Abstract is missing.
- Message from the SETA Organizing CommitteeDoris Carver, Wing Kwong Chan, Hongji Yang, Xiaodong Liu, Carl Chang, Hridesh Rajan. 1 [doi]
- Automatic Fix for C Integer Errors by Precision ImprovementXi Cheng, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun. 2-11 [doi]
- JRed: Program Customization and Bloatware Mitigation Based on Static AnalysisYufei Jiang, Dinghao Wu, Peng Liu 0005. 12-21 [doi]
- Condensing Class Diagrams With Minimal Manual Labeling CostXinli Yang, David Lo, Xin Xia, Jianling Sun. 22-31 [doi]
- Reliability Analysis for Software Cluster Systems Based on Proportional Hazard ModelChunyan Hou, Chen Chen, Jinsong Wang, Kai Shi. 32-41 [doi]
- Determine Configuration Entry Correlations for Web Application SystemsWei Chen, Heng Wu, Jun Wei, Hua Zhong, Tao Huang. 42-52 [doi]
- Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models Generated by Mining Event-Log Data in Issue Tracking SystemsPrerna Juneja, Divya Kundra, Ashish Sureka. 53-62 [doi]
- GRETA: Graph-Based Tag Assignment for GitHub RepositoriesXuyang Cai, Jiangang Zhu, Beijun Shen, Yuting Chen. 63-72 [doi]
- It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta FeaturesXin Xia, David Lo, Denzil Correa, Ashish Sureka, Emad Shihab. 73-82 [doi]
- Towards Correlating Search on Google and Asking on Stack OverflowChunyang Chen, Zhenchang Xing. 83-92 [doi]
- SatiIndicator: Leveraging User Reviews to Evaluate User Satisfaction of SourceForge ProjectsZhenzheng Qian, Beijun Shen, Wenkai Mo, Yuting Chen. 93-102 [doi]
- On Automatic Summarization of What and Why Information in Source Code ChangesJinfeng Shen, Xiaobing Sun, Bin Li, Hui Yang, Jiajun Hu. 103-112 [doi]
- Software Defect Prediction Using Semi-Supervised Learning with Change Burst InformationQing He, Beijun Shen, Yuting Chen. 113-122 [doi]
- An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection VulnerabilityLei Liu, Jing Xu, Hongji Yang, Chenkai Guo, Jiehui Kang, Sihan Xu, Biao Zhang, Guannan Si. 123-132 [doi]
- Code Coverage-Based Failure Proximity without Test OraclesJingxuan Tu, Xiaoyuan Xie, Baowen Xu. 133-142 [doi]
- Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web ApplicationsShuo Wen, Yuan Xue, Jing Xu, Hongji Yang, Xiaohong Li, Wenli Song, Guannan Si. 143-153 [doi]
- Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction ModelsKwabena Ebo Bennin, Jacky W. Keung, Akito Monden, Yasutaka Kamei, Naoyasu Ubayashi. 154-163 [doi]
- Improving Failure Detection by Automatically Generating Test Cases Near the BoundariesMin Zhou, Xi Cheng, Xinrui Guo, Ming Gu, Hongyu Zhang, Xiaoyu Song. 164-173 [doi]
- Prioritizing Interaction Test Suites Using Repeated Base Choice CoverageRubing Huang, Weiwen Zong, Jinfu Chen, Dave Towey, Yunan Zhou, Deng Chen. 174-184 [doi]
- A Strategy to Determine When to Stop Using Automatic Bug LocalizationZhendong Shi, Jacky W. Keung, Kwabena Ebo Bennin, Nachai Limsettho, Qinbao Song. 185-190 [doi]
- Exploring the Instability of Spectra Based Fault Localization PerformanceYuanchi Guo, Xiaoyi Zhang, Zheng Zheng. 191-196 [doi]
- Automated Program Repair by Using Similar Code Containing Fix IngredientsTao Ji, Liqian Chen, Xiaoguang Mao, Xin Yi. 197-202 [doi]
- Scope of Selection Nodes in Object Oriented ProgramsHend Alrasheed, Austin Melton. 203-208 [doi]
- Improved Co-Simulation with Event Detection for Stochastic Behaviors of CPSsJufu Liu, Kaiqiang Jiang, Xiao Wang, Bei Cheng, Dehui Du. 209-214 [doi]
- LogOptPlus: Learning to Optimize Logging in Catch and If Programming ConstructsSangeeta Lal, Neetu Sardana, Ashish Sureka. 215-220 [doi]
- Modeling and Verifying HDFS Using CSPWanling Xie, Huibiao Zhu, Xi Wu, Shuangqing Xiang, Jian Guo. 221-226 [doi]
- Automated Identification of High Impact Bug Reports Leveraging Imbalanced Learning StrategiesXinli Yang, David Lo, Qiao Huang, Xin Xia, Jianling Sun. 227-232 [doi]
- Situation-Oriented Requirements ElicitationNimanthi L. Atukorala, Carl K. Chang, Katsunori Oyama. 233-238 [doi]
- DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code FilesHui Yang, Xiaobing Sun, Bin Li, Yucong Duan. 239-244 [doi]
- Modeling and Analyzing Cost and Utilization Based Task Scheduling for Cloud ApplicationGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 245-250 [doi]
- Human Subject Evaluation of Computer-Security Training RecommenderMuhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen. 251-256 [doi]
- A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security VulnerabilitiesKazi Zakia Sultana, Ajay Deo, Byron J. Williams. 257-262 [doi]
- An Approach for Iteratively Generating Adequate Tests in Metamorphic Testing: A Case StudyJunhua Ding, Dongmei Zhang. 263-268 [doi]
- Apsaras: Efficient Allocation of Physical Devices for Android TestingTianchi Liu, Chun Cao, Jie Chen, Ziling Lu, Xiaoxing Ma. 269-274 [doi]
- Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity DiagramsHaiying Sun, Mingsong Chen, Min Zhang, Jing Liu, Ying Zhang. 275-280 [doi]
- Messge from the ECPE Organizing CommitteeTiberiu Seceleanu, Tiziana Margaria, Rajesh Subramanyan, Michele Bugliesi, Cristina Seceleanu, Bruce M. McMillin. 281 [doi]
- Designing [Secure] Complex Critical Public InfrastructureAditya P. Mathur. 282 [doi]
- Generalized Attacker and Attack Models for Cyber Physical SystemsSridhar Adepu, Aditya Mathur. 283-292 [doi]
- Model-Driven Optimization of Data-Adaptable Embedded SystemsAdrian Lizarraga, Roman L. Lysecky, Jonathan Sprinkle. 293-302 [doi]
- A One-Class NIDS for SDN-Based SCADA SystemsEduardo Germano da Silva, Anderson Santos da Silva, Juliano Araujo Wickboldt, Paul Smith, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho. 303-312 [doi]
- A Comparative Study of the Effects of Pull Request on GitHub ProjectsJing Liu, Jiahao Li, Lulu He. 313-322 [doi]
- Integrating Version Control in a Standardized Service-Oriented Tool ChainLuka Lednicki, Gaetana Sapienza, Morgan E. Johansson, Tiberiu Seceleanu, Daniel Hallmans. 323-328 [doi]
- Verification of Reconfigurable NoC under Quality of Service ConstraintsHela Ben Salah, Adel Benzina, Mohamed Khalgui. 329-334 [doi]
- Safety Requirements Specification and Verification for Railway Interlocking SystemsLi Han, Jing Liu, Tingliang Zhou, Junfeng Sun, Xiaohong Chen. 335-340 [doi]
- Message from the ITiP Symposium ChairsMaria R. Lee, San Murugesan, Steve Diamond. 341 [doi]
- Data-Intensive Research & Scientific DiscoverySimon Y. Liu. 342 [doi]
- How IT Leadership Will Change by 2020 and Why it MattersJoseph Williams. 343 [doi]
- A Healthcare Support System for Assisted Living Facilities: An IoT SolutionFulvio Corno, Luigi De Russis, Alberto Monge Roffarello. 344-352 [doi]
- A Case Study on SoaML to Design an Electronic Health Record Application Considering Integration of Legacy SystemsJoyce M. S. França, Josimar de S. Lima, Michel S. Soares. 353-358 [doi]
- Cyber Foraging and Offloading Framework for Internet of ThingsPrithviraj Patil, Akram Hakiri, Aniruddha S. Gokhale. 359-368 [doi]
- Designing SSD-Friendly Applications for Better Application Performance and Higher IO EfficiencyZhenyun Zhuang, Sergiy Zhuk, Haricharan Ramachandra, Badri Sridharan. 369-378 [doi]
- Probabilistic Sequence Modeling for Trustworthy IT Servicing by Collective Expert NetworksKayhan Moharreri, Jayashree Ramanathan, Rajiv Ramnath. 379-389 [doi]
- The Story of Naive Alice: Behavioral Analysis of Susceptible Internet UsersRasib Khan, Ragib Hasan. 390-395 [doi]
- Mitigating an Oxymoron: Compliance in a DevOps EnvironmentsJohn R. Michener, Aaron T. Clager. 396-398 [doi]
- Message from the SEPT Organizing CommitteeBhavani M. Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino. 399 [doi]
- Data Security and Privacy: Concepts, Approaches, and Research DirectionsElisa Bertino. 400-407 [doi]
- EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of EmailsSevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda. 408-416 [doi]
- How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability AnalysisRagib Hasan, Shams Zawoad, Shahid Al Noor, Md Munirul Haque, Darrell Burke. 417-422 [doi]
- Chronos: Towards Securing System Time in the Cloud for Reliable Forensics InvestigationShams Zawoad, Ragib Hasan. 423-432 [doi]
- Customized Cloud Service Trustworthiness Evaluation and Comparison Using Fuzzy Neural NetworksZhengping Wu, Yu Zhou. 433-442 [doi]
- Interactive Incontestable Signature for Transactions Confirmation in Bitcoin BlockchainYan Zhu, Ruiqi Guo, Guohua Gan, Wei-Tek Tsai. 443-448 [doi]
- Maintaining User Interface Integrity on AndroidAbeer Al Jarrah, Mohamed Shehab. 449-458 [doi]
- Design of a Concealed File System Adapted for Mobile Devices Based on GPS InformationYong Jin, Masahiko Tomoishi, Satoshi Matsuura. 459-464 [doi]
- An Advanced Collusion Attack against User Friendship Privacy in OSNsYuhong Liu, Na Li. 465-470 [doi]
- Authenticating Multiple User-Defined Spatial QueriesYong Wang, Shi-meng Gao, Junhao Zhang, Xiao Nie, Xiaoran Duan, Juguang Chen. 471-480 [doi]
- Adaptive Reasoning for Context-Sensitive Access ControlsSara Sartoli, Akbar Siami Namin. 481-486 [doi]
- User Identification of Pseudonyms without Identity Information Exposure in Access FederationsHiroyuki Sato, Yasuo Okabe, Motonori Nakamura. 487-492 [doi]
- Message from the Doctoral Symposium Co-ChairsMohammad Adibuzzaman, Hiroyuki Ohsaki, Satish Puri, Qinghua Lu. 493 [doi]
- Performance Comparison of Shortest-Path Routing and Optimal Detour Routing in Content-Centric NetworkingRyo Nakamura, Hiroyuki Ohsaki. 494-495 [doi]
- Analysis of Message Delivery Delay in Geographic DTN RoutingDaiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 496-497 [doi]
- Adaptive Reasoning in the Presence of Imperfect Security RequirementsSara Sartoli, Akbar Siami Namin. 498-499 [doi]
- Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior ModelsMinzhe Guo, Prabir Bhattacharya. 500-501 [doi]
- Graph Based Agent Oriented Model for Tunnel SimulationSanish Rai, Xiaolin Hu. 502-503 [doi]
- A Text Information Retrieval Method by Integrating Global and Local Textual InformationZhibo Wang, Yanqing Zhang. 504-505 [doi]
- Message from the HCSC Organizing CommitteeYuhong Liu, Symeon Papadopoulos, Rene Kaiser, Moushumi Sharmin. 506 [doi]
- Opportunities and Challenges of Social Media in Personal and Societal Well-beingMunmun De Choudhury. 507 [doi]
- Detecting Weak Changes over a Network of Streaming EventsYao Xie. 508 [doi]
- Can You Really Make Profit from Online Rating Manipulations?: An Empirical StudyYuhong Liu, Wenqi Zhou. 509-518 [doi]
- A Next Application Prediction Service Using the BaranC FrameworkMohammad Hashemi, John Herbert. 519-523 [doi]
- Community Detection in Large Social Networks Based on Relationship DensityXiang Li, Yong Tan, Ziyang Zhang, Qiuli Tong. 524-533 [doi]
- Message from the TAIN Program Co-chairsTugkan Tuglular, Ying Cai. 534 [doi]
- A Cross-Layer Multicast-Push Unicast-Pull (MPUP) Architecture for Reliable File-Stream DistributionShuoshuo Chen, Xiang Ji, Malathi Veeraraghavan, Steve Emmerson, Joseph Slezak, Steven G. Decker. 535-544 [doi]
- Communication and Security in Health Monitoring Systems - A ReviewHossein Fotouhi, Aida Causevic, Kristina Lundqvist, Mats Björkman. 545-554 [doi]
- An Assessment of Internet of Things Protocols for Resource-Constrained ApplicationsDae-Hyeok Mun, Minh Le Dinh, Young-Woo Kwon. 555-560 [doi]
- Message from the WEDA 2016 Program ChairsTugkan Tuglular, Ying Cai, Duygu Çelik, Mei-Ling Shyu, Tian Xia. 561 [doi]
- Big Graph Analytics: Models, Platforms and OptimizationsLing Liu. 562 [doi]
- Big Holes in Big Data: A Monte Carlo Algorithm for Detecting Large Hyper-Rectangles in High Dimensional DataJoseph Lemley, Filip Jagodzinski, Razvan Andonie. 563-571 [doi]
- Risk Assessment for a Global Air Transport System Using Socioeconomic-Technological-Environmental DatabasesAki-Hiro Sato, Hidefumi Sawai. 572-581 [doi]
- SOLinker: Constructing Semantic Links between Tags and URLs on StackOverflowWenkai Mo, Jiangang Zhu, Zhenzheng Qian, Beijun Shen. 582-591 [doi]
- Centrality and Cluster Analysis of Yelp Mutual Customer Business GraphBrian McClanahan, Swapna S. Gokhale. 592-601 [doi]
- Causal Consistency for Distributed Data Stores and Applications as They areKazuyuki Shudo, Takashi Yaguchi. 602-607 [doi]
- SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at ScaleChangYuan Wang, Zongfei Lu, Yang Liu, Shanqing Guo, Xin-Shun Xu, Shijun Liu, Li-zhen Cui. 608-613 [doi]
- Text Mining Analysis in Turkish Language Using Big Data ToolsMehmet Ulas Cakir, Seren Guldamlasioglu. 614-618 [doi]
- Using Object-Oriented Big Data Analytics to Reveal Server Performance Dead ZoneHuihong He, HaibinZhai, Qian Liu, Yong Wang. 619-624 [doi]
- TripleFCA: FCA-Based Approach to Enhance Semantic Web Data ManagementSaleh Albahli, Austin Melton. 625-630 [doi]
- Entity Type Recognition Using an Ensemble of Distributional Semantic Models to Enhance Query UnderstandingWalid Shalaby, Khalifeh AlJadda, Mohammed Korayem, Trey Grainger. 631-636 [doi]
- Message from the NATA Organizing CommitteeAli Hurson, Ji-Jiang Yang, Behrooz A. Shirazi, Alfredo Cuzzocrea, Toyokazu Akiyama, Sahra Sedigh Sarvestani, Sheikh Iqbal Ahamed. 637 [doi]
- Towards Dementia-Friendly Smart HomesMohsen Amiribesheli, Abdelhamid Bouchachia. 638-647 [doi]
- Building a Large-Scale Distributed Live Video Analysis System for Movement of Pedestrians in Urban AreasYuuichi Teranishi, Nozomu Nishinaga. 648-657 [doi]
- Temporal Dependency Rule Learning Based Group Activity Recognition in Smart SpacesAmine Lotfi Bourbia, Heesuk Son, Byoungheon Shin, Taehun Kim, Dongman Lee, Soon J. Hyun. 658-663 [doi]
- General Framework for Task Scheduling and Resource Provisioning in Cloud Computing SystemsXiaomin Zhu, Yabing Zha, Ling Liu, Peng Jiao. 664-673 [doi]
- GPU-Aware Genetic Estimation of Hidden Markov Models for Workload Classification ProblemsAlfredo Cuzzocrea, Enzo Mumolo, Nicola Timeus, Gianni Vercelli. 674-682 [doi]
- Evaluating Security and Privacy in Cloud ServicesAbdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Frederick T. Sheldon. 683-686 [doi]
- Towards Realizing a Self-Protecting Healthcare Information SystemQian Chen, Jonathan Lambright. 687-690 [doi]
- Requirements are the New CodeDaniel Conte de Leon, Sanjeev Shrestha. 691-694 [doi]
- Message from the CELT Organizing CommitteeEdmundo Tovar, Manuel Castro, Claudio Demartini, Tiziana Margaria, Henry Chan, Timothy Shih, Simanta Mitra, Sorel Reisman. 695 [doi]
- An Approach to Using Existing Online Education Tools to Support Practical Education on MOOCsYanchun Sun, Zijian Qiao, Dejian Chen, Chao Xin, Wenpin Jiao. 696-705 [doi]
- Academic Performance Prediction Using Chance Discovery from Online Discussion ForumsGary K. W. Wong, Simon Y. K. Li. 706-711 [doi]
- Stage-Based Generative Learning Object Model to Support Automatic Content Generation and AdaptationVytautas Stuikys, Renata Burbaite, Kristina Bespalova, Vida Drasute, Giedrius Ziberkas, Algimantas Venckauskas. 712-721 [doi]
- Learning the Social Web: A Multidisciplinary ApproachLuigi De Russis, Laura Farinetti, Gabriella Taddeo. 722-727 [doi]
- Implementing an Open-Access, Data Science Programming Environment for LearnersAustin Cory Bart, Javier Tibau, Eli Tilevich, Clifford A. Shaffer, Dennis G. Kafura. 728-737 [doi]
- Supporting Learners in Online Courses Through Pair Programming and Live CodingSeyed Soroush Ghorashi, Carlos Jensen. 738-747 [doi]
- The Cost of Syntax and How to Avoid It: Text versus Frame-Based EditingAmjad AlTadmri, Michael Kölling, Neil C. C. Brown. 748-753 [doi]
- A Cloud-Based Immersive Learning Environment for Distributed Systems AlgorithmsYogesh D. Barve, Prithviraj Patil, Aniruddha S. Gokhale. 754-763 [doi]
- Reasoning for CPS Education Using Surrogate Simulation ModelsShunxing Bao, Joe Porter, Aniruddha S. Gokhale. 764-773 [doi]
- Which Learning Outcomes Should I Acquire? A Bar Chart-Based Semantic System for Visually Comparing Learners' Acquirements with Labor Market RequirementsValentina Gatteschi, Fabrizio Lamberti, Gianluca Paravati, Alessandro Raso, Claudio Demartini. 774-779 [doi]
- Toward More Robust Automatic Analysis of Student Program Outputs for Assessment and LearningChung Keung Poon, Tak-Lam Wong, Yuen-Tak Yu, Victor C. S. Lee, Chung Man Tang. 780-785 [doi]
- Message from the MOWU Organizing CommitteeMorris Chang, Hong Va Leong, Paolo Bellavista, Vladimir Getov. 786-787 [doi]
- Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping ModesZihao Tang, Yao Guo, Xiangqun Chen. 788-797 [doi]
- Your Walk is My Command: Gait Detection on Unconstrained Smartphone Using IoT SystemAkm Jahangir Alam Majumder, Piyush Saxena, Sheikh Iqbal Ahamed. 798-806 [doi]
- Fusing Static and Roving Sensor Data for Detecting Highway Traffic Conditions in Real TimeBeihong Jin, Yanling Cui, Fusang Zhang. 807-816 [doi]
- DPMS: A Swift Data Dissemination Protocol Based on Map SplittingSabri Allani, Taoufik Yeferny, Richard Chbeir, Sadok Ben Yahia. 817-822 [doi]
- A Cloud You Can Wear: Towards a Mobile and Wearable Personal CloudRagib Hasan, Rasib Khan. 823-828 [doi]