Roger L. Wainwright, Juan Manuel Corchado, Alessio Bechini, Jiman Hong
Proceedings of the 30th Annual ACM Symposium on Applied Computing
SAC, 2015.
@proceedings{SAC-2015, acmid = "2695664", address = "Salamanca, Spain", editor = "Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong", isbn = "978-1-4503-3196-8", publisher = "{ACM}", title = "{Proceedings of the 30th Annual ACM Symposium on Applied Computing}", year = 2015, }
Contents (367 items)
- SAC-2015-ValenteR #array
- Transcript-based reannotation for microarray probesets (EV, MR), pp. 3–9.
- SAC-2015-ChoobdarRS #network
- Discovering weighted motifs in gene co-expression networks (SC, PMPR, FMAS), pp. 10–17.
- SAC-2015-FahnrichSP #database #identification #in memory #search-based
- Facing the genome data deluge: efficiently identifying genetic variants with in-memory database technology (CF, MPS, HP), pp. 18–25.
- SAC-2015-MottaMSMPC #3d #image #re-engineering
- All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
- SAC-2015-SantosPFGMMC #framework #named #platform
- MyHealth: a cross-domain platform for healthcare (MYS, CGP, BF, LG, GM, AJCM, JAC), pp. 40–46.
- SAC-2015-JeongYAYP #algorithm #interactive #network #search-based #using
- Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
- SAC-2015-HublerRFS #data flow #named #using
- P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
- SAC-2015-NascimentoBJ #approach #geometry #recognition
- A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
- SAC-2015-NetoM #3d #artificial reality #recognition
- 3DLBP and HAOG fusion for face recognition utilizing Kinect as a 3D scanner (JBCN, ANM), pp. 66–73.
- SAC-2015-PedrosaTB
- Shape description based on bag of salience points (GVP, AJMT, CAZB), pp. 74–79.
- SAC-2015-GoldnerVSG #2d #algorithm
- A shortest path algorithm for 2D seismic horizon tracking (ELG, CNV, PMS, MG), pp. 80–85.
- SAC-2015-JavedSBJ #feature model #robust
- OR-PCA with dynamic feature selection for robust background subtraction (SJ, AS, TB, SKJ), pp. 86–91.
- SAC-2015-PedrosaT #approach #encoding #visual notation #word
- Compact and discriminative approach for encoding spatial-relationship of visual words (GVP, AJMT), pp. 92–95.
- SAC-2015-MartinCBGP #algorithm #gpu
- OpenACC-based GPU acceleration of an optical flow algorithm (NM, JC, GB, CG, MP), pp. 96–98.
- SAC-2015-BlombergBR #evolution #robust
- Evolving regression trees robust to missing data (LCB, RCB, DDR), pp. 102–109.
- SAC-2015-BasgaluppBP #algorithm #evolution #induction #multi
- Evolving decision-tree induction algorithms with a multi-objective hyper-heuristic (MPB, RCB, VP), pp. 110–117.
- SAC-2015-SilvaMR #algorithm #approach #problem #using
- An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
- SAC-2015-WangCR #multi #optimisation
- Dynamic optimization of multi-layered reinsurance treaties (HW, OACC, ARC), pp. 125–132.
- SAC-2015-CinalliMPG #multi #optimisation
- Collective preferences in evolutionary multi-objective optimization: techniques and potential contributions of collective intelligence (DC, LM, NSP, ACBG), pp. 133–138.
- SAC-2015-Jo #algorithm #image #interactive #search-based #using
- Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
- SAC-2015-UshawDEM #benchmark #game studies #metric
- Benchmarking motion sensing devices for rehabilitative gaming (GU, RD, JAE, GM), pp. 143–148.
- SAC-2015-PalviainenKKLMN #collaboration #design #developer #experience #framework
- Design framework enhancing developer experience in collaborative coding environment (JP, TK, JK, JL, TM, AN), pp. 149–156.
- SAC-2015-MedinaCP #evaluation #web
- Evaluation of web accessibility on the maps domain (JLM, MIC, DMBP), pp. 157–162.
- SAC-2015-BuenoAFASC
- Selfie cafe: socialization in public spaces (AOB, JCA, VF, JCA, CS, DC), pp. 163–168.
- SAC-2015-GouthamLY #authentication #protocol #smarttech #using
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
- SAC-2015-AlmeidaCS0 #smell #towards #usability
- Towards a catalog of usability smells (DA, JCC, JS, JCS), pp. 175–181.
- SAC-2015-AbibA #design #guidelines #process
- Integrating contexts in healthcare: guidelines to help the designers at design process (JCA, JCA), pp. 182–184.
- SAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social #using
- Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
- SAC-2015-OmatuYI #classification #learning #smell
- Smell classification of wines by the learning vector quantization method (SO, MY, YI), pp. 195–200.
- SAC-2015-PiMMG #analysis #health #ontology #security
- Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
- SAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using
- Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
- SAC-2015-PedroLPVI #case study #gamification #learning #women
- Does gamification work for boys and girls?: An exploratory study with a virtual learning environment (LZP, AMZL, BGP, JV, SI), pp. 214–219.
- SAC-2015-Usener #assessment #automation #data type #education #named
- EASy-DSBuilder: automated assessment of tree data structures in computer science teaching (CAU), pp. 220–226.
- SAC-2015-MaltaPSBF #analysis #case study #distance #information management #overview
- A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
- SAC-2015-PaivaBSIJ #behaviour #learning #recommendation #student
- Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environment (ROAP, IIB, APdS, SI, PAJ), pp. 233–238.
- SAC-2015-RodriguesMSS #3d #education #game studies #interactive
- Beyond fun: an interactive and educational 3D traffic rules game controlled by non-traditional devices (MAFR, DVdM, YRS, YRS), pp. 239–246.
- SAC-2015-ManhaesCZ #automation #performance #predict #source code #student #towards
- Towards automatic prediction of student performance in STEM undergraduate degree programs (LMBM, SMSdC, GZ), pp. 247–253.
- SAC-2015-LabibPCG #approach #development #learning #product line #reuse
- Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
- SAC-2015-Messaoud #collaboration #named
- Dynamic: a collaborative filtering strategy for assigning examination’s rooms to supervisors (MBM), pp. 264–266.
- SAC-2015-BogoniPS #artificial reality #evaluation
- Evaluation of a haptic virtual reality simulator for endodontics training (TNB, MSP, RS), pp. 267–269.
- SAC-2015-BarrosCMP #education #learning #repository #reuse #using
- Integrating educational repositories to improve the reuse of learning objects (HB, EC, JM, RP), pp. 270–272.
- SAC-2015-Pesare #learning #social
- Smart learning environments for social learning (EP), pp. 273–274.
- SAC-2015-TambeN #behaviour #game studies #modelling #resource management #robust #security
- Robust resource allocation in security games and ensemble modeling of adversary behavior (AT, TN), pp. 277–282.
- SAC-2015-MoralesNSA #named #requirements #specification
- TRiStar: an i* extension for teleo-reactive systems requirements specifications (JMM, EN, PS, DA), pp. 283–288.
- SAC-2015-MoreiraJR #analysis #reduction #similarity #visual notation
- Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
- SAC-2015-DiasSACNL
- Improving the kicking accuracy in a soccer robot (RD, JMS, JLA, BC, AJRN, NL), pp. 295–300.
- SAC-2015-MainiS #communication #distributed #multi #using
- Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
- SAC-2015-StegagnoMB #distributed #identification
- Distributed target identification in robotic swarms (PS, CM, HHB), pp. 307–313.
- SAC-2015-LasagniR #3d
- Force model of a robotic particle chain for 3d displays (ML, KR), pp. 314–319.
- SAC-2015-FonooniH #behaviour #on the #visual notation
- On the similarities between control based and behavior based visual servoing (BF, TH), pp. 320–326.
- SAC-2015-LujakF #named #scheduling
- ORCAS: optimized robots configuration and scheduling system (ML, AF), pp. 327–330.
- SAC-2015-MarquesRPSM #coordination #named #network
- NVL: a coordination language for unmanned vehicle networks (ERBM, MR, JP, JBS, FM), pp. 331–334.
- SAC-2015-MinsamS #game studies
- Sustaining mutual cooperation in iterated prisoner’s dilemma game (KM, KYS), pp. 335–337.
- SAC-2015-IsraelHS #analysis #multi #semantics #summary
- Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
- SAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability #using
- pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
- SAC-2015-HogenboomNJFV #distributed #optimisation #query #rdf
- RDF chain query optimization in a distributed environment (AH, EN, MJ, FF, DV), pp. 353–359.
- SAC-2015-WanderleyP #folksonomy #learning
- Learning folksonomies from task-oriented dialogues (GMPW, ECP), pp. 360–367.
- SAC-2015-CorcoglionitiRM #rdf #sorting #streaming #using
- Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
- SAC-2015-RodriguesAFSB #approach #ontology #simulation
- An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
- SAC-2015-Dragoni #multi
- Exploiting multilinguality for creating mappings between thesauri (MD), pp. 382–387.
- SAC-2015-RuyFBG #ontology #pattern matching #process #standard #towards
- Towards an ontology pattern language for harmonizing software process related ISO standards (FBR, RdAF, MPB, GG), pp. 388–395.
- SAC-2015-GayathriK #rdf #rule-based
- Horn-rule based compression technique for RDF data (VG, PSK), pp. 396–401.
- SAC-2015-JuniorSM #approach #semantics
- An approach for building lexical-semantic resources based on heterogeneous information sources (JGdAJ, US, LBM), pp. 402–408.
- SAC-2015-RegoMP #approach #detection #folksonomy #learning
- A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
- SAC-2015-ChengKWT #scalability #semantics #throughput #web
- High throughput indexing for large-scale semantic web data (LC, SK, TEW, GT), pp. 416–422.
- SAC-2015-FauconnierKR #approach #machine learning #recognition #taxonomy
- A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures (JPF, MK, BR), pp. 423–425.
- SAC-2015-CamaraGS0 #adaptation #architecture #game studies #model checking #probability #self
- Optimal planning for architecture-based self-adaptation via model checking of stochastic games (JC, DG, BRS, AP), pp. 428–435.
- SAC-2015-Grossl #modelling #network
- Modeling dependable systems with continuous time Bayesian networks (MG), pp. 436–441.
- SAC-2015-KundeM #middleware #resource management
- Workload characterization model for optimal resource allocation in cloud middleware (SK, TM), pp. 442–447.
- SAC-2015-Rubio-MonteroPG #adaptation #evaluation #framework #monte carlo
- Evaluation of an adaptive framework for resilient Monte Carlo executions (AJRM, MARP, RMG), pp. 448–455.
- SAC-2015-IvakiLA #protocol #reliability #taxonomy
- A taxonomy of reliable request-response protocols (NI, NL, FA), pp. 456–463.
- SAC-2015-MonteiroL #clustering #power management #scalability #web
- Scalable model for dynamic configuration and power management in virtualized heterogeneous web clusters (AFM, OL), pp. 464–467.
- SAC-2015-PenhaW #design pattern
- Parameterization of fail-operational architectural patterns (DOdP, GW), pp. 471–473.
- SAC-2015-AhrndtBFA #adaptation #predict
- Predictability in human-agent cooperation: adapting to humans’ personalities (SA, BB, JF, SA), pp. 474–479.
- SAC-2015-DiasGKT #3d #adaptation #architecture #clustering #collaboration
- A dynamic-adaptive architecture for 3d collaborative virtual environments based on graphic clusters (DRCD, MdPG, TWK, LCT), pp. 480–487.
- SAC-2015-AmaralTMH #as a service #framework #internet #middleware #platform
- Cooperative middleware platform as a service for internet of things applications (LAA, RTT, EdM, FH), pp. 488–493.
- SAC-2015-SugiyamaS #learning #multi
- Meta-strategy for cooperative tasks with learning of environments in multi-agent continuous tasks (AS, TS), pp. 494–500.
- SAC-2015-RighiVRRCFA #parallel #source code
- Rescheduling and checkpointing as strategies to run synchronous parallel programs on P2P desktop grids (RdRR, AV, VFR, GR, CAdC, KF, AMA), pp. 501–504.
- SAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse #using
- Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
- SAC-2015-GuetmiMIB #collaboration #editing #in the cloud #mobile
- Mobile collaboration: a collaborative editing service in the cloud (NG, MDM, AI, LB), pp. 509–512.
- SAC-2015-HamataniUH #smarttech #using
- Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
- SAC-2015-LiZL #mobile #network #personalisation #social
- Integrating mobile sensing and social network for personalized health-care application (HL, QZ, KL), pp. 527–534.
- SAC-2015-VieiraHH #mobile #testing
- A context simulator as testing support for mobile apps (VV, KH, MH), pp. 535–541.
- SAC-2015-SampaioEF #coordination
- Determining the location of buildings given a single picture, environment maps and inaccurate GPS coordinates (JCS, RSE, LAFF), pp. 542–547.
- SAC-2015-AttiaTHKTC #detection
- On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
- SAC-2015-NaqviMRPHB #artificial reality #deployment #mobile
- To cloud or not to cloud: a context-aware deployment perspective of augmented reality mobile applications (NZN, KM, AR, DP, DH, YB), pp. 555–562.
- SAC-2015-AlyI #named #process #realtime #recognition
- ubiMonitor: intelligent fusion of body-worn sensors for real-time human activity recognition (HA, MAI), pp. 563–568.
- SAC-2015-SilvaMFM #evaluation #metric #mobile
- A scheduler for mobile cloud based on weighted metrics and dynamic context evaluation (FAS, PRMM, GF, RRMM), pp. 569–576.
- SAC-2015-CostaRRTS #multi #named #platform
- MpOS: a multiplatform offloading system (PBC, PALR, LSR, FAMT, JNdS), pp. 577–584.
- SAC-2015-BerardiEF0 #classification #mobile #multi
- Multi-store metadata-based supervised mobile app classification (GB, AE, TF, FS), pp. 585–588.
- SAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using
- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
- SAC-2015-MukherjeeKCDCM #as a service #design #framework #performance #platform #scalability
- Performance characterization and scalable design of sensing-as-a-service platform (TM, AK, DC, KD, AC, AM), pp. 592–595.
- SAC-2015-DuarteBGCT #behaviour #generative #towards
- Towards context-aware behaviour generation (PAdSD, FMB, FAdAG, WVdC, FAMT), pp. 596–598.
- SAC-2015-KatsalisSPKT #network
- Content placement in heterogeneous end-to-end virtual networks (KK, VS, TP, TK, LT), pp. 602–608.
- SAC-2015-CarlucciCM
- HTTP over UDP: an experimental investigation of QUIC (GC, LDC, SM), pp. 609–614.
- SAC-2015-LagoMM #estimation #network #power management
- High speed network impacts and power consumption estimation for cloud data centers (DGdL, ERMM, DM), pp. 615–620.
- SAC-2015-EllouzeRB #energy
- Energy harvesting based protection of border surveillance systems (NE, SR, NB), pp. 621–626.
- SAC-2015-GomesB #integration #mobile #network
- Feasibility of information-centric networking integration into LTE mobile networks (AG, TB), pp. 627–633.
- SAC-2015-QueirozH #capacity
- Translating full duplexity into capacity gains for the high-priority traffic classes of IEEE 802.11 (SQ, RH), pp. 634–639.
- SAC-2015-ArbizaBSGT #internet #middleware #network #refactoring
- Refactoring internet of things middleware through software-defined network (LMRA, LMB, CRPdS, LZG, LMRT), pp. 640–645.
- SAC-2015-MatlCD #effectiveness #network
- Effective manycast messaging for Kademlia network (LM, TC, MJD), pp. 646–652.
- SAC-2015-IqbalAB #design #framework #network #scheduling
- Designing network servers within a hierarchical scheduling framework (ZI, LA, MB), pp. 653–658.
- SAC-2015-ChaudhuriMG #network #predict #using
- QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
- SAC-2015-FontineleSSNM #network #physics #problem
- A solution to the MCSP problem considering physical layer degradations in transparent optical networks (AF, IS, ACBS, JMN, FM), pp. 662–664.
- SAC-2015-TroisMBF #network
- From software defined network to network defined for software (CT, MM, LCEDB, MDDF), pp. 665–668.
- SAC-2015-CanoA #feedback #multi #scalability #streaming
- Feedback management for scaling clients in streaming multicast (JC, LA), pp. 669–671.
- SAC-2015-RiediBP #algorithm #performance #scalability
- Channel and power allocation algorithm to optimize the performance of large WLANs (MR, GGB, MEP), pp. 673–679.
- SAC-2015-ErnstKR #evaluation #network #performance
- Performance evaluation of heterogeneous wireless networks considering competing objectives and viewpoints (JBE, SCK, JJPCR), pp. 680–687.
- SAC-2015-HuangSZSXD #privacy #pseudo
- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
- SAC-2015-BoukAK #challenge #network #overview #research
- Vehicular content centric network (VCCN): a survey and research challenges (SHB, SHA, DK), pp. 695–700.
- SAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
- Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
- SAC-2015-BohdanowiczFFMN #locality
- RSSI-based localization of a wireless sensor node with a flying robot (FB, HF, RF, DM, FN, IS), pp. 708–715.
- SAC-2015-JamhourPPSB #network
- Interference aware channel assignment for structured wireless sensor networks (EJ, MEP, MCP, RDS, GGdOB), pp. 716–719.
- SAC-2015-Khan #multi #network
- Multi-criteria based vertical handover decision in heterogeneous wireless network (MK), pp. 720–721.
- SAC-2015-RychnovskyH #generative #query #xml #xpath
- Generating XML data for XPath queries (DR, IH), pp. 724–731.
- SAC-2015-CapelleMHFV #hybrid #recommendation #semantics
- Bing-SF-IDF+: a hybrid semantics-driven news recommender (MC, MM, FH, FF, DV), pp. 732–739.
- SAC-2015-HsiehNKC #approximate #performance #query #recommendation
- Efficient approximate thompson sampling for search query recommendation (CCH, JN, TK, JC), pp. 740–746.
- SAC-2015-KassingOBH #community #social
- Locating domain-specific contents and experts on social bookmarking communities (SK, JO, AB, GJH), pp. 747–752.
- SAC-2015-SanojaG #evaluation #segmentation #web
- Web page segmentation evaluation (AS, SG), pp. 753–760.
- SAC-2015-BezuBRVVF #component #detection #multi #similarity #web
- Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
- SAC-2015-JuniorDOFB #performance #web
- Handling flash-crowd events to improve the performance of web applications (UdPJ, LMdAD, DdO, YF, VCB), pp. 769–774.
- SAC-2015-LeottaSRT #automation #generative #testing #visual notation #web
- Automated generation of visual web tests from DOM-based web tests (ML, AS, FR, PT), pp. 775–782.
- SAC-2015-JesusVB #functional #testing #web
- Leveraging task-based data to support functional testing of web applications (FRdJ, LGdV, LABJ), pp. 783–790.
- SAC-2015-ShahriarH #approach #assessment #metric #risk management #security #web
- Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
- SAC-2015-TsengHT #distributed #framework #javascript #migration #mobile #web
- Migratom.js: a JavaScript migration framework for distributed web computing and mobile devices (TLT, SHH, CHT), pp. 798–801.
- SAC-2015-KambonaBM #middleware #named #realtime #scalability #web
- Serena: scalable middleware for real-time web applications (KK, EGB, WDM), pp. 802–805.
- SAC-2015-MiyashitaITK #distributed #graph #named #representation
- Catalogue: graph representation of file relations for a globally distributed environment (YM, HI, FT, KK), pp. 806–809.
- SAC-2015-TriasCSM #migration #named #reverse engineering #tool support #web
- RE-CMS: a reverse engineering toolkit for the migration to CMS-based web applications (FT, VdC, MLS, EM), pp. 810–812.
- SAC-2015-HanHQY #clustering
- Locality-preserving L1-graph and its application in clustering (SH, HH, HQ, DY), pp. 813–818.
- SAC-2015-DermoucheKVL #modelling #sentiment #topic
- A joint model for topic-sentiment modeling from text (MD, LK, JV, SL), pp. 819–824.
- SAC-2015-GonzalezRP #classification #image
- Computationally-efficient classification of HEp-2 cell patterns in IIF images (LFPG, DDAR, MSP), pp. 825–830.
- SAC-2015-SilvaBAR #clustering #multi #prototype #using
- Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
- SAC-2015-CharuvakaR #approximate #classification #coordination #scalability
- Approximate block coordinate descent for large scale hierarchical classification (AC, HR), pp. 837–844.
- SAC-2015-IqbalKK #analysis #sentiment
- Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
- SAC-2015-BouaskerY #anti #constraints #correlation #mining
- Key correlation mining by simultaneous monotone and anti-monotone constraints checking (SB, SBY), pp. 851–856.
- SAC-2015-Fournier-VigerZ #mining #named #performance
- FOSHU: faster on-shelf high utility itemset mining — with or without negative unit profit (PFV, SZ), pp. 857–864.
- SAC-2015-Brefeld #learning #multi
- Multi-view learning with dependent views (UB), pp. 865–870.
- SAC-2015-FrankM0
- Alternating model trees (EF, MM, SK), pp. 871–878.
- SAC-2015-RodriguesJD #recommendation #using
- Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
- SAC-2015-BurkhardtK #classification #multi #on the
- On the spectrum between binary relevance and classifier chains in multi-label classification (SB, SK), pp. 885–892.
- SAC-2015-HendersonGE #clustering #empirical #named #parametricity #performance #probability
- EP-MEANS: an efficient nonparametric clustering of empirical probability distributions (KH, BG, TER), pp. 893–900.
- SAC-2015-OkkaliogluKP #on the
- On the discovery of fake binary ratings (MO, MK, HP), pp. 901–907.
- SAC-2015-BechetCCC #constraints #mining #multi #sequence
- Sequence mining under multiple constraints (NB, PC, TC, BC), pp. 908–914.
- SAC-2015-GuedesBOX #clustering #graph #multi
- Exploring multiple clusterings in attributed graphs (GPG, EB, ESO, GX), pp. 915–918.
- SAC-2015-KimHC #clustering #documentation #representation #semantics
- Semantically enriching text representation model for document clustering (HjK, KjH, JyC), pp. 922–925.
- SAC-2015-Zheng #algorithm #recommendation
- Improve general contextual slim recommendation algorithms by factorizing contexts (YZ), pp. 929–930.
- SAC-2015-Rekha #big data #detection #performance #using
- A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
- SAC-2015-BarddalGE #algorithm #clustering #data type #named #social
- SNCStream: a social network-based data stream clustering algorithm (JPB, HMG, FE), pp. 935–940.
- SAC-2015-GomesBE #classification #data type #learning
- Pairwise combination of classifiers for ensemble learning on data streams (HMG, JPB, FE), pp. 941–946.
- SAC-2015-MatuszykVSJG #incremental #matrix #recommendation
- Forgetting methods for incremental matrix factorization in recommender systems (PM, JV, MS, AMJ, JG), pp. 947–953.
- SAC-2015-ReadPB #data type #learning
- Deep learning in partially-labeled data streams (JR, FPC, AB), pp. 954–959.
- SAC-2015-SarmentoCG #evolution #scalability #visualisation
- Visualization of evolving large scale ego-networks (RS, MC, JG), pp. 960–962.
- SAC-2015-VinagreJG #collaboration #feedback
- Collaborative filtering with recency-based negative feedback (JV, AMJ, JG), pp. 963–965.
- SAC-2015-SidneyMRH #performance #predict #set #similarity
- Performance prediction for set similarity joins (CFS, DSM, LAR, TH), pp. 967–972.
- SAC-2015-KaplanisKSMT
- HB+tree: use hadoop and HBase even your data isn’t that big (AK, MK, SS, CM, GT), pp. 973–980.
- SAC-2015-MestrePN #adaptation #pipes and filters
- Adaptive sorted neighborhood blocking for entity matching with MapReduce (DGM, CESP, DCN), pp. 981–987.
- SAC-2015-EvangelistaFBA #named #symmetry
- Bt-Join: a join operator for asymmetric storage device (NLE, JdAMF, AB, NA), pp. 988–993.
- SAC-2015-SantosOCFTT #named #similarity
- Combine-and-conquer: improving the diversity in similarity search through influence sampling (LFDS, WDO, LOC, MRPF, AJMT, CTJ), pp. 994–999.
- SAC-2015-LopesT #framework #performance
- A framework for investigating the performance of sum aggregations over encrypted data warehouses (CCL, VCT), pp. 1000–1007.
- SAC-2015-AissiGSS #evaluation #framework #personalisation #query #recommendation
- Personalized recommendation of SOLAP queries: theoretical framework and experimental evaluation (SA, MSG, TS, LBS), pp. 1008–1014.
- SAC-2015-LiuI #clustering #framework #optimisation #parallel #using
- An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
- SAC-2015-RafailidisM #image #parallel #similarity
- Parallel similarity search based on the dimensions value cardinalities of image descriptor vectors (DR, YM), pp. 1023–1030.
- SAC-2015-SeifertSG #personalisation #set #towards
- Towards a feature-rich data set for personalized access to long-tail content (CS, JS, MG), pp. 1031–1038.
- SAC-2015-LommatzschA #realtime #recommendation
- Real-time recommendations for user-item streams (AL, SA), pp. 1039–1046.
- SAC-2015-BerardiEF015a #case study #design #industrial
- Classifying websites by industry sector: a study in feature design (GB, AE, TF, FS), pp. 1053–1059.
- SAC-2015-DAddioM #approach #collaboration #sentiment
- A sentiment-based item description approach for kNN collaborative filtering (RMD, MGM), pp. 1060–1065.
- SAC-2015-BerardiCEM #microblog #on the #realtime
- On the impact of entity linking in microblog real-time filtering (GB, DC, AE, DM), pp. 1066–1071.
- SAC-2015-BraunschweigTEL #web
- Column-specific context extraction for web tables (KB, MT, JE, WL), pp. 1072–1077.
- SAC-2015-ChaCBCYBC #framework #online #topic
- A universal topic framework (UniZ) and its application in online search (YC, KhC, HB, YC, TWY, BB, JC), pp. 1078–1085.
- SAC-2015-BritoE #branch #named #performance #query
- BranchGuide: an indexing technique for efficient, lossless processing of branching path queries (TBV, GEdS), pp. 1086–1092.
- SAC-2015-AbbesPHB #documentation
- Leveraging temporal expressions to filter vital documents related to an entity (RA, KPS, NH, MB), pp. 1093–1098.
- SAC-2015-FerreiraPC #graph #matrix
- Exploring graph topology via matrix factorization to improve wikification (RF, MdGCP, MC), pp. 1099–1104.
- SAC-2015-DominguesSBMPR #metadata #multi #personalisation #ranking #recommendation
- Applying multi-view based metadata in personalized ranking for recommender systems (MAD, CVS, FMMB, MGM, MGCP, SOR), pp. 1105–1107.
- SAC-2015-Schlotterer #query
- From context to query (JS), pp. 1108–1109.
- SAC-2015-Chakraborti #identification #multi #optimisation #summary #topic
- Multi-document text summarization for competitor intelligence: a methodology based on topic identification and artificial bee colony optimization (SC), pp. 1110–1111.
- SAC-2015-Chaudhary #experience #recommendation
- Experience in item based recommender system (AC), pp. 1112–1114.
- SAC-2015-LevoratoDFF #algorithm #network #social
- An ILS algorithm to evaluate structural balance in signed social networks (ML, LMdAD, YF, RMVdF), pp. 1117–1122.
- SAC-2015-NonnenmacherOBV #modelling #process
- Modelling consumers decision-making process about excluding products as a result of mutual influence (VN, LPLdO, BEJB, MBV), pp. 1123–1128.
- SAC-2015-GimenesGRG #analysis #graph #multimodal #repository
- Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
- SAC-2015-Valverde-Rebaza #modelling #naive bayes #network #online #predict #social
- A naïve Bayes model based on ovelapping groups for link prediction in online social networks (JCVR, AV, LB, TdPF, AdAL), pp. 1136–1141.
- SAC-2015-SilvaMS #analysis #quality
- Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
- SAC-2015-AliK #approach #effectiveness #recommendation
- An effective approach to group recommendation based on belief propagation (IA, SWK), pp. 1148–1153.
- SAC-2015-RajtmajerGMS #behaviour #game studies #network #online #social
- An evolutionary game model for the spread of non-cooperative behavior in online social networks (SMR, CG, DM, ACS), pp. 1154–1159.
- SAC-2015-OliveiraQMM #community #complexity #detection #using
- Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
- SAC-2015-LoffRM #platform #predict #social #social media
- Predicting well-being with geo-referenced data collected from social media platforms (JL, MR, BM), pp. 1167–1173.
- SAC-2015-TakemuraTT #classification #twitter
- Classification of Twitter follow links based on the followers’ intention (HT, AT, KT), pp. 1174–1180.
- SAC-2015-MochalovaN #multi
- Multi-stage seed selection for viral marketing (AM, AN), pp. 1181–1183.
- SAC-2015-SilvaSBVS #assessment #framework #process #using
- Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
- SAC-2015-PintoMCS #process #using
- Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
- SAC-2015-AwadBESAS #anti #approach #detection #process #runtime
- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
- SAC-2015-AldeaIHQBF #modelling
- Modelling strategy with ArchiMate (AA, MEI, JvH, DACQ, LB, HMF), pp. 1211–1218.
- SAC-2015-ZappatoreLB #composition #contract #network #representation
- SLA composition in service networks: a tool for representing relationships between SLAs and contracts (MZ, AL, MAB), pp. 1219–1224.
- SAC-2015-0001RMW #approach #behaviour #constraints #process
- Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
- SAC-2015-WeberFMS #mining #multi #process
- Mining processes with multi-instantiation (IW, MF, JM, JGS), pp. 1231–1237.
- SAC-2015-MakrisVV #classification #predict
- Classification model for predicting cost slippage in governmental ICT projects (CM, PV, JV), pp. 1238–1241.
- SAC-2015-NwokejiCBK #concept #enterprise #framework
- A conceptual framework for enterprise agility (JCN, TC, BSB, VK), pp. 1242–1244.
- SAC-2015-HoldererAM #constraints #overview #workflow
- When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience (JH, RA, GM), pp. 1245–1248.
- SAC-2015-Nwokeji #enterprise #framework
- A framework for enterprise agility (JCN), pp. 1249–1250.
- SAC-2015-DarabiG #personalisation #summary #using #video
- Personalized video summarization using sift (KD, GG), pp. 1252–1256.
- SAC-2015-BarbieriTPG #named #representation #video #visual notation
- Shot-HR: a video shot representation method based on visual features (TTSB, THT, MPPJ, RG), pp. 1257–1262.
- SAC-2015-GotoT #communication #detection #network #visual notation
- Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
- SAC-2015-MateCEL #automation #multi #video
- Automatic multi-camera remix from single video (SM, IDDC, AJE, AL), pp. 1270–1277.
- SAC-2015-SoaresMV #multi
- Controlling the focus and input events in multimedia applications (LFGS, MFM, ÁLVG), pp. 1278–1284.
- SAC-2015-VielMT #approach #multi
- An approach for controlling synchronous remote instances of a multimedia presentation (CCV, ELM, CACT), pp. 1285–1290.
- SAC-2015-AbdiAM #algorithm #robust #video
- A robust video watermarking algorithm in H.264/AVC compressed domain (LA, FBA, AM), pp. 1291–1293.
- SAC-2015-ColantonioPPS #detection #overview #platform #visual notation
- Visual detection of singularities in review platforms (AC, RDP, MP, AS), pp. 1294–1295.
- SAC-2015-JoselliJC #animation #data type #gpu #named #proximity
- NGrid: a proximity data structure for fluids animation with GPU computing (MJ, JRdSJ, EC), pp. 1303–1308.
- SAC-2015-SilvaLP #locality #multi #replication
- Boosting locality in multi-version partial data replication (JAS, JL, HP), pp. 1309–1314.
- SAC-2015-BispoRC #c #generative #matlab
- C and OpenCL generation from MATLAB (JB, LR, JMPC), pp. 1315–1320.
- SAC-2015-BarringtonFD #multi #scalability
- A scalable multi-producer multi-consumer wait-free ring buffer (AB, SDF, DD), pp. 1321–1328.
- SAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance #using
- G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
- SAC-2015-IglesiaJGP #parallel
- Parallel trajectory synchronization for aircraft conflicts resolution (EdlI, GBJ, CG, MP), pp. 1339–1341.
- SAC-2015-BeckersHMG #internet #security
- Engineering trust- and reputation-based security controls for future internet systems (KB, MH, FM, MCFG), pp. 1344–1349.
- SAC-2015-Soares0W #approach #modelling #named #recognition #requirements #speech
- VoiceToModel: an approach to generate requirements models from speech recognition mechanisms (FS, JA, FW), pp. 1350–1357.
- SAC-2015-MarquesRA #named #representation #traceability
- TRL: a traceability representation language (AM, FR, WdLA), pp. 1358–1363.
- SAC-2015-MarquesRA15a #process #requirements #towards #traceability
- Towards a requirements traceability process centered on the traceability model (AM, FR, WdLA), pp. 1364–1369.
- SAC-2015-BarnPB #approach #evaluation #privacy #requirements
- An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
- SAC-2015-AlmeidaBBCD #variability
- Dynamic decision-making based on NFR for managing software variability and configuration selection (AA, NB, TVB, EC, FD), pp. 1376–1382.
- SAC-2015-JuniorRSM #approach #deployment #multi #non-functional #requirements
- A multi-criteria approach for assessing cloud deployment options based on non-functional requirements (RGJ, TR, AS, NCM), pp. 1383–1389.
- SAC-2015-JuniorL #case study #named #reuse #specification
- M-4REuse: reusing use cases specifications (MMCJ, ML), pp. 1390–1396.
- SAC-2015-VilelaCPSCL #behaviour #modelling
- Deriving the behavior of context-sensitive systems from contextual goal models (JV, JBdC, JP, MS, PC, ML), pp. 1397–1400.
- SAC-2015-OjameruayeB #analysis #framework
- A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
- SAC-2015-GassaraRJ #approach #architecture #deployment #modelling #multi
- A multi-scale modeling approach for software architecture deployment (AG, IBR, MJ), pp. 1405–1410.
- SAC-2015-GoncalvesON #architecture
- A meta-process to construct software architectures for system of systems (MBG, FO, EYN), pp. 1411–1416.
- SAC-2015-GuessiMAON #architecture #named #ontology
- OntolAD: a formal ontology for architectural descriptions (MG, DAM, GA, FO, EYN), pp. 1417–1424.
- SAC-2015-BassoMJV #architecture #design #evaluation #privacy #requirements #web
- Requirements, design and evaluation of a privacy reference architecture for web applications and services (TB, RM, MJ, MV), pp. 1425–1432.
- SAC-2015-GuessiNBFON #architecture #overview
- A systematic literature review on the description of software architectures for systems of systems (MG, VVGN, TB, KRF, FO, EYN), pp. 1433–1440.
- SAC-2015-TizzeiABC #architecture #case study #product line #tool support #using
- Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
- SAC-2015-BurityE #approach #recommendation
- A quantitative, evidence-based approach for recommending software modules (TB, GEdS), pp. 1449–1456.
- SAC-2015-SilvaBNCS #architecture #design #quality
- A decision-making tool to support architectural designs based on quality attributes (ICLS, PHSB, BFdSN, EC, AAS), pp. 1457–1463.
- SAC-2015-AgrawalP #as a service #named #quality
- AutoQA: quality attributes as a service in cloud (AA, TVP), pp. 1464–1467.
- SAC-2015-KhlifKKD #approach #architecture #modelling #multi #towards
- Towards a multi-scale modeling approach for software architectures (IK, MHK, AHK, KD), pp. 1468–1470.
- SAC-2015-SantosM #detection
- Exploring decision drivers on god class detection in three controlled experiments (JAMS, MGM), pp. 1472–1479.
- SAC-2015-ReddySC #approach #aspect-oriented #incremental #learning #performance #weaving
- Incremental aspect weaving: an approach for faster AOP learning (YRR, AS, MC), pp. 1480–1485.
- SAC-2015-DemuthRNHZE #framework #multi #named
- DesignSpace: an infrastructure for multi-user/multi-tool engineering (AD, MRE, AN, PH, KZ, AE), pp. 1486–1491.
- SAC-2015-KimL #diagrams #qvt #sequence chart #using
- Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
- SAC-2015-PerkusichMSGAP #approach #metric #network
- A Bayesian network approach to assist on the interpretation of software metrics (MP, AM, LCeS, KCG, HOdA, AP), pp. 1498–1503.
- SAC-2015-MalechaGS #automation
- Automated software winnowing (GM, AG, NS), pp. 1504–1511.
- SAC-2015-KhelladiBBLG #consistency #framework #process #verification
- A framework to formally verify conformance of a software process to a software method (DEK, RB, SB, YL, MPG), pp. 1518–1525.
- SAC-2015-AlemerienM #metric #named #predict #usability #user interface #visual notation
- SLC: a visual cohesion metric to predict the usability of graphical user interfaces (KA, KM), pp. 1526–1533.
- SAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
- SAC-2015-SoaresJMP #open source
- Acceptance factors of pull requests in open-source projects (DMS, MLdLJ, LM, AP), pp. 1541–1546.
- SAC-2015-CostaCFR #diagrams #modelling #precise #uml
- From UML diagrams to simulink models: a precise and verified translation (AC, SAdCC, LF, LR), pp. 1547–1552.
- SAC-2015-ZhangYLC #concept #debugging #mining #predict #repository
- Predicting severity of bug report by mining bug repository with concept profile (TZ, GY, BL, ATSC), pp. 1553–1558.
- SAC-2015-ElyasovPHRVC #equivalence #execution #testing
- AB=ᗺA: execution equivalence as a new type of testing oracle (AE, WP, JH, UR, TEJV, NCF), pp. 1559–1566.
- SAC-2015-JuniorSPM #developer
- Developers assignment for analyzing pull requests (MLdLJ, DMS, AP, LM), pp. 1567–1572.
- SAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
- SAC-2015-ConstantinouS #architecture #evolution #metric #reuse
- Architectural stability and evolution measurement for software reuse (EC, IS), pp. 1580–1585.
- SAC-2015-DabainMT #design pattern #detection #using
- Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
- SAC-2015-MergelSS #mining #string #visual notation
- A method to support search string building in systematic literature reviews through visual text mining (GDM, MSS, TSdS), pp. 1594–1601.
- SAC-2015-MeftehBB #approach #case study #diagrams #evaluation #feature model #implementation #modelling #uml
- Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
- SAC-2015-KrutzMS #analysis #detection #effectiveness #using
- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
- SAC-2015-SenaCK #exception #product line
- An investigation on the evolutionary nature of exception handling violations in software product lines (DS, RC, UK), pp. 1616–1623.
- SAC-2015-JoshiSIY #architecture #behaviour #design #embedded #functional #modelling
- Mapping functional behavior onto architectural model in a model driven embedded system design (PJ, SKS, JPT, HY), pp. 1624–1630.
- SAC-2015-DAvanzoFGS #estimation #functional #metric #mobile
- COSMIC functional measurement of mobile applications and code size estimation (LD, FF, CG, PS), pp. 1631–1636.
- SAC-2015-VorobyovKS #monitoring #specification
- A concise specification language for trace monitoring (KV, PK, PS), pp. 1637–1640.
- SAC-2015-MurguzurTS #evaluation #framework #variability #workflow
- Dynamic variability support in workflow-based systems: an evaluation of the LateVa framework (AM, ST, GS), pp. 1641–1643.
- SAC-2015-XuanLXT #empirical #fault #metric #predict #set #using
- Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
- SAC-2015-FukudaL #library
- A library to modularly control asynchronous executions (HF, PL), pp. 1648–1650.
- SAC-2015-LeTN #requirements #using #verification
- Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
- SAC-2015-FerreiraFN #impact analysis #object-oriented
- Mapping the potential change impact in object-oriented software (MMF, KAMF, HTMN), pp. 1654–1656.
- SAC-2015-SantosOA #development #mining #process
- Mining software development process variations (RMSS, TCO, FBeA), pp. 1657–1660.
- SAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
- Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
- SAC-2015-FerrucciSKS #algorithm #framework #parallel #pipes and filters #search-based
- A parallel genetic algorithms framework based on Hadoop MapReduce (FF, PS, MTK, FS), pp. 1664–1667.
- SAC-2015-Ahn #architecture #object-oriented #re-engineering #runtime
- Reconstruction of runtime software architecture for object-oriented systems (HA), pp. 1668–1669.
- SAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring #using
- A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
- SAC-2015-GarciaPMR #process
- A software process line for service-oriented applications (CG, MP, AM, SSR), pp. 1680–1687.
- SAC-2015-DiazCMR #architecture #model checking #verification #web #web service
- Model-checking verification of publish-subscribe architectures in web service contexts (GD, MEC, HM, VVR), pp. 1688–1695.
- SAC-2015-NascimentoPM #algorithm #machine learning #metaheuristic
- A data quality-aware cloud service based on metaheuristic and machine learning provisioning algorithms (DCN, CESP, DGM), pp. 1696–1703.
- SAC-2015-RiccobeneS #adaptation #formal method #modelling #self
- Formal modeling self-adaptive service-oriented applications (ER, PS), pp. 1704–1710.
- SAC-2015-OliveiraLV #framework #performance #security #web #web service
- Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
- SAC-2015-VianaTVAGA #architecture #as a service #platform
- A service-oriented architecture for billing resources in IaaS cloud platforms (NPV, FT, RV, RMCA, VCG, REA), pp. 1719–1721.
- SAC-2015-SunyaevB #empirical #independence #testing
- Truth and myth of independent software testing: a controlled human experiment (AS, DB), pp. 1722–1728.
- SAC-2015-JakobsW #analysis #data flow #proving #source code
- Programs from proofs of predicated dataflow analyses (MCJ, HW), pp. 1729–1736.
- SAC-2015-BrideJM #approximate #generative #testing
- Tri-modal under-approximation of event systems for test generation (HB, JJ, PAM), pp. 1737–1744.
- SAC-2015-AlbertiM #array
- Polyhedra to the rescue of array interpolants (FA, DM), pp. 1745–1750.
- SAC-2015-BourdilBDV #petri net #symmetry
- Symmetry reduced state classes for time petri nets (PAB, BB, SDZ, FV), pp. 1751–1758.
- SAC-2015-SanchezJ #interactive #modelling #music #testing
- Model based testing of an interactive music system (CPS, FJ), pp. 1759–1764.
- SAC-2015-JakobssonKS #c #hybrid #memory management #monitoring #performance
- Fast as a shadow, expressive as a tree: hybrid memory monitoring for C (AJ, NK, JS), pp. 1765–1772.
- SAC-2015-BekkoucheCR #approach #constraints #fault #locality #named
- LocFaults: a new flow-driven and constraint-based error localization approach (MB, HC, MR), pp. 1773–1780.
- SAC-2015-Gregorio-Rodriguez #consistency #simulation
- Extending mCRL2 with ready simulation and iocos input-output conformance simulation (CGR, LL, RMT), pp. 1781–1788.
- SAC-2015-CharafeddineEFJ #component #runtime
- Runtime enforcement for component-based systems (HC, KEH, YF, MJ), pp. 1789–1796.
- SAC-2015-CalvagnaFT #case study #combinator #consistency #effectiveness #random #testing
- Random versus combinatorial effectiveness in software conformance testing: a case study (AC, AF, ET), pp. 1797–1802.
- SAC-2015-Homm0G #concurrent #markov #modelling #statistics #testing
- Concurrent streams in Markov chain usage models for statistical testing of complex systems (DH, JE, RG), pp. 1803–1807.
- SAC-2015-DihegoSO #component
- Constructive extensibility of trustworthy component-based systems (JD, AS, MVMO), pp. 1808–1814.
- SAC-2015-ByunC #automation #constraints #operating system #safety #testing #using
- Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
- SAC-2015-Buday #formal method
- Formalising the SECD machine with nominal Isabelle (GB), pp. 1823–1824.
- SAC-2015-Fongen #tuple
- Data-centric authorization and integrity control in a Linda tuplespace (AF), pp. 1827–1833.
- SAC-2015-BadouelHKM #approach #collaboration #distributed
- A grammatical approach to data-centric case management in a distributed collaborative environment (EB, LH, GEK, CM), pp. 1834–1839.
- SAC-2015-AlrahmanNLTV #calculus #communication
- A calculus for attribute-based communication (YAA, RDN, ML, FT, RV), pp. 1840–1845.
- SAC-2015-PianiniVB #named #programming
- Protelis: practical aggregate programming (DP, MV, JB), pp. 1846–1853.
- SAC-2015-SousaS #domain-specific language #simulation #tool support
- A domain specific language for spatial simulation scenarios (DSL3S): introduction and tool support (LdS, ARdS), pp. 1854–1856.
- SAC-2015-AbeywickramaSL #adaptation #monitoring #runtime #visualisation
- Monitoring and visualizing adaptation of autonomic systems at runtime (DBA, NBS, ML), pp. 1857–1860.
- SAC-2015-AmadiniGM #named
- SUNNY-CP: a sequential CP portfolio solver (RA, MG, JM), pp. 1861–1867.
- SAC-2015-BolockA #automation #constraints #generative #towards #using
- Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
- SAC-2015-SioutisSC #composition #graph #on the #reasoning
- On the use and effect of graph decomposition in qualitative spatial and temporal reasoning (MS, YS, JFC), pp. 1874–1879.
- SAC-2015-TodaT #performance #satisfiability
- BDD construction for all solutions SAT and efficient caching mechanism (TT, KT), pp. 1880–1886.
- SAC-2015-ShterionovJ #component #pipes and filters #probability
- Crucial components in probabilistic inference pipelines (DSS, GJ), pp. 1887–1889.
- SAC-2015-ZiccardiSV #operating system
- A time-composable operating system for the Patmos processor (MZ, MS, TV), pp. 1892–1897.
- SAC-2015-Puffitsch #analysis #bound #branch #predict
- Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
- SAC-2015-YangCHCLK #performance
- Reliability-aware striping with minimized performance overheads for flash-based storage devices (MCY, YMC, PCH, YHC, LJL, TWK), pp. 1906–1912.
- SAC-2015-KapoorDC #capacity #energy #performance #reduction
- Static energy reduction by performance linked cache capacity management in tiled CMPs (HKK, SD, SC), pp. 1913–1918.
- SAC-2015-DasK #using
- Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
- SAC-2015-FonsecaNRP #execution #parallel #realtime
- A multi-DAG model for real-time parallel applications with conditional execution (JCF, VN, GR, LMP), pp. 1925–1932.
- SAC-2015-DieumegardGKTT #compilation #contract
- Compilation of synchronous observers as code contracts (AD, PLG, TK, AT, XT), pp. 1933–1939.
- SAC-2015-CremonaMN #composition #named #representation #simulation
- TRES: a modular representation of schedulers, tasks, and messages to control simulations in simulink (FC, MM, MDN), pp. 1940–1947.
- SAC-2015-Morelli #automation #generative #modelling
- Automated generation of robotics applications from simulink and SysML models (MM), pp. 1948–1954.
- SAC-2015-FernandezAQVFZC #multi #off the shelf
- Introduction to partial time composability for COTS multicores (GF, JA, EQ, TV, LF, MZ, FJC), pp. 1955–1956.
- SAC-2015-Jung0B #analysis #embedded #encoding #identification #power management
- Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
- SAC-2015-Khenfri #approach #architecture #optimisation #synthesis
- A holistic optimization approach for the synthesis of AUTOSAR E/E architecture (FK), pp. 1960–1961.
- SAC-2015-SakuraiM #debugging #object-oriented #source code
- The omission finder for debugging what-should-have-happened bugs in object-oriented programs (KS, HM), pp. 1962–1969.
- SAC-2015-PapeBH #adaptation #data type #execution #optimisation #performance
- Adaptive just-in-time value class optimization: transparent data structure inlining for fast execution (TP, CFB, RH), pp. 1970–1977.
- SAC-2015-PapouliasDDF #towards
- Reifying the reflectogram: towards explicit control for implicit reflection (NP, MD, SD, LF), pp. 1978–1985.
- SAC-2015-OmarWA #composition #metaprogramming #syntax
- Composable and hygienic typed syntax macros (CO, CW, JA), pp. 1986–1991.
- SAC-2015-BurtonS #composition #mixin #safety
- The safety of dynamic mixin composition (EB, ES), pp. 1992–1999.
- SAC-2015-LeeKKE #algorithm #architecture #hybrid #memory management #named
- M-CLOCK: migration-optimized page replacement algorithm for hybrid DRAM and PCM memory architecture (ML, DK, JK, YIE), pp. 2001–2006.
- SAC-2015-JeremicPM #array #performance #random
- Improving random write performance in heterogeneous erasure-coded drive arrays by offloading code block requests (NJ, HP, GM), pp. 2007–2014.
- SAC-2015-BoitoKND #performance #profiling #towards
- Towards fast profiling of storage devices regarding access sequentiality (FZB, RK, POAN, YD), pp. 2015–2020.
- SAC-2015-Oikawa #adaptation #memory management
- Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
- SAC-2015-SaezPCCP #manycore #named #symmetry
- ACFS: a completely fair scheduler for asymmetric single-isa multicore systems (JCS, AP, FC, DC, MPM), pp. 2027–2032.
- SAC-2015-BusseSDNH #data access #memory management #virtual machine
- Partial coscheduling of virtual machines based on memory access patterns (AB, JHS, MD, POAN, HUH), pp. 2033–2038.
- SAC-2015-KimK #scalability #using
- Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
- SAC-2015-LeeOL #enterprise #problem
- SSD caching to overcome small write problem of disk-based RAID in enterprise environments (EL, YO, DL), pp. 2047–2053.
- SAC-2015-FerreiraMME #analysis #comparison #kernel #memory management
- An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
- SAC-2015-JoCKBO #algorithm #approach #collaboration #cpu #data-driven #on the
- On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach (YYJ, SC, SWK, DHB, HO), pp. 2060–2065.
- SAC-2015-InacioDBNM #file system #operating system #parallel #parametricity #performance
- Performance impact of operating systems’ caching parameters on parallel file systems (ECI, MARD, FZB, POAN, DDJdM), pp. 2066–2068.
- SAC-2015-LeeRH #file system #memory management #performance
- Performance implications of cache flushes for non-volatile memory file systems (KL, SR, HH), pp. 2069–2071.
- SAC-2015-MinHJCH #distributed #performance #process #scalability
- An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
- SAC-2015-LeeP #reduction
- Search space reduction for electric vehicle-based tour schedules (JL, GLP), pp. 2075–2076.
- SAC-2015-TakanoI #correctness #functional #lazy evaluation #semantics
- Thunk recycling for lazy functional languages: operational semantics and correctness (YT, HI), pp. 2079–2086.
- SAC-2015-CordobaL #design #effectiveness #java #modelling
- A modelling language for the effective design of Java annotations (IC, JdL), pp. 2087–2092.
- SAC-2015-DuarteBPC #composition #memory management #transaction
- Composable memory transactions with eager version management (RMD, ARDB, MLP, GGHC), pp. 2093–2098.
- SAC-2015-DabrowskiLP #compilation #concurrent #thread
- Nested atomic sections with thread escape: compilation (FD, FL, TP), pp. 2099–2106.
- SAC-2015-MilewiczVTQP #c #runtime #source code
- Runtime checking C programs (RM, RV, JT, DQ, PP), pp. 2107–2114.
- SAC-2015-BacikovaPCN #domain-specific language #user interface
- Bootstrapping DSLs from user interfaces (MB, JP, SC, MN), pp. 2115–2118.
- SAC-2015-LopezR #analysis #metaprogramming
- Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
- SAC-2015-DymchenkoM #eclipse #problem #prolog
- Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP system (SD, MM), pp. 2122–2124.
- SAC-2015-MinV #anti #design #evaluation #implementation #novel
- Design, implementation and evaluation of a novel anti-virus parasitic malware (BM, VV), pp. 2127–2133.
- SAC-2015-Kerschbaum #generative #outsourcing
- Oblivious outsourcing of garbled circuit generation (FK), pp. 2134–2140.
- SAC-2015-DecatBLJ #as a service #data access #middleware #multitenancy #named #performance
- Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
- SAC-2015-BraunPPJ #adaptation #named #web
- LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
- SAC-2015-WangYCDGW #documentation #named #physics #security
- Cryptopaper: digital information security for physical documents (PW, XY, SC, PD, SG, TW), pp. 2157–2164.
- SAC-2015-ThionLB #data access #data flow #relational
- Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
- SAC-2015-RyckDPJ #named
- SecSess: keeping your session tucked away in your browser (PDR, LD, FP, WJ), pp. 2171–2176.
- SAC-2015-RaniseTV #analysis #automation #constraints #policy
- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
- SAC-2015-PreuveneersJ #authentication #named
- SmartAuth: dynamic context fingerprinting for continuous user authentication (DP, WJ), pp. 2185–2191.
- SAC-2015-XiongN #estimation #low cost #power management
- Cost-efficient and attack-resilient approaches for state estimation in power grids (KX, PN), pp. 2192–2197.
- SAC-2015-JagroepWJFV #energy #profiling
- Profiling energy profilers (EJ, JMEMvdW, SJ, MAF, JV), pp. 2198–2203.
- SAC-2015-TudorAP #framework
- Harnessing the unknown in advanced metering infrastructure traffic (VT, MA, MP), pp. 2204–2211.
- SAC-2015-LopesFBM #communication #named #network #smarttech
- SMARTFlow: a solution for autonomic management and control of communication networks for smart grids (YL, NCF, CAMB, DCMS), pp. 2212–2217.
- SAC-2015-BarbosaBA #monitoring
- Defending against load monitoring in smart metering data through noise addition (PB, AB, HA), pp. 2218–2224.
- SAC-2015-XuYYHHK #multi #predict #using
- Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
- SAC-2015-RrushiFNHCP #protocol #specification
- By-design vulnerabilities in the ANSI C12.22 protocol specification (JLR, HF, RN, CH, KC, AP), pp. 2231–2236.
- SAC-2015-BergentiCG #framework #game studies #mobile #platform #scalability #social
- A scalable platform for mobile social gaming (FB, GC, DG), pp. 2239–2244.
- SAC-2015-ChengCCHT #deployment #smarttech
- The deployment of shared data objects among handheld and wearable devices (SWC, CWC, YHC, PCH, CHT), pp. 2245–2251.
- SAC-2015-AminikhanghahiS #image #robust
- Study of wireless mammography image transmission impacts on robust cyber-aided diagnosis systems (SA, SYS, WW, SIJ, SHS, CP), pp. 2252–2256.
- SAC-2015-DuanZHX #analysis #delivery #framework #network #performance #platform
- Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
- SAC-2015-Lopez-CasadoPCM #named #network #novel
- GlSch: a novel scheduler for a heterogeneous telescope network (MCLC, CJPdP, JCC, VFM, GOL, AJCT, JS, EM, JM, SK, FMS), pp. 2263–2270.
- SAC-2015-Moawad0FKT #adaptation #privacy #ubiquitous
- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
- SAC-2015-ShahzadJKKKH #execution #in the cloud #mobile
- Application-level task execution issues in mobile cloud computing (AS, HJ, PK, HK, BKK, JH), pp. 2285–2287.
- SAC-2015-PaakkonenP
- The implications of disk-based RAID and virtualization for write-intensive services (PP, DP), pp. 2288–2291.
- SAC-2015-AbdiH #algorithm #distributed
- An algorithm for distributed certificate chain discovery in open environments (SA, JH), pp. 2292–2298.
- SAC-2015-VecchiatoVM #android #assessment #security
- A security configuration assessment for android devices (DV, MV, EM), pp. 2299–2304.
- SAC-2015-SharmaMDH #trust
- Bi-directional trust index computation in resource marketplace (AS, TM, PD, VGH), pp. 2305–2311.
- SAC-2015-GkorouPE #distributed #network #trust
- Trust-based collection of information in distributed reputation networks (DG, JAP, DHJE), pp. 2312–2319.
- SAC-2015-KokoschkaPS
- A reputation system supporting unlinkable, yet authorized expert ratings (AK, RP, CS), pp. 2320–2327.
- SAC-2015-SantiagoPH #approach #detection #modelling
- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
43 ×#named
36 ×#using
32 ×#multi
31 ×#approach
29 ×#network
28 ×#performance
24 ×#framework
20 ×#modelling
18 ×#algorithm
17 ×#analysis
36 ×#using
32 ×#multi
31 ×#approach
29 ×#network
28 ×#performance
24 ×#framework
20 ×#modelling
18 ×#algorithm
17 ×#analysis