Default Cover Image

2011 IEEE 35th Annual Computer Software and Applications Conference

July 18 2011 to July 22 2011

Munich, Germany

ISSN: 0730-3157

ISBN: 978-0-7695-4439-7

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xv
Papers
Message from the General ChairsFreely available from IEEE.pp. xvi-xvii
Papers
Message from the Chair of Standing CommitteeFreely available from IEEE.pp. xviii-xix
Papers
Message from the Program ChairsFreely available from IEEE.pp. xx-xxi
Papers
OrganizationFreely available from IEEE.pp. xxii-xxx
Papers
ReviewersFreely available from IEEE.pp. xxxi-xxxvi
Papers
From Embedded Systems to Cyber-Physical Systems: Research Challenges and Application AreasFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Embracing Uncertainty: The New Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 2
Papers
An Adaptive Performance Modeling Approach to Performance Profiling of Multi-service Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 4-13
Papers
A Semantic Similarity Measure between Web Services Based on Google DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Papers
An Intelligent Broker Approach to Semantics-Based Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Papers
Confidentiality Preserving Security Properties for Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 28-37
Papers
Bench4Q: A QoS-Oriented E-Commerce BenchmarkFull-text access may be available. Sign in or learn about subscription options.pp. 38-47
Papers
P3D - Privacy-Preserving Path Discovery in Decentralized Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 48-57
Papers
Precise Propagation of Fault-Failure Correlations in Program Flow GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 58-67
Papers
An Analysis of Failure-Based Test Profiles for Random TestingFull-text access may be available. Sign in or learn about subscription options.pp. 68-75
Papers
Testing Tasks Management in Testing Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 76-85
Papers
A DSML for Coordinating User-Centric Communication ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
Papers
Ant Colony Optimization for Deadlock Detection in Concurrent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 108-117
Papers
A Formal Semantics of PLC Programs in CoqFull-text access may be available. Sign in or learn about subscription options.pp. 118-127
On Extracting Perception-Based Features for Effective Similar Shader RetreivalFull-text access may be available. Sign in or learn about subscription options.pp. 103-107
Papers
An Abstraction Method for Mobility and Interaction in Process Algebra Using Behavior OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
Papers
Spoken Interaction within the Computed World: Evaluation of a Multitasking Adaptive Spoken Dialogue SystemFull-text access may be available. Sign in or learn about subscription options.pp. 134-143
Papers
Assessing Web Site Usability in Retail Electronic CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
Papers
Spoken Dialogue System for Learning BrailleFull-text access may be available. Sign in or learn about subscription options.pp. 152-156
Papers
Semi-automation of Configuration Files Generation for Heterogeneous Multi-tile SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 157-166
Papers
Adaptive Bandwidth-Based Thread Group Scheduler for Compositional Real-Time Middleware ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 167-175
Papers
A Concept for Secure Production Programming of Embedded Industrial Field DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 176-181
Papers
Combining Dynamic Program Viewing and Testing in Early Computing CoursesFull-text access may be available. Sign in or learn about subscription options.pp. 184-192
Papers
Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational InitiativesFull-text access may be available. Sign in or learn about subscription options.pp. 193-198
Papers
Interactive Real-Time Embedded Systems Education Infused with Applied Internet TelephonyFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
Papers
An Approach to Model-Based Development of Context-Aware Adaptive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 205-214
Papers
SPEM Extension with Software Process Architectural ConceptsFull-text access may be available. Sign in or learn about subscription options.pp. 215-223
Papers
An AADL-Based Modeling Method for ARINC653-Based Avionics SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 224-229
Papers
Fine-Grained Configuration Management for Collaborative Ontology DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 230-238
Papers
Diagnosis of Software Models with Multiple Levels of Abstraction Using Ontological MetamodelingFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Papers
Managing Web Content Using Linked Data Principles - Combining Semantic Structure with Dynamic Content SyndicationFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
Papers
Quality Validation through Pattern Detection - A Semantic Web PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 251-252
Papers
Model Checking Aspectual Pervasive Software ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 253-262
Papers
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 263-272
Papers
Supporting Dynamic Service Updates in Pervasive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Papers
24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 279-288
Papers
A Framework for Access Control with Inference ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 289-297
Papers
L1 - An Intermediate Language for Mixed-Protocol Secure ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 298-307
Papers
A Framework for Multi-layered Requirements Documentation and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
Security Requirements Engineering in the Wild: A Survey of Common PracticesFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Papers
Similarity Based Distributed Context Reasoning with Layer Context ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
AGORAS: Exploring Creative Learning on Tangible User InterfacesFull-text access may be available. Sign in or learn about subscription options.pp. 326-335
Papers
Palimpsests of Time and PlaceFull-text access may be available. Sign in or learn about subscription options.pp. 336-345
Papers
Ontology-Based Reliability Evaluation for Web ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 348-349
Papers
Reliability and Accuracy of the Estimation Process - Wideband Delphi vs. Wisdom of CrowdsFull-text access may be available. Sign in or learn about subscription options.pp. 350-359
Papers
Quality Model Driven Dynamic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
Papers
Software Reliability Prediction for Open Source Software Adoption Systems Based on Early Lifecycle MeasurementsFull-text access may be available. Sign in or learn about subscription options.pp. 366-371
Papers
Privacy in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 372
Papers
Software Infrastructure for Delivering and Supporting Distributed Applications Enhanced with AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 373-382
Papers
Semantics Based Cohesion and Coupling Metrics for Evaluating Understandability of State DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 383-392
Papers
CALIGRAPHI - Creation of Adaptive Dialogues Using a Graphical InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 393-400
Papers
Dynamic Request Management Algorithms for Web-Based Services in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 401-406
Papers
JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time HeapFull-text access may be available. Sign in or learn about subscription options.pp. 407-412
Papers
MasterBlaster: Identifying Influential Players in Botnet TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 413-419
Papers
Distributed Java-Based Content ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Papers
Towards More Effective Spectrum Use Based on Memory Allocation ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 426-435
Papers
Software-Based Analysis of the Effects of Electrostatic Discharge on Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 436-441
Papers
Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives -- Panel IntroductionFull-text access may be available. Sign in or learn about subscription options.pp. 448-449
Papers
Formal Methods Applied in Industry - On the Commercialisation of the UPPAAL ToolFull-text access may be available. Sign in or learn about subscription options.pp. 450-451
Papers
Formal Methods in the Era of Service-Oriented DesignFull-text access may be available. Sign in or learn about subscription options.pp. 452-453
Papers
From Solution to Problem Spaces: Formal Methods in the Context of Model-Based Development and Domain-Specific LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 454-455
Papers
Conformance Checking with Constraint Logic Programming: The Case of Feature ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 456-465
Papers
A Semi-automated Decision Support Tool for Requirements Trade-Off AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 466-475
Papers
Eliciting Considerable Requirements with Word and Customer GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 476-485
Papers
Reasoning about Global Clones: Scalable Semantic Clone DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 486-491
Papers
Dynamic Software Visualization with BusyBorg - A Proof of ConceptFull-text access may be available. Sign in or learn about subscription options.pp. 492-497
Papers
An XML C Source Code Interchange Format for CASE ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 498-503
Papers
Selection and Ordering of Points-of-Interest in Large-Scale Indoor Navigation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 504-509
Papers
Cloudifying User-Created Content for Existing Applications in Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 510-515
Papers
Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 516-521
Papers
Panel III "Smart Technology" -- Applications and InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 522
Papers
On-line Cache Strategy Reconfiguration for Elastic Caching Platform: A Machine Learning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 523-534
Papers
Automating the Development of Device-Aware Web Services: A Model-Driven ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 535-540
Papers
A Statistical Approach for Estimating CPU Consumption in Shared Java Middleware ServerFull-text access may be available. Sign in or learn about subscription options.pp. 541-546
Papers
Analysis of Concept Similarity Methods Applied to an LSH FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 547-555
Papers
Application of Semantic Web Services for Mobile Telemedicine Service DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 562-563
Papers
A Staged Model for Web Service ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 564-565
Papers
Security Monitoring of Components Using Aspects and Contracts in WrappersFull-text access may be available. Sign in or learn about subscription options.pp. 566-575
Detecting and Resolving Inconsistencies in Ontologies Using Contradiction DerivationsFull-text access may be available. Sign in or learn about subscription options.pp. 556-561
Papers
Towards Training Set Reduction for Bug TriageFull-text access may be available. Sign in or learn about subscription options.pp. 576-581
Papers
Usage-Based Online Testing for Proactive Adaptation of Service-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 582-587
Papers
A Technique of Profiling Selective PathsFull-text access may be available. Sign in or learn about subscription options.pp. 588-589
Papers
A Norm-Based Approach towards Requirements PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 590-595
Papers
Towards a Unified Goal-Oriented LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 596-601
Papers
Requirements Recovery by Matching Domain Ontology and Program OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 602-607
Showing 100 out of 122