default search action
17th SNPD 2016: Shanghai, China
- Yihai Chen:
17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2016, Shanghai, China, May 30 - June 1, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2239-7
Keynotes
- Naohiro Ishii:
Data computations for Applied Informatics. 1 - Tokuro Matsuo:
Social service innovations with information technologies. 3
Algorithms
- Hanlin Sun, Wei Jie, Christian Sauer, Sugang Ma, Gang Han, Wei Xing:
A self-organizing algorithm for community structure analysis in complex networks. 5-12 - Huazhen Xu, Zhen You, Jinyun Xue:
Automatic verification of non-recursive algorithm of Hanoi Tower by using Isabelle Theorem Prover. 13-18 - Fang Wang, Liang Deng, Dan Zhao, Sikun Li:
An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MIC. 19-26 - Yuhan Dong, Hui Wang, Lin Zhang, Kai Zhang:
An improved model for PM2.5 inference based on support vector machine. 27-31 - Cheng Feng, Bo Yang:
Projection search for approximate nearest neighbor. 33-38 - Yue Fan, Qinke Peng:
Inferring gene regulatory networks based on spline regression and Bayesian group lasso. 39-42 - Hiba Yahyaoui, Abdelkader Dekdouk, Saoussen Krichen:
A hybrid VNS based framework for biomass transportation. 43-48
Artificial Intelligence
- Ming Zhang, Chenrui Hu:
Ultra High Frequency Polynomial and Cosine Artificial Higher Order Neural Networks. 49-56 - Guorui Zhou, Guang Chen:
Hierarchical Latent Semantic Mapping for automated topic generation. 57-63 - Ying Liu, Wei Song, Lizhen Liu, Hanshi Wang:
Document representation based on semantic smoothed topic model. 65-69 - Haobin Shi, Xuesi Li, Weihao Liang, Ming'ai Dang, Huahui Chen, Shixiong Wang:
A novel fuzzy omni-directional gait planning algorithm for biped robot. 71-76 - Song Zheng, Xiaoqing Zheng, Chunlin Wang:
The optimization of beer recipe based on an improved ant colony optimization. 77-80 - Shunsuke Akai, Teruhisa Hochin, Hiroki Nomiya:
Characteristics of analysis methods for the Impression Evaluation Method by Space. 81-86 - Jian Wang, Jingqiu Gong:
Team negotiation based on solidarity behavior: A concession strategy in the team. 87-92 - Guolong Liu, Xiaofei Xu, Bailong Deng, Siding Chen, Li Li:
A hybrid method for bilingual text sentiment classification based on deep learning. 93-98 - Sai Hong, Wei Su, He Lin, Xianchao Lv:
Functional classification study for mathematical formulas retrieval. 99-104 - Jingfang Jiang, Ying Zeng, Li Tong, Chi Zhang, Bin Yan:
Single-trial ERP detecting for emotion recognition. 105-108 - Souheila Ben Guirat, Ibrahim Bounhas, Yahya Slimani:
A hybrid model for Arabic document indexing. 109-114 - Talele Kiran, Tuckley Kushal:
Facial expression classification using Support Vector Machine based on bidirectional Local Binary Pattern Histogram feature descriptor. 115-120
Software Engineering & System Design
- Yuchen Zhang, Chengcheng Wan, Bo Jin:
An empirical study on recovering requirement-to-code links. 121-126 - Hao Chong, Renwei Zhang, Zheng Qin:
Composite-based conflict resolution in merging versions of UML models. 127-132 - Marwa Hentati, Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
A fuzzy-logic system for the user interface usability measurement. 133-138 - Mohamed Garoui:
A formal model for safety evaluation of platooning system. 139-146
Communication Systems and Networks
- Fan-Zhen Kong, Nae Zheng, Guanyi Liu, Xiukun Ren:
Position orientating path reverse ray tracing algorithm based on cluster analysis. 147-153
Cryptography and Network Security
- Yanjie Zhao:
Network intrusion detection system model based on data mining. 155-160 - Haitao Dong, Jun Yang, Yiqiang Sheng:
Request distribution with pre-learning for distributed SSL reverse proxies. 161-167 - Ali Ahmad Malik, Hirra Anwar, Muhammad Awais Shibli:
Self-adaptive access control & delegation in cloud computing. 169-176
Data Mining and Machine Learning
- Yuhan Dong, Siyuan Qian, Jinxing Liu, Lin Zhang, Kai Zhang:
Optimal placement of charging stations for electric taxis in urban area with profit maximization. 177-182
Embedded Systems
- Seunghoon Yoo, Hyokyung Bahn:
An efficient page replacement algorithm for PCM-based mobile embedded systems. 183-188 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Yuto Lim:
Scheduling overload for real-time systems using SMT solver. 189-194
Image, Speech, and Signal Processing
- Jianguo Liu, Xuesong Li, Qin Qin, Hao Zhang:
Study of occlusion problem in stereo matching. 195-199 - Di Zang, Junqi Zhang, Dongdong Zhang, Maomao Bao, Jiujun Cheng, Keshuang Tang:
Traffic sign detection based on cascaded convolutional neural networks. 201-206 - Xiaoqing Jiang:
Sample reconstruction and secondary feature selection in noisy speech emotion recognition. 207-211 - Zhongguo Li, Lei Zeng, Ti Wang, Jian Chen, Bin Yan:
Image segmentation based on local Chan-Vese model optimized by max-flow algorithm. 213-218 - Nirmala Salam, Rekha P. Nair:
Improved accuracy of speaker verification system in noisy environment. 219-224 - Jiajun Chen, Meng-meng Han, Shu Yang, Yuchun Chang:
A fingertips detection method based on the combination of centroid and Harris corner algorithm. 225-230 - Feroz Mahmud Amil, Mostafijur Rahman, Shanto Rahman, Emon Kumar Dey, Mohammad Shoyaib:
Bilateral histogram equalization with pre-processing for contrast enhancement. 231-236 - Shaojun Zhang, Jianhua Pang, Hailong Chen, Sheng Zhang:
A layered tone-mapping operator based on contrast enhanced adaptive histogram equalization. 237-242
Internet Technology and Applications
- Ruonan Sun, Bin Zhang, Tingting Liu:
Ranking web service for high quality by applying improved Entropy-TOPSIS method. 249-254 - Muhammad Adeel, Nabeel ur Rehman:
Intelligent mailbox with centralized parallel processing. 255-259
Mobile/Wireless/Ad-Hoc Networks
- Changsheng Yin, Ruopeng Yang, Dongdong Wu, Wei Zhu:
Joint multi-channel assignment and routing in wireless mesh network. 261-265 - Qiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu:
Percolation thresholds on tree-based communities of wireless sensor networks. 267-273 - Hongyu Wang, Zhanhao Zhao, Jialiang Hu, Zhenxin Qu, Hao Feng:
Study on improvement of fingerprint matching algorithm in wireless LAN based indoor positioning system. 275-280 - M. Aziz ul Haq, M. Arif Khan, Md. Rafiqul Islam:
A novel compact antenna design for secure eHealth wireless applications. 281-286
Neural Networks & Genetic Algorithms
- Meng-meng Han, Jiajun Chen, Ling Li, Yuchun Chang:
Visual hand gesture recognition with convolution neural network. 287-291
Parallel and Distributed Computing
- Zhen Yang, Zhen Yu, Xiaohong Su, Peijun Ma:
RaceTracker: Effective and efficient detection of data races. 293-300 - Xiaoqing Wang, Xianlong Jin:
A distributed-memory parallel approach for the generation of multibillion element tetrahedral meshes. 301-306 - Mi Li, Jie Huang, Jingpeng Wang:
Accelerated diffusion-based recommendation algorithm on tripartite graphs with GPU clusters. 307-312 - Mi Li, Jie Huang, Jingpeng Wang:
Paralleled Fast Search and Find of Density Peaks clustering algorithm on GPUs with CUDA. 313-318 - Feng Qiu, Bin Zhang, Jun Guo:
A deep learning approach for VM workload prediction in the cloud. 319-324 - Xiaohui Pan:
A comparative evaluation of open-source graph processing platforms. 325-330 - Qingyu Yang, Zhengan Tan, Dou An, Wei Yu, Xinyu Yang:
On optimal electric vehicles penetration in a novel Archipelago microgrids. 331-336 - Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A novel microgrid based resilient Demand Response scheme in smart grid. 337-342 - Lin Shu, Jie Hao, Yafang Song, Chengcheng Li, Donglin Wang:
Optimal many-to-many personalized concurrent communication in RapidIO-based fat-trees. 343-350
Software Specification & Architecture
- Junfeng Qu, Yinglei Song, Yong Wei:
Design patterns applied for game design patterns. 351-356 - Xiaobing Sun, Xiangyue Liu, Bin Li, Yucong Duan, Hui Yang, Jiajun Hu:
Exploring topic models in software engineering data analysis: A survey. 357-362 - Xi Wang, Weikai Miao:
Automatic support for formal specification construction using pattern knowledge. 363-372 - Hongliang Liang, Daijie Zhang, Xiaodong Jia, Xiaoxiao Pei, Guangyuan Li:
Verifying RTuinOS using VCC: From approach to practice. 373-378 - Marwa Hachicha, Emna Dammak, Riadh Ben Halima, Ahmed Hadj Kacem:
A correct by construction approach for modeling and formalizing self-adaptive systems. 379-384
Software Testing
- Bin Zhang, Chao Feng, Bo Wu, Chaojing Tang:
Detecting integer overflow in Windows binary executables based on symbolic execution. 385-390 - Gang Li, Lei Yu, Huihui Sun:
A framework for test data generation of object-oriented programs based on complete testing chain. 391-397 - Xinglong Zhang, Lei Yu, Xuemei Hou:
A method of metamorphic relations constructing for object-oriented software testing. 399-406 - Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu:
MLSA: A static bugs analysis tool based on LLVM IR. 407-412 - Hongliang Liang, Qian Zhao, Yuying Wang, Haifeng Liu:
Understanding and detecting performance and security bugs in IOT OSes. 413-418 - Tingting Ma, Hongwei Zeng, Xiaolin Wang:
Test case prioritization based on requirement correlations. 419-424
Web-Based Applications
- Fagui Mao, Xuyang Cai, Beijun Shen, Yong Xia, Bo Jin:
Operational pattern based code generation for management information system: An industrial case study. 425-430 - Wenli Qi, Fangfang Liu:
Service matchmaking with closed world reasoning. 431-436
Computer Architecture
- Liu Tang, Zhangqin Huang:
Mechanistic relationship between instruction fetch width and basic block size to architectural vulnerability factor. 437-442 - Liu Tang, Zhangqin Huang:
A method for issue queue soft error vulnerability mitigation. 443-450
Natural Language Processing
- Nabil Khoufi, Chafik Aloulou, Lamia Hadrich Belguith:
Toward hybrid method for parsing Modern Standard Arabic. 451-456
Spatial Data Warehouse
- Saida Aissi, Mohamed Salah Gouider, Tarek Sboui, Lamjed Ben Said:
Enhancing spatial data warehouse exploitation: A SOLAP recommendation approach. 457-464
7th International Workshop on Intelligent Computational Science (ICS-2016)
- Letian Li, Lin Wu, Yongcun Gao:
Improved image matching method based on ORB. 465-468 - Di Zhang, Ligu Zhu, Zida Xiao, Lei Zhang:
Visual abstraction improvement of interactive dot map. 469-474 - Xuhui Chen, Ejaz Ul Haq, Jiawei Lin:
Design, modeling and tuning of modified PID controller for autopilot in MAVs. 475-480 - Ming Ke, Zhao Cao, Zhijing Li, Xuhui Chen:
The research of the brain default network using cascading algorithm. 481-486 - (Withdrawn) Adaptive Fuzzy PID speed control of DC belt conveyor system. 487-490
- Shunan Lan, Weiguo Lin:
Genetic algorithm optimization research based on simulated annealing. 491-494 - Jiyuan Li, Wenfeng Hu:
Development of puzzle game about children's etiquette based on Unity3D. 495-500 - Bo Wang, Xin Zhang:
Research and implementation of documented media asset management mode. 501-506 - Zhenzhong Li, Wenqian Shang, Yuqi Wang:
A novel multidimensional professionalism evaluation model. 507-510 - Min Wang, Yongbin Wang:
SLACM: Heterogeneous multilevel service aggregation access control model based situation logic. 511-516 - Sichao Liu, Yuan Liu:
Network security risk assessment method based on HMM and attack graph model. 517-522 - Hui Li, Xiaohua Shi, Kejun Li, HongYu Yu:
Development of electrostatic decay time intelligent test instrument and software design. 523-526 - Shaochun Xu, Lichao Chen, Chunning Wang, Oleksandr Rud:
A comparative study on black-box testing with open source applications. 527-532
Special Session 1: Software Quality and Testing
- Jiawen Lu, Lizhi Cai, Yang Zhang, Keyi Hong:
Complexity analysis and comparison of test paths based on DSE. 533-539 - Jiayu Gong, Lizhi Cai, Yuxin Shen:
Evaluating accuracy and performance of GPU-accelerated random walk computation on heterogeneous networks. 541-545 - Zhenzheng Qian, Chengcheng Wan, Yuting Chen:
Evaluating quality-in-use of FLOSS through analyzing user reviews. 547-552 - Jiwen Ding, Xiushuang Yi, Jun Guo:
Research and practice on the whole life cycle test process model. 553-556 - Jianxin Ge, Jiaomin Liu:
Software test cases recommendation system research based on collaborative filtering. 557-562 - Yaping Yang, Lizhi Cai, Yanguo Zhang:
Research on non-authorized privilege escalation detection of android applications. 563-568
Special Session 2: Secure and Scalable Computing in Clouds
- Mengbo Xie, Quan Qian:
Fuzzy set based data publishing for privacy preservation. 569-574 - Lifeng Li, Xiaowan Chen, Hai Jiang, Zhongwen Li, Kuan-Ching Li:
P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. 575-580 - Che-Lun Hung, Ren-You Yan, Hsiao-Hsi Wang:
Parallel image dehazing algorithm based on GPU using fuzzy system and hybird evolution algorithm. 581-583 - Shenquan Han, Zhou Lei, Wenfeng Shen, Shengbo Chen, Huiran Zhang, Tao Zhang, Baoyu Xu:
An approach to improving the performance of CUDA in virtual environment. 585-590
Special Session 3: Software Maintenance and Evolution
- Jianjun Shi, Weixing Ji, Lulu Zhang, Yujin Gao, Han Zhang, Duzheng Qing:
Profiling and analysis of object lazy allocation in Java programs. 591-596 - Chongyang Shi, Linjing Lai, Jing Fan, Yu Bai:
Similarity model based on CBR and FCA. 597-603 - Qiming Zhang, Qian Chen, Yunliang Tao:
Study on the evolution process of nuclear accident consequence assessment system. 605-611
Special Session 4: User Modeling and Personalized Service Recommendation in Social Networks
- Guobing Zou, Mei Zhao, Sen Niu, Yanglan Gan, Bofeng Zhang:
Computing uncertain skyline of Web services via interval number. 613-618 - Mengqi Guo, Qin Li, Wenfeng Shen, Guangren Qian, Huiran Zhang:
An accelerating approach for simulating texture sharp transition mechanism of pyrocarbon on Hexagonal-Mesh Surface. 619-623 - Chengwei Gu, Bofeng Zhang, Xinyue Wan, Mingqing Huang, Guobing Zou:
The modularity-based Hierarchical tree algorithm for multi-class classification. 625-629
Special Session 5: Image Processing Methods and Applications
- Satoshi Watanabe, Kazuki Murakami, Tomoya Furukawa, Qiangfu Zhao:
Steganalysis of JPEG image-based steganography with support vector machine. 631-636 - Rethabile Khutlang, Nontokozo P. Khanyile, Sisanda Makinana, Fulufhelo V. Nelwamondo:
High resolution feature extraction from optical coherence tomography acquired internal fingerprint. 637-641 - Sihai Yang, Duansheng Chen, Xian-Hua Han, Yen-Wei Chen:
A novel and fast connected component count algorithm based on graph theory. 643-647 - Kodai Miyajima, Gen Fujita:
Motion estimation method based on efficient memory bandwidth for HEVC real-time algorithm based on graph theoryncoding. 649-653 - Sikai Zhong, Sheng Chen:
An improved unsharp masking model for intensive care unit chest radiograph enhancement. 655-661 - Weiwei Du, Yi-Peng Liu, Shiyang Wang, Yahui Peng, Aytekin Oto:
Features extraction of prostate with graph spectral method for prostate cancer detection. 663-668
Special Session 6: Software Engineering for Cloud Computing
- Suna Yin, Dehua Chen, Jiajin Le:
STNoSQL: Creating NoSQL database on the SensibleThings platform. 669-674 - Nannan Liu, Xian Xu:
On higher-order communication of Erlang. 675-679 - Bing Meng, Weibin Guo, Guisheng Fan, Neng-wu Qian:
A novel approach for efficient accessing of small files in HDFS: TLB-MapFile. 681-686 - Xin Pei, Jiuchuan Lin, Bo Jin, Yongjian Wang:
Ensuring replication-based data integrity and availability in multicloud storage. 687-692 - Xiang Ji, Huiqun Yu, Guisheng Fan, Wenhao Fu:
Attack-defense trees based cyber security analysis for CPSs. 693-698
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.