Abstract is missing.
- Keynote: Big data in society and its application issues in business management and academiaGeorge Wencai Du. [doi]
- GScheduler: Reducing Mobile Device Energy ConsumptionLiang Peng. 1-6 [doi]
- Evaluating Software Architecture Evolution Using Performance SimulationBixin Li, Li Liao, Yi Cheng. 7-13 [doi]
- Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server EnvironmentJongho Moon, Jiye Kim, Donghoon Lee 0007, Dongho Won. 14-19 [doi]
- Dynamic Voltage and Frequency Scaling Enhanced Task Scheduling Technologies toward Green Cloud ComputingEiman Aldahari. 20-25 [doi]
- Research on the Safety Accidents Prediction for Smart Laboratory Based on Statistical AnalysisRuizhi Li, Honghao Gao, Danqi Chu, Kang Zhang, Huahu Xu. 26-31 [doi]
- Analyzing Elements of Letters in a Letter Management SystemHideaki Ito, Kazuki Miyazato, Kensiro Ishikawa, Tsuyoshi Taki, Junichi Hasegawa 0001, Kyoko Raita. 32-37 [doi]
- An XML Representation of the Octgrid for the Rectangular DissectionsKoushi Anzai, Takaaki Goto, Youzou Miyadera, Takeo Yaku, Ken Yokota. 38-42 [doi]
- Implementation and Comparison of M2M Protocols for Internet of ThingsPriyanka Thota, Yoohwan Kim. 43-48 [doi]
- Logic Representation: Aristotelian Syllogism by DiagramSabah Al-Fedaghi. 49-54 [doi]
- Template-Based Code Generation Framework for Data-Driven Software DevelopmentKshitija Shinde, Yu Sun. 55-60 [doi]
- An Intelligent Approach to Review Filtering and Review Quality ImprovementIain Lee, Yu Sun, Yuexin Li. 61-66 [doi]
- Object-Oriented Code Metric-Based Refactoring Opportunities Identification Approaches: AnalysisBassey Isong, Nosipho Dladlu, Bassey Ele. 67-74 [doi]
- The Development of the Magnetic Measurement System of the Movement Method Using the Posture InformationHiroshi Kawano, Seiichi Serikawa. 75-80 [doi]
- Integration of Hand Gesture and Multi Touch Gesture with Glove Type DeviceHayato Takahashi, Yuhki Kitazono. 81-86 [doi]
- Development of Dragonfly-Like Flapping RobotTakahiro Kizu, Masataka Inoue, Keiichi Yoshino, Koju Hiraki. 87-92 [doi]
- Improvement of Full Automatic Fire Extinguish System for Residential UseRyo Takeuchi, Kouki Yamaguchi, Hayato Takahashi, Masahiko Hanada, Hiromichi Hanada, Kanya Mizuguchi, Seiichi Serikawa, Yuhki Kitazono. 93-98 [doi]
- Estimation of Rates Arriving at the Winning Hands in Multi-Player Games with Imperfect InformationKenshi Yoshimura, Teruhisa Hochin, Hiroki Nomiya. 99-104 [doi]
- Evaluation of Parallel Multi-Dimensional Indexing System for Big Data AnalysisKazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya. 105-110 [doi]
- Coloring Methods of Characters for Presentation SlidesYui Nonomura, Teruhisa Hochin, Hiroki Nomiya. 111-116 [doi]
- Improvement of Mutual Retrieval of Visual and Audio Materials Based on ImpressionYamato Takahashi, Teruhisa Hochin, Hiroki Nomiya. 117-122 [doi]
- Effects of Seasons on Impression and Retrieval Requirement of PicturesManami Tamai, Teruhisa Hochin, Hiroki Nomiya. 123-128 [doi]
- A Smart Framework towards Providing Benefits for One and AllTeruhisa Hochin, Hiroki Nomiya, Hitoshi Iima, Morshed U. Chowdhury. 129-132 [doi]
- A Trace Partitioning Approach for Memory Efficiency on a Trace Analysis EnvironmentKazuma Kusu, Izuru Kume, Kenji Hatano. 133-140 [doi]
- gsl-dfs: A Lightweight Goal Selection Algorithm Based on a Goal Selection CriterionShin-ichi Sato. 141-146 [doi]
- GDM-CBDT: A Mathematical Model for Goal Decomposition Based on Case-Based Decision TheoryShin-ichi Sato. 147-151 [doi]
- Fast Comparison of Software Birthmarks for Detecting the Theft with the Search EngineJun Nakamura, Haruaki Tamada. 152-157 [doi]
- ROCAT on KATARIBE: Code Visualization for CommunitiesTomohiro Ichinose, Kyohei Uemura, Daiki Tanaka, Hideaki Hata, Hajimu Iida, Kenichi Matsumoto. 158-163 [doi]
- Programmer's Electroencephalogram Who Found Implementation StrategyAiko Yamamoto, Hidetake Uwano, Yoshiharu Ikutani. 164-168 [doi]
- Using Software Metrics Thresholds to Predict Fault-Prone Classes in Object-Oriented SoftwareAlexandre Boucher, Mourad Badri. 169-176 [doi]
- Machine Learning for Detecting Pronominal Anaphora Ambiguity in NL RequirementsRicha Sharma, Nidhi Sharma, K. K. Biswas. 177-182 [doi]
- Toward Obliging Bots for Supporting Next ActionsAkira Inokuchi, Haruaki Tamada, Hideaki Hata, Masateru Tsunoda. 183-188 [doi]
- Computer System Design Exploration Using Local Search and Genetic AlgorithmsGeorge Anderson, Tallman Z. Nkgau. 189-195 [doi]
- An Empirical Evaluation of the Tobit Model on Software Defect PredictionYukasa Murakami, Masateru Tsunoda, Koji Toda. 196-201 [doi]
- Evaluating Multi-Modal Speech Visualization Application for Deaf and Hard of Hearing PeopleYusuke Toba, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura, Tomohito Uchino. 202-207 [doi]
- Enhanced Camera Capturing Using Object-Detection-Based Autofocus on SmartphonesLiang Peng. 208-212 [doi]
- Behavior-Based Memory Resource Management for Container-Based VirtualizationGaku Nakagawa, Shuichi Oikawa. 213-217 [doi]
- Big Streaming Data Buffering OptimizationAbhilash Kancharla, Jongyeop Kim, Noh-Jin Park, Nohpill Park. 218-223 [doi]
- A Novel Model of Convention Management Research and Business ProcessTokuro Matsuo, Takanobu Otsuka, Tetsuya Oishi, Rieko Fujita, Takayuki Ito 0001, Akihisa Sengoku, Shun Shiramatsu, Naoki Fukuta, Katsuhide Fujita, Hidekazu Iwamoto. 224-229 [doi]
- Issues with Path Representation in Transition SystemsYi Zheng, Pei He, Chi-Chang Chang, Yafen Liu. 230-234 [doi]
- Measurement of Ocular Movement Abnormality in Pursuit Eye Movement (PEM) of Autism Spectrum Children with DisabilityIppei Torii, Kaoruko Ohtani, Naohiro Ishii. 235-240 [doi]
- Development of Monitor System for Dry Eye SymptomEmi Aihara, Ippei Torii, Naohiro Ishii. 241-246 [doi]
- Increasing Concentration with NeurofeedbackShunsuke Kawatake, Ippei Torii, Naohiro Ishii. 247-252 [doi]
- Development of Communication Tool for Physically Handicapped with Involuntary Movements by Line-of-Sight DetectionTakahito Niwa, Ippei Torii, Naohiro Ishii. 253-258 [doi]
- Development of Evacuation Guiding System for Earthquake DisasterTakahito Niwa, Ippei Torii, Naohiro Ishii. 259-264 [doi]
- Effort Estimation for Embedded Software Development Projects by Combining Machine Learning with ClassificationKazunori Iwata 0001, Toyoshiro Nakashima, Yoshiyuki Anan, Naohiro Ishii. 265-270 [doi]
- On Pattern Generating Methods for Incremental Learning by Chaotic Neural NetworkToshinori Deguchi, Naohiro Ishii. 271-276 [doi]
- Characterization of Nearest Neighbor Relation Based on Boolean Reasoning and Convex ConesNaohiro Ishii, Ippei Torii, Kazunori Iwata 0001, Kazuya Odagiri, Toyoshiro Nakashima. 277-282 [doi]
- Concept of the QOS Control Method Based on the Data Mining in the VDACS Scheme for the Common Use between Plural OrganizationsKazuya Odagiri, Shogo Shimizu, Naohiro Ishii. 283-288 [doi]
- Asymmetric Neural Networks with Gabor FiltersNaohiro Ishii, Toshinori Deguchi, Masashi Kawaguchi, Hiroshi Sasaki 0004. 289-294 [doi]
- Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural OrganizationsKazuya Odagiri, Shogo Shimizu, Naohiro Ishii. 295-300 [doi]
- Problem Solving with Interactive-Theorem Proving - A Case StudyShivashish Jaishy, Nobuhiro Ito, Yoshinobu Kawabe. 301-306 [doi]
- On Computer-Assisted Verification of Timed Anonymity of Multi-Agent SystemsYoshinobu Kawabe, Nobuhiro Ito. 307-312 [doi]
- A 3D Visualization Display System for the RoboCupRescue Simulation CompetitionMasahiro Yamamoto, Nobuhiro Ito, Kazunori Iwata 0001, Tsuyoshi Matsukawa, Yoshiyuki Kozuka. 313-318 [doi]
- An Evaluation of BAR: Breakdown Agent Replacement Algorithm for SCRAMShivashish Jaishy, Yoshiki Fukushige, Nobuhiro Ito, Kazunori Iwata 0001, Yoshinobu Kawabe. 319-324 [doi]
- Analysis of Influence of Ungated Residential Community on Traffic of Surrounding RoadsYuping Li, Cheng Tian. 325-328 [doi]
- Influence Effect of International Capital Flow on China's Economic GrowthXianhong Xu, Cheng Tian, Jinnuo Zhang. 329-331 [doi]
- Analysis of Reliability and Validity of Teaching Evaluation Index SystemTong Wang. 332-336 [doi]
- An Improved Dynamic Load-Balancing ModelDi Liu, Wenqian Shang, Ligu Zhu, Dongyu Feng. 337-341 [doi]
- Contour Extraction and Vectorization Algorithm for Paper-Cut PatternMuzi Sun, Minyong Shi. 342-347 [doi]
- The Implementation of Crawling News Page Based on Incremental Web CrawlerZejian Shi, Minyong Shi, Weiguo Lin. 348-351 [doi]
- A Users Clustering Algorithm for Group RecommendationChen Zhang, Jing Zhou, Weifeng Xie. 352-356 [doi]
- Recommendation Engine for Online Short VideoNan Yang, Sanxing Cao, Yu Liang, Zhengzheng Liu. 357-362 [doi]
- A Music Identification System Based on Audio FingerprintYong Fan, Shuang Feng. 363-367 [doi]
- Research on Evaluation Method of Big Data Storage UtilizationXiaoshan Yang, Ligu Zhu, Qicong Zhang, Dongyu Feng. 368-372 [doi]
- Research on a Visualization Interaction MethodLu Jiang, Xiaohong Wang, Ligu Zhu. 373-378 [doi]
- An Improved Video Recommendations Based on the Hyperlink-Graph ModelWenqian Shang, Songtao Shang, Shuchao Feng, Minyong Shi. 379-383 [doi]
- Art Exam Scores Analysis and VisualizationYakir Wang, Minyong Shi, Chunfang Li, Weiguo Lin. 384-388 [doi]
- Application of Fisheye View in Temporal Spiral VisualizationChengcheng Wang, Ligu Zhu, Di Zhang. 389-393 [doi]
- CTMC-Based Availability Analysis of Multiple Cluster Systems with Common Mode FailureZhiguo Hong, Minyong Shi, Yongbin Wang. 394-396 [doi]
- DTMC-Based Performance Evaluation of Animation Rendering NodeZhiguo Hong, Yongbin Wang, Minyong Shi. 397-399 [doi]
- Research on Collaborative Filtering Recommendation Algorithm Based on MahoutYongchang Wang, Ligu Zhu. 400-405 [doi]
- Mechanical Analysis of Basketball's Movement Trajectory after Its Shooting ActionCheng Tian. 406-408 [doi]
- Study on Blasting Effect on Tailings PondYuanyuan Zhang, Haihong Jiang, Cheng Tian. 409-412 [doi]
- A Study of Heuristically-Based Parametric Performance Improvement/Optimization Algorithms for BigData ComputingJongyeop Kim, Noh-Jin Park, Nohpill Park. 413-418 [doi]
- Fuzzy Multi-Keyword Query on Encrypted Data in the CloudXiu-Jin Shi, Sheng-Ping Hu. 419-425 [doi]
- Research on Data Mining and Electronic Commerce Information Push Application Based on PMMLPeipei Wang, Jiulei Jiang. 426-430 [doi]