Default Cover Image

2013 IEEE 37th International Computer Software and Applications Conference Workshops (COMPSACW)

July 22 2013 to July 26 2013

Japan

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xviii
COMPSACW 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xix-xix
CFSE 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xx-xx
IWSC 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xxi-xxi
STA 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xxii-xxii
STPSA 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xxiii-xxiii
MDVA 2013: ForewordFreely available from IEEE.pp. xxiv-xxv
MVDA 2013: CommitteesFreely available from IEEE.pp. xxvi-xxvi
SAPSE 2013: Message from the Workshop OrganizerFreely available from IEEE.pp. xxvii-xxvii
METHOD 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxviii-xxviii
NETSAP 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxix-xxix
EUCASS 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxx-xxx
ITeS 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxxi-xxxi
ESAS 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxxii-xxxiii
ESAS 2013: Program CommitteeFreely available from IEEE.pp. xxxiv-xxxiv
CIF 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxxv-xxxv
MidArch 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxxvi-xxxvi
MidArch 2013: Program CommitteeFreely available from IEEE.pp. xxxvii-xxxvii
SSS 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xxxviii-xxxviii
QUORS 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xxxix-xxxix
ADMNET 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xli-xli
IEESD-TIP 2013: ForewordFreely available from IEEE.pp. xlii-xlii
HSNCE 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xliii-xliii
IWFIT 2013: Message from the Workshop OrganizersFreely available from IEEE.pp. xliv-xliv
Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software TheftsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Fingerprint Clustering for Forensic Data IndexingFull-text access may be available. Sign in or learn about subscription options.pp. 5-10
Cloud Server Aided Computation for ElGamal Elliptic Curve CryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 11-15
Towards a Better Similarity Measure for Keyword Profiling via ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 16-20
Understanding Requirements for Online Services Based on Users' Behavioural Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
A Feedback-Based Approach to Validate SWRL Rules for Developing Situation-Aware SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
A Case Study of Adaptive Combinatorial TestingFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Service-Oriented Maintainability Modeling and Analysis for a Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 53-58
Reducing the Number of Initial Database States for Integration TestingFull-text access may be available. Sign in or learn about subscription options.pp. 59-64
Opportunities for Clone Detection in Test Case RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 65-70
Using Dependency Relations to Improve Test Case Generation from UML StatechartsFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
Incrementally Applicable t-Wise Combinatorial Test Suites for High-Strength Interaction TestingFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
A Multi-order Markov Chain Based Scheme for Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Hybrid Authorization Conflict Detection by Inferring Partial Data in RDF Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Using Security and Domain Ontologies for Security Requirements AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 101-107
A Petri Net Based Model for Trustworthy Software Process CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 108-114
Transparent Security-Sensitive Process Protection via VMM-Based Process ShadowingFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Privacy-Aware Community Sensing Using Randomized ResponseFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
An Abstraction Method of Behaviors for Process AlgebraFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
A Practical Software Model for Content Aggregation in Browsers Using Recent Advances in HTML5Full-text access may be available. Sign in or learn about subscription options.pp. 151-156
Building Adaptive Accessible Context-Aware for User Interface Tailored to Disable UsersFull-text access may be available. Sign in or learn about subscription options.pp. 157-162
An Integrated Formal Model for Context-Aware SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 163-168
ArgoAWS-UML: Modeling Tool for Adaptive Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 169-174
Modeling and Verification of Call Setup Dynamics of LTE Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 175-180
Model Checking for SpaceWire Link Interface Design Using UppaalFull-text access may be available. Sign in or learn about subscription options.pp. 181-186
Refinement Based Modeling of Workflow Applications Using UML Activity DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
Predictive Notification Service of Privacy Invasion on Posting Pictures to SNSFull-text access may be available. Sign in or learn about subscription options.pp. 193-199
Towards Privacy-Friendly Transparency Services in Inter-organizational Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
An LOF-Based Adaptive Anomaly Detection Scheme for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
Formal Modeling of Trust-Based Access Control in Dynamic CoalitionsFull-text access may be available. Sign in or learn about subscription options.pp. 224-229
Investigating the Relevance of Linked Open Data Sets with SPARQL QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 230-235
Implementation of Metadata Quality Metrics and Application on Public Government DataFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
A Device for Transparent Probabilistic Packet MarkingFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
Towards Unified Vulnerability Assessment with Open DataFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMSFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
Security Software Based on Windows NDIS Filter DriversFull-text access may be available. Sign in or learn about subscription options.pp. 260-264
A Patrol Guidance Mechanism in a Context-Aware EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
System Evolution for Unknown Context through Multi-action EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
A Knowledge-Based Development Approach with Fact and Service for End-User in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 277-282
UBI-Tree: Indexing Method for Schema-Less SearchFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
The Service Design of Intelligent Robot (iRobot) for EntertainmentFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Game theoretic analysis of the value exchange systemFull-text access may be available. Sign in or learn about subscription options.pp. 300-305
Closed-Circuit Television-Enabled Service: A Review of Security and Privacy IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 306-309
A Problem Solver for Scheduling Workflows in Multi-agents Systems Based on Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Social Network Data Retrieving Using Semantic TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Efficiency of Parallelisation of Genetic Algorithms in the Data Analysis ContextFull-text access may be available. Sign in or learn about subscription options.pp. 339-344
Performance Evaluation of Cloud-Based Parallel ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 356-360
Heterogeneous Closed Information Sources and Open ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Implementation and Evaluation of the Well-Distribution Algorithm for an Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
Privacy Enhancing Proxies in Attribute Releases: Two ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Interactive Augmented Reality Game for Enhancing Library Instruction in Elementary SchoolsFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
A Customized Visiting Route Service under RFID EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
Affective Robot Enabled Capacity and Quality Improvement of Nursing Home Aged Care Services in AustraliaFull-text access may be available. Sign in or learn about subscription options.pp. 409-414
Analyzing Distribution of Implicit Semantic Information in Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 415-420
An Activity Ontology for Context-Aware Health Promotion ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Showing 100 out of 161