Proceedings of the 28th Annual Symposium on Applied Computing
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Sung Y. Shin, José Carlos Maldonado
Proceedings of the 28th Annual Symposium on Applied Computing
SAC, 2013.

SE
DBLP
Scholar
Full names Links ISxN
@proceedings{SAC-2013,
	acmid         = "2480362",
	address       = "Coimbra, Portugal",
	editor        = "Sung Y. Shin and José Carlos Maldonado",
	isbn          = "978-1-4503-1656-9",
	publisher     = "{ACM}",
	title         = "{Proceedings of the 28th Annual Symposium on Applied Computing}",
	year          = 2013,
}

Contents (328 items)

SAC-2013-FazioR #comparison #network
Spatial interpolation: an analytical comparison between kriging and RBF networks (VSF, MR), pp. 2–7.
SAC-2013-SouzaRB #clustering #data access #metric #performance
Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
SAC-2013-BaltzerRZ #scalability
Building a scalable spatial OLAP system (OB, ARC, NZ), pp. 13–15.
SAC-2013-CavalinKMO #framework #multi #recognition
A multiple feature vector framework for forest species recognition (PRC, MNK, JM, LESdO), pp. 16–20.
SAC-2013-AraujoGA #artificial reality #identification #towards #using
Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
SAC-2013-TeixeiraRG #detection #locality #parallel #using
Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SAC-2013-BarrosJBFBF #gesture #recognition #sequence
Convexity local contour sequences for gesture recognition (PVAB, NTMJ, JMMB, BJTF, BLDB, SMMF), pp. 34–39.
SAC-2013-PorterA #algorithm #identification
An evolutionary spline fitting algorithm for identifying filamentous cyanobacteria (JP, DVA), pp. 40–45.
SAC-2013-MadeoLP #gesture #rest #segmentation #using
Gesture unit segmentation using support vector machines: segmenting gestures from rest positions (RCBM, CAML, SMP), pp. 46–52.
SAC-2013-SaitoRFSG #approach #image #performance #reduction
A data reduction and organization approach for efficient image annotation (PTMS, PJdR, AXF, CTNS, JFG), pp. 53–57.
SAC-2013-YuFH
An intelligent building that listens to your needs (DYY, EF, HH), pp. 58–63.
SAC-2013-CouceiroPR #architecture
A collective robotic architecture in search and rescue scenarios (MSC, DP, RPR), pp. 64–69.
SAC-2013-PippinCW #multi #performance
Performance based task assignment in multi-robot patrolling (CP, HIC, LW), pp. 70–76.
SAC-2013-NakamuraNTO #problem #towards
Towards solving an obstacle problem by the cooperation of UAVs and UGVs (SN, HN, YT, AO), pp. 77–82.
SAC-2013-GrueauA #modelling #towards
Towards a domain specific modeling language for agent-based models in land use science (CG, JA), pp. 83–85.
SAC-2013-LikitvivatanavongY #set
Many-to-many interchangeable sets of values in CSPs (CL, RHCY), pp. 86–91.
SAC-2013-LarrosaR #bound #constraints #distributed #optimisation
Risk-neutral bounded max-sum for distributed constraint optimization (JL, ER), pp. 92–97.
SAC-2013-NguyenSB #consistency
Dynamic virtual arc consistency (HN, TS, CB), pp. 98–103.
SAC-2013-LaroucheMGH #equation #satisfiability #word
Solving equations on words through boolean satisfiability (ML, ABM, SG, SH), pp. 104–106.
SAC-2013-MaunzVH #graph #mining
Out-of-bag discriminative graph mining (AM, DV, CH), pp. 109–114.
SAC-2013-AkritidisB #algorithm #classification #machine learning #research
A supervised machine learning classification algorithm for research articles (LA, PB), pp. 115–120.
SAC-2013-AhmedE #network #trust
Discovering influential nodes from trust network (SA, CIE), pp. 121–128.
SAC-2013-HapfelmeierSK #dataset #incremental #linear #performance
Incremental linear model trees on massive datasets: keep it simple, keep it fast (AH, JS, SK), pp. 129–135.
SAC-2013-SeelandKP #graph #kernel #learning
Model selection based product kernel learning for regression on graphs (MS, SK, BP), pp. 136–143.
SAC-2013-KhaniHAB #algorithm #clustering #semistructured data #set
An algorithm for discovering clusters of different densities or shapes in noisy data sets (FK, MJH, AAA, HB), pp. 144–149.
SAC-2013-MottaLNRJO #algorithm #clustering #relational
Comparing relational and non-relational algorithms for clustering propositional data (RM, AdAL, BMN, SOR, AMJ, MCFdO), pp. 150–155.
SAC-2013-Serafino #clustering #composition #graph
Speeding up graph clustering via modular decomposition based compression (PS), pp. 156–163.
SAC-2013-Fournier-VigerT #mining #named
TNS: mining top-k non-redundant sequential rules (PFV, VST), pp. 164–166.
SAC-2013-BlondelSU #classification #constraints #learning #using
Learning non-linear classifiers with a sparsity constraint using L1 regularization (MB, KS, KU), pp. 167–169.
SAC-2013-BerralGT #automation #machine learning
Empowering automatic data-center management with machine learning (JLB, RG, JT), pp. 170–172.
SAC-2013-CameronCL #memory management #mining #set
Stream mining of frequent sets with limited memory (JJC, AC, CKSL), pp. 173–175.
SAC-2013-GaudesiMMST #design #optimisation
Evolutionary optimization of wetlands design (MG, AM, TM, GS, APT), pp. 176–181.
SAC-2013-KimM #algorithm #detection #hybrid #search-based #using
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SAC-2013-MeloC #automation #case study #difference #evolution #generative
Automatic generation of evolutionary operators: a study with mutation strategies for the differential evolution (VVdM, GLCC), pp. 188–193.
SAC-2013-RabanalR #metaheuristic #polynomial #problem #reduction #using
Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems (PR, IR), pp. 194–199.
SAC-2013-ToledoAOD #algorithm #hybrid #multi #problem #search-based
A hybrid compact genetic algorithm applied to the multi-level capacitated lot sizing problem (CFMT, MdSA, RRRdO, ACBD), pp. 200–205.
SAC-2013-CostaFLAV #metaheuristic #optimisation #statistics
Optimization metaheuristics for minimizing variance in a real-world statistical application (EC, FF, ARL, HA, FMV), pp. 206–207.
SAC-2013-BellatrecheBCM #algorithm #clustering #incremental #query
Horizontal partitioning of very-large data warehouses under dynamically-changing query workloads via incremental algorithms (LB, RB, AC, SM), pp. 208–210.
SAC-2013-PengWR #multi
Leader-follower formation control of multiple nonholonomic robots based on backstepping (ZP, GW, AR), pp. 211–216.
SAC-2013-BlancoMLJ #approach #probability
A Kalman filter based approach to probabilistic gas distribution mapping (JLB, JGM, AJL, JGJ), pp. 217–222.
SAC-2013-OliveiraON #development
An investigation into the development of service-oriented robotic systems (LBRdO, FSO, EYN), pp. 223–228.
SAC-2013-KalyanC #analysis #navigation #using
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SAC-2013-GoncalvesTM #towards
Towards a software tool for ultrasound guided robotic hip resurfacing surgery (PJSG, PMBT, JMMM), pp. 232–234.
SAC-2013-MendesW #navigation #realtime #using
Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SAC-2013-ZengC #data fusion #matrix #recommendation #semistructured data
Heterogeneous data fusion via matrix factorization for augmenting item, group and friend recommendations (WZ, LC), pp. 237–244.
SAC-2013-BlancoR #query #recommendation
Inferring user utility for query revision recommendation (HB, FR), pp. 245–252.
SAC-2013-RokachSSCS #recommendation
Recommending insurance riders (LR, GS, BS, EC, GS), pp. 253–260.
SAC-2013-ChenPX
Constructing and comparing user mobility profiles for location-based services (XC, JP, RX), pp. 261–266.
SAC-2013-ZhangHMZMM #data type #mining
Mining frequent itemsets over tuple-evolving data streams (CZ, YH, MM, CZ, HM, FM), pp. 267–274.
SAC-2013-LommatzschKA #hybrid #learning #modelling #recommendation #semantics
Learning hybrid recommender models for heterogeneous semantic data (AL, BK, SA), pp. 275–276.
SAC-2013-MokarizadehDMB #matrix #privacy #social
Enhancing social matrix factorization with privacy (SM, ND, MM, RB), pp. 277–278.
SAC-2013-ChenNKX #recommendation
Users segmentations for recommendation (LC, RN, SK, YX), pp. 279–280.
SAC-2013-ChanHN #layout #semantics #using #wiki #word
Computing semantic relatedness using word frequency and layout information of Wikipedia (PC, YH, SN), pp. 282–287.
SAC-2013-MakrisPT #wiki
Improved text annotation with Wikipedia entities (CM, YP, ET), pp. 288–295.
SAC-2013-CapelleHHF #recommendation #semantics #using
Semantic news recommendation using wordnet and bing similarities (MC, FH, AH, FF), pp. 296–302.
SAC-2013-LarizgoitiaTBLM #semantics
Environmental service discovery based on semantically annotated OGC service descriptions (IL, IT, AB, AL, PM), pp. 303–310.
SAC-2013-BarcellosF #metric #ontology
A software measurement task ontology (MPB, RdAF), pp. 311–318.
SAC-2013-LeclercqS #information management #semantics
Enhancing scientific information systems with semantic annotations (EL, MS), pp. 319–324.
SAC-2013-MokarizadehKM #ontology #web #web service
Ontology acquisition from web service descriptions (SM, PK, MM), pp. 325–332.
SAC-2013-MinerviniFdE #predict #rank #semantics
Rank prediction for semantically annotated resources (PM, NF, Cd, FE), pp. 333–338.
SAC-2013-RubackPMOSC #linked data #open data #statistics
A mediator for statistical linked data (LR, MP, SM, SO, PERS, MAC), pp. 339–341.
SAC-2013-GrootGYNK #data-driven #distributed #modelling
Modeling I/O interference for data intensive distributed applications (SG, KG, DY, MN, MK), pp. 343–350.
SAC-2013-SteinbauerKK #community #on-demand
Building an on-demand virtual computing market in non-commercial communities (MS, IK, GK), pp. 351–356.
SAC-2013-SimaoV
A progress and profile-driven cloud-VM for resource-efficiency and fairness in e-science environments (JS, LV), pp. 357–362.
SAC-2013-AnielloQB #data transformation
Input data organization for batch processing in time window based computations (LA, LQ, RB), pp. 363–370.
SAC-2013-YeLZ #correlation #named
GCplace: geo-cloud based correlation aware data replica placement (ZY, SL, XZ), pp. 371–376.
SAC-2013-RezguiMY #platform
High-resolution spatial interpolation on cloud platforms (AR, ZM, CY), pp. 377–382.
SAC-2013-ZarembaBVH #as a service #in the cloud #linked data #open data
Matchmaking of IaaS cloud computing offers leveraging linked data (MZ, SB, TV, MH), pp. 383–388.
SAC-2013-AgrawalP #platform
Hospitality of cloud platforms (AA, TVP), pp. 389–396.
SAC-2013-Perez-PalacinCM #named #predict #trade-off
log2cloud: log-based prediction of cost-performance trade-offs for cloud deployments (DPP, RC, JM), pp. 397–404.
SAC-2013-ShikanoAYSOU #case study #design
Study on supporting technology for operational procedure design of IT systems in cloud-era datacenters (HS, MA, JY, TS, SO, KU), pp. 405–407.
SAC-2013-SchroderN #behaviour #resource management
Inter cloud capable dynamic resource management with model of behavior (KS, WN), pp. 408–410.
SAC-2013-KoukiL #named #scalability
SCAling: SLA-driven cloud auto-scaling (YK, TL), pp. 411–414.
SAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #using #video
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SAC-2013-AllaniGP #hybrid #named #protocol
Hyphen: a hybrid protocol for generic overlay construction in P2P environments (MA, BG, PP), pp. 423–430.
SAC-2013-MartinsLSN #fault tolerance #framework #middleware #platform #realtime
Stheno, a real-time fault-tolerant P2P middleware platform for light-train systems (RM, LMBL, FMAS, PN), pp. 431–438.
SAC-2013-VeeraragavanBMVNM #analysis #comprehension #distributed #experience #interactive #metric #multi #quality
Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
SAC-2013-KimGKTSK #optimisation
Maximizing availability of content in disruptive environments by cross-layer optimization (MK, AG, JMK, DT, MOS, JSK), pp. 447–454.
SAC-2013-TomicSP #named
MoSQL: an elastic storage engine for MySQL (AT, DS, FP), pp. 455–462.
SAC-2013-JiaBJPM #algorithm #multi
A multi-resource load balancing algorithm for cloud cache systems (YJ, IB, RJP, MPM, DM), pp. 463–470.
SAC-2013-MagalhaesS #adaptation #monitoring #performance
Adaptive monitoring of web-based applications: a performance study (JPM, LMS), pp. 471–478.
SAC-2013-OliveiraP #experience #framework #middleware
Experience with a middleware infrastructure for service oriented financial applications (JPO, JP), pp. 479–484.
SAC-2013-InzingerHSLD #identification #implementation #using
Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SAC-2013-NunesP #scheduling #throughput #transaction
Improving transaction abort rates without compromising throughput through judicious scheduling (AN, JP), pp. 493–494.
SAC-2013-ChaudhariZW #component #framework #ranking #towards
Towards a ranking framework for software components (DC, MZ, KW), pp. 495–498.
SAC-2013-ZhongM #analysis #empirical #game studies
Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
SAC-2013-TangHHC #mobile #named
iLauncher: an intelligent launcher for mobile apps based on individual usage patterns (LYT, PCH, JLH, MSC), pp. 505–512.
SAC-2013-MajumderRZEA #named #novel #realtime #towards
iPrevention: towards a novel real-time smartphone-based fall prevention system (AJAM, FR, IZ, WEJ, SIA), pp. 513–518.
SAC-2013-KannanMDS #navigation #predict #using
Predictive indoor navigation using commercial smart-phones (BK, FM, MBD, KPS), pp. 519–525.
SAC-2013-HeitkotterMK #development #mobile #modelling #platform
Cross-platform model-driven development of mobile applications with md2 (HH, TAM, HK), pp. 526–533.
SAC-2013-MaiaGFNVA #middleware #named
LOCCAM — loosely coupled context acquisition middleware (MEFM, RG, ASF, BJAN, WV, RMCA), pp. 534–541.
SAC-2013-GroppeSW #embedded #xml
Eliminating the XML overhead in embedded XML languages (SG, BS, SW), pp. 542–547.
SAC-2013-LimaBM
Broadcast cancellation in search mechanisms (RL, CB, HM), pp. 548–553.
SAC-2013-MaiaB #modelling #network #performance #predict #query
Sensor-field modeling based on in-network data prediction: an efficient strategy for answering complex queries in wireless sensor networks (JEBM, AB), pp. 554–559.
SAC-2013-LakhlefMB #algorithm #configuration management #distributed #performance #self
Distributed and efficient algorithm for self-reconfiguration of MEMS microrobots (HL, HM, JB), pp. 560–566.
SAC-2013-BanerjeeSS #detection #monitoring #using
Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SAC-2013-YiSLC #mobile #process #towards
Towards a total recall: an activity tracking and recall mechanism for mobile devices (SY, JS, YL, HJC), pp. 570–572.
SAC-2013-BheemeshKCF #coordination #resource management
Radio resource management in coordinated antenna system deployments (VB, PK, FC, ZF), pp. 573–576.
SAC-2013-HassanzadehN #algorithm #detection #graph
A semi-supervised graph-based algorithm for detecting outliers in online-social-networks (RH, RN), pp. 577–582.
SAC-2013-BraunMS #network
Service-centric networking extensions (TB, AM, VAS), pp. 583–590.
SAC-2013-BrancoLR #bound #protocol #scalability
Bounded gossip: a gossip protocol for large-scale datacenters (MB, JL, LR), pp. 591–596.
SAC-2013-OliveiraBMNBGB #multi #network
DoS-resilient virtual networks through multipath embedding and opportunistic recovery (RRO, LRB, DSM, MCN, LSB, LPG, MPB), pp. 597–602.
SAC-2013-KuptsovNGL #metric #network #novel
A novel demand-aware fairness metric for IEEE 802.11 wireless networks (DK, BN, AG, AL), pp. 603–610.
SAC-2013-KawakamiIYT #communication #data type #delivery
A delivery method considering communication loads for sensor data stream with different collection cycles (TK, YI, TY, YT), pp. 611–618.
SAC-2013-VasquesV #algorithm #distributed #grid #scheduling
A decentralized utility-based grid scheduling algorithm (JV, LV), pp. 619–624.
SAC-2013-GoncalvesEPSKS #distributed #network #on the
On the load balancing of virtual networks in distributed clouds (GEG, PTE, AVdAP, MAS, JK, DS), pp. 625–631.
SAC-2013-FlushingC #network #optimisation
A flow-based optimization model for throughput-oriented relay node placement in wireless sensor networks (EFF, GADC), pp. 632–639.
SAC-2013-MouraMNS #named #network #novel
ABOI: a novel strategy to mitigate the blocking due to outdated information in OCS/OBS network (IM, FM, JMN, ACBS), pp. 640–645.
SAC-2013-NikolaevskiyLPPG #multi #named #scalability
isBF: scalable in-packet bloom filter based multicast (IN, AL, TP, VP, AG), pp. 646–648.
SAC-2013-HoangLCMC #network #protocol
A backward-compatible protocol for inter-routing over heterogeneous overlay networks (GNH, LL, VC, PM, HNC), pp. 649–651.
SAC-2013-DimitriouK #energy #privacy #smarttech
Privacy-friendly tasking and trading of energy in smart grids (TD, GK), pp. 652–659.
SAC-2013-WaflerH #analysis #approach #dependence #grid #modelling #smarttech
A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SAC-2013-VukovicD #distributed #estimation #on the #security
On the security of distributed power system state estimation under targeted attacks (OV, GD), pp. 666–672.
SAC-2013-IlicSKJ #algorithm #assessment
Impact assessment of smart meter grouping on the accuracy of forecasting algorithms (DI, PGdS, SK, MJ), pp. 673–679.
SAC-2013-CicekD #smarttech
Demand response computation for future smart grids incorporating wind power (, HD), pp. 680–685.
SAC-2013-KimPK #evaluation #grid #network #performance #smarttech #towards
Towards cosimulating network and electrical systems for performance evaluation in smart grid (HK, WP, HK), pp. 686–687.
SAC-2013-AhatAB #grid #modelling #smarttech #strict
Modeling fundamentals for smart grid enabled ecodistricts (MA, SBA, AB), pp. 688–689.
SAC-2013-MeilingSSW #communication #framework #grid #multi #network #scalability #smarttech #using
A scalable communication infrastructure for smart grid applications using multicast over public networks (SM, TS, TCS, MW), pp. 690–694.
SAC-2013-Pena-OrtizGSP #interactive #performance #web
The impact of user-browser interaction on web performance (RPO, JAG, JS, AP), pp. 695–702.
SAC-2013-HogenboomBFBJK #analysis #sentiment
Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
SAC-2013-LyleNIF #network #web
Extending the web to support personal network services (JL, CN, AI, SF), pp. 711–716.
SAC-2013-BakkerVFK #detection #web
Model words-driven approaches for duplicate detection on the web (MdB, DV, FF, UK), pp. 717–723.
SAC-2013-CostaBM #detection #network #social
Detecting tip spam in location-based social networks (HC, FB, LHdCM), pp. 724–729.
SAC-2013-Gaggi
Discovering local attractions from geo-tagged photos (OG), pp. 730–735.
SAC-2013-GaubatzZ #collaboration #constraints #web
Supporting entailment constraints in the context of collaborative web applications (PG, UZ), pp. 736–741.
SAC-2013-HerzogKHFK #automation #identification #web
Feature-based object identification for web automation (CH, IK, WH, RRF, BKS), pp. 742–749.
SAC-2013-LiBB #ad hoc #approach #composition #web #web service
Service farming: an ad-hoc and QoS-aware web service composition approach (WL, YB, FB), pp. 750–756.
SAC-2013-MattilaM #3d #design #library
Designing a 3D widget library for WebGL enabled browsers (ALM, TM), pp. 757–760.
SAC-2013-Montesi #programming #web
Process-aware web programming with Jolie (FM), pp. 761–763.
SAC-2013-VivianHL #approach #development #distributed
Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approach (RLV, EHMH, GCLL), pp. 765–770.
SAC-2013-AbidiDCJ #grid #interactive
A publication-subscription interaction schema for desktop grid computing (LA, JCD, CC, MJ), pp. 771–778.
SAC-2013-LinCLG #approach #data-driven #distributed #learning #predict
Distributed dynamic data driven prediction based on reinforcement learning approach (SYL, KMC, CCL, NG), pp. 779–784.
SAC-2013-CogniniFPPR #collaboration #modelling #named #process #verification
HawkEye: a tool for collaborative business process modelling and verification (RC, DF, AP, AP, BR), pp. 785–786.
SAC-2013-OyamadaKK #concurrent #query
Continuous query processing with concurrency control: reading updatable resources consistently (MO, HK, HK), pp. 788–794.
SAC-2013-FariaGC #algorithm #data type #detection #multi #problem
Novelty detection algorithm for data streams multi-class problems (ERF, JG, ACPLFC), pp. 795–800.
SAC-2013-BifetPRH #adaptation #classification #data type #performance #probability
Efficient data stream classification via probabilistic adaptive windows (AB, BP, JR, GH), pp. 801–806.
SAC-2013-Callau-ZoriJGPFP #framework #named
STONE: a stream-based DDoS defense framework (MCZ, RJP, VG, MP, ZF, MPM), pp. 807–812.
SAC-2013-AlmeidaKG #data type #random
Random rules from data streams (EA, PK, JG), pp. 813–814.
SAC-2013-GholipourHB #adaptation #data type
An adaptive regression tree for non-stationary data streams (AG, MJH, HB), pp. 815–817.
SAC-2013-ValsomatzisG #in memory #multi
Driver input selection for main-memory multi-way joins (EV, AG), pp. 818–825.
SAC-2013-TheodouliG #adaptation #data-driven #query #web #web service
Adaptive memory-aware chunk sizing techniques for data-intensive queries over web services (AT, AG), pp. 826–831.
SAC-2013-LeitaoC #adaptation #detection #optimisation #performance #using #xml
Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SAC-2013-HalderC #database #query #slicing
Abstract program slicing of database query languages (RH, AC), pp. 838–845.
SAC-2013-BhattacharjeeJ #algorithm #named #repository #scalability #similarity
CodeBlast: a two-stage algorithm for improved program similarity matching in large software repositories (AB, HMJ), pp. 846–852.
SAC-2013-Sobieski0 #maude #sql #term rewriting #using
Using maude rewriting system to modularize and extend SQL (SS, BZ), pp. 853–858.
SAC-2013-HorieS #difference
Extracting differences between regular tree grammars (KH, NS), pp. 859–864.
SAC-2013-BurtiniFL #adaptation #data transfer #web
Reducing data transfer for charts on adaptive web sites (GB, SF, RL), pp. 865–867.
SAC-2013-Amavia #towards
Filtering XFD toward interoperability (JA, MHFA), pp. 868–871.
SAC-2013-CamposFHV #personalisation #query #ranking #using #xml
XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
SAC-2013-TsukudaOYIT #analysis #coordination
Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
SAC-2013-PlegasS #information management
Reducing information redundancy in search results (YP, SS), pp. 886–893.
SAC-2013-UmemotoYNT #behaviour #predict #query
Predicting query reformulation type from user behavior (KU, TY, SN, KT), pp. 894–901.
SAC-2013-LaboreiroBSRO #microblog
Determining language variant in microblog messages (GL, MB, LS, EMR, ECO), pp. 902–907.
SAC-2013-Manzato #feedback #metadata #recommendation
gSVD++: supporting implicit feedback on recommender systems with metadata awareness (MGM), pp. 908–913.
SAC-2013-DamakPBC #effectiveness #microblog #state of the art
Effectiveness of state-of-the-art features for microblog search (FD, KPS, MB, GC), pp. 914–919.
SAC-2013-SenatoreP #collaboration #concept analysis #fuzzy #navigation
Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysis (SS, GP), pp. 920–926.
SAC-2013-SrivastavaSM #clustering #graph #using
Text clustering using one-mode projection of document-word bipartite graphs (AS, AJS, EEM), pp. 927–932.
SAC-2013-CeccarelliGLNP #query #recommendation #semantics
When entities meet query recommender systems: semantic search shortcuts (DC, SG, CL, FMN, RP), pp. 933–938.
SAC-2013-Savoy #feature model
Feature selections for authorship attribution (JS), pp. 939–941.
SAC-2013-CampioloSBG #security #twitter
Evaluating the utilization of Twitter messages as a source of security alerts (RC, LAFS, DMB, MAG), pp. 942–943.
SAC-2013-AbrilNT #documentation #towards
Towards a private vector space model for confidential documents (DA, GNA, VT), pp. 944–945.
SAC-2013-RodriguesCPZ #database #visual notation #visualisation
Hierarchical visual filtering, pragmatic and epistemic actions for database visualization (JFRJ, CEC, AFdP, LAMZ), pp. 946–952.
SAC-2013-FranzMN #3d #assessment #interface
Assessment of a user centered interface for teleoperation and 3D environments (JF, AM, LPN), pp. 953–960.
SAC-2013-SouzaG #representation #video
Video shot representation based on histograms (TTdS, RG), pp. 961–966.
SAC-2013-PedrosaGPBC #interactive
Interactive coffee table for exploration of personal photos and videos (DdCP, RLG, MdGCP, DCAB, PC), pp. 967–974.
SAC-2013-BrandaoFMPC #framework #pervasive
The CAS project: a general infrastructure for pervasive capture and access systems (RB, PF, AM, FP, RC), pp. 975–980.
SAC-2013-ImmichCC #adaptation #fault
Adaptive video-aware FEC-based mechanism with unequal error protection scheme (RI, EC, MC), pp. 981–988.
SAC-2013-BraunCHMM #framework #named #realtime #visualisation
CrowdVis: a framework for real time crowd visualization (HB, VJC, RH, FPM, SRM), pp. 989–995.
SAC-2013-HayashiIN #recommendation #visual notation
A visual analytics tool for system logs adopting variable recommendation and feature-based filtering (AH, TI, SN), pp. 996–998.
SAC-2013-LiZSL #approach #graph #mining #named #novel
WAVE-CIA: a novel CIA approach based on call graph mining (BL, QZ, XS, HL), pp. 1000–1005.
SAC-2013-Barros #component #representation
Representing dynamic pluggable software units (FB), pp. 1006–1012.
SAC-2013-AlitavoliJE #java #novel #source code
A novel watermarking method for Java programs (MA, MJ, AE), pp. 1013–1018.
SAC-2013-WangLJ #developer #empirical #interactive #stack overflow
An empirical study on developer interactions in StackOverflow (SW, DL, LJ), pp. 1019–1024.
SAC-2013-MegasBFUA #case study #integration #lifecycle #modelling #off the shelf
A study of COTS integration projects: product characteristics, organization, and life cycle models (KM, GB, WBF, JU, RA), pp. 1025–1030.
SAC-2013-SantosGFN0 #case study
Test-based SPL extraction: an exploratory study (ARS, FNG, EF, PdAdSN, JA), pp. 1031–1036.
SAC-2013-PerkusichAP #detection #development #problem
A model to detect problems on scrum-based software development projects (MP, HOdA, AP), pp. 1037–1042.
SAC-2013-WestermannHF #automation #empirical #performance #specification
An experiment specification language for goal-driven, automated performance evaluations (DW, JH, RF), pp. 1043–1048.
SAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SAC-2013-MaalejKJ #composition #consistency #named #testing
WSCCT: a tool for WS-BPEL compositions conformance testing (AJM, MK, MJ), pp. 1055–1061.
SAC-2013-AlnusairZY #automation #design #recognition #semantics #using
Automatic recognition of design motifs using semantic conditions (AA, TZ, GY), pp. 1062–1067.
SAC-2013-Marques-NetoAV #approach #maintenance
A quantitative approach for evaluating software maintenance services (HMN, GJA, MTV), pp. 1068–1073.
SAC-2013-SunGYFC #multi #testing #user interface
Multi-objective test case prioritization for GUI applications (WS, ZG, WY, CF, ZC), pp. 1074–1079.
SAC-2013-DurelliSADC #mining #overview
A systematic review on mining techniques for crosscutting concerns (RSD, DSMS, NA, MED, VVdC), pp. 1080–1087.
SAC-2013-ZhangL #algorithm #debugging #developer #hybrid #recommendation
A hybrid bug triage algorithm for developer recommendation (TZ, BL), pp. 1088–1094.
SAC-2013-LaurentBG #debugging #modelling #uml
Executing and debugging UML models: an fUML extension (YL, RB, MPG), pp. 1095–1102.
SAC-2013-LoTNCLC #development #framework #multimodal #platform
i*Chameleon: a platform for developing multimodal application with comprehensive development cycle (KWKL, WWWT, GN, ATSC, HVL, SCFC), pp. 1103–1108.
SAC-2013-BasgaluppBSC #approach #predict
Software effort prediction: a hyper-heuristic decision-tree based approach (MPB, RCB, TSdS, ACPLFC), pp. 1109–1116.
SAC-2013-AbdallahHA #approach #design #quantifier
Quantified extreme scenario based design approach (AA, RH, MAA), pp. 1117–1122.
SAC-2013-ZibranSRS #empirical
Evaluating the conventional wisdom in clone removal: a genealogy-based empirical study (MFZ, RKS, CKR, KAS), pp. 1123–1130.
SAC-2013-HunnyZW #adaptation #named
OSDC: adapting ODC for developing more secure software (UH, MZ, KW), pp. 1131–1136.
SAC-2013-NotanderRH #design #development #flexibility #framework #modelling #safety
A model-based framework for flexible safety-critical software development: a design study (JPN, PR, MH), pp. 1137–1144.
SAC-2013-WoutersG #development #domain-specific language #empirical #metamodelling #modelling
Notation-driven vs metamodel-driven development of domain-specific modeling languages: an empirical study (LW, MPG), pp. 1145–1146.
SAC-2013-FerreiraM
Estimating the size of data mart projects (WGF, HTMN), pp. 1147–1148.
SAC-2013-WassmannVT #energy #estimation #virtual machine
Energy consumption estimation of virtual machines (IW, DV, DT), pp. 1151–1156.
SAC-2013-DruilheAPDS #energy
Energy-driven consolidation in digital home (RD, MA, JP, LD, LS), pp. 1157–1162.
SAC-2013-TeodoroCF #energy #performance #scheduling
Energy efficiency management in computational grids through energy-aware scheduling (ST, ABdC, LGF), pp. 1163–1168.
SAC-2013-SinghR #algorithm #architecture #optimisation #predict
Meta-learning based architectural and algorithmic optimization for achieving green-ness in predictive workload analytics (NS, SR), pp. 1169–1176.
SAC-2013-WilkePRPGA #energy #mobile
Comparing mobile applications’ energy consumption (CW, CP, SR, GP, SG, UA), pp. 1177–1179.
SAC-2013-BrinkeMBBA #composition #design #energy
A design method for modular energy-aware software (StB, SM, CB, LB, MA), pp. 1180–1182.
SAC-2013-Penzenstadler #re-engineering #towards
Towards a definition of sustainability in and for software engineering (BP), pp. 1183–1185.
SAC-2013-HeckelerSK #component #execution #robust #testing #using
Accelerated robustness testing of state-based components using reverse execution (PH, BS, TK), pp. 1188–1195.
SAC-2013-ChocklerIMRS #satisfiability #using
Using cross-entropy for satisfiability (HC, AI, AM, SFR, NS), pp. 1196–1203.
SAC-2013-ChenLWW #abstraction #source code #static analysis
Static analysis of list-manipulating programs via bit-vectors and numerical abstractions (LC, RL, XW, JW), pp. 1204–1210.
SAC-2013-FuriaMOTW #automation #random testing #testing
The search for the laws of automatic random testing (CAF, BM, MO, AT, YW), pp. 1211–1216.
SAC-2013-CarvalhoFBSMMB #generative #natural language #requirements #specification #testing
Test case generation from natural language requirements based on SCR specifications (GC, DF, FAB, AS, AM, LM, MRB), pp. 1217–1222.
SAC-2013-PapadakisT #classification #mutation testing #testing #using
Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
SAC-2013-DelahayeKS #c #dynamic analysis #source code #specification
Common specification language for static and dynamic analysis of C programs (MD, NK, JS), pp. 1230–1235.
SAC-2013-MoriguchiW #interactive #reuse #source code
An interactive extension mechanism for reusing verified programs (SM, TW), pp. 1236–1243.
SAC-2013-AraujoGMSAB #approach #composition #feature model #modelling
Advanced modularity for building SPL feature models: a model-driven approach (JA, MG, AMDM, IS, VA, ELAB), pp. 1246–1253.
SAC-2013-BakreBE #approach #interactive #uml
Aspect interaction chart — a UML approach for modularizing aspect interaction conflicts (SB, AB, TE), pp. 1254–1259.
SAC-2013-PalomaresQFRG #content management #functional #requirements
A catalogue of functional software requirement patterns for the domain of content management systems (CP, CQ, XF, SR, CG), pp. 1260–1265.
SAC-2013-FilhoB #learning #mobile #requirements
A requirements catalog for mobile learning environments (NFDF, EFB), pp. 1266–1271.
SAC-2013-ZiftciK #requirements #semantics #testing #traceability
Test intents: enhancing the semantics of requirements traceability links in test cases (CZ, IK), pp. 1272–1277.
SAC-2013-DermevalCSPBBETS #architecture #design #metamodelling #on the #requirements #using
On the use of metamodeling for relating requirements and architectural design decisions (DD, JC, CTLLS, JP, IIB, PHdSB, EE, TT, APdS), pp. 1278–1283.
SAC-2013-DugerdilS #legacy
Dynamic decision tree for legacy use-case recovery (PD, DS), pp. 1284–1291.
SAC-2013-MehtaRCN #approach #dependence #using
Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SAC-2013-BeckersFHHC #development
Common criteria compliant software development (CC-CASD) (KB, SF, DH, MH, IC), pp. 1298–1304.
SAC-2013-BuarqueCA #modelling #requirements
The role of NFRs when transforming i* requirements models into OO-method models (AB, JC, FMRA), pp. 1305–1306.
SAC-2013-BarreirosM #constraints #feature model #modelling
Configuration support for feature models with soft constraints (JB, AMDM), pp. 1307–1308.
SAC-2013-SalgadoMM #modelling #perspective #requirements
Modeling the alignment between business and IS/IT: a requirements engineering perspective (CS, RJM, RSPM), pp. 1309–1311.
SAC-2013-MeloAOAMB #analysis #approach #concept #visual notation
A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SAC-2013-NardelliTB #behaviour
Cross-lattice behavior of general ACO folding for proteins in the HP model (MN, LT, AB), pp. 1320–1327.
SAC-2013-TripletB #benchmark #biology #framework #metric #named
BenchDW: a generic framework for biological data warehouse benchmarking (TT, GB), pp. 1328–1334.
SAC-2013-PerazzoWM #framework
A data warehouse as an infrastructure to mine molecular descriptors for virtual screening (GXP, ATW, KSM), pp. 1335–1336.
SAC-2013-LaneseBF #approach #calculus #internet #process
Internet of things: a process calculus approach (IL, LB, MDF), pp. 1339–1346.
SAC-2013-Markovski #communication #coordination #probability #process #reliability
Reliable supervisory coordination of stochastic communicating processes with data (JM), pp. 1347–1354.
SAC-2013-UroviOBFS #coordination #framework #health
A peer to peer agent coordination framework for IHE based cross-community health record exchange (VU, ACO, SB, NF, MIS), pp. 1355–1362.
SAC-2013-CelestiniNT #coordination #specification
Specifying and analysing reputation systems with a coordination language (AC, RDN, FT), pp. 1363–1368.
SAC-2013-StevensonYDPMV #network #reasoning #resource management #self #semantics
Combining self-organisation, context-awareness and semantic reasoning: the case of resource discovery in opportunistic networks (GS, JY, SD, DP, SM, MV), pp. 1369–1376.
SAC-2013-AnconaBM #consistency #dynamic analysis #multi #protocol
Constrained global types for dynamic checking of protocol conformance in multi-agent systems (DA, MB, VM), pp. 1377–1379.
SAC-2013-MarianiO #probability
Probabilistic embedding: experiments with tuple-based probabilistic languages (SM, AO), pp. 1380–1382.
SAC-2013-HippMMR #delivery #framework #process #visualisation
A framework for the intelligent delivery and user-adequate visualization of process information (MH, BM, BM, MR), pp. 1383–1390.
SAC-2013-MontaliCMM #constraints #towards
Towards data-aware constraints in declare (MM, FC, PM, FMM), pp. 1391–1396.
SAC-2013-Fernandez-RoperoPCP #process #refactoring
Assessing the best-order for business process model refactoring (MFR, RPC, JACL, MP), pp. 1397–1402.
SAC-2013-WombacherI #estimation #process
Start time and duration distribution estimation in semi-structured processes (AW, MEI), pp. 1403–1409.
SAC-2013-HamelHUB #evaluation #maturity
IT evaluation in business groups: a maturity model (FH, TH, FU, WB), pp. 1410–1417.
SAC-2013-SoleC #algorithm
Amending C-net discovery algorithms (MS, JC), pp. 1418–1425.
SAC-2013-PflugR #information management
Dynamic instance queuing in process-aware information systems (JP, SRM), pp. 1426–1433.
SAC-2013-TragatschnigZ #enterprise #integration #using
Enterprise integration using event actor based event transformations (ST, UZ), pp. 1434–1440.
SAC-2013-Schefer-WenzlS #information management #policy
Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
SAC-2013-KolbR #abstraction #adaptation #data flow #process
Data flow abstractions and adaptations through updatable process views (JK, MR), pp. 1447–1453.
SAC-2013-LeoniA #mining #process #using
Data-aware process mining: discovering decisions in processes using alignments (MdL, WMPvdA), pp. 1454–1461.
SAC-2013-AccorsiSM #mining #on the #process #security
On the exploitation of process mining for security audits: the process discovery case (RA, TS, GM), pp. 1462–1468.
SAC-2013-KinderenP #approach #named
e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SAC-2013-KhalfallahFBG #process
Product-based business processes interoperability (MK, NF, MB, PG), pp. 1472–1473.
SAC-2013-ProencaVASB0K #maturity #process
Evaluating a process for developing a capability maturity model (DP, RV, GA, MMdS, JLB, CB, HK), pp. 1474–1475.
SAC-2013-JungS #approach #garbage collection #named
LINK-GC: a preemptive approach for garbage collection in NAND flash storages (SJ, YHS), pp. 1478–1484.
SAC-2013-BrunsKB #safety
Virtualization for safety-critical, deeply-embedded devices (FB, DK, AB), pp. 1485–1492.
SAC-2013-FanTCS #embedded #energy #manycore #realtime
Energy-aware real-time task synchronization in multi-core embedded systems (LFF, THT, YSC, SSS), pp. 1493–1498.
SAC-2013-FurtadoC #hybrid #middleware #network
Sensor streams middleware for easy configuration and processing in hybrid sensor network (PF, JC), pp. 1499–1504.
SAC-2013-SolankiRBGB #embedded #parsing #performance
Improving the performance of message parsers for embedded systems (JS, LR, YDB, BLG, TFB), pp. 1505–1510.
SAC-2013-XuTTZ #approach #fault #fine-grained
An instruction-level fine-grained recovery approach for soft errors (JX, QT, LT, HZ), pp. 1511–1516.
SAC-2013-HuangMGM #multi #realtime #scalability
Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessors (PH, OM, KG, AMM), pp. 1517–1524.
SAC-2013-ShihL #kernel #manycore #named
nuKernel: MicroKernel for multi-core DSP SoCs with load sharing and priority interrupts (CSS, HYL), pp. 1525–1532.
SAC-2013-AzarianCWB #approach #manycore #pipes and filters
An FPGA-based multi-core approach for pipelining computing stages (AA, JMPC, SW, JB), pp. 1533–1540.
SAC-2013-FangYK #database
MLC-flash-friendly logging and recovery for databases (HWF, MYY, TWK), pp. 1541–1546.
SAC-2013-PougetSCM #approach #data flow #debugging #embedded #interactive #novel
A novel approach for interactive debugging of dynamic dataflow embedded applications (KP, MS, PLC, JFM), pp. 1547–1549.
SAC-2013-LeeJS #locality
Demand-based flash translation layer considering spatial locality (YL, TJ, IS), pp. 1550–1551.
SAC-2013-BaldovinGMV #kernel
Kernel-level time composability for avionics applications (AB, AG, EM, TV), pp. 1552–1554.
SAC-2013-AguiarFMH #communication #design #embedded #multi
Communication support at the OS level to enhance design space exploration in multiprocessed embedded systems (AA, SJF, FGM, FH), pp. 1555–1556.
SAC-2013-Bettini #implementation #java #semantics #xtext
Implementing Java-like languages in Xtext with Xsemantics (LB), pp. 1559–1564.
SAC-2013-RenTSF #ruby
The ruby type checker (BMR, JT, TSS, JSF), pp. 1565–1572.
SAC-2013-GouwBJW #case study #industrial #java #runtime #source code
Run-time checking of data- and protocol-oriented properties of Java programs: an industrial case study (SdG, FSdB, EBJ, PYHW), pp. 1573–1578.
SAC-2013-HongJ #named #network #object-oriented #programming language
Meso: an object-oriented programming language for building strongly-typed internet-based network applications (SH, YJJ), pp. 1579–1586.
SAC-2013-LourencoSM #concurrent
Concurrent typed intermediate language (LML, JCS, FM), pp. 1587–1588.
SAC-2013-Oikawa #file system #in memory #memory management
Integrating memory management with a file system on a non-volatile main memory system (SO), pp. 1589–1594.
SAC-2013-BusseSDMR #architecture #manycore #scheduling
Analyzing resource interdependencies in multi-core architectures to improve scheduling decisions (AB, JHS, MD, GM, JR), pp. 1595–1602.
SAC-2013-AbeniM #analysis #interactive
Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
SAC-2013-KoPH #analysis #design #realtime #video
Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
SAC-2013-KangCLLKN #clustering
Onion and pizza: new disk partitioning schemes for virtualization systems (DK, JC, NL, DL, SK, SHN), pp. 1616–1621.
SAC-2013-ImJLL #configuration management #manycore #operating system
A dynamically reconfigurable operating system for manycore systems (CI, MJ, JL, SL), pp. 1622–1627.
SAC-2013-KimHCYWNPC #similarity #using
Measuring similarity of windows applications using static and dynamic birthmarks (DJK, YH, SC, HY, JW, YN, MP, LC), pp. 1628–1633.
SAC-2013-JangKRLSKPC #api #comparison #performance #similarity
An efficient similarity comparison based on core API calls (MJ, JK, SR, KL, SS, AK, YP, EHC), pp. 1634–1638.
SAC-2013-ChaeKHLW #api #detection
Software plagiarism detection via the static API call frequency birthmark (DKC, SWK, JH, SCL, GW), pp. 1639–1643.
SAC-2013-MatiasOA #case study #experience #operating system #quality #reliability
Operating system reliability from the quality of experience viewpoint: an exploratory study (RMJ, GDO, LBdA), pp. 1644–1649.
SAC-2013-TomaC #realtime
Computation offloading for real-time systems (AT, JJC), pp. 1650–1651.
SAC-2013-LeeKP #hybrid #recommendation
A tour recommendation service for electric vehicles based on a hybrid orienteering model (JL, SWK, GLP), pp. 1652–1654.
SAC-2013-JeonKKC #android #security
Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
SAC-2013-JangJHJKJ #android
Protecting Android applications with steganography-based software watermarking (JJ, HJ, JH, JJ, DK, SKJ), pp. 1657–1658.
SAC-2013-SilvaC #exception #interface #java
New exception interfaces for Java-like languages (TBLS, FC), pp. 1661–1666.
SAC-2013-HahnMPM #composition #semantics #web #web service
Formal semantics and expressiveness of a web service composition language (MGH, RM, AP, MAM), pp. 1667–1673.
SAC-2013-MaierST #design #reliability #scalability #symbolic computation
Reliable scalable symbolic computation: the design of SymGridPar2 (PM, RJS, PWT), pp. 1674–1681.
SAC-2013-WyssBPF #design #latency #multi
End-to-end latency computation in a multi-periodic design (RW, FB, CP, JF), pp. 1682–1687.
SAC-2013-CazzolaV #java
@Java: annotations in freedom (WC, EV), pp. 1688–1693.
SAC-2013-KumarR #algorithm #data type #identification #online
Online identification of frequently executed acyclic paths by leveraging data stream algorithms (GK, SR), pp. 1694–1695.
SAC-2013-CastorSS #assessment #haskell #memory management #transaction
A preliminary assessment of Haskell’s software transactional memory constructs (FC, FSN, ALMS), pp. 1696–1697.
SAC-2013-Slivnik #parsing
LLLR parsing (BS), pp. 1698–1699.
SAC-2013-CohenA #composition #refactoring #using
Practical use of static composition of refactoring operations (JC, AA), pp. 1700–1705.
SAC-2013-CazzolaV13a #fine-grained
Fine-grained annotations for pointcuts with a finer granularity (WC, EV), pp. 1706–1711.
SAC-2013-CiraciV #code generation #points-to
Exploiting points-to maps for de-/serialization code generation (SC, OV), pp. 1712–1719.
SAC-2013-SilvaATADG #architecture #overview
Smart cities software architectures: a survey (WMdS, , GHRPT, RAA, KLD, VCG), pp. 1722–1727.
SAC-2013-TranLZ #architecture #metadata #security
Derivation of domain-specific architectural knowledge views from governance and security compliance metadata (HT, IL, UZ), pp. 1728–1733.
SAC-2013-Jean-BaptisteMJA #adaptation #feature model #modelling #using
Modeling dynamic adaptations using augmented feature models (JBL, MTS, JMG, AB), pp. 1734–1741.
SAC-2013-HollEGV #framework #lifecycle #multi #product line
An infrastructure for the life cycle management of multi product lines (GH, CE, PG, MV), pp. 1742–1749.
SAC-2013-FanYZ #architecture #framework #modelling #scalability
A generic framework for deriving architecture modeling methods for large-scale software-intensive systems (ZF, TY, LZ), pp. 1750–1757.
SAC-2013-BruyninckxKHKGB #component #development #modelling #paradigm
The BRICS component model: a model-based development paradigm for complex robotics software systems (HB, MK, NH, GKK, LG, DB), pp. 1758–1764.
SAC-2013-DiwanCFLBHR #product line #web
Applying software product line engineering in building web portals for supercomputing services (PD, PC, EF, YL, TB, DEH, RR), pp. 1765–1771.
SAC-2013-MezghaniHRD #architecture #configuration management #modelling
A model driven methodology for enabling autonomic reconfiguration of service oriented architecture (EM, RBH, IBR, KD), pp. 1772–1773.
SAC-2013-DietrichRP #clustering #detection #visual notation
Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
SAC-2013-RieckerBH #detection #energy #lightweight #network
Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
SAC-2013-PayetDKV #analysis #execution #scalability
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
SAC-2013-EgnersM #framework #multi
Secure roaming and infrastructure sharing for multi-operator WMNs (AE, UM), pp. 1800–1807.
SAC-2013-SpreitzenbarthFESH #android #named
Mobile-sandbox: having a deeper look into android applications (MS, FCF, FE, TS, JH), pp. 1808–1815.
SAC-2013-JancewiczKMRS #execution
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals (RJJ, AK, LDM, AR, AAS), pp. 1816–1823.
SAC-2013-MartinaP #induction #multi #protocol #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SAC-2013-CarlosMPC #security
An updated threat model for security ceremonies (MCC, JEM, GP, RFC), pp. 1836–1843.
SAC-2013-HoffmannUHS #slicing
Slicing droids: program slicing for smali code (JH, MU, TH, MS), pp. 1844–1851.
SAC-2013-ArmandoCM
Bring your own device, securely (AA, GC, AM), pp. 1852–1858.
SAC-2013-AktasG #assessment #authentication #control flow #platform #runtime
Run-time control flow authentication: an assessment on contemporary x86 platforms (EA, KG), pp. 1859–1866.
SAC-2013-ShinYR #android #security #visual notation
Supporting visual security cues for WebView-based Android apps (DS, HY, UR), pp. 1867–1876.
SAC-2013-CameronSNMM #analysis #component #performance #realtime #rule-based
Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
SAC-2013-OliveiraB #configuration management #on the
On the reconfiguration of software connectors (NO, LSB), pp. 1885–1892.
SAC-2013-BartoliniBACM #monitoring
Apprehensive QoS monitoring of Service choreographies (CB, AB, GDA, AC, RM), pp. 1893–1899.
SAC-2013-DionisisCP #adaptation #exception #framework
An integrated framework for QoS-based adaptation and exception resolution in WS-BPEL scenarios (MD, VC, GP), pp. 1900–1906.
SAC-2013-ZagareseCZAPB #data-driven #interactive #performance
Efficient data-intensive event-driven interaction in SOA (QZ, GC, EZ, IA, LP, FB), pp. 1907–1912.
SAC-2013-GiustoP #adaptation #consistency #runtime
Disciplined structured communications with consistent runtime adaptation (CDG, JAP), pp. 1913–1918.
SAC-2013-KaratasK #approach #composition #flexibility #security
A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
SAC-2013-CruzCMZ #monitoring
Monitoring SOA-based applications with business provenance (SMSdC, RMC, LMBM, JZ), pp. 1927–1932.
SAC-2013-GaoB #architecture
User centric complex event processing based on service oriented architectures (FG, SB), pp. 1933–1934.
SAC-2013-BucchiaroneMMP #adaptation #concept #framework
A conceptual framework for collective adaptive systems (AB, AM, CAM, MP), pp. 1935–1936.
SAC-2013-TounsiKKDM #approach #design pattern #formal method #modelling #towards
Towards an approach for modeling and formalizing SOA design patterns with Event-B (IT, MHK, AHK, KD, EM), pp. 1937–1938.
SAC-2013-JungWKO #architecture #automation #interactive #using
Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems (MJ, JW, WK, AO), pp. 1939–1941.
SAC-2013-KoutrouliT #recommendation
Credible recommendation exchange mechanism for P2P reputation systems (EK, AT), pp. 1943–1948.
SAC-2013-ChoCC #ad hoc #mobile #network #trust
Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
SAC-2013-CataldiMA #network #social
Estimating domain-based user influence in social networks (MC, NM, MAA), pp. 1957–1962.
SAC-2013-HabibVM #framework #trust
A framework for evaluating trust of service providers in cloud marketplaces (SMH, VV, MM), pp. 1963–1965.
SAC-2013-HoelzR #framework #semantics
A framework for semantic annotation of digital evidence (BWPH, CGR), pp. 1966–1971.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.