


default search action
31st SAC 2016: Pisa, Italy
- Sascha Ossowski:
Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016. ACM 2016, ISBN 978-1-4503-3739-7
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Computational biology and bioinformatics track
- Andrzej Mizera, Jun Pang, Qixia Yuan:
Parallel approximate steady-state analysis of large probabilistic Boolean networks. 1-8 - Hyunjin Kim, Sanghyun Park:
Discovering disease-associated drugs using web crawl data. 9-14 - Jeongwoo Kim, Youngmi Yoon, Sanghyun Park:
IDO: inferring describable disease-gene relationships using opinion sentences. 15-22 - Fabio Fassetti
, Simona E. Rombo, Cristina Serrao:
Discovering discriminative graph patterns from gene expression data. 23-30 - Vinicius Rosa Seus, Lande Silva Jr., Jorge Gomes, Pedro E. A. da Silva, Adriano Velasque Werhli
, Karina S. Machado
:
A framework for virtual screening. 31-36
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Junbum Cha, Jeongwoo Kim, Yunku Yeu
, Sanghyun Park:
A method for obtaining rich data from PubMed using SVM. 37-39 - Levy Batista, Thierry Bastogne, El-Hadi Djermoune:
Identification of dynamical biological systems based on mixed-effect models. 40-43 - Marco Barsacchi
, Andrea Baù, Alessio Bechini
:
Extensive assessment of metrics on RNA secondary structures and relative ensembles. 44-47
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Computational intelligence and video & image analysis track
- Mirela T. Cazzolato, Marcos Vinicius Naves Bedo, Alceu Ferraz Costa, Jéssica Andressa de Souza, Caetano Traina Jr.
, José Fernando Rodrigues Jr., Agma J. M. Traina:
Unveiling smoke in social images with the SmokeBlock approach. 49-54 - Jamel Hattay
, Samir Belaid
, Wady Naanaa, Taoufik Aguili:
Multiscale convolutive blind source separation in wavelet transform domain. 55-60 - Douglas Felipe Pereira, Priscila T. M. Saito
, Pedro Henrique Bugatti
:
An image analysis framework for effective classification of seed damages. 61-66 - Jing Wang, Zhijie Xu
:
A graph theory-based online keywords model for image semantic extraction. 67-72 - Ahmed Aleroud, George Karabatis:
Beyond data: contextual information fusion for cyber security analytics. 73-79
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Henrique Batista da Silva, Raquel Pereira de Almeida, Gabriel Barbosa da Fonseca, Carlos Caetano
, Dario Vieira
, Zenilton Kleber Gonçalves do Patrocínio Jr.
, Arnaldo de Albuquerque Araújo, Silvio Jamil Ferzoli Guimarães:
Video similarity search by using compact representations. 80-83 - Valéria P. M. Fernandes, Rodrigo F. A. Kanehisa, Geraldo Braz Junior
, Aristófanes C. Silva, Anselmo Cardoso de Paiva
:
Lung nodule classification based on shape distributions. 84-86
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Evolutionary computation track
- Maha Elarbi
, Slim Bechikh
, Lamjed Ben Said
, Chih-Cheng Hung:
Solving many-objective problems using targeted search directions. 89-96 - Alberto Bartoli
, Andrea De Lorenzo
, Eric Medvet
, Fabiano Tarlao:
Active learning approaches for learning regular expressions with genetic programming. 97-102 - Léo Françoso Dal Piccol Sotto, Vinícius Veloso de Melo, Márcio P. Basgalupp
:
An improved λ-linear genetic programming evaluated in solving the Santa Fe ant trail problem. 103-108
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Jagadeesh Gunda, Sasa Z. Djokic, Roberto Langella
, Alfredo Testa
:
On convergence of conventional and meta-heuristic methods for security-constrained OPF analysis. 109-111 - Henry E. L. Cagnini
, Rodrigo C. Barros
, Christian Vahl Quevedo, Márcio P. Basgalupp
:
Medoid-based data clustering with estimation of distribution algorithms. 112-115
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Deblina Bhattacharjee
:
Evolutionary reinforcement learning based search optimization: student research abstract. 116-117
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Healthcare track
- Davy Preuveneers, Wouter Joosen:
Privacy-enabled remote health monitoring applications for resource constrained wearable devices. 119-124 - João Ladislau Lopes, Rodrigo Santos de Souza, Cláudio Fernando Resin Geyer, Alexandre Souza, Patricia Davet, Ana Marilza Pernas, Adenauer C. Yamin:
A situation-aware pervasive approach for assessing therapeutic goals in healthcare environment. 125-130 - Rohit Goyal, Nicola Dragoni
, Angelo Spognardi
:
Mind the tracker you wear: a security analysis of wearable health trackers. 131-136 - Fiemke Griffioen-Both, Sandor Spruit, Siska Fitrianie
, Robbert-Jan Beun, Jaap Lancee:
Testing for mobile e-health interventions. 137-142 - Zaffar Haider Janjua, Daniele Riboni, Claudio Bettini
:
Towards automatic induction of abnormal behavioral patterns for recognizing mild cognitive impairment. 143-148 - Cléber Gimenez Corrêa
, Daniel Makoto Tokunaga, Edith Ranzini, Fátima L. S. Nunes
, Romero Tori
:
Haptic interaction objective evaluation in needle insertion task simulation. 149-154 - José Daniel Pereira, Francisco José da Silva e Silva
, Luciano Reis Coutinho
, Berto de Tácio Pereira Gomes, Markus Endler:
A movement activity recognition pervasive system for patient monitoring in ambient assisted living. 155-161
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Mouhannad Ali, Fadi Al Machot, Ahmad Haj Mosa
, Kyandoghere Kyamakya:
A novel EEG-based emotion recognition approach for e-healthcare applications. 162-164
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Lukas Huber:
A web tool for medical topic modeling: student research abstract. 165-166
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Smart human computer interaction track
- Yoon Phaik Ooi, Dion Hoe-Lian Goh, Elisa D. Mekler
, Alexandre N. Tuch, Jillian Boon, Rebecca Pei-Hui Ang, Daniel Fung, Jens Gaab
:
Understanding player perceptions of RegnaTales, a mobile game for teaching social problem solving skills. 167-172 - Anna Beatriz dos Santos Marques, Simone D. J. Barbosa
, Tayana Conte
:
A comparative evaluation of interaction models for the design of interactive systems. 173-180 - Lucas Pedroso Carvalho, Lucas Pereira Ferreira, André Pimenta Freire:
Accessibility evaluation of rich internet applications interface components for mobile screen readers. 181-186 - Jiajia Li, Grace Ngai
, Hong Va Leong
, Stephen Chi-fai Chan
:
Multimodal human attention detection for reading. 187-192 - Wallace P. Lira, Fernando Gama, Hivana Melo Barbosa Dall'Agnol
, Ronnie Alves
, Cleidson R. B. de Souza:
VCloud: adding interactiveness to word clouds for knowledge exploration in large unstructured texts. 193-198
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Yanru Guo, Dion Hoe-Lian Goh:
From storyboard to software: user evaluation of an information literacy game. 199-201 - Rui Pereira
, João Saraiva
, Jácome Cunha
, João Paulo Fernandes
:
User-friendly spreadsheet querying: an empirical study. 202-204 - Suzanne Kieffer
, Jean Vanderdonckt:
STRATUS: a questionnaire for strategic usability assessment. 205-212 - Andreia R. Casare, Celmar Guimarães da Silva
, Paulo Sérgio Martins, Regina L. O. Moraes
:
Usability heuristics and accessibility guidelines: a comparison of heuristic evaluation and WCAG. 213-215
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Awais Ahmad:
Social element of big data analytics: integrating social network with the internet of things: student research abstract. 216-217
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Intelligent and interactive learning environments track
- Marco Zappatore, Antonella Longo
, Mario A. Bochicchio
, Daniele Zappatore, Alessandro A. Morrone, Gianluca De Mitri:
A crowdsensing approach for mobile learning in acoustics and noise monitoring. 219-224 - Carlos Emilio de Andrade Cacho, Paulo S. L. Souza
, Sarita Mazzini Bruschi
, Ellen F. Barbosa, Fernando Tiosso:
An interactive approach for the teaching of virtual memory using open educational resources. 225-231 - Maria da C. C. Araújo, Antônio R. S. Silva, Ticianne G. R. Darin
, Everardo L. de Castro, Rossana M. C. Andrade
, Ernesto Trajano de Lima, Jaime Sánchez, José Aires de Castro Filho, Windson Viana
:
Design and usability of a braille-based mobile audiogame environment. 232-238 - Edgar Marçal, Rossana M. C. Andrade
, Windson Viana
, Eduardo Junqueira, Rosemeiry Melo:
Mobile phone text messaging to increase student participation: an experience in a blended course. 239-245
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Intelligent robotics and multi-agent systems track
- Lenz Belzner, Alexander Neitz:
Learning relational probabilistic action models for online planning with decision forests. 248-253 - Lenz Belzner:
Time-adaptive cross entropy planning. 254-259 - Mohan Sridharan
, Ben Meadows, Zenon Colaco:
A tale of many explanations: towards an explanation generation system for robots. 260-267 - Rafael Gonçalves Colares, Luiz Chaimowicz
:
The next frontier: combining information gain and distance cost for decentralized multi-robot exploration. 268-274 - Siamak G. Faal, Shadi Tasdighi Kalat, Cagdas D. Onal:
Towards collective manipulation without inter-agent communication. 275-280
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Anton Dukeman, Julie A. Adams, James R. Edmondson:
Extensible collaborative autonomy using GAMS. 281-283 - Sebastian Ahrndt, Johannes Fähndrich, Sahin Albayrak
:
Human-agent teamwork: what is predictability, why is it important? 284-286 - Florian Mirus
, Frank Slomian, Stefan Dörr, Felipe Garcia Lopez, Matthias Gruhler, Jürgen Pfadt:
A modular hybrid localization approach for mobile robots combining local grid maps and natural landmarks. 287-290
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Neuro computing and deep learning and continuous-time computing track
- Daniel Neil, Michael Pfeiffer, Shih-Chii Liu:
Learning to be efficient: algorithms for training low-latency, low-compute deep spiking neural networks. 293-298 - Eugênio de Carvalho Saraiva, Herman Martins Gomes:
Similarity analysis of neuronal activation patterns. 299-304
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Pedro Costa Klein, Ricardo Bernardi Soder, Jefferson Becker, Alexandre Rosa Franco
, Márcio Sarroglia Pinho
:
An automatic method for multiple sclerosis lesion detection in fluid attenuated inversion recovery magnetic resonance images. 305-308 - Safae Cherdal
, Salma Mouline
:
Petri nets for modelling and analysing a complex system related to Alzheimer's disease. 309-312
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Alberto Antonietti
:
Modeling the cerebellum, from neurons to healthy and pathological behaviors: student research abstract. 313-314
Volume I: Artificial intelligence and agents, distributed systems, and information systems: The semantic web and applications track
- Guangyuan Piao
, John G. Breslin:
Measuring semantic distance for linked open data-enabled recommender systems. 315-320 - Ricardo de Almeida Falbo, Glaice Kelly Quirino, Julio Cesar Nardi, Monalessa Perini Barcellos
, Giancarlo Guizzardi
, Nicola Guarino
, Antonella Longo
, Barbara Livieri:
An ontology pattern language for service modeling. 321-326 - Pasquale Minervini
, Claudia d'Amato
, Nicola Fanizzi, Floriana Esposito:
Leveraging the schema in latent factor models for knowledge graph completion. 327-332 - Claudia d'Amato
, Steffen Staab, Andrea G. B. Tettamanzi, Duc Minh Tran, Fabien Gandon
:
Ontology enrichment by discovering multi-relational association rules from ontological knowledge bases. 333-338 - Hela Sfar, Anja Habacha Chaïbi, Amel Bouzeghoub, Henda Ben Ghézala
:
Gold standard based evaluation of ontology learning techniques. 339-346 - Marco Cameranesi, Claudia Diamantini
, Domenico Potena
, Emanuele Storti
:
GoAAL: an ontology for goal-oriented development of AAL environments. 347-353 - Francesco Corcoglioniti
, Marco Rospocher
, Alessio Palmero Aprosio
:
A 2-phase frame-based knowledge extraction framework. 354-361 - Wei Emma Zhang
, Quan Z. Sheng
, Yongrui Qin
, Lina Yao, Ali Shemshadi, Kerry L. Taylor:
SECF: improving SPARQL querying performance with proactive fetching and caching. 362-367
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Yoshinori Hijikata, Shintaro Nomura, Fumitaka Nakane, Shogo Nishida:
A bootstrapping method for extracting attribute names with keys from the web. 368-371 - Nikolaos Kaklanis, Ageliki Konstadinidou, Konstantinos Votis
, Dimitrios Tzovaras
:
Automatic semantic service composition aiming at increasing end-users' accessibility. 372-374
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Guangyuan Piao
:
Exploiting the semantic similarity of interests in a semantic interest graph for social recommendations: student research abstract. 375-376
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Cloud computing track
- Guilherme da Cunha Rodrigues
, Rodrigo N. Calheiros
, Vinicius Tavares Guimaraes, Glederson Lessa dos Santos, Márcio Barbosa de Carvalho, Lisandro Zambenedetti Granville
, Liane Margarida Rockenbach Tarouco
, Rajkumar Buyya:
Monitoring of cloud computing environments: concepts, solutions, trends, and future directions. 378-383 - Maurizio Montagnuolo, Alberto Messina, Elliot K. Kolodner, Doron Chen, Eran Rom, Kalman Z. Meth, Paula Ta-Shma:
Supporting media workflows on an advanced cloud object store platform. 384-389 - Victor A. E. de Farias, Flávio R. C. Sousa, José Gilvan Rodrigues Maia, João Paulo Pordeus Gomes, Javam C. Machado:
Elastic provisioning for cloud databases with uncertainty management. 390-397 - Bojan Suzic:
Securing integration of cloud services in cross-domain distributed environments. 398-405 - Ivanilton Polato
, Denilson Barbosa, Abram Hindle, Fabio Kon
:
Hadoop energy consumption reduction with hybrid HDFS. 406-411 - Emanuel F. Coutinho, Paulo Antonio Leal Rego, Danielo Goncalves Gomes
, José Neuman de Souza
:
An architecture for providing elasticity based on autonomic computing concepts. 412-419 - Luis Carlos Jersak, Tiago Ferreto:
Performance-aware server consolidation with adjustable interference levels. 420-425 - Nathanaël Cheriere
, Pierre Donat-Bouillud, Shadi Ibrahim, Matthieu Simonin:
On the usability of shortest remaining time first policy in shared Hadoop clusters. 426-431 - Majid Makki, Dimitri Van Landuyt
, Stefan Walraven, Wouter Joosen:
Scalable and manageable customization of workflows in multi-tenant SaaS offerings. 432-439 - Marco Anisetti
, Claudio Agostino Ardagna
, Filippo Gaudenzi, Ernesto Damiani
:
A certification framework for cloud-based services. 440-447 - Maha Shamseddine, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi, Wassim Itani:
NCaaS: network configuration as a service in SDN-driven cloud architectures. 448-454 - Emanuel F. Coutinho, Paulo A. L. Rego, José Neuman de Souza
:
Evaluating the elasticity of multimedia applications in a cloud computing environment using network metrics. 455-461 - Gyorgi Stoykov, Anis Yazidi:
An enhanced biomorphic model for cloud scaling. 462-469
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Andrea Nodari, Jukka K. Nurminen
, Christian Frühwirth:
Inventory theory applied to cost optimization in cloud computing. 470-473 - Jithin R, Priya Chandran
:
Dynamic partitioning of physical memory among virtual machines: ASMI: architectural support for memory isolation. 474-476 - Ruey-Kai Sheu, Shyan-Ming Yuan
, Xiao-Long Liu, Po-Yu Chung:
A plug-and-work tool for cloud system reconfiguration with single command. 477-479 - Hugo Lewi Hammer, Anis Yazidi, Kyrre M. Begnum:
Reliable modeling of CPU usage in an office worker environment. 480-483 - Wiem Abderrahim, Zièd Choukair:
PaaS dependability integration architecture based on cloud brokering. 484-487
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Amjad Ullah:
Towards workload-aware fine-grained control over cloud resources: student research abstract. 488-489
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Dependable and adaptive distributed systems track
- Samuel Benz, Leandro Pacheco de Sousa
, Fernando Pedone
:
Stretching multi-ring Paxos. 492-499 - Young Yoon, Nathan Robinson, Vinod Muthusamy, Sheila A. McIlraith, Hans-Arno Jacobsen:
Planning the transformation of overlays. 500-507 - Hanna Kavalionak, Amir Hossein Payberah, Alberto Montresor
, Jim Dowling:
NATCloud: cloud-assisted NAT-traversal service. 508-513 - Carlos Bartolomeu, Manuel Bravo, Luís E. T. Rodrigues:
Dynamic adaptation of geo-replicated CRDTs. 514-521 - Mehran Khan, Ferhat Khendek
, Maria Toeroe:
Monitoring service level workload and adapting highly available applications. 522-529
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Nicola Nostro, Ilaria Matteucci
, Andrea Ceccarelli
, Francesco Santini
, Felicita Di Giandomenico, Fabio Martinelli, Andrea Bondavalli
:
A multi-criteria ranking of security countermeasures. 530-533 - Odorico Machado Mendizabal
, Fernando Luís Dotti
, Fernando Pedone
:
Analysis of checkpointing overhead in parallel state machine replication. 534-537 - Valmir Carneiro Barbosa
, Alan Diêgo A. Carneiro, Fábio Protti, Uéverton S. Souza
:
Deadlock models in distributed computation: foundations, design, and computational complexity. 538-541 - Aymen Jlassi, Patrick Martineau:
Virtualization technologies for the big data environment. 542-545
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Mobile computing and applications track
- Bin Cao, Jing Fan, Mingxuan Yuan, Yanhua Li:
Toward accurate energy-efficient cellular network: switching off excessive carriers based on traffic profiling. 546-551 - Victor de Graaff, Rolf A. de By, Maurice van Keulen:
Automated semantic trajectory annotation with indoor point-of-interest visits in urban areas. 552-559 - Chung-Kuang Chou
, Chia-Chih Lin, Ming-Syan Chen
:
Context-aware daily activity summarization with adaptive transmission. 560-565 - Hochul Lee, Jaehun Lee, Hyuck Han, Sooyong Kang:
Mobile platform support for remote music play. 566-571 - Jinkwan Park, Taeyong Kim, Bokuk Park, Hwan-Gue Cho:
Virtual running of vehicle trajectories for automatic map generation. 572-579 - Yun Shen, Nathan S. Evans, Azzedine Benameur:
Insights into rooted and non-rooted Android mobile devices with behavior analytics. 580-587 - Alfredo Cuzzocrea, Enzo Mumolo, Alessandro Moro:
Real-time counting of moving objects in complex environments. 588-595 - Wan D. Bae, Shayma Alkobaisi
, Wade Meyers, Sada Narayanappa, Petr Vojtechovský:
Voronoi maps: an approach to individual-based environmental exposure estimation. 596-603 - Jee-Eun Kim, Masahiro Bessho, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:
Navigating visually impaired travelers in a large train station using smartphone and bluetooth low energy. 604-611 - Mohamed Jacem Guezguez, Slim Rekhis
, Noureddine Boudriga:
A sensor cloud architecture for healthcare applications. 612-617
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Massimiliano Benedetto, Alessio Gagliardi
, Pasquale Buonocunto, Giorgio C. Buttazzo:
An Android application for head tracking. 618-621 - Farah Saab, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A crowdsourcing game-theoretic intrusion detection and rating system. 622-625 - Marcio E. F. Maia, Rossana M. C. Andrade
, Windson Viana
:
Towards a component infrastructure for cyber-physical systems. 626-628
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Catherine Sotirakou
:
A mobile news reader that turns news consumption into a game: student research abstract. 629-630 - Piyush Rai Saxena:
A data driven context aware activity recognition system: student research abstract. 631-632 - Yong Zheng
:
Context-driven mobile apps management and recommendation: student research abstract. 633-634
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Networking track
- Maurice Khabbaz
, Khaled B. Shaban
, Chadi Assi, Long Qu:
Prioritizing deadline-constrained data flows in cloud datacenter networks. 636-643 - Gianpiero Costantino, Rajib Ranjan Maiti, Fabio Martinelli, Paolo Santi:
LoSeRO: a locality sensitive routing protocol in opportunistic networks. 644-650 - Péter Megyesi, Alessio Botta
, Giuseppe Aceto, Antonio Pescapè, Sándor Molnár:
Available bandwidth measurement in software defined networks. 651-657 - Kallol Krishna Karmakar
, Vijay Varadharajan
, Udaya Kiran Tupakula
, Michael Hitchens
:
Policy based security architecture for software defined networks. 658-663 - André Soares
, Alexandre Fontinele
, Gilvan M. Durães
, William Giozza
, José Roberto Amazonas:
Circuit-switched translucent optical networks planning with user level QoS. 664-670
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Valerio Arnaboldi
, Mattia Giovanni Campana
, Franca Delmastro
, Elena Pagani
:
PLIERS: a popularity-based recommender system for content dissemination in online social networks. 671-673
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Wireless communications and networking track
- Panagiotis-Agis Oikonomou-Filandras, Kai-Kit Wong, Zhongbin Zheng, Yangyang Zhang:
Cooperative localisation with hybrid inertial navigation system/pedestrian dead reckoning tracking for GPS-denied environments. 675-681 - Tânia L. Monteiro, Marcelo Eduardo Pellenz
, Edgard Jamhour, Manoel Camillo Penna, Fabrício Enembreck
, Richard Demo Souza:
A scalable multiagent approach for channel assignment in wireless networks. 682-687 - Made Harta Dwijaksara, Wha Sook Jeon, Dong Geun Jeong:
A joint user association and load balancing scheme for wireless LANs supporting multicast transmission. 688-695 - Sahrish Khan Tayyaba
, Abdul Wahid, Sadaf Tanvir:
Comparative study of routing strategies in software defined networking. 696-702 - Rone Ilídio da Silva, Mario A. Nascimento:
On best drone tour plans for data collection in wireless sensor network. 703-708 - Sucupira Lima, Daniel Larces, Celestino Junior, Joaquim Larces:
E-ProbT: a new approach to mitigate the broadcast storm problem in VANETs. 709-715 - Tales Heimfarth, João Carlos Giacomin, João Paulo de Araujo, Edison Pignaton de Freitas
:
Analytical study of anycast asynchronous MAC protocols for wireless sensor networks. 716-723 - Muhammad Azfar Yaqub
, Syed Hassan Ahmed
, Safdar Hussain Bouk, Dongkyun Kim:
Interest forwarding in vehicular information centric networks: a survey. 724-729
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Khaled Hadi:
An adaptive hole-bypassing algorithm for wireless sensor networks. 730-733 - Bo Cui, Ru Li, Jing Liu, Yujun Zhang, Zhongcheng Li:
Limited space oriented optimized storage protocol in autonomous mobile cloud. 734-737 - V. Sreejith, R. Suriyadeepan, K. R. Anupama, Lucy J. Gudino:
DS-MMAC: dynamic schedule based MAC for mobile wireless sensor network. 738-741 - Sunju Ha, Jisup Yoon, Seongbae Eun, Sun Sup So, Jinman Jung, Young-Sun Yun:
Development of an O2O(offline to online) application case based on person wide web platform. 742-745
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Amir Atabekov:
Internet of things-based smart classroom environment: student research abstract. 746-747
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Web technologies track
- Yiwei Zhou, Elena Demidova
, Alexandra I. Cristea
:
Who likes me more?: analysing entity-centric language-specific bias in multilingual Wikipedia. 750-757 - Xiaozhong Pan, Godmar Back:
Rich cloud-based web applications with CloudBrowser 2.0. 758-765 - Willian Massami Watanabe
, Renata Pontin de Mattos Fortes
:
Automatic identification of drop-down menu widgets using mutation observers and visibility changes. 766-771 - Iris van Dam, Gerhard van Ginkel, Wim Kuipers, Nikki Nijenhuis, Damir Vandic, Flavius Frasincar
:
Duplicate detection in web shops using LSH to reduce the number of computations. 772-779 - Yeon-Chang Lee
, Jiwon Hong
, Sang-Wook Kim:
Job recommendation in AskStory: experiences, methods, and evaluation. 780-786 - Luiz F. Gonçalves, Leandro G. Vasconcelos, Ethan V. Munson, Laércio A. Baldochi:
Supporting adaptation of web applications to the mobile environment with automated usability evaluation. 787-794 - Tanwir Ahmad
, Dragos Truscan
:
Automatic performance space exploration of web applications using genetic algorithms. 795-800 - Hossain Shahriar
, Hisham Haddad:
Object injection vulnerability discovery based on latent semantic indexing. 801-807
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Yui Yasunaga, Atsuyuki Morishima:
MorphingAssist: seamless transformation from keywords to structured queries. 808-811 - Tim Jungnickel, Tobias Herb:
Simultaneous editing of JSON objects via operational transformation. 812-815 - Michel Albonico
, Jean-Marie Mottu, Gerson Sunyé:
Controlling the elasticity of web applications on cloud computing. 816-819 - Hee-Jeong Kim, Dong-Kyu Chae, Sang-Wook Kim, Jongwuk Lee:
Analyzing crowdsourced promotion effects in online social networks. 820-823
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Data mining track
- Frank Gouineau, Tom Landry, Thomas Triplet:
PatchWork, a scalable density-grid clustering algorithm. 824-831 - Jianpeng Zhang, Mykola Pechenizkiy
, Yulong Pei, Julia Efremova:
A robust density-based clustering algorithm for multi-manifold structure. 832-838 - Javier de San Pedro, Jordi Cortadella
:
Mining structured petri nets for the visualization of process behavior. 839-846 - Ameni Bouaziz, Célia da Costa Pereira
, Christel Dartigues-Pallez, Frédéric Precioso:
Interactive generic learning method (IGLM): a new approach to interactive short text classification. 847-852 - Oskar Gross, Antoine Doucet
, Hannu Toivonen
:
Language-independent multi-document text summarization with document-specific word associations. 853-860 - Jerry Chun-Wei Lin
, Wensheng Gan
, Philippe Fournier-Viger
, Tzung-Pei Hong
:
Efficient algorithms for mining recent weighted frequent itemsets in temporal transactional databases. 861-866 - Luiza Antonie, Osmar R. Zaïane, Robert C. Holte:
Redundancy reduction: does it help associative classifiers? 867-874 - Wouter van Heeswijk, George H. L. Fletcher, Mykola Pechenizkiy
:
On structure preserving sampling and approximate partitioning of graphs. 875-882 - Atif Raza
, Jörg Wicker
, Stefan Kramer:
Trading off accuracy for efficiency by randomized greedy warping. 883-890
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Xiaojian Ding, Xiao-Guang Liu, Xin Xu:
An optimization method of extreme learning machine for regression. 891-893 - Ping Xiao, Hannu Toivonen
:
LayerFolding: discovering creative links in word association networks. 894-897 - Philippe Fournier-Viger
, Souleymane Zida, Jerry Chun-Wei Lin
, Cheng-Wei Wu, Vincent S. Tseng:
Efficient closed high-utility itemset mining. 898-900 - Caroline Tomasini, Leonardo R. Emmendorfer, Eduardo Nunes Borges
, Karina S. Machado
:
A methodology for selecting the most suitable cluster validation internal indices. 901-903 - Dimitrios Rafailidis
:
Clustering nodes with attributes via graph alignment. 904-907
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Masoud Reyhani Hamedani
:
An efficient and effective link-based similarity measure in social and information networks: student research abstract. 908-909
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Data streams track
- Poorya ZareMoodi, Sajjad Kamali Siahroudi, Hamid Beigy
:
A support vector based approach for classification beyond the learned label space in data streams. 910-915 - William Braik, Floréal Morandat, Jean-Rémy Falleri
, Xavier Blanc:
Real time streaming pattern detection for eCommerce. 916-922 - Shazia Tabassum, João Gama
:
Sampling massive streaming call graphs. 923-928 - Isvani Inocencio Frías Blanco
, Alberto Verdecia-Cabrera, Agustín Alejandro Ortiz Díaz, André C. P. L. F. de Carvalho
:
Fast adaptive stacking of ensembles. 929-934 - Juan Alegre-Sanahuja, Wei Lu, Atsuhiro Takasu:
Wavelet transform based vehicle detection from sensors for bridge weigh-in-motion. 935-940
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Georgios Drakopoulos
, Stavros Kontopoulos, Christos Makris
:
Eventually consistent cardinality estimation with applications in biodata mining. 941-944 - Alexandr V. Maslov, Hoang Thanh Lam, Mykola Pechenizkiy
, Eric Bouillet, Tommi Kärkkäinen:
DOBRO: a prediction error correcting robot under drifts. 945-948 - Douglas de O. Cardoso
, Felipe Maia Galvão França
, João Gama
:
Clustering data streams using a forgetful neural model. 949-951 - Michael Mayo, Albert Bifet
:
Deferral classification of evolving temporal dependent data streams. 952-954 - Angelo Silva, Renato Porfirio Ishii:
A new time series classification approach based on recurrence quantification analysis and Gabor filter. 955-957
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Heitor Murilo Gomes
:
Advances in network-based ensemble classifiers for evolving data streams: student research abstract. 958-959
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Database theory, technology and applications track
- Graeme Douglas, Ramon Lawrence:
Improving SQL query performance on embedded devices using pre-compilation. 961-964 - Minkyung Kim, Mincheol Shin, Sanghyun Park:
Take me to SSD: a hybrid block-selection method on HDFS based on storage type. 965-971 - Marcos Roberto Ribeiro
, Fabíola Souza F. Pereira, Vinícius Vitor dos Santos Dias:
Efficient algorithms for processing preference queries. 972-979 - Alberto Trindade Tavares, Marcelo Iury S. Oliveira, Bernadette Farias Lóscio:
Data producer catalogs for the web of things: a study on NoSQL solutions. 980-985 - Jéssica Andressa de Souza, Mirela T. Cazzolato, Agma J. M. Traina:
ClusMAM: fast and effective unsupervised clustering of large complex datasets using metric access methods. 986-991 - Alfredo Cuzzocrea, Carmen De Maio, Giuseppe Fenza, Vincenzo Loia, Mimmo Parente:
OLAP analysis of multidimensional tweet streams for supporting advanced analytics. 992-999 - Mincheol Shin, Hongchan Roh, Wonmook Jung, Sanghyun Park:
Optimizing hash partitioning for solid state drives. 1000-1007
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Muhao Chen, Shi Gao, Jingheng Zhou, X. Sean Wang:
Converting spatiotemporal data among multiple granularity systems. 1008-1010
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Yoonsuk Kang:
A methodology for estimating execution times of IO traces in SSDs: student research abstract. 1011-1012
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Information access and retrieval track
- Olivier Pivert, Olfa Slama, Virginie Thion:
SPARQL extensions with preferences: a survey. 1015-1020 - Xenophon Evangelopoulos, Christos Makris
:
Modeling clicks using document popularity. 1021-1026 - David E. Losada
, Javier Parapar
, Alvaro Barreiro
:
Feeling lucky?: multi-armed bandits for ordering judgements in pooling-based evaluation. 1027-1034 - Qingli Ma, Ben He, Jungang Xu:
Direct measurement of training query quality for learning to rank. 1035-1040 - Eya Znaidi, Lynda Tamine, Chiraz Latiri:
Aggregating semantic information nuggets for answering clinical queries. 1041-1047 - Daniel Blank, Sebastian Boosz, Andreas Henrich:
IT company atlas upper Franconia: a practical application of expert search techniques. 1048-1053 - Liana Ermakova, Josiane Mothe, Elena Nikitina:
Proximity relevance model for query expansion. 1054-1059 - Dimitrios Rafailidis
:
Modeling trust and distrust information in recommender systems via joint matrix factorization with signed graphs. 1060-1065 - Kazutoshi Umemoto, Takehiro Yamamoto, Katsumi Tanaka:
How do users handle inconsistent information?: the effect of search expertise. 1066-1071
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Sabino Metta
, Paolo Casagranda, Alberto Messina, Maurizio Montagnuolo, Francesco Russo:
Leveraging MPEG-21 user description for interoperable recommender systems. 1072-1074 - Max Chevalier, Damien Dudognon, Josiane Mothe:
ADORES: a diversity-oriented online recommender system. 1075-1076 - Anastasia Giachanou
, Fabio Crestani
:
Opinion retrieval in Twitter using stylistic variations. 1077-1079 - Arthur F. Da Costa, Rafael D. Martins, Marcelo G. Manzato, Ricardo J. G. B. Campello
:
Exploiting different users' interactions for profiles enrichment in recommender systems. 1080-1082 - Ramoza Ahsan, Rodica Neamtu, Elke A. Rundensteiner:
Towards spreadsheet integration using entity identification driven by a spatial-temporal model. 1083-1085
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Social network and media analysis track
- Milos Savic, Mirjana Ivanovic
, Bojana Dimic Surla:
A community detection technique for research collaboration networks based on frequent collaborators cores. 1090-1095 - Masoud Reyhani Hamedani
, Sang-Wook Kim:
SimRank and its variants in academic literature data: measures and evaluation. 1102-1107 - Wladston Viana, Ana Paula Couto da Silva
, Mirella M. Moro
:
Pick the right team and make a blockbuster: a social analysis through movie history. 1108-1114 - Richard M. Everett, Jason R. C. Nurse, Arnau Erola:
The anatomy of online deception: what makes automated text convincing? 1115-1120 - Shakiba Rahimiaghdam, Pinar Karagoz
, Alev Mutlu:
Personalized time-aware outdoor activity recommendation system. 1121-1126 - Jing Li, Zhenchang Xing, Deheng Ye, Xuejiao Zhao:
From discussion to wisdom: web resource recommendation for hyperlinks in stack overflow. 1127-1133 - Alessio Conte, Roberto Grossi, Andrea Marino
:
Clique covering of large real-world networks. 1134-1139 - Matheus Araújo, Júlio Cesar dos Reis, Adriano C. M. Pereira
, Fabrício Benevenuto:
An evaluation of machine translation for multilingual sentence-level sentiment analysis. 1140-1145 - Anastasia Giachanou
, Fabio Crestani
:
Opinion retrieval in Twitter: is proximity effective? 1146-1151 - Christoph Besel, Jörg Schlötterer, Michael Granitzer
:
Inferring semantic interest profiles from Twitter followees: does Twitter know better than your friends? 1152-1157 - Pollyanna Gonçalves, Daniel Hasan Dalip, Helen Costa
, Marcos André Gonçalves
, Fabrício Benevenuto:
On the combination of "off-the-shelf" sentiment analysis methods. 1158-1165
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Poster papers
- Juan Antonio Lossio-Ventura
, Hakim Hacid, Mathieu Roche
, Pascal Poncelet
:
Communication overload management through social interactions clustering. 1166-1169 - Yuanyuan Wang
, Goki Yasui, Yukiko Kawai, Toyokazu Akiyama, Kazutoshi Sumiya, Yoshiharu Ishikawa:
Dynamic mapping of dense geo-tweets and web pages based on spatio-temporal analysis. 1170-1173 - Hugo Lewi Hammer, Anis Yazidi, Aleksander Bai, Paal E. Engelstad:
Improving classification of tweets using word-word co-occurrence information from a large external corpus. 1174-1177 - Sarah Habashi, Nagia M. Ghanem, Mohamed A. Ismail:
Enhanced community detection in social networks using active spectral clustering. 1178-1181 - Douglas Rehem, Jonice Oliveira
, Tiago Cruz França, Walkir Brito, Cláudia Lage Rebello da Motta:
News recommendation based on tweets for understanding of opinion variation and events. 1182-1185 - Azadeh Esfandyari, Matteo Zignani
, Sabrina Gaito
, Gian Paolo Rossi
:
Impact of offline events on online link creation: a case study on events advertised on Facebook. 1186-1188
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Student research competition paper
- Kapil Kaushik:
Analyzing the effect of brand building activities on brand image using topic modeling techniques: student research abstract. 1189-1190
Volume II: Software design and development, and system software and security: Enterprise application development and design track
- Michal Trnka, Tomás Cerný
:
On security level usage in context-aware role-based access control. 1192-1195 - Mario Luca Bernardi
, Marta Cimitile
, Fabrizio Maria Maggi:
Automated development of constraint-driven web applications. 1196-1203 - Kiev Gama
, Didier Donsez:
Dynamically reconfigurable trust policies for untrustworthy third-party components. 1204-1209
Volume II: Software design and development, and system software and security: Poster papers
- Solvita Berzisa
, Inese Polaka
, Inese Supulniece, Janis Grabis
, Edgars Ozolins, Egils Meiers:
Method for decomposition of monolithic enterprise applications. 1210-1213 - Hiroki Horita
, Hideaki Hirayama, Yasuyuki Tahara, Akihiko Ohsuga:
Goal achievement analysis based on LTL checking and decision tree for improvements of PAIS. 1214-1218
Volume II: Software design and development, and system software and security: Multicore software engineering, performance, applications and tools track
- Shiji Bijo, Einar Broch Johnsen
, Ka I Pun, Silvia Lizeth Tapia Tarifa:
An operational semantics of cache coherent multicore architectures. 1219-1224 - Rubens H. P. de Almeida, Rui Rodrigues de Mello Junior, Gabriel Antoine Louis Paillard, Felipe M. G. França
:
A GPU-based implementation for the gamma multiset rewriting paradigm. 1225-1230 - Emanuele Ruffaldi, Filippo Brizzi, Giacomo Dabisias, Giorgio C. Buttazzo:
SOMA: an OpenMP toolchain for multicore partitioning. 1231-1237 - Jiri Barnat, Ivana Cerná, Petr Rockai
, Vladimír Still, Kristína Zákopcanová:
On verifying C++ programs with probabilities. 1238-1243 - Keyvan Azadbakht, Nikolaos Bezirgiannis, Frank S. de Boer, Sadegh Aliakbary:
A high-level and scalable approach for generating scale-free graphs using active objects. 1244-1250
Volume II: Software design and development, and system software and security: Poster papers
- Pavel Parízek
:
Fast error detection with hybrid analyses of future accesses. 1251-1254 - Anderson Braga de Avila, Renata Hax Sander Reiser
, Adenauer Corrêa Yamin, Maurício Lima Pilla:
Scalable quantum simulation by reductions and decompositions through the Id-operator. 1255-1257
Volume II: Software design and development, and system software and security: Requirement engineering track
- George Valença, Carina Frota Alves:
Understanding how power influences business and requirements decisions in software ecosystems. 1258-1263 - Jéssyka Vilela
, Enyo José Tavares Gonçalves, Ana Holanda, Bruno Figueiredo, Jaelson Castro:
Retrospective, relevance, and trends of SAC requirements engineering track. 1264-1269 - Denise Bombonatti, Catarina Gralha
, Ana Moreira
, João Araújo
, Miguel Goulão
:
Usability of requirements techniques: a systematic literature review. 1270-1275 - Romeu Oliveira, Lyrene Fernandes da Silva
, Julio César Sampaio P. Leite
, Ana Moreira
:
Eliciting accessibility requirements an approach based on the NFR framework. 1276-1281 - Guglielmo De Angelis, Alessio Ferrari
, Stefania Gnesi, Andrea Polini:
Collaborative requirements elicitation in a european research project. 1282-1289 - Thiago Souto Mendes, Mário André de Freitas Farias
, Manoel G. Mendonça
, Henrique Frota Soares, Marcos Kalinowski
, Rodrigo Oliveira Spínola:
Impacts of agile requirements documentation debt on software projects: a retrospective study. 1290-1295
Volume II: Software design and development, and system software and security: Poster papers
- Mahdi Noorian, Ebrahim Bagheri
, Weichang Du:
Quality-centric feature model configuration using goal models. 1296-1299
Volume II: Software design and development, and system software and security: Software architecture: theory, technology and applications track
- Gharib Gharibi, Yongjie Zheng:
ArchFeature: integrating features into product line architecture. 1302-1308 - Renato Paiva, Genaína Nunes Rodrigues
, Rodrigo Bonifácio
, Marcelo Ladeira:
Exploring the combination of software visualization and data clustering in the software architecture recovery process. 1309-1314 - Jesús M. T. Portocarrero, Flávia Coimbra Delicato, Paulo F. Pires, Taniro Chacon Rodrigues
, Thaís Vasconcelos Batista
:
SAMSON: self-adaptive middleware for wireless sensor networks. 1315-1322 - Marina Mongiello
, Tommaso Di Noia, Francesco Nocera
, Eugenio Di Sciascio:
Case-based reasoning and knowledge-graph based metamodel for runtime adaptive architectural modeling. 1323-1328 - Inti Y. Gonzalez-Herrera, Johann Bourcier
, Walter Rudametkin, Olivier Barais, François Fouquet:
Squirrel: architecture driven resource management. 1329-1336 - Márcio Ferreira Moreno, Rodrigo Costa Mesquita Santos, Guilherme Augusto Ferreira Lima, Marcelo Ferreira Moreno
, Luiz Fernando Gomes Soares:
Deepening the separation of concerns in the implementation of multimedia systems. 1337-1343
Volume II: Software design and development, and system software and security: Poster papers
- Cyril Cecchinel
, Sébastien Mosser
, Philippe Collet:
Towards a (de)composable workflow architecture to define data collection policies. 1344-1346 - Francesca Arcelli Fontana, Riccardo Roveda
, Marco Zanoni:
Tool support for evaluating architectural debt of an existing system: an experience report. 1347-1349 - Benjamin Cool, Christoph Knieke, Andreas Rausch, Mirco Schindler, Arthur Strasser, Martin Vogel, Oliver Brox, Stefanie Jauns-Seyfried:
From product architectures to a managed automotive software product line architecture. 1350-1353 - Maria Salama
, Rami Bahsoon:
A taxonomy for architectural stability. 1354-1357 - Tai Nguyen, Xinghui Zhao
:
Decoupled concurrency: a self-adaptive software architecture for programming multicores. 1358-1360
Volume II: Software design and development, and system software and security: Student research competition paper
- Francesco Nocera
:
Fuzzy ontology-driven web-based framework for supporting architectural design: student research abstract. 1361-1362
Volume II: Software design and development, and system software and security: Software engineering track
- Haruki Yokoyama, Yoshiki Higo, Keisuke Hotta, Takafumi Ohta, Kozo Okano, Shinji Kusumoto:
Toward improving ability to repair bugs automatically: a patch candidate location mechanism using code similarity. 1364-1370 - Jing Li, Lingfeng Bao, Zhenchang Xing, Xinyu Wang, Bo Zhou:
BPMiner: mining developers' behavior patterns from screen-captured task videos. 1371-1377 - Deheng Ye, Zhenchang Xing, Jing Li, Nachiket Kapre:
Software-specific part-of-speech tagging: an experimental study on stack overflow. 1378-1385 - Hua Yan, Yulei Sui
, Shiping Chen
, Jingling Xue
:
Automated memory leak fixing on value-flow slices for C programs. 1386-1393 - Zhenyue Long, Yu Zhang:
Checking linearizability with fine-grained traces. 1394-1400 - Dominik Wagner, Hermann Kaindl
, Sven Dominka, Michael Dübner:
Optimization of feature interactions for automotive combustion engines. 1401-1406 - Francois Wavresky, Seok-Won Lee:
A methodology towards the adaptization of legacy systems using agent-oriented software engineering. 1407-1414 - Sara Moshtari
, Ashkan Sami
:
Evaluating and comparing complexity, coupling and a new proposed set of coupling metrics in cross-project vulnerability prediction. 1415-1421 - Giuseppe Scanniello
, Simone Romano
, Davide Fucci, Burak Turhan
, Natalia Juristo:
Students' and professionals' perceptions of test-driven development: a focus group study. 1422-1427 - Filomena Ferrucci, Carmine Gravino, Luigi Lavazza
:
Simple function points for effort estimation: a further assessment. 1428-1433 - Luigi Lavazza
, Sandro Morasca
, Davide Tosi
:
An empirical study on the effect of programming languages on productivity. 1434-1439 - Metin Altinisik, Hasan Sözer:
Automated procedure clustering for reverse engineering PL/SQL programs. 1440-1445 - Hamza Ed-Douibi
, Javier Luis Cánovas Izquierdo
, Abel Gómez
, Massimo Tisi, Jordi Cabot
:
EMF-REST: generation of RESTful APIs from models. 1446-1453 - Matthew Patrick, James Elderfield
, Richard O. J. H. Stutt, Andrew Rice, Christopher A. Gilligan:
Software testing in a scientific research group. 1454-1459 - Li Li, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein
, Yves Le Traon
:
Towards a generic framework for automating extensive analysis of Android applications. 1460-1465 - Thomas Schmorleiz, Ralf Lämmel
:
Similarity management of 'cloned and owned' variants. 1466-1471 - Mário André de Freitas Farias
, Renato Lima Novais, Methanias Colaço Júnior
, Luis Paulo da Silva Carvalho, Manoel G. Mendonça
, Rodrigo Oliveira Spínola:
A systematic mapping study on mining software repositories. 1472-1479 - Daniel E. Krutz, Mehdi Mirakhorli:
Architectural clones: toward tactical code reuse. 1480-1485 - Silvia N. das Dôres, Luciano Alves, Duncan D. Ruiz, Rodrigo C. Barros
:
A meta-learning framework for algorithm recommendation in software fault prediction. 1486-1491 - MohammadReza Tavakoli, Abbas Heydarnoori
, Mohammad Ghafari:
Improving the quality of code snippets in stack overflow. 1492-1497 - Paolo Ciancarini
, Daniel Russo
, Alberto Sillitti, Giancarlo Succi
:
Reverse engineering: a European IPR perspective. 1498-1503 - Benjamin Behringer, Steffen Rothkugel:
Integrating feature-based implementation approaches using a common graph-based representation. 1504-1511 - Farouq Al-Omari, Chanchal K. Roy:
Is code cloning in games really different? 1512-1519 - Demóstenes Sena, Roberta Coelho, Uirá Kulesza:
Integrated analysis of exception flows and handler actions in Java libraries: an empirical study. 1520-1526 - Shakaiba Majeed, Minsoo Ryu:
Model-based replay testing for event-driven software. 1527-1533
Volume II: Software design and development, and system software and security: Poster papers
- Misun Yu, Yu-Seung Ma
, Doo-Hwan Bae:
Characterizing non-deadlock concurrency bug fixes in open-source Java programs. 1534-1537 - Simone Romano
, Giuseppe Scanniello
, Carlo Sartiani, Michele Risi:
A graph-based approach to detect unreachable methods in Java software. 1538-1541 - Otmar M. Pereira Jr., Wladmir C. Brandão
, Mark Alan Junho Song:
Automatic formal specification generation of APIs by mining unit tests. 1542-1545 - Kai Niklas, Stefan Gärtner, Kurt Schneider
:
Consistency checks of design specifications against requirements using graph-based linguistic analysis. 1546-1549 - Shahid Hussain, Arif Ali Khan
, Kwabena Ebo Bennin
:
Empirical investigation of fault predictors in context of class membership probability estimation. 1550-1553 - Bodin Chinthanet, Passakorn Phannachitta, Yasutaka Kamei, Pattara Leelaprute, Arnon Rungsawang, Naoyasu Ubayashi, Ken-ichi Matsumoto:
A review and comparison of methods for determining the best analogies in analogy-based software effort estimation. 1554-1557 - Andrew Healy, Rosemary Monahan
, James F. Power:
Evaluating the use of a general-purpose benchmark suite for domain-specific SMT-solving. 1558-1561 - Jin Hyun Kim, Axel Legay, Louis-Marie Traonouez, Mathieu Acher, Sungwon Kang:
A formal modeling and analysis framework for software product line of preemptive real-time systems. 1562-1565 - Mohammad Mahdi Hassan
, Wasif Afzal, Birgitta Lindström, Syed Muhammad Ali Shah, Sten F. Andler, Martin Blom:
Testability and software performance: a systematic mapping study. 1566-1569 - Laura Costa Sarkis, Viviane Torres da Silva, Christiano Braga:
Detecting indirect conflicts between access control policies. 1570-1572 - Thorsten Haendler
, Stefan Sobernig, Mark Strembeck:
Deriving UML-based specifications of inter-component interactions from runtime tests. 1573-1575 - Raquel M. Pillat
, Toacy C. Oliveira
:
A representation structure for software process tailoring based on BPMN high-level operations. 1576-1579
Volume II: Software design and development, and system software and security: Student research competition paper
- Arif Ali Khan
:
A framework for assisting software process improvement program in global software development: student research abstract. 1580-1581 - Natalia Fursova:
Introspection of the virtual machines with system calls monitoring: student research abstract. 1582-1583 - Shahid Hussain:
Threshold analysis of design metrics to detect design flaws: student research abstract. 1584-1585 - Fábio Paulo Basso
:
MDE as service, overview and research progress: student research abstract. 1586-1587
Volume II: Software design and development, and system software and security: Service-oriented architecture and programming track
- Dionisis Margaris
, Costas Vassilakis
, Panagiotis Georgiadis:
Improving QoS delivered by WS-BPEL scenario adaptation through service execution parallelization. 1590-1596 - Feng Gao, Muhammad Intizar Ali
, Edward Curry
, Alessandra Mileo
:
QoS-aware adaptation for complex event service. 1597-1604 - Lom-Messan Hillah, Ariele-Paolo Maesano, Libero Maesano, Fabio De Rosa, Fabrice Kordon, Pierre-Henri Wuillemin:
Service functional testing automation with intelligent scheduling and planning. 1605-1610 - Filippo Battaglia
, Giancarlo Iannizzotto, Lucia Lo Bello:
JxActinium: a runtime manager for secure REST-ful CoAP applications working over JXTA. 1611-1618
Volume II: Software design and development, and system software and security: Software verification and testing track
- Pavel Jancík, Jan Kofron
:
Dead variable analysis for multi-threaded heap manipulating programs. 1620-1627 - Srinivas Pinisetty
, Viorel Preoteasa, Stavros Tripakis
, Thierry Jéron
, Yliès Falcone, Hervé Marchand:
Predictive runtime enforcement. 1628-1633 - Zhengkui Zhang, Brian Nielsen
, Kim G. Larsen
:
Time optimal reachability analysis using swarm verification. 1634-1640 - Antonia Bertolino
, Said Daoudagh
, Francesca Lonetti
, Eda Marchetti
:
Testing access control policies against intended access rights. 1641-1647 - Phillipe A. Pereira, Higo F. Albuquerque, Hendrio Marques, Isabela da Silva, Celso B. Carvalho
, Lucas C. Cordeiro, Vanessa Santos, Ricardo Ferreira:
Verifying CUDA programs using SMT-based context-bounded model checking. 1648-1653 - Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Reducing locating sequences for testing from finite state machines. 1654-1659 - Maicon Bernardino, Elder M. Rodrigues, Avelino F. Zorzo:
Performance testing modeling: an empirical evaluation of DSL and UML-based approaches. 1660-1665 - Luciano Baresi
, Mohammad Mehdi Pourhashem Kallehbasti, Matteo Rossi:
How bit-vector logic can help improve the verification of LTL specifications over infinite domains. 1666-1673 - Fonenantsoa Maurica, Frédéric Mesnard, Étienne Payet:
Termination analysis of floating-point programs using parameterizable rational approximations. 1674-1679 - Hüsnü Yenigün, Nina Yevtushenko, Natalia Kushik
:
Some classes of finite state machines with polynomial length of distinguishing test cases. 1680-1685 - Carlos Olarte
, Camilo Rueda
:
Session types for communicating systems in event-B. 1686-1693 - Graeme Smith
, John Derrick
:
Invariant generation for linearizability proofs. 1694-1699 - Si Liu
, Peter Csaba Ölveczky, Muntasir Raihan Rahman, Jatin Ganhotra, Indranil Gupta, José Meseguer:
Formal modeling and analysis of RAMP transaction systems. 1700-1707
Volume II: Software design and development, and system software and security: Student research competition paper
- Vahid Hashemi
:
Towards a combinatorial approach for undiscounted MDPs: student research abstract. 1708-1709
Volume II: Software design and development, and system software and security: Embedded systems track
- Keni Qiu, Weigong Zhang, Xiaoqiang Wu, Xiaoyan Zhu, Jing Wang, Yuanchao Xu, Chun Jason Xue:
Balanced loop retiming to effectively architect STT-RAM-based hybrid cache for VLIW processors. 1710-1716 - Jurn-Gyu Park, Chen-Ying Hsieh, Nikil D. Dutt
, Sung-Soo Lim:
Co-Cap: energy-efficient cooperative CPU-GPU frequency capping for mobile games. 1717-1723 - Pasquale Buonocunto, Alessandro Biondi
, Marco Pagani
, Mauro Marinoni
, Giorgio C. Buttazzo:
ARTE: arduino real-time extension for programming multitasking applications. 1724-1731 - Ehsan Atoofian:
A low power STT-RAM based register file for GPGPUs. 1732-1738 - Shounak Chakraborty, Shirshendu Das, Hemangee K. Kapoor:
Static energy efficient cache reconfiguration for dynamic NUCA in tiled CMPs. 1739-1744 - Shirshendu Das, Hemangee K. Kapoor:
Dynamic associativity enabled DNUCA to improve block localisation in tiled CMPs. 1745-1750 - Luca Abeni
, Daniele Fontanelli
, Luigi Palopoli, Bernardo Villalba Frias:
Probabilistic analysis of bufferless pipelines of real-time tasks. 1751-1758 - Fabio Cremona, Marten Lohstroh
, Stavros Tripakis
, Christopher X. Brooks, Edward A. Lee:
FIDE: an FMI integrated development environment. 1759-1766
Volume II: Software design and development, and system software and security: Poster papers
- Chin-Fu Kuo, Yu-Hao Huang, Yung-Feng Lu, Shih-Chun Chou:
Scheduling algorithm considering response time for mixed tasks on multiprocessor systems. 1767-1770 - Sophal Minh, Donghee Lee:
Combined data caching and delayed parity update in RAID with SSD cache. 1771-1773 - Jen-Wei Hsieh, Che-Jen Su:
Parity management scheme for a hybrid-storage RAID. 1774-1776 - Jean Godot, Sébastien Saudrais, Adil Alif, Bertrand Barbedette, Chérif Larouci
:
Safety analysis generation from prototyping models for transportation systems. 1777-1779 - Nuno Silva, Marco Vieira
:
Software for embedded systems: a quality assessment based on improved ODC taxonomy. 1780-1783
Volume II: Software design and development, and system software and security: Object oriented programming languages and systems track
- Eli Sennesh, Yossi Gil:
Structured gotos are (Slightly) harmful. 1784-1789 - Peter Mills, Clinton Jeffery:
Embedding goal-directed evaluation through transformation. 1790-1797 - Tobias Pape
, Vasily Kirilichev, Robert Hirschfeld:
Optimizing record data structures in Racket. 1798-1805 - Hervé Paulino
, Daniel Parreira, Nuno Delgado, António Ravara
, Ana Gualdina Almeida Matos
:
From atomic variables to data-centric concurrency control. 1806-1811
Volume II: Software design and development, and system software and security: Poster papers
- Santiago A. Vidal
, Everton T. Guimarães, Willian Nalepa Oizumi
, Alessandro F. Garcia, Jorge Andrés Díaz Pace, Claudia A. Marcos:
On the criteria for prioritizing code anomalies to identify architectural problems. 1812-1814 - Taees Eimouri, Kenneth B. Kent
, Aleksandar Micic, Karl Taylor:
Using field access frequency to optimize layout of objects in the JVM. 1815-1818 - Paola Giannini
, Marco Servetto, Elena Zucca:
Initialize-and-catch. 1819-1822
Volume II: Software design and development, and system software and security: Operating systems track
- Mingyang Wang, Yiming Hu:
i-RAID: a novel redundant storage architecture for improving reliability, performance, and life-span of solid-state disk systems. 1824-1831 - Ingo Korb, Helena Kotthaus, Peter Marwedel:
mmapcopy: efficient memory footprint reduction using application knowledge. 1832-1837 - Alexandru Moga, Thanikesavan Sivanthi, Carsten Franke
:
OS-level virtualization for industrial automation systems: are we there yet? 1838-1843 - Mohannad Nabelsee, Anselm Busse
, Helge Parzyjegla, Gero Mühl:
Load-aware scheduling for heterogeneous multi-core systems. 1844-1851 - Jungkil Kim, Sungyong Ahn, Kwanghyun La, Wooseok Chang:
Improving I/O performance of NVMe SSD on virtual machines. 1852-1857 - Satoru Takekoshi, Takahiro Shinagawa
, Kazuhiko Kato:
Testing device drivers against hardware failures in real environments. 1858-1864 - Yong-Yeon Jo, Sungwoo Cho, Sang-Wook Kim, Hyunok Oh:
Collaborative processing of data-intensive algorithms with CPU, intelligent SSD, and GPU. 1865-1870 - Haecheon Kim, Seungmin Lim, Junkee Yoon, Seungjae Baek, Jongmoo Choi, Seong-je Cho:
Analysis of micro-architecture resources interference on multicore NUMA systems. 1871-1876 - Luca Abeni
, Giuseppe Lipari
, Andrea Parri, Youcheng Sun
:
Multicore CPU reclaiming: parallel or sequential? 1877-1884 - Toshihiro Yamauchi
, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi:
Plate: persistent memory management for nonvolatile main memory. 1885-1892
Volume II: Software design and development, and system software and security: Poster papers
- Dongwook Kim, Sooyong Kang:
zf-FTL: a zero-free flash translation layer. 1893-1896 - Taegyu Hwang, Kisu Kim, Jeonghwan Lee, Jiman Hong, Dongwan Shin
:
Virtual machine scheduling based on task characteristic. 1897-1899 - Celso Maciel da Costa, Cassio Brasil, Leonardo L. Silva, Lucas Murliky, João Leonardo Fragoso, Guilherme Debom, Rivalino Matias, Aline Fracalossi, Margrit Reni Krug:
NKE: an embedded nanokernel for educational purpose. 1900-1902 - Simão Reis
, André Zúquete
, José M. N. Vieira:
Virtual machine halt. 1903-1905
Volume II: Software design and development, and system software and security: Practical aspects of high-level parallel programming track
- Etienne Brodu, Stéphane Frénot, Frédéric Oblé:
Transforming JavaScript event-loop into a pipeline. 1906-1911 - Emanuele Carlini
, Patrizio Dazzi
, Alessandro Lulli, Laura Ricci
:
Distributed graph processing: an approach based on overlay composition. 1912-1917
Volume II: Software design and development, and system software and security: Poster papers
- Claudio Scordino
, Bruno Morelli:
Sharing memory in modern distributed applications. 1918-1921 - Chong Li, Le-Duc Tung, Xiaodong Meng, Zhenjiang Hu:
Derivation of parallel-efficient structural recursive functions from declarative graph queries. 1922-1925
Volume II: Software design and development, and system software and security: Programming languages track
- Asma Cherif, Abdessamad Imine:
Using CSP for coordinating undo-based collaborative applications. 1928-1935 - Akira Tanimura, Hideya Iwasaki
:
Integrating lua into C for embedding lua interpreters in a C application. 1936-1943 - Noah Van Es, Jens Nicolay, Quentin Stiévenart, Theo D'Hondt, Coen De Roover
:
A performant scheme interpreter in asm.js. 1944-1951 - David C. Mohr, Darko Stefanovic:
Stella: a python-based domain-specific language for simulations. 1952-1959 - Sérgio Medeiros
, Fabio Mascarenhas:
A parsing machine for parsing expression grammars with labeled failures. 1960-1967 - Pablo Gómez-Abajo
, Esther Guerra
, Juan de Lara:
Wodel: a domain-specific language for model mutation. 1968-1973 - Clinton Jeffery, Phillip Thomas, Sudarshan Gaikaiwari, John Goettsche:
Integrating regular expressions and SNOBOL patterns into string scanning: a unifying approach. 1974-1979 - Jerônimo da Cunha Ramos, André Rauber Du Bois, Maurício Lima Pilla:
An embedded domain specific language for distributed memory transactions in Java. 1980-1985 - Eden Burton, Emil Sekerinski:
An object model for a dynamic mixin based language. 1986-1992
Volume II: Software design and development, and system software and security: Poster papers
- Stefano Bistarelli
, Francesco Santini
, Fabio Martinelli, Ilaria Matteucci
:
Automated adaptation via quantitative partial model checking. 1993-1996 - Luís Diogo Couto, Peter Würtz Vinther Tran-Jørgensen, Kenneth Lausdahl:
Principles for reuse in formal language tools. 1997-2000 - Klervie Toczé
, Maria Vasilevskaya, Patrik Sandahl, Simin Nadjm-Tehrani:
Maintainability of functional reactive programs in a telecom server software. 2001-2003 - Jens Gustedt
:
Futex based locks for C11's generic atomics. 2004-2006 - Marcel Heinz, Philipp Helsper, Ralf Lämmel
, Tobias M. Schmidt:
A DSL for executable 'how to' manuals. 2007-2009 - Florent Marchand de Kerchove, Jacques Noyé, Mario Südholt:
Extensible modules for JavaScript. 2010-2012
Volume II: Software design and development, and system software and security: Reliable software technologies and communication middleware track
- Marcello Cinque
, Antonio Corradi
, Luca Foschini
, Flavio Frattini, Javier Povedano-Molina:
Scalable monitoring and dependable job scheduling support for multi-domain grid infrastructures. 2015-2020 - Fabio Petroni, Leonardo Querzoni
, Roberto Beraldi
, Mario Paolucci:
Exploiting user feedback for online filtering in event-based systems. 2021-2026
Volume II: Software design and development, and system software and security: Poster papers
- Marisol García-Valls
, Cristian Calva-Urrego, Alejandro Alonso
, Juan Antonio de la Puente
:
Adjusting middleware knobs to suit CPS domains. 2027-2030
Volume II: Software design and development, and system software and security: Computer security track
- Andrei Bacs, Cristiano Giuffrida
, Bernhard Grill, Herbert Bos
:
Slick: an intrusion detection system for virtualized storage devices. 2033-2040 - Adriaan Larmuseau, Marco Patrignani
, Dave Clarke:
Implementing a secure abstract machine. 2041-2048 - Fabio Martinelli, Paolo Mori
, Andrea Saracino
:
Enhancing Android permission through usage control: a BYOD use-case. 2049-2056 - Kang Li, Peipeng Liu, Qingfeng Tan, Jinqiao Shi, Yue Gao, Xuebin Wang:
Out-of-band discovery and evaluation for tor hidden services. 2057-2062 - Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Reading between the fields: practical, effective intrusion detection for industrial control systems. 2063-2070 - Michael Backes, Christian Hammer
, David Pfaff, Malte Skoruppa:
Implementation-level analysis of the JavaScript helios voting client. 2071-2078 - Yufei Han, Yun Shen:
Accurate spear phishing campaign attribution and early detection. 2079-2086 - Tobias Wüchner, Martín Ochoa
, Mojdeh Golagha, Gaurav Srivastava, Thomas Schreck
, Alexander Pretschner:
MalFlow: identification of C&C servers through host-based data flow profiling. 2087-2094 - Alberto Calvi, Luca Viganò
:
An automated approach for testing the security of web applications against chained attacks. 2095-2102 - Willem De Groef, Deepak Subramanian, Martin Johns
, Frank Piessens, Lieven Desmet
:
Ensuring endpoint authenticity in WebRTC peer-to-peer communication. 2103-2110
Volume II: Software design and development, and system software and security: Student research competition paper
- Rosemary Koikara:
A 3D-cellular automata based pseudo-random number generator: student research abstract. 2111-2112
Volume II: Software design and development, and system software and security: Smart grid and smart technologies track
- Jin Xu, Shinjae Yoo
, John Heiser, Paul Kalb:
Sensor network based solar forecasting using a local vector autoregressive ridge framework. 2113-2118 - Thomas Hartmann, Assaad Moawad, François Fouquet, Yves Reckinger, Jacques Klein
, Yves Le Traon
:
Near real-time electric load approximation in low voltage cables of smart grids with models@run.time. 2119-2126 - Giorgos Georgiadis, Iosif Salem
, Marina Papatriantafilou
:
Tailor your curves after your costume: supply-following demand in smart grids through the adwords problem. 2127-2134 - Rohan Nanda
, Saguna Saguna, Karan Mitra
, Christer Åhlund
:
BayesForSG: a bayesian model for forecasting thermal load in smart grids. 2135-2141
Volume II: Software design and development, and system software and security: Poster papers
- Byungho Min, Vijay Varadharajan
:
Cascading attacks against smart grid using control command disaggregation and services. 2142-2147 - Nasrin Sadeghianpourhamami, Matthias Strobbe, Chris Develder
:
Real-world user flexibility of energy consumption: two-stage generative model construction. 2148-2153 - Marco Cococcioni
, Beatrice Lazzerini
, Francesco Marcelloni, Francesco Pistolesi
:
Solving the environmental economic dispatch problem with prohibited operating zones in microgrids using NSGA-II and TOPSIS. 2154-2157
Volume II: Software design and development, and system software and security: Software platforms track
- Shaza Hanif, Shahab Ud Din:
Evaluation of smart scheduling technologies: static versus dynamic approaches. 2159-2164 - Yanxiao Zhao, Jems Pradhan, Guodong Wang, Jun Huang:
Experimental approach: two-stage spectrum sensing using gnu radio and usrp to detect primary user's signal. 2165-2170 - Chulwoo Pack, Sung Y. Shin, Hyung Do Choi, Soon-Ik Jeon, John Kim:
Optimized multilayer perceptron using dynamic learning rate based microwave tomography breast cancer screening. 2171-2175
Volume II: Software design and development, and system software and security: Poster papers
- Ravi Kasaudhan, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son
:
Similarity measurement with combination of mesh distance fourier transform and global features in 2D binary image. 2176-2181 - Daeshin Park, Kiwook Kang, Jiman Hong, Yookun Cho:
An efficient Hadoop data replication method design for heterogeneous clusters. 2182-2184 - Donghee Min, Seonguk Lee, Gibeom Byeon, Jiman Hong:
Delay-based scheduling to enhance fairness in a virtual machine environment. 2185-2187
Volume II: Software design and development, and system software and security: Trust, reputation, evidence and other collaboration know-how track
- Yves Le Bray, Nicolas Mayer
, Jocelyn Aubert
:
Defining measurements for analyzing information security risk reports in the telecommunications sector. 2189-2194 - Farah Saab, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Solving sybil attacks using evolutionary game theory. 2195-2201 - Jingjing Guo, Christian Damsgaard Jensen
, Jianfeng Ma:
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control. 2202-2209

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.