Default Cover Image

2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)

July 23 2018 to July 27 2018

Tokyo, Japan

Volume:

Table of Contents

Title Page i - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 1-1
Title Page iii - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 3-3
Copyright Page - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 4-4
Table of Contents - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 5-25
Message from the Standing Committee Chair - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 26-27
Message from the Steering Committee Vice Chair - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 28-28
Foreword from the 2018 General Chairs - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 29-30
Message from the Program Chairs - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 31-32
COMPSAC 2018 Organizers - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 33-50
COMPSAC 2019 Committee - Volume 1Full-text access may be available. Sign in or learn about subscription options.pp. 51-51
Message from SETA 2018 Symposium ChairsFreely available from IEEE.pp. 1-1
An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 2-11
EFSM-Oriented Minimal Traces Set Generation Approach for Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 12-21
DevOps Improvements for Reduced Cycle Times with Integrated Test Optimizations for Continuous IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 22-27
A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 28-37
Using Code Evolution Information to Improve the Quality of Labels in Code Smell DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Cross-Project Change-Proneness PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 64-73
Visualizing a Tangled Change for Supporting Its Decomposition and Commit ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
An Assertion Framework for Mobile Robotic Programming with Spatial ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 80-89
Exploration Scheduling for Replay Events in GUI Testing on Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 90-99
DistGear: A Lightweight Event-Driven Framework for Developing Distributed ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 106-115
A Lightweight Program Dependence Based Approach to Concurrent Mutation AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 116-125
GBRAD: A General Framework to Evaluate Design Strategies for Hybrid Race DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 126-131
SPESC: A Specification Language for Smart ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 132-137
An Insight Into the Impact of Dockerfile Evolutionary Trajectories on Quality and LatencyFull-text access may be available. Sign in or learn about subscription options.pp. 138-143
Improving Cluster Resource Efficiency with OversubscriptionFull-text access may be available. Sign in or learn about subscription options.pp. 144-153
Automatic Detection of Outdated Comments During Code ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 154-163
Automatically Detecting the Scopes of Source Code CommentsFull-text access may be available. Sign in or learn about subscription options.pp. 164-173
Search-Based Efficient Automated Program Repair Using Mutation and Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 174-183
Identifying Supplementary Bug-fix CommitsFull-text access may be available. Sign in or learn about subscription options.pp. 184-193
A Generalized Approach to Verification Condition GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 194-203
Runtime Verification of Robots Collision Avoidance Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 204-212
Formalization and Verification of Mobile Systems Calculus Using the Rewriting Engine MaudeFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Predicting the Breakability of Blocking Bug PairsFull-text access may be available. Sign in or learn about subscription options.pp. 219-228
Precise Extraction of Malicious BehaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
ReTestDroid: Towards Safer Regression Test Selection for Android ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 235-244
How Do Software Metrics Affect Test Case Prioritization?Full-text access may be available. Sign in or learn about subscription options.pp. 245-250
Test Case Prioritization Based on Method Call SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 251-256
Model Checking of Embedded Systems Using RTCTL While Generating Timed Kripke StructureFull-text access may be available. Sign in or learn about subscription options.pp. 257-257
Model Checking Coordination of CPS Using Timed AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 258-263
Towards Modeling Cyber-Physical Systems with SysML/MARTE/pCCSLFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
Modeling and Verifying MooseFS in CSPFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Structural Function Based Code Clone Detection Using a New Hybrid TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
A Structural Analysis Method of OSS Development Community Evolution Based on A Semantic Graph ModelFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Effective Discrete Memetic Algorithms for Covering Array GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Loop Invariant Generation for Non-monotone Loop StructuresFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Coarsening Networks Based on Local Link Similarity for Community DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 317-326
What Graphs do International Investors See in the ASEAN Capital Markets?Full-text access may be available. Sign in or learn about subscription options.pp. 327-332
A Japanese Software Keyboard for Tablets that Reduces User FatigueFull-text access may be available. Sign in or learn about subscription options.pp. 339-346
An Aurora Image Classification Method based on Compressive Sensing and Distributed WKNNFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
Localized Traffic Sign Detection with Multi-scale Deconvolution NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Teaching Autonomous Driving Using a Modular and Integrated ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Machine Learning Assisted High-Definition Map CreationFull-text access may be available. Sign in or learn about subscription options.pp. 367-373
.Freely available from IEEE.
Knowledge Map Construction Using Text Mining and Artificial Bee Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
Mining Rules from Real-Valued Time Series: A Relative Information-Gain-Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 388-397
World Grid Square Data Reference Framework and its Potential ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 398-409
A Local Cores-Based Hierarchical Clustering Algorithm for Data Sets with Complex StructuresFull-text access may be available. Sign in or learn about subscription options.pp. 410-419
Web Items Recommendation Based on Multi-View ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Characterizing Common and Domain-Specific Package Bugs: A Case Study on UbuntuFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Deciphering Big Data Research ThemesFull-text access may be available. Sign in or learn about subscription options.pp. 432-437
Towards Lambda-Based Near Real-Time OLAP over Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 438-441
Characterizing Incidents in Cloud-Based IoT Data AnalyticsFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
Efficient Discovery of Traveling Companion from Evolving Trajectory Data StreamFull-text access may be available. Sign in or learn about subscription options.pp. 448-453
A Software Popularity Recommendation Method Based on Evaluation ModelFull-text access may be available. Sign in or learn about subscription options.pp. 454-460
Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedInFull-text access may be available. Sign in or learn about subscription options.pp. 461-470
An Improved Promoter Recognition Model Using Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 471-476
IT Professional 20th Anniversary Panel: The New Realities of AIFull-text access may be available. Sign in or learn about subscription options.pp. 477-479
A Deep Learning Approach Based on Stacked Denoising Autoencoders for Protein Function PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
Faster Deep Q-Learning Using Neural Episodic ControlFull-text access may be available. Sign in or learn about subscription options.pp. 486-491
Automated Dental Image Analysis by Deep Learning on Small DatasetFull-text access may be available. Sign in or learn about subscription options.pp. 492-497
A Service-Oriented Approach to Modeling and Reusing Event CorrelationsFull-text access may be available. Sign in or learn about subscription options.pp. 498-507
Elucidating Which Pairwise Mutations Affect Protein Stability: An Exhaustive Big Data ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 508-515
DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding ConversationFull-text access may be available. Sign in or learn about subscription options.pp. 516-521
BDViewer — A Web-Based Big Data Processing and Visualization ToolFull-text access may be available. Sign in or learn about subscription options.pp. 522-527
Optimising Toward Completed Videos in an Online Video Advertising ExchangeFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Message from EATA Symposium ChairsFreely available from IEEE.pp. 534-534
Object Naming Service Supporting Heterogeneous Object Code Identification for IoT SystemFull-text access may be available. Sign in or learn about subscription options.pp. 545-554
Energy Efficient Scheduling for Heterogeneous Fog Computing ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 555-560
Lane Change Detection Algorithm on Real World Driving for Arbitrary Road InfrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 561-569
Mapping of Sensor and Route Coordinates for Smart CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 570-576
A Discrete Differential Evolution Algorithm for CarpoolingFull-text access may be available. Sign in or learn about subscription options.pp. 577-582
Formal Analysis of k-Resiliency for Collaborative UAVsFull-text access may be available. Sign in or learn about subscription options.pp. 583-592
Towards Light-Weight Deep Learning Based Malware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 600-609
ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 610-619
The Impact of Lightweight Disassembler on Malware Detection: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 620-629
Proof of Contribution: A Modification of Proof of Work to Increase Mining EfficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 636-644
Showing 100 out of 186