


default search action
17th SNPD 2016: Shanghai, China
- Yihai Chen:

17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2016, Shanghai, China, May 30 - June 1, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2239-7
Keynotes
- Naohiro Ishii:

Data computations for Applied Informatics. 1 - Tokuro Matsuo:

Social service innovations with information technologies. 3
Algorithms
- Hanlin Sun, Wei Jie

, Christian Sauer
, Sugang Ma, Gang Han, Wei Xing:
A self-organizing algorithm for community structure analysis in complex networks. 5-12 - Huazhen Xu, Zhen You, Jinyun Xue:

Automatic verification of non-recursive algorithm of Hanoi Tower by using Isabelle Theorem Prover. 13-18 - Fang Wang, Liang Deng, Dan Zhao, Sikun Li:

An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MIC. 19-26 - Yuhan Dong

, Hui Wang, Lin Zhang, Kai Zhang:
An improved model for PM2.5 inference based on support vector machine. 27-31 - Cheng Feng, Bo Yang:

Projection search for approximate nearest neighbor. 33-38 - Yue Fan, Qinke Peng:

Inferring gene regulatory networks based on spline regression and Bayesian group lasso. 39-42 - Hiba Yahyaoui, Abdelkader Dekdouk, Saoussen Krichen

:
A hybrid VNS based framework for biomass transportation. 43-48
Artificial Intelligence
- Ming Zhang, Chenrui Hu:

Ultra High Frequency Polynomial and Cosine Artificial Higher Order Neural Networks. 49-56 - Guorui Zhou, Guang Chen:

Hierarchical Latent Semantic Mapping for automated topic generation. 57-63 - Ying Liu, Wei Song, Lizhen Liu, Hanshi Wang:

Document representation based on semantic smoothed topic model. 65-69 - Haobin Shi

, Xuesi Li, Weihao Liang, Ming'ai Dang, Huahui Chen, Shixiong Wang:
A novel fuzzy omni-directional gait planning algorithm for biped robot. 71-76 - Song Zheng, Xiaoqing Zheng, Chunlin Wang:

The optimization of beer recipe based on an improved ant colony optimization. 77-80 - Shunsuke Akai, Teruhisa Hochin, Hiroki Nomiya

:
Characteristics of analysis methods for the Impression Evaluation Method by Space. 81-86 - Jian Wang, Jingqiu Gong:

Team negotiation based on solidarity behavior: A concession strategy in the team. 87-92 - Guolong Liu, Xiaofei Xu, Bailong Deng, Siding Chen, Li Li:

A hybrid method for bilingual text sentiment classification based on deep learning. 93-98 - Sai Hong, Wei Su

, He Lin, Xianchao Lv:
Functional classification study for mathematical formulas retrieval. 99-104 - Jingfang Jiang, Ying Zeng, Li Tong, Chi Zhang, Bin Yan:

Single-trial ERP detecting for emotion recognition. 105-108 - Souheila Ben Guirat

, Ibrahim Bounhas, Yahya Slimani:
A hybrid model for Arabic document indexing. 109-114 - Talele Kiran, Tuckley Kushal:

Facial expression classification using Support Vector Machine based on bidirectional Local Binary Pattern Histogram feature descriptor. 115-120
Software Engineering & System Design
- Yuchen Zhang, Chengcheng Wan, Bo Jin:

An empirical study on recovering requirement-to-code links. 121-126 - Hao Chong, Renwei Zhang, Zheng Qin:

Composite-based conflict resolution in merging versions of UML models. 127-132 - Marwa Hentati, Lassaad Ben Ammar

, Abdelwaheb Trabelsi
, Adel Mahfoudhi:
A fuzzy-logic system for the user interface usability measurement. 133-138 - Mohamed Garoui

:
A formal model for safety evaluation of platooning system. 139-146
Communication Systems and Networks
- Fan-Zhen Kong, Nae Zheng, Guanyi Liu, Xiukun Ren:

Position orientating path reverse ray tracing algorithm based on cluster analysis. 147-153
Cryptography and Network Security
- Yanjie Zhao:

Network intrusion detection system model based on data mining. 155-160 - Haitao Dong, Jun Yang, Yiqiang Sheng

:
Request distribution with pre-learning for distributed SSL reverse proxies. 161-167 - Ali Ahmad Malik, Hirra Anwar, Muhammad Awais Shibli:

Self-adaptive access control & delegation in cloud computing. 169-176
Data Mining and Machine Learning
- Yuhan Dong

, Siyuan Qian, Jinxing Liu, Lin Zhang, Kai Zhang:
Optimal placement of charging stations for electric taxis in urban area with profit maximization. 177-182
Embedded Systems
- Seunghoon Yoo, Hyokyung Bahn:

An efficient page replacement algorithm for PCM-based mobile embedded systems. 183-188 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Yuto Lim

:
Scheduling overload for real-time systems using SMT solver. 189-194
Image, Speech, and Signal Processing
- Jianguo Liu, Xuesong Li, Qin Qin, Hao Zhang:

Study of occlusion problem in stereo matching. 195-199 - Di Zang, Junqi Zhang, Dongdong Zhang, Maomao Bao, Jiujun Cheng, Keshuang Tang:

Traffic sign detection based on cascaded convolutional neural networks. 201-206 - Xiaoqing Jiang:

Sample reconstruction and secondary feature selection in noisy speech emotion recognition. 207-211 - Zhongguo Li, Lei Zeng, Ti Wang, Jian Chen, Bin Yan:

Image segmentation based on local Chan-Vese model optimized by max-flow algorithm. 213-218 - Nirmala Salam, Rekha P. Nair:

Improved accuracy of speaker verification system in noisy environment. 219-224 - Jiajun Chen, Meng-meng Han, Shu Yang, Yuchun Chang:

A fingertips detection method based on the combination of centroid and Harris corner algorithm. 225-230 - Feroz Mahmud Amil, Mostafijur Rahman, Shanto Rahman, Emon Kumar Dey

, Mohammad Shoyaib:
Bilateral histogram equalization with pre-processing for contrast enhancement. 231-236 - Shaojun Zhang, Jianhua Pang, Hailong Chen, Sheng Zhang:

A layered tone-mapping operator based on contrast enhanced adaptive histogram equalization. 237-242
Internet Technology and Applications
- Ruonan Sun, Bin Zhang, Tingting Liu:

Ranking web service for high quality by applying improved Entropy-TOPSIS method. 249-254 - Muhammad Adeel, Nabeel ur Rehman:

Intelligent mailbox with centralized parallel processing. 255-259
Mobile/Wireless/Ad-Hoc Networks
- Changsheng Yin, Ruopeng Yang, Dongdong Wu, Wei Zhu:

Joint multi-channel assignment and routing in wireless mesh network. 261-265 - Qiao Li, Zhendong Niu

, Baihai Zhang, Lingguo Cui, Bin Wu:
Percolation thresholds on tree-based communities of wireless sensor networks. 267-273 - Hongyu Wang, Zhanhao Zhao, Jialiang Hu, Zhenxin Qu, Hao Feng:

Study on improvement of fingerprint matching algorithm in wireless LAN based indoor positioning system. 275-280 - M. Aziz ul Haq, M. Arif Khan

, Md. Rafiqul Islam
:
A novel compact antenna design for secure eHealth wireless applications. 281-286
Neural Networks & Genetic Algorithms
- Meng-meng Han, Jiajun Chen, Ling Li, Yuchun Chang:

Visual hand gesture recognition with convolution neural network. 287-291
Parallel and Distributed Computing
- Zhen Yang, Zhen Yu, Xiaohong Su, Peijun Ma:

RaceTracker: Effective and efficient detection of data races. 293-300 - Xiaoqing Wang, Xianlong Jin:

A distributed-memory parallel approach for the generation of multibillion element tetrahedral meshes. 301-306 - Mi Li, Jie Huang, Jingpeng Wang:

Accelerated diffusion-based recommendation algorithm on tripartite graphs with GPU clusters. 307-312 - Mi Li, Jie Huang, Jingpeng Wang:

Paralleled Fast Search and Find of Density Peaks clustering algorithm on GPUs with CUDA. 313-318 - Feng Qiu, Bin Zhang, Jun Guo:

A deep learning approach for VM workload prediction in the cloud. 319-324 - Xiaohui Pan:

A comparative evaluation of open-source graph processing platforms. 325-330 - Qingyu Yang, Zhengan Tan, Dou An, Wei Yu

, Xinyu Yang:
On optimal electric vehicles penetration in a novel Archipelago microgrids. 331-336 - Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu

, Qingyu Yang:
A novel microgrid based resilient Demand Response scheme in smart grid. 337-342 - Lin Shu, Jie Hao, Yafang Song, Chengcheng Li, Donglin Wang:

Optimal many-to-many personalized concurrent communication in RapidIO-based fat-trees. 343-350
Software Specification & Architecture
- Junfeng Qu

, Yinglei Song, Yong Wei:
Design patterns applied for game design patterns. 351-356 - Xiaobing Sun

, Xiangyue Liu, Bin Li, Yucong Duan, Hui Yang, Jiajun Hu:
Exploring topic models in software engineering data analysis: A survey. 357-362 - Xi Wang, Weikai Miao:

Automatic support for formal specification construction using pattern knowledge. 363-372 - Hongliang Liang, Daijie Zhang, Xiaodong Jia, Xiaoxiao Pei, Guangyuan Li:

Verifying RTuinOS using VCC: From approach to practice. 373-378 - Marwa Hachicha, Emna Dammak, Riadh Ben Halima, Ahmed Hadj Kacem:

A correct by construction approach for modeling and formalizing self-adaptive systems. 379-384
Software Testing
- Bin Zhang, Chao Feng, Bo Wu, Chaojing Tang:

Detecting integer overflow in Windows binary executables based on symbolic execution. 385-390 - Gang Li, Lei Yu, Huihui Sun:

A framework for test data generation of object-oriented programs based on complete testing chain. 391-397 - Xinglong Zhang, Lei Yu, Xuemei Hou:

A method of metamorphic relations constructing for object-oriented software testing. 399-406 - Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu:

MLSA: A static bugs analysis tool based on LLVM IR. 407-412 - Hongliang Liang, Qian Zhao, Yuying Wang, Haifeng Liu:

Understanding and detecting performance and security bugs in IOT OSes. 413-418 - Tingting Ma, Hongwei Zeng, Xiaolin Wang:

Test case prioritization based on requirement correlations. 419-424
Web-Based Applications
- Fagui Mao, Xuyang Cai, Beijun Shen, Yong Xia, Bo Jin:

Operational pattern based code generation for management information system: An industrial case study. 425-430 - Wenli Qi, Fangfang Liu

:
Service matchmaking with closed world reasoning. 431-436
Computer Architecture
- Liu Tang, Zhangqin Huang:

Mechanistic relationship between instruction fetch width and basic block size to architectural vulnerability factor. 437-442 - Liu Tang, Zhangqin Huang:

A method for issue queue soft error vulnerability mitigation. 443-450
Natural Language Processing
- Nabil Khoufi

, Chafik Aloulou, Lamia Hadrich Belguith
:
Toward hybrid method for parsing Modern Standard Arabic. 451-456
Spatial Data Warehouse
- Saida Aissi

, Mohamed Salah Gouider, Tarek Sboui, Lamjed Ben Said
:
Enhancing spatial data warehouse exploitation: A SOLAP recommendation approach. 457-464
7th International Workshop on Intelligent Computational Science (ICS-2016)
- Letian Li, Lin Wu, Yongcun Gao:

Improved image matching method based on ORB. 465-468 - Di Zhang, Ligu Zhu, Zida Xiao, Lei Zhang:

Visual abstraction improvement of interactive dot map. 469-474 - Xuhui Chen, Ejaz Ul Haq, Jiawei Lin:

Design, modeling and tuning of modified PID controller for autopilot in MAVs. 475-480 - Ming Ke, Zhao Cao, Zhijing Li, Xuhui Chen:

The research of the brain default network using cascading algorithm. 481-486 - (Withdrawn) Adaptive Fuzzy PID speed control of DC belt conveyor system. 487-490

- Shunan Lan, Weiguo Lin:

Genetic algorithm optimization research based on simulated annealing. 491-494 - Jiyuan Li, Wenfeng Hu:

Development of puzzle game about children's etiquette based on Unity3D. 495-500 - Bo Wang, Xin Zhang:

Research and implementation of documented media asset management mode. 501-506 - Zhenzhong Li, Wenqian Shang, Yuqi Wang:

A novel multidimensional professionalism evaluation model. 507-510 - Min Wang, Yongbin Wang:

SLACM: Heterogeneous multilevel service aggregation access control model based situation logic. 511-516 - Sichao Liu, Yuan Liu:

Network security risk assessment method based on HMM and attack graph model. 517-522 - Hui Li, Xiaohua Shi, Kejun Li, HongYu Yu:

Development of electrostatic decay time intelligent test instrument and software design. 523-526 - Shaochun Xu, Lichao Chen, Chunning Wang, Oleksandr Rud:

A comparative study on black-box testing with open source applications. 527-532
Special Session 1: Software Quality and Testing
- Jiawen Lu, Lizhi Cai, Yang Zhang

, Keyi Hong:
Complexity analysis and comparison of test paths based on DSE. 533-539 - Jiayu Gong, Lizhi Cai, Yuxin Shen:

Evaluating accuracy and performance of GPU-accelerated random walk computation on heterogeneous networks. 541-545 - Zhenzheng Qian, Chengcheng Wan, Yuting Chen:

Evaluating quality-in-use of FLOSS through analyzing user reviews. 547-552 - Jiwen Ding, Xiushuang Yi, Jun Guo:

Research and practice on the whole life cycle test process model. 553-556 - Jianxin Ge, Jiaomin Liu:

Software test cases recommendation system research based on collaborative filtering. 557-562 - Yaping Yang, Lizhi Cai, Yanguo Zhang:

Research on non-authorized privilege escalation detection of android applications. 563-568
Special Session 2: Secure and Scalable Computing in Clouds
- Mengbo Xie, Quan Qian:

Fuzzy set based data publishing for privacy preservation. 569-574 - Lifeng Li, Xiaowan Chen, Hai Jiang, Zhongwen Li, Kuan-Ching Li

:
P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. 575-580 - Che-Lun Hung, Ren-You Yan, Hsiao-Hsi Wang:

Parallel image dehazing algorithm based on GPU using fuzzy system and hybird evolution algorithm. 581-583 - Shenquan Han, Zhou Lei, Wenfeng Shen, Shengbo Chen, Huiran Zhang

, Tao Zhang
, Baoyu Xu:
An approach to improving the performance of CUDA in virtual environment. 585-590
Special Session 3: Software Maintenance and Evolution
- Jianjun Shi, Weixing Ji, Lulu Zhang, Yujin Gao, Han Zhang, Duzheng Qing:

Profiling and analysis of object lazy allocation in Java programs. 591-596 - Chongyang Shi, Linjing Lai, Jing Fan, Yu Bai:

Similarity model based on CBR and FCA. 597-603 - Qiming Zhang, Qian Chen, Yunliang Tao:

Study on the evolution process of nuclear accident consequence assessment system. 605-611
Special Session 4: User Modeling and Personalized Service Recommendation in Social Networks
- Guobing Zou, Mei Zhao, Sen Niu, Yanglan Gan, Bofeng Zhang:

Computing uncertain skyline of Web services via interval number. 613-618 - Mengqi Guo, Qin Li, Wenfeng Shen, Guangren Qian, Huiran Zhang

:
An accelerating approach for simulating texture sharp transition mechanism of pyrocarbon on Hexagonal-Mesh Surface. 619-623 - Chengwei Gu, Bofeng Zhang, Xinyue Wan, Mingqing Huang, Guobing Zou:

The modularity-based Hierarchical tree algorithm for multi-class classification. 625-629
Special Session 5: Image Processing Methods and Applications
- Satoshi Watanabe, Kazuki Murakami, Tomoya Furukawa, Qiangfu Zhao:

Steganalysis of JPEG image-based steganography with support vector machine. 631-636 - Rethabile Khutlang, Nontokozo P. Khanyile, Sisanda Makinana, Fulufhelo V. Nelwamondo:

High resolution feature extraction from optical coherence tomography acquired internal fingerprint. 637-641 - Sihai Yang, Duansheng Chen, Xian-Hua Han, Yen-Wei Chen:

A novel and fast connected component count algorithm based on graph theory. 643-647 - Kodai Miyajima, Gen Fujita:

Motion estimation method based on efficient memory bandwidth for HEVC real-time algorithm based on graph theoryncoding. 649-653 - Sikai Zhong, Sheng Chen:

An improved unsharp masking model for intensive care unit chest radiograph enhancement. 655-661 - Weiwei Du, Yi-Peng Liu, Shiyang Wang, Yahui Peng, Aytekin Oto:

Features extraction of prostate with graph spectral method for prostate cancer detection. 663-668
Special Session 6: Software Engineering for Cloud Computing
- Suna Yin, Dehua Chen, Jiajin Le:

STNoSQL: Creating NoSQL database on the SensibleThings platform. 669-674 - Nannan Liu, Xian Xu:

On higher-order communication of Erlang. 675-679 - Bing Meng, Weibin Guo, Guisheng Fan, Neng-wu Qian:

A novel approach for efficient accessing of small files in HDFS: TLB-MapFile. 681-686 - Xin Pei, Jiuchuan Lin, Bo Jin, Yongjian Wang:

Ensuring replication-based data integrity and availability in multicloud storage. 687-692 - Xiang Ji

, Huiqun Yu, Guisheng Fan, Wenhao Fu:
Attack-defense trees based cyber security analysis for CPSs. 693-698

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














