default search action
42nd COMPSAC 2018: Tokyo, Japan - Volume 2
- Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2. IEEE Computer Society 2018
SCA: Smart Computing & Applications
- William Cheng-Chung Chu, Chih-Hung Chang:
Message from the SCA 2018 Workshop Organizers. 1 - Eugene Voloshin, Valeri Chipulis, Roman Kuznetsov:
Smart Applications in Heat and Power Systems. 2-7 - Mohammad Rosyidi, Ratih H. Puspita, Shigeru Kashihara, Doudou Fall, Kazushi Ikeda:
A Design of IoT-Based Searching System for Displaying Victim's Presence Area. 8-13 - Woei-Kae Chen, Chien-Hung Liu, Bo-Hong Li:
A Feature Envy Detection Method Based on Dataflow Analysis. 14-19 - Hwai-Jung Hsu, Yves Lin:
How Agile Impacts a Software Corporation: An Empirical Study. 20-25 - Thitiporn Neammanee, Saranya Maneeroj:
Time-Aware Recommendation Based on User Preference Driven. 26-31 - Nayeon Bak, Byeong-Mo Chang, Kwanghoon Choi:
Smart Block: A Visual Programming Environment for SmartThings. 32-37 - Yongjia Yu, Vasu Jindal, Farokh B. Bastani, Fang Li, I-Ling Yen:
Improving the Smartness of Cloud Management via Machine Learning Based Workload Prediction. 38-44 - Lu Zhang, Hongji Yang, Chi Zhang, Nao Li:
A New Way of Being Smart? Creative Computing and Its Applications in Tourism. 45-50 - Hongji Yang, Lin Zou, Qinyun Liu, Sicong Ma:
A Wisdom Search Engine. 51-56 - I-Cheng Lin, Yi-Shu Lu, Wen-Yueh Shih, Jiun-Long Huang:
Successive POI Recommendation with Category Transition and Temporal Influence. 57-62 - Hanas Subakti, Jehn-Ruey Jiang:
Indoor Augmented Reality Using Deep Learning for Industry 4.0 Smart Factories. 63-68 - Chien-Hung Liu, Woei-Kae Chen, Shu-Hang Ho:
NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling Android Applications. 69-74 - Shin-Jie Lee, Yu-Xian Chen, Shang-Pin Ma, Wen-Tin Lee:
Test Command Auto-Wait Mechanisms for Record and Playback-Style Web Application Testing. 75-80 - Shang-Pin Ma, Chen-Yuan Fan, Yen Chuang, Wen-Tin Lee, Shin-Jie Lee, Nien-Lin Hsueh:
Using Service Dependency Graph to Analyze and Test Microservices. 81-86 - Sheng-Cang Chou, Chao-Tung Yang, Fuu-Cheng Jiang, Chih-Hung Chang:
The Implementation of a Data-Accessing Platform Built from Big Data Warehouse of Electric Loads. 87-92 - Jia-Yow Weng, Chao-Tung Yang, Chih-Hung Chang:
The Integration of Shared Storages with the CephFS and Rados Gateway for Big Data Accessing. 93-98 - Chorng-Shiuh Koong, Hsin-Ying Tsai, Yi-Yang Hsu, Yeh-Cheng Chen:
The Learning Effectiveness Analysis of JAVA Programming with Automatic Grading System. 99-104
AIML: Advances in AI and Machine Learning
- San Murugesan, Takahira Yamaguchi:
Message from the AMIL 2018 Workshop Organizers. 105 - Xiali Li, Songting Deng, Song Wang, Zhengyu Lv, Licheng Wu:
Review of Small Data Learning Methods. 106-109 - Petar Mrazovic, Josep Lluís Larriba-Pey, Mihhail Matskin:
A Deep Learning Approach for Estimating Inventory Rebalancing Demand in Bicycle Sharing Systems. 110-115 - Victor Parque, Tomoyuki Miyashita:
On Learning Fuel Consumption Prediction in Vehicle Clusters. 116-121 - Qinyun Liu, Lin Zou, Hua Zhou, Hongji Yang:
An Approach to Proposing New Business Models Basing on Association Rule Learning, BP Neural Network and Creative Computing. 122-125 - Wen-Chung Shih:
Mining Sequential Patterns to Explore Users' Learning Behavior in a Visual Programming App. 126-129 - Michael Benedict L. Virtucio, Jeffrey A. Aborot, John Kevin C. Abonita, Roxanne S. Aviñante, Rother Jay B. Copino, Michelle P. Neverida, Vanesa O. Osiana, Elmer C. Peramo, Joanna G. Syjuco, Glenn Brian A. Tan:
Predicting Decisions of the Philippine Supreme Court Using Natural Language Processing and Machine Learning. 130-135 - Yunlan Wang, Bin Zhang, Tianhai Zhao, Zhengxiong Hou, Xiangyu Wu, Hussain Khanzada Muzammil:
Prediction Method of Blasting Vibration by Optimized GEP Based on Spark. 136-140 - Sravyasri Garapati, Kamalakar Karlapalem:
Empirical Evaluation of Idle-Time Analysis Driven Improved Decision Making by Always-On Agents. 141-146 - Takeshi Morita, Naho Kashiwagi, Ayanori Yorozu, Michael Walch, Hideo Suzuki, Dimitris Karagiannis, Takahira Yamaguchi:
Practice of Multi-robot Teahouse Based on PRINTEPS and Evaluation of Service Quality. 147-152 - Shun Moriya, Chihiro Shibata:
Transfer Learning Method for Very Deep CNN for Text Classification and Methods for its Evaluation. 153-158 - Kristoffer Jon Albers, Mikkel N. Schmidt, Morten Mørup, Marisciel Litong-Palima, Rasmus Bonnevie, Fumiko Kano Glückstad:
Understanding Mindsets Across Markets, Internationally: A Public-Private Innovation Project for Developing a Tourist Data Analytic Platform. 159-164 - Akemi Gálvez, Andrés Iglesias:
Modified Memetic Self-Adaptive Firefly Algorithm for 2D Fractal Image Reconstruction. 165-170 - Ryohei Orihara, Ryota Narasaki, Yuma Yoshinaga, Yasuhiro Morioka, Yoshiyuki Kokojima:
Approximation of Time-Consuming Simulation Based on Generative Adversarial Network. 171-176 - Alice Nicolaï, Julien Audiffren:
Model-Space Regularization and Fully Interpretable Algorithms for Postural Control Quantification. 177-182 - Yuuya Fukumoto, Daiki Shimizu, Chihiro Shibata:
Generation of Character Illustrations from Stick Figures Using a Modification of Generative Adversarial Network. 183-186 - Xiaolong Xu, Yongping Li, Mark Liptrott, Nik Bessis:
NDFMF: An Author Name Disambiguation Algorithm Based on the Fusion of Multiple Features. 187-190
ADMNET: Architecture, Design, Deployment & Management of Networks & Applications
- Takashi Yamanoue, Hiroki Kashiwazaki, Yong Jin, Ruediger Gad:
Message from the ADMNET 2018 Workshop Organizers. 191-192 - Tohru Kondo, Keita Isawaki, Kaori Maeda:
Development and Evaluation of the MEC Platform Supporting the Edge Instance Mobility. 193-198 - Alfredo Cuzzocrea, Enzo Mumolo, Marwan Hassani, Giorgio Mario Grasso:
Towards Effective Generation of Synthetic Memory References Via Markovian Models. 199-203 - Masami Fukuyama, Nariyoshi Yamai, Satoshi Ohzahata, Naoya Kitagawa:
Throughput Improvement of MPTCP by Selective Bicasting with Cross-Layer Control in Wireless Environment. 204-209 - Yuichi Taguchi, Tsutomu Yoshinaga:
System Resource Management to Control the Risk of Data-Loss in a Cloud-Based Disaster Recovery. 210-215 - Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen:
A Load-Balanced Approach to Time Efficient Resource Scheduling in SDN-Enabled Data Center. 216-221 - Nobukuni Hamamoto, Shigetoshi Yokoyama, Hiroshi Ueda:
On the Confirmation Method of the User's Record of the GakuNinMoodle. 222-227 - Ryosuke Matsumoto, Kenji Rikitake, Kentaro Kuribayashi:
Large-Scale Certificate Management on Multi-Tenant Web Servers. 228-233 - Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. 234-239
CDS: Consumer Devices & Systems
- Ryozo Kiyohara, Yasuo Okabe, Atsushi Tagami:
Message from the CDS 2018 Workshop Organizers. 240 - Takahiro Fujiwara, Toshihiko Tanaka, Kai Takashima, Shigeo Kaneda:
Community Energy Management System To Encourage Power Saving Competition. 241-246 - Tetsuji Yamaguchi, Akira Yamada, Takeshi Fujiwara, Ryoichi Takahashi, Tetsuya Shimada, Yuki Ishida, Koichiro Ueda, Shigeo Kaneda:
Development of Bicycle Simulator with Tilt Angle Control Tilt Angle. 247-252 - Thamer Horbylon Nascimento, Fabrízzio Alphonsus A. M. N. Soares, Hugo Alexandre Dantas do Nascimento, Rogério Lopes Salvini, Mateus Machado Luna, Cristhiane Gonçalves, Eduardo Faria de Souza:
Interaction with Platform Games Using Smartwatches and Continuous Gesture Recognition: A Case Study. 253-258 - Tadanobu Tsunoda, Kazuaki Nimura:
Information Harvesting Method by an Energy Harvesting Device with Multiple Microcontrollers. 259-265 - Fanjuan Shi, Chirine Ghedira Guégan:
Adapted Decision Support Service Based on the Prediction of Offline Consumers' Real-Time Intention and Devices Interactions. 266-271 - Mateus Machado Luna, Fabrízzio Alphonsus Alves de Melo Nunes Soares, Hugo Alexandre Dantas do Nascimento, Joyce Siqueira, Eduardo Faria de Souza, Thamer Horbylon Nascimento, Ronaldo Martins da Costa:
Text Entry on Smartwatches: A Systematic Review of Literature. 272-277 - Wilfred Chinedu Okonkwo, Magda Huisman:
The Use of System Development Methodologies in the Development of Mobile Applications: Are they Worthy of Use? 278-283 - Chen-Yeou Yu, Richard O. Oyeleke, Carl K. Chang:
Situation Based Energy Management Framework on Mobile Devices. 284-289 - Dong Chen, Hao Wang:
Application on Intersection Classification Algorithm Based on Clustering Analysis. 290-297 - Wen-Jung Chu, Hong-Ren Chen:
Using Interactive E-Books in Elementary School Origami Activities: Analysis of Learning Effect, Learning Motivation, and Cognitive Load. 298-303 - Wichian Premchaiswadi, Parham Porouhan, Nucharee Premchaiswadi:
Process Modeling, Behavior Analytics and Group Performance Assessment of e-Learning Logs Via Fuzzy Miner Algorithm. 304-309 - Rosa Cabedo Gallén, Edmundo Tovar, Sergio Martín, Martín Llamas, Manuel Caeiro, Oscar Martínez Bonastre, Rebecca Strachan, Manuel Castro, Sorel Reisman:
Who are Interested in Open Education? An Analysis of the Participants in the First MOOC of the IEEE Education Society. 310-314
ESAS: E-Health Systems & Web Technologies
- Atilla Elçi, Duygu Çelik Ertugrul:
Message from the ESAS 2018 Workshop Organizers. 315-316 - Richard O. Oyeleke, Chen-Yeou Yu, Carl K. Chang:
Situ-Centric Reinforcement Learning for Recommendation of Tasks in Activities of Daily Living In Smart Homes. 317-322 - Navadon Khunlertgit:
Development of a Performance Visualization Model of Basic Life Support Training with Feedback Devices for Mobile Application. 323-328 - Özgü Taçyildiz, Duygu Çelik Ertugrul, Yiltan Bitirim, Nese Akcan, Atilla Elçi:
Ontology-Based Obesity Tracking System for Children and Adolescents. 329-334 - Chiara Braghin, Stelvio Cimato, Alessio Della Libera:
Are mHealth Apps Secure? A Case Study. 335-340 - Emre Oner Tartan, Cebrail Çiflikli:
An Android Application for Geolocation Based Health Monitoring, Consultancy and Alarm System. 341-344 - Amin Y. Noaman, Nabeela Al-Abdullah, Arwa A. Jamjoom, Abdul Hamid M. Ragab, Farrukh Nadeem, Anser G. Ali:
Knowledge Based e-Health Surveillance System for Predicting Hospital Acquired Infections. 345-351
ESAS: E-Health Systems & Web Technologies
- Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE 2018 Workshop Organizers. 352 - Chen-Kuang Hsieh, Ching-Chun Chiu, Po-Chyi Su:
Video Forensics for Detecting Shot Manipulation Using the Information of Deblocking Filtering. 353-358 - Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita:
Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain. 359-364 - Songpon Teerakanok, Tetsutaro Uehara:
Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research. 365-369 - Abdulrahman Alatawi, Weifeng Xu, Jie Yan:
The Expansion of Source Code Abbreviations Using a Language Model. 370-375 - Huiwen Wang, Huibiao Zhu, Lili Xiao, Wanling Xie, Gang Lu:
Modeling and Verifying OpenFlow Scheduled Bundle Mechanism Using CSP. 376-381 - Zhen Yue, Zichen Li, Peifei Song, Shumei Zhang, Yixian Yang:
A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification. 382-387 - Hongcan Gao, Yanfeng Wu, Sihan Xu, Chenkai Guo, Xiaolei Hou, Jing Xu:
TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare. 388-393 - Mei-Ling Chiang, Shu-Wei Tu, Wei-Lun Su, Chen-Wei Lin:
Enhancing Inter-Node Process Migration for Load Balancing on Linux-Based NUMA Multicore Systems. 394-399
ESAS: E-Health Systems & Web Technologies
- Ji-Jiang Yang, Sheikh Iqbal Ahamed, Jianqiang Li:
Message from the MediComp 2018 Workshop Organizers. 400-401 - Zhongkai Tong, Xianxiang Chen, Zhengling He, Kai Tong, Zhen Fang, Xianlong Wang:
Emotion Recognition Based on Photoplethysmogram and Electroencephalogram. 402-407 - Bo Liu, Kelu Yao, Mengmeng Huang, Jiahui Zhang, Yong Li, Rong Li:
Gastric Pathology Image Recognition Based on Deep Residual Networks. 408-412 - Jianqiang Li, Qidong Hu, Azhar Imran, Li Zhang, Ji-Jiang Yang, Qing Wang:
Vessel Recognition of Retinal Fundus Images Based on Fully Convolutional Network. 413-418
STA: Software Test Automation
- Shu Wang, Shishi Ma, Min Chen, Mingyue Wei, Guangjun Yu:
A Childhood Disease Database Based on Word Segmentation Technology: Research and Practice. 419-423 - Joel Martin, David Levine:
Property-Based Testing of Browser Rendering Engines with a Consensus Oracle. 424-429 - Xiaohui Sun, Sihan Xu, Chenkai Guo, Jing Xu, Naipeng Dong, Xiujuan Ji, Sen Zhang:
A Projection-Based Approach for Memory Leak Detection. 430-435 - Ju Qian, Fusheng Lin, Changjian Li, Zhiyi Zhang, Zhe Chen:
Generating Realistic Logically Unreasonable Faulty Data for Fault Injection. 436-441 - Yaqing Fan, Xinya Cao, Jing Xu, Sihan Xu, Hongji Yang:
High-Frequency Keywords to Predict Defects for Android Applications. 442-447 - Chadarat Phipathananunth, Panuchart Bunyakiati:
Synthetic Runtime Monitoring of Microservices Software Architecture. 448-453 - Yijie Ren, Bei-Bei Yin, Bin Wang:
Test Case Prioritization for GUI Regression Testing Based on Centrality Measures. 454-459
STPSA: Security, Trust, and Privacy for Software Applications
- Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the STPSA 2018 Workshop Organizers. 460-461 - Pushkar Ogale, Michael Shin, Sasanka Abeysinghe:
Identifying Security Spots for Data Integrity. 462-467 - Saad El Jaouhari, Ahmed Bouabdallah:
A Privacy Safeguard Framework for a WebRTC/WoT-Based Healthcare Architecture. 468-473 - Maryam Farhadi, Hisham Haddad, Hossain Shahriar:
Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications. 474-479 - Nidhiben Solanki, Yongtao Huang, I-Ling Yen, Farokh B. Bastani, Yuqun Zhang:
Resource and Role Hierarchy Based Access Control for Resourceful Systems. 480-486 - Kento Kono, Sanouphab Phomkeona, Koji Okamura:
An Unknown Malware Detection Using Execution Registry Access. 487-491 - Ratinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova:
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps. 492-497 - Md. Golam Moula Mehedi Hasan, Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar:
Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. 498-503 - George Yee:
Removing Software Vulnerabilities During Design. 504-509 - Mohammad Ashrafuzzaman, Hasan Jamil, Yacine Chakhchoukh, Frederick T. Sheldon:
A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids. 510-515
BIOT: Big Data Management for the Internet of Things
- Hideya Ochiai, Kurt Geihs, Susumu Takeuchi:
Message from the BIOT 2018 Workshop Organizers. 516 - Mohamad Yuzrie Khalid, Patrick Hang Hui Then, Valliappan Raman:
Exploratory Study for Data Visualization in Internet of Things. 517-521 - Salman Taherizadeh, Blaz Novak, Marija Komatar, Marko Grobelnik:
Real-Time Data-Intensive Telematics Functionalities at the Extreme Edge of the Network: Experience with the PrEstoCloud Project. 522-527 - Shinji Shimojo, Ikuo Nakagawa:
Secure IoT Agent Platform with m-Cloud Distributed Statistical Computation Mechanism. 528-533 - Taylor S. Cox, Calvin S. H. Hoi, Carson K. Leung, Caden R. Marofke:
An Accurate Model for Hurricane Trajectory Prediction. 534-539 - Jingyu Sun, Masato Kamiya, Susumu Takeuchi:
Introducing Hierarchical Clustering with Real Time Stream Reasoning into Semantic-Enabled IoT. 540-545 - Ruixun Zhang, Zhaozheng Yuan, Xiuli Shao:
A New Combined CNN-RNN Model for Sector Stock Price Analysis. 546-551 - Andrea Fornaia, Emiliano Tramontana:
Assisting Replace Method with Method Object: Selecting Fields and Preserving Data Access. 552-557
SDIM: Secure Digital Identity Management
- Bian Yang, Julien Bringer, Hideaki Goto:
Message from the SDIM 2018 Workshop Organizers. 558 - Toyokazu Akiyama, Morito Matsuoka, Kazuhiro Matsuda, Yumi Sakemi, Hisashi Kojima:
Secure and Long-Lived Wireless Sensor Network for Data Center Monitoring. 559-564 - Øyvind Anders Arntzen Toftegaard, Bian Yang:
Towards an Operable Evaluation System for Evidence of Identity. 565-570 - Khayrul Bashar, M. Manzur Murshed:
Texture Based Vein Biometrics for Human Identification: A Comparative Study. 571-576 - Ryosuke Abe, Hiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura, Atsushi Nakadaira:
Storage Protocol for Securing Blockchain Transparency. 577-581 - Makoto Takemiya, Bohdan Vanieiev:
Sora Identity: Secure, Digital Identity on the Blockchain. 582-587
EACIS: Emotion & Affective Computing Interfaces & Systems
- Midori Sugaya, Yoshito Tobe:
Message from the EACIS 2018 Workshop Organizers. 588 - Midori Sugaya, Issei Watanabe, Reiji Yoshida, Feng Chen:
Human Emotional State Analysis During Driving Simulation Experiment Using Bio-Emotion Estimation Method. 589-594 - Nahoko Takada, Shinji Nakagawa:
Differences of Passenger Unease Emotional Areas, An Experimental Case Study. 595-600 - Midori Sugaya, Takuya Hiramatsu, Reiji Yoshida, Feng Chen:
Preliminary Reaction Analysis of Audience with Bio-Emotion Estimation Method. 601-605 - Guillaume Lopez, Hiroko Tobase, Naoya Isoyama:
Influence of Hedonic State Visualization on Self and Surroundings. 606-610 - Midori Sugaya, Yuki Nishida, Reiji Yoshida, Yuya Takahashi:
An Experiment of Human Feeling for Hospitality Robot Measured with Biological Information. 611-615
INFOFLOW: Flow Oriented Approaches in Internet of Things and CyberPhysical Systems
- Kenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai:
Access Control Model for IoT Environment Including Automated Configuration. 616-621 - Jose Paolo Talusan, Yugo Nakamura, Teruhiro Mizumoto, Keiichi Yasumoto:
Near Cloud: Low-cost Low-Power Cloud Implementation for Rural Area Connectivity and Data Processing. 622-627 - Zennosuke Aiko, Keisuke Nakashima, Tomoki Yoshihisa, Takahiro Hara:
A Social Sensor Visualization System for a Platform to Generate and Share Social Sensor Data. 628-633 - Yoji Yamato, Tatsuya Demizu, Hirofumi Noguchi, Misao Kataoka:
Proposal of Automatic GPU Offloading Technology on Open IoT Environment. 634-639 - Satomi Kura, Hirozumi Yamaguchi, Yoh Shiraishi:
Low-cost Pedestrian Counter Using Wi-Fi APs for Smart Building Applications. 640-645 - Hung-Yu Chien:
Dynamic Public Key Certificates for IoT and WSN Scenarios. 646-651
NETSAP: Network Technologies for Security, Administration & Protection
- Masaki Hashimoto, Yoshiaki Hori, Yutaka Miyake:
Message from the NETSAP 2018 Workshop Organizers. 652 - Yi-Ren Yeh, Ming-Kung Sun, C.-Y. Huang:
A Malware Beacon of Botnet by Local Periodic Communication Behavior. 653-657 - Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe:
Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet. 658-663 - Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. 664-669 - Marat Zhanikeev:
Towards a Packet Traffic Genome Project as a Method for Realtime Sub-Flow Traffic Analysis. 670-675 - Wanjiao Shi, Yufeng Wang, Qun Jin, Jianhua Ma:
PDL: An Efficient Prediction-Based False Data Injection Attack Detection and Location in Smart Grid. 676-681 - Jinpeng Jiang, Hongyan Mao, Rumeng Shao, Yuanmin Xu:
Formal Verification and Improvement of the PKMv3 Protocol Using CSP. 682-687
SAPSE: Security Aspects in Processes and Services Engineering
- Stelvio Cimato:
Message from the SAPSE 2018 Workshop Organizers. 688 - Stefan Covaci, Matteo Repetto, Fulvio Risso:
A New Paradigm to Address Threats for Virtualized Services. 689-694 - Moitrayee Chatterjee, Akbar Siami Namin:
Detecting Web Spams Using Evidence Theory. 695-700 - Faiza Loukil, Chirine Ghedira Guégan, Khouloud Boukadi, Aïcha-Nabila Benharkat:
LIoPY: A Legal Compliant Ontology to Preserve Privacy for the Internet of Things. 701-706 - Takashi Hatashima, Keita Nagai, Asami Kishi, Hikaru Uekusa, Shigeaki Tanimoto, Atsushi Kanai, Hitoshi Fuji, Kazuhiko Ohkubo:
Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime. 707-712 - Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. 713-718 - Itzel Vázquez Sandoval, Gabriele Lenzini:
Experience Report: How to Extract Security Protocols' Specifications from C Libraries. 719-724
BIG DATA WORKSHOP
- Huiqun Yu, Cunbin Deng, Guisheng Fan, Liqiong Chen, Huaiying Sun:
An Efficient Approach to Forecasting Monthly Calls for Repair from Gas Consumers. 725-730 - Peili Yang, Hui Zhao, Xuezhen Yin, Jian Ye, Lingfeng Yang, Jimin Liang:
A Cooperated Data Management Platform for Coronary Heart Disease Early Identification and Risk Warning Research. 731-736
QUORS: Quality Oriented Reuse of Software
- Xiaodong Liu, Hongji Yang:
Message from the QUORS 2018 Workshop Organizers. 737 - Belmondo Rodrigues Aragão Junior, Rossana Maria de Castro Andrade, Marcio Espíndola Freire Maia, Tales Paiva Nogueira:
SUCCEEd: Support Mechanism for Creating and Executing Workflows for Decoupled SAS in IoT. 738-743 - Oluwaseun Bamgboye, Xiaodong Liu, Peter Cruickshank:
Towards Modelling and Reasoning About Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces. 744-749 - Sicong Ma, Hongji Yang, Meiyu Shi:
Utilising Abstration Techniques and Gaming Theory for Developing Intangible Cultural Heritage. 750-755 - Huihui Liu, Xufang Gong, Li Liao, Bixin Li:
Evaluate How Cyclomatic Complexity Changes in the Context of Software Evolution. 756-761
IWFIT: Future Internet Technologies
- Hiroyuki Ohsaki, Yasuo Okabe, Koji Okamura:
Message from the IWFIT 2018 Workshop Organizers. 762 - Tomoharu Endo, Atsuko Yokotani, Satoshi Ohzahata, Ryo Yamamoto, Toshihiko Kato:
An Adaptive Bandwidth Reservation Method for a Content-Centric Network. 763-768 - Tsubasa Munemitsu, Daisuke Kotani, Yasuo Okabe:
A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes. 769-776 - Danilo Reis de Vasconcelos, Valdenir Severino, José Neuman de Souza, Rossana M. C. Andrade, Márcio Maia:
Bio-Inspired Model for Data Distribution in Fog and Mist Computing. 777-782 - Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
A Probabilistic Interest Packet Aggregation for Content-Centric Networking. 783-788
SIS-SS: Smart IoT Sensors and Social Systems for eHealth & Well Being Applications
- Luca Vollero, Salvatore D'Antonio:
Message from the SIS-SS 2018 Workshop Organizers. 789 - Shama Siddiqui, Anwar Ahmed Khan, Sayeed Ghani:
A Comparison Study on Dynamic Duty Cycle and Dynamic Channel Polling Approaches for Wireless Sensor Networks. 790-793 - Ka-Ho Lam, Chi-Chung Cheung, Wah-Ching Lee:
New RSSI-Based LoRa Localization Algorithms for Very Noisy Outdoor Environment. 794-799 - Ermanno Cordelli, Giorgio Pennazza, Marco Sabatini, Marco Santonico, Luca Vollero:
A Smart Sensor Architecture for eHealth Applications. 800-804
IEESD: Industrial Experience in Embedded Design
- Detlef Streitferdt, Tiberiu Seceleanu, Philipp Nenninger:
Message from the IEESD 2018 Workshop Organizers. 805 - Michael Kirchhoff, Jörn Weisensee, Detlef Streitferdt, Wolfgang Fengler, Elena Rozova:
Increasing Efficiency in Data Flow Oriented Model Driven Software Development for Softcore Processors. 806-811 - Philipp Nenninger, Nils Bieler:
State Estimation Using Neural Networks in Industrial Processes. 812-817 - Nasser Mustafa, Yvan Labiche, Dave Towey:
Traceability in Systems Engineering: An Avionics Case Study. 818-823
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.