default search action
34th CATA 2019: Honolulu, Hawaii, USA
- Gordon Lee, Ying Jin:
Proceedings of 34th International Conference on Computers and Their Applications, CATA 2019, Honolulu, Hawaii, USA, March 18-20, 2019. EPiC Series in Computing 58, EasyChair 2019 - Tamer Aldwairi:
Planning Computational Biology Projects Using Agile Approach. 1-7 - Samuel Delaney, Dwight D. Egbert, Frederick C. Harris Jr.:
RealPi - A Real Time Operating System on the Raspberry Pi. 8-16 - Andrew Munoz, Christopher Lewis, Nicholas Bolling, William Zandbergen, Connor Scully-Allison, Vinh D. Le, Sergiu Dascalu, Benjamin Brown:
Virtual Reality Physics Lab. 17-26 - Mohamed Shenify, Hisham Al-Mubaid, Sultan Aljahdali, Abdulaziz Alangari:
A Study of Computer Information Systems Discipline with Layout and Analysis. 27-35 - Luka Daoud, Fady Hussein, Nader Rafla:
Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS). 36-44 - Mohammad Hossain, Sameer Abufardeh:
A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis. 45-54 - Thitivatr Patanasakpinyo:
Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification. 55-64 - Ying Jin, Krishna Kaja:
XACML Implementation Based on Graph Databases. 65-74 - Ana Maria d'Azevedo Breda, José Manuel Dos Santos Dos Santos:
New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra. 75-82 - Michael Fischer, Jonathan D. Backens:
A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks. 83-92 - Yijie Han, Mishra Sneha, Md Usman Gani Syed:
An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations. 93-98 - Hussain Albarakati, Reda Ammar, Raafat S. Elfouly:
Weighted Record Sample for Underwater Seismic Monitoring Application. 99-106 - Salman Faizi, Shawon Rahman:
Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues. 107-116 - Thomas Le, William Mitchell, Behnam S. Arad:
Customized Intrusion Detection Based on a Database Audit Log. 117-126 - Christopher Jun-Wen Chew, Vimal Kumar:
Behaviour Based Ransomware Detection. 127-136 - Tirthankar Ghosh, Eman El-Sheikh, Wasseem Jammal:
A Multi-Stage Detection Technique for DNS-Tunneled Botnets. 137-143 - Cheng-Ying Yang, Hsin-Ying Liang, Pin-Yen Huang Huang:
Evaluation of Secrecy Rate in Cooperative Communication System. 144-154 - Nabil Almashfi, Lunjin Lu:
Analyzing JavaScript Programs Using Octagon Domain. 155-167 - Lifeng Liu, Meilin Liu, Chongjun Wang:
A Compiler-assisted locality aware CTA Mapping Scheme. 168-179 - Aakanksha Rastogi, Kendall E. Nygard:
Software Engineering Principles and Security Vulnerabilities. 180-190 - Chaney Courtney, Mitchell L. Neilsen:
Vetting Anti-patterns in Java to Kotlin Translation. 191-202 - Randy Appleton, Ben Slater, Connor Laitinen, Luke Ammel, Cody Malnor:
Web Request Predictions. 203-209 - Kasi Periyasamy, Saleh Alsyefi:
Implementation of Security and Privacy Aspects in a Healthcare Social Network. 210-218 - Francisca Fonseca, Hugo Peixoto, Jorge Braga, José Machado, António Abelha:
Smart Mobile Computing in Pregnancy Care. 219-224 - Daichi Naito, Ryo Hatano, Hiroyuki Nishiyama:
Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning. 225-235 - Mohammad Owrang Ojaboni, Yasmine Kanaan, Robert Dewitty Jr.:
Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer. 236-246 - Thitivatr Patanasakpinyo, Georgi I. Batinov, Kofi C. Whitney, Adel Sulaiman, Les Miller:
Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task. 247-256 - Broday Walker, Tina Johnson:
NetLogo and GIS: A Powerful Combination. 257-264 - Marcos Lopez, Terry Griffin, Kevin Ellis, Anthony Enem, Christopher Duhan:
Parking Lot Occupancy Tracking Through Image Processing. 265-270 - Jay Woo, Andrew Frost, Tyler Goffinet, Vinh D. Le, Connor Scully-Allison, Chase D. Carthen, Sergiu Dascalu:
An Alternative Natural Action Interface for Virtual Reality. 271-281 - Abdullah I. Al-Shoshan:
TDARMA Model Estimation Using the MLS and the TF Distribution. 282-291 - Antoine Bossard, Keiichi Kaneko:
Refining the Unrestricted Character Encoding for Japanese. 292-300 - Ka C. Cheok, Kiran Iyengar, Sami Oweis:
Smooth Trajectory Planning for Autonomous Leader-Follower Robots. 301-309 - Yusuke Ono, Ryo Hatano, Hayato Ohwada, Hiroyuki Nishiyama:
Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning. 310-316 - Ziping Liu, Bidyut Gupta:
Study of Secured Full-Stack Web Development. 317-324 - Dustin Ginn, Ilhyun Lee, Haesun K. Lee:
Emergency Communications Database with Ticketing Archive for Training New Employees. 325-335 - Giridhar Maji, Sharmistha Mandal, Narayan C. Debnath, Soumya Sen:
A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining. 336-344 - Pradeep Kumar Singh, Pijush Kanti Dutta Pramanik, Narayan C. Debnath, Prasenjit Choudhury:
A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering. 345-355 - Salman Faizi, Shawon Rahman:
Secured Cloud for Enterprise Computing. 356-367 - Kasumi Kato, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi:
Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka. 368-377 - Maryam Alruwaythi, Krishna Kambhampaty, Kendall E. Nygard:
User Behavior and Trust Evaluation in Cloud Computing. 378-386 - Mohammed O. Alannsary, Yasser M. Hausawi:
Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030. 387-396 - Kawthar Karkouda, Ahlem Nabli, Faïez Gargouri:
TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud. 397-406 - Julian Rogers, Hormoz Zareh:
Finite Element Analysis of 3D Printed Aircraft Wing. 407-417 - Roberto Rosas-Romero, Juan-Pablo Medina-Ochoa:
Learning Financial Time Series for Prediction of the Stock Exchange Market. 418-427 - Takashi Ohnishi, Takashi Okamoto, Keiichi Watanuki:
Effect of Magnet Shapes on Metal Contamination Removal. 428-437 - Faryar Etesami, Christopher Mullens, Ramsey Sahli, Trey Webb:
Improving the Performance of 3D Printed Molds for Plastic Injection Molding. 438-443 - Ana Farhat, Kyle Hagen, Ka C. Cheok, Balaji Boominathan:
Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data. 444-453 - Ali Rahim Taleqani, Raj Bridgelall, Jill Hough, Kendall E. Nygard:
Data Driven Analytics of Road Quality. 454-463 - Henry Okonofua, Shawon Rahman, Reni Ivanova:
An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations. 464-474 - Vasu Saluja, Minni Jain, Prakarsh Yadav:
L, M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis. 475-483
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.