default search action
14th ICIS 2015: Las Vegas, NV, USA
- Takayuki Ito, Yanggon Kim, Naoki Fukuta:
14th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2015, Las Vegas, NV, USA, June 28 - July 1, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8679-8
Keynote
- Wenai Song:
MOOCs, MOOE and MOOR in China. 1
Communication Systems & Networks
- Ammar Hamad, Michel Kadoch:
SONET over RPR. 3-7 - Candace Suh-Lee, Ju-Yeon Jo:
Quantifying security risk by measuring network risk conditions. 9-14 - Muhammad Irfan, Haider Abbas, Mian Muhammad Waseem Iqbal:
Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment. 15-21 - Charles A. Fowler, Robert J. Hammell:
Mining information assurance data with a hybrid intelligence/multi-agent system. 23-28 - Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:
Secure in-vehicle systems against Trojan attacks. 29-33 - Quoc Nguyen Viet, Pham Van Phuoc, Trinh Quoc Son, Lung Vu Duc:
Social routing: A novel routing protocol for delay tolerant network based on dynamic connectivity. 35-40 - Mohammed Alodib, Zaki Malik:
A Big Data approach to enhance the integration of Access Control Policies for Web services. 41-46 - Saima Jamil, Saqib Jamil, Sheeraz Ahmed, Muhammad Zubair, Farman Sikandar:
COPE: Cooperative Power and Energy-efficient routing protocol for Wireless Sensor Networks. 47-52 - Kyoungha Kim, Yanggon Kim:
Comparative analysis on the signature algorithms to validate AS paths in BGPsec. 53-58 - Rui Zhang, Jie Li, Quan Qian, Wei Feng:
Opportunistic wireless Network Coding based on small-time scale Traffic Prediction. 59-64 - Ruiling Gao, Minghuan Zhao, Zhihui Qiu, Yingzhou Yu, Chorng Hwa Chang:
Web-based motion detection system for health care. 65-70 - Ikram Syed, Bosung Kim, Byeong-Hee Roh, Il-hyuk Oh:
A novel contention window backoff algorithm for IEEE 802.11 wireless networks. 71-75 - Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Method for secure RESTful web service. 77-81 - Shankar M. Banik, Luís Peña:
Deploying agents in the network to detect intrusions. 83-87 - Nicklaus Rhodes, Shankar M. Banik:
Empirical evaluation of designing multicasting network with minimum delay variation. 89-94 - Kambiz Ghazinour, Mehdi Ghayoumi:
An autonomous model to enforce security policies based on user's behavior. 95-99
Control Systems, Intelligent Systems
- Robert Gripentog, Yoohwan Kim:
Utilizing NFC to secure identification. 101-105 - Anupam Panwar:
A kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection. 107-112 - Nouha Ghribi, Boudour Ammar, Adel M. Alimi:
Regimdroid: Framework for customize Android platform to act as a brain for telepresence robot. 113-118 - Mikhail D. Prokhorov, Danil D. Kulminskiy, Anatoly S. Karavaev, Vladimir I. Ponomarenko:
Communication system based on chaotic delayed feedback oscillator with switched delay. 119-124 - Reo Kishi, Takahiro Hayashi:
Effective gazewriting with support of text copy and paste. 125-130 - Mehdi Ghayoumi:
A review of multimodal biometric systems: Fusion methods and their applications. 131-136 - Mehdi Ghayoumi, Kambiz Ghazinour:
An adaptive fuzzy multimodal biometric system for identification and verification. 137-141 - Yuji Yamagata, Naoki Fukuta:
Evaluating a GA-based approach to dynamic query approximation on an inference-enabled SPARQL endpoint. 143-148
Computer Architecture and VLSI
- Min-Chun Tuan, Shih-Lun Chen:
Fully pipelined VLSI architecture of a real-time block-based object detector for intelligent video surveillance systems. 149-154 - Tania Sultana, Rajon Bardhan, Tangina Firoz Bithee, Zinia Tabassum, Nusrat Jahan Lisa:
A compact design of n-bit ripple carry adder circuit using QCA architecture. 155-160 - Chikatoshi Yamada, D. Michael Miller:
Using SPIN to check Simulink Stateflow models. 161-166 - Sangjae Nam, Su-Kyung Yoon, Shin-Dug Kim:
Fast bootstrapping method for the memory-disk integrated memory system. 167-172 - Kihyun Park, Su-Kyung Yoon, Shin-Dug Kim:
Selective data buffering module for unified hybrid storage system. 173-178
Data Mining, Data Warehousing & Database
- Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham:
Automated generation of hierarchic image database with hybrid method of ontology and GMM-based image clustering. 179-184 - Alper Ozcan, Sule Gündüz Ögüdücü:
Multivariate temporal Link Prediction in evolving social networks. 185-190 - Novino Nirmal A., Kyung-Ah Sohn, Tae-Sun Chung:
A graph model based author attribution technique for single-class e-mail classification. 191-196 - Edson B. dos Santos, Arthur F. Da Costa, Rafael Martins D'Addio, Marcelo Garcia Manzato, Rudinei Goularte:
Introducing the concept of "always-welcome recommendations". 197-202 - Moon Soo Cha, So Yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn:
CBDIR: Fast and effective content based document Information Retrieval system. 203-208 - So Yeon Kim, Kyung-Ah Sohn:
Mobile phone spam image detection based on graph partitioning with Pyramid Histogram of Visual Words image descriptor. 209-214 - Óscar Mortágua Pereira, Rui L. Aguiar:
Multi-purpose Adaptable Business Tier Components based on Call Level Interfaces. 215-221 - Mohammad Alaul Haque Monil, Rashedur M. Rahman:
Implementation of modified overload detection technique with VM selection strategies based on heuristics and migration control. 223-227 - Takafumi Nakanishi:
A feature selection method for comparision of each concept in big data. 229-234 - Yu Fang, Kosuke Sugano, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe:
Searching human actions based on a multi-dimensional time series similarity calculation method. 235-240 - Zhang Zuo, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe:
A human behavior processes database prototype system for surgery support. 241-246 - Mohammed Rashid Chowdhury, Mohammad Raihan Mahmud, Rashedur M. Rahman:
Clustered based VM placement strategies. 247-252 - Md Mahfuzur Rahman Siddiquee, Md. Saifur Rahman, Naimul Haider, Rashedur M. Rahman, Shahnewaz Ul Islam Chowdhury, Sharnendu Banik:
A personalized music discovery service based on data mining. 253-258 - Taocheng Hu, Jinhui Yu:
Generalized entropy based semi-supervised learning. 259-263 - Syed Akib Anwar Hridoy, M. Tahmid Ekram, Mohammad Samiul Islam, Faysal Ahmed, Rashedur M. Rahman:
Investigation of localized sentiment for a given product by analyzing tweets. 265-270
Knowledge Discovery, Neural Networks and Genetic Algorithms
- Alan R. Chappell, Jesse Weaver, Sumit Purohit, William Smith, Karen Schuchardt, Patrick West, Benno Lee, Peter Fox:
Enhancing the impact of science data toward data discovery and reuse. 271-277 - Rizwan Qamar, Muhammad Attique, Tae-Sun Chung:
A pruning algorithm for reverse nearest neighbors in directed road networks. 279-284 - Mohamed Kharrat, Anis Jedidi, Faïez Gargouri:
A semantic approach for transforming XML data to RDF triples. 285-290
Speech and Signal Processing
- Wunna Soe, Yadana Theins:
Syllable-based Myanmar language model for speech recognition. 291-296 - Mohammad I. Daoud, Mahmoud Al-Ashi, Fares Abawi, Alá F. Khalifeh:
In-house alert sounds detection and direction of arrival estimation to assist people with hearing difficulties. 297-302 - Babu Kaji Baniya, Choong Seon Hong, Joonwhoan Lee:
Nearest multi-prototype based music mood classification. 303-306
Image Processing & Pattern Recognition
- Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki:
Decomposition of partly occluded objects based on evaluation of figural goodness. 307-312 - Sanchay Dewan, Shreyansh Bajaj, Shantanu Prakash:
Using Ant's Colony Algorithm for improved segmentation for number plate recognition. 313-318 - Williams Antonio Pantoja Laces, Jose Juan Garcia-Hernandez:
FPGA implementation of a low complexity steganographic system for digital images. 319-324 - Naresh Kumar Garg, Lakhwinder Kaur, Manish Jndal:
Recognition of Offline Handwritten Hindi text using middle zone of the words. 325-328 - Hoai Nam Vu, Tuan Anh Tran, In Seop Na, Soo-Hyung Kim:
Automatic extraction of text regions from document images by multilevel thresholding and k-means clustering. 329-334 - Sheeraz Akram, Muhammad Younus Javed, Ayyaz Hussain:
Automated thresholding of lung CT scan for Artificial Neural Network based classification of nodules. 335-340
Intelligent Agent Technology, Agent Based Systems
- Kengo Saito, Toshiharu Sugawara:
Single-object resource allocation in multiple bid declaration with preferential order. 341-347 - Quoc Son Trinh:
HMM-based Vietnamese speech synthesis. 349-353 - Keisuke Hara, Takayuki Ito:
A scoring rule-based truthful demand response mechanism. 355-360 - Takahiro Uchiya, Motohiro Shibakawa, Ichi Takumi, Tetsuo Kinoshita:
Multiagent-based distributed backup system for individuals. 361-366
Internet Technology and Applications, E-Commerce
- Hedieh Ranjbartabar, Amir Maddah, Manolya Kavakli:
eMedicalHelp: A customized medical diagnostic application: Is a single questionnaire enough to measure stress? 367-372 - Tomohiro Yanagi, Daisuke Yamamoto, Naohisa Takahashi:
Development of mobile voice navigation system using user-based mobile maps annotations. 373-378 - Jens Geelhaar, Gabriel Rausch:
3D Web Applications in E-Commerce - A secondary study on the impact of 3D product presentations created with HTML5 and WebGL. 379-382 - Taishi Yamamoto, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe:
SQUED: A novel crowd-sourced system for detection and localization of unexpected events from smartphone-sensor data. 383-386 - Dapeng Liu, Shaochun Xu, Lichao Chen, Chunning Wang:
Some observations on online advertising: A new advertising system. 387-392
Management Information Systems
- Donghwoon Kwon, Robert J. Hammell:
Objective framework for early-stage comparison of software development project types. 393-398
Middleware Architectures & Techniques
- Sohyun Koo, Se Jin Kwon, Sungsoo Kim, Tae-Sun Chung:
Dual RAID technique for ensuring high reliability and performance in SSD. 399-404 - Leila Ghorbel, Corinne Amel Zayani, Ikram Amous:
A novel architecture for learner's profiles interoperability. 405-410 - Solomon Asres Kidanu, Yudith Cardinale, Gilbert Tekli, Richard Chbeir:
A Multimedia-Oriented Digital Ecosystem: A new collaborative environment. 411-416 - Qurrat ul Ain, Usama Anwar, Asad R. Usmani, Abdul Qadeer, Ghulam Mustafa, Abdul Waheed:
Dynamic binary translation in a type-II hypervisor for Cavium Octeon MIPS64 based systems. 417-422
Mobile/Wireless Computing
- Hao Qian, Daniel Andresen:
An energy-saving task scheduler for mobile devices. 423-430 - Takanobu Otsuka, Yoshitaka Torii, Takayuki Ito:
Challenges and implementation of ad-hoc water gauge system for the grasp of internal water damage. 431-436 - Grzegorz Chmaj, Henry Selvaraj:
Energy-efficient distributed computing solutions for Internet of Things with ZigBee devices. 437-442
Parallel and Distributed Computing & Systems
- Hao Qian, Daniel Andresen:
Emerald: Enhance scientific workflow performance with computation offloading to the cloud. 443-448
Programming Languages, Compilers, & Operating Systems
- Shuichi Oikawa:
Accelerating storage access by combining block storage with memory storage. 449-454
Software Specification Techniques
- Zhuang Li, Huaikou Miao:
Formal specification and reasoning for situated multi-agent system. 455-460
Web Engineering & Applications
- Akiyoshi Wakatani, Toshiyuki Maeda:
Automatic generation of programming exercises for learning programming language. 461-465
Special Session 1
- Masahiro Yamamoto, Kazuhiro Suzuki, Ryosuke Ogawa, Nobuhiro Ito, Yoshinobu Kawabe:
Robust location tracking method for mixed reality robots using a rotation search method. 467-472 - Masato Yamauchi, Nobuhiro Ito, Yoshinobu Kawabe:
Verifying ignition timing of gasoline direct injection engine's PCM. 473-478 - Naoto Mukai:
Analysis of driving behaviors based on GMM by using driving simulator with navigation plugin. 479-484 - Toyoshiro Nakashima, Kazunori Iwata, Yoshiyuki Anan, Naohiro Ishii:
Analyzing relationship between the number of errors in review processes for embedded software development projects. 485-490 - Naohiro Ishii, Ippei Torii, Naoto Mukai, Kazunori Iwata, Toyoshiro Nakashima:
Classification on nonlinear mapping of reducts based on nearest neighbor relation. 491-496
Workshop I
- Reiko Kuwabara, Eigo Ito, Takayuki Fujimoto:
Proposal of programming creation application using road signs by smartphones. 497-502 - Kazuya Murata, Takayuki Fujimoto:
Proposal of Multiple Travel Scheduling System based on Inverse Operation Method. 503-507 - Eigo Ito, Takayuki Fujimoto:
A proposal of programming education system using mechanical calculator mechanism. 509-512 - Motoichi Adachi, Takayuki Fujimoto:
SDSS: Proposal on feeding support application software which enables the user to create a state of "mental alertness". 513-518 - Kouji Fujita, Takayuki Fujimoto:
A proposal of the system to stop a decline of the interest of Great East Japan Earthquake. 519-523
Workshop II
- Fengyan Wu, Shutao Sun, Jianglong Zhang, Yongbin Wang:
Singing voice detection of popular music using beat tracking and SVM classification. 525-528 - Xiaojia Chen, Ying Li, Tao Hu:
Solving the supermarket shopping route planning problem based on genetic algorithm. 529-533 - Tao Lei, Junpeng Gong, Yujun Wen:
Online advertising demand-side platform business system design exploration. 535-538 - Meimei Wu, Yongbin Wang:
A feature selection algorithm of music genre classification based on ReliefF and SFS. 539-544 - Zhenjiu Xiao, Yongbin Wang, Zhengtao Jiang:
Research and implementation of four-prime RSA digital signature algorithm. 545-549 - Xuejiao Han, Wenqian Shang, Shuchao Feng:
The design and implementation of personalized news recommendation system. 551-554 - Shiping Zhou, Wei Zhang, Xiangrong Tong:
A logic model of interest in information network. 555-558 - Songtao Shang, Minyong Shi, Wenqian Shang, Zhiguo Hong:
Research on public opinion based on Big Data. 559-562 - Ying Li, Yulong Li, Tao Hu, Zhisheng Lv:
An automatic semantic Web service composition method based on ontology. 563-566 - Yuqi Wang, Wenqian Shang, Shuchao Feng:
The maximal operator classifier. 567-570 - Ying-Jian Qi, Guoliang Shi, Xinyan Yu, Ying Li:
Visualization in media big data analysis. 571-574 - Tong Yi, Minyong Shi, Wenqian Shang:
Personalized two party key exchange protocol. 575-579 - Zhenzhong Li, Wenqian Shang:
Personalized news recommendation based on links of web. 581-584 - Min Feng, Huaichang Du:
Interactive virtual theater display system. 585-588 - Hui Ren, Zhibin Su, Chaohui Lu, Fangjv Zou:
An improved algorithm for active contour extraction based on greedy snake. 589-592 - Guowei Chen, Fei Xie, Tao Lei, Yu Su:
Spread influence algorithm of news website based on PageRank. 593-596
SERA 2015
- Hela Ben Salah, Adel Benzina, Mohamed Khalgui:
Petri Nets-based design of real-time reconfigurable networks on chips. 597-604 - Hamza Gharsellaoui, Ismail Ktata, Naoufel Kharroubi, Mohamed Khalgui:
Real-time reconfigurable scheduling of multiprocessor embedded systems using hybrid genetic based approach. 605-609 - Fethi Jarray, Hamza Chniter, Mohamed Khalgui:
New adaptive middleware for real-time embedded operating systems. 610-618 - Sihem Cherif, Raoudha Ben Djemaa, Ikram Amous:
SABPEL: Creating self-adaptive business processes. 619-626 - Chaker Ben Mahmoud, Ikbel Azaiez, Fathia Bettahar, Marie-Hélène Abel, Faïez Gargouri:
A learning semantic Web service for generating learning paths. 627-631 - Issam Hamdi, Emna Bouazizi, Saleh Alshomrani, Jamel Feki:
2LPA-RTDW: A Two-Level data Partitioning Approach for Real-time Data Warehouse. 632-638 - Nahla Haddar, Mohamed Tmar, Faïez Gargouri:
Opus framework: A proof-of-concept implementation. 639-641 - Sirine Rebai, Hatem Hadj Kacem, Mohamed Karaa, Saúl E. Pomares Hernández, Ahmed Hadj Kacem:
A service-oriented architecture (SOA) framework for choreography verification. 642-646 - Emna Guermazi, Mounir Ben Ayed, Hanêne Ben-Abdallah:
Adaptive security for Cloud data warehouse as a service. 647-650 - Maha Maalej, Achraf Mtibaa, Faïez Gargouri:
Enriching user model ontology for handicraft domain by FOAF. 651-655 - Wiem Khlif, Hanêne Ben-Abdallah:
Integrating semantics and structural information for BPMN model refactoring. 656-660
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.