default search action
35th COMPSAC Workshops 2011: Munich, Germany
- Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2011, Munich, Germany, 18-22 July 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4459-5
IWSC 2011: The Eighth IEEE International Workshop on Software Cybernetics
- Meng Li, Ratnesh Kumar:
Stateflow to Extended Finite Automata Translation. 1-6 - Uras Tos, Tolga Ayav:
Adaptive RTP Rate Control Method. 7-12 - Qiliang Yang, Jian Lü, Jianchun Xing, XianPing Tao, Hao Hu, Yang Zou:
Fuzzy Control-Based Software Self-Adaptation: A Case Study in Mission Critical Systems. 13-18 - Junpeng Lv, Hai Hu, Kai-Yuan Cai:
A Sufficient Condition for Parameters Estimation in Dynamic Random Testing. 19-24 - Jin Shao, Qianxiang Wang:
A Performance Guarantee Approach for Cloud Applications Based on Monitoring. 25-30 - Stephen S. Yau, Dazhi Huang:
Distributed Monitoring and Adaptation of Multiple QoS in Service-Based Systems. 31-36 - Ling-Zan Zhu, Bei-Bei Yin, Kai-Yuan Cai:
Software Fault Localization Based on Centrality Measures. 37-42 - Ron S. Kenett:
Future Directions of Software Cybernetics: A Position Paper. 43-44 - Stephen S. Yau:
Panel Session: Future Directions of Software Cybernetics. 45
ONIT 2011: The Third IEEE International Workshop on Open NGN and IMS Testbeds
- Kurt Tutschku:
Keynote: Mobile Service Evolution und Research Trends in Future Internet. 46-47 - Rebecca Copeland, Noël Crespi:
Policies to Enable Serving Untrusted Services on Alternative (Non-3GPP) and Untrusted Access Networks in EPS. 48-53 - Mosiuoa Tsietsi, Alfredo Terzoli, George Wells:
A Framework for the Management of Operator Policies and User Preferences for Service Compositions in the IP Multimedia Subsystem. 54-61 - Stephan Massner, Tom Weber:
A Dynamic Host Configuration Protocol Based Service Discovery Mechanism. 62-67 - Sami Petäjäsoja, Heikki Kortti, Ari Takanen, Juha-Matti Tirilä:
IMS Threat and Attack Surface Analysis Using Common Vulnerability Scoring System. 68-73 - Sunghyun Cho, Jae-Hyun Kim, Jonghyung Kwun:
End-to-End QoS Model for Mobile WiMAX Systems. 74-77 - Giulio Maggiore, Julius Mueller, Julien de Chanaud, Andreas Röth:
HIVE - Enabling ETSI IMS Plugtests Events. 78-82 - Shin-ichi Handa, Junnosuke Yamada, Hiroya Minami, Daichi Namikawa, Michio Shimomura:
IMS/NGN Service Lab: Testbed for Creating Innovative IMS/NGN Service Applications. 83-88 - Mosiuoa Tsietsi:
Demo: Teleweaver - Next Generation Enabler for Rural Telecentres and Access Nodes. 89
STPSA 2011: The Sixth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Blake Anderson, Daniel Quist, Terran Lane:
Detecting Code Injection Attacks in Internet Explorer. 90-95 - George Chatzieleftheriou, Panagiotis Katsaros:
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities. 96-103 - Hossain Shahriar, Mohammad Zulkernine:
Injecting Comments to Detect JavaScript Code Injection Attacks. 104-109 - Jonathan J. Blount, Daniel R. Tauritz, Samuel A. Mulder:
Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of Concept. 110-115 - Andrew J. Kornecki, Wendy F. Stevenson:
Impact of Adding Security to Safety-Critical Real-Time Systems: A Case Study. 116-121 - Alexander D. Kent, Lorie M. Liebrock:
Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments. 122-127 - Paul Giura, Gustavo de los Reyes:
The Security Cost of Content Distribution Network Architectures. 128-135
STA 2011: The Third IEEE International Workshop on Software Test Automation
- Jean Hartmann:
Dealing with Test Automation Debt at Microsoft. 136 - Arne-Michael Törsel:
Automated Test Case Generation for Web Applications from a Domain Specific Model. 137-142 - Sebastian Thiel, Frank Derichsweiler:
Petri Net Based Verification of Causal Dependencies in Electronic Control Unit Test Cases. 143-148 - Xiaoying Bai, Hao Lu, Yao Zhang, Renwei Zhang, Linping Hu, Hong Ye:
Interface-Based Automated Testing for Open Software Architecture. 149-154 - Yu Dong, Mengxiang Lin, Kai Yu, Yi Zhou, Yin-li Chen:
Achieving High Branch Coverage with Fewer Paths. 155-160 - William E. Howden:
Error-Based Software Testing and Analysis. 161-167 - Silvije Jovalekic, Tri Nguyen:
Specification and Verification of Time Properties in Distributed Automation Systems during Test Planning Phase. 168-173 - Kim Nylund, Erik Östman, Dragos Truscan, Risto Teittinen:
Towards Rapid Creation of Test Adaptation in On-line Model-Based Testing. 174-179 - Fevzi Belli, Mutlu Beyazit, Axel Hollmann, Nevin Güler:
Statistical Evaluation of Test Sets Using Mutation Analysis. 180-183 - Lijo Thomas, Weifeng Xu, Dianxiang Xu:
Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. 184-189 - Seon Yeol Lee, Hyun Jae Choi, Yeon Ji Jeong, Tae Ho Kim, Heung Seok Chae, Carl K. Chang:
An Improved Technique of Fitness Evaluation for Evolutionary Testing. 190-193
CORCS-IEESD 2011: The Third IEEE International Workshop on Component-Based Design of Resource-Constrained Systems/The Third IEEE International Workshop on Industrial Experience in Embedded System Design
- Tiziana Margaria, Barry D. Floyd, Bernhard Steffen:
IT Simply Works: Simplicity and Embedded Systems Design. 194-199 - Stefan Burger, Oliver Hummel:
Towards Automatic Reconfiguration of Aviation Software Systems. 200-205 - Jeroen Voeten, T. Hendriks, Bart D. Theelen, J. Schuddemat, W. Tabingh Suermondt, J. Gemei, Kees C. Kotterink, C. van Huët:
Predicting Timing Performance of Advanced Mechatronics Control Systems. 206-210 - Guangxin Li, Rong Zhou, Rongqing Li, Weimin He, Guilin Lv, T. John Koo:
A Case Study on SDF-Based Code Generation for ECU Software Development. 211-217 - Ya-Yun Cheng, Yaw-Chung Chen:
A Burst-Aware Scheduling Scheme Supporting Quality of Service in WiMAX Networks. 218-223 - Etienne Borde, Jan Carlson:
Automatic Synthesis and Adaption of Gray-Box Components for Embedded Systems - Reuse vs. Optimization. 224-229 - Dehui Du, Xijiao Xiong:
Specifying Communication Behaviours between Components with Real-Time rCOS - A Case Study ATP. 230-235 - Rongqing Li, Rong Zhou, Guangxin Li, Weimin He, Xiaoqian Zhang, T. John Koo:
A Prototype of Model-Based Design Tool and Its Application in the Development Process of Electronic Control Unit. 236-242 - Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
A Model Transformation Approach Based on Homomorphic Mappings between UML Activity Diagrams and BPEL4WS Specifications of Grid Service Workflows. 243-248 - Xiaoya Hu, Chao Gao, Bingwen Wang, Wei Xiong:
Channel Modeling for Wireless Underground Sensor Networks. 249-254
CloudApp 2011: The Second IEEE International Workshop on Applied Cloud Computing
- Christof Momm, Wolfgang Theilmann:
A Combined Workload Planning Approach for Multi-tenant Business Applications. 255-260 - Muhammad Asad Arfeen, Krzysztof Pawlikowski, Andreas Willig:
A Framework for Resource Allocation Strategies in Cloud Computing Environment. 261-266 - Bastian Roth, Robin Hecht, Bernhard Volz, Stefan Jablonski:
Towards a Generic Cloud-Based Virtual Research Environment. 267-272 - Dag Johansen, Joseph Hurley:
Overlay Cloud Networking through Meta-Code. 273-278 - Bahtijar Vogel:
An Interactive Web-Based Visualization Tool: Design and Development Cycles. 279-285 - Kai-Shin Lu, Carl K. Chang:
Using Web Search Results and Genetic Algorithm to Improve the Accuracy of Chinese Spam Email Filters. 286-291 - Weider D. Yu, Hongbin Yuan:
An Approach to Explore Mobile Software Engineering Advances in Cloud Computing Environment. 292-297 - Vincent C. Emeakaroha, Ivona Brandic, Michael Maurer, Ivan Breskovic:
SLA-Aware Application Deployment and Resource Allocation in Clouds. 298-303
QUORS 2011: The Fifth IEEE International Workshop on Quality Oriented Reuse of Software
- Frank Padberg, David Weiss:
Model-Based Scheduling Analysis for Software Projects. 304-309 - Vladimir P. Bubnov, Anatoly D. Khomonenko, Alexey V. Tyrva:
Software Reliability Model with Coxian Distribution of Length of Intervals between Errors Detection and Fixing Moments. 310-314 - Nien-Lin Hsueh, Lin-Chieh Wen, Der-Hong Ting, William C. Chu, Chih-Hung Chang, Chorng-Shiuh Koong:
An Approach for Evaluating the Effectiveness of Design Patterns in Software Evolution. 315-320 - Richard C. Millham, Evans Dogbe:
Aspect-Oriented Security and Exception Handling within an Object Oriented System. 321-326 - Haruhiko Kaiya, Kenichiro Hara, Kyotaro Kobayashi, Akira Osada, Kenji Kaijiri:
Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques. 327-334 - Jingang Zhou, Dazhe Zhao, Jiren Liu:
A Lightweight Component-Based Development Approach for Enterprise Applications. 335-340 - Mohammed Alawairdhi, Eisa Aleisa:
A Scenario-Based Approach for Requirements Elicitation for Software Systems Complying with the Utilization of Ubiquitous Computing Technologies. 341-344 - Chih-Hung Chang, Chih-Wei Lu, William C. Chu, Chao-Tung Yang, Pao-Ann Hsiung, Nien-Lin Hsueh, Chorng-Shiuh Koong, Kuei-Kai Shao:
XML-Based Reusable Component Repository for Embedded Software. 345-350 - Zakwan Jaroucheh, Xiaodong Liu, Sally Smith, Huiqun Zhao:
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. 351-355 - Huanyin Yi, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Aditya P. Mathur:
Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems. 356-361 - Hwai-Jung Hsu, Feng-Jian Wang:
Detecting Artifact Anomalies in Temporal Structured Workflow as Reusable Assets. 362-367
CFSE 2011: The Third IEEE International Workshop on Computer Forensics in Software Engineering
- Leon Aronson, Jeroen van den Bos:
Towards an Engineering Approach to File Carver Construction. 368-373 - Svetozar Ilchev, Zlatoliliya Ilcheva:
Protection of Intellectual Property in Web Communities by Modular Digital Watermarking. 374-379
ESAS 2011: The Sixth IEEE International Workshop on Engineering Semantic Agent Systems
- Alex Muscar, Costin Badica:
A Functional Approach to Agent Development: Research Agenda. 380-385 - Duygu Çelik, Atilla Elçi, Eray Elverici:
Finding Suitable Course Material through a Semantic Search Agent for Learning Management Systems of Distance Education. 386-391
SAPSE 2011: The Third IEEE International Workshop on Security Aspects of Process and Services Engineering
- Meiko Jensen, Christopher Meyer:
Expressiveness Considerations of XML Signatures. 392-397 - Rafael Accorsi:
Business Process as a Service: Chances for Remote Auditing. 398-403 - Omar Hasan, Lionel Brunie, Ernesto Damiani:
A Privacy Preserving Reputation Protocol for Web Service Provider Selection. 404-409 - Martina Ziefle, Carsten Röcker, Andreas Holzinger:
Medical Technology in Smart Homes: Exploring the User's Perspective on Privacy, Intimacy and Trust. 410-415 - Wen Su, Fan Yang, Xiaofeng Wu, Jian Guo, Huibiao Zhu:
Formal Approaches to Mode Conversion and Positioning for Vehicle System. 416-421
SSS 2011: The Fourth IEEE International Workshop on Service Science and Systems
- Vedran Hrgovcic, Wilfrid Utz, Dimitris Karagiannis:
Service Modeling: A Model Based Approach for Business and It Alignment. 422-427 - Lemen Chao, Yong Zhang, Chunxiao Xing:
Improving Query Suggestion for Digital Libraries. 428-434 - Shinsuke Kobayashi, Yukihiko Shigesada, Noboru Koshizuka, Ken Sakamura:
Interoperable Spatial Information System Architecture Based on Ubiqiutous ID Infrastructure. 435-440 - Lei Chen, Ji-Jiang Yang, Qing Wang, Mingyu Wang:
An Intelligent Information System for Maternal and Child Health Care. 441-445 - Antonin Chazalet, Sébastien Bolle, Serge Martin:
Analyzing the Digital Home's Quality of Service. 446-451 - Rajni Mohana, Deepak Dahiya:
Optimized Service Discovery Using QoS Based Ranking: A Fuzzy Clustering and Particle Swarm Optimization Approach. 452-457
REFS 2011: The Fifth IEEE International Workshop on Requirements Engineering for Services
- Xavier Franch, Paul Grünbacher, Marc Oriol, Benedikt Burgstaller, Deepak Dhungana, Lidia López, Jordi Marco, João Pimentel:
Goal-Driven Adaptation of Service-Based Systems from Runtime Monitoring Data. 458-463 - Jianchu Huang, Hongji Yang, Lei Liu:
Reconciling Requirements and Implementation via Reengineering for Context-Aware Service Evolution. 464-469 - Salma Najar, Manuele Kirsch-Pinheiro, Carine Souveyet:
The Influence of Context on Intentional Service. 470-475 - Saïd Assar, Kadan Aljoumaa:
Matching User Requirements with Query Formulations in Intentional Service Oriented Computing. 476-481 - Eliel Morales, Xavier Franch, Alicia Martínez, Hugo Estrada:
Considering Technology Representation in Service-Oriented Business Models. 482-487 - Rainer Schmidt:
Augmenting Cloud Requirements Engineering with Meta-Services. 488-493 - Wilfrid Utz, Robert Woitsch, Dimitris Karagiannis:
Conceptualisation of Hybrid Service Models: An Open Models Approach. 494-499 - Haruhiko Kaiya, Shunichi Suzuki, Toru Ogawa, Masaaki Tanigawa, Masahiro Umemura, Kenji Kaijiri:
Spectrum Analysis for Software Quality Requirements Using Analyses Records. 500-503 - Xiping Song, Beatrice Hwong:
Identifying Service Requirements in Solution and Infrastructure Improvement Projects. 504-505
IWPD 2011: The Second IEEE International Workshop on Program Debugging
- Vidroha Debroy, W. Eric Wong:
On the Consensus-Based Application of Fault Localization Techniques. 506-511 - Kinsun Tam:
Debugging Debugging. 512-515 - Sascha Uhrig:
Tracing Static Fields of Embedded Parallel Java Applications. 516-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.