Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
COMPSAC
COMPSAC 2011
Generate Citations
2011 IEEE 35th Annual Computer Software and Applications Conference
July 18 2011 to July 22 2011
Munich, Germany
ISSN: 0730-3157
ISBN: 978-0-7695-4439-7
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xv
Papers
Message from the General Chairs
Freely available from IEEE.
pp. xvi-xvii
Papers
Message from the Chair of Standing Committee
Freely available from IEEE.
pp. xviii-xix
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. xx-xxi
Papers
Organization
Freely available from IEEE.
pp. xxii-xxx
Papers
Reviewers
Freely available from IEEE.
pp. xxxi-xxxvi
Papers
From Embedded Systems to Cyber-Physical Systems: Research Challenges and Application Areas
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Reinhold E. Achatz
Papers
Embracing Uncertainty: The New Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 2
by
Chris Bishop
Joint COMPSAC/SAINT 2011 Panel: International Perspectiveson Computed World: Software Beyond the Digital Society
Freely available from IEEE.
pp. 3-3
by
Stephen S. Yau
Papers
An Adaptive Performance Modeling Approach to Performance Profiling of Multi-service Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-13
by
Xiang Huang
,
Wei Wang
,
Wenbo Zhang
,
Jun Wei
,
Tao Huang
Papers
A Semantic Similarity Measure between Web Services Based on Google Distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Huirong Yang
,
Pengbin Fu
,
Baocai Yin
,
Mengduo Ma
,
Yanyan Tang
Papers
An Intelligent Broker Approach to Semantics-Based Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Yufeng Zhang
,
Hong Zhu
Papers
The Emerging Web of Social Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-27
by
Silvio R. L. Meira
,
Vanilson A. A. Burégio
,
Leandro M. Nascimento
,
Elaine Figueiredo
,
Misael Neto
,
Bruno Encarnação
,
Vinícius Cardoso Garcia
Papers
Confidentiality Preserving Security Properties for Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-37
by
Thoshitha T. Gamage
,
Thomas P. Roth
,
Bruce M. McMillin
Papers
Bench4Q: A QoS-Oriented E-Commerce Benchmark
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-47
by
Wenbo Zhang
,
Sa Wang
,
Wei Wang
,
Hua Zhong
Papers
P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-57
by
Mingqiang Xue
,
Barbara Carminati
,
Elena Ferrari
Papers
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-67
by
Zhenyu Zhang
,
W. K. Chan
,
T. H. Tse
,
Bo Jiang
Papers
An Analysis of Failure-Based Test Profiles for Random Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Robert Merkel
,
Fei-Ching Kuo
,
Tsong Yueh Chen
Papers
Testing Tasks Management in Testing Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-85
by
Lian Yu
,
Xiaohu Li
,
Zhongjie Li
Papers
A Management Tool for the Replication of Operating Systems in Wireless Communication Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-92
by
Luis G. Crepaldi
,
Adriano R. Digiere
,
Roberta Spolon
,
Marcos A. Cavenaghi
,
Renata S. Lobato
Papers
A DSML for Coordinating User-Centric Communication Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-102
by
Yali Wu
,
Frank Hernandez
,
Peter J. Clarke
,
Robert France
Papers
Ant Colony Optimization for Deadlock Detection in Concurrent Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-117
by
Gianpiero Francesca
,
Antonella Santone
,
Gigliola Vaglini
,
Maria Luisa Villani
Papers
A Formal Semantics of PLC Programs in Coq
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-127
by
Sidi Ould Biha
On Extracting Perception-Based Features for Effective Similar Shader Retreival
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-107
by
Min-Hee Jang
,
Si-Yong Lee
,
Sang-Wook Kim
,
Myung-Cheol Roh
,
Jae-Ho Lee
,
Seung-Woo Nam
Papers
An Abstraction Method for Mobility and Interaction in Process Algebra Using Behavior Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-133
by
Sujeong Woo
,
Jinho On
,
Moonkun Lee
Papers
Spoken Interaction within the Computed World: Evaluation of a Multitasking Adaptive Spoken Dialogue System
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-143
by
Tobias Heinroth
,
Dan Denich
Papers
Assessing Web Site Usability in Retail Electronic Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
Charles E. Downing
,
Chang Liu
Papers
Spoken Dialogue System for Learning Braille
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-156
by
Masahiro Araki
,
Kana Shibahara
,
Yuko Mizukami
Papers
Semi-automation of Configuration Files Generation for Heterogeneous Multi-tile Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-166
by
Alexandre Chagoya-Garzon
,
Nicolas Poste
,
Frederic Rousseau
Papers
Adaptive Bandwidth-Based Thread Group Scheduler for Compositional Real-Time Middleware Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-175
by
Jagun Kwon
,
Stephen Hailes
Papers
A Concept for Secure Production Programming of Embedded Industrial Field Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-181
by
Jimmy Kjellsson
,
Martin Törngren
Papers
Multi-node Network Based Control and Data Acquisition System for a VHF Radar Depth Sounder
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-183
by
Chris Prokopiak
,
Carl Leuschen
,
Fernando Rodriguez-Morales
,
John Ledford
,
William Blake
,
Anthony Hoch
,
Hilary Barbour
Papers
Combining Dynamic Program Viewing and Testing in Early Computing Courses
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-192
by
James H. Cross II
,
T. Dean Hendrix
,
Larry A. Barowski
Papers
Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational Initiatives
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-198
by
Nancy R. Mead
,
Linda M. Laird
,
Dan Shoemaker
Papers
Interactive Real-Time Embedded Systems Education Infused with Applied Internet Telephony
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Kyle Persohn
,
Dennis Brylow
Papers
An Approach to Model-Based Development of Context-Aware Adaptive Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-214
by
Mahmoud Hussein
,
Jun Han
,
Alan Colman
Papers
SPEM Extension with Software Process Architectural Concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-223
by
Fadila Aoussat
,
Mourad Oussalah
,
Mohamed Ahmed Nacer
Papers
An AADL-Based Modeling Method for ARINC653-Based Avionics Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-229
by
Ying Wang
,
Dianfu Ma
,
Yongwang Zhao
,
Lu Zou
,
Xianqi Zhao
Papers
Fine-Grained Configuration Management for Collaborative Ontology Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-238
by
Tao Yang
,
Yijian Wu
,
Xin Peng
,
Wenyun Zhao
Papers
Diagnosis of Software Models with Multiple Levels of Abstraction Using Ontological Metamodeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-244
by
Nophadol Jekjantuk
,
Jeff Z. Pan
,
Yuzhong Qu
Papers
Managing Web Content Using Linked Data Principles - Combining Semantic Structure with Dynamic Content Syndication
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-250
by
Norman Heino
,
Sebastian Tramp
,
Sören Auer
Papers
Quality Validation through Pattern Detection - A Semantic Web Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-252
by
David Walsh
,
Philipp Schugerl
,
Juergen Rilling
,
Philippe Charland
Papers
Model Checking Aspectual Pervasive Software Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-262
by
Dhaminda B. Abeywickrama
,
Sita Ramakrishnan
Papers
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-272
by
Anna Squicciarini
,
Dan Lin
,
Alessandro Mancarella
Papers
Supporting Dynamic Service Updates in Pervasive Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Junqing Chen
,
Linpeng Huang
Papers
24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-288
by
Ricardo Jorge Santos
,
Jorge Bernardino
,
Marco Vieira
Papers
A Framework for Access Control with Inference Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-297
by
Vasilios Katos
,
Dimitrios Vrakas
,
Panagiotis Katsaros
Papers
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-307
by
Axel Schröpfer
,
Florian Kerschbaum
,
Günter Müller
Papers
A Framework for Multi-layered Requirements Documentation and Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-313
by
Michel dos Santos Soares
,
Jos Vrancken
Papers
Security Requirements Engineering in the Wild: A Survey of Common Practices
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-319
by
Golnaz Elahi
,
Eric Yu
,
Tong Li
,
Lin Liu
Papers
Similarity Based Distributed Context Reasoning with Layer Context Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Chun Kyung Lee
,
Thi Hien Pham
,
Hee Seong Kim
,
Hee Yong Youn
Papers
AGORAS: Exploring Creative Learning on Tangible User Interfaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-335
by
Alejandro Catala
,
Javier Jaen
,
Adria A. Martinez-Villaronga
,
Jose A. Mocholi
Papers
Palimpsests of Time and Place
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-345
by
J. Fishenden
,
A. Hugill
Papers
Design and Evaluation of Social Interfaces for Cultural Exhibitions of Chinese Shadow Puppetry
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-347
by
Tin-Kai Chen
,
Hsiao-Ping Fang
,
Yingchun Tian
,
Hsiao-Lin Fang
,
Yan-Jie Li
,
Shih-Hsuan Tseng
,
Su-En Miao
Papers
Ontology-Based Reliability Evaluation for Web Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-349
by
Xifeng Wang
,
Bixin Li
,
Li Liao
,
Chunli Xie
Papers
Reliability and Accuracy of the Estimation Process - Wideband Delphi vs. Wisdom of Crowds
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-359
by
Marek Grzegorz Stochel
Papers
Quality Model Driven Dynamic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
PVR Murthy
,
Saravana Kumar V
,
Tushar Sharma
,
Kiron Rao
Papers
Software Reliability Prediction for Open Source Software Adoption Systems Based on Early Lifecycle Measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-371
by
Wangbong Lee
,
Joon Kyung Lee
,
Jongmoon Baik
Papers
Privacy in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 372
by
Kenji Takahashi
Papers
Software Infrastructure for Delivering and Supporting Distributed Applications Enhanced with Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-382
by
Montserrat Sendín
,
Juan Miguel López
Papers
Semantics Based Cohesion and Coupling Metrics for Evaluating Understandability of State Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-392
by
Jung Ho Bae
,
Yeon Ji Jeong
,
Heung Seok Chae
,
Carl K. Chang
Papers
CALIGRAPHI - Creation of Adaptive Dialogues Using a Graphical Interface
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-400
by
Gregor Bertrand
,
Florian Nothdurft
,
Frank Honold
,
Felix Schüssel
Papers
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-406
by
Riccardo Lancellotti
,
Mauro Andreolini
,
Claudia Canali
,
Michele Colajanni
Papers
JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-412
by
Patrick P.F. Chan
,
Lucas C.K. Hui
,
S.M. Yiu
Papers
MasterBlaster: Identifying Influential Players in Botnet Transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-419
by
Napoleon C. Paxton
,
Gail-Joon Ahn
,
Mohamed Shehab
Papers
Distributed Java-Based Content Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Smitha Sundareswaran
,
Anna Squicciarini
,
Ranjani Sundareswaran
Papers
Towards More Effective Spectrum Use Based on Memory Allocation Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-435
by
John Meier
,
Christopher Gill
,
Roger D. Chamberlain
Papers
Software-Based Analysis of the Effects of Electrostatic Discharge on Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-441
by
Pratik Maheshwari
,
Tianqi Li
,
Jong-Sung Lee
,
Byong-Su Seol
,
Sahra Sedigh
,
David Pommerenke
Papers
Enhancing Performance of NoC-Based Architectures Using Heuristic Virtual-Channel Sharing Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Khalid Latif
,
Amir-Mohammad Rahmani
,
Kameswar Rao Vaddina
,
Tiberiu Seceleanu
,
Pasi Liljeberg
,
Hannu Tenhunen
Papers
Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives -- Panel Introduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-449
by
Cristina Seceleanu
Papers
Formal Methods Applied in Industry - On the Commercialisation of the UPPAAL Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-451
by
Paul Pettersson
Papers
Formal Methods in the Era of Service-Oriented Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-453
by
Tiziana Margaria
Papers
From Solution to Problem Spaces: Formal Methods in the Context of Model-Based Development and Domain-Specific Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-455
by
Bernhard Schätz
Papers
Conformance Checking with Constraint Logic Programming: The Case of Feature Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-465
by
Raúl Mazo
,
Roberto E. Lopez-Herrejon
,
Camille Salinesi
,
Daniel Diaz
,
Alexander Egyed
Papers
A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-475
by
Golnaz Elahi
,
Eric Yu
Papers
Eliciting Considerable Requirements with Word and Customer Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-485
by
Daichi Kimura
,
Tomohisa Gotoh
,
Ken'ichi Ikeda
Papers
Reasoning about Global Clones: Scalable Semantic Clone Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-491
by
Philipp Schugerl
,
Juergen Rilling
,
Philippe Charland
Papers
Dynamic Software Visualization with BusyBorg - A Proof of Concept
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-497
by
Henning Femmer
,
Nora Broy
,
Marin Zec
,
Asa MacWilliams
,
Roland Eckl
Papers
An XML C Source Code Interchange Format for CASE Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-503
by
Noritoshi Atsumi
,
Takashi Kobayashi
,
Shinichiro Yamamoto
,
Kiyoshi Agusa
Papers
Selection and Ordering of Points-of-Interest in Large-Scale Indoor Navigation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 504-509
by
Martin Werner
Papers
Cloudifying User-Created Content for Existing Applications in Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-515
by
Subhamoy Ghosh
,
Juha Savolainen
,
Mikko Raatikainen
,
and Tomi Männistö
Papers
Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-521
by
Ulrich Bareth
,
Axel Küpper
Papers
Panel III "Smart Technology" -- Applications and Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 522
by
Sahra Sedigh
Papers
On-line Cache Strategy Reconfiguration for Elastic Caching Platform: A Machine Learning Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-534
by
Xiulei Qin
,
Wenbo Zhang
,
Wei Wang
,
Jun Wei
,
Hua Zhong
,
Tao Huang
Papers
Automating the Development of Device-Aware Web Services: A Model-Driven Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-540
by
Achilleas Achilleos
,
Nearchos Paspallis
,
George A. Papadopoulos
Papers
A Statistical Approach for Estimating CPU Consumption in Shared Java Middleware Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-546
by
Wei Wang
,
Xiang Huang
,
Yunkui Song
,
Wenbo Zhang
,
Jun Wei
,
Hua Zhong
,
Tao Huang
Papers
Analysis of Concept Similarity Methods Applied to an LSH Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-555
by
Luciano B. de Paula
,
Rodolfo S. Villaça
,
Maurício F. Magalhães
Papers
Application of Semantic Web Services for Mobile Telemedicine Service Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 562-563
by
Tara Raafat
,
Franjo Cecelja
Papers
A Staged Model for Web Service Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 564-565
by
Chunli Xie
,
Bixin Li
,
Xifeng Wang
Papers
Security Monitoring of Components Using Aspects and Contracts in Wrappers
Full-text access may be available. Sign in or learn about subscription options.
pp. 566-575
by
Xiaofeng Yang
,
Mohammad Zulkernine
Detecting and Resolving Inconsistencies in Ontologies Using Contradiction Derivations
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-561
by
Sajjad Hussain
,
Jos De Roo
,
Ali Daniyal
,
Syed Sibte Raza Abidi
Papers
Towards Training Set Reduction for Bug Triage
Full-text access may be available. Sign in or learn about subscription options.
pp. 576-581
by
Weiqin Zou
,
Yan Hu
,
Jifeng Xuan
,
He Jiang
Papers
Usage-Based Online Testing for Proactive Adaptation of Service-Based Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 582-587
by
Osama Sammodi
,
Andreas Metzger
,
Xavier Franch
,
Marc Oriol
,
Jordi Marco
,
Klaus Pohl
Papers
A Technique of Profiling Selective Paths
Full-text access may be available. Sign in or learn about subscription options.
pp. 588-589
by
Lulu Wang
,
Bixin Li
Papers
A Norm-Based Approach towards Requirements Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-595
by
Shokoofeh Ketabchi
,
Navid Karimi Sani
,
Kecheng Liu
Papers
Towards a Unified Goal-Oriented Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 596-601
by
Pedro Patrício
,
Vasco Amaral
,
João Araújo
,
Rui Monteiro
Papers
Requirements Recovery by Matching Domain Ontology and Program Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 602-607
by
Feng Chen
,
Hong Zhou
,
Hongji Yang
,
Martin Ward
,
William Cheng-Chung Chu
Showing 100 out of 122
Load More
Load All