


default search action
30th SAC 2015: Salamanca, Spain
- Roger L. Wainwright, Juan Manuel Corchado, Alessio Bechini, Jiman Hong:

Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015. ACM 2015, ISBN 978-1-4503-3196-8
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Computational biology and bioinformatics track
- Eduardo Valente, Miguel Rocha

:
Transcript-based reannotation for microarray probesets. 3-9 - Sarvenaz Choobdar, Pedro Manuel Pinto Ribeiro

, Fernando M. A. Silva
:
Discovering weighted motifs in gene co-expression networks. 10-17 - Cindy Fähnrich, Matthieu-P. Schapranow

, Hasso Plattner:
Facing the genome data deluge: efficiently identifying genetic variants with in-memory database technology. 18-25 - Danilo Motta

, Luciana de Matos, Amanda Caniatto de Souza, Rafael Marcato, Afonso Paiva
, Luis Alberto Vieira de Carvalho:
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction. 26-31 - Maribel Yasmina Santos

, Cristiano G. Pendão
, Bruno Ferreira, Luís Gonçalves, Guilherme Moreira, Adriano J. C. Moreira
, João Álvaro Carvalho
:
MyHealth: a cross-domain platform for healthcare. 40-46 - Daye Jeong, Yunku Yeu

, Jaegyoon Ahn, Youngmi Yoon, Sanghyun Park:
Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm. 47-53 - Patricia Hübler, Duncan Dubugras A. Ruiz, João Eduardo Ferreira

, Osmar Norberto de Souza
:
P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model. 54-57
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Computational intelligence and video and image analysis track
- Marcia V. P. do Nascimento, Leonardo Vidal Batista, Nicomedes L. Cavalcanti Junior:

A new approach to biometric recognition based on hand geometry. 59-65 - João Baptista Cardia Neto, Aparecido Nilceu Marana:

3DLBP and HAOG fusion for face recognition utilizing Kinect as a 3D scanner. 66-73 - Glauco Vitor Pedrosa

, Agma J. M. Traina, Célia A. Zorzo Barcelos:
Shape description based on bag of salience points. 74-79 - Eliana L. Goldner, Cristina Nader Vasconcelos, Pedro Mario Silva, Marcelo Gattass:

A shortest path algorithm for 2D seismic horizon tracking. 80-85 - Sajid Javed

, Andrews Sobral
, Thierry Bouwmans
, Soon Ki Jung
:
OR-PCA with dynamic feature selection for robust background subtraction. 86-91 - Glauco Vitor Pedrosa

, Agma J. M. Traina:
Compact and discriminative approach for encoding spatial-relationship of visual words. 92-95 - Nelson Martin, Jorge Collado, Guillermo Botella, Carlos García

, Manuel Prieto
:
OpenACC-based GPU acceleration of an optical flow algorithm. 96-98
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Applications of evolutionary computing track
- Luciano Costa Blomberg, Rodrigo C. Barros

, Duncan D. Ruiz:
Evolving regression trees robust to missing data. 102-109 - Márcio P. Basgalupp

, Rodrigo C. Barros
, Vili Podgorelec
:
Evolving decision-tree induction algorithms with a multi-objective hyper-heuristic. 110-117 - Thiago Gomes Nepomuceno da Silva, José Everardo Bessa Maia, Leonardo Sampaio Rocha

:
An approach to the MOGAS initialization problem using an algorithm based on path relinking. 118-124 - Haoxu Wang

, Omar Andrés Carmona Cortes, Andrew Rau-Chaplin
:
Dynamic optimization of multi-layered reinsurance treaties. 125-132 - Daniel Cinalli, Luis Martí

, Nayat Sánchez-Pi
, Ana Cristina Bicharra Garcia
:
Collective preferences in evolutionary multi-objective optimization: techniques and potential contributions of collective intelligence. 133-138 - Seunghyun Jo:

Color image quantization using interactive genetic algorithm. 139-140
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Smart human computer interaction track
- Gary Ushaw, Richard Davison, Janet A. Eyre, Graham Morgan

:
Benchmarking motion sensing devices for rehabilitative gaming. 143-148 - Jarmo Palviainen, Terhi Kilamo, Johannes Koskinen, Janne Lautamäki, Tommi Mikkonen, Antti Nieminen:

Design framework enhancing developer experience in collaborative coding environment. 149-156 - Jonathas Leontino Medina, Maria Istela Cagnin, Débora Maria Barroso Paiva

:
Evaluation of web accessibility on the maps domain. 157-162 - André O. Bueno, Júnia Coutinho Anacleto, Vinicius Ferreira

, Janaina Cintra Abib, Carolina Souza, Daniel Consiglieri:
Selfie cafe: socialization in public spaces. 163-168 - Reddy A. Goutham

, Gil-Je Lee, Kee-Young Yoo:
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. 169-174 - Diogo Almeida, José Creissac Campos

, João Saraiva
, João Carlos Silva
:
Towards a catalog of usability smells. 175-181 - Janaina C. Abib, Júnia Coutinho Anacleto:

Integrating contexts in healthcare: guidelines to help the designers at design process. 182-184
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Intelligent information fusion track
- Javier Palanca Cámara

, Stella Heras
, Javier Jorge, Vicente Julián
:
Using graph-based models in a persuasive social recommendation system. 189-194 - Sigeru Omatu, Mitsuaki Yano, Yoshinori Ikeda:

Smell classification of wines by the learning vector quantization method. 195-200 - Nayat Sánchez-Pi

, Luis Martí
, José Manuel Molina, Ana Cristina Bicharra Garcia
:
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments. 201-206
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Intelligent and interactive learning environments track
- Ana Beatriz Cruz, Leonardo Preuss, João Quadros

, Uéverton S. Souza
, Sabrina Serique, Angélica Ogasawara, Eduardo Bezerra
, Eduardo S. Ogasawara
:
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games. 208-213 - Lais Z. Pedro, Aparecida M. Z. Lopes

, Bruno G. Prates, Julita Vassileva
, Seiji Isotani
:
Does gamification work for boys and girls?: An exploratory study with a virtual learning environment. 214-219 - Claus A. Usener:

EASy-DSBuilder: automated assessment of tree data structures in computer science teaching. 220-226 - Cheops Araujo Malta, Ranilson Oscar Araújo Paiva, Alan Pedro da Silva, Ig Ibert Bittencourt

, Ananias Queiroga de Oliveira Filho:
A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study. 227-232 - Ranilson Oscar Araújo Paiva, Ig Ibert Bittencourt

, Alan Pedro da Silva, Seiji Isotani
, Patrícia Augustin Jaques
:
Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environment. 233-238 - Maria Andréia F. Rodrigues

, Daniel Valente de Macedo, Yvens R. Serpa, Ygor R. Serpa:
Beyond fun: an interactive and educational 3D traffic rules game controlled by non-traditional devices. 239-246 - Laci Mary Barbosa Manhães

, Sérgio Manuel Serra da Cruz, Geraldo Zimbrão:
Towards automatic prediction of student performance in STEM undergraduate degree programs. 247-253 - A. Ezzat Labib, M. Carmen Penadés

, José H. Canós, Abel Gómez
:
Enforcing reuse and customization in the development of learning objects: a product line approach. 261-263 - Montassar Ben Messaoud

:
Dynamic: a collaborative filtering strategy for assigning examination's rooms to supervisors. 264-266 - Tales Nereu Bogoni, Márcio Sarroglia Pinho

, Roberta Scarparo:
Evaluation of a haptic virtual reality simulator for endodontics training. 267-269 - Heitor Barros, Evandro Costa, Jonathas Magalhães, Ranilson Paiva:

Integrating educational repositories to improve the reuse of learning objects. 270-272 - Enrica Pesare

:
Smart learning environments for social learning. 273-274
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Intelligent robotics and multi-agent systems track
- Arjun Tambe, Thanh Nguyen:

Robust resource allocation in security games and ensemble modeling of adversary behavior. 277-282 - José Miguel Morales, Elena Navarro

, Pedro Sánchez-Palma
, Diego Alonso
:
TRiStar: an i* extension for teleo-reactive systems requirements specifications. 283-288 - Leandro A. S. Moreira, Cláudia Marcela Justel

, Paulo Fernando Ferreira Rosa:
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps. 289-294 - Ricardo Dias, João M. Silva, José Luís Azevedo

, Bernardo Cunha
, António J. R. Neves
, Nuno Lau
:
Improving the kicking accuracy in a soccer robot. 295-300 - Parikshit Maini

, P. B. Sujit:
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range. 301-306 - Paolo Stegagno

, Caterina Massidda, Heinrich H. Bülthoff
:
Distributed target identification in robotic swarms. 307-313 - Matteo Lasagni, Kay Römer

:
Force model of a robotic particle chain for 3d displays. 314-319 - Benjamin Fonooni, Thomas Hellström:

On the similarities between control based and behavior based visual servoing. 320-326 - Marin Lujak

, Alberto Fernández
:
ORCAS: optimized robots configuration and scheduling system. 327-330 - Eduardo R. B. Marques

, Manuel A. Ribeiro, José Pinto, João B. Sousa
, Francisco Martins
:
NVL: a coordination language for unmanned vehicle networks. 331-334 - Kim Minsam, Kwok Yip Szeto

:
Sustaining mutual cooperation in iterated prisoner's dilemma game. 335-337
Volume I: Artificial intelligence and agents, distributed systems, and information systems: The semantic web and applications track
- Quinsulon Israel, Hyoil Han, Il-Yeol Song:

Semantic analysis for focused multi-document summarization (fMDS) of text. 339-344 - Umberto Straccia

, Matteo Mucci:
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation. 345-352 - Alexander Hogenboom, Ewout Niewenhuijse, Milan Jansen, Flavius Frasincar

, Damir Vandic:
RDF chain query optimization in a distributed environment. 353-359 - Gregory Moro Puppi Wanderley

, Emerson Cabrera Paraiso
:
Learning folksonomies from task-oriented dialogues. 360-367 - Francesco Corcoglioniti

, Marco Rospocher
, Michele Mostarda, Marco Amadori:
Processing billions of RDF triples on a single machine using streaming and sorting. 368-375 - Cleyton Mário de Oliveira Rodrigues

, Ryan Ribeiro de Azevedo
, Frederico Luiz Gonçalves de Freitas, Eunice Palmeira da Silva, Patrícia Vieira da Silva Barros:
An ontological approach for simulating legal action in the Brazilian penal code. 376-381 - Mauro Dragoni

:
Exploiting multilinguality for creating mappings between thesauri. 382-387 - Fabiano Borges Ruy, Ricardo de Almeida Falbo, Monalessa Perini Barcellos

, Giancarlo Guizzardi
:
Towards an ontology pattern language for harmonizing software process related ISO standards. 388-395 - V. Gayathri, P. Sreenivasa Kumar:

Horn-rule based compression technique for RDF data. 396-401 - José Gildo de Araújo Júnior, Ulrich Schiel, Leandro Balby Marinho

:
An approach for building lexical-semantic resources based on heterogeneous information sources. 402-408 - Alex Sandro da Cunha Rego, Leandro Balby Marinho

, Carlos Eduardo S. Pires
:
A supervised learning approach to detect subsumption relations between tags in folksonomies. 409-415 - Long Cheng

, Spyros Kotoulas
, Tomas E. Ward
, Georgios Theodoropoulos
:
High throughput indexing for large-scale semantic web data. 416-422 - Jean-Philippe Fauconnier, Mouna Kamel, Bernard Rothenburger:

A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures. 423-425
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Dependable and adaptive distributed systems track
- Javier Cámara, David Garlan, Bradley R. Schmerl, Ashutosh Pandey:

Optimal planning for architecture-based self-adaptation via model checking of stochastic games. 428-435 - Martin Größl:

Modeling dependable systems with continuous time Bayesian networks. 436-441 - Shruti Kunde, Tridib Mukherjee:

Workload characterization model for optimal resource allocation in cloud middleware. 442-447 - Antonio J. Rubio-Montero

, Manuel Aurelio Rodriguez Pascual, Rafael Mayo-García
:
Evaluation of an adaptive framework for resilient Monte Carlo executions. 448-455 - Naghmeh Ramezani Ivaki

, Nuno Laranjeiro, Filipe Araújo
:
A taxonomy of reliable request-response protocols. 456-463 - André Felipe Monteiro, Orlando Loques:

Scalable model for dynamic configuration and power management in virtualized heterogeneous web clusters. 464-467 - Dulcinéia Oliveira da Penha, Gereon Weiss:

Parameterization of fail-operational architectural patterns. 471-473
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Cooperative systems track
- Sebastian Ahrndt, Benjamin Breitung, Johannes Fähndrich, Sahin Albayrak

:
Predictability in human-agent cooperation: adapting to humans' personalities. 474-479 - Diego Roberto Colombo Dias

, Marcelo de Paiva Guimarães, Torsten W. Kuhlen, Luís Carlos Trevelin:
A dynamic-adaptive architecture for 3d collaborative virtual environments based on graphic clusters. 480-487 - Leonardo Albernaz Amaral, Ramão Tiago Tiburski, Everton de Matos

, Fabiano Hessel
:
Cooperative middleware platform as a service for internet of things applications. 488-493 - Ayumi Sugiyama, Toshiharu Sugawara

:
Meta-strategy for cooperative tasks with learning of environments in multi-agent continuous tasks. 494-500 - Rodrigo da Rosa Righi, Alexandre Da Silva Veith

, Vinicius Facco Rodrigues
, Gustavo Rostirolla, Cristiano André da Costa
, Kleinner Farias
, Antônio Marcos Alberti
:
Rescheduling and checkpointing as strategies to run synchronous parallel programs on P2P desktop grids. 501-504 - André Pinz Borges, Osmar Betazzi Dordal, Denise Maria Vecino Sato

, Fabrício Enembreck
, Bráulio Coelho Ávila, Edson Emílio Scalabrin:
Efficient approach for reusing and sharing train driving plans using case-based reasoning. 505-508 - Nadir Guetmi, Moulay Driss Mechaoui

, Abdessamad Imine, Ladjel Bellatreche:
Mobile collaboration: a collaborative editing service in the cloud. 509-512
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Mobile computing and applications track
- Takashi Hamatani, Akira Uchiyama, Teruo Higashino:

Estimating core body temperature based on human thermal model using wearable sensors. 521-526 - Huan Li, Qi Zhang, Kejie Lu:

Integrating mobile sensing and social network for personalized health-care application. 527-534 - Vaninha Vieira, Konstantin Holl, Michael Hassel:

A context simulator as testing support for mobile apps. 535-541 - Jonas C. Sampaio, Raphael S. Evangelista

, Leandro A. F. Fernandes
:
Determining the location of buildings given a single picture, environment maps and inaccurate GPS coordinates. 542-547 - Maroua Ben Attia

, Chamseddine Talhi, Abdelwahab Hamou-Lhadj
, Babak Khosravifar, Vincent Turpaud, Mario Couture:
On-device anomaly detection for resource-limited systems. 548-554 - Nayyab Zia Naqvi, Karel Moens, Arun Ramakrishnan, Davy Preuveneers, Danny Hughes, Yolande Berbers:

To cloud or not to cloud: a context-aware deployment perspective of augmented reality mobile applications. 555-562 - Heba Aly, Mohamed A. Ismail:

ubiMonitor: intelligent fusion of body-worn sensors for real-time human activity recognition. 563-568 - Francisco Airton Silva

, Paulo Romero Martins Maciel, Gileno Filho, Rúbens de Souza Matos Júnior:
A scheduler for mobile cloud based on weighted metrics and dynamic context evaluation. 569-576 - Philipp B. Costa, Paulo A. L. Rego, Lincoln S. Rocha, Fernando Antonio Mota Trinta, José N. de Souza

:
MpOS: a multiplatform offloading system. 577-584 - Giacomo Berardi, Andrea Esuli

, Tiziano Fagni, Fabrizio Sebastiani
:
Multi-store metadata-based supervised mobile app classification. 585-588 - Fernando Rodrigues, Angelo Brayner

, José Everardo Bessa Maia:
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN. 589-591 - Tridib Mukherjee, Amit Kumar, Deepthi Chander, Koustuv Dasgupta, Amandeep Chugh, Anirban Mondal:

Performance characterization and scalable design of sensing-as-a-service platform. 592-595 - Paulo Artur de Sousa Duarte, Felipe Mota Barreto, Francisco Anderson de Almada Gomes, Windson Viana de Carvalho

, Fernando Antonio Mota Trinta:
Towards context-aware behaviour generation. 596-598
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Networking track
- Kostas Katsalis, Vasilis Sourlas

, Thanasis G. Papaioannou
, Thanasis Korakis, Leandros Tassiulas:
Content placement in heterogeneous end-to-end virtual networks. 602-608 - Gaetano Carlucci, Luca De Cicco

, Saverio Mascolo:
HTTP over UDP: an experimental investigation of QUIC. 609-614 - Daniel Guimaraes do Lago, Edmundo Roberto Mauro Madeira

, Deep Medhi:
High speed network impacts and power consumption estimation for cloud data centers. 615-620 - Nourhene Ellouze

, Slim Rekhis
, Noureddine Boudriga:
Energy harvesting based protection of border surveillance systems. 621-626 - Andre S. Gomes

, Torsten Braun
:
Feasibility of information-centric networking integration into LTE mobile networks. 627-633 - Saulo Queiroz

, Roberto A. Hexsel:
Translating full duplexity into capacity gains for the high-priority traffic classes of IEEE 802.11. 634-639 - Lucas Mendes Ribeiro Arbiza, Leandro Marcio Bertholdo

, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville
, Liane Margarida Rockenbach Tarouco
:
Refactoring internet of things middleware through software-defined network. 640-645 - Lubos Matl, Tomás Cerný

, Michael J. Donahoo:
Effective manycast messaging for Kademlia network. 646-652 - Zahid Iqbal, Luís Almeida

, Moris Behnam:
Designing network servers within a hierarchical scheduling framework. 653-658 - Arindam Chaudhuri

, Soumya Maity, Soumya Kanti Ghosh:
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression. 659-661 - Alexandre Fontinele

, Iallen G. S. Santos, André Soares
, José Maranhão Neto, Felipe Mazullo:
A solution to the MCSP problem considering physical layer degradations in transparent optical networks. 662-664 - Celio Trois, Magnos Martinello, Luis Carlos Erpen De Bona

, Marcos Didonet Del Fabro:
From software defined network to network defined for software. 665-668 - Julio Cano, Luís Almeida:

Feedback management for scaling clients in streaming multicast. 669-671
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Wireless communications and networking track
- Marcelo Riedi, Giovanna G. Basilio, Marcelo E. Pellenz

:
Channel and power allocation algorithm to optimize the performance of large WLANs. 673-679 - Jason B. Ernst, Stefan C. Kremer, Joel J. P. C. Rodrigues:

Performance evaluation of heterogeneous wireless networks considering competing objectives and viewpoints. 680-687 - Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-Cong Xing, Qiang Duan:

A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs. 688-694 - Safdar Hussain Bouk

, Syed Hassan Ahmed
, Dongkyun Kim:
Vehicular content centric network (VCCN): a survey and research challenges. 695-700 - Gilberto Fernandes

, Eduardo H. M. Pena, Luiz Fernando Carvalho
, Joel J. P. C. Rodrigues, Mario Lemes Proença Jr.
:
Statistical, forecasting and metaheuristic techniques for network anomaly detection. 701-707 - Frank Bohdanowicz, Hannes Frey, Rafael Funke, Dominik Mosen, Florentin Neumann, Ivan Stojmenovic:

RSSI-based localization of a wireless sensor node with a flying robot. 708-715 - Edgard Jamhour, Marcelo Eduardo Pellenz

, Manoel Camillo Penna, Richard Demo Souza
, Glauber Gomes de Oliveira Brante
:
Interference aware channel assignment for structured wireless sensor networks. 716-719 - Murad Khan:

Multi-criteria based vertical handover decision in heterogeneous wireless network. 720-721
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Web technologies track
- Dusan Rychnovský, Irena Holubová

:
Generating XML data for XPath queries. 724-731 - Michel Capelle, Marnix Moerland, Frederik Hogenboom, Flavius Frasincar

, Damir Vandic:
Bing-SF-IDF+: a hybrid semantics-driven news recommender. 732-739 - Chu-Cheng Hsieh, James Neufeld, Tracy Holloway King

, Junghoo Cho:
Efficient approximate thompson sampling for search query recommendation. 740-746 - Simon Kassing, Jasper Oosterman, Alessandro Bozzon

, Geert-Jan Houben:
Locating domain-specific contents and experts on social bookmarking communities. 747-752 - Andrés Sanoja, Stéphane Gançarski:

Web page segmentation evaluation. 753-760 - Ronald van Bezu, Sjoerd Borst, Rick Rijkse, Jim Verhagen, Damir Vandic, Flavius Frasincar

:
Multi-component similarity method for web product duplicate detection. 761-768 - Ubiratam de Paula Junior, Lúcia M. A. Drummond

, Daniel de Oliveira
, Yuri Frota, Valmir Carneiro Barbosa
:
Handling flash-crowd events to improve the performance of web applications. 769-774 - Maurizio Leotta

, Andrea Stocco
, Filippo Ricca, Paolo Tonella:
Automated generation of visual web tests from DOM-based web tests. 775-782 - Flávio Rezende de Jesus, Leandro Guarino de Vasconcelos, Laércio Augusto Baldochi Jr.:

Leveraging task-based data to support functional testing of web applications. 783-790 - Hossain Shahriar

, Hisham M. Haddad:
Security assessment of clickjacking risks in web applications: metrics based approach. 791-797 - Tai-Lun Tseng, Shih-Hao Hung

, Chia-Heng Tu:
Migratom.js: a JavaScript migration framework for distributed web computing and mobile devices. 798-801 - Kennedy Kambona, Elisa Gonzalez Boix

, Wolfgang De Meuter
:
Serena: scalable middleware for real-time web applications. 802-805 - Yamato Miyashita, Hiroyo Ishikawa, Fumio Teraoka, Kunitake Kaneko:

Catalogue: graph representation of file relations for a globally distributed environment. 806-809 - Feliu Trias, Valeria de Castro

, Marcos López Sanz
, Esperanza Marcos
:
RE-CMS: a reverse engineering toolkit for the migration to CMS-based web applications. 810-812
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Data mining track
- Shuchu Han, Hao Huang, Hong Qin, Dantong Yu:

Locality-preserving L1-graph and its application in clustering. 813-818 - Mohamed Dermouche, Leila Khouas, Julien Velcin, Sabine Loudcher:

A joint model for topic-sentiment modeling from text. 819-824 - Luis Fernando Planella Gonzalez

, Duncan Dubugras Alcoba Ruiz, Márcio Sarroglia Pinho
:
Computationally-efficient classification of HEp-2 cell patterns in IIF images. 825-830 - Walter J. Silva, Maria Camila Nardini Barioni

, Sandra de Amo, Humberto Luiz Razente
:
Semi-supervised clustering using multi-assistant-prototypes to represent each cluster. 831-836 - Anveshi Charuvaka, Huzefa Rangwala:

Approximate block coordinate descent for large scale hierarchical classification. 837-844 - Mohsin Iqbal, Asim Karim, Faisal Kamiran:

Bias-aware lexicon-based sentiment analysis. 845-850 - Souad Bouasker, Sadok Ben Yahia

:
Key correlation mining by simultaneous monotone and anti-monotone constraints checking. 851-856 - Philippe Fournier-Viger

, Souleymane Zida:
FOSHU: faster on-shelf high utility itemset mining - with or without negative unit profit. 857-864 - Ulf Brefeld:

Multi-view learning with dependent views. 865-870 - Eibe Frank

, Michael Mayo, Stefan Kramer:
Alternating model trees. 871-878 - André Valente Rodrigues

, Alípio Jorge
, Inês Dutra
:
Accelerating recommender systems using GPUs. 879-884 - Sophie Burkhardt, Stefan Kramer:

On the spectrum between binary relevance and classifier chains in multi-label classification. 885-892 - Keith Henderson, Brian Gallagher

, Tina Eliassi-Rad:
EP-MEANS: an efficient nonparametric clustering of empirical probability distributions. 893-900 - Murat Okkalioglu, Mehmet Koç

, Huseyin Polat:
On the discovery of fake binary ratings. 901-907 - Nicolas Béchet, Peggy Cellier, Thierry Charnois, Bruno Crémilleux:

Sequence mining under multiple constraints. 908-914 - Gustavo Paiva Guedes

, Eduardo Bezerra
, Eduardo S. Ogasawara
, Geraldo Xexéo
:
Exploring multiple clusterings in attributed graphs. 915-918 - Han-joon Kim, Kee-joo Hong, Jae-Young Chang:

Semantically enriching text representation model for document clustering. 922-925 - Yong Zheng

:
Improve general contextual slim recommendation algorithms by factorizing contexts. 929-930 - A. G. Rekha:

A fast support vector data description system for anomaly detection using big data. 931-932
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Data streams track
- Jean Paul Barddal

, Heitor Murilo Gomes
, Fabrício Enembreck
:
SNCStream: a social network-based data stream clustering algorithm. 935-940 - Heitor Murilo Gomes

, Jean Paul Barddal
, Fabrício Enembreck
:
Pairwise combination of classifiers for ensemble learning on data streams. 941-946 - Pawel Matuszyk, João Vinagre

, Myra Spiliopoulou, Alípio Mário Jorge
, João Gama
:
Forgetting methods for incremental matrix factorization in recommender systems. 947-953 - Jesse Read, Fernando Pérez-Cruz

, Albert Bifet
:
Deep learning in partially-labeled data streams. 954-959 - Rui Sarmento

, Mário Cordeiro
, João Gama
:
Visualization of evolving large scale ego-networks. 960-962 - João Vinagre

, Alípio Mário Jorge
, João Gama
:
Collaborative filtering with recency-based negative feedback. 963-965
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Database theory, technology and applications track
- Christiane Faleiro Sidney, Diego Sarmento Mendes, Leonardo Andrade Ribeiro, Theo Härder:

Performance prediction for set similarity joins. 967-972 - Athanasios Kaplanis, Marios Kendea, Spyros Sioutas, Christos Makris

, Giannis Tzimas:
HB+tree: use hadoop and HBase even your data isn't that big. 973-980 - Demetrio Gomes Mestre, Carlos Eduardo S. Pires

, Dimas C. Nascimento
:
Adaptive sorted neighborhood blocking for entity matching with MapReduce. 981-987 - Neusa L. Evangelista, José de Aguiar Moraes Filho, Angelo Brayner

, Namom Alencar:
Bt-Join: a join operator for asymmetric storage device. 988-993 - Lúcio F. D. Santos, Willian D. Oliveira

, Luiz Olmes Carvalho, Mônica Ribeiro Porto Ferreira, Agma J. M. Traina, Caetano Traina Jr.
:
Combine-and-conquer: improving the diversity in similarity search through influence sampling. 994-999 - Claudivan Cruz Lopes, Valéria Cesário Times:

A framework for investigating the performance of sum aggregations over encrypted data warehouses. 1000-1007 - Saida Aissi

, Mohamed Salah Gouider, Tarek Sboui, Lamjed Ben Said
:
Personalized recommendation of SOLAP queries: theoretical framework and experimental evaluation. 1008-1014 - Xiufeng Liu

, Nadeem Iftikhar
:
An ETL optimization framework using partitioning and parallelization. 1015-1022 - Dimitrios Rafailidis

, Yannis Manolopoulos:
Parallel similarity search based on the dimensions value cardinalities of image descriptor vectors. 1023-1030
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Information access and retrieval track
- Christin Seifert

, Jörg Schlötterer, Michael Granitzer
:
Towards a feature-rich data set for personalized access to long-tail content. 1031-1038 - Andreas Lommatzsch, Sahin Albayrak

:
Real-time recommendations for user-item streams. 1039-1046 - Giacomo Berardi, Andrea Esuli

, Tiziano Fagni, Fabrizio Sebastiani
:
Classifying websites by industry sector: a study in feature design. 1053-1059 - Rafael Martins D'Addio, Marcelo G. Manzato:

A sentiment-based item description approach for kNN collaborative filtering. 1060-1065 - Giacomo Berardi, Diego Ceccarelli, Andrea Esuli

, Diego Marcheggiani:
On the impact of entity linking in microblog real-time filtering. 1066-1071 - Katrin Braunschweig, Maik Thiele

, Julian Eberius, Wolfgang Lehner
:
Column-specific context extraction for web tables. 1072-1077 - Youngchul Cha, Keng-hao Chang, Hari Bommaganti, Ye Chen, Tak W. Yan, Bin Bi, Junghoo Cho:

A universal topic framework (UniZ) and its application in online search. 1078-1085 - Talles Brito Viana, Glêdson Elias da Silveira:

BranchGuide: an indexing technique for efficient, lossless processing of branching path queries. 1086-1092 - Rafik Abbes, Karen Pinel-Sauvagnat

, Nathalie Hernandez
, Mohand Boughanem
:
Leveraging temporal expressions to filter vital documents related to an entity. 1093-1098 - Raoni Simões Ferreira

, Maria da Graça Campos Pimentel, Marco Cristo:
Exploring graph topology via matrix factorization to improve wikification. 1099-1104 - Marcos Aurélio Domingues

, Camila Vaccari Sundermann
, Flávio M. M. Barros, Marcelo G. Manzato, Maria G. C. Pimentel, Solange Oliveira Rezende
:
Applying multi-view based metadata in personalized ranking for recommender systems. 1105-1107 - Jörg Schlötterer:

From context to query. 1108-1109 - Swapnajit Chakraborti

:
Multi-document text summarization for competitor intelligence: a methodology based on topic identification and artificial bee colony optimization. 1110-1111 - Ankit Chaudhary

:
Experience in item based recommender system. 1112-1114
Volume I: Artificial intelligence and agents, distributed systems, and information systems: Social network and media analysis track
- Mario Levorato

, Lúcia M. A. Drummond
, Yuri Frota, Rosa Maria Videira de Figueiredo:
An ILS algorithm to evaluate structural balance in signed social networks. 1117-1122 - Vinicius Nonnenmacher, Luiz Paulo Luna de Oliveira, Bardo E. J. Bodmann, Marta Becker Villamil:

Modelling consumers decision-making process about excluding products as a result of mutual influence. 1123-1128 - Gabriel P. Gimenes, Hugo Gualdron, José Fernando Rodrigues Jr., Mario Gazziro

:
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses. 1129-1135 - Jorge Carlos Valverde-Rebaza

, Alan Valejo, Lilian Berton, Thiago de Paulo Faleiros
, Alneu de Andrade Lopes:
A naïve Bayes model based on ovelapping groups for link prediction in online social networks. 1136-1141 - Thiago H. P. Silva, Mirella M. Moro

, Ana Paula Couto da Silva:
Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis. 1142-1147 - Irfan Ali, Sang-Wook Kim:

An effective approach to group recommendation based on belief propagation. 1148-1153 - Sarah Michele Rajtmajer, Christopher Griffin

, Derek Mikesell, Anna Cinzia Squicciarini
:
An evolutionary game model for the spread of non-cooperative behavior in online social networks. 1154-1159 - João Eliakin Mota de Oliveira, Marcos G. Quiles

, Marcos D. N. Maia, Elbert E. N. Macau
:
Community detection, with lower time complexity, using coupled Kuramoto oscillators. 1160-1166 - João Loff, Manuel Reis, Bruno Martins

:
Predicting well-being with geo-referenced data collected from social media platforms. 1167-1173 - Hikaru Takemura, Atsushi Tanaka, Keishi Tajima:

Classification of Twitter follow links based on the followers' intention. 1174-1180 - Anastasia Mochalova, Alexandros Nanopoulos:

Multi-stage seed selection for viral marketing. 1181-1183
Volume II: Software development, system software and security: Enterprise engineering track
- Nuno Miguel Carvalho da Silva, Miguel Mira da Silva

, Béatrix Barafort, Marco Vicente, Pedro Manuel Antunes Sousa:
Using ArchiMate to model a process assessment framework. 1189-1194 - Pedro Linares Pinto, Carlos Mendes, Artur Caetano

, Miguel Mira da Silva
:
Using event logs and the Ψ-theory to analyse business processes. 1195-1202 - Ahmed Awad

, Ahmed Barnawi, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise
, Sherif Sakr
:
Runtime detection of business process compliance violations: an approach based on anti patterns. 1203-1210 - Adina Aldea, Maria-Eugenia Iacob, Jos van Hillegersberg, Dick A. C. Quartel, Lianne Bodenstaff, Henry M. Franken:

Modelling strategy with ArchiMate. 1211-1218 - Marco Zappatore, Antonella Longo

, Mario A. Bochicchio
:
SLA composition in service networks: a tool for representing relationships between SLAs and contracts. 1219-1224 - Thomas Baier, Andreas Rogge-Solti

, Jan Mendling, Mathias Weske:
Matching of events and activities: an approach based on behavioral constraint satisfaction. 1225-1230 - Ingo Weber, Mostafa Farshchi, Jan Mendling, Jean-Guy Schneider

:
Mining processes with multi-instantiation. 1231-1237 - Christos Makris

, Pantelis Vikatos, Joost Visser
:
Classification model for predicting cost slippage in governmental ICT projects. 1238-1241 - Joshua Chibuike Nwokeji, Tony Clark

, Balbir S. Barn
, Vinay Kulkarni:
A conceptual framework for enterprise agility. 1242-1244 - Julius Holderer

, Rafael Accorsi, Günter Müller:
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience. 1245-1248 - Joshua Chibuike Nwokeji:

A framework for enterprise agility. 1249-1250
Volume II: Software development, system software and security: Multimedia and visualization track
- Kaveh Darabi, Gheorghita Ghinea

:
Personalized video summarization using sift. 1252-1256 - Tamires Tessarolli de Souza Barbieri, Tiago Henrique Trojahn, Moacir Ponti

, Rudinei Goularte
:
Shot-HR: a video shot representation method based on visual features. 1257-1262 - Hayate Goto, Tetsuji Takada

:
Anomalous network communication detection system by visual pattern on a client computer. 1263-1269 - Sujeet Mate, Igor D. D. Curcio, Antti J. Eronen, Arto Lehtiniemi:

Automatic multi-camera remix from single video. 1270-1277 - Luiz Fernando Gomes Soares, Márcio Ferreira Moreno, Álan Lívio Vasconcelos Guedes

:
Controlling the focus and input events in multimedia applications. 1278-1284 - Caio César Viel, Erick Lazaro Melo, César A. C. Teixeira:

An approach for controlling synchronous remote instances of a multimedia presentation. 1285-1290 - Lotfi Abdi, Faten Ben Abdallah

, Aref Meddeb
:
A robust video watermarking algorithm in H.264/AVC compressed domain. 1291-1293 - Alessandro Colantonio, Roberto Di Pietro

, Marinella Petrocchi, Angelo Spognardi
:
Visual detection of singularities in review platforms. 1294-1295
Volume II: Software development, system software and security: Multicore software engineering, performance, applications, and tools track
- Mark Joselli, José Ricardo da S. Junior, Esteban Clua:

NGrid: a proximity data structure for fluids animation with GPU computing. 1303-1308 - João A. Silva

, João Lourenço
, Hervé Paulino
:
Boosting locality in multi-version partial data replication. 1309-1314 - João Bispo

, Luís Reis
, João M. P. Cardoso
:
C and OpenCL generation from MATLAB. 1315-1320 - Andrew Barrington, Steven D. Feldman, Damian Dechev:

A scalable multi-producer multi-consumer wait-free ring buffer. 1321-1328 - Leonardo Rocha

, Gabriel Spada Ramos, Rodrigo Chaves, Rafael Sachetto Oliveira
, Daniel Madeira, Felipe Viegas, Guilherme Andrade, Sérgio Daniel, Marcos André Gonçalves
, Renato Ferreira:
G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN. 1335-1338 - Eduardo de la Iglesia, Guillermo Botella Juan, Carlos García

, Manuel Prieto
:
Parallel trajectory synchronization for aircraft conflicts resolution. 1339-1341
Volume II: Software development, system software and security: Requirements engineering track
- Kristian Beckers, Maritta Heisel, Francisco Moyano, M. Carmen Fernández Gago:

Engineering trust- and reputation-based security controls for future internet systems. 1344-1349 - Fábio Soares, João Araújo

, Fernando Wanderley:
VoiceToModel: an approach to generate requirements models from speech recognition mechanisms. 1350-1357 - Arthur Marques, Franklin Ramalho, Wilkerson de L. Andrade

:
TRL: a traceability representation language. 1358-1363 - Arthur Marques, Franklin Ramalho, Wilkerson de L. Andrade

:
Towards a requirements traceability process centered on the traceability model. 1364-1369 - Balbir S. Barn

, Giuseppe Primiero
, Ravinder Barn
:
An approach to early evaluation of informational privacy requirements. 1370-1375 - André Almeida

, Nelly Bencomo, Thaís Vasconcelos Batista
, Everton Cavalcante
, Francisco Dantas:
Dynamic decision-making based on NFR for managing software variability and configuration selection. 1376-1382 - Ronaldo Gonçalves Junior, Tiago Rolim, Américo Sampaio

, Nabor C. Mendonça
:
A multi-criteria approach for assessing cloud deployment options based on non-functional requirements. 1383-1389 - Maurício Manoel Coelho Júnior, Maria Lencastre

:
M-4REuse: reusing use cases specifications. 1390-1396 - Jéssyka Vilela

, Jaelson Brelaz de Castro
, João Pimentel, Monique Soares, Paulo Cavalcanti, Márcia Lucena
:
Deriving the behavior of context-sensitive systems from contextual goal models. 1397-1400 - Bendra Ojameruaye

, Rami Bahsoon:
A risk - aware framework for compliance goal-obstacle analysis. 1401-1402
Volume II: Software development, system software and security: Software architecture: theory, technology, and applications track
- Amal Gassara, Ismael Bouassida Rodriguez, Mohamed Jmaiel:

A multi-scale modeling approach for software architecture deployment. 1405-1410 - Marcelo Benites Gonçalves, Flávio Oquendo, Elisa Yumi Nakagawa

:
A meta-process to construct software architectures for system of systems. 1411-1416 - Milena Guessi

, Dilvan A. Moreira, Gabriel Abdalla, Flávio Oquendo, Elisa Yumi Nakagawa
:
OntolAD: a formal ontology for architectural descriptions. 1417-1424 - Tânia Basso, Regina Moraes

, Mário Jino, Marco Vieira
:
Requirements, design and evaluation of a privacy reference architecture for web applications and services. 1425-1432 - Milena Guessi

, Valdemar Vicente Graciano Neto
, Thiago Bianchi, Kátia Romero Felizardo
, Flávio Oquendo, Elisa Yumi Nakagawa
:
A systematic literature review on the description of software architectures for systems of systems. 1433-1440 - Leonardo P. Tizzei, Leonardo Guerreiro Azevedo, Maximilien de Bayser, Renato F. G. Cerqueira:

Architecting cloud tools using software product line techniques: an exploratory study. 1441-1448 - Thais Burity, Glêdson Elias da Silveira:

A quantitative, evidence-based approach for recommending software modules. 1449-1456 - Italo Carlo Lopes Silva, Patrick H. S. Brito, Baldoino Fonseca dos Santos Neto, Evandro Costa, Andre Almeida Silva:

A decision-making tool to support architectural designs based on quality attributes. 1457-1463 - Ashish Agrawal, T. V. Prabhakar:

AutoQA: quality attributes as a service in cloud. 1464-1467 - Ilhem Khlif, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira:

Towards a multi-scale modeling approach for software architectures. 1468-1470
Volume II: Software development, system software and security: Software engineering track
- José Amâncio M. Santos, Manoel G. Mendonça

:
Exploring decision drivers on god class detection in three controlled experiments. 1472-1479 - Y. Raghu Reddy

, Anish Shankar, Madhavan Chetlur:
Incremental aspect weaving: an approach for faster AOP learning. 1480-1485 - Andreas Demuth, Markus Riedl-Ehrenleitner, Alexander Nöhrer, Peter Hehenberger, Klaus Zeman, Alexander Egyed:

DesignSpace: an infrastructure for multi-user/multi-tool engineering. 1486-1491 - Dae-Kyoo Kim

, Byunghun Lee:
Pattern-based transformation of sequence diagrams using QVT. 1492-1497 - Mirko Perkusich

, Amaury Medeiros, Lenardo Chaves e Silva
, Kyller Costa Gorgônio
, Hyggo Oliveira de Almeida
, Angelo Perkusich
:
A Bayesian network approach to assist on the interpretation of software metrics. 1498-1503 - Gregory Malecha

, Ashish Gehani, Natarajan Shankar:
Automated software winnowing. 1504-1511 - Djamel Eddine Khelladi, Reda Bendraou

, Souheib Baarir, Yoann Laurent, Marie-Pierre Gervais:
A framework to formally verify conformance of a software process to a software method. 1518-1525 - Khalid Alemerien

, Kenneth Magel:
SLC: a visual cohesion metric to predict the usability of graphical user interfaces. 1526-1533 - Everton L. G. Alves, Tiago Massoni

, Patrícia Duarte de Lima Machado:
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring. 1534-1540 - Daricélio Moreira Soares, Manoel Limeira de Lima Júnior

, Leonardo Murta, Alexandre Plastino:
Acceptance factors of pull requests in open-source projects. 1541-1546 - Andrei Costa, Simone André da Costa Cavalheiro, Luciana Foss, Leila Ribeiro:

From UML diagrams to simulink models: a precise and verified translation. 1547-1552 - Tao Zhang

, Geunseok Yang, Byungjeong Lee, Alvin T. S. Chan:
Predicting severity of bug report by mining bug repository with concept profile. 1553-1558 - Alexander Elyasov, Wishnu Prasetya

, Jurriaan Hage
, Urko Rueda, Tanja E. J. Vos, Nelly Condori-Fernández
:
AB=ᗺA: execution equivalence as a new type of testing oracle. 1559-1566 - Manoel Limeira de Lima Júnior

, Daricélio Moreira Soares, Alexandre Plastino, Leonardo Murta:
Developers assignment for analyzing pull requests. 1567-1572 - Misael Mongiovì

, G. Giannone, Andrea Fornaia, Giuseppe Pappalardo, Emiliano Tramontana:
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications. 1573-1579 - Eleni Constantinou, Ioannis Stamelos:

Architectural stability and evolution measurement for software reuse. 1580-1585 - Haneen Dabain, Ayesha Manzer, Vassilios Tzerpos:

Design pattern detection using FINDER. 1586-1593 - Germano Duarte Mergel, Milene Selbach Silveira, Tiago Silva da Silva:

A method to support search string building in systematic literature reviews through visual text mining. 1594-1601 - Mariem Mefteh, Nadia Bouassida, Hanêne Ben-Abdallah

:
Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams. 1602-1609 - Daniel E. Krutz, Samuel A. Malachowsky, Emad Shihab:

Examining the effectiveness of using concolic analysis to detect code clones. 1610-1615 - Demóstenes Sena, Roberta Coelho, Uirá Kulesza:

An investigation on the evolutionary nature of exception handling violations in software product lines. 1616-1623 - Prachi Joshi, Sandeep K. Shukla, Jean-Pierre Talpin, Huafeng Yu:

Mapping functional behavior onto architectural model in a model driven embedded system design. 1624-1630 - Loris D'Avanzo, Filomena Ferrucci, Carmine Gravino, Pasquale Salza

:
COSMIC functional measurement of mobile applications and code size estimation. 1631-1636 - Kostyantyn Vorobyov, Padmanabhan Krishnan, Phil Stocks:

A concise specification language for trace monitoring. 1637-1640 - Aitor Murguzur, Salvador Trujillo, Goiuria Sagardui

:
Dynamic variability support in workflow-based systems: an evaluation of the LateVa framework. 1641-1643 - Xiao Xuan, David Lo

, Xin Xia
, Yuan Tian:
Evaluating defect prediction approaches using a massive set of metrics: an empirical study. 1644-1647 - Hiroaki Fukuda, Paul Leger

:
A library to modularly control asynchronous executions. 1648-1650 - Hong Anh Le

, Ninh-Thuan Truong, Shin Nakajima:
Verifying eventuality properties of imprecise system requirements using event-B. 1651-1653 - Mívian M. Ferreira, Kecia A. M. Ferreira, Humberto T. Marques-Neto

:
Mapping the potential change impact in object-oriented software. 1654-1656 - Renata M. S. Santos, Toacy C. Oliveira

, Fernando Brito e Abreu
:
Mining software development process variations. 1657-1660 - Mario Hozano, Henrique Ferreira, Italo Carlo Lopes Silva, Baldoino Fonseca, Evandro Costa:

Using developers' feedback to improve code smell detection. 1661-1663 - Filomena Ferrucci, Pasquale Salza

, M. Tahar Kechadi
, Federica Sarro
:
A parallel genetic algorithms framework based on Hadoop MapReduce. 1664-1667 - Hwi Ahn:

Reconstruction of runtime software architecture for object-oriented systems. 1668-1669
Volume II: Software development, system software and security: Service-oriented architecture and programming track
- Dionisis Margaris

, Costas Vassilakis
, Panagiotis Georgiadis:
A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data. 1672-1679 - Cleiton dos Santos Garcia

, Marco Paludo, Andreia Malucelli, Sheila S. Reinehr
:
A software process line for service-oriented applications. 1680-1687 - Gregorio Díaz

, María-Emilia Cambronero, Hermenegilda Macià
, Valentín Valero Ruiz
:
Model-checking verification of publish-subscribe architectures in web service contexts. 1688-1695 - Dimas C. Nascimento

, Carlos Eduardo S. Pires
, Demetrio Gomes Mestre:
A data quality-aware cloud service based on metaheuristic and machine learning provisioning algorithms. 1696-1703 - Elvinia Riccobene, Patrizia Scandurra

:
Formal modeling self-adaptive service-oriented applications. 1704-1710 - Rui André Oliveira

, Nuno Laranjeiro
, Marco Vieira
:
Characterizing the performance of web service frameworks under security attacks. 1711-1718 - Nayane Ponte Viana, Fernando A. M. Trinta, Ricardo Viana

, Rossana M. C. Andrade
, Vinicius Cardoso Garcia
, Rodrigo Elia Assad:
A service-oriented architecture for billing resources in IaaS cloud platforms. 1719-1721
Volume II: Software development, system software and security: Software verification and testing track
- Ali Sunyaev, Dirk Basten:

Truth and myth of independent software testing: a controlled human experiment. 1722-1728 - Marie-Christine Jakobs

, Heike Wehrheim:
Programs from proofs of predicated dataflow analyses. 1729-1736 - Hadrien Bride, Jacques Julliand, Pierre-Alain Masson:

Tri-modal under-approximation of event systems for test generation. 1737-1744 - Francesco Alberti, David Monniaux:

Polyhedra to the rescue of array interpolants. 1745-1750 - Pierre-Alain Bourdil, Bernard Berthomieu, Silvano Dal-Zilio

, François Vernadat:
Symmetry reduced state classes for time petri nets. 1751-1758 - Clément Poncelet Sanchez, Florent Jacquemard:

Model based testing of an interactive music system. 1759-1764 - Arvid Jakobsson, Nikolai Kosmatov

, Julien Signoles
:
Fast as a shadow, expressive as a tree: hybrid memory monitoring for C. 1765-1772 - Mohammed Bekkouche

, Hélène Collavizza, Michel Rueher:
LocFaults: a new flow-driven and constraint-based error localization approach. 1773-1780 - Carlos Gregorio-Rodríguez

, Luis Llana
, Rafael Martínez-Torres:
Extending mCRL2 with ready simulation and iocos input-output conformance simulation. 1781-1788 - Hadil Charafeddine, Khalil El-Harake, Yliès Falcone, Mohamad Jaber

:
Runtime enforcement for component-based systems. 1789-1796 - Andrea Calvagna

, Andrea Fornaia, Emiliano Tramontana:
Random versus combinatorial effectiveness in software conformance testing: a case study. 1797-1802 - Daniel Homm, Juergen Eckert, Reinhard German:

Concurrent streams in Markov chain usage models for statistical testing of complex systems. 1803-1807 - José Dihego, Augusto Sampaio, Marcel Vinícius Medeiros Oliveira

:
Constructive extensibility of trustworthy component-based systems. 1808-1814 - Taejoon Byun, Yunja Choi:

Automated system-level safety testing using constraint patterns for automotive operating systems. 1815-1822 - Gergely Buday:

Formalising the SECD machine with nominal Isabelle. 1823-1824
Volume II: Software development, system software and security: Coordination models, languages and applications track
- Anders Fongen:

Data-centric authorization and integrity control in a Linda tuplespace. 1827-1833 - Éric Badouel, Loïc Hélouët, Georges Edouard Kouamou, Christophe Morvan:

A grammatical approach to data-centric case management in a distributed collaborative environment. 1834-1839 - Yehia Abd Alrahman

, Rocco De Nicola
, Michele Loreti
, Francesco Tiezzi, Roberto Vigo:
A calculus for attribute-based communication. 1840-1845 - Danilo Pianini

, Mirko Viroli, Jacob Beal:
Protelis: practical aggregate programming. 1846-1853 - Luís Moreira de Sousa

, Alberto Rodrigues da Silva
:
A domain specific language for spatial simulation scenarios (DSL3S): introduction and tool support. 1854-1856 - Dhaminda B. Abeywickrama

, Nikola B. Serbedzija, Michele Loreti
:
Monitoring and visualizing adaptation of autonomic systems at runtime. 1857-1860
Volume II: Software development, system software and security: Constraint solving and programming track
- Roberto Amadini

, Maurizio Gabbrielli
, Jacopo Mauro
:
SUNNY-CP: a sequential CP portfolio solver. 1861-1867 - Alia El Bolock

, Slim Abdennadher:
Towards automatic poetry generation using constraint handling rules. 1868-1873 - Michael Sioutis

, Yakoub Salhi
, Jean-François Condotta:
On the use and effect of graph decomposition in qualitative spatial and temporal reasoning. 1874-1879 - Takahisa Toda, Koji Tsuda:

BDD construction for all solutions SAT and efficient caching mechanism. 1880-1886 - Dimitar Sht. Shterionov

, Gerda Janssens:
Crucial components in probabilistic inference pipelines. 1887-1889
Volume II: Software development, system software and security: Embedded systems track
- Marco Ziccardi, Martin Schoeberl

, Tullio Vardanega
:
A time-composable operating system for the Patmos processor. 1892-1897 - Wolfgang Puffitsch

:
Persistence-based branch misprediction bounds for WCET analysis. 1898-1905 - Ming-Chang Yang, Yu-Ming Chang, Po-Chun Huang, Yuan-Hao Chang

, Lue-Jane Lee, Tei-Wei Kuo
:
Reliability-aware striping with minimized performance overheads for flash-based storage devices. 1906-1912 - Hemangee K. Kapoor, Shirshendu Das, Shounak Chakraborty

:
Static energy reduction by performance linked cache capacity management in tiled CMPs. 1913-1918 - Shirshendu Das, Hemangee K. Kapoor:

Dynamic associativity management using utility based way-sharing. 1919-1924 - José Carlos Fonseca, Vincent Nélis

, Gurulingesh Raravi, Luís Miguel Pinho
:
A multi-DAG model for real-time parallel applications with conditional execution. 1925-1932 - Arnaud Dieumegard, Pierre-Loïc Garoche, Temesghen Kahsai, Alice Taillar, Xavier Thirioux:

Compilation of synchronous observers as code contracts. 1933-1939 - Fabio Cremona, Matteo Morelli

, Marco Di Natale:
TRES: a modular representation of schedulers, tasks, and messages to control simulations in simulink. 1940-1947 - Matteo Morelli

:
Automated generation of robotics applications from simulink and SysML models. 1948-1954 - Gabriel Fernandez, Jaume Abella

, Eduardo Quiñones
, Tullio Vardanega
, Luca Fossati, Marco Zulianello, Francisco J. Cazorla
:
Introduction to partial time composability for COTS multicores. 1955-1956 - Edward Jung, Cédric Marchand

, Lilian Bossuet:
Identification of embedded control units by state encoding and power consumption analysis. 1957-1959 - Fouad Khenfri

:
A holistic optimization approach for the synthesis of AUTOSAR E/E architecture. 1960-1961
Volume II: Software development, system software and security: Object oriented programming languages and systems track
- Kouhei Sakurai, Hidehiko Masuhara:

The omission finder for debugging what-should-have-happened bugs in object-oriented programs. 1962-1969 - Tobias Pape

, Carl Friedrich Bolz, Robert Hirschfeld:
Adaptive just-in-time value class optimization: transparent data structure inlining for fast execution. 1970-1977 - Nick Papoulias

, Marcus Denker
, Stéphane Ducasse, Luc Fabresse
:
Reifying the reflectogram: towards explicit control for implicit reflection. 1978-1985 - Cyrus Omar, Chenglong Wang, Jonathan Aldrich

:
Composable and hygienic typed syntax macros. 1986-1991 - Eden Burton, Emil Sekerinski:

The safety of dynamic mixin composition. 1992-1999
Volume II: Software development, system software and security: Operating systems track
- Minho Lee, Donghyun Kang

, Junghoon Kim, Young Ik Eom:
M-CLOCK: migration-optimized page replacement algorithm for hybrid DRAM and PCM memory architecture. 2001-2006 - Nikolaus Jeremic, Helge Parzyjegla, Gero Mühl:

Improving random write performance in heterogeneous erasure-coded drive arrays by offloading code block requests. 2007-2014 - Francieli Zanon Boito, Rodrigo Kassick, Philippe O. A. Navaux, Yves Denneulin:

Towards fast profiling of storage devices regarding access sequentiality. 2015-2020 - Shuichi Oikawa:

Exposing non-volatile memory cache for adaptive storage access. 2021-2026 - Juan Carlos Saez

, Adrian Pousa
, Fernando Castro
, Daniel Chaver
, Manuel Prieto-Matías
:
ACFS: a completely fair scheduler for asymmetric single-isa multicore systems. 2027-2032 - Anselm Busse

, Jan Hendrik Schönherr, Matthias Diener
, Philippe O. A. Navaux, Hans-Ulrich Heiß:
Partial coscheduling of virtual machines based on memory access patterns. 2033-2038 - Dongwook Kim, Sooyong Kang:

Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD. 2039-2046 - Eunjae Lee, Yongseok Oh, Donghee Lee:

SSD caching to overcome small write problem of disk-based RAID in enterprise environments. 2047-2053 - Taís Borges Ferreira, Rivalino Matias, Autran Macedo, Bruno Evangelista Costa:

An experimental comparison analysis of kernel-level memory allocators. 2054-2059 - Yong-Yeon Jo, Sungwoo Cho, Sang-Wook Kim, Duck-Ho Bae, Hyunok Oh:

On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach. 2060-2065 - Eduardo Camilo Inacio

, Mario A. R. Dantas
, Francieli Zanon Boito, Philippe Olivier Alexandre Navaux, Douglas Dyllon Jeronimo de Macedo
:
Performance impact of operating systems' caching parameters on parallel file systems. 2066-2068 - Kyungjun Lee, Sungtae Ryu, Hwansoo Han:

Performance implications of cache flushes for non-volatile memory file systems. 2069-2071 - Donghee Min, Taegyu Hwang, Joonhyouk Jang, Yookun Cho, Jiman Hong:

An efficient backup-recovery technique to process large data in distributed key-value store. 2072-2074 - Junghoon Lee, Gyung-Leen Park:

Search space reduction for electric vehicle-based tour schedules. 2075-2076
Volume II: Software development, system software and security: Programming languages track
- Yasunao Takano, Hideya Iwasaki

:
Thunk recycling for lazy functional languages: operational semantics and correctness. 2079-2086 - Irene Córdoba-Sánchez

, Juan de Lara:
A modelling language for the effective design of Java annotations. 2087-2092 - Rodrigo Medeiros Duarte, André Rauber Du Bois, Maurício Lima Pilla, Gerson Geraldo Homrich Cavalheiro:

Composable memory transactions with eager version management. 2093-2098 - Frédéric Dabrowski, Frédéric Loulergue

, Thomas Pinsard:
Nested atomic sections with thread escape: compilation. 2099-2106 - Reed Milewicz, Rajeshwar Vanka, James Tuck

, Daniel J. Quinlan, Peter Pirkelbauer:
Runtime checking C programs. 2107-2114 - Michaela Bacíková

, Jaroslav Porubän
, Sergej Chodarev
, Milan Nosál
:
Bootstrapping DSLs from user interfaces. 2115-2118 - Michael Lopez, Gabriel Dos Reis:

Meta-programming with well-typed code analysis. 2119-2121 - Sergii Dymchenko, Mariia Mykhailova:

Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP system. 2122-2124
Volume II: Software development, system software and security: Computer security track
- Byungho Min, Vijay Varadharajan

:
Design, implementation and evaluation of a novel anti-virus parasitic malware. 2127-2133 - Florian Kerschbaum:

Oblivious outsourcing of garbled circuit generation. 2134-2140 - Maarten Decat, Jasper Bogaerts, Bert Lagaisse

, Wouter Joosen:
Amusa: middleware for efficient access control management of multi-tenant SaaS applications. 2141-2148 - Bastian Braun, Korbinian Pauli, Joachim Posegga, Martin Johns

:
LogSec: adaptive protection for the wild wild web. 2149-2156 - Pengcheng Wang, Xue Yu, Shuai Chen, Padmaja Duggisetty, Shuo Guo, Tilman Wolf:

Cryptopaper: digital information security for physical documents. 2157-2164 - Romuald Thion, François Lesueur, Meriam Ben-Ghorbel-Talbi:

Tuple-based access control: a provenance-based information flow control for relational data. 2165-2170 - Philippe De Ryck, Lieven Desmet

, Frank Piessens, Wouter Joosen:
SecSess: keeping your session tucked away in your browser. 2171-2176 - Silvio Ranise

, Anh Tuan Truong, Luca Viganò
:
Automated analysis of RBAC policies with temporal constraints and static role hierarchies. 2177-2184 - Davy Preuveneers, Wouter Joosen:

SmartAuth: dynamic context fingerprinting for continuous user authentication. 2185-2191 - Kaiqi Xiong, Peng Ning:

Cost-efficient and attack-resilient approaches for state estimation in power grids. 2192-2197
Volume II: Software development, system software and security: Smart grid and smart technologies track
- Erik Jagroep, Jan Martijn E. M. van der Werf

, Slinger Jansen
, Miguel Alexandre Ferreira, Joost Visser
:
Profiling energy profilers. 2198-2203 - Valentin Tudor, Magnus Almgren

, Marina Papatriantafilou
:
Harnessing the unknown in advanced metering infrastructure traffic. 2204-2211 - Yona Lopes

, Natalia Castro Fernandes
, Carlos Alberto Malcher Bastos
, Débora C. Muchaluat-Saade:
SMARTFlow: a solution for autonomic management and control of communication networks for smart grids. 2212-2217 - Pedro Barbosa, Andrey Brito, Hyggo O. Almeida

:
Defending against load monitoring in smart metering data through noise addition. 2218-2224 - Jin Xu, Shinjae Yoo

, Dantong Yu, Dong Huang, John Heiser, Paul Kalb
:
Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction. 2225-2230 - Julian L. Rrushi, Hassan Farhangi, Radina Nikolic, Clay Howey, Kelly Carmichael, Ali Palizban:

By-design vulnerabilities in the ANSI C12.22 protocol specification. 2231-2236
Volume II: Software development, system software and security: Software platforms track
- Federico Bergenti

, Giovanni Caire, Danilo Gotta:
A scalable platform for mobile social gaming. 2239-2244 - Sheng-Wei Cheng, Che-Wei Chang, Yuan-Hao Chang

, Pi-Cheng Hsiu
, Chia-Heng Tu:
The deployment of shared data objects among handheld and wearable devices. 2245-2251 - Samaneh Aminikhanghahi

, Sung Y. Shin, Wei Wang, Soon-Ik Jeon, Seong-Ho Son
, Chulwoo Pack
:
Study of wireless mammography image transmission impacts on robust cyber-aided diagnosis systems. 2252-2256 - Qiang Duan, Mengxi Zeng, Jun Huang, Cong-Cong Xing:

Performance analysis for a service delivery platform in software defined network. 2257-2262 - M. C. López-Casado

, Carlos Jesús Pérez-del-Pulgar
, J. Cabello-Castillo, Victor F. Muñoz, Gil O. Lara, Alberto J. Castro-Tirado
, Jan Strobl
, E. Maureira, J. Maza, Sergey Karpov
, Francisco Manuel Sánchez:
GlSch: a novel scheduler for a heterogeneous telescope network. 2263-2270 - Assaad Moawad, Thomas Hartmann, François Fouquet, Jacques Klein

, Yves Le Traon
:
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services. 2271-2278 - Abida Shahzad, Hyunho Ji, Pankoo Kim, Hanil Kim, Byeong-Kyu Ko, Jiman Hong:

Application-level task execution issues in mobile cloud computing. 2285-2287 - Pekka Pääkkönen, Daniel Pakkala

:
The implications of disk-based RAID and virtualization for write-intensive services. 2288-2291
Volume II: Software development, system software and security: Trust, reputation, evidence and other collaboration know-how track
- Samane Abdi, John Herbert:

An algorithm for distributed certificate chain discovery in open environments. 2292-2298 - Daniel Vecchiato, Marco Vieira

, Eliane Martins:
A security configuration assessment for android devices. 2299-2304 - Avinash Sharma, Tridib Mukherjee, Partha Dutta, Vinay Gangadhar Hegde:

Bi-directional trust index computation in resource marketplace. 2305-2311 - Dimitra Gkorou, Johan A. Pouwelse

, Dick H. J. Epema:
Trust-based collection of information in distributed reputation networks. 2312-2319 - Andreas Kokoschka, Ronald Petrlic, Christoph Sorge:

A reputation system supporting unlinkable, yet authorized expert ratings. 2320-2327 - Gabriel Preti Santiago, Adriano C. M. Pereira

, Roberto Hirata Jr.
:
A modeling approach for credit card fraud detection in electronic payment services. 2328-2331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














