default search action
43rd COMPSAC 2019: Milwaukee, WI, USA - Volume 1
- Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 - Cong Wang, Le Kang, Renwei Zhang, Weiliang Yin:
Statically-Directed Assertion Recommendation for C Programs. 1-10 - Zuxing Gu, Jiecheng Wu, Jiaxiang Liu, Min Zhou, Ming Gu:
An Empirical Study on API-Misuse Bugs in Open-Source C Programs. 11-20 - Junxiao Han, Shuiguang Deng, Xin Xia, Dongjing Wang, Jianwei Yin:
Characterization and Prediction of Popular Projects on GitHub. 21-26 - Lei Ai, Zhiqiu Huang, Weiwei Li, Yu Zhou, Yaoshen Yu:
SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation. 27-36 - Andrés Paz, Ghizlane El-Boussaidi:
Supporting Consistency in the Heterogeneous Design of Safety-Critical Software. 37-46 - Miao Zhang, Jacky Keung, Yan Xiao, Md. Alamgir Kabir, Shuo Feng:
A Heuristic Approach to Break Cycles for the Class Integration Test Order Generation. 47-52 - Md. Alamgir Kabir, Jacky W. Keung, Kwabena Ebo Bennin, Miao Zhang:
Assessing the Significant Impact of Concept Drift in Software Defect Prediction. 53-58 - Robert Ward, Carl K. Chang:
In Search of Scientific Agile. 59-65 - Yue Yuan, Han Anu, Wenchang Shi, Bin Liang, Bo Qin:
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components. 66-71 - Musaad Alzahrani, Saad Alqithami, Austin Melton:
Using Client-Based Class Cohesion Metrics to Predict Class Maintainability. 72-80 - Chun Cao, Jing Deng, Ping Yu, Zhiyong Duan, Xiaoxing Ma:
ParaAim: Testing Android Applications Parallel at Activity Granularity. 81-90 - Salim Ali Khan Mohammad, Sathvik Vamshi Valepe, Subhrakanta Panda, B. S. A. S. Rajita:
A Comparative Study of the Effectiveness of Meta-Heuristic Techniques in Pairwise Testing. 91-96 - Yanru Peng, Yuting Chen, Beijun Shen:
An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode Obfuscators. 97-106 - Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong, Xiaolei Hou, Sihan Xu, Jing Xu:
AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. 107-116 - Devansh Tiwari, Hironori Washizaki, Yoshiaki Fukazawa, Tomoyuki Fukuoka, Junji Tamaki, Nobuhiro Hosotani, Munetaka Kohama:
Metrics Driven Architectural Analysis using Dependency Graphs for C Language Projects. 117-122 - Irfan Alahi, Mubassher Islam, Anindya Iqbal, Amiangshu Bosu:
Identifying the Challenges of the Blockchain Community from StackExchange Topics and Trends. 123-128 - Wesley N. M. Torres, Everton L. G. Alves, Patrícia D. L. Machado:
An Empirical Study on the Spreading of Fault Revealing Test Cases in Prioritized Suites. 129-138 - Willian Marques Freire, Carlos Vinícius Bindewald, Aline Maria Malachini Miotto Amaral, Thelma Elita Colanzi:
Supporting Decision Makers in Search-Based Product Line Architecture Design using Clustering. 139-148 - Yufei Yang, Wenbo Luo, Yu Pei, Minxue Pan, Tian Zhang:
Execution Enhanced Static Detection of Android Privacy Leakage Hidden by Dynamic Class Loading. 149-158 - Xing Hu, Rui Men, Ge Li, Zhi Jin:
Deep-AutoCoder: Learning to Complete Code Precisely with Induced Code Tokens. 159-168 - Biyun Zhu, Ruijie Meng, Zhenyu Zhang, W. K. Chan:
ConRS: A Requests Scheduling Framework for Increasing Concurrency Degree of Server Programs. 169-178 - Sushma Sakala, Vamshi Krishna Epuri, Samuel Sungmin Cho, Myoungkyu Song:
LAC: Locating and Applying Consistent and Repetitive Changes. 179-184 - Jiwei Xu, Yuewen Wu, Zhigang Lu, Tao Wang:
Dockerfile TF Smell Detection Based on Dynamic and Static Analysis Methods. 185-190 - Partha Chakraborty, Rifat Shahriyar, Anindya Iqbal:
Empirical Analysis of the Growth and Challenges of New Programming Languages. 191-196 - Tugkan Tuglular, Mutlu Beyazit, Dilek Öztürk:
Featured Event Sequence Graphs for Model-Based Incremental Testing of Software Product Lines. 197-202 - Rumeng Shao, Hongyan Mao, Jinpeng Jiang:
Time-Aware and Location-Based Personalized Collaborative Recommendation for IoT Services. 203-208 - Sergio Segura, Dave Towey, Zhi Quan Zhou, Tsong Yueh Chen:
An Extended Abstract of "Metamorphic Testing: Testing the Untestable". 209-210 - Carl K. Chang:
Agile, Continuous Integration, and DevOps. 211 - Djananjay Pandit, Ajay Bansal:
A Declarative Approach for an Adaptive Framework for Learning in Online Courses. 212-215 - Alice Barana, Marina Marchisio, Sergio Rabellino:
Empowering Engagement through Automatic Formative Assessment. 216-225 - Luca Cagliero, Lorenzo Canale, Laura Farinetti:
VISA: A Supervised Approach to Indexing Video Lectures with Semantic Annotations. 226-235 - Pedro Maroco, João Cambeiro, Vasco Amaral:
A Mobile System to Increase Efficiency of the Lecturers when Preventing Academic Dishonesty During Written Exams. 236-241 - Henry C. B. Chan, Hong Va Leong, Grace Ngai:
Study TOUR for Computer Science Students. 242-251 - Kalika Suksomboon, Zhishu Shen, Kazuaki Ueda, Atsushi Tagami:
C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring Services. 252-257 - Yohei Hasegawa, Masato Uchida:
Predicting Network Outages Based on Q-Drop in Optical Network. 258-263 - Yuuki Tsubouchi, Asato Wakisaka, Ken Hamada, Masayuki Matsuki, Hiroshi Abe, Ryosuke Matsumoto:
HeteroTSDB: An Extensible Time Series Database for Automatically Tiering on Heterogeneous Key-Value Stores. 264-269 - Ryosuke Matsumoto, Uchio Kondo, Kentaro Kuribayashi:
FastContainer: A Homeostatic System Architecture High-Speed Adapting Execution Environment Changes. 270-275 - Yuuichi Teranishi, Takashi Kimata, Eiji Kawai, Hiroaki Harai:
Hybrid Cellular-DTN for Vehicle Volume Data Collection in Rural Areas. 276-284 - Natsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Modeling Restrained Epidemic Routing on Complex Networks. 285-290 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:
Sparse Representation of Network Topology with K-SVD Algorithm. 291-298 - Ali R. Hurson, Hiroyuki Sato, Toyokazu Akiyama, Dan Lin:
Message from EATA Symposium Chairs. 299 - Bruno Konzen Stahl, Leonardo Pavanatto Soares, Vicenzo Abichequer Sangalli, Pedro Costa Klein, Rafael Neujahr Copstein, Márcio Sarroglia Pinho:
DirectFlow: A Robust Method for Ocular Torsion Measurement. 300-305 - Ricardo Silveira Rodrigues, Marcia Pasin, Alice J. Kozakevicius, Vinicius Monego:
Pothole Detection in Asphalt: An Automated Approach to Threshold Computation Based on the Haar Wavelet Transform. 306-315 - Xin Dong, Tong Li, Zhiming Ding:
An Ontology Enhanced User Profiling Algorithm Based on Application Feedback. 316-325 - Shintaro Ishihara, Satoshi Tanita, Toyokazu Akiyama:
A Dataflow Application Deployment Strategy for Hierarchical Networks. 326-335 - Edna Dias Canedo, Rhandy Rafhael de Carvalho, Heloise Acco Tives Leão, Pedro Henrique Teixeira Costa, Márcio Vinicius Okimoto:
How the Academics Qualification Influence the Students Learning Development. 336-345 - Bo Hu, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi, Daniel Dalek, Ola Söderström, Kazuya Okada, Yuji Sekiya, Akihiro Nakao:
Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification. 346-351 - Jing Sun, Huiqun Zhao, Sanwen Mu, Zimu Li:
Purchasing Behavior Analysis Based on Customer's Data Portrait Model. 352-357 - Jiahui Ren, Xian Xu, Zhihuan Yao, Huiqun Yu:
Recommender Systems Based on Autoencoder and Differential Privacy. 358-363 - Yuan Li, Kedian Mu:
Matrix Factorization Model with Dual Preferences for Rating Prediction. 364-372 - Sreyasee Das Bhattacharjee, William J. Tolone, Ashish Mahabal, Mohammed Elshambakey, Isaac Cho, S. George Djorgovski:
View-Adaptive Weighted Deep Transfer Learning for Distributed Time-Series Classification. 373-381 - Hong Xia, Mingdao Zhao, Yanping Chen, Zhongmin Wang, Zhong Yu, Jingwei Yang:
Multi-Source Heterogeneous Core Data Acquisition Method in Edge Computing Nodes. 382-385 - Chengfang Ma, Ying Sha, Jianlong Tan, Li Guo, Huailiang Peng:
Chinese Social Media Entity Linking Based on Effective Context with Topic Semantics. 386-395 - Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model. 396-401 - Ivan Luiz Salvadori, Alexis Huf, Frank Siqueira:
Semantic Data-Driven Microservices. 402-410 - Mohit Ved, Rizwanahmed B:
Big Data Analytics in Telecommunication using State-of-the-art Big Data Framework in a Distributed Computing Environment: A Case Study. 411-416 - Karl Severin, Swapna S. Gokhale, Aldo Dagnino:
Keyword-Based Semi-Supervised Text Classification. 417-422 - Ishtiyaque Ahmad, Md Anwar Parvez, Anindya Iqbal:
TypoWriter: A Tool to Prevent Typosquatting. 423-432 - Mingyang Jiang, Tianqi Zhao:
Vehicle Travel Time Estimation by Sparse Trajectories. 433-442 - Morgan Gallant, Haruna Isah, Farhana H. Zulkernine, Shahzad Khan:
Xu: An Automated Query Expansion and Optimization Tool. 443-452 - Yongyi Xian, Chuanfei Xu, Sameh Elnikety, Yan Liu:
Parallel Discovery of Trajectory Companions from Heterogeneous Streaming Data. 453-462 - Daniele Facinelli, Matteo Larcher, Davide Brunelli, Daniele Fontanelli:
Cooperative UAVs Gas Monitoring using Distributed Consensus. 463-468 - Christopher-Eyk Hrabia, Patrick Marvin Lehmann, Sahin Albayrak:
Increasing Self-Adaptation in a Hybrid Decision-Making and Planning System with Reinforcement Learning. 469-478 - Jérôme Leudet, François Christophe, Tommi Mikkonen, Tomi Männistö:
AILiveSim: An Extensible Virtual Environment for Training Autonomous Vehicles. 479-488 - Hassam Ullah Sheikh, Mina Razghandi, Ladislau Bölöni:
Learning Distributed Cooperative Policies for Security Games via Deep Reinforcement Learning. 489-494 - Lucas Leal, Andrea Ceccarelli, Eliane Martins:
The SAMBA Approach for Self-Adaptive Model-Based Online Testing of Services Orchestrations. 495-500 - Yevgeniy Reznichenko, Enrico Prampolini, Abubakar Siddique, Henry Medeiros, Francesca Odone:
Visual Tracking with Autoencoder-Based Maximum A Posteriori Data Fusion. 501-506 - Christian Meurisch, Zain Hamza, Bekir Bayrak, Max Mühlhäuser:
Enhanced Detection of Crisis-Related Microblogs by Spatiotemporal Feedback Loops. 507-512 - Christian Meurisch, Bekir Bayrak, Max Mühlhäuser:
AssistantGraph: An Approach for Reusable and Composable Data-Driven Assistant Components. 513-522 - Matthias Kern, Ferhat Erata, Markus Iser, Carsten Sinz, Frédéric Loiret, Stefan Otten, Eric Sax:
Integrating Static Code Analysis Toolchains. 523-528 - Sorath Asnani, Maria Giulia Canu, Bartolomeo Montrucchio:
Producing Green Computing Images to Optimize Power Consumption in OLED-Based Displays. 529-534 - Brian K. Ledbetter, Samuel Wehunt, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons. 535-544 - Timothy R. Weil:
Risk Assessment Methods for Cloud Computing Platforms. 545-547 - Amir Dabirian:
Employer Branding in the IT Industry: An Employer view. 548 - Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Walid Saad:
A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems. 549-558 - Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu:
Information Exposure (IEX): A New Class in the Bugs Framework (BF). 559-564 - Md Arabin Islam Talukder, Hossain Shahriar, Kai Qian, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu:
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. 565-569 - Mohammad Ghazivakili, Claudio Demartini, Mauro Guerrera, Bartolomeo Montrucchio:
Open Source Fog Architecture for Industrial IoT Automation Based on Industrial Protocols. 570-578 - Marjan Sirjani, Giorgio Forcina, Ali Jafari, Stephan Baumgart, Ehsan Khamespanah, Ali Sedaghatbaf:
An Actor-Based Design Platform for System of Systems. 579-587 - Congmiao Li, Jean-Luc Gaudiot:
Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters. 588-597 - Feng Ye, Songjie Zhu, Yuansheng Lou, Zihao Liu, Yong Chen, Qian Huang:
Research on Index Mechanism of HBase Based on Coprocessor for Sensor Data. 598-603 - Jakob Danielsson, Tiberiu Seceleanu, Marcus Jägemar, Moris Behnam, Mikael Sjödin:
Testing Performance-Isolation in Multi-core Systems. 604-609 - Tokio Takahashi, Masato Uchida:
Optimal Hand Sign Selection Using Information Theory for Custom Sign-Based Communication. 610-615 - Fulvio Corno, Luigi De Russis, Luisa Fernanda Barrera-León:
Touch-Based Ontology Browsing on Tablets and Surfaces. 616-621 - Jun Wang, Eugene Yujun Fu, Grace Ngai, Hong Va Leong:
Investigating Differences in Gaze and Typing Behavior Across Age Groups and Writing Genres. 622-629 - Piyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Alana McVey, Amy VanHecke, Sheikh Iqbal Ahamed:
Application of Reconstructed Phase Space in Autism Intervention. 630-637 - Joana Páris, João Cambeiro, Vasco Amaral, Armanda Rodrigues:
Using Gamification to Motivate Occupants to Energy Efficiency in a Social Setting of a Building Automation System. 638-643 - Shameem Ahmed, M. Forhad Hossain, Kurt Price, Cody Pranger, Md Monsur Hossain, Moushumi Sharmin:
A Tale of the Social-Side of ASD. 644-652 - Riddhiman Adib, Eyad Aldawod, Nathan Lang, Nina Lasswell, Shion Guha:
Analyzing Happiness: Investigation on Happy Moments using a Bag-of-Words Approach and Related Ethical Discussions. 653-662 - Labiblais Rahman, Katsunori Oyama:
Long-Term Monitoring of NIRS Signals for Mental Health Assessment. 663-666 - Yuki Kurauchi, Naoto Abe, Hiroshi Konishi, Hitoshi Seshimo:
Barrier Detection Using Sensor Data from Multiple Modes of Transportation with Data Augmentation. 667-675 - Yankan Yang, Baoqi Huang, Runze Yang:
An Energy Efficient Pedestrian Heading Estimation Algorithm using Smartphones. 676-684 - Alfredo Cuzzocrea, Enzo Mumolo, Marco Tessarotto:
Towards An Effective and Efficient Machine-Learning-Based Framework for Supporting Event Detection in Complex Environments. 685-689 - Tanvir Roushan, Riddhiman Adib, Nadiyah Johnson, Olawunmi George, Md Fitrat Hossain, Zeno Franco, Katinka Hooyer, Sheikh Iqbal Ahamed:
Towards Predicting Risky Behavior Among Veterans with PTSD by Analyzing Gesture Patterns. 690-695 - Li Tong, Ying Sha, May D. Wang:
Improving Classification of Breast Cancer by Utilizing the Image Pyramids of Whole-Slide Imaging and Multi-scale Convolutional Neural Networks. 696-703 - Maryam Farhadi, Hisham Haddad, Hossain Shahriar:
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements. 704-713 - Cleyton Rafael Gomes Silva, Cristhiane Gonçalves, Joyce Siqueira, Fabrízzio Alphonsus A. M. N. Soares, Rodrigo Albernaz Bezerra, Hedenir Monteiro Pinheiro, Ronaldo Martins da Costa, Eduardo Nery Rossi Camilo, Augusto Paranhos Junior:
Computer Vision Based Systems for Human Pupillary Behavior Evaluation: A Systematic Review of the Literature. 714-719 - Chihhsiong Shih, William Cheng-Chung Chu, You-Wei Chang:
The Causes Analysis of Ischemic Stroke Transformation into Hemorrhagic Stroke using PLS (partial Least Square)-GA and Swarm Algorithm. 720-729 - Chuanbo Wang, Ye Guo, Wei Chen, Zeyun Yu:
Fully Automatic Intervertebral Disc Segmentation Using Multimodal 3D U-Net. 730-739 - Swapna S. Gokhale:
Comparing Health Outcomes in San Francisco and Boston Metro Areas. 740-745 - Ruichao Gao, Xuebin Ma:
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning. 746-752 - Jianjun Zheng, Akbar Siami Namin:
Enforcing Optimal Moving Target Defense Policies. 753-759 - Md. Rafidul Islam, Md. Saiful Islam, Zakaria Ahmed, Anindya Iqbal, Rifat Shahriyar:
Automatic Detection of NoSQL Injection Using Supervised Learning. 760-769 - Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. 770-775 - Fumihiro Kanei, Daiki Chiba, Kunio Hato, Mitsuaki Akiyama:
Precise and Robust Detection of Advertising Fraud. 776-785 - Fadi Mohsen, Haadi Jafaarian:
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers. 786-794 - Yeong-Cheol Kim, Joon-Young Paik, Seokwoo Choi, Eun-Sun Cho:
Efficient SVM Based Packer Identification with Binary Diffing Measures. 795-800 - Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs. 801-810 - Zeyad A. Al-Odat, Samee Khan:
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions. 811-816 - Juan Wang, Karim Lounis, Mohammad Zulkernine:
CSKES: A Context-Based Secure Keyless Entry System. 817-822 - Emmanuel Bello-Ogunu, Mohamed Shehab, Md. Nazmus Sakib Miazi:
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management. 823-832 - Elena Lisova, Irfan Sljivo, Aida Causevic:
Safety and Security Co-Analyses: A Systematic Literature Review. 833 - Matthew Pike, Nasser Mustafa, Dave Towey, Vladimir Brusic:
Sensor Networks and Data Management in Healthcare: Emerging Technologies and New Challenges. 834-839 - Yanni Yang, Jiannong Cao, Xiulong Liu, Xuefeng Liu:
Multi-Breath: Separate Respiration Monitoring for Multiple Persons with UWB Radar. 840-849 - A. K. M. Jahangir Alam Majumder, Tanner M. McWhorter, Yezhou Ni, Hanqing Nie, Jacob Iarve, Donald R. Ucci:
sEmoD: A Personalized Emotion Detection Using a Smart Holistic E