


default search action
6th ICSCA 2017: Bangkok, Thailand
- Vitaliy Mezhuyev, Luigi Benedicenti:

Proceedings of the 6th International Conference on Software and Computer Applications, ICSCA '17, Bangkok, Thailand, February 26-28, 2017. ACM 2017, ISBN 978-1-4503-4857-7
Software engineering
- Sungwon Kang, Jungmin Kim, Haeun Baek, Hwi Ahn, Pilsu Jung, Jihyun Lee:

Comparison of software product line test derivation methods from the reuse viewpoint. 1-8 - Syed Abdul Baqi Shah

, Muhammad Rashid
, Muhammad Arif:
A prediction model for measurement-based timing analysis. 9-14 - Nguyen Thien Khanh, Jirapun Daengdej, Habibi Husain Arifin:

Human stories: a new written technique in agile software requirements. 15-22 - Angelo C. Arguson

, William A. Aldea III:
Development of Encantasya: War of the Four Kingdoms. 23-27 - Shin-ya Nishizaki

:
Linear lambda calculus with non-linear first-class continuations. 28-32 - Sumana Yimman, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn:

Concurrent test case generation from UML activity diagram based on dynamic programming. 33-38 - Puttakul Sakul-Ung, Wichian Chutimaskul:

A predictive model for successful software development projects with information technology strategic alignment. 39-45 - Azizi Miskon

, Jatendra Uslama, Siti Nooraya Mohd Tawil
:
A database on the effect of magnetic fields on stem cells differentiation. 46-49 - Ganis Zulfa Santoso, SongWoo Sok, Young-Woo Jung, Dong-Jae Kang:

Optimizing I/O performance in ViMo-S hypervisor with zero-copy method. 50-54
Data analysis and processing
- Yingjie Shi, Lei Wang, Fang Du:

Performance and energy efficiency of big data systems: characterization, implication and improvement. 55-61 - Surapon Riyana

, Noppamas Riyana, Srikul Nanthachumphu:
Enhanced (k, e)-anonymous for categorical data. 62-67 - Jale Bektas

, Turgay Ibrikci:
Hybrid classification procedure using SVM with LR on two distinctive datasets. 68-71
Information systems and engineering
- Lei Zhu, Guijun Wang, Xianchun Zou:

Improved information gain feature selection method for Chinese text classification based on word embedding. 72-76 - Aryo Pinandito

, Rizal Setya Perdana
, Mochamad Chandra Saputra, Hanifah Muslimah Az-zahra:
Spam detection framework for Android Twitter application using Naïve Bayes and K-Nearest Neighbor classifiers. 77-82 - Hyun-Ho Lee, Min-Ha Hong, Kee-Won Kim

, Seung-Hoon Kim
:
Comparative study on book similarity measurement method based on characters in the body of a book written in Korean. 83-86 - Jen-Yuan Yeh, Tien-Yu Hsu, Cheng-Jung Tsai, Pei-Cheng Cheng:

Reference scope identification for citances by classification with text similarity measures. 87-91 - Long Wang, Yanling Qian, Yanbin Liu, Qingzhi Meng, Tengfei Xu:

Information extraction method and its application in Chinese equipment technical manual based on rule-matching. 92-97 - Nurizal Dwi Priandani

, Herman Tolle
, Anggi G. Hapsani, Lutfi Fanani
:
Malang historical tourism guide mobile application based on geolocation. 98-101 - Xinbao Shao, Qingshan Li, Yishuai Lin, Bo-Yu Zhou:

A meta-search group recommendation mechanism based on user intent identification. 102-106
Image processing
- Yuxi Feng, Qizhou Wu, Guotian He:

Motion target detection algorithm based on monocular vision. 107-111 - Priyajit Biswas

, Shyamalendu Kandar, Bibhas Chandra Dhara:
A novel image encryption technique using one dimensional chaotic map and circular shift technique. 112-116 - Petcharat Pattanasethanon:

Comparison on two image features weight adjustment effect to relevance output image retrieval. 117-121 - Young-Jin Goh, Buhm Lee, Kyoung Min Kim:

Study on thresholding operation for efficient 1: N matching scheme of fingerprint identification. 122-126 - Samra Naz, Sajid Ur Rehman, Hafsa Asad, Sehrish Saleem:

Action recognition by silhouette fusion. 127-131 - Sangita Bharkad:

Automatic segmentation of blood vessels in retinal image using morphological filters. 132-136 - Dekui Lv, Miao Yu, Jianyu Song, Kuidong Qian, Yanjun Cui:

Study on police graphic plotting technology based on web. 137-143 - Nusaibah Kh. Al-Salihy, Turgay Ibrikci:

Classifying breast cancer by using decision tree algorithms. 144-148 - Jayanetti Arachchige Amanda Manomi Jayanetti, D. A. Meedeniya

, M. D. N. Dilini, M. H. Wickramapala, J. H. Madushanka:
Enhanced land cover and land use information generation from satellite imagery and foursquare data. 149-153
Computer science and applications
- Mengxiang Lin, Xiaomei Hou, Rui Liu, Linyan Ge:

Enhancing constraint based test generation by local search. 154-158 - Akshita Bhandari, Ashutosh Gupta, Debasis Das

:
Betweenness centrality updation and community detection in streaming graphs using incremental algorithm. 159-164 - Ruilan Yang, Xuejun Yu:

Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation. 165-170 - Huiyu Li, Hong Hou, Xiaoqun Guo:

The exploration on global village language: Harmony. 171-175 - Joohyun Kyong, Jinwoo Jeon, Sung-Soo Lim:

Improving scalability of apache spark-based scale-up server through docker container-based partitioning. 176-180 - Mohammadshareefuddin Salash-arong, Natawut Nupairoj:

TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment. 181-185 - Alexandre dos Santos Mignon, Ricardo Luis de Azevedo da Rocha

:
An application of composite nano-patterns to compiler selected profiling techniques. 186-190 - Jan Corfixen Sørensen

, Bo Nørregaard Jørgensen
:
An extensible component-based multi-objective evolutionary algorithm framework. 191-197 - Yanshan He, Ting Wang, Jianli Xie

, Ming Zhang:
Parallel frequent subgraph mining algorithm. 198-202 - Meijia Wang, Qingshan Li, Yishuai Lin, Bo-Yu Zhou:

A personalized result merging method for metasearch engine. 203-207 - Masaya Shimakawa, Kenji Osari, Shigeki Hagihara, Naoki Yonezaki:

Modularization of formal specifications or efficient synthesis of reactive systems. 208-213 - Gabriele Arcidiacono, Alessandro Giorgetti

, Andrea Ciappi:
An axiomatic design framework for reliability improvement. 214-217 - Hyun-Ho Lee, Tai-Wan Kim, Kee-Won Kim

:
Efficient montgomery AB2 multiplier for finite fields defined by irreducible all-one polynomials. 218-222 - Komar Udin, Robin Gui, Arry Rahmawan

:
Green vehicle routing problem with heterogeneous fleet and time windows. 223-227
Communication and network engineering
- Yewen Huang

, Shenfen Kuang:
M/M/n/m queuing model under non-preemptive limited-priority. 228-232 - Sa'ed Abed

, Mohammad H. Al Shayeji
, Zahra'a Abdullah, Zainab AlSaeed:
Fault tolerance design for NoCs: partial virtual-channel sharing. 233-238 - Alfin Hikmaturokhman

, Via Lutfita, Achmad Rizal Danisya
:
4G-LTE 1800 Mhz coverage and capacity network planning using frequency reuse 1 model for rural area in Indonesia. 239-243 - Thanh Van Do, Paal Engelstad, Boning Feng, Do van Thuan:

A near real time SMS grey traffic detection. 244-249 - Debasis Das

, Amritesh Kumar:
Algorithm for multicast opportunistic routing in wireless mesh networks. 250-255 - Shigeki Hagihara, Yoshiharu Fushihara, Masaya Shimakawa, Masahiko Tomoishi, Naoki Yonezaki:

Web server access trend analysis based on the Poisson distribution. 256-261 - Rui Zhang, Zikang Lin, Xiaoming Xiong:

Securing compressed real-time audio codec based on iLBC and SM4. 262-266
System modeling and simulation
- Giuseppe Carlo Calafiore

, Carlo Tommolillo, Carlo Novara
, E. Fabrizio:
APSEplus: a MATLAB toolbox for parametric energy simulation of reference buildings. 267-271 - Ruixin Song, Wenjun Wang, Pengfei Jiao, Kang Li, Jing Li:

Study of land evolution model driving by multi-attribute functional urban areas. 272-276 - ZhenHua Jin, Jie Xiong, Zhucheng Li, Yuwei Hua:

Design and application of a PHEV simulation platform. 277-280 - Xiuyan Zhao, Xianxi Liu, Kaixing Zhang:

A structure-based 3d CAD model similarity assessment approach. 281-284 - Hong-guo Li, Shi-jie Su, Lan-jun Jia, Bo Wang, Jie Meng:

The design of the mixed load simulation test bench. 285-288 - Zahrah Yahya, Rahmita Wirza O. K. Rahmat, Fatimah Khalid

, Amir Rizaan, Rizal Rahman:
An automated 3D modelling application based on vertices from 2D paper sketches. 289-293 - Kant Chareancholwanich, Pisit Jarumaneeroj

:
A network-based model for solving inventory routing problem in the asphalt industry: a case study. 294-298
Biomedical engineering
- Arjon Turnip, M. Faizal Amri

, Hanif Fakrurroja, Artha Ivonita Simbolon, M. Agung Suhendra
, Dwi Esti Kusumandari:
Deception detection of EEG-P300 component classified by SVM method. 299-303 - Chien-Hsu Chen

, Chuan-Po Wang, Chun Chin Su:
The effectiveness of using auto organizational menu to communicate with classmates: a case study of autism spectrum disorders. 304-309
Supply chain and scheduling
- Mohammad Mohammadi

, Soheyl Khalilpourazari
:
Minimizing makespan in a single machine scheduling problem with deteriorating jobs and learning effects. 310-315 - Yunxia Guo:

Application research of supplier evaluation based on random forest. 316-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














