default search action
35th COMPSAC 2011: Munich, Germany
- Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2011, Munich, Germany, 18-22 July 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4439-7
Keynote Speech
- Reinhold Achatz:
From Embedded Systems to Cyber-Physical Systems: Research Challenges and Application Areas. 1 - Chris Bishop:
Embracing Uncertainty: The New Machine Learning. 2
Joint COMPSAC/SAINT 2011 Panel
- Stephen S. Yau:
Joint COMPSAC/SAINT 2011 Panel: International Perspectiveson Computed World: Software Beyond the Digital Society. 3
Web-Based Systems I
- Xiang Huang, Wei Wang, Wenbo Zhang, Jun Wei, Tao Huang:
An Adaptive Performance Modeling Approach to Performance Profiling of Multi-service Web Applications. 4-13 - Huirong Yang, Pengbin Fu, Baocai Yin, Mengduo Ma, Yanyan Tang:
A Semantic Similarity Measure between Web Services Based on Google Distance. 14-19 - Yufeng Zhang, Hong Zhu:
An Intelligent Broker Approach to Semantics-Based Service Composition. 20-25 - Silvio R. L. Meira, Vanilson Arruda Burégio, Leandro Marques Nascimento, Elaine G. M. de Figueiredo, Misael Neto, Bruno P. Encarnação, Vinicius Cardoso Garcia:
The Emerging Web of Social Machines. 26-27
Security, Dependability, and Performance I
- Thoshitha T. Gamage, Thomas P. Roth, Bruce M. McMillin:
Confidentiality Preserving Security Properties for Cyber-Physical Systems. 28-37 - Wenbo Zhang, Sa Wang, Wei Wang, Hua Zhong:
Bench4Q: A QoS-Oriented E-Commerce Benchmark. 38-47 - Mingqiang Xue, Barbara Carminati, Elena Ferrari:
P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks. 48-57
Software Testing I
- Zhenyu Zhang, W. K. Chan, T. H. Tse, Bo Jiang:
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs. 58-67 - Robert G. Merkel, Fei-Ching Kuo, Tsong Yueh Chen:
An Analysis of Failure-Based Test Profiles for Random Testing. 68-75 - Lian Yu, Xiaohu Li, Zhongjie Li:
Testing Tasks Management in Testing Cloud Environment. 76-85
Applications
- Luis G. Crepaldi, Adriano R. Digiere, Roberta Spolon Ulson, Marcos Antonio Cavenaghi, Renata Spolon Lobato:
A Management Tool for the Replication of Operating Systems in Wireless Communication Networks. 86-92 - Yali Wu, Frank Hernandez, Peter J. Clarke, Robert B. France:
A DSML for Coordinating User-Centric Communication Services. 93-102 - Min-Hee Jang, Si-Yong Lee, Sang-Wook Kim, Myung-Cheol Roh, Jae-Ho Lee, Seung-Woo Nam:
On Extracting Perception-Based Features for Effective Similar Shader Retreival. 103-107
Formal Methods
- Gianpiero Francesca, Antonella Santone, Gigliola Vaglini, Maria Luisa Villani:
Ant Colony Optimization for Deadlock Detection in Concurrent Systems. 108-117 - Sidi Ould Biha:
A Formal Semantics of PLC Programs in Coq. 118-127 - Sujeong Woo, Jinho On, Moonkun Lee:
An Abstraction Method for Mobility and Interaction in Process Algebra Using Behavior Ontology. 128-133
HCI and Usability I
- Tobias Heinroth, Dan Denich:
Spoken Interaction within the Computed World: Evaluation of a Multitasking Adaptive Spoken Dialogue System. 134-143 - Charles E. Downing, Chang Liu:
Assessing Web Site Usability in Retail Electronic Commerce. 144-151 - Masahiro Araki, Kana Shibahara, Yuko Mizukami:
Spoken Dialogue System for Learning Braille. 152-156
Real-Time, Embedded and Physical Systems I
- Alexandre Chagoya-Garzon, Nicolas Poste, Frédéric Rousseau:
Semi-automation of Configuration Files Generation for Heterogeneous Multi-tile Systems. 157-166 - Jagun Kwon, Stephen Hailes:
Adaptive Bandwidth-Based Thread Group Scheduler for Compositional Real-Time Middleware Architectures. 167-175 - Jimmy Kjellsson, Martin Törngren:
A Concept for Secure Production Programming of Embedded Industrial Field Devices. 176-181 - Chris Prokopiak, Carl Leuschen, Fernando Rodriguez-Morales, John R. Ledford, William A. Blake, Anthony Hoch, Hilary Barbour:
Multi-node Network Based Control and Data Acquisition System for a VHF Radar Depth Sounder. 182-183
Education and Learning
- James H. Cross II, T. Dean Hendrix, Larry A. Barowski:
Combining Dynamic Program Viewing and Testing in Early Computing Courses. 184-192 - Nancy R. Mead, Linda M. Laird, Daniel Shoemaker:
Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational Initiatives. 193-198 - Kyle Persohn, Dennis Brylow:
Interactive Real-Time Embedded Systems Education Infused with Applied Internet Telephony. 199-204
Software Architecture and Design I
- Mahmoud Hussein, Jun Han, Alan W. Colman:
An Approach to Model-Based Development of Context-Aware Adaptive Systems. 205-214 - Fadila Aoussat, Mourad Oussalah, Mohamed Ahmed-Nacer:
SPEM Extension with Software Process Architectural Concepts. 215-223 - Ying Wang, Dianfu Ma, Yongwang Zhao, Lu Zou, Xianqi Zhao:
An AADL-Based Modeling Method for ARINC653-Based Avionics Software. 224-229
Semantic Web I
- Tao Yang, Yijian Wu, Xin Peng, Wenyun Zhao:
Fine-Grained Configuration Management for Collaborative Ontology Development. 230-238 - Nophadol Jekjantuk, Jeff Z. Pan, Yuzhong Qu:
Diagnosis of Software Models with Multiple Levels of Abstraction Using Ontological Metamodeling. 239-244 - Norman Heino, Sebastian Tramp, Sören Auer:
Managing Web Content Using Linked Data Principles - Combining Semantic Structure with Dynamic Content Syndication. 245-250 - David Walsh, Philipp Schügerl, Juergen Rilling, Philippe Charland:
Quality Validation through Pattern Detection - A Semantic Web Perspective. 251-252
Mobile & Pervasive Computing I
- Dhaminda B. Abeywickrama, Sita Ramakrishnan:
Model Checking Aspectual Pervasive Software Services. 253-262 - Anna Cinzia Squicciarini, Dan Lin, Alessandro Mancarella:
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network. 263-272 - Jun-Qing Chen, Linpeng Huang:
Supporting Dynamic Service Updates in Pervasive Applications. 273-278
Security, Dependability, and Performance II
- Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira:
24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable Knowledge. 279-288 - Vasilios Katos, Dimitris Vrakas, Panagiotis Katsaros:
A Framework for Access Control with Inference Constraints. 289-297 - Axel Schröpfer, Florian Kerschbaum, Günter Müller:
L1 - An Intermediate Language for Mixed-Protocol Secure Computation. 298-307
Requirements Engineering I
- Michel dos Santos Soares, Jos L. M. Vrancken:
A Framework for Multi-layered Requirements Documentation and Analysis. 308-313 - Golnaz Elahi, Eric S. K. Yu, Tong Li, Lin Liu:
Security Requirements Engineering in the Wild: A Survey of Common Practices. 314-319 - Chun Kyung Lee, Thi Hien Pham, Hee-seong Kim, Hee Yong Youn:
Similarity Based Distributed Context Reasoning with Layer Context Modeling. 320-325
Creative Computing
- Alejandro Catalá, Javier Jaén Martínez, Adria A. Martinez-Villaronga, José A. Mocholí:
AGORAS: Exploring Creative Learning on Tangible User Interfaces. 326-335 - Jerry Fishenden, Andrew Hugill:
Palimpsests of Time and Place. 336-345 - Tin-Kai Chen, Hsiao-Ping Fang, Yingchun Tian, Hsiao-Lin Fang, Yan-Jie Li, Shih-Hsuan Tseng, Su-En Miao:
Design and Evaluation of Social Interfaces for Cultural Exhibitions of Chinese Shadow Puppetry. 346-347 - Xifeng Wang, Bixin Li, Li Liao, Chunli Xie:
Ontology-Based Reliability Evaluation for Web Service. 348-349
Software Quality I
- Marek Grzegorz Stochel:
Reliability and Accuracy of the Estimation Process - Wideband Delphi vs. Wisdom of Crowds. 350-359 - P. V. R. Murthy, Saravana Kumar V., Tushar Sharma, Kiron Rao:
Quality Model Driven Dynamic Analysis. 360-365 - Wangbong Lee, Joonkyung Lee, Jongmoon Baik:
Software Reliability Prediction for Open Source Software Adoption Systems Based on Early Lifecycle Measurements. 366-371
Panel I
- Kenji Takahashi:
Privacy in the Cloud. 372
Software Architecture and Design II
- Montserrat Sendín, Juan Miguel López:
Software Infrastructure for Delivering and Supporting Distributed Applications Enhanced with Awareness. 373-382 - Jung Ho Bae, Yeon Ji Jeong, Heung Seok Chae, Carl K. Chang:
Semantics Based Cohesion and Coupling Metrics for Evaluating Understandability of State Diagrams. 383-392 - Gregor Bertrand, Florian Nothdurft, Frank Honold, Felix Schüssel:
CALIGRAPHI - Creation of Adaptive Dialogues Using a Graphical Interface. 393-400
Security, Dependability, and Performance III
- Riccardo Lancellotti, Mauro Andreolini, Claudia Canali, Michele Colajanni:
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing. 401-406 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap. 407-412 - Napoleon Paxton, Gail-Joon Ahn, Mohamed Shehab:
MasterBlaster: Identifying Influential Players in Botnet Transactions. 413-419 - Smitha Sundareswaran, Anna Cinzia Squicciarini, Ranjani Sundareswaran:
Distributed Java-Based Content Protection. 420-425
Real-Time, Embedded and Physical Systems II
- John Meier, Christopher D. Gill, Roger D. Chamberlain:
Towards More Effective Spectrum Use Based on Memory Allocation Models. 426-435 - Pratik Maheshwari, Tianqi Li, Jong-Sung Lee, Byong-Su Seol, Sahra Sedigh, David Pommerenke:
Software-Based Analysis of the Effects of Electrostatic Discharge on Embedded Systems. 436-441 - Khalid Latif, Amir-Mohammad Rahmani, Kameswar Rao Vaddina, Tiberiu Seceleanu, Pasi Liljeberg, Hannu Tenhunen:
Enhancing Performance of NoC-Based Architectures Using Heuristic Virtual-Channel Sharing Approach. 442-447
Panel II
- Cristina Cerschi Seceleanu:
Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives - Panel Introduction. 448-449 - Paul Pettersson:
Formal Methods Applied in Industry - On the Commercialisation of the UPPAAL Tool. 450-451 - Tiziana Margaria:
Formal Methods in the Era of Service-Oriented Design. 452-453 - Bernhard Schätz:
From Solution to Problem Spaces: Formal Methods in the Context of Model-Based Development and Domain-Specific Languages. 454-455
Requirements Engineering II
- Raúl Mazo, Roberto Erick Lopez-Herrejon, Camille Salinesi, Daniel Diaz, Alexander Egyed:
Conformance Checking with Constraint Logic Programming: The Case of Feature Models. 456-465 - Golnaz Elahi, Eric S. K. Yu:
A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis. 466-475 - Daichi Kimura, Tomohisa Gotoh, Ken'ichi Ikeda:
Eliciting Considerable Requirements with Word and Customer Graphs. 476-485
Software Evolution, Maintenance, and Life Cycle
- Philipp Schügerl, Juergen Rilling, Philippe Charland:
Reasoning about Global Clones: Scalable Semantic Clone Detection. 486-491 - Henning Femmer, Nora Broy, Marin Zec, Asa MacWilliams, Roland Eckl:
Dynamic Software Visualization with BusyBorg - A Proof of Concept. 492-497 - Noritoshi Atsumi, Takashi Kobayashi, Shinichiro Yamamoto, Kiyoshi Agusa:
An XML C Source Code Interchange Format for CASE Tools. 498-503
Mobile & Pervasive Computing II
- Martin Werner:
Selection and Ordering of Points-of-Interest in Large-Scale Indoor Navigation Systems. 504-509 - Subhamoy Ghosh, Juha Savolainen, Mikko Raatikainen, Tomi Männistö:
Cloudifying User-Created Content for Existing Applications in Mobile Devices. 510-515 - Ulrich Bareth, Axel Küpper:
Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone Environments. 516-521
Panel III
- Sahra Sedigh:
Panel III "Smart Technology" - Applications and Infrastructure. 522
Web-Based Systems II
- Xiulei Qin, Wenbo Zhang, Wei Wang, Jun Wei, Hua Zhong, Tao Huang:
On-line Cache Strategy Reconfiguration for Elastic Caching Platform: A Machine Learning Approach. 523-534 - Achilleas Achilleos, Nearchos Paspallis, George A. Papadopoulos:
Automating the Development of Device-Aware Web Services: A Model-Driven Approach. 535-540 - Wei Wang, Xiang Huang, Yunkui Song, Wenbo Zhang, Jun Wei, Hua Zhong, Tao Huang:
A Statistical Approach for Estimating CPU Consumption in Shared Java Middleware Server. 541-546
Semantic Web II
- Luciano Bernardes de Paula, Rodolfo da Silva Villaça, Maurício F. Magalhães:
Analysis of Concept Similarity Methods Applied to an LSH Function. 547-555 - Sajjad Hussain, Jos De Roo, Ali Daniyal, Syed Sibte Raza Abidi:
Detecting and Resolving Inconsistencies in Ontologies Using Contradiction Derivations. 556-561 - Tara Raafat, Franjo Cecelja:
Application of Semantic Web Services for Mobile Telemedicine Service Discovery. 562-563 - Chunli Xie, Bixin Li, Xifeng Wang:
A Staged Model for Web Service Reliability. 564-565
Software Quality II
- Xiaofeng Yang, Mohammad Zulkernine:
Security Monitoring of Components Using Aspects and Contracts in Wrappers. 566-575 - Weiqin Zou, Yan Hu, Jifeng Xuan, He Jiang:
Towards Training Set Reduction for Bug Triage. 576-581 - Osama Sammodi, Andreas Metzger, Xavier Franch, Marc Oriol, Jordi Marco, Klaus Pohl:
Usage-Based Online Testing for Proactive Adaptation of Service-Based Applications. 582-587 - Lulu Wang, Bixin Li:
A Technique of Profiling Selective Paths. 588-589
Requirements Engineering III
- Shokoofeh Ketabchi, Navid Karimi Sani, Kecheng Liu:
A Norm-Based Approach towards Requirements Patterns. 590-595 - Pedro Patrício, Vasco Amaral, João Araújo, Rui Monteiro:
Towards a Unified Goal-Oriented Language. 596-601 - Feng Chen, Hong Zhou, Hongji Yang, Martin P. Ward, William Cheng-Chung Chu:
Requirements Recovery by Matching Domain Ontology and Program Ontology. 602-607 - Bo Wei, Zhi Jin:
Characterizing the Implementation of Software Non-functional Requirements from Probabilistic Perspective. 608-609
HCI and Usability II
- Luis A. Leiva, Verónica Romero, Alejandro H. Toselli, Enrique Vidal:
Evaluating an Interactive-Predictive Paradigm on Handwriting Transcription: A Case Study and Lessons Learned. 610-617 - Keiko Yamamoto, Taku Kuriyama, Haruki Shigemori, Itaru Kuramoto, Yoshihiro Tsujino, Mitsuru Minakuchi:
Provenance Based Retrieval: File Retrieval System Using History of Moving and Editing in User Experience. 618-625 - Martin Mihajlov, Borka Jerman-Blazic, Saso Josimovski:
Quantifying Usability and Security in Authentication. 626-629
Software Testing II
- Fevzi Belli, Nevin Güler, Michael Linschulte:
Does "Depth" Really Matter? On the Role of Model Refinement for Testing and Reliability. 630-639 - Xiaoying Bai, Kejia Hou, Hao Lu, Yao Zhang, Linping Hu, Hong Ye:
Semantic-Based Test Oracles. 640-649 - Fevzi Belli, Mutlu Beyazit:
Event-Based Mutation Testing vs. State-Based Mutation Testing - An Experimental Comparison. 650-655 - J. Jenny Li, John Douglas Palframan, Jim Landwehr:
SoftWare IMmunization (SWIM) - A Combination of Static Analysis and Automatic Testing. 656-661
Software Architecture and Design III
- Wen-Lin Liu, Chung-Horng Lung, Samuel Ajila:
Impact of Aspect-Oriented Programming on Software Performance: A Case Study of Leader/Followers and Half-Sync/Half-Async Architectures. 662-667 - Venkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert:
Performance Improvement for Collection Operations Using Join Query Optimization. 668-673 - Pyungsun Park, Jaeil Jung, Byounghweh Huh:
Development of CAN-1394 Automotive Gateway System Using Designed Modular Software Stack. 674-679 - Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:
An Effective Approach for Automatic Generation of Class Integration Test Order. 680-681
Security, Dependability, and Performance IV
- Yoshihiro Oyama, Youhei Hoshi:
A Hypervisor for Injecting Scenario-Based Attack Effects. 682-687 - Manghui Tu, Dianxiang Xu, Zhonghang Xia, Jicheng Fu:
Reach Availability Modeling of Replicated Services. 688-693 - Manuel Peralta, Supratik Mukhopadhyay:
Code-Change Impact Analysis Using Counterfactuals. 694-699
Doctoral Symposium
- Dominik Sojer:
Synthesis of Fault Detection Mechanisms TRACK: Real-Time, Embedded and Physical Systems. 700-703 - Daniel Corrêa Lobato:
Meta Reconfiguration of Adaptive Middleware Using Semantic Web and Context Information. 704-707 - Jinho On:
Onion: A Graphical Language for Process Algebra. 708-711 - Haihua Xie:
Observable Context-Based User Intention Specification in Context-Aware Environments. 712-715 - John Meier:
Towards Model-Based Policy Design Methods for More Effective Spectrum Allocation. 716-718
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.