


Остановите войну!
for scientists:


default search action
43rd COMPSAC 2019: Milwaukee, WI, USA - Volume 1
- Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 - Cong Wang, Le Kang, Renwei Zhang, Weiliang Yin:
Statically-Directed Assertion Recommendation for C Programs. 1-10 - Zuxing Gu, Jiecheng Wu, Jiaxiang Liu
, Min Zhou, Ming Gu:
An Empirical Study on API-Misuse Bugs in Open-Source C Programs. 11-20 - Junxiao Han, Shuiguang Deng
, Xin Xia, Dongjing Wang
, Jianwei Yin:
Characterization and Prediction of Popular Projects on GitHub. 21-26 - Lei Ai, Zhiqiu Huang, Weiwei Li, Yu Zhou, Yaoshen Yu:
SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation. 27-36 - Andrés Paz, Ghizlane El-Boussaidi:
Supporting Consistency in the Heterogeneous Design of Safety-Critical Software. 37-46 - Miao Zhang
, Jacky Keung
, Yan Xiao
, Md. Alamgir Kabir
, Shuo Feng
:
A Heuristic Approach to Break Cycles for the Class Integration Test Order Generation. 47-52 - Md. Alamgir Kabir
, Jacky W. Keung
, Kwabena Ebo Bennin, Miao Zhang
:
Assessing the Significant Impact of Concept Drift in Software Defect Prediction. 53-58 - Robert Ward, Carl K. Chang:
In Search of Scientific Agile. 59-65 - Yue Yuan, Han Anu, Wenchang Shi, Bin Liang, Bo Qin:
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components. 66-71 - Musaad Alzahrani, Saad Alqithami
, Austin Melton:
Using Client-Based Class Cohesion Metrics to Predict Class Maintainability. 72-80 - Chun Cao, Jing Deng, Ping Yu, Zhiyong Duan, Xiaoxing Ma:
ParaAim: Testing Android Applications Parallel at Activity Granularity. 81-90 - Salim Ali Khan Mohammad, Sathvik Vamshi Valepe, Subhrakanta Panda
, S. A. S. Rajita Bommakanti:
A Comparative Study of the Effectiveness of Meta-Heuristic Techniques in Pairwise Testing. 91-96 - Yanru Peng, Yuting Chen, Beijun Shen:
An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode Obfuscators. 97-106 - Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong
, Xiaolei Hou, Sihan Xu, Jing Xu:
AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. 107-116 - Devansh Tiwari, Hironori Washizaki, Yoshiaki Fukazawa, Tomoyuki Fukuoka, Junji Tamaki, Nobuhiro Hosotani, Munetaka Kohama:
Metrics Driven Architectural Analysis using Dependency Graphs for C Language Projects. 117-122 - Irfan Alahi, Mubassher Islam, Anindya Iqbal, Amiangshu Bosu
:
Identifying the Challenges of the Blockchain Community from StackExchange Topics and Trends. 123-128 - Wesley N. M. Torres, Everton L. G. Alves, Patrícia D. L. Machado:
An Empirical Study on the Spreading of Fault Revealing Test Cases in Prioritized Suites. 129-138 - Willian Marques Freire, Carlos Vinícius Bindewald, Aline Maria Malachini Miotto Amaral, Thelma Elita Colanzi:
Supporting Decision Makers in Search-Based Product Line Architecture Design using Clustering. 139-148 - Yufei Yang, Wenbo Luo, Yu Pei
, Minxue Pan, Tian Zhang:
Execution Enhanced Static Detection of Android Privacy Leakage Hidden by Dynamic Class Loading. 149-158 - Xing Hu, Rui Men, Ge Li, Zhi Jin:
Deep-AutoCoder: Learning to Complete Code Precisely with Induced Code Tokens. 159-168 - Biyun Zhu, Ruijie Meng, Zhenyu Zhang, W. K. Chan:
ConRS: A Requests Scheduling Framework for Increasing Concurrency Degree of Server Programs. 169-178 - Sushma Sakala, Vamshi Krishna Epuri, Samuel Sungmin Cho, Myoungkyu Song:
LAC: Locating and Applying Consistent and Repetitive Changes. 179-184 - Jiwei Xu, Yuewen Wu, Zhigang Lu, Tao Wang:
Dockerfile TF Smell Detection Based on Dynamic and Static Analysis Methods. 185-190 - Partha Chakraborty, Rifat Shahriyar, Anindya Iqbal:
Empirical Analysis of the Growth and Challenges of New Programming Languages. 191-196 - Tugkan Tuglular
, Mutlu Beyazit, Dilek Öztürk:
Featured Event Sequence Graphs for Model-Based Incremental Testing of Software Product Lines. 197-202 - Rumeng Shao, Hongyan Mao, Jinpeng Jiang:
Time-Aware and Location-Based Personalized Collaborative Recommendation for IoT Services. 203-208 - Sergio Segura, Dave Towey, Zhi Quan Zhou
, Tsong Yueh Chen
:
An Extended Abstract of "Metamorphic Testing: Testing the Untestable". 209-210 - Carl K. Chang:
Agile, Continuous Integration, and DevOps. 211 - Djananjay Pandit, Ajay Bansal:
A Declarative Approach for an Adaptive Framework for Learning in Online Courses. 212-215 - Alice Barana
, Marina Marchisio
, Sergio Rabellino
:
Empowering Engagement through Automatic Formative Assessment. 216-225 - Luca Cagliero
, Lorenzo Canale, Laura Farinetti:
VISA: A Supervised Approach to Indexing Video Lectures with Semantic Annotations. 226-235 - Pedro Maroco, João Cambeiro, Vasco Amaral:
A Mobile System to Increase Efficiency of the Lecturers when Preventing Academic Dishonesty During Written Exams. 236-241 - Henry C. B. Chan
, Hong Va Leong, Grace Ngai:
Study TOUR for Computer Science Students. 242-251 - Kalika Suksomboon, Zhishu Shen
, Kazuaki Ueda, Atsushi Tagami:
C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring Services. 252-257 - Yohei Hasegawa, Masato Uchida
:
Predicting Network Outages Based on Q-Drop in Optical Network. 258-263 - Yuuki Tsubouchi, Asato Wakisaka, Ken Hamada, Masayuki Matsuki, Hiroshi Abe, Ryosuke Matsumoto:
HeteroTSDB: An Extensible Time Series Database for Automatically Tiering on Heterogeneous Key-Value Stores. 264-269 - Ryosuke Matsumoto, Uchio Kondo, Kentaro Kuribayashi:
FastContainer: A Homeostatic System Architecture High-Speed Adapting Execution Environment Changes. 270-275 - Yuuichi Teranishi, Takashi Kimata, Eiji Kawai, Hiroaki Harai:
Hybrid Cellular-DTN for Vehicle Volume Data Collection in Rural Areas. 276-284 - Natsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Modeling Restrained Epidemic Routing on Complex Networks. 285-290 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:
Sparse Representation of Network Topology with K-SVD Algorithm. 291-298 - Ali R. Hurson, Hiroyuki Sato, Toyokazu Akiyama, Dan Lin:
Message from EATA Symposium Chairs. 299 - Bruno Konzen Stahl, Leonardo Pavanatto Soares
, Vicenzo Abichequer Sangalli, Pedro Costa Klein, Rafael Neujahr Copstein, Márcio Sarroglia Pinho
:
DirectFlow: A Robust Method for Ocular Torsion Measurement. 300-305 - Ricardo Silveira Rodrigues, Marcia Pasin, Alice J. Kozakevicius, Vinicius Monego:
Pothole Detection in Asphalt: An Automated Approach to Threshold Computation Based on the Haar Wavelet Transform. 306-315 - Xin Dong, Tong Li, Zhiming Ding:
An Ontology Enhanced User Profiling Algorithm Based on Application Feedback. 316-325 - Shintaro Ishihara, Satoshi Tanita, Toyokazu Akiyama:
A Dataflow Application Deployment Strategy for Hierarchical Networks. 326-335 - Edna Dias Canedo
, Rhandy Rafhael de Carvalho, Heloise Acco Tives Leão, Pedro Henrique Teixeira Costa, Márcio Vinicius Okimoto:
How the Academics Qualification Influence the Students Learning Development. 336-345 - Bo Hu, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi, Daniel Dalek, Ola Söderström, Kazuya Okada, Yuji Sekiya, Akihiro Nakao
:
Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification. 346-351 - Jing Sun, Huiqun Zhao, Sanwen Mu, Zimu Li:
Purchasing Behavior Analysis Based on Customer's Data Portrait Model. 352-357 - Jiahui Ren, Xian Xu, Zhihuan Yao, Huiqun Yu:
Recommender Systems Based on Autoencoder and Differential Privacy. 358-363 - Yuan Li, Kedian Mu:
Matrix Factorization Model with Dual Preferences for Rating Prediction. 364-372 - Sreyasee Das Bhattacharjee, William J. Tolone, Ashish Mahabal, Mohammed Elshambakey, Isaac Cho, S. George Djorgovski:
View-Adaptive Weighted Deep Transfer Learning for Distributed Time-Series Classification. 373-381 - Hong Xia, Mingdao Zhao, Yanping Chen, Zhongmin Wang, Zhong Yu, Jingwei Yang:
Multi-Source Heterogeneous Core Data Acquisition Method in Edge Computing Nodes. 382-385 - Chengfang Ma, Ying Sha, Jianlong Tan, Li Guo, Huailiang Peng:
Chinese Social Media Entity Linking Based on Effective Context with Topic Semantics. 386-395 - Otgonpurev Mendsaikhan
, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model. 396-401 - Ivan Luiz Salvadori, Alexis Huf
, Frank Siqueira:
Semantic Data-Driven Microservices. 402-410 - Mohit Ved, Rizwanahmed B:
Big Data Analytics in Telecommunication using State-of-the-art Big Data Framework in a Distributed Computing Environment: A Case Study. 411-416 - Karl Severin, Swapna S. Gokhale, Aldo Dagnino:
Keyword-Based Semi-Supervised Text Classification. 417-422 - Ishtiyaque Ahmad, Md Anwar Parvez, Anindya Iqbal:
TypoWriter: A Tool to Prevent Typosquatting. 423-432 - Mingyang Jiang, Tianqi Zhao:
Vehicle Travel Time Estimation by Sparse Trajectories. 433-442 - Morgan Gallant, Haruna Isah
, Farhana H. Zulkernine, Shahzad Khan:
Xu: An Automated Query Expansion and Optimization Tool. 443-452 - Yongyi Xian, Chuanfei Xu, Sameh Elnikety, Yan Liu:
Parallel Discovery of Trajectory Companions from Heterogeneous Streaming Data. 453-462 - Daniele Facinelli, Matteo Larcher, Davide Brunelli, Daniele Fontanelli:
Cooperative UAVs Gas Monitoring using Distributed Consensus. 463-468 - Christopher-Eyk Hrabia
, Patrick Marvin Lehmann, Sahin Albayrak
:
Increasing Self-Adaptation in a Hybrid Decision-Making and Planning System with Reinforcement Learning. 469-478 - Jérôme Leudet, François Christophe, Tommi Mikkonen
, Tomi Männistö
:
AILiveSim: An Extensible Virtual Environment for Training Autonomous Vehicles. 479-488 - Hassam Ullah Sheikh, Mina Razghandi, Ladislau Bölöni:
Learning Distributed Cooperative Policies for Security Games via Deep Reinforcement Learning. 489-494 - Lucas Leal, Andrea Ceccarelli
, Eliane Martins:
The SAMBA Approach for Self-Adaptive Model-Based Online Testing of Services Orchestrations. 495-500 - Yevgeniy Reznichenko, Enrico Prampolini, Abubakar Siddique, Henry Medeiros
, Francesca Odone:
Visual Tracking with Autoencoder-Based Maximum A Posteriori Data Fusion. 501-506 - Christian Meurisch, Zain Hamza, Bekir Bayrak, Max Mühlhäuser:
Enhanced Detection of Crisis-Related Microblogs by Spatiotemporal Feedback Loops. 507-512 - Christian Meurisch, Bekir Bayrak, Max Mühlhäuser:
AssistantGraph: An Approach for Reusable and Composable Data-Driven Assistant Components. 513-522 - Matthias Kern, Ferhat Erata
, Markus Iser, Carsten Sinz, Frédéric Loiret, Stefan Otten, Eric Sax:
Integrating Static Code Analysis Toolchains. 523-528 - Sorath Asnani
, Maria Giulia Canu, Bartolomeo Montrucchio:
Producing Green Computing Images to Optimize Power Consumption in OLED-Based Displays. 529-534 - Brian K. Ledbetter, Samuel Wehunt, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons. 535-544 - Timothy R. Weil:
Risk Assessment Methods for Cloud Computing Platforms. 545-547 - Amir Dabirian:
Employer Branding in the IT Industry: An Employer view. 548 - Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Walid Saad:
A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems. 549-558 - Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu:
Information Exposure (IEX): A New Class in the Bugs Framework (BF). 559-564 - Md Arabin Islam Talukder, Hossain Shahriar
, Kai Qian, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu:
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. 565-569 - Mohammad Ghazivakili, Claudio Demartini, Mauro Guerrera, Bartolomeo Montrucchio:
Open Source Fog Architecture for Industrial IoT Automation Based on Industrial Protocols. 570-578 - Marjan Sirjani, Giorgio Forcina, Ali Jafari, Stephan Baumgart, Ehsan Khamespanah, Ali Sedaghatbaf
:
An Actor-Based Design Platform for System of Systems. 579-587 - Congmiao Li, Jean-Luc Gaudiot:
Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters. 588-597 - Feng Ye, Songjie Zhu, Yuansheng Lou, Zihao Liu, Yong Chen, Qian Huang:
Research on Index Mechanism of HBase Based on Coprocessor for Sensor Data. 598-603 - Jakob Danielsson, Tiberiu Seceleanu, Marcus Jägemar, Moris Behnam, Mikael Sjödin:
Testing Performance-Isolation in Multi-core Systems. 604-609 - Tokio Takahashi, Masato Uchida
:
Optimal Hand Sign Selection Using Information Theory for Custom Sign-Based Communication. 610-615 - Fulvio Corno
, Luigi De Russis
, Luisa Fernanda Barrera-León:
Touch-Based Ontology Browsing on Tablets and Surfaces. 616-621 - Jun Wang, Eugene Yujun Fu
, Grace Ngai, Hong Va Leong:
Investigating Differences in Gaze and Typing Behavior Across Age Groups and Writing Genres. 622-629 - Piyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Alana McVey, Amy VanHecke, Sheikh Iqbal Ahamed:
Application of Reconstructed Phase Space in Autism Intervention. 630-637 - Joana Páris, João Cambeiro, Vasco Amaral, Armanda Rodrigues
:
Using Gamification to Motivate Occupants to Energy Efficiency in a Social Setting of a Building Automation System. 638-643 - Shameem Ahmed, M. Forhad Hossain, Kurt Price, Cody Pranger, Md Monsur Hossain, Moushumi Sharmin:
A Tale of the Social-Side of ASD. 644-652 - Riddhiman Adib
, Eyad Aldawod, Nathan Lang, Nina Lasswell, Shion Guha:
Analyzing Happiness: Investigation on Happy Moments using a Bag-of-Words Approach and Related Ethical Discussions. 653-662 - Labiblais Rahman
, Katsunori Oyama:
Long-Term Monitoring of NIRS Signals for Mental Health Assessment. 663-666 - Yuki Kurauchi, Naoto Abe, Hiroshi Konishi, Hitoshi Seshimo:
Barrier Detection Using Sensor Data from Multiple Modes of Transportation with Data Augmentation. 667-675 - Yankan Yang, Baoqi Huang, Runze Yang
:
An Energy Efficient Pedestrian Heading Estimation Algorithm using Smartphones. 676-684 - Alfredo Cuzzocrea, Enzo Mumolo, Marco Tessarotto:
Towards An Effective and Efficient Machine-Learning-Based Framework for Supporting Event Detection in Complex Environments. 685-689 - Tanvir Roushan, Riddhiman Adib
, Nadiyah Johnson, Olawunmi George, Md Fitrat Hossain, Zeno Franco, Katinka Hooyer, Sheikh Iqbal Ahamed:
Towards Predicting Risky Behavior Among Veterans with PTSD by Analyzing Gesture Patterns. 690-695 - Li Tong, Ying Sha, May D. Wang
:
Improving Classification of Breast Cancer by Utilizing the Image Pyramids of Whole-Slide Imaging and Multi-scale Convolutional Neural Networks. 696-703 - Maryam Farhadi, Hisham Haddad, Hossain Shahriar
:
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements. 704-713 - Cleyton Rafael Gomes Silva, Cristhiane Gonçalves, Joyce Siqueira
, Fabrízzio Alphonsus A. M. N. Soares, Rodrigo Albernaz Bezerra, Hedenir Monteiro Pinheiro, Ronaldo Martins da Costa, Eduardo Nery Rossi Camilo, Augusto Paranhos Junior:
Computer Vision Based Systems for Human Pupillary Behavior Evaluation: A Systematic Review of the Literature. 714-719 - Chihhsiong Shih, William Cheng-Chung Chu, You-Wei Chang:
The Causes Analysis of Ischemic Stroke Transformation into Hemorrhagic Stroke using PLS (partial Least Square)-GA and Swarm Algorithm. 720-729 - Chuanbo Wang, Ye Guo, Wei Chen, Zeyun Yu:
Fully Automatic Intervertebral Disc Segmentation Using Multimodal 3D U-Net. 730-739 - Swapna S. Gokhale:
Comparing Health Outcomes in San Francisco and Boston Metro Areas. 740-745 - Ruichao Gao, Xuebin Ma:
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning. 746-752 - Jianjun Zheng, Akbar Siami Namin:
Enforcing Optimal Moving Target Defense Policies. 753-759 - Md. Rafidul Islam, Md. Saiful Islam, Zakaria Ahmed, Anindya Iqbal, Rifat Shahriyar:
Automatic Detection of NoSQL Injection Using Supervised Learning. 760-769 - Naoki Fukushi, Daiki Chiba
, Mitsuaki Akiyama, Masato Uchida
:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. 770-775 - Fumihiro Kanei, Daiki Chiba
, Kunio Hato, Mitsuaki Akiyama:
Precise and Robust Detection of Advertising Fraud. 776-785 - Fadi Mohsen, Haadi Jafaarian:
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers. 786-794 - Yeong-Cheol Kim, Joon-Young Paik, Seokwoo Choi, Eun-Sun Cho:
Efficient SVM Based Packer Identification with Binary Diffing Measures. 795-800 - Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs. 801-810 - Zeyad A. Al-Odat, Samee Khan:
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions. 811-816 - Juan Wang, Karim Lounis, Mohammad Zulkernine:
CSKES: A Context-Based Secure Keyless Entry System. 817-822 - Emmanuel Bello-Ogunu, Mohamed Shehab, Md. Nazmus Sakib Miazi:
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management. 823-832 - Elena Lisova, Irfan Sljivo, Aida Causevic:
Safety and Security Co-Analyses: A Systematic Literature Review. 833 - Matthew Pike
, Nasser Mustafa, Dave Towey, Vladimir Brusic:
Sensor Networks and Data Management in Healthcare: Emerging Technologies and New Challenges. 834-839 - Yanni Yang, Jiannong Cao, Xiulong Liu, Xuefeng Liu:
Multi-Breath: Separate Respiration Monitoring for Multiple Persons with UWB Radar. 840-849 - A. K. M. Jahangir Alam Majumder, Tanner M. McWhorter, Yezhou Ni, Hanqing Nie, Jacob Iarve, Donald R. Ucci:
sEmoD: A Personalized Emotion Detection Using a Smart Holistic Embedded IoT System. 850-859 - Mathew L. Wymore, Daji Qiao:
RIVER-MAC: A Receiver-Initiated Asynchronously Duty-Cycled MAC Protocol for the Internet of Things. 860-869