


default search action
8th CSOC 2019
- Radek Silhavy:
Software Engineering Methods in Intelligent Algorithms - Proceedings of 8th Computer Science On-line Conference 2019, CSOC 2019, April 2019, Vol. 1. Advances in Intelligent Systems and Computing 984, Springer 2019, ISBN 978-3-030-19806-0 - Abdullahi Abubakar Imam
, Shuib Basri, Rohiza Ahmad, María Teresa González-Aparicio
:
Literature Review on Database Design Testing Techniques. 1-13 - Ramesh Shahabadkar, Krutika Ramesh Shahabadkar:
Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT). 14-24 - R. Radha Kumari, V. Vijaya Kumar
, K. Rama Naidu:
S-DWF: An Integrated Schema for Secure Digital Image Watermarking. 25-34 - Faiza Shafique, Marhaba Khan, Fouzia Jabeen, Sanila:
Semantic Richness of Tag Sets: Analysis of Machine Generated and Folk Tag Set. 35-47 - Antonín Kleka, Radim Farana
, Ivo Formánek:
Analysis of Behaviour Patterns of the Residents of a Smart House. 48-54 - M. V. Orda-Zhigulina, Eduard Melnik, Donat Ivanov, A. A. Rodina, D. V. Orda-Zhigulina:
Combined Method of Monitoring and Predicting of Hazardous Phenomena. 55-61 - Sarah Myriam Lydia Hahn:
Analysis of Existing Concepts of Optimization of ETL-Processes. 62-76 - Donat Ivanov
, Eduard Melnik
:
Multiagent Distribution of Roles in Communities with Limited Communications. 77-82 - P. H. Gunawan, Agung F. Gumilar:
Mac-Cormack's Scheme for Shock Filtering Equation in Image Enhancement. 83-89 - Miroslav Dvorak, Petr Dolezel
:
Comparison Two of Different Technologies for Outdoor Positioning of Robotic Vehicles. 90-98 - Jerrin Yomas, N. Chitra Kiran:
An Effective Hardware-Based Bidirectional Security Aware M-Payment System by Using Biometric Authentication. 99-108 - Marek Simon
, Ladislav Huraj
:
A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks. 109-118 - Michal Beno
:
Perspective on Slovakia's Freelancers in Sharing Economy - Case Study. 119-130 - Omar L. Loaiza
, Nemias Saboya
, José Bustamante
, Juan J. Soria
:
Framework Based on a Fuzzy Inference Model for the Selection of University Program Applicants. 131-140 - Carmen Ana Anton, Oliviu Matei, Anca Avram:
Collaborative Data Mining in Agriculture for Prediction of Soil Moisture and Temperature. 141-151 - Musaddak Maher Abdulzahra
:
Novel Anti-Collision Algorithm in RFID Tag Identification Process. 152-169 - Dalila Amara
, Latifa Ben Arfa Rabai
:
An Empirical Assessment of Error Masking Semantic Metric. 170-179 - Maythem K. Abbas
, Low Tan Jung, Ahmad Kamil Mahmood, Raed M. T. Abdulla
:
Intelligent Software Agents for Managing Road Speed Offences. 180-191 - Ammar K. Alazzawi
, Helmi Md Rais, Shuib Basri:
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation. 192-199 - Aleksander Jarzebowicz
, Kacper Sztramski:
Identification, Assessment and Automated Classification of Requirements Engineering Techniques. 200-212 - G. N. Anil
:
RF-IoT: A Robust Framework to Optimize Internet of Things (IoT) Security Performance. 213-222 - Milan Jemelka, Bronislav Chramcov
:
The Use of Recursive ABC Method for Warehouse Management. 223-229 - D. Pushpa:
A Robust Modeling of Impainting System to Eliminate Textual Attributes While Restoring the Visual Texture from Image and Video. 230-239 - Pavel Pokorný, Lukás Lastuvka:
SkyWay in Zlín. 240-248 - Jiri Vojtesek
, Jan Hutak:
Using Multimedia in Blended Learning. 249-258 - A. A. Dubanov:
Modeling the Behavior of Objects in the Pursuit Problem. 259-274 - Alexey Samoylov, Sergey Gushanskiy
, Natalia Korobeynikova:
Studying the Schrödinger Equation, Implementation of Qubits and Visualization of Matrices Using Matlab. 275-282 - Dariusz Strzeciwilk
:
Performance Analysis of Weighted Priority Queuing Systems. 283-292 - Aytug Onan
:
Topic-Enriched Word Embeddings for Sarcasm Identification. 293-304 - Shuib Basri, Thangiah Murugan, Dhanapal Durai Dominic:
Validating the Conceptual Framework with Exploratory Testing. 305-317 - Tomasz Galecki, Wiktor B. Daszczuk
:
Shapp: Workload Management System for Massive Distributed Calculations. 318-329 - Elarbi Badidi
:
A Fog Node Architecture for Real-Time Processing of Urban IoT Data Streams. 330-341 - Liang Yong, Mu Zhaonan:
Optimizing Performance of Aggregate Query Processing with Histogram Data Structure. 342-350 - Jan Tyrychtr
, Martin Pelikán
, Ivan Vrana
:
Software Algorithm of EM-OLAP Tool: Design of OLAP Database for Econometric Application. 351-359 - Xu Zhang, Yongsen Hu:
Discovery of Important Location from Massive Trajectory Data Based on Mediation Matrix. 360-369 - Andrei Tara, Kirill Ivkushkin, Alexandru Butean, Hjalmar K. Turesson:
The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective. 370-379 - Wiem Zaouga, Latifa Ben Arfa Rabai
:
Modeling and Evaluating a Human Resource Management Ontology. 380-390 - Andrey M. Fedorov
, Igor O. Datyev, Andrey L. Shchur, Andrey G. Oleynik:
Online Social Networks Analysis for Digitalization Evaluation. 391-402 - Martin Sysel
:
A Simulink Network Communication. 403-414 - Aerton Wariss Maia, Pedro Porfrio Muniz Farias:
Transactions as a Service. 415-423 - Marián Hostovecký
, Ferdinand Fojtlín, Erik Jansto
:
Mathematical Dungeon: Development of the Serious Game Focused on Geometry. 424-432 - Praveen Naik, Shantharam Nayak:
Intelligence-Software Cost Estimation Model for Optimizing Project Management. 433-443 - Petr Silhavy
, Radek Silhavy
, Zdenka Prokopova
:
Outliners Detection Method for Software Effort Estimation Models. 444-455 - Zdenka Prokopova
, Petr Silhavy
, Radek Silhavy
:
Analysis of the Software Project Estimation Process: A Case Study. 456-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.