COMPSAC B

124 papers

YearTitle / Authors
201640th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016
2016A Case Study on SoaML to Design an Electronic Health Record Application Considering Integration of Legacy Systems.
Joyce M. S. França, Josimar de S. Lima, Michel S. Soares
2016A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud.
Ragib Hasan, Rasib Khan
2016A Cloud-Based Immersive Learning Environment for Distributed Systems Algorithms.
Yogesh D. Barve, Prithviraj Patil, Aniruddha S. Gokhale
2016A Comparative Study of the Effects of Pull Request on GitHub Projects.
Jing Liu, Jiahao Li, Lulu He
2016A Cross-Layer Multicast-Push Unicast-Pull (MPUP) Architecture for Reliable File-Stream Distribution.
Shuoshuo Chen, Xiang Ji, Malathi Veeraraghavan, Steve Emmerson, Joseph Slezak, Steven G. Decker
2016A Healthcare Support System for Assisted Living Facilities: An IoT Solution.
Fulvio Corno, Luigi De Russis, Alberto Monge Roffarello
2016A Next Application Prediction Service Using the BaranC Framework.
Mohammad Hashemi, John Herbert
2016A One-Class NIDS for SDN-Based SCADA Systems.
Eduardo Germano da Silva, Anderson Santos da Silva, Juliano Araújo Wickboldt, Paul Smith, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho
2016A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities.
Kazi Zakia Sultana, Ajay Deo, Byron J. Williams
2016A Strategy to Determine When to Stop Using Automatic Bug Localization.
Zhendong Shi, Jacky W. Keung, Kwabena Ebo Bennin, Nachai Limsettho, Qinbao Song
2016A Text Information Retrieval Method by Integrating Global and Local Textual Information.
Zhibo Wang, Yanqing Zhang
2016Academic Performance Prediction Using Chance Discovery from Online Discussion Forums.
Gary K. W. Wong, Simon Y. K. Li
2016Adaptive Reasoning for Context-Sensitive Access Controls.
Sara Sartoli, Akbar Siami Namin
2016Adaptive Reasoning in the Presence of Imperfect Security Requirements.
Sara Sartoli, Akbar Siami Namin
2016An Advanced Collusion Attack against User Friendship Privacy in OSNs.
Yuhong Liu, Na Li
2016An Approach for Iteratively Generating Adequate Tests in Metamorphic Testing: A Case Study.
Junhua Ding, Dongmei Zhang
2016An Approach to Using Existing Online Education Tools to Support Practical Education on MOOCs.
Yanchun Sun, Zijian Qiao, Dejian Chen, Chao Xin, Wenpin Jiao
2016An Assessment of Internet of Things Protocols for Resource-Constrained Applications.
Dae-Hyeok Mun, Minh Le Dinh, Young-Woo Kwon
2016An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability.
Lei Liu, Jing Xu, Hongji Yang, Chenkai Guo, Jiehui Kang, Sihan Xu, Biao Zhang, Guannan Si
2016Analysis of Message Delivery Delay in Geographic DTN Routing.
Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki
2016Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models Generated by Mining Event-Log Data in Issue Tracking Systems.
Prerna Juneja, Divya Kundra, Ashish Sureka
2016Apsaras: Efficient Allocation of Physical Devices for Android Testing.
Tianchi Liu, Chun Cao, Jie Chen, Ziling Lu, Xiaoxing Ma
2016Authenticating Multiple User-Defined Spatial Queries.
Yong Wang, Shi-meng Gao, Junhao Zhang, Xiao Nie, Xiaoran Duan, Juguang Chen
2016Automated Identification of High Impact Bug Reports Leveraging Imbalanced Learning Strategies.
Xinli Yang, David Lo, Qiao Huang, Xin Xia, Jianling Sun
2016Automated Program Repair by Using Similar Code Containing Fix Ingredients.
Tao Ji, Liqian Chen, Xiaoguang Mao, Xin Yi
2016Automatic Fix for C Integer Errors by Precision Improvement.
Xi Cheng, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun
2016Big Graph Analytics: Models, Platforms and Optimizations.
Ling Liu
2016Big Holes in Big Data: A Monte Carlo Algorithm for Detecting Large Hyper-Rectangles in High Dimensional Data.
Joseph Lemley, Filip Jagodzinski, Razvan Andonie
2016Building a Large-Scale Distributed Live Video Analysis System for Movement of Pedestrians in Urban Areas.
Yuuichi Teranishi, Nozomu Nishinaga
2016Can You Really Make Profit from Online Rating Manipulations?: An Empirical Study.
Yuhong Liu, Wenqi Zhou
2016Causal Consistency for Distributed Data Stores and Applications as They are.
Kazuyuki Shudo, Takashi Yaguchi
2016Centrality and Cluster Analysis of Yelp Mutual Customer Business Graph.
Brian McClanahan, Swapna S. Gokhale
2016Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation.
Shams Zawoad, Ragib Hasan
2016Code Coverage-Based Failure Proximity without Test Oracles.
Jingxuan Tu, Xiaoyuan Xie, Baowen Xu
2016Communication and Security in Health Monitoring Systems - A Review.
Hossein Fotouhi, Aida Causevic, Kristina Lundqvist, Mats Björkman
2016Community Detection in Large Social Networks Based on Relationship Density.
Xiang Li, Yong Tan, Ziyang Zhang, Qiuli Tong
2016Condensing Class Diagrams With Minimal Manual Labeling Cost.
Xinli Yang, David Lo, Xin Xia, Jianling Sun
2016Customized Cloud Service Trustworthiness Evaluation and Comparison Using Fuzzy Neural Networks.
Zhengping Wu, Yu Zhou
2016Cyber Foraging and Offloading Framework for Internet of Things.
Prithviraj Patil, Akram Hakiri, Aniruddha S. Gokhale
2016DPMS: A Swift Data Dissemination Protocol Based on Map Splitting.
Sabri Allani, Taoufik Yeferny, Richard Chbeir, Sadok Ben Yahia
2016DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files.
Hui Yang, Xiaobing Sun, Bin Li, Yucong Duan
2016Data Security and Privacy: Concepts, Approaches, and Research Directions.
Elisa Bertino
2016Data-Intensive Research & Scientific Discovery.
Simon Y. Liu
2016Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information.
Yong Jin, Masahiko Tomoishi, Satoshi Matsuura
2016Designing SSD-Friendly Applications for Better Application Performance and Higher IO Efficiency.
Zhenyun Zhuang, Sergiy Zhuk, Haricharan Ramachandra, Badri Sridharan
2016Designing [Secure] Complex Critical Public Infrastructure.
Aditya P. Mathur
2016Detecting Weak Changes over a Network of Streaming Events.
Yao Xie
2016Determine Configuration Entry Correlations for Web Application Systems.
Wei Chen, Heng Wu, Jun Wei, Hua Zhong, Tao Huang
2016EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails.
Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda
2016Entity Type Recognition Using an Ensemble of Distributional Semantic Models to Enhance Query Understanding.
Walid Shalaby, Khalifeh AlJadda, Mohammed Korayem, Trey Grainger
2016Evaluating Security and Privacy in Cloud Services.
Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Frederick T. Sheldon
2016Exploring the Instability of Spectra Based Fault Localization Performance.
Yuanchi Guo, Xiaoyi Zhang, Zheng Zheng
2016Fusing Static and Roving Sensor Data for Detecting Highway Traffic Conditions in Real Time.
Beihong Jin, Yanling Cui, Fusang Zhang
2016GPU-Aware Genetic Estimation of Hidden Markov Models for Workload Classification Problems.
Alfredo Cuzzocrea, Enzo Mumolo, Nicola Timeus, Gianni Viardo Vercelli
2016GRETA: Graph-Based Tag Assignment for GitHub Repositories.
Xuyang Cai, Jiangang Zhu, Beijun Shen, Yuting Chen
2016General Framework for Task Scheduling and Resource Provisioning in Cloud Computing Systems.
Xiaomin Zhu, Yabing Zha, Ling Liu, Peng Jiao
2016Generalized Attacker and Attack Models for Cyber Physical Systems.
Sridhar Adepu, Aditya Mathur
2016Graph Based Agent Oriented Model for Tunnel Simulation.
Sanish Rai, Xiaolin Hu
2016How IT Leadership Will Change by 2020 and Why it Matters.
Joseph Williams
2016How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
Ragib Hasan, Shams Zawoad, Shahid Al Noor, Md Munirul Haque, Darrell Burke
2016Human Subject Evaluation of Computer-Security Training Recommender.
Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen
2016Implementing an Open-Access, Data Science Programming Environment for Learners.
Austin Cory Bart, Javier Tibau, Eli Tilevich, Clifford A. Shaffer, Dennis G. Kafura
2016Improved Co-Simulation with Event Detection for Stochastic Behaviors of CPSs.
Jufu Liu, Kaiqiang Jiang, Xiao Wang, Bei Cheng, Dehui Du
2016Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity Diagrams.
Haiying Sun, Mingsong Chen, Min Zhang, Jing Liu, Ying Zhang
2016Improving Failure Detection by Automatically Generating Test Cases Near the Boundaries.
Min Zhou, Xi Cheng, Xinrui Guo, Ming Gu, Hongyu Zhang, Xiaoyu Song
2016Integrating Version Control in a Standardized Service-Oriented Tool Chain.
Luka Lednicki, Gaetana Sapienza, Morgan E. Johansson, Tiberiu Seceleanu, Daniel Hallmans
2016Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain.
Yan Zhu, Ruiqi Guo, Guohua Gan, Wei-Tek Tsai
2016Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction Models.
Kwabena Ebo Bennin, Jacky W. Keung, Akito Monden, Yasutaka Kamei, Naoyasu Ubayashi
2016It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta Features.
Xin Xia, David Lo, Denzil Correa, Ashish Sureka, Emad Shihab
2016JRed: Program Customization and Bloatware Mitigation Based on Static Analysis.
Yufei Jiang, Dinghao Wu, Peng Liu
2016Learning the Social Web: A Multidisciplinary Approach.
Luigi De Russis, Laura Farinetti, Gabriella Taddeo
2016LogOptPlus: Learning to Optimize Logging in Catch and If Programming Constructs.
Sangeeta Lal, Neetu Sardana, Ashish Sureka
2016Maintaining User Interface Integrity on Android.
Abeer Al Jarrah, Mohamed Shehab
2016Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models.
Minzhe Guo, Prabir Bhattacharya
2016Message from the CELT Organizing Committee.
Edmundo Tovar, Manuel Castro, Claudio Demartini, Tiziana Margaria, Henry C. B. Chan, Timothy K. Shih, Simanta Mitra, Sorel Reisman
2016Message from the Doctoral Symposium Co-Chairs.
Mohammad Adibuzzaman, Hiroyuki Ohsaki, Satish Puri, Qinghua Lu
2016Message from the HCSC Organizing Committee.
Yuhong Liu, Symeon Papadopoulos, Rene Kaiser, Moushumi Sharmin
2016Message from the ITiP Symposium Chairs.
Maria R. Lee, San Murugesan, Steven Diamond
2016Message from the MOWU Organizing Committee.
J. Morris Chang, Hong Va Leong, Paolo Bellavista, Vladimir Getov
2016Message from the NATA Organizing Committee.
Ali R. Hurson, Ji-Jiang Yang, Behrooz A. Shirazi, Alfredo Cuzzocrea, Toyokazu Akiyama, Sahra Sedigh Sarvestani, Sheikh Iqbal Ahamed
2016Message from the SEPT Organizing Committee.
Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino
2016Message from the SETA Organizing Committee.
Doris L. Carver, Wing Kwong Chan, Hongji Yang, Xiaodong Liu, Carl K. Chang, Hridesh Rajan
2016Message from the TAIN Program Co-chairs.
Tugkan Tuglular, Ying Cai
2016Message from the WEDA 2016 Program Chairs.
Tugkan Tuglular, Ying Cai, Duygu Çelik, Mei-Ling Shyu, Tian Xia
2016Messge from the ECPE Organizing Committee.
Tiberiu Seceleanu, Tiziana Margaria, Rajesh Subramanyan, Michele Bugliesi, Cristina Seceleanu, Bruce M. McMillin
2016Mitigating an Oxymoron: Compliance in a DevOps Environments.
John R. Michener, Aaron T. Clager
2016Model-Driven Optimization of Data-Adaptable Embedded Systems.
Adrian Lizarraga, Roman L. Lysecky, Jonathan Sprinkle
2016Modeling and Analyzing Cost and Utilization Based Task Scheduling for Cloud Application.
Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu
2016Modeling and Verifying HDFS Using CSP.
Wanling Xie, Huibiao Zhu, Xi Wu, Shuangqing Xiang, Jian Guo
2016On Automatic Summarization of What and Why Information in Source Code Changes.
Jinfeng Shen, Xiaobing Sun, Bin Li, Hui Yang, Jiajun Hu
2016Opportunities and Challenges of Social Media in Personal and Societal Well-being.
Munmun De Choudhury
2016Performance Comparison of Shortest-Path Routing and Optimal Detour Routing in Content-Centric Networking.
Ryo Nakamura, Hiroyuki Ohsaki
2016Prioritizing Interaction Test Suites Using Repeated Base Choice Coverage.
Rubing Huang, Weiwen Zong, Jinfu Chen, Dave Towey, Yunan Zhou, Deng Chen
2016Probabilistic Sequence Modeling for Trustworthy IT Servicing by Collective Expert Networks.
Kayhan Moharreri, Jayashree Ramanathan, Rajiv Ramnath
2016Reasoning for CPS Education Using Surrogate Simulation Models.
Shunxing Bao, Joe Porter, Aniruddha S. Gokhale
2016Reliability Analysis for Software Cluster Systems Based on Proportional Hazard Model.
Chunyan Hou, Chen Chen, Jinsong Wang, Kai Shi
2016Requirements are the New Code.
Daniel Conte de Leon, Sanjeev Shrestha
2016Risk Assessment for a Global Air Transport System Using Socioeconomic-Technological-Environmental Databases.
Aki-Hiro Sato, Hidefumi Sawai
2016SOLinker: Constructing Semantic Links between Tags and URLs on StackOverflow.
Wenkai Mo, Jiangang Zhu, Zhenzheng Qian, Beijun Shen
2016Safety Requirements Specification and Verification for Railway Interlocking Systems.
Li Han, Jing Liu, Tingliang Zhou, Junfeng Sun, Xiaohong Chen
2016SatiIndicator: Leveraging User Reviews to Evaluate User Satisfaction of SourceForge Projects.
Zhenzheng Qian, Beijun Shen, Wenkai Mo, Yuting Chen
2016Scope of Selection Nodes in Object Oriented Programs.
Hend Alrasheed, Austin Melton
2016Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping Modes.
Zihao Tang, Yao Guo, Xiangqun Chen
2016Situation-Oriented Requirements Elicitation.
Nimanthi L. Atukorala, Carl K. Chang, Katsunori Oyama
2016Software Defect Prediction Using Semi-Supervised Learning with Change Burst Information.
Qing He, Beijun Shen, Yuting Chen
2016SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale.
Changyuan Wang, Zongfei Lu, Yang Liu, Shanqing Guo, Xin-Shun Xu, Shijun Liu, Li-zhen Cui
2016Stage-Based Generative Learning Object Model to Support Automatic Content Generation and Adaptation.
Vytautas Stuikys, Renata Burbaite, Kristina Bespalova, Vida Drasute, Giedrius Ziberkas, Algimantas Venckauskas
2016Supporting Learners in Online Courses Through Pair Programming and Live Coding.
Seyed Soroush Ghorashi, Carlos Jensen
2016Temporal Dependency Rule Learning Based Group Activity Recognition in Smart Spaces.
Amine Lotfi Bourbia, Heesuk Son, Byoungheon Shin, Taehun Kim, Dongman Lee, Soon J. Hyun
2016Text Mining Analysis in Turkish Language Using Big Data Tools.
Mehmet Ulas Cakir, Seren Guldamlasioglu
2016The Cost of Syntax and How to Avoid It: Text versus Frame-Based Editing.
Amjad AlTadmri, Michael Kölling, Neil C. C. Brown
2016The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users.
Rasib Khan, Ragib Hasan
2016Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications.
Shuo Wen, Yuan Xue, Jing Xu, Hongji Yang, Xiaohong Li, Wenli Song, Guannan Si
2016Toward More Robust Automatic Analysis of Student Program Outputs for Assessment and Learning.
Chung Keung Poon, Tak-Lam Wong, Yuen-Tak Yu, Victor C. S. Lee, Chung Man Tang
2016Towards Correlating Search on Google and Asking on Stack Overflow.
Chunyang Chen, Zhenchang Xing
2016Towards Dementia-Friendly Smart Homes.
Mohsen Amiribesheli, Abdelhamid Bouchachia
2016Towards Realizing a Self-Protecting Healthcare Information System.
Qian Chen, Jonathan Lambright
2016TripleFCA: FCA-Based Approach to Enhance Semantic Web Data Management.
Saleh Albahli, Austin Melton
2016User Identification of Pseudonyms without Identity Information Exposure in Access Federations.
Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura
2016Using Object-Oriented Big Data Analytics to Reveal Server Performance Dead Zone.
Huihong He, Haibin Zhai, Qian Liu, Yong Wang
2016Verification of Reconfigurable NoC under Quality of Service Constraints.
Hela Ben Salah, Adel Benzina, Mohamed Khalgui
2016Which Learning Outcomes Should I Acquire? A Bar Chart-Based Semantic System for Visually Comparing Learners' Acquirements with Labor Market Requirements.
Valentina Gatteschi, Fabrizio Lamberti, Gianluca Paravati, Alessandro Raso, Claudio Giovanni Demartini
2016Your Walk is My Command: Gait Detection on Unconstrained Smartphone Using IoT System.
A. K. M. Jahangir Alam Majumder, Piyush Saxena, Sheikh Iqbal Ahamed