2016 International Conference on Information Systems Engineering (ICISE)

20-22 April 2016

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2317 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2016, Page(s):ix - x
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High Secured Low Power Multiplexer-LUT Based AES S-Box Implementation

    Publication Year: 2016, Page(s):3 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    We propose a Multiplexer Look-Up-Table (MLUT) based Substitution-Box (S-Box) implementation for the Advanced Encryption Standard (AES) algorithm. There are two key features in the proposed MLUT based S-Box. First, it is implemented based on 256-byte to 1-byte multiplexer with a 256-byte memory instead of the conventional implementation of employing multiplication inversion in GF(28) and affine tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Engineering for E-Government Web Services: A Trust Model

    Publication Year: 2016, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Nowadays, the widespread of the application of web services opens new dawn for e-government applications due to its interoperability that brought by application of web services. Securing the communication between web services has been progressively becoming more demanding requirement for users, administrators, and web service providers. Thus, the need for a security trust model to ensure a proper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining SysML and Marte/CCSL to Model Complex Electronic Systems

    Publication Year: 2016, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    SystemVerilog is a popular hardware description and verification language aimed at designing and verifying present-day complex embedded systems. With the increasing number of design verification assertions, engineers always feel it difficult to manage the gap between the system specification and the design validation efforts and to cope with the time-to-market factors. An approach is presented for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High Speed True Random Number Generator Based on FPGA

    Publication Year: 2016, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    TRN (True Random Number) plays a key role in the communication system and so on. The TRNG (True Random Number Generator) based on FPGA (Field Programmable Gate Array) usually has a high speed and quality. In this article, we study several existing ways to generate the TRN in the FPGA using the oscillator rings which consist of an odd number of NOT gates, the structure of the oscillator rings and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking of Scientific Research Clusters by Use of Text Mining Algorithms on Textual Artefacts

    Publication Year: 2016, Page(s):22 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    The development of text mining algorithms is far reaching and thus, new application areas arise, inter alia in the framework of applying modern information technologies (e.g. big data analytics) in order to answer social and economic (research) questions (digital humanities). In this paper existing algorithms to reveal results in the context of benchmarking scientific research clusters are combine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain Specific Modeling Language for Cyber Physical Systems

    Publication Year: 2016, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The benefits of Domain Specific Modeling Languages (DSML), for modeling and design of cyber physical systems, have been acknowledged in previous years. In contrast to general purpose modeling languages, such as Unified Modeling Language, DSML facilitates the modeling of domain specific concepts. The objective of this work is to develop a simple graphical DSML for cyber physical systems, which allo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Labelling Topics in Weibo Using Word Embedding and Graph-Based Method

    Publication Year: 2016, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Nowadays, in China, Weibo is becoming an increasingly popular way for people to know what is happening in the world. Labelling topics is of much importance for better understanding the semantics of topics. Existing works mainly focus on deriving candidate labels by exploring the use of external knowledge, which may be more appropriate for well formatted and static documents. Recently, it has been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of Reality Mining Dataset for Human Behavior Analysis -- A Survey

    Publication Year: 2016, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Recent advancements in mobile technologies have designed a new kind of device: the smart phone. Smart phones have become quintessential for a large fraction of people in developed as well as developing countries in their day to day life. The device integrates a number of sensor technologies for automatic observation which can provide data with high accuracy & precision, can be programmed to intera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Elastic VoIP Solution Based on OpenStack

    Publication Year: 2016, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Nowadays, a datacenter infrastructure with static al- location of resources could be a bottleneck towards a high-quality network service due to growing and unpredictable demands for resources by modern applications. Additionally, an efficient utilization of the available resources could represent economical benefits to service providers. In this context, Voice over IP (VoIP) service providers must... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Windy Road to Become a Service Provider: Reflections from Designing a Mission Critical Information System Provided as a Service

    Publication Year: 2016, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    During the recent years, the information system landscape has drastically changed -- system owners do not want to carry the responsibilities and risks at the same level as they previously did. To this end, a major shift is called for in the way the information systems are developed, deployed, and operated. A more demand-centric view, accurately meeting the needs and expectations of the end user as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Bug Reporter's Reputation on Bug-Fix Times

    Publication Year: 2016, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    Software Analytics is gaining momentum as a result of involved empirical research in enhancing quality and productivity of software engineering activities. There have been rigorous research efforts in the areas of bug prediction and testing effort prediction by making use of historical data. The problem of predicting bug fix times is an interesting problem with lots of advantages to industry but t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Parallelization Overheads for Predicting Performance

    Publication Year: 2016, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Legacy codes primarily exist on a single core processor. With the proliferation of multicore processors, end users often want to migrate to new platforms to improve performance or reduce execution time of the application. Migration from a single core processor to multicore is an expensive proposition. Thus, end users often want to get some idea about possible performance benefit prior to actual mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring System Usability during Requirement Engineering: Requirements Engineering

    Publication Year: 2016, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    It is extensively acknowledged that Requirements Engineering (RE) has critical implication for overall success of program and project systems development. This research examines and presents a framework that demonstrates how System Usability can be measured to improve decision-making during RE phases as valuable input to feed-follow-on Systems Engineering (SE) activities throughout system developm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Velocity, Acceleration, and Jerk to Manage Agile Schedule Risk

    Publication Year: 2016, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    Stable velocity is paramount for agile planning and builds trust with stakeholders. What metric represents agile stability? Agile processes establish the principle the schedule is fixed and scope changes. Agile velocity is well defined. Velocity is how much technical scope a team of people can produce over a period of time. It ties the technical scope to the schedule. This research continues to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2016, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2016, Page(s): 82
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE