Abstract is missing.
- Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case StudyPramila Mouttappa, Stephane Maag, Ana R. Cavalli. 1-10 [doi]
- ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware FamiliesYang Zhong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura. 11-20 [doi]
- Verifying Access Control Properties with Design by Contract: Framework and Lessons LearnedCarlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr. 21-26 [doi]
- Mining Test Oracles for Test Inputs Generated from Java BytecodeWeifeng Xu, Tao Ding, Hanlin Wang, Dianxiang Xu. 27-32 [doi]
- CLINEX: An Inter-node Cross-Layer Cooperation Architecture to Adapt to Dynamically Changing Network SituationKazuma Yonemura, Kunitake Kaneko, Fumio Teraoka. 33-42 [doi]
- GenRe: A General Replication Scheme over an Abstraction of DHTsJingtao Li, Jie Zhang, Zhen Cao, Wengang Pei. 43-52 [doi]
- Modeling and Analysis of Multi-version Concurrent ControlChao Luo, Hiroyuki Okamura, Tadashi Dohi. 53-58 [doi]
- Fuzzy c-Means Clustering Based Polarization Assessment in Intelligent Argumentation System for Collaborative Decision SupportRavi Santosh Arvapally, Xiaoqing (Frank) Liu, Donald C. Wunsch II. 59-64 [doi]
- Dynamical Re-striping Data on Storage Servers in Parallel File SystemsJianwei Liao, Xiaoyan Liu, Yingshen Chen. 65-73 [doi]
- Nested Pattern Queries Processing Optimization over Multi-dimensional Event StreamsFuyuan Xiao, Masayoshi Aritsugi. 74-83 [doi]
- Parallelizing Probabilistic Streaming Skyline Operator in Cloud Computing EnvironmentsXiaoyong Li, Yijie Wang, Xiaoling Li, Yuan Wang, Rubing Huang. 84-89 [doi]
- A Device Specification Method Using Doppler Effect of Acoustic WavesYasutaka Nishimura, Kiyohito Yoshihara. 90-99 [doi]
- Agent Redeployment and Missing Data Regathering in Mobile Wireless Sensor NetworksKazuya Matsuo, Keisuke Goto, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 100-109 [doi]
- RSSI Based Indoor Localization for Smartphone Using Fixed and Mobile Wireless NodeM. Osman Gani, Casey O'Brien, Sheikh Iqbal Ahamed, Roger O. Smith. 110-117 [doi]
- Assisted Human-in-the-Loop Adaptation of Web Pages for Mobile DevicesChenjie Wei, Heesung Lee, Luke Molnar, Michael Herold, Rajiv Ramnath, Jay Ramanathan. 118-123 [doi]
- A Relationship-Based VM Placement Framework of Cloud EnvironmentXiaodong Zhang 0001, Ying Zhang, Xing Chen, Kai Liu, Gang Huang 0001, Jianfeng Zhan. 124-133 [doi]
- Cloud Client Prediction Models Using Machine Learning TechniquesSamuel A. Ajila, Akindele A. Bankole. 134-142 [doi]
- A Mashup-Based Approach for Virtual SDN ManagementOscar Mauricio Caicedo Rendon, Felipe Estrada Solano, Lisandro Zambenedetti Granville. 143-152 [doi]
- Image Encryption Based on Fuzzy Synchronization of Chaos SystemsChao-Lin Kuo, Lung-Chuan Huang, Shun-Jih Wang, Jui-Sheng Lin, Cheng Chi Wang, Jun-Juh Yan. 153-154 [doi]
- Inferring Directed Static Networks of Influence from Undirected Temporal NetworksTaro Takaguchi, Nobuo Sato, Kazuo Yano, Naoki Masuda. 155-156 [doi]
- Speed Control for Permanent Magnet Synchronous Motor System via Quasi-sliding Mode ControlHsin-Chieh Chen, Yi-You Hou, Meei-Ling Hung, Zhang-Lin Wan. 157-158 [doi]
- Maximum Power Tracking Controller for a Wind-Driven Permanent-Magnet Synchronous Generator: Using an Approach of Chaos SynchronizationJian Liung Chen, Chia-Hung Lin, Bo-Wun Gu, Ming-Jyi Jang. 159-160 [doi]
- Support Vector Machine-Based Fuzzy Inference Systems for Service Restoration Strategy in Micro-distribution SystemsWhei-Min Lin, Chia-Sheng Tu, Chia-Hung Lin. 161-162 [doi]
- Data Hiding Technique by Ternary Hamming CodesJyun-Jie Wang, Hong-Da Chen, Ting-Ya Yang, Houshou Chen, Chi-Yuan Lin. 163-164 [doi]
- SoR-Based Programmable Network for Future Software-Defined NetworkKenichi Takagiwa, Shinichi Ishida, Hiroaki Nishi. 165-166 [doi]
- Autonomous Data Transmission Using Off-Peak Hours for Cellular-Based M2M CommunicationsTakeshi Kitahara, Yasuhiko Hiehata, Hideyuki Koto, Norihiro Fukumoto, Hajime Nakamura, Shigehiro Ano. 167-168 [doi]
- Adaptive Test-Case Prioritization Guided by Output InspectionDan Hao, Xu Zhao, Lu Zhang 0023. 169-179 [doi]
- Evaluation and Analysis of Spectrum-Based Fault Localization with Modified Similarity Coefficients for Software DebuggingYi-Sian You, Chin-Yu Huang, Kuan-Li Peng, Chao Jung Hsu. 180-189 [doi]
- Bypassing Code Coverage Approximation Limitations via Effective Input-Based Randomized Test Case PrioritizationBo Jiang, W. K. Chan. 190-199 [doi]
- Solving the Distributed Trigger Counting Problem without Any Global AssumptionChe-Cheng Chang, Jichiang Tsai. 200-207 [doi]
- HACCS: Home Appliance Control Concierge System: Extending Functions on Web ServiceTomoki Watanabe, Rika Mochizuki, Toru Kobayashi, Masao Isshiki. 208-213 [doi]
- PROMIS: A Management Platform for Software Supply Networks Based on the Linked Data and OSLCMikio Aoyama, Kazuo Yabuta, Tsutomu Kamimura, Souichi Inomata, Toshiya Chiba, Takashi Niwa, Koji Sakata. 214-219 [doi]
- Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing NetworkHiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe. 220-225 [doi]
- Recursive Segmentation Procedure Based on the Akaike Information Criterion TestAki-Hiro Sato. 226-233 [doi]
- Further Theoretical Contributions to a Privacy Preserving Distributed OLAP FrameworkAlfredo Cuzzocrea, Elisa Bertino. 234-239 [doi]
- pLSM: A Highly Efficient LSM-Tree Index Supporting Real-Time Big Data AnalysisJin Wang, Yong Zhang, Yang Gao, Chunxiao Xing. 240-245 [doi]
- Generalized Logit Regression-Based Software Reliability Modeling with Metrics DataDaisuke Kuwa, Tadashi Dohi. 246-255 [doi]
- A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection ApproachLei Liu, Jing Xu, Minglei Li, Jufeng Yang. 256-261 [doi]
- A Rigorous and Comprehensive Analysis of Effort for Modeling Aspect State Machines: Results from a Series of Controlled ExperimentsShaukat Ali, Tao Yue. 262-267 [doi]
- Toward Practical Software Reliability Assessment with Change-Point Based on Hazard Rate ModelsShinji Inoue, Shiho Hayashida, Shigeru Yamada. 268-273 [doi]
- Interaction Physical-Activity Housekeeper for Silver-Haired Citizen Using Wireless Sensor and Mobile Healthcare iPhoneChia-Hung Lin, Chun-Chao Wang, Jian Liung Chen, Yi-Pin Kuo, Wei-Ling Chen, Che-Wei Chang. 274-275 [doi]
- Design and Implementation of the Dual-Axis Solar Tracking SystemTung-Sheng Zhan, Whei-Min Lin, Ming-Huang Tsai, Guo-Shiang Wang. 276-277 [doi]
- Integrating SVM Classifier and Distribution State Estimation for Detection and Identification of AMI Customer's Meter DataShi-Jaw Chen, Chia-Hung Lin. 278-279 [doi]
- Logical Analysis of Weighted Social Networks - An Extended AbstractTuan-Fang Fan, Churn-Jung Liau. 280-281 [doi]
- The Relationships among Presentation Mode, Product Type, Consumers' Product Knowledge, and Consumers' Purchase Intention in the E-Commerce EnvironmentYu-Min Wang, Yi-Shun Wang, Ching-Hsuan Yeh, Min-Quan Xie. 282-283 [doi]
- A Framework for Dynamic Context-Awarable User Interfaces of the Second Screen Devices in a Home Network EnvironmentJae Won Moon, Tae-Beom Lim, Kyung Won Kim, Seung-woo Kum, Myunghyun Yoon, Kwangsu Cho. 284-285 [doi]
- Automatic Redemption of Free Parking in Shopping MallsChi-Lok Tsang, Yiu-Wing Leung. 286-287 [doi]
- A Practical Behavior Analysis of Video Application Users on Smart PhonesNorihiro Fukumoto, Shigehiro Ano, Shigeki Goto. 288-289 [doi]
- Junosphere: Towards Professional Networks EducationMaria Salama, Ahmed Shawish. 290-291 [doi]
- Automated Transformation of Template-Based Web Applications into Single-Page ApplicationsJaewon Oh, Woo Hyun Ahn, Seungho Jeong, Jinsoo Lim, Taegong Kim. 292-302 [doi]
- Popularity, Interoperability, and Impact of Programming Languages in 100, 000 Open Source ProjectsTegawendé F. Bissyandé, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère. 303-312 [doi]
- Optimization of Object Queries on Collections Using Annotations for the String Valued AttributesVenkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert. 313-318 [doi]
- S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection SystemsChris Strasburg, Samik Basu, Johnny S. Wong. 319-328 [doi]
- ProViNet - An Open Platform for Programmable Virtual Network ManagementWanderson Paim de Jesus, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville. 329-338 [doi]
- A Portable Method for Improving Available Bandwidth of PC ClusterTakafumi Fukunaga. 339-348 [doi]
- Clustering of Similar Malware Behavior via Structural Host-Sequence ComparisonHorng-Tzer Wang, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee. 349-358 [doi]
- Efficient General Policy Decision by Using Mutable Variable Aware CacheLiangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang. 359-368 [doi]
- A Multiple Security Domain Model of a Drive-by-Wire SystemGerry Howser, Bruce McMillin. 369-374 [doi]
- EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web PagesBirhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine. 375-380 [doi]
- Ontology-Based Classification of Non-functional Requirements in Software Specifications: A New Corpus and SVM-Based ClassifierAbderahman Rashwan, Olga Ormandjieva, René Witte. 381-386 [doi]
- Domain Hyponymy Hierarchy Discovery by Iterative Web Searching and Inferable Semantics Based Concept SelectingLili Mou, Ge Li, Zhi Jin. 387-392 [doi]
- Semantic-Enabled Clone DetectionIman Keivanloo, Juergen Rilling. 393-398 [doi]
- Distributed Coordination of IoT-Based Services by Using a Graph Coloring AlgorithmJang-Ho Choi, Jae-Hyun Cho, Han-Gyu Ko, In-Young Ko. 399-404 [doi]
- The ReqWiki Approach for Collaborative Software Requirements Engineering with Integrated Text Analysis SupportBahar Sateli, Elian Angius, René Witte. 405-414 [doi]
- Finding Optimal Solution for Satisficing Non-functional Requirements via 0-1 ProgrammingBin Yin, Zhi Jin, Wei Zhang, Haiyan Zhao, Bo Wei. 415-424 [doi]
- Evaluation of Ontology-Based Checking of Software Requirements SpecificationDang Viet Dzung, Atsushi Ohnishi. 425-430 [doi]
- Deriving Requirements Specification with Time: A Software Environment Ontology Based ApproachXiaohong Chen, Ronghua Ye, Haiying Sun, Hong Lu. 431-436 [doi]
- Software Requirements Elicitation - A Controlled Experiment to Measure the Impact of a Native Natural LanguageSajjad Mahmood, Samuel A. Ajila. 437-442 [doi]
- Timing Synchronization of ZigBee Sensor Network for Ecology ObservationAtsushi Morikawa, Hiroshi Yamamoto, Katsuyuki Yamazaki. 443-446 [doi]
- Using Autonomous Air Vehicle in DTN Sensor Network for Environmental ObservationPhuong Tran Thi Ha, Hiroshi Yamamoto, Katsuyuki Yamazaki. 447-450 [doi]
- Realtime Guidance System in Hospital Using PHS and Android DeviceRyoji Aoki, Hiroshi Yamamoto, Kei-ichi Iguchi, Katsuyuki Yamazaki. 451-454 [doi]
- Browser Synchronization System for Supporting Elderly People and IT ShortfallsNaoya Hongo, Hiroshi Yamamoto, Katsuyuki Yamazaki. 455-458 [doi]
- Congestion Detection in Mobile Network towards Complex Event ProcessingTatsuya Takahashi, Hiroshi Yamamoto, Norihiro Fukumoto, Shigehiro Ano, Katsuyuki Yamazaki. 459-462 [doi]
- Data Management and User Interface for a Call for Paper ManagerLaurent Issertial, Hiroshi Tsuji. 463-466 [doi]
- Enhancing Control Model to Ease Off Centralized Control of Flow-Based SDNsOthman M. M. Othman, Koji Okamura. 467-470 [doi]
- Multiple Home Agent Placement Considerations Based on Internet Service Provider Perspective in MobileIPv6H. R. O. E. Dayaratna, K. Kaneko, F. Teraoka. 471-474 [doi]
- OpenFlow Network Visualization Software with Flow Control InterfaceYasuhiro Watashiba, Seiichiro Hirabara, Susumu Date, Hirotake Abe, Kohei Ichikawa, Yoshiyuki Kido, Shinji Shimojo, Haruo Takemura. 475-477 [doi]
- Software Assurance: What Should We Do Next?Mohammad Zulkernine. 478 [doi]
- Big Data - Opportunities and Challenges Panel Position PaperElisa Bertino. 479-480 [doi]
- Analytics over Big Data: Exploring the Convergence of DataWarehousing, OLAP and Data-Intensive Cloud InfrastructuresAlfredo Cuzzocrea. 481-483 [doi]
- A Replicated Study on Random Test Case Generation and Manual Unit Testing: How Many Bugs Do Professional Developers Find?Rudolf Ramler, Klaus Wolfmaier, Theodorich Kopetzky. 484-491 [doi]
- Expose: Discovering Potential Binary Code Re-useBeng Heng Ng, Atul Prakash. 492-501 [doi]
- Prioritizing Variable-Strength Covering ArrayRubing Huang, Jinfu Chen, Tao Zhang, Rongcun Wang, Yansheng Lu. 502-511 [doi]
- Formal Modelling of PLC Systems by BIP ComponentsRui Wang, Yong Guan, Liming Luo, Xiaoyu Song, Jie Zhang. 512-518 [doi]
- Interactive Verification of Safety-Critical SoftwareDaniela Carneiro da Cruz, Pedro Rangel Henriques, Jorge Sousa Pinto. 519-528 [doi]
- Modeling and Optimizing Resource Scheduling for Service Composition Based on Queuing Petri NetsGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 529-538 [doi]
- Cyber/Physical Co-verification for Developing Reliable Cyber-physical SystemsYu Zhang, Fei Xie, Yunwei Dong, Xingshe Zhou, Chunyan Ma. 539-548 [doi]
- Verification and Implementation of the Protocol Standard in Train Control SystemYu Jiang, Hehua Zhang, Xiaoyu Song, William N. N. Hung, Ming Gu, Jiaguang Sun. 549-558 [doi]
- File-Based Memory Management for Non-volatile Main MemoryShuichi Oikawa, Satoshi Miki. 559-568 [doi]
- Component-Based Modeling and Code Synthesis for Cyclic ProgramsMin Zhou, Hai Wan, Chen Su, Liangze Yin, Lianyi Zhang, Fei He, Ming Gu. 569-578 [doi]
- From Sub-patterns to Patterns: An Approach to the Detection of Structural Design Pattern Instances by Subgraph Mining and MergingDongjin Yu, Yanyan Zhang, Jianlin Ge, Wei Wu. 579-588 [doi]
- DBPowder: A Flexible Object-Relational Mapping Framework Based on a Conceptual ModelTadashi Murakami, Toshiyuki Amagasa, Hiroyuki Kitagawa. 589-598 [doi]
- Conversation Characteristics during Pair Work in Computer Literacy EducationKimiko Uchida, Yoshihiko Oya, Takashi Okuda. 599-600 [doi]
- Evaluation of Software Architectures Reliability Based on Hypergraph GrammarXu Li, Linpeng Huang. 601-602 [doi]
- Supporting Keyword Selection in Generating Earth Science MetadataToshiyuki Shimizu, Tomo Sueki, Masatoshi Yoshikawa. 603-604 [doi]
- Describing Component Behavior Using Improved Chemical Abstract MachineJinfu Chen, Qing Li, Huanhuan Wang, Rubing Huang. 605-606 [doi]
- Development of Model Checker of Dynamic Linear Hybrid AutomataRyo Yanase, Tatsunori Sakai, Makoto Sakai, Satoshi Yamane. 607-608 [doi]
- An If-While-If Model-Based Performance Evaluation of Ranking Metrics for Spectra-Based Fault LocalizationChunyan Ma, Tian Tan, Yibo Chen, Yunwei Dong. 609-618 [doi]
- Testing versus Static Analysis of Maximum Stack SizeMahdi Eslamimehr, Jens Palsberg. 619-626 [doi]
- On the Gain of Measuring Test Case PrioritizationJunpeng Lv, Bei-Bei Yin, Kai-Yuan Cai. 627-632 [doi]
- Isolating and Understanding Program Errors Using Probabilistic Dispute ModelRong Chen, Yaqing Liu, Zhichun Jia, Jian Gao. 633-638 [doi]
- Towards Formal Verification of a Commercial Wireless Router FirmwareZheng Lu, Christopher Steinmuller, Supratik Mukhopadhyay. 639-647 [doi]
- A Divide and Conquer Approach to Model Checking of Liveness PropertiesKazuhiro Ogata, Min Zhang 0002. 648-657 [doi]
- Formalising Middleware Systems: A Design Pattern-Based ApproachNelson Souto Rosa. 658-667 [doi]
- Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSsJingtao Li, Chao Zhong, Zhen Cao, Wengang Pei, Xi Zhou. 668-677 [doi]
- Implementation Considerations in Enabling Visually Impaired Musicians to Read Sheet Music Using a TabletLaura Housley, Thomas Lynch, Rajiv Ramnath, Peter F. Rogers, Jayashree Ramanathan. 678-683 [doi]
- Delineato: A Diagramming User Interface Designed Using a "What You Get is What You Need" ApproachPedro Campos, Fernando Miguel Campos, João Pestana. 684-689 [doi]
- Toward Collective Intelligence for Fighting ObesityIvor D. Addo, Sheikh Iqbal Ahamed, William C. Chu. 690-695 [doi]
- A Software Architecture for High-Level Development of Component-Based Distributed Virtual Reality SystemsVasily Y. Kharitonov. 696-705 [doi]
- Supporting Integration of COTS Components from a Perspective of Self-Adaptive Software ArchitectureShan Tang, Qiang Liu. 706-713 [doi]
- The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics TechnologyMasaki Fujikawa, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda. 714-715 [doi]
- Promising XMPP Based Applications for Military and Defense SystemsOral Gurel, Mehmet Ulas Cakir. 716-717 [doi]
- A Market-in-Market Collaborative Model towards Application MarketplacesShih-Fang Chang. 718-719 [doi]
- Application of the 0-1 Programming Model for Cost-Effective Regression TestHirohisa Aman, Manami Sasaki, Kei Kureishi, Hideto Ogasawara. 720-721 [doi]
- Test Strategies Using Operational Profiles Based on Decision TablesTomohiko Takagi, Zengo Furukawa, Yoshinobu Machida. 722-723 [doi]
- SQAF-DS: A Software Quality Assessment Framework for Dependable SystemsJunbeom Yoo, Sanghyun Yoon. 724-725 [doi]
- Support System for Software Development Exercise that Utilizes Activity Data Collected in Real Time from the Development EnvironmentTakafumi Tanaka, Kazuki Mori, Hiroaki Hashiura, Atsuo Hazeyama, Seiichi Komiya. 726-727 [doi]
- On Simplifying Mobile Mashup Application DevelopmentGuan-Zhong Wu, Chen-Che Huang, Yui-Chey Teng, Jiun-Long Huang, Wei-Chih Ting, Yi-Yu Su, Pin-Chuan Liu. 728-729 [doi]
- A Dynamic Countermeasure Method to Android Malware by User ApprovalMakoto Kato, Saeko Matsuura. 730-731 [doi]
- Through the Internet of Things - A Management by Delegation Smart Object Aware System (MbDSAS)Marcelo Antonio Marotta, Felipe Jose Carbone, Jose Jair Cardoso de Santanna, Liane Margarida Rockenbach Tarouco. 732-741 [doi]
- A Hexagonal Coverage LED-ID Indoor Positioning Based on TDOA with Extended Kalman FilterAttaphongse Taparugssanagorn, Siwaruk Siwamogsatham, Carlos A. Pomalaza-Raez. 742-747 [doi]
- A IoT Application of Safe Building in IPv6 Network EnvironmentTseng-Yi Chen, Hsin-Wen Wei, Nien-I. Hsu, Wei Kuan Shih. 748-753 [doi]
- A Scalable and High-efficiency Discovery Service Using a New StorageMinbo Li, Zhu Zhu, Guangyu Chen. 754-759 [doi]
- Stability of a Cyber-physical Smart Grid System Using Cooperating InvariantsAshish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball, Maciej J. Zawodniok, Bruce M. McMillin, Sriram Chellappan. 760-769 [doi]
- QTime: A Queuing-Time Notification System Based on Participatory Sensing DataYasha Wang, Jiangtao Wang, Xiaoyu Zhang. 770-777 [doi]
- A Perspective on Computer-Based Training, CBTTakafumi Yoshida. 778-783 [doi]
- Building a Body of Knowledge on Model Checking for Software DevelopmentKenji Taguchi 0001, Hideaki Nishihara, Toshiaki Aoki, Fumihiro Kumeno, Koji Hayamizu, Koichi Shinozaki. 784-789 [doi]
- Industrial Experiences of Organizing a Hackathon to Assess a Device-centric Cloud EcosystemMikko Raatikainen, Marko Komssi, Vittorio dal Bianco, Klas Kindstom, Janne Järvinen. 790-799 [doi]
- Breeze/ADL: Graph Grammar Support for an XML-Based Software Architecture Description LanguageChen Li, Linpeng Huang, Luxi Chen, Chengyuan Yu. 800-805 [doi]
- Software Architecture Decomposition Using Clustering TechniquesAbdulaziz Alkhalid, Chung-Horng Lung, Duo Liu, Samuel Ajila. 806-811 [doi]
- Analysis of the Key Factors for Software Quality in Crowdsourcing Development: An Empirical Study on TopCoder.comKe Li, Junchao Xiao, Yongji Wang, Qing Wang. 812-817 [doi]
- A Scalable DTN Routing Protocol for an Infra-less Communication SystemKazumine Ogura, Hirofumi Ueda, Norihito Fujita. 818-819 [doi]
- A Retrospection on Building a Custom Tool for Automated System TestingRudolf Ramler, Werner Putschögl. 820-821 [doi]
- Fault-Tolerant Wireless LAN Roaming System Using Client CertificatesShunichi Kinoshita, Toshiki Watanabe, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone. 822-823 [doi]
- CASAT-HOOMT: Computer Aided Software Analysis Tool Based on High Order Object-Oriented Modeling TechniqueFan Zhang, Jinwu Wang, Xiaoqing (Frank) Liu, Buqing Cao, Mingdong Tang. 824-825 [doi]
- Towards Optimal Disaster Recovery in Backbone NetworksKien Nguyen, Quang Tran Minh, Shigeki Yamada. 826-827 [doi]
- Empirical Effectiveness Evaluation of Spectra-Based Fault Localization on Automated Program RepairYuhua Qi, Xiaoguang Mao, Yan Lei, Ziying Dai, YuDong Qi, Chengsong Wang. 828-829 [doi]
- Potential Semantics in Multi-modal Relevance Feedback Information for Image RetrievalJiyi Li, Qiang Ma 0001, Yasuhito Asano, Masatoshi Yoshikawa. 830-831 [doi]
- UML based Security Function Policy Verification Method for Requirements SpecificationAtsushi Noro, Saeko Matsuura. 832-833 [doi]
- Determining Appropriate IT Systems Design Based on System ModelsSayaka Izukura, Kazuo Yanoo, Hiroshi Sakaki, Masato Kawatsu. 834-835 [doi]