|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PRELIMINARY PROGRAM SOFTNET 2010 ICSEA 2010 / ICSNC 2010 / VALID 2010 / SIMUL 2010
Sunday, August 22
Monday, August 23
Tuesday, August 24
Wednesday, August 25
Thursday, August 26
Friday, August 27
DETAILED PROGRAM
ICSEA 2010 ICSEA 1: Advances in Fundamentals for Software Development I PercSoft: A Novel Approach to Software Maintenance and Enhancement Evaluation of Service Designs Based on SoaML A New General Approach to Model Event Handling Supporting an Aspect-Oriented Approach to Web Accessibility Design ICSEA 2: Advances in Fundamentals for Software Development II Home Appliance Virtualization Software Configuration for Home Network Services What Does Research Say about Agile and Architecture? The Automatic Discovery of Violations to the Normalized Systems Design Theorems: A Feasibility Study Understanding Customer Expectations for System Development ICSEA 3: Advances in Fundamentals for Software Development III A Meta-model Supporting the Decomposition of Problem Descriptions Translating Ontological Business Transactions into Evolvable Information Systems Issues and Challenges of Requirement Engineering in Service Oriented Software Development Placement of Entities in Object-Oriented Systems by Means of a Single-Objective Genetic Algorithm ICSEA 4: Advances in Fundamentals for Software Development IV Supporting Service Design Decisions Status Communication in Agile Software Teams: A Case Study Adding Optimization to the Decompilable Code Editor A Domain-Oriented Approach for GIS Component Selection ICSEA 5: Advances in Fundamentals for Software Development V An Approach to Method-Tool Coupling for Software Development On the Derivation of Class Diagrams from Use Cases and Logical Software Architectures CRUD-DOM: A Model for Bridging the Gap between the Object-Oriented and the Relational Paradigms Do the Software Architects Get the Needed Support for the Job They Perform? ICSEA 6: Advances in Fundamentals for Software Development VI Extending the UML Metamodel for Sequence Diagram to Enhance Model Traceability CoDocent: Support API Usage with Code Example and API Documentation An Approach for Combining Model-Based and Scenario-Based Software Architecture Analysis Content Server Architecture Pattern for Evolvability and Scalability ICSEA 7: Advances in Fundamentals for Software Development VII A Metamodel-Based Approach to Information Systems Evolution and Data Migration Agile Engineering of Internal Domain-Specific Languages with Dynamic Programming Languages Syntax and Semantics of Workflows That Include Passbacks Developing Fault Tolerant Distributed Systems by Refinement ICSEA 8: Business Technology Service Level Agreements Compliance Checking in the Cloud Computing: Architectural Pattern, Prototype, and Validation On Using Metadata and Compression Algorithms to Cluster Heterogeneous Documents from a Semantic Point of View A Review of Productivity Factors and Strategies on Software Development CuteLoop - An Approach for Networked Devices Enabled Intelligence ICSEA 9: Software Deployment and Maintenance I An Approach to GA-Driven Automatic Refactoring Based on Design Patterns Demarcating the Scope of a Predelivery Maintenance Process .NET Reverse Engineering with MARPLE Improving Release and Patch Management Processes: An Empirical Case Study on Process Challenges ICSEA 10: Software Deployment and Maintenance II Change Impact Analysis and Software Evolution Specification for Continually Evolving Systems Demarcating the Scope of a Handover Process Rework Requirement Changes in Software Maintenance A FAQ Finding Process in Open Source Project Forums A Scenario of Service-Oriented Principles Adaptation to the Telecom Providers Service Delivery Platform ICSEA 11: Software Engineering Techniques, Metrics, and Formalisms I Security Quality Assurance on Web-Based Application through Security Requirements Tests: Elaboration, Execution and Automation Business and Information System Alignment: A Formal Solution for Telecom Services Design Rationale Capture in the Globalised Enterprise: An Industrial Study Living on the MoVE: Towards an Architecture for a Living Models Infrastructure An AspectJ Approach for Reusable Infrastructure Components ICSEA 12: Software Engineering Techniques, Metrics, and Formalisms II OOPN and DEVS Formalisms for System Specification and Analysis Experience Management for Very Small Entities: Improving the Copy-Paste Model Measuring the Pro-Activity of Software Agents Understanding the Use of Elicitation Approaches for Effective Requirements Gathering A Risk Assessment Model for Offshoring Using CMMI Quantitative Approach ICSEA 13: Advanced Design Tools for Developing Software I Aspect-Oriented Modeling: Issues and Misconceptions Cognitive Profiles in Understanding and Prioritizing Requirements: A Case Study Towards Automated Context-Aware Software Quality Management ICSEA 14: Advanced Design Tools for Developing Software II Supporting Hardware-Related Software Development with Integration of Development Tools Tool Support for Software Architecture Design with Genetic Algorithms Quality of Service Attributes in Web Services Testing-Based Selection Method for Integrability on Service-Oriented Applications ICSEA 15: Software Economics, Adoption, and Education Developing Domain-Ontologies to Improve Sofware Engineering Knowledge Methodological and Technological Framework Proposal to Capitalize Organizational Knowledge Transitioning to Distributed Development in Students' Global Software Development Projects: The Role of Agile Methodologies and End-to-End Tooling ICSEA 16: Specialized Software Advanced Applications I Minimizing CO2 Emissions in a Computing World Sensing WithSense - An Intelligent Interface for Participatory Sensing On the Design of a Management Platform for Antibiotic Guidelines in the Intensive Care Unit ICSEA 17: Specialized Software Advanced Applications II Ontology-Based Similarity Measurement in Software Projects through SimReq Framework A Data Mining System for the Generation of Geographical C16 Cancer Patterns Disjoint-Knowledge Analysis and Preservation in Ontology Merging Process ICSEA 18: Advances in Software Testing I A Software Traceability Approach to Support Test Coverage Analysis Testing Web-Services Using Test Sheets A Symbolic Execution Tool Based on the Elimination of Infeasible Paths ICSEA 19: Advances in Software Testing II RemoteTest: A Framework for Testing Distributed Systems Implementing Software Test Management Using SpiraTeam Tool A Proactive Approach to Test Service Level Agreements Automatic Generation of Test Suites from Decision Table - Theory and Implementation ICSEA 20: Software Performance Predicting Data Access Patterns in Object-Oriented Applications Based on Markov Chains Using CPU Stubs to Optimize Parallel Processing Tasks: An Application of Dynamic Performance Stubs An Availability Algorithm for Backup Systems Using Secure P2P Platform Benchmarking the Efficiency of Array Processing for Various Types of Language Processors Evaluating Adaptation Behavior of Adaptive Systems ICSEA 21: Software Security, Privacy, Safeness An Approach Dedicated for Web Service Security Testing D-WAV: A Web Application Vulnerabilities Detection Tool Using Characteristics of Web Forms Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques Multiclass S-Reliability for Services in SOA
ICSNC 2010 ICSNC 1: SENET I Testbed Environment for Wireless Sensor and Actuator Networks Authentication and Anti-replay Security Protocol for Wireless Sensor Networks Sensor Network Management for Healthcare Applications Energy Evaluation of PMCMTP for Large-Scale Wireless Sensor Networks ICSNC 2: SENET II Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol Fusion-Aware Routing in Wireless Sensor Networks Robustness of Receiver-Driven Multi-hop Wireless Network with Soft-State Connectivity Management Cooperative Sensor Networks for VRU eSafety ICSNC 3: SENET III Performance Evaluation of IEEE 802.15.4 MAC in Beacon-Enabled Tree-Topology Wireless Sensor Networks Robust Data Collection and Lifetime Improvement in Wireless Sensor Networks through Data Imputation CUPID - Communication Pattern Informed Duty Cycling in Sensor Networks Obstacle Handling in Context-Aware Multilayer Hierarchical Protocol for Wireless Sensor Networks ICSNC 4: SENET IV ENS: An Energy Harvesting Wireless Sensor Network Platform Impact of Mobile Event Movement on the Performance of Wireless Sensor Networks Modeling Energy Consumption of Wireless Sensor Networks by SystemC WiSe-Nodes: A Family of Node Prototypes for Wireless Sensor Networks ICSNC 5: VENET Vehicular Networks in a Computerized City Using Safe Mobile A Novel RSU-Based Message Authentication Scheme for VANET A Cloud PAAS for High Scale, Function, and Velocity Mobile Applications - With Reference Application as the Fully Connected Car A System for Managing Vehicle Location Data with Optimal Privacy Features ICSNC 6: RFID Localization Using Multisensor Fusion of IMM Fixed Lag Smoother in a Cricket Sensor Network A Trusted Platform Module for Near Field Communication Multiple Loop Antenna against Skimming Attack Server Impersonation Attacks and Revisions to SLAP, RFID Lightweight Mutual Authentication Protocol ICSNC 7: SESYS I An Approach for Protecting Privacy on Social Networks An Improved Multi-path Key Establishment under REM Attacks in Wireless Sensor Networks A Process Approach to Manage the Security of the Communication Systems with Risk Analysis Based on Epidemiological Model AES Performance Analysis on Several Programming Environments, Operating Systems or Computational Platforms Distributed Locking using Web Services ICSNC 8: SESYS II Efficient Uniform k-out-of-n Generators A Secure Gateway Service for Accessing Networked Appliances A Security Framework to Protect against Social Networks Services Threats Performance Evaluation of a Disaster Recovery System and Practical Network System Applications High Avaliability: A Long-Term Feature in Network Elements ICSNC 9: MHNET I Collaborative Streaming for Colocated Subscribers in Mobile Networks Automatic Deployment of a Communication Mesh for Synchronous e-Learning Activities An Aircraft Based Emulation Platform for LEO Satellite Antenna Beam Steering Investigation of Channel Formation in a MANET Computation of a Nash Equilibrium of Multiple-Leader Stackelberg Network Games ICSNC 10: MHNET II An Enhanced Indoor Localization Algorithm Based on IEEE 802.11 WLAN Using RSSI and Multiple Parameters Continuous Nearest Neighbor Queries in Weight Changing Road Networks Handing Multiple Communications Sessions for the Next Generation of Wireless Networks Physical Layer Impact in Wireless Ad Hoc Network Routing ICSNC 11: MCSYS I Evaluation of Quality-of-Service Support in MultiProtocol Label Switching Estimation of Subjective Video Quality as Feedback to Content Providers Creating Web Services Using a Rule-Based Language A Unicast-Based IPTV Service Control ICSNC 12: MCSYS II IMS Centralized Network Architecture towards Convergence Services A Scheduling Algorithm for Overhead Reduction in IEEE 802.16 Cross-Layer Design of Internet Group Management Protocol for Mobile IPTV Services in WiMAX ICSNC 13: WINET I MANETs from Zones to Threshold Reference Signals Power Allocation for Uplink MU-MIMO in LTE System Channel Estimation for Alamouti Coded OFDM over Time Variant Channel with Different Receivers Pervasive InfoStation-Based mLearning System Evaluation and Comparison of Signaling Protocol Alternatives for the Ultra Flat Architecture ICSNC 14: WINET II Bootstrapped Iterative Decoding Algorithms for Low Density Parity Check (LDPC) Codes Long Idle: Making Idle Networks Quiet for Platform Energy-Efficiency Interference and Power Minimization in TDMA-OFDMA Infrastructure Wireless Mesh Networks An Easy Cellular Gateway for Providing Shared Services and Data A Cross-Layer Subcarrier Allocation Scheme with QoS Guarantee and Fairness in IEEE 802.16e System ICSNC 15: HSNET I Performance Evaluation of Fixed Routing Algorithms in All-Optical Networks under Non-uniform Traffic Dynamics of Feedback-Induced Packet Delay in Power-Law Networks A Study of Bare PC SIP Server Performance Prefilter Bandwidth Effects in Carrier Wave Phase Synchronizers Prefilter Bandwidth Effects in Data Symbol Phase Synchronizers of Open Loop ICSNC 16: HSNET II Software-Based Packet Capturing with High Precision Timestamping for Linux Evaluating Application-Layer Classification Using a Machine Learning Technique over Different High Speed Networks Prefilter Bandwidth Effects in Data Symbol Phase Synchronizers of Mixed Loop Prefilter Bandwidth Effects in Data Symbol Phase Synchronizers of Closed Loop
CENTRIC 2010 CENTRIC 1: User-Centric Networking and Services A User Perspective on Cloud Computing Protecting Voice over IP Communication Using Electronic Identity Cards Estimations and Remedies for Quality of Experience in Multimedia Streaming GlobaliD - Privacy Concerns on a Federated Identity Provider Associated with the Users’ National Citizen’s Card CENTRIC 2: Centric Views The Activity Circle: Building a Bridge between Workflow Technology and Social Software Gesture-Based Interaction: Concept Map and Application Scenarios A Web Script-Based Method to Evaluate User Satisfaction of Mobile Services in the Field Modulating Membership Grades to Gain Consensus for Fuzzy Set Uncertainty Values in a Clinical Decision Support System CENTRIC 3: User-Centric Mechanisms and Applications Exploring a Hybrid Approach for Modeling Context Awareness Using Analytic Hierarchy Process and Simulation User-Centered Interface Reconfiguration for Error Reduction in Human-Computer Interaction Effects of Automated Dose-Dispensing System on Medication Management Process CENTRIC 4: Technologies for Personalized Services Secured Image Transmission Using Wavelets for Spread Spectrum Communication in a Remote Surveillance System A Method of Inferring the Preferences and Mood of Mobile Phone Users by Analyzing Pictograms and Emoticons Used in their Emails Weight-Shifting Mobiles: Motion and Tilt in One-Dimensional Gravitational Displays Digital Watermarking of MP3 File Using Psychoacoustic Auditory Model and FH SS/MFSK Telecardiology for e-Diagnosis and e-Learning in Rural Area of Sabah, Malaysia: A Novel Approach for Cardiac Services in Rural Medicine CENTRIC 5: EuroCAT Prospects for Context Prediction Despite the Principle of Informational Self-Determination User requirement and Protection Profile for secure location sharing A Privacy-Enhanced M-Transactions Architecture for Awareness and Trust Context-Aware Analysis of Data Sharing Agreements A Context-Awareness Framework for Intelligent Networked Embedded Systems CENTRIC 6: MultiA-Pro A Survey on User Modeling in Multi-application Environments Improving Information Retieval by Modelling Business Context
VALID 2010 VALID 1: Software Verification and Validation I Argument-Driven Validation of Computer Simulations - A Necessity, Rather than a Option Model-Based Testing of Infotainment Systems on the Basis of a Graphical Human-Machine Interface A Hybrid Approach for Model-Based Random Testing Unsteady Ground: Certification to Unstable Criteria VALID 2: Software Verification and Validation II Dihomotopic Deadlock Detection via Progress Shell Decomposition Analysis of Testability Metrics for Lustre/Scade Programs Hybrid Approach for Protocol Testing of LTE System: A Practical Case Study Runtime Testability in Dynamic High-Availability Component-Based Systems VALID 3: Software Verification and Validation III The SQALE Analysis Model: An Analysis Model Compliant with the Representation Condition for Assessing the Quality of Software Source Code Discretizing Technical Documentation for End-to-End Traceability Tests Automated Verification of Shared Libraries for Backward Binary Compatibility Investigation of OSCI TLM-2.0 Employment in Grid Computing Simulation Variability Management in Embedded Product Line Analysis VALID 4: Defects and Debugging Interacting Entities Modelling Methodology for Robust Systems Design Defective Behaviour of an 8T SRAM Cell with Open Defects Using Hardware Performance Counters for Fault Localization An Approach for Classifying Program Failures VALID 5: Testing Techniques and Mechanisms On the Standardization of a Testing Framework for Application Deployment on Grid and Cloud Infrastructures A Tool-Based Methodology for System Testing of Service-Oriented Systems Automated Security Test Approach for SIP-Based VoIP Softphones Precise QoS Metrics Monitoring in Self-Aware Networks Approaching Performance Testing from a Model-Based Testing Perspective
SIMUL 2010 SIMUL 1: Process Simulation Application of Simulation to Design and Operation of Steel Mill Devoted to Manufacture of Line Pipes Automatic Experiments Design for Discrete Event System Thermal Simulation for Development Speed-Up Foresight: A Structured Graphical Approach to Constraint-Based Project Planning Agent-Based Simulation of Healthcare for Type II Diabetes SIMUL 2: Transport Simulation Submicroscopic and Physics Simulation of Autonomous and Intelligent Vehicles in Virtual Reality Evaluation of Collective Taxi Systems by Discrete-Event Simulation System Dynamics Simulation as a Decision Support System for Evaluating the Impact of a New Supermarket Opening on Urban Traffic Flows DynaMIT 2.0: The Next Generation Real-Time Dynamic Traffic Assignment System SIMUL 3: Social Simulation On the Impact of Resilience, Inertia, and Information Foraging in Global Participatory Innovation Communities Customer Management Analysis of Irish Plumbing & Heating Distribution System: A Simulation Study Uncertainty and Inference in Agent-Based Models SIMUL 4: Simulation Methodologies Development a Model for Analyzing the Walking Dynamic Simulation of Wearable Walking Assistant Robot Confidence Intervals for Quantiles When Applying Latin Hypercube Sampling Redi: A Simulator of Stochastic Biochemical Reaction-Diffusion Systems Experience Report on Implementing and Simulating a Routing Protocol in NS-2 and NS-3 SIMUL 5: Simulation Models Simulation and Application of Soft Input Decryption Interval-Based Uncertainty Handling in Model-Based Prediction of System Quality Model-Integrated Development of Field Artillery Federation Object Model Simulation-Based Scheduling of Modular Construction Using Multi-Agent Resource Allocation SIMUL 6: Distributed Simulation The DIESIS Approach to Semantically Interoperable Federated Critical Infrastructure Simulation Integrated Simulation-Based Look-Ahead Scheduling for Steel Fabrication Projects A Control Architecture for Integration of Different Simulation Systems SIMUL 7: Simulation Tools and Platforms Using Attached Processors to Achieve High-Speed Real-Time Simulation Integrated Path from Run-Time Measurements to Design Decisions: Case Study in Performance Analysis NMLab: A Co-simulation Framework for Matlab and ns-2 VISICOM: A Component-Based Parallel Discrete Event Modeling Framework |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA