Abstract is missing.
- A Provenance Model of Composite Services in Service-Oriented EnvironmentsParaskevi Zerva, Steffen Zschaler, Simon Miles. 1-12 [doi]
- MADCAT: A Methodology for Architecture and Deployment of Cloud Application TopologiesChristian Inzinger, Stefan Nastic, Sanjin Sehic, Michael Vögler, Fei Li, Schahram Dustdar. 13-22 [doi]
- Provenance of Feedback in Cloud ServicesKahina Hamadache, Paraskevi Zerva. 23-34 [doi]
- Concurrent Test Algebra Execution with Combinatorial TestingWei-Tek Tsai, Jie Luo, Guanqiu Qi, Wenjun Wu 0001. 35-46 [doi]
- Correct-by-Construction Web Service ArchitectureEmmanouela Stachtiari, Nikos Vesyropoulos, George Kourouleas, Christos K. Georgiadis, Panagiotis Katsaros. 47-58 [doi]
- Test-Algebra Execution in a Cloud EnvironmentWenjun Wu 0001, Wei-Tek Tsai, Chao Jin, Guanqiu Qi, Jie Luo. 59-69 [doi]
- SOFIA: An Algebraic Specification Language for Developing ServicesDongmei Liu, Hong Zhu, Ian Bayley. 70-75 [doi]
- WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS MetamodelsKeith de Souza, Marcelo Fantinato. 76-81 [doi]
- DLSM: Decoupled Live Storage Migration with Distributed Device Mapper StorageZhaoning Zhang, Ziyang Li, Kui Wu, Huiba Li, Yuxing Peng, Xicheng Lu. 82-89 [doi]
- A Practical Tool for Automating Service Oriented Software Product Lines DerivationSalwa Mohamed Alzahmi, Mohammad Abu-Matar, Rabeb Mizouni. 90-97 [doi]
- Towards an Organizational Strategic Alignment Driven by Business Level AgreementsCarolina Melo, Marcelo Fantinato, Violeta Sun, Edmir P. V. Prado. 98-109 [doi]
- A Goal-Directed Modeling Technique towards Business ProcessYuqun Zhang, Dewayne E. Perry. 110-121 [doi]
- Customized Infrastructures for Monitoring Business ProcessesMarco Comuzzi, Ruben Ivan Rafael Martinez. 122-127 [doi]
- Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS)Wei-Tek Tsai, Peide Zhong. 128-139 [doi]
- A QoS-Aware Load Balancing Policy in Multi-tenancy EnvironmentHailong Sun, Tao Zhao, Yu Tang, Xudong Liu. 140-147 [doi]
- Tenant Level Checkpointing of Meta-data for Multi-tenancy SaaSBasel Yousef, Hong Zhu, Muhammad Younas. 148-153 [doi]
- Online Community Evolution Using Mediation System in SOAJihad Kheireddine Itani, Eric Gouardères, Philippe Aniorté. 154-155 [doi]
- Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0Yingchao Zhang, Zhiping Jiang, Xiaohao Yu, Xiaoqiang Song. 156-157 [doi]
- Restructuring Web Service Interfaces to Support EvolutionDavid Webster, Paul Townend, Jie Xu. 158-159 [doi]
- Service Discovery in 6LoWPANs: Classification and ChallengesBadis Djamaa, Mark Richardson, Nabil Aouf, Bob Walters. 160-161 [doi]
- A Community-Driven Workflow Recommendations and Reuse InfrastructureJia Zhang, Chris Lee, Sean Xiao, Petr Votava, Tsengdar J. Lee, Ramakrishna R. Nemani, Ian T. Foster. 162-172 [doi]
- Using Sequential Pattern Mining and Interactive Recommendation to Assist Pipe-like Mashup DevelopmentXinyi Liu, Hailong Sun, Hanxiong Wu, Richong Zhang, Xudong Liu. 173-180 [doi]
- Towards Knowledge Discovery in Big DataRichard K. Lomotey, Ralph Deters. 181-191 [doi]
- Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical SystemsNaushin Nower, Yasuo Tan, Azman Osman Lim. 192-197 [doi]
- A Service Oriented Architecture for Linked Data IntegrationPierre De Vettor, Michael Mrissa, Djamal Benslimane, Salim Berbar. 198-203 [doi]
- Load Balancer as a Service in Cloud ComputingMazedur Rahman, Samira Iqbal, Jerry Gao. 204-211 [doi]
- Test as a Service: A Framework for Web Security TaaS Service in Cloud EnvironmentYuan-Hsin Tung, Chen-Chiu Lin, Hwai-Ling Shan. 212-217 [doi]
- Towards Application Portability in Platform as a ServiceStefan Kolb, Guido Wirtz. 218-229 [doi]
- Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case StudyDong Sun, Rong Peng, Wei-Tek Tsai. 230-236 [doi]
- Developing Service Oriented Robot Control SystemDavide Brugali, Andrea Fernandes da Fonseca, Andrea Luzzana, Yamuna Maccarana. 237-242 [doi]
- Folksonomy-Based In-Depth Annotation of Web ServicesYan Li, Jinhua Xiong, Xinran Liu, Hong Zhang, Peng Zhang. 243-249 [doi]
- Domain-Oriented Evaluation and Prediction for Documentation Quality of Web ServicesZhen Zhang, Zhiyong Feng, Shizhan Chen. 250-257 [doi]
- A Description and Retrieval Model for Web Services Including Extended Semantic and Commercial AttributesJonas Keppeler, Philipp Brune, Heiko Gewald. 258-265 [doi]
- MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed SystemsJingwen Zhou, Zhenbang Chen, Haibo Mi, Ji Wang. 266-271 [doi]
- A PCA-Based Traffic Monitoring Approach for Distributed Computing SystemsLi Zhao, Ge Fu, Qian Liu, Xinran Liu, Wei Cao. 272-277 [doi]
- DETS: A Dynamic and Elastic Task Scheduler Supporting Multiple Parallel SchemesHanglong Zhan, Lianghuan Kang, Donggang Cao. 278-283 [doi]
- Elastic Allocator: An Adaptive Task Scheduler for Streaming Query in the CloudZheng Han, Rui Chu, Haibo Mi, Huaimin Wang. 284-289 [doi]
- A Hierarchical Matrix Factorization Approach for Location-Based Web Service QoS PredictionPinjia He, Jieming Zhu, Jianlong Xu, Michael R. Lyu. 290-295 [doi]
- CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual MachinesZiyang Li, Zhaoning Zhang, Huiba Li, Yuxing Peng. 296-301 [doi]
- Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification ModelHaibo Mi, Huaimin Wang, Zhenbang Chen, Yangfan Zhou. 302-307 [doi]
- A Discrete Data Dividing Approach for Erasure-Code-Based Storage ApplicationsWeidong Sun, Yijie Wang, Yongquan Fu, Xiaoqiang Pei. 308-313 [doi]
- VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory DeduplicationYumei Huang, Renyu Yang, Lei Cui, Tianyu Wo, Chunming Hu, Bo Li 0005. 314-319 [doi]
- Dynamic Data Deduplication in Cloud StorageWaraporn Leesakul, Paul Townend, Jie Xu. 320-325 [doi]
- PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open EnvironmentYan Ding, Huaimin Wang, Songzheng Chen, Xiaodong Tang, Hongyi Fu, Peichang Shi. 326-331 [doi]
- Malicious Code Detection for Android Using Instruction SignaturesHu Ge, Li-ting, Dong Hang, Yu Hewei, Zhang Miao. 332-337 [doi]
- ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social ComputingYonggang Wang, Shan Yao, Jing Li, Zhongfei Xia, Hanbing Yan, Junfeng Xu. 338-343 [doi]
- Multi-tenancy in Cloud ComputingHussain Aljahdali, Abdulaziz Albatli, Peter Garraghan, Paul Townend, Lydia Lau, Jie Xu. 344-351 [doi]
- Credit-Based Incentives in Vehicular Ad Hoc NetworksYingpu Zhu, Lu Liu, John Panneerselvam, Liang-min Wang, Zhiyuan Li. 352-357 [doi]
- Customizing Scientific Data Analytic Platforms via SaaS ApproachWenjun Wu 0001, Chao Jin. 358-364 [doi]
- Modeling and Analysis of Availability for SaaS Multi-tenant ArchitectureWenbo Su, Chuang Lin, Kun Meng, Qu Liu. 365-369 [doi]
- A Fault-Tolerant Strategy of Redeploying the Lost Replicas in CloudNing Wang, Yang Yang, Zhenqiang Mi, Qing Ji, Kun Meng. 370-375 [doi]
- HLA-Based SaaS-Oriented Simulation FrameworksWei Xiong, Wei-Tek Tsai. 376-383 [doi]
- Malicious Behavior PatternsHermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato. 384-389 [doi]
- Towards a Framework to Detect Multi-stage Advanced Persistent Threats AttacksParth Bhatt, Edgar Toshiro Yano, Per Gustavsson. 390-395 [doi]
- Your WiFi Is Leaking: Building a Low-Cost Device to Infer User ActivitiesJohn S. Atkinson, John E. Mitchell, Miguel Rio, George Matich. 396-397 [doi]
- Empirical Patterns in Google Scholar Citation CountsPeter T. Breuer, Jonathan P. Bowen. 398-403 [doi]
- Structural Analysis of the Check Point PatternAbdullah A. H. Alzahrani, Amnon H. Eden, Majd Zohri Yafi. 404-408 [doi]
- A New Code Obfuscation Scheme for Software ProtectionAniket Kulkarni, Ravindra Metta. 409-414 [doi]
- Management Patterns for Smart Grid ResiliencePaul Smith, Alberto E. Schaeffer Filho. 415-416 [doi]
- Understanding Security Patterns for Socio-technical Systems via Responsibility ModellingAndrew Blyth. 417-421 [doi]
- Using Security Patterns for Modelling Security Capabilities in Grid SystemsBenjamin Aziz, Clive Blackwell. 422-427 [doi]
- Security Pattern EvaluationIshbel Duncan, Jan de Muijnck-Hughes. 428-429 [doi]
- Building On-demand Marketing SaaS for CrowdsourcingChih-Han Chu, Menghsi Wan, Yufan Yang, Jerry Gao, Lei Deng. 430-438 [doi]
- CITY FEED: A Crowdsourcing System for City GovernanceGianmario Motta, Linlin You, Daniele Sacco, Tianyi Ma. 439-445 [doi]
- A Game Theoretic Model of Software CrowdsourcingZhenghui Hu, Wenjun Wu 0001. 446-453 [doi]
- A Cloud-Based Platform for Crowdsourcing and Self-Organizing LearningWei-Tek Tsai, Guanqiu Qi. 454-458 [doi]
- Creative Computing Processes: Musical CompositionAndrew Hugill. 459-464 [doi]
- Interactive PalimpsestsJerry Fishenden. 465-469 [doi]
- Chaos and Fractal for Creative ComputingRunjie Liu, Hongji Yang. 470-473 [doi]
- Cryptanalysis of a Remote User Authentication Protocol Using Smart CardsR. Madhusudhan, Rohith Kumar S.. 474-477 [doi]
- Mitigation of Cloud-Internal Denial of Service AttacksSuaad S. Alarifi, Stephen D. Wolthusen. 478-483 [doi]
- Exploring a New Security Framework for Cloud Storage Using CapabilitiesGlenford E. Mapp, Mahdi Aiash, Brian Ondiege, Malcolm Clarke. 484-489 [doi]
- Identifying Malicious Metering Data in Advanced Metering InfrastructureEuijin Choo, Younghee Park, Huzefa Siyamwala. 490-495 [doi]
- A Cloud Trust Authority Framework for Mobile Enterprise Information SystemHongjun Dai, Qian Li, Meikang Qiu, Zhilou Yu, Zhiping Jia. 496-501 [doi]