


default search action
9th DASC 2011: Sydney, Australia
- IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, DASC 2011, 12-14 December 2011, Sydney, Australia. IEEE Computer Society 2011, ISBN 978-0-7695-4612-4
Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011)
- Per Håkon Meland:
Service Injection: A Threat to Self-Managed Complex Systems. 1-6 - Hossain Shahriar
, Mohammad Zulkernine:
S2XS2: A Server Side Approach to Automatically Detect XSS Attacks. 7-14 - Edward Chuah
, Gary Kee Khoon Lee, William-Chandra Tjhi, Shyh-Hao Kuo, Terence Hung, John L. Hammond, Tommy Minyard, James C. Browne:
Establishing Hypothesis for Recurrent System Failures from Cluster Log Files. 15-22 - Jianhuang Liang, Jian Cao, Jungang Wang, Yuxia Xu:
Long-Term CPU Load Prediction. 23-26 - Zhong Yang, Haifei Si:
Application of Neural Networks to the Correction of a Stiffness Matrix by a Static Test. 27-30 - Pan Dong, Long Fan, Suge Yue, Hongchao Zheng, Shougang Du:
New Latch-Up Model for Deep Sub-micron Integrated Circuits. 31-36 - Christopher Bailey, David W. Chadwick
, Rogério de Lemos:
Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. 37-44 - Qingan Fang, Jun Han, Liyong Mao, Zhaoguo Li:
Exact and Heuristic Algorithm for Multi-constrained Optimal Path Problem. 45-51 - Bin He, Tie-Jun Lu, Zong-Min Wang, Tie L. Zhang:
A Wide-Range Edge-Combining DLL with a Charge Pump for Low Spur. 52-55 - Pan Dong, Long Fan, Suge Yue, Hongchao Zheng, Shougang Du:
Analysis of the New Latchup Model for Deep Sub-micron Integrated Circuits. 56-62 - Antônio Augusto Fröhlich
, Rodrigo Vieira Steiner, Leonardo Maccari Rufino:
A Trustful Infrastructure for the Internet of Things Based on EPOSMote. 63-68 - Chong Duan, Weimin Li:
A 46MHz Biquad Gm-C High Q Bandpass Filter Design for Wireless Application. 69-72 - Partha Saha, Nandan Parameswaran, Pradeep Ray
, Ambuj Mahanti:
Ontology Based Modeling for Information Security Management. 73-80 - Ivan Breskovic, Christian Haas
, Simon Caton
, Ivona Brandic
:
Towards Self-Awareness in Cloud Markets: A Monitoring Methodology. 81-88 - Farn Wang, Li-Wei Yao, Jung-Hsuan Wu:
Intelligent Test Oracle Construction for Reactive Systems without Explicit Specifications. 89-96 - Ali Kanso, Ferhat Khendek
, Maria Toeroe:
Workload Balancing for Highly Available Services: The Case of the N+M Redundancy Model. 97-104 - Paul Romer, Peter Tröger:
Reliability Implications of Register Utilization: An Empirical Study. 105-112 - Aleem Khalid Alvi, Mohammad Zulkernine:
A Natural Classification Scheme for Software Security Patterns. 113-120 - Ali Kanso, Ferhat Khendek
, Maria Toeroe:
Automatic Annotation of Software Configuration Models with Service Recovery Information. 121-128 - Atef Mohamed, Mohammad Zulkernine:
A Connection-Based Signature Approach for Control Flow Error Detection. 129-136 - Hossain Shahriar
, Mohammad Zulkernine:
A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor. 137-144 - Frank Jiang, Michael R. Frater, Jiankun Hu
:
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition. 145-150 - Fahad Bin Muhaya, Muhammad Khurram Khan
, Yang Xiang
:
Polymorphic Malware Detection Using Hierarchical Hidden Markov Model. 151-155
Ninth International Conference on Pervasive Intelligence and Computing (PICom 2011)
- Rong Hu, Wanchun Dou, Xiaoqing Frank Liu, Jianxun Liu:
Personalized Searching for Web Service Using User Interests. 156-163 - Mohammad Syafrullah
, Naomie Binti Salim
:
Using Particle Swarm Optimization to Improve the Precision and Recall of Taxonomy Extraction. 164-169 - Ahmad A. Alzahrani
, Seng Wai Loke, Hongen Lu:
A Formal Model for Advanced Physical Annotations. 170-177 - Anh Dung Nguyen, Patrick Sénac, Victor Ramiro, Michel Diaz:
Pervasive Intelligent Routing in Content Centric Delay Tolerant Networks. 178-185 - Xu Huang, Muhammad Ahmed, Dharmendra Sharma
:
Protecting from Inside Attacks in Wireless Sensor Networks. 186-191 - Brian Chung Shiong Loh, Valliappan Raman
, Patrick Hang Hui Then:
First Prototype of Aquatic Tool Kit: Towards Low-Cost Intelligent Larval Fish Counting in Hatcheries. 192-195 - Fan Wu, Yuming Mao, Supeng Leng, Xiaoyan Huang:
A Carrier Aggregation Based Resource Allocation Scheme for Pervasive Wireless Networks. 196-201 - Saim Shin, Sei-Jin Jang, Seok-Pil Lee:
The User-Group Based Recommendation for the Diverse Multimedia Contents in the Social Network Environments. 202-206 - Andrey Boytsov, Arkady B. Zaslavsky:
From Sensory Data to Situation Awareness: Enhanced Context Spaces Theory Approach. 207-214 - Kamran Taj Pathan, Stephan Reiff-Marganiec
, Yi Hong:
Mapping for Activity Recognition in the Context-Aware Systems Using Software Sensors. 215-221 - Hai Wan, Yang Yu, Jian-Tian Zheng:
Design and Implementation of P2P Reasoning System Based on Description Logic. 222-229 - Saguna, Arkady B. Zaslavsky, Dipanjan Chakraborty:
Recognizing Concurrent and Interleaved Activities in Social Interactions. 230-237 - H. Y. Yu, Yilong Lu:
Intelligent Sensor Network Simulation for Battlefield Resources Management. 238-241 - Ahmad Hassan Afridi
:
Crowdsourcing in Mobile: A Three Stage Context Based Process. 242-245 - Guan Huang, Seng Wai Loke:
Gesture-Based Easy-Computer Interaction Using a Linear Array of Low Cost Distance Sensors. 246-251
Ninth International Symposium on Embedded Computing (EmbeddedCom 2011)
- Shaobin Zhang, Tongsen Hu, Minghui Wu, Tianzhou Chen, Zening Qu:
Load-Aware Dynamic Partial Reconfiguration Implementation of Crossbar Scheduler. 252-258 - Yingjie Cao, Yongxin Zhu, Guoguang Rong
, Gang Cheng, Meikang Qiu:
Efficient Pattern Detection for Embedded Optical Bio-sensing System. 259-266 - Minji Cha, Kyong Hoon Kim, Chung-Jae Lee, Dojun Ha, Byoung Soo Kim:
Deriving High-Performance Real-Time Multicore Systems Based on Simulink Applications. 267-274 - Jincheng Fei, Haiyang Quan, Dawei Yuan:
Analysis and Comparison of Two Different Implementations of MCS-51 Compatible Microcontrollers. 275-278 - Baozhong Yu, Jianliang Ma, Tianzhou Chen, Minghui Wu:
Global Priority Table for Last-Level Caches. 279-285 - Yimao Cai, Yuanfu Zhao, Lidong Lan:
Design and Implementation of a Peripheral Bus Based on a New Kind of Reconfigurable System. 286-291 - Muhammad Nadeem
, Morteza Biglari-Abhari, Zoran Salcic
:
GALS-JOP: A Java Embedded Processor for GALS Reactive Programs. 292-299 - Taehun Kang, Hanah Kim, Jaiyong Lee:
A Study on QoS Routing Schem for Tactical Ad Hoc Network. 300-304 - Jianjun Xu, Qingping Tan, Huiping Zhou:
Scheduling Instructions for Soft Errors in Register Files. 305-312 - Subayal Aftab Khan, Jukka Saastamoinen, Kari Tiensyrjä, Jari Nurmi
:
System Level Performance Simulation of Distributed GENESYS Applications on Multi-core Platforms. 313-320 - Snehal Tangadpalliwar, Kumbesan Sandrasegaran
, Malcolm Raymond, Ajanta Moitra, Faisal M. Madani:
Benchmarking Embedded Devices for Broadband Performance Testing. 321-327 - Mamata Dalui, Biplab K. Sikdar
:
An Efficient Test Design for Verification of Cache Coherence in CMPs. 328-334 - Baisakhi Das, Gunjan Bhattacharya, Ilora Maity
, Biplab K. Sikdar
:
Impact of Inaccurate Design of Branch Predictors on Processors' Power Consumption. 335-342 - Heewook Shin, Sangman Moh, Ilyong Chung:
A Balanced Clustering Algorithm for Non-uniformly Deployed Sensor Networks. 343-350 - Stephen J. J. Ong, Zahid Abdul Halim:
Coprocessing Architecture in System-on-Programmable-Chip for Walk on the Boundary Method to Calculate Capacitance. 351-355
International Conference on Cloud and Green Computing (CGC 2011)
- Peter Brezany, Yan Zhang, Ivan Janciak, Peng Chen, Sicen Ye:
An Elastic OLAP Cloud Platform. 356-363 - Andrew Stephen McGough, Clive Gerrard, Jonathan Noble, Paul Robinson, Stuart Wheater:
Analysis of Power-Saving Techniques over a Large Multi-use Cluster. 364-371 - Chang Liu, Xuyun Zhang
, Jinjun Chen, Chi Yang:
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing. 372-379 - Carmela Comito
, Deborah Falcone, Domenico Talia
, Paolo Trunfio
:
Energy Efficient Task Allocation over Mobile Networks. 380-387 - Haifeng Chen, Hui Kang, Guofei Jiang, Kenji Yoshihira:
Application Behavior Mapping across Heterogeneous Hardware Platforms. 388-395 - Myoungjin Kim, Hanku Lee, Yun Cui:
Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSE. 396-403 - Can Zhang, Hao-peng Chen, Shuotao Gao:
ALARM: Autonomic Load-Aware Resource Management for P2P Key-Value Stores in Cloud. 404-410 - Waiho Wong, Joseph G. Davis:
BoostPred: An Automatic Demand Predictor for the Cloud. 411-418 - Ibrahim Takouna, Wesam Dawoud, Christoph Meinel:
Accurate Mutlicore Processor Power Models for Power-Aware Resource Management. 419-426 - Qi Chen, Wenmin Lin, Wanchun Dou, Shui Yu
:
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment. 427-434 - Huan Liu:
A Measurement Study of Server Utilization in Public Clouds. 435-442 - Wenjun Li, Hailong Yang, Zhongzhi Luan, Depei Qian:
Energy Prediction for MapReduce Workloads. 443-448 - Mariam Kiran, Ming Jiang, Django Armstrong, Karim Djemame
:
Towards a Service Lifecycle Based Methodology for Risk Assessment in Cloud Computing. 449-456 - Hai Wan, Yang Yu:
Migrating Complex Business Process to Cloud Based on Mspoa and CBPM. 457-464 - Chiu-Ping Chang, Chung-Ta King, Chen-Min Chan:
On Reference Node Deployment for Precise Clock Synchronization in Smart Power Grid. 465-472 - Eungyeong Kim, Seok Lee, Taikjin Lee, Beom Ju Shin, Jungho Lee, Young Tae Byun, Hyung Seok Kim:
An Intelligent Real-Time Odor Monitoring System Using a Pattern Extraction Algorithm. 473-479 - Olle Svanfeldt-Winter, Sébastien Lafond
, Johan Lilius
:
Cost and Energy Reduction Evaluation for ARM Based Web Servers. 480-487 - Zhicheng Jin, Jian Cao, Minglu Li:
A Distributed Application Component Placement Approach for Cloud Computing Environment. 488-495 - Wenhao Li
, Yun Yang, Dong Yuan
:
A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data Centres. 496-502 - Masnida Hussin
, Young Choon Lee
, Albert Y. Zomaya
:
Priority-Based Scheduling for Large-Scale Distribute Systems with Energy Awareness. 503-509 - Johnatan E. Pecero
, Pascal Bouvry
, Héctor Joaquín Fraire Huacuja, Samee Ullah Khan
:
A Multi-objective GRASP Algorithm for Joint Optimization of Energy Consumption and Schedule Length of Precedence-Constrained Applications. 510-517 - Xuyun Zhang
, Chang Liu, Jinjun Chen, Wanchun Dou:
An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud. 518-525 - Zhenyu Yang:
Disrupt the Disruptor: A Theoretical Approach of Cloud Computing on IT Outsourcing Industry Disruption. 526-531 - Xuehua Jiang, Yousuke Watanabe, Haruo Yokota
:
Data Allocation Based on XML Query Patterns to Reduce Power Consumption. 532-539 - Silvana Greco Polito, Adriano Costanzo:
Cloud Control and Management Planes for Service Provisioning. 540-546 - Kefeng Deng, Lingmei Kong, Junqiang Song, Kaijun Ren, Dong Yuan
:
A Weighted K-Means Clustering Based Co-scheduling Strategy towards Efficient Execution of Scientific Workflows in Collaborative Cloud Environments. 547-554 - Bing Luo, William Liu
:
The Sustainability and Survivabiltiy Network Design for Next Generation Cloud Networking. 555-560 - Khaled M. Khan
, Qutaibah M. Malluhi:
Identifying Contextual Properties of Software Architecture in Cloud Computing. 561-568 - Alexander Nowak, Frank Leymann
, David Schumm:
The Differences and Commonalities between Green and Conventional Business Process Management. 569-576 - Steve Strauch, Oliver Kopp
, Frank Leymann
, Tobias Unger:
A Taxonomy for Cloud Data Hosting Solutions. 577-584 - Rong Hu, Wanchun Dou, Xiaoqing Frank Liu, Jianxun Liu:
WSRank: A Method for Web Service Ranking in Cloud Environment. 585-592 - Kongluan Lin:
Improving Energy Efficiency of LTE Networks by Applying Genetic Algorithm (GA). 593-597 - Lucio Agostinho Rocha
, Guilherme Feliciano, Leonardo Olivi, Eleri Cardozo
, Eliane G. Guimarães:
A Bio-inspired Approach to Provisioning of Virtual Resources in Federated Clouds. 598-604 - Helmut Hlavacs, Thomas Treutner, Jean-Patrick Gelas
, Laurent Lefèvre, Anne-Cécile Orgerie
:
Energy Consumption Side-Channel Attack at Virtual Machines in a Cloud. 605-612 - Ying Li, Hongli Zhang, Kyong Hoon Kim:
A Power-Aware Scheduling of MapReduce Applications in the Cloud. 613-620 - Jing Jiang
, Jie Lu
, Guangquan Zhang
:
An Innovative Self-Adaptive Configuration Optimization System in Cloud Computing. 621-627 - Werner Mach, Erich Schikuta
:
A Consumer-Provider Cloud Cost Model Considering Variable Cost. 628-635 - Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang:
SecDM: Securing Data Migration between Cloud Storage Systems. 636-641 - Fábio Coutinho, Luís Alfredo V. de Carvalho, Renato Santana:
A Workflow Scheduling Algorithm for Optimizing Energy-Efficient Grid Resources Usage. 642-649 - Florian Blümel, Thijs Metsch, Alexander Papaspyrou:
A Restful Approach to Service Level Agreements for Cloud Environments. 650-657 - Cheng Luo, Reiji Suda:
A Performance and Energy Consumption Analytical Model for GPU. 658-665 - Fabrice Saffre
, Sebastien Nicolas, Hanno Hildmann
:
Energy-Aware Communities Using Mobile Clients. 666-673 - Miaomiao Li, Yang Yu, Zhenguang Huang:
A Group-Choose Model for Partner Selection in Virtual Organization. 674-681 - Jens Myrup Pedersen
, Tahir M. Riaz, Joaquim Celestino Júnior, Bozydar Dubalski, Damian Ledzinski
, Ahmed Patel:
Assessing Measurements of QoS for Global Cloud Computing Services. 682-689 - Hui-Wen Yeh, Ching-Hu Lu, Yu-Chiao Huang, Tsung-Han Yang, Li-Chen Fu
:
Cloud-Enabled Adaptive Activity-Aware Energy-Saving System in a Dynamic Environment. 690-696 - Asif Qumer Gill
, Deborah Bunker, Philip Seltsikas:
An Empirical Analysis of Cloud, Mobile, Social and Green Computing: Financial Services IT Strategy and Enterprise Architecture. 697-704 - Chadi Aoun, Savanid Vatanasakdakul, Deborah Bunker:
From Cloud to Green: E-Collaboration for Environmental Conservation. 705-712 - Xiao Liu
, Yun Yang, Dong Yuan
, Gaofeng Zhang, Wenhao Li
, Dahai Cao:
A Generic QoS Framework for Cloud Workflow Systems. 713-720 - Simon Holmbacka, Sébastien Lafond
, Johan Lilius
:
A PID-Controlled Power Manager for Energy Efficient Web Clusters. 721-728 - Baiquan Zhu, Xiangfeng Luo, Yang Liu, Xiang He, Lingyu Xu:
Model Interactive Search between User and Associated Link Networks. 729-736 - Haitham Yaish
, Madhu Goyal
, George Feuerlicht:
An Elastic Multi-tenant Database Schema for Software as a Service. 737-743 - Udaya Kiran Tupakula, Vijay Varadharajan
, Naveen Akku:
Intrusion Detection Techniques for Infrastructure as a Service Cloud. 744-751 - Hieu Hanh Le
, Satoshi Hikida, Haruo Yokota
:
An Evaluation of Power-Proportional Data Placement for Hadoop Distributed File Systems. 752-759 - Asif Qumer Gill, Deborah Bunker:
Conceptualization of a Context Aware Cloud Adaptation (CACA) Framework. 760-767 - Qingwen Chen, Paola Grosso
, Karel van der Veldt, Cees de Laat, Rutger F. H. Hofman, Henri E. Bal:
Profiling Energy Consumption of VMs for Green Cloud Computing. 768-775 - Hsiao-Fan Wang:
Multi-level Subsidy and Penalty Strategy for a Green Industry Sector. 776-783 - Mohammed Abdullatif Alzain
, Ben Soh, Eric Pardede
:
MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. 784-791 - Seoyoung Kim, Jung-In Koh, Yoonhee Kim, Chongam Kim:
A Science Cloud Resource Provisioning Model Using Statistical Analysis of Job History. 792-793 - Laurent Lefèvre, Olivier Mornard, Jean-Patrick Gelas
, Maxime Morel:
Monitoring Energy Consumption in Clouds: The CompatibleOne Experience. 794-795 - Jae-Hyuck Kwak, Junweon Yoon, Yonghwan Jung, Jaegyoon Hahm, Dongin Park:
HERO Web Portal: On-Demand Portal for Co-allocating Computing and Network Resources on Top of TIGRIS Middleware Platform. 796-797 - Cécile Germain-Renaud, Frédéric Fürst, Michel Jouvin, Gilles Kassel, Julien Nauroy, Guillaume Philippon:
The Green Computing Observatory: A Data Curation Approach for Green IT. 798-799
International Conference on Social Computing and Its Applications (SCA 2011)
- Shangkun Deng, Takashi Mitsubuchi, Kei Shioda, Tatsuro Shimada, Akito Sakurai:
Combining Technical Analysis with Sentiment Analysis for Stock Price Prediction. 800-807 - Suhendry Effendy, Felix Halim, Roland H. C. Yap:
Partial Social Network Disclosure and Crawlers. 808-815 - Wadhah Almansoori, Omar Zarour, Tamer N. Jarada, Panagiotis Karampelas, Jon G. Rokne, Reda Alhajj:
Applications of Social Network Construction and Analysis in the Medical Referral Process. 816-823 - Juan J. Cameron, Carson Kai-Sang Leung
, Syed Khairuzzaman Tanbeer:
Finding Strong Groups of Friends among Friends in Social Networks. 824-831 - Huanhuan Li, Jianxun Liu, Yizhi Liu, Long Jin:
Evaluating Roving Patrol Effectiveness by GPS Trajectory. 832-837 - Zhuo Peng, Chaokun Wang, Fangbo Tao, Lu Han:
SkyBoundary: An Improved Approach to Member Promotion in Social Networks. 838-845 - Mohammad A. Tayebi, Uwe Glässer:
Organized Crime Structures in Co-offending Networks. 846-853