Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong
Proceedings of the 29th Symposium on Applied Computing
SAC, 2014.
@proceedings{SAC-2014, acmid = "2554850", address = "Gyeongju, South Korea", editor = "Yookun Cho and Sung Y. Shin and Sang-Wook Kim and Chih-Cheng Hung and Jiman Hong", isbn = "978-1-4503-2469-4", publisher = "{ACM}", title = "{Proceedings of the 29th Symposium on Applied Computing}", year = 2014, }
Contents (317 items)
- SAC-2014-PatanaikZK #estimation #parametricity #simulation
- Parameter estimation and simulation for one-choice Ratcliff diffusion model (AP, VZ, CKK), pp. 3–7.
- SAC-2014-PalVCS #detection #smarttech #using
- Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
- SAC-2014-TupakulaV #monitoring
- Secure monitoring for dementia patients (UKT, VV), pp. 14–19.
- SAC-2014-GraziadioDSSUME #game studies #identification #video
- Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation (SG, RD, KS, KMAS, GU, GM, JAE), pp. 20–24.
- SAC-2014-SilvaPBAP #architecture #cyber-physical #modelling #testing
- A model-based architecture for testing medical cyber-physical systems (LCS, MP, FMB, HOA, AP), pp. 25–30.
- SAC-2014-JungSWCP #difference #retrieval
- Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate (BKJ, SYS, WW, HDC, JKP), pp. 31–32.
- SAC-2014-ChenLFCCK #algorithm #design #detection #effectiveness #health #implementation #monitoring
- Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology (HC, GTL, YCF, BCC, CMC, TCK), pp. 33–35.
- SAC-2014-KlingerLRMLGSFM #low cost
- A low cost digital operating room (AK, GLdL, VR, GM, GL, VG, FSdS, MDF, MBM), pp. 36–37.
- SAC-2014-FerrazPG #feature model #symmetry
- Feature description based on center-symmetric local mapped patterns (CTF, OPJ, AG), pp. 39–44.
- SAC-2014-SilveiraMGCFR #energy #performance
- Faster seam carving with minimum energy windows (CLBS, FdOM, LGJ, CAdC, KF, RdRR), pp. 45–48.
- SAC-2014-CaetanoAGA #recognition #representation #visual notation
- Representing local binary descriptors with BossaNova for visual recognition (CC, SEFdA, SJFG, AdAA), pp. 49–54.
- SAC-2014-Zanchettin #recognition
- Face recognition based on global and local features (CZ), pp. 55–57.
- SAC-2014-SwamyIG #2d #image
- Two level reversible data hiding in 2D images (NRS, SI, PG), pp. 58–59.
- SAC-2014-AnderssonDA #artificial reality #identification #using
- Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
- SAC-2014-LiWL #learning #mobile #online #recognition
- Online learning with mobile sensor data for user recognition (HGL, XW, ZL), pp. 64–70.
- SAC-2014-SpiegelJA #classification #distance #performance
- Fast time series classification under lucky time warping distance (SS, BJJ, SA), pp. 71–78.
- SAC-2014-RossiLR #algorithm #classification #network #using
- A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
- SAC-2014-HuangYKYLYGFQ #analysis #clustering #self
- Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
- SAC-2014-ChenZTWS #modelling #recommendation
- Comparing the staples in latent factor models for recommender systems (CC, LZ, AT, KW, SV), pp. 91–96.
- SAC-2014-LiW #clustering #matrix #multi
- Single multiplicatively updated matrix factorization for co-clustering (ZL, XW), pp. 97–104.
- SAC-2014-HundtSSGD #automation #invariant #named #similarity
- GEM: an elastic and translation-invariant similarity measure with automatic trend adjustment (CH, BS, ES, HG, HVD), pp. 105–112.
- SAC-2014-HajianMPDG
- Fair pattern discovery (SH, AM, DP, JDF, FG), pp. 113–120.
- SAC-2014-SeelandKK #clustering #graph
- Structural clustering of millions of molecular graphs (MS, AK, SK), pp. 121–128.
- SAC-2014-SeelandMKK #classification
- Extracting information from support vector machines for pattern-based classification (MS, AM, AK, SK), pp. 129–136.
- SAC-2014-HuWZ #documentation #internet #topic
- The discovery of user related rare sequential patterns of topics in the internet document stream (ZH, HW, JZ), pp. 137–138.
- SAC-2014-JungKYM #algorithm #search-based
- Investigation of hungarian mating schemes for genetic algorithms (CJ, YHK, YY, BRM), pp. 140–147.
- SAC-2014-SantosSTO #approach #hybrid #navigation
- A hybrid GA-ANN approach for autonomous robots topological navigation (VdCS, DOS, CFMT, FSO), pp. 148–153.
- SAC-2014-WangEB #evolution #orthogonal
- Mirrored orthogonal sampling with pairwise selection in evolution strategies (HW, ME, TB), pp. 154–156.
- SAC-2014-CaniGSST #automation #code generation #integration #towards
- Towards automated malware creation: code generation and code integration (AC, MG, ES, GS, APT), pp. 157–160.
- SAC-2014-KleffmannBHG #automation #interactive #navigation #scalability #sketching #version control
- Automated versioning and temporal navigation for model sketches on large interactive displays (MK, MB, EH, VG), pp. 161–168.
- SAC-2014-GomesACHS #agile #development #framework #game studies #platform #using
- Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
- SAC-2014-KimK #community #detection #mobile #network #social
- A detection of overlapping community in mobile social network (PK, SK), pp. 175–179.
- SAC-2014-ParkPJ #artificial reality #education #online
- QR-code based online robot augmented reality system for education (JPP, MWP, SKJ), pp. 180–185.
- SAC-2014-Alonso-RiosRPKF #case study #smarttech #user interface #user study
- A user study on tailoring GUIs for smartphones (DAR, DR, RP, HK, JF), pp. 186–192.
- SAC-2014-SakamotoKTT #visualisation
- Method for visualizing undone operations based on changes on desktop screen (AS, TK, TT, MT), pp. 193–195.
- SAC-2014-A #authentication #health #mobile #network #privacy #research #student
- Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
- SAC-2014-BillhardtLOBD
- Intelligent event processing for emergency medical assistance (HB, ML, SO, RB, JD), pp. 200–206.
- SAC-2014-CalvoOFR #distributed #multi #parametricity
- Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasks (RC, JdO, MF, RAR), pp. 207–212.
- SAC-2014-OmatuY #classification #smell #using
- Smell classification using weakly responding data (SO, MY), pp. 213–214.
- SAC-2014-BorgesDRI #education #gamification
- A systematic mapping on gamification applied to education (SdSB, VHSD, HMR, SI), pp. 216–222.
- SAC-2014-AnjosTCON #3d #evaluation #interactive #statistics
- Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments (AMdA, RT, AC, SdO, FLSN), pp. 223–228.
- SAC-2014-PaivaBSBS #case study #lessons learnt #online
- Lessons learned from an online open course: a Brazilian case study (ROAP, DB, JS, IIB, APdS), pp. 229–234.
- SAC-2014-SeffrinRJ #algebra #network
- A dynamic bayesian network for inference of learners’ algebraic knowledge (HMS, GLR, PAJ), pp. 235–240.
- SAC-2014-OliveiraNV #framework #towards
- Towards a framework for relevant guidance (EHTO, EHN, RMV), pp. 241–242.
- SAC-2014-ManhaesCZ #architecture #named #predict #using
- WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
- SAC-2014-GuoZTBY #empirical #recommendation #trust
- From ratings to trust: an empirical study of implicit trust in recommender systems (GG, JZ, DT, AB, NYS), pp. 248–253.
- SAC-2014-WangMLG #recommendation #social
- Recommendation based on weighted social trusts and item relationships (DW, JM, TL, LG), pp. 254–259.
- SAC-2014-ChenCWD #recommendation #scalability
- Instant expert hunting: building an answerer recommender system for a large scale Q&A website (TC, JC, HW, YD), pp. 260–265.
- SAC-2014-ShangHHCK #personalisation #recommendation #towards
- Beyond personalization and anonymity: towards a group-based recommender system (SS, YH, PH, PC, SRK), pp. 266–273.
- SAC-2014-ZhengBM #empirical #recommendation
- Splitting approaches for context-aware recommendation: an empirical study (YZ, RDB, BM), pp. 274–279.
- SAC-2014-Moin #approach #collaboration #visualisation
- A unified approach to collaborative data visualization (AM), pp. 280–286.
- SAC-2014-BasuCKVMM #named
- PrefRank: fair aggregation of subjective user preferences (AB, JCC, SK, JV, SM, YM), pp. 287–288.
- SAC-2014-RolimBCCAPM #approach #multimodal #recommendation
- A recommendation approach for digital TV systems based on multimodal features (RR, FB, AC, GC, HOdA, AP, AFM), pp. 289–291.
- SAC-2014-Zheng #matrix #using
- Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
- SAC-2014-RaadE #integration #ontology
- Is ontology alignment like analogy?: knowledge integration with LISA (ER, JE), pp. 294–301.
- SAC-2014-SaSCTMR #graph #named
- LEGi: context-aware lexicon consolidation by graph inspection (GS, TS, RC, FT, FM, LCdR), pp. 302–307.
- SAC-2014-KluschMKS #monitoring #named #semantics
- ICM-Wind: semantics-empowered fluid condition monitoring of wind turbines (MK, APM, PK, AS), pp. 308–315.
- SAC-2014-VidalCNM #approach #automation #generative
- A semi-automatic approach for generating customized R2RML mappings (VMPV, MAC, LETN, JMM), pp. 316–322.
- SAC-2014-FalboRGBA #enterprise #ontology #pattern matching #towards
- Towards an enterprise ontology pattern language (RdAF, FBR, GG, MPB, JPAA), pp. 323–330.
- SAC-2014-BaeLKWP #network #privacy #social
- Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
- SAC-2014-MehdiIHKDS #keyword
- Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
- SAC-2014-BeckersCG #in the cloud #requirements #security
- A catalog of security requirements patterns for the domain of cloud computing systems (KB, IC, LG), pp. 337–342.
- SAC-2014-KatebFNMAT #framework #modelling #multi #optimisation #platform #runtime
- Generic cloud platform multi-objective optimization leveraging models@run.time (DEK, FF, GN, JAM, MA, YLT), pp. 343–350.
- SAC-2014-CruzBZCC #case study #metadata #workflow
- Collecting cloud provenance metadata with Matriohska: a case study with genomic workflows (SMSdC, LMMB, JZ, RMC, MLMC), pp. 351–356.
- SAC-2014-ZhanLS #analysis #in the cloud #mobile
- A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
- SAC-2014-AlabdulhafezE #case study #comparative #in the cloud #virtual machine
- Experimenting on virtual machines co-residency in the cloud: a comparative study of available test beds (AA, PDE), pp. 363–365.
- SAC-2014-XavierOPR #clustering #database #in the cloud #platform #towards
- Towards better manageability of database clusters on cloud computing platforms (MGX, ICDO, RDDP, CAFDR), pp. 366–367.
- SAC-2014-DieguesOPRR #modelling
- Autonomic configuration of HyperDex via analytical modelling (NLD, MO, JP, LETR, PR), pp. 370–375.
- SAC-2014-CamaraLLVV #adaptation #evaluation #framework #robust #self
- Robustness evaluation of the rainbow framework for self-adaptation (JC, RdL, NL, RV, MV), pp. 376–383.
- SAC-2014-MartorellFRV #adaptation #embedded
- Improving adaptiveness of AUTOSAR embedded applications (HM, JCF, MR, RV), pp. 384–390.
- SAC-2014-KrikavaCF #adaptation #architecture #modelling #named #self
- ACTRESS: domain-specific modeling of self-adaptive software architectures (FK, PC, RBF), pp. 391–398.
- SAC-2014-CruzMOV
- Workload-aware table splitting for NoSQL (FC, FM, RO, RV), pp. 399–404.
- SAC-2014-ChakrabortyCKD #adaptation #distributed
- Hierarchical topology adaptation for distributed convergecast applications (SC, SC, SK, HSD), pp. 405–407.
- SAC-2014-WangZC #composition #energy #framework #network
- An energy-aware service composition framework for service-oriented wireless sensor networks (TW, KZ, LC), pp. 408–410.
- SAC-2014-DaDR #middleware #mobile #named
- Kalimucho: middleware for mobile applications (KD, MD, PR), pp. 413–419.
- SAC-2014-GriebeG #approach #automation #mobile #modelling #testing
- A model-based approach to test automation for context-aware mobile applications (TG, VG), pp. 420–427.
- SAC-2014-HosokawaNY #identification #information retrieval
- Location-aware information retrieval for identifying local and distant landmark (YH, YN, TY), pp. 428–435.
- SAC-2014-SehicNVLD #adaptation #development #named #programming
- Entity-adaptation: a programming model for development of context-aware applications (SS, SN, MV, FL, SD), pp. 436–443.
- SAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech #using
- A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
- SAC-2014-Le #android #framework #modelling
- A model driven framework for modeling and composing service based Android applications (CL), pp. 450–457.
- SAC-2014-Fernandez-MarquezSSYDZ #approach #mobile #self
- Self-managing and self-organising mobile computing applications: a separation of concerns approach (JLFM, GDMS, GS, JY, SD, FZ), pp. 458–465.
- SAC-2014-SantosBAP #health #protocol
- Integrating IEEE 11073 and constrained application protocol for personal health devices (DFSS, FB, HOA, AP), pp. 466–467.
- SAC-2014-KawsarAL #detection #multimodal #process #smarttech #using
- Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
- SAC-2014-Majumder #realtime
- A real-time smartphone- and smartshoe-based fall prevention system (AKMJAM), pp. 470–471.
- SAC-2014-MazelFF #comparison #detection #diagrams #network #visual notation
- Visual comparison of network anomaly detectors with chord diagrams (JM, RF, KF), pp. 473–480.
- SAC-2014-ZeilemakerSP #network #scalability
- Large-scale message synchronization in challenged networks (NZ, BS, JAP), pp. 481–488.
- SAC-2014-GomesBM #network #similarity
- A similarity model for virtual networks negotiation (RLG, LFB, ERMM), pp. 489–494.
- SAC-2014-WangW #network
- Wavelength resources based lightpath-level active rerouting in all-optical WDM networks (SWW, CYW), pp. 495–500.
- SAC-2014-PetroccoCPE #performance
- Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
- SAC-2014-LiuCM #ad hoc #approach #composition #mobile #network
- A low-latency service composition approach in mobile ad hoc networks (CL, JC, FLM), pp. 509–511.
- SAC-2014-PengYYHKH #3d #detection #multi #using
- 3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
- SAC-2014-GeorgiadisP #algorithm #online #problem #scheduling #smarttech
- Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithm (GG, MP), pp. 518–524.
- SAC-2014-LopezTCC #algorithm #automation #design
- Design of an automatic demand-side management system based on evolutionary algorithms (EGL, AT, SC, VC), pp. 525–530.
- SAC-2014-BarbosaBAC #lightweight #privacy
- Lightweight privacy for smart metering data by adding noise (PB, AB, HA, SC), pp. 531–538.
- SAC-2014-LiuGSLSX #communication #encryption #grid #named #smarttech
- SEDE: state estimation-based dynamic encryption scheme for smart grid communication (TL, YG, YS, YL, YS, FX), pp. 539–544.
- SAC-2014-TesfayHBO #architecture #communication #network
- Cyber-secure communication architecture for active power distribution networks (TTT, JPH, JYLB, PO), pp. 545–552.
- SAC-2014-SpiegelA #energy
- Energy disaggregation meets heating control (SS, SA), pp. 559–566.
- SAC-2014-FlemingWWS #monitoring
- Monitoring water scarcity risk in Africa (KF, KW, HW, OS), pp. 567–568.
- SAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student
- Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
- SAC-2014-Gutierrez-GarciaG #multi #safety #simulation
- Multi-agent simulation of perception of safety from crime (JOGG, AGdSG), pp. 573–578.
- SAC-2014-LargillierPP #named #robust
- Rocovo: robust communal publication scheme (TL, GP, SP), pp. 579–586.
- SAC-2014-ZangerleS #classification #quote #twitter
- “Sorry, I was hacked”: a classification of compromised twitter accounts (EZ, GS), pp. 587–593.
- SAC-2014-YoonKHKRC #metric #reachability #similarity
- Reachability vectors: features for link-based similarity measures (SHY, JSK, JH, SWK, MR, HJC), pp. 594–597.
- SAC-2014-VasconcelosAG #code review #predict #what
- What makes your opinion popular?: predicting the popularity of micro-reviews in foursquare (MAV, JMA, MAG), pp. 598–603.
- SAC-2014-AlharbiZ #predict #social
- Exploring the significance of human mobility patterns in social link prediction (BA, XZ), pp. 604–609.
- SAC-2014-FanC #approximate #framework #network #scalability #social
- An approximate framework for scaling social influence computation in large networks (YCF, HC), pp. 610–615.
- SAC-2014-ArnaboldiCGPP #information management
- Information diffusion in OSNs: the impact of nodes’ sociality (VA, MC, MLG, AP, FP), pp. 616–621.
- SAC-2014-TogneriCK #information management #locality #online
- The importance of geographic locality for online information diffusion (RMT, BTC, CAK), pp. 622–627.
- SAC-2014-FreitasVHBV #detection #twitter
- Pathways for irony detection in tweets (LAdF, AAV, DNH, MNB, RV), pp. 628–633.
- SAC-2014-SeoKTC #analysis #framework #network #social
- A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
- SAC-2014-CamposM #automation #categorisation
- Automatic categorization of questions from Q&A sites (ECC, MdAM), pp. 641–643.
- SAC-2014-LiuMHHSC #algorithm #hybrid #recommendation #twitter
- A hybrid algorithm for recommendation twitter peers (JNKL, ZM, YXH, YLH, SCKS, VWSC), pp. 644–649.
- SAC-2014-LiSSJW #information management
- Preventing the diffusion of negative information based on local influence tree (YL, YS, JS, BJ, JW), pp. 650–652.
- SAC-2014-QuilleTR #analysis
- Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
- SAC-2014-RanaKS #algorithm #evaluation #ranking #social
- The strength of social strength: an evaluation study of algorithmic versus user-defined ranking (JR, JK, KS), pp. 658–659.
- SAC-2014-PessinOUWMV #evolution #learning #network #self
- Self-localisation in indoor environments combining learning and evolution with wireless networks (GP, FSO, JU, DFW, RCM, PAV), pp. 661–666.
- SAC-2014-HuangLD #analysis #delivery #modelling #multi #network #performance
- Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
- SAC-2014-AminikhanghahiWSSJ #effectiveness #feature model #smarttech
- Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening (SA, WW, SYS, SHS, SIJ), pp. 674–679.
- SAC-2014-KrichenAB #health #monitoring
- WSN-based flutter control application for aircraft wings structural health monitoring (DK, WA, NB), pp. 680–685.
- SAC-2014-MotaB #algorithm #anti #internet
- A dynamic frame slotted ALOHA anti-collision algorithm for the internet of things (RPBM, DMB), pp. 686–691.
- SAC-2014-HeimfarthGFA #latency #named #protocol
- GB-MAC: a backbone based low latency protocol for WSNs (TH, JCG, AVF, JPdA), pp. 692–698.
- SAC-2014-YoonY #authentication #network #using
- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
- SAC-2014-AhmedWK #clustering #energy #named #performance
- EENC — energy efficient nested clustering in UASN (SHA, AW, DK), pp. 706–710.
- SAC-2014-JunAK #detection #using
- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
- SAC-2014-Mota #internet #quality #research #student
- Student research abstract: mechanisms to ensure quality of service for the internet of things (RPBM), pp. 713–714.
- SAC-2014-Daniel #communication #protocol #using
- Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
- SAC-2014-Khan #independence #research #standard #student
- Student research abstract: an optimized handover scheme based on media independent handover standard IEEE 802.21 (MK), pp. 717–718.
- SAC-2014-WatanabeGF #consistency #navigation
- Keyboard navigation mechanisms in tab widgets: an investigation on ARIA’s conformance (WMW, RJG, RPdMF), pp. 721–726.
- SAC-2014-ArapovBO #named #web #wiki
- WikiNEXT: a wiki for exploiting the web of data (PA, MB, ABO), pp. 727–734.
- SAC-2014-GaubatzHZS #collaboration #constraints #documentation #editing #realtime #web
- Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents (PG, WH, UZ, MS), pp. 735–742.
- SAC-2014-IturriozAD #monitoring
- Generalizing the “like” button: empowering websites with monitoring capabilities (JI, IA, OD), pp. 743–750.
- SAC-2014-ManducaMFP #approach #database #implementation #multitenancy #web
- A nonintrusive approach for implementing single database, multitenant services from web applications (AMM, EVM, RPMF, MdGCP), pp. 751–756.
- SAC-2014-CimanGG #animation #case study #development #mobile #platform
- Cross-platform mobile development: a study on apps with animations (MC, OG, NG), pp. 757–759.
- SAC-2014-Yoo #named #online
- OSBS: online storm-water billing system (WSY), pp. 760–761.
- SAC-2014-TragatschnigTZ #impact analysis #using
- Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
- SAC-2014-YokoyamaKM #using
- Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
- SAC-2014-RighiCGFAG #transaction
- Redesigning transaction load balancing on electronic funds transfer scenarios (RdRR, CAdC, LGJ, KF, ALA, LG), pp. 775–777.
- SAC-2014-ChallcoI #authoring #design #learning #personalisation #towards
- Towards a learning design authoring tool that generates personalized units of learning for CSCL (GCC, SI), pp. 778–780.
- SAC-2014-SaraivaS #behaviour #how
- Choosing my partners based on how they will evaluate my behavior (ECdRCS, VTdS), pp. 781–783.
- SAC-2014-BarddalGE #classification #concept #named #network #social
- SFNClassifier: a scale-free social network method to handle concept drift (JPB, HMG, FE), pp. 786–791.
- SAC-2014-IencoBPP #category theory #data type #detection #evolution
- Change detection in categorical evolving data streams (DI, AB, BP, PP), pp. 792–797.
- SAC-2014-GomesE #adaptation #classification #data type #named #social
- SAE2: advances on the social adaptive ensemble classifier for data streams (HMG, FE), pp. 798–804.
- SAC-2014-ZimmermannNS #adaptation #classification
- Adaptive semi supervised opinion classifier with forgetting mechanism (MZ, EN, MS), pp. 805–812.
- SAC-2014-HalderZC #analysis #database #information management #query
- Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
- SAC-2014-LinWCC #query
- Finding targets with the nearest favor neighbor and farthest disfavor neighbor by a skyline query (YWL, ETW, CFC, ALPC), pp. 821–826.
- SAC-2014-DouglasL #database #embedded #named #sql
- LittleD: a SQL database for sensor nodes and embedded applications (GD, RL), pp. 827–832.
- SAC-2014-OliveiraMB #documentation #semantics #towards #xml
- Towards semantic diff of XML documents (AO, LM, VB), pp. 833–838.
- SAC-2014-RaigozaS
- Temporal join processing with hilbert curve space mapping (JR, JS), pp. 839–844.
- SAC-2014-KimKYP #network #online #social
- Sampling in online social networks (SWK, KNK, SHY, SP), pp. 845–849.
- SAC-2014-LiuTZ #constraints #mining
- Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
- SAC-2014-RithLM #sql
- Speaking in tongues: SQL access to NoSQL systems (JR, PSL, KMW), pp. 855–857.
- SAC-2014-MesmoudiH #declarative #framework #query #scalability
- A test framework for large scale declarative queries: preliminary results (AM, MSH), pp. 858–859.
- SAC-2014-AvilaMRPY #distributed #quantum #simulation
- GPU-aware distributed quantum simulation (AA, AM, RR, MLP, ACY), pp. 860–865.
- SAC-2014-AndradeRMOCFR #architecture #hybrid #performance #scheduling
- Efficient dynamic scheduling of heterogeneous applications in hybrid architectures (GA, GSR, DM, RSO, EC, RF, LCdR), pp. 866–871.
- SAC-2014-SahuR #clustering #runtime
- Creating heterogeneity at run time by dynamic cache and bandwidth partitioning schemes (AS, SR), pp. 872–879.
- SAC-2014-AlexandreMP #algorithm #multi #on the
- On the support of task-parallel algorithmic skeletons for multi-GPU computing (FA, RM, HP), pp. 880–885.
- SAC-2014-RockiBS #abstraction #future of #performance #programming #question
- The future of accelerator programming: abstraction, performance or can we have both? (KR, MB, RS), pp. 886–895.
- SAC-2014-MitranCB #automation #image #ranking
- GeoTime-based tag ranking model for automatic image annotation (MM, GC, MB), pp. 896–901.
- SAC-2014-BergamascoN #3d #approach #feature model #retrieval #using
- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
- SAC-2014-KimLSKL #approach #named #ranking #web
- C-Rank: a contribution-based web page ranking approach (DJK, SCL, HYS, SWK, JBL), pp. 908–912.
- SAC-2014-NgoPLS #image #named #query #recommendation
- Recommend-Me: recommending query regions for image search (TDN, SP, DDL, SS), pp. 913–918.
- SAC-2014-JuniorGM #collaboration #constraints #modelling #personalisation
- Personalized collaborative filtering: a neighborhood model based on contextual constraints (EBSJ, RG, MGM), pp. 919–924.
- SAC-2014-BelbachirBM #modelling #probability
- Probabilistic opinion models based on subjective sources (FB, MB, MMSM), pp. 925–926.
- SAC-2014-MoonPPS #recognition
- Improved named entity recognition: patterns in columns model (PCM) (CYM, MP, HyP, JS), pp. 927–928.
- SAC-2014-AudehBB #information retrieval #query
- Exploring query reformulation for named entity expansion in information retrieval (BA, PB, MB), pp. 929–930.
- SAC-2014-LiMZ #using #visualisation
- Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
- SAC-2014-UnoI #music #named #recommendation
- MALL: a life log based music recommendation system and portable music player (AU, TI), pp. 939–944.
- SAC-2014-CostaTT #image #named #performance
- MFS-Map: efficient context and content combination to annotate images (AFC, AJMT, CTJ), pp. 945–950.
- SAC-2014-YangDZYZN #scalability #visualisation
- Visualizing large hierarchies with drawer trees (YY, ND, SZ, ZY, KZ, QVN), pp. 951–956.
- SAC-2014-PedrosaP #using
- Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
- SAC-2014-SantannaSB #automation #image #retrieval #towards
- Content-based image retrieval towards the automatic characterization of soybean seed vigor (MGFS, PTMS, PHB), pp. 964–969.
- SAC-2014-NunesNR #contest #game studies #people
- Motivating people to perform better in exergames: competition in virtual environments (MBN, LPN, VR), pp. 970–975.
- SAC-2014-Tobita #named #novel #ubiquitous #visualisation
- Aero-screen: blimp-based ubiquitous screen for novel digital signage and information visualization (HT), pp. 976–980.
- SAC-2014-ChenWWZL #3d #approach #web
- An approach to support stereoscopic 3D web (QC, WW, RW, JZ, ZL), pp. 981–984.
- SAC-2014-HusemannR #multi #predict #scalability #video
- Introduction of a multi-layer predictive search strategy for scalable video coding (RH, VR), pp. 985–986.
- SAC-2014-Lutz0D #question #smarttech
- Are smartphones better than CRC cards? (RL, SS, SD), pp. 987–994.
- SAC-2014-PimentelCMAS #design #refinement #requirements
- From requirements to statecharts via design refinement (JP, JC, JM, KA, VESS), pp. 995–1000.
- SAC-2014-EngielCL #approach #concept #elicitation #using
- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
- SAC-2014-AlmenteroLL #composition #requirements #towards
- Towards software modularization from requirements (EA, JCSdPL, CJPdL), pp. 1007–1012.
- SAC-2014-ZardariBE #using
- Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
- SAC-2014-Silva #approach #automation #overview #quality #requirements #specification #validation
- Quality of requirements specifications: a preliminary overview of an automatic validation approach (ARdS), pp. 1021–1022.
- SAC-2014-HoritaHSNTO #approach #modelling #refinement #using
- Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
- SAC-2014-BassoPOF #adaptation #case study #experience #generative #lessons learnt #model transformation
- Generative adaptation of model transformation assets: experiences, lessons and drawbacks (FPB, RMP, TCdO, MDDF), pp. 1027–1034.
- SAC-2014-OhK #architecture #requirements #traceability
- A hierarchical model for traceability between requirements and architecture (JO, SK), pp. 1035–1042.
- SAC-2014-GuimaraesGF #composition #on the #quantifier
- On the impact of obliviousness and quantification on model composition effort (EG, AG, KF), pp. 1043–1048.
- SAC-2014-CogniniCGPR #adaptation #challenge #process #research
- Research challenges in business process adaptability (RC, FC, SG, AP, BR), pp. 1049–1054.
- SAC-2014-ChaturvediP #component #game studies #ontology
- Ontology driven builder pattern: a plug and play component (AC, TVP), pp. 1055–1057.
- SAC-2014-HuangCLWL #adaptation #interactive #random #testing
- Adaptive random prioritization for interaction test suites (RH, JC, ZL, RW, YL), pp. 1058–1063.
- SAC-2014-ZiadiHPZT #approach #independence #product line #towards
- Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
- SAC-2014-PengST #case study #development #mobile #network #social
- Success factors in mobile social networking application development: case study of instagram (RP, DS, WTT), pp. 1072–1079.
- SAC-2014-KangS #analysis #implementation #scheduling
- Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
- SAC-2014-MaAS #graph
- Project centralization based on graph coloring (LM, CA, HS), pp. 1086–1093.
- SAC-2014-GaoEWGL #empirical #generative #testing
- An empirical study of requirements-based test generation on an automobile control system (RG, JSE, WEW, XG, SYL), pp. 1094–1099.
- SAC-2014-GuoQS
- Locating fault-inducing patterns from structural inputs (HFG, ZQ, HPS), pp. 1100–1107.
- SAC-2014-Al-RefaiCF #modelling #runtime #using
- Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
- SAC-2014-GamaD #approach #deployment #fault #self #testing
- A fault deployment and activation approach for testing self-recovery mechanisms (KG, DD), pp. 1114–1119.
- SAC-2014-FoucaultPFB #metric
- Computing contextual metric thresholds (MF, MP, JRF, XB), pp. 1120–1125.
- SAC-2014-LaurentBBG #declarative #process
- Planning for declarative processes (YL, RB, SB, MPG), pp. 1126–1133.
- SAC-2014-YangZL #algorithm #debugging #developer #effectiveness #multi #recommendation
- Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively (GY, TZ, BL), pp. 1134–1139.
- SAC-2014-NguyenJ0B #automation #diagrams #embedded #modelling #realtime #uml
- Automatic construction of timing diagrams from UML/MARTE models for real-time embedded software (MCN, EJ, JC, DHB), pp. 1140–1145.
- SAC-2014-BoghratiHK #framework #process #using
- Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
- SAC-2014-CostaKAC #case study #commit #developer
- Unveiling developers contributions behind code commits: an exploratory study (DAdC, UK, EA, RC), pp. 1152–1157.
- SAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
- Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
- SAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
- SAC-2014-MaWX #behaviour #commit #developer #empirical #open source
- Dynamics of open-source software developer’s commit behavior: an empirical investigation of subversion (YM, YW, YX), pp. 1171–1173.
- SAC-2014-WayuaWS #modelling
- Rethinking agribusiness models in Africa (CW, KW, OS), pp. 1174–1175.
- SAC-2014-KumeNNS #dynamic analysis #framework
- A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
- SAC-2014-ChenML #case study #education #research #testing
- Combining research and education of software testing: a preliminary study (ZC, AM, BL), pp. 1179–1180.
- SAC-2014-FariasGLGCRBO #composition #quality #towards
- Towards a quality model for model composition effort (KF, AG, CJPdL, LGJ, CAdC, RdRR, FPB, TCdO), pp. 1181–1183.
- SAC-2014-XiaLWZ #analysis #predict
- Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
- SAC-2014-ZhaoXKLL #debugging #empirical #process
- An empirical study of bugs in build process (XZ, XX, PSK, DL, SL), pp. 1187–1189.
- SAC-2014-XavierMMA #overview #reliability #research
- A survey on research in software reliability engineering in the last decade (JX, AM, RM, LBdA), pp. 1190–1191.
- SAC-2014-FieldAE #development #energy #framework #named
- EACOF: a framework for providing energy transparency to enable energy-aware software development (HF, GA, KE), pp. 1194–1199.
- SAC-2014-NoureddineRS #energy #library #testing
- Unit testing of energy consumption of software libraries (AN, RR, LS), pp. 1200–1205.
- SAC-2014-BrinkeMBBAK #approach #composition #design #energy
- A tool-supported approach for modular design of energy-aware software (StB, SM, CB, LB, MA, SK), pp. 1206–1212.
- SAC-2014-CorralGSS #android #energy #implementation
- Method reallocation to reduce energy consumption: an implementation in Android OS (LC, ABG, AS, GS), pp. 1213–1218.
- SAC-2014-HassanB #as a service
- Green-as-a-service (GaaS) for cloud service provision operation (MIH, RB), pp. 1219–1220.
- SAC-2014-Brinke #energy
- Interpreting energy profiles with CEGAR (StB), pp. 1221–1222.
- SAC-2014-HuergoPD #approach #identification #modelling #using
- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
- SAC-2014-ParraJGI #approach #automation #product line
- An SOA approach for automating software product line adoption (CP, DJ, LG, AI), pp. 1231–1238.
- SAC-2014-KarumanchiS #case study #scalability #web #web service
- In the wild: a large scale study of web services vulnerabilities (SK, ACS), pp. 1239–1246.
- SAC-2014-OliveiraSB #analysis #coordination
- Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
- SAC-2014-Guimaraes #architecture #composition #distributed #fault tolerance
- A fault-tolerant architecture for decentralized compositions of services in the wild (FPG), pp. 1255–1256.
- SAC-2014-ChenZW #detection #named #testing
- Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
- SAC-2014-RiveraC #java #source code
- Translating event-B to JML-specified Java programs (VR, NC), pp. 1264–1271.
- SAC-2014-BeoharM #consistency #testing
- Input-output conformance testing based on featured transition systems (HB, MRM), pp. 1272–1278.
- SAC-2014-PinisettyFJM #runtime
- Runtime enforcement of regular timed properties (SP, YF, TJ, HM), pp. 1279–1286.
- SAC-2014-BonifacioM #on the #testing
- On the completeness of test suites (ALB, AVM), pp. 1287–1292.
- SAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
- SAC-2014-PaulL #overview
- A systematic literature review on modified condition and decision coverage (TKP, MFL), pp. 1301–1308.
- SAC-2014-PereiraS #complexity #deduction #source code
- Complexity checking of ARM programs, by deduction (MP, SMdS), pp. 1309–1314.
- SAC-2014-RibeiroS #domain-specific language #mobile #named
- XIS-mobile: a DSL for mobile applications (AR, ARdS), pp. 1316–1323.
- SAC-2014-RaneburgerKPSA #automation #design #generative #interactive #process #user interface
- A process for facilitating interaction design through automated GUI generation (DR, HK, RP, VS, AA), pp. 1324–1330.
- SAC-2014-EtcheversSBCP #reliability #self
- Reliable self-deployment of cloud applications (XE, GS, FB, TC, NDP), pp. 1331–1338.
- SAC-2014-HenrioR #declarative #scheduling
- Declarative scheduling for active objects (LH, JR), pp. 1339–1344.
- SAC-2014-Umatani #calculus #implementation
- Practical implementation techniques of ambient calculus in conventional dynamic languages (SU), pp. 1345–1351.
- SAC-2014-KuhnCJN #flexibility #modelling
- Flexible modeling of policy-driven upstream notification strategies (EK, SC, GJ, MN), pp. 1352–1354.
- SAC-2014-AngelisFS #composition #self
- Self-composition of services with chemical reactions (FDA, JLFM, GDMS), pp. 1355–1356.
- SAC-2014-AmadiniGM #constraints #theorem proving
- An enhanced features extractor for a portfolio of constraint solvers (RA, MG, JM), pp. 1357–1359.
- SAC-2014-MuneraDAC #flexibility #parallel
- Flexible cooperation in parallel local search (DM, DD, SA, PC), pp. 1360–1361.
- SAC-2014-KolbZWR #design #distance #empirical #how #modelling #process #social
- How social distance of process designers affects the process of process modeling: insights from a controlled experiment (JK, MZ, BW, MR), pp. 1364–1370.
- SAC-2014-Benner-WicknerBBG #execution
- Execution support for agenda-driven case management (MBW, MB, TB, VG), pp. 1371–1377.
- SAC-2014-FdhilaR #co-evolution #collaboration #predict #process
- Predicting change propagation impacts in collaborative business processes (WF, SRM), pp. 1378–1385.
- SAC-2014-SaarsenD #assessment #process #towards
- Towards an assessment model for balancing process model production and use (TS, MD), pp. 1386–1392.
- SAC-2014-WangWPSC #collaboration #network #process
- A collaborative processes synchronization method with regards to system crashes and network failures (LW, AW, LFP, MvS, CC), pp. 1393–1398.
- SAC-2014-LabdaMS #modelling #privacy #process
- Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
- SAC-2014-MolkaRDCZG #consistency #modelling #process
- Conformance checking for BPMN-based process models (TM, DR, MD, AC, XJZ, WG), pp. 1406–1413.
- SAC-2014-EvermannA #algorithm #big data #implementation #mining #process
- Big data meets process mining: implementing the alpha algorithm with map-reduce (JE, GA), pp. 1414–1416.
- SAC-2014-RamosV #architecture #enterprise
- eXtreme enterprise architecture planning (HR, AV), pp. 1417–1419.
- SAC-2014-AntunesBMBC #analysis #architecture #enterprise #ontology
- Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
- SAC-2014-TsaiC #3d #manycore
- A thermal-throttling server in 3D multicore chips (THT, YSC), pp. 1425–1430.
- SAC-2014-BertoutFO #automation #clustering #heuristic #realtime #set
- A heuristic to minimize the cardinality of a real-time task set by automated task clustering (AB, JF, RO), pp. 1431–1436.
- SAC-2014-ChangTK #3d
- A traffic-balanced routing scheme for heat balance in 3D networks-on-chip (WCC, HWT, CFK), pp. 1437–1442.
- SAC-2014-ZanattaBGL #component #framework #monitoring #off the shelf
- Building a WSN infrastructure with COTS components for the thermal monitoring of datacenters (GZ, GDB, RG, JCBL), pp. 1443–1448.
- SAC-2014-YooLB #memory management #policy
- The least-dirty-first cache replacement policy for phase-change memory (SY, EL, HB), pp. 1449–1454.
- SAC-2014-AlnajemZ #evaluation #mobile
- A copula-based risk evaluation method (C-REM) in a corporate mobile banking context (AAIA, NZ), pp. 1455–1462.
- SAC-2014-HongHKK #mobile #music #recommendation #smarttech
- Context-aware music recommendation in mobile smart devices (JH, WSH, JHK, SWK), pp. 1463–1468.
- SAC-2014-ChangCHKL #analysis #behaviour #mobile
- Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
- SAC-2014-KinaiBWMWS #framework #platform
- Traffic 411: a traffic congestion routing and awareness platform for Nairobi (AK, REB, AWB, EM, KW, OS), pp. 1475–1476.
- SAC-2014-LoCCSL #algorithm #locality
- ICAP, a new flash wear-leveling algorithm inspired by locality (SWL, BHC, YWC, TCS, YCL), pp. 1478–1483.
- SAC-2014-SuzakiYTOS #protocol #testing #virtual machine
- Rollback mechanism of nested virtual machines for protocol fuzz testing (KS, TY, AT, YO, ES), pp. 1484–1491.
- SAC-2014-BaeCPJKC #clustering #effectiveness #memory management
- An effective data clustering method based on expected update time in flash memory environment (DHB, JWC, SMP, BSJ, SWK, SjC), pp. 1492–1497.
- SAC-2014-KuoT #in the cloud #incremental #virtual machine
- Delay-based incrementally mapping of virtual machines in cloud computing systems (CFK, HWT), pp. 1498–1503.
- SAC-2014-ChangHL #adaptation #clustering #optimisation #using
- Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
- SAC-2014-WangH #data access #fine-grained #performance
- An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan (MW, YH), pp. 1511–1516.
- SAC-2014-ParkKC #framework #kernel #memory management #online #platform #using
- Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
- SAC-2014-MatiasPASH #case study #empirical #operating system #reliability
- An empirical exploratory study on operating system reliability (RM, MP, LBdA, CS, LH), pp. 1523–1528.
- SAC-2014-NogueiraMV #case study #execution
- An experimental study on execution time variation in computer experiments (PEN, RMJ, EV), pp. 1529–1534.
- SAC-2014-LeeJB #design #file system #memory management #named #similarity
- DTFS: exploiting the similarity of data versions to design a write-efficient file system in phase-change memory (EL, JEJ, HB), pp. 1535–1540.
- SAC-2014-LeePKH #clustering
- Per-cluster allocation of relocation staff on electric vehicle sharing systems (JL, GLP, JK, NH), pp. 1541–1542.
- SAC-2014-OliveiraO #analysis #kernel #linux
- Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
- SAC-2014-EliasMFB #algorithm #analysis #memory management
- Experimental and theoretical analyses of memory allocation algorithms (DE, RM, MF, LBdA), pp. 1545–1546.
- SAC-2014-HamerW #platform #scalability
- Large scale processing of landsat data on various software platforms (GH, JW), pp. 1547–1549.
- SAC-2014-Rohrig #domain-specific language #process #scheduling
- A domain specific language for process scheduling (DR), pp. 1550–1551.
- SAC-2014-Sechting #framework #independence #platform
- A platform independent scheduler framework (CRS), pp. 1552–1553.
- SAC-2014-SerranoG #performance
- Locking fast (MS, JG), pp. 1556–1561.
- SAC-2014-PatrignaniC #low level #semantics
- Fully abstract trace semantics for low-level isolation mechanisms (MP, DC), pp. 1562–1569.
- SAC-2014-ReisIB #syntax
- Defining the syntax of extensible languages (LVdSR, VODI, RdSB), pp. 1570–1576.
- SAC-2014-LoulergueRTLH #parallel #problem
- Formal derivation and extraction of a parallel program for the all nearest smaller values problem (FL, SR, JT, JL, ZH), pp. 1577–1584.
- SAC-2014-DabrowskiLP #concurrent #thread
- Nested atomic sections with thread escape: a formal definition (FD, FL, TP), pp. 1585–1592.
- SAC-2014-TarauB #algorithm
- Arithmetic algorithms for hereditarily binary natural numbers (PT, BPB), pp. 1593–1600.
- SAC-2014-BassoOF #java #model transformation
- Extending JUnit 4 with Java annotations and reflection to test variant model transformation assets (FPB, TCdO, KF), pp. 1601–1608.
- SAC-2014-NabeezathP #algorithm #detection #performance
- Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
- SAC-2014-KrikavaCF14a #domain-specific language #modelling #using
- Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
- SAC-2014-PotocnikCS #debugging #named #problem #scala
- Linter: a tool for finding bugs and potential problems in scala code (MP, UC, BS), pp. 1615–1616.
- SAC-2014-DeanM #aspect-oriented
- An aspect pointcut for parallelizable loops (JSD, FJM), pp. 1619–1624.
- SAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming #using
- Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
- SAC-2014-BackesGLL
- X-pire 2.0: a user-controlled expiration date and copy protection mechanism (MB, SG, SL, SL), pp. 1633–1640.
- SAC-2014-EmuraKOT #communication #formal method #implementation #prototype
- Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
- SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- SAC-2014-HedinBBS #api #data flow #javascript #named
- JSFlow: tracking information flow in JavaScript and its APIs (DH, AB, LB, AS), pp. 1663–1671.
- SAC-2014-OliveiraNWB #approach #kernel #named
- Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
- SAC-2014-MengWK #adaptation #authentication #design #mobile
- Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones (YM, DSW, LfK), pp. 1680–1687.
- SAC-2014-WenD #performance #protocol
- Efficient protocols for private record linkage (ZW, CD), pp. 1688–1694.
- SAC-2014-Cooper #android #detection #research #student
- Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
- SAC-2014-SypeS #case study #online #requirements #social #using
- Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
- SAC-2014-BasuCKMVG0M #feedback #privacy #social
- Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
- SAC-2014-PetrlicLS #privacy
- Privacy-preserving reputation management (RP, SL, CS), pp. 1712–1718.
- SAC-2014-MoraCGZJEBAH #named
- MUSES: a corporate user-centric system which applies computational intelligence methods (AMM, PdlC, JJMG, SZ, MJ, AIEA, MB, HA, ZH), pp. 1719–1723.
- SAC-2014-DhanjalC #learning #network
- Learning reputation in an authorship network (CD, SC), pp. 1724–1726.
- SAC-2014-ParkY #multi #network #simulation #smarttech
- Encountering smartphones in network simulation: a preliminary result on multi-radio multicast (YP, WY), pp. 1727–1728.
- SAC-2014-ChoiKK #modelling #ontology #using
- Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
- SAC-2014-KangI #dynamic analysis
- Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
- SAC-2014-MoonKSP #image #novel #scalability
- A novel double linear-cubic convolution interpolation for digital image scaling (HMM, KRK, JS, SBP), pp. 1733–1734.
- SAC-2014-TinK #clustering #distributed #performance
- Method for fast clustering of data distributed on a sphere surface (TT, SRK), pp. 1735–1736.
- SAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
- A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
- SAC-2014-ParkH #analysis #network #performance
- Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
- SAC-2014-ChoiSP #2d #classification #correlation #distance #image #matrix
- Matrix correlation distance for 2D image classification (HC, JS, HP), pp. 1741–1742.
- SAC-2014-ChoiKKLK #network
- A new device discovery scheme in lighting control networks (SIC, SJK, IK, SKL, TGK), pp. 1743–1744.
- SAC-2014-TangKK #resource management #user satisfaction
- An optimal device selection for user satisfaction of content sharing (JT, PK, SK), pp. 1745–1746.
- SAC-2014-KwonB #implementation #library #prototype
- A CUDA-based implementation of OpenGL-compatible rasterization library prototype (YCK, NB), pp. 1747–1748.
- SAC-2014-ShinJLY #automaton #design
- Design of a cellular automata cell with rule 30 on quantum-dot cellular automata (SHS, JCJ, GJL, KYY), pp. 1749–1750.
- SAC-2014-WijenayakeP #estimation #using #visual notation
- Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
- SAC-2014-KimL
- The effect of IMPORT change in software change history (JK, EL), pp. 1753–1754.
- SAC-2014-JangJL #component #embedded #generative #prototype #simulation
- Virtual prototype generation by shockwave flash for simulating HW components of embedded system (SYJ, AKJ, WJL), pp. 1755–1756.
- SAC-2014-JangKCH #replication
- Impacts of delayed replication on the key-value store (MJ, WK, YC, JH), pp. 1757–1758.
31 ×#using
30 ×#named
25 ×#network
22 ×#approach
21 ×#modelling
17 ×#analysis
16 ×#framework
15 ×#algorithm
15 ×#mobile
14 ×#automation
30 ×#named
25 ×#network
22 ×#approach
21 ×#modelling
17 ×#analysis
16 ×#framework
15 ×#algorithm
15 ×#mobile
14 ×#automation