Abstract is missing.
- The Issues of Solving Staffing and Scheduling Problems in Software Development ProjectsDaniela Cristina Cascini Peixoto, Geraldo R. Mateus, Rodolfo F. Resende. 1-10 [doi]
- Randomized Model Generation for Performance Testing of Model TransformationsXiao He, Tian Zhang, Zhiyi Ma, Weizhong Shao. 11-20 [doi]
- Optimizing Non-orthogonal Space Distance Using PSO in Software Cost EstimationQin Liu, Xiaoyuan Chu, Jiakai Xiao, Hongming Zhu. 21-26 [doi]
- A Mutual Information-Based Hybrid Feature Selection Method for Software Cost Estimation Using Feature ClusteringQin Liu, Shihai Shi, Hongming Zhu, Jiakai Xiao. 27-32 [doi]
- PF-Miner: A New Paired Functions Mining Method for Android Kernel in Error PathsHuqiu Liu, Yuping Wang, Lingbo Jiang, Shimin Hu. 33-42 [doi]
- A Feature-Driven Crossover Operator for Product Line Architecture Design OptimizationThelma Elita Colanzi, Silvia Regina Vergilio. 43-52 [doi]
- Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration FilesBo Zhou, Xin Xia, David Lo, Xinyu Wang. 53-58 [doi]
- A Pattern Based Approach for Automatic Business Process SpecializationAbderrahmane Leshob, Hafedh Mili, Anis Boubaker. 59-64 [doi]
- GUIDiVa: Automated Discovery and Validation of State-Based GUI InvariantsAli Darvish, Carl K. Chang. 65-74 [doi]
- A Runtime Verification Framework for Control System SimulationSelim Ciraci, Jason C. Fuller, Jeff A. Daily, Atefe Makhmalbaf, David Callahan. 75-84 [doi]
- Towards Model-and-Code Consistency CheckingMarkus Riedl-Ehrenleitner, Andreas Demuth, Alexander Egyed. 85-90 [doi]
- Tackling Incomplete System Specifications Using Natural Deduction in the Paracomplete SettingAlexander Bolotov, Vasilyi Shangin. 91-96 [doi]
- Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug ReportsGeunseok Yang, Tao Zhang, Byungjeong Lee. 97-106 [doi]
- Automated Configuration Bug Report Prediction Using Text MiningXin Xia, David Lo, Weiwei Qiu, Xingen Wang, Bo Zhou. 107-116 [doi]
- An Improved Discriminative Model for Duplication Detection on Bug Reports with Cluster WeightingMeng-Jie Lin, Cheng-Zen Yang. 117-122 [doi]
- Faceted Bug Report Search with Topic ModelKaiping Liu, Hee Beng Kuan Tan. 123-128 [doi]
- Towards Uniform Management of Cloud Services by Applying Model-Driven DevelopmentToni Mastelic, Ivona Brandic, Andres Garcia Garcia. 129-138 [doi]
- An SLA-Driven Cache Optimization Approach for Multi-tenant Application on PaaSHuihong He, Zhiyi Ma, Hongjie Chen, Dan Wu, Huanhuan Liu, Weizhong Shao. 139-148 [doi]
- FSaaS: File System as a ServiceDapeng Dong, John Herbert. 149-154 [doi]
- Modelling Variability in Activity Diagrams for Mobile Business ApplicationsViktor Kolokolov, Stefan T. Ruehl, Paul Baumann, Shaozhen Zhang, Stephan A. W. Verclas. 155-160 [doi]
- Extending the Theoretical Fault Localization Effectiveness Hierarchy with Empirical Results at Different Code Abstraction LevelsChung Man Tang, W. K. Chan, Yuen-Tak Yu. 161-170 [doi]
- Adoption of Free Libre Open Source Software (FLOSS): A Risk Management PerspectiveRon S. Kenett, Xavier Franch, Angelo Susi, Nikolas Galanis. 171-180 [doi]
- Quantifying the Characteristics of Java Programs That May Influence Symbolic Execution from a Test Data Generation PerspectiveMarcelo Medeiros Eler, André Takeshi Endo, Vinicius H. S. Durelli. 181-190 [doi]
- Eliciting Relations from Natural Language Requirements Documents Based on Linguistic and Statistical AnalysisLin Liu 0001, Tianying Li, Xiaoxi Kou. 191-200 [doi]
- Counterexample-Guided Abstraction Refinement for Component-Based SystemsLianyi Zhang, Qingdi Meng, Quiming Luo. 201-210 [doi]
- A Formal Representation of Platform Feature-to-Requirement Traceability for Software Product Line DevelopmentSungwon Kang, Jingyu Kim, Sungju Kang, Seokhwan Eom. 211-218 [doi]
- Dynamic Slicing of Python ProgramsZhifei Chen, Lin Chen, Yuming Zhou, Zhaogui Xu, William C. Chu, Baowen Xu. 219-228 [doi]
- Efficient Caching and Incrementalization of Object Queries on Collections in Programming CodesVenkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert. 229-238 [doi]
- Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault LocalizationsXiaozhen Xue, Yulei Pang, Akbar Siami Namin. 239-244 [doi]
- Motivating by Examples: An Empirical Study of Teaching an Introductory Software Engineering Course in BrazilRasha Osman, Arilo Claudio Dias Neto. 245-250 [doi]
- VertexRank: Importance Rank for Software Network VerticesHuan Luo, Yuan Dong, Yiying Ng, Shengyuan Wang. 251-260 [doi]
- Design and Safety Analysis for System Architecture: A Breeze/ADL-Based ApproachLuxi Chen, Linpeng Huang, Chen Li, Linzhu Wu, Weichao Luo. 261-266 [doi]
- Transformation from Activity Diagrams with Time Properties to Timed Coloured Petri NetsXuling Chang, Linpeng Huang, Jianpeng Hu, Chen Li, Bei Cao. 267-272 [doi]
- Understanding and Measuring NestingHend Alrasheed, Austin Melton. 273-278 [doi]
- Optimizing the Power Consumption of Mobile Networks Based on Traffic PredictionSafaa Dawoud, Abdulbaki Uzun, Sebastian Gondor, Axel Küpper. 279-288 [doi]
- Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming NetworkYuta Morisawa, Yoshihiro Kawahara, Tohru Asami. 289-298 [doi]
- How to Generate Realistic Network Traffic?Antoine Varet, Nicolas Larrieu. 299-304 [doi]
- Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal NetworksSoshi Hirono, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura. 305-310 [doi]
- A Distributed Topic-Based Pub/Sub Method for Exhaust Data Streams towards Scalable Event-Driven SystemsRyohei Banno, Susumu Takeuchi, Michiharu Takemoto, Tetsuo Kawano, Takashi Kambayashi, Masato Matsuo. 311-320 [doi]
- Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics SystemsJung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, Lui Sha. 321-331 [doi]
- Time-Sensitive Adaptation in CPS through Run-Time Configuration Generation and VerificationMarisol Garcia-Valls, Diego Perez-Palacin, Raffaela Mirandola. 332-337 [doi]
- Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software ArchitectureAntero Taivalsaari, Tommi Mikkonen, Kari Systä. 338-343 [doi]
- Exploring Blueprints on the Prioritization of Architecturally Relevant Code Anomalies - A Controlled ExperimentEverton Guimãraes, Alessandro F. Garcia, Yuanfang Cai. 344-353 [doi]
- Empirically Based Evolution of a Variability Management Approach at UML Class LevelAnderson Marcolino, Edson Alves de Oliveira Junior, Itana Maria de Souza Gimenes, Ellen Francine Barbosa. 354-363 [doi]
- Instability and Abstractness Metrics Based on ResponsibilitySaleh Almugrin, Waleed Albattah, Omar Alaql, Musaad Alzahrani, Austin Melton. 364-373 [doi]
- Your Phone Knows You: Almost Transparent Authentication for SmartphonesMohammad Tanviruzzaman, Sheikh Iqbal Ahamed. 374-383 [doi]
- A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?Kevin Allix, Quentin Jérome, Tegawendé F. Bissyandé, Jacques Klein, Radu State, Yves Le Traon. 384-393 [doi]
- Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic AnalysisBindu Madhavi Padmanabhuni, Hee Beng Kuan Tan. 394-399 [doi]
- A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal NetworksHirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura. 400-405 [doi]
- A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 ModelBiwen Li, Beijun Shen, Jun Wang, Yuting Chen, Tao Zhang, Jinshuang Wang. 406-415 [doi]
- A Semi-supervised Approach to Software Defect PredictionHuihua Lu, Bojan Cukic, Mark Culp. 416-425 [doi]
- FECAR: A Feature Selection Framework for Software Defect PredictionShulong Liu, Xiang Chen, Wangshu Liu, Jiaqiang Chen, Qing Gu, Daoxu Chen. 426-435 [doi]
- Security with Privacy - Opportunities and Challenges: Panel Position PaperElisa Bertino. 436-437 [doi]
- A Low Cost Hierarchy-Awareness Extension of Skip Graph for World-Wide Range RetrievalsXun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga. 438-445 [doi]
- SIROM3 - A Scalable Intelligent Roaming Multi-modal Multi-sensor FrameworkJiaxing Zhang, Hanjiao Qiu, Salar Shahini Shamsabadi, Ralf Birken, Gunar Schirner. 446-455 [doi]
- An Online Education Approach Using Web Operation Record and Replay TechniquesYanchun Sun, Dejian Chen, Wenpin Jiao, Gang Huang 0001. 456-465 [doi]
- JavaScript: The Used PartsSharath Chowdary Gude, Munawar Hafiz, Allen Wirfs-Brock. 466-475 [doi]
- Towards an Open Architecture Model for Web and Mobile Software: Characteristics and Validity PropertiesBahtijar Vogel, Arianit Kurti, Tommi Mikkonen, Marcelo Milrad. 476-485 [doi]
- Transpacific Live Migration with Wide Area Distributed StorageIkuo Nakagawa, Kohei Ichikawa, Tohru Kondo, Yoshiaki Kitaguchi, Hiroki Kashiwazaki, Shinji Shimojo. 486-492 [doi]
- CrowdAdaptor: A Crowd Sourcing Approach toward Adaptive Energy-Efficient Configurations of Virtual Machines Hosting Mobile ApplicationsEdward Y. Y. Kan, Wing Kwong Chan, T. H. Tse. 493-502 [doi]
- A Lightweight Virtual Machine Image Deduplication Backup Approach in Cloud EnvironmentJiwei Xu, Wenbo Zhang, Shiyang Ye, Jun Wei, Tao Huang. 503-508 [doi]
- Which Android App Store Can Be Trusted in China?Yiying Ng, Hucheng Zhou, Zhiyuan Ji, Huan Luo, Yuan Dong. 509-518 [doi]
- Specific Touch Gesture on Mobile Devices to Find Attractive Phrases in News BrowsingShohe Ito, Takuya Yoshida, Fumiko Harada, Hiromitsu Shimakawa. 519-528 [doi]
- Analysis of Reliability and Resilience for Smart GridsMurtadha N. Albasrawi, Nathan Jarus, Kamlesh A. Joshi, Sahra Sedigh Sarvestani. 529-534 [doi]
- Generating Accessible Multimodal User Interfaces Using MDA-Based Adaptation ApproachLamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 535-540 [doi]
- Performance Evaluation of Reconfigurable TCP Communication on Wi-Fi Network Using GE Channel ModelNaoki Oguchi, Shunji Abe. 541-550 [doi]
- Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming EnvironmentKoki Okamoto, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira. 551-557 [doi]
- Adaptive Online Feedback Controlled Message CompressionMarcus Jagemar, Sigrid Eldh, Andreas Ermedahl, Björn Lisper. 558-567 [doi]
- Emergence of Fractals in Social Networks: Analysis of Community Structure and Interaction LocalitySho Tsugawa, Hiroyuki Ohsaki. 568-575 [doi]
- Homesick Lévy Walk: A Mobility Model Having Ichi-Go Ichi-e and Scale-Free Properties of Human EncountersAkihiro Fujihara, Hiroyoshi Miwa. 576-583 [doi]
- Preserving Location-Related Privacy Collaboratively in Geo-social NetworksLin Zhang, Mingxuan Yuan, Yao Guo, Xiangqun Chen, Lei Chen. 584-589 [doi]
- SPTP: A Trust Management Protocol for Online and Ubiquitous SystemsIvor D. Addo, Ji-Jiang Yang, Sheikh Iqbal Ahamed. 590-595 [doi]
- Towards Test Architecture Based Software Product Line TestingJihyun Lee, Sungwon Kang. 596-597 [doi]
- Comparing Control Flow Graphs of Binary Programs through Match PropagationHyun-il Lim. 598-599 [doi]
- Behavioral Anomaly Detection System on Network Application Traffic from Many SensorsAkira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori. 600-601 [doi]
- Improve User's Security Literacy by Experiencing Behavior of Pseudo Android MalwareMakoto Kato, Saeko Matsuura. 602-603 [doi]
- Predicting Release Time Based on Generalized Software Reliability Model (GSRM)Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa. 604-605 [doi]
- Experiences Integrating Heterogeneous Government Open Data Sources to Deliver Services and Promote Transparency in BrazilKellyton dos Santos Brito, Marcos Antônio da Silva Costa, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira. 606-607 [doi]
- Operation Support System Based on Augmented Reality TechnologyTatsuya Osawa, Jun Shimamura, Yukinobu Taniguchi. 608-609 [doi]
- On Architecture for QoS-Aware Packet AggregationTomoaki Umeki, Yoshinori Kitatsuji. 610-611 [doi]
- Software-as-a-Service Solution Implementation - Data Migration PerspectiveLuba Shabnam, Farzana Haque, Moshiur Bhuiyan, Aneesh Krishna. 612-613 [doi]
- Performance Preservation Using Servers for Predictable Execution and IntegrationRafia Inam. 614-617 [doi]
- Exploratory Performance Analysis of Microbot Swarm in Three-Dimensional FieldShota Agemura, Hiroyuki Ohsaki. 618-621 [doi]
- A Distributed Flow Control with Backward Propagation: Algorithm and Preliminary Performance EvaluationKohei Tsutsumi, Hiroyuki Ohsaki, Hideaki Suzuki. 622-625 [doi]
- A Model for Distributed Agile Release Planning: Doctoral Symposium PaperIngo Richter, Robert Lindermeier, Michael Weber. 626-629 [doi]
- Media Supported Workspaces in Agile Software Development: Doctoral Symposium PaperFlorian Raith, Robert Lindermeier. 630-633 [doi]
- SMoCoR: A Smart Mobile Contact Recommender Based on Smart Phone DataXiwei Zhuang, Yanchun Sun, Kui Wei. 634-635 [doi]
- Thermodynamics-Based Entropy Adjustment for Robust Self-Organized Network ControlsTakuya Iwai, Daichi Kominami, Masayuki Murata, Tetsuya Yomo. 636-637 [doi]
- Expiration Timer Control Method for QoS-Aware Packet ChunkingHiroki Yanaga, Daiki Nobayashi, Takeshi Ikenaga. 638-639 [doi]
- A Taxonomy for SLA-Based Monitoring of Cloud SecurityDana Petcu. 640-641 [doi]
- A QoS-Oriented Inter-cloud Federation FrameworkMaria Salama, Ahmed Shawish. 642-643 [doi]
- Information Orchestration System for Closing the Information Retrieval Capability GapToru Kobayashi. 644-645 [doi]
- Cider: An Event-Driven Continuous Integration ServerOndrej Kupka, Filip Zavoral. 646-647 [doi]