Search Results - "2011 IEEE 35th Annual Computer Software and Applications Conference"
-
1
Medical Technology in Smart Homes: Exploring the User's Perspective on Privacy, Intimacy and Trust
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…This paper reports on a study exploring the attitudes of users towards video-based monitoring systems for long-term care of elderly or disabled people in smart…”
Get full text
Conference Proceeding -
2
SLA-Aware Application Deployment and Resource Allocation in Clouds
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Provisioning resources as a service in a scalable on-demand manner is a basic feature in Cloud computing technology. Service provisioning in Clouds is based on…”
Get full text
Conference Proceeding -
3
A Framework for Resource Allocation Strategies in Cloud Computing Environment
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…This paper presents a critical evaluation of current network resource allocation strategies and their possible applicability in Cloud Computing Environment…”
Get full text
Conference Proceeding -
4
Business Process as a Service: Chances for Remote Auditing
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…The advent of cloud computing allows the provision of several commodities "as-a-service". For enterprise systems, a particularly interesting business model is…”
Get full text
Conference Proceeding -
5
Towards Training Set Reduction for Bug Triage
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Bug triage is an important step in the process of bug fixing. The goal of bug triage is to assign a new-coming bug to the correct potential developer. The…”
Get full text
Conference Proceeding -
6
Injecting Comments to Detect JavaScript Code Injection Attacks
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Most web programs are vulnerable to cross site scripting (XSS) that can be exploited by injecting JavaScript code. Unfortunately, injected JavaScript code is…”
Get full text
Conference Proceeding -
7
Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of Concept
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Efficient and accurate malware detection is increasingly becoming a necessity for society to operate. Existing malware detection systems have excellent…”
Get full text
Conference Proceeding -
8
Ant Colony Optimization for Deadlock Detection in Concurrent Systems
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Ensuring deadlock freedom is one of the most critical requirements in the design and validation of concurrent systems. The biggest challenge toward the…”
Get full text
Conference Proceeding -
9
An Interactive Web-Based Visualization Tool: Design and Development Cycles
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Current advancements in web technologies are enabling to develop new features of interactive systems that rely on cloud infrastructure and services. In this…”
Get full text
Conference Proceeding -
10
Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone Environments
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Location-based services (LBSs) gain a massive shift in popularity these days and are about to take the next step towards proactive LBSs. In comparison to…”
Get full text
Conference Proceeding -
11
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or…”
Get full text
Conference Proceeding -
12
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Recently, a number of tools for automated code scanning came in the limelight. Due to the significant costs associated with incorporating such a tool in the…”
Get full text
Conference Proceeding -
13
Usage-Based Online Testing for Proactive Adaptation of Service-Based Applications
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Increasingly, service-based applications (SBAs) are composed of third-party services available over the Internet. Even if third-party services have shown to…”
Get full text
Conference Proceeding -
14
A Performance Guarantee Approach for Cloud Applications Based on Monitoring
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Cloud computing, a paradigm shift that offer computing resources in a pay-as-you-go manner, is expected to minimize service operators' cost without sacrificing…”
Get full text
Conference Proceeding -
15
Channel Modeling for Wireless Underground Sensor Networks
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Wireless underground sensor networks (WUSNs) consist of wireless devices buried below the ground surface and aboveground sink devices, in which the…”
Get full text
Conference Proceeding -
16
Joint COMPSAC/SAINT 2011 Panel: International Perspectiveson Computed World: Software Beyond the Digital Society
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Summary form only given, as follows. A record of the panel discussion was not made available for publication as part of the conference proceedings. Creating…”
Get full text
Conference Proceeding -
17
Panel III "Smart Technology" -- Applications and Infrastructure
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…"Smart" technology spans a broad array of application domains, from critical infrastructure systems such as smart power grids to intelligent healthcare and…”
Get full text
Conference Proceeding -
18
P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…One of the key service of social networks is path discovery, in that release of a resource or delivering of a service is usually constrained by the existence…”
Get full text
Conference Proceeding -
19
Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives -- Panel Introduction
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Formal methods are mathematically-based techniques for the specification, development and verification of software and hardware systems. The term has been…”
Get full text
Conference Proceeding -
20
Conformance Checking with Constraint Logic Programming: The Case of Feature Models
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference (01-07-2011)“…Developing high quality systems depends on developing high quality models. An important facet of model quality is their consistency with respect to their…”
Get full text
Conference Proceeding