Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo
Proceedings of the 22nd Symposium on Applied Computing
SAC, 2007.
@proceedings{SAC-2007, address = "Seoul, Korea", editor = "Yookun Cho and Roger L. Wainwright and Hisham Haddad and Sung Y. Shin and Yong Wan Koo", isbn = "1-59593-480-4", publisher = "{ACM}", title = "{Proceedings of the 22nd Symposium on Applied Computing}", year = 2007, }
Contents (319 items)
- SAC-2007-AnderssonGLW
- Reporting leadership patterns among trajectories (MA, JG, PL, TW), pp. 3–7.
- SAC-2007-KolesnikovA
- Distortion-constrained compression of vector maps (AK, AA), pp. 8–12.
- SAC-2007-WanZM
- An OLAP system for network-constrained moving objects (TW, KZ, XM), pp. 13–18.
- SAC-2007-DUliziaFFGR #query #similarity
- Structural similarity in geographical queries to improve query answering (AD, FF, AF, PG, MR), pp. 19–23.
- SAC-2007-LeeLSG #integration #named
- HIS-KCWater: context-aware geospatial data and service integration (JL, YL, SS, JG), pp. 24–29.
- SAC-2007-NunesVN #animation #flexibility #representation
- A flexible representation of controllers for physically-based animation of virtual humans (RFN, CAV, JBCN), pp. 30–36.
- SAC-2007-NunesFA #case study #component #framework #multi
- Applying a component-based framework to develop multi-agent environments: case study (CN, MF, HOdA), pp. 37–41.
- SAC-2007-FattaF #data mining #distributed #mining #multi
- A customizable multi-agent system for distributed data mining (GDF, GF), pp. 42–47.
- SAC-2007-NoordendeBT #mobile #security #using
- Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
- SAC-2007-FurtadoMCM #modelling #network #simulation #social
- A crime simulation model based on social networks and swarm intelligence (VF, AM, ALVC, RM), pp. 56–57.
- SAC-2007-DjelloulDF #constraints #finite #first-order #infinity #prolog #theorem proving #towards #unification #using
- Toward a first-order extension of Prolog’s unification using CHR: a CHR first-order constraint solver over finite or infinite trees (KD, TBHD, TWF), pp. 58–64.
- SAC-2007-CaropreseTZ #evaluation #framework #reasoning
- A framework for prioritized reasoning based on the choice evaluation (LC, IT, EZ), pp. 65–70.
- SAC-2007-SarfrazR #algorithm #image #polynomial #random #using
- A randomized knot insertion algorithm for outline capture of planar images using cubic spline (MS, AR), pp. 71–75.
- SAC-2007-ZhangMC #fuzzy #image #retrieval #set
- Directed filter for dominant direction fuzzy set in content-based image retrieval (GZ, ZMM, ZC), pp. 76–77.
- SAC-2007-LiuT #game studies #random
- Eigen-distribution on assignments for game trees with random properties (CL, KT), pp. 78–79.
- SAC-2007-SongJMJXH #detection #programming
- Mass edge detection in mammography based on plane fitting and dynamic programming (ES, LJ, BM, RJ, XX, CCH), pp. 80–81.
- SAC-2007-BaoYS #monitoring
- Projection function for driver fatigue monitoring with monocular camera (DB, ZY, YS), pp. 82–83.
- SAC-2007-ArnautovicKFPS #communication #specification #towards
- Gradual transition towards autonomic software systems based on high-level communication specification (EA, HK, JF, RP, AS), pp. 84–89.
- SAC-2007-HincheyDRTM #self
- Bionic autonomic nervous system and self-healing for NASA ANTS-like missions (MGH, YSD, JLR, WT, MM), pp. 90–96.
- SAC-2007-ZhouPMLTL #architecture #ontology #self
- Applying ontology in architecture-based self-management applications (YZ, JP, XM, BL, XT, JL), pp. 97–103.
- SAC-2007-ZhangMMB #locality #network #performance #problem #self #using
- Performance problem localization in self-healing, service-oriented systems using Bayesian networks (RZ, SM, SM, AB), pp. 104–109.
- SAC-2007-AhmedASH #pervasive #self
- Self-healing for autonomic pervasive computing (SA, SIA, MS, MMH), pp. 110–111.
- SAC-2007-JinC #graph
- Hierarchical alignment graph for gene teams finding on whole genomes (HJJ, HGC), pp. 113–117.
- SAC-2007-NaiduPH #biology #database #integration #modelling #on the fly
- On-the-fly data integration models for biological databases (PGN, MJP, SH), pp. 118–122.
- SAC-2007-LinK #array #integration
- Exploiting inter-gene information for microarray data integration (KML, JK), pp. 123–127.
- SAC-2007-ZhangXLY #clustering #modelling
- Improved structural modeling based on conserved domain clusters and structure-anchored alignments (FZ, LX, ZL, BY), pp. 128–132.
- SAC-2007-FangWLYD #assessment #detection #multi #sequence #using
- The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
- SAC-2007-HuangJL
- Finding putative core promoter elements with position-dependent consensuses (YFH, YCJ, SWL), pp. 138–139.
- SAC-2007-MengC #adaptation #configuration management #database #platform #sequence
- An adaptive data prefetching scheme for biosequence database search on reconfigurable platforms (XM, VC), pp. 140–141.
- SAC-2007-Al-MubaidN #concept #distance #framework #semantics
- Semantic distance of concepts within a unified framework in the biomedical domain (HAM, HAN), pp. 142–143.
- SAC-2007-YangHK #framework #on the #parallel #platform
- On construction of a BioGrid platform for parallel bioinformatics applications (CTY, TFH, HCK), pp. 144–145.
- SAC-2007-YapaK #algorithm #component #image
- A connected component labeling algorithm for grayscale images and application of the algorithm on mammograms (RDY, HK), pp. 146–152.
- SAC-2007-LopezLC #modelling
- Modeling miRNA data (SL, GL, ZC), pp. 158–162.
- SAC-2007-SaCA #personalisation
- Defining personalized therapies for handheld devices (MdS, LC, PA), pp. 163–164.
- SAC-2007-Al-Fedaghi #how #question
- How sensitive is your personal information? (SSAF), pp. 165–169.
- SAC-2007-DjemaielB
- A global marking scheme for tracing cyber attacks (YD, NB), pp. 170–174.
- SAC-2007-IeongL #forensics
- Deriving cse-specific live forensics investigation procedures from FORZA (RSCI, HCL), pp. 175–180.
- SAC-2007-SavoldiG #forensics #perspective
- SIM and USIM filesystem: a forensics perspective (AS, PG), pp. 181–187.
- SAC-2007-MeddebDB #detection
- Global intrusion detection and tolerance in networked systems (AM, YD, NB), pp. 188–189.
- SAC-2007-LiebrockMBPCSU #analysis #design #forensics #set
- A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
- SAC-2007-WuHH #framework #internet #scalability
- A scalable overlay framework for internet anycasting service (CJW, RHH, JMH), pp. 193–197.
- SAC-2007-JinM #network #scheduling
- An analytical model for generalized processor sharing scheduling with heterogeneous network traffic (XJ, GM), pp. 198–202.
- SAC-2007-SausenSLP #bound #multi #network
- Bounded-distance multi-coverage backbones in wireless sensor networks (PSS, MAS, AMNdL, AP), pp. 203–208.
- SAC-2007-BatistaFM #grid #network #set
- A set of schedulers for grid networks (DMB, NLSdF, FKM), pp. 209–213.
- SAC-2007-KimVH #coordination #network #scalability
- Scalable coordination for sensor networks in challenging environments (SK, VV, KH), pp. 214–221.
- SAC-2007-CheliusFF #development #framework #named #network #performance
- Worldsens: a fast and accurate development framework for sensor network applications (GC, AF, EF), pp. 222–226.
- SAC-2007-LimaSC #estimation #metric #multi #network
- Enhancing QoS metrics estimation in multiclass networks (SRL, PNMdS, PC), pp. 227–231.
- SAC-2007-LiYAZ #metric #network
- Finding hierarchical heavy hitters in network measurement system (YL, JY, CA, HZ), pp. 232–236.
- SAC-2007-LinC #named
- VA-TCP: a vertical handoff-aware TCP (YCL, HPC), pp. 237–238.
- SAC-2007-OrlovskyR #distributed #policy #security
- Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
- SAC-2007-MuSZ
- Compact sequential aggregate signatures (YM, WS, HZ), pp. 249–253.
- SAC-2007-ZhouHP #database #image #using
- An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
- SAC-2007-SoleimaniADDBA #detection #named #reliability
- RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
- SAC-2007-YiKOJKD #detection #hardware #performance
- Memory-efficient content filtering hardware for high-speed intrusion detection systems (SY, BKK, JO, JJ, GK, CRD), pp. 264–269.
- SAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-NguyenT #detection #kernel #towards
- Towards a tamper-resistant kernel rootkit detector (AQN, YT), pp. 276–283.
- SAC-2007-JohnsB #approximate #automation #injection #named #web
- SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
- SAC-2007-TopkaraAT #multi #word
- Passwords decay, words endure: secure and re-usable multiple password mnemonics (UT, MJA, MT), pp. 292–299.
- SAC-2007-BistarelliFP #using
- Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
- SAC-2007-FeydyS #equation #integer #linear
- Propagating dense systems of integer linear equations (TF, PJS), pp. 306–310.
- SAC-2007-PetterssonSK #approach #network
- A CP-LP approach to network management in OSPF routing (MPP, RS, KK), pp. 311–315.
- SAC-2007-BordeauxS #constraints #framework #on the #probability
- On the stochastic constraint satisfaction framework (LB, HS), pp. 316–320.
- SAC-2007-BordeauxZ #constraints #linear #quantifier
- A solver for quantified Boolean and linear constraints (LB, LZ), pp. 321–325.
- SAC-2007-LebbahMR #constraints #implementation #performance #reduction #using
- Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
- SAC-2007-Holland #injection #scheduling
- Injection/withdrawal scheduling for natural gas storage facilities (AH), pp. 332–333.
- SAC-2007-FrancisS #constraints #graph
- Constraint propagation for loose constraint graphs (KF, PJS), pp. 334–335.
- SAC-2007-MouhoubS #constraints #problem
- Solving conditional and composite constraint satisfaction problems (MM, AS), pp. 336–337.
- SAC-2007-YingboJJ #approach #machine learning #workflow
- A machine learning approach to semi-automating workflow staff assignment (YL, JW, JS), pp. 340–345.
- SAC-2007-MengA #automaton #constraints #distributed #web #web service
- Web services choreography and orchestration in Reo and constraint automata (SM, FA), pp. 346–353.
- SAC-2007-ViroliCG #distributed #problem #self #tuple
- A self-organising solution to the collective sort problem in distributed tuple spaces (MV, MC, LG), pp. 354–359.
- SAC-2007-NixonAT #semantics #towards #tuple #web
- Towards Semantic tuplespace computing: the Semantic web spaces system (LJBN, OA, RT), pp. 360–365.
- SAC-2007-MarthR #coordination #generative
- Extending the ARC model with generative coordination (KM, SR), pp. 366–367.
- SAC-2007-SchumacherPCSF #semantics #web #web service
- Federated directories of Semantic web services (MS, TVP, IC, AdOeS, BF), pp. 368–369.
- SAC-2007-LoukidesS #privacy
- Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
- SAC-2007-LinL #mining #privacy #transaction
- Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
- SAC-2007-TrutaC #incremental #maintenance #optimisation
- K-anonymization incremental maintenance and optimization techniques (TMT, AC), pp. 380–387.
- SAC-2007-LianCY #database #maintenance #scalability
- Maintenance of maximal frequent itemsets in large databases (WL, DWC, SMY), pp. 388–392.
- SAC-2007-Al-NaymatCG #query #reduction
- Dimensionality reduction for long duration and complex spatio-temporal queries (GAN, SC, JG), pp. 393–397.
- SAC-2007-TanC #classification #using
- Using hypothesis margin to boost centroid text classifier (ST, XC), pp. 398–403.
- SAC-2007-CaldersGM #mining
- Mining itemsets in the presence of missing values (TC, BG, MM), pp. 404–408.
- SAC-2007-RulloCP #categorisation #learning
- Learning rules with negation for text categorization (PR, CC, VLP), pp. 409–416.
- SAC-2007-Knijf #mining #named
- FAT-miner: mining frequent attribute trees (JDK), pp. 417–422.
- SAC-2007-SonJF
- Exploiting types for improved schema mapping (YS, HMJ, FF), pp. 423–429.
- SAC-2007-QiT #array #feature model #ontology
- Integrating gene ontology into discriminative powers of genes for feature selection in microarray data (JQ, JT), pp. 430–434.
- SAC-2007-XiongCL #classification #database #mining #multi #using
- Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
- SAC-2007-HwangY #mining #ranking
- Mining and processing category ranking (SwH, HY), pp. 441–442.
- SAC-2007-HebertBC #anti #constraints #optimisation
- Optimizing hypergraph transversal computation with an anti-monotone constraint (CH, AB, BC), pp. 443–444.
- SAC-2007-AppelPSTT #clustering
- Biased box sampling — a density-biased sampling for clustering (APA, AAP, EPMdS, AJMT, CTJ), pp. 445–446.
- SAC-2007-SpinosaCG #approach #clustering #concept #data type #detection #named
- OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streams (EJS, ACPdLFdC, JG), pp. 448–452.
- SAC-2007-ZhangZZMY #algorithm #random #streaming
- A priority random sampling algorithm for time-based sliding windows over weighted streaming data (LZ, ZL, YQZ, YM, ZY), pp. 453–456.
- SAC-2007-Masciari #data transformation #effectiveness
- RFID data management for effective objects tracking (EM), pp. 457–461.
- SAC-2007-AlbertiniM #detection #network #self
- A self-organizing neural network for detecting novelties (MKA, RFdM), pp. 462–466.
- SAC-2007-PintoG #concept #incremental
- Incremental discretization, application to data with concept drift (CP, JG), pp. 467–468.
- SAC-2007-YangWK #analysis #modelling #partial order
- General dominant relationship analysis based on partial order models (ZY, BW, MK), pp. 470–474.
- SAC-2007-YuY #continuation #distributed #workflow
- Continuation-passing enactment of distributed recoverable workflows (WY, JY), pp. 475–481.
- SAC-2007-Suzuki #approach #problem
- An edit operation-based approach to the inclusion problem for DTDs (NS), pp. 482–488.
- SAC-2007-LuHC #data flow #query #relational #xml
- Querying and browsing XML and relational data sources (JJL, CHH, TRC), pp. 489–493.
- SAC-2007-CiferriCFTS #performance #query
- Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries (CDdAC, RRC, DTF, AJMT, FdFdS), pp. 494–499.
- SAC-2007-Tosun
- Equivalent disk allocations (AST), pp. 500–505.
- SAC-2007-YouH #approach #personalisation #ranking
- Personalized ranking: a contextual ranking approach (GwY, SwH), pp. 506–510.
- SAC-2007-QiaoZWL #database #realtime
- Developing event-condition-action rules in real-time active database (YQ, KZ, HW, XL), pp. 511–516.
- SAC-2007-NangP #feedback #multi #performance #retrieval
- An efficient indexing structure for content based multimedia retrieval with relevance feedback (JN, JP), pp. 517–524.
- SAC-2007-XingXE #approximate #automation #documentation #using #xml
- Building automatic mapping between XML documents using approximate tree matching (GX, ZX, AE), pp. 525–526.
- SAC-2007-BaiocoTT #cost analysis #effectiveness #metric #query #similarity
- An effective cost model for similarity queries in metric spaces (GBB, AJMT, CTJ), pp. 527–528.
- SAC-2007-MichalariasB #ad hoc #multi #network #query
- Multidimensional querying in wireless ad hoc networks (IM, CB), pp. 529–530.
- SAC-2007-WuIOKM #adaptation #peer-to-peer #protocol #random
- An adaptive randomized search protocol in peer-to-peer systems (YW, TI, FO, HK, TM), pp. 533–537.
- SAC-2007-MaHA #detection #evaluation
- Evaluation of the QoS of crash-recovery failure detection (TM, JH, SA), pp. 538–542.
- SAC-2007-JaegerPMH #self
- Self-organizing broker topologies for publish/subscribe systems (MAJ, HP, GM, KH), pp. 543–550.
- SAC-2007-SatzgerPTU #adaptation #detection #distributed
- A new adaptive accrual failure detector for dependable distributed systems (BS, AP, WT, TU), pp. 551–555.
- SAC-2007-Armendariz-InigoJMDM #bound #database #flexibility #protocol #replication
- k-bound GSI: a flexible database replication protocol (JEAI, JRJR, JRGdM, HD, FDME), pp. 556–560.
- SAC-2007-AloisioCFMV #towards
- GReIC data gather service: a step towards P2P production grids (GA, MC, SF, MM, SV), pp. 561–565.
- SAC-2007-SerugendoFRG #architecture
- A metadata-based architectural model for dynamically resilient systems (GDMS, JSF, AR, NG), pp. 566–572.
- SAC-2007-GramoliAV #configuration management #memory management #named #scalability
- SQUARE: scalable quorum-based atomic memory with local reconfiguration (VG, EA, AV), pp. 574–579.
- SAC-2007-AyedB #adaptation #component #corba
- Dynamic adaptation of CORBA component-based applications (DA, YB), pp. 580–585.
- SAC-2007-WaltersHC #algorithm #distributed
- Selecting a distributed agreement algorithm (RJW, PH, SC), pp. 586–587.
- SAC-2007-KarmakarG #adaptation #distributed #protocol
- Adaptive broadcast by distributed protocol switching (SK, AG), pp. 588–589.
- SAC-2007-KarwaczynskiKMN #peer-to-peer #proximity
- Dual proximity neighbour selection method for peer-to-peer-based discovery service (PK, DK, JM, MN), pp. 590–591.
- SAC-2007-VogelerGB #documentation #tool support #xml
- New specialist tools for medieval document XML markup (GV, SG, BB), pp. 594–599.
- SAC-2007-LamprierALS #clustering #named #segmentation
- ClassStruggle: a clustering based text segmentation (SL, TA, BL, FS), pp. 600–604.
- SAC-2007-BoussellaaZA #hybrid #using
- A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
- SAC-2007-LinsS #algorithm #documentation
- A quantitative method for assessing algorithms to remove back-to-front interference in documents (RDL, JMMdS), pp. 610–616.
- SAC-2007-JinLSB #automation #categorisation #naive bayes #web
- Automatic web pages categorization with ReliefF and Hidden Naive Bayes (XJ, RL, XS, RB), pp. 617–621.
- SAC-2007-NevesCFB
- A table-form extraction with artefact removal (LAPN, JMdC, JF, FB), pp. 622–626.
- SAC-2007-BarratT #learning #recognition
- A progressive learning method for symbols recognition (SB, ST), pp. 627–631.
- SAC-2007-FreitasOAB #recognition
- Zoning and metaclasses for character recognition (COdAF, LSO, SBKA, FB), pp. 632–636.
- SAC-2007-SantosBOJ #approach #documentation #forensics #verification
- Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
- SAC-2007-SilvaL #algorithm #documentation #performance
- A fast algorithm to binarize and filter documents with back-to-front interference (JMMdS, RDL), pp. 639–640.
- SAC-2007-CambroneroPDV #modelling #using #web #web service
- Using RT-UML for modelling web services (MEC, JJP, GD, VV), pp. 643–648.
- SAC-2007-PolatD #privacy #using
- Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
- SAC-2007-SilvaNI #automation #case study
- A computation environment for automated negotiation: a case study in electronic tourism (AS, JAN, IIB), pp. 654–658.
- SAC-2007-XianhuaJX #performance #reduction
- Efficient code size reduction without performance loss (LX, ZJ, CX), pp. 666–672.
- SAC-2007-GustafssonTDH #approach #aspect-oriented #behaviour #embedded #evolution #performance
- Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach (TG, AT, YD, JH), pp. 673–679.
- SAC-2007-HungCYCS #algorithm #architecture #design #energy
- An architectural co-synthesis algorithm for energy-aware network-on-chip design (WHH, YJC, CLY, YSC, APS), pp. 680–684.
- SAC-2007-Nguyen #component #design #embedded
- Component-based version management for embedded computing system design (TNN), pp. 685–692.
- SAC-2007-KimKK #energy #mobile
- Energy-efficient disk replacement and file placement techniques for mobile systems with hard disks (YJK, KTK, JK), pp. 693–698.
- SAC-2007-HiserDW #design #embedded #memory management #performance
- Fast, accurate design space exploration of embedded systems memory configurations (JH, JWD, DBW), pp. 699–706.
- SAC-2007-NazKOF #configuration management #embedded #novel
- Reconfigurable split data caches: a novel scheme for embedded systems (AN, KMK, JHO, PF), pp. 707–712.
- SAC-2007-StanchinaM #algorithm #garbage collection #performance #realtime
- Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collection (SS, MM), pp. 713–718.
- SAC-2007-BrunauerLMMP #evolution
- Evolution of iterated prisoner’s dilemma strategies with different history lengths in static and cultural environments (RB, AL, HAM, GM, HP), pp. 720–727.
- SAC-2007-MenezesMVSB
- A model for terrain coverage inspired by ant’s alarm pheromones (RM, FM, FEV, RS, MB), pp. 728–732.
- SAC-2007-Chiong #algorithm #search-based #using
- Applying genetic algorithms to economy market using iterated prisoner’s dilemma (RC), pp. 733–737.
- SAC-2007-LiuMB #approach #clustering
- A clustering entropy-driven approach for exploring and exploiting noisy functions (SHL, MM, BRB), pp. 738–742.
- SAC-2007-Teo #adaptation #algorithm #generative #optimisation
- Investigating adaptive mutation in the generalized generation gap (G3) algorithm for unconstrained global optimization (JT), pp. 743–744.
- SAC-2007-MilsztajnG #3d #algorithm #markov #random #search-based #segmentation #using
- Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms (FM, KdG), pp. 745–746.
- SAC-2007-FernandesRR #optimisation
- Stigmergic optimization in dynamic binary landscapes (CMF, VR, ACR), pp. 747–748.
- SAC-2007-Dufourd #framework #proving #theorem
- A hypermap framework for computer-aided proofs in surface subdivisions: genus theorem and Euler’s formula (JFD), pp. 757–761.
- SAC-2007-ZengS #combinator #geometry #optimisation #problem
- Semi-mechanization method for a unsolved optimization problem in combinatorial geometry (ZZ, MS), pp. 762–766.
- SAC-2007-GhourabiITMK #algebra #axiom #logic
- Logical and algebraic view of Huzita’s origami axioms with applications to computational origami (FG, TI, HT, MM, AK), pp. 767–772.
- SAC-2007-ThierryMS #constraints #geometry #towards
- Towards an homogeneous handling of under-constrained and well-constrained systems of geometric constraints (SEBT, PM, PS), pp. 773–777.
- SAC-2007-KunXY #algorithm #constraints #geometry #parallel #theorem proving
- Parallel algorithms on geometric constraint solving (KJ, YG, XL, YZ), pp. 778–779.
- SAC-2007-AhamedHSK #pervasive #using
- Wellness assistant: a virtual wellness assistant using pervasive computing (SIA, MMH, KS, AJK), pp. 782–787.
- SAC-2007-LiuD #performance #web #web service
- An efficient dual caching strategy for web service-enabled PDAs (XL, RD), pp. 788–794.
- SAC-2007-MinCN #energy #interactive #mobile
- Energy management for interactive applications in mobile handheld systems (JHM, HC, JN), pp. 795–799.
- SAC-2007-ShriramS #adaptation #architecture #information management #middleware #mobile
- Adaptive middleware architecture for information sharing on mobile phones (RS, VS), pp. 800–804.
- SAC-2007-JinS #graph #information management #representation
- Graph-based text representation and knowledge discovery (WJ, RKS), pp. 807–811.
- SAC-2007-SchusterS #documentation #estimation #natural language #query #random #web
- NL sampler: random sampling of web documents based on natural language with query hit estimation (DS, AS), pp. 812–818.
- SAC-2007-LuXG #ambiguity
- Translation disambiguation in web-based translation extraction for English-Chinese CLIR (CL, YX, SG), pp. 819–823.
- SAC-2007-LauwLP
- TUBE (Text-cUBE) for discovering documentary evidence of associations among entities (HWL, EPL, HP), pp. 824–828.
- SAC-2007-DingZ #web
- Log-based indexing to improve web site search (C(D, JZ), pp. 829–833.
- SAC-2007-ZengWN #analysis #classification
- Text classification based on partial least square analysis (XQZ, MWW, JYN), pp. 834–838.
- SAC-2007-VuMTA #knowledge base #using #web
- Using a knowledge base to disambiguate personal name in web search results (QMV, TM, AT, JA), pp. 839–843.
- SAC-2007-Cardoso-CachopoO #categorisation #classification #using
- Semi-supervised single-label text categorization using centroid-based classifiers (ACC, ALO), pp. 844–851.
- SAC-2007-KassabL #analysis #effectiveness #personalisation #towards
- Towards a synthetic analysis of user’s information need for more effective personalized filtering services (RK, JCL), pp. 852–859.
- SAC-2007-JeudyLJ
- A model for managing collections of patterns (BJ, CL, FJ), pp. 860–865.
- SAC-2007-VanderleiDMGAM #classification #component #retrieval
- A cooperative classification mechanism for search and retrieval software components (TAV, FAD, ACM, VCG, ESdA, SRdLM), pp. 866–871.
- SAC-2007-Savoy #topic #why
- Why do successful search systems fail for some topics (JS), pp. 872–877.
- SAC-2007-OHareGJLOS #using
- Using text search for personal photo collections with the MediAssist system (NO, CG, GJFJ, HL, NEO, AFS), pp. 880–881.
- SAC-2007-WangZD #distributed #optimisation #query #web
- Query optimizing on a decentralized web search engine (DW, YZ, JD), pp. 880–881.
- SAC-2007-PlattGM #detection #on the #query #sequence #topic #using
- On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
- SAC-2007-TreeprapinKHN #mobile #network
- A mobile sensor control method for sparse sensor networks (KT, AK, TH, SN), pp. 886–890.
- SAC-2007-KanzakiHN #ad hoc #mobile #network #performance #protocol
- An efficient TDMA slot assignment protocol in mobile ad hoc networks (AK, TH, SN), pp. 891–895.
- SAC-2007-TetsuyaAHN #ad hoc #generative #network #using
- Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
- SAC-2007-AcharyaKY #mobile
- DAYS mobile: a location based data broadcast service for mobile users (DA, VK, GCY), pp. 901–905.
- SAC-2007-JunJ #ad hoc #automation #mobile #network #protocol
- Automated routing protocol selection in mobile ad hoc networks (TJ, CJ), pp. 906–913.
- SAC-2007-MonteiroBL #consistency #mobile
- A mechanism for replicated data consistency in mobile computing environments (JMM, AB, SL), pp. 914–919.
- SAC-2007-KumarMS #mobile #policy
- A weighted cache replacement policy for location dependent data in mobile environments (AK, MM, AKS), pp. 920–924.
- SAC-2007-FuL #effectiveness #protocol
- An effective kNN search protocol in wireless broadcast environments (SYF, CML), pp. 925–929.
- SAC-2007-LimaC #ad hoc #corba #framework #network
- A framework for CORBA interoperability in ad hoc networks (LAPLJ, AC), pp. 930–934.
- SAC-2007-BraynerM #energy #memory management
- Balancing energy consumption and memory usage in sensor data processing (AB, RM), pp. 935–939.
- SAC-2007-ClaycombS #collaboration #pervasive #resource management #towards
- Towards secure resource sharing for impromptu collaboration in pervasive computing (WC, DS), pp. 940–946.
- SAC-2007-FariasLCPF #development #metamodelling #mobile
- A MOF metamodel for the development of context-aware mobile applications (CRGdF, MML, CZC, RMP, JGPF), pp. 947–952.
- SAC-2007-YanWZ #ad hoc #mobile #network #protocol
- Dual agreement virtual subnet protocol for mobile ad-hoc networks (KQY, SCW, GYZ), pp. 953–954.
- SAC-2007-SawaiSKHN #ad hoc #consistency #network
- Quorum-based consistency management among replicas in ad hoc networks with data update (YS, MS, AK, TH, SN), pp. 955–956.
- SAC-2007-TengC #community #mining #mobile
- Mining communities of acquainted mobile users on call detail records (WGT, MCC), pp. 957–958.
- SAC-2007-WahL #named #semantics
- IS_SDM: an in-network semantic sensor data model (CKW, QL), pp. 959–960.
- SAC-2007-FabroV #automation #integration #modelling #using #weaving
- Semi-automatic model integration using matching transformations and weaving models (MDDF, PV), pp. 963–970.
- SAC-2007-LawleyR #declarative #implementation #model transformation
- Implementing a practical declarative logic-based model transformation engine (ML, KR), pp. 971–977.
- SAC-2007-VarroB #automation #induction #logic programming #model transformation #using
- Automating model transformation by example using inductive logic programming (DV, ZB), pp. 978–984.
- SAC-2007-CleenewerckK #domain-specific language #semantics
- Separation of concerns in translational semantics for DSLs in model engineering (TC, IK), pp. 985–992.
- SAC-2007-VignagaB #design #diagrams #interactive
- Transforming system operations’ interactions into a design class diagram (AV, MCB), pp. 993–997.
- SAC-2007-Lamari #automation #generative #model transformation #testing #towards #verification
- Towards an automated test generation for the verification of model transformations (ML), pp. 998–1005.
- SAC-2007-Avila-GarciaER #modelling #product line #using
- Using software product lines to manage model families in model-driven engineering (OAG, AE, EVSR), pp. 1006–1011.
- SAC-2007-VaraVCM #database #development #model transformation
- Model transformation for object-relational database development (JMV, BV, JMC, EM), pp. 1012–1019.
- SAC-2007-CuadradoM #model transformation #transformation language
- A phasing mechanism for model transformation languages (JSC, JGM), pp. 1020–1024.
- SAC-2007-CicchettiRS #development #modelling #web
- Software customization in model driven development of web applications (AC, DDR, ADS), pp. 1025–1030.
- SAC-2007-RaedtsPSWSB #automation #framework #verification
- A software framework for automated verification (IR, MP, AS, JMEMvdW, LJS, MB), pp. 1031–1032.
- SAC-2007-ClementeHS #approach #aspect-oriented #component
- An MDA approach to develop systems based on components and aspects (PJC, JH, FS), pp. 1033–1034.
- SAC-2007-CicchettiR #detection #modelling #specification #weaving
- Weaving models in conflict detection specifications (AC, AR), pp. 1035–1036.
- SAC-2007-ErcheWH #modelling #qvt #visual notation
- Mapping visual notations to MOF compliant models with QVT relations (ME, MW, CH), pp. 1037–1038.
- SAC-2007-LeeOSYT #automation #classification
- Automatic classification of digestive organs in wireless capsule endoscopy videos (JL, JHO, SKS, XY, SJT), pp. 1041–1045.
- SAC-2007-ChenL #hardware #using
- Use of hardware Z-buffered rasterization to accelerate ray tracing (CCC, DSML), pp. 1046–1050.
- SAC-2007-YavuzT #ambiguity #image
- Improved SVD-DWT based digital image watermarking against watermark ambiguity (EY, ZT), pp. 1051–1055.
- SAC-2007-TsengSWL #image #visual notation #web
- Web image annotation by fusing visual features and textual information (VST, JHS, BWW, YML), pp. 1056–1060.
- SAC-2007-LobatoBPT #architecture #communication #internet #named
- MOJOHON: a channel-driven communication architecture for applications deployed on the internet (DCL, MQB, MdGCP, CACT), pp. 1061–1066.
- SAC-2007-MansmannS #visualisation
- Exploring OLAP aggregates with hierarchical visualization techniques (SM, MHS), pp. 1067–1073.
- SAC-2007-RegoBSSF #library #named #video
- VideoLib: a video digital library with support to spatial and temporal dimensions (ASdCR, CdSB, ERdS, US, HFdF), pp. 1074–1078.
- SAC-2007-AdjerohKZMBB #performance
- BWT-based efficient shape matching (DAA, UK, NZ, AM, MTB, TB), pp. 1079–1085.
- SAC-2007-LuoFSR #database #retrieval #scalability #video #visualisation
- Large scale news video database browsing and retrieval via information visualization (HL, JF, SS, WR), pp. 1086–1087.
- SAC-2007-PigeauNG #approximate #image #performance
- Fast tracking of hierarchical partitions with approximate kl-divergence for geo-temporal organization of personal images (AP, AN, MG), pp. 1088–1089.
- SAC-2007-PereraGB #low level #using #visualisation
- Preattentive processing: using low-level vision psychology to encode information in visualisations (NP, AG, KB), pp. 1090–1091.
- SAC-2007-BettiniCG #java
- Featherweight wrap Java (LB, SC, EG), pp. 1094–1100.
- SAC-2007-GregorJ #c++
- Variadic templates for C++ (DG, JJ), pp. 1101–1108.
- SAC-2007-SasitornC #component
- Deriving components from genericity (JS, RC), pp. 1109–1116.
- SAC-2007-AllenHLRS #composition #inheritance #multi
- Modular multiple dispatch with multiple inheritance (EEA, JJH, VL, SR, GLSJ), pp. 1117–1121.
- SAC-2007-Oriol #component #evolution
- Primitives for the dynamic evolution of component-based applications (MO), pp. 1122–1123.
- SAC-2007-Chang #on the #performance #scalability
- On efficient wear leveling for large-scale flash-memory storage systems (LPC), pp. 1126–1130.
- SAC-2007-LeeKS #network #scheduling
- A fair scheduling scheme for a time-sensitive traffic over the dual-channel wireless network (JL, MK, AS), pp. 1131–1135.
- SAC-2007-ChiangH #adaptation #file system #performance
- Improving the performance of log-structured file systems with adaptive block rearrangement (MLC, JSH), pp. 1136–1140.
- SAC-2007-KimmSS #algorithm #evaluation #linux #mobile #scalability
- Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system (HK, SYS, COS), pp. 1141–1145.
- SAC-2007-LeeSKKP #community #named #ubiquitous
- CriStore: dynamic storage system for heterogeneous devices in off-site ubiquitous communities (HL, YS, KK, DK, DP), pp. 1146–1150.
- SAC-2007-HuangHYCK #named #network #operating system
- LA-TinyOS: a locality-aware operating system for wireless sensor networks (TYH, KYH, HYY, ETHC, CTK), pp. 1151–1158.
- SAC-2007-MinYCH #memory management #operating system #performance
- An efficient dynamic memory allocator for sensor operating systems (HM, SY, YC, JH), pp. 1159–1164.
- SAC-2007-PreuveneersB #adaptation #mobile #self #towards
- Towards context-aware and resource-driven self-adaptation for mobile handheld applications (DP, YB), pp. 1165–1170.
- SAC-2007-KimHC #implementation #mobile #multi #performance
- An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices (HK, JH, SC), pp. 1171–1175.
- SAC-2007-ChenTL
- A priority assignment strategy of processing elements over an on-chip bus (YSC, SJT, SWL), pp. 1176–1180.
- SAC-2007-GuKHC #thread
- Shared-stack cooperative threads (BG, YK, JH, YC), pp. 1181–1186.
- SAC-2007-LeeHPLJK #performance #regular expression #using
- A high performance NIDS using FPGA-based regular expression matching (JL, SHH, NP, SWL, SJ, YSK), pp. 1187–1191.
- SAC-2007-KimCLNM #embedded #framework #reliability #testing
- Virtual framework for testing the reliability of system software on embedded systems (SKK, JC, DL, SHN, SLM), pp. 1192–1196.
- SAC-2007-KinebuchiKN #kernel
- Constructing machine emulator on portable microkernel (YK, HK, TN), pp. 1197–1198.
- SAC-2007-SongP #file system
- Providing context-awareness to virtual file system (YS, DP), pp. 1199–1200.
- SAC-2007-YiMLKJ #concurrent #multi #named #operating system #stack #thread
- SESAME: space-efficient stack allocation mechanism for multi-threaded sensor operating systems (SY, HM, SL, YK, IJ), pp. 1201–1202.
- SAC-2007-UppuluriSJ #file system #grid #named
- RemoteFS: accessing remote file systems for desktop grid computing (PU, SS, UJ), pp. 1203–1204.
- SAC-2007-InokiF #approach #evolution #product line
- Software product line evolution method based on kaizen approach (MI, YF), pp. 1207–1214.
- SAC-2007-BraunW #architecture #enterprise #integration
- Integration of IT service management into enterprise architecture (CB, RW), pp. 1215–1219.
- SAC-2007-BabarCBV #evolution #requirements #towards
- Towards evolution of strategic IT requirements (AB, KC, SJB, JMV), pp. 1220–1227.
- SAC-2007-RosenkranzH #concept #modelling
- Combining cybernetics and conceptual modeling: the concept of variety in organizational engineering (CR, RH), pp. 1228–1233.
- SAC-2007-BraghettoFP #control flow #process #specification #using
- Using control-flow patterns for specifying business processes in cooperative environments (KRB, JEF, CP), pp. 1234–1241.
- SAC-2007-MouraoA #effectiveness #exception #workflow
- Supporting effective unexpected exceptions handling in workflow management systems (HM, PA), pp. 1242–1249.
- SAC-2007-NeubauerS #performance #process
- Extending business process management to determine efficient IT investments (TN, CS), pp. 1250–1256.
- SAC-2007-CaetanoPT #representation
- Representing organizational competencies (AC, JP, JMT), pp. 1257–1262.
- SAC-2007-KoschmiderO #detection #how #process #question #semantics
- How to detect semantic business process model variants? (AK, AO), pp. 1263–1264.
- SAC-2007-KorherrL #metric #performance
- Extending the EPC with performance measures (BK, BL), pp. 1265–1266.
- SAC-2007-UbayashiN #feature model #modelling
- Context-aware feature-oriented modeling with an aspect extension of VDM (NU, SN), pp. 1269–1274.
- SAC-2007-CazzolaPGS #co-evolution #design #metadata #modelling
- Co-evolving application code and design models by exploiting meta-data (WC, SP, AG, GS), pp. 1275–1279.
- SAC-2007-CostanzaH
- Reflective layer activation in ContextL (PC, RH), pp. 1280–1285.
- SAC-2007-ChangA #configuration management #web
- Supporting reconfigurable object distribution for customized web applications (PHC, GA), pp. 1286–1292.
- SAC-2007-SoaresB #aspect-oriented #composition #concurrent #reuse #towards
- Towards reusable and modular aspect-oriented concurrency control (SS, PB), pp. 1293–1294.
- SAC-2007-GiuntaPT #approach #grid #integration
- An aspect-generated approach for the integration of applications into grid (RG, GP, ET), pp. 1295–1296.
- SAC-2007-Lu #implementation #type system
- Implementing type-based constructive negation (LL), pp. 1299–1306.
- SAC-2007-BonenfantCHMWW #cost analysis #towards
- Towards resource-certified software: a formal cost model for time and its application to an image-processing example (AB, ZC, KH, GM, AMW, IW), pp. 1307–1314.
- SAC-2007-CimadamoreV #approach #java #using
- Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
- SAC-2007-ShinH #analysis #automation #comparison #difference #process
- Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive (JS, PDH), pp. 1323–1329.
- SAC-2007-PaulK #precise #slicing #using
- Precise dynamic slicing using execution-summary (AP, RK), pp. 1330–1331.
- SAC-2007-HidakaKY #cost analysis #xquery
- A relative cost model for XQuery (SH, HK, MY), pp. 1332–1333.
- SAC-2007-AchananuparpHNJ #modelling #semantics
- Semantically enhanced user modeling (PA, HH, ON, RJ), pp. 1335–1339.
- SAC-2007-KimHK #approach #folksonomy #mining
- FCA-based approach for mining contextualized folksonomy (HLK, ShH, HGK), pp. 1340–1345.
- SAC-2007-ImmaneniT #hybrid #retrieval #web
- Hybrid retrieval from the unified web (TI, KT), pp. 1346–1350.
- SAC-2007-HaaseW #distributed #framework #ontology #query
- A decentralized infrastructure for query answering over distributed ontologies (PH, YW), pp. 1351–1356.
- SAC-2007-DinakarpandianTL #modelling #semantics #web
- Modeling biomedical assertions in the semantic web (DD, TT, YL), pp. 1357–1361.
- SAC-2007-El-BeltagyHR #ontology
- Ontology based annotation of text segments (SREB, MH, AAR), pp. 1362–1367.
- SAC-2007-HallerKVO
- Handling heterogeneity in RosettaNet messages (AH, PK, TV, EO), pp. 1368–1374.
- SAC-2007-BillhardtHOC #trust
- Trust-based service provider selection in open environments (HB, RH, SO, RC), pp. 1375–1380.
- SAC-2007-WuJN #approach
- An approach for indexing, storing and retrieving domain knowledge (HW, HJ, XN), pp. 1381–1382.
- SAC-2007-GooneratneTH #algorithm #graph #traversal #using #verification #web #web service
- Verification of web service descriptions using graph-based traversal algorithms (NG, ZT, JH), pp. 1385–1392.
- SAC-2007-YuSZX #graph #named #semantics #web #web service
- SNet: skip graph based semantic web services discovery (JY, HS, GZ, KX), pp. 1393–1397.
- SAC-2007-FanizzidE #retrieval
- Instance-based retrieval by analogy (NF, Cd, FE), pp. 1398–1402.
- SAC-2007-KimS #approach #consistency #modelling #uml
- An approach to evaluating structural pattern conformance of UML models (DKK, WS), pp. 1404–1408.
- SAC-2007-NetoRP #information management #modelling #requirements #testing
- Requirements for information systems model-based testing (PdAdSN, RFR, CIPdSeP), pp. 1409–1415.
- SAC-2007-MaoLZ #component #design #testing
- Regression testing for component-based software via built-in test design (CM, YL, JZ), pp. 1416–1421.
- SAC-2007-HostL #assessment #concept #risk management
- Different conceptions in software project risk assessment (MH, CL), pp. 1422–1426.
- SAC-2007-OliveiraAS #component #formal method #model checking #modelling #petri net #using #verification
- Formal modelling and verification of a component model using coloured petri nets and model checking (EASO, HOdA, LDdS), pp. 1427–1431.
- SAC-2007-Varma #program analysis #program transformation #recognition
- Generalizing recognition of an individual dialect in program analysis and transformation (PV), pp. 1432–1439.
- SAC-2007-WeynsR #reliability
- Sensitivity of software system reliability to usage profile changes (KW, PR), pp. 1440–1444.
- SAC-2007-LodhiG #design #effectiveness
- Design of a simple and effective object-to-relational mapping technique (FL, MAG), pp. 1445–1449.
- SAC-2007-ForteCSPS #adaptation #component #framework #internet
- A component-based framework for the internet content adaptation domain (MF, RATC, WLdS, AFdP, LHZS), pp. 1450–1455.
- SAC-2007-SantoZ #adaptation #user interface
- Reversing GUIs to XIML descriptions for the adaptation to heterogeneous devices (GDS, EZ), pp. 1456–1460.
- SAC-2007-Saad-KhorchefRC #communication #framework #robust #testing
- A framework and a tool for robustness testing of communicating software (FSK, AR, RC), pp. 1461–1466.
- SAC-2007-KuoCLC #adaptation #random testing #testing
- Enhancing adaptive random testing in high dimensional input domains (FCK, TYC, HL, WKC), pp. 1467–1472.
- SAC-2007-ParkPS #reuse #specification
- Extending reusable asset specification to improve software reuse (SP, SP, VS), pp. 1473–1478.
- SAC-2007-Liebrock #analysis #integration #re-engineering
- Integration of well posedness analysis in software engineering (LML), pp. 1479–1483.
- SAC-2007-ChanW #metric #modelling
- Outlier elimination in construction of software metric models (VKYC, WEW), pp. 1484–1488.
- SAC-2007-WuFY #architecture #composition #re-engineering
- Software reengineering with architecture decomposition (LW, YF, HY), pp. 1489–1493.
- SAC-2007-SchreinerG #component #embedded #modelling #uml
- Modeling component based embedded systems applications with explicit connectors in UML 2.0 (DS, KMG), pp. 1494–1495.
- SAC-2007-NollR #ontology #traceability #using
- Enhancing traceability using ontologies (RPN, MBR), pp. 1496–1497.
- SAC-2007-PloegerS #analysis #automation #documentation #verification
- Analysis and verification of an automatic document feeder (BP, LJS), pp. 1499–1505.
- SAC-2007-MorimotoSGC #security #specification #verification
- Formal verification of security specifications with common criteria (SM, SS, YG, JC), pp. 1506–1512.
- SAC-2007-Kofron #behaviour #component #protocol #using
- Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
- SAC-2007-SpanoudakisKA #monitoring #security #towards
- Towards security monitoring patterns (GS, CK, KA), pp. 1518–1525.
- SAC-2007-Hamid #memory management #runtime
- Integrating a certified memory management runtime with proof-carrying code (NAH), pp. 1526–1533.
- SAC-2007-Li #abstraction #parametricity #protocol #proving #verification
- Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols (YL), pp. 1534–1535.
- SAC-2007-FerreiraLO #approach #java #model checking
- A Java code annotation approach for model checking software systems (GF, EL, EASO), pp. 1536–1537.
- SAC-2007-ChaiZX #java #realtime
- Real-time Java processor optimized for RTSJ (ZC, WZ, WX), pp. 1540–1544.
- SAC-2007-HwangPJ #analysis #implementation #performance
- An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix (SYH, HJP, KSJ), pp. 1545–1551.
- SAC-2007-QuZGC #framework #named #platform
- Unichos: a full system simulator for thin client platform (NQ, YZ, XG, XC), pp. 1552–1556.
- SAC-2007-MoreiraMB #multi #online #resource management
- Online resource management in a multiprocessor with a network-on-chip (OM, JJDM, MB), pp. 1557–1564.
- SAC-2007-KyungPKJKP #design #framework #manycore #monitoring #performance #platform
- Performance monitor unit design for an AXI-based multi-core SoC platform (HmK, GHP, JWK, WJ, TJK, SBP), pp. 1565–1572.
- SAC-2007-RuffoS #peer-to-peer #recommendation
- Evaluating peer-to-peer recommender systems that exploit spontaneous affinities (GR, RS), pp. 1574–1578.
- SAC-2007-LongoG #protocol
- A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
- SAC-2007-CostaSAA #network #peer-to-peer
- Fighting pollution dissemination in peer-to-peer networks (CPC, VS, JMA, VA), pp. 1586–1590.
- SAC-2007-HuXP #approach #modelling #using
- Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
- SAC-2007-Ries #trust
- Certain trust: a trust model for users and agents (SR), pp. 1599–1604.
- SAC-2007-NakamuraM #design #linux #trust
- Designing a trust chain for a thin client on a live Linux cd (MN, SM), pp. 1605–1606.
- SAC-2007-DombroviakR #mobile #pervasive #taxonomy
- A taxonomy of mobile and pervasive applications (KMD, RR), pp. 1609–1615.
- SAC-2007-KimuraTN #artificial reality #mobile
- System support for mobile augmented reality services (HK, ET, TN), pp. 1616–1623.
- SAC-2007-KawsarFN #lightweight #using
- A lightweight indoor location model for sentient artefacts using sentient artefacts (FK, KF, TN), pp. 1624–1631.
- SAC-2007-AitenbichlerLAKM #self #smarttech
- Engineering intuitive and self-explanatory smart products (EA, FL, GA, JK, MM), pp. 1632–1637.
- SAC-2007-YiYC #mobile #multi #using
- Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices (SY, JY, HC), pp. 1638–1639.
- SAC-2007-NarendraO #approach #composition #execution #modelling #web #web service
- Modeling web service composition and execution via a requirements-driven approach (NCN, BO), pp. 1642–1648.
- SAC-2007-ChengLW #automation #web #web service
- Automatic enactment of message exchange pattern for web services (XC, LL, JW), pp. 1649–1653.
- SAC-2007-YaoKBT #delivery #distributed #security #web
- Decentralized authorization and data security in web content delivery (DY, YK, EB, RT), pp. 1654–1661.
- SAC-2007-YildizG #distributed #towards
- Towards decentralized service orchestrations (UY, CG), pp. 1662–1666.
- SAC-2007-AnGWC #automation #data flow #semantics #web
- Semantic deep web: automatic attribute extraction from the deep web data sources (YJA, JG, YTW, SAC), pp. 1667–1672.
- SAC-2007-Palmer #web #web service
- Exploiting bibliographic web services with CiTeX (JDP), pp. 1673–1676.
- SAC-2007-DistanteRC #analysis #framework #modelling #process #web
- Modeling business processes in web applications: an analysis framework (DD, GR, GC), pp. 1677–1682.
- SAC-2007-BirukouBDGKM #approach #development #named #recommendation
- IC-service: a service-oriented approach to the development of recommendation systems (AB, EB, VD, PG, NK, AM), pp. 1683–1688.
- SAC-2007-HuangW #petri net #semantics #web #web service
- A petri net semantics for web service choreography (YH, HW), pp. 1689–1690.
- SAC-2007-YangP #process #towards #user interface
- Towards supporting user interface agility in developing heterogeneous device enabled business processes (YY, LP), pp. 1691–1692.
- SAC-2007-PaliwalAB #distributed #using #verification #web #web service
- Web service orchestration and verification using MSC and CP nets (AVP, NRA, CB), pp. 1693–1694.
- SAC-2007-GilPFM #embedded
- Embedded system for diagnosing dysfunctions in the lower urinary tract (DGM, ASP, DRF, CAM), pp. 1695–1699.
38 ×#using
26 ×#web
24 ×#modelling
24 ×#performance
22 ×#network
20 ×#approach
19 ×#mobile
19 ×#named
17 ×#framework
16 ×#towards
26 ×#web
24 ×#modelling
24 ×#performance
22 ×#network
20 ×#approach
19 ×#mobile
19 ×#named
17 ×#framework
16 ×#towards