default search action
29th SAC 2014: Gyeongju, Korea
- Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong:
Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014. ACM 2014, ISBN 978-1-4503-2469-4
Volume I: Artificial intelligence & agents, distributed systems, and information systems: BioHealth informatics track
- Amiya Patanaik, Vitali Zagorodnov, Chee-Keong Kwoh:
Parameter estimation and simulation for one-choice Ratcliff diffusion model. 3-7 - Arpan Pal, Aishwarya Visvanathan, Anirban Dutta Choudhury, Aniruddha Sinha:
Improved heart rate detection using smart phone. 8-13 - Udaya Kiran Tupakula, Vijay Varadharajan:
Secure monitoring for dementia patients. 14-19 - S. Graziadio, Richard Davison, K. Shalabi, K. M. A. Sahota, Gary Ushaw, Graham Morgan, J. A. Eyre:
Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation. 20-24 - Lenardo Chaves e Silva, Mirko Barbosa Perkusich, Frederico M. Bublitz, Hyggo O. Almeida, Angelo Perkusich:
A model-based architecture for testing medical cyber-physical systems. 25-30
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Byung K. Jung, Sung Y. Shin, Wei Wang, Hyung Do Choi, Jeong-Ki Pack:
Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate. 31-32 - Huan Chen, Guo-Tan Liao, Yao-Chung Fan, Bo-Chao Cheng, Cheng-Min Chen, Ting-Chun Kuo:
Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology. 33-35 - Augusto Klinger, Guilherme L. de Lima, Valter Roesler, G. Maron, Guilherme Longoni, V. Goulart, F. S. dos Santos, M. D. Ferreira, M. B. Mariano:
A low cost digital operating room. 36-37
Volume I: Artificial intelligence & agents, distributed systems, and information systems: computational intelligence and video & image analysis track
- Carolina Toledo Ferraz, Osmando Pereira Jr., Adilson Gonzaga:
Feature description based on center-symmetric local mapped patterns. 39-44 - César L. Blum Silveira, Fabio de Oliveira Mierlo, Luiz Gonzaga Jr., Cristiano André da Costa, Kleinner Farias, Rodrigo da Rosa Righi:
Faster seam carving with minimum energy windows. 45-48 - Carlos Caetano, Sandra Eliza Fontes de Avila, Silvio Jamil Ferzoli Guimarães, Arnaldo de Albuquerque Araújo:
Representing local binary descriptors with BossaNova for visual recognition. 49-54
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Cleber Zanchettin:
Face recognition based on global and local features. 55-57 - N. Ramalingeswara Swamy, Saiful Islam, Phalguni Gupta:
Two level reversible data hiding in 2D images. 58-59 - Virginia O. Andersson, Rafael Dutra, Ricardo Matsumura de Araújo:
Anthropometric and human gait identification using skeleton data from Kinect sensor. 60-61
Volume I: Artificial intelligence & agents, distributed systems, and information systems: data mining track
- Hai-Guang Li, Xindong Wu, Zhao Li:
Online learning with mobile sensor data for user recognition. 64-70 - Stephan Spiegel, Brijnesh Johannes Jain, Sahin Albayrak:
Fast time series classification under lucky time warping distance. 71-78 - Rafael Geraldeli Rossi, Alneu de Andrade Lopes, Solange O. Rezende:
A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification. 79-84 - Hao Huang, Shinjae Yoo, Konstantine Kaznatcheev, Kevin G. Yager, Fang Lu, Dantong Yu, Oleg Gang, Andrei Fluerasu, Hong Qin:
Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles. 85-90 - Cheng Chen, Lan Zheng, Alex Thomo, Kui Wu, Srinivasan Venkatesh:
Comparing the staples in latent factor models for recommender systems. 91-96 - Zhao Li, Xindong Wu:
Single multiplicatively updated matrix factorization for co-clustering. 97-104 - Christian Hundt, Bertil Schmidt, Elmar Schömer, Herbert Göttler, Hoang-Vu Dang:
GEM: an elastic and translation-invariant similarity measure with automatic trend adjustment. 105-112 - Sara Hajian, Anna Monreale, Dino Pedreschi, Josep Domingo-Ferrer, Fosca Giannotti:
Fair pattern discovery. 113-120 - Madeleine Seeland, Andreas Karwath, Stefan Kramer:
Structural clustering of millions of molecular graphs. 121-128 - Madeleine Seeland, Andreas Maunz, Andreas Karwath, Stefan Kramer:
Extracting information from support vector machines for pattern-based classification. 129-136
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Zhongyi Hu, Hongan Wang, Jiaqi Zhu:
The discovery of user related rare sequential patterns of topics in the internet document stream. 137-138
Volume I: Artificial intelligence & agents, distributed systems, and information systems: applications of evolutionary computing track
- Chanju Jung, Yong-Hyuk Kim, Yourim Yoon, Byung Ro Moon:
Investigation of hungarian mating schemes for genetic algorithms. 140-147 - Valéria de Carvalho Santos, Daniel Oliva Sales, Claudio Fabiano Motta Toledo, Fernando Santos Osório:
A hybrid GA-ANN approach for autonomous robots topological navigation. 148-153
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Hao Wang, Michael Emmerich, Thomas Bäck:
Mirrored orthogonal sampling with pairwise selection in evolution strategies. 154-156 - Andrea Cani, Marco Gaudesi, Ernesto Sánchez, Giovanni Squillero, Alberto Paolo Tonda:
Towards automated malware creation: code generation and code integration. 157-160
Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart human computer interaction track
- Markus Kleffmann, Matthias Book, Erik Hebisch, Volker Gruhn:
Automated versioning and temporal navigation for model sketches on large interactive displays. 161-168 - Tiago Gomes, Tiago Abade, José Creissac Campos, Michael D. Harrison, José Luís Silva:
Rapid development of first person serious games using the APEX platform: the asthma game. 169-174 - Paul Kim, Sangwook Kim:
A detection of overlapping community in mobile social network. 175-179 - Jung Pil Park, Min Woo Park, Soon Ki Jung:
QR-code based online robot augmented reality system for education. 180-185
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- David Alonso-Ríos, David Raneburger, Roman Popp, Hermann Kaindl, Jürgen Falb:
A user study on tailoring GUIs for smartphones. 186-192 - Arisa Sakamoto, Takuya Katayama, Tsutomu Terada, Masahiko Tsukamoto:
Method for visualizing undone operations based on changes on desktop screen. 193-195
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- David Hundely A:
Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks. 196-197
Volume I: Artificial intelligence & agents, distributed systems, and information systems: intelligent information fusion track
- Holger Billhardt, Marin Lujak, Sascha Ossowski, Ralf Bruns, Jürgen Dunkel:
Intelligent event processing for emergency medical assistance. 200-206 - Rodrigo Calvo, Janderson de Oliveira, Maurício F. Figueiredo, Roseli Aparecida Francelin Romero:
Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasks. 207-212
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Sigeru Omatu, Mitsuaki Yano:
Smell classification using weakly responding data. 213-214
Volume I: Artificial intelligence & agents, distributed systems, and information systems: intelligent and interactive learning environments track
- Simone de Sousa Borges, Vinicius H. S. Durelli, Helena Macedo Reis, Seiji Isotani:
A systematic mapping on gamification applied to education. 216-222 - Alexandre Martins dos Anjos, Romero Tori, Anderson Castro, Soares de Oliveira, Fátima L. S. Nunes:
Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments. 223-228 - Ranilson Oscar Araújo Paiva, Daniel Borges, Jário José Santos, Ig Ibert Bittencourt, Alan Pedro da Silva:
Lessons learned from an online open course: a Brazilian case study. 229-234 - Henrique M. Seffrin, Geiseane L. Rubi, Patrícia Augustin Jaques:
A dynamic bayesian network for inference of learners' algebraic knowledge. 235-240
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Elaine H. T. Oliveira, Erika H. Nozawa, Rosa Maria Vicari:
Towards a framework for relevant guidance. 241-242 - Laci Mary Barbosa Manhães, Sérgio Manuel Serra da Cruz, Geraldo Zimbrão:
WAVE: an architecture for predicting dropout in undergraduate courses using EDM. 243-247
Volume I: Artificial intelligence & agents, distributed systems, and information systems: recommender systems: theory and applications track
- Guibing Guo, Jie Zhang, Daniel Thalmann, Anirban Basu, Neil Yorke-Smith:
From ratings to trust: an empirical study of implicit trust in recommender systems. 248-253 - Di Wang, Jun Ma, Tao Lian, Lei Guo:
Recommendation based on weighted social trusts and item relationships. 254-259 - Tianjian Chen, Jing Cai, Hao Wang, Yu Dong:
Instant expert hunting: building an answerer recommender system for a large scale Q&A website. 260-265 - Shang Shang, Yuk Hui, Pan Hui, Paul Cuff, Sanjeev R. Kulkarni:
Beyond personalization and anonymity: towards a group-based recommender system. 266-273 - Yong Zheng, Robin D. Burke, Bamshad Mobasher:
Splitting approaches for context-aware recommendation: an empirical study. 274-279 - Afshin Moin:
A unified approach to collaborative data visualization. 280-286
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, Yutaka Miyake:
PrefRank: fair aggregation of subjective user preferences. 287-288 - Reudismam Rolim de Sousa, Felipe Barbosa Araújo Ramos, Antonio Alexandre Moura Costa, Giovanni Calheiros, Hyggo Oliveira de Almeida, Angelo Perkusich, Aldenor Falcao Martins:
A recommendation approach for digital TV systems based on multimodal features. 289-291
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- Yong Zheng:
Semi-supervised context-aware matrix factorization: using contexts in a way of "latent" factors. 292-293
Volume I: Artificial intelligence & agents, distributed systems, and information systems: the semantic web and applications track
- Elie Raad, Joerg Evermann:
Is ontology alignment like analogy?: knowledge integration with LISA. 294-301 - Giovanni Sá, Thiago Silveira, Rodrigo Chaves, Felipe Teixeira, Fernando Mourão, Leonardo Rocha:
LEGi: context-aware lexicon consolidation by graph inspection. 302-307 - Matthias Klusch, Ankush Prabhu Meshram, Patrick Kapahnke, Andreas Schütze:
ICM-Wind: semantics-empowered fluid condition monitoring of wind turbines. 308-315 - Vânia Maria Ponte Vidal, Marco A. Casanova, Luís Eufrasio T. Neto, José Maria Monteiro:
A semi-automatic approach for generating customized R2RML mappings. 316-322 - Ricardo de Almeida Falbo, Fabiano Borges Ruy, Giancarlo Guizzardi, Monalessa Perini Barcellos, João Paulo Andrade Almeida:
Towards an enterprise ontology pattern language. 323-330
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Duck-Ho Bae, Jong-Min Lee, Sang-Wook Kim, Youngjoon Won, Yongsu Park:
Analyzing network privacy preserving methods: a perspective of social network characteristics. 331-332 - Muntazir Mehdi, Aftab Iqbal, Ali Hasnain, Yasar Khan, Stefan Decker, Ratnesh Sahay:
Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case. 333-335
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cloud computing track
- Kristian Beckers, Isabelle Côté, Ludger Goeke:
A catalog of security requirements patterns for the domain of cloud computing systems. 337-342 - Donia El Kateb, François Fouquet, Grégory Nain, Jorge Augusto Meira, Michel Ackerman, Yves Le Traon:
Generic cloud platform multi-objective optimization leveraging models@run.time. 343-350 - Sérgio Manuel Serra da Cruz, Laci Mary M. Barbosa, Jorge Zavaleta, Raimundo Macário Costa, Maria Luiza Machado Campos:
Collecting cloud provenance metadata with Matriohska: a case study with genomic workflows. 351-356 - Kelie Zhan, Chung-Horng Lung, Pradeep Srivastava:
A green analysis of mobile cloud computing applications. 357-362
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Abdulaziz Alabdulhafez, Paul D. Ezhilchelvan:
Experimenting on virtual machines co-residency in the cloud: a comparative study of available test beds. 363-365 - Miguel G. Xavier, Israel C. De Oliveira, Robson D. Dos Passos, César A. F. De Rose:
Towards better manageability of database clusters on cloud computing platforms. 366-367
Volume I: Artificial intelligence & agents, distributed systems, and information systems: dependable and adaptive distributed systems track
- Nuno Lourenco Diegues, Muhammet Orazov, João Paiva, Luís E. T. Rodrigues, Paolo Romano:
Autonomic configuration of HyperDex via analytical modelling. 370-375 - Javier Cámara, Rogério de Lemos, Nuno Laranjeiro, Rafael Ventura, Marco Vieira:
Robustness evaluation of the rainbow framework for self-adaptation. 376-383 - Hélène Martorell, Jean-Charles Fabre, Matthieu Roy, Régis Valentin:
Improving adaptiveness of AUTOSAR embedded applications. 384-390 - Filip Krikava, Philippe Collet, Robert B. France:
ACTRESS: domain-specific modeling of self-adaptive software architectures. 391-398 - Francisco Cruz, Francisco Maia, Rui Oliveira, Ricardo Vilaça:
Workload-aware table splitting for NoSQL. 399-404
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Sandip Chakraborty, Suchetana Chakraborty, Sushanta Karmakar, Hridoy Sankar Dutta:
Hierarchical topology adaptation for distributed convergecast applications. 405-407 - Tao Wang, Ke Zhang, Lianglun Cheng:
An energy-aware service composition framework for service-oriented wireless sensor networks. 408-410
Volume I: Artificial intelligence & agents, distributed systems, and information systems: mobile computing and applications track
- Keling Da, Marc Dalmau, Philippe Roose:
Kalimucho: middleware for mobile applications. 413-419 - Tobias Griebe, Volker Gruhn:
A model-based approach to test automation for context-aware mobile applications. 420-427 - Yoshihide Hosokawa, Yuichiro Nakazawa, Takanori Yamamoto:
Location-aware information retrieval for identifying local and distant landmark. 428-435 - Sanjin Sehic, Stefan Nastic, Michael Vögler, Fei Li, Schahram Dustdar:
Entity-adaptation: a programming model for development of context-aware applications. 436-443 - Mohammad Adibuzzaman, Sheikh Iqbal Ahamed, Richard Love:
A personalized model for monitoring vital signs using camera of the smart phone. 444-449 - Chung Le:
A model driven framework for modeling and composing service based Android applications. 450-457 - Jose Luis Fernandez-Marquez, Giovanna Di Marzo Serugendo, Graeme Stevenson, Juan Ye, Simon Dobson, Franco Zambonelli:
Self-managing and self-organising mobile computing applications: a separation of concerns approach. 458-465
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Danilo F. S. Santos, Frederico Bublitz, Hyggo O. Almeida, Angelo Perkusich:
Integrating IEEE 11073 and constrained application protocol for personal health devices. 466-467 - Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love:
Smartphone based multimodal activity detection system using plantar pressure sensors. 468-469
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- A. K. M. Jahangir Alam Majumder:
A real-time smartphone- and smartshoe-based fall prevention system. 470-471
Volume I: Artificial intelligence & agents, distributed systems, and information systems: networking track
- Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Visual comparison of network anomaly detectors with chord diagrams. 473-480 - Niels Zeilemaker, Boudewijn Schoon, Johan A. Pouwelse:
Large-scale message synchronization in challenged networks. 481-488 - Rafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira:
A similarity model for virtual networks negotiation. 489-494 - Sheng-Wei Wang, Chin-Yen Wen:
Wavelength resources based lightpath-level active rerouting in all-optical WDM networks. 495-500 - Riccardo Petrocco, Mihai Capota, Johan A. Pouwelse, Dick H. J. Epema:
Hiding user content interest while preserving P2P performance. 501-508
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Chenyang Liu, Jian Cao, Frédéric Le Mouël:
A low-latency service composition approach in mobile ad hoc networks. 509-511
Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grid and smart technologies track
- Zhenzhou Peng, Shinjae Yoo, Dantong Yu, Dong Huang, Paul Kalb, John Heiser:
3D cloud detection and tracking for solar forecast using multiple sky imagers. 512-517 - Giorgos Georgiadis, Marina Papatriantafilou:
Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithm. 518-524 - Edgar Galván López, Adam Taylor, Siobhán Clarke, Vinny Cahill:
Design of an automatic demand-side management system based on evolutionary algorithms. 525-530 - Pedro Barbosa, Andrey Brito, Hyggo O. Almeida, Sebastian Clauß:
Lightweight privacy for smart metering data by adding noise. 531-538 - Ting Liu, Yuhong Gui, Yanan Sun, Yang Liu, Yao Sun, Feng Xiao:
SEDE: state estimation-based dynamic encryption scheme for smart grid communication. 539-544
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Teklemariam Tsegay Tesfay, Jean-Pierre Hubaux, Jean-Yves Le Boudec, Philippe Oechslin:
Cyber-secure communication architecture for active power distribution networks. 545-552 - Stephan Spiegel, Sahin Albayrak:
Energy disaggregation meets heating control. 559-566 - Kala Fleming, Komminist Weldemariam, Haggai Wangusi, Osamuyimen Stewart:
Monitoring water scarcity risk in Africa. 567-568
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- Siyun Chen:
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building. 569-570
Volume I: Artificial intelligence & agents, distributed systems, and information systems: social network and media analysis track
- J. Octavio Gutiérrez-García, Andrés Gómez de Silva Garza:
Multi-agent simulation of perception of safety from crime. 573-578 - Thomas Largillier, Guillaume Peyronnet, Sylvain Peyronnet:
Rocovo: robust communal publication scheme. 579-586 - Eva Zangerle, Günther Specht:
"Sorry, I was hacked": a classification of compromised twitter accounts. 587-593 - Seok-Ho Yoon, Ji-Soo Kim, Jiwoon Ha, Sang-Wook Kim, Minsoo Ryu, Ho Jin Choi:
Reachability vectors: features for link-based similarity measures. 594-597 - Marisa A. Vasconcelos, Jussara M. Almeida, Marcos André Gonçalves:
What makes your opinion popular?: predicting the popularity of micro-reviews in foursquare. 598-603 - Basma Alharbi, Xiangliang Zhang:
Exploring the significance of human mobility patterns in social link prediction. 604-609 - Yao-Chung Fan, Huan Chen:
An approximate framework for scaling social influence computation in large networks. 610-615 - Valerio Arnaboldi, Marco Conti, Massimiliano La Gala, Andrea Passarella, Fabio Pezzoni:
Information diffusion in OSNs: the impact of nodes' sociality. 616-621 - Rodrigo Marotti Togneri, Bruno Tadeu Caetano, Carlos Alberto Kamienski:
The importance of geographic locality for online information diffusion. 622-627 - Larissa A. de Freitas, Aline A. Vanin, Denise N. Hogetop, Marco N. Bochernitsan, Renata Vieira:
Pathways for irony detection in tweets. 628-633 - Jongkyu Seo, Sung-Hwan Kim, Haesung Tak, Hwan-Gue Cho:
A structural analysis of literary fictions with social network framework. 634-640
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Eduardo Cunha Campos, Marcelo de Almeida Maia:
Automatic categorization of questions from Q&A sites. 641-643 - James N. K. Liu, Zongnong Meng, Yan-Xing Hu, Yu-Lin He, Simon C. K. Shiu, Vincent W. S. Cho:
A hybrid algorithm for recommendation twitter peers. 644-649 - Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu:
Preventing the diffusion of negative information based on local influence tree. 650-652 - Rosa Virginia Encinas Quille, Caetano Traina Jr., José Fernando Rodrigues Jr.:
Spectral analysis and text processing over the computer science literature: patterns and discoveries. 653-657 - Juwel Rana, Johan Kristiansson, Kåre Synnes:
The strength of social strength: an evaluation study of algorithmic versus user-defined ranking. 658-659
Volume I: Artificial intelligence & agents, distributed systems, and information systems: wireless communications and networking track
- Gustavo Pessin, Fernando Santos Osório, Jó Ueyama, Denis F. Wolf, Renan Cipriano Moioli, Patrícia A. Vargas:
Self-localisation in indoor environments combining learning and evolution with wireless networks. 661-666 - Jun Huang, Juan Lv, Qiang Duan:
Modeling and analysis on network performance for cloud service delivery with multiple paths. 667-673 - Samaneh Aminikhanghahi, Wei Wang, Sung Y. Shin, Seong-Ho Son, Soon-Ik Jeon:
Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening. 674-679 - Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
WSN-based flutter control application for aircraft wings structural health monitoring. 680-685 - Rafael Perazzo Barbosa Mota, Daniel M. Batista:
A dynamic frame slotted ALOHA anti-collision algorithm for the internet of things. 686-691 - Tales Heimfarth, João Carlos Giacomin, Alexandre Victor Fassio, João Paulo de Araujo:
GB-MAC: a backbone based low latency protocol for WSNs. 692-698 - Eun-Jun Yoon, Kee-Young Yoo:
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks. 699-705 - Syed Hassan Ahmed, Abdul Wahid, Dongkyun Kim:
EENC - energy efficient nested clustering in UASN. 706-710
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Jae-Hyun Jun, Cheol-Woong Ahn, Sung-Ho Kim:
DDoS attack detection by using packet sampling and flow features. 711-712
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- Rafael Perazzo Barbosa Mota:
Student research abstract: mechanisms to ensure quality of service for the internet of things. 713-714 - Alfred Daniel:
Vehicle to vehicle communication using Zigbee protocol. 715-716 - Murad Khan:
Student research abstract: an optimized handover scheme based on media independent handover standard IEEE 802.21. 717-718
Volume I: Artificial intelligence & agents, distributed systems, and information systems: web technologies track
- Willian Massami Watanabe, Rafael José Geraldo, Renata Pontin de Mattos Fortes:
Keyboard navigation mechanisms in tab widgets: an investigation on ARIA's conformance. 721-726 - Pavel Arapov, Michel Buffa, Amel Ben Othmane:
WikiNEXT: a wiki for exploiting the web of data. 727-734 - Patrick Gaubatz, Waldemar Hummer, Uwe Zdun, Mark Strembeck:
Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents. 735-742 - Jon Iturrioz, Iker Azpeitia, Oscar Díaz:
Generalizing the "like" button: empowering websites with monitoring capabilities. 743-750 - Alexandre Michetti Manduca, Ethan V. Munson, Renata P. M. Fortes, Maria da Graça Campos Pimentel:
A nonintrusive approach for implementing single database, multitenant services from web applications. 751-756
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Matteo Ciman, Ombretta Gaggi, Nicola Gonzo:
Cross-platform mobile development: a study on apps with animations. 757-759 - Wook-Sung Yoo:
OSBS: online storm-water billing system. 760-761
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cooperative systems track
- Simon Tragatschnig, Huy Tran, Uwe Zdun:
Impact analysis for event-based systems using change patterns. 763-768 - Roberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Edson dos Santos Moreira:
Secure positioning in a UAV swarm using on-board stereo cameras. 769-774
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Rodrigo da Rosa Righi, Cristiano André da Costa, Luiz Gonzaga Jr., Kleinner Farias, Alexandre Luis Andrade, Lucas Graebin:
Redesigning transaction load balancing on electronic funds transfer scenarios. 775-777 - Geiser Chalco Challco, Seiji Isotani:
Towards a learning design authoring tool that generates personalized units of learning for CSCL. 778-780 - Elane Cristina da Rocha Cardoso Saraiva, Viviane Torres da Silva:
Choosing my partners based on how they will evaluate my behavior. 781-783
Volume I: Artificial intelligence & agents, distributed systems, and information systems: data streams track
- Jean Paul Barddal, Heitor Murilo Gomes, Fabrício Enembreck:
SFNClassifier: a scale-free social network method to handle concept drift. 786-791 - Dino Ienco, Albert Bifet, Bernhard Pfahringer, Pascal Poncelet:
Change detection in categorical evolving data streams. 792-797 - Heitor Murilo Gomes, Fabrício Enembreck:
SAE2: advances on the social adaptive ensemble classifier for data streams. 798-804 - Max Zimmermann, Eirini Ntoutsi, Myra Spiliopoulou:
Adaptive semi supervised opinion classifier with forgetting mechanism. 805-812
Volume I: Artificial intelligence & agents, distributed systems, and information systems: database theory, technology and applications track
- Raju Halder, Matteo Zanioli, Agostino Cortesi:
Information leakage analysis of database query languages. 813-820 - Yi-Wen Lin, En Tzu Wang, Chieh-Feng Chiang, Arbee L. P. Chen:
Finding targets with the nearest favor neighbor and farthest disfavor neighbor by a skyline query. 821-826 - Graeme Douglas, Ramon Lawrence:
LittleD: a SQL database for sensor nodes and embedded applications. 827-832 - Alessandreia Marta de Oliveira, Leonardo Murta, Vanessa Braganholo:
Towards semantic diff of XML documents. 833-838 - Jaime Raigoza, Junping Sun:
Temporal join processing with hilbert curve space mapping. 839-844 - Sang-Wook Kim, Ki-Nam Kim, Seok-Ho Yoon, Sunju Park:
Sampling in online social networks. 845-849 - Kaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang:
Mining key and referential constraints enforcement patterns. 850-854
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Julian Rith, Philipp S. Lehmayr, Klaus Meyer-Wegener:
Speaking in tongues: SQL access to NoSQL systems. 855-857 - Amin Mesmoudi, Mohand-Said Hacid:
A test framework for large scale declarative queries: preliminary results. 858-859
Volume I: Artificial intelligence & agents, distributed systems, and information systems: heterogeneous computing track
- Anderson Braga de Avila, Adriano Maron, Renata Reiser, Maurício L. Pilla, Adenauer C. Yamin:
GPU-aware distributed quantum simulation. 860-865 - Guilherme Andrade, Gabriel Spada Ramos, Daniel Madeira, Rafael Sachetto Oliveira, Esteban Clua, Renato Ferreira, Leonardo Rocha:
Efficient dynamic scheduling of heterogeneous applications in hybrid architectures. 866-871 - Aryabartta Sahu, Saparapu Ramakrishna:
Creating heterogeneity at run time by dynamic cache and bandwidth partitioning schemes. 872-879 - Fernando Alexandre, Ricardo Marqués, Hervé Paulino:
On the support of task-parallel algorithmic skeletons for multi-GPU computing. 880-885 - Kamil Rocki, Martin Burtscher, Reiji Suda:
The future of accelerator programming: abstraction, performance or can we have both? 886-895
Volume I: Artificial intelligence & agents, distributed systems, and information systems: information access and retrieval track
- Madalina Mitran, Guillaume Cabanac, Mohand Boughanem:
GeoTime-based tag ranking model for automatic image annotation. 896-901 - Leila C. C. Bergamasco, Fátima L. S. Nunes:
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor. 902-907 - Dong-Jin Kim, Sang-Chul Lee, Ho-Yong Son, Sang-Wook Kim, Jae Bum Lee:
C-Rank: a contribution-based web page ranking approach. 908-912 - Thanh Duc Ngo, Sang Phan, Duy-Dinh Le, Shin'ichi Satoh:
Recommend-Me: recommending query regions for image search. 913-918 - Edson B. Santos Junior, Rudinei Goularte, Marcelo G. Manzato:
Personalized collaborative filtering: a neighborhood model based on contextual constraints. 919-924
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Faiza Belbachir, Mohand Boughanem, Malik Muhammad Saad Missen:
Probabilistic opinion models based on subjective sources. 925-926 - Chun Yong Moon, Manjula Pilaka, Hye-young Paik, John Shepherd:
Improved named entity recognition: patterns in columns model (PCM). 927-928 - Bissan Audeh, Philippe Beaune, Michel Beigbeder:
Exploring query reformulation for named entity expansion in information retrieval. 929-930
Volume I: Artificial intelligence & agents, distributed systems, and information systems: multimedia and visualization track
- Jie Li, Zhao-Peng Meng, Kang Zhang:
Visualization of oceanographic applications using a common data model. 933-938 - Ai Uno, Takayuki Itoh:
MALL: a life log based music recommendation system and portable music player. 939-944 - Alceu Ferraz Costa, Agma Juci Machado Traina, Caetano Traina Jr.:
MFS-Map: efficient context and content combination to annotate images. 945-950 - Yalong Yang, Ning Dou, Shuai Zhao, Zhichao Yang, Kang Zhang, Quang Vinh Nguyen:
Visualizing large hierarchies with drawer trees. 951-956 - Diogo de Carvalho Pedrosa, Maria da Graça Campos Pimentel:
Text entry using a foot for severely motor-impaired individuals. 957-963 - Marcus G. F. Santanna, Priscila T. M. Saito, Pedro Henrique Bugatti:
Content-based image retrieval towards the automatic characterization of soybean seed vigor. 964-969 - Mateus Bisotto Nunes, Luciana Porcher Nedel, Valter Roesler:
Motivating people to perform better in exergames: competition in virtual environments. 970-975 - Hiroaki Tobita:
Aero-screen: blimp-based ubiquitous screen for novel digital signage and information visualization. 976-980
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Qinshui Chen, Wenmin Wang, Ronggang Wang, Jianlong Zhang, Zhongxin Liu:
An approach to support stereoscopic 3D web. 981-984 - Ronaldo Husemann, Valter Roesler:
Introduction of a multi-layer predictive search strategy for scalable video coding. 985-986
Volume II: Software development, system software & security: requirements engineering track
- Rainer Lutz, Sascha Schäfer, Stephan Diehl:
Are smartphones better than CRC cards? 987-994 - João Pimentel, Jaelson Castro, John Mylopoulos, Konstantinos Angelopoulos, Vítor E. Silva Souza:
From requirements to statecharts via design refinement. 995-1000 - Priscila Engiel, Claudia Cappelli, Julio César Sampaio do Prado Leite:
Eliciting concepts from the Brazilian access law using a combined approach. 1001-1006 - Eduardo Almentero, Julio César Sampaio do Prado Leite, Carlos José Pereira de Lucena:
Towards software modularization from requirements. 1007-1012 - Shehnila Zardari, Rami Bahsoon, Anikó Ekárt:
Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP. 1013-1020
Volume II: Software development, system software & security: poster papers
- Alberto Rodrigues da Silva:
Quality of requirements specifications: a preliminary overview of an automatic validation approach. 1021-1022 - Hiroki Horita, Kozo Honda, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Transformation approach from KAOS goal models to BPMN models using refinement patterns. 1023-1024
Volume II: Software development, system software & security: software architecture: theory, technology, and applications track
- Fábio Paulo Basso, Raquel Mainardi Pillat, Toacy Cavalcante de Oliveira, Marcos Didonet Del Fabro:
Generative adaptation of model transformation assets: experiences, lessons and drawbacks. 1027-1034 - Jeho Oh, Sungwon Kang:
A hierarchical model for traceability between requirements and architecture. 1035-1042 - Everton T. Guimarães, Alessandro Garcia, Kleinner Farias:
On the impact of obliviousness and quantification on model composition effort. 1043-1048 - Riccardo Cognini, Flavio Corradini, Stefania Gnesi, Andrea Polini, Barbara Re:
Research challenges in business process adaptability. 1049-1054
Volume II: Software development, system software & security: poster papers
- Amrita Chaturvedi, Tadinada Vankata Prabhakar:
Ontology driven builder pattern: a plug and play component. 1055-1057
Volume II: Software development, system software & security: software engineering track
- Rubing Huang, Jinfu Chen, Zhicheng Li, Rongcun Wang, Yansheng Lu:
Adaptive random prioritization for interaction test suites. 1058-1063 - Tewfik Ziadi, Christopher Henard, Mike Papadakis, Mikal Ziane, Yves Le Traon:
Towards a language-independent approach for reverse-engineering of software product lines. 1064-1071 - Rong Peng, Dong Sun, Wei-Tek Tsai:
Success factors in mobile social networking application development: case study of instagram. 1072-1079 - Eun-Young Kang, Pierre-Yves Schobbens:
Schedulability analysis support for automotive systems: from requirement to implementation. 1080-1085 - Lei Ma, Cyrille Artho, Hiroyuki Sato:
Project centralization based on graph coloring. 1086-1093 - Ruizhi Gao, Jeong Soo Eo, W. Eric Wong, Xinwei Gao, Shou-Yu Lee:
An empirical study of requirements-based test generation on an automobile control system. 1094-1099 - Hai-Feng Guo, Zongyan Qiu, Harvey P. Siy:
Locating fault-inducing patterns from structural inputs. 1100-1107 - Mohammed Al-Refai, Walter Cazzola, Robert B. France:
Using models to dynamically refactor runtime code. 1108-1113 - Kiev Gama, Didier Donsez:
A fault deployment and activation approach for testing self-recovery mechanisms. 1114-1119 - Matthieu Foucault, Marc Palyart, Jean-Rémy Falleri, Xavier Blanc:
Computing contextual metric thresholds. 1120-1125 - Yoann Laurent, Reda Bendraou, Souheib Baarir, Marie-Pierre Gervais:
Planning for declarative processes. 1126-1133 - Geunseok Yang, Tao Zhang, Byungjeong Lee:
Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively. 1134-1139 - Minh Chau Nguyen, Eunkyoung Jee, Jinho Choi, Doo-Hwan Bae:
Automatic construction of timing diagrams from UML/MARTE models for real-time embedded software. 1140-1145 - Reihane Boghrati, Abbas Heydarnoori, Majeed Kazemitabaar:
Activities performed by programmers while using framework examples as a guide. 1146-1151 - Daniel Alencar da Costa, Uirá Kulesza, Eduardo Aranha, Roberta Coelho:
Unveiling developers contributions behind code commits: an exploratory study. 1152-1157 - Manuele Ferreira, Eiji Adachi Barbosa, Isela Macia Bertran, Roberta Arcoverde, Alessandro Garcia:
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort. 1158-1163 - Hossain Shahriar, Hisham Haddad:
Risk assessment of code injection vulnerabilities using fuzzy logic-based system. 1164-1170
Volume II: Software development, system software & security: poster papers
- Yutao Ma, Yang Wu, Youwei Xu:
Dynamics of open-source software developer's commit behavior: an empirical investigation of subversion. 1171-1173 - Charity Wayua, Komminist Weldemariam, Osamuyimen Stewart:
Rethinking agribusiness models in Africa. 1174-1175 - Izuru Kume, Naoya Nitta, Masahide Nakamura, Etsuya Shibayama:
A dynamic analysis technique to extract symptoms that suggest side effects in framework applications. 1176-1178 - Zhenyu Chen, Atif M. Memon, Bin Luo:
Combining research and education of software testing: a preliminary study. 1179-1180 - Kleinner Farias, Alessandro Garcia, Carlos José Pereira de Lucena, Luiz Gonzaga Jr., Cristiano André da Costa, Rodrigo da Rosa Righi, Fábio Basso, Toacy Cavalcante de Oliveira:
Towards a quality model for model composition effort. 1181-1183 - Xin Xia, David Lo, Xinyu Wang, Bo Zhou:
Build system analysis with link prediction. 1184-1186 - Xiaoqiong Zhao, Xin Xia, Pavneet Singh Kochhar, David Lo, Shanping Li:
An empirical study of bugs in build process. 1187-1189 - Joicymara S. Xavier, Autran Macedo, Rivalino Matias, Lucio Borges de Araujo:
A survey on research in software reliability engineering in the last decade. 1190-1191
Volume II: Software development, system software & security: software engineering aspects of green computing track
- Hayden Field, Glen Anderson, Kerstin Eder:
EACOF: a framework for providing energy transparency to enable energy-aware software development. 1194-1199 - Adel Noureddine, Romain Rouvoy, Lionel Seinturier:
Unit testing of energy consumption of software libraries. 1200-1205 - Steven te Brinke, Somayeh Malakuti, Christoph Bockisch, Lodewijk Bergmans, Mehmet Aksit, Shmuel Katz:
A tool-supported approach for modular design of energy-aware software. 1206-1212 - Luis Corral, Anton B. Georgiev, Alberto Sillitti, Giancarlo Succi:
Method reallocation to reduce energy consumption: an implementation in Android OS. 1213-1218
Volume II: Software development, system software & security: poster papers
- Mahamat Issa Hassan, Rami Bahsoon:
Green-as-a-service (GaaS) for cloud service provision operation. 1219-1220
Volume II: Software development, system software & security: student research competition papers
- Steven te Brinke:
Interpreting energy profiles with CEGAR. 1221-1222
Volume II: Software development, system software & security: service-oriented architecture and programming track
- Rosane S. Huergo, Paulo F. Pires, Flávia Coimbra Delicato:
A method to identify services using master data and artifact-centric modeling approach. 1225-1230 - Carlos Parra, Diego Joya, Leonardo Giral, Alvaro Infante:
An SOA approach for automating software product line adoption. 1231-1238 - Sushama Karumanchi, Anna Cinzia Squicciarini:
In the wild: a large scale study of web services vulnerabilities. 1239-1246 - Nuno Oliveira, Alexandra Silva, Luís Soares Barbosa:
Quantitative analysis of Reo-based service coordination. 1247-1254
Volume II: Software development, system software & security: student research competition papers
- Felipe Pontes Guimarães:
A fault-tolerant architecture for decentralized compositions of services in the wild. 1255-1256
Volume II: Software development, system software & security: software verification and testing track
- Bing Chen, Qingkai Zeng, Weiguang Wang:
Crashmaker: an improved binary concolic testing tool for vulnerability detection. 1257-1263 - Víctor Rivera, Néstor Cataño:
Translating event-B to JML-specified Java programs. 1264-1271 - Harsh Beohar, Mohammad Reza Mousavi:
Input-output conformance testing based on featured transition systems. 1272-1278 - Srinivas Pinisetty, Yliès Falcone, Thierry Jéron, Hervé Marchand:
Runtime enforcement of regular timed properties. 1279-1286 - Adilson Luiz Bonifácio, Arnaldo Vieira Moura:
On the completeness of test suites. 1287-1292 - Mike Papadakis, Yves Le Traon:
Effective fault localization via mutation analysis: a selective mutation approach. 1293-1300 - Tanay Kanti Paul, Man Fai Lau:
A systematic literature review on modified condition and decision coverage. 1301-1308 - Mário Pereira, Simão Melo de Sousa:
Complexity checking of ARM programs, by deduction. 1309-1314
Volume II: Software development, system software & security: user interface generation track
- André Ribeiro, Alberto Rodrigues da Silva:
XIS-mobile: a DSL for mobile applications. 1316-1323 - David Raneburger, Hermann Kaindl, Roman Popp, Vedran Sajatovic, Alexander Armbruster:
A process for facilitating interaction design through automated GUI generation. 1324-1330
Volume II: Software development, system software & security: coordination models, languages and applications track
- Xavier Etchevers, Gwen Salaün, Fabienne Boyer, Thierry Coupaye, Noël De Palma:
Reliable self-deployment of cloud applications. 1331-1338 - Ludovic Henrio, Justine Rochas:
Declarative scheduling for active objects. 1339-1344 - Seiji Umatani:
Practical implementation techniques of ambient calculus in conventional dynamic languages. 1345-1351
Volume II: Software development, system software & security: poster papers
- Eva Kühn, Stefan Craß, Gerson Joskowicz, Martin Novak:
Flexible modeling of policy-driven upstream notification strategies. 1352-1354 - Francesco L. De Angelis, Jose Luis Fernandez-Marquez, Giovanna Di Marzo Serugendo:
Self-composition of services with chemical reactions. 1355-1356
Volume II: Software development, system software & security: constraint solving and programming track
- Roberto Amadini, Maurizio Gabbrielli, Jacopo Mauro:
An enhanced features extractor for a portfolio of constraint solvers. 1357-1359 - Danny Munera, Daniel Diaz, Salvador Abreu, Philippe Codognet:
Flexible cooperation in parallel local search. 1360-1361
Volume II: Software development, system software & security: enterprise engineering track
- Jens Kolb, Michael Zimoch, Barbara Weber, Manfred Reichert:
How social distance of process designers affects the process of process modeling: insights from a controlled experiment. 1364-1370 - Marian Benner-Wickner, Matthias Book, Tobias Brückmann, Volker Gruhn:
Execution support for agenda-driven case management. 1371-1377 - Walid Fdhila, Stefanie Rinderle-Ma:
Predicting change propagation impacts in collaborative business processes. 1378-1385 - Toomas Saarsen, Marlon Dumas:
Towards an assessment model for balancing process model production and use. 1386-1392 - Lei Wang, Andreas Wombacher, Luís Ferreira Pires, Marten van Sinderen, Chihung Chi:
A collaborative processes synchronization method with regards to system crashes and network failures. 1393-1398 - Wadha Labda, Nikolay Mehandjiev, Pedro Sampaio:
Modeling of privacy-aware business processes in BPMN to protect personal data. 1399-1405 - Thomas Molka, David Redlich, Marc Drobek, Artur Caetano, Xiao-Jun Zeng, Wasif Gilani:
Conformance checking for BPMN-based process models. 1406-1413
Volume II: Software development, system software & security: poster papers
- Joerg Evermann, Ghazal Assadipour:
Big data meets process mining: implementing the alpha algorithm with map-reduce. 1414-1416 - Hugo Ramos, André Vasconcelos:
eXtreme enterprise architecture planning. 1417-1419 - Gonçalo Antunes, Marzieh Bakhshandeh, Rudolf Mayer, José Borbinha, Artur Caetano:
Ontology-based enterprise architecture model analysis. 1420-1422
Volume II: Software development, system software & security: embedded systems track
- Ting-Hao Tsai, Ya-Shu Chen:
A thermal-throttling server in 3D multicore chips. 1425-1430 - Antoine Bertout, Julien Forget, Richard Olejnik:
A heuristic to minimize the cardinality of a real-time task set by automated task clustering. 1431-1436 - Wan-Chi Chang, Hsueh-Wen Tseng, Chin-Fu Kuo:
A traffic-balanced routing scheme for heat balance in 3D networks-on-chip. 1437-1442 - Gustavo Zanatta, Giulio Dariano Bottari, Raphael Guerra, Julius C. B. Leite:
Building a WSN infrastructure with COTS components for the thermal monitoring of datacenters. 1443-1448 - Seunghoon Yoo, Eunji Lee, Hyokyung Bahn:
The least-dirty-first cache replacement policy for phase-change memory. 1449-1454
Volume II: Software development, system software & security: mobile platforms track
- Abdullah A. I. Alnajem, Ning Zhang:
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context. 1455-1462 - Jiwon Hong, Won-Seok Hwang, Jin-Hyung Kim, Sang-Wook Kim:
Context-aware music recommendation in mobile smart devices. 1463-1468 - Su-Wei Chang, Sheng-Wei Cheng, Pi-Cheng Hsiu, Tei-Wei Kuo, Ching-Wen Lin:
Application behavior analysis in resource consumption for mobile devices. 1469-1474
Volume II: Software development, system software & security: poster papers
- Andrew Kinai, Reginald E. Bryant, Aisha Walcott-Bryant, Eric Mibuari, Komminist Weldemariam, Osamuyimen Stewart:
Traffic 411: a traffic congestion routing and awareness platform for Nairobi. 1475-1476
Volume II: Software development, system software & security: operating systems track
- Shi-Wu Lo, Bo-Hong Chen, Yu-Wei Chen, Tzu-Chieh Shen, You-Ching Lin:
ICAP, a new flash wear-leveling algorithm inspired by locality. 1478-1483 - Kuniyasu Suzaki, Toshiki Yagi, Akira Tanaka, Yutaka Oiwa, Etsuya Shibayama:
Rollback mechanism of nested virtual machines for protocol fuzz testing. 1484-1491 - Duck-Ho Bae, Ji-Woong Chang, Se-Mi Park, Byeong-Soo Jeong, Sang-Wook Kim, Seong-je Cho:
An effective data clustering method based on expected update time in flash memory environment. 1492-1497 - Chin-Fu Kuo, Hsueh-Wen Tseng:
Delay-based incrementally mapping of virtual machines in cloud computing systems. 1498-1503 - Li-Pin Chang, Sheng-Min Huang, Wen-Ping Li:
Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning. 1504-1510 - Mingyang Wang, Yiming Hu:
An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan. 1511-1516 - Heekwon Park, Dongwoo Kang, Jongmoo Choi:
Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation. 1517-1522 - Rivalino Matias, Marcela Prince, Lucio Borges de Araujo, Claudio Sousa, Luan Henrique:
An empirical exploratory study on operating system reliability. 1523-1528 - Paulo Eduardo Nogueira, Rivalino Matias Jr., Elder Vicente:
An experimental study on execution time variation in computer experiments. 1529-1534 - Eunji Lee, Jee-Eun Jang, Hyokyung Bahn:
DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory. 1535-1540
Volume II: Software development, system software & security: poster papers
- Junghoon Lee, Gyung-Leen Park, Jihyun Kang, Naram Ham:
Per-cluster allocation of relocation staff on electric vehicle sharing systems. 1541-1542 - Daniel Bristot de Oliveira, Rômulo Silva de Oliveira:
Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model. 1543-1544 - Diego Elias, Rivalino Matias, Marcia Fernandes, Lucio Borges de Araujo:
Experimental and theoretical analyses of memory allocation algorithms. 1545-1546 - George Hamer, Jason Werpy:
Large scale processing of landsat data on various software platforms. 1547-1549
Volume II: Software development, system software & security: student research competition papers
- Daniel Röhrig:
A domain specific language for process scheduling. 1550-1551 - Christian René Sechting:
A platform independent scheduler framework. 1552-1553
Volume II: Software development, system software & security: programming languages track
- Manuel Serrano, Johan Grande:
Locking fast. 1556-1561 - Marco Patrignani, Dave Clarke:
Fully abstract trace semantics for low-level isolation mechanisms. 1562-1569 - Leonardo Vieira dos Santos Reis, Vladimir Oliveira Di Iorio, Roberto da Silva Bigonha:
Defining the syntax of extensible languages. 1570-1576 - Frédéric Loulergue, Simon Robillard, Julien Tesson, Joeffrey Legaux, Zhenjiang Hu:
Formal derivation and extraction of a parallel program for the all nearest smaller values problem. 1577-1584 - Frédéric Dabrowski, Frédéric Loulergue, Thomas Pinsard:
Nested atomic sections with thread escape: a formal definition. 1585-1592 - Paul Tarau, Bill P. Buckles:
Arithmetic algorithms for hereditarily binary natural numbers. 1593-1600 - Fábio Paulo Basso, Toacy Cavalcante de Oliveira, Kleinner Farias:
Extending JUnit 4 with Java annotations and reflection to test variant model transformation assets. 1601-1608
Volume II: Software development, system software & security: poster papers
- Saleena Nabeezath, Vineeth Paleri:
Global value numbering for redundancy detection: a simple and efficient algorithm. 1609-1611 - Filip Krikava, Philippe Collet, Robert B. France:
Manipulating models using internal domain-specific languages. 1612-1614 - Matic Potocnik, Uros Cibej, Bostjan Slivnik:
Linter: a tool for finding bugs and potential problems in scala code. 1615-1616
Volume II: Software development, system software & security: programming for separation of concerns track
- John S. Dean, Frank J. Mitropoulos:
An aspect pointcut for parallelizable loops. 1619-1624 - Mario Luca Bernardi, Marta Cimitile, Giuseppe A. Di Lucca:
Declarative design pattern-based development using aspect oriented programming. 1625-1630
Volume II: Software development, system software & security: computer security track
- Michael Backes, Sebastian Gerling, Stefan Lorenz, Stephan Lukas:
X-pire 2.0: a user-controlled expiration date and copy protection mechanism. 1633-1640 - Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Building secure and anonymous communication channel: formal model and its prototype implementation. 1641-1648 - Yan Shoshitaishvili, Luca Invernizzi, Adam Doupé, Giovanni Vigna:
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security. 1649-1656 - Ali Zand, Giovanni Vigna, Xifeng Yan, Christopher Kruegel:
Extracting probable command and control signatures for detecting botnets. 1657-1662 - Daniel Hedin, Arnar Birgisson, Luciano Bello, Andrei Sabelfeld:
JSFlow: tracking information flow in JavaScript and its APIs. 1663-1671 - Daniela Oliveira, Jesús Navarro, Nicholas Wetzel, Max Bucci:
Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach. 1672-1679 - Yuxin Meng, Duncan S. Wong, Lam-for Kwok:
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. 1680-1687 - Zikai Wen, Changyu Dong:
Efficient protocols for private record linkage. 1688-1694
Volume II: Software development, system software & security: student research competition papers
- Vanessa N. Cooper:
Student research abstract: android malware detection based on Kullback-Leibler divergence. 1695-1696
Volume II: Software development, system software & security: trust, reputation, evidence and other collaboration know-how track
- Yung Shin Van Der Sype, Jean-Marc Seigneur:
Case study: legal requirements for the use of social login features for online reputation updates. 1698-1705 - Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang, Yutaka Miyake:
Privacy preserving trusted social feedback. 1706-1711 - Ronald Petrlic, Sascha Lutters, Christoph Sorge:
Privacy-preserving reputation management. 1712-1718 - Antonio Miguel Mora, Paloma de las Cuevas, Juan Julián Merelo Guervós, Sergio Zamarripa, M. Juan, Anna Isabel Esparcia-Alcázar, M. Burvall, H. Arfwedson, Z. Hodaie:
MUSES: a corporate user-centric system which applies computational intelligence methods. 1719-1723
Volume II: Software development, system software & security: poster papers
- Charanpal Dhanjal, Stéphan Clémençon:
Learning reputation in an authorship network. 1724-1726
Volume II: Software development, system software & security: advanced and convergent IT track
- Yongwoon Park, Wonyong Yoon:
Encountering smartphones in network simulation: a preliminary result on multi-radio multicast. 1727-1728 - Junho Choi, Jeongin Kim, Pankoo Kim:
Modeling for context-aware healthcare service using ontology. 1729-1730 - Byeongho Kang, Eul Gyu Im:
Analysis of binary code topology for dynamic analysis. 1731-1732 - Hae-Min Moon, Kyeong-Ri Ko, Juhyun Shin, Sung Bum Pan:
A novel double linear-cubic convolution interpolation for digital image scaling. 1733-1734 - Tran Tin, Sung-Ryul Kim:
Method for fast clustering of data distributed on a sphere surface. 1735-1736 - Younsik Jeong, Hwan-taek Lee, Seong-je Cho, Sangchul Han, Minkyu Park:
A kernel-based monitoring approach for analyzing malicious behavior on Android. 1737-1738 - Myung Chul Park, Dong Seog Han:
Performance analysis of the golden-SM in the V2V network. 1739-1740 - Hyunsoek Choi, Jeongin Seo, Hyeyoung Park:
Matrix correlation distance for 2D image classification. 1741-1742 - Sang-Il Choi, Seok-Joo Koh, Insu Kim, Sang-Kyu Lim, Tae Gyu Kang:
A new device discovery scheme in lighting control networks. 1743-1744 - Jiamei Tang, Paul Kim, Sangwook Kim:
An optimal device selection for user satisfaction of content sharing. 1745-1746 - Young Chun Kwon, Nakhoon Baek:
A CUDA-based implementation of OpenGL-compatible rasterization library prototype. 1747-1748 - Sang-Ho Shin, Jun-Cheol Jeon, Gil-Je Lee, Kee-Young Yoo:
Design of a cellular automata cell with rule 30 on quantum-dot cellular automata. 1749-1750 - Udaya Wijenayake, Soon-Yong Park:
Respiratory motion estimation using visual coded markers for radiotherapy. 1751-1752 - Jungil Kim, Eunjoo Lee:
The effect of IMPORT change in software change history. 1753-1754 - Soo Young Jang, Ajay Kumar Jha, Woo Jin Lee:
Virtual prototype generation by shockwave flash for simulating HW components of embedded system. 1755-1756 - Minwoo Jang, Woochur Kim, Yookun Cho, Jiman Hong:
Impacts of delayed replication on the key-value store. 1757-1758
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.