


default search action
4th ICSIM 2021: Yokohama, Japan
- Yonghui Li, Hiroaki Nishi:

ICSIM 2021: 2021 The 4th International Conference on Software Engineering and Information Management, Yokohama Japan, January 16-18, 2021. ACM 2021, ISBN 978-1-4503-8895-5
Chapter I: Software Design and Development
- Eman Yasser, Akram Salah, Amr Kamel:

Enhancing the quality of service of mobile-based software over Wi-Fi direct. 1-9 - Chutiwan Sowkasem, Phumin Kirawanich

:
A Deliverable Delay Management of Software Development in Railway Project using an OKR-Based Scrum Process. 10-16 - Marlon Tayag

, Ronie C. Bituin
, Marvin Reyes:
Leap Motion Controller Enabled Simulations of Personal Computer Assembly Programs. 17-21 - Arpaporn Phokajang, Paniti Netinant

:
Developing Software Architecture for A Smart School Digital Framework. 22-27 - Bambang Adi Prakoso, Eko Kuswardono Budiardjo:

The Usage of Agile Adoption Framework to Assess Scrum Process and Recommend Improvements. 28-32 - Mohamed Nadjib Boufenara, Mohamed Lamine Berkane, Mahmoud Boufaïda:

Conceptual Modelling of Genotype and Phenotype Information. 33-38 - Fandi Gunawan, Eko Kuswardono Budiardjo:

A Quest of Software Process Improvements in DevOps and Kanban: : A Case Study in Small Software Company. 39-45 - Ritu Arora, Arun Motilal Maurya, Yashvardhan Sharma:

Application of Java Relationship Graphs (JRG) to plagiarism detection in Java Projects: A Neo4j Graph Database Approach. 46-51
Chapter II: Software and Information Engineering
- Pilita A. Amahan

, Rommel C. Sanqui:
Syntax to Syntax: Assessment of Orthogonality in the Design of Object-oriented Programming Languages using Code Listing Method. 52-55 - Pramath Joshi, Mindula Liyange Don, Sidney Guildford Chikodi, Austin Bitanga, Mourita Chowdhury, Yixin Mu, Vivienne Farrell, Richard Burton Watson

, Peter John Ryan:
Web-enabled Smart City Applications for Urban Transport and Parking Operations. 56-62 - Claudia Ng, Angela Siew-Hoong Lee:

Factors Influencing the Acceptance of Blockchain Technology: Real Estate Industry. 63-67 - Qiqi Wang, Yu Shen, Jing Li:

User-level Workload Analysis for Supercomputers. 68-73 - Giovanni Marotta

, Andrea Fornaia, Agatino Moschitta, Giuseppe Pappalardo, Emiliano Tramontana:
NausiChain: a Mobile Decentralized App Ensuring Service Continuity to University Life in Covid-19 Emergency Times. 74-81 - Jiangcheng Qin, Baisong Liu

, Jiangbo Qian:
A Novel Privacy-Preserved Recommender System Framework Based On Federated Learning. 82-88 - Xuxin Yang, Yurong Hou, Wei Zhang:

Research on Performance Management of Financial Shared Service Center Based on Cloud Accounting. 89-93
Chapter III: Data Theory and Engineering
- Fazli Mat Nor:

A Study on Performance and Accuracy Analysis of Classification Methods on Death of Beneficiaries in Social Security Context. 94-98 - Mulyani Pratiwi

, Yova Ruldeviyani:
Data Governance to Improve Data Quality for Statistical Process Control (SPC): A Case Study PT. XYZ. 99-105 - Evan Bryer, Theppatorn Rhujittawiwat

, Samyu Comandur
, Vasco Madrid, Stephanie Riley, John Rose, Colin Wilder:
Analysis of Clustering Algorithms to Clean and Normalize Early Modern European Book Titles. 106-112 - Yuxiao Chen, Kaiwen She, Shaoyang Zhao:

Social Insurance Contribution Rate Reduction and Firm Activity Evidence from Big Data of Chinese Enterprises. 113-117 - Quan Liu:

Web Access Log Anomaly Detection Based on Deep Learning. 118-123 - Richard Burton Watson, Peter John Ryan:

Visualization and Waste Collection Route Heuristics of Smart Bins Data using Python Big Data Analytics. 124-130
Chapter IV: Human-computer Interaction and System
- Emad A. Felemban, Sardar Asad Ali Biabani

, Hani Sharbini Sharbini Kamaluddin, Faizan Ur Rehman, Ahmed Lbath:
Towards Building an Interactive Evaluation framework for Decision-makers to Manage Large Crowd. 131-137 - Shinichi Sato, Masanori Yofune, Syuuichi Murata, Satoko Itaya, Takeo Onishi, Taketoshi Nakajima:

Development of Smart Resource Flow Wireless Platform Standardized by Flexible Factory Partner Alliance: A wireless platform to stabilize various wireless communication systems co-located in factory sites. 138-144 - Rania Albalawi, Tet Hin Yeap, Morad Benyoucef:

Evaluating the Effectiveness of A Suggested Architecture for The Real-Time Social Recommendation System. 145-151 - Napasorn Phaokla, Paniti Netinant

:
Design an Environment Information Chatbots System for a Smart School Framework. 152-157 - Yanxia Niu, Lei Huang:

Information Behavior of Online Academic Social Platform: Case Study of ESI Highly Cited Researchers of ResearchGate. 158-164 - Mondher Bouazizi, Natsuho Niida, Tomoaki Ohtsuki:

All-in-One Hate Speech Detectors May not be what You Want. 165-170
Chapter V: Computer Theory and Application
- Gede Indrawan, I Gede Aris Gunadi, Made Santo Gitakarma, I Ketut Paramarta:

Latin to Balinese Script Transliteration: Lessons Learned from the Computer-based Implementation. 171-175 - Nuo Cheng, Yuan Xin Peng, Yang Tian Bai, Hao Fang, Yao Ding Liu:

Construction of Quantitative User Experience Model for Mobile Popular Science Journal. 176-183 - Muhammad Budi Rahayu Widodo, Ontoseno Penangsang

, Adi Soeprijanto, Indri Suryawati
:
Fault Location Detection Using Impedance and Impulse Injection on 20 kV Distribution System Wonokromo Base on Geographic Information System. 184-192 - Kamran Shaukat

, Suhuai Luo
, Nadir Abbas, Talha Mahboob Alam
, Muhammad Ehtesham Tahir, Ibrahim A. Hameed:
An Analysis of Blessed Friday Sale at a Retail Store Using Classification Models. 193-198 - Stephen Mujeye

:
A Survey on Multi-Factor Authentication Methods for Mobile Devices. 199-205 - Jiangtao Fei, Tianyi Yu, Xiaoping Li, Xin Liu, Zhen Zhang:

Research of Main and Auxiliary Sequence Synchronic Control Method for Multi-spacecraft based on Lunar Relay Satellite. 206-213 - Sabrina Ayu Paramadini, Amalia Suzianti:

Driving Factors Analysis of E-learning Use in Primary Schools During the Covid-19 Pandemic Era: An Exploratory ISSM Model. 214-219 - Hailin Wang, Guoming Lu, Jin Yin, Ke Qin:

Relation Extraction: A Brief Survey on Deep Neural Network Based Methods. 220-228 - Maxim Usmanov, Alexander Stepanenko, Elena Matvienko, Andrey Ponomarev, Andrey V. Proletarsky:

Next Generation E-Learning System: University Network Migration to Complete Wireless State. 229-235 - YuXuan Chen, Jianwei Ding, Dashuang Li, Zhouguo Chen:

Joint BERT Model based Cybersecurity Named Entity Recognition. 236-242 - Hongquan Shi, Xiwei Xu, Yu Fan, Chenxi Zhang, Yongsheng Peng:

An Auto Encoder Network Based Method for Abnormal behavior detection. 243-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














