Abstract is missing.
- New approach on PCA-based 3D face recognition and authenticationTaher Khadhraoui, Faouzi Benzarti, Hamid Amiri. 1-5 [doi]
- The analysis method focusing on peaks of darkness for the impression evaluation method by spaceShunsuke Akai, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Multisensory images evoked by olfactory stimuli: Crossmodal correspondences in human information processingKazuyoshi Ichihashi, Hideki Ichihashi. 1-6 [doi]
- A requirements description language pLSC for probabilistic branches and three-stage eventsJinyu Kai, Huaikou Miao, Honghao Gao. 1-6 [doi]
- An efficient structure for LKH key tree on secure multicast communicationsNaoshi Sakamoto. 1-7 [doi]
- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) requirementsHaeng-Kon Kim. 1-9 [doi]
- Jade: An efficient energy-aware computation offloading system with heterogeneous network interface bonding for ad-hoc networked mobile devicesHao Qian, Daniel Andresen. 1-8 [doi]
- Post processing for dense stereo matching by iterative local plane fittingHongbo Lu, Haibo Meng, Kun Du, Yuan Sun, Yuanchao Xu, Zhimin Zhang. 1-6 [doi]
- Test image generation using segmental symbolic evaluation for unit testingTahir Jameel, Mengxiang Lin, He Li, Xiaomei Hou. 1-6 [doi]
- Using goal net to model user stories in agile software developmentJun Lin, Han Yu, Zhiqi Shen, Chunyan Miao. 1-6 [doi]
- A machine learning technique for predicting the productivity of practitioners from individually developed software projectsCuauhtemoc Lopez-Martin, Arturo Chavoya, Maria Elena Meda-Campaña. 1-6 [doi]
- AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performanceA. H. Khan, M. A. Al-Mouhamed, A. Almousa, A. Fatayar, A. R. Ibrahim, A. J. Siddiqui. 1-6 [doi]
- Questionnaire report on matter relating to software architecture evaluationHassan Almari, Clive Boughton. 1-6 [doi]
- A dialogue-based framework for the user experience reengineering of a legacy applicationAngelo Martella, Roberto Paiano, Andrea Pandurino. 1-6 [doi]
- Security and privacy protocol for emerging smart RFID applicationsMohammad Fal Sadikin, Marcel Kyas. 1-7 [doi]
- ONTOSSN: Scientific social network ontologyEya Ben Ahmed, Wafa Tebourski, Wahiba Ben Abdessalem Karaa, Faïez Gargouri. 1-4 [doi]
- Converting PCAPs into Weka mineable dataCharles A. Fowler, Robert J. Hammell II. 1-6 [doi]
- Software ontology design to support organized open source software developmentMd. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, Takaaki Goto, Tetsuro Nishino, Narayan C. Debnath. 1-6 [doi]
- High performance and grid computing with quality of service controlSadiq M. Sait, Raed Al-Shaikh. 1-7 [doi]
- One dimensional ring type growing SOM with asymmetric neighborhood function and its application to a hand shape instruction learning systemTakashi Kuremoto, Takuhiro Otani, Masanao Obayashi, Kunikazu Kobayashi, Shingo Mabu. 1-6 [doi]
- Considerations on pauses and fundamental movements for transmitting traditional skillsTeruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- VM scheduling strategies based on artificial intelligence in Cloud TestingYang Zheng, Lizhi Cai, Shidong Huang, Zhihong Wang. 1-7 [doi]
- Consideration of cross-validation in estimating objective scores of answer statements posted at Q&A sitesYuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya. 1-6 [doi]
- Detection range fitting of slit type Obrid-SensorShota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, Shintaro Okabe, Kanya Tanaka, Yuhki Kitazono, Seiichi Serikawa. 1-6 [doi]
- An obfuscation method to build a fake call flow graph by hooking method callsKazumasa Fukuda, Haruaki Tamada. 1-6 [doi]
- Brain activity measurement during program comprehension with NIRSYoshiharu Ikutani, Hidetake Uwano. 1-6 [doi]
- A data structure for triangular dissection of multi-resolution imagesTaiyou Kikuchi, Shinji Koka, Koichi Anada, Youzou Miyadera, Takeo Yaku. 1-7 [doi]
- An application of 3D spiral visualization to the Uchida-Kraepelin psychodiagnostic testZhuang Heliang, Futoshi Sugimoto, Chieko Kato, Kensei Tsuchida. 1-6 [doi]
- Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communicationMichiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi. 1-7 [doi]
- Non-functional properties aware configuration selection in component-based systemsMohammad Charaf Eddin, Zoubir Mammeri. 1-7 [doi]
- Proposal of eye-gaze recognize method for input interface without infra-red ray equipmentKazuki Fukushima, Naruki Shirahama. 1-6 [doi]
- Collaborative filtering recommendation algorithm based on item attributesMengxing Huang, Longfei Sun, Wencai Du. 1-6 [doi]
- Survey of attribute based encryptionZhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang. 1-6 [doi]
- Designing and implementing service framework for virtual agents in home network systemHiroyasu Horiuchi, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura. 1-6 [doi]
- A framework for mobile elearning (mLearning) with analytical decision modelJahangir Dewan, Morshed Chowdhury. 1-5 [doi]
- An energy balanced topology construction protocol for Wireless Sensor NetworksSoumya Saha, Lifford McLauchlan. 1-6 [doi]
- Generation of reducts based on nearest neighbor relationNaohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Kazunori Iwata. 1-6 [doi]
- Applications of ultrasonic sensors and obrid-sensor in safety confirmation system for eldersShenglin Mu, Shota Nakashima, Kanya Tanaka. 1-6 [doi]
- Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devicesShi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng. 1-6 [doi]
- Training of intelligent intrusion detection system using neuro fuzzyBiswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia. 1-6 [doi]
- Comparing hierarchical dirichlet process with latent dirichlet allocation in bug report multiclass classificationNachai Limsettho, Hideaki Hata, Ken-ichi Matsumoto. 1-6 [doi]
- Unbinds data and tasks to improving the Hadoop performanceKun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang. 1-6 [doi]
- Development of Leaving-bed Detection System to Prevent Midnight ProwlYuhki Takahashi, Yuhki Kitazono, Shota Nakashima. 1-6 [doi]
- Feature selection method based on crossed centroid for text categorizationJieming Yang, Zhiying Liu, Zhaoyang Qu, Jing Wang. 1-5 [doi]
- Can text mining technique be used as an alternative tool for qualitative research in education?Carl Lee, Chin-I. Cheng, Aklilu Zeleke. 1-6 [doi]
- A theoretical exploration of the impact of packet loss on network intrusion detectionSidney C. Smith, Robert J. Hammell, Travis W. Parker, Lisa M. Marvel. 1-6 [doi]
- Analysis and acceleration of NTRU lattice-based cryptographic systemTianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang. 1-6 [doi]
- Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature schemeLimin Sha. 1-4 [doi]
- Refinement/verification of early stage probabilistic software project schedules in the planning stageDonghwoon Kwon, Robert J. Hammell. 1-6 [doi]
- New data warehouse designing approach based on principal component analysisWafa Tebourski, Wahiba Ben Abdessalem Karaa, Henda Ben Ghezela. 1-6 [doi]
- An efficient reduction approach to test suitePan Liu. 1-5 [doi]
- On simplification of chaotic neural network on incremental learningToshinori Deguchi, Toshiki Takahashi, Naohiro Ishii. 1-4 [doi]
- VMKit: Improving design and performance of Managed Runtime EnvironmentsBertil Folliot. 1 [doi]
- Scalable bootstrap clustering for massive dataHaocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi. 1-6 [doi]
- Optimizing mapreduce with low memory requirements for shared-memory systemsYasong Zheng, Yuanchao Xu, Haibo Meng, Xiaochun Ye, Lingjun Fan, Futao Miao, Dongrui Fan. 1-6 [doi]
- Design patterns applied for networked first person shooting game programmingJunfeng Qu, Yong Wei, Yinglei Song. 1-6 [doi]
- Developing and building a quality management system based on stakeholder behavior for enterprise architectureDominic M. Mezzanotte Sr., Josh Dehlinger. 1-6 [doi]
- Modeling web application for cross-browser compatibility testingXinxin Li, Hongwei Zeng. 1-5 [doi]
- Strategy-guided requirements development and validationXiaofeng Cui, Richard F. Paige. 1-6 [doi]
- Dynamic test case prioritization based on multi-objectiveXiaolin Wang, Hongwei Zeng. 1-6 [doi]
- Pitfalls of analyzing a cross-company dataset of software maintenance and supportMasateru Tsunoda, Kenichi Ono. 1-6 [doi]
- Software development concerns in the building of service-oriented based enterprise systemsChia-Chu Chiang. 1-5 [doi]
- A rule-based framework for managing context-aware services based on heterogeneous and distributed Web servicesHiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura. 1-6 [doi]
- Hierarchical speech recognition system using MFCC feature extraction and dynamic spiking RSOMTarek Behi, Najet Arous, Noureddine Ellouze. 1-6 [doi]
- Novice and expert, how are they programming differently?Simon Xu. 1 [doi]
- Development of input assistance application for mobile devices for physically disabledNaruki Shirahama, Yuki Sakuragi, Satoshi Watanabe, Naofumi Nakaya, Yukio Mori, Kazunori Miyamoto. 1-6 [doi]
- A self-tuned bat algorithm for optimization in radiation therapy treatment planningGeorgios Kalantzis, Yu Lei. 1-6 [doi]
- Error value driven fault analysis attackMasaya Yoshikawa, Hikaru Goto, Kensaku Asahi. 1-4 [doi]
- An improvement of micro area selection technique for the diffusion of ICT infrastructureMotoi Iwashita, Takeshi Kurosawa, Akiya Inoue, Ken Nishimatsu. 1-6 [doi]
- Dynamic artificial immune system and its application to File Transfer Scheduling optimizationMilad Dastan Zand, Mohammad Kalantari, Shahram Golzari. 1-6 [doi]
- A source code plagiarism detecting method using alignment with abstract syntax tree elementsHiroshi Kikuchi, Takaaki Goto, Mitsuo Wakatsuki, Tetsuro Nishino. 1-6 [doi]
- Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effectsIzuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama. 1-6 [doi]
- Microcredit risk assessment using crowdsourcing and social networksTofig Hasanov, Motoyuki Ozeki, Natsuki Oka. 1-5 [doi]
- Using client-side access partitioning for data clustering in big data applicationsDapeng Liu, Shaochun Xu, Zendi Cui. 1-5 [doi]
- A proposal of cloud-based home network system for multi-vendor servicesSatoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura. 1-6 [doi]
- Risk assessment quantification in life log serviceShigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai. 1-6 [doi]
- Padding free bank conflict resolution for CUDA-based matrix transpose algorithmA. Khan, M. A. Al-Mouhamed, A. Fatayar, A. Almousa, A. Baqais, M. Assayony. 1-6 [doi]