


default search action
40th COMPSAC Workshops 2016: Atlanta, GA, USA
- 40th IEEE Annual Computer Software and Applications Conference, COMPSAC Workshops 2016, Atlanta, GA, USA, June 10-14, 2016. IEEE Computer Society 2016
ADMNET 2016: The Fourth International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
- Takashi Yamanoue, Hiroki Kashiwazaki, Seigo Kishiba, Yong Jin:
Message from the ADMNET Workshop Organizers. 1
ADMNET Session 1
- Yong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta:
Design and Implementation of Secure Prefetch Mechanism for Multi-step Name Resolution in DNS. 2-7 - Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai
, Naoya Kitagawa, Masahiko Tomoishi:
Design and Implementation of a Client Based DNSSEC Validation and Alert System. 8-13 - Yui Kazawa, Sho Tsugawa:
Robustness of Networks with Skewed Degree Distributions under Strategic Node Protection. 14-19 - Yohei Iizawa, Kazuya Suzuki:
Multi-layer and Multi-domain Network Orchestration and Provision of Virtual Views to Users. 20-25
ADMNET Session 2
- Hiroyuki Ohsaki, Yasuhiro Yamasaki:
On the Impact of Cut-Through Links in Epidemic Broadcasting. 26-31 - Karim El Defrawy, Tiffany Kim, Pape M. Sylla:
Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy. 32-37 - Raef Mousheimish, Yehia Taher, Karine Zeitouni
:
Toward the Support of Challenging Service Level Agreements (SLAs) in Manual and Context-Dependent Activities. 38-43
STA 2016: The Eighth IEEE International Workshop on Software Test Automation
- Fevzi Belli, Rajesh Subramanyan:
Message from the STA Workshop Organizers. 44
STA Invited Talk
- Aditya P. Mathur:
Challenges in Testing the Design of Secure Complex Critical Public Infrastructure. 45
Session 1: Fault Management and Ranking
- Hui Zhang:
Fault Localization Method Generated by Regression Test Cases on the Basis of Genetic Immune Algorithm. 46-51 - Ekincan Ufuktepe
, Tugkan Tuglular
:
Automation Architecture for Bayesian Network Based Test Case Prioritization and Execution. 52-57
Session 2: Human Interactions and Testing
- Bin Wang, Bei-Bei Yin, Kai-Yuan Cai:
Event Handler Tree Model for GUI Test Case Generation. 58-63
ESAS 2016: The 11th IEEE International Workshop on E-Health Systems and Semantic Web
- Atilla Elçi, Duygu Çelik Ertugrul
:
Message from ESAS 2016 Workshop Organizers. 64
ESAS Session 1
- Duygu Çelik Ertugrul
, Hakan Kanmaz, Mehmet Ugur Yuksel, Atilla Elçi, Mehmet Ertugrul:
Fetal Heart Rate Monitoring System (FHRMS). 65-70 - Vassilya Uzun:
QR-Code Based Hospital Systems for Healthcare in Turkey. 71-76
ESAS Session 2
- Mehmet Akif Cifci, Duygu Çelik Ertugrul
, Atilla Elçi:
A Search Service for Food Consumption Mobile Applications via Hadoop and MapReduce Technology. 77-82 - Saranya Radhakrishnan, Zachary Stecher, Deger Cenk Erdil:
An Open-Source ACASI Design for Social Collaborative mHealth. 83-87
SSERV 2016: The Third IEEE International Workshop on Social Services through Human and Artificial Agent Models
- Takao Terano:
Message from the SSERV Workshop Organizers. 88
Session 1: Artificial Agent Models
- Kenichi Yoshida, Akito Sakurai:
Stock Price Regression Based on Order Book Information. 89-94 - Takamasa Kikuchi, Masaaki Kunigami, Takashi Yamada, Hiroshi Takahashi
, Takao Terano:
Analysis of the Influences of Central Bank Financing on Operative Collapses of Financial Institutions Using Agent-Based Simulation. 95-104 - Koji Tanaka, Kazuhiko Tsuda:
Methods to Predict the Number of Software Faults Using Weibull Distribution. 105-110
SSERV Session 2
- Takayuki Mizuno, Masahiro Shohmitsu, Toshiyuki Kaneda:
A Study on the Agent-Simulation of Waiting Behaviours Inside a Transfer Station Space. 111-116 - Masaki Kitazawa, Satoshi Takahashi, Toru B. Takahashi, Atsushi Yoshikawa
, Takao Terano:
Improving a Cellular Manufacturing System through Real Time-Simulation and-Measurement. 117-122 - Hiroki Azuma, Nobuo Suzuki, Tohru Matsuodani, Kazuhiko Tsuda:
Proposal for a Cumulative Deposit Rate Prediction Method for Payment After Delivery in the Mail Order Business. 123-128
QUORS 2016: The 10th IEEE International Workshop on Quality Oriented Reuse of Software
- Xiaodong Liu, Hongji Yang:
Message from the QUORS Workshop Organizers. 129
Session 1: Quality and Efficient Development
- Fei Peng, Chunyu Li, Xiaohan Song, Wei Hu, Guihuan Feng:
An Eye Tracking Research on Debugging Strategies towards Different Types of Bugs. 130-134 - Kayhan Moharreri, Alhad Vinayak Sapre, Jayashree Ramanathan, Rajiv Ramnath:
Cost-Effective Supervised Learning Models for Software Effort Estimation in Agile Environments. 135-140 - Feng-Jian Wang, Thanh-Thuy Thi Nguyen, Tennyson Lu:
A Study to Improving Anomaly Detection in a TS Workflow. 141-148 - Igor Velbitskiy, Gary Ushakov:
New Graphic Polyglot Concept of Programming. 149-154
Session 2: Emerging Reuse
- Simone Maccanti, Jameela Al-Jaroodi, Arif Sirinterlikci:
Knowledge Management Framework for Software Reuse. 155-160 - Shahid Hussain, Jacky W. Keung
, Arif Ali Khan
, Kwabena Ebo Bennin
:
A Methodology to Automate the Selection of Design Patterns. 161-166 - Predrag Filipovikj, Trevor Jagerfield, Mattias Nyberg, Guillermo Rodríguez-Navas
, Cristina Cerschi Seceleanu
:
Integrating Pattern-Based Formal Requirements Specification in an Industrial Tool-Chain. 167-173 - Jianfeng Chen, Hongji Yang:
From Data Reuse to Knowledge Reuse in Web Applications: A Survey. 174-179
Session 3: Exploratory Study
- Oliver Fendt, Michael C. Jaeger, Ricardo Jimenez Serrano:
Industrial Experience with Open Source Software Process Management. 180-185 - Samuel J. Chinenyeze, Xiaodong Liu, Ahmed Yassin Al-Dubai:
DEEPC: Dynamic Energy Profiling of Components. 186-191 - Affan Yasin
, Lin Liu:
An Online Identity and Smart Contract Management System. 192-198
MidCCI 2016: The Second IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking
- Hideaki Goto, Yuuichi Teranishi, Jiann-Liang Chen, Shuo-Yan Chou:
Message from the MidCCI Workshop Organizers. 199-201
Session 1: Computing and Internetworking
- Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura:
An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other. 202-207 - Karim El Defrawy, Tyler Kaczmarek:
Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers. 208-213
MVDA 2016: The Fifth IEEE Workshop on Modeling and Verifying Distributed Applications
- Leila Jemni Ben Ayed, Fevzi Belli, Ahlem Ben Younes, Yousra Bendaly Hlaoui:
Message from the MVDA Workshop Organizers. 214-215
MVDA Session 1
- Hojin Chang, Ramesh K. Karne, Alexander L. Wijesinha:
Migrating a Bare PC Web Server to a Multi-core Architecture. 216-221 - Brahim Nasraoui
, Riadh Robbana:
Reachability Analysis of Multithreaded Programs Using Communicating Rewriting Systems. 228-233
CEEP 2016: The First International COMPSAC Workshop on Computing Education - Emerging Practices
- Henry C. B. Chan
, Sorel Reisman, Simanta Mitra:
Message from the CEEP Workshop Organizers. 246
CEEP Session 1
- Yong Shi, Dan Chia-Tien Lo, Kai Qian:
Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment. 247-252 - Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Hardware Attacks and Security Education. 253-257
CEEP Session 2
- B. L. Tembe, S. K. Kamble:
Implementation of Active Learning Methods in Mechanical Engineering Education to Enhance Students' Performance. 258-263 - Chunyan Deng, Zhiguo Zhou, Wenqing Li, Boyu Hou:
A Panoramic Geology Field Trip System Using Image-Based Rendering. 264-268 - Amir Atabekov, Jing He, Patrick O. Bobbie:
Internet of Things-Based Framework to Facilitate Indoor Localization Education. 269-274 - Anna-Lena Lamprecht, Tiziana Margaria
, Clare McInerney
:
A Summer Computing Camp Using ChainReaction and jABC. 275-280
CDS 2016: The Fourth IEEE International Workshop on Consumer Devices and Systems
- Norihiro Ishikawa
, Yoshia Saito, Akimitsu Kanzaki:
Message from the CDS Workshop Organizers. 281
CDS Session 1
- Ozlem Zehra Ozyagci, Mihhail Matskin:
Truthful Incentive Mechanism for Mobile Crowdsensing with Smart Consumer Devices. 282-287 - Toru Kobayashi, Kazushige Katsuragi, Kenichi Arai, Tomoya Sakai, Makoto Fujimura:
Social Media Mediation System for Closing Inter-Generational Communication Gap. 288-293 - Seiya Tanaka, Nobuo Fukujyu, Shigeo Kaneda:
Configurations of Micro EV Quick-Charging System with EDLC Storage. 294-299 - Naoya Tsujita, Masato Mitsuno, Yoshiki Usui, Shigeo Kaneda:
Remote-Controlled Micro EV System Using Downward-Facing Wide-Angle Video Camera. 300-305
Session 2: Consumer Networks
- Takeshi Kato, Daigo Matsubara, Naofumi Yoshida, Norihiro Ishikawa
:
Management of OSGi Device Using PUCC Protocols and Metadata. 306-311 - Teruhisa Tajima, Yasuo Okabe:
Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN. 312-318 - Yutaka Onuma, Masanao Nozawa, Yoshiaki Terashima, Ryozo Kiyohara:
Improved Software Updating for Automotive ECUs: Code Compression. 319-324
BIoT 2016: The Third IEEE International Workshop on Big Data Management for the Internet of Things
- Hideya Ochiai, Kurt Geihs
, Susumu Takeuchi, Jun Suzuki:
Message from the BIOT Workshop Organizers. 325
BIOT Session 1
- Janani Balaji, Rajshekhar Sunderraman:
Distributed Graph Path Queries Using Spark. 326-331 - Yuya Tarutani, Shuuichirou Murata, Kazuhiro Matsuda, Morito Matsuoka:
IEEE1888 over WebSocket for Communicating across a Network Boundary. 332-337 - Ikuo Nakagawa, Masahiro Hiji
, Hiroshi Esaki:
Design and Implementation of Global Reference and Indirect Method Invocation Mechanisms in the Dripcast. 338-343
BIOT Session 2
- Yuanbo Zhu, Dominic Maurath, Longqi Zhang, Nanmagalam Devika, Leong Hai Koh
, Fook Hoong Choo:
An Intelligent Microgrid Energy Management System Using Distributed Database and IEEE 1888. 344-347 - Susumu Takeuchi, Michiharu Takemoto, Masato Matsuo:
SPIRE: Scalable and Unified Platform for Real World IoT Services with Feature Interaction. 348-353
SAPSE 2016: The Eighth IEEE International Workshop on Security Aspects in Processes and Services Engineering and CFSE 2016: The Eighth IEEE International Workshop on Computer Forensics in Software Engineering
- Stelvio Cimato
:
Message from the SAPSE Workshop Organizers. 354 - Ryôichi Sasaki, Tetsutaro Uehara
, Jigang Liu:
Message from the CFSE Workshop Organizers. 355
SAPSE/CFSE Invited Talk
- Alfredo Cuzzocrea:
A Reference Architecture for Supporting Secure Big Data Analytics over Cloud-Enabled Relational Databases. 356-358
SAPSE/CFSE Session 1
- Robert J. Ellison, William Nichols, Carol Woody:
Measuring Software Assurance. 359-364 - Jason W. Clark:
EAR: An e-mail Attachment Receiver to Search Concerning Images in the Context of Insider Threat. 365-370 - Christopher Francis-Christie, Dan Lo:
A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online Video. 371-376
Poster Lightning Talks
- Takafumi Kawaguchi, Ryohei Banno
, Masashi Hojo, Kazuyuki Shudo:
Self-Refining Skip Graph: A Structured Overlay Approaching to Ideal Skip Graph. 377-378 - Wook-Sung Yoo, Sameer Ahamed Shaik:
Development of Home Management System Using Arduino and AppInventor. 379-380
STPSA 2016: The 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman
, Mohammad Zulkernine:
Message from STPSA 2016 Workshop Organizers. 381
Session 1: Web Security
- Ananth A. Jillepalli
, Daniel Conte de Leon:
An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser. 382-387 - Sai Samrat Malka, Na Li, Venu Madhavi Doddapaneni, Yuhong Liu, Anil Kumar Pamulapati:
A Web Application For Studying Collusion Attacks Through Friend Search Engine. 388-393 - Robert Bronte, Hossain Shahriar
, Hisham M. Haddad:
Information Theoretic Anomaly Detection Framework for Web Application. 394-399
Session 2: Data Privacy
- Ivor D. Addo, Praveen Madiraju, Sheikh Iqbal Ahamed, William C. Chu:
Privacy Preservation in Affect-Driven Personalization. 400-405 - Lining Xu, Yongxu Wu:
New Challenge of Protecting Privacy due to Stained Recognition. 406-409 - Saikrishna Yellanki, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws. 410-415 - Manting Shen, Yinyan Yu, Zhi Tang, Xiaoyu Cui:
An Efficient Safe Directory Based File Protection Mechanism. 416-422
Session 3: Emerging Security Topics
- Bata Krishna Tripathy, Ananta Gopal Sethy, Padmalochan Bera, Mohammad Ashiqur Rahman
:
A Novel Secure and Efficient Policy Management Framework for Software Defined Network. 423-430 - A. H. M. Jakaria, Wei Yang, Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman
:
VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization. 431-436 - Mohsen Dorodchi, Maryam Abedi, Bojan Cukic
:
Trust-Based Development Framework for Distributed Systems and IoT. 437-442 - Okoye Emmanuel Ekene, Ron Ruhl, Pavol Zavarsky:
Enhanced User Security and Privacy Protection in 4G LTE Network. 443-448
Session 4: Miscellaneous Topics
- Mahesh Nath Maddumala, Vijay Kumar:
Efficient Design of Firewall Temporal Policies. 449-454 - Hossain Shahriar
, Hisham M. Haddad, Pranahita Bulusu:
OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities. 455-460 - Rajbhooshan Bhakte, Pavol Zavarsky, Sergey Butakov:
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework. 461-466 - Subil Mathew Abraham:
Estimating Mean Time to Compromise Using Non-homogenous Continuous-Time Markov Models. 467-472
DSA 2016: The Second IEEE International Workshop on Dependable Software and Applications
- Baowen Xu
:
Message from the DSA Workshop Organizer. 473
DSA Session 1
- Deshuai Han, Jianchun Xing, Qiliang Yang, Hongda Wang, Xuewei Zhang:
Formal Sequence: Extending UML Sequence Diagram for Behavior Description and Formal Verification. 474-481 - Giedre Sabaliauskaite
, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot. 482-489 - Toshifusa Sekizawa, Makoto Fujiwara, Koichiro Watanabe:
A Case Study: Verification of an Embedded System Using Abstraction Refinement with Requirements. 490-493
UCDAS 2016: The Third IEEE International Workshop on User Centered Design and Adaptive Systems
- Reyes Juárez-Ramírez, Andrés Mejía-Figueroa:
Message from the UCDAS Workshop Organizers. 494-495
UCDAS Session 1
- Dirk Thatmann, Philip Raschke, Axel Küpper:
"Please, No More GUIs!": A User Study, Prototype Development and Evaluation on the Integration of Attribute-Based Encryption in a Hospital Environment. 496-502 - Jiajia Li, Grace Ngai
, Hong Va Leong
, Stephen C. F. Chan
:
Your Eye Tells How Well You Comprehend. 503-508 - Akputu K. Oryina, Abiodun O. Adedolapo:
Emotion Recognition for User Centred E-Learning. 509-514
UCDAS Session 2
- Chidchanok Thepsoonthorn
, Takahiro Yokozuka, Jinhwan Kwon, Robin Miao Sin Yap, Shunsuke Miura, Ken-ichiro Ogawa, Yoshihiro Miyake:
Does User's Prior Knowledge Worth Consideration?: The Influence of Prior Knowledge Toward Mutual Gaze Convergence. 515-520 - Joyce Siqueira
, Fabrízzio Alphonsus Alves de Melo Nunes Soares
, Deller James Ferreira, Cleyton Rafael Gomes Silva
, Luciana de Oliveira Berretta, Cristiane Bastos Rocha Ferreira, Igor Moreira Felix, Anderson da Silva Soares, Ronaldo Martins da Costa, Mateus Machado Luna:
Braille Text Entry on Smartphones: A Systematic Review of the Literature. 521-526 - Xiaobing Zhang, Qiliang Yang, Jianchun Xing, Deshuai Han:
Recognizing Voice-Based Requirements to Drive Self-Adaptive Software Systems. 534-539
UCDAS Session 3
- Deshuai Han, Jianchun Xing, Qiliang Yang, Juelong Li, Hongda Wang:
Handling Uncertainty in Self-Adaptive Software Using Self-Learning Fuzzy Neural Network. 540-545 - Mohammad Hashemi, John Herbert:
A Service-Oriented User Interaction Analysis Framework Supporting Adaptive Applications. 546-551
The Second IEEE International Workshop on Secure Identity Management in the Cloud Environment
- Katsuyoshi Iida
, Yutaka Miyake, Chung Huang Yang, Bian Yang, Julien Bringer:
Message from the NETSAP and SIMICE Workshop Organizers. 552
NETSAP/SIMICE Session 1
- Jianjun Zheng, Akbar Siami Namin:
The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy. 553-558 - Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
An Automated ACL Generation System for Secure Internal Network. 559-564 - N. M. Sahri, Koji Okamura:
Collaborative Spoofing Detection and Mitigation - SDN Based Looping Authentication for DNS Services. 565-570
NETSAP/SIMICE Session 2
- Toru Kobayashi, Hiroaki Matsuoka, Shouta Betsumiya:
Flying Communication Server in case of a Largescale Disaster. 571-576 - Shun Tobiyama, Yukiko Yamaguchi, Hajime Shimada, Tomonori Ikuse, Takeshi Yagi:
Malware Detection with Deep Neural Network Using Process Behavior. 577-582 - Anna Monreale, Wendy Hui Wang:
Privacy-Preserving Outsourcing of Data Mining. 583-588 - Olivia Angiuli, Jim Waldo:
Statistical Tradeoffs between Generalization and Suppression in the De-identification of Large-Scale Data Sets. 589-593
Fast Abstracts
Fast Abstract 1: Software And Application Testing and Benchmarking
- Jaemyoun Lee, Chang Song, Kyungtae Kang:
Benchmarking Large-Scale Object Storage Servers. 594-595 - D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Estimating t-Way Fault Profile Evolution During Testing. 596-597 - Zhanwei Hui, Song Huang:
Experience Report: How Do Metamorphic Relations Perform in Geographic Information Systems Testing. 598-599 - Jialin Yang, W. K. Chan
:
Dynamic Testing Against Hidden Concurrency Bugs through Abstraction and Projection. 600-601 - Joyce Addae, Milena Radenkovic
, Xu Sun
, Dave Towey
:
An Augmented Cybersecurity Behavioral Research Model. 602-603
Fast Abstract 2: Computer Algorithms, Applications and Education
- Wael Abou El-Wafa
, Asmaa G. Seliem, Hesham F. A. Hamed:
Hardware Acceleration of Smith-Waterman Algorithm for Short Read DNA Alignment Using FPGA. 604-605 - Minzhe Guo, Kai Qian, Li Yang:
Hands-On Labs for Learning Mobile and NoSQL Database Security. 606-607 - Joyce Siqueira
, Fabrízzio Alphonsus Alves de Melo Nunes Soares
, Cleyton Rafael Gomes Silva
, Luciana de Oliveira Berretta, Cristiane Bastos Rocha Ferreira, Igor Moreira Felix, Mateus Machado Luna:
BrailleÉcran: A Braille Approach to Text Entry on Smartphones. 608-609 - Lei Li, Kai Qian:
Using Real-Time Fear Appeals to Improve Social Media Security. 610-611 - Abderrahmane Leshob, Hafedh Mili:
Service Extraction from Business Process Model: An Ontology-Based Approach. 612-613
Fast Abstract 3: Big Data and Infrastructure
- Elena Troubitsyna:
An Integrated Approach to Deriving Safety and Security Requirements from Safety Cases. 614-615 - Xiao Chen, Liangmin Wang:
Exploring Trusted Data Dissemination in a Vehicular Social Network with a Formal Compositional Approach. 616-617 - Priyanga Chandrasekar, Kai Qian:
The Impact of Data Preprocessing on the Performance of a Naive Bayes Classifier. 618-619 - Srinivasan Dwarakanathan:
S-Flink: Schedule for QoS in Flink Using SDN. 620-621 - Hossain Shahriar
, Svetlana Peletsverger, Humayun Zafar, Bill Bailey, Linda Johnston:
Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security. 622-623 - Hossain Shahriar
, Victor Clincy:
Anomalous Android Application Detection with Latent Semantic Indexing. 624-625
MediComp 2016: The Third IEEE International Workshop on Medical Computing
- Ji-Jiang Yang, Sheikh Iqbal Ahamed, Jianqiang Li:
Message from the MediComp Workshop Organizers. 626
Session 1: Dataset Specific Medical Computing
- Haowen Mo, Lu Liu, Jianqiang Li, Ji-Jiang Yang, Xi Meng, Shi Chen, Hui Pan:
Risk Factors Selection for SGA Prediction. 627-632 - Fabiano Ricardo Farias, Pedro Costa Klein, Ricardo Bernardi Soder, Jefferson Becker, Márcio Sarroglia Pinho
:
MRI Interpolation for Multiple Sclerosis Lesion Quantification. 633-636 - Yang Zheng, Xianxiang Chen, Zhen Fang, Shanhong Xia:
A Heart Rate Variability Analysis System Based on LeanCloud and Echarts. 637-640 - Wenai Song, Ping Wang, Xudong Zhang, Qing Wang:
Semi-Supervised Learning Based on Cataract Classification and Grading. 641-646
Session 2: General Medical Computing
- Rezvan Pakdel
, John Herbert:
Scalable Cloud-Based Analysis Framework for Medical Big-Data. 647-652 - Bo Liu, Jianqiang Li, Ji-Jiang Yang, Jing Bi
, Rong Li, Yong Li:
Pattern Recognition for Large-Scale and Incremental Time Series in Healthcare. 653-658 - Khalid Alghamdi, Nabil Almashfi, Ming Hua:
A Software Tool for Floating Point Interval Analysis with Improved Precision for Javascript-Based Medical Applications. 659-662 - João Batista Mossmann, Rafael Rieder
, Cecilia Dias Flores
, Márcio Sarroglia Pinho
:
Project and Preliminary Evaluation of VR-MED, a Domain-Specific Language for Serious Games in Family Medicine Teaching. 663-667

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.