Search Results - "2011 IEEE 35th Annual Computer Software and Applications Conference"

Refine Results
  1. 1

    Medical Technology in Smart Homes: Exploring the User's Perspective on Privacy, Intimacy and Trust by Ziefle, M., Rocker, C., Holzinger, A.

    “…This paper reports on a study exploring the attitudes of users towards video-based monitoring systems for long-term care of elderly or disabled people in smart…”
    Get full text
    Conference Proceeding
  2. 2

    SLA-Aware Application Deployment and Resource Allocation in Clouds by Emeakaroha, V. C., Brandic, I., Maurer, M., Breskovic, I.

    “…Provisioning resources as a service in a scalable on-demand manner is a basic feature in Cloud computing technology. Service provisioning in Clouds is based on…”
    Get full text
    Conference Proceeding
  3. 3

    A Framework for Resource Allocation Strategies in Cloud Computing Environment by Arfeen, M. A., Pawlikowski, K., Willig, A.

    “…This paper presents a critical evaluation of current network resource allocation strategies and their possible applicability in Cloud Computing Environment…”
    Get full text
    Conference Proceeding
  4. 4

    Business Process as a Service: Chances for Remote Auditing by Accorsi, R.

    “…The advent of cloud computing allows the provision of several commodities "as-a-service". For enterprise systems, a particularly interesting business model is…”
    Get full text
    Conference Proceeding
  5. 5

    Towards Training Set Reduction for Bug Triage by Weiqin Zou, Yan Hu, Jifeng Xuan, He Jiang

    “…Bug triage is an important step in the process of bug fixing. The goal of bug triage is to assign a new-coming bug to the correct potential developer. The…”
    Get full text
    Conference Proceeding
  6. 6

    Injecting Comments to Detect JavaScript Code Injection Attacks by Shahriar, H., Zulkernine, M.

    “…Most web programs are vulnerable to cross site scripting (XSS) that can be exploited by injecting JavaScript code. Unfortunately, injected JavaScript code is…”
    Get full text
    Conference Proceeding
  7. 7

    Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of Concept by Blount, J. J., Tauritz, D. R., Mulder, S. A.

    “…Efficient and accurate malware detection is increasingly becoming a necessity for society to operate. Existing malware detection systems have excellent…”
    Get full text
    Conference Proceeding
  8. 8

    Ant Colony Optimization for Deadlock Detection in Concurrent Systems by Francesca, G., Santone, A., Vaglini, G., Villani, M. L.

    “…Ensuring deadlock freedom is one of the most critical requirements in the design and validation of concurrent systems. The biggest challenge toward the…”
    Get full text
    Conference Proceeding
  9. 9

    An Interactive Web-Based Visualization Tool: Design and Development Cycles by Vogel, B.

    “…Current advancements in web technologies are enabling to develop new features of interactive systems that rely on cloud infrastructure and services. In this…”
    Get full text
    Conference Proceeding
  10. 10

    Energy-Efficient Position Tracking in Proactive Location-Based Services for Smartphone Environments by Bareth, U., Kupper, A.

    “…Location-based services (LBSs) gain a massive shift in popularity these days and are about to take the next step towards proactive LBSs. In comparison to…”
    Get full text
    Conference Proceeding
  11. 11

    L1 - An Intermediate Language for Mixed-Protocol Secure Computation by Schropfer, A., Kerschbaum, F., Muller, G.

    “…Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or…”
    Get full text
    Conference Proceeding
  12. 12

    Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities by Chatzieleftheriou, G., Katsaros, P.

    “…Recently, a number of tools for automated code scanning came in the limelight. Due to the significant costs associated with incorporating such a tool in the…”
    Get full text
    Conference Proceeding
  13. 13

    Usage-Based Online Testing for Proactive Adaptation of Service-Based Applications by Sammodi, O., Metzger, A., Franch, X., Oriol, M., Marco, J., Pohl, K.

    “…Increasingly, service-based applications (SBAs) are composed of third-party services available over the Internet. Even if third-party services have shown to…”
    Get full text
    Conference Proceeding
  14. 14

    A Performance Guarantee Approach for Cloud Applications Based on Monitoring by Jin Shao, Qianxiang Wang

    “…Cloud computing, a paradigm shift that offer computing resources in a pay-as-you-go manner, is expected to minimize service operators' cost without sacrificing…”
    Get full text
    Conference Proceeding
  15. 15

    Channel Modeling for Wireless Underground Sensor Networks by Hu Xiaoya, Gao Chao, Wang Bingwen, Xiong Wei

    “…Wireless underground sensor networks (WUSNs) consist of wireless devices buried below the ground surface and aboveground sink devices, in which the…”
    Get full text
    Conference Proceeding
  16. 16

    Joint COMPSAC/SAINT 2011 Panel: International Perspectiveson Computed World: Software Beyond the Digital Society by Yau, Stephen S.

    “…Summary form only given, as follows. A record of the panel discussion was not made available for publication as part of the conference proceedings. Creating…”
    Get full text
    Conference Proceeding
  17. 17

    Panel III "Smart Technology" -- Applications and Infrastructure by Sedigh, Sahra

    “…"Smart" technology spans a broad array of application domains, from critical infrastructure systems such as smart power grids to intelligent healthcare and…”
    Get full text
    Conference Proceeding
  18. 18

    P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks by Mingqiang Xue, Carminati, B., Ferrari, E.

    “…One of the key service of social networks is path discovery, in that release of a resource or delivering of a service is usually constrained by the existence…”
    Get full text
    Conference Proceeding
  19. 19

    Panel II Formal Methods Applied in Industry: Success Stories, Limitations, Perspectives -- Panel Introduction by Seceleanu, Cristina

    “…Formal methods are mathematically-based techniques for the specification, development and verification of software and hardware systems. The term has been…”
    Get full text
    Conference Proceeding
  20. 20

    Conformance Checking with Constraint Logic Programming: The Case of Feature Models by Mazo, Raul, Lopez-Herrejon, Roberto E., Salinesi, Camille, Diaz, Daniel, Egyed, Alexander

    “…Developing high quality systems depends on developing high quality models. An important facet of model quality is their consistency with respect to their…”
    Get full text
    Conference Proceeding