Abstract is missing.
- Spatial interpolation: an analytical comparison between kriging and RBF networksVinicius Sousa Fazio, Mauro Roisenberg. 2-7 [doi]
- Faster construction of ball-partitioning-based metric access methodsJéssica A. de Souza, Humberto Luiz Razente, Maria Camila Nardini Barioni. 8-12 [doi]
- Building a scalable spatial OLAP systemOliver Baltzer, Andrew Rau-Chaplin, Norbert Zeh. 13-15 [doi]
- A multiple feature vector framework for forest species recognitionPaulo Rodrigo Cavalin, Marcelo N. Kapp, Jefferson Martins, Luiz E. Soares de Oliveira. 16-20 [doi]
- Towards skeleton biometric identification using the microsoft kinect sensorRicardo M. Araujo, Gustavo Graña, Virginia Andersson. 21-26 [doi]
- Indoor localization using SLAM in parallel with a natural marker detectorLucas Teixeira, Alberto Barbosa Raposo, Marcelo Gattass. 27-33 [doi]
- Convexity local contour sequences for gesture recognitionPablo V. A. Barros, Nestor T. M. Junior, Juvenal M. M. Bisneto, Bruno J. T. Fernandes, Byron L. D. Bezerra, Sergio M. M. Fernandes. 34-39 [doi]
- An evolutionary spline fitting algorithm for identifying filamentous cyanobacteriaJeremy Porter, Dirk V. Arnold. 40-45 [doi]
- Gesture unit segmentation using support vector machines: segmenting gestures from rest positionsRenata C. B. Madeo, Clodoaldo Ap. M. Lima, Sarajane Marques Peres. 46-52 [doi]
- A data reduction and organization approach for efficient image annotationPriscila T. M. Saito, Pedro J. de Rezende, Alexandre X. Falcão, Celso T. N. Suzuki, Jancarlo F. Gomes. 53-57 [doi]
- An intelligent building that listens to your needsDer-Yeuan Yu, Ettore Ferranti, Hadeli Hadeli. 58-63 [doi]
- A collective robotic architecture in search and rescue scenariosMicael S. Couceiro, David Portugal, Rui P. Rocha. 64-69 [doi]
- Performance based task assignment in multi-robot patrollingCharles Pippin, Henrik I. Christensen, Lora Weiss. 70-76 [doi]
- Towards solving an obstacle problem by the cooperation of UAVs and UGVsShigeo Nakamura, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga. 77-82 [doi]
- Towards a domain specific modeling language for agent-based models in land use scienceCédric Grueau, João Araújo 0001. 83-85 [doi]
- Many-to-many interchangeable sets of values in CSPsChavalit Likitvivatanavong, Roland H. C. Yap. 86-91 [doi]
- Risk-neutral bounded max-sum for distributed constraint optimizationJavier Larrosa, Emma Rollon. 92-97 [doi]
- Dynamic virtual arc consistencyHiep Nguyen, Thomas Schiex, Christian Bessiere. 98-103 [doi]
- Solving equations on words through boolean satisfiabilityMichaël Larouche, Alexandre Blondin Massé, Sébastien Gaboury, Sylvain Hallé. 104-106 [doi]
- Out-of-bag discriminative graph miningAndreas Maunz, David Vorgrimmler, Christoph Helma. 109-114 [doi]
- A supervised machine learning classification algorithm for research articlesLeonidas Akritidis, Panayiotis Bozanis. 115-120 [doi]
- Discovering influential nodes from trust networkSabbir Ahmed, C. I. Ezeife. 121-128 [doi]
- Incremental linear model trees on massive datasets: keep it simple, keep it fastAndreas Hapfelmeier, Jana Schmidt, Stefan Kramer. 129-135 [doi]
- Model selection based product kernel learning for regression on graphsMadeleine Seeland, Stefan Kramer, Bernhard Pfahringer. 136-143 [doi]
- An algorithm for discovering clusters of different densities or shapes in noisy data setsFereshte Khani, Mohammad Javad Hosseini, Ahmad Ali Abin, Hamid Beigy. 144-149 [doi]
- Comparing relational and non-relational algorithms for clustering propositional dataRobson Motta, Alneu de Andrade Lopes, Bruno M. Nogueira, Solange Oliveira Rezende, Alípio Mário Jorge, Maria Cristina Ferreira de Oliveira. 150-155 [doi]
- Speeding up graph clustering via modular decomposition based compressionPaolo Serafino. 156-163 [doi]
- TNS: mining top-k non-redundant sequential rulesPhilippe Fournier-Viger, Vincent S. Tseng. 164-166 [doi]
- Learning non-linear classifiers with a sparsity constraint using L1 regularizationMathieu Blondel, Kazuhiro Seki, Kuniaki Uehara. 167-169 [doi]
- Empowering automatic data-center management with machine learningJosep Lluis Berral, Ricard Gavaldà, Jordi Torres. 170-172 [doi]
- Stream mining of frequent sets with limited memoryJuan J. Cameron, Alfredo Cuzzocrea, Carson Kai-Sang Leung. 173-175 [doi]
- Evolutionary optimization of wetlands designMarco Gaudesi, Andrea Marion, Tommaso Musner, Giovanni Squillero, Alberto Paolo Tonda. 176-181 [doi]
- Disguised malware script detection system using hybrid genetic algorithmJinhyun Kim, Byung Ro Moon. 182-187 [doi]
- Automatic generation of evolutionary operators: a study with mutation strategies for the differential evolutionVinicius Veloso de Melo, Grazieli Luiza Costa Carosio. 188-193 [doi]
- Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problemsPablo Rabanal, Ismael Rodríguez. 194-199 [doi]
- A hybrid compact genetic algorithm applied to the multi-level capacitated lot sizing problemClaudio Fabiano Motta Toledo, Márcio da Silva Arantes, Renato Resende Ribeiro de Oliveira, Alexandre C. B. Delbem. 200-205 [doi]
- Optimization metaheuristics for minimizing variance in a real-world statistical applicationEstevão Costa, Fábio Fabris, Alexandre Rodrigues Loureiros, Hannu Ahonen, Flávio Miguel Varejão. 206-207 [doi]
- Horizontal partitioning of very-large data warehouses under dynamically-changing query workloads via incremental algorithmsLadjel Bellatreche, Rima Bouchakri, Alfredo Cuzzocrea, Sofian Maabout. 208-210 [doi]
- Leader-follower formation control of multiple nonholonomic robots based on backsteppingZhaoxia Peng, Guoguang Wen, Ahmed Rahmani. 211-216 [doi]
- A Kalman filter based approach to probabilistic gas distribution mappingJose-Luis Blanco, Javier G. Monroy, Achim J. Lilienthal, Javier González Jiménez. 217-222 [doi]
- An investigation into the development of service-oriented robotic systemsLucas Bueno Ruas de Oliveira, Fernando S. Osório, Elisa Yumi Nakagawa. 223-228 [doi]
- A feasibility analysis on using bathymetry for navigation of autonomous underwater vehiclesBharath Kalyan, Mandar Chitre. 229-231 [doi]
- Towards a software tool for ultrasound guided robotic hip resurfacing surgeryP. J. S. Gonçalves, P. M. B. Torres, J. M. M. Martins. 232-234 [doi]
- Real time autonomous navigation and obstacle avoidance using a semi-global stereo methodCaio César Teodoro Mendes, Denis Fernando Wolf. 235-236 [doi]
- Heterogeneous data fusion via matrix factorization for augmenting item, group and friend recommendationsWei Zeng, Li Chen. 237-244 [doi]
- Inferring user utility for query revision recommendationHenry Blanco, Francesco Ricci. 245-252 [doi]
- Recommending insurance ridersLior Rokach, Guy Shani, Bracha Shapira, Eyal Chapnik, Gali Siboni. 253-260 [doi]
- Constructing and comparing user mobility profiles for location-based servicesXihui Chen, Jun Pang, Ran Xue. 261-266 [doi]
- Mining frequent itemsets over tuple-evolving data streamsChongsheng Zhang, Yuan-Hao, Mirjana Mazuran, Carlo Zaniolo, Hamid Mousavi, Florent Masseglia. 267-274 [doi]
- Learning hybrid recommender models for heterogeneous semantic dataAndreas Lommatzsch, Benjamin Kille, Sahin Albayrak. 275-276 [doi]
- Enhancing social matrix factorization with privacyShahab Mokarizadeh, Nima Dokoohaki, Mihhail Matskin, Ramona Bunea. 277-278 [doi]
- Users segmentations for recommendationLin Chen, Richi Nayak, Sangeetha Kutty, Yue Xu. 279-280 [doi]
- Computing semantic relatedness using word frequency and layout information of WikipediaPatrick Chan, Yoshinori Hijikata, Shogo Nishida. 282-287 [doi]
- Improved text annotation with Wikipedia entitiesChristos Makris, Yannis Plegas, Evangelos Theodoridis. 288-295 [doi]
- Semantic news recommendation using wordnet and bing similaritiesMichel Capelle, Frederik Hogenboom, Alexander Hogenboom, Flavius Frasincar. 296-302 [doi]
- Environmental service discovery based on semantically annotated OGC service descriptionsIker Larizgoitia, Ioan Toma, Arturo Beltran, Alejandro Llaves, Patrick Maué. 303-310 [doi]
- A software measurement task ontologyMonalessa Perini Barcellos, Ricardo de Almeida Falbo. 311-318 [doi]
- Enhancing scientific information systems with semantic annotationsEric Leclercq, Marinette Savonnet. 319-324 [doi]
- Ontology acquisition from web service descriptionsShahab Mokarizadeh, Peep Küngas, Mihhail Matskin. 325-332 [doi]
- Rank prediction for semantically annotated resourcesPasquale Minervini, Nicola Fanizzi, Claudia d'Amato, Floriana Esposito. 333-338 [doi]
- A mediator for statistical linked dataLívia Ruback, Marcia Pesce, Sofia Manso, Sérgio Ortiga, Percy E. Rivera Salas, Marco A. Casanova. 339-341 [doi]
- Modeling I/O interference for data intensive distributed applicationsSven Groot, Kazuo Goda, Daisaku Yokoyama, Miyuki Nakano, Masaru Kitsuregawa. 343-350 [doi]
- Building an on-demand virtual computing market in non-commercial communitiesMatthias Steinbauer, Ismail Khalil, Gabriele Kotsis. 351-356 [doi]
- A progress and profile-driven cloud-VM for resource-efficiency and fairness in e-science environmentsJosé Simão, Luís Veiga. 357-362 [doi]
- Input data organization for batch processing in time window based computationsLeonardo Aniello, Leonardo Querzoni, Roberto Baldoni. 363-370 [doi]
- GCplace: geo-cloud based correlation aware data replica placementZhen Ye, Shanping Li, Xiaozhen Zhou. 371-376 [doi]
- High-resolution spatial interpolation on cloud platformsAbdelmounaam Rezgui, Zaki Malik, Chaowei Yang. 377-382 [doi]
- Matchmaking of IaaS cloud computing offers leveraging linked dataMaciej Zaremba, Sami Bhiri, Tomas Vitvar, Manfred Hauswirth. 383-388 [doi]
- Hospitality of cloud platformsAshish Agrawal, T. V. Prabhakar. 389-396 [doi]
- log2cloud: log-based prediction of cost-performance trade-offs for cloud deploymentsDiego Perez-Palacin, Radu Calinescu, José Merseguer. 397-404 [doi]
- Study on supporting technology for operational procedure design of IT systems in cloud-era datacentersHiroaki Shikano, Machiko Asaie, Junji Yamamoto, Tatsuya Saito, Shunsuke Ota, Keitaro Uehara. 405-407 [doi]
- Inter cloud capable dynamic resource management with model of behaviorKiril Schröder, Wolfgang Nebel. 408-410 [doi]
- SCAling: SLA-driven cloud auto-scalingYousri Kouki, Thomas Ledoux. 411-414 [doi]
- Improving context interpretation by using fuzzy policies: the case of adaptive video streamingLucas Provensi, Frank Eliassen, Roman Vitenberg, Romain Rouvoy. 415-422 [doi]
- Hyphen: a hybrid protocol for generic overlay construction in P2P environmentsMouna Allani, Benoît Garbinato, Peter Pietzuch. 423-430 [doi]
- 2P middleware platform for light-train systemsRolando Martins, Luís M. B. Lopes, Fernando M. A. Silva, Priya Narasimhan. 431-438 [doi]
- Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysisNarasimha Raghavan Veeraragavan, Andrea Bondavalli, Leonardo Montecchi, Roman Vitenberg, Nicola Nostro, Hein Meling. 439-446 [doi]
- Maximizing availability of content in disruptive environments by cross-layer optimizationMinyoung Kim, Ashish Gehani, Je-Min Kim, Dawood Tariq, Mark-Oliver Stehr, Jin-Soo Kim. 447-454 [doi]
- MoSQL: an elastic storage engine for MySQLAlexander Tomic, Daniele Sciascia, Fernando Pedone. 455-462 [doi]
- A multi-resource load balancing algorithm for cloud cache systemsYu Jia, Ivan Brondino, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Dianfu Ma. 463-470 [doi]
- Adaptive monitoring of web-based applications: a performance studyJoão Paulo Magalhães, Luis Moura Silva. 471-478 [doi]
- Experience with a middleware infrastructure for service oriented financial applicationsJosé Pedro Oliveira, José Pereira. 479-484 [doi]
- Identifying incompatible service implementations using pooled decision treesChristian Inzinger, Waldemar Hummer, Benjamin Satzger, Philipp Leitner, Schahram Dustdar. 485-492 [doi]
- Improving transaction abort rates without compromising throughput through judicious schedulingAna Nunes, José Pereira. 493-494 [doi]
- Towards a ranking framework for software componentsDhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam. 495-498 [doi]
- Google play is not a long tail market: an empirical analysis of app adoption on the Google play app marketNan Zhong, Florian Michahelles. 499-504 [doi]
- iLauncher: an intelligent launcher for mobile apps based on individual usage patternsLi-Yu Tang, Pi-Cheng Hsiu, Jiun-Long Huang, Ming-Syan Chen. 505-512 [doi]
- iPrevention: towards a novel real-time smartphone-based fall prevention systemAkm Jahangir Alam Majumder, Farzana Rahman, Ishmat Zerin, William Ebel Jr., Sheikh Iqbal Ahamed. 513-518 [doi]
- Predictive indoor navigation using commercial smart-phonesBalajee Kannan, Felipe Meneguzzi, M. Bernardine Dias, Katia P. Sycara. 519-525 [doi]
- 2Henning Heitkötter, Tim A. Majchrzak, Herbert Kuchen. 526-533 [doi]
- LOCCAM - loosely coupled context acquisition middlewareMarcio E. F. Maia, Romulo Gadelha, André Sales Fonteles, Benedito J. A. Neto, Windson Viana, Rossana M. C. Andrade. 534-541 [doi]
- Eliminating the XML overhead in embedded XML languagesSven Groppe, Björn Schütt, Stefan Werner. 542-547 [doi]
- Broadcast cancellation in search mechanismsRui Lima, Carlos Baquero, Hugo Miranda. 548-553 [doi]
- Sensor-field modeling based on in-network data prediction: an efficient strategy for answering complex queries in wireless sensor networksJosé Everardo Bessa Maia, Angelo Brayner. 554-559 [doi]
- Distributed and efficient algorithm for self-reconfiguration of MEMS microrobotsHicham Lakhlef, Hakim Mabed, Julien Bourgeois. 560-566 [doi]
- Participatory sensing based traffic condition monitoring using horn detectionRohan Banerjee, Aniruddha Sinha, Arindam Saha. 567-569 [doi]
- Towards a total recall: an activity tracking and recall mechanism for mobile devicesSangho Yi, Jaehyuck Shin, Yoonkyong Lee, Hyun-Jin Choi. 570-572 [doi]
- Radio resource management in coordinated antenna system deploymentsVinay Bheemesh, Parag Kulkarni, Fengming Cao, Zhong Fan. 573-576 [doi]
- A semi-supervised graph-based algorithm for detecting outliers in online-social-networksReza Hassanzadeh, Richi Nayak. 577-582 [doi]
- Service-centric networking extensionsTorsten Braun, Andreas Mauthe, Vasilios A. Siris. 583-590 [doi]
- Bounded gossip: a gossip protocol for large-scale datacentersMiguel Branco, João Leitão, Luís Rodrigues. 591-596 [doi]
- DoS-resilient virtual networks through multipath embedding and opportunistic recoveryRodrigo Ruas Oliveira, Leonardo Richter Bays, Daniel S. Marcon, Miguel C. Neves, Luciana Salete Buriol, Luciano Paschoal Gaspary, Marinho P. Barcellos. 597-602 [doi]
- A novel demand-aware fairness metric for IEEE 802.11 wireless networksDmitriy Kuptsov, Boris Nechaev, Andrei Gurtov, Andrey Lukyanenko. 603-610 [doi]
- A delivery method considering communication loads for sensor data stream with different collection cyclesTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 611-618 [doi]
- A decentralized utility-based grid scheduling algorithmJoão Vasques, Luís Veiga. 619-624 [doi]
- On the load balancing of virtual networks in distributed cloudsGlauco Estacio Gonçalves, Patricia Takako Endo, André Vitor de Almeida Palhares, Marcelo Anderson Santos, Judith Kelner, Djamel Sadok. 625-631 [doi]
- A flow-based optimization model for throughput-oriented relay node placement in wireless sensor networksEduardo Feo Flushing, Gianni A. Di Caro. 632-639 [doi]
- ABOI: a novel strategy to mitigate the blocking due to outdated information in OCS/OBS networkIgo Moura, Felipe Mazullo, José Maranhão Neto, André Castelo Branco Soares. 640-645 [doi]
- isBF: scalable in-packet bloom filter based multicastIlya Nikolaevskiy, Andrey Lukyanenko, Tatiana Polishchuk, Valentin Polishchuk, Andrei Gurtov. 646-648 [doi]
- A backward-compatible protocol for inter-routing over heterogeneous overlay networksGiang Ngo Hoang, Luigi Liquori, Vincenzo Ciancaglini, Petar Maksimovic, Hung Nguyen Chan. 649-651 [doi]
- Privacy-friendly tasking and trading of energy in smart gridsTassos Dimitriou, Ghassan Karame. 652-659 [doi]
- A combined structural and dynamic modelling approach for dependability analysis in smart gridJonas Wäfler, Poul E. Heegaard. 660-665 [doi]
- On the security of distributed power system state estimation under targeted attacksOgnjen Vukovic, György Dán. 666-672 [doi]
- Impact assessment of smart meter grouping on the accuracy of forecasting algorithmsDejan Ilic, Per Goncalves da Silva, Stamatis Karnouskos, Malte Jacobi. 673-679 [doi]
- Demand response computation for future smart grids incorporating wind powerNihan Çiçek, Hakan Deliç. 680-685 [doi]
- Towards cosimulating network and electrical systems for performance evaluation in smart gridHwantae Kim, Wonkyun Park, Hwangnam Kim. 686-687 [doi]
- Modeling fundamentals for smart grid enabled ecodistrictsMurat Ahat, Soufian Ben Amor, Alain Bui. 688-689 [doi]
- A scalable communication infrastructure for smart grid applications using multicast over public networksSebastian Meiling, Till Steinbach, Thomas C. Schmidt, Matthias Wählisch. 690-694 [doi]
- The impact of user-browser interaction on web performanceRaúl Peña-Ortiz, José A. Gil, Julio Sahuquillo, Ana Pont. 695-702 [doi]
- Exploiting emoticons in sentiment analysisAlexander Hogenboom, Daniella Bal, Flavius Frasincar, Malissa Bal, Franciska de Jong, Uzay Kaymak. 703-710 [doi]
- Extending the web to support personal network servicesJohn Lyle, Claes Nilsson, Anders Isberg, Shamal Faily. 711-716 [doi]
- Model words-driven approaches for duplicate detection on the webMarnix de Bakker, Damir Vandic, Flavius Frasincar, Uzay Kaymak. 717-723 [doi]
- Detecting tip spam in location-based social networksHelen Costa, Fabrício Benevenuto, Luiz Henrique de Campos Merschmann. 724-729 [doi]
- Discovering local attractions from geo-tagged photosOmbretta Gaggi. 730-735 [doi]
- Supporting entailment constraints in the context of collaborative web applicationsPatrick Gaubatz, Uwe Zdun. 736-741 [doi]
- Feature-based object identification for web automationChristoph Herzog, Iraklis Kordomatis, Wolfgang Holzinger, Ruslan R. Fayzrakhmanov, Bernhard Krüpl-Sypien. 742-749 [doi]
- Service farming: an ad-hoc and QoS-aware web service composition approachWenbin Li, Youakim Badr, Frédérique Biennier. 750-756 [doi]
- Designing a 3D widget library for WebGL enabled browsersAnna-Liisa Mattila, Tommi Mikkonen. 757-760 [doi]
- Process-aware web programming with JolieFabrizio Montesi. 761-763 [doi]
- Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approachRafael Leonardo Vivian, Elisa Hatsue Moriya Huzita, Gislaine Camila Lapasini Leal. 765-770 [doi]
- A publication-subscription interaction schema for desktop grid computingLeila Abidi, Jean-Christophe Dubacq, Christophe Cérin, Mohamed Jemni. 771-778 [doi]
- Distributed dynamic data driven prediction based on reinforcement learning approachSzu-Yin Lin, Kuo-Ming Chao, Chi-Chun Lo, Nick Godwin. 779-784 [doi]
- HawkEye: a tool for collaborative business process modelling and verificationRiccardo Cognini, Damiano Falcioni, Andrea Polini, Alberto Polzonetti, Barbara Re. 785-786 [doi]
- Continuous query processing with concurrency control: reading updatable resources consistentlyMasafumi Oyamada, Hideyuki Kawashima, Hiroyuki Kitagawa. 788-794 [doi]
- Novelty detection algorithm for data streams multi-class problemsElaine R. Faria, João Gama, André C. P. L. F. Carvalho. 795-800 [doi]
- Efficient data stream classification via probabilistic adaptive windowsAlbert Bifet, Bernhard Pfahringer, Jesse Read, Geoff Holmes. 801-806 [doi]
- STONE: a stream-based DDoS defense frameworkMar Callau-Zori, Ricardo Jiménez-Peris, Vincenzo Gulisano, Marina Papatriantafilou, Zhang Fu, Marta Patiño-Martínez. 807-812 [doi]
- Random rules from data streamsEzilda Almeida, Petr Kosina, João Gama. 813-814 [doi]
- An adaptive regression tree for non-stationary data streamsAmeneh Gholipour, Mohammad Javad Hosseini, Hamid Beigy. 815-817 [doi]
- Driver input selection for main-memory multi-way joinsEmmanouil Valsomatzis, Anastasios Gounaris. 818-825 [doi]
- Adaptive memory-aware chunk sizing techniques for data-intensive queries over web servicesAnastasia Theodouli, Anastasios Gounaris. 826-831 [doi]
- Efficient XML duplicate detection using an adaptive two-level optimizationLuís Leitão, Pável Calado. 832-837 [doi]
- Abstract program slicing of database query languagesRaju Halder, Agostino Cortesi. 838-845 [doi]
- CodeBlast: a two-stage algorithm for improved program similarity matching in large software repositoriesAnupam Bhattacharjee, Hasan M. Jamil. 846-852 [doi]
- Using maude rewriting system to modularize and extend SQLScibor Sobieski, Bartosz Zielinski 0002. 853-858 [doi]
- Extracting differences between regular tree grammarsKazuma Horie, Nobutaka Suzuki. 859-864 [doi]
- Reducing data transfer for charts on adaptive web sitesGiuseppe Burtini, Scott Fazackerley, Ramon Lawrence. 865-867 [doi]
- Filtering XFD toward interoperabilityJoshua Amavi, Mirian Halfeld Ferrari Alves. 868-871 [doi]
- XML search personalization strategies using query expansion, reranking and a search engine modificationLuis M. de Campos, Juan M. Fernández-Luna, Juan F. Huete, Eduardo Vicente-López. 872-877 [doi]
- Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationshipsKosetsu Tsukuda, Hiroaki Ohshima, Mitsuo Yamamoto, Hirotoshi Iwasaki, Katsumi Tanaka. 878-885 [doi]
- Reducing information redundancy in search resultsYannis Plegas, Sofia Stamou. 886-893 [doi]
- Predicting query reformulation type from user behaviorKazutoshi Umemoto, Takehiro Yamamoto, Satoshi Nakamura, Katsumi Tanaka. 894-901 [doi]
- Determining language variant in microblog messagesGustavo Laboreiro, Matko Bosnjak, Luís Sarmento, Eduarda Mendes Rodrigues, Eugénio C. Oliveira. 902-907 [doi]
- gSVD++: supporting implicit feedback on recommender systems with metadata awarenessMarcelo Garcia Manzato. 908-913 [doi]
- Effectiveness of state-of-the-art features for microblog searchFiras Damak, Karen Pinel-Sauvagnat, Mohand Boughanem, Guillaume Cabanac. 914-919 [doi]
- Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysisSabrina Senatore, Gabriella Pasi. 920-926 [doi]
- Text clustering using one-mode projection of document-word bipartite graphsAjitesh Srivastava, Axel J. Soto, Evangelos E. Milios. 927-932 [doi]
- When entities meet query recommender systems: semantic search shortcutsDiego Ceccarelli, Sergiu Gordea, Claudio Lucchese, Franco Maria Nardini, Raffaele Perego. 933-938 [doi]
- Feature selections for authorship attributionJacques Savoy. 939-941 [doi]
- Evaluating the utilization of Twitter messages as a source of security alertsRodrigo Campiolo, Luiz Arthur F. Santos, Daniel Macedo Batista, Marco Aurélio Gerosa. 942-943 [doi]
- Towards a private vector space model for confidential documentsDaniel Abril, Guillermo Navarro-Arribas, Vicenç Torra. 944-945 [doi]
- Hierarchical visual filtering, pragmatic and epistemic actions for database visualizationJosé Fernando Rodrigues Jr., Carlos E. Cirilo, Antônio Francisco do Prado, Luciana A. M. Zaina. 946-952 [doi]
- Assessment of a user centered interface for teleoperation and 3D environmentsJuliano Franz, Anderson Maciel, Luciana Porcher Nedel. 953-960 [doi]
- Video shot representation based on histogramsTamires Tessarolli de Souza, Rudinei Goularte. 961-966 [doi]
- Interactive coffee table for exploration of personal photos and videosDiogo de Carvalho Pedrosa, Rodrigo Laiola Guimarães, Maria da Graça Campos Pimentel, Dick C. A. Bulterman, Pablo César. 967-974 [doi]
- The CAS project: a general infrastructure for pervasive capture and access systemsRafael Brandão, Paulo França, Adriano Medeiros, Felipe Portella, Renato Cerqueira. 975-980 [doi]
- Adaptive video-aware FEC-based mechanism with unequal error protection schemeRoger Immich, Eduardo Cerqueira, Marilia Curado. 981-988 [doi]
- CrowdVis: a framework for real time crowd visualizationHenry Braun, Vinícius Jurinic Cassol, Rafael Hocevar, Fernando Pinho Marson, Soraia Raupp Musse. 989-995 [doi]
- A visual analytics tool for system logs adopting variable recommendation and feature-based filteringAki Hayashi, Takayuki Itoh, Satoshi Nakamura. 996-998 [doi]
- WAVE-CIA: a novel CIA approach based on call graph miningBixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung. 1000-1005 [doi]
- Representing dynamic pluggable software unitsFernando Barros. 1006-1012 [doi]
- A novel watermarking method for Java programsMohammad Alitavoli, Mahdi Joafshani, Aida Erfanian. 1013-1018 [doi]
- An empirical study on developer interactions in StackOverflowShaowei Wang, David Lo, Lingxiao Jiang. 1019-1024 [doi]
- A study of COTS integration projects: product characteristics, organization, and life cycle modelsKaterina Megas, Gabriella Belli, William B. Frakes, Julián Urbano, Reghu Anguswamy. 1025-1030 [doi]
- Test-based SPL extraction: an exploratory studyAlcemir Santos, Felipe Nunes Gaia, Eduardo Figueiredo, Pedro Santos Neto, João Araújo 0001. 1031-1036 [doi]
- A model to detect problems on scrum-based software development projectsMirko Perkusich, Hyggo Oliveira de Almeida, Angelo Perkusich. 1037-1042 [doi]
- An experiment specification language for goal-driven, automated performance evaluationsDennis Westermann, Jens Happe, Roozbeh Farahbod. 1043-1048 [doi]
- Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithmsRubing Huang, Xiaodong Xie, Jinfu Chen, Yansheng Lu. 1049-1054 [doi]
- WSCCT: a tool for WS-BPEL compositions conformance testingAfef Jmal Maâlej, Moez Krichen, Mohamed Jmaiel. 1055-1061 [doi]
- Automatic recognition of design motifs using semantic conditionsAwny Alnusair, Tian Zhao, Gongjun Yan. 1062-1067 [doi]
- A quantitative approach for evaluating software maintenance servicesHumberto Marques-Neto, Gladston J. Aparecido, Marco Tulio Valente. 1068-1073 [doi]
- Multi-objective test case prioritization for GUI applicationsWei Sun, Zebao Gao, Weiran Yang, Chunrong Fang, Zhenyu Chen. 1074-1079 [doi]
- A systematic review on mining techniques for crosscutting concernsRafael Serapilha Durelli, Daniel S. M. Santibáñez, Nicolas Anquetil, Márcio Eduardo Delamaro, Valter Vieira de Camargo. 1080-1087 [doi]
- A hybrid bug triage algorithm for developer recommendationTao Zhang, Byungjeong Lee. 1088-1094 [doi]
- Executing and debugging UML models: an fUML extensionYoann Laurent, Reda Bendraou, Marie-Pierre Gervais. 1095-1102 [doi]
- i*Chameleon: a platform for developing multimodal application with comprehensive development cycleKenneth W. K. Lo, Will W. W. Tang, Grace Ngai, Alvin T. S. Chan, Hong Va Leong, Stephen C. F. Chan. 1103-1108 [doi]
- Software effort prediction: a hyper-heuristic decision-tree based approachMárcio P. Basgalupp, Rodrigo C. Barros, Tiago S. da Silva, André C. P. L. F. Carvalho. 1109-1116 [doi]
- Quantified extreme scenario based design approachAsmaa Abdallah, Riham Hassan, Mostafa Abdel Azim. 1117-1122 [doi]
- Evaluating the conventional wisdom in clone removal: a genealogy-based empirical studyMinhaz F. Zibran, Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider. 1123-1130 [doi]
- OSDC: adapting ODC for developing more secure softwareUmme Hunny, Mohammad Zulkernine, Komminist Weldemariam. 1131-1136 [doi]
- A model-based framework for flexible safety-critical software development: a design studyJesper Pedersen Notander, Per Runeson, Martin Höst. 1137-1144 [doi]
- Notation-driven vs metamodel-driven development of domain-specific modeling languages: an empirical studyLaurent Wouters, Marie-Pierre Gervais. 1145-1146 [doi]
- Estimating the size of data mart projectsWagner Gonçalves Ferreira, Humberto Torres Marques-Neto. 1147-1148 [doi]
- Energy consumption estimation of virtual machinesIngolf Waßmann, Daniel Versick, Djamshid Tavangarian. 1151-1156 [doi]
- Energy-driven consolidation in digital homeRemi Druilhe, Matthieu Anne, Jacques Pulou, Laurence Duchien, Lionel Seinturier. 1157-1162 [doi]
- Energy efficiency management in computational grids through energy-aware schedulingSilvana Teodoro, Andriele Busatto do Carmo, Luiz Gustavo Fernandes. 1163-1168 [doi]
- Meta-learning based architectural and algorithmic optimization for achieving green-ness in predictive workload analyticsNidhi Singh, Shrisha Rao. 1169-1176 [doi]
- Comparing mobile applications' energy consumptionClaas Wilke, Christian Piechnick, Sebastian Richly, Georg Püschel, Sebastian Götz, Uwe Aßmann. 1177-1179 [doi]
- A design method for modular energy-aware softwareSteven te Brinke, Somayeh Malakuti, Christoph Bockisch, Lodewijk Bergmans, Mehmet Aksit. 1180-1182 [doi]
- for software engineeringBirgit Penzenstadler. 1183-1185 [doi]
- Accelerated robustness testing of state-based components using reverse executionPatrick Heckeler, Bastian Schlich, Thomas Kropf. 1188-1195 [doi]
- Using cross-entropy for satisfiabilityHana Chockler, Alexander Ivrii, Arie Matsliah, Simone Fulvio Rollini, Natasha Sharygina. 1196-1203 [doi]
- Static analysis of list-manipulating programs via bit-vectors and numerical abstractionsLiqian Chen, Renjian Li, Xueguang Wu, Ji Wang. 1204-1210 [doi]
- The search for the laws of automatic random testingCarlo A. Furia, Bertrand Meyer, Manuel Oriol, Andrey Tikhomirov, Yi Wei. 1211-1216 [doi]
- Test case generation from natural language requirements based on SCR specificationsGustavo Carvalho, Diogo Falcão, Flávia A. Barros, Augusto Sampaio, Alexandre Mota, Leonardo Motta, Mark R. Blackburn. 1217-1222 [doi]
- Mutation testing strategies using mutant classificationMike Papadakis, Yves Le Traon. 1223-1229 [doi]
- Common specification language for static and dynamic analysis of C programsMickaël Delahaye, Nikolai Kosmatov, Julien Signoles. 1230-1235 [doi]
- An interactive extension mechanism for reusing verified programsSosuke Moriguchi, Takuo Watanabe. 1236-1243 [doi]
- Advanced modularity for building SPL feature models: a model-driven approachJoão Araújo 0001, Miguel Goulão, Ana Moreira, Inês Simão, Vasco Amaral, Elisa L. A. Baniassad. 1246-1253 [doi]
- Aspect interaction chart - a UML approach for modularizing aspect interaction conflictsShubhanan Bakre, Atef Bader, Tzilla Elrad. 1254-1259 [doi]
- A catalogue of functional software requirement patterns for the domain of content management systemsCristina Palomares, Carme Quer, Xavier Franch, Samuel Renault, Cindy Guerlain. 1260-1265 [doi]
- A requirements catalog for mobile learning environmentsNemésio Freitas Duarte Filho, Ellen Francine Barbosa. 1266-1271 [doi]
- Test intents: enhancing the semantics of requirements traceability links in test casesCelal Ziftci, Ingolf Krüger. 1272-1277 [doi]
- On the use of metamodeling for relating requirements and architectural design decisionsDiego Dermeval, Jaelson Castro, Carla T. L. L. Silva, João Pimentel, Ig Ibert Bittencourt, Patrick Henrique da S. Brito, Endhe Elias, Thyago Tenório, Alan Pedro da Silva. 1278-1283 [doi]
- Dynamic decision tree for legacy use-case recoveryPhilippe Dugerdil, David Sennhauser. 1284-1291 [doi]
- Selecting among alternatives using dependencies: an NFR approachRutvij Mehta, Tomás Ruiz-López, Lawrence Chung, Manuel Noguera. 1292-1297 [doi]
- Common criteria compliant software development (CC-CASD)Kristian Beckers, Stephan Faßbender, Denis Hatebur, Maritta Heisel, Isabelle Côté. 1298-1304 [doi]
- The role of NFRs when transforming i* requirements models into OO-method modelsAlmir Buarque, Jaelson Castro, Fernanda M. R. Alencar. 1305-1306 [doi]
- Configuration support for feature models with soft constraintsJorge Barreiros, Ana Moreira. 1307-1308 [doi]
- Modeling the alignment between business and IS/IT: a requirements engineering perspectiveCarlos Salgado, Ricardo Jorge Machado, Rita Suzana Pitangueira Maciel. 1309-1311 [doi]
- A conceptual approach to gene expression analysis enhanced by visual analyticsCássio A. Melo, Marie-Aude Aufaure, Constantinos Orphanides, Simon Andrews, Kenneth McLeod, Albert Burger. 1314-1319 [doi]
- Cross-lattice behavior of general ACO folding for proteins in the HP modelMimma Nardelli, Luciano Tedesco, Alessio Bechini. 1320-1327 [doi]
- BenchDW: a generic framework for biological data warehouse benchmarkingThomas Triplet, Gregory Butler. 1328-1334 [doi]
- A data warehouse as an infrastructure to mine molecular descriptors for virtual screeningGiovanni Xavier Perazzo, Ana T. Winck, Karina S. Machado. 1335-1336 [doi]
- Internet of things: a process calculus approachIvan Lanese, Luca Bedogni, Marco Di Felice. 1339-1346 [doi]
- Reliable supervisory coordination of stochastic communicating processes with dataJasen Markovski. 1347-1354 [doi]
- A peer to peer agent coordination framework for IHE based cross-community health record exchangeVisara Urovi, Alex C. Olivieri, Stefano Bromuri, Nicoletta Fornara, Michael Ignaz Schumacher. 1355-1362 [doi]
- Specifying and analysing reputation systems with a coordination languageAlessandro Celestini, Rocco De Nicola, Francesco Tiezzi. 1363-1368 [doi]
- Combining self-organisation, context-awareness and semantic reasoning: the case of resource discovery in opportunistic networksGraeme Stevenson, Juan Ye, Simon Dobson, Danilo Pianini, Sara Montagna, Mirko Viroli. 1369-1376 [doi]
- Constrained global types for dynamic checking of protocol conformance in multi-agent systemsDavide Ancona, Matteo Barbieri, Viviana Mascardi. 1377-1379 [doi]
- Probabilistic embedding: experiments with tuple-based probabilistic languagesStefano Mariani, Andrea Omicini. 1380-1382 [doi]
- A framework for the intelligent delivery and user-adequate visualization of process informationMarkus Hipp, Bela Mutschler, Bernd Michelberger, Manfred Reichert. 1383-1390 [doi]
- Towards data-aware constraints in declareMarco Montali, Federico Chesani, Paola Mello, Fabrizio Maria Maggi. 1391-1396 [doi]
- Assessing the best-order for business process model refactoringMaría Fernández-Ropero, Ricardo Pérez-Castillo, José A. Cruz-Lemus, Mario Piattini. 1397-1402 [doi]
- Start time and duration distribution estimation in semi-structured processesAndreas Wombacher, Maria-Eugenia Iacob. 1403-1409 [doi]
- IT evaluation in business groups: a maturity modelFlorian Hamel, Thomas Herz, Falk Uebernickel, Walter Brenner. 1410-1417 [doi]
- Amending C-net discovery algorithmsMarc Solé, Josep Carmona. 1418-1425 [doi]
- Dynamic instance queuing in process-aware information systemsJohannes Pflug, Stefanie Rinderle-Ma. 1426-1433 [doi]
- Enterprise integration using event actor based event transformationsSimon Tragatschnig, Uwe Zdun. 1434-1440 [doi]
- Generic support for RBAC break-glass policies in process-aware information systemsSigrid Schefer-Wenzl, Mark Strembeck. 1441-1446 [doi]
- Data flow abstractions and adaptations through updatable process viewsJens Kolb, Manfred Reichert. 1447-1453 [doi]
- Data-aware process mining: discovering decisions in processes using alignmentsMassimiliano de Leoni, Wil M. P. van der Aalst. 1454-1461 [doi]
- On the exploitation of process mining for security audits: the process discovery caseRafael Accorsi, Thomas Stocker, Günter Müller. 1462-1468 [doi]
- 3RoME: a value-based approach for method bundlingSybren de Kinderen, Henderik Alex Proper. 1469-1471 [doi]
- Product-based business processes interoperabilityMalik Khalfallah, Nicolas Figay, Mahmoud Barhamgi, Parisa Ghodous. 1472-1473 [doi]
- Evaluating a process for developing a capability maturity modelDiogo Proença, Ricardo Vieira, Gonçalo Antunes, Miguel Mira da Silva, José Luis Borbinha, Christoph Becker 0001, Hannes Kulovits. 1474-1475 [doi]
- LINK-GC: a preemptive approach for garbage collection in NAND flash storagesSanghyuk Jung, Yong Ho Song. 1478-1484 [doi]
- Virtualization for safety-critical, deeply-embedded devicesFelix Bruns, Dirk Kuschnerus, Attila Bilgic. 1485-1492 [doi]
- Energy-aware real-time task synchronization in multi-core embedded systemsLin-Fong Fan, Ting-Hao Tsai, Ya-Shu Chen, Shian-Shing Shyu. 1493-1498 [doi]
- Sensor streams middleware for easy configuration and processing in hybrid sensor networkPedro Furtado, José Cecílio. 1499-1504 [doi]
- Improving the performance of message parsers for embedded systemsJigar Solanki, Laurent Réveillère, Yérom-David Bromberg, Bertrand Le Gal, Tegawendé F. Bissyandé. 1505-1510 [doi]
- An instruction-level fine-grained recovery approach for soft errorsJianjun Xu, Qingping Tan, Lanfang Tan, Huiping Zhou. 1511-1516 [doi]
- Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessorsPengcheng Huang, Orlando Moreira, Kees Goossens, Anca Mariana Molnos. 1517-1524 [doi]
- nuKernel: MicroKernel for multi-core DSP SoCs with load sharing and priority interruptsChi-Sheng Shih, Hsin-Yu Lai. 1525-1532 [doi]
- An FPGA-based multi-core approach for pipelining computing stagesAli Azarian, João M. P. Cardoso, Stephan Werner, Jürgen Becker. 1533-1540 [doi]
- MLC-flash-friendly logging and recovery for databasesHua-Wei Fang, Mi-Yen Yeh, Tei-Wei Kuo. 1541-1546 [doi]
- A novel approach for interactive debugging of dynamic dataflow embedded applicationsKevin Pouget, Miguel Santana, Patricia López Cueva, Jean-François Méhaut. 1547-1549 [doi]
- Demand-based flash translation layer considering spatial localityYongmyoung Lee, Taedong Jung, Ilhoon Shin. 1550-1551 [doi]
- Kernel-level time composability for avionics applicationsAndrea Baldovin, Andrea Graziano, Enrico Mezzetti, Tullio Vardanega. 1552-1554 [doi]
- Communication support at the OS level to enhance design space exploration in multiprocessed embedded systemsAlexandra Aguiar, Sergio Johann Filho, Felipe G. Magalhaes, Fabiano Hessel. 1555-1556 [doi]
- Implementing Java-like languages in Xtext with XsemanticsLorenzo Bettini. 1559-1564 [doi]
- The ruby type checkerBrianna M. Ren, John Toman, T. Stephen Strickland, Jeffrey S. Foster. 1565-1572 [doi]
- Run-time checking of data- and protocol-oriented properties of Java programs: an industrial case studyStijn de Gouw, Frank S. de Boer, Einar Broch Johnsen, Peter Y. H. Wong. 1573-1578 [doi]
- Meso: an object-oriented programming language for building strongly-typed internet-based network applicationsStefan Hong, Yuh-Jzer Joung. 1579-1586 [doi]
- Concurrent typed intermediate languageL. Miguel Lourenço, João Costa Seco, Francisco Martins. 1587-1588 [doi]
- Integrating memory management with a file system on a non-volatile main memory systemShuichi Oikawa. 1589-1594 [doi]
- Analyzing resource interdependencies in multi-core architectures to improve scheduling decisionsAnselm Busse, Jan Hendrik Schönherr, Matthias Diener, Gero Mühl, Jan Richling. 1595-1602 [doi]
- Analysis of client/server interactions in a reservation-based systemLuca Abeni, Nicola Manica. 1603-1609 [doi]
- Design analysis for real-time video transcoding on cloud systemsSeungcheol Ko, SeongSoo Park, Hwansoo Han. 1610-1615 [doi]
- Onion and pizza: new disk partitioning schemes for virtualization systemsDongwoo Kang, Jongmoo Choi, Namsu Lee, Donghee Lee, Sewoog Kim, Sam H. Noh. 1616-1621 [doi]
- A dynamically reconfigurable operating system for manycore systemsChaeseok Im, Minkyu Jeong, Jaedon Lee, SeungWon Lee. 1622-1627 [doi]
- Measuring similarity of windows applications using static and dynamic birthmarksDong Jin Kim, Yongman Han, Seongje Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park, Lawrence Chung. 1628-1633 [doi]
- An efficient similarity comparison based on core API callsMinwoo Jang, Joongjin Kook, Samin Ryu, Kahyun Lee, Sung Shin, Ahreum Kim, Youngsu Park, Eig Hyun Cho. 1634-1638 [doi]
- Software plagiarism detection via the static API call frequency birthmarkDong-Kyu Chae, Sang-Wook Kim, Jiwoon Ha, Sang-Chul Lee, Gyun Woo. 1639-1643 [doi]
- Operating system reliability from the quality of experience viewpoint: an exploratory studyRivalino Matias Jr., Geycy Dyany Oliveira, Lucio Borges de Araujo. 1644-1649 [doi]
- Computation offloading for real-time systemsAnas Toma, Jian-Jia Chen. 1650-1651 [doi]
- A tour recommendation service for electric vehicles based on a hybrid orienteering modelJunghoon Lee, Sang-Wook Kim, Gyung-Leen Park. 1652-1654 [doi]
- Enhancing security enforcement on unmodified AndroidCheol Jeon, WooChur Kim, Bongjae Kim, Yookun Cho. 1655-1656 [doi]
- Protecting Android applications with steganography-based software watermarkingJoonhyouk Jang, Hyunho Ji, Jiman Hong, Jinman Jung, Dongkyun Kim, Soon Ki Jung. 1657-1658 [doi]
- New exception interfaces for Java-like languagesThiago B. L. Silva, Fernando Castor. 1661-1666 [doi]
- Formal semantics and expressiveness of a web service composition languageMarcelo Guerra Hahn, Regina Motz, Alberto Pardo, Martin A. Musicante. 1667-1673 [doi]
- Reliable scalable symbolic computation: the design of SymGridPar2Patrick Maier, Robert J. Stewart, Philip W. Trinder. 1674-1681 [doi]
- End-to-end latency computation in a multi-periodic designRémy Wyss, Frédéric Boniol, Claire Pagetti, Julien Forget. 1682-1687 [doi]
- @Java: annotations in freedomWalter Cazzola, Edoardo Vacchi. 1688-1693 [doi]
- Online identification of frequently executed acyclic paths by leveraging data stream algorithmsGaurav Kumar, Subhajit Roy. 1694-1695 [doi]
- A preliminary assessment of Haskell's software transactional memory constructsFernando Castor, Francisco Soares-Neto, André L. M. Santos. 1696-1697 [doi]
- LLLR parsingBostjan Slivnik. 1698-1699 [doi]
- Practical use of static composition of refactoring operationsJulien Cohen, Akram Ajouli. 1700-1705 [doi]
- Fine-grained annotations for pointcuts with a finer granularityWalter Cazzola, Edoardo Vacchi. 1706-1711 [doi]
- Exploiting points-to maps for de-/serialization code generationSelim Ciraci, Oreste Villa. 1712-1719 [doi]
- Smart cities software architectures: a surveyWelington M. da Silva, Alexandre Alvaro, Gustavo H. R. P. Tomas, Ricardo A. Afonso, Kelvin L. Dias, Vinicius Cardoso Garcia. 1722-1727 [doi]
- Derivation of domain-specific architectural knowledge views from governance and security compliance metadataHuy Tran, Ioanna Lytra, Uwe Zdun. 1728-1733 [doi]
- Modeling dynamic adaptations using augmented feature modelsJean-Baptiste Lézoray, Maria-Teresa Segarra, Jean-Marie Gilliot, Antoine Beugnard. 1734-1741 [doi]
- An infrastructure for the life cycle management of multi product linesGerald Holl, Christoph Elsner, Paul Grünbacher, Michael Vierhauser. 1742-1749 [doi]
- A generic framework for deriving architecture modeling methods for large-scale software-intensive systemsZhiqiang Fan, Tao Yue, Li Zhang. 1750-1757 [doi]
- The BRICS component model: a model-based development paradigm for complex robotics software systemsHerman Bruyninckx, Markus Klotzbücher, Nico Hochgeschwender, Gerhard K. Kraetzschmar, Luca Gherardi, Davide Brugali. 1758-1764 [doi]
- Applying software product line engineering in building web portals for supercomputing servicesPiyush Diwan, Patricia Carey, Eric Franz, Yixue Li, Thomas Bitterman, David E. Hudak, Rajiv Ramnath. 1765-1771 [doi]
- A model driven methodology for enabling autonomic reconfiguration of service oriented architectureEmna Mezghani, Riadh Ben Halima, Ismael Bouassida Rodriguez, Khalil Drira. 1772-1773 [doi]
- Exploiting visual appearance to cluster and detect rogue softwareChristian J. Dietrich, Christian Rossow, Norbert Pohlmann. 1776-1783 [doi]
- Lightweight energy consumption based intrusion detection system for wireless sensor networksMichael Riecker, Sebastian Biedermann, Matthias Hollick. 1784-1791 [doi]
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilitiesPierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna. 1792-1799 [doi]
- Secure roaming and infrastructure sharing for multi-operator WMNsAndre Egners, Ulrike Meyer. 1800-1807 [doi]
- Mobile-sandbox: having a deeper look into android applicationsMichael Spreitzenbarth, Felix C. Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann. 1808-1815 [doi]
- Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminalsRussell J. Jancewicz, Aggelos Kiayias, Laurent D. Michel, Alexander Russell, Alexander A. Shvartsman. 1816-1823 [doi]
- Verifying multicast-based security protocols using the inductive methodJean Everson Martina, Lawrence C. Paulson. 1824-1829 [doi]
- An empirical analysis of malicious internet banking software behaviorAndré Ricardo Abed Grégio, Dario Simões Fernandes Filho, Vitor Monte Afonso, Paulo Lício de Geus, Victor Furuse Martins, Mario Jino. 1830-1835 [doi]
- An updated threat model for security ceremoniesMarcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio. 1836-1843 [doi]
- Slicing droids: program slicing for smali codeJohannes Hoffmann, Martin Ussath, Thorsten Holz, Michael Spreitzenbarth. 1844-1851 [doi]
- Bring your own device, securelyAlessandro Armando, Gabriele Costa, Alessio Merlo. 1852-1858 [doi]
- Run-time control flow authentication: an assessment on contemporary x86 platformsErdem Aktas, Kanad Ghose. 1859-1866 [doi]
- Supporting visual security cues for WebView-based Android appsDongwan Shin, Huiping Yao, Une Rosi. 1867-1876 [doi]
- Performance analysis of a rule-based SOA component for real-time applicationsAlexander Cameron, Markus Stumptner, Nanda Nandagopal, Wolfgang Mayer, Todd Mansell. 1877-1884 [doi]
- On the reconfiguration of software connectorsNuno Oliveira, Luís Soares Barbosa. 1885-1892 [doi]
- Apprehensive QoS monitoring of Service choreographiesCesare Bartolini, Antonia Bertolino, Guglielmo De Angelis, Andrea Ciancone, Raffaela Mirandola. 1893-1899 [doi]
- An integrated framework for QoS-based adaptation and exception resolution in WS-BPEL scenariosMargaris Dionisis, Vassilakis Costas, Georgiadis Panagiotis. 1900-1906 [doi]
- Efficient data-intensive event-driven interaction in SOAQuirino Zagarese, Gerardo Canfora, Eugenio Zimeo, Iyad Alshabani, Laurent Pellegrino, Françoise Baude. 1907-1912 [doi]
- Disciplined structured communications with consistent runtime adaptationCinzia Di Giusto, Jorge A. Pérez. 1913-1918 [doi]
- A flexible approach for considering interdependent security objectives in service compositionFatih Karatas, Dogan Kesdogan. 1919-1926 [doi]
- Monitoring SOA-based applications with business provenanceSérgio Manuel Serra da Cruz, Raimundo Macário Costa, Laci Mary B. Manhães, Jorge Zavaleta. 1927-1932 [doi]
- User centric complex event processing based on service oriented architecturesFeng Gao, Sami Bhiri. 1933-1934 [doi]
- A conceptual framework for collective adaptive systemsAntonio Bucchiarone, Annapaola Marconi, Claudio Antares Mezzina, Marco Pistore. 1935-1936 [doi]
- Towards an approach for modeling and formalizing SOA design patterns with Event-BImen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira, Emna Mezghani. 1937-1938 [doi]
- Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systemsMarkus Jung, Jürgen Weidinger, Wolfgang Kastner, Alex Olivieri. 1939-1941 [doi]
- Credible recommendation exchange mechanism for P2P reputation systemsEleni Koutrouli, Aphrodite Tsalgatidou. 1943-1948 [doi]
- Composite trust-based public key management in mobile ad hoc networksJin-Hee Cho, Kevin S. Chan, Ing-Ray Chen. 1949-1956 [doi]
- Estimating domain-based user influence in social networksMario Cataldi, Nupur Mittal, Marie-Aude Aufaure. 1957-1962 [doi]
- A framework for evaluating trust of service providers in cloud marketplacesSheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser. 1963-1965 [doi]
- A framework for semantic annotation of digital evidenceBruno W. P. Hoelz, Célia Ghedini Ralha. 1966-1971 [doi]