Abstract is missing.
- Design Semantic Framework for Software Requirement SpecificationTaimoor Hassan, Shoaib Hassan. 1-5 [doi]
- IT Demand Governance using Business Goal Structuring NotationShuichiro Yamamoto, Shuji Morisaki. 1-5 [doi]
- Medical Image Segmentation by More Sensitive Adaptive ThresholdingCheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee. 1-3 [doi]
- Linguistic Based Steganography Using Lexical Substitution and Syntactical TransformationAri Barmawi. 1-6 [doi]
- File Upload Security and Validation in Context of Software as a Service Cloud ModelNasir Uddin, Mohammad Jabr. 1-5 [doi]
- Framework for Engineering Complex Security Requirements PatternsRaúl Mazo, Christophe Feltus. 1-5 [doi]
- Power-Aware Data Structure Using Memory Allocation Techniques in EPS-Based Motion Recognition SystemsYoung-Chul Kim, Seok Hyun Lee, Jin Soo Jang. 1-4 [doi]
- Full-Duplexing Jamming Attack for Active EavesdroppingJinho Choi. 1-5 [doi]
- SMS-Based Mobile Botnet Detection ModuleAbdullah J. Alzahrani, Ali A. Ghorbani. 1-7 [doi]
- Improving the Classifier Performance in Detecting People Based on Denoising Wavelet TransformLina Chato, Shahram Latifi. 1-6 [doi]
- Light-Weight API-Call Safety Checking for Automotive Control Software Using Constraint PatternsDongwoo Kim, Yunja Choi. 1-5 [doi]
- Partial Materialization for Data Integration in SQL-on-Hadoop EnginesTaewhi Lee, Moonyoung Chung, Sung-Soo Kim, Hyewon Song, Jongho Won. 1-2 [doi]
- Speech Enhancement Using ES Information and Phase-Error Based FiltersKeun Chang Kwak, Myungwon Lee. 1-3 [doi]
- A Study on Pipe Spool Considering Workspace Based on Genetic AlgorithmSeongSang Yu, Kyung Ho Lee, Byeong Wook Nam, Yuepeng Wu. 1-4 [doi]
- Sentiment Analysis Using Harn AlgorithmV. Nagarjana Devi Duvvuri, V. Rajanikanth Thatiparthi, Rajashekar Pantangi, Akhil Gangavarapu. 1-5 [doi]
- Programming without Programming Languages New Graphic Polyglot Concept of ProgrammingIgor Velbitskiy. 1-6 [doi]
- Parallel Prime Number Labeling of Large XML Data Using MapReduceJinhyun Ahn, Dong-Hyuk Im, Taewhi Lee, Hong-Gee Kim. 1-2 [doi]
- Implement of Stereo Image Correction for 3D Optical Microscope and Design Hardware SystemJiyoung Yoon, Nakhoon Baek, Cheolhwan Kim, Hwanyong Lee. 1-5 [doi]
- Survey on Second Screen SystemsTomás Cerný, Michael J. Donahoo. 1-5 [doi]
- Comparison between UHF RFID and BLE for Stereo-Based Tag Association in Outdoor ScenariosDavid Fernández Llorca, Raúl Quintero, Ignacio Parra, Mario Jimenez, Carlos Fernández, Rubén Izquierdo, Miguel Ángel Sotelo. 1-5 [doi]
- Low-Power, Long-Range, High-Data Transmission Using Wi-Fi and LoRaDong-hyun Kim, Jun Young Lim, Jong-Deok Kim. 1-3 [doi]
- Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection TechniqueSuzwani Binti Ismail, Fakariah Hani Mohd Ali, Syed Ahmad Aljunid. 1-4 [doi]
- On Metadata Extension to Derive Data Presentations with Angular 2Zdenek Brabec, Tomás Cerný, Jirí Sebek. 1-4 [doi]
- A Knowledge-Driven Approach to Interactive Event Recognition for Semantic Video UnderstandingJinyoung Moon, Yongjin Kwon, Kyuchang Kang, Jongyoul Park, Yong-Jin Han, Young-Wha Lee. 1-3 [doi]
- WeChat Text Messages Service Flow Traffic Classification Using Machine Learning TechniqueMuhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari. 1-5 [doi]
- Neural StegoclassifierLacezar Licev, Jakub Hendrych, Radim Kuncicky. 1-3 [doi]
- Context-Aware User Interface Field ClassificationMartin Tomasek, Tomás Cerný. 1-5 [doi]
- Polymorphic Malware DetectionNur Syuhada Selamat, Fakariah Hani Mohd Ali, Noor Ashitah Abu Othman. 1-5 [doi]
- Kinematic Constraint Method for Human Gesture Recognition Based on Weighted Dynamic Time WarpingYu-Cheol Lee, Jaeyeon Lee. 1-5 [doi]
- FARIS: Fast and Memory-Efficient URL Filter by Domain Specific MachineYuuki Takano, Ryosuke Miura. 1-7 [doi]
- Development of Real-Time Road Surface Condition Determination Algorithm Using an Automatic Weather SystemMoohun Lee, Mingyu Kim. 1-2 [doi]
- Model-Based Testing and Exploratory Testing: Is Synergy Possible?Karel Frajták, Miroslav Bures, Ivan Jelínek. 1-6 [doi]
- Distributed Multi-Platform Context-Aware User Interface for Information SystemsKarel Cemus, Filip Klimes, Ondrej Kratochvil, Tomás Cerný. 1-4 [doi]
- Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal ProblemsAbhijit Banerjee, Dipendra Nath Ghosh, Suvrojit Das. 1-6 [doi]
- Common Vocabulary Set for Support of Interoperability of Data Contents of Maritime Equipment and Systems in E-Navigation ServicesDae-Won Park, Kwangil Lee, Suhyun Park. 1-4 [doi]
- Identity Management of Devices in Internet of Things EnvironmentMichal Trnka, Tomás Cerný. 1-4 [doi]
- Packet Length Covert Channel Capacity EstimationAnna Epishkina, Konstantin Kogos. 1-4 [doi]
- Synchronized Blind Audio Watermarking via Multilevel DWT and Windowed Vector ModulationHwai-Tsu Hu, Jieh-Ren Chang, Chun-Chi Chen, Sheng-Yu Lai. 1-5 [doi]
- Classification of SSH Attacks Using Machine Learning AlgorithmsGokul Kannan Sadasivam, Chittaranjan Hota, Bhojan Anand. 1-6 [doi]
- Effects of the Displaying Augmented-Reality Information on the Driving Behavior of the Drivers with Specific Psychological CharacteristicsYoonSook Hwang, Kyong-Ho Kim. 1-2 [doi]
- Example-Based Retrieval System for Human Motion DataDohyung Kim, Minsu Jang, Jaehong Kim. 1-2 [doi]
- Energy Impact of Web User Interface Technology on Mobile DevicesJan Helbich, Tomás Cerný. 1-3 [doi]
- Holistic Service Orchestration over Distributed Micro Data CenterTaeyeon Kim, BhumCheol Lee. 1-5 [doi]
- Decision Support System for Pro-Active Flood Control on Jijia River (Romania)Marius Rata, Aurelian Florentin Draghia, Radu Drobot, Raluca Burtila. 1-5 [doi]
- A JIT Compilation-Based Unified SQL Query Optimization SystemMyungcheol Lee, Miyoung Lee, Changsoo Kim. 1-2 [doi]
- Secure Distance Bounding Protocol on TH-UWBJamel Miri, Bechir Nsiri, Ridha Bouallegue. 1-5 [doi]
- Hierarchical Cluster Network for Wellness Sports IndustryWonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim. 1-4 [doi]
- Better Protection of SS7 Networks with Machine LearningKristoffer Jensen, Thanh Van Do, Hai Thanh Nguyen, André Årnes. 1-7 [doi]
- Cooperative Spectrum Sensing Scheme for Femtocell NetworkMihwa Song. 1-2 [doi]
- Max-Min Energy-Efficiency Optimization in Wireless Powered Communication Network with Harvest-Then-Transmit ProtocolByungjo Kim, Jae-Mo Kang, Hyung-Myung Kim, Joohyun Lee. 1-5 [doi]
- Fault Analysis of Data Upload Process in Ostrava, Czech Republic Using Measured Network ParametersOndrej Grunt, Jan Plucar, Lukas Kapicak. 1-5 [doi]
- Evaluation of Real-Time Performance for BGSLibrary Algorithms: A Case Study on Traffic Surveillance VideoSeda Kul, Süleyman Eken, Ahmet Sayar. 1-4 [doi]
- Study on Image-Based Ship Detection for AR NavigationJung Min Lee, Kyung Ho Lee, Byeong Wook Nam, Yuepeng Wu. 1-4 [doi]
- An Efficient Implenentation of LiDAR Data and its Geometric Representation ExtractionByeonguk Im, Nakhoon Baek, Joongin Lee. 1-4 [doi]
- Framework of Sensor Network for Perception of Human Behavior and IdentificationDohyung Kim, Ho-Sub Yoon, Jaehong Kim. 1-2 [doi]
- Analysis of Characteristics of Video Quality for Unequal Loss Protection in Wi-Fi Based Broadcasting SystemDong-hyun Kim, Jae-Young Jang, Jong-Deok Kim. 1-4 [doi]
- On Information Value of Top N StatisticsTomás Jirsík, Milan Cermák, Pavel Celeda. 1-5 [doi]
- Functionality versus Complexity Analysis of Project Management Software in Kingdom of BahrainSarmad Mohammad. 1-6 [doi]
- Load Balancing in WSNs using a Novel Markov Decision Process Based Routing AlgorithmShahab Tayeb, Miresmaeil Mirnabibaboli, Shahram Latifi. 1-5 [doi]
- A Framework for Big Data Security Analysis and the Semantic TechnologyYuangang Yao, Lei Zhang, Jin Yi, Yong Peng, Weihua Hu, Lei Shi. 1-4 [doi]
- Development of a Security Application based on User-Centric EvaluationJongmun Jeong, Mintae Hwang. 1-4 [doi]
- The Utility Evaluation of the Astronaut Virtual Training System in Layout Familiarization TrainingPeng Liu, Guohua Jiang, Yuqing Liu, Ming An. 1-4 [doi]
- Sentence Based Mathematical Problem Solving Approach via Ontology ModelingDakshi T. K. Geeganage, Darshika N. Koggalahewa, Jayantha L. Amararachchi, Asoka S. Karunananda. 1-5 [doi]
- Will an Emerging Standard Take Over the Routing Realm? An Evaluative Analysis of DUAL and SPFShahab Tayeb, Shahram Latifi. 1-5 [doi]
- Rules and Results for SSL/TLS Nonintrusive Proxy Based on JSON DataSuhairi Mohd Jawi, Fakariah Hani Mohd Ali. 1-5 [doi]
- The Virtualization and Performance Comparison with LXC-LXD in ARM64bit ServerJin-Suk Ma, Hak-Young Kim, Young-Woo Kim. 1-4 [doi]
- CUDA-Based Acceleration Techniques for Image FilteringNakhoon Baek, Woo Suk Shin. 1-2 [doi]
- A Network Based IMSI Catcher DetectionSimen Steig, André Årnes, Thanh Van Do, Hai Thanh Nguyen. 1-6 [doi]
- A Study on Augmented Reality of a Vehicle Information Using Head-Up DisplayByoung-Jun Park, Jeong-Woo Lee, Changrak Yoon, Kyong-Ho Kim. 1-2 [doi]
- Visualization Method for Efficient Expression of Spatial InformationMin Gyu Kim, Moo-hun Lee. 1-2 [doi]
- SmartDriver: Extension of Selenium WebDriver to Create More Efficient Automated TestsMiroslav Bures, Martin Filipsky. 1-4 [doi]
- New Proposed Z-Transform Based Encryption AlgorithmFawaz S. Al-Anzi, Mohamed Al-Enezi, Jyoti Soni. 1-5 [doi]
- Aspect-Oriented User Interfaces Design Integration to Angular 2 FrameworkFilip Rysavy, Támas Cerný, Martin Tomasek. 1-3 [doi]
- Flexible Authentication Protocol with Key Reconstruction in WBAN EnvironmentsChun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi. 1-5 [doi]
- A Secure Agent Based Architecture for Resource Allocation in Cloud ComputingWahid Hussain, Rao Muzamal Liaqat, Nazar Abbas Saqib, Kyong-Ho Kim. 1-6 [doi]
- AOP-Based Approach for Local Data Management in Adaptive InterfacesJirí Sebek, Tomás Cerný. 1-5 [doi]
- Decision Support Systems and Business Strategy: A Conceptual Framework for Strategic Information Systems PlanningFotis Kitsios, Maria Kamariotou. 1-5 [doi]
- An Automated ECG Beat Classification System Using Convolutional Neural NetworksMuhammad Zubair, Jinsul Kim, Changwoo Yoon. 1-5 [doi]