default search action
6th ICSCA 2017: Bangkok, Thailand
- Vitaliy Mezhuyev, Luigi Benedicenti:
Proceedings of the 6th International Conference on Software and Computer Applications, ICSCA '17, Bangkok, Thailand, February 26-28, 2017. ACM 2017, ISBN 978-1-4503-4857-7
Software engineering
- Sungwon Kang, Jungmin Kim, Haeun Baek, Hwi Ahn, Pilsu Jung, Jihyun Lee:
Comparison of software product line test derivation methods from the reuse viewpoint. 1-8 - Syed Abdul Baqi Shah, Muhammad Rashid, Muhammad Arif:
A prediction model for measurement-based timing analysis. 9-14 - Nguyen Thien Khanh, Jirapun Daengdej, Habibi Husain Arifin:
Human stories: a new written technique in agile software requirements. 15-22 - Angelo C. Arguson, William A. Aldea III:
Development of Encantasya: War of the Four Kingdoms. 23-27 - Shin-ya Nishizaki:
Linear lambda calculus with non-linear first-class continuations. 28-32 - Sumana Yimman, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn:
Concurrent test case generation from UML activity diagram based on dynamic programming. 33-38 - Puttakul Sakul-Ung, Wichian Chutimaskul:
A predictive model for successful software development projects with information technology strategic alignment. 39-45 - Azizi Miskon, Jatendra Uslama, Siti Nooraya Mohd Tawil:
A database on the effect of magnetic fields on stem cells differentiation. 46-49 - Ganis Zulfa Santoso, SongWoo Sok, Young-Woo Jung, Dong-Jae Kang:
Optimizing I/O performance in ViMo-S hypervisor with zero-copy method. 50-54
Data analysis and processing
- Yingjie Shi, Lei Wang, Fang Du:
Performance and energy efficiency of big data systems: characterization, implication and improvement. 55-61 - Surapon Riyana, Noppamas Riyana, Srikul Nanthachumphu:
Enhanced (k, e)-anonymous for categorical data. 62-67 - Jale Bektas, Turgay Ibrikci:
Hybrid classification procedure using SVM with LR on two distinctive datasets. 68-71
Information systems and engineering
- Lei Zhu, Guijun Wang, Xianchun Zou:
Improved information gain feature selection method for Chinese text classification based on word embedding. 72-76 - Aryo Pinandito, Rizal Setya Perdana, Mochamad Chandra Saputra, Hanifah Muslimah Az-zahra:
Spam detection framework for Android Twitter application using Naïve Bayes and K-Nearest Neighbor classifiers. 77-82 - Hyun-Ho Lee, Min-Ha Hong, Kee-Won Kim, Seung-Hoon Kim:
Comparative study on book similarity measurement method based on characters in the body of a book written in Korean. 83-86 - Jen-Yuan Yeh, Tien-Yu Hsu, Cheng-Jung Tsai, Pei-Cheng Cheng:
Reference scope identification for citances by classification with text similarity measures. 87-91 - Long Wang, Yanling Qian, Yanbin Liu, Qingzhi Meng, Tengfei Xu:
Information extraction method and its application in Chinese equipment technical manual based on rule-matching. 92-97 - Nurizal Dwi Priandani, Herman Tolle, Anggi G. Hapsani, Lutfi Fanani:
Malang historical tourism guide mobile application based on geolocation. 98-101 - Xinbao Shao, Qingshan Li, Yishuai Lin, Bo-Yu Zhou:
A meta-search group recommendation mechanism based on user intent identification. 102-106
Image processing
- Yuxi Feng, Qizhou Wu, Guotian He:
Motion target detection algorithm based on monocular vision. 107-111 - Priyajit Biswas, Shyamalendu Kandar, Bibhas Chandra Dhara:
A novel image encryption technique using one dimensional chaotic map and circular shift technique. 112-116 - Petcharat Pattanasethanon:
Comparison on two image features weight adjustment effect to relevance output image retrieval. 117-121 - Young-Jin Goh, Buhm Lee, Kyoung Min Kim:
Study on thresholding operation for efficient 1: N matching scheme of fingerprint identification. 122-126 - Samra Naz, Sajid Ur Rehman, Hafsa Asad, Sehrish Saleem:
Action recognition by silhouette fusion. 127-131 - Sangita Bharkad:
Automatic segmentation of blood vessels in retinal image using morphological filters. 132-136 - Dekui Lv, Miao Yu, Jianyu Song, Kuidong Qian, Yanjun Cui:
Study on police graphic plotting technology based on web. 137-143 - Nusaibah Kh. Al-Salihy, Turgay Ibrikci:
Classifying breast cancer by using decision tree algorithms. 144-148 - J. A. A. M. Jayanetti, D. A. Meedeniya, M. D. N. Dilini, M. H. Wickramapala, J. H. Madushanka:
Enhanced land cover and land use information generation from satellite imagery and foursquare data. 149-153
Computer science and applications
- Mengxiang Lin, Xiaomei Hou, Rui Liu, Linyan Ge:
Enhancing constraint based test generation by local search. 154-158 - Akshita Bhandari, Ashutosh Gupta, Debasis Das:
Betweenness centrality updation and community detection in streaming graphs using incremental algorithm. 159-164 - Ruilan Yang, Xuejun Yu:
Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation. 165-170 - Huiyu Li, Hong Hou, Xiaoqun Guo:
The exploration on global village language: Harmony. 171-175 - Joohyun Kyong, Jinwoo Jeon, Sung-Soo Lim:
Improving scalability of apache spark-based scale-up server through docker container-based partitioning. 176-180 - Mohammadshareefuddin Salash-arong, Natawut Nupairoj:
TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment. 181-185 - Alexandre dos Santos Mignon, Ricardo Luis de Azevedo da Rocha:
An application of composite nano-patterns to compiler selected profiling techniques. 186-190 - Jan Corfixen Sørensen, Bo Nørregaard Jørgensen:
An extensible component-based multi-objective evolutionary algorithm framework. 191-197 - Yanshan He, Ting Wang, Jianli Xie, Ming Zhang:
Parallel frequent subgraph mining algorithm. 198-202 - Meijia Wang, Qingshan Li, Yishuai Lin, Bo-Yu Zhou:
A personalized result merging method for metasearch engine. 203-207 - Masaya Shimakawa, Kenji Osari, Shigeki Hagihara, Naoki Yonezaki:
Modularization of formal specifications or efficient synthesis of reactive systems. 208-213 - Gabriele Arcidiacono, Alessandro Giorgetti, Andrea Ciappi:
An axiomatic design framework for reliability improvement. 214-217 - Hyun-Ho Lee, Tai-Wan Kim, Kee-Won Kim:
Efficient montgomery AB2 multiplier for finite fields defined by irreducible all-one polynomials. 218-222 - Komar Udin, Robin Gui, Arry Rahmawan:
Green vehicle routing problem with heterogeneous fleet and time windows. 223-227
Communication and network engineering
- Yewen Huang, Shenfen Kuang:
M/M/n/m queuing model under non-preemptive limited-priority. 228-232 - Sa'ed Abed, Mohammad H. Al Shayeji, Zahra'a Abdullah, Zainab AlSaeed:
Fault tolerance design for NoCs: partial virtual-channel sharing. 233-238 - Alfin Hikmaturokhman, Via Lutfita, Achmad Rizal Danisya:
4G-LTE 1800 Mhz coverage and capacity network planning using frequency reuse 1 model for rural area in Indonesia. 239-243 - Thanh Van Do, Paal Engelstad, Boning Feng, Do van Thuan:
A near real time SMS grey traffic detection. 244-249 - Debasis Das, Amritesh Kumar:
Algorithm for multicast opportunistic routing in wireless mesh networks. 250-255 - Shigeki Hagihara, Yoshiharu Fushihara, Masaya Shimakawa, Masahiko Tomoishi, Naoki Yonezaki:
Web server access trend analysis based on the Poisson distribution. 256-261 - Rui Zhang, Zikang Lin, Xiaoming Xiong:
Securing compressed real-time audio codec based on iLBC and SM4. 262-266
System modeling and simulation
- Giuseppe Carlo Calafiore, Carlo Tommolillo, Carlo Novara, E. Fabrizio:
APSEplus: a MATLAB toolbox for parametric energy simulation of reference buildings. 267-271 - Ruixin Song, Wenjun Wang, Pengfei Jiao, Kang Li, Jing Li:
Study of land evolution model driving by multi-attribute functional urban areas. 272-276 - ZhenHua Jin, Jie Xiong, Zhucheng Li, Yuwei Hua:
Design and application of a PHEV simulation platform. 277-280 - Xiuyan Zhao, Xianxi Liu, Kaixing Zhang:
A structure-based 3d CAD model similarity assessment approach. 281-284 - Hong-guo Li, Shi-jie Su, Lan-jun Jia, Bo Wang, Jie Meng:
The design of the mixed load simulation test bench. 285-288 - Zahrah Yahya, Rahmita Wirza O. K. Rahmat, Fatimah Khalid, Amir Rizaan, Rizal Rahman:
An automated 3D modelling application based on vertices from 2D paper sketches. 289-293 - Kant Chareancholwanich, Pisit Jarumaneeroj:
A network-based model for solving inventory routing problem in the asphalt industry: a case study. 294-298
Biomedical engineering
- Arjon Turnip, M. Faizal Amri, Hanif Fakrurroja, Artha Ivonita Simbolon, M. Agung Suhendra, Dwi Esti Kusumandari:
Deception detection of EEG-P300 component classified by SVM method. 299-303 - Chien-Hsu Chen, Chuan-Po Wang, Chun Chin Su:
The effectiveness of using auto organizational menu to communicate with classmates: a case study of autism spectrum disorders. 304-309
Supply chain and scheduling
- Mohammad Mohammadi, Soheyl Khalilpourazari:
Minimizing makespan in a single machine scheduling problem with deteriorating jobs and learning effects. 310-315 - Yunxia Guo:
Application research of supplier evaluation based on random forest. 316-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.