Abstract is missing.
- Dissimilarity and retrieval of time-varying data towards big data analysisTeruhisa Hochin. 1 [doi]
- Empowering patient through personal healthcare system using interoperable electronic health recordYeong-Tae Song. 3 [doi]
- Knowledge mining for cognitive agents through path based forward checkingTanvir Atahary, Tarek M. Taha, Fredrick Webber, Scott Douglass. 5-12 [doi]
- Survivability prediction of web system based on log statisticsJiaan Zhou, Huaikou Miao, Jinyu Kai, Kun Zhao, Honghao Gao. 13-18 [doi]
- Multithreading MAS for real time schedulingYaroslav Shepilov, Daria Pavlova, Daria Kazanskaia, Valerii Novikov. 19-24 [doi]
- Optimizing strassen matrix multiply on GPUsAyaz ul Hasan Khan, Mayez Al-Mouhamed, Allam Fatayer. 25-30 [doi]
- Evaluation of global synchronization for iterative algebra algorithms on many-coreAyaz ul Hasan Khan, Mayez Al-Mouhamed, Lutfi A. Firdaus. 31-36 [doi]
- A computational study on different penalty approaches for constrained optimization in radiation therapy treatment planning with a simulated annealing algorithmSadegh Mohammadi, Charles Shang, Zoubir Ouhib, Theodora Leventouri, Georgios Kalantzis. 37-42 [doi]
- An efficient multi query system for content based image retrieval using query replacementE. R. Vimina, K. Ramakrishnan, Navya Nandakumar, K. Poulose Jacob. 43-47 [doi]
- SIMD vectorization of nested loop based on strip miningJinlong Xu, Huihui Sun, Rongcai Zhao. 49-55 [doi]
- Application of improved core vector machine in the prediction of algal blooms in Tolo HarbourXiu Li, Jin Yu, Zhuo Jia, Huimin Wang. 57-62 [doi]
- A term weighting scheme based on the measure of relevance and distinction for text categorizationJieming Yang, Jing Wang, Zhiying Liu, Zhaoyang Qu. 63-68 [doi]
- A variety weapons and armors design algorithm for role-playing gamesJung-Ying Wang. 69-73 [doi]
- Bayesian network and response surface methodology for prediction and improvement of bacterial metabolite productionLobna Bouchaala, Saoussen Ben Khedher, Hela Mezghanni, Nabil Zouari, Slim Tounsi. 75-80 [doi]
- Advance quantum based binary neural network learning algorithmOm Prakash Patel, Aruna Tiwari. 81-86 [doi]
- A genetic clustering technique for Anomaly-based Intrusion Detection SystemsNaila Belhadj Aissa, Mohamed Guerroumi. 87-92 [doi]
- High performance declarative memory systems through MapReduceMark Edmonds, Tanvir Atahary, Tarek M. Taha, Scott A. Douglass. 93-100 [doi]
- Analysis and classification of respiratory health risks with respect to air pollution levelsRuhul Amin Dicken, S. A. M. Fazle Rubby, Sheefta Naz, A. M. Arefin Khaled, Shuvo Ashish Rahman, Sharmina Rahman, Rashedur M. Rahman. 101-106 [doi]
- Applying data mining techniques to predict annual yield of major crops and recommend planting different crops in different districts in BangladeshA. T. M. Shakil Ahamed, Navid Tanzeem Mahmood, Nazmul Hossain, Mohammad Tanzir Kabir, Kallal Das, Faridur Rahman, Rashedur M. Rahman. 107-112 [doi]
- Video gender recognition using temporal coherent face descriptorWei Cheng Wang, Ru-Yun Hsu, Chun-Rong Huang, Li-You Syu. 113-118 [doi]
- Software integration in global software development: Success factors for GSD vendorsMuhammad Ilyas Azeem, Siffat Ullah Khan. 119-124 [doi]
- On the robustness of measurement of reliability stopping criterion in turbo iterative decodingRoslina Mohamad, Harlisya Harun, Makhfudzah Mokhtar, Wan Azizun Wan Adnan, Kaharudin Dimyati. 125-129 [doi]
- Performance analysis of outdoor wireless mesh network using B.A.T.M.A.N. advancedNuzli Mohamad Anas, Faiz Kamil Hashim, Hafizal Mohamad, Mohd Hafiz Baharudin, Mohd Pazli Sulong. 131-134 [doi]
- Secure object tracking protocol for Networked RFID SystemsBiplob Ray, Morshed Howdhury, Jemal Abawajy, Monika Jesmin. 135-141 [doi]
- Multicast-based replication for Hadoop HDFSJiadong Wu, Bo Hong. 143-148 [doi]
- Load balancing of P2P MMORPG systems with hierarchical area-of-interest managementSatoshi Fujita. 149-154 [doi]
- A novel approach to maximize the sum-rate for MIMO broadcast channelsM. Arif Khan, Rafiqul Islam, Morshed Chowdhury. 155-159 [doi]
- Quality of service based cross layer routing protocol for VANETsSabih ur Rehman, M. Arif Khan, Tanveer A. Zia, M. Jafer. 161-166 [doi]
- Power analysis for clock fluctuation LSIYusuke Nozaki, Toshiya Asai, Kensaku Asahi, Masaya Yoshikawa. 167-170 [doi]
- Improvement of an ID-based proxy signature scheme without trusted PKGLimin Sha. 171-174 [doi]
- Portable parallelized blowfish via RenderScriptSpencer Davis, Brandon Jones, Hai Jiang. 175-180 [doi]
- HBase fine grained access control with extended permissions and inheritable rolesYan-yan Lai, Quan Qian. 181-185 [doi]
- Realization of FGAC model using XACML policy specificationMuhammad Awais Shibli, Rahat Masood, Umme Habiba. 187-192 [doi]
- An evaluation of writeprint matching method to identify the authors of Thai online messagesRangsipan Marukatat, Siravich Khongrod. 193-197 [doi]
- Active learning for the prediction of prosodic phrase boundaries in Chinese speech synthesis systems using conditional random fieldsZiping Zhao, Xirong Ma. 199-203 [doi]
- GT-kernelPLS: Game theory based hybrid gene selection method for microarray data classificationAdnan Shakoor, Qinke Peng, Shiquan Sun, Xiao Wang, Jia Lv. 205-210 [doi]
- Extracting news content with visual unit of web pagesWenhao Zhu, Song Dai, Yang Song, Zhiguo Lu. 211-215 [doi]
- Extreme learning machines in the field of text classificationRajendra Kumar Roul, Ashish Nanda, Viraj Patel, Sanjay Kumar Sahay. 217-223 [doi]
- Data mining techniques to analyze the reason for home birth in BangladeshFahim Jawad, Tawsif Ur Rahman Choudhury, Ahmad Najeeb, Mohammed Faisal, Fariha Nusrat, Rubaiya Chamon Shamita, Rashedur M. Rahman. 225-230 [doi]
- A machine learning strategy for predicting march madness winnersJordan Gumm, Andrew Barrett, Gongzhu Hu. 231-236 [doi]
- Rough sets attribute reduction using an accelerated genetic algorithmAbdel-Rahman Hedar, Mohamed Adel Omar, Adel A. Sewisy. 237-243 [doi]
- Hybrid evolutionary algorithms for data classification in intrusion detection systemsAbdel-Rahman Hedar, Mohamed A. Omer, Ahmed F. Al-Sadek, Adel A. Sewisy. 245-251 [doi]
- BFC: High-performance distributed big-file cloud storage based on key-value storeThanh Trung Nguyen, Tin Khac Vu, Minh Hieu Nguyen. 253-258 [doi]
- Flood sensing framework by Arduino and Wireless Sensor Network in Rural-RwandaVianney Vunabandi, Ryuji Matsunaga, Sandor Markon, Nsabiyumva Willy. 259-264 [doi]
- Bidirectional confidential with bilateral filter on local based optical flow for image reconstruction under noisy conditionDarun Kesrarat, Vorapoj Patanavijit. 265-268 [doi]
- Accelerating the pre-processing stages of JPEG encoder on a heterogenous system using OpenCLNasser Alqudami, Shin-Dug Kim. 269-274 [doi]
- Perceived fairness on service recovery satisfaction and on positive behavioral intentions in cloud serviceMontri Lawkobkit, Ravipa Larpsiri. 275-281 [doi]
- Development of scaling mechanism for distributed Web systemAkihiko Horiuchi, Keizo Saisho. 283-288 [doi]
- Various "aaS" of everything as a serviceYucong Duan, Yuan Cao, Xiaobing Sun. 289-294 [doi]
- Empowering patients using cloud based personal health record systemYeong-Tae Song, Sungchul Hong, Jinie Pak. 295-300 [doi]
- The application of graph algorithms: A reference mapping toolChunning Wang, Shaochun Xu, Lichao Chen, Jiayu Li. 301-306 [doi]
- Design and evaluation of database and API supporting Shogi learners on the InternetRyo Miura, Toshiki Kinuhata, Shinji Ohara, Hiroyuki Tarumi, Toshihiro Hayashi, Junko Ichino. 307-312 [doi]
- Reducing mobile device energy consumption with computation offloadingHao Qian, Daniel Andresen. 313-320 [doi]
- A hybrid communication approach for disaster recovery systemTanapat Ruengsatra, Kulit Na Nakorn, Krerk Piromsopa, Kultida Rojviboonchai. 321-326 [doi]
- An energy efficient and optimal randomized clustering for wireless sensor networksKyung Tae Kim, Man Youn Kim, Jihyeon Choi, Hee Yong Youn. 327-332 [doi]
- Reducing connection failure in mobility management for LTE HetNet using MCDM algorithmXianda Chen, Youngho Suh, Seung-Wan Kim, Hee Yong Youn. 333-338 [doi]
- An integrated optimization model for wireless access point deployment construction, and enhancementChen-Shu Wang, Shiang-Lin Lin. 339-344 [doi]
- Complex brain network of patients with epilespy using cascading failure analysis of fMRI dataMing Ke, Xiaoxin Duan, Fan Zhang, Xiaoping Yang. 345-350 [doi]
- Dynamic user-level CPU allocation for volunteer computing in CFS-based scheduler environmentKorakit Seemakhupt, Krerk Piromsopa. 351-355 [doi]
- NVM/DRAM hybrid memory management with language runtime support via MRW queueGaku Nakagawa, Shuichi Oikawa. 357-362 [doi]
- Experimental design of high performance non volatile main memory swapping using DRAMHirotaka Kawata, Shuichi Oikawa. 363-368 [doi]
- MPDBS: A multi-level parallel database system based on B-TreeLei Yu, Ge Fu, Yan Jin, Xiaojia Xiang, Huaiyuan Tan, Hong Zhang, Xinran Liu, Xiaobo Zhu. 369-375 [doi]
- Trend of centralization in Bitcoin's distributed networkAlireza Beikverdi, JooSeok Song. 377-382 [doi]
- Cold data eviction using node congestion probability for HDFS based on Hybrid SSDNa Young Park, Byung Jun Lee, Kyung Tae Kim, Hee Yong Youn. 383-388 [doi]
- An Abelian group model of commutative data dependence relations for the iteration space slicingHong Yao, Huifang Deng. 389-394 [doi]
- A simulation study of heuristic node reordering for collective I/OKwangho Cha, Sungho Kim. 395-401 [doi]
- Data layout transformation for structure vectorization on SIMD architecturesPeng-yuan Li, Qing-Hua Zhang, Rong-cai Zhao, Hai-ning Yu. 403-409 [doi]
- Study and performance analysis of various VM placement strategiesMohammed Rashid Chowdhury, Mohammad Raihan Mahmud, Rashedur M. Rahman. 411-416 [doi]
- Virtual cloud bank: An architectural approach for intermediating cloud servicesJoonseok Park, Youngmin An, Keynhyuk Yeom. 417-422 [doi]
- A software binding application tool based on the orthogonal variability description language for software product line developmentGyeongmin Go, Sungwon Kang, Jongsun Ahn. 423-430 [doi]
- A sewage outfall management system based on WebGIS: Design and implementXiu Li, Zhuo Jia, Jin Yu, ZhiXiong Yang. 431-435 [doi]
- Test oracles based on metamorphic relations for image processing applicationsTahir Jameel, Mengxiang Lin, Liu Chao. 437-442 [doi]
- Test suite reduction for mutation testing based on formal concept analysisLiPing Li, Honghao Gao. 443-447 [doi]
- Overview of graphical operational profiles for generating test cases of GUI softwareYuma Namba, Shun Akimoto, Tomohiko Takagi. 449-451 [doi]
- Test case selection technique for regression testing using differential control flow graphsShun Akimoto, Rihito Yaegashi, Tomohiko Takagi. 453-455 [doi]
- Overview of a place/transition net-based mutation testing framework to obtain test cases effective for concurrent softwareTomohiko Takagi, Takuya Arao. 457-459 [doi]
- Revitalizing the Afghan educational assessment paradigm through ICTSokout Hamidullah, Ahmadi Abdul Rashid, Gharanai Mohammad Hanif, Paracha Samiullah. 461-466 [doi]
- Web application security vulnerabilities detection approaches: A systematic mapping studySajjad Rafique, Mamoona Humayun, Bushra Hamid, Ansar Abbas, Muhammad Akhtar, Kamil Iqbal. 469-474 [doi]
- Web news ranking for elementary school children based on degree of SNS users' attention and popular search queries among childrenShoya Tanaka, Kazuaki Ando. 475-478 [doi]
- Considering block popularity in disk cache replacement for enhancing hit ratio with solid state driveYonjoong Ryou, Byungjun Lee, Sang Hyun Yoo, Hee Yong Youn. 479-484 [doi]
- Toward conceptual representation of patternsSabah Al-Fedaghi, Mohamad Almutairy. 485-492 [doi]
- Incorporating trust relationships in collaborative filtering recommender systemXiao Shen, Haixia Long, Cuihua Ma. 493-500 [doi]
- A comparison of driving behaviour prediction algorithm using multi-sensory data on a smartphoneThunyasit Pholprasit, Worasit Choochaiwattana, Chalermpol Saiprasert. 501-506 [doi]
- A new algorithm for m-closest keywords query over spatial Web with grid partitioningYuan Qiu, Tadashi Ohmori, Takahiko Shintani, Hideyuki Fujita. 507-514 [doi]
- Fields for efficient analysis of big dataTeruhisa Hochin, Hiroki Nomiya. 515-520 [doi]
- Document similarity computation by combining multiple representation modelsJiyi Li, Toshiyuki Shimizu, Masatoshi Yoshikawa. 521-526 [doi]
- Effect of color of a character on its impressionYui Nonomura, Teruhisa Hochin, Hiroki Nomiya. 527-532 [doi]
- Method of introducing appropriate respondents to questions at question-and-answer sitesYuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya. 533-538 [doi]
- Design and evaluation of automated scoring Java programming assignmentsYuki Akahane, Hiroki Kitaya, Ushio Inoue. 539-544 [doi]
- A study of pupil detection and tracking by image processing techniques for a human eye-computer interaction systemRyo Shimata, Yoshihiro Mitani, Tsumoru Ochiai. 545-548 [doi]
- Service and billing management method of interactive communication servicesMotoi Iwashita, Shigeaki Tanimoto. 549-554 [doi]
- A method of safe and efficient editing in tabular forms using a descriptive grammar of semantic structuresHiroyuki Aoki, Lina Zhang, Yasuhiko Morimoto, Shoichi Nakamura, Youzou Miyadera. 555-560 [doi]
- A model for the connectedness of stones in the game of GoMasafumi Sato, Koichi Anada, Masayoshi Tsutsumi. 561-566 [doi]
- A formalization of financial statements with heterogeneous parts by graph grammarsKoushi Anzai, Takeo Yaku, Ken Yokota. 567-570 [doi]
- Improvement of multiple CP/CPS based on level of assurance for campus PKI deploymentShigeaki Tanimoto, Toshihiko Moriya, Hiroyuki Sato, Atsushi Kanai. 571-575 [doi]
- Risk assessment of social-media utilization in an enterpriseShigeaki Tanimoto, Kenichi Ohata, Shoichi Yoneda, Motoi Iwashita, Hiroyuki Sato, Yoshiaki Seki, Atsushi Kanai. 577-580 [doi]
- Proposal of debate assistant system for improving the ability of externalization and response in conversationZhong wei Xu, Yasuo Miyoshi. 581-582 [doi]
- Active S-quiz: An intelligent educational system for basic knowledge learning by question-posingToshihiro Hayashi, Shimpei Nakagawa, Takuya Kishimoto, Yuji Hirai, Kazuhiro Ura, Rihito Yaegashi, Hiroshi Murai, Hiroyuki Tarumi. 583-586 [doi]
- A study of load-balancing strategy based on students' action on university cooperative e-LearningHiroshi Murai, Kazuhiro Ura, Norifumi Suehiro, Rihito Yaegashi, Yoshiro Imai, Keizo Saisho, Toshihiro Hayashi. 587-590 [doi]
- Development of the creating system for lecture contents by combining the lecture materialsKeima Kumano, Toshihiro Hayashi, Kazuhiro Uenosono, Ryosuke Takata, Hiroshi Murai, Rihito Yaegashi. 591-592 [doi]
- A system which manages lecture materials using meta data of lecture materialsRyosuke Takata, Ryo Oooka, Toshihiro Hayashi, Keima Kumano, Hiroshi Murai, Rihito Yaegashi. 593-595 [doi]
- Research on mid-long term load forecasting based on combination forecasting modeYao-Min, Zhao Min, Xiao-hui, Wang Dongyue. 597-601 [doi]
- Graphical models for the recognition of Arabic continuous speech based triphones modelingElyes Zarrouk, Yassine Benayed, Faiez Gargouri. 603-608 [doi]
- A chain algorithm for conformance testing based on UIO sequencesWeiwei Lin, Hongwei Zeng. 611-616 [doi]
- Formal verification of internal block diagram of SysML for modeling real-time systemSajjad Ali, Muhammad Abdul Basit Ur Rahim, Fahim Arif. 617-622 [doi]
- The method to create test suite based on operational profiles for combination test of statusHisashi Fukutake, Liang Xu, Tomohiko Takagi, Ryota Watanabe, Rihito Yaegashi. 623-626 [doi]
- A new and fast variant of the strict strong coloring based graph distribution algorithmNousseiba Guidoum, Meriem Bensouyad, Djamel-Eddine Saïdouni. 627-631 [doi]
- A method for service and billing management using connection pathsMotoi Iwashita, Shigeaki Tanimoto. 632-638 [doi]
- IoT-academia architecture: A profound approachHany F. Elyamany, Amer H. AlKhairi. 639-643 [doi]
- Analysis process for context aware applications in pervasive environmentsNesrine Khabou, Ismael Bouassida Rodriguez. 644-651 [doi]
- Wireless sensor networks modeling as a probabilistic combinatorial optimization problemAfef Ghabri, Monia Bellalouna. 652-656 [doi]
- The EventB2PN Tool: From Event-B specification to Petri Nets through model transformationMohamed Garoui, Belhassen Mazigh, Abderrafiaa Koukam. 657-663 [doi]
- Rule based inference engine to forecast the prevalence of congenital malformations in live birthsFareeha Choudhry, Usman Qamar, Madeeha Chaudhry. 664-670 [doi]
- Systematic mapping study of missing values techniques in software engineering dataAli Idri, Ibtissam Abnane, Alain Abran. 671-678 [doi]
- Automatic C code manipulation and transformation to rapid embedded systems designEmna Kallel, Yassine Aoudni, Mohamed Abid. 679-683 [doi]
- Comparing AHP and ELECTRE I for prioritizing software requirementsJoao M. Fernandes, Susana Prozil Rodrigues, Lino A. Costa. 684-691 [doi]
- Towards a conceptual framework to support adaptative agent-based systems partitioningChahrazed Labba, Narjès Bellamine-Ben Saoud, Julie Dugdale. 692-696 [doi]
- A branch and bound algorithm for the porbabilistic traveling salesman problemSoumaya Sassi Mahfoudh, Walid Khaznaji, Monia Bellalouna. 697-702 [doi]