default search action
38th COMPSAC Workshops 2014: Vasteras, Sweden
- IEEE 38th Annual Computer Software and Applications Conference, COMPSAC Workshops 2014, Vasteras, Sweden, July 21-25, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3578-9
IWSC 2014: 11th IEEE International Workshop on Software Cybernetics
Joint Workshop Session and Keynote Address
- Erol Gelenbe:
Adaptive Management of Energy Packets. 1-6
Adaptation and Evolution Techniques for Software Quality
- Giedre Sabaliauskaite, Aditya P. Mathur:
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems. 7-12 - Giedre Sabaliauskaite, Aditya P. Mathur:
Countermeasures to Enhance Cyber-physical System Security and Safety. 13-18 - Hongji Yang, Lu Zhang:
Controlling and Being Creative: Software Cybernetics and Creative Computing. 19-24
Monitoring and Control for Software Systems and Testing
- Tomoyuki Mochizuki, Akitoshi Shimura, Takayuki Takezawa:
A Study on Migration Technique Using Program Slicing for Large-Scale Information and Control Systems. 25-30 - Lei Zhang, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai, Stephen S. Yau, Jia Yu:
A History-Based Dynamic Random Software Testing. 31-36 - Zijiang Yang, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai, Stephen S. Yau, Jia Yu:
Dynamic Random Testing with Parameter Adjustment. 37-42
ADMNET 2014: Second IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
Deployment and Management of Networks and Applications Theory
- Wlodzimierz Ogryczak:
Fair Optimization - Methodological Foundations of Fairness in Network Resource Allocation. 43-48 - Mario Köppen, Kei Ohnishi, Masato Tsuru:
Maxmin Fairness under Priority for Network Resource Allocation Tasks. 49-54 - Hiroshi Yamamoto, Chie Hidano, Shigehiro Ano, Katsuyuki Yamazaki:
Modeling of Dynamic Trend of Latency Variations on Mobile Network Using Markov Regime Switching. 55-60
Network
- Masaki Fukushima, Yoshiaki Yoshida, Atsushi Tagami, Shu Yamamoto, Akihiro Nakao:
Toy Block Networking: Easily Deploying Diverse Network Functions in Programmable Networks. 61-66 - Ruediger Gad, Martin Kappes, Inmaculada Medina-Bulo:
Bridging the Gap between Low-Level Network Traffic Data Acquisition and Higher-Level Frameworks. 67-72 - Tohru Kondo, Reiji Aibara, Kazufumi Suga, Kaori Maeda:
A Mobility Management System for the Global Live Migration of Virtual Machine across Multiple Sites. 73-77 - Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara, Kouta Yoshida:
Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services. 78-83 - Robayet Nasim, Andreas J. Kassler:
Deploying OpenStack: Virtual Infrastructure or Dedicated Hardware. 84-89 - Takashi Yamanoue, Yuuri Koarata, Kentaro Oda, Koichi Shimozono:
A Technique to Assign an Appropriate Server to a Client, for a CDN Consists of Servers at the Global Internet and Hierarchical Private Networks. 90-95 - Takashi Yamanoue, Izumi Fuse, Shigeto Okabe, Atsushi Nakamura, Michio Nakanishi, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Ikuya Murata, Tetsutaro Uehara, Tsuneo Yamada, Hiroshi Ueda:
Computer Ethics Video Clips for University Students in Japan from 2003 until 2013. 96-101
STPSA 2014: Ninth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
Security and Analysis
- Zeineb Zhioua, Stuart Short, Yves Roudier:
Static Code Analysis for Software Security Verification: Problems and Approaches. 102-109 - Mathias Uslar, Christine Rosinger, Stefanie Schlegel:
Security by Design for the Smart Grid: Combining the SGAM and NISTIR 7628. 110-115 - He Sun, Lin Liu, Letong Feng, Yuan Xiang Gu:
Introducing Code Assets of a New White-Box Security Modeling Language. 116-121 - Weider D. Yu, Lavanya Davuluri, Monica Radhakrishnan, Maryam Runiassy:
A Security Oriented Design (SOD) Framework for eHealth Systems. 122-127
Cyber Security, Detection, and Modeling
- Liyuan Xiao, Yetian Chen, Carl K. Chang:
Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection. 128-133 - George Rush, Daniel R. Tauritz, Alexander D. Kent:
DCAFE: A Distributed Cyber Security Automation Framework for Experiments. 134-139 - Li Feng, Bruce M. McMillin:
Quantification of Information Flow in a Smart Grid. 140-145
Access Control, Privacy, and Process
- Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
A Privacy-Preserving Solution for Tracking People in Critical Environments. 146-151 - Sumiko Miyata, Kazuhiro Suzuki, Tetsuya Morizumi, Hirotsugu Kinoshita:
Access Control Model for the My Number National Identification Program in Japan. 152-157 - Hidenobu Watanabe, Tsukasa Iwama, Ken T. Murata, Shigenori Ushiyama, Yasushi Muto:
Improvement of the Integrity Verification Application Using Timestamp Mechanism for Distributed File System. 158-163 - Juan M. Gutiérrez Cárdenas:
Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators. 164-168
MidArch 2014: Eighth IEEE International Workshop on Middleware Architecture in the Internet
- Hao Liu, Hideaki Goto:
Certificate-Based, Disruption-Tolerant Authentication System with Automatic CA Certificate Distribution for Eduroam. 169-173 - Tomo Niizuma, Hideaki Goto:
Centralized Online Sign-Up and Client Certificate Issuing System for Eduroam. 174-179 - Masaki Shimaoka, Noboru Sonehara:
Modeling the Cost Structure of Identity Proofing. 180-185 - Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Dripcast - Server-less Java Programming Framework for Billions of IoT Devices. 186-191 - Nikolay Tcholtchev, Benjamin Dittwald, Thomas Scheel, Begüm Ilke Zilci, Danilo Schmidt, Philipp Lammel, Jurma Jacobsen, Ina Schieferdecker:
The Concept of a Mobility Data Cloud: Design, Implementation and Trials. 192-198 - Michiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii:
Big Data in Memory: Benchmarking in Memory Database Using the Distributed Key-Value Store for Constructing a Large Scale Information Infrastructure. 199-204
WRMOCC 2014: First IEEE International Workshop on Risk Management of OSS Components and Communities
- Oscar Franco-Bedoya, Dolors Costal, Soraya Hidalgo, Ron Ben-Jacob:
Expert Mining for Evaluating Risk Indicators Scenarios. 205-210 - Nikolas Galanis, María José Casany Guerrero, Marc Alier Forment, Enric Mayol:
Building a Community: The Moodbile Perspective. 211-216 - Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, Aneesh Krishna:
Risk Measure Propagation through Organisational Network. 217-222
SocNet 2014: First IEEE International Workshop on Social Networks, Smart Communities, and Smart Devices
- Yu Zhang, Jiangtao Wen, Fan Mo:
The Application of Internet of Things in Social Network. 223-228 - Ying Guo, Xi Chen:
Cross-Domain Scientific Collaborations Prediction with Citation Information. 229-233 - Nima Dokoohaki, Mihhail Matskin, Usman Afzal, Md. Mustakimul Islam:
An Enterprise Social Recommendation System for Connecting Swedish Professionals. 234-239 - Jiaxing Shang, Lianchen Liu, Feng Xie, Cheng Wu:
How Overlapping Community Structure Affects Epidemic Spreading in Complex Networks. 240-245
UCDAS 2014: First IEEE International Workshop on User Centered Design and Adaptive Systems
- Reyes Juárez-Ramírez, Carlos Huertas, Sergio Inzunza:
Automated Generation of User-Interface Prototypes Based on Controlled Natural Language Description. 246-251 - Stefano Ferretti, Silvia Mirri, Catia Prandi, Paola Salomoni:
Exploiting Reinforcement Learning to Profile Users and Personalize Web Pages. 252-257 - Eugene Yujun Fu, Hong Va Leong, Grace Ngai, Michael Xuelin Huang, Stephen C. F. Chan:
Physiological Mouse: Towards an Emotion-Aware Mouse. 258-263 - Andrés Mejía-Figueroa, Reyes Juárez-Ramírez:
Towards a User Model for the Design of Adaptive Interfaces for Autistic Users. 264-269 - Misako Goto, Toru Shirato, Ryuya Uda:
Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Sounds. 270-275 - Nozomi Takeuchi, Shuhei Kobata, Ryuya Uda:
Improvement of Personal Identification by Flick Input with Acceleration Sensor. 276-281 - Drew Williams, Sheikh Iqbal Ahamed, William C. Chu:
Designing Interpersonal Communication Software for the Abilities of Elderly Users. 282-287
BIoT 2014: First IEEE International Workshop on Big Data Management for the Internet of Things
- Fredrik Nordlund, Manabu Higashida, Yuuichi Teranishi, Shinji Shimojo, Masanori Yokoyama, Michio Shimomura:
Designing of a Network-Aware Cloud Robotic Sensor Observation Framework. 288-294 - Sulayman K. Sowe, Takashi Kimata, Mianxiong Dong, Koji Zettsu:
Managing Heterogeneous Sensor Data on a Big Data Platform: IoT Services for Data-Intensive Science. 295-300 - Ikuo Nakagawa, Masahiro Hiji, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo:
m-cloud - Distributed Statistical Computation Using Multiple Cloud Computers. 301-305 - Hideya Ochiai, Hiroyuki Ikegami, Yuuichi Teranishi, Hiroshi Esaki:
Facility Information Management on HBase: Large-Scale Storage for Time-Series Data. 306-311 - Marco Mesiti, Stefano Valtolina:
Towards a User-Friendly Loading System for the Analysis of Big Data in the Internet of Things. 312-317 - Yutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Nobuhiko Matsuura, Yuusuke Kawakita, Haruhisa Ichikawa:
Load-Adaptive Indexing Method for Schema-less Searches. 318-324
CFSE 2014: Sixth IEEE International Workshop on Computer Forensics in Software Engineering
- Masayuki Tsubouchi, Tomotaka Maeda, Yasuo Okabe:
Digital Fingerprinting on Executable File for Tracking Illegal Uproaders. 325-330 - Johan Garcia:
An Evaluation of Side-Information Assisted Forensic Hash Matching. 331-336 - Jasenko Hosic, Daniel R. Tauritz, Samuel A. Mulder:
Evolving Decision Trees for the Categorization of Software. 337-342 - Naoki Kobayashi, Ryôichi Sasaki:
Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of Evidence. 343-347
ESAS 2014: Ninth IEEE International Workshop on Engineering Semantic Agents-Semantics, Agents and Intelligence
- Duygu Çelik, Atilla Elçi, Ridvan Akcicek, Bora Gokce, Pelin Hurcan:
A Safety Food Consumption Mobile System through Semantic Web Technology. 348-353 - Duygu Çelik, Atilla Elçi, Ridvan Akcicek, Bora Gokce, Pelin Hurcan:
Mobile Pediatric Consultation and Monitoring System through Semantic Web Technology. 354-359 - Abdulelah Abdallah Algosaibi, Austin C. Melton:
Using the Semantics Inherent in Sitemaps to Learn Ontologies. 360-365
CORCS-IEESD 2014: Fifth IEEE International Workshop on Component-Based Design of Resource Constrained Systems
- Sergey Zverlov, Sebastian Voss:
Synthesis of Pareto Efficient Technical Architectures for Multi-core Systems. 366-371 - Mikhail Afanasov, Luca Mottola, Carlo Ghezzi:
Towards Context-Oriented Self-Adaptation in Resource-Constrained Cyberphysical Systems. 372-377 - Zdravko Krpic, Ivica Crnkovic, Jan Carlson:
Towards a Common Software-to-Hardware Allocation Framework for the Heterogeneous High Performance Computing. 378-383 - Daniel Hallmans, Marcus Jägemar, Stig Larsson, Thomas Nolte:
Identifying Evolution Problems for Large Long Term Industrial Evolution Systems. 384-389 - Franz Felix Füßl, Jirka Ciemala:
Variable Factors of Influence in Product Line Development. 390-395
SAPSE 2014: Sixth IEEE International Workshop on Security Aspects in Processes and Services Engineering
- Ernesto Damiani, Valerio Coviello, Fulvio Frati, Claudio Santacesaria:
The Problem of Handling Multiple Headers in WS-Security Implementations. 396-400 - Giampaolo Bella, Paul Curzon, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Methodology for the Security and Privacy Analysis of Services. 401-406 - Samane Abdi:
I Was Confused: Robust Accountability for Permission Delegation in Cloud Federations. 407-412 - Samane Abdi:
Integration of Heterogeneous Policies for Trust Management. 413-419
SSERV 2014: First IEEE International Workshop on Social Services
- Vivien Lespagnol, Juliette Rouchier:
What Is the Impact of Heterogeneous Knowledge about Fundamentals on Market Liquidity and Efficiency: An ABM Approach. 420-425 - Takashi Ikoma, Masakazu Takahashi, Kazuhiko Tsuda:
A Study on Filtering of the Effect Range with the Package Insert of the Medicine. 426-431 - Iris Lorscheid:
Learning Agents for Human Complex Systems. 432-437 - Msury Mahunnah, Alex Norta, Lixin Ma, Kuldar Taveter:
Heuristics for Designing and Evaluating Socio-technical Agent-Oriented Behaviour Models with Coloured Petri Nets. 438-443 - Hiroshi Takahashi:
Analyzing the Role of Noise Trader in Financial Markets through Agent-Based Modelling. 444-449 - Takashi Yoshida, Setsuya Kurahashi:
Emergence of Fashion Cycle by Agent-Based Model of WoM Dissemination. 450-455 - Souhir Masmoudi:
Chartists and Fundamentalists in an Agent Based Herding Model. 456-461 - Takashi Yamada, Nobuyuki Hanaki:
Heterogeneity in Lowest Unique Integer Game. 462-467
QUORS 2014: Eighth IEEE International Workshop on Quality Oriented Reuse of Software
Software Evolution
- Xin Zhang:
A Multi-dimensional Component Importance Analysis Mechanism for Component Based Systems. 468-473 - Chih-Hung Chang, Chih-Wei Lu, Wen Pin Yang, William Cheng-Chung Chu, Chao-Tung Yang, Ching-Tsorng Tsai, Pao-Ann Hsiung:
A SysML Based Requirement Modeling Automatic Transformation Approach. 474-479 - Feng-Jian Wang, Parameswaramma Mandalapu:
Analyzing Artifact Anomalies in a Temporal Structural Workflow for SBS. 480-485
Software Reuse
- Hossam Hakeem, Hui Guan, Hongji Yang:
A Framework of Patterns Applicability in Software Development. 486-491 - Hui Guan, Hongji Yang, Hossam Hakeem:
Reverse Engineering Web Applications for Security Mechanism Enhancement. 492-497 - Julia F. Varnell-Sarjeant, Anneliese Amschler Andrews, Andreas Stefik:
Comparing Reuse Strategies: An Empirical Evaluation of Developer Views. 498-503 - Barbara Gallina, Shaghayegh Kashiyarandi, Helmut Martin, Robert Bramberger:
Modeling a Safety- and Automotive-Oriented Process Line to Enable Reuse and Flexible Process Derivation. 504-509
Cloud and Service Computing
- Steven Thomas Graham, Xiaodong Liu:
Critical Evaluation on jClouds and Cloudify Abstract APIs against EC2, Azure and HP-Cloud. 510-515 - Amine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Institution Theory for Services Oriented Applications. 516-521
Model-Driven Quality and Testing
- Benjamin Behringer, Martina Lehser, Steffen Rothkugel:
Towards Feature-Oriented Fault Tree Analysis. 522-527 - Nikolay Tcholtchev, Grit Dudeck, Michael Wagner, Christian Hein, Arun Prakash, Tom Ritter:
Integrating the Modelica DSL into a Platform for Model-Based Tool Interoperability. 528-534 - Shinobu Saito, Jun Hagiwara, Tomoki Yagasaki, Katsuyuki Natsukawa:
Requirements Model Oriented System Generation Tool and Its Practical Evaluation. 535-540 - Sumei Zhang, Hua Li, Yu Xue, Xianrong Wang:
Using TTCN-3 to Test SPDY Protocol Interaction Property. 541-546
CDS 2014: Second IEEE International Workshop on Consumer Devices and Systems
- Shigeo Kaneda, Shohei Asada, Akira Yamamoto, Yuta Kawachi, Yusuke Tabata:
A Hazard Detection Method for Bicycles by Using Probe Bicycle. 547-551 - Kimie Suzuki, Kaori Fujinami:
An Ironing Support System with Superimposed Information for Beginners. 552-557 - Naofumi Yoshida, Naoki Ishibashi, Norihiro Ishikawa:
A Hybrid Device Profile Detection Method and Its Applications. 558-560 - Takatomo Yamabe, Ryozo Kiyohara:
A Study of On-Vehicle Information Devices Using a Smartphone. 561-566 - Sunghoon Lee, Sanghee Lee, Sumi Lim, Jiyoung Jung, Sangho Choi, Neunghoe Kim, Jung-Been Lee:
An API Design Process in Terms of Usability: A Case Study on Building More Usable APIs for Smart TV Platform. 567-571 - Chenyi Liao, Katsuhiko Kaji, Kei Hiroi, Nobuo Kawaguchi:
Design and Implementation of Event Information Summarization System. 572-577 - Jack Kelly, William J. Knottenbelt:
Metadata for Energy Disaggregation. 578-583 - Hidenobu Ito, Kazuaki Nimura:
Customizable Web-Based System to Federate Smart Devices and Peripherals. 584-589 - Naoyuki Morimoto, Yuu Fujita, Masaaki Yoshida, Hiroyuki Yoshimizu, Masafumi Takiyamada, Terukazu Akehi, Masami Tanaka:
A Power Allocation Management System Using an Algorithm for the Knapsack Problem. 590-595 - Georg Hackenberg, Maximilian Irlbeck, Vasileios Koutsoumpas, Denis Bytschkow:
A Rapid Prototyping Approach for Smart Energy Systems Based on Partial System Models. 596-601
WASCOM 2014: First IEEE International Workshop on Adaptive Systems for Communication Networks
- Wael Zouaoui, Carolina Albea-Sanchez, Yann Labit:
Dynamic Adaptive Management of Buffer for QoS Guarantees and Energy Reduction. 602-607 - Sheau-Ru Tong, Huan-Wen Chen, Cheng-Han Yang:
Profile-Based Scalable Video Adaptation Employing MD-FEC Interleaving over Loss-Burst Channels. 608-613 - Hiroki Kashiwazaki, Yoshiaki Takai:
An Evaluation of Adaptive Traffic Engineering for Delivering High Bandwidth Movie on Overlay Routing Network. 614-619 - Romain Laborde, Bashar Kabbani, François Barrère, Abdelmalek Benzekri:
An Adaptive XACMLv3 Policy Enforcement Point. 620-625
STA 2014: Sixth IEEE International Workshop on Software Test Automation
Instrumentation, Automation, and Applications
- Alexandre Locci Martins, Simone Hanazumi, Ana Cristina Vieira de Melo:
Testing Java Exceptions: An Instrumentation Technique. 626-631 - Dianxiang Xu, Weifeng Xu, Manghui Tu:
Automated Generation of Integration Test Sequences from Logical Contracts. 632-637 - Inbal Yahav, Ron S. Kenett, Xiaoying Bai:
Risk Based Testing of Open Source Software (OSS). 638-643
Model-Based Testing - Improving and Extending
- Junzan Zhou, Bo Zhou, Shanping Li:
Automated Model-Based Performance Testing for PaaS Cloud Services. 644-649 - Robert Setiadi, Man Fai Lau:
A Structured Model of Consistency Rules in After-State Database Testing. 650-655 - Ceren Sahin Gebizli, Hasan Sözer:
Improving Models for Model-Based Testing Based on Exploratory Testing. 656-661
SSS 2014 and MediComp 2014: Seventh IEEE International Workshop on Service Science and Systems and First IEEE International Workshop on Medical Computing
- Xianxiang Chen, Xinyu Hu, Ren Ren, Bing Zhou, Xiao Tan, Jiabai Xie, Zhen Fang, Yangmin Qian, Huaiyong Li, Lili Tian, Shanhong Xia:
Noninvasive Ambulatory Monitoring of the Electric and Mechanical Function of Heart with a Multifunction Wearable Sensor. 662-667 - Chen Shi, Liu Hui-Ting, Pan Hui, Ji-Jiang Yang, Jianqiang Li, Qing Wang:
Current Electronic Medical Record in China. 668-672 - Fangmin Sun, Zhen Fang, Zhan Zhao, Lidong Du, Zhihong Xu, Diliang Chen, Yangmin Qian, H. Y. Hui, Lili Tian:
A ZigBee Based Multi-hop Health Monitoring System: Design and Performance Evaluation. 673-677 - Ben-Da Gu, Ji-Jiang Yang, Jianqiang Li, Qing Wang, Yu Niu:
Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in China. 678-683 - Patrizia Scandurra, Steven Capelli:
A Practical and Automated Approach for Engineering Service-Oriented Applications with Design Patterns. 684-689 - Ali Yadavar Nikravesh, Samuel A. Ajila, Chung-Horng Lung:
Measuring Prediction Sensitivity of a Cloud Auto-scaling System. 690-695 - Mostafa Erfani, Juergen Rilling, Iman Keivanloo:
Towards an Ontology-Based Context-Aware Meta-model for the Software Domain. 696-701 - Bingchuan Yuan, John Herbert:
Accountability in a Context-Aware Smarthome Healthcare Reasoning System. 702-707
MVDA 2014: Third IEEE International Workshop on Modeling and Verifying of Distributed Applications
- Raja Boujbel, Sam Rottenberg, Sébastien Leriche, Chantal Taconet, Jean-Paul Arcangeli, Claire Lecocq:
MuScADeL: A Deployment DSL Based on a Multiscale Characterization Framework. 708-715 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:
A Load Distribution Method Based on Distributed Hashing for P2P Sensor Data Stream Delivery System. 716-721 - Moonkun Lee, Jungrhan Choi:
A Calculus for Transportation Systems. 722-727 - Amine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Towards an Institutional Representation for the B Model Oriented Specification. 728-733 - Tae-Seob Yoon, Joong-Hyun Choi, Eun-Sun Cho, Sumi Helal:
A Formal Modeling for Exceptions in Context-Aware Systems. 734-739 - Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
A Meta-model Transformation from UML Activity Diagrams to Event-B Models. 740-745
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.