Abstract is missing.
- Empirical research methods for software engineering: Keynote addressSimon Xu. 1 [doi]
- Software abstractions and architectures for smart cyber-physical systems: Keynote addressPetr Hnetynka. 3 [doi]
- A confidentiality preserving publicly verifiable computation for multivariate polynomialsJiameng Sun, Binrui Zhu, Jing Qin, Jixin Ma. 5-12 [doi]
- A server selection strategy about cloud workflow based on QoS constraintFutian Wang, Ke Fang, Jin Tang, Cheng Zhang. 13-18 [doi]
- A bisectional multivariate quadratic equation system for RFID anti-counterfeitingXiaoyi Zhou, Xiaoming Yao, Honglei Li 0003, Jixin Ma. 19-23 [doi]
- Remote sensing of damage bridge structure of free vibration by using finite element method based on Jerk-EnergyBouyahi Mohamed, Ezzedine Tahar, Rezig Houria. 25-30 [doi]
- Efficient composite event detection based on DHT protocolAmina Chaabane, Salma Bradai, Wassef Louati, Mohamed Jmaiel. 31-38 [doi]
- Modern predictive models for modeling the college graduation ratesEmma A. Gunu, Carl Lee, Wilson K. Gyasi, Robert M. Roe. 39-45 [doi]
- Enterprise map construction based on EOLN modelQiwen Zhang, Yunchuan Sun, Rongfang Bie. 47-53 [doi]
- Generation of reducts and threshold functions using discernibility and indiscerniblity matricesNaohiro Ishii, Ippei Torii, Kazunori Iwata, Kazuya Odagiri, Toyoshiro Nakashima. 55-61 [doi]
- LogSumExp for unlabeled data processingTaocheng Hu, Jinhui Yu. 63-69 [doi]
- The analysis and prediction of customer review rating using opinion miningWararat Songpan. 71-77 [doi]
- Sentiment analysis on social media using morphological sentence pattern modelYoungsub Han, Kwangmi Ko Kim. 79-84 [doi]
- On blockchain-based anonymized dataset distribution platformShinsaku Kiyomoto, Mohammad Shahriar Rahman, Anirban Basu. 85-92 [doi]
- A smart health service model for elders based on ECA-S rulesShujie Hu, Mengxing Huang, Wenlong Feng, Yu Zhang. 93-97 [doi]
- An analysis of the health care platform in the cloud environmentHonglei Li, Qi Chen, Xiaoyi Zhou. 99-102 [doi]
- The impacts of consumer's health topic familiarity in seeking health information onlineIra Puspitasari. 104-109 [doi]
- Manifold ranking weighted local maximal occurrence descriptor for person re-identificationFoqin Wang, Xuehan Zhang, Jinxin Ma, Jin Tang, Aihua Zheng. 111-114 [doi]
- Salient object based action recognition using histogram of Changing Edge Orientation (HCEO)Hnin Mya Aye, Sai Maung Maung Zaw. 115-122 [doi]
- Automatic facial expression recognition based on a deep convolutional-neural-network structureKe Shan, Junqi Guo, Wenwan You, Di Lu, Rongfang Bie. 123-128 [doi]
- Feature based disparity estimation using hill-climbing algorithmTin Tin San, Nu War. 129-133 [doi]
- An encrypted medical image retrieval algorithm based on DWT-DCT frequency domainChunyan Zhang, JingBing Li, Shuangshuang Wang, Zhaohui Wang. 135-141 [doi]
- A robust algorithm of encrypted medical volume data retrieval based on 3D DWT and 3D DFTShuangshuang Wang, JingBing Li, Chunyan Zhang, Jintao Liang, Zhaohui Wang. 143-149 [doi]
- A new graph ranking model for image saliency detection problemYuanyuan Guan, Bo Jiang, Yun Xiao, Jin Tang, Bin Luo. 151-156 [doi]
- Gabor-feature-based local generic representation for face recognition with single sample per personTaher Khadhraoui, Faouzi Benzarti, Hamid Amiri. 157-160 [doi]
- Image mosaicking for oversized documents with a multi-camera rigZhen Wang, Feilin Han, Weidong Geng. 161-167 [doi]
- An improved information hiding algorithm based on imageZiqian Yuan, Zijie Guan, Hao Feng. 169-172 [doi]
- Detection and mitigation of wireless link layer attacksMay Aye Chan Aung, Khin Phyo Thant. 173-178 [doi]
- Model driven development of mobile applications using drools knowledge-based ruleEi Ei Thu, Nwe Nwe. 179-185 [doi]
- Reusable components for adding multi-tenancy to legacy applicationsUwe Hohenstein, Preeti Koka. 187-194 [doi]
- CloudSim4DWf: A CloudSim-extension for simulating dynamic workflows in a cloud environmentFairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem. 195-202 [doi]
- A reliability evaluation model of distributed autonomous robotic system architecturesXin He, Changbin Xue, Qing Zhou, Kexin Lin. 203-210 [doi]
- Application of support vector machine with simulated annealing algorithm in MBR membrane pollution predictionChunqing Li, Yingxin Tao. 211-217 [doi]
- On the use of visual clustering to identify landmarks in code navigationSandeep Reddivari, Mahesh Kotapalli. 219-228 [doi]
- Coordination support for integrating user centered design in distributed agile projectsOhoud Almughram, Sultan Alyahya. 229-238 [doi]
- Visualization of online datasetsChristopher Johnston Downie, Taoxin Peng. 239-246 [doi]
- Curricular change management with Git and Drupal: A tool to support flexible curricular development workflowsAbhishek Tirkey, Kevin A. Gary. 247-253 [doi]
- An empirical investigation of the software integration success factors in GSD environmentMuhammad Ilyas, Siffat Ullah Khan. 255-262 [doi]
- Software performance prediction at source levelErh-Wen Hu, Bogong Su, Jian Wang. 263-270 [doi]
- An automated code smell and anti-pattern detection approachSevilay Velioglu, Yunus Emre Selçuk. 271-275 [doi]
- A framework of software reusing engineering managementTao Xin, Liu Yang. 277-282 [doi]
- Policy enforcement upon software based on microservice architectureTugrul Asik, Yunus Emre Selçuk. 283-287 [doi]
- Identifying and localizing the inter-consistency errors among UML use cases and activity diagrams: An approach based on functional and structural size measurementsHela Hakim, Asma Sellami, Hanêne Ben-Abdallah. 289-296 [doi]
- Effects of FSM minimization techniques on number of test paths in mobile applications MBTMaiada M. Shabaan, Haitham S. Hamza, Yasser M. K. Omar. 297-302 [doi]
- Research on construction of semantic dictionary in the football fieldJiguang Wu, Ying Li. 303-306 [doi]
- Data analysis with multi-objective optimization algorithm: A study in smart traffic signal systemPengzhe Zhou, Zhiyi Fang, Hongliang Dong, Jiayue Liu, Shuaining Pan. 307-310 [doi]
- Data structure and triangulation algorithm for non-uniform landscapesYasunori Shiono, Takaaki Goto, Kensei Tsuchida. 311-315 [doi]
- Predicting gross domestic product using autoregressive modelsJohn Roush, Keith Siopes, Gongzhu Hu. 317-322 [doi]
- Study and realization of a CRM system in fuxin bankQingxing Guo, Zhendong Xie, Xi Ning. 323-326 [doi]
- Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graphYucong Duan, Lixu Shao, Gongzhu Hu, ZhangBing Zhou, Quan Zou, Zhaoxin Lin. 327-332 [doi]
- A stochastic revelation on the deterministic morphological change of 3x+1Yucong Duan. 333-338 [doi]
- Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graphLixu Shao, Yucong Duan, Xiaobing Sun, Quan Zou, Rongqi Jing, Jiami Lin. 339-344 [doi]
- Research on service recommendation reliability in mobile computingWeng Wen, Huaikou Miao. 345-350 [doi]
- On the estimation of time series data of daily lifeTeruhisa Hochin, Hiroki Nomiya. 351-355 [doi]
- Analysis of perception of people to school mottosRieko Fujita, Tokuro Matsuo, Teruhisa Hochin. 357-362 [doi]
- Analysis of road traffic fatal accidents using data mining techniquesLiling Li, Sharad Shrestha, Gongzhu Hu. 363-370 [doi]
- An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacksRyan Heartfield, George Loukas, Diane Gan. 371-378 [doi]
- Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systemsWilliam Oliff, Avgoustinos Filippoupolitis, George Loukas. 379-385 [doi]
- Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devicesSyed Sadiqur Rahman, Ryan Heartfield, William Oliff, George Loukas, Avgoustinos Filippoupolitis. 387-394 [doi]
- ASTo: A tool for security analysis of IoT systemsOrestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil A. Panaousis. 395-400 [doi]
- Security and privacy requirements engineering for human centric IoT systems using eFRIEND and IsabelleFlorian Kammüller, Juan Carlos Augusto, Simon Jones. 401-406 [doi]
- A communication gateway architecture for ensuring privacy and confidentiality in incident reportingChristos Chatzigeorgiou, Lazaros Toumanidis, Dimitris Kogias, Charalampos Z. Patrikakis, Eric Jacksch. 407-411 [doi]