default search action
39th COMPSAC Workshops 2015: Taichung, Taiwan
- Sheikh Iqbal Ahamed, Carl K. Chang, William C. Chu, Ivica Crnkovic, Pao-Ann Hsiung, Gang Huang, Jingwei Yang:
39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015. IEEE Computer Society 2015
Workshops Keynote Abstract
- May D. Wang:
Biomedical Big Data Analytics for Patient-Centric and Outcome-Driven Precision Health. 1-2
SAPSE: Security Aspects in Processes and Services Engineering
- Stelvio Cimato:
Message from the SAPSE 2015 Workshop Organizer. 3 - Nadia Bennani, Chirine Ghedira Guégan, Genoveva Vargas-Solar, Martin A. Musicante:
Towards a Secure Database Integration Using SLA in a Multi-cloud Context. 4-9 - Gayathri Natesan, Jigang Liu:
An Adaptive Learning Model for k-Anonymity Location Privacy Protection. 10-16
CFSE: The Seventh IEEE International Workshop on Computer Forensics in Software Engineering
- Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE 2015 Workshop Organizers. 17
CFSE 1
- Kevin D. Fairbanks:
A Technique for Measuring Data Persistence Using the Ext4 File System Journal. 18-23 - Shota Okayasu, Ryôichi Sasaki:
Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a Botnet. 24-29 - Rethabile Khutlang, Fulufhelo V. Nelwamondo, Ann Singh:
Segmentation of Forensic Latent Fingerprint Images Lifted Contact-Less from Planar Surfaces with Optical Coherence Tomography. 30-34 - Songpon Teerakanok, Tetsutaro Uehara:
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes. 35-39
CFSE 2
- Yuhei Umehara, Hayai Ando, Ryôichi Sasaki:
Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT Risks. 40-46 - Da-Yu Kao:
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics. 47-52 - Yifan Wang, Tetsutaro Uehara, Ryôichi Sasaki:
Fog Computing: Issues and Challenges in Security and Forensics. 53-59
MidCCI: Middleware for Cyber Security, Cloud Computing and Internetworking
- Toyokazu Akiyama, Hideaki Goto, Shuo-Yan Chou:
Message from the MidCCI 2015 Workshop Organizers. 60 - Alexander Borisov:
A Novel Approach for User Authentication to Industrial Components Using QR Codes. 61-66 - Naoki Tsujio, Yasuo Okabe:
A Traceable and Pseudonymous P2P Information Distribution System. 67-72 - Somchart Fugkeaw, Hiroyuki Sato:
An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. 73-78 - Shoichi Ando, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency. 79-82
SSS: Service Science and Systems and MediComp: Medical Computing
- Shuo-Yan Chou, Ji-Jiang Yang, Yang Li, Kwang-Jae Kim, Jianqiang Li, Sheikh Iqbal Ahamed:
Message from the SSS-MediComp 2015 Workshop Organizers. 83 - Debby Rahmi Isnaeni, Shuo-Yan Chou, Phan Nguyen Ky Phuc, Cheng-Hung Wu:
Developing Acceptance Policies for a Stochastic Single-Resource Revenue Management Problem. 84-88 - Xiao Song, Feng Li, Lin Zhang:
A Survey and Preliminary Research on Service Federation Based Modeling and Simulation. 89-94 - Xi Meng, Ruifang Shen, Jianqiang Li, Ji-Jiang Yang:
Using a Combination Method of MDS and SOM to Visually Analyze Postpartum Depression Domain. 95
STPSA: Security, Trust and Privacy for Software Applications
- Farzana Rahman, Chunfu Jia:
Message from the STPSA 2015 Workshop Organizers. 96
STPSA Session 1
- Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. 97-103 - Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu:
User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System. 104-109
STPSA Session 2
- Kim T. Le, Parmesh Ramanathan, Kewal K. Saluja:
Privacy Assurance in Data-Aggregation for Multiple MAX Transactions. 110-115 - Jwu Rong Lin, Ching-Yu Chen, Shuo-Chun Weng:
Health Capital Depreciation and Medical Care Demand: An Empirical Study of Taiwan's Senior Citizens. 116-119
ADMNET: Architecture, Design, Deployment and Management of Networks and Applications
- Nariyoshi Yamai, Mario Köppen, Youngseok Lee:
Message from the ADMNET 2015 Workshop Organizers. 120
ADMNET 1
- Leszek Sliwko, Vladimir Getov:
A Meta-Heuristic Load Balancer for Cloud Computing Systems. 121-126 - Tomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin:
Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. 127-132
ADMNET 2
- Yuta Hashimoto, Hiroyuki Ohsaki:
On Estimating Message Diffusion Dynamics in Epidemic Broadcasting. 133-138 - Hiroki Kashiwazaki:
or: How I Learned to Stop Worrying and Love Cloud Computing. 139-140
ADMNET 3
- Hiroshi Otsuka, Yukihiro Watanabe, Yasuhide Matsumoto:
Learning from Before and After Recovery to Detect Latent Misconfiguration. 141-148 - Yoshiaki Kasahara, Takuya Kawatani, Eisuke Ito, Koichi Shimozono, Naomi Fujimura:
Optimization of Storage Quota Based on User's Usage Distribution. 149-154 - Chunghan Lee, Yukihiro Nakagawa, Kazuki Hyoudou, Shinji Kobayashi, Osamu Shiraki, Takeshi Shimizu:
Flow-Aware Congestion Control to Improve Throughput under TCP Incast in Datacenter Networks. 155-162
QUORS: Quality Oriented Reuse of Software
- Xiaodong Liu, Hongji Yang:
Message from the QUORS 2015 Workshop Organizers. 163 - Jingyue Li, Torbjørn Skramstad, Thierry Coq:
Interface Information Management Tools for the Maritime and Oil and Gas Industry. 164-169 - Lung-Pin Chen, Ruey-Kai Sheu, William C. Chu:
Efficient Deployment of Content Applications in a Cloud Environment. 170-174 - Delin Jing, Hongji Yang, Meiyu Shi, Wei Zhu:
Developing a Research Ideas Creation System through Reusing Knowledge Bases for Ontology Construction. 175-180
CDS: Consumer Devices and Systems and WDLMA: Workshop on the Development and Maintenance of Lifelog Mobile Application Software
- Norihiro Ishikawa, Yoshia Saito, Akimitsu Kanzaki, Kazuhiro Kitagawa, Noriko Arai:
Message from the CDS 2015 Workshop Organizers. 181
CDS 1: Smart Home and Smart City
- Yuichi Hashi, Kazuyoshi Matsumoto, Yoshinori Seki, Masahiro Hiji, Toru Abe, Takuo Suganuma:
Data Management Scheme to Enable Efficient Analysis of Sensing Data for Smart Community. 182-187 - Tomotaka Maeda, Hiroki Nakano, Naoyuki Morimoto, Kazumi Sakai, Yasuo Okabe:
Design and Implementation of an On-Demand Home Power Management System Based on a Hierarchical Protocol. 188-193 - Takaaki Ushioda, Motomu Toyokawa, Shigeo Kaneda:
Proposal of Linear Approximation of Household Fuel Cells and Small-Scale Community Energy Management System. 194-199
CDS 2: Systems and Applications for Consumer Devices
- Shohei Saito, Norihiro Ishikawa, Yosuke Tsuchiya:
Development of ECHONET Lite-Compliant Home Appliances Control System Using PUCC Protocols from Smart Devices. 200-204 - Saikat Basu, Robert DiBiano, Manohar Karki, Malcolm Stagg, Jerry Weltman, Supratik Mukhopadhyay, Sangram Ganguly:
An Agile Framework for Real-Time Motion Tracking. 205-210 - Shigeo Kaneda, Yusuke Kubota, Tomohito Kurokawa, Takeshi Furuhata:
Hand-Gesture Recognition System by Using Microwave Doppler Sensors. 211-216 - Chenyi Liao, Kei Hiroi, Katsuhiko Kaji, Nobuo Kawaguchi:
An Event Data Extraction Method Based on HTML Structure Analysis and Machine Learning. 217-222
CDS 3: Mobile Communication and Application / WDLMA
- Takumi Kato, Ryo Chiba, Hideyuki Takahashi, Tetsuo Kinoshita:
Agent-Oriented Cooperation of IoT Devices Towards Advanced Logistics. 223-227 - Kouichi Yasaki, Hidenobu Ito, Kazuaki Nimura:
Dynamic Reconfigurable Wireless Connection between Smartphone and Gateway. 228-233 - Mizuki Sakamoto, Tatsuo Nakajima, Sayaka Akioka:
Design Strategies for Building Mobile Crowdsourcing Services. 234-239 - Jun Lee, Jeonghwan Lee, Sora Lim, Yongjin Kwon:
A Mobile Augmented Reality Service Model Based on Street Data, and Its Implementation. 240-247
NETSAP: Network Technologies for Security, Administration and Protection
- Yoshiaki Hori, Yutaka Miyake, Chung Huang Yang:
Message from the NETSAP 2015 Workshop Organizers. 248 - Cheng-Liang Kuo, Chung-Huang Yang:
Security Design for Configuration Management of Android Devices. 249-254 - Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, Yi-Fan Tseng:
Malware Detection Systems Based on API Log Data Mining. 255-260 - Jema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi:
Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication. 261-267 - Zhipeng Yi, Tadashi Dohi:
A Simulation Approach to Quantify Network Survivability on MANETs. 268-273
ESAS: E-Health Systems and Semantic Web
- Atilla Elçi, Duygu Çelik:
Message from the ESAS 2015 Workshop Organizers. 274-275
ESAS 1
- Satriya Dinata, Anindhita Dewabharata, Shuo-Yan Chou:
An Ontology-Enabled Service Discovery for Supporting Health Promotion System. 276-281 - Ruiqi Shi, Zhang Chen, Haidong Wang, Peng Sun, Timothy Trull, Yi Shang:
mAAS - A Mobile Ambulatory Assessment System for Alcohol Craving Studies. 282-287 - Letong Feng, Yanqing Li, Lin Liu, Xiaojun Ye, Jianmin Wang, Zhanqiang Cao, Xin Peng:
Towards an Applied Oral Health Ontology: A Round Trip between Clinical Data and Experiential Medical Knowledge. 288-295
SIMICE: Secure Identity Management in the Cloud Environment
- Bian Yang, Julien Bringer:
Message from the SIMICE 2015 Workshop Organizers. 296 - Yi-Ching Liao, Hanno Langweg:
Developing Metrics for Surveillance Impact Assessment. 297-302 - Qiong Li, Shuming Wang, Haokun Mao, Qi Han, Xiamu Niu:
An Adaptive Improved Winnow Algorithm. 303-306 - Yi-Jia Zhang, Rui-Ying Liu, Zhong-Jian Kang, Han Qi:
A Security Protocol Applied to Covert Communication Platform and Its Formal Analysis. 307-311 - Bian Yang, Edlira Martiri:
Using Honey Templates to Augment Hash Based Biometric Template Protection. 312-316
UCDAS 2015: The Second IEEE International Workshop on User Centered Design and Adaptive Systems
- Reyes Juárez-Ramírez, Andrés Mejía-Figueroa:
Message from the UCDAS 2015 Workshop Organizers. 317
UCDAS Session 1
- Asanga Nimalasena, Vladimir Getov:
Context-Aware Framework for Performance Tuning via Multi-action Evaluation. 318-323 - Hyo-Cheol Lee, Seok-Won Lee:
Decision Supporting Approach under Uncertainty for Feature-Oriented Adaptive System. 324-329 - Kwan-Hong Lee, Seok-Won Lee:
Applying Game Theoretic Approach to Goal-Driven Requirements Trade-Off Analysis for Self-Adaptation. 330-335
UCDAS Session 2
- Dongning Yan:
Experiment on Multi-attribute Sorting Panel in E-commerce. 336-341
SSERV: The Second IEEE International Workshop on Social Services through Human and Artificial Agent Models
- Takao Terano:
Message from the SSERV 2015 Workshop Organizer. 342
SSERV 1
- Yoshiaki Ono, Setsuya Kurahashi:
Cost Efficiency of Web Systems in Municipal Governments of Japan. 343-348 - Kyoko Yanagihori, Kazuhiko Tsuda:
Verification of Patent Document Similarity of Using Dictionary Data Extracted from Notification of Reasons for Refusal. 349-354 - P. Govind Raj, Subrat Kar:
Design and Development of a Distributed Mobile Sensing Based Crowd Evacuation System: A Big Actor Approach. 355-360
SSERV 2
- Hiroshi Takahashi:
Analyzing the Validity of Smart Beta in Financial Markets through Agent-Based Modeling. 361-366 - Makoto Sonohara, Yoshinori Natsume, Toshiyuki Kaneda:
A Study on Shop-Around Agent Simulation Considering Attractiveness for Impulse Stop. 367-372
MVDA: Modeling and Verifying of Distributed Applications
- Leila Jemni Ben Ayed, Fevzi Belli, Ahlem Ben Younes, Yousra Bendaly Hlaoui:
Message from the MVDA 2015 Workshop Organizers. 373-374
MVDA 1
- Handoko, Janusz R. Getta:
Dynamic Query Scheduling for Online Integration of Semistructured Data. 375-380 - Woorim Choi, Yeongbok Choe, Moonkun Lee:
A Reduction Method for Process and System Complexity with Conjunctive and Complement Choices in a Process Algebra. 381-386 - Fahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Personalized and Generic E-assessment Process Based on Cloud Computing. 387-392
MVDA 2
- Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed:
Dynamic Data Replication-Driven Model in Data Grids. 393-397 - Kais Klai, Hanen Ochi:
LTL Model Cheking of Service-Based Business Processes in the Cloud. 398-403 - Imen Ben Fraj, Yousra Bendaly Hlaoui, Ahlem Ben Younes, Leila Jemni Ben Ayed:
Towards to Compose Cloud Service Flexible Workflow Applications. 404-409
MVDA 3
- Samia Bachir, Lilia Cheniti-Belcadhi, Serge Garlatti:
Enhanced Scenario Model for Peer Assessment in iMOOCs Based on Semantic Web. 410-415
STA: The Seventh IEEE International Workshop on Software Test Automation
- Fevzi Belli, Rajesh Subramanyan:
Message from the STA 2015 Workshop Organizers. 416
STA 1: Formal Methods in Practice
- Zhanwei Hui, Song Huang, Hui Li, Jianhao Liu, Li-Ping Rao:
Measurable Metrics for Qualitative Guidelines of Metamorphic Relation. 417-422 - Harald A. Stieber:
Estimating the Total Number of Software Faults Reliability Models and Mutation Testing a Bayesian Approach. 423-426 - Tolga Ayav, Tugkan Tuglular, Fevzi Belli:
Model Based Testing of VHDL Programs. 427-432
STA 2: Analysis and Synthesis
- Sungwon Kang, Haeun Baek, Jungmin Kim, Jihyun Lee:
Systematic Software Product Line Test Case Derivation for Test Data Reuse. 433-440 - Astrid Younang, Lunjin Lu:
Improving Precision of Java Script Program Analysis with an Extended Domain of Intervals. 441-446 - Chao-Chun Yeh, Shih-Kun Huang:
CovDroid: A Black-Box Testing Coverage System for Android. 447-452
IWSC: Software Cybernetics
- Stephen S. Yau, Wei-Tek Tsai, Kenji Takahashi, Xiaoying Bai, Helen D. Karatza:
Message from the IWSC 2015 Workshop Organizers. 453 - Yang Cao, Chung-Horng Lung, Samuel A. Ajila:
Constraint-Based Multi-Tenant SaaS Deployment Using Feature Modeling and XML Filtering Techniques. 454-459 - Duo Liu, Chung-Horng Lung, Samuel A. Ajila:
Adaptive Clustering Techniques for Software Components and Architecture. 460-465 - Ye Li, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai:
Approach for Test Profile Optimization in Dynamic Random Testing. 466-471 - Kejia Hou, Jun Huang, Xiaoying Bai:
Geographical Test Data Generation by Simulated-Annealing. 472-477
BIOT: Big Data Management for the Internet of Things
- Hideya Ochiai, Susumu Takeuchi, Kurt Geihs, Ting-Yun Chi:
Message from the BIOT 2015 Workshop Organizers. 478
BIOT 1
- Yashuchika Fujiwara, Keiji Yamada, Kenichi Tabata, Michio Oda, Kazuo Hashimoto, Takuo Suganuma, Abdur Rahim Biswas, Panagiotis Vlacheas, Vera Stavroulaki, Dimitris Kelaidonis, Andreas Georgakopoulos:
Context Aware Services: A Novel Trend in IoT Based Research in Smart City Project. 479-480 - Chian C. Ho, River Lee:
Real-Time Indoor Positioning System Based on RFID Heron-Bilateration Location Estimation and IMU Inertial-Navigation Location Estimation. 481-486 - Dongyu Wang, Dixon Lo, Janak Bhimani, Kazunori Sugiura:
AnyControl - IoT Based Home Appliances Monitoring and Controlling. 487-492
BIOT 2
- Amir Atabekov, Marcel Starosielsky, Dan Chia-Tien Lo, Jing (Selena) He:
Internet of Things-Based Temperature Tracking System. 493-498 - Christian Prehofer, Luca Chiarabini:
From Internet of Things Mashups to Model-Based Development. 499-504 - Hiroyuki Ikegami, Raja Vara Prasad Yerra, Pachamuthu Rajalakshmi, Hiroshi Esaki:
Real Time Power Capping with Smart Circuit Breaker to Maximize Power Utilization of Local Generator. 505-510 - Raja Vara Prasad Yerra, Pachamuthu Rajalakshmi:
Neural Network Based Short Term Forecasting Engine to Optimize Energy and Big Data Storage Resources of Wireless Sensor Networks. 511-516
BIOT 3
- Preecha Khawsa-Ard, Chaodit Aswakul:
IEEE1888 Interactive Display as a Service (IDaaS): Example in Building Energy Management System. 517-522 - Hiroyuki Ohsaki, Yoichi Nakamoto, Nobuhiro Yokoi, Hirotaka Moribe:
Performance Comparison of IP and CCN as a Communication Infrastructure for Smart Grid. 523-528 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:
A Node Replication Method to Guarantee Reachability for P2P Sensor Data Stream Delivery System on Heterogeneous Churn Situations. 529-534
DSA: Dependable Software and Applications
- Baowen Xu:
Message from the DSA 2015 Workshop Organizer. 535
DSA 1
- Ya Wang, Rui Wang, Yong Guan, Xiaojuan Li, Hongxing Wei, Jie Zhang:
Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System. 536-541 - Xiaobin Zhao, Zan Wang, Xiangyu Fan, Zhenhua Wang:
A Clustering-Bayesian Network Based Approach for Test Case Prioritization. 542-547 - Xiaohong Zhang, Ziyuan Wang, Weifeng Zhang, Hui Ding, Lin Chen:
Spectrum-Based Fault Localization Method with Test Case Reduction. 548-549 - Toshifusa Sekizawa, Fumiya Otsuki, Kazuki Ito, Kozo Okano:
Behavior Verification of Autonomous Robot Vehicle in Consideration of Errors and Disturbances. 550-555
DSA 2
- Yue Wang, Zheng Li, Ruilian Zhao:
Dependence Based Model-Healing. 556-561 - Rong Gu, Yun Tang, Qianhao Dong, Zhaokang Wang, Zhiqiang Liu, Shuai Wang, Chunfeng Yuan, Yihua Huang:
Unified Programming Model and Software Framework for Big Data Machine Learning and Data Analytics. 562-567 - Chunlei Ma, Xiang Long, Bo Jiang, Zhenyu Zhang:
Replay Debugging of Real-Time Vxworks Applications. 568-573 - Huiqun Zhao, Jing Sun, Ruixue Zhao:
A Model for Assessing the Dependability of Internetware Software Systems. 578-581 - Danni Yu, Qingshan Li, Lu Wang, Yishuai Lin:
An Agent-Based Self-Adaptive Mechanism with Reinforcement Learning. 582-585
DSA 3
- Shin Nakajima:
Analyzing Lifecycle Behavior of Android Application Components. 586-591 - He Jiang, Xin Chen, Shuwei Zhang, Xin Zhang, Weiqiang Kong, Tao Zhang:
Software for Wearable Devices: Challenges and Opportunities. 592-597 - Win-Tsung Lo, Xiao-Long Liu, Ruey-Kai Sheu, Shyan-Ming Yuan, Chun-Yu Chang:
An Architecture for Cloud Service Testing and Real Time Management. 598-603 - Yaohui Wang, Dan Wang, Wenbing Zhao, Yuan Liu:
Detecting SQL Vulnerability Attack Based on the Dynamic and Static Analysis Technology. 604-607
Student Research Symposium
- W. Eric Wong:
Message from the Chair of the Student Research Symposium. 608 - Keita Mori, Osamu Mizuno:
An Implementation of Just-in-Time Fault-Prone Prediction Technique Using Text Classifier. 609-612 - Yu-Chung Huang, Jehn-Ruey Jiang:
Ultralightweight RFID Reader-Tag Mutual Authentication. 613-616 - Misako Seki, Kazumine Ogura, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Performance Comparison of Geographic DTN Routing Algorithms. 617-620 - Ryo Nakamura, Hiroyuki Ohsaki:
Performance Evaluation of an Open-Source Implementation of Content-Centric Networking. 621-624 - Labiblais Rahman:
Detecting MITM Based on Challenge Request Protocol. 625-626 - Chien-Chih Chen, Chao-Tung Yang, Shuo-Tsung Chen, Fang-Yie Leu, Jung-Chun Liu:
Construction of a Green Power Virtual Machine Management Method on OpenStack. 627-630 - Yao-Yu Yang, Chao-Tung Yang, Shuo-Tsung Chen, Wei-Hsun Cheng, Fuu-Cheng Jiang:
Implementation of Network Traffic Monitor System with SDN. 631-634
Fast Abstracts
- Hossain Shahriar, Stelvio Cimato, Jingyu Zhou, Katsuyoshi Iida:
Message from the Fast Abstract Chairs. 635
FA1: Cloud and Big Data
- Thanh An Nguyen Thi, Yaw-Chung Chen:
Design and Development of a Cloud-Based Trip-Tracking System. 636-637 - Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:
Fast and Cost-Effective Load Balancing Method for Range Queriable Cloud Storage. 638-639 - Ryota Ishikawa, Katsuyoshi Iida, Hiroyuki Koga, Masayoshi Shimamura:
Improved Handover Using Cloud Control in Heterogeneous Wireless Networks. 640-641 - Jae-Ik Kim, Kyung-Wook Park, Hyung-Rak Jo, Dong-Ho Lee:
Semantic Enriched Category Recommendation System for Large-Scale Emails Exploiting Big Data Processing Technologies. 642-643 - Hyung-Rak Jo, Kyung-Wook Park, Jae-Ik Kim, Dong-Ho Lee:
A Semantic Category Recommendation System Exploiting LDA Clustering Algorithm and Social Folksonomy. 644-645
FA2: Distributed Systems and Applications
- Kazuki Matsushita, Masashi Nishimine, Kazunori Ueda:
Cooperative Cache Distribution System for Virtual P2P Web Proxy. 646-647 - Hyun-Ki Hong, Kyung-Wook Park, Dong-Ho Lee:
A Novel Semantic Tagging Technique Exploiting Wikipedia-Based Associated Words. 648-649 - In-Su Kang, Bo-Kyeong Kim, Dong-Ho Lee:
A Read-Optimized Index Structure for Distributed Log-Structured Key-Value Store. 650-651 - Yusuke Sakumoto, Hiroyuki Ohsaki:
On the Impact of Scale-Free Structure on End-to-End TCP Performance. 652-653 - Gun-Woo Kim, Kyung-Wook Park, Dong-Ho Lee:
A Semantic-Based Health Advising System Exploiting Web-Based Personal Health Record Services. 654-655 - Dong Xu, Jingjing Wang:
Using Binding Bigraphs to Model Context-Aware Adaptive Applications. 656-657
FA3: Software and Testing
- Clare McInerney, Tiziana Margaria:
Software as a High-Tech Weapon in Ireland's Strategy. 658-663 - Weiwei Du, Motoyuki Ozeki, Hiroki Nomiya, Kazuyoshi Murata, Masahiro Araki:
Pair Programming for Enhancing Communication in the Fundamental C Language Exercise. 664-665 - Haegeon Jeong, Jiwoong Won, Jaemyoun Lee, Kyungtae Kang, Junhee Ryu:
Breakpoint-Based Lightweight Prefetching to Improve Application Response. 666-667 - Satoshi Kawai, Saeko Matsuura:
Model Driven Development by Separating Concerns in UML Requirements Specification. 668-669 - Alice Barana, Marina Marchisio, Sergio Rabellino:
Automated Assessment in Mathematics. 670-671 - Haruto Tanno, Xiaojing Zhang:
Test Script Generation Based on Design Documents for Web Application Testing. 672-673
FA4: Security and Privacy
- Hikaru Ichise, Yong Jin, Katsuyoshi Iida:
Detection Method of DNS-based Botnet Communication Using Obtained NS Record History. 676-677 - L. Roger Yin, Jiazhen Zhou, Maxwell K. Hsu:
Redesigning QR Code Ecosystem with Improved Mobile Security. 678-679 - Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
A KEM/DEM-Based Construction for Secure and Anonymous Communication. 680-681 - Ikuo Nakagawa, Yoshifumi Hashimoto, Mitsuharu Goto, Masahiro Hiji, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo:
DHT Extension of m-Cloud - Scalable and Distributed Privacy Preserving Statistical Computation on Public Cloud. 682-683 - Alfredo Cuzzocrea:
Provenance Research Issues and Challenges in the Big Data Era. 684-686 - Bayu Tenoyo, Petrus Mursanto:
Concept Representation and Its Role in Artifact Development. 687-692
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.