default search action
38th COMPSAC 2014: Vasteras, Sweden
- IEEE 38th Annual Computer Software and Applications Conference, COMPSAC 2014, Vasteras, Sweden, July 21-25, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3575-8
Software Engineering I
- Daniela C. C. Peixoto, Geraldo R. Mateus, Rodolfo F. Resende:
The Issues of Solving Staffing and Scheduling Problems in Software Development Projects. 1-10 - Xiao He, Tian Zhang, Zhiyi Ma, Weizhong Shao:
Randomized Model Generation for Performance Testing of Model Transformations. 11-20 - Qin Liu, Xiaoyuan Chu, Jiakai Xiao, Hongming Zhu:
Optimizing Non-orthogonal Space Distance Using PSO in Software Cost Estimation. 21-26 - Qin Liu, Shihai Shi, Hongming Zhu, Jiakai Xiao:
A Mutual Information-Based Hybrid Feature Selection Method for Software Cost Estimation Using Feature Clustering. 27-32
Automated Analysis in Software Engineering
- Huqiu Liu, Yuping Wang, Lingbo Jiang, Shimin Hu:
PF-Miner: A New Paired Functions Mining Method for Android Kernel in Error Paths. 33-42 - Thelma Elita Colanzi, Silvia Regina Vergilio:
A Feature-Driven Crossover Operator for Product Line Architecture Design Optimization. 43-52 - Bo Zhou, Xin Xia, David Lo, Xinyu Wang:
Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files. 53-58 - Abderrahmane Leshob, Hafedh Mili, Anis Boubaker:
A Pattern Based Approach for Automatic Business Process Specialization. 59-64
Validation & Verification
- Mohammad Ali Darvish Darab, Carl K. Chang:
GUIDiVa: Automated Discovery and Validation of State-Based GUI Invariants. 65-74 - Selim Ciraci, Jason C. Fuller, Jeff A. Daily, Atefe Makhmalbaf, David Callahan:
A Runtime Verification Framework for Control System Simulation. 75-84 - Markus Riedl-Ehrenleitner, Andreas Demuth, Alexander Egyed:
Towards Model-and-Code Consistency Checking. 85-90 - Alexander Bolotov, Vasilyi Shangin:
Tackling Incomplete System Specifications Using Natural Deduction in the Paracomplete Setting. 91-96
Bug Reports
- Geunseok Yang, Tao Zhang, Byungjeong Lee:
Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports. 97-106 - Xin Xia, David Lo, Weiwei Qiu, Xingen Wang, Bo Zhou:
Automated Configuration Bug Report Prediction Using Text Mining. 107-116 - Meng-Jie Lin, Cheng-Zen Yang:
An Improved Discriminative Model for Duplication Detection on Bug Reports with Cluster Weighting. 117-122 - Kaiping Liu, Hee Beng Kuan Tan:
Faceted Bug Report Search with Topic Model. 123-128
Service & Application
- Toni Mastelic, Ivona Brandic, Andrés García-García:
Towards Uniform Management of Cloud Services by Applying Model-Driven Development. 129-138 - Huihong He, Zhiyi Ma, Hongjie Chen, Dan Wu, Huanhuan Liu, Weizhong Shao:
An SLA-Driven Cache Optimization Approach for Multi-tenant Application on PaaS. 139-148 - Dapeng Dong, John Herbert:
FSaaS: File System as a Service. 149-154 - Viktor Kolokolov, Stefan T. Ruehl, Paul Baumann, Shaozhen Zhang, Stephan A. W. Verclas:
Modelling Variability in Activity Diagrams for Mobile Business Applications. 155-160
Quality Assurance and Assessment I
- Chung Man Tang, W. K. Chan, Yuen-Tak Yu:
Extending the Theoretical Fault Localization Effectiveness Hierarchy with Empirical Results at Different Code Abstraction Levels. 161-170 - Ron S. Kenett, Xavier Franch, Angelo Susi, Nikolas Galanis:
Adoption of Free Libre Open Source Software (FLOSS): A Risk Management Perspective. 171-180 - Marcelo Medeiros Eler, André Takeshi Endo, Vinicius H. S. Durelli:
Quantifying the Characteristics of Java Programs That May Influence Symbolic Execution from a Test Data Generation Perspective. 181-190
Spec & Requirements
- Lin Liu, Tianying Li, Xiaoxi Kou:
Eliciting Relations from Natural Language Requirements Documents Based on Linguistic and Statistical Analysis. 191-200 - Lianyi Zhang, Qingdi Meng, Guiming Luo:
Counterexample-Guided Abstraction Refinement for Component-Based Systems. 201-210 - Sungwon Kang, Jingyu Kim, Sungju Kang, Seokhwan Eom:
A Formal Representation of Platform Feature-to-Requirement Traceability for Software Product Line Development. 211-218
Software Engineering II
- Zhifei Chen, Lin Chen, Yuming Zhou, Zhaogui Xu, William C. Chu, Baowen Xu:
Dynamic Slicing of Python Programs. 219-228 - Venkata Krishna Suhas Nerella, Sanjay Madria, Thomas Weigert:
Efficient Caching and Incrementalization of Object Queries on Collections in Programming Codes. 229-238 - Xiaozhen Xue, Yulei Pang, Akbar Siami Namin:
Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations. 239-244 - Rasha Osman, Arilo Claudio Dias-Neto:
Motivating by Examples: An Empirical Study of Teaching an Introductory Software Engineering Course in Brazil. 245-250
Quality Assurance and Assessment II
- Huan Luo, Yuan Dong, Yiying Ng, Shengyuan Wang:
VertexRank: Importance Rank for Software Network Vertices. 251-260 - Luxi Chen, Linpeng Huang, Chen Li, Linzhu Wu, Weichao Luo:
Design and Safety Analysis for System Architecture: A Breeze/ADL-Based Approach. 261-266 - Xuling Chang, Linpeng Huang, Jianpeng Hu, Chen Li, Bei Cao:
Transformation from Activity Diagrams with Time Properties to Timed Coloured Petri Nets. 267-272 - Hend Alrasheed, Austin Melton:
Understanding and Measuring Nesting. 273-278
Network Traffic
- Safaa Dawoud, Abdulbaki Uzun, Sebastian Göndör, Axel Küpper:
Optimizing the Power Consumption of Mobile Networks Based on Traffic Prediction. 279-288 - Yuta Morisawa, Yoshihiro Kawahara, Tohru Asami:
Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming Network. 289-298 - Antoine Varet, Nicolas Larrieu:
How to Generate Realistic Network Traffic? 299-304 - Soshi Hirono, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks. 305-310
Embedded Systems
- Ryohei Banno, Susumu Takeuchi, Michiharu Takemoto, Tetsuo Kawano, Takashi Kambayashi, Masato Matsuo:
A Distributed Topic-Based Pub/Sub Method for Exhaust Data Streams towards Scalable Event-Driven Systems. 311-320 - Jung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, Lui Sha:
Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics Systems. 321-331 - Marisol García-Valls, Diego Perez-Palacin, Raffaela Mirandola:
Time-Sensitive Adaptation in CPS through Run-Time Configuration Generation and Verification. 332-337 - Antero Taivalsaari, Tommi Mikkonen, Kari Systä:
Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software Architecture. 338-343
Empirical Study
- Everton T. Guimarães, Alessandro F. Garcia, Yuanfang Cai:
Exploring Blueprints on the Prioritization of Architecturally Relevant Code Anomalies - A Controlled Experiment. 344-353 - Anderson Marcolino, Edson OliveiraJr, Itana Maria de Souza Gimenes, Ellen Francine Barbosa:
Empirically Based Evolution of a Variability Management Approach at UML Class Level. 354-363 - Saleh Almugrin, Waleed Albattah, Omar Alaql, Musaad Alzahrani, Austin Melton:
Instability and Abstractness Metrics Based on Responsibility. 364-373 - Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed:
Your Phone Knows You: Almost Transparent Authentication for Smartphones. 374-383 - Kevin Allix, Quentin Jérome, Tegawendé F. Bissyandé, Jacques Klein, Radu State, Yves Le Traon:
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? 384-393 - Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis. 394-399 - Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks. 400-405
Defect Prediction
- Biwen Li, Beijun Shen, Jun Wang, Yuting Chen, Tao Zhang, Jinshuang Wang:
A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model. 406-415 - Huihua Lu, Bojan Cukic, Mark Vere Culp:
A Semi-supervised Approach to Software Defect Prediction. 416-425 - Shulong Liu, Xiang Chen, Wangshu Liu, Jiaqiang Chen, Qing Gu, Daoxu Chen:
FECAR: A Feature Selection Framework for Software Defect Prediction. 426-435
Plenary Panel
- Elisa Bertino:
Security with Privacy - Opportunities and Challenges: Panel Position Paper. 436-437
Network Application and Configuration
- Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:
A Low Cost Hierarchy-Awareness Extension of Skip Graph for World-Wide Range Retrievals. 438-445 - Jiaxing Zhang, Hanjiao Qiu, Salar Shahini Shamsabadi, Ralf Birken, Gunar Schirner:
SIROM3 - A Scalable Intelligent Roaming Multi-modal Multi-sensor Framework. 446-455
Web Technology
- Yanchun Sun, Dejian Chen, Wenpin Jiao, Gang Huang:
An Online Education Approach Using Web Operation Record and Replay Techniques. 456-465 - Sharath Chowdary Gude, Munawar Hafiz, Allen Wirfs-Brock:
JavaScript: The Used Parts. 466-475 - Bahtijar Vogel, Arianit Kurti, Tommi Mikkonen, Marcelo Milrad:
Towards an Open Architecture Model for Web and Mobile Software: Characteristics and Validity Properties. 476-485
Virtual Machine
- Ikuo Nakagawa, Kohei Ichikawa, Tohru Kondo, Yoshiaki Kitaguchi, Hiroki Kashiwazaki, Shinji Shimojo:
Transpacific Live Migration with Wide Area Distributed Storage. 486-492 - Edward Y. Y. Kan, Wing Kwong Chan, T. H. Tse:
CrowdAdaptor: A Crowd Sourcing Approach toward Adaptive Energy-Efficient Configurations of Virtual Machines Hosting Mobile Applications. 493-502 - Jiwei Xu, Wenbo Zhang, Shiyang Ye, Jun Wei, Tao Huang:
A Lightweight Virtual Machine Image Deduplication Backup Approach in Cloud Environment. 503-508
Emergent Topics
- Yiying Ng, Hucheng Zhou, Zhiyuan Ji, Huan Luo, Yuan Dong:
Which Android App Store Can Be Trusted in China? 509-518 - Shohe Ito, Takuya Yoshida, Fumiko Harada, Hiromitsu Shimakawa:
Specific Touch Gesture on Mobile Devices to Find Attractive Phrases in News Browsing. 519-528 - Murtadha N. Albasrawi, Nathan Jarus, Kamlesh A. Joshi, Sahra Sedigh Sarvestani:
Analysis of Reliability and Resilience for Smart Grids. 529-534 - Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Generating Accessible Multimodal User Interfaces Using MDA-Based Adaptation Approach. 535-540
Network Performance
- Naoki Oguchi, Shunji Abe:
Performance Evaluation of Reconfigurable TCP Communication on Wi-Fi Network Using GE Channel Model. 541-550 - Koki Okamoto, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira:
Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment. 551-557 - Marcus Jägemar, Sigrid Eldh, Andreas Ermedahl, Björn Lisper:
Adaptive Online Feedback Controlled Message Compression. 558-567
Social Networks
- Sho Tsugawa, Hiroyuki Ohsaki:
Emergence of Fractals in Social Networks: Analysis of Community Structure and Interaction Locality. 568-575 - Akihiro Fujihara, Hiroyoshi Miwa:
Homesick Lévy Walk: A Mobility Model Having Ichi-Go Ichi-e and Scale-Free Properties of Human Encounters. 576-583 - Lin Zhang, Mingxuan Yuan, Yao Guo, Xiangqun Chen, Lei Chen:
Preserving Location-Related Privacy Collaboratively in Geo-social Networks. 584-589 - Ivor D. Addo, Ji-Jiang Yang, Sheikh Iqbal Ahamed:
SPTP: A Trust Management Protocol for Online and Ubiquitous Systems. 590-595 - Jihyun Lee, Sungwon Kang:
Towards Test Architecture Based Software Product Line Testing. 596-597 - Hyun-Il Lim:
Comparing Control Flow Graphs of Binary Programs through Match Propagation. 598-599 - Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori:
Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors. 600-601 - Makoto Kato, Saeko Matsuura:
Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware. 602-603 - Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa:
Predicting Release Time Based on Generalized Software Reliability Model (GSRM). 604-605
Industry Papers
- Kellyton dos Santos Brito, Marcos Antônio da Silva Costa, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira:
Experiences Integrating Heterogeneous Government Open Data Sources to Deliver Services and Promote Transparency in Brazil. 606-607 - Tatsuya Osawa, Jun Shimamura, Yukinobu Taniguchi:
Operation Support System Based on Augmented Reality Technology. 608-609 - Tomoaki Umeki, Yoshinori Kitatsuji:
On Architecture for QoS-Aware Packet Aggregation. 610-611 - Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, Aneesh Krishna:
Software-as-a-Service Solution Implementation - Data Migration Perspective. 612-613
Doctoral Symposium and Posters
- Rafia Inam:
Performance Preservation Using Servers for Predictable Execution and Integration. 614-617 - Shota Agemura, Hiroyuki Ohsaki:
Exploratory Performance Analysis of Microbot Swarm in Three-Dimensional Field. 618-621 - Kohei Tsutsumi, Hiroyuki Ohsaki, Hideaki Suzuki:
A Distributed Flow Control with Backward Propagation: Algorithm and Preliminary Performance Evaluation. 622-625 - Ingo Richter, Robert Lindermeier, Michael Weber:
A Model for Distributed Agile Release Planning: Doctoral Symposium Paper. 626-629 - Florian Raith, Robert Lindermeier:
Media Supported Workspaces in Agile Software Development: Doctoral Symposium Paper. 630-633 - Xiwei Zhuang, Yanchun Sun, Kui Wei:
SMoCoR: A Smart Mobile Contact Recommender Based on Smart Phone Data. 634-635 - Takuya Iwai, Daichi Kominami, Masayuki Murata, Tetsuya Yomo:
Thermodynamics-Based Entropy Adjustment for Robust Self-Organized Network Controls. 636-637 - Hiroki Yanaga, Daiki Nobayashi, Takeshi Ikenaga:
Expiration Timer Control Method for QoS-Aware Packet Chunking. 638-639 - Dana Petcu:
A Taxonomy for SLA-Based Monitoring of Cloud Security. 640-641 - Maria Salama, Ahmed Shawish:
A QoS-Oriented Inter-cloud Federation Framework. 642-643 - Toru Kobayashi:
Information Orchestration System for Closing the Information Retrieval Capability Gap. 644-645 - Ondrej Kupka, Filip Zavoral:
Cider: An Event-Driven Continuous Integration Server. 646-647
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.