


default search action
27th SAC 2012: Riva, Trento, Italy
- Sascha Ossowski, Paola Lecca:

Proceedings of the ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy, March 26-30, 2012. ACM 2012, ISBN 978-1-4503-0857-1
Advances in spatial and image-based information systems track
- Naoka Maruhashi, Tsutomu Terada

, Masahiko Tsukamoto:
A method for identification of moving objects by integrative use of a camera and accelerometers. 1-6 - Theodoros Tzouramanis:

History-independence: a fresh look at the case of R-trees. 7-12 - Luís Matos, José Manuel Moreira

, Alexandre Valle de Carvalho
:
Representation and management of spatiotemporal data in object-relational databases. 13-20 - Wadii Boulila

, Karim Saheb Ettabaâ, Imed Riadh Farah
, Basel Solaiman:
High level adaptive fusion approach: application to land cover change prediction in satellite image databases. 21-22 - Gabriele Pozzani

, Carlo Combi
:
ST4SQL: a spatio-temporal query language dealing with granularities. 23-25
Computational intelligence and video & image analysis track
- Tatt Hee Oong, Nor Ashidi Mat Isa

:
Multilayer Fuzzy ARTMAP: fast learning and fast testing for pattern classification. 27-32 - Hong Liu, Chih-Cheng Hung, Huaifei Hu, Mali Yu, Enmin Song:

An application of circumscribed circle filter in the Multi-Stencils Fast Marching method. 33-38 - Mali Yu, Qiliang Huang, Renchao Jin, Enmin Song, Hong Liu, Chih-Cheng Hung:

A novel segmentation method for convex lesions based on dynamic programming with local intra-class variance. 39-44 - Tiago Oliveira Cunha, Flávio G. H. de Souza, Arnaldo de Albuquerque Araújo, Gisele L. Pappa:

Rushes video summarization based on spatio-temporal features. 45-50 - Bruno M. Carvalho

, Tiago S. Souza, Edgar Garduño:
Texture fuzzy segmentation using adaptive affinity functions. 51-53 - Zhanghui Chen, Baoyao Zhou, Shan Dong:

Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic Algorithm. 54-55 - Tania Mezzadri Centeno

, Marcio Teruo Akyama:
Clustering approach algorithm for image interpolation. 56-57
Constraint solving and programming track
- Carlo Combi

, Roberto Posenato
:
On the complexity of temporal controllabilities for workflow schemata. 60-66 - Hendrik Skubch:

Solving non-linear arithmetic constraints in soft realtime environments. 67-73 - Jun He, Pierre Flener

, Justin Pearson:
Solution neighbourhoods for constraint-directed local search. 74-79 - Toni Mancini

, Pierre Flener
, Justin Pearson:
Combinatorial problem solving over relational databases: view synthesis through constraint-based local search. 80-87 - Andrés Aristizábal, Filippo Bonchi

, Frank D. Valencia, Luis Fernando Pino:
Partition refinement for bisimilarity in CCP. 88-93 - Ting Zhao, Hoon Hong, Dongming Wang, Philippe Aubry:

Real solution formulas of cubic and quartic equations applied to generate dynamic diagrams with inequality constraints. 94-101 - Pascal Mathis, Pascal Schreck, Rémi Imbach:

Decomposition of geometrical constraint systems with reparameterization. 102-108 - Ioannis Z. Emiris

, Angelos Mantzaflaris
, Bernard Mourrain:
Yet another algorithm for generalized Voronoï Diagrams. 109-110
Data mining track
- Dino Ienco

, Yoann Pitarch, Pascal Poncelet
, Maguelonne Teisseire
:
Towards an automatic construction of Contextual Attribute-Value Taxonomies. 113-118 - Jean-Philippe Métivier, Patrice Boizumault, Bruno Crémilleux, Mehdi Khiari, Samir Loudni:

A constraint language for declarative pattern discovery. 119-125 - Dino Pedreschi

, Salvatore Ruggieri, Franco Turini:
A study of top-k measures for discrimination discovery. 126-131 - Laura Langohr

, Hannu Toivonen
:
A model for mining relevant and non-redundant information. 132-137 - Hung-Hsuan Chen, Liang Gou, Xiaolong (Luke) Zhang

, C. Lee Giles
:
Discovering missing links in networks using vertex similarity measures. 138-143 - Yeming Hu, Evangelos E. Milios

, James Blustein
:
Semi-supervised document clustering with dual supervision through seeding. 144-151 - Claudia Diamantini

, Domenico Potena
, Emanuele Storti
:
Mining usage patterns from a repository of scientific workflows. 152-157 - Tim Schlüter, Stefan Conrad

:
Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations. 158-164 - Madeleine Seeland, Fabian Buchwald, Stefan Kramer, Bernhard Pfahringer:

Maximum Common Subgraph based locally weighted regression. 165-172 - Jian Wang, Cheng Zeng, Chuan He, Liang Hong, Liang Zhou, Raymond K. Wong, Jilei Tian:

Context-aware role mining for mobile service recommendation. 173-178 - Jörg Wicker

, Bernhard Pfahringer, Stefan Kramer:
Multi-label classification using boolean matrix decomposition. 179-186 - Sangeetha Kutty

, Lin Chen, Richi Nayak
:
A people-to-people recommendation system using tensor space models. 187-192 - Yuki Matsubara, Jun Miyazaki, Goshiro Yamamoto, Yuki Uranishi, Sei Ikeda

, Hirokazu Kato
:
CCDR-PAID: more efficient cache-conscious PAID algorithm by data reconstruction. 193-198 - Carson Kai-Sang Leung

, Lijing Sun:
A new class of constraints for constrained frequent pattern mining. 199-204 - Noriaki Kawamae:

Joint sentiment aspect model. 205-210 - Jianmin Wang

, Shijie Tan, Lijie Wen
, Raymond K. Wong, Qinlong Guo:
An empirical evaluation of process mining algorithms based on structural and behavioral similarities. 211-213 - Lin Chen, Richi Nayak

, Yue Xu
:
A common neighbour based two-way collaborative recommendation method. 214-215 - Bruno M. Nogueira

, Alípio Mário Jorge
, Solange Oliveira Rezende
:
Hierarchical confidence-based active clustering. 216-219
Evolutionary computing track
- Geoffrey Neumann, David E. Cairns:

Introducing intervention targeting into estimation of distribution algorithms. 220-225 - Clara Pizzuti:

Boosting the detection of modular community structure with genetic algorithms and local search. 226-231 - Amine M. Boumaza, Armelle Brun:

Stochastic search for global neighbors selection in collaborative filtering. 232-237 - Ri Choe, Hui Yuan, Youngjee Yang, Kwang Ryel Ryu:

Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithm. 238-243 - Li Meng, Seamus Hill, Colm O'Riordan:

Analysis of a triploid genetic algorithm over deceptive landscapes. 244-249 - Ricardo Cerri

, Rodrigo C. Barros
, André Carlos Ponce de Leon Ferreira de Carvalho
:
A genetic algorithm for Hierarchical Multi-Label Classification. 250-255 - Samir A. Mohamed Elsayed, Reda A. Ammar, Sanguthevar Rajasekaran:

Artificial Immune Systems: Models, Applications, and challenges. 256-258 - Leonardo Dagnino Chiwiacowsky

, Paolo Gasbarri
, Riccardo Monti, Haroldo F. de Campos Velho, Arthur Tórgo Gómez:
A two-level procedure based on genetic algorithms to optimize an aeronautical composite structure. 259-260
Intelligent robotic systems track
- Cristóvão D. Sousa

, Rui Cortesão
:
SageRobotics: open source framework for symbolic computation of robot models. 262-267 - Heinz Wörn, Stephan Irgenfried, Thomas Haase:

Multi-fingered reactive grasping with active guided camera systems. 268-273 - P. G. C. N. Senarathne, Danwei Wang:

A two-level approach for multi-robot coordinated exploration of unstructured environments. 274-279 - Jefferson R. Souza

, Gustavo Pessin
, Gustavo B. Eboli, Caio César Teodoro Mendes, Fernando Santos Osório
, Denis F. Wolf:
Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networks. 280-285 - José L. F. Pereira, Rosaldo J. F. Rossetti

:
An integrated architecture for autonomous vehicles simulation. 286-292 - Kenneth Hornfeck, Yan Zhang, Kiju Lee

:
Philos: a sociable robot for human robot interactions and wireless health monitoring. 293-294
Self-organizing complex systems track
- Mirko Viroli

, Danilo Pianini
, Sara Montagna
, Graeme Stevenson
:
Pervasive ecosystems: a coordination model based on semantic chemistry. 295-302
The semantic web and its applications track
- Walter Hop, Sven de Ridder, Flavius Frasincar

, Frederik Hogenboom:
Using Hierarchical Edge Bundles to visualize complex ontologies in GLOW. 304-311 - Ken Kaneiwa, Philip H. P. Nguyen:

Sorted hyper-predicate knowledge bases for ontologies and rules. 312-319 - Li Yan, Fu Zhang, Zong Min Ma

:
f-SROIQ(G): an expressive fuzzy Description Logic supporting fuzzy data type group. 320-325 - Lucas Drumond, Steffen Rendle, Lars Schmidt-Thieme

:
Predicting RDF triples in incomplete knowledge bases with tensor factorization. 326-331 - Markus Zanker

, Markus Jessenitschnig, Martin Stromberger:
Harnessing geo-tagged resources for Web personalization. 332-339 - Miguel A. Martínez-Prieto

, Javier D. Fernández
, Rodrigo Cánovas
:
Compression of RDF dictionaries. 340-347 - Rodrigo Fernandes Calhau

, Ricardo de Almeida Falbo:
A Configuration Management task ontology for semantic integration. 348-353 - Seulgi So, Jung-Hyun Lee, Daoun Jung, JongWoo Ha, SangKeun Lee:

Extending Open Directory Project to represent user interests. 354-359 - Volha Bryl, Sara Tonelli

, Claudio Giuliano, Luciano Serafini:
A novel Framenet-based resource for the semantic web. 360-365 - Stefan Dietze, Hong Qing Yu, Daniela Giordano

, Eleni Kaldoudi
, Nikolas Dovrolis, Davide Taibi
:
Linked education: interlinking educational resources and the Web of data. 366-371 - Haris Abdullah, Mikko Rinne, Seppo Törmä, Esko Nuutila:

Efficient matching of SPARQL subscriptions using rete. 372-377 - Pasquale Minervini

, Claudia d'Amato
, Nicola Fanizzi
:
Learning probabilistic Description logic concepts: under different Assumptions on missing knowledge. 378-383 - André Freitas

, Edward Curry
, Seán O'Riain:
A distributional approach for terminological semantic search on the Linked Data Web. 384-391 - Soon Ae Chun

, Bonnie K. MacKellar
:
Social health data integration using semantic Web. 392-397 - Viviana Mascardi, Angela Locoro

:
BOwL: exploiting Boolean operators and lesk algorithm for linking ontologies. 398-400 - Ikbel Guidara, Tarak Chaari, Kaouthar Fakhfakh:

Intention based semantic approach for service sourcing. 401-402 - Roberto Mirizzi, Tommaso Di Noia

, Eugenio Di Sciascio
, Azzurra Ragone
:
Web 3.0 in action: Vector Space Model for semantic (movie) Recommendations. 403-405
Cloud computing track
- Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab

:
BGP-inspired autonomic service routing for the cloud. 406-411 - Özalp Babaoglu

, Moreno Marzolla
, Michele Tamburini:
Design and implementation of a P2P Cloud system. 412-417 - Eddy Truyen, Nicolás Cardozo, Stefan Walraven, Jorge Vallejos, Engineer Bainomugisha, Sebastian Günther, Theo D'Hondt, Wouter Joosen:

Context-oriented programming for customizable SaaS applications. 418-425 - Michael J. O'Sullivan

, Cameron G. Walker
, DongJin Lee:
Designing data storage tier using Integer Programing. 426-433 - Philipp Leitner, Benjamin Satzger, Waldemar Hummer, Christian Inzinger

, Schahram Dustdar
:
CloudScale: a novel middleware for building transparently scaling cloud applications. 434-440 - Wee Keong Ng

, Yonggang Wen, Huafei Zhu:
Private data deduplication protocols in cloud storage. 441-446 - Anirban Basu, Jaideep Vaidya, Theo Dimitrakos

, Hiroaki Kikuchi:
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study. 447-452 - Marcus Paradies, Susan Malaika, Jérôme Siméon, Shahan Khatchadourian, Kai-Uwe Sattler:

Entity matching for semistructured data in the Cloud. 453-458 - Vinh Ngoc Khuc, Chaitanya Shivade

, Rajiv Ramnath, Jay Ramanathan:
Towards building large-scale distributed systems for twitter sentiment analysis. 459-464 - Dongwan Shin

, Ying Wang, William R. Claycomb:
A policy-based decentralized authorization management framework for cloud computing. 465-470 - Patrizia Scandurra

, Claudia Raibulet
, Pasqualina Potena, Raffaela Mirandola, Rafael Capilla
:
A layered coordination framework for optimizing resource allocation in adapting cloud-based applications. 471-472 - Danilo Moret, Karin K. Breitman

, Evelin Amorim, José Talavera, Ruy Luiz Milidiú, José Viterbo Filho
:
Double dip map-reduce for processing cross validation jobs. 473-477
Dependable and adaptive distributed systems track
- Muhammad Atif, Mohammad Reza Mousavi

, Ammar Osaiweran
:
Formal verification of Unreliable Failure Detectors in Partially Synchronous Systems. 478-485 - Carlos Parra, Daniel Romero, Sébastien Mosser

, Romain Rouvoy
, Laurence Duchien, Lionel Seinturier:
Using constraint-based optimization and variability to support continuous self-adaptation. 486-491 - Monica Dixit, Henrique Moniz

, António Casimiro
:
Timeout-based adaptive consensus: improving performance through adaptation. 492-497 - Farzana Rahman, Sheikh Iqbal Ahamed:

DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks. 498-503 - Christian Inzinger

, Benjamin Satzger, Waldemar Hummer, Philipp Leitner, Schahram Dustdar
:
Non-intrusive policy optimization for dependable and adaptive service-oriented systems. 504-510 - Diogo Reis, Hugo M. Miranda

:
FTRMI: fault-tolerant transparent RMI. 511-518
Mobile computing and applications track
- Farzana Rahman, Casey O'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed:

Let EcoDrive be your guide: development of a mobile tool to reduce carbon footprint and promote green transport. 519-524 - Marcio E. F. Maia, João Bosco Ferreira Filho, Carlos A. B. de Queiroz Filho, Rute Castro, Rossana M. C. Andrade

, Fredrik Toorn:
Framework for building intelligent mobile social applications. 525-530 - Chenjie Wei, Chiu Ni Wang, Rajiv Ramnath, Jay Ramanathan:

Examining the practical challenges of an Augmented Reality cyber-infrastructure framework. 531-536 - Hyunjo Lee

, Byeong-Seok Oh, Hyeong-Il Kim, Jae-Woo Chang:
Grid-based cloaking area creation scheme supporting continuous location-based services. 537-543 - Junho Ahn, Hojung Cha:

A sensor network-based multiple acoustic source localization algorithm. 544-549 - Chen-Che Huang, Jiun-Long Huang, Jhih-An Yan, Lo-Yao Yeh:

An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networks. 550-555 - Anderson Nunes Paiva Morais, Ana R. Cavalli

:
A distributed intrusion detection scheme for wireless ad hoc networks. 556-562 - Chih-Lin Hu

, Bing-Jung Hsieh:
A density-aware routing scheme in delay tolerant networks. 563-568 - Abdel Obaid, Anne Marie Amja, Hafedh Mili, Normand Séguin:

Query execution on a mobile database system. 569-571 - Junjun Yin

, James D. Carswell:
MobiSpatial: open source for mobile spatial interaction. 572-573 - Marco Antero Paiva, Marcelo Roberto Petry

, Rosaldo J. F. Rossetti
:
Topological inference through mobile devices. 574-575
Networking track
- Junwhan Kim:

Towards optimizing the reliability of real-time transmission in multi-hop wireless LANs. 577-582 - Rolf Winter, Iljitsch van Beijnum:

Explicitly accommodating origin preference for inter-domain traffic engineering. 583-587 - Renzo Davoli

, Michael Goldweber
:
msocket: multiple stack support for the berkeley socket API. 588-593 - Alireza Mahdian, Hansu Gu, Sravan Thokala, Shivakant Mishra:

Location based routing using smartphones in an infrastructureless environment. 594-599 - Murad Abusubaih, Mahmoud Rajabi, Mahmood Ajloni, Fadel Shahin:

Performance of MIMO 802.11n in heterogeneous deployments. 600-604 - Peyman Teymoori, Mehdi Kargahi, Nasser Yazdani:

A real-time data aggregation method for fault-tolerant wireless sensor networks. 605-612 - Michael Grey, Michael Rossberg, Guenter Schaefer:

Automatic creation of VPN backup paths for improved resilience against BGP-attackers. 613-620 - Adetokunbo Makanju, Nur Zincir-Heywood

, Evangelos E. Milios
, Markus Latzel:
Spatio-temporal decomposition, clustering and identification for alert detection in system logs. 621-628 - Luca Deri, Lorenzo Luconi Trombacchi, Maurizio Martinelli

, Daniele Vannozzi:
Towards a passive DNS monitoring system. 629-630 - Pravati Swain

, Sandip Chakraborty
, Sukumar Nandi
, Purandar Bhaduri
:
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model. 631-633 - Paola Salomoni, Ludovico Antonio Muratori, Giovanni Pau

, Marco Magnani:
S2S: a peer to peer protocol for participative sensing. 634-635
Web technologies track
- José Luis Ordiales Coscia, Marco Crasso, Cristian Mateos

, Alejandro Zunino
:
An approach to improve code-first web services discoverability at development time. 638-643 - Chu-Cheng Hsieh, Junghoo Cho:

Finding similar items by leveraging social tag clouds. 644-651 - Matthias Heinrich, Martin Gaedke

:
Data binding for standard-based web applications. 652-657 - Gioele Barabucci, Silvio Peroni

, Francesco Poggi
, Fabio Vitali
:
Embedding semantic annotations within texts: the FRETTA approach. 658-663 - Tim A. Majchrzak, Andreas Simon:

Using spring Roo for the test-driven development of Web applications. 664-671 - Arnout Verheij, Allard Kleijn, Flavius Frasincar

, Damir Vandic, Frederik Hogenboom:
Querying and ranking news items in the hermes framework. 672-679 - Maad Shatnawi

, Nader Mohamed:
Statistical techniques for online personalized advertising: a survey. 680-687 - Markku Laine, Denis Shestakov, Petri Vuorimaa:

Extending XForms with server-side functionality. 688-695 - Rafael Ferreira, Rinaldo Lima, Jean Melo, Evandro Costa, Frederico Luiz Gonçalves de Freitas, Henrique Pacca Loureiro Luna:

RetriBlog: a framework for creating blog crawlers. 696-701 - Sonya Liberman, Ronny Lempel:

Approximately optimal facet selection. 702-708 - Leandro Guarino de Vasconcelos, Laércio Augusto Baldochi Jr.

:
Towards an automatic evaluation of web applications. 709-716 - Matthias Book

, Volker Gruhn, Marco Buss:
Process-aware continuation management in web applications. 717-724 - Angela Locoro

, Viviana Mascardi, Anna Marina Scapolla:
Evolving and validating annotations in web-based collaborative environments through ontology matching. 725-727 - André Nunes, Pável Calado

, Bruno Martins
:
Resolving user identities over social networks through supervised learning and rich similarity features. 728-729 - Navid Ahmadi, Mehdi Jazayeri, Alexander Repenning

:
Performance evaluation of user-created open-web games. 730-732 - Davide Eynard, Alessandro Inversini

, Leonardo Gentile:
Finding similar destinations with flickr geotags. 733-736
Cooperative systems in heterogeneous environments track
- Hongfei Fan, Chengzheng Sun:

Dependency-based automatic locking for semantic conflict prevention in real-time collaborative programming. 737-742 - Ruben Casado, Javier Tuya

, Muhammad Younas:
Testing the reliability of web services transactions in cooperative applications. 743-748 - Mohamed Mostafa Saleh

, Andrei Soeanu, Sujoy Ray, Mourad Debbabi
, Jean Berger, Abdeslem Boukhtouta:
Mechanism design for decentralized vehicle routing problem. 749-754 - John Korah, Eunice E. Santos, Eugene Santos Jr.:

Multi-agent framework for real-time processing of large and dynamic search spaces. 755-762 - Satyajeet Raje

, Chowdary Davuluri, Michael A. Freitas
, Rajiv Ramnath, Jay Ramanathan:
Using ontology-based methods for implementing role-based access control in cooperative systems. 763-764 - Yves Wautelet

, Samedi Heng, Manuel Kolp:
An ontological basis for resource representation. 765-766
Document engineering track
- Bolan Su, Shijian Lu

, Chew Lim Tan:
Restoration of motion blurred document images. 767-770 - Felipe Ribas, Luiz S. Oliveira, Alceu de Souza Britto Jr., Robert Sabourin:

Assessing handwitten digit segmentation algorithms. 772-776 - Makoto Hasegawa, Salvatore Tabbone:

Affine invariant shape matching using radon transform and dynamic time warping distance. 777-781 - Elena Baralis, Luca Cagliero

, Saima Jabeen
, Alessandro Fiori
:
Multi-document summarization exploiting frequent itemsets. 782-786 - Eirini Matthaiou, Ergina Kavallieratou

:
An information extraction system from patient historical documents. 787-791 - Shinji Koka, Koichi Anada

, Kenshi Nomaki, Yuki Shindo, Takeo Yaku
:
Row manipulation in the heterogeneous tabular forms with a hexadecimal grid graph model. 792-793
Data streams track
- Petr Kosina

, João Gama
:
Very Fast Decision Rules for multi-class problems. 795-800 - Fabian Fischer, Florian Mansmann, Daniel A. Keim:

Real-time visual analytics for event data streams. 801-806 - Max Zimmermann, Irene Ntoutsi, Zaigham Faraz Siddiqui, Myra Spiliopoulou, Hans-Peter Kriegel:

Discovering global and local bursts in a stream of news. 807-812 - Loïc Petit, Cyril Labbé, Claudia Roncancio

:
Revisiting formal ordering in data stream querying. 813-818 - Omar U. Florez, Curtis E. Dyreson

:
Discovering activity interactions in a single pass over a video stream. 819-826 - Pietro Guccione, Anna Ciampi, Annalisa Appice

, Donato Malerba
, Angelo Muolo:
Trend cluster based interpolation everywhere in a sensor network. 827-828 - Elaine R. Faria, Rodrigo C. Barros

, João Gama
, André C. P. L. F. de Carvalho
:
Improving the offline clustering stage of data stream algorithms in scenarios with variable number of clusters. 829-830 - Santiago Augusto Nunes, Ana Maria Heuminski de Ávila, Luciana A. S. Romani, Agma J. M. Traina, Priscila P. Coltri

, Elaine P. M. de Sousa
:
To be or not to be real: fractal analysis of data streams from a regional climate change model. 831-832
Database theory, technology and applications track
- Sosuke Ota, Atsuyuki Morishima, Norihide Shinagawa, Toshiyuki Amagasa

:
C-Mapping: a flexible XML-RDB mapping method based on functional and inclusion dependencies. 834-839 - Radim Belohlávek, Vilém Vychodil:

Attribute implications in similarity-based databases: semantic entailment and nonredundant bases. 840-846 - Spyros Sioutas, Alexandros Panaretos, Ioannis Karydis

, Dimitrios Tsoumakos:
SART: dynamic P2P query processing in sensor networks with probabilistic guarantees. 847-852 - Evangelos Sakkopoulos

, Alexandros Panaretos, Spyros Sioutas, Dimitrios Tsoumakos, George Papaloukopoulos, Anastasia Saltou:
DREAM: a distributed fRamework for customized dEployment of a vAriety of indexing engines over million-node overlays. 853-858 - Alexandros Karakasidis, Vassilios S. Verykios

:
Reference table based k-anonymous private blocking. 859-864 - Verónica Andrea Bollati, Paolo Atzeni

, Esperanza Marcos
, Juan M. Vara
:
Model Management Systems vs. Model Driven Engineering: a case study. 865-872 - Scott Fazackerley, Steven M. McAvoy, Ramon Lawrence:

GPU accelerated AES-CBC for database applications. 873-878 - Salman Shahid, Sakti Pramanik, Charles B. Owen:

Minimum bounding boxes for regular cross-polytopes. 879-884 - Francesco Di Tria, Ezio Lefons, Filippo Tangorra:

Metrics for approximate query engine evaluation. 885-887 - Rashed K. Salem

, Omar Boussaid, Jérôme Darmont:
An Active XML-based framework for integrating complex data. 888-892 - Eduardo Terra Morelli, Ana Carolina Almeida, Sérgio Lifschitz

, José Maria Monteiro, Javam C. Machado:
Autonomous re-indexing. 893-897
Information access and retrieval track
- Daniel Blank, Andreas Henrich:

Inverted file-based indexing for efficient multimedia information retrieval in metric spaces. 900-905 - Badreddine Benreguia, Hamamache Kheddouci:

A consistency rule for graph isomorphism problem. 906-911 - Jia Cheng, Jingyu Zhou, Shuang Qiu:

Fine-grained topic detection in news search results. 912-917 - Jana Eggink, Penelope Allen, Denise Bland:

A pilot study for mood-based classification of TV programmes. 918-922 - Ricardo Lage, Frederico Araújo Durão, Peter Dolog

:
Towards effective group recommendations for microblogging users. 923-928 - Yeming Hu, Evangelos E. Milios

, James Blustein
:
Enhancing semi-supervised document clustering with feature supervision. 929-936 - Josephine Griffith, Colm O'Riordan, Humphrey Sorensen:

Investigations into user rating information and predictive accuracy in a collaborative filtering domain. 937-942 - Lamjed Ben Jabeur, Lynda Tamine, Mohand Boughanem:

Uprising microblogs: a bayesian network retrieval model for tweet search. 943-948 - Mariko Kamie, Takako Hashimoto, Hiroyuki Kitagawa

:
Effective web video clustering using playlist information. 949-956 - Chiraz Trabelsi, Bilel Moulahi, Sadok Ben Yahia

:
HMM-CARe: Hidden Markov Models for context-aware tag recommendation in folksonomies. 957-961 - Michael Granitzer

, Maya Hristakeva
, Kris Jack
, Robert Knight:
A comparison of metadata extraction techniques for crowdsourced bibliographic metadata management. 962-964 - Yoshihide Hosokawa:

Corpus-based place metadatabase generation for geocoding. 965-967
Multimedia and visualization track
- Giuseppe Maggiore, Fabio Pittarello

, Michele Bugliesi
, Mohamed Abbadi:
A compilation technique to increase X3D performance and safety. 969-974 - Marcelo G. Manzato, Rudinei Goularte

:
A multimedia recommender system based on enriched user profiles. 975-980 - Ugo Erra

, Giuseppe Scanniello
:
Towards the visualization of software systems as 3D forests: the CodeTrees environment. 981-988 - Ai Gomi, Takayuki Itoh:

MINI: a 3D mobile image browser with multi-dimensional datasets. 989-996 - Aretha Barbosa Alencar

, Katy Börner, Fernando Vieira Paulovich
, Maria Cristina Ferreira de Oliveira
:
Time-aware visualization of document collections. 997-1004 - Matheus Ricardo U. Zingarelli, Leonardo Antonio de Andrade, Rudinei Goularte

:
RevGlyph: a technique for reverting anaglyph stereoscopic videos. 1005-1011 - Letricia P. S. Avalhais, Sérgio Francisco da Silva, José Fernando Rodrigues Jr., Agma J. M. Traina:

Image retrieval employing genetic dissimilarity weighting and feature space transformation functions. 1012-1017 - Alan Keller Gomes, Maria da Graça Campos Pimentel:

A media-based social interactions analysis procedure. 1018-1024 - Dawei Liu, Qi Shan, Dan Wu:

Toward a visual pedometer. 1025-1027 - Jinmi Kang, Hyejeong Jeong, Kidong Chung:

Scalable depth map coding for 3D video using contour information. 1028-1029 - Mao Lin Huang

, Weidong Huang
, Chun-Cheng Lin
:
Evaluating force-directed algorithms with a new framework. 1030-1032
Requirement engineering track
- Alberto Sardinha

, Yijun Yu, Nan Niu, Awais Rashid
:
EA-tracer: identifying traceability links between code aspects and early aspects. 1035-1042 - Alessio Ferrari

, Stefania Gnesi
, Gabriele Tolomei
:
A clustering-based approach for discovering flaws in requirements specifications. 1043-1050 - Sombat Chanvilai, Kozo Honda, Hiroyuki Nakagawa

, Yasuyuki Tahara, Akihiko Ohsuga:
Goal-oriented approach to creating class diagrams with OCL constraints. 1051-1056 - Anargyros Tsadimas

, Mara Nikolaidou, Dimosthenis Anagnostopoulos:
Extending SysML to explore non-functional requirements: the case of information system design. 1057-1062 - Patrizia Scandurra

, Andrea Arnoldi, Tao Yue, Marco Dolci:
Functional requirements validation by transforming use case models into Abstract State Machines. 1063-1068 - Yonghee Shin, Jane Cleland-Huang:

A comparative evaluation of two user feedback techniques for requirements trace retrieval. 1069-1074 - Vítor Estêvão Silva Souza

, Jose-Norberto Mazón
, Irene Garrigós, Juan Trujillo
, John Mylopoulos:
Monitoring strategic goals in data warehouses with awareness requirements. 1075-1082 - João Lemos, Carina Frota Alves, Leticia Duboc, Genaína Nunes Rodrigues

:
A systematic mapping study on creativity in requirements engineering. 1083-1088 - Omid Jafarinezhad, Raman Ramsin

:
Towards a process factory for developing situational requirements engineering processes. 1089-1090 - Saurabh Tiwari

, Atul Gupta
:
Statechart-based use case requirement validation of event-driven systems. 1091-1093
Software engineering track
- Ricardo Pérez-Castillo

, Ignacio García Rodríguez de Guzmán
, Mario Piattini
, Barbara Weber
:
Integrating event logs into KDM repositories. 1095-1102 - Andreas Schaad, Mike Borozdin:

TAM2: automated threat analysis. 1103-1108 - Luigi Lavazza, Sandro Morasca, Davide Taibi, Davide Tosi:

An empirical investigation of perceived reliability of open source Java programs. 1109-1114 - João Claudio Américo, Walter Rudametkin

, Didier Donsez:
Managing the dynamism of the OSGi Service Platform in real-time Java applications. 1115-1122 - Shimul Kumar Nath, Robert G. Merkel

, Man Fai Lau:
On the improvement of a fault classification scheme with implications for white-box testing. 1123-1130 - Rafael Ferreira, Patrick Henrique da S. Brito, Jean Melo, Evandro Costa, Rinaldo Lima, Frederico Luiz Gonçalves de Freitas:

An architecture-centered framework for developing blog crawlers. 1131-1136 - Davide Ancona, Viviana Mascardi, Ombretta Pavarino:

Ontology-based documentation extraction for semi-automatic migration of Java code. 1137-1143 - Hisayuki Horikoshi, Hiroyuki Nakagawa

, Yasuyuki Tahara, Akihiko Ohsuga:
Dynamic reconfiguration in self-adaptive systems considering non-functional properties. 1144-1150 - Jácome Cunha

, João Paulo Fernandes
, João Saraiva
:
From relational ClassSheets to UML+OCL. 1151-1158 - Mauro Luigi Drago, Judith Bishop:

DAG3: a tool for design and analysis of applications for multicore architectures. 1159-1164 - Zdenek Tronícek:

RefactoringNG: a flexible Java refactoring tool. 1165-1170 - Shinya Ikemoto, Tadashi Dohi

, Hiroyuki Okamura
:
Estimating software reliability via pseudo maximum likelihood method. 1171-1176 - André Luíz de Oliveira, Fabiano Cutigi Ferrari, Rosângela Aparecida Dellosso Penteado, Valter Vieira de Camargo:

Investigating framework product lines. 1177-1182 - Jan Friso Groote

, Ammar Osaiweran
, Jacco H. Wesselius:
Experience report on developing the Front-end client unit under the control of formal methods. 1183-1190 - Ziyuan Wang, Zhenyu Chen, Tsong Yueh Chen

, Baowen Xu
:
Fault class prioritization in Boolean expressions. 1191-1196 - Elisa Yumi Nakagawa

, Martin Becker, José Carlos Maldonado:
A knowledge-based framework for reference architectures. 1197-1202 - Satoru Ukimoto, Tadashi Dohi

, Hiroyuki Okamura
:
Software testing-resource allocation with operational profile. 1203-1208 - Márcio P. Basgalupp

, Rodrigo C. Barros
, Duncan D. Ruiz
:
Predicting software maintenance effort through evolutionary-based decision trees. 1209-1214 - Federica Sarro

, Sergio Di Martino
, Filomena Ferrucci, Carmine Gravino
:
A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction. 1215-1220 - Federica Sarro

, Filomena Ferrucci, Carmine Gravino
:
Single and Multi Objective Genetic Programming for software development effort estimation. 1221-1226 - Manishankar Mondal, Chanchal K. Roy, Md. Saidur Rahman, Ripon K. Saha, Jens Krinke

, Kevin A. Schneider
:
Comparative stability of cloned and non-cloned code: an empirical study. 1227-1234 - Minhaz F. Zibran, Chanchal K. Roy:

IDE-based real-time focused search for near-miss clones. 1235-1242 - Rosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana:

AODP: refactoring code to provide advanced aspect-oriented modularization of design patterns. 1243-1250 - Giuseppe Destefanis

, Roberto Tonelli
, Giulio Concas, Michele Marchesi
:
An analysis of anti-micro-patterns effects on fault-proneness in large Java systems. 1251-1253 - Karen Malone, Josephine Griffith:

A case study in the use of Groovy and Grails. 1254-1255 - Azadeh Alebrahim, Isabelle Côté, Maritta Heisel, Christine Choppy, Denis Hatebur:

Designing architectures from problem descriptions by interactive model transformation. 1256-1258 - Deepak Banthia, Atul Gupta

:
Investigating fault prediction capabilities of five prediction models for software quality. 1259-1261
Software verification and testing track
- Daniela Carneiro da Cruz, Maria João Frade

, Jorge Sousa Pinto
:
Verification conditions for single-assignment programs. 1264-1270 - Néstor Cataño

, Tim Wahls, Camilo Rueda
, Víctor Rivera, Danni Yu:
Translating B machines to JML specifications. 1271-1277 - Gwen Salaün, Xavier Etchevers, Noel De Palma, Fabienne Boyer, Thierry Coupaye:

Verification of a self-configuration protocol for distributed applications in the cloud. 1278-1283 - Omar Chebaro, Nikolai Kosmatov

, Alain Giorgetti
, Jacques Julliand:
Program slicing enhances a verification technique combining static and dynamic analysis. 1284-1291 - Karolina Zurowska, Jürgen Dingel:

Symbolic execution of UML-RT State Machines. 1292-1299 - Sandeep Dasgupta, Amey Karkare

:
Precise shape analysis using field sensitivity. 1300-1307 - Matteo Zanioli, Pietro Ferrara

, Agostino Cortesi
:
SAILS: static analysis of information leakage with sample. 1308-1313 - Richard Lassaigne, Sylvain Peyronnet:

Approximate planning and verification for large markov decision processes. 1314-1319 - Gian Perrone, Søren Debois, Thomas T. Hildebrandt:

A model checker for Bigraphs. 1320-1325 - Reynald Affeldt

:
On construction of a library of formally verified low-level arithmetic functions. 1326-1331 - Delphine Longuet:

Global and local testing from Message Sequence Charts. 1332-1338 - Junaid Haroon Siddiqui

, Sarfraz Khurshid:
Staged symbolic execution. 1339-1346
Bioinformatics track
- Eduardo Tavares

, J. Aleixo, Paulo Romero Martins Maciel, Danilo Oliveira, E. Heyde, R. Araujo, L. Maia, A. Duarte, Magdala de Araujo Novaes
:
Performance evaluation of medical imaging service. 1349-1354 - Maya El Dayeh, Michael Hahsler:

Analyzing incomplete biological pathways using network motifs. 1355-1360 - Diogo Telmo Neves, Tandy J. Warnow, João Luís Sobral

, Keshav Pingali:
Parallelizing SuperFine. 1361-1367 - Zanoni Dias, Ulisses Dias

, Lenwood S. Heath, João C. Setubal
:
Sorting genomes using almost-symmetric inversions. 1368-1374 - Gloria Childress Townsend, Wade N. Hazel, Benjamin Steffen:

Relationship of reproduction and evolutionary computation to analytical modeling of the ecological genetics of inducible defenses. 1375-1380 - Anurag Nagar, Hisham Al-Mubaid

, Saïd Bettayeb:
Computing gene functional similarity using combined graphs. 1381-1386 - Mohamad Koohi-Moghadam

, Adel Torkaman Rahmani:
Molecular docking with opposition-based differential evolution. 1387-1392 - Mark Menor, Guylaine Poisson, Kyungim Baek:

Probabilistic prediction of protein phosphorylation sites using kernel machines. 1393-1398 - Fabien Chhel, Frédéric Lardeux

, Adrien Goëffon, Frédéric Saubion:
Minimum multiple characterization of biological data using partially defined boolean formulas. 1399-1405 - Sara Montagna

, Danilo Pianini
, Mirko Viroli
:
A model for drosophila melanogaster development from a single cell to stripe pattern formation. 1406-1412 - Roberto De Virgilio, Simona E. Rombo:

Approximate matching over biological RDF graphs. 1413-1414 - Vo Hong Thanh, Roberto Zunino

:
Tree-based search for stochastic simulation algorithm. 1415-1416 - Guoli Ji, Zhe Xiang, Xiaohui Wu

, Shuiyuan Lin, Meishuang Tang, Junfeng Yao:
High-throughput antibody sequence alignment based on GPU computing. 1417-1418
Computer security track
- Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:

An empirical analysis of input validation mechanisms in web applications and languages. 1419-1426 - Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:

A security analysis of amazon's elastic compute cloud service. 1427-1434 - Nikos Mavrogiannopoulos

, Miloslav Trmac, Bart Preneel
:
A linux kernel cryptographic framework: decoupling cryptographic keys from applications. 1435-1442 - Mohd M. Anwar, Philip W. L. Fong:

A visualization tool for evaluating access control policies in facebook-style social network systems. 1443-1450 - Florian Kerschbaum:

Collusion-resistant outsourcing of private set intersection. 1451-1456 - Christopher Mann, Artem Starostin:

A framework for static detection of privacy leaks in android applications. 1457-1462 - Jorge Cuéllar, Martín Ochoa

, Ruben Rios:
Indistinguishable regions in geographic privacy. 1463-1469 - Jingyu Hua, Kouichi Sakurai:

Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation. 1470-1477 - Daniel Schreckling, Joachim Posegga, Daniel Hausknecht:

Constroid: data-centric access control for android. 1478-1485 - Seda Davtyan, Aggelos Kiayias, Laurent Michel

, Alexander Russell
, Alexander A. Shvartsman
:
Integrity of electronic voting systems: fallacious use of cryptography. 1486-1493 - Mete Rodoper, Arati Baliga, Edward Jung, Wade Trappe:

An efficient security framework for mobile WiMAX. 1494-1501 - Steffen Bartsch, Martina Angela Sasse:

Guiding decisions on authorization policies: a participatory approach to decision support. 1502-1507
Coordination models, languages and applications track
- José Proença

, Dave Clarke, Erik P. de Vink, Farhad Arbab:
Dreams: a framework for distributed synchronous coordination. 1510-1515 - Dries Harnie, Theo D'Hondt, Elisa Gonzalez Boix, Wolfgang De Meuter:

Programming urban-area applications. 1516-1521 - Edmond Gjondrekaj, Michele Loreti

, Rosario Pugliese
, Francesco Tiezzi:
Modeling adaptation with a tuple-based coordination language. 1522-1527 - Huu Nghia Nguyen

, Pascal Poizat
, Fatiha Zaïdi:
Passive conformance testing of service choreographies. 1528-1535 - Sarmen Keshishzadeh, Mohammad Izadi, Ali Movaghar

:
A Büchi automata based model checking framework for reo connectors. 1536-1543 - Igor Cappello, Paola Quaglia

:
Expressing global priorities by best-matching. 1544-1550 - Stefano Bistarelli

, Paola Campli, Francesco Santini
:
A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming. 1551-1553 - Linus Åkesson, Görel Hedin, Sven Gestegård Robertz, Boris Magnusson:

Instance-aware assemblies of services in pervasive computing. 1554-1556 - Ronaldo Menezes

, Andrea Omicini
, Mirko Viroli
:
Dynamic composition of coordination abstractions for pervasive systems: the case of LogOp. 1557-1559 - Stefan Craß, Eva Kühn:

A coordination-based access control model for space-based computing. 1560-1562
Embedded systems track
- Huan Li, Dong Liang, Lihui Xie, Gong Zhang, Krithi Ramamritham:

TL-Tree: flash-optimized storage for time-series sensing data on sensor platforms. 1565-1572 - Rômulo Silva de Oliveira

, Andreu Carminati
, Renan Augusto Starke:
On using adversary simulators to obtain tight lower bounds for response times. 1573-1579 - Ons Mbarek, Amani Khecharem, Alain Pegatoquet, Michel Auguin:

Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip design. 1580-1587 - Qi Zhong, Xuetao Guan, Tao Huang, Xu Cheng, Keyi Wang:

Affinity-aware DMA buffer management for reducing off-chip memory access. 1588-1593 - Muhammad Khurram Bhatti

, Cécile Belleudy, Michel Auguin:
A semi-partitioned real-time scheduling approach for periodic task systems on multicore platforms. 1594-1601 - Mohammed El-Shambakey, Binoy Ravindran

:
STM concurrency control for multicore embedded real-time software: time bounds and tradeoffs. 1602-1609 - Dongchul Park, Biplob K. Debnath, Youngjin Nam, David H. C. Du, Youngkyun Kim, Youngchul Kim:

HotDataTrap: a sampling-based hot data identification scheme for flash memory. 1610-1617 - Ting-Hao Tsai, Ya-Shu Chen:

Thermal-aware real-time task scheduling for three-dimensional multicore chip. 1618-1624 - Sravanthi Dandamudi, Sally K. Wahba, Jason O. Hallstrom:

An animation framework for improving the comprehension of TinyOS programs. 1625-1631 - Sanghyun Han, Hyun-Wook Jin:

Kernel-level ARINC 653 partitioning for Linux. 1632-1637 - Pierre-Alain Fouque

, Delphine Leresteux, Frédéric Valette:
Using faults for buffer overflow effects. 1638-1639 - Gerd Beuster, Karin Greimel:

Formal security policy models for smart card evaluations. 1640-1642 - Sung Kyu Park, Hyunchul Seok, Dong-Jae Shin

, Kyu Ho Park:
PRAM wear-leveling algorithm for hybrid main memory based on data buffering, swapping, and shifting. 1643-1644
Enterprise engineering track
- Rafael Z. Frantz

, Rafael Corchuelo
:
A software development kit to implement integration solutions. 1647-1652 - Manfred Reichert, Jens Kolb, Ralph Bobrik, Thomas Bauer:

Enabling personalized visualization of large business processes through parameterizable views. 1653-1660 - Vanea Chiprianov, Yvon Kermarrec, Siegfried Rouvrais:

Extending Enterprise Architecture Modeling Languages: application to telecommunications service creation. 1661-1666 - Ganna Monakova, Achim D. Brucker

, Andreas Schaad:
Security and safety of assets in business processes. 1667-1673 - Peter Rittgen:

The role of editor in collaborative modeling. 1674-1679 - Eufemia Tinelli, Simona Colucci

, Eugenio Di Sciascio
, Francesco M. Donini:
Knowledge compilation for automated Team Composition exploiting standard SQL. 1680-1685 - Rômulo Henrique Arpini, João Paulo A. Almeida

:
On the support for the assignment of active structure and behavior in enterprise modeling approaches. 1686-1693 - Lucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis

, Marten van Sinderen
, Henk Jonkers, Dick A. C. Quartel:
Mapping the business model canvas to ArchiMate. 1694-1701 - Manoel Sancho da Silva Neto, Renata Mendes de Araujo

:
Keeping decisions and rationale explicit in business process analysis. 1702-1708 - Rafael Accorsi, Thomas Stocker:

On the exploitation of process mining for security audits: the conformance checking case. 1709-1716 - Christoph Günther, Stefan Schönig

, Stefan Jablonski:
Dynamic guidance enhancement in workflow management systems. 1717-1719 - Andrea Delgado

, Francisco Ruiz
, Ignacio García Rodríguez de Guzmán
, Mario Piattini
:
Model transformations for Business-IT alignment: from collaborative business process to SoaML service model. 1720-1722 - Liping Zhao

, Keletso Letsholo
, Erol-Valeriu Chioasca, Sandra de F. Mendes Sampaio, Pedro Sampaio:
Can business process modeling bridge the gap between business and information systems? 1723-1724 - Fabiana Jack Nogueira Santos, Claudia Cappelli, Flávia Maria Santoro, Julio César Sampaio do Prado Leite

, Thaís Vasconcelos Batista
:
Analysis of heuristics to identify crosscutting concerns in business process models. 1725-1726
Object oriented programming languages and systems track
- Weiyu Miao, Jeremy G. Siek

:
Pattern-based traits. 1729-1736 - Ferruccio Damiani

, Arnd Poetzsch-Heffter, Yannick Welsch:
A type system for checking specialization of packages in object-oriented programming. 1737-1742 - Xiaolong Tang, Jaakko Järvi:

Exploiting regularity of user-defined types to improve precision of program analyses. 1743-1750
Operating systems track
- Nikolaus Jeremic, Gero Mühl, Anselm Busse

, Jan Richling:
Operating system support for dynamic over-provisioning of solid state drives. 1753-1758 - Pilar González-Férez

, Juan Piernas
, Toni Cortes
:
DADS: dynamic and automatic disk scheduling. 1759-1764 - Junqing Wang, Miao Yu, Bingyu Li, Zhengwei Qi, Haibing Guan:

Hypervisor-based protection of sensitive files in a compromised system. 1765-1770 - Sherif Fadel Fahmy

, Binoy Ravindran
, E. Douglas Jensen:
Implementing distributable real-time threads in the Linux kernel: programming interface and scheduling support. 1771-1778 - Tao Huang, Qi Zhong, Xuetao Guan, Xiaoyin Wang, Xu Cheng, Keyi Wang:

Reducing last level cache pollution through OS-level software-controlled region-based partitioning. 1779-1784 - Bongjae Kim

, Minkyu Park, Cheol Jeon, Chang Oan Sung, Yookun Cho, Jiman Hong:
AAGC: an efficient associativity-aware garbage collection scheme for hybrid FTLs. 1785-1790 - Jinman Jung, Joonhyouk Jang, Yookun Cho, Hwansoo Han, Gwangil Jeon, Seong-je Cho, Minwoo Jang, Jung-Yeop Kim:

A fast mount mechanism for YAFFS2. 1791-1795 - Eungyu Lee, Joonwoo Lee, Hyeongseok Kang, Kanghee Kim, Sung-Ryul Kim, Sung Y. Shin:

An implementation study of a ghost drive: hidden file store in a filesystem. 1796-1798 - Jongmin Lee, Ahreum Kim, Moonju Park, Jongmoo Choi, Donghee Lee, Sam H. Noh:

Real-time flash memory storage with Janus-FTL. 1799-1806 - Yoshihiro Oyama, Tran Truong Duc Giang, Yosuke Chubachi, Takahiro Shinagawa

, Kazuhiko Kato:
Detecting malware signatures in a thin hypervisor. 1807-1814 - Julie Baro, Frédéric Boniol, Mikel Cordovilla, Eric Noulard, Claire Pagetti:

Off-line (Optimal) multiprocessor scheduling of dependent periodic tasks. 1815-1820 - Jong-Chan Kim, Kyoung-Soo We, Chang-Gun Lee, Kwei-Jay Lin, Yun Sang Lee:

HW resource componentizing for smooth migration from single-function ECU to multi-function ECU. 1821-1828 - Yushi Omote, Yosuke Chubachi, Takahiro Shinagawa

, Tomohiro Kitamura, Hideki Eiraku, Katsuya Matsubara:
Hypervisor-based background encryption. 1829-1836 - Luca Abeni

, Tadeus Prastowo
:
Experiences with client/server interactions in a reservation-based system. 1837-1839 - Sanghoon Jeon, Jaeyoung Choi:

Reuse of JIT compiled code in JavaScript engine. 1840-1842 - Junghoon Lee, Hye-Jin Kim, Gyung-Leen Park:

A genetic scheduler for electric vehicle charging. 1843-1844 - Chaeseok Im, Minkyu Jeong, Jae Don Lee, Seungwon Lee, Shihwa Lee:

A real-time operating system for manycore systems. 1845-1846 - Chin-Hsien Wu:

Data sorting in flash memory. 1847-1849
Programming for separation of concerns track
- Somayeh Malakuti, Mehmet Aksit:

Evolution of composition filters to event composition. 1850-1857 - Ying Liu, Walter Cazzola

, Bin Zhang:
Towards a colored reflective Petri-net approach to model self-evolving service-oriented architectures. 1858-1865 - Rosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana:

Superimposing roles for design patterns into application classes by means of aspects. 1866-1868
Programming languages track
- Christian Häubl, Christian Wimmer, Hanspeter Mössenböck

:
Evaluation of trace inlining heuristics for Java. 1871-1876 - Kevin Marth, Shangping Ren:

Model-Driven Development with eUML-ARC. 1877-1882 - Behrooz Nobakht, Frank S. de Boer, Mohammad Mahdi Jaghoori, Rudolf Schlatte

:
Programming and deployment of active objects with application-level scheduling. 1883-1888 - Paul Tarau, David Haraburda:

On computing with types. 1889-1896 - Davide Ancona:

Regular corecursion in Prolog. 1897-1902 - Corrado Priami, Paola Quaglia

, Roberto Zunino
:
An imperative language of self-modifying graphs for biological systems. 1903-1909 - Vadim Zaytsev

:
BNF was here: what have we done about the unnecessary diversity of notation for syntactic definitions. 1910-1915 - Florian Brandner

, Quentin Colombet:
Copy elimination on data dependence graphs. 1916-1918 - David Broman, Peter Fritzson, Görel Hedin, Johan Åkesson:

A comparison of two metacompilation approaches to implementing a complex domain-specific language. 1919-1921 - Fadi A. Zaraket

, Mohamad Noureddine, Mohamed Sabra, Ameen Jaber:
Portable Parallel Programs using architecture-aware libraries. 1922-1924
Service-oriented architecture and programming track
- Pascal Poizat

, Gwen Salaün:
Checking the realizability of BPMN 2.0 choreographies. 1927-1934 - Chiraz El Hog, Raoudha Ben Djemaa

, Ikram Amous:
Profile annotation for adaptable Web Service description. 1935-1940 - Giovanni Bernardi

, Matthew Hennessy:
Modelling session types using contracts. 1941-1946 - Yunxi Zhang

, Tanko Ishaya
:
An XML-based protocol for improving trust negotiation between Web Services. 1947-1954 - Zakaria Maamar

, Noura Faci, Michael Luck
, Salahdine Hachimi:
Specifying and implementing social Web services operation using commitments. 1955-1960 - Leandro Sales Pinto, Gianpaolo Cugola, Carlo Ghezzi:

Dealing with changes in service orchestrations. 1961-1967 - Yuhong Yan, Min Chen, Yubin Yang:

Anytime QoS optimization over the PlanGraph for web service composition. 1968-1975 - Emna Fki, Mohamed Jmaiel, Chantal Soulé-Dupuy, Saïd Tazi:

A flexible approach for service composition using service patterns. 1976-1983 - Espen Højsgaard, Tim Hallwyl:

Core BPEL: syntactic simplification of WS-BPEL 2.0. 1984-1991 - Yehia Taher, Willem-Jan van den Heuvel, Michael Parkin:

A three step based approach for Web Service adaptation. 1992-1993 - Milan Gocic

, Dragan Stojanovic
:
Service-oriented paradigm for analyzing hydrological processes. 1994-1995 - Paulo G. G. Queiroz

, Rosana T. V. Braga
:
Application engineering of service-based software product lines. 1996-1997 - Martin Treiber, Daniel Schall, Schahram Dustdar

, Christian Scherling:
Creating mobile ad hoc workflows with Twitter. 1998-2000
Trust, reputation, evidence and other collaboration know-how track
- Yoshinori Hijikata, Yuki Kai, Shogo Nishida:

The relation between user intervention and user satisfaction for information recommendation. 2002-2007 - Qi Qi, Zhenyu Chen, Jia Liu, Chengfeng Hui, Qing Wu:

Using inferred tag ratings to improve user-based collaborative filtering. 2008-2013 - Zeinab Noorian, Michael W. Fleming, Stephen Marsh:

Preference-oriented QoS-based service discovery with dynamic trust and reputation management. 2014-2021 - Reda Yaich, Olivier Boissier, Philippe Jaillon, Gauthier Picard

:
An adaptive and Socially-Compliant Trust Management System for virtual communities. 2022-2028 - Gianpiero Costantino, Charles Morisset, Marinella Petrocchi:

Subjective review-based reputation. 2029-2034 - Alan Said

, Brijnesh J. Jain, Sahin Albayrak
:
Analyzing weighting schemes in collaborative filtering: cold start, post cold start and power users. 2035-2040 - Pramod Divakarmurthy, Ronaldo Menezes

:
Area diversity in computer science collaborations. 2041-2042 - Joana G. Malaverri, Claudia Bauzer Medeiros

, Rubens Augusto Camargo Lamparelli:
A provenance approach to assess the quality of geospatial data. 2043-2044

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














