


default search action
42nd COMPSAC 2018: Tokyo, Japan - Volume 1
- Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:

2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1. IEEE Computer Society 2018, ISBN 978-1-5386-2667-2 
SETA: Software Engineering Technology and Applications
- W. K. Chan, Hong Zhu:

Message from SETA 2018 Symposium Chairs. 1 
SETA 1: Software
- Lov Kumar

, Ashish Sureka:
An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning Framework. 2-11 - Weiwei Wang, Junxia Guo, Zheng Li, Ruilian Zhao:

EFSM-Oriented Minimal Traces Set Generation Approach for Web Applications. 12-21 - Dusica Marijan, Marius Liaaen, Sagar Sen

:
DevOps Improvements for Reduced Cycle Times with Integrated Test Optimizations for Continuous Integration. 22-27 
SETA 2: Functionality
- Peng Sun, Jingwei Yang, Ming Hua, Carl K. Chang:

A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional Requirements. 28-37 - Shinya Tsuchida, Hiroyuki Nakagawa

, Emiliano Tramontana, Andrea Fornaia, Tatsuhiro Tsuchiya
:
A Framework for Updating Functionalities Based on the MAPE Loop Mechanism. 38-47 - Yijun Wang, Songyuan Hu, Linfeng Yin, Xiaocong Zhou:

Using Code Evolution Information to Improve the Quality of Labels in Code Smell Datasets. 48-53 
SETA 3: Software
- Huiqun Yu, Kai Shi, Jianmei Guo, Guisheng Fan, Xingguang Yang, Liqiong Chen:

Combining Constraint Solving with Different MOEAs for Configuring Large Software Product Lines: A Case Study. 54-63 - Chao Liu, Dan Yang, Xin Xia

, Meng Yan
, Xiaohong Zhang:
Cross-Project Change-Proneness Prediction. 64-73 - Sarocha Sothornprapakorn, Shinpei Hayashi

, Motoshi Saeki:
Visualizing a Tangled Change for Supporting Its Decomposition and Commit Construction. 74-79 
SETA 4: Mobile
- Hao Sun, Xiaoxing Ma, Tiansi Dong, Armin B. Cremers, Chun Cao:

An Assertion Framework for Mobile Robotic Programming with Spatial Reasoning. 80-89 - Chia-Hui Lin, Cheng-Zen Yang

, Peng Lu, Tzu-Heng Lin, Zhi-Jun You:
Exploration Scheduling for Replay Events in GUI Testing on Android Apps. 90-99 - Junaid Akram

, Zhendong Shi, Majid Mumtaz
, Ping Luo:
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level. 100-105 
SETA 5: Concurrency
- Junming Ma, Bo An, Xiangqun Chen, Donggang Cao:

DistGear: A Lightweight Event-Driven Framework for Developing Distributed Applications. 106-115 - Chang-Ai Sun, Jingting Jia, Huai Liu, Xiangyu Zhang:

A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis. 116-125 - Jialin Yang, Wing Kwong Chan, Yuen-Tak Yu, Jacky Keung

:
GBRAD: A General Framework to Evaluate Design Strategies for Hybrid Race Detection. 126-131 
SETA 6: Cloud
- Xiao He, Bohan Qin, Yan Zhu

, Xing Chen, Yi Liu:
SPESC: A Specification Language for Smart Contracts. 132-137 - Yang Zhang, Gang Yin, Tao Wang, Yue Yu, Huaimin Wang:

An Insight Into the Impact of Dockerfile Evolutionary Trajectories on Quality and Latency. 138-143 - Jie Chen, Chun Cao, Ying Zhang

, Xiaoxing Ma, Haiwei Zhou, Chengwei Yang:
Improving Cluster Resource Efficiency with Oversubscription. 144-153 
SETA 7: Code Comments
- Zhiyong Liu, Huanchao Chen, Xiangping Chen, Xiaonan Luo, Fan Zhou:

Automatic Detection of Outdated Comments During Code Changes. 154-163 - Huanchao Chen, Zhiyong Liu, Xiangping Chen, Fan Zhou, Xiaonan Luo:

Automatically Detecting the Scopes of Source Code Comments. 164-173 
SETA 8: Repair
- Shuyao Sun, Junxia Guo, Ruilian Zhao, Zheng Li:

Search-Based Efficient Automated Program Repair Using Mutation and Fault Localization. 174-183 - Tao Ji, Jinkun Pan, Liqian Chen, Xiaoguang Mao

:
Identifying Supplementary Bug-fix Commits. 184-193 
SETA 9: Verification
- Cláudio Belo Lourenço

, Maria João Frade
, Shin Nakajima, Jorge Sousa Pinto
:
A Generalized Approach to Verification Condition Generation. 194-203 - Chenxia Luo, Rui Wang, Yu Jiang, Kang Yang, Yong Guan, Xiaojuan Li, Zhiping Shi:

Runtime Verification of Robots Collision Avoidance Case Study. 204-212 - Wanling Xie, Huibiao Zhu, Min Zhang

, Gang Lu, Yucheng Fang:
Formalization and Verification of Mobile Systems Calculus Using the Rewriting Engine Maude. 213-218 
SETA 10: Bugs
- Hui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu

:
Predicting the Breakability of Blocking Bug Pairs. 219-228 - Khanh-Huu-The Dam

, Tayssir Touili:
Precise Extraction of Malicious Behaviors. 229-234 
SETA 11: Prioritization
- Bo Jiang, Yu Wu, Yongfei Zhang

, Zhenyu Zhang, W. K. Chan:
ReTestDroid: Towards Safer Regression Test Selection for Android Application. 235-244 - Masataka Ozawa, Tadashi Dohi, Hiroyuki Okamura:

How Do Software Metrics Affect Test Case Prioritization? 245-250 - Jianlei Chi, Yu Qu

, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu:
Test Case Prioritization Based on Method Call Sequences. 251-256 
SETA 12: Modeling
- Yajun Wu, Satoshi Yamane:

Model Checking of Embedded Systems Using RTCTL While Generating Timed Kripke Structure. 257 - Kaiqiang Jiang, Chunlin Guan, Jiahui Wang, Dehui Du:

Model Checking Coordination of CPS Using Timed Automata. 258-263 - Ping Huang, Kaiqiang Jiang, Chunlin Guan, Dehui Du:

Towards Modeling Cyber-Physical Systems with SysML/MARTE/pCCSL. 264-269 - Yucheng Fang, Huibiao Zhu, Gang Lu, Lili Xiao, Wanling Xie:

Modeling and Verifying MooseFS in CSP. 270-275 
SETA 13: Software Analysis
- Ting Chen, Wanyu Huang, Muhui Jiang, Xiapu Luo, Lei Xue

, Ying Wang, Xiaosong Zhang:
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions. 276-285 - Yanming Yang, Zhilei Ren, Xin Chen, He Jiang:

Structural Function Based Code Clone Detection Using a New Hybrid Technique. 286-291 - Seiya Kato, Yota Inagaki, Mikio Aoyama:

A Structural Analysis Method of OSS Development Community Evolution Based on A Semantic Graph Model. 292-297 
SETA 14: Program Analysis
- Xu Guo, Xiaoyu Song, Jiantao Zhou:

Effective Discrete Memetic Algorithms for Covering Array Generation. 298-303 - Chunyan Hou, Jinsong Wang, Chen Chen, Kai Shi:

Loop Invariant Generation for Non-monotone Loop Structures. 304-309 - Rubing Huang

, Weiwen Zong, Tsong Yueh Chen
, Dave Towey
, Jinfu Chen, Yunan Zhou, Weifeng Sun:
On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization. 310-315 
HCSC: Human Computing & Social Computing
- Moushumi Sharmin, Katsunori Oyama, Claudio Giovanni Demartini:

Message from the HCSC 2018 Workshop Organizers. 316 - Yuzhu Wu, Qianwen Zhang, Jinkui Xie:

Coarsening Networks Based on Local Link Similarity for Community Detection. 317-326 - Uthai Tanlamai:

What Graphs do International Investors See in the ASEAN Capital Markets? 327-332 - Tokishi Morita, Katsunori Oyama, Taiju Mikoshi, Toshihiro Nishizono:

Decision Making Support of UAV Path Planning for Efficient Sensing in Radiation Dose Mapping. 333-338 - Teppei Yajima, Hiroshi Hosobe:

A Japanese Software Keyboard for Tablets that Reduces User Fatigue. 339-346 - Yichun Li, Ningkang Jiang:

An Aurora Image Classification Method based on Compressive Sensing and Distributed WKNN. 347-354 
Autonomous Car Panel
- Songwen Pei, Fuwu Tang, Yanfei Ji, Jing Fan, Zhong Ning:

Localized Traffic Sign Detection with Multi-scale Deconvolution Networks. 355-360 - Jie Tang, Shaoshan Liu, Songwen Pei, Stéphane Zuckerman, Chen Liu

, Weisong Shi
, Jean-Luc Gaudiot:
Teaching Autonomous Driving Using a Modular and Integrated Approach. 361-366 - Jialin Jiao:

Machine Learning Assisted High-Definition Map Creation. 367-373 
DSAT: Data Sciences, Analytics, and Technologies
- Kathy Grise, Maria Lee:

Message from the 2018 DSAT Technical Program Chairs. 380-381 - Chieh-Yuan Tsai, Wei-Zhong Ji:

Knowledge Map Construction Using Text Mining and Artificial Bee Colony Algorithm. 382-387 - Yuanduo He, Xu Chu, Guangju Peng, Yasha Wang, Zhu Jin, Xiaorong Wang:

Mining Rules from Real-Valued Time Series: A Relative Information-Gain-Based Approach. 388-397 - Aki-Hiro Sato

, Shoki Nishimura, Tsuyoshi Namiki, Naoki Makita, Hiroe Tsubaki:
World Grid Square Data Reference Framework and its Potential Applications. 398-409 - Dongdong Cheng, Qingsheng Zhu, Quanwang Wu:

A Local Cores-Based Hierarchical Clustering Algorithm for Data Sets with Complex Structures. 410-419 - Hong Yu, Tiantian Zhang, JiaXin Chen, Chen Guo, Yahong Lian

:
Web Items Recommendation Based on Multi-View Clustering. 420-425 - Xiaoxue Ren, Qiao Huang, Xin Xia

, Zhenchang Xing, Lingfeng Bao, David Lo
:
Characterizing Common and Domain-Specific Package Bugs: A Case Study on Ubuntu. 426-431 - Tsung Teng Chen, Maria R. Lee:

Deciphering Big Data Research Themes. 432-437 - Alfredo Cuzzocrea, Rim Moussa:

Towards Lambda-Based Near Real-Time OLAP over Big Data. 438-441 - Hong-Linh Truong, Manfred Halper:

Characterizing Incidents in Cloud-Based IoT Data Analytics. 442-447 - Sutheera Puntheeranurak

, Thi Thi Shein, Makoto Imamura:
Efficient Discovery of Traveling Companion from Evolving Trajectory Data Stream. 448-453 - Yan Wang, Pei-Xiang Bai, De-Yu Yang, Jiantao Zhou, Xiaoyu Song:

A Software Popularity Recommendation Method Based on Evaluation Model. 454-460 - Yan Wu, Nitish Dhakal, Dianxiang Xu, Jin-Hee Cho:

Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn. 461-470 - Ying Qian, Yu Zhang, Bingyu Guo, Shasha Ye, Yuzhu Wu, Jiongmin Zhang:

An Improved Promoter Recognition Model Using Convolutional Neural Network. 471-476 - San Murugesan

:
IT Professional 20th Anniversary Panel. 477-479 - Lester James V. Miranda

, Jinglu Hu:
A Deep Learning Approach Based on Stacked Denoising Autoencoders for Protein Function Prediction. 480-485 - Daichi Nishio, Satoshi Yamane:

Faster Deep Q-Learning Using Neural Episodic Control. 486-491 - Jie Yang, Yuchen Xie, Lin Liu, Bin Xia, Zhanqiang Cao, Chuanbin Guo:

Automated Dental Image Analysis by Deep Learning on Small Dataset. 492-497 - Yanbo Han, Meiling Zhu, Chen Liu:

A Service-Oriented Approach to Modeling and Reusing Event Correlations. 498-507 - Nicholas Majeske

, Filip Jagodzinski:
Elucidating Which Pairwise Mutations Affect Protein Stability: An Exhaustive Big Data Approach. 508-515 - Sixing Wu

, Ying Li, Xinyuan Zhang, Zhonghai Wu:
DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding Conversation. 516-521 - Yan Li, Junming Ma, Bo An, Donggang Cao:

BDViewer - A Web-Based Big Data Processing and Visualization Tool. 522-527 - Douglas McIlwraith, Andrea Catalucci, Sam Boyd, Raouf Aghrout, Yike Guo

:
Optimising Toward Completed Videos in an Online Video Advertising Exchange. 528-533 
EATA: Emerging Advances in Technology & Applications
- Ali R. Hurson

, Hiroyuki Sato:
Message from EATA Symposium Chairs. 534 
EATA 1: Future Computing Technologies
- Yan Zhu

, Yao Qin, Guohua Gan, Yang Shuai, William Cheng-Chung Chu:
TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. 535-544 - Duo Ding, Minbo Li, Zhu Zhu:

Object Naming Service Supporting Heterogeneous Object Code Identification for IoT System. 545-554 - Hsiang-Yi Wu, Che-Rung Lee:

Energy Efficient Scheduling for Heterogeneous Fog Computing Architectures. 555-560 
EATA 2: Vehicles and Transportations
- Jennie Lioris, Annie Bracquemond, Gildas Thiolon, Laurent Bonic:

Lane Change Detection Algorithm on Real World Driving for Arbitrary Road Infrastructures. 561-569 - Yasir Saleem

, Noël Crespi:
Mapping of Sensor and Route Coordinates for Smart Cities. 570-576 - Fu-Shiung Hsieh, Fu-Min Zhan:

A Discrete Differential Evolution Algorithm for Carpooling. 577-582 
EATA 3: Emerging Applications
- A. H. M. Jakaria, Mohammad Ashiqur Rahman

:
Formal Analysis of k-Resiliency for Collaborative UAVs. 583-592 - Rafael Neujahr Copstein, Vicenzo Abichequer Sangalli

, Matheus Cruz Andrade, Lucas Almeida Machado, Evandro Rodrigues, Leonardo Pavanatto Soares
, Márcio Sarroglia Pinho
:
Image Processing Strategies for Automatic Detection of Common Gastroenterological Diseases. 593-598 
SEPT: Security, Privacy & Trust in Computing
- Dianxiang Xu, Eun-Sun Cho

:
Message from the SEPT Symposium Program Chairs. 599 - Zeliang Kan, Haoyu Wang, Guoai Xu, Yao Guo

, Xiangqun Chen:
Towards Light-Weight Deep Learning Based Malware Detection. 600-609 - Rui Huang, Yichao Lin, Bidi Ying, Amiya Nayak

:
ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social Networks. 610-619 - Donghong Zhang, Zhenyu Zhang, Bo Jiang, T. H. Tse

:
The Impact of Lightweight Disassembler on Malware Detection: An Empirical Study. 620-629 - Junjun Zheng

, Hiroyuki Okamura, Tadashi Dohi:
A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy. 630-635 - Tengfei Xue, Yuyu Yuan, Zahir Ahmed, Krishna Moniz, Ganyuan Cao, Cong Wang:

Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency. 636-644 - Maitraye Das

, Nusrat Jahan Mozumder, Sharmin Afrose, Khandakar Ashrafi Akbar, Tanzima Hashem
:
A Novel Secret Sharing Approach for Privacy-Preserving Authenticated Disease Risk Queries in Genomic Databases. 645-654 - Xiaoshan Sun, Yu Fu, Yun Dong, Zhihao Liu, Yang Zhang:

Improving Fitness Function for Language Fuzzing with PCFG Model. 655-660 - Jordi Aranda, Jordi Nin Guerrero

, Javier Herranz
:
Answering Multiple Aggregate Queries Under a Specific Privacy Condition. 661-666 
CAP: Computer Architecture & Platforms
- Cristina Seceleanu

, Keiji Kimura:
Message from the CAP Organizing Committee. 667 - Hui Li, Shanxiong Chen, Guoqiang Xiao, Xiaoning Peng, Jianwei Liao:

Adaptive Splitting-Based Block I/O Scheduling in Disk Storage. 668-676 - Qingshi Shao, Shijun Liu, Li Pan, Chenglei Yang, Tingting Niu:

A Market-Oriented Heuristic Algorithm for Scheduling Parallel Applications in Big Data Service Platform. 677-686 - Yuan Cai, Wei Luo, Dong Xiang:

The Column-Partition and Row-Partition Turn Model. 687-694 - Rui Wang, Libin Xu, Yuebin Bai, Kun Cheng, Zhongzhao Wang, Guangqiang Luan, Hailong Yang, Weitao Wang:

Research on Asynchronous Inter-VM Communication Mechanism Based on Embedded Hypervisor. 695-700 - Jakob Danielsson, Marcus Jägemar, Moris Behnam, Mikael Sjödin, Tiberiu Seceleanu

:
Measurement-Based Evaluation of Data-Parallelism for OpenCV Feature-Detection Algorithms. 701-710 - Hai-Feng Xing, Jiantao Zhou, Xiaoyu Song, Rui-dong Qi:

SMT-Based Timing Analysis and Verification of Real-Time Task. 711-720 - Guangqiang Luan, Yuebin Bai, Libin Xu, Chao Yu, Chunyang Wang, Junfang Zeng, Qingbin Chen, Weitao Wang:

Towards Fault-Tolerant Task Backup and Recovery in the seL4 Microkernel. 721-726 
ITIP: IT in Practice
- San Murugesan

, Fulvio Corno
:
Message from the ITiP Symposium Chairs. 727 - Rui Cao, Zhaoyang Yu, Trent G. Marbach

, Jing Li, Gang Wang, Xiaoguang Liu:
Load Prediction for Data Centers Based on Database Service. 728-737 - Irena Bojanova, Yaacov Yesha, Paul E. Black

:
Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN). 738-745 - Seongwoon Jeong, Kincho H. Law:

An IoT Platform for Civil Infrastructure Monitoring. 746-754 - Nishtha Kesswani, Sanjay Kumar:

The Smart-X Model for Smart Cities. 755-760 - Sid-Ahmed Selouani, Mohamed Sidi Yacoub:

Long Short-Term Memory Neural Networks for Artificial Dialogue Generation. 761-768 - Ankita Rane, Anand Kumar:

Sentiment Classification System of Twitter Data for US Airline Service Analysis. 769-773 - Tharidu Fernando, Nikita Gureev, Mihhail Matskin, Michael Zwick, Thomas Natschläger:

WorkflowDSL: Scalable Workflow Execution with Provenance for Data Analysis Applications. 774-779 
Fast Abstracts
- Hossain Shahriar

, Hiroki Takakura, Michiharu Takemoto, Dave Towey
:
Message from the Fast Abstract Co-chairs. 780 - Yutsuki Miyashita, Takafumi Tanaka, Atsuo Hazeyama:

Systematic Literature Review Regarding Communication Support in Project-Based Learning of Software Development. 781-782 - Wook-Sung Yoo, Zach Jones, Henok Atsbaha, David Wingfield:

Painless Tennis Ball Tracking System. 783-784 - Bo Cheng, Shuai Zhao, Junliang Chen:

Remote Monitoring and Control Web Service for Internet of Heating. 785-786 - Tuan-Fang Fan, Churn-Jung Liau:

Possibilistic Reasoning About Actions in Agent Systems. 787-788 - Beomsu Kim

, Ki-Il Kim
, Babar Shah
:
An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks. 789-790 - Usa Sammapun

, Panuchart Bunyakiati:
On Selecting Collaborative Modeling Tools. 791-792 - Satoshi Yamane, Tetsuto Takano:

Machine Translation Considering Context Informaiton Using Encoder-Decoder Model. 793-794 - Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Mario Gerla:

Spatio-Temporal Data Retention System with MEC for Local Production and Consumption. 795-796 - Fu-Hsing Tsai:

Designing a Computer Detective Game for Science Education. 797-798 - Hiromu Kamide, Kosuke Uemura, Satoshi Yamane:

Model Check of Real-time Property of Embedded Assembly Program Using CEGAR. 799-800 - Taiki Shimizu, Kohei Sakurai:

Comprehensive Data Tree by Actor Messaging for Incremental Hierarchical Clustering. 801-802 - Hyun-il Lim:

Applying Code Vectors for Presenting Software Features in Machine Learning. 803-804 - Feri Setiawan

, Sunder Ali Khowaja
, Aria Ghora Prabono
, Bernardo Nugroho Yahya, Seok-Lyong Lee:
A Framework for Real Time Emotion Recognition Based on Human ANS Using Pervasive Device. 805-806 - Salma Ayari, Yosra Ben Dali Hlaoui, Leila Jemni Ben Ayed:

A New Approach for the Verification of BPMN Models Using Refinement Patterns. 807-808 - Yu-Feng Hsu, Chih-Lin Hu

, Hsin-Ju Hsiao:
On Exploiting Temporal Periodicity for Message Delivery in Mobile Opportunistic Networks. 809-810 - Kouto Miyazawa, Kanon Sasaki, Naoki Oda, Saneyasu Yamaguchi:

Cyclic Performance Fluctuation of TCP BBR. 811-812 - Adnan Mahmood

, Bernard Butler
, Brendan Jennings:
Towards Efficient Network Resource Management in SDN-Based Heterogeneous Vehicular Networks. 813-814 - Hiroaki Yamauchi, Akihiro Nakao

, Masato Oguchi, Shu Yamamoto, Saneyasu Yamaguchi:
Clustering TLS Sessions Based on Protocol Fields Analysis. 815-816 - Victor Parque

, Tomoyuki Miyashita
:
On Graph Representation with Smallest Numerical Encoding. 817-818 - Victor Parque

, Tomoyuki Miyashita
:
Numerical Representation of Modular Graphs. 819-820 - Hanwu Luo, Wenzhen Li, Ying Qian, Liang Dou:

Mitigating SDN Flow Table Overflow. 821-822 - Hsung-Pin Chang

, Yu-Cain He, Da-Wei Chang:
An Integrated Memory and SSD Caching I/O Subsystem. 823-824 - Reza M. Parizi, Kai Qian, Hossain Shahriar

, Fan Wu, Lixin Tao:
Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools. 825-826 - Taeho Kim, Sungwon Kang, Jihyun Lee:

Effects of Variable Part Auto Configuration and Management for Software Product Line. 827-828 - Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar

, Md Arabin Islam Talukder
, Prabir Bhattacharya:
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio. 829-830 - Labiblais Rahman

, Katsunori Oyama:
A Comparison of EEG and NIRS Biomarkers for Assessment of Depression Risk. 831-832 - Yangxu Jin, Ting Liu, Ancheng He, Yu Qu

, Jianlei Chi:
Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection. 833-834 - Victor Clincy, Hossain Shahriar

:
Web Application Firewall: Network Security Models and Configuration. 835-836 - Aji Ery Burhandenny

, Hirohisa Aman, Minoru Kawahara:
Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance. 837-838 
MOWU: Mobile, Wearable & Ubiquitous Computing
- Vladimir Getov, Hong Va Leong:

Message from the MOWU Organizing Committee. 839-841 - Shimpei Ohsugi, Noboru Koshizuka:

Delivery Route Optimization Through Occupancy Prediction from Electricity Usage. 842-849 - Tianheng Wu, Liang Wang, Zhiwen Zheng, Simeng Wu, Jun Ma, Xianping Tao, Jian Lu:

CARMUS: Towards a General Framework for Continuous Activity Recognition with Missing Values on Smartphones. 850-859 - Mohammed Balfas, Sheikh Iqbal Ahamed, Chandana P. Tamma, Muhammad Arif, Ahmed J. Kattan, William C. C. Chu:

A Study and Estimation a Lost Person Behavior in Crowded Areas Using Accelerometer Data from Smartphones. 860-865 - Drew Williams, Golam Mushih Tanimul Ahsan, Ivor D. Addo, Sheikh Iqbal Ahamed, Daniel Petereit, Linda Burhansstipanov, Linda U. Krebs, Mark Dignan:

Building a Tailored Text Messaging System for Smoking Cessation in Native American Populations. 866-874 - Golam Mushih Tanimul Ahsan, Jannatul Ferdause Tumpa, Riddhiman Adib

, Sheikh Iqbal Ahamed, Daniel Petereit, Linda Burhansstipanov, Linda U. Krebs, Mark Dignan:
A Culturally Tailored Intervention System for Cancer Survivors to Motivate Physical Activity. 875-880 - Shijie Li, Yong Dou, Jinwei Xu, Qiang Wang

, Xin Niu:
mmCNN: A Novel Method for Large Convolutional Neural Network on Memory-Limited Devices. 881-886 
NCIW: Networks, Communications, Internet & Web Technologies
- Behrooz A. Shirazi, Nariyoshi Yamai:

Message from the NCIW Program Co-chairs. 887 - Fu-Shiung Hsieh, Yi-Hong Guo:

Winner Determination in Combinatorial Double Auctions Based on Differential Evolution Algorithms. 888-893 - You-Chiun Wang, Han Hu:

A Low-cost, High-Efficiency SDN Framework to Diminish Redundant ARP and IGMP Traffics in Large-Scale LANs. 894-903 - Ling Guo, Bo Wan, Changlong Li, Kaiqi Zhou, Xi Li:

A Flow-Grained End-to-End Delay Analysis for RC Traffic in TTEthernet. 904-913 - Yan Zhu

, Shuai Yang, Guohua Gan, Xiao He:
An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table. 914-919 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:

A Solution for Minimum Link Flow Problem with Sparse Modeling. 920-925 - Weitao Wang, Yuebin Bai, Peng Feng, Yuhao Gu

, Shuai Liu, Wenhao Jiang, Jun Huang
:
DTN-Knca: A High Throughput Routing Based on Contact Pattern Detection in DTNs. 926-931 - Sizheng Li, Chuanhe Huang:

A Multihop Broadcast Mechanism for Emergency Messages Dissemination in VANETs. 932-937 
Student Research Symposium
- Toyokazu Akiyama, Maria Lee:

Message from The Student Research Symposium Co-Chairs. 938 - Hyunsu Mun, Jeasung Na, Hanul Park, Seungtae Kim, Youngseok Lee, John A. Springer:

Analysis of the Relationship Between Server Location and RTT. 939-942 - Ryuichiro Maegawa, Ryo Nakamura, Yasuhiro Yamasaki, Hiroyuki Ohsaki:

A Study on Emulating Automotive IP Networks Using Network Virtualization. 943-946 - Yoshinori Kamori, Kenta Hayasi, Kaori Maeda, Tohru Kondo, Reiji Aibara:

A Secure Sharing System for Cloud Desktop Applications Migrating with Optimized User Experience. 947-950 - Shintaro Ishihara, Toyokazu Akiyama:

A Tuning Method of a Monitoring System for Network Forensics in Cloud Environment. 951-954 - Chuta Minamiguchi, Natsuko Kawabata, Ryo Nakamura, Hiroyuki Ohsaki:

A Study on Comparative Analysis of End-to-End Routing and Opportunistic Routing. 955-958 - Seong-Kyun Mok, Eun-Sun Cho

:
Building a CFG to Include Exceptions. 959-961 - Reido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata:

Alternating Primary Subflow in MPTCP by External Program without Kernel Modification. 962-965 - Kazuyuki Yamashita, Ryo Nakamura, Hiroyuki Ohsaki:

A Study on Robustness of Complex Networks Against Random Node Removals. 966-969 - Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:

A Study on the Impact of Delayed Packet Forwarding in Content-Centric Networking. 970-972 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:

A Study on Sparse-Modeling Based Approach for Betweenness Centrality Estimation. 973-976 - Seoksu Lee, Eun-Sun Cho

:
Toward Firmware-Type Analysis Using Machine Learning Techniques. 977-978 
CELT: Computer Education & Learning Technologies
- Tiziana Margaria, Henry C. B. Chan

:
Message from the CELT 2018 Symposium Co-Chairs. 979 - Luca Cagliero

, Luigi De Russis
, Laura Farinetti, Teodoro Montanaro
:
Improving the Effectiveness of SQL Learning Practice: A Data-Driven Approach. 980-989 - Frederik Gossen, Dennis Kühn, Tiziana Margaria, Anna-Lena Lamprecht

:
Computational Thinking: Learning by Doing with the Cinco Adventure Game Tool. 990-999 - Marina Marchisio

, Luigi Di Caro
, Michele Fioravera
, Sergio Rabellino
:
Towards Adaptive Systems for Automatic Formative Assessment in Virtual Learning Communities. 1000-1005 - Han Wan, Kangxu Liu, Qiaoye Yu, Jun Ding, Xiaopeng Gao:

Improving Blended Learning Outcomes Through Academic Social Media. 1006-1015 - Marina Marchisio

, Alice Barana
, Michele Fioravera
, Sergio Rabellino
, Alberto Conte:
A Model of Formative Automatic Assessment and Interactive Feedback for STEM. 1016-1025 - W. K. T. M. Gunarathne, Chalothon Chootong

, Worapot Sommool
, Ankhtuya Ochirbat
, Yi-Cheng Chen, Sorel Reisman, Timothy K. Shih:
Web-Based Learning Object Search Engine Solution Together with Data Visualization: The Case of MERLOT II. 1026-1031 - Iris Braun

, Tenshi Hara, Felix Kapp, Lucas Braeschke, Alexander Schill:
Technology-Enhanced Self-Regulated Learning: Assessment Support Through an Evaluation Centre. 1032-1037 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














