


default search action
29th SAC 2014: Gyeongju, Korea
- Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong: 
 Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014. ACM 2014, ISBN 978-1-4503-2469-4
Volume I: Artificial intelligence & agents, distributed systems, and information systems: BioHealth informatics track
- Amiya Patanaik, Vitali Zagorodnov, Chee-Keong Kwoh: 
 Parameter estimation and simulation for one-choice Ratcliff diffusion model. 3-7
- Arpan Pal  , Aishwarya Visvanathan, Anirban Dutta Choudhury, Aniruddha Sinha , Aishwarya Visvanathan, Anirban Dutta Choudhury, Aniruddha Sinha : :
 Improved heart rate detection using smart phone. 8-13
- Udaya Kiran Tupakula, Vijay Varadharajan  : :
 Secure monitoring for dementia patients. 14-19
- S. Graziadio, Richard Davison, K. Shalabi, K. M. A. Sahota, Gary Ushaw, Graham Morgan  , J. A. Eyre: , J. A. Eyre:
 Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation. 20-24
- Lenardo Chaves e Silva  , Mirko Barbosa Perkusich, Frederico M. Bublitz, Hyggo O. Almeida , Mirko Barbosa Perkusich, Frederico M. Bublitz, Hyggo O. Almeida , Angelo Perkusich , Angelo Perkusich : :
 A model-based architecture for testing medical cyber-physical systems. 25-30
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Byung K. Jung, Sung Y. Shin, Wei Wang, Hyung Do Choi, Jeong-Ki Pack: 
 Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate. 31-32
- Huan Chen, Guo-Tan Liao, Yao-Chung Fan, Bo-Chao Cheng, Cheng-Min Chen, Ting-Chun Kuo: 
 Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology. 33-35
- Augusto Klinger, Guilherme L. de Lima, Valter Roesler, G. Maron, Guilherme Longoni, V. Goulart, F. S. dos Santos, M. D. Ferreira, M. B. Mariano: 
 A low cost digital operating room. 36-37
Volume I: Artificial intelligence & agents, distributed systems, and information systems: computational intelligence and video & image analysis track
- Carolina Toledo Ferraz  , Osmando Pereira Jr., Adilson Gonzaga , Osmando Pereira Jr., Adilson Gonzaga : :
 Feature description based on center-symmetric local mapped patterns. 39-44
- César L. Blum Silveira, Fabio de Oliveira Mierlo, Luiz Gonzaga Jr.  , Cristiano André da Costa , Cristiano André da Costa , Kleinner Farias , Kleinner Farias , Rodrigo da Rosa Righi: , Rodrigo da Rosa Righi:
 Faster seam carving with minimum energy windows. 45-48
- Carlos Caetano  , Sandra Eliza Fontes de Avila , Sandra Eliza Fontes de Avila , Silvio Jamil Ferzoli Guimarães, Arnaldo de Albuquerque Araújo: , Silvio Jamil Ferzoli Guimarães, Arnaldo de Albuquerque Araújo:
 Representing local binary descriptors with BossaNova for visual recognition. 49-54
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Cleber Zanchettin  : :
 Face recognition based on global and local features. 55-57
- N. Ramalingeswara Swamy, Saiful Islam, Phalguni Gupta: 
 Two level reversible data hiding in 2D images. 58-59
- Virginia O. Andersson  , Rafael Dutra, Ricardo Matsumura de Araújo: , Rafael Dutra, Ricardo Matsumura de Araújo:
 Anthropometric and human gait identification using skeleton data from Kinect sensor. 60-61
Volume I: Artificial intelligence & agents, distributed systems, and information systems: data mining track
- Hai-Guang Li, Xindong Wu, Zhao Li: 
 Online learning with mobile sensor data for user recognition. 64-70
- Stephan Spiegel, Brijnesh Johannes Jain, Sahin Albayrak  : :
 Fast time series classification under lucky time warping distance. 71-78
- Rafael Geraldeli Rossi  , Alneu de Andrade Lopes, Solange O. Rezende , Alneu de Andrade Lopes, Solange O. Rezende : :
 A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification. 79-84
- Hao Huang, Shinjae Yoo  , Konstantine Kaznatcheev, Kevin G. Yager , Konstantine Kaznatcheev, Kevin G. Yager , Fang Lu, Dantong Yu, Oleg Gang , Fang Lu, Dantong Yu, Oleg Gang , Andrei Fluerasu, Hong Qin: , Andrei Fluerasu, Hong Qin:
 Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles. 85-90
- Cheng Chen, Lan Zheng, Alex Thomo  , Kui Wu, Srinivasan Venkatesh: , Kui Wu, Srinivasan Venkatesh:
 Comparing the staples in latent factor models for recommender systems. 91-96
- Zhao Li, Xindong Wu: 
 Single multiplicatively updated matrix factorization for co-clustering. 97-104
- Christian Hundt, Bertil Schmidt, Elmar Schömer, Herbert Göttler, Hoang-Vu Dang: 
 GEM: an elastic and translation-invariant similarity measure with automatic trend adjustment. 105-112
- Sara Hajian, Anna Monreale  , Dino Pedreschi , Dino Pedreschi , Josep Domingo-Ferrer , Josep Domingo-Ferrer , Fosca Giannotti: , Fosca Giannotti:
 Fair pattern discovery. 113-120
- Madeleine Seeland, Andreas Karwath  , Stefan Kramer: , Stefan Kramer:
 Structural clustering of millions of molecular graphs. 121-128
- Madeleine Seeland, Andreas Maunz, Andreas Karwath  , Stefan Kramer: , Stefan Kramer:
 Extracting information from support vector machines for pattern-based classification. 129-136
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Zhongyi Hu, Hongan Wang, Jiaqi Zhu: 
 The discovery of user related rare sequential patterns of topics in the internet document stream. 137-138
Volume I: Artificial intelligence & agents, distributed systems, and information systems: applications of evolutionary computing track
- Chanju Jung, Yong-Hyuk Kim, Yourim Yoon  , Byung Ro Moon: , Byung Ro Moon:
 Investigation of hungarian mating schemes for genetic algorithms. 140-147
- Valéria de Carvalho Santos, Daniel Oliva Sales, Claudio Fabiano Motta Toledo, Fernando Santos Osório  : :
 A hybrid GA-ANN approach for autonomous robots topological navigation. 148-153
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Hao Wang  , Michael Emmerich, Thomas Bäck , Michael Emmerich, Thomas Bäck : :
 Mirrored orthogonal sampling with pairwise selection in evolution strategies. 154-156
- Andrea Cani, Marco Gaudesi, Ernesto Sánchez  , Giovanni Squillero, Alberto Paolo Tonda: , Giovanni Squillero, Alberto Paolo Tonda:
 Towards automated malware creation: code generation and code integration. 157-160
Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart human computer interaction track
- Markus Kleffmann, Matthias Book  , Erik Hebisch, Volker Gruhn: , Erik Hebisch, Volker Gruhn:
 Automated versioning and temporal navigation for model sketches on large interactive displays. 161-168
- Tiago Gomes, Tiago Abade, José Creissac Campos  , Michael D. Harrison , Michael D. Harrison , José Luís Silva , José Luís Silva : :
 Rapid development of first person serious games using the APEX platform: the asthma game. 169-174
- Paul Kim, Sangwook Kim: 
 A detection of overlapping community in mobile social network. 175-179
- Jung Pil Park, Min Woo Park  , Soon Ki Jung , Soon Ki Jung : :
 QR-code based online robot augmented reality system for education. 180-185
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- David Alonso-Ríos  , David Raneburger, Roman Popp , David Raneburger, Roman Popp , Hermann Kaindl , Hermann Kaindl , Jürgen Falb: , Jürgen Falb:
 A user study on tailoring GUIs for smartphones. 186-192
- Arisa Sakamoto, Takuya Katayama, Tsutomu Terada  , Masahiko Tsukamoto: , Masahiko Tsukamoto:
 Method for visualizing undone operations based on changes on desktop screen. 193-195
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- David Hundely A: 
 Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks. 196-197
Volume I: Artificial intelligence & agents, distributed systems, and information systems: intelligent information fusion track
- Holger Billhardt  , Marin Lujak , Marin Lujak , Sascha Ossowski , Sascha Ossowski , Ralf Bruns , Ralf Bruns , Jürgen Dunkel: , Jürgen Dunkel:
 Intelligent event processing for emergency medical assistance. 200-206
- Rodrigo Calvo, Janderson de Oliveira, Maurício F. Figueiredo, Roseli Aparecida Francelin Romero: 
 Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasks. 207-212
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Sigeru Omatu, Mitsuaki Yano: 
 Smell classification using weakly responding data. 213-214
Volume I: Artificial intelligence & agents, distributed systems, and information systems: intelligent and interactive learning environments track
- Simone de Sousa Borges  , Vinicius H. S. Durelli, Helena Macedo Reis , Vinicius H. S. Durelli, Helena Macedo Reis , Seiji Isotani , Seiji Isotani : :
 A systematic mapping on gamification applied to education. 216-222
- Alexandre Martins dos Anjos, Romero Tori  , Anderson Castro, Soares de Oliveira, Fátima L. S. Nunes , Anderson Castro, Soares de Oliveira, Fátima L. S. Nunes : :
 Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments. 223-228
- Ranilson Oscar Araújo Paiva, Daniel Borges, Jário José Santos, Ig Ibert Bittencourt  , Alan Pedro da Silva: , Alan Pedro da Silva:
 Lessons learned from an online open course: a Brazilian case study. 229-234
- Henrique M. Seffrin, Geiseane L. Rubi, Patrícia Augustin Jaques  : :
 A dynamic bayesian network for inference of learners' algebraic knowledge. 235-240
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Elaine H. T. Oliveira, Erika H. Nozawa, Rosa Maria Vicari: 
 Towards a framework for relevant guidance. 241-242
- Laci Mary Barbosa Manhães  , Sérgio Manuel Serra da Cruz, Geraldo Zimbrão: , Sérgio Manuel Serra da Cruz, Geraldo Zimbrão:
 WAVE: an architecture for predicting dropout in undergraduate courses using EDM. 243-247
Volume I: Artificial intelligence & agents, distributed systems, and information systems: recommender systems: theory and applications track
- Guibing Guo, Jie Zhang, Daniel Thalmann, Anirban Basu, Neil Yorke-Smith: 
 From ratings to trust: an empirical study of implicit trust in recommender systems. 248-253
- Di Wang, Jun Ma, Tao Lian, Lei Guo: 
 Recommendation based on weighted social trusts and item relationships. 254-259
- Tianjian Chen, Jing Cai, Hao Wang, Yu Dong: 
 Instant expert hunting: building an answerer recommender system for a large scale Q&A website. 260-265
- Shang Shang, Yuk Hui, Pan Hui, Paul Cuff, Sanjeev R. Kulkarni: 
 Beyond personalization and anonymity: towards a group-based recommender system. 266-273
- Yong Zheng, Robin D. Burke  , Bamshad Mobasher , Bamshad Mobasher : :
 Splitting approaches for context-aware recommendation: an empirical study. 274-279
- Afshin Moin: 
 A unified approach to collaborative data visualization. 280-286
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, Yutaka Miyake: 
 PrefRank: fair aggregation of subjective user preferences. 287-288
- Reudismam Rolim de Sousa  , Felipe Barbosa Araújo Ramos, Antonio Alexandre Moura Costa, Giovanni Calheiros, Hyggo Oliveira de Almeida , Felipe Barbosa Araújo Ramos, Antonio Alexandre Moura Costa, Giovanni Calheiros, Hyggo Oliveira de Almeida , Angelo Perkusich , Angelo Perkusich , Aldenor Falcao Martins: , Aldenor Falcao Martins:
 A recommendation approach for digital TV systems based on multimodal features. 289-291
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- Yong Zheng: 
 Semi-supervised context-aware matrix factorization: using contexts in a way of "latent" factors. 292-293
Volume I: Artificial intelligence & agents, distributed systems, and information systems: the semantic web and applications track
- Elie Raad, Joerg Evermann: 
 Is ontology alignment like analogy?: knowledge integration with LISA. 294-301
- Giovanni Sá, Thiago Silveira, Rodrigo Chaves, Felipe Teixeira, Fernando Mourão, Leonardo Rocha  : :
 LEGi: context-aware lexicon consolidation by graph inspection. 302-307
- Matthias Klusch, Ankush Prabhu Meshram, Patrick Kapahnke, Andreas Schütze  : :
 ICM-Wind: semantics-empowered fluid condition monitoring of wind turbines. 308-315
- Vânia Maria Ponte Vidal, Marco A. Casanova, Luís Eufrasio T. Neto, José Maria Monteiro: 
 A semi-automatic approach for generating customized R2RML mappings. 316-322
- Ricardo de Almeida Falbo, Fabiano Borges Ruy, Giancarlo Guizzardi  , Monalessa Perini Barcellos , Monalessa Perini Barcellos , João Paulo Andrade Almeida , João Paulo Andrade Almeida : :
 Towards an enterprise ontology pattern language. 323-330
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Duck-Ho Bae, Jong-Min Lee, Sang-Wook Kim, Youngjoon Won, Yongsu Park: 
 Analyzing network privacy preserving methods: a perspective of social network characteristics. 331-332
- Muntazir Mehdi, Aftab Iqbal, Ali Hasnain  , Yasar Khan , Yasar Khan , Stefan Decker , Stefan Decker , Ratnesh Sahay: , Ratnesh Sahay:
 Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case. 333-335
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cloud computing track
- Kristian Beckers, Isabelle Côté, Ludger Goeke: 
 A catalog of security requirements patterns for the domain of cloud computing systems. 337-342
- Donia El Kateb, François Fouquet, Grégory Nain  , Jorge Augusto Meira , Jorge Augusto Meira , Michel Ackerman, Yves Le Traon: , Michel Ackerman, Yves Le Traon:
 Generic cloud platform multi-objective optimization leveraging models@run.time. 343-350
- Sérgio Manuel Serra da Cruz, Laci Mary M. Barbosa, Jorge Zavaleta  , Raimundo Macário Costa, Maria Luiza Machado Campos: , Raimundo Macário Costa, Maria Luiza Machado Campos:
 Collecting cloud provenance metadata with Matriohska: a case study with genomic workflows. 351-356
- Kelie Zhan, Chung-Horng Lung, Pradeep Srivastava: 
 A green analysis of mobile cloud computing applications. 357-362
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Abdulaziz Alabdulhafez, Paul D. Ezhilchelvan  : :
 Experimenting on virtual machines co-residency in the cloud: a comparative study of available test beds. 363-365
- Miguel G. Xavier, Israel C. De Oliveira, Robson D. Dos Passos, César A. F. De Rose  : :
 Towards better manageability of database clusters on cloud computing platforms. 366-367
Volume I: Artificial intelligence & agents, distributed systems, and information systems: dependable and adaptive distributed systems track
- Nuno Lourenco Diegues, Muhammet Orazov, João Paiva, Luís E. T. Rodrigues, Paolo Romano  : :
 Autonomic configuration of HyperDex via analytical modelling. 370-375
- Javier Cámara, Rogério de Lemos, Nuno Laranjeiro  , Rafael Ventura, Marco Vieira , Rafael Ventura, Marco Vieira : :
 Robustness evaluation of the rainbow framework for self-adaptation. 376-383
- Hélène Martorell, Jean-Charles Fabre, Matthieu Roy, Régis Valentin: 
 Improving adaptiveness of AUTOSAR embedded applications. 384-390
- Filip Krikava  , Philippe Collet, Robert B. France: , Philippe Collet, Robert B. France:
 ACTRESS: domain-specific modeling of self-adaptive software architectures. 391-398
- Francisco Cruz  , Francisco Maia , Francisco Maia , Rui Oliveira , Rui Oliveira , Ricardo Vilaça , Ricardo Vilaça : :
 Workload-aware table splitting for NoSQL. 399-404
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Sandip Chakraborty, Suchetana Chakraborty, Sushanta Karmakar, Hridoy Sankar Dutta: 
 Hierarchical topology adaptation for distributed convergecast applications. 405-407
- Tao Wang, Ke Zhang, Lianglun Cheng: 
 An energy-aware service composition framework for service-oriented wireless sensor networks. 408-410
Volume I: Artificial intelligence & agents, distributed systems, and information systems: mobile computing and applications track
- Keling Da, Marc Dalmau, Philippe Roose: 
 Kalimucho: middleware for mobile applications. 413-419
- Tobias Griebe, Volker Gruhn: 
 A model-based approach to test automation for context-aware mobile applications. 420-427
- Yoshihide Hosokawa, Yuichiro Nakazawa, Takanori Yamamoto: 
 Location-aware information retrieval for identifying local and distant landmark. 428-435
- Sanjin Sehic, Stefan Nastic  , Michael Vögler, Fei Li, Schahram Dustdar , Michael Vögler, Fei Li, Schahram Dustdar : :
 Entity-adaptation: a programming model for development of context-aware applications. 436-443
- Mohammad Adibuzzaman, Sheikh Iqbal Ahamed, Richard Love: 
 A personalized model for monitoring vital signs using camera of the smart phone. 444-449
- Chung Le: 
 A model driven framework for modeling and composing service based Android applications. 450-457
- Jose Luis Fernandez-Marquez  , Giovanna Di Marzo Serugendo , Giovanna Di Marzo Serugendo , Graeme Stevenson , Graeme Stevenson , Juan Ye , Juan Ye , Simon Dobson , Simon Dobson , Franco Zambonelli , Franco Zambonelli : :
 Self-managing and self-organising mobile computing applications: a separation of concerns approach. 458-465
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Danilo F. S. Santos  , Frederico Bublitz, Hyggo O. Almeida , Frederico Bublitz, Hyggo O. Almeida , Angelo Perkusich , Angelo Perkusich : :
 Integrating IEEE 11073 and constrained application protocol for personal health devices. 466-467
- Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love: 
 Smartphone based multimodal activity detection system using plantar pressure sensors. 468-469
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- A. K. M. Jahangir Alam Majumder: 
 A real-time smartphone- and smartshoe-based fall prevention system. 470-471
Volume I: Artificial intelligence & agents, distributed systems, and information systems: networking track
- Johan Mazel, Romain Fontugne, Kensuke Fukuda: 
 Visual comparison of network anomaly detectors with chord diagrams. 473-480
- Niels Zeilemaker, Boudewijn Schoon, Johan A. Pouwelse  : :
 Large-scale message synchronization in challenged networks. 481-488
- Rafael L. Gomes  , Luiz F. Bittencourt, Edmundo R. M. Madeira , Luiz F. Bittencourt, Edmundo R. M. Madeira : :
 A similarity model for virtual networks negotiation. 489-494
- Sheng-Wei Wang  , Chin-Yen Wen: , Chin-Yen Wen:
 Wavelength resources based lightpath-level active rerouting in all-optical WDM networks. 495-500
- Riccardo Petrocco, Mihai Capota  , Johan A. Pouwelse , Johan A. Pouwelse , Dick H. J. Epema: , Dick H. J. Epema:
 Hiding user content interest while preserving P2P performance. 501-508
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Chenyang Liu, Jian Cao, Frédéric Le Mouël: 
 A low-latency service composition approach in mobile ad hoc networks. 509-511
Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grid and smart technologies track
- Zhenzhou Peng, Shinjae Yoo  , Dantong Yu, Dong Huang, Paul Kalb , Dantong Yu, Dong Huang, Paul Kalb , John Heiser: , John Heiser:
 3D cloud detection and tracking for solar forecast using multiple sky imagers. 512-517
- Giorgos Georgiadis, Marina Papatriantafilou  : :
 Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithm. 518-524
- Edgar Galván López  , Adam Taylor, Siobhán Clarke , Adam Taylor, Siobhán Clarke , Vinny Cahill: , Vinny Cahill:
 Design of an automatic demand-side management system based on evolutionary algorithms. 525-530
- Pedro Barbosa, Andrey Brito, Hyggo O. Almeida  , Sebastian Clauß: , Sebastian Clauß:
 Lightweight privacy for smart metering data by adding noise. 531-538
- Ting Liu, Yuhong Gui, Yanan Sun, Yang Liu, Yao Sun, Feng Xiao: 
 SEDE: state estimation-based dynamic encryption scheme for smart grid communication. 539-544
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Teklemariam Tsegay Tesfay, Jean-Pierre Hubaux, Jean-Yves Le Boudec, Philippe Oechslin: 
 Cyber-secure communication architecture for active power distribution networks. 545-552
- Stephan Spiegel, Sahin Albayrak  : :
 Energy disaggregation meets heating control. 559-566
- Kala Fleming, Komminist Weldemariam, Haggai Wangusi, Osamuyimen Stewart: 
 Monitoring water scarcity risk in Africa. 567-568
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- Siyun Chen: 
 Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building. 569-570
Volume I: Artificial intelligence & agents, distributed systems, and information systems: social network and media analysis track
- J. Octavio Gutiérrez-García  , Andrés Gómez de Silva Garza: , Andrés Gómez de Silva Garza:
 Multi-agent simulation of perception of safety from crime. 573-578
- Thomas Largillier, Guillaume Peyronnet, Sylvain Peyronnet: 
 Rocovo: robust communal publication scheme. 579-586
- Eva Zangerle, Günther Specht: 
 "Sorry, I was hacked": a classification of compromised twitter accounts. 587-593
- Seok-Ho Yoon, Ji-Soo Kim, Jiwoon Ha, Sang-Wook Kim, Minsoo Ryu, Ho Jin Choi: 
 Reachability vectors: features for link-based similarity measures. 594-597
- Marisa A. Vasconcelos  , Jussara M. Almeida, Marcos André Gonçalves , Jussara M. Almeida, Marcos André Gonçalves : :
 What makes your opinion popular?: predicting the popularity of micro-reviews in foursquare. 598-603
- Basma Alharbi  , Xiangliang Zhang , Xiangliang Zhang : :
 Exploring the significance of human mobility patterns in social link prediction. 604-609
- Yao-Chung Fan  , Huan Chen: , Huan Chen:
 An approximate framework for scaling social influence computation in large networks. 610-615
- Valerio Arnaboldi  , Marco Conti , Marco Conti , Massimiliano La Gala, Andrea Passarella , Massimiliano La Gala, Andrea Passarella , Fabio Pezzoni: , Fabio Pezzoni:
 Information diffusion in OSNs: the impact of nodes' sociality. 616-621
- Rodrigo Marotti Togneri, Bruno Tadeu Caetano, Carlos Alberto Kamienski  : :
 The importance of geographic locality for online information diffusion. 622-627
- Larissa A. de Freitas  , Aline A. Vanin, Denise N. Hogetop, Marco N. Bochernitsan, Renata Vieira , Aline A. Vanin, Denise N. Hogetop, Marco N. Bochernitsan, Renata Vieira : :
 Pathways for irony detection in tweets. 628-633
- Jongkyu Seo, Sung-Hwan Kim, Haesung Tak, Hwan-Gue Cho: 
 A structural analysis of literary fictions with social network framework. 634-640
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Eduardo Cunha Campos, Marcelo de Almeida Maia: 
 Automatic categorization of questions from Q&A sites. 641-643
- James N. K. Liu, Zongnong Meng, Yan-Xing Hu, Yu-Lin He, Simon C. K. Shiu  , Vincent W. S. Cho , Vincent W. S. Cho : :
 A hybrid algorithm for recommendation twitter peers. 644-649
- Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu: 
 Preventing the diffusion of negative information based on local influence tree. 650-652
- Rosa Virginia Encinas Quille  , Caetano Traina Jr. , Caetano Traina Jr. , José Fernando Rodrigues Jr.: , José Fernando Rodrigues Jr.:
 Spectral analysis and text processing over the computer science literature: patterns and discoveries. 653-657
- Juwel Rana, Johan Kristiansson, Kåre Synnes: 
 The strength of social strength: an evaluation study of algorithmic versus user-defined ranking. 658-659
Volume I: Artificial intelligence & agents, distributed systems, and information systems: wireless communications and networking track
- Gustavo Pessin  , Fernando Santos Osório , Fernando Santos Osório , Jó Ueyama , Jó Ueyama , Denis F. Wolf, Renan Cipriano Moioli , Denis F. Wolf, Renan Cipriano Moioli , Patrícia A. Vargas , Patrícia A. Vargas : :
 Self-localisation in indoor environments combining learning and evolution with wireless networks. 661-666
- Jun Huang, Juan Lv, Qiang Duan: 
 Modeling and analysis on network performance for cloud service delivery with multiple paths. 667-673
- Samaneh Aminikhanghahi  , Wei Wang, Sung Y. Shin, Seong-Ho Son , Wei Wang, Sung Y. Shin, Seong-Ho Son , Soon-Ik Jeon: , Soon-Ik Jeon:
 Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening. 674-679
- Dhouha Krichen, Walid Abdallah, Noureddine Boudriga: 
 WSN-based flutter control application for aircraft wings structural health monitoring. 680-685
- Rafael Perazzo Barbosa Mota, Daniel M. Batista  : :
 A dynamic frame slotted ALOHA anti-collision algorithm for the internet of things. 686-691
- Tales Heimfarth, João Carlos Giacomin, Alexandre Victor Fassio, João Paulo de Araujo: 
 GB-MAC: a backbone based low latency protocol for WSNs. 692-698
- Eun-Jun Yoon, Kee-Young Yoo: 
 A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks. 699-705
- Syed Hassan Ahmed  , Abdul Wahid , Abdul Wahid , Dongkyun Kim: , Dongkyun Kim:
 EENC - energy efficient nested clustering in UASN. 706-710
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Jae-Hyun Jun, Cheol-Woong Ahn, Sung-Ho Kim: 
 DDoS attack detection by using packet sampling and flow features. 711-712
Volume I: Artificial intelligence & agents, distributed systems, and information systems: student research competition papers
- Rafael Perazzo Barbosa Mota: 
 Student research abstract: mechanisms to ensure quality of service for the internet of things. 713-714
- J. Alfred Daniel  : :
 Vehicle to vehicle communication using Zigbee protocol. 715-716
- Murad Khan: 
 Student research abstract: an optimized handover scheme based on media independent handover standard IEEE 802.21. 717-718
Volume I: Artificial intelligence & agents, distributed systems, and information systems: web technologies track
- Willian Massami Watanabe  , Rafael José Geraldo, Renata Pontin de Mattos Fortes , Rafael José Geraldo, Renata Pontin de Mattos Fortes : :
 Keyboard navigation mechanisms in tab widgets: an investigation on ARIA's conformance. 721-726
- Pavel Arapov, Michel Buffa  , Amel Ben Othmane: , Amel Ben Othmane:
 WikiNEXT: a wiki for exploiting the web of data. 727-734
- Patrick Gaubatz, Waldemar Hummer, Uwe Zdun, Mark Strembeck: 
 Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents. 735-742
- Jon Iturrioz, Iker Azpeitia, Oscar Díaz  : :
 Generalizing the "like" button: empowering websites with monitoring capabilities. 743-750
- Alexandre Michetti Manduca, Ethan V. Munson, Renata P. M. Fortes  , Maria da Graça Campos Pimentel: , Maria da Graça Campos Pimentel:
 A nonintrusive approach for implementing single database, multitenant services from web applications. 751-756
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Matteo Ciman, Ombretta Gaggi, Nicola Gonzo: 
 Cross-platform mobile development: a study on apps with animations. 757-759
- Wook-Sung Yoo: 
 OSBS: online storm-water billing system. 760-761
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cooperative systems track
- Simon Tragatschnig, Huy Tran, Uwe Zdun: 
 Impact analysis for event-based systems using change patterns. 763-768
- Roberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Edson dos Santos Moreira: 
 Secure positioning in a UAV swarm using on-board stereo cameras. 769-774
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Rodrigo da Rosa Righi, Cristiano André da Costa  , Luiz Gonzaga Jr. , Luiz Gonzaga Jr. , Kleinner Farias , Kleinner Farias , Alexandre Luis Andrade, Lucas Graebin: , Alexandre Luis Andrade, Lucas Graebin:
 Redesigning transaction load balancing on electronic funds transfer scenarios. 775-777
- Geiser Chalco Challco  , Seiji Isotani , Seiji Isotani : :
 Towards a learning design authoring tool that generates personalized units of learning for CSCL. 778-780
- Elane Cristina da Rocha Cardoso Saraiva, Viviane Torres da Silva: 
 Choosing my partners based on how they will evaluate my behavior. 781-783
Volume I: Artificial intelligence & agents, distributed systems, and information systems: data streams track
- Jean Paul Barddal  , Heitor Murilo Gomes , Heitor Murilo Gomes , Fabrício Enembreck , Fabrício Enembreck : :
 SFNClassifier: a scale-free social network method to handle concept drift. 786-791
- Dino Ienco  , Albert Bifet , Albert Bifet , Bernhard Pfahringer, Pascal Poncelet , Bernhard Pfahringer, Pascal Poncelet : :
 Change detection in categorical evolving data streams. 792-797
- Heitor Murilo Gomes  , Fabrício Enembreck , Fabrício Enembreck : :
 SAE2: advances on the social adaptive ensemble classifier for data streams. 798-804
- Max Zimmermann, Eirini Ntoutsi, Myra Spiliopoulou: 
 Adaptive semi supervised opinion classifier with forgetting mechanism. 805-812
Volume I: Artificial intelligence & agents, distributed systems, and information systems: database theory, technology and applications track
- Raju Halder  , Matteo Zanioli, Agostino Cortesi , Matteo Zanioli, Agostino Cortesi : :
 Information leakage analysis of database query languages. 813-820
- Yi-Wen Lin, En Tzu Wang, Chieh-Feng Chiang, Arbee L. P. Chen: 
 Finding targets with the nearest favor neighbor and farthest disfavor neighbor by a skyline query. 821-826
- Graeme Douglas, Ramon Lawrence: 
 LittleD: a SQL database for sensor nodes and embedded applications. 827-832
- Alessandreia Marta de Oliveira, Leonardo Murta, Vanessa Braganholo: 
 Towards semantic diff of XML documents. 833-838
- Jaime Raigoza, Junping Sun: 
 Temporal join processing with hilbert curve space mapping. 839-844
- Sang-Wook Kim, Ki-Nam Kim, Seok-Ho Yoon, Sunju Park: 
 Sampling in online social networks. 845-849
- Kaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang: 
 Mining key and referential constraints enforcement patterns. 850-854
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Julian Rith, Philipp S. Lehmayr, Klaus Meyer-Wegener  : :
 Speaking in tongues: SQL access to NoSQL systems. 855-857
- Amin Mesmoudi, Mohand-Said Hacid: 
 A test framework for large scale declarative queries: preliminary results. 858-859
Volume I: Artificial intelligence & agents, distributed systems, and information systems: heterogeneous computing track
- Anderson Braga de Avila, Adriano Maron, Renata Reiser  , Maurício L. Pilla, Adenauer C. Yamin: , Maurício L. Pilla, Adenauer C. Yamin:
 GPU-aware distributed quantum simulation. 860-865
- Guilherme Andrade, Gabriel Spada Ramos, Daniel Madeira, Rafael Sachetto Oliveira  , Esteban Clua , Esteban Clua , Renato Ferreira, Leonardo Rocha , Renato Ferreira, Leonardo Rocha : :
 Efficient dynamic scheduling of heterogeneous applications in hybrid architectures. 866-871
- Aryabartta Sahu  , Saparapu Ramakrishna: , Saparapu Ramakrishna:
 Creating heterogeneity at run time by dynamic cache and bandwidth partitioning schemes. 872-879
- Fernando Alexandre, Ricardo Marqués, Hervé Paulino  : :
 On the support of task-parallel algorithmic skeletons for multi-GPU computing. 880-885
- Kamil Rocki, Martin Burtscher, Reiji Suda: 
 The future of accelerator programming: abstraction, performance or can we have both? 886-895
Volume I: Artificial intelligence & agents, distributed systems, and information systems: information access and retrieval track
- Madalina Mitran, Guillaume Cabanac  , Mohand Boughanem: , Mohand Boughanem:
 GeoTime-based tag ranking model for automatic image annotation. 896-901
- Leila C. C. Bergamasco  , Fátima L. S. Nunes , Fátima L. S. Nunes : :
 A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor. 902-907
- Dong-Jin Kim, Sang-Chul Lee, Ho-Yong Son, Sang-Wook Kim, Jae Bum Lee: 
 C-Rank: a contribution-based web page ranking approach. 908-912
- Thanh Duc Ngo  , Sang Phan, Duy-Dinh Le, Shin'ichi Satoh: , Sang Phan, Duy-Dinh Le, Shin'ichi Satoh:
 Recommend-Me: recommending query regions for image search. 913-918
- Edson B. Santos Junior, Rudinei Goularte  , Marcelo G. Manzato: , Marcelo G. Manzato:
 Personalized collaborative filtering: a neighborhood model based on contextual constraints. 919-924
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Faiza Belbachir, Mohand Boughanem, Malik Muhammad Saad Missen: 
 Probabilistic opinion models based on subjective sources. 925-926
- Chun Yong Moon, Manjula Pilaka  , Hye-young Paik , Hye-young Paik , John Shepherd , John Shepherd : :
 Improved named entity recognition: patterns in columns model (PCM). 927-928
- Bissan Audeh, Philippe Beaune, Michel Beigbeder: 
 Exploring query reformulation for named entity expansion in information retrieval. 929-930
Volume I: Artificial intelligence & agents, distributed systems, and information systems: multimedia and visualization track
- Jie Li, Zhao-Peng Meng, Kang Zhang: 
 Visualization of oceanographic applications using a common data model. 933-938
- Ai Uno, Takayuki Itoh: 
 MALL: a life log based music recommendation system and portable music player. 939-944
- Alceu Ferraz Costa, Agma Juci Machado Traina, Caetano Traina Jr.  : :
 MFS-Map: efficient context and content combination to annotate images. 945-950
- Yalong Yang  , Ning Dou, Shuai Zhao, Zhichao Yang, Kang Zhang, Quang Vinh Nguyen , Ning Dou, Shuai Zhao, Zhichao Yang, Kang Zhang, Quang Vinh Nguyen : :
 Visualizing large hierarchies with drawer trees. 951-956
- Diogo de Carvalho Pedrosa, Maria da Graça Campos Pimentel: 
 Text entry using a foot for severely motor-impaired individuals. 957-963
- Marcus G. F. Santanna, Priscila T. M. Saito  , Pedro Henrique Bugatti , Pedro Henrique Bugatti : :
 Content-based image retrieval towards the automatic characterization of soybean seed vigor. 964-969
- Mateus Bisotto Nunes, Luciana Porcher Nedel  , Valter Roesler: , Valter Roesler:
 Motivating people to perform better in exergames: competition in virtual environments. 970-975
- Hiroaki Tobita: 
 Aero-screen: blimp-based ubiquitous screen for novel digital signage and information visualization. 976-980
Volume I: Artificial intelligence & agents, distributed systems, and information systems: poster papers
- Qinshui Chen, Wenmin Wang, Ronggang Wang, Jianlong Zhang, Zhongxin Liu: 
 An approach to support stereoscopic 3D web. 981-984
- Ronaldo Husemann, Valter Roesler: 
 Introduction of a multi-layer predictive search strategy for scalable video coding. 985-986
Volume II: Software development, system software & security: requirements engineering track
- Rainer Lutz, Sascha Schäfer, Stephan Diehl  : :
 Are smartphones better than CRC cards? 987-994
- João Pimentel, Jaelson Castro  , John Mylopoulos, Konstantinos Angelopoulos, Vítor E. Silva Souza , John Mylopoulos, Konstantinos Angelopoulos, Vítor E. Silva Souza : :
 From requirements to statecharts via design refinement. 995-1000
- Priscila Engiel, Claudia Cappelli, Julio César Sampaio do Prado Leite  : :
 Eliciting concepts from the Brazilian access law using a combined approach. 1001-1006
- Eduardo Almentero, Julio César Sampaio do Prado Leite  , Carlos José Pereira de Lucena: , Carlos José Pereira de Lucena:
 Towards software modularization from requirements. 1007-1012
- Shehnila Zardari, Rami Bahsoon, Anikó Ekárt  : :
 Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP. 1013-1020
Volume II: Software development, system software & security: poster papers
- Alberto Rodrigues da Silva  : :
 Quality of requirements specifications: a preliminary overview of an automatic validation approach. 1021-1022
- Hiroki Horita  , Kozo Honda, Yuichi Sei , Kozo Honda, Yuichi Sei , Hiroyuki Nakagawa , Hiroyuki Nakagawa , Yasuyuki Tahara, Akihiko Ohsuga: , Yasuyuki Tahara, Akihiko Ohsuga:
 Transformation approach from KAOS goal models to BPMN models using refinement patterns. 1023-1024
Volume II: Software development, system software & security: software architecture: theory, technology, and applications track
- Fábio Paulo Basso  , Raquel Mainardi Pillat , Raquel Mainardi Pillat , Toacy Cavalcante de Oliveira , Toacy Cavalcante de Oliveira , Marcos Didonet Del Fabro: , Marcos Didonet Del Fabro:
 Generative adaptation of model transformation assets: experiences, lessons and drawbacks. 1027-1034
- Jeho Oh, Sungwon Kang: 
 A hierarchical model for traceability between requirements and architecture. 1035-1042
- Everton T. Guimarães, Alessandro Garcia, Kleinner Farias  : :
 On the impact of obliviousness and quantification on model composition effort. 1043-1048
- Riccardo Cognini, Flavio Corradini, Stefania Gnesi  , Andrea Polini, Barbara Re , Andrea Polini, Barbara Re : :
 Research challenges in business process adaptability. 1049-1054
Volume II: Software development, system software & security: poster papers
- Amrita Chaturvedi, Tadinada Vankata Prabhakar: 
 Ontology driven builder pattern: a plug and play component. 1055-1057
Volume II: Software development, system software & security: software engineering track
- Rubing Huang  , Jinfu Chen, Zhicheng Li, Rongcun Wang, Yansheng Lu: , Jinfu Chen, Zhicheng Li, Rongcun Wang, Yansheng Lu:
 Adaptive random prioritization for interaction test suites. 1058-1063
- Tewfik Ziadi  , Christopher Henard, Mike Papadakis , Christopher Henard, Mike Papadakis , Mikal Ziane, Yves Le Traon , Mikal Ziane, Yves Le Traon : :
 Towards a language-independent approach for reverse-engineering of software product lines. 1064-1071
- Rong Peng, Dong Sun, Wei-Tek Tsai: 
 Success factors in mobile social networking application development: case study of instagram. 1072-1079
- Eun-Young Kang  , Pierre-Yves Schobbens , Pierre-Yves Schobbens : :
 Schedulability analysis support for automotive systems: from requirement to implementation. 1080-1085
- Lei Ma, Cyrille Artho, Hiroyuki Sato: 
 Project centralization based on graph coloring. 1086-1093
- Ruizhi Gao, Jeong Soo Eo, W. Eric Wong, Xinwei Gao, Shou-Yu Lee: 
 An empirical study of requirements-based test generation on an automobile control system. 1094-1099
- Hai-Feng Guo, Zongyan Qiu, Harvey P. Siy: 
 Locating fault-inducing patterns from structural inputs. 1100-1107
- Mohammed Al-Refai, Walter Cazzola  , Robert B. France: , Robert B. France:
 Using models to dynamically refactor runtime code. 1108-1113
- Kiev Gama  , Didier Donsez: , Didier Donsez:
 A fault deployment and activation approach for testing self-recovery mechanisms. 1114-1119
- Matthieu Foucault, Marc Palyart, Jean-Rémy Falleri  , Xavier Blanc: , Xavier Blanc:
 Computing contextual metric thresholds. 1120-1125
- Yoann Laurent, Reda Bendraou  , Souheib Baarir, Marie-Pierre Gervais: , Souheib Baarir, Marie-Pierre Gervais:
 Planning for declarative processes. 1126-1133
- Geunseok Yang, Tao Zhang  , Byungjeong Lee: , Byungjeong Lee:
 Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively. 1134-1139
- Minh Chau Nguyen, Eunkyoung Jee, Jinho Choi, Doo-Hwan Bae: 
 Automatic construction of timing diagrams from UML/MARTE models for real-time embedded software. 1140-1145
- Reihane Boghrati  , Abbas Heydarnoori , Abbas Heydarnoori , Majeed Kazemitabaar: , Majeed Kazemitabaar:
 Activities performed by programmers while using framework examples as a guide. 1146-1151
- Daniel Alencar da Costa, Uirá Kulesza, Eduardo Aranha, Roberta Coelho: 
 Unveiling developers contributions behind code commits: an exploratory study. 1152-1157
- Manuele Ferreira, Eiji Adachi Barbosa, Isela Macia Bertran, Roberta Arcoverde, Alessandro Garcia: 
 Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort. 1158-1163
- Hossain Shahriar  , Hisham Haddad: , Hisham Haddad:
 Risk assessment of code injection vulnerabilities using fuzzy logic-based system. 1164-1170
Volume II: Software development, system software & security: poster papers
- Yutao Ma  , Yang Wu, Youwei Xu: , Yang Wu, Youwei Xu:
 Dynamics of open-source software developer's commit behavior: an empirical investigation of subversion. 1171-1173
- Charity Wayua, Komminist Weldemariam, Osamuyimen Stewart: 
 Rethinking agribusiness models in Africa. 1174-1175
- Izuru Kume, Naoya Nitta, Masahide Nakamura, Etsuya Shibayama  : :
 A dynamic analysis technique to extract symptoms that suggest side effects in framework applications. 1176-1178
- Zhenyu Chen, Atif M. Memon, Bin Luo: 
 Combining research and education of software testing: a preliminary study. 1179-1180
- Kleinner Farias  , Alessandro Garcia, Carlos José Pereira de Lucena, Luiz Gonzaga Jr. , Alessandro Garcia, Carlos José Pereira de Lucena, Luiz Gonzaga Jr. , Cristiano André da Costa , Cristiano André da Costa , Rodrigo da Rosa Righi, Fábio Basso , Rodrigo da Rosa Righi, Fábio Basso , Toacy Cavalcante de Oliveira , Toacy Cavalcante de Oliveira : :
 Towards a quality model for model composition effort. 1181-1183
- Xin Xia  , David Lo , David Lo , Xinyu Wang, Bo Zhou: , Xinyu Wang, Bo Zhou:
 Build system analysis with link prediction. 1184-1186
- Xiaoqiong Zhao, Xin Xia  , Pavneet Singh Kochhar, David Lo , Pavneet Singh Kochhar, David Lo , Shanping Li: , Shanping Li:
 An empirical study of bugs in build process. 1187-1189
- Joicymara S. Xavier  , Autran Macedo, Rivalino Matias, Lucio Borges de Araujo: , Autran Macedo, Rivalino Matias, Lucio Borges de Araujo:
 A survey on research in software reliability engineering in the last decade. 1190-1191
Volume II: Software development, system software & security: software engineering aspects of green computing track
- Hayden Field, Glen Anderson, Kerstin Eder  : :
 EACOF: a framework for providing energy transparency to enable energy-aware software development. 1194-1199
- Adel Noureddine  , Romain Rouvoy , Romain Rouvoy , Lionel Seinturier , Lionel Seinturier : :
 Unit testing of energy consumption of software libraries. 1200-1205
- Steven te Brinke, Somayeh Malakuti, Christoph Bockisch, Lodewijk Bergmans, Mehmet Aksit, Shmuel Katz: 
 A tool-supported approach for modular design of energy-aware software. 1206-1212
- Luis Corral  , Anton B. Georgiev, Alberto Sillitti, Giancarlo Succi , Anton B. Georgiev, Alberto Sillitti, Giancarlo Succi : :
 Method reallocation to reduce energy consumption: an implementation in Android OS. 1213-1218
Volume II: Software development, system software & security: poster papers
- Mahamat Issa Hassan, Rami Bahsoon: 
 Green-as-a-service (GaaS) for cloud service provision operation. 1219-1220
Volume II: Software development, system software & security: student research competition papers
- Steven te Brinke: 
 Interpreting energy profiles with CEGAR. 1221-1222
Volume II: Software development, system software & security: service-oriented architecture and programming track
- Rosane S. Huergo, Paulo F. Pires  , Flávia Coimbra Delicato: , Flávia Coimbra Delicato:
 A method to identify services using master data and artifact-centric modeling approach. 1225-1230
- Carlos Parra, Diego Joya, Leonardo Giral, Alvaro Infante: 
 An SOA approach for automating software product line adoption. 1231-1238
- Sushama Karumanchi, Anna Cinzia Squicciarini  : :
 In the wild: a large scale study of web services vulnerabilities. 1239-1246
- Nuno Oliveira, Alexandra Silva, Luís Soares Barbosa  : :
 Quantitative analysis of Reo-based service coordination. 1247-1254
Volume II: Software development, system software & security: student research competition papers
- Felipe Pontes Guimarães: 
 A fault-tolerant architecture for decentralized compositions of services in the wild. 1255-1256
Volume II: Software development, system software & security: software verification and testing track
- Bing Chen, Qingkai Zeng, Weiguang Wang: 
 Crashmaker: an improved binary concolic testing tool for vulnerability detection. 1257-1263
- Víctor Rivera, Néstor Cataño: 
 Translating event-B to JML-specified Java programs. 1264-1271
- Harsh Beohar, Mohammad Reza Mousavi  : :
 Input-output conformance testing based on featured transition systems. 1272-1278
- Srinivas Pinisetty  , Yliès Falcone, Thierry Jéron , Yliès Falcone, Thierry Jéron , Hervé Marchand: , Hervé Marchand:
 Runtime enforcement of regular timed properties. 1279-1286
- Adilson Luiz Bonifácio, Arnaldo Vieira Moura: 
 On the completeness of test suites. 1287-1292
- Mike Papadakis  , Yves Le Traon , Yves Le Traon : :
 Effective fault localization via mutation analysis: a selective mutation approach. 1293-1300
- Tanay Kanti Paul, Man Fai Lau: 
 A systematic literature review on modified condition and decision coverage. 1301-1308
- Mário Pereira  , Simão Melo de Sousa , Simão Melo de Sousa : :
 Complexity checking of ARM programs, by deduction. 1309-1314
Volume II: Software development, system software & security: user interface generation track
- André Ribeiro, Alberto Rodrigues da Silva  : :
 XIS-mobile: a DSL for mobile applications. 1316-1323
- David Raneburger, Hermann Kaindl  , Roman Popp , Roman Popp , Vedran Sajatovic, Alexander Armbruster: , Vedran Sajatovic, Alexander Armbruster:
 A process for facilitating interaction design through automated GUI generation. 1324-1330
Volume II: Software development, system software & security: coordination models, languages and applications track
- Xavier Etchevers, Gwen Salaün, Fabienne Boyer, Thierry Coupaye, Noël De Palma: 
 Reliable self-deployment of cloud applications. 1331-1338
- Ludovic Henrio, Justine Rochas: 
 Declarative scheduling for active objects. 1339-1344
- Seiji Umatani: 
 Practical implementation techniques of ambient calculus in conventional dynamic languages. 1345-1351
Volume II: Software development, system software & security: poster papers
- Eva Kühn, Stefan Craß, Gerson Joskowicz, Martin Novak: 
 Flexible modeling of policy-driven upstream notification strategies. 1352-1354
- Francesco L. De Angelis, Jose Luis Fernandez-Marquez  , Giovanna Di Marzo Serugendo , Giovanna Di Marzo Serugendo : :
 Self-composition of services with chemical reactions. 1355-1356
Volume II: Software development, system software & security: constraint solving and programming track
- Roberto Amadini  , Maurizio Gabbrielli , Maurizio Gabbrielli , Jacopo Mauro , Jacopo Mauro : :
 An enhanced features extractor for a portfolio of constraint solvers. 1357-1359
- Danny Munera  , Daniel Diaz , Daniel Diaz , Salvador Abreu , Salvador Abreu , Philippe Codognet: , Philippe Codognet:
 Flexible cooperation in parallel local search. 1360-1361
Volume II: Software development, system software & security: enterprise engineering track
- Jens Kolb, Michael Zimoch, Barbara Weber  , Manfred Reichert: , Manfred Reichert:
 How social distance of process designers affects the process of process modeling: insights from a controlled experiment. 1364-1370
- Marian Benner-Wickner  , Matthias Book , Matthias Book , Tobias Brückmann, Volker Gruhn: , Tobias Brückmann, Volker Gruhn:
 Execution support for agenda-driven case management. 1371-1377
- Walid Fdhila  , Stefanie Rinderle-Ma , Stefanie Rinderle-Ma : :
 Predicting change propagation impacts in collaborative business processes. 1378-1385
- Toomas Saarsen, Marlon Dumas  : :
 Towards an assessment model for balancing process model production and use. 1386-1392
- Lei Wang, Andreas Wombacher, Luís Ferreira Pires  , Marten van Sinderen , Marten van Sinderen , Chihung Chi: , Chihung Chi:
 A collaborative processes synchronization method with regards to system crashes and network failures. 1393-1398
- Wadha Labda, Nikolay Mehandjiev, Pedro Sampaio: 
 Modeling of privacy-aware business processes in BPMN to protect personal data. 1399-1405
- Thomas Molka, David Redlich, Marc Drobek, Artur Caetano  , Xiao-Jun Zeng , Xiao-Jun Zeng , Wasif Gilani: , Wasif Gilani:
 Conformance checking for BPMN-based process models. 1406-1413
Volume II: Software development, system software & security: poster papers
- Joerg Evermann, Ghazal Assadipour: 
 Big data meets process mining: implementing the alpha algorithm with map-reduce. 1414-1416
- Hugo Ramos, André Vasconcelos  : :
 eXtreme enterprise architecture planning. 1417-1419
- Gonçalo Antunes  , Marzieh Bakhshandeh, Rudolf Mayer, José Borbinha, Artur Caetano , Marzieh Bakhshandeh, Rudolf Mayer, José Borbinha, Artur Caetano : :
 Ontology-based enterprise architecture model analysis. 1420-1422
Volume II: Software development, system software & security: embedded systems track
- Ting-Hao Tsai, Ya-Shu Chen: 
 A thermal-throttling server in 3D multicore chips. 1425-1430
- Antoine Bertout, Julien Forget  , Richard Olejnik: , Richard Olejnik:
 A heuristic to minimize the cardinality of a real-time task set by automated task clustering. 1431-1436
- Wan-Chi Chang, Hsueh-Wen Tseng  , Chin-Fu Kuo: , Chin-Fu Kuo:
 A traffic-balanced routing scheme for heat balance in 3D networks-on-chip. 1437-1442
- Gustavo Zanatta, Giulio Dariano Bottari, Raphael Guerra, Julius C. B. Leite: 
 Building a WSN infrastructure with COTS components for the thermal monitoring of datacenters. 1443-1448
- Seunghoon Yoo, Eunji Lee, Hyokyung Bahn: 
 The least-dirty-first cache replacement policy for phase-change memory. 1449-1454
Volume II: Software development, system software & security: mobile platforms track
- Abdullah A. I. Alnajem, Ning Zhang: 
 A copula-based risk evaluation method (C-REM) in a corporate mobile banking context. 1455-1462
- Jiwon Hong  , Won-Seok Hwang, Jin-Hyung Kim, Sang-Wook Kim: , Won-Seok Hwang, Jin-Hyung Kim, Sang-Wook Kim:
 Context-aware music recommendation in mobile smart devices. 1463-1468
- Su-Wei Chang, Sheng-Wei Cheng, Pi-Cheng Hsiu  , Tei-Wei Kuo , Tei-Wei Kuo , Ching-Wen Lin: , Ching-Wen Lin:
 Application behavior analysis in resource consumption for mobile devices. 1469-1474
Volume II: Software development, system software & security: poster papers
- Andrew Kinai, Reginald E. Bryant, Aisha Walcott-Bryant, Eric Mibuari, Komminist Weldemariam, Osamuyimen Stewart: 
 Traffic 411: a traffic congestion routing and awareness platform for Nairobi. 1475-1476
Volume II: Software development, system software & security: operating systems track
- Shi-Wu Lo, Bo-Hong Chen, Yu-Wei Chen, Tzu-Chieh Shen, You-Ching Lin: 
 ICAP, a new flash wear-leveling algorithm inspired by locality. 1478-1483
- Kuniyasu Suzaki, Toshiki Yagi, Akira Tanaka, Yutaka Oiwa, Etsuya Shibayama  : :
 Rollback mechanism of nested virtual machines for protocol fuzz testing. 1484-1491
- Duck-Ho Bae, Ji-Woong Chang, Se-Mi Park, Byeong-Soo Jeong, Sang-Wook Kim, Seong-je Cho: 
 An effective data clustering method based on expected update time in flash memory environment. 1492-1497
- Chin-Fu Kuo, Hsueh-Wen Tseng  : :
 Delay-based incrementally mapping of virtual machines in cloud computing systems. 1498-1503
- Li-Pin Chang, Sheng-Min Huang, Wen-Ping Li: 
 Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning. 1504-1510
- Mingyang Wang, Yiming Hu: 
 An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan. 1511-1516
- Heekwon Park, Dongwoo Kang, Jongmoo Choi: 
 Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation. 1517-1522
- Rivalino Matias, Marcela Prince, Lucio Borges de Araujo, Claudio Sousa, Luan Henrique: 
 An empirical exploratory study on operating system reliability. 1523-1528
- Paulo Eduardo Nogueira, Rivalino Matias Jr., Elder Vicente: 
 An experimental study on execution time variation in computer experiments. 1529-1534
- Eunji Lee, Jee-Eun Jang, Hyokyung Bahn: 
 DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory. 1535-1540
Volume II: Software development, system software & security: poster papers
- Junghoon Lee, Gyung-Leen Park, Jihyun Kang, Naram Ham: 
 Per-cluster allocation of relocation staff on electric vehicle sharing systems. 1541-1542
- Daniel Bristot de Oliveira, Rômulo Silva de Oliveira  : :
 Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model. 1543-1544
- Diego Elias, Rivalino Matias, Marcia Fernandes, Lucio Borges de Araujo: 
 Experimental and theoretical analyses of memory allocation algorithms. 1545-1546
- George Hamer, Jason Werpy: 
 Large scale processing of landsat data on various software platforms. 1547-1549
Volume II: Software development, system software & security: student research competition papers
- Daniel Röhrig: 
 A domain specific language for process scheduling. 1550-1551
- Christian René Sechting: 
 A platform independent scheduler framework. 1552-1553
Volume II: Software development, system software & security: programming languages track
- Manuel Serrano, Johan Grande: 
 Locking fast. 1556-1561
- Marco Patrignani  , Dave Clarke: , Dave Clarke:
 Fully abstract trace semantics for low-level isolation mechanisms. 1562-1569
- Leonardo Vieira dos Santos Reis, Vladimir Oliveira Di Iorio, Roberto da Silva Bigonha: 
 Defining the syntax of extensible languages. 1570-1576
- Frédéric Loulergue  , Simon Robillard, Julien Tesson, Joeffrey Legaux, Zhenjiang Hu: , Simon Robillard, Julien Tesson, Joeffrey Legaux, Zhenjiang Hu:
 Formal derivation and extraction of a parallel program for the all nearest smaller values problem. 1577-1584
- Frédéric Dabrowski, Frédéric Loulergue  , Thomas Pinsard: , Thomas Pinsard:
 Nested atomic sections with thread escape: a formal definition. 1585-1592
- Paul Tarau, Bill P. Buckles: 
 Arithmetic algorithms for hereditarily binary natural numbers. 1593-1600
- Fábio Paulo Basso  , Toacy Cavalcante de Oliveira , Toacy Cavalcante de Oliveira , Kleinner Farias , Kleinner Farias : :
 Extending JUnit 4 with Java annotations and reflection to test variant model transformation assets. 1601-1608
Volume II: Software development, system software & security: poster papers
- Saleena Nabeezath  , Vineeth Paleri , Vineeth Paleri : :
 Global value numbering for redundancy detection: a simple and efficient algorithm. 1609-1611
- Filip Krikava  , Philippe Collet, Robert B. France: , Philippe Collet, Robert B. France:
 Manipulating models using internal domain-specific languages. 1612-1614
- Matic Potocnik  , Uros Cibej, Bostjan Slivnik: , Uros Cibej, Bostjan Slivnik:
 Linter: a tool for finding bugs and potential problems in scala code. 1615-1616
Volume II: Software development, system software & security: programming for separation of concerns track
- John S. Dean, Frank J. Mitropoulos: 
 An aspect pointcut for parallelizable loops. 1619-1624
- Mario Luca Bernardi  , Marta Cimitile , Marta Cimitile , Giuseppe A. Di Lucca , Giuseppe A. Di Lucca : :
 Declarative design pattern-based development using aspect oriented programming. 1625-1630
Volume II: Software development, system software & security: computer security track
- Michael Backes, Sebastian Gerling  , Stefan Lorenz, Stephan Lukas: , Stefan Lorenz, Stephan Lukas:
 X-pire 2.0: a user-controlled expiration date and copy protection mechanism. 1633-1640
- Keita Emura  , Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi , Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi : :
 Building secure and anonymous communication channel: formal model and its prototype implementation. 1641-1648
- Yan Shoshitaishvili, Luca Invernizzi, Adam Doupé, Giovanni Vigna: 
 Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security. 1649-1656
- Ali Zand, Giovanni Vigna, Xifeng Yan, Christopher Kruegel: 
 Extracting probable command and control signatures for detecting botnets. 1657-1662
- Daniel Hedin, Arnar Birgisson, Luciano Bello, Andrei Sabelfeld: 
 JSFlow: tracking information flow in JavaScript and its APIs. 1663-1671
- Daniela Oliveira, Jesús Navarro, Nicholas Wetzel, Max Bucci: 
 Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach. 1672-1679
- Yuxin Meng  , Duncan S. Wong, Lam-for Kwok , Duncan S. Wong, Lam-for Kwok : :
 Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. 1680-1687
- Zikai Wen  , Changyu Dong: , Changyu Dong:
 Efficient protocols for private record linkage. 1688-1694
Volume II: Software development, system software & security: student research competition papers
- Vanessa N. Cooper: 
 Student research abstract: android malware detection based on Kullback-Leibler divergence. 1695-1696
Volume II: Software development, system software & security: trust, reputation, evidence and other collaboration know-how track
- Yung Shin Van Der Sype, Jean-Marc Seigneur  : :
 Case study: legal requirements for the use of social login features for online reputation updates. 1698-1705
- Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang, Yutaka Miyake: 
 Privacy preserving trusted social feedback. 1706-1711
- Ronald Petrlic, Sascha Lutters, Christoph Sorge: 
 Privacy-preserving reputation management. 1712-1718
- Antonio Miguel Mora, Paloma de las Cuevas, Juan Julián Merelo Guervós  , Sergio Zamarripa, M. Juan, Anna Isabel Esparcia-Alcázar, M. Burvall, H. Arfwedson, Z. Hodaie: , Sergio Zamarripa, M. Juan, Anna Isabel Esparcia-Alcázar, M. Burvall, H. Arfwedson, Z. Hodaie:
 MUSES: a corporate user-centric system which applies computational intelligence methods. 1719-1723
Volume II: Software development, system software & security: poster papers
- Charanpal Dhanjal, Stéphan Clémençon: 
 Learning reputation in an authorship network. 1724-1726
Volume II: Software development, system software & security: advanced and convergent IT track
- Yongwoon Park, Wonyong Yoon: 
 Encountering smartphones in network simulation: a preliminary result on multi-radio multicast. 1727-1728
- Junho Choi, Jeongin Kim, Pankoo Kim: 
 Modeling for context-aware healthcare service using ontology. 1729-1730
- Byeongho Kang, Eul Gyu Im: 
 Analysis of binary code topology for dynamic analysis. 1731-1732
- Hae-Min Moon, Kyeong-Ri Ko, Juhyun Shin, Sung Bum Pan: 
 A novel double linear-cubic convolution interpolation for digital image scaling. 1733-1734
- Tran Tin, Sung-Ryul Kim: 
 Method for fast clustering of data distributed on a sphere surface. 1735-1736
- Younsik Jeong, Hwan-taek Lee, Seong-je Cho, Sangchul Han, Minkyu Park: 
 A kernel-based monitoring approach for analyzing malicious behavior on Android. 1737-1738
- Myung Chul Park, Dong Seog Han: 
 Performance analysis of the golden-SM in the V2V network. 1739-1740
- Hyunsoek Choi  , Jeongin Seo, Hyeyoung Park: , Jeongin Seo, Hyeyoung Park:
 Matrix correlation distance for 2D image classification. 1741-1742
- Sang-Il Choi, Seok-Joo Koh  , Insu Kim, Sang-Kyu Lim , Insu Kim, Sang-Kyu Lim , Tae Gyu Kang: , Tae Gyu Kang:
 A new device discovery scheme in lighting control networks. 1743-1744
- Jiamei Tang, Paul Kim, Sangwook Kim: 
 An optimal device selection for user satisfaction of content sharing. 1745-1746
- Young Chun Kwon, Nakhoon Baek  : :
 A CUDA-based implementation of OpenGL-compatible rasterization library prototype. 1747-1748
- Sang-Ho Shin, Jun-Cheol Jeon, Gil-Je Lee, Kee-Young Yoo: 
 Design of a cellular automata cell with rule 30 on quantum-dot cellular automata. 1749-1750
- Udaya Wijenayake, Soon-Yong Park  : :
 Respiratory motion estimation using visual coded markers for radiotherapy. 1751-1752
- Jungil Kim, Eunjoo Lee: 
 The effect of IMPORT change in software change history. 1753-1754
- Soo Young Jang, Ajay Kumar Jha, Woo Jin Lee: 
 Virtual prototype generation by shockwave flash for simulating HW components of embedded system. 1755-1756
- Minwoo Jang, Woochur Kim, Yookun Cho, Jiman Hong: 
 Impacts of delayed replication on the key-value store. 1757-1758

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














