default search action
37th COMPSAC 2013: Kyoto, Japan
- 37th Annual IEEE Computer Software and Applications Conference, COMPSAC 2013, Kyoto, Japan, July 22-26, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-4986-6
Software Testing I
- Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. 1-10 - Yang Zhong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura:
ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families. 11-20 - Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. 21-26 - Weifeng Xu, Tao Ding, Hanlin Wang, Dianxiang Xu:
Mining Test Oracles for Test Inputs Generated from Java Bytecode. 27-32
Internet Architecture and Applications I
- Kazuma Yonemura, Kunitake Kaneko, Fumio Teraoka:
CLINEX: An Inter-node Cross-Layer Cooperation Architecture to Adapt to Dynamically Changing Network Situation. 33-42 - Jingtao Li, Jie Zhang, Zhen Cao, Wengang Pei:
GenRe: A General Replication Scheme over an Abstraction of DHTs. 43-52 - Chao Luo, Hiroyuki Okamura, Tadashi Dohi:
Modeling and Analysis of Multi-version Concurrent Control. 53-58 - Ravi Santosh Arvapally, Xiaoqing (Frank) Liu, Donald C. Wunsch II:
Fuzzy c-Means Clustering Based Polarization Assessment in Intelligent Argumentation System for Collaborative Decision Support. 59-64
Big Data Analytics and Knowledge Management I
- Jianwei Liao, Xiaoyan Liu, Yingshen Chen:
Dynamical Re-striping Data on Storage Servers in Parallel File Systems. 65-73 - Fuyuan Xiao, Masayoshi Aritsugi:
Nested Pattern Queries Processing Optimization over Multi-dimensional Event Streams. 74-83 - Xiaoyong Li, Yijie Wang, Xiaoling Li, Yuan Wang, Rubing Huang:
Parallelizing Probabilistic Streaming Skyline Operator in Cloud Computing Environments. 84-89
Mobile and Pervasive Computing
- Yasutaka Nishimura, Kiyohito Yoshihara:
A Device Specification Method Using Doppler Effect of Acoustic Waves. 90-99 - Kazuya Matsuo, Keisuke Goto, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Agent Redeployment and Missing Data Regathering in Mobile Wireless Sensor Networks. 100-109 - Md. Osman Gani, Casey O'Brien, Sheikh Iqbal Ahamed, Roger O. Smith:
RSSI Based Indoor Localization for Smartphone Using Fixed and Mobile Wireless Node. 110-117 - Chenjie Wei, Heesung Lee, Luke Molnar, Michael Herold, Rajiv Ramnath, Jay Ramanathan:
Assisted Human-in-the-Loop Adaptation of Web Pages for Mobile Devices. 118-123
Network Middleware, Cloud Architectures, and Computing
- Xiaodong Zhang, Ying Zhang, Xing Chen, Kai Liu, Gang Huang, Jianfeng Zhan:
A Relationship-Based VM Placement Framework of Cloud Environment. 124-133 - Samuel A. Ajila, Akindele A. Bankole:
Cloud Client Prediction Models Using Machine Learning Techniques. 134-142 - Oscar Maurício Caicedo Rendón, Felipe Estrada Solano, Lisandro Zambenedetti Granville:
A Mashup-Based Approach for Virtual SDN Management. 143-152
Posters I
- Chao-Lin Kuo, Lung-Chuan Huang, Shun-Jih Wang, Jui-Sheng Lin, Cheng-Chi Wang, Jun-Juh Yan:
Image Encryption Based on Fuzzy Synchronization of Chaos Systems. 153-154 - Taro Takaguchi, Nobuo Sato, Kazuo Yano, Naoki Masuda:
Inferring Directed Static Networks of Influence from Undirected Temporal Networks. 155-156 - Hsin-Chieh Chen, Yi-You Hou, Meei-Ling Hung, Zhang-Lin Wan:
Speed Control for Permanent Magnet Synchronous Motor System via Quasi-sliding Mode Control. 157-158 - Jian-Liung Chen, Chia-Hung Lin, Bo-Wun Gu, Ming-Jyi Jang:
Maximum Power Tracking Controller for a Wind-Driven Permanent-Magnet Synchronous Generator: Using an Approach of Chaos Synchronization. 159-160 - Whei-Min Lin, Chia-Sheng Tu, Chia-Hung Lin:
Support Vector Machine-Based Fuzzy Inference Systems for Service Restoration Strategy in Micro-distribution Systems. 161-162 - Jyun-Jie Wang, Hong-Da Chen, Ting-Ya Yang, Houshou Chen, Chi-Yuan Lin:
Data Hiding Technique by Ternary Hamming Codes. 163-164 - Kenichi Takagiwa, Shinichi Ishida, Hiroaki Nishi:
SoR-Based Programmable Network for Future Software-Defined Network. 165-166 - Takeshi Kitahara, Yasuhiko Hiehata, Hideyuki Koto, Norihiro Fukumoto, Hajime Nakamura, Shigehiro Ano:
Autonomous Data Transmission Using Off-Peak Hours for Cellular-Based M2M Communications. 167-168
Software Testing II
- Dan Hao, Xu Zhao, Lu Zhang:
Adaptive Test-Case Prioritization Guided by Output Inspection. 169-179 - Yi-Sian You, Chin-Yu Huang, Kuan-Li Peng, Chao-Jung Hsu:
Evaluation and Analysis of Spectrum-Based Fault Localization with Modified Similarity Coefficients for Software Debugging. 180-189 - Bo Jiang, W. K. Chan:
Bypassing Code Coverage Approximation Limitations via Effective Input-Based Randomized Test Case Prioritization. 190-199
Internet Architecture and Applications II
- Che-Cheng Chang, Jichiang Tsai:
Solving the Distributed Trigger Counting Problem without Any Global Assumption. 200-207 - Tomoki Watanabe, Rika Mochizuki, Toru Kobayashi, Masao Isshiki:
HACCS: Home Appliance Control Concierge System: Extending Functions on Web Service. 208-213 - Mikio Aoyama, Kazuo Yabuta, Tsutomu Kamimura, Souichi Inomata, Toshiya Chiba, Takashi Niwa, Koji Sakata:
PROMIS: A Management Platform for Software Supply Networks Based on the Linked Data and OSLC. 214-219 - Hiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe:
Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network. 220-225
Big Data Analytics and Knowledge Management II
- Aki-Hiro Sato:
Recursive Segmentation Procedure Based on the Akaike Information Criterion Test. 226-233 - Alfredo Cuzzocrea, Elisa Bertino:
Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework. 234-239 - Jin Wang, Yong Zhang, Yang Gao, Chunxiao Xing:
pLSM: A Highly Efficient LSM-Tree Index Supporting Real-Time Big Data Analysis. 240-245
Reliability Modeling and Model-Based Evaluation
- Daisuke Kuwa, Tadashi Dohi:
Generalized Logit Regression-Based Software Reliability Modeling with Metrics Data. 246-255 - Lei Liu, Jing Xu, Minglei Li, Jufeng Yang:
A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach. 256-261 - Shaukat Ali, Tao Yue:
A Rigorous and Comprehensive Analysis of Effort for Modeling Aspect State Machines: Results from a Series of Controlled Experiments. 262-267 - Shinji Inoue, Shiho Hayashida, Shigeru Yamada:
Toward Practical Software Reliability Assessment with Change-Point Based on Hazard Rate Models. 268-273
Posters II
- Chia-Hung Lin, Chun-Chao Wang, Jian-Liung Chen, Yi-Pin Kuo, Wei-Ling Chen, Che-Wei Chang:
Interaction Physical-Activity Housekeeper for Silver-Haired Citizen Using Wireless Sensor and Mobile Healthcare iPhone. 274-275 - Tung-Sheng Zhan, Whei-Min Lin, Ming-Huang Tsai, Guo-Shiang Wang:
Design and Implementation of the Dual-Axis Solar Tracking System. 276-277 - Shi-Jaw Chen, Chia-Hung Lin:
Integrating SVM Classifier and Distribution State Estimation for Detection and Identification of AMI Customer's Meter Data. 278-279 - Tuan-Fang Fan, Churn-Jung Liau:
Logical Analysis of Weighted Social Networks - An Extended Abstract. 280-281 - Yu-Min Wang, Yi-Shun Wang, Ching-Hsuan Yeh, Min-Quan Xie:
The Relationships among Presentation Mode, Product Type, Consumers' Product Knowledge, and Consumers' Purchase Intention in the E-Commerce Environment. 282-283 - Jae Won Moon, Tae-Beom Lim, Kyung Won Kim, Seung-woo Kum, Myunghyun Yoon, Kwangsu Cho:
A Framework for Dynamic Context-Awarable User Interfaces of the Second Screen Devices in a Home Network Environment. 284-285 - Chi-Lok Tsang, Yiu-Wing Leung:
Automatic Redemption of Free Parking in Shopping Malls. 286-287 - Norihiro Fukumoto, Shigehiro Ano, Shigeki Goto:
A Practical Behavior Analysis of Video Application Users on Smart Phones. 288-289 - Maria Salama, Ahmed Shawish:
Junosphere: Towards Professional Networks Education. 290-291
Software Life Cycle, Evolution, and Management
- Jaewon Oh, Woo Hyun Ahn, Seungho Jeong, Jinsoo Lim, Taegong Kim:
Automated Transformation of Template-Based Web Applications into Single-Page Applications. 292-302 - Tegawendé F. Bissyandé, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère:
Popularity, Interoperability, and Impact of Programming Languages in 100, 000 Open Source Projects. 303-312 - Venkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert:
Optimization of Object Queries on Collections Using Annotations for the String Valued Attributes. 313-318
Internet Architecture and Applications III
- Chris Strasburg, Samik Basu, Johnny S. Wong:
S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems. 319-328 - Wanderson Paim de Jesus, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville:
ProViNet - An Open Platform for Programmable Virtual Network Management. 329-338 - Takafumi Fukunaga:
A Portable Method for Improving Available Bandwidth of PC Cluster. 339-348
Security, Trust, and Privacy
- Horng-Tzer Wang, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee:
Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison. 349-358 - Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang:
Efficient General Policy Decision by Using Mutable Variable Aware Cache. 359-368 - Gerry Howser, Bruce M. McMillin:
A Multiple Security Domain Model of a Drive-by-Wire System. 369-374 - Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages. 375-380
Semantic Web and Web Services
- Abderahman Rashwan, Olga Ormandjieva, René Witte:
Ontology-Based Classification of Non-functional Requirements in Software Specifications: A New Corpus and SVM-Based Classifier. 381-386 - Lili Mou, Ge Li, Zhi Jin:
Domain Hyponymy Hierarchy Discovery by Iterative Web Searching and Inferable Semantics Based Concept Selecting. 387-392 - Iman Keivanloo, Juergen Rilling:
Semantic-Enabled Clone Detection. 393-398 - Jang-Ho Choi, Jae-Hyun Cho, Han-Gyu Ko, In-Young Ko:
Distributed Coordination of IoT-Based Services by Using a Graph Coloring Algorithm. 399-404
Requirements Engineering
- Bahar Sateli, Elian Angius, René Witte:
The ReqWiki Approach for Collaborative Software Requirements Engineering with Integrated Text Analysis Support. 405-414 - Bin Yin, Zhi Jin, Wei Zhang, Haiyan Zhao, Bo Wei:
Finding Optimal Solution for Satisficing Non-functional Requirements via 0-1 Programming. 415-424 - Dang Viet Dzung, Atsushi Ohnishi:
Evaluation of Ontology-Based Checking of Software Requirements Specification. 425-430 - Xiaohong Chen, Ronghua Ye, Haiying Sun, Hong Lu:
Deriving Requirements Specification with Time: A Software Environment Ontology Based Approach. 431-436 - Sajjad Mahmood, Samuel A. Ajila:
Software Requirements Elicitation - A Controlled Experiment to Measure the Impact of a Native Natural Language. 437-442
Doctoral Symposium
- Atsushi Morikawa, Hiroshi Yamamoto, Katsuyuki Yamazaki:
Timing Synchronization of ZigBee Sensor Network for Ecology Observation. 443-446 - Phuong Tran Thi Ha, Hiroshi Yamamoto, Katsuyuki Yamazaki:
Using Autonomous Air Vehicle in DTN Sensor Network for Environmental Observation. 447-450 - Ryoji Aoki, Hiroshi Yamamoto, Kei-ichi Iguchi, Katsuyuki Yamazaki:
Realtime Guidance System in Hospital Using PHS and Android Device. 451-454 - Naoya Hongo, Hiroshi Yamamoto, Katsuyuki Yamazaki:
Browser Synchronization System for Supporting Elderly People and IT Shortfalls. 455-458 - Tatsuya Takahashi, Hiroshi Yamamoto, Norihiro Fukumoto, Shigehiro Ano, Katsuyuki Yamazaki:
Congestion Detection in Mobile Network towards Complex Event Processing. 459-462 - Laurent Issertial, Hiroshi Tsuji:
Data Management and User Interface for a Call for Paper Manager. 463-466 - Othman M. M. Othman, Koji Okamura:
Enhancing Control Model to Ease Off Centralized Control of Flow-Based SDNs. 467-470 - H. R. O. E. Dayaratna, Kunitake Kaneko, Fumio Teraoka:
Multiple Home Agent Placement Considerations Based on Internet Service Provider Perspective in MobileIPv6. 471-474 - Yasuhiro Watashiba, Seiichiro Hirabara, Susumu Date, Hirotake Abe, Kohei Ichikawa, Yoshiyuki Kido, Shinji Shimojo, Haruo Takemura:
OpenFlow Network Visualization Software with Flow Control Interface. 475-477
Plenary Panel: Software Assurance
- Mohammad Zulkernine:
Software Assurance: What Should We Do Next? 478
Plenary Panel: Big Data
- Elisa Bertino:
Big Data - Opportunities and Challenges Panel Position Paper. 479-480 - Alfredo Cuzzocrea:
Analytics over Big Data: Exploring the Convergence of DataWarehousing, OLAP and Data-Intensive Cloud Infrastructures. 481-483
Software Testing III
- Rudolf Ramler, Klaus Wolfmaier, Theodorich Kopetzky:
A Replicated Study on Random Test Case Generation and Manual Unit Testing: How Many Bugs Do Professional Developers Find? 484-491 - Beng Heng Ng, Atul Prakash:
Expose: Discovering Potential Binary Code Re-use. 492-501 - Rubing Huang, Jinfu Chen, Tao Zhang, Rongcun Wang, Yansheng Lu:
Prioritizing Variable-Strength Covering Array. 502-511
Formal Methods I
- Rui Wang, Yong Guan, Liming Luo, Xiaoyu Song, Jie Zhang:
Formal Modelling of PLC Systems by BIP Components. 512-518 - Daniela Carneiro da Cruz, Pedro Rangel Henriques, Jorge Sousa Pinto:
Interactive Verification of Safety-Critical Software. 519-528 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Modeling and Optimizing Resource Scheduling for Service Composition Based on Queuing Petri Nets. 529-538
Real-Time and Embedded Systems
- Yu Zhang, Fei Xie, Yunwei Dong, Xingshe Zhou, Chunyan Ma:
Cyber/Physical Co-verification for Developing Reliable Cyber-physical Systems. 539-548 - Yu Jiang, Hehua Zhang, Xiaoyu Song, William N. N. Hung, Ming Gu, Jiaguang Sun:
Verification and Implementation of the Protocol Standard in Train Control System. 549-558 - Shuichi Oikawa, Satoshi Miki:
File-Based Memory Management for Non-volatile Main Memory. 559-568
Software Architecture and Design I
- Min Zhou, Hai Wan, Chen Su, Liangze Yin, Lianyi Zhang, Fei He, Ming Gu:
Component-Based Modeling and Code Synthesis for Cyclic Programs. 569-578 - Dongjin Yu, Yanyan Zhang, Jianlin Ge, Wei Wu:
From Sub-patterns to Patterns: An Approach to the Detection of Structural Design Pattern Instances by Subgraph Mining and Merging. 579-588 - Tadashi Murakami, Toshiyuki Amagasa, Hiroyuki Kitagawa:
DBPowder: A Flexible Object-Relational Mapping Framework Based on a Conceptual Model. 589-598
Fast Abstracts I
- Kimiko Uchida, Yoshihiko Oya, Takashi Okuda:
Conversation Characteristics during Pair Work in Computer Literacy Education. 599-600 - Xu Li, Linpeng Huang:
Evaluation of Software Architectures Reliability Based on Hypergraph Grammar. 601-602 - Toshiyuki Shimizu, Tomo Sueki, Masatoshi Yoshikawa:
Supporting Keyword Selection in Generating Earth Science Metadata. 603-604 - Jinfu Chen, Qing Li, Huanhuan Wang, Rubing Huang:
Describing Component Behavior Using Improved Chemical Abstract Machine. 605-606 - Ryo Yanase, Tatsunori Sakai, Makoto Sakai, Satoshi Yamane:
Development of Model Checker of Dynamic Linear Hybrid Automata. 607-608
Software Testing IV
- Chunyan Ma, Tian Tan, Yibo Chen, Yunwei Dong:
An If-While-If Model-Based Performance Evaluation of Ranking Metrics for Spectra-Based Fault Localization. 609-618 - Mahdi Eslamimehr, Jens Palsberg:
Testing versus Static Analysis of Maximum Stack Size. 619-626 - Junpeng Lv, Bei-Bei Yin, Kai-Yuan Cai:
On the Gain of Measuring Test Case Prioritization. 627-632 - Rong Chen, Yaqing Liu, Zhichun Jia, Jian Gao:
Isolating and Understanding Program Errors Using Probabilistic Dispute Model. 633-638
Formal Methods II
- Zheng Lu, Christopher Steinmuller, Supratik Mukhopadhyay:
Towards Formal Verification of a Commercial Wireless Router Firmware. 639-647 - Kazuhiro Ogata, Min Zhang:
A Divide and Conquer Approach to Model Checking of Liveness Properties. 648-657 - Nelson Souto Rosa:
Formalising Middleware Systems: A Design Pattern-Based Approach. 658-667
HCI and Usability
- Jingtao Li, Chao Zhong, Zhen Cao, Wengang Pei, Xi Zhou:
Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSs. 668-677 - Laura Housley, Thomas Lynch, Rajiv Ramnath, Peter F. Rogers, Jayashree Ramanathan:
Implementation Considerations in Enabling Visually Impaired Musicians to Read Sheet Music Using a Tablet. 678-683 - Pedro F. Campos, Fernando Miguel Campos, João Pestana:
Delineato: A Diagramming User Interface Designed Using a "What You Get is What You Need" Approach. 684-689 - Ivor D. Addo, Sheikh Iqbal Ahamed, William C. Chu:
Toward Collective Intelligence for Fighting Obesity. 690-695
Software Architecture and Design II
- Vasily Y. Kharitonov:
A Software Architecture for High-Level Development of Component-Based Distributed Virtual Reality Systems. 696-705 - Shan Tang, Qiang Liu:
Supporting Integration of COTS Components from a Perspective of Self-Adaptive Software Architecture. 706-713
Industry Papers I
- Masaki Fujikawa, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda:
The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics Technology. 714-715 - Oral Gurel, Mehmet Ulas Cakir:
Promising XMPP Based Applications for Military and Defense Systems. 716-717 - Shih-Fang Chang:
A Market-in-Market Collaborative Model towards Application Marketplaces. 718-719 - Hirohisa Aman, Manami Sasaki, Kei Kureishi, Hideto Ogasawara:
Application of the 0-1 Programming Model for Cost-Effective Regression Test. 720-721
Fast Abstracts II
- Tomohiko Takagi, Zengo Furukawa, Yoshinobu Machida:
Test Strategies Using Operational Profiles Based on Decision Tables. 722-723 - Junbeom Yoo, Sanghyun Yoon:
SQAF-DS: A Software Quality Assessment Framework for Dependable Systems. 724-725 - Takafumi Tanaka, Kazuki Mori, Hiroaki Hashiura, Atsuo Hazeyama, Seiichi Komiya:
Support System for Software Development Exercise that Utilizes Activity Data Collected in Real Time from the Development Environment. 726-727 - Guan-Zhong Wu, Chen-Che Huang, Yui-Chey Teng, Jiun-Long Huang, Wei-Chih Ting, Yi-Yu Su, Pin-Chuan Liu:
On Simplifying Mobile Mashup Application Development. 728-729 - Makoto Kato, Saeko Matsuura:
A Dynamic Countermeasure Method to Android Malware by User Approval. 730-731
M2M Networking and Internet of Things
- Marcelo Antonio Marotta, Felipe Jose Carbone, José Jair Cardoso de Santanna, Liane Margarida Rockenbach Tarouco:
Through the Internet of Things - A Management by Delegation Smart Object Aware System (MbDSAS). 732-741 - Attaphongse Taparugssanagorn, Siwaruk Siwamogsatham, Carlos A. Pomalaza-Raez:
A Hexagonal Coverage LED-ID Indoor Positioning Based on TDOA with Extended Kalman Filter. 742-747 - Tseng-Yi Chen, Hsin-Wen Wei, Nien-I Hsu, Wei-Kuan Shih:
A IoT Application of Safe Building in IPv6 Network Environment. 748-753 - Minbo Li, Zhu Zhu, Guangyu Chen:
A Scalable and High-efficiency Discovery Service Using a New Storage. 754-759
Applications
- Ashish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball, Maciej J. Zawodniok, Bruce M. McMillin, Sriram Chellappan:
Stability of a Cyber-physical Smart Grid System Using Cooperating Invariants. 760-769 - Yasha Wang, Jiangtao Wang, Xiaoyu Zhang:
QTime: A Queuing-Time Notification System Based on Participatory Sensing Data. 770-777 - Takafumi Yoshida:
A Perspective on Computer-Based Training, CBT. 778-783 - Kenji Taguchi, Hideaki Nishihara, Toshiaki Aoki, Fumihiro Kumeno, Koji Hayamizu, Koichi Shinozaki:
Building a Body of Knowledge on Model Checking for Software Development. 784-789
Software Architecture and Design III
- Mikko Raatikainen, Marko Komssi, Vittorio dal Bianco, Klas Kindström, Janne Järvinen:
Industrial Experiences of Organizing a Hackathon to Assess a Device-centric Cloud Ecosystem. 790-799 - Chen Li, Linpeng Huang, Luxi Chen, Chengyuan Yu:
Breeze/ADL: Graph Grammar Support for an XML-Based Software Architecture Description Language. 800-805 - Abdulaziz Alkhalid, Chung-Horng Lung, Duo Liu, Samuel Ajila:
Software Architecture Decomposition Using Clustering Techniques. 806-811 - Ke Li, Junchao Xiao, Yongji Wang, Qing Wang:
Analysis of the Key Factors for Software Quality in Crowdsourcing Development: An Empirical Study on TopCoder.com. 812-817
Industry Papers II
- Kazumine Ogura, Hirofumi Ueda, Norihito Fujita:
A Scalable DTN Routing Protocol for an Infra-less Communication System. 818-819 - Rudolf Ramler, Werner Putschögl:
A Retrospection on Building a Custom Tool for Automated System Testing. 820-821 - Shunichi Kinoshita, Toshiki Watanabe, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:
Fault-Tolerant Wireless LAN Roaming System Using Client Certificates. 822-823 - Fan Zhang, Jinwu Wang, Xiaoqing (Frank) Liu, Buqing Cao, Mingdong Tang:
CASAT-HOOMT: Computer Aided Software Analysis Tool Based on High Order Object-Oriented Modeling Technique. 824-825
Fast Abstracts III
- Kien Nguyen, Quang Tran Minh, Shigeki Yamada:
Towards Optimal Disaster Recovery in Backbone Networks. 826-827 - Yuhua Qi, Xiaoguang Mao, Yan Lei, Ziying Dai, Yudong Qi, Chengsong Wang:
Empirical Effectiveness Evaluation of Spectra-Based Fault Localization on Automated Program Repair. 828-829 - Jiyi Li, Qiang Ma, Yasuhito Asano, Masatoshi Yoshikawa:
Potential Semantics in Multi-modal Relevance Feedback Information for Image Retrieval. 830-831 - Atsushi Noro, Saeko Matsuura:
UML based Security Function Policy Verification Method for Requirements Specification. 832-833 - Sayaka Izukura, Kazuo Yanoo, Hiroshi Sakaki, Masato Kawatsu:
Determining Appropriate IT Systems Design Based on System Models. 834-835
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.