Sciweavers

SAC
2015
ACM
8 years 7 months ago
Optimal planning for architecture-based self-adaptation via model checking of stochastic games
Architecture-based approaches to self-adaptation rely on architectural descriptions to reason about the best way of adapting the structure and behavior of software-intensive syste...
Javier Cámara, David Garlan, Bradley R. Sch...
SAC
2015
ACM
8 years 7 months ago
Bi-directional trust index computation in resource marketplace
Commoditizing idle computing resources by sharing them in a marketplace has gained increased attention in recent years as a potential disruption to the modern cloud-based service ...
Avinash Sharma, Tridib Mukherjee, Partha Dutta, Vi...
SAC
2015
ACM
8 years 7 months ago
Automated generation of visual web tests from DOM-based web tests
: Functional test automation is increasingly adopted by web applications developers. In particular, 2nd generation tools overcome the limitations of 1st generation tools, based on ...
Maurizio Leotta, Andrea Stocco, Filippo Ricca, Pao...
SAC
2015
ACM
8 years 7 months ago
Robust resource allocation in security games and ensemble modeling of adversary behavior
Game theoretic algorithms have been used to optimize the allocation of security resources to improve the protection of critical infrastructure against threats when limits on secur...
Arjun Tambe, Thanh Nguyen
SAC
2015
ACM
8 years 7 months ago
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction
In this paper we have applied the stacking technique on images from a medical device. There is an urgent need in ophthalmology for more cost effective instrumentation for the ear...
Danilo Motta, Luciana de Matos, Amanda Caniatto de...
SAC
2015
ACM
8 years 7 months ago
A grammatical approach to data-centric case management in a distributed collaborative environment
This paper presents a purely declarative approach to artifactcentric case management systems. Each case is presented as a tree-like structure; nodes bear information that combines...
Eric Badouel, Loïc Hélouët, Georg...
SAC
2015
ACM
8 years 7 months ago
A time-composable operating system for the Patmos processor
In the last couple of decades we have witnessed a steady growth in the complexity and widespread of real-time systems. In order to master the rising complexity in the timing behav...
Marco Ziccardi, Martin Schoeberl, Tullio Vardanega
SAC
2015
ACM
8 years 7 months ago
Evaluating defect prediction approaches using a massive set of metrics: an empirical study
To evaluate the performance of a within-project defect prediction approach, people normally use precision, recall, and F-measure scores. However, in machine learning literature, t...
Xiao Xuan, David Lo, Xin Xia, Yuan Tian
SAC
2015
ACM
8 years 7 months ago
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed ...
Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-...