


default search action
36th COMPSAC Workshops 2012: Izmir, Turkey
- Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:

36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2714-5
Invited Talk
- Michiaki Iwazume, Hideaki Fujii, Takahiro Iwase, Hiroshi Haraguchi, Makoto Hijiya:

Asian Information HUB Project: NICT's R&D Vsion and Strategies for Universal Communication Technology in the Big Data Era. 1-6
SSS 2012: The Fifth IEEE International Workshop on Service Science and Systems
Service Creation and Evolution
- Liyuan Xiao, Carl K. Chang, Hen-I Yang, Kai-Shin Lu, Hsinyi Jiang:

Automated Web Service Composition Using Genetic Programming. 7-12 - Ziyan Xu, Haihong Zhao, Lin Liu:

User's Requirements Driven Services Adaptation and Evolution. 13-19 - Jae-Hyun Cho, Jang-Ho Choi, Han-Gyu Ko, In-Young Ko:

An Adaptive Quality Level Selection Method for Efficient QoS-Aware Service Composition. 20-25 - Yu Zhang, Weidong Liu, Jiaxing Song:

A Novel Solution of Distributed File Storage for Cloud Service. 26-31
Service Marketing and Management
- Xiaodong Huang, Yong Zhang, Chunxiao Xing

:
GARSS: A Generic Annotation and Recommendation Service System for Digital Repositories. 32-37 - Sen Ma, Wen Zhao, Shikun Zhang, Hang Zhang:

Material Hub: A Semantic Search Engine with Rule Reasoning. 38-44 - Maria Salama, Ahmed Shawish, Amir Zeid

, Mohamed Kouta
:
Integrated QoS Utility-Based Model for Cloud Computing Service Provider Selection. 45-50
Service Paradigms in Industry
- Frank Schulz

, Wibke Michalk
, Markus Hedwig, Marcus McCallister, Christof Momm, Simon Caton
, Christian Haas
, Daniel Rolli, Monika Tavas:
Service Level Management for Service Value Networks. 51-56 - Yang Li:

Agent-Based Simulation and Its Applications to Service Management: Invited Talk. 57
MidArch 2012: The Sixth Middleware Architecture in the Internet
- Toru Kobayashi:

Application Architecture to Foster User-Centric Information Discovery and Retrieval. 58-63 - Wataru Oogami, Takaaki Komura, Yasuo Okabe:

Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation. 64-69 - Miguel Macías Enguídanos

, Jaime Pérez Crespo:
Secure Monitoring for Identity Federations and Distributed Systems. 70-75 - Toshiki Watanabe, Shunichi Kinoshita, Junichi Yamato, Hideaki Goto, Hideaki Sone:

Flexible Access Control Framework Considering IdP-Side's Authorization Policy in Roaming Environment. 76-81 - Shunichi Kinoshita, Toshiki Watanabe, Junichi Yamato, Hideaki Goto, Hideaki Sone:

Implementation and Evaluation of an OpenFlow-Based Access Control System for Wireless LAN Roaming. 82-87 - Tomoya Furuichi, Susumu Date

, Hiroaki Yamanaka
, Kohei Ichikawa
, Hirotake Abe, Haruo Takemura
, Eiji Kawai:
A Prototype of Network Failure Avoidance Functionality for SAGE Using OpenFlow. 88-93 - Takeshi Nishimura, Motonori Nakamura, Makoto Otani, Kazutsuna Yamaji, Noboru Sonehara:

Group Management System for Federated Identities with Flow Control of Membership Information by Subjects. 94-99 - Shigeaki Tanimoto, Shinichi Mizuhara, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance. 100-105
METHOD 2012: The First IEEE International Workshop on Methods for Establishing Trust with Open Data
- Tomás Knap, Jan Michelfeit, Martin Necaský

:
Linked Open Data Aggregation: Conflict Resolution and Aggregate Quality. 106-111 - Evanela Lapi, Nikolay Tcholtchev

, Louay Bassbouss
, Florian Marienfeld, Ina Schieferdecker
:
Identification and Utilization of Components for a Linked Open Data Platform. 112-115 - Miquel Oliver

, Manuel Palacin, Albert Domingo
, Víctor Valls:
Sensor Information Fueling Open Data. 116-121 - Erik Mannens

, Sam Coppens, Ruben Verborgh
, Laurence Hauttekeete, Davy Van Deursen, Rik Van de Walle:
Automated Trust Estimation in Developing Open News Stories: Combining Memento & Provenance. 122-127 - Xiaoqiang Chen, Vincent Huang:

Privacy Preserving Data Publishing for Recommender System. 128-133 - Florian Skopik

, Zhendong Ma:
Attack Vectors to Metering Data in Smart Grids under Security Constraints. 134-139 - Jean-François Lalande

, David Rodriguez:
Protecting Resources in an Open and Trusted Peer-to-Peer Network. 140-143
IWSC 2012: The Ninth IEEE International Workshop on Software Cybernetics
- Bahtijar Vogel, Arianit Kurti

, Marcelo Milrad
, Tommi Mikkonen:
Architectural Concepts: Evolution of a Software System across Design and Implementation Stages in Dynamically Changing Environments. 144-151 - Yu Zhou, Xuefeng Yan, Zhiqiu Huang:

A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments. 152-157 - Liangdong Wang, Yang Gao, Chun Cao, Li Wang:

Towards a General Supporting Framework for Self-Adaptive Software Systems. 158-163 - Richang Lin, Bihuan Chen, Yi Xie, Xin Peng, Wenyun Zhao:

Learning-Based Multi-controller Coordination for Self-Optimization. 164-169 - Chang-Ai Sun, Guan Wang, Kai-Yuan Cai, Tsong Yueh Chen

:
Distribution-Aware Mutation Analysis. 170-175 - Jun Lin, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Stephen S. Yau, Dazhi Huang:

A Reputation System for Trustworthy QoS Information in Service-Based Systems. 176-181 - Ling Wu, Guangtai Liang, Qianxiang Wang:

Program Behavior Analysis and Control for Online IDE. 182-187 - Jianchun Xing, Hongda Wang, Wei Song, Qiliang Yang:

Safe Regression Test Selection Based on Program Dependence Graphs. 188-193
CFSE 2012: The Fourth IEEE International Workshop on Computer Forensics in Software Engineering
- Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison

, Abbie Barbir:
Cloud Log Forensics Metadata Analysis. 194-199 - Takashi Sakuma, Ryôichi Sasaki:

Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy Protection. 200-205 - P. Vinod Bhattathiripad:

Software Piracy Forensics: A Proposal for Incorporating Dead Codes and Other Programming Blunders as Important Evidence in AFC Test. 206-212 - Grant Osborne, Benjamin P. Turnbull

, Jill Slay
:
Development of InfoVis Software for Digital Forensics. 213-217
MVDA 2012: The First IEEE International Workshop on Modeling and Verifying Distributed Applications
- Jinho On, Sujeong Woo, Moonkun Lee:

A Graphical Language to Integrate Process Algebra and State Machine Views for Specification and Verification of Distributed Real-Time Systems. 218-223 - Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fraj, Ahlem Ben Younes:

A BPEL4WS Extension to Develop and Execute Grid Service Workflow Application. 224-229 - Mohamed Karim Aroua, Belhassen Zouari:

A Distributed and Coordinated Massive DDOS Attack Detection and Response Approach. 230-235 - Ahlem Ben Younes, Leila Jemni Ben Ayed, Yousra Bendaly Hlaoui:

UML AD Refinement Patterns for Modeling Workflow Applications. 236-241 - Ming-Huang Chen, Yaw-Chung Chen, Wen-Kang Jia:

An Efficient IPTV Distribution Technique under NAT Environment. 242-247 - Thouraya Gouasmi

, Amira Regayeg, Ahmed Hadj Kacem:
Automatic Generation of an Operational CSP-Z Specification from an Abstract Temporal^Z Specification. 248-253 - Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes:

A Semantics-Based Privacy-Aware Approach for Fragmenting Business Processes. 254-259
QUORS 2012: The Sixth IEEE International Workshop on Quality Oriented Reuse of Software
- Wafa Basit, Fakhar Lodhi, Muhammad Usman Bhatti:

Evaluating the Extended Refactoring Guidelines. 260-265 - Tushar Sharma

:
Quantifying Quality of Software Design to Measure the Impact of Refactoring. 266-271 - Wu Ren:

Mining Association Rules to Facilitate Structural Recovery. 272-277 - Moazzam Fareed Niazi, Tiberiu Seceleanu

, Hannu Tenhunen
:
Towards Reuse-Based Development for the On-chip Distributed SoC Architecture. 278-283 - Dilek Tapucu, Seda Kasap, Fatih Tekbacak

:
Performance Comparison of Combined Collaborative Filtering Algorithms for Recommender Systems. 284-289 - Hwai-Jung Hsu, Ming-Wei Tsai, Feng-Jian Wang:

Simplifying the Design of Signature Workflow with Patterns. 290-295 - Mehmet Kaya, James W. Fawcett:

A New Cohesion Metric and Restructuring Technique for Object Oriented Paradigm. 296-301 - Sheau Ling Tan, Lin Liu:

Performance Analysis of Reusable Components with Hybrid Modelling of Strategies and Processes: A Real World Case Study. 302-309 - Junfeng Zhao, Jiantao Zhou, Jing Liu:

Translation Rules and a Supporting Tool for Model-Based Reuse. 310-315 - Tao Sun, Xinming Ye, Hongji Yang, Jing Liu:

Parallel Software Reuse Driven CPN Model Reduction and Analysis Approach. 316-321 - Shou-Yu Lee, Dongyang Tang, Tingchao Chen, William Cheng-Chung Chu:

A QoS Assurance Middleware Model for Enterprise Cloud Computing. 322-327 - Daren Fang, Xiaodong Liu, Imed Romdhani, Huiqun Zhao:

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. 328-333 - Aseel Hmood, Iman Keivanloo, Juergen Rilling:

SE-EQUAM - An Evolvable Quality Metamodel. 334-339
REFS 2012: The Sixth IEEE International Workshop on Requirements Engineering for Services
RE for Services Adaptation and Evolution
- Jolita Ralyté

:
Viewpoints and Issues in Requirements Engineering for Services. 341-346 - Saïd Assar

, Carine Souveyet, Kadan Aljoumaa
:
A Goal-Oriented Perspective on Approaches to Web Service Discovery. 347-352 - Feng-Lin Li, Lin Liu, John Mylopoulos:

Software Service Evolution: A Requirements Perspective. 353-358 - Clotilde Rohleder:

Representing Non-functional Requirements on Services - A Case Study. 359-366
RE for Non-functional Requirements
- Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka

:
Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. 367-372 - Bo Wei, Zhi Jin, Didar Zowghi

, Bin Yin:
Automated Reasoning with Goal Tree Models for Software Quality Requirements. 373-378 - Haruhiko Kaiya, Atsushi Ohnishi:

Improving Software Quality Requirements Specifications Using Spectrum Analysis. 379-384 - Haihua Xie, Carl K. Chang, Ming Hua, Kai-Shin Lu:

The Concepts and Ontology of SiSL: A Situation-Centric Specification Language. 385-391 - Jianchu Huang, Hongji Yang:

A Functional Implementation Approach for Web Services-Based Context-Aware Systems. 392-397
REFS Panel
- Lin Liu:

Requirements Engineering for Service Adaptation and Evolution. 398-402
SAPSE 2012: The Fourth IEEE International Workshop on Security Aspects in Processes and Services Engineering
- Mohamed Karim Aroua, Belhassen Zouari:

Modeling of A-Posteriori Access Control in Business Processes. 403-408 - Hejiao Huang, Qiang Zhou:

Petri-Net-Based Modeling and Resolving of Black Hole Attack in WMN. 409-414 - Mohammad Ali Hadavi, Morteza Noferesti, Rasool Jalili, Ernesto Damiani

:
Database as a Service: Towards a Unified Solution for Security Requirements. 415-420 - Anne Baumgrass, Sigrid Schefer-Wenzl, Mark Strembeck:

Deriving Process-Related RBAC Models from Process Execution Histories. 421-426 - Hejiao Huang, Feng Shang, Jiangtao Zhang:

Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC. 427-432 - Romaric Tchokpon, Ernesto Damiani

, Nadia Bennani:
Robust XML Watermarking Using Fuzzy Queries. 433-438
STA 2012: The Fourth IEEE International Workshop on Software Test Automation
Agile Software Testing
- Robert M. Hierons

:
Model Based Test Automation through Asynchronous Channels. 439 - Eliane F. Collins, Arilo Claudio Dias-Neto, Vicente Ferreira de Lucena Jr.

:
Strategies for Agile Software Testing Automation: An Industrial Experience. 440-445 - Marek Grzegorz Stochel, Mariusz R. Wawrowski, James J. Waskiel:

Adaptive Agile Performance Modeling and Testing. 446-451
Testing Mobile and Open Software
- Afef Jmal Maâlej, Moez Krichen, Mohamed Jmaiel:

Model-Based Conformance Testing of WS-BPEL Compositions. 452-457 - Tamer Abdou

, Peter Grogono, Pankaj Kamthan:
A Conceptual Framework for Open Source Software Test Process. 458-463
Testing Large Systems
- Bo Yang, Ji Wu, Chao Liu:

Mining Data Chain Graph for Fault Localization. 464-469 - Cheng Gong, Zheng Zheng, Wei Li, Peng Hao:

Effects of Class Imbalance in Test Suites: An Empirical Study of Spectrum-Based Fault Localization. 470-475
IEESD 2012: The Fourth IEEE International Workshop on Industrial Experience in Embedded Systems Design / TiP 2012: The First IEEE International Workshop on Tools in Embedded Systems Design Process
- John F. Schommer, Dominik Franke, Tim Lange, Stefan Kowalewski:

Load Balancing for Cross Layer Communication. 476-481 - Paul Stack:

Development of a Mobile Platform to Support Building Maintenance Engineering. 482-487 - Matthias Biehl, Martin Törngren

:
An Estimation Model for the Savings Achievable by Tool Chains. 488-492 - Vasileios Angelopoulos, Trevor Parsons, John Murphy, Patrick O'Sullivan:

GcLite: An Expert Tool for Analyzing Garbage Collection Behavior. 493-502 - Daniel Merschen, Julian Pott, Stefan Kowalewski:

Integration and Analysis of Design Artefacts in Embedded Software Development. 503-508 - Kunming Nie, Li Zhang, Zengtao Geng:

Product Line Variability Modeling Based on Model Difference and Merge. 509-513
CORCS 2012: The Fourth IEEE International Workshop on Component-Based Design of Resource-Constrained Systems
- Lubomír Bulej

, Tomás Bures
, Vojtech Horký
, Jaroslav Keznikl, Petr Tuma
:
Performance Awareness in Component Systems: Vision Paper. 514-519 - Steffen Peter, Peter Langendörfer

:
Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications. 526-531 - Raluca Marinescu, Eduard Paul Enoiu:

Extending EAST-ADL for Modeling and Analysis of System's Resource-Usage. 532-537 - Maria Anjum, David Budgen

:
Modelling the Design for an SOA System to Control a Small Scale Energy Zone. 538-543 - Cengiz Togay, Emre Selman Caniaz, Ali H. Dogru:

Rule Based Axiomatic Design Theory Guidance for Software Development. 544-552
STPSA 2012: The Seventh IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Zhi Wang, Chunfu Jia, Min Liu, Xiaoxu Yu:

Branch Obfuscation Using Code Mobility and Signal. 553-558 - Sun Ding, Hee Beng Kuan Tan, Kaiping Liu, Mahinthan Chandramohan, Hongyu Zhang

:
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation. 559-564 - Weider D. Yu, Kyle Le:

Towards a Secure Software Development Lifecycle with SQUARE+R. 565-570 - Meng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou, Bing Xie:

Internet-Based Evaluation and Prediction of Web Services Trustworthiness. 571-576 - David Hauzar, Jan Kofron

:
On Security Analysis of PHP Web Applications. 577-582 - Nancy R. Mead

:
Measuring the Software Security Requirements Engineering Process. 583-588 - Wei Tian, Jufeng Yang, Jing Xu, Guannan Si:

Attack Model Based Penetration Test for SQL Injection Vulnerability. 589-594 - Maria Chroni, Stavros D. Nikolopoulos:

An Efficient Graph Codec System for Software Watermarking. 595-600
ESAS 2012: The Seventh IEEE International Workshop on Engineering Semantic Agent Systems
- Islam Elgedawy

:
Conditional Ontology Mapping. 601-606 - Katsunori Oyama, Hiroyuki Wakabayashi, Atsushi Takeuchi, Naoki Ishitsuka:

Integration of 3D Trajectory Maps into a Local Distribution Map of Radiation Dose Using Unmanned Aerial Vehicle. 607-612 - Young-Joon Lee, Geon Yong Park, Ho Kuen Song, Hee Yong Youn:

A Load Balancing Scheme for Distributed Simulation Based on Multi-agent System. 613-618 - Sinem Getir, Moharram Challenger

, Sebla Demirkol, Geylani Kardas
:
The Semantics of the Interaction between Agents and Web Services on the Semantic Web. 619-624 - Riza Cenk Erdur

, Oguz Dikenelli
, Oylum Alatli
, Erdem Eser Ekinci, Ziya Akar:
Integrating Linked Data Space with Agents Using the Environment Abstraction. 625-630 - Behnam Rahnama, Atilla Elçi, Shadi Metani:

An Image Processing Approach to Solve Labyrinth Discovery Robotics Problem. 631-636 - Duygu Çelik

, Atilla Elçi, Esra Çalik, Ayman Ahmad Khalil:
Development of Semantic Model and Information Exploration System for TV Media. 637-642

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














