default search action
42nd COMPSAC 2018: Tokyo, Japan - Volume 1
- Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1. IEEE Computer Society 2018, ISBN 978-1-5386-2667-2
SETA: Software Engineering Technology and Applications
- W. K. Chan, Hong Zhu:
Message from SETA 2018 Symposium Chairs. 1
SETA 1: Software
- Lov Kumar, Ashish Sureka:
An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning Framework. 2-11 - Weiwei Wang, Junxia Guo, Zheng Li, Ruilian Zhao:
EFSM-Oriented Minimal Traces Set Generation Approach for Web Applications. 12-21 - Dusica Marijan, Marius Liaaen, Sagar Sen:
DevOps Improvements for Reduced Cycle Times with Integrated Test Optimizations for Continuous Integration. 22-27
SETA 2: Functionality
- Peng Sun, Jingwei Yang, Ming Hua, Carl K. Chang:
A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional Requirements. 28-37 - Shinya Tsuchida, Hiroyuki Nakagawa, Emiliano Tramontana, Andrea Fornaia, Tatsuhiro Tsuchiya:
A Framework for Updating Functionalities Based on the MAPE Loop Mechanism. 38-47 - Yijun Wang, Songyuan Hu, Linfeng Yin, Xiaocong Zhou:
Using Code Evolution Information to Improve the Quality of Labels in Code Smell Datasets. 48-53
SETA 3: Software
- Huiqun Yu, Kai Shi, Jianmei Guo, Guisheng Fan, Xingguang Yang, Liqiong Chen:
Combining Constraint Solving with Different MOEAs for Configuring Large Software Product Lines: A Case Study. 54-63 - Chao Liu, Dan Yang, Xin Xia, Meng Yan, Xiaohong Zhang:
Cross-Project Change-Proneness Prediction. 64-73 - Sarocha Sothornprapakorn, Shinpei Hayashi, Motoshi Saeki:
Visualizing a Tangled Change for Supporting Its Decomposition and Commit Construction. 74-79
SETA 4: Mobile
- Hao Sun, Xiaoxing Ma, Tiansi Dong, Armin B. Cremers, Chun Cao:
An Assertion Framework for Mobile Robotic Programming with Spatial Reasoning. 80-89 - Chia-Hui Lin, Cheng-Zen Yang, Peng Lu, Tzu-Heng Lin, Zhi-Jun You:
Exploration Scheduling for Replay Events in GUI Testing on Android Apps. 90-99 - Junaid Akram, Zhendong Shi, Majid Mumtaz, Ping Luo:
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level. 100-105
SETA 5: Concurrency
- Junming Ma, Bo An, Xiangqun Chen, Donggang Cao:
DistGear: A Lightweight Event-Driven Framework for Developing Distributed Applications. 106-115 - Chang-Ai Sun, Jingting Jia, Huai Liu, Xiangyu Zhang:
A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis. 116-125 - Jialin Yang, Wing Kwong Chan, Yuen-Tak Yu, Jacky Keung:
GBRAD: A General Framework to Evaluate Design Strategies for Hybrid Race Detection. 126-131
SETA 6: Cloud
- Xiao He, Bohan Qin, Yan Zhu, Xing Chen, Yi Liu:
SPESC: A Specification Language for Smart Contracts. 132-137 - Yang Zhang, Gang Yin, Tao Wang, Yue Yu, Huaimin Wang:
An Insight Into the Impact of Dockerfile Evolutionary Trajectories on Quality and Latency. 138-143 - Jie Chen, Chun Cao, Ying Zhang, Xiaoxing Ma, Haiwei Zhou, Chengwei Yang:
Improving Cluster Resource Efficiency with Oversubscription. 144-153
SETA 7: Code Comments
- Zhiyong Liu, Huanchao Chen, Xiangping Chen, Xiaonan Luo, Fan Zhou:
Automatic Detection of Outdated Comments During Code Changes. 154-163 - Huanchao Chen, Zhiyong Liu, Xiangping Chen, Fan Zhou, Xiaonan Luo:
Automatically Detecting the Scopes of Source Code Comments. 164-173
SETA 8: Repair
- Shuyao Sun, Junxia Guo, Ruilian Zhao, Zheng Li:
Search-Based Efficient Automated Program Repair Using Mutation and Fault Localization. 174-183 - Tao Ji, Jinkun Pan, Liqian Chen, Xiaoguang Mao:
Identifying Supplementary Bug-fix Commits. 184-193
SETA 9: Verification
- Cláudio Belo Lourenço, Maria João Frade, Shin Nakajima, Jorge Sousa Pinto:
A Generalized Approach to Verification Condition Generation. 194-203 - Chenxia Luo, Rui Wang, Yu Jiang, Kang Yang, Yong Guan, Xiaojuan Li, Zhiping Shi:
Runtime Verification of Robots Collision Avoidance Case Study. 204-212 - Wanling Xie, Huibiao Zhu, Min Zhang, Gang Lu, Yucheng Fang:
Formalization and Verification of Mobile Systems Calculus Using the Rewriting Engine Maude. 213-218
SETA 10: Bugs
- Hui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu:
Predicting the Breakability of Blocking Bug Pairs. 219-228 - Khanh-Huu-The Dam, Tayssir Touili:
Precise Extraction of Malicious Behaviors. 229-234
SETA 11: Prioritization
- Bo Jiang, Yu Wu, Yongfei Zhang, Zhenyu Zhang, W. K. Chan:
ReTestDroid: Towards Safer Regression Test Selection for Android Application. 235-244 - Masataka Ozawa, Tadashi Dohi, Hiroyuki Okamura:
How Do Software Metrics Affect Test Case Prioritization? 245-250 - Jianlei Chi, Yu Qu, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu:
Test Case Prioritization Based on Method Call Sequences. 251-256
SETA 12: Modeling
- Yajun Wu, Satoshi Yamane:
Model Checking of Embedded Systems Using RTCTL While Generating Timed Kripke Structure. 257 - Kaiqiang Jiang, Chunlin Guan, Jiahui Wang, Dehui Du:
Model Checking Coordination of CPS Using Timed Automata. 258-263 - Ping Huang, Kaiqiang Jiang, Chunlin Guan, Dehui Du:
Towards Modeling Cyber-Physical Systems with SysML/MARTE/pCCSL. 264-269 - Yucheng Fang, Huibiao Zhu, Gang Lu, Lili Xiao, Wanling Xie:
Modeling and Verifying MooseFS in CSP. 270-275
SETA 13: Software Analysis
- Ting Chen, Wanyu Huang, Muhui Jiang, Xiapu Luo, Lei Xue, Ying Wang, Xiaosong Zhang:
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions. 276-285 - Yanming Yang, Zhilei Ren, Xin Chen, He Jiang:
Structural Function Based Code Clone Detection Using a New Hybrid Technique. 286-291 - Seiya Kato, Yota Inagaki, Mikio Aoyama:
A Structural Analysis Method of OSS Development Community Evolution Based on A Semantic Graph Model. 292-297
SETA 14: Program Analysis
- Xu Guo, Xiaoyu Song, Jiantao Zhou:
Effective Discrete Memetic Algorithms for Covering Array Generation. 298-303 - Chunyan Hou, Jinsong Wang, Chen Chen, Kai Shi:
Loop Invariant Generation for Non-monotone Loop Structures. 304-309 - Rubing Huang, Weiwen Zong, Tsong Yueh Chen, Dave Towey, Jinfu Chen, Yunan Zhou, Weifeng Sun:
On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization. 310-315
HCSC: Human Computing & Social Computing
- Moushumi Sharmin, Katsunori Oyama, Claudio Giovanni Demartini:
Message from the HCSC 2018 Workshop Organizers. 316 - Yuzhu Wu, Qianwen Zhang, Jinkui Xie:
Coarsening Networks Based on Local Link Similarity for Community Detection. 317-326 - Uthai Tanlamai:
What Graphs do International Investors See in the ASEAN Capital Markets? 327-332 - Tokishi Morita, Katsunori Oyama, Taiju Mikoshi, Toshihiro Nishizono:
Decision Making Support of UAV Path Planning for Efficient Sensing in Radiation Dose Mapping. 333-338 - Teppei Yajima, Hiroshi Hosobe:
A Japanese Software Keyboard for Tablets that Reduces User Fatigue. 339-346 - Yichun Li, Ningkang Jiang:
An Aurora Image Classification Method based on Compressive Sensing and Distributed WKNN. 347-354
Autonomous Car Panel
- Songwen Pei, Fuwu Tang, Yanfei Ji, Jing Fan, Zhong Ning:
Localized Traffic Sign Detection with Multi-scale Deconvolution Networks. 355-360 - Jie Tang, Shaoshan Liu, Songwen Pei, Stéphane Zuckerman, Chen Liu, Weisong Shi, Jean-Luc Gaudiot:
Teaching Autonomous Driving Using a Modular and Integrated Approach. 361-366 - Jialin Jiao:
Machine Learning Assisted High-Definition Map Creation. 367-373
DSAT: Data Sciences, Analytics, and Technologies
- Kathy Grise, Maria Lee:
Message from the 2018 DSAT Technical Program Chairs. 380-381 - Chieh-Yuan Tsai, Wei-Zhong Ji:
Knowledge Map Construction Using Text Mining and Artificial Bee Colony Algorithm. 382-387 - Yuanduo He, Xu Chu, Guangju Peng, Yasha Wang, Zhu Jin, Xiaorong Wang:
Mining Rules from Real-Valued Time Series: A Relative Information-Gain-Based Approach. 388-397 - Aki-Hiro Sato, Shoki Nishimura, Tsuyoshi Namiki, Naoki Makita, Hiroe Tsubaki:
World Grid Square Data Reference Framework and its Potential Applications. 398-409 - Dongdong Cheng, Qingsheng Zhu, Quanwang Wu:
A Local Cores-Based Hierarchical Clustering Algorithm for Data Sets with Complex Structures. 410-419 - Hong Yu, Tiantian Zhang, JiaXin Chen, Chen Guo, Yahong Lian:
Web Items Recommendation Based on Multi-View Clustering. 420-425 - Xiaoxue Ren, Qiao Huang, Xin Xia, Zhenchang Xing, Lingfeng Bao, David Lo:
Characterizing Common and Domain-Specific Package Bugs: A Case Study on Ubuntu. 426-431 - Tsung Teng Chen, Maria R. Lee:
Deciphering Big Data Research Themes. 432-437 - Alfredo Cuzzocrea, Rim Moussa:
Towards Lambda-Based Near Real-Time OLAP over Big Data. 438-441 - Hong-Linh Truong, Manfred Halper:
Characterizing Incidents in Cloud-Based IoT Data Analytics. 442-447 - Sutheera Puntheeranurak, Thi Thi Shein, Makoto Imamura:
Efficient Discovery of Traveling Companion from Evolving Trajectory Data Stream. 448-453 - Yan Wang, Pei-Xiang Bai, De-Yu Yang, Jiantao Zhou, Xiaoyu Song:
A Software Popularity Recommendation Method Based on Evaluation Model. 454-460 - Yan Wu, Nitish Dhakal, Dianxiang Xu, Jin-Hee Cho:
Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn. 461-470 - Ying Qian, Yu Zhang, Bingyu Guo, Shasha Ye, Yuzhu Wu, Jiongmin Zhang:
An Improved Promoter Recognition Model Using Convolutional Neural Network. 471-476 - San Murugesan:
IT Professional 20th Anniversary Panel. 477-479 - Lester James V. Miranda, Jinglu Hu:
A Deep Learning Approach Based on Stacked Denoising Autoencoders for Protein Function Prediction. 480-485 - Daichi Nishio, Satoshi Yamane:
Faster Deep Q-Learning Using Neural Episodic Control. 486-491 - Jie Yang, Yuchen Xie, Lin Liu, Bin Xia, Zhanqiang Cao, Chuanbin Guo:
Automated Dental Image Analysis by Deep Learning on Small Dataset. 492-497 - Yanbo Han, Meiling Zhu, Chen Liu:
A Service-Oriented Approach to Modeling and Reusing Event Correlations. 498-507 - Nicholas Majeske, Filip Jagodzinski:
Elucidating Which Pairwise Mutations Affect Protein Stability: An Exhaustive Big Data Approach. 508-515 - Sixing Wu, Ying Li, Xinyuan Zhang, Zhonghai Wu:
DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding Conversation. 516-521 - Yan Li, Junming Ma, Bo An, Donggang Cao:
BDViewer - A Web-Based Big Data Processing and Visualization Tool. 522-527 - Douglas McIlwraith, Andrea Catalucci, Sam Boyd, Raouf Aghrout, Yike Guo:
Optimising Toward Completed Videos in an Online Video Advertising Exchange. 528-533
EATA: Emerging Advances in Technology & Applications
- Ali R. Hurson, Hiroyuki Sato:
Message from EATA Symposium Chairs. 534
EATA 1: Future Computing Technologies
- Yan Zhu, Yao Qin, Guohua Gan, Yang Shuai, William Cheng-Chung Chu:
TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. 535-544 - Duo Ding, Minbo Li, Zhu Zhu:
Object Naming Service Supporting Heterogeneous Object Code Identification for IoT System. 545-554 - Hsiang-Yi Wu, Che-Rung Lee:
Energy Efficient Scheduling for Heterogeneous Fog Computing Architectures. 555-560
EATA 2: Vehicles and Transportations
- Jennie Lioris, Annie Bracquemond, Gildas Thiolon, Laurent Bonic:
Lane Change Detection Algorithm on Real World Driving for Arbitrary Road Infrastructures. 561-569 - Yasir Saleem, Noël Crespi:
Mapping of Sensor and Route Coordinates for Smart Cities. 570-576 - Fu-Shiung Hsieh, Fu-Min Zhan:
A Discrete Differential Evolution Algorithm for Carpooling. 577-582
EATA 3: Emerging Applications
- A. H. M. Jakaria, Mohammad Ashiqur Rahman:
Formal Analysis of k-Resiliency for Collaborative UAVs. 583-592 - Rafael Neujahr Copstein, Vicenzo Abichequer Sangalli, Matheus Cruz Andrade, Lucas Almeida Machado, Evandro Rodrigues, Leonardo Pavanatto Soares, Márcio Sarroglia Pinho:
Image Processing Strategies for Automatic Detection of Common Gastroenterological Diseases. 593-598
SEPT: Security, Privacy & Trust in Computing
- Dianxiang Xu, Eun-Sun Cho:
Message from the SEPT Symposium Program Chairs. 599 - Zeliang Kan, Haoyu Wang, Guoai Xu, Yao Guo, Xiangqun Chen:
Towards Light-Weight Deep Learning Based Malware Detection. 600-609 - Rui Huang, Yichao Lin, Bidi Ying, Amiya Nayak:
ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social Networks. 610-619 - Donghong Zhang, Zhenyu Zhang, Bo Jiang, T. H. Tse:
The Impact of Lightweight Disassembler on Malware Detection: An Empirical Study. 620-629 - Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi:
A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy. 630-635 - Tengfei Xue, Yuyu Yuan, Zahir Ahmed, Krishna Moniz, Ganyuan Cao, Cong Wang:
Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency. 636-644 - Maitraye Das, Nusrat Jahan Mozumder, Sharmin Afrose, Khandakar Ashrafi Akbar, Tanzima Hashem:
A Novel Secret Sharing Approach for Privacy-Preserving Authenticated Disease Risk Queries in Genomic Databases. 645-654 - Xiaoshan Sun, Yu Fu, Yun Dong, Zhihao Liu, Yang Zhang:
Improving Fitness Function for Language Fuzzing with PCFG Model. 655-660 - Jordi Aranda, Jordi Nin Guerrero, Javier Herranz:
Answering Multiple Aggregate Queries Under a Specific Privacy Condition. 661-666
CAP: Computer Architecture & Platforms
- Cristina Seceleanu, Keiji Kimura:
Message from the CAP Organizing Committee. 667 - Hui Li, Shanxiong Chen, Guoqiang Xiao, Xiaoning Peng, Jianwei Liao:
Adaptive Splitting-Based Block I/O Scheduling in Disk Storage. 668-676 - Qingshi Shao, Shijun Liu, Li Pan, Chenglei Yang, Tingting Niu:
A Market-Oriented Heuristic Algorithm for Scheduling Parallel Applications in Big Data Service Platform. 677-686 - Yuan Cai, Wei Luo, Dong Xiang:
The Column-Partition and Row-Partition Turn Model. 687-694 - Rui Wang, Libin Xu, Yuebin Bai, Kun Cheng, Zhongzhao Wang, Guangqiang Luan, Hailong Yang, Weitao Wang:
Research on Asynchronous Inter-VM Communication Mechanism Based on Embedded Hypervisor. 695-700 - Jakob Danielsson, Marcus Jägemar, Moris Behnam, Mikael Sjödin, Tiberiu Seceleanu:
Measurement-Based Evaluation of Data-Parallelism for OpenCV Feature-Detection Algorithms. 701-710 - Hai-Feng Xing, Jiantao Zhou, Xiaoyu Song, Rui-dong Qi:
SMT-Based Timing Analysis and Verification of Real-Time Task. 711-720 - Guangqiang Luan, Yuebin Bai, Libin Xu, Chao Yu, Chunyang Wang, Junfang Zeng, Qingbin Chen, Weitao Wang:
Towards Fault-Tolerant Task Backup and Recovery in the seL4 Microkernel. 721-726
ITIP: IT in Practice
- San Murugesan, Fulvio Corno:
Message from the ITiP Symposium Chairs. 727 - Rui Cao, Zhaoyang Yu, Trent G. Marbach, Jing Li, Gang Wang, Xiaoguang Liu:
Load Prediction for Data Centers Based on Database Service. 728-737 - Irena Bojanova, Yaacov Yesha, Paul E. Black:
Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN). 738-745 - Seongwoon Jeong, Kincho H. Law:
An IoT Platform for Civil Infrastructure Monitoring. 746-754 - Nishtha Kesswani, Sanjay Kumar:
The Smart-X Model for Smart Cities. 755-760 - Sid-Ahmed Selouani, Mohamed Sidi Yacoub:
Long Short-Term Memory Neural Networks for Artificial Dialogue Generation. 761-768 - Ankita Rane, Anand Kumar:
Sentiment Classification System of Twitter Data for US Airline Service Analysis. 769-773 - Tharidu Fernando, Nikita Gureev, Mihhail Matskin, Michael Zwick, Thomas Natschläger:
WorkflowDSL: Scalable Workflow Execution with Provenance for Data Analysis Applications. 774-779
Fast Abstracts
- Hossain Shahriar, Hiroki Takakura, Michiharu Takemoto, Dave Towey:
Message from the Fast Abstract Co-chairs. 780 - Yutsuki Miyashita, Takafumi Tanaka, Atsuo Hazeyama:
Systematic Literature Review Regarding Communication Support in Project-Based Learning of Software Development. 781-782 - Wook-Sung Yoo, Zach Jones, Henok Atsbaha, David Wingfield:
Painless Tennis Ball Tracking System. 783-784 - Bo Cheng, Shuai Zhao, Junliang Chen:
Remote Monitoring and Control Web Service for Internet of Heating. 785-786 - Tuan-Fang Fan, Churn-Jung Liau:
Possibilistic Reasoning About Actions in Agent Systems. 787-788 - Beomsu Kim, Ki-Il Kim, Babar Shah:
An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks. 789-790 - Usa Sammapun, Panuchart Bunyakiati:
On Selecting Collaborative Modeling Tools. 791-792 - Satoshi Yamane, Tetsuto Takano:
Machine Translation Considering Context Informaiton Using Encoder-Decoder Model. 793-794 - Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Mario Gerla:
Spatio-Temporal Data Retention System with MEC for Local Production and Consumption. 795-796 - Fu-Hsing Tsai:
Designing a Computer Detective Game for Science Education. 797-798 - Hiromu Kamide, Kosuke Uemura, Satoshi Yamane:
Model Check of Real-time Property of Embedded Assembly Program Using CEGAR. 799-800 - Taiki Shimizu, Kohei Sakurai:
Comprehensive Data Tree by Actor Messaging for Incremental Hierarchical Clustering. 801-802 - Hyun-il Lim:
Applying Code Vectors for Presenting Software Features in Machine Learning. 803-804 - Feri Setiawan, Sunder Ali Khowaja, Aria Ghora Prabono, Bernardo Nugroho Yahya, Seok-Lyong Lee:
A Framework for Real Time Emotion Recognition Based on Human ANS Using Pervasive Device. 805-806 - Salma Ayari, Yosra Ben Dali Hlaoui, Leila Jemni Ben Ayed:
A New Approach for the Verification of BPMN Models Using Refinement Patterns. 807-808 - Yu-Feng Hsu, Chih-Lin Hu, Hsin-Ju Hsiao:
On Exploiting Temporal Periodicity for Message Delivery in Mobile Opportunistic Networks. 809-810 - Kouto Miyazawa, Kanon Sasaki, Naoki Oda, Saneyasu Yamaguchi:
Cyclic Performance Fluctuation of TCP BBR. 811-812 - Adnan Mahmood, Bernard Butler, Brendan Jennings:
Towards Efficient Network Resource Management in SDN-Based Heterogeneous Vehicular Networks. 813-814 - Hiroaki Yamauchi, Akihiro Nakao, Masato Oguchi, Shu Yamamoto, Saneyasu Yamaguchi:
Clustering TLS Sessions Based on Protocol Fields Analysis. 815-816 - Victor Parque, Tomoyuki Miyashita:
On Graph Representation with Smallest Numerical Encoding. 817-818 - Victor Parque, Tomoyuki Miyashita:
Numerical Representation of Modular Graphs. 819-820 - Hanwu Luo, Wenzhen Li, Ying Qian, Liang Dou:
Mitigating SDN Flow Table Overflow. 821-822 - Hsung-Pin Chang, Yu-Cain He, Da-Wei Chang:
An Integrated Memory and SSD Caching I/O Subsystem. 823-824 - Reza M. Parizi, Kai Qian, Hossain Shahriar, Fan Wu, Lixin Tao:
Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools. 825-826 - Taeho Kim, Sungwon Kang, Jihyun Lee:
Effects of Variable Part Auto Configuration and Management for Software Product Line. 827-828 - Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar, Md Arabin Islam Talukder, Prabir Bhattacharya:
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio. 829-830 - Labiblais Rahman, Katsunori Oyama:
A Comparison of EEG and NIRS Biomarkers for Assessment of Depression Risk. 831-832 - Yangxu Jin, Ting Liu, Ancheng He, Yu Qu, Jianlei Chi:
Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection. 833-834 - Victor Clincy, Hossain Shahriar:
Web Application Firewall: Network Security Models and Configuration. 835-836 - Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance. 837-838
MOWU: Mobile, Wearable & Ubiquitous Computing
- Vladimir Getov, Hong Va Leong:
Message from the MOWU Organizing Committee. 839-841 - Shimpei Ohsugi, Noboru Koshizuka:
Delivery Route Optimization Through Occupancy Prediction from Electricity Usage. 842-849 - Tianheng Wu, Liang Wang, Zhiwen Zheng, Simeng Wu, Jun Ma, Xianping Tao, Jian Lu:
CARMUS: Towards a General Framework for Continuous Activity Recognition with Missing Values on Smartphones. 850-859 - Mohammed Balfas, Sheikh Iqbal Ahamed, Chandana P. Tamma, Muhammad Arif, Ahmed J. Kattan, William C. C. Chu:
A Study and Estimation a Lost Person Behavior in Crowded Areas Using Accelerometer Data from Smartphones. 860-865 - Drew Williams, Golam Mushih Tanimul Ahsan, Ivor D. Addo, Sheikh Iqbal Ahamed, Daniel Petereit, Linda Burhansstipanov, Linda U. Krebs, Mark Dignan:
Building a Tailored Text Messaging System for Smoking Cessation in Native American Populations. 866-874 - Golam Mushih Tanimul Ahsan, Jannatul Ferdause Tumpa, Riddhiman Adib, Sheikh Iqbal Ahamed, Daniel Petereit, Linda Burhansstipanov, Linda U. Krebs, Mark Dignan:
A Culturally Tailored Intervention System for Cancer Survivors to Motivate Physical Activity. 875-880 - Shijie Li, Yong Dou, Jinwei Xu, Qiang Wang, Xin Niu:
mmCNN: A Novel Method for Large Convolutional Neural Network on Memory-Limited Devices. 881-886
NCIW: Networks, Communications, Internet & Web Technologies
- Behrooz A. Shirazi, Nariyoshi Yamai:
Message from the NCIW Program Co-chairs. 887 - Fu-Shiung Hsieh, Yi-Hong Guo:
Winner Determination in Combinatorial Double Auctions Based on Differential Evolution Algorithms. 888-893 - You-Chiun Wang, Han Hu:
A Low-cost, High-Efficiency SDN Framework to Diminish Redundant ARP and IGMP Traffics in Large-Scale LANs. 894-903 - Ling Guo, Bo Wan, Changlong Li, Kaiqi Zhou, Xi Li:
A Flow-Grained End-to-End Delay Analysis for RC Traffic in TTEthernet. 904-913 - Yan Zhu, Shuai Yang, Guohua Gan, Xiao He:
An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table. 914-919 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:
A Solution for Minimum Link Flow Problem with Sparse Modeling. 920-925 - Weitao Wang, Yuebin Bai, Peng Feng, Yuhao Gu, Shuai Liu, Wenhao Jiang, Jun Huang:
DTN-Knca: A High Throughput Routing Based on Contact Pattern Detection in DTNs. 926-931 - Sizheng Li, Chuanhe Huang:
A Multihop Broadcast Mechanism for Emergency Messages Dissemination in VANETs. 932-937
Student Research Symposium
- Toyokazu Akiyama, Maria Lee:
Message from The Student Research Symposium Co-Chairs. 938 - Hyunsu Mun, Jeasung Na, Hanul Park, Seungtae Kim, Youngseok Lee, John A. Springer:
Analysis of the Relationship Between Server Location and RTT. 939-942 - Ryuichiro Maegawa, Ryo Nakamura, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
A Study on Emulating Automotive IP Networks Using Network Virtualization. 943-946 - Yoshinori Kamori, Kenta Hayasi, Kaori Maeda, Tohru Kondo, Reiji Aibara:
A Secure Sharing System for Cloud Desktop Applications Migrating with Optimized User Experience. 947-950 - Shintaro Ishihara, Toyokazu Akiyama:
A Tuning Method of a Monitoring System for Network Forensics in Cloud Environment. 951-954 - Chuta Minamiguchi, Natsuko Kawabata, Ryo Nakamura, Hiroyuki Ohsaki:
A Study on Comparative Analysis of End-to-End Routing and Opportunistic Routing. 955-958 - Seong-Kyun Mok, Eun-Sun Cho:
Building a CFG to Include Exceptions. 959-961 - Reido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata:
Alternating Primary Subflow in MPTCP by External Program without Kernel Modification. 962-965 - Kazuyuki Yamashita, Ryo Nakamura, Hiroyuki Ohsaki:
A Study on Robustness of Complex Networks Against Random Node Removals. 966-969 - Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
A Study on the Impact of Delayed Packet Forwarding in Content-Centric Networking. 970-972 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:
A Study on Sparse-Modeling Based Approach for Betweenness Centrality Estimation. 973-976 - Seoksu Lee, Eun-Sun Cho:
Toward Firmware-Type Analysis Using Machine Learning Techniques. 977-978
CELT: Computer Education & Learning Technologies
- Tiziana Margaria, Henry C. B. Chan:
Message from the CELT 2018 Symposium Co-Chairs. 979 - Luca Cagliero, Luigi De Russis, Laura Farinetti, Teodoro Montanaro:
Improving the Effectiveness of SQL Learning Practice: A Data-Driven Approach. 980-989 - Frederik Gossen, Dennis Kühn, Tiziana Margaria, Anna-Lena Lamprecht:
Computational Thinking: Learning by Doing with the Cinco Adventure Game Tool. 990-999 - Marina Marchisio, Luigi Di Caro, Michele Fioravera, Sergio Rabellino:
Towards Adaptive Systems for Automatic Formative Assessment in Virtual Learning Communities. 1000-1005 - Han Wan, Kangxu Liu, Qiaoye Yu, Jun Ding, Xiaopeng Gao:
Improving Blended Learning Outcomes Through Academic Social Media. 1006-1015 - Marina Marchisio, Alice Barana, Michele Fioravera, Sergio Rabellino, Alberto Conte:
A Model of Formative Automatic Assessment and Interactive Feedback for STEM. 1016-1025 - W. K. T. M. Gunarathne, Chalothon Chootong, Worapot Sommool, Ankhtuya Ochirbat, Yi-Cheng Chen, Sorel Reisman, Timothy K. Shih:
Web-Based Learning Object Search Engine Solution Together with Data Visualization: The Case of MERLOT II. 1026-1031 - Iris Braun, Tenshi Hara, Felix Kapp, Lucas Braeschke, Alexander Schill:
Technology-Enhanced Self-Regulated Learning: Assessment Support Through an Evaluation Centre. 1032-1037
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.