default search action
4th ACIT / 3rd CSII / 1st BCD 2017: Hamamatsu, Japan
- Takaaki Goto, Simon Xu, Nam Nguyen, Weimin Li:
4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, Cloud Computing, Data Science & Engineering, ACIT-CSII-BCD 2016, Las Vegas, NV, USA, December 12-14, 2016. IEEE 2016, ISBN 978-1-5090-4871-7 - George Wencai Du:
Keynote: Big data in society and its application issues in business management and academia. xv - Liang Peng:
GScheduler: Reducing Mobile Device Energy Consumption. 1-6 - Bixin Li, Li Liao, Yi Cheng:
Evaluating Software Architecture Evolution Using Performance Simulation. 7-13 - Jongho Moon, Jiye Kim, Donghoon Lee, Dongho Won:
Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment. 14-19 - Eiman Aldahari:
Dynamic Voltage and Frequency Scaling Enhanced Task Scheduling Technologies toward Green Cloud Computing. 20-25 - Ruizhi Li, Honghao Gao, Danqi Chu, Kang Zhang, Huahu Xu:
Research on the Safety Accidents Prediction for Smart Laboratory Based on Statistical Analysis. 26-31 - Hideaki Ito, Kazuki Miyazato, Kensiro Ishikawa, Tsuyoshi Taki, Junichi Hasegawa, Kyoko Raita:
Analyzing Elements of Letters in a Letter Management System. 32-37 - Koushi Anzai, Takaaki Goto, Youzou Miyadera, Takeo Yaku, Ken Yokota:
An XML Representation of the Octgrid for the Rectangular Dissections. 38-42 - Priyanka Thota, Yoohwan Kim:
Implementation and Comparison of M2M Protocols for Internet of Things. 43-48 - Sabah Al-Fedaghi:
Logic Representation: Aristotelian Syllogism by Diagram. 49-54 - Kshitija Shinde, Yu Sun:
Template-Based Code Generation Framework for Data-Driven Software Development. 55-60 - Iain Lee, Yu Sun, Yuexin Li:
An Intelligent Approach to Review Filtering and Review Quality Improvement. 61-66 - Bassey Isong, Nosipho Dladlu, Bassey Ele:
Object-Oriented Code Metric-Based Refactoring Opportunities Identification Approaches: Analysis. 67-74 - Hiroshi Kawano, Seiichi Serikawa:
The Development of the Magnetic Measurement System of the Movement Method Using the Posture Information. 75-80 - Hayato Takahashi, Yuhki Kitazono:
Integration of Hand Gesture and Multi Touch Gesture with Glove Type Device. 81-86 - Takahiro Kizu, Masataka Inoue, Keiichi Yoshino, Koju Hiraki:
Development of Dragonfly-Like Flapping Robot. 87-92 - Ryo Takeuchi, Kouki Yamaguchi, Hayato Takahashi, Masahiko Hanada, Hiromichi Hanada, Kanya Mizuguchi, Seiichi Serikawa, Yuhki Kitazono:
Improvement of Full Automatic Fire Extinguish System for Residential Use. 93-98 - Kenshi Yoshimura, Teruhisa Hochin, Hiroki Nomiya:
Estimation of Rates Arriving at the Winning Hands in Multi-Player Games with Imperfect Information. 99-104 - Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya:
Evaluation of Parallel Multi-Dimensional Indexing System for Big Data Analysis. 105-110 - Yui Nonomura, Teruhisa Hochin, Hiroki Nomiya:
Coloring Methods of Characters for Presentation Slides. 111-116 - Yamato Takahashi, Teruhisa Hochin, Hiroki Nomiya:
Improvement of Mutual Retrieval of Visual and Audio Materials Based on Impression. 117-122 - Manami Tamai, Teruhisa Hochin, Hiroki Nomiya:
Effects of Seasons on Impression and Retrieval Requirement of Pictures. 123-128 - Teruhisa Hochin, Hiroki Nomiya, Hitoshi Iima, Morshed U. Chowdhury:
A Smart Framework towards Providing Benefits for One and All. 129-132 - Kazuma Kusu, Izuru Kume, Kenji Hatano:
A Trace Partitioning Approach for Memory Efficiency on a Trace Analysis Environment. 133-140 - Shin-ichi Sato:
gsl-dfs: A Lightweight Goal Selection Algorithm Based on a Goal Selection Criterion. 141-146 - Shin-ichi Sato:
GDM-CBDT: A Mathematical Model for Goal Decomposition Based on Case-Based Decision Theory. 147-151 - Jun Nakamura, Haruaki Tamada:
Fast Comparison of Software Birthmarks for Detecting the Theft with the Search Engine. 152-157 - Tomohiro Ichinose, Kyohei Uemura, Daiki Tanaka, Hideaki Hata, Hajimu Iida, Kenichi Matsumoto:
ROCAT on KATARIBE: Code Visualization for Communities. 158-163 - Aiko Yamamoto, Hidetake Uwano, Yoshiharu Ikutani:
Programmer's Electroencephalogram Who Found Implementation Strategy. 164-168 - Alexandre Boucher, Mourad Badri:
Using Software Metrics Thresholds to Predict Fault-Prone Classes in Object-Oriented Software. 169-176 - Richa Sharma, Nidhi Sharma, K. K. Biswas:
Machine Learning for Detecting Pronominal Anaphora Ambiguity in NL Requirements. 177-182 - Akira Inokuchi, Haruaki Tamada, Hideaki Hata, Masateru Tsunoda:
Toward Obliging Bots for Supporting Next Actions. 183-188 - George Anderson, Tallman Z. Nkgau:
Computer System Design Exploration Using Local Search and Genetic Algorithms. 189-195 - Yukasa Murakami, Masateru Tsunoda, Koji Toda:
An Empirical Evaluation of the Tobit Model on Software Defect Prediction. 196-201 - Yusuke Toba, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura, Tomohito Uchino:
Evaluating Multi-Modal Speech Visualization Application for Deaf and Hard of Hearing People. 202-207 - Liang Peng:
Enhanced Camera Capturing Using Object-Detection-Based Autofocus on Smartphones. 208-212 - Gaku Nakagawa, Shuichi Oikawa:
Behavior-Based Memory Resource Management for Container-Based Virtualization. 213-217 - Abhilash Kancharla, Jongyeop Kim, Noh-Jin Park, Nohpill Park:
Big Streaming Data Buffering Optimization. 218-223 - Tokuro Matsuo, Takanobu Otsuka, Tetsuya Oishi, Rieko Fujita, Takayuki Ito, Akihisa Sengoku, Shun Shiramatsu, Naoki Fukuta, Katsuhide Fujita, Hidekazu Iwamoto:
A Novel Model of Convention Management Research and Business Process. 224-229 - Yi Zheng, Pei He, Chi-Chang Chang, Yafen Liu:
Issues with Path Representation in Transition Systems. 230-234 - Ippei Torii, Kaoruko Ohtani, Naohiro Ishii:
Measurement of Ocular Movement Abnormality in Pursuit Eye Movement (PEM) of Autism Spectrum Children with Disability. 235-240 - Emi Aihara, Ippei Torii, Naohiro Ishii:
Development of Monitor System for Dry Eye Symptom. 241-246 - Shunsuke Kawatake, Ippei Torii, Naohiro Ishii:
Increasing Concentration with Neurofeedback. 247-252 - Takahito Niwa, Ippei Torii, Naohiro Ishii:
Development of Communication Tool for Physically Handicapped with Involuntary Movements by Line-of-Sight Detection. 253-258 - Takahito Niwa, Ippei Torii, Naohiro Ishii:
Development of Evacuation Guiding System for Earthquake Disaster. 259-264 - Kazunori Iwata, Toyoshiro Nakashima, Yoshiyuki Anan, Naohiro Ishii:
Effort Estimation for Embedded Software Development Projects by Combining Machine Learning with Classification. 265-270 - Toshinori Deguchi, Naohiro Ishii:
On Pattern Generating Methods for Incremental Learning by Chaotic Neural Network. 271-276 - Naohiro Ishii, Ippei Torii, Kazunori Iwata, Kazuya Odagiri, Toyoshiro Nakashima:
Characterization of Nearest Neighbor Relation Based on Boolean Reasoning and Convex Cones. 277-282 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:
Concept of the QOS Control Method Based on the Data Mining in the VDACS Scheme for the Common Use between Plural Organizations. 283-288 - Naohiro Ishii, Toshinori Deguchi, Masashi Kawaguchi, Hiroshi Sasaki:
Asymmetric Neural Networks with Gabor Filters. 289-294 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:
Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations. 295-300 - Shivashish Jaishy, Nobuhiro Ito, Yoshinobu Kawabe:
Problem Solving with Interactive-Theorem Proving - A Case Study. 301-306 - Yoshinobu Kawabe, Nobuhiro Ito:
On Computer-Assisted Verification of Timed Anonymity of Multi-Agent Systems. 307-312 - Masahiro Yamamoto, Nobuhiro Ito, Kazunori Iwata, Tsuyoshi Matsukawa, Yoshiyuki Kozuka:
A 3D Visualization Display System for the RoboCupRescue Simulation Competition. 313-318 - Shivashish Jaishy, Yoshiki Fukushige, Nobuhiro Ito, Kazunori Iwata, Yoshinobu Kawabe:
An Evaluation of BAR: Breakdown Agent Replacement Algorithm for SCRAM. 319-324 - Yuping Li, Cheng Tian:
Analysis of Influence of Ungated Residential Community on Traffic of Surrounding Roads. 325-328 - Xianhong Xu, Cheng Tian, Jinnuo Zhang:
Influence Effect of International Capital Flow on China's Economic Growth. 329-331 - Tong Wang:
Analysis of Reliability and Validity of Teaching Evaluation Index System. 332-336 - Di Liu, Wenqian Shang, Ligu Zhu, Dongyu Feng:
An Improved Dynamic Load-Balancing Model. 337-341 - Muzi Sun, Minyong Shi:
Contour Extraction and Vectorization Algorithm for Paper-Cut Pattern. 342-347 - Zejian Shi, Minyong Shi, Weiguo Lin:
The Implementation of Crawling News Page Based on Incremental Web Crawler. 348-351 - Chen Zhang, Jing Zhou, Weifeng Xie:
A Users Clustering Algorithm for Group Recommendation. 352-356 - Nan Yang, Sanxing Cao, Yu Liang, Zhengzheng Liu:
Recommendation Engine for Online Short Video. 357-362 - (Withdrawn) A Music Identification System Based on Audio Fingerprint. 363-367
- Xiaoshan Yang, Ligu Zhu, Qicong Zhang, Dongyu Feng:
Research on Evaluation Method of Big Data Storage Utilization. 368-372 - Lu Jiang, Xiaohong Wang, Ligu Zhu:
Research on a Visualization Interaction Method. 373-378 - Wenqian Shang, Songtao Shang, Shuchao Feng, Minyong Shi:
An Improved Video Recommendations Based on the Hyperlink-Graph Model. 379-383 - Yakir Wang, Minyong Shi, Chunfang Li, Weiguo Lin:
Art Exam Scores Analysis and Visualization. 384-388 - Chengcheng Wang, Ligu Zhu, Di Zhang:
Application of Fisheye View in Temporal Spiral Visualization. 389-393 - Zhiguo Hong, Minyong Shi, Yongbin Wang:
CTMC-Based Availability Analysis of Multiple Cluster Systems with Common Mode Failure. 394-396 - Zhiguo Hong, Yongbin Wang, Minyong Shi:
DTMC-Based Performance Evaluation of Animation Rendering Node. 397-399 - Yongchang Wang, Ligu Zhu:
Research on Collaborative Filtering Recommendation Algorithm Based on Mahout. 400-405 - Cheng Tian:
Mechanical Analysis of Basketball's Movement Trajectory after Its Shooting Action. 406-408 - Yuanyuan Zhang, Haihong Jiang, Cheng Tian:
Study on Blasting Effect on Tailings Pond. 409-412 - Jongyeop Kim, Noh-Jin Park, Nohpill Park:
A Study of Heuristically-Based Parametric Performance Improvement/Optimization Algorithms for BigData Computing. 413-418 - Xiu-Jin Shi, Sheng-Ping Hu:
Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud. 419-425 - Peipei Wang, Jiulei Jiang:
Research on Data Mining and Electronic Commerce Information Push Application Based on PMML. 426-430
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.