Download 2014 15th IEEE/ACIS International Conference on Software

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
2014 15th IEEE/ACIS International
Conference
on
Software
Engineering, Artificial Intelligence,
Networking and Parallel/Distributed
Computing
(SNPD 2014)
Vegas, Nevada, USA
2 July 2014
30 June
Las
-
#IEEE
IEEE
ISBN:
Catalog Number:
CFP1479A-POD
978-1-4799-5605-0
Table of Contents
KEYNOTE
Novice and
Expert,
How Are
They Programming Differently?
Simon Xu
VMKit:
1
Improving Design
and Performance of
Managed Runtime
Environments
Bertil Folliot
ALGORITHMS,
Dynamic
3
ARTIFICIAL INTELLIGENCE
Artificial Immune
System and
Milad Dastan Zand, Mohammad
its
application
Kalantari,
to File Transfer
Scheduling Optimization
Shahram Golzari
Feature Selection Method Based on Across Centroid for Text
5
Categorization
Jieming Yang, Zhiying Liu, Zhaoyang Qu, Jing Wang
11
ALGORITHMS COMMUNICATION SYSTEMS
Efficient Structure for LKH Key Tree
An
Secure Multicast Communications
on
Sakamoto Naoshi
17
ARTIFICIAL INTELLIGENCE
OntoSSN: ScientiFIc Social Network
Eya
Ben Ahmed,
Collaborative
Wafa Tebourski,
Wahiba Ben Abdessalem Karaa, Fa'iez
filtering recommendation algorithm based
Mengxing Huang, Longfei Sun,
New
ONTOlogy
Approach
on
on
Gargouri
25
item attributes
Wencai Du
PCA-Based 3D Face
29
Recognition
and Authentication
Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri
Hierarchical
speech recognition system using
Tarek Behi,
Najet Arous,
35
MFCC feature extraction and
Dynamic Spiking
Noureddine Ellouze
RSOM
41
COMMUNICATION SYSTEMS AND NETWORKS
Converting
PCAPs into Weka Mineable Data
Charles Fowler, Robert J. Hammell II
47
Microcredit Risk Assessment
using Crowdsourcing
Tofig Hasanov, Motoyuki Ozeki, Natsuki Oka
and Social Networks
53
COMPONENT-BASED SOFTWARE ENGINEERING
Non-functional
Mohammad
Properties
Aware
CharafEddin,
Effective Domain
Modeling
Configuration Selection
in Component-based Systems
Zoubir Mammeri
59
for Mobile Business AHMS
(Adaptive
Human
Management Systems) Requirements
Haeng-Kon Kim
Questionnaire Report on Matter Relating
Hassan Almari, Clive Boughton
67
to Software Architecture Evaluation
77
CRYPTOGRAPHY AND NETWORK SECURITY
Analysis
and Acceleration of NTRU Lattice-Based
Tianyu Bai, Spencer Davis, Juanjuan Li,
Hai
Cryptographic System
Jiang
83
vii
Survey of Attribute Based Encryption
Zhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang
Neuro Fuzzy
Training of Inteligent Intrusion Detection System Using
89
95
Meharia
Biswajit Panja, Olugbenga Ogunyanwo, Priyanka
Error Value Driven Fault Analysis Attack
Masaya Yoshikawa,
101
Hikaru Goto, Kensaku Asahi
DATA MINING AND MACHINE LEARNING
A Machine
Software
Learning Technique
of Practitioners from
Individually Developed
Projects
Cuauhtemoc
Can Text
Predicting the Productivity
for
Lopez-Martin,
Mining Technique
Arturo
be used
105
Chavoya, Maria Elena Meda-Campana
as an
Alternative Tool for Qualitative Research in Education?
Ill
Carl Lee, Chin-I Cheng, Aklilu Zeleke
Generation of Reducts Based
on
Nearest
Relation
Neighbor
117
Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Kazunori Iwata
Scalable Bootstrap Clustering for Massive Data
Haocheng Wang,
Security and Privacy
Fuzhen
Protocol for
Emerging
Mohammad Fal Sadikin, Marcel
Smart RFID
123
Shi
Zhuang, XiangAo, Qing He, Zhongzhi
Applications
129
Kyas
Bug Report Multiclass Classification
Hierarchical Dirichlet Process with Latent Dirichlet Allocation in
Comparing
137
Nachat Limsettho, Hideaki Hata, Ken-Ichi Matsumoto
New Data Warehouse
Design Approach Based
Tebourski Wafa, Wahiba Karaa, Henda
Using
Client-Side Access
Partitioning
on
Principal Component Analysis
143
Ben Ghezela
for Data
Clustering
in
Big
Data
Applications
149
Dapeng Liu, Shaochun Xu, Zengdi Cui
IMAGE, SPEECH,
Post
Processing
AND SIGNAL PROCESSING
for Dense Stereo
Matching by Iterative
Local Plane
Fitting
155
Hongbo Lu, Haibo Meng, Kun Du, Yuan Sun, Yuanchao Xu, Zhimin
INFORMATION ASSURANCE
A Theoretical
Sidney
Analysis
Exploration
of the
Impact
of Packet Loss
on
Network Intrusion Detection
161
C. Smith, Robert J. Hammell II, Travis W. Parker, Lisa M. Marvel
of
ID-based Proxy Signature Scheme Without Trusted PKG and
an
Scheme Without Trusted PKG and
a
Proxy
Blind
Multi-signature
a
Proxy Blind Multi-signature
Scheme
167
Sha Limin
Developing
and
Building
a
Quality Management System Based
on
Stakeholder Behavior into
Enterprise
Architecture
Dominic M.
171
Mezzanotte, Sr, Josh
INTERNET TECHNOLOGY AND
A Framework for Mobile
APPLICATIONS/ WEB-BASED APPLICATIONS
eLearning (mLearning) with Analytical Decision Model
177
Jahangir Dewan, Morshed Chowdhury
MOBILE/WIRELESS/AD-HOC NETWORKS
Jade: An Efficient
Energy-aware Computation Offloading System
with
Heterogeneous
Network Interface
Bonding
for Ad-hoc Networked Mobile Devices
Hao
Qian,
183
Daniel Andresen
viii
Energy Balanced Topology Construction
Soumya Saha, Lifford McLauchlan
An
Ensuring the
and
Integrity
Protocol for Wireless Sensor Networks
191
Non-Repudiation of
E-Invoices in Conventional Channels with
Remitting
Commercially
Available NFC Devices
Shi-Cho
Cha,
Ynh-Jzer
Joung, Yen-Chung Tseng,
Shih-Chieh
Huang, Guan-Heng Chen, Chih-Teng Tseng.
197
NEURAL NETWORKS GENETIC ALGORITHMS
Simplification of Chaotic
On
Toshinori
Deguchi,
Neural Network
on
Incremental
Learning
Toshiki Takahashi, Naohiro Ishii
203
PARALLEL AND DISTRIBUTED COMPUTING
AES-128 ECB
Encryption
Abdul Jabbar
GPUs and Effects of
Plaintext Patterns
Performance
on
Anas Almousa, Allam
Fatayar,
Abdul Rahman
Ibrahim,
207
with Low
Memory Requirements
Yuanchao Xu, Haibo
Yasong Zheng,
Padding
Input
Mayez Al-Mouhamed,
Siddiqui
Optimizing MapReduce
Ayaz
on
ul Hassan Khan Khan,
Ayaz
Meng,
for
Shared-Memory Systems
Xiaochun Ye, Lingjun Fan, Futao Miao,
Free Bank Conflict Resolution for CUDA-Based Matrix
ul Hassan Khan,
Mayez Al-Mouhamed,
Allam
Fatayar,
Dongrui
Fan
213
Transpose Algorithm
Anas
Almousa, Abdulrahman Baqais,
Mohammed Assayony
219
Unbinds Data and Tasks to
Kun
High
Improving
the
Hadoop Performance
Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang
225
Performance and Grid Computing with Quality of Service Control
Sadiq
M. Sait, RaedAl-Shaikh
231
SOFTWARE MANAGEMENT
Refinement/Verification of Early Stage Probabilistic Software Project Schedules in the Planning Stage
Donghwoon
Kwon, Robert J. Hammell
239
SOFTWARE SPECIFICATION ARCHITECTURE
A
Dialogue-Based
Framework for the User
Requirements Description Language pLSCs
Jinyu Kai,
Design
Huaikou Miao,
Patterns
Honghao
Concerns in the
245
Three-Stage
Events
Gao
251
for Networked First Person
Development
Chia-Chu
Legacy Application
for Probabilistic Branches and
Applied
Junfeng Qu, Yong Wei, Yinglei Song
Software
of a
Roberto Paiano, Andrea Pandurino
Angelo Martella,
A
Experience Reengineering
Shooting
Game
Programming
257
Building
of Service-Oriented Based Enterprise Systems
Chiang
263
Strategy-Guided Requirements Development
Xiaofeng Cui,
Richard
and Validation
269
Paige
SOFTWARE TESTING VISUAL AND MULTIMEDIA COMPUTING
Test
Image
Generation
Tahir Jameel, Lin
using Segmental Symbolic
Mengxiang,
Evaluation for Unit
Testing
Li He, Hou Xiaomei
275
SPECIAL SESSION 1: ANALYSIS, EVALUATION, AND USAGE OF WEB
BEHAVIORS,
INFORMATION,
SYSTEM
AND HUMAN ACTIONS
Consideration of Cross-validation in Estimating Objective Scores of Answer Statements Posted
Yokoyama Yuya,
Hochin Teruhisa,
Nomiya
Hiroki
at
QA
Sites
281
ix
Considerations
on
Pauses and Fundamental Movements for
Teruhisa Hochin, Hiroki
The
Analysis
Method
Transmitting
Traditional Skills
287
Nomiya
Focusing
on
Peaks of Darkness for the
Impression
Evaluation Method by Space
293
Shunsuke Akai, Teruhisa Hochin, Hiroki Nomiya
SPECIAL SESSION 2: DATA MINING FOR INFO-COMMUNICATION NETWORKS AND SERVICE
DIFFUSION
An Efficient Structure for LKH
Key
Tree
Secure Multicast Communications
on
299
Naoshi Sakamoto
An
Improvement
of Micro Area Selection Technique for the Diffusion of ICT Infrastructure
Motoi Iwashita,
Risk Assessment
Shigeaki
Quantification
307
Takeshi Kurosawa, Ken Nishimatsu
Akiya Inoue,
in Life
Log
Service
Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita,
Hiroyuki Sato,
313
Atsushi Kanai
SPECIAL SESSION 3: EXPERIENCES OF SOFTWARE ENGINEERING
A
proposal
of Cloud-based Home Network
System
for Multi-Vendor Services
Satoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura
A
Rule-Based Framework for Managing
Context-Aware Services Based
on
319
Heterogeneous
and Distributed Web
Services
Hiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura
An Obfuscation Method to Build
a
Fake Call Flow
Graph by Hooking
325
Method Calls
331
Kazumasa Fukuda, Haruaki Tamada
Brain
Activity Measurement during Program Comprehension
with NIRS
337
Ikutani Yoshiharu, Uwano Hidetake
Designing
Service Framework for Virtual
and
Implementing
Hiroyasu Horiuchi, Sachio Saiki, Shinsuke
Pitfalls of
Analyzing
a
Agents
in Home Network
System
Matsumoto, Masahide Nakamura
Cross-company Dataset
of Software Maintenance and
343
Support
349
Masateru Tsunoda, Kenichi
Toward A
Dynamic Analysis Technique
to Locate
Framework Misuses That Cause Unexpected Side Effects
355
Naoya Nitta, Etsuya Shibayama
Stories in Agile Software Development
Izuru Kume, Masahide Nakamura,
Using
Goal Net to Model User
Jun Lin, Han Yu,
Zhiqi Shen, Chunyan
361
Miao
SPECIAL SESSION 4: THEORY AND PRACTICE OF INTELLECTUAL SOFTWARE
A Data Structure for
Triangular
Dissection of Multi-Resolution
Images
367
Taiyou Kikuchi, Koichi Anada, Shinji Koka, Youzou Miyadera, Takeo Yaku
A Source Code
Plagiarism Detecting
Method
Using Alignment
with Abstract
Syntax
Tree Elements
Kikuchi Hiroshi, Goto Takaaki, Wakatsuki Mitsuo, Nishino Tetsuro
An
Application
of 3D
Spiral
Chieko Kato, Futoshi
Zhuang Heliang,
Multisensory Images
Evoked
Kazuyoshi Ichihashi,
Software
by Olfactory
375
Uchida-Kraepelin Psychodiagnostic
Sugimoto,
Test
Kensei Tsuchida
381
Stimuli
Hideki Ichihashi
Ontology Design
Mahfuzus
Visualization to the
to
387
Support Organized Open Source Software Development
Salam Khan, Anwarus Salam Khan, Takaaki Goto, Tetsuro Nishino,
Narayan
Debnath
393
SPECIAL SESSION 5: SIGNAL PROCESSING FOR SOCIAL WELFARE
Applications
Shenglin
of Ultrasonic Sensors and Obrid-Sensor in
Mu, Shota Nakashima,
Kanya
Safety
Tanaka
Confirmation
System
for Elders
399
x
Detection
Type Obrid-Sensor
Shenglin Mu, Tatsuya Ichikawa,
Range Fitting
Shota Nakashima,
of Slit
Hiromasa Tomimoto, Shintaro
Okabe, Kanya Tanaka,
Yuhki Kitazono, Seiichi Serikawa
Development
of Input Assistance
Naruki Shirahama, Yuki
Development
405
Application
Sakuragi,
for Mobile Devices for
Satoshi Watanabe,
of Leaving-bed Detection
System
Physically
Naofumi Nakaya,
to Prevent
Midnight
Disabled
Yukio Mori, Kazunori
411
Miyamoto...
Prowl
Yuhki Takahashi, Yuhki Kitazono, Shota Nakashima
One Dimensional
Hand
Shape
Instruction
of Eye-gaze
Application
to a
Learning System
Takashi Kuremoto, Takuhiro Otani, Masanao
Proposal
417
SOM with Asymmetric Neighborhood Function and its
Ring Type Growing
Method for
Recognize
Obayashi,
Input
Kunikazu
Kobayashi, Shingo
Interface without Infra-red
Mabu
423
Ray Equipment
Kazuki Fukushima, Naruki Shirahama
429
SPECIAL SESSION 6: SOFTWARE TESTING 1
An Efficient Reduction
Approach
to Test Suite
435
Pan Liu
Dynamic
Test Case Prioritization based
on
Multi-objective
441
Xiaolin Wang, Hongwei Zeng
Modeling Web Application
Xinxin Li,
VM
scheduling strategies
Compatibility Testing
based
447
on
artificial
intelligence
in Cloud
Testing
Shidong Huang, Zhihong Wang
Bat Algorithm for Optimization in Radiation Therapy
Yang Zheng,
A Self-tuned
for Cross-browser
Hongwei Zeng
453
Lizhi Cai,
Treatment
Planning
461
Georgios Kalantzis, Yu Lei
Big
Data in
Memory: Benchimarking
In Memory Database
Using
the Distributed
Key-Value
Store for
Machine to Machine Communication
Michiaki Iwazume, Takahiro Iwase,
Kouji Tanaka,
Hideaki
Fujii,
Makoto
Hijiya,
Hiroshi
Haraguchi
467
474
Author Index
xi
Related documents