Proceedings of the 29th Symposium on Applied Computing
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong
Proceedings of the 29th Symposium on Applied Computing
SAC, 2014.

SE
DBLP
Scholar
Full names Links ISxN
@proceedings{SAC-2014,
	acmid         = "2554850",
	address       = "Gyeongju, South Korea",
	editor        = "Yookun Cho and Sung Y. Shin and Sang-Wook Kim and Chih-Cheng Hung and Jiman Hong",
	isbn          = "978-1-4503-2469-4",
	publisher     = "{ACM}",
	title         = "{Proceedings of the 29th Symposium on Applied Computing}",
	year          = 2014,
}

Contents (317 items)

SAC-2014-PatanaikZK #estimation #parametricity #simulation
Parameter estimation and simulation for one-choice Ratcliff diffusion model (AP, VZ, CKK), pp. 3–7.
SAC-2014-PalVCS #detection #smarttech #using
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SAC-2014-TupakulaV #monitoring
Secure monitoring for dementia patients (UKT, VV), pp. 14–19.
SAC-2014-GraziadioDSSUME #game studies #identification #video
Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation (SG, RD, KS, KMAS, GU, GM, JAE), pp. 20–24.
SAC-2014-SilvaPBAP #architecture #cyber-physical #modelling #testing
A model-based architecture for testing medical cyber-physical systems (LCS, MP, FMB, HOA, AP), pp. 25–30.
SAC-2014-JungSWCP #difference #retrieval
Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate (BKJ, SYS, WW, HDC, JKP), pp. 31–32.
SAC-2014-ChenLFCCK #algorithm #design #detection #effectiveness #health #implementation #monitoring
Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology (HC, GTL, YCF, BCC, CMC, TCK), pp. 33–35.
SAC-2014-KlingerLRMLGSFM #low cost
A low cost digital operating room (AK, GLdL, VR, GM, GL, VG, FSdS, MDF, MBM), pp. 36–37.
SAC-2014-FerrazPG #feature model #symmetry
Feature description based on center-symmetric local mapped patterns (CTF, OPJ, AG), pp. 39–44.
SAC-2014-SilveiraMGCFR #energy #performance
Faster seam carving with minimum energy windows (CLBS, FdOM, LGJ, CAdC, KF, RdRR), pp. 45–48.
SAC-2014-CaetanoAGA #recognition #representation #visual notation
Representing local binary descriptors with BossaNova for visual recognition (CC, SEFdA, SJFG, AdAA), pp. 49–54.
SAC-2014-Zanchettin #recognition
Face recognition based on global and local features (CZ), pp. 55–57.
SAC-2014-SwamyIG #2d #image
Two level reversible data hiding in 2D images (NRS, SI, PG), pp. 58–59.
SAC-2014-AnderssonDA #artificial reality #identification #using
Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SAC-2014-LiWL #learning #mobile #online #recognition
Online learning with mobile sensor data for user recognition (HGL, XW, ZL), pp. 64–70.
SAC-2014-SpiegelJA #classification #distance #performance
Fast time series classification under lucky time warping distance (SS, BJJ, SA), pp. 71–78.
SAC-2014-RossiLR #algorithm #classification #network #using
A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SAC-2014-HuangYKYLYGFQ #analysis #clustering #self
Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
SAC-2014-ChenZTWS #modelling #recommendation
Comparing the staples in latent factor models for recommender systems (CC, LZ, AT, KW, SV), pp. 91–96.
SAC-2014-LiW #clustering #matrix #multi
Single multiplicatively updated matrix factorization for co-clustering (ZL, XW), pp. 97–104.
SAC-2014-HundtSSGD #automation #invariant #named #similarity
GEM: an elastic and translation-invariant similarity measure with automatic trend adjustment (CH, BS, ES, HG, HVD), pp. 105–112.
SAC-2014-HajianMPDG
Fair pattern discovery (SH, AM, DP, JDF, FG), pp. 113–120.
SAC-2014-SeelandKK #clustering #graph
Structural clustering of millions of molecular graphs (MS, AK, SK), pp. 121–128.
SAC-2014-SeelandMKK #classification
Extracting information from support vector machines for pattern-based classification (MS, AM, AK, SK), pp. 129–136.
SAC-2014-HuWZ #documentation #internet #topic
The discovery of user related rare sequential patterns of topics in the internet document stream (ZH, HW, JZ), pp. 137–138.
SAC-2014-JungKYM #algorithm #search-based
Investigation of hungarian mating schemes for genetic algorithms (CJ, YHK, YY, BRM), pp. 140–147.
SAC-2014-SantosSTO #approach #hybrid #navigation
A hybrid GA-ANN approach for autonomous robots topological navigation (VdCS, DOS, CFMT, FSO), pp. 148–153.
SAC-2014-WangEB #evolution #orthogonal
Mirrored orthogonal sampling with pairwise selection in evolution strategies (HW, ME, TB), pp. 154–156.
SAC-2014-CaniGSST #automation #code generation #integration #towards
Towards automated malware creation: code generation and code integration (AC, MG, ES, GS, APT), pp. 157–160.
SAC-2014-KleffmannBHG #automation #interactive #navigation #scalability #sketching #version control
Automated versioning and temporal navigation for model sketches on large interactive displays (MK, MB, EH, VG), pp. 161–168.
SAC-2014-GomesACHS #agile #development #framework #game studies #platform #using
Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SAC-2014-KimK #community #detection #mobile #network #social
A detection of overlapping community in mobile social network (PK, SK), pp. 175–179.
SAC-2014-ParkPJ #artificial reality #education #online
QR-code based online robot augmented reality system for education (JPP, MWP, SKJ), pp. 180–185.
SAC-2014-Alonso-RiosRPKF #case study #smarttech #user interface #user study
A user study on tailoring GUIs for smartphones (DAR, DR, RP, HK, JF), pp. 186–192.
SAC-2014-SakamotoKTT #visualisation
Method for visualizing undone operations based on changes on desktop screen (AS, TK, TT, MT), pp. 193–195.
SAC-2014-A #authentication #health #mobile #network #privacy #research #student
Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
SAC-2014-BillhardtLOBD
Intelligent event processing for emergency medical assistance (HB, ML, SO, RB, JD), pp. 200–206.
SAC-2014-CalvoOFR #distributed #multi #parametricity
Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasks (RC, JdO, MF, RAR), pp. 207–212.
SAC-2014-OmatuY #classification #smell #using
Smell classification using weakly responding data (SO, MY), pp. 213–214.
SAC-2014-BorgesDRI #education #gamification
A systematic mapping on gamification applied to education (SdSB, VHSD, HMR, SI), pp. 216–222.
SAC-2014-AnjosTCON #3d #evaluation #interactive #statistics
Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments (AMdA, RT, AC, SdO, FLSN), pp. 223–228.
SAC-2014-PaivaBSBS #case study #lessons learnt #online
Lessons learned from an online open course: a Brazilian case study (ROAP, DB, JS, IIB, APdS), pp. 229–234.
SAC-2014-SeffrinRJ #algebra #network
A dynamic bayesian network for inference of learners’ algebraic knowledge (HMS, GLR, PAJ), pp. 235–240.
SAC-2014-OliveiraNV #framework #towards
Towards a framework for relevant guidance (EHTO, EHN, RMV), pp. 241–242.
SAC-2014-ManhaesCZ #architecture #named #predict #using
WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SAC-2014-GuoZTBY #empirical #recommendation #trust
From ratings to trust: an empirical study of implicit trust in recommender systems (GG, JZ, DT, AB, NYS), pp. 248–253.
SAC-2014-WangMLG #recommendation #social
Recommendation based on weighted social trusts and item relationships (DW, JM, TL, LG), pp. 254–259.
SAC-2014-ChenCWD #recommendation #scalability
Instant expert hunting: building an answerer recommender system for a large scale Q&A website (TC, JC, HW, YD), pp. 260–265.
SAC-2014-ShangHHCK #personalisation #recommendation #towards
Beyond personalization and anonymity: towards a group-based recommender system (SS, YH, PH, PC, SRK), pp. 266–273.
SAC-2014-ZhengBM #empirical #recommendation
Splitting approaches for context-aware recommendation: an empirical study (YZ, RDB, BM), pp. 274–279.
SAC-2014-Moin #approach #collaboration #visualisation
A unified approach to collaborative data visualization (AM), pp. 280–286.
SAC-2014-BasuCKVMM #named
PrefRank: fair aggregation of subjective user preferences (AB, JCC, SK, JV, SM, YM), pp. 287–288.
SAC-2014-RolimBCCAPM #approach #multimodal #recommendation
A recommendation approach for digital TV systems based on multimodal features (RR, FB, AC, GC, HOdA, AP, AFM), pp. 289–291.
SAC-2014-Zheng #matrix #using
Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
SAC-2014-RaadE #integration #ontology
Is ontology alignment like analogy?: knowledge integration with LISA (ER, JE), pp. 294–301.
SAC-2014-SaSCTMR #graph #named
LEGi: context-aware lexicon consolidation by graph inspection (GS, TS, RC, FT, FM, LCdR), pp. 302–307.
SAC-2014-KluschMKS #monitoring #named #semantics
ICM-Wind: semantics-empowered fluid condition monitoring of wind turbines (MK, APM, PK, AS), pp. 308–315.
SAC-2014-VidalCNM #approach #automation #generative
A semi-automatic approach for generating customized R2RML mappings (VMPV, MAC, LETN, JMM), pp. 316–322.
SAC-2014-FalboRGBA #enterprise #ontology #pattern matching #towards
Towards an enterprise ontology pattern language (RdAF, FBR, GG, MPB, JPAA), pp. 323–330.
SAC-2014-BaeLKWP #network #privacy #social
Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
SAC-2014-MehdiIHKDS #keyword
Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
SAC-2014-BeckersCG #in the cloud #requirements #security
A catalog of security requirements patterns for the domain of cloud computing systems (KB, IC, LG), pp. 337–342.
SAC-2014-KatebFNMAT #framework #modelling #multi #optimisation #platform #runtime
Generic cloud platform multi-objective optimization leveraging models@run.time (DEK, FF, GN, JAM, MA, YLT), pp. 343–350.
SAC-2014-CruzBZCC #case study #metadata #workflow
Collecting cloud provenance metadata with Matriohska: a case study with genomic workflows (SMSdC, LMMB, JZ, RMC, MLMC), pp. 351–356.
SAC-2014-ZhanLS #analysis #in the cloud #mobile
A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
SAC-2014-AlabdulhafezE #case study #comparative #in the cloud #virtual machine
Experimenting on virtual machines co-residency in the cloud: a comparative study of available test beds (AA, PDE), pp. 363–365.
SAC-2014-XavierOPR #clustering #database #in the cloud #platform #towards
Towards better manageability of database clusters on cloud computing platforms (MGX, ICDO, RDDP, CAFDR), pp. 366–367.
SAC-2014-DieguesOPRR #modelling
Autonomic configuration of HyperDex via analytical modelling (NLD, MO, JP, LETR, PR), pp. 370–375.
SAC-2014-CamaraLLVV #adaptation #evaluation #framework #robust #self
Robustness evaluation of the rainbow framework for self-adaptation (JC, RdL, NL, RV, MV), pp. 376–383.
SAC-2014-MartorellFRV #adaptation #embedded
Improving adaptiveness of AUTOSAR embedded applications (HM, JCF, MR, RV), pp. 384–390.
SAC-2014-KrikavaCF #adaptation #architecture #modelling #named #self
ACTRESS: domain-specific modeling of self-adaptive software architectures (FK, PC, RBF), pp. 391–398.
SAC-2014-CruzMOV
Workload-aware table splitting for NoSQL (FC, FM, RO, RV), pp. 399–404.
SAC-2014-ChakrabortyCKD #adaptation #distributed
Hierarchical topology adaptation for distributed convergecast applications (SC, SC, SK, HSD), pp. 405–407.
SAC-2014-WangZC #composition #energy #framework #network
An energy-aware service composition framework for service-oriented wireless sensor networks (TW, KZ, LC), pp. 408–410.
SAC-2014-DaDR #middleware #mobile #named
Kalimucho: middleware for mobile applications (KD, MD, PR), pp. 413–419.
SAC-2014-GriebeG #approach #automation #mobile #modelling #testing
A model-based approach to test automation for context-aware mobile applications (TG, VG), pp. 420–427.
SAC-2014-HosokawaNY #identification #information retrieval
Location-aware information retrieval for identifying local and distant landmark (YH, YN, TY), pp. 428–435.
SAC-2014-SehicNVLD #adaptation #development #named #programming
Entity-adaptation: a programming model for development of context-aware applications (SS, SN, MV, FL, SD), pp. 436–443.
SAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech #using
A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SAC-2014-Le #android #framework #modelling
A model driven framework for modeling and composing service based Android applications (CL), pp. 450–457.
SAC-2014-Fernandez-MarquezSSYDZ #approach #mobile #self
Self-managing and self-organising mobile computing applications: a separation of concerns approach (JLFM, GDMS, GS, JY, SD, FZ), pp. 458–465.
SAC-2014-SantosBAP #health #protocol
Integrating IEEE 11073 and constrained application protocol for personal health devices (DFSS, FB, HOA, AP), pp. 466–467.
SAC-2014-KawsarAL #detection #multimodal #process #smarttech #using
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SAC-2014-Majumder #realtime
A real-time smartphone- and smartshoe-based fall prevention system (AKMJAM), pp. 470–471.
SAC-2014-MazelFF #comparison #detection #diagrams #network #visual notation
Visual comparison of network anomaly detectors with chord diagrams (JM, RF, KF), pp. 473–480.
SAC-2014-ZeilemakerSP #network #scalability
Large-scale message synchronization in challenged networks (NZ, BS, JAP), pp. 481–488.
SAC-2014-GomesBM #network #similarity
A similarity model for virtual networks negotiation (RLG, LFB, ERMM), pp. 489–494.
SAC-2014-WangW #network
Wavelength resources based lightpath-level active rerouting in all-optical WDM networks (SWW, CYW), pp. 495–500.
SAC-2014-PetroccoCPE #performance
Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
SAC-2014-LiuCM #ad hoc #approach #composition #mobile #network
A low-latency service composition approach in mobile ad hoc networks (CL, JC, FLM), pp. 509–511.
SAC-2014-PengYYHKH #3d #detection #multi #using
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SAC-2014-GeorgiadisP #algorithm #online #problem #scheduling #smarttech
Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithm (GG, MP), pp. 518–524.
SAC-2014-LopezTCC #algorithm #automation #design
Design of an automatic demand-side management system based on evolutionary algorithms (EGL, AT, SC, VC), pp. 525–530.
SAC-2014-BarbosaBAC #lightweight #privacy
Lightweight privacy for smart metering data by adding noise (PB, AB, HA, SC), pp. 531–538.
SAC-2014-LiuGSLSX #communication #encryption #grid #named #smarttech
SEDE: state estimation-based dynamic encryption scheme for smart grid communication (TL, YG, YS, YL, YS, FX), pp. 539–544.
SAC-2014-TesfayHBO #architecture #communication #network
Cyber-secure communication architecture for active power distribution networks (TTT, JPH, JYLB, PO), pp. 545–552.
SAC-2014-SpiegelA #energy
Energy disaggregation meets heating control (SS, SA), pp. 559–566.
SAC-2014-FlemingWWS #monitoring
Monitoring water scarcity risk in Africa (KF, KW, HW, OS), pp. 567–568.
SAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SAC-2014-Gutierrez-GarciaG #multi #safety #simulation
Multi-agent simulation of perception of safety from crime (JOGG, AGdSG), pp. 573–578.
SAC-2014-LargillierPP #named #robust
Rocovo: robust communal publication scheme (TL, GP, SP), pp. 579–586.
SAC-2014-ZangerleS #classification #quote #twitter
“Sorry, I was hacked”: a classification of compromised twitter accounts (EZ, GS), pp. 587–593.
SAC-2014-YoonKHKRC #metric #reachability #similarity
Reachability vectors: features for link-based similarity measures (SHY, JSK, JH, SWK, MR, HJC), pp. 594–597.
SAC-2014-VasconcelosAG #code review #predict #what
What makes your opinion popular?: predicting the popularity of micro-reviews in foursquare (MAV, JMA, MAG), pp. 598–603.
SAC-2014-AlharbiZ #predict #social
Exploring the significance of human mobility patterns in social link prediction (BA, XZ), pp. 604–609.
SAC-2014-FanC #approximate #framework #network #scalability #social
An approximate framework for scaling social influence computation in large networks (YCF, HC), pp. 610–615.
SAC-2014-ArnaboldiCGPP #information management
Information diffusion in OSNs: the impact of nodes’ sociality (VA, MC, MLG, AP, FP), pp. 616–621.
SAC-2014-TogneriCK #information management #locality #online
The importance of geographic locality for online information diffusion (RMT, BTC, CAK), pp. 622–627.
SAC-2014-FreitasVHBV #detection #twitter
Pathways for irony detection in tweets (LAdF, AAV, DNH, MNB, RV), pp. 628–633.
SAC-2014-SeoKTC #analysis #framework #network #social
A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
SAC-2014-CamposM #automation #categorisation
Automatic categorization of questions from Q&A sites (ECC, MdAM), pp. 641–643.
SAC-2014-LiuMHHSC #algorithm #hybrid #recommendation #twitter
A hybrid algorithm for recommendation twitter peers (JNKL, ZM, YXH, YLH, SCKS, VWSC), pp. 644–649.
SAC-2014-LiSSJW #information management
Preventing the diffusion of negative information based on local influence tree (YL, YS, JS, BJ, JW), pp. 650–652.
SAC-2014-QuilleTR #analysis
Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
SAC-2014-RanaKS #algorithm #evaluation #ranking #social
The strength of social strength: an evaluation study of algorithmic versus user-defined ranking (JR, JK, KS), pp. 658–659.
SAC-2014-PessinOUWMV #evolution #learning #network #self
Self-localisation in indoor environments combining learning and evolution with wireless networks (GP, FSO, JU, DFW, RCM, PAV), pp. 661–666.
SAC-2014-HuangLD #analysis #delivery #modelling #multi #network #performance
Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
SAC-2014-AminikhanghahiWSSJ #effectiveness #feature model #smarttech
Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening (SA, WW, SYS, SHS, SIJ), pp. 674–679.
SAC-2014-KrichenAB #health #monitoring
WSN-based flutter control application for aircraft wings structural health monitoring (DK, WA, NB), pp. 680–685.
SAC-2014-MotaB #algorithm #anti #internet
A dynamic frame slotted ALOHA anti-collision algorithm for the internet of things (RPBM, DMB), pp. 686–691.
SAC-2014-HeimfarthGFA #latency #named #protocol
GB-MAC: a backbone based low latency protocol for WSNs (TH, JCG, AVF, JPdA), pp. 692–698.
SAC-2014-YoonY #authentication #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SAC-2014-AhmedWK #clustering #energy #named #performance
EENC — energy efficient nested clustering in UASN (SHA, AW, DK), pp. 706–710.
SAC-2014-JunAK #detection #using
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SAC-2014-Mota #internet #quality #research #student
Student research abstract: mechanisms to ensure quality of service for the internet of things (RPBM), pp. 713–714.
SAC-2014-Daniel #communication #protocol #using
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SAC-2014-Khan #independence #research #standard #student
Student research abstract: an optimized handover scheme based on media independent handover standard IEEE 802.21 (MK), pp. 717–718.
SAC-2014-WatanabeGF #consistency #navigation
Keyboard navigation mechanisms in tab widgets: an investigation on ARIA’s conformance (WMW, RJG, RPdMF), pp. 721–726.
SAC-2014-ArapovBO #named #web #wiki
WikiNEXT: a wiki for exploiting the web of data (PA, MB, ABO), pp. 727–734.
SAC-2014-GaubatzHZS #collaboration #constraints #documentation #editing #realtime #web
Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents (PG, WH, UZ, MS), pp. 735–742.
SAC-2014-IturriozAD #monitoring
Generalizing the “like” button: empowering websites with monitoring capabilities (JI, IA, OD), pp. 743–750.
SAC-2014-ManducaMFP #approach #database #implementation #multitenancy #web
A nonintrusive approach for implementing single database, multitenant services from web applications (AMM, EVM, RPMF, MdGCP), pp. 751–756.
SAC-2014-CimanGG #animation #case study #development #mobile #platform
Cross-platform mobile development: a study on apps with animations (MC, OG, NG), pp. 757–759.
SAC-2014-Yoo #named #online
OSBS: online storm-water billing system (WSY), pp. 760–761.
SAC-2014-TragatschnigTZ #impact analysis #using
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SAC-2014-YokoyamaKM #using
Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SAC-2014-RighiCGFAG #transaction
Redesigning transaction load balancing on electronic funds transfer scenarios (RdRR, CAdC, LGJ, KF, ALA, LG), pp. 775–777.
SAC-2014-ChallcoI #authoring #design #learning #personalisation #towards
Towards a learning design authoring tool that generates personalized units of learning for CSCL (GCC, SI), pp. 778–780.
SAC-2014-SaraivaS #behaviour #how
Choosing my partners based on how they will evaluate my behavior (ECdRCS, VTdS), pp. 781–783.
SAC-2014-BarddalGE #classification #concept #named #network #social
SFNClassifier: a scale-free social network method to handle concept drift (JPB, HMG, FE), pp. 786–791.
SAC-2014-IencoBPP #category theory #data type #detection #evolution
Change detection in categorical evolving data streams (DI, AB, BP, PP), pp. 792–797.
SAC-2014-GomesE #adaptation #classification #data type #named #social
SAE2: advances on the social adaptive ensemble classifier for data streams (HMG, FE), pp. 798–804.
SAC-2014-ZimmermannNS #adaptation #classification
Adaptive semi supervised opinion classifier with forgetting mechanism (MZ, EN, MS), pp. 805–812.
SAC-2014-HalderZC #analysis #database #information management #query
Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
SAC-2014-LinWCC #query
Finding targets with the nearest favor neighbor and farthest disfavor neighbor by a skyline query (YWL, ETW, CFC, ALPC), pp. 821–826.
SAC-2014-DouglasL #database #embedded #named #sql
LittleD: a SQL database for sensor nodes and embedded applications (GD, RL), pp. 827–832.
SAC-2014-OliveiraMB #documentation #semantics #towards #xml
Towards semantic diff of XML documents (AO, LM, VB), pp. 833–838.
SAC-2014-RaigozaS
Temporal join processing with hilbert curve space mapping (JR, JS), pp. 839–844.
SAC-2014-KimKYP #network #online #social
Sampling in online social networks (SWK, KNK, SHY, SP), pp. 845–849.
SAC-2014-LiuTZ #constraints #mining
Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
SAC-2014-RithLM #sql
Speaking in tongues: SQL access to NoSQL systems (JR, PSL, KMW), pp. 855–857.
SAC-2014-MesmoudiH #declarative #framework #query #scalability
A test framework for large scale declarative queries: preliminary results (AM, MSH), pp. 858–859.
SAC-2014-AvilaMRPY #distributed #quantum #simulation
GPU-aware distributed quantum simulation (AA, AM, RR, MLP, ACY), pp. 860–865.
SAC-2014-AndradeRMOCFR #architecture #hybrid #performance #scheduling
Efficient dynamic scheduling of heterogeneous applications in hybrid architectures (GA, GSR, DM, RSO, EC, RF, LCdR), pp. 866–871.
SAC-2014-SahuR #clustering #runtime
Creating heterogeneity at run time by dynamic cache and bandwidth partitioning schemes (AS, SR), pp. 872–879.
SAC-2014-AlexandreMP #algorithm #multi #on the
On the support of task-parallel algorithmic skeletons for multi-GPU computing (FA, RM, HP), pp. 880–885.
SAC-2014-RockiBS #abstraction #future of #performance #programming #question
The future of accelerator programming: abstraction, performance or can we have both? (KR, MB, RS), pp. 886–895.
SAC-2014-MitranCB #automation #image #ranking
GeoTime-based tag ranking model for automatic image annotation (MM, GC, MB), pp. 896–901.
SAC-2014-BergamascoN #3d #approach #feature model #retrieval #using
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SAC-2014-KimLSKL #approach #named #ranking #web
C-Rank: a contribution-based web page ranking approach (DJK, SCL, HYS, SWK, JBL), pp. 908–912.
SAC-2014-NgoPLS #image #named #query #recommendation
Recommend-Me: recommending query regions for image search (TDN, SP, DDL, SS), pp. 913–918.
SAC-2014-JuniorGM #collaboration #constraints #modelling #personalisation
Personalized collaborative filtering: a neighborhood model based on contextual constraints (EBSJ, RG, MGM), pp. 919–924.
SAC-2014-BelbachirBM #modelling #probability
Probabilistic opinion models based on subjective sources (FB, MB, MMSM), pp. 925–926.
SAC-2014-MoonPPS #recognition
Improved named entity recognition: patterns in columns model (PCM) (CYM, MP, HyP, JS), pp. 927–928.
SAC-2014-AudehBB #information retrieval #query
Exploring query reformulation for named entity expansion in information retrieval (BA, PB, MB), pp. 929–930.
SAC-2014-LiMZ #using #visualisation
Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SAC-2014-UnoI #music #named #recommendation
MALL: a life log based music recommendation system and portable music player (AU, TI), pp. 939–944.
SAC-2014-CostaTT #image #named #performance
MFS-Map: efficient context and content combination to annotate images (AFC, AJMT, CTJ), pp. 945–950.
SAC-2014-YangDZYZN #scalability #visualisation
Visualizing large hierarchies with drawer trees (YY, ND, SZ, ZY, KZ, QVN), pp. 951–956.
SAC-2014-PedrosaP #using
Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SAC-2014-SantannaSB #automation #image #retrieval #towards
Content-based image retrieval towards the automatic characterization of soybean seed vigor (MGFS, PTMS, PHB), pp. 964–969.
SAC-2014-NunesNR #contest #game studies #people
Motivating people to perform better in exergames: competition in virtual environments (MBN, LPN, VR), pp. 970–975.
SAC-2014-Tobita #named #novel #ubiquitous #visualisation
Aero-screen: blimp-based ubiquitous screen for novel digital signage and information visualization (HT), pp. 976–980.
SAC-2014-ChenWWZL #3d #approach #web
An approach to support stereoscopic 3D web (QC, WW, RW, JZ, ZL), pp. 981–984.
SAC-2014-HusemannR #multi #predict #scalability #video
Introduction of a multi-layer predictive search strategy for scalable video coding (RH, VR), pp. 985–986.
SAC-2014-Lutz0D #question #smarttech
Are smartphones better than CRC cards? (RL, SS, SD), pp. 987–994.
SAC-2014-PimentelCMAS #design #refinement #requirements
From requirements to statecharts via design refinement (JP, JC, JM, KA, VESS), pp. 995–1000.
SAC-2014-EngielCL #approach #concept #elicitation #using
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SAC-2014-AlmenteroLL #composition #requirements #towards
Towards software modularization from requirements (EA, JCSdPL, CJPdL), pp. 1007–1012.
SAC-2014-ZardariBE #using
Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SAC-2014-Silva #approach #automation #overview #quality #requirements #specification #validation
Quality of requirements specifications: a preliminary overview of an automatic validation approach (ARdS), pp. 1021–1022.
SAC-2014-HoritaHSNTO #approach #modelling #refinement #using
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SAC-2014-BassoPOF #adaptation #case study #experience #generative #lessons learnt #model transformation
Generative adaptation of model transformation assets: experiences, lessons and drawbacks (FPB, RMP, TCdO, MDDF), pp. 1027–1034.
SAC-2014-OhK #architecture #requirements #traceability
A hierarchical model for traceability between requirements and architecture (JO, SK), pp. 1035–1042.
SAC-2014-GuimaraesGF #composition #on the #quantifier
On the impact of obliviousness and quantification on model composition effort (EG, AG, KF), pp. 1043–1048.
SAC-2014-CogniniCGPR #adaptation #challenge #process #research
Research challenges in business process adaptability (RC, FC, SG, AP, BR), pp. 1049–1054.
SAC-2014-ChaturvediP #component #game studies #ontology
Ontology driven builder pattern: a plug and play component (AC, TVP), pp. 1055–1057.
SAC-2014-HuangCLWL #adaptation #interactive #random #testing
Adaptive random prioritization for interaction test suites (RH, JC, ZL, RW, YL), pp. 1058–1063.
SAC-2014-ZiadiHPZT #approach #independence #product line #towards
Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
SAC-2014-PengST #case study #development #mobile #network #social
Success factors in mobile social networking application development: case study of instagram (RP, DS, WTT), pp. 1072–1079.
SAC-2014-KangS #analysis #implementation #scheduling
Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
SAC-2014-MaAS #graph
Project centralization based on graph coloring (LM, CA, HS), pp. 1086–1093.
SAC-2014-GaoEWGL #empirical #generative #testing
An empirical study of requirements-based test generation on an automobile control system (RG, JSE, WEW, XG, SYL), pp. 1094–1099.
SAC-2014-GuoQS
Locating fault-inducing patterns from structural inputs (HFG, ZQ, HPS), pp. 1100–1107.
SAC-2014-Al-RefaiCF #modelling #runtime #using
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SAC-2014-GamaD #approach #deployment #fault #self #testing
A fault deployment and activation approach for testing self-recovery mechanisms (KG, DD), pp. 1114–1119.
SAC-2014-FoucaultPFB #metric
Computing contextual metric thresholds (MF, MP, JRF, XB), pp. 1120–1125.
SAC-2014-LaurentBBG #declarative #process
Planning for declarative processes (YL, RB, SB, MPG), pp. 1126–1133.
SAC-2014-YangZL #algorithm #debugging #developer #effectiveness #multi #recommendation
Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively (GY, TZ, BL), pp. 1134–1139.
SAC-2014-NguyenJ0B #automation #diagrams #embedded #modelling #realtime #uml
Automatic construction of timing diagrams from UML/MARTE models for real-time embedded software (MCN, EJ, JC, DHB), pp. 1140–1145.
SAC-2014-BoghratiHK #framework #process #using
Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SAC-2014-CostaKAC #case study #commit #developer
Unveiling developers contributions behind code commits: an exploratory study (DAdC, UK, EA, RC), pp. 1152–1157.
SAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SAC-2014-MaWX #behaviour #commit #developer #empirical #open source
Dynamics of open-source software developer’s commit behavior: an empirical investigation of subversion (YM, YW, YX), pp. 1171–1173.
SAC-2014-WayuaWS #modelling
Rethinking agribusiness models in Africa (CW, KW, OS), pp. 1174–1175.
SAC-2014-KumeNNS #dynamic analysis #framework
A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
SAC-2014-ChenML #case study #education #research #testing
Combining research and education of software testing: a preliminary study (ZC, AM, BL), pp. 1179–1180.
SAC-2014-FariasGLGCRBO #composition #quality #towards
Towards a quality model for model composition effort (KF, AG, CJPdL, LGJ, CAdC, RdRR, FPB, TCdO), pp. 1181–1183.
SAC-2014-XiaLWZ #analysis #predict
Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
SAC-2014-ZhaoXKLL #debugging #empirical #process
An empirical study of bugs in build process (XZ, XX, PSK, DL, SL), pp. 1187–1189.
SAC-2014-XavierMMA #overview #reliability #research
A survey on research in software reliability engineering in the last decade (JX, AM, RM, LBdA), pp. 1190–1191.
SAC-2014-FieldAE #development #energy #framework #named
EACOF: a framework for providing energy transparency to enable energy-aware software development (HF, GA, KE), pp. 1194–1199.
SAC-2014-NoureddineRS #energy #library #testing
Unit testing of energy consumption of software libraries (AN, RR, LS), pp. 1200–1205.
SAC-2014-BrinkeMBBAK #approach #composition #design #energy
A tool-supported approach for modular design of energy-aware software (StB, SM, CB, LB, MA, SK), pp. 1206–1212.
SAC-2014-CorralGSS #android #energy #implementation
Method reallocation to reduce energy consumption: an implementation in Android OS (LC, ABG, AS, GS), pp. 1213–1218.
SAC-2014-HassanB #as a service
Green-as-a-service (GaaS) for cloud service provision operation (MIH, RB), pp. 1219–1220.
SAC-2014-Brinke #energy
Interpreting energy profiles with CEGAR (StB), pp. 1221–1222.
SAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SAC-2014-ParraJGI #approach #automation #product line
An SOA approach for automating software product line adoption (CP, DJ, LG, AI), pp. 1231–1238.
SAC-2014-KarumanchiS #case study #scalability #web #web service
In the wild: a large scale study of web services vulnerabilities (SK, ACS), pp. 1239–1246.
SAC-2014-OliveiraSB #analysis #coordination
Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
SAC-2014-Guimaraes #architecture #composition #distributed #fault tolerance
A fault-tolerant architecture for decentralized compositions of services in the wild (FPG), pp. 1255–1256.
SAC-2014-ChenZW #detection #named #testing
Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
SAC-2014-RiveraC #java #source code
Translating event-B to JML-specified Java programs (VR, NC), pp. 1264–1271.
SAC-2014-BeoharM #consistency #testing
Input-output conformance testing based on featured transition systems (HB, MRM), pp. 1272–1278.
SAC-2014-PinisettyFJM #runtime
Runtime enforcement of regular timed properties (SP, YF, TJ, HM), pp. 1279–1286.
SAC-2014-BonifacioM #on the #testing
On the completeness of test suites (ALB, AVM), pp. 1287–1292.
SAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SAC-2014-PaulL #overview
A systematic literature review on modified condition and decision coverage (TKP, MFL), pp. 1301–1308.
SAC-2014-PereiraS #complexity #deduction #source code
Complexity checking of ARM programs, by deduction (MP, SMdS), pp. 1309–1314.
SAC-2014-RibeiroS #domain-specific language #mobile #named
XIS-mobile: a DSL for mobile applications (AR, ARdS), pp. 1316–1323.
SAC-2014-RaneburgerKPSA #automation #design #generative #interactive #process #user interface
A process for facilitating interaction design through automated GUI generation (DR, HK, RP, VS, AA), pp. 1324–1330.
SAC-2014-EtcheversSBCP #reliability #self
Reliable self-deployment of cloud applications (XE, GS, FB, TC, NDP), pp. 1331–1338.
SAC-2014-HenrioR #declarative #scheduling
Declarative scheduling for active objects (LH, JR), pp. 1339–1344.
SAC-2014-Umatani #calculus #implementation
Practical implementation techniques of ambient calculus in conventional dynamic languages (SU), pp. 1345–1351.
SAC-2014-KuhnCJN #flexibility #modelling
Flexible modeling of policy-driven upstream notification strategies (EK, SC, GJ, MN), pp. 1352–1354.
SAC-2014-AngelisFS #composition #self
Self-composition of services with chemical reactions (FDA, JLFM, GDMS), pp. 1355–1356.
SAC-2014-AmadiniGM #constraints #theorem proving
An enhanced features extractor for a portfolio of constraint solvers (RA, MG, JM), pp. 1357–1359.
SAC-2014-MuneraDAC #flexibility #parallel
Flexible cooperation in parallel local search (DM, DD, SA, PC), pp. 1360–1361.
SAC-2014-KolbZWR #design #distance #empirical #how #modelling #process #social
How social distance of process designers affects the process of process modeling: insights from a controlled experiment (JK, MZ, BW, MR), pp. 1364–1370.
SAC-2014-Benner-WicknerBBG #execution
Execution support for agenda-driven case management (MBW, MB, TB, VG), pp. 1371–1377.
SAC-2014-FdhilaR #co-evolution #collaboration #predict #process
Predicting change propagation impacts in collaborative business processes (WF, SRM), pp. 1378–1385.
SAC-2014-SaarsenD #assessment #process #towards
Towards an assessment model for balancing process model production and use (TS, MD), pp. 1386–1392.
SAC-2014-WangWPSC #collaboration #network #process
A collaborative processes synchronization method with regards to system crashes and network failures (LW, AW, LFP, MvS, CC), pp. 1393–1398.
SAC-2014-LabdaMS #modelling #privacy #process
Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
SAC-2014-MolkaRDCZG #consistency #modelling #process
Conformance checking for BPMN-based process models (TM, DR, MD, AC, XJZ, WG), pp. 1406–1413.
SAC-2014-EvermannA #algorithm #big data #implementation #mining #process
Big data meets process mining: implementing the alpha algorithm with map-reduce (JE, GA), pp. 1414–1416.
SAC-2014-RamosV #architecture #enterprise
eXtreme enterprise architecture planning (HR, AV), pp. 1417–1419.
SAC-2014-AntunesBMBC #analysis #architecture #enterprise #ontology
Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
SAC-2014-TsaiC #3d #manycore
A thermal-throttling server in 3D multicore chips (THT, YSC), pp. 1425–1430.
SAC-2014-BertoutFO #automation #clustering #heuristic #realtime #set
A heuristic to minimize the cardinality of a real-time task set by automated task clustering (AB, JF, RO), pp. 1431–1436.
SAC-2014-ChangTK #3d
A traffic-balanced routing scheme for heat balance in 3D networks-on-chip (WCC, HWT, CFK), pp. 1437–1442.
SAC-2014-ZanattaBGL #component #framework #monitoring #off the shelf
Building a WSN infrastructure with COTS components for the thermal monitoring of datacenters (GZ, GDB, RG, JCBL), pp. 1443–1448.
SAC-2014-YooLB #memory management #policy
The least-dirty-first cache replacement policy for phase-change memory (SY, EL, HB), pp. 1449–1454.
SAC-2014-AlnajemZ #evaluation #mobile
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context (AAIA, NZ), pp. 1455–1462.
SAC-2014-HongHKK #mobile #music #recommendation #smarttech
Context-aware music recommendation in mobile smart devices (JH, WSH, JHK, SWK), pp. 1463–1468.
SAC-2014-ChangCHKL #analysis #behaviour #mobile
Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SAC-2014-KinaiBWMWS #framework #platform
Traffic 411: a traffic congestion routing and awareness platform for Nairobi (AK, REB, AWB, EM, KW, OS), pp. 1475–1476.
SAC-2014-LoCCSL #algorithm #locality
ICAP, a new flash wear-leveling algorithm inspired by locality (SWL, BHC, YWC, TCS, YCL), pp. 1478–1483.
SAC-2014-SuzakiYTOS #protocol #testing #virtual machine
Rollback mechanism of nested virtual machines for protocol fuzz testing (KS, TY, AT, YO, ES), pp. 1484–1491.
SAC-2014-BaeCPJKC #clustering #effectiveness #memory management
An effective data clustering method based on expected update time in flash memory environment (DHB, JWC, SMP, BSJ, SWK, SjC), pp. 1492–1497.
SAC-2014-KuoT #in the cloud #incremental #virtual machine
Delay-based incrementally mapping of virtual machines in cloud computing systems (CFK, HWT), pp. 1498–1503.
SAC-2014-ChangHL #adaptation #clustering #optimisation #using
Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SAC-2014-WangH #data access #fine-grained #performance
An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan (MW, YH), pp. 1511–1516.
SAC-2014-ParkKC #framework #kernel #memory management #online #platform #using
Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SAC-2014-MatiasPASH #case study #empirical #operating system #reliability
An empirical exploratory study on operating system reliability (RM, MP, LBdA, CS, LH), pp. 1523–1528.
SAC-2014-NogueiraMV #case study #execution
An experimental study on execution time variation in computer experiments (PEN, RMJ, EV), pp. 1529–1534.
SAC-2014-LeeJB #design #file system #memory management #named #similarity
DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory (EL, JEJ, HB), pp. 1535–1540.
SAC-2014-LeePKH #clustering
Per-cluster allocation of relocation staff on electric vehicle sharing systems (JL, GLP, JK, NH), pp. 1541–1542.
SAC-2014-OliveiraO #analysis #kernel #linux
Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
SAC-2014-EliasMFB #algorithm #analysis #memory management
Experimental and theoretical analyses of memory allocation algorithms (DE, RM, MF, LBdA), pp. 1545–1546.
SAC-2014-HamerW #platform #scalability
Large scale processing of landsat data on various software platforms (GH, JW), pp. 1547–1549.
SAC-2014-Rohrig #domain-specific language #process #scheduling
A domain specific language for process scheduling (DR), pp. 1550–1551.
SAC-2014-Sechting #framework #independence #platform
A platform independent scheduler framework (CRS), pp. 1552–1553.
SAC-2014-SerranoG #performance
Locking fast (MS, JG), pp. 1556–1561.
SAC-2014-PatrignaniC #low level #semantics
Fully abstract trace semantics for low-level isolation mechanisms (MP, DC), pp. 1562–1569.
SAC-2014-ReisIB #syntax
Defining the syntax of extensible languages (LVdSR, VODI, RdSB), pp. 1570–1576.
SAC-2014-LoulergueRTLH #parallel #problem
Formal derivation and extraction of a parallel program for the all nearest smaller values problem (FL, SR, JT, JL, ZH), pp. 1577–1584.
SAC-2014-DabrowskiLP #concurrent #thread
Nested atomic sections with thread escape: a formal definition (FD, FL, TP), pp. 1585–1592.
SAC-2014-TarauB #algorithm
Arithmetic algorithms for hereditarily binary natural numbers (PT, BPB), pp. 1593–1600.
SAC-2014-BassoOF #java #model transformation
Extending JUnit 4 with Java annotations and reflection to test variant model transformation assets (FPB, TCdO, KF), pp. 1601–1608.
SAC-2014-NabeezathP #algorithm #detection #performance
Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
SAC-2014-KrikavaCF14a #domain-specific language #modelling #using
Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SAC-2014-PotocnikCS #debugging #named #problem #scala
Linter: a tool for finding bugs and potential problems in scala code (MP, UC, BS), pp. 1615–1616.
SAC-2014-DeanM #aspect-oriented
An aspect pointcut for parallelizable loops (JSD, FJM), pp. 1619–1624.
SAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming #using
Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SAC-2014-BackesGLL
X-pire 2.0: a user-controlled expiration date and copy protection mechanism (MB, SG, SL, SL), pp. 1633–1640.
SAC-2014-EmuraKOT #communication #formal method #implementation #prototype
Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SAC-2014-ZandVYK #detection
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
SAC-2014-HedinBBS #api #data flow #javascript #named
JSFlow: tracking information flow in JavaScript and its APIs (DH, AB, LB, AS), pp. 1663–1671.
SAC-2014-OliveiraNWB #approach #kernel #named
Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
SAC-2014-MengWK #adaptation #authentication #design #mobile
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones (YM, DSW, LfK), pp. 1680–1687.
SAC-2014-WenD #performance #protocol
Efficient protocols for private record linkage (ZW, CD), pp. 1688–1694.
SAC-2014-Cooper #android #detection #research #student
Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
SAC-2014-SypeS #case study #online #requirements #social #using
Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SAC-2014-BasuCKMVG0M #feedback #privacy #social
Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
SAC-2014-PetrlicLS #privacy
Privacy-preserving reputation management (RP, SL, CS), pp. 1712–1718.
SAC-2014-MoraCGZJEBAH #named
MUSES: a corporate user-centric system which applies computational intelligence methods (AMM, PdlC, JJMG, SZ, MJ, AIEA, MB, HA, ZH), pp. 1719–1723.
SAC-2014-DhanjalC #learning #network
Learning reputation in an authorship network (CD, SC), pp. 1724–1726.
SAC-2014-ParkY #multi #network #simulation #smarttech
Encountering smartphones in network simulation: a preliminary result on multi-radio multicast (YP, WY), pp. 1727–1728.
SAC-2014-ChoiKK #modelling #ontology #using
Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SAC-2014-KangI #dynamic analysis
Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
SAC-2014-MoonKSP #image #novel #scalability
A novel double linear-cubic convolution interpolation for digital image scaling (HMM, KRK, JS, SBP), pp. 1733–1734.
SAC-2014-TinK #clustering #distributed #performance
Method for fast clustering of data distributed on a sphere surface (TT, SRK), pp. 1735–1736.
SAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
SAC-2014-ParkH #analysis #network #performance
Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
SAC-2014-ChoiSP #2d #classification #correlation #distance #image #matrix
Matrix correlation distance for 2D image classification (HC, JS, HP), pp. 1741–1742.
SAC-2014-ChoiKKLK #network
A new device discovery scheme in lighting control networks (SIC, SJK, IK, SKL, TGK), pp. 1743–1744.
SAC-2014-TangKK #resource management #user satisfaction
An optimal device selection for user satisfaction of content sharing (JT, PK, SK), pp. 1745–1746.
SAC-2014-KwonB #implementation #library #prototype
A CUDA-based implementation of OpenGL-compatible rasterization library prototype (YCK, NB), pp. 1747–1748.
SAC-2014-ShinJLY #automaton #design
Design of a cellular automata cell with rule 30 on quantum-dot cellular automata (SHS, JCJ, GJL, KYY), pp. 1749–1750.
SAC-2014-WijenayakeP #estimation #using #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SAC-2014-KimL
The effect of IMPORT change in software change history (JK, EL), pp. 1753–1754.
SAC-2014-JangJL #component #embedded #generative #prototype #simulation
Virtual prototype generation by shockwave flash for simulating HW components of embedded system (SYJ, AKJ, WJL), pp. 1755–1756.
SAC-2014-JangKCH #replication
Impacts of delayed replication on the key-value store (MJ, WK, YC, JH), pp. 1757–1758.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.