


default search action
28th SAC 2013: Coimbra, Portugal
- Sung Y. Shin, José Carlos Maldonado:

Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013. ACM 2013, ISBN 978-1-4503-1656-9
Volume I: Artificial intelligence & agents, distributed systems, and information systems: advances in spatial and image-based information systems track
- Vinicius Sousa Fazio, Mauro Roisenberg:

Spatial interpolation: an analytical comparison between kriging and RBF networks. 2-7 - Jéssica Andressa de Souza, Humberto Luiz Razente

, Maria Camila Nardini Barioni
:
Faster construction of ball-partitioning-based metric access methods. 8-12 - Oliver Baltzer, Andrew Rau-Chaplin

, Norbert Zeh:
Building a scalable spatial OLAP system. 13-15
Volume I: Artificial intelligence & agents, distributed systems, and information systems: computational intelligence and video & image analysis track
- Paulo Rodrigo Cavalin, Marcelo N. Kapp

, Jefferson G. Martins
, Luiz E. Soares de Oliveira:
A multiple feature vector framework for forest species recognition. 16-20 - Ricardo M. Araújo, Gustavo Graña, Virginia O. Andersson

:
Towards skeleton biometric identification using the microsoft kinect sensor. 21-26 - Lucas Teixeira, Alberto Barbosa Raposo

, Marcelo Gattass:
Indoor localization using SLAM in parallel with a natural marker detector. 27-33 - Pablo V. A. Barros

, Nestor T. M. Junior, Juvenal M. M. Bisneto, Bruno J. T. Fernandes
, Byron L. D. Bezerra
, Sérgio M. M. Fernandes:
Convexity local contour sequences for gesture recognition. 34-39 - Jeremy Porter, Dirk V. Arnold

:
An evolutionary spline fitting algorithm for identifying filamentous cyanobacteria. 40-45 - Renata C. B. Madeo, Clodoaldo Ap. M. Lima

, Sarajane Marques Peres
:
Gesture unit segmentation using support vector machines: segmenting gestures from rest positions. 46-52 - Priscila T. M. Saito

, Pedro J. de Rezende, Alexandre X. Falcão
, Celso T. N. Suzuki
, Jancarlo F. Gomes
:
A data reduction and organization approach for efficient image annotation. 53-57
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cooperative multi-agent systems and applications track
- Der-Yeuan Yu, Ettore Ferranti, Hadeli Hadeli:

An intelligent building that listens to your needs. 58-63 - Micael S. Couceiro

, David Portugal
, Rui P. Rocha
:
A collective robotic architecture in search and rescue scenarios. 64-69 - Charles Pippin, Henrik I. Christensen

, Lora Weiss:
Performance based task assignment in multi-robot patrolling. 70-76 - Shigeo Nakamura, Hiroyuki Nakagawa

, Yasuyuki Tahara, Akihiko Ohsuga:
Towards solving an obstacle problem by the cooperation of UAVs and UGVs. 77-82 - Cédric Grueau

, João Araújo
:
Towards a domain specific modeling language for agent-based models in land use science. 83-85
Volume I: Artificial intelligence & agents, distributed systems, and information systems: constraint solving and programming track
- Javier Larrosa, Emma Rollon

:
Risk-neutral bounded max-sum for distributed constraint optimization. 92-97 - Hiep Nguyen, Thomas Schiex, Christian Bessiere:

Dynamic virtual arc consistency. 98-103 - Michaël Larouche, Alexandre Blondin Massé, Sébastien Gaboury

, Sylvain Hallé
:
Solving equations on words through boolean satisfiability. 104-106
Volume I: Artificial intelligence & agents, distributed systems, and information systems: data mining track
- Andreas Maunz, David Vorgrimmler, Christoph Helma:

Out-of-bag discriminative graph mining. 109-114 - Leonidas Akritidis

, Panayiotis Bozanis:
A supervised machine learning classification algorithm for research articles. 115-120 - Sabbir Ahmed, Christie I. Ezeife:

Discovering influential nodes from trust network. 121-128 - Andreas Hapfelmeier, Jana Schmidt, Stefan Kramer:

Incremental linear model trees on massive datasets: keep it simple, keep it fast. 129-135 - Madeleine Seeland, Stefan Kramer, Bernhard Pfahringer:

Model selection based product kernel learning for regression on graphs. 136-143 - Fereshte Khani, Mohammad Javad Hosseini, Ahmad Ali Abin, Hamid Beigy

:
An algorithm for discovering clusters of different densities or shapes in noisy data sets. 144-149 - Robson Motta, Alneu de Andrade Lopes, Bruno M. Nogueira

, Solange Oliveira Rezende
, Alípio Mário Jorge
, Maria Cristina Ferreira de Oliveira
:
Comparing relational and non-relational algorithms for clustering propositional data. 150-155 - Paolo Serafino:

Speeding up graph clustering via modular decomposition based compression. 156-163 - Philippe Fournier-Viger

, Vincent S. Tseng:
TNS: mining top-k non-redundant sequential rules. 164-166 - Mathieu Blondel, Kazuhiro Seki, Kuniaki Uehara:

Learning non-linear classifiers with a sparsity constraint using L1 regularization. 167-169 - Josep Lluis Berral

, Ricard Gavaldà
, Jordi Torres
:
Empowering automatic data-center management with machine learning. 170-172 - Juan J. Cameron, Alfredo Cuzzocrea

, Carson Kai-Sang Leung
:
Stream mining of frequent sets with limited memory. 173-175
Volume I: Artificial intelligence & agents, distributed systems, and information systems: evolutionary computing track
- Marco Gaudesi, Andrea Marion, Tommaso Musner, Giovanni Squillero

, Alberto Paolo Tonda
:
Evolutionary optimization of wetlands design. 176-181 - Jinhyun Kim, Byung-Ro Moon:

Disguised malware script detection system using hybrid genetic algorithm. 182-187 - Vinícius Veloso de Melo, Grazieli Luiza Costa Carosio:

Automatic generation of evolutionary operators: a study with mutation strategies for the differential evolution. 188-193 - Pablo Rabanal

, Ismael Rodríguez
:
Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems. 194-199 - Claudio Fabiano Motta Toledo, Márcio da Silva Arantes, Renato Resende Ribeiro de Oliveira, Alexandre C. B. Delbem

:
A hybrid compact genetic algorithm applied to the multi-level capacitated lot sizing problem. 200-205 - Estevão Costa, Fábio Fabris, Alexandre Rodrigues Loureiros, Hannu Ahonen, Flávio Miguel Varejão:

Optimization metaheuristics for minimizing variance in a real-world statistical application. 206-207 - Ladjel Bellatreche, Rima Bouchakri, Alfredo Cuzzocrea

, Sofian Maabout:
Horizontal partitioning of very-large data warehouses under dynamically-changing query workloads via incremental algorithms. 208-210
Volume I: Artificial intelligence & agents, distributed systems, and information systems: intelligent robotics systems track
- Zhaoxia Peng, Guoguang Wen, Ahmed Rahmani:

Leader-follower formation control of multiple nonholonomic robots based on backstepping. 211-216 - José-Luis Blanco

, Javier Gonzalez Monroy
, Achim J. Lilienthal
, Javier González Jiménez:
A Kalman filter based approach to probabilistic gas distribution mapping. 217-222 - Lucas Bueno Ruas de Oliveira, Fernando Santos Osório

, Elisa Yumi Nakagawa
:
An investigation into the development of service-oriented robotic systems. 223-228 - Bharath Kalyan, Mandar A. Chitre

:
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles. 229-231 - Paulo Jorge Sequeira Gonçalves

, Pedro M. B. Torres
, Jorge Manuel Mateus Martins
:
Towards a software tool for ultrasound guided robotic hip resurfacing surgery. 232-234 - Caio César Teodoro Mendes, Denis Fernando Wolf:

Real time autonomous navigation and obstacle avoidance using a semi-global stereo method. 235-236
Volume I: Artificial intelligence & agents, distributed systems, and information systems: recommender systems: theory and applications track
- Wei Zeng, Li Chen

:
Heterogeneous data fusion via matrix factorization for augmenting item, group and friend recommendations. 237-244 - Henry Blanco

, Francesco Ricci
:
Inferring user utility for query revision recommendation. 245-252 - Lior Rokach, Guy Shani

, Bracha Shapira
, Eyal Chapnik, Gali Siboni:
Recommending insurance riders. 253-260 - Xihui Chen, Jun Pang, Ran Xue:

Constructing and comparing user mobility profiles for location-based services. 261-266 - Chongsheng Zhang, Yuan Hao, Mirjana Mazuran, Carlo Zaniolo, Hamid Mousavi, Florent Masseglia:

Mining frequent itemsets over tuple-evolving data streams. 267-274 - Andreas Lommatzsch, Benjamin Kille

, Sahin Albayrak
:
Learning hybrid recommender models for heterogeneous semantic data. 275-276 - Shahab Mokarizadeh, Nima Dokoohaki

, Mihhail Matskin, Ramona Bunea:
Enhancing social matrix factorization with privacy. 277-278 - Lin Chen, Richi Nayak

, Sangeetha Kutty
, Yue Xu
:
Users segmentations for recommendation. 279-280
Volume I: Artificial intelligence & agents, distributed systems, and information systems: the semantic web and applications track
- Patrick Chan, Yoshinori Hijikata, Shogo Nishida:

Computing semantic relatedness using word frequency and layout information of Wikipedia. 282-287 - Christos Makris

, Yannis Plegas, Evangelos Theodoridis:
Improved text annotation with Wikipedia entities. 288-295 - Michel Capelle, Frederik Hogenboom, Alexander Hogenboom, Flavius Frasincar

:
Semantic news recommendation using wordnet and bing similarities. 296-302 - Iker Larizgoitia, Ioan Toma

, Arturo Beltrán, Alejandro Llaves, Patrick Maué:
Environmental service discovery based on semantically annotated OGC service descriptions. 303-310 - Monalessa Perini Barcellos

, Ricardo de Almeida Falbo:
A software measurement task ontology. 311-318 - Éric Leclercq

, Marinette Savonnet:
Enhancing scientific information systems with semantic annotations. 319-324 - Shahab Mokarizadeh, Peep Küngas, Mihhail Matskin:

Ontology acquisition from web service descriptions. 325-332 - Pasquale Minervini

, Nicola Fanizzi
, Claudia d'Amato
, Floriana Esposito
:
Rank prediction for semantically annotated resources. 333-338 - Lívia Ruback

, Marcia Lucas Pesce, Sofia Manso, Sérgio Ortiga, Percy Enrique Rivera Salas, Marco A. Casanova
:
A mediator for statistical linked data. 339-341
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cloud computing track
- Sven Groot, Kazuo Goda, Daisaku Yokoyama, Miyuki Nakano, Masaru Kitsuregawa:

Modeling I/O interference for data intensive distributed applications. 343-350 - Matthias Steinbauer, Ismail Khalil, Gabriele Kotsis

:
Building an on-demand virtual computing market in non-commercial communities. 351-356 - José Simão

, Luís Veiga
:
A progress and profile-driven cloud-VM for resource-efficiency and fairness in e-science environments. 357-362 - Leonardo Aniello, Leonardo Querzoni

, Roberto Baldoni:
Input data organization for batch processing in time window based computations. 363-370 - Zhen Ye

, Shanping Li, Xiaozhen Zhou:
GCplace: geo-cloud based correlation aware data replica placement. 371-376 - Abdelmounaam Rezgui, Zaki Malik

, Chaowei Yang
:
High-resolution spatial interpolation on cloud platforms. 377-382 - Maciej Zaremba, Sami Bhiri

, Tomas Vitvar
, Manfred Hauswirth:
Matchmaking of IaaS cloud computing offers leveraging linked data. 383-388 - Ashish Agrawal, T. V. Prabhakar:

Hospitality of cloud platforms. 389-396 - Diego Perez-Palacin, Radu Calinescu

, José Merseguer
:
log2cloud: log-based prediction of cost-performance trade-offs for cloud deployments. 397-404 - Hiroaki Shikano, Machiko Asaie, Junji Yamamoto, Tatsuya Saito, Shunsuke Ota, Keitaro Uehara:

Study on supporting technology for operational procedure design of IT systems in cloud-era datacenters. 405-407 - Kiril Schröder, Wolfgang Nebel:

Inter cloud capable dynamic resource management with model of behavior. 408-410 - Yousri Kouki, Thomas Ledoux

:
SCAling: SLA-driven cloud auto-scaling. 411-414
Volume I: Artificial intelligence & agents, distributed systems, and information systems: dependable and adaptive distributed systems track
- Lucas Provensi, Frank Eliassen, Roman Vitenberg, Romain Rouvoy

:
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming. 415-422 - Mouna Allani, Benoît Garbinato

, Peter R. Pietzuch
:
Hyphen: a hybrid protocol for generic overlay construction in P2P environments. 423-430 - Rolando Martins

, Luís M. B. Lopes, Fernando M. A. Silva
, Priya Narasimhan:
Stheno, a real-time fault-tolerant P2P middleware platform for light-train systems. 431-438 - Narasimha Raghavan Veeraragavan, Leonardo Montecchi

, Nicola Nostro
, Andrea Bondavalli
, Roman Vitenberg, Hein Meling:
Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis. 439-446 - Minyoung Kim, Ashish Gehani, Je-Min Kim, Dawood Tariq, Mark-Oliver Stehr, Jin-Soo Kim:

Maximizing availability of content in disruptive environments by cross-layer optimization. 447-454 - Alexander Tomic, Daniele Sciascia, Fernando Pedone

:
MoSQL: an elastic storage engine for MySQL. 455-462 - Yu Jia, Ivan Brondino, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Dianfu Ma:

A multi-resource load balancing algorithm for cloud cache systems. 463-470 - João Paulo Magalhães

, Luís Moura Silva:
Adaptive monitoring of web-based applications: a performance study. 471-478 - José Pedro Oliveira, José Pereira:

Experience with a middleware infrastructure for service oriented financial applications. 479-484 - Christian Inzinger

, Waldemar Hummer, Benjamin Satzger, Philipp Leitner, Schahram Dustdar
:
Identifying incompatible service implementations using pooled decision trees. 485-492 - Ana Nunes Alonso

, José Pereira
:
Improving transaction abort rates without compromising throughput through judicious scheduling. 493-494 - Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam:

Towards a ranking framework for software components. 495-498
Volume I: Artificial intelligence & agents, distributed systems, and information systems: mobile computing and applications track
- Nan Zhong, Florian Michahelles:

Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market. 499-504 - Li-Yu Tang, Pi-Cheng Hsiu

, Jiun-Long Huang, Ming-Syan Chen
:
iLauncher: an intelligent launcher for mobile apps based on individual usage patterns. 505-512 - A. K. M. Jahangir Alam Majumder, Farzana Rahman, Ishmat Zerin, William Joseph Ebel Jr., Sheikh Iqbal Ahamed:

iPrevention: towards a novel real-time smartphone-based fall prevention system. 513-518 - Balajee Kannan, Felipe Meneguzzi

, M. Bernardine Dias
, Katia P. Sycara
:
Predictive indoor navigation using commercial smart-phones. 519-525 - Henning Heitkötter, Tim A. Majchrzak, Herbert Kuchen:

Cross-platform model-driven development of mobile applications with md2. 526-533 - Marcio E. F. Maia, Rômulo Gadelha, André Fonteles, Benedito J. A. Neto, Windson Viana

, Rossana M. C. Andrade
:
LOCCAM - loosely coupled context acquisition middleware. 534-541 - Sven Groppe

, Björn Schütt, Stefan Werner:
Eliminating the XML overhead in embedded XML languages. 542-547 - Rui Lima

, Carlos Baquero
, Hugo Miranda
:
Broadcast cancellation in search mechanisms. 548-553 - José Everardo Bessa Maia, Angelo Brayner

:
Sensor-field modeling based on in-network data prediction: an efficient strategy for answering complex queries in wireless sensor networks. 554-559 - Hicham Lakhlef, Hakim Mabed, Julien Bourgeois

:
Distributed and efficient algorithm for self-reconfiguration of MEMS microrobots. 560-566 - Rohan Banerjee, Aniruddha Sinha

, Arindam Saha:
Participatory sensing based traffic condition monitoring using horn detection. 567-569 - Sangho Yi, Jaehyuck Shin, Yoonkyong Lee, Hyun-Jin Choi:

Towards a total recall: an activity tracking and recall mechanism for mobile devices. 570-572 - Vinay Bheemesh, Parag Kulkarni, Fengming Cao, Zhong Fan:

Radio resource management in coordinated antenna system deployments. 573-576
Volume I: Artificial intelligence & agents, distributed systems, and information systems: networking track
- Reza Hassanzadeh, Richi Nayak

:
A semi-supervised graph-based algorithm for detecting outliers in online-social-networks. 577-582 - Torsten Braun

, Andreas Mauthe
, Vasilios A. Siris
:
Service-centric networking extensions. 583-590 - Miguel Branco, João Leitão

, Luís E. T. Rodrigues:
Bounded gossip: a gossip protocol for large-scale datacenters. 591-596 - Rodrigo Ruas Oliveira, Leonardo Richter Bays

, Daniel S. Marcon, Miguel C. Neves, Luciana Salete Buriol, Luciano Paschoal Gaspary, Marinho P. Barcellos:
DoS-resilient virtual networks through multipath embedding and opportunistic recovery. 597-602 - Dmitriy Kuptsov, Boris Nechaev, Andrei V. Gurtov

, Andrey Lukyanenko:
A novel demand-aware fairness metric for IEEE 802.11 wireless networks. 603-610 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:

A delivery method considering communication loads for sensor data stream with different collection cycles. 611-618 - João Vasques, Luís Veiga

:
A decentralized utility-based grid scheduling algorithm. 619-624 - Glauco Estácio Gonçalves

, Patricia Takako Endo
, André Vitor de Almeida Palhares, Marcelo Anderson Santos, Judith Kelner, Djamel Sadok:
On the load balancing of virtual networks in distributed clouds. 625-631 - Eduardo Feo Flushing, Gianni A. Di Caro

:
A flow-based optimization model for throughput-oriented relay node placement in wireless sensor networks. 632-639 - Igo Moura, Felipe Mazullo, José Maranhão Neto, André Soares

:
ABOI: a novel strategy to mitigate the blocking due to outdated information in OCS/OBS network. 640-645 - Ilya Nikolaevskiy, Andrey Lukyanenko, Tatiana Polishchuk, Valentin Polishchuk, Andrei V. Gurtov

:
isBF: scalable in-packet bloom filter based multicast. 646-648 - Giang Ngo Hoang, Luigi Liquori

, Vincenzo Ciancaglini, Petar Maksimovic
, Hung Nguyen Chan:
A backward-compatible protocol for inter-routing over heterogeneous overlay networks. 649-651
Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grids and smart technologies track
- Tassos Dimitriou, Ghassan Karame:

Privacy-friendly tasking and trading of energy in smart grids. 652-659 - Jonas Wäfler, Poul E. Heegaard

:
A combined structural and dynamic modelling approach for dependability analysis in smart grid. 660-665 - Ognjen Vukovic, György Dán:

On the security of distributed power system state estimation under targeted attacks. 666-672 - Dejan Ilic, Per Goncalves da Silva, Stamatis Karnouskos

, Malte Jacobi:
Impact assessment of smart meter grouping on the accuracy of forecasting algorithms. 673-679 - Nihan Çiçek, Hakan Deliç:

Demand response computation for future smart grids incorporating wind power. 680-685 - Hwantae Kim, Wonkyun Park, Hwangnam Kim:

Towards cosimulating network and electrical systems for performance evaluation in smart grid. 686-687 - Murat Ahat, Soufian Ben Amor, Alain Bui:

Modeling fundamentals for smart grid enabled ecodistricts. 688-689 - Sebastian Meiling, Till Steinbach, Thomas C. Schmidt

, Matthias Wählisch
:
A scalable communication infrastructure for smart grid applications using multicast over public networks. 690-694
Volume I: Artificial intelligence & agents, distributed systems, and information systems: web technologies track
- Raúl Peña-Ortiz

, José A. Gil
, Julio Sahuquillo
, Ana Pont
:
The impact of user-browser interaction on web performance. 695-702 - Alexander Hogenboom, Daniella Bal, Flavius Frasincar

, Malissa Bal, Franciska de Jong, Uzay Kaymak
:
Exploiting emoticons in sentiment analysis. 703-710 - John Lyle, Claes Nilsson, Anders Isberg, Shamal Faily:

Extending the web to support personal network services. 711-716 - Marnix de Bakker, Damir Vandic, Flavius Frasincar

, Uzay Kaymak:
Model words-driven approaches for duplicate detection on the web. 717-723 - Helen Costa

, Fabrício Benevenuto
, Luiz Henrique de Campos Merschmann
:
Detecting tip spam in location-based social networks. 724-729 - Ombretta Gaggi:

Discovering local attractions from geo-tagged photos. 730-735 - Patrick Gaubatz, Uwe Zdun:

Supporting entailment constraints in the context of collaborative web applications. 736-741 - Christoph Herzog, Iraklis Kordomatis, Wolfgang Holzinger, Ruslan R. Fayzrakhmanov, Bernhard Krüpl-Sypien:

Feature-based object identification for web automation. 742-749 - Wenbin Li

, Youakim Badr
, Frédérique Biennier:
Service farming: an ad-hoc and QoS-aware web service composition approach. 750-756 - Anna-Liisa Mattila, Tommi Mikkonen:

Designing a 3D widget library for WebGL enabled browsers. 757-760 - Fabrizio Montesi

:
Process-aware web programming with Jolie. 761-763
Volume I: Artificial intelligence & agents, distributed systems, and information systems: cooperative systems track
- Rafael Leonardo Vivian, Elisa Hatsue Moriya Huzita, Gislaine Camila Lapasini Leal

:
Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approach. 765-770 - Leila Abidi, Jean-Christophe Dubacq, Christophe Cérin, Mohamed Jemni

:
A publication-subscription interaction schema for desktop grid computing. 771-778 - Szu-Yin Lin, Kuo-Ming Chao

, Chi-Chun Lo, Nick Godwin:
Distributed dynamic data driven prediction based on reinforcement learning approach. 779-784 - Riccardo Cognini, Damiano Falcioni, Andrea Polini

, Alberto Polzonetti, Barbara Re
:
HawkEye: a tool for collaborative business process modelling and verification. 785-786
Volume I: Artificial intelligence & agents, distributed systems, and information systems: data streams track
- Masafumi Oyamada, Hideyuki Kawashima, Hiroyuki Kitagawa

:
Continuous query processing with concurrency control: reading updatable resources consistently. 788-794 - Elaine R. Faria

, João Gama
, André C. P. L. F. de Carvalho
:
Novelty detection algorithm for data streams multi-class problems. 795-800 - Albert Bifet

, Bernhard Pfahringer, Jesse Read, Geoff Holmes:
Efficient data stream classification via probabilistic adaptive windows. 801-806 - Mar Callau-Zori, Ricardo Jiménez-Peris, Vincenzo Gulisano

, Marina Papatriantafilou
, Zhang Fu, Marta Patiño-Martínez
:
STONE: a stream-based DDoS defense framework. 807-812 - Ezilda Almeida, Petr Kosina

, João Gama
:
Random rules from data streams. 813-814 - Ameneh Gholipour, Mohammad Javad Hosseini, Hamid Beigy

:
An adaptive regression tree for non-stationary data streams. 815-817
Volume I: Artificial intelligence & agents, distributed systems, and information systems: database theory, technology and applications track
- Emmanouil Valsomatzis, Anastasios Gounaris:

Driver input selection for main-memory multi-way joins. 818-825 - Anastasia Theodouli, Anastasios Gounaris:

Adaptive memory-aware chunk sizing techniques for data-intensive queries over web services. 826-831 - Luís Leitão, Pável Calado

:
Efficient XML duplicate detection using an adaptive two-level optimization. 832-837 - Raju Halder

, Agostino Cortesi
:
Abstract program slicing of database query languages. 838-845 - Anupam Bhattacharjee, Hasan M. Jamil

:
CodeBlast: a two-stage algorithm for improved program similarity matching in large software repositories. 846-852 - Scibor Sobieski

, Bartosz Zielinski
:
Using maude rewriting system to modularize and extend SQL. 853-858 - Kazuma Horie, Nobutaka Suzuki:

Extracting differences between regular tree grammars. 859-864 - Giuseppe Burtini, Scott Fazackerley, Ramon Lawrence:

Reducing data transfer for charts on adaptive web sites. 865-867 - Joshua Amavi, Mirian Halfeld Ferrari Alves

:
Filtering XFD toward interoperability. 868-871
Volume I: Artificial intelligence & agents, distributed systems, and information systems: information access and retrieval track
- Luis M. de Campos

, Juan M. Fernández-Luna
, Juan F. Huete
, Eduardo Vicente-López:
XML search personalization strategies using query expansion, reranking and a search engine modification. 872-877 - Kosetsu Tsukuda, Hiroaki Ohshima

, Mitsuo Yamamoto, Hirotoshi Iwasaki, Katsumi Tanaka:
Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships. 878-885 - Yannis Plegas, Sofia Stamou:

Reducing information redundancy in search results. 886-893 - Kazutoshi Umemoto, Takehiro Yamamoto, Satoshi Nakamura

, Katsumi Tanaka:
Predicting query reformulation type from user behavior. 894-901 - Gustavo Laboreiro, Matko Bosnjak, Luís Sarmento, Eduarda Mendes Rodrigues, Eugénio C. Oliveira

:
Determining language variant in microblog messages. 902-907 - Marcelo Garcia Manzato:

gSVD++: supporting implicit feedback on recommender systems with metadata awareness. 908-913 - Firas Damak, Karen Pinel-Sauvagnat

, Mohand Boughanem, Guillaume Cabanac
:
Effectiveness of state-of-the-art features for microblog search. 914-919 - Sabrina Senatore

, Gabriella Pasi
:
Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysis. 920-926 - Ajitesh Srivastava, Axel J. Soto

, Evangelos E. Milios
:
Text clustering using one-mode projection of document-word bipartite graphs. 927-932 - Diego Ceccarelli, Sergiu Gordea, Claudio Lucchese

, Franco Maria Nardini
, Raffaele Perego
:
When entities meet query recommender systems: semantic search shortcuts. 933-938 - Jacques Savoy:

Feature selections for authorship attribution. 939-941 - Rodrigo Campiolo

, Luiz Arthur F. Santos, Daniel Macêdo Batista, Marco Aurélio Gerosa:
Evaluating the utilization of Twitter messages as a source of security alerts. 942-943 - Daniel Abril, Guillermo Navarro-Arribas

, Vicenç Torra
:
Towards a private vector space model for confidential documents. 944-945
Volume I: Artificial intelligence & agents, distributed systems, and information systems: multimedia and visualization track
- José Fernando Rodrigues Jr., Carlos E. Cirilo, Antônio Francisco do Prado, Luciana A. M. Zaina

:
Hierarchical visual filtering, pragmatic and epistemic actions for database visualization. 946-952 - Juliano Franz

, Anderson Maciel
, Luciana Porcher Nedel
:
Assessment of a user centered interface for teleoperation and 3D environments. 953-960 - Tamires Tessarolli de Souza, Rudinei Goularte

:
Video shot representation based on histograms. 961-966 - Diogo de Carvalho Pedrosa, Rodrigo Laiola Guimarães, Maria da Graça Campos Pimentel, Dick C. A. Bulterman, Pablo César

:
Interactive coffee table for exploration of personal photos and videos. 967-974 - Rafael Brandão, Paulo França, Adriano Medeiros, Felipe Albuquerque Portella

, Renato Cerqueira:
The CAS project: a general infrastructure for pervasive capture and access systems. 975-980 - Roger Immich

, Eduardo Cerqueira, Marília Curado
:
Adaptive video-aware FEC-based mechanism with unequal error protection scheme. 981-988 - Henry Braun, Vinícius Jurinic Cassol, Rafael Hocevar, Fernando Pinho Marson

, Soraia Raupp Musse
:
CrowdVis: a framework for real time crowd visualization. 989-995 - Aki Hayashi, Takayuki Itoh, Satoshi Nakamura

:
A visual analytics tool for system logs adopting variable recommendation and feature-based filtering. 996-998
Volume II: Software development and system software & security: software engineering track
- Bixin Li, Qiandong Zhang, Xiaobing Sun

, Hareton Leung
:
WAVE-CIA: a novel CIA approach based on call graph mining. 1000-1005 - Fernando J. Barros

:
Representing dynamic pluggable software units. 1006-1012 - Mohammad Alitavoli, Mahdi Joafshani, Aida Erfanian:

A novel watermarking method for Java programs. 1013-1018 - Shaowei Wang, David Lo

, Lingxiao Jiang
:
An empirical study on developer interactions in StackOverflow. 1019-1024 - Katerina Megas, Gabriella Belli, William B. Frakes, Julián Urbano, Reghu Anguswamy:

A study of COTS integration projects: product characteristics, organization, and life cycle models. 1025-1030 - Alcemir Rodrigues Santos, Felipe Nunes Gaia, Eduardo Figueiredo, Pedro de Alcântara dos Santos Neto, João Araújo

:
Test-based SPL extraction: an exploratory study. 1031-1036 - Mirko Perkusich

, Hyggo Oliveira de Almeida
, Angelo Perkusich
:
A model to detect problems on scrum-based software development projects. 1037-1042 - Dennis Westermann, Jens Happe, Roozbeh Farahbod:

An experiment specification language for goal-driven, automated performance evaluations. 1043-1048 - Rubing Huang

, Xiaodong Xie, Jinfu Chen, Yansheng Lu:
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms. 1049-1054 - Afef Jmal Maâlej, Moez Krichen, Mohamed Jmaiel:

WSCCT: a tool for WS-BPEL compositions conformance testing. 1055-1061 - Awny Alnusair, Tian Zhao, Gongjun Yan:

Automatic recognition of design motifs using semantic conditions. 1062-1067 - Humberto Marques-Neto

, Gladston J. Aparecido, Marco Túlio Valente
:
A quantitative approach for evaluating software maintenance services. 1068-1073 - Wei Sun, Zebao Gao, Weiran Yang, Chunrong Fang

, Zhenyu Chen:
Multi-objective test case prioritization for GUI applications. 1074-1079 - Rafael Serapilha Durelli, Daniel S. M. Santibáñez

, Nicolas Anquetil
, Márcio Eduardo Delamaro, Valter Vieira de Camargo:
A systematic review on mining techniques for crosscutting concerns. 1080-1087 - Tao Zhang

, Byungjeong Lee:
A hybrid bug triage algorithm for developer recommendation. 1088-1094 - Yoann Laurent, Reda Bendraou

, Marie-Pierre Gervais:
Executing and debugging UML models: an fUML extension. 1095-1102 - Kenneth W. K. Lo

, Will W. W. Tang, Grace Ngai
, Alvin T. S. Chan, Hong Va Leong
, Stephen C. F. Chan
:
i*Chameleon: a platform for developing multimodal application with comprehensive development cycle. 1103-1108 - Márcio P. Basgalupp

, Rodrigo C. Barros
, Tiago Silva da Silva, André C. P. L. F. de Carvalho
:
Software effort prediction: a hyper-heuristic decision-tree based approach. 1109-1116 - Asmaa Abdallah, Riham Hassan, Mostafa Abdel Azim:

Quantified extreme scenario based design approach. 1117-1122 - Minhaz F. Zibran, Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider

:
Evaluating the conventional wisdom in clone removal: a genealogy-based empirical study. 1123-1130 - Umme Hunny, Mohammad Zulkernine, Komminist Weldemariam:

OSDC: adapting ODC for developing more secure software. 1131-1136 - Jesper Pedersen Notander, Per Runeson

, Martin Höst
:
A model-based framework for flexible safety-critical software development: a design study. 1137-1144 - Laurent Wouters, Marie-Pierre Gervais:

Notation-driven vs metamodel-driven development of domain-specific modeling languages: an empirical study. 1145-1146 - Wagner Gonçalves Ferreira, Humberto Torres Marques-Neto

:
Estimating the size of data mart projects. 1147-1148
Volume II: Software development and system software & security: software engineering aspects of green computing track
- Ingolf Waßmann, Daniel Versick, Djamshid Tavangarian:

Energy consumption estimation of virtual machines. 1151-1156 - Rémi Druilhe, Matthieu Anne, Jacques Pulou, Laurence Duchien, Lionel Seinturier:

Energy-driven consolidation in digital home. 1157-1162 - Silvana Teodoro, Andriele Busatto do Carmo, Luiz Gustavo Fernandes

:
Energy efficiency management in computational grids through energy-aware scheduling. 1163-1168 - Nidhi Singh, Shrisha Rao

:
Meta-learning based architectural and algorithmic optimization for achieving green-ness in predictive workload analytics. 1169-1176 - Claas Wilke, Christian Piechnick, Sebastian Richly, Georg Püschel, Sebastian Götz, Uwe Aßmann

:
Comparing mobile applications' energy consumption. 1177-1179 - Steven te Brinke, Somayeh Malakuti, Christoph Bockisch, Lodewijk Bergmans, Mehmet Aksit:

A design method for modular energy-aware software. 1180-1182 - Birgit Penzenstadler

:
Towards a definition of sustainability in and for software engineering. 1183-1185
Volume II: Software development and system software & security: software verification and testing track
- Patrick Heckeler, Bastian Schlich, Thomas Kropf

:
Accelerated robustness testing of state-based components using reverse execution. 1188-1195 - Hana Chockler, Alexander Ivrii, Arie Matsliah, Simone Fulvio Rollini, Natasha Sharygina

:
Using cross-entropy for satisfiability. 1196-1203 - Liqian Chen, Renjian Li, Xueguang Wu, Ji Wang:

Static analysis of list-manipulating programs via bit-vectors and numerical abstractions. 1204-1210 - Carlo A. Furia, Bertrand Meyer, Manuel Oriol, Andrey Tikhomirov, Yi Wei:

The search for the laws of automatic random testing. 1211-1216 - Gustavo Carvalho, Diogo Falcão, Flávia A. Barros, Augusto Sampaio, Alexandre Mota, Leonardo Motta, Mark R. Blackburn:

Test case generation from natural language requirements based on SCR specifications. 1217-1222 - Mike Papadakis

, Yves Le Traon
:
Mutation testing strategies using mutant classification. 1223-1229 - Mickaël Delahaye, Nikolai Kosmatov

, Julien Signoles
:
Common specification language for static and dynamic analysis of C programs. 1230-1235 - Sosuke Moriguchi

, Takuo Watanabe
:
An interactive extension mechanism for reusing verified programs. 1236-1243
Volume II: Software development and system software & security: requirements engineering track
- João Araújo

, Miguel Goulão
, Ana Moreira
, Inês Simão, Vasco Amaral
, Elisa L. A. Baniassad:
Advanced modularity for building SPL feature models: a model-driven approach. 1246-1253 - Shubhanan Bakre, Atef Bader, Tzilla Elrad:

Aspect interaction chart - a UML approach for modularizing aspect interaction conflicts. 1254-1259 - Cristina Palomares

, Carme Quer
, Xavier Franch, Samuel Renault, Cindy Guerlain
:
A catalogue of functional software requirement patterns for the domain of content management systems. 1260-1265 - Nemésio Freitas Duarte Filho, Ellen Francine Barbosa:

A requirements catalog for mobile learning environments. 1266-1271 - Celal Ziftci, Ingolf Krüger:

Test intents: enhancing the semantics of requirements traceability links in test cases. 1272-1277 - Diego Dermeval

, Jaelson Castro
, Carla T. L. L. Silva, João Pimentel, Ig Ibert Bittencourt
, Patrick Henrique da S. Brito, Endhe Elias, Thyago Tenório
, Alan Pedro da Silva:
On the use of metamodeling for relating requirements and architectural design decisions. 1278-1283 - Philippe Dugerdil, David Sennhauser:

Dynamic decision tree for legacy use-case recovery. 1284-1291 - Rutvij Mehta, Tomás Ruiz-López

, Lawrence Chung, Manuel Noguera
:
Selecting among alternatives using dependencies: an NFR approach. 1292-1297 - Kristian Beckers, Stephan Faßbender, Denis Hatebur, Maritta Heisel, Isabelle Côté:

Common criteria compliant software development (CC-CASD). 1298-1304 - Almir Buarque, Jaelson Castro

, Fernanda M. R. Alencar
:
The role of NFRs when transforming i* requirements models into OO-method models. 1305-1306 - Jorge Barreiros

, Ana Moreira
:
Configuration support for feature models with soft constraints. 1307-1308 - Carlos E. Salgado

, Ricardo Jorge Machado
, Rita Suzana Pitangueira Maciel:
Modeling the alignment between business and IS/IT: a requirements engineering perspective. 1309-1311
Volume II: Software development and system software & security: bioinformatics track
- Cássio A. Melo, Marie-Aude Aufaure, Constantinos Orphanides, Simon Andrews, Kenneth McLeod

, Albert Burger:
A conceptual approach to gene expression analysis enhanced by visual analytics. 1314-1319 - Mimma Nardelli

, Luciano Tedesco, Alessio Bechini
:
Cross-lattice behavior of general ACO folding for proteins in the HP model. 1320-1327 - Thomas Triplet, Gregory Butler:

BenchDW: a generic framework for biological data warehouse benchmarking. 1328-1334 - Giovanni Xavier Perazzo, Ana T. Winck, Karina S. Machado

:
A data warehouse as an infrastructure to mine molecular descriptors for virtual screening. 1335-1336
Volume II: Software development and system software & security: coordination models, languages and applications track
- Ivan Lanese, Luca Bedogni

, Marco Di Felice:
Internet of things: a process calculus approach. 1339-1346 - Jasen Markovski:

Reliable supervisory coordination of stochastic communicating processes with data. 1347-1354 - Visara Urovi

, Alex C. Olivieri, Stefano Bromuri
, Nicoletta Fornara
, Michael Ignaz Schumacher:
A peer to peer agent coordination framework for IHE based cross-community health record exchange. 1355-1362 - Alessandro Celestini

, Rocco De Nicola
, Francesco Tiezzi:
Specifying and analysing reputation systems with a coordination language. 1363-1368 - Graeme Stevenson, Juan Ye, Simon Dobson, Danilo Pianini

, Sara Montagna
, Mirko Viroli
:
Combining self-organisation, context-awareness and semantic reasoning: the case of resource discovery in opportunistic networks. 1369-1376 - Davide Ancona, Matteo Barbieri, Viviana Mascardi:

Constrained global types for dynamic checking of protocol conformance in multi-agent systems. 1377-1379 - Stefano Mariani

, Andrea Omicini
:
Probabilistic embedding: experiments with tuple-based probabilistic languages. 1380-1382
Volume II: Software development and system software & security: enterprise engineering track
- Markus Hipp, Bela Mutschler, Bernd Michelberger, Manfred Reichert:

A framework for the intelligent delivery and user-adequate visualization of process information. 1383-1390 - Marco Montali

, Federico Chesani, Paola Mello, Fabrizio Maria Maggi:
Towards data-aware constraints in declare. 1391-1396 - María Fernández-Ropero, Ricardo Pérez-Castillo

, José A. Cruz-Lemus
, Mario Piattini
:
Assessing the best-order for business process model refactoring. 1397-1402 - Andreas Wombacher, Maria-Eugenia Iacob:

Start time and duration distribution estimation in semi-structured processes. 1403-1409 - Florian Hamel, Thomas Herz, Falk Uebernickel, Walter Brenner:

IT evaluation in business groups: a maturity model. 1410-1417 - Marc Solé, Josep Carmona

:
Amending C-net discovery algorithms. 1418-1425 - Johannes Pflug, Stefanie Rinderle-Ma

:
Dynamic instance queuing in process-aware information systems. 1426-1433 - Simon Tragatschnig, Uwe Zdun:

Enterprise integration using event actor based event transformations. 1434-1440 - Sigrid Schefer-Wenzl, Mark Strembeck:

Generic support for RBAC break-glass policies in process-aware information systems. 1441-1446 - Jens Kolb, Manfred Reichert:

Data flow abstractions and adaptations through updatable process views. 1447-1453 - Massimiliano de Leoni

, Wil M. P. van der Aalst
:
Data-aware process mining: discovering decisions in processes using alignments. 1454-1461 - Rafael Accorsi, Thomas Stocker, Günter Müller:

On the exploitation of process mining for security audits: the process discovery case. 1462-1468 - Sybren de Kinderen, Henderik Alex Proper

:
e3RoME: a value-based approach for method bundling. 1469-1471 - Malik Khalfallah, Nicolas Figay

, Mahmoud Barhamgi
, Parisa Ghodous
:
Product-based business processes interoperability. 1472-1473 - Diogo Proença

, Ricardo Vieira, Gonçalo Antunes
, Miguel Mira da Silva
, José Borbinha
, Christoph Becker, Hannes Kulovits:
Evaluating a process for developing a capability maturity model. 1474-1475
Volume II: Software development and system software & security: embedded systems track
- Sanghyuk Jung, Yong Ho Song:

LINK-GC: a preemptive approach for garbage collection in NAND flash storages. 1478-1484 - Felix Bruns, Dirk Kuschnerus, Attila Bilgic:

Virtualization for safety-critical, deeply-embedded devices. 1485-1492 - Lin-Fong Fan, Ting-Hao Tsai, Ya-Shu Chen, Shian-Shing Shyu:

Energy-aware real-time task synchronization in multi-core embedded systems. 1493-1498 - Pedro Furtado

, José Cecílio
:
Sensor streams middleware for easy configuration and processing in hybrid sensor network. 1499-1504 - Jigar Solanki, Laurent Réveillère, Yérom-David Bromberg, Bertrand Le Gal, Tegawendé F. Bissyandé:

Improving the performance of message parsers for embedded systems. 1505-1510 - Jianjun Xu, Qingping Tan, Lanfang Tan, Huiping Zhou:

An instruction-level fine-grained recovery approach for soft errors. 1511-1516 - Pengcheng Huang, Orlando Moreira, Kees Goossens, Anca Mariana Molnos:

Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessors. 1517-1524 - Chi-Sheng Shih

, Hsin-Yu Lai:
nuKernel: MicroKernel for multi-core DSP SoCs with load sharing and priority interrupts. 1525-1532 - Ali Azarian

, João M. P. Cardoso
, Stephan Werner, Jürgen Becker
:
An FPGA-based multi-core approach for pipelining computing stages. 1533-1540 - Hua-Wei Fang, Mi-Yen Yeh, Tei-Wei Kuo

:
MLC-flash-friendly logging and recovery for databases. 1541-1546 - Kevin Pouget, Miguel Santana, Patricia López Cueva, Jean-François Méhaut:

A novel approach for interactive debugging of dynamic dataflow embedded applications. 1547-1549 - Yongmyoung Lee, Taedong Jung, Ilhoon Shin:

Demand-based flash translation layer considering spatial locality. 1550-1551 - Andrea Baldovin, Andrea Graziano, Enrico Mezzetti

, Tullio Vardanega
:
Kernel-level time composability for avionics applications. 1552-1554 - Alexandra Aguiar, Sergio Johann Filho, Felipe G. Magalhaes, Fabiano Hessel

:
Communication support at the OS level to enhance design space exploration in multiprocessed embedded systems. 1555-1556
Volume II: Software development and system software & security: object oriented programming languages and systems track
- Lorenzo Bettini

:
Implementing Java-like languages in Xtext with Xsemantics. 1559-1564 - Brianna M. Ren, John Toman, T. Stephen Strickland, Jeffrey S. Foster:

The ruby type checker. 1565-1572 - Stijn de Gouw

, Frank S. de Boer, Einar Broch Johnsen
, Peter Y. H. Wong:
Run-time checking of data- and protocol-oriented properties of Java programs: an industrial case study. 1573-1578 - Stefan Hong, Yuh-Jzer Joung

:
Meso: an object-oriented programming language for building strongly-typed internet-based network applications. 1579-1586 - L. Miguel Lourenço, João Costa Seco

, Francisco Martins
:
Concurrent typed intermediate language. 1587-1588
Volume II: Software development and system software & security: operating systems track
- Shuichi Oikawa:

Integrating memory management with a file system on a non-volatile main memory system. 1589-1594 - Anselm Busse

, Jan Hendrik Schönherr, Matthias Diener
, Gero Mühl, Jan Richling:
Analyzing resource interdependencies in multi-core architectures to improve scheduling decisions. 1595-1602 - Luca Abeni

, Nicola Manica:
Analysis of client/server interactions in a reservation-based system. 1603-1609 - Seungcheol Ko, Seongsoo Park, Hwansoo Han:

Design analysis for real-time video transcoding on cloud systems. 1610-1615 - Dongwoo Kang, Jongmoo Choi, Namsu Lee, Donghee Lee, Sewoog Kim, Sam H. Noh:

Onion and pizza: new disk partitioning schemes for virtualization systems. 1616-1621 - Chaeseok Im, Minkyu Jeong, Jaedon Lee, Seungwon Lee:

A dynamically reconfigurable operating system for manycore systems. 1622-1627 - Dongjin Kim, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park, Lawrence Chung:

Measuring similarity of windows applications using static and dynamic birthmarks. 1628-1633 - Minwoo Jang, Joongjin Kook

, Samin Ryu, Kahyun Lee, Sung Shin, Ahreum Kim, Youngsu Park, Eig Hyun Cho:
An efficient similarity comparison based on core API calls. 1634-1638 - Dong-Kyu Chae, Sang-Wook Kim, Jiwoon Ha, Sang-Chul Lee, Gyun Woo:

Software plagiarism detection via the static API call frequency birthmark. 1639-1643 - Rivalino Matias Jr., Geycy Dyany Oliveira, Lucio Borges de Araujo

:
Operating system reliability from the quality of experience viewpoint: an exploratory study. 1644-1649 - Anas Toma

, Jian-Jia Chen
:
Computation offloading for real-time systems. 1650-1651 - Junghoon Lee, Sang-Wook Kim, Gyung-Leen Park:

A tour recommendation service for electric vehicles based on a hybrid orienteering model. 1652-1654 - Cheol Jeon, Woochur Kim, Bongjae Kim

, Yookun Cho:
Enhancing security enforcement on unmodified Android. 1655-1656 - Joonhyouk Jang, Hyunho Ji, Jiman Hong, Jinman Jung, Dongkyun Kim, Soon Ki Jung

:
Protecting Android applications with steganography-based software watermarking. 1657-1658
Volume II: Software development and system software & security: programming languages track
- Thiago B. L. Silva, Fernando Castor

:
New exception interfaces for Java-like languages. 1661-1666 - Marcelo Guerra Hahn

, Regina Motz
, Alberto Pardo, Martin A. Musicante
:
Formal semantics and expressiveness of a web service composition language. 1667-1673 - Patrick Maier, Robert J. Stewart

, Philip W. Trinder:
Reliable scalable symbolic computation: the design of SymGridPar2. 1674-1681 - Rémy Wyss, Frédéric Boniol, Claire Pagetti, Julien Forget:

End-to-end latency computation in a multi-periodic design. 1682-1687 - Walter Cazzola

, Edoardo Vacchi
:
@Java: annotations in freedom. 1688-1693 - Gaurav Kumar, Subhajit Roy:

Online identification of frequently executed acyclic paths by leveraging data stream algorithms. 1694-1695 - Fernando Castor

, Francisco Soares-Neto, André L. M. Santos
:
A preliminary assessment of Haskell's software transactional memory constructs. 1696-1697 - Bostjan Slivnik:

LLLR parsing. 1698-1699
Volume II: Software development and system software & security: programming for separation of concerns track
- Julien Cohen, Akram Ajouli:

Practical use of static composition of refactoring operations. 1700-1705 - Walter Cazzola

, Edoardo Vacchi
:
Fine-grained annotations for pointcuts with a finer granularity. 1706-1711 - Selim Ciraci, Oreste Villa:

Exploiting points-to maps for de-/serialization code generation. 1712-1719
Volume II: Software development and system software & security: software architecture: theory, technology, and applications track
- Welington M. da Silva, Alexandre Alvaro, Gustavo H. R. P. Tomas, Ricardo Alexandre Afonso, Kelvin Lopes Dias

, Vinicius Cardoso Garcia
:
Smart cities software architectures: a survey. 1722-1727 - Huy Tran, Ioanna Lytra, Uwe Zdun:

Derivation of domain-specific architectural knowledge views from governance and security compliance metadata. 1728-1733 - Jean-Baptiste Lézoray, Maria-Teresa Segarra, Jean-Marie Gilliot, Antoine Beugnard:

Modeling dynamic adaptations using augmented feature models. 1734-1741 - Gerald Holl, Christoph Elsner, Paul Grünbacher

, Michael Vierhauser
:
An infrastructure for the life cycle management of multi product lines. 1742-1749 - Zhiqiang Fan, Tao Yue, Li Zhang:

A generic framework for deriving architecture modeling methods for large-scale software-intensive systems. 1750-1757 - Herman Bruyninckx, Markus Klotzbücher, Nico Hochgeschwender

, Gerhard K. Kraetzschmar, Luca Gherardi, Davide Brugali:
The BRICS component model: a model-based development paradigm for complex robotics software systems. 1758-1764 - Piyush Diwan, Patricia Carey, Eric Franz, Yixue Li, Thomas Bitterman, David E. Hudak, Rajiv Ramnath:

Applying software product line engineering in building web portals for supercomputing services. 1765-1771 - Emna Mezghani, Riadh Ben Halima, Ismael Bouassida Rodriguez

, Khalil Drira:
A model driven methodology for enabling autonomic reconfiguration of service oriented architecture. 1772-1773
Volume II: Software development and system software & security: computer security track
- Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:

Exploiting visual appearance to cluster and detect rogue software. 1776-1783 - Michael Riecker, Sebastian Biedermann, Matthias Hollick:

Lightweight energy consumption based intrusion detection system for wireless sensor networks. 1784-1791 - Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna:

EARs in the wild: large-scale analysis of execution after redirect vulnerabilities. 1792-1799 - André Egners, Ulrike Meyer:

Secure roaming and infrastructure sharing for multi-operator WMNs. 1800-1807 - Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler

, Thomas Schreck
, Johannes Hoffmann:
Mobile-sandbox: having a deeper look into android applications. 1808-1815 - Russell J. Jancewicz, Aggelos Kiayias, Laurent D. Michel

, Alexander Russell
, Alexander A. Shvartsman
:
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals. 1816-1823 - Jean Everson Martina, Lawrence C. Paulson

:
Verifying multicast-based security protocols using the inductive method. 1824-1829 - André Ricardo Abed Grégio

, Dario Simões Fernandes Filho, Vitor Monte Afonso, Paulo Lício de Geus
, Victor Furuse Martins, Mário Jino:
An empirical analysis of malicious internet banking software behavior. 1830-1835 - Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio:

An updated threat model for security ceremonies. 1836-1843 - Johannes Hoffmann, Martin Ussath, Thorsten Holz

, Michael Spreitzenbarth:
Slicing droids: program slicing for smali code. 1844-1851 - Alessandro Armando

, Gabriele Costa
, Alessio Merlo:
Bring your own device, securely. 1852-1858 - Erdem Aktas, Kanad Ghose:

Run-time control flow authentication: an assessment on contemporary x86 platforms. 1859-1866 - Dongwan Shin

, Huiping Yao, Une Rosi:
Supporting visual security cues for WebView-based Android apps. 1867-1876
Volume II: Software development and system software & security: service-oriented architecture and programming track
- Alexander Cameron, Markus Stumptner

, Nanda Nandagopal
, Wolfgang Mayer
, Todd Mansell:
Performance analysis of a rule-based SOA component for real-time applications. 1877-1884 - Nuno Oliveira, Luís Soares Barbosa

:
On the reconfiguration of software connectors. 1885-1892 - Cesare Bartolini, Antonia Bertolino

, Guglielmo De Angelis, Andrea Ciancone, Raffaela Mirandola:
Apprehensive QoS monitoring of Service choreographies. 1893-1899 - Dionisis Margaris

, Costas Vassilakis
, Panagiotis Georgiadis:
An integrated framework for QoS-based adaptation and exception resolution in WS-BPEL scenarios. 1900-1906 - Quirino Zagarese, Gerardo Canfora

, Eugenio Zimeo, Iyad Alshabani, Laurent Pellegrino, Françoise Baude:
Efficient data-intensive event-driven interaction in SOA. 1907-1912 - Cinzia Di Giusto, Jorge A. Pérez

:
Disciplined structured communications with consistent runtime adaptation. 1913-1918 - Fatih Karatas, Dogan Kesdogan:

A flexible approach for considering interdependent security objectives in service composition. 1919-1926 - Sérgio Manuel Serra da Cruz, Raimundo Macário Costa, Laci Mary B. Manhães

, Jorge Zavaleta
:
Monitoring SOA-based applications with business provenance. 1927-1932 - Feng Gao

, Sami Bhiri
:
User centric complex event processing based on service oriented architectures. 1933-1934 - Antonio Bucchiarone

, Annapaola Marconi
, Claudio Antares Mezzina, Marco Pistore
:
A conceptual framework for collective adaptive systems. 1935-1936 - Imen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira, Emna Mezghani:

Towards an approach for modeling and formalizing SOA design patterns with Event-B. 1937-1938 - Markus Jung, Jürgen Weidinger, Wolfgang Kastner

, Alex C. Olivieri:
Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems. 1939-1941
Volume II: Software development and system software & security: trust, reputation, evidence and other collaboration know-how track
- Eleni Koutrouli, Aphrodite Tsalgatidou:

Credible recommendation exchange mechanism for P2P reputation systems. 1943-1948 - Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen:

Composite trust-based public key management in mobile ad hoc networks. 1949-1956 - Mario Cataldi, Nupur Mittal, Marie-Aude Aufaure:

Estimating domain-based user influence in social networks. 1957-1962 - Sheikh Mahbub Habib

, Vijay Varadharajan
, Max Mühlhäuser
:
A framework for evaluating trust of service providers in cloud marketplaces. 1963-1965
Volume II: Software development and system software & security: computer forensics track
- Bruno W. P. Hoelz, Célia Ghedini Ralha

:
A framework for semantic annotation of digital evidence. 1966-1971

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














