Abstract is missing.
- Message from SETA 2018 Symposium ChairsW. K. Chan 0001, Hong Zhu. 1 [doi]
- An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning FrameworkLov Kumar, Ashish Sureka. 2-11 [doi]
- EFSM-Oriented Minimal Traces Set Generation Approach for Web ApplicationsWeiwei Wang, Junxia Guo, Zheng Li, Ruilian Zhao. 12-21 [doi]
- DevOps Improvements for Reduced Cycle Times with Integrated Test Optimizations for Continuous IntegrationDusica Marijan, Marius Liaaen, Sagar Sen. 22-27 [doi]
- A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional RequirementsPeng Sun, Jingwei Yang, Hua Ming, Carl K. Chang. 28-37 [doi]
- A Framework for Updating Functionalities Based on the MAPE Loop MechanismShinya Tsuchida, Hiroyuki Nakagawa, Emiliano Tramontana, Andrea Fornaia, Tatsuhiro Tsuchiya. 38-47 [doi]
- Using Code Evolution Information to Improve the Quality of Labels in Code Smell DatasetsYijun Wang, Songyuan Hu, Linfeng Yin, Xiaocong Zhou. 48-53 [doi]
- Combining Constraint Solving with Different MOEAs for Configuring Large Software Product Lines: A Case StudyHuiqun Yu, Kai Shi 0006, Jianmei Guo, Guisheng Fan, Xingguang Yang, Liqiong Chen. 54-63 [doi]
- Cross-Project Change-Proneness PredictionChao Liu 0014, Dan Yang 0001, Xin Xia 0001, Meng Yan, Xiaohong Zhang 0002. 64-73 [doi]
- Visualizing a Tangled Change for Supporting Its Decomposition and Commit ConstructionSarocha Sothornprapakorn, Shinpei Hayashi, Motoshi Saeki. 74-79 [doi]
- An Assertion Framework for Mobile Robotic Programming with Spatial ReasoningHao Sun, Xiaoxing Ma, Tiansi Dong, Armin B. Cremers, Chun Cao. 80-89 [doi]
- Exploration Scheduling for Replay Events in GUI Testing on Android AppsChia-Hui Lin, Cheng-Zen Yang, Peng Lu, Tzu-Heng Lin, Zhi-Jun You. 90-99 [doi]
- DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code LevelJunaid Akram, Zhendong Shi, Majid Mumtaz, Ping Luo. 100-105 [doi]
- DistGear: A Lightweight Event-Driven Framework for Developing Distributed ApplicationsJunming Ma, Bo An, Xiangqun Chen, Donggang Cao. 106-115 [doi]
- A Lightweight Program Dependence Based Approach to Concurrent Mutation AnalysisChang-ai Sun, Jingting Jia, Huai Liu, Xiangyu Zhang. 116-125 [doi]
- GBRAD: A General Framework to Evaluate Design Strategies for Hybrid Race DetectionJialin Yang, Wing Kwong Chan, Yuen-Tak Yu, Jacky Keung. 126-131 [doi]
- SPESC: A Specification Language for Smart ContractsXiao He, Bohan Qin, Yan Zhu, Xing Chen, Yi Liu. 132-137 [doi]
- An Insight Into the Impact of Dockerfile Evolutionary Trajectories on Quality and LatencyYang Zhang, Gang Yin, Tao Wang, Yue Yu, Huaimin Wang. 138-143 [doi]
- Improving Cluster Resource Efficiency with OversubscriptionJie Chen, Chun Cao, Ying Zhang, Xiaoxing Ma, Haiwei Zhou, Chengwei Yang. 144-153 [doi]
- Automatic Detection of Outdated Comments During Code ChangesZhiyong Liu, Huanchao Chen, Xiangping Chen, Xiaonan Luo, Fan Zhou 0001. 154-163 [doi]
- Automatically Detecting the Scopes of Source Code CommentsHuanchao Chen, Zhiyong Liu, Xiangping Chen, Fan Zhou 0001, Xiaonan Luo. 164-173 [doi]
- Search-Based Efficient Automated Program Repair Using Mutation and Fault LocalizationShuyao Sun, Junxia Guo, Ruilian Zhao, Zheng Li. 174-183 [doi]
- Identifying Supplementary Bug-fix CommitsTao Ji, Jinkun Pan, Liqian Chen, Xiaoguang Mao. 184-193 [doi]
- A Generalized Approach to Verification Condition GenerationCláudio Belo Lourenço, Maria João Frade, Shin Nakajima 0001, Jorge Sousa Pinto. 194-203 [doi]
- Runtime Verification of Robots Collision Avoidance Case StudyChenxia Luo, Rui Wang, Yu Jiang, Kang Yang, Yong Guan, Xiaojuan Li, Zhiping Shi. 204-212 [doi]
- Formalization and Verification of Mobile Systems Calculus Using the Rewriting Engine MaudeWanling Xie, Huibiao Zhu, Min Zhang, Gang Lu, Yucheng Fang. 213-218 [doi]
- Predicting the Breakability of Blocking Bug PairsHui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu. 219-228 [doi]
- Precise Extraction of Malicious BehaviorsKhanh-Huu-The Dam, Tayssir Touili. 229-234 [doi]
- ReTestDroid: Towards Safer Regression Test Selection for Android ApplicationBo Jiang 0001, Yu Wu, Yongfei Zhang, Zhenyu Zhang 0004, W. K. Chan 0001. 235-244 [doi]
- How Do Software Metrics Affect Test Case Prioritization?Masataka Ozawa, Tadashi Dohi, Hiroyuki Okamura. 245-250 [doi]
- Test Case Prioritization Based on Method Call SequencesJianlei Chi, Yu Qu, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu 0002. 251-256 [doi]
- Model Checking of Embedded Systems Using RTCTL While Generating Timed Kripke StructureYajun Wu, Satoshi Yamane. 257 [doi]
- Model Checking Coordination of CPS Using Timed AutomataKaiqiang Jiang, Chunlin Guan, Jiahui Wang, Dehui Du. 258-263 [doi]
- Towards Modeling Cyber-Physical Systems with SysML/MARTE/pCCSLPing Huang, Kaiqiang Jiang, Chunlin Guan, Dehui Du. 264-269 [doi]
- Modeling and Verifying MooseFS in CSPYucheng Fang, Huibiao Zhu, Gang Lu, Lili Xiao, Wanling Xie. 270-275 [doi]
- PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch MispredictionsTing Chen 0002, Wanyu Huang, Muhui Jiang, Xiapu Luo, Lei Xue, Ying Wang, Xiaosong Zhang. 276-285 [doi]
- Structural Function Based Code Clone Detection Using a New Hybrid TechniqueYanming Yang, Zhilei Ren, Xin Chen, He Jiang. 286-291 [doi]
- A Structural Analysis Method of OSS Development Community Evolution Based on A Semantic Graph ModelSeiya Kato, Yota Inagaki, Mikio Aoyama. 292-297 [doi]
- Effective Discrete Memetic Algorithms for Covering Array GenerationXu Guo, Xiaoyu Song, Jiantao Zhou. 298-303 [doi]
- Loop Invariant Generation for Non-monotone Loop StructuresChunyan Hou, Jinsong Wang, Chen Chen 0012, Kai Shi 0002. 304-309 [doi]
- On the Selection of Strength for Fixed-Strength Interaction Coverage Based PrioritizationRubing Huang, Weiwen Zong, Tsong Yueh Chen, Dave Towey, Jinfu Chen, Yunan Zhou, Weifeng Sun. 310-315 [doi]
- Message from the HCSC 2018 Workshop OrganizersMoushumi Sharmin, Katsunori Oyama, Claudio Giovanni Demartini. 316 [doi]
- Coarsening Networks Based on Local Link Similarity for Community DetectionYuzhu Wu, Qianwen Zhang, Jinkui Xie. 317-326 [doi]
- What Graphs do International Investors See in the ASEAN Capital Markets?Uthai Tanlamai. 327-332 [doi]
- Decision Making Support of UAV Path Planning for Efficient Sensing in Radiation Dose MappingTokishi Morita, Katsunori Oyama, Taiju Mikoshi, Toshihiro Nishizono. 333-338 [doi]
- A Japanese Software Keyboard for Tablets that Reduces User FatigueTeppei Yajima, Hiroshi Hosobe. 339-346 [doi]
- An Aurora Image Classification Method based on Compressive Sensing and Distributed WKNNYichun Li, Ningkang Jiang. 347-354 [doi]
- Localized Traffic Sign Detection with Multi-scale Deconvolution NetworksSongwen Pei, Fuwu Tang, Yanfei Ji, Jing Fan, Zhong Ning. 355-360 [doi]
- Teaching Autonomous Driving Using a Modular and Integrated ApproachJie Tang 0003, Shaoshan Liu, Songwen Pei, Stéphane Zuckerman, Chen Liu 0001, Weisong Shi, Jean-Luc Gaudiot. 361-366 [doi]
- Machine Learning Assisted High-Definition Map CreationJialin Jiao. 367-373 [doi]
- Message from the 2018 DSAT Technical Program ChairsKathy Grise, Maria Lee. 380-381 [doi]
- Knowledge Map Construction Using Text Mining and Artificial Bee Colony AlgorithmChieh-Yuan Tsai, Wei-Zhong Ji. 382-387 [doi]
- Mining Rules from Real-Valued Time Series: A Relative Information-Gain-Based ApproachYuanduo He, Xu Chu, Guangju Peng, Yasha Wang, Zhu Jin, Xiaorong Wang. 388-397 [doi]
- World Grid Square Data Reference Framework and its Potential ApplicationsAki-Hiro Sato, Shoki Nishimura, Tsuyoshi Namiki, Naoki Makita, Hiroe Tsubaki. 398-409 [doi]
- A Local Cores-Based Hierarchical Clustering Algorithm for Data Sets with Complex StructuresDongdong Cheng, Qingsheng Zhu, Quanwang Wu. 410-419 [doi]
- Web Items Recommendation Based on Multi-View ClusteringHong Yu, Tiantian Zhang, Jiaxin Chen, Chen Guo, Yahong Lian. 420-425 [doi]
- Characterizing Common and Domain-Specific Package Bugs: A Case Study on UbuntuXiaoxue Ren, Qiao Huang, Xin Xia 0001, Zhenchang Xing, Lingfeng Bao, David Lo 0001. 426-431 [doi]
- Deciphering Big Data Research ThemesTsung Teng Chen, Maria R. Lee. 432-437 [doi]
- Towards Lambda-Based Near Real-Time OLAP over Big DataAlfredo Cuzzocrea, Rim Moussa. 438-441 [doi]
- Characterizing Incidents in Cloud-Based IoT Data AnalyticsHong Linh Truong, Manfred Halper. 442-447 [doi]
- Efficient Discovery of Traveling Companion from Evolving Trajectory Data StreamSutheera Puntheeranurak, Thi Thi Shein, Makoto Imamura. 448-453 [doi]
- A Software Popularity Recommendation Method Based on Evaluation ModelYan Wang, Pei-Xiang Bai, De-Yu Yang, Jiantao Zhou, Xiaoyu Song. 454-460 [doi]
- Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedInYan Wu, Nitish Dhakal, Dianxiang Xu, Jin-Hee Cho. 461-470 [doi]
- An Improved Promoter Recognition Model Using Convolutional Neural NetworkYing Qian, Yu Zhang, Bingyu Guo, Shasha Ye, Yuzhu Wu, Jiongmin Zhang. 471-476 [doi]
- IT Professional 20th Anniversary PanelSan Murugesan. 477-479 [doi]
- A Deep Learning Approach Based on Stacked Denoising Autoencoders for Protein Function PredictionLester James V. Miranda, Jinglu Hu. 480-485 [doi]
- Faster Deep Q-Learning Using Neural Episodic ControlDaichi Nishio, Satoshi Yamane. 486-491 [doi]
- Automated Dental Image Analysis by Deep Learning on Small DatasetJie Yang, Yuchen Xie, Lin Liu, Bin Xia, Zhanqiang Cao, Chuanbin Guo. 492-497 [doi]
- A Service-Oriented Approach to Modeling and Reusing Event CorrelationsYanbo Han, Meiling Zhu, Chen Liu 0007. 498-507 [doi]
- Elucidating Which Pairwise Mutations Affect Protein Stability: An Exhaustive Big Data ApproachNicholas Majeske, Filip Jagodzinski. 508-515 [doi]
- DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding ConversationSixing Wu, Ying Li 0015, Xinyuan Zhang, Zhonghai Wu. 516-521 [doi]
- BDViewer - A Web-Based Big Data Processing and Visualization ToolYan Li, Junming Ma, Bo An, Donggang Cao. 522-527 [doi]
- Optimising Toward Completed Videos in an Online Video Advertising ExchangeDouglas McIlwraith, Andrea Catalucci, Sam Boyd, Raouf Aghrout, Yike Guo. 528-533 [doi]
- Message from EATA Symposium ChairsAli R. Hurson, Hiroyuki Sato. 534 [doi]
- TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized AuthorizationYan Zhu 0010, Yao Qin, Guohua Gan, Yang Shuai, William Cheng-Chung Chu. 535-544 [doi]
- Object Naming Service Supporting Heterogeneous Object Code Identification for IoT SystemDuo Ding, Minbo Li, Zhu Zhu. 545-554 [doi]
- Energy Efficient Scheduling for Heterogeneous Fog Computing ArchitecturesHsiang-Yi Wu, Che-Rung Lee. 555-560 [doi]
- Lane Change Detection Algorithm on Real World Driving for Arbitrary Road InfrastructuresJennie Lioris, Annie Bracquemond, Gildas Thiolon, Laurent Bonic. 561-569 [doi]
- Mapping of Sensor and Route Coordinates for Smart CitiesYasir Saleem 0001, Noël Crespi. 570-576 [doi]
- A Discrete Differential Evolution Algorithm for CarpoolingFu-Shiung Hsieh, Fu-Min Zhan. 577-582 [doi]
- Formal Analysis of k-Resiliency for Collaborative UAVsA. H. M. Jakaria, Mohammad Ashiqur Rahman. 583-592 [doi]
- Image Processing Strategies for Automatic Detection of Common Gastroenterological DiseasesRafael Neujahr Copstein, Vicenzo Abichequer Sangalli, Matheus Cruz Andrade, Lucas Almeida Machado, Evandro Rodrigues, Leonardo Pavanatto Soares, Márcio Sarroglia Pinho. 593-598 [doi]
- Message from the SEPT Symposium Program ChairsDianxiang Xu, Eun-Sun Cho. 599 [doi]
- Towards Light-Weight Deep Learning Based Malware DetectionZeliang Kan, Haoyu Wang, Guoai Xu, Yao Guo 0001, Xiangqun Chen. 600-609 [doi]
- ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social NetworksRui Huang, Yichao Lin, Bidi Ying, Amiya Nayak. 610-619 [doi]
- The Impact of Lightweight Disassembler on Malware Detection: An Empirical StudyDonghong Zhang, Zhenyu Zhang 0004, Bo Jiang 0001, T. H. Tse. 620-629 [doi]
- A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking StrategyJunjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 630-635 [doi]
- Proof of Contribution: A Modification of Proof of Work to Increase Mining EfficiencyTengfei Xue, Yuyu Yuan, Zahir Ahmed, Krishna Moniz, Ganyuan Cao, Cong Wang 0003. 636-644 [doi]
- A Novel Secret Sharing Approach for Privacy-Preserving Authenticated Disease Risk Queries in Genomic DatabasesMaitraye Das, Nusrat Jahan Mozumder, Sharmin Afrose, Khandakar Ashrafi Akbar, Tanzima Hashem. 645-654 [doi]
- Improving Fitness Function for Language Fuzzing with PCFG ModelXiaoshan Sun, Yu Fu, Yun Dong, Zhihao Liu, Yang Zhang. 655-660 [doi]
- Answering Multiple Aggregate Queries Under a Specific Privacy ConditionJordi Aranda, Jordi Nin Guerrero, Javier Herranz. 661-666 [doi]
- Message from the CAP Organizing CommitteeCristina Seceleanu, Keiji Kimura. 667 [doi]
- Adaptive Splitting-Based Block I/O Scheduling in Disk StorageHui Li, Shanxiong Chen, Guoqiang Xiao, Xiaoning Peng, Jianwei Liao, Jianwei Liao. 668-676 [doi]
- A Market-Oriented Heuristic Algorithm for Scheduling Parallel Applications in Big Data Service PlatformQingshi Shao, Shijun Liu, Li Pan, Chenglei Yang, Tingting Niu. 677-686 [doi]
- The Column-Partition and Row-Partition Turn ModelYuan Cai, Wei Luo, Dong Xiang. 687-694 [doi]
- Research on Asynchronous Inter-VM Communication Mechanism Based on Embedded HypervisorRui Wang, Libin Xu, Yuebin Bai, Kun Cheng, Zhongzhao Wang, Guangqiang Luan, Hailong Yang, Weitao Wang. 695-700 [doi]
- Measurement-Based Evaluation of Data-Parallelism for OpenCV Feature-Detection AlgorithmsJakob Danielsson, Marcus Jägemar, Moris Behnam, Mikael Sjödin, Tiberiu Seceleanu. 701-710 [doi]
- SMT-Based Timing Analysis and Verification of Real-Time TaskHai-feng Xing, Jiantao Zhou, Xiaoyu Song, Rui-dong Qi. 711-720 [doi]
- Towards Fault-Tolerant Task Backup and Recovery in the seL4 MicrokernelGuangqiang Luan, Yuebin Bai, Libin Xu, Chao Yu, Chunyang Wang, Junfang Zeng, Qingbin Chen, Weitao Wang. 721-726 [doi]
- Message from the ITiP Symposium ChairsSan Murugesan, Fulvio Corno. 727 [doi]
- Load Prediction for Data Centers Based on Database ServiceRui Cao, Zhaoyang Yu, Trent Marbach, Jing Li, Gang Wang 0001, Xiaoguang Liu. 728-737 [doi]
- Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN)Irena Bojanova, Yaacov Yesha, Paul E. Black. 738-745 [doi]
- An IoT Platform for Civil Infrastructure MonitoringSeongwoon Jeong, Kincho H. Law. 746-754 [doi]
- The Smart-X Model for Smart CitiesNishtha Kesswani, Sanjay Kumar. 755-760 [doi]
- Long Short-Term Memory Neural Networks for Artificial Dialogue GenerationSid-Ahmed Selouani, Mohamed Sidi Yacoub. 761-768 [doi]
- Sentiment Classification System of Twitter Data for US Airline Service AnalysisAnkita Rane, Anand Kumar. 769-773 [doi]
- WorkflowDSL: Scalable Workflow Execution with Provenance for Data Analysis ApplicationsTharidu Fernando, Nikita Gureev, Mihhail Matskin, Michael Zwick, Thomas Natschläger. 774-779 [doi]
- Message from the Fast Abstract Co-chairsHossain Shahriar, Hiroki Takakura, Michiharu Takemoto, Dave Towey. 780 [doi]
- Systematic Literature Review Regarding Communication Support in Project-Based Learning of Software DevelopmentYutsuki Miyashita, Takafumi Tanaka, Atsuo Hazeyama. 781-782 [doi]
- Painless Tennis Ball Tracking SystemWook-Sung Yoo, Zach Jones, Henok Atsbaha, David Wingfield. 783-784 [doi]
- Remote Monitoring and Control Web Service for Internet of HeatingBo Cheng 0001, Shuai Zhao 0001, Junliang Chen. 785-786 [doi]
- Possibilistic Reasoning About Actions in Agent SystemsTuan-Fang Fan, Churn-Jung Liau. 787-788 [doi]
- An Enhanced Temperature Aware Routing Protocol in Wireless Body Area NetworksBeomsu Kim, Ki-Il Kim, Babar Shah. 789-790 [doi]
- On Selecting Collaborative Modeling ToolsUsa Sammapun, Panuchart Bunyakiati. 791-792 [doi]
- Machine Translation Considering Context Informaiton Using Encoder-Decoder ModelSatoshi Yamane, Tetsuto Takano. 793-794 [doi]
- Spatio-Temporal Data Retention System with MEC for Local Production and ConsumptionDaiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Mario Gerla. 795-796 [doi]
- Designing a Computer Detective Game for Science EducationFu-Hsing Tsai. 797-798 [doi]
- Model Check of Real-time Property of Embedded Assembly Program Using CEGARHiromu Kamide, Kosuke Uemura, Satoshi Yamane. 799-800 [doi]
- Comprehensive Data Tree by Actor Messaging for Incremental Hierarchical ClusteringTaiki Shimizu, Kohei Sakurai. 801-802 [doi]
- Applying Code Vectors for Presenting Software Features in Machine LearningHyun-il Lim. 803-804 [doi]
- A Framework for Real Time Emotion Recognition Based on Human ANS Using Pervasive DeviceFeri Setiawan, Sunder Ali Khowaja, Aria Ghora Prabono, Bernardo Nugroho Yahya, Seok-Lyong Lee. 805-806 [doi]
- A New Approach for the Verification of BPMN Models Using Refinement PatternsSalma Ayari, Yosra Ben Dali Hlaoui, Leila Jemni Ben Ayed. 807-808 [doi]
- On Exploiting Temporal Periodicity for Message Delivery in Mobile Opportunistic NetworksYu-Feng Hsu, Chih-Lin Hu, Hsin-Ju Hsiao. 809-810 [doi]
- Cyclic Performance Fluctuation of TCP BBRKouto Miyazawa, Kanon Sasaki, Naoki Oda, Saneyasu Yamaguchi. 811-812 [doi]
- Towards Efficient Network Resource Management in SDN-Based Heterogeneous Vehicular NetworksAdnan Mahmood, Bernard Butler, Brendan Jennings. 813-814 [doi]
- Clustering TLS Sessions Based on Protocol Fields AnalysisHiroaki Yamauchi, Akihiro Nakao, Masato Oguchi, Shu Yamamoto, Saneyasu Yamaguchi. 815-816 [doi]
- On Graph Representation with Smallest Numerical EncodingVictor Parque, Tomoyuki Miyashita. 817-818 [doi]
- Numerical Representation of Modular GraphsVictor Parque, Tomoyuki Miyashita. 819-820 [doi]
- Mitigating SDN Flow Table OverflowHanwu Luo, Wenzhen Li, Ying Qian, Liang Dou. 821-822 [doi]
- An Integrated Memory and SSD Caching I/O SubsystemHsung-Pin Chang, Yu-Cain He, Da-Wei Chang. 823-824 [doi]
- Benchmark Requirements for Assessing Software Security Vulnerability Testing ToolsReza M. Parizi, Kai Qian, Hossain Shahriar, Fan Wu, Lixin Tao. 825-826 [doi]
- Effects of Variable Part Auto Configuration and Management for Software Product LineTaeho Kim, Sungwon Kang, Jihyun Lee. 827-828 [doi]
- Secure Mobile IPC Software Development with Vulnerability Detectors in Android StudioXianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar, Md Arabin Islam Talukder, Prabir Bhattacharya. 829-830 [doi]
- A Comparison of EEG and NIRS Biomarkers for Assessment of Depression RiskLabiblais Rahman, Katsunori Oyama. 831-832 [doi]
- Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier SelectionYangxu Jin, Ting Liu 0002, Ancheng He, Yu Qu, Jianlei Chi. 833-834 [doi]
- Web Application Firewall: Network Security Models and ConfigurationVictor Clincy, Hossain Shahriar. 835-836 [doi]
- Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and ImportanceAji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara. 837-838 [doi]
- Message from the MOWU Organizing CommitteeVladimir Getov, Hong Va Leong. 839-841 [doi]
- Delivery Route Optimization Through Occupancy Prediction from Electricity UsageShimpei Ohsugi, Noboru Koshizuka. 842-849 [doi]
- CARMUS: Towards a General Framework for Continuous Activity Recognition with Missing Values on SmartphonesTianheng Wu, Liang Wang 0006, Zhiwen Zheng, Simeng Wu, Jun Ma, XianPing Tao, Jian Lu 0001. 850-859 [doi]
- A Study and Estimation a Lost Person Behavior in Crowded Areas Using Accelerometer Data from SmartphonesMohammed Balfas, Sheikh Iqbal Ahamed, Chandana P. Tamma, Muhammad Arif, Ahmed J. Kattan, William Chu. 860-865 [doi]
- Building a Tailored Text Messaging System for Smoking Cessation in Native American PopulationsDrew Williams, Golam Mushih Tanimul Ahsan, Ivor D. Addo, Sheikh Iqbal Ahamed, Daniel Petereit, Linda Burhansstipanov, Linda U. Krebs, Mark Dignan. 866-874 [doi]
- A Culturally Tailored Intervention System for Cancer Survivors to Motivate Physical ActivityGolam Mushih Tanimul Ahsan, Jannatul Ferdause Tumpa, Riddhiman Adib, Sheikh Iqbal Ahamed, Daniel Petereit, Linda Burhansstipanov, Linda U. Krebs, Mark Dignan. 875-880 [doi]
- mmCNN: A Novel Method for Large Convolutional Neural Network on Memory-Limited DevicesShijie Li, Yong Dou, Jinwei Xu, Qiang Wang, Xin Niu. 881-886 [doi]
- Message from the NCIW Program Co-chairsBehrooz A. Shirazi, Nariyoshi Yamai. 887 [doi]
- Winner Determination in Combinatorial Double Auctions Based on Differential Evolution AlgorithmsFu-Shiung Hsieh, Yi-Hong Guo. 888-893 [doi]
- A Low-cost, High-Efficiency SDN Framework to Diminish Redundant ARP and IGMP Traffics in Large-Scale LANsYou-Chiun Wang, Han Hu. 894-903 [doi]
- A Flow-Grained End-to-End Delay Analysis for RC Traffic in TTEthernetLing Guo, Bo Wan, Changlong Li, Kaiqi Zhou, Xi Li. 904-913 [doi]
- An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash TableYan Zhu 0010, Shuai Yang, Guohua Gan, Xiao He. 914-919 [doi]
- A Solution for Minimum Link Flow Problem with Sparse ModelingRyotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki. 920-925 [doi]
- DTN-Knca: A High Throughput Routing Based on Contact Pattern Detection in DTNsWeitao Wang, Yuebin Bai, Peng Feng, Yuhao Gu, Shuai Liu, Wenhao Jiang, Jun Huang. 926-931 [doi]
- A Multihop Broadcast Mechanism for Emergency Messages Dissemination in VANETsSizheng Li, Chuanhe Huang. 932-937 [doi]
- Message from The Student Research Symposium Co-ChairsToyokazu Akiyama, Maria Lee. 938 [doi]
- Analysis of the Relationship Between Server Location and RTTHyunsu Mun, Jeasung Na, Hanul Park, Seungtae Kim, Youngseok Lee, John Springer. 939-942 [doi]
- A Study on Emulating Automotive IP Networks Using Network VirtualizationRyuichiro Maegawa, Ryo Nakamura, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 943-946 [doi]
- A Secure Sharing System for Cloud Desktop Applications Migrating with Optimized User ExperienceYoshinori Kamori, Kenta Hayasi, Kaori Maeda, Tohru Kondo, Reiji Aibara. 947-950 [doi]
- A Tuning Method of a Monitoring System for Network Forensics in Cloud EnvironmentShintaro Ishihara, Toyokazu Akiyama. 951-954 [doi]
- A Study on Comparative Analysis of End-to-End Routing and Opportunistic RoutingChuta Minamiguchi, Natsuko Kawabata, Ryo Nakamura, Hiroyuki Ohsaki. 955-958 [doi]
- Building a CFG to Include ExceptionsSeong-Kyun Mok, Eun-Sun Cho. 959-961 [doi]
- Alternating Primary Subflow in MPTCP by External Program without Kernel ModificationReido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata. 962-965 [doi]
- A Study on Robustness of Complex Networks Against Random Node RemovalsKazuyuki Yamashita, Ryo Nakamura, Hiroyuki Ohsaki. 966-969 [doi]
- A Study on the Impact of Delayed Packet Forwarding in Content-Centric NetworkingYuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki. 970-972 [doi]
- A Study on Sparse-Modeling Based Approach for Betweenness Centrality EstimationRyotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki. 973-976 [doi]
- Toward Firmware-Type Analysis Using Machine Learning TechniquesSeoksu Lee, Eun-Sun Cho. 977-978 [doi]
- Message from the CELT 2018 Symposium Co-ChairsTiziana Margaria, Henry Chan. 979 [doi]
- Improving the Effectiveness of SQL Learning Practice: A Data-Driven ApproachLuca Cagliero, Luigi De Russis, Laura Farinetti, Teodoro Montanaro. 980-989 [doi]
- Computational Thinking: Learning by Doing with the Cinco Adventure Game ToolFrederik Gossen, Dennis Kühn, Tiziana Margaria, Anna-Lena Lamprecht. 990-999 [doi]
- Towards Adaptive Systems for Automatic Formative Assessment in Virtual Learning CommunitiesMarina Marchisio, Luigi Di Caro, Michele Fioravera, Sergio Rabellino. 1000-1005 [doi]
- Improving Blended Learning Outcomes Through Academic Social MediaHan Wan, Kangxu Liu, Qiaoye Yu, Jun Ding, Xiaopeng Gao. 1006-1015 [doi]
- A Model of Formative Automatic Assessment and Interactive Feedback for STEMMarina Marchisio, Alice Barana, Michele Fioravera, Sergio Rabellino, Alberto Conte. 1016-1025 [doi]
- Web-Based Learning Object Search Engine Solution Together with Data Visualization: The Case of MERLOT IIW. K. T. M. Gunarathne, Chalothon Chootong, Worapot Sommool, Ankhtuya Ochirbat, Yi-Cheng Chen, Sorel Reisman, Timothy K. Shih. 1026-1031 [doi]
- Technology-Enhanced Self-Regulated Learning: Assessment Support Through an Evaluation CentreIris Braun, Tenshi Hara, Felix Kapp, Lucas Braeschke, Alexander Schill. 1032-1037 [doi]