Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DASC
DASC 2011
Generate Citations
Dependable, Autonomic and Secure Computing, IEEE International Symposium on
Dec. 12 2011 to Dec. 14 2011
Sydney, New South Wales Australia
ISBN: 978-0-7695-4612-4
Table of Contents
Papers
A Uniform Semantic Web Framework for Co-authorship Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 958-965
by
L. Ahmedi
,
L. Abazi-Bexheti
,
A. Kadriu
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Table of contents
Freely available from IEEE.
pp. v-xviii
Papers
Message from DASC 2011 Chairs
Freely available from IEEE.
pp. xix-xx
Papers
DASC 2011 Organizing Committee
Freely available from IEEE.
pp. xxi
Papers
DASC 2011 Program Committee
Freely available from IEEE.
pp. xxii-xxiii
Papers
Message from PICom 2011 Chairs
Freely available from IEEE.
pp. xxiv
Papers
PICom 2011 Organizing Committee
Freely available from IEEE.
pp. xxv-xxvi
Papers
Message from EmbeddedCom 2011 Chairs
Freely available from IEEE.
pp. xxvii-xxviii
Papers
EmbeddedCom 2011 Organizing Committee
Freely available from IEEE.
pp. xxix-xxx
Papers
Message from CGC 2011 Chairs
Freely available from IEEE.
pp. xxxi-xxxii
Papers
CGC 2011 Organizing Committee
Freely available from IEEE.
pp. xxxiii-xxxvii
Papers
Message from SCA 2011 Chairs
Freely available from IEEE.
pp. xxxviii-xxxix
Papers
SCA 2011 Organizing Committee
Freely available from IEEE.
pp. xl-xlii
Papers
Message from ACGS 2011 Program Co-chairs
Freely available from IEEE.
pp. xliii
Papers
Message from ASS 2011 Program Co-chairs
Freely available from IEEE.
pp. xliv
Papers
Message from WMSC 2011 Program Co-chairs
Freely available from IEEE.
pp. xlv
Papers
WMSC 2011 Organizing Committee
Freely available from IEEE.
pp. xlvi
Papers
Message from CMS 2011 Workshop Co-chairs
Freely available from IEEE.
pp. xlvii
Papers
CMS 2011 Organizing Committee
Freely available from IEEE.
pp. xlviii
Papers
Message from CTUW 2011 Program Co-chairs
Freely available from IEEE.
pp. xlvix
Papers
CTUW 2011 Organizing Committee
Freely available from IEEE.
pp. l
Papers
Message from CSN 2011 Workshop Co-chairs
Freely available from IEEE.
pp. li
Papers
CSN 2011 Organizing Committee
Freely available from IEEE.
pp. lii-liii
Papers
Service Injection: A Threat to Self-Managed Complex Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Per Hâkon Meland
Papers
S2XS2: A Server Side Approach to Automatically Detect XSS Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-14
by
Hossain Shahriar
,
Mohammad Zulkernine
Papers
Establishing Hypothesis for Recurrent System Failures from Cluster Log Files
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-22
by
Edward Chuah
,
Gary Lee
,
William-Chandra Tjhi
,
Shyh-Hao Kuo
,
Terence Hung
,
John Hammond
,
Tommy Minyard
,
James C. Browne
Papers
Long-Term CPU Load Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-26
by
Jianhuang Liang
,
Jian Cao
,
Jungang Wang
,
Yuxia Xu
Papers
Application of Neural Networks to the Correction of a Stiffness Matrix by a Static Test
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Zhong Yang
,
Haifei Si
Papers
New Latch-Up Model for Deep Sub-micron Integrated Circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Pan Dong
,
Long Fan
,
Suge Yue
,
Hongchao Zheng
,
Shougang Du
Papers
Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Christopher Bailey
,
David W. Chadwick
,
Rogério de Lemos
Papers
Exact and Heuristic Algorithm for Multi-constrained Optimal Path Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-51
by
Qingan Fang
,
Jun Han
,
Liyong Mao
,
Zhaoguo Li
Papers
A Wide-Range Edge-Combining DLL with a Charge Pump for Low Spur
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-55
by
Bin He
,
Tie J. Lu
,
Zong M. Wang
,
Tie L. Zhang
Papers
Analysis of the New Latchup Model for Deep Sub-micron Integrated Circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-62
by
Pan Dong
,
Long Fan
,
Suge Yue
,
Hongchao Zheng
,
Shougang Du
Papers
A Trustful Infrastructure for the Internet of Things Based on EPOSMote
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Antônio Augusto Fröhlich
,
Rodrigo Vieira Steiner
,
Leonardo Maccari Rufino
Papers
A 46MHz Biquad Gm-C High Q Bandpass Filter Design for Wireless Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Chong Duan
,
Weimin Li
Papers
Ontology Based Modeling for Information Security Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-80
by
Partha Saha
,
Nandan Parameswaran
,
Pradeep Ray
,
Ambuj Mahanti
Papers
Towards Self-Awareness in Cloud Markets: A Monitoring Methodology
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
by
Ivan Breskovic
,
Christian Haas
,
Simon Caton
,
Ivona Brandic
Papers
Intelligent Test Oracle Construction for Reactive Systems without Explicit Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Farn Wang
,
Li-Wei Yao
,
Jung-Hsuan Wu
Papers
Workload Balancing for Highly Available Services: The Case of the N+M Redundancy Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-104
by
A. Kanso
,
F. Khendek
,
M. Toeroe
Papers
Reliability Implications of Register Utilization: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-112
by
Paul Römer
,
Peter Tröger
Papers
A Natural Classification Scheme for Software Security Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-120
by
Aleem Khalid Alvi
,
Mohammad Zulkernine
Papers
Automatic Annotation of Software Configuration Models with Service Recovery Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-128
by
A. Kanso
,
F. Khendek
,
M. Toeroe
Papers
A Connection-Based Signature Approach for Control Flow Error Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-136
by
Atef Mohamed
,
Mohammad Zulkernine
Papers
A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-144
by
Hossain Shahriar
,
Mohammad Zulkernine
Papers
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Frank Jiang
,
Michael Frater
,
Jiankun Hu
Papers
Polymorphic Malware Detection Using Hierarchical Hidden Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-155
by
Fahad Bin Muhaya
,
Muhammad Khurram Khan
,
Yang Xiang
Papers
Personalized Searching for Web Service Using User Interests
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Rong Hu
,
Wanchun Dou
,
Xiaoqing Frank Liu
,
Jianxun Liu
Papers
Using Particle Swarm Optimization to Improve the Precision and Recall of Taxonomy Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Mohammad Syafrullah
,
Naomie Binti Salim
Papers
A Formal Model for Advanced Physical Annotations
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-177
by
Ahmad A. Alzahrani
,
Seng W. Loke
,
Hongen Lu
Papers
Pervasive Intelligent Routing in Content Centric Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Anh Dung Nguyen
,
Patrick Sénac
,
Victor Ramiro
,
Michel Diaz
Papers
Protecting from Inside Attacks in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-191
by
Xu Huang
,
Muhammad Ahmed
,
Dharmendra Sharma
Papers
First Prototype of Aquatic Tool Kit: Towards Low-Cost Intelligent Larval Fish Counting in Hatcheries
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-195
by
Brian C.S. Loh
,
Valliappan Raman
,
Patrick H.H. Then
Papers
A Carrier Aggregation Based Resource Allocation Scheme for Pervasive Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-201
by
Fan Wu
,
Yuming Mao
,
Supeng Leng
,
Xiaoyan Huang
Papers
The User-Group Based Recommendation for the Diverse Multimedia Contents in the Social Network Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-206
by
Saim Shin
,
Se-Jin Jang
,
Seok-Pil Lee
Papers
From Sensory Data to Situation Awareness: Enhanced Context Spaces Theory Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Andrey Boytsov
,
Arkady Zaslavsky
Papers
Mapping for Activity Recognition in the Context-Aware Systems Using Software Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-221
by
Kamran Taj Pathan
,
Stephan Reiff-Marganiec
,
Yi Hong
Papers
Design and Implementation of P2P Reasoning System Based on Description Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-229
by
Hai Wan
,
Yang Yu
,
Jian-Tian Zheng
Papers
Recognizing Concurrent and Interleaved Activities in Social Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-237
by
Saguna
,
Arkady Zaslavsky
,
Dipanjan Chakraborty
Papers
Intelligent Sensor Network Simulation for Battlefield Resources Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
H.Y. Yu
,
Y.L. Lu
Papers
Crowdsourcing in Mobile: A Three Stage Context Based Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-245
by
Ahmad Hassan Afridi
Papers
Gesture-Based Easy-Computer Interaction Using a Linear Array of Low Cost Distance Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-251
by
Guan Huang
,
Seng W. Loke
Papers
Load-Aware Dynamic Partial Reconfiguration Implementation of Crossbar Scheduler
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-258
by
Shaobin Zhang
,
Tongsen Hu
,
Minghui Wu
,
Tianzhou Chen
,
Zening Qu
Papers
Efficient Pattern Detection for Embedded Optical Bio-sensing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-266
by
Yingjie Cao
,
Yongxin Zhu
,
Guoguang Rong
,
Gang Cheng
,
Meikang Qiu
Papers
Deriving High-Performance Real-Time Multicore Systems Based on Simulink Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-274
by
Minji Cha
,
Kyong Hoon Kim
,
Chung Jae Lee
,
Dojun Ha
,
Byoung Soo Kim
Papers
Analysis and Comparison of Two Different Implementations of MCS-51 Compatible Microcontrollers
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-278
by
Jincheng Fei
,
Haiyang Quan
,
Dawei Yuan
Papers
Global Priority Table for Last-Level Caches
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
Baozhong Yu
,
Jianliang Ma
,
Tianzhou Chen
,
Minghui Wu
Papers
Design and Implementation of a Peripheral Bus Based on a New Kind of Reconfigurable System
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Yimao Cai
,
Yuanfu Zhao
,
Lidong Lan
Papers
GALS-JOP: A Java Embedded Processor for GALS Reactive Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-299
by
Muhammad Nadeem
,
Morteza Biglari-Abhari
,
Zoran Salcic
Papers
A Study on QoS Routing Schem for Tactical Ad Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-304
by
Taehun Kang
,
Hanah Kim
,
Jaiyong Lee
Papers
Scheduling Instructions for Soft Errors in Register Files
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-312
by
Jianjun Xu
,
Qingping Tan
,
Huiping Zhou
Papers
System Level Performance Simulation of Distributed GENESYS Applications on Multi-core Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-320
by
Subayal Aftab Khan
,
Jukka Saastamoinen
,
Kari Tiensyrjä
,
Jari Nurmi
Papers
Benchmarking Embedded Devices for Broadband Performance Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-327
by
Snehal Tangadpalliwar
,
Kumbesan Sandrasegaran
,
Malcolm Raymond
,
Ajanta Moitra
,
Faisal Madani
Papers
An Efficient Test Design for Verification of Cache Coherence in CMPs
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-334
by
Mamata Dalui
,
Biplab K. Sikdar
Papers
Impact of Inaccurate Design of Branch Predictors on Processors' Power Consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-342
by
Baisakhi Das
,
Gunjan Bhattacharya
,
Ilora Maity
,
Biplab K. Sikdar
Papers
A Balanced Clustering Algorithm for Non-uniformly Deployed Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-350
by
Heewook Shin
,
Sangman Moh
,
Ilyong Chung
Papers
Coprocessing Architecture in System-on-Programmable-Chip for Walk on the Boundary Method to Calculate Capacitance
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Stephen J.J. Ong
,
Z. Abdul Halim
Papers
An Elastic OLAP Cloud Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-363
by
Peter Brezany
,
Yan Zhang
,
Ivan Janciak
,
Peng Chen
,
Sicen Ye
Papers
Analysis of Power-Saving Techniques over a Large Multi-use Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-371
by
A. Stephen McGough
,
Clive Gerrard
,
Jonathan Noble
,
Paul Robinson
,
Stuart Wheater
Papers
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-379
by
Chang Liu
,
Xuyun Zhang
,
Jinjun Chen
,
Chi Yang
Papers
Energy Efficient Task Allocation over Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-387
by
Carmela Comito
,
Deborah Falcone
,
Domenico Talia
,
Paolo Trunfio
Papers
Application Behavior Mapping across Heterogeneous Hardware Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-395
by
Haifeng Chen
,
Hui Kang
,
Guofei Jiang
,
Kenji Yoshihira
Papers
Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSE
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-403
by
Myoungjin Kim
,
Hanku Lee
,
Yun Cui
Papers
ALARM: Autonomic Load-Aware Resource Management for P2P Key-Value Stores in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-410
by
Can Zhang
,
Haopeng Chen
,
Shuotao Gao
Papers
BoostPred: An Automatic Demand Predictor for the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-418
by
Waiho Wong
,
Joseph Davis
Papers
Accurate Mutlicore Processor Power Models for Power-Aware Resource Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 419-426
by
Ibrahim Takouna
,
Wesam Dawoud
,
Christoph Meinel
Papers
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-434
by
Qi Chen
,
Wenmin Lin
,
Wanchun Dou
,
Shui Yu
Papers
A Measurement Study of Server Utilization in Public Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-442
by
Huan Liu
Papers
Energy Prediction for MapReduce Workloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-448
by
Wenjun Li
,
Hailong Yang
,
Zhongzhi Luan
,
Depei Qian
Papers
Towards a Service Lifecycle Based Methodology for Risk Assessment in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-456
by
Mariam Kiran
,
Ming Jiang
,
Django J. Armstrong
,
Karim Djemame
Papers
Migrating Complex Business Process to Cloud Based on Mspoa and CBPM
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-464
by
Hai Wan
,
Yang Yu
Papers
On Reference Node Deployment for Precise Clock Synchronization in Smart Power Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-472
by
Chiu-Ping Chang
,
Chung-Ta King
,
Chen-Min Chan
Papers
An Intelligent Real-Time Odor Monitoring System Using a Pattern Extraction Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-479
by
Eungyeong Kima
,
Seok Lee
,
Taikjin Lee
,
Beom Ju Shin
,
Jungho Lee
,
Young Tae Byun
,
Hyung Seok Kim
Papers
Cost and Energy Reduction Evaluation for ARM Based Web Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-487
by
Olle Svanfeldt-Winter
,
Sébastien Lafond
,
Johan Lilius
Papers
A Distributed Application Component Placement Approach for Cloud Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-495
by
Zhicheng Jin
,
Jian Cao
,
Minglu Li
Papers
A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data Centres
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-502
by
Wenhao Li
,
Yun Yang
,
Dong Yuan
Papers
Priority-Based Scheduling for Large-Scale Distribute Systems with Energy Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-509
by
Masnida Hussin
,
Young Choon Lee
,
Albert Y. Zomaya
Papers
A Multi-objective GRASP Algorithm for Joint Optimization of Energy Consumption and Schedule Length of Precedence-Constrained Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-517
by
Johnatan E. Pecero
,
Pascal Bouvry
,
Hector J. Fraire Huacuja
,
Samee U. Khan
Showing 100 out of 207
Load More
Load All