default search action
14th SNPD 2013: Honolulu, Hawaii, USA
- 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2013, Honolulu, Hawaii, USA, 1-3 July, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5005-3
- Ajay Gupta:
Keynote.
Algorithms
- Longxiang Wang, Xingjun Zhang, Guofeng Zhu, Yueguang Zhu, Xiaoshe Dong:
An Undirected Graph Traversal Based Grouping Prediction Method for Data De-duplication. 3-8 - Esmaeil Laleh, Shahriar Lotfi, Ayaz Isazadeh, Yousef Masodi:
An Algorithm of Developed Imperialist Competition for Suitable Human Resource Layout. 11-16 - Milad Dastan Zand, Mohammad Kalantari, Shahram Golzari:
File Transfer Scheduling Optimization Using Artificial Immune System. 17-22 - Raid Mohsen Alhazmi, Sungchul Hong:
Improve the Intelligent Consortium Agent for SMEs in the Plastic Market. 23-28 - Harry Zhou:
Modeling Stock Analysts' Decision Making: An Intelligent Decision Support System. 29-34 - Peeter Lorents, Erika Matsak:
Veracity and Convincingness: Sources of Plausibility for Decision Making and Situation Management. 35-42 - Shinq-Jen Wu, Cheng-Tao Wu:
Winner-Take-All Memetic Differential Evolution for Genetic Interaction: Parameter Identification. 43-48
Collaborative Computing
- Jahangir Dewan, Morshed U. Chowdhury, Lynn Margaret Batten:
e-Learning Content Authentication Using Bipartite Matching. 51-55
Communication Systems and Networks
- Arwa S. Fadel, Ayman G. Fayoumi:
Cloud Resource Provisioning and Bursting Approaches. 59-64
Component-Based Software Engineering
- Gyubaek Kim:
A Content Aggregation Using Aspect Oriented Programming. 67-70 - Mohammad Charaf Eddin, Zoubir Mammeri:
Preserving the Global Consistency of Dynamic Reconfiguration. 71-76
Cryptography and Network Security
- Shailendra Singh, Sanjay Silakari:
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework. 79-84 - Abdulaziz Alsadhan, Naveed Khan:
An LBP Based Key Management for Secure Wireless Body Area Network (WBAN). 85-88 - Adel Khelifi, Maher Aburrous, Manar AbuTalib, P. V. S. Shastry:
Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic Algorithms. 89-95 - Ahmad Alomari:
Fully Distributed Certificate Authority Based on Polynomial over Elliptic Curve for MANET. 96-100 - Wei Yu, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu:
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. 101-106 - Seonmin Lee, Hyunsung Kim, Sung-Woon Lee:
Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System. 107-112
Data Mining and Machine Learning
- Sergey Soshnikov, Carl Lee, Vasiliy Vlassov, Maria Gaidar, Sergey Vladimirov:
A Comparison of Some Predictive Models for Modeling Abortion Rate in Russia. 115-120 - Huiquan Zhang, Osamu Yoshie:
A Fusion Approach for Facial Expression Using Local Binary Pattern and a Pseudo 3D Face Model. 121-126 - Ziping Zhao, Xirong Ma:
Active Learning for Speech Emotion Recognition Using Conditional Random Fields. 127-131 - Changhyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim:
Dynamic Seed Analysis in a Social Network for Maximizing Efficiency of Data Collection. 132-136 - Nevien Moawad, Kecheng Liu, Mohammed El-Helly:
Integrating Activity Theory and Semiotics as Knowledge Elicitation Technique. 137-142 - E. Allison Newcomb, Robert J. Hammell II:
A Method to Assess a Fuzzy-Based Mechanism to Improve Military Decision Support. 143-148
Database System Management
- Yijun Bei, Zhen Lin, Chen Zhao, Xiaojun Zhu:
HBase System-Based Distributed Framework for Searching Large Graph Databases. 151-156
Embedded Systems
- Kailong Zhang, Jiwei Li, Arnaud de La Fortelle, Xingshe Zhou:
Agent Based Adaptive Cooperative Models and Mechanisms of Multiple Autonomous Cyber-Physical Systems. 159-164 - Wen Su, Jing Wang, Huandong Wang, Ling Wang:
An Optimized Solution for Cross-Domain System Bus Transaction Processing. 165-170
Image, Speech and Signal Processing
- Lifeng Zhang, Yujie Li, Huimin Lu, Seiichi Serikawa:
Distance Measurement with a General 3D Camera by Using a Modified Phase Only Correlation Method. 173-178
Internet Technology and Applications
- Mohammed Alodib:
An Approach to Automating the Integration of the Access Control Policies for Web Services. 181-187 - Tadachika Ozono, Shun Shiramatsu, Toramatsu Shintani:
WFE-Enabled Web Page Transformation: Generating Real-Time Collaborative Editing Systems from Existing Web Pages. 188-193
Mobile/Wireless/Ad-Hoc Networks
- Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Critical Analysis and Comparative Study of Security for Networked RFID Systems. 197-202 - Minsu Park, Hyunsung Kim, Sung-Woon Lee:
User Authentication for Hiererchical Wireless Sensor Networks. 203-208
Natural Language Processing
- Abdulmohsen Al-Thubaity, Norah Abanumay, Sara Al-Jerayyed, Aljoharah Alrukban, Zarah Mannaa:
The Effect of Combining Different Feature Selection Methods on Arabic Text Classification. 211-216
Neural Networks & Genetic Algorithms
- Yang Bai, Jale Tezcan, Qiang Cheng, Jie Cheng:
A Multiway Model for Predicting Earthquake Ground Motion. 219-224 - Georgios Kalantzis, Aditya P. Apte, Richard J. Radke, Andrew Jackson:
A Reduced Order Memetic Algorithm for Constraint Optimization in Radiation Therapy Treatment Planning. 225-230 - Jaber E. Abu Qudeiri, Fayiz Y. Abu Khadra, Abdulrahman Al-Ahmari:
GA Support System to Optimize the Sequence of Multi-level and Multi-tool Operations in CNC Machines. 231-236
Operating Systems
- Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Nan Wu, Xingjun Zhang:
Improving Virtual Machine Reliability with Driver Fault Isolation. 239-244
Parallel and Distributed Computing
- Yulu Zhang, Xinyuan Guo, Hai Jiang, Kuan-Ching Li:
A Checkpoint/Restart Scheme for CUDA Applications with Complex Memory Hierarchy. 247-252 - Xiaoxian Liu, Rongcai Zhao, Lin Han:
A Compile-Time Cost Model for Automatic OpenMP Decoupled Software Pipelining Parallelization. 253-260 - Qiming Chen, Meichun Hsu, Malú Castellanos:
Backtrack-Based Failure Recovery in Distributed Stream Processing. 261-266 - Rui Ding, Rongcai Zhao, Liguo Fu:
Code Generation for Accurate Array Redistribution on Automatic Distributed-Memory Parallelization. 267-274 - Rui Feng, Peng Zhang, Yuefan Deng:
Deadlock-Free Routing Algorithms for 6D Mesh/iBT Interconnection Networks. 275-282 - Tanvir Atahary, Tarek M. Taha, Scott Douglass:
Hardware Accelerated Cognitively Enhanced Complex Event Processing Architecture. 283-288 - Xingfu Wu, Charles W. Lively, Valerie E. Taylor, Hung-Ching Chang, Chun-Yi Su, Kirk W. Cameron, Shirley Moore, Daniel Terpstra, Vincent M. Weaver:
MuMMI: Multiple Metrics Modeling Infrastructure. - Xinkai Li, Chao Lu, Jon A. Sjogren:
Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic. 296-302 - Xingfu Wu, Valerie E. Taylor:
Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Large-Scale Multithreaded BlueGene/Q Supercomputer. 303-309 - Hamid Abachi:
Total System Cost Analysis of Master-Slave Multi-super-Hypercube DX-tree Architecture. 310-314
Software Specification & Architecture
- Mohammad Dabbagh, Sai Peck Lee:
A Consistent Approach for Prioritizing System Quality Attributes. 317-322 - Federico Amendola, Liliana Favre:
Adapting CRM Systems for Mobile Platforms: An MDA Perspective. 323-328 - Huafu Liu, Dapeng Liu, Shaochun Xu:
Evaluating Programming Performance with Keystroke Characteristics: An Empirical Experiment. 329-335 - Anupama Surendran, Philip Samuel:
Extracting Business Rules Using a Partitioned Forward Slicing Approach. 336-341 - Zhuang Li, Huaikou Miao:
Introducing Agents in Multi-agent System with Superposition Refinement. 342-347 - Xi Wang, Shaoying Liu:
Guided Requirements Clarification for Automatic Formalization. 348-355 - Chung-Ling Ling, Wuwei Shen, Dionysios Kountanis:
Using UML Profile and OCL to Impose Regulatory Requirements on Safety-Critical System. 356-361
Software Testing
- Honghao Gao, Huaikou Miao:
A Quantitative Model-Based Selection of Web Service Reconfiguration. 365-371
Data Mining for Info-communication Services and Networks
- Hiep Hoang-Van, Takumi Miyoshi, Olivier Fourmaux:
P2PTV Traffic Localization by Deep Packet Inspection. 375-380 - Shigeaki Tanimoto, Yorihiro Sakurada, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Hiroyuki Sato, Atsushi Kanai:
A Study of Data Management in Hybrid Cloud Configuration. 381-386 - Michiaki Iwazume, Ken Kaneiwa:
Community-Driven and Ontology-Based Biological Knowledge Management: A Hybrid Approach to Harnessing Collective Intelligence. 387-393 - Motoi Iwashita, Shigeaki Tanimoto:
Consideration of Billing Management Method for Cloud Computing Services. 394-399 - Akiya Inoue, Motoi Iwashita, Takeshi Kurosawa, Ken Nishimatsu:
Mobile-Carrier Choice Behavior Analysis Around Smart Phone Market. 400-405
Analysis, Evaluation, and Usage of Web Information, System Behaviors and Human Actions
- Takumi Yoshida, Ushio Inoue:
A Bookmark Recommender System Based on Social Bookmarking Services and Wikipedia Categories. 409-413 - Teruhisa Hochin, Hiroki Nomiya:
Analysis of Pauses Toward Transmitting Traditional Skills. 414-419 - Ippei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii:
Development and Study of Support Applications for Autistic Children. 420-425 - Yuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya:
Estimation of Objective Scores of Answer Statements Posted at Q&A Sites. 426-431 - Teruhisa Hochin:
Extension for Explicit Specification of Semantic Generalization. 432-437 - Ryumaru Kato, Atsuko Mutoh, Nobuhiro Inuzuka:
Grouping Methods for Generating Friendship Based on Network Properties. 438-443 - Hiroki Nomiya, Atsushi Morikuni, Teruhisa Hochin:
Impressive Scene Detection from Lifelog Videos by Unsupervised Facial Expression Recognition. 444-449 - Naohiro Ishii, Toshinori Deguchi, Masashi Kawaguchi, Hiroshi Sasaki:
Vector Operations in Neural Networks Computations. 450-456
Foundations of Advanced Software
- Mitsuo Wakatsuki, Etsuji Tomita, Tetsuro Nishino:
A Polynomial-Time Algorithm for Checking the Equivalence for Real-Time Deterministic Restricted One-Counter Transducers Which Accept by Final State. 459-465 - Kunihito Hoki, Tomoyuki Kaneko, Daisaku Yokoyama, Takuya Obata, Hiroshi Yamashita, Yoshimasa Tsuruoka, Takeshi Ito:
A System-Design Outline of the Distributed-Shogi-System Akara 2010. 466-471 - Mamoru Kubota, Tadashi Yamazaki, Tetsuro Nishino:
Brain-Inspired Motion Programming for Hobby-Use Humanoid Robots. 472-477 - Chieko Kato:
Comprehending Color Images for Color Barrier-Free Via Factor Analysis Technique. 478-483 - Kensei Tsuchida, Tadaaki Kirishima, Yasunori Shiono, Futoshi Sugimoto, Chieko Kato, Takeo Yaku:
Optimality and Complexity for Drawing Problems of Tree-Structured Diagrams. 484-489 - Koichi Anada, Shinji Koka, Akihito Kubota, Yuki Shindo, Takeo Yaku:
The Number of Cells in Regions Shifted on 2D Images Represented by Raster Data with Heterogeneous Parts. 490-495
Experiences of Software Engineering
- Naoki Fukuyasu, Sachio Saiki, Hiroshi Igaki, Shinsuke Matsumoto, Shinji Kusumoto:
A Case Study of Cloud-Enabled Software Development PBL. 499-504 - Kazumasa Fukuda, Haruaki Tamada:
A Dynamic Birthmark from Analyzing Operand Stack Runtime Behavior to Detect Copied Software. 505-510 - Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama:
A Feature Model of Framework Applications. 511-516 - Tetsuya Ohdo, Haruaki Tamada, Yuichiro Kanzaki, Akito Monden:
An Instruction Folding Method to Prevent Reverse Engineering in Java Platform. 517-522 - Yuki Ise, Shintaro Yamamoto, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura:
Implementing Materialized View of Large-Scale Power Consumption Log Using MapReduce. 523-528 - Yuichi Watanabe, Masahide Nakamura, Shinsuke Matsumoto:
Implementing Personalized Energy Visualization Service in Home Network System. 529-534 - Masateru Tsunoda, Kyohei Fushida, Yasutaka Kamei, Masahide Nakamura, Kohei Mitsui, Keita Goto, Ken-ichi Matsumoto:
An Authentication Method with Spatiotemporal Interval and Partial Matching. 535-542 - Chakkrit Tantithamthavorn, Akinori Ihara, Ken-ichi Matsumoto:
Using Co-change Histories to Improve Bug Localization Performance. 543-548 - Yasutaka Sakamoto, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura:
Visualizing Software Metrics with Service-Oriented Mining Software Repository for Reviewing Personal Process. 549-554
Evolutionary Computation in Vision, Image and Signal Processing
- Cheng-hsien Lee, Chun-Hua Hung, Shie-Jue Lee:
A Comparative Study on Clustering Algorithms. 557-562 - Chih-Hung Wu, Yi-Han Chen, Yao-Yu Lee, Chiung-Hui Tsai:
A Fast Genetic SLAM Approach for Mobile Robots. 563-568 - Chia-Ching Wei, Thao-Tsen Chen, Shie-Jue Lee:
k-NN Based Neuro-fuzzy System for Time Series Prediction. 569-574 - Chen-Sen Ouyang, Naijing Kang, Po-Jen Cheng:
Recursive SVD-Based Least Squares Algorithm with Forgetting Factors for Neuro-fuzzy Modeling. 575-580 - Chih-Chin Lai, Chi-Feng Chan, Chen-Sen Ouyang, Hui-Fen Chiang:
A Robust Feature-Based Image Watermarking Scheme. 581-585 - Shing-Tai Pan, Yi-Heng Wu, Yi-Lan Kung, Hung-Chin Chen:
Heartbeat Recognition from ECG Signals Using Hidden Markov Model with Adaptive Features. 586-591 - Chih-Hung Wu, Chin-Yuan Chiang, Yi-Han Chen:
Parallelism of Evolutionary Design of Image Filters for Evolvable Hardware Using GPU. 592-597
Signal Processing for Social Welfare
- Yujie Li, Huimin Lu, Lifeng Zhang, Seiichi Serikawa:
Cross Depth Image Filter-Based Natural Image Matting. 601-604 - Shenglin Mu, Kanya Tanaka, Shota Nakashima, Alrijadjis:
Intelligent Control of Ultrasonic Motor Using PSO Type Neural Network. 605-610 - Huimin Lu, Yujie Li, Shota Nakashima, Shiyuan Yang, Lifeng Zhang:
Multiframe Medical Images Enhancement on Dual Tree Complex Wavelet Transform Domain. 611-614 - Kohei Miyata, Shiyuan Yang, Seiichi Serikawa, Shota Nakashima:
Proposal of Flexible Touch Panel Sensor. 615-620 - Yuhki Kitazono, Naoya Mizota, Shota Nakashima:
Proposal of System for Monitoring Environment Using Smartphone. 621-626
Emerging Knowledge from Wireless, Networked Sensing Systems
- John Kemp, Elena I. Gaura, Ramona Rednic, James Brusey:
Long-Term Behavioural Change Detection through Pervasive Sensing. 629-634 - Ramona Rednic, Elena I. Gaura, John Kemp, James Brusey:
Fielded Autonomous Posture Classification Systems: Design and Realistic Evaluation. 635-640 - Michael Allen, Ami Preis, Mudasser Iqbal, Andrew Whittle:
Water Distribution System Monitoring and Decision Support Using a Wireless Sensor Network. 641-646
Visual and Multimedia Computing
- Yuan Sun, Hongbo Lu, Zhimin Zhang:
RvGIST: A Holistic Road Feature for Real-Time Road-Scene Understanding. 649-655
Web-Based Applications
- Donghwoon Kwon, Jun Cui, Young-Jik Kwon, Chang-Hai Jin:
A Study on Comparison on the Technical Factors of Korea and China Shopping Mall Website. 659-662 - Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani:
A Fast Synchronization Mechanism for Collaborative Web Applications Based on HTML5. 663-668 - Shota Imai, Hiroyuki Sano, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani:
On a Synchronizing Module for Extended Web Displaying System Based on Multiple Tablet Devices. 669-674 - Yucong Duan, Ajay Kattepur, Hui Zhou, Ying Chang, Mengxing Huang, Wencai Du:
Service Value Broker Patterns: An Empirical Collection. 675-682 - Amir Maddah, Manolya Kavakli:
System Architecture and Feature Design for Engineering a Web-Based Travel Advisor System: FanOnTour. 683-688
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.