


default search action
35th COMPSAC Workshops 2011: Munich, Germany
- Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2011, Munich, Germany, 18-22 July 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4459-5

IWSC 2011: The Eighth IEEE International Workshop on Software Cybernetics
- Meng Li, Ratnesh Kumar:

Stateflow to Extended Finite Automata Translation. 1-6 - Uras Tos

, Tolga Ayav
:
Adaptive RTP Rate Control Method. 7-12 - Qiliang Yang, Jian Lü, Jianchun Xing, XianPing Tao, Hao Hu, Yang Zou:

Fuzzy Control-Based Software Self-Adaptation: A Case Study in Mission Critical Systems. 13-18 - Junpeng Lv, Hai Hu, Kai-Yuan Cai:

A Sufficient Condition for Parameters Estimation in Dynamic Random Testing. 19-24 - Jin Shao, Qianxiang Wang:

A Performance Guarantee Approach for Cloud Applications Based on Monitoring. 25-30 - Stephen S. Yau, Dazhi Huang:

Distributed Monitoring and Adaptation of Multiple QoS in Service-Based Systems. 31-36 - Ling-Zan Zhu, Bei-Bei Yin, Kai-Yuan Cai:

Software Fault Localization Based on Centrality Measures. 37-42 - Ron S. Kenett

:
Future Directions of Software Cybernetics: A Position Paper. 43-44 - Stephen S. Yau:

Panel Session: Future Directions of Software Cybernetics. 45
ONIT 2011: The Third IEEE International Workshop on Open NGN and IMS Testbeds
- Kurt Tutschku:

Keynote: Mobile Service Evolution und Research Trends in Future Internet. 46-47 - Rebecca Copeland, Noël Crespi:

Policies to Enable Serving Untrusted Services on Alternative (Non-3GPP) and Untrusted Access Networks in EPS. 48-53 - Mosiuoa Tsietsi, Alfredo Terzoli, George Wells

:
A Framework for the Management of Operator Policies and User Preferences for Service Compositions in the IP Multimedia Subsystem. 54-61 - Stephan Massner, Tom Weber:

A Dynamic Host Configuration Protocol Based Service Discovery Mechanism. 62-67 - Sami Petäjäsoja, Heikki Kortti, Ari Takanen, Juha-Matti Tirilä:

IMS Threat and Attack Surface Analysis Using Common Vulnerability Scoring System. 68-73 - Sunghyun Cho, Jae-Hyun Kim, Jonghyung Kwun:

End-to-End QoS Model for Mobile WiMAX Systems. 74-77 - Giulio Maggiore, Julius Mueller, Julien de Chanaud, Andreas Röth:

HIVE - Enabling ETSI IMS Plugtests Events. 78-82 - Shin-ichi Handa, Junnosuke Yamada, Hiroya Minami, Daichi Namikawa, Michio Shimomura:

IMS/NGN Service Lab: Testbed for Creating Innovative IMS/NGN Service Applications. 83-88 - Mosiuoa Tsietsi:

Demo: Teleweaver - Next Generation Enabler for Rural Telecentres and Access Nodes. 89
STPSA 2011: The Sixth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Blake Anderson, Daniel Quist, Terran Lane:

Detecting Code Injection Attacks in Internet Explorer. 90-95 - George Chatzieleftheriou, Panagiotis Katsaros

:
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities. 96-103 - Hossain Shahriar

, Mohammad Zulkernine:
Injecting Comments to Detect JavaScript Code Injection Attacks. 104-109 - Jonathan J. Blount, Daniel R. Tauritz

, Samuel A. Mulder
:
Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of Concept. 110-115 - Andrew J. Kornecki, Wendy F. Stevenson:

Impact of Adding Security to Safety-Critical Real-Time Systems: A Case Study. 116-121 - Alexander D. Kent, Lorie M. Liebrock:

Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments. 122-127 - Paul Giura, Gustavo de los Reyes:

The Security Cost of Content Distribution Network Architectures. 128-135
STA 2011: The Third IEEE International Workshop on Software Test Automation
- Jean Hartmann:

Dealing with Test Automation Debt at Microsoft. 136 - Arne-Michael Törsel:

Automated Test Case Generation for Web Applications from a Domain Specific Model. 137-142 - Sebastian Thiel, Frank Derichsweiler:

Petri Net Based Verification of Causal Dependencies in Electronic Control Unit Test Cases. 143-148 - Xiaoying Bai, Hao Lu, Yao Zhang, Renwei Zhang, Linping Hu, Hong Ye:

Interface-Based Automated Testing for Open Software Architecture. 149-154 - Yu Dong, Mengxiang Lin, Kai Yu, Yi Zhou, Yin-li Chen:

Achieving High Branch Coverage with Fewer Paths. 155-160 - William E. Howden:

Error-Based Software Testing and Analysis. 161-167 - Silvije Jovalekic, Tri Nguyen:

Specification and Verification of Time Properties in Distributed Automation Systems during Test Planning Phase. 168-173 - Kim Nylund, Erik Östman, Dragos Truscan

, Risto Teittinen:
Towards Rapid Creation of Test Adaptation in On-line Model-Based Testing. 174-179 - Fevzi Belli, Mutlu Beyazit

, Axel Hollmann, Nevin Güler:
Statistical Evaluation of Test Sets Using Mutation Analysis. 180-183 - Lijo Thomas, Weifeng Xu, Dianxiang Xu:

Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. 184-189 - Seon Yeol Lee, Hyun Jae Choi, Yeon Ji Jeong, Tae Ho Kim, Heung Seok Chae, Carl K. Chang:

An Improved Technique of Fitness Evaluation for Evolutionary Testing. 190-193
CORCS-IEESD 2011: The Third IEEE International Workshop on Component-Based Design of Resource-Constrained Systems/The Third IEEE International Workshop on Industrial Experience in Embedded System Design
- Tiziana Margaria

, Barry D. Floyd, Bernhard Steffen:
IT Simply Works: Simplicity and Embedded Systems Design. 194-199 - Stefan Burger, Oliver Hummel

:
Towards Automatic Reconfiguration of Aviation Software Systems. 200-205 - Jeroen Voeten, T. Hendriks, Bart D. Theelen, J. Schuddemat, W. Tabingh Suermondt, J. Gemei, Kees C. Kotterink, C. van Huët:

Predicting Timing Performance of Advanced Mechatronics Control Systems. 206-210 - Guangxin Li, Rong Zhou, Rongqing Li, Weimin He, Guilin Lv, T. John Koo:

A Case Study on SDF-Based Code Generation for ECU Software Development. 211-217 - Ya-Yun Cheng, Yaw-Chung Chen:

A Burst-Aware Scheduling Scheme Supporting Quality of Service in WiMAX Networks. 218-223 - Etienne Borde, Jan Carlson:

Automatic Synthesis and Adaption of Gray-Box Components for Embedded Systems - Reuse vs. Optimization. 224-229 - Dehui Du, Xijiao Xiong:

Specifying Communication Behaviours between Components with Real-Time rCOS - A Case Study ATP. 230-235 - Rongqing Li, Rong Zhou, Guangxin Li, Weimin He, Xiaoqian Zhang, T. John Koo:

A Prototype of Model-Based Design Tool and Its Application in the Development Process of Electronic Control Unit. 236-242 - Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

A Model Transformation Approach Based on Homomorphic Mappings between UML Activity Diagrams and BPEL4WS Specifications of Grid Service Workflows. 243-248 - Xiaoya Hu, Chao Gao, Bingwen Wang, Wei Xiong:

Channel Modeling for Wireless Underground Sensor Networks. 249-254
CloudApp 2011: The Second IEEE International Workshop on Applied Cloud Computing
- Christof Momm, Wolfgang Theilmann:

A Combined Workload Planning Approach for Multi-tenant Business Applications. 255-260 - Muhammad Asad Arfeen

, Krzysztof Pawlikowski, Andreas Willig:
A Framework for Resource Allocation Strategies in Cloud Computing Environment. 261-266 - Bastian Roth, Robin Hecht

, Bernhard Volz, Stefan Jablonski:
Towards a Generic Cloud-Based Virtual Research Environment. 267-272 - Dag Johansen, Joseph Hurley:

Overlay Cloud Networking through Meta-Code. 273-278 - Bahtijar Vogel:

An Interactive Web-Based Visualization Tool: Design and Development Cycles. 279-285 - Kai-Shin Lu, Carl K. Chang:

Using Web Search Results and Genetic Algorithm to Improve the Accuracy of Chinese Spam Email Filters. 286-291 - Weider D. Yu, Hongbin Yuan:

An Approach to Explore Mobile Software Engineering Advances in Cloud Computing Environment. 292-297 - Vincent C. Emeakaroha

, Ivona Brandic
, Michael Maurer, Ivan Breskovic:
SLA-Aware Application Deployment and Resource Allocation in Clouds. 298-303
QUORS 2011: The Fifth IEEE International Workshop on Quality Oriented Reuse of Software
- Frank Padberg, David Weiss:

Model-Based Scheduling Analysis for Software Projects. 304-309 - Vladimir P. Bubnov

, Anatoly D. Khomonenko
, Alexey V. Tyrva:
Software Reliability Model with Coxian Distribution of Length of Intervals between Errors Detection and Fixing Moments. 310-314 - Nien-Lin Hsueh, Lin-Chieh Wen, Der-Hong Ting, William C. Chu, Chih-Hung Chang

, Chorng-Shiuh Koong:
An Approach for Evaluating the Effectiveness of Design Patterns in Software Evolution. 315-320 - Richard C. Millham

, Evans Dogbe:
Aspect-Oriented Security and Exception Handling within an Object Oriented System. 321-326 - Haruhiko Kaiya, Kenichiro Hara, Kyotaro Kobayashi, Akira Osada, Kenji Kaijiri:

Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques. 327-334 - Jingang Zhou

, Dazhe Zhao, Jiren Liu:
A Lightweight Component-Based Development Approach for Enterprise Applications. 335-340 - Mohammed Alawairdhi, Eisa Aleisa

:
A Scenario-Based Approach for Requirements Elicitation for Software Systems Complying with the Utilization of Ubiquitous Computing Technologies. 341-344 - Chih-Hung Chang

, Chih-Wei Lu, William C. Chu, Chao-Tung Yang
, Pao-Ann Hsiung
, Nien-Lin Hsueh, Chorng-Shiuh Koong, Kuei-Kai Shao:
XML-Based Reusable Component Repository for Embedded Software. 345-350 - Zakwan Jaroucheh, Xiaodong Liu, Sally Smith

, Huiqun Zhao:
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. 351-355 - Huanyin Yi, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Aditya P. Mathur:

Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems. 356-361 - Hwai-Jung Hsu, Feng-Jian Wang:

Detecting Artifact Anomalies in Temporal Structured Workflow as Reusable Assets. 362-367
CFSE 2011: The Third IEEE International Workshop on Computer Forensics in Software Engineering
- Leon Aronson, Jeroen van den Bos

:
Towards an Engineering Approach to File Carver Construction. 368-373 - Svetozar Ilchev

, Zlatoliliya Ilcheva:
Protection of Intellectual Property in Web Communities by Modular Digital Watermarking. 374-379
ESAS 2011: The Sixth IEEE International Workshop on Engineering Semantic Agent Systems
- Alex Muscar, Costin Badica

:
A Functional Approach to Agent Development: Research Agenda. 380-385 - Duygu Çelik

, Atilla Elçi, Eray Elverici:
Finding Suitable Course Material through a Semantic Search Agent for Learning Management Systems of Distance Education. 386-391
SAPSE 2011: The Third IEEE International Workshop on Security Aspects of Process and Services Engineering
- Meiko Jensen, Christopher Meyer:

Expressiveness Considerations of XML Signatures. 392-397 - Rafael Accorsi:

Business Process as a Service: Chances for Remote Auditing. 398-403 - Omar Hasan, Lionel Brunie, Ernesto Damiani

:
A Privacy Preserving Reputation Protocol for Web Service Provider Selection. 404-409 - Martina Ziefle, Carsten Röcker, Andreas Holzinger

:
Medical Technology in Smart Homes: Exploring the User's Perspective on Privacy, Intimacy and Trust. 410-415 - Wen Su, Fan Yang, Xiaofeng Wu, Jian Guo, Huibiao Zhu:

Formal Approaches to Mode Conversion and Positioning for Vehicle System. 416-421
SSS 2011: The Fourth IEEE International Workshop on Service Science and Systems
- Vedran Hrgovcic, Wilfrid Utz

, Dimitris Karagiannis:
Service Modeling: A Model Based Approach for Business and It Alignment. 422-427 - Lemen Chao, Yong Zhang, Chunxiao Xing

:
Improving Query Suggestion for Digital Libraries. 428-434 - Shinsuke Kobayashi, Yukihiko Shigesada, Noboru Koshizuka, Ken Sakamura:

Interoperable Spatial Information System Architecture Based on Ubiqiutous ID Infrastructure. 435-440 - Lei Chen

, Ji-Jiang Yang, Qing Wang, Mingyu Wang:
An Intelligent Information System for Maternal and Child Health Care. 441-445 - Antonin Chazalet, Sébastien Bolle

, Serge Martin:
Analyzing the Digital Home's Quality of Service. 446-451 - Rajni Mohana, Deepak Dahiya

:
Optimized Service Discovery Using QoS Based Ranking: A Fuzzy Clustering and Particle Swarm Optimization Approach. 452-457
REFS 2011: The Fifth IEEE International Workshop on Requirements Engineering for Services
- Xavier Franch, Paul Grünbacher

, Marc Oriol
, Benedikt Burgstaller, Deepak Dhungana
, Lidia López
, Jordi Marco
, João Pimentel:
Goal-Driven Adaptation of Service-Based Systems from Runtime Monitoring Data. 458-463 - Jianchu Huang, Hongji Yang, Lei Liu:

Reconciling Requirements and Implementation via Reengineering for Context-Aware Service Evolution. 464-469 - Salma Najar, Manuele Kirsch-Pinheiro, Carine Souveyet:

The Influence of Context on Intentional Service. 470-475 - Saïd Assar

, Kadan Aljoumaa
:
Matching User Requirements with Query Formulations in Intentional Service Oriented Computing. 476-481 - Eliel Morales, Xavier Franch, Alicia Martínez

, Hugo Estrada
:
Considering Technology Representation in Service-Oriented Business Models. 482-487 - Rainer Schmidt:

Augmenting Cloud Requirements Engineering with Meta-Services. 488-493 - Wilfrid Utz

, Robert Woitsch
, Dimitris Karagiannis:
Conceptualisation of Hybrid Service Models: An Open Models Approach. 494-499 - Haruhiko Kaiya, Shunichi Suzuki, Toru Ogawa, Masaaki Tanigawa, Masahiro Umemura, Kenji Kaijiri:

Spectrum Analysis for Software Quality Requirements Using Analyses Records. 500-503 - Xiping Song, Beatrice Hwong:

Identifying Service Requirements in Solution and Infrastructure Improvement Projects. 504-505
IWPD 2011: The Second IEEE International Workshop on Program Debugging
- Vidroha Debroy, W. Eric Wong:

On the Consensus-Based Application of Fault Localization Techniques. 506-511 - Kinsun Tam:

Debugging Debugging. 512-515 - Sascha Uhrig:

Tracing Static Fields of Embedded Parallel Java Applications. 516-519

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














