


default search action
37th COMPSAC 2013: Kyoto, Japan
- 37th Annual IEEE Computer Software and Applications Conference, COMPSAC 2013, Kyoto, Japan, July 22-26, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-4986-6

Software Testing I
- Pramila Mouttappa, Stephane Maag, Ana R. Cavalli

:
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. 1-10 - Yang Zhong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura:

ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families. 11-20 - Carlos E. Rubio-Medrano

, Gail-Joon Ahn
, Karsten Sohr
:
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. 21-26 - Weifeng Xu, Tao Ding, Hanlin Wang, Dianxiang Xu:

Mining Test Oracles for Test Inputs Generated from Java Bytecode. 27-32
Internet Architecture and Applications I
- Kazuma Yonemura, Kunitake Kaneko, Fumio Teraoka:

CLINEX: An Inter-node Cross-Layer Cooperation Architecture to Adapt to Dynamically Changing Network Situation. 33-42 - Jingtao Li, Jie Zhang, Zhen Cao, Wengang Pei:

GenRe: A General Replication Scheme over an Abstraction of DHTs. 43-52 - Chao Luo, Hiroyuki Okamura

, Tadashi Dohi
:
Modeling and Analysis of Multi-version Concurrent Control. 53-58 - Ravi Santosh Arvapally, Xiaoqing (Frank) Liu, Donald C. Wunsch II

:
Fuzzy c-Means Clustering Based Polarization Assessment in Intelligent Argumentation System for Collaborative Decision Support. 59-64
Big Data Analytics and Knowledge Management I
- Jianwei Liao, Xiaoyan Liu, Yingshen Chen:

Dynamical Re-striping Data on Storage Servers in Parallel File Systems. 65-73 - Fuyuan Xiao, Masayoshi Aritsugi

:
Nested Pattern Queries Processing Optimization over Multi-dimensional Event Streams. 74-83 - Xiaoyong Li, Yijie Wang, Xiaoling Li, Yuan Wang, Rubing Huang

:
Parallelizing Probabilistic Streaming Skyline Operator in Cloud Computing Environments. 84-89
Mobile and Pervasive Computing
- Yasutaka Nishimura, Kiyohito Yoshihara:

A Device Specification Method Using Doppler Effect of Acoustic Waves. 90-99 - Kazuya Matsuo, Keisuke Goto, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Agent Redeployment and Missing Data Regathering in Mobile Wireless Sensor Networks. 100-109 - Md. Osman Gani, Casey O'Brien, Sheikh Iqbal Ahamed, Roger O. Smith:

RSSI Based Indoor Localization for Smartphone Using Fixed and Mobile Wireless Node. 110-117 - Chenjie Wei, Heesung Lee, Luke Molnar, Michael Herold, Rajiv Ramnath, Jay Ramanathan:

Assisted Human-in-the-Loop Adaptation of Web Pages for Mobile Devices. 118-123
Network Middleware, Cloud Architectures, and Computing
- Xiaodong Zhang, Ying Zhang, Xing Chen, Kai Liu, Gang Huang, Jianfeng Zhan:

A Relationship-Based VM Placement Framework of Cloud Environment. 124-133 - Samuel A. Ajila

, Akindele A. Bankole:
Cloud Client Prediction Models Using Machine Learning Techniques. 134-142 - Oscar Maurício Caicedo Rendón

, Felipe Estrada Solano
, Lisandro Zambenedetti Granville
:
A Mashup-Based Approach for Virtual SDN Management. 143-152
Posters I
- Chao-Lin Kuo, Lung-Chuan Huang, Shun-Jih Wang, Jui-Sheng Lin, Cheng-Chi Wang

, Jun-Juh Yan
:
Image Encryption Based on Fuzzy Synchronization of Chaos Systems. 153-154 - Taro Takaguchi, Nobuo Sato, Kazuo Yano, Naoki Masuda

:
Inferring Directed Static Networks of Influence from Undirected Temporal Networks. 155-156 - Hsin-Chieh Chen, Yi-You Hou, Meei-Ling Hung, Zhang-Lin Wan:

Speed Control for Permanent Magnet Synchronous Motor System via Quasi-sliding Mode Control. 157-158 - Jian-Liung Chen, Chia-Hung Lin, Bo-Wun Gu, Ming-Jyi Jang:

Maximum Power Tracking Controller for a Wind-Driven Permanent-Magnet Synchronous Generator: Using an Approach of Chaos Synchronization. 159-160 - Whei-Min Lin, Chia-Sheng Tu, Chia-Hung Lin:

Support Vector Machine-Based Fuzzy Inference Systems for Service Restoration Strategy in Micro-distribution Systems. 161-162 - Jyun-Jie Wang, Hong-Da Chen, Ting-Ya Yang, Houshou Chen

, Chi-Yuan Lin:
Data Hiding Technique by Ternary Hamming Codes. 163-164 - Kenichi Takagiwa, Shinichi Ishida, Hiroaki Nishi

:
SoR-Based Programmable Network for Future Software-Defined Network. 165-166 - Takeshi Kitahara, Yasuhiko Hiehata, Hideyuki Koto, Norihiro Fukumoto, Hajime Nakamura, Shigehiro Ano:

Autonomous Data Transmission Using Off-Peak Hours for Cellular-Based M2M Communications. 167-168
Software Testing II
- Dan Hao

, Xu Zhao, Lu Zhang:
Adaptive Test-Case Prioritization Guided by Output Inspection. 169-179 - Yi-Sian You, Chin-Yu Huang, Kuan-Li Peng, Chao-Jung Hsu:

Evaluation and Analysis of Spectrum-Based Fault Localization with Modified Similarity Coefficients for Software Debugging. 180-189 - Bo Jiang, W. K. Chan

:
Bypassing Code Coverage Approximation Limitations via Effective Input-Based Randomized Test Case Prioritization. 190-199
Internet Architecture and Applications II
- Che-Cheng Chang, Jichiang Tsai:

Solving the Distributed Trigger Counting Problem without Any Global Assumption. 200-207 - Tomoki Watanabe, Rika Mochizuki, Toru Kobayashi, Masao Isshiki

:
HACCS: Home Appliance Control Concierge System: Extending Functions on Web Service. 208-213 - Mikio Aoyama, Kazuo Yabuta, Tsutomu Kamimura, Souichi Inomata, Toshiya Chiba, Takashi Niwa, Koji Sakata:

PROMIS: A Management Platform for Software Supply Networks Based on the Linked Data and OSLC. 214-219 - Hiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe:

Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network. 220-225
Big Data Analytics and Knowledge Management II
- Aki-Hiro Sato

:
Recursive Segmentation Procedure Based on the Akaike Information Criterion Test. 226-233 - Alfredo Cuzzocrea

, Elisa Bertino:
Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework. 234-239 - Jin Wang, Yong Zhang, Yang Gao, Chunxiao Xing

:
pLSM: A Highly Efficient LSM-Tree Index Supporting Real-Time Big Data Analysis. 240-245
Reliability Modeling and Model-Based Evaluation
- Daisuke Kuwa, Tadashi Dohi

:
Generalized Logit Regression-Based Software Reliability Modeling with Metrics Data. 246-255 - Lei Liu, Jing Xu, Minglei Li, Jufeng Yang:

A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach. 256-261 - Shaukat Ali

, Tao Yue:
A Rigorous and Comprehensive Analysis of Effort for Modeling Aspect State Machines: Results from a Series of Controlled Experiments. 262-267 - Shinji Inoue, Shiho Hayashida, Shigeru Yamada:

Toward Practical Software Reliability Assessment with Change-Point Based on Hazard Rate Models. 268-273
Posters II
- Chia-Hung Lin, Chun-Chao Wang, Jian-Liung Chen, Yi-Pin Kuo, Wei-Ling Chen, Che-Wei Chang:

Interaction Physical-Activity Housekeeper for Silver-Haired Citizen Using Wireless Sensor and Mobile Healthcare iPhone. 274-275 - Tung-Sheng Zhan, Whei-Min Lin, Ming-Huang Tsai, Guo-Shiang Wang:

Design and Implementation of the Dual-Axis Solar Tracking System. 276-277 - Shi-Jaw Chen, Chia-Hung Lin:

Integrating SVM Classifier and Distribution State Estimation for Detection and Identification of AMI Customer's Meter Data. 278-279 - Tuan-Fang Fan, Churn-Jung Liau:

Logical Analysis of Weighted Social Networks - An Extended Abstract. 280-281 - Yu-Min Wang, Yi-Shun Wang, Ching-Hsuan Yeh, Min-Quan Xie:

The Relationships among Presentation Mode, Product Type, Consumers' Product Knowledge, and Consumers' Purchase Intention in the E-Commerce Environment. 282-283 - Jae Won Moon, Tae-Beom Lim, Kyung Won Kim, Seung-woo Kum, Myunghyun Yoon, Kwangsu Cho:

A Framework for Dynamic Context-Awarable User Interfaces of the Second Screen Devices in a Home Network Environment. 284-285 - Chi-Lok Tsang, Yiu-Wing Leung:

Automatic Redemption of Free Parking in Shopping Malls. 286-287 - Norihiro Fukumoto, Shigehiro Ano, Shigeki Goto:

A Practical Behavior Analysis of Video Application Users on Smart Phones. 288-289 - Maria Salama, Ahmed Shawish:

Junosphere: Towards Professional Networks Education. 290-291
Software Life Cycle, Evolution, and Management
- Jaewon Oh, Woo Hyun Ahn, Seungho Jeong, Jinsoo Lim, Taegong Kim:

Automated Transformation of Template-Based Web Applications into Single-Page Applications. 292-302 - Tegawendé F. Bissyandé, Ferdian Thung, David Lo

, Lingxiao Jiang
, Laurent Réveillère:
Popularity, Interoperability, and Impact of Programming Languages in 100, 000 Open Source Projects. 303-312 - Venkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert:

Optimization of Object Queries on Collections Using Annotations for the String Valued Attributes. 313-318
Internet Architecture and Applications III
- Chris Strasburg, Samik Basu, Johnny S. Wong:

S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems. 319-328 - Wanderson Paim de Jesus, Juliano Araújo Wickboldt

, Lisandro Zambenedetti Granville
:
ProViNet - An Open Platform for Programmable Virtual Network Management. 329-338 - Takafumi Fukunaga:

A Portable Method for Improving Available Bandwidth of PC Cluster. 339-348
Security, Trust, and Privacy
- Horng-Tzer Wang, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee:

Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison. 349-358 - Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang:

Efficient General Policy Decision by Using Mutable Variable Aware Cache. 359-368 - Gerry Howser, Bruce M. McMillin

:
A Multiple Security Domain Model of a Drive-by-Wire System. 369-374 - Birhanu Eshete

, Adolfo Villafiorita
, Komminist Weldemariam, Mohammad Zulkernine:
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages. 375-380
Semantic Web and Web Services
- Abderahman Rashwan, Olga Ormandjieva, René Witte:

Ontology-Based Classification of Non-functional Requirements in Software Specifications: A New Corpus and SVM-Based Classifier. 381-386 - Lili Mou, Ge Li, Zhi Jin:

Domain Hyponymy Hierarchy Discovery by Iterative Web Searching and Inferable Semantics Based Concept Selecting. 387-392 - Iman Keivanloo, Juergen Rilling:

Semantic-Enabled Clone Detection. 393-398 - Jang-Ho Choi, Jae-Hyun Cho, Han-Gyu Ko, In-Young Ko:

Distributed Coordination of IoT-Based Services by Using a Graph Coloring Algorithm. 399-404
Requirements Engineering
- Bahar Sateli, Elian Angius, René Witte:

The ReqWiki Approach for Collaborative Software Requirements Engineering with Integrated Text Analysis Support. 405-414 - Bin Yin, Zhi Jin, Wei Zhang, Haiyan Zhao, Bo Wei:

Finding Optimal Solution for Satisficing Non-functional Requirements via 0-1 Programming. 415-424 - Dang Viet Dzung, Atsushi Ohnishi:

Evaluation of Ontology-Based Checking of Software Requirements Specification. 425-430 - Xiaohong Chen, Ronghua Ye, Haiying Sun, Hong Lu:

Deriving Requirements Specification with Time: A Software Environment Ontology Based Approach. 431-436 - Sajjad Mahmood

, Samuel A. Ajila
:
Software Requirements Elicitation - A Controlled Experiment to Measure the Impact of a Native Natural Language. 437-442
Doctoral Symposium
- Atsushi Morikawa, Hiroshi Yamamoto, Katsuyuki Yamazaki:

Timing Synchronization of ZigBee Sensor Network for Ecology Observation. 443-446 - Phuong Tran Thi Ha, Hiroshi Yamamoto, Katsuyuki Yamazaki:

Using Autonomous Air Vehicle in DTN Sensor Network for Environmental Observation. 447-450 - Ryoji Aoki, Hiroshi Yamamoto, Kei-ichi Iguchi, Katsuyuki Yamazaki:

Realtime Guidance System in Hospital Using PHS and Android Device. 451-454 - Naoya Hongo, Hiroshi Yamamoto, Katsuyuki Yamazaki:

Browser Synchronization System for Supporting Elderly People and IT Shortfalls. 455-458 - Tatsuya Takahashi, Hiroshi Yamamoto, Norihiro Fukumoto, Shigehiro Ano, Katsuyuki Yamazaki:

Congestion Detection in Mobile Network towards Complex Event Processing. 459-462 - Laurent Issertial, Hiroshi Tsuji:

Data Management and User Interface for a Call for Paper Manager. 463-466 - Othman M. M. Othman, Koji Okamura:

Enhancing Control Model to Ease Off Centralized Control of Flow-Based SDNs. 467-470 - H. R. O. E. Dayaratna, Kunitake Kaneko, Fumio Teraoka:

Multiple Home Agent Placement Considerations Based on Internet Service Provider Perspective in MobileIPv6. 471-474 - Yasuhiro Watashiba, Seiichiro Hirabara, Susumu Date

, Hirotake Abe, Kohei Ichikawa
, Yoshiyuki Kido, Shinji Shimojo
, Haruo Takemura
:
OpenFlow Network Visualization Software with Flow Control Interface. 475-477
Plenary Panel: Software Assurance
- Mohammad Zulkernine:

Software Assurance: What Should We Do Next? 478
Plenary Panel: Big Data
- Elisa Bertino:

Big Data - Opportunities and Challenges Panel Position Paper. 479-480 - Alfredo Cuzzocrea

:
Analytics over Big Data: Exploring the Convergence of DataWarehousing, OLAP and Data-Intensive Cloud Infrastructures. 481-483
Software Testing III
- Rudolf Ramler, Klaus Wolfmaier, Theodorich Kopetzky

:
A Replicated Study on Random Test Case Generation and Manual Unit Testing: How Many Bugs Do Professional Developers Find? 484-491 - Beng Heng Ng, Atul Prakash

:
Expose: Discovering Potential Binary Code Re-use. 492-501 - Rubing Huang

, Jinfu Chen, Tao Zhang
, Rongcun Wang, Yansheng Lu:
Prioritizing Variable-Strength Covering Array. 502-511
Formal Methods I
- Rui Wang, Yong Guan, Liming Luo, Xiaoyu Song, Jie Zhang:

Formal Modelling of PLC Systems by BIP Components. 512-518 - Daniela Carneiro da Cruz, Pedro Rangel Henriques

, Jorge Sousa Pinto
:
Interactive Verification of Safety-Critical Software. 519-528 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:

Modeling and Optimizing Resource Scheduling for Service Composition Based on Queuing Petri Nets. 529-538
Real-Time and Embedded Systems
- Yu Zhang, Fei Xie, Yunwei Dong, Xingshe Zhou, Chunyan Ma:

Cyber/Physical Co-verification for Developing Reliable Cyber-physical Systems. 539-548 - Yu Jiang, Hehua Zhang, Xiaoyu Song, William N. N. Hung, Ming Gu, Jiaguang Sun:

Verification and Implementation of the Protocol Standard in Train Control System. 549-558 - Shuichi Oikawa, Satoshi Miki:

File-Based Memory Management for Non-volatile Main Memory. 559-568
Software Architecture and Design I
- Min Zhou, Hai Wan, Chen Su, Liangze Yin, Lianyi Zhang, Fei He, Ming Gu:

Component-Based Modeling and Code Synthesis for Cyclic Programs. 569-578 - Dongjin Yu, Yanyan Zhang, Jianlin Ge, Wei Wu:

From Sub-patterns to Patterns: An Approach to the Detection of Structural Design Pattern Instances by Subgraph Mining and Merging. 579-588 - Tadashi Murakami, Toshiyuki Amagasa

, Hiroyuki Kitagawa
:
DBPowder: A Flexible Object-Relational Mapping Framework Based on a Conceptual Model. 589-598
Fast Abstracts I
- Kimiko Uchida, Yoshihiko Oya, Takashi Okuda:

Conversation Characteristics during Pair Work in Computer Literacy Education. 599-600 - Xu Li, Linpeng Huang:

Evaluation of Software Architectures Reliability Based on Hypergraph Grammar. 601-602 - Toshiyuki Shimizu, Tomo Sueki, Masatoshi Yoshikawa:

Supporting Keyword Selection in Generating Earth Science Metadata. 603-604 - Jinfu Chen, Qing Li, Huanhuan Wang, Rubing Huang

:
Describing Component Behavior Using Improved Chemical Abstract Machine. 605-606 - Ryo Yanase, Tatsunori Sakai, Makoto Sakai, Satoshi Yamane:

Development of Model Checker of Dynamic Linear Hybrid Automata. 607-608
Software Testing IV
- Chunyan Ma, Tian Tan, Yibo Chen, Yunwei Dong:

An If-While-If Model-Based Performance Evaluation of Ranking Metrics for Spectra-Based Fault Localization. 609-618 - Mahdi Eslamimehr, Jens Palsberg:

Testing versus Static Analysis of Maximum Stack Size. 619-626 - Junpeng Lv, Bei-Bei Yin, Kai-Yuan Cai:

On the Gain of Measuring Test Case Prioritization. 627-632 - Rong Chen, Yaqing Liu, Zhichun Jia, Jian Gao:

Isolating and Understanding Program Errors Using Probabilistic Dispute Model. 633-638
Formal Methods II
- Zheng Lu, Christopher Steinmuller, Supratik Mukhopadhyay:

Towards Formal Verification of a Commercial Wireless Router Firmware. 639-647 - Kazuhiro Ogata, Min Zhang

:
A Divide and Conquer Approach to Model Checking of Liveness Properties. 648-657 - Nelson Souto Rosa

:
Formalising Middleware Systems: A Design Pattern-Based Approach. 658-667
HCI and Usability
- Jingtao Li, Chao Zhong, Zhen Cao, Wengang Pei, Xi Zhou:

Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSs. 668-677 - Laura Housley, Thomas Lynch, Rajiv Ramnath, Peter F. Rogers, Jayashree Ramanathan:

Implementation Considerations in Enabling Visually Impaired Musicians to Read Sheet Music Using a Tablet. 678-683 - Pedro F. Campos

, Fernando Miguel Campos, João Pestana:
Delineato: A Diagramming User Interface Designed Using a "What You Get is What You Need" Approach. 684-689 - Ivor D. Addo, Sheikh Iqbal Ahamed, William C. Chu:

Toward Collective Intelligence for Fighting Obesity. 690-695
Software Architecture and Design II
- Vasily Y. Kharitonov

:
A Software Architecture for High-Level Development of Component-Based Distributed Virtual Reality Systems. 696-705 - Shan Tang, Qiang Liu:

Supporting Integration of COTS Components from a Perspective of Self-Adaptive Software Architecture. 706-713
Industry Papers I
- Masaki Fujikawa, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda:

The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics Technology. 714-715 - Oral Gurel, Mehmet Ulas Cakir:

Promising XMPP Based Applications for Military and Defense Systems. 716-717 - Shih-Fang Chang:

A Market-in-Market Collaborative Model towards Application Marketplaces. 718-719 - Hirohisa Aman, Manami Sasaki, Kei Kureishi, Hideto Ogasawara:

Application of the 0-1 Programming Model for Cost-Effective Regression Test. 720-721
Fast Abstracts II
- Tomohiko Takagi, Zengo Furukawa, Yoshinobu Machida:

Test Strategies Using Operational Profiles Based on Decision Tables. 722-723 - Junbeom Yoo, Sanghyun Yoon:

SQAF-DS: A Software Quality Assessment Framework for Dependable Systems. 724-725 - Takafumi Tanaka, Kazuki Mori, Hiroaki Hashiura

, Atsuo Hazeyama, Seiichi Komiya:
Support System for Software Development Exercise that Utilizes Activity Data Collected in Real Time from the Development Environment. 726-727 - Guan-Zhong Wu, Chen-Che Huang, Yui-Chey Teng, Jiun-Long Huang, Wei-Chih Ting, Yi-Yu Su, Pin-Chuan Liu:

On Simplifying Mobile Mashup Application Development. 728-729 - Makoto Kato, Saeko Matsuura:

A Dynamic Countermeasure Method to Android Malware by User Approval. 730-731
M2M Networking and Internet of Things
- Marcelo Antonio Marotta

, Felipe Jose Carbone, José Jair Cardoso de Santanna, Liane Margarida Rockenbach Tarouco
:
Through the Internet of Things - A Management by Delegation Smart Object Aware System (MbDSAS). 732-741 - Attaphongse Taparugssanagorn

, Siwaruk Siwamogsatham, Carlos A. Pomalaza-Raez
:
A Hexagonal Coverage LED-ID Indoor Positioning Based on TDOA with Extended Kalman Filter. 742-747 - Tseng-Yi Chen

, Hsin-Wen Wei, Nien-I Hsu, Wei-Kuan Shih:
A IoT Application of Safe Building in IPv6 Network Environment. 748-753 - Minbo Li, Zhu Zhu, Guangyu Chen:

A Scalable and High-efficiency Discovery Service Using a New Storage. 754-759
Applications
- Ashish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball

, Maciej J. Zawodniok
, Bruce M. McMillin
, Sriram Chellappan:
Stability of a Cyber-physical Smart Grid System Using Cooperating Invariants. 760-769 - Yasha Wang, Jiangtao Wang

, Xiaoyu Zhang:
QTime: A Queuing-Time Notification System Based on Participatory Sensing Data. 770-777 - Takafumi Yoshida:

A Perspective on Computer-Based Training, CBT. 778-783 - Kenji Taguchi, Hideaki Nishihara, Toshiaki Aoki

, Fumihiro Kumeno, Koji Hayamizu, Koichi Shinozaki:
Building a Body of Knowledge on Model Checking for Software Development. 784-789
Software Architecture and Design III
- Mikko Raatikainen

, Marko Komssi, Vittorio dal Bianco, Klas Kindström, Janne Järvinen
:
Industrial Experiences of Organizing a Hackathon to Assess a Device-centric Cloud Ecosystem. 790-799 - Chen Li

, Linpeng Huang, Luxi Chen, Chengyuan Yu:
Breeze/ADL: Graph Grammar Support for an XML-Based Software Architecture Description Language. 800-805 - Abdulaziz Alkhalid, Chung-Horng Lung, Duo Liu, Samuel Ajila

:
Software Architecture Decomposition Using Clustering Techniques. 806-811 - Ke Li, Junchao Xiao, Yongji Wang, Qing Wang:

Analysis of the Key Factors for Software Quality in Crowdsourcing Development: An Empirical Study on TopCoder.com. 812-817
Industry Papers II
- Kazumine Ogura, Hirofumi Ueda, Norihito Fujita:

A Scalable DTN Routing Protocol for an Infra-less Communication System. 818-819 - Rudolf Ramler, Werner Putschögl:

A Retrospection on Building a Custom Tool for Automated System Testing. 820-821 - Shunichi Kinoshita, Toshiki Watanabe, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:

Fault-Tolerant Wireless LAN Roaming System Using Client Certificates. 822-823 - Fan Zhang, Jinwu Wang, Xiaoqing (Frank) Liu, Buqing Cao, Mingdong Tang:

CASAT-HOOMT: Computer Aided Software Analysis Tool Based on High Order Object-Oriented Modeling Technique. 824-825
Fast Abstracts III
- Kien Nguyen

, Quang Tran Minh, Shigeki Yamada:
Towards Optimal Disaster Recovery in Backbone Networks. 826-827 - Yuhua Qi, Xiaoguang Mao

, Yan Lei, Ziying Dai, Yudong Qi, Chengsong Wang:
Empirical Effectiveness Evaluation of Spectra-Based Fault Localization on Automated Program Repair. 828-829 - Jiyi Li, Qiang Ma

, Yasuhito Asano, Masatoshi Yoshikawa:
Potential Semantics in Multi-modal Relevance Feedback Information for Image Retrieval. 830-831 - Atsushi Noro, Saeko Matsuura:

UML based Security Function Policy Verification Method for Requirements Specification. 832-833 - Sayaka Izukura, Kazuo Yanoo, Hiroshi Sakaki, Masato Kawatsu:

Determining Appropriate IT Systems Design Based on System Models. 834-835

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














