default search action
16th SNPD 2015: Takamatsu, Japan
- 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015, Takamatsu, Japan, June 1-3, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8676-7
Keynote
- Teruhisa Hochin:
Dissimilarity and retrieval of time-varying data towards big data analysis. 1 - Yeong-Tae Song:
Empowering patient through personal healthcare system using interoperable electronic health record. 3
Algorithms
- Tanvir Atahary, Tarek M. Taha, Fredrick Webber, Scott Douglass:
Knowledge mining for cognitive agents through path based forward checking. 5-12 - Jiaan Zhou, Huaikou Miao, Jinyu Kai, Kun Zhao, Honghao Gao:
Survivability prediction of web system based on log statistics. 13-18 - Yaroslav Shepilov, Daria Pavlova, Daria Kazanskaia, Valerii Novikov:
Multithreading MAS for real time scheduling. 19-24 - Ayaz ul Hassan Khan, Mayez Al-Mouhamed, Allam Fatayer:
Optimizing strassen matrix multiply on GPUs. 25-30 - Ayaz ul Hassan Khan, Mayez Al-Mouhamed, Lutfi A. Firdaus:
Evaluation of global synchronization for iterative algebra algorithms on many-core. 31-36 - Sadegh Mohammadi, Charles Shang, Zoubir Ouhib, Theodora Leventouri, Georgios Kalantzis:
A computational study on different penalty approaches for constrained optimization in radiation therapy treatment planning with a simulated annealing algorithm. 37-42 - E. Ravindran Vimina, K. Ramakrishnan, Navya Nandakumar, K. Poulose Jacob:
An efficient multi query system for content based image retrieval using query replacement. 43-47 - Jinlong Xu, Huihui Sun, Rongcai Zhao:
SIMD vectorization of nested loop based on strip mining. 49-55 - Xiu Li, Jin Yu, Zhuo Jia, Huimin Wang:
Application of improved core vector machine in the prediction of algal blooms in Tolo Harbour. 57-62
Artificial Intelligence
- Jieming Yang, Jing Wang, Zhiying Liu, Zhaoyang Qu:
A term weighting scheme based on the measure of relevance and distinction for text categorization. 63-68 - Jung-Ying Wang:
A variety weapons and armors design algorithm for role-playing games. 69-73 - Lobna Bouchaala, Saoussen Ben Khedher, Hela Mezghanni, Nabil Zouari, Slim Tounsi:
Bayesian network and response surface methodology for prediction and improvement of bacterial metabolite production. 75-80 - Om Prakash Patel, Aruna Tiwari:
Advance quantum based binary neural network learning algorithm. 81-86 - Naila Belhadj Aissa, Mohamed Guerroumi:
A genetic clustering technique for Anomaly-based Intrusion Detection Systems. 87-92 - Mark Edmonds, Tanvir Atahary, Tarek M. Taha, Scott A. Douglass:
High performance declarative memory systems through MapReduce. 93-100 - Ruhul Amin Dicken, S. A. M. Fazle Rubby, Sheefta Naz, A. M. Arefin Khaled, Shuvo Ashish Rahman, Sharmina Rahman, Rashedur M. Rahman:
Analysis and classification of respiratory health risks with respect to air pollution levels. 101-106 - A. T. M. Shakil Ahamed, Navid Tanzeem Mahmood, Md. Nazmul Hossain, Mohammad Tanzir Kabir, Kallal Das, Faridur Rahman, Rashedur M. Rahman:
Applying data mining techniques to predict annual yield of major crops and recommend planting different crops in different districts in Bangladesh. 107-112
Audio and Video Technology
- Wei-Cheng Wang, Ru-Yun Hsu, Chun-Rong Huang, Li-You Syu:
Video gender recognition using temporal coherent face descriptor. 113-118
Component-Based Software Engineering
- Muhammad Ilyas Azeem, Siffat Ullah Khan:
Software integration in global software development: Success factors for GSD vendors. 119-124
Communication Systems and Networks
- Roslina Mohamad, Harlisya Harun, Makhfudzah Mokhtar, Wan Azizun Wan Adnan, Kaharudin Dimyati:
On the robustness of measurement of reliability stopping criterion in turbo iterative decoding. 125-129 - Nuzli Mohamad Anas, Faiz Kamil Hashim, Hafizal Mohamad, Mohd Hafiz Baharudin, Mohd Pazli Sulong:
Performance analysis of outdoor wireless mesh network using B.A.T.M.A.N. advanced. 131-134 - Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy, Monika Jesmin:
Secure object tracking protocol for Networked RFID Systems. 135-141 - Jiadong Wu, Bo Hong:
Multicast-based replication for Hadoop HDFS. 143-148 - Satoshi Fujita:
Load balancing of P2P MMORPG systems with hierarchical area-of-interest management. 149-154 - M. Arif Khan, Md. Rafiqul Islam, Morshed U. Chowdhury:
A novel approach to maximize the sum-rate for MIMO broadcast channels. 155-159 - Sabih ur Rehman, M. Arif Khan, Tanveer A. Zia, Muhammad Jafer:
Quality of service based cross layer routing protocol for VANETs. 161-166
Cryptography and Network Security
- Yusuke Nozaki, Toshiya Asai, Kensaku Asahi, Masaya Yoshikawa:
Power analysis for clock fluctuation LSI. 167-170 - Limin Sha:
Improvement of an ID-based proxy signature scheme without trusted PKG. 171-174 - Spencer Davis, Brandon Jones, Hai Jiang:
Portable parallelized blowfish via RenderScript. 175-180 - Yan-yan Lai, Quan Qian:
HBase fine grained access control with extended permissions and inheritable roles. 181-185 - Muhammad Awais Shibli, Rahat Masood, Umme Habiba:
Realization of FGAC model using XACML policy specification. 187-192 - Rangsipan Marukatat, Siravich Khongrod:
An evaluation of writeprint matching method to identify the authors of Thai online messages. 193-197 - Ziping Zhao, Xirong Ma:
Active learning for the prediction of prosodic phrase boundaries in Chinese speech synthesis systems using conditional random fields. 199-203 - Adnan Shakoor, Qinke Peng, Shiquan Sun, Xiao Wang, Jia Lv:
GT-kernelPLS: Game theory based hybrid gene selection method for microarray data classification. 205-210 - Wenhao Zhu, Song Dai, Yang Song, Zhiguo Lu:
Extracting news content with visual unit of web pages. 211-215 - Rajendra Kumar Roul, Ashish Nanda, Viraj Patel, Sanjay Kumar Sahay:
Extreme learning machines in the field of text classification. 217-223 - Fahim Jawad, Tawsif Ur Rahman Choudhury, Ahmad Najeeb, Mohammed Faisal, Fariha Nusrat, Rubaiya Chamon Shamita, Rashedur M. Rahman:
Data mining techniques to analyze the reason for home birth in Bangladesh. 225-230 - Jordan Gumm, Andrew Barrett, Gongzhu Hu:
A machine learning strategy for predicting march madness winners. 231-236 - Abdel-Rahman Hedar, Mohamed Adel Omar, Adel A. Sewisy:
Rough sets attribute reduction using an accelerated genetic algorithm. 237-243 - Abdel-Rahman Hedar, Mohamed A. Omer, Ahmed F. Al-Sadek, Adel A. Sewisy:
Hybrid evolutionary algorithms for data classification in intrusion detection systems. 245-251 - Thanh Trung Nguyen, Tin Khac Vu, Minh Hieu Nguyen:
BFC: High-performance distributed big-file cloud storage based on key-value store. 253-258
Embedded Systems
- Vianney Vunabandi, Ryuji Matsunaga, Sandor Markon, Nsabiyumva Willy:
Flood sensing framework by Arduino and Wireless Sensor Network in Rural-Rwanda. 259-264
Image, Speech, and Signal Processing
- Darun Kesrarat, Vorapoj Patanavijit:
Bidirectional confidential with bilateral filter on local based optical flow for image reconstruction under noisy condition. 265-268 - Nasser Alqudami, Shin-Dug Kim:
Accelerating the pre-processing stages of JPEG encoder on a heterogenous system using OpenCL. 269-274
Internet Technology and Applications
- Montri Lawkobkit, Ravipa Larpsiri:
Perceived fairness on service recovery satisfaction and on positive behavioral intentions in cloud service. 275-281 - Akihiko Horiuchi, Keizo Saisho:
Development of scaling mechanism for distributed Web system. 283-288 - Yucong Duan, Yuan Cao, Xiaobing Sun:
Various "aaS" of everything as a service. 289-294 - Yeong-Tae Song, Sungchul Hong, Jinie Pak:
Empowering patients using cloud based personal health record system. 295-300 - Chunning Wang, Shaochun Xu, Lichao Chen, Jiayu Li:
The application of graph algorithms: A reference mapping tool. 301-306 - Ryo Miura, Toshiki Kinuhata, Shinji Ohara, Hiroyuki Tarumi, Toshihiro Hayashi, Junko Ichino:
Design and evaluation of database and API supporting Shogi learners on the Internet. 307-312
Mobile/Wireless/Ad-Hoc Networks
- Hao Qian, Daniel Andresen:
Reducing mobile device energy consumption with computation offloading. 313-320 - Tanapat Ruengsatra, Kulit Na Nakorn, Krerk Piromsopa, Kultida Rojviboonchai:
A hybrid communication approach for disaster recovery system. 321-326 - Kyung Tae Kim, Man Youn Kim, Jihyeon Choi, Hee Yong Youn:
An energy efficient and optimal randomized clustering for wireless sensor networks. 327-332 - Xianda Chen, Youngho Suh, Seung Wan Kim, Hee Yong Youn:
Reducing connection failure in mobility management for LTE HetNet using MCDM algorithm. 333-338 - Chen-Shu Wang, Shiang-Lin Lin:
An integrated optimization model for wireless access point deployment construction, and enhancement. 339-344
Neural Networks & Genetic Algorithms
- Ming Ke, Xiaoxin Duan, Fan Zhang, Xiaoping Yang:
Complex brain network of patients with epilespy using cascading failure analysis of fMRI data. 345-350
Operating Systems
- Korakit Seemakhupt, Krerk Piromsopa:
Dynamic user-level CPU allocation for volunteer computing in CFS-based scheduler environment. 351-355 - Gaku Nakagawa, Shuichi Oikawa:
NVM/DRAM hybrid memory management with language runtime support via MRW queue. 357-362 - Hirotaka Kawata, Shuichi Oikawa:
Experimental design of high performance non volatile main memory swapping using DRAM. 363-368
Parallel and Distributed Computing
- Lei Yu, Ge Fu, Yan Jin, Xiaojia Xiang, Huaiyuan Tan, Hong Zhang, Xinran Liu, Xiaobo Zhu:
MPDBS: A multi-level parallel database system based on B-Tree. 369-375 - Alireza Beikverdi, JooSeok Song:
Trend of centralization in Bitcoin's distributed network. 377-382 - Na Young Park, Byung Jun Lee, Kyung Tae Kim, Hee Yong Youn:
Cold data eviction using node congestion probability for HDFS based on Hybrid SSD. 383-388 - Hong Yao, Huifang Deng:
An Abelian group model of commutative data dependence relations for the iteration space slicing. 389-394 - Kwangho Cha, Sungho Kim:
A simulation study of heuristic node reordering for collective I/O. 395-401 - Pengyuan Li, Qinghua Zhang, Rongcai Zhao, Haining Yu:
Data layout transformation for structure vectorization on SIMD architectures. 403-409 - Mohammed Rashid Chowdhury, Mohammad Raihan Mahmud, Rashedur M. Rahman:
Study and performance analysis of various VM placement strategies. 411-416
Software Specification & Architecture
- JoonSeok Park, Youngmin An, Keynhyuk Yeom:
Virtual cloud bank: An architectural approach for intermediating cloud services. 417-422 - Gyeongmin Go, Sungwon Kang, Jongsun Ahn:
A software binding application tool based on the orthogonal variability description language for software product line development. 423-430 - Xiu Li, Zhuo Jia, Jin Yu, Zhixiong Yang:
A sewage outfall management system based on WebGIS: Design and implement. 431-435
Software Testing
- Tahir Jameel, Mengxiang Lin, Liu Chao:
Test oracles based on metamorphic relations for image processing applications. 437-442 - Liping Li, Honghao Gao:
Test suite reduction for mutation testing based on formal concept analysis. 443-447 - Yuma Namba, Shun Akimoto, Tomohiko Takagi:
Overview of graphical operational profiles for generating test cases of GUI software. 449-451 - Shun Akimoto, Rihito Yaegashi, Tomohiko Takagi:
Test case selection technique for regression testing using differential control flow graphs. 453-455 - Tomohiko Takagi, Takuya Arao:
Overview of a place/transition net-based mutation testing framework to obtain test cases effective for concurrent software. 457-459
User-Centered Design Methods
- Sokout Hamidullah, Ahmadi Abdul Rashid, Mohammad Hanif Gharanai, Samiullah Paracha:
Revitalizing the Afghan educational assessment paradigm through ICT. 461-466
Web-Based Applications
- Sajjad Rafique, Mamoona Humayun, Bushra Hamid, Ansar Abbas, Muhammad Akhtar, Kamil Iqbal:
Web application security vulnerabilities detection approaches: A systematic mapping study. 469-474 - Shoya Tanaka, Kazuaki Ando:
Web news ranking for elementary school children based on degree of SNS users' attention and popular search queries among children. 475-478
Other
- Yonjoong Ryou, Byung Jun Lee, Sang Hyun Yoo, Hee Yong Youn:
Considering block popularity in disk cache replacement for enhancing hit ratio with solid state drive. 479-484 - Sabah Al-Fedaghi, Mohamad Almutairy:
Toward conceptual representation of patterns. 485-492
Special Session 1: Analysis, Evaluation, and Usage of Web Information, System Behaviors, and Human Actions
- Xiao Shen, Haixia Long, Cuihua Ma:
Incorporating trust relationships in collaborative filtering recommender system. 493-500 - Thunyasit Pholprasit, Worasit Choochaiwattana, Chalermpol Saiprasert:
A comparison of driving behaviour prediction algorithm using multi-sensory data on a smartphone. 501-506 - Yuan Qiu, Tadashi Ohmori, Takahiko Shintani, Hideyuki Fujita:
A new algorithm for m-closest keywords query over spatial Web with grid partitioning. 507-514 - Teruhisa Hochin, Hiroki Nomiya:
Fields for efficient analysis of big data. 515-520 - Jiyi Li, Toshiyuki Shimizu, Masatoshi Yoshikawa:
Document similarity computation by combining multiple representation models. 521-526 - Yui Nonomura, Teruhisa Hochin, Hiroki Nomiya:
Effect of color of a character on its impression. 527-532 - Yuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya:
Method of introducing appropriate respondents to questions at question-and-answer sites. 533-538 - Yuki Akahane, Hiroki Kitaya, Ushio Inoue:
Design and evaluation of automated scoring Java programming assignments. 539-544 - Ryo Shimata, Yoshihiro Mitani, Tsumoru Ochiai:
A study of pupil detection and tracking by image processing techniques for a human eye-computer interaction system. 545-548
Special Session 2: Data Mining for Info-Communication Networks and Service Diffusion
- Motoi Iwashita, Shigeaki Tanimoto:
Service and billing management method of interactive communication services. 549-554 - Hiroyuki Aoki, Lina Zhang, Yasuhiko Morimoto, Shoichi Nakamura, Youzou Miyadera:
A method of safe and efficient editing in tabular forms using a descriptive grammar of semantic structures. 555-560 - Masafumi Sato, Koichi Anada, Masayoshi Tsutsumi:
A model for the connectedness of stones in the game of Go. 561-566 - Koushi Anzai, Takeo Yaku, Ken Yokota:
A formalization of financial statements with heterogeneous parts by graph grammars. 567-570 - Shigeaki Tanimoto, Toshihiko Moriya, Hiroyuki Sato, Atsushi Kanai:
Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment. 571-575 - Shigeaki Tanimoto, Kenichi Ohata, Shoichi Yoneda, Motoi Iwashita, Hiroyuki Sato, Yoshiaki Seki, Atsushi Kanai:
Risk assessment of social-media utilization in an enterprise. 577-580
Special Session 3: Experiences of Software Engineering
- Zhong Wei Xu, Yasuo Miyoshi:
Proposal of debate assistant system for improving the ability of externalization and response in conversation. 581-582 - Toshihiro Hayashi, Shimpei Nakagawa, Takuya Kishimoto, Yuji Hirai, Kazuhiro Ura, Rihito Yaegashi, Hiroshi Murai, Hiroyuki Tarumi:
Active S-quiz: An intelligent educational system for basic knowledge learning by question-posing. 583-586 - Hiroshi Murai, Kazuhiro Ura, Norifumi Suehiro, Rihito Yaegashi, Yoshiro Imai, Keizo Saisho, Toshihiro Hayashi:
A study of load-balancing strategy based on students' action on university cooperative e-Learning. 587-590 - Keima Kumano, Toshihiro Hayashi, Kazuhiro Uenosono, Ryosuke Takata, Hiroshi Murai, Rihito Yaegashi:
Development of the creating system for lecture contents by combining the lecture materials. 591-592 - Ryosuke Takata, Ryo Oooka, Toshihiro Hayashi, Keima Kumano, Hiroshi Murai, Rihito Yaegashi:
A system which manages lecture materials using meta data of lecture materials. 593-595
Special Session 4: Theory and Practice of Intellectual Software
- Min Yao, Min Zhao, Hui Xiao, Dongyue Wang:
Research on mid-long term load forecasting based on combination forecasting mode. 597-601
Special Session 5: Signal Processing for Social Welfare
- Elyes Zarrouk, Yassine Benayed, Faïez Gargouri:
Graphical models for the recognition of Arabic continuous speech based triphones modeling. 603-608
Special Session 6: Software Testing 1
- Weiwei Lin, Hongwei Zeng:
A chain algorithm for conformance testing based on UIO sequences. 611-616 - Sajjad Ali, Muhammad Abdul Basit Ur Rahim, Fahim Arif:
Formal verification of internal block diagram of SysML for modeling real-time system. 617-622 - Hisashi Fukutake, Liang Xu, Tomohiko Takagi, Ryota Watanabe, Rihito Yaegashi:
The method to create test suite based on operational profiles for combination test of status. 623-626
SERA 2015
- Nousseiba Guidoum, Meriem Bensouyad, Djamel-Eddine Saïdouni:
A new and fast variant of the strict strong coloring based graph distribution algorithm. 627-631 - Motoi Iwashita, Shigeaki Tanimoto:
A method for service and billing management using connection paths. 632-638 - Hany F. ElYamany, Amer H. AlKhairi:
IoT-academia architecture: A profound approach. 639-643 - Nesrine Khabou, Ismael Bouassida Rodriguez:
Analysis process for context aware applications in pervasive environments. 644-651 - Afef Ghabri, Monia Bellalouna:
Wireless sensor networks modeling as a probabilistic combinatorial optimization problem. 652-656 - Mohamed Garoui, Belhassen Mazigh, Abderrafiaa Koukam:
The EventB2PN Tool: From Event-B specification to Petri Nets through model transformation. 657-663 - Fareeha Choudhry, Usman Qamar, Madeeha Chaudhry:
Rule based inference engine to forecast the prevalence of congenital malformations in live births. 664-670 - Ali Idri, Ibtissam Abnane, Alain Abran:
Systematic mapping study of missing values techniques in software engineering data. 671-678 - Emna Kallel, Yassine Aoudni, Mohamed Abid:
Automatic C code manipulation and transformation to rapid embedded systems design. 679-683 - João M. Fernandes, Susana Prozil Rodrigues, Lino A. Costa:
Comparing AHP and ELECTRE I for prioritizing software requirements. 684-691 - Chahrazed Labba, Narjès Bellamine Ben Saoud, Julie Dugdale:
Towards a conceptual framework to support adaptative agent-based systems partitioning. 692-696 - Soumaya Sassi Mahfoudh, Walid Khaznaji, Monia Bellalouna:
A branch and bound algorithm for the probabilistic traveling salesman problem. 697-702
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.