Abstract is missing.
- Multiplatform Application Development for Android and JavaYoonsik Cheon. 1-5 [doi]
- Improving Health and Quality of Life in One-Person Households Using IoT and Machine LearningMasahide Nakamura. 1 [doi]
- Blockchain: A Software Engineering PerspectiveLawrence Chung. 3 [doi]
- Use of Type-2 Fuzzy Sets for Military Value of Information Decision SupportTimothy P. Hanratty, Robert J. Hammell. 5-12 [doi]
- Supporting Program Understanding by Automatic Indexing of Functionalities in Source CodeMasashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka. 13-18 [doi]
- Aggregating Information Toward Military Decision MakingBehrooz Etesamipour, Robert J. Hammell. 19-26 [doi]
- An Optimized Forward Scheduling Algorithm in A Software-defined Satellite NetworkTeng Ling, Lixiang Liu, Changwen Zheng, Shuaijun Liu, Xi Zhou. 27-32 [doi]
- Detection and Diagnosis of Psychological Disorders Through Decision Rule Set FormationAnila Umar, Usman Qamar. 33-37 [doi]
- Project Management Model Based on Consistency Strategy for Blockchain PlatformEunhee Lee, Yong-Ik Yoon. 38-44 [doi]
- *Hana Jo, Yong-Ik Yoon. 45-52 [doi]
- Extracting Inclusion Graphs of API Member Sets to Improve SearchabilityYushi Kondoh, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka. 53-59 [doi]
- Identification of Difficult English Words for Assisting Hearing Impaired Children in Learning LanguageMunazza Ansar, Usman Qamar, Raheela Bibi, Asma Shaheen. 60-65 [doi]
- Sentiment Analysis for Urdu News Tweets Using Decision TreeRaheela Bibi, Usman Qamar, Munazza Ansar, Asma Shaheen. 66-70 [doi]
- A Secure and Scalable Data Source for Emergency Medical Care using Blockchain TechnologyShirin Hasavari, Yeong-Tae Song. 71-75 [doi]
- Y-Position based Myanmar Touching Character Segmentation and Sub-components based Character ClassificationKyi Pyar Zaw, Nu War. 76-83 [doi]
- Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing EnvironmentsIbraheem Aljamal, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta. 84-89 [doi]
- Towards Automated Security Vulnerability and Software Defect LocalizationNicholas Visalli, Lin Deng, Amro Alsuwaida, Zachary Brown, Manish Joshi, Bingyang Wei. 90-93 [doi]
- Development of a Request Processing Method for Relief Goods in the Distributed Material Management Support System of Evacuation Shelters using DTNSunao Sato, Mineo Takai, Yasunori Owada, Taka Maeno, Masato Oguchi. 94-98 [doi]
- Measure your API Complexity and ReliabilitySrikanth Jonnada, Jothis K. Joy. 104-109 [doi]
- Compositional Stochastic Model Checking Probabilistic Automata via Symmetric Assume-Guarantee RuleRui Li, Yang Liu. 110-115 [doi]
- Classification of Smart Contract Bugs Using the NIST Bugs FrameworkWesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng. 116-123 [doi]
- Genetic Algorithm-Based Assume-Guarantee Reasoning for Stochastic Model CheckingYan Ma, Zining Cao, Yang Liu. 124-127 [doi]
- Searching Tourism Information by Using Vertical Search Engine Based on Nutch and SolrHuawei Ma, Wencai Du, Simon Xu, Weijun Li. 128-132 [doi]