Abstract is missing.
- Message from the ADMNET Workshop OrganizersTakashi Yamanoue, Hiroki Kashiwazaki, Seigo Kishiba, Yong Jin. 1 [doi]
- Design and Implementation of Secure Prefetch Mechanism for Multi-step Name Resolution in DNSYong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta. 2-7 [doi]
- Design and Implementation of a Client Based DNSSEC Validation and Alert SystemKunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi. 8-13 [doi]
- Robustness of Networks with Skewed Degree Distributions under Strategic Node ProtectionYui Kazawa, Sho Tsugawa. 14-19 [doi]
- Multi-layer and Multi-domain Network Orchestration and Provision of Virtual Views to UsersYohei Iizawa, Kazuya Suzuki. 20-25 [doi]
- On the Impact of Cut-Through Links in Epidemic BroadcastingHiroyuki Ohsaki, Yasuhiro Yamasaki. 26-31 [doi]
- Automated Inference of Dependencies of Network Services and Applications via Transfer EntropyKarim El Defrawy, Tiffany Kim, Pape Sylla. 32-37 [doi]
- Toward the Support of Challenging Service Level Agreements (SLAs) in Manual and Context-Dependent ActivitiesRaef Mousheimish, Yehia Taher, Karine Zeitouni. 38-43 [doi]
- Message from the STA Workshop OrganizersFevzi Belli, Rajesh Subramanyan. 44 [doi]
- Challenges in Testing the Design of Secure Complex Critical Public InfrastructureAditya P. Mathur. 45 [doi]
- Fault Localization Method Generated by Regression Test Cases on the Basis of Genetic Immune AlgorithmZhang Hui. 46-51 [doi]
- Automation Architecture for Bayesian Network Based Test Case Prioritization and ExecutionEkincan Ufuktepe, Tugkan Tuglular. 52-57 [doi]
- Event Handler Tree Model for GUI Test Case GenerationBin Wang, Bei-Bei Yin, Kai-Yuan Cai. 58-63 [doi]
- Message from ESAS 2016 Workshop OrganizersAtilla Elçi, Duygu Çelik Ertugrul. 64 [doi]
- Fetal Heart Rate Monitoring System (FHRMS)Duygu Çelik Ertugrul, Hakan Kanmaz, Mehmet Ugur Yuksel, Atilla Elçi, Mehmet Ertugrul. 65-70 [doi]
- QR-Code Based Hospital Systems for Healthcare in TurkeyVassilya Uzun. 71-76 [doi]
- A Search Service for Food Consumption Mobile Applications via Hadoop and MapReduce TechnologyMehmet Akif Cifci, Duygu Çelik Ertugrul, Atilla Elçi. 77-82 [doi]
- An Open-Source ACASI Design for Social Collaborative mHealthSaranya Radhakrishnan, Zachary Stecher, Deger Cenk Erdil. 83-87 [doi]
- Message from the SSERV Workshop OrganizersTakao Terano. 88 [doi]
- Stock Price Regression Based on Order Book InformationKenichi Yoshida, Akito Sakurai. 89-94 [doi]
- Analysis of the Influences of Central Bank Financing on Operative Collapses of Financial Institutions Using Agent-Based SimulationTakamasa Kikuchi, Masaaki Kunigami, Takashi Yamada, Hiroshi Takahashi, Takao Terano. 95-104 [doi]
- Methods to Predict the Number of Software Faults Using Weibull DistributionKoji Tanaka, Kazuhiko Tsuda. 105-110 [doi]
- A Study on the Agent-Simulation of Waiting Behaviours Inside a Transfer Station SpaceTakayuki Mizuno, Masahiro Shohmitsu, Toshiyuki Kaneda. 111-116 [doi]
- Improving a Cellular Manufacturing System through Real Time-Simulation and-MeasurementMasaki Kitazawa, Satoshi Takahashi, Toru B. Takahashi, Atsushi Yoshikawa, Takao Terano. 117-122 [doi]
- Proposal for a Cumulative Deposit Rate Prediction Method for Payment After Delivery in the Mail Order BusinessHiroki Azuma, Nobuo Suzuki, Tohru Matsuodani, Kazuhiko Tsuda. 123-128 [doi]
- Message from the QUORS Workshop OrganizersXiaodong Liu, Hongji Yang. 129 [doi]
- An Eye Tracking Research on Debugging Strategies towards Different Types of BugsFei Peng, Chunyu Li, Xiaohan Song, Wei Hu, Guihuan Feng. 130-134 [doi]
- Cost-Effective Supervised Learning Models for Software Effort Estimation in Agile EnvironmentsKayhan Moharreri, Alhad Vinayak Sapre, Jayashree Ramanathan, Rajiv Ramnath. 135-140 [doi]
- A Study to Improving Anomaly Detection in a TS WorkflowFeng-Jian Wang, Thanh-Thuy Thi Nguyen, Tennyson Lu. 141-148 [doi]
- New Graphic Polyglot Concept of ProgrammingIgor Velbitskiy, Gary Ushakov. 149-154 [doi]
- Knowledge Management Framework for Software ReuseSimone Maccanti, Jameela Al-Jaroodi, Arif Sirinterlikci. 155-160 [doi]
- A Methodology to Automate the Selection of Design PatternsShahid Hussain, Jacky W. Keung, Arif Ali Khan, Kwabena Ebo Bennin. 161-166 [doi]
- Integrating Pattern-Based Formal Requirements Specification in an Industrial Tool-ChainPredrag Filipovikj, Trevor Jagerfield, Mattias Nyberg, Guillermo Rodríguez-Navas, Cristina Cerschi Seceleanu. 167-173 [doi]
- From Data Reuse to Knowledge Reuse in Web Applications: A SurveyJianfeng Chen, Hongji Yang. 174-179 [doi]
- Industrial Experience with Open Source Software Process ManagementOliver Fendt, Michael Jaeger, Ricardo Jimenez Serrano. 180-185 [doi]
- DEEPC: Dynamic Energy Profiling of ComponentsSamuel J. Chinenyeze, Xiaodong Liu, Ahmed Yassin Al-Dubai. 186-191 [doi]
- An Online Identity and Smart Contract Management SystemAffan Yasin, Lin Liu. 192-198 [doi]
- Message from the MidCCI Workshop OrganizersHideaki Goto, Yuuichi Teranishi, Jiann-Liang Chen, Shuo-Yan Chou. 199-201 [doi]
- An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each OtherYasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura. 202-207 [doi]
- Byzantine Fault Tolerant Software-Defined Networking (SDN) ControllersKarim El Defrawy, Tyler Kaczmarek. 208-213 [doi]
- Message from the MVDA Workshop OrganizersLeila Jemni Ben Ayed, Fevzi Belli, Ahlem Ben Younes, Yousra Bendaly Hlaoui. 214-215 [doi]
- Migrating a Bare PC Web Server to a Multi-core ArchitectureHojin Chang, Ramesh K. Karne, Alexander L. Wijesinha. 216-221 [doi]
- Reachability Analysis of Multithreaded Programs Using Communicating Rewriting SystemsBrahim Nasraoui, Riadh Robbana. 228-233 [doi]
- Message from the CEEP Workshop OrganizersHenry Chan, Sorel Reisman, Simanta Mitra. 246 [doi]
- Teaching Secure Cloud Computing Concepts with Open Source CloudSim EnvironmentYong Shi, Dan Chia-Tien Lo, Kai Qian. 247-252 [doi]
- Hardware Attacks and Security EducationDan Chia-Tien Lo, Kai Qian, Wei Chen. 253-257 [doi]
- Implementation of Active Learning Methods in Mechanical Engineering Education to Enhance Students' PerformanceB. L. Tembe, S. K. Kamble. 258-263 [doi]
- A Panoramic Geology Field Trip System Using Image-Based RenderingChunyan Deng, Zhiguo Zhou, Wenqing Li, Boyu Hou. 264-268 [doi]
- Internet of Things-Based Framework to Facilitate Indoor Localization EducationAmir Atabekov, Jing He, Patrick O. Bobbie. 269-274 [doi]
- A Summer Computing Camp Using ChainReaction and jABCAnna-Lena Lamprecht, Tiziana Margaria, Clare McInerney. 275-280 [doi]
- Message from the CDS Workshop OrganizersNorihiro Ishikawa, Yoshia Saito, Akimitsu Kanzaki. 281 [doi]
- Truthful Incentive Mechanism for Mobile Crowdsensing with Smart Consumer DevicesOzlem Zehra Ozyagci, Mihhail Matskin. 282-287 [doi]
- Social Media Mediation System for Closing Inter-Generational Communication GapToru Kobayashi, Kazushige Katsuragi, Kenichi Arai, Tomoya Sakai, Makoto Fujimura. 288-293 [doi]
- Configurations of Micro EV Quick-Charging System with EDLC StorageSeiya Tanaka, Nobuo Fukujyu, Shigeo Kaneda. 294-299 [doi]
- Remote-Controlled Micro EV System Using Downward-Facing Wide-Angle Video CameraNaoya Tsujita, Masato Mitsuno, Yoshiki Usui, Shigeo Kaneda. 300-305 [doi]
- Management of OSGi Device Using PUCC Protocols and MetadataTakeshi Kato, Daigo Matsubara, Naofumi Yoshida, Norihiro Ishikawa. 306-311 [doi]
- Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LANTeruhisa Tajima, Yasuo Okabe. 312-318 [doi]
- Improved Software Updating for Automotive ECUs: Code CompressionYutaka Onuma, Masanao Nozawa, Yoshiaki Terashima, Ryozo Kiyohara. 319-324 [doi]
- Message from the BIOT Workshop OrganizersHideya Ochiai, Kurt Geihs, Susumu Takeuchi, Jun Suzuki. 325 [doi]
- Distributed Graph Path Queries Using SparkJanani Balaji, Rajshekhar Sunderraman. 326-331 [doi]
- IEEE1888 over WebSocket for Communicating across a Network BoundaryYuya Tarutani, Shuuichirou Murata, Kazuhiro Matsuda, Morito Matsuoka. 332-337 [doi]
- Design and Implementation of Global Reference and Indirect Method Invocation Mechanisms in the DripcastIkuo Nakagawa, Masahiro Hiji, Hiroshi Esaki. 338-343 [doi]
- An Intelligent Microgrid Energy Management System Using Distributed Database and IEEE 1888Yuanbo Zhu, Dominic Maurath, Longqi Zhang, Nanmagalam Devika, Leong Hai Koh, Fook Hoong Choo. 344-347 [doi]
- SPIRE: Scalable and Unified Platform for Real World IoT Services with Feature InteractionSusumu Takeuchi, Michiharu Takemoto, Masato Matsuo. 348-353 [doi]
- Message from the SAPSE Workshop OrganizersStelvio Cimato. 354 [doi]
- Message from the CFSE Workshop OrganizersRyôichi Sasaki, Tetsutaro Uehara, Jigang Liu. 355 [doi]
- A Reference Architecture for Supporting Secure Big Data Analytics over Cloud-Enabled Relational DatabasesAlfredo Cuzzocrea. 356-358 [doi]
- Measuring Software AssuranceRobert J. Ellison, William Nichols, Carol Woody. 359-364 [doi]
- EAR: An e-mail Attachment Receiver to Search Concerning Images in the Context of Insider ThreatJason W. Clark. 365-370 [doi]
- A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online VideoChristopher Francis-Christie, Dan Lo. 371-376 [doi]
- Self-Refining Skip Graph: A Structured Overlay Approaching to Ideal Skip GraphTakafumi Kawaguchi, Ryohei Banno, Masashi Hojo, Kazuyuki Shudo. 377-378 [doi]
- Development of Home Management System Using Arduino and AppInventorWook-Sung Yoo, Sameer Ahamed Shaik. 379-380 [doi]
- Message from STPSA 2016 Workshop OrganizersHassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine. 381 [doi]
- An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: BrowserAnanth A. Jillepalli, Daniel Conte de Leon. 382-387 [doi]
- A Web Application For Studying Collusion Attacks Through Friend Search EngineSai Samrat Malka, Na Li, Venu Madhavi Doddapaneni, Yuhong Liu, Anil Kumar Pamulapati. 388-393 [doi]
- Information Theoretic Anomaly Detection Framework for Web ApplicationRobert Bronte, Hossain Shahriar, Hisham M. Haddad. 394-399 [doi]
- Privacy Preservation in Affect-Driven PersonalizationIvor D. Addo, Praveen Madiraju, Sheikh Iqbal Ahamed, William C. Chu. 400-405 [doi]
- New Challenge of Protecting Privacy due to Stained RecognitionLining Xu, Yongxu Wu. 406-409 [doi]
- Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy LawsSaikrishna Yellanki, Dale Lindskog, Pavol Zavarsky, Ron Ruhl. 410-415 [doi]
- An Efficient Safe Directory Based File Protection MechanismManting Shen, Yinyan Yu, Zhi Tang, Xiaoyu Cui. 416-422 [doi]
- A Novel Secure and Efficient Policy Management Framework for Software Defined NetworkBata Krishna Tripathy, Ananta Gopal Sethy, Padmalochan Bera, Mohammad Ashiqur Rahman. 423-430 [doi]
- VFence: A Defense against Distributed Denial of Service Attacks Using Network Function VirtualizationA. H. M. Jakaria, Wei Yang, Bahman Rashidi, Carol J. Fung, M. Ashiqur Rahman. 431-436 [doi]
- Trust-Based Development Framework for Distributed Systems and IoTMohsen Dorodchi, Maryam Abedi, Bojan Cukic. 437-442 [doi]
- Enhanced User Security and Privacy Protection in 4G LTE NetworkOkoye Emmanuel Ekene, Ron Ruhl, Pavol Zavarsky. 443-448 [doi]
- Efficient Design of Firewall Temporal PoliciesMahesh Nath Maddumala, Vijay Kumar 0002. 449-454 [doi]
- OCL Fault Injection-Based Detection of LDAP Query Injection VulnerabilitiesHossain Shahriar, Hisham M. Haddad, Pranahita Bulusu. 455-460 [doi]
- Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management FrameworkRajbhooshan Bhakte, Pavol Zavarsky, Sergey Butakov. 461-466 [doi]
- Estimating Mean Time to Compromise Using Non-homogenous Continuous-Time Markov ModelsSubil Mathew Abraham. 467-472 [doi]
- Message from the DSA Workshop OrganizerBaowen Xu. 473 [doi]
- Formal Sequence: Extending UML Sequence Diagram for Behavior Description and Formal VerificationDeshuai Han, Jianchun Xing, Qiliang Yang, Hongda Wang, Xuewei Zhang. 474-481 [doi]
- Empirical Assessment of Corrupt Sensor Data Detection Methods in a RobotGiedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur. 482-489 [doi]
- A Case Study: Verification of an Embedded System Using Abstraction Refinement with RequirementsToshifusa Sekizawa, Makoto Fujiwara, Koichiro Watanabe. 490-493 [doi]
- Message from the UCDAS Workshop OrganizersReyes Juárez-Ramírez, Andrés Mejía-Figueroa. 494-495 [doi]
- "Please, No More GUIs!": A User Study, Prototype Development and Evaluation on the Integration of Attribute-Based Encryption in a Hospital EnvironmentDirk Thatmann, Philip Raschke, Axel Küpper. 496-502 [doi]
- Your Eye Tells How Well You ComprehendJiajia Li, Grace Ngai, Hong Va Leong, Stephen C. F. Chan. 503-508 [doi]
- Emotion Recognition for User Centred E-LearningAkputu K. Oryina, Abiodun O. Adedolapo. 509-514 [doi]
- Does User's Prior Knowledge Worth Consideration?: The Influence of Prior Knowledge Toward Mutual Gaze ConvergenceChidchanok Thepsoonthorn, Takahiro Yokozuka, Jinhwan Kwon, Robin Miao Sin Yap, Shunsuke Miura, Ken-ichiro Ogawa, Yoshihiro Miyake. 515-520 [doi]
- Braille Text Entry on Smartphones: A Systematic Review of the LiteratureJoyce Siqueira, Fabrizzio Alphonsus Alves de Melo Nunes Soares, Deller James Ferreira, Cleyton Rafael Gomes Silva, Luciana de Oliveira Berretta, Cristiane Bastos Rocha Ferreira, Igor Moreira Felix, Anderson da Silva Soares, Ronaldo Martins da Costa, Mateus Machado Luna. 521-526 [doi]
- Recognizing Voice-Based Requirements to Drive Self-Adaptive Software SystemsXiaobing Zhang, Qiliang Yang, Jianchun Xing, Deshuai Han. 534-539 [doi]
- Handling Uncertainty in Self-Adaptive Software Using Self-Learning Fuzzy Neural NetworkDeshuai Han, Jianchun Xing, Qiliang Yang, Juelong Li, Hongda Wang. 540-545 [doi]
- A Service-Oriented User Interaction Analysis Framework Supporting Adaptive ApplicationsMohammad Hashemi, John Herbert. 546-551 [doi]
- Message from the NETSAP and SIMICE Workshop OrganizersKatsuyoshi Iida, Yutaka Miyake, Chung-Huang Yang, Bian Yang, Julien Bringer. 552 [doi]
- The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense StrategyJianjun Zheng, Akbar Siami Namin. 553-558 [doi]
- An Automated ACL Generation System for Secure Internal NetworkHirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura. 559-564 [doi]
- Collaborative Spoofing Detection and Mitigation - SDN Based Looping Authentication for DNS ServicesN. M. Sahri, Koji Okamura. 565-570 [doi]
- Flying Communication Server in case of a Largescale DisasterToru Kobayashi, Hiroaki Matsuoka, Shouta Betsumiya. 571-576 [doi]
- Malware Detection with Deep Neural Network Using Process BehaviorShun Tobiyama, Yukiko Yamaguchi, Hajime Shimada, Tomonori Ikuse, Takeshi Yagi. 577-582 [doi]
- Privacy-Preserving Outsourcing of Data MiningAnna Monreale, Wendy Hui Wang. 583-588 [doi]
- Statistical Tradeoffs between Generalization and Suppression in the De-identification of Large-Scale Data SetsOlivia Angiuli, Jim Waldo. 589-593 [doi]
- Benchmarking Large-Scale Object Storage ServersJaemyoun Lee, Chang Song, Kyungtae Kang. 594-595 [doi]
- Estimating t-Way Fault Profile Evolution During TestingD. Richard Kuhn, Raghu N. Kacker, Yu Lei. 596-597 [doi]
- Experience Report: How Do Metamorphic Relations Perform in Geographic Information Systems TestingZhanwei Hui, Song Huang. 598-599 [doi]
- Dynamic Testing Against Hidden Concurrency Bugs through Abstraction and ProjectionJialin Yang, W. K. Chan. 600-601 [doi]
- An Augmented Cybersecurity Behavioral Research ModelJoyce Addae, Milena Radenkovic, Xu Sun, Dave Towey. 602-603 [doi]
- Hardware Acceleration of Smith-Waterman Algorithm for Short Read DNA Alignment Using FPGAWael Abou El-Wafa, Asmaa G. Seliem, Hesham F. A. Hamed. 604-605 [doi]
- Hands-On Labs for Learning Mobile and NoSQL Database SecurityMinzhe Guo, Kai Qian, Li Yang. 606-607 [doi]
- BrailleÉcran: A Braille Approach to Text Entry on SmartphonesJoyce Siqueira, Fabrizzio Alphonsus Alves de Melo Nunes Soares, Cleyton Rafael Gomes Silva, Luciana de Oliveira Berretta, Cristiane Bastos Rocha Ferreira, Igor Moreira Felix, Mateus Machado Luna. 608-609 [doi]
- Using Real-Time Fear Appeals to Improve Social Media SecurityLei Li, Kai Qian. 610-611 [doi]
- Service Extraction from Business Process Model: An Ontology-Based ApproachAbderrahmane Leshob, Hafedh Mili. 612-613 [doi]
- An Integrated Approach to Deriving Safety and Security Requirements from Safety CasesElena Troubitsyna. 614-615 [doi]
- Exploring Trusted Data Dissemination in a Vehicular Social Network with a Formal Compositional ApproachXiao Chen, Liangmin Wang. 616-617 [doi]
- The Impact of Data Preprocessing on the Performance of a Naive Bayes ClassifierPriyanga Chandrasekar, Kai Qian. 618-619 [doi]
- S-Flink: Schedule for QoS in Flink Using SDNSrinivasan Dwarakanathan. 620-621 [doi]
- Digital Badges to Enhance Skills and Preparation for a Career in Cyber SecurityHossain Shahriar, Svetlana Peletsverger, Humayun Zafar, Bill Bailey, Linda Johnston. 622-623 [doi]
- Anomalous Android Application Detection with Latent Semantic IndexingHossain Shahriar, Victor Clincy. 624-625 [doi]
- Message from the MediComp Workshop OrganizersJi-Jiang Yang, Sheikh Iqbal Ahamed, JianQiang Li. 626 [doi]
- Risk Factors Selection for SGA PredictionHaowen Mo, Lu Liu, JianQiang Li, Ji-Jiang Yang, Xi Meng, Shi Chen, Hui Pan. 627-632 [doi]
- MRI Interpolation for Multiple Sclerosis Lesion QuantificationFabiano Ricardo Farias, Pedro Costa Klein, Ricardo Bernardi Soder, Jefferson Becker, Márcio Sarroglia Pinho. 633-636 [doi]
- A Heart Rate Variability Analysis System Based on LeanCloud and EchartsYang Zheng, Xianxiang Chen, Zhen Fang, Shanhong Xia. 637-640 [doi]
- Semi-Supervised Learning Based on Cataract Classification and GradingWenai Song, Ping Wang, Xudong Zhang, Qing Wang. 641-646 [doi]
- Scalable Cloud-Based Analysis Framework for Medical Big-DataRezvan Pakdel, John Herbert. 647-652 [doi]
- Pattern Recognition for Large-Scale and Incremental Time Series in HealthcareBo Liu, JianQiang Li, Ji-Jiang Yang, Jing Bi, Rong Li, Yong Li. 653-658 [doi]
- A Software Tool for Floating Point Interval Analysis with Improved Precision for Javascript-Based Medical ApplicationsKhalid Alghamdi, Nabil Almashfi, Hua Ming. 659-662 [doi]
- Project and Preliminary Evaluation of VR-MED, a Domain-Specific Language for Serious Games in Family Medicine TeachingJoão Batista Mossmann, Rafael Rieder, Cecilia Dias Flores, Márcio Sarroglia Pinho. 663-667 [doi]