


default search action
34th COMPSAC Workshops 2010: Seoul, Korea
- Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2010, Seoul, Korea, 19-23 July 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4105-1

ESAS 2010: The Fifth IEEE Workshop on Engineering Semantic Agent Systems
- Asli Apaydin, Duygu Çelik

, Atilla Elçi:
Semantic Image Retrieval Model for Sharing Experiences in Social Networks. 1-6 - Duygu Çelik

, Atilla Elçi:
Ontology-Based QoS Queuing Model for Selection of Web Services Servers. 7-12 - Jing Lin, Sahra Sedigh

, Ann Miller:
Modeling Cyber-Physical Systems with Semantic Agents. 13-18
QUORS 2010: The Fourth IEEE International Workshop on Quality Oriented Reuse of Software
- Indika Kumara

, Chandana Gamage:
Towards Reusing ESB Services in Different ESB Architectures. 25-30 - Tuoye Xu, Tong Li, Lin Liu, Barrett R. Bryant:

Negotiating Service Requirements among Strategic Actors. 31-36 - Shin Nakajima, Keiji Hokamura, Naoyasu Ubayashi

:
Aspect-Oriented Development of PHP-Based Web Applications. 37-44 - Hua Li, Yong-guang Peng, Xinming Ye, Jing-yuan Yue:

Test Sequence Generation from Combining Property Modeling and Program Slicing. 45-50 - Le Truong Giang, Dongwon Kang, Doo-Hwan Bae:

Software Fault Prediction Models for Web Applications. 51-56 - Atef Mohamed, Mohammad Zulkernine:

The Level of Decomposition Impact on Component Fault Tolerance. 57-62 - Michael Lettner, Michael Tschernuth:

Applied MDA for Embedded Devices: Software Design and Code Generation for a Low-Cost Mobile Phone. 63-68 - M. F. van Amstel:

The Right Tool for the Right Job: Assessing Model Transformation Quality. 69-74 - Tsung Lee, Jhih-Syan Hou:

A Model Expansion Method in Schema-Based Model Evolution. 75-80 - Kumar P. Anoop Anoop, Sathia Narayanan, Vijayalakshmi Mallenahalli Siddaiah:

COTS Integrations: Effort Estimation Best Practices. 81-86 - Omar Alshathry, Helge Janicke

:
Optimizing Software Quality Assurance. 87-92
BINDIS 2010: The Third IEEE International Workshop on Barriers towards Internet-Driven Information Services
- Jia Shang, Ji-Jiang Yang, Qing Wang, Hui Pan:

The Framework of Medical Simulation Education and Evaluation System for Supporting SaaS. 93-97 - Chao-Jung Hsu, Nancy Urbina Rodas, Chin-Yu Huang, Kuan-Li Peng:

A Study of Improving the Accuracy of Software Effort Estimation Using Linearly Weighted Combinations. 98-103 - Li Zhou, Yong Zhang, Chunxiao Xing

:
ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to Clouds. 104-108 - Wei She, I-Ling Yen, Bhavani Thuraisingham:

WS-Sim: A Web Service Simulation Toolset with Realistic Data Support. 109-114
STPSA 2010: The Fifth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Moesfa Soeheila Mohamad, Geong Sen Poh:

Analysis of Two Watermarking Protocols Based on Commutative Encryption. 115-120 - Tong Li, Lin Liu, Golnaz Elahi, Eric S. K. Yu, Barrett R. Bryant:

Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint. 127-133 - Takeshi Yashiro, Masahiro Bessho, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:

T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant Chip. 134-139 - Ahmed M. Elmisery

, Huaiguo Fu:
Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols. 140-145 - Dong Chan An, Seog Park:

Flexible Prime Number Labeling for Resource Limited Clients. 146-151 - Ajay Challagalla, S. S. Shivaji Dhiraj, Durvasula V. L. N. Somayajulu, Toms Shaji Mathew, Saurav Tiwari, Syed Sharique Ahmad:

Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods. 152-157 - Thoshitha T. Gamage, Bruce M. McMillin

, Thomas P. Roth:
Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation. 158-163 - Mi-Young Kim

, Osmar R. Zaïane, Randy Goebel:
Natural Language Watermarking Based on Syntactic Displacement and Morphological Division. 164-169 - Meixia Zhu, Hanpin Wang, Wei Jin, Zizhen Wang, Chunxiang Xu:

Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation. 170-175 - Jason Madden, Bruce M. McMillin

, Anik Sinha:
Environmental Obfuscation of a Cyber Physical System - Vehicle Example. 176-181
IWSC 2010: The Seventh International Workshop on Software Cybernetics
- Haochi Wu, Lin Liu, Wenting Ma:

Optimizing Requirements Elicitation with an i* and Bayesian Network Integrated Modelling Approach. 182-188 - Hwai-Jung Hsu, Feng-Jian Wang:

Delegation Pattern in Workflow System. 189-195 - Bei-Bei Yin, Ling-Zan Zhu, Kai-Yuan Cai:

Entropy-Based Measures of Heterogeneity of Software Structural Profile. 196-201 - Tugkan Tuglular

, Gurcan Gercek:
Feedback Control Based Test Case Instantiation for Firewall Testing. 202-207 - Zhi Quan Zhou

:
Using Coverage Information to Guide Test Case Selection in Adaptive Random Testing. 208-213 - Hai Hu, Chang-Hai Jiang, Feng Ye, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau:

A Parallel Implementation Strategy of Adaptive Testing. 214-219 - Qian Wu, Qianxiang Wang:

Natural Language Processing Based Detection of Duplicate Defect Patterns. 220-225
SAPSE 2010: The Second International Workshop on Security Aspects of Process and Services Engineering
- Xijiao Xiong, Jing Liu, Miaomiao Zhang, Zuohua Ding:

Modeling and Verification of an Automatic Train Protection System. 226-231 - Nadia Bennani, Ernesto Damiani

, Stelvio Cimato
:
Toward Cloud-Based Key Management for Outsourced Databases. 232-236
REFS 2010: The Fourth IEEE International Workshop on Requirements Engineering for Services
- Suntae Kim, Minseong Kim, Vijayan Sugumaran

, Sooyong Park:
A Scenario Based Approach for Service Identification. 237-238 - Nauman A. Qureshi

, Cu D. Nguyen, Anna Perini:
Analyzing Interoperability Requirements for Adaptive Service-Based Applications: A Goal-Oriented Approach. 239-244 - Marco Aiello

, Pavel Bulanov, Heerko Groefsema
:
Requirements and Tools for Variability Management. 245-250 - Rong Peng, Qiang Ye, Mao Ye:

A Requirements Maturity Measurement Approach Based on SKLSEWiki. 251-254 - Bin Wen, Peng Liang

, Keqing He:
Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems. 255-258 - Sean Gu:

Loosely-Coupled SOA Service Access Provisioning. 259-262 - Angshu Maan Sen, K. Hemachandran:

Elicitation of Goals in Requirements Engineering Using Agile Methods. 263-268 - Didar Zowghi

, Zhi Jin:
A Framework for the Elicitation and Analysis of Information Technology Service Requirements and Their Alignment with Enterprise Business Goals. 269-272
CFSE 2010: The Second IEEE International Workshop on Computer Forensics in Software Engineering
- Vasileios Koutsoumpas, Kostas Kontogiannis, Peter Matthews:

Dynamic Analysis for the Reconstruction of System Behavior Models. 273-280 - Rong Chen, Lina Hong, Chunyan Lü, Wu Deng:

Author Identification of Software Source Code with Program Dependence Graphs. 281-286 - Igors Svecs, Tanmoy Sarkar, Samik Basu, Johnny S. Wong:

XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment. 287-292
ME 2010: The Second IEEE International Workshop on Middleware Engineering
- Alessandra Toninelli

, Animesh Pathak, Amir Seyedi, Roberto Speicys Cardoso, Valérie Issarny:
Middleware Support for Mobile Social Ecosystems. 293-298 - Manal Al-Bahlal, Jalal Al-Muhtadi

:
A Middleware for Personal Smart Spaces. 299-304 - Hongjun Yu, Rong Chen, Zhenjun Du:

Message Oriented Middleware Support for Mobile Ad Hoc Data Sharing. 305-310 - Tor-Morten Grønli, Jarle Hansen, Gheorghita Ghinea

:
A Context-Aware Meeting Room: Mobile Interaction and Collaboration Using Android, Java ME and Windows Mobile. 311-316 - Taehun Kim, Insuk Park, Soon J. Hyun, Dongman Lee:

MiRE4OWL: Mobile Rule Engine for OWL. 317-322
STA 2010: The Second IEEE International Workshop on Software Test Automation
- Roberto Silveira Silva Filho, Christof J. Budnik, William M. Hasling, Monica McKenna, Rajesh Subramanyan:

Supporting Concern-Based Regression Testing and Prioritization in a Model-Driven Environment. 323-328 - Zhengshan Wang, Bixin Li, Lulu Wang, Meng Wang, Xufang Gong:

Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem. 329-334 - Seung-Hun Shin, Seung-Kyu Park, Kyung-Hee Choi, Ki-Hyun Jung:

Normalized Adaptive Random Test for Integration Tests. 335-340 - Rajesh K. Mansharamani, Amol Khanapurkar, Benny Mathew, Rajesh Subramanyan:

Performance Testing: Far from Steady State. 341-346 - Chuanqi Tao, Bixin Li, Xiaobing Sun

, Chongfeng Zhang:
An Approach to Regression Test Selection Based on Hierarchical Slicing Technique. 347-352 - Sukhamay Kundu, Supratik Mukhopadhyay:

Approximation of CFL by Regular Languages for Concurrent Program Verification. 353-358 - Meng Wang, Bixin Li, Zhengshan Wang, Xiaoyuan Xie:

An Optimization Strategy for Evolutionary Testing Based on Cataclysm. 359-364
CloudApp 2010: The First IEEE International Workshop on Emerging Applications for Cloud Computing
- Ivona Brandic

, Vincent C. Emeakaroha
, Michael Maurer, Schahram Dustdar
, Sandor Acs, Attila Kertész
, Gabor Kecskemeti
:
LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. 365-370 - Victor Echeverría, Lorie M. Liebrock, Dongwan Shin

:
Permission Management System: Permission as a Service in Cloud Computing. 371-375 - Derek Smith, Qiang Guan, Song Fu

:
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems. 376-381 - Mahadev Satyanarayanan

, Wolfgang Richter, Glenn Ammons, Jan Harkes, Adam Goode:
The Case for Content Search of VM Clouds. 382-387 - Ki-Woong Park, Woomin Hwang, Kyu Ho Park:

FalconEye: Data Center Status Extraction via Vision Transformation Techniques. 388-392 - Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn

:
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. 393-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














