default search action
Internetware 2012: QingDao, China
- Hong Mei, Jian Lv, Qianxiang Wang, Lin Liu:
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, Internetware 2012, QingDao, China, October 30-31, 2012. ACM 2012, ISBN 978-1-4503-1888-4 - Chang Xu, Shing-Chi Cheung, Xiaoxing Ma, Chun Cao, Jian Lu:
Dynamic fault detection in context-aware adaptation. 1:1-1:10 - Wei Song, Zheng Gao, Jing Cai, Xiaoxing Ma:
A priority-based transaction commit protocol for composite web services. 2:1-2:10 - Ruiqing Chi, Zhuzhong Qian, Sanglu Lu:
A game theoretical method for auto-scaling of multi-tiers web applications in cloud. 3:1-3:10 - Shang Zheng, Hongji Yang:
An approach to supporting architecture evolution in Internetware. 4:1-4:9 - Chen Li, Linpeng Huang, Luxi Chen, Xu Li, Weichao Luo:
Dynamic software architectures: formal specification and verification with CSP. 5:1-5:8 - Zhike Wu, Jing Liu, Xiaohong Chen, Mingsong Chen:
An approach to communicating process modeling of MARTE. 6:1-6:9 - Yuankui Li, Linzhang Wang, Xuandong Li, Yuanfang Cai:
Detecting source code changes to maintain the consistence of behavioral model. 7:1-7:6 - Xiaofang Zhang, Meng Lin, Deping Zhang:
A learning strategy for software testing optimization based on dynamic programming. 8:1-8:6 - Xiaopu Huang, Qingqing Sun, Jiangwei Li, Minxue Pan, Tian Zhang:
An MDE-based approach to the verification of SysML state machine diagram. 9:1-9:7 - Tao Liu, Feng Xu, Yuan Yao, Jian Lu:
A group recommendation approach for service selection. 10:1-10:5 - Yang Zhuo-Qun, Jin Zhi:
Requirements modeling and system reconfiguration for self-adaptation of Internetware. 11:1-11:6 - Jun Wang, Lin Liu, Jianmin Wang:
Understanding evolution in Internetware using a double pyramids model. 12:1-12:9 - Jiaxin Zhu, Hongwu Lin, Minghui Zhou, Hong Mei:
Review code evolution history in OSS universe. 13:1-13:4 - Jin Shao, Qianxiang Wang:
A model-driven monitoring approach for Internetware on platform-as-a-service (PaaS). 14:1-14:8 - Shuping Ji, Wei Wang, Chunyang Ye, Jun Wei, Zhaohui Liu:
Constructing a data accessing layer for in-memory data grid. 15:1-15:7 - Jiwei Xu, Wenbo Zhang, Heng Wu, Jianhua Zhang:
An I/O optimizing approach for virtualization-based Internetwares. 16:1-16:6 - Daren Fang, Xiaodong Liu, Hongji Yang, Lin Liu:
Evolution for the sustainability of internetware. 17:1-17:9 - Tao Li, Xiaojun Ye, Jianmin Wang:
Protecting data confidentiality in cloud systems. 18:1-18:12 - Xiujuan Ji, Jufeng Yang, Jing Xu, Lei Feng, Xiaohong Li:
Interprocedural path-sensitive resource leaks detection for C programs. 19:1-19:9 - Bin Yin, Zhi Jin, Xiaohong Chen:
An approach for selecting implementation strategies of non-functional requirements. 20:1-20:7 - Lei Zhang, Yanchun Sun, Hui Song, Weihu Wang, Gang Huang:
Detecting anti-patterns in Java EE runtime system model. 21:1-21:8 - Jingtian Wang, Guoquan Wu, Xiaoquan Wu, Jun Wei:
Detect and optimize the energy consumption of mobile app through static analysis: an initial research. 22:1-22:5 - Xiaobing Sun, Bin Li, Bixin Li, Wanzhi Wen:
A comparative study of static CIA techniques. 23:1-23:8 - Xin Liu, Zhuo Li, Wenzhong Li, Sanglu Lu, Xiaoliang Wang, Daoxu Chen:
Exploring social properties in vehicular ad hoc networks. 24:1-24:7 - Qiang Wei, Zhi Jin:
Service discovery for internet of things: a context-awareness perspective. 25:1-25:6 - Guigang Zhang, Chao Li, Chunxiao Xing, Yong Zhang:
SemanMR: big data processing framework based on semantics. 26:1-26:8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.