Abstract is missing.
- Comparison of software product line test derivation methods from the reuse viewpointSungwon Kang, Jungmin Kim, Haeun Baek, Hwi Ahn, Pilsu Jung, Jihyun Lee. 1-8 [doi]
- A prediction model for measurement-based timing analysisSyed Abdul Baqi Shah, Muhammad Rashid, Muhammad Arif. 9-14 [doi]
- Human stories: a new written technique in agile software requirementsNguyen Thien Khanh, Jirapun Daengdej, Habibi Husain Arifin. 15-22 [doi]
- Development of Encantasya: War of the Four KingdomsAngelo C. Arguson, William A. Aldea III. 23-27 [doi]
- Linear lambda calculus with non-linear first-class continuationsShin-ya Nishizaki. 28-32 [doi]
- Concurrent test case generation from UML activity diagram based on dynamic programmingSumana Yimman, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn. 33-38 [doi]
- A predictive model for successful software development projects with information technology strategic alignmentPuttakul Sakul-Ung, Wichian Chutimaskul. 39-45 [doi]
- A database on the effect of magnetic fields on stem cells differentiationAzizi Miskon, Jatendra Uslama, Siti Nooraya Mohd Tawil. 46-49 [doi]
- Optimizing I/O performance in ViMo-S hypervisor with zero-copy methodGanis Zulfa Santoso, Song-Woo Sok, Young-woo Jung, Dong-Jae Kang. 50-54 [doi]
- Performance and energy efficiency of big data systems: characterization, implication and improvementYingjie Shi, Lei Wang, Fang Du. 55-61 [doi]
- Enhanced (k, e)-anonymous for categorical dataSurapon Riyana, Noppamas Riyana, Srikul Nanthachumphu. 62-67 [doi]
- Hybrid classification procedure using SVM with LR on two distinctive datasetsJale Bektas, Turgay Ibrikci. 68-71 [doi]
- Improved information gain feature selection method for Chinese text classification based on word embeddingLei Zhu, Guijun Wang, Xianchun Zou. 72-76 [doi]
- Spam detection framework for Android Twitter application using Naïve Bayes and K-Nearest Neighbor classifiersAryo Pinandito, Rizal Setya Perdana, Mochamad Chandra Saputra, Hanifah Muslimah Az-zahra. 77-82 [doi]
- Comparative study on book similarity measurement method based on characters in the body of a book written in KoreanHyun-Ho Lee, Min-Ha Hong, Kee-Won Kim, Seung-Hoon Kim. 83-86 [doi]
- Reference scope identification for citances by classification with text similarity measuresJen-Yuan Yeh, Tien-Yu Hsu, Cheng-Jung Tsai, Pei-Cheng Cheng. 87-91 [doi]
- Information extraction method and its application in Chinese equipment technical manual based on rule-matchingLong Wang, Yanling Qian, Yanbin Liu, Qingzhi Meng, Tengfei Xu. 92-97 [doi]
- Malang historical tourism guide mobile application based on geolocationNurizal Dwi Priandani, Herman Tolle, Anggi G. Hapsani, Lutfi Fanani. 98-101 [doi]
- A meta-search group recommendation mechanism based on user intent identificationXinbao Shao, Qingshan Li, Yishuai Lin, Bo-Yu Zhou. 102-106 [doi]
- Motion target detection algorithm based on monocular visionYuxi Feng, Qizhou Wu, Guotian He. 107-111 [doi]
- A novel image encryption technique using one dimensional chaotic map and circular shift techniquePriyajit Biswas, Shyamalendu Kandar, Bibhas Chandra Dhara. 112-116 [doi]
- Comparison on two image features weight adjustment effect to relevance output image retrievalPetcharat Pattanasethanon. 117-121 [doi]
- Study on thresholding operation for efficient 1: N matching scheme of fingerprint identificationYoung-Jin Goh, Buhm Lee, Kyoung Min Kim. 122-126 [doi]
- Action recognition by silhouette fusionSamra Naz, Sajid Ur Rehman, Hafsa Asad, Sehrish Saleem. 127-131 [doi]
- Automatic segmentation of blood vessels in retinal image using morphological filtersSangita Bharkad. 132-136 [doi]
- Study on police graphic plotting technology based on webDekui Lv, Miao Yu, Jianyu Song, Kuidong Qian, Yanjun Cui. 137-143 [doi]
- Classifying breast cancer by using decision tree algorithmsNusaibah Kh. Al-Salihy, Turgay Ibrikci. 144-148 [doi]
- Enhanced land cover and land use information generation from satellite imagery and foursquare dataJ. A. A. M. Jayanetti, D. A. Meedeniya, M. D. N. Dilini, M. H. Wickramapala, J. H. Madushanka. 149-153 [doi]
- Enhancing constraint based test generation by local searchMengxiang Lin, Xiaomei Hou, Rui Liu, Linyan Ge. 154-158 [doi]
- Betweenness centrality updation and community detection in streaming graphs using incremental algorithmAkshita Bhandari, Ashutosh Gupta, Debasis Das. 159-164 [doi]
- Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluationRuilan Yang, Xuejun Yu. 165-170 [doi]
- The exploration on global village language: HarmonyHuiyu Li, Hong Hou, Xiaoqun Guo. 171-175 [doi]
- Improving scalability of apache spark-based scale-up server through docker container-based partitioningJoohyun Kyong, Jinwoo Jeon, Sung-Soo Lim. 176-180 [doi]
- TrustDocs: Google Docs add-on securing document in untrusted cloud-based environmentMohammadshareefuddin Salash-arong, Natawut Nupairoj. 181-185 [doi]
- An application of composite nano-patterns to compiler selected profiling techniquesAlexandre dos Santos Mignon, Ricardo Luis de Azevedo da Rocha. 186-190 [doi]
- An extensible component-based multi-objective evolutionary algorithm frameworkJan Corfixen Sørensen, Bo Nørregaard Jørgensen. 191-197 [doi]
- Parallel frequent subgraph mining algorithmYanshan He, Ting Wang, Jianli Xie, Ming Zhang. 198-202 [doi]
- A personalized result merging method for metasearch engineMeijia Wang, Qingshan Li, Yishuai Lin, Bo-Yu Zhou. 203-207 [doi]
- Modularization of formal specifications or efficient synthesis of reactive systemsMasaya Shimakawa, Kenji Osari, Shigeki Hagihara, Naoki Yonezaki. 208-213 [doi]
- An axiomatic design framework for reliability improvementGabriele Arcidiacono, Alessandro Giorgetti, Andrea Ciappi. 214-217 [doi]
- 2 multiplier for finite fields defined by irreducible all-one polynomialsHyun-Ho Lee, Tai-Wan Kim, Kee-Won Kim. 218-222 [doi]
- Green vehicle routing problem with heterogeneous fleet and time windowsKomar Udin, Robin Gui, Arry Rahmawan. 223-227 [doi]
- M/M/n/m queuing model under non-preemptive limited-priorityYewen Huang, Shenfen Kuang. 228-232 [doi]
- Fault tolerance design for NoCs: partial virtual-channel sharingSa'ed Abed, Mohammad Al Shayeji, Zahra'a Abdullah, Zainab Al-Saeed. 233-238 [doi]
- 4G-LTE 1800 Mhz coverage and capacity network planning using frequency reuse 1 model for rural area in IndonesiaAlfin Hikmaturokhman, Via Lutfita, Achmad Rizal Danisya. 239-243 [doi]
- A near real time SMS grey traffic detectionThanh Van Do, Paal Engelstad, Boning Feng, Do van Thuan. 244-249 [doi]
- Algorithm for multicast opportunistic routing in wireless mesh networksDebasis Das, Amritesh Kumar. 250-255 [doi]
- Web server access trend analysis based on the Poisson distributionShigeki Hagihara, Yoshiharu Fushihara, Masaya Shimakawa, Masahiko Tomoishi, Naoki Yonezaki. 256-261 [doi]
- Securing compressed real-time audio codec based on iLBC and SM4Rui Zhang, Zikang Lin, Xiaoming Xiong. 262-266 [doi]
- APSEplus: a MATLAB toolbox for parametric energy simulation of reference buildingsGiuseppe C. Calafiore, Carlo Tommolillo, Carlo Novara, E. Fabrizio. 267-271 [doi]
- Study of land evolution model driving by multi-attribute functional urban areasRuixin Song, Wenjun Wang 0002, Pengfei Jiao, Kang Li, Jing Li. 272-276 [doi]
- Design and application of a PHEV simulation platformZhenHua Jin, Jie Xiong, Zhucheng Li, Yuwei Hua. 277-280 [doi]
- A structure-based 3d CAD model similarity assessment approachXiuyan Zhao, Xianxi Liu, Kaixing Zhang. 281-284 [doi]
- The design of the mixed load simulation test benchHong-guo Li, Shi-jie Su, Lan-jun Jia, Bo Wang, Jie Meng. 285-288 [doi]
- An automated 3D modelling application based on vertices from 2D paper sketchesZahrah Yahya, Rahmita Wirza O. K. Rahmat, Fatimah Khalid, Amir Rizaan, Rizal Rahman. 289-293 [doi]
- A network-based model for solving inventory routing problem in the asphalt industry: a case studyKant Chareancholwanich, Pisit Jarumaneeroj. 294-298 [doi]
- Deception detection of EEG-P300 component classified by SVM methodArjon Turnip, M. Faizal Amri, Hanif Fakrurroja, Artha Ivonita Simbolon, M. Agung Suhendra, Dwi Esti Kusumandari. 299-303 [doi]
- The effectiveness of using auto organizational menu to communicate with classmates: a case study of autism spectrum disordersChien-Hsu Chen, Chuan-Po Wang, Chun Chin Su. 304-309 [doi]
- Minimizing makespan in a single machine scheduling problem with deteriorating jobs and learning effectsMohammad Mohammadi, Soheyl Khalilpourazari. 310-315 [doi]
- Application research of supplier evaluation based on random forestYunxia Guo. 316-323 [doi]