Abstract is missing.
- Shifting score fusion: on exploiting shifting variation in iris recognitionChristian Rathgeb, Andreas Uhl, Peter Wild. 3-7 [doi]
- Raster image representation of fingerprint minutiaeBian Yang, Zhibo Chen, Christoph Busch. 8-12 [doi]
- Fusion in fingerprint authentication: two finger types vs. two scanner typesDavrondzhon Gafurov, Christoph Busch, Patrick Bours, Bian Yang. 13-18 [doi]
- Keystroke dynamics authentication for mobile phonesEmanuele Maiorana, Patrizio Campisi, Noelia González-Carballo, Alessandro Neri. 21-26 [doi]
- Random forgery attacks against DTW-based online signature verification algorithmDaigo Muramatsu. 27-28 [doi]
- Deceit detection via online behavioral learningNisha Bhaskaran, Ifeoma Nwogu, Mark G. Frank, Venu Govindaraju. 29-30 [doi]
- A location-aware rogue AP detection system based on wireless packet sniffing of sensor APsKuo-Fong Kao, Tau-Heng Yeo, Wai-Shuen Yong, Hui-Hsuan Chen. 32-36 [doi]
- A model transformation approach for verifying multi-agent systems using SPINLily Chang, Xudong He. 37-42 [doi]
- Tagging web product titles based on hidden Markov modelPeng Wang, Baowen Xu, Yue You, Lu Chen. 43-48 [doi]
- A pattern-based verification approach for a multi-core system developmentPeng-Hua Chu, Nien-Lin Hsueh, Chien-Ching Lee, Min-Ju Chuang, Pao-Ann Hsiung, William C. Chu. 49-53 [doi]
- An approach of creative application evolution on cloud computing platformJiantao Zhou, Shang Zheng, Delin Jing, Hongji Yang. 54-58 [doi]
- Change impact analysis for object-oriented programs evolved to aspect-oriented programsChien-Hung Liu, Shu-Ling Chen, Wei-Lun Jhu. 59-65 [doi]
- An automatic selective color transfer algorithm for imagesYao-Hsien Huang, Peng-Cheng Wang, Chia-Chi Chou, Kui-Ping Lin. 66-71 [doi]
- Performance analysis of IEEE 802.11 ad hoc based broadcastYi-Hung Huang, Chao-Yu Kuo. 72-73 [doi]
- Harmonic functions based semi-supervised learning for web spam detectionWeifeng Zhang, Danmei Zhu, Yingzhou Zhang, Guoqiang Zhou, Baowen Xu. 74-75 [doi]
- BioTRON: a biological workflow management systemValeria Fionda, Giuseppe Pirrò. 77-82 [doi]
- Efficient clustering of populations using a minimal SNP panelMahdi Belcaid, Kyungim Baek, David Haymer, Guylaine Poisson. 83-88 [doi]
- Rapid computation of distance estimators from nucleotide and amino acid alignmentsMartin Simonsen, Christian N. S. Pedersen. 89-93 [doi]
- Classifying microarray data with association rulesLuiza Antonie, Kyrylo Bessonov. 94-99 [doi]
- Machine classification of melanoma and nevi from skin lesionsJohn David Osborne, Song Gao, Wei-bang Chen, Aleodor Andea, Chengcui Zhang. 100-105 [doi]
- Computing rearrangement distance of every permutation in the symmetric groupGustavo Rodrigues Galvão, Zanoni Dias. 106-107 [doi]
- The bacterial strains characterization problemFabien Chhel, Adrien Goëffon, Antoine Lafosse, Frédéric Lardeux, Frédéric Saubion, Gilles Hunault, Tristan Boureau. 108-109 [doi]
- Prediction of permuted super-secondary structures in β-barrel proteinsVan Du Tran, Philippe Chassignet, Jean-Marc Steyaert. 110-111 [doi]
- A genetic model for pricing in cloud computing marketsMario Macías, Jordi Guitart. 113-118 [doi]
- Improving high-performance computations on clouds through resource underutilizationRoman Iakymchuk, Jeff Napper, Paolo Bientinesi. 119-126 [doi]
- A load-aware scheduler for MapReduce framework in heterogeneous cloud environmentsHsin-Han You, Chun-Chung Yang, Jiun-Long Huang. 127-132 [doi]
- AoDI: an allocation-on-demand incremental volume based on LVMRui Cao, Caijun Zhen, Yan Gao, Guangzhi Xu, Xiaoguang Liu, Gang Wang, Guangjun Xie. 133-138 [doi]
- Towards improved load balancing for data intensive distributed computingSven Groot, Kazuo Goda, Masaru Kitsuregawa. 139-146 [doi]
- Rapid application configuration in Amazon cloud using configurable virtual appliancesHuan Liu. 147-154 [doi]
- Patterns for configuration requirements of Software-as-a-ServiceJaekeun Shim, Jongdae Han, Jindae Kim, Byungjeong Lee, Jaewon Oh, Chisu Wu. 155-161 [doi]
- Sense-respond cloud mediator architecture for services evolutionJay Ramanathan, Rajiv Ramnath, Nisheet Singh, Zhe Xu, Yingxiao Xu. 162-169 [doi]
- Towards discovering criminal communities from textual dataRabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youssef. 172-177 [doi]
- Cloud application logging for forensicsRaffael Marty. 178-184 [doi]
- Time based data forensic and cross-reference analysisXiaoqin Ding, Hengming Zou. 185-190 [doi]
- Event clustering for log reduction and run time system understandingKostas Kontogiannis, Ahmed Wasfy, Serge Mankovski. 191-192 [doi]
- Towards designing a tool for event reconstruction using ::::Gladyshev Approach::::Merin Sebastian, Priya Chandran. 193-194 [doi]
- Development support for QoS-aware service-adaptation in ubiquitous computing applicationsKurt Geihs, Christoph Evers, Roland Reichle, Michael Wagner 0001, Mohammad Ullah Khan. 197-202 [doi]
- Transparent componentisation: high-level (re)configurable programming for evolving distributed systemsShen Lin 0003, François Taïani, Marin Bertier, Gordon S. Blair, Anne-Marie Kermarrec. 203-208 [doi]
- Root-cause analysis of performance anomalies in web-based applicationsJoão Paulo Magalhães, Luis Moura Silva. 209-216 [doi]
- AdaptStream: towards achieving fluidity in adaptive stream-based systemsYu Liu, René Meier. 217-223 [doi]
- Identifying the provenance of correlated anomaliesDawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, Fareed Zaffar. 224-229 [doi]
- Robustness of automotive applications using reflective computing: lessons learntJean-Charles Fabre, Marc-Olivier Killijian, François Taïani. 230-235 [doi]
- An approach for providing dependable self-adaptation in distributed embedded systemsMarc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr. 236-237 [doi]
- Massive character recognition with a large ground-truthed databaseWenjie Cai, Yaokai Feng, Seiichi Uchida. 240-244 [doi]
- Pixel accurate document image content extractionSiyuan Chen, Henry S. Baird. 245-251 [doi]
- Multi-document summarization of scientific corporaOzge Yeloglu, Evangelos E. Milios, A. Nur Zincir-Heywood. 252-258 [doi]
- A new algorithm for segmenting warped text-lines in document imagesDaniel Marques de Oliveira, Rafael Dueire Lins, Gabriel Torreão, Jian Fan, Marcelo Thielo. 259-265 [doi]
- An assessment of data matrix barcode recognition under scaling, rotation and cylindrical warpingAndrei de Araújo Formiga, Rafael Dueire Lins, Steven J. Simske, Gary Dispoto, Marcelo Thielo. 266-267 [doi]
- Automated extractive single-document summarization: beating the baselines with a new approachAraly Barrera, Rakesh Verma. 268-269 [doi]
- An empirical comparison of static and dynamic business process miningRicardo Pérez-Castillo, Ignacio García Rodríguez de Guzmán, Mario Piattini, Barbara Weber, Ángeles S. Places. 272-279 [doi]
- Process performance management: illuminating design issues through a systematic problem analysisAnne Cleven, Robert Winter, Felix Wortmann. 280-286 [doi]
- Efficiency evaluation of open source ETL toolsTim A. Majchrzak, Tobias Jansen, Herbert Kuchen. 287-294 [doi]
- Slipstream: architecture options for real-time process analyticsChristian Janiesch, Martin Matzner, Oliver Müller, Robert Vollmer, Jörg Becker. 295-300 [doi]
- An integrated approach for modeling and facilitating RFID-based collaborative logistics processesYu Li, Andreas Oberweis, Huayu Zhang. 301-307 [doi]
- Strong non-leak guarantees for workflow modelsRafael Accorsi, Claus Wonnemann. 308-314 [doi]
- Software reuse in agile development organizations: a conceptual management toolWouter Spoelstra, Maria-Eugenia Iacob, Marten van Sinderen. 315-322 [doi]
- On the elements of an enterprise: towards an ontology-based accountJoão Paulo A. Almeida, Evellin C. S. Cardoso. 323-330 [doi]
- Tool support for realising a common understanding of business documents in collaborating enterprisesUsman Wajid, Nikolay Mehandjiev, Abdallah Namoun, Panagiotis Gouvas. 331-333 [doi]
- An architecture proposal for the prosumerized enterpriseAndreas Emrich, Alexandra Chapko, Christina Di Valentin, Dirk Werth. 334-335 [doi]
- Design issues in composition kernels for highly functional embedded systemsHiromasa Shimada, Yuki Kinebuchi, Tsung-Han Lin, Alexandre Courbot, Tatsuo Nakajima. 338-345 [doi]
- CAVE: channel-aware buffer management scheme for solid state diskSung Kyu Park, Youngwoo Park, Gyudong Shim, Kyu Ho Park. 346-353 [doi]
- System-level co-simulation of integrated avionics using polychronyHuafeng Yu, Yue Ma, Yann Glouche, Jean-Pierre Talpin, Loïc Besnard, Thierry Gautier, Paul Le Guernic, Andres Toom, Odile Laurent. 354-359 [doi]
- Sector log: fine-grained storage management for solid state drivesSeongwook Jin, Jae-Hong Kim, Jaegeuk Kim, Jaehyuk Huh, Seungryoul Maeng. 360-367 [doi]
- Fixed-point implementation of isolated sub-word level speech recognition using hidden Markov modelsN. Venkatesh, Ruchir Gulati, Rajeev Bhujade, M. Girish Chandra. 368-373 [doi]
- A lifespan-aware reliability scheme for RAID-based flash storageSehwan Lee, Bitna Lee, Kern Koh, Hyokyung Bahn. 374-379 [doi]
- I4Copter: an adaptable and modular quadrotor platformPeter Ulbrich, Rüdiger Kapitza, Christian Harkort, Reiner Schmid, Wolfgang Schröder-Preikschat. 380-386 [doi]
- Fuzzing the out-of-memory killer on embedded Linux: an adaptive random approachK. Y. Sim, Fei-Ching Kuo, Robert G. Merkel. 387-392 [doi]
- FPGA based parallel transitive closure algorithmZheng-ding, Wei Shu, Min-You Wu. 393-394 [doi]
- Exploiting time predictable two-level scratchpad memory for real-time systemsYu Liu, Wei Zhang. 395-396 [doi]
- iDetective: a persuasive application to motivate healthier behavior using smart phoneHiroaki Kimura, Jun Ebisui, Yoshio Funabashi, Akihito Yoshii, Tatsuo Nakajima. 399-404 [doi]
- A context-aware audio presentation method in wearable computingShinichi Yataka, Kohei Tanaka, Tsutomu Terada, Masahiko Tsukamoto. 405-412 [doi]
- Analyzing different levels of geographic context awareness in agent ferrying over VANETsEdison Pignaton de Freitas, Tales Heimfarth, Luiz Augusto Guimarães Costa, Armando Morado Ferreira, Carlos Eduardo Pereira, Flávio Rech Wagner, Tony Larsson. 413-418 [doi]
- A probabilistic context-aware approach for quality of experience measurement in pervasive systemsKaran Mitra, Arkady B. Zaslavsky, Christer Åhlund. 419-424 [doi]
- Flocks: enabling dynamic group interactions in mobile social networking applicationsElisa Gonzalez Boix, Andoni Lombide Carreton, Christophe Scholliers, Tom Van Cutsem, Wolfgang De Meuter, Theo D Hondt. 425-432 [doi]
- Towards communication-efficient private location dependent queriesKeng-Pei Lin, Ming-Syan Chen. 433-438 [doi]
- REBIVE: a reliable private data aggregation scheme for wireless sensor networksFarzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed. 439-444 [doi]
- Transmission reduction between mobile phone applications and RESTful APIsChin-Liang Tsai, Hsiao-Wen Chen, Jiun-Long Huang, Chih-Lin Hu. 445-450 [doi]
- Formal analysis of device authentication applications in ubiquitous computingWilliam Claycomb, Dongwan Shin. 451-452 [doi]
- ProQuPri: towards anonymity protection with privacy quantification for context-aware applicationsFarzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed. 453-454 [doi]
- Matching customer requests to service offerings in real-timeMarcel Tilly, Stephan Reiff-Marganiec. 456-461 [doi]
- Service-oriented dynamic data driven application systems to potential field method vehicle navigationSzu-Yin Lin, Kuo-Ming Chao, Chi-Chun Lo. 462-467 [doi]
- A choreography language for eBusiness collaborationAlex Norta. 468-469 [doi]
- A Hough-transform-based anomaly detector with an adaptive time intervalRomain Fontugne, Kensuke Fukuda. 471-477 [doi]
- Modeling the dynamics of caching in content-based publish/subscribe systemsVasilis Sourlas, Georgios S. Paschos, Petteri Mannersalo, Paris Flegkas, Leandros Tassiulas. 478-485 [doi]
- Novel processor architecture for modified advanced routing in NGNMarija Kalendar, Danijela Jakimovska, Aristotel Tentov, Goce Dokoski. 486-491 [doi]
- Policy-driven network simulation: a resilience case studyAlberto E. Schaeffer Filho, Paul Smith, Andreas Mauthe. 492-497 [doi]
- A new TCP mechanism for reducing retransmission timeouts over multi-hop wireless networksPrasanthi Sreekumari, Sang-Hwa Chung. 498-505 [doi]
- HDOV: an overlay network for wide area spatial data collectionYuuichi Teranishi, Susumu Takeuchi, Kaname Harumoto. 506-513 [doi]
- Improving matching performance of DPI traffic classifierTingwen Liu, Yong Sun, Li Guo, Binxing Fang. 514-519 [doi]
- CluB: a cluster based framework for mitigating distributed denial of service attacksZhang Fu, Marina Papatriantafilou, Philippas Tsigas. 520-527 [doi]
- Storage and retrieval of system log events using a structured schema based on message type transformationAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. 528-533 [doi]
- Accelerated chaining: a better way to harness peer power in video-on-demand applicationsJehan-François Påris, Ahmed Amer, Darrell D. E. Long. 534-539 [doi]
- Traffic classification beyond application level: identifying content types from network tracesYipeng Wang, Zhibin Zhang, Li Guo. 540-541 [doi]
- Scalable CP-nets modeling for BitTorrent protocolJing Liu, Haibo Wu, Xinming Ye, Jun Li. 542-543 [doi]
- Power management schemes for heterogeneous clusters under quality of service requirementsJian-Jia Chen, Kai Huang, Lothar Thiele. 546-553 [doi]
- VASP: virtualization assisted security monitor for cross-platform protectionMin Zhu, Miao Yu, Mingyuan Xia, Bingyu Li, Peijie Yu, Shang Gao, Zhengwei Qi, Liang Liu, Ying Chen, Haibing Guan. 554-559 [doi]
- Loop fusion and reordering for register file optimization on stream processorsWanyong Tian, Chun Jason Xue, Minming Li, Enhong Chen. 560-565 [doi]
- Fault tolerant framework and techniques for component-based autonomous robot systemsHeejune Ahn, Sang Chul Ahn, Junyoung Heo, Sung Y. Shin. 566-572 [doi]
- Optimizing virtual machines using hybrid virtualizationJun Nakajima, Qian Lin, Sheng Yang, Min Zhu, Shang Gao, Mingyuan Xia, Peijie Yu, Yaozu Dong, Zhengwei Qi, Kai Chen 0006, Haibing Guan. 573-578 [doi]
- Virtualizing system and ordinary services in Windows-based OS-level virtual machinesZhiyong Shan, Tzi-cker Chiueh, Xin Wang. 579-583 [doi]
- Power consumption scheduling for peak load reduction in smart grid homesJunghoon Lee, Gyung-Leen Park, Sang-Wook Kim, Hye-Jin Kim, Chang Oan Sung. 584-588 [doi]
- LSTAFF*: an efficient flash translation layer for large block flash memoryTae-Sun Chung, Dong-Joo Park, Jongik Kim. 589-594 [doi]
- Migration based page caching algorithm for a hybrid main memory of DRAM and PRAMHyunchul Seok, Youngwoo Park, Kyu Ho Park. 595-599 [doi]
- A data de-duplication access framework for solid state drivesChin-Hsien Wu, Hau-Shan Wu. 600-604 [doi]
- An open-system framework for flash-memory storage systemJen-Wei Hsieh, Shang-Yang Chang. 605-610 [doi]
- Adaptive link recovery scheme for structured peer-to-peer networks under churnSeokhyun Kim, Geunyoung Park, Jiman Hong, Yookun Cho. 611-615 [doi]
- Supporting dynamic update and resource protection in an embedded operating systemMei-Ling Chiang, Hsiang-Yu Hsu. 616-620 [doi]
- Development of the wireless embedded sensor network for energy-efficient floodingSanghyun Ahn, Yujin Lim, Sanggil Kang. 621-622 [doi]
- SPAD: software protection through anti-debugging using hardware virtualizationQian Lin, Mingyuan Xia, Miao Yu, Peijie Yu, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen 0006, Haibing Guan. 623-624 [doi]
- FMCM: a efficient flash memory cache management scheme for energy-efficient disksYounghwan Kim, Taehyoung Kim, Yuri Kim, Ah-Reum Kim. 625-626 [doi]
- Predictable multithread scheduling with cycle-accurate thread progress monitorYoungsam Shin, SeungWon Lee, Minyoung Son, Shihwa Lee. 627-628 [doi]
- Coexisting real-time OS and general purpose OS on an embedded virtualization layer for a multicore processorHitoshi Mitake, Yuki Kinebuchi, Alexandre Courbot, Tatsuo Nakajima. 629-630 [doi]
- Experimenting with system and Libc call interception attacks on ARM-based Linux kernelHyeong-chan Lee, Chung Hui Kim, Jeong Hyun Yi. 631-632 [doi]
- Optimization of out of memory killer for embedded Linux environmentsJoongjin Kook, Sukil Hong, Wooseung Lee, Eunkyeung Jae, Jungyeop Kim. 633-634 [doi]
- Energy-efficient scheduling for parallel real-time tasks based on level-packingFanxin Kong, Nan Guan, Qingxu Deng, Wang Yi. 635-640 [doi]
- A system context-aware approach for battery lifetime prediction in smart phonesXia Zhao, Yao Guo, Qing Feng, Xiangqun Chen. 641-646 [doi]
- Petri net based performance modeling for effective DVFS for multithreaded programsArun Rangasamy, Y. N. Srikant. 647-648 [doi]
- Requirements trade-offs analysis in the absence of quantitative measures: a heuristic methodGolnaz Elahi, Eric S. K. Yu. 651-658 [doi]
- Consolidating multiple requirement specifications through argumentationEbrahim Bagheri, Faezeh Ensan. 659-666 [doi]
- Aspect-oriented analysis for software product lines requirements engineeringPatrícia Varela, João Araújo, Isabel Sofia Brito, Ana Moreira. 667-674 [doi]
- Analyzing goal models: different approaches and how to choose among themJennifer Horkoff, Eric S. K. Yu. 675-682 [doi]
- Conditional preferences in software stakeholders judgmentsIvana Ognjanovic, Dragan Gasevic, Ebrahim Bagheri, Mohsen Asadi. 683-690 [doi]
- Goal-driven software product line engineeringMohsen Asadi, Ebrahim Bagheri, Dragan Gasevic, Marek Hatala, Bardia Mohabbati. 691-698 [doi]
- Stream: a strategy for transition between requirements models and architectural modelsMárcia Lucena, Jaelson Castro, Carla T. L. L. Silva, Fernanda M. R. Alencar, Emanuel Santos. 699-704 [doi]
- Analyzing value co-creation in service systems: contribution from GOREGaryfallos Fragidis, Konstantinos A. Tarabanis. 705-707 [doi]
- Towards the improvement of use case models: the AIRDoc processRicardo Argenton Ramos, Jaelson Brelaz de Castro, João Araújo, Fernanda M. R. Alencar. 708-709 [doi]
- A statistical approach to simulation model validation in response-time analysis of complex real-time embedded systemsYue Lu, Johan Kraft, Thomas Nolte, Iain Bate. 711-716 [doi]
- From nonpreemptive to preemptive scheduling: from single-processor to multi-processor?Mohammad Mahdi Jaghoori. 717-722 [doi]
- Stack distance based worst-case instruction cache performance analysisYu Liu, Wei Zhang. 723-728 [doi]
- Fault tolerance evaluation and schedulability analysisFlorian Many, David Doose. 729-734 [doi]
- Multiprocessor schedulability analyserMikel Cordovilla, Frédéric Boniol, Eric Noulard, Claire Pagetti. 735-741 [doi]
- Handling overload of target sensitive real-time applications for increased system utility and improved resource usageRaphael Guerra, Gerhard Fohler. 742-747 [doi]
- Preemptibility-aware responsive multi-core schedulingJupyung Lee, Geunsik Lim, Sang-Bum Suh. 748-749 [doi]
- Search-logger analyzing exploratory search tasksGeorg Singer, Ulrich Norbisrath, Eero Vainikko, Hannu Kikkas, Dirk Lewandowski. 751-756 [doi]
- Game vendors influence on the monetary value of virtual goodsTim A. Majchrzak, Kay F. Hildebrand. 757-764 [doi]
- A framework for automatic annotation of web pages using the Google rich snippets vocabularyJeroen van der Meer, Ferry Boon, Frederik Hogenboom, Flavius Frasincar, Uzay Kaymak. 765-772 [doi]
- Analyzing a Korean blogosphere: a social network analysis perspectiveJiwoon Ha, Duck-Ho Bae, Sang-Wook Kim, Seok-Chul Baek, Byeong-Soo Jeong. 773-777 [doi]
- Extending timestamp-based two phase commit protocol for RESTful services to meet business rulesLuiz Alexandre Hiane da Silva Maciel, Celso Massaki Hirata. 778-785 [doi]
- Visualizing dispute sections and relations from the sequence of replying commentsYun-Jung Lee, Eun-kyung Kim, Hwan-Gue Cho, Gyun Woo. 786-791 [doi]
- Bridging socially-enhanced virtual communitiesDaniel Schall, Florian Skopik, Harald Psaier, Schahram Dustdar. 792-799 [doi]
- Transforming the web into a real application platform: new technologies, emerging trends and missing piecesMatti Anttonen, Arto Salminen, Tommi Mikkonen, Antero Taivalsaari. 800-807 [doi]
- Understanding and improving Wikipedia article discussion spacesJodi Schneider, Alexandre Passant, John G. Breslin. 808-813 [doi]
- An integrated approach to discover tag semanticsAntonina Dattolo, Davide Eynard, Luca Mazzola. 814-820 [doi]
- Towards better social integration through mobile web 2.0 ambient assisted living devicesTim A. Majchrzak, Adalbert Jakubiec, Martin Lablans, Frank Ückert. 821-822 [doi]
- Extracting preference terms from web browsing histories excluding pages unrelated to users interestsKenta Sasaki, Masayuki Okamoto, Nayuko Watanabe, Masaaki Kikuchi, Takayuki Iida, Masanori Hattori. 823-824 [doi]
- Fast lists intersection with Bloom filter using graphics processing unitsFan Zhang, Di Wu, Naiyong Ao, Gang Wang, Xiaoguang Liu, Jing Liu. 825-826 [doi]
- Spatial network modeling for databasesVirupaksha Kanjilal, Markus Schneider. 827-832 [doi]
- Tracking continuous topological changes of complex moving regionsHechen Liu, Markus Schneider. 833-838 [doi]
- Improving handwritten keyword spotting with self-trainingVolkmar Frinken, Andreas Fischer, Horst Bunke. 840-845 [doi]
- An event-based video retrieval system by combining broadcasting baseball video and web-casting textYin-Fu Huang, Li-Wen Chen. 846-852 [doi]
- Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategyHuaifei Hu, Hong Liu, Lili Chen, Chih-Cheng Hung, Xiangyang Xu, Zhicong Lan. 853-858 [doi]
- A comparative study and analysis on K-view based algorithms for image texture classificationYihua Lan, Hong Liu, Enmin Song, Chih-Cheng Hung. 859-860 [doi]
- Optimistic access control for distributed collaborative editorsAsma Cherif, Abdessamad Imine, Michaël Rusinowitch. 861-868 [doi]
- Description spaces with fuzzinessElena Nardini, Andrea Omicini, Mirko Viroli. 869-876 [doi]
- Executable model composition: a multilevel approachCarlos Rodríguez, Mario Sánchez, Jorge Villalobos. 877-884 [doi]
- Programming coordination laws of artifacts in CArtAgOMarco Sbaraglia, Matteo Casadei, Mirko Viroli. 885-886 [doi]
- Improving CP-based local branching via sliced neighborhood searchFabio Parisini, Michela Milano. 887-892 [doi]
- An efficient generic network flow constraintRobin Steiger, Willem Jan van Hoeve, Radoslaw Szymanek. 893-900 [doi]
- Optimal stopping methods for finding high quality solutions to satisfiability problems with preferencesEmanuele Di Rosa, Enrico Giunchiglia, Barry O Sullivan. 901-906 [doi]
- Combination: automated generation of puzzles with constraintsChristopher Jefferson, Wendy Moncur, Karen E. Petrie. 907-912 [doi]
- Finding partitions of arguments with Dung s properties via SCSPsStefano Bistarelli, Paola Campli, Francesco Santini. 913-919 [doi]
- Parallel constraint-based local search on the HA8000 supercomputer (abstract)Yves Caniou, Philippe Codognet, Daniel Diaz, Salvador Abreu. 920-921 [doi]
- Adaptive hybridization strategiesEric Monfroy, Carlos Castro, Broderick Crawford, Christian Figueroa. 922-923 [doi]
- Entropy based feature selection for text categorizationChristine Largeron, Christophe Moulin, Mathias Géry. 924-928 [doi]
- Semantic event detection in baseball videos based on a multi-output hidden Markov modelYin-Fu Huang, Jyun-Jhang Huang. 929-936 [doi]
- Construction of a blog network based on information diffusionSeung-Hwan Lim, Sang-Wook Kim, Soyoun Kim, Sanghyun Park. 937-941 [doi]
- Mining interlacing manifolds in high dimensional spacesTao Ban, Changshui Zhang, Shigeo Abe, Takeshi Takahashi, Youki Kadobayashi. 942-949 [doi]
- Frequent itemset mining of uncertain data streams using the damped window modelCarson Kai-Sang Leung, Fan Jiang. 950-955 [doi]
- RuleGrowth: mining sequential rules common to several sequences by pattern-growthPhilippe Fournier-Viger, Roger Nkambou, Vincent Shin-Mu Tseng. 956-961 [doi]
- Target-based privacy preserving association rule miningMadhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, Yelena Yesha. 962-967 [doi]
- Aspect-based extractive summarization of online reviewsXueke Xu, Tao Meng, Xueqi Cheng. 968-975 [doi]
- ClustCube: an OLAP-based framework for clustering and mining complex database objectsAlfredo Cuzzocrea, Paolo Serafino. 976-982 [doi]
- Equivalence class transformation based mining of frequent itemsets from uncertain dataCarson Kai-Sang Leung, Lijing Sun. 983-984 [doi]
- Exact top-k keyword search on graph databasesMeirong Wang, Lijun Jiang, Liru Zhang, Tadashi Ohmori. 985-986 [doi]
- Incremental multi-target model trees for data streamsElena Ikonomovska, João Gama, Saso Dzeroski. 988-993 [doi]
- Learning recurring concepts from data streams with a context-aware ensembleJoão Bártolo Gomes, Ernestina Menasalvas Ruiz, Pedro A. C. Sousa. 994-999 [doi]
- Secure shared continuous query processingRaman Adaikkalavan, Thomas Perez. 1000-1005 [doi]
- L2GClust: local-to-global clustering of stream sourcesPedro Pereira Rodrigues, João Gama, João Araújo, Luís M. B. Lopes. 1006-1011 [doi]
- Resource-aware ECG analysis on mobile devicesAbhijat Sinha, Hossein Tayebi, Shonali Krishnaswamy, Agustinus Borgy Waluyo, Mohamed Medhat Gaber. 1012-1013 [doi]
- Site-autonomous distributed semantic cachingNorvald H. Ryeng, Jon Olav Hauglid, Kjetil Nørvåg. 1015-1021 [doi]
- Voronoi-based range query for trajectory data in spatial networksShen Liu, Ling Chen, Gencai Chen. 1022-1026 [doi]
- A fast approach for parallel deduplication on multicore processorsGuilherme Dal Bianco, Renata de Matos Galante, Carlos A. Heuser. 1027-1032 [doi]
- Top-k service compositions: a fuzzy set-based approachKarim Benouaret, Djamal Benslimane, Allel HadjAli. 1033-1038 [doi]
- Determinacy and rewriting of conjunctive queries over unary database schemasLixiao Zheng, Haiming Chen. 1039-1044 [doi]
- Efficient top-k retrieval for user preference queriesClaus Dabringer, Johann Eder. 1045-1052 [doi]
- Computing subgraph isomorphic queries using structural unification and minimum graph structuresHasan M. Jamil. 1053-1058 [doi]
- Mining uncertain web log sequences with access history probabilitiesOlalekan Kadri, C. I. Ezeife. 1059-1060 [doi]
- Memetic algorithm with strategic controller for the maximum clique problemKengo Katayama, Akinori Kohmura, Keiko Kohmoto, Hideo Minamihara. 1062-1069 [doi]
- HMXT-GP: an information-theoretic approach to genetic programming that maintains diversityHenry Santosa, John Milton, Paul J. Kennedy. 1070-1075 [doi]
- New hybrid genetic algorithm for solving optimal communication spanning tree problemPham Trung Kien, Nguyen Duy Hiep, Huynh Thi Thanh Binh. 1076-1081 [doi]
- Evolutionary computation for the prediction of secondary protein structuresAlfonso E. Márquez Chamorro, Federico Divina, Jesús S. Aguilar-Ruiz. 1082-1087 [doi]
- A software platform for genetic algorithms based parameter estimation on digital sound synthesizersKamer Ali Yüksel, Batuhan Bozkurt, Hamed Ketabdar. 1088-1089 [doi]
- Applying genetic algorithms to optimize the power in tiled SNUCA chip multicore architecturesAparna Mandke Dani, Bharadwaj Amrutur, Y. N. Srikant. 1090-1091 [doi]
- Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graphGui-Fang Zhang. 1094-1099 [doi]
- A particle-spring approach to geometric constraints solvingSimon E. B. Thierry. 1100-1105 [doi]
- Origami axioms and circle extensionAsem Kasem, Fadoua Ghourabi, Tetsuo Ida. 1106-1111 [doi]
- On three fuzzy connectives for flexible data retrieval and their axiomatizationPatrick Bosc, Olivier Pivert. 1114-1118 [doi]
- Relevance stability in blog retrievalMostafa Keikha, Shima Gerani, Fabio Crestani. 1119-1123 [doi]
- Performance and perceptions of human computation games for image taggingDion Hoe-Lian Goh, Chei Sian Lee, Alton Yeow-Kuan Chua. 1124-1129 [doi]
- Hierarchical comments-based clusteringChiao-Fang Hsu, James Caverlee, Elham Khabiri. 1130-1137 [doi]
- A Bayesian network approach to context sensitive query expansionZheng Ye, Xiangji Huang, Hongfei Lin. 1138-1142 [doi]
- Interactive feature selection for document clusteringYeming Hu, Evangelos E. Milios, James Blustein. 1143-1150 [doi]
- Calculating content recency based on timestamped and non-timestamped sources for supporting page quality estimationAdam Jatowt, Yukiko Kawai, Katsumi Tanaka. 1151-1158 [doi]
- Biomedical concept extraction based on combining the content-based and word order similaritiesDuy Dinh, Lynda Tamine. 1159-1163 [doi]
- Representing a bilingual lexicon with suffix treesJorge Costa, Gabriel Pereira Lopes, Luís Gomes, Luís M. S. Russo. 1164-1165 [doi]
- Inferring situation-based interests for mobile users: a case based reasoning approachOurdia Bouidghaghen, Lynda Tamine, Mohand Boughanem. 1166-1167 [doi]
- Positioning a virtual teacher in an MR physical task learning support systemMamoun Nawahdah, Tomoo Inoue. 1169-1174 [doi]
- An agent-based architecture for supporting the workgroups creation and the detection of out-of-context conversation on problem-based learning in virtual learning environmentsLaysa Mabel de Oliveira Fontes, Francisco Milton Mendes Neto, Alexandre Ádames Alves Pontes, Gustavo Augusto Lima de Campos. 1175-1180 [doi]
- A cognition-based interactive game platform for learning Chinese charactersChao-Lin Liu, Chia-Ying Lee, Jie-Li Tsai, Chia Ling Lee. 1181-1186 [doi]
- A solution for personalized t-learning applications integrated with a web educational platformDouglas Véras, Ig Ibert Bittencourt, Heitor Barros, Marlos Silva, Evandro de Barros Costa. 1187-1193 [doi]
- Leveraging the dynamics of learning by modeling and managing psychosocial relations and behavior by means of game theory and memeticsJairo C. Simões, Nizam Omar. 1194-1201 [doi]
- Towards the establishment of supporting mechanisms for modeling and generating educational contentVanessa Araujo Borges, José Carlos Maldonado, Ellen Francine Barbosa. 1202-1207 [doi]
- Teaching intelligible speech to the autistic children by interactive computer gamesMirfat Akter Sharmin, Md. Mizanur Rahman, Syed Ishtiaque Ahmed, Md. Mustafizur Rahman, S. M. Ferdous. 1208-1209 [doi]
- Style Avatar: a visualization system for teaching C coding styleJin-Su Lim, Jeong-Hoon Ji, Yun-Jung Lee, Gyun Woo. 1210-1211 [doi]
- Effects of scaffoldings on interactive diagram constructions in educational interface for elementary school teachers trainingAna Emília de Melo Queiroz, Alex Sandro Gomes, Cláudia Roberta, Araujo Gomes, Sávio Silveira de Queiroz. 1212-1213 [doi]
- Improving 3D navigation in multiscale environments using cubemap-based techniquesDaniel Ribeiro Trindade, Alberto Barbosa Raposo. 1215-1221 [doi]
- MusCat: a music browser featuring abstract pictures and zooming user interfaceKaori Kusama, Takayuki Itoh. 1222-1228 [doi]
- A web-based photo management system for large photo collections with user-customizable quality assessmentDong-Sung Ryu, Kwang Hwi Kim, Sun Young Park, Hwan-Gue Cho. 1229-1236 [doi]
- Composition of HCI evaluation methods for hybrid virtual environmentsMarcus F. C. Alencar, Alberto Barbosa Raposo, Simone Diniz Junqueira Barbosa. 1237-1244 [doi]
- A personal photograph browser for life log analysis based on location, time, and personAi Gomi, Takayuki Itoh. 1245-1251 [doi]
- A multimodal interaction component for digital televisionDiogo Pedrosa, José Augusto C. Martins Jr., Erick Erick Melo, César A. C. Teixeira. 1253-1258 [doi]
- Considering non-functional aspects in the design of hypermedia authoring toolsBruno Seabra Lima, Luiz Fernando Gomes Soares, Marcelo Ferreira Moreno. 1259-1266 [doi]
- Media-oriented operators for authoring interactive multimedia documents generated from capture sessionsDidier Augusto Vega-Oliveros, Diogo Santana Martins, Maria da Graça Campos Pimentel. 1267-1272 [doi]
- REME-D: a reflective epidemic message-oriented debugger for ambient-oriented applicationsElisa Gonzalez Boix, Carlos Noguera, Tom Van Cutsem, Wolfgang De Meuter, Theo D Hondt. 1275-1281 [doi]
- Type harvesting: a practical approach to obtaining typing information in dynamic programming languagesMichael Haupt, Michael Perscheid, Robert Hirschfeld. 1282-1289 [doi]
- FortressCheck: automatic testing for generic propertiesSeonghoon Kang, Sukyoung Ryu. 1290-1296 [doi]
- A formal framework for a functional language with adaptable componentsPascal Coupey, Christophe Fouqueré. 1297-1298 [doi]
- Relating function spaces to resourced function spacesLidia Sánchez-Gil, Mercedes Hidalgo-Herrero, Yolanda Ortega-Mallén. 1301-1308 [doi]
- Incremental concrete syntax for embedded languagesTom Dinkelaker, Michael Eichberg, Mira Mezini. 1309-1316 [doi]
- Large-scale, AST-based API-usage analysis of open-source Java projectsRalf Lämmel, Ekaterina Pek, Jürgen Starek. 1317-1324 [doi]
- Core operational semantics of ProtoMirko Viroli, Jacob Beal, Matteo Casadei. 1325-1332 [doi]
- A domain-specific language for managing feature modelsMathieu Acher, Philippe Collet, Philippe Lahire, Robert B. France. 1333-1340 [doi]
- Feedback-driven points-to analysisTobias Gutzmann, Jonas Lundberg, Welf Löwe. 1341-1342 [doi]
- An overview of a proof-based approach to detecting C vulnerabilitiesAmel Mammar. 1343-1344 [doi]
- Change-based FODA diagrams: bridging the gap between feature-oriented design and implementationPeter Ebraert, Quinten David Soetens, Dirk Janssens. 1345-1352 [doi]
- Distributed dynamic weaving is a crosscutting concernMichihiro Horie, Satoshi Morita, Shigeru Chiba. 1353-1360 [doi]
- Structuring adaptive replicated systems with design patterns and aspectsRodrigo Ramos Couto, Rodrigo Pereira Valentim, Udo Fritzke Jr., Luiz A. Ferreira Gomes, Daniel Merli Morais. 1361-1362 [doi]
- ID* Lite: improved D* Lite algorithmWeiya Yue, John Franco, Weiwei Cao, Hongwei Yue. 1364-1369 [doi]
- Incremental feature-based mapping from sonar data using Gaussian mixture modelsMilton Roberto Heinen, Paulo Martins Engel. 1370-1375 [doi]
- Template-based autonomous navigation in urban environmentsJefferson R. Souza, Daniel O. Sales, Patrick Yuri Shinzato, Fernando Santos Osório, Denis F. Wolf. 1376-1381 [doi]
- Integrated PSO and line based representation approach for SLAMMohammad Reza Mohammadi, Saeed Shiry Ghidary. 1382-1388 [doi]
- A test suite reduction approach based on pairwise interaction of requirementsXiang Chen, Lijiu Zhang, Qing Gu, Haigang Zhao, Ziyuan Wang, Xiaobing Sun, Daoxu Chen. 1390-1397 [doi]
- An empirical study on the usage of testability information to fault localization in softwareAlberto González-Sanchez, Rui Abreu, Hans-Gerhard Groß, Arjan J. C. van Gemund. 1398-1403 [doi]
- Locating faults using multiple spectra-specific modelsKai Yu, Mengxiang Lin, Qing Gao, Hui Zhang, Xiangyu Zhang. 1404-1410 [doi]
- IMPULSE: a design framework for multi-agent systems based on model transformationHiroyuki Nakagawa, Nobukazu Yoshioka, Akihiko Ohsuga, Shinichi Honiden. 1411-1418 [doi]
- Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDTDjuradj Babich, Peter J. Clarke, James F. Power, B. M. Golam Kibria. 1419-1424 [doi]
- Security mutation testing of the FileZilla FTP serverDaniel Woodraska, Michael Sanford, Dianxiang Xu. 1425-1430 [doi]
- Automatic reuse of process patterns in process modelingHanh Nhi Tran, Bernard Coulette, Tran Dan Thu, My Hang Vu. 1431-1438 [doi]
- Using lattice of class and method dependence for change impact analysis of object oriented programsXiaobing Sun, Bixin Li, Sai Zhang, Chuanqi Tao, Xiang Chen, Wanzhi Wen. 1439-1444 [doi]
- Towards thresholds of control flow complexity measures for BPMN modelsLaura Sánchez-González, Francisco Ruiz, Félix García, Jorge Cardoso. 1445-1450 [doi]
- An empirical study on the effectiveness of time-aware test case prioritization techniquesDongjiang You, Zhenyu Chen, Baowen Xu, Bin Luo, Chen Zhang. 1451-1456 [doi]
- On the equivalence of certain fault localization techniquesVidroha Debroy, W. Eric Wong. 1457-1463 [doi]
- Identifying properties of UML state machine diagrams that affect data and control dependenceHyeonjeong Kim, Vidroha Debroy, DooHwan Bae. 1464-1469 [doi]
- A semantically rich approach for collaborative model editionJonathan Michaux, Xavier Blanc, Marc Shapiro, Pierre Sutra. 1470-1475 [doi]
- On-line scheduling of real-time services with profit and penaltyShuo Liu, Gang Quan, Shangping Ren. 1476-1481 [doi]
- Testing a binary space partitioning algorithm with metamorphic testingFei-Ching Kuo, Shuang Liu, Tsong Yueh Chen. 1482-1489 [doi]
- A GUI bug finding framework for Android applicationsCuixiong Hu, Iulian Neamtiu. 1490-1491 [doi]
- Software security aspects of Java-based mobile phonesKarsten Sohr, Tanveer Mustafa, Adrian Nowak. 1494-1501 [doi]
- Complexity of fairness constraints for the Dolev-Yao attacker modelJan Cederquist, Mohammad Torabi Dashti. 1502-1509 [doi]
- On the (im)possibility of perennial message recognition protocols without public-key cryptographyMadeline González Muñiz, Peeter Laud. 1510-1515 [doi]
- Improved call graph comparison using simulated annealingOrestis Kostakis, Joris Kinable, Hamed Mahmoudi, Kimmo Mustonen. 1516-1523 [doi]
- A controlled natural language interface for authoring access control policiesLei Lei Shi, David W. Chadwick. 1524-1530 [doi]
- Reliable protection against session fixation attacksMartin Johns, Bastian Braun, Michael Schrank, Joachim Posegga. 1531-1537 [doi]
- High-speed web attack detection through extracting exemplars from HTTP trafficWei Wang 0012, Xiangliang Zhang. 1538-1543 [doi]
- Efficient traitor tracing for clone attack in content protectionHongxia Jin, Jeffrey B. Lotspiech. 1544-1549 [doi]
- Dynamic audit services for integrity verification of outsourced storages in cloudsYan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau. 1550-1557 [doi]
- Measuring the compatibility of service interaction protocolsMeriem Ouederni, Gwen Salaün, Ernesto Pimentel. 1560-1567 [doi]
- Adaptive provisioning of human expertise in service-oriented systemsFlorian Skopik, Daniel Schall, Harald Psaier, Schahram Dustdar. 1568-1575 [doi]
- Planning service agreements in soa-based systems through stochastic modelsMarcelo Teixeira, Ricardo Massa Ferreira Lima, Cesar A. L. Oliveira, Paulo Romero Martins Maciel. 1576-1581 [doi]
- Advanced service monitoring configurations with SLA decomposition and selectionHoward Foster, George Spanoudakis. 1582-1589 [doi]
- WS-Aggregation: distributed aggregation of web services dataWaldemar Hummer, Philipp Leitner, Schahram Dustdar. 1590-1597 [doi]
- Modeling behavioral RESTful web service interfaces in UMLIvan Porres, Irum Rauf. 1598-1605 [doi]
- Development and configuration of service-oriented systems familiesBardia Mohabbati, Marek Hatala, Dragan Gasevic, Mohsen Asadi, Marko Boskovic. 1606-1613 [doi]
- Configurable SOAP proxy cache for data provisioning web servicesPeep Küngas, Marlon Dumas. 1614-1621 [doi]
- Requirements engineering for services: an ontological frameworkBertrand Verlaine, Ivan Jureta, Stéphane Faulkner. 1622-1623 [doi]
- Proving the security of ElGamal encryption via indistinguishability logicJan Olaf Blech. 1625-1632 [doi]
- A dynamic constraint-based BMC strategy for generating counterexamplesHélène Collavizza, Nguyen Le Vinh, Michel Rueher, Samuel Devulder, Thierry Gueguen. 1633-1638 [doi]
- Quotients revisited for Isabelle/HOLCezary Kaliszyk, Christian Urban. 1639-1644 [doi]
- XEvolve: an XML schema evolution frameworkFrançois Picalausa, Frédéric Servais, Esteban Zimányi. 1645-1650 [doi]
- A proof-based approach to verifying reachability propertiesAmel Mammar, Marc Frappier, Fama Diagne. 1651-1657 [doi]
- Semantics and proof rules of invariant based programsRalph-Johan Back, Viorel Preoteasa. 1658-1665 [doi]
- Application of partial-order methods for the verification of closed-loop SDL systemsXavier Dumas, Philippe Dhaussy, Frédéric Boniol, Eric Bonnafous. 1666-1673 [doi]
- A method for the classification of folksonomy resourcesFrancisco Echarte, José Javier Astrain, Alberto Córdoba, Jesús E. Villadangos, Aritz Labat. 1675-1680 [doi]
- Parallelizing join computations of SPARQL queries for large semantic web databasesJinghua Groppe, Sven Groppe. 1681-1686 [doi]
- Ontologizing concept maps using graph theoryAmal Zouaq, Dragan Gasevic, Marek Hatala. 1687-1692 [doi]
- A semantic clustering-based approach for searching and browsing tag spacesDamir Vandic, Jan-Willem van Dam, Frederik Hogenboom, Flavius Frasincar. 1693-1699 [doi]
- Context-aware replacement operations for data cleaningStefan Brüggemann, Hans-Jürgen Appelrath. 1700-1704 [doi]
- Knowledge representation and reasoning of XML with ontologyFu Zhang, Li Yan, Z. M. Ma, Jingwei Cheng. 1705-1710 [doi]
- SpotTheLink: playful alignment of ontologiesStefan Thaler, Elena Paslaru Bontas Simperl, Katharina Siorpaes. 1711-1712 [doi]
- An offer evaluation system based on buyers interestsSamira Sadaoui, Wei Jiang. 1713-1714 [doi]
- Verification of data pattern for interactive privacy preservation modelSujoy Ray, Mohammad Fahim Nizam, Swagata Das, Benjamin C. M. Fung. 1716-1723 [doi]
- ImageAlert: credibility analysis of text-image pairs on the webYusuke Yamamoto, Katsumi Tanaka. 1724-1731 [doi]
- Hierarchical trust management for wireless sensor networks and its application to trust-based routingFenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho. 1732-1738 [doi]
- A formal approach towards measuring trust in distributed systemsGuido Schryen, Melanie Volkamer, Sebastian Ries, Sheikh Mahbub Habib. 1739-1745 [doi]