


default search action
38th COMPSAC Workshops 2014: Vasteras, Sweden
- IEEE 38th Annual Computer Software and Applications Conference, COMPSAC Workshops 2014, Vasteras, Sweden, July 21-25, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3578-9

IWSC 2014: 11th IEEE International Workshop on Software Cybernetics
Joint Workshop Session and Keynote Address
- Erol Gelenbe:

Adaptive Management of Energy Packets. 1-6
Adaptation and Evolution Techniques for Software Quality
- Giedre Sabaliauskaite

, Aditya P. Mathur:
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems. 7-12 - Giedre Sabaliauskaite

, Aditya P. Mathur:
Countermeasures to Enhance Cyber-physical System Security and Safety. 13-18 - Hongji Yang, Lu Zhang:

Controlling and Being Creative: Software Cybernetics and Creative Computing. 19-24
Monitoring and Control for Software Systems and Testing
- Tomoyuki Mochizuki, Akitoshi Shimura, Takayuki Takezawa:

A Study on Migration Technique Using Program Slicing for Large-Scale Information and Control Systems. 25-30 - Lei Zhang, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai, Stephen S. Yau, Jia Yu

:
A History-Based Dynamic Random Software Testing. 31-36 - Zijiang Yang, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai, Stephen S. Yau, Jia Yu

:
Dynamic Random Testing with Parameter Adjustment. 37-42
ADMNET 2014: Second IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
Deployment and Management of Networks and Applications Theory
- Wlodzimierz Ogryczak

:
Fair Optimization - Methodological Foundations of Fairness in Network Resource Allocation. 43-48 - Mario Köppen, Kei Ohnishi, Masato Tsuru:

Maxmin Fairness under Priority for Network Resource Allocation Tasks. 49-54 - Hiroshi Yamamoto, Chie Hidano, Shigehiro Ano, Katsuyuki Yamazaki:

Modeling of Dynamic Trend of Latency Variations on Mobile Network Using Markov Regime Switching. 55-60
Network
- Masaki Fukushima, Yoshiaki Yoshida, Atsushi Tagami, Shu Yamamoto, Akihiro Nakao:

Toy Block Networking: Easily Deploying Diverse Network Functions in Programmable Networks. 61-66 - Ruediger Gad, Martin Kappes, Inmaculada Medina-Bulo

:
Bridging the Gap between Low-Level Network Traffic Data Acquisition and Higher-Level Frameworks. 67-72 - Tohru Kondo, Reiji Aibara, Kazufumi Suga, Kaori Maeda:

A Mobility Management System for the Global Live Migration of Virtual Machine across Multiple Sites. 73-77 - Toshihiro Ohigashi

, Kouji Nishimura
, Reiji Aibara, Kouta Yoshida:
Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services. 78-83 - Robayet Nasim, Andreas J. Kassler:

Deploying OpenStack: Virtual Infrastructure or Dedicated Hardware. 84-89 - Takashi Yamanoue

, Yuuri Koarata, Kentaro Oda, Koichi Shimozono:
A Technique to Assign an Appropriate Server to a Client, for a CDN Consists of Servers at the Global Internet and Hierarchical Private Networks. 90-95 - Takashi Yamanoue

, Izumi Fuse, Shigeto Okabe, Atsushi Nakamura, Michio Nakanishi, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Ikuya Murata, Tetsutaro Uehara
, Tsuneo Yamada, Hiroshi Ueda
:
Computer Ethics Video Clips for University Students in Japan from 2003 until 2013. 96-101
STPSA 2014: Ninth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
Security and Analysis
- Zeineb Zhioua, Stuart Short, Yves Roudier:

Static Code Analysis for Software Security Verification: Problems and Approaches. 102-109 - Mathias Uslar, Christine Rosinger, Stefanie Schlegel:

Security by Design for the Smart Grid: Combining the SGAM and NISTIR 7628. 110-115 - He Sun, Lin Liu, Letong Feng, Yuan Xiang Gu:

Introducing Code Assets of a New White-Box Security Modeling Language. 116-121 - Weider D. Yu, Lavanya Davuluri, Monica Radhakrishnan, Maryam Runiassy:

A Security Oriented Design (SOD) Framework for eHealth Systems. 122-127
Cyber Security, Detection, and Modeling
- Liyuan Xiao, Yetian Chen, Carl K. Chang:

Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection. 128-133 - George Rush, Daniel R. Tauritz

, Alexander D. Kent:
DCAFE: A Distributed Cyber Security Automation Framework for Experiments. 134-139 - Li Feng, Bruce M. McMillin

:
Quantification of Information Flow in a Smart Grid. 140-145
Access Control, Privacy, and Process
- Francesco Buccafurri

, Gianluca Lax
, Serena Nicolazzo
, Antonino Nocera
:
A Privacy-Preserving Solution for Tracking People in Critical Environments. 146-151 - Sumiko Miyata, Kazuhiro Suzuki, Tetsuya Morizumi, Hirotsugu Kinoshita:

Access Control Model for the My Number National Identification Program in Japan. 152-157 - Hidenobu Watanabe, Tsukasa Iwama, Ken T. Murata, Shigenori Ushiyama, Yasushi Muto:

Improvement of the Integrity Verification Application Using Timestamp Mechanism for Distributed File System. 158-163 - Juan M. Gutiérrez Cárdenas:

Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. 164-168
MidArch 2014: Eighth IEEE International Workshop on Middleware Architecture in the Internet
- Hao Liu, Hideaki Goto:

Certificate-Based, Disruption-Tolerant Authentication System with Automatic CA Certificate Distribution for Eduroam. 169-173 - Tomo Niizuma, Hideaki Goto:

Centralized Online Sign-Up and Client Certificate Issuing System for Eduroam. 174-179 - Masaki Shimaoka, Noboru Sonehara:

Modeling the Cost Structure of Identity Proofing. 180-185 - Ikuo Nakagawa, Masahiro Hiji

, Hiroshi Esaki:
Dripcast - Server-less Java Programming Framework for Billions of IoT Devices. 186-191 - Nikolay Tcholtchev

, Benjamin Dittwald
, Thomas Scheel, Begüm Ilke Zilci, Danilo Schmidt, Philipp Lammel
, Jurma Jacobsen, Ina Schieferdecker
:
The Concept of a Mobility Data Cloud: Design, Implementation and Trials. 192-198 - Michiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii:

Big Data in Memory: Benchmarking in Memory Database Using the Distributed Key-Value Store for Constructing a Large Scale Information Infrastructure. 199-204
WRMOCC 2014: First IEEE International Workshop on Risk Management of OSS Components and Communities
- Oscar Franco-Bedoya, Dolors Costal

, Soraya Hidalgo, Ron Ben-Jacob:
Expert Mining for Evaluating Risk Indicators Scenarios. 205-210 - Nikolas Galanis, María José Casany Guerrero, Marc Alier Forment

, Enric Mayol:
Building a Community: The Moodbile Perspective. 211-216 - Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, Aneesh Krishna

:
Risk Measure Propagation through Organisational Network. 217-222
SocNet 2014: First IEEE International Workshop on Social Networks, Smart Communities, and Smart Devices
- Yu Zhang, Jiangtao Wen, Fan Mo:

The Application of Internet of Things in Social Network. 223-228 - Ying Guo, Xi Chen:

Cross-Domain Scientific Collaborations Prediction with Citation Information. 229-233 - Nima Dokoohaki

, Mihhail Matskin, Usman Afzal, Md. Mustakimul Islam:
An Enterprise Social Recommendation System for Connecting Swedish Professionals. 234-239 - Jiaxing Shang, Lianchen Liu, Feng Xie, Cheng Wu:

How Overlapping Community Structure Affects Epidemic Spreading in Complex Networks. 240-245
UCDAS 2014: First IEEE International Workshop on User Centered Design and Adaptive Systems
- Reyes Juárez-Ramírez, Carlos Huertas, Sergio Inzunza:

Automated Generation of User-Interface Prototypes Based on Controlled Natural Language Description. 246-251 - Stefano Ferretti

, Silvia Mirri
, Catia Prandi
, Paola Salomoni:
Exploiting Reinforcement Learning to Profile Users and Personalize Web Pages. 252-257 - Eugene Yujun Fu

, Hong Va Leong
, Grace Ngai
, Michael Xuelin Huang, Stephen C. F. Chan
:
Physiological Mouse: Towards an Emotion-Aware Mouse. 258-263 - Andrés Mejía-Figueroa, Reyes Juárez-Ramírez:

Towards a User Model for the Design of Adaptive Interfaces for Autistic Users. 264-269 - Misako Goto, Toru Shirato, Ryuya Uda:

Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Sounds. 270-275 - Nozomi Takeuchi, Shuhei Kobata, Ryuya Uda:

Improvement of Personal Identification by Flick Input with Acceleration Sensor. 276-281 - Drew Williams

, Sheikh Iqbal Ahamed, William C. Chu:
Designing Interpersonal Communication Software for the Abilities of Elderly Users. 282-287
BIoT 2014: First IEEE International Workshop on Big Data Management for the Internet of Things
- Fredrik Nordlund, Manabu Higashida, Yuuichi Teranishi, Shinji Shimojo

, Masanori Yokoyama, Michio Shimomura:
Designing of a Network-Aware Cloud Robotic Sensor Observation Framework. 288-294 - Sulayman K. Sowe, Takashi Kimata, Mianxiong Dong

, Koji Zettsu:
Managing Heterogeneous Sensor Data on a Big Data Platform: IoT Services for Data-Intensive Science. 295-300 - Ikuo Nakagawa, Masahiro Hiji

, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo
:
m-cloud - Distributed Statistical Computation Using Multiple Cloud Computers. 301-305 - Hideya Ochiai, Hiroyuki Ikegami, Yuuichi Teranishi, Hiroshi Esaki:

Facility Information Management on HBase: Large-Scale Storage for Time-Series Data. 306-311 - Marco Mesiti, Stefano Valtolina:

Towards a User-Friendly Loading System for the Analysis of Big Data in the Internet of Things. 312-317 - Yutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Nobuhiko Matsuura, Yuusuke Kawakita

, Haruhisa Ichikawa:
Load-Adaptive Indexing Method for Schema-less Searches. 318-324
CFSE 2014: Sixth IEEE International Workshop on Computer Forensics in Software Engineering
- Masayuki Tsubouchi, Tomotaka Maeda, Yasuo Okabe:

Digital Fingerprinting on Executable File for Tracking Illegal Uproaders. 325-330 - Johan Garcia:

An Evaluation of Side-Information Assisted Forensic Hash Matching. 331-336 - Jasenko Hosic, Daniel R. Tauritz

, Samuel A. Mulder
:
Evolving Decision Trees for the Categorization of Software. 337-342 - Naoki Kobayashi, Ryôichi Sasaki:

Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of Evidence. 343-347
ESAS 2014: Ninth IEEE International Workshop on Engineering Semantic Agents-Semantics, Agents and Intelligence
- Duygu Çelik

, Atilla Elçi, Ridvan Akcicek, Bora Gokce, Pelin Hurcan:
A Safety Food Consumption Mobile System through Semantic Web Technology. 348-353 - Duygu Çelik

, Atilla Elçi, Ridvan Akcicek, Bora Gokce, Pelin Hurcan:
Mobile Pediatric Consultation and Monitoring System through Semantic Web Technology. 354-359 - Abdulelah Abdallah Algosaibi, Austin C. Melton:

Using the Semantics Inherent in Sitemaps to Learn Ontologies. 360-365
CORCS-IEESD 2014: Fifth IEEE International Workshop on Component-Based Design of Resource Constrained Systems
- Sergey Zverlov, Sebastian Voss:

Synthesis of Pareto Efficient Technical Architectures for Multi-core Systems. 366-371 - Mikhail Afanasov, Luca Mottola

, Carlo Ghezzi:
Towards Context-Oriented Self-Adaptation in Resource-Constrained Cyberphysical Systems. 372-377 - Zdravko Krpic

, Ivica Crnkovic
, Jan Carlson
:
Towards a Common Software-to-Hardware Allocation Framework for the Heterogeneous High Performance Computing. 378-383 - Daniel Hallmans, Marcus Jägemar, Stig Larsson, Thomas Nolte:

Identifying Evolution Problems for Large Long Term Industrial Evolution Systems. 384-389 - Franz Felix Füßl, Jirka Ciemala:

Variable Factors of Influence in Product Line Development. 390-395
SAPSE 2014: Sixth IEEE International Workshop on Security Aspects in Processes and Services Engineering
- Ernesto Damiani

, Valerio Coviello, Fulvio Frati, Claudio Santacesaria:
The Problem of Handling Multiple Headers in WS-Security Implementations. 396-400 - Giampaolo Bella

, Paul Curzon
, Rosario Giustolisi
, Gabriele Lenzini
:
A Socio-technical Methodology for the Security and Privacy Analysis of Services. 401-406 - Samane Abdi:

I Was Confused: Robust Accountability for Permission Delegation in Cloud Federations. 407-412 - Samane Abdi:

Integration of Heterogeneous Policies for Trust Management. 413-419
SSERV 2014: First IEEE International Workshop on Social Services
- Vivien Lespagnol, Juliette Rouchier:

What Is the Impact of Heterogeneous Knowledge about Fundamentals on Market Liquidity and Efficiency: An ABM Approach. 420-425 - Takashi Ikoma, Masakazu Takahashi, Kazuhiko Tsuda:

A Study on Filtering of the Effect Range with the Package Insert of the Medicine. 426-431 - Iris Lorscheid:

Learning Agents for Human Complex Systems. 432-437 - Msury Mahunnah, Alex Norta

, Lixin Ma, Kuldar Taveter:
Heuristics for Designing and Evaluating Socio-technical Agent-Oriented Behaviour Models with Coloured Petri Nets. 438-443 - Hiroshi Takahashi

:
Analyzing the Role of Noise Trader in Financial Markets through Agent-Based Modelling. 444-449 - Takashi Yoshida, Setsuya Kurahashi

:
Emergence of Fashion Cycle by Agent-Based Model of WoM Dissemination. 450-455 - Souhir Masmoudi:

Chartists and Fundamentalists in an Agent Based Herding Model. 456-461 - Takashi Yamada, Nobuyuki Hanaki

:
Heterogeneity in Lowest Unique Integer Game. 462-467
QUORS 2014: Eighth IEEE International Workshop on Quality Oriented Reuse of Software
Software Evolution
- Xin Zhang:

A Multi-dimensional Component Importance Analysis Mechanism for Component Based Systems. 468-473 - Chih-Hung Chang

, Chih-Wei Lu, Wen Pin Yang, William Cheng-Chung Chu, Chao-Tung Yang
, Ching-Tsorng Tsai, Pao-Ann Hsiung
:
A SysML Based Requirement Modeling Automatic Transformation Approach. 474-479 - Feng-Jian Wang, Parameswaramma Mandalapu:

Analyzing Artifact Anomalies in a Temporal Structural Workflow for SBS. 480-485
Software Reuse
- Hossam Hakeem, Hui Guan, Hongji Yang:

A Framework of Patterns Applicability in Software Development. 486-491 - Hui Guan, Hongji Yang, Hossam Hakeem:

Reverse Engineering Web Applications for Security Mechanism Enhancement. 492-497 - Julia F. Varnell-Sarjeant, Anneliese Amschler Andrews, Andreas Stefik:

Comparing Reuse Strategies: An Empirical Evaluation of Developer Views. 498-503 - Barbara Gallina, Shaghayegh Kashiyarandi, Helmut Martin, Robert Bramberger:

Modeling a Safety- and Automotive-Oriented Process Line to Enable Reuse and Flexible Process Derivation. 504-509
Cloud and Service Computing
- Steven Thomas Graham, Xiaodong Liu:

Critical Evaluation on jClouds and Cloudify Abstract APIs against EC2, Azure and HP-Cloud. 510-515 - Amine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

Institution Theory for Services Oriented Applications. 516-521
Model-Driven Quality and Testing
- Benjamin Behringer, Martina Lehser, Steffen Rothkugel:

Towards Feature-Oriented Fault Tree Analysis. 522-527 - Nikolay Tcholtchev

, Grit Dudeck, Michael Wagner, Christian Hein, Arun Prakash, Tom Ritter:
Integrating the Modelica DSL into a Platform for Model-Based Tool Interoperability. 528-534 - Shinobu Saito

, Jun Hagiwara, Tomoki Yagasaki, Katsuyuki Natsukawa:
Requirements Model Oriented System Generation Tool and Its Practical Evaluation. 535-540 - Sumei Zhang, Hua Li, Yu Xue, Xianrong Wang:

Using TTCN-3 to Test SPDY Protocol Interaction Property. 541-546
CDS 2014: Second IEEE International Workshop on Consumer Devices and Systems
- Shigeo Kaneda, Shohei Asada, Akira Yamamoto, Yuta Kawachi, Yusuke Tabata:

A Hazard Detection Method for Bicycles by Using Probe Bicycle. 547-551 - Kimie Suzuki, Kaori Fujinami:

An Ironing Support System with Superimposed Information for Beginners. 552-557 - Naofumi Yoshida, Naoki Ishibashi

, Norihiro Ishikawa
:
A Hybrid Device Profile Detection Method and Its Applications. 558-560 - Takatomo Yamabe, Ryozo Kiyohara:

A Study of On-Vehicle Information Devices Using a Smartphone. 561-566 - Sunghoon Lee, Sanghee Lee, Sumi Lim, Jiyoung Jung, Sangho Choi, Neunghoe Kim, Jung-Been Lee:

An API Design Process in Terms of Usability: A Case Study on Building More Usable APIs for Smart TV Platform. 567-571 - Chenyi Liao, Katsuhiko Kaji, Kei Hiroi, Nobuo Kawaguchi

:
Design and Implementation of Event Information Summarization System. 572-577 - Jack Kelly, William J. Knottenbelt:

Metadata for Energy Disaggregation. 578-583 - Hidenobu Ito, Kazuaki Nimura:

Customizable Web-Based System to Federate Smart Devices and Peripherals. 584-589 - Naoyuki Morimoto, Yuu Fujita, Masaaki Yoshida, Hiroyuki Yoshimizu, Masafumi Takiyamada, Terukazu Akehi, Masami Tanaka:

A Power Allocation Management System Using an Algorithm for the Knapsack Problem. 590-595 - Georg Hackenberg, Maximilian Irlbeck, Vasileios Koutsoumpas, Denis Bytschkow:

A Rapid Prototyping Approach for Smart Energy Systems Based on Partial System Models. 596-601
WASCOM 2014: First IEEE International Workshop on Adaptive Systems for Communication Networks
- Wael Zouaoui, Carolina Albea-Sanchez

, Yann Labit:
Dynamic Adaptive Management of Buffer for QoS Guarantees and Energy Reduction. 602-607 - Sheau-Ru Tong, Huan-Wen Chen, Cheng-Han Yang:

Profile-Based Scalable Video Adaptation Employing MD-FEC Interleaving over Loss-Burst Channels. 608-613 - Hiroki Kashiwazaki, Yoshiaki Takai:

An Evaluation of Adaptive Traffic Engineering for Delivering High Bandwidth Movie on Overlay Routing Network. 614-619 - Romain Laborde

, Bashar Kabbani, François Barrère, Abdelmalek Benzekri:
An Adaptive XACMLv3 Policy Enforcement Point. 620-625
STA 2014: Sixth IEEE International Workshop on Software Test Automation
Instrumentation, Automation, and Applications
- Alexandre Locci Martins, Simone Hanazumi, Ana Cristina Vieira de Melo:

Testing Java Exceptions: An Instrumentation Technique. 626-631 - Dianxiang Xu, Weifeng Xu, Manghui Tu:

Automated Generation of Integration Test Sequences from Logical Contracts. 632-637 - Inbal Yahav, Ron S. Kenett

, Xiaoying Bai:
Risk Based Testing of Open Source Software (OSS). 638-643
Model-Based Testing - Improving and Extending
- Junzan Zhou, Bo Zhou, Shanping Li:

Automated Model-Based Performance Testing for PaaS Cloud Services. 644-649 - Robert Setiadi, Man Fai Lau:

A Structured Model of Consistency Rules in After-State Database Testing. 650-655 - Ceren Sahin Gebizli, Hasan Sözer:

Improving Models for Model-Based Testing Based on Exploratory Testing. 656-661
SSS 2014 and MediComp 2014: Seventh IEEE International Workshop on Service Science and Systems and First IEEE International Workshop on Medical Computing
- Xianxiang Chen, Xinyu Hu, Ren Ren, Bing Zhou, Xiao Tan, Jiabai Xie, Zhen Fang, Yangmin Qian, Huaiyong Li, Lili Tian, Shanhong Xia:

Noninvasive Ambulatory Monitoring of the Electric and Mechanical Function of Heart with a Multifunction Wearable Sensor. 662-667 - Chen Shi, Hui-Ting Liu, Pan Hui, Ji-Jiang Yang, Jianqiang Li, Qing Wang:

Current Electronic Medical Record in China. 668-672 - Fangmin Sun, Zhen Fang, Zhan Zhao, Lidong Du

, Zhihong Xu, Diliang Chen, Yangmin Qian, H. Y. Hui, Lili Tian:
A ZigBee Based Multi-hop Health Monitoring System: Design and Performance Evaluation. 673-677 - Ben-Da Gu, Ji-Jiang Yang, Jianqiang Li, Qing Wang, Yu Niu:

Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in China. 678-683 - Patrizia Scandurra

, Steven Capelli:
A Practical and Automated Approach for Engineering Service-Oriented Applications with Design Patterns. 684-689 - Ali Yadavar Nikravesh, Samuel A. Ajila

, Chung-Horng Lung:
Measuring Prediction Sensitivity of a Cloud Auto-scaling System. 690-695 - Mostafa Erfani, Juergen Rilling, Iman Keivanloo:

Towards an Ontology-Based Context-Aware Meta-model for the Software Domain. 696-701 - Bingchuan Yuan, John Herbert:

Accountability in a Context-Aware Smarthome Healthcare Reasoning System. 702-707
MVDA 2014: Third IEEE International Workshop on Modeling and Verifying of Distributed Applications
- Raja Boujbel, Sam Rottenberg, Sébastien Leriche, Chantal Taconet, Jean-Paul Arcangeli, Claire Lecocq:

MuScADeL: A Deployment DSL Based on a Multiscale Characterization Framework. 708-715 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:

A Load Distribution Method Based on Distributed Hashing for P2P Sensor Data Stream Delivery System. 716-721 - Moonkun Lee, Jungrhan Choi:

A Calculus for Transportation Systems. 722-727 - Amine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

Towards an Institutional Representation for the B Model Oriented Specification. 728-733 - Tae-Seob Yoon, Joong-Hyun Choi, Eun-Sun Cho

, Sumi Helal
:
A Formal Modeling for Exceptions in Context-Aware Systems. 734-739 - Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

A Meta-model Transformation from UML Activity Diagrams to Event-B Models. 740-745

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














