Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
COMPSAC
COMPSAC 2018
Generate Citations
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)
July 23 2018 to July 27 2018
Tokyo, Japan
Volume:
0
1
Table of Contents
Title Page i - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
Title Page iii - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-3
Copyright Page - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-4
Table of Contents - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-25
Message from the Standing Committee Chair - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-27
Message from the Steering Committee Vice Chair - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-28
Foreword from the 2018 General Chairs - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-30
Message from the Program Chairs - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-32
COMPSAC 2018 Organizers - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-50
COMPSAC 2019 Committee - Volume 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-51
Message from SETA 2018 Symposium Chairs
Freely available from IEEE.
pp. 1-1
by
W.K. Chan
,
Hong Zhu
An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-11
by
Lov Kumar
,
Ashish Sureka
EFSM-Oriented Minimal Traces Set Generation Approach for Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-21
by
Weiwei Wang
,
Junxia Guo
,
Zheng Li
,
Ruilian Zhao
DevOps Improvements for Reduced Cycle Times with Integrated Test Optimizations for Continuous Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Dusica Marijan
,
Marius Liaaen
,
Sagar Sen
A Multi-layered Desires Based Framework to Detect Users' Evolving Non-functional Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-37
by
Peng Sun
,
Jingwei Yang
,
Hua Ming
,
Carl K. Chang
A Framework for Updating Functionalities Based on the MAPE Loop Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-47
by
Shinya Tsuchida
,
Hiroyuki Nakagawa
,
Emiliano Tramontana
,
Andrea Fornaia
,
Tatsuhiro Tsuchiya
Using Code Evolution Information to Improve the Quality of Labels in Code Smell Datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Yijun Wang
,
Songyuan Hu
,
Linfeng Yin
,
Xiaocong Zhou
Combining Constraint Solving with Different MOEAs for Configuring Large Software Product Lines: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-63
by
Huiqun Yu
,
Kai Shi
,
Jianmei Guo
,
Guisheng Fan
,
Xingguang Yang
,
Liqiong Chen
Cross-Project Change-Proneness Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-73
by
Chao Liu
,
Dan Yang
,
Xin Xia
,
Meng Yan
,
Xiaohong Zhang
Visualizing a Tangled Change for Supporting Its Decomposition and Commit Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
Sarocha Sothornprapakorn
,
Shinpei Hayashi
,
Motoshi Saeki
An Assertion Framework for Mobile Robotic Programming with Spatial Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-89
by
Hao Sun
,
Xiaoxing Ma
,
Tiansi Dong
,
Armin B. Cremers
,
Chun Cao
Exploration Scheduling for Replay Events in GUI Testing on Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-99
by
Chia-Hui Lin
,
Cheng-Zen Yang
,
Peng Lu
,
Tzu-Heng Lin
,
Zhi-Jun You
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Junaid Akram
,
Zhendong Shi
,
Majid Mumtaz
,
Ping Luo
DistGear: A Lightweight Event-Driven Framework for Developing Distributed Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-115
by
Junming Ma
,
Bo An
,
Xiangqun Chen
,
Donggang Cao
A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-125
by
Chang-ai Sun
,
Jingting Jia
,
Huai Liu
,
Xiangyu Zhang
GBRAD: A General Framework to Evaluate Design Strategies for Hybrid Race Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-131
by
Jialin Yang
,
W.K. Chan
,
Y.T. Yu
,
Jacky Keung
SPESC: A Specification Language for Smart Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Xiao He
,
Bohan Qin
,
Yan Zhu
,
Xing Chen
,
Yi Liu
An Insight Into the Impact of Dockerfile Evolutionary Trajectories on Quality and Latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Yang Zhang
,
Gang Yin
,
Tao Wang
,
Yue Yu
,
Huaimin Wang
Improving Cluster Resource Efficiency with Oversubscription
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-153
by
Jie Chen
,
Chun Cao
,
Ying Zhang
,
Xiaoxing Ma
,
Haiwei Zhou
,
Chengwei Yang
Automatic Detection of Outdated Comments During Code Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-163
by
Zhiyong Liu
,
Huanchao Chen
,
Xiangping Chen
,
Xiaonan Luo
,
Fan Zhou
Automatically Detecting the Scopes of Source Code Comments
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-173
by
Huanchao Chen
,
Zhiyong Liu
,
Xiangping Chen
,
Fan Zhou
,
Xiaonan Luo
Search-Based Efficient Automated Program Repair Using Mutation and Fault Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-183
by
Shuyao Sun
,
Junxia Guo
,
Ruilian Zhao
,
Zheng Li
Identifying Supplementary Bug-fix Commits
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-193
by
Tao Ji
,
Jinkun Pan
,
Liqian Chen
,
Xiaoguang Mao
A Generalized Approach to Verification Condition Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-203
by
Cláudio Belo Lourenço
,
Maria João Frade
,
Shin Nakajima
,
Jorge Sousa Pinto
Runtime Verification of Robots Collision Avoidance Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-212
by
Chenxia Luo
,
Rui Wang
,
Yu Jiang
,
Kang Yang
,
Yong Guan
,
Xiaojuan Li
,
Zhiping Shi
Formalization and Verification of Mobile Systems Calculus Using the Rewriting Engine Maude
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-218
by
Wanling Xie
,
Huibiao Zhu
,
Min Zhang
,
Gang Lu
,
Yucheng Fang
Predicting the Breakability of Blocking Bug Pairs
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-228
by
Hui Ding
,
Wanwangying Ma
,
Lin Chen
,
Yuming Zhou
,
Baowen Xu
Precise Extraction of Malicious Behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Khanh Huu The Dam
,
Tayssir Touili
ReTestDroid: Towards Safer Regression Test Selection for Android Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-244
by
Bo Jiang
,
Yu Wu
,
Yongfei Zhang
,
Zhenyu Zhang
,
W.K. Chan
How Do Software Metrics Affect Test Case Prioritization?
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-250
by
Masataka Ozawa
,
Tadashi Dohi
,
Hiroyuki Okamura
Test Case Prioritization Based on Method Call Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-256
by
Jianlei Chi
,
Yu Qu
,
Qinghua Zheng
,
Zijiang Yang
,
Wuxia Jin
,
Di Cui
,
Ting Liu
Model Checking of Embedded Systems Using RTCTL While Generating Timed Kripke Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-257
by
Yajun Wu
,
Satoshi Yamane
Model Checking Coordination of CPS Using Timed Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-263
by
Kaiqiang Jiang
,
Chunlin Guan
,
Jiahui Wang
,
Dehui Du
Towards Modeling Cyber-Physical Systems with SysML/MARTE/pCCSL
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-269
by
Ping Huang
,
Kaiqiang Jiang
,
Chunlin Guan
,
Dehui Du
Modeling and Verifying MooseFS in CSP
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Yucheng Fang
,
Huibiao Zhu
,
Gang Lu
,
Lili Xiao
,
Wanling Xie
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-285
by
Ting Chen
,
Wanyu Huang
,
Muhui Jiang
,
Xiapu Luo
,
Lei Xue
,
Ying Wang
,
Xiaosong Zhang
Structural Function Based Code Clone Detection Using a New Hybrid Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Yanming Yang
,
Zhilei Ren
,
Xin Chen
,
He Jiang
A Structural Analysis Method of OSS Development Community Evolution Based on A Semantic Graph Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Seiya Kato
,
Yota Inagaki
,
Mikio Aoyama
Effective Discrete Memetic Algorithms for Covering Array Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Xu Guo
,
Xiaoyu Song
,
Jian-tao Zhou
Loop Invariant Generation for Non-monotone Loop Structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Chunyan Hou
,
Jinsong Wang
,
Chen Chen
,
Kai Shi
On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Rubing Huang
,
Weiwen Zong
,
Tsong Yueh Chen
,
Dave Towey
,
Jinfu Chen
,
Yunan Zhou
,
Weifeng Sun
Message from the HCSC 2018 Workshop Organizers
Freely available from IEEE.
pp. 316-316
by
Moushumi Sharmin
,
Katsunori Oyama
,
Claudio Giovanni Demartini
Coarsening Networks Based on Local Link Similarity for Community Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-326
by
Yuzhu Wu
,
Qianwen Zhang
,
Jinkui Xie
What Graphs do International Investors See in the ASEAN Capital Markets?
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Uthai Tanlamai
Decision Making Support of UAV Path Planning for Efficient Sensing in Radiation Dose Mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Tokishi Morita
,
Katsunori Oyama
,
Taiju Mikoshi
,
Toshihiro Nishizono
A Japanese Software Keyboard for Tablets that Reduces User Fatigue
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-346
by
Teppei Yajima
,
Hiroshi Hosobe
An Aurora Image Classification Method based on Compressive Sensing and Distributed WKNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-354
by
Yichun Li
,
Ningkang Jiang
Localized Traffic Sign Detection with Multi-scale Deconvolution Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Songwen Pei
,
Fuwu Tang
,
Yanfei Ji
,
Jing Fan
,
Zhong Ning
Teaching Autonomous Driving Using a Modular and Integrated Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-366
by
Jie Tang
,
Liu Shaoshan
,
Songwen Pei
,
Stéphane Zuckerman
,
Liu Chen
,
Weisong Shi
,
Jean-Luc Gaudiot
Machine Learning Assisted High-Definition Map Creation
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-373
by
Jialin Jiao
.
Freely available from IEEE.
Message from the 2018 DSAT Technical Program Chairs
Freely available from IEEE.
pp. 380-381
by
Kathy Grise
,
Maria Lee
Knowledge Map Construction Using Text Mining and Artificial Bee Colony Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
Tsai Chieh-Yuan
,
Ji Wei-Zhong
Mining Rules from Real-Valued Time Series: A Relative Information-Gain-Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-397
by
Yuanduo He
,
Xu Chu
,
Guangju Peng
,
Yasha Wang
,
Zhu Jin
,
Xiaorong Wang
World Grid Square Data Reference Framework and its Potential Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-409
by
Aki-Hiro Sato
,
Shoki Nishimura
,
Tsuyoshi Namiki
,
Naoki Makita
,
Hiroe Tsubaki
A Local Cores-Based Hierarchical Clustering Algorithm for Data Sets with Complex Structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-419
by
Dongdong Cheng
,
Qingsheng Zhu
,
Quanwang Wu
Web Items Recommendation Based on Multi-View Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Hong Yu
,
Tiantian Zhang
,
Jiaxin Chen
,
Chen Guo
,
Yahong Lian
Characterizing Common and Domain-Specific Package Bugs: A Case Study on Ubuntu
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-431
by
Xiaoxue Ren
,
Qiao Huang
,
Xin Xia
,
Zhenchang Xing
,
Lingfeng Bao
,
David Lo
Deciphering Big Data Research Themes
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-437
by
Tsung Teng Chen
,
Maria R. Lee
Towards Lambda-Based Near Real-Time OLAP over Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-441
by
Alfredo Cuzzocrea
,
Rim Moussa
Characterizing Incidents in Cloud-Based IoT Data Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Hong-Linh Truong
,
Manfred Halper
Efficient Discovery of Traveling Companion from Evolving Trajectory Data Stream
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-453
by
Sutheera Puntheeranurak
,
Thi Thi Shein
,
Makoto Imamura
A Software Popularity Recommendation Method Based on Evaluation Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-460
by
Yan Wang
,
Pei-Xiang Bai
,
De-Yu Yang
,
Jian-Tao Zhou
,
Xiaoyu Song
Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-470
by
Yan Wu
,
Nitish Dhakal
,
Dianxiang Xu
,
Jin-Hee Cho
An Improved Promoter Recognition Model Using Convolutional Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
Ying Qian
,
Yu Zhang
,
Bingyu Guo
,
Shasha Ye
,
Yuzhu Wu
,
Jiongmin Zhang
IT Professional 20th Anniversary Panel: The New Realities of AI
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-479
by
San Murugesan
A Deep Learning Approach Based on Stacked Denoising Autoencoders for Protein Function Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-485
by
Lester James Miranda
,
Jinglu Hu
Faster Deep Q-Learning Using Neural Episodic Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-491
by
Daichi Nishio
,
Satoshi Yamane
Automated Dental Image Analysis by Deep Learning on Small Dataset
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-497
by
Jie Yang
,
Yuchen Xie
,
Lin Liu
,
Bin Xia
,
Zhanqiang Cao
,
Chuanbin Guo
A Service-Oriented Approach to Modeling and Reusing Event Correlations
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-507
by
Yanbo Han
,
Meiling Zhu
,
Chen Liu
Elucidating Which Pairwise Mutations Affect Protein Stability: An Exhaustive Big Data Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-515
by
Nicholas Majeske
,
Filip Jagodzinski
DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding Conversation
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-521
by
Sixing Wu
,
Ying Li
,
Xinyuan Zhang
,
Zhonghai Wu
BDViewer — A Web-Based Big Data Processing and Visualization Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 522-527
by
Yan Li
,
Junming Ma
,
Bo An
,
Donggang Cao
Optimising Toward Completed Videos in an Online Video Advertising Exchange
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-533
by
Douglas McIlwraith
,
Andrea Catalucci
,
Sam Boyd
,
Raouf Aghrout
,
Yi-Ke Guo
Message from EATA Symposium Chairs
Freely available from IEEE.
pp. 534-534
by
Ali Hurson
,
Hiroyuki Sato
TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-544
by
Yan Zhu
,
Yao Qin
,
Guohua Gan
,
Yang Shuai
,
William Cheng-Chung Chu
Object Naming Service Supporting Heterogeneous Object Code Identification for IoT System
Full-text access may be available. Sign in or learn about subscription options.
pp. 545-554
by
Duo Ding
,
Minbo Li
,
Zhu Zhu
Energy Efficient Scheduling for Heterogeneous Fog Computing Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 555-560
by
Hsiang-Yi Wu
,
Che-Rung Lee
Lane Change Detection Algorithm on Real World Driving for Arbitrary Road Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-569
by
Jennie Lioris
,
Annie Bracquemond
,
Gildas Thiolon
,
Laurent Bonic
Mapping of Sensor and Route Coordinates for Smart Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 570-576
by
Yasir Saleem
,
Noel Crespi
A Discrete Differential Evolution Algorithm for Carpooling
Full-text access may be available. Sign in or learn about subscription options.
pp. 577-582
by
Fu-Shiung Hsieh
,
Fu-Min Zhan
Formal Analysis of k-Resiliency for Collaborative UAVs
Full-text access may be available. Sign in or learn about subscription options.
pp. 583-592
by
A H M Jakaria
,
Mohammad Ashiqur Rahman
Image Processing Strategies for Automatic Detection of Common Gastroenterological Diseases
Full-text access may be available. Sign in or learn about subscription options.
pp. 593-598
by
Rafael Neujahr Copstein
,
Vicenzo Abichequer
,
Matheus Cruz Andrade
,
Lucas Almeida Machado
,
Evandro Rodrigues
,
Leonardo Pavanatto Soares
,
Marcio Sarroglia Pinho
Message from the SEPT Symposium Program Chairs
Freely available from IEEE.
pp. 599-599
by
Dianxiang Xu
,
Eun-Sun Cho
Towards Light-Weight Deep Learning Based Malware Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 600-609
by
Zeliang Kan
,
Haoyu Wang
,
Guoai Xu
,
Yao Guo
,
Xiangqun Chen
ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 610-619
by
Rui Huang
,
Yichao Lin
,
Bidi Ying
,
Amiya Nayak
The Impact of Lightweight Disassembler on Malware Detection: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 620-629
by
Donghong Zhang
,
Zhenyu Zhang
,
Bo Jiang
,
T.H. Tse
A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 630-635
by
Junjun Zheng
,
Hiroyuki Okamura
,
Tadashi Dohi
Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency
Full-text access may be available. Sign in or learn about subscription options.
pp. 636-644
by
Tengfei Xue
,
Yuyu Yuan
,
Zahir Ahmed
,
Krishna Moniz
,
Ganyuan Cao
,
Cong Wang
A Novel Secret Sharing Approach for Privacy-Preserving Authenticated Disease Risk Queries in Genomic Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 645-654
by
Maitraye Das
,
Nusrat Jahan Mozumder
,
Sharmin Afrose
,
Khandakar Ashrafi Akbar
,
Tanzima Hashem
Showing 100 out of 186
Load More
Load All