default search action
12th ITNG 2015: Las Vegas, Nevada, USA
- Shahram Latifi:
12th International Conference on Information Technology - New Generations, ITNG 2015, Las Vegas, NV, USA, April 13-15, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8828-0
Session: Information Systems and Internet Technology
- Chyi-Ren Dow, Zhenhe Ye, Po-Yu Lai:
A Context-Aware Paratransit System. 3-7 - Yanjun Zuo, Jigang Liu:
Mobile Agent-Based Service Migration. 8-13 - Yun Tian, Yanqing Ji, Jesse Scholer:
A Prototype Spatio-temporal Database Built on Top of Relational Database. 14-19 - Philipp Meisen, Diane Keng, Tobias Meisen, Marco Recchioni, Sabina Jeschke:
Bitmap-Based On-line Analytical Processing of Time Interval Data. 20-26 - Go Hasegawa, Yusuke Iijima, Masayuki Murata:
Accuracy Improvement for Spatial Composition-Based End-to-End Network Measurement. 27-32 - Sandro Magalhaes Manteiga, Andre Gomes Lamas Otero, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Financial Measuring of Incremental Deliveries in Software Projects - Finding a Model That Can Answer: How Much is Worth to Split a Project into Iterations? 33-37 - Ben McInroy, Wenying Feng, Yuanyi Pan:
An Empirical Study on Performance Measures for Online Advertising. 38-43 - (Withdrawn) A Fault Tolerant Election Protocol in Asynchronous Distributed Systems with Fail-Stop Model. 44-48
- Angela Siew-Hoong Lee, Tong-Ming Lim, Lip-Sam Thi:
An Analysis on the Factors Related to the Adoption of KS Tools. 49-54 - Pablo Garcia, Jeroen van de Graaf, German Montejano, Daniel Riesco, Narayan C. Debnath, Silvia Bast:
Storage Optimization for Non Interactive Dining Cryptographers (NIDC). 55-60 - Chin Teck Min, Tong Ming Lim:
Investigate SPRON Convergence Time Using Aggressive Chord and Aggressive AP-Chord. 61-66 - Rene Esteves Maria, Luiz Antonio Rodrigues Junior, Luiz Eduardo Guarino de Vasconcelos, Adriano Fonseca Mancilha Pinto, Paulo Takachi Tsoucamoto, Henrique Nunweiler Angelim Silva, Airton Lastori, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Applying Scrum in an Interdisciplinary Project Using Big Data, Internet of Things, and Credit Cards. 67-72 - Joseph B. Abugri, Marc Karam:
Particle Swarm Optimization for the Minimization of Power Losses in Distribution Networks. 73-78
Session: Model Driven Data Science
- Federico Ciccozzi, Antonio Cicchetti, Mikael Sjödin:
On the Generation of Full-Fledged Code from UML Profiles and ALF for Complex Systems. 81-88 - Federico Ciccozzi, Diarmuid Corcoran, Tiberiu Seceleanu, Deflef Scholle:
SMARTCore: Boosting Model-Driven Engineering of Embedded Systems for Multicore. 89-94 - André Luiz Pierre Mattei, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Pedro Carlos da Silva Euphrasio, Onofre Trindade Júnior, Cláudio Toledo:
IFA2S - In-flight Awareness Augmentation Systems. 95-100 - André Luiz Pierre Mattei, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Eloi Fonseca, Osamu Saotome, Paulo Takachi, Gildárcio Sousa Gonçalves, Thoris Angelo Pivetta, Victor da Silva Montalvão, Cassio Kendi, Felipe Lopes de Freitas, Manasseis Alves Ferreira, Mateus Andrade Almeida, Gabriel Goncalves de Oliveira Rodrigues:
Nanosatellite Event Simulator Development Using Scrum Agile Method and Safety-Critical Application Development Environment. 101-106 - Guilherme Augusto Lopes Ferreira, Gildárcio Sousa Gonçalves, Andre Gomes Lamas Otero, Glaydson Luiz Bertoze Lima, Paulo Takachi Tsoucamoto, Paulo Cesar Louzada Villaca, Lineu Fernando Stege Mialaret, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Internet of Things and the Credit Card Market: How Companies Can Deal with the Exponential Increase of Transactions with Connected Devices and Can Also be Efficient to Prevent Frauds. 107-111 - Mehrdad Saadatmand, Sahar Tahvili:
A Fuzzy Decision Support Approach for Model-Based Tradeoff Analysis of Non-functional Requirements. 112-121 - Emanuel Mineda Carneiro, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, Lineu Fernando Stege Mialaret:
Cluster Analysis and Artificial Neural Networks: A Case Study in Credit Card Fraud Detection. 122-126 - Ashok K. Singh, Anita Singh, Dennis J. Murphy:
On Bias Corrected Estimators of the Two Parameter Gamma Distribution. 127-132
Session: Security and Privacy in Next Generation Networks
- Bruce Wu, Tung Nguyen, Mohammad Husain:
Implementation Vulnerability Associated with OAuth 2.0 - A Case Study on Dropbox. 135-138 - Aditya Sundararajan, Alexander Perez-Pons, Arif I. Sarwat:
A Generic Framework for EEG-Based Biometric Authentication. 139-144 - Martin Goll, Shay Gueron:
Vectorization of Poly1305 Message Authentication Code. 145-150 - Trang Nguyen:
Using Unrestricted Mobile Sensors to Infer Tapped and Traced User Inputs. 151-156 - Tara Baniya, Dipesh Gautam, Yoohwan Kim:
Safeguarding Web Surfing with URL Blacklisting. 157-162 - Waleed Halboob, Ramlan Mahmod, Muhammad Abulaish, Haider Abbas, Kashif Saleem:
Data Warehousing Based Computer Forensics Investigation Framework. 163-168 - AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Kashif Saleem:
A Lightweight Key Freshness Scheme for Wireless Sensor Networks. 169-173 - Mingchu Li, Wei Jia, Cheng Guo, Weifeng Sun, Xing Tan:
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage. 174-178 - Fei Liu, Jing Wang, Hongtao Bai, Huiping Sun:
Access Control Model Based on Trust and Risk Evaluation in IDMaaS. 179-184 - Ubaid Ur Rehman, Abdul Ghafoor Abbasi:
Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther. 185-190 - Rafael Tome de Souza, Sérgio Donizetti Zorzo:
Privacy-Preserving Mechanism for Monitoring Sensitive Data. 191-196 - Victor Clincy, Hossain Shahriar:
A Novel Approach to Detect Tampered Wireless Network Applications. 197-199 - Yenumula B. Reddy:
Security and Design Challenges in Cyber-Physical Systems. 200-205 - Anteneh Girma, Moses Garuba, Jiang Li:
Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics. 206-211 - Anteneh Girma, Moses Garuba, Jiang Li, Chunmei Liu:
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. 212-217 - Amir Ali, Umme Habiba, Muhammad Awais Shibli:
Taxonomy of Delegation Model. 218-223 - Muhammad Shafique Gondal, Arif Jamal Malik, Farrukh Aslam Khan:
Network Intrusion Detection Using Diversity-Based Centroid Mechanism. 224-228 - Aleksey Koval:
Relationship between Lucas Sequences and Gaussian Integers in Cryptosystems. 229-233 - Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Jalal Al-Muhtadi:
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks. 234-239
Session: Networking and Wireless Communications
- Natarajan Meghanathan:
Use of Centrality Metrics to Determine Connected Dominating Sets for Real-World Network Graphs. 243-248 - M. B. Nirmala, A. S. Manjunath:
SCUMG: Secure Code Update for Multicast Group in Wireless Sensor Networks. 249-254 - Hani Bani-Salameh, Clinton Jeffery:
Evaluating the Effect of 3D World Integration within a Social Software Environment. 255-260 - Jin-hui Lee, Dong-jun Na, Kwonhue Choi:
Comparison of Multi-user Timing Offset Resilient Uplink OFDMA Schemes with Optimal Power Control. 261-266 - Leonardo Jose Gomes da Silva, Leandro Guarino de Vasconcelos, Glauco da Silva, Luiz Eduardo Guarino de Vasconcelos:
Towards Scalability in Systems with Write Operations in Relational Databases. 267-272 - Sai Ram Ganti, Yoohwan Kim:
Design of Low-Cost On-board Auto-tracking Antenna for Small UAS. 273-279 - Natarajan Meghanathan, Mesafint Fanuel:
A Minimum Channel Switch Routing Protocol for Cognitive Radio Ad Hoc Networks. 280-285 - Paul Wong, Duong Nguyen, Ahmed Abukmail, Richard Brown, Robert Ryan, Mary Pagnutti:
Low Cost Unmanned Aerial Vehicle Monitoring Using Smart Phone Technology. 286-291 - M. B. Nirmala, A. S. Manjunath:
Framework for Secure Code Updates for Wireless Sensor Nodes. 292-295 - Gaurav Verma, Arun Nandewal, K. Chandrasekaran:
Cluster Based Routing in NDN. 296-301 - Yenumula B. Reddy, Anthony Cherry:
Implementing Packet Transfer in Wireless Networks Using PyGame. 302-306 - Mohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem:
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink. 307-313
Session: Wavelets and Validated Numerics
- Jumpei Yamaguchi, Akihiko Yoneyama, Teruya Minamoto:
Automatic Detection of Early Esophageal Cancer from Endoscope Image Using Fractal Dimension and Discrete Wavelet Transform. 317-322 - Hajime Omura, Teruya Minamoto:
Image Quality Assessment for Measuring the Degradation by Using the Dual-Tree Complex Discrete Wavelet Transform. 323-328 - Akihiko Yoneyama, Teruya Minamoto:
No-Reference Image Blur Assessment in the DWT Domain and Blurred Image Classification. 329-334 - Kensuke Fujinoki:
Image Compression with Average Interpolating Lifting Scheme on Triangular Lattice. 335-340 - Mawardi Bahri, Ryuichi Ashino:
Convolution and Correlation Theorems for Wigner-Ville Distribution Associated with Linear Canonical Transform. 341-346 - Akira Morimoto, Ryuichi Ashino, Kazuma Ikebe, Motoi Tatsumi, Takeshi Mandai:
Fractional Hilbert Transforms of Biorthogonal Wavelets. 347-352 - Roman Iakymchuk, David Defour, Caroline Collange, Stef Graillat:
Reproducible Triangular Solvers for High-Performance Computing. 353-358
Session: Software Engineering
- Luiz A. Pacini Rabelo, Antônio Francisco do Prado, Wanderley Lopes de Souza, Luís Ferreira Pires:
An Approach to Business Process Recovery from Source Code. 361-366 - Joslaine Cristina Jeske de Freitas, Stéphane Julia:
Fuzzy Time Constraint Propagation Mechanism for Workflow Nets. 367-372 - Eloisa Cristina Silva Santos, Delano Medeiros Beder, Rosângela Aparecida Dellosso Penteado:
A Study of Test Techniques for Integration with Domain Driven Design. 373-378 - Mikko Nieminen, Tomi Räty:
Adaptable Design for Root Cause Analysis of a Model-Based Software Testing Process. 379-384 - Henrique Frota Soares, Nicolli S. R. Alves, Thiago Souto Mendes, Manoel G. Mendonça, Rodrigo O. Spínola:
Investigating the Link between User Stories and Documentation Debt on Software Projects. 385-390 - Fernanda Madeiral Delfim, Lilian P. Scatalon, Jorge Marques Prates, Rogério Eduardo Garcia:
Visual Approach for Change Impact Analysis: A Controlled Experiment. 391-396 - Luisa Hernández, Heitor A. X. Costa:
Identifying Similarity of Software in Apache Ecosystem - An Exploratory Study. 397-402 - Rodrigo G. C. Rocha, Ryan R. Azevedo, Dimas Cassimiro do Nascimento, Renan Leandro, Diogo Espinhara, Eduardo de A. Tavares, Amanda Oliveira, Gabriel Franca, Cleyton M. O. Rodrigues, Silvio Meira:
A System Based on Ontology and Case-Based Reasoning to Support Distributed Teams. 403-408 - Roberto Pepato Mellado, Gabriel de Souza Pereira Moreira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
A Software Framework for Identifying the Law of Demeter Violations. 409-414 - Cuauhtémoc López Martín, Arturo Chavoya, Maria Elena Meda-Campaña:
A Fuzzy Logic Model for Predicting the Development Schedule of Software Projects. 415-420 - Osama Alkrarha, Jameleddine Hassine:
MuAsmetaL: An Experimental Mutation System for AsmetaL. 421-426 - Gustavo Vale, Ramon Abílio, André Pimenta Freire, Heitor A. X. Costa:
Criteria and Guidelines to Improve Software Maintainability in Software Product Lines. 427-432 - Ramon Abílio, Juliana Padilha, Eduardo Figueiredo, Heitor A. X. Costa:
Detecting Code Smells in Software Product Lines - An Exploratory Study. 433-438 - Pekka Aho, Matias Suarez, Atif M. Memon, Teemu Kanstrén:
Making GUI Testing Practical: Bridging the Gaps. 439-444 - Jailson Brito, Vaninha Vieira, Adolfo Duran:
Towards a Framework for Gamification Design on Crowdsourcing Systems: The G.A.M.E. Approach. 445-450 - Katyusco de F. Santos, Dalton Dario Serey Guerrero, Jorge C. A. de Figueiredo:
Using Developers Contributions on Software Vocabularies to Identify Experts. 451-456
Session: High Performance Computer Architecture and Green Computing
- Quamar Niyaz, Weiqing Sun, Rao Xu, Mansoor Alam:
Light VN: A Light-Weight Testbed for Network and Security Experiments. 459-464 - Yanqing Ji, Yun Tian, Fangyang Shen, John Tran:
High-Performance Biomedical Association Mining with MapReduce. 465-470 - William Babikian, Zechariah Gajadhar, Anjali Dhobale, Michael Rubenacker, Shouling He:
Integrated Design Patterns for Control System Analysis and Synthesis. 471-472 - James Andro-Vasko, Wolfgang Bein, Dara Nyknahad, Hiro Ito:
Evaluation of Online Power-Down Algorithms. 473-478 - Doina Bein, Wolfgang Bein, Ashish Karki, Bharat B. Madan:
Optimizing Border Patrol Operations Using Unmanned Aerial Vehicles. 479-484 - Jeffrey Anu, Rajeev Agrawal, Cameron Seay, Sambit Bhattacharya:
Smart Grid Security Risks. 485-489 - Md. Masud Rana, Li Li:
Controlling the Distributed Energy Resources Using Smart Grid Communications. 490-495 - Md. Masud Rana, Li Li:
Distributed Generation Monitoring of Smart Grid Using Accuracy Dependent Kalman Filter with Communication Systems. 496-500 - Md. Masud Rana, Li Li:
Kalman Filter Based Microgrid State Estimation Using the Internet of Things Communication Network. 501-505 - Xudong Ma:
Joint Write-Once-Memory and Error-Control Codes. 506-512
Session: Innovative Technologies and Practices in Education and Simulation
- Soumayah F. Alghannam, Mona I. Alawadh, Dalal A. Alwedaah, Mutlaq B. Alotaibi:
Critical Success Factors for Location-Based Services in Saudi Arabia. 515-521 - Fausto Abraham Jacques Garcia, Sandra Luz Canchola-Magdaleno:
Vector Cryptography System: An Approach for the Analysis of Linear Arithmetic Spaces. 522-527 - Federico Amendola, Martin Fernandez, Liliana Favre:
GLIESE - A Framework for Experimental Game Development. 528-533 - Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories. 534-539 - Cristian Barria, Cristian Rusu, Claudio Cubillos, Jaime Díaz:
Training through Simulation for Digital Battlefield. 540-545 - Freddy Paz, Freddy Asrael Paz, Daniela Villanueva, José Antonio Pow-Sang:
Heuristic Evaluation as a Complement to Usability Testing: A Case Study in Web Domain. 546-551 - Ivan M. Lessa, Glauco de Figueiredo Carneiro, Miguel P. Monteiro, Fernando Brito e Abreu:
A Multiple View Interactive Environment to Support MATLAB and GNU/Octave Program Comprehension. 552-557
Session: Future of Digital Health
- Maa Isakovic, Jaka Cijan, Urban Sedlar, Mojca Volk, Janez Beter:
The Role of mHealth Applications in Societal and Social Challenges of the Future. 561-566 - Ai Keow Lim, Christoph Thuemmler:
Opportunities and Challenges of Internet-Based Health Interventions in the Future Internet. 567-573 - Sweta Gurung, Yoohwan Kim:
Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data? 574-579 - Ahmed Elsherbiny Hasan, Armin Schneider, Alois Paulin, Christoph Thuemmler:
Future Internet in Surgical Operating Theatre. 580-585 - Melissa Katherine Mulcahy, Stan Kurkovsky:
Automatic Fall Detection Using Mobile Devices. 586-588 - Emi Morioka, Mehrdad Sepehri Sharbaf:
Cloud Computing: Digital Forensic Solutions. 589-594 - Alessio Bucaioni, Saad Mubeen, Antonio Cicchetti, Mikael Sjödin:
Exploring Timing Model Extractions at EAST-ADL Design-Level Using Model Transformations. 595-600 - Swaroop Nunna, Apostolos Kousaridas, Mohamed Ibrahim, Markus Dillinger, Christoph Thuemmler, Hubertus Feussner, Armin Schneider:
Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing. 601-605
Session: Data Mining
- Allan Delon Barbosa Araujo, Paulo Caetano da Silva:
PERSEC - Middleware for Multiple Encryption in Web Services. 609-614 - Vikas G. Ashok, Karthik Navuluri, A. Alhafdhi, Ravi Mukkamala:
Dataless Data Mining: Association Rules-Based Distributed Privacy-Preserving Data Mining. 615-620 - Mark Smith:
Intelligent Mobile Application for Traffic Monitoring. 621-625 - Chung-Hong Lee, Chih-Hung Wu:
Collecting and Mining Big Data for Electric Vehicle Systems Using Battery Modeling Data. 626-631 - Sonya Zhang:
A Technology-Business-Environment Model for Effective Internet Entrepreneurship Education. 632-637 - Ibraheem Alolyan:
Linear optimization with fuzzy objective function and constraints. 638-639 - Samir N. Hamade:
Parental Awareness and Mediation of Children's Internet Use in Kuwait. 640-645 - Mali Abdollahian, Nadeera Gnan Tilshan Gunaratne:
Low Birth Weight Prediction Based on Maternal and Fetal Characteristics. 646-650 - Guymon R. Hall, Kazem Taghva:
Using the Web 1T 5-Gram Database for Attribute Selection in Formal Concept Analysis to Correct Overstemmed Clusters. 651-654
Session WB2: Potpourri
- Luiz Eduardo Guarino de Vasconcelos, Andre Yoshimi Kusumoto, Nelson Paiva Oliveira Leite, Cristina Moniz Araujo Lopes:
Automated Extraction Information System from HUDs Images Using ANN. 657-661 - Michael D. L. Santos, Elcio H. Shiguemori, Rodrigo Luiz Mendes Mota, Alexandre C. B. Ramos:
Change Detection in Satellite Images Using Self-Organizing Maps. 662-667 - Pyung-Han Kim, Dae-Soo Kim, Kee-Young Yoo:
Improved Histogram-Shifting-Imitated Reversible Data Hiding Scheme. 668-673 - Moohyun Lee, Soojung Hur, Yongwan Park:
An Obstacle Classification Method Using Multi-feature Comparison Based on 2D LIDAR Database. 674-679 - Gunzung Kim, Jeongsook Eom, Yongwan Park:
An Experiment of Mutual Interference between Automotive LIDAR Scanners. 680-685 - Liane Gabora:
LIVEIA: A Light-Based Immersive Visualization Environment for Imaginative Actualization. 686-691 - Torbjorn Loken, Sergiu M. Dascalu, Frederick C. Harris Jr.:
GPU Based Sound Simulation and Visualization. 692-697 - Cheng-Hsiao Wu:
Qubits or Symbolic Substitutions for General-Purpose Quantum Computing? 698-702 - John E. Dorband:
A Boltzmann Machine Implementation for the D-Wave. 703-707 - Laxmi P. Gewali, Pratik Hada:
Constructing 2D Shapes by Inward Denting. 708-713
Session: Posters
- Helidon Karcanaj, Edra Bumci, Igli Tafa, Julian Fejzaj:
Deadlocks in Different Operating Systems. 717-718 - Shih-Wei Fang, Dananjaya Rajamanthri, Mohammad Husain:
Facebook Privacy Management Simplified. 719-720 - Matteo Virgilio, Guido Marchetto, Riccardo Sisto:
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking. 721-724 - Ibtisam Mohamed, Dhiren Patel:
Android vs iOS Security: A Comparative Study. 725-730 - Mohammed Alnatheer:
Information Security Culture Critical Success Factors. 731-735 - Fayez Hussain Alqahtani, Ayed Said Alwadain:
Strategy as a Prerequisite of Enterprise Web 2.0 Implementation. 736-739 - Ayed Said Alwadain, Fayez Hussain Alqahtani:
A Model of the Factors Influencing Enterprise Architecture Evolution in Organisations. 740-743 - Jaime Díaz Arancibia, Cristian Rusu, Cristian Barria, César Collazos O.:
E-commerce Concerns - Latin American Factors in Transactional Websites. 744-745 - Mozhdeh Sadighi, Mohammad Mahdi Ghobadi, Seyyed Hossein Hasanpour Matikolaee:
A Conceptual Model for Customer Lock-in Effect in Electronic Business. 746-750 - Antonio Capodieci, Giuseppe Del Fiore, Luca Mainetti:
Adopting Collaborative Workflow Pattern: Lesson Learned. 751-755 - Nevila Xoxa, Aldiger Mehilli, Igli Tafa, Julian Fejzaj:
Implementations of File Locking Mechanisms, Linux and Windows. 756-757 - Alban Karapici, Enri Feka, Igli Tafa, Alban Allkoçi:
The Simulation of Round Robin and Priority Scheduling Algorithm. 758 - Alan Ferreiros, Luiz Alberto Vieira Dias:
Evaluation of Accomplishment of DO-178C Objectives by CMMI-DEV 1.3. 759-760 - Alexandre Chaves da Silva, Lucas Roberto Correa, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
A Case Study Using Testing Technique for Software as a Service (SaaS). 761-762 - Yong Shi, Sunpil Kim:
An Attempt to Find Information for Multi-dimensional Data Sets. 763-764 - Cameron Seay, Rajeev Agrawal, Anirudh Kadadi, Yannick Barel:
Using Hadoop on the Mainframe: A Big Solution for the Challenges of Big Data. 765-769 - Pankaj Kamthan:
Using Personas to Support the Goals in User Stories. 770 - Erasmo Leite Monteiro, Paulo Caetano da Silva:
Risk Management Lifecycle Implementation Services in SOA. 771 - Danielle Amaral Menendez, Elisa S. Menendez, Thiers Garretti Ramos Sousa, Paulo Caetano da Silva:
Experiment Report on the Implementation of Agile Testing. 772-773 - Breno Lisi Romano, Alan Delgado da Silva:
Project Management Using the Scrum Agile Method: A Case Study within a Small Enterprise. 774-776 - Breno Lisi Romano, Ricardo Bragagnolle de Souza, Adilson Marques da Cunha:
Deploying Integrated Environment for Software Testing Tools. 777-779 - Lígia Maria Soares Passos, Stéphane Julia:
Deadlock-Freeness Scenarios Detection in Web Service Composition. 780-783 - Glaydson Luiz Bertoze Lima, Guilherme Augusto Lopes Ferreira, Osamu Saotome, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Hardware Development: Agile and Co-Design. 784-787 - Clarimundo Machado Moraes Junior, Rita Maria da Silva Julia, Stéphane Julia:
Modeling Recursive Search Algorithms by Means of Hierarchical Colored Petri Nets and CPN Tools. 788-791 - Ahmad Al Kawam, Haidar M. Harmanani:
A Parallel GPU Implementation of the Timber Wolf Placement Algorithm. 792-795 - Seilkhan Boranbayev, Sanzhar Altayev, Askar Boranbayev:
Applying the Method of Diverse Redundancy in Cloud Based Systems for Increasing Reliability. 796-799 - Jonathon Ng, Deepti Joshi, Shankar M. Banik:
Applying Data Mining Techniques to Intrusion Detection. 800-801 - Askar Boranbayev, Mikhail Mazhitov, Zhanat Kakhanov:
Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher Education. 802-804
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.