Abstract is missing.
- Parameter estimation and simulation for one-choice Ratcliff diffusion modelAmiya Patanaik, Vitali Zagorodnov, C. K. Kwoh. 3-7 [doi]
- Improved heart rate detection using smart phoneArpan Pal, Aishwarya Visvanathan, Anirban Dutta Choudhury, Aniruddha Sinha. 8-13 [doi]
- Secure monitoring for dementia patientsUdaya Kiran Tupakula, Vijay Varadharajan. 14-19 [doi]
- Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitationS. Graziadio, Richard Davison, K. Shalabi, K. M. A. Sahota, Gary Ushaw, Graham Morgan, J. A. Eyre. 20-24 [doi]
- A model-based architecture for testing medical cyber-physical systemsLenardo C. Silva, Mirko Perkusich, Frederico M. Bublitz, Hyggo O. Almeida, Angelo Perkusich. 25-30 [doi]
- Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rateByung K. Jung, Sung Y. Shin, Wei Wang, Hyung Do Choi, Jeong K. Pack. 31-32 [doi]
- Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiologyHuan Chen 0002, Guo-Tan Liao, Yao-Chung Fan, Bo-Chao Cheng, Cheng-Min Chen, Ting-Chun Kuo. 33-35 [doi]
- A low cost digital operating roomA. Klinger, G. L. de Lima, Valter Roesler, G. Maron, G. Longoni, V. Goulart, F. S. dos Santos, M. D. Ferreira, M. B. Mariano. 36-37 [doi]
- Feature description based on center-symmetric local mapped patternsCarolina Toledo Ferraz, Osmando Pereira Jr., Adilson Gonzaga. 39-44 [doi]
- Faster seam carving with minimum energy windowsCésar L. Blum Silveira, Fabio de Oliveira Mierlo, Luiz Gonzaga Jr., Cristiano André da Costa, Kleinner Farias, Rodrigo Da Rosa Righi. 45-48 [doi]
- Representing local binary descriptors with BossaNova for visual recognitionCarlos Caetano, Sandra Eliza Fontes de Avila, Silvio Jamil Ferzoli Guimarães, Arnaldo de Albuquerque Araújo. 49-54 [doi]
- Face recognition based on global and local featuresCleber Zanchettin. 55-57 [doi]
- Two level reversible data hiding in 2D imagesN. Ramalingeswara Swamy, Saiful Islam, Phalguni Gupta. 58-59 [doi]
- Anthropometric and human gait identification using skeleton data from Kinect sensorVirginia Andersson, Rafael Dutra, Ricardo Matsumura de Araújo. 60-61 [doi]
- Online learning with mobile sensor data for user recognitionHai-Guang Li, Xindong Wu, Zhao Li. 64-70 [doi]
- Fast time series classification under lucky time warping distanceStephan Spiegel, Brijnesh Johannes Jain, Sahin Albayrak. 71-78 [doi]
- A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classificationRafael Geraldeli Rossi, Alneu A. Lopes, Solange O. Rezende. 79-84 [doi]
- Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticlesHao Huang, Shinjae Yoo, Konstantine Kaznatcheev, Kevin G. Yager, Fang Lu, Dantong Yu, Oleg Gang, Andrei Fluerasu, Hong Qin. 85-90 [doi]
- Comparing the staples in latent factor models for recommender systemsCheng Chen, Lan Zheng, Alex Thomo, Kui Wu, Venkatesh Srinivasan. 91-96 [doi]
- Single multiplicatively updated matrix factorization for co-clusteringZhao Li, Xindong Wu. 97-104 [doi]
- GEM: an elastic and translation-invariant similarity measure with automatic trend adjustmentChristian Hundt, Bertil Schmidt, Elmar Schömer, Herbert Göttler, Hoang-Vu Dang. 105-112 [doi]
- Fair pattern discoverySara Hajian, Anna Monreale, Dino Pedreschi, Josep Domingo-Ferrer, Fosca Giannotti. 113-120 [doi]
- Structural clustering of millions of molecular graphsMadeleine Seeland, Andreas Karwath, Stefan Kramer. 121-128 [doi]
- Extracting information from support vector machines for pattern-based classificationMadeleine Seeland, Andreas Maunz, Andreas Karwath, Stefan Kramer. 129-136 [doi]
- The discovery of user related rare sequential patterns of topics in the internet document streamZhongYi Hu, Hongan Wang, Jiaqi Zhu. 137-138 [doi]
- Investigation of hungarian mating schemes for genetic algorithmsChanju Jung, Yong-Hyuk Kim, Yourim Yoon, Byung Ro Moon. 140-147 [doi]
- A hybrid GA-ANN approach for autonomous robots topological navigationValéria de Carvalho Santos, Daniel Oliva Sales, Claudio Fabiano Motta Toledo, Fernando Santos Osório. 148-153 [doi]
- Mirrored orthogonal sampling with pairwise selection in evolution strategiesHao Wang, Michael Emmerich, Thomas Bäck. 154-156 [doi]
- Towards automated malware creation: code generation and code integrationAndrea Cani, Marco Gaudesi, Ernesto Sánchez, Giovanni Squillero, Alberto Paolo Tonda. 157-160 [doi]
- Automated versioning and temporal navigation for model sketches on large interactive displaysMarkus Kleffmann, Matthias Book, Erik Hebisch, Volker Gruhn. 161-168 [doi]
- Rapid development of first person serious games using the APEX platform: the asthma gameTiago Gomes, Tiago Abade, José Creissac Campos, Michael D. Harrison, José Luís Silva. 169-174 [doi]
- A detection of overlapping community in mobile social networkPaul Kim, Sangwook Kim. 175-179 [doi]
- QR-code based online robot augmented reality system for educationJung Pil Park, Min Woo Park, Soon Ki Jung. 180-185 [doi]
- A user study on tailoring GUIs for smartphonesDavid Alonso-Ríos, David Raneburger, Roman Popp, Hermann Kaindl, Jürgen Falb. 186-192 [doi]
- Method for visualizing undone operations based on changes on desktop screenArisa Sakamoto, Takuya Katayama, Tsutomu Terada, Masahiko Tsukamoto. 193-195 [doi]
- Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networksDavid Hundely A. 196-197 [doi]
- Intelligent event processing for emergency medical assistanceHolger Billhardt, Marin Lujak, Sascha Ossowski, Ralf Bruns, Jürgen Dunkel. 200-206 [doi]
- Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasksRodrigo Calvo, Janderson de Oliveira, Mauricio Figueiredo, Roseli Ap. Romero. 207-212 [doi]
- Smell classification using weakly responding dataSigeru Omatu, Mitsuaki Yano. 213-214 [doi]
- A systematic mapping on gamification applied to educationSimone de Sousa Borges, Vinicius H. S. Durelli, Helena Macedo Reis, Seiji Isotani. 216-222 [doi]
- Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environmentsAlexandre Martins dos Anjos, Romero Tori, Anderson Castro, Soares de Oliveira, Fátima L. S. Nunes. 223-228 [doi]
- Lessons learned from an online open course: a Brazilian case studyRanilson Oscar Araujo Paiva, Daniel Borges, Jário Santos, Ig Ibert Bittencourt, Alan Pedro da Silva. 229-234 [doi]
- A dynamic bayesian network for inference of learners' algebraic knowledgeHenrique M. Seffrin, Geiseane L. Rubi, Patrícia Augustin Jaques. 235-240 [doi]
- Towards a framework for relevant guidanceElaine H. T. Oliveira, Erika H. Nozawa, Rosa Maria Vicari. 241-242 [doi]
- WAVE: an architecture for predicting dropout in undergraduate courses using EDMLaci Mary Barbosa Manhães, Sérgio Manuel Serra da Cruz, Geraldo Zimbrão. 243-247 [doi]
- From ratings to trust: an empirical study of implicit trust in recommender systemsGuibing Guo, Jie Zhang, Daniel Thalmann, Anirban Basu, Neil Yorke-Smith. 248-253 [doi]
- Recommendation based on weighted social trusts and item relationshipsDi Wang, Jun Ma, Tao Lian, Lei Guo. 254-259 [doi]
- Instant expert hunting: building an answerer recommender system for a large scale Q&A websiteTianjian Chen, Jing Cai, Hao Wang, Yu Dong. 260-265 [doi]
- Beyond personalization and anonymity: towards a group-based recommender systemShang Shang, Yuk Hui, Pan Hui, Paul Cuff, Sanjeev R. Kulkarni. 266-273 [doi]
- Splitting approaches for context-aware recommendation: an empirical studyYong Zheng, Robin D. Burke, Bamshad Mobasher. 274-279 [doi]
- A unified approach to collaborative data visualizationAfshin Moin. 280-286 [doi]
- PrefRank: fair aggregation of subjective user preferencesAnirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, Yutaka Miyake. 287-288 [doi]
- A recommendation approach for digital TV systems based on multimodal featuresReudismam Rolim, Felipe Barbosa, Alexandre Costa, Giovanni Calheiros, Hyggo Oliveira de Almeida, Angelo Perkusich, Aldenor Falcao Martins. 289-291 [doi]
- Semi-supervised context-aware matrix factorization: using contexts in a way of "latent" factorsYong Zheng. 292-293 [doi]
- Is ontology alignment like analogy?: knowledge integration with LISAElie Raad, Joerg Evermann. 294-301 [doi]
- LEGi: context-aware lexicon consolidation by graph inspectionGiovanni Sá, Thiago Silveira, Rodrigo Chaves, Felipe Teixeira, Fernando Mourão, Leonardo C. da Rocha. 302-307 [doi]
- ICM-Wind: semantics-empowered fluid condition monitoring of wind turbinesMatthias Klusch, Ankush Meshram, Patrick Kapahnke, Andreas Schuetze. 308-315 [doi]
- A semi-automatic approach for generating customized R2RML mappingsVânia Maria Ponte Vidal, Marco A. Casanova, Luís Eufrasio T. Neto, José Maria Monteiro. 316-322 [doi]
- Towards an enterprise ontology pattern languageRicardo de Almeida Falbo, Fabiano Borges Ruy, Giancarlo Guizzardi, Monalessa Perini Barcellos, João Paulo Andrade Almeida. 323-330 [doi]
- Analyzing network privacy preserving methods: a perspective of social network characteristicsDuck-Ho Bae, Jong-Min Lee, Sang-Wook Kim, Youngjoon Won, Yongsu Park. 331-332 [doi]
- Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-caseMuntazir Mehdi, Aftab Iqbal, Ali Hasnain, Yasar Khan, Stefan Decker, Ratnesh Sahay. 333-335 [doi]
- A catalog of security requirements patterns for the domain of cloud computing systemsKristian Beckers, Isabelle Côté, Ludger Goeke. 337-342 [doi]
- Generic cloud platform multi-objective optimization leveraging models@run.timeDonia El Kateb, François Fouquet, Grégory Nain, Jorge Augusto Meira, Michel Ackerman, Yves Le Traon. 343-350 [doi]
- Collecting cloud provenance metadata with Matriohska: a case study with genomic workflowsSérgio Manuel Serra da Cruz, Laci Mary M. Barbosa, Jorge Zavaleta, Raimundo Macário Costa, Maria Luiza Machado Campos. 351-356 [doi]
- A green analysis of mobile cloud computing applicationsKelie Zhan, Chung-Horng Lung, Pradeep Srivastava. 357-362 [doi]
- Experimenting on virtual machines co-residency in the cloud: a comparative study of available test bedsAbdulaziz Alabdulhafez, Paul D. Ezhilchelvan. 363-365 [doi]
- Towards better manageability of database clusters on cloud computing platformsMiguel G. Xavier, Israel C. De Oliveira, Robson D. Dos Passos, César A. F. De Rose. 366-367 [doi]
- Autonomic configuration of HyperDex via analytical modellingNuno Lourenco Diegues, Muhammet Orazov, João Paiva, Luís Rodrigues, Paolo Romano. 370-375 [doi]
- Robustness evaluation of the rainbow framework for self-adaptationJavier Cámara, Rogério de Lemos, Nuno Laranjeiro, Rafael Ventura, Marco Vieira. 376-383 [doi]
- Improving adaptiveness of AUTOSAR embedded applicationsHélène Martorell, Jean-Charles Fabre, Matthieu Roy, Régis Valentin. 384-390 [doi]
- ACTRESS: domain-specific modeling of self-adaptive software architecturesFilip Krikava, Philippe Collet, Robert B. France. 391-398 [doi]
- Workload-aware table splitting for NoSQLFrancisco Cruz, Francisco Maia, Rui Oliveira, Ricardo Vilaça. 399-404 [doi]
- Hierarchical topology adaptation for distributed convergecast applicationsSandip Chakraborty, Suchetana Chakraborty, Sushanta Karmakar, Hridoy Sankar Dutta. 405-407 [doi]
- An energy-aware service composition framework for service-oriented wireless sensor networksTao Wang, Ke Zhang, Lianglun Cheng. 408-410 [doi]
- Kalimucho: middleware for mobile applicationsKeling Da, Marc Dalmau, Philippe Roose. 413-419 [doi]
- A model-based approach to test automation for context-aware mobile applicationsTobias Griebe, Volker Gruhn. 420-427 [doi]
- Location-aware information retrieval for identifying local and distant landmarkYoshihide Hosokawa, Yuichiro Nakazawa, Takanori Yamamoto. 428-435 [doi]
- Entity-adaptation: a programming model for development of context-aware applicationsSanjin Sehic, Stefan Nastic, Michael Vögler, Fei Li, Schahram Dustdar. 436-443 [doi]
- A personalized model for monitoring vital signs using camera of the smart phoneMohammad Adibuzzaman, Sheikh Iqbal Ahamed, Richard Love. 444-449 [doi]
- A model driven framework for modeling and composing service based Android applicationsChung Le. 450-457 [doi]
- Self-managing and self-organising mobile computing applications: a separation of concerns approachJose Luis Fernandez-Marquez, Giovanna Di Marzo Serugendo, Graeme Stevenson, Juan Ye, Simon Dobson, Franco Zambonelli. 458-465 [doi]
- Integrating IEEE 11073 and constrained application protocol for personal health devicesDanilo F. S. Santos, Frederico Bublitz, Hyggo O. Almeida, Angelo Perkusich. 466-467 [doi]
- Smartphone based multimodal activity detection system using plantar pressure sensorsFerdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love. 468-469 [doi]
- A real-time smartphone- and smartshoe-based fall prevention systemA. K. M. Jahangir Alam Majumder. 470-471 [doi]
- Visual comparison of network anomaly detectors with chord diagramsJohan Mazel, Romain Fontugne, Kensuke Fukuda. 473-480 [doi]
- Large-scale message synchronization in challenged networksNiels Zeilemaker, Boudewijn Schoon, Johan A. Pouwelse. 481-488 [doi]
- A similarity model for virtual networks negotiationRafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira. 489-494 [doi]
- Wavelength resources based lightpath-level active rerouting in all-optical WDM networksSheng-Wei Wang, Chin-Yen Wen. 495-500 [doi]
- Hiding user content interest while preserving P2P performanceRiccardo Petrocco, Mihai Capota, Johan A. Pouwelse, Dick H. J. Epema. 501-508 [doi]
- A low-latency service composition approach in mobile ad hoc networksChenyang Liu, Jian Cao, Frédéric Le Mouël. 509-511 [doi]
- 3D cloud detection and tracking for solar forecast using multiple sky imagersZhenzhou Peng, Shinjae Yoo, Dantong Yu, Dong Huang, Paul Kalb, John Heiser. 512-517 [doi]
- Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithmGiorgos Georgiadis, Marina Papatriantafilou. 518-524 [doi]
- Design of an automatic demand-side management system based on evolutionary algorithmsEdgar Galván López, Adam Taylor, Siobhán Clarke, Vinny Cahill. 525-530 [doi]
- Lightweight privacy for smart metering data by adding noisePedro Barbosa, Andrey Brito, Hyggo Almeida, Sebastian Clauß. 531-538 [doi]
- SEDE: state estimation-based dynamic encryption scheme for smart grid communicationTing Liu, Yuhong Gui, Yanan Sun, Yang Liu, Yao Sun, Feng Xiao. 539-544 [doi]
- Cyber-secure communication architecture for active power distribution networksTeklemariam Tsegay Tesfay, Jean-Pierre Hubaux, Jean-Yves Le Boudec, Philippe Oechslin. 545-552 [doi]
- Energy disaggregation meets heating controlStephan Spiegel, Sahin Albayrak. 559-566 [doi]
- Monitoring water scarcity risk in AfricaKala Fleming, Komminist Weldemariam, Haggai Wangusi, Osamuyimen Stewart. 567-568 [doi]
- Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart buildingSiyun Chen. 569-570 [doi]
- Multi-agent simulation of perception of safety from crimeJ. Octavio Gutiérrez-Garcia, Andrés Gómez de Silva Garza. 573-578 [doi]
- Rocovo: robust communal publication schemeThomas Largillier, Guillaume Peyronnet, Sylvain Peyronnet. 579-586 [doi]
- "Sorry, I was hacked": a classification of compromised twitter accountsEva Zangerle, Günther Specht. 587-593 [doi]
- Reachability vectors: features for link-based similarity measuresSeok-Ho Yoon, Ji Soo Kim, Jiwoon Ha, Sang-Wook Kim, Minsoo Ryu, Ho-Jin Choi. 594-597 [doi]
- What makes your opinion popular?: predicting the popularity of micro-reviews in foursquareMarisa A. Vasconcelos, Jussara M. Almeida, Marcos André Gonçalves. 598-603 [doi]
- Exploring the significance of human mobility patterns in social link predictionBasma Alharbi, Xiangliang Zhang. 604-609 [doi]
- An approximate framework for scaling social influence computation in large networksYao-Chung Fan, Huan Chen. 610-615 [doi]
- Information diffusion in OSNs: the impact of nodes' socialityValerio Arnaboldi, Marco Conti, Massimiliano La Gala, Andrea Passarella, Fabio Pezzoni. 616-621 [doi]
- The importance of geographic locality for online information diffusionRodrigo Marotti Togneri, Bruno Tadeu Caetano, Carlos Alberto Kamienski. 622-627 [doi]
- Pathways for irony detection in tweetsLarissa A. de Freitas, Aline A. Vanin, Denise N. Hogetop, Marco N. Bochernitsan, Renata Vieira. 628-633 [doi]
- A structural analysis of literary fictions with social network frameworkJongkyu Seo, Sung-Hwan Kim, Haesung Tak, Hwan-Gue Cho. 634-640 [doi]
- Automatic categorization of questions from Q&A sitesEduardo Cunha Campos, Marcelo de Almeida Maia. 641-643 [doi]
- A hybrid algorithm for recommendation twitter peersJames N. K. Liu, Zongnong Meng, Yan-Xing Hu, Yu-Lin He, Simon C. K. Shiu, Vincent W. S. Cho. 644-649 [doi]
- Preventing the diffusion of negative information based on local influence treeYang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu. 650-652 [doi]
- Spectral analysis and text processing over the computer science literature: patterns and discoveriesRosa V. E. Quille, Caetano Traina Jr., Jose F. Rodrigues Jr.. 653-657 [doi]
- The strength of social strength: an evaluation study of algorithmic versus user-defined rankingJuwel Rana, Johan Kristiansson, Kåre Synnes. 658-659 [doi]
- Self-localisation in indoor environments combining learning and evolution with wireless networksGustavo Pessin, Fernando Santos Osório, Jó Ueyama, Denis F. Wolf, Renan C. Moioli, Patrícia A. Vargas. 661-666 [doi]
- Modeling and analysis on network performance for cloud service delivery with multiple pathsJun Huang, Juan Lv, Qiang Duan. 667-673 [doi]
- Effective tumor feature extraction for smart phone based microwave tomography breast cancer screeningSamaneh Aminikhanghahi, Wei Wang, Sung Y. Shin, Seong H. Son, Soon-Ik Jeon. 674-679 [doi]
- WSN-based flutter control application for aircraft wings structural health monitoringDhouha Krichen, Walid Abdallah, Noureddine Boudriga. 680-685 [doi]
- A dynamic frame slotted ALOHA anti-collision algorithm for the internet of thingsRafael Perazzo Barbosa Mota, Daniel M. Batista. 686-691 [doi]
- GB-MAC: a backbone based low latency protocol for WSNsTales Heimfarth, João Carlos Giacomin, Alexandre Victor Fassio, João Paulo de Araujo. 692-698 [doi]
- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networksEun-Jun Yoon, Kee-Young Yoo. 699-705 [doi]
- EENC - energy efficient nested clustering in UASNSyed Hassan Ahmed, Abdul Wahid, Dongkyun Kim. 706-710 [doi]
- DDoS attack detection by using packet sampling and flow featuresJae-Hyun Jun, Cheol-Woong Ahn, Sung-Ho Kim. 711-712 [doi]
- Student research abstract: mechanisms to ensure quality of service for the internet of thingsRafael Perazzo Barbosa Mota. 713-714 [doi]
- Vehicle to vehicle communication using Zigbee protocolAlfred Daniel. 715-716 [doi]
- Student research abstract: an optimized handover scheme based on media independent handover standard IEEE 802.21Murad Khan. 717-718 [doi]
- Keyboard navigation mechanisms in tab widgets: an investigation on ARIA's conformanceWillian Massami Watanabe, Rafael José Geraldo, Renata Pontin de Mattos Fortes. 721-726 [doi]
- WikiNEXT: a wiki for exploiting the web of dataPavel Arapov, Michel Buffa, Amel Ben Othmane. 727-734 [doi]
- Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documentsPatrick Gaubatz, Waldemar Hummer, Uwe Zdun, Mark Strembeck. 735-742 [doi]
- Generalizing the "like" button: empowering websites with monitoring capabilitiesJon Iturrioz, Iker Azpeitia, Oscar Díaz. 743-750 [doi]
- A nonintrusive approach for implementing single database, multitenant services from web applicationsAlexandre Michetti Manduca, Ethan V. Munson, Renata P. M. Fortes, Maria da Graça Campos Pimentel. 751-756 [doi]
- Cross-platform mobile development: a study on apps with animationsMatteo Ciman, Ombretta Gaggi, Nicola Gonzo. 757-759 [doi]
- OSBS: online storm-water billing systemWook-Sung Yoo. 760-761 [doi]
- Impact analysis for event-based systems using change patternsSimon Tragatschnig, Huy Tran, Uwe Zdun. 763-768 [doi]
- Secure positioning in a UAV swarm using on-board stereo camerasRoberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Edson dos Santos Moreira. 769-774 [doi]
- Redesigning transaction load balancing on electronic funds transfer scenariosRodrigo Da Rosa Righi, Cristiano André da Costa, Luiz Gonzaga Jr., Kleinner Farias, Alexandre Luis Andrade, Lucas Graebin. 775-777 [doi]
- Towards a learning design authoring tool that generates personalized units of learning for CSCLGeiser Chalco Challco, Seiji Isotani. 778-780 [doi]
- Choosing my partners based on how they will evaluate my behaviorElane Cristina da Rocha Cardoso Saraiva, Viviane Torres da Silva. 781-783 [doi]
- SFNClassifier: a scale-free social network method to handle concept driftJean Paul Barddal, Heitor Murilo Gomes, Fabrício Enembreck. 786-791 [doi]
- Change detection in categorical evolving data streamsDino Ienco, Albert Bifet, Bernhard Pfahringer, Pascal Poncelet. 792-797 [doi]
- SAE2: advances on the social adaptive ensemble classifier for data streamsHeitor Murilo Gomes, Fabrício Enembreck. 798-804 [doi]
- Adaptive semi supervised opinion classifier with forgetting mechanismMax Zimmermann, Eirini Ntoutsi, Myra Spiliopoulou. 805-812 [doi]
- Information leakage analysis of database query languagesRaju Halder, Matteo Zanioli, Agostino Cortesi. 813-820 [doi]
- Finding targets with the nearest favor neighbor and farthest disfavor neighbor by a skyline queryYi-Wen Lin, En Tzu Wang, Chieh-Feng Chiang, Arbee L. P. Chen. 821-826 [doi]
- LittleD: a SQL database for sensor nodes and embedded applicationsGraeme Douglas, Ramon Lawrence. 827-832 [doi]
- Towards semantic diff of XML documentsAlessandreia Oliveira, Leonardo Murta, Vanessa Braganholo. 833-838 [doi]
- Temporal join processing with hilbert curve space mappingJaime Raigoza, Junping Sun. 839-844 [doi]
- Sampling in online social networksSang-Wook Kim, Ki Nam Kim, Seok-Ho Yoon, Sunju Park. 845-849 [doi]
- Mining key and referential constraints enforcement patternsKaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang. 850-854 [doi]
- Speaking in tongues: SQL access to NoSQL systemsJulian Rith, Philipp S. Lehmayr, Klaus Meyer-Wegener. 855-857 [doi]
- A test framework for large scale declarative queries: preliminary resultsAmin Mesmoudi, Mohand-Said Hacid. 858-859 [doi]
- GPU-aware distributed quantum simulationAnderson Avila, Adriano Maron, Renata Reiser, Maurício L. Pilla, Adenauer C. Yamin. 860-865 [doi]
- Efficient dynamic scheduling of heterogeneous applications in hybrid architecturesGuilherme Andrade, Gabriel Spada Ramos, Daniel Madeira, Rafael Sachetto Oliveira, Esteban Clua, Renato Ferreira, Leonardo C. da Rocha. 866-871 [doi]
- Creating heterogeneity at run time by dynamic cache and bandwidth partitioning schemesAryabartta Sahu, Saparapu Ramakrishna. 872-879 [doi]
- On the support of task-parallel algorithmic skeletons for multi-GPU computingFernando Alexandre, Ricardo Marqués, Hervé Paulino. 880-885 [doi]
- The future of accelerator programming: abstraction, performance or can we have both?Kamil Rocki, Martin Burtscher, Reiji Suda. 886-895 [doi]
- GeoTime-based tag ranking model for automatic image annotationMadalina Mitran, Guillaume Cabanac, Mohand Boughanem. 896-901 [doi]
- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptorLeila C. C. Bergamasco, Fátima L. S. Nunes. 902-907 [doi]
- C-Rank: a contribution-based web page ranking approachDong Jin Kim, Sang-Chul Lee, Ho-Yong Son, Sang-Wook Kim, Jae Bum Lee. 908-912 [doi]
- Recommend-Me: recommending query regions for image searchThanh Duc Ngo, Sang Phan, Duy-Dinh Le, Shin'ichi Satoh. 913-918 [doi]
- Personalized collaborative filtering: a neighborhood model based on contextual constraintsEdson B. Santos Junior, Rudinei Goularte, Marcelo G. Manzato. 919-924 [doi]
- Probabilistic opinion models based on subjective sourcesFaiza Belbachir, Mohand Boughanem, Malik Muhammad Saad Missen. 925-926 [doi]
- Improved named entity recognition: patterns in columns model (PCM)Chun Yong Moon, Manjula Pilaka, Hye-Young Paik, John Shepherd. 927-928 [doi]
- Exploring query reformulation for named entity expansion in information retrievalBissan Audeh, Philippe Beaune, Michel Beigbeder. 929-930 [doi]
- Visualization of oceanographic applications using a common data modelJie Li, Zhao-Peng Meng, Kang Zhang. 933-938 [doi]
- MALL: a life log based music recommendation system and portable music playerAi Uno, Takayuki Itoh. 939-944 [doi]
- MFS-Map: efficient context and content combination to annotate imagesAlceu Ferraz Costa, Agma Juci Machado Traina, Caetano Traina Jr.. 945-950 [doi]
- Visualizing large hierarchies with drawer treesYalong Yang, Ning Dou, Shuai Zhao, Zhichao Yang, Kang Zhang, Quang Vinh Nguyen. 951-956 [doi]
- Text entry using a foot for severely motor-impaired individualsDiogo de Carvalho Pedrosa, Maria da Graça Campos Pimentel. 957-963 [doi]
- Content-based image retrieval towards the automatic characterization of soybean seed vigorMarcus G. F. Santanna, Priscila T. M. Saito, Pedro Henrique Bugatti. 964-969 [doi]
- Motivating people to perform better in exergames: competition in virtual environmentsMateus Bisotto Nunes, Luciana Porcher Nedel, Valter Roesler. 970-975 [doi]
- Aero-screen: blimp-based ubiquitous screen for novel digital signage and information visualizationHiroaki Tobita. 976-980 [doi]
- An approach to support stereoscopic 3D webQinshui Chen, Wenmin Wang, Ronggang Wang, Jianlong Zhang, Zhongxin Liu. 981-984 [doi]
- Introduction of a multi-layer predictive search strategy for scalable video codingRonaldo Husemann, Valter Roesler. 985-986 [doi]
- Are smartphones better than CRC cards?Rainer Lutz, Sascha Schäfer 0001, Stephan Diehl. 987-994 [doi]
- From requirements to statecharts via design refinementJoão Pimentel, Jaelson Castro, John Mylopoulos, Konstantinos Angelopoulos, Vítor E. Silva Souza. 995-1000 [doi]
- Eliciting concepts from the Brazilian access law using a combined approachPriscila Engiel, Claudia Cappelli, Julio Cesar Sampaio do Prado Leite. 1001-1006 [doi]
- Towards software modularization from requirementsEduardo Almentero, Julio Cesar Sampaio do Prado Leite, Carlos José Pereira de Lucena. 1007-1012 [doi]
- Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHPShehnila Zardari, Rami Bahsoon, Aniko Ekárt. 1013-1020 [doi]
- Quality of requirements specifications: a preliminary overview of an automatic validation approachAlberto Rodrigues da Silva. 1021-1022 [doi]
- Transformation approach from KAOS goal models to BPMN models using refinement patternsHiroki Horita, Kozo Honda, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga. 1023-1024 [doi]
- Generative adaptation of model transformation assets: experiences, lessons and drawbacksFabio Paulo Basso, Raquel Mainardi Pillat, Toacy Cavalcante de Oliveira, Marcos Didonet Del Fabro. 1027-1034 [doi]
- A hierarchical model for traceability between requirements and architectureJeho Oh, Sungwon Kang. 1035-1042 [doi]
- On the impact of obliviousness and quantification on model composition effortEverton Guimãraes, Alessandro Garcia, Kleinner Farias. 1043-1048 [doi]
- Research challenges in business process adaptabilityRiccardo Cognini, Flavio Corradini, Stefania Gnesi, Andrea Polini, Barbara Re. 1049-1054 [doi]
- Ontology driven builder pattern: a plug and play componentAmrita Chaturvedi, T. V. Prabhakar. 1055-1057 [doi]
- Adaptive random prioritization for interaction test suitesRubing Huang, Jinfu Chen, Zhicheng Li, Rongcun Wang, Yansheng Lu. 1058-1063 [doi]
- Towards a language-independent approach for reverse-engineering of software product linesTewfik Ziadi, Christopher Henard, Mike Papadakis, Mikal Ziane, Yves Le Traon. 1064-1071 [doi]
- Success factors in mobile social networking application development: case study of instagramRong Peng, Dong Sun, Wei-Tek Tsai. 1072-1079 [doi]
- Schedulability analysis support for automotive systems: from requirement to implementationEun-Young Kang, Pierre-Yves Schobbens. 1080-1085 [doi]
- Project centralization based on graph coloringLei Ma, Cyrille Artho, Hiroyuki Sato. 1086-1093 [doi]
- An empirical study of requirements-based test generation on an automobile control systemRuizhi Gao, Jeong Soo Eo, W. Eric Wong, Xinwei Gao, Shou-Yu Lee. 1094-1099 [doi]
- Locating fault-inducing patterns from structural inputsHai-Feng Guo, Zongyan Qiu, Harvey P. Siy. 1100-1107 [doi]
- Using models to dynamically refactor runtime codeMohammed Al-Refai, Walter Cazzola, Robert B. France. 1108-1113 [doi]
- A fault deployment and activation approach for testing self-recovery mechanismsKiev Gama, Didier Donsez. 1114-1119 [doi]
- Computing contextual metric thresholdsMatthieu Foucault, Marc Palyart, Jean-Rémy Falleri, Xavier Blanc. 1120-1125 [doi]
- Planning for declarative processesYoann Laurent, Reda Bendraou, Souheib Baarir, Marie-Pierre Gervais. 1126-1133 [doi]
- Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectivelyGeunseok Yang, Tao Zhang, Byungjeong Lee. 1134-1139 [doi]
- Automatic construction of timing diagrams from UML/MARTE models for real-time embedded softwareMinh Chau Nguyen, Eunkyoung Jee, Jinho Choi 0002, Doo-Hwan Bae. 1140-1145 [doi]
- Activities performed by programmers while using framework examples as a guideReihane Boghrati, Abbas Heydarnoori, Majeed Kazemitabaar. 1146-1151 [doi]
- Unveiling developers contributions behind code commits: an exploratory studyDaniel Alencar da Costa, Uirá Kulesza, Eduardo Aranha, Roberta Coelho. 1152-1157 [doi]
- Detecting architecturally-relevant code anomalies: a case study of effectiveness and effortManuele Ferreira, Eiji Adachi Barbosa, Isela Macia Bertran, Roberta Arcoverde, Alessandro Garcia. 1158-1163 [doi]
- Risk assessment of code injection vulnerabilities using fuzzy logic-based systemHossain Shahriar, Hisham Haddad. 1164-1170 [doi]
- Dynamics of open-source software developer's commit behavior: an empirical investigation of subversionYutao Ma, Yang Wu, Youwei Xu. 1171-1173 [doi]
- Rethinking agribusiness models in AfricaCharity Wayua, Komminist Weldemariam, Osamuyimen Stewart. 1174-1175 [doi]
- A dynamic analysis technique to extract symptoms that suggest side effects in framework applicationsIzuru Kume, Naoya Nitta, Masahide Nakamura, Etsuya Shibayama. 1176-1178 [doi]
- Combining research and education of software testing: a preliminary studyZhenyu Chen, Atif Memon, Bin Luo. 1179-1180 [doi]
- Towards a quality model for model composition effortKleinner Farias, Alessandro Garcia, Carlos José Pereira de Lucena, Luiz Gonzaga Jr., Cristiano André da Costa, Rodrigo Da Rosa Righi, Fabio Paulo Basso, Toacy Cavalcante de Oliveira. 1181-1183 [doi]
- Build system analysis with link predictionXin Xia, David Lo, Xinyu Wang, Bo Zhou. 1184-1186 [doi]
- An empirical study of bugs in build processXiaoqiong Zhao, Xin Xia, Pavneet Singh Kochhar, David Lo, Shanping Li. 1187-1189 [doi]
- A survey on research in software reliability engineering in the last decadeJoicymara Xavier, Autran Macedo, Rivalino Matias, Lucio Borges de Araujo. 1190-1191 [doi]
- EACOF: a framework for providing energy transparency to enable energy-aware software developmentHayden Field, Glen Anderson, Kerstin Eder. 1194-1199 [doi]
- Unit testing of energy consumption of software librariesAdel Noureddine, Romain Rouvoy, Lionel Seinturier. 1200-1205 [doi]
- A tool-supported approach for modular design of energy-aware softwareSteven te Brinke, Somayeh Malakuti, Christoph Bockisch, Lodewijk Bergmans, Mehmet Aksit, Shmuel Katz. 1206-1212 [doi]
- Method reallocation to reduce energy consumption: an implementation in Android OSLuis Corral, Anton B. Georgiev, Alberto Sillitti, Giancarlo Succi. 1213-1218 [doi]
- Green-as-a-service (GaaS) for cloud service provision operationMahamat Issa Hassan, Rami Bahsoon. 1219-1220 [doi]
- Interpreting energy profiles with CEGARSteven te Brinke. 1221-1222 [doi]
- A method to identify services using master data and artifact-centric modeling approachRosane S. Huergo, Paulo F. Pires, Flávia Coimbra Delicato. 1225-1230 [doi]
- An SOA approach for automating software product line adoptionCarlos Parra, Diego Joya, Leonardo Giral, Alvaro Infante. 1231-1238 [doi]
- In the wild: a large scale study of web services vulnerabilitiesSushama Karumanchi, Anna Cinzia Squicciarini. 1239-1246 [doi]
- Quantitative analysis of Reo-based service coordinationNuno Oliveira, Alexandra Silva 0001, Luís Soares Barbosa. 1247-1254 [doi]
- A fault-tolerant architecture for decentralized compositions of services in the wildFelipe Pontes Guimaraes. 1255-1256 [doi]
- Crashmaker: an improved binary concolic testing tool for vulnerability detectionBing Chen, Qingkai Zeng, Weiguang Wang. 1257-1263 [doi]
- Translating event-B to JML-specified Java programsVíctor Rivera, Néstor Cataño. 1264-1271 [doi]
- Input-output conformance testing based on featured transition systemsHarsh Beohar, Mohammad Reza Mousavi. 1272-1278 [doi]
- Runtime enforcement of regular timed propertiesSrinivas Pinisetty, Yliès Falcone, Thierry Jéron, Hervé Marchand. 1279-1286 [doi]
- On the completeness of test suitesAdilson Luiz Bonifácio, Arnaldo Vieira Moura. 1287-1292 [doi]
- Effective fault localization via mutation analysis: a selective mutation approachMike Papadakis, Yves Le Traon. 1293-1300 [doi]
- A systematic literature review on modified condition and decision coverageTanay Kanti Paul, Man Fai Lau. 1301-1308 [doi]
- Complexity checking of ARM programs, by deductionMário Pereira, Simão Melo de Sousa. 1309-1314 [doi]
- XIS-mobile: a DSL for mobile applicationsAndré Ribeiro, Alberto Rodrigues da Silva. 1316-1323 [doi]
- A process for facilitating interaction design through automated GUI generationDavid Raneburger, Hermann Kaindl, Roman Popp, Vedran Sajatovic, Alexander Armbruster. 1324-1330 [doi]
- Reliable self-deployment of cloud applicationsXavier Etchevers, Gwen Salaün, Fabienne Boyer, Thierry Coupaye, Noël De Palma. 1331-1338 [doi]
- Declarative scheduling for active objectsLudovic Henrio, Justine Rochas. 1339-1344 [doi]
- Practical implementation techniques of ambient calculus in conventional dynamic languagesSeiji Umatani. 1345-1351 [doi]
- Flexible modeling of policy-driven upstream notification strategieseva Kühn, Stefan Craß, Gerson Joskowicz, Martin Novak. 1352-1354 [doi]
- Self-composition of services with chemical reactionsFrancesco De Angelis, Jose Luis Fernandez-Marquez, Giovanna Di Marzo Serugendo. 1355-1356 [doi]
- An enhanced features extractor for a portfolio of constraint solversRoberto Amadini, Maurizio Gabbrielli, Jacopo Mauro. 1357-1359 [doi]
- Flexible cooperation in parallel local searchDanny Munera, Daniel Diaz, Salvador Abreu, Philippe Codognet. 1360-1361 [doi]
- How social distance of process designers affects the process of process modeling: insights from a controlled experimentJens Kolb, Michael Zimoch, Barbara Weber, Manfred Reichert. 1364-1370 [doi]
- Execution support for agenda-driven case managementMarian Benner-Wickner, Matthias Book, Tobias Brückmann, Volker Gruhn. 1371-1377 [doi]
- Predicting change propagation impacts in collaborative business processesWalid Fdhila, Stefanie Rinderle-Ma. 1378-1385 [doi]
- Towards an assessment model for balancing process model production and useToomas Saarsen, Marlon Dumas. 1386-1392 [doi]
- A collaborative processes synchronization method with regards to system crashes and network failuresLei Wang, Andreas Wombacher, Luís Ferreira Pires, Marten van Sinderen, Chihung Chi. 1393-1398 [doi]
- Modeling of privacy-aware business processes in BPMN to protect personal dataWadha Labda, Nikolay Mehandjiev, Pedro Sampaio. 1399-1405 [doi]
- Conformance checking for BPMN-based process modelsThomas Molka, David Redlich, Marc Drobek, Artur Caetano, Xiao-Jun Zeng, Wasif Gilani. 1406-1413 [doi]
- Big data meets process mining: implementing the alpha algorithm with map-reduceJoerg Evermann, Ghazal Assadipour. 1414-1416 [doi]
- eXtreme enterprise architecture planningHugo Ramos, André Vasconcelos. 1417-1419 [doi]
- Ontology-based enterprise architecture model analysisGonçalo Antunes, Marzieh Bakhshandeh, Rudolf Mayer, José Luis Borbinha, Artur Caetano. 1420-1422 [doi]
- A thermal-throttling server in 3D multicore chipsTing-Hao Tsai, Ya-Shu Chen. 1425-1430 [doi]
- A heuristic to minimize the cardinality of a real-time task set by automated task clusteringAntoine Bertout, Julien Forget, Richard Olejnik. 1431-1436 [doi]
- A traffic-balanced routing scheme for heat balance in 3D networks-on-chipWan-Chi Chang, Hsueh-Wen Tseng, Chin-Fu Kuo. 1437-1442 [doi]
- Building a WSN infrastructure with COTS components for the thermal monitoring of datacentersGustavo Zanatta, Giulio Dariano Bottari, Raphael Guerra, Julius C. B. Leite. 1443-1448 [doi]
- The least-dirty-first cache replacement policy for phase-change memorySeunghoon Yoo, Eunji Lee, Hyokyung Bahn. 1449-1454 [doi]
- A copula-based risk evaluation method (C-REM) in a corporate mobile banking contextAbdullah A. I. Alnajem, Ning Zhang. 1455-1462 [doi]
- Context-aware music recommendation in mobile smart devicesJiwon Hong, Won-Seok Hwang, Jin Hyung Kim, Sang-Wook Kim. 1463-1468 [doi]
- Application behavior analysis in resource consumption for mobile devicesSu-Wei Chang, Sheng-Wei Cheng, Pi-Cheng Hsiu, Tei-Wei Kuo, Ching-Wen Lin. 1469-1474 [doi]
- Traffic 411: a traffic congestion routing and awareness platform for NairobiAndrew Kinai, Reginald E. Bryant, Aisha Walcott-Bryant, Eric Mibuari, Komminist Weldemariam, Osamuyimen Stewart. 1475-1476 [doi]
- ICAP, a new flash wear-leveling algorithm inspired by localityShi-Wu Lo, Bo-Hong Chen, Yu-Wei Chen, Tzu-Chieh Shen, You-Ching Lin. 1478-1483 [doi]
- Rollback mechanism of nested virtual machines for protocol fuzz testingKuniyasu Suzaki, Toshiki Yagi, Akira Tanaka, Yutaka Oiwa, Etsuya Shibayama. 1484-1491 [doi]
- An effective data clustering method based on expected update time in flash memory environmentDuck-Ho Bae, Ji-Woong Chang, Se-Mi Park, Byeong-Soo Jeong, Sang-Wook Kim, Seong Je Cho. 1492-1497 [doi]
- Delay-based incrementally mapping of virtual machines in cloud computing systemsChin-Fu Kuo, Hsueh-Wen Tseng. 1498-1503 [doi]
- Optimizing FTL mapping cache for random-write workloads using adaptive block partitioningLi-Pin Chang, Sheng-Min Huang, Wen-Ping Li. 1504-1510 [doi]
- An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespanMingyang Wang, Yiming Hu. 1511-1516 [doi]
- Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolationHeekwon Park, Dongwoo Kang, Jongmoo Choi. 1517-1522 [doi]
- An empirical exploratory study on operating system reliabilityRivalino Matias, Marcela Prince, Lucio Borges de Araujo, Claudio Sousa, Luan Henrique. 1523-1528 [doi]
- An experimental study on execution time variation in computer experimentsPaulo Eduardo Nogueira, Rivalino Matias Jr., Elder Vicente. 1529-1534 [doi]
- DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memoryEunji Lee, Jee-Eun Jang, Hyokyung Bahn. 1535-1540 [doi]
- Per-cluster allocation of relocation staff on electric vehicle sharing systemsJunghoon Lee, Gyung-Leen Park, Jihyun Kang, Naram Ham. 1541-1542 [doi]
- Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis modelDaniel Bristot de Oliveira, Rômulo Silva de Oliveira. 1543-1544 [doi]
- Experimental and theoretical analyses of memory allocation algorithmsDiego Elias, Rivalino Matias, Marcia Fernandes, Lucio Borges de Araujo. 1545-1546 [doi]
- Large scale processing of landsat data on various software platformsGeorge Hamer, Jason Werpy. 1547-1549 [doi]
- A domain specific language for process schedulingDaniel Röhrig. 1550-1551 [doi]
- A platform independent scheduler frameworkChristian René Sechting. 1552-1553 [doi]
- Locking fastManuel Serrano, Johan Grande. 1556-1561 [doi]
- Fully abstract trace semantics for low-level isolation mechanismsMarco Patrignani, Dave Clarke. 1562-1569 [doi]
- Defining the syntax of extensible languagesLeonardo Vieira dos Santos Reis, Vladimir Oliveira Di Iorio, Roberto da Silva Bigonha. 1570-1576 [doi]
- Formal derivation and extraction of a parallel program for the all nearest smaller values problemFrédéric Loulergue, Simon Robillard, Julien Tesson, Joeffrey Legaux, Zhenjiang Hu. 1577-1584 [doi]
- Nested atomic sections with thread escape: a formal definitionFrédéric Dabrowski, Frédéric Loulergue, Thomas Pinsard. 1585-1592 [doi]
- Arithmetic algorithms for hereditarily binary natural numbersPaul Tarau, Bill P. Buckles. 1593-1600 [doi]
- Extending JUnit 4 with Java annotations and reflection to test variant model transformation assetsFabio Paulo Basso, Toacy Cavalcante de Oliveira, Kleinner Farias. 1601-1608 [doi]
- Global value numbering for redundancy detection: a simple and efficient algorithmSaleena Nabeezath, Vineeth Paleri. 1609-1611 [doi]
- Manipulating models using internal domain-specific languagesFilip Krikava, Philippe Collet, Robert B. France. 1612-1614 [doi]
- Linter: a tool for finding bugs and potential problems in scala codeMatic Potocnik, Uros Cibej, Bostjan Slivnik. 1615-1616 [doi]
- An aspect pointcut for parallelizable loopsJohn S. Dean, Frank J. Mitropoulos. 1619-1624 [doi]
- Declarative design pattern-based development using aspect oriented programmingMario Luca Bernardi, Marta Cimitile, Giuseppe A. Di Lucca. 1625-1630 [doi]
- X-pire 2.0: a user-controlled expiration date and copy protection mechanismMichael Backes, Sebastian Gerling, Stefan Lorenz, Stephan Lukas. 1633-1640 [doi]
- Building secure and anonymous communication channel: formal model and its prototype implementationKeita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi. 1641-1648 [doi]
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber securityYan Shoshitaishvili, Luca Invernizzi, Adam Doupé, Giovanni Vigna. 1649-1656 [doi]
- Extracting probable command and control signatures for detecting botnetsAli Zand, Giovanni Vigna, Xifeng Yan, Christopher Kruegel. 1657-1662 [doi]
- JSFlow: tracking information flow in JavaScript and its APIsDaniel Hedin, Arnar Birgisson, Luciano Bello, Andrei Sabelfeld. 1663-1671 [doi]
- Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approachDaniela Oliveira, Jesús Navarro, Nicholas Wetzel, Max Bucci. 1672-1679 [doi]
- Design of touch dynamics based user authentication with an adaptive mechanism on mobile phonesYuxin Meng, Duncan S. Wong, Lam-for Kwok. 1680-1687 [doi]
- Efficient protocols for private record linkageZikai Wen, Changyu Dong. 1688-1694 [doi]
- Student research abstract: android malware detection based on Kullback-Leibler divergenceVanessa N. Cooper. 1695-1696 [doi]
- Case study: legal requirements for the use of social login features for online reputation updatesYung Shin Van Der Sype, Jean-Marc Seigneur. 1698-1705 [doi]
- Privacy preserving trusted social feedbackAnirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang 0002, Yutaka Miyake. 1706-1711 [doi]
- Privacy-preserving reputation managementRonald Petrlic, Sascha Lutters, Christoph Sorge. 1712-1718 [doi]
- MUSES: a corporate user-centric system which applies computational intelligence methodsAntonio Miguel Mora, Paloma de las Cuevas, Juan J. Merelo Guervós, Sergio Zamarripa, M. Juan, Anna Isabel Esparcia-Alcázar, M. Burvall, H. Arfwedson, Z. Hodaie. 1719-1723 [doi]
- Learning reputation in an authorship networkCharanpal Dhanjal, Stéphan Clémençon. 1724-1726 [doi]
- Encountering smartphones in network simulation: a preliminary result on multi-radio multicastYongwoon Park, Wonyong Yoon. 1727-1728 [doi]
- Modeling for context-aware healthcare service using ontologyJunho Choi, Jeongin Kim, PanKoo Kim. 1729-1730 [doi]
- Analysis of binary code topology for dynamic analysisByeongho Kang, Eul-Gyu Im. 1731-1732 [doi]
- A novel double linear-cubic convolution interpolation for digital image scalingHae-Min Moon, Kyeong-Ri Ko, Juhyun Shin, Sung Bum Pan. 1733-1734 [doi]
- Method for fast clustering of data distributed on a sphere surfaceTran Tin, Sung-Ryul Kim. 1735-1736 [doi]
- A kernel-based monitoring approach for analyzing malicious behavior on AndroidYounsik Jeong, Hwan-taek Lee, Seongje Cho, Sangchul Han, Minkyu Park. 1737-1738 [doi]
- Performance analysis of the golden-SM in the V2V networkMyung Chul Park, Dong-Seog Han. 1739-1740 [doi]
- Matrix correlation distance for 2D image classificationHyunsoek Choi, Jeongin Seo, Hyeyoung Park. 1741-1742 [doi]
- A new device discovery scheme in lighting control networksSang-Il Choi, Seoki-Joo Koh, Insu Kim, Sang-Kyu Lim, Tae Gyu Kang. 1743-1744 [doi]
- An optimal device selection for user satisfaction of content sharingJiamei Tang, Paul Kim, Sangwook Kim. 1745-1746 [doi]
- A CUDA-based implementation of OpenGL-compatible rasterization library prototypeYoung Chun Kwon, Nakhoon Baek. 1747-1748 [doi]
- Design of a cellular automata cell with rule 30 on quantum-dot cellular automataSang-Ho Shin, Jun-Cheol Jeon, Gil-Je Lee, Kee-Young Yoo. 1749-1750 [doi]
- Respiratory motion estimation using visual coded markers for radiotherapyUdaya Wijenayake, Soon-Yong Park. 1751-1752 [doi]
- The effect of IMPORT change in software change historyJungil Kim, Eunjoo Lee. 1753-1754 [doi]
- Virtual prototype generation by shockwave flash for simulating HW components of embedded systemSoo-young Jang, Ajay Kumar Jha, Woo Jin Lee. 1755-1756 [doi]
- Impacts of delayed replication on the key-value storeMinwoo Jang, WooChur Kim, Yookun Cho, Jiman Hong. 1757-1758 [doi]