default search action
Journal of Computers, Volume 11
Volume 11, Number 1, January 2016
- Xuliang Song, Jiguang Liang, Chengcheng Hu:
Sentiment Classification: A Topic Sequence-Based Approach. 1-9 - Chei-Yol Kim, Sangmin Lee, Young-Kyun Kim, Dae-Wha Seo:
Adaptation of Distributed File System to VDI Storage by Client-Side Cache. 10-17 - Pratik S. Kabara, Vishal Kaushal, Akshay Divekar, Mohit Kamdar, Devvrat Ganeriwal:
A Particle Swarm Optimization Based Approach for Finding Similar Users on Facebook. 18-25 - Hyun-Il Lim:
Comparative Analysis of Technical Methods for Detecting Software Thefts. 26-32 - Agnieszka Wolk, Krzysztof Wolk, Krzysztof Marasek:
Enhancements in Statistical Spoken Language Translation by De-normalization of ASR Results. 33-40 - Chen-Lin Lee, Li-Chuan Chu, Kuo-Chung Huang:
Investigating the Integration of Cloud Computing in Medical Information Systems Using a Two-Stage Model. 41-51 - Rong Duan, Xiubin Zhao, Chunlei Pang, Ang Gong:
Rapid Ambiguity Resolution for Single Frequency GPS Kinematical Positioning Based on Left Null Space Theory. 52-61 - Dae-Young Choi:
Towards Location-Based Personalized Voice Web Search on Smartphones. 62-71 - Siyao Han, Yan Xu:
Link Prediction in Microblog Network Using Supervised Learning with Multiple Features. 72-82 - Chengcheng Hu, Xuliang Song:
Microblog Sentiment Analysis Based on Paragraph Vectors. 83-90
Volume 11, Number 2, March 2016
- Bangyu Ye:
A Set Intersection Algorithm Via x-Fast Trie. 91-98 - Lifeng Gao, Min Zhu, Mengying Li, Yu Cao, Weixue Zhang:
Efficient Extraction for Mobile Web Access Log with Caching Strategy. 99-108 - Iuon-Chang Lin, Yi-Lun Chi, Hung-Chieh Chuang, Min-Shiang Hwang:
The Novel Features for Phishing Based on User Device Detection. 109-115 - Jing Wang, Nianlong Luo:
A New Hybrid Popular Model for Personalized Tag Recommendation. 116-123 - Iuon-Chang Lin, Yung-Wang Lin, Yu-Syuan Wu:
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process. 124-131 - Norhazlina Hamid, Robert John Walters, Gary B. Wills:
Understanding the Impact of the Interconnection Network Performance of Multi-core Cluster Architectures. 132-139 - Mohammad Karim Sohrabi, Vahid Ghods:
Materialized View Selection for a Data Warehouse Using Frequent Itemset Mining. 140-148 - Susanna S. Henry, B. Vijay Kumar, V. Santhosh Kumar, Gurwinder Singh:
Protocol Verification of Translation in Mobile Internet Protocol Version 4 and 6. 149-158 - Susan Sutherland, Girija Chetty:
Investigation into Interoperability in Cloud Computing: An Architectural Model. 159-168 - Vahid Ghods, Mohammad Karim Sohrabi:
Online Farsi Handwritten Character Recognition Using Hidden Markov Model. 169-175
Volume 11, Number 3, May 2016
- Lu Gong, Zhanqiang Li, Tao Dong, Youkai Sun:
Rethink Scalable M: N Threading on Modern Operating Systems. 176-188 - Miguel Rodel Felipe, Sivaraman Sundaram, Khin Mi Mi Aung:
Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing. 189-194 - Di Jian, Yanfeng Peng:
Research of Performance of Distributed Platforms Based on Clustering Algorithm. 195-200 - Rodrigo Roman, Miguel Rodel Felipe, Phua Eu Gene, Jianying Zhou:
Complying with Security Requirements in Cloud Storage Systems. 201-206 - Lingyun Xiang, Jiaohua Qin, Xiao Yang, Qichao Tang:
An Adaptive Steganographic Method Using Additive Noise. 207-215 - Riz Rupert L. Ortiz:
The Accuracy Rate of Holt-Winters Model with Particle Swarm Optimization in Forecasting Exchange Rates. 216-224 - Basim Alhadidi, Zahraa Arabeyat, Fesal Alzyoud, Ali Alkhwaldeh:
Cloud Computing Security Enhancement by Using Mobile PIN Code. 225-231 - Bing Xiong, Xia Peng, Jinyuan Zhao:
A Concise Queuing Model for Controller Performance in Software-Defined Networks. 232-237 - Saad M. Darwish, Magda M. Madbouly, Mohamed Ali Hassan:
From Public Polls to Tweets: Developing an Algorithm for Classifying Sentiment from Twitter Based on Computing with Words. 238-246 - Felix Heimrich, Reiner Anderl:
Approach for the Visualization of Geometric Uncertainty of Assemblies in CAD-Systems. 247-257 - S. Saju, G. Thirugnanam:
Performance Analysis of Image Watermarking Using Contourlet Transform and Extraction Using Independent Component Analysis. 258-265
Volume 11, Number 4, July 2016
- Eugene Tang:
Assessing the Effectiveness of Corpus-Based Methods in Solving SAT Sentence Completion Questions. 266-279 - Chun-Yi Wang, Chieh-Wei Huang, Fu-Hau Hsu, Shih-Jen Chen, Yao-Hsin Chen:
Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite. 280-288 - Sajid Ali, Mingquan Zhou, Zhongke Wu, Usman Muhammad, M. Azam Zai, Murad Ali Shah:
Estimation of Joints Performance in Human Running through Mocap Data. 289-299 - Sergiu Conovalu, Joon S. Park:
Cybersecurity Strategies for Smart Grids. 300-309 - Wei Wen, Siamak Khatibi:
Towards Measuring of Depth Perception from Monocular Shadow Technique with Application in a Classical Painting. 310-319 - Fidan Kaya Gülagiz, Ugur Basaran, Adnan Kavak:
Analyzing Entity Framework Technology for an Indoor Decoration Based Recommendation System. 320-328 - Takashi Ito, Kenichi Takahashi, Michimasa Inaba:
Extension of Genetic Programming with Multiple Trees for Agent Learning. 329-340 - Kenta Nimoto, Kenichi Takahashi, Michimasa Inaba:
Improvement of Agent Learning for a Card Game Based on Multi-channel ART Networks. 341-352
Volume 11, Number 5, September 2016
- Elham Hosnieh, Hirohide Haga:
A Novel Approach to Program Comprehension Process Using Slicing Techniques. 353-364 - Christy Sumitha Vincent, Janet Jayaraj:
N-Pattern Huffman Compression Algorithm for Medical Images in Telemedicine. 365-373 - Basem Y. Alkazemi, Grami Mohammad A. Grami:
Using Online Corpora Databases to Improve ESL Writing. 374-379 - C. Sankara Narayanan, S. Anna Durai:
A Critical Study on Encryption Based Compression Techniques. 380-399 - Mahmoud Othman, Hesham A. Hassan, Ramadan Moawad, Amira M. Idrees:
Using NLP Approach for Opinion Types Classifier. 400-410 - Sahana Shivaprasad, Huian Li, Xukai Zou:
Privacy Preservation in Location Based Services. 411-422 - Valliappan Raman, Sundresan Perumal, Sujata Navaratnam, Siti Fazilah:
Computer Assisted Counter System for Larvae and Juvenile Fish in Malaysian Fishing Hatcheries by Machine Learning Approach. 423-431 - Wenli Shang, Quansheng Qiao, Ming Wan, Peng Zeng:
Design and Implementation of Industrial Firewall for Modbus/TCP. 432-438
Volume 11, Number 6, November 2016
- Steffen Wittig, Uwe Kloos, Matthias Rätsch:
Emotion Model Implementation for Parameterized Facial Animation in Human-Robot-Interaction. 439-445 - Jongho Mun, Jiye Kim, Dongho Won:
An Improvement of User Authentication Framework for Cloud Computing. 446-454 - Mohammad Shakeel Laghari:
Knowledge Based Course Planning System for EE Students at UAE University. 455-462 - Saroj Kaushik, Sunita Tiwari, Chhavi Agarwal, Aakash Goel:
Ubiquitous Crowdsourcing Model for Location Recommender System. 463-471 - Aziz Makandar, Bhagirathi Halalli:
Threshold Based Segmentation Technique for Mass Detection in Mammography. - Tala Tafazzoli, Babak Sadeghiyan:
A Stochastic Model for the Size of Worm Origin. 479-487 - Kalaiselvi Arunachalam, Gopinath Ganapathy:
Discovery and Identification of an Application for Inter-Application Communication on a Home Network Using UPnP. 488-496 - Soomi Yang, Heejung Byun:
Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks. 497-503 - Lu Bai, Xiaohui Yang:
Research on Cassandra Data Compaction Strategies for Time-Series Data. 504-512 - Ummi Azizah Rachmawati, Sri Chusri Haryanti, Nur Aini:
E-Health Grid Network Topology Based on Referral Hospital Clustering in Indonesia. 513-519 - Pi-Chung Hsu:
Ray-Scaling Operations for Deformation of Soft Objects. 520-527 - Nikola Ivkovic, Marin Golub, Domagoj Jakobovic:
Designing DNA Microarrays with Ant Colony Optimization. 528-536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.