


default search action
42nd COMPSAC 2018: Tokyo, Japan - Volume 2
- Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2. IEEE Computer Society 2018
SCA: Smart Computing & Applications
- William Cheng-Chung Chu, Chih-Hung Chang:
Message from the SCA 2018 Workshop Organizers. 1 - Eugene Voloshin, Valeri Chipulis, Roman Kuznetsov:
Smart Applications in Heat and Power Systems. 2-7 - Mohammad Rosyidi
, Ratih H. Puspita, Shigeru Kashihara, Doudou Fall, Kazushi Ikeda:
A Design of IoT-Based Searching System for Displaying Victim's Presence Area. 8-13 - Woei-Kae Chen, Chien-Hung Liu, Bo-Hong Li:
A Feature Envy Detection Method Based on Dataflow Analysis. 14-19 - Hwai-Jung Hsu, Yves Lin:
How Agile Impacts a Software Corporation: An Empirical Study. 20-25 - Thitiporn Neammanee, Saranya Maneeroj:
Time-Aware Recommendation Based on User Preference Driven. 26-31 - Nayeon Bak, Byeong-Mo Chang, Kwanghoon Choi:
Smart Block: A Visual Programming Environment for SmartThings. 32-37 - Yongjia Yu
, Vasu Jindal, Farokh B. Bastani, Fang Li
, I-Ling Yen:
Improving the Smartness of Cloud Management via Machine Learning Based Workload Prediction. 38-44 - Lu Zhang, Hongji Yang, Chi Zhang, Nao Li:
A New Way of Being Smart? Creative Computing and Its Applications in Tourism. 45-50 - Hongji Yang, Lin Zou
, Qinyun Liu, Sicong Ma:
A Wisdom Search Engine. 51-56 - I-Cheng Lin, Yi-Shu Lu, Wen-Yueh Shih, Jiun-Long Huang:
Successive POI Recommendation with Category Transition and Temporal Influence. 57-62 - Hanas Subakti, Jehn-Ruey Jiang:
Indoor Augmented Reality Using Deep Learning for Industry 4.0 Smart Factories. 63-68 - Chien-Hung Liu, Woei-Kae Chen, Shu-Hang Ho:
NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling Android Applications. 69-74 - Shin-Jie Lee, Yu-Xian Chen, Shang-Pin Ma, Wen-Tin Lee:
Test Command Auto-Wait Mechanisms for Record and Playback-Style Web Application Testing. 75-80 - Shang-Pin Ma, Chen-Yuan Fan, Yen Chuang, Wen-Tin Lee, Shin-Jie Lee, Nien-Lin Hsueh:
Using Service Dependency Graph to Analyze and Test Microservices. 81-86 - Sheng-Cang Chou, Chao-Tung Yang
, Fuu-Cheng Jiang, Chih-Hung Chang:
The Implementation of a Data-Accessing Platform Built from Big Data Warehouse of Electric Loads. 87-92 - Jia-Yow Weng, Chao-Tung Yang
, Chih-Hung Chang:
The Integration of Shared Storages with the CephFS and Rados Gateway for Big Data Accessing. 93-98 - Chorng-Shiuh Koong, Hsin-Ying Tsai, Yi-Yang Hsu, Yeh-Cheng Chen:
The Learning Effectiveness Analysis of JAVA Programming with Automatic Grading System. 99-104
AIML: Advances in AI and Machine Learning
- San Murugesan
, Takahira Yamaguchi:
Message from the AMIL 2018 Workshop Organizers. 105 - Xiali Li
, Songting Deng, Song Wang, Zhengyu Lv, Licheng Wu:
Review of Small Data Learning Methods. 106-109 - Petar Mrazovic, Josep Lluís Larriba-Pey, Mihhail Matskin:
A Deep Learning Approach for Estimating Inventory Rebalancing Demand in Bicycle Sharing Systems. 110-115 - Victor Parque
, Tomoyuki Miyashita
:
On Learning Fuel Consumption Prediction in Vehicle Clusters. 116-121 - Qinyun Liu, Lin Zou
, Hua Zhou, Hongji Yang:
An Approach to Proposing New Business Models Basing on Association Rule Learning, BP Neural Network and Creative Computing. 122-125 - Wen-Chung Shih
:
Mining Sequential Patterns to Explore Users' Learning Behavior in a Visual Programming App. 126-129 - Michael Benedict L. Virtucio, Jeffrey A. Aborot, John Kevin C. Abonita, Roxanne S. Aviñante, Rother Jay B. Copino, Michelle P. Neverida, Vanesa O. Osiana, Elmer C. Peramo
, Joanna G. Syjuco, Glenn Brian A. Tan:
Predicting Decisions of the Philippine Supreme Court Using Natural Language Processing and Machine Learning. 130-135 - Yunlan Wang, Bin Zhang, Tianhai Zhao, Zhengxiong Hou, Xiangyu Wu, Hussain Khanzada Muzammil:
Prediction Method of Blasting Vibration by Optimized GEP Based on Spark. 136-140 - Sravyasri Garapati, Kamalakar Karlapalem:
Empirical Evaluation of Idle-Time Analysis Driven Improved Decision Making by Always-On Agents. 141-146 - Takeshi Morita
, Naho Kashiwagi, Ayanori Yorozu
, Michael Walch, Hideo Suzuki, Dimitris Karagiannis, Takahira Yamaguchi:
Practice of Multi-robot Teahouse Based on PRINTEPS and Evaluation of Service Quality. 147-152 - Shun Moriya, Chihiro Shibata:
Transfer Learning Method for Very Deep CNN for Text Classification and Methods for its Evaluation. 153-158 - Kristoffer Jon Albers
, Mikkel N. Schmidt
, Morten Mørup
, Marisciel Litong-Palima, Rasmus Bonnevie, Fumiko Kano Glückstad
:
Understanding Mindsets Across Markets, Internationally: A Public-Private Innovation Project for Developing a Tourist Data Analytic Platform. 159-164 - Akemi Gálvez
, Andrés Iglesias
:
Modified Memetic Self-Adaptive Firefly Algorithm for 2D Fractal Image Reconstruction. 165-170 - Ryohei Orihara, Ryota Narasaki, Yuma Yoshinaga, Yasuhiro Morioka, Yoshiyuki Kokojima:
Approximation of Time-Consuming Simulation Based on Generative Adversarial Network. 171-176 - Alice Nicolaï, Julien Audiffren
:
Model-Space Regularization and Fully Interpretable Algorithms for Postural Control Quantification. 177-182 - Yuuya Fukumoto, Daiki Shimizu, Chihiro Shibata:
Generation of Character Illustrations from Stick Figures Using a Modification of Generative Adversarial Network. 183-186 - Xiaolong Xu, Yongping Li, Mark Liptrott, Nik Bessis
:
NDFMF: An Author Name Disambiguation Algorithm Based on the Fusion of Multiple Features. 187-190
ADMNET: Architecture, Design, Deployment & Management of Networks & Applications
- Takashi Yamanoue, Hiroki Kashiwazaki, Yong Jin, Ruediger Gad:
Message from the ADMNET 2018 Workshop Organizers. 191-192 - Tohru Kondo, Keita Isawaki, Kaori Maeda:
Development and Evaluation of the MEC Platform Supporting the Edge Instance Mobility. 193-198 - Alfredo Cuzzocrea, Enzo Mumolo, Marwan Hassani
, Giorgio Mario Grasso
:
Towards Effective Generation of Synthetic Memory References Via Markovian Models. 199-203 - Masami Fukuyama, Nariyoshi Yamai, Satoshi Ohzahata, Naoya Kitagawa:
Throughput Improvement of MPTCP by Selective Bicasting with Cross-Layer Control in Wireless Environment. 204-209 - Yuichi Taguchi, Tsutomu Yoshinaga:
System Resource Management to Control the Risk of Data-Loss in a Cloud-Based Disaster Recovery. 210-215 - Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen:
A Load-Balanced Approach to Time Efficient Resource Scheduling in SDN-Enabled Data Center. 216-221 - Nobukuni Hamamoto, Shigetoshi Yokoyama, Hiroshi Ueda
:
On the Confirmation Method of the User's Record of the GakuNinMoodle. 222-227 - Ryosuke Matsumoto, Kenji Rikitake, Kentaro Kuribayashi:
Large-Scale Certificate Management on Multi-Tenant Web Servers. 228-233 - Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura
, Seiji Munetoh
, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. 234-239
CDS: Consumer Devices & Systems
- Ryozo Kiyohara, Yasuo Okabe, Atsushi Tagami:
Message from the CDS 2018 Workshop Organizers. 240 - Takahiro Fujiwara, Toshihiko Tanaka, Kai Takashima, Shigeo Kaneda:
Community Energy Management System To Encourage Power Saving Competition. 241-246 - Tetsuji Yamaguchi, Akira Yamada, Takeshi Fujiwara, Ryoichi Takahashi, Tetsuya Shimada, Yuki Ishida, Koichiro Ueda, Shigeo Kaneda:
Development of Bicycle Simulator with Tilt Angle Control Tilt Angle. 247-252 - Thamer Horbylon Nascimento
, Fabrízzio Alphonsus A. M. N. Soares
, Hugo Alexandre Dantas do Nascimento
, Rogério Lopes Salvini, Mateus Machado Luna, Cristhiane Gonçalves
, Eduardo Faria de Souza
:
Interaction with Platform Games Using Smartwatches and Continuous Gesture Recognition: A Case Study. 253-258 - Tadanobu Tsunoda, Kazuaki Nimura:
Information Harvesting Method by an Energy Harvesting Device with Multiple Microcontrollers. 259-265 - Fanjuan Shi, Chirine Ghedira Guégan
:
Adapted Decision Support Service Based on the Prediction of Offline Consumers' Real-Time Intention and Devices Interactions. 266-271 - Mateus Machado Luna, Fabrízzio Alphonsus Alves de Melo Nunes Soares
, Hugo Alexandre Dantas do Nascimento
, Joyce Siqueira
, Eduardo Faria de Souza
, Thamer Horbylon Nascimento
, Ronaldo Martins da Costa:
Text Entry on Smartwatches: A Systematic Review of Literature. 272-277 - Wilfred Chinedu Okonkwo
, Magda Huisman
:
The Use of System Development Methodologies in the Development of Mobile Applications: Are they Worthy of Use? 278-283 - Chen-Yeou Yu, Richard O. Oyeleke, Carl K. Chang:
Situation Based Energy Management Framework on Mobile Devices. 284-289 - Dong Chen, Hao Wang:
Application on Intersection Classification Algorithm Based on Clustering Analysis. 290-297 - Wen-Jung Chu, Hong-Ren Chen:
Using Interactive E-Books in Elementary School Origami Activities: Analysis of Learning Effect, Learning Motivation, and Cognitive Load. 298-303 - Wichian Premchaiswadi, Parham Porouhan
, Nucharee Premchaiswadi:
Process Modeling, Behavior Analytics and Group Performance Assessment of e-Learning Logs Via Fuzzy Miner Algorithm. 304-309 - Rosa Cabedo Gallén, Edmundo Tovar, Sergio Martín, Martín Llamas
, Manuel Caeiro, Oscar Martínez Bonastre, Rebecca Strachan, Manuel Castro, Sorel Reisman:
Who are Interested in Open Education? An Analysis of the Participants in the First MOOC of the IEEE Education Society. 310-314
ESAS: E-Health Systems & Web Technologies
- Atilla Elçi, Duygu Çelik Ertugrul
:
Message from the ESAS 2018 Workshop Organizers. 315-316 - Richard O. Oyeleke, Chen-Yeou Yu, Carl K. Chang:
Situ-Centric Reinforcement Learning for Recommendation of Tasks in Activities of Daily Living In Smart Homes. 317-322 - Navadon Khunlertgit
:
Development of a Performance Visualization Model of Basic Life Support Training with Feedback Devices for Mobile Application. 323-328 - Özgü Taçyildiz, Duygu Çelik Ertugrul
, Yiltan Bitirim, Nese Akcan, Atilla Elçi:
Ontology-Based Obesity Tracking System for Children and Adolescents. 329-334 - Chiara Braghin, Stelvio Cimato
, Alessio Della Libera:
Are mHealth Apps Secure? A Case Study. 335-340 - Emre Oner Tartan, Cebrail Çiflikli:
An Android Application for Geolocation Based Health Monitoring, Consultancy and Alarm System. 341-344 - Amin Y. Noaman, Nabeela Al-Abdullah
, Arwa A. Jamjoom
, Abdul Hamid M. Ragab, Farrukh Nadeem, Anser G. Ali:
Knowledge Based e-Health Surveillance System for Predicting Hospital Acquired Infections. 345-351
ESAS: E-Health Systems & Web Technologies
- Ryôichi Sasaki, Tetsutaro Uehara
, Jigang Liu:
Message from the CFSE 2018 Workshop Organizers. 352 - Chen-Kuang Hsieh, Ching-Chun Chiu, Po-Chyi Su:
Video Forensics for Detecting Shot Manipulation Using the Information of Deblocking Filtering. 353-358 - Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita:
Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain. 359-364 - Songpon Teerakanok
, Tetsutaro Uehara
:
Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research. 365-369 - Abdulrahman Alatawi, Weifeng Xu, Jie Yan:
The Expansion of Source Code Abbreviations Using a Language Model. 370-375 - Huiwen Wang, Huibiao Zhu, Lili Xiao, Wanling Xie, Gang Lu:
Modeling and Verifying OpenFlow Scheduled Bundle Mechanism Using CSP. 376-381 - Zhen Yue, Zichen Li, Peifei Song, Shumei Zhang, Yixian Yang:
A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification. 382-387 - Hongcan Gao, Yanfeng Wu, Sihan Xu, Chenkai Guo, Xiaolei Hou, Jing Xu:
TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare. 388-393 - Mei-Ling Chiang
, Shu-Wei Tu, Wei-Lun Su, Chen-Wei Lin:
Enhancing Inter-Node Process Migration for Load Balancing on Linux-Based NUMA Multicore Systems. 394-399
ESAS: E-Health Systems & Web Technologies
- Ji-Jiang Yang, Sheikh Iqbal Ahamed, Jianqiang Li:
Message from the MediComp 2018 Workshop Organizers. 400-401 - Zhongkai Tong, Xianxiang Chen, Zhengling He, Kai Tong, Zhen Fang, Xianlong Wang:
Emotion Recognition Based on Photoplethysmogram and Electroencephalogram. 402-407 - Bo Liu, Kelu Yao, Mengmeng Huang, Jiahui Zhang, Yong Li, Rong Li:
Gastric Pathology Image Recognition Based on Deep Residual Networks. 408-412 - Jianqiang Li, Qidong Hu, Azhar Imran
, Li Zhang, Ji-Jiang Yang, Qing Wang:
Vessel Recognition of Retinal Fundus Images Based on Fully Convolutional Network. 413-418
STA: Software Test Automation
- Shu Wang, Shishi Ma, Min Chen, Mingyue Wei, Guangjun Yu:
A Childhood Disease Database Based on Word Segmentation Technology: Research and Practice. 419-423 - Joel Martin, David Levine:
Property-Based Testing of Browser Rendering Engines with a Consensus Oracle. 424-429 - Xiaohui Sun, Sihan Xu, Chenkai Guo, Jing Xu, Naipeng Dong
, Xiujuan Ji, Sen Zhang:
A Projection-Based Approach for Memory Leak Detection. 430-435 - Ju Qian, Fusheng Lin, Changjian Li, Zhiyi Zhang, Zhe Chen:
Generating Realistic Logically Unreasonable Faulty Data for Fault Injection. 436-441 - Yaqing Fan, Xinya Cao, Jing Xu, Sihan Xu, Hongji Yang:
High-Frequency Keywords to Predict Defects for Android Applications. 442-447 - Chadarat Phipathananunth, Panuchart Bunyakiati:
Synthetic Runtime Monitoring of Microservices Software Architecture. 448-453 - Yijie Ren, Bei-Bei Yin, Bin Wang:
Test Case Prioritization for GUI Regression Testing Based on Centrality Measures. 454-459
STPSA: Security, Trust, and Privacy for Software Applications
- Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the STPSA 2018 Workshop Organizers. 460-461 - Pushkar Ogale, Michael Shin, Sasanka Abeysinghe:
Identifying Security Spots for Data Integrity. 462-467 - Saad El Jaouhari, Ahmed Bouabdallah:
A Privacy Safeguard Framework for a WebRTC/WoT-Based Healthcare Architecture. 468-473 - Maryam Farhadi, Hisham Haddad, Hossain Shahriar
:
Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications. 474-479 - Nidhiben Solanki, Yongtao Huang, I-Ling Yen, Farokh B. Bastani, Yuqun Zhang:
Resource and Role Hierarchy Based Access Control for Resourceful Systems. 480-486 - Kento Kono, Sanouphab Phomkeona, Koji Okamura:
An Unknown Malware Detection Using Execution Registry Access. 487-491 - Ratinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova:
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps. 492-497 - Md. Golam Moula Mehedi Hasan, Amarjit Datta, Mohammad Ashiqur Rahman
, Hossain Shahriar
:
Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. 498-503 - George Yee:
Removing Software Vulnerabilities During Design. 504-509 - Mohammad Ashrafuzzaman
, Hasan Jamil
, Yacine Chakhchoukh, Frederick T. Sheldon:
A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids. 510-515
BIOT: Big Data Management for the Internet of Things
- Hideya Ochiai, Kurt Geihs
, Susumu Takeuchi:
Message from the BIOT 2018 Workshop Organizers. 516 - Mohamad Yuzrie Khalid, Patrick Hang Hui Then, Valliappan Raman
:
Exploratory Study for Data Visualization in Internet of Things. 517-521 - Salman Taherizadeh, Blaz Novak, Marija Komatar, Marko Grobelnik:
Real-Time Data-Intensive Telematics Functionalities at the Extreme Edge of the Network: Experience with the PrEstoCloud Project. 522-527 - Shinji Shimojo
, Ikuo Nakagawa:
Secure IoT Agent Platform with m-Cloud Distributed Statistical Computation Mechanism. 528-533 - Taylor S. Cox, Calvin S. H. Hoi, Carson K. Leung
, Caden R. Marofke:
An Accurate Model for Hurricane Trajectory Prediction. 534-539 - Jingyu Sun, Masato Kamiya, Susumu Takeuchi:
Introducing Hierarchical Clustering with Real Time Stream Reasoning into Semantic-Enabled IoT. 540-545 - Ruixun Zhang, Zhaozheng Yuan, Xiuli Shao:
A New Combined CNN-RNN Model for Sector Stock Price Analysis. 546-551 - Andrea Fornaia, Emiliano Tramontana:
Assisting Replace Method with Method Object: Selecting Fields and Preserving Data Access. 552-557
SDIM: Secure Digital Identity Management
- Bian Yang, Julien Bringer, Hideaki Goto:
Message from the SDIM 2018 Workshop Organizers. 558 - Toyokazu Akiyama, Morito Matsuoka, Kazuhiro Matsuda, Yumi Sakemi, Hisashi Kojima:
Secure and Long-Lived Wireless Sensor Network for Data Center Monitoring. 559-564 - Øyvind Anders Arntzen Toftegaard, Bian Yang:
Towards an Operable Evaluation System for Evidence of Identity. 565-570 - Khayrul Bashar
, M. Manzur Murshed
:
Texture Based Vein Biometrics for Human Identification: A Comparative Study. 571-576 - Ryosuke Abe
, Hiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura, Atsushi Nakadaira:
Storage Protocol for Securing Blockchain Transparency. 577-581 - Makoto Takemiya, Bohdan Vanieiev:
Sora Identity: Secure, Digital Identity on the Blockchain. 582-587
EACIS: Emotion & Affective Computing Interfaces & Systems
- Midori Sugaya, Yoshito Tobe:
Message from the EACIS 2018 Workshop Organizers. 588 - Midori Sugaya, Issei Watanabe, Reiji Yoshida, Feng Chen:
Human Emotional State Analysis During Driving Simulation Experiment Using Bio-Emotion Estimation Method. 589-594 - Nahoko Takada, Shinji Nakagawa:
Differences of Passenger Unease Emotional Areas, An Experimental Case Study. 595-600 - Midori Sugaya, Takuya Hiramatsu, Reiji Yoshida, Feng Chen:
Preliminary Reaction Analysis of Audience with Bio-Emotion Estimation Method. 601-605 - Guillaume Lopez
, Hiroko Tobase, Naoya Isoyama:
Influence of Hedonic State Visualization on Self and Surroundings. 606-610 - Midori Sugaya, Yuki Nishida, Reiji Yoshida, Yuya Takahashi:
An Experiment of Human Feeling for Hospitality Robot Measured with Biological Information. 611-615
INFOFLOW: Flow Oriented Approaches in Internet of Things and CyberPhysical Systems
- Kenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai:
Access Control Model for IoT Environment Including Automated Configuration. 616-621 - Jose Paolo Talusan
, Yugo Nakamura
, Teruhiro Mizumoto, Keiichi Yasumoto
:
Near Cloud: Low-cost Low-Power Cloud Implementation for Rural Area Connectivity and Data Processing. 622-627 - Zennosuke Aiko, Keisuke Nakashima, Tomoki Yoshihisa, Takahiro Hara:
A Social Sensor Visualization System for a Platform to Generate and Share Social Sensor Data. 628-633 - Yoji Yamato, Tatsuya Demizu, Hirofumi Noguchi, Misao Kataoka:
Proposal of Automatic GPU Offloading Technology on Open IoT Environment. 634-639 - Satomi Kura, Hirozumi Yamaguchi, Yoh Shiraishi:
Low-cost Pedestrian Counter Using Wi-Fi APs for Smart Building Applications. 640-645 - Hung-Yu Chien:
Dynamic Public Key Certificates for IoT and WSN Scenarios. 646-651
NETSAP: Network Technologies for Security, Administration & Protection
- Masaki Hashimoto
, Yoshiaki Hori, Yutaka Miyake:
Message from the NETSAP 2018 Workshop Organizers. 652 - Yi-Ren Yeh, Ming-Kung Sun, C.-Y. Huang:
A Malware Beacon of Botnet by Local Periodic Communication Behavior. 653-657 - Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe:
Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet. 658-663 - Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. 664-669 - Marat Zhanikeev
:
Towards a Packet Traffic Genome Project as a Method for Realtime Sub-Flow Traffic Analysis. 670-675 - Wanjiao Shi, Yufeng Wang, Qun Jin, Jianhua Ma:
PDL: An Efficient Prediction-Based False Data Injection Attack Detection and Location in Smart Grid. 676-681 - Jinpeng Jiang, Hongyan Mao, Rumeng Shao, Yuanmin Xu:
Formal Verification and Improvement of the PKMv3 Protocol Using CSP. 682-687
SAPSE: Security Aspects in Processes and Services Engineering
- Stelvio Cimato
:
Message from the SAPSE 2018 Workshop Organizers. 688 - Stefan Covaci, Matteo Repetto
, Fulvio Risso:
A New Paradigm to Address Threats for Virtualized Services. 689-694 - Moitrayee Chatterjee
, Akbar Siami Namin:
Detecting Web Spams Using Evidence Theory. 695-700 - Faiza Loukil
, Chirine Ghedira Guégan
, Khouloud Boukadi
, Aïcha-Nabila Benharkat:
LIoPY: A Legal Compliant Ontology to Preserve Privacy for the Internet of Things. 701-706 - Takashi Hatashima
, Keita Nagai, Asami Kishi, Hikaru Uekusa, Shigeaki Tanimoto, Atsushi Kanai, Hitoshi Fuji, Kazuhiko Ohkubo:
Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime. 707-712 - Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori
, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. 713-718 - Itzel Vázquez Sandoval, Gabriele Lenzini:
Experience Report: How to Extract Security Protocols' Specifications from C Libraries. 719-724
BIG DATA WORKSHOP
- Huiqun Yu, Cunbin Deng, Guisheng Fan, Liqiong Chen, Huaiying Sun:
An Efficient Approach to Forecasting Monthly Calls for Repair from Gas Consumers. 725-730 - Peili Yang, Hui Zhao, Xuezhen Yin, Jian Ye, Lingfeng Yang, Jimin Liang:
A Cooperated Data Management Platform for Coronary Heart Disease Early Identification and Risk Warning Research. 731-736
QUORS: Quality Oriented Reuse of Software
- Xiaodong Liu, Hongji Yang:
Message from the QUORS 2018 Workshop Organizers. 737 - Belmondo Rodrigues Aragão Junior, Rossana Maria de Castro Andrade
, Marcio Espíndola Freire Maia, Tales Paiva Nogueira:
SUCCEEd: Support Mechanism for Creating and Executing Workflows for Decoupled SAS in IoT. 738-743 - Oluwaseun Bamgboye
, Xiaodong Liu, Peter Cruickshank
:
Towards Modelling and Reasoning About Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces. 744-749 - Sicong Ma, Hongji Yang, Meiyu Shi:
Utilising Abstration Techniques and Gaming Theory for Developing Intangible Cultural Heritage. 750-755 - Huihui Liu, Xufang Gong, Li Liao, Bixin Li:
Evaluate How Cyclomatic Complexity Changes in the Context of Software Evolution. 756-761
IWFIT: Future Internet Technologies
- Hiroyuki Ohsaki, Yasuo Okabe, Koji Okamura:
Message from the IWFIT 2018 Workshop Organizers. 762 - Tomoharu Endo, Atsuko Yokotani, Satoshi Ohzahata, Ryo Yamamoto
, Toshihiko Kato:
An Adaptive Bandwidth Reservation Method for a Content-Centric Network. 763-768 - Tsubasa Munemitsu, Daisuke Kotani, Yasuo Okabe:
A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes. 769-776 - Danilo Reis de Vasconcelos, Valdenir Severino, José Neuman de Souza, Rossana M. C. Andrade
, Márcio Maia:
Bio-Inspired Model for Data Distribution in Fog and Mist Computing. 777-782 - Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
A Probabilistic Interest Packet Aggregation for Content-Centric Networking. 783-788
SIS-SS: Smart IoT Sensors and Social Systems for eHealth & Well Being Applications
- Luca Vollero, Salvatore D'Antonio:
Message from the SIS-SS 2018 Workshop Organizers. 789 - Shama Siddiqui
, Anwar Ahmed Khan
, Sayeed Ghani:
A Comparison Study on Dynamic Duty Cycle and Dynamic Channel Polling Approaches for Wireless Sensor Networks. 790-793 - Ka-Ho Lam, Chi-Chung Cheung, Wah-Ching Lee:
New RSSI-Based LoRa Localization Algorithms for Very Noisy Outdoor Environment. 794-799 - Ermanno Cordelli, Giorgio Pennazza, Marco Sabatini, Marco Santonico
, Luca Vollero:
A Smart Sensor Architecture for eHealth Applications. 800-804
IEESD: Industrial Experience in Embedded Design
- Detlef Streitferdt, Tiberiu Seceleanu
, Philipp Nenninger:
Message from the IEESD 2018 Workshop Organizers. 805 - Michael Kirchhoff, Jörn Weisensee, Detlef Streitferdt, Wolfgang Fengler, Elena Rozova:
Increasing Efficiency in Data Flow Oriented Model Driven Software Development for Softcore Processors. 806-811 - Philipp Nenninger
, Nils Bieler:
State Estimation Using Neural Networks in Industrial Processes. 812-817 - Nasser Mustafa, Yvan Labiche, Dave Towey
:
Traceability in Systems Engineering: An Avionics Case Study. 818-823

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.