default search action
RACS 2015: Prague, Czech Republic
- Esmaeil S. Nadimi, Tomás Cerný, Sung-Ryul Kim, Wei Wang:
Proceedings of the 2015 Conference on research in adaptive and convergent systems, RACS 2015, Prague, Czech Republic, October 9-12, 2015. ACM 2015, ISBN 978-1-4503-3738-0
Artificial intelligence & algorithms
- Swapnajit Chakraborti, Shubhamoy Dey:
Product news summarization for competitor intelligence using topic identification and artificial bee colony optimization. 1-6 - Anis Yazidi, Hugo Hammer:
Quantile estimation using the theory of stochastic learning. 7-14 - Viet-Hoang Le, Sung-Ryul Kim:
K-strings algorithm, a new approach based on Kmeans. 15-20 - Phuoc-Hoang-Tuong-Lan Do, Sung-Ryul Kim:
A new approach to the edit distance with block swaps using DAWG. 21-26 - Shuichi Yasumura, Lei Li:
A fast iterative algorithm for the large-scale toeplitz linear systems. 27-31 - Jürgen Herp, Mohammad H. Ramezani:
State transition of wind turbines based on empirical inference on model residuals. 32-37 - Mohammad Khosravi, Hossein Khodadadi, Amir G. Aghdam, Hassan Rivaz:
Maximum reward collection problem: a cooperative receding horizon approach for dynamic clustering. 38-43 - Mohammad Noshad, Jie Ding, Vahid Tarokh:
Sequential learning of multi-state autoregressive time series. 44-51
Short papers (posters)
- Harry Zhou:
An intelligent decision support system for stock analysis and evaluation. 52-55
Database & data mining
- Yongjun Zhu, Erjia Yan, Il-Yeol Song:
Topological analysis of interdisciplinary scientific journals: which journals will be the next nature or science? 56-61 - Beomseok Hong, Youngsub Han, Yanggon Kim:
A semi-supervised tweet classification method using news articles. 62-67 - Hyeoncheol Lee, Beomseok Hong, Kwangmi Ko Kim:
Documents topic classification model in social networks using classifiers voting system. 68-73 - Youngsub Han, Hyeoncheol Lee, Yanggon Kim:
A real-time knowledge extracting system from social big data using distributed architecture. 74-79 - Han-Sheng Huang, Shih-Hao Hung, Chih Wei Yeh:
Load balancing for hybrid NoSQL database management systems. 80-85 - Hyun-Kyo Oh, Taehee Lee, Sang-Wook Kim:
Finding underlying factors for reciprocal trust formation. 86-91 - Eunji Lee, Jaeuk Lee, Pankoo Kim:
Design of inference rules for plant growth based on ontology. 92-95 - Vinay Avasthi, Shubhamoy Dey, Kamal Kishore Jain, Rajhans Mishra:
The evolution of knowledge in communities of practice. 96-101 - Frantisek Malinka:
Prediction of protein stability changes upon one-point mutations using machine learning. 102-107 - Khadija Ali Vakeel, Shubhamoy Dey:
Improving tweet clustering using bigrams formed from word associations. 108-113 - Yesol Kim, Jonghyuk Park, Seong-je Cho, Yunmook Nah, Sangchul Han, Minkyu Park:
Machine learning-based software classification scheme for efficient program similarity analysis. 114-118
Short papers (posters)
- Chang Choi, Xuefeng Piao, Junho Choi, Mungyu Lee, Pankoo Kim:
Malicious behavior pattern mining using control flow graph. 119-122 - Juw Won Park, Julia Chariker, Yi Xing:
Strand specific RNA-seq data for higher specificity. 123-124
Image processing & computer vision
- Jatin Wadhwa, Talib Ahemad, Ruchira Naskar, Rahul Dixit:
On parameterization of block based copy-move forgery detection techniques. 125-130 - Minsung Kang, Young-Chul Lim:
Fast stereo-based pedestrian detection using hypotheses. 131-135 - Mi-Young Cho, Young-Sook Jeong, Byung-Tae Chun:
Similarity between real faces and facial videos from a display device: a face recognition perspective. 136-140 - Zhenhai Wang, Bo Xu, FuHai Huang:
Real-time multiple object tracking in particle filtering framework using codebook model and adaptive labeling. 141-145 - Zhenhai Wang, Xiaoyu Jiang, Bo Xu, Kicheon Hong:
An online multi-object tracking approach by adaptive labeling and kalman filter. 146-151 - Huu-Noi Doan, Beomsu Kim, Min-Cheol Hong:
A spatial-temporal hole filling approach with background modeling and texture synthesis for 3D video. 152-157 - Jinju Lim, Beomsu Kim, Min-Cheol Hong:
Video stabilization based on the detection and alpha-trimmed means smoothing filtering of undesirable motion. 158-163 - Austin Hanson, George Hamer, Sung Y. Shin:
Hybrid model for object orientation classification. 164-171 - Chulwoo Pack, Sung Y. Shin, Seong-Ho Son, Soon-Ik Jeon:
Computer aided breast cancer diagnosis system with fuzzy multiple-parameter support vector machine. 172-176 - G. C. Sailesh, Ravi Kasaudhan, Tae K. Heo, Hyung Do Choi:
Variability measurement for breast cancer classification of mammographic masses. 177-182 - Ravi Kasaudhan, Tae K. Heo, Soon-Ik Jeon, Seong-Ho Son:
Similarity measurement with mesh distance fourier transform in 2D binary image. 183-187 - G. C. Sailesh, Chulwoo Pack, Sung Y. Shin, Hyung Do Choi:
Breast cancer classification of mammographic masses using improved shape features. 188-194 - Young-Chul Lim, Minsung Kang:
Pyramidal channel features for pedestrian detector. 195-199 - Sunmin Lee, Yong Cheol Kim:
Two-step clustering of SIFT keypoints and relaxation based matching of clusters. 200-204 - Jinsuk Yang, Haoxu Zheng, Kyoungsu Oh:
Hybrid image using image morphing. 205-209 - Enmin Song, Ning Pan, Chih-Cheng Hung, Xiang Li, Lianghai Jin:
Reflection invariant local binary patterns for image texture classification. 210-215
Network computing
- Hsueh-Wen Tseng, Ruei-Yu Wu, Yi-Zhang Wu, Shih-Chun Chou:
An efficient cross-layer reliable retransmission scheme for the human body shadowing in IEEE 802.15.6-based wireless body sensor networks. 216-222 - Esmaeil S. Nadimi, Jürgen Herp, Mohammad H. Ramezani:
Semi-definite programming-based localization algorithm in networks with inhomogeneous transmission medium. 223-226 - Wei Wang, Shivangi Pyasi, Kazem Sohraby, James Dudek:
Unified quantization parameter and frame size control for quality of experience optimization in wireless multimedia communications. 227-230 - Min-Jae Kang, Semi Jeong, Dong Kun Noh:
Energy-aware selective compression scheme for solar energy based wireless sensor networks. 231-236 - Mohammad H. Ramezani, Victoria Blanes-Vidal, Esmaeil S. Nadimi:
Adaptive intra-body channel modeling of attenuation coefficient using transmission line theory. 237-241 - Minkailu Mohamed Jalloh, Shitong Zhu, Fang Fang, Jun Huang:
On selecting composite network-cloud services: a quality-of-service based approach. 242-246
Short papers (posters)
- Bongjae Kim, Hyedong Jung:
A case study of data transfer efficiency optimization for GPU- and infiniband-based clusters. 247-250 - Deqian Fu, Zifen Yang, Lihua Han, Seong Tae Jhang:
An algorithm on constructing routing-based multiple CDSs to prolong lifetime of WSN. 251-255 - Safdar Hussain Bouk, Muhammad Azfar Yaqub, Syed Hassan Ahmed, Dongkyun Kim:
Evaluating interest/data propagation in vehicular named data networks. 256-259 - Eunkyeung Jae, Chang Kim:
An indoor positioning method using a combination of the triangulation and fingerprinting techniques. 260-261
Security
- Xinkai Li, Chao Lu:
Proactive self-defense algorithm for large matrix calculation using multiple P-adic data type. 262-267 - Yevgeniy Cole, Hanlin Zhang, Linqiang Ge, Sixiao Wei, Wei Yu, Chao Lu, Genshe Chen, Dan Shen, Erik Blasch, Khanh D. Pham:
ScanMe mobile: a local and cloud hybrid service for analyzing APKs. 268-273 - Byeongho Kang, Jisu Yang, Jaehyun So, Czang Yeob Kim:
Detecting trigger-based behaviors in botnet malware. 274-279 - Michal Trnka, Tomás Cerný:
Context-aware Role-based Access Control Using Security Levels. 280-284 - Jeonghyeok Park, Daeyeon Son, Dongwoo Kang, Jongmoo Choi, Gwangil Jeon:
Software similarity analysis based on dynamic stack usage patterns. 285-290 - BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in malware categorization. 291-295 - Ondrej Pluskal:
Behavioural malware detection using efficient SVM implementation. 296-301 - Yung-Feng Lu, Chin-Fu Kuo, Shih-Chun Chou, Rong-Sheng Wang:
A secure and efficient multicast protocol for enterprise collaboration systems. 302-307 - In Kyeom Cho, Eul Gyu Im:
Extracting representative API patterns of malware families using multiple sequence alignments. 308-313 - Junhyoung Kim, TaeGuen Kim, Eul Gyu Im:
Structural information based malicious app similarity calculation and clustering. 314-318
Short papers (poster)
- Ajay Kumar Jha, Seungmin Lee, Woo Jin Lee:
Permission-based security in android application: from policy expert to end user. 319-320 - Cristobal Gallegos, Dongwan Shin:
A novel device for secure home E-voting. 321-323
Software engineering
- Karel Cemus, Tomás Cerný, Michael J. Donahoo:
Evaluation of approaches to business rules maintenance in enterprise information systems. 324-329 - Karel Cemus, Tomás Cerný, Lubos Matl, Michael J. Donahoo:
Enterprise information systems: comparison of aspect-driven and MVC-like Approaches. 330-336 - Fumiko Nagoya, Shaoying Liu:
Development of a web-based conference management system using SOFL. 337-342 - Gustav Sourek, Petr Posik:
Visual data-flow framework of evolutionary computation. 343-348 - Nesrine Mezhoudi, Iyad Khaddam, Jean Vanderdonckt:
WiSel: a mixed initiative approach for widget selection. 349-356 - Harald Sporer:
A model-based domain-specific language approach for the automotive E/E-System design. 357-362 - Martin Tomásek, Tomás Cerný:
On web services UI in user interface generation in standalone applications. 363-368 - Miroslav Macik, Eva Lorencova, Zdenek Míkovec, Ondrej Rakusan:
Software architecture for a distributed in-hospital navigation system. 369-375 - Clauirton A. Siebra, Michael A. B. Mello:
The importance of replications in software engineering: a case study in defect prediction. 376-381
Short papers (posters)
- Sung Kwan Kang, Joonseub Cha, Sukyung Ban:
Strategy on designing an on-demand training course for university SW education. 382-383
System software
- Shi-Wu Lo, Hong-Yi Lin, Zhengyuan Chen, Yi-Chung Chiang, Tzu-Chieh Shen:
Improving response time after resuming by reorganizing swap space. 384-388 - Chin-Fu Kuo, Yung-Feng Lu, Shih-Chun Chou:
Adjustable deadline assignment for end-to-end tasks. 389-394 - Bongjae Kim, Hyedong Jung:
LW-RDMA: design and implementation of a lightweight RDMA API for InfiniBand-based clusters. 395-399 - Chin-Hsien Wu, Kuo-Yi Chao:
FAWB: a file-aware write buffer management method for NAND flash memory. 400-405 - Shuichi Oikawa:
MSX: memory storage extension for linux 4.0 and beyond. 406-411 - Kuan-Wen Lin, Ya-Shu Chen:
Online thermal-aware task placement in three-dimensional field-programmable gate arrays. 412-417 - Jen-Jung Cheng, Shih-Hao Hung, Chih Wei Yeh:
Rapid analysis of interprocessor communications on heterogeneous system architectures via parallel cache emulation. 418-423 - Min-Kyu Kim, Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:
Bypassing method for STT-RAM based inclusive last-level cache. 424-429 - Yi-Jung Chen, Chia-Lin Yang, Ping-Sheng Lin, Yi-Chang Lu:
Thermal/performance characterization of CMPs with 3D-stacked DRAMs under synergistic voltage-frequency control of cores and DRAMs. 430-436 - Gaku Nakagawa, Shuichi Oikawa:
Multi-level queue NVM/DRAM hybrid memory management with language runtime support. 437-442 - Chi-Sheng Shih, Guan-Fan Wu:
Distributed meta-routing over heterogeneous networks for M2M/IoT systems. 443-450 - Che-Wei Tsao, Chun-Yi Liu, Chien-Chung Ho, Tse-Yuan Wang, Po-Chun Huang, Yuan-Hao Chang, Tei-Wei Kuo:
Rethinking I/O request management over eMMC-based solid-state drives. 451-456
Short papers (posters)
- Jae-Hoon An, Younghwan Kim, Kiman Jeon:
Design and implement of pre-loading SSD cache data using split file on Hadoop MapReduce. 457-460 - Georg Macher, Rene Obendrauf, Eric Armengaud, Christian Kreiner:
Automated generation of basic software configuration of embedded systems. 461-464 - Daeho Kim, Eunseok Choi, Jiman Hong:
System information-based Hadoop load balancing for heterogeneous clusters. 465-467 - Donghee Min, Kiwook Kang, John Kim:
Delay-constrained scheduling for providing guaranteed QoS in a virtual machine environment. 468-469 - Kisu Kim, Taegyu Hwang, Daeshin Park:
Synchronization framework for collecting multimodal bio-sensor data in real-time. 470-471 - Kiwook Kang, Jiman Hong:
A framework for computer interface using EEG and EMG. 472-473 - Taegyu Hwang, Kisu Kim, Chris Sung:
LACS: latency-aware credit scheduler to improve responsiveness. 474-475 - Joonhyouk Jang, Jinman Jung, Yookun Cho:
Analysis of expected processing time for multiple memory backup servers. 476-478 - Jun Ha, Jisup Yoon, Jun Heo, Younghwan Han, Jinman Jung, Young-Sun Yun, Seongbae Eun:
A perspective on the IoT services through a multi-dimensional analysis. 479-481
Software testing
- Levente Erös, Gábor Kovács, Gusztáv Adamis, György Réthy:
Unsupervised test model reconstruction from conformance test logs. 482-488 - Azadeh Rafati, Sai Peck Lee, Reza Meimandi Parizi, Sima Zamani:
A test-to-code traceability method using .NET custom attributes. 489-496 - Alberto Marroquin, Douglas Gonzalez, Stephane Maag:
A novel distributed testing approach based on test cases dependencies for communication protocols. 497-504
Short papers (posters)
- Oyindamola Olajubu, Suraj Ajit, Mark Johnson, Scott J. Turner, Scott Thomson, Mark Edwards:
Automated test case generation from domain specific models of high-level requirements. 505-508 - Karel Frajták, Miroslav Bures, Ivan Jelínek:
Transformation of IFML schemas to automated tests. 509-511 - Miroslav Bures:
Framework for assessment of web application automated testability. 512-514
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.