callback( { "result":{ "query":":facetid:toc:\"db/conf/sac/sac2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"72.79" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"318", "@dc":"318", "@oc":"318", "@id":"43421944", "text":":facetid:toc:db/conf/sac/sac2014.bht" } }, "hits":{ "@total":"318", "@computed":"318", "@sent":"318", "@first":"0", "hit":[{ "@score":"1", "@id":"3935108", "info":{"authors":{"author":{"@pid":"148/4433","text":"David Hundely A"}},"title":"Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks.","venue":"SAC","pages":"196-197","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/A14","doi":"10.1145/2554850.2555184","ee":"https://doi.org/10.1145/2554850.2555184","url":"https://dblp.org/rec/conf/sac/A14"}, "url":"URL#3935108" }, { "@score":"1", "@id":"3935109", "info":{"authors":{"author":[{"@pid":"44/9837","text":"Mohammad Adibuzzaman"},{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"35/344","text":"Richard Love"}]},"title":"A personalized model for monitoring vital signs using camera of the smart phone.","venue":"SAC","pages":"444-449","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AdibuzzamanAL14","doi":"10.1145/2554850.2555019","ee":"https://doi.org/10.1145/2554850.2555019","url":"https://dblp.org/rec/conf/sac/AdibuzzamanAL14"}, "url":"URL#3935109" }, { "@score":"1", "@id":"3935110", "info":{"authors":{"author":[{"@pid":"78/10960","text":"Syed Hassan Ahmed"},{"@pid":"64/2684","text":"Abdul Wahid"},{"@pid":"66/2701","text":"Dongkyun Kim"}]},"title":"EENC - energy efficient nested clustering in UASN.","venue":"SAC","pages":"706-710","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AhmedWK14","doi":"10.1145/2554850.2555068","ee":"https://doi.org/10.1145/2554850.2555068","url":"https://dblp.org/rec/conf/sac/AhmedWK14"}, "url":"URL#3935110" }, { "@score":"1", "@id":"3935111", "info":{"authors":{"author":[{"@pid":"43/3437","text":"Mohammed Al-Refai"},{"@pid":"88/5167","text":"Walter Cazzola"},{"@pid":"f/RBFrance","text":"Robert B. France"}]},"title":"Using models to dynamically refactor runtime code.","venue":"SAC","pages":"1108-1113","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Al-RefaiCF14","doi":"10.1145/2554850.2554954","ee":"https://doi.org/10.1145/2554850.2554954","url":"https://dblp.org/rec/conf/sac/Al-RefaiCF14"}, "url":"URL#3935111" }, { "@score":"1", "@id":"3935112", "info":{"authors":{"author":[{"@pid":"148/4311","text":"Abdulaziz Alabdulhafez"},{"@pid":"50/2453","text":"Paul D. Ezhilchelvan"}]},"title":"Experimenting on virtual machines co-residency in the cloud: a comparative study of available test beds.","venue":"SAC","pages":"363-365","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlabdulhafezE14","doi":"10.1145/2554850.2555105","ee":"https://doi.org/10.1145/2554850.2555105","url":"https://dblp.org/rec/conf/sac/AlabdulhafezE14"}, "url":"URL#3935112" }, { "@score":"1", "@id":"3935113", "info":{"authors":{"author":[{"@pid":"132/6955","text":"Fernando Alexandre"},{"@pid":"122/1695","text":"Ricardo Marqués"},{"@pid":"04/5183","text":"Hervé Paulino"}]},"title":"On the support of task-parallel algorithmic skeletons for multi-GPU computing.","venue":"SAC","pages":"880-885","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlexandreMP14","doi":"10.1145/2554850.2555018","ee":"https://doi.org/10.1145/2554850.2555018","url":"https://dblp.org/rec/conf/sac/AlexandreMP14"}, "url":"URL#3935113" }, { "@score":"1", "@id":"3935114", "info":{"authors":{"author":[{"@pid":"148/4413","text":"Basma Alharbi"},{"@pid":"74/1890-1","text":"Xiangliang Zhang 0001"}]},"title":"Exploring the significance of human mobility patterns in social link prediction.","venue":"SAC","pages":"604-609","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlharbiZ14","doi":"10.1145/2554850.2554918","ee":"https://doi.org/10.1145/2554850.2554918","url":"https://dblp.org/rec/conf/sac/AlharbiZ14"}, "url":"URL#3935114" }, { "@score":"1", "@id":"3935115", "info":{"authors":{"author":[{"@pid":"128/4499","text":"Eduardo Almentero"},{"@pid":"l/JCSdoPradoLeite","text":"Julio César Sampaio do Prado Leite"},{"@pid":"l/CarlosJosePereiradeLucena","text":"Carlos José Pereira de Lucena"}]},"title":"Towards software modularization from requirements.","venue":"SAC","pages":"1007-1012","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlmenteroLL14","doi":"10.1145/2554850.2555060","ee":"https://doi.org/10.1145/2554850.2555060","url":"https://dblp.org/rec/conf/sac/AlmenteroLL14"}, "url":"URL#3935115" }, { "@score":"1", "@id":"3935116", "info":{"authors":{"author":[{"@pid":"148/4270","text":"Abdullah A. I. Alnajem"},{"@pid":"z/NingZhang","text":"Ning Zhang 0001"}]},"title":"A copula-based risk evaluation method (C-REM) in a corporate mobile banking context.","venue":"SAC","pages":"1455-1462","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlnajemZ14","doi":"10.1145/2554850.2554927","ee":"https://doi.org/10.1145/2554850.2554927","url":"https://dblp.org/rec/conf/sac/AlnajemZ14"}, "url":"URL#3935116" }, { "@score":"1", "@id":"3935117", "info":{"authors":{"author":[{"@pid":"20/3687","text":"David Alonso-Ríos"},{"@pid":"69/5770","text":"David Raneburger"},{"@pid":"86/5119","text":"Roman Popp"},{"@pid":"k/HermannKaindl","text":"Hermann Kaindl"},{"@pid":"28/5937","text":"Jürgen Falb"}]},"title":"A user study on tailoring GUIs for smartphones.","venue":"SAC","pages":"186-192","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Alonso-RiosRPKF14","doi":"10.1145/2554850.2555085","ee":"https://doi.org/10.1145/2554850.2555085","url":"https://dblp.org/rec/conf/sac/Alonso-RiosRPKF14"}, "url":"URL#3935117" }, { "@score":"1", "@id":"3935118", "info":{"authors":{"author":[{"@pid":"123/4603","text":"Roberto Amadini"},{"@pid":"g/MGabbrielli","text":"Maurizio Gabbrielli"},{"@pid":"53/1605","text":"Jacopo Mauro"}]},"title":"An enhanced features extractor for a portfolio of constraint solvers.","venue":"SAC","pages":"1357-1359","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AmadiniGM14","doi":"10.1145/2554850.2555114","ee":"https://doi.org/10.1145/2554850.2555114","url":"https://dblp.org/rec/conf/sac/AmadiniGM14"}, "url":"URL#3935118" }, { "@score":"1", "@id":"3935119", "info":{"authors":{"author":[{"@pid":"148/4218","text":"Samaneh Aminikhanghahi"},{"@pid":"w/WeiWang15","text":"Wei Wang 0015"},{"@pid":"84/775","text":"Sung Y. Shin"},{"@pid":"77/11311","text":"Seong-Ho Son"},{"@pid":"57/11311","text":"Soon-Ik Jeon"}]},"title":"Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening.","venue":"SAC","pages":"674-679","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AminikhanghahiWSSJ14","doi":"10.1145/2554850.2554936","ee":"https://doi.org/10.1145/2554850.2554936","url":"https://dblp.org/rec/conf/sac/AminikhanghahiWSSJ14"}, "url":"URL#3935119" }, { "@score":"1", "@id":"3935120", "info":{"authors":{"author":[{"@pid":"155/8079","text":"Virginia O. Andersson"},{"@pid":"148/4363","text":"Rafael Dutra"},{"@pid":"a/RMdAraujo","text":"Ricardo Matsumura de Araújo"}]},"title":"Anthropometric and human gait identification using skeleton data from Kinect sensor.","venue":"SAC","pages":"60-61","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AnderssonDA14","doi":"10.1145/2554850.2555147","ee":"https://doi.org/10.1145/2554850.2555147","url":"https://dblp.org/rec/conf/sac/AnderssonDA14"}, "url":"URL#3935120" }, { "@score":"1", "@id":"3935121", "info":{"authors":{"author":[{"@pid":"117/4708","text":"Guilherme Andrade"},{"@pid":"130/5787","text":"Gabriel Spada Ramos"},{"@pid":"117/4652","text":"Daniel Madeira"},{"@pid":"54/727","text":"Rafael Sachetto Oliveira"},{"@pid":"59/5772","text":"Esteban Clua"},{"@pid":"f/RACFerreira","text":"Renato Ferreira 0001"},{"@pid":"89/1792","text":"Leonardo Rocha 0001"}]},"title":"Efficient dynamic scheduling of heterogeneous applications in hybrid architectures.","venue":"SAC","pages":"866-871","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AndradeRMOCFR14","doi":"10.1145/2554850.2554922","ee":"https://doi.org/10.1145/2554850.2554922","url":"https://dblp.org/rec/conf/sac/AndradeRMOCFR14"}, "url":"URL#3935121" }, { "@score":"1", "@id":"3935122", "info":{"authors":{"author":[{"@pid":"20/2686","text":"Francesco L. De Angelis"},{"@pid":"64/2213","text":"Jose Luis Fernandez-Marquez"},{"@pid":"s/GDMSerugendo","text":"Giovanna Di Marzo Serugendo"}]},"title":"Self-composition of services with chemical reactions.","venue":"SAC","pages":"1355-1356","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AngelisFS14","doi":"10.1145/2554850.2555178","ee":"https://doi.org/10.1145/2554850.2555178","url":"https://dblp.org/rec/conf/sac/AngelisFS14"}, "url":"URL#3935122" }, { "@score":"1", "@id":"3935123", "info":{"authors":{"author":[{"@pid":"139/8795","text":"Alexandre Martins dos Anjos"},{"@pid":"31/1696","text":"Romero Tori"},{"@pid":"148/4308","text":"Anderson Castro"},{"@pid":"148/4389","text":"Soares de Oliveira"},{"@pid":"87/8751","text":"Fátima L. S. Nunes"}]},"title":"Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments.","venue":"SAC","pages":"223-228","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AnjosTCON14","doi":"10.1145/2554850.2554985","ee":"https://doi.org/10.1145/2554850.2554985","url":"https://dblp.org/rec/conf/sac/AnjosTCON14"}, "url":"URL#3935123" }, { "@score":"1", "@id":"3935124", "info":{"authors":{"author":[{"@pid":"81/4067","text":"Gonçalo Antunes"},{"@pid":"136/1272","text":"Marzieh Bakhshandeh"},{"@pid":"59/528","text":"Rudolf Mayer"},{"@pid":"27/71","text":"José Borbinha"},{"@pid":"30/4231","text":"Artur Caetano"}]},"title":"Ontology-based enterprise architecture model analysis.","venue":"SAC","pages":"1420-1422","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AntunesBMBC14","doi":"10.1145/2554850.2555176","ee":"https://doi.org/10.1145/2554850.2555176","url":"https://dblp.org/rec/conf/sac/AntunesBMBC14"}, "url":"URL#3935124" }, { "@score":"1", "@id":"3935125", "info":{"authors":{"author":[{"@pid":"09/9060","text":"Pavel Arapov"},{"@pid":"25/914","text":"Michel Buffa"},{"@pid":"144/2792","text":"Amel Ben Othmane"}]},"title":"WikiNEXT: a wiki for exploiting the web of data.","venue":"SAC","pages":"727-734","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ArapovBO14","doi":"10.1145/2554850.2554962","ee":"https://doi.org/10.1145/2554850.2554962","url":"https://dblp.org/rec/conf/sac/ArapovBO14"}, "url":"URL#3935125" }, { "@score":"1", "@id":"3935126", "info":{"authors":{"author":[{"@pid":"48/10042","text":"Valerio Arnaboldi"},{"@pid":"17/4829","text":"Marco Conti"},{"@pid":"148/4442","text":"Massimiliano La Gala"},{"@pid":"01/6803","text":"Andrea Passarella"},{"@pid":"55/10042","text":"Fabio Pezzoni"}]},"title":"Information diffusion in OSNs: the impact of nodes' sociality.","venue":"SAC","pages":"616-621","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ArnaboldiCGPP14","doi":"10.1145/2554850.2555000","ee":"https://doi.org/10.1145/2554850.2555000","url":"https://dblp.org/rec/conf/sac/ArnaboldiCGPP14"}, "url":"URL#3935126" }, { "@score":"1", "@id":"3935127", "info":{"authors":{"author":[{"@pid":"09/11408","text":"Bissan Audeh"},{"@pid":"57/4642","text":"Philippe Beaune"},{"@pid":"18/2394","text":"Michel Beigbeder"}]},"title":"Exploring query reformulation for named entity expansion in information retrieval.","venue":"SAC","pages":"929-930","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AudehBB14","doi":"10.1145/2554850.2555128","ee":"https://doi.org/10.1145/2554850.2555128","url":"https://dblp.org/rec/conf/sac/AudehBB14"}, "url":"URL#3935127" }, { "@score":"1", "@id":"3935128", "info":{"authors":{"author":[{"@pid":"180/8423","text":"Anderson Braga de Avila"},{"@pid":"131/4999","text":"Adriano Maron"},{"@pid":"61/2221","text":"Renata Reiser"},{"@pid":"06/5321","text":"Maurício L. Pilla"},{"@pid":"y/AdenauerCYamin","text":"Adenauer C. Yamin"}]},"title":"GPU-aware distributed quantum simulation.","venue":"SAC","pages":"860-865","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AvilaMRPY14","doi":"10.1145/2554850.2554892","ee":"https://doi.org/10.1145/2554850.2554892","url":"https://dblp.org/rec/conf/sac/AvilaMRPY14"}, "url":"URL#3935128" }, { "@score":"1", "@id":"3935129", "info":{"authors":{"author":[{"@pid":"b/MichaelBackes1","text":"Michael Backes 0001"},{"@pid":"46/8882","text":"Sebastian Gerling"},{"@pid":"33/5333","text":"Stefan Lorenz"},{"@pid":"148/4219","text":"Stephan Lukas"}]},"title":"X-pire 2.0: a user-controlled expiration date and copy protection mechanism.","venue":"SAC","pages":"1633-1640","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BackesGLL14","doi":"10.1145/2554850.2554856","ee":"https://doi.org/10.1145/2554850.2554856","url":"https://dblp.org/rec/conf/sac/BackesGLL14"}, "url":"URL#3935129" }, { "@score":"1", "@id":"3935130", "info":{"authors":{"author":[{"@pid":"12/7623","text":"Duck-Ho Bae"},{"@pid":"69/6531","text":"Ji-Woong Chang"},{"@pid":"148/4301","text":"Se-Mi Park"},{"@pid":"60/1264","text":"Byeong-Soo Jeong"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"39/1718","text":"Seong-je Cho"}]},"title":"An effective data clustering method based on expected update time in flash memory environment.","venue":"SAC","pages":"1492-1497","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BaeCPJKC14","doi":"10.1145/2554850.2554900","ee":"https://doi.org/10.1145/2554850.2554900","url":"https://dblp.org/rec/conf/sac/BaeCPJKC14"}, "url":"URL#3935130" }, { "@score":"1", "@id":"3935131", "info":{"authors":{"author":[{"@pid":"12/7623","text":"Duck-Ho Bae"},{"@pid":"68/222","text":"Jong-Min Lee"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"120/3588","text":"Youngjoon Won"},{"@pid":"22/932","text":"Yongsu Park"}]},"title":"Analyzing network privacy preserving methods: a perspective of social network characteristics.","venue":"SAC","pages":"331-332","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BaeLKWP14","doi":"10.1145/2554850.2591061","ee":"https://doi.org/10.1145/2554850.2591061","url":"https://dblp.org/rec/conf/sac/BaeLKWP14"}, "url":"URL#3935131" }, { "@score":"1", "@id":"3935132", "info":{"authors":{"author":[{"@pid":"146/5163","text":"Pedro Barbosa"},{"@pid":"25/4955","text":"Andrey Brito"},{"@pid":"76/859","text":"Hyggo O. Almeida"},{"@pid":"61/1101","text":"Sebastian Clauß"}]},"title":"Lightweight privacy for smart metering data by adding noise.","venue":"SAC","pages":"531-538","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BarbosaBAC14","doi":"10.1145/2554850.2554982","ee":"https://doi.org/10.1145/2554850.2554982","url":"https://dblp.org/rec/conf/sac/BarbosaBAC14"}, "url":"URL#3935132" }, { "@score":"1", "@id":"3935133", "info":{"authors":{"author":[{"@pid":"148/4305","text":"Jean Paul Barddal"},{"@pid":"139/3051","text":"Heitor Murilo Gomes"},{"@pid":"90/6263","text":"Fabrício Enembreck"}]},"title":"SFNClassifier: a scale-free social network method to handle concept drift.","venue":"SAC","pages":"786-791","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BarddalGE14","doi":"10.1145/2554850.2554855","ee":"https://doi.org/10.1145/2554850.2554855","url":"https://dblp.org/rec/conf/sac/BarddalGE14"}, "url":"URL#3935133" }, { "@score":"1", "@id":"3935134", "info":{"authors":{"author":[{"@pid":"58/4232","text":"Fábio Paulo Basso"},{"@pid":"o/ToacyCavalcantedeOliveira","text":"Toacy Cavalcante de Oliveira"},{"@pid":"49/7937","text":"Kleinner Farias"}]},"title":"Extending JUnit 4 with Java annotations and reflection to test variant model transformation assets.","venue":"SAC","pages":"1601-1608","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BassoOF14","doi":"10.1145/2554850.2555054","ee":"https://doi.org/10.1145/2554850.2555054","url":"https://dblp.org/rec/conf/sac/BassoOF14"}, "url":"URL#3935134" }, { "@score":"1", "@id":"3935135", "info":{"authors":{"author":[{"@pid":"58/4232","text":"Fábio Paulo Basso"},{"@pid":"48/6872","text":"Raquel Mainardi Pillat"},{"@pid":"o/ToacyCavalcantedeOliveira","text":"Toacy Cavalcante de Oliveira"},{"@pid":"15/5866","text":"Marcos Didonet Del Fabro"}]},"title":"Generative adaptation of model transformation assets: experiences, lessons and drawbacks.","venue":"SAC","pages":"1027-1034","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BassoPOF14","doi":"10.1145/2554850.2554944","ee":"https://doi.org/10.1145/2554850.2554944","url":"https://dblp.org/rec/conf/sac/BassoPOF14"}, "url":"URL#3935135" }, { "@score":"1", "@id":"3935136", "info":{"authors":{"author":[{"@pid":"60/2798","text":"Anirban Basu"},{"@pid":"49/9485","text":"Juan Camilo Corena"},{"@pid":"69/3714","text":"Shinsaku Kiyomoto"},{"@pid":"54/3381","text":"Stephen Marsh 0001"},{"@pid":"61/3091","text":"Jaideep Vaidya"},{"@pid":"84/10716","text":"Guibing Guo"},{"@pid":"84/6889-2","text":"Jie Zhang 0002"},{"@pid":"22/993","text":"Yutaka Miyake"}]},"title":"Privacy preserving trusted social feedback.","venue":"SAC","pages":"1706-1711","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BasuCKMVG0M14","doi":"10.1145/2554850.2554860","ee":"https://doi.org/10.1145/2554850.2554860","url":"https://dblp.org/rec/conf/sac/BasuCKMVG0M14"}, "url":"URL#3935136" }, { "@score":"1", "@id":"3935137", "info":{"authors":{"author":[{"@pid":"60/2798","text":"Anirban Basu"},{"@pid":"49/9485","text":"Juan Camilo Corena"},{"@pid":"69/3714","text":"Shinsaku Kiyomoto"},{"@pid":"61/3091","text":"Jaideep Vaidya"},{"@pid":"54/3381","text":"Stephen Marsh 0001"},{"@pid":"22/993","text":"Yutaka Miyake"}]},"title":"PrefRank: fair aggregation of subjective user preferences.","venue":"SAC","pages":"287-288","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BasuCKVMM14","doi":"10.1145/2554850.2555084","ee":"https://doi.org/10.1145/2554850.2555084","url":"https://dblp.org/rec/conf/sac/BasuCKVMM14"}, "url":"URL#3935137" }, { "@score":"1", "@id":"3935138", "info":{"authors":{"author":[{"@pid":"93/10434","text":"Kristian Beckers"},{"@pid":"38/2747","text":"Isabelle Côté"},{"@pid":"147/1778","text":"Ludger Goeke"}]},"title":"A catalog of security requirements patterns for the domain of cloud computing systems.","venue":"SAC","pages":"337-342","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BeckersCG14","doi":"10.1145/2554850.2554921","ee":"https://doi.org/10.1145/2554850.2554921","url":"https://dblp.org/rec/conf/sac/BeckersCG14"}, "url":"URL#3935138" }, { "@score":"1", "@id":"3935139", "info":{"authors":{"author":[{"@pid":"143/1560","text":"Faiza Belbachir"},{"@pid":"b/MBoughanem","text":"Mohand Boughanem"},{"@pid":"25/4400","text":"Malik Muhammad Saad Missen"}]},"title":"Probabilistic opinion models based on subjective sources.","venue":"SAC","pages":"925-926","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BelbachirBM14","doi":"10.1145/2554850.2555091","ee":"https://doi.org/10.1145/2554850.2555091","url":"https://dblp.org/rec/conf/sac/BelbachirBM14"}, "url":"URL#3935139" }, { "@score":"1", "@id":"3935140", "info":{"authors":{"author":[{"@pid":"35/10459","text":"Marian Benner-Wickner"},{"@pid":"00/3973","text":"Matthias Book"},{"@pid":"43/2691","text":"Tobias Brückmann"},{"@pid":"g/VolkerGruhn","text":"Volker Gruhn"}]},"title":"Execution support for agenda-driven case management.","venue":"SAC","pages":"1371-1377","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Benner-WicknerBBG14","doi":"10.1145/2554850.2554945","ee":"https://doi.org/10.1145/2554850.2554945","url":"https://dblp.org/rec/conf/sac/Benner-WicknerBBG14"}, "url":"URL#3935140" }, { "@score":"1", "@id":"3935141", "info":{"authors":{"author":[{"@pid":"13/7482","text":"Harsh Beohar"},{"@pid":"m/MohammadRezaMousavi","text":"Mohammad Reza Mousavi 0001"}]},"title":"Input-output conformance testing based on featured transition systems.","venue":"SAC","pages":"1272-1278","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BeoharM14","doi":"10.1145/2554850.2554949","ee":"https://doi.org/10.1145/2554850.2554949","url":"https://dblp.org/rec/conf/sac/BeoharM14"}, "url":"URL#3935141" }, { "@score":"1", "@id":"3935142", "info":{"authors":{"author":[{"@pid":"148/4249","text":"Leila C. C. Bergamasco"},{"@pid":"87/8751","text":"Fátima L. S. Nunes"}]},"title":"A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor.","venue":"SAC","pages":"902-907","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BergamascoN14","doi":"10.1145/2554850.2554873","ee":"https://doi.org/10.1145/2554850.2554873","url":"https://dblp.org/rec/conf/sac/BergamascoN14"}, "url":"URL#3935142" }, { "@score":"1", "@id":"3935143", "info":{"authors":{"author":[{"@pid":"95/554","text":"Mario Luca Bernardi"},{"@pid":"03/6132","text":"Marta Cimitile"},{"@pid":"d/GiuseppeADiLucca","text":"Giuseppe A. Di Lucca"}]},"title":"Declarative design pattern-based development using aspect oriented programming.","venue":"SAC","pages":"1625-1630","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BernardiCL14","doi":"10.1145/2554850.2554993","ee":"https://doi.org/10.1145/2554850.2554993","url":"https://dblp.org/rec/conf/sac/BernardiCL14"}, "url":"URL#3935143" }, { "@score":"1", "@id":"3935144", "info":{"authors":{"author":[{"@pid":"148/4427","text":"Antoine Bertout"},{"@pid":"33/6672","text":"Julien Forget"},{"@pid":"08/1315","text":"Richard Olejnik"}]},"title":"A heuristic to minimize the cardinality of a real-time task set by automated task clustering.","venue":"SAC","pages":"1431-1436","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BertoutFO14","doi":"10.1145/2554850.2554958","ee":"https://doi.org/10.1145/2554850.2554958","url":"https://dblp.org/rec/conf/sac/BertoutFO14"}, "url":"URL#3935144" }, { "@score":"1", "@id":"3935145", "info":{"authors":{"author":[{"@pid":"30/2434","text":"Holger Billhardt"},{"@pid":"13/7269","text":"Marin Lujak"},{"@pid":"o/SaschaOssowski","text":"Sascha Ossowski"},{"@pid":"07/5533","text":"Ralf Bruns"},{"@pid":"67/5088","text":"Jürgen Dunkel"}]},"title":"Intelligent event processing for emergency medical assistance.","venue":"SAC","pages":"200-206","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BillhardtLOBD14","doi":"10.1145/2554850.2554975","ee":"https://doi.org/10.1145/2554850.2554975","url":"https://dblp.org/rec/conf/sac/BillhardtLOBD14"}, "url":"URL#3935145" }, { "@score":"1", "@id":"3935146", "info":{"authors":{"author":[{"@pid":"124/3094","text":"Reihane Boghrati"},{"@pid":"h/AbbasHeydarnoori","text":"Abbas Heydarnoori"},{"@pid":"148/4397","text":"Majeed Kazemitabaar"}]},"title":"Activities performed by programmers while using framework examples as a guide.","venue":"SAC","pages":"1146-1151","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BoghratiHK14","doi":"10.1145/2554850.2555016","ee":"https://doi.org/10.1145/2554850.2555016","url":"https://dblp.org/rec/conf/sac/BoghratiHK14"}, "url":"URL#3935146" }, { "@score":"1", "@id":"3935147", "info":{"authors":{"author":[{"@pid":"67/760","text":"Adilson Luiz Bonifácio"},{"@pid":"61/669","text":"Arnaldo Vieira Moura"}]},"title":"On the completeness of test suites.","venue":"SAC","pages":"1287-1292","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BonifacioM14","doi":"10.1145/2554850.2554968","ee":"https://doi.org/10.1145/2554850.2554968","url":"https://dblp.org/rec/conf/sac/BonifacioM14"}, "url":"URL#3935147" }, { "@score":"1", "@id":"3935148", "info":{"authors":{"author":[{"@pid":"148/4422","text":"Simone de Sousa Borges"},{"@pid":"128/3287","text":"Vinicius H. S. Durelli"},{"@pid":"125/2998","text":"Helena Macedo Reis"},{"@pid":"83/1033","text":"Seiji Isotani"}]},"title":"A systematic mapping on gamification applied to education.","venue":"SAC","pages":"216-222","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BorgesDRI14","doi":"10.1145/2554850.2554956","ee":"https://doi.org/10.1145/2554850.2554956","url":"https://dblp.org/rec/conf/sac/BorgesDRI14"}, "url":"URL#3935148" }, { "@score":"1", "@id":"3935149", "info":{"authors":{"author":{"@pid":"117/6179","text":"Steven te Brinke"}},"title":"Interpreting energy profiles with CEGAR.","venue":"SAC","pages":"1221-1222","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Brinke14","doi":"10.1145/2554850.2555194","ee":"https://doi.org/10.1145/2554850.2555194","url":"https://dblp.org/rec/conf/sac/Brinke14"}, "url":"URL#3935149" }, { "@score":"1", "@id":"3935150", "info":{"authors":{"author":[{"@pid":"117/6179","text":"Steven te Brinke"},{"@pid":"51/2644","text":"Somayeh Malakuti"},{"@pid":"96/4196","text":"Christoph Bockisch"},{"@pid":"19/4331","text":"Lodewijk Bergmans"},{"@pid":"a/MAksit","text":"Mehmet Aksit"},{"@pid":"k/ShmuelKatz","text":"Shmuel Katz"}]},"title":"A tool-supported approach for modular design of energy-aware software.","venue":"SAC","pages":"1206-1212","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BrinkeMBBAK14","doi":"10.1145/2554850.2554964","ee":"https://doi.org/10.1145/2554850.2554964","url":"https://dblp.org/rec/conf/sac/BrinkeMBBAK14"}, "url":"URL#3935150" }, { "@score":"1", "@id":"3935151", "info":{"authors":{"author":[{"@pid":"148/4357","text":"Carlos Caetano"},{"@pid":"97/3954","text":"Sandra Eliza Fontes de Avila"},{"@pid":"08/3856","text":"Silvio Jamil Ferzoli Guimarães"},{"@pid":"a/ArnaldodeAlbuquerqueAraujo","text":"Arnaldo de Albuquerque Araújo"}]},"title":"Representing local binary descriptors with BossaNova for visual recognition.","venue":"SAC","pages":"49-54","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CaetanoAGA14","doi":"10.1145/2554850.2555058","ee":"https://doi.org/10.1145/2554850.2555058","url":"https://dblp.org/rec/conf/sac/CaetanoAGA14"}, "url":"URL#3935151" }, { "@score":"1", "@id":"3935152", "info":{"authors":{"author":[{"@pid":"25/2903","text":"Rodrigo Calvo"},{"@pid":"91/11213","text":"Janderson de Oliveira"},{"@pid":"87/6327","text":"Maurício F. Figueiredo"},{"@pid":"46/3833","text":"Roseli Aparecida Francelin Romero"}]},"title":"Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasks.","venue":"SAC","pages":"207-212","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CalvoOFR14","doi":"10.1145/2554850.2554977","ee":"https://doi.org/10.1145/2554850.2554977","url":"https://dblp.org/rec/conf/sac/CalvoOFR14"}, "url":"URL#3935152" }, { "@score":"1", "@id":"3935153", "info":{"authors":{"author":[{"@pid":"13/2872","text":"Javier Cámara"},{"@pid":"09/577","text":"Rogério de Lemos"},{"@pid":"56/6126","text":"Nuno Laranjeiro"},{"@pid":"129/9139","text":"Rafael Ventura"},{"@pid":"14/6260","text":"Marco Vieira"}]},"title":"Robustness evaluation of the rainbow framework for self-adaptation.","venue":"SAC","pages":"376-383","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CamaraLLVV14","doi":"10.1145/2554850.2554935","ee":"https://doi.org/10.1145/2554850.2554935","url":"https://dblp.org/rec/conf/sac/CamaraLLVV14"}, "url":"URL#3935153" }, { "@score":"1", "@id":"3935154", "info":{"authors":{"author":[{"@pid":"145/4396","text":"Eduardo Cunha Campos"},{"@pid":"97/4668","text":"Marcelo de Almeida Maia"}]},"title":"Automatic categorization of questions from Q&A sites.","venue":"SAC","pages":"641-643","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CamposM14","doi":"10.1145/2554850.2555117","ee":"https://doi.org/10.1145/2554850.2555117","url":"https://dblp.org/rec/conf/sac/CamposM14"}, "url":"URL#3935154" }, { "@score":"1", "@id":"3935155", "info":{"authors":{"author":[{"@pid":"148/4239","text":"Andrea Cani"},{"@pid":"126/2116","text":"Marco Gaudesi"},{"@pid":"s/ErnestoSanchez","text":"Ernesto Sánchez 0001"},{"@pid":"80/276","text":"Giovanni Squillero"},{"@pid":"60/4714","text":"Alberto Paolo Tonda"}]},"title":"Towards automated malware creation: code generation and code integration.","venue":"SAC","pages":"157-160","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CaniGSST14","doi":"10.1145/2554850.2555157","ee":"https://doi.org/10.1145/2554850.2555157","url":"https://dblp.org/rec/conf/sac/CaniGSST14"}, "url":"URL#3935155" }, { "@score":"1", "@id":"3935156", "info":{"authors":{"author":[{"@pid":"28/9571","text":"Sandip Chakraborty"},{"@pid":"52/10123","text":"Suchetana Chakraborty"},{"@pid":"26/3091","text":"Sushanta Karmakar"},{"@pid":"148/4303","text":"Hridoy Sankar Dutta"}]},"title":"Hierarchical topology adaptation for distributed convergecast applications.","venue":"SAC","pages":"405-407","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChakrabortyCKD14","doi":"10.1145/2554850.2555080","ee":"https://doi.org/10.1145/2554850.2555080","url":"https://dblp.org/rec/conf/sac/ChakrabortyCKD14"}, "url":"URL#3935156" }, { "@score":"1", "@id":"3935157", "info":{"authors":{"author":[{"@pid":"140/1549","text":"Geiser Chalco Challco"},{"@pid":"83/1033","text":"Seiji Isotani"}]},"title":"Towards a learning design authoring tool that generates personalized units of learning for CSCL.","venue":"SAC","pages":"778-780","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChallcoI14","doi":"10.1145/2554850.2555126","ee":"https://doi.org/10.1145/2554850.2555126","url":"https://dblp.org/rec/conf/sac/ChallcoI14"}, "url":"URL#3935157" }, { "@score":"1", "@id":"3935158", "info":{"authors":{"author":[{"@pid":"148/4365","text":"Su-Wei Chang"},{"@pid":"140/2107","text":"Sheng-Wei Cheng"},{"@pid":"73/4832","text":"Pi-Cheng Hsiu"},{"@pid":"07/3181","text":"Tei-Wei Kuo"},{"@pid":"80/7467","text":"Ching-Wen Lin"}]},"title":"Application behavior analysis in resource consumption for mobile devices.","venue":"SAC","pages":"1469-1474","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChangCHKL14","doi":"10.1145/2554850.2554994","ee":"https://doi.org/10.1145/2554850.2554994","url":"https://dblp.org/rec/conf/sac/ChangCHKL14"}, "url":"URL#3935158" }, { "@score":"1", "@id":"3935159", "info":{"authors":{"author":[{"@pid":"78/2863","text":"Li-Pin Chang"},{"@pid":"148/4228","text":"Sheng-Min Huang"},{"@pid":"119/2940","text":"Wen-Ping Li"}]},"title":"Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning.","venue":"SAC","pages":"1504-1510","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChangHL14","doi":"10.1145/2554850.2554939","ee":"https://doi.org/10.1145/2554850.2554939","url":"https://dblp.org/rec/conf/sac/ChangHL14"}, "url":"URL#3935159" }, { "@score":"1", "@id":"3935160", "info":{"authors":{"author":[{"@pid":"07/8021","text":"Wan-Chi Chang"},{"@pid":"89/1349","text":"Hsueh-Wen Tseng"},{"@pid":"88/663","text":"Chin-Fu Kuo"}]},"title":"A traffic-balanced routing scheme for heat balance in 3D networks-on-chip.","venue":"SAC","pages":"1437-1442","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChangTK14","doi":"10.1145/2554850.2554961","ee":"https://doi.org/10.1145/2554850.2554961","url":"https://dblp.org/rec/conf/sac/ChangTK14"}, "url":"URL#3935160" }, { "@score":"1", "@id":"3935161", "info":{"authors":{"author":[{"@pid":"136/8375","text":"Amrita Chaturvedi"},{"@pid":"01/10196","text":"Tadinada Vankata Prabhakar"}]},"title":"Ontology driven builder pattern: a plug and play component.","venue":"SAC","pages":"1055-1057","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChaturvediP14","doi":"10.1145/2554850.2555164","ee":"https://doi.org/10.1145/2554850.2555164","url":"https://dblp.org/rec/conf/sac/ChaturvediP14"}, "url":"URL#3935161" }, { "@score":"1", "@id":"3935162", "info":{"authors":{"author":{"@pid":"123/6671","text":"Siyun Chen"}},"title":"Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building.","venue":"SAC","pages":"569-570","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Chen14","doi":"10.1145/2554850.2555193","ee":"https://doi.org/10.1145/2554850.2555193","url":"https://dblp.org/rec/conf/sac/Chen14"}, "url":"URL#3935162" }, { "@score":"1", "@id":"3935163", "info":{"authors":{"author":[{"@pid":"32/6550","text":"Tianjian Chen"},{"@pid":"53/252","text":"Jing Cai"},{"@pid":"181/2812","text":"Hao Wang"},{"@pid":"03/1299","text":"Yu Dong"}]},"title":"Instant expert hunting: building an answerer recommender system for a large scale Q&A website.","venue":"SAC","pages":"260-265","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenCWD14","doi":"10.1145/2554850.2554915","ee":"https://doi.org/10.1145/2554850.2554915","url":"https://dblp.org/rec/conf/sac/ChenCWD14"}, "url":"URL#3935163" }, { "@score":"1", "@id":"3935164", "info":{"authors":{"author":[{"@pid":"52/5308-2","text":"Huan Chen 0002"},{"@pid":"40/460","text":"Guo-Tan Liao"},{"@pid":"85/6913","text":"Yao-Chung Fan"},{"@pid":"52/1483","text":"Bo-Chao Cheng"},{"@pid":"36/8209","text":"Cheng-Min Chen"},{"@pid":"08/9411","text":"Ting-Chun Kuo"}]},"title":"Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology.","venue":"SAC","pages":"33-35","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenLFCCK14","doi":"10.1145/2554850.2555118","ee":"https://doi.org/10.1145/2554850.2555118","url":"https://dblp.org/rec/conf/sac/ChenLFCCK14"}, "url":"URL#3935164" }, { "@score":"1", "@id":"3935165", "info":{"authors":{"author":[{"@pid":"86/541-1","text":"Zhenyu Chen 0001"},{"@pid":"m/AtifMMemon","text":"Atif M. Memon"},{"@pid":"36/4256-3","text":"Bin Luo 0003"}]},"title":"Combining research and education of software testing: a preliminary study.","venue":"SAC","pages":"1179-1180","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenML14","doi":"10.1145/2554850.2555124","ee":"https://doi.org/10.1145/2554850.2555124","url":"https://dblp.org/rec/conf/sac/ChenML14"}, "url":"URL#3935165" }, { "@score":"1", "@id":"3935166", "info":{"authors":{"author":[{"@pid":"148/4351","text":"Qinshui Chen"},{"@pid":"96/7699","text":"Wenmin Wang"},{"@pid":"64/6287","text":"Ronggang Wang"},{"@pid":"25/1632","text":"Jianlong Zhang"},{"@pid":"15/3235","text":"Zhongxin Liu"}]},"title":"An approach to support stereoscopic 3D web.","venue":"SAC","pages":"981-984","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenWWZL14","doi":"10.1145/2554850.2555096","ee":"https://doi.org/10.1145/2554850.2555096","url":"https://dblp.org/rec/conf/sac/ChenWWZL14"}, "url":"URL#3935166" }, { "@score":"1", "@id":"3935167", "info":{"authors":{"author":[{"@pid":"10/217-19","text":"Cheng Chen 0019"},{"@pid":"36/7347","text":"Lan Zheng"},{"@pid":"t/AlexThomo","text":"Alex Thomo"},{"@pid":"w/KuiWu","text":"Kui Wu 0001"},{"@pid":"v/SrinivasanVenkatesh","text":"Srinivasan Venkatesh 0001"}]},"title":"Comparing the staples in latent factor models for recommender systems.","venue":"SAC","pages":"91-96","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenZTWS14","doi":"10.1145/2554850.2554925","ee":"https://doi.org/10.1145/2554850.2554925","url":"https://dblp.org/rec/conf/sac/ChenZTWS14"}, "url":"URL#3935167" }, { "@score":"1", "@id":"3935168", "info":{"authors":{"author":[{"@pid":"55/6253","text":"Bing Chen"},{"@pid":"66/3005-2","text":"Qingkai Zeng 0002"},{"@pid":"40/4205","text":"Weiguang Wang"}]},"title":"Crashmaker: an improved binary concolic testing tool for vulnerability detection.","venue":"SAC","pages":"1257-1263","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenZW14","doi":"10.1145/2554850.2554875","ee":"https://doi.org/10.1145/2554850.2554875","url":"https://dblp.org/rec/conf/sac/ChenZW14"}, "url":"URL#3935168" }, { "@score":"1", "@id":"3935169", "info":{"authors":{"author":[{"@pid":"07/2759","text":"Junho Choi"},{"@pid":"63/5712","text":"Jeongin Kim"},{"@pid":"k/PanKooKim","text":"Pankoo Kim"}]},"title":"Modeling for context-aware healthcare service using ontology.","venue":"SAC","pages":"1729-1730","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChoiKK14","doi":"10.1145/2554850.2559911","ee":"https://doi.org/10.1145/2554850.2559911","url":"https://dblp.org/rec/conf/sac/ChoiKK14"}, "url":"URL#3935169" }, { "@score":"1", "@id":"3935170", "info":{"authors":{"author":[{"@pid":"82/846","text":"Sang-Il Choi"},{"@pid":"57/4921","text":"Seok-Joo Koh"},{"@pid":"18/1194","text":"Insu Kim"},{"@pid":"37/11051","text":"Sang-Kyu Lim"},{"@pid":"75/1754","text":"Tae Gyu Kang"}]},"title":"A new device discovery scheme in lighting control networks.","venue":"SAC","pages":"1743-1744","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChoiKKLK14","doi":"10.1145/2554850.2559918","ee":"https://doi.org/10.1145/2554850.2559918","url":"https://dblp.org/rec/conf/sac/ChoiKKLK14"}, "url":"URL#3935170" }, { "@score":"1", "@id":"3935171", "info":{"authors":{"author":[{"@pid":"36/7605","text":"Hyunsoek Choi"},{"@pid":"07/10461","text":"Jeongin Seo"},{"@pid":"62/725","text":"Hyeyoung Park"}]},"title":"Matrix correlation distance for 2D image classification.","venue":"SAC","pages":"1741-1742","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChoiSP14","doi":"10.1145/2554850.2559917","ee":"https://doi.org/10.1145/2554850.2559917","url":"https://dblp.org/rec/conf/sac/ChoiSP14"}, "url":"URL#3935171" }, { "@score":"1", "@id":"3935172", "info":{"authors":{"author":[{"@pid":"66/10009","text":"Matteo Ciman"},{"@pid":"63/2763","text":"Ombretta Gaggi"},{"@pid":"148/4338","text":"Nicola Gonzo"}]},"title":"Cross-platform mobile development: a study on apps with animations.","venue":"SAC","pages":"757-759","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CimanGG14","doi":"10.1145/2554850.2555104","ee":"https://doi.org/10.1145/2554850.2555104","url":"https://dblp.org/rec/conf/sac/CimanGG14"}, "url":"URL#3935172" }, { "@score":"1", "@id":"3935173", "info":{"authors":{"author":[{"@pid":"129/2219","text":"Riccardo Cognini"},{"@pid":"00/6390","text":"Flavio Corradini"},{"@pid":"g/StefaniaGnesi","text":"Stefania Gnesi"},{"@pid":"90/329","text":"Andrea Polini"},{"@pid":"r/BarbaraRe","text":"Barbara Re 0001"}]},"title":"Research challenges in business process adaptability.","venue":"SAC","pages":"1049-1054","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CogniniCGPR14","doi":"10.1145/2554850.2555055","ee":"https://doi.org/10.1145/2554850.2555055","url":"https://dblp.org/rec/conf/sac/CogniniCGPR14"}, "url":"URL#3935173" }, { "@score":"1", "@id":"3935174", "info":{"authors":{"author":{"@pid":"148/4398","text":"Vanessa N. Cooper"}},"title":"Student research abstract: android malware detection based on Kullback-Leibler divergence.","venue":"SAC","pages":"1695-1696","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Cooper14","doi":"10.1145/2554850.2555186","ee":"https://doi.org/10.1145/2554850.2555186","url":"https://dblp.org/rec/conf/sac/Cooper14"}, "url":"URL#3935174" }, { "@score":"1", "@id":"3935175", "info":{"authors":{"author":[{"@pid":"33/10223","text":"Luis Corral"},{"@pid":"143/2319","text":"Anton B. Georgiev"},{"@pid":"s/AlbertoSillitti","text":"Alberto Sillitti"},{"@pid":"17/5631","text":"Giancarlo Succi"}]},"title":"Method reallocation to reduce energy consumption: an implementation in Android OS.","venue":"SAC","pages":"1213-1218","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CorralGSS14","doi":"10.1145/2554850.2555064","ee":"https://doi.org/10.1145/2554850.2555064","url":"https://dblp.org/rec/conf/sac/CorralGSS14"}, "url":"URL#3935175" }, { "@score":"1", "@id":"3935176", "info":{"authors":{"author":[{"@pid":"117/5533","text":"Daniel Alencar da Costa"},{"@pid":"78/6010","text":"Uirá Kulesza"},{"@pid":"31/1490","text":"Eduardo Aranha"},{"@pid":"61/561","text":"Roberta Coelho"}]},"title":"Unveiling developers contributions behind code commits: an exploratory study.","venue":"SAC","pages":"1152-1157","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CostaKAC14","doi":"10.1145/2554850.2555030","ee":"https://doi.org/10.1145/2554850.2555030","url":"https://dblp.org/rec/conf/sac/CostaKAC14"}, "url":"URL#3935176" }, { "@score":"1", "@id":"3935177", "info":{"authors":{"author":[{"@pid":"123/7461","text":"Alceu Ferraz Costa"},{"@pid":"t/AgmaJMTraina","text":"Agma Juci Machado Traina"},{"@pid":"t/CaetanoTrainaJr","text":"Caetano Traina Jr."}]},"title":"MFS-Map: efficient context and content combination to annotate images.","venue":"SAC","pages":"945-950","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CostaTT14","doi":"10.1145/2554850.2554868","ee":"https://doi.org/10.1145/2554850.2554868","url":"https://dblp.org/rec/conf/sac/CostaTT14"}, "url":"URL#3935177" }, { "@score":"1", "@id":"3935178", "info":{"authors":{"author":[{"@pid":"65/591","text":"Sérgio Manuel Serra da Cruz"},{"@pid":"65/1595","text":"Laci Mary M. Barbosa"},{"@pid":"67/4332","text":"Jorge Zavaleta"},{"@pid":"38/6172","text":"Raimundo Macário Costa"},{"@pid":"78/4279","text":"Maria Luiza Machado Campos"}]},"title":"Collecting cloud provenance metadata with Matriohska: a case study with genomic workflows.","venue":"SAC","pages":"351-356","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CruzBZCC14","doi":"10.1145/2554850.2555066","ee":"https://doi.org/10.1145/2554850.2555066","url":"https://dblp.org/rec/conf/sac/CruzBZCC14"}, "url":"URL#3935178" }, { "@score":"1", "@id":"3935179", "info":{"authors":{"author":[{"@pid":"156/3256","text":"Francisco Cruz 0001"},{"@pid":"95/8626","text":"Francisco Maia"},{"@pid":"41/3634-1","text":"Rui Oliveira 0001"},{"@pid":"08/204","text":"Ricardo Vilaça"}]},"title":"Workload-aware table splitting for NoSQL.","venue":"SAC","pages":"399-404","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CruzMOV14","doi":"10.1145/2554850.2555027","ee":"https://doi.org/10.1145/2554850.2555027","url":"https://dblp.org/rec/conf/sac/CruzMOV14"}, "url":"URL#3935179" }, { "@score":"1", "@id":"3935180", "info":{"authors":{"author":[{"@pid":"17/11239","text":"Keling Da"},{"@pid":"81/2460","text":"Marc Dalmau"},{"@pid":"46/1281","text":"Philippe Roose"}]},"title":"Kalimucho: middleware for mobile applications.","venue":"SAC","pages":"413-419","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DaDR14","doi":"10.1145/2554850.2554883","ee":"https://doi.org/10.1145/2554850.2554883","url":"https://dblp.org/rec/conf/sac/DaDR14"}, "url":"URL#3935180" }, { "@score":"1", "@id":"3935181", "info":{"authors":{"author":[{"@pid":"27/1613","text":"Frédéric Dabrowski"},{"@pid":"l/FredericLoulergue","text":"Frédéric Loulergue"},{"@pid":"148/4349","text":"Thomas Pinsard"}]},"title":"Nested atomic sections with thread escape: a formal definition.","venue":"SAC","pages":"1585-1592","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DabrowskiLP14","doi":"10.1145/2554850.2554996","ee":"https://doi.org/10.1145/2554850.2554996","url":"https://dblp.org/rec/conf/sac/DabrowskiLP14"}, "url":"URL#3935181" }, { "@score":"1", "@id":"3935182", "info":{"authors":{"author":{"@pid":"148/4271","text":"Alfred Daniel"}},"title":"Vehicle to vehicle communication using Zigbee protocol.","venue":"SAC","pages":"715-716","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Daniel14","doi":"10.1145/2554850.2555192","ee":"https://doi.org/10.1145/2554850.2555192","url":"https://dblp.org/rec/conf/sac/Daniel14"}, "url":"URL#3935182" }, { "@score":"1", "@id":"3935183", "info":{"authors":{"author":[{"@pid":"74/10848","text":"John S. Dean"},{"@pid":"19/4296","text":"Frank J. Mitropoulos"}]},"title":"An aspect pointcut for parallelizable loops.","venue":"SAC","pages":"1619-1624","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DeanM14","doi":"10.1145/2554850.2554917","ee":"https://doi.org/10.1145/2554850.2554917","url":"https://dblp.org/rec/conf/sac/DeanM14"}, "url":"URL#3935183" }, { "@score":"1", "@id":"3935184", "info":{"authors":{"author":[{"@pid":"77/7583","text":"Charanpal Dhanjal"},{"@pid":"85/6714","text":"Stéphan Clémençon"}]},"title":"Learning reputation in an authorship network.","venue":"SAC","pages":"1724-1726","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DhanjalC14","doi":"10.1145/2554850.2555098","ee":"https://doi.org/10.1145/2554850.2555098","url":"https://dblp.org/rec/conf/sac/DhanjalC14"}, "url":"URL#3935184" }, { "@score":"1", "@id":"3935185", "info":{"authors":{"author":[{"@pid":"117/3638","text":"Nuno Lourenco Diegues"},{"@pid":"148/4434","text":"Muhammet Orazov"},{"@pid":"135/8153","text":"João Paiva"},{"@pid":"r/LRodrigues","text":"Luís E. T. Rodrigues"},{"@pid":"r/PaoloRomano0","text":"Paolo Romano 0002"}]},"title":"Autonomic configuration of HyperDex via analytical modelling.","venue":"SAC","pages":"370-375","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DieguesOPRR14","doi":"10.1145/2554850.2554876","ee":"https://doi.org/10.1145/2554850.2554876","url":"https://dblp.org/rec/conf/sac/DieguesOPRR14"}, "url":"URL#3935185" }, { "@score":"1", "@id":"3935186", "info":{"authors":{"author":[{"@pid":"31/563","text":"Graeme Douglas"},{"@pid":"93/1448","text":"Ramon Lawrence"}]},"title":"LittleD: a SQL database for sensor nodes and embedded applications.","venue":"SAC","pages":"827-832","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DouglasL14","doi":"10.1145/2554850.2554891","ee":"https://doi.org/10.1145/2554850.2554891","url":"https://dblp.org/rec/conf/sac/DouglasL14"}, "url":"URL#3935186" }, { "@score":"1", "@id":"3935187", "info":{"authors":{"author":[{"@pid":"01/11078-1","text":"Diego Elias 0001"},{"@pid":"06/6499","text":"Rivalino Matias"},{"@pid":"148/4284","text":"Marcia Fernandes"},{"@pid":"51/9721","text":"Lucio Borges de Araujo"}]},"title":"Experimental and theoretical analyses of memory allocation algorithms.","venue":"SAC","pages":"1545-1546","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EliasMFB14","doi":"10.1145/2554850.2555149","ee":"https://doi.org/10.1145/2554850.2555149","url":"https://dblp.org/rec/conf/sac/EliasMFB14"}, "url":"URL#3935187" }, { "@score":"1", "@id":"3935188", "info":{"authors":{"author":[{"@pid":"68/1281","text":"Keita Emura"},{"@pid":"33/2485","text":"Akira Kanaoka"},{"@pid":"01/1159","text":"Satoshi Ohta"},{"@pid":"61/4099","text":"Takeshi Takahashi 0001"}]},"title":"Building secure and anonymous communication channel: formal model and its prototype implementation.","venue":"SAC","pages":"1641-1648","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EmuraKOT14","doi":"10.1145/2554850.2554879","ee":"https://doi.org/10.1145/2554850.2554879","url":"https://dblp.org/rec/conf/sac/EmuraKOT14"}, "url":"URL#3935188" }, { "@score":"1", "@id":"3935189", "info":{"authors":{"author":[{"@pid":"28/9579","text":"Priscila Engiel"},{"@pid":"20/5813","text":"Claudia Cappelli"},{"@pid":"l/JCSdoPradoLeite","text":"Julio César Sampaio do Prado Leite"}]},"title":"Eliciting concepts from the Brazilian access law using a combined approach.","venue":"SAC","pages":"1001-1006","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EngielCL14","doi":"10.1145/2554850.2555057","ee":"https://doi.org/10.1145/2554850.2555057","url":"https://dblp.org/rec/conf/sac/EngielCL14"}, "url":"URL#3935189" }, { "@score":"1", "@id":"3935190", "info":{"authors":{"author":[{"@pid":"97/7975","text":"Xavier Etchevers"},{"@pid":"86/2766","text":"Gwen Salaün"},{"@pid":"54/50","text":"Fabienne Boyer"},{"@pid":"c/TCoupaye","text":"Thierry Coupaye"},{"@pid":"58/3793","text":"Noël De Palma"}]},"title":"Reliable self-deployment of cloud applications.","venue":"SAC","pages":"1331-1338","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EtcheversSBCP14","doi":"10.1145/2554850.2554951","ee":"https://doi.org/10.1145/2554850.2554951","url":"https://dblp.org/rec/conf/sac/EtcheversSBCP14"}, "url":"URL#3935190" }, { "@score":"1", "@id":"3935191", "info":{"authors":{"author":[{"@pid":"75/6793","text":"Joerg Evermann"},{"@pid":"79/8228","text":"Ghazal Assadipour"}]},"title":"Big data meets process mining: implementing the alpha algorithm with map-reduce.","venue":"SAC","pages":"1414-1416","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EvermannA14","doi":"10.1145/2554850.2555076","ee":"https://doi.org/10.1145/2554850.2555076","url":"https://dblp.org/rec/conf/sac/EvermannA14"}, "url":"URL#3935191" }, { "@score":"1", "@id":"3935192", "info":{"authors":{"author":[{"@pid":"229/4259","text":"Ricardo de Almeida Falbo"},{"@pid":"37/528","text":"Fabiano Borges Ruy"},{"@pid":"11/78","text":"Giancarlo Guizzardi"},{"@pid":"97/7540","text":"Monalessa Perini Barcellos"},{"@pid":"91/3408","text":"João Paulo Andrade Almeida"}]},"title":"Towards an enterprise ontology pattern language.","venue":"SAC","pages":"323-330","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FalboRGBA14","doi":"10.1145/2554850.2554983","ee":"https://doi.org/10.1145/2554850.2554983","url":"https://dblp.org/rec/conf/sac/FalboRGBA14"}, "url":"URL#3935192" }, { "@score":"1", "@id":"3935193", "info":{"authors":{"author":[{"@pid":"85/6913","text":"Yao-Chung Fan"},{"@pid":"52/5308-2","text":"Huan Chen 0002"}]},"title":"An approximate framework for scaling social influence computation in large networks.","venue":"SAC","pages":"610-615","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FanC14","doi":"10.1145/2554850.2554952","ee":"https://doi.org/10.1145/2554850.2554952","url":"https://dblp.org/rec/conf/sac/FanC14"}, "url":"URL#3935193" }, { "@score":"1", "@id":"3935194", "info":{"authors":{"author":[{"@pid":"49/7937","text":"Kleinner Farias"},{"@pid":"g/AlessandroFGarcia","text":"Alessandro Garcia 0001"},{"@pid":"l/CarlosJosePereiradeLucena","text":"Carlos José Pereira de Lucena"},{"@pid":"133/7509","text":"Luiz Gonzaga Jr."},{"@pid":"14/3505","text":"Cristiano André da Costa"},{"@pid":"33/4917","text":"Rodrigo da Rosa Righi"},{"@pid":"58/4232","text":"Fábio Basso"},{"@pid":"o/ToacyCavalcantedeOliveira","text":"Toacy Cavalcante de Oliveira"}]},"title":"Towards a quality model for model composition effort.","venue":"SAC","pages":"1181-1183","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FariasGLGCRBO14","doi":"10.1145/2554850.2555131","ee":"https://doi.org/10.1145/2554850.2555131","url":"https://dblp.org/rec/conf/sac/FariasGLGCRBO14"}, "url":"URL#3935194" }, { "@score":"1", "@id":"3935195", "info":{"authors":{"author":[{"@pid":"26/2491","text":"Walid Fdhila"},{"@pid":"r/StefanieRinderle","text":"Stefanie Rinderle-Ma"}]},"title":"Predicting change propagation impacts in collaborative business processes.","venue":"SAC","pages":"1378-1385","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FdhilaR14","doi":"10.1145/2554850.2554966","ee":"https://doi.org/10.1145/2554850.2554966","url":"https://dblp.org/rec/conf/sac/FdhilaR14"}, "url":"URL#3935195" }, { "@score":"1", "@id":"3935196", "info":{"authors":{"author":[{"@pid":"64/2213","text":"Jose Luis Fernandez-Marquez"},{"@pid":"s/GDMSerugendo","text":"Giovanna Di Marzo Serugendo"},{"@pid":"21/4739","text":"Graeme Stevenson"},{"@pid":"75/3533","text":"Juan Ye"},{"@pid":"d/SimonADobson","text":"Simon Dobson"},{"@pid":"54/3140","text":"Franco Zambonelli"}]},"title":"Self-managing and self-organising mobile computing applications: a separation of concerns approach.","venue":"SAC","pages":"458-465","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Fernandez-MarquezSSYDZ14","doi":"10.1145/2554850.2555042","ee":"https://doi.org/10.1145/2554850.2555042","url":"https://dblp.org/rec/conf/sac/Fernandez-MarquezSSYDZ14"}, "url":"URL#3935196" }, { "@score":"1", "@id":"3935197", "info":{"authors":{"author":[{"@pid":"24/940","text":"Carolina Toledo Ferraz"},{"@pid":"148/4278","text":"Osmando Pereira Jr."},{"@pid":"41/493","text":"Adilson Gonzaga"}]},"title":"Feature description based on center-symmetric local mapped patterns.","venue":"SAC","pages":"39-44","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FerrazPG14","doi":"10.1145/2554850.2554895","ee":"https://doi.org/10.1145/2554850.2554895","url":"https://dblp.org/rec/conf/sac/FerrazPG14"}, "url":"URL#3935197" }, { "@score":"1", "@id":"3935198", "info":{"authors":{"author":[{"@pid":"148/4409","text":"Manuele Ferreira"},{"@pid":"47/10086","text":"Eiji Adachi Barbosa"},{"@pid":"23/9489","text":"Isela Macia Bertran"},{"@pid":"96/8310","text":"Roberta Arcoverde"},{"@pid":"g/AlessandroFGarcia","text":"Alessandro Garcia 0001"}]},"title":"Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort.","venue":"SAC","pages":"1158-1163","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FerreiraBBAG14","doi":"10.1145/2554850.2555036","ee":"https://doi.org/10.1145/2554850.2555036","url":"https://dblp.org/rec/conf/sac/FerreiraBBAG14"}, "url":"URL#3935198" }, { "@score":"1", "@id":"3935199", "info":{"authors":{"author":[{"@pid":"147/5032","text":"Hayden Field"},{"@pid":"147/4945","text":"Glen Anderson"},{"@pid":"56/6082","text":"Kerstin Eder"}]},"title":"EACOF: a framework for providing energy transparency to enable energy-aware software development.","venue":"SAC","pages":"1194-1199","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FieldAE14","doi":"10.1145/2554850.2554920","ee":"https://doi.org/10.1145/2554850.2554920","url":"https://dblp.org/rec/conf/sac/FieldAE14"}, "url":"URL#3935199" }, { "@score":"1", "@id":"3935200", "info":{"authors":{"author":[{"@pid":"148/4287","text":"Kala Fleming"},{"@pid":"61/5240","text":"Komminist Weldemariam"},{"@pid":"148/4260","text":"Haggai Wangusi"},{"@pid":"32/843","text":"Osamuyimen Stewart"}]},"title":"Monitoring water scarcity risk in Africa.","venue":"SAC","pages":"567-568","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FlemingWWS14","doi":"10.1145/2554850.2555163","ee":"https://doi.org/10.1145/2554850.2555163","url":"https://dblp.org/rec/conf/sac/FlemingWWS14"}, "url":"URL#3935200" }, { "@score":"1", "@id":"3935201", "info":{"authors":{"author":[{"@pid":"135/6096","text":"Matthieu Foucault"},{"@pid":"43/10257","text":"Marc Palyart"},{"@pid":"39/1255","text":"Jean-Rémy Falleri"},{"@pid":"37/3159-1","text":"Xavier Blanc 0001"}]},"title":"Computing contextual metric thresholds.","venue":"SAC","pages":"1120-1125","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FoucaultPFB14","doi":"10.1145/2554850.2554997","ee":"https://doi.org/10.1145/2554850.2554997","url":"https://dblp.org/rec/conf/sac/FoucaultPFB14"}, "url":"URL#3935201" }, { "@score":"1", "@id":"3935202", "info":{"authors":{"author":[{"@pid":"116/4957","text":"Larissa A. de Freitas"},{"@pid":"130/0476","text":"Aline A. Vanin"},{"@pid":"146/3892","text":"Denise N. Hogetop"},{"@pid":"130/0446","text":"Marco N. Bochernitsan"},{"@pid":"05/465","text":"Renata Vieira"}]},"title":"Pathways for irony detection in tweets.","venue":"SAC","pages":"628-633","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FreitasVHBV14","doi":"10.1145/2554850.2555048","ee":"https://doi.org/10.1145/2554850.2555048","url":"https://dblp.org/rec/conf/sac/FreitasVHBV14"}, "url":"URL#3935202" }, { "@score":"1", "@id":"3935203", "info":{"authors":{"author":[{"@pid":"46/3866","text":"Kiev Gama"},{"@pid":"02/2570","text":"Didier Donsez"}]},"title":"A fault deployment and activation approach for testing self-recovery mechanisms.","venue":"SAC","pages":"1114-1119","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GamaD14","doi":"10.1145/2554850.2554981","ee":"https://doi.org/10.1145/2554850.2554981","url":"https://dblp.org/rec/conf/sac/GamaD14"}, "url":"URL#3935203" }, { "@score":"1", "@id":"3935204", "info":{"authors":{"author":[{"@pid":"19/9308","text":"Ruizhi Gao"},{"@pid":"148/4359","text":"Jeong Soo Eo"},{"@pid":"w/WEricWong","text":"W. Eric Wong"},{"@pid":"56/11438","text":"Xinwei Gao"},{"@pid":"121/2867","text":"Shou-Yu Lee"}]},"title":"An empirical study of requirements-based test generation on an automobile control system.","venue":"SAC","pages":"1094-1099","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GaoEWGL14","doi":"10.1145/2554850.2554934","ee":"https://doi.org/10.1145/2554850.2554934","url":"https://dblp.org/rec/conf/sac/GaoEWGL14"}, "url":"URL#3935204" }, { "@score":"1", "@id":"3935205", "info":{"authors":{"author":[{"@pid":"49/9739","text":"Patrick Gaubatz"},{"@pid":"48/8764","text":"Waldemar Hummer"},{"@pid":"00/6127","text":"Uwe Zdun"},{"@pid":"05/6430","text":"Mark Strembeck"}]},"title":"Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents.","venue":"SAC","pages":"735-742","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GaubatzHZS14","doi":"10.1145/2554850.2554976","ee":"https://doi.org/10.1145/2554850.2554976","url":"https://dblp.org/rec/conf/sac/GaubatzHZS14"}, "url":"URL#3935205" }, { "@score":"1", "@id":"3935206", "info":{"authors":{"author":[{"@pid":"08/7412","text":"Giorgos Georgiadis"},{"@pid":"p/MPapatriantafilou","text":"Marina Papatriantafilou"}]},"title":"Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithm.","venue":"SAC","pages":"518-524","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GeorgiadisP14","doi":"10.1145/2554850.2554943","ee":"https://doi.org/10.1145/2554850.2554943","url":"https://dblp.org/rec/conf/sac/GeorgiadisP14"}, "url":"URL#3935206" }, { "@score":"1", "@id":"3935207", "info":{"authors":{"author":[{"@pid":"128/0790","text":"Tiago Gomes"},{"@pid":"143/3880","text":"Tiago Abade"},{"@pid":"c/JoseCreissacCampos","text":"José Creissac Campos"},{"@pid":"50/1029","text":"Michael D. Harrison"},{"@pid":"02/4635-1","text":"José Luís Silva 0001"}]},"title":"Rapid development of first person serious games using the APEX platform: the asthma game.","venue":"SAC","pages":"169-174","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GomesACHS14","doi":"10.1145/2554850.2554969","ee":"https://doi.org/10.1145/2554850.2554969","url":"https://dblp.org/rec/conf/sac/GomesACHS14"}, "url":"URL#3935207" }, { "@score":"1", "@id":"3935208", "info":{"authors":{"author":[{"@pid":"129/0936","text":"Rafael L. Gomes"},{"@pid":"76/6740","text":"Luiz F. Bittencourt"},{"@pid":"m/EdmundoRobertoMauroMadeira","text":"Edmundo R. M. Madeira"}]},"title":"A similarity model for virtual networks negotiation.","venue":"SAC","pages":"489-494","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GomesBM14","doi":"10.1145/2554850.2554963","ee":"https://doi.org/10.1145/2554850.2554963","url":"https://dblp.org/rec/conf/sac/GomesBM14"}, "url":"URL#3935208" }, { "@score":"1", "@id":"3935209", "info":{"authors":{"author":[{"@pid":"139/3051","text":"Heitor Murilo Gomes"},{"@pid":"90/6263","text":"Fabrício Enembreck"}]},"title":"SAE2: advances on the social adaptive ensemble classifier for data streams.","venue":"SAC","pages":"798-804","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GomesE14","doi":"10.1145/2554850.2554905","ee":"https://doi.org/10.1145/2554850.2554905","url":"https://dblp.org/rec/conf/sac/GomesE14"}, "url":"URL#3935209" }, { "@score":"1", "@id":"3935210", "info":{"authors":{"author":[{"@pid":"148/4321","text":"S. Graziadio"},{"@pid":"75/10395","text":"Richard Davison"},{"@pid":"148/4414","text":"K. Shalabi"},{"@pid":"148/4283","text":"K. M. A. Sahota"},{"@pid":"45/10956","text":"Gary Ushaw"},{"@pid":"71/4301","text":"Graham Morgan"},{"@pid":"137/8302","text":"J. A. Eyre"}]},"title":"Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation.","venue":"SAC","pages":"20-24","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GraziadioDSSUME14","doi":"10.1145/2554850.2554953","ee":"https://doi.org/10.1145/2554850.2554953","url":"https://dblp.org/rec/conf/sac/GraziadioDSSUME14"}, "url":"URL#3935210" }, { "@score":"1", "@id":"3935211", "info":{"authors":{"author":[{"@pid":"78/8012","text":"Tobias Griebe"},{"@pid":"g/VolkerGruhn","text":"Volker Gruhn"}]},"title":"A model-based approach to test automation for context-aware mobile applications.","venue":"SAC","pages":"420-427","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GriebeG14","doi":"10.1145/2554850.2554942","ee":"https://doi.org/10.1145/2554850.2554942","url":"https://dblp.org/rec/conf/sac/GriebeG14"}, "url":"URL#3935211" }, { "@score":"1", "@id":"3935212", "info":{"authors":{"author":{"@pid":"120/7814","text":"Felipe Pontes Guimarães"}},"title":"A fault-tolerant architecture for decentralized compositions of services in the wild.","venue":"SAC","pages":"1255-1256","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Guimaraes14","doi":"10.1145/2554850.2555188","ee":"https://doi.org/10.1145/2554850.2555188","url":"https://dblp.org/rec/conf/sac/Guimaraes14"}, "url":"URL#3935212" }, { "@score":"1", "@id":"3935213", "info":{"authors":{"author":[{"@pid":"126/6823","text":"Everton T. Guimarães"},{"@pid":"g/AlessandroFGarcia","text":"Alessandro Garcia 0001"},{"@pid":"49/7937","text":"Kleinner Farias"}]},"title":"On the impact of obliviousness and quantification on model composition effort.","venue":"SAC","pages":"1043-1048","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GuimaraesGF14","doi":"10.1145/2554850.2555034","ee":"https://doi.org/10.1145/2554850.2555034","url":"https://dblp.org/rec/conf/sac/GuimaraesGF14"}, "url":"URL#3935213" }, { "@score":"1", "@id":"3935214", "info":{"authors":{"author":[{"@pid":"42/5646","text":"Hai-Feng Guo"},{"@pid":"52/958","text":"Zongyan Qiu"},{"@pid":"77/1325","text":"Harvey P. Siy"}]},"title":"Locating fault-inducing patterns from structural inputs.","venue":"SAC","pages":"1100-1107","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GuoQS14","doi":"10.1145/2554850.2554938","ee":"https://doi.org/10.1145/2554850.2554938","url":"https://dblp.org/rec/conf/sac/GuoQS14"}, "url":"URL#3935214" }, { "@score":"1", "@id":"3935215", "info":{"authors":{"author":[{"@pid":"84/10716","text":"Guibing Guo"},{"@pid":"84/6889-2","text":"Jie Zhang 0002"},{"@pid":"t/DanielThalmann","text":"Daniel Thalmann"},{"@pid":"60/2798","text":"Anirban Basu"},{"@pid":"95/5096","text":"Neil Yorke-Smith"}]},"title":"From ratings to trust: an empirical study of implicit trust in recommender systems.","venue":"SAC","pages":"248-253","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GuoZTBY14","doi":"10.1145/2554850.2554878","ee":"https://doi.org/10.1145/2554850.2554878","url":"https://dblp.org/rec/conf/sac/GuoZTBY14"}, "url":"URL#3935215" }, { "@score":"1", "@id":"3935216", "info":{"authors":{"author":[{"@pid":"02/415","text":"J. Octavio Gutiérrez-García"},{"@pid":"79/903","text":"Andrés Gómez de Silva Garza"}]},"title":"Multi-agent simulation of perception of safety from crime.","venue":"SAC","pages":"573-578","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Gutierrez-GarciaG14","doi":"10.1145/2554850.2554869","ee":"https://doi.org/10.1145/2554850.2554869","url":"https://dblp.org/rec/conf/sac/Gutierrez-GarciaG14"}, "url":"URL#3935216" }, { "@score":"1", "@id":"3935217", "info":{"authors":{"author":[{"@pid":"97/9852","text":"Sara Hajian"},{"@pid":"40/1533","text":"Anna Monreale"},{"@pid":"p/DPedreschi","text":"Dino Pedreschi"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"},{"@pid":"g/FoscaGiannotti","text":"Fosca Giannotti"}]},"title":"Fair pattern discovery.","venue":"SAC","pages":"113-120","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HajianMPDG14","doi":"10.1145/2554850.2555043","ee":"https://doi.org/10.1145/2554850.2555043","url":"https://dblp.org/rec/conf/sac/HajianMPDG14"}, "url":"URL#3935217" }, { "@score":"1", "@id":"3935218", "info":{"authors":{"author":[{"@pid":"18/7553","text":"Raju Halder"},{"@pid":"27/8897","text":"Matteo Zanioli"},{"@pid":"c/ACortesi","text":"Agostino Cortesi"}]},"title":"Information leakage analysis of database query languages.","venue":"SAC","pages":"813-820","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HalderZC14","doi":"10.1145/2554850.2554862","ee":"https://doi.org/10.1145/2554850.2554862","url":"https://dblp.org/rec/conf/sac/HalderZC14"}, "url":"URL#3935218" }, { "@score":"1", "@id":"3935219", "info":{"authors":{"author":[{"@pid":"70/7032","text":"George Hamer"},{"@pid":"148/4261","text":"Jason Werpy"}]},"title":"Large scale processing of landsat data on various software platforms.","venue":"SAC","pages":"1547-1549","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HamerW14","doi":"10.1145/2554850.2555177","ee":"https://doi.org/10.1145/2554850.2555177","url":"https://dblp.org/rec/conf/sac/HamerW14"}, "url":"URL#3935219" }, { "@score":"1", "@id":"3935220", "info":{"authors":{"author":[{"@pid":"87/8972","text":"Mahamat Issa Hassan"},{"@pid":"61/4460","text":"Rami Bahsoon"}]},"title":"Green-as-a-service (GaaS) for cloud service provision operation.","venue":"SAC","pages":"1219-1220","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HassanB14","doi":"10.1145/2554850.2555182","ee":"https://doi.org/10.1145/2554850.2555182","url":"https://dblp.org/rec/conf/sac/HassanB14"}, "url":"URL#3935220" }, { "@score":"1", "@id":"3935221", "info":{"authors":{"author":[{"@pid":"37/1881","text":"Daniel Hedin"},{"@pid":"83/2504","text":"Arnar Birgisson"},{"@pid":"116/5005","text":"Luciano Bello"},{"@pid":"s/AndreiSabelfeld","text":"Andrei Sabelfeld"}]},"title":"JSFlow: tracking information flow in JavaScript and its APIs.","venue":"SAC","pages":"1663-1671","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HedinBBS14","doi":"10.1145/2554850.2554909","ee":"https://doi.org/10.1145/2554850.2554909","url":"https://dblp.org/rec/conf/sac/HedinBBS14"}, "url":"URL#3935221" }, { "@score":"1", "@id":"3935222", "info":{"authors":{"author":[{"@pid":"32/967","text":"Tales Heimfarth"},{"@pid":"139/7416","text":"João Carlos Giacomin"},{"@pid":"148/4326","text":"Alexandre Victor Fassio"},{"@pid":"148/4254","text":"João Paulo de Araujo"}]},"title":"GB-MAC: a backbone based low latency protocol for WSNs.","venue":"SAC","pages":"692-698","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HeimfarthGFA14","doi":"10.1145/2554850.2555031","ee":"https://doi.org/10.1145/2554850.2555031","url":"https://dblp.org/rec/conf/sac/HeimfarthGFA14"}, "url":"URL#3935222" }, { "@score":"1", "@id":"3935223", "info":{"authors":{"author":[{"@pid":"15/145","text":"Ludovic Henrio"},{"@pid":"138/7317","text":"Justine Rochas"}]},"title":"Declarative scheduling for active objects.","venue":"SAC","pages":"1339-1344","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HenrioR14","doi":"10.1145/2554850.2554957","ee":"https://doi.org/10.1145/2554850.2554957","url":"https://dblp.org/rec/conf/sac/HenrioR14"}, "url":"URL#3935223" }, { "@score":"1", "@id":"3935224", "info":{"authors":{"author":[{"@pid":"148/4316","text":"Jiwon Hong"},{"@pid":"53/8024","text":"Won-Seok Hwang"},{"@pid":"51/3451","text":"Jin-Hyung Kim"},{"@pid":"64/5810","text":"Sang-Wook Kim"}]},"title":"Context-aware music recommendation in mobile smart devices.","venue":"SAC","pages":"1463-1468","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HongHKK14","doi":"10.1145/2554850.2554991","ee":"https://doi.org/10.1145/2554850.2554991","url":"https://dblp.org/rec/conf/sac/HongHKK14"}, "url":"URL#3935224" }, { "@score":"1", "@id":"3935225", "info":{"authors":{"author":[{"@pid":"33/4255","text":"Hiroki Horita"},{"@pid":"89/11497","text":"Kozo Honda"},{"@pid":"95/6448","text":"Yuichi Sei"},{"@pid":"75/6845","text":"Hiroyuki Nakagawa"},{"@pid":"96/914","text":"Yasuyuki Tahara"},{"@pid":"35/2289","text":"Akihiko Ohsuga"}]},"title":"Transformation approach from KAOS goal models to BPMN models using refinement patterns.","venue":"SAC","pages":"1023-1024","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HoritaHSNTO14","doi":"10.1145/2554850.2555119","ee":"https://doi.org/10.1145/2554850.2555119","url":"https://dblp.org/rec/conf/sac/HoritaHSNTO14"}, "url":"URL#3935225" }, { "@score":"1", "@id":"3935226", "info":{"authors":{"author":[{"@pid":"52/5675","text":"Yoshihide Hosokawa"},{"@pid":"148/4432","text":"Yuichiro Nakazawa"},{"@pid":"63/7438","text":"Takanori Yamamoto"}]},"title":"Location-aware information retrieval for identifying local and distant landmark.","venue":"SAC","pages":"428-435","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HosokawaNY14","doi":"10.1145/2554850.2554974","ee":"https://doi.org/10.1145/2554850.2554974","url":"https://dblp.org/rec/conf/sac/HosokawaNY14"}, "url":"URL#3935226" }, { "@score":"1", "@id":"3935227", "info":{"authors":{"author":[{"@pid":"31/11263-4","text":"Zhongyi Hu 0004"},{"@pid":"09/3064","text":"Hongan Wang"},{"@pid":"23/5224","text":"Jiaqi Zhu"}]},"title":"The discovery of user related rare sequential patterns of topics in the internet document stream.","venue":"SAC","pages":"137-138","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuWZ14","doi":"10.1145/2554850.2555075","ee":"https://doi.org/10.1145/2554850.2555075","url":"https://dblp.org/rec/conf/sac/HuWZ14"}, "url":"URL#3935227" }, { "@score":"1", "@id":"3935228", "info":{"authors":{"author":[{"@pid":"121/2885","text":"Rubing Huang"},{"@pid":"54/4698-1","text":"Jinfu Chen 0001"},{"@pid":"46/7691","text":"Zhicheng Li"},{"@pid":"136/7321","text":"Rongcun Wang"},{"@pid":"74/1312","text":"Yansheng Lu"}]},"title":"Adaptive random prioritization for interaction test suites.","venue":"SAC","pages":"1058-1063","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuangCLWL14","doi":"10.1145/2554850.2554854","ee":"https://doi.org/10.1145/2554850.2554854","url":"https://dblp.org/rec/conf/sac/HuangCLWL14"}, "url":"URL#3935228" }, { "@score":"1", "@id":"3935229", "info":{"authors":{"author":[{"@pid":"51/5022-2","text":"Jun Huang 0002"},{"@pid":"140/7291","text":"Juan Lv"},{"@pid":"67/6644","text":"Qiang Duan"}]},"title":"Modeling and analysis on network performance for cloud service delivery with multiple paths.","venue":"SAC","pages":"667-673","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuangLD14","doi":"10.1145/2554850.2554904","ee":"https://doi.org/10.1145/2554850.2554904","url":"https://dblp.org/rec/conf/sac/HuangLD14"}, "url":"URL#3935229" }, { "@score":"1", "@id":"3935230", "info":{"authors":{"author":[{"@pid":"04/5616","text":"Hao Huang"},{"@pid":"69/1062","text":"Shinjae Yoo"},{"@pid":"148/4215","text":"Konstantine Kaznatcheev"},{"@pid":"148/4382","text":"Kevin G. Yager"},{"@pid":"47/5119","text":"Fang Lu"},{"@pid":"45/3429","text":"Dantong Yu"},{"@pid":"148/4393","text":"Oleg Gang"},{"@pid":"148/4297","text":"Andrei Fluerasu"},{"@pid":"79/627-1","text":"Hong Qin 0001"}]},"title":"Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles.","venue":"SAC","pages":"85-90","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuangYKYLYGFQ14","doi":"10.1145/2554850.2554914","ee":"https://doi.org/10.1145/2554850.2554914","url":"https://dblp.org/rec/conf/sac/HuangYKYLYGFQ14"}, "url":"URL#3935230" }, { "@score":"1", "@id":"3935231", "info":{"authors":{"author":[{"@pid":"148/4291","text":"Rosane S. Huergo"},{"@pid":"69/1904","text":"Paulo F. Pires"},{"@pid":"88/4289","text":"Flávia Coimbra Delicato"}]},"title":"A method to identify services using master data and artifact-centric modeling approach.","venue":"SAC","pages":"1225-1230","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuergoPD14","doi":"10.1145/2554850.2554973","ee":"https://doi.org/10.1145/2554850.2554973","url":"https://dblp.org/rec/conf/sac/HuergoPD14"}, "url":"URL#3935231" }, { "@score":"1", "@id":"3935232", "info":{"authors":{"author":[{"@pid":"17/6756-2","text":"Christian Hundt 0002"},{"@pid":"80/1737","text":"Bertil Schmidt"},{"@pid":"s/ElmarSchomer","text":"Elmar Schömer"},{"@pid":"g/HGottler","text":"Herbert Göttler"},{"@pid":"90/5072","text":"Hoang-Vu Dang"}]},"title":"GEM: an elastic and translation-invariant similarity measure with automatic trend adjustment.","venue":"SAC","pages":"105-112","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HundtSSGD14","doi":"10.1145/2554850.2555041","ee":"https://doi.org/10.1145/2554850.2555041","url":"https://dblp.org/rec/conf/sac/HundtSSGD14"}, "url":"URL#3935232" }, { "@score":"1", "@id":"3935233", "info":{"authors":{"author":[{"@pid":"22/4654","text":"Ronaldo Husemann"},{"@pid":"04/348","text":"Valter Roesler"}]},"title":"Introduction of a multi-layer predictive search strategy for scalable video coding.","venue":"SAC","pages":"985-986","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HusemannR14","doi":"10.1145/2554850.2555160","ee":"https://doi.org/10.1145/2554850.2555160","url":"https://dblp.org/rec/conf/sac/HusemannR14"}, "url":"URL#3935233" }, { "@score":"1", "@id":"3935234", "info":{"authors":{"author":[{"@pid":"91/6423","text":"Dino Ienco"},{"@pid":"48/1070","text":"Albert Bifet"},{"@pid":"10/140","text":"Bernhard Pfahringer"},{"@pid":"68/525","text":"Pascal Poncelet"}]},"title":"Change detection in categorical evolving data streams.","venue":"SAC","pages":"792-797","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/IencoBPP14","doi":"10.1145/2554850.2554864","ee":"https://doi.org/10.1145/2554850.2554864","url":"https://dblp.org/rec/conf/sac/IencoBPP14"}, "url":"URL#3935234" }, { "@score":"1", "@id":"3935235", "info":{"authors":{"author":[{"@pid":"84/3200","text":"Jon Iturrioz"},{"@pid":"44/6836","text":"Iker Azpeitia"},{"@pid":"16/55","text":"Oscar Díaz"}]},"title":"Generalizing the "like" button: empowering websites with monitoring capabilities.","venue":"SAC","pages":"743-750","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/IturriozAD14","doi":"10.1145/2554850.2555026","ee":"https://doi.org/10.1145/2554850.2555026","url":"https://dblp.org/rec/conf/sac/IturriozAD14"}, "url":"URL#3935235" }, { "@score":"1", "@id":"3935236", "info":{"authors":{"author":[{"@pid":"148/4315","text":"Soo Young Jang"},{"@pid":"137/7223","text":"Ajay Kumar Jha"},{"@pid":"29/3350","text":"Woo Jin Lee"}]},"title":"Virtual prototype generation by shockwave flash for simulating HW components of embedded system.","venue":"SAC","pages":"1755-1756","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JangJL14","doi":"10.1145/2554850.2559926","ee":"https://doi.org/10.1145/2554850.2559926","url":"https://dblp.org/rec/conf/sac/JangJL14"}, "url":"URL#3935236" }, { "@score":"1", "@id":"3935237", "info":{"authors":{"author":[{"@pid":"68/11497","text":"Minwoo Jang"},{"@pid":"137/7275","text":"Woochur Kim"},{"@pid":"92/4612","text":"Yookun Cho"},{"@pid":"35/2218","text":"Jiman Hong"}]},"title":"Impacts of delayed replication on the key-value store.","venue":"SAC","pages":"1757-1758","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JangKCH14","doi":"10.1145/2554850.2559927","ee":"https://doi.org/10.1145/2554850.2559927","url":"https://dblp.org/rec/conf/sac/JangKCH14"}, "url":"URL#3935237" }, { "@score":"1", "@id":"3935238", "info":{"authors":{"author":[{"@pid":"135/0519","text":"Younsik Jeong"},{"@pid":"148/4244","text":"Hwan-taek Lee"},{"@pid":"39/1718","text":"Seong-je Cho"},{"@pid":"56/5987","text":"Sangchul Han"},{"@pid":"31/1182","text":"Minkyu Park"}]},"title":"A kernel-based monitoring approach for analyzing malicious behavior on Android.","venue":"SAC","pages":"1737-1738","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JeongLCHP14","doi":"10.1145/2554850.2559915","ee":"https://doi.org/10.1145/2554850.2559915","url":"https://dblp.org/rec/conf/sac/JeongLCHP14"}, "url":"URL#3935238" }, { "@score":"1", "@id":"3935239", "info":{"authors":{"author":[{"@pid":"73/9353","text":"Jae-Hyun Jun"},{"@pid":"148/4238","text":"Cheol-Woong Ahn"},{"@pid":"04/775-1","text":"Sung-Ho Kim 0001"}]},"title":"DDoS attack detection by using packet sampling and flow features.","venue":"SAC","pages":"711-712","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JunAK14","doi":"10.1145/2554850.2555109","ee":"https://doi.org/10.1145/2554850.2555109","url":"https://dblp.org/rec/conf/sac/JunAK14"}, "url":"URL#3935239" }, { "@score":"1", "@id":"3935240", "info":{"authors":{"author":[{"@pid":"148/4333","text":"Chanju Jung"},{"@pid":"05/6068","text":"Yong-Hyuk Kim"},{"@pid":"67/6748","text":"Yourim Yoon"},{"@pid":"91/4695","text":"Byung Ro Moon"}]},"title":"Investigation of hungarian mating schemes for genetic algorithms.","venue":"SAC","pages":"140-147","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JungKYM14","doi":"10.1145/2554850.2554882","ee":"https://doi.org/10.1145/2554850.2554882","url":"https://dblp.org/rec/conf/sac/JungKYM14"}, "url":"URL#3935240" }, { "@score":"1", "@id":"3935241", "info":{"authors":{"author":[{"@pid":"137/7224","text":"Byung K. Jung"},{"@pid":"84/775","text":"Sung Y. Shin"},{"@pid":"w/WeiWang15","text":"Wei Wang 0015"},{"@pid":"58/9050","text":"Hyung Do Choi"},{"@pid":"73/5880","text":"Jeong-Ki Pack"}]},"title":"Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate.","venue":"SAC","pages":"31-32","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JungSWCP14","doi":"10.1145/2554850.2555110","ee":"https://doi.org/10.1145/2554850.2555110","url":"https://dblp.org/rec/conf/sac/JungSWCP14"}, "url":"URL#3935241" }, { "@score":"1", "@id":"3935242", "info":{"authors":{"author":[{"@pid":"143/5638","text":"Edson B. Santos Junior"},{"@pid":"48/414","text":"Rudinei Goularte"},{"@pid":"66/6266","text":"Marcelo G. Manzato"}]},"title":"Personalized collaborative filtering: a neighborhood model based on contextual constraints.","venue":"SAC","pages":"919-924","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JuniorGM14","doi":"10.1145/2554850.2555017","ee":"https://doi.org/10.1145/2554850.2555017","url":"https://dblp.org/rec/conf/sac/JuniorGM14"}, "url":"URL#3935242" }, { "@score":"1", "@id":"3935243", "info":{"authors":{"author":[{"@pid":"137/7311","text":"Byeongho Kang"},{"@pid":"39/14","text":"Eul Gyu Im"}]},"title":"Analysis of binary code topology for dynamic analysis.","venue":"SAC","pages":"1731-1732","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KangI14","doi":"10.1145/2554850.2559912","ee":"https://doi.org/10.1145/2554850.2559912","url":"https://dblp.org/rec/conf/sac/KangI14"}, "url":"URL#3935243" }, { "@score":"1", "@id":"3935244", "info":{"authors":{"author":[{"@pid":"77/4798","text":"Eun-Young Kang 0001"},{"@pid":"27/3416","text":"Pierre-Yves Schobbens"}]},"title":"Schedulability analysis support for automotive systems: from requirement to implementation.","venue":"SAC","pages":"1080-1085","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KangS14","doi":"10.1145/2554850.2554929","ee":"https://doi.org/10.1145/2554850.2554929","url":"https://dblp.org/rec/conf/sac/KangS14"}, "url":"URL#3935244" }, { "@score":"1", "@id":"3935245", "info":{"authors":{"author":[{"@pid":"28/10119","text":"Sushama Karumanchi"},{"@pid":"s/AnnaCinziaSquicciarini","text":"Anna Cinzia Squicciarini"}]},"title":"In the wild: a large scale study of web services vulnerabilities.","venue":"SAC","pages":"1239-1246","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KarumanchiS14","doi":"10.1145/2554850.2555010","ee":"https://doi.org/10.1145/2554850.2555010","url":"https://dblp.org/rec/conf/sac/KarumanchiS14"}, "url":"URL#3935245" }, { "@score":"1", "@id":"3935246", "info":{"authors":{"author":[{"@pid":"71/11366","text":"Donia El Kateb"},{"@pid":"12/10406","text":"François Fouquet"},{"@pid":"55/3058","text":"Grégory Nain"},{"@pid":"135/1302","text":"Jorge Augusto Meira"},{"@pid":"148/4216","text":"Michel Ackerman"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"Generic cloud platform multi-objective optimization leveraging models@run.time.","venue":"SAC","pages":"343-350","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KatebFNMAT14","doi":"10.1145/2554850.2555044","ee":"https://doi.org/10.1145/2554850.2555044","url":"https://dblp.org/rec/conf/sac/KatebFNMAT14"}, "url":"URL#3935246" }, { "@score":"1", "@id":"3935247", "info":{"authors":{"author":[{"@pid":"22/8878","text":"Ferdaus Ahmed Kawsar"},{"@pid":"a/SheikhIqbalAhamed","text":"Sheikh Iqbal Ahamed"},{"@pid":"35/344","text":"Richard Love"}]},"title":"Smartphone based multimodal activity detection system using plantar pressure sensors.","venue":"SAC","pages":"468-469","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KawsarAL14","doi":"10.1145/2554850.2555156","ee":"https://doi.org/10.1145/2554850.2555156","url":"https://dblp.org/rec/conf/sac/KawsarAL14"}, "url":"URL#3935247" }, { "@score":"1", "@id":"3935248", "info":{"authors":{"author":{"@pid":"144/8314","text":"Murad Khan"}},"title":"Student research abstract: an optimized handover scheme based on media independent handover standard IEEE 802.21.","venue":"SAC","pages":"717-718","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Khan14","doi":"10.1145/2554850.2555183","ee":"https://doi.org/10.1145/2554850.2555183","url":"https://dblp.org/rec/conf/sac/Khan14"}, "url":"URL#3935248" }, { "@score":"1", "@id":"3935249", "info":{"authors":{"author":[{"@pid":"01/6916","text":"Paul Kim"},{"@pid":"41/5288","text":"Sangwook Kim"}]},"title":"A detection of overlapping community in mobile social network.","venue":"SAC","pages":"175-179","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KimK14","doi":"10.1145/2554850.2554999","ee":"https://doi.org/10.1145/2554850.2554999","url":"https://dblp.org/rec/conf/sac/KimK14"}, "url":"URL#3935249" }, { "@score":"1", "@id":"3935250", "info":{"authors":{"author":[{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"70/1400","text":"Ki-Nam Kim"},{"@pid":"61/1986","text":"Seok-Ho Yoon"},{"@pid":"19/6392","text":"Sunju Park"}]},"title":"Sampling in online social networks.","venue":"SAC","pages":"845-849","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KimKYP14","doi":"10.1145/2554850.2554907","ee":"https://doi.org/10.1145/2554850.2554907","url":"https://dblp.org/rec/conf/sac/KimKYP14"}, "url":"URL#3935250" }, { "@score":"1", "@id":"3935251", "info":{"authors":{"author":[{"@pid":"137/2552","text":"Jungil Kim"},{"@pid":"16/381","text":"Eunjoo Lee"}]},"title":"The effect of IMPORT change in software change history.","venue":"SAC","pages":"1753-1754","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KimL14","doi":"10.1145/2554850.2559925","ee":"https://doi.org/10.1145/2554850.2559925","url":"https://dblp.org/rec/conf/sac/KimL14"}, "url":"URL#3935251" }, { "@score":"1", "@id":"3935252", "info":{"authors":{"author":[{"@pid":"16/9611-2","text":"Dong-Jin Kim 0002"},{"@pid":"51/3819","text":"Sang-Chul Lee"},{"@pid":"148/4289","text":"Ho-Yong Son"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"20/3801","text":"Jae Bum Lee"}]},"title":"C-Rank: a contribution-based web page ranking approach.","venue":"SAC","pages":"908-912","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KimLSKL14","doi":"10.1145/2554850.2554910","ee":"https://doi.org/10.1145/2554850.2554910","url":"https://dblp.org/rec/conf/sac/KimLSKL14"}, "url":"URL#3935252" }, { "@score":"1", "@id":"3935253", "info":{"authors":{"author":[{"@pid":"145/7714","text":"Andrew Kinai"},{"@pid":"145/7696","text":"Reginald E. Bryant"},{"@pid":"123/6527","text":"Aisha Walcott-Bryant"},{"@pid":"94/9596","text":"Eric Mibuari"},{"@pid":"61/5240","text":"Komminist Weldemariam"},{"@pid":"32/843","text":"Osamuyimen Stewart"}]},"title":"Traffic 411: a traffic congestion routing and awareness platform for Nairobi.","venue":"SAC","pages":"1475-1476","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KinaiBWMWS14","doi":"10.1145/2554850.2555148","ee":"https://doi.org/10.1145/2554850.2555148","url":"https://dblp.org/rec/conf/sac/KinaiBWMWS14"}, "url":"URL#3935253" }, { "@score":"1", "@id":"3935254", "info":{"authors":{"author":[{"@pid":"148/4300","text":"Markus Kleffmann"},{"@pid":"00/3973","text":"Matthias Book"},{"@pid":"22/8645","text":"Erik Hebisch"},{"@pid":"g/VolkerGruhn","text":"Volker Gruhn"}]},"title":"Automated versioning and temporal navigation for model sketches on large interactive displays.","venue":"SAC","pages":"161-168","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KleffmannBHG14","doi":"10.1145/2554850.2563668","ee":"https://doi.org/10.1145/2554850.2563668","url":"https://dblp.org/rec/conf/sac/KleffmannBHG14"}, "url":"URL#3935254" }, { "@score":"1", "@id":"3935255", "info":{"authors":{"author":[{"@pid":"10/11427","text":"Augusto Klinger"},{"@pid":"310/0438","text":"Guilherme L. de Lima"},{"@pid":"04/348","text":"Valter Roesler"},{"@pid":"148/4410","text":"G. Maron"},{"@pid":"310/0076","text":"Guilherme Longoni"},{"@pid":"148/4367","text":"V. Goulart"},{"@pid":"148/4336","text":"F. S. dos Santos"},{"@pid":"148/4360","text":"M. D. Ferreira"},{"@pid":"148/4383","text":"M. B. Mariano"}]},"title":"A low cost digital operating room.","venue":"SAC","pages":"36-37","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KlingerLRMLGSFM14","doi":"10.1145/2554850.2555137","ee":"https://doi.org/10.1145/2554850.2555137","url":"https://dblp.org/rec/conf/sac/KlingerLRMLGSFM14"}, "url":"URL#3935255" }, { "@score":"1", "@id":"3935256", "info":{"authors":{"author":[{"@pid":"k/MatthiasKlusch","text":"Matthias Klusch"},{"@pid":"148/4299","text":"Ankush Prabhu Meshram"},{"@pid":"57/5568","text":"Patrick Kapahnke"},{"@pid":"65/8907","text":"Andreas Schütze"}]},"title":"ICM-Wind: semantics-empowered fluid condition monitoring of wind turbines.","venue":"SAC","pages":"308-315","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KluschMKS14","doi":"10.1145/2554850.2554928","ee":"https://doi.org/10.1145/2554850.2554928","url":"https://dblp.org/rec/conf/sac/KluschMKS14"}, "url":"URL#3935256" }, { "@score":"1", "@id":"3935257", "info":{"authors":{"author":[{"@pid":"03/7977","text":"Jens Kolb"},{"@pid":"43/5128-2","text":"Michael Zimoch"},{"@pid":"96/2864","text":"Barbara Weber"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"How social distance of process designers affects the process of process modeling: insights from a controlled experiment.","venue":"SAC","pages":"1364-1370","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KolbZWR14","doi":"10.1145/2554850.2554940","ee":"https://doi.org/10.1145/2554850.2554940","url":"https://dblp.org/rec/conf/sac/KolbZWR14"}, "url":"URL#3935257" }, { "@score":"1", "@id":"3935258", "info":{"authors":{"author":[{"@pid":"148/4250","text":"Dhouha Krichen"},{"@pid":"97/7380","text":"Walid Abdallah"},{"@pid":"28/3198","text":"Noureddine Boudriga"}]},"title":"WSN-based flutter control application for aircraft wings structural health monitoring.","venue":"SAC","pages":"680-685","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KrichenAB14","doi":"10.1145/2554850.2554960","ee":"https://doi.org/10.1145/2554850.2554960","url":"https://dblp.org/rec/conf/sac/KrichenAB14"}, "url":"URL#3935258" }, { "@score":"1", "@id":"3935259", "info":{"authors":{"author":[{"@pid":"05/10588","text":"Filip Krikava"},{"@pid":"84/1967","text":"Philippe Collet"},{"@pid":"f/RBFrance","text":"Robert B. France"}]},"title":"ACTRESS: domain-specific modeling of self-adaptive software architectures.","venue":"SAC","pages":"391-398","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KrikavaCF14","doi":"10.1145/2554850.2555020","ee":"https://doi.org/10.1145/2554850.2555020","url":"https://dblp.org/rec/conf/sac/KrikavaCF14"}, "url":"URL#3935259" }, { "@score":"1", "@id":"3935260", "info":{"authors":{"author":[{"@pid":"05/10588","text":"Filip Krikava"},{"@pid":"84/1967","text":"Philippe Collet"},{"@pid":"f/RBFrance","text":"Robert B. France"}]},"title":"Manipulating models using internal domain-specific languages.","venue":"SAC","pages":"1612-1614","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KrikavaCF14a","doi":"10.1145/2554850.2555127","ee":"https://doi.org/10.1145/2554850.2555127","url":"https://dblp.org/rec/conf/sac/KrikavaCF14a"}, "url":"URL#3935260" }, { "@score":"1", "@id":"3935261", "info":{"authors":{"author":[{"@pid":"k/evaKuhn","text":"Eva Kühn"},{"@pid":"48/7399","text":"Stefan Craß"},{"@pid":"119/7849","text":"Gerson Joskowicz"},{"@pid":"59/2526","text":"Martin Novak"}]},"title":"Flexible modeling of policy-driven upstream notification strategies.","venue":"SAC","pages":"1352-1354","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KuhnCJN14","doi":"10.1145/2554850.2555153","ee":"https://doi.org/10.1145/2554850.2555153","url":"https://dblp.org/rec/conf/sac/KuhnCJN14"}, "url":"URL#3935261" }, { "@score":"1", "@id":"3935262", "info":{"authors":{"author":[{"@pid":"08/1305","text":"Izuru Kume"},{"@pid":"22/6397","text":"Naoya Nitta"},{"@pid":"71/2858","text":"Masahide Nakamura"},{"@pid":"65/6279","text":"Etsuya Shibayama"}]},"title":"A dynamic analysis technique to extract symptoms that suggest side effects in framework applications.","venue":"SAC","pages":"1176-1178","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KumeNNS14","doi":"10.1145/2554850.2555123","ee":"https://doi.org/10.1145/2554850.2555123","url":"https://dblp.org/rec/conf/sac/KumeNNS14"}, "url":"URL#3935262" }, { "@score":"1", "@id":"3935263", "info":{"authors":{"author":[{"@pid":"88/663","text":"Chin-Fu Kuo"},{"@pid":"89/1349","text":"Hsueh-Wen Tseng"}]},"title":"Delay-based incrementally mapping of virtual machines in cloud computing systems.","venue":"SAC","pages":"1498-1503","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KuoT14","doi":"10.1145/2554850.2554937","ee":"https://doi.org/10.1145/2554850.2554937","url":"https://dblp.org/rec/conf/sac/KuoT14"}, "url":"URL#3935263" }, { "@score":"1", "@id":"3935264", "info":{"authors":{"author":[{"@pid":"148/4296","text":"Young Chun Kwon"},{"@pid":"18/1746","text":"Nakhoon Baek"}]},"title":"A CUDA-based implementation of OpenGL-compatible rasterization library prototype.","venue":"SAC","pages":"1747-1748","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KwonB14","doi":"10.1145/2554850.2559922","ee":"https://doi.org/10.1145/2554850.2559922","url":"https://dblp.org/rec/conf/sac/KwonB14"}, "url":"URL#3935264" }, { "@score":"1", "@id":"3935265", "info":{"authors":{"author":[{"@pid":"148/4416","text":"Wadha Labda"},{"@pid":"76/4047","text":"Nikolay Mehandjiev"},{"@pid":"s/PedroRFalconeSampaio","text":"Pedro Sampaio 0001"}]},"title":"Modeling of privacy-aware business processes in BPMN to protect personal data.","venue":"SAC","pages":"1399-1405","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LabdaMS14","doi":"10.1145/2554850.2555014","ee":"https://doi.org/10.1145/2554850.2555014","url":"https://dblp.org/rec/conf/sac/LabdaMS14"}, "url":"URL#3935265" }, { "@score":"1", "@id":"3935266", "info":{"authors":{"author":[{"@pid":"74/2518","text":"Thomas Largillier"},{"@pid":"15/8024","text":"Guillaume Peyronnet"},{"@pid":"57/4467","text":"Sylvain Peyronnet"}]},"title":"Rocovo: robust communal publication scheme.","venue":"SAC","pages":"579-586","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LargillierPP14","doi":"10.1145/2554850.2554889","ee":"https://doi.org/10.1145/2554850.2554889","url":"https://dblp.org/rec/conf/sac/LargillierPP14"}, "url":"URL#3935266" }, { "@score":"1", "@id":"3935267", "info":{"authors":{"author":[{"@pid":"129/2209","text":"Yoann Laurent"},{"@pid":"77/6354","text":"Reda Bendraou"},{"@pid":"76/2574","text":"Souheib Baarir"},{"@pid":"76/3583","text":"Marie-Pierre Gervais"}]},"title":"Planning for declarative processes.","venue":"SAC","pages":"1126-1133","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LaurentBBG14","doi":"10.1145/2554850.2554998","ee":"https://doi.org/10.1145/2554850.2554998","url":"https://dblp.org/rec/conf/sac/LaurentBBG14"}, "url":"URL#3935267" }, { "@score":"1", "@id":"3935268", "info":{"authors":{"author":{"@pid":"123/3386","text":"Chung Le"}},"title":"A model driven framework for modeling and composing service based Android applications.","venue":"SAC","pages":"450-457","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Le14","doi":"10.1145/2554850.2555037","ee":"https://doi.org/10.1145/2554850.2555037","url":"https://dblp.org/rec/conf/sac/Le14"}, "url":"URL#3935268" }, { "@score":"1", "@id":"3935269", "info":{"authors":{"author":[{"@pid":"37/8174","text":"Eunji Lee"},{"@pid":"116/9590","text":"Jee-Eun Jang"},{"@pid":"36/1121","text":"Hyokyung Bahn"}]},"title":"DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory.","venue":"SAC","pages":"1535-1540","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LeeJB14","doi":"10.1145/2554850.2555032","ee":"https://doi.org/10.1145/2554850.2555032","url":"https://dblp.org/rec/conf/sac/LeeJB14"}, "url":"URL#3935269" }, { "@score":"1", "@id":"3935270", "info":{"authors":{"author":[{"@pid":"92/2068","text":"Junghoon Lee"},{"@pid":"91/1668","text":"Gyung-Leen Park"},{"@pid":"148/4332","text":"Jihyun Kang"},{"@pid":"148/4406","text":"Naram Ham"}]},"title":"Per-cluster allocation of relocation staff on electric vehicle sharing systems.","venue":"SAC","pages":"1541-1542","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LeePKH14","doi":"10.1145/2554850.2555077","ee":"https://doi.org/10.1145/2554850.2555077","url":"https://dblp.org/rec/conf/sac/LeePKH14"}, "url":"URL#3935270" }, { "@score":"1", "@id":"3935271", "info":{"authors":{"author":[{"@pid":"17/2703-6","text":"Jie Li 0006"},{"@pid":"67/8175","text":"Zhao-Peng Meng"},{"@pid":"29/177-1","text":"Kang Zhang 0001"}]},"title":"Visualization of oceanographic applications using a common data model.","venue":"SAC","pages":"933-938","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiMZ14","doi":"10.1145/2554850.2554859","ee":"https://doi.org/10.1145/2554850.2554859","url":"https://dblp.org/rec/conf/sac/LiMZ14"}, "url":"URL#3935271" }, { "@score":"1", "@id":"3935272", "info":{"authors":{"author":[{"@pid":"37/4190","text":"Yang Li"},{"@pid":"80/4686","text":"Ying Sha"},{"@pid":"130/9997","text":"Jixi Shan"},{"@pid":"34/2005","text":"Bo Jiang"},{"@pid":"45/5247-4","text":"Jianjun Wu 0004"}]},"title":"Preventing the diffusion of negative information based on local influence tree.","venue":"SAC","pages":"650-652","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiSSJW14","doi":"10.1145/2554850.2555141","ee":"https://doi.org/10.1145/2554850.2555141","url":"https://dblp.org/rec/conf/sac/LiSSJW14"}, "url":"URL#3935272" }, { "@score":"1", "@id":"3935273", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Single multiplicatively updated matrix factorization for co-clustering.","venue":"SAC","pages":"97-104","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiW14","doi":"10.1145/2554850.2554979","ee":"https://doi.org/10.1145/2554850.2554979","url":"https://dblp.org/rec/conf/sac/LiW14"}, "url":"URL#3935273" }, { "@score":"1", "@id":"3935274", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"}]},"title":"Online learning with mobile sensor data for user recognition.","venue":"SAC","pages":"64-70","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiWL14","doi":"10.1145/2554850.2554877","ee":"https://doi.org/10.1145/2554850.2554877","url":"https://dblp.org/rec/conf/sac/LiWL14"}, "url":"URL#3935274" }, { "@score":"1", "@id":"3935275", "info":{"authors":{"author":[{"@pid":"16/2337","text":"Yi-Wen Lin"},{"@pid":"14/1709","text":"En Tzu Wang"},{"@pid":"04/2262","text":"Chieh-Feng Chiang"},{"@pid":"c/ALPChen","text":"Arbee L. P. Chen"}]},"title":"Finding targets with the nearest favor neighbor and farthest disfavor neighbor by a skyline query.","venue":"SAC","pages":"821-826","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LinWCC14","doi":"10.1145/2554850.2554863","ee":"https://doi.org/10.1145/2554850.2554863","url":"https://dblp.org/rec/conf/sac/LinWCC14"}, "url":"URL#3935275" }, { "@score":"1", "@id":"3935276", "info":{"authors":{"author":[{"@pid":"130/2288","text":"Chenyang Liu"},{"@pid":"50/2102-1","text":"Jian Cao 0001"},{"@pid":"m/FLeMouel","text":"Frédéric Le Mouël"}]},"title":"A low-latency service composition approach in mobile ad hoc networks.","venue":"SAC","pages":"509-511","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiuCM14","doi":"10.1145/2554850.2555116","ee":"https://doi.org/10.1145/2554850.2555116","url":"https://dblp.org/rec/conf/sac/LiuCM14"}, "url":"URL#3935276" }, { "@score":"1", "@id":"3935277", "info":{"authors":{"author":[{"@pid":"52/5150-2","text":"Ting Liu 0002"},{"@pid":"133/3871","text":"Yuhong Gui"},{"@pid":"44/8711-2","text":"Yanan Sun 0002"},{"@pid":"51/3710-90","text":"Yang Liu 0090"},{"@pid":"62/6846","text":"Yao Sun"},{"@pid":"71/1116","text":"Feng Xiao"}]},"title":"SEDE: state estimation-based dynamic encryption scheme for smart grid communication.","venue":"SAC","pages":"539-544","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiuGSLSX14","doi":"10.1145/2554850.2555033","ee":"https://doi.org/10.1145/2554850.2555033","url":"https://dblp.org/rec/conf/sac/LiuGSLSX14"}, "url":"URL#3935277" }, { "@score":"1", "@id":"3935278", "info":{"authors":{"author":[{"@pid":"l/JNKLiu","text":"James N. K. Liu"},{"@pid":"148/4277","text":"Zongnong Meng"},{"@pid":"94/10113","text":"Yan-Xing Hu"},{"@pid":"38/5213","text":"Yu-Lin He"},{"@pid":"s/SimonCKShiu","text":"Simon C. K. Shiu"},{"@pid":"76/2262","text":"Vincent W. S. Cho"}]},"title":"A hybrid algorithm for recommendation twitter peers.","venue":"SAC","pages":"644-649","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiuMHHSC14","doi":"10.1145/2554850.2555138","ee":"https://doi.org/10.1145/2554850.2555138","url":"https://dblp.org/rec/conf/sac/LiuMHHSC14"}, "url":"URL#3935278" }, { "@score":"1", "@id":"3935279", "info":{"authors":{"author":[{"@pid":"80/8403","text":"Kaiping Liu"},{"@pid":"33/5488","text":"Hee Beng Kuan Tan"},{"@pid":"29/2726-2","text":"Hongyu Zhang 0002"}]},"title":"Mining key and referential constraints enforcement patterns.","venue":"SAC","pages":"850-854","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiuTZ14","doi":"10.1145/2554850.2554919","ee":"https://doi.org/10.1145/2554850.2554919","url":"https://dblp.org/rec/conf/sac/LiuTZ14"}, "url":"URL#3935279" }, { "@score":"1", "@id":"3935280", "info":{"authors":{"author":[{"@pid":"53/5946","text":"Shi-Wu Lo"},{"@pid":"30/11433","text":"Bo-Hong Chen"},{"@pid":"21/2751","text":"Yu-Wei Chen"},{"@pid":"148/4431","text":"Tzu-Chieh Shen"},{"@pid":"04/10480","text":"You-Ching Lin"}]},"title":"ICAP, a new flash wear-leveling algorithm inspired by locality.","venue":"SAC","pages":"1478-1483","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LoCCSL14","doi":"10.1145/2554850.2554871","ee":"https://doi.org/10.1145/2554850.2554871","url":"https://dblp.org/rec/conf/sac/LoCCSL14"}, "url":"URL#3935280" }, { "@score":"1", "@id":"3935281", "info":{"authors":{"author":[{"@pid":"98/2115","text":"Edgar Galván López"},{"@pid":"42/4366","text":"Adam Taylor"},{"@pid":"c/SClarke","text":"Siobhán Clarke"},{"@pid":"c/VCahill","text":"Vinny Cahill"}]},"title":"Design of an automatic demand-side management system based on evolutionary algorithms.","venue":"SAC","pages":"525-530","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LopezTCC14","doi":"10.1145/2554850.2554959","ee":"https://doi.org/10.1145/2554850.2554959","url":"https://dblp.org/rec/conf/sac/LopezTCC14"}, "url":"URL#3935281" }, { "@score":"1", "@id":"3935282", "info":{"authors":{"author":[{"@pid":"l/FredericLoulergue","text":"Frédéric Loulergue"},{"@pid":"145/9554","text":"Simon Robillard"},{"@pid":"42/3636","text":"Julien Tesson"},{"@pid":"12/6865","text":"Joeffrey Legaux"},{"@pid":"24/5199","text":"Zhenjiang Hu"}]},"title":"Formal derivation and extraction of a parallel program for the all nearest smaller values problem.","venue":"SAC","pages":"1577-1584","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LoulergueRTLH14","doi":"10.1145/2554850.2554912","ee":"https://doi.org/10.1145/2554850.2554912","url":"https://dblp.org/rec/conf/sac/LoulergueRTLH14"}, "url":"URL#3935282" }, { "@score":"1", "@id":"3935283", "info":{"authors":{"author":[{"@pid":"l/RainerLutz","text":"Rainer Lutz 0001"},{"@pid":"47/7929-1","text":"Sascha Schäfer 0001"},{"@pid":"d/StephanDiehl1","text":"Stephan Diehl 0001"}]},"title":"Are smartphones better than CRC cards?","venue":"SAC","pages":"987-994","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Lutz0D14","doi":"10.1145/2554850.2554852","ee":"https://doi.org/10.1145/2554850.2554852","url":"https://dblp.org/rec/conf/sac/Lutz0D14"}, "url":"URL#3935283" }, { "@score":"1", "@id":"3935284", "info":{"authors":{"author":[{"@pid":"20/6534-3","text":"Lei Ma 0003"},{"@pid":"21/6330","text":"Cyrille Artho"},{"@pid":"68/5837","text":"Hiroyuki Sato"}]},"title":"Project centralization based on graph coloring.","venue":"SAC","pages":"1086-1093","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MaAS14","doi":"10.1145/2554850.2554930","ee":"https://doi.org/10.1145/2554850.2554930","url":"https://dblp.org/rec/conf/sac/MaAS14"}, "url":"URL#3935284" }, { "@score":"1", "@id":"3935285", "info":{"authors":{"author":[{"@pid":"07/4142","text":"Yutao Ma"},{"@pid":"56/1428","text":"Yang Wu"},{"@pid":"32/4373","text":"Youwei Xu"}]},"title":"Dynamics of open-source software developer's commit behavior: an empirical investigation of subversion.","venue":"SAC","pages":"1171-1173","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MaWX14","doi":"10.1145/2554850.2555079","ee":"https://doi.org/10.1145/2554850.2555079","url":"https://dblp.org/rec/conf/sac/MaWX14"}, "url":"URL#3935285" }, { "@score":"1", "@id":"3935286", "info":{"authors":{"author":{"@pid":"129/2330","text":"A. K. M. Jahangir Alam Majumder"}},"title":"A real-time smartphone- and smartshoe-based fall prevention system.","venue":"SAC","pages":"470-471","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Majumder14","doi":"10.1145/2554850.2555191","ee":"https://doi.org/10.1145/2554850.2555191","url":"https://dblp.org/rec/conf/sac/Majumder14"}, "url":"URL#3935286" }, { "@score":"1", "@id":"3935287", "info":{"authors":{"author":[{"@pid":"148/4227","text":"Alexandre Michetti Manduca"},{"@pid":"m/EthanVMunson","text":"Ethan V. Munson"},{"@pid":"48/6369","text":"Renata P. M. Fortes"},{"@pid":"18/2858","text":"Maria da Graça Campos Pimentel"}]},"title":"A nonintrusive approach for implementing single database, multitenant services from web applications.","venue":"SAC","pages":"751-756","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ManducaMFP14","doi":"10.1145/2554850.2555072","ee":"https://doi.org/10.1145/2554850.2555072","url":"https://dblp.org/rec/conf/sac/ManducaMFP14"}, "url":"URL#3935287" }, { "@score":"1", "@id":"3935288", "info":{"authors":{"author":[{"@pid":"65/1595","text":"Laci Mary Barbosa Manhães"},{"@pid":"65/591","text":"Sérgio Manuel Serra da Cruz"},{"@pid":"z/GZimbrao","text":"Geraldo Zimbrão"}]},"title":"WAVE: an architecture for predicting dropout in undergraduate courses using EDM.","venue":"SAC","pages":"243-247","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ManhaesCZ14","doi":"10.1145/2554850.2555135","ee":"https://doi.org/10.1145/2554850.2555135","url":"https://dblp.org/rec/conf/sac/ManhaesCZ14"}, "url":"URL#3935288" }, { "@score":"1", "@id":"3935289", "info":{"authors":{"author":[{"@pid":"117/0782","text":"Hélène Martorell"},{"@pid":"88/846","text":"Jean-Charles Fabre"},{"@pid":"55/6925","text":"Matthieu Roy"},{"@pid":"141/6297","text":"Régis Valentin"}]},"title":"Improving adaptiveness of AUTOSAR embedded applications.","venue":"SAC","pages":"384-390","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MartorellFRV14","doi":"10.1145/2554850.2554965","ee":"https://doi.org/10.1145/2554850.2554965","url":"https://dblp.org/rec/conf/sac/MartorellFRV14"}, "url":"URL#3935289" }, { "@score":"1", "@id":"3935290", "info":{"authors":{"author":[{"@pid":"06/6499","text":"Rivalino Matias"},{"@pid":"148/4400","text":"Marcela Prince"},{"@pid":"51/9721","text":"Lucio Borges de Araujo"},{"@pid":"148/4348","text":"Claudio Sousa"},{"@pid":"148/4440","text":"Luan Henrique"}]},"title":"An empirical exploratory study on operating system reliability.","venue":"SAC","pages":"1523-1528","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MatiasPASH14","doi":"10.1145/2554850.2555021","ee":"https://doi.org/10.1145/2554850.2555021","url":"https://dblp.org/rec/conf/sac/MatiasPASH14"}, "url":"URL#3935290" }, { "@score":"1", "@id":"3935291", "info":{"authors":{"author":[{"@pid":"23/8082","text":"Johan Mazel"},{"@pid":"13/7972","text":"Romain Fontugne"},{"@pid":"66/1199","text":"Kensuke Fukuda"}]},"title":"Visual comparison of network anomaly detectors with chord diagrams.","venue":"SAC","pages":"473-480","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MazelFF14","doi":"10.1145/2554850.2554886","ee":"https://doi.org/10.1145/2554850.2554886","url":"https://dblp.org/rec/conf/sac/MazelFF14"}, "url":"URL#3935291" }, { "@score":"1", "@id":"3935292", "info":{"authors":{"author":[{"@pid":"133/0929","text":"Muntazir Mehdi"},{"@pid":"04/7095","text":"Aftab Iqbal"},{"@pid":"121/2635","text":"Ali Hasnain"},{"@pid":"117/4141","text":"Yasar Khan"},{"@pid":"d/StefanDecker","text":"Stefan Decker"},{"@pid":"05/4939","text":"Ratnesh Sahay"}]},"title":"Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case.","venue":"SAC","pages":"333-335","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MehdiIHKDS14","doi":"10.1145/2554850.2555146","ee":"https://doi.org/10.1145/2554850.2555146","url":"https://dblp.org/rec/conf/sac/MehdiIHKDS14"}, "url":"URL#3935292" }, { "@score":"1", "@id":"3935293", "info":{"authors":{"author":[{"@pid":"146/1188","text":"Yuxin Meng 0001"},{"@pid":"85/5606","text":"Duncan S. Wong"},{"@pid":"74/1108","text":"Lam-for Kwok"}]},"title":"Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones.","venue":"SAC","pages":"1680-1687","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MengWK14","doi":"10.1145/2554850.2554931","ee":"https://doi.org/10.1145/2554850.2554931","url":"https://dblp.org/rec/conf/sac/MengWK14"}, "url":"URL#3935293" }, { "@score":"1", "@id":"3935294", "info":{"authors":{"author":[{"@pid":"66/10119","text":"Amin Mesmoudi"},{"@pid":"h/MohandSaidHacid","text":"Mohand-Said Hacid"}]},"title":"A test framework for large scale declarative queries: preliminary results.","venue":"SAC","pages":"858-859","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MesmoudiH14","doi":"10.1145/2554850.2555102","ee":"https://doi.org/10.1145/2554850.2555102","url":"https://dblp.org/rec/conf/sac/MesmoudiH14"}, "url":"URL#3935294" }, { "@score":"1", "@id":"3935295", "info":{"authors":{"author":[{"@pid":"61/9580","text":"Madalina Mitran"},{"@pid":"c/GCabanac","text":"Guillaume Cabanac"},{"@pid":"b/MBoughanem","text":"Mohand Boughanem"}]},"title":"GeoTime-based tag ranking model for automatic image annotation.","venue":"SAC","pages":"896-901","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MitranCB14","doi":"10.1145/2554850.2554866","ee":"https://doi.org/10.1145/2554850.2554866","url":"https://dblp.org/rec/conf/sac/MitranCB14"}, "url":"URL#3935295" }, { "@score":"1", "@id":"3935296", "info":{"authors":{"author":{"@pid":"93/8821","text":"Afshin Moin"}},"title":"A unified approach to collaborative data visualization.","venue":"SAC","pages":"280-286","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Moin14","doi":"10.1145/2554850.2555035","ee":"https://doi.org/10.1145/2554850.2555035","url":"https://dblp.org/rec/conf/sac/Moin14"}, "url":"URL#3935296" }, { "@score":"1", "@id":"3935297", "info":{"authors":{"author":[{"@pid":"125/0343","text":"Thomas Molka"},{"@pid":"53/6065","text":"David Redlich"},{"@pid":"02/66","text":"Marc Drobek"},{"@pid":"30/4231","text":"Artur Caetano"},{"@pid":"54/1035","text":"Xiao-Jun Zeng"},{"@pid":"99/2575","text":"Wasif Gilani"}]},"title":"Conformance checking for BPMN-based process models.","venue":"SAC","pages":"1406-1413","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MolkaRDCZG14","doi":"10.1145/2554850.2555061","ee":"https://doi.org/10.1145/2554850.2555061","url":"https://dblp.org/rec/conf/sac/MolkaRDCZG14"}, "url":"URL#3935297" }, { "@score":"1", "@id":"3935298", "info":{"authors":{"author":[{"@pid":"72/7538","text":"Hae-Min Moon"},{"@pid":"147/0543","text":"Kyeong-Ri Ko"},{"@pid":"21/5594","text":"Juhyun Shin"},{"@pid":"28/2638","text":"Sung Bum Pan"}]},"title":"A novel double linear-cubic convolution interpolation for digital image scaling.","venue":"SAC","pages":"1733-1734","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MoonKSP14","doi":"10.1145/2554850.2559913","ee":"https://doi.org/10.1145/2554850.2559913","url":"https://dblp.org/rec/conf/sac/MoonKSP14"}, "url":"URL#3935298" }, { "@score":"1", "@id":"3935299", "info":{"authors":{"author":[{"@pid":"148/4396","text":"Chun Yong Moon"},{"@pid":"148/4424","text":"Manjula Pilaka"},{"@pid":"20/11","text":"Hye-young Paik"},{"@pid":"s/JohnShepherd","text":"John Shepherd 0001"}]},"title":"Improved named entity recognition: patterns in columns model (PCM).","venue":"SAC","pages":"927-928","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MoonPPS14","doi":"10.1145/2554850.2555094","ee":"https://doi.org/10.1145/2554850.2555094","url":"https://dblp.org/rec/conf/sac/MoonPPS14"}, "url":"URL#3935299" }, { "@score":"1", "@id":"3935300", "info":{"authors":{"author":[{"@pid":"22/128","text":"Antonio Miguel Mora"},{"@pid":"132/5135","text":"Paloma de las Cuevas"},{"@pid":"m/JJMereloGuervos","text":"Juan Julián Merelo Guervós"},{"@pid":"148/1079","text":"Sergio Zamarripa"},{"@pid":"148/4325","text":"M. Juan"},{"@pid":"14/3715","text":"Anna Isabel Esparcia-Alcázar"},{"@pid":"148/4395","text":"M. Burvall"},{"@pid":"148/4327","text":"H. Arfwedson"},{"@pid":"148/4306","text":"Z. Hodaie"}]},"title":"MUSES: a corporate user-centric system which applies computational intelligence methods.","venue":"SAC","pages":"1719-1723","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MoraCGZJEBAH14","doi":"10.1145/2554850.2555059","ee":"https://doi.org/10.1145/2554850.2555059","url":"https://dblp.org/rec/conf/sac/MoraCGZJEBAH14"}, "url":"URL#3935300" }, { "@score":"1", "@id":"3935301", "info":{"authors":{"author":{"@pid":"147/1339","text":"Rafael Perazzo Barbosa Mota"}},"title":"Student research abstract: mechanisms to ensure quality of service for the internet of things.","venue":"SAC","pages":"713-714","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Mota14","doi":"10.1145/2554850.2555189","ee":"https://doi.org/10.1145/2554850.2555189","url":"https://dblp.org/rec/conf/sac/Mota14"}, "url":"URL#3935301" }, { "@score":"1", "@id":"3935302", "info":{"authors":{"author":[{"@pid":"147/1339","text":"Rafael Perazzo Barbosa Mota"},{"@pid":"20/833","text":"Daniel M. Batista"}]},"title":"A dynamic frame slotted ALOHA anti-collision algorithm for the internet of things.","venue":"SAC","pages":"686-691","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MotaB14","doi":"10.1145/2554850.2555003","ee":"https://doi.org/10.1145/2554850.2555003","url":"https://dblp.org/rec/conf/sac/MotaB14"}, "url":"URL#3935302" }, { "@score":"1", "@id":"3935303", "info":{"authors":{"author":[{"@pid":"132/9390","text":"Danny Munera"},{"@pid":"d/DDiaz","text":"Daniel Diaz 0001"},{"@pid":"51/611","text":"Salvador Abreu"},{"@pid":"37/5371","text":"Philippe Codognet"}]},"title":"Flexible cooperation in parallel local search.","venue":"SAC","pages":"1360-1361","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MuneraDAC14","doi":"10.1145/2554850.2555140","ee":"https://doi.org/10.1145/2554850.2555140","url":"https://dblp.org/rec/conf/sac/MuneraDAC14"}, "url":"URL#3935303" }, { "@score":"1", "@id":"3935304", "info":{"authors":{"author":[{"@pid":"127/7495","text":"Saleena Nabeezath"},{"@pid":"126/5153","text":"Vineeth Paleri"}]},"title":"Global value numbering for redundancy detection: a simple and efficient algorithm.","venue":"SAC","pages":"1609-1611","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NabeezathP14","doi":"10.1145/2554850.2555120","ee":"https://doi.org/10.1145/2554850.2555120","url":"https://dblp.org/rec/conf/sac/NabeezathP14"}, "url":"URL#3935304" }, { "@score":"1", "@id":"3935305", "info":{"authors":{"author":[{"@pid":"65/3565","text":"Thanh Duc Ngo"},{"@pid":"118/4844","text":"Sang Phan"},{"@pid":"48/4683","text":"Duy-Dinh Le"},{"@pid":"50/290","text":"Shin'ichi Satoh 0001"}]},"title":"Recommend-Me: recommending query regions for image search.","venue":"SAC","pages":"913-918","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NgoPLS14","doi":"10.1145/2554850.2555005","ee":"https://doi.org/10.1145/2554850.2555005","url":"https://dblp.org/rec/conf/sac/NgoPLS14"}, "url":"URL#3935305" }, { "@score":"1", "@id":"3935306", "info":{"authors":{"author":[{"@pid":"148/4340","text":"Minh Chau Nguyen"},{"@pid":"62/176","text":"Eunkyoung Jee"},{"@pid":"87/47-2","text":"Jinho Choi 0002"},{"@pid":"32/5432","text":"Doo-Hwan Bae"}]},"title":"Automatic construction of timing diagrams from UML/MARTE models for real-time embedded software.","venue":"SAC","pages":"1140-1145","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NguyenJ0B14","doi":"10.1145/2554850.2555011","ee":"https://doi.org/10.1145/2554850.2555011","url":"https://dblp.org/rec/conf/sac/NguyenJ0B14"}, "url":"URL#3935306" }, { "@score":"1", "@id":"3935307", "info":{"authors":{"author":[{"@pid":"148/4352","text":"Paulo Eduardo Nogueira"},{"@pid":"06/6499","text":"Rivalino Matias Jr."},{"@pid":"77/10804","text":"Elder Vicente"}]},"title":"An experimental study on execution time variation in computer experiments.","venue":"SAC","pages":"1529-1534","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NogueiraMV14","doi":"10.1145/2554850.2555022","ee":"https://doi.org/10.1145/2554850.2555022","url":"https://dblp.org/rec/conf/sac/NogueiraMV14"}, "url":"URL#3935307" }, { "@score":"1", "@id":"3935308", "info":{"authors":{"author":[{"@pid":"118/7695","text":"Adel Noureddine"},{"@pid":"52/2030","text":"Romain Rouvoy"},{"@pid":"75/3681","text":"Lionel Seinturier"}]},"title":"Unit testing of energy consumption of software libraries.","venue":"SAC","pages":"1200-1205","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NoureddineRS14","doi":"10.1145/2554850.2554932","ee":"https://doi.org/10.1145/2554850.2554932","url":"https://dblp.org/rec/conf/sac/NoureddineRS14"}, "url":"URL#3935308" }, { "@score":"1", "@id":"3935309", "info":{"authors":{"author":[{"@pid":"123/3220","text":"Mateus Bisotto Nunes"},{"@pid":"60/2597","text":"Luciana Porcher Nedel"},{"@pid":"04/348","text":"Valter Roesler"}]},"title":"Motivating people to perform better in exergames: competition in virtual environments.","venue":"SAC","pages":"970-975","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NunesNR14","doi":"10.1145/2554850.2555009","ee":"https://doi.org/10.1145/2554850.2555009","url":"https://dblp.org/rec/conf/sac/NunesNR14"}, "url":"URL#3935309" }, { "@score":"1", "@id":"3935310", "info":{"authors":{"author":[{"@pid":"148/4267","text":"Jeho Oh"},{"@pid":"06/4939","text":"Sungwon Kang"}]},"title":"A hierarchical model for traceability between requirements and architecture.","venue":"SAC","pages":"1035-1042","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OhK14","doi":"10.1145/2554850.2554984","ee":"https://doi.org/10.1145/2554850.2554984","url":"https://dblp.org/rec/conf/sac/OhK14"}, "url":"URL#3935310" }, { "@score":"1", "@id":"3935311", "info":{"authors":{"author":[{"@pid":"148/4361","text":"Alessandreia Marta de Oliveira"},{"@pid":"25/3645","text":"Leonardo Murta 0001"},{"@pid":"84/2055","text":"Vanessa Braganholo"}]},"title":"Towards semantic diff of XML documents.","venue":"SAC","pages":"833-838","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OliveiraMB14","doi":"10.1145/2554850.2554893","ee":"https://doi.org/10.1145/2554850.2554893","url":"https://dblp.org/rec/conf/sac/OliveiraMB14"}, "url":"URL#3935311" }, { "@score":"1", "@id":"3935312", "info":{"authors":{"author":[{"@pid":"193/1016","text":"Elaine H. T. Oliveira"},{"@pid":"148/4415","text":"Erika H. Nozawa"},{"@pid":"v/RosaMariaVicari","text":"Rosa Maria Vicari"}]},"title":"Towards a framework for relevant guidance.","venue":"SAC","pages":"241-242","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OliveiraNV14","doi":"10.1145/2554850.2555093","ee":"https://doi.org/10.1145/2554850.2555093","url":"https://dblp.org/rec/conf/sac/OliveiraNV14"}, "url":"URL#3935312" }, { "@score":"1", "@id":"3935313", "info":{"authors":{"author":[{"@pid":"20/3140","text":"Daniela Oliveira 0001"},{"@pid":"65/589","text":"Jesús Navarro"},{"@pid":"148/4368","text":"Nicholas Wetzel"},{"@pid":"148/4292","text":"Max Bucci"}]},"title":"Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach.","venue":"SAC","pages":"1672-1679","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OliveiraNWB14","doi":"10.1145/2554850.2554923","ee":"https://doi.org/10.1145/2554850.2554923","url":"https://dblp.org/rec/conf/sac/OliveiraNWB14"}, "url":"URL#3935313" }, { "@score":"1", "@id":"3935314", "info":{"authors":{"author":[{"@pid":"148/4350","text":"Daniel Bristot de Oliveira"},{"@pid":"15/1283","text":"Rômulo Silva de Oliveira"}]},"title":"Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model.","venue":"SAC","pages":"1543-1544","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OliveiraO14","doi":"10.1145/2554850.2555113","ee":"https://doi.org/10.1145/2554850.2555113","url":"https://dblp.org/rec/conf/sac/OliveiraO14"}, "url":"URL#3935314" }, { "@score":"1", "@id":"3935315", "info":{"authors":{"author":[{"@pid":"04/8115-1","text":"Nuno Oliveira 0001"},{"@pid":"92/1378-1","text":"Alexandra Silva 0001"},{"@pid":"40/3466","text":"Luís Soares Barbosa"}]},"title":"Quantitative analysis of Reo-based service coordination.","venue":"SAC","pages":"1247-1254","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OliveiraSB14","doi":"10.1145/2554850.2555025","ee":"https://doi.org/10.1145/2554850.2555025","url":"https://dblp.org/rec/conf/sac/OliveiraSB14"}, "url":"URL#3935315" }, { "@score":"1", "@id":"3935316", "info":{"authors":{"author":[{"@pid":"o/SigeruOmatu","text":"Sigeru Omatu 0001"},{"@pid":"138/8881","text":"Mitsuaki Yano"}]},"title":"Smell classification using weakly responding data.","venue":"SAC","pages":"213-214","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OmatuY14","doi":"10.1145/2554850.2555081","ee":"https://doi.org/10.1145/2554850.2555081","url":"https://dblp.org/rec/conf/sac/OmatuY14"}, "url":"URL#3935316" }, { "@score":"1", "@id":"3935317", "info":{"authors":{"author":[{"@pid":"145/7842","text":"Ranilson Oscar Araújo Paiva"},{"@pid":"148/4276","text":"Daniel Borges"},{"@pid":"148/4342","text":"Jário José Santos"},{"@pid":"11/2860","text":"Ig Ibert Bittencourt"},{"@pid":"39/95","text":"Alan Pedro da Silva"}]},"title":"Lessons learned from an online open course: a Brazilian case study.","venue":"SAC","pages":"229-234","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PaivaBSBS14","doi":"10.1145/2554850.2555024","ee":"https://doi.org/10.1145/2554850.2555024","url":"https://dblp.org/rec/conf/sac/PaivaBSBS14"}, "url":"URL#3935317" }, { "@score":"1", "@id":"3935318", "info":{"authors":{"author":[{"@pid":"13/1605","text":"Arpan Pal 0001"},{"@pid":"136/0988","text":"Aishwarya Visvanathan"},{"@pid":"125/1536","text":"Anirban Dutta Choudhury"},{"@pid":"35/10242","text":"Aniruddha Sinha"}]},"title":"Improved heart rate detection using smart phone.","venue":"SAC","pages":"8-13","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PalVCS14","doi":"10.1145/2554850.2554888","ee":"https://doi.org/10.1145/2554850.2554888","url":"https://dblp.org/rec/conf/sac/PalVCS14"}, "url":"URL#3935318" }, { "@score":"1", "@id":"3935319", "info":{"authors":{"author":[{"@pid":"00/7677","text":"Mike Papadakis"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"Effective fault localization via mutation analysis: a selective mutation approach.","venue":"SAC","pages":"1293-1300","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PapadakisT14","doi":"10.1145/2554850.2554978","ee":"https://doi.org/10.1145/2554850.2554978","url":"https://dblp.org/rec/conf/sac/PapadakisT14"}, "url":"URL#3935319" }, { "@score":"1", "@id":"3935320", "info":{"authors":{"author":[{"@pid":"146/1652","text":"Myung Chul Park"},{"@pid":"120/9430","text":"Dong Seog Han"}]},"title":"Performance analysis of the golden-SM in the V2V network.","venue":"SAC","pages":"1739-1740","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ParkH14","doi":"10.1145/2554850.2559916","ee":"https://doi.org/10.1145/2554850.2559916","url":"https://dblp.org/rec/conf/sac/ParkH14"}, "url":"URL#3935320" }, { "@score":"1", "@id":"3935321", "info":{"authors":{"author":[{"@pid":"82/8791","text":"Heekwon Park"},{"@pid":"45/192","text":"Dongwoo Kang"},{"@pid":"61/4476","text":"Jongmoo Choi"}]},"title":"Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation.","venue":"SAC","pages":"1517-1522","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ParkKC14","doi":"10.1145/2554850.2554972","ee":"https://doi.org/10.1145/2554850.2554972","url":"https://dblp.org/rec/conf/sac/ParkKC14"}, "url":"URL#3935321" }, { "@score":"1", "@id":"3935322", "info":{"authors":{"author":[{"@pid":"04/8789","text":"Jung Pil Park"},{"@pid":"15/7194","text":"Min Woo Park"},{"@pid":"86/4668","text":"Soon Ki Jung"}]},"title":"QR-code based online robot augmented reality system for education.","venue":"SAC","pages":"180-185","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ParkPJ14","doi":"10.1145/2554850.2555038","ee":"https://doi.org/10.1145/2554850.2555038","url":"https://dblp.org/rec/conf/sac/ParkPJ14"}, "url":"URL#3935322" }, { "@score":"1", "@id":"3935323", "info":{"authors":{"author":[{"@pid":"45/84","text":"Yongwoon Park"},{"@pid":"48/6485","text":"Wonyong Yoon"}]},"title":"Encountering smartphones in network simulation: a preliminary result on multi-radio multicast.","venue":"SAC","pages":"1727-1728","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ParkY14","doi":"10.1145/2554850.2559910","ee":"https://doi.org/10.1145/2554850.2559910","url":"https://dblp.org/rec/conf/sac/ParkY14"}, "url":"URL#3935323" }, { "@score":"1", "@id":"3935324", "info":{"authors":{"author":[{"@pid":"45/5142","text":"Carlos Parra"},{"@pid":"148/4302","text":"Diego Joya"},{"@pid":"118/4055","text":"Leonardo Giral"},{"@pid":"118/3949","text":"Alvaro Infante"}]},"title":"An SOA approach for automating software product line adoption.","venue":"SAC","pages":"1231-1238","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ParraJGI14","doi":"10.1145/2554850.2554987","ee":"https://doi.org/10.1145/2554850.2554987","url":"https://dblp.org/rec/conf/sac/ParraJGI14"}, "url":"URL#3935324" }, { "@score":"1", "@id":"3935325", "info":{"authors":{"author":[{"@pid":"21/5144","text":"Amiya Patanaik"},{"@pid":"64/405","text":"Vitali Zagorodnov"},{"@pid":"32/228","text":"Chee-Keong Kwoh 0001"}]},"title":"Parameter estimation and simulation for one-choice Ratcliff diffusion model.","venue":"SAC","pages":"3-7","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PatanaikZK14","doi":"10.1145/2554850.2554872","ee":"https://doi.org/10.1145/2554850.2554872","url":"https://dblp.org/rec/conf/sac/PatanaikZK14"}, "url":"URL#3935325" }, { "@score":"1", "@id":"3935326", "info":{"authors":{"author":[{"@pid":"41/9729","text":"Marco Patrignani"},{"@pid":"29/7042-1","text":"Dave Clarke 0001"}]},"title":"Fully abstract trace semantics for low-level isolation mechanisms.","venue":"SAC","pages":"1562-1569","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PatrignaniC14","doi":"10.1145/2554850.2554865","ee":"https://doi.org/10.1145/2554850.2554865","url":"https://dblp.org/rec/conf/sac/PatrignaniC14"}, "url":"URL#3935326" }, { "@score":"1", "@id":"3935327", "info":{"authors":{"author":[{"@pid":"95/11468","text":"Tanay Kanti Paul"},{"@pid":"21/6332","text":"Man Fai Lau"}]},"title":"A systematic literature review on modified condition and decision coverage.","venue":"SAC","pages":"1301-1308","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PaulL14","doi":"10.1145/2554850.2555004","ee":"https://doi.org/10.1145/2554850.2555004","url":"https://dblp.org/rec/conf/sac/PaulL14"}, "url":"URL#3935327" }, { "@score":"1", "@id":"3935328", "info":{"authors":{"author":[{"@pid":"20/8694","text":"Diogo de Carvalho Pedrosa"},{"@pid":"18/2858","text":"Maria da Graça Campos Pimentel"}]},"title":"Text entry using a foot for severely motor-impaired individuals.","venue":"SAC","pages":"957-963","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PedrosaP14","doi":"10.1145/2554850.2554948","ee":"https://doi.org/10.1145/2554850.2554948","url":"https://dblp.org/rec/conf/sac/PedrosaP14"}, "url":"URL#3935328" }, { "@score":"1", "@id":"3935329", "info":{"authors":{"author":[{"@pid":"74/2346","text":"Rong Peng"},{"@pid":"19/2813-4","text":"Dong Sun 0004"},{"@pid":"87/3960","text":"Wei-Tek Tsai"}]},"title":"Success factors in mobile social networking application development: case study of instagram.","venue":"SAC","pages":"1072-1079","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PengST14","doi":"10.1145/2554850.2554902","ee":"https://doi.org/10.1145/2554850.2554902","url":"https://dblp.org/rec/conf/sac/PengST14"}, "url":"URL#3935329" }, { "@score":"1", "@id":"3935330", "info":{"authors":{"author":[{"@pid":"139/4318","text":"Zhenzhou Peng"},{"@pid":"69/1062","text":"Shinjae Yoo"},{"@pid":"45/3429","text":"Dantong Yu"},{"@pid":"94/3756","text":"Dong Huang"},{"@pid":"148/4371","text":"Paul Kalb"},{"@pid":"148/4369","text":"John Heiser"}]},"title":"3D cloud detection and tracking for solar forecast using multiple sky imagers.","venue":"SAC","pages":"512-517","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PengYYHKH14","doi":"10.1145/2554850.2554913","ee":"https://doi.org/10.1145/2554850.2554913","url":"https://dblp.org/rec/conf/sac/PengYYHKH14"}, "url":"URL#3935330" }, { "@score":"1", "@id":"3935331", "info":{"authors":{"author":[{"@pid":"148/4309","text":"Mário Pereira"},{"@pid":"35/5844","text":"Simão Melo de Sousa"}]},"title":"Complexity checking of ARM programs, by deduction.","venue":"SAC","pages":"1309-1314","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PereiraS14","doi":"10.1145/2554850.2555012","ee":"https://doi.org/10.1145/2554850.2555012","url":"https://dblp.org/rec/conf/sac/PereiraS14"}, "url":"URL#3935331" }, { "@score":"1", "@id":"3935332", "info":{"authors":{"author":[{"@pid":"59/7537","text":"Gustavo Pessin"},{"@pid":"00/5455","text":"Fernando Santos Osório"},{"@pid":"68/1201","text":"Jó Ueyama"},{"@pid":"97/3033","text":"Denis F. Wolf"},{"@pid":"60/3755","text":"Renan Cipriano Moioli"},{"@pid":"54/1692","text":"Patrícia A. Vargas"}]},"title":"Self-localisation in indoor environments combining learning and evolution with wireless networks.","venue":"SAC","pages":"661-666","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PessinOUWMV14","doi":"10.1145/2554850.2554867","ee":"https://doi.org/10.1145/2554850.2554867","url":"https://dblp.org/rec/conf/sac/PessinOUWMV14"}, "url":"URL#3935332" }, { "@score":"1", "@id":"3935333", "info":{"authors":{"author":[{"@pid":"59/11240","text":"Ronald Petrlic"},{"@pid":"08/1757","text":"Sascha Lutters"},{"@pid":"35/266","text":"Christoph Sorge"}]},"title":"Privacy-preserving reputation management.","venue":"SAC","pages":"1712-1718","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PetrlicLS14","doi":"10.1145/2554850.2554881","ee":"https://doi.org/10.1145/2554850.2554881","url":"https://dblp.org/rec/conf/sac/PetrlicLS14"}, "url":"URL#3935333" }, { "@score":"1", "@id":"3935334", "info":{"authors":{"author":[{"@pid":"10/8473","text":"Riccardo Petrocco"},{"@pid":"04/8524","text":"Mihai Capota"},{"@pid":"p/JohanAPouwelse","text":"Johan A. Pouwelse"},{"@pid":"e/DickHJEpema","text":"Dick H. J. Epema"}]},"title":"Hiding user content interest while preserving P2P performance.","venue":"SAC","pages":"501-508","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PetroccoCPE14","doi":"10.1145/2554850.2555006","ee":"https://doi.org/10.1145/2554850.2555006","url":"https://dblp.org/rec/conf/sac/PetroccoCPE14"}, "url":"URL#3935334" }, { "@score":"1", "@id":"3935335", "info":{"authors":{"author":[{"@pid":"46/5275","text":"João Pimentel 0001"},{"@pid":"c/JBdCastro","text":"Jaelson Castro"},{"@pid":"m/JohnMylopoulos","text":"John Mylopoulos"},{"@pid":"129/9136","text":"Konstantinos Angelopoulos"},{"@pid":"72/3662","text":"Vítor E. Silva Souza"}]},"title":"From requirements to statecharts via design refinement.","venue":"SAC","pages":"995-1000","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PimentelCMAS14","doi":"10.1145/2554850.2555056","ee":"https://doi.org/10.1145/2554850.2555056","url":"https://dblp.org/rec/conf/sac/PimentelCMAS14"}, "url":"URL#3935335" }, { "@score":"1", "@id":"3935336", "info":{"authors":{"author":[{"@pid":"125/1160","text":"Srinivas Pinisetty"},{"@pid":"11/5986","text":"Yliès Falcone"},{"@pid":"50/6556","text":"Thierry Jéron"},{"@pid":"44/4811","text":"Hervé Marchand"}]},"title":"Runtime enforcement of regular timed properties.","venue":"SAC","pages":"1279-1286","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PinisettyFJM14","doi":"10.1145/2554850.2554967","ee":"https://doi.org/10.1145/2554850.2554967","url":"https://dblp.org/rec/conf/sac/PinisettyFJM14"}, "url":"URL#3935336" }, { "@score":"1", "@id":"3935337", "info":{"authors":{"author":[{"@pid":"117/3279","text":"Matic Potocnik"},{"@pid":"91/6561","text":"Uros Cibej"},{"@pid":"31/1529","text":"Bostjan Slivnik"}]},"title":"Linter: a tool for finding bugs and potential problems in scala code.","venue":"SAC","pages":"1615-1616","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PotocnikCS14","doi":"10.1145/2554850.2555129","ee":"https://doi.org/10.1145/2554850.2555129","url":"https://dblp.org/rec/conf/sac/PotocnikCS14"}, "url":"URL#3935337" }, { "@score":"1", "@id":"3935338", "info":{"authors":{"author":[{"@pid":"148/4312","text":"Rosa Virginia Encinas Quille"},{"@pid":"t/CaetanoTrainaJr","text":"Caetano Traina Jr."},{"@pid":"r/JoseFernandoRodriguesJr","text":"José Fernando Rodrigues Jr."}]},"title":"Spectral analysis and text processing over the computer science literature: patterns and discoveries.","venue":"SAC","pages":"653-657","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/QuilleTR14","doi":"10.1145/2554850.2555151","ee":"https://doi.org/10.1145/2554850.2555151","url":"https://dblp.org/rec/conf/sac/QuilleTR14"}, "url":"URL#3935338" }, { "@score":"1", "@id":"3935339", "info":{"authors":{"author":[{"@pid":"42/9091","text":"Elie Raad"},{"@pid":"75/6793","text":"Joerg Evermann"}]},"title":"Is ontology alignment like analogy?: knowledge integration with LISA.","venue":"SAC","pages":"294-301","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RaadE14","doi":"10.1145/2554850.2554853","ee":"https://doi.org/10.1145/2554850.2554853","url":"https://dblp.org/rec/conf/sac/RaadE14"}, "url":"URL#3935339" }, { "@score":"1", "@id":"3935340", "info":{"authors":{"author":[{"@pid":"148/4304","text":"Jaime Raigoza"},{"@pid":"42/1436","text":"Junping Sun"}]},"title":"Temporal join processing with hilbert curve space mapping.","venue":"SAC","pages":"839-844","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RaigozaS14","doi":"10.1145/2554850.2554903","ee":"https://doi.org/10.1145/2554850.2554903","url":"https://dblp.org/rec/conf/sac/RaigozaS14"}, "url":"URL#3935340" }, { "@score":"1", "@id":"3935341", "info":{"authors":{"author":[{"@pid":"148/4379","text":"Hugo Ramos"},{"@pid":"01/5247","text":"André Vasconcelos 0001"}]},"title":"eXtreme enterprise architecture planning.","venue":"SAC","pages":"1417-1419","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RamosV14","doi":"10.1145/2554850.2555130","ee":"https://doi.org/10.1145/2554850.2555130","url":"https://dblp.org/rec/conf/sac/RamosV14"}, "url":"URL#3935341" }, { "@score":"1", "@id":"3935342", "info":{"authors":{"author":[{"@pid":"10/3162","text":"Juwel Rana"},{"@pid":"98/2546","text":"Johan Kristiansson"},{"@pid":"56/6102","text":"Kåre Synnes"}]},"title":"The strength of social strength: an evaluation study of algorithmic versus user-defined ranking.","venue":"SAC","pages":"658-659","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RanaKS14","doi":"10.1145/2554850.2555158","ee":"https://doi.org/10.1145/2554850.2555158","url":"https://dblp.org/rec/conf/sac/RanaKS14"}, "url":"URL#3935342" }, { "@score":"1", "@id":"3935343", "info":{"authors":{"author":[{"@pid":"69/5770","text":"David Raneburger"},{"@pid":"k/HermannKaindl","text":"Hermann Kaindl"},{"@pid":"86/5119","text":"Roman Popp"},{"@pid":"146/5661","text":"Vedran Sajatovic"},{"@pid":"146/5891","text":"Alexander Armbruster"}]},"title":"A process for facilitating interaction design through automated GUI generation.","venue":"SAC","pages":"1324-1330","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RaneburgerKPSA14","doi":"10.1145/2554850.2555053","ee":"https://doi.org/10.1145/2554850.2555053","url":"https://dblp.org/rec/conf/sac/RaneburgerKPSA14"}, "url":"URL#3935343" }, { "@score":"1", "@id":"3935344", "info":{"authors":{"author":[{"@pid":"119/2191","text":"Leonardo Vieira dos Santos Reis"},{"@pid":"26/6772","text":"Vladimir Oliveira Di Iorio"},{"@pid":"67/5401","text":"Roberto da Silva Bigonha"}]},"title":"Defining the syntax of extensible languages.","venue":"SAC","pages":"1570-1576","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ReisIB14","doi":"10.1145/2554850.2554898","ee":"https://doi.org/10.1145/2554850.2554898","url":"https://dblp.org/rec/conf/sac/ReisIB14"}, "url":"URL#3935344" }, { "@score":"1", "@id":"3935345", "info":{"authors":{"author":[{"@pid":"54/8778","text":"André Ribeiro"},{"@pid":"99/4424","text":"Alberto Rodrigues da Silva"}]},"title":"XIS-mobile: a DSL for mobile applications.","venue":"SAC","pages":"1316-1323","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RibeiroS14","doi":"10.1145/2554850.2554926","ee":"https://doi.org/10.1145/2554850.2554926","url":"https://dblp.org/rec/conf/sac/RibeiroS14"}, "url":"URL#3935345" }, { "@score":"1", "@id":"3935346", "info":{"authors":{"author":[{"@pid":"33/4917","text":"Rodrigo da Rosa Righi"},{"@pid":"14/3505","text":"Cristiano André da Costa"},{"@pid":"133/7509","text":"Luiz Gonzaga Jr."},{"@pid":"49/7937","text":"Kleinner Farias"},{"@pid":"148/4385","text":"Alexandre Luis Andrade"},{"@pid":"84/10804","text":"Lucas Graebin"}]},"title":"Redesigning transaction load balancing on electronic funds transfer scenarios.","venue":"SAC","pages":"775-777","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RighiCGFAG14","doi":"10.1145/2554850.2555121","ee":"https://doi.org/10.1145/2554850.2555121","url":"https://dblp.org/rec/conf/sac/RighiCGFAG14"}, "url":"URL#3935346" }, { "@score":"1", "@id":"3935347", "info":{"authors":{"author":[{"@pid":"148/4255","text":"Julian Rith"},{"@pid":"148/4404","text":"Philipp S. Lehmayr"},{"@pid":"m/KMeyerWegener","text":"Klaus Meyer-Wegener"}]},"title":"Speaking in tongues: SQL access to NoSQL systems.","venue":"SAC","pages":"855-857","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RithLM14","doi":"10.1145/2554850.2555099","ee":"https://doi.org/10.1145/2554850.2555099","url":"https://dblp.org/rec/conf/sac/RithLM14"}, "url":"URL#3935347" }, { "@score":"1", "@id":"3935348", "info":{"authors":{"author":[{"@pid":"40/11498","text":"Víctor Rivera"},{"@pid":"24/4","text":"Néstor Cataño"}]},"title":"Translating event-B to JML-specified Java programs.","venue":"SAC","pages":"1264-1271","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RiveraC14","doi":"10.1145/2554850.2554897","ee":"https://doi.org/10.1145/2554850.2554897","url":"https://dblp.org/rec/conf/sac/RiveraC14"}, "url":"URL#3935348" }, { "@score":"1", "@id":"3935349", "info":{"authors":{"author":[{"@pid":"47/8296","text":"Kamil Rocki"},{"@pid":"93/903","text":"Martin Burtscher"},{"@pid":"50/4517","text":"Reiji Suda"}]},"title":"The future of accelerator programming: abstraction, performance or can we have both?","venue":"SAC","pages":"886-895","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RockiBS14","doi":"10.1145/2554850.2555029","ee":"https://doi.org/10.1145/2554850.2555029","url":"https://dblp.org/rec/conf/sac/RockiBS14"}, "url":"URL#3935349" }, { "@score":"1", "@id":"3935350", "info":{"authors":{"author":{"@pid":"148/4347","text":"Daniel Röhrig"}},"title":"A domain specific language for process scheduling.","venue":"SAC","pages":"1550-1551","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Rohrig14","doi":"10.1145/2554850.2555187","ee":"https://doi.org/10.1145/2554850.2555187","url":"https://dblp.org/rec/conf/sac/Rohrig14"}, "url":"URL#3935350" }, { "@score":"1", "@id":"3935351", "info":{"authors":{"author":[{"@pid":"148/4384","text":"Reudismam Rolim de Sousa"},{"@pid":"148/4294","text":"Felipe Barbosa Araújo Ramos"},{"@pid":"148/4435","text":"Antonio Alexandre Moura Costa"},{"@pid":"148/4375","text":"Giovanni Calheiros"},{"@pid":"76/859","text":"Hyggo Oliveira de Almeida"},{"@pid":"21/2529","text":"Angelo Perkusich"},{"@pid":"142/4337","text":"Aldenor Falcao Martins"}]},"title":"A recommendation approach for digital TV systems based on multimodal features.","venue":"SAC","pages":"289-291","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RolimBCCAPM14","doi":"10.1145/2554850.2555154","ee":"https://doi.org/10.1145/2554850.2555154","url":"https://dblp.org/rec/conf/sac/RolimBCCAPM14"}, "url":"URL#3935351" }, { "@score":"1", "@id":"3935352", "info":{"authors":{"author":[{"@pid":"82/10167","text":"Rafael Geraldeli Rossi"},{"@pid":"60/5946","text":"Alneu de Andrade Lopes"},{"@pid":"90/5551","text":"Solange O. Rezende"}]},"title":"A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification.","venue":"SAC","pages":"79-84","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RossiLR14","doi":"10.1145/2554850.2554901","ee":"https://doi.org/10.1145/2554850.2554901","url":"https://dblp.org/rec/conf/sac/RossiLR14"}, "url":"URL#3935352" }, { "@score":"1", "@id":"3935353", "info":{"authors":{"author":[{"@pid":"148/4421","text":"Giovanni Sá"},{"@pid":"148/4318","text":"Thiago Silveira"},{"@pid":"148/4417","text":"Rodrigo Chaves"},{"@pid":"148/4380","text":"Felipe Teixeira"},{"@pid":"69/4337","text":"Fernando Mourão"},{"@pid":"89/1792","text":"Leonardo Rocha 0001"}]},"title":"LEGi: context-aware lexicon consolidation by graph inspection.","venue":"SAC","pages":"302-307","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SaSCTMR14","doi":"10.1145/2554850.2554916","ee":"https://doi.org/10.1145/2554850.2554916","url":"https://dblp.org/rec/conf/sac/SaSCTMR14"}, "url":"URL#3935353" }, { "@score":"1", "@id":"3935354", "info":{"authors":{"author":[{"@pid":"125/0352","text":"Toomas Saarsen"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"}]},"title":"Towards an assessment model for balancing process model production and use.","venue":"SAC","pages":"1386-1392","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SaarsenD14","doi":"10.1145/2554850.2554970","ee":"https://doi.org/10.1145/2554850.2554970","url":"https://dblp.org/rec/conf/sac/SaarsenD14"}, "url":"URL#3935354" }, { "@score":"1", "@id":"3935355", "info":{"authors":{"author":[{"@pid":"07/7356","text":"Aryabartta Sahu"},{"@pid":"148/4441","text":"Saparapu Ramakrishna"}]},"title":"Creating heterogeneity at run time by dynamic cache and bandwidth partitioning schemes.","venue":"SAC","pages":"872-879","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SahuR14","doi":"10.1145/2554850.2554992","ee":"https://doi.org/10.1145/2554850.2554992","url":"https://dblp.org/rec/conf/sac/SahuR14"}, "url":"URL#3935355" }, { "@score":"1", "@id":"3935356", "info":{"authors":{"author":[{"@pid":"148/4329","text":"Arisa Sakamoto"},{"@pid":"40/4292","text":"Takuya Katayama"},{"@pid":"67/1709","text":"Tsutomu Terada"},{"@pid":"04/4757","text":"Masahiko Tsukamoto"}]},"title":"Method for visualizing undone operations based on changes on desktop screen.","venue":"SAC","pages":"193-195","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SakamotoKTT14","doi":"10.1145/2554850.2555092","ee":"https://doi.org/10.1145/2554850.2555092","url":"https://dblp.org/rec/conf/sac/SakamotoKTT14"}, "url":"URL#3935356" }, { "@score":"1", "@id":"3935357", "info":{"authors":{"author":[{"@pid":"148/4364","text":"Marcus G. F. Santanna"},{"@pid":"129/2351","text":"Priscila T. M. Saito"},{"@pid":"13/4202","text":"Pedro Henrique Bugatti"}]},"title":"Content-based image retrieval towards the automatic characterization of soybean seed vigor.","venue":"SAC","pages":"964-969","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SantannaSB14","doi":"10.1145/2554850.2555007","ee":"https://doi.org/10.1145/2554850.2555007","url":"https://dblp.org/rec/conf/sac/SantannaSB14"}, "url":"URL#3935357" }, { "@score":"1", "@id":"3935358", "info":{"authors":{"author":[{"@pid":"52/3568","text":"Danilo F. S. Santos"},{"@pid":"94/2146","text":"Frederico Bublitz"},{"@pid":"76/859","text":"Hyggo O. Almeida"},{"@pid":"21/2529","text":"Angelo Perkusich"}]},"title":"Integrating IEEE 11073 and constrained application protocol for personal health devices.","venue":"SAC","pages":"466-467","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SantosBAP14","doi":"10.1145/2554850.2555145","ee":"https://doi.org/10.1145/2554850.2555145","url":"https://dblp.org/rec/conf/sac/SantosBAP14"}, "url":"URL#3935358" }, { "@score":"1", "@id":"3935359", "info":{"authors":{"author":[{"@pid":"148/4392","text":"Valéria de Carvalho Santos"},{"@pid":"07/9587","text":"Daniel Oliva Sales"},{"@pid":"07/5259","text":"Claudio Fabiano Motta Toledo"},{"@pid":"00/5455","text":"Fernando Santos Osório"}]},"title":"A hybrid GA-ANN approach for autonomous robots topological navigation.","venue":"SAC","pages":"148-153","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SantosSTO14","doi":"10.1145/2554850.2554990","ee":"https://doi.org/10.1145/2554850.2554990","url":"https://dblp.org/rec/conf/sac/SantosSTO14"}, "url":"URL#3935359" }, { "@score":"1", "@id":"3935360", "info":{"authors":{"author":[{"@pid":"148/4217","text":"Elane Cristina da Rocha Cardoso Saraiva"},{"@pid":"72/2728","text":"Viviane Torres da Silva"}]},"title":"Choosing my partners based on how they will evaluate my behavior.","venue":"SAC","pages":"781-783","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SaraivaS14","doi":"10.1145/2554850.2555150","ee":"https://doi.org/10.1145/2554850.2555150","url":"https://dblp.org/rec/conf/sac/SaraivaS14"}, "url":"URL#3935360" }, { "@score":"1", "@id":"3935361", "info":{"authors":{"author":{"@pid":"148/4230","text":"Christian René Sechting"}},"title":"A platform independent scheduler framework.","venue":"SAC","pages":"1552-1553","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Sechting14","doi":"10.1145/2554850.2555190","ee":"https://doi.org/10.1145/2554850.2555190","url":"https://dblp.org/rec/conf/sac/Sechting14"}, "url":"URL#3935361" }, { "@score":"1", "@id":"3935362", "info":{"authors":{"author":[{"@pid":"01/5481","text":"Madeleine Seeland"},{"@pid":"85/95","text":"Andreas Karwath"},{"@pid":"k/StefanKramer1","text":"Stefan Kramer 0001"}]},"title":"Structural clustering of millions of molecular graphs.","venue":"SAC","pages":"121-128","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SeelandKK14","doi":"10.1145/2554850.2555063","ee":"https://doi.org/10.1145/2554850.2555063","url":"https://dblp.org/rec/conf/sac/SeelandKK14"}, "url":"URL#3935362" }, { "@score":"1", "@id":"3935363", "info":{"authors":{"author":[{"@pid":"01/5481","text":"Madeleine Seeland"},{"@pid":"47/7121","text":"Andreas Maunz"},{"@pid":"85/95","text":"Andreas Karwath"},{"@pid":"k/StefanKramer1","text":"Stefan Kramer 0001"}]},"title":"Extracting information from support vector machines for pattern-based classification.","venue":"SAC","pages":"129-136","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SeelandMKK14","doi":"10.1145/2554850.2555065","ee":"https://doi.org/10.1145/2554850.2555065","url":"https://dblp.org/rec/conf/sac/SeelandMKK14"}, "url":"URL#3935363" }, { "@score":"1", "@id":"3935364", "info":{"authors":{"author":[{"@pid":"130/8109","text":"Henrique M. Seffrin"},{"@pid":"148/4394","text":"Geiseane L. Rubi"},{"@pid":"j/PatriciaAugustinJaques","text":"Patrícia Augustin Jaques"}]},"title":"A dynamic bayesian network for inference of learners' algebraic knowledge.","venue":"SAC","pages":"235-240","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SeffrinRJ14","doi":"10.1145/2554850.2555062","ee":"https://doi.org/10.1145/2554850.2555062","url":"https://dblp.org/rec/conf/sac/SeffrinRJ14"}, "url":"URL#3935364" }, { "@score":"1", "@id":"3935365", "info":{"authors":{"author":[{"@pid":"46/9663","text":"Sanjin Sehic"},{"@pid":"123/3328","text":"Stefan Nastic"},{"@pid":"19/11503","text":"Michael Vögler"},{"@pid":"87/3534-2","text":"Fei Li 0002"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"Entity-adaptation: a programming model for development of context-aware applications.","venue":"SAC","pages":"436-443","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SehicNVLD14","doi":"10.1145/2554850.2555015","ee":"https://doi.org/10.1145/2554850.2555015","url":"https://dblp.org/rec/conf/sac/SehicNVLD14"}, "url":"URL#3935365" }, { "@score":"1", "@id":"3935366", "info":{"authors":{"author":[{"@pid":"123/7207","text":"Jongkyu Seo"},{"@pid":"59/1402","text":"Sung-Hwan Kim"},{"@pid":"143/6337","text":"Haesung Tak"},{"@pid":"70/484","text":"Hwan-Gue Cho"}]},"title":"A structural analysis of literary fictions with social network framework.","venue":"SAC","pages":"634-640","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SeoKTC14","doi":"10.1145/2554850.2555049","ee":"https://doi.org/10.1145/2554850.2555049","url":"https://dblp.org/rec/conf/sac/SeoKTC14"}, "url":"URL#3935366" }, { "@score":"1", "@id":"3935367", "info":{"authors":{"author":[{"@pid":"s/ManuelSerrano","text":"Manuel Serrano"},{"@pid":"148/4353","text":"Johan Grande"}]},"title":"Locking fast.","venue":"SAC","pages":"1556-1561","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SerranoG14","doi":"10.1145/2554850.2554858","ee":"https://doi.org/10.1145/2554850.2554858","url":"https://dblp.org/rec/conf/sac/SerranoG14"}, "url":"URL#3935367" }, { "@score":"1", "@id":"3935368", "info":{"authors":{"author":[{"@pid":"67/1486","text":"Hossain Shahriar"},{"@pid":"h/HishamHaddad","text":"Hisham Haddad"}]},"title":"Risk assessment of code injection vulnerabilities using fuzzy logic-based system.","venue":"SAC","pages":"1164-1170","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShahriarH14","doi":"10.1145/2554850.2555071","ee":"https://doi.org/10.1145/2554850.2555071","url":"https://dblp.org/rec/conf/sac/ShahriarH14"}, "url":"URL#3935368" }, { "@score":"1", "@id":"3935369", "info":{"authors":{"author":[{"@pid":"73/9634","text":"Shang Shang"},{"@pid":"130/4070","text":"Yuk Hui"},{"@pid":"62/1272-1","text":"Pan Hui 0001"},{"@pid":"117/8945","text":"Paul Cuff"},{"@pid":"52/6276","text":"Sanjeev R. Kulkarni"}]},"title":"Beyond personalization and anonymity: towards a group-based recommender system.","venue":"SAC","pages":"266-273","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShangHHCK14","doi":"10.1145/2554850.2554924","ee":"https://doi.org/10.1145/2554850.2554924","url":"https://dblp.org/rec/conf/sac/ShangHHCK14"}, "url":"URL#3935369" }, { "@score":"1", "@id":"3935370", "info":{"authors":{"author":[{"@pid":"55/5258","text":"Sang-Ho Shin"},{"@pid":"69/4591","text":"Jun-Cheol Jeon"},{"@pid":"45/3014","text":"Gil-Je Lee"},{"@pid":"92/553","text":"Kee-Young Yoo"}]},"title":"Design of a cellular automata cell with rule 30 on quantum-dot cellular automata.","venue":"SAC","pages":"1749-1750","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShinJLY14","doi":"10.1145/2554850.2559923","ee":"https://doi.org/10.1145/2554850.2559923","url":"https://dblp.org/rec/conf/sac/ShinJLY14"}, "url":"URL#3935370" }, { "@score":"1", "@id":"3935371", "info":{"authors":{"author":[{"@pid":"119/7712","text":"Yan Shoshitaishvili"},{"@pid":"57/9185","text":"Luca Invernizzi"},{"@pid":"28/8280","text":"Adam Doupé"},{"@pid":"v/GiovanniVigna","text":"Giovanni Vigna"}]},"title":"Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security.","venue":"SAC","pages":"1649-1656","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShoshitaishviliIDV14","doi":"10.1145/2554850.2554880","ee":"https://doi.org/10.1145/2554850.2554880","url":"https://dblp.org/rec/conf/sac/ShoshitaishviliIDV14"}, "url":"URL#3935371" }, { "@score":"1", "@id":"3935372", "info":{"authors":{"author":{"@pid":"99/4424","text":"Alberto Rodrigues da Silva"}},"title":"Quality of requirements specifications: a preliminary overview of an automatic validation approach.","venue":"SAC","pages":"1021-1022","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Silva14","doi":"10.1145/2554850.2555115","ee":"https://doi.org/10.1145/2554850.2555115","url":"https://dblp.org/rec/conf/sac/Silva14"}, "url":"URL#3935372" }, { "@score":"1", "@id":"3935373", "info":{"authors":{"author":[{"@pid":"148/4356","text":"Lenardo Chaves e Silva"},{"@pid":"129/2275","text":"Mirko Barbosa Perkusich"},{"@pid":"94/2146","text":"Frederico M. Bublitz"},{"@pid":"76/859","text":"Hyggo O. Almeida"},{"@pid":"21/2529","text":"Angelo Perkusich"}]},"title":"A model-based architecture for testing medical cyber-physical systems.","venue":"SAC","pages":"25-30","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SilvaPBAP14","doi":"10.1145/2554850.2555028","ee":"https://doi.org/10.1145/2554850.2555028","url":"https://dblp.org/rec/conf/sac/SilvaPBAP14"}, "url":"URL#3935373" }, { "@score":"1", "@id":"3935374", "info":{"authors":{"author":[{"@pid":"148/4381","text":"César L. Blum Silveira"},{"@pid":"148/4226","text":"Fabio de Oliveira Mierlo"},{"@pid":"133/7509","text":"Luiz Gonzaga Jr."},{"@pid":"14/3505","text":"Cristiano André da Costa"},{"@pid":"49/7937","text":"Kleinner Farias"},{"@pid":"33/4917","text":"Rodrigo da Rosa Righi"}]},"title":"Faster seam carving with minimum energy windows.","venue":"SAC","pages":"45-48","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SilveiraMGCFR14","doi":"10.1145/2554850.2554946","ee":"https://doi.org/10.1145/2554850.2554946","url":"https://dblp.org/rec/conf/sac/SilveiraMGCFR14"}, "url":"URL#3935374" }, { "@score":"1", "@id":"3935375", "info":{"authors":{"author":[{"@pid":"98/7535","text":"Stephan Spiegel"},{"@pid":"a/SahinAlbayrak","text":"Sahin Albayrak"}]},"title":"Energy disaggregation meets heating control.","venue":"SAC","pages":"559-566","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SpiegelA14","doi":"10.1145/2554850.2555088","ee":"https://doi.org/10.1145/2554850.2555088","url":"https://dblp.org/rec/conf/sac/SpiegelA14"}, "url":"URL#3935375" }, { "@score":"1", "@id":"3935376", "info":{"authors":{"author":[{"@pid":"98/7535","text":"Stephan Spiegel"},{"@pid":"98/11170","text":"Brijnesh Johannes Jain"},{"@pid":"a/SahinAlbayrak","text":"Sahin Albayrak"}]},"title":"Fast time series classification under lucky time warping distance.","venue":"SAC","pages":"71-78","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SpiegelJA14","doi":"10.1145/2554850.2554885","ee":"https://doi.org/10.1145/2554850.2554885","url":"https://dblp.org/rec/conf/sac/SpiegelJA14"}, "url":"URL#3935376" }, { "@score":"1", "@id":"3935377", "info":{"authors":{"author":[{"@pid":"22/2784","text":"Kuniyasu Suzaki"},{"@pid":"19/2339","text":"Toshiki Yagi"},{"@pid":"19/6453","text":"Akira Tanaka"},{"@pid":"66/3768","text":"Yutaka Oiwa"},{"@pid":"65/6279","text":"Etsuya Shibayama"}]},"title":"Rollback mechanism of nested virtual machines for protocol fuzz testing.","venue":"SAC","pages":"1484-1491","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SuzakiYTOS14","doi":"10.1145/2554850.2554899","ee":"https://doi.org/10.1145/2554850.2554899","url":"https://dblp.org/rec/conf/sac/SuzakiYTOS14"}, "url":"URL#3935377" }, { "@score":"1", "@id":"3935378", "info":{"authors":{"author":[{"@pid":"148/4268","text":"N. Ramalingeswara Swamy"},{"@pid":"99/7542","text":"Saiful Islam"},{"@pid":"59/1749","text":"Phalguni Gupta"}]},"title":"Two level reversible data hiding in 2D images.","venue":"SAC","pages":"58-59","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SwamyIG14","doi":"10.1145/2554850.2555097","ee":"https://doi.org/10.1145/2554850.2555097","url":"https://dblp.org/rec/conf/sac/SwamyIG14"}, "url":"URL#3935378" }, { "@score":"1", "@id":"3935379", "info":{"authors":{"author":[{"@pid":"148/4366","text":"Yung Shin Van Der Sype"},{"@pid":"17/6692","text":"Jean-Marc Seigneur"}]},"title":"Case study: legal requirements for the use of social login features for online reputation updates.","venue":"SAC","pages":"1698-1705","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SypeS14","doi":"10.1145/2554850.2554857","ee":"https://doi.org/10.1145/2554850.2554857","url":"https://dblp.org/rec/conf/sac/SypeS14"}, "url":"URL#3935379" }, { "@score":"1", "@id":"3935380", "info":{"authors":{"author":[{"@pid":"31/10583","text":"Jiamei Tang"},{"@pid":"01/6916","text":"Paul Kim"},{"@pid":"41/5288","text":"Sangwook Kim"}]},"title":"An optimal device selection for user satisfaction of content sharing.","venue":"SAC","pages":"1745-1746","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TangKK14","doi":"10.1145/2554850.2559920","ee":"https://doi.org/10.1145/2554850.2559920","url":"https://dblp.org/rec/conf/sac/TangKK14"}, "url":"URL#3935380" }, { "@score":"1", "@id":"3935381", "info":{"authors":{"author":[{"@pid":"t/PaulTarau","text":"Paul Tarau"},{"@pid":"b/BillPBuckles","text":"Bill P. Buckles"}]},"title":"Arithmetic algorithms for hereditarily binary natural numbers.","venue":"SAC","pages":"1593-1600","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TarauB14","doi":"10.1145/2554850.2555040","ee":"https://doi.org/10.1145/2554850.2555040","url":"https://dblp.org/rec/conf/sac/TarauB14"}, "url":"URL#3935381" }, { "@score":"1", "@id":"3935382", "info":{"authors":{"author":[{"@pid":"148/4334","text":"Teklemariam Tsegay Tesfay"},{"@pid":"h/JPHubaux","text":"Jean-Pierre Hubaux"},{"@pid":"l/JYLeBoudec","text":"Jean-Yves Le Boudec"},{"@pid":"84/5288","text":"Philippe Oechslin"}]},"title":"Cyber-secure communication architecture for active power distribution networks.","venue":"SAC","pages":"545-552","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TesfayHBO14","doi":"10.1145/2554850.2555082","ee":"https://doi.org/10.1145/2554850.2555082","url":"https://dblp.org/rec/conf/sac/TesfayHBO14"}, "url":"URL#3935382" }, { "@score":"1", "@id":"3935383", "info":{"authors":{"author":[{"@pid":"148/4265","text":"Tran Tin"},{"@pid":"11/5330","text":"Sung-Ryul Kim"}]},"title":"Method for fast clustering of data distributed on a sphere surface.","venue":"SAC","pages":"1735-1736","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TinK14","doi":"10.1145/2554850.2559914","ee":"https://doi.org/10.1145/2554850.2559914","url":"https://dblp.org/rec/conf/sac/TinK14"}, "url":"URL#3935383" }, { "@score":"1", "@id":"3935384", "info":{"authors":{"author":{"@pid":"07/6189","text":"Hiroaki Tobita"}},"title":"Aero-screen: blimp-based ubiquitous screen for novel digital signage and information visualization.","venue":"SAC","pages":"976-980","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Tobita14","doi":"10.1145/2554850.2555052","ee":"https://doi.org/10.1145/2554850.2555052","url":"https://dblp.org/rec/conf/sac/Tobita14"}, "url":"URL#3935384" }, { "@score":"1", "@id":"3935385", "info":{"authors":{"author":[{"@pid":"148/4423","text":"Rodrigo Marotti Togneri"},{"@pid":"148/4437","text":"Bruno Tadeu Caetano"},{"@pid":"74/2714","text":"Carlos Alberto Kamienski"}]},"title":"The importance of geographic locality for online information diffusion.","venue":"SAC","pages":"622-627","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TogneriCK14","doi":"10.1145/2554850.2555046","ee":"https://doi.org/10.1145/2554850.2555046","url":"https://dblp.org/rec/conf/sac/TogneriCK14"}, "url":"URL#3935385" }, { "@score":"1", "@id":"3935386", "info":{"authors":{"author":[{"@pid":"61/10278","text":"Simon Tragatschnig"},{"@pid":"39/4775","text":"Huy Tran"},{"@pid":"00/6127","text":"Uwe Zdun"}]},"title":"Impact analysis for event-based systems using change patterns.","venue":"SAC","pages":"763-768","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TragatschnigTZ14","doi":"10.1145/2554850.2554955","ee":"https://doi.org/10.1145/2554850.2554955","url":"https://dblp.org/rec/conf/sac/TragatschnigTZ14"}, "url":"URL#3935386" }, { "@score":"1", "@id":"3935387", "info":{"authors":{"author":[{"@pid":"62/11498","text":"Ting-Hao Tsai"},{"@pid":"53/599","text":"Ya-Shu Chen"}]},"title":"A thermal-throttling server in 3D multicore chips.","venue":"SAC","pages":"1425-1430","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TsaiC14","doi":"10.1145/2554850.2554941","ee":"https://doi.org/10.1145/2554850.2554941","url":"https://dblp.org/rec/conf/sac/TsaiC14"}, "url":"URL#3935387" }, { "@score":"1", "@id":"3935388", "info":{"authors":{"author":[{"@pid":"76/2607","text":"Udaya Kiran Tupakula"},{"@pid":"v/VijayVaradharajan","text":"Vijay Varadharajan"}]},"title":"Secure monitoring for dementia patients.","venue":"SAC","pages":"14-19","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TupakulaV14","doi":"10.1145/2554850.2554950","ee":"https://doi.org/10.1145/2554850.2554950","url":"https://dblp.org/rec/conf/sac/TupakulaV14"}, "url":"URL#3935388" }, { "@score":"1", "@id":"3935389", "info":{"authors":{"author":{"@pid":"41/2336","text":"Seiji Umatani"}},"title":"Practical implementation techniques of ambient calculus in conventional dynamic languages.","venue":"SAC","pages":"1345-1351","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Umatani14","doi":"10.1145/2554850.2554995","ee":"https://doi.org/10.1145/2554850.2554995","url":"https://dblp.org/rec/conf/sac/Umatani14"}, "url":"URL#3935389" }, { "@score":"1", "@id":"3935390", "info":{"authors":{"author":[{"@pid":"148/4220","text":"Ai Uno"},{"@pid":"00/5681","text":"Takayuki Itoh"}]},"title":"MALL: a life log based music recommendation system and portable music player.","venue":"SAC","pages":"939-944","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/UnoI14","doi":"10.1145/2554850.2554861","ee":"https://doi.org/10.1145/2554850.2554861","url":"https://dblp.org/rec/conf/sac/UnoI14"}, "url":"URL#3935390" }, { "@score":"1", "@id":"3935391", "info":{"authors":{"author":[{"@pid":"17/6405","text":"Marisa A. Vasconcelos"},{"@pid":"34/5480","text":"Jussara M. Almeida"},{"@pid":"45/1395","text":"Marcos André Gonçalves"}]},"title":"What makes your opinion popular?: predicting the popularity of micro-reviews in foursquare.","venue":"SAC","pages":"598-603","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VasconcelosAG14","doi":"10.1145/2554850.2554911","ee":"https://doi.org/10.1145/2554850.2554911","url":"https://dblp.org/rec/conf/sac/VasconcelosAG14"}, "url":"URL#3935391" }, { "@score":"1", "@id":"3935392", "info":{"authors":{"author":[{"@pid":"98/4928","text":"Vânia Maria Ponte Vidal"},{"@pid":"c/MarcoACasanova","text":"Marco A. Casanova"},{"@pid":"134/6842","text":"Luís Eufrasio T. Neto"},{"@pid":"92/1818","text":"José Maria Monteiro"}]},"title":"A semi-automatic approach for generating customized R2RML mappings.","venue":"SAC","pages":"316-322","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VidalCNM14","doi":"10.1145/2554850.2554933","ee":"https://doi.org/10.1145/2554850.2554933","url":"https://dblp.org/rec/conf/sac/VidalCNM14"}, "url":"URL#3935392" }, { "@score":"1", "@id":"3935393", "info":{"authors":{"author":[{"@pid":"w/HaoWang-25","text":"Hao Wang 0025"},{"@pid":"e/MichaelTMEmmerich","text":"Michael Emmerich"},{"@pid":"b/ThomasBack","text":"Thomas Bäck"}]},"title":"Mirrored orthogonal sampling with pairwise selection in evolution strategies.","venue":"SAC","pages":"154-156","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangEB14","doi":"10.1145/2554850.2555089","ee":"https://doi.org/10.1145/2554850.2555089","url":"https://dblp.org/rec/conf/sac/WangEB14"}, "url":"URL#3935393" }, { "@score":"1", "@id":"3935394", "info":{"authors":{"author":[{"@pid":"137/6768","text":"Mingyang Wang"},{"@pid":"68/5169","text":"Yiming Hu"}]},"title":"An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan.","venue":"SAC","pages":"1511-1516","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangH14","doi":"10.1145/2554850.2554971","ee":"https://doi.org/10.1145/2554850.2554971","url":"https://dblp.org/rec/conf/sac/WangH14"}, "url":"URL#3935394" }, { "@score":"1", "@id":"3935395", "info":{"authors":{"author":[{"@pid":"18/5410","text":"Di Wang"},{"@pid":"91/4845-1","text":"Jun Ma 0001"},{"@pid":"121/4324","text":"Tao Lian"},{"@pid":"64/1967-8","text":"Lei Guo 0008"}]},"title":"Recommendation based on weighted social trusts and item relationships.","venue":"SAC","pages":"254-259","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangMLG14","doi":"10.1145/2554850.2554884","ee":"https://doi.org/10.1145/2554850.2554884","url":"https://dblp.org/rec/conf/sac/WangMLG14"}, "url":"URL#3935395" }, { "@score":"1", "@id":"3935396", "info":{"authors":{"author":[{"@pid":"74/5782","text":"Sheng-Wei Wang"},{"@pid":"44/11072","text":"Chin-Yen Wen"}]},"title":"Wavelength resources based lightpath-level active rerouting in all-optical WDM networks.","venue":"SAC","pages":"495-500","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangW14","doi":"10.1145/2554850.2554988","ee":"https://doi.org/10.1145/2554850.2554988","url":"https://dblp.org/rec/conf/sac/WangW14"}, "url":"URL#3935396" }, { "@score":"1", "@id":"3935397", "info":{"authors":{"author":[{"@pid":"181/2817-111","text":"Lei Wang 0111"},{"@pid":"w/AndreasWombacher","text":"Andreas Wombacher"},{"@pid":"p/LuisFerreiraPires","text":"Luís Ferreira Pires"},{"@pid":"s/MartenvanSinderen","text":"Marten van Sinderen"},{"@pid":"31/10001","text":"Chihung Chi"}]},"title":"A collaborative processes synchronization method with regards to system crashes and network failures.","venue":"SAC","pages":"1393-1398","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangWPSC14","doi":"10.1145/2554850.2554980","ee":"https://doi.org/10.1145/2554850.2554980","url":"https://dblp.org/rec/conf/sac/WangWPSC14"}, "url":"URL#3935397" }, { "@score":"1", "@id":"3935398", "info":{"authors":{"author":[{"@pid":"12/5838-14","text":"Tao Wang 0014"},{"@pid":"20/4152","text":"Ke Zhang"},{"@pid":"58/1879","text":"Lianglun Cheng"}]},"title":"An energy-aware service composition framework for service-oriented wireless sensor networks.","venue":"SAC","pages":"408-410","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangZC14","doi":"10.1145/2554850.2555086","ee":"https://doi.org/10.1145/2554850.2555086","url":"https://dblp.org/rec/conf/sac/WangZC14"}, "url":"URL#3935398" }, { "@score":"1", "@id":"3935399", "info":{"authors":{"author":[{"@pid":"08/7439","text":"Willian Massami Watanabe"},{"@pid":"28/9853","text":"Rafael José Geraldo"},{"@pid":"48/6369","text":"Renata Pontin de Mattos Fortes"}]},"title":"Keyboard navigation mechanisms in tab widgets: an investigation on ARIA's conformance.","venue":"SAC","pages":"721-726","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WatanabeGF14","doi":"10.1145/2554850.2554947","ee":"https://doi.org/10.1145/2554850.2554947","url":"https://dblp.org/rec/conf/sac/WatanabeGF14"}, "url":"URL#3935399" }, { "@score":"1", "@id":"3935400", "info":{"authors":{"author":[{"@pid":"148/4242","text":"Charity Wayua"},{"@pid":"61/5240","text":"Komminist Weldemariam"},{"@pid":"32/843","text":"Osamuyimen Stewart"}]},"title":"Rethinking agribusiness models in Africa.","venue":"SAC","pages":"1174-1175","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WayuaWS14","doi":"10.1145/2554850.2555108","ee":"https://doi.org/10.1145/2554850.2555108","url":"https://dblp.org/rec/conf/sac/WayuaWS14"}, "url":"URL#3935400" }, { "@score":"1", "@id":"3935401", "info":{"authors":{"author":[{"@pid":"134/7639","text":"Zikai Wen"},{"@pid":"34/5882","text":"Changyu Dong"}]},"title":"Efficient protocols for private record linkage.","venue":"SAC","pages":"1688-1694","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WenD14","doi":"10.1145/2554850.2555001","ee":"https://doi.org/10.1145/2554850.2555001","url":"https://dblp.org/rec/conf/sac/WenD14"}, "url":"URL#3935401" }, { "@score":"1", "@id":"3935402", "info":{"authors":{"author":[{"@pid":"116/8807","text":"Udaya Wijenayake"},{"@pid":"85/518","text":"Soon-Yong Park"}]},"title":"Respiratory motion estimation using visual coded markers for radiotherapy.","venue":"SAC","pages":"1751-1752","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WijenayakeP14","doi":"10.1145/2554850.2559924","ee":"https://doi.org/10.1145/2554850.2559924","url":"https://dblp.org/rec/conf/sac/WijenayakeP14"}, "url":"URL#3935402" }, { "@score":"1", "@id":"3935403", "info":{"authors":{"author":[{"@pid":"148/4439","text":"Joicymara Xavier"},{"@pid":"51/4","text":"Autran Macedo"},{"@pid":"06/6499","text":"Rivalino Matias"},{"@pid":"51/9721","text":"Lucio Borges de Araujo"}]},"title":"A survey on research in software reliability engineering in the last decade.","venue":"SAC","pages":"1190-1191","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/XavierMMA14","doi":"10.1145/2554850.2555161","ee":"https://doi.org/10.1145/2554850.2555161","url":"https://dblp.org/rec/conf/sac/XavierMMA14"}, "url":"URL#3935403" }, { "@score":"1", "@id":"3935404", "info":{"authors":{"author":[{"@pid":"128/5295","text":"Miguel G. Xavier"},{"@pid":"148/4310","text":"Israel C. De Oliveira"},{"@pid":"148/4248","text":"Robson D. Dos Passos"},{"@pid":"95/5199","text":"César A. F. De Rose"}]},"title":"Towards better manageability of database clusters on cloud computing platforms.","venue":"SAC","pages":"366-367","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/XavierOPR14","doi":"10.1145/2554850.2555168","ee":"https://doi.org/10.1145/2554850.2555168","url":"https://dblp.org/rec/conf/sac/XavierOPR14"}, "url":"URL#3935404" }, { "@score":"1", "@id":"3935405", "info":{"authors":{"author":[{"@pid":"06/2072-1","text":"Xin Xia 0001"},{"@pid":"89/6793-1","text":"David Lo 0001"},{"@pid":"68/1277-1","text":"Xinyu Wang 0001"},{"@pid":"65/3628-10","text":"Bo Zhou 0010"}]},"title":"Build system analysis with link prediction.","venue":"SAC","pages":"1184-1186","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/XiaLWZ14","doi":"10.1145/2554850.2555134","ee":"https://doi.org/10.1145/2554850.2555134","url":"https://dblp.org/rec/conf/sac/XiaLWZ14"}, "url":"URL#3935405" }, { "@score":"1", "@id":"3935406", "info":{"authors":{"author":[{"@pid":"148/4263-1","text":"Yalong Yang 0001"},{"@pid":"148/4269","text":"Ning Dou"},{"@pid":"116/8682","text":"Shuai Zhao"},{"@pid":"148/4419-6","text":"Zhichao Yang 0006"},{"@pid":"29/177-1","text":"Kang Zhang 0001"},{"@pid":"30/4876","text":"Quang Vinh Nguyen"}]},"title":"Visualizing large hierarchies with drawer trees.","venue":"SAC","pages":"951-956","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YangDZYZN14","doi":"10.1145/2554850.2554870","ee":"https://doi.org/10.1145/2554850.2554870","url":"https://dblp.org/rec/conf/sac/YangDZYZN14"}, "url":"URL#3935406" }, { "@score":"1", "@id":"3935407", "info":{"authors":{"author":[{"@pid":"148/4264","text":"Geunseok Yang"},{"@pid":"15/4777-1","text":"Tao Zhang 0001"},{"@pid":"32/3534","text":"Byungjeong Lee"}]},"title":"Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively.","venue":"SAC","pages":"1134-1139","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YangZL14","doi":"10.1145/2554850.2555008","ee":"https://doi.org/10.1145/2554850.2555008","url":"https://dblp.org/rec/conf/sac/YangZL14"}, "url":"URL#3935407" }, { "@score":"1", "@id":"3935408", "info":{"authors":{"author":[{"@pid":"77/8280","text":"Roberto Sadao Yokoyama"},{"@pid":"36/804","text":"Bruno Yuji Lino Kimura"},{"@pid":"90/5238","text":"Edson dos Santos Moreira"}]},"title":"Secure positioning in a UAV swarm using on-board stereo cameras.","venue":"SAC","pages":"769-774","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YokoyamaKM14","doi":"10.1145/2554850.2555002","ee":"https://doi.org/10.1145/2554850.2555002","url":"https://dblp.org/rec/conf/sac/YokoyamaKM14"}, "url":"URL#3935408" }, { "@score":"1", "@id":"3935409", "info":{"authors":{"author":{"@pid":"122/3011","text":"Wook-Sung Yoo"}},"title":"OSBS: online storm-water billing system.","venue":"SAC","pages":"760-761","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Yoo14","doi":"10.1145/2554850.2555162","ee":"https://doi.org/10.1145/2554850.2555162","url":"https://dblp.org/rec/conf/sac/Yoo14"}, "url":"URL#3935409" }, { "@score":"1", "@id":"3935410", "info":{"authors":{"author":[{"@pid":"116/9611","text":"Seunghoon Yoo"},{"@pid":"37/8174","text":"Eunji Lee"},{"@pid":"36/1121","text":"Hyokyung Bahn"}]},"title":"The least-dirty-first cache replacement policy for phase-change memory.","venue":"SAC","pages":"1449-1454","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YooLB14","doi":"10.1145/2554850.2555023","ee":"https://doi.org/10.1145/2554850.2555023","url":"https://dblp.org/rec/conf/sac/YooLB14"}, "url":"URL#3935410" }, { "@score":"1", "@id":"3935411", "info":{"authors":{"author":[{"@pid":"61/1986","text":"Seok-Ho Yoon"},{"@pid":"03/4598","text":"Ji-Soo Kim"},{"@pid":"03/9588","text":"Jiwoon Ha"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"97/1907","text":"Minsoo Ryu"},{"@pid":"122/0749","text":"Ho Jin Choi"}]},"title":"Reachability vectors: features for link-based similarity measures.","venue":"SAC","pages":"594-597","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YoonKHKRC14","doi":"10.1145/2554850.2554906","ee":"https://doi.org/10.1145/2554850.2554906","url":"https://dblp.org/rec/conf/sac/YoonKHKRC14"}, "url":"URL#3935411" }, { "@score":"1", "@id":"3935412", "info":{"authors":{"author":[{"@pid":"08/7017","text":"Eun-Jun Yoon"},{"@pid":"92/553","text":"Kee-Young Yoo"}]},"title":"A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks.","venue":"SAC","pages":"699-705","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YoonY14","doi":"10.1145/2554850.2555045","ee":"https://doi.org/10.1145/2554850.2555045","url":"https://dblp.org/rec/conf/sac/YoonY14"}, "url":"URL#3935412" }, { "@score":"1", "@id":"3935413", "info":{"authors":{"author":[{"@pid":"148/4403","text":"Gustavo Zanatta"},{"@pid":"148/4256","text":"Giulio Dariano Bottari"},{"@pid":"91/1088","text":"Raphael Guerra"},{"@pid":"10/5959","text":"Julius C. B. Leite"}]},"title":"Building a WSN infrastructure with COTS components for the thermal monitoring of datacenters.","venue":"SAC","pages":"1443-1448","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZanattaBGL14","doi":"10.1145/2554850.2554986","ee":"https://doi.org/10.1145/2554850.2554986","url":"https://dblp.org/rec/conf/sac/ZanattaBGL14"}, "url":"URL#3935413" }, { "@score":"1", "@id":"3935414", "info":{"authors":{"author":{"@pid":"75/5629","text":"Cleber Zanchettin"}},"title":"Face recognition based on global and local features.","venue":"SAC","pages":"55-57","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Zanchettin14","doi":"10.1145/2554850.2555078","ee":"https://doi.org/10.1145/2554850.2555078","url":"https://dblp.org/rec/conf/sac/Zanchettin14"}, "url":"URL#3935414" }, { "@score":"1", "@id":"3935415", "info":{"authors":{"author":[{"@pid":"49/10638","text":"Ali Zand"},{"@pid":"v/GiovanniVigna","text":"Giovanni Vigna"},{"@pid":"y/XifengYan","text":"Xifeng Yan"},{"@pid":"k/ChristopherKruegel","text":"Christopher Kruegel"}]},"title":"Extracting probable command and control signatures for detecting botnets.","venue":"SAC","pages":"1657-1662","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZandVYK14","doi":"10.1145/2554850.2554896","ee":"https://doi.org/10.1145/2554850.2554896","url":"https://dblp.org/rec/conf/sac/ZandVYK14"}, "url":"URL#3935415" }, { "@score":"1", "@id":"3935416", "info":{"authors":{"author":[{"@pid":"31/8199","text":"Eva Zangerle"},{"@pid":"s/GuntherSpecht","text":"Günther Specht"}]},"title":""Sorry, I was hacked": a classification of compromised twitter accounts.","venue":"SAC","pages":"587-593","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZangerleS14","doi":"10.1145/2554850.2554894","ee":"https://doi.org/10.1145/2554850.2554894","url":"https://dblp.org/rec/conf/sac/ZangerleS14"}, "url":"URL#3935416" }, { "@score":"1", "@id":"3935417", "info":{"authors":{"author":[{"@pid":"148/4429","text":"Shehnila Zardari"},{"@pid":"61/4460","text":"Rami Bahsoon"},{"@pid":"96/2780","text":"Anikó Ekárt"}]},"title":"Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP.","venue":"SAC","pages":"1013-1020","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZardariBE14","doi":"10.1145/2554850.2555067","ee":"https://doi.org/10.1145/2554850.2555067","url":"https://dblp.org/rec/conf/sac/ZardariBE14"}, "url":"URL#3935417" }, { "@score":"1", "@id":"3935418", "info":{"authors":{"author":[{"@pid":"20/10575","text":"Niels Zeilemaker"},{"@pid":"148/4405","text":"Boudewijn Schoon"},{"@pid":"p/JohanAPouwelse","text":"Johan A. Pouwelse"}]},"title":"Large-scale message synchronization in challenged networks.","venue":"SAC","pages":"481-488","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZeilemakerSP14","doi":"10.1145/2554850.2554908","ee":"https://doi.org/10.1145/2554850.2554908","url":"https://dblp.org/rec/conf/sac/ZeilemakerSP14"}, "url":"URL#3935418" }, { "@score":"1", "@id":"3935419", "info":{"authors":{"author":[{"@pid":"148/4387","text":"Kelie Zhan"},{"@pid":"l/ChungHorngLung","text":"Chung-Horng Lung"},{"@pid":"119/5706","text":"Pradeep Srivastava"}]},"title":"A green analysis of mobile cloud computing applications.","venue":"SAC","pages":"357-362","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhanLS14","doi":"10.1145/2554850.2555069","ee":"https://doi.org/10.1145/2554850.2555069","url":"https://dblp.org/rec/conf/sac/ZhanLS14"}, "url":"URL#3935419" }, { "@score":"1", "@id":"3935420", "info":{"authors":{"author":[{"@pid":"136/4735","text":"Xiaoqiong Zhao"},{"@pid":"06/2072-1","text":"Xin Xia 0001"},{"@pid":"128/5691","text":"Pavneet Singh Kochhar"},{"@pid":"89/6793-1","text":"David Lo 0001"},{"@pid":"35/1103","text":"Shanping Li"}]},"title":"An empirical study of bugs in build process.","venue":"SAC","pages":"1187-1189","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhaoXKLL14","doi":"10.1145/2554850.2555142","ee":"https://doi.org/10.1145/2554850.2555142","url":"https://dblp.org/rec/conf/sac/ZhaoXKLL14"}, "url":"URL#3935420" }, { "@score":"1", "@id":"3935421", "info":{"authors":{"author":{"@pid":"97/8630-1","text":"Yong Zheng 0001"}},"title":"Semi-supervised context-aware matrix factorization: using contexts in a way of "latent" factors.","venue":"SAC","pages":"292-293","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Zheng14","doi":"10.1145/2554850.2555195","ee":"https://doi.org/10.1145/2554850.2555195","url":"https://dblp.org/rec/conf/sac/Zheng14"}, "url":"URL#3935421" }, { "@score":"1", "@id":"3935422", "info":{"authors":{"author":[{"@pid":"97/8630-1","text":"Yong Zheng 0001"},{"@pid":"58/2337","text":"Robin D. Burke"},{"@pid":"01/4475","text":"Bamshad Mobasher"}]},"title":"Splitting approaches for context-aware recommendation: an empirical study.","venue":"SAC","pages":"274-279","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhengBM14","doi":"10.1145/2554850.2554989","ee":"https://doi.org/10.1145/2554850.2554989","url":"https://dblp.org/rec/conf/sac/ZhengBM14"}, "url":"URL#3935422" }, { "@score":"1", "@id":"3935423", "info":{"authors":{"author":[{"@pid":"54/4415","text":"Tewfik Ziadi"},{"@pid":"122/2837","text":"Christopher Henard"},{"@pid":"00/7677","text":"Mike Papadakis"},{"@pid":"30/976","text":"Mikal Ziane"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"Towards a language-independent approach for reverse-engineering of software product lines.","venue":"SAC","pages":"1064-1071","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZiadiHPZT14","doi":"10.1145/2554850.2554874","ee":"https://doi.org/10.1145/2554850.2554874","url":"https://dblp.org/rec/conf/sac/ZiadiHPZT14"}, "url":"URL#3935423" }, { "@score":"1", "@id":"3935424", "info":{"authors":{"author":[{"@pid":"70/11497","text":"Max Zimmermann"},{"@pid":"n/IreneNtoutsi","text":"Eirini Ntoutsi"},{"@pid":"s/MyraSpiliopoulou","text":"Myra Spiliopoulou"}]},"title":"Adaptive semi supervised opinion classifier with forgetting mechanism.","venue":"SAC","pages":"805-812","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZimmermannNS14","doi":"10.1145/2554850.2555039","ee":"https://doi.org/10.1145/2554850.2555039","url":"https://dblp.org/rec/conf/sac/ZimmermannNS14"}, "url":"URL#3935424" }, { "@score":"1", "@id":"3965161", "info":{"authors":{"author":[{"@pid":"92/4612","text":"Yookun Cho"},{"@pid":"84/775","text":"Sung Y. Shin"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"71/4625","text":"Chih-Cheng Hung"},{"@pid":"35/2218","text":"Jiman Hong"}]},"title":"Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014","venue":"SAC","publisher":"ACM","year":"2014","type":"Editorship","key":"conf/sac/2014","ee":"http://dl.acm.org/citation.cfm?id=2554850","url":"https://dblp.org/rec/conf/sac/2014"}, "url":"URL#3965161" } ] } } } )