


default search action
38th COMPSAC 2014: Vasteras, Sweden
- IEEE 38th Annual Computer Software and Applications Conference, COMPSAC 2014, Vasteras, Sweden, July 21-25, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3575-8

Software Engineering I
- Daniela C. C. Peixoto, Geraldo R. Mateus, Rodolfo F. Resende:

The Issues of Solving Staffing and Scheduling Problems in Software Development Projects. 1-10 - Xiao He, Tian Zhang, Zhiyi Ma, Weizhong Shao:

Randomized Model Generation for Performance Testing of Model Transformations. 11-20 - Qin Liu, Xiaoyuan Chu, Jiakai Xiao, Hongming Zhu:

Optimizing Non-orthogonal Space Distance Using PSO in Software Cost Estimation. 21-26 - Qin Liu

, Shihai Shi, Hongming Zhu, Jiakai Xiao:
A Mutual Information-Based Hybrid Feature Selection Method for Software Cost Estimation Using Feature Clustering. 27-32
Automated Analysis in Software Engineering
- Huqiu Liu, Yuping Wang

, Lingbo Jiang, Shimin Hu:
PF-Miner: A New Paired Functions Mining Method for Android Kernel in Error Paths. 33-42 - Thelma Elita Colanzi, Silvia Regina Vergilio:

A Feature-Driven Crossover Operator for Product Line Architecture Design Optimization. 43-52 - Bo Zhou, Xin Xia

, David Lo
, Xinyu Wang:
Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files. 53-58 - Abderrahmane Leshob, Hafedh Mili, Anis Boubaker

:
A Pattern Based Approach for Automatic Business Process Specialization. 59-64
Validation & Verification
- Mohammad Ali Darvish Darab

, Carl K. Chang:
GUIDiVa: Automated Discovery and Validation of State-Based GUI Invariants. 65-74 - Selim Ciraci, Jason C. Fuller

, Jeff A. Daily
, Atefe Makhmalbaf, David Callahan:
A Runtime Verification Framework for Control System Simulation. 75-84 - Markus Riedl-Ehrenleitner, Andreas Demuth, Alexander Egyed:

Towards Model-and-Code Consistency Checking. 85-90 - Alexander Bolotov, Vasilyi Shangin

:
Tackling Incomplete System Specifications Using Natural Deduction in the Paracomplete Setting. 91-96
Bug Reports
- Geunseok Yang, Tao Zhang

, Byungjeong Lee:
Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports. 97-106 - Xin Xia

, David Lo
, Weiwei Qiu, Xingen Wang, Bo Zhou:
Automated Configuration Bug Report Prediction Using Text Mining. 107-116 - Meng-Jie Lin, Cheng-Zen Yang

:
An Improved Discriminative Model for Duplication Detection on Bug Reports with Cluster Weighting. 117-122 - Kaiping Liu, Hee Beng Kuan Tan:

Faceted Bug Report Search with Topic Model. 123-128
Service & Application
- Toni Mastelic

, Ivona Brandic
, Andrés García-García:
Towards Uniform Management of Cloud Services by Applying Model-Driven Development. 129-138 - Huihong He, Zhiyi Ma, Hongjie Chen, Dan Wu, Huanhuan Liu, Weizhong Shao:

An SLA-Driven Cache Optimization Approach for Multi-tenant Application on PaaS. 139-148 - Dapeng Dong

, John Herbert:
FSaaS: File System as a Service. 149-154 - Viktor Kolokolov, Stefan T. Ruehl

, Paul Baumann, Shaozhen Zhang, Stephan A. W. Verclas:
Modelling Variability in Activity Diagrams for Mobile Business Applications. 155-160
Quality Assurance and Assessment I
- Chung Man Tang

, W. K. Chan
, Yuen-Tak Yu:
Extending the Theoretical Fault Localization Effectiveness Hierarchy with Empirical Results at Different Code Abstraction Levels. 161-170 - Ron S. Kenett

, Xavier Franch
, Angelo Susi, Nikolas Galanis:
Adoption of Free Libre Open Source Software (FLOSS): A Risk Management Perspective. 171-180 - Marcelo Medeiros Eler

, André Takeshi Endo
, Vinicius H. S. Durelli:
Quantifying the Characteristics of Java Programs That May Influence Symbolic Execution from a Test Data Generation Perspective. 181-190
Spec & Requirements
- Lin Liu, Tianying Li, Xiaoxi Kou:

Eliciting Relations from Natural Language Requirements Documents Based on Linguistic and Statistical Analysis. 191-200 - Lianyi Zhang, Qingdi Meng, Guiming Luo:

Counterexample-Guided Abstraction Refinement for Component-Based Systems. 201-210 - Sungwon Kang, Jingyu Kim, Sungju Kang, Seokhwan Eom:

A Formal Representation of Platform Feature-to-Requirement Traceability for Software Product Line Development. 211-218
Software Engineering II
- Zhifei Chen, Lin Chen, Yuming Zhou, Zhaogui Xu, William C. Chu, Baowen Xu

:
Dynamic Slicing of Python Programs. 219-228 - Venkata Krishna Suhas Nerella, Sanjay Madria, Thomas Weigert:

Efficient Caching and Incrementalization of Object Queries on Collections in Programming Codes. 229-238 - Xiaozhen Xue, Yulei Pang, Akbar Siami Namin:

Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations. 239-244 - Rasha Osman

, Arilo Claudio Dias-Neto:
Motivating by Examples: An Empirical Study of Teaching an Introductory Software Engineering Course in Brazil. 245-250
Quality Assurance and Assessment II
- Huan Luo, Yuan Dong, Yiying Ng, Shengyuan Wang:

VertexRank: Importance Rank for Software Network Vertices. 251-260 - Luxi Chen, Linpeng Huang, Chen Li

, Linzhu Wu, Weichao Luo:
Design and Safety Analysis for System Architecture: A Breeze/ADL-Based Approach. 261-266 - Xuling Chang, Linpeng Huang, Jianpeng Hu, Chen Li

, Bei Cao:
Transformation from Activity Diagrams with Time Properties to Timed Coloured Petri Nets. 267-272 - Hend Alrasheed

, Austin Melton:
Understanding and Measuring Nesting. 273-278
Network Traffic
- Safaa Dawoud, Abdulbaki Uzun, Sebastian Göndör, Axel Küpper

:
Optimizing the Power Consumption of Mobile Networks Based on Traffic Prediction. 279-288 - Yuta Morisawa, Yoshihiro Kawahara

, Tohru Asami:
Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming Network. 289-298 - Antoine Varet, Nicolas Larrieu

:
How to Generate Realistic Network Traffic? 299-304 - Soshi Hirono, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:

Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks. 305-310
Embedded Systems
- Ryohei Banno

, Susumu Takeuchi, Michiharu Takemoto, Tetsuo Kawano, Takashi Kambayashi, Masato Matsuo:
A Distributed Topic-Based Pub/Sub Method for Exhaust Data Streams towards Scalable Event-Driven Systems. 311-320 - Jung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, Lui Sha:

Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics Systems. 321-331 - Marisol García-Valls

, Diego Perez-Palacin, Raffaela Mirandola:
Time-Sensitive Adaptation in CPS through Run-Time Configuration Generation and Verification. 332-337 - Antero Taivalsaari

, Tommi Mikkonen, Kari Systä
:
Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software Architecture. 338-343
Empirical Study
- Everton T. Guimarães, Alessandro F. Garcia, Yuanfang Cai:

Exploring Blueprints on the Prioritization of Architecturally Relevant Code Anomalies - A Controlled Experiment. 344-353 - Anderson Marcolino, Edson OliveiraJr, Itana Maria de Souza Gimenes, Ellen Francine Barbosa

:
Empirically Based Evolution of a Variability Management Approach at UML Class Level. 354-363 - Saleh Almugrin, Waleed Albattah

, Omar Alaql, Musaad Alzahrani, Austin Melton:
Instability and Abstractness Metrics Based on Responsibility. 364-373 - Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed:

Your Phone Knows You: Almost Transparent Authentication for Smartphones. 374-383 - Kevin Allix

, Quentin Jérome, Tegawendé F. Bissyandé
, Jacques Klein
, Radu State, Yves Le Traon
:
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? 384-393 - Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:

Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis. 394-399 - Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:

A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks. 400-405
Defect Prediction
- Biwen Li, Beijun Shen, Jun Wang, Yuting Chen, Tao Zhang, Jinshuang Wang:

A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model. 406-415 - Huihua Lu, Bojan Cukic

, Mark Vere Culp:
A Semi-supervised Approach to Software Defect Prediction. 416-425 - Shulong Liu, Xiang Chen, Wangshu Liu, Jiaqiang Chen, Qing Gu, Daoxu Chen:

FECAR: A Feature Selection Framework for Software Defect Prediction. 426-435
Plenary Panel
- Elisa Bertino:

Security with Privacy - Opportunities and Challenges: Panel Position Paper. 436-437
Network Application and Configuration
- Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:

A Low Cost Hierarchy-Awareness Extension of Skip Graph for World-Wide Range Retrievals. 438-445 - Jiaxing Zhang, Hanjiao Qiu, Salar Shahini Shamsabadi, Ralf Birken, Gunar Schirner

:
SIROM3 - A Scalable Intelligent Roaming Multi-modal Multi-sensor Framework. 446-455
Web Technology
- Yanchun Sun, Dejian Chen, Wenpin Jiao, Gang Huang:

An Online Education Approach Using Web Operation Record and Replay Techniques. 456-465 - Sharath Chowdary Gude, Munawar Hafiz, Allen Wirfs-Brock:

JavaScript: The Used Parts. 466-475 - Bahtijar Vogel, Arianit Kurti

, Tommi Mikkonen, Marcelo Milrad
:
Towards an Open Architecture Model for Web and Mobile Software: Characteristics and Validity Properties. 476-485
Virtual Machine
- Ikuo Nakagawa, Kohei Ichikawa

, Tohru Kondo, Yoshiaki Kitaguchi, Hiroki Kashiwazaki, Shinji Shimojo
:
Transpacific Live Migration with Wide Area Distributed Storage. 486-492 - Edward Y. Y. Kan, Wing Kwong Chan

, T. H. Tse
:
CrowdAdaptor: A Crowd Sourcing Approach toward Adaptive Energy-Efficient Configurations of Virtual Machines Hosting Mobile Applications. 493-502 - Jiwei Xu, Wenbo Zhang, Shiyang Ye, Jun Wei, Tao Huang:

A Lightweight Virtual Machine Image Deduplication Backup Approach in Cloud Environment. 503-508
Emergent Topics
- Yiying Ng, Hucheng Zhou, Zhiyuan Ji, Huan Luo, Yuan Dong:

Which Android App Store Can Be Trusted in China? 509-518 - Shohe Ito, Takuya Yoshida, Fumiko Harada, Hiromitsu Shimakawa:

Specific Touch Gesture on Mobile Devices to Find Attractive Phrases in News Browsing. 519-528 - Murtadha N. Albasrawi, Nathan Jarus

, Kamlesh A. Joshi, Sahra Sedigh Sarvestani
:
Analysis of Reliability and Resilience for Smart Grids. 529-534 - Lamia Zouhaier

, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Generating Accessible Multimodal User Interfaces Using MDA-Based Adaptation Approach. 535-540
Network Performance
- Naoki Oguchi, Shunji Abe:

Performance Evaluation of Reconfigurable TCP Communication on Wi-Fi Network Using GE Channel Model. 541-550 - Koki Okamoto, Nariyoshi Yamai

, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira:
Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment. 551-557 - Marcus Jägemar, Sigrid Eldh

, Andreas Ermedahl, Björn Lisper:
Adaptive Online Feedback Controlled Message Compression. 558-567
Social Networks
- Sho Tsugawa, Hiroyuki Ohsaki:

Emergence of Fractals in Social Networks: Analysis of Community Structure and Interaction Locality. 568-575 - Akihiro Fujihara, Hiroyoshi Miwa:

Homesick Lévy Walk: A Mobility Model Having Ichi-Go Ichi-e and Scale-Free Properties of Human Encounters. 576-583 - Lin Zhang, Mingxuan Yuan, Yao Guo

, Xiangqun Chen, Lei Chen
:
Preserving Location-Related Privacy Collaboratively in Geo-social Networks. 584-589 - Ivor D. Addo, Ji-Jiang Yang, Sheikh Iqbal Ahamed:

SPTP: A Trust Management Protocol for Online and Ubiquitous Systems. 590-595 - Jihyun Lee, Sungwon Kang:

Towards Test Architecture Based Software Product Line Testing. 596-597 - Hyun-Il Lim:

Comparing Control Flow Graphs of Binary Programs through Match Propagation. 598-599 - Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori:

Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors. 600-601 - Makoto Kato, Saeko Matsuura:

Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware. 602-603 - Kiyoshi Honda, Hironori Washizaki

, Yoshiaki Fukazawa:
Predicting Release Time Based on Generalized Software Reliability Model (GSRM). 604-605
Industry Papers
- Kellyton dos Santos Brito

, Marcos Antônio da Silva Costa, Vinicius Cardoso Garcia
, Silvio Romero de Lemos Meira:
Experiences Integrating Heterogeneous Government Open Data Sources to Deliver Services and Promote Transparency in Brazil. 606-607 - Tatsuya Osawa, Jun Shimamura, Yukinobu Taniguchi:

Operation Support System Based on Augmented Reality Technology. 608-609 - Tomoaki Umeki, Yoshinori Kitatsuji:

On Architecture for QoS-Aware Packet Aggregation. 610-611 - Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, Aneesh Krishna

:
Software-as-a-Service Solution Implementation - Data Migration Perspective. 612-613
Doctoral Symposium and Posters
- Rafia Inam:

Performance Preservation Using Servers for Predictable Execution and Integration. 614-617 - Shota Agemura, Hiroyuki Ohsaki:

Exploratory Performance Analysis of Microbot Swarm in Three-Dimensional Field. 618-621 - Kohei Tsutsumi, Hiroyuki Ohsaki, Hideaki Suzuki:

A Distributed Flow Control with Backward Propagation: Algorithm and Preliminary Performance Evaluation. 622-625 - Ingo Richter, Robert Lindermeier, Michael Weber:

A Model for Distributed Agile Release Planning: Doctoral Symposium Paper. 626-629 - Florian Raith, Robert Lindermeier:

Media Supported Workspaces in Agile Software Development: Doctoral Symposium Paper. 630-633 - Xiwei Zhuang, Yanchun Sun, Kui Wei:

SMoCoR: A Smart Mobile Contact Recommender Based on Smart Phone Data. 634-635 - Takuya Iwai, Daichi Kominami, Masayuki Murata

, Tetsuya Yomo:
Thermodynamics-Based Entropy Adjustment for Robust Self-Organized Network Controls. 636-637 - Hiroki Yanaga, Daiki Nobayashi, Takeshi Ikenaga

:
Expiration Timer Control Method for QoS-Aware Packet Chunking. 638-639 - Dana Petcu

:
A Taxonomy for SLA-Based Monitoring of Cloud Security. 640-641 - Maria Salama, Ahmed Shawish:

A QoS-Oriented Inter-cloud Federation Framework. 642-643 - Toru Kobayashi:

Information Orchestration System for Closing the Information Retrieval Capability Gap. 644-645 - Ondrej Kupka, Filip Zavoral

:
Cider: An Event-Driven Continuous Integration Server. 646-647

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














