| 2016 | 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016 |
| 2016 | A Case Study on SoaML to Design an Electronic Health Record Application Considering Integration of Legacy Systems. Joyce M. S. França, Josimar de S. Lima, Michel S. Soares |
| 2016 | A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud. Ragib Hasan, Rasib Khan |
| 2016 | A Cloud-Based Immersive Learning Environment for Distributed Systems Algorithms. Yogesh D. Barve, Prithviraj Patil, Aniruddha S. Gokhale |
| 2016 | A Comparative Study of the Effects of Pull Request on GitHub Projects. Jing Liu, Jiahao Li, Lulu He |
| 2016 | A Cross-Layer Multicast-Push Unicast-Pull (MPUP) Architecture for Reliable File-Stream Distribution. Shuoshuo Chen, Xiang Ji, Malathi Veeraraghavan, Steve Emmerson, Joseph Slezak, Steven G. Decker |
| 2016 | A Healthcare Support System for Assisted Living Facilities: An IoT Solution. Fulvio Corno, Luigi De Russis, Alberto Monge Roffarello |
| 2016 | A Next Application Prediction Service Using the BaranC Framework. Mohammad Hashemi, John Herbert |
| 2016 | A One-Class NIDS for SDN-Based SCADA Systems. Eduardo Germano da Silva, Anderson Santos da Silva, Juliano Araújo Wickboldt, Paul Smith, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho |
| 2016 | A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities. Kazi Zakia Sultana, Ajay Deo, Byron J. Williams |
| 2016 | A Strategy to Determine When to Stop Using Automatic Bug Localization. Zhendong Shi, Jacky W. Keung, Kwabena Ebo Bennin, Nachai Limsettho, Qinbao Song |
| 2016 | A Text Information Retrieval Method by Integrating Global and Local Textual Information. Zhibo Wang, Yanqing Zhang |
| 2016 | Academic Performance Prediction Using Chance Discovery from Online Discussion Forums. Gary K. W. Wong, Simon Y. K. Li |
| 2016 | Adaptive Reasoning for Context-Sensitive Access Controls. Sara Sartoli, Akbar Siami Namin |
| 2016 | Adaptive Reasoning in the Presence of Imperfect Security Requirements. Sara Sartoli, Akbar Siami Namin |
| 2016 | An Advanced Collusion Attack against User Friendship Privacy in OSNs. Yuhong Liu, Na Li |
| 2016 | An Approach for Iteratively Generating Adequate Tests in Metamorphic Testing: A Case Study. Junhua Ding, Dongmei Zhang |
| 2016 | An Approach to Using Existing Online Education Tools to Support Practical Education on MOOCs. Yanchun Sun, Zijian Qiao, Dejian Chen, Chao Xin, Wenpin Jiao |
| 2016 | An Assessment of Internet of Things Protocols for Resource-Constrained Applications. Dae-Hyeok Mun, Minh Le Dinh, Young-Woo Kwon |
| 2016 | An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability. Lei Liu, Jing Xu, Hongji Yang, Chenkai Guo, Jiehui Kang, Sihan Xu, Biao Zhang, Guannan Si |
| 2016 | Analysis of Message Delivery Delay in Geographic DTN Routing. Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki |
| 2016 | Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models Generated by Mining Event-Log Data in Issue Tracking Systems. Prerna Juneja, Divya Kundra, Ashish Sureka |
| 2016 | Apsaras: Efficient Allocation of Physical Devices for Android Testing. Tianchi Liu, Chun Cao, Jie Chen, Ziling Lu, Xiaoxing Ma |
| 2016 | Authenticating Multiple User-Defined Spatial Queries. Yong Wang, Shi-meng Gao, Junhao Zhang, Xiao Nie, Xiaoran Duan, Juguang Chen |
| 2016 | Automated Identification of High Impact Bug Reports Leveraging Imbalanced Learning Strategies. Xinli Yang, David Lo, Qiao Huang, Xin Xia, Jianling Sun |
| 2016 | Automated Program Repair by Using Similar Code Containing Fix Ingredients. Tao Ji, Liqian Chen, Xiaoguang Mao, Xin Yi |
| 2016 | Automatic Fix for C Integer Errors by Precision Improvement. Xi Cheng, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun |
| 2016 | Big Graph Analytics: Models, Platforms and Optimizations. Ling Liu |
| 2016 | Big Holes in Big Data: A Monte Carlo Algorithm for Detecting Large Hyper-Rectangles in High Dimensional Data. Joseph Lemley, Filip Jagodzinski, Razvan Andonie |
| 2016 | Building a Large-Scale Distributed Live Video Analysis System for Movement of Pedestrians in Urban Areas. Yuuichi Teranishi, Nozomu Nishinaga |
| 2016 | Can You Really Make Profit from Online Rating Manipulations?: An Empirical Study. Yuhong Liu, Wenqi Zhou |
| 2016 | Causal Consistency for Distributed Data Stores and Applications as They are. Kazuyuki Shudo, Takashi Yaguchi |
| 2016 | Centrality and Cluster Analysis of Yelp Mutual Customer Business Graph. Brian McClanahan, Swapna S. Gokhale |
| 2016 | Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation. Shams Zawoad, Ragib Hasan |
| 2016 | Code Coverage-Based Failure Proximity without Test Oracles. Jingxuan Tu, Xiaoyuan Xie, Baowen Xu |
| 2016 | Communication and Security in Health Monitoring Systems - A Review. Hossein Fotouhi, Aida Causevic, Kristina Lundqvist, Mats Björkman |
| 2016 | Community Detection in Large Social Networks Based on Relationship Density. Xiang Li, Yong Tan, Ziyang Zhang, Qiuli Tong |
| 2016 | Condensing Class Diagrams With Minimal Manual Labeling Cost. Xinli Yang, David Lo, Xin Xia, Jianling Sun |
| 2016 | Customized Cloud Service Trustworthiness Evaluation and Comparison Using Fuzzy Neural Networks. Zhengping Wu, Yu Zhou |
| 2016 | Cyber Foraging and Offloading Framework for Internet of Things. Prithviraj Patil, Akram Hakiri, Aniruddha S. Gokhale |
| 2016 | DPMS: A Swift Data Dissemination Protocol Based on Map Splitting. Sabri Allani, Taoufik Yeferny, Richard Chbeir, Sadok Ben Yahia |
| 2016 | DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files. Hui Yang, Xiaobing Sun, Bin Li, Yucong Duan |
| 2016 | Data Security and Privacy: Concepts, Approaches, and Research Directions. Elisa Bertino |
| 2016 | Data-Intensive Research & Scientific Discovery. Simon Y. Liu |
| 2016 | Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information. Yong Jin, Masahiko Tomoishi, Satoshi Matsuura |
| 2016 | Designing SSD-Friendly Applications for Better Application Performance and Higher IO Efficiency. Zhenyun Zhuang, Sergiy Zhuk, Haricharan Ramachandra, Badri Sridharan |
| 2016 | Designing [Secure] Complex Critical Public Infrastructure. Aditya P. Mathur |
| 2016 | Detecting Weak Changes over a Network of Streaming Events. Yao Xie |
| 2016 | Determine Configuration Entry Correlations for Web Application Systems. Wei Chen, Heng Wu, Jun Wei, Hua Zhong, Tao Huang |
| 2016 | EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda |
| 2016 | Entity Type Recognition Using an Ensemble of Distributional Semantic Models to Enhance Query Understanding. Walid Shalaby, Khalifeh AlJadda, Mohammed Korayem, Trey Grainger |
| 2016 | Evaluating Security and Privacy in Cloud Services. Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Frederick T. Sheldon |
| 2016 | Exploring the Instability of Spectra Based Fault Localization Performance. Yuanchi Guo, Xiaoyi Zhang, Zheng Zheng |
| 2016 | Fusing Static and Roving Sensor Data for Detecting Highway Traffic Conditions in Real Time. Beihong Jin, Yanling Cui, Fusang Zhang |
| 2016 | GPU-Aware Genetic Estimation of Hidden Markov Models for Workload Classification Problems. Alfredo Cuzzocrea, Enzo Mumolo, Nicola Timeus, Gianni Viardo Vercelli |
| 2016 | GRETA: Graph-Based Tag Assignment for GitHub Repositories. Xuyang Cai, Jiangang Zhu, Beijun Shen, Yuting Chen |
| 2016 | General Framework for Task Scheduling and Resource Provisioning in Cloud Computing Systems. Xiaomin Zhu, Yabing Zha, Ling Liu, Peng Jiao |
| 2016 | Generalized Attacker and Attack Models for Cyber Physical Systems. Sridhar Adepu, Aditya Mathur |
| 2016 | Graph Based Agent Oriented Model for Tunnel Simulation. Sanish Rai, Xiaolin Hu |
| 2016 | How IT Leadership Will Change by 2020 and Why it Matters. Joseph Williams |
| 2016 | How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis. Ragib Hasan, Shams Zawoad, Shahid Al Noor, Md Munirul Haque, Darrell Burke |
| 2016 | Human Subject Evaluation of Computer-Security Training Recommender. Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen |
| 2016 | Implementing an Open-Access, Data Science Programming Environment for Learners. Austin Cory Bart, Javier Tibau, Eli Tilevich, Clifford A. Shaffer, Dennis G. Kafura |
| 2016 | Improved Co-Simulation with Event Detection for Stochastic Behaviors of CPSs. Jufu Liu, Kaiqiang Jiang, Xiao Wang, Bei Cheng, Dehui Du |
| 2016 | Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity Diagrams. Haiying Sun, Mingsong Chen, Min Zhang, Jing Liu, Ying Zhang |
| 2016 | Improving Failure Detection by Automatically Generating Test Cases Near the Boundaries. Min Zhou, Xi Cheng, Xinrui Guo, Ming Gu, Hongyu Zhang, Xiaoyu Song |
| 2016 | Integrating Version Control in a Standardized Service-Oriented Tool Chain. Luka Lednicki, Gaetana Sapienza, Morgan E. Johansson, Tiberiu Seceleanu, Daniel Hallmans |
| 2016 | Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain. Yan Zhu, Ruiqi Guo, Guohua Gan, Wei-Tek Tsai |
| 2016 | Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction Models. Kwabena Ebo Bennin, Jacky W. Keung, Akito Monden, Yasutaka Kamei, Naoyasu Ubayashi |
| 2016 | It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta Features. Xin Xia, David Lo, Denzil Correa, Ashish Sureka, Emad Shihab |
| 2016 | JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. Yufei Jiang, Dinghao Wu, Peng Liu |
| 2016 | Learning the Social Web: A Multidisciplinary Approach. Luigi De Russis, Laura Farinetti, Gabriella Taddeo |
| 2016 | LogOptPlus: Learning to Optimize Logging in Catch and If Programming Constructs. Sangeeta Lal, Neetu Sardana, Ashish Sureka |
| 2016 | Maintaining User Interface Integrity on Android. Abeer Al Jarrah, Mohamed Shehab |
| 2016 | Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models. Minzhe Guo, Prabir Bhattacharya |
| 2016 | Message from the CELT Organizing Committee. Edmundo Tovar, Manuel Castro, Claudio Demartini, Tiziana Margaria, Henry C. B. Chan, Timothy K. Shih, Simanta Mitra, Sorel Reisman |
| 2016 | Message from the Doctoral Symposium Co-Chairs. Mohammad Adibuzzaman, Hiroyuki Ohsaki, Satish Puri, Qinghua Lu |
| 2016 | Message from the HCSC Organizing Committee. Yuhong Liu, Symeon Papadopoulos, Rene Kaiser, Moushumi Sharmin |
| 2016 | Message from the ITiP Symposium Chairs. Maria R. Lee, San Murugesan, Steven Diamond |
| 2016 | Message from the MOWU Organizing Committee. J. Morris Chang, Hong Va Leong, Paolo Bellavista, Vladimir Getov |
| 2016 | Message from the NATA Organizing Committee. Ali R. Hurson, Ji-Jiang Yang, Behrooz A. Shirazi, Alfredo Cuzzocrea, Toyokazu Akiyama, Sahra Sedigh Sarvestani, Sheikh Iqbal Ahamed |
| 2016 | Message from the SEPT Organizing Committee. Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino |
| 2016 | Message from the SETA Organizing Committee. Doris L. Carver, Wing Kwong Chan, Hongji Yang, Xiaodong Liu, Carl K. Chang, Hridesh Rajan |
| 2016 | Message from the TAIN Program Co-chairs. Tugkan Tuglular, Ying Cai |
| 2016 | Message from the WEDA 2016 Program Chairs. Tugkan Tuglular, Ying Cai, Duygu Çelik, Mei-Ling Shyu, Tian Xia |
| 2016 | Messge from the ECPE Organizing Committee. Tiberiu Seceleanu, Tiziana Margaria, Rajesh Subramanyan, Michele Bugliesi, Cristina Seceleanu, Bruce M. McMillin |
| 2016 | Mitigating an Oxymoron: Compliance in a DevOps Environments. John R. Michener, Aaron T. Clager |
| 2016 | Model-Driven Optimization of Data-Adaptable Embedded Systems. Adrian Lizarraga, Roman L. Lysecky, Jonathan Sprinkle |
| 2016 | Modeling and Analyzing Cost and Utilization Based Task Scheduling for Cloud Application. Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu |
| 2016 | Modeling and Verifying HDFS Using CSP. Wanling Xie, Huibiao Zhu, Xi Wu, Shuangqing Xiang, Jian Guo |
| 2016 | On Automatic Summarization of What and Why Information in Source Code Changes. Jinfeng Shen, Xiaobing Sun, Bin Li, Hui Yang, Jiajun Hu |
| 2016 | Opportunities and Challenges of Social Media in Personal and Societal Well-being. Munmun De Choudhury |
| 2016 | Performance Comparison of Shortest-Path Routing and Optimal Detour Routing in Content-Centric Networking. Ryo Nakamura, Hiroyuki Ohsaki |
| 2016 | Prioritizing Interaction Test Suites Using Repeated Base Choice Coverage. Rubing Huang, Weiwen Zong, Jinfu Chen, Dave Towey, Yunan Zhou, Deng Chen |
| 2016 | Probabilistic Sequence Modeling for Trustworthy IT Servicing by Collective Expert Networks. Kayhan Moharreri, Jayashree Ramanathan, Rajiv Ramnath |
| 2016 | Reasoning for CPS Education Using Surrogate Simulation Models. Shunxing Bao, Joe Porter, Aniruddha S. Gokhale |
| 2016 | Reliability Analysis for Software Cluster Systems Based on Proportional Hazard Model. Chunyan Hou, Chen Chen, Jinsong Wang, Kai Shi |
| 2016 | Requirements are the New Code. Daniel Conte de Leon, Sanjeev Shrestha |
| 2016 | Risk Assessment for a Global Air Transport System Using Socioeconomic-Technological-Environmental Databases. Aki-Hiro Sato, Hidefumi Sawai |
| 2016 | SOLinker: Constructing Semantic Links between Tags and URLs on StackOverflow. Wenkai Mo, Jiangang Zhu, Zhenzheng Qian, Beijun Shen |
| 2016 | Safety Requirements Specification and Verification for Railway Interlocking Systems. Li Han, Jing Liu, Tingliang Zhou, Junfeng Sun, Xiaohong Chen |
| 2016 | SatiIndicator: Leveraging User Reviews to Evaluate User Satisfaction of SourceForge Projects. Zhenzheng Qian, Beijun Shen, Wenkai Mo, Yuting Chen |
| 2016 | Scope of Selection Nodes in Object Oriented Programs. Hend Alrasheed, Austin Melton |
| 2016 | Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping Modes. Zihao Tang, Yao Guo, Xiangqun Chen |
| 2016 | Situation-Oriented Requirements Elicitation. Nimanthi L. Atukorala, Carl K. Chang, Katsunori Oyama |
| 2016 | Software Defect Prediction Using Semi-Supervised Learning with Change Burst Information. Qing He, Beijun Shen, Yuting Chen |
| 2016 | SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale. Changyuan Wang, Zongfei Lu, Yang Liu, Shanqing Guo, Xin-Shun Xu, Shijun Liu, Li-zhen Cui |
| 2016 | Stage-Based Generative Learning Object Model to Support Automatic Content Generation and Adaptation. Vytautas Stuikys, Renata Burbaite, Kristina Bespalova, Vida Drasute, Giedrius Ziberkas, Algimantas Venckauskas |
| 2016 | Supporting Learners in Online Courses Through Pair Programming and Live Coding. Seyed Soroush Ghorashi, Carlos Jensen |
| 2016 | Temporal Dependency Rule Learning Based Group Activity Recognition in Smart Spaces. Amine Lotfi Bourbia, Heesuk Son, Byoungheon Shin, Taehun Kim, Dongman Lee, Soon J. Hyun |
| 2016 | Text Mining Analysis in Turkish Language Using Big Data Tools. Mehmet Ulas Cakir, Seren Guldamlasioglu |
| 2016 | The Cost of Syntax and How to Avoid It: Text versus Frame-Based Editing. Amjad AlTadmri, Michael Kölling, Neil C. C. Brown |
| 2016 | The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users. Rasib Khan, Ragib Hasan |
| 2016 | Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications. Shuo Wen, Yuan Xue, Jing Xu, Hongji Yang, Xiaohong Li, Wenli Song, Guannan Si |
| 2016 | Toward More Robust Automatic Analysis of Student Program Outputs for Assessment and Learning. Chung Keung Poon, Tak-Lam Wong, Yuen-Tak Yu, Victor C. S. Lee, Chung Man Tang |
| 2016 | Towards Correlating Search on Google and Asking on Stack Overflow. Chunyang Chen, Zhenchang Xing |
| 2016 | Towards Dementia-Friendly Smart Homes. Mohsen Amiribesheli, Abdelhamid Bouchachia |
| 2016 | Towards Realizing a Self-Protecting Healthcare Information System. Qian Chen, Jonathan Lambright |
| 2016 | TripleFCA: FCA-Based Approach to Enhance Semantic Web Data Management. Saleh Albahli, Austin Melton |
| 2016 | User Identification of Pseudonyms without Identity Information Exposure in Access Federations. Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura |
| 2016 | Using Object-Oriented Big Data Analytics to Reveal Server Performance Dead Zone. Huihong He, Haibin Zhai, Qian Liu, Yong Wang |
| 2016 | Verification of Reconfigurable NoC under Quality of Service Constraints. Hela Ben Salah, Adel Benzina, Mohamed Khalgui |
| 2016 | Which Learning Outcomes Should I Acquire? A Bar Chart-Based Semantic System for Visually Comparing Learners' Acquirements with Labor Market Requirements. Valentina Gatteschi, Fabrizio Lamberti, Gianluca Paravati, Alessandro Raso, Claudio Giovanni Demartini |
| 2016 | Your Walk is My Command: Gait Detection on Unconstrained Smartphone Using IoT System. A. K. M. Jahangir Alam Majumder, Piyush Saxena, Sheikh Iqbal Ahamed |