


default search action
40th COMPSAC 2016: Atlanta, GA, USA
- 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-8845-0

 
SETA: COMPSAC Symposium on Software Engineering Technology and Applications
- Doris L. Carver, Wing Kwong Chan

, Hongji Yang, Xiaodong Liu, Carl K. Chang, Hridesh Rajan
:
Message from the SETA Organizing Committee. 1 
Session 1: Static Analysis
- Xi Cheng, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun:

Automatic Fix for C Integer Errors by Precision Improvement. 2-11 - Yufei Jiang, Dinghao Wu, Peng Liu:

JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. 12-21 - Xinli Yang, David Lo

, Xin Xia
, Jianling Sun:
Condensing Class Diagrams With Minimal Manual Labeling Cost. 22-31 
Session 2: Operation and Management
- Chunyan Hou, Chen Chen, Jinsong Wang, Kai Shi:

Reliability Analysis for Software Cluster Systems Based on Proportional Hazard Model. 32-41 - Wei Chen, Heng Wu, Jun Wei, Hua Zhong, Tao Huang:

Determine Configuration Entry Correlations for Web Application Systems. 42-52 - Prerna Juneja, Divya Kundra, Ashish Sureka:

Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models Generated by Mining Event-Log Data in Issue Tracking Systems. 53-62 
Session 3: Mining Software Repositories
- Xuyang Cai, Jiangang Zhu, Beijun Shen, Yuting Chen:

GRETA: Graph-Based Tag Assignment for GitHub Repositories. 63-72 - Xin Xia

, David Lo
, Denzil Correa, Ashish Sureka, Emad Shihab:
It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta Features. 73-82 - Chunyang Chen

, Zhenchang Xing:
Towards Correlating Search on Google and Asking on Stack Overflow. 83-92 
Session 4: Prediction and Summarization
- Zhenzheng Qian, Beijun Shen, Wenkai Mo, Yuting Chen:

SatiIndicator: Leveraging User Reviews to Evaluate User Satisfaction of SourceForge Projects. 93-102 - Jinfeng Shen, Xiaobing Sun

, Bin Li, Hui Yang, Jiajun Hu:
On Automatic Summarization of What and Why Information in Source Code Changes. 103-112 - Qing He, Beijun Shen, Yuting Chen:

Software Defect Prediction Using Semi-Supervised Learning with Change Burst Information. 113-122 
Session 5: Vulnerability Detection and Test Oracle
- Lei Liu, Jing Xu, Hongji Yang, Chenkai Guo, Jiehui Kang, Sihan Xu, Biao Zhang, Guannan Si:

An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability. 123-132 - Jingxuan Tu, Xiaoyuan Xie, Baowen Xu

:
Code Coverage-Based Failure Proximity without Test Oracles. 133-142 - Shuo Wen, Yuan Xue, Jing Xu, Hongji Yang, Xiaohong Li, Wenli Song, Guannan Si:

Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications. 143-153 
Session 6: Testing and Fault Prediction
- Kwabena Ebo Bennin

, Jacky W. Keung
, Akito Monden
, Yasutaka Kamei, Naoyasu Ubayashi
:
Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction Models. 154-163 - Min Zhou, Xi Cheng, Xinrui Guo, Ming Gu, Hongyu Zhang

, Xiaoyu Song:
Improving Failure Detection by Automatically Generating Test Cases Near the Boundaries. 164-173 - Rubing Huang

, Weiwen Zong, Jinfu Chen, Dave Towey
, Yunan Zhou, Deng Chen
:
Prioritizing Interaction Test Suites Using Repeated Base Choice Coverage. 174-184 
Session 7: Debugging
- Zhendong Shi

, Jacky W. Keung
, Kwabena Ebo Bennin
, Nachai Limsettho, Qinbao Song:
A Strategy to Determine When to Stop Using Automatic Bug Localization. 185-190 - Yuanchi Guo, Xiaoyi Zhang, Zheng Zheng:

Exploring the Instability of Spectra Based Fault Localization Performance. 191-196 - Tao Ji, Liqian Chen, Xiaoguang Mao

, Xin Yi:
Automated Program Repair by Using Similar Code Containing Fix Ingredients. 197-202 
Session 8: Formal Methods
- Hend Alrasheed

, Austin Melton:
Scope of Selection Nodes in Object Oriented Programs. 203-208 - Jufu Liu, Kaiqiang Jiang, Xiao Wang, Bei Cheng, Dehui Du:

Improved Co-Simulation with Event Detection for Stochastic Behaviors of CPSs. 209-214 - Sangeeta Lal, Neetu Sardana, Ashish Sureka:

LogOptPlus: Learning to Optimize Logging in Catch and If Programming Constructs. 215-220 - Wanling Xie, Huibiao Zhu, Xi Wu, Shuangqing Xiang, Jian Guo:

Modeling and Verifying HDFS Using CSP. 221-226 
Session 9: Empirical Study
- Xinli Yang, David Lo

, Qiao Huang, Xin Xia
, Jianling Sun:
Automated Identification of High Impact Bug Reports Leveraging Imbalanced Learning Strategies. 227-232 - Nimanthi L. Atukorala, Carl K. Chang, Katsunori Oyama:

Situation-Oriented Requirements Elicitation. 233-238 - Hui Yang, Xiaobing Sun

, Bin Li, Yucong Duan:
DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files. 239-244 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:

Modeling and Analyzing Cost and Utilization Based Task Scheduling for Cloud Application. 245-250 
Session 10: Exploratory Study
- Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen:

Human Subject Evaluation of Computer-Security Training Recommender. 251-256 - Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:

A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities. 257-262 - Junhua Ding, Dongmei Zhang:

An Approach for Iteratively Generating Adequate Tests in Metamorphic Testing: A Case Study. 263-268 - Tianchi Liu, Chun Cao, Jie Chen, Ziling Lu, Xiaoxing Ma

:
Apsaras: Efficient Allocation of Physical Devices for Android Testing. 269-274 - Haiying Sun, Mingsong Chen, Min Zhang

, Jing Liu, Ying Zhang:
Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity Diagrams. 275-280 
ECPE: COMPSAC Symposium on Embedded & Cyber-Physical Environments
- Tiberiu Seceleanu

, Tiziana Margaria
, Rajesh Subramanyan, Michele Bugliesi
, Cristina Seceleanu
, Bruce M. McMillin:
Messge from the ECPE Organizing Committee. 281 
ECPE Invited Talk
- Aditya P. Mathur:

Designing [Secure] Complex Critical Public Infrastructure. 282 
Session 1: Model-Driven Development
- Sridhar Adepu, Aditya Mathur:

Generalized Attacker and Attack Models for Cyber Physical Systems. 283-292 - Adrian Lizarraga, Roman L. Lysecky, Jonathan Sprinkle

:
Model-Driven Optimization of Data-Adaptable Embedded Systems. 293-302 
Session 2: System Design and Tools
- Eduardo Germano da Silva, Anderson Santos da Silva, Juliano Araújo Wickboldt

, Paul Smith
, Lisandro Zambenedetti Granville
, Alberto E. Schaeffer Filho
:
A One-Class NIDS for SDN-Based SCADA Systems. 303-312 - Jing Liu, Jiahao Li, Lulu He:

A Comparative Study of the Effects of Pull Request on GitHub Projects. 313-322 - Luka Lednicki, Gaetana Sapienza, Morgan E. Johansson, Tiberiu Seceleanu

, Daniel Hallmans:
Integrating Version Control in a Standardized Service-Oriented Tool Chain. 323-328 
Session 3: Specification and Verification
- Hela Ben Salah, Adel Benzina

, Mohamed Khalgui
:
Verification of Reconfigurable NoC under Quality of Service Constraints. 329-334 - Li Han, Jing Liu, Tingliang Zhou, Junfeng Sun, Xiaohong Chen:

Safety Requirements Specification and Verification for Railway Interlocking Systems. 335-340 
ITiP: COMPSAC Symposium on IT in Practice
- Maria R. Lee, San Murugesan

, Steven Diamond:
Message from the ITiP Symposium Chairs. 341 
ITiP Invited Talk
- Simon Y. Liu:

Data-Intensive Research & Scientific Discovery. 342 - Joseph Williams:

How IT Leadership Will Change by 2020 and Why it Matters. 343 
Session 1: Healthcare Support Systems
- Fulvio Corno

, Luigi De Russis
, Alberto Monge Roffarello
:
A Healthcare Support System for Assisted Living Facilities: An IoT Solution. 344-352 - Joyce M. S. França, Josimar de S. Lima, Michel S. Soares:

A Case Study on SoaML to Design an Electronic Health Record Application Considering Integration of Legacy Systems. 353-358 
Session 2: Internet of Things
- Prithviraj Patil, Akram Hakiri

, Aniruddha S. Gokhale
:
Cyber Foraging and Offloading Framework for Internet of Things. 359-368 - Zhenyun Zhuang, Sergiy Zhuk, Haricharan Ramachandra, Badri Sridharan:

Designing SSD-Friendly Applications for Better Application Performance and Higher IO Efficiency. 369-378 
Session 3: IT Service Applications
- Kayhan Moharreri, Jayashree Ramanathan, Rajiv Ramnath:

Probabilistic Sequence Modeling for Trustworthy IT Servicing by Collective Expert Networks. 379-389 - Rasib Khan, Ragib Hasan

:
The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users. 390-395 - John R. Michener, Aaron T. Clager:

Mitigating an Oxymoron: Compliance in a DevOps Environments. 396-398 
SEPT: COMPSAC Symposium on Security, Privacy and Trust in Computing
- Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:

Message from the SEPT Organizing Committee. 399 
SEPT Invited Talk
- Elisa Bertino:

Data Security and Privacy: Concepts, Approaches, and Research Directions. 400-407 
Session 1: Attack Protection
- Sevtap Duman

, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda:
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. 408-416 - Ragib Hasan

, Shams Zawoad, Shahid Al Noor, Md Munirul Haque, Darrell Burke:
How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis. 417-422 
Session 2: Cloud Security
- Shams Zawoad, Ragib Hasan

:
Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation. 423-432 - Zhengping Wu, Yu Zhou:

Customized Cloud Service Trustworthiness Evaluation and Comparison Using Fuzzy Neural Networks. 433-442 - Yan Zhu

, Ruiqi Guo, Guohua Gan, Wei-Tek Tsai:
Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain. 443-448 
Session 3: Mobile and Privacy
- Abeer Al Jarrah, Mohamed Shehab

:
Maintaining User Interface Integrity on Android. 449-458 - Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:

Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information. 459-464 - Yuhong Liu, Na Li:

An Advanced Collusion Attack against User Friendship Privacy in OSNs. 465-470 
Session 4: Authentication and Access Control
- Yong Wang, Shi-meng Gao, Junhao Zhang, Xiao Nie, Xiaoran Duan, Juguang Chen:

Authenticating Multiple User-Defined Spatial Queries. 471-480 - Sara Sartoli, Akbar Siami Namin:

Adaptive Reasoning for Context-Sensitive Access Controls. 481-486 - Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura:

User Identification of Pseudonyms without Identity Information Exposure in Access Federations. 487-492 
Doctoral Symposium
- Mohammad Adibuzzaman, Hiroyuki Ohsaki, Satish Puri

, Qinghua Lu:
Message from the Doctoral Symposium Co-Chairs. 493 
Doctoral Symposium Session 1
- Ryo Nakamura, Hiroyuki Ohsaki:

Performance Comparison of Shortest-Path Routing and Optimal Detour Routing in Content-Centric Networking. 494-495 - Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki:

Analysis of Message Delivery Delay in Geographic DTN Routing. 496-497 - Sara Sartoli, Akbar Siami Namin:

Adaptive Reasoning in the Presence of Imperfect Security Requirements. 498-499 
Doctoral Symposium Session 2
- Minzhe Guo, Prabir Bhattacharya:

Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models. 500-501 - Sanish Rai, Xiaolin Hu:

Graph Based Agent Oriented Model for Tunnel Simulation. 502-503 - Zhibo Wang, Yanqing Zhang:

A Text Information Retrieval Method by Integrating Global and Local Textual Information. 504-505 
HCSC: COMPSAC Symposium on Human and Social Computing
- Yuhong Liu, Symeon Papadopoulos, Rene Kaiser

, Moushumi Sharmin:
Message from the HCSC Organizing Committee. 506 
HCSC Invited Talk
- Munmun De Choudhury:

Opportunities and Challenges of Social Media in Personal and Societal Well-being. 507 - Yao Xie:

Detecting Weak Changes over a Network of Streaming Events. 508 - Yuhong Liu, Wenqi Zhou:

Can You Really Make Profit from Online Rating Manipulations?: An Empirical Study. 509-518 - Mohammad Hashemi, John Herbert:

A Next Application Prediction Service Using the BaranC Framework. 519-523 
Session 2: Data Mining and Community Detection
- Xiang Li, Yong Tan, Ziyang Zhang, Qiuli Tong:

Community Detection in Large Social Networks Based on Relationship Density. 524-533 
TAIN: COMPSAC Symposium on Technologies and Applications of the Internet
- Tugkan Tuglular

, Ying Cai:
Message from the TAIN Program Co-chairs. 534 
Session 1: Network Protocols and Applications
- Shuoshuo Chen, Xiang Ji, Malathi Veeraraghavan, Steve Emmerson, Joseph Slezak, Steven G. Decker

:
A Cross-Layer Multicast-Push Unicast-Pull (MPUP) Architecture for Reliable File-Stream Distribution. 535-544 - Hossein Fotouhi

, Aida Causevic, Kristina Lundqvist, Mats Björkman:
Communication and Security in Health Monitoring Systems - A Review. 545-554 - Dae-Hyeok Mun, Minh Le Dinh, Young-Woo Kwon

:
An Assessment of Internet of Things Protocols for Resource-Constrained Applications. 555-560 
WEDA: COMPSAC Symposium on Web, Big Data & Analytics
- Tugkan Tuglular, Ying Cai, Duygu Çelik, Mei-Ling Shyu, Tian Xia:

Message from the WEDA 2016 Program Chairs. 561 
WEDA Keynote
- Ling Liu:

Big Graph Analytics: Models, Platforms and Optimizations. 562 
Session 1: Data Analytics
- Joseph Lemley

, Filip Jagodzinski, Razvan Andonie
:
Big Holes in Big Data: A Monte Carlo Algorithm for Detecting Large Hyper-Rectangles in High Dimensional Data. 563-571 
Session 2: Semantics Discovery and Management
- Aki-Hiro Sato

, Hidefumi Sawai:
Risk Assessment for a Global Air Transport System Using Socioeconomic-Technological-Environmental Databases. 572-581 - Wenkai Mo, Jiangang Zhu, Zhenzheng Qian, Beijun Shen:

SOLinker: Constructing Semantic Links between Tags and URLs on StackOverflow. 582-591 - Brian McClanahan, Swapna S. Gokhale:

Centrality and Cluster Analysis of Yelp Mutual Customer Business Graph. 592-601 
Session 3: Big Data Applications
- Kazuyuki Shudo, Takashi Yaguchi:

Causal Consistency for Distributed Data Stores and Applications as They are. 602-607 - Changyuan Wang, Zongfei Lu, Yang Liu, Shanqing Guo, Xin-Shun Xu, Shijun Liu, Li-zhen Cui:

SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale. 608-613 - Mehmet Ulas Cakir, Seren Guldamlasioglu:

Text Mining Analysis in Turkish Language Using Big Data Tools. 614-618 - Huihong He, Haibin Zhai, Qian Liu, Yong Wang:

Using Object-Oriented Big Data Analytics to Reveal Server Performance Dead Zone. 619-624 
Session 4: Semantics Discovery and Management
- Saleh Albahli

, Austin Melton:
TripleFCA: FCA-Based Approach to Enhance Semantic Web Data Management. 625-630 - Walid Shalaby

, Khalifeh AlJadda, Mohammed Korayem, Trey Grainger:
Entity Type Recognition Using an Ensemble of Distributional Semantic Models to Enhance Query Understanding. 631-636 
NATA: COMPSAC Symposium on Novel Applications and Technology Advances in Computing
- Ali R. Hurson

, Ji-Jiang Yang, Behrooz A. Shirazi, Alfredo Cuzzocrea, Toyokazu Akiyama, Sahra Sedigh Sarvestani
, Sheikh Iqbal Ahamed:
Message from the NATA Organizing Committee. 637 
Session 1: IoT Application and Middleware
- Mohsen Amiribesheli

, Abdelhamid Bouchachia:
Towards Dementia-Friendly Smart Homes. 638-647 - Yuuichi Teranishi, Nozomu Nishinaga:

Building a Large-Scale Distributed Live Video Analysis System for Movement of Pedestrians in Urban Areas. 648-657 - Amine Lotfi Bourbia, Heesuk Son, Byoungheon Shin, Taehun Kim, Dongman Lee, Soon J. Hyun:

Temporal Dependency Rule Learning Based Group Activity Recognition in Smart Spaces. 658-663 
Session 2: Cloud Computing
- Xiaomin Zhu, Yabing Zha, Ling Liu, Peng Jiao:

General Framework for Task Scheduling and Resource Provisioning in Cloud Computing Systems. 664-673 - Alfredo Cuzzocrea, Enzo Mumolo, Nicola Timeus, Gianni Viardo Vercelli

:
GPU-Aware Genetic Estimation of Hidden Markov Models for Workload Classification Problems. 674-682 
Session 3: Software Security
- Abdullah Abuhussein

, Faisal Alsubaei
, Sajjan G. Shiva, Frederick T. Sheldon
:
Evaluating Security and Privacy in Cloud Services. 683-686 - Qian Chen

, Jonathan Lambright:
Towards Realizing a Self-Protecting Healthcare Information System. 687-690 - Daniel Conte de Leon, Sanjeev Shrestha:

Requirements are the New Code. 691-694 
CELT: COMPSAC Symposium on Computing Education & Learning Technologies
- Edmundo Tovar

, Manuel Castro, Claudio Demartini, Tiziana Margaria
, Henry C. B. Chan
, Timothy K. Shih, Simanta Mitra, Sorel Reisman:
Message from the CELT Organizing Committee. 695 
Session 1: CS as a Lifelong Discovery
- Yanchun Sun, Zijian Qiao, Dejian Chen, Chao Xin, Wenpin Jiao:

An Approach to Using Existing Online Education Tools to Support Practical Education on MOOCs. 696-705 - Gary K. W. Wong

, Simon Y. K. Li:
Academic Performance Prediction Using Chance Discovery from Online Discussion Forums. 706-711 - Vytautas Stuikys, Renata Burbaite, Kristina Bespalova, Vida Drasute, Giedrius Ziberkas, Algimantas Venckauskas

:
Stage-Based Generative Learning Object Model to Support Automatic Content Generation and Adaptation. 712-721 - Luigi De Russis

, Laura Farinetti, Gabriella Taddeo:
Learning the Social Web: A Multidisciplinary Approach. 722-727 
Session 2: CS and Learning Environments
- Austin Cory Bart, Javier Tibau, Eli Tilevich

, Clifford A. Shaffer, Dennis G. Kafura:
Implementing an Open-Access, Data Science Programming Environment for Learners. 728-737 - Seyed Soroush Ghorashi, Carlos Jensen:

Supporting Learners in Online Courses Through Pair Programming and Live Coding. 738-747 - Amjad AlTadmri

, Michael Kölling
, Neil C. C. Brown
:
The Cost of Syntax and How to Avoid It: Text versus Frame-Based Editing. 748-753 
Session 3: Learning Outcomes and Assessment
- Yogesh D. Barve

, Prithviraj Patil, Aniruddha S. Gokhale
:
A Cloud-Based Immersive Learning Environment for Distributed Systems Algorithms. 754-763 - Shunxing Bao

, Joe Porter, Aniruddha S. Gokhale
:
Reasoning for CPS Education Using Surrogate Simulation Models. 764-773 - Valentina Gatteschi, Fabrizio Lamberti

, Gianluca Paravati, Alessandro Raso, Claudio Giovanni Demartini:
Which Learning Outcomes Should I Acquire? A Bar Chart-Based Semantic System for Visually Comparing Learners' Acquirements with Labor Market Requirements. 774-779 - Chung Keung Poon

, Tak-Lam Wong, Yuen-Tak Yu, Victor C. S. Lee, Chung Man Tang
:
Toward More Robust Automatic Analysis of Student Program Outputs for Assessment and Learning. 780-785 
MOWU: COMPSAC Symposium on Mobile, Wearable and Ubiquitous Computing
- J. Morris Chang, Hong Va Leong

, Paolo Bellavista
, Vladimir Getov:
Message from the MOWU Organizing Committee. 786-787 
Session 1: Smartphone-based Localization
- Zihao Tang, Yao Guo

, Xiangqun Chen:
Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping Modes. 788-797 - A. K. M. Jahangir Alam Majumder, Piyush Saxena, Sheikh Iqbal Ahamed:

Your Walk is My Command: Gait Detection on Unconstrained Smartphone Using IoT System. 798-806 
Session 2: Mobile Data and Cloud
- Beihong Jin, Yanling Cui, Fusang Zhang:

Fusing Static and Roving Sensor Data for Detecting Highway Traffic Conditions in Real Time. 807-816 - Sabri Allani

, Taoufik Yeferny
, Richard Chbeir
, Sadok Ben Yahia
:
DPMS: A Swift Data Dissemination Protocol Based on Map Splitting. 817-822 - Ragib Hasan

, Rasib Khan:
A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud. 823-828 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














