


default search action
39th COMPSAC Workshops 2015: Taichung, Taiwan
- Sheikh Iqbal Ahamed, Carl K. Chang, William C. Chu, Ivica Crnkovic, Pao-Ann Hsiung, Gang Huang, Jingwei Yang:

39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015. IEEE Computer Society 2015
Workshops Keynote Abstract
- May D. Wang:

Biomedical Big Data Analytics for Patient-Centric and Outcome-Driven Precision Health. 1-2
SAPSE: Security Aspects in Processes and Services Engineering
- Stelvio Cimato

:
Message from the SAPSE 2015 Workshop Organizer. 3 - Nadia Bennani, Chirine Ghedira Guegan

, Genoveva Vargas-Solar
, Martin A. Musicante
:
Towards a Secure Database Integration Using SLA in a Multi-cloud Context. 4-9 - Gayathri Natesan, Jigang Liu:

An Adaptive Learning Model for k-Anonymity Location Privacy Protection. 10-16
CFSE: The Seventh IEEE International Workshop on Computer Forensics in Software Engineering
- Ryôichi Sasaki, Tetsutaro Uehara

, Jigang Liu:
Message from the CFSE 2015 Workshop Organizers. 17
CFSE 1
- Kevin D. Fairbanks

:
A Technique for Measuring Data Persistence Using the Ext4 File System Journal. 18-23 - Shota Okayasu, Ryôichi Sasaki:

Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a Botnet. 24-29 - Rethabile Khutlang, Fulufhelo V. Nelwamondo, Ann Singh:

Segmentation of Forensic Latent Fingerprint Images Lifted Contact-Less from Planar Surfaces with Optical Coherence Tomography. 30-34 - Songpon Teerakanok

, Tetsutaro Uehara
:
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes. 35-39
CFSE 2
- Yuhei Umehara, Hayai Ando, Ryôichi Sasaki:

Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT Risks. 40-46 - Da-Yu Kao:

Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics. 47-52 - Yifan Wang, Tetsutaro Uehara

, Ryôichi Sasaki:
Fog Computing: Issues and Challenges in Security and Forensics. 53-59
MidCCI: Middleware for Cyber Security, Cloud Computing and Internetworking
- Toyokazu Akiyama, Hideaki Goto, Shuo-Yan Chou:

Message from the MidCCI 2015 Workshop Organizers. 60 - Alexander Borisov:

A Novel Approach for User Authentication to Industrial Components Using QR Codes. 61-66 - Naoki Tsujio, Yasuo Okabe:

A Traceable and Pseudonymous P2P Information Distribution System. 67-72 - Somchart Fugkeaw

, Hiroyuki Sato:
An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. 73-78 - Shoichi Ando, Yu-ichi Hayashi, Takaaki Mizuki

, Hideaki Sone:
Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency. 79-82
SSS: Service Science and Systems and MediComp: Medical Computing
- Shuo-Yan Chou, Ji-Jiang Yang, Yang Li, Kwang-Jae Kim, Jianqiang Li, Sheikh Iqbal Ahamed:

Message from the SSS-MediComp 2015 Workshop Organizers. 83 - Debby Rahmi Isnaeni, Shuo-Yan Chou, Phan Nguyen Ky Phuc, Cheng-Hung Wu

:
Developing Acceptance Policies for a Stochastic Single-Resource Revenue Management Problem. 84-88 - Xiao Song, Feng Li, Lin Zhang

:
A Survey and Preliminary Research on Service Federation Based Modeling and Simulation. 89-94 - Xi Meng, Ruifang Shen, Jianqiang Li, Ji-Jiang Yang:

Using a Combination Method of MDS and SOM to Visually Analyze Postpartum Depression Domain. 95
STPSA: Security, Trust and Privacy for Software Applications
- Farzana Rahman, Chunfu Jia:

Message from the STPSA 2015 Workshop Organizers. 96
STPSA Session 1
- Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka

, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki
, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. 97-103 - Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu:

User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System. 104-109
STPSA Session 2
- Kim T. Le, Parmesh Ramanathan, Kewal K. Saluja:

Privacy Assurance in Data-Aggregation for Multiple MAX Transactions. 110-115 - Jwu Rong Lin, Ching-Yu Chen, Shuo-Chun Weng:

Health Capital Depreciation and Medical Care Demand: An Empirical Study of Taiwan's Senior Citizens. 116-119
ADMNET: Architecture, Design, Deployment and Management of Networks and Applications
- Nariyoshi Yamai

, Mario Köppen, Youngseok Lee:
Message from the ADMNET 2015 Workshop Organizers. 120
ADMNET 1
- Leszek Sliwko

, Vladimir Getov
:
A Meta-Heuristic Load Balancer for Cloud Computing Systems. 121-126 - Tomokazu Otsuka, Gada, Nariyoshi Yamai

, Kiyohiko Okayama, Yong Jin:
Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. 127-132
ADMNET 2
- Yuta Hashimoto, Hiroyuki Ohsaki:

On Estimating Message Diffusion Dynamics in Epidemic Broadcasting. 133-138 - Hiroki Kashiwazaki:

or: How I Learned to Stop Worrying and Love Cloud Computing. 139-140
ADMNET 3
- Hiroshi Otsuka, Yukihiro Watanabe, Yasuhide Matsumoto:

Learning from Before and After Recovery to Detect Latent Misconfiguration. 141-148 - Yoshiaki Kasahara

, Takuya Kawatani
, Eisuke Ito
, Koichi Shimozono, Naomi Fujimura
:
Optimization of Storage Quota Based on User's Usage Distribution. 149-154 - Chunghan Lee

, Yukihiro Nakagawa, Kazuki Hyoudou, Shinji Kobayashi, Osamu Shiraki, Takeshi Shimizu:
Flow-Aware Congestion Control to Improve Throughput under TCP Incast in Datacenter Networks. 155-162
QUORS: Quality Oriented Reuse of Software
- Xiaodong Liu, Hongji Yang:

Message from the QUORS 2015 Workshop Organizers. 163 - Jingyue Li

, Torbjørn Skramstad, Thierry Coq:
Interface Information Management Tools for the Maritime and Oil and Gas Industry. 164-169 - Lung-Pin Chen, Ruey-Kai Sheu, William C. Chu:

Efficient Deployment of Content Applications in a Cloud Environment. 170-174 - Delin Jing, Hongji Yang, Meiyu Shi, Wei Zhu:

Developing a Research Ideas Creation System through Reusing Knowledge Bases for Ontology Construction. 175-180
CDS: Consumer Devices and Systems and WDLMA: Workshop on the Development and Maintenance of Lifelog Mobile Application Software
- Norihiro Ishikawa

, Yoshia Saito, Akimitsu Kanzaki, Kazuhiro Kitagawa, Noriko Arai:
Message from the CDS 2015 Workshop Organizers. 181
CDS 1: Smart Home and Smart City
- Yuichi Hashi, Kazuyoshi Matsumoto, Yoshinori Seki, Masahiro Hiji

, Toru Abe, Takuo Suganuma:
Data Management Scheme to Enable Efficient Analysis of Sensing Data for Smart Community. 182-187 - Tomotaka Maeda, Hiroki Nakano, Naoyuki Morimoto, Kazumi Sakai, Yasuo Okabe:

Design and Implementation of an On-Demand Home Power Management System Based on a Hierarchical Protocol. 188-193 - Takaaki Ushioda, Motomu Toyokawa, Shigeo Kaneda:

Proposal of Linear Approximation of Household Fuel Cells and Small-Scale Community Energy Management System. 194-199
CDS 2: Systems and Applications for Consumer Devices
- Shohei Saito, Norihiro Ishikawa

, Yosuke Tsuchiya:
Development of ECHONET Lite-Compliant Home Appliances Control System Using PUCC Protocols from Smart Devices. 200-204 - Saikat Basu, Robert DiBiano

, Manohar Karki
, Malcolm Stagg, Jerry Weltman, Supratik Mukhopadhyay, Sangram Ganguly:
An Agile Framework for Real-Time Motion Tracking. 205-210 - Shigeo Kaneda, Yusuke Kubota, Tomohito Kurokawa, Takeshi Furuhata:

Hand-Gesture Recognition System by Using Microwave Doppler Sensors. 211-216 - Chenyi Liao, Kei Hiroi, Katsuhiko Kaji, Nobuo Kawaguchi

:
An Event Data Extraction Method Based on HTML Structure Analysis and Machine Learning. 217-222
CDS 3: Mobile Communication and Application / WDLMA
- Takumi Kato, Ryo Chiba, Hideyuki Takahashi, Tetsuo Kinoshita

:
Agent-Oriented Cooperation of IoT Devices Towards Advanced Logistics. 223-227 - Kouichi Yasaki, Hidenobu Ito, Kazuaki Nimura:

Dynamic Reconfigurable Wireless Connection between Smartphone and Gateway. 228-233 - Mizuki Sakamoto, Tatsuo Nakajima, Sayaka Akioka:

Design Strategies for Building Mobile Crowdsourcing Services. 234-239 - Jun Lee

, Jeonghwan Lee, Sora Lim, Yongjin Kwon:
A Mobile Augmented Reality Service Model Based on Street Data, and Its Implementation. 240-247
NETSAP: Network Technologies for Security, Administration and Protection
- Yoshiaki Hori, Yutaka Miyake, Chung Huang Yang:

Message from the NETSAP 2015 Workshop Organizers. 248 - Cheng-Liang Kuo, Chung-Huang Yang:

Security Design for Configuration Management of Android Devices. 249-254 - Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, Yi-Fan Tseng:

Malware Detection Systems Based on API Log Data Mining. 255-260 - Jema David Ndibwile, A. Govardhan

, Kazuya Okada, Youki Kadobayashi:
Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication. 261-267 - Zhipeng Yi, Tadashi Dohi:

A Simulation Approach to Quantify Network Survivability on MANETs. 268-273
ESAS: E-Health Systems and Semantic Web
- Atilla Elçi, Duygu Çelik:

Message from the ESAS 2015 Workshop Organizers. 274-275
ESAS 1
- Satriya Dinata, Anindhita Dewabharata

, Shuo-Yan Chou:
An Ontology-Enabled Service Discovery for Supporting Health Promotion System. 276-281 - Ruiqi Shi, Zhang Chen, Haidong Wang, Peng Sun, Timothy Trull, Yi Shang:

mAAS - A Mobile Ambulatory Assessment System for Alcohol Craving Studies. 282-287 - Letong Feng, Yanqing Li, Lin Liu, Xiaojun Ye, Jianmin Wang

, Zhanqiang Cao, Xin Peng:
Towards an Applied Oral Health Ontology: A Round Trip between Clinical Data and Experiential Medical Knowledge. 288-295
SIMICE: Secure Identity Management in the Cloud Environment
- Bian Yang, Julien Bringer:

Message from the SIMICE 2015 Workshop Organizers. 296 - Yi-Ching Liao, Hanno Langweg:

Developing Metrics for Surveillance Impact Assessment. 297-302 - Qiong Li, Shuming Wang, Haokun Mao

, Qi Han, Xiamu Niu:
An Adaptive Improved Winnow Algorithm. 303-306 - Yi-Jia Zhang, Rui-Ying Liu, Zhong-Jian Kang, Han Qi:

A Security Protocol Applied to Covert Communication Platform and Its Formal Analysis. 307-311 - Bian Yang, Edlira Martiri

:
Using Honey Templates to Augment Hash Based Biometric Template Protection. 312-316
UCDAS 2015: The Second IEEE International Workshop on User Centered Design and Adaptive Systems
- Reyes Juárez-Ramírez, Andrés Mejía-Figueroa:

Message from the UCDAS 2015 Workshop Organizers. 317
UCDAS Session 1
- Asanga Nimalasena, Vladimir Getov

:
Context-Aware Framework for Performance Tuning via Multi-action Evaluation. 318-323 - Hyo-Cheol Lee, Seok-Won Lee:

Decision Supporting Approach under Uncertainty for Feature-Oriented Adaptive System. 324-329 - Kwan-Hong Lee, Seok-Won Lee:

Applying Game Theoretic Approach to Goal-Driven Requirements Trade-Off Analysis for Self-Adaptation. 330-335
UCDAS Session 2
- Dongning Yan:

Experiment on Multi-attribute Sorting Panel in E-commerce. 336-341
SSERV: The Second IEEE International Workshop on Social Services through Human and Artificial Agent Models
- Takao Terano:

Message from the SSERV 2015 Workshop Organizer. 342
SSERV 1
- Yoshiaki Ono, Setsuya Kurahashi

:
Cost Efficiency of Web Systems in Municipal Governments of Japan. 343-348 - Kyoko Yanagihori, Kazuhiko Tsuda:

Verification of Patent Document Similarity of Using Dictionary Data Extracted from Notification of Reasons for Refusal. 349-354 - P. Govind Raj

, Subrat Kar:
Design and Development of a Distributed Mobile Sensing Based Crowd Evacuation System: A Big Actor Approach. 355-360
SSERV 2
- Hiroshi Takahashi

:
Analyzing the Validity of Smart Beta in Financial Markets through Agent-Based Modeling. 361-366 - Makoto Sonohara, Yoshinori Natsume, Toshiyuki Kaneda:

A Study on Shop-Around Agent Simulation Considering Attractiveness for Impulse Stop. 367-372
MVDA: Modeling and Verifying of Distributed Applications
- Leila Jemni Ben Ayed, Fevzi Belli, Ahlem Ben Younes, Yousra Bendaly Hlaoui:

Message from the MVDA 2015 Workshop Organizers. 373-374
MVDA 1
- Handoko

, Janusz R. Getta:
Dynamic Query Scheduling for Online Integration of Semistructured Data. 375-380 - Woorim Choi, Yeongbok Choe, Moonkun Lee:

A Reduction Method for Process and System Complexity with Conjunctive and Complement Choices in a Process Algebra. 381-386 - Fahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

Personalized and Generic E-assessment Process Based on Cloud Computing. 387-392
MVDA 2
- Rahma Souli-Jbali, Minyar Sassi Hidri

, Rahma Ben Ayed:
Dynamic Data Replication-Driven Model in Data Grids. 393-397 - Kais Klai, Hanen Ochi:

LTL Model Cheking of Service-Based Business Processes in the Cloud. 398-403 - Imen Ben Fraj, Yousra Bendaly Hlaoui, Ahlem Ben Younes, Leila Jemni Ben Ayed:

Towards to Compose Cloud Service Flexible Workflow Applications. 404-409
MVDA 3
- Samia Bachir, Lilia Cheniti-Belcadhi, Serge Garlatti:

Enhanced Scenario Model for Peer Assessment in iMOOCs Based on Semantic Web. 410-415
STA: The Seventh IEEE International Workshop on Software Test Automation
- Fevzi Belli, Rajesh Subramanyan:

Message from the STA 2015 Workshop Organizers. 416
STA 1: Formal Methods in Practice
- Zhanwei Hui, Song Huang, Hui Li, Jianhao Liu, Li-Ping Rao:

Measurable Metrics for Qualitative Guidelines of Metamorphic Relation. 417-422 - Harald A. Stieber:

Estimating the Total Number of Software Faults Reliability Models and Mutation Testing a Bayesian Approach. 423-426 - Tolga Ayav

, Tugkan Tuglular
, Fevzi Belli:
Model Based Testing of VHDL Programs. 427-432
STA 2: Analysis and Synthesis
- Sungwon Kang, Haeun Baek, Jungmin Kim, Jihyun Lee:

Systematic Software Product Line Test Case Derivation for Test Data Reuse. 433-440 - Astrid Younang, Lunjin Lu:

Improving Precision of Java Script Program Analysis with an Extended Domain of Intervals. 441-446 - Chao-Chun Yeh, Shih-Kun Huang

:
CovDroid: A Black-Box Testing Coverage System for Android. 447-452
IWSC: Software Cybernetics
- Stephen S. Yau, Wei-Tek Tsai, Kenji Takahashi, Xiaoying Bai, Helen D. Karatza

:
Message from the IWSC 2015 Workshop Organizers. 453 - Yang Cao, Chung-Horng Lung, Samuel A. Ajila

:
Constraint-Based Multi-Tenant SaaS Deployment Using Feature Modeling and XML Filtering Techniques. 454-459 - Duo Liu, Chung-Horng Lung, Samuel A. Ajila

:
Adaptive Clustering Techniques for Software Components and Architecture. 460-465 - Ye Li, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai:

Approach for Test Profile Optimization in Dynamic Random Testing. 466-471 - Kejia Hou, Jun Huang, Xiaoying Bai:

Geographical Test Data Generation by Simulated-Annealing. 472-477
BIOT: Big Data Management for the Internet of Things
- Hideya Ochiai, Susumu Takeuchi, Kurt Geihs

, Ting-Yun Chi:
Message from the BIOT 2015 Workshop Organizers. 478
BIOT 1
- Yashuchika Fujiwara, Keiji Yamada, Kenichi Tabata, Michio Oda, Kazuo Hashimoto, Takuo Suganuma, Abdur Rahim Biswas, Panagiotis Vlacheas, Vera Stavroulaki

, Dimitris Kelaidonis, Andreas Georgakopoulos:
Context Aware Services: A Novel Trend in IoT Based Research in Smart City Project. 479-480 - Chian C. Ho, River Lee:

Real-Time Indoor Positioning System Based on RFID Heron-Bilateration Location Estimation and IMU Inertial-Navigation Location Estimation. 481-486 - Dongyu Wang

, Dixon Lo, Janak Bhimani, Kazunori Sugiura:
AnyControl - IoT Based Home Appliances Monitoring and Controlling. 487-492
BIOT 2
- Amir Atabekov, Marcel Starosielsky, Dan Chia-Tien Lo, Jing (Selena) He:

Internet of Things-Based Temperature Tracking System. 493-498 - Christian Prehofer, Luca Chiarabini:

From Internet of Things Mashups to Model-Based Development. 499-504 - Hiroyuki Ikegami, Raja Vara Prasad Yerra

, Pachamuthu Rajalakshmi
, Hiroshi Esaki:
Real Time Power Capping with Smart Circuit Breaker to Maximize Power Utilization of Local Generator. 505-510 - Raja Vara Prasad Yerra

, Pachamuthu Rajalakshmi
:
Neural Network Based Short Term Forecasting Engine to Optimize Energy and Big Data Storage Resources of Wireless Sensor Networks. 511-516
BIOT 3
- Preecha Khawsa-Ard, Chaodit Aswakul

:
IEEE1888 Interactive Display as a Service (IDaaS): Example in Building Energy Management System. 517-522 - Hiroyuki Ohsaki, Yoichi Nakamoto, Nobuhiro Yokoi, Hirotaka Moribe:

Performance Comparison of IP and CCN as a Communication Infrastructure for Smart Grid. 523-528 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:

A Node Replication Method to Guarantee Reachability for P2P Sensor Data Stream Delivery System on Heterogeneous Churn Situations. 529-534
DSA: Dependable Software and Applications
- Baowen Xu

:
Message from the DSA 2015 Workshop Organizer. 535
DSA 1
- Ya Wang, Rui Wang, Yong Guan, Xiaojuan Li, Hongxing Wei, Jie Zhang:

Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System. 536-541 - Xiaobin Zhao, Zan Wang, Xiangyu Fan, Zhenhua Wang:

A Clustering-Bayesian Network Based Approach for Test Case Prioritization. 542-547 - Xiaohong Zhang, Ziyuan Wang, Weifeng Zhang, Hui Ding, Lin Chen:

Spectrum-Based Fault Localization Method with Test Case Reduction. 548-549 - Toshifusa Sekizawa, Fumiya Otsuki, Kazuki Ito, Kozo Okano:

Behavior Verification of Autonomous Robot Vehicle in Consideration of Errors and Disturbances. 550-555
DSA 2
- Yue Wang, Zheng Li

, Ruilian Zhao:
Dependence Based Model-Healing. 556-561 - Rong Gu, Yun Tang, Qianhao Dong, Zhaokang Wang, Zhiqiang Liu, Shuai Wang, Chunfeng Yuan, Yihua Huang:

Unified Programming Model and Software Framework for Big Data Machine Learning and Data Analytics. 562-567 - Chunlei Ma, Xiang Long, Bo Jiang, Zhenyu Zhang:

Replay Debugging of Real-Time Vxworks Applications. 568-573 - Huiqun Zhao, Jing Sun, Ruixue Zhao:

A Model for Assessing the Dependability of Internetware Software Systems. 578-581 - Danni Yu, Qingshan Li, Lu Wang, Yishuai Lin:

An Agent-Based Self-Adaptive Mechanism with Reinforcement Learning. 582-585
DSA 3
- Shin Nakajima:

Analyzing Lifecycle Behavior of Android Application Components. 586-591 - He Jiang, Xin Chen, Shuwei Zhang, Xin Zhang, Weiqiang Kong, Tao Zhang

:
Software for Wearable Devices: Challenges and Opportunities. 592-597 - Win-Tsung Lo, Xiao-Long Liu, Ruey-Kai Sheu, Shyan-Ming Yuan

, Chun-Yu Chang:
An Architecture for Cloud Service Testing and Real Time Management. 598-603 - Yaohui Wang, Dan Wang, Wenbing Zhao, Yuan Liu:

Detecting SQL Vulnerability Attack Based on the Dynamic and Static Analysis Technology. 604-607
Student Research Symposium
- W. Eric Wong:

Message from the Chair of the Student Research Symposium. 608 - Keita Mori, Osamu Mizuno

:
An Implementation of Just-in-Time Fault-Prone Prediction Technique Using Text Classifier. 609-612 - Yu-Chung Huang, Jehn-Ruey Jiang:

Ultralightweight RFID Reader-Tag Mutual Authentication. 613-616 - Misako Seki, Kazumine Ogura, Yasuhiro Yamasaki, Hiroyuki Ohsaki:

Performance Comparison of Geographic DTN Routing Algorithms. 617-620 - Ryo Nakamura, Hiroyuki Ohsaki:

Performance Evaluation of an Open-Source Implementation of Content-Centric Networking. 621-624 - Labiblais Rahman:

Detecting MITM Based on Challenge Request Protocol. 625-626 - Chien-Chih Chen, Chao-Tung Yang

, Shuo-Tsung Chen, Fang-Yie Leu, Jung-Chun Liu:
Construction of a Green Power Virtual Machine Management Method on OpenStack. 627-630 - Yao-Yu Yang, Chao-Tung Yang

, Shuo-Tsung Chen, Wei-Hsun Cheng, Fuu-Cheng Jiang:
Implementation of Network Traffic Monitor System with SDN. 631-634
Fast Abstracts
- Hossain Shahriar

, Stelvio Cimato
, Jingyu Zhou, Katsuyoshi Iida
:
Message from the Fast Abstract Chairs. 635
FA1: Cloud and Big Data
- Thanh An Nguyen Thi

, Yaw-Chung Chen:
Design and Development of a Cloud-Based Trip-Tracking System. 636-637 - Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:

Fast and Cost-Effective Load Balancing Method for Range Queriable Cloud Storage. 638-639 - Ryota Ishikawa, Katsuyoshi Iida

, Hiroyuki Koga, Masayoshi Shimamura:
Improved Handover Using Cloud Control in Heterogeneous Wireless Networks. 640-641 - Jae-Ik Kim, Kyung-Wook Park, Hyung-Rak Jo, Dong-Ho Lee:

Semantic Enriched Category Recommendation System for Large-Scale Emails Exploiting Big Data Processing Technologies. 642-643 - Hyung-Rak Jo, Kyung-Wook Park, Jae-Ik Kim, Dong-Ho Lee:

A Semantic Category Recommendation System Exploiting LDA Clustering Algorithm and Social Folksonomy. 644-645
FA2: Distributed Systems and Applications
- Kazuki Matsushita, Masashi Nishimine, Kazunori Ueda:

Cooperative Cache Distribution System for Virtual P2P Web Proxy. 646-647 - Hyun-Ki Hong, Kyung-Wook Park, Dong-Ho Lee:

A Novel Semantic Tagging Technique Exploiting Wikipedia-Based Associated Words. 648-649 - In-Su Kang, Bo-Kyeong Kim, Dong-Ho Lee:

A Read-Optimized Index Structure for Distributed Log-Structured Key-Value Store. 650-651 - Yusuke Sakumoto, Hiroyuki Ohsaki:

On the Impact of Scale-Free Structure on End-to-End TCP Performance. 652-653 - Gun-Woo Kim

, Kyung-Wook Park, Dong-Ho Lee:
A Semantic-Based Health Advising System Exploiting Web-Based Personal Health Record Services. 654-655 - Dong Xu, Jingjing Wang:

Using Binding Bigraphs to Model Context-Aware Adaptive Applications. 656-657
FA3: Software and Testing
- Clare McInerney

, Tiziana Margaria
:
Software as a High-Tech Weapon in Ireland's Strategy. 658-663 - Weiwei Du, Motoyuki Ozeki, Hiroki Nomiya

, Kazuyoshi Murata, Masahiro Araki:
Pair Programming for Enhancing Communication in the Fundamental C Language Exercise. 664-665 - Haegeon Jeong, Jiwoong Won, Jaemyoun Lee, Kyungtae Kang, Junhee Ryu:

Breakpoint-Based Lightweight Prefetching to Improve Application Response. 666-667 - Satoshi Kawai, Saeko Matsuura:

Model Driven Development by Separating Concerns in UML Requirements Specification. 668-669 - Alice Barana

, Marina Marchisio
, Sergio Rabellino
:
Automated Assessment in Mathematics. 670-671 - Haruto Tanno, Xiaojing Zhang:

Test Script Generation Based on Design Documents for Web Application Testing. 672-673
FA4: Security and Privacy
- Hikaru Ichise, Yong Jin, Katsuyoshi Iida

:
Detection Method of DNS-based Botnet Communication Using Obtained NS Record History. 676-677 - L. Roger Yin, Jiazhen Zhou, Maxwell K. Hsu:

Redesigning QR Code Ecosystem with Improved Mobile Security. 678-679 - Keita Emura

, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
:
A KEM/DEM-Based Construction for Secure and Anonymous Communication. 680-681 - Ikuo Nakagawa, Yoshifumi Hashimoto, Mitsuharu Goto, Masahiro Hiji

, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo
:
DHT Extension of m-Cloud - Scalable and Distributed Privacy Preserving Statistical Computation on Public Cloud. 682-683 - Alfredo Cuzzocrea:

Provenance Research Issues and Challenges in the Big Data Era. 684-686 - Bayu Tenoyo, Petrus Mursanto

:
Concept Representation and Its Role in Artifact Development. 687-692

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














