callback( { "result":{ "query":":facetid:toc:\"db/conf/compsac/compsac2010w.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"212.27" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"67", "@dc":"67", "@oc":"67", "@id":"43282221", "text":":facetid:toc:db/conf/compsac/compsac2010w.bht" } }, "hits":{ "@total":"67", "@computed":"67", "@sent":"67", "@first":"0", "hit":[{ "@score":"1", "@id":"4870974", "info":{"authors":{"author":[{"@pid":"43/3220-1","text":"Marco Aiello 0001"},{"@pid":"31/8014","text":"Pavel Bulanov"},{"@pid":"23/10493","text":"Heerko Groefsema"}]},"title":"Requirements and Tools for Variability Management.","venue":"COMPSAC Workshops","pages":"245-250","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AielloBG10","doi":"10.1109/COMPSACW.2010.50","ee":"https://doi.org/10.1109/COMPSACW.2010.50","url":"https://dblp.org/rec/conf/compsac/AielloBG10"}, "url":"URL#4870974" }, { "@score":"1", "@id":"4870975", "info":{"authors":{"author":[{"@pid":"69/9814","text":"Manal Al-Bahlal"},{"@pid":"07/5565","text":"Jalal Al-Muhtadi"}]},"title":"A Middleware for Personal Smart Spaces.","venue":"COMPSAC Workshops","pages":"299-304","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Al-BahlalA10","doi":"10.1109/COMPSACW.2010.59","ee":"https://doi.org/10.1109/COMPSACW.2010.59","url":"https://dblp.org/rec/conf/compsac/Al-BahlalA10"}, "url":"URL#4870975" }, { "@score":"1", "@id":"4870976", "info":{"authors":{"author":[{"@pid":"34/10921","text":"Omar Alshathry"},{"@pid":"69/1646","text":"Helge Janicke"}]},"title":"Optimizing Software Quality Assurance.","venue":"COMPSAC Workshops","pages":"87-92","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AlshathryJ10","doi":"10.1109/COMPSACW.2010.25","ee":"https://doi.org/10.1109/COMPSACW.2010.25","url":"https://dblp.org/rec/conf/compsac/AlshathryJ10"}, "url":"URL#4870976" }, { "@score":"1", "@id":"4870977", "info":{"authors":{"author":{"@pid":"34/3688","text":"M. F. van Amstel"}},"title":"The Right Tool for the Right Job: Assessing Model Transformation Quality.","venue":"COMPSAC Workshops","pages":"69-74","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Amstel10","doi":"10.1109/COMPSACW.2010.22","ee":"https://doi.org/10.1109/COMPSACW.2010.22","url":"https://dblp.org/rec/conf/compsac/Amstel10"}, "url":"URL#4870977" }, { "@score":"1", "@id":"4870978", "info":{"authors":{"author":[{"@pid":"06/1710","text":"Dong Chan An"},{"@pid":"95/2895","text":"Seog Park"}]},"title":"Flexible Prime Number Labeling for Resource Limited Clients.","venue":"COMPSAC Workshops","pages":"146-151","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AnP10","doi":"10.1109/COMPSACW.2010.34","ee":"https://doi.org/10.1109/COMPSACW.2010.34","url":"https://dblp.org/rec/conf/compsac/AnP10"}, "url":"URL#4870978" }, { "@score":"1", "@id":"4870979", "info":{"authors":{"author":[{"@pid":"24/10921","text":"Kumar P. Anoop Anoop"},{"@pid":"10/10921","text":"Sathia Narayanan"},{"@pid":"13/10921","text":"Vijayalakshmi Mallenahalli Siddaiah"}]},"title":"COTS Integrations: Effort Estimation Best Practices.","venue":"COMPSAC Workshops","pages":"81-86","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/AnoopNS10","doi":"10.1109/COMPSACW.2010.24","ee":"https://doi.org/10.1109/COMPSACW.2010.24","url":"https://dblp.org/rec/conf/compsac/AnoopNS10"}, "url":"URL#4870979" }, { "@score":"1", "@id":"4870981", "info":{"authors":{"author":[{"@pid":"48/10921","text":"Asli Apaydin"},{"@pid":"92/5742","text":"Duygu Çelik"},{"@pid":"e/AtillaElci","text":"Atilla Elçi"}]},"title":"Semantic Image Retrieval Model for Sharing Experiences in Social Networks.","venue":"COMPSAC Workshops","pages":"1-6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ApaydinCE10","doi":"10.1109/COMPSACW.2010.11","ee":"https://doi.org/10.1109/COMPSACW.2010.11","url":"https://dblp.org/rec/conf/compsac/ApaydinCE10"}, "url":"URL#4870981" }, { "@score":"1", "@id":"4870985", "info":{"authors":{"author":[{"@pid":"b/NadiaBennani","text":"Nadia Bennani"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"60/3624","text":"Stelvio Cimato"}]},"title":"Toward Cloud-Based Key Management for Outsourced Databases.","venue":"COMPSAC Workshops","pages":"232-236","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BennaniDC10","doi":"10.1109/COMPSACW.2010.47","ee":"https://doi.org/10.1109/COMPSACW.2010.47","url":"https://dblp.org/rec/conf/compsac/BennaniDC10"}, "url":"URL#4870985" }, { "@score":"1", "@id":"4870986", "info":{"authors":{"author":[{"@pid":"71/2136","text":"Ivona Brandic"},{"@pid":"09/8090","text":"Vincent C. Emeakaroha"},{"@pid":"10/5899","text":"Michael Maurer"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"},{"@pid":"60/11463","text":"Sandor Acs"},{"@pid":"k/AttilaKertesz","text":"Attila Kertész"},{"@pid":"31/6374","text":"Gabor Kecskemeti"}]},"title":"LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures.","venue":"COMPSAC Workshops","pages":"365-370","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/BrandicEMDAKK10","doi":"10.1109/COMPSACW.2010.70","ee":"https://doi.org/10.1109/COMPSACW.2010.70","url":"https://dblp.org/rec/conf/compsac/BrandicEMDAKK10"}, "url":"URL#4870986" }, { "@score":"1", "@id":"4870988", "info":{"authors":{"author":[{"@pid":"92/5742","text":"Duygu Çelik"},{"@pid":"e/AtillaElci","text":"Atilla Elçi"}]},"title":"Ontology-Based QoS Queuing Model for Selection of Web Services Servers.","venue":"COMPSAC Workshops","pages":"7-12","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/CelikE10","doi":"10.1109/COMPSACW.2010.12","ee":"https://doi.org/10.1109/COMPSACW.2010.12","url":"https://dblp.org/rec/conf/compsac/CelikE10"}, "url":"URL#4870988" }, { "@score":"1", "@id":"4870989", "info":{"authors":{"author":[{"@pid":"45/10921","text":"Ajay Challagalla"},{"@pid":"20/10921","text":"S. S. Shivaji Dhiraj"},{"@pid":"72/4050","text":"Durvasula V. L. N. Somayajulu"},{"@pid":"84/10920","text":"Toms Shaji Mathew"},{"@pid":"11/10921","text":"Saurav Tiwari"},{"@pid":"55/10921","text":"Syed Sharique Ahmad"}]},"title":"Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods.","venue":"COMPSAC Workshops","pages":"152-157","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChallagallaDSMTA10","doi":"10.1109/COMPSACW.2010.35","ee":"https://doi.org/10.1109/COMPSACW.2010.35","url":"https://dblp.org/rec/conf/compsac/ChallagallaDSMTA10"}, "url":"URL#4870989" }, { "@score":"1", "@id":"4870991", "info":{"authors":{"author":[{"@pid":"22/6904","text":"Rong Chen"},{"@pid":"06/8777","text":"Lina Hong"},{"@pid":"46/10921","text":"Chunyan Lü"},{"@pid":"22/3924","text":"Wu Deng"}]},"title":"Author Identification of Software Source Code with Program Dependence Graphs.","venue":"COMPSAC Workshops","pages":"281-286","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ChenHLD10","doi":"10.1109/COMPSACW.2010.56","ee":"https://doi.org/10.1109/COMPSACW.2010.56","url":"https://dblp.org/rec/conf/compsac/ChenHLD10"}, "url":"URL#4870991" }, { "@score":"1", "@id":"4870998", "info":{"authors":{"author":[{"@pid":"90/10920","text":"Victor Echeverría"},{"@pid":"l/LorieMLiebrock","text":"Lorie M. Liebrock"},{"@pid":"57/6003","text":"Dongwan Shin"}]},"title":"Permission Management System: Permission as a Service in Cloud Computing.","venue":"COMPSAC Workshops","pages":"371-375","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/EcheverriaLS10","doi":"10.1109/COMPSACW.2010.71","ee":"https://doi.org/10.1109/COMPSACW.2010.71","url":"https://dblp.org/rec/conf/compsac/EcheverriaLS10"}, "url":"URL#4870998" }, { "@score":"1", "@id":"4870999", "info":{"authors":{"author":[{"@pid":"60/351","text":"Ahmed M. Elmisery"},{"@pid":"97/5576","text":"Huaiguo Fu"}]},"title":"Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols.","venue":"COMPSAC Workshops","pages":"140-145","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ElmiseryF10","doi":"10.1109/COMPSACW.2010.33","ee":"https://doi.org/10.1109/COMPSACW.2010.33","url":"https://dblp.org/rec/conf/compsac/ElmiseryF10"}, "url":"URL#4870999" }, { "@score":"1", "@id":"4871000", "info":{"authors":{"author":[{"@pid":"04/866","text":"Roberto Silveira Silva Filho"},{"@pid":"09/7006","text":"Christof J. Budnik"},{"@pid":"18/1990","text":"William M. Hasling"},{"@pid":"28/10921","text":"Monica McKenna"},{"@pid":"47/5233","text":"Rajesh Subramanyan"}]},"title":"Supporting Concern-Based Regression Testing and Prioritization in a Model-Driven Environment.","venue":"COMPSAC Workshops","pages":"323-328","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/FilhoBHMS10","doi":"10.1109/COMPSACW.2010.63","ee":"https://doi.org/10.1109/COMPSACW.2010.63","url":"https://dblp.org/rec/conf/compsac/FilhoBHMS10"}, "url":"URL#4871000" }, { "@score":"1", "@id":"4871001", "info":{"authors":{"author":[{"@pid":"88/4716","text":"Thoshitha T. Gamage"},{"@pid":"91/2733","text":"Bruce M. McMillin"},{"@pid":"64/10591","text":"Thomas P. Roth"}]},"title":"Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation.","venue":"COMPSAC Workshops","pages":"158-163","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GamageMR10","doi":"10.1109/COMPSACW.2010.36","ee":"https://doi.org/10.1109/COMPSACW.2010.36","url":"https://dblp.org/rec/conf/compsac/GamageMR10"}, "url":"URL#4871001" }, { "@score":"1", "@id":"4871004", "info":{"authors":{"author":[{"@pid":"89/10920","text":"Le Truong Giang"},{"@pid":"39/3831","text":"Dongwon Kang"},{"@pid":"32/5432","text":"Doo-Hwan Bae"}]},"title":"Software Fault Prediction Models for Web Applications.","venue":"COMPSAC Workshops","pages":"51-56","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GiangKB10","doi":"10.1109/COMPSACW.2010.19","ee":"https://doi.org/10.1109/COMPSACW.2010.19","url":"https://dblp.org/rec/conf/compsac/GiangKB10"}, "url":"URL#4871004" }, { "@score":"1", "@id":"4871006", "info":{"authors":{"author":[{"@pid":"49/3681","text":"Tor-Morten Grønli"},{"@pid":"42/8102","text":"Jarle Hansen"},{"@pid":"g/GeorgeGhinea","text":"Gheorghita Ghinea"}]},"title":"A Context-Aware Meeting Room: Mobile Interaction and Collaboration Using Android, Java ME and Windows Mobile.","venue":"COMPSAC Workshops","pages":"311-316","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/GronliHG10","doi":"10.1109/COMPSACW.2010.61","ee":"https://doi.org/10.1109/COMPSACW.2010.61","url":"https://dblp.org/rec/conf/compsac/GronliHG10"}, "url":"URL#4871006" }, { "@score":"1", "@id":"4871008", "info":{"authors":{"author":{"@pid":"50/10921","text":"Sean Gu"}},"title":"Loosely-Coupled SOA Service Access Provisioning.","venue":"COMPSAC Workshops","pages":"259-262","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Gu10","doi":"10.1109/COMPSACW.2010.52","ee":"https://doi.org/10.1109/COMPSACW.2010.52","url":"https://dblp.org/rec/conf/compsac/Gu10"}, "url":"URL#4871008" }, { "@score":"1", "@id":"4871018", "info":{"authors":{"author":[{"@pid":"03/6758","text":"Chao-Jung Hsu"},{"@pid":"09/10921","text":"Nancy Urbina Rodas"},{"@pid":"49/4191","text":"Chin-Yu Huang"},{"@pid":"94/10920","text":"Kuan-Li Peng"}]},"title":"A Study of Improving the Accuracy of Software Effort Estimation Using Linearly Weighted Combinations.","venue":"COMPSAC Workshops","pages":"98-103","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HsuRHP10","doi":"10.1109/COMPSACW.2010.27","ee":"https://doi.org/10.1109/COMPSACW.2010.27","url":"https://dblp.org/rec/conf/compsac/HsuRHP10"}, "url":"URL#4871018" }, { "@score":"1", "@id":"4871019", "info":{"authors":{"author":[{"@pid":"70/7567","text":"Hwai-Jung Hsu"},{"@pid":"65/6289","text":"Feng-Jian Wang"}]},"title":"Delegation Pattern in Workflow System.","venue":"COMPSAC Workshops","pages":"189-195","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HsuW10","doi":"10.1109/COMPSACW.2010.75","ee":"https://doi.org/10.1109/COMPSACW.2010.75","url":"https://dblp.org/rec/conf/compsac/HsuW10"}, "url":"URL#4871019" }, { "@score":"1", "@id":"4871021", "info":{"authors":{"author":[{"@pid":"99/5658","text":"Hai Hu"},{"@pid":"87/5409","text":"Chang-Hai Jiang"},{"@pid":"70/6154","text":"Feng Ye"},{"@pid":"71/5252","text":"Kai-Yuan Cai"},{"@pid":"91/5329","text":"Dazhi Huang"},{"@pid":"51/247","text":"Stephen S. Yau"}]},"title":"A Parallel Implementation Strategy of Adaptive Testing.","venue":"COMPSAC Workshops","pages":"214-219","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/HuJYCHY10","doi":"10.1109/COMPSACW.2010.44","ee":"https://doi.org/10.1109/COMPSACW.2010.44","url":"https://dblp.org/rec/conf/compsac/HuJYCHY10"}, "url":"URL#4871021" }, { "@score":"1", "@id":"4871035", "info":{"authors":{"author":[{"@pid":"26/690","text":"Suntae Kim"},{"@pid":"03/6158","text":"Minseong Kim"},{"@pid":"66/6868","text":"Vijayan Sugumaran"},{"@pid":"93/6311","text":"Sooyong Park"}]},"title":"A Scenario Based Approach for Service Identification.","venue":"COMPSAC Workshops","pages":"237-238","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimKSP10","doi":"10.1109/COMPSACW.2010.48","ee":"https://doi.org/10.1109/COMPSACW.2010.48","url":"https://dblp.org/rec/conf/compsac/KimKSP10"}, "url":"URL#4871035" }, { "@score":"1", "@id":"4871037", "info":{"authors":{"author":[{"@pid":"27/6169","text":"Taehun Kim"},{"@pid":"68/4784","text":"Insuk Park"},{"@pid":"85/1315","text":"Soon J. Hyun"},{"@pid":"89/81","text":"Dongman Lee"}]},"title":"MiRE4OWL: Mobile Rule Engine for OWL.","venue":"COMPSAC Workshops","pages":"317-322","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimPHL10","doi":"10.1109/COMPSACW.2010.62","ee":"https://doi.org/10.1109/COMPSACW.2010.62","url":"https://dblp.org/rec/conf/compsac/KimPHL10"}, "url":"URL#4871037" }, { "@score":"1", "@id":"4871038", "info":{"authors":{"author":[{"@pid":"95/2636","text":"Mi-Young Kim"},{"@pid":"z/OsmarRZaiane","text":"Osmar R. Zaïane"},{"@pid":"g/RandyGoebel","text":"Randy Goebel"}]},"title":"Natural Language Watermarking Based on Syntactic Displacement and Morphological Division.","venue":"COMPSAC Workshops","pages":"164-169","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KimZG10","doi":"10.1109/COMPSACW.2010.37","ee":"https://doi.org/10.1109/COMPSACW.2010.37","url":"https://dblp.org/rec/conf/compsac/KimZG10"}, "url":"URL#4871038" }, { "@score":"1", "@id":"4871039", "info":{"authors":{"author":[{"@pid":"04/10921","text":"Vasileios Koutsoumpas"},{"@pid":"33/5071","text":"Kostas Kontogiannis"},{"@pid":"05/3441","text":"Peter Matthews"}]},"title":"Dynamic Analysis for the Reconstruction of System Behavior Models.","venue":"COMPSAC Workshops","pages":"273-280","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KoutsoumpasKM10","doi":"10.1109/COMPSACW.2010.55","ee":"https://doi.org/10.1109/COMPSACW.2010.55","url":"https://dblp.org/rec/conf/compsac/KoutsoumpasKM10"}, "url":"URL#4871039" }, { "@score":"1", "@id":"4871040", "info":{"authors":{"author":[{"@pid":"94/10118","text":"Indika Kumara"},{"@pid":"09/930","text":"Chandana Gamage"}]},"title":"Towards Reusing ESB Services in Different ESB Architectures.","venue":"COMPSAC Workshops","pages":"25-30","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KumaraG10","doi":"10.1109/COMPSACW.2010.15","ee":"https://doi.org/10.1109/COMPSACW.2010.15","url":"https://dblp.org/rec/conf/compsac/KumaraG10"}, "url":"URL#4871040" }, { "@score":"1", "@id":"4871041", "info":{"authors":{"author":[{"@pid":"14/728","text":"Sukhamay Kundu"},{"@pid":"15/3402","text":"Supratik Mukhopadhyay"}]},"title":"Approximation of CFL by Regular Languages for Concurrent Program Verification.","venue":"COMPSAC Workshops","pages":"353-358","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/KunduM10","doi":"10.1109/COMPSACW.2010.68","ee":"https://doi.org/10.1109/COMPSACW.2010.68","url":"https://dblp.org/rec/conf/compsac/KunduM10"}, "url":"URL#4871041" }, { "@score":"1", "@id":"4871043", "info":{"authors":{"author":[{"@pid":"65/6110","text":"Tsung Lee"},{"@pid":"49/10921","text":"Jhih-Syan Hou"}]},"title":"A Model Expansion Method in Schema-Based Model Evolution.","venue":"COMPSAC Workshops","pages":"75-80","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LeeH10","doi":"10.1109/COMPSACW.2010.23","ee":"https://doi.org/10.1109/COMPSACW.2010.23","url":"https://dblp.org/rec/conf/compsac/LeeH10"}, "url":"URL#4871043" }, { "@score":"1", "@id":"4871046", "info":{"authors":{"author":[{"@pid":"11/10257","text":"Michael Lettner"},{"@pid":"93/10256","text":"Michael Tschernuth"}]},"title":"Applied MDA for Embedded Devices: Software Design and Code Generation for a Low-Cost Mobile Phone.","venue":"COMPSAC Workshops","pages":"63-68","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LettnerT10","doi":"10.1109/COMPSACW.2010.21","ee":"https://doi.org/10.1109/COMPSACW.2010.21","url":"https://dblp.org/rec/conf/compsac/LettnerT10"}, "url":"URL#4871046" }, { "@score":"1", "@id":"4871047", "info":{"authors":{"author":[{"@pid":"29/3826-1","text":"Tong Li 0001"},{"@pid":"61/2115-1","text":"Lin Liu 0001"},{"@pid":"91/1565","text":"Golnaz Elahi"},{"@pid":"33/5374","text":"Eric S. K. Yu"},{"@pid":"b/BRBryant","text":"Barrett R. Bryant"}]},"title":"Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint.","venue":"COMPSAC Workshops","pages":"127-133","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiLEYB10","doi":"10.1109/COMPSACW.2010.98","ee":"https://doi.org/10.1109/COMPSACW.2010.98","url":"https://dblp.org/rec/conf/compsac/LiLEYB10"}, "url":"URL#4871047" }, { "@score":"1", "@id":"4871048", "info":{"authors":{"author":[{"@pid":"80/6898","text":"Hua Li"},{"@pid":"35/10921","text":"Yong-guang Peng"},{"@pid":"31/1280","text":"Xinming Ye"},{"@pid":"98/10920","text":"Jing-yuan Yue"}]},"title":"Test Sequence Generation from Combining Property Modeling and Program Slicing.","venue":"COMPSAC Workshops","pages":"45-50","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LiPYY10","doi":"10.1109/COMPSACW.2010.18","ee":"https://doi.org/10.1109/COMPSACW.2010.18","url":"https://dblp.org/rec/conf/compsac/LiPYY10"}, "url":"URL#4871048" }, { "@score":"1", "@id":"4871050", "info":{"authors":{"author":[{"@pid":"80/2054-7","text":"Jing Lin 0007"},{"@pid":"s/SahraSedigh","text":"Sahra Sedigh"},{"@pid":"05/2852","text":"Ann Miller"}]},"title":"Modeling Cyber-Physical Systems with Semantic Agents.","venue":"COMPSAC Workshops","pages":"13-18","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/LinSM10","doi":"10.1109/COMPSACW.2010.13","ee":"https://doi.org/10.1109/COMPSACW.2010.13","url":"https://dblp.org/rec/conf/compsac/LinSM10"}, "url":"URL#4871050" }, { "@score":"1", "@id":"4871055", "info":{"authors":{"author":[{"@pid":"17/7466","text":"Jason Madden"},{"@pid":"91/2733","text":"Bruce M. McMillin"},{"@pid":"07/10921","text":"Anik Sinha"}]},"title":"Environmental Obfuscation of a Cyber Physical System - Vehicle Example.","venue":"COMPSAC Workshops","pages":"176-181","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MaddenMS10","doi":"10.1109/COMPSACW.2010.39","ee":"https://doi.org/10.1109/COMPSACW.2010.39","url":"https://dblp.org/rec/conf/compsac/MaddenMS10"}, "url":"URL#4871055" }, { "@score":"1", "@id":"4871059", "info":{"authors":{"author":[{"@pid":"63/6597","text":"Rajesh K. Mansharamani"},{"@pid":"91/6223","text":"Amol Khanapurkar"},{"@pid":"39/2198","text":"Benny Mathew"},{"@pid":"47/5233","text":"Rajesh Subramanyan"}]},"title":"Performance Testing: Far from Steady State.","venue":"COMPSAC Workshops","pages":"341-346","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MansharamaniKMS10","doi":"10.1109/COMPSACW.2010.66","ee":"https://doi.org/10.1109/COMPSACW.2010.66","url":"https://dblp.org/rec/conf/compsac/MansharamaniKMS10"}, "url":"URL#4871059" }, { "@score":"1", "@id":"4871063", "info":{"authors":{"author":[{"@pid":"41/10921","text":"Moesfa Soeheila Mohamad"},{"@pid":"05/1698","text":"Geong Sen Poh"}]},"title":"Analysis of Two Watermarking Protocols Based on Commutative Encryption.","venue":"COMPSAC Workshops","pages":"115-120","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MohamadP10","doi":"10.1109/COMPSACW.2010.30","ee":"https://doi.org/10.1109/COMPSACW.2010.30","url":"https://dblp.org/rec/conf/compsac/MohamadP10"}, "url":"URL#4871063" }, { "@score":"1", "@id":"4871064", "info":{"authors":{"author":[{"@pid":"68/5504","text":"Atef Mohamed"},{"@pid":"45/1198","text":"Mohammad Zulkernine"}]},"title":"The Level of Decomposition Impact on Component Fault Tolerance.","venue":"COMPSAC Workshops","pages":"57-62","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/MohamedZ10","doi":"10.1109/COMPSACW.2010.20","ee":"https://doi.org/10.1109/COMPSACW.2010.20","url":"https://dblp.org/rec/conf/compsac/MohamedZ10"}, "url":"URL#4871064" }, { "@score":"1", "@id":"4871065", "info":{"authors":{"author":[{"@pid":"02/4127-1","text":"Shin Nakajima 0001"},{"@pid":"88/331","text":"Keiji Hokamura"},{"@pid":"85/2856","text":"Naoyasu Ubayashi"}]},"title":"Aspect-Oriented Development of PHP-Based Web Applications.","venue":"COMPSAC Workshops","pages":"37-44","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/NakajimaHU10","doi":"10.1109/COMPSACW.2010.17","ee":"https://doi.org/10.1109/COMPSACW.2010.17","url":"https://dblp.org/rec/conf/compsac/NakajimaHU10"}, "url":"URL#4871065" }, { "@score":"1", "@id":"4871070", "info":{"authors":{"author":[{"@pid":"64/4410","text":"Ki-Woong Park"},{"@pid":"51/8559","text":"Woomin Hwang"},{"@pid":"72/5128","text":"Kyu Ho Park"}]},"title":"FalconEye: Data Center Status Extraction via Vision Transformation Techniques.","venue":"COMPSAC Workshops","pages":"388-392","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ParkHP10","doi":"10.1109/COMPSACW.2010.73","ee":"https://doi.org/10.1109/COMPSACW.2010.73","url":"https://dblp.org/rec/conf/compsac/ParkHP10"}, "url":"URL#4871070" }, { "@score":"1", "@id":"4871072", "info":{"authors":{"author":[{"@pid":"74/2346","text":"Rong Peng"},{"@pid":"31/334","text":"Qiang Ye"},{"@pid":"36/2301","text":"Mao Ye"}]},"title":"A Requirements Maturity Measurement Approach Based on SKLSEWiki.","venue":"COMPSAC Workshops","pages":"251-254","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/PengYY10","doi":"10.1109/COMPSACW.2010.51","ee":"https://doi.org/10.1109/COMPSACW.2010.51","url":"https://dblp.org/rec/conf/compsac/PengYY10"}, "url":"URL#4871072" }, { "@score":"1", "@id":"4871074", "info":{"authors":{"author":[{"@pid":"61/1152","text":"Nauman A. Qureshi"},{"@pid":"34/2299","text":"Cu D. Nguyen"},{"@pid":"16/4754","text":"Anna Perini"}]},"title":"Analyzing Interoperability Requirements for Adaptive Service-Based Applications: A Goal-Oriented Approach.","venue":"COMPSAC Workshops","pages":"239-244","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/QureshiNP10","doi":"10.1109/COMPSACW.2010.49","ee":"https://doi.org/10.1109/COMPSACW.2010.49","url":"https://dblp.org/rec/conf/compsac/QureshiNP10"}, "url":"URL#4871074" }, { "@score":"1", "@id":"4871076", "info":{"authors":{"author":[{"@pid":"s/MahadevSatyanarayanan","text":"Mahadev Satyanarayanan"},{"@pid":"60/9827-1","text":"Wolfgang Richter 0001"},{"@pid":"92/3030","text":"Glenn Ammons"},{"@pid":"23/4317","text":"Jan Harkes"},{"@pid":"35/5751","text":"Adam Goode"}]},"title":"The Case for Content Search of VM Clouds.","venue":"COMPSAC Workshops","pages":"382-387","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SatyanarayananRAHG10","doi":"10.1109/COMPSACW.2010.97","ee":"https://doi.org/10.1109/COMPSACW.2010.97","url":"https://dblp.org/rec/conf/compsac/SatyanarayananRAHG10"}, "url":"URL#4871076" }, { "@score":"1", "@id":"4871077", "info":{"authors":{"author":[{"@pid":"288/6252","text":"Angshu Maan Sen"},{"@pid":"30/10921","text":"K. Hemachandran"}]},"title":"Elicitation of Goals in Requirements Engineering Using Agile Methods.","venue":"COMPSAC Workshops","pages":"263-268","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SenH10","doi":"10.1109/COMPSACW.2010.53","ee":"https://doi.org/10.1109/COMPSACW.2010.53","url":"https://dblp.org/rec/conf/compsac/SenH10"}, "url":"URL#4871077" }, { "@score":"1", "@id":"4871078", "info":{"authors":{"author":[{"@pid":"39/10921","text":"Jia Shang"},{"@pid":"69/10920","text":"Ji-Jiang Yang"},{"@pid":"97/6505-3","text":"Qing Wang 0003"},{"@pid":"62/1272","text":"Hui Pan"}]},"title":"The Framework of Medical Simulation Education and Evaluation System for Supporting SaaS.","venue":"COMPSAC Workshops","pages":"93-97","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ShangYWP10","doi":"10.1109/COMPSACW.2010.26","ee":"https://doi.org/10.1109/COMPSACW.2010.26","url":"https://dblp.org/rec/conf/compsac/ShangYWP10"}, "url":"URL#4871078" }, { "@score":"1", "@id":"4871080", "info":{"authors":{"author":[{"@pid":"02/4713","text":"Wei She"},{"@pid":"51/5492","text":"I-Ling Yen"},{"@pid":"t/BMThuraisingham","text":"Bhavani Thuraisingham"}]},"title":"WS-Sim: A Web Service Simulation Toolset with Realistic Data Support.","venue":"COMPSAC Workshops","pages":"109-114","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SheYT10","doi":"10.1109/COMPSACW.2010.29","ee":"https://doi.org/10.1109/COMPSACW.2010.29","url":"https://dblp.org/rec/conf/compsac/SheYT10"}, "url":"URL#4871080" }, { "@score":"1", "@id":"4871083", "info":{"authors":{"author":[{"@pid":"96/10920","text":"Seung-Hun Shin"},{"@pid":"09/5570","text":"Seung-Kyu Park"},{"@pid":"31/5627","text":"Kyung-Hee Choi"},{"@pid":"56/4620","text":"Ki-Hyun Jung"}]},"title":"Normalized Adaptive Random Test for Integration Tests.","venue":"COMPSAC Workshops","pages":"335-340","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ShinPCJ10","doi":"10.1109/COMPSACW.2010.65","ee":"https://doi.org/10.1109/COMPSACW.2010.65","url":"https://dblp.org/rec/conf/compsac/ShinPCJ10"}, "url":"URL#4871083" }, { "@score":"1", "@id":"4871085", "info":{"authors":{"author":[{"@pid":"76/4903","text":"Derek Smith"},{"@pid":"20/1255","text":"Qiang Guan"},{"@pid":"57/2335","text":"Song Fu"}]},"title":"An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems.","venue":"COMPSAC Workshops","pages":"376-381","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SmithGF10","doi":"10.1109/COMPSACW.2010.72","ee":"https://doi.org/10.1109/COMPSACW.2010.72","url":"https://dblp.org/rec/conf/compsac/SmithGF10"}, "url":"URL#4871085" }, { "@score":"1", "@id":"4871088", "info":{"authors":{"author":[{"@pid":"15/10921","text":"Igors Svecs"},{"@pid":"62/7962","text":"Tanmoy Sarkar"},{"@pid":"67/1905","text":"Samik Basu 0001"},{"@pid":"w/JohnnySWong","text":"Johnny S. Wong"}]},"title":"XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment.","venue":"COMPSAC Workshops","pages":"287-292","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/SvecsSBW10","doi":"10.1109/COMPSACW.2010.57","ee":"https://doi.org/10.1109/COMPSACW.2010.57","url":"https://dblp.org/rec/conf/compsac/SvecsSBW10"}, "url":"URL#4871088" }, { "@score":"1", "@id":"4871089", "info":{"authors":{"author":[{"@pid":"23/2357","text":"Hassan Takabi"},{"@pid":"j/JamesJoshi","text":"James B. D. Joshi"},{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"}]},"title":"SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.","venue":"COMPSAC Workshops","pages":"393-398","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TakabiJA10","doi":"10.1109/COMPSACW.2010.74","ee":"https://doi.org/10.1109/COMPSACW.2010.74","url":"https://dblp.org/rec/conf/compsac/TakabiJA10"}, "url":"URL#4871089" }, { "@score":"1", "@id":"4871090", "info":{"authors":{"author":[{"@pid":"21/8904","text":"Chuanqi Tao"},{"@pid":"l/BixinLi","text":"Bixin Li"},{"@pid":"30/4077-1","text":"Xiaobing Sun 0001"},{"@pid":"19/10921","text":"Chongfeng Zhang"}]},"title":"An Approach to Regression Test Selection Based on Hierarchical Slicing Technique.","venue":"COMPSAC Workshops","pages":"347-352","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TaoLSZ10","doi":"10.1109/COMPSACW.2010.67","ee":"https://doi.org/10.1109/COMPSACW.2010.67","url":"https://dblp.org/rec/conf/compsac/TaoLSZ10"}, "url":"URL#4871090" }, { "@score":"1", "@id":"4871092", "info":{"authors":{"author":[{"@pid":"52/3845","text":"Alessandra Toninelli"},{"@pid":"38/70","text":"Animesh Pathak"},{"@pid":"33/10019","text":"Amir Seyedi"},{"@pid":"86/4461","text":"Roberto Speicys Cardoso"},{"@pid":"i/ValerieIssarny","text":"Valérie Issarny"}]},"title":"Middleware Support for Mobile Social Ecosystems.","venue":"COMPSAC Workshops","pages":"293-298","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ToninelliPSCI10","doi":"10.1109/COMPSACW.2010.58","ee":"https://doi.org/10.1109/COMPSACW.2010.58","url":"https://dblp.org/rec/conf/compsac/ToninelliPSCI10"}, "url":"URL#4871092" }, { "@score":"1", "@id":"4871095", "info":{"authors":{"author":[{"@pid":"89/791","text":"Tugkan Tuglular"},{"@pid":"97/10920","text":"Gurcan Gercek"}]},"title":"Feedback Control Based Test Case Instantiation for Firewall Testing.","venue":"COMPSAC Workshops","pages":"202-207","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/TuglularG10","doi":"10.1109/COMPSACW.2010.42","ee":"https://doi.org/10.1109/COMPSACW.2010.42","url":"https://dblp.org/rec/conf/compsac/TuglularG10"}, "url":"URL#4871095" }, { "@score":"1", "@id":"4871096", "info":{"authors":{"author":[{"@pid":"19/7089","text":"Zhengshan Wang"},{"@pid":"l/BixinLi","text":"Bixin Li"},{"@pid":"28/1751-1","text":"Lulu Wang 0001"},{"@pid":"93/6765","text":"Meng Wang"},{"@pid":"16/4016","text":"Xufang Gong"}]},"title":"Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem.","venue":"COMPSAC Workshops","pages":"329-334","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangLWWG10","doi":"10.1109/COMPSACW.2010.64","ee":"https://doi.org/10.1109/COMPSACW.2010.64","url":"https://dblp.org/rec/conf/compsac/WangLWWG10"}, "url":"URL#4871096" }, { "@score":"1", "@id":"4871097", "info":{"authors":{"author":[{"@pid":"93/6765","text":"Meng Wang"},{"@pid":"l/BixinLi","text":"Bixin Li"},{"@pid":"19/7089","text":"Zhengshan Wang"},{"@pid":"52/2991","text":"Xiaoyuan Xie"}]},"title":"An Optimization Strategy for Evolutionary Testing Based on Cataclysm.","venue":"COMPSAC Workshops","pages":"359-364","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WangLWX10","doi":"10.1109/COMPSACW.2010.69","ee":"https://doi.org/10.1109/COMPSACW.2010.69","url":"https://dblp.org/rec/conf/compsac/WangLWX10"}, "url":"URL#4871097" }, { "@score":"1", "@id":"4871100", "info":{"authors":{"author":[{"@pid":"30/3","text":"Bin Wen"},{"@pid":"57/3505-1","text":"Peng Liang 0001"},{"@pid":"79/2314","text":"Keqing He"}]},"title":"Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems.","venue":"COMPSAC Workshops","pages":"255-258","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WenLH10","doi":"10.1109/COMPSACW.2010.76","ee":"https://doi.org/10.1109/COMPSACW.2010.76","url":"https://dblp.org/rec/conf/compsac/WenLH10"}, "url":"URL#4871100" }, { "@score":"1", "@id":"4871101", "info":{"authors":{"author":[{"@pid":"18/10921","text":"Haochi Wu"},{"@pid":"61/2115-1","text":"Lin Liu 0001"},{"@pid":"21/3317","text":"Wenting Ma"}]},"title":"Optimizing Requirements Elicitation with an i* and Bayesian Network Integrated Modelling Approach.","venue":"COMPSAC Workshops","pages":"182-188","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuLM10","doi":"10.1109/COMPSACW.2010.40","ee":"https://doi.org/10.1109/COMPSACW.2010.40","url":"https://dblp.org/rec/conf/compsac/WuLM10"}, "url":"URL#4871101" }, { "@score":"1", "@id":"4871102", "info":{"authors":{"author":[{"@pid":"61/591","text":"Qian Wu"},{"@pid":"47/3932","text":"Qianxiang Wang"}]},"title":"Natural Language Processing Based Detection of Duplicate Defect Patterns.","venue":"COMPSAC Workshops","pages":"220-225","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/WuW10","doi":"10.1109/COMPSACW.2010.45","ee":"https://doi.org/10.1109/COMPSACW.2010.45","url":"https://dblp.org/rec/conf/compsac/WuW10"}, "url":"URL#4871102" }, { "@score":"1", "@id":"4871103", "info":{"authors":{"author":[{"@pid":"65/8611","text":"Xijiao Xiong"},{"@pid":"72/2590-12","text":"Jing Liu 0012"},{"@pid":"30/3299","text":"Miaomiao Zhang"},{"@pid":"75/157","text":"Zuohua Ding"}]},"title":"Modeling and Verification of an Automatic Train Protection System.","venue":"COMPSAC Workshops","pages":"226-231","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/XiongLZD10","doi":"10.1109/COMPSACW.2010.46","ee":"https://doi.org/10.1109/COMPSACW.2010.46","url":"https://dblp.org/rec/conf/compsac/XiongLZD10"}, "url":"URL#4871103" }, { "@score":"1", "@id":"4871105", "info":{"authors":{"author":[{"@pid":"48/10001","text":"Tuoye Xu"},{"@pid":"29/3826-1","text":"Tong Li 0001"},{"@pid":"61/2115-1","text":"Lin Liu 0001"},{"@pid":"b/BRBryant","text":"Barrett R. Bryant"}]},"title":"Negotiating Service Requirements among Strategic Actors.","venue":"COMPSAC Workshops","pages":"31-36","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/XuLLB10","doi":"10.1109/COMPSACW.2010.16","ee":"https://doi.org/10.1109/COMPSACW.2010.16","url":"https://dblp.org/rec/conf/compsac/XuLLB10"}, "url":"URL#4871105" }, { "@score":"1", "@id":"4871107", "info":{"authors":{"author":[{"@pid":"46/7568","text":"Takeshi Yashiro"},{"@pid":"78/5969","text":"Masahiro Bessho"},{"@pid":"17/4796","text":"Shinsuke Kobayashi"},{"@pid":"84/6935","text":"Noboru Koshizuka"},{"@pid":"60/4410","text":"Ken Sakamura"}]},"title":"T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant Chip.","venue":"COMPSAC Workshops","pages":"134-139","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YashiroBKKS10","doi":"10.1109/COMPSACW.2010.32","ee":"https://doi.org/10.1109/COMPSACW.2010.32","url":"https://dblp.org/rec/conf/compsac/YashiroBKKS10"}, "url":"URL#4871107" }, { "@score":"1", "@id":"4871109", "info":{"authors":{"author":[{"@pid":"171/2320","text":"Bei-Bei Yin"},{"@pid":"54/10920","text":"Ling-Zan Zhu"},{"@pid":"71/5252","text":"Kai-Yuan Cai"}]},"title":"Entropy-Based Measures of Heterogeneity of Software Structural Profile.","venue":"COMPSAC Workshops","pages":"196-201","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YinZC10","doi":"10.1109/COMPSACW.2010.41","ee":"https://doi.org/10.1109/COMPSACW.2010.41","url":"https://dblp.org/rec/conf/compsac/YinZC10"}, "url":"URL#4871109" }, { "@score":"1", "@id":"4871110", "info":{"authors":{"author":[{"@pid":"67/9308","text":"Hongjun Yu"},{"@pid":"22/6904-3","text":"Rong Chen 0003"},{"@pid":"46/7486","text":"Zhenjun Du"}]},"title":"Message Oriented Middleware Support for Mobile Ad Hoc Data Sharing.","venue":"COMPSAC Workshops","pages":"305-310","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/YuCD10","doi":"10.1109/COMPSACW.2010.60","ee":"https://doi.org/10.1109/COMPSACW.2010.60","url":"https://dblp.org/rec/conf/compsac/YuCD10"}, "url":"URL#4871110" }, { "@score":"1", "@id":"4871115", "info":{"authors":{"author":{"@pid":"77/5181","text":"Zhi Quan Zhou"}},"title":"Using Coverage Information to Guide Test Case Selection in Adaptive Random Testing.","venue":"COMPSAC Workshops","pages":"208-213","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/Zhou10","doi":"10.1109/COMPSACW.2010.43","ee":"https://doi.org/10.1109/COMPSACW.2010.43","url":"https://dblp.org/rec/conf/compsac/Zhou10"}, "url":"URL#4871115" }, { "@score":"1", "@id":"4871117", "info":{"authors":{"author":[{"@pid":"54/40","text":"Li Zhou"},{"@pid":"66/4615-2","text":"Yong Zhang 0002"},{"@pid":"x/ChunxiaoXing","text":"Chunxiao Xing"}]},"title":"ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to Clouds.","venue":"COMPSAC Workshops","pages":"104-108","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZhouZX10","doi":"10.1109/COMPSACW.2010.28","ee":"https://doi.org/10.1109/COMPSACW.2010.28","url":"https://dblp.org/rec/conf/compsac/ZhouZX10"}, "url":"URL#4871117" }, { "@score":"1", "@id":"4871119", "info":{"authors":{"author":[{"@pid":"74/8326","text":"Meixia Zhu"},{"@pid":"83/1259","text":"Hanpin Wang"},{"@pid":"66/2173","text":"Wei Jin"},{"@pid":"19/1067","text":"Zizhen Wang"},{"@pid":"15/49","text":"Chunxiang Xu"}]},"title":"Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation.","venue":"COMPSAC Workshops","pages":"170-175","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZhuWJWX10","doi":"10.1109/COMPSACW.2010.38","ee":"https://doi.org/10.1109/COMPSACW.2010.38","url":"https://dblp.org/rec/conf/compsac/ZhuWJWX10"}, "url":"URL#4871119" }, { "@score":"1", "@id":"4871120", "info":{"authors":{"author":[{"@pid":"57/215","text":"Didar Zowghi"},{"@pid":"22/3510","text":"Zhi Jin"}]},"title":"A Framework for the Elicitation and Analysis of Information Technology Service Requirements and Their Alignment with Enterprise Business Goals.","venue":"COMPSAC Workshops","pages":"269-272","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/compsac/ZowghiJ10","doi":"10.1109/COMPSACW.2010.54","ee":"https://doi.org/10.1109/COMPSACW.2010.54","url":"https://dblp.org/rec/conf/compsac/ZowghiJ10"}, "url":"URL#4871120" }, { "@score":"1", "@id":"4977162", "info":{"title":"Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2010, Seoul, Korea, 19-23 July 2010","venue":"COMPSAC Workshops","publisher":"IEEE Computer Society","year":"2010","type":"Editorship","key":"conf/compsac/2010w","ee":"https://ieeexplore.ieee.org/xpl/conhome/5613986/proceeding","url":"https://dblp.org/rec/conf/compsac/2010w"}, "url":"URL#4977162" } ] } } } )