default search action
17th SERA 2019: Honolulu, HI, USA
- 17th IEEE International Conference on Software Engineering Research, Management and Applications, SERA 2019, Honolulu, HI, USA, May 29-31, 2019. IEEE 2019, ISBN 978-1-7281-0798-1
- Masahide Nakamura:
Improving Health and Quality of Life in One-Person Households Using IoT and Machine Learning. 1 - Yoonsik Cheon:
Multiplatform Application Development for Android and Java. 1-5 - Lawrence Chung:
Blockchain: A Software Engineering Perspective. 3 - Timothy P. Hanratty, Robert J. Hammell:
Use of Type-2 Fuzzy Sets for Military Value of Information Decision Support. 5-12 - Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka:
Supporting Program Understanding by Automatic Indexing of Functionalities in Source Code. 13-18 - Behrooz Etesamipour, Robert J. Hammell:
Aggregating Information Toward Military Decision Making. 19-26 - Teng Ling, Lixiang Liu, Changwen Zheng, Shuaijun Liu, Xi Zhou:
An Optimized Forward Scheduling Algorithm in A Software-defined Satellite Network. 27-32 - Anila Umar, Usman Qamar:
Detection and Diagnosis of Psychological Disorders Through Decision Rule Set Formation. 33-37 - Eunhee Lee, Yong Ik Yoon:
Project Management Model Based on Consistency Strategy for Blockchain Platform. 38-44 - Hana Jo, Yong Ik Yoon:
Cognifive Service Platform for Super Things*. 45-52 - Yushi Kondoh, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka:
Extracting Inclusion Graphs of API Member Sets to Improve Searchability. 53-59 - Munazza Ansar, Usman Qamar, Raheela Bibi, Asma Shaheen:
Identification of Difficult English Words for Assisting Hearing Impaired Children in Learning Language. 60-65 - Raheela Bibi, Usman Qamar, Munazza Ansar, Asma Shaheen:
Sentiment Analysis for Urdu News Tweets Using Decision Tree. 66-70 - Shirin Hasavari, Yeong-Tae Song:
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology. 71-75 - Kyi Pyar Zaw, Nu War:
Y-Position based Myanmar Touching Character Segmentation and Sub-components based Character Classification. 76-83 - Ibraheem Aljamal, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta:
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments. 84-89 - Nicholas Visalli, Lin Deng, Amro Alsuwaida, Zachary Brown, Manish Joshi, Bingyang Wei:
Towards Automated Security Vulnerability and Software Defect Localization. 90-93 - Sunao Sato, Mineo Takai, Yasunori Owada, Taka Maeno, Masato Oguchi:
Development of a Request Processing Method for Relief Goods in the Distributed Material Management Support System of Evacuation Shelters using DTN. 94-98 - Srikanth Jonnada, Jothis K. Joy:
Measure your API Complexity and Reliability. 104-109 - Rui Li, Yang Liu:
Compositional Stochastic Model Checking Probabilistic Automata via Symmetric Assume-Guarantee Rule. 110-115 - Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng:
Classification of Smart Contract Bugs Using the NIST Bugs Framework. 116-123 - Yan Ma, Zining Cao, Yang Liu:
Genetic Algorithm-Based Assume-Guarantee Reasoning for Stochastic Model Checking. 124-127 - Huawei Ma, Wencai Du, Simon Xu, Weijun Li:
Searching Tourism Information by Using Vertical Search Engine Based on Nutch and Solr. 128-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.