Abstract is missing.
- Utilizing texts of picture book reviews for extracting children's behavioral characteristics in language acquisitionHiroshi Uehara, Mizuho Baba, Takehito Utsuro. 1-6 [doi]
- Remote entertainment performances and social feedbacksHiroyuki Tarumi. 1 [doi]
- New fault tolerant strategy of wireless sensor networkAfef Ghabri, Leila Horchani, Monia Bellalouna. 1-6 [doi]
- IT/IS strategic development for journalism system implementation on television industry: Study case on NET television stationHarya Bima Dirgantara. 1-6 [doi]
- Chinese micro-blog sentiment analysis based on semantic features and PAD modelFei Gao, Xiao Sun, Kunxia Wang, Fuji Ren. 1-5 [doi]
- Systematic approaches to embed cycles in balanced hypercubesHsuan-Han Chang, Kuan-Ting Chen, Pao-Lien Lai. 1-5 [doi]
- Frequency-specific alterations of functional hub in generalized tonic-clonic seizureZhe Zhang, Hui-Yan Cheng, Xu-Hui Chen, Chao-Lin Ma. 1-6 [doi]
- Video annotation for players' tactics in sport competitionNa Jia, Chi Xu, Huiqun Zhao. 1-6 [doi]
- A personalized music recommender service based on Fuzzy Inference SystemMd. Saidur Rahman, Md. Saifor Rahman, Shahnewaz Ul Islam Chowdhury, Ashfaq Mahmood, Rashedur M. Rahman. 1-6 [doi]
- An implementation to reduce internal/external interruptions in Agile software development using pomodoro techniqueMintra Ruensuk. 1-4 [doi]
- A multi-facet approach using conceptualization, application, and usability measurement to developing financial learning system for hospitalWitchayarot Jantana, Peraphon Sophatsathit, Achara Chandrachai. 1-5 [doi]
- ACRO: Assignment of channels in reverse order to make arbitrary routing deadlock-freeRyuta Kawano, Hiroshi Nakahara, Seiichi Tade, Ikki Fujiwara, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano. 1-6 [doi]
- Enhancing business process flexibility in an emergency care processAsma Mejri 0002, Sonia Ayachi Ghannouchi, Ricardo Martinho, Feteh Elhadj. 1-6 [doi]
- Design and implementation of ATM alarm data analysis systemYufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang. 1-3 [doi]
- Analysis and control for discrete-time singular systems with interval time-varying delayChing-Min Lee. 1-5 [doi]
- Speech enhancement using magnitude and phase spectrum compensationZhen Li, Wenjin Wu, Qin Zhang, Hui Ren, Shilei Bai. 1-4 [doi]
- Clinical text analysis using machine learning methodsKrishna Prasad Chodey, Gongzhu Hu. 1-6 [doi]
- Identifying the applied obfuscation method towards de-obfuscationHayato Sagisaka, Haruaki Tamada. 1-6 [doi]
- A case study on the misclassification of software performance issues in an issue tracking systemMasao Ohira, Hayato Yoshiyuki, Yosuke Yamatani. 1-6 [doi]
- Method of similarity retrieval of color videos based on impressionsYuya Watanabe, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Tracking with probabilistic background model by density forestsDaimu Oiwa, Shinji Fukui 0001, Yuji Iwahori, Tsuyoshi Nakamura, Manas Kamal Bhuyan. 1-6 [doi]
- A database for emotional interactions of the elderlyKunxia Wang, ZongBao Zhu, Shidong Wang, Xiao Sun, Lian Li. 1-6 [doi]
- Lip reading using a dynamic feature of lip images and convolutional neural networksYiting Li, Yuki Takashima, Tetsuya Takiguchi, Yasuo Ariki. 1-6 [doi]
- Evaluation of diagnosis support methods in program debugging by trace analysis: An exploratory studyIzuru Kume, Masahide Nakamura, Yasuyuki Tanaka, Etsuya Shibayama. 1-6 [doi]
- A simulated login-based SINA microblog data collection method and its data analysisSongsong Zhang, Jing Zhou, Minyong Shi, Chunfang Li. 1-4 [doi]
- RETOP: A retinal topography keypoint descriptorJiung-Yao Huang, Hung-Ya Tsai, Chung-Hsien Tsai. 1-6 [doi]
- Towards detecting and predicting fall events in elderly care using bidirectional electromyographic sensor networkHao Han, Xiaojun Ma, Keizo Oyama. 1-6 [doi]
- An interval control method for status propagation in an autonomous distributed storage systemAtsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama. 1-6 [doi]
- Text analysis of academic papers archived in institutional repositoriesKazushi Okamoto. 1-6 [doi]
- BordaRank: A ranking aggregation based approach to collaborative filteringYeming Tang, Qiuli Tong. 1-6 [doi]
- A deadline-constrained scheduling for dynamic multi-instances parameter sweep workflowKanchana Viriyapant, Sucha Smanchat. 1-6 [doi]
- Research and implementation of knowledge base system for stage art designWenlong Fu, Yaguang Wang, Aina Sui, Mengyi Wu. 1-6 [doi]
- Link prediction using matrix factorization with baggingZhifeng Wu, Yixin Chen. 1-6 [doi]
- The improvement of page sorting algorithm for music users in NutchYing Li, Fei Sha, Shujuan Wang, Tao Hu. 1-4 [doi]
- A nearest neighbor search algorithm for LR-LD on high SNRThae Thae Yu Khine, Koji Araki, Daisuke Mitsunaga, Hua-An Zhao. 1-5 [doi]
- The analysis of coordinate-recorded merge-sort based on the divide-and-conquer methodMenghan Yan, Wenqian Shang, Mengyi Zhang. 1-4 [doi]
- SMT-based scheduling for multiprocessor real-time systemsZhuo Cheng, Haitao Zhang, Yasuo Tan, Yuto Lim. 1-7 [doi]
- A software-based fault detection scheme for wireless sensor networksHsung-Pin Chang, Tsung-Yu Yeh. 1-6 [doi]
- Consideration of validity of concurrency control program generated in genetic programmingFuma Kizu, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Decoding of emotional visual stimuli using fMRI brain signalShinichi Yoshida. 1-4 [doi]
- FPGA-based deep-pipelined architecture for FDTD acceleration using OpenCLHasitha Muthumala Waidyasooriya, Masanori Hariyama. 1-6 [doi]
- Performance evaluation of routing algorithms for distributed key-value store based on order preserving linear hashing and Skip graphKen Higuchi, Naoyuki Miyamoto, Tatsuo Tsuji, Makoto Yoshida, Kento Takehara. 1-6 [doi]
- An evolutionary multi-layer perceptron neural network for solving unconstrained global optimization problemsJui-Yu Wu. 1-6 [doi]
- IT management status in public higher education institutions in ThailandSrinual Nalintippayawong, Kanokwan Atchariyachanvanich. 1-5 [doi]
- News text classification model based on topic modelZhenzhong Li, Wenqian Shang, Menghan Yan. 1-5 [doi]
- Observing the evolution of social network on Weibo by sampled dataLu Ma, Gang Lu, Junxia Guo. 1-5 [doi]
- A new efficient and effective golden-ball-based technique for the capacitated vehicle routing problemKanjana Ruttanateerawichien, Werasak Kurutach, Tantikorn Pichpibul. 1-5 [doi]
- A Li-ion battery charger based on remaining capacity with fuzzy temperature controlBo-Ruei Peng, Shun-Chung Wang, Yi-Hua Liu, Huang Yan-Syun. 1-5 [doi]
- Supplementing Object-Oriented software change impact analysis with fault-proneness predictionBassey Isong, Ohaeri U. Ifeoma, Munienge Mbodila. 1-8 [doi]
- A hybrid cache architecture of shared memory and meta-table used in big multimedia queryYun-Te Lin, Yi-Hao Hsiao, Fang-Pang Lin, Chung-Ming Wang. 1-6 [doi]
- Baseline estimation for serum creatinine for definition of acute kidney injuryYutaka Hatakeyama, Hiromi Kataoka, Noriaki Nakajima, Teruaki Watabe, Yoshiyasu Okuhara. 1-4 [doi]
- Parallel distributed Interactive Genetic Algorithm for composing music melody suited to multiple users' feelingsMakoto Fukumoto, Takeshi Hatanaka. 1-6 [doi]
- Formal verification of security protocols using SpinShengbo Chen, Hao Fu, Huaikou Miao. 1-6 [doi]
- A model-driven development of web applications using AngularJS frameworkWutthichai Chansuwath, Twittie Senivongse. 1-6 [doi]
- Performance improvement of multi-dimensional indexing system for big data analysisKazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Exposing library data with big data technology: A reviewChunning Wang, Shaochun Xu, Lichao Chen, Xuhui Chen. 1-6 [doi]
- Constructing initial design patterns for online social network-based applicationsPiyaphan Pongpradit, Nakornthip Prompoon. 1-7 [doi]
- Searching optimal movements in multi-player games with imperfect informationKenshi Yoshimura, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Text similarity algorithm based on semantic vector space modelLihong Xu, Shutao Sun, Qi Wang. 1-4 [doi]
- Grey wolf optimization algorithm with invasion-based migration operationDuangjai Jitkongchuen, Pongsak Phaidang, Piyalak Pongtawevirat. 1-5 [doi]
- Architecture of an FPGA accelerator for molecular dynamics simulation using OpenCLHasitha Muthumala Waidyasooriya, Masanori Hariyama, Kota Kasahara. 1-5 [doi]
- Chinese text categorization based on deep belief networksJia Song, Sijun Qin, Pengzhou Zhang. 1-5 [doi]
- Selection of an optimum random matrix using a genetic algorithm for acoustic feature extractionYuichiro Kataoka, Toru Nakashika, Ryo Aihara, Tetsuya Takiguchi, Yasuo Ariki. 1-6 [doi]
- Deep learning for stock prediction using numerical and textual informationRyo Akita, Akira Yoshihara, Takashi Matsubara, Kuniaki Uehara. 1-6 [doi]
- Research on the effects of transport protocols on the application performance based on OPNETLei Cai, Yun Pan, Yi-Lin Guo. 1-5 [doi]
- A micro-video recommendation system based on big dataSongtao Shang, Minyong Shi, Wenqian Shang, Zhiguo Hong. 1-5 [doi]
- Influence of outliers on analogy based software development effort estimationKenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto. 1-6 [doi]
- Removing barriers in using personal health record systemsMohammed Abdulkareem Alyami, Yeong-Tae Song. 1-8 [doi]
- A mathematical formulation of the "shicho" in the game of GoMasafumi Sato, Koichi Anada, Masayoshi Tsutsumi. 1-6 [doi]
- The research on event extraction of Chinese news based on subject elementsChi Zhang, Songhong Hong, Pengzhou Zhang. 1-5 [doi]
- Extended mutation score based on weighted place/transition nets to evaluate test suitesTomohiko Takagi, Tatsuki Teramoto. 1-3 [doi]
- Techniques to generate UTP-based test cases from sequence diagrams using M2M (Model-to-Model) transformationYongjin Seo, Eun Young Cheon, Jin-A. Kim, Hyeon Soo Kim. 1-6 [doi]
- A fuzzy hashing technique for large scale software birthmarksTakehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden. 1-6 [doi]
- A development of RDF data transfer and query on Hadoop FrameworkJutamard Kawises, Wiwat Vatanawood. 1-4 [doi]
- Slot assignment for TDMA MAC in industrial wireless sensor networkChing-Lung Chang, Kuan-Yi Ho. 1-5 [doi]
- Static approaches for concept location during software evolutionSimon Xu. 1 [doi]
- Using geofencing for a disaster information systemAkira Suyama, Ushio Inoue. 1-5 [doi]
- A new chaos-based image cipher using a hash functionChong Fu, Ou Bian, Hui-yan Jiang, Li-hui Ge, Hong-feng Ma. 1-9 [doi]
- Performance analysis of HTTP and FTP based on OPNETPan Wei, Zhiguo Hong, Minyong Shi. 1-4 [doi]
- A novel evolutionary algorithm for the homogeneous Probabilistic Traveling Salesman ProblemMichael Manuel Smith, Yun-Shiow Chen. 1-6 [doi]
- Risk assessment of the top five malignancies among males and females with respect to occupation, educational status and smoking habitsRuhul Amin Dicken, S. A. M. Fazle Rubby, Sheefta Naz, A. M. Arefin Khaled, Ashraful Azad, Rashedur M. Rahman. 1-6 [doi]
- Music similarity retrieval method considering music arrangementKenji Kogo, Kyoji Kawagoe, Teruhisa Hochin. 1-6 [doi]
- Meridian ECG information transmission system modeling using NARX neural networkHong He, Xiaowen Yan, Wei Wei. 1-6 [doi]
- A simple population based hybrid harmonic estimation algorithmEmre Oner Tartan, Hamit Erdem. 1-6 [doi]
- VOSync: An implementation of synchronization system for the virtual orchestraChung-Ping Young, Yen-Bor Lin, Ting-Ying Wei. 1-6 [doi]
- Changes in key performance indicators by phase transition in Internet of ThingsArata Koike, Yoshiko Sueda. 1-6 [doi]
- Optimizing color transfer using color similarity measurementWei-Sung Chen, Ming-Long Huang, Chung-Ming Wang. 1-6 [doi]
- GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfitsSumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma. 1-6 [doi]
- A bi-directional sampling based on K-means method for imbalance text classificationJia Song, Xianglin Huang, Sijun Qin, Qing Song. 1-5 [doi]
- A cache memory with unit tile and line accessibilityBaokang Wang, Yuki Fukazawa, Toshio Kondo, Takahiro Sasaki. 1-6 [doi]
- A strategic decision value model for cloud computing in Saudi Arabia's public sectorMohammed Mreea, Kumudu S. Munasinghe, Dharmendra Sharma. 1-7 [doi]
- Data analysis system for online short video commentsNan Yang, Sanxing Cao, Shufan Zhang. 1-6 [doi]
- e-Tegeko: A system that will boost citizens' participation on parliamentary regulations in RwandaRene Kabalisa, Yves Cyuzuzo, Chika Yoshida, Ariane Ingabire. 1-6 [doi]
- Comments recovery approach for Java decompilerSiwadol Sateanpattanakul. 1-6 [doi]
- The research of applying multi-scale calculation to simulate concentration difference polarization appeared during MBR membrane separation processChunqing Li, Kai Liang. 1-6 [doi]
- An executable model and testing for Web software based on live sequence chartsLiPing Li, Honghao Gao, Tang Shan. 1-6 [doi]
- Generating of business rules for Coloured Petri NetsJatuporn Deesukying, Wiwat Vatanawood. 1-6 [doi]
- Implementation and evaluation of BLE proximity detection mechanism for Pass-by FrameworkRyoma Tabata, Arisa Hayashi, Seiki Tokunaga, Sachio Saiki, Masahide Nakamura, Shinsuke Matsumoto. 1-6 [doi]
- A mosaic style rendering method based on fuzzy color modelingMandi Xu, Yuan Liu, Ruimin Lv. 1-6 [doi]
- Vigorous algorithms to control urban vehicle trafficAbdul Mateen, Adia Khalid, Lal Khan, Sehrish Majeed, Tooba Akhtar. 1-5 [doi]
- An elastic group recommendation system designed for multivariate dynamic attributesNaveen Mysore. 1-6 [doi]
- Model-driven approach for self-aware pervasive systemsEva Gerbert-Gaillard, Stéphanie Chollet, Philippe Lalanda. 1-6 [doi]
- An automatic vision-based monitoring system for accurate Vojta-therapyMuhammad Hassan Khan, Julien Helsper, Cong Yang, Marcin Grzegorzek. 1-6 [doi]
- Identifying recurring association rules in software defect predictionTakashi Watanabe, Akito Monden, Yasutaka Kamei, Shuji Morisaki. 1-6 [doi]
- A hybrid news recommendation algorithm based on user's browsing pathChen Li, Zhengtao Jiang. 1-4 [doi]
- Intelligent control scheme for output efficiency improvement of parallel invertersWei-Hao Huang, Shu-Hung Liao, Jen-Hao Teng, Ting-Yen Hsieh, Bo-Ren Lan, Chih-Chieh Chiang. 1-6 [doi]
- Development of River Information Management System according to the participatory sensingTomomichi Hayakawa, Ryo Suzuki, Takayuki Ito. 1-5 [doi]
- Cost-effective index poisoning scheme for P2P file sharing systemsYuusuke Ookita, Satoshi Fujita. 1-6 [doi]
- A multi-layer rectangular dissections and the list structures for the 16-ary grid graphKoichi Anada, Koushi Anzai, Ken Yokota, Takeo Yaku. 1-5 [doi]
- Constructing patterns verification criteria based on quality attributes: Web security context patterns case studyPattariya Singpant, Nakornthip Prompoon. 1-7 [doi]
- The study of APT attack stage modelMeicong Li, Wei Huang, Yongbin Wang, Wenqing Fan, Jianfang Li. 1-5 [doi]
- Effective algorithms for video shot and scene boundaries detectionYi Huo, Yanfeng Wang, Haihe Hu. 1-6 [doi]
- Implementation of massive data processing architecture for electric enterprise groupsLinli Wu, Zhangyi Shen, Xiang Feng. 1-6 [doi]
- Automation system of vehicle requisition in public sector, RwandaYves Cyuzuzo, Rene Kabalisa, Chika Yoshida, Joseph Muvara. 1-6 [doi]
- A biogeography-based optimization algorithm with multiple migrationsWeichao Chai, Hongbin Dong, Jun He, Wenqian Shang. 1-8 [doi]
- An improved method for LSB based color image steganography combined with cryptographyXinyi Zhou, Wei Gong, Wenlong Fu, Lianjing Jin. 1-4 [doi]
- Study on CNN in the recognition of emotion in audio and imagesBin Zhang, Changqin Quan, Fuji Ren. 1-5 [doi]
- Study of the individual english learning and memory based on visualization analysisMengke Cheng, Ligu Zhu, Wenqian Shang, Di Zhang, Yuping Han. 1-5 [doi]
- Smart Time-Division-Multiplexing control strategy for voltage multiplier rectifierBin-Han Liu, Jen-Hao Teng, Yi-Cheng Lin. 1-6 [doi]
- Operator-data type pair based execution environments independent worst-case execution time measuring methodYongjin Seo, Hyeon Soo Kim. 1-6 [doi]
- An alternative technique for populating Thai tourism ontology from texts based on machine learningAurawan Imsombut, Chaloemphon Sirikayon. 1-4 [doi]
- SWTUS: A web tag utility and stability metering methodMin Wang, Yongbin Wang. 1-6 [doi]
- Method for classifying usability qualities and problems for action games from user reviews using text miningArtinat Wattanaburanon, Nakornthip Prompoon. 1-6 [doi]
- Extended differential control flow graphs for the selection of test cases in regression testingShun Akimoto, Shunta Nakanishi, Rihito Yaegashi, Tomohiko Takagi. 1-2 [doi]
- Analysis of information system operation cost based on working time and unit costMasateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino. 1-6 [doi]
- The adoption intentions of mobile applicationsMin-Jhih Cheng, Shiu-Wan Hung, Her-Her Tsai, Ping-Wen Chen. 1-3 [doi]
- Using genetic algorithms for measuring the similarity values between users in collaborative filtering recommender systemsBushra Alhijawi, Yousef Kilani. 1-6 [doi]
- A fast heuristic for the minimum weight vertex cover problemSatoshi Shimizu, Kazuaki Yamaguchi, Toshiki Saitoh, Sumio Masuda. 1-5 [doi]
- Gaits classification of normal vs. patients by wireless gait sensor and Support Vector Machine (SVM) classifierTaro Nakano, Bhargava Teja Nukala, Steven Zupancic, Amanda Rodriguez, Donald Y. C. Lie, Jerry Lopez, Tam Q. Nguyen. 1-6 [doi]
- Emotional element detection and tendency judgment based on mixed model with deep featuresXiao Sun, Chongyuan Sun, Fuji Ren, Fang Tian, Kunxia Wang. 1-6 [doi]
- Risk assessment quantification of social-media utilization in enterpriseShigeaki Tanimoto, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai. 1-6 [doi]
- Similarity retrieval method of plasma emission videosHideki Shiroshita, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi. 1-6 [doi]
- Image generation using generative adversarial networks and attention mechanismYuusuke Kataoka, Takashi Matsubara, Kuniaki Uehara. 1-6 [doi]
- Research on software reliability evaluation technology based on BP neural networkLu Liu, Zhengtao Jiang. 1-4 [doi]
- Research on survivability strategic of operating systemTong Wang, Liang Wang. 1-5 [doi]
- Spatial domain decision based image fusion using superimpositionMaitreyi Abhyankar, Arti Khaparde, Vaidehi Deshmukh. 1-6 [doi]
- The edge-fault tolerant hamiltonian of the balanced hypercubeJianxiang Cao, Wenqian Shang, Minyong Shi. 1-5 [doi]
- Factors affecting the adoption of ICT in malnutrition monitoring. Case study: Western UgandaTweheyo Pius Charles, Chika Yoshida. 1-6 [doi]
- A hosting service of multi-language historage repositoriesKyohei Uemura, Yusuke Saito, Shin Fujiwara, Daiki Tanaka, Kenji Fujiwara, Hajimu Iida, Kenichi Matsumoto. 1-6 [doi]
- A HDRI display algorithm based on image color appearance modelMuzi Sun, Minyong Shi. 1-6 [doi]
- Wireless extension mechanism and logic design for FPGA-based Ethernet Powerlink nodeKailong Zhang, Liang Hu, Panfei Zuo, Xiao Wu, Kejian Miao. 1-7 [doi]
- Indoor environment sensing service in smart city using autonomous sensor boxSeiji Sakakibara, Sachio Saiki, Masahide Nakamura, Shinsuke Matsumoto. 1-6 [doi]
- Application of SVD technology in video recommendation systemMenghan Yan, Wenqian Shang, Zhenzhong Li. 1-5 [doi]
- Research on the performance of segmentation of text classification based on CNICCJun-Peng Gong, Jia Song. 1-3 [doi]
- Digital media platform to connect small and medium enterprises in NairobiVictor Njoroge Ngugi, Chika Yoshida. 1-6 [doi]
- Semi-Supervised learning using adversarial networksRyosuke Tachibana, Takashi Matsubara, Kuniaki Uehara. 1-6 [doi]
- Head pose estimation and movement analysis for speech sceneRinko Komiya, Takeshi Saitoh, Miharu Fuyuno, Yuko Yamashita, Yoshitaka Nakajima. 1-5 [doi]
- A fast image matching technique for the panoramic-based localizationJiung-Yao Huang, Su-Hui Lee, Chung-Hsien Tsai. 1-6 [doi]
- A unified approach to automate geospatial data retrieval using semantic web technologiesYing Zhang, Chaopeng Li, Shaowen Liu, Feng Wen, Liming Du, Hui He. 1-6 [doi]
- Analyzing civic complaints for proactive maintenance in smart cityPreeti Bansal, Durga Toshniwal. 1-6 [doi]
- A collective approach to ranking entities for mentionsShunlin Rong, Mizuho Iwaihara. 1-6 [doi]
- Behavior analysis on mobile-carrier choice considering Mobile Virtual Network OperatorsAkiya Inoue, Motoi Iwashita, Kenichi Kitahara. 1-6 [doi]
- An improvement of partheno-genetic algorithm to solve multiple travelling salesmen problemHonglu Zhou, Mingli Song. 1-6 [doi]
- Parallelization of a series of extreme learning machine algorithms based on sparkTiantian Liu, Zhiyi Fang, Chen Zhao, Yingmin Zhou. 1-5 [doi]
- High dynamic range image composition using a linear interpolation approachYun-Te Lin, Ming-Long Huang, Chung-Ming Wang. 1-6 [doi]
- A diversity sensor connection capability WSN for disaster information gathering systemYoshitaka Torii, Takanobu Otsuka, Takayuki Ito. 1-6 [doi]
- Digital scrum board using leap motionPatsakorn Rittitum, Wiwat Vatanawood, Arthit Thongtak. 1-4 [doi]
- 3D shape recovery of polyp using two light sources endoscopeHiroyasu Usami, Yuki Hanai, Yuji Iwahori, Kunio Kasugai. 1-6 [doi]
- Redistribution mechanism for associative distributed collections of objectsDaisuke Fujishima, Tomio Kamada. 1-6 [doi]
- Solving jigsaw puzzle with symbol matrixesDai Cao, Li-fang Chen, Yuan Liu. 1-6 [doi]
- Optimization of systemic stability of directed network using genetic algorithmPatrick Wan-Hin Luk, Ga Ching Lui, Kwok Yip Szeto. 1-6 [doi]
- Detection of design patterns from class diagram and sequence diagrams using ontologyAttawat Panich, Wiwat Vatanawood. 1-6 [doi]
- The application of factorization machines in user behavior predictionYuqi Wang, Wenqian Shang, Zhenzhong Li. 1-4 [doi]
- A low complexity ZF-based lattice reduction detection using curtailment parameter in MIMO systemsDaisuke Mitsunaga, Thae Thae Yu Khine, Hua-An Zhao. 1-5 [doi]
- A novel parallel FDTD algorithm on Non-Uniform Memory Access multiprocessorsXiaomei Guo. 1-3 [doi]
- Visualization of hierarchicaltransaction networkKohei Arimoto, Hidenori Watanave. 1-4 [doi]
- Items analysis of postal supervisionYufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng. 1-3 [doi]
- SEP performance of triangular QAM with SC and GSC spatial diversity over Rayleigh channelsFurqan Haider Qureshi, Qasim Umar Khan, Shahzad Amin Sheikh. 1-5 [doi]
- Why are people willing to pay for cloud storage service?Chen-Shu Wang, Shiang-Lin Lin. 1-6 [doi]
- Rational number reconstruction using Chinese remainder theorem on GPUToru Fukaya, Tomoyuki Idogawa. 1-6 [doi]
- Estimation of factor scores from feature values of english question and answer statementsYuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Recognition and intensity estimation of facial expression using ensemble classifiersHiroki Nomiya, Shota Sakaue, Teruhisa Hochin. 1-6 [doi]
- Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approachHaitao Zhang, Zhuo Cheng, Cong Tian, Yonggang Lu, Guoqiang Li. 1-6 [doi]
- A new proposal for a multi-objective technique using SMPSO and Tabu searchHouda Abadlia, Nadia Smairi, Khaled Ghédira. 1-6 [doi]
- AspectAda: An aspect oriented extension of ada for real-time systemsWafa Gabsi, Bechir Zalila, Mohamed Jmaiel. 1-6 [doi]
- Extracting representative phrases from Wikipedia article sectionsShan Liu, Mizuho Iwaihara. 1-6 [doi]
- Usage pattern based survivability prediction of web systemXun Lee, Jiaan Zhou, Hao Fu. 1-6 [doi]
- Colors suitable to presentation slidesYui Nonomura, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Pedestrian detection by fusing 3D points and color imagesBen-Zhong Lin, Chien-Chou Lin. 1-5 [doi]
- Learning pedestrian dynamics with krigingKazuhiko Kawamoto, Yoshiyuki Tomura, Kazushi Okamoto. 1-4 [doi]
- An implementation of spatial algorithm to estimate the focus map from a single imageYen-Bor Lin, Chung-Ping Young. 1-5 [doi]
- Network music terminal system design and implementation based on IPTV set-top boxZhen Guo, Ying Li, Weihua Xie, Tao Hu. 1-4 [doi]
- Refinement from service economics planning to ubiquitous services implementationYucong Duan, Qiang Duan, Gongzhu Hu, Xiaobing Sun. 1-6 [doi]
- Speeds of videos considering speeds of objects and backgroundHayato Kumagai, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Automatic extraction of popular music ringtones based on music structure analysisFengyan Wu, Shutao Sun, Weiyao Xue. 1-5 [doi]
- Partially developed coverability graphs for modeling test case execution historiesTomohiko Takagi, Keisuke Noda. 1-2 [doi]
- Proof of violation for availability in cloud systemsGwan-Hwan Hwang, Shang-Yu Yeh. 1-7 [doi]
- TweeVist: A geo-tweet visualization system for web based on spatio-temporal eventsYuanyuan Wang, Yukiko Kawai, Kazutoshi Sumiya, Yoshiharu Ishikawa. 1-6 [doi]
- Cross-lingual link prediction using multimodal relational topic modelsYosuke Sakata, Koji Eguchi. 1-8 [doi]
- Local revitalization model based on soft systems methodologyMotoi Iwashita, Shinichi Kato. 1-6 [doi]
- The discovery and identification of video page based on topic web crawlerXiaojun Ren, Sijun Qin, Peng Zang. 1-4 [doi]
- A diversity reserved quantum particle swarm optimization algorithm for MMKPHongbin Dong, Xue Yang, Xuyang Teng, Yuhai Sha. 1-7 [doi]
- Practices for software integration success factors in GSD environmentMuhammad Ilyas Azeem, Siffat Ullah Khan. 1-6 [doi]
- Research and application of path-finding algorithm based on unity 3DZhang He, Minyong Shi, Chunfang Li. 1-4 [doi]
- Corporate risk estimation by combining machine learning technique and risk measureYushan Hsu, Ming-Fu Hsu, Sin-Jin Lin. 1-4 [doi]
- Generating a werewolf game log digest of inferring each player's roleYouchao Lin, Mizuho Baba, Takehito Utsuro. 1-6 [doi]
- Trust model based on changeable sampling frequency for wireless sensor networkNa Wang, DongQian Liu. 1-4 [doi]
- Deploying service integration agent for personalized smart elderly careSeiki Tokunaga, Hiroyasu Horiuchi, Kazunari Tamamizu, Sachio Saiki, Masahide Nakamura, Kiyoshi Yasuda. 1-6 [doi]
- ICT operational models to view the actual usage of teachers' desk systemsLiang Xu, Ryosuke Takata, Hiroshi Ohta, Tomohiko Takagi, Norifumi Suehiro, Naka Gotoda, Toshihiro Hayashi, Rihito Yaegashi. 1-3 [doi]
- A neural networks based approach for the real-time scheduling of reconfigurable embedded systems with minimization of power consumptionGhofrane Rehaiem, Hamza Gharsellaoui, Samir Ben Ahmed. 1-6 [doi]
- Investment pattern clustering based on online P2P lending platformNianlong Luo, Fan Shen. 1-6 [doi]
- Shaping the Afghan learning settings and power to the learners through a high-tech library management systemMohammad Hanif Gharanai. 1-6 [doi]
- A home-school interaction education platform based on Heterogeneous Data ExchangingLiyun Xiang, Zhiyi Fang. 1-5 [doi]
- OPNET-based analysis of MTU impact on application performanceYi-Lin Guo, Yun Pan, Lei Cai. 1-5 [doi]
- Adaptive food suggestion engine by fuzzy logicTousif Osman, Maisha Mahjabeen, Shahreen Shahjahan Psyche, Afsana Imam Urmi, J. M. Shafi Ferdous, Rashedur M. Rahman. 1-6 [doi]
- Domain ontology concept extraction method based on textYuefeng Liu, Minyong Shi, Chunfang Li. 1-5 [doi]
- Speculative memory: An architectural support for explicit speculations in multithreaded programmingHiroaki Hirata, Atsushi Nunome, Kiyoshi Shibayama. 1-7 [doi]
- Modeling of integrated processes for coking flue gas desulfurization and denitrification based on RBFNNYaning Li, Xuelei Wang, Jie Tan. 1-6 [doi]
- Automatic media content creation system according to an impression by recognition-creation operatorsTakafumi Nakanishi, Ryotaro Okada, Takashi Kitagawa. 1-6 [doi]
- Minority costume image retrieval by fusion of color histogram and edge orientation histogramXu-Mei Shen, Ju-Xiang Zhou, Tian Wei Xu. 1-7 [doi]
- A formal approach for guiding architecture design with data constraintsNaoya Nitta. 1-6 [doi]
- The select and test algorithm for inference in medical diagnostic reasoning: Implementation and evaluation in clinical psychiatryD. A. Irosh P. Fernando, Frans A. Henskens. 1-9 [doi]
- Detect the emotions of the public based on cascade neural network modelXiao Sun, Xiaoqi Peng, Fuji Ren. 1-6 [doi]
- A TV program recommendation system based on big dataMengyi Zhang, Minyong Shi, Zhiguo Hong, Songtao Shang, Menghan Yan. 1-5 [doi]
- Visualization research and implementation based on ATM alarm dataYanwei Lou, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng. 1-4 [doi]
- Parallel online exact sum for Java8Naoshi Sakamoto. 1-8 [doi]
- Improvement of eye detection performance for inside-out cameraWarapon Chinsatitf, Takeshi Saitoh. 1-6 [doi]
- Toward connected personal healthcare: Keynote addressYeong-Tae Song. 1-2 [doi]
- Basic construction of a natural finger outline extraction system with a color gloveNoriaki Fujishima, Tatsuhiro Ietsuka. 1-6 [doi]
- Image retrieval system based on bag of view words modelCheng Feng, Xiaohong Wang. 1-4 [doi]
- The research of retrieval keyword analysis on stage's design knowledge baseWenlong Fu, Lianjing Jin, Wei Gong, Kemin Wang. 1-4 [doi]
- Design and application of novel morphological filter used in vehicle detectionMunkhjargal Gochoo, Damdinsuren Bayanduuren, Uyangaa Khuchit, Galbadrakh Battur, Tan-Hsu Tan, Sy-Yen Kuo, Shih-Chia Huang. 1-5 [doi]
- Analysis of Optimum Crop Cultivation using Fuzzy SystemFahim Jawad, Tawsif Ur Rahman Choudhury, S. M. Asif Sazed, Shamima Yasmin, Kanaz Iffat Rishva, Fouzia Tamanna, Rashedur M. Rahman. 1-6 [doi]
- Falling in love with online shopping carnival on singles' day in China: An uses and Gratifications perspectiveJen-Her Wu, Lifang Peng, Qi Li, Yi-Cheng Chen. 1-6 [doi]
- AKIHelper: Acute kidney injury diagnostic tool using KDIGO guideline approachIssariya Uboltham, Nakornthip Prompoon, Wirichada Pan-ngum. 1-6 [doi]
- Translating OpenACC to LLVM IR with SPIR kernelsHao-Wei Peng, Jean Jyh-Jiun Shann. 1-6 [doi]
- A real-time GPU-based coupled fluid-structure simulation with haptic interactionJiachao Zhang, Shunpei Yuasa, Shinji Fukuma, Shin-ichiro Mori. 1-6 [doi]
- Visibility evaluation experiments of optical wireless pedestrian-support system using self-illuminating bollardSaeko Oshiba, Shunsuke Iki, Jun Yabuchi, Yoshikazu Mizutani, Kumiko Kawabata, Kanako Nakagawa, Yoji Kitani, Saori Kitaguchi, Kazunari Morimoto. 1-6 [doi]
- Neural network data modeling and its application on effect analysis of head and shoulder acupoint massageYa-Ting Lee, Teng-Shung Chiang, Chian-Song Chiu. 1-6 [doi]
- Emotional voice conversion using deep neural networks with MCC and F0 featuresZhaojie Luo, Tetsuya Takiguchi, Yasuo Ariki. 1-5 [doi]
- An improved traffic signs recognition and tracking method for driver assistance systemNadra Ben Romdhane, Hazar Mliki, Mohamed Hammami. 1-6 [doi]
- Business process ontology for defining user storyChaleerat Thamrongchote, Wiwat Vatanawood. 1-4 [doi]
- Evaluating semantic relatedness through categorical and contextual information for entity disambiguationYiming Zhang, Mizuho Iwaihara. 1-6 [doi]