


default search action
RACS 2019: Chongqing, China
- Chih-Cheng Hung, Qianbin Chen, Xianzhong Xie, Christian Esposito, Jun Huang, Juw Won Park, Qinghua Zhang:

Proceedings of the Conference on Research in Adaptive and Convergent Systems, RACS 2019, Chongqing, China, September 24-27, 2019. ACM 2019, ISBN 978-1-4503-6843-8
System software
- Yi-Shen Chen, Sheng-Wei Cheng, Tei-Wei Kuo

:
Performance tuning case study on graphics processing unit-accelerated monte carlo simulations for proton therapy. 1-6 - Chin-Hsien Wu, Po-Ling Lin, Yu-Hun Hu, Ming-Yang Du:

A data sanitization method for mobile devices with NAND flash memory. 7-13 - Chin-Fu Kuo, Jian-Xing Lin, Yung-Feng Lu:

Energy-efficient scheduling algorithm for real-time tasks with multiple parallel segments in multiprocessor systems. 14-19 - Yung-Feng Lu, Hung-Ming Chen, Chin-Fu Kuo, Bo-Kai Tseng, Shih-Chun Chou:

Container-based load balancing for WebRTC applications. 20-26 - Xing Liu, GuangMing Sheng, Bing Shi, Christophe de Vaulx

, Wenbi Rao, Qing Li:
MIPS CPU development with analogous teaching method for experimental teaching of digital logic and computer organization. 27-33 - Wei Li, Guanxi Shen, Jinbo Zhang:

An indoor environmental monitoring system for large buildings based on LoRaWAN. 34-38 - Chia-Hsueh Wu, Chen-Tui Hung, Ya-Shu Chen:

Energy-aware offloading for mobile computing with heterogeneous network. 39-44 - Baonan Xiao, Jianfeng Yang, Shixiao Wu, Qing Geng:

Using real-time image enhancement technique to improve prostate capsula detection. 45-50 - Evariste Ntaryamira

, Cristian Maxim, Liliana Cucu-Grosjean:
Data consistency and temporal validity under the circular buffer communication paradigm. 51-56
Short papers (posters)
- Eunseok Choi, Jiman Hong:

Design and implementation of virtual machine control and streaming scheme using Linux kernel-based virtual machine hypercall for virtual mobile infrastructure. 57-60 - Sangmin Park, Bada Kim, Taeyeon Won, Junyoung Heo:

IoT-based floodgate control system. 61-62 - Taeyeon Won, Bada Kim, Sangmin Park, Junyoung Heo:

An IoT based distortion invariant motion detection using raspberry pi with mean shift algorithm. 63-64 - Seoyeon Kim, Jisu Park, Jaehyeok Jeong, Young-Sun Yun, Seongbae Eun, Jinman Jung:

Survey of IoT platforms supporting artificial intelligence. 65-66
Artificial intelligence & algorithms
- Rui Zhang, Jun Zhou, Lixiao Feng, Wei Ma:

Study of variable liquid fertilization control system based on fuzzy PID control. 67-70 - Chuang Wang, Jiakun Li, Tian Wang, Peng Shi, Hichem Snoussi, Xin Su:

Abnormal object detection and recognition in the complex construction site via cloud computing. 71-75 - Mahsa Shokri Varniab, Chih-Cheng Hung, Vahid Khalilzad-Sharghi:

Classification of multiclass datasets using genetic programming. 76-82 - Zhengze Zhu, Haiying Zhou, Kun Mean Hou, Kui Zhou, Sishan Wang, Jianping Lan, Jiayuan Gong, Dong Bi:

Modeling and control method of connected and autonomous vehicles(CAVs) in urban traffic network based on PC algorithm. 83-90 - Tingting Zhang, Guimiao Liu, Ling Xia, Xiaofeng Liu:

Human evaluation of virtual and real-world distance. 91-95 - Zhixiang Deng, Qian Sang, Yan Pan, Yuanxue Xin:

Application of deep learning for power control in the interference channel: a RNN-based approach. 96-100 - Qinglin Yang, Xiaofei Luo, Peng Li, Toshiaki Miyazaki, Xiaoyan Wang:

Computation offloading for fast CNN inference in edge computing. 101-106 - Dongyoun Kim, Sangwon Shin

, Jinwoo Park, Sung Shin:
Development of a semantic scene conversion model for image-based localization at night. 107-112 - Youjeong Jang, Hyung-Do Choi, Fang Deng, Sung Shin:

Evaluation of deep learning models for information extraction from EMF-related literature. 113-116 - Ki Sun Park, Kyoung-Soon Hwang, Keon Myung Lee, Chan Sik Han, Jin Han:

Machine learning modeling assistance for non-expert developers. 117-122
Short papers (posters)
- Bada Kim, Taeyeon Won, Sangmin Park, Junyoung Heo:

Anomaly detection for deep-learning based license plate recognition in real time video. 123-124 - Boseon Hong, Bongjae Kim

, Jeong-Dong Kim, Jeahyoun Koo:
Performance analysis of chinese cursive character recognition based on convolutional neural network. 125-127 - Heejin Kim, Younggwan Kim, Jiman Hong:

Cluster management framework for autonomic machine learning platform. 128-130 - Boseon Hong, Jinsung Cho, Bongjae Kim

, Hong Min, Jiman Hong, Keon Myung Lee:
A study on supporting spiking neural network models based on multiple neuromorphic processors. 131-132
Image processing
- Hong Shen, Yuuki Kaiya:

Distinction of vegetable diseases by image processing. 133-136 - Kai Che, Yufeng Chen, Zhengtao Xiang, Guosheng Peng, Jian Lv, Yun Zhou:

Research of infrared image super-resolution reconstruction based on improved FSRCNN. 137-142 - Ling Xia, Tingting Zhang, Xiaofeng Liu:

Validity of deriving low order photometry parameters from light solid distribution. 143-146 - Chungyup Lee, Soohyeon Choi, Jung-Yeop Kim, Kwanghee Won

:
Instance segmentation in urban scenes using inverse perspective mapping of 3D point clouds and 2D images. 147-152
Database & data mining
- Chengming Zou, Fanchao Zhao, Yi Xie, Haiying Zhou, Jun Qin:

Live migration in Greenplum database based on SDN via improved gray wolf optimization algorithm. 153-160 - Zhangyu Cheng, Chengming Zou, Jianwei Dong:

Outlier detection using isolation forest and local outlier factor. 161-168 - Jiwon Hong, Sung-Jun Park, Taeri Kim, Yung-Kyun Noh, Sang-Wook Kim, Dongphil Kim, Wonho Kim:

Malware classification for identifying author groups: a graph-based approach. 169-174
Network computing
- Yuchen Gan, Xin Su, Chang Choi, Zhou Zhou:

Clustered NFV service chaining scheme for ocean observations. 175-180 - Chi-Sheng Shih, Kai-Wei Yang:

Design and implementation of distributed traceability system for smart factories based on blockchain technology. 181-188 - Godwin Kobby Gakpo, Xin Su, Chang Choi:

Moving intelligence of mobile edge computing to maritime network. 189-193 - Gang Yang, Jun Huang, Longyan Xu, Yahong Zhai:

Energy scheduling mechanism for intelligent terminal with simultaneous wireless information and power transfer. 194-199 - Pengfei Wu, Jun Huang, Longyan Xu:

Energy-efficient power allocation in analogue network coding based multi-hop D2D communication. 200-205 - Yinping Ding, Jun Huang, Peng Zhou:

Performance analysis for multi-priority data flow scheduling in SDN. 206-211 - Junho Seo, Sungwon Lee, Muhammad Toaha Raza Khan, Dongkyun Kim:

Adaptive selection of configuration methods in 6LoWPAN based IoUT. 212-216 - Cissoko Moussa, Haibo Zhang, Hasan Shamim, Kaijian Liu:

Task offloading strategies based on workload balancing in ultra-dense networks. 217-223 - Hasan Shamim, Haibo Zhang, Cissoko Moussa, Kaijian Liu:

Effective capacity-aware resource allocation for 5G ultra dense network with hybrid access mode. 224-229 - Sangwon Shin

, Soohyeon Choi, Kwanghee Won, Sung Y. Shin:
Preprocessed symmetric RSA authentication for wireless body area networks in space. 230-235 - Siri Guleng, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji:

Traffic big data assisted broadcast in vehicular networks. 236-240
Short papers (posters)
- Seungyeon Lee, Mhanwoo Heo, Kicheol Park, Bongjae Kim

, Jiman Hong:
Enhancing the security of IoT gateway based on the classification of user security-sensitive data. 241-243
Software engineering
- Yang Zhang

, Jiacheng Li, Jiaoman Du, Lei Li
:
Time-dependent theme park routing problem. 244-249 - Xincheng Huang, Wei Jian, Cheng Yang, Yiren Li, Yun Gao, Zhihu Wang:

Sliding mode control of PMSM based on novel convergence reaching law. 250-255 - Abdulrahman Abu Elkhail, Jan Svacina, Tomás Cerný:

Intelligent token-based code clone detection system for large scale source code. 256-260 - Antonin Smid, Ruolin Wang, Tomás Cerný:

Case study on data communication in microservice architecture. 261-267
Security
- Geng Zhang, Jian Hou, Yang Wang, Yanan Wang, Jianguo Zhou:

Vulnerability analysis and optimization of power communication network. 268-275 - Seong Il Bae, Soo Han Kim, Eul Gyu Im:

Automatic hybrid analysis technique to improve botnet code coverage using fake server. 276-282 - Jong Youn Lee, Jun Young Chang, Eul Gyu Im:

DGA-based malware detection using DNS traffic analysis. 283-288 - YongJoo Lee, Keon Myung Lee:

Blockchain-based RBAC for user authentication with anonymity. 289-294 - Wenming Jiao, Heng Zhang, Qiyan Zang, Jian Zhang, Hongran Li:

Iris biometric feature hidden based on chaotic encryption. 295-299
Short papers (posters)
- Yena Lee, Yongmin Kim, Seungyeon Lee, Junyoung Heo, Jiman Hong:

Machine learning based Android malware classification. 300-302

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














