


default search action
41st COMPSAC 2017: Turin, Italy - Volume 1: Symposia
- Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-0367-3
SETA: Software Engineering Technology & Applications
- Hridesh Rajan
, Alexander Bolotov, Chang Xu:
Message from SETA 2017 Program Chairs. 1 - Ricky Chan, Hong Zhu:
Message from SETA 2017 Symposium Chairs. 2
SETA Session 1
- Rubing Huang
, Yunan Zhou, Weiwen Zong, Dave Towey
, Jinfu Chen:
An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization. 3-12 - Kunihiro Noda, Takashi Kobayashi
, Tatsuya Toda, Noritoshi Atsumi
:
Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis. 13-22 - Jun Ma, Sheng Liu, Shengtao Yue, Xianping Tao, Jian Lu:
LeakDAF: An Automated Tool for Detecting Leaked Activities and Fragments of Android Applications. 23-32
SETA Session 2
- Weifeng Xu, Dianxiang Xu, Lin Deng
:
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names. 33-38 - Ailun Liu, Huibiao Zhu, Yuan Fei, Shuangqing Xiang, Gang Lu, Wanling Xie:
Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra. 39-44 - Wanling Xie, Xi Wu, Huibiao Zhu, Gang Lu, Ailun Liu:
A Proof System for mCWQ. 45-50 - Chao Ni, Wangshu Liu, Qing Gu, Xiang Chen, Daoxu Chen:
FeSCH: A Feature Selection Method using Clusters of Hybrid-data for Cross-Project Defect Prediction. 51-56
SETA Session 3
- Yan Lei, Xiaoguang Mao, Min Zhang, Jingan Ren, Yinhua Jiang:
Toward Understanding Information Models of Fault Localization: Elaborate is Not Always Better. 57-66 - Dong Yan, Linjie Pan, Rongjie Yan, Jun Yan, Jian Zhang:
Comprehensive Static Analysis for Configurable Software via Combinatorial Instantiation. 67-74 - Qiang Cui, Junjie Wang, Guowei Yang
, Miao Xie
, Qing Wang, Mingshu Li:
Who Should Be Selected to Perform a Task in Crowdsourced Testing? 75-84
SETA Session 4
- Yuexing Wang, Zuxing Gu, Xi Cheng, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun:
A Constraint-Pattern Based Method for Reachability Determination. 85-90 - Musaad Alzahrani, Austin Melton:
Defining and Validating a Client-Based Cohesion Metric for Object-Oriented Classes. 91-96 - Liang Xiao, John Fox:
Towards an Agent-Oriented Framework for Multidisciplinary Decision Support and Its Application to Triple Assessment of Breast Cancer. 97-102 - Meng Yan
, Xiaohong Zhang, Ling Xu, Haibo Hu, Song Sun, Xin Xia
:
Revisiting the Correlation Between Alerts and Software Defects: A Case Study on MyFaces, Camel, and CXF. 103-108
SETA Session 5
- Rafael Rieder
, Christian Haag Kristensen, Márcio Sarroglia Pinho
:
Quality Assessment of Interaction Techniques in Immersive Virtual Environments Using Physiological Measures. 109-117 - Bo Guo, Myoungkyu Song:
Interactively Decomposing Composite Changes to Support Code Review and Regression Testing. 118-127 - Akihiro Yamamori, Anders Mikael Hagward, Takashi Kobayashi
:
Can Developers' Interaction Data Improve Change Recommendation? 128-137
SETA Session 6
- Jie Liu, Jing Liu, Miaomiao Zhang, Haiying Sun, Xiaohong Chen, Dehui Du, Mingsong Chen:
An Approach to Proving Proof Obligation of Hybrid Event B Based on Differential Invariants. 138-143 - Marco Torchiano
, Antonio Vetrò
, Francesca Iuliano:
Preserving the Benefits of Open Government Data by Measuring and Improving Their Quality: An Empirical Study. 144-153 - Cong Wang, Fei He, Xiaoyu Song, Yu Jiang, Ming Gu, Jiaguang Sun:
Assertion Recommendation for Formal Program Verification. 154-159
SETA Session 7
- Wei Chen, Peixing Xu, Wensheng Dou, Guoquan Wu, Chushu Gao, Jun Wei:
A Hierarchical Categorization Approach for Configuration Management Modules. 160-169 - Fernando dos Santos
, Ingrid Nunes
, Ana L. C. Bazzan:
Supporting the Development of Agent-Based Simulations: A DSL for Environment Modeling. 170-179 - Paolo Busetta, Fitsum Meshesha Kifetew, Denisse Muñante
, Anna Perini, Alberto Siena, Angelo Susi:
Tool-Supported Collaborative Requirements Prioritisation. 180-189
SETA Session 8
- Ayaka Imazato, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Finding Extract Method Refactoring Opportunities by Analyzing Development History. 190-195 - Zhenpeng Fang, Xibin Zhao, Min Zhou:
Infer Precise Program Invariant Using Abstract Interpretation with Recurrence Solving. 196-201 - Yiqi Lu, Jiaqing Liang, Yanghua Xiao, Sheng Huang, Deqing Yang, Wei Wang, Haibo Lin:
XMLValue: XML Configuration Attribute Value Recommendation. 202-207 - Oswald Mesumbe Ekwoge, Awdren de Lima Fontão, Arilo Claudio Dias-Neto:
Tester Experience: Concept, Issues and Definition. 208-213
SETA Session 9
- Chun Cao, Chenglin Meng, Hongjun Ge, Ping Yu
, Xiaoxing Ma:
Xdroid: Testing Android Apps with Dependency Injection. 214-223 - Xiao He
, Zhenjiang Hu, Yi Liu:
Towards Variability Management in Bidirectional Model Transformation. 224-233 - Kangli He, Holger Hermanns
, Yixiang Chen:
Models of Connected Things: On Priced Probabilistic Timed Reo. 234-243
SETA Session 10
- Lov Kumar
, Santanu Kumar Rath
, Ashish Sureka:
An Empirical Analysis on Effective Fault Prediction Model Developed Using Ensemble Methods. 244-249 - Fulvio Corno
, Luigi De Russis
, Juan Pablo Sáenz:
Pain Points for Novice Programmers of Ambient Intelligence Systems: An Exploratory Study. 250-255 - Xiujing Liu, Yong Liu, Zheng Li
, Ruilian Zhao:
Fault Classification Oriented Spectrum Based Fault Localization. 256-261 - Ali Idri, Mariam Bachiri, José Luis Fernández-Alemán, Ambrosio Toval:
ISO/IEC 25010 Based Evaluation of Free Mobile Personal Health Records for Pregnancy Monitoring. 262-267
SETA Session 11
- David Perillo, Marco Di Natale:
Using MDA to Automate the Integration of Virtual Platforms for System-Level Simulation. 268-277 - Imad Eddine Touahria, Marisol García-Valls
, Abdellah Khababa:
An ICE Compliant Component Model for Medical Systems Development. 278-287 - Zhiyuan Chen, Maneesh Mohanavilasam, Young-Woo Kwon
, Myoungkyu Song:
Tool Support for Managing Clone Refactorings to Facilitate Code Review in Evolving Software. 288-297
SETA Session 12
- Cleverson Ledur, Dalvan Griebler
, Isabel Harb Manssour, Luiz Gustavo Fernandes
:
A High-Level DSL for Geospatial Visualizations with Multi-core Parallelism Support. 298-304 - Nasser Mustafa, Yvan Labiche
:
The Need for Traceability in Heterogeneous Systems: A Systematic Literature Review. 305-310 - Ken Nakayama, Shun'ichi Tano, Tomonori Hashiyama, Eko Sakai:
Incremental Annotate-Generalize-Search Framework for Interactive Source Code Comprehension. 311-316
SETA Session 13
- Dongjin Yu, Jie Wang, Qing Wu, Jiazha Yang, Jiaojiao Wang, Wei Yang, Wei Yan:
Detecting Java Code Clones with Multi-granularities Based on Bytecode. 317-326 - Andre de S. Landi, Fernando Chagas, Bruno Marinho Santos, Renato S. Costa, Rafael Serapilha Durelli, Ricardo Terra, Valter Vieira de Camargo:
Supporting the Specification and Serialization of Planned Architectures in Architecture-Driven Modernization Context. 327-336 - Maosheng Zhang, Ying Zhao, Zengmingyu He:
GenLog: Accurate Log Template Discovery for Stripped X86 Binaries. 337-346
SETA Session 14
- Jingwei Yang, Carl K. Chang, Ming Hua:
A Situation-Centric Approach to Identifying New User Intentions Using the MTL Method. 347-356 - Hoda Khalil
, Yvan Labiche
:
State-Based Tests Suites Automatic Generation Tool (STAGE-1). 357-362 - Maaki Nakano, Kunihiro Noda, Shinpei Hayashi
, Takashi Kobayashi
:
Mediating Turf Battles! Prioritizing Shared Modules in Locating Multiple Features. 363-368 - Hong Zhu, Ian Bayley:
On the Composibility of Design Patterns: Extended Abstract. 369-370
CELT: Computer Education & Learning Technologies
CELT Session 1
- Swapna Gottipati, Venky Shankararaman, Melvrick Goh:
Mining Capstone Project Wikis for Knowledge Discovery. 371-380 - Elena Baralis, Luca Cagliero
, Laura Farinetti, Marco Mezzalama, Enrico Venuto:
Experimental Validation of a Massive Educational Service in a Blended Learning Environment. 381-390 - Antonella Longo
, Marco Zappatore:
A Microservice-Based MOOL in Acoustics Addressing the Learning-at-Scale Scenario. 391-400
CELT Session 2
- Luca Cagliero
, Laura Farinetti, Elena Baralis:
Test-Driven Summarization: Combining Formative Assessment with Teaching Document Summarization. 401-406 - Alice Barana
, Marina Marchisio
, Alessandro Bogino, Lorenza Operti, Michele Fioravera
, Sergio Rabellino
, Francesco Floris:
Self-Paced Approach in Synergistic Model for Supporting and Testing Students. 407-412
CELT Session 3
- Chris Johnson, Adrian Abundez-Arce:
Toward Blocks-Text Parity. 413-419 - Marcello Missiroli, Daniel Russo
, Paolo Ciancarini
:
Teaching Test-First Programming: Assessment and Solutions. 420-425 - Veena Saini, Paramvir Singh, Ashish Sureka:
SEABED: An Open-Source Software Engineering Case-Based Learning Database. 426-431 - Alice Barana
, Michele Fioravera
, Marina Marchisio
, Sergio Rabellino
:
Adaptive Teaching Supported by ICTs to Reduce the School Failure in the Project "Scuola Dei Compiti". 432-437
CELT Session 4
- Fahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Cloud Adapted Workflow e-Assessment System: Cloud-AWAS. 438-447 - Mauro Cesar Charao dos Santos, Vicenzo Abichequer Sangalli
, Márcio Sarroglia Pinho
:
Evaluating the Use of Virtual Reality on Professional Robotics Education. 448-455 - Hironori Washizaki, Yusuke Sunaga, Masashi Shuto, Katsuhiko Kakehi, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo, Bastian Tenbergen
:
Combinations of Personal Characteristic Types and Learning Effectiveness of Teams. 456-457
CAP: Computer Architecture & Platforms
- Cristina Seceleanu
, Hironori Kasahara
, Tiberiu Seceleanu
:
Message from the CAP 2017 Organizing Committee. 458
CAP Session 1
- Christian Meurisch, Bennet Jeutter, Wladimir Schmidt, Nickolas Gundling, Benedikt Schmidt, Fabian Herrlich, Max Mühlhäuser:
An Extensible Pervasive Platform for Large-Scale Anticipatory Mobile Computing. 459-464 - Ashalatha Kunnappilly, Alexandru Sorici, Imad Alex Awada
, Irina Mocanu, Cristina Seceleanu
, Adina Magda Florea
:
A Novel Integrated Architecture for Ambient Assisted Living Systems. 465-472
CAP Session 2
- Jiwei Xu, Xiaozhao Xing, Tao Wang, Zhigang Lu, Wenbo Zhang:
RefCRE: A Reference Count Based Rewriting Framework for VM Image Restoration. 473-482 - Li-Zheng Liang, Ming-Chang Yang, Yuan-Hao Chang
, Tseng-Yi Chen
, Shuo-Han Chen
, Hsin-Wen Wei, Wei-Kuan Shih:
xB+-Tree: Access-Pattern-Aware Cache-Line-Based Tree for Non-volatile Main Memory Architecture. 483-491 - Hironori Kasahara
, Keiji Kimura, Boma A. Adhi
, Yuhei Hosokawa, Yohei Kishimoto, Masayoshi Mase:
Multicore Cache Coherence Control by a Parallelizing Compiler. 492-497
NCIW: Networks, Communications, Internet, & Web Technologies
- Tugkan Tuglular
, Ying Cai:
Message from the NCIW Program Co-chairs. 498
NCIW Session 1
- Yuanmin Xu, Huibiao Zhu, Xiaoran Zhu, Xi Wu, Jian Guo, Gang Lu:
Formalization and Verification of the PKMv3 Protocol Using CSP. 499-504 - Shuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa:
Cardinality Counting Circuit for Real-Time Abnormal Traffic Detection. 505-510 - Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
Cache Effect of Shared DNS Resolver. 511-516
NCIW Session 2
- Guido Marchetto, Riccardo Sisto, Matteo Virgilio, Jalolliddin Yusupov
:
A Framework for User-Friendly Verification-Oriented VNF Modeling. 517-522 - Zhe Zhang
, Chung-Horng Lung, Ioannis Lambadaris, Marc St-Hilaire, Sankarshan Sakkarepattana Nagaraja Rao:
Router Position-Based Cooperative Caching for Video-on-Demand in Information-Centric Networking. 523-528
NCIW Session 3
- Kenji Fujikawa, Ved P. Kafle
, Pedro Martinez-Julia
, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT. 529-537 - Daiki Matsui, Ryo Hagihara, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Analysis of Geographic DTN Routing under Random Walk Mobility Model. 538-547 - Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman
:
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network. 548-556
NCIW Session 4
- Xiaocao Hu, Zhiyong Feng, Keman Huang, Shizhan Chen:
Supporting Interoperability among Web Services Through Efficient Matching. 557-566 - Krittin Intharawijitr, Katsuyoshi Iida
, Hiroyuki Koga, Katsunori Yamaoka:
Practical Enhancement and Evaluation of a Low-Latency Network Model Using Mobile Edge Computing. 567-574 - Felipe Mota Barreto, Paulo A. de S. Duarte, Marcio E. F. Maia, Rossana M. de Castro Andrade
, Windson Viana
:
CoAP-CTX: A Context-Aware CoAP Extension for Smart Objects Discovery in Internet of Things. 575-584
SEPT: Security, Privacy, & Trust
- Katsuyoshi Iida
, Mohammad Zulkernine:
Message from SEPT 2017 Organizing Committee. 585
SEPT Session 1
- Cong Sun, Ning Xi, Jianfeng Ma:
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition. 586-595 - Babatunde Ojetunde
, Naoki Shibata
, Juntao Gao:
Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach. 596-601 - Xiaoran Duan, Yong Wang, Juguang Chen, Junhao Zhang:
Authenticating Preference-Oriented Multiple Users Spatial Queries. 602-607
SEPT Session 2
- Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations. 608-613 - Hyeon-Gu Jeon, Seong-Kyun Mok, Eun-Sun Cho
:
Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes. 614-623 - Burcu Ozcelik, Cemal Yilmaz:
Seer: A Lightweight Online Failure Prediction Approach. 624-625
SEPT Session 3 - Keynote
- Thomas P. Roth, Bruce M. McMillin:
Physical Attestation in the Smart Grid for Distributed State Verification. 626-627
SEPT Session 4
- Xiaoguang Wang
, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang:
SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack. 628-636 - Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Challenge to Impede Deep Learning against CAPTCHA with Ergonomic Design. 637-642 - Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori
, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. 643-648 - Vathalloor Merin George, Qusay H. Mahmoud:
Claimsware: A Claims-Based Middleware for Securing IoT Services. 649-654
SEPT Session 5
- Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. 655-664 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick
, François Barrère, Abdelmalek Benzekri:
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree? 665-674 - Lei Liu, Guoxin Su
, Jing Xu, Biao Zhang, Jiehui Kang, Sihan Xu, Peng Li, Guannan Si:
An Inferential Metamorphic Testing Approach to Reduce False Positives in SQLIV Penetration Test. 675-680
Student Research Symposium
- Claudio Demartini, Kenichi Yoshida, Luigi De Russis
:
Message from the Student Research Symposium Chairs. 681
SRS Session 1
- Michitomo Morii, Hiroki Tanioka
, Kenji Ohira
, Masahiko Sano, Yosuke Seki, Kenji Matsuura, Tetsushi Ueta
:
Research on Integrated Authentication Using Passwordless Authentication Method. 682-685 - Ryo Nakamura, Hiroyuki Ohsaki:
On the Effect of Scale-Free Structure of Network Topology on Performance of Content-Centric Networking. 686-689 - Tsuyoshi Yabuuchi, Ryo Nakamura, Hiroyuki Ohsaki:
A Fluid-Based Model of a Transport Protocol in Content-Centric Networking. 690-693
SRS Session 2
- Naoki Kobayakawa, Kenichi Yoshida:
How GitHub Contributing.md Contributes to Contributors. 694-696 - Yui Kazawa, Sho Tsugawa:
On the Effectiveness of Link Addition for Improving Robustness of Multiplex Networks against Layer Node-Based Attack. 697-700 - Natsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
On Message Delivery Delay of Epidemic DTN Routing with Broadcasting ACKs. 701-704
Fog Computing and Networking - Business Drivers and Impacts
- Joe Weinman:
Fogonomics - The Strategic, Economic, and Financial Aspects of the Cloud. 705
Fog Computing and Networking - Technology Drivers and Impacts
- Antonio Brogi
:
Application Deployment through the Fog. 706 - Bruce M. McMillin:
Secure Fog Computing for Smart Living. 707 - Yang Yang:
FA2ST: Fog as a Service Technology. 708
ITiP: IT in Practice
ITIP Session 1
- Stephen J. Andriole:
The Adoption of Emerging Technology: Technology Before Requirements. 709-713 - Muhammad Ashad Kabir
, Zhenchang Xing, Prakash Chandrasekaran, Shang-Wei Lin
:
Process Patterns: Reusable Design Artifacts for Business Process Models. 714-721 - Hoda Gholami, Carl K. Chang:
Situation-Aware Data-Driven Decision Making in Smart Environments Using the MapReduce. 722-730
ITIP Session 2
- Iacopo Vagliano
, Davide Ferretto
, Eugenio Brusa, Maurizio Morisio, Laura Valacca:
Tool Integration in the Aerospace Domain: A Case Study. 731-736 - Alberto Dumont Alves Oliveira
, Marcelo Medeiros Eler
:
Strategies and Challenges on the Accessibility and Interoperability of e-Government Web Portals: A Case Study on Brazilian Federal Universities. 737-742 - Saleh Alamdy, Rasha Osman
:
Software Industry Practice in Africa: Case Study Sudan. 743-748
ITIP Session 3
- Dario Bonino, Paolo Vergori:
Agent Marketplaces and Deep Learning in Enterprises: The COMPOSITION Project. 749-754 - Masoud Hemmatpour
, Mohammad Ghazivakili, Bartolomeo Montrucchio, Maurizio Rebaudengo:
DIIG: A Distributed Industrial IoT Gateway. 755-759 - Chunhui Guo
, Zhicheng Fu, Shangping Ren, Yu Jiang, Lui Sha:
Towards Verifiable Safe and Correct Medical Best Practice Guideline Systems. 760-765
DSAT: Data Sciences, Analytics, & Technologies
DSAT Session 1 - Data Analytics Competition
DSAT Session 2
- Aki-Hiro Sato
:
Inference of Extreme Synchrony with an Entropy Measure on a Bipartite Network. 766-771 - Hongyan Tang, Ying Li, Long Wang, Jing Gu, Zhonghai Wu:
Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data System. 772-777
DSAT Session 3
- Edimar Manica, Carina F. Dorneles
, Renata Galante:
R-Extractor: A Method for Data Extraction from Template-Based Entity-Pages. 778-787 - Pongsakorn U.-Chupala, Yasuhiro Watashiba, Kohei Ichikawa
, Susumu Date
, Hajimu Iida:
Container Rebalancing: Towards Proactive Linux Containers Placement Optimization in a Data Center. 788-795 - Lidong Zhang, Yongwei Wu, Ruini Xue, Tse-Chuan Hsu, Hongji Yang, Yeh-Ching Chung:
HybridFS - A High Performance and Balanced File System Framework with Multiple Distributed File Systems. 796-805
DSAT Session 4
- Hanlin Sun, Wei Jie
, Christian Sauer
, Sugang Ma, Gang Han, Zhongmin Wang, Kui Xing:
A Parallel Self-Organizing Community Detection Algorithm Based on Swarm Intelligence for Large Scale Complex Networks. 806-815 - Ricardo Chagas Rapacki, Leandro Krug Wives
, Renata Galante:
KANDOR - Knowledge Analysis of Neighborhood Dynamics and Online Relationships. 816-821 - Xing Fan, Chung-Horng Lung, Samuel A. Ajila
:
An Adaptive Diversity-Based Ensemble Method for Binary Classification. 822-827 - Al Hafiz Akbar Maulana Siagian
, Masayoshi Aritsugi:
Combining Word and Character N-Grams for Detecting Deceptive Opinions. 828-833
HCSC: Human Computing & Social Computing
- Moushumi Sharmin, Jalal Mahmud:
Message from HCSC Organizing Committee. 834
HCSC Session 1
- Moushumi Sharmin, Theodore Weber, Hillol Sarker, Nazir Saleheen, Santosh Kumar, Shameem Ahmed, Mustafa al'Absi:
Opportunities and Challenges in Designing Participant-Centric Smoking Cessation System. 835-844 - Nova Ahmed
, Minhaz Ahmed Syrus, Arshad M. Chowdhury:
Simple Group Photo Sharing Using Facesense. 845-850 - Christian Lykawka, Bruno Konzen Stahl, Márcia de Borba Campos, Jaime Sánchez, Márcio Sarroglia Pinho
:
Tactile Interface Design for Helping Mobility of People with Visual Disabilities. 851-860
HCSC Session 2
- Md Monsur Hossain, Moushumi Sharmin, Shameem Ahmed:
Understanding the Feasibility of a Location-Aware Mobile-Based 911-Like Emergency Service in Bangladesh. 861-868 - Eugene Yujun Fu
, Tiffany C. K. Kwok, Erin You Wu, Hong Va Leong
, Grace Ngai
, Stephen C. F. Chan
:
Your Mouse Reveals Your Next Activity: Towards Predicting User Intention from Mouse Interaction. 869-874
HCSC Session 3
- Massimo Maresca, Pierpaolo Baglietto:
Spreadsheet Element Sharing through Synchronization. 875-880 - Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Users Interfaces Adaptation for Visually Impaired Users Based on Meta-Model Transformation. 881-886
EATA: Emerging Advances in Technology & Applications
- Ali R. Hurson
, Hiroyuki Sato:
Message from the EATA 2017 Co-Chairs. 887
EATA Session 1
- Xinxin Gao, Wencheng Yu, Yilong Rong, Songmao Zhang:
Ontology-Based Social Media Analysis for Urban Planning. 888-896 - Petar Mrazovic, Josep Lluís Larriba-Pey, Mihhail Matskin:
Improving Mobility in Smart Cities with Intelligent Tourist Trip Planning. 897-907
EATA Session 2
- Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai:
SNS Agency Robot for Elderly People Using External Cloud-Based Services. 908-913 - Lorenzo Bottaccioli
, Alessandro Aliberti
, Francesca Maria Ugliotti
, Edoardo Patti, Anna Osello, Enrico Macii, Andrea Acquaviva:
Building Energy Modelling and Monitoring by Integration of IoT Devices and Building Information Models. 914-922
EATA Session 3
- Tarek Awwad, Nadia Bennani, Konstantin Ziegler, Veronika Sonigo, Lionel Brunie, Harald Kosch:
Efficient Worker Selection Through History-Based Learning in Crowdsourcing. 923-928 - Lei Ma, Bing Yu, Hiroyuki Sato, Yadong Wang:
Collaborative Computation Offloading in Heterogeneous Asynchronous Cloud Environment. 929-934 - Yuuichi Teranishi, Takashi Kimata, Hiroaki Yamanaka
, Eiji Kawai, Hiroaki Harai:
Dynamic Data Flow Processing in Edge Computing Environments. 935-944
MOWU: Mobile, Wearable, & Ubiquitous Computing
- Vladimir Getov, Hong Va Leong:
Message from the MOWU 2017 Organizing Committee. 945-947
MOWU Session 1
- Francisco A. A. Gomes, Paulo A. L. Rego, Lincoln S. Rocha, José N. de Souza, Fernando A. M. Trinta:
CAOS: A Context Acquisition and Offloading System. 957-966 - Golam Mushih Tanimul Ahsan, Md. Osman Gani, Md. Kamrul Hasan, Sheikh Iqbal Ahamed, William C. Chu, Mohammad Adibuzzaman, Joshua Field:
A Novel Real-Time Non-invasive Hemoglobin Level Detection Using Video Images from Smartphone Camera. 967-972
MOWU Session 2
- Masoud Hemmatpour
, Milad Karimshoushtari, Renato Ferrero
, Bartolomeo Montrucchio, Maurizio Rebaudengo, Carlo Novara
:
Polynomial classification model for real-time fall prediction system. 973-978 - Minh Le, Myoungkyu Song, Young-Woo Kwon
:
Enabling Flexible and Efficient Remote Execution in Opportunistic Networks through Message-Oriented Middleware. 979-984

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.