Abstract is missing.
- Asian Information HUB Project: NICT's R&D Vsion and Strategies for Universal Communication Technology in the Big Data EraMichiaki Iwazume, Hideaki Fujii, Takahiro Iwase, Hiroshi Haraguchi, Makoto Hijiya. 1-6 [doi]
- Automated Web Service Composition Using Genetic ProgrammingLiyuan Xiao, Carl K. Chang, Hen-I Yang, Kai-Shin Lu, Hsinyi Jiang. 7-12 [doi]
- User's Requirements Driven Services Adaptation and EvolutionZiyan Xu, Haihong Zhao, Lin Liu 0001. 13-19 [doi]
- An Adaptive Quality Level Selection Method for Efficient QoS-Aware Service CompositionJae-Hyun Cho, Jang-Ho Choi, Han-Gyu Ko, In-Young Ko. 20-25 [doi]
- A Novel Solution of Distributed File Storage for Cloud ServiceYu Zhang, Weidong Liu 0001, Jiaxing Song. 26-31 [doi]
- GARSS: A Generic Annotation and Recommendation Service System for Digital RepositoriesXiaodong Huang, Yong Zhang, Chunxiao Xing. 32-37 [doi]
- Material Hub: A Semantic Search Engine with Rule ReasoningSen Ma, Wen Zhao, Shikun Zhang, Hang Zhang. 38-44 [doi]
- Integrated QoS Utility-Based Model for Cloud Computing Service Provider SelectionMaria Salama, Ahmed Shawish, Amir Zeid, Mohamed Kouta. 45-50 [doi]
- Service Level Management for Service Value NetworksFrank Schulz, Wibke Michalk, Markus Hedwig, Marcus McCallister, Christof Momm, Simon Caton, Christian Haas, Daniel Rolli, Monika Tavas. 51-56 [doi]
- Agent-Based Simulation and Its Applications to Service Management: Invited TalkYang Li. 57 [doi]
- Application Architecture to Foster User-Centric Information Discovery and RetrievalToru Kobayashi. 58-63 [doi]
- Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML FederationWataru Oogami, Takaaki Komura, Yasuo Okabe. 64-69 [doi]
- Secure Monitoring for Identity Federations and Distributed SystemsMiguel Macías Enguídanos, Jaime Pérez Crespo. 70-75 [doi]
- Flexible Access Control Framework Considering IdP-Side's Authorization Policy in Roaming EnvironmentToshiki Watanabe, Shunichi Kinoshita, Junichi Yamato, Hideaki Goto, Hideaki Sone. 76-81 [doi]
- Implementation and Evaluation of an OpenFlow-Based Access Control System for Wireless LAN RoamingShunichi Kinoshita, Toshiki Watanabe, Junichi Yamato, Hideaki Goto, Hideaki Sone. 82-87 [doi]
- A Prototype of Network Failure Avoidance Functionality for SAGE Using OpenFlowTomoya Furuichi, Susumu Date, Hiroaki Yamanaka, Kohei Ichikawa, Hirotake Abe, Haruo Takemura, Eiji Kawai. 88-93 [doi]
- Group Management System for Federated Identities with Flow Control of Membership Information by SubjectsTakeshi Nishimura, Motonori Nakamura, Makoto Otani, Kazutsuna Yamaji, Noboru Sonehara. 94-99 [doi]
- Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of AssuranceShigeaki Tanimoto, Shinichi Mizuhara, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai. 100-105 [doi]
- Linked Open Data Aggregation: Conflict Resolution and Aggregate QualityTomas Knap, Jan Michelfeit, Martin Necaský. 106-111 [doi]
- Identification and Utilization of Components for a Linked Open Data PlatformEvanela Lapi, Nikolay Tcholtchev, Louay Bassbouss, Florian Marienfeld, Ina Schieferdecker. 112-115 [doi]
- Sensor Information Fueling Open DataMiquel Oliver, Manuel Palacin, Albert Domingo, Víctor Valls. 116-121 [doi]
- Automated Trust Estimation in Developing Open News Stories: Combining Memento & ProvenanceErik Mannens, Sam Coppens, Ruben Verborgh, Laurence Hauttekeete, Davy Van Deursen, Rik Van de Walle. 122-127 [doi]
- Privacy Preserving Data Publishing for Recommender SystemXiaoqiang Chen, Vincent Huang. 128-133 [doi]
- Attack Vectors to Metering Data in Smart Grids under Security ConstraintsFlorian Skopik, Zhendong Ma. 134-139 [doi]
- Protecting Resources in an Open and Trusted Peer-to-Peer NetworkJean-François Lalande, David Rodriguez. 140-143 [doi]
- Architectural Concepts: Evolution of a Software System across Design and Implementation Stages in Dynamically Changing EnvironmentsBahtijar Vogel, Arianit Kurti, Marcelo Milrad, Tommi Mikkonen. 144-151 [doi]
- A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile EnvironmentsYu Zhou, Xuefeng Yan, Zhiqiu Huang. 152-157 [doi]
- Towards a General Supporting Framework for Self-Adaptive Software SystemsLiangdong Wang, Yang Gao 0001, Chun Cao, Li Wang. 158-163 [doi]
- Learning-Based Multi-controller Coordination for Self-OptimizationRichang Lin, Bihuan Chen, Yi Xie, Xin Peng, Wenyun Zhao. 164-169 [doi]
- Distribution-Aware Mutation AnalysisChang-ai Sun, Guan Wang, Kai-Yuan Cai, Tsong Yueh Chen. 170-175 [doi]
- A Reputation System for Trustworthy QoS Information in Service-Based SystemsJun Lin, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Stephen S. Yau, Dazhi Huang. 176-181 [doi]
- Program Behavior Analysis and Control for Online IDELing Wu, Guangtai Liang, Qianxiang Wang. 182-187 [doi]
- Safe Regression Test Selection Based on Program Dependence GraphsJianchun Xing, Hongda Wang, Wei Song, Qiliang Yang. 188-193 [doi]
- Cloud Log Forensics Metadata AnalysisSean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir. 194-199 [doi]
- Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy ProtectionTakashi Sakuma, Ryôichi Sasaki. 200-205 [doi]
- Software Piracy Forensics: A Proposal for Incorporating Dead Codes and Other Programming Blunders as Important Evidence in AFC TestP. Vinod Bhattathiripad. 206-212 [doi]
- Development of InfoVis Software for Digital ForensicsGrant Osborne, Benjamin Turnbull, Jill Slay. 213-217 [doi]
- A Graphical Language to Integrate Process Algebra and State Machine Views for Specification and Verification of Distributed Real-Time SystemsJinho On, Sujeong Woo, Moonkun Lee. 218-223 [doi]
- A BPEL4WS Extension to Develop and Execute Grid Service Workflow ApplicationYousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fraj, Ahlem Ben Younes. 224-229 [doi]
- A Distributed and Coordinated Massive DDOS Attack Detection and Response ApproachMohamed Karim Aroua, Belhassen Zouari. 230-235 [doi]
- UML AD Refinement Patterns for Modeling Workflow ApplicationsAhlem Ben Younes, Leila Jemni Ben Ayed, Yousra Bendaly Hlaoui. 236-241 [doi]
- An Efficient IPTV Distribution Technique under NAT EnvironmentMing-Huang Chen, Yaw-Chung Chen, Wen-Kang Jia. 242-247 [doi]
- Automatic Generation of an Operational CSP-Z Specification from an Abstract Temporal^Z SpecificationThouraya Gouasmi, Amira Regayeg, Ahmed Hadj Kacem. 248-253 [doi]
- A Semantics-Based Privacy-Aware Approach for Fragmenting Business ProcessesMohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes. 254-259 [doi]
- Evaluating the Extended Refactoring GuidelinesWafa Basit, Fakhar Lodhi, Muhammad Usman Bhatti. 260-265 [doi]
- Quantifying Quality of Software Design to Measure the Impact of RefactoringTushar Sharma. 266-271 [doi]
- Mining Association Rules to Facilitate Structural RecoveryWu Ren. 272-277 [doi]
- Towards Reuse-Based Development for the On-chip Distributed SoC ArchitectureMoazzam Fareed Niazi, Tiberiu Seceleanu, Hannu Tenhunen. 278-283 [doi]
- Performance Comparison of Combined Collaborative Filtering Algorithms for Recommender SystemsDilek Tapucu, Seda Kasap, Fatih Tekbacak. 284-289 [doi]
- Simplifying the Design of Signature Workflow with PatternsHwai-jung Hsu, Ming-Wei Tsai, Feng-Jian Wang. 290-295 [doi]
- A New Cohesion Metric and Restructuring Technique for Object Oriented ParadigmMehmet Kaya, James W. Fawcett. 296-301 [doi]
- Performance Analysis of Reusable Components with Hybrid Modelling of Strategies and Processes: A Real World Case StudySheau Ling Tan, Lin Liu 0001. 302-309 [doi]
- Translation Rules and a Supporting Tool for Model-Based ReuseJunfeng Zhao, Jiantao Zhou, Jing Liu. 310-315 [doi]
- Parallel Software Reuse Driven CPN Model Reduction and Analysis ApproachTao Sun, Xinming Ye, Hongji Yang, Jing Liu. 316-321 [doi]
- A QoS Assurance Middleware Model for Enterprise Cloud ComputingShou-Yu Lee, Dongyang Tang, Tingchao Chen, William Cheng-Chung Chu. 322-327 [doi]
- Towards OWL 2 Natively Supported Fuzzy Cloud OntologyDaren Fang, Xiaodong Liu, Imed Romdhani, Huiqun Zhao. 328-333 [doi]
- SE-EQUAM - An Evolvable Quality MetamodelAseel Hmood, Iman Keivanloo, Juergen Rilling. 334-339 [doi]
- Viewpoints and Issues in Requirements Engineering for ServicesJolita Ralyté. 341-346 [doi]
- A Goal-Oriented Perspective on Approaches to Web Service DiscoverySaïd Assar, Carine Souveyet, Kadan Aljoumaa. 347-352 [doi]
- Software Service Evolution: A Requirements PerspectiveFeng-Lin Li, Lin Liu 0001, John Mylopoulos. 353-358 [doi]
- Representing Non-functional Requirements on Services - A Case StudyClotilde Rohleder. 359-366 [doi]
- Mutual Refinement of Security Requirements and Architecture Using Twin Peaks ModelTakao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka. 367-372 [doi]
- Automated Reasoning with Goal Tree Models for Software Quality RequirementsBo Wei, Zhi Jin, Didar Zowghi, Bin Yin. 373-378 [doi]
- Improving Software Quality Requirements Specifications Using Spectrum AnalysisHaruhiko Kaiya, Atsushi Ohnishi. 379-384 [doi]
- The Concepts and Ontology of SiSL: A Situation-Centric Specification LanguageHaihua Xie, Carl K. Chang, Hua Ming, Kai-Shin Lu. 385-391 [doi]
- A Functional Implementation Approach for Web Services-Based Context-Aware SystemsJianchu Huang, Hongji Yang. 392-397 [doi]
- Requirements Engineering for Service Adaptation and EvolutionLin Liu. 398-402 [doi]
- Modeling of A-Posteriori Access Control in Business ProcessesMohamed Karim Aroua, Belhassen Zouari. 403-408 [doi]
- Petri-Net-Based Modeling and Resolving of Black Hole Attack in WMNHejiao Huang, Qiang Zhou. 409-414 [doi]
- Database as a Service: Towards a Unified Solution for Security RequirementsMohammad Ali Hadavi, Morteza Noferesti, Rasool Jalili, Ernesto Damiani. 415-420 [doi]
- Deriving Process-Related RBAC Models from Process Execution HistoriesAnne Baumgrass, Sigrid Schefer-Wenzl, Mark Strembeck. 421-426 [doi]
- Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBACHejiao Huang, Feng Shang, Jiangtao Zhang. 427-432 [doi]
- Robust XML Watermarking Using Fuzzy QueriesRomaric Tchokpon, Ernesto Damiani, Nadia Bennani. 433-438 [doi]
- Model Based Test Automation through Asynchronous ChannelsRobert M. Hierons. 439 [doi]
- Strategies for Agile Software Testing Automation: An Industrial ExperienceEliane Collins, Arilo Claudio Dias Neto, Vicente Ferreira de Lucena Jr.. 440-445 [doi]
- Adaptive Agile Performance Modeling and TestingMarek Grzegorz Stochel, Mariusz R. Wawrowski, James J. Waskiel. 446-451 [doi]
- Model-Based Conformance Testing of WS-BPEL CompositionsAfef Jmal Maâlej, Moez Krichen, Mohamed Jmaiel. 452-457 [doi]
- A Conceptual Framework for Open Source Software Test ProcessTamer Abdou, Peter Grogono, Pankaj Kamthan. 458-463 [doi]
- Mining Data Chain Graph for Fault LocalizationBo Yang, Ji Wu, Chao Liu 0002. 464-469 [doi]
- Effects of Class Imbalance in Test Suites: An Empirical Study of Spectrum-Based Fault LocalizationCheng Gong, Zheng Zheng, Wei Li, Peng Hao. 470-475 [doi]
- Load Balancing for Cross Layer CommunicationJohn F. Schommer, Dominik Franke, Tim Lange, Stefan Kowalewski. 476-481 [doi]
- Development of a Mobile Platform to Support Building Maintenance EngineeringPaul Stack. 482-487 [doi]
- An Estimation Model for the Savings Achievable by Tool ChainsMatthias Biehl, Martin Törngren. 488-492 [doi]
- GcLite: An Expert Tool for Analyzing Garbage Collection BehaviorVasileios Angelopoulos, Trevor Parsons, John Murphy, Patrick O'Sullivan. 493-502 [doi]
- Integration and Analysis of Design Artefacts in Embedded Software DevelopmentDaniel Merschen, Julian Pott, Stefan Kowalewski. 503-508 [doi]
- Product Line Variability Modeling Based on Model Difference and MergeKunming Nie, Li Zhang, Zengtao Geng. 509-513 [doi]
- Performance Awareness in Component Systems: Vision PaperLubomír Bulej, Tomás Bures, Vojtech Horky, Jaroslav Keznikl, Petr Tuma. 514-519 [doi]
- Understanding the Role of Transmission Power in Component-Based Architectures for Adaptive WSNGuillermo Rodríguez-Navas, Miquel A. Ribot, Bartomeu Alorda. 520-525 [doi]
- Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network ApplicationsSteffen Peter, Peter Langendörfer. 526-531 [doi]
- Extending EAST-ADL for Modeling and Analysis of System's Resource-UsageRaluca Marinescu, Eduard Paul Enoiu. 532-537 [doi]
- Modelling the Design for an SOA System to Control a Small Scale Energy ZoneMaria Anjum, David Budgen. 538-543 [doi]
- Rule Based Axiomatic Design Theory Guidance for Software DevelopmentCengiz Togay, Emre Selman Caniaz, Ali H. Dogru. 544-552 [doi]
- Branch Obfuscation Using Code Mobility and SignalZhi Wang, Chunfu Jia, Min Liu, Xiaoxu Yu. 553-558 [doi]
- Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic EvaluationSun Ding, Hee Beng Kuan Tan, Kaiping Liu, Mahinthan Chandramohan, Hongyu Zhang. 559-564 [doi]
- Towards a Secure Software Development Lifecycle with SQUARE+RWeider D. Yu, Kyle Le. 565-570 [doi]
- Internet-Based Evaluation and Prediction of Web Services TrustworthinessMeng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou, Bing Xie. 571-576 [doi]
- On Security Analysis of PHP Web ApplicationsDavid Hauzar, Jan Kofron. 577-582 [doi]
- Measuring the Software Security Requirements Engineering ProcessNancy R. Mead. 583-588 [doi]
- Attack Model Based Penetration Test for SQL Injection VulnerabilityWei Tian, Jufeng Yang, Jing Xu, Guannan Si. 589-594 [doi]
- An Efficient Graph Codec System for Software WatermarkingMaria Chroni, Stavros D. Nikolopoulos. 595-600 [doi]
- Conditional Ontology MappingIslam Elgedawy. 601-606 [doi]
- Integration of 3D Trajectory Maps into a Local Distribution Map of Radiation Dose Using Unmanned Aerial VehicleKatsunori Oyama, Hiroyuki Wakabayashi, Atsushi Takeuchi, Naoki Ishitsuka. 607-612 [doi]
- A Load Balancing Scheme for Distributed Simulation Based on Multi-agent SystemYoung-Joon Lee, Geon Yong Park, Ho Kuen Song, Hee Yong Youn. 613-618 [doi]
- The Semantics of the Interaction between Agents and Web Services on the Semantic WebSinem Getir, Moharram Challenger, Sebla Demirkol, Geylani Kardas. 619-624 [doi]
- Integrating Linked Data Space with Agents Using the Environment AbstractionRiza Cenk Erdur, Oguz Dikenelli, Oylum Alatli, Erdem Eser Ekinci, Ziya Akar. 625-630 [doi]
- An Image Processing Approach to Solve Labyrinth Discovery Robotics ProblemBehnam Rahnama, Atilla Elçi, Shadi Metani. 631-636 [doi]
- Development of Semantic Model and Information Exploration System for TV MediaDuygu Çelik, Atilla Elçi, Esra Çalik, Ayman Ahmad Khalil. 637-642 [doi]