


default search action
37th COMPSAC Workshops 2013: Kyoto, Japan
- IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2159-1

CFSE 2013: The Fifth IEEE International Workshop on Computer Forensics in Software Engineering
CFSE 2013 Session 1
- Hyun-il Lim:

Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software Thefts. 1-4 - Wei-Ho Tsai, Cin-Hao Ma:

Fingerprint Clustering for Forensic Data Indexing. 5-10 - Narn-Yih Lee, Zih-Ling Chen, Fu-Kun Chen:

Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem. 11-15
CFSE 2013 Session 2
- Y. Liang, Kam-Pui Chow, Lucas Chi Kwong Hui, Jun-bin Fang

, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. 16-20 - Wataru Takahashi, Ryôichi Sasaki, Tetsutaro Uehara

:
Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone. 21-26
IWSC 2013: The 10th IEEE International Workshop on Software Cybernetics
IWSC 2013 Session 1
- Qing Zhou, Lin Liu:

Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis. 27-34 - Wenlong Zhu, Bei-Bei Yin, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau:

An Adaptive Control Strategy for Managing Concurrent Service Requests in Service-Based Systems. 35-40
IWSC 2013 Session 2
- JoonSeok Park, Keunhyuk Yeom:

A Feedback-Based Approach to Validate SWRL Rules for Developing Situation-Aware Software. 41-46 - Changhai Nie, Siyang Chen, Hareton Leung

, Kai-Yuan Cai:
A Case Study of Adaptive Combinatorial Testing. 47-52 - Yoshinobu Tamura, Shigeru Yamada:

Service-Oriented Maintainability Modeling and Analysis for a Cloud Computing. 53-58
STA 2013: The Fifth IEEE International Workshop on Software Test Automation
STA 2013 Session 1
- Haruto Tanno, Takashi Hoshino:

Reducing the Number of Initial Database States for Integration Testing. 59-64 - Mostafa Erfani, Iman Keivanloo, Juergen Rilling:

Opportunities for Clone Detection in Test Case Recommendation. 65-70
STA 2013 Session 2
- Valentin Chimisliu, Franz Wotawa

:
Using Dependency Relations to Improve Test Case Generation from UML Statecharts. 71-76 - Andrea Calvagna

, Emiliano Tramontana:
Incrementally Applicable t-Wise Combinatorial Test Suites for High-Strength Interaction Testing. 77-82
STPSA 2013: The Eighth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
STPSA 2013 Session 1
- Wenyao Sha, Yongxin Zhu, Tian Huang

, Meikang Qiu, Yan Zhu, Qiannan Zhang:
A Multi-order Markov Chain Based Scheme for Anomaly Detection. 83-88 - Jaehoon Kim:

Hybrid Authorization Conflict Detection by Inferring Partial Data in RDF Access Control. 89-94 - Dong Chen, Yang Zhang, Liang Cheng, Yi Deng, Xiaoshan Sun:

Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability. 95-100
STPSA 2013 Session 2
- Amina Souag, Camille Salinesi, Isabelle Wattiau

, Haris Mouratidis
:
Using Security and Domain Ontologies for Security Requirements Analysis. 101-107 - Xuan Zhang, Tong Li, Zhongwen Xie, Fei Dai, Jinzhuo Liu:

A Petri Net Based Model for Trustworthy Software Process Composition. 108-114 - Xiaoguang Wang

, Yong Qi, Yue-hua Dai, Jianbao Ren:
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing. 115-120
STPSA 2013 Session 3
- Rahena Akhter

, Rownak Jahan Chowdhury, Keita Emura
, Tamzida Islam, Mohammad Shahriar Rahman
, Nusrat Rubaiyat:
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model. 121-126 - Shunsuke Aoki, Masayuki Iwai, Kaoru Sezaki:

Privacy-Aware Community Sensing Using Randomized Response. 127-132
MVDA 2013: The Second IEEE Workshop on Modeling and Verifying Distributed Applications
MVDA 2013 Session 1
- Jinho On, Yeongbok Choe, Moonkun Lee:

An Abstraction Method of Behaviors for Process Algebra. 133-138 - Michaël Lauer, John Mullins, Moez Yeddes:

Cost Optimization Strategy for Iterative Integration of Multi-critical Functions in IMA and TTEthernet Architecture. 139-144 - Vedran Hrgovcic, Dimitris Karagiannis, Robert Woitsch

:
Conceptual Modeling of the Organisational Aspects for Distributed Applications: The Semantic Lifting Approach. 145-150 - Marat Zhanikeev

:
A Practical Software Model for Content Aggregation in Browsers Using Recent Advances in HTML5. 151-156
MVDA 2013 Session 2
- Lamia Zouhaier

, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Building Adaptive Accessible Context-Aware for User Interface Tailored to Disable Users. 157-162 - Eun-Sun Cho

, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, Sumi Helal
:
An Integrated Formal Model for Context-Aware Systems. 163-168 - Chiraz El Hog

, Raoudha Ben Djemaa
, Ikram Amous
:
ArgoAWS-UML: Modeling Tool for Adaptive Web Services. 169-174
MVDA 2013 Session 3
- Ishtiaq Ahmed Choudhry, Nazir Ahmad Zafar, Mohammed Al-Zahrani:

Modeling and Verification of Call Setup Dynamics of LTE Communication Systems. 175-180 - Ping Luo, Rui Wang, Xiaojuan Li, Yong Guan, Hongxing Wei, Jie Zhang:

Model Checking for SpaceWire Link Interface Design Using Uppaal. 181-186 - Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Rahma Jlassi:

Refinement Based Modeling of Workflow Applications Using UML Activity Diagrams. 187-192
SAPSE 2013: The Fith IEEE International Workshop on Security Aspects in Processes and Service Engineering
SAPSE 2013 Session 1
- Shigeru Shimada, Isao Echizen:

Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS. 193-199 - Meiko Jensen:

Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes. 200-205 - Tian Huang

, Yan Zhu, Qiannan Zhang, Yongxin Zhu, Dongyang Wang, Meikang Qiu, Lei Liu:
An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing. 206-211 - Yuuki Kajiura, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud. 212-217
METHOD 2013: The Second IEEE International Workshop on Methods for Establishing Trust with Open Data
METHOD 2013 Session 1
- Tom De Nies, Sam Coppens, Ruben Verborgh

, Miel Vander Sande, Erik Mannens
, Rik Van de Walle, Danius T. Michaelides, Luc Moreau
:
Easy Access to Provenance: An Essential Step Towards Trust on the Web. 218-223 - Nadim Sarrouh:

Formal Modeling of Trust-Based Access Control in Dynamic Coalitions. 224-229 - Thomas Holst, Edzard Höfig:

Investigating the Relevance of Linked Open Data Sets with SPARQL Queries. 230-235 - Konrad Johannes Reiche, Edzard Höfig:

Implementation of Metadata Quality Metrics and Application on Public Government Data. 236-241
NETSAP 2013: The Fourth IEEE International Workshop on Network Technologies for Security, Administration, and Protection
NETSAP 2013 Session 1
- Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:

A Device for Transparent Probabilistic Packet Marking. 242-247 - Akihito Nakamura:

Towards Unified Vulnerability Assessment with Open Data. 248-253 - Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:

Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS. 254-259 - Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen:

Security Software Based on Windows NDIS Filter Drivers. 260-264
EUCASS 2013: The Fourth IEEE International Workshop on Enablers for Ubiquitous Computing
EUCASS 2013 Session 1
- Chin-Chih Chang

, Judy C. R. Tseng, Hao-Yun Chang:
A Patrol Guidance Mechanism in a Context-Aware Environment. 265-270 - Asanga Nimalasena, Vladimir Getov

:
System Evolution for Unknown Context through Multi-action Evaluation. 271-276 - Rui Zhou, Jing Li, Jinghan Wang, Guowei Wang:

A Knowledge-Based Development Approach with Fact and Service for End-User in Cloud Computing. 277-282
EUCASS 2013 Session 2
- Yutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Hajime Matsumura:

UBI-Tree: Indexing Method for Schema-Less Search. 283-288 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:

A P2P Delivery Method for Sensor Data Stream Based on Load Estimation from Collection Cycles. 289-294
ITeS 2013: The Fifth IEEE International Workshop on IT-Enabled Services
ITeS 2013 Session 1
- Tung-Hsiang Chou:

The Service Design of Intelligent Robot (iRobot) for Entertainment. 295-299 - Sumiko Miyata, Hirotsugu Kinoshita, Tetsuya Morizumi, Li Chao:

Game theoretic analysis of the value exchange system. 300-305
ITeS 2013 Session 2
- Yu-Lung Wu, Chi-Jui Chang, Yu-Hui Tao:

Closed-Circuit Television-Enabled Service: A Review of Security and Privacy Issues. 306-309 - Rungsiman Nararatwong, Nagul Cooharojananone, Nattarat Pongsupankij, Rajalida Lipikorn, Kanokwan Atchariyachanvanich

:
The Study of Brand Perception through Social Network Sites and Corporate Social Responsibility Programs. 310-315
ESAS 2013: The Eighth IEEE International Workshop on Engineering Semantic Agents - Intelligence and Robotics
ESAS 2013 Session 1
- Fu-Shiung Hsieh, Jim-Bon Lin:

A Problem Solver for Scheduling Workflows in Multi-agents Systems Based on Petri Nets. 316-321 - Reen-Cheng Wang, Ting-Han Su, Cheng-Peng Ma, Shih-Hung Chen, Hsi-Ho Huang:

Social Network Data Retrieving Using Semantic Technology. 322-327 - Behnam Rahnama, Makbule Canan Ozdemir, Yunus Kiran, Atilla Elçi:

Design and Implementation of a Novel Weighted Shortest Path Algorithm for Maze Solving Robots. 328-332
ESAS 2013 Session 2
- Duygu Çelik

, Askyn Karakas, Gulsen Bal, Cem Gultunca, Atilla Elçi, Basak Buluz
, Murat Can Alevli:
Towards an Information Extraction System Based on Ontology to Match Resumes and Jobs. 333-338
CIF 2013: The Third International Workshop on Complex Information Flows
CIF 2013 Session 1
- Dimitri Perrin

, Christophe Duhamel
:
Efficiency of Parallelisation of Genetic Algorithms in the Data Analysis Context. 339-344
CIF 2013 Session 2
- G. M. Tanimul Ahsan, Ivor D. Addo, Sheikh Iqbal Ahamed, Daniel Petereit, Shalini Kanekar, Linda Burhansstipanov, Linda U. Krebs:

Toward an mHealth Intervention for Smoking Cessation. 345-350 - Yuto Nakai, Dimitri Perrin

, Hiroyuki Ohsaki, Ray Walshe
:
Performance Evaluation of Cloud-Based Parallel Computing. 351-355 - Piotr Wrzeciono

, Waldemar Karwowski
:
Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish Language. 356-360
MidArch 2013: The Seventh International Workshop on Middleware Architecture in the Internet
MidArch 2013 Session 1
- Teruhisa Hochin:

Heterogeneous Closed Information Sources and Open Services. 361-366 - Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe:

Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs. 367-372
MidArch 2013 Session 2
- Takuma Oide, Atsushi Takeda, Takuo Suganuma, Akiko Takahashi:

Implementation and Evaluation of the Well-Distribution Algorithm for an Overlay Network. 373-378 - Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura:

Privacy Enhancing Proxies in Attribute Releases: Two Approaches. 379-384 - Toshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:

Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. 385-390
SSS 2013: The Sixth IEEE International Workshop on Service Science and Systems
SSS 2013 Session 1
- Yi-Shiang Wang, Chih-Ming Chen

, Chin-Ming Hong, Yen-Nung Tsai:
Interactive Augmented Reality Game for Enhancing Library Instruction in Elementary Schools. 391-396 - Chieh-Yuan Tsai, Bo-Han Lai:

A Customized Visiting Route Service under RFID Environment. 397-402 - Wichian Premchaiswadi, Pittaya Poompuang, Nipat Jongsawat, Nucharee Premchaiswadi:

Enhancing Diversity-Accuracy Technique on User-Based Top-N Recommendation Algorithms. 403-408
SSS 2013 Systems Session 2
- Rajiv Khosla, Mei-Tai Chu, Khanh Nguyen:

Affective Robot Enabled Capacity and Quality Improvement of Nursing Home Aged Care Services in Australia. 409-414 - Xiaocao Hu, Zhiyong Feng, Shizhan Chen:

Analyzing Distribution of Implicit Semantic Information in Web Services. 415-420 - Anindhita Dewabharata

, Don Ming-Hui Wen, Shuo-Yan Chou:
An Activity Ontology for Context-Aware Health Promotion Application. 421-426
SSS 2013 Systems Session 3
- Ting-Yun Lu, Mi Lin, Chih-Ming Chen

, Jhih-Hao Wu:
Forecasting Reading Anxiety to Promote Reading Performance Based on Annotation Behavior. 427-432 - Zhaogang Han, Peng Gong, Li Zhang, Jiming Ling, Wenqing Huang:

Definition and Detection of Control-Flow Anti-patterns in Process Models. 433-438 - William Wei Song, Aijaz Soomro, Yang Li, Qin Liu:

A Structural Analysis of SLAs and Dependencies Using Conceptual Modelling Approach. 439-444
QUORS 2013: The Seventh IEEE Workshop on Quality Oriented Reuse of Software
QUORS 2013 Session 1
- Chi-Chung Chang, Kuan-Chou Lai, Chao-Tung Yang

:
Auction-Based Resource Provisioning with SLA Consideration on Multi-cloud Systems. 445-450 - Chao-Tung Yang

, Kuan-Lung Huang, William C. Chu, Kuan-Chou Lai, Chih-Hung Chang, Chih-Wei Lu:
Implementation of Video and Medical Image Services in Cloud. 451-456 - Nicolas Nussbaumer, Xiaodong Liu:

Cloud Migration for SMEs in a Service Oriented Approach. 457-462 - Chih-Wei Lu, Chih-Ming Hsieh, Chih-Hung Chang

, Chao-Tung Yang
:
An Improvement to Data Service in Cloud Computing with Content Sensitive Transaction Analysis and Adaptation. 463-468
QUORS 2013 Session 2
- Xiaoyu Wang, Hongwei Ruan, Yan Wang, Hua Li, Hongji Yang:

A Software-Reuse Method from Model1 to SSH2. 469-474 - Shang Zheng, Hongji Yang:

A Three-Dimensional Approach to Evolving Software. 475-480 - Aseel Hmood, Juergen Rilling:

Analyzing and Predicting Software Quality Trends Using Financial Patterns. 481-486 - Yen-Hung Kuo, Yu-Lin Jeng, Juei-Nan Chen:

A Hybrid Cloud Storage Architecture for Service Operational High Availability. 487-492
QUORS 2013 Session 3
- Andrea Calvagna

, Emiliano Tramontana:
Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions. 493-498 - Emiliano Tramontana:

Automatically Characterising Components with Concerns and Reducing Tangling. 499-504 - Atakan Aral

, Tolga Ovatman
:
Utilization of Method Graphs to Measure Cohesion in Object Oriented Software. 505-510 - Chih-Hung Chang

, Chih-Wei Lu, William C. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai:
An UML Behavior Diagram Based Automatic Testing Approach. 511-516
CDS 2013: The First IEEE International Workshop on Consumer Devices and Systems
- Norihiro Ishikawa

, Yoshia Saito, Hiroshi Mineno
:
Message from the Workshop Chairs: CDS 2013.
CDS 2013 Session 1
- Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe:

Power Allocation Algorithms of PoE for On-Demand Power Supply. 517-522
CDS 2013 Session 2
- Yuki Nakano, Natsuki Hirota, Yoshia Saito, Yuko Murayama:

An Implementation of a Still Picture Internet Broadcasting System with Audience-Oriented QoS Control for Smartphones and PCs Audience. 523-527 - Louay Bassbouss

, Max Tritschler, Stephan Steglich
, Kiyoshi Tanaka, Yasuhiko Miyazaki:
Towards a Multi-screen Application Model for the Web. 528-533 - Tianhui Yang, Katsuhiko Kaji, Nobuo Kawaguchi

:
Elevator Acceleration Sensing: Design and Estimation Recognition Algorithm Using Crowdsourcing. 534-539
CDS 2013 Session 3
- Takumi Kato, Hideyuki Takahashi, Kazuto Sasai, Yujin Lim, Hak-Man Kim, Gen Kitagata, Tetsuo Kinoshita

:
Multiagent System for Priority-Based Load Shedding in Microgrid. 540-545 - Chin-Yang Lin, Yi-Bin Lin:

Projection-Based User Interface for Smart Home Environments. 546-549 - Marat Zhanikeev

:
A Home Gateway Box with Meter, Probe and L2 QoS Policy Edge. 550-555
ADMNET 2013: The First IEEE International Workshop on Architecture, Design, Deployment, and Management of Networks and Applications
ADMNET 2013 Session 1.1
- Mohamed Slim Ben Mahmoud, Nicolas Larrieu

:
An ADS-B Based Secure Geographical Routing Protocol for Aeronautical Ad Hoc Networks. 556-562 - Akihiro Fujihara, Hiroyoshi Miwa:

On the Use of Congestion Information for Rerouting in the Disaster Evacuation Guidance Using Opportunistic Communication. 563-568 - Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, Naoki Hayashi, Reiji Aibara:

Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information. 569-574 - Takuya Yamaguchi, Yong Jin, Nariyoshi Yamai

, Kiyohiko Okayama, Koki Okamoto, Motonori Nakamura:
An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment. 575-580
ADMNET 2013 Session 1.2
- Gada, Nariyoshi Yamai

, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. 581-586 - Masayuki Matsuoka, Nariyoshi Yamai

, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda:
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination. 587-592 - Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga

:
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection. 593-598 - Kunihiko Toumura, Naokazu Nemoto:

A Scalable Server Load Balancing Method Using IP Address Stealing. 599-603
ADMNET 2013 Session 2.1
- Hiroshi Yamamoto, Katsuyuki Yamazaki:

Analysis of Temporal Latency Variation on Network Coordinate System for Host Selection in Large-Scale Distributed Network. 604-609 - Kei Ohnishi, Mario Köppen:

Parallel Evolutionary P2P Networking Technique Evaluating Network Topologies Sequentially. 610-615 - Mario Köppen, Kei Ohnishi, Masato Tsuru:

Knaster Procedure for Proportional Fair Wireless Channel Allocation. 616-620 - Xiaoyi Zhang, Zheng Zheng, Yueni Zhu, Kai-Yuan Cai:

A Distributed Protective Approach for Multiechelon Supply Systems. 621-626
ADMNET 2013 Session 2.2
- Daisuke Okamoto, Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai

:
Target Application Grouping Function Considering Software Updates on Application Execution Control System. 627-632 - Hansung Kim

, Sooleen Nam, Won-Gyu Lee, Kichun Nam, DaiYoung Kwon:
Effects of Moral Judgement, Emotional Control and Problem Solving on Information Ethics of Gifted Students in Computer Science. 633-638 - SoAh Gwak

, Hansung Kim
, WonGyu Lee:
Development and Application of the Information Ethical Sensitivity Measurement Tool for College Students in Korea. 639-643
ADMNET 2013 Session 3
- Nao Maeda, Hiroyoshi Miwa:

Method for Keeping Small Distance from Users to Servers during Failures by Link Protection. 644-649 - Yasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe:

Managing Networks Independently of the Physical Topology by Service Defined Network. 650-655
IEESD & TIP 2013: The Fifth IEEE International Workshop on Industrial Experience in Embedded Systems Design and the Second IEEE International Workshop on Tools in Process
IEESD & TIP 2013 Session 1
- Reyes Juárez-Ramírez, Rafael Pimienta-Romo, Violeta Ocegueda-Miramontes:

Supporting the Software Development Process Using Social Media: Experiences with Student Projects. 656-661 - Arjan J. Mooij, Jozef Hooman, Rob Albers:

Gaining Industrial Confidence for the Introduction of Domain-Specific Languages. 662-667 - Daniel Hallmans, Thomas Nolte, Stig Larsson:

Industrial Requirements on Evolution of an Embedded System Architecture. 668-673
IEESD & TIP 2013 Session 2
- Gaetana Sapienza, Tiberiu Seceleanu

, Ivica Crnkovic:
Partitioning Decision Process for Embedded Hardware and Software Deployment. 674-680 - Khalid Ebanhesaten, Franz Felix Füßl, Detlef Streitferdt

:
Refactoring and automated testing of distributed ERP systems. 681-684
IEESD & TIP 2013 Session 3
- Irina Gushchina, Wolfgang Fengler, Jirka Ciemala, Detlef Streitferdt

:
Certifiable Development Process for Information Processing in the Measurement Domain on the Base of 3W-Models. 685-690 - Lei Ma, Cyrille Artho, Hiroyuki Sato:

Analyzing Distributed Java Applications by Automatic Centralization. 691-696 - Matthias Biehl, Josune De Sosa, Martin Törngren

, Oscar Díaz
:
Efficient Construction of Presentation Integration for Web-Based and Desktop Development Tools. 697-702
HSNCE 2013: The Fourth IEEE International Workshop on High-Speed Network and Computing Environments
HSNCE 2013 Session 1
- Alexandre Ancel, Ingo Assenmacher, Ken-ichi Baba, Julien Cisonni

, Yo Fujiso, Paulo Gonçalves, Matthieu Imbert, Koji Koyamada, P. Neyron, Kazunori Nozaki, Hiroyuki Ohsaki, Anne-Cécile Orgerie, Xavier Pelorson, Bruno Raffin, Naohisa Sakamoto, Eisaku Sakane, Shinji Shimojo
, Annemie Van Hirtum, Shigeo Wada:
PetaFlow - An Example of Communication and Computational Technologies with Social Impact. 703-708 - Alexandre Ancel, Bruno Raffin, Ingo Assenmacher, Annemie Van Hirtum, Yo Fujiso, Kazunori Nozaki:

Parallel Caching for Scientific Visualization. 709-712
HSNCE 2013 Session 2
- Yukai Yang, Hirotake Abe, Ken-ichi Baba, Shinji Shimojo

:
A Scalable Approach to Avoid Incast Problem from Application Layer. 713-718 - Van Dan Nguyen, Thomas Begin, Isabelle Guérin Lassous:

Multi-constrained Routing Algorithm: A Networking Evaluation. 719-723 - Yasuhiro Watashiba, Susumu Date

, Hirotake Abe, Kohei Ichikawa
, Hiroaki Yamanaka
, Eiji Kawai, Haruo Takemura
:
An Architectural Design of a Job Management System Leveraging Software Defined Network. 724-729 - Thomas Begin, Alexandre Brandwajn:

A Note on the Accuracy of Several Existing Approximations for M/Ph/m Queues. 730-735
IWFIT 2013: The First IEEE International Workshop on Future Internet Technologies
IWFIT 2013 Session 1
- Yuncheng Zhu, Akihiro Nakao

:
A Practical Study on Distributed Resolution Service for ICN. 736-741 - Janaka Wijekoon

, Shinichi Ishida, Erwin Harahap
, Hiroaki Nishi
:
Service-Oriented Router-Based CDN System: An SoR-Based CDN Infrastructure Implementation on a Real Network Environment. 742-747 - Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang

:
Packet Classification Using Multi-iteration RFC. 748-753 - Quang Tran Minh, Kien Nguyen

, Shigeki Yamada:
DRANs: Resilient Disaster Recovery Access Networks. 754-759
IWFIT 2013 Session 2
- Hitoshi Yabusaki, Masakuni Agetsuma, Hiroshi Nakagoe, Koichi Murayama, Hiroyuki Osaki, Masami Hiramatsu, Takatoshi Kato:

Flow Control for Higher Resiliency in Wide Area Distributed Cloud Computing. 760-764 - Othman M. M. Othman, Koji Okamura:

Hybrid Control Model for Flow-Based Networks. 765-770

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














