


default search action
14th ICIS 2015: Las Vegas, NV, USA
- Takayuki Ito, Yanggon Kim, Naoki Fukuta:

14th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2015, Las Vegas, NV, USA, June 28 - July 1, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8679-8
Keynote
- Wenai Song:

MOOCs, MOOE and MOOR in China. 1
Communication Systems & Networks
- Ammar Hamad, Michel Kadoch

:
SONET over RPR. 3-7 - Candace Suh-Lee

, Ju-Yeon Jo:
Quantifying security risk by measuring network risk conditions. 9-14 - Muhammad Irfan, Haider Abbas

, Mian Muhammad Waseem Iqbal
:
Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment. 15-21 - Charles A. Fowler, Robert J. Hammell:

Mining information assurance data with a hybrid intelligence/multi-agent system. 23-28 - Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:

Secure in-vehicle systems against Trojan attacks. 29-33 - Quoc Nguyen Viet, Pham Van Phuoc, Trinh Quoc Son, Lung Vu Duc:

Social routing: A novel routing protocol for delay tolerant network based on dynamic connectivity. 35-40 - Mohammed Alodib, Zaki Malik

:
A Big Data approach to enhance the integration of Access Control Policies for Web services. 41-46 - Saima Jamil, Saqib Jamil, Sheeraz Ahmed

, Muhammad Zubair, Farman Sikandar:
COPE: Cooperative Power and Energy-efficient routing protocol for Wireless Sensor Networks. 47-52 - Kyoungha Kim, Yanggon Kim:

Comparative analysis on the signature algorithms to validate AS paths in BGPsec. 53-58 - Rui Zhang, Jie Li, Quan Qian, Wei Feng:

Opportunistic wireless Network Coding based on small-time scale Traffic Prediction. 59-64 - Ruiling Gao, Minghuan Zhao, Zhihui Qiu, Yingzhou Yu, Chorng Hwa Chang:

Web-based motion detection system for health care. 65-70 - Ikram Syed, Bosung Kim, Byeong-Hee Roh

, Il-hyuk Oh:
A novel contention window backoff algorithm for IEEE 802.11 wireless networks. 71-75 - Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:

Method for secure RESTful web service. 77-81 - Shankar M. Banik, Luís Peña:

Deploying agents in the network to detect intrusions. 83-87 - Nicklaus Rhodes, Shankar M. Banik:

Empirical evaluation of designing multicasting network with minimum delay variation. 89-94 - Kambiz Ghazinour, Mehdi Ghayoumi

:
An autonomous model to enforce security policies based on user's behavior. 95-99
Control Systems, Intelligent Systems
- Robert Gripentog, Yoohwan Kim:

Utilizing NFC to secure identification. 101-105 - Anupam Panwar:

A kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection. 107-112 - Nouha Ghribi, Boudour Ammar

, Adel M. Alimi
:
Regimdroid: Framework for customize Android platform to act as a brain for telepresence robot. 113-118 - Mikhail D. Prokhorov, Danil D. Kulminskiy, Anatoly S. Karavaev, Vladimir I. Ponomarenko

:
Communication system based on chaotic delayed feedback oscillator with switched delay. 119-124 - Reo Kishi, Takahiro Hayashi:

Effective gazewriting with support of text copy and paste. 125-130 - Mehdi Ghayoumi

:
A review of multimodal biometric systems: Fusion methods and their applications. 131-136 - Mehdi Ghayoumi

, Kambiz Ghazinour:
An adaptive fuzzy multimodal biometric system for identification and verification. 137-141 - Yuji Yamagata, Naoki Fukuta

:
Evaluating a GA-based approach to dynamic query approximation on an inference-enabled SPARQL endpoint. 143-148
Computer Architecture and VLSI
- Min-Chun Tuan, Shih-Lun Chen:

Fully pipelined VLSI architecture of a real-time block-based object detector for intelligent video surveillance systems. 149-154 - Tania Sultana, Rajon Bardhan, Tangina Firoz Bithee, Zinia Tabassum, Nusrat Jahan Lisa:

A compact design of n-bit ripple carry adder circuit using QCA architecture. 155-160 - Chikatoshi Yamada, D. Michael Miller:

Using SPIN to check Simulink Stateflow models. 161-166 - Sangjae Nam, Su-Kyung Yoon, Shin-Dug Kim:

Fast bootstrapping method for the memory-disk integrated memory system. 167-172 - Kihyun Park, Su-Kyung Yoon, Shin-Dug Kim:

Selective data buffering module for unified hybrid storage system. 173-178
Data Mining, Data Warehousing & Database
- Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori

, Robert J. Woodham:
Automated generation of hierarchic image database with hybrid method of ontology and GMM-based image clustering. 179-184 - Alper Ozcan, Sule Gündüz Ögüdücü:

Multivariate temporal Link Prediction in evolving social networks. 185-190 - Novino Nirmal A., Kyung-Ah Sohn

, Tae-Sun Chung:
A graph model based author attribution technique for single-class e-mail classification. 191-196 - Edson B. dos Santos, Arthur F. Da Costa, Rafael Martins D'Addio, Marcelo Garcia Manzato, Rudinei Goularte

:
Introducing the concept of "always-welcome recommendations". 197-202 - Moon Soo Cha, So Yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn

:
CBDIR: Fast and effective content based document Information Retrieval system. 203-208 - So Yeon Kim, Kyung-Ah Sohn

:
Mobile phone spam image detection based on graph partitioning with Pyramid Histogram of Visual Words image descriptor. 209-214 - Óscar Mortágua Pereira

, Rui L. Aguiar
:
Multi-purpose Adaptable Business Tier Components based on Call Level Interfaces. 215-221 - Mohammad Alaul Haque Monil

, Rashedur M. Rahman
:
Implementation of modified overload detection technique with VM selection strategies based on heuristics and migration control. 223-227 - Takafumi Nakanishi

:
A feature selection method for comparision of each concept in big data. 229-234 - Yu Fang, Kosuke Sugano, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe:

Searching human actions based on a multi-dimensional time series similarity calculation method. 235-240 - Zhang Zuo, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe:

A human behavior processes database prototype system for surgery support. 241-246 - Mohammed Rashid Chowdhury, Mohammad Raihan Mahmud, Rashedur M. Rahman

:
Clustered based VM placement strategies. 247-252 - Md Mahfuzur Rahman Siddiquee

, Md. Saifur Rahman
, Naimul Haider, Rashedur M. Rahman
, Shahnewaz Ul Islam Chowdhury, Sharnendu Banik:
A personalized music discovery service based on data mining. 253-258 - Taocheng Hu, Jinhui Yu:

Generalized entropy based semi-supervised learning. 259-263 - Syed Akib Anwar Hridoy, M. Tahmid Ekram, Mohammad Samiul Islam, Faysal Ahmed, Rashedur M. Rahman

:
Investigation of localized sentiment for a given product by analyzing tweets. 265-270
Knowledge Discovery, Neural Networks and Genetic Algorithms
- Alan R. Chappell

, Jesse Weaver, Sumit Purohit, William Smith, Karen Schuchardt, Patrick West, Benno Lee, Peter Fox:
Enhancing the impact of science data toward data discovery and reuse. 271-277 - Rizwan Qamar, Muhammad Attique

, Tae-Sun Chung:
A pruning algorithm for reverse nearest neighbors in directed road networks. 279-284 - Mohamed Kharrat, Anis Jedidi

, Faïez Gargouri
:
A semantic approach for transforming XML data to RDF triples. 285-290
Speech and Signal Processing
- Wunna Soe, Yadana Theins:

Syllable-based Myanmar language model for speech recognition. 291-296 - Mohammad I. Daoud

, Mahmoud Al-Ashi, Fares Abawi
, Alá F. Khalifeh
:
In-house alert sounds detection and direction of arrival estimation to assist people with hearing difficulties. 297-302 - Babu Kaji Baniya, Choong Seon Hong

, Joonwhoan Lee:
Nearest multi-prototype based music mood classification. 303-306
Image Processing & Pattern Recognition
- Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki:

Decomposition of partly occluded objects based on evaluation of figural goodness. 307-312 - Sanchay Dewan, Shreyansh Bajaj, Shantanu Prakash:

Using Ant's Colony Algorithm for improved segmentation for number plate recognition. 313-318 - Williams Antonio Pantoja Laces, Jose Juan Garcia-Hernandez:

FPGA implementation of a low complexity steganographic system for digital images. 319-324 - Naresh Kumar Garg, Lakhwinder Kaur, Manish Jndal:

Recognition of Offline Handwritten Hindi text using middle zone of the words. 325-328 - Hoai Nam Vu, Tuan Anh Tran

, In Seop Na
, Soo-Hyung Kim:
Automatic extraction of text regions from document images by multilevel thresholding and k-means clustering. 329-334 - Sheeraz Akram

, Muhammad Younus Javed, Ayyaz Hussain:
Automated thresholding of lung CT scan for Artificial Neural Network based classification of nodules. 335-340
Intelligent Agent Technology, Agent Based Systems
- Kengo Saito, Toshiharu Sugawara

:
Single-object resource allocation in multiple bid declaration with preferential order. 341-347 - Quoc Son Trinh:

HMM-based Vietnamese speech synthesis. 349-353 - Keisuke Hara, Takayuki Ito

:
A scoring rule-based truthful demand response mechanism. 355-360 - Takahiro Uchiya, Motohiro Shibakawa, Ichi Takumi, Tetsuo Kinoshita

:
Multiagent-based distributed backup system for individuals. 361-366
Internet Technology and Applications, E-Commerce
- Hedieh Ranjbartabar

, Amir Maddah, Manolya Kavakli
:
eMedicalHelp: A customized medical diagnostic application: Is a single questionnaire enough to measure stress? 367-372 - Tomohiro Yanagi, Daisuke Yamamoto, Naohisa Takahashi:

Development of mobile voice navigation system using user-based mobile maps annotations. 373-378 - Jens Geelhaar, Gabriel Rausch:

3D Web Applications in E-Commerce - A secondary study on the impact of 3D product presentations created with HTML5 and WebGL. 379-382 - Taishi Yamamoto, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe:

SQUED: A novel crowd-sourced system for detection and localization of unexpected events from smartphone-sensor data. 383-386 - Dapeng Liu, Shaochun Xu, Lichao Chen, Chunning Wang:

Some observations on online advertising: A new advertising system. 387-392
Management Information Systems
- Donghwoon Kwon, Robert J. Hammell:

Objective framework for early-stage comparison of software development project types. 393-398
Middleware Architectures & Techniques
- Sohyun Koo, Se Jin Kwon

, Sungsoo Kim, Tae-Sun Chung:
Dual RAID technique for ensuring high reliability and performance in SSD. 399-404 - Leila Ghorbel

, Corinne Amel Zayani
, Ikram Amous:
A novel architecture for learner's profiles interoperability. 405-410 - Solomon Asres Kidanu, Yudith Cardinale

, Gilbert Tekli
, Richard Chbeir
:
A Multimedia-Oriented Digital Ecosystem: A new collaborative environment. 411-416 - Qurrat ul Ain, Usama Anwar, Asad R. Usmani

, Abdul Qadeer, Ghulam Mustafa, Abdul Waheed:
Dynamic binary translation in a type-II hypervisor for Cavium Octeon MIPS64 based systems. 417-422
Mobile/Wireless Computing
- Hao Qian, Daniel Andresen:

An energy-saving task scheduler for mobile devices. 423-430 - Takanobu Otsuka, Yoshitaka Torii, Takayuki Ito

:
Challenges and implementation of ad-hoc water gauge system for the grasp of internal water damage. 431-436 - Grzegorz Chmaj

, Henry Selvaraj:
Energy-efficient distributed computing solutions for Internet of Things with ZigBee devices. 437-442
Parallel and Distributed Computing & Systems
- Hao Qian, Daniel Andresen:

Emerald: Enhance scientific workflow performance with computation offloading to the cloud. 443-448
Programming Languages, Compilers, & Operating Systems
- Shuichi Oikawa:

Accelerating storage access by combining block storage with memory storage. 449-454
Software Specification Techniques
- Zhuang Li, Huaikou Miao:

Formal specification and reasoning for situated multi-agent system. 455-460
Web Engineering & Applications
- Akiyoshi Wakatani, Toshiyuki Maeda:

Automatic generation of programming exercises for learning programming language. 461-465
Special Session 1
- Masahiro Yamamoto, Kazuhiro Suzuki, Ryosuke Ogawa, Nobuhiro Ito, Yoshinobu Kawabe:

Robust location tracking method for mixed reality robots using a rotation search method. 467-472 - Masato Yamauchi, Nobuhiro Ito, Yoshinobu Kawabe:

Verifying ignition timing of gasoline direct injection engine's PCM. 473-478 - Naoto Mukai:

Analysis of driving behaviors based on GMM by using driving simulator with navigation plugin. 479-484 - Toyoshiro Nakashima, Kazunori Iwata, Yoshiyuki Anan, Naohiro Ishii:

Analyzing relationship between the number of errors in review processes for embedded software development projects. 485-490 - Naohiro Ishii, Ippei Torii, Naoto Mukai, Kazunori Iwata, Toyoshiro Nakashima:

Classification on nonlinear mapping of reducts based on nearest neighbor relation. 491-496
Workshop I
- Reiko Kuwabara, Eigo Ito, Takayuki Fujimoto

:
Proposal of programming creation application using road signs by smartphones. 497-502 - Kazuya Murata, Takayuki Fujimoto

:
Proposal of Multiple Travel Scheduling System based on Inverse Operation Method. 503-507 - Eigo Ito, Takayuki Fujimoto

:
A proposal of programming education system using mechanical calculator mechanism. 509-512 - Motoichi Adachi, Takayuki Fujimoto

:
SDSS: Proposal on feeding support application software which enables the user to create a state of "mental alertness". 513-518 - Kouji Fujita, Takayuki Fujimoto

:
A proposal of the system to stop a decline of the interest of Great East Japan Earthquake. 519-523
Workshop II
- Fengyan Wu, Shutao Sun, Jianglong Zhang, Yongbin Wang:

Singing voice detection of popular music using beat tracking and SVM classification. 525-528 - Xiaojia Chen, Ying Li, Tao Hu:

Solving the supermarket shopping route planning problem based on genetic algorithm. 529-533 - Tao Lei, Junpeng Gong, Yujun Wen:

Online advertising demand-side platform business system design exploration. 535-538 - Meimei Wu, Yongbin Wang:

A feature selection algorithm of music genre classification based on ReliefF and SFS. 539-544 - Zhenjiu Xiao, Yongbin Wang, Zhengtao Jiang:

Research and implementation of four-prime RSA digital signature algorithm. 545-549 - Xuejiao Han, Wenqian Shang, Shuchao Feng:

The design and implementation of personalized news recommendation system. 551-554 - Shiping Zhou, Wei Zhang, Xiangrong Tong:

A logic model of interest in information network. 555-558 - Songtao Shang, Minyong Shi, Wenqian Shang, Zhiguo Hong:

Research on public opinion based on Big Data. 559-562 - Ying Li, Yulong Li, Tao Hu, Zhisheng Lv:

An automatic semantic Web service composition method based on ontology. 563-566 - Yuqi Wang, Wenqian Shang, Shuchao Feng:

The maximal operator classifier. 567-570 - Ying-Jian Qi, Guoliang Shi, Xinyan Yu, Ying Li:

Visualization in media big data analysis. 571-574 - Tong Yi, Minyong Shi, Wenqian Shang:

Personalized two party key exchange protocol. 575-579 - Zhenzhong Li, Wenqian Shang:

Personalized news recommendation based on links of web. 581-584 - Min Feng, Huaichang Du:

Interactive virtual theater display system. 585-588 - Hui Ren, Zhibin Su, Chaohui Lu, Fangjv Zou:

An improved algorithm for active contour extraction based on greedy snake. 589-592 - Guowei Chen, Fei Xie, Tao Lei, Yu Su:

Spread influence algorithm of news website based on PageRank. 593-596
SERA 2015
- Hela Ben Salah, Adel Benzina

, Mohamed Khalgui
:
Petri Nets-based design of real-time reconfigurable networks on chips. 597-604 - Hamza Gharsellaoui, Ismail Ktata

, Naoufel Kharroubi
, Mohamed Khalgui
:
Real-time reconfigurable scheduling of multiprocessor embedded systems using hybrid genetic based approach. 605-609 - Fethi Jarray, Hamza Chniter

, Mohamed Khalgui
:
New adaptive middleware for real-time embedded operating systems. 610-618 - Sihem Cherif, Raoudha Ben Djemaa

, Ikram Amous:
SABPEL: Creating self-adaptive business processes. 619-626 - Chaker Ben Mahmoud

, Ikbel Azaiez, Fathia Bettahar, Marie-Hélène Abel, Faïez Gargouri
:
A learning semantic Web service for generating learning paths. 627-631 - Issam Hamdi, Emna Bouazizi

, Saleh Alshomrani, Jamel Feki:
2LPA-RTDW: A Two-Level data Partitioning Approach for Real-time Data Warehouse. 632-638 - Nahla Haddar, Mohamed Tmar, Faïez Gargouri

:
Opus framework: A proof-of-concept implementation. 639-641 - Sirine Rebai, Hatem Hadj Kacem

, Mohamed Karaa, Saúl E. Pomares Hernández
, Ahmed Hadj Kacem:
A service-oriented architecture (SOA) framework for choreography verification. 642-646 - Emna Guermazi, Mounir Ben Ayed, Hanêne Ben-Abdallah

:
Adaptive security for Cloud data warehouse as a service. 647-650 - Maha Maalej

, Achraf Mtibaa
, Faïez Gargouri
:
Enriching user model ontology for handicraft domain by FOAF. 651-655 - Wiem Khlif, Hanêne Ben-Abdallah

:
Integrating semantics and structural information for BPMN model refactoring. 656-660

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














