


default search action
12th ITNG 2015: Las Vegas, Nevada, USA
- Shahram Latifi:
12th International Conference on Information Technology - New Generations, ITNG 2015, Las Vegas, NV, USA, April 13-15, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8828-0
Session: Information Systems and Internet Technology
- Chyi-Ren Dow, Zhenhe Ye, Po-Yu Lai:
A Context-Aware Paratransit System. 3-7 - Yanjun Zuo, Jigang Liu:
Mobile Agent-Based Service Migration. 8-13 - Yun Tian, Yanqing Ji, Jesse Scholer:
A Prototype Spatio-temporal Database Built on Top of Relational Database. 14-19 - Philipp Meisen, Diane Keng, Tobias Meisen
, Marco Recchioni, Sabina Jeschke:
Bitmap-Based On-line Analytical Processing of Time Interval Data. 20-26 - Go Hasegawa
, Yusuke Iijima, Masayuki Murata
:
Accuracy Improvement for Spatial Composition-Based End-to-End Network Measurement. 27-32 - Sandro Magalhaes Manteiga, Andre Gomes Lamas Otero
, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias:
Financial Measuring of Incremental Deliveries in Software Projects - Finding a Model That Can Answer: How Much is Worth to Split a Project into Iterations? 33-37 - Ben McInroy, Wenying Feng, Yuanyi Pan:
An Empirical Study on Performance Measures for Online Advertising. 38-43 - (Withdrawn) A Fault Tolerant Election Protocol in Asynchronous Distributed Systems with Fail-Stop Model. 44-48
- Angela Siew-Hoong Lee
, Tong-Ming Lim, Lip-Sam Thi:
An Analysis on the Factors Related to the Adoption of KS Tools. 49-54 - Pablo Garcia, Jeroen van de Graaf, German Montejano, Daniel Riesco, Narayan C. Debnath, Silvia Bast:
Storage Optimization for Non Interactive Dining Cryptographers (NIDC). 55-60 - Chin Teck Min, Tong Ming Lim:
Investigate SPRON Convergence Time Using Aggressive Chord and Aggressive AP-Chord. 61-66 - Rene Esteves Maria
, Luiz Antonio Rodrigues Junior, Luiz Eduardo Guarino de Vasconcelos, Adriano Fonseca Mancilha Pinto, Paulo Takachi Tsoucamoto, Henrique Nunweiler Angelim Silva, Airton Lastori, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias:
Applying Scrum in an Interdisciplinary Project Using Big Data, Internet of Things, and Credit Cards. 67-72 - Joseph B. Abugri, Marc Karam:
Particle Swarm Optimization for the Minimization of Power Losses in Distribution Networks. 73-78
Session: Model Driven Data Science
- Federico Ciccozzi, Antonio Cicchetti
, Mikael Sjödin:
On the Generation of Full-Fledged Code from UML Profiles and ALF for Complex Systems. 81-88 - Federico Ciccozzi, Diarmuid Corcoran, Tiberiu Seceleanu
, Deflef Scholle:
SMARTCore: Boosting Model-Driven Engineering of Embedded Systems for Multicore. 89-94 - André Luiz Pierre Mattei, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias, Pedro Carlos da Silva Euphrasio, Onofre Trindade Júnior, Cláudio Toledo:
IFA2S - In-flight Awareness Augmentation Systems. 95-100 - André Luiz Pierre Mattei, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias, Eloi Fonseca, Osamu Saotome
, Paulo Takachi, Gildárcio Sousa Gonçalves
, Thoris Angelo Pivetta, Victor da Silva Montalvão, Cassio Kendi, Felipe Lopes de Freitas, Manasseis Alves Ferreira, Mateus Andrade Almeida, Gabriel Goncalves de Oliveira Rodrigues:
Nanosatellite Event Simulator Development Using Scrum Agile Method and Safety-Critical Application Development Environment. 101-106 - Guilherme Augusto Lopes Ferreira, Gildárcio Sousa Gonçalves, Andre Gomes Lamas Otero
, Glaydson Luiz Bertoze Lima, Paulo Takachi Tsoucamoto, Paulo Cesar Louzada Villaca, Lineu Fernando Stege Mialaret, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias:
Internet of Things and the Credit Card Market: How Companies Can Deal with the Exponential Increase of Transactions with Connected Devices and Can Also be Efficient to Prevent Frauds. 107-111 - Mehrdad Saadatmand
, Sahar Tahvili:
A Fuzzy Decision Support Approach for Model-Based Tradeoff Analysis of Non-functional Requirements. 112-121 - Emanuel Mineda Carneiro, Luiz Alberto Vieira Dias, Adilson Marques da Cunha
, Lineu Fernando Stege Mialaret:
Cluster Analysis and Artificial Neural Networks: A Case Study in Credit Card Fraud Detection. 122-126 - Ashok K. Singh, Anita Singh, Dennis J. Murphy:
On Bias Corrected Estimators of the Two Parameter Gamma Distribution. 127-132
Session: Security and Privacy in Next Generation Networks
- Bruce Wu, Tung Nguyen, Mohammad Husain:
Implementation Vulnerability Associated with OAuth 2.0 - A Case Study on Dropbox. 135-138 - Aditya Sundararajan, Alexander Perez-Pons
, Arif I. Sarwat
:
A Generic Framework for EEG-Based Biometric Authentication. 139-144 - Martin Goll, Shay Gueron
:
Vectorization of Poly1305 Message Authentication Code. 145-150 - Trang Nguyen:
Using Unrestricted Mobile Sensors to Infer Tapped and Traced User Inputs. 151-156 - Tara Baniya, Dipesh Gautam, Yoohwan Kim:
Safeguarding Web Surfing with URL Blacklisting. 157-162 - Waleed Halboob, Ramlan Mahmod
, Muhammad Abulaish
, Haider Abbas
, Kashif Saleem
:
Data Warehousing Based Computer Forensics Investigation Framework. 163-168 - AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Kashif Saleem
:
A Lightweight Key Freshness Scheme for Wireless Sensor Networks. 169-173 - Mingchu Li, Wei Jia, Cheng Guo, Weifeng Sun, Xing Tan:
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage. 174-178 - Fei Liu, Jing Wang, Hongtao Bai, Huiping Sun:
Access Control Model Based on Trust and Risk Evaluation in IDMaaS. 179-184 - Ubaid Ur Rehman
, Abdul Ghafoor Abbasi:
Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther. 185-190 - Rafael Tome de Souza, Sérgio Donizetti Zorzo:
Privacy-Preserving Mechanism for Monitoring Sensitive Data. 191-196 - Victor Clincy, Hossain Shahriar
:
A Novel Approach to Detect Tampered Wireless Network Applications. 197-199 - Yenumula B. Reddy
:
Security and Design Challenges in Cyber-Physical Systems. 200-205 - Anteneh Girma, Moses Garuba, Jiang Li:
Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics. 206-211 - Anteneh Girma, Moses Garuba, Jiang Li, Chunmei Liu:
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. 212-217 - Amir Ali, Umme Habiba, Muhammad Awais Shibli:
Taxonomy of Delegation Model. 218-223 - Muhammad Shafique Gondal, Arif Jamal Malik, Farrukh Aslam Khan
:
Network Intrusion Detection Using Diversity-Based Centroid Mechanism. 224-228 - Aleksey Koval:
Relationship between Lucas Sequences and Gaussian Integers in Cryptosystems. 229-233 - Kashif Saleem
, Abdelouahid Derhab, Mehmet A. Orgun
, Jalal Al-Muhtadi
:
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks. 234-239
Session: Networking and Wireless Communications
- Natarajan Meghanathan
:
Use of Centrality Metrics to Determine Connected Dominating Sets for Real-World Network Graphs. 243-248 - M. B. Nirmala
, A. S. Manjunath:
SCUMG: Secure Code Update for Multicast Group in Wireless Sensor Networks. 249-254 - Hani Bani-Salameh
, Clinton Jeffery:
Evaluating the Effect of 3D World Integration within a Social Software Environment. 255-260 - Jin-hui Lee, Dong-jun Na, Kwonhue Choi:
Comparison of Multi-user Timing Offset Resilient Uplink OFDMA Schemes with Optimal Power Control. 261-266 - Leonardo Jose Gomes da Silva, Leandro Guarino de Vasconcelos, Glauco da Silva
, Luiz Eduardo Guarino de Vasconcelos:
Towards Scalability in Systems with Write Operations in Relational Databases. 267-272 - Sai Ram Ganti, Yoohwan Kim:
Design of Low-Cost On-board Auto-tracking Antenna for Small UAS. 273-279 - Natarajan Meghanathan
, Mesafint Fanuel:
A Minimum Channel Switch Routing Protocol for Cognitive Radio Ad Hoc Networks. 280-285 - Paul Wong, Duong Nguyen, Ahmed Abukmail, Richard Brown, Robert Ryan, Mary Pagnutti:
Low Cost Unmanned Aerial Vehicle Monitoring Using Smart Phone Technology. 286-291 - M. B. Nirmala
, A. S. Manjunath:
Framework for Secure Code Updates for Wireless Sensor Nodes. 292-295 - Gaurav Verma
, Arun Nandewal, K. Chandrasekaran
:
Cluster Based Routing in NDN. 296-301 - Yenumula B. Reddy
, Anthony Cherry:
Implementing Packet Transfer in Wireless Networks Using PyGame. 302-306 - Mohamed Guerroumi
, Abdelouahid Derhab, Kashif Saleem
:
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink. 307-313
Session: Wavelets and Validated Numerics
- Jumpei Yamaguchi, Akihiko Yoneyama, Teruya Minamoto
:
Automatic Detection of Early Esophageal Cancer from Endoscope Image Using Fractal Dimension and Discrete Wavelet Transform. 317-322 - Hajime Omura, Teruya Minamoto
:
Image Quality Assessment for Measuring the Degradation by Using the Dual-Tree Complex Discrete Wavelet Transform. 323-328 - Akihiko Yoneyama, Teruya Minamoto
:
No-Reference Image Blur Assessment in the DWT Domain and Blurred Image Classification. 329-334 - Kensuke Fujinoki:
Image Compression with Average Interpolating Lifting Scheme on Triangular Lattice. 335-340 - Mawardi Bahri
, Ryuichi Ashino:
Convolution and Correlation Theorems for Wigner-Ville Distribution Associated with Linear Canonical Transform. 341-346 - Akira Morimoto, Ryuichi Ashino, Kazuma Ikebe, Motoi Tatsumi, Takeshi Mandai:
Fractional Hilbert Transforms of Biorthogonal Wavelets. 347-352 - Roman Iakymchuk
, David Defour, Caroline Collange, Stef Graillat:
Reproducible Triangular Solvers for High-Performance Computing. 353-358
Session: Software Engineering
- Luiz A. Pacini Rabelo, Antônio Francisco do Prado, Wanderley Lopes de Souza, Luís Ferreira Pires
:
An Approach to Business Process Recovery from Source Code. 361-366 - Joslaine Cristina Jeske de Freitas
, Stéphane Julia:
Fuzzy Time Constraint Propagation Mechanism for Workflow Nets. 367-372 - Eloisa Cristina Silva Santos, Delano Medeiros Beder, Rosângela Aparecida Dellosso Penteado:
A Study of Test Techniques for Integration with Domain Driven Design. 373-378 - Mikko Nieminen, Tomi Räty:
Adaptable Design for Root Cause Analysis of a Model-Based Software Testing Process. 379-384 - Henrique Frota Soares, Nicolli S. R. Alves, Thiago Souto Mendes, Manoel G. Mendonça
, Rodrigo O. Spínola:
Investigating the Link between User Stories and Documentation Debt on Software Projects. 385-390 - Fernanda Madeiral Delfim, Lilian P. Scatalon, Jorge Marques Prates, Rogério Eduardo Garcia
:
Visual Approach for Change Impact Analysis: A Controlled Experiment. 391-396 - Luisa Hernández, Heitor A. X. Costa:
Identifying Similarity of Software in Apache Ecosystem - An Exploratory Study. 397-402 - Rodrigo G. C. Rocha, Ryan R. Azevedo, Dimas Cassimiro do Nascimento
, Renan Leandro, Diogo Espinhara, Eduardo de A. Tavares, Amanda Oliveira
, Gabriel Franca, Cleyton M. O. Rodrigues
, Silvio Meira:
A System Based on Ontology and Case-Based Reasoning to Support Distributed Teams. 403-408 - Roberto Pepato Mellado, Gabriel de Souza Pereira Moreira, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias:
A Software Framework for Identifying the Law of Demeter Violations. 409-414 - Cuauhtémoc López Martín, Arturo Chavoya
, Maria Elena Meda-Campaña
:
A Fuzzy Logic Model for Predicting the Development Schedule of Software Projects. 415-420 - Osama Alkrarha, Jameleddine Hassine
:
MuAsmetaL: An Experimental Mutation System for AsmetaL. 421-426 - Gustavo Vale, Ramon Abílio
, André Pimenta Freire, Heitor A. X. Costa:
Criteria and Guidelines to Improve Software Maintainability in Software Product Lines. 427-432 - Ramon Abílio
, Juliana Padilha, Eduardo Figueiredo
, Heitor A. X. Costa:
Detecting Code Smells in Software Product Lines - An Exploratory Study. 433-438 - Pekka Aho, Matias Suarez, Atif M. Memon, Teemu Kanstrén:
Making GUI Testing Practical: Bridging the Gaps. 439-444 - Jailson Brito, Vaninha Vieira, Adolfo Duran:
Towards a Framework for Gamification Design on Crowdsourcing Systems: The G.A.M.E. Approach. 445-450 - Katyusco de F. Santos, Dalton Dario Serey Guerrero, Jorge C. A. de Figueiredo:
Using Developers Contributions on Software Vocabularies to Identify Experts. 451-456
Session: High Performance Computer Architecture and Green Computing
- Quamar Niyaz, Weiqing Sun, Rao Xu, Mansoor Alam:
Light VN: A Light-Weight Testbed for Network and Security Experiments. 459-464 - Yanqing Ji, Yun Tian, Fangyang Shen, John Tran:
High-Performance Biomedical Association Mining with MapReduce. 465-470 - William Babikian, Zechariah Gajadhar, Anjali Dhobale, Michael Rubenacker, Shouling He:
Integrated Design Patterns for Control System Analysis and Synthesis. 471-472 - James Andro-Vasko, Wolfgang Bein, Dara Nyknahad, Hiro Ito:
Evaluation of Online Power-Down Algorithms. 473-478 - Doina Bein, Wolfgang Bein, Ashish Karki, Bharat B. Madan:
Optimizing Border Patrol Operations Using Unmanned Aerial Vehicles. 479-484 - Jeffrey Anu, Rajeev Agrawal, Cameron Seay, Sambit Bhattacharya:
Smart Grid Security Risks. 485-489 - Md. Masud Rana, Li Li
:
Controlling the Distributed Energy Resources Using Smart Grid Communications. 490-495 - Md. Masud Rana, Li Li
:
Distributed Generation Monitoring of Smart Grid Using Accuracy Dependent Kalman Filter with Communication Systems. 496-500 - Md. Masud Rana, Li Li
:
Kalman Filter Based Microgrid State Estimation Using the Internet of Things Communication Network. 501-505 - Xudong Ma:
Joint Write-Once-Memory and Error-Control Codes. 506-512
Session: Innovative Technologies and Practices in Education and Simulation
- Soumayah F. Alghannam, Mona I. Alawadh
, Dalal A. Alwedaah, Mutlaq B. Alotaibi
:
Critical Success Factors for Location-Based Services in Saudi Arabia. 515-521 - Fausto Abraham Jacques Garcia, Sandra Luz Canchola-Magdaleno:
Vector Cryptography System: An Approach for the Analysis of Linear Arithmetic Spaces. 522-527 - Federico Amendola, Martin Fernandez, Liliana Favre:
GLIESE - A Framework for Experimental Game Development. 528-533 - Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories. 534-539 - Cristian Barria, Cristian Rusu, Claudio Cubillos
, Jaime Díaz
:
Training through Simulation for Digital Battlefield. 540-545 - Freddy Paz, Freddy Asrael Paz, Daniela Villanueva, José Antonio Pow-Sang:
Heuristic Evaluation as a Complement to Usability Testing: A Case Study in Web Domain. 546-551 - Ivan M. Lessa, Glauco de Figueiredo Carneiro
, Miguel P. Monteiro
, Fernando Brito e Abreu
:
A Multiple View Interactive Environment to Support MATLAB and GNU/Octave Program Comprehension. 552-557
Session: Future of Digital Health
- Maa Isakovic, Jaka Cijan, Urban Sedlar, Mojca Volk, Janez Beter:
The Role of mHealth Applications in Societal and Social Challenges of the Future. 561-566 - Ai Keow Lim, Christoph Thuemmler:
Opportunities and Challenges of Internet-Based Health Interventions in the Future Internet. 567-573 - Sweta Gurung, Yoohwan Kim:
Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data? 574-579 - Ahmed Elsherbiny Hasan
, Armin Schneider
, Alois Paulin, Christoph Thuemmler:
Future Internet in Surgical Operating Theatre. 580-585 - Melissa Katherine Mulcahy, Stan Kurkovsky
:
Automatic Fall Detection Using Mobile Devices. 586-588 - Emi Morioka, Mehrdad Sepehri Sharbaf:
Cloud Computing: Digital Forensic Solutions. 589-594 - Alessio Bucaioni, Saad Mubeen, Antonio Cicchetti
, Mikael Sjödin:
Exploring Timing Model Extractions at EAST-ADL Design-Level Using Model Transformations. 595-600 - Swaroop Nunna, Apostolos Kousaridas
, Mohamed Ibrahim, Markus Dillinger, Christoph Thuemmler, Hubertus Feussner, Armin Schneider
:
Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing. 601-605
Session: Data Mining
- Allan Delon Barbosa Araujo, Paulo Caetano da Silva
:
PERSEC - Middleware for Multiple Encryption in Web Services. 609-614 - Vikas G. Ashok, Karthik Navuluri
, A. Alhafdhi, Ravi Mukkamala:
Dataless Data Mining: Association Rules-Based Distributed Privacy-Preserving Data Mining. 615-620 - Mark Smith:
Intelligent Mobile Application for Traffic Monitoring. 621-625 - Chung-Hong Lee, Chih-Hung Wu:
Collecting and Mining Big Data for Electric Vehicle Systems Using Battery Modeling Data. 626-631 - Sonya Zhang:
A Technology-Business-Environment Model for Effective Internet Entrepreneurship Education. 632-637 - Ibraheem Alolyan:
Linear optimization with fuzzy objective function and constraints. 638-639 - Samir N. Hamade:
Parental Awareness and Mediation of Children's Internet Use in Kuwait. 640-645 - Mali Abdollahian
, Nadeera Gnan Tilshan Gunaratne:
Low Birth Weight Prediction Based on Maternal and Fetal Characteristics. 646-650 - Guymon R. Hall, Kazem Taghva
:
Using the Web 1T 5-Gram Database for Attribute Selection in Formal Concept Analysis to Correct Overstemmed Clusters. 651-654
Session WB2: Potpourri
- Luiz Eduardo Guarino de Vasconcelos, Andre Yoshimi Kusumoto, Nelson Paiva Oliveira Leite, Cristina Moniz Araujo Lopes:
Automated Extraction Information System from HUDs Images Using ANN. 657-661 - Michael D. L. Santos, Elcio H. Shiguemori
, Rodrigo Luiz Mendes Mota, Alexandre C. B. Ramos
:
Change Detection in Satellite Images Using Self-Organizing Maps. 662-667 - Pyung-Han Kim, Dae-Soo Kim, Kee-Young Yoo:
Improved Histogram-Shifting-Imitated Reversible Data Hiding Scheme. 668-673 - Moohyun Lee, Soojung Hur, Yongwan Park:
An Obstacle Classification Method Using Multi-feature Comparison Based on 2D LIDAR Database. 674-679 - Gunzung Kim
, Jeongsook Eom, Yongwan Park:
An Experiment of Mutual Interference between Automotive LIDAR Scanners. 680-685 - Liane Gabora:
LIVEIA: A Light-Based Immersive Visualization Environment for Imaginative Actualization. 686-691 - Torbjorn Loken, Sergiu M. Dascalu, Frederick C. Harris Jr.
:
GPU Based Sound Simulation and Visualization. 692-697 - Cheng-Hsiao Wu:
Qubits or Symbolic Substitutions for General-Purpose Quantum Computing? 698-702 - John E. Dorband:
A Boltzmann Machine Implementation for the D-Wave. 703-707 - Laxmi P. Gewali, Pratik Hada:
Constructing 2D Shapes by Inward Denting. 708-713
Session: Posters
- Helidon Karcanaj, Edra Bumci, Igli Tafa, Julian Fejzaj:
Deadlocks in Different Operating Systems. 717-718 - Shih-Wei Fang
, Dananjaya Rajamanthri, Mohammad Husain:
Facebook Privacy Management Simplified. 719-720 - Matteo Virgilio, Guido Marchetto, Riccardo Sisto
:
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking. 721-724 - Ibtisam Mohamed, Dhiren Patel:
Android vs iOS Security: A Comparative Study. 725-730 - Mohammed Alnatheer:
Information Security Culture Critical Success Factors. 731-735 - Fayez Hussain Alqahtani, Ayed Said Alwadain:
Strategy as a Prerequisite of Enterprise Web 2.0 Implementation. 736-739 - Ayed Said Alwadain, Fayez Hussain Alqahtani:
A Model of the Factors Influencing Enterprise Architecture Evolution in Organisations. 740-743 - Jaime Díaz Arancibia
, Cristian Rusu, Cristian Barria, César Collazos O.
:
E-commerce Concerns - Latin American Factors in Transactional Websites. 744-745 - Mozhdeh Sadighi
, Mohammad Mahdi Ghobadi, Seyyed Hossein Hasanpour Matikolaee:
A Conceptual Model for Customer Lock-in Effect in Electronic Business. 746-750 - Antonio Capodieci
, Giuseppe Del Fiore, Luca Mainetti
:
Adopting Collaborative Workflow Pattern: Lesson Learned. 751-755 - Nevila Xoxa, Aldiger Mehilli, Igli Tafa, Julian Fejzaj:
Implementations of File Locking Mechanisms, Linux and Windows. 756-757 - Alban Karapici, Enri Feka, Igli Tafa, Alban Allkoçi:
The Simulation of Round Robin and Priority Scheduling Algorithm. 758 - Alan Ferreiros, Luiz Alberto Vieira Dias:
Evaluation of Accomplishment of DO-178C Objectives by CMMI-DEV 1.3. 759-760 - Alexandre Chaves da Silva, Lucas Roberto Correa
, Luiz Alberto Vieira Dias, Adilson Marques da Cunha
:
A Case Study Using Testing Technique for Software as a Service (SaaS). 761-762 - Yong Shi, Sunpil Kim:
An Attempt to Find Information for Multi-dimensional Data Sets. 763-764 - Cameron Seay, Rajeev Agrawal, Anirudh Kadadi, Yannick Barel:
Using Hadoop on the Mainframe: A Big Solution for the Challenges of Big Data. 765-769 - Pankaj Kamthan:
Using Personas to Support the Goals in User Stories. 770 - Erasmo Leite Monteiro, Paulo Caetano da Silva
:
Risk Management Lifecycle Implementation Services in SOA. 771 - Danielle Amaral Menendez, Elisa S. Menendez, Thiers Garretti Ramos Sousa, Paulo Caetano da Silva
:
Experiment Report on the Implementation of Agile Testing. 772-773 - Breno Lisi Romano, Alan Delgado da Silva:
Project Management Using the Scrum Agile Method: A Case Study within a Small Enterprise. 774-776 - Breno Lisi Romano, Ricardo Bragagnolle de Souza, Adilson Marques da Cunha
:
Deploying Integrated Environment for Software Testing Tools. 777-779 - Lígia Maria Soares Passos
, Stéphane Julia:
Deadlock-Freeness Scenarios Detection in Web Service Composition. 780-783 - Glaydson Luiz Bertoze Lima, Guilherme Augusto Lopes Ferreira, Osamu Saotome
, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias:
Hardware Development: Agile and Co-Design. 784-787 - Clarimundo Machado Moraes Junior, Rita Maria da Silva Julia, Stéphane Julia:
Modeling Recursive Search Algorithms by Means of Hierarchical Colored Petri Nets and CPN Tools. 788-791 - Ahmad Al Kawam, Haidar M. Harmanani
:
A Parallel GPU Implementation of the Timber Wolf Placement Algorithm. 792-795 - Seilkhan Boranbayev, Sanzhar Altayev, Askar Boranbayev:
Applying the Method of Diverse Redundancy in Cloud Based Systems for Increasing Reliability. 796-799 - Jonathon Ng, Deepti Joshi
, Shankar M. Banik:
Applying Data Mining Techniques to Intrusion Detection. 800-801 - Askar Boranbayev, Mikhail Mazhitov, Zhanat Kakhanov:
Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher Education. 802-804

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.