Abstract is missing.
- Transcript-based reannotation for microarray probesetsEduardo Valente, Miguel Rocha. 3-9 [doi]
- Discovering weighted motifs in gene co-expression networksSarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fernando M. A. Silva. 10-17 [doi]
- Facing the genome data deluge: efficiently identifying genetic variants with in-memory database technologyCindy Fähnrich, Matthieu-P. Schapranow, Hasso Plattner. 18-25 [doi]
- All-in-focus imaging technique used to improve 3D retinal fundus image reconstructionDanilo Motta, Luciana de Matos, Amanda Caniatto de Souza, Rafael Marcato, Afonso Paiva, Luis Alberto Vieira de Carvalho. 26-31 [doi]
- MyHealth: a cross-domain platform for healthcareMaribel Yasmina Santos, Cristiano G. Pendão, Bruno Ferreira, Luis Gonçalves, Guilherme Moreira, Adriano J. C. Moreira, João A. Carvalho. 40-46 [doi]
- Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithmDaye Jeong, Yunku Yeu, Jaegyoon Ahn, Youngmi Yoon, Sanghyun Park. 47-53 [doi]
- P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor modelPatricia Hübler, Duncan Dubugras A. Ruiz, João Eduardo Ferreira, Osmar Norberto de Souza. 54-57 [doi]
- A new approach to biometric recognition based on hand geometryMarcia V. P. do Nascimento, Leonardo Vidal Batista, Nicomedes L. Cavalcanti Junior. 59-65 [doi]
- 3DLBP and HAOG fusion for face recognition utilizing Kinect as a 3D scannerJoão Baptista Cardia Neto, Aparecido Nilceu Marana. 66-73 [doi]
- Shape description based on bag of salience pointsGlauco Vitor Pedrosa, Agma J. M. Traina, Célia A. Zorzo Barcelos. 74-79 [doi]
- A shortest path algorithm for 2D seismic horizon trackingEliana L. Goldner, Cristina Nader Vasconcelos, Pedro Mario Silva, Marcelo Gattass. 80-85 [doi]
- OR-PCA with dynamic feature selection for robust background subtractionSajid Javed, Andrews Sobral, Thierry Bouwmans, Soon Ki Jung. 86-91 [doi]
- Compact and discriminative approach for encoding spatial-relationship of visual wordsGlauco Vitor Pedrosa, Agma J. M. Traina. 92-95 [doi]
- OpenACC-based GPU acceleration of an optical flow algorithmNelson Martin, Jorge Collado, Guillermo Botella, Carlos García, Manuel Prieto. 96-98 [doi]
- Evolving regression trees robust to missing dataLuciano Costa Blomberg, Rodrigo C. Barros, Duncan D. Ruiz. 102-109 [doi]
- Evolving decision-tree induction algorithms with a multi-objective hyper-heuristicMárcio P. Basgalupp, Rodrigo C. Barros, Vili Podgorelec. 110-117 [doi]
- An approach to the MOGAS initialization problem using an algorithm based on path relinkingThiago Gomes Nepomuceno da Silva, José Everardo Bessa Maia, Leonardo Sampaio Rocha. 118-124 [doi]
- Dynamic optimization of multi-layered reinsurance treatiesHaoxu Wang, Omar Andrés Carmona Cortes, Andrew Rau-Chaplin. 125-132 [doi]
- Collective preferences in evolutionary multi-objective optimization: techniques and potential contributions of collective intelligenceDaniel Cinalli, Luis Martí, Nayat Sánchez Pi, Ana Cristina Bicharra Garcia. 133-138 [doi]
- Color image quantization using interactive genetic algorithmSeunghyun Jo. 139-140 [doi]
- Benchmarking motion sensing devices for rehabilitative gamingGary Ushaw, Richard Davison, Janet A. Eyre, Graham Morgan. 143-148 [doi]
- Design framework enhancing developer experience in collaborative coding environmentJarmo Palviainen, Terhi Kilamo, Johannes Koskinen, Janne Lautamäki, Tommi Mikkonen, Antti Nieminen. 149-156 [doi]
- Evaluation of web accessibility on the maps domainJonathas Leontino Medina, Maria Istela Cagnin, Débora Maria Barroso Paiva. 157-162 [doi]
- Selfie cafe: socialization in public spacesAndré O. Bueno, Júnia Coutinho Anacleto, Vinicius Ferreira, Janaina Cintra Abib, Carolina Souza, Daniel Consiglieri. 163-168 [doi]
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cardsReddy A. Goutham, Gil-Je Lee, Kee-Young Yoo. 169-174 [doi]
- Towards a catalog of usability smellsDiogo Almeida, José Creissac Campos, João Saraiva, João Carlos Silva 0002. 175-181 [doi]
- Integrating contexts in healthcare: guidelines to help the designers at design processJanaina C. Abib, Junia C. Anacleto. 182-184 [doi]
- Using graph-based models in a persuasive social recommendation systemJavier Palanca Cámara, Stella Heras, Javier Jorge, Vicente Julián. 189-194 [doi]
- Smell classification of wines by the learning vector quantization methodSigeru Omatu, Mitsuaki Yano, Yoshinori Ikeda. 195-200 [doi]
- Ontology definition and cognitive analysis in ocupational health and security (OHS) environmentsNayat Sánchez Pi, Luis Martí, José Manuel Molina, Ana Cristina Bicharra Garcia. 201-206 [doi]
- Amê: an environment to learn and analyze adversarial search algorithms using stochastic card gamesAna Beatriz Cruz, Leonardo Preuss, João Quadros, Uéverton Souza, Sabrina Serique, Angélica Ogasawara, Eduardo Bezerra, Eduardo S. Ogasawara. 208-213 [doi]
- Does gamification work for boys and girls?: An exploratory study with a virtual learning environmentLais Z. Pedro, Aparecida M. Z. Lopes, Bruno G. Prates, Julita Vassileva, Seiji Isotani. 214-219 [doi]
- EASy-DSBuilder: automated assessment of tree data structures in computer science teachingClaus A. Usener. 220-226 [doi]
- A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case studyCheops Araujo Malta, Ranilson Oscar Araujo Paiva, Alan Pedro da Silva, Ig Ibert Bittencourt, Ananias Queiroga de Oliveira Filho. 227-232 [doi]
- Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environmentRanilson Oscar Araujo Paiva, Ig Ibert Bittencourt, Alan Pedro da Silva, Seiji Isotani, Patrícia Augustin Jaques. 233-238 [doi]
- Beyond fun: an interactive and educational 3D traffic rules game controlled by non-traditional devicesMaria Andréia F. Rodrigues, Daniel Valente de Macedo, Yvens R. Serpa, Ygor R. Serpa. 239-246 [doi]
- Towards automatic prediction of student performance in STEM undergraduate degree programsLaci Mary Barbosa Manhães, Sérgio Manuel Serra da Cruz, Geraldo Zimbrão. 247-253 [doi]
- Enforcing reuse and customization in the development of learning objects: a product line approachA. Ezzat Labib, M. Carmen Penadés, José H. Canós, Abel Gómez. 261-263 [doi]
- Dynamic: a collaborative filtering strategy for assigning examination's rooms to supervisorsMontassar Ben Messaoud. 264-266 [doi]
- Evaluation of a haptic virtual reality simulator for endodontics trainingTales Nereu Bogoni, Márcio Sarroglia Pinho, Roberta Scarparo. 267-269 [doi]
- Integrating educational repositories to improve the reuse of learning objectsHeitor Barros, Evandro Costa, Jonathas Magalhães, Ranilson Paiva. 270-272 [doi]
- Smart learning environments for social learningEnrica Pesare. 273-274 [doi]
- Robust resource allocation in security games and ensemble modeling of adversary behaviorArjun Tambe, Thanh Nguyen. 277-282 [doi]
- i* extension for teleo-reactive systems requirements specificationsJosé Miguel Morales, Elena Navarro, Pedro Sánchez, Diego Alonso. 283-288 [doi]
- Visual similarity analysis in loop closure through data dimensionality reduction via diffusion mapsLeandro A. S. Moreira, Claudia Marcela Justel, Paulo Fernando Ferreira Rosa. 289-294 [doi]
- Improving the kicking accuracy in a soccer robotRicardo Dias, João M. Silva, José Luís Azevedo, Bernardo Cunha, António J. R. Neves, Nuno Lau. 295-300 [doi]
- Distributed task servicing using multiple robots with human-in-the-loop under limited communication rangeParikshit Maini, P. B. Sujit. 301-306 [doi]
- Distributed target identification in robotic swarmsPaolo Stegagno, Caterina Massidda, Heinrich H. Bülthoff. 307-313 [doi]
- Force model of a robotic particle chain for 3d displaysMatteo Lasagni, Kay Römer. 314-319 [doi]
- On the similarities between control based and behavior based visual servoingBenjamin Fonooni, Thomas Hellström. 320-326 [doi]
- ORCAS: optimized robots configuration and scheduling systemMarin Lujak, Alberto Fernández. 327-330 [doi]
- NVL: a coordination language for unmanned vehicle networksEduardo R. B. Marques, Manuel Ribeiro, José Pinto, João B. Sousa, Francisco Martins. 331-334 [doi]
- Sustaining mutual cooperation in iterated prisoner's dilemma gameKim Minsam, Kwok Yip Szeto. 335-337 [doi]
- Semantic analysis for focused multi-document summarization (fMDS) of textQuinsulon Israel, Hyoil Han, Il-Yeol Song. 339-344 [doi]
- pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimationUmberto Straccia, Matteo Mucci. 345-352 [doi]
- RDF chain query optimization in a distributed environmentAlexander Hogenboom, Ewout Niewenhuijse, Milan Jansen, Flavius Frasincar, Damir Vandic. 353-359 [doi]
- Learning folksonomies from task-oriented dialoguesGregory Moro Puppi Wanderley, Emerson Cabrera Paraiso. 360-367 [doi]
- Processing billions of RDF triples on a single machine using streaming and sortingFrancesco Corcoglioniti, Marco Rospocher, Michele Mostarda, Marco Amadori. 368-375 [doi]
- An ontological approach for simulating legal action in the Brazilian penal codeCleyton Mário de Oliveira Rodrigues, Ryan Ribeiro de Azevedo, Frederico Luiz Gonçalves de Freitas, Eunice Palmeira da Silva, Patrícia Vieira da Silva Barros. 376-381 [doi]
- Exploiting multilinguality for creating mappings between thesauriMauro Dragoni. 382-387 [doi]
- Towards an ontology pattern language for harmonizing software process related ISO standardsFabiano Borges Ruy, Ricardo de Almeida Falbo, Monalessa Perini Barcellos, Giancarlo Guizzardi. 388-395 [doi]
- Horn-rule based compression technique for RDF dataV. Gayathri, P. Sreenivasa Kumar. 396-401 [doi]
- An approach for building lexical-semantic resources based on heterogeneous information sourcesJosé Gildo de A. Júnior, Ulrich Schiel, Leandro Balby Marinho. 402-408 [doi]
- A supervised learning approach to detect subsumption relations between tags in folksonomiesAlex Sandro da Cunha Rego, Leandro Balby Marinho, Carlos Eduardo S. Pires. 409-415 [doi]
- High throughput indexing for large-scale semantic web dataLong Cheng, Spyros Kotoulas, Tomas E. Ward, Georgios Theodoropoulos. 416-422 [doi]
- A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structuresJean-Philippe Fauconnier, Mouna Kamel, Bernard Rothenburger. 423-425 [doi]
- Optimal planning for architecture-based self-adaptation via model checking of stochastic gamesJavier Cámara, David Garlan, Bradley R. Schmerl, Ashutosh Pandey 0002. 428-435 [doi]
- Modeling dependable systems with continuous time Bayesian networksMartin Größl. 436-441 [doi]
- Workload characterization model for optimal resource allocation in cloud middlewareShruti Kunde, Tridib Mukherjee. 442-447 [doi]
- Evaluation of an adaptive framework for resilient Monte Carlo executionsAntonio J. Rubio-Montero, Manuel Aurelio Rodriguez Pascual, Rafael Mayo Garcia. 448-455 [doi]
- A taxonomy of reliable request-response protocolsNaghmeh Ivaki, Nuno Laranjeiro, Filipe Araujo. 456-463 [doi]
- Scalable model for dynamic configuration and power management in virtualized heterogeneous web clustersAndré Felipe Monteiro, Orlando Loques. 464-467 [doi]
- Parameterization of fail-operational architectural patternsDulcinéia Oliveira da Penha, Gereon Weiss. 471-473 [doi]
- Predictability in human-agent cooperation: adapting to humans' personalitiesSebastian Ahrndt, Benjamin Breitung, Johannes Fähndrich, Sahin Albayrak. 474-479 [doi]
- A dynamic-adaptive architecture for 3d collaborative virtual environments based on graphic clustersDiego Roberto Colombo Dias, Marcelo de Paiva Guimarães, Torsten W. Kuhlen, Luís Carlos Trevelin. 480-487 [doi]
- Cooperative middleware platform as a service for internet of things applicationsLeonardo Albernaz Amaral, Ramão Tiago Tiburski, Everton de Matos, Fabiano Hessel. 488-493 [doi]
- Meta-strategy for cooperative tasks with learning of environments in multi-agent continuous tasksAyumi Sugiyama, Toshiharu Sugawara. 494-500 [doi]
- Rescheduling and checkpointing as strategies to run synchronous parallel programs on P2P desktop gridsRodrigo Da Rosa Righi, Alexandre Veith, Vinicius Facco Rodrigues, Gustavo Rostirolla, Cristiano André da Costa, Kleinner Farias, Antonio Marcos Alberti. 501-504 [doi]
- Efficient approach for reusing and sharing train driving plans using case-based reasoningAndré Pinz Borges, Osmar Betazzi Dordal, Denise Maria Vecino Sato, Fabrício Enembreck, Bráulio Coelho Ávila, Edson Emílio Scalabrin. 505-508 [doi]
- Mobile collaboration: a collaborative editing service in the cloudNadir Guetmi, Moulay Driss Mechaoui, Abdessamad Imine, Ladjel Bellatreche. 509-512 [doi]
- Estimating core body temperature based on human thermal model using wearable sensorsTakashi Hamatani, Akira Uchiyama, Teruo Higashino. 521-526 [doi]
- Integrating mobile sensing and social network for personalized health-care applicationHuan Li, Qi Zhang, Kejie Lu. 527-534 [doi]
- A context simulator as testing support for mobile appsVaninha Vieira, Konstantin Holl, Michael Hassel. 535-541 [doi]
- Determining the location of buildings given a single picture, environment maps and inaccurate GPS coordinatesJonas C. Sampaio, Raphael S. Evangelista, Leandro A. F. Fernandes. 542-547 [doi]
- On-device anomaly detection for resource-limited systemsMaroua Ben Attia, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Babak Khosravifar, Vincent Turpaud, Mario Couture. 548-554 [doi]
- To cloud or not to cloud: a context-aware deployment perspective of augmented reality mobile applicationsNayyab Zia Naqvi, Karel Moens, Arun Ramakrishnan, Davy Preuveneers, Danny Hughes, Yolande Berbers. 555-562 [doi]
- ubiMonitor: intelligent fusion of body-worn sensors for real-time human activity recognitionHeba Aly, Mohamed A. Ismail. 563-568 [doi]
- A scheduler for mobile cloud based on weighted metrics and dynamic context evaluationFrancisco Airton Silva, Paulo Maciel, Gileno Filho, Rubens Romero Martins Matos. 569-576 [doi]
- MpOS: a multiplatform offloading systemPhilipp B. Costa, Paulo A. L. Rego, Lincoln S. Rocha, Fernando Antonio Mota Trinta, José N. de Souza. 577-584 [doi]
- Multi-store metadata-based supervised mobile app classificationGiacomo Berardi, Andrea Esuli, Tiziano Fagni, Fabrizio Sebastiani 0001. 585-588 [doi]
- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSNFernando Rodrigues, Angelo Brayner, José Everardo Bessa Maia. 589-591 [doi]
- Performance characterization and scalable design of sensing-as-a-service platformTridib Mukherjee, Amit Kumar, Deepthi Chander, Koustuv Dasgupta, Amandeep Chugh, Anirban Mondal. 592-595 [doi]
- Towards context-aware behaviour generationPaulo Artur de Sousa Duarte, Felipe Mota Barreto, Francisco Anderson de Almada Gomes, Windson Viana de Carvalho, Fernando Antonio Mota Trinta. 596-598 [doi]
- Content placement in heterogeneous end-to-end virtual networksKostas Katsalis, Vasilis Sourlas, Thanasis Papapioannou, Thanasis Korakis, Leandros Tassiulas. 602-608 [doi]
- HTTP over UDP: an experimental investigation of QUICGaetano Carlucci, Luca De Cicco, Saverio Mascolo. 609-614 [doi]
- High speed network impacts and power consumption estimation for cloud data centersDaniel Guimaraes do Lago, Edmundo Roberto Mauro Madeira, Deep Medhi. 615-620 [doi]
- Energy harvesting based protection of border surveillance systemsNourhene Ellouze, Slim Rekhis, Noureddine Boudriga. 621-626 [doi]
- Feasibility of information-centric networking integration into LTE mobile networksAndre Gomes, Torsten Braun. 627-633 [doi]
- Translating full duplexity into capacity gains for the high-priority traffic classes of IEEE 802.11Saulo Queiroz, Roberto Hexsel. 634-639 [doi]
- Refactoring internet of things middleware through software-defined networkLucas Mendes Ribeiro Arbiza, Leandro Marcio Bertholdo, Carlos Raniery P. dos Santos, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 640-645 [doi]
- Effective manycast messaging for Kademlia networkLubos Matl, Tomás Cerný, Michael J. Donahoo. 646-652 [doi]
- Designing network servers within a hierarchical scheduling frameworkZahid Iqbal, Luís Almeida, Moris Behnam. 653-658 [doi]
- QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regressionArindam Chaudhuri, Soumya Maity, Soumya Kanti Ghosh. 659-661 [doi]
- A solution to the MCSP problem considering physical layer degradations in transparent optical networksAlexandre Fontinele, Iallen Santos, André Castelo Branco Soares, José Maranhão Neto, Felipe Mazullo. 662-664 [doi]
- From software defined network to network defined for softwareCelio Trois, Magnos Martinello, Luis Carlos Erpen De Bona, Marcos Didonet Del Fabro. 665-668 [doi]
- Feedback management for scaling clients in streaming multicastJulio Cano, Luis Almeida. 669-671 [doi]
- Channel and power allocation algorithm to optimize the performance of large WLANsMarcelo Riedi, Giovanna G. Basilio, Marcelo E. Pellenz. 673-679 [doi]
- Performance evaluation of heterogeneous wireless networks considering competing objectives and viewpointsJason B. Ernst, Stefan C. Kremer, Joel J. P. C. Rodrigues. 680-687 [doi]
- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNsJun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-Cong Xing, Qiang Duan. 688-694 [doi]
- Vehicular content centric network (VCCN): a survey and research challengesSafdar Hussain Bouk, Syed Hassan Ahmed, Dongkyun Kim. 695-700 [doi]
- Statistical, forecasting and metaheuristic techniques for network anomaly detectionGilberto Fernandes, Eduardo H. M. Pena, Luiz Fernando Carvalho, Joel J. P. C. Rodrigues, Mario Lemes Proença Jr.. 701-707 [doi]
- RSSI-based localization of a wireless sensor node with a flying robotFrank Bohdanowicz, Hannes Frey, Rafael Funke, Dominik Mosen, Florentin Neumann, Ivan Stojmenovic. 708-715 [doi]
- Interference aware channel assignment for structured wireless sensor networksEdgard Jamhour, Marcelo Eduardo Pellenz, Manoel Camillo Penna, Richard Demo Souza, Glauber Gomes de Oliveira Brante. 716-719 [doi]
- Multi-criteria based vertical handover decision in heterogeneous wireless networkMurad Khan. 720-721 [doi]
- Generating XML data for XPath queriesDusan Rychnovský, Irena Holubová. 724-731 [doi]
- Bing-SF-IDF+: a hybrid semantics-driven news recommenderMichel Capelle, Marnix Moerland, Frederik Hogenboom, Flavius Frasincar, Damir Vandic. 732-739 [doi]
- Efficient approximate thompson sampling for search query recommendationChu-Cheng Hsieh, James Neufeld, Tracy King, Junghoo Cho. 740-746 [doi]
- Locating domain-specific contents and experts on social bookmarking communitiesSimon Kassing, Jasper Oosterman, Alessandro Bozzon, Geert-Jan Houben. 747-752 [doi]
- Web page segmentation evaluationAndrés Sanoja, Stéphane Gançarski. 753-760 [doi]
- Multi-component similarity method for web product duplicate detectionRonald van Bezu, Sjoerd Borst, Rick Rijkse, Jim Verhagen, Damir Vandic, Flavius Frasincar. 761-768 [doi]
- Handling flash-crowd events to improve the performance of web applicationsUbiratam de Paula Junior, Lúcia Maria de A. Drummond, Daniel de Oliveira, Yuri Frota, Valmir C. Barbosa. 769-774 [doi]
- Automated generation of visual web tests from DOM-based web testsMaurizio Leotta, Andrea Stocco, Filippo Ricca, Paolo Tonella. 775-782 [doi]
- Leveraging task-based data to support functional testing of web applicationsFlávio Rezende de Jesus, Leandro Guarino de Vasconcelos, Laércio Augusto Baldochi Jr.. 783-790 [doi]
- Security assessment of clickjacking risks in web applications: metrics based approachHossain Shahriar, Hisham M. Haddad. 791-797 [doi]
- Migratom.js: a JavaScript migration framework for distributed web computing and mobile devicesTai-Lun Tseng, Shih-Hao Hung, Chia-Heng Tu. 798-801 [doi]
- Serena: scalable middleware for real-time web applicationsKennedy Kambona, Elisa Gonzalez Boix, Wolfgang De Meuter. 802-805 [doi]
- Catalogue: graph representation of file relations for a globally distributed environmentYamato Miyashita, Hiroyo Ishikawa, Fumio Teraoka, Kunitake Kaneko. 806-809 [doi]
- RE-CMS: a reverse engineering toolkit for the migration to CMS-based web applicationsFeliu Trias, Valeria de Castro, Marcos López Sanz, Esperanza Marcos. 810-812 [doi]
- Locality-preserving L1-graph and its application in clusteringShuchu Han, Hao Huang, Hong Qin, Dantong Yu. 813-818 [doi]
- A joint model for topic-sentiment modeling from textMohamed Dermouche, Leila Khouas, Julien Velcin, Sabine Loudcher. 819-824 [doi]
- Computationally-efficient classification of HEp-2 cell patterns in IIF imagesLuis Fernando Planella Gonzalez, Duncan Dubugras Alcoba Ruiz, Márcio Sarroglia Pinho. 825-830 [doi]
- Semi-supervised clustering using multi-assistant-prototypes to represent each clusterWalter J. Silva, Maria Camila Nardini Barioni, Sandra de Amo, Humberto Luiz Razente. 831-836 [doi]
- Approximate block coordinate descent for large scale hierarchical classificationAnveshi Charuvaka, Huzefa Rangwala. 837-844 [doi]
- Bias-aware lexicon-based sentiment analysisMohsin Iqbal, Asim Karim, Faisal Kamiran. 845-850 [doi]
- Key correlation mining by simultaneous monotone and anti-monotone constraints checkingSouad Bouasker, Sadok Ben Yahia. 851-856 [doi]
- FOSHU: faster on-shelf high utility itemset mining - with or without negative unit profitPhilippe Fournier-Viger, Souleymane Zida. 857-864 [doi]
- Multi-view learning with dependent viewsUlf Brefeld. 865-870 [doi]
- Alternating model treesEibe Frank, Michael Mayo, Stefan Kramer 0001. 871-878 [doi]
- Accelerating recommender systems using GPUsAndré Valente Rodrigues, Alípio Jorge, Inês Dutra. 879-884 [doi]
- On the spectrum between binary relevance and classifier chains in multi-label classificationSophie Burkhardt, Stefan Kramer. 885-892 [doi]
- EP-MEANS: an efficient nonparametric clustering of empirical probability distributionsKeith Henderson, Brian Gallagher, Tina Eliassi-Rad. 893-900 [doi]
- On the discovery of fake binary ratingsMurat Okkalioglu, Mehmet Koç, Huseyin Polat. 901-907 [doi]
- Sequence mining under multiple constraintsNicolas Béchet, Peggy Cellier, Thierry Charnois, Bruno Crémilleux. 908-914 [doi]
- Exploring multiple clusterings in attributed graphsGustavo Paiva Guedes, Eduardo Bezerra, Eduardo S. Ogasawara, Geraldo Xexéo. 915-918 [doi]
- Semantically enriching text representation model for document clusteringHan-joon Kim, Kee-joo Hong, Jae-young Chang. 922-925 [doi]
- Improve general contextual slim recommendation algorithms by factorizing contextsYong Zheng. 929-930 [doi]
- A fast support vector data description system for anomaly detection using big dataA. G. Rekha. 931-932 [doi]
- SNCStream: a social network-based data stream clustering algorithmJean Paul Barddal, Heitor Murilo Gomes, Fabrício Enembreck. 935-940 [doi]
- Pairwise combination of classifiers for ensemble learning on data streamsHeitor Murilo Gomes, Jean Paul Barddal, Fabrício Enembreck. 941-946 [doi]
- Forgetting methods for incremental matrix factorization in recommender systemsPawel Matuszyk, João Vinagre, Myra Spiliopoulou, Alípio Mário Jorge, João Gama. 947-953 [doi]
- Deep learning in partially-labeled data streamsJesse Read, Fernando Pérez-Cruz, Albert Bifet. 954-959 [doi]
- Visualization of evolving large scale ego-networksRui Sarmento, Mário Cordeiro, João Gama. 960-962 [doi]
- Collaborative filtering with recency-based negative feedbackJoão Vinagre, Alípio Mário Jorge, João Gama. 963-965 [doi]
- Performance prediction for set similarity joinsChristiane Faleiro Sidney, Diego Sarmento Mendes, Leonardo Andrade Ribeiro, Theo Härder. 967-972 [doi]
- HB+tree: use hadoop and HBase even your data isn't that bigAthanasios Kaplanis, Marios Kendea, Spyros Sioutas, Christos Makris, Giannis Tzimas. 973-980 [doi]
- Adaptive sorted neighborhood blocking for entity matching with MapReduceDemetrio Gomes Mestre, Carlos Eduardo S. Pires, Dimas C. Nascimento. 981-987 [doi]
- Bt-Join: a join operator for asymmetric storage deviceNeusa L. Evangelista, José de Aguiar Moraes Filho, Angelo Brayner, Namom Alencar. 988-993 [doi]
- Combine-and-conquer: improving the diversity in similarity search through influence samplingLucio F. D. Santos, Willian D. Oliveira, Luiz Olmes Carvalho, Monica Ribeiro Porto Ferreira, Agma J. M. Traina, Caetano Traina Jr.. 994-999 [doi]
- A framework for investigating the performance of sum aggregations over encrypted data warehousesClaudivan Cruz Lopes, Valéria Cesário Times. 1000-1007 [doi]
- Personalized recommendation of SOLAP queries: theoretical framework and experimental evaluationSaida Aissi, Mohamed Salah Gouider, Tarek Sboui, Lamjed Ben Said. 1008-1014 [doi]
- An ETL optimization framework using partitioning and parallelizationXiufeng Liu, Nadeem Iftikhar. 1015-1022 [doi]
- Parallel similarity search based on the dimensions value cardinalities of image descriptor vectorsDimitrios Rafailidis, Yannis Manolopoulos. 1023-1030 [doi]
- Towards a feature-rich data set for personalized access to long-tail contentChristin Seifert, Jörg Schlötterer, Michael Granitzer. 1031-1038 [doi]
- Real-time recommendations for user-item streamsAndreas Lommatzsch, Sahin Albayrak. 1039-1046 [doi]
- Classifying websites by industry sector: a study in feature designGiacomo Berardi, Andrea Esuli, Tiziano Fagni, Fabrizio Sebastiani 0001. 1053-1059 [doi]
- A sentiment-based item description approach for kNN collaborative filteringRafael Martins D'Addio, Marcelo G. Manzato. 1060-1065 [doi]
- On the impact of entity linking in microblog real-time filteringGiacomo Berardi, Diego Ceccarelli, Andrea Esuli, Diego Marcheggiani. 1066-1071 [doi]
- Column-specific context extraction for web tablesKatrin Braunschweig, Maik Thiele, Julian Eberius, Wolfgang Lehner. 1072-1077 [doi]
- A universal topic framework (UniZ) and its application in online searchYoungchul Cha, Keng-hao Chang, Hari Bommaganti, Ye Chen, Tak Yan, Bin Bi, Junghoo Cho. 1078-1085 [doi]
- BranchGuide: an indexing technique for efficient, lossless processing of branching path queriesTalles Brito, Gledson Elias. 1086-1092 [doi]
- Leveraging temporal expressions to filter vital documents related to an entityRafik Abbes, Karen Pinel-Sauvagnat, Nathalie Hernandez, Mohand Boughanem. 1093-1098 [doi]
- Exploring graph topology via matrix factorization to improve wikificationRaoni Ferreira, Maria da Graça Campos Pimentel, Marco Cristo. 1099-1104 [doi]
- Applying multi-view based metadata in personalized ranking for recommender systemsMarcos Aurélio Domingues, Camila Vaccari Sundermann, Flávio M. M. Barros, Marcelo G. Manzato, Maria G. C. Pimentel, Solange Oliveira Rezende. 1105-1107 [doi]
- From context to queryJörg Schlötterer. 1108-1109 [doi]
- Multi-document text summarization for competitor intelligence: a methodology based on topic identification and artificial bee colony optimizationSwapnajit Chakraborti. 1110-1111 [doi]
- Experience in item based recommender systemAnkit Chaudhary. 1112-1114 [doi]
- An ILS algorithm to evaluate structural balance in signed social networksMário Levorato, Lúcia Maria de A. Drummond, Yuri Frota, Rosa Maria Videira de Figueiredo. 1117-1122 [doi]
- Modelling consumers decision-making process about excluding products as a result of mutual influenceVinicius Nonnenmacher, Luiz Paulo Luna de Oliveira, Bardo E. J. Bodmann, Marta Becker Villamil. 1123-1128 [doi]
- Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypothesesGabriel P. Gimenes, Hugo Gualdron, Jose F. Rodrigues Jr., Mario Gazziro. 1129-1135 [doi]
- A naïve Bayes model based on ovelapping groups for link prediction in online social networksJorge Carlos Valverde-Rebaza, Alan Valejo, Lilian Berton, Thiago de Paulo Faleiros, Alneu de Andrade Lopes. 1136-1141 [doi]
- Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysisThiago H. P. Silva, Mirella M. Moro, Ana Paula C. Silva. 1142-1147 [doi]
- An effective approach to group recommendation based on belief propagationIrfan Ali, Sang-Wook Kim. 1148-1153 [doi]
- An evolutionary game model for the spread of non-cooperative behavior in online social networksSarah Michele Rajtmajer, Christopher Griffin, Derek Mikesell, Anna Cinzia Squicciarini. 1154-1159 [doi]
- Community detection, with lower time complexity, using coupled Kuramoto oscillatorsJoão Eliakin Mota de Oliveira, Marcos G. Quiles, Marcos D. N. Maia, Elbert E. N. Macau. 1160-1166 [doi]
- Predicting well-being with geo-referenced data collected from social media platformsJoão Loff, Manuel Reis, Bruno Martins. 1167-1173 [doi]
- Classification of Twitter follow links based on the followers' intentionHikaru Takemura, Atsushi Tanaka, Keishi Tajima. 1174-1180 [doi]
- Multi-stage seed selection for viral marketingAnastasia Mochalova, Alexandros Nanopoulos. 1181-1183 [doi]
- Using ArchiMate to model a process assessment frameworkNuno Silva, Miguel Mira da Silva, Béatrix Barafort, Marco Vicente, Pedro Sousa. 1189-1194 [doi]
- Using event logs and the Ψ-theory to analyse business processesPedro Linares Pinto, Carlos Mendes, Artur Caetano, Miguel Mira da Silva. 1195-1202 [doi]
- Runtime detection of business process compliance violations: an approach based on anti patternsAhmed Awad, Ahmed Barnawi, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise, Sherif Sakr. 1203-1210 [doi]
- Modelling strategy with ArchiMateAdina Aldea, Maria-Eugenia Iacob, Jos van Hillegersberg, Dick A. C. Quartel, Lianne Bodenstaff, Henry M. Franken. 1211-1218 [doi]
- SLA composition in service networks: a tool for representing relationships between SLAs and contractsMarco Zappatore, Antonella Longo, Mario A. Bochicchio. 1219-1224 [doi]
- Matching of events and activities: an approach based on behavioral constraint satisfactionThomas Baier 0001, Andreas Rogge-Solti, Jan Mendling, Mathias Weske. 1225-1230 [doi]
- Mining processes with multi-instantiationIngo Weber, Mostafa Farshchi, Jan Mendling, Jean-Guy Schneider. 1231-1237 [doi]
- Classification model for predicting cost slippage in governmental ICT projectsChristos Makris, Pantelis Vikatos, Joost Visser. 1238-1241 [doi]
- A conceptual framework for enterprise agilityJoshua Chibuike Nwokeji, Tony Clark, Balbir S. Barn, Vinay Kulkarni. 1242-1244 [doi]
- When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilienceJulius Holderer, Rafael Accorsi, Günter Müller. 1245-1248 [doi]
- A framework for enterprise agilityJoshua Chibuike Nwokeji. 1249-1250 [doi]
- Personalized video summarization using siftKaveh Darabi, Gheorghita Ghinea. 1252-1256 [doi]
- Shot-HR: a video shot representation method based on visual featuresTamires T. S. Barbieri, Tiago Henrique Trojahn, Moacir P. Ponti Jr., Rudinei Goularte. 1257-1262 [doi]
- Anomalous network communication detection system by visual pattern on a client computerHayate Goto, Tetsuji Takada. 1263-1269 [doi]
- Automatic multi-camera remix from single videoSujeet Mate, Igor D. D. Curcio, Antti J. Eronen, Arto Lehtiniemi. 1270-1277 [doi]
- Controlling the focus and input events in multimedia applicationsLuiz Fernando Gomes Soares, Márcio Ferreira Moreno, Álan Lívio Guedes Vasconcelos. 1278-1284 [doi]
- An approach for controlling synchronous remote instances of a multimedia presentationCaio César Viel, Erick Lazaro Melo, César A. C. Teixeira. 1285-1290 [doi]
- A robust video watermarking algorithm in H.264/AVC compressed domainLotfi Abdi, Faten Ben Abdallah, Aref Meddeb. 1291-1293 [doi]
- Visual detection of singularities in review platformsAlessandro Colantonio, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi. 1294-1295 [doi]
- NGrid: a proximity data structure for fluids animation with GPU computingMark Joselli, José Ricardo da S. Junior, Esteban Clua. 1303-1308 [doi]
- Boosting locality in multi-version partial data replicationJoão A. Silva, João Lourenço, Hervé Paulino. 1309-1314 [doi]
- C and OpenCL generation from MATLABJoão Bispo, Luís Reis, João M. P. Cardoso. 1315-1320 [doi]
- A scalable multi-producer multi-consumer wait-free ring bufferAndrew Barrington, Steven D. Feldman, Damian Dechev. 1321-1328 [doi]
- G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNNLeonardo C. da Rocha, Gabriel Spada Ramos, Rodrigo Chaves, Rafael Sachetto Oliveira, Daniel Madeira, Felipe Viegas, Guilherme Andrade, Sérgio Daniel, Marcos André Gonçalves, Renato Ferreira. 1335-1338 [doi]
- Parallel trajectory synchronization for aircraft conflicts resolutionEduardo de la Iglesia, Guillermo Botella Juan, Carlos García, Manuel Prieto. 1339-1341 [doi]
- Engineering trust- and reputation-based security controls for future internet systemsKristian Beckers, Maritta Heisel, Francisco Moyano, M. Carmen Fernández Gago. 1344-1349 [doi]
- VoiceToModel: an approach to generate requirements models from speech recognition mechanismsFábio Soares, João Araújo 0001, Fernando Wanderley. 1350-1357 [doi]
- TRL: a traceability representation languageArthur Marques, Franklin Ramalho, Wilkerson de L. Andrade. 1358-1363 [doi]
- Towards a requirements traceability process centered on the traceability modelArthur Marques, Franklin Ramalho, Wilkerson de L. Andrade. 1364-1369 [doi]
- An approach to early evaluation of informational privacy requirementsBalbir S. Barn, Giuseppe Primiero, Ravinder Barn. 1370-1375 [doi]
- Dynamic decision-making based on NFR for managing software variability and configuration selectionAndré Almeida, Nelly Bencomo, Thaís Vasconcelos Batista, Everton Cavalcante, Francisco Dantas. 1376-1382 [doi]
- A multi-criteria approach for assessing cloud deployment options based on non-functional requirementsRonaldo Gonçalves Junior, Tiago Rolim, Américo Sampaio, Nabor C. Mendonça. 1383-1389 [doi]
- M-4REuse: reusing use cases specificationsMaurício Manoel Coelho Júnior, Maria Lencastre. 1390-1396 [doi]
- Deriving the behavior of context-sensitive systems from contextual goal modelsJéssyka Vilela, Jaelson Brelaz de Castro, João Pimentel, Monique Soares, Paulo Cavalcanti, Márcia Lucena. 1397-1400 [doi]
- A risk - aware framework for compliance goal-obstacle analysisBendra Ojameruaye, Rami Bahsoon. 1401-1402 [doi]
- A multi-scale modeling approach for software architecture deploymentAmal Gassara, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 1405-1410 [doi]
- A meta-process to construct software architectures for system of systemsMarcelo Benites Gonçalves, Flávio Oquendo, Elisa Yumi Nakagawa. 1411-1416 [doi]
- OntolAD: a formal ontology for architectural descriptionsMilena Guessi, Dilvan A. Moreira, Gabriel Abdalla, Flávio Oquendo, Elisa Yumi Nakagawa. 1417-1424 [doi]
- Requirements, design and evaluation of a privacy reference architecture for web applications and servicesTânia Basso, Regina Moraes, Mario Jino, Marco Vieira. 1425-1432 [doi]
- A systematic literature review on the description of software architectures for systems of systemsMilena Guessi, Valdemar Vicente Graciano Neto, Thiago Bianchi, Katia R. Felizardo, Flávio Oquendo, Elisa Yumi Nakagawa. 1433-1440 [doi]
- Architecting cloud tools using software product line techniques: an exploratory studyLeonardo P. Tizzei, Leonardo G. Azevedo, Maximilien de Bayser, Renato F. G. Cerqueira. 1441-1448 [doi]
- A quantitative, evidence-based approach for recommending software modulesThais Burity, Gledson Elias. 1449-1456 [doi]
- A decision-making tool to support architectural designs based on quality attributesItalo Carlo Lopes Silva, Patrick H. S. Brito, Baldoino F. dos S. Neto, Evandro Costa, Andre Almeida Silva. 1457-1463 [doi]
- AutoQA: quality attributes as a service in cloudAshish Agrawal, T. V. Prabhakar. 1464-1467 [doi]
- Towards a multi-scale modeling approach for software architecturesIlhem Khlif, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira. 1468-1470 [doi]
- Exploring decision drivers on god class detection in three controlled experimentsJosé Amancio M. Santos, Manoel G. Mendonça. 1472-1479 [doi]
- Incremental aspect weaving: an approach for faster AOP learningY. Raghu Reddy, Anish Shankar, Madhavan Chetlur. 1480-1485 [doi]
- DesignSpace: an infrastructure for multi-user/multi-tool engineering Andreas Demuth, Markus Riedl-Ehrenleitner, Alexander Nöhrer, Peter Hehenberger, Klaus Zeman, Alexander Egyed. 1486-1491 [doi]
- Pattern-based transformation of sequence diagrams using QVTDae-Kyoo Kim, Byunghun Lee. 1492-1497 [doi]
- Bayesian network approach to assist on the interpretation of software metricsMirko Perkusich, Amaury Medeiros, Lenardo Chaves e Silva, Kyller Costa Gorgônio, Hyggo Oliveira de Almeida, Angelo Perkusich. 1498-1503 [doi]
- Automated software winnowingGregory Malecha, Ashish Gehani, Natarajan Shankar. 1504-1511 [doi]
- A framework to formally verify conformance of a software process to a software methodDjamel Eddine Khelladi, Reda Bendraou, Souheib Baarir, Yoann Laurent, Marie-Pierre Gervais. 1518-1525 [doi]
- SLC: a visual cohesion metric to predict the usability of graphical user interfacesKhalid Alemerien, Kenneth Magel. 1526-1533 [doi]
- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoringEverton L. G. Alves, Tiago Massoni, Patrícia Duarte de Lima Machado. 1534-1540 [doi]
- Acceptance factors of pull requests in open-source projectsDaricélio Moreira Soares, Manoel Limeira de Lima Júnior, Leonardo Murta, Alexandre Plastino. 1541-1546 [doi]
- From UML diagrams to simulink models: a precise and verified translationAndrei Costa, Simone André da Costa Cavalheiro, Luciana Foss, Leila Ribeiro. 1547-1552 [doi]
- Predicting severity of bug report by mining bug repository with concept profileTao Zhang, Geunseok Yang, Byungjeong Lee, Alvin T. S. Chan. 1553-1558 [doi]
- AB=ᗺA: execution equivalence as a new type of testing oracleAlexander Elyasov, W. Prasetya, Jurriaan Hage, U. Rueda, Tanja E. J. Vos, Nelly Condori-Fernández. 1559-1566 [doi]
- Developers assignment for analyzing pull requestsManoel Limeira de Lima Júnior, Daricélio Moreira Soares, Alexandre Plastino, Leonardo Murta. 1567-1572 [doi]
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applicationsM. Mongiovì, G. Giannone, Andrea Fornaia, Giuseppe Pappalardo, Emiliano Tramontana. 1573-1579 [doi]
- Architectural stability and evolution measurement for software reuseEleni Constantinou, Ioannis Stamelos. 1580-1585 [doi]
- Design pattern detection using FINDERHaneen Dabain, Ayesha Manzer, Vassilios Tzerpos. 1586-1593 [doi]
- A method to support search string building in systematic literature reviews through visual text miningGermano Duarte Mergel, Milene Selbach Silveira, Tiago Silva da Silva. 1594-1601 [doi]
- Implementation and evaluation of an approach for extracting feature models from documented UML use case diagramsMariem Mefteh, Nadia Bouassida, Hanêne Ben-Abdallah. 1602-1609 [doi]
- Examining the effectiveness of using concolic analysis to detect code clonesDaniel E. Krutz, Samuel A. Malachowsky, Emad Shihab. 1610-1615 [doi]
- An investigation on the evolutionary nature of exception handling violations in software product linesDemóstenes Sena, Roberta Coelho, Uirá Kulesza. 1616-1623 [doi]
- Mapping functional behavior onto architectural model in a model driven embedded system designPrachi Joshi, Sandeep K. Shukla, Jean-Pierre Talpin Inria, Huafeng Yu. 1624-1630 [doi]
- COSMIC functional measurement of mobile applications and code size estimationLoris D'Avanzo, Filomena Ferrucci, Carmine Gravino, Pasquale Salza. 1631-1636 [doi]
- A concise specification language for trace monitoringKostyantyn Vorobyov, P. Krishnan, Phil Stocks. 1637-1640 [doi]
- Dynamic variability support in workflow-based systems: an evaluation of the LateVa frameworkAitor Murguzur, Salvador Trujillo, Goiuria Sagardui. 1641-1643 [doi]
- Evaluating defect prediction approaches using a massive set of metrics: an empirical studyXiao Xuan, David Lo, Xin Xia, Yuan Tian. 1644-1647 [doi]
- A library to modularly control asynchronous executionsHiroaki Fukuda, Paul Leger. 1648-1650 [doi]
- Verifying eventuality properties of imprecise system requirements using event-BHong Anh Le, Ninh-Thuan Truong, Shin Nakajima. 1651-1653 [doi]
- Mapping the potential change impact in object-oriented softwareMívian M. Ferreira, Kecia A. M. Ferreira, Humberto T. Marques Neto. 1654-1656 [doi]
- Mining software development process variationsRenata M. S. Santos, Toacy C. Oliveira, Fernando Brito e Abreu. 1657-1660 [doi]
- Using developers' feedback to improve code smell detectionMario Hozano, Henrique Ferreira, Italo Silva, Baldoino Fonseca, Evandro Costa. 1661-1663 [doi]
- A parallel genetic algorithms framework based on Hadoop MapReduceFilomena Ferrucci, Pasquale Salza, M. Tahar Kechadi, Federica Sarro. 1664-1667 [doi]
- Reconstruction of runtime software architecture for object-oriented systemsHwi Ahn. 1668-1669 [doi]
- A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback dataMargaris Dionisis, Vassilakis Costas, Georgiadis Panagiotis. 1672-1679 [doi]
- A software process line for service-oriented applicationsCleiton Garcia, Marco Paludo, Andreia Malucelli, Sheila S. Reinehr. 1680-1687 [doi]
- Model-checking verification of publish-subscribe architectures in web service contextsGregorio Díaz, María-Emilia Cambronero, Hermenegilda Macià, Valentín Valero Ruiz. 1688-1695 [doi]
- A data quality-aware cloud service based on metaheuristic and machine learning provisioning algorithmsDimas C. Nascimento, Carlos Eduardo S. Pires, Demetrio Gomes Mestre. 1696-1703 [doi]
- Formal modeling self-adaptive service-oriented applicationsElvinia Riccobene, Patrizia Scandurra. 1704-1710 [doi]
- Characterizing the performance of web service frameworks under security attacksRui André Oliveira, Nuno Laranjeiro, Marco Vieira. 1711-1718 [doi]
- A service-oriented architecture for billing resources in IaaS cloud platformsNayane Ponte Viana, Fernando Trinta, Ricardo Viana, Rossana M. C. Andrade, Vinicius Cardoso Garcia, Rodrigo Elia Assad. 1719-1721 [doi]
- Truth and myth of independent software testing: a controlled human experimentAli Sunyaev, Dirk Basten. 1722-1728 [doi]
- Programs from proofs of predicated dataflow analysesMarie-Christine Jakobs, Heike Wehrheim. 1729-1736 [doi]
- Tri-modal under-approximation of event systems for test generationHadrien Bride, Jacques Julliand, Pierre-Alain Masson. 1737-1744 [doi]
- Polyhedra to the rescue of array interpolantsFrancesco Alberti, David Monniaux. 1745-1750 [doi]
- Symmetry reduced state classes for time petri netsPierre-Alain Bourdil, Bernard Berthomieu, Silvano Dal-Zilio, François Vernadat. 1751-1758 [doi]
- Model based testing of an interactive music systemClément Poncelet Sanchez, Florent Jacquemard. 1759-1764 [doi]
- Fast as a shadow, expressive as a tree: hybrid memory monitoring for CArvid Jakobsson, Nikolai Kosmatov, Julien Signoles. 1765-1772 [doi]
- LocFaults: a new flow-driven and constraint-based error localization approachMohammed Bekkouche, Hélène Collavizza, Michel Rueher. 1773-1780 [doi]
- Extending mCRL2 with ready simulation and iocos input-output conformance simulationCarlos Gregorio-Rodríguez, Luis Llana, Rafael Martínez-Torres. 1781-1788 [doi]
- Runtime enforcement for component-based systemsHadil Charafeddine, Khalil El-Harake, Yliès Falcone, Mohamad Jaber. 1789-1796 [doi]
- Random versus combinatorial effectiveness in software conformance testing: a case studyAndrea Calvagna, Andrea Fornaia, Emiliano Tramontana. 1797-1802 [doi]
- Concurrent streams in Markov chain usage models for statistical testing of complex systemsDaniel Homm, Juergen Eckert 0001, Reinhard German. 1803-1807 [doi]
- Constructive extensibility of trustworthy component-based systemsJosé Dihego, Augusto Sampaio, Marcel Medeiros Oliveira. 1808-1814 [doi]
- Automated system-level safety testing using constraint patterns for automotive operating systemsTaejoon Byun, Yunja Choi. 1815-1822 [doi]
- Formalising the SECD machine with nominal IsabelleGergely Buday. 1823-1824 [doi]
- Data-centric authorization and integrity control in a Linda tuplespaceAnders Fongen. 1827-1833 [doi]
- A grammatical approach to data-centric case management in a distributed collaborative environmentEric Badouel, Loïc Hélouët, Georges Edouard Kouamou, Christophe Morvan. 1834-1839 [doi]
- A calculus for attribute-based communicationYehia Abd Alrahman, Rocco De Nicola, Michele Loreti, Francesco Tiezzi, Roberto Vigo. 1840-1845 [doi]
- Protelis: practical aggregate programmingDanilo Pianini, Mirko Viroli, Jacob Beal. 1846-1853 [doi]
- A domain specific language for spatial simulation scenarios (DSL3S): introduction and tool supportLuís de Sousa, Alberto Rodrigues da Silva. 1854-1856 [doi]
- Monitoring and visualizing adaptation of autonomic systems at runtimeDhaminda B. Abeywickrama, Nikola B. Serbedzija, Michele Loreti. 1857-1860 [doi]
- SUNNY-CP: a sequential CP portfolio solverRoberto Amadini, Maurizio Gabbrielli, Jacopo Mauro. 1861-1867 [doi]
- Towards automatic poetry generation using constraint handling rulesAlia El Bolock, Slim Abdennadher. 1868-1873 [doi]
- On the use and effect of graph decomposition in qualitative spatial and temporal reasoningMichael Sioutis, Yakoub Salhi, Jean-François Condotta. 1874-1879 [doi]
- BDD construction for all solutions SAT and efficient caching mechanismTakahisa Toda, Koji Tsuda. 1880-1886 [doi]
- Crucial components in probabilistic inference pipelinesDimitar Sht. Shterionov, Gerda Janssens. 1887-1889 [doi]
- A time-composable operating system for the Patmos processorMarco Ziccardi, Martin Schoeberl, Tullio Vardanega. 1892-1897 [doi]
- Persistence-based branch misprediction bounds for WCET analysisWolfgang Puffitsch. 1898-1905 [doi]
- Reliability-aware striping with minimized performance overheads for flash-based storage devicesMing-Chang Yang, Yu-Ming Chang, Po-Chun Huang, Yuan-Hao Chang, Lue-Jane Lee, Tei-Wei Kuo. 1906-1912 [doi]
- Static energy reduction by performance linked cache capacity management in tiled CMPsHemangee K. Kapoor, Shirshendu Das, Shounak Chakraborty. 1913-1918 [doi]
- Dynamic associativity management using utility based way-sharingShirshendu Das, Hemangee K. Kapoor. 1919-1924 [doi]
- A multi-DAG model for real-time parallel applications with conditional executionJosé Carlos Fonseca, Vincent Nélis, Gurulingesh Raravi, Luís Miguel Pinho. 1925-1932 [doi]
- Compilation of synchronous observers as code contractsArnaud Dieumegard, Pierre-Loïc Garoche, Temesghen Kahsai, Alice Taillar, Xavier Thirioux. 1933-1939 [doi]
- TRES: a modular representation of schedulers, tasks, and messages to control simulations in simulinkFabio Cremona, Matteo Morelli, Marco Di Natale. 1940-1947 [doi]
- Automated generation of robotics applications from simulink and SysML modelsMatteo Morelli. 1948-1954 [doi]
- Introduction to partial time composability for COTS multicoresGabriel Fernandez, Jaume Abella, Eduardo Quiñones, Tullio Vardanega, Luca Fossati, Marco Zulianello, Francisco J. Cazorla. 1955-1956 [doi]
- Identification of embedded control units by state encoding and power consumption analysisEdward Jung, Cédric Marchand 0002, Lilian Bossuet. 1957-1959 [doi]
- A holistic optimization approach for the synthesis of AUTOSAR E/E architectureFouad Khenfri. 1960-1961 [doi]
- The omission finder for debugging what-should-have-happened bugs in object-oriented programsKouhei Sakurai, Hidehiko Masuhara. 1962-1969 [doi]
- Adaptive just-in-time value class optimization: transparent data structure inlining for fast executionTobias Pape, Carl Friedrich Bolz, Robert Hirschfeld. 1970-1977 [doi]
- Reifying the reflectogram: towards explicit control for implicit reflectionNick Papoulias, Marcus Denker, Stéphane Ducasse, Luc Fabresse. 1978-1985 [doi]
- Composable and hygienic typed syntax macrosCyrus Omar, Chenglong Wang, Jonathan Aldrich. 1986-1991 [doi]
- The safety of dynamic mixin compositionEden Burton, Emil Sekerinski. 1992-1999 [doi]
- M-CLOCK: migration-optimized page replacement algorithm for hybrid DRAM and PCM memory architectureMinho Lee, Donghyun Kang, Junghoon Kim, Young Ik Eom. 2001-2006 [doi]
- Improving random write performance in heterogeneous erasure-coded drive arrays by offloading code block requestsNikolaus Jeremic, Helge Parzyjegla, Gero Mühl. 2007-2014 [doi]
- Towards fast profiling of storage devices regarding access sequentialityFrancieli Zanon Boito, Rodrigo Kassick, Philippe O. A. Navaux, Yves Denneulin. 2015-2020 [doi]
- Exposing non-volatile memory cache for adaptive storage accessShuichi Oikawa. 2021-2026 [doi]
- ACFS: a completely fair scheduler for asymmetric single-isa multicore systemsJuan Carlos Saez, Adrian Pousa, Fernando Castro, Daniel Chaver, Manuel Prieto-Matías. 2027-2032 [doi]
- Partial coscheduling of virtual machines based on memory access patternsAnselm Busse, Jan Hendrik Schönherr, Matthias Diener, Philippe O. A. Navaux, Hans-Ulrich Heiß. 2033-2038 [doi]
- Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSDDongwook Kim, Sooyong Kang. 2039-2046 [doi]
- SSD caching to overcome small write problem of disk-based RAID in enterprise environmentsEunjae Lee, Yongseok Oh, Donghee Lee. 2047-2053 [doi]
- An experimental comparison analysis of kernel-level memory allocatorsTais Borges Ferreira, Rivalino Matias, Autran Macedo, Bruno Evangelista. 2054-2059 [doi]
- On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approachYong-Yeon Jo, Sungwoo Cho, Sang-Wook Kimm, Duck-Ho Bae, Hyunok Oh. 2060-2065 [doi]
- Performance impact of operating systems' caching parameters on parallel file systemsEduardo Camilo Inacio, Mario A. R. Dantas, Francieli Zanon Boito, Philippe Olivier Alexandre Navaux, Douglas Dyllon Jeronimo de Macedo. 2066-2068 [doi]
- Performance implications of cache flushes for non-volatile memory file systemsKyungjun Lee, Sungtae Ryu, Hwansoo Han. 2069-2071 [doi]
- An efficient backup-recovery technique to process large data in distributed key-value storeDonghee Min, Taegye Hwang, Joonhyouk Jang, Yookun Cho, Jiman Hong. 2072-2074 [doi]
- Search space reduction for electric vehicle-based tour schedulesJunghoon Lee, Gyung-Leen Park. 2075-2076 [doi]
- Thunk recycling for lazy functional languages: operational semantics and correctnessYasunao Takano, Hideya Iwasaki. 2079-2086 [doi]
- A modelling language for the effective design of Java annotationsIrene Córdoba, Juan de Lara. 2087-2092 [doi]
- Composable memory transactions with eager version managementRodrigo Medeiros Duarte, André Rauber Du Bois, Maurício Lima Pilla, Gerson Geraldo Homrich Cavalheiro. 2093-2098 [doi]
- Nested atomic sections with thread escape: compilationFrédéric Dabrowski, Frédéric Loulergue, Thomas Pinsard. 2099-2106 [doi]
- Runtime checking C programsReed Milewicz, Rajeshwar Vanka, James Tuck, Daniel Quinlan, Peter Pirkelbauer. 2107-2114 [doi]
- Bootstrapping DSLs from user interfacesMichaela Bacíková, Jaroslav Porubän, Sergej Chodarev, Milan Nosál. 2115-2118 [doi]
- Meta-programming with well-typed code analysisMichael Lopez, Gabriel Dos Reis. 2119-2121 [doi]
- Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP systemSergii Dymchenko, Mariia Mykhailova. 2122-2124 [doi]
- Design, implementation and evaluation of a novel anti-virus parasitic malwareByungho Min, Vijay Varadharajan. 2127-2133 [doi]
- Oblivious outsourcing of garbled circuit generationFlorian Kerschbaum. 2134-2140 [doi]
- Amusa: middleware for efficient access control management of multi-tenant SaaS applicationsMaarten Decat, Jasper Bogaerts, Bert Lagaisse, Wouter Joosen. 2141-2148 [doi]
- LogSec: adaptive protection for the wild wild webBastian Braun, Korbinian Pauli, Joachim Posegga, Martin Johns. 2149-2156 [doi]
- Cryptopaper: digital information security for physical documentsPengcheng Wang, Xue Yu, Shuai Chen, Padmaja Duggisetty, Shuo Guo, Tilman Wolf. 2157-2164 [doi]
- Tuple-based access control: a provenance-based information flow control for relational dataRomuald Thion, François Lesueur, Meriam Ben-Ghorbel-Talbi. 2165-2170 [doi]
- SecSess: keeping your session tucked away in your browserPhilippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen. 2171-2176 [doi]
- Automated analysis of RBAC policies with temporal constraints and static role hierarchiesSilvio Ranise, Anh Tuan Truong, Luca Viganò. 2177-2184 [doi]
- SmartAuth: dynamic context fingerprinting for continuous user authenticationDavy Preuveneers, Wouter Joosen. 2185-2191 [doi]
- Cost-efficient and attack-resilient approaches for state estimation in power gridsKaiqi Xiong, Peng Ning. 2192-2197 [doi]
- Profiling energy profilersErik Jagroep, Jan Martijn E. M. van der Werf, Slinger Jansen, Miguel Ferreira, Joost Visser. 2198-2203 [doi]
- Harnessing the unknown in advanced metering infrastructure trafficValentin Tudor, Magnus Almgren, Marina Papatriantafilou. 2204-2211 [doi]
- SMARTFlow: a solution for autonomic management and control of communication networks for smart gridsYona Lopes, Natalia Castro Fernandes, Carlos A. M. Bastos, Débora C. Muchaluat-Saade. 2212-2217 [doi]
- Defending against load monitoring in smart metering data through noise additionPedro Barbosa, Andrey Brito, Hyggo Almeida. 2218-2224 [doi]
- Solar irradiance forecasting using multi-layer cloud tracking and numerical weather predictionJin Xu, Shinjae Yoo, Dantong Yu, Dong Huang, John Heiser, Paul Kalb. 2225-2230 [doi]
- By-design vulnerabilities in the ANSI C12.22 protocol specificationJulian L. Rrushi, Hassan Farhangi, Radina Nikolic, Clay Howey, Kelly Carmichael, Ali Palizban. 2231-2236 [doi]
- A scalable platform for mobile social gamingFederico Bergenti, Giovanni Caire, Danilo Gotta. 2239-2244 [doi]
- The deployment of shared data objects among handheld and wearable devicesSheng-Wei Cheng, Che-Wei Chang, Yuan-Hao Chang, Pi-Cheng Hsiu, Chia-Heng Tu. 2245-2251 [doi]
- Study of wireless mammography image transmission impacts on robust cyber-aided diagnosis systemsSamaneh Aminikhanghahi, Sung Y. Shin, Wei Wang, Soon-Ik Jeon, Seong-Ho Son, Chulwoo Pack. 2252-2256 [doi]
- Performance analysis for a service delivery platform in software defined networkQiang Duan, Mengxi Zeng, Jun Huang, Cong-Cong Xing. 2257-2262 [doi]
- GlSch: a novel scheduler for a heterogeneous telescope networkM. C. López-Casado, Carlos Jesús Pérez-del-Pulgar, J. Cabello-Castillo, Victor F. Muñoz, Gil O. Lara, A. J. Castro-Tirado, J. Strobl, E. Maureira, J. Maza, S. Karpov, F. M. Sánchez. 2263-2270 [doi]
- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous servicesAssaad Moawad, Thomas Hartmann 0001, François Fouquet, Jacques Klein, Yves Le Traon. 2271-2278 [doi]
- Application-level task execution issues in mobile cloud computingAbida Shahzad, Hyunho Ji, PanKoo Kim, Hanil Kim, Byeongkyu Ko, Jiman Hong. 2285-2287 [doi]
- The implications of disk-based RAID and virtualization for write-intensive servicesPekka Pääkkönen, Daniel Pakkala. 2288-2291 [doi]
- An algorithm for distributed certificate chain discovery in open environmentsSamane Abdi, John Herbert. 2292-2298 [doi]
- A security configuration assessment for android devicesDaniel Vecchiato, Marco Vieira, Eliane Martins. 2299-2304 [doi]
- Bi-directional trust index computation in resource marketplaceAvinash Sharma, Tridib Mukherjee, Partha Dutta, Vinay Gangadhar Hegde. 2305-2311 [doi]
- Trust-based collection of information in distributed reputation networksDimitra Gkorou, Johan A. Pouwelse, Dick H. J. Epema. 2312-2319 [doi]
- A reputation system supporting unlinkable, yet authorized expert ratingsAndreas Kokoschka, Ronald Petrlic, Christoph Sorge. 2320-2327 [doi]
- A modeling approach for credit card fraud detection in electronic payment servicesGabriel Preti Santiago, Adriano M. Pereira, Roberto Hirata Jr.. 2328-2331 [doi]