default search action
15th SERA 2017: London, UK
- Liz Bacon, Jixin Ma, Lachlan M. MacKinnon:
15th IEEE International Conference on Software Engineering Research, Management and Applications, SERA 2017, London, United Kingdom, June 7-9, 2017. IEEE 2017, ISBN 978-1-5090-5756-6
Keynote
- Simon Xu:
Empirical research methods for software engineering: Keynote address. 1 - Petr Hnetynka:
Software abstractions and architectures for smart cyber-physical systems: Keynote address. 3
Analysis and Design of Algorithms / Program
- Jiameng Sun, Binrui Zhu, Jing Qin, Jixin Ma:
A confidentiality preserving publicly verifiable computation for multivariate polynomials. 5-12
Business Process Engineering
- Futian Wang, Ke Fang, Jin Tang, Cheng Zhang:
A server selection strategy about cloud workflow based on QoS constraint. 13-18
Communication Systems and Networks
- Xiaoyi Zhou, Xiaoming Yao, Honglei Li, Jixin Ma:
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting. 19-23 - Mohamed Bouyahi, Tahar Ezzedine, Houria Rezig:
Remote sensing of damage bridge structure of free vibration by using finite element method based on Jerk-Energy. 25-30 - Amina Chaabane, Salma Bradai, Wassef Louati, Mohamed Jmaiel:
Efficient composite event detection based on DHT protocol. 31-38
Data Mining and Knowledge Recovery
- Emma A. Gunu, Carl Lee, Wilson K. Gyasi, Robert M. Roe:
Modern predictive models for modeling the college graduation rates. 39-45 - Qiwen Zhang, Yunchuan Sun, Rongfang Bie:
Enterprise map construction based on EOLN model. 47-53 - Naohiro Ishii, Ippei Torii, Kazunori Iwata, Kazuya Odagiri, Toyoshiro Nakashima:
Generation of reducts and threshold functions using discernibility and indiscerniblity matrices. 55-61 - Taocheng Hu, Jinhui Yu:
LogSumExp for unlabeled data processing. 63-69
Design and Process Engineering
- Wararat Songpan:
The analysis and prediction of customer review rating using opinion mining. 71-77 - Youngsub Han, Kwangmi Ko Kim:
Sentiment analysis on social media using morphological sentence pattern model. 79-84
Healthcare Information Engineering
- Shinsaku Kiyomoto, Mohammad Shahriar Rahman, Anirban Basu:
On blockchain-based anonymized dataset distribution platform. 85-92 - Shujie Hu, Mengxing Huang, Wenlong Feng, Yu Zhang:
A smart health service model for elders based on ECA-S rules. 93-97 - Honglei Li, Qi Chen, Xiaoyi Zhou:
An analysis of the health care platform in the cloud environment. 99-102 - Ira Puspitasari:
The impacts of consumer's health topic familiarity in seeking health information online. 104-109
Image Processing
- Foqin Wang, Xuehan Zhang, Jinxin Ma, Jin Tang, Aihua Zheng:
Manifold ranking weighted local maximal occurrence descriptor for person re-identification. 111-114 - Hnin Mya Aye, Sai Maung Maung Zaw:
Salient object based action recognition using histogram of Changing Edge Orientation (HCEO). 115-122 - Ke Shan, Junqi Guo, Wenwan You, Di Lu, Rongfang Bie:
Automatic facial expression recognition based on a deep convolutional-neural-network structure. 123-128 - Tin Tin San, Nu War:
Feature based disparity estimation using hill-climbing algorithm. 129-133 - Chunyan Zhang, Jingbing Li, Shuangshuang Wang, Zhaohui Wang:
An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain. 135-141 - Shuangshuang Wang, Jingbing Li, Chunyan Zhang, Jintao Liang, Zhaohui Wang:
A robust algorithm of encrypted medical volume data retrieval based on 3D DWT and 3D DFT. 143-149 - Yuanyuan Guan, Bo Jiang, Yun Xiao, Jin Tang, Bin Luo:
A new graph ranking model for image saliency detection problem. 151-156 - Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri:
Gabor-feature-based local generic representation for face recognition with single sample per person. 157-160 - Zhen Wang, Feilin Han, Weidong Geng:
Image mosaicking for oversized documents with a multi-camera rig. 161-167
Information Assurance
- Ziqian Yuan, Zijie Guan, Hao Feng:
An improved information hiding algorithm based on image. 169-172
Mobile / Wireless Computing
- May Aye Chan Aung, Khin Phyo Thant:
Detection and mitigation of wireless link layer attacks. 173-178
Model Driven Architecture
- Ei Ei Thu, Nwe Nwe:
Model driven development of mobile applications using drools knowledge-based rule. 179-185
Object-Oriented Technology
- Uwe Hohenstein, Preeti Koka:
Reusable components for adding multi-tenancy to legacy applications. 187-194
Parallel and Distributed Computing
- Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem:
CloudSim4DWf: A CloudSim-extension for simulating dynamic workflows in a cloud environment. 195-202
Reliability Modeling and Analysis
- Xin He, Changbin Xue, Qing Zhou, Kexin Lin:
A reliability evaluation model of distributed autonomous robotic system architectures. 203-210 - Chunqing Li, Yingxin Tao:
Application of support vector machine with simulated annealing algorithm in MBR membrane pollution prediction. 211-217
Reverse Engineering, Reengineering
- Sandeep Reddivari, Mahesh Kotapalli:
On the use of visual clustering to identify landmarks in code navigation. 219-228
Software Engineering
- Ohoud Almughram, Sultan Alyahya:
Coordination support for integrating user centered design in distributed agile projects. 229-238 - Christopher Johnston Downie, Taoxin Peng:
Visualization of online datasets. 239-246 - Abhishek Tirkey, Kevin A. Gary:
Curricular change management with Git and Drupal: A tool to support flexible curricular development workflows. 247-253 - Muhammad Ilyas, Siffat Ullah Khan:
An empirical investigation of the software integration success factors in GSD environment. 255-262
Software Performance Prediction
- Erh-Wen Hu, Bogong Su, Jian Wang:
Software performance prediction at source level. 263-270
Software Reuse and Metrics
- Sevilay Velioglu, Yunus Emre Selçuk:
An automated code smell and anti-pattern detection approach. 271-275 - Tao Xin, Liu Yang:
A framework of software reusing engineering management. 277-282 - Tugrul Asik, Yunus Emre Selçuk:
Policy enforcement upon software based on microservice architecture. 283-287 - Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah:
Identifying and localizing the inter-consistency errors among UML use cases and activity diagrams: An approach based on functional and structural size measurements. 289-296
Software Testing
- Maiada M. Shabaan, Haitham S. Hamza, Yasser M. K. Omar:
Effects of FSM minimization techniques on number of test paths in mobile applications MBT. 297-302 - Jiguang Wu, Ying Li:
Research on construction of semantic dictionary in the football field. 303-306
Data Analytics and Applications
- Pengzhe Zhou, Zhiyi Fang, Hongliang Dong, Jiayue Liu, Shuaining Pan:
Data analysis with multi-objective optimization algorithm: A study in smart traffic signal system. 307-310 - Yasunori Shiono, Takaaki Goto, Kensei Tsuchida:
Data structure and triangulation algorithm for non-uniform landscapes. 311-315 - John Roush, Keith Siopes, Gongzhu Hu:
Predicting gross domestic product using autoregressive models. 317-322 - Qingxing Guo, Zhendong Xie, Xi Ning:
Study and realization of a CRM system in fuxin bank. 323-326 - Yucong Duan, Lixu Shao, Gongzhu Hu, Zhangbing Zhou, Quan Zou, Zhaoxin Lin:
Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graph. 327-332 - Yucong Duan:
A stochastic revelation on the deterministic morphological change of 3x+1. 333-338 - Lixu Shao, Yucong Duan, Xiaobing Sun, Quan Zou, Rongqi Jing, Jiami Lin:
Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph. 339-344 - Weng Wen, Huaikou Miao:
Research on service recommendation reliability in mobile computing. 345-350 - Teruhisa Hochin, Hiroki Nomiya:
On the estimation of time series data of daily life. 351-355 - Rieko Fujita, Tokuro Matsuo, Teruhisa Hochin:
Analysis of perception of people to school mottos. 357-362 - Liling Li, Sharad Shrestha, Gongzhu Hu:
Analysis of road traffic fatal accidents using data mining techniques. 363-370
Internet of People and Things
- Ryan Heartfield, George Loukas, Diane Gan:
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. 371-378 - William Oliff, Avgoustinos Filippoupolitis, George Loukas:
Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. 379-385 - Syed Sadiqur Rahman, Ryan Heartfield, William Oliff, George Loukas, Avgoustinos Filippoupolitis:
Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. 387-394 - Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil A. Panaousis:
ASTo: A tool for security analysis of IoT systems. 395-400 - Florian Kammüller, Juan Carlos Augusto, Simon Jones:
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. 401-406 - Christos Chatzigeorgiou, Lazaros Toumanidis, Dimitris Kogias, Charalampos Z. Patrikakis, Eric Jacksch:
A communication gateway architecture for ensuring privacy and confidentiality in incident reporting. 407-411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.