22. SAC 2007:
Seoul,
Korea
Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo (Eds.):
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007.
ACM 2007, ISBN 1-59593-480-4
Advances in spatial and image-based information systems
- Mattias Andersson, Joachim Gudmundsson, Patrick Laube, Thomas Wolle:
Reporting leadership patterns among trajectories.
3-7
- Alexander Kolesnikov, Alexander Akimov:
Distortion-constrained compression of vector maps.
8-12
- Tao Wan, Karine Zeitouni, Xiaofeng Meng:
An OLAP system for network-constrained moving objects.
13-18
- Arianna D'Ulizia, Fernando Ferri, Anna Formica, Patrizia Grifoni, Maurizio Rafanelli:
Structural similarity in geographical queries to improve query answering.
19-23
- Jejung Lee, Yugyung Lee, Sanket Shah, James Geller:
HIS-KCWater: context-aware geospatial data and service integration.
24-29
Agents,
interactions,
mobility and systems
- Rubens Fernandes Nunes, Creto Augusto Vidal, Joaquim B. Cavalcante Neto:
A flexible representation of controllers for physically-based animation of virtual humans.
30-36
- Camila Nunes, Marcílio Ferreira, Hyggo Oliveira de Almeida:
Applying a component-based framework to develop multi-agent environments: case study.
37-41
- Giuseppe Di Fatta, Giancarlo Fortino:
A customizable multi-agent system for distributed data mining.
42-47
- Guido van 't Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum:
Guarding security sensitive content using confined mobile agents.
48-55
- Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes:
A crime simulation model based on social networks and swarm intelligence.
56-57
Artificial intelligence,
computational logic,
and image analysis
- Khalil Djelloul, Thi-Bich-Hanh Dao, Thom W. Frühwirth:
Toward a first-order extension of Prolog's unification using CHR: a CHR first-order constraint solver over finite or infinite trees.
58-64
- Luciano Caroprese, Irina Trubitsyna, Ester Zumpano:
A framework for prioritized reasoning based on the choice evaluation.
65-70
- Muhammad Sarfraz, Aiman Rashid:
A randomized knot insertion algorithm for outline capture of planar images using cubic spline.
71-75
- Gang Zhang, Z. M. Ma, Zhiping Cai:
Directed filter for dominant direction fuzzy set in content-based image retrieval.
76-77
- ChenGuang Liu, Kazuyuki Tanaka:
Eigen-distribution on assignments for game trees with random properties.
78-79
- Enmin Song, Luan Jiang, Bo Meng, Renchao Jin, Xiangyang Xu, Chih-Cheng Hung:
Mass edge detection in mammography based on plane fitting and dynamic programming.
80-81
- Depei Bao, Zehong Yang, Yixu Song:
Projection function for driver fatigue monitoring with monocular camera.
82-83
Autonomic computing
- Edin Arnautovic, Hermann Kaindl, Jürgen Falb, Roman Popp, Alexander Szep:
Gradual transition towards autonomic software systems based on high-level communication specification.
84-89
- Michael G. Hinchey, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan:
Bionic autonomic nervous system and self-healing for NASA ANTS-like missions.
90-96
- Yu Zhou, Jian Pan, Xiaoxing Ma, Bin Luo, XianPing Tao, Jian Lu:
Applying ontology in architecture-based self-management applications.
97-103
- Rui Zhang, Steve Moyle, Steve McKeever, Alan Bivens:
Performance problem localization in self-healing, service-oriented systems using Bayesian networks.
104-109
- Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque:
Self-healing for autonomic pervasive computing.
110-111
Bioinformatics
- Hee-Jeong Jin, Hwan-Gue Cho:
Hierarchical alignment graph for gene teams finding on whole genomes.
113-117
- Pavithra G. Naidu, Mathew J. Palakal, Shielly Hartanto:
On-the-fly data integration models for biological databases.
118-122
- Kuan-Ming Lin, Jaewoo Kang:
Exploiting inter-gene information for microarray data integration.
123-127
- Fa Zhang, Lin Xu, Zhiyong Liu, Bo Yuan:
Improved structural modeling based on conserved domain clusters and structure-anchored alignments.
128-132
- Xiaoyong Fang, Zhenghua Wang, Zhigang Luo, Bo Yuan, Fan Ding:
The detection and assessment of possible RNA secondary structure using multiple sequence alignment.
133-137
- Yin-Fu Huang, Yi-Chao Jhan, Sing-Wu Liou:
Finding putative core promoter elements with position-dependent consensuses.
138-139
- Xiandong Meng, Vipin Chaudhary:
An adaptive data prefetching scheme for biosequence database search on reconfigurable platforms.
140-141
- Hisham Al-Mubaid, Hoa A. Nguyen:
Semantic distance of concepts within a unified framework in the biomedical domain.
142-143
- Chao-Tung Yang, Tsu-Fen Han, Heng-Chuan Kan:
On construction of a BioGrid platform for parallel bioinformatics applications.
144-145
Computer applications in health care
Computer ethics and human values
Computer forensics
- Yacine Djemaiel, Noureddine Boudriga:
A global marking scheme for tracing cyber attacks.
170-174
- Ricci S. C. Ieong, H. C. Leung:
Deriving cse-specific live forensics investigation procedures from FORZA.
175-180
- Antonio Savoldi, Paolo Gubian:
SIM and USIM filesystem: a forensics perspective.
181-187
- Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga:
Global intrusion detection and tolerance in networked systems.
188-189
- Lorie M. Liebrock, Nico Marrero, David P. Burton, Ron Prine, E. Cornelius, M. Shakamuri, Vincent Urias:
A preliminary design for digital forensics analysis of terabyte size data sets.
190-191
Computer networks
- Chi-Jen Wu, Ren-Hung Hwang, Jan-Ming Ho:
A scalable overlay framework for internet anycasting service.
193-197
- Xiaolong Jin, Geyong Min:
An analytical model for generalized processor sharing scheduling with heterogeneous network traffic.
198-202
- Paulo Sérgio Sausen, Marco Aurélio Spohn, Antonio Marcus Nogueira de Lima, Angelo Perkusich:
Bounded-distance multi-coverage backbones in wireless sensor networks.
203-208
- Daniel M. Batista, Nelson L. S. Da Fonseca, Flávio Keidi Miyazawa:
A set of schedulers for grid networks.
209-213
- Sangmin Kim, VamsiKrishna Vasireddy, Khaled Harfoush:
Scalable coordination for sensor networks in challenging environments.
214-221
- Guillaume Chelius, Antoine Fraboulet, Eric Fleury:
Worldsens: a fast and accurate development framework for sensor network applications.
222-226
- Solange Rito Lima, Pedro Sousa, Paulo Carvalho:
Enhancing QoS metrics estimation in multiclass networks.
227-231
- Yunqi Li, Jiahai Yang, Changqing An, Hui Zhang:
Finding hierarchical heavy hitters in network measurement system.
232-236
- Yu-Chieh Lin, Hsung-Pin Chang:
VA-TCP: a vertical handoff-aware TCP.
237-238
Computer security
- Arie Orlovsky, Danny Raz:
Decentralized enforcement of security policies for distributed computational systems.
241-248
- Yi Mu, Willy Susilo, Huafei Zhu:
Compact sequential aggregate signatures.
249-253
- Xiang Zhou, Min Huang, Zhiyong Peng:
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image.
254-258
- Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour:
RAAS: a reliable analyzer and archiver for snort intrusion detection system.
259-263
- Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das:
Memory-efficient content filtering hardware for high-speed intrusion detection systems.
264-269
- K. H. S. Sabaragamu Koralalage, Mohammad Reza Selim, Junichi Miura, Yuichi Goto, Jingde Cheng:
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism.
270-275
- Anh-Quynh Nguyen, Yoshiyasu Takefuji:
Towards a tamper-resistant kernel rootkit detector.
276-283
- Martin Johns, Christian Beyerlein:
SMask: preventing injection attacks in web applications by approximating automatic data/code separation.
284-291
- Umut Topkara, Mikhail J. Atallah, Mercan Topkara:
Passwords decay, words endure: secure and re-usable multiple password mnemonics.
292-299
- Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti:
Using CP-nets as a guide for countermeasure selection.
300-304
Constraint solving and programming
Coordination models,
languages and applications
- Yingbo Liu, Jianmin Wang, Jiaguang Sun:
A machine learning approach to semi-automating workflow staff assignment.
340-345
- Sun Meng, Farhad Arbab:
Web services choreography and orchestration in Reo and constraint automata.
346-353
- Mirko Viroli, Matteo Casadei, Luca Gardelli:
A self-organising solution to the collective sort problem in distributed tuple spaces.
354-359
- Lyndon J. B. Nixon, Olena Antonechko, Robert Tolksdorf:
Towards Semantic tuplespace computing: the Semantic web spaces system.
360-365
- Kevin Marth, Shangping Ren:
Extending the ARC model with generative coordination.
366-367
- Michael Schumacher, Tim Van Pelt, Ion Constantinescu, Alexandre de Oliveira e Sousa, Boi Faltings:
Federated directories of Semantic web services.
368-369
Data mining
- Grigorios Loukides, Jianhua Shao:
Capturing data usefulness and privacy protection in K-anonymisation.
370-374
- Jun-Lin Lin, Julie Yu-Chih Liu:
Privacy preserving itemset mining through fake transactions.
375-379
- Traian Marius Truta, Alina Campan:
K-anonymization incremental maintenance and optimization techniques.
380-387
- Wang Lian, David W. Cheung, Siu-Ming Yiu:
Maintenance of maximal frequent itemsets in large databases.
388-392
- Ghazi Al-Naymat, Sanjay Chawla, Joachim Gudmundsson:
Dimensionality reduction for long duration and complex spatio-temporal queries.
393-397
- Songbo Tan, Xueqi Cheng:
Using hypothesis margin to boost centroid text classifier.
398-403
- Toon Calders, Bart Goethals, Michael Mampaey:
Mining itemsets in the presence of missing values.
404-408
- Pasquale Rullo, Chiara Cumbo, Veronica L. Policicchio:
Learning rules with negation for text categorization.
409-416
- Jeroen De Knijf:
FAT-miner: mining frequent attribute trees.
417-422
- Youngju Son, Hasan M. Jamil, Farshad Fotouhi:
Exploiting types for improved schema mapping.
423-429
- Jianlong Qi, Jian Tang:
Integrating gene ontology into discriminative powers of genes for feature selection in microarray data.
430-434
- Li Xiong, Subramanyam Chitti, Ling Liu:
Mining multiple private databases using a kNN classifier.
435-440
- Seung-won Hwang, Hwanjo Yu:
Mining and processing category ranking.
441-442
- Céline Hébert, Alain Bretto, Bruno Crémilleux:
Optimizing hypergraph transversal computation with an anti-monotone constraint.
443-444
- Ana Paula Appel, Adriano Arantes Paterlini, Elaine P. M. de Sousa, Agma J. M. Traina, Caetano Traina Jr.:
Biased box sampling - a density-biased sampling for clustering.
445-446
Data streams
Database theory,
technology,
and applications
- Zhenglu Yang, Botao Wang, Masaru Kitsuregawa:
General dominant relationship analysis based on partial order models.
470-474
- Weihai Yu, Jie Yang:
Continuation-passing enactment of distributed recoverable workflows.
475-481
- Nobutaka Suzuki:
An edit operation-based approach to the inclusion problem for DTDs.
482-488
- James J. Lu, Chia-Hsin Huang, Tyng-Ruey Chuang:
Querying and browsing XML and relational data sources.
489-493
- Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri, Diogo Tuler Forlani, Agma J. M. Traina, Fernando da Fonseca de Souza:
Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries.
494-499
- Ali Saman Tosun:
Equivalent disk allocations.
500-505
- Gae-won You, Seung-won Hwang:
Personalized ranking: a contextual ranking approach.
506-510
- Ying Qiao, Kang Zhong, Hongan Wang, Xiang Li:
Developing event-condition-action rules in real-time active database.
511-516
- Jongho Nang, Joohyoun Park:
An efficient indexing structure for content based multimedia retrieval with relevance feedback.
517-524
- Guangming Xing, Zhonghang Xia, Andrew Ernest:
Building automatic mapping between XML documents using approximate tree matching.
525-526
- Gisele Busichia Baioco, Agma J. M. Traina, Caetano Traina Jr.:
An effective cost model for similarity queries in metric spaces.
527-528
- Ilias Michalarias, Christian Becker:
Multidimensional querying in wireless ad hoc networks.
529-530
Dependable and adaptive distributed systems
- Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
An adaptive randomized search protocol in peer-to-peer systems.
533-537
- Tiejun Ma, Jane Hillston, Stuart Anderson:
Evaluation of the QoS of crash-recovery failure detection.
538-542
- Michael A. Jaeger, Helge Parzyjegla, Gero Mühl, Klaus Herrmann:
Self-organizing broker topologies for publish/subscribe systems.
543-550
- Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
A new adaptive accrual failure detector for dependable distributed systems.
551-555
- José Enrique Armendáriz-Iñigo, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Hendrik Decker, Francesc D. Muñoz-Escoí:
k-bound GSI: a flexible database replication protocol.
556-560
- Giovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto, Salvatore Vadacca:
GReIC data gather service: a step towards P2P production grids.
561-565
- Giovanna Di Marzo Serugendo, John Fitzgerald, Alexander Romanovsky, Nicolas Guelfi:
A metadata-based architectural model for dynamically resilient systems.
566-572
- Vincent Gramoli, Emmanuelle Anceaume, Antonino Virgillito:
SQUARE: scalable quorum-based atomic memory with local reconfiguration.
574-579
- Dhouha Ayed, Yolande Berbers:
Dynamic adaptation of CORBA component-based applications.
580-585
- Robert John Walters, Peter Henderson, Stephen Crouch:
Selecting a distributed agreement algorithm.
586-587
- Sushanta Karmakar, Arobinda Gupta:
Adaptive broadcast by distributed protocol switching.
588-589
- Piotr Karwaczynski, Dariusz Konieczny, Jaka Mocnik, Marko Novak:
Dual proximity neighbour selection method for peer-to-peer-based discovery service.
590-591
Document engineering
- Georg Vogeler, Stefan Gruner, Benjamin Burkard:
New specialist tools for medieval document XML markup.
594-599
- Sylvain Lamprier, Tassadit Amghar, Bernard Levrat, Frédéric Saubion:
ClassStruggle: a clustering based text segmentation.
600-604
- Wafa Boussellaa, Abderrazak Zahour, Adel M. Alimi:
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods.
605-609
- Rafael Dueire Lins, João Marcelo Monte da Silva:
A quantitative method for assessing algorithms to remove back-to-front interference in documents.
610-616
- Xin Jin, Rongyan Li, Xian Shen, Rongfang Bie:
Automatic web pages categorization with ReliefF and Hidden Naive Bayes.
617-621
- Luiz Antônio Pereira Neves, João Marques de Carvalho, Jacques Facon, Flávio Bortolozzi:
A table-form extraction with artefact removal.
622-626
- Sabine Barrat, Salvatore Tabbone:
A progressive learning method for symbols recognition.
627-631
- Cinthia Obladen de Almendra Freitas, Luiz S. Oliveira, Simone B. K. Aires, Flávio Bortolozzi:
Zoning and metaclasses for character recognition.
632-636
- Cesar R. Santos, Flávio Bortolozzi, Luiz S. Oliveira, Edson J. R. Justino:
Off-line signature verification based on forensic questioned document examination approach.
637-638
- João Marcelo Monte da Silva, Rafael Dueire Lins:
A fast algorithm to binarize and filter documents with back-to-front interference.
639-640
E-commerce technologies
Embedded systems:
applications,
solutions,
and techniques
- Liu Xianhua, Zhang Jiyu, Cheng Xu:
Efficient code size reduction without performance loss.
666-672
- Thomas Gustafsson, Aleksandra Tesanovic, Ying Du, Jörgen Hansson:
Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach.
673-679
- Wei-Hsuan Hung, Yi-Jung Chen, Chia-Lin Yang, Yen-Sheng Chang, Alan P. Su:
An architectural co-synthesis algorithm for energy-aware network-on-chip design.
680-684
- Tien N. Nguyen:
Component-based version management for embedded computing system design.
685-692
- Young-Jin Kim, Kwon-Taek Kwon, Jihong Kim:
Energy-efficient disk replacement and file placement techniques for mobile systems with hard disks.
693-698
- Jason Hiser, Jack W. Davidson, David B. Whalley:
Fast, accurate design space exploration of embedded systems memory configurations.
699-706
- Afrin Naz, Krishna M. Kavi, Jung-Hwan Oh, Pierfrancesco Foglia:
Reconfigurable split data caches: a novel scheme for embedded systems.
707-712
- Sylvain Stanchina, Matthias Meyer:
Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collection.
713-718
Evolutionary computation
- Richard Brunauer, Andreas Löcker, Helmut A. Mayer, Gerhard Mitterlechner, Hannes Payer:
Evolution of iterated prisoner's dilemma strategies with different history lengths in static and cultural environments.
720-727
- Ronaldo Menezes, Francisco Martins, Francisca Emanuelle Vieira, Rafael Silva, Márcio Braga:
A model for terrain coverage inspired by ant's alarm pheromones.
728-732
- Raymond Chiong:
Applying genetic algorithms to economy market using iterated prisoner's dilemma.
733-737
- Shih-Hsi Liu, Marjan Mernik, Barrett R. Bryant:
A clustering entropy-driven approach for exploring and exploiting noisy functions.
738-742
- Jason Teo:
Investigating adaptive mutation in the generalized generation gap (G3) algorithm for unconstrained global optimization.
743-744
- Flávio Milsztajn, Klaus de Geus:
Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms.
745-746
- Carlos Fernandes, Vitorino Ramos, Agostinho C. Rosa:
Stigmergic optimization in dynamic binary landscapes.
747-748
Geometric computing and reasoning
Handheld computing
Information access and retrieval
- Wei Jin, Rohini K. Srihari:
Graph-based text representation and knowledge discovery.
807-811
- Daniel Schuster, Alexander Schill:
NL sampler: random sampling of web documents based on natural language with query hit estimation.
812-818
- Chengye Lu, Yue Xu, Shlomo Geva:
Translation disambiguation in web-based translation extraction for English-Chinese CLIR.
819-823
- Hady Wirawan Lauw, Ee-Peng Lim, HweeHwa Pang:
TUBE (Text-cUBE) for discovering documentary evidence of associations among entities.
824-828
- Chen Ding, Jin Zhou:
Log-based indexing to improve web site search.
829-833
- Xue-Qiang Zeng, Ming-Wen Wang, Jian-Yun Nie:
Text classification based on partial least square analysis.
834-838
- Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi:
Using a knowledge base to disambiguate personal name in web search results.
839-843
- Ana Cardoso-Cachopo, Arlindo L. Oliveira:
Semi-supervised single-label text categorization using centroid-based classifiers.
844-851
- Randa Kassab, Jean-Charles Lamirel:
Towards a synthetic analysis of user's information need for more effective personalized filtering services.
852-859
- Baptiste Jeudy, Christine Largeron, François Jacquenet:
A model for managing collections of patterns.
860-865
- Taciana A. Vanderlei, Frederico Araujo Durão, Alexandre Costa Martins, Vinicius Cardoso Garcia, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
A cooperative classification mechanism for search and retrieval software components.
866-871
- Jacques Savoy:
Why do successful search systems fail for some topics.
872-877
- Neil O'Hare, Cathal Gurrin, Gareth J. F. Jones, Hyowon Lee, Noel E. O'Connor, Alan F. Smeaton:
Using text search for personal photo collections with the MediAssist system.
880-881
- Daze Wang, Ying Zhou, Joseph Davis:
Query optimizing on a decentralized web search engine.
880-881
- Alana Platt, Nazli Goharian, Saket S. R. Mengle:
On using user query sequence to detect off-topic search.
882-883
Mobile computing and applications
- Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
A mobile sensor control method for sparse sensor networks.
886-890
- Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
An efficient TDMA slot assignment protocol in mobile ad hoc networks.
891-895
- Taniguchi Tetsuya, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Topology information generation methods using a routing table in ad hoc network applications.
896-900
- Debopam Acharya, Vijay Kumar, Gi-Chul Yang:
DAYS mobile: a location based data broadcast service for mobile users.
901-905
- Taesoo Jun, Christine Julien:
Automated routing protocol selection in mobile ad hoc networks.
906-913
- José Maria Monteiro, Angelo Brayner, Sérgio Lifschitz:
A mechanism for replicated data consistency in mobile computing environments.
914-919
- Ajey Kumar, Manoj Misra, Anil Kumar Sarje:
A weighted cache replacement policy for location dependent data in mobile environments.
920-924
- Shu-Yu Fu, Chuan-Ming Liu:
An effective kNN search protocol in wireless broadcast environments.
925-929
- Luiz A. Paula Lima Jr., Alcides Calsavara:
A framework for CORBA interoperability in ad hoc networks.
930-934
- Angelo Brayner, Ronaldo Menezes:
Balancing energy consumption and memory usage in sensor data processing.
935-939
- William Claycomb, Dongwan Shin:
Towards secure resource sharing for impromptu collaboration in pervasive computing.
940-946
- Cléver Ricardo Guareis de Farias, Marcos M. Leite, Camilo Zardo Calvi, Rodrigo Mantovaneli Pessoa, José Gonçalves Pereira Filho:
A MOF metamodel for the development of context-aware mobile applications.
947-952
- Kuo-Qin Yan, Shu-Chin Wang, G. Y. Zheng:
Dual agreement virtual subnet protocol for mobile ad-hoc networks.
953-954
- Yohei Sawai, Masako Shinohara, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Quorum-based consistency management among replicas in ad hoc networks with data update.
955-956
- Wei-Guang Teng, Ming-Chia Chou:
Mining communities of acquainted mobile users on call detail records.
957-958
- Chow Kin Wah, Qing Li:
IS_SDM: an in-network semantic sensor data model.
959-960
Model transformation
- Marcos Didonet Del Fabro, Patrick Valduriez:
Semi-automatic model integration using matching transformations and weaving models.
963-970
- Michael Lawley, Kerry Raymond:
Implementing a practical declarative logic-based model transformation engine.
971-977
- Dániel Varró, Zoltan Balogh:
Automating model transformation by example using inductive logic programming.
978-984
- Thomas Cleenewerck, Ivan Kurtev:
Separation of concerns in translational semantics for DSLs in model engineering.
985-992
- Andrés Vignaga, M. Cecilia Bastarrica:
Transforming system operations' interactions into a design class diagram.
993-997
- Maher Lamari:
Towards an automated test generation for the verification of model transformations.
998-1005
- Orlando Avila-García, Antonio Estévez, E. Victor Sánchez Rebull:
Using software product lines to manage model families in model-driven engineering.
1006-1011
- Juan M. Vara, Belén Vela, José María Cavero, Esperanza Marcos:
Model transformation for object-relational database development.
1012-1019
- Jesús Sánchez Cuadrado, Jesús García Molina:
A phasing mechanism for model transformation languages.
1020-1024
- Antonio Cicchetti, Davide Di Ruscio, Amleto Di Salle:
Software customization in model driven development of web applications.
1025-1030
- Ivo Raedts, Marija Petkovic, Alexander Serebrenik, Jan Martijn E. M. van der Werf, Lou J. Somers, Maarten Boote:
A software framework for automated verification.
1031-1032
- Pedro J. Clemente, Juan Hernández, Fernando Sánchez:
An MDA approach to develop systems based on components and aspects.
1033-1034
- Antonio Cicchetti, Alessandro Rossini:
Weaving models in conflict detection specifications.
1035-1036
- Matthias Erche, Michael Wagner, Christian Hein:
Mapping visual notations to MOF compliant models with QVT relations.
1037-1038
Multimedia and visualization track
- JeongKyu Lee, Jung-Hwan Oh, Subodh Kumar Shah, Xiaohui Yuan, Shou Jiang Tang:
Automatic classification of digestive organs in wireless capsule endoscopy videos.
1041-1045
- Chih-Chang Chen, Damon Shing-Min Liu:
Use of hardware Z-buffered rasterization to accelerate ray tracing.
1046-1050
- Erkan Yavuz, Ziya Telatar:
Improved SVD-DWT based digital image watermarking against watermark ambiguity.
1051-1055
- Vincent S. Tseng, Ja-Hwung Su, Bo-Wen Wang, Yu-Ming Lin:
Web image annotation by fusing visual features and textual information.
1056-1060
- Daniel Corrêa Lobato, Matheus Qualio Barbosa, Maria da Graça Campos Pimentel, César A. C. Teixeira:
MOJOHON: a channel-driven communication architecture for applications deployed on the internet.
1061-1066
- Svetlana Mansmann, Marc H. Scholl:
Exploring OLAP aggregates with hierarchical visualization techniques.
1067-1073
- Alex Sandro da Cunha Rego, Cláudio de Souza Baptista, Elvis Rodrigues da Silva, Ulrich Schiel, Hugo Feitosa de Figueirêdo:
VideoLib: a video digital library with support to spatial and temporal dimensions.
1074-1078
- Donald A. Adjeroh, U. Kandaswamy, Nan Zhang, Amar Mukherjee, M. T. Brown, Tim Bell:
BWT-based efficient shape matching.
1079-1085
- Hangzai Luo, Jianping Fan, Shin'ichi Satoh, William Ribarsky:
Large scale news video database browsing and retrieval via information visualization.
1086-1087
- Antoine Pigeau, Afshin Nikseresht, Marc Gelgon:
Fast tracking of hierarchical partitions with approximate kl-divergence for geo-temporal organization of personal images.
1088-1089
- Nilma Perera, Albert Goodman, Kathy Blashki:
Preattentive processing: using low-level vision psychology to encode information in visualisations.
1090-1091
Object oriented programming languages and systems
Operating systems and adaptive applications
- Li-Pin Chang:
On efficient wear leveling for large-scale flash-memory storage systems.
1126-1130
- Junghoon Lee, Mikyung Kang, Abhijit Saha:
A fair scheduling scheme for a time-sensitive traffic over the dual-channel wireless network.
1131-1135
- Mei-Ling Chiang, Jia-Shin Huang:
Improving the performance of log-structured file systems with adaptive block rearrangement.
1136-1140
- Haklin Kimm, Sung Y. Shin, Chang Oan Sung:
Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system.
1141-1145
- HyunBin Lee, YongJoo Song, Kyungbaek Kim, Donggook Kim, Daeyeon Park:
CriStore: dynamic storage system for heterogeneous devices in off-site ubiquitous communities.
1146-1150
- Tai-Yi Huang, Kai-Yuan Hou, Huang-Yi Yu, Edward T.-H. Chu, Chung-Ta King:
LA-TinyOS: a locality-aware operating system for wireless sensor networks.
1151-1158
- Hong Min, Sangho Yi, Yookun Cho, Jiman Hong:
An efficient dynamic memory allocator for sensor operating systems.
1159-1164
- Davy Preuveneers, Yolande Berbers:
Towards context-aware and resource-driven self-adaptation for mobile handheld applications.
1165-1170
- HongGeun Kim, JungKyu Han, Seongje Cho:
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices.
1171-1175
- Ya-Shu Chen, Song-Jian Tang, Shi-Wu Lo:
A priority assignment strategy of processing elements over an on-chip bus.
1176-1180
- Boncheol Gu, Yongtae Kim, Junyoung Heo, Yookun Cho:
Shared-stack cooperative threads.
1181-1186
- Janghaeng Lee, Sung Ho Hwang, Neungsoo Park, Seong-Won Lee, Sungik Jun, Young Soo Kim:
A high performance NIDS using FPGA-based regular expression matching.
1187-1191
- Sung-Kwan Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh, Sang Lyul Min:
Virtual framework for testing the reliability of system software on embedded systems.
1192-1196
- Yuki Kinebuchi, Hidenari Koshimae, Tatsuo Nakajima:
Constructing machine emulator on portable microkernel.
1197-1198
- YongJoo Song, Daeyeon Park:
Providing context-awareness to virtual file system.
1199-1200
- Sangho Yi, Hong Min, Seungwoo Lee, Yeongkwun Kim, Injoo Jeong:
SESAME: space-efficient stack allocation mechanism for multi-threaded sensor operating systems.
1201-1202
- Prem Uppuluri, Sachin Singh, Uday Joshi:
RemoteFS: accessing remote file systems for desktop grid computing.
1203-1204
Organizational engineering
- Mari Inoki, Yoshiaki Fukazawa:
Software product line evolution method based on kaizen approach.
1207-1214
- Christian Braun, Robert Winter:
Integration of IT service management into enterprise architecture.
1215-1219
- Abdul Babar, Karl Cox, Steven J. Bleistein, June M. Verner:
Towards evolution of strategic IT requirements.
1220-1227
- Christoph Rosenkranz, Roland Holten:
Combining cybernetics and conceptual modeling: the concept of variety in organizational engineering.
1228-1233
- Kelly Rosa Braghetto, João Eduardo Ferreira, Calton Pu:
Using control-flow patterns for specifying business processes in cooperative environments.
1234-1241
- Hernâni Mourão, Pedro Antunes:
Supporting effective unexpected exceptions handling in workflow management systems.
1242-1249
- Thomas Neubauer, Christian Stummer:
Extending business process management to determine efficient IT investments.
1250-1256
- Artur Caetano, João Pombinho, José M. Tribolet:
Representing organizational competencies.
1257-1262
- Agnes Koschmider, Andreas Oberweis:
How to detect semantic business process model variants?
1263-1264
- Birgit Korherr, Beate List:
Extending the EPC with performance measures.
1265-1266
Programming for separation of concerns
Programming languages
- Lunjin Lu:
Implementing type-based constructive negation.
1299-1306
- Armelle Bonenfant, Zezhi Chen, Kevin Hammond, Greg Michaelson, Andrew M. Wallace, Iain Wallace:
Towards resource-certified software: a formal cost model for time and its application to an image-processing example.
1307-1314
- Maurizio Cimadamore, Mirko Viroli:
Reifying wildcards in Java using the EGO approach.
1315-1322
- Jaewook Shin, Paul D. Hovland:
Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive.
1323-1329
- Avik Paul, Rajeev Kumar:
Precise dynamic slicing using execution-summary.
1330-1331
- Soichiro Hidaka, Hiroyuki Kato, Masatoshi Yoshikawa:
A relative cost model for XQuery.
1332-1333
Semantic web and applications
- Palakorn Achananuparp, Hyoil Han, Olfa Nasraoui, Roberta Johnson:
Semantically enhanced user modeling.
1335-1339
- Hak Lae Kim, Suk-hyung Hwang, Hong-Gee Kim:
FCA-based approach for mining contextualized folksonomy.
1340-1345
- Trivikram Immaneni, Krishnaprasad Thirunarayan:
Hybrid retrieval from the unified web.
1346-1350
- Peter Haase, Yimin Wang:
A decentralized infrastructure for query answering over distributed ontologies.
1351-1356
- Deendayal Dinakarpandian, Tuanjie Tong, Yugyung Lee:
Modeling biomedical assertions in the semantic web.
1357-1361
- Samhaa R. El-Beltagy, Maryam Hazman, Ahmed A. Rafea:
Ontology based annotation of text segments.
1362-1367
- Armin Haller, Paavo Kotinurmi, Tomas Vitvar, Eyal Oren:
Handling heterogeneity in RosettaNet messages.
1368-1374
- Holger Billhardt, Ramón Hermoso, Sascha Ossowski, Roberto Centeno:
Trust-based service provider selection in open environments.
1375-1380
- Hao Wu, Hai Jin, Xiaomin Ning:
An approach for indexing, storing and retrieving domain knowledge.
1381-1382
Semantic-based resource discovery,
retrieval and composition (SDRC)
Software engineering
- Dae-Kyoo Kim, Wuwei Shen:
An approach to evaluating structural pattern conformance of UML models.
1404-1408
- Pedro de Alcântara dos Santos Neto, Rodolfo F. Resende, Clarindo Isaías Pereira da Silva e Pádua:
Requirements for information systems model-based testing.
1409-1415
- Chengying Mao, Yansheng Lu, Jinlong Zhang:
Regression testing for component-based software via built-in test design.
1416-1421
- Martin Höst, Christin Lindholm:
Different conceptions in software project risk assessment.
1422-1426
- Elthon A. S. Oliveira, Hyggo Oliveira de Almeida, Leandro Dias da Silva:
Formal modelling and verification of a component model using coloured petri nets and model checking.
1427-1431
- Pradeep Varma:
Generalizing recognition of an individual dialect in program analysis and transformation.
1432-1439
- Kim Weyns, Per Runeson:
Sensitivity of software system reliability to usage profile changes.
1440-1444
- Fakhar Lodhi, Muhammad Ahmad Ghazali:
Design of a simple and effective object-to-relational mapping technique.
1445-1449
- Marcos Forte, Renato A. T. Claudino, Wanderley Lopes de Souza, Antônio Francisco do Prado, Luiz H. Z. Santana:
A component-based framework for the internet content adaptation domain.
1450-1455
- Giuseppe Di Santo, Eugenio Zimeo:
Reversing GUIs to XIML descriptions for the adaptation to heterogeneous devices.
1456-1460
- Fares Saad-Khorchef, Antoine Rollet, Richard Castanet:
A framework and a tool for robustness testing of communicating software.
1461-1466
- Fei-Ching Kuo, Tsong Yueh Chen, Huai Liu, W. K. Chan:
Enhancing adaptive random testing in high dimensional input domains.
1467-1472
- Soojin Park, Sooyong Park, Vijayan Sugumaran:
Extending reusable asset specification to improve software reuse.
1473-1478
- Lorie M. Liebrock:
Integration of well posedness analysis in software engineering.
1479-1483
- Victor K. Y. Chan, W. Eric Wong:
Outlier elimination in construction of software metric models.
1484-1488
- Lei Wu, Yi Feng, Hua Yan:
Software reengineering with architecture decomposition.
1489-1493
- Dietmar Schreiner, Karl M. Göschka:
Modeling component based embedded systems applications with explicit connectors in UML 2.0.
1494-1495
- Rodrigo Perozzo Noll, Marcelo Blois Ribeiro:
Enhancing traceability using ontologies.
1496-1497
Software verification
System on chip design and software supports (SODSS)
- ZhiLei Chai, Wenke Zhao, Wenbo Xu:
Real-time Java processor optimized for RTSJ.
1540-1544
- Soo Yun Hwang, Hyeong Jun Park, Kyoung Son Jhang:
An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix.
1545-1551
- Ning Qu, Yulai Zhao, Xuetao Guan, Xu Cheng:
Unichos: a full system simulator for thin client platform.
1552-1556
- Orlando Moreira, Jacob Jan-David Mol, Marco Bekooij:
Online resource management in a multiprocessor with a network-on-chip.
1557-1564
- Hyun-min Kyung, Gi-Ho Park, Jong Wook Kwak, WooKyeong Jeong, Tae-Jin Kim, Sung-Bae Park:
Performance monitor unit design for an AXI-based multi-core SoC platform.
1565-1572
Trust,
recommendations,
evidence and other collaboration know-how (TRECK'07)
Ubiquitous computing:
digital spaces,
services and content
- Krista M. Dombroviak, Rajiv Ramnath:
A taxonomy of mobile and pervasive applications.
1609-1615
- Hiroaki Kimura, Eiji Tokunaga, Tatsuo Nakajima:
System support for mobile augmented reality services.
1616-1623
- Fahim Kawsar, Kaori Fujinami, Tatsuo Nakajima:
A lightweight indoor location model for sentient artefacts using sentient artefacts.
1624-1631
- Erwin Aitenbichler, Fernando Lyardet, Gerhard Austaller, Jussi Kangasharju, Max Mühlhäuser:
Engineering intuitive and self-explanatory smart products.
1632-1637
- Shinyoung Yi, Jiyoung Yi, Hojung Cha:
Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices.
1638-1639
Web technologies
- Nanjangud C. Narendra, Bart Orriëns:
Modeling web service composition and execution via a requirements-driven approach.
1642-1648
- Xinwu Cheng, Lei Li, Jun Wei:
Automatic enactment of message exchange pattern for web services.
1649-1653
- Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia:
Decentralized authorization and data security in web content delivery.
1654-1661
- Ustun Yildiz, Claude Godart:
Towards decentralized service orchestrations.
1662-1666
- Yoo Jung An, James Geller, Yi-Ta Wu, Soon Ae Chun:
Semantic deep web: automatic attribute extraction from the deep web data sources.
1667-1672
- James D. Palmer:
Exploiting bibliographic web services with CiTeX.
1673-1676
- Damiano Distante, Gustavo Rossi, Gerardo Canfora:
Modeling business processes in web applications: an analysis framework.
1677-1682
- Aliaksandr Birukou, Enrico Blanzieri, Vincenzo D'Andrea, Paolo Giorgini, Natallia Kokash, Alessio Modena:
IC-service: a service-oriented approach to the development of recommendation systems.
1683-1688
- Yu Huang, Hanpin Wang:
A petri net semantics for web service choreography.
1689-1690
- Yaojin Yang, Lasse Pajunen:
Towards supporting user interface agility in developing heterogeneous device enabled business processes.
1691-1692
- Aabhas V. Paliwal, Nabil R. Adam, Christof Bornhövd:
Web service orchestration and verification using MSC and CP nets.
1693-1694
Copyright © Fri Mar 12 17:20:37 2010
by Michael Ley (ley@uni-trier.de)