Sponsors

Program

Accepted Paper List*:
  • A Model to Evaluate the Credibility of Service in Cloud Computing Environment, Bixin Li, Li Liao, Chao Li
  • Adapting Kernel Density Estimators to Autonomic Predictor Models in Large Cluster Computing, James Pogge
  • Dependency Management in Component-Based Building Automation Systems, Malte Burkert, Heiko Krumm
  • An Intelligent Defects Identification for Motors Using Partial Discharge Signals, Hong-Chan Chang, Cheng-Chien Kuo, Yuan-Sheng Li
  • The Effects of Gap Open and Gap Extend Penalties in a String-Based Approach for Detecting Viral Polymorphic Malware Variants, Vijay Naidu, Ajit Narayanan, Jacqueline Whalley
  • Multi-stakeholders’ policy enforcement for Android, Shahryar Khan Afridi
  • Collusion Attack Detection in Networked Systems, Md Zakirul Alam Bhuiyan, Jie Wu
  • Needleman-Wunsch and Smith-Waterman Algorithms for Identifying Viral Polymorphic Malware Variants, Vijay Naidu, Ajit Narayanan
  • Hierarchical Transactional Memory Protocol for Distributed Mixed-Criticality Embedded Systems, Zaher Owda, Moisés Urbina, Roman Obermaisser, Mohammed Abuteir
  • ChainVoxel: A Data Structure for Scalable Distributed Collaborative Editing for 3D Models, Kengo Imae, Naohiro Hayashibara
  • Autocorrelation-Based Detection of Infinite Loops at Runtime, Andreas Ibing, Julian Kirsch, Lorenz Panny
  • An alarm correlation algorithm based on similarity distance and deep network, Boxu Zhao, Guiming Luo
  • Sensor-Cloud and Power Line Communication: Recent Developments and Integration, Chunsheng Zhu, Yinjia Huo, Victor C. M. Leung, Laurence T. Yang
  • Distributed Strategic Learning for building Network Embedded Coding to Achieve Reliable Event Notification, Christian Esposito, Aniello Castiglione, Francesco Palmieri, Florin Pop
  • A publish/subscribe protocol for event-driven communications in the Internet of Things, Christian Esposito, Aniello Castiglione, Francesco Palmieri, Massimo Ficco, Kim-Kwang Raymond Choo
  • MalAware: Effective and Efficient Run-time Mobile Malware Detector, Jelena Milosevic, Alberto Ferrante, Miroslaw Malek
  • Comprehensive architecture for optimizing web service for e-government implementation, Ahmad Raza, Badr Almutari
  • OmPe-Fibo: An Efficient Forbidden Pattern Free CAC Design for NoCs, Zahra Shirmohammadi, Yassin Alivand, Fereshteh Mozafari, Seyed-Ghassem Miremadi
  • Developing a Mobile System for Natural Language Grammar Acquisition, Marina Purgina, Maxim Mozgovoy, Vitaly Klyuev
  • A Discussion and Review of Network Steganography, Jun O Seo, Sathiamoorthy Manoharan, Aniket Mahanti
  • uAuction: Analysis, Design and Implementation of a Secure Online Auction System, Nazia Majadi, Jarrod Trevathan, Neil Bergmann
  • Design and Analysis of IoT Applications: A Model-Driven Approach, Bruno Costa, Paulo F. Pires, Flávia C. Delicato, Wei Li, Albert Y. Zomaya
  • Enhancing Windows Firewall Security Using Fuzzy Reasoning, Nitin Naik, Paul Jenkins
  • Detecting Denial of Service Attacks in the Cloud, Raneel Kumar, Sunil Lal, Alok Sharma
  • Range Encoding-Based Network Verification in SDN, Yen-Lun Tseng, Guey-Yun Chang
*Please use paper ID for camera ready version and registration in the following format: “DASC-PaperOriginalSubmissionNumber.” For example, for a paper with original submission number 100, the paper ID can be “DASC-100”.


Copyright DASC-2016. Created and Maintained by DASC-2016 Web Team.