callback( { "result":{ "query":":facetid:toc:\"db/conf/sose/sose2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"190.72" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"75", "@dc":"75", "@oc":"75", "@id":"43426746", "text":":facetid:toc:db/conf/sose/sose2014.bht" } }, "hits":{ "@total":"75", "@computed":"75", "@sent":"75", "@first":"0", "hit":[{ "@score":"1", "@id":"3945556", "info":{"authors":{"author":[{"@pid":"06/241-1","text":"Wenjun Wu 0001"},{"@pid":"19/4764","text":"Chao Jin"}]},"title":"Customizing Scientific Data Analytic Platforms via SaaS Approach.","venue":"SOSE","pages":"358-364","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/0001J14","doi":"10.1109/SOSE.2014.73","ee":"https://doi.org/10.1109/SOSE.2014.73","url":"https://dblp.org/rec/conf/sose/0001J14"}, "url":"URL#3945556" }, { "@score":"1", "@id":"3945557", "info":{"authors":{"author":[{"@pid":"06/241-1","text":"Wenjun Wu 0001"},{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"19/4764","text":"Chao Jin"},{"@pid":"117/7709","text":"Guanqiu Qi"},{"@pid":"29/186-4","text":"Jie Luo 0004"}]},"title":"Test-Algebra Execution in a Cloud Environment.","venue":"SOSE","pages":"59-69","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/0001TJQL14","doi":"10.1109/SOSE.2014.13","ee":"https://doi.org/10.1109/SOSE.2014.13","url":"https://dblp.org/rec/conf/sose/0001TJQL14"}, "url":"URL#3945557" }, { "@score":"1", "@id":"3945558", "info":{"authors":{"author":[{"@pid":"127/1617","text":"Suaad S. Alarifi"},{"@pid":"w/StephenDWolthusen","text":"Stephen D. Wolthusen"}]},"title":"Mitigation of Cloud-Internal Denial of Service Attacks.","venue":"SOSE","pages":"478-483","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/AlarifiW14","doi":"10.1109/SOSE.2014.71","ee":"https://doi.org/10.1109/SOSE.2014.71","url":"https://dblp.org/rec/conf/sose/AlarifiW14"}, "url":"URL#3945558" }, { "@score":"1", "@id":"3945559", "info":{"authors":{"author":[{"@pid":"130/8439","text":"Hussain Aljahdali"},{"@pid":"147/1613","text":"Abdulaziz Albatli"},{"@pid":"69/10837","text":"Peter Garraghan"},{"@pid":"48/917","text":"Paul Townend"},{"@pid":"94/7339","text":"Lydia Lau"},{"@pid":"37/5126-7","text":"Jie Xu 0007"}]},"title":"Multi-tenancy in Cloud Computing.","venue":"SOSE","pages":"344-351","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/AljahdaliAGTLX14","doi":"10.1109/SOSE.2014.50","ee":"https://doi.org/10.1109/SOSE.2014.50","url":"https://dblp.org/rec/conf/sose/AljahdaliAGTLX14"}, "url":"URL#3945559" }, { "@score":"1", "@id":"3945560", "info":{"authors":{"author":[{"@pid":"147/1654","text":"Salwa Mohamed Alzahmi"},{"@pid":"62/4266","text":"Mohammad Abu-Matar"},{"@pid":"87/3132","text":"Rabeb Mizouni"}]},"title":"A Practical Tool for Automating Service Oriented Software Product Lines Derivation.","venue":"SOSE","pages":"90-97","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/AlzahmiAM14","doi":"10.1109/SOSE.2014.16","ee":"https://doi.org/10.1109/SOSE.2014.16","url":"https://dblp.org/rec/conf/sose/AlzahmiAM14"}, "url":"URL#3945560" }, { "@score":"1", "@id":"3945561", "info":{"authors":{"author":[{"@pid":"147/1612","text":"Abdullah A. H. Alzahrani"},{"@pid":"e/AmnonHEden","text":"Amnon H. Eden"},{"@pid":"147/1630","text":"Majd Zohri Yafi"}]},"title":"Structural Analysis of the Check Point Pattern.","venue":"SOSE","pages":"404-408","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/AlzahraniEY14","doi":"10.1109/SOSE.2014.56","ee":"https://doi.org/10.1109/SOSE.2014.56","url":"https://dblp.org/rec/conf/sose/AlzahraniEY14"}, "url":"URL#3945561" }, { "@score":"1", "@id":"3945562", "info":{"authors":{"author":[{"@pid":"138/9762-1","text":"John S. Atkinson 0001"},{"@pid":"15/1431-2","text":"John E. Mitchell 0002"},{"@pid":"88/1966","text":"Miguel Rio"},{"@pid":"76/7211","text":"George Matich"}]},"title":"Your WiFi Is Leaking: Building a Low-Cost Device to Infer User Activities.","venue":"SOSE","pages":"396-397","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/AtkinsonMRM14","doi":"10.1109/SOSE.2014.54","ee":"https://doi.org/10.1109/SOSE.2014.54","url":"https://dblp.org/rec/conf/sose/AtkinsonMRM14"}, "url":"URL#3945562" }, { "@score":"1", "@id":"3945563", "info":{"authors":{"author":[{"@pid":"15/2711","text":"Benjamin Aziz"},{"@pid":"42/2874","text":"Clive Blackwell"}]},"title":"Using Security Patterns for Modelling Security Capabilities in Grid Systems.","venue":"SOSE","pages":"422-427","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/AzizB14","doi":"10.1109/SOSE.2014.60","ee":"https://doi.org/10.1109/SOSE.2014.60","url":"https://dblp.org/rec/conf/sose/AzizB14"}, "url":"URL#3945563" }, { "@score":"1", "@id":"3945564", "info":{"authors":{"author":[{"@pid":"147/1716","text":"Parth Bhatt"},{"@pid":"58/3362","text":"Edgar Toshiro Yano"},{"@pid":"20/2581","text":"Per M. Gustavsson"}]},"title":"Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks.","venue":"SOSE","pages":"390-395","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/BhattYG14","doi":"10.1109/SOSE.2014.53","ee":"https://doi.org/10.1109/SOSE.2014.53","url":"https://dblp.org/rec/conf/sose/BhattYG14"}, "url":"URL#3945564" }, { "@score":"1", "@id":"3945565", "info":{"authors":{"author":{"@pid":"74/1840","text":"Andrew Blyth"}},"title":"Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling.","venue":"SOSE","pages":"417-421","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/Blyth14","doi":"10.1109/SOSE.2014.59","ee":"https://doi.org/10.1109/SOSE.2014.59","url":"https://dblp.org/rec/conf/sose/Blyth14"}, "url":"URL#3945565" }, { "@score":"1", "@id":"3945566", "info":{"authors":{"author":[{"@pid":"14/3633","text":"Peter T. Breuer"},{"@pid":"b/JonathanPBowen","text":"Jonathan P. Bowen"}]},"title":"Empirical Patterns in Google Scholar Citation Counts.","venue":"SOSE","pages":"398-403","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/BreuerB14","doi":"10.1109/SOSE.2014.55","ee":"https://doi.org/10.1109/SOSE.2014.55","url":"https://dblp.org/rec/conf/sose/BreuerB14"}, "url":"URL#3945566" }, { "@score":"1", "@id":"3945567", "info":{"authors":{"author":[{"@pid":"15/1517","text":"Davide Brugali"},{"@pid":"147/1680","text":"Andrea Fernandes da Fonseca"},{"@pid":"116/5063","text":"Andrea Luzzana"},{"@pid":"147/1666","text":"Yamuna Maccarana"}]},"title":"Developing Service Oriented Robot Control System.","venue":"SOSE","pages":"237-242","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/BrugaliFLM14","doi":"10.1109/SOSE.2014.28","ee":"https://doi.org/10.1109/SOSE.2014.28","url":"https://dblp.org/rec/conf/sose/BrugaliFLM14"}, "url":"URL#3945567" }, { "@score":"1", "@id":"3945568", "info":{"authors":{"author":[{"@pid":"98/7002","text":"Euijin Choo"},{"@pid":"55/268","text":"Younghee Park"},{"@pid":"147/1698","text":"Huzefa Siyamwala"}]},"title":"Identifying Malicious Metering Data in Advanced Metering Infrastructure.","venue":"SOSE","pages":"490-495","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ChooPS14","doi":"10.1109/SOSE.2014.75","ee":"https://doi.org/10.1109/SOSE.2014.75","url":"https://dblp.org/rec/conf/sose/ChooPS14"}, "url":"URL#3945568" }, { "@score":"1", "@id":"3945569", "info":{"authors":{"author":[{"@pid":"147/1645","text":"Chih-Han Chu"},{"@pid":"147/1653","text":"Menghsi Wan"},{"@pid":"147/1628","text":"Yufan Yang"},{"@pid":"g/JerryZeyuGao","text":"Jerry Gao 0002"},{"@pid":"96/755","text":"Lei Deng"}]},"title":"Building On-demand Marketing SaaS for Crowdsourcing.","venue":"SOSE","pages":"430-438","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ChuWYGD14","doi":"10.1109/SOSE.2014.63","ee":"https://doi.org/10.1109/SOSE.2014.63","url":"https://dblp.org/rec/conf/sose/ChuWYGD14"}, "url":"URL#3945569" }, { "@score":"1", "@id":"3945570", "info":{"authors":{"author":[{"@pid":"71/5378","text":"Marco Comuzzi"},{"@pid":"147/1660","text":"Ruben Ivan Rafael Martinez"}]},"title":"Customized Infrastructures for Monitoring Business Processes.","venue":"SOSE","pages":"122-127","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ComuzziM14","doi":"10.1109/SOSE.2014.19","ee":"https://doi.org/10.1109/SOSE.2014.19","url":"https://dblp.org/rec/conf/sose/ComuzziM14"}, "url":"URL#3945570" }, { "@score":"1", "@id":"3945571", "info":{"authors":{"author":[{"@pid":"40/1029","text":"Hongjun Dai"},{"@pid":"69/5902","text":"Qian Li"},{"@pid":"q/MeikangQiu","text":"Meikang Qiu"},{"@pid":"34/1664","text":"Zhilou Yu"},{"@pid":"99/6654","text":"Zhiping Jia"}]},"title":"A Cloud Trust Authority Framework for Mobile Enterprise Information System.","venue":"SOSE","pages":"496-501","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/DaiLQYJ14","doi":"10.1109/SOSE.2014.68","ee":"https://doi.org/10.1109/SOSE.2014.68","url":"https://dblp.org/rec/conf/sose/DaiLQYJ14"}, "url":"URL#3945571" }, { "@score":"1", "@id":"3945572", "info":{"authors":{"author":[{"@pid":"57/4533","text":"Yan Ding"},{"@pid":"02/661","text":"Huaimin Wang"},{"@pid":"145/2793","text":"Songzheng Chen"},{"@pid":"59/9956","text":"Xiaodong Tang"},{"@pid":"97/2500","text":"Hongyi Fu"},{"@pid":"70/11200","text":"Peichang Shi"}]},"title":"PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open Environment.","venue":"SOSE","pages":"326-331","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/DingWCTFS14","doi":"10.1109/SOSE.2014.47","ee":"https://doi.org/10.1109/SOSE.2014.47","url":"https://dblp.org/rec/conf/sose/DingWCTFS14"}, "url":"URL#3945572" }, { "@score":"1", "@id":"3945573", "info":{"authors":{"author":[{"@pid":"146/9711","text":"Badis Djamaa"},{"@pid":"58/1086-1","text":"Mark A. Richardson 0001"},{"@pid":"53/5969","text":"Nabil Aouf"},{"@pid":"147/1672","text":"Bob Walters"}]},"title":"Service Discovery in 6LoWPANs: Classification and Challenges.","venue":"SOSE","pages":"160-161","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/DjamaaRAW14","doi":"10.1109/SOSE.2014.67","ee":"https://doi.org/10.1109/SOSE.2014.67","url":"https://dblp.org/rec/conf/sose/DjamaaRAW14"}, "url":"URL#3945573" }, { "@score":"1", "@id":"3945574", "info":{"authors":{"author":[{"@pid":"147/1681","text":"Hermann Dornhackl"},{"@pid":"147/1671","text":"Konstantin Kadletz"},{"@pid":"147/1623","text":"Robert Luh"},{"@pid":"26/4192","text":"Paul Tavolato"}]},"title":"Malicious Behavior Patterns.","venue":"SOSE","pages":"384-389","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/DornhacklKLT14","doi":"10.1109/SOSE.2014.52","ee":"https://doi.org/10.1109/SOSE.2014.52","url":"https://dblp.org/rec/conf/sose/DornhacklKLT14"}, "url":"URL#3945574" }, { "@score":"1", "@id":"3945575", "info":{"authors":{"author":[{"@pid":"76/2340","text":"Ishbel Duncan"},{"@pid":"117/5494","text":"Jan de Muijnck-Hughes"}]},"title":"Security Pattern Evaluation.","venue":"SOSE","pages":"428-429","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/DuncanM14","doi":"10.1109/SOSE.2014.61","ee":"https://doi.org/10.1109/SOSE.2014.61","url":"https://dblp.org/rec/conf/sose/DuncanM14"}, "url":"URL#3945575" }, { "@score":"1", "@id":"3945576", "info":{"authors":{"author":{"@pid":"76/4240","text":"Jerry Fishenden"}},"title":"Interactive Palimpsests.","venue":"SOSE","pages":"465-469","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/Fishenden14","doi":"10.1109/SOSE.2014.82","ee":"https://doi.org/10.1109/SOSE.2014.82","url":"https://dblp.org/rec/conf/sose/Fishenden14"}, "url":"URL#3945576" }, { "@score":"1", "@id":"3945577", "info":{"authors":{"author":[{"@pid":"53/5612","text":"Ge Hu"},{"@pid":"63/1303","text":"Ting Li"},{"@pid":"135/8614","text":"Hang Dong"},{"@pid":"34/11359","text":"Hewei Yu"},{"@pid":"60/7041","text":"Miao Zhang"}]},"title":"Malicious Code Detection for Android Using Instruction Signatures.","venue":"SOSE","pages":"332-337","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/GeTHHM14","doi":"10.1109/SOSE.2014.48","ee":"https://doi.org/10.1109/SOSE.2014.48","url":"https://dblp.org/rec/conf/sose/GeTHHM14"}, "url":"URL#3945577" }, { "@score":"1", "@id":"3945578", "info":{"authors":{"author":[{"@pid":"91/3024","text":"Kahina Hamadache"},{"@pid":"127/6403","text":"Paraskevi Zerva"}]},"title":"Provenance of Feedback in Cloud Services.","venue":"SOSE","pages":"23-34","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/HamadacheZ14","doi":"10.1109/SOSE.2014.10","ee":"https://doi.org/10.1109/SOSE.2014.10","url":"https://dblp.org/rec/conf/sose/HamadacheZ14"}, "url":"URL#3945578" }, { "@score":"1", "@id":"3945579", "info":{"authors":{"author":[{"@pid":"58/4580","text":"Zheng Han"},{"@pid":"00/2927","text":"Rui Chu"},{"@pid":"65/8331","text":"Haibo Mi"},{"@pid":"02/661","text":"Huaimin Wang"}]},"title":"Elastic Allocator: An Adaptive Task Scheduler for Streaming Query in the Cloud.","venue":"SOSE","pages":"284-289","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/HanCMW14","doi":"10.1109/SOSE.2014.40","ee":"https://doi.org/10.1109/SOSE.2014.40","url":"https://dblp.org/rec/conf/sose/HanCMW14"}, "url":"URL#3945579" }, { "@score":"1", "@id":"3945580", "info":{"authors":{"author":[{"@pid":"147/1619","text":"Pinjia He"},{"@pid":"10/2717","text":"Jieming Zhu"},{"@pid":"147/1641","text":"Jianlong Xu"},{"@pid":"l/MichaelRLyu","text":"Michael R. Lyu"}]},"title":"A Hierarchical Matrix Factorization Approach for Location-Based Web Service QoS Prediction.","venue":"SOSE","pages":"290-295","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/HeZXL14","doi":"10.1109/SOSE.2014.41","ee":"https://doi.org/10.1109/SOSE.2014.41","url":"https://dblp.org/rec/conf/sose/HeZXL14"}, "url":"URL#3945580" }, { "@score":"1", "@id":"3945581", "info":{"authors":{"author":[{"@pid":"17/5059","text":"Zhenghui Hu"},{"@pid":"06/241-1","text":"Wenjun Wu 0001"}]},"title":"A Game Theoretic Model of Software Crowdsourcing.","venue":"SOSE","pages":"446-453","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/Hu014","doi":"10.1109/SOSE.2014.79","ee":"https://doi.org/10.1109/SOSE.2014.79","url":"https://dblp.org/rec/conf/sose/Hu014"}, "url":"URL#3945581" }, { "@score":"1", "@id":"3945582", "info":{"authors":{"author":[{"@pid":"38/4372","text":"Yumei Huang"},{"@pid":"142/7754","text":"Renyu Yang"},{"@pid":"47/5523-3","text":"Lei Cui 0003"},{"@pid":"58/6260","text":"Tianyu Wo"},{"@pid":"03/405","text":"Chunming Hu"},{"@pid":"50/3402-5","text":"Bo Li 0005"}]},"title":"VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication.","venue":"SOSE","pages":"314-319","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/HuangYCWH014","doi":"10.1109/SOSE.2014.45","ee":"https://doi.org/10.1109/SOSE.2014.45","url":"https://dblp.org/rec/conf/sose/HuangYCWH014"}, "url":"URL#3945582" }, { "@score":"1", "@id":"3945583", "info":{"authors":{"author":{"@pid":"99/4939","text":"Andrew Hugill"}},"title":"Creative Computing Processes: Musical Composition.","venue":"SOSE","pages":"459-464","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/Hugill14","doi":"10.1109/SOSE.2014.80","ee":"https://doi.org/10.1109/SOSE.2014.80","url":"https://dblp.org/rec/conf/sose/Hugill14"}, "url":"URL#3945583" }, { "@score":"1", "@id":"3945584", "info":{"authors":{"author":[{"@pid":"15/11498","text":"Christian Inzinger"},{"@pid":"123/3328","text":"Stefan Nastic"},{"@pid":"46/9663","text":"Sanjin Sehic"},{"@pid":"19/11503","text":"Michael Vögler"},{"@pid":"87/3534-2","text":"Fei Li 0002"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"MADCAT: A Methodology for Architecture and Deployment of Cloud Application Topologies.","venue":"SOSE","pages":"13-22","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/InzingerNSVLD14","doi":"10.1109/SOSE.2014.9","ee":"https://doi.org/10.1109/SOSE.2014.9","url":"https://dblp.org/rec/conf/sose/InzingerNSVLD14"}, "url":"URL#3945584" }, { "@score":"1", "@id":"3945585", "info":{"authors":{"author":[{"@pid":"147/1668","text":"Jihad Kheireddine Itani"},{"@pid":"50/580","text":"Eric Gouardères"},{"@pid":"65/4519","text":"Philippe Aniorté"}]},"title":"Online Community Evolution Using Mediation System in SOA.","venue":"SOSE","pages":"154-155","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ItaniGA14","doi":"10.1109/SOSE.2014.72","ee":"https://doi.org/10.1109/SOSE.2014.72","url":"https://dblp.org/rec/conf/sose/ItaniGA14"}, "url":"URL#3945585" }, { "@score":"1", "@id":"3945586", "info":{"authors":{"author":[{"@pid":"147/1679","text":"Jonas Keppeler"},{"@pid":"56/10327","text":"Philipp Brune"},{"@pid":"44/3807","text":"Heiko Gewald"}]},"title":"A Description and Retrieval Model for Web Services Including Extended Semantic and Commercial Attributes.","venue":"SOSE","pages":"258-265","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/KeppelerBG14","doi":"10.1109/SOSE.2014.34","ee":"https://doi.org/10.1109/SOSE.2014.34","url":"https://dblp.org/rec/conf/sose/KeppelerBG14"}, "url":"URL#3945586" }, { "@score":"1", "@id":"3945587", "info":{"authors":{"author":[{"@pid":"45/4627","text":"Stefan Kolb 0001"},{"@pid":"w/GuidoWirtz","text":"Guido Wirtz"}]},"title":"Towards Application Portability in Platform as a Service.","venue":"SOSE","pages":"218-229","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/KolbW14","doi":"10.1109/SOSE.2014.26","ee":"https://doi.org/10.1109/SOSE.2014.26","url":"https://dblp.org/rec/conf/sose/KolbW14"}, "url":"URL#3945587" }, { "@score":"1", "@id":"3945588", "info":{"authors":{"author":[{"@pid":"83/5485","text":"Aniket Kulkarni"},{"@pid":"31/8072","text":"Ravindra Metta"}]},"title":"A New Code Obfuscation Scheme for Software Protection.","venue":"SOSE","pages":"409-414","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/KulkarniM14","doi":"10.1109/SOSE.2014.57","ee":"https://doi.org/10.1109/SOSE.2014.57","url":"https://dblp.org/rec/conf/sose/KulkarniM14"}, "url":"URL#3945588" }, { "@score":"1", "@id":"3945589", "info":{"authors":{"author":[{"@pid":"147/1696","text":"Waraporn Leesakul"},{"@pid":"48/917","text":"Paul Townend"},{"@pid":"37/5126-7","text":"Jie Xu 0007"}]},"title":"Dynamic Data Deduplication in Cloud Storage.","venue":"SOSE","pages":"320-325","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LeesakulTX14","doi":"10.1109/SOSE.2014.46","ee":"https://doi.org/10.1109/SOSE.2014.46","url":"https://dblp.org/rec/conf/sose/LeesakulTX14"}, "url":"URL#3945589" }, { "@score":"1", "@id":"3945590", "info":{"authors":{"author":[{"@pid":"87/660-14","text":"Yan Li 0014"},{"@pid":"70/5426","text":"Jinhua Xiong"},{"@pid":"26/707","text":"Xinran Liu"},{"@pid":"24/6914-23","text":"Hong Zhang 0023"},{"@pid":"21/1048-1","text":"Peng Zhang 0001"}]},"title":"Folksonomy-Based In-Depth Annotation of Web Services.","venue":"SOSE","pages":"243-249","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LiXLZZ14","doi":"10.1109/SOSE.2014.32","ee":"https://doi.org/10.1109/SOSE.2014.32","url":"https://dblp.org/rec/conf/sose/LiXLZZ14"}, "url":"URL#3945590" }, { "@score":"1", "@id":"3945591", "info":{"authors":{"author":[{"@pid":"90/10939","text":"Ziyang Li"},{"@pid":"67/11341-1","text":"Zhaoning Zhang 0001"},{"@pid":"48/9032","text":"Huiba Li"},{"@pid":"42/2857-1","text":"Yuxing Peng 0001"}]},"title":"CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual Machines.","venue":"SOSE","pages":"296-301","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LiZLP14","doi":"10.1109/SOSE.2014.42","ee":"https://doi.org/10.1109/SOSE.2014.42","url":"https://dblp.org/rec/conf/sose/LiZLP14"}, "url":"URL#3945591" }, { "@score":"1", "@id":"3945592", "info":{"authors":{"author":[{"@pid":"95/5616","text":"Xinyi Liu"},{"@pid":"21/1509-1","text":"Hailong Sun 0001"},{"@pid":"147/1712","text":"Hanxiong Wu"},{"@pid":"61/1229","text":"Richong Zhang"},{"@pid":"90/2144-1","text":"Xudong Liu 0001"}]},"title":"Using Sequential Pattern Mining and Interactive Recommendation to Assist Pipe-like Mashup Development.","venue":"SOSE","pages":"173-180","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LiuSWZL14","doi":"10.1109/SOSE.2014.24","ee":"https://doi.org/10.1109/SOSE.2014.24","url":"https://dblp.org/rec/conf/sose/LiuSWZL14"}, "url":"URL#3945592" }, { "@score":"1", "@id":"3945593", "info":{"authors":{"author":[{"@pid":"116/8720","text":"Runjie Liu"},{"@pid":"78/4510","text":"Hongji Yang"}]},"title":"Chaos and Fractal for Creative Computing.","venue":"SOSE","pages":"470-473","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LiuY14","doi":"10.1109/SOSE.2014.83","ee":"https://doi.org/10.1109/SOSE.2014.83","url":"https://dblp.org/rec/conf/sose/LiuY14"}, "url":"URL#3945593" }, { "@score":"1", "@id":"3945594", "info":{"authors":{"author":[{"@pid":"88/5652","text":"Dongmei Liu"},{"@pid":"55/521-2","text":"Hong Zhu 0002"},{"@pid":"76/6181","text":"Ian Bayley"}]},"title":"SOFIA: An Algebraic Specification Language for Developing Services.","venue":"SOSE","pages":"70-75","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LiuZB14","doi":"10.1109/SOSE.2014.14","ee":"https://doi.org/10.1109/SOSE.2014.14","url":"https://dblp.org/rec/conf/sose/LiuZB14"}, "url":"URL#3945594" }, { "@score":"1", "@id":"3945595", "info":{"authors":{"author":[{"@pid":"117/5118","text":"Richard K. Lomotey"},{"@pid":"52/4351","text":"Ralph Deters"}]},"title":"Towards Knowledge Discovery in Big Data.","venue":"SOSE","pages":"181-191","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/LomoteyD14","doi":"10.1109/SOSE.2014.25","ee":"https://doi.org/10.1109/SOSE.2014.25","url":"https://dblp.org/rec/conf/sose/LomoteyD14"}, "url":"URL#3945595" }, { "@score":"1", "@id":"3945596", "info":{"authors":{"author":[{"@pid":"12/11290","text":"R. Madhusudhan"},{"@pid":"147/1694","text":"Rohith Kumar S."}]},"title":"Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards.","venue":"SOSE","pages":"474-477","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/MadhusudhanS14","doi":"10.1109/SOSE.2014.84","ee":"https://doi.org/10.1109/SOSE.2014.84","url":"https://dblp.org/rec/conf/sose/MadhusudhanS14"}, "url":"URL#3945596" }, { "@score":"1", "@id":"3945597", "info":{"authors":{"author":[{"@pid":"56/6992","text":"Glenford E. Mapp"},{"@pid":"68/7740","text":"Mahdi Aiash"},{"@pid":"147/1662","text":"Brian Ondiege"},{"@pid":"65/2808","text":"Malcolm Clarke"}]},"title":"Exploring a New Security Framework for Cloud Storage Using Capabilities.","venue":"SOSE","pages":"484-489","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/MappAOC14","doi":"10.1109/SOSE.2014.69","ee":"https://doi.org/10.1109/SOSE.2014.69","url":"https://dblp.org/rec/conf/sose/MappAOC14"}, "url":"URL#3945597" }, { "@score":"1", "@id":"3945598", "info":{"authors":{"author":[{"@pid":"147/1634","text":"Carolina Melo"},{"@pid":"83/468","text":"Marcelo Fantinato"},{"@pid":"12/10497","text":"Violeta Sun"},{"@pid":"94/10677","text":"Edmir P. V. Prado"}]},"title":"Towards an Organizational Strategic Alignment Driven by Business Level Agreements.","venue":"SOSE","pages":"98-109","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/MeloFSP14","doi":"10.1109/SOSE.2014.17","ee":"https://doi.org/10.1109/SOSE.2014.17","url":"https://dblp.org/rec/conf/sose/MeloFSP14"}, "url":"URL#3945598" }, { "@score":"1", "@id":"3945599", "info":{"authors":{"author":[{"@pid":"65/8331","text":"Haibo Mi"},{"@pid":"02/661","text":"Huaimin Wang"},{"@pid":"02/4907","text":"Zhenbang Chen"},{"@pid":"27/6390","text":"Yangfan Zhou"}]},"title":"Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification Model.","venue":"SOSE","pages":"302-307","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/MiWCZ14","doi":"10.1109/SOSE.2014.43","ee":"https://doi.org/10.1109/SOSE.2014.43","url":"https://dblp.org/rec/conf/sose/MiWCZ14"}, "url":"URL#3945599" }, { "@score":"1", "@id":"3945600", "info":{"authors":{"author":[{"@pid":"94/6046","text":"Gianmario Motta"},{"@pid":"143/8502","text":"Linlin You"},{"@pid":"143/8463","text":"Daniele Sacco"},{"@pid":"12/429","text":"Tianyi Ma"}]},"title":"CITY FEED: A Crowdsourcing System for City Governance.","venue":"SOSE","pages":"439-445","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/MottaYSM14","doi":"10.1109/SOSE.2014.64","ee":"https://doi.org/10.1109/SOSE.2014.64","url":"https://dblp.org/rec/conf/sose/MottaYSM14"}, "url":"URL#3945600" }, { "@score":"1", "@id":"3945601", "info":{"authors":{"author":[{"@pid":"16/10966","text":"Naushin Nower"},{"@pid":"17/5184","text":"Yasuo Tan"},{"@pid":"46/6543","text":"Azman Osman Lim"}]},"title":"Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems.","venue":"SOSE","pages":"192-197","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/NowerTL14","doi":"10.1109/SOSE.2014.29","ee":"https://doi.org/10.1109/SOSE.2014.29","url":"https://dblp.org/rec/conf/sose/NowerTL14"}, "url":"URL#3945601" }, { "@score":"1", "@id":"3945602", "info":{"authors":{"author":[{"@pid":"131/1276","text":"Mazedur Rahman"},{"@pid":"147/1659","text":"Samira Iqbal"},{"@pid":"g/JerryZeyuGao","text":"Jerry Gao 0002"}]},"title":"Load Balancer as a Service in Cloud Computing.","venue":"SOSE","pages":"204-211","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/RahmanIG14","doi":"10.1109/SOSE.2014.31","ee":"https://doi.org/10.1109/SOSE.2014.31","url":"https://dblp.org/rec/conf/sose/RahmanIG14"}, "url":"URL#3945602" }, { "@score":"1", "@id":"3945603", "info":{"authors":{"author":[{"@pid":"86/5797-1","text":"Paul Smith 0001"},{"@pid":"89/1649","text":"Alberto E. Schaeffer Filho"}]},"title":"Management Patterns for Smart Grid Resilience.","venue":"SOSE","pages":"415-416","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/SmithF14","doi":"10.1109/SOSE.2014.58","ee":"https://doi.org/10.1109/SOSE.2014.58","url":"https://dblp.org/rec/conf/sose/SmithF14"}, "url":"URL#3945603" }, { "@score":"1", "@id":"3945604", "info":{"authors":{"author":[{"@pid":"147/1685","text":"Keith de Souza"},{"@pid":"83/468","text":"Marcelo Fantinato"}]},"title":"WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS Metamodels.","venue":"SOSE","pages":"76-81","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/SouzaF14","doi":"10.1109/SOSE.2014.15","ee":"https://doi.org/10.1109/SOSE.2014.15","url":"https://dblp.org/rec/conf/sose/SouzaF14"}, "url":"URL#3945604" }, { "@score":"1", "@id":"3945605", "info":{"authors":{"author":[{"@pid":"80/10717","text":"Emmanouela Stachtiari"},{"@pid":"120/1925","text":"Nikos Vesyropoulos"},{"@pid":"147/1677","text":"George Kourouleas"},{"@pid":"43/5243","text":"Christos K. Georgiadis"},{"@pid":"20/2927","text":"Panagiotis Katsaros"}]},"title":"Correct-by-Construction Web Service Architecture.","venue":"SOSE","pages":"47-58","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/StachtiariVKGK14","doi":"10.1109/SOSE.2014.12","ee":"https://doi.org/10.1109/SOSE.2014.12","url":"https://dblp.org/rec/conf/sose/StachtiariVKGK14"}, "url":"URL#3945605" }, { "@score":"1", "@id":"3945606", "info":{"authors":{"author":[{"@pid":"147/1636","text":"Wenbo Su"},{"@pid":"53/2571","text":"Chuang Lin"},{"@pid":"79/3122","text":"Kun Meng"},{"@pid":"147/1705","text":"Qu Liu"}]},"title":"Modeling and Analysis of Availability for SaaS Multi-tenant Architecture.","venue":"SOSE","pages":"365-369","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/SuLML14","doi":"10.1109/SOSE.2014.65","ee":"https://doi.org/10.1109/SOSE.2014.65","url":"https://dblp.org/rec/conf/sose/SuLML14"}, "url":"URL#3945606" }, { "@score":"1", "@id":"3945607", "info":{"authors":{"author":[{"@pid":"19/2813-4","text":"Dong Sun 0004"},{"@pid":"74/2346","text":"Rong Peng"},{"@pid":"87/3960","text":"Wei-Tek Tsai"}]},"title":"Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case Study.","venue":"SOSE","pages":"230-236","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/SunPT14","doi":"10.1109/SOSE.2014.27","ee":"https://doi.org/10.1109/SOSE.2014.27","url":"https://dblp.org/rec/conf/sose/SunPT14"}, "url":"URL#3945607" }, { "@score":"1", "@id":"3945608", "info":{"authors":{"author":[{"@pid":"68/2824","text":"Weidong Sun"},{"@pid":"91/1726-1","text":"Yijie Wang 0001"},{"@pid":"97/9300","text":"Yongquan Fu"},{"@pid":"147/1676","text":"Xiaoqiang Pei"}]},"title":"A Discrete Data Dividing Approach for Erasure-Code-Based Storage Applications.","venue":"SOSE","pages":"308-313","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/SunWFP14","doi":"10.1109/SOSE.2014.44","ee":"https://doi.org/10.1109/SOSE.2014.44","url":"https://dblp.org/rec/conf/sose/SunWFP14"}, "url":"URL#3945608" }, { "@score":"1", "@id":"3945609", "info":{"authors":{"author":[{"@pid":"21/1509-1","text":"Hailong Sun 0001"},{"@pid":"62/6776","text":"Tao Zhao"},{"@pid":"60/1152-18","text":"Yu Tang 0018"},{"@pid":"90/2144-1","text":"Xudong Liu 0001"}]},"title":"A QoS-Aware Load Balancing Policy in Multi-tenancy Environment.","venue":"SOSE","pages":"140-147","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/SunZTL14","doi":"10.1109/SOSE.2014.21","ee":"https://doi.org/10.1109/SOSE.2014.21","url":"https://dblp.org/rec/conf/sose/SunZTL14"}, "url":"URL#3945609" }, { "@score":"1", "@id":"3945610", "info":{"authors":{"author":[{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"29/186-4","text":"Jie Luo 0004"},{"@pid":"117/7709","text":"Guanqiu Qi"},{"@pid":"06/241-1","text":"Wenjun Wu 0001"}]},"title":"Concurrent Test Algebra Execution with Combinatorial Testing.","venue":"SOSE","pages":"35-46","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/TsaiLQ014","doi":"10.1109/SOSE.2014.11","ee":"https://doi.org/10.1109/SOSE.2014.11","url":"https://dblp.org/rec/conf/sose/TsaiLQ014"}, "url":"URL#3945610" }, { "@score":"1", "@id":"3945611", "info":{"authors":{"author":[{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"117/7709","text":"Guanqiu Qi"}]},"title":"A Cloud-Based Platform for Crowdsourcing and Self-Organizing Learning.","venue":"SOSE","pages":"454-458","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/TsaiQ14","doi":"10.1109/SOSE.2014.81","ee":"https://doi.org/10.1109/SOSE.2014.81","url":"https://dblp.org/rec/conf/sose/TsaiQ14"}, "url":"URL#3945611" }, { "@score":"1", "@id":"3945612", "info":{"authors":{"author":[{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"74/7203","text":"Peide Zhong"}]},"title":"Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS).","venue":"SOSE","pages":"128-139","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/TsaiZ14","doi":"10.1109/SOSE.2014.20","ee":"https://doi.org/10.1109/SOSE.2014.20","url":"https://dblp.org/rec/conf/sose/TsaiZ14"}, "url":"URL#3945612" }, { "@score":"1", "@id":"3945613", "info":{"authors":{"author":[{"@pid":"62/8043","text":"Yuan-Hsin Tung"},{"@pid":"147/1633","text":"Chen-Chiu Lin"},{"@pid":"87/9676","text":"Hwai-Ling Shan"}]},"title":"Test as a Service: A Framework for Web Security TaaS Service in Cloud Environment.","venue":"SOSE","pages":"212-217","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/TungLS14","doi":"10.1109/SOSE.2014.36","ee":"https://doi.org/10.1109/SOSE.2014.36","url":"https://dblp.org/rec/conf/sose/TungLS14"}, "url":"URL#3945613" }, { "@score":"1", "@id":"3945614", "info":{"authors":{"author":[{"@pid":"117/9717","text":"Pierre De Vettor"},{"@pid":"62/4946","text":"Michael Mrissa"},{"@pid":"b/DjamalBenslimane","text":"Djamal Benslimane"},{"@pid":"147/1682","text":"Salim Berbar"}]},"title":"A Service Oriented Architecture for Linked Data Integration.","venue":"SOSE","pages":"198-203","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/VettorMBB14","doi":"10.1109/SOSE.2014.30","ee":"https://doi.org/10.1109/SOSE.2014.30","url":"https://dblp.org/rec/conf/sose/VettorMBB14"}, "url":"URL#3945614" }, { "@score":"1", "@id":"3945615", "info":{"authors":{"author":[{"@pid":"71/4165","text":"Yonggang Wang"},{"@pid":"28/7567","text":"Shan Yao"},{"@pid":"181/2820","text":"Jing Li"},{"@pid":"147/1673","text":"Zhongfei Xia"},{"@pid":"147/1697","text":"Hanbing Yan"},{"@pid":"96/6747","text":"Junfeng Xu"}]},"title":"ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing.","venue":"SOSE","pages":"338-343","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/WangYLXYX14","doi":"10.1109/SOSE.2014.49","ee":"https://doi.org/10.1109/SOSE.2014.49","url":"https://dblp.org/rec/conf/sose/WangYLXYX14"}, "url":"URL#3945615" }, { "@score":"1", "@id":"3945616", "info":{"authors":{"author":[{"@pid":"46/2005","text":"Ning Wang"},{"@pid":"48/450-4","text":"Yang Yang 0004"},{"@pid":"05/8605","text":"Zhenqiang Mi"},{"@pid":"78/150","text":"Qing Ji"},{"@pid":"79/3122","text":"Kun Meng"}]},"title":"A Fault-Tolerant Strategy of Redeploying the Lost Replicas in Cloud.","venue":"SOSE","pages":"370-375","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/WangYMJM14","doi":"10.1109/SOSE.2014.62","ee":"https://doi.org/10.1109/SOSE.2014.62","url":"https://dblp.org/rec/conf/sose/WangYMJM14"}, "url":"URL#3945616" }, { "@score":"1", "@id":"3945617", "info":{"authors":{"author":[{"@pid":"05/6636","text":"David Webster"},{"@pid":"48/917","text":"Paul Townend"},{"@pid":"37/5126-7","text":"Jie Xu 0007"}]},"title":"Restructuring Web Service Interfaces to Support Evolution.","venue":"SOSE","pages":"158-159","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/WebsterTX14","doi":"10.1109/SOSE.2014.66","ee":"https://doi.org/10.1109/SOSE.2014.66","url":"https://dblp.org/rec/conf/sose/WebsterTX14"}, "url":"URL#3945617" }, { "@score":"1", "@id":"3945618", "info":{"authors":{"author":[{"@pid":"33/4054","text":"Wei Xiong"},{"@pid":"87/3960","text":"Wei-Tek Tsai"}]},"title":"HLA-Based SaaS-Oriented Simulation Frameworks.","venue":"SOSE","pages":"376-383","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/XiongT14","doi":"10.1109/SOSE.2014.74","ee":"https://doi.org/10.1109/SOSE.2014.74","url":"https://dblp.org/rec/conf/sose/XiongT14"}, "url":"URL#3945618" }, { "@score":"1", "@id":"3945619", "info":{"authors":{"author":[{"@pid":"147/1638","text":"Basel Yousef"},{"@pid":"55/521-2","text":"Hong Zhu 0002"},{"@pid":"26/4300","text":"Muhammad Younas 0001"}]},"title":"Tenant Level Checkpointing of Meta-data for Multi-tenancy SaaS.","venue":"SOSE","pages":"148-153","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/YousefZY14","doi":"10.1109/SOSE.2014.22","ee":"https://doi.org/10.1109/SOSE.2014.22","url":"https://dblp.org/rec/conf/sose/YousefZY14"}, "url":"URL#3945619" }, { "@score":"1", "@id":"3945620", "info":{"authors":{"author":[{"@pid":"127/6403","text":"Paraskevi Zerva"},{"@pid":"32/2945","text":"Steffen Zschaler"},{"@pid":"74/3469","text":"Simon Miles"}]},"title":"A Provenance Model of Composite Services in Service-Oriented Environments.","venue":"SOSE","pages":"1-12","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZervaZM14","doi":"10.1109/SOSE.2014.8","ee":"https://doi.org/10.1109/SOSE.2014.8","url":"https://dblp.org/rec/conf/sose/ZervaZM14"}, "url":"URL#3945620" }, { "@score":"1", "@id":"3945621", "info":{"authors":{"author":[{"@pid":"130/8417","text":"Hanglong Zhan"},{"@pid":"67/7638","text":"Lianghuan Kang"},{"@pid":"76/4740","text":"Donggang Cao"}]},"title":"DETS: A Dynamic and Elastic Task Scheduler Supporting Multiple Parallel Schemes.","venue":"SOSE","pages":"278-283","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhanKC14","doi":"10.1109/SOSE.2014.39","ee":"https://doi.org/10.1109/SOSE.2014.39","url":"https://dblp.org/rec/conf/sose/ZhanKC14"}, "url":"URL#3945621" }, { "@score":"1", "@id":"3945622", "info":{"authors":{"author":[{"@pid":"19/5112","text":"Zhen Zhang"},{"@pid":"48/195-2","text":"Zhiyong Feng 0002"},{"@pid":"57/7434","text":"Shizhan Chen"}]},"title":"Domain-Oriented Evaluation and Prediction for Documentation Quality of Web Services.","venue":"SOSE","pages":"250-257","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhangFC14","doi":"10.1109/SOSE.2014.33","ee":"https://doi.org/10.1109/SOSE.2014.33","url":"https://dblp.org/rec/conf/sose/ZhangFC14"}, "url":"URL#3945622" }, { "@score":"1", "@id":"3945623", "info":{"authors":{"author":[{"@pid":"04/6931","text":"Yingchao Zhang"},{"@pid":"95/11343","text":"Zhiping Jiang"},{"@pid":"147/1627","text":"Xiaohao Yu"},{"@pid":"30/9543","text":"Xiaoqiang Song"}]},"title":"Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0.","venue":"SOSE","pages":"156-157","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhangJYS14","doi":"10.1109/SOSE.2014.70","ee":"https://doi.org/10.1109/SOSE.2014.70","url":"https://dblp.org/rec/conf/sose/ZhangJYS14"}, "url":"URL#3945623" }, { "@score":"1", "@id":"3945624", "info":{"authors":{"author":[{"@pid":"67/11341-1","text":"Zhaoning Zhang 0001"},{"@pid":"90/10939","text":"Ziyang Li"},{"@pid":"w/KuiWu","text":"Kui Wu 0001"},{"@pid":"48/9032","text":"Huiba Li"},{"@pid":"42/2857-1","text":"Yuxing Peng 0001"},{"@pid":"07/2551","text":"Xicheng Lu"}]},"title":"DLSM: Decoupled Live Storage Migration with Distributed Device Mapper Storage.","venue":"SOSE","pages":"82-89","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhangLWLPL14","doi":"10.1109/SOSE.2014.35","ee":"https://doi.org/10.1109/SOSE.2014.35","url":"https://dblp.org/rec/conf/sose/ZhangLWLPL14"}, "url":"URL#3945624" }, { "@score":"1", "@id":"3945625", "info":{"authors":{"author":[{"@pid":"80/2266-1","text":"Jia Zhang 0001"},{"@pid":"26/1548-2","text":"Chris Lee 0002"},{"@pid":"139/2282","text":"Sean Xiao"},{"@pid":"47/936","text":"Petr Votava"},{"@pid":"139/2378","text":"Tsengdar J. Lee"},{"@pid":"70/10416","text":"Ramakrishna R. Nemani"},{"@pid":"f/IanTFoster","text":"Ian T. Foster"}]},"title":"A Community-Driven Workflow Recommendations and Reuse Infrastructure.","venue":"SOSE","pages":"162-172","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhangLXVLNF14","doi":"10.1109/SOSE.2014.23","ee":"https://doi.org/10.1109/SOSE.2014.23","url":"https://dblp.org/rec/conf/sose/ZhangLXVLNF14"}, "url":"URL#3945625" }, { "@score":"1", "@id":"3945626", "info":{"authors":{"author":[{"@pid":"65/8968","text":"Yuqun Zhang"},{"@pid":"p/DEPerry","text":"Dewayne E. Perry"}]},"title":"A Goal-Directed Modeling Technique towards Business Process.","venue":"SOSE","pages":"110-121","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhangP14","doi":"10.1109/SOSE.2014.18","ee":"https://doi.org/10.1109/SOSE.2014.18","url":"https://dblp.org/rec/conf/sose/ZhangP14"}, "url":"URL#3945626" }, { "@score":"1", "@id":"3945627", "info":{"authors":{"author":[{"@pid":"97/4708","text":"Li Zhao"},{"@pid":"31/6143","text":"Ge Fu"},{"@pid":"33/85","text":"Qian Liu"},{"@pid":"26/707","text":"Xinran Liu"},{"@pid":"54/6265","text":"Wei Cao"}]},"title":"A PCA-Based Traffic Monitoring Approach for Distributed Computing Systems.","venue":"SOSE","pages":"272-277","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhaoFLLC14","doi":"10.1109/SOSE.2014.38","ee":"https://doi.org/10.1109/SOSE.2014.38","url":"https://dblp.org/rec/conf/sose/ZhaoFLLC14"}, "url":"URL#3945627" }, { "@score":"1", "@id":"3945628", "info":{"authors":{"author":[{"@pid":"147/1642","text":"Jingwen Zhou"},{"@pid":"02/4907","text":"Zhenbang Chen"},{"@pid":"65/8331","text":"Haibo Mi"},{"@pid":"64/856-1","text":"Ji Wang 0001"}]},"title":"MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed Systems.","venue":"SOSE","pages":"266-271","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhouCMW14","doi":"10.1109/SOSE.2014.37","ee":"https://doi.org/10.1109/SOSE.2014.37","url":"https://dblp.org/rec/conf/sose/ZhouCMW14"}, "url":"URL#3945628" }, { "@score":"1", "@id":"3945629", "info":{"authors":{"author":[{"@pid":"147/1669","text":"Yingpu Zhu"},{"@pid":"31/2088-1","text":"Lu Liu 0001"},{"@pid":"120/1738","text":"John Panneerselvam"},{"@pid":"53/10765-1","text":"Liangmin Wang 0001"},{"@pid":"l/ZhiyuanLi-2","text":"Zhiyuan Li 0002"}]},"title":"Credit-Based Incentives in Vehicular Ad Hoc Networks.","venue":"SOSE","pages":"352-357","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sose/ZhuLPWL14","doi":"10.1109/SOSE.2014.51","ee":"https://doi.org/10.1109/SOSE.2014.51","url":"https://dblp.org/rec/conf/sose/ZhuLPWL14"}, "url":"URL#3945629" }, { "@score":"1", "@id":"3965410", "info":{"title":"8th IEEE International Symposium on Service Oriented System Engineering, SOSE 2014, Oxford, United Kingdom, April 7-11, 2014","venue":"SOSE","publisher":"IEEE Computer Society","year":"2014","type":"Editorship","key":"conf/sose/2014","ee":"https://ieeexplore.ieee.org/xpl/conhome/6825321/proceeding","url":"https://dblp.org/rec/conf/sose/2014"}, "url":"URL#3965410" } ] } } } )