Abstract is missing.
- Message from SETA 2017 Program ChairsHridesh Rajan, Alexander Bolotov, Chang Xu. 1 [doi]
- Message from SETA 2017 Symposium ChairsRicky Chan, Hong Zhu. 2 [doi]
- An Empirical Comparison of Similarity Measures for Abstract Test Case PrioritizationRubing Huang, Yunan Zhou, Weiwen Zong, Dave Towey, Jinfu Chen. 3-12 [doi]
- Identifying Core Objects for Trace Summarization Using Reference Relations and Access AnalysisKunihiro Noda, Takashi Kobayashi, Tatsuya Toda, Noritoshi Atsumi. 13-22 [doi]
- LeakDAF: An Automated Tool for Detecting Leaked Activities and Fragments of Android ApplicationsMa Jun, Liu-sheng, Shengtao Yue, XianPing Tao, Lu Jian. 23-32 [doi]
- Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable NamesWeifeng Xu, Dianxiang Xu, Lin Deng. 33-38 [doi]
- Modeling and Analysis of the Security Protocol in C-DAX Based on Process AlgebraAilun Liu, Huibiao Zhu, Yuan-fei, Shuangqing Xiang, Gang Lu, Wanling Xie. 39-44 [doi]
- A Proof System for mCWQWanling Xie, Xi Wu, Huibiao Zhu, Gang Lu, Ailun Liu. 45-50 [doi]
- FeSCH: A Feature Selection Method using Clusters of Hybrid-data for Cross-Project Defect PredictionChao Ni, Wangshu Liu, Qing Gu, Xiang Chen, Daoxu Chen. 51-56 [doi]
- Toward Understanding Information Models of Fault Localization: Elaborate is Not Always BetterYan Lei, Xiaoguang Mao, Min Zhang, Jingan Ren, Yinhua Jiang. 57-66 [doi]
- Comprehensive Static Analysis for Configurable Software via Combinatorial InstantiationDong Yan, Linjie Pan, Rongjie Yan, Jun Yan, Jian Zhang. 67-74 [doi]
- Who Should Be Selected to Perform a Task in Crowdsourced Testing?Qiang Cui, Junjie Wang, Guowei Yang, Miao Xie, Qing Wang, Mingshu Li. 75-84 [doi]
- A Constraint-Pattern Based Method for Reachability DeterminationYuexing Wang, Zuxing Gu, Xi Cheng, Min Zhou, Xiaoyu Song, Ming Gu 0001, Jiaguang Sun. 85-90 [doi]
- Defining and Validating a Client-Based Cohesion Metric for Object-Oriented ClassesMusaad Alzahrani, Austin Melton. 91-96 [doi]
- Towards an Agent-Oriented Framework for Multidisciplinary Decision Support and Its Application to Triple Assessment of Breast CancerLiang Xiao, John Fox. 97-102 [doi]
- Revisiting the Correlation Between Alerts and Software Defects: A Case Study on MyFaces, Camel, and CXFMeng Yan, Xiaohong Zhang, Ling Xu, Haibo Hu, Song Sun, Xin Xia. 103-108 [doi]
- Quality Assessment of Interaction Techniques in Immersive Virtual Environments Using Physiological MeasuresRafael Rieder, Christian Haag Kristensen, Márcio Sarroglia Pinho. 109-117 [doi]
- Interactively Decomposing Composite Changes to Support Code Review and Regression TestingBo Guo, Myoungkyu Song. 118-127 [doi]
- Can Developers' Interaction Data Improve Change Recommendation?Akihiro Yamamori, Anders Mikael Hagward, Takashi Kobayashi. 128-137 [doi]
- An Approach to Proving Proof Obligation of Hybrid Event B Based on Differential InvariantsJie Liu, Jing Liu, Miaomiao Zhang, Haiying Sun, Xiaohong Chen, Dehui Du, Mingsong Chen. 138-143 [doi]
- Preserving the Benefits of Open Government Data by Measuring and Improving Their Quality: An Empirical StudyMarco Torchiano, Antonio Vetro, Francesca Iuliano. 144-153 [doi]
- Assertion Recommendation for Formal Program VerificationCong Wang, Fei He, Xiaoyu Song, Yu Jiang, Ming Gu 0001, Jiaguang Sun. 154-159 [doi]
- A Hierarchical Categorization Approach for Configuration Management ModulesWei Chen, Peixing Xu, Wensheng Dou, Guoquan Wu, Chushu Gao, Jun Wei. 160-169 [doi]
- Supporting the Development of Agent-Based Simulations: A DSL for Environment ModelingFernando dos Santos, Ingrid Nunes, Ana L. C. Bazzan. 170-179 [doi]
- Tool-Supported Collaborative Requirements PrioritisationPaolo Busetta, Fitsum Meshesha Kifetew, Denisse Muñante, Anna Perini, Alberto Siena, Angelo Susi. 180-189 [doi]
- Finding Extract Method Refactoring Opportunities by Analyzing Development HistoryAyaka Imazato, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto. 190-195 [doi]
- Infer Precise Program Invariant Using Abstract Interpretation with Recurrence SolvingZhenpeng Fang, Xibin Zhao, Min Zhou. 196-201 [doi]
- XMLValue: XML Configuration Attribute Value RecommendationYiqi Lu, Jiaqing Liang, Yanghua Xiao, Sheng Huang, Deqing Yang, Wei Wang 0009, Haibo Lin. 202-207 [doi]
- Tester Experience: Concept, Issues and DefinitionOswald Mesumbe Ekwoge, Awdren De Lima Fontão, Arilo Claudio Dias Neto. 208-213 [doi]
- Xdroid: Testing Android Apps with Dependency InjectionChun Cao, Chenglin Meng, Hongjun Ge, Ping Yu, Xiaoxing Ma. 214-223 [doi]
- Towards Variability Management in Bidirectional Model TransformationXiao He, Zhenjiang Hu, Yi Liu. 224-233 [doi]
- Models of Connected Things: On Priced Probabilistic Timed ReoKangli He, Holger Hermanns, Yixiang Chen. 234-243 [doi]
- An Empirical Analysis on Effective Fault Prediction Model Developed Using Ensemble MethodsLov Kumar, Santanu Kumar Rath, Ashish Sureka. 244-249 [doi]
- Pain Points for Novice Programmers of Ambient Intelligence Systems: An Exploratory StudyFulvio Corno, Luigi De Russis, Juan Pablo Sáenz. 250-255 [doi]
- Fault Classification Oriented Spectrum Based Fault LocalizationXiujing Liu, Yong Liu, Zheng Li, Ruilian Zhao. 256-261 [doi]
- ISO/IEC 25010 Based Evaluation of Free Mobile Personal Health Records for Pregnancy MonitoringAli Idri, Mariam Bachiri, José Luis Fernández Alemán, Ambrosio Toval. 262-267 [doi]
- Using MDA to Automate the Integration of Virtual Platforms for System-Level SimulationDavid Perillo, Marco Di Natale. 268-277 [doi]
- An ICE Compliant Component Model for Medical Systems DevelopmentImad Eddine Touahria, Marisol García-Valls, Abdellah Khababa. 278-287 [doi]
- Tool Support for Managing Clone Refactorings to Facilitate Code Review in Evolving SoftwareZhiyuan Chen, Maneesh Mohanavilasam, Young-Woo Kwon, Myoungkyu Song. 288-297 [doi]
- A High-Level DSL for Geospatial Visualizations with Multi-core Parallelism SupportCleverson Ledur, Dalvan Griebler, Isabel Harb Manssour, Luiz Gustavo Fernandes. 298-304 [doi]
- The Need for Traceability in Heterogeneous Systems: A Systematic Literature ReviewNasser Mustafa, Yvan Labiche. 305-310 [doi]
- Incremental Annotate-Generalize-Search Framework for Interactive Source Code ComprehensionKen Nakayama, Shun'ichi Tano, Tomonori Hashiyama, Eko Sakai. 311-316 [doi]
- Detecting Java Code Clones with Multi-granularities Based on BytecodeDongjin Yu, Jie Wang, Qing Wu, Jiazha Yang, Jiaojiao Wang, Wei Yang, Wei Yan. 317-326 [doi]
- Supporting the Specification and Serialization of Planned Architectures in Architecture-Driven Modernization ContextAndre de S. Landi, Fernando Chagas, Bruno M. Santos, Renato S. Costa, Rafael Serapilha Durelli, Ricardo Terra, Valter Vieira de Camargo. 327-336 [doi]
- GenLog: Accurate Log Template Discovery for Stripped X86 BinariesMaosheng Zhang, Ying Zhao, Zengmingyu He. 337-346 [doi]
- A Situation-Centric Approach to Identifying New User Intentions Using the MTL MethodJingwei Yang, Carl K. Chang, Hua Ming. 347-356 [doi]
- State-Based Tests Suites Automatic Generation Tool (STAGE-1)Hoda Khalil, Yvan Labiche. 357-362 [doi]
- Mediating Turf Battles! Prioritizing Shared Modules in Locating Multiple FeaturesMaaki Nakano, Kunihiro Noda, Shinpei Hayashi, Takashi Kobayashi. 363-368 [doi]
- On the Composibility of Design Patterns: Extended AbstractHong Zhu, Ian Bayley. 369-370 [doi]
- Mining Capstone Project Wikis for Knowledge DiscoverySwapna Gottipati, Venky Shankararaman, Melvrick Goh. 371-380 [doi]
- Experimental Validation of a Massive Educational Service in a Blended Learning EnvironmentElena Baralis, Luca Cagliero, Laura Farinetti, Marco Mezzalama, Enrico Venuto. 381-390 [doi]
- A Microservice-Based MOOL in Acoustics Addressing the Learning-at-Scale ScenarioAntonella Longo, Marco Zappatore. 391-400 [doi]
- Test-Driven Summarization: Combining Formative Assessment with Teaching Document SummarizationLuca Cagliero, Laura Farinetti, Elena Baralis. 401-406 [doi]
- Self-Paced Approach in Synergistic Model for Supporting and Testing StudentsAlice Barana, Marina Marchisio, Alessandro Bogino, Lorenza Operti, Michele Fioravera, Sergio Rabellino, Francesco Floris. 407-412 [doi]
- Toward Blocks-Text ParityChris Johnson, Adrian Abundez-Arce. 413-419 [doi]
- Teaching Test-First Programming: Assessment and SolutionsMarcello Missiroli, Daniel Russo 0002, Paolo Ciancarini. 420-425 [doi]
- SEABED: An Open-Source Software Engineering Case-Based Learning DatabaseVeena Saini, Paramvir Singh, Ashish Sureka. 426-431 [doi]
- Adaptive Teaching Supported by ICTs to Reduce the School Failure in the Project "Scuola Dei Compiti"Alice Barana, Michele Fioravera, Marina Marchisio, Sergio Rabellino. 432-437 [doi]
- Cloud Adapted Workflow e-Assessment System: Cloud-AWASFahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 438-447 [doi]
- Evaluating the Use of Virtual Reality on Professional Robotics EducationMauro Cesar Charao dos Santos, Vicenzo Abichequer Sangalli, Márcio Sarroglia Pinho. 448-455 [doi]
- Combinations of Personal Characteristic Types and Learning Effectiveness of TeamsHironori Washizaki, Yusuke Sunaga, Masashi Shuto, Katsuhiko Kakehi, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo, Bastian Tenbergen. 456-457 [doi]
- Message from the CAP 2017 Organizing CommitteeCristina Seceleanu, Hironori Kasahara, Tiberiu Seceleanu. 458 [doi]
- An Extensible Pervasive Platform for Large-Scale Anticipatory Mobile ComputingChristian Meurisch, Bennet Jeutter, Wladimir Schmidt, Nickolas Gundling, Benedikt Schmidt, Fabian Herrlich, Max Mühlhäuser. 459-464 [doi]
- A Novel Integrated Architecture for Ambient Assisted Living SystemsAshalatha Kunnappilly, Alexandru Sorici, Imad Alex Awada, Irina Mocanu, Cristina Seceleanu, Adina Magda Florea. 465-472 [doi]
- RefCRE: A Reference Count Based Rewriting Framework for VM Image RestorationJiwei Xu, Xiaozhao Xing, Tao Wang, Zhigang Lu, Wenbo Zhang. 473-482 [doi]
- xB+-Tree: Access-Pattern-Aware Cache-Line-Based Tree for Non-volatile Main Memory ArchitectureLi-Zheng Liang, Ming-Chang Yang, Yuan-Hao Chang, Tseng-Yi Chen, Shuo-Han Chen, Hsin-Wen Wei, Wei Kuan Shih. 483-491 [doi]
- Multicore Cache Coherence Control by a Parallelizing CompilerHironori Kasahara, Keiji Kimura, Boma A. Adhi, Yuhei Hosokawa, Yohei Kishimoto, Masayoshi Mase. 492-497 [doi]
- Message from the NCIW Program Co-chairsTugkan Tuglular, Ying Cai. 498 [doi]
- Formalization and Verification of the PKMv3 Protocol Using CSPYuanmin Xu, Huibiao Zhu, Xiaoran Zhu, Xi Wu, Jian Guo, Gang Lu. 499-504 [doi]
- Cardinality Counting Circuit for Real-Time Abnormal Traffic DetectionShuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa. 505-510 [doi]
- Cache Effect of Shared DNS ResolverKazunori Fujiwara, Akira Sato, Kenichi Yoshida. 511-516 [doi]
- A Framework for User-Friendly Verification-Oriented VNF ModelingGuido Marchetto, Riccardo Sisto, Matteo Virgilio, Jalolliddin Yusupov. 517-522 [doi]
- Router Position-Based Cooperative Caching for Video-on-Demand in Information-Centric NetworkingZhe Zhang, Chung-Horng Lung, Ioannis Lambadaris, Marc St-Hilaire, Sankarshan Sakkarepattana Nagaraja Rao. 523-528 [doi]
- Automatic Construction of Name-Bound Virtual Networks for IoTKenji Fujikawa, Ved P. Kafle, Pedro Martinez-Julia, Abu Hena Al Muktadir, Hiroaki Harai. 529-537 [doi]
- Analysis of Geographic DTN Routing under Random Walk Mobility ModelDaiki Matsui, Ryo Hagihara, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 538-547 [doi]
- Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc NetworkBata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman. 548-556 [doi]
- Supporting Interoperability among Web Services Through Efficient MatchingXiaocao Hu, Zhiyong Feng, Keman Huang, Shizhan Chen. 557-566 [doi]
- Practical Enhancement and Evaluation of a Low-Latency Network Model Using Mobile Edge ComputingKrittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga, Katsunori Yamaoka. 567-574 [doi]
- CoAP-CTX: A Context-Aware CoAP Extension for Smart Objects Discovery in Internet of ThingsFelipe Mota Barreto, Paulo A. de S. Duarte, Marcio E. F. Maia, Rossana M. de Castro Andrade, Windson Viana. 575-584 [doi]
- Message from SEPT 2017 Organizing CommitteeKatsuyoshi Iida, Mohammad Zulkernine. 585 [doi]
- Enforcing Generalized Refinement-Based Noninterference for Secure Interface CompositionCong Sun, Ning Xi, Jianfeng Ma. 586-595 [doi]
- Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring ApproachBabatunde Ojetunde, Naoki Shibata, Juntao Gao. 596-601 [doi]
- Authenticating Preference-Oriented Multiple Users Spatial QueriesXiaoran Duan, Yong Wang, Juguang Chen, Junhao Zhang. 602-607 [doi]
- An In-depth Concealed File System with GPS Authentication Adaptable for Multiple LocationsYong Jin, Masahiko Tomoishi, Satoshi Matsuura. 608-613 [doi]
- Automated Crash Filtering Using Interprocedural Static Analysis for Binary CodesHyeon-Gu Jeon, Seong-Kyun Mok, Eun-Sun Cho. 614-623 [doi]
- Seer: A Lightweight Online Failure Prediction ApproachBurcu Ozcelik, Cemal Yilmaz. 624-625 [doi]
- Physical Attestation in the Smart Grid for Distributed State VerificationThomas P. Roth, Bruce M. McMillin. 626-627 [doi]
- SecretSafe: A Lightweight Approach against Heap Buffer Over-Read AttackXiaoguang Wang, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang. 628-636 [doi]
- Challenge to Impede Deep Learning against CAPTCHA with Ergonomic DesignTomoka Azakami, Chihiro Shibata, Ryuya Uda. 637-642 [doi]
- DomainChroma: Providing Optimal Countermeasures against Malicious Domain NamesDaiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto. 643-648 [doi]
- Claimsware: A Claims-Based Middleware for Securing IoT ServicesVathalloor Merin George, Qusay H. Mahmoud. 649-654 [doi]
- Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph SimilaritiesToshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada. 655-664 [doi]
- TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri. 665-674 [doi]
- An Inferential Metamorphic Testing Approach to Reduce False Positives in SQLIV Penetration TestLei Liu, Guoxin Su, Jing Xu, Biao Zhang, Jiehui Kang, Sihan Xu, Peng Li, Guannan Si. 675-680 [doi]
- Message from the Student Research Symposium ChairsClaudio Demartini, Kenichi Yoshida, Luigi De Russis. 681 [doi]
- Research on Integrated Authentication Using Passwordless Authentication MethodMichitomo Morii, Hiroki Tanioka, Kenji Ohira, Masahiko Sano, Yosuke Seki, Kenji Matsuura, Tetsushi Ueta. 682-685 [doi]
- On the Effect of Scale-Free Structure of Network Topology on Performance of Content-Centric NetworkingRyo Nakamura, Hiroyuki Ohsaki. 686-689 [doi]
- A Fluid-Based Model of a Transport Protocol in Content-Centric NetworkingTsuyoshi Yabuuchi, Ryo Nakamura, Hiroyuki Ohsaki. 690-693 [doi]
- How GitHub Contributing.md Contributes to ContributorsNaoki Kobayakawa, Kenichi Yoshida. 694-696 [doi]
- On the Effectiveness of Link Addition for Improving Robustness of Multiplex Networks against Layer Node-Based AttackYui Kazawa, Sho Tsugawa. 697-700 [doi]
- On Message Delivery Delay of Epidemic DTN Routing with Broadcasting ACKsNatsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 701-704 [doi]
- Fogonomics - The Strategic, Economic, and Financial Aspects of the CloudJoe Weinman. 705 [doi]
- Application Deployment through the FogAntonio Brogi. 706 [doi]
- Secure Fog Computing for Smart LivingBruce M. McMillin. 707 [doi]
- FA2ST: Fog as a Service TechnologyYang Yang. 708 [doi]
- The Adoption of Emerging Technology: Technology Before RequirementsStephen J. Andriole. 709-713 [doi]
- Process Patterns: Reusable Design Artifacts for Business Process ModelsMuhammad Ashad Kabir, Zhenchang Xing, Prakash Chandrasekaran, Shang-Wei Lin. 714-721 [doi]
- Situation-Aware Data-Driven Decision Making in Smart Environments Using the MapReduceHoda Gholami, Carl K. Chang. 722-730 [doi]
- Tool Integration in the Aerospace Domain: A Case StudyIacopo Vagliano, Davide Ferretto, Eugenio Brusa, Maurizio Morisio, Laura Valacca. 731-736 [doi]
- Strategies and Challenges on the Accessibility and Interoperability of e-Government Web Portals: A Case Study on Brazilian Federal UniversitiesAlberto Dumont Alves Oliveira, Marcelo Medeiros Eler. 737-742 [doi]
- Software Industry Practice in Africa: Case Study SudanSaleh Alamdy, Rasha Osman. 743-748 [doi]
- Agent Marketplaces and Deep Learning in Enterprises: The COMPOSITION ProjectDario Bonino, Paolo Vergori. 749-754 [doi]
- DIIG: A Distributed Industrial IoT GatewayMasoud Hemmatpour, Mohammad Ghazivakili, Bartolomeo Montrucchio, Maurizio Rebaudengo. 755-759 [doi]
- Towards Verifiable Safe and Correct Medical Best Practice Guideline SystemsChunhui Guo, Zhicheng Fu, Shangping Ren, Yu Jiang, Lui Sha. 760-765 [doi]
- Inference of Extreme Synchrony with an Entropy Measure on a Bipartite NetworkAki-Hiro Sato. 766-771 [doi]
- Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data SystemHongyan Tang, Ying Li, Long Wang, Jing Gu, Zhonghai Wu. 772-777 [doi]
- R-Extractor: A Method for Data Extraction from Template-Based Entity-PagesEdimar Manica, Carina F. Dorneles, Renata Galante. 778-787 [doi]
- Container Rebalancing: Towards Proactive Linux Containers Placement Optimization in a Data CenterPongsakorn U.-Chupala, Yasuhiro Watashiba, Kohei Ichikawa, Susumu Date, Hajimu Iida. 788-795 [doi]
- HybridFS - A High Performance and Balanced File System Framework with Multiple Distributed File SystemsLidong Zhang, Yongwei Wu, Ruini Xue, Tse-Chuan Hsu, Hongji Yang, Yeh-Ching Chung. 796-805 [doi]
- A Parallel Self-Organizing Community Detection Algorithm Based on Swarm Intelligence for Large Scale Complex NetworksHanlin Sun, Wei Jie, Christian Sauer, Sugang Ma, Gang Han, Zhongmin Wang, Kui Xing. 806-815 [doi]
- KANDOR - Knowledge Analysis of Neighborhood Dynamics and Online RelationshipsRicardo Chagas Rapacki, Leandro Krug Wives, Renata Galante. 816-821 [doi]
- An Adaptive Diversity-Based Ensemble Method for Binary ClassificationXing Fan, Chung-Horng Lung, Samuel A. Ajila. 822-827 [doi]
- Combining Word and Character N-Grams for Detecting Deceptive OpinionsAl Hafiz Akbar Maulana Siagian, Masayoshi Aritsugi. 828-833 [doi]
- Message from HCSC Organizing CommitteeMoushumi Sharmin, Jalal Mahmud. 834 [doi]
- Opportunities and Challenges in Designing Participant-Centric Smoking Cessation SystemMoushumi Sharmin, Theodore Weber, Hillol Sarker, Nazir Saleheen, Santosh Kumar 0001, Shameem Ahmed, Mustafa al'Absi. 835-844 [doi]
- Simple Group Photo Sharing Using FacesenseNova Ahmed, Minhaz Ahmed Syrus, Arshad M. Chowdhury. 845-850 [doi]
- Tactile Interface Design for Helping Mobility of People with Visual DisabilitiesChristian Lykawka, Bruno Konzen Stahl, Márcia de Borba Campos, Jaime Sanchez, Márcio Sarroglia Pinho. 851-860 [doi]
- Understanding the Feasibility of a Location-Aware Mobile-Based 911-Like Emergency Service in BangladeshMd Monsur Hossain, Moushumi Sharmin, Shameem Ahmed. 861-868 [doi]
- Your Mouse Reveals Your Next Activity: Towards Predicting User Intention from Mouse InteractionEugene Yujun Fu, Tiffany C. K. Kwok, Erin You Wu, Hong Va Leong, Grace Ngai, Stephen C. F. Chan. 869-874 [doi]
- Spreadsheet Element Sharing through SynchronizationMassimo Maresca, Pierpaolo Baglietto. 875-880 [doi]
- Users Interfaces Adaptation for Visually Impaired Users Based on Meta-Model TransformationLamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 881-886 [doi]
- Message from the EATA 2017 Co-ChairsAli R. Hurson, Hiroyuki Sato. 887 [doi]
- Ontology-Based Social Media Analysis for Urban PlanningXinxin Gao, Wencheng Yu, Yilong Rong, Songmao Zhang. 888-896 [doi]
- Improving Mobility in Smart Cities with Intelligent Tourist Trip PlanningPetar Mrazovic, Josep-Lluís Larriba-Pey, Mihhail Matskin. 897-907 [doi]
- SNS Agency Robot for Elderly People Using External Cloud-Based ServicesToru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai. 908-913 [doi]
- Building Energy Modelling and Monitoring by Integration of IoT Devices and Building Information ModelsLorenzo Bottaccioli, Alessandro Aliberti, Francesca Ugliotti, Edoardo Patti, Anna Osello, Enrico Macii, Andrea Acquaviva. 914-922 [doi]
- Efficient Worker Selection Through History-Based Learning in CrowdsourcingTarek Awwad, Nadia Bennani, Konstantin Ziegler, Veronika Sonigo, Lionel Brunie, Harald Kosch. 923-928 [doi]
- Collaborative Computation Offloading in Heterogeneous Asynchronous Cloud EnvironmentLei Ma, Bing Yu, Hiroyuki Sato, Yadong Wang. 929-934 [doi]
- Dynamic Data Flow Processing in Edge Computing EnvironmentsYuuichi Teranishi, Takashi Kimata, Hiroaki Yamanaka, Eiji Kawai, Hiroaki Harai. 935-944 [doi]
- Message from the MOWU 2017 Organizing CommitteeVladimir Getov, Hong Va Leong. 945-947 [doi]
- CAOS: A Context Acquisition and Offloading SystemFrancisco A. A. Gomes, Paulo A. L. Rego, Lincoln S. Rocha, José N. de Souza, Fernando Trinta. 957-966 [doi]
- A Novel Real-Time Non-invasive Hemoglobin Level Detection Using Video Images from Smartphone CameraGolam Mushih Tanimul Ahsan, Md. Osman Gani, Md. K. Hasan, Sheikh Iqbal Ahamed, William C. Chu, Mohammad Adibuzzaman, Joshua Field. 967-972 [doi]
- Polynomial classification model for real-time fall prediction systemMasoud Hemmatpour, Milad Karimshoushtari, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo, Carlo Novara. 973-978 [doi]
- Enabling Flexible and Efficient Remote Execution in Opportunistic Networks through Message-Oriented MiddlewareMinh Le, Myoungkyu Song, Young-Woo Kwon. 979-984 [doi]