default search action
SCSE 2015: Berkeley, CA, USA
- Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, SCSE'15, Berkeley, CA, USA, March 5-6, 2015. Procedia Computer Science 62, Elsevier 2015
- Mehdi Bahrami:
Welcome Message. 1-3
Keynote Speakers
- Balaji Prabhakar:
A Big Data Dashboard for Urban Mobility. 7-8 - Rick Kuhn:
Combinatorial Methods in Software Testing. 9-10 - Mukesh Singhal:
An Introduction to Multi-trapdoor Hash Functions and It's Applications. 11-12 - Jozo Dujmovic:
Soft Computing Methodology for Software Evaluation. 13-14
Tutorials and Workshops
- Todd Sedano, Cécile Péraire:
Using Essence Reflection Meetings in Team-based Project Courses. 15-16 - Mehdi Bahrami:
An Evaluation of Security and Privacy Threats for Cloud-based Applications. 17-18 - Mehmet Sahinoglu:
CLOURA: CLOUD Risk Assessor (with Stochastic & Non-Stochastic Simulations). 19-20 - Shivanand M. Handigund:
A Suigeneris Automated Software Testing Methodology. 21-22
Technical Papers Algorithms
- Hessa Al-Junaid:
ANN Based Robotic Arm Visual Servoing Nonlinear System. 23-30 - Hikari Kato, Mayumi Takaya, Akihiro Yamamura:
Analysis of a Monte Carlo Tree Search in Knight-Amazons. 31-38 - Kemal Akyol, Elif Çalik, Safak Bayir, Baha Sen, Abdullah Çavusoglu:
Analysis of Demographic Characteristics Creating Coronary Artery Disease Susceptibility Using Random Forests Classifier. 39-46 - Abdelaziz Fellah:
Real-Time Languages, Timed Alternating Automata, and Timed Temporal Logics: Relationships and Specifications. 47-54 - Todd Sedano, Cécile Péraire, Jason D. Lohn:
Towards Generating Essence Kernels Using Genetic Algorithms. 55-64 - Fatmah Yousef Assiri, James M. Bieman:
The Impact of Search Algorithms in Automated Program Repair. 65-72 - Talal Bonny, Bassel Soudan:
High Speed Database Sequence Comparison. 73-80
Software Requirements
- Nomi Baruah:
Requirement Management in Agile Software Environment. 81-83
Fuzzy Logics
- Abdul Rahman, Tanvir Ahmad, M. M. Sufyan Beg:
Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation Operators. 84-91 - Bonthu Kotaiah, M. V. S. Prasad, Raees Ahmad Khan:
An Analysis of Software Reliability Assessment with Neuro-Fuzzy based Expert Systems. 92-98 - Rajani Kumari, Sandeep Kumar, Vivek Kumar Sharma:
Fuzzified Expert System for Employability Assessment. 99-106 - Ronald R. Yager, Naif Alajlan:
Fuzzy Measures in Multi-Criteria Decision Making. 107-115 - Luis Terán:
Evaluation of Visualization of a Fuzzy-Based Recommender System for Political Community-Building. 116-125 - Shahab Saquib Sohail, Jamshed Siddiqui, Rashid Ali:
OWA based Book Recommendation Technique. 126-133 - Gulfam Ahamad, S. Kazim Naqvi, M. M. Sufyan Beg, Tanvir Ahmed:
A Web based System for Cricket Talent Identification, Enhancement and Selection (C-TIES). 134-142 - Khalid Al Mutib, Ebrahim Mattar, Mansour Alsulaiman:
Implementation of Fuzzy Decision Based Mobile Robot Navigation Using Stereo Vision. 143-150
Network Software and Software-defined Networking (SDN)
- S. Chaturvedi, A. A. Kurshid:
ASIC Implementation for Improved Character Recognition and Classification using SNN Model. 151-158 - Patrick G. Clark, Arvin Agah:
Modeling Firewalls for Behavior Analysis. 159-166 - Iehab Al Rassan, Haifa Alyahya:
Tagged-Sub Optimal Code (TSC) Compression for Improving Performance of Web Services. 167-169 - Donald Cohen, K. Narayanaswamy:
Using First-Order Logic to Query Heterogeneous Internet Data Sources. 170-177 - Shivanand M. Handigund, Siddappa G. Makanur, M. Sreenivasa Rao:
Integration of Object Oriented Host Program with Network DBMS. 178-185 - Usha Rani Seshasayee, Rathinam Manivasakan:
Jitter Buffer Modelling and Analysis for TDM over PSN. 186-195 - Alina Mirza, S. Mehak Kabir, Sara Ayub, Shahzad Amin Sheikh:
Impulsive Noise Cancellation of ECG signal based on SSRLS. 196-202
Software Security
- Ebru Celikel Cankaya, Than Kywe:
A Secure Healthcare System: From Design to Implementation. 203-212 - Neila Rjaibi, Latifa Ben Arfa Rabai:
Developing a Novel Holistic Taxonomy of Security Requirements. 213-220 - Adamu I. Abubakar, Haruna Chiroma, Sanah Abdullahi Muaz, Libabatu Baballe Ila:
A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems. 221-227 - Quamar Niyaz, Weiqing Sun, Mansoor Alam:
Impact on SDN Powered Network Services Under Adversarial Attacks. 228-235
Knowledge based Software Systems
- Shahrouz Moaven, Jafar Habibi, Razie Alidoosti, Alireza Parvizi-Mosaed:
Towards a Knowledge Based Approach to Style Driven Architecture Design. 236-244 - Edy Portmann, Patrick Kaltenrieder, Witold Pedrycz:
Knowledge Representation through Graphs. 245-248
Software Evaluation
- Yasmeen Alomair, Iftikhar Ahmad, Abdullah Sharaf Alghamdi:
A Review of Evaluation Methods and Techniques for Simulation Packages. 249-256
Software Testing
- Lan Lin, Jia He, Yong Zhang, Fengguang Song:
Quality Assurance through Rigorous Software Specification and Testing: A Case Study. 257-265 - Sangharatna Godboley, Arun Sahani, Durga Prasad Mohapatra:
ABCE: A Novel Framework for Improved Branch Coverage Analysis. 266-273
Programming Languages Aspect-Oriented Programming
- A. M. Shivaram, Shivanand M. Handigund:
An Ameliorated Methodology for the Abstraction of Object Oriented Features from Software Requirements Specification. 274-281 - Bernaridho I. Hutabarat:
New Theory for Code-translation; Punctuator and Qualifier as Two Token Categories and Supplementary Concepts of Programming. 282-286 - Azusa Kurihara, Akira Sasaki, Ken Wakita, Hiroshi Hosobe:
A Programming Environment for Visual Block-Based Domain-Specific Languages. 287-296 - Alla Levina, Sergey V. Taranov:
Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword Distribution. 297-302 - Santosh Singh Rathore, Sandeep Kumar:
Predicting Number of Faults in Software System using Genetic Programming. 303-311 - Karel Cemus, Tomás Cerný, Michael J. Donahoo:
Automated Business Rules Transformation into a Persistence Layer. 312-318
Big Data and Cloud Computing
- Mehmet Sahinoglu, Sharmila Ashokan, Preethi Vasudev:
CLOUD Computing: Cost-effective Risk Management with Additional Product Deployment. 319-325 - Er. Ramandeep Kaur:
Big Data- Is a Turnkey Solution. 326-331 - Ivan Prakasa, Osamu Shigo:
Global Collaboration Requirement Analysis System in Cloud Computing. 332-334 - Mehmet Sahinoglu, Sharmila Ashokan, Preethi Vasudev:
Cost-Efficient Risk Management with Reserve Repair Crew Planning in CLOUD Computing. 335-342 - Dustin Wright, Xing Yan, Pooja Srinivas, Atieh Kashani, Yusuf Öztürk:
A Cloud to Mobile Application for Consumer Behavior Modification. 343-351 - Ghazal Riahi:
E-learning Systems Based on Cloud Computing: A Review. 352-359
Software Reliability
- Néstor R. Barraza:
A Parametric Empirical Bayes Model to Predict Software Reliability Growth. 360-369
Optimization
- Kiyoshi Tsukakoshi, Kenichi Ida:
Gaussian Mixture Distribution Analysis as Estimation of Probability Density Function and it's the Periphery. 370-377 - Hiroshi Hosobe:
A Hierarchical Method for Solving Soft Nonlinear Constraints. 378-384 - Jasmeet Singh, Kshirasagar Naik, Veluppillai Mahinthan:
Impact of Developer Choices on Energy Consumption of Software on Servers. 385-394 - Eiman Tamah Al-Shammari:
Towards Search Engine Optimization: Feedback Collation. 395-402 - Solmaz Salehian, Shamala K. Subraminiam:
Unequal Clustering by Improved Particle Swarm Optimization in Wireless Sensor Network. 403-409 - Sherin Zafar, M. K. Soni, M. M. Sufyan Beg:
An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET. 410-418 - Eatedal Alabdulkreem, Hamed S. Al-Raweshidy, Maysam F. Abbod:
MRAI Optimization for BGP Convergence Time Reduction without Increasing the Number of Advertisement Messages. 419-426 - Srividhya Jeyaprakash, K. Alagarsamy:
A Distinctive Genetic Approach for Test-Suite Optimization. 427-434 - Haruna Chiroma, Nor Liyana Mohd Shuib, Sanah Abdullahi Muaz, Adamu I. Abubakar, Lubabatu Baballe Ila, Jaafar Zubairu Maitama:
A Review of the Applications of Bio-inspired Flower Pollination Algorithm. 435-441 - Sandeep Kumar, Rajani Kumari, Vivek Kumar Sharma:
Fitness Based Position Update in Spider Monkey Optimization Algorithm. 442-449 - Iman Rasekh:
A New Competitive Intelligence-based Strategy for Web Page Search. 450-456
Modelling and Simulation
- Mokhtaria Hacherouf, Safia Nait Bahloul:
DTD2OWL2: A New Approach for the Transformation of the DTD to OWL. 457-466 - Shivanand M. Handigund, B. N. Arunakumari:
An Ameliorated Methodology to Abstract Object Oriented Features from Programming System. 470-477 - Sabah Al-Fedaghi:
High-Level Representation of Time in Diagrammatic Specification. 478-486 - Hina Gull, Saleh Alrashed, Sardar Zafar Iqbal:
Validation of Usability Driven Web based Software Process Model using Simulation. 487-494 - Mark Allison, Peter J. Clarke, Xudong He:
A Generic Model of Execution for Synthesizing Interpreted Domain-Specific Models. 495-504 - Ananthi Sheshasaayee, Roby Jose:
A Theoretical Framework for the Maintainability Model of Aspect Oriented Systems. 505-512 - A. Hegazy, M. Sakre, Eman Khater:
Arabic Ontology Model for Financial Accounting. 513-520 - Khaireddine Bacha, Mounir Zrigui:
Morphological Analysis in the Environment "TELA". 521-528 - Mourad Badri, Fadel Touré, Luc Lamontagne:
Predicting Unit Testing Effort Levels of Classes: An Exploratory Study based on Multinomial Logistic Regression Modeling. 529-538
Mobile Applications
- Mahmood Ghaleb Al-Bashayreh:
Domain Model Validation of Context-aware Mobile Patient Monitoring Systems. 539-546 - Yaser Mowafi, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily, Tareq Al-Aqarbeh, Marat Abilov, Viktor Dmitriyev:
Exploring a Context-based Network Access Control for Mobile Devices. 547-554 - Maysoon F. Abulkhair, Arwa H. Alsahli, Kawther M. Taleb, Atheer M. Bahran, Fatimah M. Alzahrani, Hend A. Alzahrani, Lamiaa Fattouh Ibrahim:
Mobile Platform Detect and Alerts System for Driver Fatigue. 555-564
Application of Soft Computing
- Urjaswala Vora:
Precepts and Evolvability of Complex Systems. 565-574 - Ryo Onuma, Hiroki Nakayama, Shuhei Abe, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Strategic Accumulation and Organization of the Polish Contexts in Research Document Creation. 575-577 - Nasir Uddin, Fariha Hossain:
Evolution of Modern Management through Taylorism: An Adjustment of Scientific Management Comprising Behavioral Science. 578-584 - Alihossein Aryanfar, Razali Yaakob, Alfian Abdul Halin, Md Nasir Sulaiman, Khairul Azhar Kasmiran, Leila Mohammadpour:
Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification. 585-592 - Sirshendu Guha:
Simulation Studies for Analysis of Inherent Resilience Properties of an Amine Regeneration Column used in a Gas Sweetening Unit. 593-602 - Mohit Mishra, Vaibhav Gupta, Utkarsh Chaturvedi, Kaushal K. Shukla, Roman V. Yampolskiy:
A Study on the Limitations of Evolutionary Computation and other Bio-inspired Approaches for Integer Factorization. 603-610 - Lagouge Kwanda Tartibu, Bohua Sun, M. A. E. Kaunda:
Optimal Design of A Standing Wave Thermoacoustic Refrigerator Using GAMS. 611-618 - G. V. S. Raju, C. Kishor Kumar Reddy, L. V. Narasimha Prasad:
Revealing of Earth Quake Magnitude Using Seismic Signals and Wavelet Transforms. 619-627 - Tomohiro Funayama, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Hybrid Analysis of Audience Gaze and Slide Construction to Obtain the Clues for Improving Presentations. 628-630 - Mona Awad Alkhattabi:
Usability Evaluation of Tadarus: Student Perceptions. 631-636 - L. V. Narasimha Prasad, C. Kishor Kumar Reddy, Shobha Rani Depuru:
Satellite Derived pH Estimation for Acidity in Precipitation Using Water Vapor and Nitrogen Dioxide Imagery. 637-648
Corrected Paper
- Reem Elkhouly, Ahmed El-Mahdy, Amr Elmasry:
2-Bit Branch Predictor Modeling Using Markov Model. 650-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.