Proceedings of the 30th Annual ACM Symposium on Applied Computing
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Roger L. Wainwright, Juan Manuel Corchado, Alessio Bechini, Jiman Hong
Proceedings of the 30th Annual ACM Symposium on Applied Computing
SAC, 2015.

SE
DBLP
Scholar
Full names Links ISxN
@proceedings{SAC-2015,
	acmid         = "2695664",
	address       = "Salamanca, Spain",
	editor        = "Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong",
	isbn          = "978-1-4503-3196-8",
	publisher     = "{ACM}",
	title         = "{Proceedings of the 30th Annual ACM Symposium on Applied Computing}",
	year          = 2015,
}

Contents (367 items)

SAC-2015-ValenteR #array
Transcript-based reannotation for microarray probesets (EV, MR), pp. 3–9.
SAC-2015-ChoobdarRS #network
Discovering weighted motifs in gene co-expression networks (SC, PMPR, FMAS), pp. 10–17.
SAC-2015-FahnrichSP #database #identification #in memory #search-based
Facing the genome data deluge: efficiently identifying genetic variants with in-memory database technology (CF, MPS, HP), pp. 18–25.
SAC-2015-MottaMSMPC #3d #image #re-engineering
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
SAC-2015-SantosPFGMMC #framework #named #platform
MyHealth: a cross-domain platform for healthcare (MYS, CGP, BF, LG, GM, AJCM, JAC), pp. 40–46.
SAC-2015-JeongYAYP #algorithm #interactive #network #search-based #using
Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SAC-2015-HublerRFS #data flow #named #using
P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SAC-2015-NascimentoBJ #approach #geometry #recognition
A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
SAC-2015-NetoM #3d #artificial reality #recognition
3DLBP and HAOG fusion for face recognition utilizing Kinect as a 3D scanner (JBCN, ANM), pp. 66–73.
SAC-2015-PedrosaTB
Shape description based on bag of salience points (GVP, AJMT, CAZB), pp. 74–79.
SAC-2015-GoldnerVSG #2d #algorithm
A shortest path algorithm for 2D seismic horizon tracking (ELG, CNV, PMS, MG), pp. 80–85.
SAC-2015-JavedSBJ #feature model #robust
OR-PCA with dynamic feature selection for robust background subtraction (SJ, AS, TB, SKJ), pp. 86–91.
SAC-2015-PedrosaT #approach #encoding #visual notation #word
Compact and discriminative approach for encoding spatial-relationship of visual words (GVP, AJMT), pp. 92–95.
SAC-2015-MartinCBGP #algorithm #gpu
OpenACC-based GPU acceleration of an optical flow algorithm (NM, JC, GB, CG, MP), pp. 96–98.
SAC-2015-BlombergBR #evolution #robust
Evolving regression trees robust to missing data (LCB, RCB, DDR), pp. 102–109.
SAC-2015-BasgaluppBP #algorithm #evolution #induction #multi
Evolving decision-tree induction algorithms with a multi-objective hyper-heuristic (MPB, RCB, VP), pp. 110–117.
SAC-2015-SilvaMR #algorithm #approach #problem #using
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SAC-2015-WangCR #multi #optimisation
Dynamic optimization of multi-layered reinsurance treaties (HW, OACC, ARC), pp. 125–132.
SAC-2015-CinalliMPG #multi #optimisation
Collective preferences in evolutionary multi-objective optimization: techniques and potential contributions of collective intelligence (DC, LM, NSP, ACBG), pp. 133–138.
SAC-2015-Jo #algorithm #image #interactive #search-based #using
Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SAC-2015-UshawDEM #benchmark #game studies #metric
Benchmarking motion sensing devices for rehabilitative gaming (GU, RD, JAE, GM), pp. 143–148.
SAC-2015-PalviainenKKLMN #collaboration #design #developer #experience #framework
Design framework enhancing developer experience in collaborative coding environment (JP, TK, JK, JL, TM, AN), pp. 149–156.
SAC-2015-MedinaCP #evaluation #web
Evaluation of web accessibility on the maps domain (JLM, MIC, DMBP), pp. 157–162.
SAC-2015-BuenoAFASC
Selfie cafe: socialization in public spaces (AOB, JCA, VF, JCA, CS, DC), pp. 163–168.
SAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SAC-2015-AlmeidaCS0 #smell #towards #usability
Towards a catalog of usability smells (DA, JCC, JS, JCS), pp. 175–181.
SAC-2015-AbibA #design #guidelines #process
Integrating contexts in healthcare: guidelines to help the designers at design process (JCA, JCA), pp. 182–184.
SAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social #using
Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SAC-2015-OmatuYI #classification #learning #smell
Smell classification of wines by the learning vector quantization method (SO, MY, YI), pp. 195–200.
SAC-2015-PiMMG #analysis #health #ontology #security
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SAC-2015-PedroLPVI #case study #gamification #learning #women
Does gamification work for boys and girls?: An exploratory study with a virtual learning environment (LZP, AMZL, BGP, JV, SI), pp. 214–219.
SAC-2015-Usener #assessment #automation #data type #education #named
EASy-DSBuilder: automated assessment of tree data structures in computer science teaching (CAU), pp. 220–226.
SAC-2015-MaltaPSBF #analysis #case study #distance #information management #overview
A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
SAC-2015-PaivaBSIJ #behaviour #learning #recommendation #student
Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environment (ROAP, IIB, APdS, SI, PAJ), pp. 233–238.
SAC-2015-RodriguesMSS #3d #education #game studies #interactive
Beyond fun: an interactive and educational 3D traffic rules game controlled by non-traditional devices (MAFR, DVdM, YRS, YRS), pp. 239–246.
SAC-2015-ManhaesCZ #automation #performance #predict #source code #student #towards
Towards automatic prediction of student performance in STEM undergraduate degree programs (LMBM, SMSdC, GZ), pp. 247–253.
SAC-2015-LabibPCG #approach #development #learning #product line #reuse
Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
SAC-2015-Messaoud #collaboration #named
Dynamic: a collaborative filtering strategy for assigning examination’s rooms to supervisors (MBM), pp. 264–266.
SAC-2015-BogoniPS #artificial reality #evaluation
Evaluation of a haptic virtual reality simulator for endodontics training (TNB, MSP, RS), pp. 267–269.
SAC-2015-BarrosCMP #education #learning #repository #reuse #using
Integrating educational repositories to improve the reuse of learning objects (HB, EC, JM, RP), pp. 270–272.
SAC-2015-Pesare #learning #social
Smart learning environments for social learning (EP), pp. 273–274.
SAC-2015-TambeN #behaviour #game studies #modelling #resource management #robust #security
Robust resource allocation in security games and ensemble modeling of adversary behavior (AT, TN), pp. 277–282.
SAC-2015-MoralesNSA #named #requirements #specification
TRiStar: an i* extension for teleo-reactive systems requirements specifications (JMM, EN, PS, DA), pp. 283–288.
SAC-2015-MoreiraJR #analysis #reduction #similarity #visual notation
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
SAC-2015-DiasSACNL
Improving the kicking accuracy in a soccer robot (RD, JMS, JLA, BC, AJRN, NL), pp. 295–300.
SAC-2015-MainiS #communication #distributed #multi #using
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SAC-2015-StegagnoMB #distributed #identification
Distributed target identification in robotic swarms (PS, CM, HHB), pp. 307–313.
SAC-2015-LasagniR #3d
Force model of a robotic particle chain for 3d displays (ML, KR), pp. 314–319.
SAC-2015-FonooniH #behaviour #on the #visual notation
On the similarities between control based and behavior based visual servoing (BF, TH), pp. 320–326.
SAC-2015-LujakF #named #scheduling
ORCAS: optimized robots configuration and scheduling system (ML, AF), pp. 327–330.
SAC-2015-MarquesRPSM #coordination #named #network
NVL: a coordination language for unmanned vehicle networks (ERBM, MR, JP, JBS, FM), pp. 331–334.
SAC-2015-MinsamS #game studies
Sustaining mutual cooperation in iterated prisoner’s dilemma game (KM, KYS), pp. 335–337.
SAC-2015-IsraelHS #analysis #multi #semantics #summary
Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
SAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability #using
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SAC-2015-HogenboomNJFV #distributed #optimisation #query #rdf
RDF chain query optimization in a distributed environment (AH, EN, MJ, FF, DV), pp. 353–359.
SAC-2015-WanderleyP #folksonomy #learning
Learning folksonomies from task-oriented dialogues (GMPW, ECP), pp. 360–367.
SAC-2015-CorcoglionitiRM #rdf #sorting #streaming #using
Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SAC-2015-RodriguesAFSB #approach #ontology #simulation
An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
SAC-2015-Dragoni #multi
Exploiting multilinguality for creating mappings between thesauri (MD), pp. 382–387.
SAC-2015-RuyFBG #ontology #pattern matching #process #standard #towards
Towards an ontology pattern language for harmonizing software process related ISO standards (FBR, RdAF, MPB, GG), pp. 388–395.
SAC-2015-GayathriK #rdf #rule-based
Horn-rule based compression technique for RDF data (VG, PSK), pp. 396–401.
SAC-2015-JuniorSM #approach #semantics
An approach for building lexical-semantic resources based on heterogeneous information sources (JGdAJ, US, LBM), pp. 402–408.
SAC-2015-RegoMP #approach #detection #folksonomy #learning
A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SAC-2015-ChengKWT #scalability #semantics #throughput #web
High throughput indexing for large-scale semantic web data (LC, SK, TEW, GT), pp. 416–422.
SAC-2015-FauconnierKR #approach #machine learning #recognition #taxonomy
A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures (JPF, MK, BR), pp. 423–425.
SAC-2015-CamaraGS0 #adaptation #architecture #game studies #model checking #probability #self
Optimal planning for architecture-based self-adaptation via model checking of stochastic games (JC, DG, BRS, AP), pp. 428–435.
SAC-2015-Grossl #modelling #network
Modeling dependable systems with continuous time Bayesian networks (MG), pp. 436–441.
SAC-2015-KundeM #middleware #resource management
Workload characterization model for optimal resource allocation in cloud middleware (SK, TM), pp. 442–447.
SAC-2015-Rubio-MonteroPG #adaptation #evaluation #framework #monte carlo
Evaluation of an adaptive framework for resilient Monte Carlo executions (AJRM, MARP, RMG), pp. 448–455.
SAC-2015-IvakiLA #protocol #reliability #taxonomy
A taxonomy of reliable request-response protocols (NI, NL, FA), pp. 456–463.
SAC-2015-MonteiroL #clustering #power management #scalability #web
Scalable model for dynamic configuration and power management in virtualized heterogeneous web clusters (AFM, OL), pp. 464–467.
SAC-2015-PenhaW #design pattern
Parameterization of fail-operational architectural patterns (DOdP, GW), pp. 471–473.
SAC-2015-AhrndtBFA #adaptation #predict
Predictability in human-agent cooperation: adapting to humans’ personalities (SA, BB, JF, SA), pp. 474–479.
SAC-2015-DiasGKT #3d #adaptation #architecture #clustering #collaboration
A dynamic-adaptive architecture for 3d collaborative virtual environments based on graphic clusters (DRCD, MdPG, TWK, LCT), pp. 480–487.
SAC-2015-AmaralTMH #as a service #framework #internet #middleware #platform
Cooperative middleware platform as a service for internet of things applications (LAA, RTT, EdM, FH), pp. 488–493.
SAC-2015-SugiyamaS #learning #multi
Meta-strategy for cooperative tasks with learning of environments in multi-agent continuous tasks (AS, TS), pp. 494–500.
SAC-2015-RighiVRRCFA #parallel #source code
Rescheduling and checkpointing as strategies to run synchronous parallel programs on P2P desktop grids (RdRR, AV, VFR, GR, CAdC, KF, AMA), pp. 501–504.
SAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse #using
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SAC-2015-GuetmiMIB #collaboration #editing #in the cloud #mobile
Mobile collaboration: a collaborative editing service in the cloud (NG, MDM, AI, LB), pp. 509–512.
SAC-2015-HamataniUH #smarttech #using
Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SAC-2015-LiZL #mobile #network #personalisation #social
Integrating mobile sensing and social network for personalized health-care application (HL, QZ, KL), pp. 527–534.
SAC-2015-VieiraHH #mobile #testing
A context simulator as testing support for mobile apps (VV, KH, MH), pp. 535–541.
SAC-2015-SampaioEF #coordination
Determining the location of buildings given a single picture, environment maps and inaccurate GPS coordinates (JCS, RSE, LAFF), pp. 542–547.
SAC-2015-AttiaTHKTC #detection
On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
SAC-2015-NaqviMRPHB #artificial reality #deployment #mobile
To cloud or not to cloud: a context-aware deployment perspective of augmented reality mobile applications (NZN, KM, AR, DP, DH, YB), pp. 555–562.
SAC-2015-AlyI #named #process #realtime #recognition
ubiMonitor: intelligent fusion of body-worn sensors for real-time human activity recognition (HA, MAI), pp. 563–568.
SAC-2015-SilvaMFM #evaluation #metric #mobile
A scheduler for mobile cloud based on weighted metrics and dynamic context evaluation (FAS, PRMM, GF, RRMM), pp. 569–576.
SAC-2015-CostaRRTS #multi #named #platform
MpOS: a multiplatform offloading system (PBC, PALR, LSR, FAMT, JNdS), pp. 577–584.
SAC-2015-BerardiEF0 #classification #mobile #multi
Multi-store metadata-based supervised mobile app classification (GB, AE, TF, FS), pp. 585–588.
SAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SAC-2015-MukherjeeKCDCM #as a service #design #framework #performance #platform #scalability
Performance characterization and scalable design of sensing-as-a-service platform (TM, AK, DC, KD, AC, AM), pp. 592–595.
SAC-2015-DuarteBGCT #behaviour #generative #towards
Towards context-aware behaviour generation (PAdSD, FMB, FAdAG, WVdC, FAMT), pp. 596–598.
SAC-2015-KatsalisSPKT #network
Content placement in heterogeneous end-to-end virtual networks (KK, VS, TP, TK, LT), pp. 602–608.
SAC-2015-CarlucciCM
HTTP over UDP: an experimental investigation of QUIC (GC, LDC, SM), pp. 609–614.
SAC-2015-LagoMM #estimation #network #power management
High speed network impacts and power consumption estimation for cloud data centers (DGdL, ERMM, DM), pp. 615–620.
SAC-2015-EllouzeRB #energy
Energy harvesting based protection of border surveillance systems (NE, SR, NB), pp. 621–626.
SAC-2015-GomesB #integration #mobile #network
Feasibility of information-centric networking integration into LTE mobile networks (AG, TB), pp. 627–633.
SAC-2015-QueirozH #capacity
Translating full duplexity into capacity gains for the high-priority traffic classes of IEEE 802.11 (SQ, RH), pp. 634–639.
SAC-2015-ArbizaBSGT #internet #middleware #network #refactoring
Refactoring internet of things middleware through software-defined network (LMRA, LMB, CRPdS, LZG, LMRT), pp. 640–645.
SAC-2015-MatlCD #effectiveness #network
Effective manycast messaging for Kademlia network (LM, TC, MJD), pp. 646–652.
SAC-2015-IqbalAB #design #framework #network #scheduling
Designing network servers within a hierarchical scheduling framework (ZI, LA, MB), pp. 653–658.
SAC-2015-ChaudhuriMG #network #predict #using
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SAC-2015-FontineleSSNM #network #physics #problem
A solution to the MCSP problem considering physical layer degradations in transparent optical networks (AF, IS, ACBS, JMN, FM), pp. 662–664.
SAC-2015-TroisMBF #network
From software defined network to network defined for software (CT, MM, LCEDB, MDDF), pp. 665–668.
SAC-2015-CanoA #feedback #multi #scalability #streaming
Feedback management for scaling clients in streaming multicast (JC, LA), pp. 669–671.
SAC-2015-RiediBP #algorithm #performance #scalability
Channel and power allocation algorithm to optimize the performance of large WLANs (MR, GGB, MEP), pp. 673–679.
SAC-2015-ErnstKR #evaluation #network #performance
Performance evaluation of heterogeneous wireless networks considering competing objectives and viewpoints (JBE, SCK, JJPCR), pp. 680–687.
SAC-2015-HuangSZSXD #privacy #pseudo
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
SAC-2015-BoukAK #challenge #network #overview #research
Vehicular content centric network (VCCN): a survey and research challenges (SHB, SHA, DK), pp. 695–700.
SAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
SAC-2015-BohdanowiczFFMN #locality
RSSI-based localization of a wireless sensor node with a flying robot (FB, HF, RF, DM, FN, IS), pp. 708–715.
SAC-2015-JamhourPPSB #network
Interference aware channel assignment for structured wireless sensor networks (EJ, MEP, MCP, RDS, GGdOB), pp. 716–719.
SAC-2015-Khan #multi #network
Multi-criteria based vertical handover decision in heterogeneous wireless network (MK), pp. 720–721.
SAC-2015-RychnovskyH #generative #query #xml #xpath
Generating XML data for XPath queries (DR, IH), pp. 724–731.
SAC-2015-CapelleMHFV #hybrid #recommendation #semantics
Bing-SF-IDF+: a hybrid semantics-driven news recommender (MC, MM, FH, FF, DV), pp. 732–739.
SAC-2015-HsiehNKC #approximate #performance #query #recommendation
Efficient approximate thompson sampling for search query recommendation (CCH, JN, TK, JC), pp. 740–746.
SAC-2015-KassingOBH #community #social
Locating domain-specific contents and experts on social bookmarking communities (SK, JO, AB, GJH), pp. 747–752.
SAC-2015-SanojaG #evaluation #segmentation #web
Web page segmentation evaluation (AS, SG), pp. 753–760.
SAC-2015-BezuBRVVF #component #detection #multi #similarity #web
Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
SAC-2015-JuniorDOFB #performance #web
Handling flash-crowd events to improve the performance of web applications (UdPJ, LMdAD, DdO, YF, VCB), pp. 769–774.
SAC-2015-LeottaSRT #automation #generative #testing #visual notation #web
Automated generation of visual web tests from DOM-based web tests (ML, AS, FR, PT), pp. 775–782.
SAC-2015-JesusVB #functional #testing #web
Leveraging task-based data to support functional testing of web applications (FRdJ, LGdV, LABJ), pp. 783–790.
SAC-2015-ShahriarH #approach #assessment #metric #risk management #security #web
Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
SAC-2015-TsengHT #distributed #framework #javascript #migration #mobile #web
Migratom.js: a JavaScript migration framework for distributed web computing and mobile devices (TLT, SHH, CHT), pp. 798–801.
SAC-2015-KambonaBM #middleware #named #realtime #scalability #web
Serena: scalable middleware for real-time web applications (KK, EGB, WDM), pp. 802–805.
SAC-2015-MiyashitaITK #distributed #graph #named #representation
Catalogue: graph representation of file relations for a globally distributed environment (YM, HI, FT, KK), pp. 806–809.
SAC-2015-TriasCSM #migration #named #reverse engineering #tool support #web
RE-CMS: a reverse engineering toolkit for the migration to CMS-based web applications (FT, VdC, MLS, EM), pp. 810–812.
SAC-2015-HanHQY #clustering
Locality-preserving L1-graph and its application in clustering (SH, HH, HQ, DY), pp. 813–818.
SAC-2015-DermoucheKVL #modelling #sentiment #topic
A joint model for topic-sentiment modeling from text (MD, LK, JV, SL), pp. 819–824.
SAC-2015-GonzalezRP #classification #image
Computationally-efficient classification of HEp-2 cell patterns in IIF images (LFPG, DDAR, MSP), pp. 825–830.
SAC-2015-SilvaBAR #clustering #multi #prototype #using
Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SAC-2015-CharuvakaR #approximate #classification #coordination #scalability
Approximate block coordinate descent for large scale hierarchical classification (AC, HR), pp. 837–844.
SAC-2015-IqbalKK #analysis #sentiment
Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
SAC-2015-BouaskerY #anti #constraints #correlation #mining
Key correlation mining by simultaneous monotone and anti-monotone constraints checking (SB, SBY), pp. 851–856.
SAC-2015-Fournier-VigerZ #mining #named #performance
FOSHU: faster on-shelf high utility itemset mining — with or without negative unit profit (PFV, SZ), pp. 857–864.
SAC-2015-Brefeld #learning #multi
Multi-view learning with dependent views (UB), pp. 865–870.
SAC-2015-FrankM0
Alternating model trees (EF, MM, SK), pp. 871–878.
SAC-2015-RodriguesJD #recommendation #using
Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SAC-2015-BurkhardtK #classification #multi #on the
On the spectrum between binary relevance and classifier chains in multi-label classification (SB, SK), pp. 885–892.
SAC-2015-HendersonGE #clustering #empirical #named #parametricity #performance #probability
EP-MEANS: an efficient nonparametric clustering of empirical probability distributions (KH, BG, TER), pp. 893–900.
SAC-2015-OkkaliogluKP #on the
On the discovery of fake binary ratings (MO, MK, HP), pp. 901–907.
SAC-2015-BechetCCC #constraints #mining #multi #sequence
Sequence mining under multiple constraints (NB, PC, TC, BC), pp. 908–914.
SAC-2015-GuedesBOX #clustering #graph #multi
Exploring multiple clusterings in attributed graphs (GPG, EB, ESO, GX), pp. 915–918.
SAC-2015-KimHC #clustering #documentation #representation #semantics
Semantically enriching text representation model for document clustering (HjK, KjH, JyC), pp. 922–925.
SAC-2015-Zheng #algorithm #recommendation
Improve general contextual slim recommendation algorithms by factorizing contexts (YZ), pp. 929–930.
SAC-2015-Rekha #big data #detection #performance #using
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SAC-2015-BarddalGE #algorithm #clustering #data type #named #social
SNCStream: a social network-based data stream clustering algorithm (JPB, HMG, FE), pp. 935–940.
SAC-2015-GomesBE #classification #data type #learning
Pairwise combination of classifiers for ensemble learning on data streams (HMG, JPB, FE), pp. 941–946.
SAC-2015-MatuszykVSJG #incremental #matrix #recommendation
Forgetting methods for incremental matrix factorization in recommender systems (PM, JV, MS, AMJ, JG), pp. 947–953.
SAC-2015-ReadPB #data type #learning
Deep learning in partially-labeled data streams (JR, FPC, AB), pp. 954–959.
SAC-2015-SarmentoCG #evolution #scalability #visualisation
Visualization of evolving large scale ego-networks (RS, MC, JG), pp. 960–962.
SAC-2015-VinagreJG #collaboration #feedback
Collaborative filtering with recency-based negative feedback (JV, AMJ, JG), pp. 963–965.
SAC-2015-SidneyMRH #performance #predict #set #similarity
Performance prediction for set similarity joins (CFS, DSM, LAR, TH), pp. 967–972.
SAC-2015-KaplanisKSMT
HB+tree: use hadoop and HBase even your data isn’t that big (AK, MK, SS, CM, GT), pp. 973–980.
SAC-2015-MestrePN #adaptation #pipes and filters
Adaptive sorted neighborhood blocking for entity matching with MapReduce (DGM, CESP, DCN), pp. 981–987.
SAC-2015-EvangelistaFBA #named #symmetry
Bt-Join: a join operator for asymmetric storage device (NLE, JdAMF, AB, NA), pp. 988–993.
SAC-2015-SantosOCFTT #named #similarity
Combine-and-conquer: improving the diversity in similarity search through influence sampling (LFDS, WDO, LOC, MRPF, AJMT, CTJ), pp. 994–999.
SAC-2015-LopesT #framework #performance
A framework for investigating the performance of sum aggregations over encrypted data warehouses (CCL, VCT), pp. 1000–1007.
SAC-2015-AissiGSS #evaluation #framework #personalisation #query #recommendation
Personalized recommendation of SOLAP queries: theoretical framework and experimental evaluation (SA, MSG, TS, LBS), pp. 1008–1014.
SAC-2015-LiuI #clustering #framework #optimisation #parallel #using
An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SAC-2015-RafailidisM #image #parallel #similarity
Parallel similarity search based on the dimensions value cardinalities of image descriptor vectors (DR, YM), pp. 1023–1030.
SAC-2015-SeifertSG #personalisation #set #towards
Towards a feature-rich data set for personalized access to long-tail content (CS, JS, MG), pp. 1031–1038.
SAC-2015-LommatzschA #realtime #recommendation
Real-time recommendations for user-item streams (AL, SA), pp. 1039–1046.
SAC-2015-BerardiEF015a #case study #design #industrial
Classifying websites by industry sector: a study in feature design (GB, AE, TF, FS), pp. 1053–1059.
SAC-2015-DAddioM #approach #collaboration #sentiment
A sentiment-based item description approach for kNN collaborative filtering (RMD, MGM), pp. 1060–1065.
SAC-2015-BerardiCEM #microblog #on the #realtime
On the impact of entity linking in microblog real-time filtering (GB, DC, AE, DM), pp. 1066–1071.
SAC-2015-BraunschweigTEL #web
Column-specific context extraction for web tables (KB, MT, JE, WL), pp. 1072–1077.
SAC-2015-ChaCBCYBC #framework #online #topic
A universal topic framework (UniZ) and its application in online search (YC, KhC, HB, YC, TWY, BB, JC), pp. 1078–1085.
SAC-2015-BritoE #branch #named #performance #query
BranchGuide: an indexing technique for efficient, lossless processing of branching path queries (TBV, GEdS), pp. 1086–1092.
SAC-2015-AbbesPHB #documentation
Leveraging temporal expressions to filter vital documents related to an entity (RA, KPS, NH, MB), pp. 1093–1098.
SAC-2015-FerreiraPC #graph #matrix
Exploring graph topology via matrix factorization to improve wikification (RF, MdGCP, MC), pp. 1099–1104.
SAC-2015-DominguesSBMPR #metadata #multi #personalisation #ranking #recommendation
Applying multi-view based metadata in personalized ranking for recommender systems (MAD, CVS, FMMB, MGM, MGCP, SOR), pp. 1105–1107.
SAC-2015-Schlotterer #query
From context to query (JS), pp. 1108–1109.
SAC-2015-Chakraborti #identification #multi #optimisation #summary #topic
Multi-document text summarization for competitor intelligence: a methodology based on topic identification and artificial bee colony optimization (SC), pp. 1110–1111.
SAC-2015-Chaudhary #experience #recommendation
Experience in item based recommender system (AC), pp. 1112–1114.
SAC-2015-LevoratoDFF #algorithm #network #social
An ILS algorithm to evaluate structural balance in signed social networks (ML, LMdAD, YF, RMVdF), pp. 1117–1122.
SAC-2015-NonnenmacherOBV #modelling #process
Modelling consumers decision-making process about excluding products as a result of mutual influence (VN, LPLdO, BEJB, MBV), pp. 1123–1128.
SAC-2015-GimenesGRG #analysis #graph #multimodal #repository
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
SAC-2015-Valverde-Rebaza #modelling #naive bayes #network #online #predict #social
A naïve Bayes model based on ovelapping groups for link prediction in online social networks (JCVR, AV, LB, TdPF, AdAL), pp. 1136–1141.
SAC-2015-SilvaMS #analysis #quality
Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
SAC-2015-AliK #approach #effectiveness #recommendation
An effective approach to group recommendation based on belief propagation (IA, SWK), pp. 1148–1153.
SAC-2015-RajtmajerGMS #behaviour #game studies #network #online #social
An evolutionary game model for the spread of non-cooperative behavior in online social networks (SMR, CG, DM, ACS), pp. 1154–1159.
SAC-2015-OliveiraQMM #community #complexity #detection #using
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SAC-2015-LoffRM #platform #predict #social #social media
Predicting well-being with geo-referenced data collected from social media platforms (JL, MR, BM), pp. 1167–1173.
SAC-2015-TakemuraTT #classification #twitter
Classification of Twitter follow links based on the followers’ intention (HT, AT, KT), pp. 1174–1180.
SAC-2015-MochalovaN #multi
Multi-stage seed selection for viral marketing (AM, AN), pp. 1181–1183.
SAC-2015-SilvaSBVS #assessment #framework #process #using
Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SAC-2015-PintoMCS #process #using
Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SAC-2015-AwadBESAS #anti #approach #detection #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SAC-2015-AldeaIHQBF #modelling
Modelling strategy with ArchiMate (AA, MEI, JvH, DACQ, LB, HMF), pp. 1211–1218.
SAC-2015-ZappatoreLB #composition #contract #network #representation
SLA composition in service networks: a tool for representing relationships between SLAs and contracts (MZ, AL, MAB), pp. 1219–1224.
SAC-2015-0001RMW #approach #behaviour #constraints #process
Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
SAC-2015-WeberFMS #mining #multi #process
Mining processes with multi-instantiation (IW, MF, JM, JGS), pp. 1231–1237.
SAC-2015-MakrisVV #classification #predict
Classification model for predicting cost slippage in governmental ICT projects (CM, PV, JV), pp. 1238–1241.
SAC-2015-NwokejiCBK #concept #enterprise #framework
A conceptual framework for enterprise agility (JCN, TC, BSB, VK), pp. 1242–1244.
SAC-2015-HoldererAM #constraints #overview #workflow
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience (JH, RA, GM), pp. 1245–1248.
SAC-2015-Nwokeji #enterprise #framework
A framework for enterprise agility (JCN), pp. 1249–1250.
SAC-2015-DarabiG #personalisation #summary #using #video
Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SAC-2015-BarbieriTPG #named #representation #video #visual notation
Shot-HR: a video shot representation method based on visual features (TTSB, THT, MPPJ, RG), pp. 1257–1262.
SAC-2015-GotoT #communication #detection #network #visual notation
Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
SAC-2015-MateCEL #automation #multi #video
Automatic multi-camera remix from single video (SM, IDDC, AJE, AL), pp. 1270–1277.
SAC-2015-SoaresMV #multi
Controlling the focus and input events in multimedia applications (LFGS, MFM, ÁLVG), pp. 1278–1284.
SAC-2015-VielMT #approach #multi
An approach for controlling synchronous remote instances of a multimedia presentation (CCV, ELM, CACT), pp. 1285–1290.
SAC-2015-AbdiAM #algorithm #robust #video
A robust video watermarking algorithm in H.264/AVC compressed domain (LA, FBA, AM), pp. 1291–1293.
SAC-2015-ColantonioPPS #detection #overview #platform #visual notation
Visual detection of singularities in review platforms (AC, RDP, MP, AS), pp. 1294–1295.
SAC-2015-JoselliJC #animation #data type #gpu #named #proximity
NGrid: a proximity data structure for fluids animation with GPU computing (MJ, JRdSJ, EC), pp. 1303–1308.
SAC-2015-SilvaLP #locality #multi #replication
Boosting locality in multi-version partial data replication (JAS, JL, HP), pp. 1309–1314.
SAC-2015-BispoRC #c #generative #matlab
C and OpenCL generation from MATLAB (JB, LR, JMPC), pp. 1315–1320.
SAC-2015-BarringtonFD #multi #scalability
A scalable multi-producer multi-consumer wait-free ring buffer (AB, SDF, DD), pp. 1321–1328.
SAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance #using
G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SAC-2015-IglesiaJGP #parallel
Parallel trajectory synchronization for aircraft conflicts resolution (EdlI, GBJ, CG, MP), pp. 1339–1341.
SAC-2015-BeckersHMG #internet #security
Engineering trust- and reputation-based security controls for future internet systems (KB, MH, FM, MCFG), pp. 1344–1349.
SAC-2015-Soares0W #approach #modelling #named #recognition #requirements #speech
VoiceToModel: an approach to generate requirements models from speech recognition mechanisms (FS, JA, FW), pp. 1350–1357.
SAC-2015-MarquesRA #named #representation #traceability
TRL: a traceability representation language (AM, FR, WdLA), pp. 1358–1363.
SAC-2015-MarquesRA15a #process #requirements #towards #traceability
Towards a requirements traceability process centered on the traceability model (AM, FR, WdLA), pp. 1364–1369.
SAC-2015-BarnPB #approach #evaluation #privacy #requirements
An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
SAC-2015-AlmeidaBBCD #variability
Dynamic decision-making based on NFR for managing software variability and configuration selection (AA, NB, TVB, EC, FD), pp. 1376–1382.
SAC-2015-JuniorRSM #approach #deployment #multi #non-functional #requirements
A multi-criteria approach for assessing cloud deployment options based on non-functional requirements (RGJ, TR, AS, NCM), pp. 1383–1389.
SAC-2015-JuniorL #case study #named #reuse #specification
M-4REuse: reusing use cases specifications (MMCJ, ML), pp. 1390–1396.
SAC-2015-VilelaCPSCL #behaviour #modelling
Deriving the behavior of context-sensitive systems from contextual goal models (JV, JBdC, JP, MS, PC, ML), pp. 1397–1400.
SAC-2015-OjameruayeB #analysis #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SAC-2015-GassaraRJ #approach #architecture #deployment #modelling #multi
A multi-scale modeling approach for software architecture deployment (AG, IBR, MJ), pp. 1405–1410.
SAC-2015-GoncalvesON #architecture
A meta-process to construct software architectures for system of systems (MBG, FO, EYN), pp. 1411–1416.
SAC-2015-GuessiMAON #architecture #named #ontology
OntolAD: a formal ontology for architectural descriptions (MG, DAM, GA, FO, EYN), pp. 1417–1424.
SAC-2015-BassoMJV #architecture #design #evaluation #privacy #requirements #web
Requirements, design and evaluation of a privacy reference architecture for web applications and services (TB, RM, MJ, MV), pp. 1425–1432.
SAC-2015-GuessiNBFON #architecture #overview
A systematic literature review on the description of software architectures for systems of systems (MG, VVGN, TB, KRF, FO, EYN), pp. 1433–1440.
SAC-2015-TizzeiABC #architecture #case study #product line #tool support #using
Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SAC-2015-BurityE #approach #recommendation
A quantitative, evidence-based approach for recommending software modules (TB, GEdS), pp. 1449–1456.
SAC-2015-SilvaBNCS #architecture #design #quality
A decision-making tool to support architectural designs based on quality attributes (ICLS, PHSB, BFdSN, EC, AAS), pp. 1457–1463.
SAC-2015-AgrawalP #as a service #named #quality
AutoQA: quality attributes as a service in cloud (AA, TVP), pp. 1464–1467.
SAC-2015-KhlifKKD #approach #architecture #modelling #multi #towards
Towards a multi-scale modeling approach for software architectures (IK, MHK, AHK, KD), pp. 1468–1470.
SAC-2015-SantosM #detection
Exploring decision drivers on god class detection in three controlled experiments (JAMS, MGM), pp. 1472–1479.
SAC-2015-ReddySC #approach #aspect-oriented #incremental #learning #performance #weaving
Incremental aspect weaving: an approach for faster AOP learning (YRR, AS, MC), pp. 1480–1485.
SAC-2015-DemuthRNHZE #framework #multi #named
DesignSpace: an infrastructure for multi-user/multi-tool engineering (AD, MRE, AN, PH, KZ, AE), pp. 1486–1491.
SAC-2015-KimL #diagrams #qvt #sequence chart #using
Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SAC-2015-PerkusichMSGAP #approach #metric #network
A Bayesian network approach to assist on the interpretation of software metrics (MP, AM, LCeS, KCG, HOdA, AP), pp. 1498–1503.
SAC-2015-MalechaGS #automation
Automated software winnowing (GM, AG, NS), pp. 1504–1511.
SAC-2015-KhelladiBBLG #consistency #framework #process #verification
A framework to formally verify conformance of a software process to a software method (DEK, RB, SB, YL, MPG), pp. 1518–1525.
SAC-2015-AlemerienM #metric #named #predict #usability #user interface #visual notation
SLC: a visual cohesion metric to predict the usability of graphical user interfaces (KA, KM), pp. 1526–1533.
SAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SAC-2015-SoaresJMP #open source
Acceptance factors of pull requests in open-source projects (DMS, MLdLJ, LM, AP), pp. 1541–1546.
SAC-2015-CostaCFR #diagrams #modelling #precise #uml
From UML diagrams to simulink models: a precise and verified translation (AC, SAdCC, LF, LR), pp. 1547–1552.
SAC-2015-ZhangYLC #concept #debugging #mining #predict #repository
Predicting severity of bug report by mining bug repository with concept profile (TZ, GY, BL, ATSC), pp. 1553–1558.
SAC-2015-ElyasovPHRVC #equivalence #execution #testing
AB=ᗺA: execution equivalence as a new type of testing oracle (AE, WP, JH, UR, TEJV, NCF), pp. 1559–1566.
SAC-2015-JuniorSPM #developer
Developers assignment for analyzing pull requests (MLdLJ, DMS, AP, LM), pp. 1567–1572.
SAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SAC-2015-ConstantinouS #architecture #evolution #metric #reuse
Architectural stability and evolution measurement for software reuse (EC, IS), pp. 1580–1585.
SAC-2015-DabainMT #design pattern #detection #using
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SAC-2015-MergelSS #mining #string #visual notation
A method to support search string building in systematic literature reviews through visual text mining (GDM, MSS, TSdS), pp. 1594–1601.
SAC-2015-MeftehBB #approach #case study #diagrams #evaluation #feature model #implementation #modelling #uml
Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SAC-2015-SenaCK #exception #product line
An investigation on the evolutionary nature of exception handling violations in software product lines (DS, RC, UK), pp. 1616–1623.
SAC-2015-JoshiSIY #architecture #behaviour #design #embedded #functional #modelling
Mapping functional behavior onto architectural model in a model driven embedded system design (PJ, SKS, JPT, HY), pp. 1624–1630.
SAC-2015-DAvanzoFGS #estimation #functional #metric #mobile
COSMIC functional measurement of mobile applications and code size estimation (LD, FF, CG, PS), pp. 1631–1636.
SAC-2015-VorobyovKS #monitoring #specification
A concise specification language for trace monitoring (KV, PK, PS), pp. 1637–1640.
SAC-2015-MurguzurTS #evaluation #framework #variability #workflow
Dynamic variability support in workflow-based systems: an evaluation of the LateVa framework (AM, ST, GS), pp. 1641–1643.
SAC-2015-XuanLXT #empirical #fault #metric #predict #set #using
Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SAC-2015-FukudaL #library
A library to modularly control asynchronous executions (HF, PL), pp. 1648–1650.
SAC-2015-LeTN #requirements #using #verification
Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SAC-2015-FerreiraFN #impact analysis #object-oriented
Mapping the potential change impact in object-oriented software (MMF, KAMF, HTMN), pp. 1654–1656.
SAC-2015-SantosOA #development #mining #process
Mining software development process variations (RMSS, TCO, FBeA), pp. 1657–1660.
SAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SAC-2015-FerrucciSKS #algorithm #framework #parallel #pipes and filters #search-based
A parallel genetic algorithms framework based on Hadoop MapReduce (FF, PS, MTK, FS), pp. 1664–1667.
SAC-2015-Ahn #architecture #object-oriented #re-engineering #runtime
Reconstruction of runtime software architecture for object-oriented systems (HA), pp. 1668–1669.
SAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring #using
A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SAC-2015-GarciaPMR #process
A software process line for service-oriented applications (CG, MP, AM, SSR), pp. 1680–1687.
SAC-2015-DiazCMR #architecture #model checking #verification #web #web service
Model-checking verification of publish-subscribe architectures in web service contexts (GD, MEC, HM, VVR), pp. 1688–1695.
SAC-2015-NascimentoPM #algorithm #machine learning #metaheuristic
A data quality-aware cloud service based on metaheuristic and machine learning provisioning algorithms (DCN, CESP, DGM), pp. 1696–1703.
SAC-2015-RiccobeneS #adaptation #formal method #modelling #self
Formal modeling self-adaptive service-oriented applications (ER, PS), pp. 1704–1710.
SAC-2015-OliveiraLV #framework #performance #security #web #web service
Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
SAC-2015-VianaTVAGA #architecture #as a service #platform
A service-oriented architecture for billing resources in IaaS cloud platforms (NPV, FT, RV, RMCA, VCG, REA), pp. 1719–1721.
SAC-2015-SunyaevB #empirical #independence #testing
Truth and myth of independent software testing: a controlled human experiment (AS, DB), pp. 1722–1728.
SAC-2015-JakobsW #analysis #data flow #proving #source code
Programs from proofs of predicated dataflow analyses (MCJ, HW), pp. 1729–1736.
SAC-2015-BrideJM #approximate #generative #testing
Tri-modal under-approximation of event systems for test generation (HB, JJ, PAM), pp. 1737–1744.
SAC-2015-AlbertiM #array
Polyhedra to the rescue of array interpolants (FA, DM), pp. 1745–1750.
SAC-2015-BourdilBDV #petri net #symmetry
Symmetry reduced state classes for time petri nets (PAB, BB, SDZ, FV), pp. 1751–1758.
SAC-2015-SanchezJ #interactive #modelling #music #testing
Model based testing of an interactive music system (CPS, FJ), pp. 1759–1764.
SAC-2015-JakobssonKS #c #hybrid #memory management #monitoring #performance
Fast as a shadow, expressive as a tree: hybrid memory monitoring for C (AJ, NK, JS), pp. 1765–1772.
SAC-2015-BekkoucheCR #approach #constraints #fault #locality #named
LocFaults: a new flow-driven and constraint-based error localization approach (MB, HC, MR), pp. 1773–1780.
SAC-2015-Gregorio-Rodriguez #consistency #simulation
Extending mCRL2 with ready simulation and iocos input-output conformance simulation (CGR, LL, RMT), pp. 1781–1788.
SAC-2015-CharafeddineEFJ #component #runtime
Runtime enforcement for component-based systems (HC, KEH, YF, MJ), pp. 1789–1796.
SAC-2015-CalvagnaFT #case study #combinator #consistency #effectiveness #random #testing
Random versus combinatorial effectiveness in software conformance testing: a case study (AC, AF, ET), pp. 1797–1802.
SAC-2015-Homm0G #concurrent #markov #modelling #statistics #testing
Concurrent streams in Markov chain usage models for statistical testing of complex systems (DH, JE, RG), pp. 1803–1807.
SAC-2015-DihegoSO #component
Constructive extensibility of trustworthy component-based systems (JD, AS, MVMO), pp. 1808–1814.
SAC-2015-ByunC #automation #constraints #operating system #safety #testing #using
Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SAC-2015-Buday #formal method
Formalising the SECD machine with nominal Isabelle (GB), pp. 1823–1824.
SAC-2015-Fongen #tuple
Data-centric authorization and integrity control in a Linda tuplespace (AF), pp. 1827–1833.
SAC-2015-BadouelHKM #approach #collaboration #distributed
A grammatical approach to data-centric case management in a distributed collaborative environment (EB, LH, GEK, CM), pp. 1834–1839.
SAC-2015-AlrahmanNLTV #calculus #communication
A calculus for attribute-based communication (YAA, RDN, ML, FT, RV), pp. 1840–1845.
SAC-2015-PianiniVB #named #programming
Protelis: practical aggregate programming (DP, MV, JB), pp. 1846–1853.
SAC-2015-SousaS #domain-specific language #simulation #tool support
A domain specific language for spatial simulation scenarios (DSL3S): introduction and tool support (LdS, ARdS), pp. 1854–1856.
SAC-2015-AbeywickramaSL #adaptation #monitoring #runtime #visualisation
Monitoring and visualizing adaptation of autonomic systems at runtime (DBA, NBS, ML), pp. 1857–1860.
SAC-2015-AmadiniGM #named
SUNNY-CP: a sequential CP portfolio solver (RA, MG, JM), pp. 1861–1867.
SAC-2015-BolockA #automation #constraints #generative #towards #using
Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SAC-2015-SioutisSC #composition #graph #on the #reasoning
On the use and effect of graph decomposition in qualitative spatial and temporal reasoning (MS, YS, JFC), pp. 1874–1879.
SAC-2015-TodaT #performance #satisfiability
BDD construction for all solutions SAT and efficient caching mechanism (TT, KT), pp. 1880–1886.
SAC-2015-ShterionovJ #component #pipes and filters #probability
Crucial components in probabilistic inference pipelines (DSS, GJ), pp. 1887–1889.
SAC-2015-ZiccardiSV #operating system
A time-composable operating system for the Patmos processor (MZ, MS, TV), pp. 1892–1897.
SAC-2015-Puffitsch #analysis #bound #branch #predict
Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
SAC-2015-YangCHCLK #performance
Reliability-aware striping with minimized performance overheads for flash-based storage devices (MCY, YMC, PCH, YHC, LJL, TWK), pp. 1906–1912.
SAC-2015-KapoorDC #capacity #energy #performance #reduction
Static energy reduction by performance linked cache capacity management in tiled CMPs (HKK, SD, SC), pp. 1913–1918.
SAC-2015-DasK #using
Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SAC-2015-FonsecaNRP #execution #parallel #realtime
A multi-DAG model for real-time parallel applications with conditional execution (JCF, VN, GR, LMP), pp. 1925–1932.
SAC-2015-DieumegardGKTT #compilation #contract
Compilation of synchronous observers as code contracts (AD, PLG, TK, AT, XT), pp. 1933–1939.
SAC-2015-CremonaMN #composition #named #representation #simulation
TRES: a modular representation of schedulers, tasks, and messages to control simulations in simulink (FC, MM, MDN), pp. 1940–1947.
SAC-2015-Morelli #automation #generative #modelling
Automated generation of robotics applications from simulink and SysML models (MM), pp. 1948–1954.
SAC-2015-FernandezAQVFZC #multi #off the shelf
Introduction to partial time composability for COTS multicores (GF, JA, EQ, TV, LF, MZ, FJC), pp. 1955–1956.
SAC-2015-Jung0B #analysis #embedded #encoding #identification #power management
Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SAC-2015-Khenfri #approach #architecture #optimisation #synthesis
A holistic optimization approach for the synthesis of AUTOSAR E/E architecture (FK), pp. 1960–1961.
SAC-2015-SakuraiM #debugging #object-oriented #source code
The omission finder for debugging what-should-have-happened bugs in object-oriented programs (KS, HM), pp. 1962–1969.
SAC-2015-PapeBH #adaptation #data type #execution #optimisation #performance
Adaptive just-in-time value class optimization: transparent data structure inlining for fast execution (TP, CFB, RH), pp. 1970–1977.
SAC-2015-PapouliasDDF #towards
Reifying the reflectogram: towards explicit control for implicit reflection (NP, MD, SD, LF), pp. 1978–1985.
SAC-2015-OmarWA #composition #metaprogramming #syntax
Composable and hygienic typed syntax macros (CO, CW, JA), pp. 1986–1991.
SAC-2015-BurtonS #composition #mixin #safety
The safety of dynamic mixin composition (EB, ES), pp. 1992–1999.
SAC-2015-LeeKKE #algorithm #architecture #hybrid #memory management #named
M-CLOCK: migration-optimized page replacement algorithm for hybrid DRAM and PCM memory architecture (ML, DK, JK, YIE), pp. 2001–2006.
SAC-2015-JeremicPM #array #performance #random
Improving random write performance in heterogeneous erasure-coded drive arrays by offloading code block requests (NJ, HP, GM), pp. 2007–2014.
SAC-2015-BoitoKND #performance #profiling #towards
Towards fast profiling of storage devices regarding access sequentiality (FZB, RK, POAN, YD), pp. 2015–2020.
SAC-2015-Oikawa #adaptation #memory management
Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
SAC-2015-SaezPCCP #manycore #named #symmetry
ACFS: a completely fair scheduler for asymmetric single-isa multicore systems (JCS, AP, FC, DC, MPM), pp. 2027–2032.
SAC-2015-BusseSDNH #data access #memory management #virtual machine
Partial coscheduling of virtual machines based on memory access patterns (AB, JHS, MD, POAN, HUH), pp. 2033–2038.
SAC-2015-KimK #scalability #using
Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SAC-2015-LeeOL #enterprise #problem
SSD caching to overcome small write problem of disk-based RAID in enterprise environments (EL, YO, DL), pp. 2047–2053.
SAC-2015-FerreiraMME #analysis #comparison #kernel #memory management
An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
SAC-2015-JoCKBO #algorithm #approach #collaboration #cpu #data-driven #on the
On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach (YYJ, SC, SWK, DHB, HO), pp. 2060–2065.
SAC-2015-InacioDBNM #file system #operating system #parallel #parametricity #performance
Performance impact of operating systems’ caching parameters on parallel file systems (ECI, MARD, FZB, POAN, DDJdM), pp. 2066–2068.
SAC-2015-LeeRH #file system #memory management #performance
Performance implications of cache flushes for non-volatile memory file systems (KL, SR, HH), pp. 2069–2071.
SAC-2015-MinHJCH #distributed #performance #process #scalability
An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
SAC-2015-LeeP #reduction
Search space reduction for electric vehicle-based tour schedules (JL, GLP), pp. 2075–2076.
SAC-2015-TakanoI #correctness #functional #lazy evaluation #semantics
Thunk recycling for lazy functional languages: operational semantics and correctness (YT, HI), pp. 2079–2086.
SAC-2015-CordobaL #design #effectiveness #java #modelling
A modelling language for the effective design of Java annotations (IC, JdL), pp. 2087–2092.
SAC-2015-DuarteBPC #composition #memory management #transaction
Composable memory transactions with eager version management (RMD, ARDB, MLP, GGHC), pp. 2093–2098.
SAC-2015-DabrowskiLP #compilation #concurrent #thread
Nested atomic sections with thread escape: compilation (FD, FL, TP), pp. 2099–2106.
SAC-2015-MilewiczVTQP #c #runtime #source code
Runtime checking C programs (RM, RV, JT, DQ, PP), pp. 2107–2114.
SAC-2015-BacikovaPCN #domain-specific language #user interface
Bootstrapping DSLs from user interfaces (MB, JP, SC, MN), pp. 2115–2118.
SAC-2015-LopezR #analysis #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SAC-2015-DymchenkoM #eclipse #problem #prolog
Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP system (SD, MM), pp. 2122–2124.
SAC-2015-MinV #anti #design #evaluation #implementation #novel
Design, implementation and evaluation of a novel anti-virus parasitic malware (BM, VV), pp. 2127–2133.
SAC-2015-Kerschbaum #generative #outsourcing
Oblivious outsourcing of garbled circuit generation (FK), pp. 2134–2140.
SAC-2015-DecatBLJ #as a service #data access #middleware #multitenancy #named #performance
Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
SAC-2015-BraunPPJ #adaptation #named #web
LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
SAC-2015-WangYCDGW #documentation #named #physics #security
Cryptopaper: digital information security for physical documents (PW, XY, SC, PD, SG, TW), pp. 2157–2164.
SAC-2015-ThionLB #data access #data flow #relational
Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
SAC-2015-RyckDPJ #named
SecSess: keeping your session tucked away in your browser (PDR, LD, FP, WJ), pp. 2171–2176.
SAC-2015-RaniseTV #analysis #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SAC-2015-PreuveneersJ #authentication #named
SmartAuth: dynamic context fingerprinting for continuous user authentication (DP, WJ), pp. 2185–2191.
SAC-2015-XiongN #estimation #low cost #power management
Cost-efficient and attack-resilient approaches for state estimation in power grids (KX, PN), pp. 2192–2197.
SAC-2015-JagroepWJFV #energy #profiling
Profiling energy profilers (EJ, JMEMvdW, SJ, MAF, JV), pp. 2198–2203.
SAC-2015-TudorAP #framework
Harnessing the unknown in advanced metering infrastructure traffic (VT, MA, MP), pp. 2204–2211.
SAC-2015-LopesFBM #communication #named #network #smarttech
SMARTFlow: a solution for autonomic management and control of communication networks for smart grids (YL, NCF, CAMB, DCMS), pp. 2212–2217.
SAC-2015-BarbosaBA #monitoring
Defending against load monitoring in smart metering data through noise addition (PB, AB, HA), pp. 2218–2224.
SAC-2015-XuYYHHK #multi #predict #using
Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
SAC-2015-RrushiFNHCP #protocol #specification
By-design vulnerabilities in the ANSI C12.22 protocol specification (JLR, HF, RN, CH, KC, AP), pp. 2231–2236.
SAC-2015-BergentiCG #framework #game studies #mobile #platform #scalability #social
A scalable platform for mobile social gaming (FB, GC, DG), pp. 2239–2244.
SAC-2015-ChengCCHT #deployment #smarttech
The deployment of shared data objects among handheld and wearable devices (SWC, CWC, YHC, PCH, CHT), pp. 2245–2251.
SAC-2015-AminikhanghahiS #image #robust
Study of wireless mammography image transmission impacts on robust cyber-aided diagnosis systems (SA, SYS, WW, SIJ, SHS, CP), pp. 2252–2256.
SAC-2015-DuanZHX #analysis #delivery #framework #network #performance #platform
Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
SAC-2015-Lopez-CasadoPCM #named #network #novel
GlSch: a novel scheduler for a heterogeneous telescope network (MCLC, CJPdP, JCC, VFM, GOL, AJCT, JS, EM, JM, SK, FMS), pp. 2263–2270.
SAC-2015-Moawad0FKT #adaptation #privacy #ubiquitous
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
SAC-2015-ShahzadJKKKH #execution #in the cloud #mobile
Application-level task execution issues in mobile cloud computing (AS, HJ, PK, HK, BKK, JH), pp. 2285–2287.
SAC-2015-PaakkonenP
The implications of disk-based RAID and virtualization for write-intensive services (PP, DP), pp. 2288–2291.
SAC-2015-AbdiH #algorithm #distributed
An algorithm for distributed certificate chain discovery in open environments (SA, JH), pp. 2292–2298.
SAC-2015-VecchiatoVM #android #assessment #security
A security configuration assessment for android devices (DV, MV, EM), pp. 2299–2304.
SAC-2015-SharmaMDH #trust
Bi-directional trust index computation in resource marketplace (AS, TM, PD, VGH), pp. 2305–2311.
SAC-2015-GkorouPE #distributed #network #trust
Trust-based collection of information in distributed reputation networks (DG, JAP, DHJE), pp. 2312–2319.
SAC-2015-KokoschkaPS
A reputation system supporting unlinkable, yet authorized expert ratings (AK, RP, CS), pp. 2320–2327.
SAC-2015-SantiagoPH #approach #detection #modelling
A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.