Abstract is missing.
- From Embedded Systems to Cyber-Physical Systems: Research Challenges and Application AreasReinhold Achatz. 1 [doi]
- Embracing Uncertainty: The New Machine LearningChris Bishop. 2 [doi]
- Joint COMPSAC/SAINT 2011 Panel: International Perspectiveson Computed World: Software Beyond the Digital SocietyStephen S. Yau. 3 [doi]
- An Adaptive Performance Modeling Approach to Performance Profiling of Multi-service Web ApplicationsXiang Huang, Wei Wang 0049, Wenbo Zhang, Jun Wei, Tao Huang. 4-13 [doi]
- A Semantic Similarity Measure between Web Services Based on Google DistanceHuirong Yang, Pengbin Fu, Baocai Yin, Mengduo Ma, Yanyan Tang. 14-19 [doi]
- An Intelligent Broker Approach to Semantics-Based Service CompositionYufeng Zhang, Hong Zhu. 20-25 [doi]
- The Emerging Web of Social MachinesSilvio R. L. Meira, Vanilson Arruda Burégio, Leandro Marques Nascimento, Elaine G. M. de Figueiredo, Misael Neto, Bruno P. Encarnação, Vinicius Cardoso Garcia. 26-27 [doi]
- Confidentiality Preserving Security Properties for Cyber-Physical SystemsThoshitha T. Gamage, Thomas P. Roth, Bruce M. McMillin. 28-37 [doi]
- Bench4Q: A QoS-Oriented E-Commerce BenchmarkWenbo Zhang, Sa Wang, Wei Wang 0049, Hua Zhong. 38-47 [doi]
- P3D - Privacy-Preserving Path Discovery in Decentralized Online Social NetworksMingqiang Xue, Barbara Carminati, Elena Ferrari. 48-57 [doi]
- Precise Propagation of Fault-Failure Correlations in Program Flow GraphsZhenyu Zhang, W. K. Chan, T. H. Tse, Bo Jiang. 58-67 [doi]
- An Analysis of Failure-Based Test Profiles for Random TestingRobert G. Merkel, Fei-Ching Kuo, Tsong Yueh Chen. 68-75 [doi]
- Testing Tasks Management in Testing Cloud EnvironmentLian Yu, Xiaohu Li, Zhongjie Li. 76-85 [doi]
- A Management Tool for the Replication of Operating Systems in Wireless Communication NetworksLuis G. Crepaldi, Adriano R. Digiere, Roberta Spolon Ulson, Marcos Antonio Cavenaghi, Renata Spolon Lobato. 86-92 [doi]
- A DSML for Coordinating User-Centric Communication ServicesYali Wu, Frank Hernandez, Peter J. Clarke, Robert B. France. 93-102 [doi]
- On Extracting Perception-Based Features for Effective Similar Shader RetreivalMin-Hee Jang, Si-Yong Lee, Sang-Wook Kim, Myung-Cheol Roh, Jae-Ho Lee, Seung-Woo Nam. 103-107 [doi]
- Ant Colony Optimization for Deadlock Detection in Concurrent SystemsGianpiero Francesca, Antonella Santone, Gigliola Vaglini, Maria Luisa Villani. 108-117 [doi]
- A Formal Semantics of PLC Programs in CoqSidi Ould Biha. 118-127 [doi]
- An Abstraction Method for Mobility and Interaction in Process Algebra Using Behavior OntologySujeong Woo, Jinho On, Moonkun Lee. 128-133 [doi]
- Spoken Interaction within the Computed World: Evaluation of a Multitasking Adaptive Spoken Dialogue SystemTobias Heinroth, Dan Denich. 134-143 [doi]
- Assessing Web Site Usability in Retail Electronic CommerceCharles E. Downing, Chang Liu. 144-151 [doi]
- Spoken Dialogue System for Learning BrailleMasahiro Araki, Kana Shibahara, Yuko Mizukami. 152-156 [doi]
- Semi-automation of Configuration Files Generation for Heterogeneous Multi-tile SystemsAlexandre Chagoya-Garzon, Nicolas Poste, Frédéric Rousseau. 157-166 [doi]
- Adaptive Bandwidth-Based Thread Group Scheduler for Compositional Real-Time Middleware ArchitecturesJagun Kwon, Stephen Hailes. 167-175 [doi]
- A Concept for Secure Production Programming of Embedded Industrial Field DevicesJimmy Kjellsson, Martin Törngren. 176-181 [doi]
- Multi-node Network Based Control and Data Acquisition System for a VHF Radar Depth SounderChris Prokopiak, Carl Leuschen, Fernando Rodriguez-Morales, John R. Ledford, William A. Blake, Anthony Hoch, Hilary Barbour. 182-183 [doi]
- Combining Dynamic Program Viewing and Testing in Early Computing CoursesJames H. Cross II, T. Dean Hendrix, Larry A. Barowski. 184-192 [doi]
- Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational InitiativesNancy R. Mead, Linda M. Laird, Daniel Shoemaker. 193-198 [doi]
- Interactive Real-Time Embedded Systems Education Infused with Applied Internet TelephonyKyle Persohn, Dennis Brylow. 199-204 [doi]
- An Approach to Model-Based Development of Context-Aware Adaptive SystemsMahmoud Hussein, Jun Han, Alan W. Colman. 205-214 [doi]
- SPEM Extension with Software Process Architectural ConceptsFadila Aoussat, Mourad Oussalah, Mohamed Ahmed-Nacer. 215-223 [doi]
- An AADL-Based Modeling Method for ARINC653-Based Avionics SoftwareYing Wang, Dianfu Ma, Yongwang Zhao, Lu Zou, Xianqi Zhao. 224-229 [doi]
- Fine-Grained Configuration Management for Collaborative Ontology DevelopmentTao Yang, Yijian Wu, Xin Peng, Wenyun Zhao. 230-238 [doi]
- Diagnosis of Software Models with Multiple Levels of Abstraction Using Ontological MetamodelingNophadol Jekjantuk, Jeff Z. Pan, Yuzhong Qu. 239-244 [doi]
- Managing Web Content Using Linked Data Principles - Combining Semantic Structure with Dynamic Content SyndicationNorman Heino, Sebastian Tramp, Sören Auer. 245-250 [doi]
- Quality Validation through Pattern Detection - A Semantic Web PerspectiveDavid Walsh, Philipp Schügerl, Juergen Rilling, Philippe Charland. 251-252 [doi]
- Model Checking Aspectual Pervasive Software ServicesDhaminda B. Abeywickrama, Sita Ramakrishnan. 253-262 [doi]
- PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc NetworkAnna Cinzia Squicciarini, Dan Lin, Alessandro Mancarella. 263-272 [doi]
- Supporting Dynamic Service Updates in Pervasive ApplicationsJun-Qing Chen, Linpeng Huang. 273-278 [doi]
- 24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable KnowledgeRicardo Jorge Santos, Jorge Bernardino, Marco Vieira. 279-288 [doi]
- A Framework for Access Control with Inference ConstraintsVasilios Katos, Dimitris Vrakas, Panagiotis Katsaros. 289-297 [doi]
- L1 - An Intermediate Language for Mixed-Protocol Secure ComputationAxel Schröpfer, Florian Kerschbaum, Guenter Mueller. 298-307 [doi]
- A Framework for Multi-layered Requirements Documentation and AnalysisMichel dos Santos Soares, Jos L. M. Vrancken. 308-313 [doi]
- Security Requirements Engineering in the Wild: A Survey of Common PracticesGolnaz Elahi, Eric S. K. Yu, Tong Li 0001, Lin Liu 0001. 314-319 [doi]
- Similarity Based Distributed Context Reasoning with Layer Context ModelingChun Kyung Lee, Thi Hien Pham, Hee-seong Kim, Hee Yong Youn. 320-325 [doi]
- AGORAS: Exploring Creative Learning on Tangible User InterfacesAlejandro Catalá, Javier Jaén Martínez, Adria A. Martinez-Villaronga, José A. Mocholí. 326-335 [doi]
- Palimpsests of Time and PlaceJerry Fishenden, Andrew Hugill. 336-345 [doi]
- Design and Evaluation of Social Interfaces for Cultural Exhibitions of Chinese Shadow PuppetryTin-Kai Chen, Hsiao-Ping Fang, Yingchun Tian, Hsiao-Lin Fang, Yan-Jie Li, Shih-Hsuan Tseng, Su-En Miao. 346-347 [doi]
- Ontology-Based Reliability Evaluation for Web ServiceXifeng Wang, Bixin Li, Li Liao, Chunli Xie. 348-349 [doi]
- Reliability and Accuracy of the Estimation Process - Wideband Delphi vs. Wisdom of CrowdsMarek Grzegorz Stochel. 350-359 [doi]
- Quality Model Driven Dynamic AnalysisP. V. R. Murthy, Saravana Kumar V., Tushar Sharma, Kiron Rao. 360-365 [doi]
- Software Reliability Prediction for Open Source Software Adoption Systems Based on Early Lifecycle MeasurementsWangbong Lee, Joon-Kyung Lee, Jongmoon Baik. 366-371 [doi]
- Privacy in the CloudKenji Takahashi. 372 [doi]
- Software Infrastructure for Delivering and Supporting Distributed Applications Enhanced with AwarenessMontserrat Sendín, Juan Miguel López. 373-382 [doi]
- Semantics Based Cohesion and Coupling Metrics for Evaluating Understandability of State DiagramsJung Ho Bae, Yeon Ji Jeong, Heung Seok Chae, Carl K. Chang. 383-392 [doi]
- CALIGRAPHI - Creation of Adaptive Dialogues Using a Graphical InterfaceGregor Bertrand, Florian Nothdurft, Frank Honold, Felix Schüssel. 393-400 [doi]
- Dynamic Request Management Algorithms for Web-Based Services in Cloud ComputingRiccardo Lancellotti, Mauro Andreolini, Claudia Canali, Michele Colajanni. 401-406 [doi]
- JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time HeapPatrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu. 407-412 [doi]
- MasterBlaster: Identifying Influential Players in Botnet TransactionsNapoleon Paxton, Gail-Joon Ahn, Mohamed Shehab. 413-419 [doi]
- Distributed Java-Based Content ProtectionSmitha Sundareswaran, Anna Cinzia Squicciarini, Ranjani Sundareswaran. 420-425 [doi]
- Towards More Effective Spectrum Use Based on Memory Allocation ModelsJohn Meier, Christopher Gill, Roger D. Chamberlain. 426-435 [doi]
- Software-Based Analysis of the Effects of Electrostatic Discharge on Embedded SystemsPratik Maheshwari, Tianqi Li, Jong Sung Lee, Byong-Su Seol, Sahra Sedigh, David Pommerenke. 436-441 [doi]
- Enhancing Performance of NoC-Based Architectures Using Heuristic Virtual-Channel Sharing ApproachKhalid Latif 0002, Amir-Mohammad Rahmani, Kameswar Rao Vaddina, Tiberiu Seceleanu, Pasi Liljeberg, Hannu Tenhunen. 442-447 [doi]
- Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives - Panel IntroductionCristina Cerschi Seceleanu. 448-449 [doi]
- Formal Methods Applied in Industry - On the Commercialisation of the UPPAAL ToolPaul Pettersson. 450-451 [doi]
- Formal Methods in the Era of Service-Oriented DesignTiziana Margaria. 452-453 [doi]
- From Solution to Problem Spaces: Formal Methods in the Context of Model-Based Development and Domain-Specific LanguagesBernhard Schätz. 454-455 [doi]
- Conformance Checking with Constraint Logic Programming: The Case of Feature ModelsRaúl Mazo, Roberto Erick Lopez-Herrejon, Camille Salinesi, Daniel Diaz, Alexander Egyed. 456-465 [doi]
- A Semi-automated Decision Support Tool for Requirements Trade-Off AnalysisGolnaz Elahi, Eric Yu. 466-475 [doi]
- Eliciting Considerable Requirements with Word and Customer GraphsDaichi Kimura, Tomohisa Gotoh, Ken'ichi Ikeda. 476-485 [doi]
- Reasoning about Global Clones: Scalable Semantic Clone DetectionPhilipp Schügerl, Juergen Rilling, Philippe Charland. 486-491 [doi]
- Dynamic Software Visualization with BusyBorg - A Proof of ConceptHenning Femmer, Nora Broy, Marin Zec, Asa MacWilliams, Roland Eckl. 492-497 [doi]
- An XML C Source Code Interchange Format for CASE ToolsNoritoshi Atsumi, Takashi Kobayashi, Shinichiro Yamamoto, Kiyoshi Agusa. 498-503 [doi]
- Selection and Ordering of Points-of-Interest in Large-Scale Indoor Navigation SystemsMartin Werner. 504-509 [doi]
- Cloudifying User-Created Content for Existing Applications in Mobile DevicesSubhamoy Ghosh, Juha Savolainen, Mikko Raatikainen, Tomi Männistö. 510-515 [doi]
- Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone EnvironmentsUlrich Bareth, Axel Küpper. 516-521 [doi]
- Panel III "Smart Technology" - Applications and InfrastructureSahra Sedigh. 522 [doi]
- On-line Cache Strategy Reconfiguration for Elastic Caching Platform: A Machine Learning ApproachXiulei Qin, Wenbo Zhang, Wei Wang 0049, Jun Wei, Hua Zhong, Tao Huang. 523-534 [doi]
- Automating the Development of Device-Aware Web Services: A Model-Driven ApproachAchilleas Achilleos, Nearchos Paspallis, George A. Papadopoulos. 535-540 [doi]
- A Statistical Approach for Estimating CPU Consumption in Shared Java Middleware ServerWei Wang 0049, Xiang Huang, Yunkui Song, Wenbo Zhang, Jun Wei, Hua Zhong, Tao Huang. 541-546 [doi]
- Analysis of Concept Similarity Methods Applied to an LSH FunctionLuciano Bernardes de Paula, Rodolfo da Silva Villaça, Maurício F. Magalhães. 547-555 [doi]
- Detecting and Resolving Inconsistencies in Ontologies Using Contradiction DerivationsSajjad Hussain, Jos De Roo, Ali Daniyal, Syed Sibte Raza Abidi. 556-561 [doi]
- Application of Semantic Web Services for Mobile Telemedicine Service DiscoveryTara Raafat, Franjo Cecelja. 562-563 [doi]
- A Staged Model for Web Service ReliabilityChunli Xie, Bixin Li, Xifeng Wang. 564-565 [doi]
- Security Monitoring of Components Using Aspects and Contracts in WrappersXiaofeng Yang, Mohammad Zulkernine. 566-575 [doi]
- Towards Training Set Reduction for Bug TriageWeiqin Zou, Yan Hu, Jifeng Xuan, He Jiang. 576-581 [doi]
- Usage-Based Online Testing for Proactive Adaptation of Service-Based ApplicationsOsama Sammodi, Andreas Metzger, Xavier Franch, Marc Oriol, Jordi Marco, Klaus Pohl. 582-587 [doi]
- A Technique of Profiling Selective PathsLulu Wang, Bixin Li. 588-589 [doi]
- A Norm-Based Approach towards Requirements PatternsShokoofeh Ketabchi, Navid Karimi Sani, Kecheng Liu. 590-595 [doi]
- Towards a Unified Goal-Oriented LanguagePedro Patrício, Vasco Amaral, João Araújo 0001, Rui Monteiro. 596-601 [doi]
- Requirements Recovery by Matching Domain Ontology and Program OntologyFeng Chen, Hong Zhou, Hongji Yang, Martin P. Ward, William Cheng-Chung Chu. 602-607 [doi]
- Characterizing the Implementation of Software Non-functional Requirements from Probabilistic PerspectiveBo Wei, Zhi Jin. 608-609 [doi]
- Evaluating an Interactive-Predictive Paradigm on Handwriting Transcription: A Case Study and Lessons LearnedLuis A. Leiva, Verónica Romero, Alejandro Hector Toselli, Enrique Vidal. 610-617 [doi]
- Provenance Based Retrieval: File Retrieval System Using History of Moving and Editing in User ExperienceKeiko Yamamoto, Taku Kuriyama, Haruki Shigemori, Itaru Kuramoto, Yoshihiro Tsujino, Mitsuru Minakuchi. 618-625 [doi]
- Quantifying Usability and Security in AuthenticationMartin Mihajlov, Borka Jerman-Blazic, Saso Josimovski. 626-629 [doi]
- Does "Depth" Really Matter? On the Role of Model Refinement for Testing and ReliabilityFevzi Belli, Nevin Güler, Michael Linschulte. 630-639 [doi]
- Semantic-Based Test OraclesXiaoying Bai, Kejia Hou, Hao Lu, Yao Zhang, Linping Hu, Hong Ye. 640-649 [doi]
- Event-Based Mutation Testing vs. State-Based Mutation Testing - An Experimental ComparisonFevzi Belli, Mutlu Beyazit. 650-655 [doi]
- SoftWare IMmunization (SWIM) - A Combination of Static Analysis and Automatic TestingJ. Jenny Li, John Palframan, Jim Landwehr. 656-661 [doi]
- Impact of Aspect-Oriented Programming on Software Performance: A Case Study of Leader/Followers and Half-Sync/Half-Async ArchitecturesWen-Lin Liu, Chung-Horng Lung, Samuel Ajila. 662-667 [doi]
- Performance Improvement for Collection Operations Using Join Query OptimizationVenkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert. 668-673 [doi]
- Development of CAN-1394 Automotive Gateway System Using Designed Modular Software StackPyungsun Park, Jaeil Jung, Byounghweh Huh. 674-679 [doi]
- An Effective Approach for Automatic Generation of Class Integration Test OrderZhengshan Wang, Bixin Li, Lulu Wang, Qiao Li. 680-681 [doi]
- A Hypervisor for Injecting Scenario-Based Attack EffectsYoshihiro Oyama, Youhei Hoshi. 682-687 [doi]
- Reach Availability Modeling of Replicated ServicesManghui Tu, Dianxiang Xu, Zhonghang Xia, Jicheng Fu. 688-693 [doi]
- Code-Change Impact Analysis Using CounterfactualsManuel Peralta, Supratik Mukhopadhyay. 694-699 [doi]
- Synthesis of Fault Detection Mechanisms TRACK: Real-Time, Embedded and Physical SystemsDominik Sojer. 700-703 [doi]
- Meta Reconfiguration of Adaptive Middleware Using Semantic Web and Context InformationDaniel Corrêa Lobato. 704-707 [doi]
- Onion: A Graphical Language for Process AlgebraJinho On. 708-711 [doi]
- Observable Context-Based User Intention Specification in Context-Aware EnvironmentsHaihua Xie. 712-715 [doi]
- Towards Model-Based Policy Design Methods for More Effective Spectrum AllocationJohn Meier. 716-718 [doi]