArticleDOI
TL;DR: The goal of the approach is to automatically identify Extract Method refactoring opportunities which are related with the complete computation of a given variable and the statements affecting the state of aGiven object (object state slice).

155 citations


Journal ArticleDOI
TL;DR: This work investigates the literature on both metamodelling and ontologies in order to identify ways in which they can be made compatible and linked in such a way as to benefit both communities and create a contribution to a coherent underpinning theory for software engineering.

143 citations


Journal ArticleDOI
TL;DR: BDTEX (Bayesian Detection Expert) is presented, a Goal Question Metric based approach to build Bayesian Belief Networks (BBNs) from the definitions of antipatterns and the advantages of BBNs over rule-based models are discussed.

141 citations


Journal ArticleDOI
TL;DR: In this paper, a hybrid knowledge based system (HKBS) approach is proposed to assist decision makers in evaluation and selection of the software packages, which employs an integrated rule based and case based reasoning techniques.

Journal ArticleDOI
TL;DR: An enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique that supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability is proposed.

Journal ArticleDOI
TL;DR: An analytical framework is proposed containing two approaches-Technology Acceptance Model (TAM) and Rough Set Theory (RST) and an empirical study on the IT/MIS enterprises in Taiwan is carried out, which reveals a considerable amount of meaningful information that facilitates the SaaS vendors to grasp users' needs and concerns about SAAS adoption.

Journal ArticleDOI
TL;DR: An Extract Class refactoring method based on graph theory that exploits structural and semantic relationships between methods and the benefits provided by the combination of semantic and structural measures and the potential usefulness of the proposed method as a feature for software development environments are highlighted.

Journal ArticleDOI
TL;DR: A black box method based on genetically optimized artificial neural networks is inserted in order to investigate the degradation prediction ability a priori of the execution and is compared to the linear regression method.

Journal ArticleDOI
TL;DR: This research's results confirmed that external expertise and internal computer/IT knowledge are pertinent to success enhancement of ERP system success for adopting organizations.

Journal ArticleDOI
TL;DR: Shamir's secret sharing scheme is used to address all the security issues in one method which can store longer EPR strings along with better authenticity and confidentiality properties while satisfying all the requirements as shown in the results.

Journal ArticleDOI
TL;DR: Comparative results indicate that VS-PSTG gives competitive results as compared to existing strategies, and adopts Particle Swarm Optimization to ensure optimal test size reduction.

Journal ArticleDOI
TL;DR: The approach is based on established practices of the industrial automation and control domain, a compatible UML profile, and an integrated and standards based tool environment for modeling and transformation execution to support industrial practices and to utilize existing control system platforms.

Journal ArticleDOI
TL;DR: A range of RSSIF methods, drawn from both probabilistic and deterministic paradigms, are compared on a common test-bed to evaluate their localization efficiency and accuracy, and also propose a number of improvements and modifications.

Journal ArticleDOI
TL;DR: This paper describes BN curves that are not only computationally very simple to generate, but also specially suitable for efficient implementation on a very broad range of scenarios and presents implementation results of the optimal ate pairing using such a curve defined over a 254-bit prime field.

Journal ArticleDOI
TL;DR: A new scheme, based on DE is proposed in order to increase the hiding capacity for medical images, and showed that the proposed scheme has higher hiding capacity compared to the original schemes.

Journal ArticleDOI
TL;DR: The proposed design-based process allowed us to develop pedagogical models that respond to real needs of learners and instructors, where development is grounded on rigorous scientific research, allowing to reuse both knowledge and software, and showing an improvement of the mobile software built based on continuous experimentation and evaluation.

Journal ArticleDOI
TL;DR: The utilization of information within incomplete instances is of benefit to easily capture the distribution of a dataset, and the NIIA method outperforms the existing methods in accuracy, and this advantage is clearly highlighted when datasets have a high missing ratio.

Journal ArticleDOI
TL;DR: This paper proposes a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions and demonstrates the efficacy of authentication capability of the proposed scheme.

Journal ArticleDOI
TL;DR: This paper investigates the synchronization mechanism between architecture configurations and system states for maintaining the causal connections, and designs an algorithm based on it, which addresses issues such as conflicts between architecture and system changes, and exceptions of system manipulations.

Journal ArticleDOI
TL;DR: A pixel-value shifting scheme is proposed that exploits the edge areas more efficiently, thus leading to an increase in embedding capacity as shown by experimental results compared to Wu and Tsai's method.

Journal ArticleDOI
TL;DR: A new software project similarity measure and adaptation technique based on Fuzzy numbers is proposed and it is concluded that the proposed estimation model could form a useful approach for early stage estimation especially when data is almost uncertain.

Journal ArticleDOI
TL;DR: This paper analyses the most notable AOMs, paying attention to the support and possibilities that they offer for modelling organizational structures with different levels of complexity, to help developers to select the most appropriate methodology taking into account the social and organizational requirements of the multi-agent system to be deployed.

Journal ArticleDOI
TL;DR: In the proposed VSN architecture, this paper addresses two network-related issues: how to adaptively adjust the reporting rates of mobile nodes to satisfy a target monitoring quality with less communication overhead and how to exploit opportunistic communications to reduce message transmissions.