Abstract is missing.
- Tuning Concurrency of the Business Process by Dynamic ProgrammingMehdi Yaghoubi, Morteza Zahedi. 1-5 [doi]
- Use of Ontology in Identifying Missing Artefact LinksFoziah Gazzawe, Russell Lock, Christian W. Dawson. 6-9 [doi]
- An Insight into the Capabilities of Professionals and Teams in Agile Software Development: A Systematic Literature ReviewSai Datta Vishnubhotla, Emilia Mendes, Lars Lundberg. 10-19 [doi]
- Challenges of Process Migration to Support Distributed Exascale Computing EnvironmentEhsan Mousavi Khaneghah, Amirhosein Reyhani ShowkatAbad, Reyhaneh Noorabad Ghahroodi. 20-24 [doi]
- Test Case Generation from Android Mobile Applications Focusing on Context EventsAsmau Usman, Noraini Ibrahim, Ibrahim Anka Salihu. 25-30 [doi]
- An Empirical Study for Adopting Social Computing in Global Software DevelopmentAteeq Ur Rehman Butt, Muhammad Asif Habib, Shahbaz Ahmad, Ulfat Imdad. 31-35 [doi]
- Simulation Comparison on PRICO LNG Process Using Open and Proprietary SourcesMohd Nazri Omar, Muhammad Nur Hafiz Shaidan, Suhaila Hussain. 36-39 [doi]
- Why a Good Process Fail?: Experience in Building a Sustainable and Effective Process for Software DevelopmentMensely Cheah Siow Fhang, Wong Wai Tong. 40-45 [doi]
- Parameter Free Flower Algorithm Based Strategy for Pairwise TestingAbdullah B. Nasser, Kamal Z. Zamli. 46-50 [doi]
- Best Practices in Release Management of Large ProjectsMensely Cheah Siow Fhang, Rajashekara Swamy. 51-55 [doi]
- The Role of Human in Software Configuration ManagementSyahrul Fahmy, Aziz Deraman, Jamaiah Haji Yahaya. 56-60 [doi]
- Review of Panorama and Key Technical Prospect on Software TestingJiujiu Yu. 61-65 [doi]
- Software Visual Specification for Requirement Specification ValidationFauziah binti Zainuddin, Ruzaini bin Abdullah Arshah, Rozlina binti Mohamad. 66-71 [doi]
- The Parallel Performance Optimization of The MS-CG MethodTing Wang, Jin Xu, Yanting Wang, Wudi Cao, Baoji He. 72-76 [doi]
- Extending Function Point Analysis Effort Estimation Method for Software Development PhaseJalal Shah, Nazri Kama. 77-81 [doi]
- Survey of Software Development Effort Estimation TechniquesAyesha Saeed, Wasi Haider Butt, Farwa Kazmi, Madeha Arif. 82-86 [doi]
- Hybrid Test Redundancy Reduction Strategy Based on Global Neighborhood Algorithm and Simulated AnnealingKamal Z. Zamli, Norasyikin Safieny, Fakhrud Din. 87-91 [doi]
- Fuzzy Adaptive Teaching Learning-based Optimization Strategy for GUI Functional Test Cases GenerationFakhrud Din, Kamal Z. Zamli. 92-96 [doi]
- Proposed Assessment Framework Based on Bloom Taxonomy Cognitive Competency: Introduction to ProgrammingAdidah Lajis, Haidawati Md Nasir, Normaziah Abdul Aziz. 97-101 [doi]
- Evaluation of Software Quality for Competition-based Software Crowdsourcing ProjectsBoshu Li, Wenjun Wu, Zhenhui Hu. 102-109 [doi]
- Predicting Political Tendency of Posts on FacebookShu-I Chiu, Kuo-Wei Hsu. 110-114 [doi]
- Overlapping Clustering for Textual DataAtefeh Khazaei, Mohammad GhasemZadeh, Dieter Gollmann. 115-118 [doi]
- Intrusion Detection System by Using Hybrid Algorithm of Data Mining TechniqueZohreh Abtahi Foroushani, Yue Li. 119-123 [doi]
- User Mining to Find Important Facebook UsersShu-I Chiu, Kuo-Wei Hsu. 124-128 [doi]
- Evaluation of Misspeculation Impact on Chip-Multiprocessors Power OverheadBaisakhi Das, Mamata Dalui, Anupama Mondal, Salma Mandi, Nilanjana Das, Biplab K. Sikdar. 129-133 [doi]
- A Study of Data Layout in Multi-channel Processing-In-Memory ArchitectureTaeyang Jeong, Duheon Choi, Sangwoo Han, Eui-Young Chung. 134-138 [doi]
- Integrated Data Management: Building Information Modeling (BIM) in Malaysia Construction IndustryNoor Syafiqah Mohd Sabri, Zafikha Aida Bidin, Asmah Alia Mohammad Bohari. 139-142 [doi]
- Performance Comparison of Prototype Selection Based on Edition Search for Nearest Neighbor ClassificationNordiana Mukahar, Bakhtiar Affendi Rosdi. 143-146 [doi]
- Value of Expressions behind the Letter Capitalization in Product ReviewsIrina Pak, Phoey-Lee Teh. 147-152 [doi]
- Guessing Properties of the Qlock Mutual Exclusion Protocol based on its Graphical Animations and confirming the Properties by Model CheckingMay Thu Aung, Tam Thi Than Nguyen, Kazuhiro Ogata 0001. 153-157 [doi]
- Algorithm for the Reconstruction of the Discontinuous Structure of a Body by Its Projections along Mutually Perpendicular LinesVitaliy Mezhuyev, Oleg M. Lytvyn, Iuliia Pershyna, Olesia Nechuiviter, Oleg O. Lytvyn. 158-163 [doi]
- Additive Spread Spectrum Image Hiding Algorithm based on Host SignalXiaoqiang Zhang, Xuesong Wang, Qingming Wang. 164-168 [doi]
- Scene Division-based Spatio-temporal Updating Mixture Gaussian Model for Moving Target DetectionZhonghua Wang, Chuanyang Cheng, Jingyi Yang. 169-172 [doi]
- A Noble Feature Selection Method for Human Activity Recognition using Linearly Dependent Concept (LDC)Win Win Myo, Wiphada Wettayaprasit, Pattara Aiyarak. 173-177 [doi]
- Research on Image Segmentation Optimization Algorithm based on Chaotic Particle Swarm Optimization and Fuzzy ClusteringLinglong Tan, Yehui Chen, Changkai Li. 178-182 [doi]
- Automated Multi-factor Analytics for Cheat-Proofing Attendance-takingSerdarmammet Tachmammedov, Yew Kwang Hooi, Khairul Shafee Kalid. 183-188 [doi]
- Quantification and Localization of Cross-Core Interference for Embedded Multi-Core Control ApplicationsEric Wagner, Christoph Karls, Martina Lehser. 189-193 [doi]
- Analysis of Two Flawed Versions of A Mutual Exclusion Protocol with Maude and SMGAMay Thu Aung, Tam Thi Than Nguyen, Kazuhiro Ogata 0001. 194-198 [doi]
- Fire Safety and Alert System Using Arduino Sensors with IoT IntegrationFernandino S. Perilla, George R. Villanueva Jr., Napoleon M. Cacanindin, Thelma D. Palaoag. 199-203 [doi]
- Quantum Grover Attack on the Simplified-AESMishal Almazrooie, Rosni Abdullah, Azman Samsudin, Kussay N. Mutter. 204-211 [doi]
- A Simple Approach for Enabling SPARQL-based Temporal Queries for Media FragmentsKlinsukon Nimkanjana, Suntorn Witosurapot. 212-216 [doi]
- Similar Patent Search Method Based on a Functional Information FusionJian-Hong Ma, Ning-Ning Wang, Shuang Yao, Zi-Mo Wei, Shuai Jin. 217-222 [doi]
- Identity Federation for Cellular Internet of ThingsBernardo Santos, Do van Thuan, Boning Feng, Thanh Van Do. 223-228 [doi]
- Improving Time Series' Forecast Errors by Using Recurrent Neural NetworksMarwan Abdul Hammed Ashour, Rabab Alayham Abbas. 229-232 [doi]
- Predicting Student's Board Examination Performance using Classification AlgorithmsReynold A. Rustia, Ma. Melanie A. Cruz, Michael Angelo P. Burac, Thelma D. Palaoag. 233-237 [doi]
- Higher Education Student's Academic Performance Analysis through Predictive AnalyticsCeasar Ian P. Benablo, Evangeline T. Sarte, Joe Marie D. Dormido, Thelma D. Palaoag. 238-242 [doi]
- Review on the Effect of Student Learning Outcome and Teaching Technology in Omani's Higher Education Institution's Academic Accreditation ProcessRagad M. Tawafak, Muamer N. Mohammed, Ruzaini bin Abdullah Arshah, Awanis Romli. 243-247 [doi]
- Development of M-learning Application based on Knowledge Management ProcessesMostafa Al-Emran, Vitaliy Mezhuyev, Adzhar Kamaludin, Maryam ALSinani. 248-253 [doi]
- Digital Game Based Learning using Augmented Reality for Mathematics LearningFadila Aulia Pritami, Izzati Muhimmah. 254-258 [doi]
- Compulsory Game based Robot Contest for Embedded System Development EducationHarumi Watanabe, Mikiko Sato, Masafumi Miwa, Makoto Imamura, Shintaro Hosoai, Nobuhiko Ogura, Hiroyuki Nakamura, Kenji Hisazumi. 259-263 [doi]
- CDMG: Crises and Disasters Management Game (Video Game to Teach Arab Children How to Handle Emergencies and Crises)Samaa M. Shohieb. 264-268 [doi]
- A Highly Computationally Efficient Explicit-Iterative Hybrid Algorithm for Colebrook-White EquationTey Wah Yen, Tan Lit Ken, Ang Chun Kit. 269-273 [doi]
- Automatic Update of Ontology Concept Hierarchy with New Entity Insertion and New Concept Generation Based on Semantic MeasurementYingHui Wang, Bo Wang, Yuexian Hou, Dawei Song 0001. 274-278 [doi]
- TEXTnology: A Managed SMS Knowledge Sharing for FarmersPaul G. Garcia Jr., Dario H. Galeon, Thelma D. Palaoag. 279-284 [doi]
- Random Forest Classifier based Scheduler Optimization for Search Engine Web CrawlersLakmal Meegahapola, Vijini Mallawaarachchi, Roshan Alwis, Eranga Nimalarathna, Dulani Meedeniya, Sampath Jayarathna. 285-289 [doi]
- IV&V Experience Framework: An Experience Paper on IV&V Implementation in Government ProjectRozaini Abdul Rahman, Mensely Cheah Siow Fhang, Wong Wai Tong. 290-296 [doi]
- Heart Disease Diagnosis System Using Fuzzy LogicHasan Kahtan, Kamal Z. Zamli, Wan Nor Ashikin Wan Ahmad Fatthi, Azma Abdullah, Mansoor Abdulleteef, Noor Shahaiyusniezam Kamarulzaman. 297-301 [doi]
- Detecting Emotional Changes among Visually Impaired Users in Complex and Non-Complex Layout using Neuro-Physiological SignalBavani Ramayah. 302-305 [doi]
- A Cellular Automata Based BIST for Detecting NPSFs in High Speed MemoriesSushanti Priya, Suvadip Hazra, Bidesh Chakraborty, Mamata Dalui. 306-311 [doi]
- CAD Tool Flow for Variation-Tolerant Non-Volatile STT-MRAM LUT based FPGAJeongbin Kim, Ki Tae Kim, Eui-Young Chung. 312-316 [doi]
- Asymmetric Slew Logic Threshold Method on Near Threshold RegionYoung-Min Park, Kwangsu Kim, Byoung-Jin Kim, Eui-Young Chung. 317-321 [doi]
- Formal Modeling and Verification of Smart ContractsXiaomin Bai, Zijing Cheng, Zhangbo Duan, Kai Hu. 322-326 [doi]
- A Development of Travel Itinerary Planning Application using Traveling Salesman Problem and K-Means Clustering ApproachSeptia Rani, Kartika Nur Kholidah, Sheila Nurul Huda. 327-331 [doi]