


default search action
3rd ICSIM 2020: Sydney, NSW, Australia
- ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, Sydney, NSW, Australia, January 12-15, 2020. ACM 2020, ISBN 978-1-4503-7690-7

Data Science and Big Data Technology
- Amir Tosson, Mohammad Shokr, Ullrich Pietsch:

Application of Cloud Computing for Big Data in the X-Ray Crystallography Community. 1-4 - Omar Salameh Al-Hujran, Ahmad Alikaj, Usman Khan Durrani

, Nidal Al-Dmour
:
Big Data and its Effect on the Music Industry. 5-9 - Joey A. Cabrera, Markdy Y. Orong, Nelpa N. Capio, Arnel Filarca, Eden Neri, Ariel R. Clarin:

A Data Mining Approach for Student Referral Service of the Guidance Center: An Input in Designing Mediation Scheme for Higher Education Institutions of the Philippines. 10-14 - Jaekwang Kim:

A Novel Approach for Blog Feeds Recommendation Based on Meta-data. 15-20 - Radek Kocí, Jaroslav Rozman, Frantisek Zboril Jr.:

Database Concept for Transcription of Registry Records into Digital Form. 21-25 - Tanmay Sanjay Hukkeri, Shobha G, Shubham Milind Phal, Jyothi Shetty, Yatish H. R, Naweed Mohammed:

Massively Scalable Image Processing on the HPCC Systems Big Data Platform. 26-31 - Peng Cheng, Feng Pan, Yanyan Yin

, Lingshuang Kong, Song Wang
:
Anti-disturbance Control Based On Uncertain Data. 32-35 - Wenchi Du, Niansong Zhang, Aimin Wang:

Safety Production Process Hazard Situation Analysis System Based on Large-scale Data Real-time Processing. 36-40 - Hany Al Ashwal, Areeg Abdalla

, Mohamed El Halaby, Ahmed A. Moustafa
:
Feature Selection for the Classification of Alzheimer's Disease Data. 41-45 - Jianwei Ding, Xiaoyu Guo, Zhouguo Chen:

Big Data Analyses of ZeroNet Sites for Exploring the New Generation DarkWeb. 46-52
Machine Learning and Intelligent Computing
- Hyun Kwon

, Hyunsoo Yoon, Ki-Woong Park:
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. 53-57 - Saeed Bahrami, Razali Yaakob, Azreen Azman, Rodziah Binti Atan

:
An Integrated of Fuzzy Rule Base System and TOPSIS Technique for Multi-Attribute Decision Making. 58-62 - Piyumini Wijenayake, Daswin De Silva, Damminda Alahakoon, Saliya Kirigeeganage:

Automated Detection of Social Roles in Online Communities using Deep Learning. 63-68 - Suganya Selvaraj, Eunmi Choi:

Survey of Swarm Intelligence Algorithms. 69-73 - Adikarige Madanayake, Mangalam Sankupellay, Ickjai Lee:

Profiling the Natural Environment Using Acoustics: Long-Term Environment Monitoring through Cluster Structure. 74-78 - Pratik Patil, Ching-Seh Mike Wu, Katerina Potika

, Marjan Orang:
Stock Market Prediction Using Ensemble of Graph Theory, Machine Learning and Deep Learning Models. 85-92
Software Engineering and Project Management
- Nargis Fatima, Sumaira Nazir, Suriayati Chuprat:

Software Engineering Wastes - A Perspective of Modern Code Review. 93-99 - Dipendra Ghimire, Stuart M. Charters, Shirley Gibbs:

Scaling Agile Software Development Approach in Government Organization in New Zealand. 100-104 - Ritu Arora, Anand Wani, Ankur Vineet, Bhavik Dhandhalya, Yashvardhan Sharma, Sanjay Goel:

Continuous Conflict Prediction during Collaborative Software Development: A step-before Continuous Integration. 105-109 - Anita Hidayati

, Eko Kuswardono Budiardjo, Betty Purwandari:
Hard and Soft Skills for Scrum Global Software Development Teams. 110-114 - Hayden Cheers

, Yuqing Lin
:
A Novel Graph-Based Program Representation for Java Code Plagiarism Detection. 115-122 - Teguh Raharjo, Betty Purwandari:

Agile Project Management Challenges and Mapping Solutions: A Systematic Literature Review. 123-129
Image Processing
- Chin-Ta Chen, Chih-Chung Yang:

Dynamic Image Quality Analysis and Comparison between 6MHz and 8MHz Bandwidths for DVB-C Digital TV System. 130-134 - Noriaki Yoshiura, Kaichiro Iida:

Identification of Writing on Bulletin Board via Tor. 135-139 - Le Zhang:

A Transfer Learning Approach for Handwritten Numeral Digit Recognition. 140-145 - Suganya Selvaraj, Eunmi Choi:

TKM Ontology Integration and Visualization. 146-149 - Liton Devnath

, Suhuai Luo
, Peter F. Summons, Dadong Wang
:
Performance Comparison of Deep Learning Models for Black Lung Detection on Chest X-ray Radiographs. 150-154
Information Network and Application Technology
- Betty Purwandari, Wayan Surya Wibawa, Nilam Fitriah

, Mellia Christia
, Dini Rahma Bintari:
Internet Addiction and Mental Health Prediction Using Ensemble Learning Based on Web Browsing History. 155-159 - Peipei Zhao, Xuewen Liu, Mingliang Li, Jiajing Ding:

Weak Sparsity Adaptive Matching Pursuit Algorithm based on Environmental Monitoring Sensor Network Data. 160-164 - Nina Hendrarini, Muhamad Asvial, Riri Fitri Sari:

Energy Balanced Threshold Using Game Theory Algorithm for Wireless Sensor Networks Optimization. 165-169 - Yanli Wang, Xuewen Liu, Mingliang Li, Xueqing Li:

WSN Signal Reconstruction Based on Unknown Sparse Compressed Sensing. 170-173 - Ronie C. Bituin

, Elijah Christian Bautista:
Marker less Hand Gesture Tracking using Smart Phones. 174-177 - Chaoyang Wang, Mingliang Li, Xuewen Liu, Xuejiao Wu:

Research on Security Location of Malicious Node Filtering for Environmental Monitoring Sensor Networks. 178-182 - Ji-Hun Lim, Dooho Keum, Young-Bae Ko:

A Cooperative Trust Evaluation Scheme for Tactical Wireless Sensor Networks. 183-187 - XianHua Kong, Junjian Kang, Mingliang Li, Jingting Li:

Research on Differential Particle Swarm Optimization Algorithm for Wireless Network Location in Seismic Exploration. 188-193 - Noriaki Yoshiura, Hayata Yano:

IP Traceback method by OpenFlow. 194-198
Computer Science and Information Technology
- Su-Tzu Hsieh:

The Moderating Effects of Mentoring in ERP Systems. 199-202 - Andy Syahrizal, Betty Purwandari, Muhammad Mishbah, Muhammad Fadhil Dzulfikar:

Buying the Unreal: Drivers of Virtual Item Purchase in Video Games. 203-209 - Sumaira Nazir, Nargis Fatima, Suriayati Chuprat:

Modern Code Review Benefits-Primary Findings of A Systematic Literature Review. 210-215 - Mieke Eka Putri, Dana Indra Sensuse, Muhammad Mishbah, Pudy Prima:

E-Government Inter-Organizational Integration: Types and Success Factors. 216-221 - Markdy Y. Orong, Roseclaremath A. Caroro

, Geraldine D. Durias, Joey A. Cabrera, Herwina Lonzon, Gretel T. Ricalde:
A Predictive Analytics Approach in Determining the Predictors of Student Attrition in the Higher Education Institutions in the Philippines. 222-225 - Yusuke Nozaki, Masaya Yoshikawa:

Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller. 226-231 - Mariam Ibrahim Hamood Al-Karaawi, Azhara Aziz Jasim Alobeidi, Marwah Abdulkareem Mahmood Zuhaira:

Human Capital and Their Affect in Service Quality Dimensions. 232-236 - Carlos Montenegro, Rosa Navarrete

:
Improving Core Topics Discovery in Semantic Markup Literature: A Combined Approach. 237-243 - Kurt Schoenhoff

, Jason Holdsworth
, Ickjai Lee:
Efficient Semantic Segmentation through Dense Upscaling Convolutions. 244-248

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














