default search action
7th ICSCA 2018: Kuantan, Malaysia
- Kamal Zuhairi Zamli, Vitaliy Mezhuyev, Luigi Benedicenti:
Proceedings of the 7th International Conference on Software and Computer Applications, ICSCA 2018, Kuantan, Malaysia, February 08-10, 2018. ACM 2018
Software Engineering
- Mehdi Yaghoubi, Morteza Zahedi:
Tuning Concurrency of the Business Process by Dynamic Programming. 1-5 - Foziah Gazzawe, Russell Lock, Christian W. Dawson:
Use of Ontology in Identifying Missing Artefact Links. 6-9 - Sai Datta Vishnubhotla, Emilia Mendes, Lars Lundberg:
An Insight into the Capabilities of Professionals and Teams in Agile Software Development: A Systematic Literature Review. 10-19 - Ehsan Mousavi Khaneghah, Amirhosein Reyhani ShowkatAbad, Reyhaneh Noorabad Ghahroodi:
Challenges of Process Migration to Support Distributed Exascale Computing Environment. 20-24 - Asmau Usman, Noraini Ibrahim, Ibrahim Anka Salihu:
Test Case Generation from Android Mobile Applications Focusing on Context Events. 25-30 - Ateeq Ur Rehman Butt, Muhammad Asif, Shahbaz Ahmad, Ulfat Imdad:
An Empirical Study for Adopting Social Computing in Global Software Development. 31-35 - Mohd Nazri Omar, Muhammad Nur Hafiz Shaidan, Suhaila Hussain:
Simulation Comparison on PRICO LNG Process Using Open and Proprietary Sources. 36-39 - Mensely Cheah Siow Fhang, Wong Wai Tong:
Why a Good Process Fail?: Experience in Building a Sustainable and Effective Process for Software Development. 40-45 - Abdullah B. Nasser, Kamal Z. Zamli:
Parameter Free Flower Algorithm Based Strategy for Pairwise Testing. 46-50 - Mensely Cheah Siow Fhang, Rajashekara Swamy:
Best Practices in Release Management of Large Projects. 51-55 - Syahrul Fahmy, Aziz Deraman, Jamaiah Haji Yahaya:
The Role of Human in Software Configuration Management. 56-60 - Jiujiu Yu:
Review of Panorama and Key Technical Prospect on Software Testing. 61-65 - Fauziah binti Zainuddin, Ruzaini bin Abdullah Arshah, Rozlina binti Mohamad:
Software Visual Specification for Requirement Specification Validation. 66-71 - Ting Wang, Jin Xu, Yanting Wang, Wudi Cao, Baoji He:
The Parallel Performance Optimization of The MS-CG Method. 72-76 - Jalal Shah, Nazri Kama:
Extending Function Point Analysis Effort Estimation Method for Software Development Phase. 77-81 - Ayesha Saeed, Wasi Haider Butt, Farwa Kazmi, Madeha Arif:
Survey of Software Development Effort Estimation Techniques. 82-86 - Kamal Z. Zamli, Norasyikin Safieny, Fakhrud Din:
Hybrid Test Redundancy Reduction Strategy Based on Global Neighborhood Algorithm and Simulated Annealing. 87-91 - Fakhrud Din, Kamal Z. Zamli:
Fuzzy Adaptive Teaching Learning-based Optimization Strategy for GUI Functional Test Cases Generation. 92-96 - Adidah Lajis, Haidawati Md Nasir, Normaziah Abdul Aziz:
Proposed Assessment Framework Based on Bloom Taxonomy Cognitive Competency: Introduction to Programming. 97-101 - Boshu Li, Wenjun Wu, Zhenhui Hu:
Evaluation of Software Quality for Competition-based Software Crowdsourcing Projects. 102-109
Data Mining Algorithms and Techniques
- Shu-I Chiu, Kuo-Wei Hsu:
Predicting Political Tendency of Posts on Facebook. 110-114 - Atefeh Khazaei, Mohammad Ghasemzadeh, Dieter Gollmann:
Overlapping Clustering for Textual Data. 115-118 - Zohreh Abtahi Foroushani, Yue Li:
Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique. 119-123 - Shu-I Chiu, Kuo-Wei Hsu:
User Mining to Find Important Facebook Users. 124-128 - Baisakhi Das, Mamata Dalui, Anupama Mondal, Salma Mandi, Nilanjana Das, Biplab K. Sikdar:
Evaluation of Misspeculation Impact on Chip-Multiprocessors Power Overhead. 129-133 - Taeyang Jeong, Duheon Choi, Sangwoo Han, Eui-Young Chung:
A Study of Data Layout in Multi-channel Processing-In-Memory Architecture. 134-138 - Noor Syafiqah Mohd Sabri, Zafikha Aida Bidin, Asmah Alia Mohammad Bohari:
Integrated Data Management: Building Information Modeling (BIM) in Malaysia Construction Industry. 139-142 - Nordiana Mukahar, Bakhtiar Affendi Rosdi:
Performance Comparison of Prototype Selection Based on Edition Search for Nearest Neighbor Classification. 143-146 - Irina Pak, Phoey Lee Teh:
Value of Expressions behind the Letter Capitalization in Product Reviews. 147-152
Image Analysis and Processing
- May Thu Aung, Tam Thi Thanh Nguyen, Kazuhiro Ogata:
Guessing Properties of the Qlock Mutual Exclusion Protocol based on its Graphical Animations and confirming the Properties by Model Checking. 153-157 - Vitaliy Mezhuyev, Oleg M. Lytvyn, Iuliia Pershyna, Olesia Nechuiviter, Oleg O. Lytvyn:
Algorithm for the Reconstruction of the Discontinuous Structure of a Body by Its Projections along Mutually Perpendicular Lines. 158-163 - Xiaoqiang Zhang, Xuesong Wang, Qingming Wang:
Additive Spread Spectrum Image Hiding Algorithm based on Host Signal. 164-168 - Zhonghua Wang, Chuanyang Cheng, Jingyi Yang:
Scene Division-based Spatio-temporal Updating Mixture Gaussian Model for Moving Target Detection. 169-172 - Win Win Myo, Wiphada Wettayaprasit, Pattara Aiyarak:
A Noble Feature Selection Method for Human Activity Recognition using Linearly Dependent Concept (LDC). 173-177 - Linglong Tan, Yehui Chen, Changkai Li:
Research on Image Segmentation Optimization Algorithm based on Chaotic Particle Swarm Optimization and Fuzzy Clustering. 178-182
Information Theory and Network Engineering
- Serdarmammet Tachmammedov, Yew Kwang Hooi, Khairul Shafee Kalid:
Automated Multi-factor Analytics for Cheat-Proofing Attendance-taking. 183-188 - Eric Wagner, Christoph Karls, Martina Lehser:
Quantification and Localization of Cross-Core Interference for Embedded Multi-Core Control Applications. 189-193 - May Thu Aung, Tam Thi Thanh Nguyen, Kazuhiro Ogata:
Analysis of Two Flawed Versions of A Mutual Exclusion Protocol with Maude and SMGA. 194-198 - Fernandino S. Perilla, George R. Villanueva Jr., Napoleon M. Cacanindin, Thelma D. Palaoag:
Fire Safety and Alert System Using Arduino Sensors with IoT Integration. 199-203 - Mishal Almazrooie, Rosni Abdullah, Azman Samsudin, Kussay N. Mutter:
Quantum Grover Attack on the Simplified-AES. 204-211 - Klinsukon Nimkanjana, Suntorn Witosurapot:
A Simple Approach for Enabling SPARQL-based Temporal Queries for Media Fragments. 212-216 - Jianhong Ma, Ning-Ning Wang, Shuang Yao, Zimo Wei, Shuai Jin:
Similar Patent Search Method Based on a Functional Information Fusion. 217-222 - Bernardo Santos, Do van Thuan, Boning Feng, Thanh Van Do:
Identity Federation for Cellular Internet of Things. 223-228 - Marwan Abdul Hammed Ashour, Rabab Alayham Abbas Helmi:
Improving Time Series' Forecast Errors by Using Recurrent Neural Networks. 229-232
Information Education and Learning Technology
- Reynold A. Rustia, Ma. Melanie A. Cruz, Michael Angelo P. Burac, Thelma D. Palaoag:
Predicting Student's Board Examination Performance using Classification Algorithms. 233-237 - Ceasar Ian P. Benablo, Evangeline T. Sarte, Joe Marie D. Dormido, Thelma D. Palaoag:
Higher Education Student's Academic Performance Analysis through Predictive Analytics. 238-242 - Ragad M. Tawafak, Muamer N. Mohammed, Ruzaini bin Abdullah Arshah, Awanis M. Romli:
Review on the Effect of Student Learning Outcome and Teaching Technology in Omani's Higher Education Institution's Academic Accreditation Process. 243-247 - Mostafa Al-Emran, Vitaliy Mezhuyev, Adzhar Kamaludin, Maryam Juma Alsinani:
Development of M-learning Application based on Knowledge Management Processes. 248-253 - Fadila Aulia Pritami, Izzati Muhimmah:
Digital Game Based Learning using Augmented Reality for Mathematics Learning. 254-258 - Harumi Watanabe, Mikiko Sato, Masafumi Miwa, Makoto Imamura, Shintaro Hosoai, Nobuhiko Ogura, Hiroyuki Nakamura, Kenji Hisazumi:
Compulsory Game based Robot Contest for Embedded System Development Education. 259-263 - Samaa M. Shohieb:
CDMG: Crises and Disasters Management Game (Video Game to Teach Arab Children How to Handle Emergencies and Crises). 264-268
Computer Theory and Applications
- Tey Wah Yen, Tan Lit Ken, Ang Chun Kit:
A Highly Computationally Efficient Explicit-Iterative Hybrid Algorithm for Colebrook-White Equation. 269-273 - Yinghui Wang, Bo Wang, Yuexian Hou, Dawei Song:
Automatic Update of Ontology Concept Hierarchy with New Entity Insertion and New Concept Generation Based on Semantic Measurement. 274-278 - Paul G. Garcia Jr., Dario H. Galeon, Thelma D. Palaoag:
TEXTnology: A Managed SMS Knowledge Sharing for Farmers. 279-284 - Lakmal Meegahapola, Vijini Mallawaarachchi, Roshan Alwis, Eranga Nimalarathna, Dulani Meedeniya, Sampath Jayarathna:
Random Forest Classifier based Scheduler Optimization for Search Engine Web Crawlers. 285-289 - Rozaini Abdul Rahman, Mensely Cheah Siow Fhang, Wong Wai Tong:
IV&V Experience Framework: An Experience Paper on IV&V Implementation in Government Project. 290-296 - Hasan Kahtan, Kamal Z. Zamli, Wan Nor Ashikin Wan Ahmad Fatthi, Azma binti Abdullah, Mansoor Abdullateef Abdulgabber, Noor Shahaiyusniezam Kamarulzaman:
Heart Disease Diagnosis System Using Fuzzy Logic. 297-301 - Bavani Ramayah:
Detecting Emotional Changes among Visually Impaired Users in Complex and Non-Complex Layout using Neuro-Physiological Signal. 302-305 - Sushanti Priya, Suvadip Hazra, Bidesh Chakraborty, Mamata Dalui:
A Cellular Automata Based BIST for Detecting NPSFs in High Speed Memories. 306-311 - Jeongbin Kim, Ki Tae Kim, Eui-Young Chung:
CAD Tool Flow for Variation-Tolerant Non-Volatile STT-MRAM LUT based FPGA. 312-316 - Young Min Park, Kwangsu Kim, Byoung Jin Kim, Eui-Young Chung:
Asymmetric Slew Logic Threshold Method on Near Threshold Region. 317-321 - Xiaomin Bai, Zijing Cheng, Zhangbo Duan, Kai Hu:
Formal Modeling and Verification of Smart Contracts. 322-326 - Septia Rani, Kartika Nur Kholidah, Sheila Nurul Huda:
A Development of Travel Itinerary Planning Application using Traveling Salesman Problem and K-Means Clustering Approach. 327-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.