22. SAC 2007:
Seoul,
Korea
 Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo (Eds.):
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007.
 ACM 2007, ISBN 1-59593-480-4  
  
  
  
  
 
Advances in spatial and image-based information systems
 
- Mattias Andersson, Joachim Gudmundsson, Patrick Laube, Thomas Wolle:
 Reporting leadership patterns among trajectories.
3-7
             
- Alexander Kolesnikov, Alexander Akimov:
 Distortion-constrained compression of vector maps.
8-12
             
- Tao Wan, Karine Zeitouni, Xiaofeng Meng:
 An OLAP system for network-constrained moving objects.
13-18
             
- Arianna D'Ulizia, Fernando Ferri, Anna Formica, Patrizia Grifoni, Maurizio Rafanelli:
 Structural similarity in geographical queries to improve query answering.
19-23
             
- Jejung Lee, Yugyung Lee, Sanket Shah, James Geller:
 HIS-KCWater: context-aware geospatial data and service integration.
24-29
             
Agents,
interactions,
mobility and systems
 
- Rubens Fernandes Nunes, Creto Augusto Vidal, Joaquim B. Cavalcante Neto:
 A flexible representation of controllers for physically-based animation of virtual humans.
30-36
             
- Camila Nunes, Marcílio Ferreira, Hyggo Oliveira de Almeida:
 Applying a component-based framework to develop multi-agent environments: case study.
37-41
             
- Giuseppe Di Fatta, Giancarlo Fortino:
 A customizable multi-agent system for distributed data mining.
42-47
             
- Guido van 't Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum:
 Guarding security sensitive content using confined mobile agents.
48-55
             
- Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes:
 A crime simulation model based on social networks and swarm intelligence.
56-57
             
Artificial intelligence,
computational logic,
and image analysis
 
- Khalil Djelloul, Thi-Bich-Hanh Dao, Thom W. Frühwirth:
 Toward a first-order extension of Prolog's unification using CHR: a CHR first-order constraint solver over finite or infinite trees.
58-64
             
- Luciano Caroprese, Irina Trubitsyna, Ester Zumpano:
 A framework for prioritized reasoning based on the choice evaluation.
65-70
             
- Muhammad Sarfraz, Aiman Rashid:
 A randomized knot insertion algorithm for outline capture of planar images using cubic spline.
71-75
             
- Gang Zhang, Z. M. Ma, Zhiping Cai:
 Directed filter for dominant direction fuzzy set in content-based image retrieval.
76-77
             
- ChenGuang Liu, Kazuyuki Tanaka:
 Eigen-distribution on assignments for game trees with random properties.
78-79
             
- Enmin Song, Luan Jiang, Bo Meng, Renchao Jin, Xiangyang Xu, Chih-Cheng Hung:
 Mass edge detection in mammography based on plane fitting and dynamic programming.
80-81
             
- Depei Bao, Zehong Yang, Yixu Song:
 Projection function for driver fatigue monitoring with monocular camera.
82-83
             
Autonomic computing
 
- Edin Arnautovic, Hermann Kaindl, Jürgen Falb, Roman Popp, Alexander Szep:
 Gradual transition towards autonomic software systems based on high-level communication specification.
84-89
             
- Michael G. Hinchey, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan:
 Bionic autonomic nervous system and self-healing for NASA ANTS-like missions.
90-96
             
- Yu Zhou, Jian Pan, Xiaoxing Ma, Bin Luo, XianPing Tao, Jian Lu:
 Applying ontology in architecture-based self-management applications.
97-103
             
- Rui Zhang, Steve Moyle, Steve McKeever, Alan Bivens:
 Performance problem localization in self-healing, service-oriented systems using Bayesian networks.
104-109
             
- Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque:
 Self-healing for autonomic pervasive computing.
110-111
             
Bioinformatics
 
- Hee-Jeong Jin, Hwan-Gue Cho:
 Hierarchical alignment graph for gene teams finding on whole genomes.
113-117
             
- Pavithra G. Naidu, Mathew J. Palakal, Shielly Hartanto:
 On-the-fly data integration models for biological databases.
118-122
             
- Kuan-Ming Lin, Jaewoo Kang:
 Exploiting inter-gene information for microarray data integration.
123-127
             
- Fa Zhang, Lin Xu, Zhiyong Liu, Bo Yuan:
 Improved structural modeling based on conserved domain clusters and structure-anchored alignments.
128-132
             
- Xiaoyong Fang, Zhenghua Wang, Zhigang Luo, Bo Yuan, Fan Ding:
 The detection and assessment of possible RNA secondary structure using multiple sequence alignment.
133-137
             
- Yin-Fu Huang, Yi-Chao Jhan, Sing-Wu Liou:
 Finding putative core promoter elements with position-dependent consensuses.
138-139
             
- Xiandong Meng, Vipin Chaudhary:
 An adaptive data prefetching scheme for biosequence database search on reconfigurable platforms.
140-141
             
- Hisham Al-Mubaid, Hoa A. Nguyen:
 Semantic distance of concepts within a unified framework in the biomedical domain.
142-143
             
- Chao-Tung Yang, Tsu-Fen Han, Heng-Chuan Kan:
 On construction of a BioGrid platform for parallel bioinformatics applications.
144-145
             
Computer applications in health care
 
Computer ethics and human values
 
Computer forensics
 
- Yacine Djemaiel, Noureddine Boudriga:
 A global marking scheme for tracing cyber attacks.
170-174
             
- Ricci S. C. Ieong, H. C. Leung:
 Deriving cse-specific live forensics investigation procedures from FORZA.
175-180
             
- Antonio Savoldi, Paolo Gubian:
 SIM and USIM filesystem: a forensics perspective.
181-187
             
- Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga:
 Global intrusion detection and tolerance in networked systems.
188-189
             
- Lorie M. Liebrock, Nico Marrero, David P. Burton, Ron Prine, E. Cornelius, M. Shakamuri, Vincent Urias:
 A preliminary design for digital forensics analysis of terabyte size data sets.
190-191
             
Computer networks
 
- Chi-Jen Wu, Ren-Hung Hwang, Jan-Ming Ho:
 A scalable overlay framework for internet anycasting service.
193-197
             
- Xiaolong Jin, Geyong Min:
 An analytical model for generalized processor sharing scheduling with heterogeneous network traffic.
198-202
             
- Paulo Sérgio Sausen, Marco Aurélio Spohn, Antonio Marcus Nogueira de Lima, Angelo Perkusich:
 Bounded-distance multi-coverage backbones in wireless sensor networks.
203-208
             
- Daniel M. Batista, Nelson L. S. Da Fonseca, Flávio Keidi Miyazawa:
 A set of schedulers for grid networks.
209-213
             
- Sangmin Kim, VamsiKrishna Vasireddy, Khaled Harfoush:
 Scalable coordination for sensor networks in challenging environments.
214-221
             
- Guillaume Chelius, Antoine Fraboulet, Eric Fleury:
 Worldsens: a fast and accurate development framework for sensor network applications.
222-226
             
- Solange Rito Lima, Pedro Sousa, Paulo Carvalho:
 Enhancing QoS metrics estimation in multiclass networks.
227-231
             
- Yunqi Li, Jiahai Yang, Changqing An, Hui Zhang:
 Finding hierarchical heavy hitters in network measurement system.
232-236
             
- Yu-Chieh Lin, Hsung-Pin Chang:
 VA-TCP: a vertical handoff-aware TCP.
237-238
             
Computer security
 
- Arie Orlovsky, Danny Raz:
 Decentralized enforcement of security policies for distributed computational systems.
241-248
             
- Yi Mu, Willy Susilo, Huafei Zhu:
 Compact sequential aggregate signatures.
249-253
             
- Xiang Zhou, Min Huang, Zhiyong Peng:
 An additive-attack-proof watermarking mechanism for databases' copyrights protection using image.
254-258
             
- Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour:
 RAAS: a reliable analyzer and archiver for snort intrusion detection system.
259-263
             
- Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das:
 Memory-efficient content filtering hardware for high-speed intrusion detection systems.
264-269
             
- K. H. S. Sabaragamu Koralalage, Mohammad Reza Selim, Junichi Miura, Yuichi Goto, Jingde Cheng:
 POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism.
270-275
             
- Anh-Quynh Nguyen, Yoshiyasu Takefuji:
 Towards a tamper-resistant kernel rootkit detector.
276-283
             
- Martin Johns, Christian Beyerlein:
 SMask: preventing injection attacks in web applications by approximating automatic data/code separation.
284-291
             
- Umut Topkara, Mikhail J. Atallah, Mercan Topkara:
 Passwords decay, words endure: secure and re-usable multiple password mnemonics.
292-299
             
- Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti:
 Using CP-nets as a guide for countermeasure selection.
300-304
             
Constraint solving and programming
 
Coordination models,
languages and applications
 
- Yingbo Liu, Jianmin Wang, Jiaguang Sun:
 A machine learning approach to semi-automating workflow staff assignment.
340-345
             
- Sun Meng, Farhad Arbab:
 Web services choreography and orchestration in Reo and constraint automata.
346-353
             
- Mirko Viroli, Matteo Casadei, Luca Gardelli:
 A self-organising solution to the collective sort problem in distributed tuple spaces.
354-359
             
- Lyndon J. B. Nixon, Olena Antonechko, Robert Tolksdorf:
 Towards Semantic tuplespace computing: the Semantic web spaces system.
360-365
             
- Kevin Marth, Shangping Ren:
 Extending the ARC model with generative coordination.
366-367
             
- Michael Schumacher, Tim Van Pelt, Ion Constantinescu, Alexandre de Oliveira e Sousa, Boi Faltings:
 Federated directories of Semantic web services.
368-369
             
Data mining
 
- Grigorios Loukides, Jianhua Shao:
 Capturing data usefulness and privacy protection in K-anonymisation.
370-374
             
- Jun-Lin Lin, Julie Yu-Chih Liu:
 Privacy preserving itemset mining through fake transactions.
375-379
             
- Traian Marius Truta, Alina Campan:
 K-anonymization incremental maintenance and optimization techniques.
380-387
             
- Wang Lian, David W. Cheung, Siu-Ming Yiu:
 Maintenance of maximal frequent itemsets in large databases.
388-392
             
- Ghazi Al-Naymat, Sanjay Chawla, Joachim Gudmundsson:
 Dimensionality reduction for long duration and complex spatio-temporal queries.
393-397
             
- Songbo Tan, Xueqi Cheng:
 Using hypothesis margin to boost centroid text classifier.
398-403
             
- Toon Calders, Bart Goethals, Michael Mampaey:
 Mining itemsets in the presence of missing values.
404-408
             
- Pasquale Rullo, Chiara Cumbo, Veronica L. Policicchio:
 Learning rules with negation for text categorization.
409-416
             
- Jeroen De Knijf:
 FAT-miner: mining frequent attribute trees.
417-422
             
- Youngju Son, Hasan M. Jamil, Farshad Fotouhi:
 Exploiting types for improved schema mapping.
423-429
             
- Jianlong Qi, Jian Tang:
 Integrating gene ontology into discriminative powers of genes for feature selection in microarray data.
430-434
             
- Li Xiong, Subramanyam Chitti, Ling Liu:
 Mining multiple private databases using a kNN classifier.
435-440
             
- Seung-won Hwang, Hwanjo Yu:
 Mining and processing category ranking.
441-442
             
- Céline Hébert, Alain Bretto, Bruno Crémilleux:
 Optimizing hypergraph transversal computation with an anti-monotone constraint.
443-444
             
- Ana Paula Appel, Adriano Arantes Paterlini, Elaine P. M. de Sousa, Agma J. M. Traina, Caetano Traina Jr.:
 Biased box sampling - a density-biased sampling for clustering.
445-446
             
Data streams
 
Database theory,
technology,
and applications
 
- Zhenglu Yang, Botao Wang, Masaru Kitsuregawa:
 General dominant relationship analysis based on partial order models.
470-474
             
- Weihai Yu, Jie Yang:
 Continuation-passing enactment of distributed recoverable workflows.
475-481
             
- Nobutaka Suzuki:
 An edit operation-based approach to the inclusion problem for DTDs.
482-488
             
- James J. Lu, Chia-Hsin Huang, Tyng-Ruey Chuang:
 Querying and browsing XML and relational data sources.
489-493
             
- Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri, Diogo Tuler Forlani, Agma J. M. Traina, Fernando da Fonseca de Souza:
 Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries.
494-499
             
- Ali Saman Tosun:
 Equivalent disk allocations.
500-505
             
- Gae-won You, Seung-won Hwang:
 Personalized ranking: a contextual ranking approach.
506-510
             
- Ying Qiao, Kang Zhong, Hongan Wang, Xiang Li:
 Developing event-condition-action rules in real-time active database.
511-516
             
- Jongho Nang, Joohyoun Park:
 An efficient indexing structure for content based multimedia retrieval with relevance feedback.
517-524
             
- Guangming Xing, Zhonghang Xia, Andrew Ernest:
 Building automatic mapping between XML documents using approximate tree matching.
525-526
             
- Gisele Busichia Baioco, Agma J. M. Traina, Caetano Traina Jr.:
 An effective cost model for similarity queries in metric spaces.
527-528
             
- Ilias Michalarias, Christian Becker:
 Multidimensional querying in wireless ad hoc networks.
529-530
             
Dependable and adaptive distributed systems
 
- Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
 An adaptive randomized search protocol in peer-to-peer systems.
533-537
             
- Tiejun Ma, Jane Hillston, Stuart Anderson:
 Evaluation of the QoS of crash-recovery failure detection.
538-542
             
- Michael A. Jaeger, Helge Parzyjegla, Gero Mühl, Klaus Herrmann:
 Self-organizing broker topologies for publish/subscribe systems.
543-550
             
- Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
 A new adaptive accrual failure detector for dependable distributed systems.
551-555
             
- José Enrique Armendáriz-Iñigo, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Hendrik Decker, Francesc D. Muñoz-Escoí:
 k-bound GSI: a flexible database replication protocol.
556-560
             
- Giovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto, Salvatore Vadacca:
 GReIC data gather service: a step towards P2P production grids.
561-565
             
- Giovanna Di Marzo Serugendo, John Fitzgerald, Alexander Romanovsky, Nicolas Guelfi:
 A metadata-based architectural model for dynamically resilient systems.
566-572
             
- Vincent Gramoli, Emmanuelle Anceaume, Antonino Virgillito:
 SQUARE: scalable quorum-based atomic memory with local reconfiguration.
574-579
             
- Dhouha Ayed, Yolande Berbers:
 Dynamic adaptation of CORBA component-based applications.
580-585
             
- Robert John Walters, Peter Henderson, Stephen Crouch:
 Selecting a distributed agreement algorithm.
586-587
             
- Sushanta Karmakar, Arobinda Gupta:
 Adaptive broadcast by distributed protocol switching.
588-589
             
- Piotr Karwaczynski, Dariusz Konieczny, Jaka Mocnik, Marko Novak:
 Dual proximity neighbour selection method for peer-to-peer-based discovery service.
590-591
             
Document engineering
 
- Georg Vogeler, Stefan Gruner, Benjamin Burkard:
 New specialist tools for medieval document XML markup.
594-599
             
- Sylvain Lamprier, Tassadit Amghar, Bernard Levrat, Frédéric Saubion:
 ClassStruggle: a clustering based text segmentation.
600-604
             
- Wafa Boussellaa, Abderrazak Zahour, Adel M. Alimi:
 A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods.
605-609
             
- Rafael Dueire Lins, João Marcelo Monte da Silva:
 A quantitative method for assessing algorithms to remove back-to-front interference in documents.
610-616
             
- Xin Jin, Rongyan Li, Xian Shen, Rongfang Bie:
 Automatic web pages categorization with ReliefF and Hidden Naive Bayes.
617-621
             
- Luiz Antônio Pereira Neves, João Marques de Carvalho, Jacques Facon, Flávio Bortolozzi:
 A table-form extraction with artefact removal.
622-626
             
- Sabine Barrat, Salvatore Tabbone:
 A progressive learning method for symbols recognition.
627-631
             
- Cinthia Obladen de Almendra Freitas, Luiz S. Oliveira, Simone B. K. Aires, Flávio Bortolozzi:
 Zoning and metaclasses for character recognition.
632-636
             
- Cesar R. Santos, Flávio Bortolozzi, Luiz S. Oliveira, Edson J. R. Justino:
 Off-line signature verification based on forensic questioned document examination approach.
637-638
             
- João Marcelo Monte da Silva, Rafael Dueire Lins:
 A fast algorithm to binarize and filter documents with back-to-front interference.
639-640
             
E-commerce technologies
 
Embedded systems:
applications,
solutions,
and techniques
 
- Liu Xianhua, Zhang Jiyu, Cheng Xu:
 Efficient code size reduction without performance loss.
666-672
             
- Thomas Gustafsson, Aleksandra Tesanovic, Ying Du, Jörgen Hansson:
 Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach.
673-679
             
- Wei-Hsuan Hung, Yi-Jung Chen, Chia-Lin Yang, Yen-Sheng Chang, Alan P. Su:
 An architectural co-synthesis algorithm for energy-aware network-on-chip design.
680-684
             
- Tien N. Nguyen:
 Component-based version management for embedded computing system design.
685-692
             
- Young-Jin Kim, Kwon-Taek Kwon, Jihong Kim:
 Energy-efficient disk replacement and file placement techniques for mobile systems with hard disks.
693-698
             
- Jason Hiser, Jack W. Davidson, David B. Whalley:
 Fast, accurate design space exploration of embedded systems memory configurations.
699-706
             
- Afrin Naz, Krishna M. Kavi, Jung-Hwan Oh, Pierfrancesco Foglia:
 Reconfigurable split data caches: a novel scheme for embedded systems.
707-712
             
- Sylvain Stanchina, Matthias Meyer:
 Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collection.
713-718
             
Evolutionary computation
 
- Richard Brunauer, Andreas Löcker, Helmut A. Mayer, Gerhard Mitterlechner, Hannes Payer:
 Evolution of iterated prisoner's dilemma strategies with different history lengths in static and cultural environments.
720-727
             
- Ronaldo Menezes, Francisco Martins, Francisca Emanuelle Vieira, Rafael Silva, Márcio Braga:
 A model for terrain coverage inspired by ant's alarm pheromones.
728-732
             
- Raymond Chiong:
 Applying genetic algorithms to economy market using iterated prisoner's dilemma.
733-737
             
- Shih-Hsi Liu, Marjan Mernik, Barrett R. Bryant:
 A clustering entropy-driven approach for exploring and exploiting noisy functions.
738-742
             
- Jason Teo:
 Investigating adaptive mutation in the generalized generation gap (G3) algorithm for unconstrained global optimization.
743-744
             
- Flávio Milsztajn, Klaus de Geus:
 Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms.
745-746
             
- Carlos Fernandes, Vitorino Ramos, Agostinho C. Rosa:
 Stigmergic optimization in dynamic binary landscapes.
747-748
             
Geometric computing and reasoning
 
Handheld computing
 
Information access and retrieval
 
- Wei Jin, Rohini K. Srihari:
 Graph-based text representation and knowledge discovery.
807-811
             
- Daniel Schuster, Alexander Schill:
 NL sampler: random sampling of web documents based on natural language with query hit estimation.
812-818
             
- Chengye Lu, Yue Xu, Shlomo Geva:
 Translation disambiguation in web-based translation extraction for English-Chinese CLIR.
819-823
             
- Hady Wirawan Lauw, Ee-Peng Lim, HweeHwa Pang:
 TUBE (Text-cUBE) for discovering documentary evidence of associations among entities.
824-828
             
- Chen Ding, Jin Zhou:
 Log-based indexing to improve web site search.
829-833
             
- Xue-Qiang Zeng, Ming-Wen Wang, Jian-Yun Nie:
 Text classification based on partial least square analysis.
834-838
             
- Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi:
 Using a knowledge base to disambiguate personal name in web search results.
839-843
             
- Ana Cardoso-Cachopo, Arlindo L. Oliveira:
 Semi-supervised single-label text categorization using centroid-based classifiers.
844-851
             
- Randa Kassab, Jean-Charles Lamirel:
 Towards a synthetic analysis of user's information need for more effective personalized filtering services.
852-859
             
- Baptiste Jeudy, Christine Largeron, François Jacquenet:
 A model for managing collections of patterns.
860-865
             
- Taciana A. Vanderlei, Frederico Araujo Durão, Alexandre Costa Martins, Vinicius Cardoso Garcia, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
 A cooperative classification mechanism for search and retrieval software components.
866-871
             
- Jacques Savoy:
 Why do successful search systems fail for some topics.
872-877
             
- Neil O'Hare, Cathal Gurrin, Gareth J. F. Jones, Hyowon Lee, Noel E. O'Connor, Alan F. Smeaton:
 Using text search for personal photo collections with the MediAssist system.
880-881
             
- Daze Wang, Ying Zhou, Joseph Davis:
 Query optimizing on a decentralized web search engine.
880-881
             
- Alana Platt, Nazli Goharian, Saket S. R. Mengle:
 On using user query sequence to detect off-topic search.
882-883
             
Mobile computing and applications
 
- Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
 A mobile sensor control method for sparse sensor networks.
886-890
             
- Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
 An efficient TDMA slot assignment protocol in mobile ad hoc networks.
891-895
             
- Taniguchi Tetsuya, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
 Topology information generation methods using a routing table in ad hoc network applications.
896-900
             
- Debopam Acharya, Vijay Kumar, Gi-Chul Yang:
 DAYS mobile: a location based data broadcast service for mobile users.
901-905
             
- Taesoo Jun, Christine Julien:
 Automated routing protocol selection in mobile ad hoc networks.
906-913
             
- José Maria Monteiro, Angelo Brayner, Sérgio Lifschitz:
 A mechanism for replicated data consistency in mobile computing environments.
914-919
             
- Ajey Kumar, Manoj Misra, Anil Kumar Sarje:
 A weighted cache replacement policy for location dependent data in mobile environments.
920-924
             
- Shu-Yu Fu, Chuan-Ming Liu:
 An effective kNN search protocol in wireless broadcast environments.
925-929
             
- Luiz A. Paula Lima Jr., Alcides Calsavara:
 A framework for CORBA interoperability in ad hoc networks.
930-934
             
- Angelo Brayner, Ronaldo Menezes:
 Balancing energy consumption and memory usage in sensor data processing.
935-939
             
- William Claycomb, Dongwan Shin:
 Towards secure resource sharing for impromptu collaboration in pervasive computing.
940-946
             
- Cléver Ricardo Guareis de Farias, Marcos M. Leite, Camilo Zardo Calvi, Rodrigo Mantovaneli Pessoa, José Gonçalves Pereira Filho:
 A MOF metamodel for the development of context-aware mobile applications.
947-952
             
- Kuo-Qin Yan, Shu-Chin Wang, G. Y. Zheng:
 Dual agreement virtual subnet protocol for mobile ad-hoc networks.
953-954
             
- Yohei Sawai, Masako Shinohara, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
 Quorum-based consistency management among replicas in ad hoc networks with data update.
955-956
             
- Wei-Guang Teng, Ming-Chia Chou:
 Mining communities of acquainted mobile users on call detail records.
957-958
             
- Chow Kin Wah, Qing Li:
 IS_SDM: an in-network semantic sensor data model.
959-960
             
Model transformation
 
- Marcos Didonet Del Fabro, Patrick Valduriez:
 Semi-automatic model integration using matching transformations and weaving models.
963-970
             
- Michael Lawley, Kerry Raymond:
 Implementing a practical declarative logic-based model transformation engine.
971-977
             
- Dániel Varró, Zoltan Balogh:
 Automating model transformation by example using inductive logic programming.
978-984
             
- Thomas Cleenewerck, Ivan Kurtev:
 Separation of concerns in translational semantics for DSLs in model engineering.
985-992
             
- Andrés Vignaga, M. Cecilia Bastarrica:
 Transforming system operations' interactions into a design class diagram.
993-997
             
- Maher Lamari:
 Towards an automated test generation for the verification of model transformations.
998-1005
             
- Orlando Avila-García, Antonio Estévez, E. Victor Sánchez Rebull:
 Using software product lines to manage model families in model-driven engineering.
1006-1011
             
- Juan M. Vara, Belén Vela, José María Cavero, Esperanza Marcos:
 Model transformation for object-relational database development.
1012-1019
             
- Jesús Sánchez Cuadrado, Jesús García Molina:
 A phasing mechanism for model transformation languages.
1020-1024
             
- Antonio Cicchetti, Davide Di Ruscio, Amleto Di Salle:
 Software customization in model driven development of web applications.
1025-1030
             
- Ivo Raedts, Marija Petkovic, Alexander Serebrenik, Jan Martijn E. M. van der Werf, Lou J. Somers, Maarten Boote:
 A software framework for automated verification.
1031-1032
             
- Pedro J. Clemente, Juan Hernández, Fernando Sánchez:
 An MDA approach to develop systems based on components and aspects.
1033-1034
             
- Antonio Cicchetti, Alessandro Rossini:
 Weaving models in conflict detection specifications.
1035-1036
             
- Matthias Erche, Michael Wagner, Christian Hein:
 Mapping visual notations to MOF compliant models with QVT relations.
1037-1038
             
Multimedia and visualization track
 
- JeongKyu Lee, Jung-Hwan Oh, Subodh Kumar Shah, Xiaohui Yuan, Shou Jiang Tang:
 Automatic classification of digestive organs in wireless capsule endoscopy videos.
1041-1045
             
- Chih-Chang Chen, Damon Shing-Min Liu:
 Use of hardware Z-buffered rasterization to accelerate ray tracing.
1046-1050
             
- Erkan Yavuz, Ziya Telatar:
 Improved SVD-DWT based digital image watermarking against watermark ambiguity.
1051-1055
             
- Vincent S. Tseng, Ja-Hwung Su, Bo-Wen Wang, Yu-Ming Lin:
 Web image annotation by fusing visual features and textual information.
1056-1060
             
- Daniel Corrêa Lobato, Matheus Qualio Barbosa, Maria da Graça Campos Pimentel, César A. C. Teixeira:
 MOJOHON: a channel-driven communication architecture for applications deployed on the internet.
1061-1066
             
- Svetlana Mansmann, Marc H. Scholl:
 Exploring OLAP aggregates with hierarchical visualization techniques.
1067-1073
             
- Alex Sandro da Cunha Rego, Cláudio de Souza Baptista, Elvis Rodrigues da Silva, Ulrich Schiel, Hugo Feitosa de Figueirêdo:
 VideoLib: a video digital library with support to spatial and temporal dimensions.
1074-1078
             
- Donald A. Adjeroh, U. Kandaswamy, Nan Zhang, Amar Mukherjee, M. T. Brown, Tim Bell:
 BWT-based efficient shape matching.
1079-1085
             
- Hangzai Luo, Jianping Fan, Shin'ichi Satoh, William Ribarsky:
 Large scale news video database browsing and retrieval via information visualization.
1086-1087
             
- Antoine Pigeau, Afshin Nikseresht, Marc Gelgon:
 Fast tracking of hierarchical partitions with approximate kl-divergence for geo-temporal organization of personal images.
1088-1089
             
- Nilma Perera, Albert Goodman, Kathy Blashki:
 Preattentive processing: using low-level vision psychology to encode information in visualisations.
1090-1091
             
Object oriented programming languages and systems
 
Operating systems and adaptive applications
 
- Li-Pin Chang:
 On efficient wear leveling for large-scale flash-memory storage systems.
1126-1130
             
- Junghoon Lee, Mikyung Kang, Abhijit Saha:
 A fair scheduling scheme for a time-sensitive traffic over the dual-channel wireless network.
1131-1135
             
- Mei-Ling Chiang, Jia-Shin Huang:
 Improving the performance of log-structured file systems with adaptive block rearrangement.
1136-1140
             
- Haklin Kimm, Sung Y. Shin, Chang Oan Sung:
 Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system.
1141-1145
             
- HyunBin Lee, YongJoo Song, Kyungbaek Kim, Donggook Kim, Daeyeon Park:
 CriStore: dynamic storage system for heterogeneous devices in off-site ubiquitous communities.
1146-1150
             
- Tai-Yi Huang, Kai-Yuan Hou, Huang-Yi Yu, Edward T.-H. Chu, Chung-Ta King:
 LA-TinyOS: a locality-aware operating system for wireless sensor networks.
1151-1158
             
- Hong Min, Sangho Yi, Yookun Cho, Jiman Hong:
 An efficient dynamic memory allocator for sensor operating systems.
1159-1164
             
- Davy Preuveneers, Yolande Berbers:
 Towards context-aware and resource-driven self-adaptation for mobile handheld applications.
1165-1170
             
- HongGeun Kim, JungKyu Han, Seongje Cho:
 An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices.
1171-1175
             
- Ya-Shu Chen, Song-Jian Tang, Shi-Wu Lo:
 A priority assignment strategy of processing elements over an on-chip bus.
1176-1180
             
- Boncheol Gu, Yongtae Kim, Junyoung Heo, Yookun Cho:
 Shared-stack cooperative threads.
1181-1186
             
- Janghaeng Lee, Sung Ho Hwang, Neungsoo Park, Seong-Won Lee, Sungik Jun, Young Soo Kim:
 A high performance NIDS using FPGA-based regular expression matching.
1187-1191
             
- Sung-Kwan Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh, Sang Lyul Min:
 Virtual framework for testing the reliability of system software on embedded systems.
1192-1196
             
- Yuki Kinebuchi, Hidenari Koshimae, Tatsuo Nakajima:
 Constructing machine emulator on portable microkernel.
1197-1198
             
- YongJoo Song, Daeyeon Park:
 Providing context-awareness to virtual file system.
1199-1200
             
- Sangho Yi, Hong Min, Seungwoo Lee, Yeongkwun Kim, Injoo Jeong:
 SESAME: space-efficient stack allocation mechanism for multi-threaded sensor operating systems.
1201-1202
             
- Prem Uppuluri, Sachin Singh, Uday Joshi:
 RemoteFS: accessing remote file systems for desktop grid computing.
1203-1204
             
Organizational engineering
 
- Mari Inoki, Yoshiaki Fukazawa:
 Software product line evolution method based on kaizen approach.
1207-1214
             
- Christian Braun, Robert Winter:
 Integration of IT service management into enterprise architecture.
1215-1219
             
- Abdul Babar, Karl Cox, Steven J. Bleistein, June M. Verner:
 Towards evolution of strategic IT requirements.
1220-1227
             
- Christoph Rosenkranz, Roland Holten:
 Combining cybernetics and conceptual modeling: the concept of variety in organizational engineering.
1228-1233
             
- Kelly Rosa Braghetto, João Eduardo Ferreira, Calton Pu:
 Using control-flow patterns for specifying business processes in cooperative environments.
1234-1241
             
- Hernâni Mourão, Pedro Antunes:
 Supporting effective unexpected exceptions handling in workflow management systems.
1242-1249
             
- Thomas Neubauer, Christian Stummer:
 Extending business process management to determine efficient IT investments.
1250-1256
             
- Artur Caetano, João Pombinho, José M. Tribolet:
 Representing organizational competencies.
1257-1262
             
- Agnes Koschmider, Andreas Oberweis:
 How to detect semantic business process model variants?
1263-1264
             
- Birgit Korherr, Beate List:
 Extending the EPC with performance measures.
1265-1266
             
Programming for separation of concerns
 
Programming languages
 
- Lunjin Lu:
 Implementing type-based constructive negation.
1299-1306
             
- Armelle Bonenfant, Zezhi Chen, Kevin Hammond, Greg Michaelson, Andrew M. Wallace, Iain Wallace:
 Towards resource-certified software: a formal cost model for time and its application to an image-processing example.
1307-1314
             
- Maurizio Cimadamore, Mirko Viroli:
 Reifying wildcards in Java using the EGO approach.
1315-1322
             
- Jaewook Shin, Paul D. Hovland:
 Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive.
1323-1329
             
- Avik Paul, Rajeev Kumar:
 Precise dynamic slicing using execution-summary.
1330-1331
             
- Soichiro Hidaka, Hiroyuki Kato, Masatoshi Yoshikawa:
 A relative cost model for XQuery.
1332-1333
             
Semantic web and applications
 
- Palakorn Achananuparp, Hyoil Han, Olfa Nasraoui, Roberta Johnson:
 Semantically enhanced user modeling.
1335-1339
             
- Hak Lae Kim, Suk-hyung Hwang, Hong-Gee Kim:
 FCA-based approach for mining contextualized folksonomy.
1340-1345
             
- Trivikram Immaneni, Krishnaprasad Thirunarayan:
 Hybrid retrieval from the unified web.
1346-1350
             
- Peter Haase, Yimin Wang:
 A decentralized infrastructure for query answering over distributed ontologies.
1351-1356
             
- Deendayal Dinakarpandian, Tuanjie Tong, Yugyung Lee:
 Modeling biomedical assertions in the semantic web.
1357-1361
             
- Samhaa R. El-Beltagy, Maryam Hazman, Ahmed A. Rafea:
 Ontology based annotation of text segments.
1362-1367
             
- Armin Haller, Paavo Kotinurmi, Tomas Vitvar, Eyal Oren:
 Handling heterogeneity in RosettaNet messages.
1368-1374
             
- Holger Billhardt, Ramón Hermoso, Sascha Ossowski, Roberto Centeno:
 Trust-based service provider selection in open environments.
1375-1380
             
- Hao Wu, Hai Jin, Xiaomin Ning:
 An approach for indexing, storing and retrieving domain knowledge.
1381-1382
             
Semantic-based resource discovery,
retrieval and composition (SDRC)
 
Software engineering
 
- Dae-Kyoo Kim, Wuwei Shen:
 An approach to evaluating structural pattern conformance of UML models.
1404-1408
             
- Pedro de Alcântara dos Santos Neto, Rodolfo F. Resende, Clarindo Isaías Pereira da Silva e Pádua:
 Requirements for information systems model-based testing.
1409-1415
             
- Chengying Mao, Yansheng Lu, Jinlong Zhang:
 Regression testing for component-based software via built-in test design.
1416-1421
             
- Martin Höst, Christin Lindholm:
 Different conceptions in software project risk assessment.
1422-1426
             
- Elthon A. S. Oliveira, Hyggo Oliveira de Almeida, Leandro Dias da Silva:
 Formal modelling and verification of a component model using coloured petri nets and model checking.
1427-1431
             
- Pradeep Varma:
 Generalizing recognition of an individual dialect in program analysis and transformation.
1432-1439
             
- Kim Weyns, Per Runeson:
 Sensitivity of software system reliability to usage profile changes.
1440-1444
             
- Fakhar Lodhi, Muhammad Ahmad Ghazali:
 Design of a simple and effective object-to-relational mapping technique.
1445-1449
             
- Marcos Forte, Renato A. T. Claudino, Wanderley Lopes de Souza, Antônio Francisco do Prado, Luiz H. Z. Santana:
 A component-based framework for the internet content adaptation domain.
1450-1455
             
- Giuseppe Di Santo, Eugenio Zimeo:
 Reversing GUIs to XIML descriptions for the adaptation to heterogeneous devices.
1456-1460
             
- Fares Saad-Khorchef, Antoine Rollet, Richard Castanet:
 A framework and a tool for robustness testing of communicating software.
1461-1466
             
- Fei-Ching Kuo, Tsong Yueh Chen, Huai Liu, W. K. Chan:
 Enhancing adaptive random testing in high dimensional input domains.
1467-1472
             
- Soojin Park, Sooyong Park, Vijayan Sugumaran:
 Extending reusable asset specification to improve software reuse.
1473-1478
             
- Lorie M. Liebrock:
 Integration of well posedness analysis in software engineering.
1479-1483
             
- Victor K. Y. Chan, W. Eric Wong:
 Outlier elimination in construction of software metric models.
1484-1488
             
- Lei Wu, Yi Feng, Hua Yan:
 Software reengineering with architecture decomposition.
1489-1493
             
- Dietmar Schreiner, Karl M. Göschka:
 Modeling component based embedded systems applications with explicit connectors in UML 2.0.
1494-1495
             
- Rodrigo Perozzo Noll, Marcelo Blois Ribeiro:
 Enhancing traceability using ontologies.
1496-1497
             
Software verification
 
System on chip design and software supports (SODSS)
 
- ZhiLei Chai, Wenke Zhao, Wenbo Xu:
 Real-time Java processor optimized for RTSJ.
1540-1544
             
- Soo Yun Hwang, Hyeong Jun Park, Kyoung Son Jhang:
 An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix.
1545-1551
             
- Ning Qu, Yulai Zhao, Xuetao Guan, Xu Cheng:
 Unichos: a full system simulator for thin client platform.
1552-1556
             
- Orlando Moreira, Jacob Jan-David Mol, Marco Bekooij:
 Online resource management in a multiprocessor with a network-on-chip.
1557-1564
             
- Hyun-min Kyung, Gi-Ho Park, Jong Wook Kwak, WooKyeong Jeong, Tae-Jin Kim, Sung-Bae Park:
 Performance monitor unit design for an AXI-based multi-core SoC platform.
1565-1572
             
Trust,
recommendations,
evidence and other collaboration know-how (TRECK'07)
 
Ubiquitous computing:
digital spaces,
services and content
 
- Krista M. Dombroviak, Rajiv Ramnath:
 A taxonomy of mobile and pervasive applications.
1609-1615
             
- Hiroaki Kimura, Eiji Tokunaga, Tatsuo Nakajima:
 System support for mobile augmented reality services.
1616-1623
             
- Fahim Kawsar, Kaori Fujinami, Tatsuo Nakajima:
 A lightweight indoor location model for sentient artefacts using sentient artefacts.
1624-1631
             
- Erwin Aitenbichler, Fernando Lyardet, Gerhard Austaller, Jussi Kangasharju, Max Mühlhäuser:
 Engineering intuitive and self-explanatory smart products.
1632-1637
             
- Shinyoung Yi, Jiyoung Yi, Hojung Cha:
 Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices.
1638-1639
             
Web technologies
 
- Nanjangud C. Narendra, Bart Orriëns:
 Modeling web service composition and execution via a requirements-driven approach.
1642-1648
             
- Xinwu Cheng, Lei Li, Jun Wei:
 Automatic enactment of message exchange pattern for web services.
1649-1653
             
- Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia:
 Decentralized authorization and data security in web content delivery.
1654-1661
             
- Ustun Yildiz, Claude Godart:
 Towards decentralized service orchestrations.
1662-1666
             
- Yoo Jung An, James Geller, Yi-Ta Wu, Soon Ae Chun:
 Semantic deep web: automatic attribute extraction from the deep web data sources.
1667-1672
             
- James D. Palmer:
 Exploiting bibliographic web services with CiTeX.
1673-1676
             
- Damiano Distante, Gustavo Rossi, Gerardo Canfora:
 Modeling business processes in web applications: an analysis framework.
1677-1682
             
- Aliaksandr Birukou, Enrico Blanzieri, Vincenzo D'Andrea, Paolo Giorgini, Natallia Kokash, Alessio Modena:
 IC-service: a service-oriented approach to the development of recommendation systems.
1683-1688
             
- Yu Huang, Hanpin Wang:
 A petri net semantics for web service choreography.
1689-1690
             
- Yaojin Yang, Lasse Pajunen:
 Towards supporting user interface agility in developing heterogeneous device enabled business processes.
1691-1692
             
- Aabhas V. Paliwal, Nabil R. Adam, Christof Bornhövd:
 Web service orchestration and verification using MSC and CP nets.
1693-1694
             
Copyright © Fri Mar 12 17:20:37 2010
 by Michael Ley (ley@uni-trier.de)