


default search action
RACS 2015: Prague, Czech Republic
- Esmaeil S. Nadimi, Tomás Cerný, Sung-Ryul Kim, Wei Wang:

Proceedings of the 2015 Conference on research in adaptive and convergent systems, RACS 2015, Prague, Czech Republic, October 9-12, 2015. ACM 2015, ISBN 978-1-4503-3738-0
Artificial intelligence & algorithms
- Swapnajit Chakraborti

, Shubhamoy Dey:
Product news summarization for competitor intelligence using topic identification and artificial bee colony optimization. 1-6 - Anis Yazidi, Hugo Hammer:

Quantile estimation using the theory of stochastic learning. 7-14 - Viet-Hoang Le, Sung-Ryul Kim:

K-strings algorithm, a new approach based on Kmeans. 15-20 - Phuoc-Hoang-Tuong-Lan Do, Sung-Ryul Kim:

A new approach to the edit distance with block swaps using DAWG. 21-26 - Shuichi Yasumura, Lei Li

:
A fast iterative algorithm for the large-scale toeplitz linear systems. 27-31 - Jürgen Herp

, Mohammad H. Ramezani
:
State transition of wind turbines based on empirical inference on model residuals. 32-37 - Mohammad Khosravi

, Hossein Khodadadi, Amir G. Aghdam, Hassan Rivaz:
Maximum reward collection problem: a cooperative receding horizon approach for dynamic clustering. 38-43 - Mohammad Noshad, Jie Ding, Vahid Tarokh:

Sequential learning of multi-state autoregressive time series. 44-51
Short papers (posters)
- Harry Zhou:

An intelligent decision support system for stock analysis and evaluation. 52-55
Database & data mining
- Yongjun Zhu, Erjia Yan

, Il-Yeol Song:
Topological analysis of interdisciplinary scientific journals: which journals will be the next nature or science? 56-61 - Beomseok Hong, Youngsub Han, Yanggon Kim:

A semi-supervised tweet classification method using news articles. 62-67 - Hyeoncheol Lee, Beomseok Hong, Kwangmi Ko Kim:

Documents topic classification model in social networks using classifiers voting system. 68-73 - Youngsub Han, Hyeoncheol Lee, Yanggon Kim:

A real-time knowledge extracting system from social big data using distributed architecture. 74-79 - Han-Sheng Huang, Shih-Hao Hung, Chih Wei Yeh:

Load balancing for hybrid NoSQL database management systems. 80-85 - Hyun-Kyo Oh, Taehee Lee, Sang-Wook Kim:

Finding underlying factors for reciprocal trust formation. 86-91 - Eunji Lee, Jaeuk Lee, Pankoo Kim:

Design of inference rules for plant growth based on ontology. 92-95 - Vinay Avasthi, Shubhamoy Dey, Kamal Kishore Jain, Rajhans Mishra:

The evolution of knowledge in communities of practice. 96-101 - Frantisek Malinka:

Prediction of protein stability changes upon one-point mutations using machine learning. 102-107 - Khadija Ali Vakeel, Shubhamoy Dey:

Improving tweet clustering using bigrams formed from word associations. 108-113 - Yesol Kim, Jonghyuk Park, Seong-je Cho, Yunmook Nah, Sangchul Han, Minkyu Park:

Machine learning-based software classification scheme for efficient program similarity analysis. 114-118
Short papers (posters)
- Chang Choi

, Xuefeng Piao, Junho Choi, Mungyu Lee, Pankoo Kim:
Malicious behavior pattern mining using control flow graph. 119-122 - Juw Won Park, Julia Chariker, Yi Xing:

Strand specific RNA-seq data for higher specificity. 123-124
Image processing & computer vision
- Jatin Wadhwa, Talib Ahemad, Ruchira Naskar

, Rahul Dixit:
On parameterization of block based copy-move forgery detection techniques. 125-130 - Minsung Kang, Young-Chul Lim:

Fast stereo-based pedestrian detection using hypotheses. 131-135 - Mi-Young Cho, Young-Sook Jeong, Byung-Tae Chun:

Similarity between real faces and facial videos from a display device: a face recognition perspective. 136-140 - Zhenhai Wang, Bo Xu, FuHai Huang:

Real-time multiple object tracking in particle filtering framework using codebook model and adaptive labeling. 141-145 - Zhenhai Wang, Xiaoyu Jiang, Bo Xu, Kicheon Hong:

An online multi-object tracking approach by adaptive labeling and kalman filter. 146-151 - Huu-Noi Doan, Beomsu Kim, Min-Cheol Hong:

A spatial-temporal hole filling approach with background modeling and texture synthesis for 3D video. 152-157 - Jinju Lim, Beomsu Kim, Min-Cheol Hong:

Video stabilization based on the detection and alpha-trimmed means smoothing filtering of undesirable motion. 158-163 - Austin Hanson, George Hamer, Sung Y. Shin:

Hybrid model for object orientation classification. 164-171 - Chulwoo Pack, Sung Y. Shin, Seong-Ho Son

, Soon-Ik Jeon:
Computer aided breast cancer diagnosis system with fuzzy multiple-parameter support vector machine. 172-176 - G. C. Sailesh, Ravi Kasaudhan, Tae K. Heo, Hyung Do Choi:

Variability measurement for breast cancer classification of mammographic masses. 177-182 - Ravi Kasaudhan, Tae K. Heo, Soon-Ik Jeon, Seong-Ho Son:

Similarity measurement with mesh distance fourier transform in 2D binary image. 183-187 - G. C. Sailesh, Chulwoo Pack

, Sung Y. Shin, Hyung Do Choi:
Breast cancer classification of mammographic masses using improved shape features. 188-194 - Young-Chul Lim, Minsung Kang:

Pyramidal channel features for pedestrian detector. 195-199 - Sunmin Lee, Yong Cheol Kim:

Two-step clustering of SIFT keypoints and relaxation based matching of clusters. 200-204 - Jinsuk Yang, Haoxu Zheng, Kyoungsu Oh:

Hybrid image using image morphing. 205-209 - Enmin Song, Ning Pan, Chih-Cheng Hung, Xiang Li, Lianghai Jin:

Reflection invariant local binary patterns for image texture classification. 210-215
Network computing
- Hsueh-Wen Tseng

, Ruei-Yu Wu, Yi-Zhang Wu, Shih-Chun Chou:
An efficient cross-layer reliable retransmission scheme for the human body shadowing in IEEE 802.15.6-based wireless body sensor networks. 216-222 - Esmaeil S. Nadimi

, Jürgen Herp
, Mohammad H. Ramezani
:
Semi-definite programming-based localization algorithm in networks with inhomogeneous transmission medium. 223-226 - Wei Wang, Shivangi Pyasi, Kazem Sohraby, James Dudek:

Unified quantization parameter and frame size control for quality of experience optimization in wireless multimedia communications. 227-230 - Min Jae Kang, Semi Jeong, Dong Kun Noh

:
Energy-aware selective compression scheme for solar energy based wireless sensor networks. 231-236 - Mohammad H. Ramezani

, Victoria Blanes-Vidal
, Esmaeil S. Nadimi
:
Adaptive intra-body channel modeling of attenuation coefficient using transmission line theory. 237-241 - Minkailu Mohamed Jalloh, Shitong Zhu, Fang Fang, Jun Huang:

On selecting composite network-cloud services: a quality-of-service based approach. 242-246
Short papers (posters)
- Bongjae Kim

, Hyedong Jung:
A case study of data transfer efficiency optimization for GPU- and infiniband-based clusters. 247-250 - Deqian Fu

, Zifen Yang, Lihua Han, Seong Tae Jhang:
An algorithm on constructing routing-based multiple CDSs to prolong lifetime of WSN. 251-255 - Safdar Hussain Bouk, Muhammad Azfar Yaqub

, Syed Hassan Ahmed
, Dongkyun Kim:
Evaluating interest/data propagation in vehicular named data networks. 256-259 - Eunkyeung Jae, Chang Kim:

An indoor positioning method using a combination of the triangulation and fingerprinting techniques. 260-261
Security
- Xinkai Li, Chao Lu:

Proactive self-defense algorithm for large matrix calculation using multiple P-adic data type. 262-267 - Yevgeniy Cole, Hanlin Zhang

, Linqiang Ge, Sixiao Wei, Wei Yu
, Chao Lu, Genshe Chen, Dan Shen, Erik Blasch, Khanh D. Pham:
ScanMe mobile: a local and cloud hybrid service for analyzing APKs. 268-273 - Byeongho Kang, Jisu Yang, Jaehyun So, Czang Yeob Kim:

Detecting trigger-based behaviors in botnet malware. 274-279 - Michal Trnka, Tomás Cerný

:
Context-aware Role-based Access Control Using Security Levels. 280-284 - Jeonghyeok Park, Daeyeon Son, Dongwoo Kang, Jongmoo Choi, Gwangil Jeon:

Software similarity analysis based on dynamic stack usage patterns. 285-290 - BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:

PageRank in malware categorization. 291-295 - Ondrej Pluskal:

Behavioural malware detection using efficient SVM implementation. 296-301 - Yung-Feng Lu, Chin-Fu Kuo, Shih-Chun Chou, Rong-Sheng Wang:

A secure and efficient multicast protocol for enterprise collaboration systems. 302-307 - In Kyeom Cho, Eul Gyu Im:

Extracting representative API patterns of malware families using multiple sequence alignments. 308-313 - Junhyoung Kim, TaeGuen Kim, Eul Gyu Im:

Structural information based malicious app similarity calculation and clustering. 314-318
Short papers (poster)
- Ajay Kumar Jha, Seungmin Lee, Woo Jin Lee:

Permission-based security in android application: from policy expert to end user. 319-320 - Cristobal Gallegos, Dongwan Shin

:
A novel device for secure home E-voting. 321-323
Software engineering
- Karel Cemus, Tomás Cerný

, Michael J. Donahoo:
Evaluation of approaches to business rules maintenance in enterprise information systems. 324-329 - Karel Cemus, Tomás Cerný

, Lubos Matl, Michael J. Donahoo:
Enterprise information systems: comparison of aspect-driven and MVC-like Approaches. 330-336 - Fumiko Nagoya, Shaoying Liu:

Development of a web-based conference management system using SOFL. 337-342 - Gustav Sourek

, Petr Posik:
Visual data-flow framework of evolutionary computation. 343-348 - Nesrine Mezhoudi, Iyad Khaddam, Jean Vanderdonckt:

WiSel: a mixed initiative approach for widget selection. 349-356 - Harald Sporer:

A model-based domain-specific language approach for the automotive E/E-System design. 357-362 - Martin Tomásek, Tomás Cerný

:
On web services UI in user interface generation in standalone applications. 363-368 - Miroslav Macik, Eva Lorencova, Zdenek Míkovec, Ondrej Rakusan:

Software architecture for a distributed in-hospital navigation system. 369-375 - Clauirton A. Siebra, Michael A. B. Mello:

The importance of replications in software engineering: a case study in defect prediction. 376-381
Short papers (posters)
- Sung Kwan Kang, Joonseub Cha, Sukyung Ban:

Strategy on designing an on-demand training course for university SW education. 382-383
System software
- Shi-Wu Lo, Hong-Yi Lin, Zhengyuan Chen, Yi-Chung Chiang, Tzu-Chieh Shen:

Improving response time after resuming by reorganizing swap space. 384-388 - Chin-Fu Kuo, Yung-Feng Lu, Shih-Chun Chou:

Adjustable deadline assignment for end-to-end tasks. 389-394 - Bongjae Kim

, Hyedong Jung:
LW-RDMA: design and implementation of a lightweight RDMA API for InfiniBand-based clusters. 395-399 - Chin-Hsien Wu, Kuo-Yi Chao:

FAWB: a file-aware write buffer management method for NAND flash memory. 400-405 - Shuichi Oikawa:

MSX: memory storage extension for linux 4.0 and beyond. 406-411 - Kuan-Wen Lin, Ya-Shu Chen:

Online thermal-aware task placement in three-dimensional field-programmable gate arrays. 412-417 - Jen-Jung Cheng, Shih-Hao Hung, Chih Wei Yeh:

Rapid analysis of interprocessor communications on heterogeneous system architectures via parallel cache emulation. 418-423 - Min-Kyu Kim, Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:

Bypassing method for STT-RAM based inclusive last-level cache. 424-429 - Yi-Jung Chen, Chia-Lin Yang

, Ping-Sheng Lin, Yi-Chang Lu
:
Thermal/performance characterization of CMPs with 3D-stacked DRAMs under synergistic voltage-frequency control of cores and DRAMs. 430-436 - Gaku Nakagawa, Shuichi Oikawa:

Multi-level queue NVM/DRAM hybrid memory management with language runtime support. 437-442 - Chi-Sheng Shih

, Guan-Fan Wu:
Distributed meta-routing over heterogeneous networks for M2M/IoT systems. 443-450 - Che-Wei Tsao, Chun-Yi Liu

, Chien-Chung Ho, Tse-Yuan Wang, Po-Chun Huang, Yuan-Hao Chang
, Tei-Wei Kuo
:
Rethinking I/O request management over eMMC-based solid-state drives. 451-456
Short papers (posters)
- Jae-Hoon An, Younghwan Kim, Kiman Jeon:

Design and implement of pre-loading SSD cache data using split file on Hadoop MapReduce. 457-460 - Georg Macher, Rene Obendrauf, Eric Armengaud

, Christian Kreiner
:
Automated generation of basic software configuration of embedded systems. 461-464 - Daeho Kim, Eunseok Choi, Jiman Hong:

System information-based Hadoop load balancing for heterogeneous clusters. 465-467 - Donghee Min, Kiwook Kang, John Kim:

Delay-constrained scheduling for providing guaranteed QoS in a virtual machine environment. 468-469 - Kisu Kim, Taegyu Hwang, Daeshin Park:

Synchronization framework for collecting multimodal bio-sensor data in real-time. 470-471 - Kiwook Kang, Jiman Hong:

A framework for computer interface using EEG and EMG. 472-473 - Taegyu Hwang, Kisu Kim, Chris Sung:

LACS: latency-aware credit scheduler to improve responsiveness. 474-475 - Joonhyouk Jang, Jinman Jung, Yookun Cho:

Analysis of expected processing time for multiple memory backup servers. 476-478 - Jun Ha, Jisup Yoon, Jun Heo, Younghwan Han, Jinman Jung, Young-Sun Yun, Seongbae Eun:

A perspective on the IoT services through a multi-dimensional analysis. 479-481
Software testing
- Levente Erös, Gábor Kovács, Gusztáv Adamis, György Réthy:

Unsupervised test model reconstruction from conformance test logs. 482-488 - Azadeh Rafati, Sai Peck Lee

, Reza Meimandi Parizi, Sima Zamani:
A test-to-code traceability method using .NET custom attributes. 489-496 - Alberto Marroquin, Douglas Gonzalez, Stephane Maag:

A novel distributed testing approach based on test cases dependencies for communication protocols. 497-504
Short papers (posters)
- Oyindamola Olajubu, Suraj Ajit

, Mark Johnson, Scott J. Turner
, Scott Thomson, Mark Edwards:
Automated test case generation from domain specific models of high-level requirements. 505-508 - Karel Frajták, Miroslav Bures

, Ivan Jelínek:
Transformation of IFML schemas to automated tests. 509-511 - Miroslav Bures

:
Framework for assessment of web application automated testability. 512-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














