default search action
40th COMPSAC Workshops 2016: Atlanta, GA, USA
- 40th IEEE Annual Computer Software and Applications Conference, COMPSAC Workshops 2016, Atlanta, GA, USA, June 10-14, 2016. IEEE Computer Society 2016
ADMNET 2016: The Fourth International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
- Takashi Yamanoue, Hiroki Kashiwazaki, Seigo Kishiba, Yong Jin:
Message from the ADMNET Workshop Organizers. 1
ADMNET Session 1
- Yong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta:
Design and Implementation of Secure Prefetch Mechanism for Multi-step Name Resolution in DNS. 2-7 - Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
Design and Implementation of a Client Based DNSSEC Validation and Alert System. 8-13 - Yui Kazawa, Sho Tsugawa:
Robustness of Networks with Skewed Degree Distributions under Strategic Node Protection. 14-19 - Yohei Iizawa, Kazuya Suzuki:
Multi-layer and Multi-domain Network Orchestration and Provision of Virtual Views to Users. 20-25
ADMNET Session 2
- Hiroyuki Ohsaki, Yasuhiro Yamasaki:
On the Impact of Cut-Through Links in Epidemic Broadcasting. 26-31 - Karim El Defrawy, Tiffany Kim, Pape M. Sylla:
Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy. 32-37 - Raef Mousheimish, Yehia Taher, Karine Zeitouni:
Toward the Support of Challenging Service Level Agreements (SLAs) in Manual and Context-Dependent Activities. 38-43
STA 2016: The Eighth IEEE International Workshop on Software Test Automation
- Fevzi Belli, Rajesh Subramanyan:
Message from the STA Workshop Organizers. 44
STA Invited Talk
- Aditya P. Mathur:
Challenges in Testing the Design of Secure Complex Critical Public Infrastructure. 45
Session 1: Fault Management and Ranking
- Hui Zhang:
Fault Localization Method Generated by Regression Test Cases on the Basis of Genetic Immune Algorithm. 46-51 - Ekincan Ufuktepe, Tugkan Tuglular:
Automation Architecture for Bayesian Network Based Test Case Prioritization and Execution. 52-57
Session 2: Human Interactions and Testing
- Bin Wang, Bei-Bei Yin, Kai-Yuan Cai:
Event Handler Tree Model for GUI Test Case Generation. 58-63
ESAS 2016: The 11th IEEE International Workshop on E-Health Systems and Semantic Web
- Atilla Elçi, Duygu Çelik Ertugrul:
Message from ESAS 2016 Workshop Organizers. 64
ESAS Session 1
- Duygu Çelik Ertugrul, Hakan Kanmaz, Mehmet Ugur Yuksel, Atilla Elçi, Mehmet Ertugrul:
Fetal Heart Rate Monitoring System (FHRMS). 65-70 - Vassilya Uzun:
QR-Code Based Hospital Systems for Healthcare in Turkey. 71-76
ESAS Session 2
- Mehmet Akif Cifci, Duygu Çelik Ertugrul, Atilla Elçi:
A Search Service for Food Consumption Mobile Applications via Hadoop and MapReduce Technology. 77-82 - Saranya Radhakrishnan, Zachary Stecher, Deger Cenk Erdil:
An Open-Source ACASI Design for Social Collaborative mHealth. 83-87
SSERV 2016: The Third IEEE International Workshop on Social Services through Human and Artificial Agent Models
- Takao Terano:
Message from the SSERV Workshop Organizers. 88
Session 1: Artificial Agent Models
- Kenichi Yoshida, Akito Sakurai:
Stock Price Regression Based on Order Book Information. 89-94 - Takamasa Kikuchi, Masaaki Kunigami, Takashi Yamada, Hiroshi Takahashi, Takao Terano:
Analysis of the Influences of Central Bank Financing on Operative Collapses of Financial Institutions Using Agent-Based Simulation. 95-104 - Koji Tanaka, Kazuhiko Tsuda:
Methods to Predict the Number of Software Faults Using Weibull Distribution. 105-110
SSERV Session 2
- Takayuki Mizuno, Masahiro Shohmitsu, Toshiyuki Kaneda:
A Study on the Agent-Simulation of Waiting Behaviours Inside a Transfer Station Space. 111-116 - Masaki Kitazawa, Satoshi Takahashi, Toru B. Takahashi, Atsushi Yoshikawa, Takao Terano:
Improving a Cellular Manufacturing System through Real Time-Simulation and-Measurement. 117-122 - Hiroki Azuma, Nobuo Suzuki, Tohru Matsuodani, Kazuhiko Tsuda:
Proposal for a Cumulative Deposit Rate Prediction Method for Payment After Delivery in the Mail Order Business. 123-128
QUORS 2016: The 10th IEEE International Workshop on Quality Oriented Reuse of Software
- Xiaodong Liu, Hongji Yang:
Message from the QUORS Workshop Organizers. 129
Session 1: Quality and Efficient Development
- Fei Peng, Chunyu Li, Xiaohan Song, Wei Hu, Guihuan Feng:
An Eye Tracking Research on Debugging Strategies towards Different Types of Bugs. 130-134 - Kayhan Moharreri, Alhad Vinayak Sapre, Jayashree Ramanathan, Rajiv Ramnath:
Cost-Effective Supervised Learning Models for Software Effort Estimation in Agile Environments. 135-140 - Feng-Jian Wang, Thanh-Thuy Thi Nguyen, Tennyson Lu:
A Study to Improving Anomaly Detection in a TS Workflow. 141-148 - Igor Velbitskiy, Gary Ushakov:
New Graphic Polyglot Concept of Programming. 149-154
Session 2: Emerging Reuse
- Simone Maccanti, Jameela Al-Jaroodi, Arif Sirinterlikci:
Knowledge Management Framework for Software Reuse. 155-160 - Shahid Hussain, Jacky W. Keung, Arif Ali Khan, Kwabena Ebo Bennin:
A Methodology to Automate the Selection of Design Patterns. 161-166 - Predrag Filipovikj, Trevor Jagerfield, Mattias Nyberg, Guillermo Rodríguez-Navas, Cristina Cerschi Seceleanu:
Integrating Pattern-Based Formal Requirements Specification in an Industrial Tool-Chain. 167-173 - Jianfeng Chen, Hongji Yang:
From Data Reuse to Knowledge Reuse in Web Applications: A Survey. 174-179
Session 3: Exploratory Study
- Oliver Fendt, Michael C. Jaeger, Ricardo Jimenez Serrano:
Industrial Experience with Open Source Software Process Management. 180-185 - Samuel J. Chinenyeze, Xiaodong Liu, Ahmed Yassin Al-Dubai:
DEEPC: Dynamic Energy Profiling of Components. 186-191 - Affan Yasin, Lin Liu:
An Online Identity and Smart Contract Management System. 192-198
MidCCI 2016: The Second IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking
- Hideaki Goto, Yuuichi Teranishi, Jiann-Liang Chen, Shuo-Yan Chou:
Message from the MidCCI Workshop Organizers. 199-201
Session 1: Computing and Internetworking
- Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura:
An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other. 202-207 - Karim El Defrawy, Tyler Kaczmarek:
Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers. 208-213
MVDA 2016: The Fifth IEEE Workshop on Modeling and Verifying Distributed Applications
- Leila Jemni Ben Ayed, Fevzi Belli, Ahlem Ben Younes, Yousra Bendaly Hlaoui:
Message from the MVDA Workshop Organizers. 214-215
MVDA Session 1
- Hojin Chang, Ramesh K. Karne, Alexander L. Wijesinha:
Migrating a Bare PC Web Server to a Multi-core Architecture. 216-221 - Brahim Nasraoui, Riadh Robbana:
Reachability Analysis of Multithreaded Programs Using Communicating Rewriting Systems. 228-233
CEEP 2016: The First International COMPSAC Workshop on Computing Education - Emerging Practices
- Henry C. B. Chan, Sorel Reisman, Simanta Mitra:
Message from the CEEP Workshop Organizers. 246
CEEP Session 1
- Yong Shi, Dan Chia-Tien Lo, Kai Qian:
Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment. 247-252 - Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Hardware Attacks and Security Education. 253-257
CEEP Session 2
- B. L. Tembe, S. K. Kamble:
Implementation of Active Learning Methods in Mechanical Engineering Education to Enhance Students' Performance. 258-263 - Chunyan Deng, Zhiguo Zhou, Wenqing Li, Boyu Hou:
A Panoramic Geology Field Trip System Using Image-Based Rendering. 264-268 - Amir Atabekov, Jing He, Patrick O. Bobbie:
Internet of Things-Based Framework to Facilitate Indoor Localization Education. 269-274 - Anna-Lena Lamprecht, Tiziana Margaria, Clare McInerney:
A Summer Computing Camp Using ChainReaction and jABC. 275-280
CDS 2016: The Fourth IEEE International Workshop on Consumer Devices and Systems
- Norihiro Ishikawa, Yoshia Saito, Akimitsu Kanzaki:
Message from the CDS Workshop Organizers. 281
CDS Session 1
- Ozlem Zehra Ozyagci, Mihhail Matskin:
Truthful Incentive Mechanism for Mobile Crowdsensing with Smart Consumer Devices. 282-287 - Toru Kobayashi, Kazushige Katsuragi, Kenichi Arai, Tomoya Sakai, Makoto Fujimura:
Social Media Mediation System for Closing Inter-Generational Communication Gap. 288-293 - Seiya Tanaka, Nobuo Fukujyu, Shigeo Kaneda:
Configurations of Micro EV Quick-Charging System with EDLC Storage. 294-299 - Naoya Tsujita, Masato Mitsuno, Yoshiki Usui, Shigeo Kaneda:
Remote-Controlled Micro EV System Using Downward-Facing Wide-Angle Video Camera. 300-305
Session 2: Consumer Networks
- Takeshi Kato, Daigo Matsubara, Naofumi Yoshida, Norihiro Ishikawa:
Management of OSGi Device Using PUCC Protocols and Metadata. 306-311 - Teruhisa Tajima, Yasuo Okabe:
Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN. 312-318 - Yutaka Onuma, Masanao Nozawa, Yoshiaki Terashima, Ryozo Kiyohara:
Improved Software Updating for Automotive ECUs: Code Compression. 319-324
BIoT 2016: The Third IEEE International Workshop on Big Data Management for the Internet of Things
- Hideya Ochiai, Kurt Geihs, Susumu Takeuchi, Jun Suzuki:
Message from the BIOT Workshop Organizers. 325
BIOT Session 1
- Janani Balaji, Rajshekhar Sunderraman:
Distributed Graph Path Queries Using Spark. 326-331 - Yuya Tarutani, Shuuichirou Murata, Kazuhiro Matsuda, Morito Matsuoka:
IEEE1888 over WebSocket for Communicating across a Network Boundary. 332-337 - Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Design and Implementation of Global Reference and Indirect Method Invocation Mechanisms in the Dripcast. 338-343
BIOT Session 2
- Yuanbo Zhu, Dominic Maurath, Longqi Zhang, Nanmagalam Devika, Leong Hai Koh, Fook Hoong Choo:
An Intelligent Microgrid Energy Management System Using Distributed Database and IEEE 1888. 344-347 - Susumu Takeuchi, Michiharu Takemoto, Masato Matsuo:
SPIRE: Scalable and Unified Platform for Real World IoT Services with Feature Interaction. 348-353
SAPSE 2016: The Eighth IEEE International Workshop on Security Aspects in Processes and Services Engineering and CFSE 2016: The Eighth IEEE International Workshop on Computer Forensics in Software Engineering
- Stelvio Cimato:
Message from the SAPSE Workshop Organizers. 354 - Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE Workshop Organizers. 355
SAPSE/CFSE Invited Talk
- Alfredo Cuzzocrea:
A Reference Architecture for Supporting Secure Big Data Analytics over Cloud-Enabled Relational Databases. 356-358
SAPSE/CFSE Session 1
- Robert J. Ellison, William Nichols, Carol Woody:
Measuring Software Assurance. 359-364 - Jason W. Clark:
EAR: An e-mail Attachment Receiver to Search Concerning Images in the Context of Insider Threat. 365-370 - Christopher Francis-Christie, Dan Lo:
A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online Video. 371-376
Poster Lightning Talks
- Takafumi Kawaguchi, Ryohei Banno, Masashi Hojo, Kazuyuki Shudo:
Self-Refining Skip Graph: A Structured Overlay Approaching to Ideal Skip Graph. 377-378 - Wook-Sung Yoo, Sameer Ahamed Shaik:
Development of Home Management System Using Arduino and AppInventor. 379-380
STPSA 2016: The 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine:
Message from STPSA 2016 Workshop Organizers. 381
Session 1: Web Security
- Ananth A. Jillepalli, Daniel Conte de Leon:
An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser. 382-387 - Sai Samrat Malka, Na Li, Venu Madhavi Doddapaneni, Yuhong Liu, Anil Kumar Pamulapati:
A Web Application For Studying Collusion Attacks Through Friend Search Engine. 388-393 - Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
Information Theoretic Anomaly Detection Framework for Web Application. 394-399
Session 2: Data Privacy
- Ivor D. Addo, Praveen Madiraju, Sheikh Iqbal Ahamed, William C. Chu:
Privacy Preservation in Affect-Driven Personalization. 400-405 - Lining Xu, Yongxu Wu:
New Challenge of Protecting Privacy due to Stained Recognition. 406-409 - Saikrishna Yellanki, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws. 410-415 - Manting Shen, Yinyan Yu, Zhi Tang, Xiaoyu Cui:
An Efficient Safe Directory Based File Protection Mechanism. 416-422
Session 3: Emerging Security Topics
- Bata Krishna Tripathy, Ananta Gopal Sethy, Padmalochan Bera, Mohammad Ashiqur Rahman:
A Novel Secure and Efficient Policy Management Framework for Software Defined Network. 423-430 - A. H. M. Jakaria, Wei Yang, Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman:
VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization. 431-436 - Mohsen Dorodchi, Maryam Abedi, Bojan Cukic:
Trust-Based Development Framework for Distributed Systems and IoT. 437-442 - Okoye Emmanuel Ekene, Ron Ruhl, Pavol Zavarsky:
Enhanced User Security and Privacy Protection in 4G LTE Network. 443-448
Session 4: Miscellaneous Topics
- Mahesh Nath Maddumala, Vijay Kumar:
Efficient Design of Firewall Temporal Policies. 449-454 - Hossain Shahriar, Hisham M. Haddad, Pranahita Bulusu:
OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities. 455-460 - Rajbhooshan Bhakte, Pavol Zavarsky, Sergey Butakov:
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework. 461-466 - Subil Mathew Abraham:
Estimating Mean Time to Compromise Using Non-homogenous Continuous-Time Markov Models. 467-472
DSA 2016: The Second IEEE International Workshop on Dependable Software and Applications
- Baowen Xu:
Message from the DSA Workshop Organizer. 473
DSA Session 1
- Deshuai Han, Jianchun Xing, Qiliang Yang, Hongda Wang, Xuewei Zhang:
Formal Sequence: Extending UML Sequence Diagram for Behavior Description and Formal Verification. 474-481 - Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot. 482-489 - Toshifusa Sekizawa, Makoto Fujiwara, Koichiro Watanabe:
A Case Study: Verification of an Embedded System Using Abstraction Refinement with Requirements. 490-493
UCDAS 2016: The Third IEEE International Workshop on User Centered Design and Adaptive Systems
- Reyes Juárez-Ramírez, Andrés Mejía-Figueroa:
Message from the UCDAS Workshop Organizers. 494-495
UCDAS Session 1
- Dirk Thatmann, Philip Raschke, Axel Küpper:
"Please, No More GUIs!": A User Study, Prototype Development and Evaluation on the Integration of Attribute-Based Encryption in a Hospital Environment. 496-502 - Jiajia Li, Grace Ngai, Hong Va Leong, Stephen C. F. Chan:
Your Eye Tells How Well You Comprehend. 503-508 - Akputu K. Oryina, Abiodun O. Adedolapo:
Emotion Recognition for User Centred E-Learning. 509-514
UCDAS Session 2
- Chidchanok Thepsoonthorn, Takahiro Yokozuka, Jinhwan Kwon, Robin Miao Sin Yap, Shunsuke Miura, Ken-ichiro Ogawa, Yoshihiro Miyake:
Does User's Prior Knowledge Worth Consideration?: The Influence of Prior Knowledge Toward Mutual Gaze Convergence. 515-520 - Joyce Siqueira, Fabrízzio Alphonsus Alves de Melo Nunes Soares, Deller James Ferreira, Cleyton Rafael Gomes Silva, Luciana de Oliveira Berretta, Cristiane Bastos Rocha Ferreira, Igor Moreira Felix, Anderson da Silva Soares, Ronaldo Martins da Costa, Mateus Machado Luna:
Braille Text Entry on Smartphones: A Systematic Review of the Literature. 521-526 - Xiaobing Zhang, Qiliang Yang, Jianchun Xing, Deshuai Han:
Recognizing Voice-Based Requirements to Drive Self-Adaptive Software Systems. 534-539
UCDAS Session 3
- Deshuai Han, Jianchun Xing, Qiliang Yang, Juelong Li, Hongda Wang:
Handling Uncertainty in Self-Adaptive Software Using Self-Learning Fuzzy Neural Network. 540-545 - Mohammad Hashemi, John Herbert:
A Service-Oriented User Interaction Analysis Framework Supporting Adaptive Applications. 546-551
The Second IEEE International Workshop on Secure Identity Management in the Cloud Environment
- Katsuyoshi Iida, Yutaka Miyake, Chung Huang Yang, Bian Yang, Julien Bringer:
Message from the NETSAP and SIMICE Workshop Organizers. 552
NETSAP/SIMICE Session 1
- Jianjun Zheng, Akbar Siami Namin:
The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy. 553-558 - Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
An Automated ACL Generation System for Secure Internal Network. 559-564 - N. M. Sahri, Koji Okamura:
Collaborative Spoofing Detection and Mitigation - SDN Based Looping Authentication for DNS Services. 565-570
NETSAP/SIMICE Session 2
- Toru Kobayashi, Hiroaki Matsuoka, Shouta Betsumiya:
Flying Communication Server in case of a Largescale Disaster. 571-576 - Shun Tobiyama, Yukiko Yamaguchi, Hajime Shimada, Tomonori Ikuse, Takeshi Yagi:
Malware Detection with Deep Neural Network Using Process Behavior. 577-582 - Anna Monreale, Wendy Hui Wang:
Privacy-Preserving Outsourcing of Data Mining. 583-588 - Olivia Angiuli, Jim Waldo:
Statistical Tradeoffs between Generalization and Suppression in the De-identification of Large-Scale Data Sets. 589-593
Fast Abstracts
Fast Abstract 1: Software And Application Testing and Benchmarking
- Jaemyoun Lee, Chang Song, Kyungtae Kang:
Benchmarking Large-Scale Object Storage Servers. 594-595 - D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Estimating t-Way Fault Profile Evolution During Testing. 596-597 - Zhanwei Hui, Song Huang:
Experience Report: How Do Metamorphic Relations Perform in Geographic Information Systems Testing. 598-599 - Jialin Yang, W. K. Chan:
Dynamic Testing Against Hidden Concurrency Bugs through Abstraction and Projection. 600-601 - Joyce Addae, Milena Radenkovic, Xu Sun, Dave Towey:
An Augmented Cybersecurity Behavioral Research Model. 602-603
Fast Abstract 2: Computer Algorithms, Applications and Education
- Wael Abou El-Wafa, Asmaa G. Seliem, Hesham F. A. Hamed:
Hardware Acceleration of Smith-Waterman Algorithm for Short Read DNA Alignment Using FPGA. 604-605