


default search action
8th CSOC 2019
- Radek Silhavy:

Software Engineering Methods in Intelligent Algorithms - Proceedings of 8th Computer Science On-line Conference 2019, CSOC 2019, April 2019, Vol. 1. Advances in Intelligent Systems and Computing 984, Springer 2019, ISBN 978-3-030-19806-0 - Abdullahi Abubakar Imam

, Shuib Basri, Rohiza Ahmad, María Teresa González-Aparicio
:
Literature Review on Database Design Testing Techniques. 1-13 - Ramesh Shahabadkar, Krutika Ramesh Shahabadkar:

Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT). 14-24 - R. Radha Kumari, V. Vijaya Kumar

, K. Rama Naidu:
S-DWF: An Integrated Schema for Secure Digital Image Watermarking. 25-34 - Faiza Shafique, Marhaba Khan, Fouzia Jabeen, Sanila:

Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set. 35-47 - Antonín Kleka, Radim Farana

, Ivo Formánek:
Analysis of Behaviour Patterns of the Residents of a Smart House. 48-54 - M. V. Orda-Zhigulina, Eduard Melnik, Donat Ivanov, A. A. Rodina, D. V. Orda-Zhigulina:

Combined Method of Monitoring and Predicting of Hazardous Phenomena. 55-61 - Sarah Myriam Lydia Hahn:

Analysis of Existing Concepts of Optimization of ETL-Processes. 62-76 - Donat Ivanov

, Eduard Melnik
:
Multiagent Distribution of Roles in Communities with Limited Communications. 77-82 - P. H. Gunawan

, Agung F. Gumilar:
Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement. 83-89 - Miroslav Dvorak, Petr Dolezel

:
Comparison Two of Different Technologies for Outdoor Positioning of Robotic Vehicles. 90-98 - Jerrin Yomas, N. Chitra Kiran:

An Effective Hardware-Based Bidirectional Security Aware M-Payment System by Using Biometric Authentication. 99-108 - Marek Simon

, Ladislav Huraj
:
A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks. 109-118 - Michal Beno

:
Perspective on Slovakia's Freelancers in Sharing Economy - Case Study. 119-130 - Omar L. Loaiza

, Nemias Saboya
, José Bustamante
, Juan J. Soria
:
Framework Based on a Fuzzy Inference Model for the Selection of University Program Applicants. 131-140 - Carmen Ana Anton, Oliviu Matei, Anca Avram:

Collaborative Data Mining in Agriculture for Prediction of Soil Moisture and Temperature. 141-151 - Musaddak Maher Abdulzahra

:
Novel Anti-Collision Algorithm in RFID Tag Identification Process. 152-169 - Dalila Amara

, Latifa Ben Arfa Rabai
:
An Empirical Assessment of Error Masking Semantic Metric. 170-179 - Maythem K. Abbas

, Low Tan Jung, Ahmad Kamil Mahmood, Raed M. T. Abdulla
:
Intelligent Software Agents for Managing Road Speed Offences. 180-191 - Ammar K. Alazzawi

, Helmi Md Rais, Shuib Basri:
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation. 192-199 - Aleksander Jarzebowicz

, Kacper Sztramski:
Identification, Assessment and Automated Classification of Requirements Engineering Techniques. 200-212 - G. N. Anil

:
RF-IoT: A Robust Framework to Optimize Internet of Things (IoT) Security Performance. 213-222 - Milan Jemelka, Bronislav Chramcov

:
The Use of Recursive ABC Method for Warehouse Management. 223-229 - D. Pushpa:

A Robust Modeling of Impainting System to Eliminate Textual Attributes While Restoring the Visual Texture from Image and Video. 230-239 - Pavel Pokorný, Lukás Lastuvka:

SkyWay in Zlín. 240-248 - Jiri Vojtesek

, Jan Hutak:
Using Multimedia in Blended Learning. 249-258 - A. A. Dubanov:

Modeling the Behavior of Objects in the Pursuit Problem. 259-274 - Alexey Samoylov, Sergey Gushanskiy

, Natalia Korobeynikova:
Studying the Schrödinger Equation, Implementation of Qubits and Visualization of Matrices Using Matlab. 275-282 - Dariusz Strzeciwilk

:
Performance Analysis of Weighted Priority Queuing Systems. 283-292 - Aytug Onan

:
Topic-Enriched Word Embeddings for Sarcasm Identification. 293-304 - Shuib Basri, Thangiah Murugan, Dhanapal Durai Dominic:

Validating the Conceptual Framework with Exploratory Testing. 305-317 - Tomasz Galecki, Wiktor B. Daszczuk

:
Shapp: Workload Management System for Massive Distributed Calculations. 318-329 - Elarbi Badidi

:
A Fog Node Architecture for Real-Time Processing of Urban IoT Data Streams. 330-341 - Liang Yong, Mu Zhaonan:

Optimizing Performance of Aggregate Query Processing with Histogram Data Structure. 342-350 - Jan Tyrychtr

, Martin Pelikán
, Ivan Vrana
:
Software Algorithm of EM-OLAP Tool: Design of OLAP Database for Econometric Application. 351-359 - Xu Zhang, Yongsen Hu:

Discovery of Important Location from Massive Trajectory Data Based on Mediation Matrix. 360-369 - Andrei Tara, Kirill Ivkushkin, Alexandru Butean, Hjalmar K. Turesson:

The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective. 370-379 - Wiem Zaouga, Latifa Ben Arfa Rabai

:
Modeling and Evaluating a Human Resource Management Ontology. 380-390 - Andrey M. Fedorov

, Igor O. Datyev, Andrey L. Shchur, Andrey G. Oleynik:
Online Social Networks Analysis for Digitalization Evaluation. 391-402 - Martin Sysel

:
A Simulink Network Communication. 403-414 - Aerton Wariss Maia, Pedro Porfrio Muniz Farias:

Transactions as a Service. 415-423 - Marián Hostovecký

, Ferdinand Fojtlín, Erik Jansto
:
Mathematical Dungeon: Development of the Serious Game Focused on Geometry. 424-432 - Praveen Naik, Shantharam Nayak:

Intelligence-Software Cost Estimation Model for Optimizing Project Management. 433-443 - Petr Silhavy

, Radek Silhavy
, Zdenka Prokopova
:
Outliners Detection Method for Software Effort Estimation Models. 444-455 - Zdenka Prokopova

, Petr Silhavy
, Radek Silhavy
:
Analysis of the Software Project Estimation Process: A Case Study. 456-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














