


default search action
35th COMPSAC 2011: Munich, Germany
- Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2011, Munich, Germany, 18-22 July 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4439-7

 
Keynote Speech
- Reinhold Achatz:

From Embedded Systems to Cyber-Physical Systems: Research Challenges and Application Areas. 1 - Chris Bishop:

Embracing Uncertainty: The New Machine Learning. 2 
Joint COMPSAC/SAINT 2011 Panel
- Stephen S. Yau:

Joint COMPSAC/SAINT 2011 Panel: International Perspectiveson Computed World: Software Beyond the Digital Society. 3 
Web-Based Systems I
- Xiang Huang, Wei Wang, Wenbo Zhang, Jun Wei, Tao Huang:

An Adaptive Performance Modeling Approach to Performance Profiling of Multi-service Web Applications. 4-13 - Huirong Yang, Pengbin Fu, Baocai Yin, Mengduo Ma, Yanyan Tang:

A Semantic Similarity Measure between Web Services Based on Google Distance. 14-19 - Yufeng Zhang, Hong Zhu:

An Intelligent Broker Approach to Semantics-Based Service Composition. 20-25 - Silvio R. L. Meira, Vanilson Arruda Burégio

, Leandro Marques Nascimento, Elaine G. M. de Figueiredo, Misael Neto, Bruno P. Encarnação, Vinicius Cardoso Garcia:
The Emerging Web of Social Machines. 26-27 
Security, Dependability, and Performance I
- Thoshitha T. Gamage, Thomas P. Roth, Bruce M. McMillin

:
Confidentiality Preserving Security Properties for Cyber-Physical Systems. 28-37 - Wenbo Zhang, Sa Wang, Wei Wang, Hua Zhong:

Bench4Q: A QoS-Oriented E-Commerce Benchmark. 38-47 - Mingqiang Xue, Barbara Carminati

, Elena Ferrari
:
P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks. 48-57 
Software Testing I
- Zhenyu Zhang, W. K. Chan

, T. H. Tse
, Bo Jiang:
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs. 58-67 - Robert G. Merkel

, Fei-Ching Kuo, Tsong Yueh Chen
:
An Analysis of Failure-Based Test Profiles for Random Testing. 68-75 - Lian Yu, Xiaohu Li, Zhongjie Li:

Testing Tasks Management in Testing Cloud Environment. 76-85 
Applications
- Luis G. Crepaldi, Adriano R. Digiere, Roberta Spolon Ulson, Marcos Antonio Cavenaghi, Renata Spolon Lobato:

A Management Tool for the Replication of Operating Systems in Wireless Communication Networks. 86-92 - Yali Wu, Frank Hernandez, Peter J. Clarke

, Robert B. France:
A DSML for Coordinating User-Centric Communication Services. 93-102 - Min-Hee Jang, Si-Yong Lee, Sang-Wook Kim, Myung-Cheol Roh, Jae-Ho Lee

, Seung-Woo Nam:
On Extracting Perception-Based Features for Effective Similar Shader Retreival. 103-107 
Formal Methods
- Gianpiero Francesca, Antonella Santone, Gigliola Vaglini, Maria Luisa Villani

:
Ant Colony Optimization for Deadlock Detection in Concurrent Systems. 108-117 - Sidi Ould Biha:

A Formal Semantics of PLC Programs in Coq. 118-127 - Sujeong Woo, Jinho On, Moonkun Lee:

An Abstraction Method for Mobility and Interaction in Process Algebra Using Behavior Ontology. 128-133 
HCI and Usability I
- Tobias Heinroth, Dan Denich:

Spoken Interaction within the Computed World: Evaluation of a Multitasking Adaptive Spoken Dialogue System. 134-143 - Charles E. Downing, Chang Liu:

Assessing Web Site Usability in Retail Electronic Commerce. 144-151 - Masahiro Araki, Kana Shibahara, Yuko Mizukami:

Spoken Dialogue System for Learning Braille. 152-156 
Real-Time, Embedded and Physical Systems I
- Alexandre Chagoya-Garzon, Nicolas Poste, Frédéric Rousseau:

Semi-automation of Configuration Files Generation for Heterogeneous Multi-tile Systems. 157-166 - Jagun Kwon, Stephen Hailes:

Adaptive Bandwidth-Based Thread Group Scheduler for Compositional Real-Time Middleware Architectures. 167-175 - Jimmy Kjellsson, Martin Törngren

:
A Concept for Secure Production Programming of Embedded Industrial Field Devices. 176-181 - Chris Prokopiak, Carl Leuschen, Fernando Rodriguez-Morales

, John R. Ledford, William A. Blake, Anthony Hoch, Hilary Barbour:
Multi-node Network Based Control and Data Acquisition System for a VHF Radar Depth Sounder. 182-183 
Education and Learning
- James H. Cross II, T. Dean Hendrix, Larry A. Barowski:

Combining Dynamic Program Viewing and Testing in Early Computing Courses. 184-192 - Nancy R. Mead

, Linda M. Laird, Daniel Shoemaker:
Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational Initiatives. 193-198 - Kyle Persohn, Dennis Brylow:

Interactive Real-Time Embedded Systems Education Infused with Applied Internet Telephony. 199-204 
Software Architecture and Design I
- Mahmoud Hussein

, Jun Han, Alan W. Colman
:
An Approach to Model-Based Development of Context-Aware Adaptive Systems. 205-214 - Fadila Aoussat, Mourad Oussalah, Mohamed Ahmed-Nacer:

SPEM Extension with Software Process Architectural Concepts. 215-223 - Ying Wang, Dianfu Ma, Yongwang Zhao, Lu Zou, Xianqi Zhao:

An AADL-Based Modeling Method for ARINC653-Based Avionics Software. 224-229 
Semantic Web I
- Tao Yang, Yijian Wu, Xin Peng, Wenyun Zhao:

Fine-Grained Configuration Management for Collaborative Ontology Development. 230-238 - Nophadol Jekjantuk, Jeff Z. Pan, Yuzhong Qu:

Diagnosis of Software Models with Multiple Levels of Abstraction Using Ontological Metamodeling. 239-244 - Norman Heino, Sebastian Tramp, Sören Auer

:
Managing Web Content Using Linked Data Principles - Combining Semantic Structure with Dynamic Content Syndication. 245-250 - David Walsh, Philipp Schügerl, Juergen Rilling, Philippe Charland:

Quality Validation through Pattern Detection - A Semantic Web Perspective. 251-252 
Mobile & Pervasive Computing I
- Dhaminda B. Abeywickrama

, Sita Ramakrishnan:
Model Checking Aspectual Pervasive Software Services. 253-262 - Anna Cinzia Squicciarini

, Dan Lin, Alessandro Mancarella:
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network. 263-272 - Jun-Qing Chen, Linpeng Huang:

Supporting Dynamic Service Updates in Pervasive Applications. 273-278 
Security, Dependability, and Performance II
- Ricardo Jorge Santos, Jorge Bernardino

, Marco Vieira
:
24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable Knowledge. 279-288 - Vasilios Katos

, Dimitris Vrakas, Panagiotis Katsaros
:
A Framework for Access Control with Inference Constraints. 289-297 - Axel Schröpfer, Florian Kerschbaum, Günter Müller:

L1 - An Intermediate Language for Mixed-Protocol Secure Computation. 298-307 
Requirements Engineering I
- Michel dos Santos Soares, Jos L. M. Vrancken:

A Framework for Multi-layered Requirements Documentation and Analysis. 308-313 - Golnaz Elahi, Eric S. K. Yu, Tong Li, Lin Liu:

Security Requirements Engineering in the Wild: A Survey of Common Practices. 314-319 - Chun Kyung Lee, Thi Hien Pham, Hee-seong Kim, Hee Yong Youn:

Similarity Based Distributed Context Reasoning with Layer Context Modeling. 320-325 
Creative Computing
- Alejandro Catalá

, Javier Jaén Martínez
, Adria A. Martinez-Villaronga, José A. Mocholí:
AGORAS: Exploring Creative Learning on Tangible User Interfaces. 326-335 - Jerry Fishenden, Andrew Hugill

:
Palimpsests of Time and Place. 336-345 - Tin-Kai Chen, Hsiao-Ping Fang, Yingchun Tian, Hsiao-Lin Fang, Yan-Jie Li, Shih-Hsuan Tseng, Su-En Miao:

Design and Evaluation of Social Interfaces for Cultural Exhibitions of Chinese Shadow Puppetry. 346-347 - Xifeng Wang, Bixin Li, Li Liao, Chunli Xie:

Ontology-Based Reliability Evaluation for Web Service. 348-349 
Software Quality I
- Marek Grzegorz Stochel:

Reliability and Accuracy of the Estimation Process - Wideband Delphi vs. Wisdom of Crowds. 350-359 - P. V. R. Murthy, Saravana Kumar V., Tushar Sharma

, Kiron Rao:
Quality Model Driven Dynamic Analysis. 360-365 - Wangbong Lee, Joonkyung Lee, Jongmoon Baik:

Software Reliability Prediction for Open Source Software Adoption Systems Based on Early Lifecycle Measurements. 366-371 
Panel I
- Kenji Takahashi:

Privacy in the Cloud. 372 
Software Architecture and Design II
- Montserrat Sendín, Juan Miguel López

:
Software Infrastructure for Delivering and Supporting Distributed Applications Enhanced with Awareness. 373-382 - Jung Ho Bae, Yeon Ji Jeong, Heung Seok Chae, Carl K. Chang:

Semantics Based Cohesion and Coupling Metrics for Evaluating Understandability of State Diagrams. 383-392 - Gregor Bertrand, Florian Nothdurft, Frank Honold, Felix Schüssel:

CALIGRAPHI - Creation of Adaptive Dialogues Using a Graphical Interface. 393-400 
Security, Dependability, and Performance III
- Riccardo Lancellotti

, Mauro Andreolini
, Claudia Canali
, Michele Colajanni
:
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing. 401-406 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:

JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap. 407-412 - Napoleon Paxton, Gail-Joon Ahn

, Mohamed Shehab
:
MasterBlaster: Identifying Influential Players in Botnet Transactions. 413-419 - Smitha Sundareswaran, Anna Cinzia Squicciarini

, Ranjani Sundareswaran:
Distributed Java-Based Content Protection. 420-425 
Real-Time, Embedded and Physical Systems II
- John Meier, Christopher D. Gill, Roger D. Chamberlain:

Towards More Effective Spectrum Use Based on Memory Allocation Models. 426-435 - Pratik Maheshwari, Tianqi Li, Jong-Sung Lee, Byong-Su Seol, Sahra Sedigh

, David Pommerenke
:
Software-Based Analysis of the Effects of Electrostatic Discharge on Embedded Systems. 436-441 - Khalid Latif, Amir-Mohammad Rahmani, Kameswar Rao Vaddina, Tiberiu Seceleanu

, Pasi Liljeberg, Hannu Tenhunen:
Enhancing Performance of NoC-Based Architectures Using Heuristic Virtual-Channel Sharing Approach. 442-447 
Panel II
- Cristina Cerschi Seceleanu

:
Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives - Panel Introduction. 448-449 - Paul Pettersson:

Formal Methods Applied in Industry - On the Commercialisation of the UPPAAL Tool. 450-451 - Tiziana Margaria

:
Formal Methods in the Era of Service-Oriented Design. 452-453 - Bernhard Schätz:

From Solution to Problem Spaces: Formal Methods in the Context of Model-Based Development and Domain-Specific Languages. 454-455 
Requirements Engineering II
- Raúl Mazo, Roberto Erick Lopez-Herrejon, Camille Salinesi, Daniel Diaz

, Alexander Egyed:
Conformance Checking with Constraint Logic Programming: The Case of Feature Models. 456-465 - Golnaz Elahi, Eric S. K. Yu:

A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis. 466-475 - Daichi Kimura, Tomohisa Gotoh, Ken'ichi Ikeda:

Eliciting Considerable Requirements with Word and Customer Graphs. 476-485 
Software Evolution, Maintenance, and Life Cycle
- Philipp Schügerl, Juergen Rilling, Philippe Charland:

Reasoning about Global Clones: Scalable Semantic Clone Detection. 486-491 - Henning Femmer

, Nora Broy, Marin Zec
, Asa MacWilliams, Roland Eckl:
Dynamic Software Visualization with BusyBorg - A Proof of Concept. 492-497 - Noritoshi Atsumi

, Takashi Kobayashi
, Shinichiro Yamamoto, Kiyoshi Agusa:
An XML C Source Code Interchange Format for CASE Tools. 498-503 
Mobile & Pervasive Computing II
- Martin Werner

:
Selection and Ordering of Points-of-Interest in Large-Scale Indoor Navigation Systems. 504-509 - Subhamoy Ghosh

, Juha Savolainen, Mikko Raatikainen
, Tomi Männistö
:
Cloudifying User-Created Content for Existing Applications in Mobile Devices. 510-515 - Ulrich Bareth, Axel Küpper

:
Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone Environments. 516-521 
Panel III
- Sahra Sedigh

:
Panel III "Smart Technology" - Applications and Infrastructure. 522 
Web-Based Systems II
- Xiulei Qin, Wenbo Zhang, Wei Wang, Jun Wei, Hua Zhong, Tao Huang:

On-line Cache Strategy Reconfiguration for Elastic Caching Platform: A Machine Learning Approach. 523-534 - Achilleas Achilleos

, Nearchos Paspallis
, George A. Papadopoulos
:
Automating the Development of Device-Aware Web Services: A Model-Driven Approach. 535-540 - Wei Wang, Xiang Huang, Yunkui Song, Wenbo Zhang, Jun Wei, Hua Zhong, Tao Huang:

A Statistical Approach for Estimating CPU Consumption in Shared Java Middleware Server. 541-546 
Semantic Web II
- Luciano Bernardes de Paula, Rodolfo da Silva Villaça, Maurício F. Magalhães:

Analysis of Concept Similarity Methods Applied to an LSH Function. 547-555 - Sajjad Hussain, Jos De Roo, Ali Daniyal, Syed Sibte Raza Abidi

:
Detecting and Resolving Inconsistencies in Ontologies Using Contradiction Derivations. 556-561 - Tara Raafat, Franjo Cecelja

:
Application of Semantic Web Services for Mobile Telemedicine Service Discovery. 562-563 - Chunli Xie, Bixin Li, Xifeng Wang:

A Staged Model for Web Service Reliability. 564-565 
Software Quality II
- Xiaofeng Yang, Mohammad Zulkernine:

Security Monitoring of Components Using Aspects and Contracts in Wrappers. 566-575 - Weiqin Zou, Yan Hu, Jifeng Xuan

, He Jiang:
Towards Training Set Reduction for Bug Triage. 576-581 - Osama Sammodi, Andreas Metzger, Xavier Franch

, Marc Oriol
, Jordi Marco
, Klaus Pohl:
Usage-Based Online Testing for Proactive Adaptation of Service-Based Applications. 582-587 - Lulu Wang, Bixin Li:

A Technique of Profiling Selective Paths. 588-589 
Requirements Engineering III
- Shokoofeh Ketabchi, Navid Karimi Sani, Kecheng Liu:

A Norm-Based Approach towards Requirements Patterns. 590-595 - Pedro Patrício, Vasco Amaral

, João Araújo
, Rui Monteiro:
Towards a Unified Goal-Oriented Language. 596-601 - Feng Chen, Hong Zhou, Hongji Yang, Martin P. Ward

, William Cheng-Chung Chu:
Requirements Recovery by Matching Domain Ontology and Program Ontology. 602-607 - Bo Wei, Zhi Jin:

Characterizing the Implementation of Software Non-functional Requirements from Probabilistic Perspective. 608-609 
HCI and Usability II
- Luis A. Leiva, Verónica Romero

, Alejandro H. Toselli
, Enrique Vidal:
Evaluating an Interactive-Predictive Paradigm on Handwriting Transcription: A Case Study and Lessons Learned. 610-617 - Keiko Yamamoto

, Taku Kuriyama, Haruki Shigemori, Itaru Kuramoto, Yoshihiro Tsujino, Mitsuru Minakuchi:
Provenance Based Retrieval: File Retrieval System Using History of Moving and Editing in User Experience. 618-625 - Martin Mihajlov

, Borka Jerman-Blazic, Saso Josimovski:
Quantifying Usability and Security in Authentication. 626-629 
Software Testing II
- Fevzi Belli, Nevin Güler, Michael Linschulte:

Does "Depth" Really Matter? On the Role of Model Refinement for Testing and Reliability. 630-639 - Xiaoying Bai, Kejia Hou, Hao Lu, Yao Zhang, Linping Hu, Hong Ye:

Semantic-Based Test Oracles. 640-649 - Fevzi Belli, Mutlu Beyazit

:
Event-Based Mutation Testing vs. State-Based Mutation Testing - An Experimental Comparison. 650-655 - J. Jenny Li, John Douglas Palframan, Jim Landwehr:

SoftWare IMmunization (SWIM) - A Combination of Static Analysis and Automatic Testing. 656-661 
Software Architecture and Design III
- Wen-Lin Liu, Chung-Horng Lung, Samuel Ajila

:
Impact of Aspect-Oriented Programming on Software Performance: A Case Study of Leader/Followers and Half-Sync/Half-Async Architectures. 662-667 - Venkata Krishna Suhas Nerella, Sanjay Kumar Madria, Thomas Weigert:

Performance Improvement for Collection Operations Using Join Query Optimization. 668-673 - Pyungsun Park, Jaeil Jung, Byounghweh Huh:

Development of CAN-1394 Automotive Gateway System Using Designed Modular Software Stack. 674-679 - Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:

An Effective Approach for Automatic Generation of Class Integration Test Order. 680-681 
Security, Dependability, and Performance IV
- Yoshihiro Oyama, Youhei Hoshi:

A Hypervisor for Injecting Scenario-Based Attack Effects. 682-687 - Manghui Tu, Dianxiang Xu, Zhonghang Xia, Jicheng Fu:

Reach Availability Modeling of Replicated Services. 688-693 - Manuel Peralta, Supratik Mukhopadhyay:

Code-Change Impact Analysis Using Counterfactuals. 694-699 
Doctoral Symposium
- Dominik Sojer:

Synthesis of Fault Detection Mechanisms TRACK: Real-Time, Embedded and Physical Systems. 700-703 - Daniel Corrêa Lobato

:
Meta Reconfiguration of Adaptive Middleware Using Semantic Web and Context Information. 704-707 - Jinho On:

Onion: A Graphical Language for Process Algebra. 708-711 - Haihua Xie:

Observable Context-Based User Intention Specification in Context-Aware Environments. 712-715 - John Meier:

Towards Model-Based Policy Design Methods for More Effective Spectrum Allocation. 716-718 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














