default search action
15th SNPD 2014: Las Vegas, NV, USA
- 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5604-3
- Md. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, Takaaki Goto, Tetsuro Nishino, Narayan C. Debnath:
Software ontology design to support organized open source software development. 1-6 - Naruki Shirahama, Yuki Sakuragi, Satoshi Watanabe, Naofumi Nakaya, Yukio Mori, Kazunori Miyamoto:
Development of input assistance application for mobile devices for physically disabled. 1-6 - Toshinori Deguchi, Toshiki Takahashi, Naohiro Ishii:
On simplification of chaotic neural network on incremental learning. 1-4 - Naoshi Sakamoto:
An efficient structure for LKH key tree on secure multicast communications. 1-7 - Yoshiharu Ikutani, Hidetake Uwano:
Brain activity measurement during program comprehension with NIRS. 1-6 - Zhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang:
Survey of attribute based encryption. 1-6 - Shi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng:
Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices. 1-6 - Donghwoon Kwon, Robert J. Hammell:
Refinement/verification of early stage probabilistic software project schedules in the planning stage. 1-6 - Haeng-Kon Kim:
Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) requirements. 1-9 - Bertil Folliot:
VMKit: Improving design and performance of Managed Runtime Environments. 1 - Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, Shintaro Okabe, Kanya Tanaka, Yuhki Kitazono, Seiichi Serikawa:
Detection range fitting of slit type Obrid-Sensor. 1-6 - Yuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya:
Consideration of cross-validation in estimating objective scores of answer statements posted at Q&A sites. 1-6 - Jinyu Kai, Huaikou Miao, Honghao Gao:
A requirements description language pLSC for probabilistic branches and three-stage events. 1-6 - Yasong Zheng, Yuanchao Xu, Haibo Meng, Xiaochun Ye, Lingjun Fan, Futao Miao, Dongrui Fan:
Optimizing mapreduce with low memory requirements for shared-memory systems. 1-6 - Kazuki Fukushima, Naruki Shirahama:
Proposal of eye-gaze recognize method for input interface without infra-red ray equipment. 1-6 - Sidney C. Smith, Robert J. Hammell, Travis W. Parker, Lisa M. Marvel:
A theoretical exploration of the impact of packet loss on network intrusion detection. 1-6 - Cuauhtémoc López Martín, Arturo Chavoya, Maria Elena Meda-Campaña:
A machine learning technique for predicting the productivity of practitioners from individually developed software projects. 1-6 - Dapeng Liu, Shaochun Xu, Zengdi Cui:
Using client-side access partitioning for data clustering in big data applications. 1-5 - Sadiq M. Sait, Raed Al-Shaikh:
High performance and grid computing with quality of service control. 1-7 - Kazumasa Fukuda, Haruaki Tamada:
An obfuscation method to build a fake call flow graph by hooking method calls. 1-6 - Masateru Tsunoda, Kenichi Ono:
Pitfalls of analyzing a cross-company dataset of software maintenance and support. 1-6 - Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang:
Analysis and acceleration of NTRU lattice-based cryptographic system. 1-6 - Michiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi:
Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communication. 1-7 - Milad Dastan Zand, Mohammad Kalantari, Shahram Golzari:
Dynamic artificial immune system and its application to File Transfer Scheduling optimization. 1-6 - Kazuyoshi Ichihashi, Hideki Ichihashi:
Multisensory images evoked by olfactory stimuli: Crossmodal correspondences in human information processing. 1-6 - Satoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura:
A proposal of cloud-based home network system for multi-vendor services. 1-6 - Wafa Tebourski, Wahiba Ben Abdessalem Karaa, Henda Ben Ghézala:
New data warehouse designing approach based on principal component analysis. 1-6 - Mohammad Charaf Eddin, Zoubir Mammeri:
Non-functional properties aware configuration selection in component-based systems. 1-7 - Tarek Behi, Najet Arous, Noureddine Ellouze:
Hierarchical speech recognition system using MFCC feature extraction and dynamic spiking RSOM. 1-6 - Angelo Martella, Roberto Paiano, Andrea Pandurino:
A dialogue-based framework for the user experience reengineering of a legacy application. 1-6 - Jahangir Dewan, Morshed U. Chowdhury:
A framework for mobile elearning (mLearning) with analytical decision model. 1-5 - Hiroyasu Horiuchi, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura:
Designing and implementing service framework for virtual agents in home network system. 1-6 - Mengxing Huang, Longfei Sun, Wencai Du:
Collaborative filtering recommendation algorithm based on item attributes. 1-6 - Masaya Yoshikawa, Hikaru Goto, Kensaku Asahi:
Error value driven fault analysis attack. 1-4 - Zhuang Heliang, Futoshi Sugimoto, Chieko Kato, Kensei Tsuchida:
An application of 3D spiral visualization to the Uchida-Kraepelin psychodiagnostic test. 1-6 - Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama:
Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effects. 1-6 - Yang Zheng, Lizhi Cai, Shidong Huang, Zhihong Wang:
VM scheduling strategies based on artificial intelligence in Cloud Testing. 1-7 - Takashi Kuremoto, Takuhiro Otani, Masanao Obayashi, Kunikazu Kobayashi, Shingo Mabu:
One dimensional ring type growing SOM with asymmetric neighborhood function and its application to a hand shape instruction learning system. 1-6 - Shunsuke Akai, Teruhisa Hochin, Hiroki Nomiya:
The analysis method focusing on peaks of darkness for the impression evaluation method by space. 1-6 - Hiroshi Kikuchi, Takaaki Goto, Mitsuo Wakatsuki, Tetsuro Nishino:
A source code plagiarism detecting method using alignment with abstract syntax tree elements. 1-6 - Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi:
Scalable bootstrap clustering for massive data. 1-6 - Dominic M. Mezzanotte Sr., Josh Dehlinger:
Developing and building a quality management system based on stakeholder behavior for enterprise architecture. 1-6 - Hassan Almari, Clive Boughton:
Questionnaire report on matter relating to software architecture evaluation. 1-6 - Motoi Iwashita, Takeshi Kurosawa, Akiya Inoue, Ken Nishimatsu:
An improvement of micro area selection technique for the diffusion of ICT infrastructure. 1-6 - Tahir Jameel, Mengxiang Lin, He Li, Xiaomei Hou:
Test image generation using segmental symbolic evaluation for unit testing. 1-6 - Ayaz H. Khan, Mayez A. Al-Mouhamed, Anas Almousa, Allam Fatayar, A. R. Ibrahim, A. J. Siddiqui:
AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performance. 1-6 - Shenglin Mu, Shota Nakashima, Kanya Tanaka:
Applications of ultrasonic sensors and obrid-sensor in safety confirmation system for elders. 1-6 - Carl Lee, Chin-I Cheng, Aklilu Zeleke:
Can text mining technique be used as an alternative tool for qualitative research in education? 1-6 - Kun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang:
Unbinds data and tasks to improving the Hadoop performance. 1-6 - Simon Xu:
Novice and expert, how are they programming differently? 1 - Eya Ben Ahmed, Wafa Tebourski, Wahiba Ben Abdessalem Karaa, Faïez Gargouri:
ONTOSSN: Scientific social network ontology. 1-4 - Tofig Hasanov, Motoyuki Ozeki, Natsuki Oka:
Microcredit risk assessment using crowdsourcing and social networks. 1-5 - Xinxin Li, Hongwei Zeng:
Modeling web application for cross-browser compatibility testing. 1-5 - Soumya Saha, Lifford McLauchlan:
An energy balanced topology construction protocol for Wireless Sensor Networks. 1-6 - Georgios Kalantzis, Yu Lei:
A self-tuned bat algorithm for optimization in radiation therapy treatment planning. 1-6 - Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia:
Training of intelligent intrusion detection system using neuro fuzzy. 1-6 - Xiaofeng Cui, Richard F. Paige:
Strategy-guided requirements development and validation. 1-6 - Ayaz H. Khan, Mayez A. Al-Mouhamed, Allam Fatayar, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony:
Padding free bank conflict resolution for CUDA-based matrix transpose algorithm. 1-6 - Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Kazunori Iwata:
Generation of reducts based on nearest neighbor relation. 1-6 - Junfeng Qu, Yong Wei, Yinglei Song:
Design patterns applied for networked first person shooting game programming. 1-6 - Jun Lin, Han Yu, Zhiqi Shen, Chunyan Miao:
Using goal net to model user stories in agile software development. 1-6 - Yuhki Takahashi, Yuhki Kitazono, Shota Nakashima:
Development of Leaving-bed Detection System to Prevent Midnight Prowl. 1-6 - Hongbo Lu, Haibo Meng, Kun Du, Yuan Sun, Yuanchao Xu, Zhimin Zhang:
Post processing for dense stereo matching by iterative local plane fitting. 1-6 - Taiyou Kikuchi, Shinji Koka, Koichi Anada, Youzou Miyadera, Takeo Yaku:
A data structure for triangular dissection of multi-resolution images. 1-7 - Mohammad Fal Sadikin, Marcel Kyas:
Security and privacy protocol for emerging smart RFID applications. 1-7 - Hiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura:
A rule-based framework for managing context-aware services based on heterogeneous and distributed Web services. 1-6 - Charles A. Fowler, Robert J. Hammell:
Converting PCAPs into Weka mineable data. 1-6 - Hao Qian, Daniel Andresen:
Jade: An efficient energy-aware computation offloading system with heterogeneous network interface bonding for ad-hoc networked mobile devices. 1-8 - Shigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification in life log service. 1-6 - Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri:
New approach on PCA-based 3D face recognition and authentication. 1-5 - Limin Sha:
Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. 1-4 - Jieming Yang, Zhiying Liu, Zhaoyang Qu, Jing Wang:
Feature selection method based on crossed centroid for text categorization. 1-5 - Pan Liu:
An efficient reduction approach to test suite. 1-5 - Teruhisa Hochin, Hiroki Nomiya:
Considerations on pauses and fundamental movements for transmitting traditional skills. 1-6 - Nachai Limsettho, Hideaki Hata, Ken-ichi Matsumoto:
Comparing hierarchical dirichlet process with latent dirichlet allocation in bug report multiclass classification. 1-6 - Chia-Chu Chiang:
Software development concerns in the building of service-oriented based enterprise systems. 1-5 - Xiaolin Wang, Hongwei Zeng:
Dynamic test case prioritization based on multi-objective. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.