ICSCA aims to provide a professional platform for academic researchers and industrial practitioners for the interchange of information on the latest development and applications in software and computer applications, and to promote friendship and interdisciplinary research collaborations.
Proceeding Downloads
Enhancing constraint based test generation by local search
The core operation of symbolic execution based test data generation is to generate a path constraint in terms of input variables for a selected path. Solutions to the path constraint are test data which will be used to execute the target path. So far, ...
Betweenness centrality updation and community detection in streaming graphs using incremental algorithm
Centrality measures have perpetually been helpful to find the foremost central or most powerful node within the network. There are numerous strategies to compute centrality of a node however in social networks betweenness centrality is the most widely ...
Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation
The development of cloud computing technology and the popularization of cloud services have a great impact on the industry. On the one hand, cloud technology enhances network's operation efficiency and reduces the cost. On the other hand, the cloud ...
The exploration on global village language: Harmony
Human beings have entered the era of Digitalization which makes the world turn into a global village. Internet has crossed the boundaries of time and space but different written languages across the world have proven to be a significant obstacle to the ...
Improving scalability of apache spark-based scale-up server through docker container-based partitioning
We propose an Apache Spark-based scale-up server architecture using Docker container-based partitioning method to improve performance scalability. The performance scalability problem of Apache Spark-based scale-up servers is due to garbage collection(GC)...
TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment
SaaS applications such as Google Documents have been increasingly widely-used to handle user documents stored in cloud storage. To ensure secured access in untrustworthy cloud environment, all documents in cloud storage must be encrypted and protected ...
An application of composite nano-patterns to compiler selected profiling techniques
Machine learning techniques have been used in compilers to automatically determine which optimizations are best for each method of a program developed in Java language to reduce the execution time of the program. Profile data of Java methods such as ...
An extensible component-based multi-objective evolutionary algorithm framework
The ability to easily modify the problem definition is currently missing in Multi-Objective Evolutionary Algorithms (MOEA). Existing MOEA frameworks do not support dynamic addition and extension of the problem formulation. The existing frameworks ...
Parallel frequent subgraph mining algorithm
This paper presents a new frequent subgraph parallel mining algorithm. The algorithm divides the whole process into two parts. Firstly, the master processor generates frequent subtree set by using existing subtree isomorphism judgment algorithm, and ...
A personalized result merging method for metasearch engine
Metasearch engine integrates the search results from multiple sources, and improves recall in the big data environment. Result merging is a key component which will greatly affect the effectiveness of a metasearch engine. Great progress has been made in ...
Modularization of formal specifications or efficient synthesis of reactive systems
Reactive systems respond to requests from an environment with appropriate timing. Because reactive systems are used widely in infrastructure, it is necessary that they are developed without flaws. Automatic synthesis of reactive systems from particular ...
An axiomatic design framework for reliability improvement
The Axiomatic Design methodology has been employed to solve technical problems in a variety of disciplines. This paper provides a robust framework useful to analyse the reliability of a large variety of systems, thus creating the correct environment to ...
Efficient montgomery AB2 multiplier for finite fields defined by irreducible all-one polynomials
Finite field arithmetic has been extensively used in error correcting codes and cryptography. Among the arithmetic operations of finite fields, multiplication is important building block of various applications. This is because the time-consuming ...
Green vehicle routing problem with heterogeneous fleet and time windows
The problem considered in this paper is to construct several routes and schedules of fleets that minimize the emission of a network consists of customers as nodes and their connection one to another by arcs, while varying the types of fleets and ...