callback( { "result":{ "query":":facetid:toc:\"db/conf/compsac/compsac2018-1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"194.70" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"173", "@dc":"173", "@oc":"173", "@id":"43386275", "text":":facetid:toc:db/conf/compsac/compsac2018-1.bht" } }, "hits":{ "@total":"173", "@computed":"173", "@sent":"173", "@first":"0", "hit":[{ "@score":"1", "@id":"2539917", "info":{"authors":{"author":[{"@pid":"05/2700-1","text":"Bo Cheng 0001"},{"@pid":"116/8682-1","text":"Shuai Zhao 0001"},{"@pid":"63/6051","text":"Junliang Chen"}]},"title":"Remote Monitoring and Control Web Service for Internet of Heating.","venue":"COMPSAC","pages":"785-786","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/00010C18","doi":"10.1109/COMPSAC.2018.00119","ee":"https://doi.org/10.1109/COMPSAC.2018.00119","url":"https://dblp.org/rec/conf/compsac/00010C18"}, "url":"URL#2539917" }, { "@score":"1", "@id":"2539919", "info":{"authors":{"author":[{"@pid":"181/2702-3","text":"Jie Tang 0003"},{"@pid":"32/4500","text":"Shaoshan Liu"},{"@pid":"61/763","text":"Songwen Pei"},{"@pid":"81/2622","text":"Stéphane Zuckerman"},{"@pid":"10/2639-1","text":"Chen Liu 0001"},{"@pid":"s/WeisongShi","text":"Weisong Shi"},{"@pid":"g/JeanLucGaudiot","text":"Jean-Luc Gaudiot"}]},"title":"Teaching Autonomous Driving Using a Modular and Integrated Approach.","venue":"COMPSAC","pages":"361-366","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/0003LPZ0SG18","doi":"10.1109/COMPSAC.2018.00057","ee":"https://doi.org/10.1109/COMPSAC.2018.00057","url":"https://dblp.org/rec/conf/compsac/0003LPZ0SG18"}, "url":"URL#2539919" }, { "@score":"1", "@id":"2539920", "info":{"authors":{"author":[{"@pid":"82/3167-10","text":"Yan Zhu 0010"},{"@pid":"66/10420","text":"Yao Qin"},{"@pid":"168/6327","text":"Guohua Gan"},{"@pid":"224/9728","text":"Yang Shuai"},{"@pid":"c/WilliamCChu","text":"William Cheng-Chung Chu"}]},"title":"TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization.","venue":"COMPSAC","pages":"535-544","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/0010QGSC18","doi":"10.1109/COMPSAC.2018.00083","ee":"https://doi.org/10.1109/COMPSAC.2018.00083","url":"https://dblp.org/rec/conf/compsac/0010QGSC18"}, "url":"URL#2539920" }, { "@score":"1", "@id":"2539921", "info":{"authors":{"author":[{"@pid":"82/3167-10","text":"Yan Zhu 0010"},{"@pid":"72/7503","text":"Shuai Yang"},{"@pid":"168/6327","text":"Guohua Gan"},{"@pid":"02/2315","text":"Xiao He"}]},"title":"An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table.","venue":"COMPSAC","pages":"914-919","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/0010YGH18","doi":"10.1109/COMPSAC.2018.00157","ee":"https://doi.org/10.1109/COMPSAC.2018.00157","url":"https://dblp.org/rec/conf/compsac/0010YGH18"}, "url":"URL#2539921" }, { "@score":"1", "@id":"2539924", "info":{"authors":{"author":[{"@pid":"141/0848","text":"Golam Mushih Tanimul Ahsan"},{"@pid":"224/9586","text":"Jannatul Ferdause Tumpa"},{"@pid":"224/9609","text":"Riddhiman Adib"},{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"141/0927","text":"Daniel Petereit"},{"@pid":"141/0863","text":"Linda Burhansstipanov"},{"@pid":"141/0826","text":"Linda U. Krebs"},{"@pid":"156/1677","text":"Mark Dignan"}]},"title":"A Culturally Tailored Intervention System for Cancer Survivors to Motivate Physical Activity.","venue":"COMPSAC","pages":"875-880","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AhsanTAAPBKD18","doi":"10.1109/COMPSAC.2018.00151","ee":"https://doi.org/10.1109/COMPSAC.2018.00151","url":"https://dblp.org/rec/conf/compsac/AhsanTAAPBKD18"}, "url":"URL#2539924" }, { "@score":"1", "@id":"2539926", "info":{"authors":{"author":[{"@pid":"81/193","text":"Toyokazu Akiyama"},{"@pid":"67/5534","text":"Maria Lee"}]},"title":"Message from The Student Research Symposium Co-Chairs.","venue":"COMPSAC","pages":"938","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AkiyamaL18","doi":"10.1109/COMPSAC.2018.00161","ee":"https://doi.org/10.1109/COMPSAC.2018.00161","url":"https://dblp.org/rec/conf/compsac/AkiyamaL18"}, "url":"URL#2539926" }, { "@score":"1", "@id":"2539929", "info":{"authors":{"author":[{"@pid":"224/9523","text":"Junaid Akram"},{"@pid":"161/9275","text":"Zhendong Shi"},{"@pid":"224/9577","text":"Majid Mumtaz"},{"@pid":"54/4989-4","text":"Ping Luo 0004"}]},"title":"DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.","venue":"COMPSAC","pages":"100-105","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AkramSML18","doi":"10.1109/COMPSAC.2018.00021","ee":"https://doi.org/10.1109/COMPSAC.2018.00021","url":"https://dblp.org/rec/conf/compsac/AkramSML18"}, "url":"URL#2539929" }, { "@score":"1", "@id":"2539932", "info":{"authors":{"author":[{"@pid":"138/0501","text":"Jordi Aranda"},{"@pid":"29/5284","text":"Jordi Nin Guerrero"},{"@pid":"74/6646","text":"Javier Herranz"}]},"title":"Answering Multiple Aggregate Queries Under a Specific Privacy Condition.","venue":"COMPSAC","pages":"661-666","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ArandaGH18","doi":"10.1109/COMPSAC.2018.00099","ee":"https://doi.org/10.1109/COMPSAC.2018.00099","url":"https://dblp.org/rec/conf/compsac/ArandaGH18"}, "url":"URL#2539932" }, { "@score":"1", "@id":"2539934", "info":{"authors":{"author":[{"@pid":"224/9603","text":"Salma Ayari"},{"@pid":"75/35","text":"Yosra Ben Dali Hlaoui"},{"@pid":"j/LeilaJemniBenAyed","text":"Leila Jemni Ben Ayed"}]},"title":"A New Approach for the Verification of BPMN Models Using Refinement Patterns.","venue":"COMPSAC","pages":"807-808","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AyariHA18","doi":"10.1109/COMPSAC.2018.00130","ee":"https://doi.org/10.1109/COMPSAC.2018.00130","url":"https://dblp.org/rec/conf/compsac/AyariHA18"}, "url":"URL#2539934" }, { "@score":"1", "@id":"2539936", "info":{"authors":{"author":[{"@pid":"190/3593","text":"Mohammed Balfas"},{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"168/6398","text":"Chandana P. Tamma"},{"@pid":"67/3312-6","text":"Muhammad Arif 0006"},{"@pid":"62/4042","text":"Ahmed J. Kattan"},{"@pid":"c/WilliamCChu","text":"William C. C. Chu"}]},"title":"A Study and Estimation a Lost Person Behavior in Crowded Areas Using Accelerometer Data from Smartphones.","venue":"COMPSAC","pages":"860-865","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BalfasATAKC18","doi":"10.1109/COMPSAC.2018.00149","ee":"https://doi.org/10.1109/COMPSAC.2018.00149","url":"https://dblp.org/rec/conf/compsac/BalfasATAKC18"}, "url":"URL#2539936" }, { "@score":"1", "@id":"2539939", "info":{"authors":{"author":[{"@pid":"48/9586","text":"Irena Bojanova"},{"@pid":"y/YaacovYesha","text":"Yaacov Yesha"},{"@pid":"16/6383","text":"Paul E. Black"}]},"title":"Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN).","venue":"COMPSAC","pages":"738-745","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BojanovaYB18","doi":"10.1109/COMPSAC.2018.00110","ee":"https://doi.org/10.1109/COMPSAC.2018.00110","url":"https://dblp.org/rec/conf/compsac/BojanovaYB18"}, "url":"URL#2539939" }, { "@score":"1", "@id":"2539941", "info":{"authors":{"author":[{"@pid":"02/4655","text":"Iris Braun"},{"@pid":"131/6293","text":"Tenshi Hara"},{"@pid":"151/1189","text":"Felix Kapp"},{"@pid":"224/9660","text":"Lucas Braeschke"},{"@pid":"51/3949","text":"Alexander Schill"}]},"title":"Technology-Enhanced Self-Regulated Learning: Assessment Support Through an Evaluation Centre.","venue":"COMPSAC","pages":"1032-1037","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BraunHKBS18","doi":"10.1109/COMPSAC.2018.00180","ee":"https://doi.org/10.1109/COMPSAC.2018.00180","url":"https://dblp.org/rec/conf/compsac/BraunHKBS18"}, "url":"URL#2539941" }, { "@score":"1", "@id":"2539942", "info":{"authors":{"author":[{"@pid":"198/2089","text":"Aji Ery Burhandenny"},{"@pid":"21/5939","text":"Hirohisa Aman"},{"@pid":"39/1005","text":"Minoru Kawahara"}]},"title":"Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance.","venue":"COMPSAC","pages":"837-838","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BurhandennyAK18","doi":"10.1109/COMPSAC.2018.00145","ee":"https://doi.org/10.1109/COMPSAC.2018.00145","url":"https://dblp.org/rec/conf/compsac/BurhandennyAK18"}, "url":"URL#2539942" }, { "@score":"1", "@id":"2539943", "info":{"authors":{"author":[{"@pid":"60/7439","text":"Luca Cagliero"},{"@pid":"89/10509","text":"Luigi De Russis"},{"@pid":"79/5240","text":"Laura Farinetti"},{"@pid":"146/4778","text":"Teodoro Montanaro"}]},"title":"Improving the Effectiveness of SQL Learning Practice: A Data-Driven Approach.","venue":"COMPSAC","pages":"980-989","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CaglieroRFM18","doi":"10.1109/COMPSAC.2018.00174","ee":"https://doi.org/10.1109/COMPSAC.2018.00174","url":"https://dblp.org/rec/conf/compsac/CaglieroRFM18"}, "url":"URL#2539943" }, { "@score":"1", "@id":"2539944", "info":{"authors":{"author":[{"@pid":"74/6521","text":"Yuan Cai"},{"@pid":"05/6715","text":"Wei Luo"},{"@pid":"74/1128","text":"Dong Xiang"}]},"title":"The Column-Partition and Row-Partition Turn Model.","venue":"COMPSAC","pages":"687-694","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CaiLX18","doi":"10.1109/COMPSAC.2018.00103","ee":"https://doi.org/10.1109/COMPSAC.2018.00103","url":"https://dblp.org/rec/conf/compsac/CaiLX18"}, "url":"URL#2539944" }, { "@score":"1", "@id":"2539945", "info":{"authors":{"author":[{"@pid":"86/259","text":"Rui Cao"},{"@pid":"07/6449","text":"Zhaoyang Yu"},{"@pid":"169/9502","text":"Trent G. Marbach"},{"@pid":"l/JingLi36","text":"Jing Li 0036"},{"@pid":"71/4292-1","text":"Gang Wang 0001"},{"@pid":"25/1221-1","text":"Xiaoguang Liu 0001"}]},"title":"Load Prediction for Data Centers Based on Database Service.","venue":"COMPSAC","pages":"728-737","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CaoYML0L18","doi":"10.1109/COMPSAC.2018.00109","ee":"https://doi.org/10.1109/COMPSAC.2018.00109","url":"https://dblp.org/rec/conf/compsac/CaoYML0L18"}, "url":"URL#2539945" }, { "@score":"1", "@id":"2539946", "info":{"authors":{"author":[{"@pid":"c/WingKwonChan","text":"W. K. Chan 0001"},{"@pid":"55/521-2","text":"Hong Zhu 0002"}]},"title":"Message from SETA 2018 Symposium Chairs.","venue":"COMPSAC","pages":"1","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChanZ18","doi":"10.1109/COMPSAC.2018.00185","ee":"https://doi.org/10.1109/COMPSAC.2018.00185","url":"https://dblp.org/rec/conf/compsac/ChanZ18"}, "url":"URL#2539946" }, { "@score":"1", "@id":"2539947", "info":{"authors":{"author":[{"@pid":"33/3869","text":"Hsung-Pin Chang"},{"@pid":"224/9648","text":"Yu-Cain He"},{"@pid":"91/3371","text":"Da-Wei Chang"}]},"title":"An Integrated Memory and SSD Caching I/O Subsystem.","venue":"COMPSAC","pages":"823-824","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChangHC18","doi":"10.1109/COMPSAC.2018.00138","ee":"https://doi.org/10.1109/COMPSAC.2018.00138","url":"https://dblp.org/rec/conf/compsac/ChangHC18"}, "url":"URL#2539947" }, { "@score":"1", "@id":"2539949", "info":{"authors":{"author":[{"@pid":"92/6289","text":"Jie Chen"},{"@pid":"16/1889","text":"Chun Cao"},{"@pid":"13/6769","text":"Ying Zhang"},{"@pid":"67/3058","text":"Xiaoxing Ma"},{"@pid":"69/7717","text":"Haiwei Zhou"},{"@pid":"89/8178","text":"Chengwei Yang"}]},"title":"Improving Cluster Resource Efficiency with Oversubscription.","venue":"COMPSAC","pages":"144-153","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenCZMZY18","doi":"10.1109/COMPSAC.2018.00027","ee":"https://doi.org/10.1109/COMPSAC.2018.00027","url":"https://dblp.org/rec/conf/compsac/ChenCZMZY18"}, "url":"URL#2539949" }, { "@score":"1", "@id":"2539950", "info":{"authors":{"author":[{"@pid":"19/1766-2","text":"Ting Chen 0002"},{"@pid":"223/1897","text":"Wanyu Huang"},{"@pid":"203/0794","text":"Muhui Jiang"},{"@pid":"53/1565","text":"Xiapu Luo"},{"@pid":"68/2052-1","text":"Lei Xue 0001"},{"@pid":"94/3104","text":"Ying Wang"},{"@pid":"26/3075-1","text":"Xiaosong Zhang 0001"}]},"title":"PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.","venue":"COMPSAC","pages":"276-285","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenHJLXWZ18","doi":"10.1109/COMPSAC.2018.00044","ee":"https://doi.org/10.1109/COMPSAC.2018.00044","url":"https://dblp.org/rec/conf/compsac/ChenHJLXWZ18"}, "url":"URL#2539950" }, { "@score":"1", "@id":"2539951", "info":{"authors":{"author":[{"@pid":"79/6121","text":"Tsung Teng Chen"},{"@pid":"95/6278","text":"Maria R. Lee"}]},"title":"Deciphering Big Data Research Themes.","venue":"COMPSAC","pages":"432-437","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenL18","doi":"10.1109/COMPSAC.2018.00066","ee":"https://doi.org/10.1109/COMPSAC.2018.00066","url":"https://dblp.org/rec/conf/compsac/ChenL18"}, "url":"URL#2539951" }, { "@score":"1", "@id":"2539952", "info":{"authors":{"author":[{"@pid":"224/9745","text":"Huanchao Chen"},{"@pid":"16/5205","text":"Zhiyong Liu"},{"@pid":"45/2913","text":"Xiangping Chen"},{"@pid":"63/3122-1","text":"Fan Zhou 0001"},{"@pid":"24/7032","text":"Xiaonan Luo"}]},"title":"Automatically Detecting the Scopes of Source Code Comments.","venue":"COMPSAC","pages":"164-173","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenLC0L18","doi":"10.1109/COMPSAC.2018.00029","ee":"https://doi.org/10.1109/COMPSAC.2018.00029","url":"https://dblp.org/rec/conf/compsac/ChenLC0L18"}, "url":"URL#2539952" }, { "@score":"1", "@id":"2539955", "info":{"authors":{"author":[{"@pid":"189/4392","text":"Dongdong Cheng"},{"@pid":"20/6154","text":"Qingsheng Zhu"},{"@pid":"16/11327","text":"Quanwang Wu"}]},"title":"A Local Cores-Based Hierarchical Clustering Algorithm for Data Sets with Complex Structures.","venue":"COMPSAC","pages":"410-419","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChengZW18","doi":"10.1109/COMPSAC.2018.00063","ee":"https://doi.org/10.1109/COMPSAC.2018.00063","url":"https://dblp.org/rec/conf/compsac/ChengZW18"}, "url":"URL#2539955" }, { "@score":"1", "@id":"2539956", "info":{"authors":{"author":[{"@pid":"192/6337","text":"Jianlei Chi"},{"@pid":"70/7820","text":"Yu Qu"},{"@pid":"32/1858","text":"Qinghua Zheng"},{"@pid":"97/3485-6","text":"Zijiang Yang 0006"},{"@pid":"192/6334","text":"Wuxia Jin"},{"@pid":"40/538","text":"Di Cui"},{"@pid":"52/5150-2","text":"Ting Liu 0002"}]},"title":"Test Case Prioritization Based on Method Call Sequences.","venue":"COMPSAC","pages":"251-256","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChiQZYJCL18","doi":"10.1109/COMPSAC.2018.00039","ee":"https://doi.org/10.1109/COMPSAC.2018.00039","url":"https://dblp.org/rec/conf/compsac/ChiQZYJCL18"}, "url":"URL#2539956" }, { "@score":"1", "@id":"2539963", "info":{"authors":{"author":[{"@pid":"83/1173","text":"Victor Clincy"},{"@pid":"67/1486","text":"Hossain Shahriar"}]},"title":"Web Application Firewall: Network Security Models and Configuration.","venue":"COMPSAC","pages":"835-836","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ClincyS18","doi":"10.1109/COMPSAC.2018.00144","ee":"https://doi.org/10.1109/COMPSAC.2018.00144","url":"https://dblp.org/rec/conf/compsac/ClincyS18"}, "url":"URL#2539963" }, { "@score":"1", "@id":"2539964", "info":{"authors":{"author":[{"@pid":"224/9585","text":"Rafael Neujahr Copstein"},{"@pid":"179/2805","text":"Vicenzo Abichequer Sangalli"},{"@pid":"224/9736","text":"Matheus Cruz Andrade"},{"@pid":"224/9722","text":"Lucas Almeida Machado"},{"@pid":"224/9570","text":"Evandro Rodrigues"},{"@pid":"179/2820","text":"Leonardo Pavanatto Soares"},{"@pid":"20/700","text":"Márcio Sarroglia Pinho"}]},"title":"Image Processing Strategies for Automatic Detection of Common Gastroenterological Diseases.","venue":"COMPSAC","pages":"593-598","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CopsteinSAMRSP18","doi":"10.1109/COMPSAC.2018.00090","ee":"https://doi.org/10.1109/COMPSAC.2018.00090","url":"https://dblp.org/rec/conf/compsac/CopsteinSAMRSP18"}, "url":"URL#2539964" }, { "@score":"1", "@id":"2539968", "info":{"authors":{"author":[{"@pid":"c/AlfredoCuzzocrea","text":"Alfredo Cuzzocrea"},{"@pid":"10/4428","text":"Rim Moussa"}]},"title":"Towards Lambda-Based Near Real-Time OLAP over Big Data.","venue":"COMPSAC","pages":"438-441","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CuzzocreaM18","doi":"10.1109/COMPSAC.2018.00067","ee":"https://doi.org/10.1109/COMPSAC.2018.00067","url":"https://dblp.org/rec/conf/compsac/CuzzocreaM18"}, "url":"URL#2539968" }, { "@score":"1", "@id":"2539970", "info":{"authors":{"author":[{"@pid":"198/2407","text":"Khanh-Huu-The Dam"},{"@pid":"23/6190","text":"Tayssir Touili"}]},"title":"Precise Extraction of Malicious Behaviors.","venue":"COMPSAC","pages":"229-234","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/DamT18","doi":"10.1109/COMPSAC.2018.00036","ee":"https://doi.org/10.1109/COMPSAC.2018.00036","url":"https://dblp.org/rec/conf/compsac/DamT18"}, "url":"URL#2539970" }, { "@score":"1", "@id":"2539971", "info":{"authors":{"author":[{"@pid":"198/1970","text":"Jakob Danielsson"},{"@pid":"128/0836","text":"Marcus Jägemar"},{"@pid":"91/459","text":"Moris Behnam"},{"@pid":"37/6301","text":"Mikael Sjödin"},{"@pid":"29/4116","text":"Tiberiu Seceleanu"}]},"title":"Measurement-Based Evaluation of Data-Parallelism for OpenCV Feature-Detection Algorithms.","venue":"COMPSAC","pages":"701-710","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/DanielssonJBSS18","doi":"10.1109/COMPSAC.2018.00105","ee":"https://doi.org/10.1109/COMPSAC.2018.00105","url":"https://dblp.org/rec/conf/compsac/DanielssonJBSS18"}, "url":"URL#2539971" }, { "@score":"1", "@id":"2539972", "info":{"authors":{"author":[{"@pid":"217/9311","text":"Maitraye Das"},{"@pid":"224/9519","text":"Nusrat Jahan Mozumder"},{"@pid":"141/9285","text":"Sharmin Afrose"},{"@pid":"224/9518","text":"Khandakar Ashrafi Akbar"},{"@pid":"37/4370","text":"Tanzima Hashem"}]},"title":"A Novel Secret Sharing Approach for Privacy-Preserving Authenticated Disease Risk Queries in Genomic Databases.","venue":"COMPSAC","pages":"645-654","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/DasMAAH18","doi":"10.1109/COMPSAC.2018.00097","ee":"https://doi.org/10.1109/COMPSAC.2018.00097","url":"https://dblp.org/rec/conf/compsac/DasMAAH18"}, "url":"URL#2539972" }, { "@score":"1", "@id":"2539973", "info":{"authors":{"author":[{"@pid":"36/3063","text":"Duo Ding"},{"@pid":"99/3187","text":"Minbo Li"},{"@pid":"35/1316","text":"Zhu Zhu"}]},"title":"Object Naming Service Supporting Heterogeneous Object Code Identification for IoT System.","venue":"COMPSAC","pages":"545-554","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/DingLZ18","doi":"10.1109/COMPSAC.2018.00084","ee":"https://doi.org/10.1109/COMPSAC.2018.00084","url":"https://dblp.org/rec/conf/compsac/DingLZ18"}, "url":"URL#2539973" }, { "@score":"1", "@id":"2539974", "info":{"authors":{"author":[{"@pid":"97/1908","text":"Hui Ding"},{"@pid":"166/4505","text":"Wanwangying Ma"},{"@pid":"13/3479-15","text":"Lin Chen 0015"},{"@pid":"06/3406","text":"Yuming Zhou"},{"@pid":"46/5742","text":"Baowen Xu"}]},"title":"Predicting the Breakability of Blocking Bug Pairs.","venue":"COMPSAC","pages":"219-228","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/DingMCZX18","doi":"10.1109/COMPSAC.2018.00035","ee":"https://doi.org/10.1109/COMPSAC.2018.00035","url":"https://dblp.org/rec/conf/compsac/DingMCZX18"}, "url":"URL#2539974" }, { "@score":"1", "@id":"2539978", "info":{"authors":{"author":[{"@pid":"24/892","text":"Tuan-Fang Fan"},{"@pid":"03/3350","text":"Churn-Jung Liau"}]},"title":"Possibilistic Reasoning About Actions in Agent Systems.","venue":"COMPSAC","pages":"787-788","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/FanL18","doi":"10.1109/COMPSAC.2018.00120","ee":"https://doi.org/10.1109/COMPSAC.2018.00120","url":"https://dblp.org/rec/conf/compsac/FanL18"}, "url":"URL#2539978" }, { "@score":"1", "@id":"2539979", "info":{"authors":{"author":[{"@pid":"43/8730","text":"Yucheng Fang"},{"@pid":"40/1796","text":"Huibiao Zhu"},{"@pid":"46/690","text":"Gang Lu"},{"@pid":"120/5031","text":"Lili Xiao"},{"@pid":"184/8116","text":"Wanling Xie"}]},"title":"Modeling and Verifying MooseFS in CSP.","venue":"COMPSAC","pages":"270-275","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/FangZLXX18","doi":"10.1109/COMPSAC.2018.00043","ee":"https://doi.org/10.1109/COMPSAC.2018.00043","url":"https://dblp.org/rec/conf/compsac/FangZLXX18"}, "url":"URL#2539979" }, { "@score":"1", "@id":"2539981", "info":{"authors":{"author":[{"@pid":"224/9620","text":"Tharidu Fernando"},{"@pid":"224/9657","text":"Nikita Gureev"},{"@pid":"m/MihhailMatskin","text":"Mihhail Matskin"},{"@pid":"36/3552","text":"Michael Zwick"},{"@pid":"41/521","text":"Thomas Natschläger"}]},"title":"WorkflowDSL: Scalable Workflow Execution with Provenance for Data Analysis Applications.","venue":"COMPSAC","pages":"774-779","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/FernandoGMZN18","doi":"10.1109/COMPSAC.2018.00115","ee":"https://doi.org/10.1109/COMPSAC.2018.00115","url":"https://dblp.org/rec/conf/compsac/FernandoGMZN18"}, "url":"URL#2539981" }, { "@score":"1", "@id":"2539990", "info":{"authors":{"author":[{"@pid":"50/3186","text":"Vladimir Getov"},{"@pid":"l/HongVaLeong","text":"Hong Va Leong"}]},"title":"Message from the MOWU Organizing Committee.","venue":"COMPSAC","pages":"839-841","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GetovL18","doi":"10.1109/COMPSAC.2018.00146","ee":"https://doi.org/10.1109/COMPSAC.2018.00146","url":"https://dblp.org/rec/conf/compsac/GetovL18"}, "url":"URL#2539990" }, { "@score":"1", "@id":"2539991", "info":{"authors":{"author":[{"@pid":"164/0782","text":"Frederik Gossen"},{"@pid":"200/2425","text":"Dennis Kühn"},{"@pid":"m/TizianaMargaria","text":"Tiziana Margaria"},{"@pid":"94/6795","text":"Anna-Lena Lamprecht"}]},"title":"Computational Thinking: Learning by Doing with the Cinco Adventure Game Tool.","venue":"COMPSAC","pages":"990-999","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GossenKML18","doi":"10.1109/COMPSAC.2018.00175","ee":"https://doi.org/10.1109/COMPSAC.2018.00175","url":"https://dblp.org/rec/conf/compsac/GossenKML18"}, "url":"URL#2539991" }, { "@score":"1", "@id":"2539992", "info":{"authors":{"author":[{"@pid":"224/9599","text":"Kathy Grise"},{"@pid":"67/5534","text":"Maria Lee"}]},"title":"Message from the 2018 DSAT Technical Program Chairs.","venue":"COMPSAC","pages":"380-381","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GriseL18","doi":"10.1109/COMPSAC.2018.00184","ee":"https://doi.org/10.1109/COMPSAC.2018.00184","url":"https://dblp.org/rec/conf/compsac/GriseL18"}, "url":"URL#2539992" }, { "@score":"1", "@id":"2539993", "info":{"authors":{"author":[{"@pid":"219/2776","text":"W. K. T. M. Gunarathne"},{"@pid":"219/2778","text":"Chalothon Chootong"},{"@pid":"134/3005","text":"Worapot Sommool"},{"@pid":"157/9880","text":"Ankhtuya Ochirbat"},{"@pid":"54/6164","text":"Yi-Cheng Chen"},{"@pid":"60/1826","text":"Sorel Reisman"},{"@pid":"34/6910","text":"Timothy K. Shih"}]},"title":"Web-Based Learning Object Search Engine Solution Together with Data Visualization: The Case of MERLOT II.","venue":"COMPSAC","pages":"1026-1031","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GunarathneCSOCR18","doi":"10.1109/COMPSAC.2018.00179","ee":"https://doi.org/10.1109/COMPSAC.2018.00179","url":"https://dblp.org/rec/conf/compsac/GunarathneCSOCR18"}, "url":"URL#2539993" }, { "@score":"1", "@id":"2539994", "info":{"authors":{"author":[{"@pid":"46/5508","text":"Xu Guo"},{"@pid":"58/3449","text":"Xiaoyu Song"},{"@pid":"52/4786-2","text":"Jiantao Zhou 0002"}]},"title":"Effective Discrete Memetic Algorithms for Covering Array Generation.","venue":"COMPSAC","pages":"298-303","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GuoSZ18","doi":"10.1109/COMPSAC.2018.00047","ee":"https://doi.org/10.1109/COMPSAC.2018.00047","url":"https://dblp.org/rec/conf/compsac/GuoSZ18"}, "url":"URL#2539994" }, { "@score":"1", "@id":"2539995", "info":{"authors":{"author":[{"@pid":"54/4084","text":"Ling Guo"},{"@pid":"86/4321","text":"Bo Wan"},{"@pid":"148/6622","text":"Changlong Li"},{"@pid":"214/6979","text":"Kaiqi Zhou"},{"@pid":"46/2311","text":"Xi Li"}]},"title":"A Flow-Grained End-to-End Delay Analysis for RC Traffic in TTEthernet.","venue":"COMPSAC","pages":"904-913","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GuoWLZL18","doi":"10.1109/COMPSAC.2018.00156","ee":"https://doi.org/10.1109/COMPSAC.2018.00156","url":"https://dblp.org/rec/conf/compsac/GuoWLZL18"}, "url":"URL#2539995" }, { "@score":"1", "@id":"2539997", "info":{"authors":{"author":[{"@pid":"34/632","text":"Yanbo Han"},{"@pid":"28/7993","text":"Meiling Zhu"},{"@pid":"10/2639-7","text":"Chen Liu 0007"}]},"title":"A Service-Oriented Approach to Modeling and Reusing Event Correlations.","venue":"COMPSAC","pages":"498-507","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HanZL18","doi":"10.1109/COMPSAC.2018.00077","ee":"https://doi.org/10.1109/COMPSAC.2018.00077","url":"https://dblp.org/rec/conf/compsac/HanZL18"}, "url":"URL#2539997" }, { "@score":"1", "@id":"2540002", "info":{"authors":{"author":[{"@pid":"151/5258","text":"Yuanduo He"},{"@pid":"131/4767","text":"Xu Chu"},{"@pid":"210/2213","text":"Guangju Peng"},{"@pid":"70/2725","text":"Yasha Wang"},{"@pid":"139/0633","text":"Zhu Jin"},{"@pid":"46/2195","text":"Xiaorong Wang"}]},"title":"Mining Rules from Real-Valued Time Series: A Relative Information-Gain-Based Approach.","venue":"COMPSAC","pages":"388-397","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HeCPWJW18","doi":"10.1109/COMPSAC.2018.00061","ee":"https://doi.org/10.1109/COMPSAC.2018.00061","url":"https://dblp.org/rec/conf/compsac/HeCPWJW18"}, "url":"URL#2540002" }, { "@score":"1", "@id":"2540003", "info":{"authors":{"author":[{"@pid":"02/2315-5","text":"Xiao He 0005"},{"@pid":"224/9706","text":"Bohan Qin"},{"@pid":"82/3167-10","text":"Yan Zhu 0010"},{"@pid":"89/120","text":"Xing Chen"},{"@pid":"97/4626","text":"Yi Liu"}]},"title":"SPESC: A Specification Language for Smart Contracts.","venue":"COMPSAC","pages":"132-137","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HeQZCL18","doi":"10.1109/COMPSAC.2018.00025","ee":"https://doi.org/10.1109/COMPSAC.2018.00025","url":"https://dblp.org/rec/conf/compsac/HeQZCL18"}, "url":"URL#2540003" }, { "@score":"1", "@id":"2540004", "info":{"authors":{"author":[{"@pid":"224/9752","text":"Reido Horigome"},{"@pid":"02/5133","text":"Nariyoshi Yamai"},{"@pid":"129/0914","text":"Naoya Kitagawa"},{"@pid":"16/5615","text":"Satoshi Ohzahata"}]},"title":"Alternating Primary Subflow in MPTCP by External Program without Kernel Modification.","venue":"COMPSAC","pages":"962-965","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HorigomeYKO18","doi":"10.1109/COMPSAC.2018.00168","ee":"https://doi.org/10.1109/COMPSAC.2018.00168","url":"https://dblp.org/rec/conf/compsac/HorigomeYKO18"}, "url":"URL#2540004" }, { "@score":"1", "@id":"2540005", "info":{"authors":{"author":[{"@pid":"66/3541","text":"Chunyan Hou"},{"@pid":"98/6056","text":"Jinsong Wang"},{"@pid":"65/4423-12","text":"Chen Chen 0012"},{"@pid":"39/4174-2","text":"Kai Shi 0002"}]},"title":"Loop Invariant Generation for Non-monotone Loop Structures.","venue":"COMPSAC","pages":"304-309","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HouW0018","doi":"10.1109/COMPSAC.2018.00048","ee":"https://doi.org/10.1109/COMPSAC.2018.00048","url":"https://dblp.org/rec/conf/compsac/HouW0018"}, "url":"URL#2540005" }, { "@score":"1", "@id":"2540007", "info":{"authors":{"author":[{"@pid":"58/2603","text":"Fu-Shiung Hsieh"},{"@pid":"89/134","text":"Yi-Hong Guo"}]},"title":"Winner Determination in Combinatorial Double Auctions Based on Differential Evolution Algorithms.","venue":"COMPSAC","pages":"888-893","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HsiehG18","doi":"10.1109/COMPSAC.2018.00154","ee":"https://doi.org/10.1109/COMPSAC.2018.00154","url":"https://dblp.org/rec/conf/compsac/HsiehG18"}, "url":"URL#2540007" }, { "@score":"1", "@id":"2540008", "info":{"authors":{"author":[{"@pid":"58/2603","text":"Fu-Shiung Hsieh"},{"@pid":"201/1908","text":"Fu-Min Zhan"}]},"title":"A Discrete Differential Evolution Algorithm for Carpooling.","venue":"COMPSAC","pages":"577-582","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HsiehZ18","doi":"10.1109/COMPSAC.2018.00088","ee":"https://doi.org/10.1109/COMPSAC.2018.00088","url":"https://dblp.org/rec/conf/compsac/HsiehZ18"}, "url":"URL#2540008" }, { "@score":"1", "@id":"2540009", "info":{"authors":{"author":[{"@pid":"95/3657","text":"Yu-Feng Hsu"},{"@pid":"61/6175","text":"Chih-Lin Hu"},{"@pid":"224/9633","text":"Hsin-Ju Hsiao"}]},"title":"On Exploiting Temporal Periodicity for Message Delivery in Mobile Opportunistic Networks.","venue":"COMPSAC","pages":"809-810","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HsuHH18","doi":"10.1109/COMPSAC.2018.00131","ee":"https://doi.org/10.1109/COMPSAC.2018.00131","url":"https://dblp.org/rec/conf/compsac/HsuHH18"}, "url":"URL#2540009" }, { "@score":"1", "@id":"2540011", "info":{"authors":{"author":[{"@pid":"46/6812","text":"Ping Huang"},{"@pid":"184/8205","text":"Kaiqiang Jiang"},{"@pid":"224/9650","text":"Chunlin Guan"},{"@pid":"81/6559","text":"Dehui Du"}]},"title":"Towards Modeling Cyber-Physical Systems with SysML/MARTE/pCCSL.","venue":"COMPSAC","pages":"264-269","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HuangJGD18","doi":"10.1109/COMPSAC.2018.00042","ee":"https://doi.org/10.1109/COMPSAC.2018.00042","url":"https://dblp.org/rec/conf/compsac/HuangJGD18"}, "url":"URL#2540011" }, { "@score":"1", "@id":"2540012", "info":{"authors":{"author":[{"@pid":"56/2875","text":"Rui Huang"},{"@pid":"224/9658","text":"Yichao Lin"},{"@pid":"30/5561","text":"Bidi Ying"},{"@pid":"00/6922","text":"Amiya Nayak"}]},"title":"ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social Networks.","venue":"COMPSAC","pages":"610-619","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HuangLYN18","doi":"10.1109/COMPSAC.2018.00093","ee":"https://doi.org/10.1109/COMPSAC.2018.00093","url":"https://dblp.org/rec/conf/compsac/HuangLYN18"}, "url":"URL#2540012" }, { "@score":"1", "@id":"2540013", "info":{"authors":{"author":[{"@pid":"121/2885","text":"Rubing Huang"},{"@pid":"184/8155","text":"Weiwen Zong"},{"@pid":"88/612","text":"Tsong Yueh Chen"},{"@pid":"40/3836","text":"Dave Towey"},{"@pid":"54/4698-1","text":"Jinfu Chen 0001"},{"@pid":"184/8174","text":"Yunan Zhou"},{"@pid":"88/6657","text":"Weifeng Sun"}]},"title":"On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization.","venue":"COMPSAC","pages":"310-315","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HuangZCTCZS18","doi":"10.1109/COMPSAC.2018.00049","ee":"https://doi.org/10.1109/COMPSAC.2018.00049","url":"https://dblp.org/rec/conf/compsac/HuangZCTCZS18"}, "url":"URL#2540013" }, { "@score":"1", "@id":"2540014", "info":{"authors":{"author":[{"@pid":"h/AliRHurson","text":"Ali R. Hurson"},{"@pid":"68/5837","text":"Hiroyuki Sato"}]},"title":"Message from EATA Symposium Chairs.","venue":"COMPSAC","pages":"534","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HursonS18","doi":"10.1109/COMPSAC.2018.00082","ee":"https://doi.org/10.1109/COMPSAC.2018.00082","url":"https://dblp.org/rec/conf/compsac/HursonS18"}, "url":"URL#2540014" }, { "@score":"1", "@id":"2540015", "info":{"authors":{"author":[{"@pid":"205/8772","text":"Shintaro Ishihara"},{"@pid":"81/193","text":"Toyokazu Akiyama"}]},"title":"A Tuning Method of a Monitoring System for Network Forensics in Cloud Environment.","venue":"COMPSAC","pages":"951-954","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/IshiharaA18","doi":"10.1109/COMPSAC.2018.00165","ee":"https://doi.org/10.1109/COMPSAC.2018.00165","url":"https://dblp.org/rec/conf/compsac/IshiharaA18"}, "url":"URL#2540015" }, { "@score":"1", "@id":"2540016", "info":{"authors":{"author":[{"@pid":"184/8192","text":"A. H. M. Jakaria"},{"@pid":"18/6200","text":"Mohammad Ashiqur Rahman"}]},"title":"Formal Analysis of k-Resiliency for Collaborative UAVs.","venue":"COMPSAC","pages":"583-592","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JakariaR18","doi":"10.1109/COMPSAC.2018.00089","ee":"https://doi.org/10.1109/COMPSAC.2018.00089","url":"https://dblp.org/rec/conf/compsac/JakariaR18"}, "url":"URL#2540016" }, { "@score":"1", "@id":"2540018", "info":{"authors":{"author":[{"@pid":"210/6620","text":"Seongwoon Jeong"},{"@pid":"l/KinchoHLaw","text":"Kincho H. Law"}]},"title":"An IoT Platform for Civil Infrastructure Monitoring.","venue":"COMPSAC","pages":"746-754","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JeongL18","doi":"10.1109/COMPSAC.2018.00111","ee":"https://doi.org/10.1109/COMPSAC.2018.00111","url":"https://dblp.org/rec/conf/compsac/JeongL18"}, "url":"URL#2540018" }, { "@score":"1", "@id":"2540019", "info":{"authors":{"author":[{"@pid":"76/1774","text":"Tao Ji"},{"@pid":"117/7865","text":"Jinkun Pan"},{"@pid":"77/303","text":"Liqian Chen"},{"@pid":"81/8725","text":"Xiaoguang Mao"}]},"title":"Identifying Supplementary Bug-fix Commits.","venue":"COMPSAC","pages":"184-193","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JiPCM18","doi":"10.1109/COMPSAC.2018.00031","ee":"https://doi.org/10.1109/COMPSAC.2018.00031","url":"https://dblp.org/rec/conf/compsac/JiPCM18"}, "url":"URL#2540019" }, { "@score":"1", "@id":"2540020", "info":{"authors":{"author":[{"@pid":"184/8205","text":"Kaiqiang Jiang"},{"@pid":"224/9650","text":"Chunlin Guan"},{"@pid":"07/3313","text":"Jiahui Wang"},{"@pid":"81/6559","text":"Dehui Du"}]},"title":"Model Checking Coordination of CPS Using Timed Automata.","venue":"COMPSAC","pages":"258-263","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JiangGWD18","doi":"10.1109/COMPSAC.2018.00041","ee":"https://doi.org/10.1109/COMPSAC.2018.00041","url":"https://dblp.org/rec/conf/compsac/JiangGWD18"}, "url":"URL#2540020" }, { "@score":"1", "@id":"2540022", "info":{"authors":{"author":[{"@pid":"34/2005-1","text":"Bo Jiang 0001"},{"@pid":"22/0","text":"Yu Wu"},{"@pid":"16/8496","text":"Yongfei Zhang"},{"@pid":"01/1844-4","text":"Zhenyu Zhang 0004"},{"@pid":"c/WingKwonChan","text":"W. K. Chan 0001"}]},"title":"ReTestDroid: Towards Safer Regression Test Selection for Android Application.","venue":"COMPSAC","pages":"235-244","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JiangWZZC18","doi":"10.1109/COMPSAC.2018.00037","ee":"https://doi.org/10.1109/COMPSAC.2018.00037","url":"https://dblp.org/rec/conf/compsac/JiangWZZC18"}, "url":"URL#2540022" }, { "@score":"1", "@id":"2540023", "info":{"authors":{"author":{"@pid":"05/8204","text":"Jialin Jiao"}},"title":"Machine Learning Assisted High-Definition Map Creation.","venue":"COMPSAC","pages":"367-373","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Jiao18","doi":"10.1109/COMPSAC.2018.00058","ee":"https://doi.org/10.1109/COMPSAC.2018.00058","url":"https://dblp.org/rec/conf/compsac/Jiao18"}, "url":"URL#2540023" }, { "@score":"1", "@id":"2540024", "info":{"authors":{"author":[{"@pid":"224/9619","text":"Yangxu Jin"},{"@pid":"52/5150-2","text":"Ting Liu 0002"},{"@pid":"224/9483","text":"Ancheng He"},{"@pid":"70/7820","text":"Yu Qu"},{"@pid":"192/6337","text":"Jianlei Chi"}]},"title":"Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection.","venue":"COMPSAC","pages":"833-834","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/JinLHQC18","doi":"10.1109/COMPSAC.2018.00143","ee":"https://doi.org/10.1109/COMPSAC.2018.00143","url":"https://dblp.org/rec/conf/compsac/JinLHQC18"}, "url":"URL#2540024" }, { "@score":"1", "@id":"2540026", "info":{"authors":{"author":[{"@pid":"224/9761","text":"Hiromu Kamide"},{"@pid":"224/9750","text":"Kosuke Uemura"},{"@pid":"64/3841","text":"Satoshi Yamane"}]},"title":"Model Check of Real-time Property of Embedded Assembly Program Using CEGAR.","venue":"COMPSAC","pages":"799-800","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KamideUY18","doi":"10.1109/COMPSAC.2018.00126","ee":"https://doi.org/10.1109/COMPSAC.2018.00126","url":"https://dblp.org/rec/conf/compsac/KamideUY18"}, "url":"URL#2540026" }, { "@score":"1", "@id":"2540027", "info":{"authors":{"author":[{"@pid":"224/9559","text":"Yoshinori Kamori"},{"@pid":"224/9601","text":"Kenta Hayasi"},{"@pid":"57/4980","text":"Kaori Maeda"},{"@pid":"54/3234","text":"Tohru Kondo"},{"@pid":"58/1709","text":"Reiji Aibara"}]},"title":"A Secure Sharing System for Cloud Desktop Applications Migrating with Optimized User Experience.","venue":"COMPSAC","pages":"947-950","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KamoriHMKA18","doi":"10.1109/COMPSAC.2018.00164","ee":"https://doi.org/10.1109/COMPSAC.2018.00164","url":"https://dblp.org/rec/conf/compsac/KamoriHMKA18"}, "url":"URL#2540027" }, { "@score":"1", "@id":"2540028", "info":{"authors":{"author":[{"@pid":"224/9517","text":"Zeliang Kan"},{"@pid":"50/8499-1","text":"Haoyu Wang 0001"},{"@pid":"76/10013","text":"Guoai Xu"},{"@pid":"07/6300-1","text":"Yao Guo 0001"},{"@pid":"49/628","text":"Xiangqun Chen"}]},"title":"Towards Light-Weight Deep Learning Based Malware Detection.","venue":"COMPSAC","pages":"600-609","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KanWX0C18","doi":"10.1109/COMPSAC.2018.00092","ee":"https://doi.org/10.1109/COMPSAC.2018.00092","url":"https://dblp.org/rec/conf/compsac/KanWX0C18"}, "url":"URL#2540028" }, { "@score":"1", "@id":"2540029", "info":{"authors":{"author":[{"@pid":"144/8298","text":"Seiya Kato"},{"@pid":"224/9672","text":"Yota Inagaki"},{"@pid":"30/2082","text":"Mikio Aoyama"}]},"title":"A Structural Analysis Method of OSS Development Community Evolution Based on A Semantic Graph Model.","venue":"COMPSAC","pages":"292-297","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KatoIA18","doi":"10.1109/COMPSAC.2018.00046","ee":"https://doi.org/10.1109/COMPSAC.2018.00046","url":"https://dblp.org/rec/conf/compsac/KatoIA18"}, "url":"URL#2540029" }, { "@score":"1", "@id":"2540031", "info":{"authors":{"author":[{"@pid":"132/9530","text":"Nishtha Kesswani"},{"@pid":"65/4930","text":"Sanjay Kumar"}]},"title":"The Smart-X Model for Smart Cities.","venue":"COMPSAC","pages":"755-760","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KesswaniK18","doi":"10.1109/COMPSAC.2018.00112","ee":"https://doi.org/10.1109/COMPSAC.2018.00112","url":"https://dblp.org/rec/conf/compsac/KesswaniK18"}, "url":"URL#2540031" }, { "@score":"1", "@id":"2540034", "info":{"authors":{"author":[{"@pid":"70/6258","text":"Taeho Kim"},{"@pid":"06/4939","text":"Sungwon Kang"},{"@pid":"97/112","text":"Jihyun Lee"}]},"title":"Effects of Variable Part Auto Configuration and Management for Software Product Line.","venue":"COMPSAC","pages":"827-828","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimKL18","doi":"10.1109/COMPSAC.2018.00140","ee":"https://doi.org/10.1109/COMPSAC.2018.00140","url":"https://dblp.org/rec/conf/compsac/KimKL18"}, "url":"URL#2540034" }, { "@score":"1", "@id":"2540035", "info":{"authors":{"author":[{"@pid":"44/1947","text":"Beomsu Kim"},{"@pid":"99/5289","text":"Ki-Il Kim"},{"@pid":"146/8256","text":"Babar Shah"}]},"title":"An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks.","venue":"COMPSAC","pages":"789-790","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimKS18","doi":"10.1109/COMPSAC.2018.00121","ee":"https://doi.org/10.1109/COMPSAC.2018.00121","url":"https://dblp.org/rec/conf/compsac/KimKS18"}, "url":"URL#2540035" }, { "@score":"1", "@id":"2540041", "info":{"authors":{"author":[{"@pid":"158/5821","text":"Lov Kumar"},{"@pid":"s/AshishSureka","text":"Ashish Sureka"}]},"title":"An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning Framework.","venue":"COMPSAC","pages":"2-11","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KumarS18","doi":"10.1109/COMPSAC.2018.00010","ee":"https://doi.org/10.1109/COMPSAC.2018.00010","url":"https://dblp.org/rec/conf/compsac/KumarS18"}, "url":"URL#2540041" }, { "@score":"1", "@id":"2540044", "info":{"authors":{"author":[{"@pid":"224/9670","text":"Seoksu Lee"},{"@pid":"83/142","text":"Eun-Sun Cho"}]},"title":"Toward Firmware-Type Analysis Using Machine Learning Techniques.","venue":"COMPSAC","pages":"977-978","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LeeC18","doi":"10.1109/COMPSAC.2018.00172","ee":"https://doi.org/10.1109/COMPSAC.2018.00172","url":"https://dblp.org/rec/conf/compsac/LeeC18"}, "url":"URL#2540044" }, { "@score":"1", "@id":"2540046", "info":{"authors":{"author":[{"@pid":"66/3387","text":"Hui Li"},{"@pid":"22/9558","text":"Shanxiong Chen"},{"@pid":"82/1708-1","text":"Guoqiang Xiao 0001"},{"@pid":"71/142","text":"Xiaoning Peng"},{"@pid":"87/4939","text":"Jianwei Liao"}]},"title":"Adaptive Splitting-Based Block I/O Scheduling in Disk Storage.","venue":"COMPSAC","pages":"668-676","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiCXPLL18","doi":"10.1109/COMPSAC.2018.00101","ee":"https://doi.org/10.1109/COMPSAC.2018.00101","url":"https://dblp.org/rec/conf/compsac/LiCXPLL18"}, "url":"URL#2540046" }, { "@score":"1", "@id":"2540048", "info":{"authors":{"author":[{"@pid":"141/7586","text":"Shijie Li"},{"@pid":"76/305","text":"Yong Dou"},{"@pid":"55/11360","text":"Jinwei Xu"},{"@pid":"64/5630-6","text":"Qiang Wang 0006"},{"@pid":"121/7606","text":"Xin Niu"}]},"title":"mmCNN: A Novel Method for Large Convolutional Neural Network on Memory-Limited Devices.","venue":"COMPSAC","pages":"881-886","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiDXWN18","doi":"10.1109/COMPSAC.2018.00152","ee":"https://doi.org/10.1109/COMPSAC.2018.00152","url":"https://dblp.org/rec/conf/compsac/LiDXWN18"}, "url":"URL#2540048" }, { "@score":"1", "@id":"2540049", "info":{"authors":{"author":[{"@pid":"224/9556","text":"Sizheng Li"},{"@pid":"36/5352","text":"Chuanhe Huang"}]},"title":"A Multihop Broadcast Mechanism for Emergency Messages Dissemination in VANETs.","venue":"COMPSAC","pages":"932-937","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiH18","doi":"10.1109/COMPSAC.2018.00160","ee":"https://doi.org/10.1109/COMPSAC.2018.00160","url":"https://dblp.org/rec/conf/compsac/LiH18"}, "url":"URL#2540049" }, { "@score":"1", "@id":"2540051", "info":{"authors":{"author":[{"@pid":"136/9307","text":"Yichun Li"},{"@pid":"14/7673","text":"Ningkang Jiang"}]},"title":"An Aurora Image Classification Method based on Compressive Sensing and Distributed WKNN.","venue":"COMPSAC","pages":"347-354","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiJ18","doi":"10.1109/COMPSAC.2018.00055","ee":"https://doi.org/10.1109/COMPSAC.2018.00055","url":"https://dblp.org/rec/conf/compsac/LiJ18"}, "url":"URL#2540051" }, { "@score":"1", "@id":"2540052", "info":{"authors":{"author":[{"@pid":"87/660-67","text":"Yan Li 0067"},{"@pid":"203/0941","text":"Junming Ma"},{"@pid":"42/6178-3","text":"Bo An 0003"},{"@pid":"76/4740","text":"Donggang Cao"}]},"title":"BDViewer - A Web-Based Big Data Processing and Visualization Tool.","venue":"COMPSAC","pages":"522-527","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiMAC18","doi":"10.1109/COMPSAC.2018.00080","ee":"https://doi.org/10.1109/COMPSAC.2018.00080","url":"https://dblp.org/rec/conf/compsac/LiMAC18"}, "url":"URL#2540052" }, { "@score":"1", "@id":"2540053", "info":{"authors":{"author":{"@pid":"59/5767","text":"Hyun-il Lim"}},"title":"Applying Code Vectors for Presenting Software Features in Machine Learning.","venue":"COMPSAC","pages":"803-804","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Lim18","doi":"10.1109/COMPSAC.2018.00128","ee":"https://doi.org/10.1109/COMPSAC.2018.00128","url":"https://dblp.org/rec/conf/compsac/Lim18"}, "url":"URL#2540053" }, { "@score":"1", "@id":"2540055", "info":{"authors":{"author":[{"@pid":"64/1206","text":"Chia-Hui Lin"},{"@pid":"36/3687","text":"Cheng-Zen Yang"},{"@pid":"86/241","text":"Peng Lu"},{"@pid":"200/0338","text":"Tzu-Heng Lin"},{"@pid":"224/9716","text":"Zhi-Jun You"}]},"title":"Exploration Scheduling for Replay Events in GUI Testing on Android Apps.","venue":"COMPSAC","pages":"90-99","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LinYLLY18","doi":"10.1109/COMPSAC.2018.00020","ee":"https://doi.org/10.1109/COMPSAC.2018.00020","url":"https://dblp.org/rec/conf/compsac/LinYLLY18"}, "url":"URL#2540055" }, { "@score":"1", "@id":"2540056", "info":{"authors":{"author":[{"@pid":"154/4583","text":"Jennie Lioris"},{"@pid":"224/8423","text":"Annie Bracquemond"},{"@pid":"224/8638","text":"Gildas Thiolon"},{"@pid":"224/8531","text":"Laurent Bonic"}]},"title":"Lane Change Detection Algorithm on Real World Driving for Arbitrary Road Infrastructures.","venue":"COMPSAC","pages":"561-569","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiorisBTB18","doi":"10.1109/COMPSAC.2018.00086","ee":"https://doi.org/10.1109/COMPSAC.2018.00086","url":"https://dblp.org/rec/conf/compsac/LiorisBTB18"}, "url":"URL#2540056" }, { "@score":"1", "@id":"2540057", "info":{"authors":{"author":[{"@pid":"15/5923-14","text":"Chao Liu 0014"},{"@pid":"43/3014-1","text":"Dan Yang 0001"},{"@pid":"06/2072-1","text":"Xin Xia 0001"},{"@pid":"131/4289-1","text":"Meng Yan 0001"},{"@pid":"91/2989-2","text":"Xiaohong Zhang 0002"}]},"title":"Cross-Project Change-Proneness Prediction.","venue":"COMPSAC","pages":"64-73","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Liu0XYZ18","doi":"10.1109/COMPSAC.2018.00017","ee":"https://doi.org/10.1109/COMPSAC.2018.00017","url":"https://dblp.org/rec/conf/compsac/Liu0XYZ18"}, "url":"URL#2540057" }, { "@score":"1", "@id":"2540058", "info":{"authors":{"author":[{"@pid":"16/5205","text":"Zhiyong Liu"},{"@pid":"224/9745","text":"Huanchao Chen"},{"@pid":"45/2913","text":"Xiangping Chen"},{"@pid":"24/7032","text":"Xiaonan Luo"},{"@pid":"63/3122-1","text":"Fan Zhou 0001"}]},"title":"Automatic Detection of Outdated Comments During Code Changes.","venue":"COMPSAC","pages":"154-163","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiuCCL018","doi":"10.1109/COMPSAC.2018.00028","ee":"https://doi.org/10.1109/COMPSAC.2018.00028","url":"https://dblp.org/rec/conf/compsac/LiuCCL018"}, "url":"URL#2540058" }, { "@score":"1", "@id":"2540066", "info":{"authors":{"author":[{"@pid":"153/2527","text":"Cláudio Belo Lourenço"},{"@pid":"99/449","text":"Maria João Frade"},{"@pid":"02/4127-1","text":"Shin Nakajima 0001"},{"@pid":"54/5302","text":"Jorge Sousa Pinto"}]},"title":"A Generalized Approach to Verification Condition Generation.","venue":"COMPSAC","pages":"194-203","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LourencoF0P18","doi":"10.1109/COMPSAC.2018.00032","ee":"https://doi.org/10.1109/COMPSAC.2018.00032","url":"https://dblp.org/rec/conf/compsac/LourencoF0P18"}, "url":"URL#2540066" }, { "@score":"1", "@id":"2540067", "info":{"authors":{"author":[{"@pid":"224/9602","text":"Guangqiang Luan"},{"@pid":"22/2375","text":"Yuebin Bai"},{"@pid":"194/1484","text":"Libin Xu"},{"@pid":"36/6789-1","text":"Chao Yu 0001"},{"@pid":"69/1950","text":"Chunyang Wang"},{"@pid":"65/3210","text":"Junfang Zeng"},{"@pid":"224/9562","text":"Qingbin Chen"},{"@pid":"22/10826","text":"Weitao Wang"}]},"title":"Towards Fault-Tolerant Task Backup and Recovery in the seL4 Microkernel.","venue":"COMPSAC","pages":"721-726","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LuanBXYWZCW18","doi":"10.1109/COMPSAC.2018.00107","ee":"https://doi.org/10.1109/COMPSAC.2018.00107","url":"https://dblp.org/rec/conf/compsac/LuanBXYWZCW18"}, "url":"URL#2540067" }, { "@score":"1", "@id":"2540069", "info":{"authors":{"author":[{"@pid":"145/4187","text":"Hanwu Luo"},{"@pid":"83/1838","text":"Wenzhen Li"},{"@pid":"11/1724","text":"Ying Qian"},{"@pid":"10/10585","text":"Liang Dou"}]},"title":"Mitigating SDN Flow Table Overflow.","venue":"COMPSAC","pages":"821-822","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LuoLQD18","doi":"10.1109/COMPSAC.2018.00137","ee":"https://doi.org/10.1109/COMPSAC.2018.00137","url":"https://dblp.org/rec/conf/compsac/LuoLQD18"}, "url":"URL#2540069" }, { "@score":"1", "@id":"2540070", "info":{"authors":{"author":[{"@pid":"222/1483","text":"Chenxia Luo"},{"@pid":"06/2293-24","text":"Rui Wang 0024"},{"@pid":"21/4633-1","text":"Yu Jiang 0001"},{"@pid":"86/8501","text":"Kang Yang"},{"@pid":"04/606","text":"Yong Guan"},{"@pid":"37/4568","text":"Xiaojuan Li"},{"@pid":"143/4573-2","text":"Zhiping Shi 0002"}]},"title":"Runtime Verification of Robots Collision Avoidance Case Study.","venue":"COMPSAC","pages":"204-212","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LuoWJYGLS18","doi":"10.1109/COMPSAC.2018.00033","ee":"https://doi.org/10.1109/COMPSAC.2018.00033","url":"https://dblp.org/rec/conf/compsac/LuoWJYGLS18"}, "url":"URL#2540070" }, { "@score":"1", "@id":"2540071", "info":{"authors":{"author":[{"@pid":"203/0941","text":"Junming Ma"},{"@pid":"42/6178-3","text":"Bo An 0003"},{"@pid":"49/628","text":"Xiangqun Chen"},{"@pid":"76/4740","text":"Donggang Cao"}]},"title":"DistGear: A Lightweight Event-Driven Framework for Developing Distributed Applications.","venue":"COMPSAC","pages":"106-115","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MaACC18","doi":"10.1109/COMPSAC.2018.00022","ee":"https://doi.org/10.1109/COMPSAC.2018.00022","url":"https://dblp.org/rec/conf/compsac/MaACC18"}, "url":"URL#2540071" }, { "@score":"1", "@id":"2540074", "info":{"authors":{"author":[{"@pid":"224/9531","text":"Ryuichiro Maegawa"},{"@pid":"79/9236","text":"Ryo Nakamura"},{"@pid":"70/1556","text":"Yasuhiro Yamasaki"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"A Study on Emulating Automotive IP Networks Using Network Virtualization.","venue":"COMPSAC","pages":"943-946","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MaegawaNYO18","doi":"10.1109/COMPSAC.2018.00163","ee":"https://doi.org/10.1109/COMPSAC.2018.00163","url":"https://dblp.org/rec/conf/compsac/MaegawaNYO18"}, "url":"URL#2540074" }, { "@score":"1", "@id":"2540075", "info":{"authors":{"author":[{"@pid":"141/6156","text":"Adnan Mahmood"},{"@pid":"69/3425","text":"Bernard Butler"},{"@pid":"72/5075","text":"Brendan Jennings"}]},"title":"Towards Efficient Network Resource Management in SDN-Based Heterogeneous Vehicular Networks.","venue":"COMPSAC","pages":"813-814","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MahmoodBJ18","doi":"10.1109/COMPSAC.2018.00133","ee":"https://doi.org/10.1109/COMPSAC.2018.00133","url":"https://dblp.org/rec/conf/compsac/MahmoodBJ18"}, "url":"URL#2540075" }, { "@score":"1", "@id":"2540076", "info":{"authors":{"author":[{"@pid":"224/9709","text":"Nicholas Majeske"},{"@pid":"69/4927","text":"Filip Jagodzinski"}]},"title":"Elucidating Which Pairwise Mutations Affect Protein Stability: An Exhaustive Big Data Approach.","venue":"COMPSAC","pages":"508-515","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MajeskeJ18","doi":"10.1109/COMPSAC.2018.00078","ee":"https://doi.org/10.1109/COMPSAC.2018.00078","url":"https://dblp.org/rec/conf/compsac/MajeskeJ18"}, "url":"URL#2540076" }, { "@score":"1", "@id":"2540077", "info":{"authors":{"author":[{"@pid":"168/6421","text":"Marina Marchisio"},{"@pid":"168/6419","text":"Alice Barana"},{"@pid":"205/8802","text":"Michele Fioravera"},{"@pid":"34/6142","text":"Sergio Rabellino"},{"@pid":"50/2999","text":"Alberto Conte"}]},"title":"A Model of Formative Automatic Assessment and Interactive Feedback for STEM.","venue":"COMPSAC","pages":"1016-1025","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MarchisioBFRC18","doi":"10.1109/COMPSAC.2018.00178","ee":"https://doi.org/10.1109/COMPSAC.2018.00178","url":"https://dblp.org/rec/conf/compsac/MarchisioBFRC18"}, "url":"URL#2540077" }, { "@score":"1", "@id":"2540078", "info":{"authors":{"author":[{"@pid":"168/6421","text":"Marina Marchisio"},{"@pid":"12/5266","text":"Luigi Di Caro"},{"@pid":"205/8802","text":"Michele Fioravera"},{"@pid":"34/6142","text":"Sergio Rabellino"}]},"title":"Towards Adaptive Systems for Automatic Formative Assessment in Virtual Learning Communities.","venue":"COMPSAC","pages":"1000-1005","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MarchisioCFR18","doi":"10.1109/COMPSAC.2018.00176","ee":"https://doi.org/10.1109/COMPSAC.2018.00176","url":"https://dblp.org/rec/conf/compsac/MarchisioCFR18"}, "url":"URL#2540078" }, { "@score":"1", "@id":"2540079", "info":{"authors":{"author":[{"@pid":"m/TizianaMargaria","text":"Tiziana Margaria"},{"@pid":"96/5079","text":"Henry C. B. Chan"}]},"title":"Message from the CELT 2018 Symposium Co-Chairs.","venue":"COMPSAC","pages":"979","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MargariaC18","doi":"10.1109/COMPSAC.2018.00173","ee":"https://doi.org/10.1109/COMPSAC.2018.00173","url":"https://dblp.org/rec/conf/compsac/MargariaC18"}, "url":"URL#2540079" }, { "@score":"1", "@id":"2540080", "info":{"authors":{"author":[{"@pid":"51/11067","text":"Dusica Marijan"},{"@pid":"134/9488","text":"Marius Liaaen"},{"@pid":"04/6499","text":"Sagar Sen"}]},"title":"DevOps Improvements for Reduced Cycle Times with Integrated Test Optimizations for Continuous Integration.","venue":"COMPSAC","pages":"22-27","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MarijanLS18","doi":"10.1109/COMPSAC.2018.00012","ee":"https://doi.org/10.1109/COMPSAC.2018.00012","url":"https://dblp.org/rec/conf/compsac/MarijanLS18"}, "url":"URL#2540080" }, { "@score":"1", "@id":"2540083", "info":{"authors":{"author":[{"@pid":"123/6445","text":"Ryotaro Matsuo"},{"@pid":"79/9236","text":"Ryo Nakamura"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"A Solution for Minimum Link Flow Problem with Sparse Modeling.","venue":"COMPSAC","pages":"920-925","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MatsuoNO18","doi":"10.1109/COMPSAC.2018.00158","ee":"https://doi.org/10.1109/COMPSAC.2018.00158","url":"https://dblp.org/rec/conf/compsac/MatsuoNO18"}, "url":"URL#2540083" }, { "@score":"1", "@id":"2540084", "info":{"authors":{"author":[{"@pid":"123/6445","text":"Ryotaro Matsuo"},{"@pid":"79/9236","text":"Ryo Nakamura"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"A Study on Sparse-Modeling Based Approach for Betweenness Centrality Estimation.","venue":"COMPSAC","pages":"973-976","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MatsuoNO18a","doi":"10.1109/COMPSAC.2018.00171","ee":"https://doi.org/10.1109/COMPSAC.2018.00171","url":"https://dblp.org/rec/conf/compsac/MatsuoNO18a"}, "url":"URL#2540084" }, { "@score":"1", "@id":"2540085", "info":{"authors":{"author":[{"@pid":"198/0942","text":"Douglas McIlwraith"},{"@pid":"224/9714","text":"Andrea Catalucci"},{"@pid":"224/9628","text":"Sam Boyd"},{"@pid":"224/9563","text":"Raouf Aghrout"},{"@pid":"g/YikeGuo","text":"Yike Guo"}]},"title":"Optimising Toward Completed Videos in an Online Video Advertising Exchange.","venue":"COMPSAC","pages":"528-533","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/McIlwraithCBAG18","doi":"10.1109/COMPSAC.2018.00081","ee":"https://doi.org/10.1109/COMPSAC.2018.00081","url":"https://dblp.org/rec/conf/compsac/McIlwraithCBAG18"}, "url":"URL#2540085" }, { "@score":"1", "@id":"2540087", "info":{"authors":{"author":[{"@pid":"98/1568","text":"Xianyong Meng"},{"@pid":"59/2508","text":"Kai Qian"},{"@pid":"65/6293","text":"Dan Chia-Tien Lo"},{"@pid":"67/1486","text":"Hossain Shahriar"},{"@pid":"224/9733","text":"Md Arabin Islam Talukder"},{"@pid":"b/PrBhattacharya","text":"Prabir Bhattacharya"}]},"title":"Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.","venue":"COMPSAC","pages":"829-830","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MengQLSTB18","doi":"10.1109/COMPSAC.2018.00141","ee":"https://doi.org/10.1109/COMPSAC.2018.00141","url":"https://dblp.org/rec/conf/compsac/MengQLSTB18"}, "url":"URL#2540087" }, { "@score":"1", "@id":"2540088", "info":{"authors":{"author":[{"@pid":"224/9561","text":"Chuta Minamiguchi"},{"@pid":"205/8804","text":"Natsuko Kawabata"},{"@pid":"79/9236","text":"Ryo Nakamura"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"A Study on Comparative Analysis of End-to-End Routing and Opportunistic Routing.","venue":"COMPSAC","pages":"955-958","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MinamiguchiKNO18","doi":"10.1109/COMPSAC.2018.00166","ee":"https://doi.org/10.1109/COMPSAC.2018.00166","url":"https://dblp.org/rec/conf/compsac/MinamiguchiKNO18"}, "url":"URL#2540088" }, { "@score":"1", "@id":"2540089", "info":{"authors":{"author":[{"@pid":"224/9490","text":"Lester James V. Miranda"},{"@pid":"85/4419","text":"Jinglu Hu"}]},"title":"A Deep Learning Approach Based on Stacked Denoising Autoencoders for Protein Function Prediction.","venue":"COMPSAC","pages":"480-485","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MirandaH18","doi":"10.1109/COMPSAC.2018.00074","ee":"https://doi.org/10.1109/COMPSAC.2018.00074","url":"https://dblp.org/rec/conf/compsac/MirandaH18"}, "url":"URL#2540089" }, { "@score":"1", "@id":"2540090", "info":{"authors":{"author":[{"@pid":"224/9700","text":"Yutsuki Miyashita"},{"@pid":"50/9920","text":"Takafumi Tanaka"},{"@pid":"72/1795","text":"Atsuo Hazeyama"}]},"title":"Systematic Literature Review Regarding Communication Support in Project-Based Learning of Software Development.","venue":"COMPSAC","pages":"781-782","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MiyashitaTH18","doi":"10.1109/COMPSAC.2018.00117","ee":"https://doi.org/10.1109/COMPSAC.2018.00117","url":"https://dblp.org/rec/conf/compsac/MiyashitaTH18"}, "url":"URL#2540090" }, { "@score":"1", "@id":"2540091", "info":{"authors":{"author":[{"@pid":"224/9712","text":"Kouto Miyazawa"},{"@pid":"224/9646","text":"Kanon Sasaki"},{"@pid":"22/7749","text":"Naoki Oda"},{"@pid":"14/566","text":"Saneyasu Yamaguchi"}]},"title":"Cyclic Performance Fluctuation of TCP BBR.","venue":"COMPSAC","pages":"811-812","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MiyazawaSOY18","doi":"10.1109/COMPSAC.2018.00132","ee":"https://doi.org/10.1109/COMPSAC.2018.00132","url":"https://dblp.org/rec/conf/compsac/MiyazawaSOY18"}, "url":"URL#2540091" }, { "@score":"1", "@id":"2540092", "info":{"authors":{"author":[{"@pid":"168/6231","text":"Seong-Kyun Mok"},{"@pid":"83/142","text":"Eun-Sun Cho"}]},"title":"Building a CFG to Include Exceptions.","venue":"COMPSAC","pages":"959-961","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MokC18","doi":"10.1109/COMPSAC.2018.00167","ee":"https://doi.org/10.1109/COMPSAC.2018.00167","url":"https://dblp.org/rec/conf/compsac/MokC18"}, "url":"URL#2540092" }, { "@score":"1", "@id":"2540093", "info":{"authors":{"author":[{"@pid":"224/9514","text":"Tokishi Morita"},{"@pid":"01/6813","text":"Katsunori Oyama"},{"@pid":"87/8790","text":"Taiju Mikoshi"},{"@pid":"93/6847","text":"Toshihiro Nishizono"}]},"title":"Decision Making Support of UAV Path Planning for Efficient Sensing in Radiation Dose Mapping.","venue":"COMPSAC","pages":"333-338","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MoritaOMN18","doi":"10.1109/COMPSAC.2018.00053","ee":"https://doi.org/10.1109/COMPSAC.2018.00053","url":"https://dblp.org/rec/conf/compsac/MoritaOMN18"}, "url":"URL#2540093" }, { "@score":"1", "@id":"2540096", "info":{"authors":{"author":[{"@pid":"168/7971","text":"Hyunsu Mun"},{"@pid":"224/9607","text":"Jeasung Na"},{"@pid":"224/9501","text":"Hanul Park"},{"@pid":"71/5549","text":"Seungtae Kim"},{"@pid":"24/1200-2","text":"Youngseok Lee 0002"},{"@pid":"63/1070","text":"John A. Springer"}]},"title":"Analysis of the Relationship Between Server Location and RTT.","venue":"COMPSAC","pages":"939-942","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MunNPKLS18","doi":"10.1109/COMPSAC.2018.00162","ee":"https://doi.org/10.1109/COMPSAC.2018.00162","url":"https://dblp.org/rec/conf/compsac/MunNPKLS18"}, "url":"URL#2540096" }, { "@score":"1", "@id":"2540098", "info":{"authors":{"author":{"@pid":"69/5602","text":"San Murugesan"}},"title":"IT Professional 20th Anniversary Panel.","venue":"COMPSAC","pages":"477-479","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Murugesan18","doi":"10.1109/COMPSAC.2018.00073","ee":"https://doi.org/10.1109/COMPSAC.2018.00073","url":"https://dblp.org/rec/conf/compsac/Murugesan18"}, "url":"URL#2540098" }, { "@score":"1", "@id":"2540099", "info":{"authors":{"author":[{"@pid":"69/5602","text":"San Murugesan"},{"@pid":"59/2777","text":"Fulvio Corno"}]},"title":"Message from the ITiP Symposium Chairs.","venue":"COMPSAC","pages":"727","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MurugesanC18","doi":"10.1109/COMPSAC.2018.00108","ee":"https://doi.org/10.1109/COMPSAC.2018.00108","url":"https://dblp.org/rec/conf/compsac/MurugesanC18"}, "url":"URL#2540099" }, { "@score":"1", "@id":"2540106", "info":{"authors":{"author":[{"@pid":"213/7451","text":"Daichi Nishio"},{"@pid":"64/3841","text":"Satoshi Yamane"}]},"title":"Faster Deep Q-Learning Using Neural Episodic Control.","venue":"COMPSAC","pages":"486-491","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/NishioY18","doi":"10.1109/COMPSAC.2018.00075","ee":"https://doi.org/10.1109/COMPSAC.2018.00075","url":"https://dblp.org/rec/conf/compsac/NishioY18"}, "url":"URL#2540106" }, { "@score":"1", "@id":"2540108", "info":{"authors":{"author":[{"@pid":"04/5494","text":"Daiki Nobayashi"},{"@pid":"20/5737","text":"Kazuya Tsukamoto"},{"@pid":"10/155","text":"Takeshi Ikenaga"},{"@pid":"g/MarioGerla","text":"Mario Gerla"}]},"title":"Spatio-Temporal Data Retention System with MEC for Local Production and Consumption.","venue":"COMPSAC","pages":"795-796","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/NobayashiTIG18","doi":"10.1109/COMPSAC.2018.00124","ee":"https://doi.org/10.1109/COMPSAC.2018.00124","url":"https://dblp.org/rec/conf/compsac/NobayashiTIG18"}, "url":"URL#2540108" }, { "@score":"1", "@id":"2540112", "info":{"authors":{"author":[{"@pid":"224/9634","text":"Shimpei Ohsugi"},{"@pid":"84/6935","text":"Noboru Koshizuka"}]},"title":"Delivery Route Optimization Through Occupancy Prediction from Electricity Usage.","venue":"COMPSAC","pages":"842-849","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/OhsugiK18","doi":"10.1109/COMPSAC.2018.00147","ee":"https://doi.org/10.1109/COMPSAC.2018.00147","url":"https://dblp.org/rec/conf/compsac/OhsugiK18"}, "url":"URL#2540112" }, { "@score":"1", "@id":"2540116", "info":{"authors":{"author":[{"@pid":"224/9542","text":"Masataka Ozawa"},{"@pid":"38/997","text":"Tadashi Dohi"},{"@pid":"85/3171","text":"Hiroyuki Okamura"}]},"title":"How Do Software Metrics Affect Test Case Prioritization?","venue":"COMPSAC","pages":"245-250","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/OzawaDO18","doi":"10.1109/COMPSAC.2018.00038","ee":"https://doi.org/10.1109/COMPSAC.2018.00038","url":"https://dblp.org/rec/conf/compsac/OzawaDO18"}, "url":"URL#2540116" }, { "@score":"1", "@id":"2540117", "info":{"authors":{"author":[{"@pid":"13/4425","text":"Reza M. Parizi"},{"@pid":"59/2508","text":"Kai Qian"},{"@pid":"67/1486","text":"Hossain Shahriar"},{"@pid":"07/6378-13","text":"Fan Wu 0013"},{"@pid":"90/6809","text":"Lixin Tao"}]},"title":"Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.","venue":"COMPSAC","pages":"825-826","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/PariziQSWT18","doi":"10.1109/COMPSAC.2018.00139","ee":"https://doi.org/10.1109/COMPSAC.2018.00139","url":"https://dblp.org/rec/conf/compsac/PariziQSWT18"}, "url":"URL#2540117" }, { "@score":"1", "@id":"2540118", "info":{"authors":{"author":[{"@pid":"34/8742","text":"Victor Parque"},{"@pid":"138/0779","text":"Tomoyuki Miyashita"}]},"title":"On Graph Representation with Smallest Numerical Encoding.","venue":"COMPSAC","pages":"817-818","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ParqueM18","doi":"10.1109/COMPSAC.2018.00135","ee":"https://doi.org/10.1109/COMPSAC.2018.00135","url":"https://dblp.org/rec/conf/compsac/ParqueM18"}, "url":"URL#2540118" }, { "@score":"1", "@id":"2540119", "info":{"authors":{"author":[{"@pid":"34/8742","text":"Victor Parque"},{"@pid":"138/0779","text":"Tomoyuki Miyashita"}]},"title":"Numerical Representation of Modular Graphs.","venue":"COMPSAC","pages":"819-820","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ParqueM18a","doi":"10.1109/COMPSAC.2018.00136","ee":"https://doi.org/10.1109/COMPSAC.2018.00136","url":"https://dblp.org/rec/conf/compsac/ParqueM18a"}, "url":"URL#2540119" }, { "@score":"1", "@id":"2540121", "info":{"authors":{"author":[{"@pid":"61/763","text":"Songwen Pei"},{"@pid":"218/6705","text":"Fuwu Tang"},{"@pid":"218/6065","text":"Yanfei Ji"},{"@pid":"24/4995","text":"Jing Fan"},{"@pid":"218/6095","text":"Zhong Ning"}]},"title":"Localized Traffic Sign Detection with Multi-scale Deconvolution Networks.","venue":"COMPSAC","pages":"355-360","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/PeiTJFN18","doi":"10.1109/COMPSAC.2018.00056","ee":"https://doi.org/10.1109/COMPSAC.2018.00056","url":"https://dblp.org/rec/conf/compsac/PeiTJFN18"}, "url":"URL#2540121" }, { "@score":"1", "@id":"2540124", "info":{"authors":{"author":[{"@pid":"31/5223","text":"Sutheera Puntheeranurak"},{"@pid":"224/9621","text":"Thi Thi Shein"},{"@pid":"48/4523","text":"Makoto Imamura"}]},"title":"Efficient Discovery of Traveling Companion from Evolving Trajectory Data Stream.","venue":"COMPSAC","pages":"448-453","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/PuntheeranurakS18","doi":"10.1109/COMPSAC.2018.00069","ee":"https://doi.org/10.1109/COMPSAC.2018.00069","url":"https://dblp.org/rec/conf/compsac/PuntheeranurakS18"}, "url":"URL#2540124" }, { "@score":"1", "@id":"2540126", "info":{"authors":{"author":[{"@pid":"11/1724","text":"Ying Qian"},{"@pid":"50/671-112","text":"Yu Zhang 0112"},{"@pid":"224/9610","text":"Bingyu Guo"},{"@pid":"224/9533","text":"Shasha Ye"},{"@pid":"162/3143","text":"Yuzhu Wu"},{"@pid":"179/7499","text":"Jiongmin Zhang"}]},"title":"An Improved Promoter Recognition Model Using Convolutional Neural Network.","venue":"COMPSAC","pages":"471-476","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/QianZGYWZ18","doi":"10.1109/COMPSAC.2018.00072","ee":"https://doi.org/10.1109/COMPSAC.2018.00072","url":"https://dblp.org/rec/conf/compsac/QianZGYWZ18"}, "url":"URL#2540126" }, { "@score":"1", "@id":"2540127", "info":{"authors":{"author":[{"@pid":"168/6315","text":"Labiblais Rahman"},{"@pid":"01/6813","text":"Katsunori Oyama"}]},"title":"A Comparison of EEG and NIRS Biomarkers for Assessment of Depression Risk.","venue":"COMPSAC","pages":"831-832","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/RahmanO18","doi":"10.1109/COMPSAC.2018.00142","ee":"https://doi.org/10.1109/COMPSAC.2018.00142","url":"https://dblp.org/rec/conf/compsac/RahmanO18"}, "url":"URL#2540127" }, { "@score":"1", "@id":"2540128", "info":{"authors":{"author":[{"@pid":"224/9583","text":"Ankita Rane"},{"@pid":"82/1851","text":"Anand Kumar"}]},"title":"Sentiment Classification System of Twitter Data for US Airline Service Analysis.","venue":"COMPSAC","pages":"769-773","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/RaneK18","doi":"10.1109/COMPSAC.2018.00114","ee":"https://doi.org/10.1109/COMPSAC.2018.00114","url":"https://dblp.org/rec/conf/compsac/RaneK18"}, "url":"URL#2540128" }, { "@score":"1", "@id":"2540129", "info":{"authors":{"author":[{"@pid":"187/9569","text":"Xiaoxue Ren"},{"@pid":"51/6049","text":"Qiao Huang"},{"@pid":"06/2072-1","text":"Xin Xia 0001"},{"@pid":"52/6482","text":"Zhenchang Xing"},{"@pid":"161/1073","text":"Lingfeng Bao"},{"@pid":"89/6793-1","text":"David Lo 0001"}]},"title":"Characterizing Common and Domain-Specific Package Bugs: A Case Study on Ubuntu.","venue":"COMPSAC","pages":"426-431","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/RenHXXBL18","doi":"10.1109/COMPSAC.2018.00065","ee":"https://doi.org/10.1109/COMPSAC.2018.00065","url":"https://dblp.org/rec/conf/compsac/RenHXXBL18"}, "url":"URL#2540129" }, { "@score":"1", "@id":"2540132", "info":{"authors":{"author":[{"@pid":"145/9399","text":"Yasir Saleem 0001"},{"@pid":"84/4327","text":"Noël Crespi"}]},"title":"Mapping of Sensor and Route Coordinates for Smart Cities.","venue":"COMPSAC","pages":"570-576","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SaleemC18","doi":"10.1109/COMPSAC.2018.00087","ee":"https://doi.org/10.1109/COMPSAC.2018.00087","url":"https://dblp.org/rec/conf/compsac/SaleemC18"}, "url":"URL#2540132" }, { "@score":"1", "@id":"2540133", "info":{"authors":{"author":[{"@pid":"95/62","text":"Usa Sammapun"},{"@pid":"21/3413","text":"Panuchart Bunyakiati"}]},"title":"On Selecting Collaborative Modeling Tools.","venue":"COMPSAC","pages":"791-792","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SammapunB18","doi":"10.1109/COMPSAC.2018.00122","ee":"https://doi.org/10.1109/COMPSAC.2018.00122","url":"https://dblp.org/rec/conf/compsac/SammapunB18"}, "url":"URL#2540133" }, { "@score":"1", "@id":"2540136", "info":{"authors":{"author":[{"@pid":"52/11467","text":"Aki-Hiro Sato"},{"@pid":"208/2222","text":"Shoki Nishimura"},{"@pid":"224/9710","text":"Tsuyoshi Namiki"},{"@pid":"224/9539","text":"Naoki Makita"},{"@pid":"90/4895","text":"Hiroe Tsubaki"}]},"title":"World Grid Square Data Reference Framework and its Potential Applications.","venue":"COMPSAC","pages":"398-409","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SatoNNMT18","doi":"10.1109/COMPSAC.2018.00062","ee":"https://doi.org/10.1109/COMPSAC.2018.00062","url":"https://dblp.org/rec/conf/compsac/SatoNNMT18"}, "url":"URL#2540136" }, { "@score":"1", "@id":"2540137", "info":{"authors":{"author":[{"@pid":"85/2148","text":"Cristina Seceleanu"},{"@pid":"98/3672","text":"Keiji Kimura"}]},"title":"Message from the CAP Organizing Committee.","venue":"COMPSAC","pages":"667","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SeceleanuK18","doi":"10.1109/COMPSAC.2018.00100","ee":"https://doi.org/10.1109/COMPSAC.2018.00100","url":"https://dblp.org/rec/conf/compsac/SeceleanuK18"}, "url":"URL#2540137" }, { "@score":"1", "@id":"2540138", "info":{"authors":{"author":[{"@pid":"54/288","text":"Sid-Ahmed Selouani"},{"@pid":"224/9623","text":"Mohamed Sidi Yacoub"}]},"title":"Long Short-Term Memory Neural Networks for Artificial Dialogue Generation.","venue":"COMPSAC","pages":"761-768","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SelouaniY18","doi":"10.1109/COMPSAC.2018.00113","ee":"https://doi.org/10.1109/COMPSAC.2018.00113","url":"https://dblp.org/rec/conf/compsac/SelouaniY18"}, "url":"URL#2540138" }, { "@score":"1", "@id":"2540139", "info":{"authors":{"author":[{"@pid":"221/3966","text":"Feri Setiawan"},{"@pid":"204/8791","text":"Sunder Ali Khowaja"},{"@pid":"224/9565","text":"Aria Ghora Prabono"},{"@pid":"92/7976","text":"Bernardo Nugroho Yahya"},{"@pid":"82/2410","text":"Seok-Lyong Lee"}]},"title":"A Framework for Real Time Emotion Recognition Based on Human ANS Using Pervasive Device.","venue":"COMPSAC","pages":"805-806","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SetiawanKPYL18","doi":"10.1109/COMPSAC.2018.00129","ee":"https://doi.org/10.1109/COMPSAC.2018.00129","url":"https://dblp.org/rec/conf/compsac/SetiawanKPYL18"}, "url":"URL#2540139" }, { "@score":"1", "@id":"2540140", "info":{"authors":{"author":[{"@pid":"67/1486","text":"Hossain Shahriar"},{"@pid":"99/4054","text":"Hiroki Takakura"},{"@pid":"48/1561","text":"Michiharu Takemoto"},{"@pid":"40/3836","text":"Dave Towey"}]},"title":"Message from the Fast Abstract Co-chairs.","venue":"COMPSAC","pages":"780","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ShahriarTTT18","doi":"10.1109/COMPSAC.2018.00116","ee":"https://doi.org/10.1109/COMPSAC.2018.00116","url":"https://dblp.org/rec/conf/compsac/ShahriarTTT18"}, "url":"URL#2540140" }, { "@score":"1", "@id":"2540141", "info":{"authors":{"author":[{"@pid":"186/5305","text":"Qingshi Shao"},{"@pid":"04/5268","text":"Shijun Liu"},{"@pid":"26/4737","text":"Li Pan"},{"@pid":"57/6700","text":"Chenglei Yang"},{"@pid":"192/8511","text":"Tingting Niu"}]},"title":"A Market-Oriented Heuristic Algorithm for Scheduling Parallel Applications in Big Data Service Platform.","venue":"COMPSAC","pages":"677-686","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ShaoLPYN18","doi":"10.1109/COMPSAC.2018.00102","ee":"https://doi.org/10.1109/COMPSAC.2018.00102","url":"https://dblp.org/rec/conf/compsac/ShaoLPYN18"}, "url":"URL#2540141" }, { "@score":"1", "@id":"2540142", "info":{"authors":{"author":[{"@pid":"52/3213","text":"Moushumi Sharmin"},{"@pid":"01/6813","text":"Katsunori Oyama"},{"@pid":"224/9687","text":"Claudio Giovanni Demartini"}]},"title":"Message from the HCSC 2018 Workshop Organizers.","venue":"COMPSAC","pages":"316","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SharminOD18","doi":"10.1109/COMPSAC.2018.00050","ee":"https://doi.org/10.1109/COMPSAC.2018.00050","url":"https://dblp.org/rec/conf/compsac/SharminOD18"}, "url":"URL#2540142" }, { "@score":"1", "@id":"2540146", "info":{"authors":{"author":[{"@pid":"224/9604","text":"Taiki Shimizu"},{"@pid":"23/3191","text":"Kohei Sakurai"}]},"title":"Comprehensive Data Tree by Actor Messaging for Incremental Hierarchical Clustering.","venue":"COMPSAC","pages":"801-802","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ShimizuS18","doi":"10.1109/COMPSAC.2018.00127","ee":"https://doi.org/10.1109/COMPSAC.2018.00127","url":"https://dblp.org/rec/conf/compsac/ShimizuS18"}, "url":"URL#2540146" }, { "@score":"1", "@id":"2540148", "info":{"authors":{"author":[{"@pid":"99/6996","text":"Behrooz A. Shirazi"},{"@pid":"02/5133","text":"Nariyoshi Yamai"}]},"title":"Message from the NCIW Program Co-chairs.","venue":"COMPSAC","pages":"887","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ShiraziY18","doi":"10.1109/COMPSAC.2018.00153","ee":"https://doi.org/10.1109/COMPSAC.2018.00153","url":"https://dblp.org/rec/conf/compsac/ShiraziY18"}, "url":"URL#2540148" }, { "@score":"1", "@id":"2540151", "info":{"authors":{"author":[{"@pid":"224/9674","text":"Sarocha Sothornprapakorn"},{"@pid":"73/5681","text":"Shinpei Hayashi"},{"@pid":"85/2861","text":"Motoshi Saeki"}]},"title":"Visualizing a Tangled Change for Supporting Its Decomposition and Commit Construction.","venue":"COMPSAC","pages":"74-79","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Sothornprapakorn18","doi":"10.1109/COMPSAC.2018.00018","ee":"https://doi.org/10.1109/COMPSAC.2018.00018","url":"https://dblp.org/rec/conf/compsac/Sothornprapakorn18"}, "url":"URL#2540151" }, { "@score":"1", "@id":"2540159", "info":{"authors":{"author":[{"@pid":"42/10585","text":"Xiaoshan Sun"},{"@pid":"09/3263","text":"Yu Fu"},{"@pid":"117/0906","text":"Yun Dong"},{"@pid":"89/7722","text":"Zhihao Liu"},{"@pid":"06/6785","text":"Yang Zhang"}]},"title":"Improving Fitness Function for Language Fuzzing with PCFG Model.","venue":"COMPSAC","pages":"655-660","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SunFDLZ18","doi":"10.1109/COMPSAC.2018.00098","ee":"https://doi.org/10.1109/COMPSAC.2018.00098","url":"https://dblp.org/rec/conf/compsac/SunFDLZ18"}, "url":"URL#2540159" }, { "@score":"1", "@id":"2540160", "info":{"authors":{"author":[{"@pid":"136/5855","text":"Shuyao Sun"},{"@pid":"38/8024","text":"Junxia Guo"},{"@pid":"47/4943","text":"Ruilian Zhao"},{"@pid":"10/1143-2","text":"Zheng Li 0002"}]},"title":"Search-Based Efficient Automated Program Repair Using Mutation and Fault Localization.","venue":"COMPSAC","pages":"174-183","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SunGZL18","doi":"10.1109/COMPSAC.2018.00030","ee":"https://doi.org/10.1109/COMPSAC.2018.00030","url":"https://dblp.org/rec/conf/compsac/SunGZL18"}, "url":"URL#2540160" }, { "@score":"1", "@id":"2540161", "info":{"authors":{"author":[{"@pid":"205/8837","text":"Chang-Ai Sun"},{"@pid":"224/9639","text":"Jingting Jia"},{"@pid":"70/4981","text":"Huai Liu"},{"@pid":"95/3760-1","text":"Xiangyu Zhang 0001"}]},"title":"A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis.","venue":"COMPSAC","pages":"116-125","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SunJLZ18","doi":"10.1109/COMPSAC.2018.00023","ee":"https://doi.org/10.1109/COMPSAC.2018.00023","url":"https://dblp.org/rec/conf/compsac/SunJLZ18"}, "url":"URL#2540161" }, { "@score":"1", "@id":"2540163", "info":{"authors":{"author":[{"@pid":"82/2248","text":"Hao Sun"},{"@pid":"67/3058","text":"Xiaoxing Ma"},{"@pid":"24/6781","text":"Tiansi Dong"},{"@pid":"c/ABCremers","text":"Armin B. Cremers"},{"@pid":"16/1889","text":"Chun Cao"}]},"title":"An Assertion Framework for Mobile Robotic Programming with Spatial Reasoning.","venue":"COMPSAC","pages":"80-89","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SunMDCC18","doi":"10.1109/COMPSAC.2018.00019","ee":"https://doi.org/10.1109/COMPSAC.2018.00019","url":"https://dblp.org/rec/conf/compsac/SunMDCC18"}, "url":"URL#2540163" }, { "@score":"1", "@id":"2540166", "info":{"authors":{"author":[{"@pid":"88/619","text":"Peng Sun"},{"@pid":"98/343","text":"Jingwei Yang"},{"@pid":"h/MingHua3","text":"Ming Hua 0003"},{"@pid":"c/CarlKChang","text":"Carl K. Chang"}]},"title":"A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional Requirements.","venue":"COMPSAC","pages":"28-37","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SunYMC18","doi":"10.1109/COMPSAC.2018.00013","ee":"https://doi.org/10.1109/COMPSAC.2018.00013","url":"https://dblp.org/rec/conf/compsac/SunYMC18"}, "url":"URL#2540166" }, { "@score":"1", "@id":"2540173", "info":{"authors":{"author":{"@pid":"98/10516","text":"Uthai Tanlamai"}},"title":"What Graphs do International Investors See in the ASEAN Capital Markets?","venue":"COMPSAC","pages":"327-332","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Tanlamai18","doi":"10.1109/COMPSAC.2018.00052","ee":"https://doi.org/10.1109/COMPSAC.2018.00052","url":"https://dblp.org/rec/conf/compsac/Tanlamai18"}, "url":"URL#2540173" }, { "@score":"1", "@id":"2540178", "info":{"authors":{"author":[{"@pid":"48/6098","text":"Hong-Linh Truong 0001"},{"@pid":"224/9655","text":"Manfred Halper"}]},"title":"Characterizing Incidents in Cloud-Based IoT Data Analytics.","venue":"COMPSAC","pages":"442-447","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TruongH18","doi":"10.1109/COMPSAC.2018.00068","ee":"https://doi.org/10.1109/COMPSAC.2018.00068","url":"https://dblp.org/rec/conf/compsac/TruongH18"}, "url":"URL#2540178" }, { "@score":"1", "@id":"2540179", "info":{"authors":{"author":{"@pid":"07/5000","text":"Fu-Hsing Tsai"}},"title":"Designing a Computer Detective Game for Science Education.","venue":"COMPSAC","pages":"797-798","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Tsai18","doi":"10.1109/COMPSAC.2018.00125","ee":"https://doi.org/10.1109/COMPSAC.2018.00125","url":"https://dblp.org/rec/conf/compsac/Tsai18"}, "url":"URL#2540179" }, { "@score":"1", "@id":"2540180", "info":{"authors":{"author":[{"@pid":"35/1167","text":"Chieh-Yuan Tsai"},{"@pid":"224/9588","text":"Wei-Zhong Ji"}]},"title":"Knowledge Map Construction Using Text Mining and Artificial Bee Colony Algorithm.","venue":"COMPSAC","pages":"382-387","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TsaiJ18","doi":"10.1109/COMPSAC.2018.00060","ee":"https://doi.org/10.1109/COMPSAC.2018.00060","url":"https://dblp.org/rec/conf/compsac/TsaiJ18"}, "url":"URL#2540180" }, { "@score":"1", "@id":"2540181", "info":{"authors":{"author":[{"@pid":"157/5957","text":"Shinya Tsuchida"},{"@pid":"75/6845","text":"Hiroyuki Nakagawa"},{"@pid":"71/715","text":"Emiliano Tramontana"},{"@pid":"149/4261","text":"Andrea Fornaia"},{"@pid":"34/6884","text":"Tatsuhiro Tsuchiya"}]},"title":"A Framework for Updating Functionalities Based on the MAPE Loop Mechanism.","venue":"COMPSAC","pages":"38-47","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TsuchidaNTFT18","doi":"10.1109/COMPSAC.2018.00014","ee":"https://doi.org/10.1109/COMPSAC.2018.00014","url":"https://dblp.org/rec/conf/compsac/TsuchidaNTFT18"}, "url":"URL#2540181" }, { "@score":"1", "@id":"2540187", "info":{"authors":{"author":[{"@pid":"75/5153","text":"Han Wan"},{"@pid":"211/4959","text":"Kangxu Liu"},{"@pid":"218/8897","text":"Qiaoye Yu"},{"@pid":"98/4122","text":"Jun Ding"},{"@pid":"51/1201","text":"Xiaopeng Gao"}]},"title":"Improving Blended Learning Outcomes Through Academic Social Media.","venue":"COMPSAC","pages":"1006-1015","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WanLYDG18","doi":"10.1109/COMPSAC.2018.00177","ee":"https://doi.org/10.1109/COMPSAC.2018.00177","url":"https://dblp.org/rec/conf/compsac/WanLYDG18"}, "url":"URL#2540187" }, { "@score":"1", "@id":"2540188", "info":{"authors":{"author":[{"@pid":"22/10826","text":"Weitao Wang"},{"@pid":"22/2375","text":"Yuebin Bai"},{"@pid":"37/4283-3","text":"Peng Feng 0003"},{"@pid":"81/10138","text":"Yuhao Gu"},{"@pid":"76/5789","text":"Shuai Liu"},{"@pid":"59/11289","text":"Wenhao Jiang"},{"@pid":"51/5022-1","text":"Jun Huang 0001"}]},"title":"DTN-Knca: A High Throughput Routing Based on Contact Pattern Detection in DTNs.","venue":"COMPSAC","pages":"926-931","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangBFGLJH18","doi":"10.1109/COMPSAC.2018.00159","ee":"https://doi.org/10.1109/COMPSAC.2018.00159","url":"https://dblp.org/rec/conf/compsac/WangBFGLJH18"}, "url":"URL#2540188" }, { "@score":"1", "@id":"2540189", "info":{"authors":{"author":[{"@pid":"59/2227-37","text":"Yan Wang 0037"},{"@pid":"224/9544","text":"Pei-Xiang Bai"},{"@pid":"224/9719","text":"De-Yu Yang"},{"@pid":"52/4786-2","text":"Jiantao Zhou 0002"},{"@pid":"58/3449","text":"Xiaoyu Song"}]},"title":"A Software Popularity Recommendation Method Based on Evaluation Model.","venue":"COMPSAC","pages":"454-460","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangBYZS18","doi":"10.1109/COMPSAC.2018.00070","ee":"https://doi.org/10.1109/COMPSAC.2018.00070","url":"https://dblp.org/rec/conf/compsac/WangBYZS18"}, "url":"URL#2540189" }, { "@score":"1", "@id":"2540190", "info":{"authors":{"author":[{"@pid":"59/6754","text":"Weiwei Wang"},{"@pid":"38/8024","text":"Junxia Guo"},{"@pid":"10/1143-2","text":"Zheng Li 0002"},{"@pid":"47/4943","text":"Ruilian Zhao"}]},"title":"EFSM-Oriented Minimal Traces Set Generation Approach for Web Applications.","venue":"COMPSAC","pages":"12-21","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangGLZ18","doi":"10.1109/COMPSAC.2018.00011","ee":"https://doi.org/10.1109/COMPSAC.2018.00011","url":"https://dblp.org/rec/conf/compsac/WangGLZ18"}, "url":"URL#2540190" }, { "@score":"1", "@id":"2540191", "info":{"authors":{"author":[{"@pid":"73/6852","text":"You-Chiun Wang"},{"@pid":"59/3754","text":"Han Hu"}]},"title":"A Low-cost, High-Efficiency SDN Framework to Diminish Redundant ARP and IGMP Traffics in Large-Scale LANs.","venue":"COMPSAC","pages":"894-903","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangH18","doi":"10.1109/COMPSAC.2018.00155","ee":"https://doi.org/10.1109/COMPSAC.2018.00155","url":"https://dblp.org/rec/conf/compsac/WangH18"}, "url":"URL#2540191" }, { "@score":"1", "@id":"2540192", "info":{"authors":{"author":[{"@pid":"27/1332","text":"Yijun Wang"},{"@pid":"224/9488","text":"Songyuan Hu"},{"@pid":"224/9662","text":"Linfeng Yin"},{"@pid":"71/4779","text":"Xiaocong Zhou"}]},"title":"Using Code Evolution Information to Improve the Quality of Labels in Code Smell Datasets.","venue":"COMPSAC","pages":"48-53","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangHYZ18","doi":"10.1109/COMPSAC.2018.00015","ee":"https://doi.org/10.1109/COMPSAC.2018.00015","url":"https://dblp.org/rec/conf/compsac/WangHYZ18"}, "url":"URL#2540192" }, { "@score":"1", "@id":"2540194", "info":{"authors":{"author":[{"@pid":"w/RuiWang14","text":"Rui Wang 0014"},{"@pid":"194/1484","text":"Libin Xu"},{"@pid":"22/2375","text":"Yuebin Bai"},{"@pid":"48/7895","text":"Kun Cheng"},{"@pid":"119/1197","text":"Zhongzhao Wang"},{"@pid":"224/9602","text":"Guangqiang Luan"},{"@pid":"94/8072","text":"Hailong Yang"},{"@pid":"22/10826","text":"Weitao Wang"}]},"title":"Research on Asynchronous Inter-VM Communication Mechanism Based on Embedded Hypervisor.","venue":"COMPSAC","pages":"695-700","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangXBCWLYW18","doi":"10.1109/COMPSAC.2018.00104","ee":"https://doi.org/10.1109/COMPSAC.2018.00104","url":"https://dblp.org/rec/conf/compsac/WangXBCWLYW18"}, "url":"URL#2540194" }, { "@score":"1", "@id":"2540198", "info":{"authors":{"author":[{"@pid":"136/4729","text":"Drew Williams"},{"@pid":"141/0848","text":"Golam Mushih Tanimul Ahsan"},{"@pid":"136/7454","text":"Ivor D. Addo"},{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"141/0927","text":"Daniel Petereit"},{"@pid":"141/0863","text":"Linda Burhansstipanov"},{"@pid":"141/0826","text":"Linda U. Krebs"},{"@pid":"156/1677","text":"Mark Dignan"}]},"title":"Building a Tailored Text Messaging System for Smoking Cessation in Native American Populations.","venue":"COMPSAC","pages":"866-874","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WilliamsAAAPBKD18","doi":"10.1109/COMPSAC.2018.00150","ee":"https://doi.org/10.1109/COMPSAC.2018.00150","url":"https://dblp.org/rec/conf/compsac/WilliamsAAAPBKD18"}, "url":"URL#2540198" }, { "@score":"1", "@id":"2540199", "info":{"authors":{"author":[{"@pid":"04/3001","text":"Yan Wu"},{"@pid":"208/4929","text":"Nitish Dhakal"},{"@pid":"11/5481","text":"Dianxiang Xu"},{"@pid":"71/2230","text":"Jin-Hee Cho"}]},"title":"Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn.","venue":"COMPSAC","pages":"461-470","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuDXC18","doi":"10.1109/COMPSAC.2018.00071","ee":"https://doi.org/10.1109/COMPSAC.2018.00071","url":"https://dblp.org/rec/conf/compsac/WuDXC18"}, "url":"URL#2540199" }, { "@score":"1", "@id":"2540200", "info":{"authors":{"author":[{"@pid":"224/9496","text":"Hsiang-Yi Wu"},{"@pid":"64/1249","text":"Che-Rung Lee"}]},"title":"Energy Efficient Scheduling for Heterogeneous Fog Computing Architectures.","venue":"COMPSAC","pages":"555-560","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuL18","doi":"10.1109/COMPSAC.2018.00085","ee":"https://doi.org/10.1109/COMPSAC.2018.00085","url":"https://dblp.org/rec/conf/compsac/WuL18"}, "url":"URL#2540200" }, { "@score":"1", "@id":"2540201", "info":{"authors":{"author":[{"@pid":"188/3013","text":"Sixing Wu"},{"@pid":"22/1805-12","text":"Ying Li 0012"},{"@pid":"22/4397","text":"Xinyuan Zhang"},{"@pid":"01/868","text":"Zhonghai Wu"}]},"title":"DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding Conversation.","venue":"COMPSAC","pages":"516-521","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuLZW18","doi":"10.1109/COMPSAC.2018.00079","ee":"https://doi.org/10.1109/COMPSAC.2018.00079","url":"https://dblp.org/rec/conf/compsac/WuLZW18"}, "url":"URL#2540201" }, { "@score":"1", "@id":"2540202", "info":{"authors":{"author":[{"@pid":"217/5702","text":"Tianheng Wu"},{"@pid":"56/4499-6","text":"Liang Wang 0006"},{"@pid":"224/9558","text":"Zhiwen Zheng"},{"@pid":"224/9661","text":"Simeng Wu"},{"@pid":"91/4845-10","text":"Jun Ma 0010"},{"@pid":"88/484","text":"Xianping Tao"},{"@pid":"38/5132","text":"Jian Lu 0001"}]},"title":"CARMUS: Towards a General Framework for Continuous Activity Recognition with Missing Values on Smartphones.","venue":"COMPSAC","pages":"850-859","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuWZWMTL18","doi":"10.1109/COMPSAC.2018.00148","ee":"https://doi.org/10.1109/COMPSAC.2018.00148","url":"https://dblp.org/rec/conf/compsac/WuWZWMTL18"}, "url":"URL#2540202" }, { "@score":"1", "@id":"2540203", "info":{"authors":{"author":[{"@pid":"155/6699","text":"Yajun Wu"},{"@pid":"64/3841","text":"Satoshi Yamane"}]},"title":"Model Checking of Embedded Systems Using RTCTL While Generating Timed Kripke Structure.","venue":"COMPSAC","pages":"257","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuY18","doi":"10.1109/COMPSAC.2018.00040","ee":"https://doi.org/10.1109/COMPSAC.2018.00040","url":"https://dblp.org/rec/conf/compsac/WuY18"}, "url":"URL#2540203" }, { "@score":"1", "@id":"2540204", "info":{"authors":{"author":[{"@pid":"162/3143","text":"Yuzhu Wu"},{"@pid":"146/8337","text":"Qianwen Zhang"},{"@pid":"35/6663","text":"Jinkui Xie"}]},"title":"Coarsening Networks Based on Local Link Similarity for Community Detection.","venue":"COMPSAC","pages":"317-326","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuZX18","doi":"10.1109/COMPSAC.2018.00051","ee":"https://doi.org/10.1109/COMPSAC.2018.00051","url":"https://dblp.org/rec/conf/compsac/WuZX18"}, "url":"URL#2540204" }, { "@score":"1", "@id":"2540205", "info":{"authors":{"author":[{"@pid":"184/8116","text":"Wanling Xie"},{"@pid":"40/1796","text":"Huibiao Zhu"},{"@pid":"83/5342-2","text":"Min Zhang 0002"},{"@pid":"46/690","text":"Gang Lu"},{"@pid":"43/8730","text":"Yucheng Fang"}]},"title":"Formalization and Verification of Mobile Systems Calculus Using the Rewriting Engine Maude.","venue":"COMPSAC","pages":"213-218","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/XieZZLF18","doi":"10.1109/COMPSAC.2018.00034","ee":"https://doi.org/10.1109/COMPSAC.2018.00034","url":"https://dblp.org/rec/conf/compsac/XieZZLF18"}, "url":"URL#2540205" }, { "@score":"1", "@id":"2540206", "info":{"authors":{"author":[{"@pid":"318/5813","text":"Hai-Feng Xing"},{"@pid":"52/4786-2","text":"Jiantao Zhou 0002"},{"@pid":"58/3449","text":"Xiaoyu Song"},{"@pid":"224/9550","text":"Rui-dong Qi"}]},"title":"SMT-Based Timing Analysis and Verification of Real-Time Task.","venue":"COMPSAC","pages":"711-720","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/XingZSQ18","doi":"10.1109/COMPSAC.2018.00106","ee":"https://doi.org/10.1109/COMPSAC.2018.00106","url":"https://dblp.org/rec/conf/compsac/XingZSQ18"}, "url":"URL#2540206" }, { "@score":"1", "@id":"2540207", "info":{"authors":{"author":[{"@pid":"11/5481","text":"Dianxiang Xu"},{"@pid":"83/142","text":"Eun-Sun Cho"}]},"title":"Message from the SEPT Symposium Program Chairs.","venue":"COMPSAC","pages":"599","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/XuC18","doi":"10.1109/COMPSAC.2018.00091","ee":"https://doi.org/10.1109/COMPSAC.2018.00091","url":"https://dblp.org/rec/conf/compsac/XuC18"}, "url":"URL#2540207" }, { "@score":"1", "@id":"2540209", "info":{"authors":{"author":[{"@pid":"31/10104","text":"Tengfei Xue"},{"@pid":"55/2917","text":"Yuyu Yuan"},{"@pid":"224/9525","text":"Zahir Ahmed"},{"@pid":"221/6712","text":"Krishna Moniz"},{"@pid":"224/9713","text":"Ganyuan Cao"},{"@pid":"18/2771-3","text":"Cong Wang 0003"}]},"title":"Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency.","venue":"COMPSAC","pages":"636-644","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/XueYAMC018","doi":"10.1109/COMPSAC.2018.00096","ee":"https://doi.org/10.1109/COMPSAC.2018.00096","url":"https://dblp.org/rec/conf/compsac/XueYAMC018"}, "url":"URL#2540209" }, { "@score":"1", "@id":"2540210", "info":{"authors":{"author":[{"@pid":"224/9549","text":"Teppei Yajima"},{"@pid":"13/2286","text":"Hiroshi Hosobe"}]},"title":"A Japanese Software Keyboard for Tablets that Reduces User Fatigue.","venue":"COMPSAC","pages":"339-346","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YajimaH18","doi":"10.1109/COMPSAC.2018.00054","ee":"https://doi.org/10.1109/COMPSAC.2018.00054","url":"https://dblp.org/rec/conf/compsac/YajimaH18"}, "url":"URL#2540210" }, { "@score":"1", "@id":"2540212", "info":{"authors":{"author":[{"@pid":"64/3841","text":"Satoshi Yamane"},{"@pid":"224/9557","text":"Tetsuto Takano"}]},"title":"Machine Translation Considering Context Informaiton Using Encoder-Decoder Model.","venue":"COMPSAC","pages":"793-794","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YamaneT18","doi":"10.1109/COMPSAC.2018.00123","ee":"https://doi.org/10.1109/COMPSAC.2018.00123","url":"https://dblp.org/rec/conf/compsac/YamaneT18"}, "url":"URL#2540212" }, { "@score":"1", "@id":"2540214", "info":{"authors":{"author":[{"@pid":"90/4854","text":"Kazuyuki Yamashita"},{"@pid":"79/9236","text":"Ryo Nakamura"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"A Study on Robustness of Complex Networks Against Random Node Removals.","venue":"COMPSAC","pages":"966-969","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YamashitaNO18","doi":"10.1109/COMPSAC.2018.00169","ee":"https://doi.org/10.1109/COMPSAC.2018.00169","url":"https://dblp.org/rec/conf/compsac/YamashitaNO18"}, "url":"URL#2540214" }, { "@score":"1", "@id":"2540216", "info":{"authors":{"author":[{"@pid":"224/9758","text":"Hiroaki Yamauchi"},{"@pid":"71/4736","text":"Akihiro Nakao"},{"@pid":"70/2895","text":"Masato Oguchi"},{"@pid":"70/6951","text":"Shu Yamamoto"},{"@pid":"14/566","text":"Saneyasu Yamaguchi"}]},"title":"Clustering TLS Sessions Based on Protocol Fields Analysis.","venue":"COMPSAC","pages":"815-816","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YamauchiNOYY18","doi":"10.1109/COMPSAC.2018.00134","ee":"https://doi.org/10.1109/COMPSAC.2018.00134","url":"https://dblp.org/rec/conf/compsac/YamauchiNOYY18"}, "url":"URL#2540216" }, { "@score":"1", "@id":"2540219", "info":{"authors":{"author":[{"@pid":"52/5406","text":"Jialin Yang"},{"@pid":"c/WingKwonChan","text":"Wing Kwong Chan"},{"@pid":"07/4012","text":"Yuen-Tak Yu"},{"@pid":"86/7853","text":"Jacky Keung"}]},"title":"GBRAD: A General Framework to Evaluate Design Strategies for Hybrid Race Detection.","venue":"COMPSAC","pages":"126-131","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YangCYK18","doi":"10.1109/COMPSAC.2018.00024","ee":"https://doi.org/10.1109/COMPSAC.2018.00024","url":"https://dblp.org/rec/conf/compsac/YangCYK18"}, "url":"URL#2540219" }, { "@score":"1", "@id":"2540220", "info":{"authors":{"author":[{"@pid":"52/2114","text":"Yanming Yang"},{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"24/1518-32","text":"Xin Chen 0032"},{"@pid":"30/3790-1","text":"He Jiang 0001"}]},"title":"Structural Function Based Code Clone Detection Using a New Hybrid Technique.","venue":"COMPSAC","pages":"286-291","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YangRCJ18","doi":"10.1109/COMPSAC.2018.00045","ee":"https://doi.org/10.1109/COMPSAC.2018.00045","url":"https://dblp.org/rec/conf/compsac/YangRCJ18"}, "url":"URL#2540220" }, { "@score":"1", "@id":"2540221", "info":{"authors":{"author":[{"@pid":"12/1198","text":"Jie Yang"},{"@pid":"34/8525","text":"Yuchen Xie"},{"@pid":"61/2115-1","text":"Lin Liu 0001"},{"@pid":"80/846","text":"Bin Xia"},{"@pid":"168/6387","text":"Zhanqiang Cao"},{"@pid":"156/8462","text":"Chuanbin Guo"}]},"title":"Automated Dental Image Analysis by Deep Learning on Small Dataset.","venue":"COMPSAC","pages":"492-497","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YangXLXCG18","doi":"10.1109/COMPSAC.2018.00076","ee":"https://doi.org/10.1109/COMPSAC.2018.00076","url":"https://dblp.org/rec/conf/compsac/YangXLXCG18"}, "url":"URL#2540221" }, { "@score":"1", "@id":"2540224", "info":{"authors":{"author":[{"@pid":"224/9551","text":"Yuichi Yasuda"},{"@pid":"79/9236","text":"Ryo Nakamura"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"A Study on the Impact of Delayed Packet Forwarding in Content-Centric Networking.","venue":"COMPSAC","pages":"970-972","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YasudaNO18","doi":"10.1109/COMPSAC.2018.00170","ee":"https://doi.org/10.1109/COMPSAC.2018.00170","url":"https://dblp.org/rec/conf/compsac/YasudaNO18"}, "url":"URL#2540224" }, { "@score":"1", "@id":"2540229", "info":{"authors":{"author":[{"@pid":"122/3011","text":"Wook-Sung Yoo"},{"@pid":"224/9757","text":"Zach Jones"},{"@pid":"224/9724","text":"Henok Atsbaha"},{"@pid":"224/9705","text":"David Wingfield"}]},"title":"Painless Tennis Ball Tracking System.","venue":"COMPSAC","pages":"783-784","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YooJAW18","doi":"10.1109/COMPSAC.2018.00118","ee":"https://doi.org/10.1109/COMPSAC.2018.00118","url":"https://dblp.org/rec/conf/compsac/YooJAW18"}, "url":"URL#2540229" }, { "@score":"1", "@id":"2540234", "info":{"authors":{"author":[{"@pid":"90/4237","text":"Huiqun Yu"},{"@pid":"39/4174-6","text":"Kai Shi 0006"},{"@pid":"69/6953","text":"Jianmei Guo"},{"@pid":"17/5233","text":"Guisheng Fan"},{"@pid":"224/4876","text":"Xingguang Yang"},{"@pid":"23/243","text":"Liqiong Chen"}]},"title":"Combining Constraint Solving with Different MOEAs for Configuring Large Software Product Lines: A Case Study.","venue":"COMPSAC","pages":"54-63","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YuSGFYC18","doi":"10.1109/COMPSAC.2018.00016","ee":"https://doi.org/10.1109/COMPSAC.2018.00016","url":"https://dblp.org/rec/conf/compsac/YuSGFYC18"}, "url":"URL#2540234" }, { "@score":"1", "@id":"2540235", "info":{"authors":{"author":[{"@pid":"55/6749-5","text":"Hong Yu 0005"},{"@pid":"92/6866","text":"Tiantian Zhang"},{"@pid":"207/4755","text":"JiaXin Chen"},{"@pid":"49/5795","text":"Chen Guo"},{"@pid":"189/8502","text":"Yahong Lian"}]},"title":"Web Items Recommendation Based on Multi-View Clustering.","venue":"COMPSAC","pages":"420-425","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YuZCGL18","doi":"10.1109/COMPSAC.2018.00064","ee":"https://doi.org/10.1109/COMPSAC.2018.00064","url":"https://dblp.org/rec/conf/compsac/YuZCGL18"}, "url":"URL#2540235" }, { "@score":"1", "@id":"2540238", "info":{"authors":{"author":[{"@pid":"06/6785-26","text":"Yang Zhang 0026"},{"@pid":"14/3946","text":"Gang Yin"},{"@pid":"12/5838-6","text":"Tao Wang 0006"},{"@pid":"55/2008-1","text":"Yue Yu 0001"},{"@pid":"02/661","text":"Huaimin Wang"}]},"title":"An Insight Into the Impact of Dockerfile Evolutionary Trajectories on Quality and Latency.","venue":"COMPSAC","pages":"138-143","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZhangYWYW18","doi":"10.1109/COMPSAC.2018.00026","ee":"https://doi.org/10.1109/COMPSAC.2018.00026","url":"https://dblp.org/rec/conf/compsac/ZhangYWYW18"}, "url":"URL#2540238" }, { "@score":"1", "@id":"2540240", "info":{"authors":{"author":[{"@pid":"160/6645","text":"Donghong Zhang"},{"@pid":"01/1844-4","text":"Zhenyu Zhang 0004"},{"@pid":"34/2005-1","text":"Bo Jiang 0001"},{"@pid":"t/THTse","text":"T. H. Tse"}]},"title":"The Impact of Lightweight Disassembler on Malware Detection: An Empirical Study.","venue":"COMPSAC","pages":"620-629","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZhangZ0T18","doi":"10.1109/COMPSAC.2018.00094","ee":"https://doi.org/10.1109/COMPSAC.2018.00094","url":"https://dblp.org/rec/conf/compsac/ZhangZ0T18"}, "url":"URL#2540240" }, { "@score":"1", "@id":"2540242", "info":{"authors":{"author":[{"@pid":"120/1604","text":"Junjun Zheng"},{"@pid":"85/3171","text":"Hiroyuki Okamura"},{"@pid":"38/997","text":"Tadashi Dohi"}]},"title":"A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy.","venue":"COMPSAC","pages":"630-635","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZhengOD18","doi":"10.1109/COMPSAC.2018.00095","ee":"https://doi.org/10.1109/COMPSAC.2018.00095","url":"https://dblp.org/rec/conf/compsac/ZhengOD18"}, "url":"URL#2540242" }, { "@score":"1", "@id":"2684469", "info":{"authors":{"author":[{"@pid":"60/1826","text":"Sorel Reisman"},{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"224/9687","text":"Claudio Demartini"},{"@pid":"91/1557","text":"Thomas M. Conte"},{"@pid":"l/LingLiu","text":"Ling Liu 0001"},{"@pid":"13/4150","text":"William R. Claycomb"},{"@pid":"12/5445","text":"Motonori Nakamura"},{"@pid":"72/3734","text":"Edmundo Tovar"},{"@pid":"60/3624","text":"Stelvio Cimato"},{"@pid":"l/ChungHorngLung","text":"Chung-Horng Lung"},{"@pid":"99/4054","text":"Hiroki Takakura"},{"@pid":"69/10920","text":"Ji-Jiang Yang"},{"@pid":"81/193","text":"Toyokazu Akiyama"},{"@pid":"03/5274-2","text":"Zhiyong Zhang 0002"},{"@pid":"64/2529","text":"Kamrul Hasan"}]},"title":"2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1","venue":"COMPSAC","publisher":"IEEE Computer Society","year":"2018","type":"Editorship","key":"conf/compsac/2018-1","ee":"https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=8377622","url":"https://dblp.org/rec/conf/compsac/2018-1"}, "url":"URL#2684469" } ] } } } )