


default search action
22nd SAC 2007: Seoul, Korea
- Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo:

Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007. ACM 2007, ISBN 1-59593-480-4
Advances in spatial and image-based information systems
- Mattias Andersson, Joachim Gudmundsson

, Patrick Laube
, Thomas Wolle:
Reporting leadership patterns among trajectories. 3-7 - Alexander Kolesnikov, Alexander Akimov:

Distortion-constrained compression of vector maps. 8-12 - Tao Wan, Karine Zeitouni

, Xiaofeng Meng:
An OLAP system for network-constrained moving objects. 13-18 - Arianna D'Ulizia

, Fernando Ferri
, Anna Formica
, Patrizia Grifoni
, Maurizio Rafanelli:
Structural similarity in geographical queries to improve query answering. 19-23 - Jejung Lee, Yugyung Lee, Sanket Shah, James Geller:

HIS-KCWater: context-aware geospatial data and service integration. 24-29
Agents, interactions, mobility and systems
- Rubens Fernandes Nunes, Creto Augusto Vidal, Joaquim B. Cavalcante Neto:

A flexible representation of controllers for physically-based animation of virtual humans. 30-36 - Camila Nunes, Marcílio Ferreira, Hyggo Oliveira de Almeida

:
Applying a component-based framework to develop multi-agent environments: case study. 37-41 - Giuseppe Di Fatta

, Giancarlo Fortino
:
A customizable multi-agent system for distributed data mining. 42-47 - Guido van 't Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum:

Guarding security sensitive content using confined mobile agents. 48-55 - Vasco Furtado

, Adriano Melo, André L. V. Coelho
, Ronaldo Menezes
:
A crime simulation model based on social networks and swarm intelligence. 56-57
Artificial intelligence, computational logic, and image analysis
- Khalil Djelloul, Thi-Bich-Hanh Dao, Thom W. Frühwirth:

Toward a first-order extension of Prolog's unification using CHR: a CHR first-order constraint solver over finite or infinite trees. 58-64 - Luciano Caroprese

, Irina Trubitsyna
, Ester Zumpano:
A framework for prioritized reasoning based on the choice evaluation. 65-70 - Muhammad Sarfraz, Aiman Rashid:

A randomized knot insertion algorithm for outline capture of planar images using cubic spline. 71-75 - Gang Zhang, Zong Min Ma

, Zhiping Cai:
Directed filter for dominant direction fuzzy set in content-based image retrieval. 76-77 - ChenGuang Liu, Kazuyuki Tanaka:

Eigen-distribution on assignments for game trees with random properties. 78-79 - Enmin Song, Luan Jiang, Bo Meng, Renchao Jin, Xiangyang Xu, Chih-Cheng Hung:

Mass edge detection in mammography based on plane fitting and dynamic programming. 80-81 - Depei Bao, Zehong Yang, Yixu Song:

Projection function for driver fatigue monitoring with monocular camera. 82-83
Autonomic computing
- Edin Arnautovic, Hermann Kaindl

, Jürgen Falb, Roman Popp
, Alexander Szep:
Gradual transition towards autonomic software systems based on high-level communication specification. 84-89 - Michael G. Hinchey

, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan:
Bionic autonomic nervous system and self-healing for NASA ANTS-like missions. 90-96 - Yu Zhou, Jian Pan, Xiaoxing Ma

, Bin Luo, XianPing Tao, Jian Lu:
Applying ontology in architecture-based self-management applications. 97-103 - Rui Zhang, Steve Moyle, Steve McKeever

, Alan Bivens:
Performance problem localization in self-healing, service-oriented systems using Bayesian networks. 104-109 - Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque:

Self-healing for autonomic pervasive computing. 110-111
Bioinformatics
- Hee-Jeong Jin, Hwan-Gue Cho:

Hierarchical alignment graph for gene teams finding on whole genomes. 113-117 - Pavithra G. Naidu, Mathew J. Palakal, Shielly Hartanto:

On-the-fly data integration models for biological databases. 118-122 - Kuan-Ming Lin, Jaewoo Kang:

Exploiting inter-gene information for microarray data integration. 123-127 - Fa Zhang, Lin Xu, Zhiyong Liu, Bo Yuan:

Improved structural modeling based on conserved domain clusters and structure-anchored alignments. 128-132 - Xiaoyong Fang, Zhenghua Wang, Zhigang Luo, Bo Yuan, Fan Ding:

The detection and assessment of possible RNA secondary structure using multiple sequence alignment. 133-137 - Yin-Fu Huang, Yi-Chao Jhan, Sing-Wu Liou:

Finding putative core promoter elements with position-dependent consensuses. 138-139 - Xiandong Meng, Vipin Chaudhary

:
An adaptive data prefetching scheme for biosequence database search on reconfigurable platforms. 140-141 - Hisham Al-Mubaid

, Hoa A. Nguyen:
Semantic distance of concepts within a unified framework in the biomedical domain. 142-143 - Chao-Tung Yang

, Tsu-Fen Han, Heng-Chuan Kan:
On construction of a BioGrid platform for parallel bioinformatics applications. 144-145
Computer applications in health care
- Roshan Dharshana Yapa, Harada Koichi:

A connected component labeling algorithm for grayscale images and application of the algorithm on mammograms. 146-152 - Sarah Lopez, Guoqing Lu, Zhengxin Chen:

Modeling miRNA data. 158-162 - Marco de Sá, Luís Carriço

, Pedro Antunes
:
Defining personalized therapies for handheld devices. 163-164 - David Gil

, Antonio Soriano Payá, Daniel Ruiz Fernández, Carlos Alberto Montejo Hernández:
Embedded system for diagnosing dysfunctions in the lower urinary tract. 1695-1699
Computer ethics and human values
- Sabah S. Al-Fedaghi

:
How sensitive is your personal information? 165-169
Computer forensics
- Yacine Djemaiel, Noureddine Boudriga:

A global marking scheme for tracing cyber attacks. 170-174 - Ricci S. C. Ieong, H. C. Leung:

Deriving cse-specific live forensics investigation procedures from FORZA. 175-180 - Antonio Savoldi, Paolo Gubian:

SIM and USIM filesystem: a forensics perspective. 181-187 - Amel Meddeb

, Yacine Djemaiel, Noureddine Boudriga:
Global intrusion detection and tolerance in networked systems. 188-189 - Lorie M. Liebrock, Nico Marrero, David P. Burton, Ron Prine, E. Cornelius, M. Shakamuri, Vincent Urias:

A preliminary design for digital forensics analysis of terabyte size data sets. 190-191
Computer networks
- Chi-Jen Wu

, Ren-Hung Hwang
, Jan-Ming Ho:
A scalable overlay framework for internet anycasting service. 193-197 - Xiaolong Jin, Geyong Min:

An analytical model for generalized processor sharing scheduling with heterogeneous network traffic. 198-202 - Paulo Sérgio Sausen

, Marco Aurélio Spohn
, Antonio Marcus Nogueira de Lima
, Angelo Perkusich
:
Bounded-distance multi-coverage backbones in wireless sensor networks. 203-208 - Daniel M. Batista, Nelson L. S. da Fonseca

, Flávio Keidi Miyazawa
:
A set of schedulers for grid networks. 209-213 - Sangmin Kim, VamsiKrishna Vasireddy, Khaled Harfoush:

Scalable coordination for sensor networks in challenging environments. 214-221 - Guillaume Chelius, Antoine Fraboulet, Eric Fleury:

Worldsens: a fast and accurate development framework for sensor network applications. 222-226 - Solange Rito Lima

, Pedro Nuno Miranda de Sousa, Paulo Carvalho
:
Enhancing QoS metrics estimation in multiclass networks. 227-231 - Yunqi Li, Jiahai Yang, Changqing An

, Hui Zhang:
Finding hierarchical heavy hitters in network measurement system. 232-236 - Yu-Chieh Lin

, Hsung-Pin Chang
:
VA-TCP: a vertical handoff-aware TCP. 237-238
Computer security
- Arie Orlovsky, Danny Raz:

Decentralized enforcement of security policies for distributed computational systems. 241-248 - Yi Mu, Willy Susilo

, Huafei Zhu:
Compact sequential aggregate signatures. 249-253 - Xiang Zhou, Min Huang, Zhiyong Peng:

An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. 254-258 - Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour

:
RAAS: a reliable analyzer and archiver for snort intrusion detection system. 259-263 - Sungwon Yi

, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das:
Memory-efficient content filtering hardware for high-speed intrusion detection systems. 264-269 - K. H. S. Sabaragamu Koralalage, Mohammad Reza Selim, Junichi Miura, Yuichi Goto

, Jingde Cheng:
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. 270-275 - Anh-Quynh Nguyen, Yoshiyasu Takefuji

:
Towards a tamper-resistant kernel rootkit detector. 276-283 - Martin Johns

, Christian Beyerlein:
SMask: preventing injection attacks in web applications by approximating automatic data/code separation. 284-291 - Umut Topkara, Mikhail J. Atallah, Mercan Topkara:

Passwords decay, words endure: secure and re-usable multiple password mnemonics. 292-299 - Stefano Bistarelli

, Fabio Fioravanti
, Pamela Peretti:
Using CP-nets as a guide for countermeasure selection. 300-304
Constraint solving and programming
- Thibaut Feydy, Peter J. Stuckey:

Propagating dense systems of integer linear equations. 306-310 - Mats Petter Pettersson, Radoslaw Szymanek, Krzysztof Kuchcinski

:
A CP-LP approach to network management in OSPF routing. 311-315 - Lucas Bordeaux, Horst Samulowitz:

On the stochastic constraint satisfaction framework. 316-320 - Lucas Bordeaux, Lintao Zhang:

A solver for quantified Boolean and linear constraints. 321-325 - Yahia Lebbah

, Claude Michel, Michel Rueher:
Using constraint techniques for a safe and fast implementation of optimality-based reduction. 326-331 - Alan Holland:

Injection/withdrawal scheduling for natural gas storage facilities. 332-333 - Kathryn Francis, Peter J. Stuckey:

Constraint propagation for loose constraint graphs. 334-335 - Malek Mouhoub, Amrudee Sukpan:

Solving conditional and composite constraint satisfaction problems. 336-337
Coordination models, languages and applications
- Yingbo Liu, Jianmin Wang

, Jiaguang Sun:
A machine learning approach to semi-automating workflow staff assignment. 340-345 - Sun Meng, Farhad Arbab:

Web services choreography and orchestration in Reo and constraint automata. 346-353 - Mirko Viroli

, Matteo Casadei, Luca Gardelli:
A self-organising solution to the collective sort problem in distributed tuple spaces. 354-359 - Lyndon J. B. Nixon, Olena Antonechko, Robert Tolksdorf:

Towards Semantic tuplespace computing: the Semantic web spaces system. 360-365 - Kevin Marth, Shangping Ren:

Extending the ARC model with generative coordination. 366-367 - Michael Schumacher, Tim Van Pelt, Ion Constantinescu, Alexandre de Oliveira e Sousa, Boi Faltings:

Federated directories of Semantic web services. 368-369
Data mining
- Grigorios Loukides, Jianhua Shao:

Capturing data usefulness and privacy protection in K-anonymisation. 370-374 - Jun-Lin Lin, Julie Yu-Chih Liu

:
Privacy preserving itemset mining through fake transactions. 375-379 - Traian Marius Truta, Alina Campan:

K-anonymization incremental maintenance and optimization techniques. 380-387 - Wang Lian, David W. Cheung, Siu-Ming Yiu:

Maintenance of maximal frequent itemsets in large databases. 388-392 - Ghazi Al-Naymat

, Sanjay Chawla, Joachim Gudmundsson
:
Dimensionality reduction for long duration and complex spatio-temporal queries. 393-397 - Songbo Tan, Xueqi Cheng:

Using hypothesis margin to boost centroid text classifier. 398-403 - Toon Calders, Bart Goethals

, Michael Mampaey:
Mining itemsets in the presence of missing values. 404-408 - Pasquale Rullo, Chiara Cumbo, Veronica L. Policicchio:

Learning rules with negation for text categorization. 409-416 - Jeroen De Knijf:

FAT-miner: mining frequent attribute trees. 417-422 - Youngju Son, Hasan M. Jamil

, Farshad Fotouhi:
Exploiting types for improved schema mapping. 423-429 - Jianlong Qi, Jian Tang:

Integrating gene ontology into discriminative powers of genes for feature selection in microarray data. 430-434 - Li Xiong

, Subramanyam Chitti, Ling Liu:
Mining multiple private databases using a kNN classifier. 435-440 - Seung-won Hwang, Hwanjo Yu:

Mining and processing category ranking. 441-442 - Céline Hébert, Alain Bretto

, Bruno Crémilleux:
Optimizing hypergraph transversal computation with an anti-monotone constraint. 443-444 - Ana Paula Appel, Adriano Arantes Paterlini, Elaine P. M. de Sousa

, Agma J. M. Traina, Caetano Traina Jr.
:
Biased box sampling - a density-biased sampling for clustering. 445-446
Data streams
- Eduardo Jaques Spinosa, André Carlos Ponce de Leon Ferreira de Carvalho

, João Gama
:
OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streams. 448-452 - Longbo Zhang, Zhanhuai Li, Yiqiang Q. Zhao, Yu Min, Zhang Yang:

A priority random sampling algorithm for time-based sliding windows over weighted streaming data. 453-456 - Elio Masciari

:
RFID data management for effective objects tracking. 457-461 - Marcelo Keese Albertini

, Rodrigo Fernandes de Mello
:
A self-organizing neural network for detecting novelties. 462-466 - Carlos Pinto, João Gama

:
Incremental discretization, application to data with concept drift. 467-468
Database theory, technology, and applications
- Zhenglu Yang

, Botao Wang, Masaru Kitsuregawa:
General dominant relationship analysis based on partial order models. 470-474 - Weihai Yu, Jie Yang:

Continuation-passing enactment of distributed recoverable workflows. 475-481 - Nobutaka Suzuki:

An edit operation-based approach to the inclusion problem for DTDs. 482-488 - James J. Lu, Chia-Hsin Huang, Tyng-Ruey Chuang

:
Querying and browsing XML and relational data sources. 489-493 - Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri, Diogo Tuler Forlani, Agma J. M. Traina, Fernando da Fonseca de Souza

:
Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries. 494-499 - Ali Saman Tosun:

Equivalent disk allocations. 500-505 - Gae-won You, Seung-won Hwang:

Personalized ranking: a contextual ranking approach. 506-510 - Ying Qiao, Kang Zhong, Hongan Wang, Xiang Li:

Developing event-condition-action rules in real-time active database. 511-516 - Jongho Nang, Joohyoun Park:

An efficient indexing structure for content based multimedia retrieval with relevance feedback. 517-524 - Guangming Xing, Zhonghang Xia, Andrew Ernest:

Building automatic mapping between XML documents using approximate tree matching. 525-526 - Gisele Busichia Baioco

, Agma J. M. Traina, Caetano Traina Jr.
:
An effective cost model for similarity queries in metric spaces. 527-528 - Ilias Michalarias, Christian Becker:

Multidimensional querying in wireless ad hoc networks. 529-530
Dependable and adaptive distributed systems
- Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:

An adaptive randomized search protocol in peer-to-peer systems. 533-537 - Tiejun Ma, Jane Hillston, Stuart Anderson

:
Evaluation of the QoS of crash-recovery failure detection. 538-542 - Michael A. Jaeger, Helge Parzyjegla, Gero Mühl, Klaus Herrmann:

Self-organizing broker topologies for publish/subscribe systems. 543-550 - Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:

A new adaptive accrual failure detector for dependable distributed systems. 551-555 - José Enrique Armendáriz-Iñigo

, J. R. Juárez-Rodríguez
, José Ramón González de Mendívil, Hendrik Decker, Francesc D. Muñoz-Escoí
:
k-bound GSI: a flexible database replication protocol. 556-560 - Giovanni Aloisio

, Massimo Cafaro
, Sandro Fiore
, Maria Mirto, Salvatore Vadacca:
GReIC data gather service: a step towards P2P production grids. 561-565 - Giovanna Di Marzo Serugendo

, John S. Fitzgerald
, Alexander B. Romanovsky
, Nicolas Guelfi:
A metadata-based architectural model for dynamically resilient systems. 566-572 - Vincent Gramoli, Emmanuelle Anceaume, Antonino Virgillito:

SQUARE: scalable quorum-based atomic memory with local reconfiguration. 574-579 - Dhouha Ayed, Yolande Berbers:

Dynamic adaptation of CORBA component-based applications. 580-585 - Robert John Walters, Peter Henderson, Stephen Crouch

:
Selecting a distributed agreement algorithm. 586-587 - Sushanta Karmakar, Arobinda Gupta:

Adaptive broadcast by distributed protocol switching. 588-589 - Piotr Karwaczynski, Dariusz Konieczny, Jaka Mocnik, Marko Novak:

Dual proximity neighbour selection method for peer-to-peer-based discovery service. 590-591
Document engineering
- Georg Vogeler

, Stefan Gruner, Benjamin Burkard:
New specialist tools for medieval document XML markup. 594-599 - Sylvain Lamprier, Tassadit Amghar, Bernard Levrat, Frédéric Saubion:

ClassStruggle: a clustering based text segmentation. 600-604 - Wafa Boussellaa, Abderrazak Zahour, Adel M. Alimi

:
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods. 605-609 - Rafael Dueire Lins, João Marcelo Monte da Silva:

A quantitative method for assessing algorithms to remove back-to-front interference in documents. 610-616 - Xin Jin, Rongyan Li, Xian Shen, Rongfang Bie:

Automatic web pages categorization with ReliefF and Hidden Naive Bayes. 617-621 - Luiz Antônio Pereira Neves, João Marques de Carvalho, Jacques Facon

, Flávio Bortolozzi
:
A table-form extraction with artefact removal. 622-626 - Sabine Barrat, Salvatore Tabbone:

A progressive learning method for symbols recognition. 627-631 - Cinthia Obladen de Almendra Freitas, Luiz S. Oliveira, Simone B. K. Aires

, Flávio Bortolozzi
:
Zoning and metaclasses for character recognition. 632-636 - Cesar R. Santos, Flávio Bortolozzi

, Luiz S. Oliveira, Edson J. R. Justino:
Off-line signature verification based on forensic questioned document examination approach. 637-638 - João Marcelo Monte da Silva, Rafael Dueire Lins:

A fast algorithm to binarize and filter documents with back-to-front interference. 639-640
E-commerce technologies
- María-Emilia Cambronero, Juan José Pardo, Gregorio Díaz

, Valentín Valero
:
Using RT-UML for modelling web services. 643-648 - Huseyin Polat, Wenliang Du:

Effects of inconsistently masked data using RPT on CF with privacy. 649-653 - Alan Silva, José Alencar Neto, Ig Ibert Bittencourt:

A computation environment for automated negotiation: a case study in electronic tourism. 654-658
Embedded systems: applications, solutions, and techniques
- Xianhua Liu

, Jiyu Zhang, Xu Cheng:
Efficient code size reduction without performance loss. 666-672 - Thomas Gustafsson, Aleksandra Tesanovic, Ying Du, Jörgen Hansson:

Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach. 673-679 - Wei-Hsuan Hung, Yi-Jung Chen, Chia-Lin Yang

, Yen-Sheng Chang, Alan P. Su:
An architectural co-synthesis algorithm for energy-aware network-on-chip design. 680-684 - Tien N. Nguyen:

Component-based version management for embedded computing system design. 685-692 - Young-Jin Kim, Kwon-Taek Kwon, Jihong Kim:

Energy-efficient disk replacement and file placement techniques for mobile systems with hard disks. 693-698 - Jason Hiser, Jack W. Davidson, David B. Whalley:

Fast, accurate design space exploration of embedded systems memory configurations. 699-706 - Afrin Naz, Krishna M. Kavi, Jung-Hwan Oh, Pierfrancesco Foglia

:
Reconfigurable split data caches: a novel scheme for embedded systems. 707-712 - Sylvain Stanchina

, Matthias Meyer:
Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collection. 713-718
Evolutionary computation
- Richard Brunauer, Andreas Löcker, Helmut A. Mayer, Gerhard Mitterlechner, Hannes Payer:

Evolution of iterated prisoner's dilemma strategies with different history lengths in static and cultural environments. 720-727 - Ronaldo Menezes

, Francisco Martins, Francisca Emanuelle Vieira, Rafael Silva, Márcio Braga:
A model for terrain coverage inspired by ant's alarm pheromones. 728-732 - Raymond Chiong

:
Applying genetic algorithms to economy market using iterated prisoner's dilemma. 733-737 - Shih-Hsi Liu, Marjan Mernik, Barrett R. Bryant:

A clustering entropy-driven approach for exploring and exploiting noisy functions. 738-742 - Jason Teo

:
Investigating adaptive mutation in the generalized generation gap (G3) algorithm for unconstrained global optimization. 743-744 - Flávio Milsztajn, Klaus de Geus

:
Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms. 745-746 - Carlos M. Fernandes

, Vitorino Ramos, Agostinho C. Rosa
:
Stigmergic optimization in dynamic binary landscapes. 747-748
Geometric computing and reasoning
- Jean-François Dufourd:

A hypermap framework for computer-aided proofs in surface subdivisions: genus theorem and Euler's formula. 757-761 - Zhenbing Zeng, Meijing Shan:

Semi-mechanization method for a unsolved optimization problem in combinatorial geometry. 762-766 - Fadoua Ghourabi, Tetsuo Ida, Hidekazu Takahashi, Mircea Marin

, Asem Kasem
:
Logical and algebraic view of Huzita's origami axioms with applications to computational origami. 767-772 - Simon E. B. Thierry

, Pascal Mathis, Pascal Schreck:
Towards an homogeneous handling of under-constrained and well-constrained systems of geometric constraints. 773-777 - Kun Jiang, Yang Gao, Xingfeng Lv, Yang Zhan:

Parallel algorithms on geometric constraint solving. 778-779
Handheld computing
- Sheikh Iqbal Ahamed, Munirul M. Haque, Karl Stamm, Ahmed J. Khan:

Wellness assistant: a virtual wellness assistant using pervasive computing. 782-787 - Xin Liu, Ralph Deters

:
An efficient dual caching strategy for web service-enabled PDAs. 788-794 - Jung-Hi Min, Hojung Cha, Jongho Nang:

Energy management for interactive applications in mobile handheld systems. 795-799 - Raghunathan Shriram

, Vijayan Sugumaran
:
Adaptive middleware architecture for information sharing on mobile phones. 800-804
Information access and retrieval
- Wei Jin, Rohini K. Srihari:

Graph-based text representation and knowledge discovery. 807-811 - Daniel Schuster, Alexander Schill:

NL sampler: random sampling of web documents based on natural language with query hit estimation. 812-818 - Chengye Lu, Yue Xu

, Shlomo Geva
:
Translation disambiguation in web-based translation extraction for English-Chinese CLIR. 819-823 - Hady Wirawan Lauw

, Ee-Peng Lim
, HweeHwa Pang
:
TUBE (Text-cUBE) for discovering documentary evidence of associations among entities. 824-828 - Chen Ding, Jin Zhou:

Log-based indexing to improve web site search. 829-833 - Xue-Qiang Zeng, Ming-Wen Wang, Jian-Yun Nie

:
Text classification based on partial least square analysis. 834-838 - Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi:

Using a knowledge base to disambiguate personal name in web search results. 839-843 - Ana Cardoso-Cachopo, Arlindo L. Oliveira

:
Semi-supervised single-label text categorization using centroid-based classifiers. 844-851 - Randa Kassab, Jean-Charles Lamirel:

Towards a synthetic analysis of user's information need for more effective personalized filtering services. 852-859 - Baptiste Jeudy, Christine Largeron, François Jacquenet:

A model for managing collections of patterns. 860-865 - Taciana A. Vanderlei, Frederico Araújo Durão

, Alexandre Costa Martins, Vinicius Cardoso Garcia, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
A cooperative classification mechanism for search and retrieval software components. 866-871 - Jacques Savoy:

Why do successful search systems fail for some topics. 872-877 - Neil O'Hare, Cathal Gurrin

, Gareth J. F. Jones
, Hyowon Lee, Noel E. O'Connor
, Alan F. Smeaton
:
Using text search for personal photo collections with the MediAssist system. 880-881 - Daze Wang, Ying Zhou, Joseph G. Davis:

Query optimizing on a decentralized web search engine. 880-881 - Alana Platt, Nazli Goharian, Saket S. R. Mengle:

On using user query sequence to detect off-topic search. 882-883
Mobile computing and applications
- Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

A mobile sensor control method for sparse sensor networks. 886-890 - Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

An efficient TDMA slot assignment protocol in mobile ad hoc networks. 891-895 - Tetsuya Taniguchi, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Topology information generation methods using a routing table in ad hoc network applications. 896-900 - Debopam Acharya

, Vijay Kumar, Gi-Chul Yang:
DAYS mobile: a location based data broadcast service for mobile users. 901-905 - Taesoo Jun, Christine Julien

:
Automated routing protocol selection in mobile ad hoc networks. 906-913 - José Maria Monteiro, Angelo Brayner

, Sérgio Lifschitz
:
A mechanism for replicated data consistency in mobile computing environments. 914-919 - Ajey Kumar

, Manoj Misra, Anil Kumar Sarje:
A weighted cache replacement policy for location dependent data in mobile environments. 920-924 - Shu-Yu Fu, Chuan-Ming Liu:

An effective kNN search protocol in wireless broadcast environments. 925-929 - Luiz A. Paula Lima Jr., Alcides Calsavara:

A framework for CORBA interoperability in ad hoc networks. 930-934 - Angelo Brayner

, Ronaldo Menezes
:
Balancing energy consumption and memory usage in sensor data processing. 935-939 - William R. Claycomb, Dongwan Shin

:
Towards secure resource sharing for impromptu collaboration in pervasive computing. 940-946 - Cléver Ricardo Guareis de Farias

, Marcos M. Leite, Camilo Zardo Calvi, Rodrigo Mantovaneli Pessoa
, José Gonçalves Pereira Filho:
A MOF metamodel for the development of context-aware mobile applications. 947-952 - Kuo-Qin Yan, Shu-Chin Wang, G. Y. Zheng:

Dual agreement virtual subnet protocol for mobile ad-hoc networks. 953-954 - Yohei Sawai, Masako Shinohara, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Quorum-based consistency management among replicas in ad hoc networks with data update. 955-956 - Wei-Guang Teng, Ming-Chia Chou:

Mining communities of acquainted mobile users on call detail records. 957-958 - Chow Kin Wah, Qing Li

:
IS_SDM: an in-network semantic sensor data model. 959-960
Model transformation
- Marcos Didonet Del Fabro, Patrick Valduriez:

Semi-automatic model integration using matching transformations and weaving models. 963-970 - Michael Lawley, Kerry Raymond:

Implementing a practical declarative logic-based model transformation engine. 971-977 - Dániel Varró

, Zoltán Balogh:
Automating model transformation by example using inductive logic programming. 978-984 - Thomas Cleenewerck, Ivan Kurtev

:
Separation of concerns in translational semantics for DSLs in model engineering. 985-992 - Andrés Vignaga, M. Cecilia Bastarrica:

Transforming system operations' interactions into a design class diagram. 993-997 - Maher Lamari:

Towards an automated test generation for the verification of model transformations. 998-1005 - Orlando Avila-García, Antonio Estévez, E. Victor Sánchez Rebull:

Using software product lines to manage model families in model-driven engineering. 1006-1011 - Juan M. Vara

, Belén Vela
, José María Cavero
, Esperanza Marcos
:
Model transformation for object-relational database development. 1012-1019 - Jesús Sánchez Cuadrado

, Jesús García Molina:
A phasing mechanism for model transformation languages. 1020-1024 - Antonio Cicchetti

, Davide Di Ruscio
, Amleto Di Salle
:
Software customization in model driven development of web applications. 1025-1030 - Ivo Raedts, Marija Petkovic, Alexander Serebrenik

, Jan Martijn E. M. van der Werf
, Lou J. Somers, Maarten Boote:
A software framework for automated verification. 1031-1032 - Pedro J. Clemente

, Juan Hernández Núñez
, Fernando Sánchez
:
An MDA approach to develop systems based on components and aspects. 1033-1034 - Antonio Cicchetti

, Alessandro Rossini:
Weaving models in conflict detection specifications. 1035-1036 - Matthias Erche, Michael Wagner, Christian Hein:

Mapping visual notations to MOF compliant models with QVT relations. 1037-1038
Multimedia and visualization track
- JeongKyu Lee, Jung-Hwan Oh, Subodh Kumar Shah, Xiaohui Yuan

, Shou Jiang Tang:
Automatic classification of digestive organs in wireless capsule endoscopy videos. 1041-1045 - Chih-Chang Chen, Damon Shing-Min Liu:

Use of hardware Z-buffered rasterization to accelerate ray tracing. 1046-1050 - Erkan Yavuz, Ziya Telatar

:
Improved SVD-DWT based digital image watermarking against watermark ambiguity. 1051-1055 - Vincent S. Tseng, Ja-Hwung Su, Bo-Wen Wang, Yu-Ming Lin:

Web image annotation by fusing visual features and textual information. 1056-1060 - Daniel Corrêa Lobato

, Matheus Qualio Barbosa, Maria da Graça Campos Pimentel, César A. C. Teixeira:
MOJOHON: a channel-driven communication architecture for applications deployed on the internet. 1061-1066 - Svetlana Mansmann, Marc H. Scholl

:
Exploring OLAP aggregates with hierarchical visualization techniques. 1067-1073 - Alex Sandro da Cunha Rego, Cláudio de Souza Baptista, Elvis Rodrigues da Silva

, Ulrich Schiel, Hugo Feitosa de Figueirêdo:
VideoLib: a video digital library with support to spatial and temporal dimensions. 1074-1078 - Donald A. Adjeroh, Uma Kandaswamy, Nan Zhang, Amar Mukherjee, M. T. Brown, Tim Bell:

BWT-based efficient shape matching. 1079-1085 - Hangzai Luo, Jianping Fan, Shin'ichi Satoh, William Ribarsky:

Large scale news video database browsing and retrieval via information visualization. 1086-1087 - Antoine Pigeau, Afshin Nikseresht, Marc Gelgon:

Fast tracking of hierarchical partitions with approximate kl-divergence for geo-temporal organization of personal images. 1088-1089 - Nilma Perera, Albert Goodman, Kathy Blashki:

Preattentive processing: using low-level vision psychology to encode information in visualisations. 1090-1091
Object oriented programming languages and systems
- Lorenzo Bettini

, Sara Capecchi
, Elena Giachino
:
Featherweight wrap Java. 1094-1100 - Douglas P. Gregor, Jaakko Järvi:

Variadic templates for C++. 1101-1108 - James Sasitorn, Robert Cartwright:

Deriving components from genericity. 1109-1116 - Eric E. Allen, J. J. Hallett, Victor Luchangco, Sukyoung Ryu

, Guy L. Steele Jr.:
Modular multiple dispatch with multiple inheritance. 1117-1121 - Manuel Oriol:

Primitives for the dynamic evolution of component-based applications. 1122-1123
Operating systems and adaptive applications
- Li-Pin Chang:

On efficient wear leveling for large-scale flash-memory storage systems. 1126-1130 - Junghoon Lee, Mikyung Kang, Abhijit Saha

:
A fair scheduling scheme for a time-sensitive traffic over the dual-channel wireless network. 1131-1135 - Mei-Ling Chiang

, Jia-Shin Huang:
Improving the performance of log-structured file systems with adaptive block rearrangement. 1136-1140 - Haklin Kimm, Sung Y. Shin, Chang Oan Sung:

Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system. 1141-1145 - HyunBin Lee, YongJoo Song, Kyungbaek Kim

, Donggook Kim, Daeyeon Park:
CriStore: dynamic storage system for heterogeneous devices in off-site ubiquitous communities. 1146-1150 - Tai-Yi Huang, Kai-Yuan Hou, Huang-Yi Yu, Edward T.-H. Chu, Chung-Ta King:

LA-TinyOS: a locality-aware operating system for wireless sensor networks. 1151-1158 - Hong Min, Sangho Yi, Yookun Cho, Jiman Hong:

An efficient dynamic memory allocator for sensor operating systems. 1159-1164 - Davy Preuveneers, Yolande Berbers:

Towards context-aware and resource-driven self-adaptation for mobile handheld applications. 1165-1170 - HongGeun Kim, Jungkyu Han, Seongje Cho:

An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. 1171-1175 - Ya-Shu Chen, Song-Jian Tang, Shi-Wu Lo:

A priority assignment strategy of processing elements over an on-chip bus. 1176-1180 - Boncheol Gu, Yongtae Kim, Junyoung Heo

, Yookun Cho:
Shared-stack cooperative threads. 1181-1186 - Janghaeng Lee, Sung-Ho Hwang, Neungsoo Park, Seong-Won Lee, Sungik Jun, Young Soo Kim

:
A high performance NIDS using FPGA-based regular expression matching. 1187-1191 - Sung-Kwan Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh, Sang Lyul Min:

Virtual framework for testing the reliability of system software on embedded systems. 1192-1196 - Yuki Kinebuchi, Hidenari Koshimae, Tatsuo Nakajima:

Constructing machine emulator on portable microkernel. 1197-1198 - YongJoo Song, Daeyeon Park:

Providing context-awareness to virtual file system. 1199-1200 - Sangho Yi, Hong Min, Seungwoo Lee, Yeongkwun Kim, Injoo Jeong:

SESAME: space-efficient stack allocation mechanism for multi-threaded sensor operating systems. 1201-1202 - Prem Uppuluri, Sachin Singh, Uday Joshi:

RemoteFS: accessing remote file systems for desktop grid computing. 1203-1204
Organizational engineering
- Mari Inoki, Yoshiaki Fukazawa:

Software product line evolution method based on kaizen approach. 1207-1214 - Christian Braun, Robert Winter:

Integration of IT service management into enterprise architecture. 1215-1219 - Abdul Babar

, Karl Cox, Steven J. Bleistein, June M. Verner:
Towards evolution of strategic IT requirements. 1220-1227 - Christoph Rosenkranz

, Roland Holten:
Combining cybernetics and conceptual modeling: the concept of variety in organizational engineering. 1228-1233 - Kelly Rosa Braghetto

, João Eduardo Ferreira
, Calton Pu:
Using control-flow patterns for specifying business processes in cooperative environments. 1234-1241 - Hernâni Mourão, Pedro Antunes

:
Supporting effective unexpected exceptions handling in workflow management systems. 1242-1249 - Thomas Neubauer, Christian Stummer

:
Extending business process management to determine efficient IT investments. 1250-1256 - Artur Caetano

, João Pombinho, José M. Tribolet
:
Representing organizational competencies. 1257-1262 - Agnes Koschmider

, Andreas Oberweis:
How to detect semantic business process model variants? 1263-1264 - Birgit Korherr, Beate List:

Extending the EPC with performance measures. 1265-1266
Programming for separation of concerns
- Naoyasu Ubayashi, Shin Nakajima:

Context-aware feature-oriented modeling with an aspect extension of VDM. 1269-1274 - Walter Cazzola

, Sonia Pini, Ahmed Ghoneim, Gunter Saake:
Co-evolving application code and design models by exploiting meta-data. 1275-1279 - Pascal Costanza, Robert Hirschfeld:

Reflective layer activation in ContextL. 1280-1285 - Po-Hao Chang, Gul Agha:

Supporting reconfigurable object distribution for customized web applications. 1286-1292 - Sérgio Soares

, Paulo Borba
:
Towards reusable and modular aspect-oriented concurrency control. 1293-1294 - Rosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana:

An aspect-generated approach for the integration of applications into grid. 1295-1296
Programming languages
- Lunjin Lu:

Implementing type-based constructive negation. 1299-1306 - Armelle Bonenfant, Zezhi Chen, Kevin Hammond

, Greg Michaelson, Andrew M. Wallace
, Iain Wallace:
Towards resource-certified software: a formal cost model for time and its application to an image-processing example. 1307-1314 - Maurizio Cimadamore, Mirko Viroli

:
Reifying wildcards in Java using the EGO approach. 1315-1322 - Jaewook Shin, Paul D. Hovland

:
Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive. 1323-1329 - Avik Paul, Rajeev Kumar:

Precise dynamic slicing using execution-summary. 1330-1331 - Soichiro Hidaka, Hiroyuki Kato, Masatoshi Yoshikawa:

A relative cost model for XQuery. 1332-1333
Semantic web and applications
- Palakorn Achananuparp

, Hyoil Han, Olfa Nasraoui
, Roberta Johnson:
Semantically enhanced user modeling. 1335-1339 - Hak Lae Kim, Suk-hyung Hwang, Hong-Gee Kim:

FCA-based approach for mining contextualized folksonomy. 1340-1345 - Trivikram Immaneni, Krishnaprasad Thirunarayan:

Hybrid retrieval from the unified web. 1346-1350 - Peter Haase, Yimin Wang:

A decentralized infrastructure for query answering over distributed ontologies. 1351-1356 - Deendayal Dinakarpandian, Tuanjie Tong, Yugyung Lee:

Modeling biomedical assertions in the semantic web. 1357-1361 - Samhaa R. El-Beltagy

, Maryam Hazman, Ahmed Rafea
:
Ontology based annotation of text segments. 1362-1367 - Armin Haller

, Paavo Kotinurmi, Tomas Vitvar
, Eyal Oren:
Handling heterogeneity in RosettaNet messages. 1368-1374 - Holger Billhardt

, Ramón Hermoso
, Sascha Ossowski
, Roberto Centeno
:
Trust-based service provider selection in open environments. 1375-1380 - Hao Wu

, Hai Jin, Xiaomin Ning:
An approach for indexing, storing and retrieving domain knowledge. 1381-1382
Semantic-based resource discovery, retrieval and composition (SDRC)
- Nalaka Gooneratne, Zahir Tari

, James Harland
:
Verification of web service descriptions using graph-based traversal algorithms. 1385-1392 - Jianjun Yu, Hao Su, Gang Zhou, Ke Xu:

SNet: skip graph based semantic web services discovery. 1393-1397 - Nicola Fanizzi

, Claudia d'Amato
, Floriana Esposito
:
Instance-based retrieval by analogy. 1398-1402
Software engineering
- Dae-Kyoo Kim

, Wuwei Shen:
An approach to evaluating structural pattern conformance of UML models. 1404-1408 - Pedro de Alcântara dos Santos Neto, Rodolfo F. Resende, Clarindo Isaías Pereira da Silva e Pádua:

Requirements for information systems model-based testing. 1409-1415 - Chengying Mao

, Yansheng Lu, Jinlong Zhang:
Regression testing for component-based software via built-in test design. 1416-1421 - Martin Höst

, Christin Lindholm:
Different conceptions in software project risk assessment. 1422-1426 - Elthon A. S. Oliveira

, Hyggo Oliveira de Almeida
, Leandro Dias da Silva:
Formal modelling and verification of a component model using coloured petri nets and model checking. 1427-1431 - Pradeep Varma:

Generalizing recognition of an individual dialect in program analysis and transformation. 1432-1439 - Kim Weyns, Per Runeson

:
Sensitivity of software system reliability to usage profile changes. 1440-1444 - Fakhar Lodhi, Muhammad Ahmad Ghazali:

Design of a simple and effective object-to-relational mapping technique. 1445-1449 - Marcos Forte, Renato A. T. Claudino, Wanderley Lopes de Souza, Antônio Francisco do Prado, Luiz H. Z. Santana:

A component-based framework for the internet content adaptation domain. 1450-1455 - Giuseppe Di Santo, Eugenio Zimeo:

Reversing GUIs to XIML descriptions for the adaptation to heterogeneous devices. 1456-1460 - Fares Saad-Khorchef, Antoine Rollet, Richard Castanet:

A framework and a tool for robustness testing of communicating software. 1461-1466 - Fei-Ching Kuo, Tsong Yueh Chen

, Huai Liu
, W. K. Chan
:
Enhancing adaptive random testing in high dimensional input domains. 1467-1472 - Soojin Park, Sooyong Park, Vijayan Sugumaran

:
Extending reusable asset specification to improve software reuse. 1473-1478 - Lorie M. Liebrock:

Integration of well posedness analysis in software engineering. 1479-1483 - Victor K. Y. Chan, W. Eric Wong:

Outlier elimination in construction of software metric models. 1484-1488 - Lei Wu, Yi Feng, Hua Yan:

Software reengineering with architecture decomposition. 1489-1493 - Dietmar Schreiner, Karl M. Göschka:

Modeling component based embedded systems applications with explicit connectors in UML 2.0. 1494-1495 - Rodrigo Perozzo Noll, Marcelo Blois Ribeiro:

Enhancing traceability using ontologies. 1496-1497
Software verification
- Bas Ploeger, Lou J. Somers:

Analysis and verification of an automatic document feeder. 1499-1505 - Shoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto

, Jingde Cheng:
Formal verification of security specifications with common criteria. 1506-1512 - Jan Kofron

:
Checking software component behavior using behavior protocols and spin. 1513-1517 - George Spanoudakis, Christos Kloukinas

, Kelly Androutsopoulos
:
Towards security monitoring patterns. 1518-1525 - Nadeem Abdul Hamid

:
Integrating a certified memory management runtime with proof-carrying code. 1526-1533 - Yongjian Li:

Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols. 1534-1535 - Glauber Ferreira, Emerson Loureiro, Elthon A. S. Oliveira

:
A Java code annotation approach for model checking software systems. 1536-1537
System on chip design and software supports (SODSS)
- ZhiLei Chai, Wenke Zhao, Wenbo Xu:

Real-time Java processor optimized for RTSJ. 1540-1544 - Soo Yun Hwang, Hyeong Jun Park, Kyoung Son Jhang

:
An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix. 1545-1551 - Ning Qu, Yulai Zhao, Xuetao Guan, Xu Cheng:

Unichos: a full system simulator for thin client platform. 1552-1556 - Orlando Moreira, Jacob Jan-David Mol, Marco Bekooij:

Online resource management in a multiprocessor with a network-on-chip. 1557-1564 - Hyun-min Kyung, Gi-Ho Park, Jong Wook Kwak, WooKyeong Jeong, Tae-Jin Kim, Sung-Bae Park:

Performance monitor unit design for an AXI-based multi-core SoC platform. 1565-1572
Trust, recommendations, evidence and other collaboration know-how (TRECK'07)
- Giancarlo Ruffo

, Rossano Schifanella
:
Evaluating peer-to-peer recommender systems that exploit spontaneous affinities. 1574-1578 - Cristiano Longo, Paolo Giarrusso:

A protocol to preserve a code of conduct. 1579-1585 - Cristiano P. Costa, Vanessa Soares, Jussara M. Almeida, Virgílio A. F. Almeida:

Fighting pollution dissemination in peer-to-peer networks. 1586-1590 - Yi Hu, Zhichun Xiao, Brajendra Panda:

Modeling deceptive information dissemination using a holistic approach. 1591-1598 - Sebastian Ries:

Certain trust: a trust model for users and agents. 1599-1604 - Megumi Nakamura, Seiji Munetoh

:
Designing a trust chain for a thin client on a live Linux cd. 1605-1606
Ubiquitous computing: digital spaces, services and content
- Krista M. Dombroviak, Rajiv Ramnath:

A taxonomy of mobile and pervasive applications. 1609-1615 - Hiroaki Kimura, Eiji Tokunaga, Tatsuo Nakajima:

System support for mobile augmented reality services. 1616-1623 - Fahim Kawsar, Kaori Fujinami, Tatsuo Nakajima:

A lightweight indoor location model for sentient artefacts using sentient artefacts. 1624-1631 - Erwin Aitenbichler, Fernando Lyardet, Gerhard Austaller, Jussi Kangasharju, Max Mühlhäuser

:
Engineering intuitive and self-explanatory smart products. 1632-1637 - Shinyoung Yi, Jiyoung Yi, Hojung Cha:

Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices. 1638-1639
Web technologies
- Nanjangud C. Narendra, Bart Orriëns:

Modeling web service composition and execution via a requirements-driven approach. 1642-1648 - Xinwu Cheng, Lei Li, Jun Wei:

Automatic enactment of message exchange pattern for web services. 1649-1653 - Danfeng Yao

, Yunhua Koglin, Elisa Bertino, Roberto Tamassia:
Decentralized authorization and data security in web content delivery. 1654-1661 - Ustun Yildiz, Claude Godart:

Towards decentralized service orchestrations. 1662-1666 - Yoo Jung An, James Geller, Yi-Ta Wu, Soon Ae Chun

:
Semantic deep web: automatic attribute extraction from the deep web data sources. 1667-1672 - James D. Palmer:

Exploiting bibliographic web services with CiTeX. 1673-1676 - Damiano Distante

, Gustavo Rossi
, Gerardo Canfora
:
Modeling business processes in web applications: an analysis framework. 1677-1682 - Aliaksandr Birukou

, Enrico Blanzieri
, Vincenzo D'Andrea
, Paolo Giorgini
, Natallia Kokash
, Alessio Modena:
IC-service: a service-oriented approach to the development of recommendation systems. 1683-1688 - Yu Huang, Hanpin Wang:

A petri net semantics for web service choreography. 1689-1690 - Yaojin Yang, Lasse Pajunen:

Towards supporting user interface agility in developing heterogeneous device enabled business processes. 1691-1692 - Aabhas V. Paliwal, Nabil R. Adam, Christof Bornhövd:

Web service orchestration and verification using MSC and CP nets. 1693-1694

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














