


default search action
4th ACIT / 3rd CSII / 1st BCD 2017: Hamamatsu, Japan
- Takaaki Goto, Simon Xu, Nam Nguyen, Weimin Li:

4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, Cloud Computing, Data Science & Engineering, ACIT-CSII-BCD 2016, Las Vegas, NV, USA, December 12-14, 2016. IEEE 2016, ISBN 978-1-5090-4871-7 - George Wencai Du:

Keynote: Big data in society and its application issues in business management and academia. xv - Liang Peng:

GScheduler: Reducing Mobile Device Energy Consumption. 1-6 - Bixin Li, Li Liao, Yi Cheng:

Evaluating Software Architecture Evolution Using Performance Simulation. 7-13 - Jongho Moon, Jiye Kim, Donghoon Lee, Dongho Won:

Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment. 14-19 - Eiman Aldahari:

Dynamic Voltage and Frequency Scaling Enhanced Task Scheduling Technologies toward Green Cloud Computing. 20-25 - Ruizhi Li, Honghao Gao, Danqi Chu, Kang Zhang, Huahu Xu:

Research on the Safety Accidents Prediction for Smart Laboratory Based on Statistical Analysis. 26-31 - Hideaki Ito, Kazuki Miyazato, Kensiro Ishikawa, Tsuyoshi Taki, Junichi Hasegawa, Kyoko Raita:

Analyzing Elements of Letters in a Letter Management System. 32-37 - Koushi Anzai

, Takaaki Goto
, Youzou Miyadera, Takeo Yaku
, Ken Yokota:
An XML Representation of the Octgrid for the Rectangular Dissections. 38-42 - Priyanka Thota, Yoohwan Kim:

Implementation and Comparison of M2M Protocols for Internet of Things. 43-48 - Sabah Al-Fedaghi:

Logic Representation: Aristotelian Syllogism by Diagram. 49-54 - Kshitija Shinde, Yu Sun:

Template-Based Code Generation Framework for Data-Driven Software Development. 55-60 - Iain Lee, Yu Sun, Yuexin Li:

An Intelligent Approach to Review Filtering and Review Quality Improvement. 61-66 - Bassey Isong

, Nosipho Dladlu, Bassey Ele:
Object-Oriented Code Metric-Based Refactoring Opportunities Identification Approaches: Analysis. 67-74 - Hiroshi Kawano, Seiichi Serikawa:

The Development of the Magnetic Measurement System of the Movement Method Using the Posture Information. 75-80 - Hayato Takahashi, Yuhki Kitazono:

Integration of Hand Gesture and Multi Touch Gesture with Glove Type Device. 81-86 - Takahiro Kizu, Masataka Inoue, Keiichi Yoshino, Koju Hiraki:

Development of Dragonfly-Like Flapping Robot. 87-92 - Ryo Takeuchi, Kouki Yamaguchi, Hayato Takahashi, Masahiko Hanada, Hiromichi Hanada, Kanya Mizuguchi, Seiichi Serikawa, Yuhki Kitazono:

Improvement of Full Automatic Fire Extinguish System for Residential Use. 93-98 - Kenshi Yoshimura, Teruhisa Hochin, Hiroki Nomiya

:
Estimation of Rates Arriving at the Winning Hands in Multi-Player Games with Imperfect Information. 99-104 - Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya

:
Evaluation of Parallel Multi-Dimensional Indexing System for Big Data Analysis. 105-110 - Yui Nonomura, Teruhisa Hochin, Hiroki Nomiya

:
Coloring Methods of Characters for Presentation Slides. 111-116 - Yamato Takahashi, Teruhisa Hochin, Hiroki Nomiya

:
Improvement of Mutual Retrieval of Visual and Audio Materials Based on Impression. 117-122 - Manami Tamai, Teruhisa Hochin, Hiroki Nomiya

:
Effects of Seasons on Impression and Retrieval Requirement of Pictures. 123-128 - Teruhisa Hochin, Hiroki Nomiya

, Hitoshi Iima, Morshed U. Chowdhury
:
A Smart Framework towards Providing Benefits for One and All. 129-132 - Kazuma Kusu

, Izuru Kume, Kenji Hatano
:
A Trace Partitioning Approach for Memory Efficiency on a Trace Analysis Environment. 133-140 - Shin-ichi Sato:

gsl-dfs: A Lightweight Goal Selection Algorithm Based on a Goal Selection Criterion. 141-146 - Shin-ichi Sato:

GDM-CBDT: A Mathematical Model for Goal Decomposition Based on Case-Based Decision Theory. 147-151 - Jun Nakamura, Haruaki Tamada

:
Fast Comparison of Software Birthmarks for Detecting the Theft with the Search Engine. 152-157 - Tomohiro Ichinose, Kyohei Uemura, Daiki Tanaka, Hideaki Hata

, Hajimu Iida, Kenichi Matsumoto:
ROCAT on KATARIBE: Code Visualization for Communities. 158-163 - Aiko Yamamoto, Hidetake Uwano

, Yoshiharu Ikutani:
Programmer's Electroencephalogram Who Found Implementation Strategy. 164-168 - Alexandre Boucher, Mourad Badri:

Using Software Metrics Thresholds to Predict Fault-Prone Classes in Object-Oriented Software. 169-176 - Richa Sharma, Nidhi Sharma, K. K. Biswas:

Machine Learning for Detecting Pronominal Anaphora Ambiguity in NL Requirements. 177-182 - Akira Inokuchi, Haruaki Tamada

, Hideaki Hata
, Masateru Tsunoda:
Toward Obliging Bots for Supporting Next Actions. 183-188 - George Anderson, Tallman Z. Nkgau:

Computer System Design Exploration Using Local Search and Genetic Algorithms. 189-195 - Yukasa Murakami, Masateru Tsunoda, Koji Toda:

An Empirical Evaluation of the Tobit Model on Software Defect Prediction. 196-201 - Yusuke Toba, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura, Tomohito Uchino:

Evaluating Multi-Modal Speech Visualization Application for Deaf and Hard of Hearing People. 202-207 - Liang Peng:

Enhanced Camera Capturing Using Object-Detection-Based Autofocus on Smartphones. 208-212 - Gaku Nakagawa, Shuichi Oikawa:

Behavior-Based Memory Resource Management for Container-Based Virtualization. 213-217 - Abhilash Kancharla

, Jongyeop Kim, Noh-Jin Park, Nohpill Park:
Big Streaming Data Buffering Optimization. 218-223 - Tokuro Matsuo, Takanobu Otsuka, Tetsuya Oishi

, Rieko Fujita, Takayuki Ito
, Akihisa Sengoku, Shun Shiramatsu, Naoki Fukuta, Katsuhide Fujita
, Hidekazu Iwamoto:
A Novel Model of Convention Management Research and Business Process. 224-229 - Yi Zheng, Pei He, Chi-Chang Chang

, Yafen Liu:
Issues with Path Representation in Transition Systems. 230-234 - Ippei Torii, Kaoruko Ohtani, Naohiro Ishii:

Measurement of Ocular Movement Abnormality in Pursuit Eye Movement (PEM) of Autism Spectrum Children with Disability. 235-240 - Emi Aihara, Ippei Torii, Naohiro Ishii:

Development of Monitor System for Dry Eye Symptom. 241-246 - Shunsuke Kawatake, Ippei Torii, Naohiro Ishii:

Increasing Concentration with Neurofeedback. 247-252 - Takahito Niwa, Ippei Torii, Naohiro Ishii:

Development of Communication Tool for Physically Handicapped with Involuntary Movements by Line-of-Sight Detection. 253-258 - Takahito Niwa, Ippei Torii, Naohiro Ishii:

Development of Evacuation Guiding System for Earthquake Disaster. 259-264 - Kazunori Iwata, Toyoshiro Nakashima, Yoshiyuki Anan, Naohiro Ishii:

Effort Estimation for Embedded Software Development Projects by Combining Machine Learning with Classification. 265-270 - Toshinori Deguchi, Naohiro Ishii:

On Pattern Generating Methods for Incremental Learning by Chaotic Neural Network. 271-276 - Naohiro Ishii, Ippei Torii, Kazunori Iwata, Kazuya Odagiri, Toyoshiro Nakashima:

Characterization of Nearest Neighbor Relation Based on Boolean Reasoning and Convex Cones. 277-282 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:

Concept of the QOS Control Method Based on the Data Mining in the VDACS Scheme for the Common Use between Plural Organizations. 283-288 - Naohiro Ishii, Toshinori Deguchi, Masashi Kawaguchi, Hiroshi Sasaki:

Asymmetric Neural Networks with Gabor Filters. 289-294 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:

Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations. 295-300 - Shivashish Jaishy

, Nobuhiro Ito, Yoshinobu Kawabe:
Problem Solving with Interactive-Theorem Proving - A Case Study. 301-306 - Yoshinobu Kawabe, Nobuhiro Ito:

On Computer-Assisted Verification of Timed Anonymity of Multi-Agent Systems. 307-312 - Masahiro Yamamoto, Nobuhiro Ito, Kazunori Iwata, Tsuyoshi Matsukawa, Yoshiyuki Kozuka:

A 3D Visualization Display System for the RoboCupRescue Simulation Competition. 313-318 - Shivashish Jaishy

, Yoshiki Fukushige, Nobuhiro Ito, Kazunori Iwata, Yoshinobu Kawabe:
An Evaluation of BAR: Breakdown Agent Replacement Algorithm for SCRAM. 319-324 - Yuping Li, Cheng Tian:

Analysis of Influence of Ungated Residential Community on Traffic of Surrounding Roads. 325-328 - Xianhong Xu, Cheng Tian, Jinnuo Zhang:

Influence Effect of International Capital Flow on China's Economic Growth. 329-331 - Tong Wang:

Analysis of Reliability and Validity of Teaching Evaluation Index System. 332-336 - Di Liu, Wenqian Shang, Ligu Zhu, Dongyu Feng:

An Improved Dynamic Load-Balancing Model. 337-341 - Muzi Sun, Minyong Shi:

Contour Extraction and Vectorization Algorithm for Paper-Cut Pattern. 342-347 - Zejian Shi, Minyong Shi, Weiguo Lin:

The Implementation of Crawling News Page Based on Incremental Web Crawler. 348-351 - Chen Zhang, Jing Zhou, Weifeng Xie:

A Users Clustering Algorithm for Group Recommendation. 352-356 - Nan Yang, Sanxing Cao, Yu Liang, Zhengzheng Liu:

Recommendation Engine for Online Short Video. 357-362 - (Withdrawn) A Music Identification System Based on Audio Fingerprint. 363-367

- Xiaoshan Yang, Ligu Zhu, Qicong Zhang, Dongyu Feng:

Research on Evaluation Method of Big Data Storage Utilization. 368-372 - Lu Jiang, Xiaohong Wang, Ligu Zhu:

Research on a Visualization Interaction Method. 373-378 - Wenqian Shang, Songtao Shang, Shuchao Feng, Minyong Shi:

An Improved Video Recommendations Based on the Hyperlink-Graph Model. 379-383 - Yakir Wang, Minyong Shi, Chunfang Li, Weiguo Lin:

Art Exam Scores Analysis and Visualization. 384-388 - Chengcheng Wang, Ligu Zhu, Di Zhang:

Application of Fisheye View in Temporal Spiral Visualization. 389-393 - Zhiguo Hong, Minyong Shi, Yongbin Wang:

CTMC-Based Availability Analysis of Multiple Cluster Systems with Common Mode Failure. 394-396 - Zhiguo Hong, Yongbin Wang, Minyong Shi:

DTMC-Based Performance Evaluation of Animation Rendering Node. 397-399 - Yongchang Wang, Ligu Zhu:

Research on Collaborative Filtering Recommendation Algorithm Based on Mahout. 400-405 - Cheng Tian:

Mechanical Analysis of Basketball's Movement Trajectory after Its Shooting Action. 406-408 - Yuanyuan Zhang, Haihong Jiang, Cheng Tian:

Study on Blasting Effect on Tailings Pond. 409-412 - Jongyeop Kim, Noh-Jin Park, Nohpill Park:

A Study of Heuristically-Based Parametric Performance Improvement/Optimization Algorithms for BigData Computing. 413-418 - Xiu-Jin Shi, Sheng-Ping Hu:

Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud. 419-425 - Peipei Wang, Jiulei Jiang:

Research on Data Mining and Electronic Commerce Information Push Application Based on PMML. 426-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














