Abstract is missing.
- Product news summarization for competitor intelligence using topic identification and artificial bee colony optimizationSwapnajit Chakraborti, Shubhamoy Dey. 1-6 [doi]
- Quantile estimation using the theory of stochastic learningAnis Yazidi, Hugo Hammer. 7-14 [doi]
- K-strings algorithm, a new approach based on KmeansViet-Hoang Le, Sung-Ryul Kim. 15-20 [doi]
- A new approach to the edit distance with block swaps using DAWGPhuoc-Hoang-Tuong-Lan Do, Sung-Ryul Kim. 21-26 [doi]
- A fast iterative algorithm for the large-scale toeplitz linear systemsShuichi Yasumura, Lei Li. 27-31 [doi]
- State transition of wind turbines based on empirical inference on model residualsJürgen Herp, Mohammad H. Ramezani. 32-37 [doi]
- Maximum reward collection problem: a cooperative receding horizon approach for dynamic clusteringMohammad Khosravi, Hossein Khodadadi, Amir G. Aghdam, Hassan Rivaz. 38-43 [doi]
- Sequential learning of multi-state autoregressive time seriesMohammad Noshad, Jie Ding, Vahid Tarokh. 44-51 [doi]
- An intelligent decision support system for stock analysis and evaluationHarry Zhou. 52-55 [doi]
- science?Yongjun Zhu, Erjia Yan, Il-Yeol Song. 56-61 [doi]
- A semi-supervised tweet classification method using news articlesBeomseok Hong, Youngsub Han, Yanggon Kim. 62-67 [doi]
- Documents topic classification model in social networks using classifiers voting systemHyeoncheol Lee, Beomseok Hong, Kwangmi Ko Kim. 68-73 [doi]
- A real-time knowledge extracting system from social big data using distributed architectureYoungsub Han, Hyeoncheol Lee, Yanggon Kim. 74-79 [doi]
- Load balancing for hybrid NoSQL database management systemsHan-Sheng Huang, Shih-Hao Hung, Chih Wei Yeh. 80-85 [doi]
- Finding underlying factors for reciprocal trust formationHyun-Kyo Oh, Taehee Lee, Sang-Wook Kim. 86-91 [doi]
- Design of inference rules for plant growth based on ontologyEunji Lee, Jaeuk Lee, PanKoo Kim. 92-95 [doi]
- The evolution of knowledge in communities of practiceVinay Avasthi, Shubhamoy Dey, Kamal Kishore Jain, Rajhans Mishra. 96-101 [doi]
- Prediction of protein stability changes upon one-point mutations using machine learningFrantisek Malinka. 102-107 [doi]
- Improving tweet clustering using bigrams formed from word associationsKhadija Ali Vakeel, Shubhamoy Dey. 108-113 [doi]
- Machine learning-based software classification scheme for efficient program similarity analysisYesol Kim, Jonghyuk Park, Seongje Cho, Yunmook Nah, Sangchul Han, Minkyu Park. 114-118 [doi]
- Malicious behavior pattern mining using control flow graphChang Choi, Xuefeng Piao, Junho Choi, Mungyu Lee, PanKoo Kim. 119-122 [doi]
- Strand specific RNA-seq data for higher specificityJuw Won Park, Julia Chariker, Yi Xing. 123-124 [doi]
- On parameterization of block based copy-move forgery detection techniquesJatin Wadhwa, Talib Ahemad, Ruchira Naskar, Rahul Dixit. 125-130 [doi]
- Fast stereo-based pedestrian detection using hypothesesMinsung Kang, Young-Chul Lim. 131-135 [doi]
- Similarity between real faces and facial videos from a display device: a face recognition perspectiveMi-Young Cho, Young-Sook Jeong, Byung Tae Chun. 136-140 [doi]
- Real-time multiple object tracking in particle filtering framework using codebook model and adaptive labelingZhenhai Wang, Bo Xu, FuHai Huang. 141-145 [doi]
- An online multi-object tracking approach by adaptive labeling and kalman filterZhenhai Wang, Xiaoyu Jiang, Bo Xu, Kicheon Hong. 146-151 [doi]
- A spatial-temporal hole filling approach with background modeling and texture synthesis for 3D videoHuu-Noi Doan, Beomsu Kim, Min-Cheol Hong. 152-157 [doi]
- Video stabilization based on the detection and alpha-trimmed means smoothing filtering of undesirable motionJinju Lim, Beomsu Kim, Min-Cheol Hong. 158-163 [doi]
- Hybrid model for object orientation classificationAustin Hanson, George Hamer, Sung Y. Shin. 164-171 [doi]
- Computer aided breast cancer diagnosis system with fuzzy multiple-parameter support vector machineChulwoo Pack, Sung Y. Shin, Seong-Ho Son, Soon-Ik Jeon. 172-176 [doi]
- Variability measurement for breast cancer classification of mammographic massesG. C. Sailesh, Ravi Kasaudhan, Tae K. Heo, Hyung D. Choi. 177-182 [doi]
- Similarity measurement with mesh distance fourier transform in 2D binary imageRavi Kasaudhan, Tae K. Heo, Soon-Ik Jeon, Seong-Ho Son. 183-187 [doi]
- Breast cancer classification of mammographic masses using improved shape featuresG. C. Sailesh, Chulwoo Pack, Sung Y. Shin, Hyung D. Choi. 188-194 [doi]
- Pyramidal channel features for pedestrian detectorYoung-Chul Lim, Minsung Kang. 195-199 [doi]
- Two-step clustering of SIFT keypoints and relaxation based matching of clustersSunmin Lee, Yong Cheol Kim. 200-204 [doi]
- Hybrid image using image morphingJinsuk Yang, Haoxu Zheng, Kyoungsu Oh. 205-209 [doi]
- Reflection invariant local binary patterns for image texture classificationEnmin Song, Ning Pan, Chih-Cheng Hung, Xiang Li, Lianghai Jin. 210-215 [doi]
- An efficient cross-layer reliable retransmission scheme for the human body shadowing in IEEE 802.15.6-based wireless body sensor networksHsueh-Wen Tseng, Ruei-Yu Wu, Yi-Zhang Wu, Shih-Chun Chou. 216-222 [doi]
- Semi-definite programming-based localization algorithm in networks with inhomogeneous transmission mediumEsmaeil S. Nadimi, Jürgen Herp, Mohammad H. Ramezani. 223-226 [doi]
- Unified quantization parameter and frame size control for quality of experience optimization in wireless multimedia communicationsWei Wang 0015, Shivangi Pyasi, Kazem Sohraby, James Dudek. 227-230 [doi]
- Energy-aware selective compression scheme for solar energy based wireless sensor networksMin-Jae Kang, Semi Jeong, Dong Kun Noh. 231-236 [doi]
- Adaptive intra-body channel modeling of attenuation coefficient using transmission line theoryMohammad H. Ramezani, Victoria Blanes-Vidal, Esmaeil S. Nadimi. 237-241 [doi]
- On selecting composite network-cloud services: a quality-of-service based approachMinkailu Mohamed Jalloh, Shitong Zhu, Fang Fang, Jun Huang. 242-246 [doi]
- A case study of data transfer efficiency optimization for GPU- and infiniband-based clustersBongjae Kim, Hyedong Jung. 247-250 [doi]
- An algorithm on constructing routing-based multiple CDSs to prolong lifetime of WSNDeqian Fu, Zifen Yang, Lihua Han, Seong Tae Jhang. 251-255 [doi]
- Evaluating interest/data propagation in vehicular named data networksSafdar Hussain Bouk, Muhammad Azfar Yaqub, Syed Hassan Ahmed, Dongkyun Kim. 256-259 [doi]
- An indoor positioning method using a combination of the triangulation and fingerprinting techniquesEunkyeung Jae, Chang Kim. 260-261 [doi]
- P-adic data typeXinkai Li, Chao Lu. 262-267 [doi]
- ScanMe mobile: a local and cloud hybrid service for analyzing APKsYevgeniy Cole, Hanlin Zhang, Linqiang Ge, Sixiao Wei, Wei Yu, Chao Lu, Genshe Chen, Dan Shen, Erik Blasch, Khanh D. Pham. 268-273 [doi]
- Detecting trigger-based behaviors in botnet malwareByeongho Kang, Jisu Yang, Jaehyun So, Czang Yeob Kim. 274-279 [doi]
- Context-aware Role-based Access Control Using Security LevelsMichal Trnka, Tomás Cerný. 280-284 [doi]
- Software similarity analysis based on dynamic stack usage patternsJeonghyeok Park, Daeyeon Son, Dongwoo Kang, Jongmoo Choi, Gwangil Jeon. 285-290 [doi]
- PageRank in malware categorizationBoojoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer. 291-295 [doi]
- Behavioural malware detection using efficient SVM implementationOndrej Pluskal. 296-301 [doi]
- A secure and efficient multicast protocol for enterprise collaboration systemsYung-Feng Lu, Chin-Fu Kuo, Shih-Chun Chou, Rong-Sheng Wang. 302-307 [doi]
- Extracting representative API patterns of malware families using multiple sequence alignmentsIn Kyeom Cho, Eul-Gyu Im. 308-313 [doi]
- Structural information based malicious app similarity calculation and clusteringJunhyoung Kim, Taeguen Kim, Eul-Gyu Im. 314-318 [doi]
- Permission-based security in android application: from policy expert to end userAjay Kumar Jha, Seungmin Lee, Woo Jin Lee. 319-320 [doi]
- A novel device for secure home E-votingCristobal Gallegos, Dongwan Shin. 321-323 [doi]
- Evaluation of approaches to business rules maintenance in enterprise information systemsKarel Cemus, Tomás Cerný, Michael J. Donahoo. 324-329 [doi]
- Enterprise information systems: comparison of aspect-driven and MVC-like ApproachesKarel Cemus, Tomás Cerný, Lubos Matl, Michael J. Donahoo. 330-336 [doi]
- Development of a web-based conference management system using SOFLFumiko Nagoya, Shaoying Liu. 337-342 [doi]
- Visual data-flow framework of evolutionary computationGustav Sourek, Petr Posik. 343-348 [doi]
- WiSel: a mixed initiative approach for widget selectionNesrine Mezhoudi, Iyad Khaddam, Jean Vanderdonckt. 349-356 [doi]
- A model-based domain-specific language approach for the automotive E/E-System designHarald Sporer. 357-362 [doi]
- On web services UI in user interface generation in standalone applicationsMartin Tomasek, Tomás Cerný. 363-368 [doi]
- Software architecture for a distributed in-hospital navigation systemMiroslav Macik, Eva Lorencova, Zdenek Mikovec, Ondrej Rakusan. 369-375 [doi]
- The importance of replications in software engineering: a case study in defect predictionClauirton A. Siebra, Michael A. B. Mello. 376-381 [doi]
- Strategy on designing an on-demand training course for university SW educationSung Kwan Kang, Joon Seup Cha, Su Kyung Ban. 382-383 [doi]
- Improving response time after resuming by reorganizing swap spaceShi-Wu Lo, Hong-Yi Lin, Zhengyuan Chen, Yi-Chung Chiang, Tzu-Chieh Shen. 384-388 [doi]
- Adjustable deadline assignment for end-to-end tasksChin-Fu Kuo, Yung-Feng Lu, Shih-Chun Chou. 389-394 [doi]
- LW-RDMA: design and implementation of a lightweight RDMA API for InfiniBand-based clustersBongjae Kim, Hyedong Jung. 395-399 [doi]
- FAWB: a file-aware write buffer management method for NAND flash memoryChin-Hsien Wu, Kuo-Yi Chao. 400-405 [doi]
- MSX: memory storage extension for linux 4.0 and beyondShuichi Oikawa. 406-411 [doi]
- Online thermal-aware task placement in three-dimensional field-programmable gate arraysKuan-Wen Lin, Ya-Shu Chen. 412-417 [doi]
- Rapid analysis of interprocessor communications on heterogeneous system architectures via parallel cache emulationJen-Jung Cheng, Shih-Hao Hung, Chih Wei Yeh. 418-423 [doi]
- Bypassing method for STT-RAM based inclusive last-level cacheMin-Kyu Kim, Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. 424-429 [doi]
- Thermal/performance characterization of CMPs with 3D-stacked DRAMs under synergistic voltage-frequency control of cores and DRAMsYi-Jung Chen, Chia-Lin Yang, Ping-Sheng Lin, Yi-Chang Lu. 430-436 [doi]
- Multi-level queue NVM/DRAM hybrid memory management with language runtime supportGaku Nakagawa, Shuichi Oikawa. 437-442 [doi]
- Distributed meta-routing over heterogeneous networks for M2M/IoT systemsChi-Sheng Shih, Guan-Fan Wu. 443-450 [doi]
- Rethinking I/O request management over eMMC-based solid-state drivesChe-Wei Tsao, Chun-Yi Liu, Chien-Chung Ho, Tse-Yuan Wang, Po-Chun Huang, Yuan-Hao Chang, Tei-Wei Kuo. 451-456 [doi]
- Design and implement of pre-loading SSD cache data using split file on Hadoop MapReduceJae-Hoon An, Younghwan Kim, Kiman Jeon. 457-460 [doi]
- Automated generation of basic software configuration of embedded systemsGeorg Macher, Rene Obendrauf, Eric Armengaud, Christian Kreiner. 461-464 [doi]
- System information-based Hadoop load balancing for heterogeneous clustersDaeho Kim, Eunseok Choi, Jiman Hong. 465-467 [doi]
- Delay-constrained scheduling for providing guaranteed QoS in a virtual machine environmentDonghee Min, Kiwook Kang, John Kim. 468-469 [doi]
- Synchronization framework for collecting multimodal bio-sensor data in real-timeKisu Kim, Taegyu Hwang, Daeshin Park. 470-471 [doi]
- A framework for computer interface using EEG and EMGKiwook Kang, Jiman Hong. 472-473 [doi]
- LACS: latency-aware credit scheduler to improve responsivenessTaegyu Hwang, Kisu Kim, Chris Sung. 474-475 [doi]
- Analysis of expected processing time for multiple memory backup serversJoonhyouk Jang, Jinman Jung, Yookun Cho. 476-478 [doi]
- A perspective on the IoT services through a multi-dimensional analysisJun Ha, Jisup Yoon, Jun Heo, Younghwan Han, Jinman Jung, Young-Sun Yun, Seongbae Eun. 479-481 [doi]
- Unsupervised test model reconstruction from conformance test logsLevente Erös, Gábor Kovács, Gusztáv Adamis, György Réthy. 482-488 [doi]
- A test-to-code traceability method using .NET custom attributesAzadeh Rafati, Sai Peck Lee, Reza Meimandi Parizi, Sima Zamani. 489-496 [doi]
- A novel distributed testing approach based on test cases dependencies for communication protocolsAlberto Marroquin, Douglas Gonzalez, Stephane Maag. 497-504 [doi]
- Automated test case generation from domain specific models of high-level requirementsOyindamola Olajubu, Suraj Ajit, Mark Johnson, Scott Turner, Scott Thomson, Mark Edwards. 505-508 [doi]
- Transformation of IFML schemas to automated testsKarel Frajták, Miroslav Bures, Ivan Jelínek. 509-511 [doi]
- Framework for assessment of web application automated testabilityMiroslav Bures. 512-514 [doi]