default search action
34th COMPSAC Workshops 2010: Seoul, Korea
- Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2010, Seoul, Korea, 19-23 July 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4105-1
ESAS 2010: The Fifth IEEE Workshop on Engineering Semantic Agent Systems
- Asli Apaydin, Duygu Çelik, Atilla Elçi:
Semantic Image Retrieval Model for Sharing Experiences in Social Networks. 1-6 - Duygu Çelik, Atilla Elçi:
Ontology-Based QoS Queuing Model for Selection of Web Services Servers. 7-12 - Jing Lin, Sahra Sedigh, Ann Miller:
Modeling Cyber-Physical Systems with Semantic Agents. 13-18
QUORS 2010: The Fourth IEEE International Workshop on Quality Oriented Reuse of Software
- Indika Kumara, Chandana Gamage:
Towards Reusing ESB Services in Different ESB Architectures. 25-30 - Tuoye Xu, Tong Li, Lin Liu, Barrett R. Bryant:
Negotiating Service Requirements among Strategic Actors. 31-36 - Shin Nakajima, Keiji Hokamura, Naoyasu Ubayashi:
Aspect-Oriented Development of PHP-Based Web Applications. 37-44 - Hua Li, Yong-guang Peng, Xinming Ye, Jing-yuan Yue:
Test Sequence Generation from Combining Property Modeling and Program Slicing. 45-50 - Le Truong Giang, Dongwon Kang, Doo-Hwan Bae:
Software Fault Prediction Models for Web Applications. 51-56 - Atef Mohamed, Mohammad Zulkernine:
The Level of Decomposition Impact on Component Fault Tolerance. 57-62 - Michael Lettner, Michael Tschernuth:
Applied MDA for Embedded Devices: Software Design and Code Generation for a Low-Cost Mobile Phone. 63-68 - M. F. van Amstel:
The Right Tool for the Right Job: Assessing Model Transformation Quality. 69-74 - Tsung Lee, Jhih-Syan Hou:
A Model Expansion Method in Schema-Based Model Evolution. 75-80 - Kumar P. Anoop Anoop, Sathia Narayanan, Vijayalakshmi Mallenahalli Siddaiah:
COTS Integrations: Effort Estimation Best Practices. 81-86 - Omar Alshathry, Helge Janicke:
Optimizing Software Quality Assurance. 87-92
BINDIS 2010: The Third IEEE International Workshop on Barriers towards Internet-Driven Information Services
- Jia Shang, Ji-Jiang Yang, Qing Wang, Hui Pan:
The Framework of Medical Simulation Education and Evaluation System for Supporting SaaS. 93-97 - Chao-Jung Hsu, Nancy Urbina Rodas, Chin-Yu Huang, Kuan-Li Peng:
A Study of Improving the Accuracy of Software Effort Estimation Using Linearly Weighted Combinations. 98-103 - Li Zhou, Yong Zhang, Chunxiao Xing:
ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to Clouds. 104-108 - Wei She, I-Ling Yen, Bhavani Thuraisingham:
WS-Sim: A Web Service Simulation Toolset with Realistic Data Support. 109-114
STPSA 2010: The Fifth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Moesfa Soeheila Mohamad, Geong Sen Poh:
Analysis of Two Watermarking Protocols Based on Commutative Encryption. 115-120 - Tong Li, Lin Liu, Golnaz Elahi, Eric S. K. Yu, Barrett R. Bryant:
Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint. 127-133 - Takeshi Yashiro, Masahiro Bessho, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:
T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant Chip. 134-139 - Ahmed M. Elmisery, Huaiguo Fu:
Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols. 140-145 - Dong Chan An, Seog Park:
Flexible Prime Number Labeling for Resource Limited Clients. 146-151 - Ajay Challagalla, S. S. Shivaji Dhiraj, Durvasula V. L. N. Somayajulu, Toms Shaji Mathew, Saurav Tiwari, Syed Sharique Ahmad:
Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods. 152-157 - Thoshitha T. Gamage, Bruce M. McMillin, Thomas P. Roth:
Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation. 158-163 - Mi-Young Kim, Osmar R. Zaïane, Randy Goebel:
Natural Language Watermarking Based on Syntactic Displacement and Morphological Division. 164-169 - Meixia Zhu, Hanpin Wang, Wei Jin, Zizhen Wang, Chunxiang Xu:
Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation. 170-175 - Jason Madden, Bruce M. McMillin, Anik Sinha:
Environmental Obfuscation of a Cyber Physical System - Vehicle Example. 176-181
IWSC 2010: The Seventh International Workshop on Software Cybernetics
- Haochi Wu, Lin Liu, Wenting Ma:
Optimizing Requirements Elicitation with an i* and Bayesian Network Integrated Modelling Approach. 182-188 - Hwai-Jung Hsu, Feng-Jian Wang:
Delegation Pattern in Workflow System. 189-195 - Bei-Bei Yin, Ling-Zan Zhu, Kai-Yuan Cai:
Entropy-Based Measures of Heterogeneity of Software Structural Profile. 196-201 - Tugkan Tuglular, Gurcan Gercek:
Feedback Control Based Test Case Instantiation for Firewall Testing. 202-207 - Zhi Quan Zhou:
Using Coverage Information to Guide Test Case Selection in Adaptive Random Testing. 208-213 - Hai Hu, Chang-Hai Jiang, Feng Ye, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau:
A Parallel Implementation Strategy of Adaptive Testing. 214-219 - Qian Wu, Qianxiang Wang:
Natural Language Processing Based Detection of Duplicate Defect Patterns. 220-225
SAPSE 2010: The Second International Workshop on Security Aspects of Process and Services Engineering
- Xijiao Xiong, Jing Liu, Miaomiao Zhang, Zuohua Ding:
Modeling and Verification of an Automatic Train Protection System. 226-231 - Nadia Bennani, Ernesto Damiani, Stelvio Cimato:
Toward Cloud-Based Key Management for Outsourced Databases. 232-236
REFS 2010: The Fourth IEEE International Workshop on Requirements Engineering for Services
- Suntae Kim, Minseong Kim, Vijayan Sugumaran, Sooyong Park:
A Scenario Based Approach for Service Identification. 237-238 - Nauman A. Qureshi, Cu D. Nguyen, Anna Perini:
Analyzing Interoperability Requirements for Adaptive Service-Based Applications: A Goal-Oriented Approach. 239-244 - Marco Aiello, Pavel Bulanov, Heerko Groefsema:
Requirements and Tools for Variability Management. 245-250 - Rong Peng, Qiang Ye, Mao Ye:
A Requirements Maturity Measurement Approach Based on SKLSEWiki. 251-254 - Bin Wen, Peng Liang, Keqing He:
Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems. 255-258 - Sean Gu:
Loosely-Coupled SOA Service Access Provisioning. 259-262 - Angshu Maan Sen, K. Hemachandran:
Elicitation of Goals in Requirements Engineering Using Agile Methods. 263-268 - Didar Zowghi, Zhi Jin:
A Framework for the Elicitation and Analysis of Information Technology Service Requirements and Their Alignment with Enterprise Business Goals. 269-272
CFSE 2010: The Second IEEE International Workshop on Computer Forensics in Software Engineering
- Vasileios Koutsoumpas, Kostas Kontogiannis, Peter Matthews:
Dynamic Analysis for the Reconstruction of System Behavior Models. 273-280 - Rong Chen, Lina Hong, Chunyan Lü, Wu Deng:
Author Identification of Software Source Code with Program Dependence Graphs. 281-286 - Igors Svecs, Tanmoy Sarkar, Samik Basu, Johnny S. Wong:
XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment. 287-292
ME 2010: The Second IEEE International Workshop on Middleware Engineering
- Alessandra Toninelli, Animesh Pathak, Amir Seyedi, Roberto Speicys Cardoso, Valérie Issarny:
Middleware Support for Mobile Social Ecosystems. 293-298 - Manal Al-Bahlal, Jalal Al-Muhtadi:
A Middleware for Personal Smart Spaces. 299-304 - Hongjun Yu, Rong Chen, Zhenjun Du:
Message Oriented Middleware Support for Mobile Ad Hoc Data Sharing. 305-310 - Tor-Morten Grønli, Jarle Hansen, Gheorghita Ghinea:
A Context-Aware Meeting Room: Mobile Interaction and Collaboration Using Android, Java ME and Windows Mobile. 311-316 - Taehun Kim, Insuk Park, Soon J. Hyun, Dongman Lee:
MiRE4OWL: Mobile Rule Engine for OWL. 317-322
STA 2010: The Second IEEE International Workshop on Software Test Automation
- Roberto Silveira Silva Filho, Christof J. Budnik, William M. Hasling, Monica McKenna, Rajesh Subramanyan:
Supporting Concern-Based Regression Testing and Prioritization in a Model-Driven Environment. 323-328 - Zhengshan Wang, Bixin Li, Lulu Wang, Meng Wang, Xufang Gong:
Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem. 329-334 - Seung-Hun Shin, Seung-Kyu Park, Kyung-Hee Choi, Ki-Hyun Jung:
Normalized Adaptive Random Test for Integration Tests. 335-340 - Rajesh K. Mansharamani, Amol Khanapurkar, Benny Mathew, Rajesh Subramanyan:
Performance Testing: Far from Steady State. 341-346 - Chuanqi Tao, Bixin Li, Xiaobing Sun, Chongfeng Zhang:
An Approach to Regression Test Selection Based on Hierarchical Slicing Technique. 347-352 - Sukhamay Kundu, Supratik Mukhopadhyay:
Approximation of CFL by Regular Languages for Concurrent Program Verification. 353-358 - Meng Wang, Bixin Li, Zhengshan Wang, Xiaoyuan Xie:
An Optimization Strategy for Evolutionary Testing Based on Cataclysm. 359-364
CloudApp 2010: The First IEEE International Workshop on Emerging Applications for Cloud Computing
- Ivona Brandic, Vincent C. Emeakaroha, Michael Maurer, Schahram Dustdar, Sandor Acs, Attila Kertész, Gabor Kecskemeti:
LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. 365-370 - Victor Echeverría, Lorie M. Liebrock, Dongwan Shin:
Permission Management System: Permission as a Service in Cloud Computing. 371-375 - Derek Smith, Qiang Guan, Song Fu:
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems. 376-381 - Mahadev Satyanarayanan, Wolfgang Richter, Glenn Ammons, Jan Harkes, Adam Goode:
The Case for Content Search of VM Clouds. 382-387 - Ki-Woong Park, Woomin Hwang, Kyu Ho Park:
FalconEye: Data Center Status Extraction via Vision Transformation Techniques. 388-392 - Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. 393-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.