Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
COMPSACW
COMPSACW 2013
Generate Citations
2013 IEEE 37th International Computer Software and Applications Conference Workshops (COMPSACW)
July 22 2013 to July 26 2013
Japan
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xviii
COMPSACW 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xix-xix
CFSE 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xx-xx
IWSC 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xxi-xxi
STA 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xxii-xxii
STPSA 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xxiii-xxiii
MDVA 2013: Foreword
Freely available from IEEE.
pp. xxiv-xxv
MVDA 2013: Committees
Freely available from IEEE.
pp. xxvi-xxvi
SAPSE 2013: Message from the Workshop Organizer
Freely available from IEEE.
pp. xxvii-xxvii
METHOD 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxviii-xxviii
NETSAP 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxix-xxix
EUCASS 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxx-xxx
ITeS 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxxi-xxxi
ESAS 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxxii-xxxiii
ESAS 2013: Program Committee
Freely available from IEEE.
pp. xxxiv-xxxiv
CIF 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxxv-xxxv
MidArch 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxxvi-xxxvi
MidArch 2013: Program Committee
Freely available from IEEE.
pp. xxxvii-xxxvii
SSS 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xxxviii-xxxviii
QUORS 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xxxix-xxxix
Message from the Workshop Chairs: CDS 2013
Freely available from IEEE.
pp. xl-xl
by
Norihiro Ishikawa
,
Yoshia Saito
,
Hiroshi Mineno
ADMNET 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xli-xli
IEESD-TIP 2013: Foreword
Freely available from IEEE.
pp. xlii-xlii
HSNCE 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xliii-xliii
IWFIT 2013: Message from the Workshop Organizers
Freely available from IEEE.
pp. xliv-xliv
Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software Thefts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Hyun-il Lim
Fingerprint Clustering for Forensic Data Indexing
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-10
by
Wei-Ho Tsai
,
Cin-Hao Ma
Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-15
by
Narn-Yih Lee
,
Zih-Ling Chen
,
Fu-Kun Chen
Towards a Better Similarity Measure for Keyword Profiling via Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-20
by
Y. Liang
,
K.P. Chow
,
L.C.K. Hui
,
J. Fang
,
S.M. Yiu
,
Shuhui Hou
Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-26
by
Wataru Takahashi
,
Ryoichi Sasaki
,
Tetsutaro Uehara
Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-34
by
Qing Zhou
,
Lin Liu
An Adaptive Control Strategy for Managing Concurrent Service Requests in Service-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Wen-Long Zhu
,
Bei-Bei Yin
,
Kai-Yuan Cai
,
Dazhi Huang
,
Stephen S. Yau
A Feedback-Based Approach to Validate SWRL Rules for Developing Situation-Aware Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Joonseok Park
,
Keunhyuk Yeom
A Case Study of Adaptive Combinatorial Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Changhai Nie
,
Siyang Chen
,
Hareton Leung
,
Kai-Yuan Cai
Service-Oriented Maintainability Modeling and Analysis for a Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Yoshinobu Tamura
,
Shigeru Yamada
Reducing the Number of Initial Database States for Integration Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Haruto Tanno
,
Takashi Hoshino
Opportunities for Clone Detection in Test Case Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-70
by
Mostafa Erfani
,
Iman Keivanloo
,
Juergen Rilling
Using Dependency Relations to Improve Test Case Generation from UML Statecharts
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
Valentin Chimisliu
,
Franz Wotawa
Incrementally Applicable t-Wise Combinatorial Test Suites for High-Strength Interaction Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Andrea Calvagna
,
Emiliano Tramontana
A Multi-order Markov Chain Based Scheme for Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Wenyao Sha
,
Yongxin Zhu
,
Tian Huang
,
Meikang Qiu
,
Yan Zhu
,
Qiannan Zhang
Hybrid Authorization Conflict Detection by Inferring Partial Data in RDF Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
Jaehoon Kim
Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-100
by
Dong Chen
,
Yang Zhang
,
Liang Cheng
,
Yi Deng
,
Xiaoshan Sun
Using Security and Domain Ontologies for Security Requirements Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-107
by
Amina Souag
,
Camille Salinesi
,
Isabelle Wattiau
,
Haris Mouratidis
A Petri Net Based Model for Trustworthy Software Process Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-114
by
Xuan Zhang
,
Tong Li
,
Zhong-Wen Xie
,
Fei Dai
,
Jin-Zhuo Liu
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Xiaoguang Wang
,
Yong Qi
,
Yuehua Dai
,
Jianbao Ren
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Rahena Akhter
,
Rownak Jahan Chowdhury
,
Keita Emura
,
Tamzida Islam
,
Mohammad Shahriar Rahman
,
Nusrat Rubaiyat
Privacy-Aware Community Sensing Using Randomized Response
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Shunsuke Aoki
,
Masayuki Iwai
,
Kaoru Sezaki
An Abstraction Method of Behaviors for Process Algebra
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Jinho On
,
Yeongbok Choe
,
Moonkun Lee
Cost Optimization Strategy for Iterative Integration of Multi-critical Functions in IMA and TTEthernet Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
Michael Lauer
,
John Mullins
,
Moez Yeddes
Conceptual Modeling of the Organisational Aspects for Distributed Applications: The Semantic Lifting Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Vedran Hrgovcic
,
Dimitris Karagiannis
,
Robert Woitsch
A Practical Software Model for Content Aggregation in Browsers Using Recent Advances in HTML5
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
Marat Zhanikeev
Building Adaptive Accessible Context-Aware for User Interface Tailored to Disable Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-162
by
Lamia Zouhaier
,
Yousra Bendaly Hlaoui
,
Leila Jemni Ben Ayed
An Integrated Formal Model for Context-Aware Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-168
by
Eun-Sun Cho
,
Tae-Seob Yoon
,
Joong-Hyun Choi
,
Joon-Young Paik
,
Sumi Helal
ArgoAWS-UML: Modeling Tool for Adaptive Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-174
by
Chiraz El Hog
,
Raoudha Ben Djemaa
,
Ikram Amous
Modeling and Verification of Call Setup Dynamics of LTE Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-180
by
Ishtiaq Ahmed Choudhry
,
Nazir Ahmad Zafar
,
Mohammed Al-Zahrani
Model Checking for SpaceWire Link Interface Design Using Uppaal
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-186
by
Ping Luo
,
Rui Wang
,
Xiaojuan Li
,
Yong Guan
,
Hongxing Wei
,
Jie Zhang
Refinement Based Modeling of Workflow Applications Using UML Activity Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-192
by
Ahlem Ben Younes
,
Yousra Bendaly Hlaoui
,
Leila Jemni Ben Ayed
,
Rahma Jlassi
Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-199
by
Shigeru Shimada
,
Isao Echizen
Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Meiko Jensen
An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Tian Huang
,
Yan Zhu
,
Qiannan Zhang
,
Yongxin Zhu
,
Dongyang Wang
,
Meikang Qiu
,
Lei Liu
A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Yuuki Kajiura
,
Atsushi Kanai
,
Shigeaki Tanimoto
,
Hiroyuki Sato
Easy Access to Provenance: An Essential Step Towards Trust on the Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-223
by
Tom De Nies
,
Sam Coppens
,
Ruben Verborgh
,
Miel Vander Sande
,
Erik Mannens
,
Rik Van de Walle
,
Danius Michaelides
,
Luc Moreau
Formal Modeling of Trust-Based Access Control in Dynamic Coalitions
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-229
by
Nadim Sarrouh
Investigating the Relevance of Linked Open Data Sets with SPARQL Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-235
by
Thomas Holst
,
Edzard Hofig
Implementation of Metadata Quality Metrics and Application on Public Government Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-241
by
Konrad Johannes Reiche
,
Edzard Hofig
A Device for Transparent Probabilistic Packet Marking
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-247
by
Masayuki Okada
,
Nasato Goto
,
Akira Kanaoka
,
Eiji Okamoto
Towards Unified Vulnerability Assessment with Open Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
Akihito Nakamura
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Noppawat Chaisamran
,
Takeshi Okuda
,
Suguru Yamaguchi
Security Software Based on Windows NDIS Filter Drivers
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-264
by
Shin-Shung Chen
,
Tzong-Yih Kuo
,
Yu-Wen Chen
A Patrol Guidance Mechanism in a Context-Aware Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Chin-Chih Chang
,
Judy C.R. Tseng
,
Hao-Yun Chang
System Evolution for Unknown Context through Multi-action Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Asanga Nimalasena
,
Vladimir Getov
A Knowledge-Based Development Approach with Fact and Service for End-User in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
Rui Zhou
,
Jing Li
,
Jinghan Wang
,
Guowei Wang
UBI-Tree: Indexing Method for Schema-Less Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Yutaka Arakawa
,
Takayuki Nakamura
,
Motonori Nakamura
,
Hajime Matsumura
A P2P Delivery Method for Sensor Data Stream Based on Load Estimation from Collection Cycles
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Tomoya Kawakami
,
Yoshimasa Ishi
,
Tomoki Yoshihisa
,
Yuuichi Teranishi
The Service Design of Intelligent Robot (iRobot) for Entertainment
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Tung-Hsiang Chou
Game theoretic analysis of the value exchange system
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-305
by
Miyata Sumiko
,
Kinoshita Hirotsugu
,
Morizumi Tetsuya
,
Chao Li
Closed-Circuit Television-Enabled Service: A Review of Security and Privacy Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-309
by
Yu-Lung Wu
,
Chi-Jui Chang
,
Yu-Hui Tao
The Study of Brand Perception through Social Network Sites and Corporate Social Responsibility Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Rungsiman Nararatwong
,
Nagul Cooharojananone
,
Nattarat Pongsupankij
,
Rajalida Lipikorn
,
Kanokwan Atchariyachanvanich
A Problem Solver for Scheduling Workflows in Multi-agents Systems Based on Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
Fu-Shiung Hsieh
,
Jim-Bon Lin
Social Network Data Retrieving Using Semantic Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-327
by
Reen-Cheng Wang
,
Ting-Han Su
,
Cheng-Peng Ma
,
Shih-Hung Chen
,
Hsi-Ho Huang
Design and Implementation of a Novel Weighted Shortest Path Algorithm for Maze Solving Robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Behnam Rahnama
,
Makbule Canan Ozdemir
,
Yunus Kiran
,
Atilla Elci
Towards an Information Extraction System Based on Ontology to Match Resumes and Jobs
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Duygu Celik
,
Askyn Karakas
,
Gulsen Bal
,
Cem Gultunca
,
Atilla Elci
,
Basak Buluz
,
Murat Can Alevli
Efficiency of Parallelisation of Genetic Algorithms in the Data Analysis Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Dimitri Perrin
,
Christophe Duhamel
Toward an mHealth Intervention for Smoking Cessation
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
G.M. Tanimul Ahsan
,
Ivor D. Addo
,
S. Iqbal Ahamed
,
Daniel Petereit
,
Shalini Kanekar
,
Linda Burhansstipanov
,
Linda U. Krebs
Performance Evaluation of Cloud-Based Parallel Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Yuto Nakai
,
Dimitri Perrin
,
Hiroyuki Ohsaki
,
Ray Walshe
Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-360
by
Piotr Wrzeciono
,
Waldemar Karwowski
Heterogeneous Closed Information Sources and Open Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-366
by
Teruhisa Hochin
Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-372
by
Motonori Nakamura
,
Takeshi Nishimura
,
Kazutsuna Yamaji
,
Hiroyuki Sato
,
Yasuo Okabe
Implementation and Evaluation of the Well-Distribution Algorithm for an Overlay Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-378
by
Takuma Oide
,
Atsushi Takeda
,
Takuo Suganuma
,
Akiko Takahashi
Privacy Enhancing Proxies in Attribute Releases: Two Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
Hiroyuki Sato
,
Yasuo Okabe
,
Takeshi Nishimura
,
Kazutsuna Yamaji
,
Motonori Nakamura
Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-390
by
Toshiki Watanabe
,
Shunichi Kinoshita
,
Yasuhiro Yamasaki
,
Hideaki Goto
,
Hideaki Sone
Interactive Augmented Reality Game for Enhancing Library Instruction in Elementary Schools
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Yi-Shiang Wang
,
Chih-Ming Chen
,
Chin-Ming Hong
,
Yen-Nung Tsai
A Customized Visiting Route Service under RFID Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
Chieh-Yuan Tsai
,
Bo-Han Lai
Enhancing Diversity-Accuracy Technique on User-Based Top-N Recommendation Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-408
by
Wichian Premchaiswadi
,
Pitaya Poompuang
,
Nipat Jongswat
,
Nucharee Premchaiswadi
Affective Robot Enabled Capacity and Quality Improvement of Nursing Home Aged Care Services in Australia
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-414
by
Rajiv Khosla
,
Mei-Tai Chu
,
Khanh Nguyen
Analyzing Distribution of Implicit Semantic Information in Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-420
by
Xiaocao Hu
,
Zhiyong Feng
,
Shizhan Chen
An Activity Ontology for Context-Aware Health Promotion Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Anindhita Dewabharata
,
Don Ming-Hui Wen
,
Shuo-Yan Chou
Showing 100 out of 161
Load More
Load All