2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA)

7-9 June 2017

Filter Results

Displaying Results 1 - 25 of 70
  • Table of contents

    Publication Year: 2017, Page(s):xi - xiv
    Request permission for reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2017, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2017, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2017, Page(s):v - vi
    Request permission for reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Message from general chair

    Publication Year: 2017, Page(s): vii
    Request permission for reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Message from conference chair

    Publication Year: 2017, Page(s): viii
    Request permission for reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Message from program chairs

    Publication Year: 2017, Page(s): ix
    Request permission for reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Empirical research methods for software engineering: Keynote address

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (51 KB) | HTML iconHTML

    Summary form only given. Empirical research in software engineering collects and studies the quantitative/qualitative data in order to understand and improve the software product, software development process and software management. The empirical research methods are classified into controlled experiment, case study and survey, and the process of empirical study can be divided into experimental/c... View full abstract»

    Open Access
  • Software abstractions and architectures for smart cyber-physical systems: Keynote address

    Publication Year: 2017, Page(s): 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (50 KB)

    The significant increase in the ubiquity and connectivity of computing devices has opened new possibilities for addressing social and environmental challenges, e.g., ambient assisted living, smart city infrastructures, emergency coordination, environmental monitoring. Engineering such systems commonly called smart Cyber-Physical Systems (sCPS) is typically very challenging because of their inheren... View full abstract»

    Open Access
  • A confidentiality preserving publicly verifiable computation for multivariate polynomials

    Publication Year: 2017, Page(s):5 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    With the development of cloud services, outsourcing computation tasks to a commercial cloud server has drawn attentions by various communities, especially in the Big Data age. Public verifiability offers a flexible functionality in real circumstance where the cloud service provider (CSP) may be untrusted or some malicious users may slander the CSP on purpose. However, sometimes the computational r... View full abstract»

    Open Access
  • A server selection strategy about cloud workflow based on QoS constraint

    Publication Year: 2017, Page(s):13 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Cloud computing is an emerging business computing model whose basic idea is to transmit all kinds of resources through the Internet such as storage resources, computing resources, bandwidth and so forth. So users do not need to purchase a large of computing systems to manage their business, on the contrary they only need to purchase the resources according to their needs in order to reduce the cos... View full abstract»

    Open Access
  • A bisectional multivariate quadratic equation system for RFID anti-counterfeiting

    Publication Year: 2017, Page(s):19 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    This paper proposes a novel scheme for RFID anti-counterfeiting by applying bisectional multivariate quadratic equations (BMQE) system into an RF tag data encryption. In the key generation process, arbitrarily choose two matrix sets (denoted as A and B) and a base Rab such that [AB] = λRABT, and generate 2n BMQ polynomials (denoted as p) over finite field Fq. There... View full abstract»

    Open Access
  • Remote sensing of damage bridge structure of free vibration by using finite element method based on Jerk-Energy

    Publication Year: 2017, Page(s):25 - 30
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    A new method is proposed to identify the damages of locations based on two Jerk Energy (JE) methods. Proposed for test with random excitation, firstly a reduced analytical model is derived from active vibration. Then, the experimental model is implemented based on output of sensor data under stationary and random excitations are developed by using the controller MSP432. To verify the analytical mo... View full abstract»

    Open Access
  • Efficient composite event detection based on DHT protocol

    Publication Year: 2017, Page(s):31 - 38
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    Current communication systems restrict user affordances in terms of expressiveness and interaction. Complex Event Processing (CEP) have gained much importance to overcome these shortcomings. It allows users to interact with powerful expressiveness when defining logical and temporal patterns of exchanged events. This expressiveness allows cleaning network traffic by eliminating the routing of usele... View full abstract»

    Open Access
  • Modern predictive models for modeling the college graduation rates

    Publication Year: 2017, Page(s):39 - 45
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Modern predictive modeling techniques are commonly used for modeling a target of interest based on a list of input variables. In general, these techniques are capable of identifying input variables associated with the target, but not for the purpose of identifying the causation relationship between target and inputs due to the fact that the data are observational data. Advanced technology has made... View full abstract»

    Open Access
  • Enterprise map construction based on EOLN model

    Publication Year: 2017, Page(s):47 - 53
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Semantic extraction based on key words is essential method to find relationships of entities. Enterprise relations analysis is becoming more and more popular in financial field, because it gives explanation on business processes and decision-making reference on investments. Most of previous studies focused on the analysis of specific situations and built relations on targeted enterprises. Hence, t... View full abstract»

    Open Access
  • Generation of reducts and threshold functions using discernibility and indiscerniblity matrices

    Publication Year: 2017, Page(s):55 - 61
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Dimension reduction of data is an important issue in the data processing and iti is needed for the analysis of higher dimensional data in the application domain. Rough set is fundamental and useful to reduce higher dimensional data to lower one. Reduct in the rough set is a minimal subset of features, which has the same discernible power as the entire features in the higher dimensional scheme. The... View full abstract»

    Open Access
  • LogSumExp for unlabeled data processing

    Publication Year: 2017, Page(s):63 - 69
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    There are two types of data in semi-supervised learning: feature vector with the corresponding label and feature vector without label, where labeled data processing has been well studied in supervised learning. In this paper, we derive the LogSumExp function for unlabeled data processing. This derivation establishes a unified view of labeled data processing and unlabeled data processing in semi-su... View full abstract»

    Open Access
  • The analysis and prediction of customer review rating using opinion mining

    Publication Year: 2017, Page(s):71 - 77
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1085 KB) | HTML iconHTML

    The customer review is important to improve service for company, which have both close opinion and open opinion. The open opinion means the comment as text which shows emotion and comment directly from customer. However, the company has many contents or group to evaluation themselves by rating and total rating for a type of services which there are many customer who needs to review. The problem is... View full abstract»

    Open Access
  • Sentiment analysis on social media using morphological sentence pattern model

    Publication Year: 2017, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Social media became popular than ever as people are willing to share their emotions and opinions or to participate in social networking. Accordingly, the understanding of social media usage became important. The sentiment analysis is emerged as one of useful methods to analyze emotional stats expressed in textual data including social media data. However, this method still presents some limitation... View full abstract»

    Open Access
  • On blockchain-based anonymized dataset distribution platform

    Publication Year: 2017, Page(s):85 - 92
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    In this paper, we design a distributed platform for anonymized dataset trading without any centralized trusted third party. The platform consists of peers and consensus-based blockchain mechanism, and each peer acts as a data broker, data receiver, or verifier for blockchain in a data transfer transaction. A data broker collects data from data owners under their consent for data trading. The Priva... View full abstract»

    Open Access
  • A smart health service model for elders based on ECA-S rules

    Publication Year: 2017, Page(s):93 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Health services delivery relating to chronic diseases in elders are becoming a hot spot with the progressively severity in population aging in China. To provide a better service system for the elders, researchers have used active rule based techniques including Event-Condition-Active (ECA). In this paper, we enhanced ECA to ECA-Sequence (ECA-S) rules to detect abnormal condition in physiological i... View full abstract»

    Open Access
  • An analysis of the health care platform in the cloud environment

    Publication Year: 2017, Page(s):99 - 102
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    In this paper, we describe a cloud platform for health care tourism of Hainan province, China. The relevant business process is designed in a way that the characteristics of health care are taken into account. A scheme that combines medical tourism with a self-health care system and a nursing system is proposed. The data storage structure of the health care system is given, together with the speci... View full abstract»

    Open Access
  • The impacts of consumer's health topic familiarity in seeking health information online

    Publication Year: 2017, Page(s):104 - 109
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (842 KB)

    Consumers or non-medical professionals are progressively going online to seek health information. Despite the increasing number of health information search online, acquiring the correct and relevant information based on consumer's understanding remains a problem. The information retrieved from the Internet may not fit consumer's understanding because the consumer's familiarity with health topic v... View full abstract»

    Open Access
  • Manifold ranking weighted local maximal occurrence descriptor for person re-identification

    Publication Year: 2017, Page(s):111 - 114
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    Person re-identification is an important task of matching pedestrians across non-overlapping camera views. In this paper, we exploit a weighted feature descriptor for person re-identification. We firstly compute the weights on the superpixel level via graph-based manifold ranking algorithm, then integrate the computed weights into a patch-based feature descriptor, named local maximal occurrence. F... View full abstract»

    Open Access