Abstract is missing.
- Parallel approximate steady-state analysis of large probabilistic Boolean networksAndrzej Mizera, Jun Pang, Qixia Yuan. 1-8 [doi]
- Discovering disease-associated drugs using web crawl dataHyunjin Kim, Sanghyun Park. 9-14 [doi]
- IDO: inferring describable disease-gene relationships using opinion sentencesJeongWoo Kim, Youngmi Yoon, Sanghyun Park. 15-22 [doi]
- Discovering discriminative graph patterns from gene expression dataFabio Fassetti, Simona E. Rombo, Cristina Serrao. 23-30 [doi]
- A framework for virtual screeningVinicius Rosa Seus, Lande Silva Jr., Jorge Gomes, Pedro E. A. da Silva, Adriano Velasque Werhli, Karina S. Machado. 31-36 [doi]
- A method for obtaining rich data from PubMed using SVMJunbum Cha, JeongWoo Kim, Yunku Yeu, Sanghyun Park. 37-39 [doi]
- Identification of dynamical biological systems based on mixed-effect modelsLevy Batista, Thierry Bastogne, El-Hadi Djermoune. 40-43 [doi]
- Extensive assessment of metrics on RNA secondary structures and relative ensemblesMarco Barsacchi, Andrea Baù, Alessio Bechini. 44-47 [doi]
- Unveiling smoke in social images with the SmokeBlock approachMirela T. Cazzolato, Marcos Vinicius Naves Bedo, Alceu Ferraz Costa, Jéssica Andressa de Souza, Caetano Traina Jr., José Fernando Rodrigues Jr., Agma J. M. Traina. 49-54 [doi]
- Multiscale convolutive blind source separation in wavelet transform domainJamel Hattay, Samir Belaid, Wady Naanaa, Taoufik Aguili. 55-60 [doi]
- An image analysis framework for effective classification of seed damagesDouglas F. Pereira, Priscila T. M. Saito, Pedro Henrique Bugatti. 61-66 [doi]
- A graph theory-based online keywords model for image semantic extractionJing Wang, Zhijie Xu. 67-72 [doi]
- Beyond data: contextual information fusion for cyber security analyticsAhmed AlEroud, George Karabatis. 73-79 [doi]
- Video similarity search by using compact representationsHenrique Batista da Silva, Raquel Pereira de Almeida, Gabriel Barbosa da Fonseca, Carlos Caetano, Dario Vieira, Zenilton Kleber Gonçalves do Patrocínio Jr., Arnaldo de Albuquerque Araújo, Silvio Jamil Ferzoli Guimarães. 80-83 [doi]
- Lung nodule classification based on shape distributionsValéria P. M. Fernandes, Rodrigo F. A. Kanehisa, Geraldo Braz Junior, Aristófanes C. Silva, Anselmo Cardoso de Paiva. 84-86 [doi]
- Solving many-objective problems using targeted search directionsMaha Elarbi, Slim Bechikh, Lamjed Ben Said, Chih-Cheng Hung. 89-96 [doi]
- Active learning approaches for learning regular expressions with genetic programmingAlberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao. 97-102 [doi]
- An improved λ-linear genetic programming evaluated in solving the Santa Fe ant trail problemLéo Françoso Dal Piccol Sotto, Vinicius Veloso de Melo, Márcio P. Basgalupp. 103-108 [doi]
- On convergence of conventional and meta-heuristic methods for security-constrained OPF analysisJagadeesh Gunda, Sasa Z. Djokic, Roberto Langella, Alfredo Testa. 109-111 [doi]
- Medoid-based data clustering with estimation of distribution algorithmsHenry E. L. Cagnini, Rodrigo C. Barros, Christian Vahl Quevedo, Márcio P. Basgalupp. 112-115 [doi]
- Evolutionary reinforcement learning based search optimization: student research abstractDeblina Bhattacharjee. 116-117 [doi]
- Privacy-enabled remote health monitoring applications for resource constrained wearable devicesDavy Preuveneers, Wouter Joosen. 119-124 [doi]
- A situation-aware pervasive approach for assessing therapeutic goals in healthcare environmentJoão Ladislau Lopes, Rodrigo Santos de Souza, Cláudio Fernando Resin Geyer, Alexandre Souza, Patricia Davet, Ana Marilza Pernas, Adenauer C. Yamin. 125-130 [doi]
- Mind the tracker you wear: a security analysis of wearable health trackersRohit Goyal, Nicola Dragoni, Angelo Spognardi. 131-136 [doi]
- Testing for mobile e-health interventionsFiemke Griffioen-Both, Sandor Spruit, Siska Fitrianie, Robbert-Jan Beun, Jaap Lancee. 137-142 [doi]
- Towards automatic induction of abnormal behavioral patterns for recognizing mild cognitive impairmentZaffar Haider Janjua, Daniele Riboni, Claudio Bettini. 143-148 [doi]
- Haptic interaction objective evaluation in needle insertion task simulationCléber Gimenez Corrêa, Daniel Makoto Tokunaga, Edith Ranzini, Fátima L. S. Nunes, Romero Tori. 149-154 [doi]
- A movement activity recognition pervasive system for patient monitoring in ambient assisted livingJosé Daniel Pereira, Francisco José da Silva e Silva, Luciano Reis Coutinho, Berto de Tácio Pereira Gomes, Markus Endler. 155-161 [doi]
- A novel EEG-based emotion recognition approach for e-healthcare applicationsMouhannad Ali, Fadi Al Machot, Ahmad Haj Mosa, Kyandoghere Kyamakya. 162-164 [doi]
- A web tool for medical topic modeling: student research abstractLukas Huber. 165-166 [doi]
- Understanding player perceptions of RegnaTales, a mobile game for teaching social problem solving skillsYoon Phaik Ooi, Dion Hoe-Lian Goh, Elisa D. Mekler, Alexandre N. Tuch, Jillian Boon, Rebecca Pei-Hui Ang, Daniel Fung, Jens Gaab. 167-172 [doi]
- A comparative evaluation of interaction models for the design of interactive systemsAnna Beatriz Marques, Simone D. J. Barbosa, Tayana Conte. 173-180 [doi]
- Accessibility evaluation of rich internet applications interface components for mobile screen readersLucas Pedroso Carvalho, Lucas Pereira Ferreira, André Pimenta Freire. 181-186 [doi]
- Multimodal human attention detection for readingJiajia Li, Grace Ngai, Hong Va Leong, Stephen Chi-fai Chan. 187-192 [doi]
- VCloud: adding interactiveness to word clouds for knowledge exploration in large unstructured textsWallace P. Lira, Fernando Gama, Hivana Barbosa, Ronnie Alves, Cleidson R. B. de Souza. 193-198 [doi]
- From storyboard to software: user evaluation of an information literacy gameYanru Guo, Dion Hoe-Lian Goh. 199-201 [doi]
- User-friendly spreadsheet querying: an empirical studyRui Pereira, João Saraiva, Jácome Cunha, João Paulo Fernandes. 202-204 [doi]
- STRATUS: a questionnaire for strategic usability assessmentSuzanne Kieffer, Jean Vanderdonckt. 205-212 [doi]
- Usability heuristics and accessibility guidelines: a comparison of heuristic evaluation and WCAGAndreia R. Casare, Celmar G. da Silva, Paulo S. Martins, Regina L. O. Moraes. 213-215 [doi]
- Social element of big data analytics: integrating social network with the internet of things: student research abstractAwais Ahmad. 216-217 [doi]
- A crowdsensing approach for mobile learning in acoustics and noise monitoringMarco Zappatore, Antonella Longo, Mario A. Bochicchio, Daniele Zappatore, Alessandro A. Morrone, Gianluca De Mitri. 219-224 [doi]
- An interactive approach for the teaching of virtual memory using open educational resourcesCarlos Emilio de Andrade Cacho, Paulo S. L. Souza, Sarita Mazzini Bruschi, Ellen F. Barbosa, Fernando Tiosso. 225-231 [doi]
- Design and usability of a braille-based mobile audiogame environmentMaria da C. C. Araújo, Antônio R. S. Silva, Ticianne G. R. Darin, Everardo L. de Castro, Rossana M. C. Andrade, Ernesto T. de Lima, Jaime Sánchez, José Aires de Castro Filho, Windson Viana. 232-238 [doi]
- Mobile phone text messaging to increase student participation: an experience in a blended courseEdgar Marçal, Rossana M. C. Andrade, Windson Viana, Eduardo Junqueira, Rosemeiry Melo. 239-245 [doi]
- Learning relational probabilistic action models for online planning with decision forestsLenz Belzner, Alexander Neitz. 248-253 [doi]
- Time-adaptive cross entropy planningLenz Belzner. 254-259 [doi]
- A tale of many explanations: towards an explanation generation system for robotsMohan Sridharan, Ben Meadows, Zenon Colaco. 260-267 [doi]
- The next frontier: combining information gain and distance cost for decentralized multi-robot explorationRafael Gonçalves Colares, Luiz Chaimowicz. 268-274 [doi]
- Towards collective manipulation without inter-agent communicationSiamak G. Faal, Shadi Tasdighi Kalat, Cagdas D. Onal. 275-280 [doi]
- Extensible collaborative autonomy using GAMSAnton Dukeman, Julie A. Adams, James Edmondson. 281-283 [doi]
- Human-agent teamwork: what is predictability, why is it important?Sebastian Ahrndt, Johannes Fähndrich, Sahin Albayrak. 284-286 [doi]
- A modular hybrid localization approach for mobile robots combining local grid maps and natural landmarksFlorian Mirus, Frank Slomian, Stefan Dörr, Felipe Garcia Lopez, Matthias Gruhler, Jürgen Pfadt. 287-290 [doi]
- Learning to be efficient: algorithms for training low-latency, low-compute deep spiking neural networksDaniel Neil, Michael Pfeiffer, Shih-Chii Liu. 293-298 [doi]
- Similarity analysis of neuronal activation patternsEugênio de Carvalho Saraiva, Herman Martins Gomes. 299-304 [doi]
- An automatic method for multiple sclerosis lesion detection in fluid attenuated inversion recovery magnetic resonance imagesPedro Costa Klein, Ricardo Bernardi Soder, Jefferson Becker, Alexandre Rosa Franco, Márcio Sarroglia Pinho. 305-308 [doi]
- Petri nets for modelling and analysing a complex system related to Alzheimer's diseaseSafae Cherdal, Salma Mouline. 309-312 [doi]
- Modeling the cerebellum, from neurons to healthy and pathological behaviors: student research abstractAlberto Antonietti. 313-314 [doi]
- Measuring semantic distance for linked open data-enabled recommender systemsGuangyuan Piao, John G. Breslin. 315-320 [doi]
- An ontology pattern language for service modelingRicardo de Almeida Falbo, Glaice Kelly Quirino, Julio Cesar Nardi, Monalessa Perini Barcellos, Giancarlo Guizzardi, Nicola Guarino, Antonella Longo, Barbara Livieri. 321-326 [doi]
- Leveraging the schema in latent factor models for knowledge graph completionPasquale Minervini, Claudia d'Amato, Nicola Fanizzi, Floriana Esposito. 327-332 [doi]
- Ontology enrichment by discovering multi-relational association rules from ontological knowledge basesClaudia d'Amato, Steffen Staab, Andrea G. B. Tettamanzi, Tran Duc Minh, Fabien L. Gandon. 333-338 [doi]
- Gold standard based evaluation of ontology learning techniquesHela Sfar, Anja Habacha Chaibi, Amel Bouzeghoub, Henda Ben Ghézala. 339-346 [doi]
- GoAAL: an ontology for goal-oriented development of AAL environmentsMarco Cameranesi, Claudia Diamantini, Domenico Potena, Emanuele Storti. 347-353 [doi]
- A 2-phase frame-based knowledge extraction frameworkFrancesco Corcoglioniti, Marco Rospocher, Alessio Palmero Aprosio. 354-361 [doi]
- SECF: improving SPARQL querying performance with proactive fetching and cachingWei Emma Zhang, Quan Z. Sheng, Yongrui Qin, Lina Yao, Ali Shemshadi, Kerry L. Taylor. 362-367 [doi]
- A bootstrapping method for extracting attribute names with keys from the webYoshinori Hijikata, Shintaro Nomura, Fumitaka Nakane, Shogo Nishida. 368-371 [doi]
- Automatic semantic service composition aiming at increasing end-users' accessibilityNikolaos Kaklanis, Ageliki Konstadinidou, Konstantinos Votis, Dimitrios Tzovaras. 372-374 [doi]
- Exploiting the semantic similarity of interests in a semantic interest graph for social recommendations: student research abstractGuangyuan Piao. 375-376 [doi]
- Monitoring of cloud computing environments: concepts, solutions, trends, and future directionsGuilherme da Cunha Rodrigues, Rodrigo N. Calheiros, Vinicius Tavares Guimaraes, Glederson Lessa dos Santos, Márcio Barbosa de Carvalho, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco, Rajkumar Buyya. 378-383 [doi]
- Supporting media workflows on an advanced cloud object store platformMaurizio Montagnuolo, Alberto Messina, Elliot K. Kolodner, Doron Chen, Eran Rom, Kalman Z. Meth, Paula Ta-Shma. 384-389 [doi]
- Elastic provisioning for cloud databases with uncertainty managementVictor A. E. de Farias, Flávio R. C. Sousa, José Gilvan Rodrigues Maia, João Paulo Pordeus Gomes, Javam C. Machado. 390-397 [doi]
- Securing integration of cloud services in cross-domain distributed environmentsBojan Suzic. 398-405 [doi]
- Hadoop energy consumption reduction with hybrid HDFSIvanilton Polato, Denilson Barbosa, Abram Hindle, Fabio Kon. 406-411 [doi]
- An architecture for providing elasticity based on autonomic computing conceptsEmanuel F. Coutinho, Paulo Antonio Leal Rego, Danielo Goncalves Gomes, José Neuman de Souza. 412-419 [doi]
- Performance-aware server consolidation with adjustable interference levelsLuis Carlos Jersak, Tiago Ferreto. 420-425 [doi]
- On the usability of shortest remaining time first policy in shared Hadoop clustersNathanaël Cheriere, Pierre Donat-Bouillud, Shadi Ibrahim, Matthieu Simonin. 426-431 [doi]
- Scalable and manageable customization of workflows in multi-tenant SaaS offeringsMajid Makki, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen. 432-439 [doi]
- A certification framework for cloud-based servicesMarco Anisetti, Claudio Agostino Ardagna, Filippo Gaudenzi, Ernesto Damiani. 440-447 [doi]
- NCaaS: network configuration as a service in SDN-driven cloud architecturesMaha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Wassim Itani. 448-454 [doi]
- Evaluating the elasticity of multimedia applications in a cloud computing environment using network metricsEmanuel F. Coutinho, Paulo A. L. Rego, José Neuman de Souza. 455-461 [doi]
- An enhanced biomorphic model for cloud scalingGyorgi Stoykov, Anis Yazidi. 462-469 [doi]
- Inventory theory applied to cost optimization in cloud computingAndrea Nodari, Jukka K. Nurminen, Christian Frühwirth. 470-473 [doi]
- Dynamic partitioning of physical memory among virtual machines: ASMI: architectural support for memory isolationR. Jithin, Priya Chandran. 474-476 [doi]
- A plug-and-work tool for cloud system reconfiguration with single commandRuey-Kai Sheu, Shyan-Ming Yuan, Xiao-Long Liu, Po-Yu Chung. 477-479 [doi]
- Reliable modeling of CPU usage in an office worker environmentHugo Lewi Hammer, Anis Yazidi, Kyrre M. Begnum. 480-483 [doi]
- PaaS dependability integration architecture based on cloud brokeringWiem Abderrahim, Zièd Choukair. 484-487 [doi]
- Towards workload-aware fine-grained control over cloud resources: student research abstractAmjad Ullah. 488-489 [doi]
- Stretching multi-ring PaxosSamuel Benz, Leandro Pacheco de Sousa, Fernando Pedone. 492-499 [doi]
- Planning the transformation of overlaysYoung Yoon, Nathan Robinson, Vinod Muthusamy, Sheila A. McIlraith, Hans-Arno Jacobsen. 500-507 [doi]
- NATCloud: cloud-assisted NAT-traversal serviceHanna Kavalionak, Amir H. Payberah, Alberto Montresor, Jim Dowling. 508-513 [doi]
- Dynamic adaptation of geo-replicated CRDTsCarlos Bartolomeu, Manuel Bravo, Luís E. T. Rodrigues. 514-521 [doi]
- Monitoring service level workload and adapting highly available applicationsMehran Khan, Ferhat Khendek, Maria Toeroe. 522-529 [doi]
- A multi-criteria ranking of security countermeasuresNicola Nostro, Ilaria Matteucci, Andrea Ceccarelli, Francesco Santini, Felicita Di Giandomenico, Fabio Martinelli, Andrea Bondavalli. 530-533 [doi]
- Analysis of checkpointing overhead in parallel state machine replicationOdorico Machado Mendizabal, Fernando Luís Dotti, Fernando Pedone. 534-537 [doi]
- Deadlock models in distributed computation: foundations, design, and computational complexityValmir Carneiro Barbosa, Alan Diêgo A. Carneiro, Fábio Protti, Uéverton S. Souza. 538-541 [doi]
- Virtualization technologies for the big data environmentAymen Jlassi, Patrick Martineau. 542-545 [doi]
- Toward accurate energy-efficient cellular network: switching off excessive carriers based on traffic profilingBin Cao, Jing Fan, Mingxuan Yuan, Yanhua Li. 546-551 [doi]
- Automated semantic trajectory annotation with indoor point-of-interest visits in urban areasVictor de Graaff, Rolf A. de By, Maurice van Keulen. 552-559 [doi]
- Context-aware daily activity summarization with adaptive transmissionChung-Kuang Chou, Chia-Chih Lin, Ming-Syan Chen. 560-565 [doi]
- Mobile platform support for remote music playHochul Lee, Jaehun Lee, Hyuck Han, Sooyong Kang. 566-571 [doi]
- Virtual running of vehicle trajectories for automatic map generationJinkwan Park, Taeyong Kim, Bokuk Park, Hwan-Gue Cho. 572-579 [doi]
- Insights into rooted and non-rooted Android mobile devices with behavior analyticsYun Shen, Nathan S. Evans, Azzedine Benameur. 580-587 [doi]
- Real-time counting of moving objects in complex environmentsAlfredo Cuzzocrea, Enzo Mumolo, Alessandro Moro. 588-595 [doi]
- Voronoi maps: an approach to individual-based environmental exposure estimationWan D. Bae, Shayma Alkobaisi, Wade Meyers, Sada Narayanappa, Petr Vojtechovský. 596-603 [doi]
- Navigating visually impaired travelers in a large train station using smartphone and bluetooth low energyJee-Eun Kim, Masahiro Bessho, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura. 604-611 [doi]
- A sensor cloud architecture for healthcare applicationsMohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga. 612-617 [doi]
- An Android application for head trackingMassimiliano Benedetto, Alessio Gagliardi, Pasquale Buonocunto, Giorgio C. Buttazzo. 618-621 [doi]
- A crowdsourcing game-theoretic intrusion detection and rating systemFarah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 622-625 [doi]
- Towards a component infrastructure for cyber-physical systemsMarcio E. F. Maia, Rossana M. C. Andrade, Windson Viana. 626-628 [doi]
- A mobile news reader that turns news consumption into a game: student research abstractCatherine Sotirakou. 629-630 [doi]
- A data driven context aware activity recognition system: student research abstractPiyush Rai Saxena. 631-632 [doi]
- Context-driven mobile apps management and recommendation: student research abstractYong Zheng. 633-634 [doi]
- Prioritizing deadline-constrained data flows in cloud datacenter networksMaurice Khabbaz, Khaled Shaban, Chadi Assi, Long Qu. 636-643 [doi]
- LoSeRO: a locality sensitive routing protocol in opportunistic networksGianpiero Costantino, Rajib Ranjan Maiti, Fabio Martinelli, Paolo Santi. 644-650 [doi]
- Available bandwidth measurement in software defined networksPéter Megyesi, Alessio Botta, Giuseppe Aceto, Antonio Pescapè, Sándor Molnár. 651-657 [doi]
- Policy based security architecture for software defined networksKallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens. 658-663 [doi]
- Circuit-switched translucent optical networks planning with user level QoSAndré Castelo Branco Soares, Alexandre Fontinele, Gilvan M. Durães, William Giozza, José Roberto Amazonas. 664-670 [doi]
- PLIERS: a popularity-based recommender system for content dissemination in online social networksValerio Arnaboldi, Mattia Giovanni, Franca Delmastro, Elena Pagani. 671-673 [doi]
- Cooperative localisation with hybrid inertial navigation system/pedestrian dead reckoning tracking for GPS-denied environmentsPanagiotis-Agis Oikonomou-Filandras, Kai-Kit Wong, Zhongbin Zheng, Yangyang Zhang. 675-681 [doi]
- A scalable multiagent approach for channel assignment in wireless networksTânia L. Monteiro, Marcelo Eduardo Pellenz, Edgard Jamhour, Manoel Camillo Penna, Fabrício Enembreck, Richard Demo Souza. 682-687 [doi]
- A joint user association and load balancing scheme for wireless LANs supporting multicast transmissionMade Harta Dwijaksara, Wha Sook Jeon, Dong Geun Jeong. 688-695 [doi]
- Comparative study of routing strategies in software defined networkingSahrish Khan, Abdul Wahid, Sadaf Tanvir. 696-702 [doi]
- On best drone tour plans for data collection in wireless sensor networkRone Ilídio da Silva, Mario A. Nascimento. 703-708 [doi]
- E-ProbT: a new approach to mitigate the broadcast storm problem in VANETsSucupira Lima, Daniel Larces, Celestino Junior, Joaquim Larces. 709-715 [doi]
- Analytical study of anycast asynchronous MAC protocols for wireless sensor networksTales Heimfarth, João Carlos Giacomin, João Paulo de Araujo, Edison Pignaton de Freitas. 716-723 [doi]
- Interest forwarding in vehicular information centric networks: a surveyMuhammad Azfar Yaqub, Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim. 724-729 [doi]
- An adaptive hole-bypassing algorithm for wireless sensor networksKhaled Hadi. 730-733 [doi]
- Limited space oriented optimized storage protocol in autonomous mobile cloudBo Cui, Ru Li, Jing Liu, Yujun Zhang, Zhongcheng Li. 734-737 [doi]
- DS-MMAC: dynamic schedule based MAC for mobile wireless sensor networkV. Sreejith, R. Suriyadeepan, K. R. Anupama, Lucy J. Gudino. 738-741 [doi]
- Development of an O2O(offline to online) application case based on person wide web platformSunju Ha, Jisup Yoon, Seongbae Eun, Sun Sup So, Jinman Jung, Young-Sun Yun. 742-745 [doi]
- Internet of things-based smart classroom environment: student research abstractAmir Atabekov. 746-747 [doi]
- Who likes me more?: analysing entity-centric language-specific bias in multilingual WikipediaYiwei Zhou, Elena Demidova, Alexandra I. Cristea. 750-757 [doi]
- Rich cloud-based web applications with CloudBrowser 2.0Xiaozhong Pan, Godmar Back. 758-765 [doi]
- Automatic identification of drop-down menu widgets using mutation observers and visibility changesWillian Massami Watanabe, Renata Pontin de Mattos Fortes. 766-771 [doi]
- Duplicate detection in web shops using LSH to reduce the number of computationsIris van Dam, Gerhard van Ginkel, Wim Kuipers, Nikki Nijenhuis, Damir Vandic, Flavius Frasincar. 772-779 [doi]
- Job recommendation in AskStory: experiences, methods, and evaluationYeon-Chang Lee, Jiwon Hong, Sang-Wook Kim. 780-786 [doi]
- Supporting adaptation of web applications to the mobile environment with automated usability evaluationLuiz F. Gonçalves, Leandro G. Vasconcelos, Ethan V. Munson, Laércio A. Baldochi. 787-794 [doi]
- Automatic performance space exploration of web applications using genetic algorithmsTanwir Ahmad, Dragos Truscan. 795-800 [doi]
- Object injection vulnerability discovery based on latent semantic indexingHossain Shahriar, Hisham Haddad. 801-807 [doi]
- MorphingAssist: seamless transformation from keywords to structured queriesYui Yasunaga, Atsuyuki Morishima. 808-811 [doi]
- Simultaneous editing of JSON objects via operational transformationTim Jungnickel, Tobias Herb. 812-815 [doi]
- Controlling the elasticity of web applications on cloud computingMichel Albonico, Jean-Marie Mottu, Gerson Sunyé. 816-819 [doi]
- Analyzing crowdsourced promotion effects in online social networksHee-Jeong Kim, Dong-Kyu Chae, Sang-Wook Kim, Jongwuk Lee. 820-823 [doi]
- PatchWork, a scalable density-grid clustering algorithmFrank Gouineau, Tom Landry, Thomas Triplet. 824-831 [doi]
- A robust density-based clustering algorithm for multi-manifold structureJianpeng Zhang, Mykola Pechenizkiy, Yulong Pei, Julia Efremova. 832-838 [doi]
- Mining structured petri nets for the visualization of process behaviorJavier de San Pedro, Jordi Cortadella. 839-846 [doi]
- Interactive generic learning method (IGLM): a new approach to interactive short text classificationAmeni Bouaziz, Célia da Costa Pereira, Christel Dartigues-Pallez, Frédéric Precioso. 847-852 [doi]
- Language-independent multi-document text summarization with document-specific word associationsOskar Gross, Antoine Doucet, Hannu Toivonen. 853-860 [doi]
- Efficient algorithms for mining recent weighted frequent itemsets in temporal transactional databasesJerry Chun-Wei Lin, Wensheng Gan, Philippe Fournier-Viger, Tzung-Pei Hong. 861-866 [doi]
- Redundancy reduction: does it help associative classifiers?Luiza Antonie, Osmar R. Zaïane, Robert C. Holte. 867-874 [doi]
- On structure preserving sampling and approximate partitioning of graphsWouter van Heeswijk, George H. L. Fletcher, Mykola Pechenizkiy. 875-882 [doi]
- Trading off accuracy for efficiency by randomized greedy warpingAtif Raza, Jörg Wicker, Stefan Kramer 0001. 883-890 [doi]
- An optimization method of extreme learning machine for regressionXiao-jian Ding, Xiao-guang Liu, Xin Xu. 891-893 [doi]
- LayerFolding: discovering creative links in word association networksPing Xiao, Hannu Toivonen. 894-897 [doi]
- Efficient closed high-utility itemset miningPhilippe Fournier-Viger, Souleymane Zida, Jerry Chun-Wei Lin, Cheng-Wei Wu, Vincent S. Tseng. 898-900 [doi]
- A methodology for selecting the most suitable cluster validation internal indicesCaroline Tomasini, Leonardo R. Emmendorfer, Eduardo Nunes Borges, Karina Machado. 901-903 [doi]
- Clustering nodes with attributes via graph alignmentDimitrios Rafailidis. 904-907 [doi]
- An efficient and effective link-based similarity measure in social and information networks: student research abstractMasoud Reyhani Hamedani. 908-909 [doi]
- A support vector based approach for classification beyond the learned label space in data streamsPoorya ZareMoodi, Sajjad Kamali Siahroudi, Hamid Beigy. 910-915 [doi]
- Real time streaming pattern detection for eCommerceWilliam Braik, Floréal Morandat, Jean-Rémy Falleri, Xavier Blanc. 916-922 [doi]
- Sampling massive streaming call graphsShazia Tabassum, João Gama. 923-928 [doi]
- Fast adaptive stacking of ensemblesIsvani Inocencio Frías Blanco, Alberto Verdecia-Cabrera, Agustín Alejandro Ortiz Díaz, André C. P. L. F. Carvalho. 929-934 [doi]
- Wavelet transform based vehicle detection from sensors for bridge weigh-in-motionJuan Alegre-Sanahuja, Wei Lu, Atsuhiro Takasu. 935-940 [doi]
- Eventually consistent cardinality estimation with applications in biodata miningGeorgios Drakopoulos, Stavros Kontopoulos, Christos Makris. 941-944 [doi]
- DOBRO: a prediction error correcting robot under driftsAlexandr V. Maslov, Hoang Thanh Lam, Mykola Pechenizkiy, Eric Bouillet, Tommi Kärkkäinen. 945-948 [doi]
- Clustering data streams using a forgetful neural modelDouglas de O. Cardoso, Felipe Maia Galvão França, João Gama. 949-951 [doi]
- Deferral classification of evolving temporal dependent data streamsMichael Mayo, Albert Bifet. 952-954 [doi]
- A new time series classification approach based on recurrence quantification analysis and Gabor filterAngelo Silva, Renato Ishii. 955-957 [doi]
- Advances in network-based ensemble classifiers for evolving data streams: student research abstractHeitor Murilo Gomes. 958-959 [doi]
- Improving SQL query performance on embedded devices using pre-compilationGraeme Douglas, Ramon Lawrence. 961-964 [doi]
- Take me to SSD: a hybrid block-selection method on HDFS based on storage typeMinkyung Kim, Mincheol Shin, Sanghyun Park. 965-971 [doi]
- Efficient algorithms for processing preference queriesMarcos Roberto Ribeiro, Fabíola Souza F. Pereira, Vinícius Vitor S. Dias. 972-979 [doi]
- Data producer catalogs for the web of things: a study on NoSQL solutionsAlberto Trindade Tavares, Marcelo Iury S. Oliveira, Bernadette Farias Lóscio. 980-985 [doi]
- ClusMAM: fast and effective unsupervised clustering of large complex datasets using metric access methodsJéssica Andressa de Souza, Mirela T. Cazzolato, Agma J. M. Traina. 986-991 [doi]
- OLAP analysis of multidimensional tweet streams for supporting advanced analyticsAlfredo Cuzzocrea, Carmen De Maio, Giuseppe Fenza, Vincenzo Loia, Mimmo Parente. 992-999 [doi]
- Optimizing hash partitioning for solid state drivesMincheol Shin, Hongchan Roh, Wonmook Jung, Sanghyun Park. 1000-1007 [doi]
- Converting spatiotemporal data among multiple granularity systemsMuhao Chen, Shi Gao, Jingheng Zhou, X. Sean Wang. 1008-1010 [doi]
- A methodology for estimating execution times of IO traces in SSDs: student research abstractYoonsuk Kang. 1011-1012 [doi]
- SPARQL extensions with preferences: a surveyOlivier Pivert, Olfa Slama, Virginie Thion. 1015-1020 [doi]
- Modeling clicks using document popularityXenophon Evangelopoulos, Christos Makris. 1021-1026 [doi]
- Feeling lucky?: multi-armed bandits for ordering judgements in pooling-based evaluationDavid E. Losada, Javier Parapar, Alvaro Barreiro. 1027-1034 [doi]
- Direct measurement of training query quality for learning to rankQingli Ma, Ben He, Jungang Xu. 1035-1040 [doi]
- Aggregating semantic information nuggets for answering clinical queriesEya Znaidi, Lynda Tamine, Chiraz Latiri. 1041-1047 [doi]
- IT company atlas upper Franconia: a practical application of expert search techniquesDaniel Blank, Sebastian Boosz, Andreas Henrich. 1048-1053 [doi]
- Proximity relevance model for query expansionLiana Ermakova, Josiane Mothe, Elena Nikitina. 1054-1059 [doi]
- Modeling trust and distrust information in recommender systems via joint matrix factorization with signed graphsDimitrios Rafailidis. 1060-1065 [doi]
- How do users handle inconsistent information?: the effect of search expertiseKazutoshi Umemoto, Takehiro Yamamoto, Katsumi Tanaka. 1066-1071 [doi]
- Leveraging MPEG-21 user description for interoperable recommender systemsSabino Metta, Paolo Casagranda, Alberto Messina, Maurizio Montagnuolo, Francesco Russo. 1072-1074 [doi]
- ADORES: a diversity-oriented online recommender systemMax Chevalier, Damien Dudognon, Josiane Mothe. 1075-1076 [doi]
- Opinion retrieval in Twitter using stylistic variationsAnastasia Giachanou, Fabio Crestani. 1077-1079 [doi]
- Exploiting different users' interactions for profiles enrichment in recommender systemsArthur F. Da Costa, Rafael D. Martins, Marcelo G. Manzato, Ricardo J. G. B. Campello. 1080-1082 [doi]
- Towards spreadsheet integration using entity identification driven by a spatial-temporal modelRamoza Ahsan, Rodica Neamtu, Elke A. Rundensteiner. 1083-1085 [doi]
- A community detection technique for research collaboration networks based on frequent collaborators coresMilos Savic, Mirjana Ivanovic, Bojana Dimic Surla. 1090-1095 [doi]
- Estimating topical volume in social media streamsPraveen Bommannavar, Jimmy J. Lin, Anand Rajaraman. 1096-1101 [doi]
- SimRank and its variants in academic literature data: measures and evaluationMasoud Reyhani Hamedani, Sang-Wook Kim. 1102-1107 [doi]
- Pick the right team and make a blockbuster: a social analysis through movie historyWladston Viana, Ana Paula Couto da Silva, Mirella M. Moro. 1108-1114 [doi]
- The anatomy of online deception: what makes automated text convincing?Richard M. Everett, Jason R. C. Nurse, Arnau Erola. 1115-1120 [doi]
- Personalized time-aware outdoor activity recommendation systemShakiba Rahimiaghdam, Pinar Karagoz, Alev Mutlu. 1121-1126 [doi]
- From discussion to wisdom: web resource recommendation for hyperlinks in stack overflowJing Li, Zhenchang Xing, Deheng Ye, Xuejiao Zhao. 1127-1133 [doi]
- Clique covering of large real-world networksAlessio Conte, Roberto Grossi, Andrea Marino. 1134-1139 [doi]
- An evaluation of machine translation for multilingual sentence-level sentiment analysisMatheus Araújo, Júlio Cesar dos Reis, Adriano M. Pereira, Fabrício Benevenuto. 1140-1145 [doi]
- Opinion retrieval in Twitter: is proximity effective?Anastasia Giachanou, Fabio Crestani. 1146-1151 [doi]
- Inferring semantic interest profiles from Twitter followees: does Twitter know better than your friends?Christoph Besel, Jörg Schlötterer, Michael Granitzer. 1152-1157 [doi]
- On the combination of "off-the-shelf" sentiment analysis methodsPollyanna Gonçalves, Daniel Hasan Dalip, Helen Costa, Marcos André Gonçalves, Fabrício Benevenuto. 1158-1165 [doi]
- Communication overload management through social interactions clusteringJuan Antonio Lossio Ventura, Hakim Hacid, Mathieu Roche, Pascal Poncelet. 1166-1169 [doi]
- Dynamic mapping of dense geo-tweets and web pages based on spatio-temporal analysisYuanyuan Wang, Goki Yasui, Yukiko Kawai, Toyokazu Akiyama, Kazutoshi Sumiya, Yoshiharu Ishikawa. 1170-1173 [doi]
- Improving classification of tweets using word-word co-occurrence information from a large external corpusHugo Lewi Hammer, Anis Yazidi, Aleksander Bai, Paal E. Engelstad. 1174-1177 [doi]
- Enhanced community detection in social networks using active spectral clusteringSarah Habashi, Nagia M. Ghanem, Mohamed A. Ismail. 1178-1181 [doi]
- News recommendation based on tweets for understanding of opinion variation and eventsDouglas Rehem, Jonice Oliveira, Tiago França, Walkir Brito, Claudia Lage Rebello da Motta. 1182-1185 [doi]
- Impact of offline events on online link creation: a case study on events advertised on FacebookAzadeh Esfandyari, Matteo Zignani, Sabrina Gaito, Gian Paolo Rossi 0001. 1186-1188 [doi]
- Analyzing the effect of brand building activities on brand image using topic modeling techniques: student research abstractKapil Kaushik. 1189-1190 [doi]
- On security level usage in context-aware role-based access controlMichal Trnka, Tomás Cerný. 1192-1195 [doi]
- Automated development of constraint-driven web applicationsMario Luca Bernardi, Marta Cimitile, Fabrizio Maria Maggi. 1196-1203 [doi]
- Dynamically reconfigurable trust policies for untrustworthy third-party componentsKiev Gama, Didier Donsez. 1204-1209 [doi]
- Method for decomposition of monolithic enterprise applicationsSolvita Berzisa, Inese Polaka, Inese Supulniece, Janis Grabis, Edgars Ozolins, Egils Meiers. 1210-1213 [doi]
- Goal achievement analysis based on LTL checking and decision tree for improvements of PAISHiroki Horita, Hideaki Hirayama, Yasuyuki Tahara, Akihiko Ohsuga. 1214-1218 [doi]
- An operational semantics of cache coherent multicore architecturesShiji Bijo, Einar Broch Johnsen, Ka-I Pun, Silvia Lizeth Tapia Tarifa. 1219-1224 [doi]
- A GPU-based implementation for the gamma multiset rewriting paradigmRubens H. P. de Almeida, Rui R. Mello Junior, Gabriel Antoine Louis Paillard, Felipe M. G. França. 1225-1230 [doi]
- SOMA: an OpenMP toolchain for multicore partitioningEmanuele Ruffaldi, Filippo Brizzi, Giacomo Dabisias, Giorgio C. Buttazzo. 1231-1237 [doi]
- On verifying C++ programs with probabilitiesJiri Barnat, Ivana Cerná, Petr Rockai, Vladimír Still, Kristína Zákopcanová. 1238-1243 [doi]
- A high-level and scalable approach for generating scale-free graphs using active objectsKeyvan Azadbakht, Nikolaos Bezirgiannis, Frank S. de Boer, Sadegh Aliakbary. 1244-1250 [doi]
- Fast error detection with hybrid analyses of future accessesPavel Parízek. 1251-1254 [doi]
- Scalable quantum simulation by reductions and decompositions through the Id-operatorAnderson Braga de Avila, Renata Hax Sander Reiser, Adenauer Corrêa Yamin, Maurício Lima Pilla. 1255-1257 [doi]
- Understanding how power influences business and requirements decisions in software ecosystemsGeorge Valença, Carina Frota Alves. 1258-1263 [doi]
- Retrospective, relevance, and trends of SAC requirements engineering trackJéssyka Vilela, Enyo Gonçalves, Ana Holanda, Bruno Figueiredo, Jaelson Castro. 1264-1269 [doi]
- Usability of requirements techniques: a systematic literature reviewDenise Bombonatti, Catarina Gralha, Ana Moreira, João Araújo 0001, Miguel Goulão. 1270-1275 [doi]
- Eliciting accessibility requirements an approach based on the NFR frameworkRomeu Oliveira, Lyrene Fernandes da Silva, Julio Cesar Sampaio P. Leite, Ana Moreira. 1276-1281 [doi]
- Collaborative requirements elicitation in a european research projectGuglielmo De Angelis, Alessio Ferrari, Stefania Gnesi, Andrea Polini. 1282-1289 [doi]
- Impacts of agile requirements documentation debt on software projects: a retrospective studyThiago Souto Mendes, Mário André De Freitas Farias, Manoel G. Mendonça, Henrique Frota Soares, Marcos Kalinowski, Rodrigo Oliveira Spínola. 1290-1295 [doi]
- Quality-centric feature model configuration using goal modelsMahdi Noorian, Ebrahim Bagheri, Weichang Du. 1296-1299 [doi]
- ArchFeature: integrating features into product line architectureGharib Gharibi, Yongjie Zheng. 1302-1308 [doi]
- Exploring the combination of software visualization and data clustering in the software architecture recovery processRenato Paiva, Genaína Nunes Rodrigues, Rodrigo Bonifácio, Marcelo Ladeira. 1309-1314 [doi]
- SAMSON: self-adaptive middleware for wireless sensor networksJesús M. T. Portocarrero, Flávia Coimbra Delicato, Paulo F. Pires, Taniro Chacon Rodrigues, Thaís Vasconcelos Batista. 1315-1322 [doi]
- Case-based reasoning and knowledge-graph based metamodel for runtime adaptive architectural modelingMarina Mongiello, Tommaso Di Noia, Francesco Nocera, Eugenio Di Sciascio. 1323-1328 [doi]
- Squirrel: architecture driven resource managementInti Y. Gonzalez-Herrera, Johann Bourcier, Walter Rudametkin, Olivier Barais, François Fouquet. 1329-1336 [doi]
- Deepening the separation of concerns in the implementation of multimedia systemsMárcio Ferreira Moreno, Rodrigo Costa Mesquita Santos, Guilherme Augusto Ferreira Lima, Marcelo Ferreira Moreno, Luiz Fernando Gomes Soares. 1337-1343 [doi]
- Towards a (de)composable workflow architecture to define data collection policiesCyril Cecchinel, Sébastien Mosser, Philippe Collet. 1344-1346 [doi]
- Tool support for evaluating architectural debt of an existing system: an experience reportFrancesca Arcelli Fontana, Riccardo Roveda, Marco Zanoni. 1347-1349 [doi]
- From product architectures to a managed automotive software product line architectureBenjamin Cool, Christoph Knieke, Andreas Rausch, Mirco Schindler, Arthur Strasser, Martin Vogel, Oliver Brox, Stefanie Jauns-Seyfried. 1350-1353 [doi]
- A taxonomy for architectural stabilityMaria Salama, Rami Bahsoon. 1354-1357 [doi]
- Decoupled concurrency: a self-adaptive software architecture for programming multicoresTai Nguyen, Xinghui Zhao. 1358-1360 [doi]
- Fuzzy ontology-driven web-based framework for supporting architectural design: student research abstractFrancesco Nocera. 1361-1362 [doi]
- Toward improving ability to repair bugs automatically: a patch candidate location mechanism using code similarityHaruki Yokoyama, Yoshiki Higo, Keisuke Hotta, Takafumi Ohta, Kozo Okano, Shinji Kusumoto. 1364-1370 [doi]
- BPMiner: mining developers' behavior patterns from screen-captured task videosJing Li, Lingfeng Bao, Zhenchang Xing, Xinyu Wang, Bo Zhou. 1371-1377 [doi]
- Software-specific part-of-speech tagging: an experimental study on stack overflowDeheng Ye, Zhenchang Xing, Jing Li, Nachiket Kapre. 1378-1385 [doi]
- Automated memory leak fixing on value-flow slices for C programsHua Yan, Yulei Sui, Shiping Chen, Jingling Xue. 1386-1393 [doi]
- Checking linearizability with fine-grained tracesZhenyue Long, Yu Zhang. 1394-1400 [doi]
- Optimization of feature interactions for automotive combustion enginesDominik Wagner, Hermann Kaindl, Sven Dominka, Michael Dübner. 1401-1406 [doi]
- A methodology towards the adaptization of legacy systems using agent-oriented software engineeringFrancois Wavresky, Seok-Won Lee. 1407-1414 [doi]
- Evaluating and comparing complexity, coupling and a new proposed set of coupling metrics in cross-project vulnerability predictionSara Moshtari, Ashkan Sami. 1415-1421 [doi]
- Students' and professionals' perceptions of test-driven development: a focus group studyGiuseppe Scanniello, Simone Romano 0001, Davide Fucci, Burak Turhan, Natalia Juristo. 1422-1427 [doi]
- Simple function points for effort estimation: a further assessmentFilomena Ferrucci, Carmine Gravino, Luigi Lavazza. 1428-1433 [doi]
- An empirical study on the effect of programming languages on productivityLuigi Lavazza, Sandro Morasca, Davide Tosi. 1434-1439 [doi]
- Automated procedure clustering for reverse engineering PL/SQL programsMetin Altinisik, Hasan Sözer. 1440-1445 [doi]
- EMF-REST: generation of RESTful APIs from modelsHamza Ed-Douibi, Javier Luis Cánovas Izquierdo, Abel Gómez, Massimo Tisi, Jordi Cabot. 1446-1453 [doi]
- Software testing in a scientific research groupMatthew Patrick, James Elderfield, Richard O. J. H. Stutt, Andrew Rice, Christopher A. Gilligan. 1454-1459 [doi]
- Towards a generic framework for automating extensive analysis of Android applicationsLi Li 0029, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon. 1460-1465 [doi]
- Similarity management of 'cloned and owned' variantsThomas Schmorleiz, Ralf Lämmel. 1466-1471 [doi]
- A systematic mapping study on mining software repositoriesMário André De Freitas Farias, Renato Lima Novais, Methanias Colaço Júnior, Luis Paulo da Silva Carvalho, Manoel G. Mendonça, Rodrigo Oliveira Spínola. 1472-1479 [doi]
- Architectural clones: toward tactical code reuseDaniel E. Krutz, Mehdi Mirakhorli. 1480-1485 [doi]
- A meta-learning framework for algorithm recommendation in software fault predictionSilvia N. das Dôres, Luciano Alves, Duncan D. Ruiz, Rodrigo C. Barros. 1486-1491 [doi]
- Improving the quality of code snippets in stack overflowMohammadReza Tavakoli, Abbas Heydarnoori, Mohammad Ghafari. 1492-1497 [doi]
- Reverse engineering: a European IPR perspectivePaolo Ciancarini, Daniel Russo, Alberto Sillitti, Giancarlo Succi. 1498-1503 [doi]
- Integrating feature-based implementation approaches using a common graph-based representationBenjamin Behringer, Steffen Rothkugel. 1504-1511 [doi]
- Is code cloning in games really different?Farouq Al-Omari, Chanchal K. Roy. 1512-1519 [doi]
- Integrated analysis of exception flows and handler actions in Java libraries: an empirical studyDemóstenes Sena, Roberta Coelho, Uirá Kulesza. 1520-1526 [doi]
- Model-based replay testing for event-driven softwareShakaiba Majeed, Minsoo Ryu. 1527-1533 [doi]
- Characterizing non-deadlock concurrency bug fixes in open-source Java programsMisun Yu, Yu-Seung Ma, Doo-Hwan Bae. 1534-1537 [doi]
- A graph-based approach to detect unreachable methods in Java softwareSimone Romano 0001, Giuseppe Scanniello, Carlo Sartiani, Michele Risi. 1538-1541 [doi]
- Automatic formal specification generation of APIs by mining unit testsOtmar M. Pereira Jr., Wladmir C. Brandão, Mark Alan Junho Song. 1542-1545 [doi]
- Consistency checks of design specifications against requirements using graph-based linguistic analysisKai Niklas, Stefan Gärtner, Kurt Schneider. 1546-1549 [doi]
- Empirical investigation of fault predictors in context of class membership probability estimationShahid Hussain, Arif Ali Khan, Kwabena Ebo Bennin. 1550-1553 [doi]
- A review and comparison of methods for determining the best analogies in analogy-based software effort estimationBodin Chinthanet, Passakorn Phannachitta, Yasutaka Kamei, Pattara Leelaprute, Arnon Rungsawang, Naoyasu Ubayashi, Ken-ichi Matsumoto. 1554-1557 [doi]
- Evaluating the use of a general-purpose benchmark suite for domain-specific SMT-solvingAndrew Healy, Rosemary Monahan, James F. Power. 1558-1561 [doi]
- A formal modeling and analysis framework for software product line of preemptive real-time systemsJin Hyun Kim, Axel Legay, Louis-Marie Traonouez, Mathieu Acher, Sungwon Kang. 1562-1565 [doi]
- Testability and software performance: a systematic mapping studyMohammad Mahdi Hassan, Wasif Afzal, Birgitta Lindström, Syed Muhammad Ali Shah, Sten F. Andler, Martin Blom. 1566-1569 [doi]
- Detecting indirect conflicts between access control policiesLaura Costa Sarkis, Viviane Torres da Silva, Christiano Braga. 1570-1572 [doi]
- Deriving UML-based specifications of inter-component interactions from runtime testsThorsten Haendler, Stefan Sobernig, Mark Strembeck. 1573-1575 [doi]
- A representation structure for software process tailoring based on BPMN high-level operationsRaquel M. Pillat, Toacy C. Oliveira. 1576-1579 [doi]
- A framework for assisting software process improvement program in global software development: student research abstractArif Ali Khan. 1580-1581 [doi]
- Introspection of the virtual machines with system calls monitoring: student research abstractNatalia Fursova. 1582-1583 [doi]
- Threshold analysis of design metrics to detect design flaws: student research abstractShahid Hussain. 1584-1585 [doi]
- MDE as service, overview and research progress: student research abstractFabio Paulo Basso. 1586-1587 [doi]
- Improving QoS delivered by WS-BPEL scenario adaptation through service execution parallelizationDionisis Margaris, Costas Vassilakis, Panagiotis Georgiadis. 1590-1596 [doi]
- QoS-aware adaptation for complex event serviceFeng Gao, Muhammad Intizar Ali, Edward Curry, Alessandra Mileo. 1597-1604 [doi]
- Service functional testing automation with intelligent scheduling and planningLom-Messan Hillah, Ariele-Paolo Maesano, Libero Maesano, Fabio De Rosa, Fabrice Kordon, Pierre-Henri Wuillemin. 1605-1610 [doi]
- JxActinium: a runtime manager for secure REST-ful CoAP applications working over JXTAFilippo Battaglia, Giancarlo Iannizzotto, Lucia Lo Bello. 1611-1618 [doi]
- Dead variable analysis for multi-threaded heap manipulating programsPavel Jancík, Jan Kofron. 1620-1627 [doi]
- Predictive runtime enforcementSrinivas Pinisetty, Viorel Preoteasa, Stavros Tripakis, Thierry Jéron, Yliès Falcone, Hervé Marchand. 1628-1633 [doi]
- Time optimal reachability analysis using swarm verificationZhengkui Zhang, Brian Nielsen, Kim G. Larsen. 1634-1640 [doi]
- Testing access control policies against intended access rightsAntonia Bertolino, Said Daoudagh, Francesca Lonetti, Eda Marchetti. 1641-1647 [doi]
- Verifying CUDA programs using SMT-based context-bounded model checkingPhillipe Pereira, Higo Albuquerque, Hendrio Marques, Isabela Silva, Celso Carvalho, Lucas C. Cordeiro, Vanessa Santos, Ricardo Ferreira. 1648-1653 [doi]
- Reducing locating sequences for testing from finite state machinesGuy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün. 1654-1659 [doi]
- Performance testing modeling: an empirical evaluation of DSL and UML-based approachesMaicon Bernardino, Elder de M. Rodrigues, Avelino F. Zorzo. 1660-1665 [doi]
- How bit-vector logic can help improve the verification of LTL specifications over infinite domainsLuciano Baresi, Mohammad Mehdi Pourhashem Kallehbasti, Matteo Rossi. 1666-1673 [doi]
- Termination analysis of floating-point programs using parameterizable rational approximationsFonenantsoa Maurica, Frédéric Mesnard, Étienne Payet. 1674-1679 [doi]
- Some classes of finite state machines with polynomial length of distinguishing test casesHüsnü Yenigün, Nina Yevtushenko, Natalia Kushik. 1680-1685 [doi]
- Session types for communicating systems in event-BCarlos Olarte, Camilo Rueda. 1686-1693 [doi]
- Invariant generation for linearizability proofsGraeme Smith, John Derrick. 1694-1699 [doi]
- Formal modeling and analysis of RAMP transaction systemsSi Liu, Peter Csaba Ölveczky, Muntasir Raihan Rahman, Jatin Ganhotra, Indranil Gupta, José Meseguer. 1700-1707 [doi]
- Towards a combinatorial approach for undiscounted MDPs: student research abstractVahid Hashemi. 1708-1709 [doi]
- Balanced loop retiming to effectively architect STT-RAM-based hybrid cache for VLIW processorsKeni Qiu, Weigong Zhang, Xiaoqiang Wu, Xiaoyan Zhu, Jing Wang, Yuanchao Xu, Chun Jason Xue. 1710-1716 [doi]
- Co-Cap: energy-efficient cooperative CPU-GPU frequency capping for mobile gamesJurn-Gyu Park, Chen-Ying Hsieh, Nikil D. Dutt, Sung-Soo Lim. 1717-1723 [doi]
- ARTE: arduino real-time extension for programming multitasking applicationsPasquale Buonocunto, Alessandro Biondi, Marco Pagani, Mauro Marinoni, Giorgio C. Buttazzo. 1724-1731 [doi]
- A low power STT-RAM based register file for GPGPUsEhsan Atoofian. 1732-1738 [doi]
- Static energy efficient cache reconfiguration for dynamic NUCA in tiled CMPsShounak Chakraborty, Shirshendu Das, Hemangee K. Kapoor. 1739-1744 [doi]
- Dynamic associativity enabled DNUCA to improve block localisation in tiled CMPsShirshendu Das, Hemangee K. Kapoor. 1745-1750 [doi]
- Probabilistic analysis of bufferless pipelines of real-time tasksLuca Abeni, Daniele Fontanelli, Luigi Palopoli, Bernardo Villalba Frias. 1751-1758 [doi]
- FIDE: an FMI integrated development environmentFabio Cremona, Marten Lohstroh, Stavros Tripakis, Christopher X. Brooks, Edward A. Lee. 1759-1766 [doi]
- Scheduling algorithm considering response time for mixed tasks on multiprocessor systemsChin-Fu Kuo, Yu-Hao Huang, Yung-Feng Lu, Shih-Chun Chou. 1767-1770 [doi]
- Combined data caching and delayed parity update in RAID with SSD cacheSophal Minh, Donghee Lee. 1771-1773 [doi]
- Parity management scheme for a hybrid-storage RAIDJen-Wei Hsieh, Che-Jen Su. 1774-1776 [doi]
- Safety analysis generation from prototyping models for transportation systemsJean Godot, Sébastien Saudrais, Adil Alif, Bertrand Barbedette, Chérif Larouci. 1777-1779 [doi]
- Software for embedded systems: a quality assessment based on improved ODC taxonomyNuno Silva, Marco Vieira. 1780-1783 [doi]
- Structured gotos are (Slightly) harmfulEli Sennesh, Yossi Gil. 1784-1789 [doi]
- Embedding goal-directed evaluation through transformationPeter Mills, Clinton Jeffery. 1790-1797 [doi]
- Optimizing record data structures in RacketTobias Pape, Vasily Kirilichev, Robert Hirschfeld. 1798-1805 [doi]
- From atomic variables to data-centric concurrency controlHervé Paulino, Daniel Parreira, Nuno Delgado, António Ravara, Ana Gualdina Almeida Matos. 1806-1811 [doi]
- On the criteria for prioritizing code anomalies to identify architectural problemsSantiago A. Vidal, Everton T. Guimarães, Willian Nalepa Oizumi, Alessandro F. Garcia, Jorge Andrés Díaz Pace, Claudia Marcos. 1812-1814 [doi]
- Using field access frequency to optimize layout of objects in the JVMTaees Eimouri, Kenneth B. Kent, Aleksandar Micic, Karl Taylor. 1815-1818 [doi]
- Initialize-and-catchPaola Giannini, Marco Servetto, Elena Zucca. 1819-1822 [doi]
- i-RAID: a novel redundant storage architecture for improving reliability, performance, and life-span of solid-state disk systemsMingyang Wang, Yiming Hu. 1824-1831 [doi]
- mmapcopy: efficient memory footprint reduction using application knowledgeIngo Korb, Helena Kotthaus, Peter Marwedel. 1832-1837 [doi]
- OS-level virtualization for industrial automation systems: are we there yet?Alexandru Moga, Thanikesavan Sivanthi, Carsten Franke. 1838-1843 [doi]
- Load-aware scheduling for heterogeneous multi-core systemsMohannad Nabelsee, Anselm Busse, Helge Parzyjegla, Gero Mühl. 1844-1851 [doi]
- Improving I/O performance of NVMe SSD on virtual machinesJungkil Kim, Sungyong Ahn, Kwanghyun La, Wooseok Chang. 1852-1857 [doi]
- Testing device drivers against hardware failures in real environmentsSatoru Takekoshi, Takahiro Shinagawa, Kazuhiko Kato. 1858-1864 [doi]
- Collaborative processing of data-intensive algorithms with CPU, intelligent SSD, and GPUYong-Yeon Jo, Sungwoo Cho, Sang-Wook Kim, Hyunok Oh. 1865-1870 [doi]
- Analysis of micro-architecture resources interference on multicore NUMA systemsHaecheon Kim, Seungmin Lim, Junkee Yoon, Seungjae Baek, Jongmoo Choi, Seong-e Cho. 1871-1876 [doi]
- Multicore CPU reclaiming: parallel or sequential?Luca Abeni, Giuseppe Lipari, Andrea Parri, Youcheng Sun. 1877-1884 [doi]
- Plate: persistent memory management for nonvolatile main memoryToshihiro Yamauchi, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi. 1885-1892 [doi]
- zf-FTL: a zero-free flash translation layerDongwook Kim, Sooyong Kang. 1893-1896 [doi]
- Virtual machine scheduling based on task characteristicTaegyu Hwang, Kisu Kim, Jeonghwan Lee, Jiman Hong, Dongwan Shin. 1897-1899 [doi]
- NKE: an embedded nanokernel for educational purposeCelso M. da Costa, Cassio Brasil, Leonardo L. Silva, Lucas Murliky, João Leonardo Fragoso, Guilherme Debom, Rivalino Matias, Aline Fracalossi, Margrit Reni Krug. 1900-1902 [doi]
- Virtual machine haltSimão Reis, André Zúquete, José M. N. Vieira. 1903-1905 [doi]
- Transforming JavaScript event-loop into a pipelineEtienne Brodu, Stéphane Frénot, Frédéric Oblé. 1906-1911 [doi]
- Distributed graph processing: an approach based on overlay compositionEmanuele Carlini, Patrizio Dazzi, Alessandro Lulli, Laura Ricci. 1912-1917 [doi]
- Sharing memory in modern distributed applicationsClaudio Scordino, Bruno Morelli. 1918-1921 [doi]
- Derivation of parallel-efficient structural recursive functions from declarative graph queriesChong Li, Le-Duc Tung, Xiaodong Meng, Zhenjiang Hu. 1922-1925 [doi]
- Using CSP for coordinating undo-based collaborative applicationsAsma Cherif, Abdessamad Imine. 1928-1935 [doi]
- Integrating lua into C for embedding lua interpreters in a C applicationAkira Tanimura, Hideya Iwasaki. 1936-1943 [doi]
- A performant scheme interpreter in asm.jsNoah Van Es, Jens Nicolay, Quentin Stievenart, Theo D'Hondt, Coen De Roover. 1944-1951 [doi]
- Stella: a python-based domain-specific language for simulationsDavid Mohr, Darko Stefanovic. 1952-1959 [doi]
- A parsing machine for parsing expression grammars with labeled failuresSérgio Medeiros, Fabio Mascarenhas. 1960-1967 [doi]
- Wodel: a domain-specific language for model mutationPablo Gómez-Abajo, Esther Guerra, Juan de Lara. 1968-1973 [doi]
- Integrating regular expressions and SNOBOL patterns into string scanning: a unifying approachClinton Jeffery, Phillip Thomas, Sudarshan Gaikaiwari, John Goettsche. 1974-1979 [doi]
- An embedded domain specific language for distributed memory transactions in JavaJerônimo da Cunha Ramos, André Rauber Du Bois, Maurício Lima Pilla. 1980-1985 [doi]
- An object model for a dynamic mixin based languageEden Burton, Emil Sekerinski. 1986-1992 [doi]
- Automated adaptation via quantitative partial model checkingStefano Bistarelli, Francesco Santini, Fabio Martinelli, Ilaria Matteucci. 1993-1996 [doi]
- Principles for reuse in formal language toolsLuís Diogo Couto, Peter Würtz Vinther Tran-Jørgensen, Kenneth Lausdahl. 1997-2000 [doi]
- Maintainability of functional reactive programs in a telecom server softwareKlervie Toczé, Maria Vasilevskaya, Patrik Sandahl, Simin Nadjm-Tehrani. 2001-2003 [doi]
- Futex based locks for C11's generic atomicsJens Gustedt. 2004-2006 [doi]
- A DSL for executable 'how to' manualsMarcel Heinz, Philipp Helsper, Ralf Lämmel, Tobias M. Schmidt. 2007-2009 [doi]
- Extensible modules for JavaScriptFlorent Marchand de Kerchove, Jacques Noyé, Mario Südholt. 2010-2012 [doi]
- Scalable monitoring and dependable job scheduling support for multi-domain grid infrastructuresMarcello Cinque, Antonio Corradi, Luca Foschini, Flavio Frattini, Javier Povedano-Molina. 2015-2020 [doi]
- Exploiting user feedback for online filtering in event-based systemsFabio Petroni, Leonardo Querzoni, Roberto Beraldi, Mario Paolucci. 2021-2026 [doi]
- Adjusting middleware knobs to suit CPS domainsMarisol García-Valls, Cristian Calva-Urrego, Alejandro Alonso, Juan Antonio de la Puente. 2027-2030 [doi]
- Slick: an intrusion detection system for virtualized storage devicesAndrei Bacs, Cristiano Giuffrida, Bernhard Grill, Herbert Bos. 2033-2040 [doi]
- Implementing a secure abstract machineAdriaan Larmuseau, Marco Patrignani, Dave Clarke. 2041-2048 [doi]
- Enhancing Android permission through usage control: a BYOD use-caseFabio Martinelli, Paolo Mori, Andrea Saracino. 2049-2056 [doi]
- Out-of-band discovery and evaluation for tor hidden servicesKang Li, Peipeng Liu, Qingfeng Tan, Jinqiao Shi, Yue Gao, Xuebin Wang. 2057-2062 [doi]
- Reading between the fields: practical, effective intrusion detection for industrial control systemsÖmer Yüksel, Jerry den Hartog, Sandro Etalle. 2063-2070 [doi]
- Implementation-level analysis of the JavaScript helios voting clientMichael Backes 0001, Christian Hammer 0001, David Pfaff, Malte Skoruppa. 2071-2078 [doi]
- Accurate spear phishing campaign attribution and early detectionYufei Han, Yun Shen. 2079-2086 [doi]
- MalFlow: identification of C&C servers through host-based data flow profilingTobias Wüchner, Martín Ochoa, Mojdeh Golagha, Gaurav Srivastava, Thomas Schreck, Alexander Pretschner. 2087-2094 [doi]
- An automated approach for testing the security of web applications against chained attacksAlberto Calvi, Luca Viganò. 2095-2102 [doi]
- Ensuring endpoint authenticity in WebRTC peer-to-peer communicationWillem De Groef, Deepak Subramanian, Martin Johns, Frank Piessens, Lieven Desmet. 2103-2110 [doi]
- A 3D-cellular automata based pseudo-random number generator: student research abstractRosemary Koikara. 2111-2112 [doi]
- Sensor network based solar forecasting using a local vector autoregressive ridge frameworkJin Xu, Shinjae Yoo, John Heiser, Paul Kalb. 2113-2118 [doi]
- Near real-time electric load approximation in low voltage cables of smart grids with models@run.timeThomas Hartmann 0001, Assaad Moawad, François Fouquet, Yves Reckinger, Jacques Klein, Yves Le Traon. 2119-2126 [doi]
- Tailor your curves after your costume: supply-following demand in smart grids through the adwords problemGiorgos Georgiadis, Iosif Salem, Marina Papatriantafilou. 2127-2134 [doi]
- BayesForSG: a bayesian model for forecasting thermal load in smart gridsRohan Nanda, Saguna, Karan Mitra, Christer Åhlund. 2135-2141 [doi]
- Cascading attacks against smart grid using control command disaggregation and servicesByungho Min, Vijay Varadharajan. 2142-2147 [doi]
- Real-world user flexibility of energy consumption: two-stage generative model constructionNasrin Sadeghianpourhamami, Matthias Strobbe, Chris Develder. 2148-2153 [doi]
- Solving the environmental economic dispatch problem with prohibited operating zones in microgrids using NSGA-II and TOPSISMarco Cococcioni, Beatrice Lazzerini, Francesco Marcelloni, Francesco Pistolesi. 2154-2157 [doi]
- Evaluation of smart scheduling technologies: static versus dynamic approachesShaza Hanif, Shahab Ud Din. 2159-2164 [doi]
- Experimental approach: two-stage spectrum sensing using gnu radio and usrp to detect primary user's signalYanxiao Zhao, Jems Pradhan, Guodong Wang, Jun Huang. 2165-2170 [doi]
- Optimized multilayer perceptron using dynamic learning rate based microwave tomography breast cancer screeningChulwoo Pack, Sung Y. Shin, Hyung Do Choi, Soon-Ik Jeon, John Kim. 2171-2175 [doi]
- Similarity measurement with combination of mesh distance fourier transform and global features in 2D binary imageRavi Kasaudhan, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son. 2176-2181 [doi]
- An efficient Hadoop data replication method design for heterogeneous clustersDaeshin Park, Kiwook Kang, Jiman Hong, Yookun Cho. 2182-2184 [doi]
- Delay-based scheduling to enhance fairness in a virtual machine environmentDonghee Min, Seonguk Lee, Gibeom Byeon, Jiman Hong. 2185-2187 [doi]
- Defining measurements for analyzing information security risk reports in the telecommunications sectorYves Le Bray, Nicolas Mayer, Jocelyn Aubert. 2189-2194 [doi]
- Solving sybil attacks using evolutionary game theoryFarah Saab, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab. 2195-2201 [doi]
- Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access controlJingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma. 2202-2209 [doi]