default search action
36th COMPSAC Workshops 2012: Izmir, Turkey
- Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2714-5
Invited Talk
- Michiaki Iwazume, Hideaki Fujii, Takahiro Iwase, Hiroshi Haraguchi, Makoto Hijiya:
Asian Information HUB Project: NICT's R&D Vsion and Strategies for Universal Communication Technology in the Big Data Era. 1-6
SSS 2012: The Fifth IEEE International Workshop on Service Science and Systems
Service Creation and Evolution
- Liyuan Xiao, Carl K. Chang, Hen-I Yang, Kai-Shin Lu, Hsinyi Jiang:
Automated Web Service Composition Using Genetic Programming. 7-12 - Ziyan Xu, Haihong Zhao, Lin Liu:
User's Requirements Driven Services Adaptation and Evolution. 13-19 - Jae-Hyun Cho, Jang-Ho Choi, Han-Gyu Ko, In-Young Ko:
An Adaptive Quality Level Selection Method for Efficient QoS-Aware Service Composition. 20-25 - Yu Zhang, Weidong Liu, Jiaxing Song:
A Novel Solution of Distributed File Storage for Cloud Service. 26-31
Service Marketing and Management
- Xiaodong Huang, Yong Zhang, Chunxiao Xing:
GARSS: A Generic Annotation and Recommendation Service System for Digital Repositories. 32-37 - Sen Ma, Wen Zhao, Shikun Zhang, Hang Zhang:
Material Hub: A Semantic Search Engine with Rule Reasoning. 38-44 - Maria Salama, Ahmed Shawish, Amir Zeid, Mohamed Kouta:
Integrated QoS Utility-Based Model for Cloud Computing Service Provider Selection. 45-50
Service Paradigms in Industry
- Frank Schulz, Wibke Michalk, Markus Hedwig, Marcus McCallister, Christof Momm, Simon Caton, Christian Haas, Daniel Rolli, Monika Tavas:
Service Level Management for Service Value Networks. 51-56 - Yang Li:
Agent-Based Simulation and Its Applications to Service Management: Invited Talk. 57
MidArch 2012: The Sixth Middleware Architecture in the Internet
- Toru Kobayashi:
Application Architecture to Foster User-Centric Information Discovery and Retrieval. 58-63 - Wataru Oogami, Takaaki Komura, Yasuo Okabe:
Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation. 64-69 - Miguel Macías Enguídanos, Jaime Pérez Crespo:
Secure Monitoring for Identity Federations and Distributed Systems. 70-75 - Toshiki Watanabe, Shunichi Kinoshita, Junichi Yamato, Hideaki Goto, Hideaki Sone:
Flexible Access Control Framework Considering IdP-Side's Authorization Policy in Roaming Environment. 76-81 - Shunichi Kinoshita, Toshiki Watanabe, Junichi Yamato, Hideaki Goto, Hideaki Sone:
Implementation and Evaluation of an OpenFlow-Based Access Control System for Wireless LAN Roaming. 82-87 - Tomoya Furuichi, Susumu Date, Hiroaki Yamanaka, Kohei Ichikawa, Hirotake Abe, Haruo Takemura, Eiji Kawai:
A Prototype of Network Failure Avoidance Functionality for SAGE Using OpenFlow. 88-93 - Takeshi Nishimura, Motonori Nakamura, Makoto Otani, Kazutsuna Yamaji, Noboru Sonehara:
Group Management System for Federated Identities with Flow Control of Membership Information by Subjects. 94-99 - Shigeaki Tanimoto, Shinichi Mizuhara, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance. 100-105
METHOD 2012: The First IEEE International Workshop on Methods for Establishing Trust with Open Data
- Tomás Knap, Jan Michelfeit, Martin Necaský:
Linked Open Data Aggregation: Conflict Resolution and Aggregate Quality. 106-111 - Evanela Lapi, Nikolay Tcholtchev, Louay Bassbouss, Florian Marienfeld, Ina Schieferdecker:
Identification and Utilization of Components for a Linked Open Data Platform. 112-115 - Miquel Oliver, Manuel Palacin, Albert Domingo, Víctor Valls:
Sensor Information Fueling Open Data. 116-121 - Erik Mannens, Sam Coppens, Ruben Verborgh, Laurence Hauttekeete, Davy Van Deursen, Rik Van de Walle:
Automated Trust Estimation in Developing Open News Stories: Combining Memento & Provenance. 122-127 - Xiaoqiang Chen, Vincent Huang:
Privacy Preserving Data Publishing for Recommender System. 128-133 - Florian Skopik, Zhendong Ma:
Attack Vectors to Metering Data in Smart Grids under Security Constraints. 134-139 - Jean-François Lalande, David Rodriguez:
Protecting Resources in an Open and Trusted Peer-to-Peer Network. 140-143
IWSC 2012: The Ninth IEEE International Workshop on Software Cybernetics
- Bahtijar Vogel, Arianit Kurti, Marcelo Milrad, Tommi Mikkonen:
Architectural Concepts: Evolution of a Software System across Design and Implementation Stages in Dynamically Changing Environments. 144-151 - Yu Zhou, Xuefeng Yan, Zhiqiu Huang:
A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments. 152-157 - Liangdong Wang, Yang Gao, Chun Cao, Li Wang:
Towards a General Supporting Framework for Self-Adaptive Software Systems. 158-163 - Richang Lin, Bihuan Chen, Yi Xie, Xin Peng, Wenyun Zhao:
Learning-Based Multi-controller Coordination for Self-Optimization. 164-169 - Chang-Ai Sun, Guan Wang, Kai-Yuan Cai, Tsong Yueh Chen:
Distribution-Aware Mutation Analysis. 170-175 - Jun Lin, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Stephen S. Yau, Dazhi Huang:
A Reputation System for Trustworthy QoS Information in Service-Based Systems. 176-181 - Ling Wu, Guangtai Liang, Qianxiang Wang:
Program Behavior Analysis and Control for Online IDE. 182-187 - Jianchun Xing, Hongda Wang, Wei Song, Qiliang Yang:
Safe Regression Test Selection Based on Program Dependence Graphs. 188-193
CFSE 2012: The Fourth IEEE International Workshop on Computer Forensics in Software Engineering
- Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir:
Cloud Log Forensics Metadata Analysis. 194-199 - Takashi Sakuma, Ryôichi Sasaki:
Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy Protection. 200-205 - P. Vinod Bhattathiripad:
Software Piracy Forensics: A Proposal for Incorporating Dead Codes and Other Programming Blunders as Important Evidence in AFC Test. 206-212 - Grant Osborne, Benjamin P. Turnbull, Jill Slay:
Development of InfoVis Software for Digital Forensics. 213-217
MVDA 2012: The First IEEE International Workshop on Modeling and Verifying Distributed Applications
- Jinho On, Sujeong Woo, Moonkun Lee:
A Graphical Language to Integrate Process Algebra and State Machine Views for Specification and Verification of Distributed Real-Time Systems. 218-223 - Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fraj, Ahlem Ben Younes:
A BPEL4WS Extension to Develop and Execute Grid Service Workflow Application. 224-229 - Mohamed Karim Aroua, Belhassen Zouari:
A Distributed and Coordinated Massive DDOS Attack Detection and Response Approach. 230-235 - Ahlem Ben Younes, Leila Jemni Ben Ayed, Yousra Bendaly Hlaoui:
UML AD Refinement Patterns for Modeling Workflow Applications. 236-241 - Ming-Huang Chen, Yaw-Chung Chen, Wen-Kang Jia:
An Efficient IPTV Distribution Technique under NAT Environment. 242-247 - Thouraya Gouasmi, Amira Regayeg, Ahmed Hadj Kacem:
Automatic Generation of an Operational CSP-Z Specification from an Abstract Temporal^Z Specification. 248-253 - Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes:
A Semantics-Based Privacy-Aware Approach for Fragmenting Business Processes. 254-259
QUORS 2012: The Sixth IEEE International Workshop on Quality Oriented Reuse of Software
- Wafa Basit, Fakhar Lodhi, Muhammad Usman Bhatti:
Evaluating the Extended Refactoring Guidelines. 260-265 - Tushar Sharma:
Quantifying Quality of Software Design to Measure the Impact of Refactoring. 266-271 - Wu Ren:
Mining Association Rules to Facilitate Structural Recovery. 272-277 - Moazzam Fareed Niazi, Tiberiu Seceleanu, Hannu Tenhunen:
Towards Reuse-Based Development for the On-chip Distributed SoC Architecture. 278-283 - Dilek Tapucu, Seda Kasap, Fatih Tekbacak:
Performance Comparison of Combined Collaborative Filtering Algorithms for Recommender Systems. 284-289 - Hwai-Jung Hsu, Ming-Wei Tsai, Feng-Jian Wang:
Simplifying the Design of Signature Workflow with Patterns. 290-295 - Mehmet Kaya, James W. Fawcett:
A New Cohesion Metric and Restructuring Technique for Object Oriented Paradigm. 296-301 - Sheau Ling Tan, Lin Liu:
Performance Analysis of Reusable Components with Hybrid Modelling of Strategies and Processes: A Real World Case Study. 302-309 - Junfeng Zhao, Jiantao Zhou, Jing Liu:
Translation Rules and a Supporting Tool for Model-Based Reuse. 310-315 - Tao Sun, Xinming Ye, Hongji Yang, Jing Liu:
Parallel Software Reuse Driven CPN Model Reduction and Analysis Approach. 316-321 - Shou-Yu Lee, Dongyang Tang, Tingchao Chen, William Cheng-Chung Chu:
A QoS Assurance Middleware Model for Enterprise Cloud Computing. 322-327 - Daren Fang, Xiaodong Liu, Imed Romdhani, Huiqun Zhao:
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. 328-333 - Aseel Hmood, Iman Keivanloo, Juergen Rilling:
SE-EQUAM - An Evolvable Quality Metamodel. 334-339
REFS 2012: The Sixth IEEE International Workshop on Requirements Engineering for Services
RE for Services Adaptation and Evolution
- Jolita Ralyté:
Viewpoints and Issues in Requirements Engineering for Services. 341-346 - Saïd Assar, Carine Souveyet, Kadan Aljoumaa:
A Goal-Oriented Perspective on Approaches to Web Service Discovery. 347-352 - Feng-Lin Li, Lin Liu, John Mylopoulos:
Software Service Evolution: A Requirements Perspective. 353-358 - Clotilde Rohleder:
Representing Non-functional Requirements on Services - A Case Study. 359-366
RE for Non-functional Requirements
- Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. 367-372 - Bo Wei, Zhi Jin, Didar Zowghi, Bin Yin:
Automated Reasoning with Goal Tree Models for Software Quality Requirements. 373-378 - Haruhiko Kaiya, Atsushi Ohnishi:
Improving Software Quality Requirements Specifications Using Spectrum Analysis. 379-384 - Haihua Xie, Carl K. Chang, Ming Hua, Kai-Shin Lu:
The Concepts and Ontology of SiSL: A Situation-Centric Specification Language. 385-391 - Jianchu Huang, Hongji Yang:
A Functional Implementation Approach for Web Services-Based Context-Aware Systems. 392-397
REFS Panel
- Lin Liu:
Requirements Engineering for Service Adaptation and Evolution. 398-402
SAPSE 2012: The Fourth IEEE International Workshop on Security Aspects in Processes and Services Engineering
- Mohamed Karim Aroua, Belhassen Zouari:
Modeling of A-Posteriori Access Control in Business Processes. 403-408 - Hejiao Huang, Qiang Zhou:
Petri-Net-Based Modeling and Resolving of Black Hole Attack in WMN. 409-414 - Mohammad Ali Hadavi, Morteza Noferesti, Rasool Jalili, Ernesto Damiani:
Database as a Service: Towards a Unified Solution for Security Requirements. 415-420 - Anne Baumgrass, Sigrid Schefer-Wenzl, Mark Strembeck:
Deriving Process-Related RBAC Models from Process Execution Histories. 421-426 - Hejiao Huang, Feng Shang, Jiangtao Zhang:
Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC. 427-432 - Romaric Tchokpon, Ernesto Damiani, Nadia Bennani:
Robust XML Watermarking Using Fuzzy Queries. 433-438
STA 2012: The Fourth IEEE International Workshop on Software Test Automation
Agile Software Testing
- Robert M. Hierons:
Model Based Test Automation through Asynchronous Channels. 439 - Eliane F. Collins, Arilo Claudio Dias-Neto, Vicente Ferreira de Lucena Jr.:
Strategies for Agile Software Testing Automation: An Industrial Experience. 440-445 - Marek Grzegorz Stochel, Mariusz R. Wawrowski, James J. Waskiel:
Adaptive Agile Performance Modeling and Testing. 446-451
Testing Mobile and Open Software
- Afef Jmal Maâlej, Moez Krichen, Mohamed Jmaiel:
Model-Based Conformance Testing of WS-BPEL Compositions. 452-457 - Tamer Abdou, Peter Grogono, Pankaj Kamthan:
A Conceptual Framework for Open Source Software Test Process. 458-463
Testing Large Systems
- Bo Yang, Ji Wu, Chao Liu:
Mining Data Chain Graph for Fault Localization. 464-469 - Cheng Gong, Zheng Zheng, Wei Li, Peng Hao:
Effects of Class Imbalance in Test Suites: An Empirical Study of Spectrum-Based Fault Localization. 470-475
IEESD 2012: The Fourth IEEE International Workshop on Industrial Experience in Embedded Systems Design / TiP 2012: The First IEEE International Workshop on Tools in Embedded Systems Design Process
- John F. Schommer, Dominik Franke, Tim Lange, Stefan Kowalewski:
Load Balancing for Cross Layer Communication. 476-481 - Paul Stack:
Development of a Mobile Platform to Support Building Maintenance Engineering. 482-487 - Matthias Biehl, Martin Törngren:
An Estimation Model for the Savings Achievable by Tool Chains. 488-492 - Vasileios Angelopoulos, Trevor Parsons, John Murphy, Patrick O'Sullivan:
GcLite: An Expert Tool for Analyzing Garbage Collection Behavior. 493-502 - Daniel Merschen, Julian Pott, Stefan Kowalewski:
Integration and Analysis of Design Artefacts in Embedded Software Development. 503-508 - Kunming Nie, Li Zhang, Zengtao Geng:
Product Line Variability Modeling Based on Model Difference and Merge. 509-513
CORCS 2012: The Fourth IEEE International Workshop on Component-Based Design of Resource-Constrained Systems
- Lubomír Bulej, Tomás Bures, Vojtech Horký, Jaroslav Keznikl, Petr Tuma:
Performance Awareness in Component Systems: Vision Paper. 514-519 - Steffen Peter, Peter Langendörfer:
Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications. 526-531 - Raluca Marinescu, Eduard Paul Enoiu:
Extending EAST-ADL for Modeling and Analysis of System's Resource-Usage. 532-537 - Maria Anjum, David Budgen:
Modelling the Design for an SOA System to Control a Small Scale Energy Zone. 538-543 - Cengiz Togay, Emre Selman Caniaz, Ali H. Dogru:
Rule Based Axiomatic Design Theory Guidance for Software Development. 544-552
STPSA 2012: The Seventh IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Zhi Wang, Chunfu Jia, Min Liu, Xiaoxu Yu:
Branch Obfuscation Using Code Mobility and Signal. 553-558 - Sun Ding, Hee Beng Kuan Tan, Kaiping Liu, Mahinthan Chandramohan, Hongyu Zhang:
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation. 559-564 - Weider D. Yu, Kyle Le:
Towards a Secure Software Development Lifecycle with SQUARE+R. 565-570 - Meng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou, Bing Xie:
Internet-Based Evaluation and Prediction of Web Services Trustworthiness. 571-576 - David Hauzar, Jan Kofron:
On Security Analysis of PHP Web Applications. 577-582 - Nancy R. Mead:
Measuring the Software Security Requirements Engineering Process. 583-588 - Wei Tian, Jufeng Yang, Jing Xu, Guannan Si:
Attack Model Based Penetration Test for SQL Injection Vulnerability. 589-594 - Maria Chroni, Stavros D. Nikolopoulos:
An Efficient Graph Codec System for Software Watermarking. 595-600
ESAS 2012: The Seventh IEEE International Workshop on Engineering Semantic Agent Systems
- Islam Elgedawy:
Conditional Ontology Mapping. 601-606 - Katsunori Oyama, Hiroyuki Wakabayashi, Atsushi Takeuchi, Naoki Ishitsuka:
Integration of 3D Trajectory Maps into a Local Distribution Map of Radiation Dose Using Unmanned Aerial Vehicle. 607-612 - Young-Joon Lee, Geon Yong Park, Ho Kuen Song, Hee Yong Youn:
A Load Balancing Scheme for Distributed Simulation Based on Multi-agent System. 613-618 - Sinem Getir, Moharram Challenger, Sebla Demirkol, Geylani Kardas:
The Semantics of the Interaction between Agents and Web Services on the Semantic Web. 619-624 - Riza Cenk Erdur, Oguz Dikenelli, Oylum Alatli, Erdem Eser Ekinci, Ziya Akar:
Integrating Linked Data Space with Agents Using the Environment Abstraction. 625-630 - Behnam Rahnama, Atilla Elçi, Shadi Metani:
An Image Processing Approach to Solve Labyrinth Discovery Robotics Problem. 631-636 - Duygu Çelik, Atilla Elçi, Esra Çalik, Ayman Ahmad Khalil:
Development of Semantic Model and Information Exploration System for TV Media. 637-642
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.