default search action
41st COMPSAC 2017: Turin, Italy - Volume 1: Symposia
- Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-0367-3
SETA: Software Engineering Technology & Applications
- Hridesh Rajan, Alexander Bolotov, Chang Xu:
Message from SETA 2017 Program Chairs. 1 - Ricky Chan, Hong Zhu:
Message from SETA 2017 Symposium Chairs. 2
SETA Session 1
- Rubing Huang, Yunan Zhou, Weiwen Zong, Dave Towey, Jinfu Chen:
An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization. 3-12 - Kunihiro Noda, Takashi Kobayashi, Tatsuya Toda, Noritoshi Atsumi:
Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis. 13-22 - Jun Ma, Sheng Liu, Shengtao Yue, Xianping Tao, Jian Lu:
LeakDAF: An Automated Tool for Detecting Leaked Activities and Fragments of Android Applications. 23-32
SETA Session 2
- Weifeng Xu, Dianxiang Xu, Lin Deng:
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names. 33-38 - Ailun Liu, Huibiao Zhu, Yuan Fei, Shuangqing Xiang, Gang Lu, Wanling Xie:
Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra. 39-44 - Wanling Xie, Xi Wu, Huibiao Zhu, Gang Lu, Ailun Liu:
A Proof System for mCWQ. 45-50 - Chao Ni, Wangshu Liu, Qing Gu, Xiang Chen, Daoxu Chen:
FeSCH: A Feature Selection Method using Clusters of Hybrid-data for Cross-Project Defect Prediction. 51-56
SETA Session 3
- Yan Lei, Xiaoguang Mao, Min Zhang, Jingan Ren, Yinhua Jiang:
Toward Understanding Information Models of Fault Localization: Elaborate is Not Always Better. 57-66 - Dong Yan, Linjie Pan, Rongjie Yan, Jun Yan, Jian Zhang:
Comprehensive Static Analysis for Configurable Software via Combinatorial Instantiation. 67-74 - Qiang Cui, Junjie Wang, Guowei Yang, Miao Xie, Qing Wang, Mingshu Li:
Who Should Be Selected to Perform a Task in Crowdsourced Testing? 75-84
SETA Session 4
- Yuexing Wang, Zuxing Gu, Xi Cheng, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun:
A Constraint-Pattern Based Method for Reachability Determination. 85-90 - Musaad Alzahrani, Austin Melton:
Defining and Validating a Client-Based Cohesion Metric for Object-Oriented Classes. 91-96 - Liang Xiao, John Fox:
Towards an Agent-Oriented Framework for Multidisciplinary Decision Support and Its Application to Triple Assessment of Breast Cancer. 97-102 - Meng Yan, Xiaohong Zhang, Ling Xu, Haibo Hu, Song Sun, Xin Xia:
Revisiting the Correlation Between Alerts and Software Defects: A Case Study on MyFaces, Camel, and CXF. 103-108
SETA Session 5
- Rafael Rieder, Christian Haag Kristensen, Márcio Sarroglia Pinho:
Quality Assessment of Interaction Techniques in Immersive Virtual Environments Using Physiological Measures. 109-117 - Bo Guo, Myoungkyu Song:
Interactively Decomposing Composite Changes to Support Code Review and Regression Testing. 118-127 - Akihiro Yamamori, Anders Mikael Hagward, Takashi Kobayashi:
Can Developers' Interaction Data Improve Change Recommendation? 128-137
SETA Session 6
- Jie Liu, Jing Liu, Miaomiao Zhang, Haiying Sun, Xiaohong Chen, Dehui Du, Mingsong Chen:
An Approach to Proving Proof Obligation of Hybrid Event B Based on Differential Invariants. 138-143 - Marco Torchiano, Antonio Vetrò, Francesca Iuliano:
Preserving the Benefits of Open Government Data by Measuring and Improving Their Quality: An Empirical Study. 144-153 - Cong Wang, Fei He, Xiaoyu Song, Yu Jiang, Ming Gu, Jiaguang Sun:
Assertion Recommendation for Formal Program Verification. 154-159
SETA Session 7
- Wei Chen, Peixing Xu, Wensheng Dou, Guoquan Wu, Chushu Gao, Jun Wei:
A Hierarchical Categorization Approach for Configuration Management Modules. 160-169 - Fernando dos Santos, Ingrid Nunes, Ana L. C. Bazzan:
Supporting the Development of Agent-Based Simulations: A DSL for Environment Modeling. 170-179 - Paolo Busetta, Fitsum Meshesha Kifetew, Denisse Muñante, Anna Perini, Alberto Siena, Angelo Susi:
Tool-Supported Collaborative Requirements Prioritisation. 180-189
SETA Session 8
- Ayaka Imazato, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Finding Extract Method Refactoring Opportunities by Analyzing Development History. 190-195 - Zhenpeng Fang, Xibin Zhao, Min Zhou:
Infer Precise Program Invariant Using Abstract Interpretation with Recurrence Solving. 196-201 - Yiqi Lu, Jiaqing Liang, Yanghua Xiao, Sheng Huang, Deqing Yang, Wei Wang, Haibo Lin:
XMLValue: XML Configuration Attribute Value Recommendation. 202-207 - Oswald Mesumbe Ekwoge, Awdren de Lima Fontão, Arilo Claudio Dias-Neto:
Tester Experience: Concept, Issues and Definition. 208-213
SETA Session 9
- Chun Cao, Chenglin Meng, Hongjun Ge, Ping Yu, Xiaoxing Ma:
Xdroid: Testing Android Apps with Dependency Injection. 214-223 - Xiao He, Zhenjiang Hu, Yi Liu:
Towards Variability Management in Bidirectional Model Transformation. 224-233 - Kangli He, Holger Hermanns, Yixiang Chen:
Models of Connected Things: On Priced Probabilistic Timed Reo. 234-243
SETA Session 10
- Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
An Empirical Analysis on Effective Fault Prediction Model Developed Using Ensemble Methods. 244-249 - Fulvio Corno, Luigi De Russis, Juan Pablo Sáenz:
Pain Points for Novice Programmers of Ambient Intelligence Systems: An Exploratory Study. 250-255 - Xiujing Liu, Yong Liu, Zheng Li, Ruilian Zhao:
Fault Classification Oriented Spectrum Based Fault Localization. 256-261 - Ali Idri, Mariam Bachiri, José Luis Fernández Alemán, Ambrosio Toval:
ISO/IEC 25010 Based Evaluation of Free Mobile Personal Health Records for Pregnancy Monitoring. 262-267
SETA Session 11
- David Perillo, Marco Di Natale:
Using MDA to Automate the Integration of Virtual Platforms for System-Level Simulation. 268-277 - Imad Eddine Touahria, Marisol García-Valls, Abdellah Khababa:
An ICE Compliant Component Model for Medical Systems Development. 278-287 - Zhiyuan Chen, Maneesh Mohanavilasam, Young-Woo Kwon, Myoungkyu Song:
Tool Support for Managing Clone Refactorings to Facilitate Code Review in Evolving Software. 288-297
SETA Session 12
- Cleverson Ledur, Dalvan Griebler, Isabel Harb Manssour, Luiz Gustavo Fernandes:
A High-Level DSL for Geospatial Visualizations with Multi-core Parallelism Support. 298-304 - Nasser Mustafa, Yvan Labiche:
The Need for Traceability in Heterogeneous Systems: A Systematic Literature Review. 305-310 - Ken Nakayama, Shun'ichi Tano, Tomonori Hashiyama, Eko Sakai:
Incremental Annotate-Generalize-Search Framework for Interactive Source Code Comprehension. 311-316
SETA Session 13
- Dongjin Yu, Jie Wang, Qing Wu, Jiazha Yang, Jiaojiao Wang, Wei Yang, Wei Yan:
Detecting Java Code Clones with Multi-granularities Based on Bytecode. 317-326 - Andre de S. Landi, Fernando Chagas, Bruno Marinho Santos, Renato S. Costa, Rafael Serapilha Durelli, Ricardo Terra, Valter Vieira de Camargo:
Supporting the Specification and Serialization of Planned Architectures in Architecture-Driven Modernization Context. 327-336 - Maosheng Zhang, Ying Zhao, Zengmingyu He:
GenLog: Accurate Log Template Discovery for Stripped X86 Binaries. 337-346
SETA Session 14
- Jingwei Yang, Carl K. Chang, Ming Hua:
A Situation-Centric Approach to Identifying New User Intentions Using the MTL Method. 347-356 - Hoda Khalil, Yvan Labiche:
State-Based Tests Suites Automatic Generation Tool (STAGE-1). 357-362 - Maaki Nakano, Kunihiro Noda, Shinpei Hayashi, Takashi Kobayashi:
Mediating Turf Battles! Prioritizing Shared Modules in Locating Multiple Features. 363-368 - Hong Zhu, Ian Bayley:
On the Composibility of Design Patterns: Extended Abstract. 369-370
CELT: Computer Education & Learning Technologies
CELT Session 1
- Swapna Gottipati, Venky Shankararaman, Melvrick Goh:
Mining Capstone Project Wikis for Knowledge Discovery. 371-380 - Elena Baralis, Luca Cagliero, Laura Farinetti, Marco Mezzalama, Enrico Venuto:
Experimental Validation of a Massive Educational Service in a Blended Learning Environment. 381-390 - Antonella Longo, Marco Zappatore:
A Microservice-Based MOOL in Acoustics Addressing the Learning-at-Scale Scenario. 391-400
CELT Session 2
- Luca Cagliero, Laura Farinetti, Elena Baralis:
Test-Driven Summarization: Combining Formative Assessment with Teaching Document Summarization. 401-406 - Alice Barana, Marina Marchisio, Alessandro Bogino, Lorenza Operti, Michele Fioravera, Sergio Rabellino, Francesco Floris:
Self-Paced Approach in Synergistic Model for Supporting and Testing Students. 407-412
CELT Session 3
- Chris Johnson, Adrian Abundez-Arce:
Toward Blocks-Text Parity. 413-419 - Marcello Missiroli, Daniel Russo, Paolo Ciancarini:
Teaching Test-First Programming: Assessment and Solutions. 420-425 - Veena Saini, Paramvir Singh, Ashish Sureka:
SEABED: An Open-Source Software Engineering Case-Based Learning Database. 426-431 - Alice Barana, Michele Fioravera, Marina Marchisio, Sergio Rabellino:
Adaptive Teaching Supported by ICTs to Reduce the School Failure in the Project "Scuola Dei Compiti". 432-437
CELT Session 4
- Fahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Cloud Adapted Workflow e-Assessment System: Cloud-AWAS. 438-447 - Mauro Cesar Charao dos Santos, Vicenzo Abichequer Sangalli, Márcio Sarroglia Pinho:
Evaluating the Use of Virtual Reality on Professional Robotics Education. 448-455 - Hironori Washizaki, Yusuke Sunaga, Masashi Shuto, Katsuhiko Kakehi, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo, Bastian Tenbergen:
Combinations of Personal Characteristic Types and Learning Effectiveness of Teams. 456-457
CAP: Computer Architecture & Platforms
- Cristina Seceleanu, Hironori Kasahara, Tiberiu Seceleanu:
Message from the CAP 2017 Organizing Committee. 458
CAP Session 1
- Christian Meurisch, Bennet Jeutter, Wladimir Schmidt, Nickolas Gundling, Benedikt Schmidt, Fabian Herrlich, Max Mühlhäuser:
An Extensible Pervasive Platform for Large-Scale Anticipatory Mobile Computing. 459-464 - Ashalatha Kunnappilly, Alexandru Sorici, Imad Alex Awada, Irina Mocanu, Cristina Seceleanu, Adina Magda Florea:
A Novel Integrated Architecture for Ambient Assisted Living Systems. 465-472
CAP Session 2
- Jiwei Xu, Xiaozhao Xing, Tao Wang, Zhigang Lu, Wenbo Zhang:
RefCRE: A Reference Count Based Rewriting Framework for VM Image Restoration. 473-482 - Li-Zheng Liang, Ming-Chang Yang, Yuan-Hao Chang, Tseng-Yi Chen, Shuo-Han Chen, Hsin-Wen Wei, Wei-Kuan Shih:
xB+-Tree: Access-Pattern-Aware Cache-Line-Based Tree for Non-volatile Main Memory Architecture. 483-491 - Hironori Kasahara, Keiji Kimura, Boma A. Adhi, Yuhei Hosokawa, Yohei Kishimoto, Masayoshi Mase:
Multicore Cache Coherence Control by a Parallelizing Compiler. 492-497
NCIW: Networks, Communications, Internet, & Web Technologies
- Tugkan Tuglular, Ying Cai:
Message from the NCIW Program Co-chairs. 498
NCIW Session 1
- Yuanmin Xu, Huibiao Zhu, Xiaoran Zhu, Xi Wu, Jian Guo, Gang Lu:
Formalization and Verification of the PKMv3 Protocol Using CSP. 499-504 - Shuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa:
Cardinality Counting Circuit for Real-Time Abnormal Traffic Detection. 505-510 - Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
Cache Effect of Shared DNS Resolver. 511-516
NCIW Session 2
- Guido Marchetto, Riccardo Sisto, Matteo Virgilio, Jalolliddin Yusupov:
A Framework for User-Friendly Verification-Oriented VNF Modeling. 517-522 - Zhe Zhang, Chung-Horng Lung, Ioannis Lambadaris, Marc St-Hilaire, Sankarshan Sakkarepattana Nagaraja Rao:
Router Position-Based Cooperative Caching for Video-on-Demand in Information-Centric Networking. 523-528
NCIW Session 3
- Kenji Fujikawa, Ved P. Kafle, Pedro Martinez-Julia, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT. 529-537 - Daiki Matsui, Ryo Hagihara, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Analysis of Geographic DTN Routing under Random Walk Mobility Model. 538-547 - Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman:
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network. 548-556
NCIW Session 4
- Xiaocao Hu, Zhiyong Feng, Keman Huang, Shizhan Chen:
Supporting Interoperability among Web Services Through Efficient Matching. 557-566 - Krittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga, Katsunori Yamaoka:
Practical Enhancement and Evaluation of a Low-Latency Network Model Using Mobile Edge Computing. 567-574 - Felipe Mota Barreto, Paulo A. de S. Duarte, Marcio E. F. Maia, Rossana M. de Castro Andrade, Windson Viana:
CoAP-CTX: A Context-Aware CoAP Extension for Smart Objects Discovery in Internet of Things. 575-584
SEPT: Security, Privacy, & Trust
- Katsuyoshi Iida, Mohammad Zulkernine:
Message from SEPT 2017 Organizing Committee. 585
SEPT Session 1
- Cong Sun, Ning Xi, Jianfeng Ma:
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition. 586-595 - Babatunde Ojetunde, Naoki Shibata, Juntao Gao:
Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach. 596-601 - Xiaoran Duan, Yong Wang, Juguang Chen, Junhao Zhang:
Authenticating Preference-Oriented Multiple Users Spatial Queries. 602-607
SEPT Session 2
- Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations. 608-613 - Hyeon-Gu Jeon, Seong-Kyun Mok, Eun-Sun Cho:
Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes. 614-623 - Burcu Ozcelik, Cemal Yilmaz:
Seer: A Lightweight Online Failure Prediction Approach. 624-625
SEPT Session 3 - Keynote
- Thomas P. Roth, Bruce M. McMillin:
Physical Attestation in the Smart Grid for Distributed State Verification. 626-627
SEPT Session 4
- Xiaoguang Wang, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang:
SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack. 628-636 - Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Challenge to Impede Deep Learning against CAPTCHA with Ergonomic Design. 637-642 - Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. 643-648 - Vathalloor Merin George, Qusay H. Mahmoud:
Claimsware: A Claims-Based Middleware for Securing IoT Services. 649-654
SEPT Session 5
- Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. 655-664 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri:
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree? 665-674 - Lei Liu, Guoxin Su, Jing Xu, Biao Zhang, Jiehui Kang, Sihan Xu, Peng Li, Guannan Si:
An Inferential Metamorphic Testing Approach to Reduce False Positives in SQLIV Penetration Test. 675-680
Student Research Symposium
- Claudio Demartini, Kenichi Yoshida, Luigi De Russis:
Message from the Student Research Symposium Chairs. 681
SRS Session 1
- Michitomo Morii, Hiroki Tanioka, Kenji Ohira, Masahiko Sano, Yosuke Seki, Kenji Matsuura, Tetsushi Ueta:
Research on Integrated Authentication Using Passwordless Authentication Method. 682-685 - Ryo Nakamura, Hiroyuki Ohsaki:
On the Effect of Scale-Free Structure of Network Topology on Performance of Content-Centric Networking. 686-689 - Tsuyoshi Yabuuchi, Ryo Nakamura, Hiroyuki Ohsaki:
A Fluid-Based Model of a Transport Protocol in Content-Centric Networking. 690-693
SRS Session 2
- Naoki Kobayakawa, Kenichi Yoshida:
How GitHub Contributing.md Contributes to Contributors. 694-696 - Yui Kazawa, Sho Tsugawa:
On the Effectiveness of Link Addition for Improving Robustness of Multiplex Networks against Layer Node-Based Attack. 697-700 - Natsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
On Message Delivery Delay of Epidemic DTN Routing with Broadcasting ACKs. 701-704
Fog Computing and Networking - Business Drivers and Impacts
- Joe Weinman:
Fogonomics - The Strategic, Economic, and Financial Aspects of the Cloud. 705
Fog Computing and Networking - Technology Drivers and Impacts
- Antonio Brogi:
Application Deployment through the Fog. 706 - Bruce M. McMillin:
Secure Fog Computing for Smart Living. 707 - Yang Yang:
FA2ST: Fog as a Service Technology. 708
ITiP: IT in Practice
ITIP Session 1
- Stephen J. Andriole:
The Adoption of Emerging Technology: Technology Before Requirements. 709-713 - Muhammad Ashad Kabir, Zhenchang Xing, Prakash Chandrasekaran, Shang-Wei Lin:
Process Patterns: Reusable Design Artifacts for Business Process Models. 714-721 - Hoda Gholami, Carl K. Chang:
Situation-Aware Data-Driven Decision Making in Smart Environments Using the MapReduce. 722-730
ITIP Session 2
- Iacopo Vagliano, Davide Ferretto, Eugenio Brusa, Maurizio Morisio, Laura Valacca:
Tool Integration in the Aerospace Domain: A Case Study. 731-736 - Alberto Dumont Alves Oliveira, Marcelo Medeiros Eler:
Strategies and Challenges on the Accessibility and Interoperability of e-Government Web Portals: A Case Study on Brazilian Federal Universities. 737-742 - Saleh Alamdy, Rasha Osman:
Software Industry Practice in Africa: Case Study Sudan. 743-748
ITIP Session 3
- Dario Bonino, Paolo Vergori:
Agent Marketplaces and Deep Learning in Enterprises: The COMPOSITION Project. 749-754 - Masoud Hemmatpour, Mohammad Ghazivakili, Bartolomeo Montrucchio, Maurizio Rebaudengo:
DIIG: A Distributed Industrial IoT Gateway. 755-759 - Chunhui Guo, Zhicheng Fu, Shangping Ren, Yu Jiang, Lui Sha:
Towards Verifiable Safe and Correct Medical Best Practice Guideline Systems. 760-765
DSAT: Data Sciences, Analytics, & Technologies
DSAT Session 1 - Data Analytics Competition
DSAT Session 2
- Aki-Hiro Sato:
Inference of Extreme Synchrony with an Entropy Measure on a Bipartite Network. 766-771 - Hongyan Tang, Ying Li, Long Wang, Jing Gu, Zhonghai Wu:
Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data System. 772-777
DSAT Session 3
- Edimar Manica, Carina F. Dorneles, Renata Galante:
R-Extractor: A Method for Data Extraction from Template-Based Entity-Pages. 778-787