default search action
15th ICIS 2016: Okayama, Japan
- 15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016, Okayama, Japan, June 26-29, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0806-3
Keynote
- Hiroyuki Tarumi:
Remote entertainment performances and social feedbacks. 1 - Yeong-Tae Song:
Toward connected personal healthcare: Keynote address. 1-2
Toward Connected Personal Healthcare
- Simon Xu:
Static approaches for concept location during software evolution. 1
Communication Systems & Networks
- Hsung-Pin Chang, Tsung-Yu Yeh:
A software-based fault detection scheme for wireless sensor networks. 1-6 - Na Wang, DongQian Liu:
Trust model based on changeable sampling frequency for wireless sensor network. 1-4 - Daisuke Mitsunaga, Thae Thae Yu Khine, Hua-An Zhao:
A low complexity ZF-based lattice reduction detection using curtailment parameter in MIMO systems. 1-5 - Thae Thae Yu Khine, Koji Araki, Daisuke Mitsunaga, Hua-An Zhao:
A nearest neighbor search algorithm for LR-LD on high SNR. 1-5 - Patrick Wan-Hin Luk, Ga Ching Lui, Kwok Yip Szeto:
Optimization of systemic stability of directed network using genetic algorithm. 1-6 - Ching-Lung Chang, Kuan-Yi Ho:
Slot assignment for TDMA MAC in industrial wireless sensor network. 1-5 - Yuusuke Ookita, Satoshi Fujita:
Cost-effective index poisoning scheme for P2P file sharing systems. 1-6 - Afef Ghabri, Leila Horchani, Monia Bellalouna:
New fault tolerant strategy of wireless sensor network. 1-6 - Furqan Haider Qureshi, Qasim Umar Khan, Shahzad Amin Sheikh:
SEP performance of triangular QAM with SC and GSC spatial diversity over Rayleigh channels. 1-5
Control Systems, Intelligent Systems
- Bin-Han Liu, Jen-Hao Teng, Yi-Cheng Lin:
Smart Time-Division-Multiplexing control strategy for voltage multiplier rectifier. 1-6 - Ching-Min Lee:
Analysis and control for discrete-time singular systems with interval time-varying delay. 1-5 - Yaning Li, Xuelei Wang, Jie Tan:
Modeling of integrated processes for coking flue gas desulfurization and denitrification based on RBFNN. 1-6 - D. A. Irosh P. Fernando, Frans A. Henskens:
The select and test algorithm for inference in medical diagnostic reasoning: Implementation and evaluation in clinical psychiatry. 1-9
Computer Architecture and VLSI
- Gwan-Hwan Hwang, Shang-Yu Yeh:
Proof of violation for availability in cloud systems. 1-7 - Abdul Mateen, Adia Khalid, Lal Khan, Sehrish Majeed, Tooba Akhtar:
Vigorous algorithms to control urban vehicle traffic. 1-5 - Mohammed Mreea, Kumudu S. Munasinghe, Dharmendra Sharma:
A strategic decision value model for cloud computing in Saudi Arabia's public sector. 1-7 - Hasitha Muthumala Waidyasooriya, Masanori Hariyama:
FPGA-based deep-pipelined architecture for FDTD acceleration using OpenCL. 1-6 - Hasitha Muthumala Waidyasooriya, Masanori Hariyama, Kota Kasahara:
Architecture of an FPGA accelerator for molecular dynamics simulation using OpenCL. 1-5 - BaoKang Wang, Yuki Fukazawa, Toshio Kondo, Takahiro Sasaki:
A cache memory with unit tile and line accessibility. 1-6
Data Mining, Data Warehousing & Database
- Chung-Ping Young, Yen-Bor Lin, Ting-Ying Wei:
VOSync: An implementation of synchronization system for the virtual orchestra. 1-6 - Hsuan-Han Chang, Kuan-Ting Chen, Pao-Lien Lai:
Systematic approaches to embed cycles in balanced hypercubes. 1-5 - Preeti Bansal, Durga Toshniwal:
Analyzing civic complaints for proactive maintenance in smart city. 1-6 - Artinat Wattanaburanon, Nakornthip Prompoon:
Method for classifying usability qualities and problems for action games from user reviews using text mining. 1-6 - Issariya Uboltham, Nakornthip Prompoon, Wirichada Pan-ngum:
AKIHelper: Acute kidney injury diagnostic tool using KDIGO guideline approach. 1-6 - Mohammad Hanif Gharanai:
Shaping the Afghan learning settings and power to the learners through a high-tech library management system. 1-6 - Bushra Alhijawi, Yousef Kilani:
Using genetic algorithms for measuring the similarity values between users in collaborative filtering recommender systems. 1-6 - Naveen Mysore:
An elastic group recommendation system designed for multivariate dynamic attributes. 1-6 - Takafumi Nakanishi, Ryotaro Okada, Takashi Kitagawa:
Automatic media content creation system according to an impression by recognition-creation operators. 1-6
Investment Pattern Clustering Based on Online P2PLending Platform
- Nianlong Luo, Fan Shen:
Investment pattern clustering based on online P2P lending platform. 1-6 - Tousif Osman, Maisha Mahjabeen, Shahreen Shahjahan Psyche, Afsana Imam Urmi, J. M. Shafi Ferdous, Rashedur M. Rahman:
Adaptive food suggestion engine by fuzzy logic. 1-6 - Ruhul Amin Dicken, S. A. M. Fazle Rubby, Sheefta Naz, A. M. Arefin Khaled, Ashraful Azad, Rashedur M. Rahman:
Risk assessment of the top five malignancies among males and females with respect to occupation, educational status and smoking habits. 1-6 - Md. Saidur Rahman, Md. Saifur Rahman, Shahnewaz Ul Islam Chowdhury, Ashfaq Mahmood, Rashedur M. Rahman:
A personalized music recommender service based on Fuzzy Inference System. 1-6 - Sumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma:
GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits. 1-6 - Fahim Jawad, Tawsif Ur Rahman Choudhury, S. M. Asif Sazed, Shamima Yasmin, Kanaz Iffat Rishva, Fouzia Tamanna, Rashedur M. Rahman:
Analysis of Optimum Crop Cultivation using Fuzzy System. 1-6 - Jutamard Kawises, Wiwat Vatanawood:
A development of RDF data transfer and query on Hadoop Framework. 1-4 - Yeming Tang, Qiuli Tong:
BordaRank: A ranking aggregation based approach to collaborative filtering. 1-6 - Aurawan Imsombut, Chaloemphon Sirikayon:
An alternative technique for populating Thai tourism ontology from texts based on machine learning. 1-4
Knowledge Discovery, Neural Networks and Genetic Algorithms
- Yushan Hsu, Ming-Fu Hsu, Sin-Jin Lin:
Corporate risk estimation by combining machine learning technique and risk measure. 1-4 - Kanjana Ruttanateerawichien, Werasak Kurutach, Tantikorn Pichpibul:
A new efficient and effective golden-ball-based technique for the capacitated vehicle routing problem. 1-5 - Jui-Yu Wu:
An evolutionary multi-layer perceptron neural network for solving unconstrained global optimization problems. 1-6 - Maitreyi Abhyankar, Arti Khaparde, Vaidehi Deshmukh:
Spatial domain decision based image fusion using superimposition. 1-6 - Emre Oner Tartan, Hamit Erdem:
A simple population based hybrid harmonic estimation algorithm. 1-6 - Bo-Ruei Peng, Shun-Chung Wang, Yi-Hua Liu, Huang Yan-Syun:
A Li-ion battery charger based on remaining capacity with fuzzy temperature control. 1-5 - Duangjai Jitkongchuen, Pongsak Phaidang, Piyalak Pongtawevirat:
Grey wolf optimization algorithm with invasion-based migration operation. 1-5 - Wei-Hao Huang, Shu-Hung Liao, Jen-Hao Teng, Ting-Yen Hsieh, Bo-Ren Lan, Chih-Chieh Chiang:
Intelligent control scheme for output efficiency improvement of parallel inverters. 1-6 - Attawat Panich, Wiwat Vatanawood:
Detection of design patterns from class diagram and sequence diagrams using ontology. 1-6 - Nadra Ben Romdhane, Hazar Mliki, Mohamed Hammami:
An improved traffic signs recognition and tracking method for driver assistance system. 1-6 - Hiroyasu Usami, Yuki Hanai, Yuji Iwahori, Kunio Kasugai:
3D shape recovery of polyp using two light sources endoscope. 1-6 - Ya-Ting Lee, Teng-Shung Chiang, Chian-Song Chiu:
Neural network data modeling and its application on effect analysis of head and shoulder acupoint massage. 1-6 - Hong He, Xiaowen Yan, Wei Wei:
Meridian ECG information transmission system modeling using NARX neural network. 1-6 - Michael Manuel Smith, Yun-Shiow Chen:
A novel evolutionary algorithm for the homogeneous Probabilistic Traveling Salesman Problem. 1-6 - Ghofrane Rehaiem, Hamza Gharsellaoui, Samir Ben Ahmed:
A neural networks based approach for the real-time scheduling of reconfigurable embedded systems with minimization of power consumption. 1-6 - Bin Zhang, Changqin Quan, Fuji Ren:
Study on CNN in the recognition of emotion in audio and images. 1-5 - Xiao Sun, Chongyuan Sun, Fuji Ren, Fang Tian, Kunxia Wang:
Emotional element detection and tendency judgment based on mixed model with deep features. 1-6 - Honglu Zhou, Mingli Song:
An improvement of partheno-genetic algorithm to solve multiple travelling salesmen problem. 1-6 - Kohei Arimoto, Hidenori Watanave:
Visualization of hierarchicaltransaction network. 1-4 - Satoshi Shimizu, Kazuaki Yamaguchi, Toshiki Saitoh, Sumio Masuda:
A fast heuristic for the minimum weight vertex cover problem. 1-5 - Na Jia, Chi Xu, Huiqun Zhao:
Video annotation for players' tactics in sport competition. 1-6 - Houda Abadlia, Nadia Smairi, Khaled Ghédira:
A new proposal for a multi-objective technique using SMPSO and Tabu search. 1-6
Image Processing & Pattern Recognition
- Yen-Bor Lin, Chung-Ping Young:
An implementation of spatial algorithm to estimate the focus map from a single image. 1-5 - Xu-Mei Shen, Juxiang Zhou, Tianwei Xu:
Minority costume image retrieval by fusion of color histogram and edge orientation histogram. 1-7 - Ben-Zhong Lin, Chien-Chou Lin:
Pedestrian detection by fusing 3D points and color images. 1-5 - Muhammad Hassan Khan, Julien Helsper, Cong Yang, Marcin Grzegorzek:
An automatic vision-based monitoring system for accurate Vojta-therapy. 1-6 - Chong Fu, Ou Bian, Hui-yan Jiang, Li-hui Ge, Hong-feng Ma:
A new chaos-based image cipher using a hash function. 1-9 - Daimu Oiwa, Shinji Fukui, Yuji Iwahori, Tsuyoshi Nakamura, Manas Kamal Bhuyan:
Tracking with probabilistic background model by density forests. 1-6 - Noriaki Fujishima, Tatsuhiro Ietsuka:
Basic construction of a natural finger outline extraction system with a color glove. 1-6 - Jiung-Yao Huang, Su-Hui Lee, Chung-Hsien Tsai:
A fast image matching technique for the panoramic-based localization. 1-6 - Rinko Komiya, Takeshi Saitoh, Miharu Fuyuno, Yuko Yamashita, Yoshitaka Nakajima:
Head pose estimation and movement analysis for speech scene. 1-5 - Warapon Chinsatitf, Takeshi Saitoh:
Improvement of eye detection performance for inside-out camera. 1-6 - Jiung-Yao Huang, Hung-Ya Tsai, Chung-Hsien Tsai:
RETOP: A retinal topography keypoint descriptor. 1-6 - Yun-Te Lin, Ming-Long Huang, Chung-Ming Wang:
High dynamic range image composition using a linear interpolation approach. 1-6 - Dai Cao, Li-Fang Chen, Yuan Liu:
Solving jigsaw puzzle with symbol matrixes. 1-6 - Munkhjargal Gochoo, Damdinsuren Bayanduuren, Uyangaa Khuchit, Galbadrakh Battur, Tan-Hsu Tan, Sy-Yen Kuo, Shih-Chia Huang:
Design and application of novel morphological filter used in vehicle detection. 1-5 - Wei-Sung Chen, Ming-Long Huang, Chung-Ming Wang:
Optimizing color transfer using color similarity measurement. 1-6
Internet Technology and Applications, E -Commerce
- Lu Ma, Gang Lu, Junxia Guo:
Observing the evolution of social network on Weibo by sampled data. 1-5 - Jen-Her Wu, Lifang Peng, Qi Li, Yi-Cheng Chen:
Falling in love with online shopping carnival on singles' day in China: An uses and Gratifications perspective. 1-6 - Piyaphan Pongpradit, Nakornthip Prompoon:
Constructing initial design patterns for online social network-based applications. 1-7 - Liping Li, Honghao Gao, Tang Shan:
An executable model and testing for Web software based on live sequence charts. 1-6 - Rene Kabalisa, Yves Cyuzuzo, Chika Yoshida, Ariane Ingabire:
e-Tegeko: A system that will boost citizens' participation on parliamentary regulations in Rwanda. 1-6 - Yves Cyuzuzo, Rene Kabalisa, Chika Yoshida, Joseph Muvara:
Automation system of vehicle requisition in public sector, Rwanda. 1-6 - Chen-Shu Wang, Shiang-Lin Lin:
Why are people willing to pay for cloud storage service? 1-6 - Harya Bima Dirgantara:
IT/IS strategic development for journalism system implementation on television industry: Study case on NET television station. 1-6 - Victor Njoroge Ngugi, Chika Yoshida:
Digital media platform to connect small and medium enterprises in Nairobi. 1-6 - Yun-Te Lin, Yi-Hao Hsiao, Fang-Pang Lin, Chung-Ming Wang:
A hybrid cache architecture of shared memory and meta-table used in big multimedia query. 1-6 - Mohammed Abdulkareem Alyami, Yeong-Tae Song:
Removing barriers in using personal health record systems. 1-8
Management Information Systems
- Srinual Nalintippayawong, Kanokwan Atchariyachanvanich:
IT management status in public higher education institutions in Thailand. 1-5 - Tweheyo Pius Charles, Chika Yoshida:
Factors affecting the adoption of ICT in malnutrition monitoring. Case study: Western Uganda. 1-6 - Witchayarot Jantana, Peraphon Sophatsathit, Achara Chandrachai:
A multi-facet approach using conceptualization, application, and usability measurement to developing financial learning system for hospital. 1-5 - Asma Mejri, Sonia Ayachi Ghannouchi, Ricardo Martinho, Feteh Elhadj:
Enhancing business process flexibility in an emergency care process. 1-6
Mobile/Wireless Computing
- Kailong Zhang, Liang Hu, Panfei Zuo, Xiao Wu, Kejian Miao:
Wireless extension mechanism and logic design for FPGA-based Ethernet Powerlink node. 1-7 - Min-Jhih Cheng, Shiu-Wan Hung, Her-Her Tsai, Ping-Wen Chen:
The adoption intentions of mobile applications. 1-3
Parallel and Distributed Computing & Systems
- Naoshi Sakamoto:
Parallel online exact sum for Java8. 1-8 - Ryuta Kawano, Hiroshi Nakahara, Seiichi Tade, Ikki Fujiwara, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
ACRO: Assignment of channels in reverse order to make arbitrary routing deadlock-free. 1-6 - Linli Wu, Zhangyi Shen, Xiang Feng:
Implementation of massive data processing architecture for electric enterprise groups. 1-6 - Kanchana Viriyapant, Sucha Smanchat:
A deadline-constrained scheduling for dynamic multi-instances parameter sweep workflow. 1-6 - Daisuke Fujishima, Tomio Kamada:
Redistribution mechanism for associative distributed collections of objects. 1-6 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Yuto Lim:
SMT-based scheduling for multiprocessor real-time systems. 1-7
Programming Languages, Compilers & Operating Systems
- Hao-Wei Peng, Jean Jyh-Jiun Shann:
Translating OpenACC to LLVM IR with SPIR kernels. 1-6 - Jatuporn Deesukying, Wiwat Vatanawood:
Generating of business rules for Coloured Petri Nets. 1-6 - Wafa Gabsi, Bechir Zalila, Mohamed Jmaiel:
AspectAda: An aspect oriented extension of ada for real-time systems. 1-6
Software Specification Techniques
- Haitao Zhang, Zhuo Cheng, Cong Tian, Yonggang Lu, Guoqiang Li:
Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approach. 1-6 - Siwadol Sateanpattanakul:
Comments recovery approach for Java decompiler. 1-6 - Muhammad Ilyas Azeem, Siffat Ullah Khan:
Practices for software integration success factors in GSD environment. 1-6 - Chaleerat Thamrongchote, Wiwat Vatanawood:
Business process ontology for defining user story. 1-4 - Shengbo Chen, Hao Fu, Huaikou Miao:
Formal verification of security protocols using Spin. 1-6 - Yongjin Seo, Hyeon Soo Kim:
Operator-data type pair based execution environments independent worst-case execution time measuring method. 1-6 - Yongjin Seo, Eun Young Cheon, Jin-A. Kim, Hyeon Soo Kim:
Techniques to generate UTP-based test cases from sequence diagrams using M2M (Model-to-Model) transformation. 1-6 - Bassey Isong, Ifeoma U. Ohaeri, Munienge Mbodila:
Supplementing Object-Oriented software change impact analysis with fault-proneness prediction. 1-8
Web Engineering & Applications
- Ying Zhang, Chaopeng Li, Shaowen Liu, Feng Wen, Liming Du, Hui He:
A unified approach to automate geospatial data retrieval using semantic web technologies. 1-6 - Mintra Ruensuk:
An implementation to reduce internal/external interruptions in Agile software development using pomodoro technique. 1-4 - Patsakorn Rittitum, Wiwat Vatanawood, Arthit Thongtak:
Digital scrum board using leap motion. 1-4 - Xun Lee, Jiaan Zhou, Hao Fu:
Usage pattern based survivability prediction of web system. 1-6 - Wutthichai Chansuwath, Twittie Senivongse:
A model-driven development of web applications using AngularJS framework. 1-6 - Pattariya Singpant, Nakornthip Prompoon:
Constructing patterns verification criteria based on quality attributes: Web security context patterns case study. 1-7
Special Session 1: On-chip Parallel and Network-Based Systems in the Big Data Era
- Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya:
Performance improvement of multi-dimensional indexing system for big data analysis. 1-6 - Ken Higuchi, Naoyuki Miyamoto, Tatsuo Tsuji, Makoto Yoshida, Kento Takehara:
Performance evaluation of routing algorithms for distributed key-value store based on order preserving linear hashing and Skip graph. 1-6 - Jiachao Zhang, Shunpei Yuasa, Shinji Fukuma, Shin-ichiro Mori:
A real-time GPU-based coupled fluid-structure simulation with haptic interaction. 1-6 - Hiroaki Hirata, Atsushi Nunome, Kiyoshi Shibayama:
Speculative memory: An architectural support for explicit speculations in multithreaded programming. 1-7 - Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama:
An interval control method for status propagation in an autonomous distributed storage system. 1-6
Special Session 2: Analysis, Evaluation, and Usage of Web Information, System Behaviors, and Human Actions
- Yuanyuan Wang, Yukiko Kawai, Kazutoshi Sumiya, Yoshiharu Ishikawa:
TweeVist: A geo-tweet visualization system for web based on spatio-temporal events. 1-6 - Hideki Shiroshita, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi:
Similarity retrieval method of plasma emission videos. 1-6 - Yuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya:
Estimation of factor scores from feature values of english question and answer statements. 1-6 - Fuma Kizu, Teruhisa Hochin, Hiroki Nomiya:
Consideration of validity of concurrency control program generated in genetic programming. 1-6 - Akira Suyama, Ushio Inoue:
Using geofencing for a disaster information system. 1-5 - Shan Liu, Mizuho Iwaihara:
Extracting representative phrases from Wikipedia article sections. 1-6 - Hiroshi Uehara, Mizuho Baba, Takehito Utsuro:
Utilizing texts of picture book reviews for extracting children's behavioral characteristics in language acquisition. 1-6 - Yiming Zhang, Mizuho Iwaihara:
Evaluating semantic relatedness through categorical and contextual information for entity disambiguation. 1-6 - Kenji Kogo, Kyoji Kawagoe, Teruhisa Hochin:
Music similarity retrieval method considering music arrangement. 1-6
Special Session3: Advanced Information Management for Affective and Human-centered Information Systems
- Yui Nonomura, Teruhisa Hochin, Hiroki Nomiya:
Colors suitable to presentation slides. 1-6 - Yuya Watanabe, Teruhisa Hochin, Hiroki Nomiya:
Method of similarity retrieval of color videos based on impressions. 1-6 - Kenshi Yoshimura, Teruhisa Hochin, Hiroki Nomiya:
Searching optimal movements in multi-player games with imperfect information. 1-6 - Saeko Oshiba, Shunsuke Iki, Jun Yabuchi, Yoshikazu Mizutani, Kumiko Kawabata, Kanako Nakagawa, Yoji Kitani, Saori Kitaguchi, Kazunari Morimoto:
Visibility evaluation experiments of optical wireless pedestrian-support system using self-illuminating bollard. 1-6 - Youchao Lin, Mizuho Baba, Takehito Utsuro:
Generating a werewolf game log digest of inferring each player's role. 1-6 - Shunlin Rong, Mizuho Iwaihara:
A collective approach to ranking entities for mentions. 1-6 - Hayato Kumagai, Teruhisa Hochin, Hiroki Nomiya:
Speeds of videos considering speeds of objects and background. 1-6 - Hiroki Nomiya, Shota Sakaue, Teruhisa Hochin:
Recognition and intensity estimation of facial expression using ensemble classifiers. 1-6 - Makoto Fukumoto, Takeshi Hatanaka:
Parallel distributed Interactive Genetic Algorithm for composing music melody suited to multiple users' feelings. 1-6
Special Session 4: Experiences of SoftwareEngineering 1
- Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of information system operation cost based on working time and unit cost. 1-6 - Kyohei Uemura, Yusuke Saito, Shin Fujiwara, Daiki Tanaka, Kenji Fujiwara, Hajimu Iida, Kenichi Matsumoto:
A hosting service of multi-language historage repositories. 1-6 - Kenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto:
Influence of outliers on analogy based software development effort estimation. 1-6 - Masao Ohira, Hayato Yoshiyuki, Yosuke Yamatani:
A case study on the misclassification of software performance issues in an issue tracking system. 1-6 - Takashi Watanabe, Akito Monden, Yasutaka Kamei, Shuji Morisaki:
Identifying recurring association rules in software defect prediction. 1-6 - Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden:
A fuzzy hashing technique for large scale software birthmarks. 1-6
Special Session 5: Experiences of SoftwareEngineering 2
- Hayato Sagisaka, Haruaki Tamada:
Identifying the applied obfuscation method towards de-obfuscation. 1-6 - Eva Gerbert-Gaillard, Stéphanie Chollet, Philippe Lalanda:
Model-driven approach for self-aware pervasive systems. 1-6 - Seiji Sakakibara, Sachio Saiki, Masahide Nakamura, Shinsuke Matsumoto:
Indoor environment sensing service in smart city using autonomous sensor box. 1-6 - Ryoma Tabata, Arisa Hayashi, Seiki Tokunaga, Sachio Saiki, Masahide Nakamura, Shinsuke Matsumoto:
Implementation and evaluation of BLE proximity detection mechanism for Pass-by Framework. 1-6 - Seiki Tokunaga, Hiroyasu Horiuchi, Kazunari Tamamizu, Sachio Saiki, Masahide Nakamura, Kiyoshi Yasuda:
Deploying service integration agent for personalized smart elderly care. 1-6 - Naoya Nitta:
A formal approach for guiding architecture design with data constraints. 1-6 - Izuru Kume, Masahide Nakamura, Yasuyuki Tanaka, Etsuya Shibayama:
Evaluation of diagnosis support methods in program debugging by trace analysis: An exploratory study. 1-6
Special Session 6: Learning methods for applications to intelligent data sensing
- Kazushi Okamoto:
Text analysis of academic papers archived in institutional repositories. 1-6 - Kazuhiko Kawamoto, Yoshiyuki Tomura, Kazushi Okamoto:
Learning pedestrian dynamics with kriging. 1-4 - Shinichi Yoshida:
Decoding of emotional visual stimuli using fMRI brain signal. 1-4 - Yutaka Hatakeyama, Hiromi Kataoka, Noriaki Nakajima, Teruaki Watabe, Yoshiyasu Okuhara:
Baseline estimation for serum creatinine for definition of acute kidney injury. 1-4 - Yuusuke Kataoka, Takashi Matsubara, Kuniaki Uehara:
Image generation using generative adversarial networks and attention mechanism. 1-6 - Ryosuke Tachibana, Takashi Matsubara, Kuniaki Uehara:
Semi-Supervised learning using adversarial networks. 1-6 - Ryo Akita, Akira Yoshihara, Takashi Matsubara, Kuniaki Uehara:
Deep learning for stock prediction using numerical and textual information. 1-6 - Yosuke Sakata, Koji Eguchi:
Cross-lingual link prediction using multimodal relational topic models. 1-8
Special Session 7: Theories of Systematic Software Testing
- Tomohiko Takagi, Tatsuki Teramoto:
Extended mutation score based on weighted place/transition nets to evaluate test suites. 1-3 - Shun Akimoto, Shunta Nakanishi, Rihito Yaegashi, Tomohiko Takagi:
Extended differential control flow graphs for the selection of test cases in regression testing. 1-2 - Tomohiko Takagi, Keisuke Noda:
Partially developed coverability graphs for modeling test case execution histories. 1-2 - Liang Xu, Ryosuke Takata, Hiroshi Ohta, Tomohiko Takagi, Norifumi Suehiro, Naka Gotoda, Toshihiro Hayashi, Rihito Yaegashi:
ICT operational models to view the actual usage of teachers' desk systems. 1-3
Special Session 8: Machine learning for speech and language processing
- Yiting Li, Yuki Takashima, Tetsuya Takiguchi, Yasuo Ariki:
Lip reading using a dynamic feature of lip images and convolutional neural networks. 1-6 - Zhaojie Luo, Tetsuya Takiguchi, Yasuo Ariki:
Emotional voice conversion using deep neural networks with MCC and F0 features. 1-5 - Yuichiro Kataoka, Toru Nakashika, Ryo Aihara, Tetsuya Takiguchi, Yasuo Ariki:
Selection of an optimum random matrix using a genetic algorithm for acoustic feature extraction. 1-6
Special Session 9: Marketing & Management Science with Computational Intelligence
- Shigeaki Tanimoto, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification of social-media utilization in enterprise. 1-6 - Akiya Inoue, Motoi Iwashita, Kenichi Kitahara:
Behavior analysis on mobile-carrier choice considering Mobile Virtual Network Operators. 1-6 - Arata Koike, Yoshiko Sueda:
Changes in key performance indicators by phase transition in Internet of Things. 1-6 - Motoi Iwashita, Shinichi Kato:
Local revitalization model based on soft systems methodology. 1-6
Special Session 10: Internet of Things for Smart Society
- Yoshitaka Torii, Takanobu Otsuka, Takayuki Ito:
A diversity sensor connection capability WSN for disaster information gathering system. 1-6 - Tomomichi Hayakawa, Ryo Suzuki, Takayuki Ito:
Development of River Information Management System according to the participatory sensing. 1-5 - Hao Han, Xiaojun Ma, Keizo Oyama:
Towards detecting and predicting fall events in elderly care using bidirectional electromyographic sensor network. 1-6
Special Session 12: Theory and Applications of Advanced and Intelligent Software
- Masafumi Sato, Koichi Anada, Masayoshi Tsutsumi:
A mathematical formulation of the "shicho" in the game of Go. 1-6 - Koichi Anada, Koushi Anzai, Ken Yokota, Takeo Yaku:
A multi-layer rectangular dissections and the list structures for the 16-ary grid graph. 1-5 - Toru Fukaya, Tomoyuki Idogawa:
Rational number reconstruction using Chinese remainder theorem on GPU. 1-6
Special Session 13: Affective computing and related machine learning methods
- Xiao Sun, Xiaoqi Peng, Fuji Ren:
Detect the emotions of the public based on cascade neural network model. 1-6 - Kunxia Wang, ZongBao Zhu, Shidong Wang, Xiao Sun, Lian Li:
A database for emotional interactions of the elderly. 1-6 - Fei Gao, Xiao Sun, Kunxia Wang, Fuji Ren:
Chinese micro-blog sentiment analysis based on semantic features and PAD model. 1-5
Special Session 14: Media Communication and Machine Learning Applications
- Zhen Guo, Ying Li, Weihua Xie, Tao Hu:
Network music terminal system design and implementation based on IPTV set-top box. 1-4 - Ying Li, Fei Sha, Shujuan Wang, Tao Hu:
The improvement of page sorting algorithm for music users in Nutch. 1-4 - Tiantian Liu, Zhiyi Fang, Chen Zhao, Yingmin Zhou:
Parallelization of a series of extreme learning machine algorithms based on spark. 1-5 - Liyun Xiang, Zhiyi Fang:
A home-school interaction education platform based on Heterogeneous Data Exchanging. 1-5 - Krishna Prasad Chodey, Gongzhu Hu:
Clinical text analysis using machine learning methods. 1-6 - Yucong Duan, Qiang Duan, Gongzhu Hu, Xiaobing Sun:
Refinement from service economics planning to ubiquitous services implementation. 1-6
ICS16: The 7th International Workshop on Intelligent Computational Science
- Xiaojun Ren, Sijun Qin, Peng Zang:
The discovery and identification of video page based on topic web crawler. 1-4 - Chi Zhang, Songhong Hong, Pengzhou Zhang:
The research on event extraction of Chinese news based on subject elements. 1-5 - Weichao Chai, Hongbin Dong, Jun He, Wenqian Shang:
A biogeography-based optimization algorithm with multiple migrations. 1-8 - Yi Huo, Yanfeng Wang, Haihe Hu:
Effective algorithms for video shot and scene boundaries detection. 1-6 - Jia Song, Sijun Qin, Pengzhou Zhang:
Chinese text categorization based on deep belief networks. 1-5 - Jianxiang Cao, Wenqian Shang, Minyong Shi:
The edge-fault tolerant hamiltonian of the balanced hypercube. 1-5 - Jun-Peng Gong, Jia Song:
Research on the performance of segmentation of text classification based on CNICC. 1-3 - Chen Li, Zhengtao Jiang:
A hybrid news recommendation algorithm based on user's browsing path. 1-4 - Mandi Xu, Yuan Liu, Ruimin Lv:
A mosaic style rendering method based on fuzzy color modeling. 1-6 - Fengyan Wu, Shutao Sun, Weiyao Xue:
Automatic extraction of popular music ringtones based on music structure analysis. 1-5 - Jia Song, Xianglin Huang, Sijun Qin, Qing Song:
A bi-directional sampling based on K-means method for imbalance text classification. 1-5 - Xiaomei Guo:
A novel parallel FDTD algorithm on Non-Uniform Memory Access multiprocessors. 1-3 - Taro Nakano, Bhargava Teja Nukala, Steven Zupancic, Amanda Rodriguez, Donald Y. C. Lie, Jerry Lopez, Tam Q. Nguyen:
Gaits classification of normal vs. patients by wireless gait sensor and Support Vector Machine (SVM) classifier. 1-6 - Mengyi Zhang, Minyong Shi, Zhiguo Hong, Songtao Shang, Menghan Yan:
A TV program recommendation system based on big data. 1-5 - Lu Liu, Zhengtao Jiang:
Research on software reliability evaluation technology based on BP neural network. 1-4 - Zhen Li, Wenjin Wu, Qin Zhang, Hui Ren, Shilei Bai:
Speech enhancement using magnitude and phase spectrum compensation. 1-4 - Cheng Feng, Xiaohong Wang:
Image retrieval system based on bag of view words model. 1-4 - Yuqi Wang, Wenqian Shang, Zhenzhong Li:
The application of factorization machines in user behavior prediction. 1-4 - Lihong Xu, Shutao Sun, Qi Wang:
Text similarity algorithm based on semantic vector space model. 1-4 - Zhenzhong Li, Wenqian Shang, Menghan Yan:
News text classification model based on topic model. 1-5 - Menghan Yan, Wenqian Shang, Zhenzhong Li:
Application of SVD technology in video recommendation system. 1-5 - Menghan Yan, Wenqian Shang, Mengyi Zhang:
The analysis of coordinate-recorded merge-sort based on the divide-and-conquer method. 1-4 - Songtao Shang, Minyong Shi, Wenqian Shang, Zhiguo Hong:
A micro-video recommendation system based on big data. 1-5 - Yuefeng Liu, Minyong Shi, Chunfang Li:
Domain ontology concept extraction method based on text. 1-5 - Zhang He, Minyong Shi, Chunfang Li:
Research and application of path-finding algorithm based on unity 3D. 1-4 - Yi-Lin Guo, Yun Pan, Lei Cai:
OPNET-based analysis of MTU impact on application performance. 1-5 - Lei Cai, Yun Pan, Yi-Lin Guo:
Research on the effects of transport protocols on the application performance based on OPNET. 1-5 - Chunning Wang, Shaochun Xu, Lichao Chen, Xuhui Chen:
Exposing library data with big data technology: A review. 1-6 - Wenlong Fu, Yaguang Wang, Aina Sui, Mengyi Wu:
Research and implementation of knowledge base system for stage art design. 1-6 - Wenlong Fu, Lianjing Jin, Wei Gong, Kemin Wang:
The research of retrieval keyword analysis on stage's design knowledge base. 1-4 - Zhe Zhang, Huiyan Cheng, Xuhui Chen, Chaolin Ma:
Frequency-specific alterations of functional hub in generalized tonic-clonic seizure. 1-6 - Hongbin Dong, Xue Yang, Xuyang Teng, Yuhai Sha:
A diversity reserved quantum particle swarm optimization algorithm for MMKP. 1-7 - Zhifeng Wu, Yixin Chen:
Link prediction using matrix factorization with bagging. 1-6 - Songsong Zhang, Jing Zhou, Minyong Shi, Chunfang Li:
A simulated login-based SINA microblog data collection method and its data analysis. 1-4 - Min Wang, Yongbin Wang:
SWTUS: A web tag utility and stability metering method. 1-6 - Tong Wang, Liang Wang:
Research on survivability strategic of operating system. 1-5 - Nan Yang, Sanxing Cao, Shufan Zhang:
Data analysis system for online short video comments. 1-6 - Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan, Jianfang Li:
The study of APT attack stage model. 1-5 - Yufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang:
Design and implementation of ATM alarm data analysis system. 1-3 - Yufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng:
Items analysis of postal supervision. 1-3 - Yanwei Lou, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng:
Visualization research and implementation based on ATM alarm data. 1-4 - Mengke Cheng, Ligu Zhu, Wenqian Shang, Di Zhang, Yuping Han:
Study of the individual english learning and memory based on visualization analysis. 1-5 - Pan Wei, Zhiguo Hong, Minyong Shi:
Performance analysis of HTTP and FTP based on OPNET. 1-4 - Chunqing Li, Kai Liang:
The research of applying multi-scale calculation to simulate concentration difference polarization appeared during MBR membrane separation process. 1-6 - Muzi Sun, Minyong Shi:
A HDRI display algorithm based on image color appearance model. 1-6 - Xinyi Zhou, Wei Gong, Wenlong Fu, Lianjing Jin:
An improved method for LSB based color image steganography combined with cryptography. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.