Abstract is missing.
- Mining string patterns for individuating reading pathologiesFabio Fassetti, Ilaria Fassetti. 1-5 [doi]
- Discovering, selecting and exploiting feature sequence records of study participants for the classification of epidemiological data on hepatic steatosisTommy Hielscher, Henry Völzke, Panagiotis Papapetrou, Myra Spiliopoulou. 6-13 [doi]
- A parallel framework for HCC detection in DCE-MRI sequences with wavelet-based description and SVM classificationAna Luiza Menegatti Pavan, Marwa Benabdallah, Marie-Ange Lèbre, Diana Rodrigues de Pina, Faouzi Jaziri, Antoine Vacavant, Achraf Mtibaa, Hawa Mohamed Ali, Manuel Grand-brochier, Hugo Rositi, Benoît Magnin, Armand Abergel, Pascal Chabrot. 14-21 [doi]
- 3D medical objects processing and retrieval using spherical harmonics: a case study with congestive heart failure MRI examsLeila Cristina Carneiro Bergamasco, Carlos E. Rochitte, Fátima L. S. Nunes. 22-29 [doi]
- An adaptive neuro-fuzzy inference system for improving data quality in disease registriesHatem Bellaaj, Afef Mdhaffar, Mohamed Jmaiel, Sondes Hdiji Mseddi, Bernd Freisleben. 30-33 [doi]
- Deep metric learning for multi-labelled radiographsMauro Annarumma, Giovanni Montana. 34-37 [doi]
- A tf-idf based topic model for identifying lncRNAs from genomic backgroundManu Madhavan, G. Gopakumar. 40-46 [doi]
- A multi-criteria decision making approach for predicting cancer cell sensitivity to drugsSalma Daoud, Afef Mdhaffar, Bernd Freisleben, Mohamed Jmaiel. 47-53 [doi]
- Interpretable CNV-based tumour classification using fuzzy rule based classifiersMattia Ricatto, Marco Barsacchi, Alessio Bechini. 54-59 [doi]
- How to compute protein residue contacts more accurately?Pedro M. Martins, Vinícius D. Mayrink, Sabrina de Azevedo Silveira, Carlos Henrique da Silveira, Leonardo H. F. de Lima, Raquel Cardoso de Melo Minardi. 60-67 [doi]
- Evaluation of inductive and transductive inference in the context of translation initiation siteWallison W. Guimarães, Cristiano Lacerda Nunes Pinto, Cristiane Neri Nobre, Luis E. Zárate. 68-71 [doi]
- Estimating the impacts of HIV intervention programs among females who sell sex in Nigeria: a modelling approach: student research abstractSampson Akwafuo. 72-73 [doi]
- Simulation study of transient receptor potential current in urinary bladder over activity: student research abstractChitaranjan Mahapatra. 74-75 [doi]
- Ordering stakeholder viewpoint concerns for holistic enterprise architecture: the W6H frameworkMujahid Sultan, Andriy V. Miranskyy. 78-85 [doi]
- Similarity resonance for improving process model matching accuracyNour Assy, Boudewijn F. van Dongen, Wil M. P. van der Aalst. 86-93 [doi]
- Verifying BPMN understandability with novice business managersVanessa Mendoza, Denis Silva da Silveira, Maria Luiza Albuquerque, João Araújo 0001. 94-101 [doi]
- Using enterprise architecture model analysis and description logics for maturity assessmentDiogo Proença, José Luis Borbinha. 102-109 [doi]
- Conceptual modeling of inter-dependencies between processes and dataCarlo Combi, Barbara Oliboni, Mathias Weske, Francesca Zerbato. 110-119 [doi]
- Automated analysis of industrial workflow-based modelsMario Cortes Cornax, Ajay Krishna, Adrian Mos, Gwen Salaün. 120-127 [doi]
- Dynamic high-level requirements in self-adaptive systemsDavide Rossi, Francesco Poggi, Paolo Ciancarini. 128-137 [doi]
- A method for developing model to text transformationsAlessandro Tiso, Gianna Reggio, Maurizio Leotta, Filippo Ricca. 138-141 [doi]
- Transparent IO access control for application-level tenant isolationMajid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen, Nick Hofstede. 143-150 [doi]
- Gelly-scheduling: distributed graph processing for service placement in community networksMiguel E. Coimbra, Mennan Selimi, Alexandre P. Francisco, Felix Freitag, Luís Veiga. 151-160 [doi]
- An integer linear-programming based resource allocation method for SQL-like queries in the cloudMohamed Mehdi Kandi, Shaoyi Yin, Abdelkader Hameurlain. 161-166 [doi]
- Multi-level per node combiner (MLPNC) to minimize mapreduce job latency on virtualized environmentRathinaraja Jeyaraj, Ananthanarayana V. S. 167-174 [doi]
- Data locality and VM interference aware mitigation of data skew in hadoop leveraging modern portfolio theorySeyed Morteza Nabavinejad, Maziar Goudarzi. 175-182 [doi]
- A memory-deduplication side-channel attack to detect applications in co-resident virtual machinesJens Lindemann, Mathias Fischer. 183-192 [doi]
- Cloud transactions adhere to strict policy consistency for improved performanceDileep Mardham, Sanjay Madria, James R. Milligan, Mark Linderman. 193-200 [doi]
- Bounding the cost of virtual machine migrations for resource allocation in cloud data centersM. P. Gilesh, S. D. Madhu Kumar, Lillykutty Jacob. 201-206 [doi]
- Efficient distribution of mapreduce jobs for maximizing profit on federated cloudThouraya Gouasmi, Wajdi Louati, Ahmed Hadj Kacem. 207-209 [doi]
- Performance optimization of heterogeneous cloud storage with bandwidth & capacity considerationsPo-Chun Huang, Yuan-Hao Chang, Tseng-Yi Chen, Chia-Heng Tu, Chun Chen, Hsin-Wen Wei, Wei Kuan Shih. 210-213 [doi]
- Curtailing the cost of virtual machine migrations in cloud data centers: student research abstractM. P. Gilesh. 214-215 [doi]
- Comparing languages for engineering server software: erlang, go, and scala with akkaIvan Valkov, Natalia Chechina, Phil Trinder. 218-225 [doi]
- Coordinated composition of continuous service collaborations in decentralized smart computing environmentsMarkus Wutzler, Thomas Springer, Alexander Schill. 226-233 [doi]
- Online team-based game development discussions patterns summarised using probabilistic modelsAkiko Teranishi, Minoru Nakayama, Theodor Wyeld, Mohamad A. Eid. 234-239 [doi]
- No longer alone: finding common ground in collaborative virtual environmentsLi Liu, Adam Kaplan. 240-246 [doi]
- A pipelining-based framework for processing events in multimedia sensor networksChinnapong Angsuchotmetee, Richard Chbeir, Yudith Cardinale, Shohei Yokoyama. 247-250 [doi]
- Evaluation of morphological hierarchies for supervised video segmentationFilipe Tório. L. R. Nhimi, Zenilton K. G. Patrocínio Jr., Benjamin Perret, Jean Cousty, Silvio Jamil Ferzoli Guimarães. 252-259 [doi]
- Identification of fruit fly in intelligent traps using techniques of digital image processing and machine learningThainan B. Remboski, William D. de Souza, Marilton S. de Aguiar, Paulo R. Ferreira Jr.. 260-267 [doi]
- A low cost VSLAM prototype using webcams and a smartphone for outdoor applicationEduardo A. Speroni, Simone Regina Ceolin, Osmar Marchi dos Santos, Andrei Piccinini Legg. 268-275 [doi]
- A deep-learning-based approach for automated wagon component inspectionRafael L. Rocha, Ana Carolina Quintao Siravenha, Ana Cláudia S. Gomes, Gerson L. Serejo, Alexandre F. B. Silva, Luciano M. Rodrigues, Júlio Braga, Giovanni Dias, Schubert R. Carvalho, Cleidson R. B. de Souza. 276-283 [doi]
- A curve completion algorithm for agricultural planningIuri R. Souza, Mauricio Cunha Escarpinati, Daniel D. Abdala. 284-291 [doi]
- Computer vision system for weld bead geometric analysisLuciane B. Soares, Átila Astor Weis, Bruna de V. Guterres, Ricardo N. Rodrigues, Silvia Silva da Costa Botelho. 292-299 [doi]
- Comparative study of genetic and discrete firefly algorithm for combinatorial optimizationWillian Tessaro Lunardi, Holger Voos. 300-308 [doi]
- BoSS: image retrieval using bag-of-superpixels signaturesDaniel Y. T. Chino, Lucas C. Scabora, Caetano Traina Jr., Agma J. M. Traina. 309-312 [doi]
- Review-level aspect-based sentiment analysis using an ontologySophie de Kok, Linda Punt, Rosita van den Puttelaar, Karoliina Ranta, Kim Schouten, Flavius Frasincar. 315-322 [doi]
- Predicting incorrect mappings: a data-driven approach applied to DBpediaMariano Rico, Nandana Mihindukulasooriya, Dimitris Kontokostas, Heiko Paulheim, Sebastian Hellmann, Asunción Gómez-Pérez. 323-330 [doi]
- Deep reinforcement learning boosted by external knowledgeNicolas Bougie, Ryutaro Ichise. 331-338 [doi]
- Predicting facebook-users' personality based on status and linguistic features via flexible regression analysis techniquesPrantik Howlader, Kuntal Kumar Pal, Alfredo Cuzzocrea, S. D. Madhu Kumar. 339-345 [doi]
- Applying machine learning algorithms for deriving personality traits in social networkEric Fernandes de Mello Araújo, Bojan Simoski, Michel C. A. Klein. 346-349 [doi]
- Boosting the performance with a data-backup-free programming scheme for TLC-based SSDsChin-Chiang Pan, Chien-Chung Ho, Yuan-Hao Chang, Tei-Wei Kuo, Yu-Ming Chang, Ming-Chang Yang. 351-358 [doi]
- Prediction of abnormal temporal behavior in real-time systemsMohammad Hamad, Zain Alabedin Haj Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst. 359-367 [doi]
- Integrated simulation testbed for security and resilience of CPSHimanshu Neema, Bradley Potteiger, Xenofon D. Koutsoukos, Gabor Karsai, Péter Völgyesi, Janos Sztipanovits. 368-374 [doi]
- Low power driven loop tiling for RRAM crossbar-based CNNYuanhui Ni, Keni Qiu, Weiwen Chen, Lixue Xia, Yu Wang 0002. 375-380 [doi]
- Towards a model for comprehending and reasoning about PoW-based blockchain network sustainabilitySotirios Liaskos, Bo Wang. 383-387 [doi]
- Secure publish and subscribe systems with efficient revocationSana Belguith, Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello. 388-394 [doi]
- Adaptive information distribution for dynamic setsMatthias Prellwitz, Helge Parzyjegla, Steffen Steiner, Gero Mühl. 395-402 [doi]
- EcoVMbroker: energy-aware scheduling for multi-layer datacentersRodrigo Fernandes, José Simão, Luís Veiga. 403-410 [doi]
- Dynamic adaptation of byzantine consensus protocolsCarlos Carvalho, Daniel Porto, Luís E. T. Rodrigues, Manuel Bravo, Alysson Bessani. 411-418 [doi]
- Modeling and verifying SDN with multiple controllersLili Xiao, Shuangqing Xiang, Huibiao Zhu. 419-422 [doi]
- Safe and efficient fleet operation for autonomous machines: an actor-based approachAli Jafari, Jayasoorya Jayanthi Surendran Nair, Stephan Baumgart, Marjan Sirjani. 423-426 [doi]
- Trigger correlation for dynamic system reconfigurationMahin Abbasipour, Ferhat Khendek, Maria Toeroe. 427-430 [doi]
- IT-security in self-organizing decentralized virtual power plants: student research abstractMarius Stúbs. 431-432 [doi]
- An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detectionTayeb Kenaza, Khadidja Bennaceur, Abdenour Labed. 435-443 [doi]
- Vehicle emission prediction using remote sensing data and machine learning techniquesJiazhen Chen, Gillian Dobbie, Yun Sing Koh, Elizabeth Somervell, Gustavo Olivares. 444-451 [doi]
- Sentiment phrase generation using statistical methodsDirk Reinel, Jörg Scheidt, Andreas Henrich, Niko Brucker. 452-460 [doi]
- On the behavior of the infinite restricted boltzmann machine for clusteringNikolas A. Huhnstock, Alexander Karlsson, Maria Riveiro, H. Joe Steinhauer. 461-470 [doi]
- Weight-based search to find clusters around medians in subspacesSergio Peignier, Christophe Rigotti, Anthony Rossi, Guillaume Beslon. 471-480 [doi]
- A novel join technique for similar-trend searches supporting normalization on time-series databasesJunho Song, Sungchae Lim, Sang-Wook Kim. 481-486 [doi]
- Error analysis and topology modifications of a self-organizing incremental neural networkXiaoyu Wang, Osamu Hasegawa, Shiming Ge. 487-494 [doi]
- A quality control method for fraud detection on utility customers without an active contractBernat Coma-Puig, Josep Carmona. 495-498 [doi]
- On improving ROCK-based clustering for categorical data: student research abstractRiccardo Cappuzzo. 499-500 [doi]
- Maximally informative k-itemset mining from massively distributed data streamsMehdi Zitouni, Reza Akbarinia, Sadok Ben Yahia, Florent Masseglia. 502-509 [doi]
- Iterative subset selection for feature drifting data streamsLanqin Yuan, Bernhard Pfahringer, Jean Paul Barddal. 510-517 [doi]
- Unsupervised context switch for classification tasks on data streams with recurrent conceptsDenis Moreira dos Reis, André Gustavo Maletzke, Gustavo E. A. P. A. Batista. 518-524 [doi]
- Predicting polarities of entity-centered documents without reading their contentsChristian Beyer, Uli Niemann, Vishnu Unnikrishnan, Eirini Ntoutsi, Myra Spiliopoulou. 525-528 [doi]
- Co-training study for online regressionRicardo Sousa, João Gama. 529-531 [doi]
- Curator - a secure shared object store: design, implementation, and evaluation of a manageable, secure, and performant data exchange mechanism for smart devicesChristoph Stach, Bernhard Mitschang. 533-540 [doi]
- Data modeling for analytical queries on document-oriented DBMSR. A. S. N. Soransso, M. C. Cavalcanti. 541-548 [doi]
- Class-constraint similarity queriesJéssica Andressa de Souza, Agma J. M. Traina, Sebastian Michel. 549-556 [doi]
- Blind attribute pairing for privacy-preserving record linkageThiago Pereira da Nóbrega, Carlos Eduardo S. Pires, Tiago Brasileiro Araújo, Demetrio Gomes Mestre. 557-564 [doi]
- A clustering-based sales forecast for fashion retailing: student research abstractGraziele Marques Mazuco dos Santos. 565-566 [doi]
- Impact of memory frequency scaling on user-centric smartphone workloadsHashan R. Mendis, Wei-Ming Chen, Leandro Soares Indrusiak, Tei-Wei Kuo, Pi-Cheng Hsiu. 567-574 [doi]
- Assessing the pessimism of current multicore global fixed-priority schedulability analysisYoucheng Sun, Marco Di Natale. 575-583 [doi]
- Controller-aware memory coloring for multicore real-time systemsXing Pan, Frank Mueller. 584-592 [doi]
- RPR: a random replacement policy with limited pathological replacementsPedro Benedicte, Carles Hernández, Jaume Abella, Francisco J. Cazorla. 593-600 [doi]
- Energy-aware real-time scheduling in the linux kernelClaudio Scordino, Luca Abeni, Juri Lelli. 601-608 [doi]
- A brute-force schedulability analysis for formal model under logical execution time assumptionPierre-Emmanuel Hladik. 609-615 [doi]
- A partnership-based approach to minimize the maximal response time of flash-memory storage systemsTse-Yuan Wang, Che-Wei Tsao, Yuan-Hao Chang, Tei-Wei Kuo, Hsiang-Pang Li. 616-619 [doi]
- Accelerated exhaustive eye glints localization method for infrared video oculographyZihan Ding, Jiayi Luo, Hongping Deng. 620-627 [doi]
- IoT based monitoring of container vehicle for secure and reliable delivery of goodsSathish Kumar R, Rani C, GaneshKumar P. 628-633 [doi]
- Segmentation of affected skin lesion with blind deconvolution and L*a*b colour spaceImran Ahmed, Qazi Nida ur Rehman, Ghulam Masood, Awais Adnan, Awais Ahmad, Seungmin Rho. 634-639 [doi]
- Understanding data dimensions by cluster visualization using edge bundling in parallel coordinatesRodrigo Santos Do Amor Divino Lima, Carlos Gustavo Resque dos Santos, Sandro De Paula Mendonça, Jefferson Magalhães de Morais, Bianchi Serique Meiguins. 640-647 [doi]
- A heuristic evaluation of the user and programming interfaces of a sleep medicine applicationEduardo Mosqueira-Rey, David Alonso-Ríos, Vicente Moret-Bonillo. 648-655 [doi]
- Impact of web design features on irritation for E-commerce websitesChaudhry Muhammad Nadeem Faisal, Javier de Andrés Suárez, Martin Gonzalez-Rodriguez, Daniel Fernández Lanvin, Mudassar Ahmad, Muhammad Asif Habib. 656-663 [doi]
- IoT based smart interaction framework for elearningSohail Jabbar, Muhammad Farhan, Jin Li, Haseeb Ahmad, Awais Ahmad. 664-669 [doi]
- Visual design checklist for graphical user interface (GUI) evaluationMurilo Crivellari Camargo, Rodolfo M. Barros, Vanessa Tavares de Oliveira Barros. 670-672 [doi]
- Human behavior analysis based on big data analytics in cyber-physical system: student research abstractSadia Din. 673-674 [doi]
- LiMe: linear methods for pseudo-relevance feedbackDaniel Valcarce, Javier Parapar, Álvaro Barreiro. 678-687 [doi]
- Fuzzy query by exampleAurélien Moreau, Olivier Pivert, Grégory Smits. 688-695 [doi]
- CoRec: a co-training approach for recommender systemsArthur F. Da Costa, Marcelo G. Manzato, Ricardo J. G. B. Campello. 696-703 [doi]
- Optimization framework model for retrospective tweet summarizationAbdelhamid Chellal, Mohand Boughanem. 704-711 [doi]
- Towards coherent single-document summarization: an integer linear programming-based approachRodrigo Garcia, Rinaldo Lima, Bernard Espinasse, Hilário Oliveira. 712-719 [doi]
- Source selection of long tail sources for federated search in an uncooperative settingGünter Urak, Hermann Ziak, Roman Kern. 720-727 [doi]
- Automatic keyphrase extraction using graph-based methodsJosiane Mothe, Faneva Ramiandrisoa, Michael Rasolomanana. 728-730 [doi]
- Energy efficient scheduling in IoT networksSmruti R. Sarangi, Sakshi Goel, Bhumika Singh. 733-740 [doi]
- Leaking data from enterprise networks using a compromised smartwatch deviceShachar Siboni, Asaf Shabtai, Yuval Elovici. 741-750 [doi]
- Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fogYe Xia, Xavier Etchevers, Loïc Letondeur, Thierry Coupaye, Frédéric Desprez. 751-760 [doi]
- Fuzzy logic and MCDA in IoT resources classificationRenato Dilli, Amanda Argou, Maurício L. Pilla, Ana Marilza Pernas, Renata Reiser, Adenauer C. Yamin. 761-766 [doi]
- A graph partitioning-based heuristic for runtime IoT data placement strategies in a fog infrastructureMohammed Islam Naas, Laurent Lemarchand, Jalil Boukhobza, Philippe Raipin Parvedy. 767-774 [doi]
- Lightweight secure bootstrap and message attestation in the internet of thingsClémentine Gritti, Refik Molva, Melek Önen. 775-782 [doi]
- Hybrid controller synthesis for the IoTArthur Gatouillat, Youakim Badr, Bertrand Massot. 783-790 [doi]
- FI-MApp: a web application for managing FI-WARE environments in internet of thingsPhelipe Feio, José Neto, Vagner Nascimento, Antonio Abelém. 791-799 [doi]
- AffectiveROAD system and database to assess driver's attentionNeska El Haouij, Jean-Michel Poggi, Sylvie Sevestre-Ghalila, Raja Ghozi, Mériem Jaïdane. 800-803 [doi]
- A novel low power brain electrical activity monitor using IoT: student research abstractAlexandre Tessier. 804-805 [doi]
- Distributed optimization in multi-agent robotics for industry 4.0 warehousesAjay Kattepur, Hemant Kumar Rath, Anantha Simha, Arijit Mukherjee. 808-815 [doi]
- Declarative vs rule-based control for flocking dynamicsUsama Mehmood, Nicola Paoletti, Dung Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka. 816-823 [doi]
- Evolving collective behaviours in simulated kilobotsJane Holland, Josephine Griffith, Colm O'Riordan. 824-831 [doi]
- Fast consensus for fully distributed multi-agent task allocationJoanna Turner, Qinggang Meng, Gerald Schaefer, Andrea Soltoggio. 832-839 [doi]
- Unsupervised activity recognition for autonomous water dronesAlberto Castellini, Giovanni Alberto Beltrame, Manuele Bicego, Jason Blum, Matteo Denitto, Alessandro Farinelli. 840-842 [doi]
- MiMicS: a multi-robot simulator for teaching, rapid prototyping and large scale evaluationsEduardo Ferrera, Jesús Capitán, Merlin Stampa, Pedro José Marrón. 843-846 [doi]
- Cooperative routing with refueling for aerial and ground vehicles for large scale surveillance: student research abstractParikshit Maini. 847-848 [doi]
- MOVELETS: exploring relevant subtrajectories for robust trajectory classificationCarlos Andres Ferrero, Luis Otávio Alvares, Willian Zalewski, Vania Bogorny. 849-856 [doi]
- Adaptive kNN using expected accuracy for classification of geo-spatial dataMark Kibanov, Martin Becker 0003, Juergen Mueller, Martin Atzmueller, Andreas Hotho, Gerd Stumme. 857-865 [doi]
- Modeling changes in territorial partitions overtime: ontologies TSN and TSN-changeCamille Bernard, Marlène Villanova-Oliver, Jérôme Gensel, Hy Dao. 866-875 [doi]
- Assessing the planimetric accuracy of Paris atlases from the late 18th and 19th centuriesBertrand Duménieu, Nathalie Abadie, Julien Perret. 876-883 [doi]
- Quantifying walkability of roads using digital elevation models: student research abstractFaris Hawamdeh. 884-885 [doi]
- Tractable reasoning in probabilistic OWL profilesMelisachew Wudage Chekol, Heiner Stuckenschmidt. 888-895 [doi]
- A preference-based approach to backbone computation with application to argumentationAlessandro Previti, Matti Järvisalo. 896-902 [doi]
- An infinite-valued grounded labelling for abstract argumentation frameworksJoão Alcântara, Samy Sá. 903-910 [doi]
- Incremental computation of warranted arguments in dynamic defeasible argumentation: the rule addition caseGianvincenzo Alfano, Sergio Greco, Francesco Parisi, Gerardo I. Simari, Guillermo Ricardo Simari. 911-917 [doi]
- In, out and through: formalising some dynamic aspects of the image schema containmentMaria M. Hedblom, Dagmar Gromann, Oliver Kutz. 918-925 [doi]
- Concept maps construction using natural language processing to support studies selectionVinicius dos Santos. 926-927 [doi]
- Deep feature learning and selection for activity recognitionYasser Mohammad, Kazunori Matsumoto, Keiichiro Hoashi. 930-939 [doi]
- Estimating local coverage areas for location dependent queriesJorge Bernad, Carlos Bobed, Eduardo Mena. 940-947 [doi]
- Text extraction and retrieval from smartphone screenshots: building a repository for life in mediaAgnese Chiatti, Mu Jung Cho, Anupriya Gagneja, Xiao Yang, Miriam Brinberg, Katie Roehrick, Sagnik Ray Choudhury, Nilam Ram, Byron Reeves, C. Lee Giles. 948-955 [doi]
- A smartphone application to measure the quality of pest control spraying machines via image analysisBruno Brandoli Machado, Gabriel Spadon, Mauro S. Arruda, Wesley Nunes Gonçalves, André C. P. L. F. Carvalho, José F. Rodrigues Jr.. 956-963 [doi]
- On the I/O characteristics of the mobile web browsersTaeho Hwang, MyungSik Kim, Seongjin Lee, Youjip Won. 964-966 [doi]
- MaE!: a service for supporting people meeting at eventsWender Z. Xavier, Mateus P. Silveira, Josemar A. Caetano, Humberto Torres Marques-Neto. 967-969 [doi]
- On the feasibility of 40 gbps network data capture and retention with general purpose hardwareGuillermo Julián-Moreno, Rafael Leira, Jorge E. López de Vergara, Francisco J. Gomez-Arribas, Ivan Gonzalez. 970-978 [doi]
- GAC: graph-based alert correlation for the detection of distributed multi-step attacksSteffen Haas, Mathias Fischer. 979-988 [doi]
- A flexible and efficient container-based NFV platform for middlebox networkingChao Zheng, Qiuwen Lu, Jia Li, Qinyun Liu, Binxing Fang. 989-995 [doi]
- Scaling topology pattern matching: a distributed approachMichael Stein, Alexander Frömmgen, Roland Kluge, Lin Wang, Augustin Wilberg, Boris Koldehofe, Max Mühlhäuser. 996-1005 [doi]
- Efficient feature extraction for internet data analysis using AS2VecJohn Robert Mendoza, Roel Ocampo, Isabel Montes, Cedric Angelo M. Festin. 1006-1013 [doi]
- Topology resilience enhancement for software defined networksPedro Montibeler, Fernando Farias, Antonio Abélem. 1014-1016 [doi]
- Investigation of priority queue with peaked traffic flowsSeferin Mirtchev, Rossitza Goleva, Dimitar Atamian, Ivan Ganchev. 1017-1019 [doi]
- OOlong: an extensible concurrent object calculusElias Castegren, Tobias Wrigstad. 1022-1029 [doi]
- Implementing modular class-based reuse mechanisms on top of a single inheritance VMPablo Tesone, Guillermo Polito, Luc Fabresse, Noury Bouraqadi, Stéphane Ducasse. 1030-1037 [doi]
- A type and effect system for uniqueness and immutabilityPaola Giannini, Marco Servetto, Elena Zucca. 1038-1045 [doi]
- Textual alignment in SPMD programsFrédéric Dabrowski. 1046-1053 [doi]
- Enabling lock-free concurrent workers over temporal graphs composed of multiple time-seriesFrançois Fouquet, Thomas Hartmann 0001, Sébastien Mosser 0001, Maxime Cordy. 1054-1061 [doi]
- Automatic scalable parallel test case execution. introducing the münster distributed test case runner for Java (miDSTR)Vincent von Hof, Andreas Fuchs. 1062-1064 [doi]
- CBM: a compact representation and its parallel search for query processing on GPUChidchanok Choksuchat, Sergei Gorlatch, Chantana Chantrapornchai. 1065-1067 [doi]
- Node-level optimization by caching data and choosing the optimal tile size for parallel dense linear algebra on distributed systems: student research abstractYonghyun Ryu. 1068-1069 [doi]
- Automatic code conversion for non-volatile memoryJinsoo Yoo, Yongjun Park, Seongjin Lee, Youjip Won. 1071-1076 [doi]
- Exploring OS-based full-system deterministic replayHyunmin Yoon, Shakaiba Majeed, Minsoo Ryu. 1077-1086 [doi]
- Monitoring-based auto-scalability across hybrid cloudsConstantin-Cosmin Crecana, Florin Pop. 1087-1094 [doi]
- Analyzing and modeling the impact of memory latency and bandwidth on application performanceMyonghoon Oh, Jongmoo Choi, Seong Je Cho, Jeesoo Kim, Changhwan Youn, Woosuk Chung. 1095-1101 [doi]
- Unified hardware abstraction layer with device masqueradeIori Yoneji, Takaaki Fukai, Takahiro Shinagawa, Kazuhiko Kato. 1102-1108 [doi]
- Efficient page-cache encryption for smart devices with non-volatile main memoryKenichi Kourai, Naoto Fukuda, Tomohiro Kodama. 1109-1115 [doi]
- Ethernet bonding on a bare PC web server with dual NICsFaris Almansour, Ramesh K. Karne, Alexander L. Wijesinha, Bharat S. Rawal. 1116-1121 [doi]
- Kloadavg: a load index for the OS kernel levelRivalino Matias Jr., Alexandre Beletti Ferreira. 1122-1128 [doi]
- A cost-aware object management method for in-memory computing frameworksChin-Hsien Wu, Chien-Wei Chen, Kai-Chun Wang. 1129-1132 [doi]
- UFLRU: unmapped file first LRU scheme for non-volatile memoryYeonjin Noh, Jinsoo Yoo, Seongjin Lee, Youjip Won. 1133-1135 [doi]
- Investigating the performance impacts of I/O operations and disk cache on operating systems for wearablesVicente J. P. Amorim, Saul E. Delabrida, Ricardo A. O. Oliveira. 1136-1139 [doi]
- Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreementsAmir Shayan Ahmadian, Jan Jürjens, Daniel Strüber 0001. 1142-1149 [doi]
- A system of privacy patterns for user controlMichael Colesky, Julio C. Caiza, José M. del Álamo, Jaap-Henk Hoepman, Yod-Samuel Martín. 1150-1156 [doi]
- To reveal or not to reveal: balancing user-centric social benefit and privacy in online social networksSourya Joyee De, Abdessamad Imine. 1157-1164 [doi]
- Helping john to make informed decisions on using social loginFarzaneh Karegar, Nina Gerber, Melanie Volkamer, Simone Fischer-Hübner. 1165-1174 [doi]
- Effective and efficient privacy threat modeling through domain refinementsKim Wuyts, Dimitri Van Landuyt, Aram Hovsepyan, Wouter Joosen. 1175-1178 [doi]
- AppPETs: a framework for privacy-preserving appsErik Sy, Tobias Mueller, Matthias Marx, Dominik Herrmann. 1179-1182 [doi]
- A constraint-logic object-oriented languageJan C. Dageförde, Herbert Kuchen. 1185-1194 [doi]
- Syntax error recovery in parsing expression grammarsSérgio Medeiros, Fabio Mascarenhas. 1195-1202 [doi]
- Declarative algorithms for generation, counting and random sampling of term algebrasPaul Tarau. 1203-1210 [doi]
- An approach based on a DSL + API for programming runtime adaptivity and autotuning concernsTiago Carvalho, João M. P. Cardoso. 1211-1220 [doi]
- Leveraging teenagers feedback in the development of a domain-specific language: the case of programming low-cost robotsAnkica Barisic, João Cambeiro, Vasco Amaral, Miguel Goulão, Tarquínio Mota. 1221-1229 [doi]
- Efficient evaluation of context-free path queries for graph databasesCiro M. Medeiros, Martin A. Musicante, Umberto Souza da Costa. 1230-1237 [doi]
- A framework for constructing javascript virtual machines with customized datatype representationsTakafumi Kataoka, Tomoharu Ugawa, Hideya Iwasaki. 1238-1247 [doi]
- Communications in choreographies, revisitedLuís Cruz-Filipe, Fabrizio Montesi, Marco Peressotti. 1248-1255 [doi]
- Buffered garbage collection for self-reflective customizationTetsuro Yamazaki, Shigeru Chiba. 1256-1259 [doi]
- Building a software requirements specification and design for an avionics system: an experience reportAndrés Paz, Ghizlane El-Boussaidi. 1262-1271 [doi]
- Comparing alternative goal model visualizations for decision making: an exploratory experimentSotirios Liaskos, Teodora Dundjerovic, Grace Gabriel. 1272-1281 [doi]
- Safetrace: a safety-driven requirement traceability framework on device interaction hazards for MD PnPAndrew Yi-Zong Ou, Maryam Rahmaniheris, Yu Jiang 0001, Lui Sha, Zhicheng Fu, Shangping Ren. 1282-1291 [doi]
- Improving self-adaptive systems conceptual modelingJoão Pablo S. da Silva, Miguel Ecar, Marcelo Soares Pimenta, Fábio Natanael Kepler, Gilleanes T. A. Guedes, Carlos Michel Betemps. 1292-1299 [doi]
- A gamified requirements inspection process for goal modelsJoão Pimentel 0001, Emanuel Santos, Tarcísio Pereira, Daniel Ferreira, Jaelson Castro. 1300-1307 [doi]
- Deriving services from KAOS modelsEric Souza, Ana Moreira 0001. 1308-1315 [doi]
- Applying a requirement engineering based approach to evaluate the security requirements engineering methodologiesSravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri. 1316-1318 [doi]
- What to write and why: a recommender for news mediaAlessandro Cucchiarelli, Christian Morbidoni, Giovanni Stilo, Paola Velardi. 1321-1330 [doi]
- Explicit or implicit feedback? engagement or satisfaction?: a field experiment on machine-learning-based recommender systemsQian Zhao, F. Maxwell Harper, Gediminas Adomavicius, Joseph A. Konstan. 1331-1340 [doi]
- Investigating serendipity in recommender systems based on real user feedbackDenis Kotkov, Joseph A. Konstan, Qian Zhao, Jari Veijalainen. 1341-1350 [doi]
- Active learning in multi-domain collaborative filtering recommender systemsXin Guan, Chang-Tsun Li, Yu Guan. 1351-1357 [doi]
- Human uncertainty and ranking error: fallacies in metric-based evaluation of recommender systemsKevin Jasberg, Sergej Sizov. 1358-1365 [doi]
- Situation-dependent combination of long-term and session-based preferences in group recommendations: an experimental analysisThuy Ngoc Nguyen, Francesco Ricci 0001. 1366-1373 [doi]
- A hybrid approach to music playlist continuation based on playlist-song membershipAndreu Vall, Matthias Dorfer, Markus Schedl, Gerhard Widmer. 1374-1382 [doi]
- Movieexplorer: building an interactive exploration tool from ratings and latent taste spacesTaavi T. Taijala, Martijn C. Willemsen, Joseph A. Konstan. 1383-1392 [doi]
- A label ranking approach for selecting rankings of collaborative filtering algorithmsTiago Cunha 0001, Carlos Soares, André C. P. L. F. de Carvalho. 1393-1395 [doi]
- Knowing the unknown: visualising consumption blind-spots in recommender systemsNava Tintarev, Shahin Rostami, Barry Smyth. 1396-1399 [doi]
- An ocarina extension for AADL formal semantics generationHana Mkaouar, Bechir Zalila, Jérôme Hugues, Mohamed Jmaiel. 1402-1409 [doi]
- Improving the detection of evolutionary coupling: an approach considering sliding verificationMarcelo Machado, Ricardo Choren. 1410-1416 [doi]
- Reconstruction of execution architecture view using dependency relationships and execution tracesHwi Ahn, Sungwon Kang, Seonah Lee. 1417-1424 [doi]
- Solution-aware data flow diagrams for security threat modelingLaurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen. 1425-1432 [doi]
- Enabling temporal-aware contexts for adaptative distributed systemsLudovic Mouline, Amine Benelallam, Thomas Hartmann 0001, François Fouquet, Johann Bourcier, Brice Morin, Olivier Barais. 1433-1440 [doi]
- Model-driven adaptation of service choreographiesMarco Autili, Amleto Di Salle, Francesco Gallo, Claudio Pompilio, Massimo Tivoli. 1441-1450 [doi]
- A hybrid architecture to enrich context awareness through data correlationRoger da Silva Machado, Felipe Rosa, Ricardo Almeida, Tiago Primo, Maurício L. Pilla, Ana Marilza Pernas, Adenauer C. Yamin. 1451-1453 [doi]
- Recovering runtime architecture models and managing their complexity using dynamic information and composite structuresSoumia Zellagui, Chouki Tibermacine, Ghizlane El-Boussaidi, Abdelhak-Djamel Seriai, Hinde-Lilia Bouziane, Christophe Dony. 1454-1456 [doi]
- Lessons learned from adapting "things" to IoT platforms in research and teachingUlrik Ekedahl, Radu-Casian Mihailescu, Zhizhong Ma. 1457-1460 [doi]
- Back-SoS: towards a model-based approach to address architectural drift in systems-of-systemsValdemar Vicente Graciano Neto, Wallace Manzano, Lina Maria Garcés Rodriguez, Milena Guessi, Brauner R. N. Oliveira, Tiago Volpato, Elisa Yumi Nakagawa. 1461-1463 [doi]
- A liquid software-driven semantic complex event processing-based platform for health monitoring: student research abstractFrancesco Nocera. 1464-1465 [doi]
- Supporting privacy impact assessment by model-based privacy analysisAmir Shayan Ahmadian, Daniel Strüber 0001, Volker Riediger, Jan Jürjens. 1467-1474 [doi]
- Improving function coverage with munch: a hybrid fuzzing and directed symbolic execution approachSaahil Ognawala, Thomas Hutzelmann, Eirini Psallida, Alexander Pretschner. 1475-1482 [doi]
- On the use of package managers by the C++ open-source communityAndré Miranda, João Pimentel 0001. 1483-1491 [doi]
- Formal verification of energy and timed requirements for a cooperative automotive systemEun-Young Kang, Li Huang, Dongrui Mu. 1492-1499 [doi]
- A model for analysis and presentation of design pattern detection resultsShouzheng Yang, Vassilios Tzerpos. 1500-1509 [doi]
- An experimental evaluation of a de-biasing intervention for professional software developersMartin J. Shepperd, Carolyn Mair, Magne Jørgensen. 1510-1517 [doi]
- Test-case generation for web-service clientsAndreas Fuchs, Herbert Kuchen. 1518-1527 [doi]
- A systematic literature mapping on the relationship between design patterns and bad smellsBruno L. Sousa, Mariza A. S. Bigonha, Kecia A. M. Ferreira. 1528-1535 [doi]
- DEVA: sensing emotions in the valence arousal space in software engineering textMd Rakibul Islam, Minhaz F. Zibran. 1536-1543 [doi]
- An agile process supporting software reuse: an industrial experienceLuigi Cafaro, Rita Francese, Ciro Palumbo, Michele Risi, Genoveffa Tortora. 1544-1551 [doi]
- Program understanding using ontologies and dynamic analysisJavier Belmonte, Philippe Dugerdil. 1552-1559 [doi]
- A collaborative filtering recommender system for test case prioritization in web applicationsMaral Azizi, Hyunsook Do. 1560-1567 [doi]
- NewTL: engineering an extract, transform, load (ETL) software system for business on a very large scaleVidroha Debroy, Lance Brimble, Matthew Yost. 1568-1575 [doi]
- Fancymock: creating virtual services from transactionsHasan Ferit Eniser, Alper Sen 0001, Suleyman Olcay Polat. 1576-1578 [doi]
- Leveraging project-specificity to find suitable specifications: student research abstractRobert Heumüller. 1579-1580 [doi]
- A formally assured intelligent ecosystem for enhanced ambient assisted living supportAshalatha Kunnappilly. 1581-1582 [doi]
- The security risks of power measurements in multicoresPhilipp Miedl, Lothar Thiele. 1585-1592 [doi]
- Combinatorial subset difference public key broadcast encryption scheme for secure multicastJihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh. 1593-1600 [doi]
- Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDsMichael Hölzl, Michael Roland 0001, Omid Mir, René Mayrhofer. 1601-1609 [doi]
- Ransomware prevention using application authentication-based file access controlOr Ami, Yuval Elovici, Danny Hendler. 1610-1619 [doi]
- State-aware anomaly detection for industrial control systemsHamid Reza Ghaeini, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer. 1620-1628 [doi]
- Applying deep learning on packet flows for botnet detectionJos van Roosmalen, Harald P. E. Vranken, Marko C. J. D. van Eekelen. 1629-1636 [doi]
- Behavior analysis in the medical sector: theory and practiceMahdi Alizadeh, Sander Peters, Sandro Etalle, Nicola Zannone. 1637-1646 [doi]
- Measuring E-mail header injections on the world wide webSai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn. 1647-1656 [doi]
- A refinement-based approach for specifying multi-scale software architectures: application to SoSIlhem Khlif, Imen Tounsi, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. 1660-1667 [doi]
- A decision approach for energy distribution management in smart citiesImen Abdennadher, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 1668-1673 [doi]
- Formal modeling systems-of-systems missions with mKAOSEduardo Silva, Thaís Batista. 1674-1679 [doi]
- Correctness by construction and style preserving reconfigurations of system of systemsCédric Eichler, Khalil Drira, Thierry Monteil 0001, Patricia Stolf. 1680-1686 [doi]
- Externalizing patterns for simulations in software engineering of systems-of-systemsValdemar Vicente Graciano Neto, Wallace Manzano, Adair José Rohling, Maurício Gonçalves Vieira Ferreira, Tiago Volpato, Elisa Yumi Nakagawa. 1687-1694 [doi]
- Heterogeneous design models alignment: from matching to consistency managementMahmoud El Hamlaoui, Saloua Bennani, Mahmoud Nassar, Sophie Ebersold, Bernard Coulette. 1695-1697 [doi]
- +: extended action-benefit-cost modeling with knowledge-based decision-making and interaction model for system of systems simulationMingyu Jin, Donghwan Shin, Doo-Hwan Bae. 1698-1701 [doi]
- Collaborative processes behavioral modeling: student research abstractMamadou Lakhassane Cisse. 1702-1703 [doi]
- Supporting micro-services deployment in a safer way: a static analysis and automated rewriting approachBenjamin Benni, Sébastien Mosser 0001, Philippe Collet, Michel Riveill. 1706-1715 [doi]
- On the structure and authorization management of RESTful web servicesBojan Suzic, Bernd Prünster, Dominik Ziegler. 1716-1724 [doi]
- Query strategies on polyglot persistence in microservicesLuís H. N. Villaça, Leonardo Guerreiro Azevedo, Fernanda Araujo Baião. 1725-1732 [doi]
- From the decorator pattern to circuit breakers in microservicesFabrizio Montesi, Janine Weber. 1733-1735 [doi]
- Scalable and timely detection of cyberbullying in online social networksRahat Ibn Rafiq, Homa Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra. 1738-1747 [doi]
- The follower count fallacy: detecting Twitter users with manipulated follower countAnupama Aggarwal, Saravana Kumar, Kushagra Bhargava, Ponnurangam Kumaraguru. 1748-1755 [doi]
- Towards a reputation model applied to geosocial networks: a case study on crowd4cityAna Gabrielle Ramos Falcão, Cláudio de Souza Baptista, Maxwell Guimarães de Oliveira, Júlio Henrique Rocha, Tiago Henrique da Silva Leite, José Eustáquio Rangel de Queiroz. 1756-1763 [doi]
- Exploiting linkedin to predict employee resignation likelihoodAna Carolina C. de Jesus, Márcio Enio G. D. Júnior, Wladmir C. Brandão. 1764-1771 [doi]
- Towards an approach to elicit domain requirements from social networks: the case of emergency systemsCláudio Borges, João Araújo 0001, Armanda Rodrigues. 1772-1781 [doi]
- A preselection algorithm for the influence maximization problem in power law graphsRenato S. Melo, André Luís Vignatti. 1782-1789 [doi]
- Improving sentiment classification from high volatility financial newsJenq-Haur Wang, Shiang Huang. 1790-1797 [doi]
- Computational advertising in social networks: an opinion mining-based approachMauro Dragoni. 1798-1804 [doi]
- A multi-task neural network for multilingual sentiment classification and language detection on TwitterJonatas Wehrmann, Willian E. Becker, Rodrigo C. Barros. 1805-1812 [doi]
- ship: a social networking system for combating cyber-bullying and defending personal reputationHasan M. Jamil, Robert Breckenridge. 1813-1820 [doi]
- Emoji recommendation in private instant messagesGaël Guibon, Magalie Ochs, Patrice Bellot. 1821-1823 [doi]
- Unsupervised translated word sense disambiguation in constructing bilingual lexical databaseHtet Myet Lynn, Chang Choi, PanKoo Kim. 1824-1827 [doi]
- Using an agent-based model to measure the message repetition effect on TwitterPaul Leger, Carmen Hidalgo-Alcázar, Manuela López. 1828-1830 [doi]
- A new architecture and implementation strategy for non-invasive software measurement systemsAnton Bykov, Vladimir Ivanov, Alan Rogers, Alexandr Shunevich, Alberto Sillitti, Giancarlo Succi, Alexander Tormasov, Jooyong Yi, Albert Zabirov, Denis Zaplatnikov. 1832-1839 [doi]
- Development of a plugin based extensible feature extraction frameworkVikas K. Malviya, Sawan Rai, Atul Gupta. 1840-1847 [doi]
- Smart IoT monitoring framework based on oneM2M for fog computingJeongwoo Choi, Yongmin Kim, Sung Y. Shin, Jiman Hong. 1848-1852 [doi]
- Role-based automatic programming framework for interworking a drone and wireless sensor networksHong Min, Jinman Jung, Seoyeon Kim, Bongjae Kim, Junyoung Heo. 1853-1856 [doi]
- TwAS: two-stage shape analysis for speed and precisionAmey Karkare. 1857-1864 [doi]
- A web-based tool for analysing normative documents in englishJohn J. Camilleri, Mohammad Reza Haghshenas, Gerardo Schneider. 1865-1872 [doi]
- Qualitative and quantitative analysis with scheduling policies in model checkingNhat-Hoa Tran, Yuki Chiba, Toshiaki Aoki. 1873-1880 [doi]
- Verified compilation of linearizable data structures: mechanizing rely guarantee for semantic refinementYannick Zakowski, David Cachera, Delphine Demange, David Pichardie. 1881-1890 [doi]
- Cycle-bounded model checking of PLC software via dynamic large-block encodingDimitri Bohlender, Daniel Hamm, Stefan Kowalewski. 1891-1898 [doi]
- Generating minimal test set satisfying MC/DC criterion via SAT based approachLing Yang, Jun Yan, Jian Zhang. 1899-1906 [doi]
- LOCKS: a property specification language for security goalsRajesh Kumar 0012, Arend Rensink, Mariëlle Stoelinga. 1907-1915 [doi]
- On the use of sequence mining within spectrum based fault localisationGulsher Laghari, Serge Demeyer. 1916-1924 [doi]
- TeSSLa: runtime verification of non-synchronized real-time streamsMartin Leucker, César Sánchez, Torben Scheffel, Malte Schmitz 0001, Alexander Schramm. 1925-1933 [doi]
- Korat-API: a framework to enhance korat to better support testing and reliability techniquesNima Dini, Cagdas Yelen, Zakaria Alrmaih, Amresh Kulkarni, Sarfraz Khurshid. 1934-1943 [doi]
- AutoPUT: an automated technique for retrofitting closed unit tests into parameterized unit testsKeita Tsukamoto, Yuta Maezawa, Shinichi Honiden. 1944-1951 [doi]
- RDF shape induction using knowledge base profilingNandana Mihindukulasooriya, Mohammad Rifat Ahmmad Rashid, Giuseppe Rizzo 0002, Raúl García-Castro, Óscar Corcho, Marco Torchiano. 1952-1959 [doi]
- Measuring structural similarity between RDF graphsPierre Maillot, Carlos Bobed. 1960-1967 [doi]
- Fuzzy ontologies for search results diversification: application to medical dataGhada Besbes, Hajer Baazaoui Zghal. 1968-1975 [doi]
- EffTE: a dependency-aware approach for test-driven ontology developmentLavdim Halilaj, Irlán Grangel-González, Steffen Lohmann, Maria-Esther Vidal, Sören Auer. 1976-1983 [doi]
- Predicting the possibilistic score of OWL axioms through modified support vector clusteringDario Malchiodi, Andrea G. B. Tettamanzi. 1984-1991 [doi]
- Knowledge base completion using distinct subgraph pathsSameh K. Mohamed, Vít Novácek, Pierre-Yves Vandenbussche. 1992-1999 [doi]
- Seamless integration of cyber-physical systems in knowledge graphsIrlán Grangel-González, Lavdim Halilaj, Maria-Esther Vidal, Steffen Lohmann, Sören Auer, Andreas W. Müller. 2000-2003 [doi]
- Does gamification matter?: a systematic mapping about the evaluation of gamification in educational environmentsAna Carolina Tomé Klock, Aline Nunes Ogawa, Isabela Gasparini, Marcelo Soares Pimenta. 2006-2012 [doi]
- Usa-DSL: usability evaluation framework for domain-specific languagesIldevana Poltronieri Rodrigues, Avelino Francisco Zorzo, Maicon Bernardino, Márcia de Borba Campos. 2013-2021 [doi]
- Accessibility and usability problems encountered on websites and applications in mobile devices by blind and normal-vision usersMichael Crystian Nepomuceno Carvalho, Felipe Silva Dias, Aline Grazielle Silva Reis, André Pimenta Freire. 2022-2029 [doi]
- Experience report: studying the readability of a domain specific languageJohann Thor Mogensen Ingibergsson, Stefan Hanenberg, Joshua Sunshine, Ulrik Pagh Schultz. 2030-2033 [doi]
- Towards a fault-detection benchmark for evaluating software product line testing approachesStefan Fischer 0006, Roberto Erick Lopez-Herrejon, Alexander Egyed. 2034-2041 [doi]
- Physical separation of features: a survey with CPP developersJacob Krüger, Kai Ludwig, Bernhard Zimmermann, Thomas Leich. 2042-2049 [doi]
- Engineering configurators for the retail industry: experience report and challenges aheadMaxime Cordy, Patrick Heymans. 2050-2057 [doi]
- Visual guidance for product line configuration using recommendations and non-functional propertiesJuliana Alves Pereira, Jabier Martinez, Hari Kumar Gurudu, Sebastian Krieter, Gunter Saake. 2058-2065 [doi]
- Assessing the functional feasibility of variability-intensive data flow-oriented systemsSami Lazreg, Philippe Collet, Sébastien Mosser 0001. 2066-2075 [doi]
- Separation of concerns: experiences of the crowdJacob Krüger. 2076-2077 [doi]
- BIRD: bio-inspired distributed interest forwarding in vehicular named-data networksMuhammad Azfar Yaqub, Syed Hassan Ahmed, Dongkyun Kim. 2078-2083 [doi]
- Dynamic control of beacon transmission rate and power with position error constraint in cooperative vehicular networksSandy Bolufé, Samuel Montejo Sánchez, Cesar A. Azurdia-Meza, Sandra Céspedes, Richard Demo Souza, Evelio M. García Fernández. 2084-2091 [doi]
- A centralized channelization scheme for wireless LANs exploiting channel bondingMade Harta Dwijaksara, Wha Sook Jeon, Dong Geun Jeong. 2092-2101 [doi]
- A distributed online certificate status protocol for named data networksDaniel Rezende, Carlos Maziero, Elisa Mannes. 2102-2108 [doi]
- Cooperative neighborhood map in VANETsHermes Pimenta de Moraes Jr., Bertrand Ducourthial. 2109-2116 [doi]
- Identification of anchor zones for floating content in VaNETs based on centrality measuresFábio Massalino, André L. L. Aquino. 2117-2124 [doi]
- Energy-efficient unequal chain length clustering for WSNMohammad Baniata, Mhanwoo Heo, Jinwoo Lee, Juw Won Park, Jiman Hong. 2125-2131 [doi]
- Energy saving on DTN using trajectory inference modelAntonio Rodrigo Delepiane de Vit, César A. M. Marcon, Raul Ceretta Nunes, Thais Webber, Gustavo Sanchez, Carlos Oberdan Rolim. 2132-2135 [doi]
- SDN for QUIC: an enhanced architecture with improved connection establishmentAli Hussein, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab. 2136-2139 [doi]
- Energy efficient topology management scheme from wireless sensor and ad-hoc network: student research abstractMuhammad Diyan. 2140-2141 [doi]
- A quality analysis of facebook messenger's most popular chatbotsJuanan Pereira, Oscar Díaz. 2144-2150 [doi]
- Gesture4all: a framework for 3D gestural interaction to improve accessibility of web videosMarcio Maestrelo Funes, Tiago Henrique Trojahn, Renata Pontin de Mattos Fortes, Rudinei Goularte. 2151-2158 [doi]
- Layout cross-browser incompatibility detection using machine learning and DOM segmentationFagner Christian Paes, Willian Massami Watanabe. 2159-2166 [doi]
- A web-based approach using reactive programming for complex event processing in internet of things applicationsCarlos Zimmerle, Kiev Gama. 2167-2174 [doi]
- browsercloud.js: a distributed computing fabric powered by a P2P overlay network on top of the web platformDavid Dias, Luís Veiga. 2175-2184 [doi]
- Customising LOD views: a declarative approachAlice Graziosi, Angelo Di Iorio, Francesco Poggi, Silvio Peroni, Luca Bonini. 2185-2192 [doi]
- Hiphop.js: a language to orchestrate web applicationsColin Vidal, Gérard Berry, Manuel Serrano. 2193-2195 [doi]
- Classification pipeline for automatic identification of widgets and its partsEduardo Henrique Rizo. 2196-2197 [doi]